Analysis

  • max time kernel
    150s
  • max time network
    154s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240226-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system
  • submitted
    29-03-2024 12:46

General

  • Target

    39a58a4549ee1eedcee35a637d524761c70bfc878abd451c56fb9fd4b439ea71.exe

  • Size

    1.8MB

  • MD5

    09ad37ec1461fe538e2681aa082c111d

  • SHA1

    8e7982474abbf03ac03553a243eea265217a34ed

  • SHA256

    39a58a4549ee1eedcee35a637d524761c70bfc878abd451c56fb9fd4b439ea71

  • SHA512

    8472b87fa682309c9d2d23bc48680b9d26b90c96613b41d450ac3345e3895b570379b9aec3a0090c1548950e25611bc8450fdf8655d9ac7e3b7f8ccafddfd1f7

  • SSDEEP

    49152:Cb4FE+pIOOjfrLm50zOBZLfSDr6rUi/f40Mz86ufcOoq:Cb4C+pEjfrSCzO3+DrW9/jkicOr

Malware Config

Extracted

Family

amadey

Version

4.18

C2

http://193.233.132.56

Attributes
  • install_dir

    09fd851a4f

  • install_file

    explorha.exe

  • strings_key

    443351145ece4966ded809641c77cfa8

  • url_paths

    /Pneh2sXQk0/index.php

rc4.plain

Extracted

Family

amadey

Version

4.17

C2

http://185.215.113.32

Attributes
  • install_dir

    00c07260dc

  • install_file

    explorgu.exe

  • strings_key

    461809bd97c251ba0c0c8450c7055f1d

  • url_paths

    /yandex/index.php

rc4.plain

Signatures

  • Amadey

    Amadey bot is a simple trojan bot primarily used for collecting reconnaissance information.

  • RisePro

    RisePro stealer is an infostealer distributed by PrivateLoader.

  • Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs 8 IoCs
  • Blocklisted process makes network request 4 IoCs
  • Downloads MZ/PE file
  • Checks BIOS information in registry 2 TTPs 16 IoCs

    BIOS information is often read in order to detect sandboxing environments.

  • Checks computer location settings 2 TTPs 3 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Executes dropped EXE 8 IoCs
  • Identifies Wine through registry keys 2 TTPs 8 IoCs

    Wine is a compatibility layer capable of running Windows applications, which can be used as sandboxing environment.

  • Loads dropped DLL 6 IoCs
  • Reads WinSCP keys stored on the system 2 TTPs

    Tries to access WinSCP stored sessions.

  • Reads local data of messenger clients 2 TTPs

    Infostealers often target stored data of messaging applications, which can include saved credentials and account information.

  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Adds Run key to start application 2 TTPs 2 IoCs
  • AutoIT Executable 1 IoCs

    AutoIT scripts compiled to PE executables.

  • Suspicious use of NtSetInformationThreadHideFromDebugger 7 IoCs
  • Drops file in Windows directory 2 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Enumerates system info in registry 2 TTPs 3 IoCs
  • Suspicious behavior: EnumeratesProcesses 54 IoCs
  • Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 10 IoCs
  • Suspicious use of AdjustPrivilegeToken 2 IoCs
  • Suspicious use of FindShellTrayWindow 31 IoCs
  • Suspicious use of SendNotifyMessage 28 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\39a58a4549ee1eedcee35a637d524761c70bfc878abd451c56fb9fd4b439ea71.exe
    "C:\Users\Admin\AppData\Local\Temp\39a58a4549ee1eedcee35a637d524761c70bfc878abd451c56fb9fd4b439ea71.exe"
    1⤵
    • Identifies VirtualBox via ACPI registry values (likely anti-VM)
    • Checks BIOS information in registry
    • Checks computer location settings
    • Identifies Wine through registry keys
    • Suspicious use of NtSetInformationThreadHideFromDebugger
    • Drops file in Windows directory
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of WriteProcessMemory
    PID:2352
    • C:\Users\Admin\AppData\Local\Temp\09fd851a4f\explorha.exe
      "C:\Users\Admin\AppData\Local\Temp\09fd851a4f\explorha.exe"
      2⤵
      • Identifies VirtualBox via ACPI registry values (likely anti-VM)
      • Checks BIOS information in registry
      • Checks computer location settings
      • Executes dropped EXE
      • Identifies Wine through registry keys
      • Adds Run key to start application
      • Suspicious use of NtSetInformationThreadHideFromDebugger
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of WriteProcessMemory
      PID:4864
      • C:\Users\Admin\AppData\Local\Temp\1000042001\49a0a6717b.exe
        "C:\Users\Admin\AppData\Local\Temp\1000042001\49a0a6717b.exe"
        3⤵
        • Identifies VirtualBox via ACPI registry values (likely anti-VM)
        • Checks BIOS information in registry
        • Executes dropped EXE
        • Identifies Wine through registry keys
        PID:5076
      • C:\Users\Admin\AppData\Local\Temp\09fd851a4f\explorha.exe
        "C:\Users\Admin\AppData\Local\Temp\09fd851a4f\explorha.exe"
        3⤵
          PID:4044
        • C:\Users\Admin\AppData\Local\Temp\1000044001\go.exe
          "C:\Users\Admin\AppData\Local\Temp\1000044001\go.exe"
          3⤵
          • Executes dropped EXE
          • Suspicious use of FindShellTrayWindow
          • Suspicious use of SendNotifyMessage
          • Suspicious use of WriteProcessMemory
          PID:4876
          • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
            "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument https://www.youtube.com/account
            4⤵
            • Suspicious use of WriteProcessMemory
            PID:488
            • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
              "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7fffeec946f8,0x7fffeec94708,0x7fffeec94718
              5⤵
                PID:3668
              • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=1780,8292981425697444425,8507310395414898620,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2108 /prefetch:2
                5⤵
                  PID:3592
                • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                  "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=1780,8292981425697444425,8507310395414898620,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2176 /prefetch:3
                  5⤵
                  • Suspicious behavior: EnumeratesProcesses
                  PID:1988
              • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument https://www.facebook.com/video
                4⤵
                • Suspicious use of WriteProcessMemory
                PID:4380
                • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                  "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xf8,0xfc,0x100,0xd4,0x104,0x7fffeec946f8,0x7fffeec94708,0x7fffeec94718
                  5⤵
                    PID:4400
                  • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                    "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=1908,8364104834684712436,4983527113924223293,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2064 /prefetch:2
                    5⤵
                      PID:5192
                    • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                      "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=1908,8364104834684712436,4983527113924223293,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2116 /prefetch:3
                      5⤵
                      • Suspicious behavior: EnumeratesProcesses
                      PID:5200
                  • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                    "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument https://accounts.google.com/
                    4⤵
                    • Enumerates system info in registry
                    • Suspicious behavior: EnumeratesProcesses
                    • Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
                    • Suspicious use of FindShellTrayWindow
                    • Suspicious use of SendNotifyMessage
                    • Suspicious use of WriteProcessMemory
                    PID:4992
                    • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                      "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xf8,0xfc,0x100,0xd4,0x104,0x7fffeec946f8,0x7fffeec94708,0x7fffeec94718
                      5⤵
                        PID:4612
                      • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                        "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2080,16254492669935307489,2267653810008317645,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2092 /prefetch:2
                        5⤵
                          PID:4824
                        • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                          "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2080,16254492669935307489,2267653810008317645,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2196 /prefetch:3
                          5⤵
                          • Suspicious behavior: EnumeratesProcesses
                          PID:1356
                        • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                          "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2080,16254492669935307489,2267653810008317645,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2860 /prefetch:8
                          5⤵
                            PID:2176
                          • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                            "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2080,16254492669935307489,2267653810008317645,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3324 /prefetch:1
                            5⤵
                              PID:5220
                            • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                              "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2080,16254492669935307489,2267653810008317645,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3332 /prefetch:1
                              5⤵
                                PID:5272
                              • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2080,16254492669935307489,2267653810008317645,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3992 /prefetch:1
                                5⤵
                                  PID:5620
                                • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                  "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2080,16254492669935307489,2267653810008317645,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3108 /prefetch:1
                                  5⤵
                                    PID:5872
                                  • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                    "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2080,16254492669935307489,2267653810008317645,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5004 /prefetch:1
                                    5⤵
                                      PID:5948
                                    • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                      "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2080,16254492669935307489,2267653810008317645,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5252 /prefetch:1
                                      5⤵
                                        PID:6088
                                      • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                        "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2080,16254492669935307489,2267653810008317645,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6168 /prefetch:1
                                        5⤵
                                          PID:5172
                                        • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                          "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2080,16254492669935307489,2267653810008317645,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6176 /prefetch:1
                                          5⤵
                                            PID:5192
                                          • C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe
                                            "C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2080,16254492669935307489,2267653810008317645,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5364 /prefetch:8
                                            5⤵
                                              PID:2228
                                            • C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe
                                              "C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2080,16254492669935307489,2267653810008317645,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5364 /prefetch:8
                                              5⤵
                                              • Suspicious behavior: EnumeratesProcesses
                                              PID:1868
                                            • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                              "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2080,16254492669935307489,2267653810008317645,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=14 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5756 /prefetch:1
                                              5⤵
                                                PID:3900
                                              • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                                "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2080,16254492669935307489,2267653810008317645,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=15 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5244 /prefetch:1
                                                5⤵
                                                  PID:4800
                                                • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                                  "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2080,16254492669935307489,2267653810008317645,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=5844 /prefetch:2
                                                  5⤵
                                                  • Suspicious behavior: EnumeratesProcesses
                                                  PID:5840
                                            • C:\Users\Admin\AppData\Local\Temp\1000046001\amert.exe
                                              "C:\Users\Admin\AppData\Local\Temp\1000046001\amert.exe"
                                              3⤵
                                              • Identifies VirtualBox via ACPI registry values (likely anti-VM)
                                              • Checks BIOS information in registry
                                              • Executes dropped EXE
                                              • Identifies Wine through registry keys
                                              • Suspicious use of NtSetInformationThreadHideFromDebugger
                                              • Drops file in Windows directory
                                              • Suspicious behavior: EnumeratesProcesses
                                              • Suspicious use of FindShellTrayWindow
                                              PID:1028
                                            • C:\Windows\SysWOW64\rundll32.exe
                                              "C:\Windows\System32\rundll32.exe" C:\Users\Admin\AppData\Roaming\a091ec0a6e2227\cred64.dll, Main
                                              3⤵
                                              • Loads dropped DLL
                                              PID:5960
                                              • C:\Windows\system32\rundll32.exe
                                                "C:\Windows\System32\rundll32.exe" C:\Users\Admin\AppData\Roaming\a091ec0a6e2227\cred64.dll, Main
                                                4⤵
                                                • Blocklisted process makes network request
                                                • Loads dropped DLL
                                                • Suspicious behavior: EnumeratesProcesses
                                                PID:5824
                                                • C:\Windows\system32\netsh.exe
                                                  netsh wlan show profiles
                                                  5⤵
                                                    PID:5240
                                                  • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                    powershell -Command Compress-Archive -Path 'C:\Users\Admin\AppData\Local\Temp\_Files_\' -DestinationPath 'C:\Users\Admin\AppData\Local\Temp\570491262506_Desktop.zip' -CompressionLevel Optimal
                                                    5⤵
                                                    • Suspicious behavior: EnumeratesProcesses
                                                    • Suspicious use of AdjustPrivilegeToken
                                                    PID:5776
                                              • C:\Windows\SysWOW64\rundll32.exe
                                                "C:\Windows\System32\rundll32.exe" C:\Users\Admin\AppData\Roaming\a091ec0a6e2227\clip64.dll, Main
                                                3⤵
                                                • Blocklisted process makes network request
                                                • Loads dropped DLL
                                                PID:5728
                                          • C:\Windows\System32\CompPkgSrv.exe
                                            C:\Windows\System32\CompPkgSrv.exe -Embedding
                                            1⤵
                                              PID:5184
                                            • C:\Windows\System32\CompPkgSrv.exe
                                              C:\Windows\System32\CompPkgSrv.exe -Embedding
                                              1⤵
                                                PID:5580
                                              • C:\Users\Admin\AppData\Local\Temp\09fd851a4f\explorha.exe
                                                C:\Users\Admin\AppData\Local\Temp\09fd851a4f\explorha.exe
                                                1⤵
                                                • Identifies VirtualBox via ACPI registry values (likely anti-VM)
                                                • Checks BIOS information in registry
                                                • Executes dropped EXE
                                                • Identifies Wine through registry keys
                                                • Suspicious use of NtSetInformationThreadHideFromDebugger
                                                • Suspicious behavior: EnumeratesProcesses
                                                PID:4568
                                              • C:\Users\Admin\AppData\Local\Temp\00c07260dc\explorgu.exe
                                                C:\Users\Admin\AppData\Local\Temp\00c07260dc\explorgu.exe
                                                1⤵
                                                • Identifies VirtualBox via ACPI registry values (likely anti-VM)
                                                • Checks BIOS information in registry
                                                • Checks computer location settings
                                                • Executes dropped EXE
                                                • Identifies Wine through registry keys
                                                • Suspicious use of NtSetInformationThreadHideFromDebugger
                                                • Suspicious behavior: EnumeratesProcesses
                                                PID:5656
                                                • C:\Windows\SysWOW64\rundll32.exe
                                                  "C:\Windows\System32\rundll32.exe" C:\Users\Admin\AppData\Roaming\006700e5a2ab05\cred64.dll, Main
                                                  2⤵
                                                  • Loads dropped DLL
                                                  PID:4212
                                                  • C:\Windows\system32\rundll32.exe
                                                    "C:\Windows\System32\rundll32.exe" C:\Users\Admin\AppData\Roaming\006700e5a2ab05\cred64.dll, Main
                                                    3⤵
                                                    • Blocklisted process makes network request
                                                    • Loads dropped DLL
                                                    • Suspicious behavior: EnumeratesProcesses
                                                    PID:2060
                                                    • C:\Windows\system32\netsh.exe
                                                      netsh wlan show profiles
                                                      4⤵
                                                        PID:5560
                                                      • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                        powershell -Command Compress-Archive -Path 'C:\Users\Admin\AppData\Local\Temp\_Files_\' -DestinationPath 'C:\Users\Admin\AppData\Local\Temp\570491262506_Desktop.zip' -CompressionLevel Optimal
                                                        4⤵
                                                        • Suspicious behavior: EnumeratesProcesses
                                                        • Suspicious use of AdjustPrivilegeToken
                                                        PID:5480
                                                  • C:\Windows\SysWOW64\rundll32.exe
                                                    "C:\Windows\System32\rundll32.exe" C:\Users\Admin\AppData\Roaming\006700e5a2ab05\clip64.dll, Main
                                                    2⤵
                                                    • Blocklisted process makes network request
                                                    • Loads dropped DLL
                                                    PID:2916
                                                • C:\Users\Admin\AppData\Local\Temp\09fd851a4f\explorha.exe
                                                  C:\Users\Admin\AppData\Local\Temp\09fd851a4f\explorha.exe
                                                  1⤵
                                                  • Identifies VirtualBox via ACPI registry values (likely anti-VM)
                                                  • Checks BIOS information in registry
                                                  • Executes dropped EXE
                                                  • Identifies Wine through registry keys
                                                  • Suspicious use of NtSetInformationThreadHideFromDebugger
                                                  • Suspicious behavior: EnumeratesProcesses
                                                  PID:5796
                                                • C:\Users\Admin\AppData\Local\Temp\09fd851a4f\explorha.exe
                                                  C:\Users\Admin\AppData\Local\Temp\09fd851a4f\explorha.exe
                                                  1⤵
                                                  • Identifies VirtualBox via ACPI registry values (likely anti-VM)
                                                  • Checks BIOS information in registry
                                                  • Executes dropped EXE
                                                  • Identifies Wine through registry keys
                                                  • Suspicious use of NtSetInformationThreadHideFromDebugger
                                                  • Suspicious behavior: EnumeratesProcesses
                                                  PID:5748

                                                Network

                                                MITRE ATT&CK Enterprise v15

                                                Replay Monitor

                                                Loading Replay Monitor...

                                                Downloads

                                                • C:\Users\Admin\AppData\Local\Microsoft\CLR_v4.0\UsageLogs\powershell.exe.log

                                                  Filesize

                                                  3KB

                                                  MD5

                                                  fe3aab3ae544a134b68e881b82b70169

                                                  SHA1

                                                  926e9b4e527ae1bd9b3b25726e1f59d5a34d36a6

                                                  SHA256

                                                  bda499e3f69d8fe0227e734bbb935dc5bf0050d37adf03bc41356dfcb5bcca0b

                                                  SHA512

                                                  3fbd3499d98280b6c79c67b0ee183b27692dbc31acf103b4f8ca4dcdf392afff2b3aad500037f4288581ed37e85f45c3bbb5dcde11cddf3ef0609f44b2ecb280

                                                • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad\settings.dat

                                                  Filesize

                                                  152B

                                                  MD5

                                                  fd7944a4ff1be37517983ffaf5700b11

                                                  SHA1

                                                  c4287796d78e00969af85b7e16a2d04230961240

                                                  SHA256

                                                  b54b41e7ce5600bc653aa7c88abb666976872b2d5e2d657bfc1147a0b49e9d74

                                                  SHA512

                                                  28c58a2ccf39963a8d9f67ea5b93dbccf70b0109b2c8a396a58389cdec9db1205523a95730485bcbc9d533867cbf0e7167ad370fd45740e23656d01d96ee543b

                                                • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad\settings.dat

                                                  Filesize

                                                  152B

                                                  MD5

                                                  a774512b00820b61a51258335097b2c9

                                                  SHA1

                                                  38c28d1ea3907a1af6c0443255ab610dd9285095

                                                  SHA256

                                                  01946a2d65e59b66ebc256470ff4861f32edee90a44e31bf67529add95cafef4

                                                  SHA512

                                                  ce109be65060a5e7a872707c6c2ccce3aacd577e59c59d6e23e78d03e3d502f2707713fda40a546ed332e41a56ef90297af99590a5ab02f686a58bcbf3a82da1

                                                • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index

                                                  Filesize

                                                  960B

                                                  MD5

                                                  7976225874ec1beab079bf5bc7054c42

                                                  SHA1

                                                  736632e59d2a2674dcb5745426a61c7822ffd4c1

                                                  SHA256

                                                  30c1547ab8dabecc0e619304fa2e6ec2743b2a2acb431c750f82ec5739232857

                                                  SHA512

                                                  3ce6c6629d4b983a55a7a4ef2db666694d2b70d3b69fecce8565caf831dc96df37de2a70ee484e2cc8a01f3d1cae998c236a4f52fc3eeed9e59dfd89222f5ca2

                                                • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Network Persistent State

                                                  Filesize

                                                  2KB

                                                  MD5

                                                  337ff3c94f5072a2f3840ae475862729

                                                  SHA1

                                                  eeac488f508a24c34b0ba38b73982f964a34e272

                                                  SHA256

                                                  06e86f80ce42f7f5209d1124826b1e63a0a0b381eabdbee60c74f833e29052a1

                                                  SHA512

                                                  2547d2763dc6dfdf0f7a941fce4c4ca5c3496ba067d63c64e8858f534abe8483bf86ded511f4d0b294aac22bf789deaf11722f9ef0794cb0abbcbd35ff209ce5

                                                • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Preferences

                                                  Filesize

                                                  6KB

                                                  MD5

                                                  927a10cdc467a66f1b429b1c54d72110

                                                  SHA1

                                                  350f0c0fc423fa6add2eed4b03c0550c64fa25ee

                                                  SHA256

                                                  4981d1d1ffa8d3b3517d4dba095d3321fd5f9b8b4262eea244be96be5bd2a9f8

                                                  SHA512

                                                  fde5b99f49f6d14a60ec63c385f9d925b02fd5451b3f3eca78ec57b64dc1e6eb8c003dcef81cbb7bab23f58eb48a9df205b8945ebb3925993177d26a94af3fc7

                                                • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Preferences

                                                  Filesize

                                                  7KB

                                                  MD5

                                                  fb2ddbf69ed64369e495812c108fc875

                                                  SHA1

                                                  a6f69bb0b617d754f18f572e7858165b6924e9cd

                                                  SHA256

                                                  168a2eeb37558350aa94e724c502595b5833e64c1cf2692e272a857dd2cadc39

                                                  SHA512

                                                  1b873f56c225a9fd2659cd552b0e18db95046314b2bf6f2fa771c4b69cedb84f7338f348f4bf57716e06fb505efff11b32985c26095adf8f0243c0f065c165cc

                                                • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Preferences

                                                  Filesize

                                                  7KB

                                                  MD5

                                                  ea576addb9c5c07f75aabece1a4166ca

                                                  SHA1

                                                  0b75b59e4aba3f83e59c862e547b76a519a420d3

                                                  SHA256

                                                  2387d1ad0490b22abb405dd5b544a7ab5c7b1f75478837f36442c9d36dee1e32

                                                  SHA512

                                                  1b4795f26d3a04017484cddca70b62a3dfb7a18d1ca796423fdfc61529f29bcd2ec536db7151e9bd992af1c8a81225827bab2fb0db17f41f915595fb978d61cb

                                                • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\TransportSecurity

                                                  Filesize

                                                  707B

                                                  MD5

                                                  19c2bdcb7459640ad5f218a4d5d71cbc

                                                  SHA1

                                                  c5069d71b3de360b0084c08bd2db45262f69fa91

                                                  SHA256

                                                  af470cb4074508df1976645de0e28f15a96c1cc68c0ff133d67516701bd782bf

                                                  SHA512

                                                  8be3153ef3928b3fe52d1da2666b98135dcb561ae66f8385d610c6a709c1613e9140c97620981b4b1943d0abd28cce2f35200eed5d87d4a6ca159fcbdf36e667

                                                • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\TransportSecurity

                                                  Filesize

                                                  707B

                                                  MD5

                                                  c632493ce810d5bbc578f563c9d8b38b

                                                  SHA1

                                                  0e6e10365893ce27e556f16632508d2b1f61124c

                                                  SHA256

                                                  6855a704c5d8495bdd1c81e409216f6cf68d5600b13af1f42f94fb1446b41c55

                                                  SHA512

                                                  1234359c3c8ccf7d44344fd48dd8b20542986d46139b0492a020d7b3a73c2776c53266a3c95266a13cd6ee3aba8a1409165360eabb47c7631884f55daca8269b

                                                • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\TransportSecurity

                                                  Filesize

                                                  707B

                                                  MD5

                                                  57ec44bd33fb5f8919757d5c964836d7

                                                  SHA1

                                                  12cae6fedeef144788ccec5c518234e54290b90f

                                                  SHA256

                                                  b6c7e5d5ee4f69a4318333c94c8d381440804b91ca53e11c888e8c75ce54f15f

                                                  SHA512

                                                  47057a2da01e7c793543816195dd497b2c1af68b7fa5d32d1d1df2007e8af7615b715c2d4594d25cf3fd73ad3821858009d86e443296d0fcac4297a21448cb2b

                                                • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\TransportSecurity

                                                  Filesize

                                                  707B

                                                  MD5

                                                  1bd1548155b46b310353cf0a7ecc6768

                                                  SHA1

                                                  a7963b2b302b6e73c8f171b9968d315ea8d98100

                                                  SHA256

                                                  1380a26c7ca30c8c0417c5c3ebcffcb08cb0f74a04615936d157d0d6acf50585

                                                  SHA512

                                                  e4fe82e497cdf9055c4760dba0136aa49cd1c12159b06a1cd3994495bc1642a22bcb01ed6dae96cb50beeb0c6aea78aea48f770f4d3bd74bf3e549f8a49566e0

                                                • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\TransportSecurity~RFe57fb67.TMP

                                                  Filesize

                                                  707B

                                                  MD5

                                                  e717f692fc244e88d19303a8d259f035

                                                  SHA1

                                                  8fa35d0167b95c8d196565f993078d5dd4c8839e

                                                  SHA256

                                                  5e34137351a2702f5b1a9f9b0cda43df0f2db5b4e293d05b33906cc53a337c75

                                                  SHA512

                                                  7b5d49d3919cf56ad2176e61fd9405d5cc3b104c1cf07303ab9794e1d26aad24b0cfef5f2f8e73f5905717eb54050195c347c7fc31302f347a54a317234ec64e

                                                • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\data_reduction_proxy_leveldb\CURRENT

                                                  Filesize

                                                  16B

                                                  MD5

                                                  6752a1d65b201c13b62ea44016eb221f

                                                  SHA1

                                                  58ecf154d01a62233ed7fb494ace3c3d4ffce08b

                                                  SHA256

                                                  0861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd

                                                  SHA512

                                                  9cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389

                                                • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Local State

                                                  Filesize

                                                  8KB

                                                  MD5

                                                  5fd28378c3099782f9e2f7bbd7c29b2c

                                                  SHA1

                                                  0c7c221e6678270efb7f0a607911ad0b2a92cee1

                                                  SHA256

                                                  734693bde471518412c028f4109d31c3ad13015b6d314d39e14f7f01299e8b06

                                                  SHA512

                                                  371aa038cd3dcd5db4872ca4534dbaf893260c529662715a9350c9d0aa031108251709522f52fefb359579526b99ea303e0e5609644a08edfa9631140c31b4c8

                                                • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Local State

                                                  Filesize

                                                  8KB

                                                  MD5

                                                  5a2bd9d8c5dad62b2705608e54c10f08

                                                  SHA1

                                                  b967fa2578549470d1023f83b3e3b7cbe795face

                                                  SHA256

                                                  06ad8e86679e8739cfd4c0d62fd1446eb523dd3d9bb00abd1ac634d8431033b4

                                                  SHA512

                                                  9053f37aeba5515523f814e6a4d929733d0e607c4025e0c1825ea63942f7da033640a2862541704639948cf545e6c6e62677b10f7c248081197edfd76afe7837

                                                • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Local State

                                                  Filesize

                                                  11KB

                                                  MD5

                                                  72b6062ec1fd01bc4704526e1c05d333

                                                  SHA1

                                                  636e877a9aa038d43fee0de9107821fe79a2f072

                                                  SHA256

                                                  8a12f638b0aa6b213f308710bd3014c3c117c6d06e12822d442c66279cfe9855

                                                  SHA512

                                                  71318ec6294c050ad23c419c54ce4511d7050ebf914d0a87e2cbd65f0322f659af707776156493a91eb6cab062e847f0de8ca4a428c94804017a46b8cc243bd4

                                                • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Local State

                                                  Filesize

                                                  11KB

                                                  MD5

                                                  1e125fa38d0b5d78ae558c842997e643

                                                  SHA1

                                                  7b8deabeedbadf9e81f5bd467fb5d5be851791f2

                                                  SHA256

                                                  5a159074c2db6accc334aa0445ca0751697f068afcd6e4e22d19e1c6ed915e77

                                                  SHA512

                                                  47abf6a805e3b1519a18314a9a8df1832ffcbc7a82bb8ed7ea4e4fcd5eaee761ca255a71916f2cf36127738aa40bc71b1400a0314dc7c26efeb1bb452e592a6c

                                                • C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive

                                                  Filesize

                                                  1KB

                                                  MD5

                                                  9b8cd5b67f091304dcc6dc753f884a85

                                                  SHA1

                                                  247182a63593f5d2113df5ecea863d28ec5a576d

                                                  SHA256

                                                  dac3eb5463b8b7ea45f7d2f44768c9e911d1b845f5ac88cbf7d4c88b7163baa5

                                                  SHA512

                                                  2d1cdd4d59f6a25819b7e94bcad9d532e78e477ca9fe1a9bcf37768514eb94be45c4becbc045246f7e0cd7c36491ee332774faabfec1f17c1e778d30fefbcb4c

                                                • C:\Users\Admin\AppData\Local\Temp\09fd851a4f\explorha.exe

                                                  Filesize

                                                  1.8MB

                                                  MD5

                                                  09ad37ec1461fe538e2681aa082c111d

                                                  SHA1

                                                  8e7982474abbf03ac03553a243eea265217a34ed

                                                  SHA256

                                                  39a58a4549ee1eedcee35a637d524761c70bfc878abd451c56fb9fd4b439ea71

                                                  SHA512

                                                  8472b87fa682309c9d2d23bc48680b9d26b90c96613b41d450ac3345e3895b570379b9aec3a0090c1548950e25611bc8450fdf8655d9ac7e3b7f8ccafddfd1f7

                                                • C:\Users\Admin\AppData\Local\Temp\1000042001\49a0a6717b.exe

                                                  Filesize

                                                  3.0MB

                                                  MD5

                                                  fcea2df8b17ce44c6e4851655053764a

                                                  SHA1

                                                  f17634e5da3d62f26194354b22b255f687b789e3

                                                  SHA256

                                                  b94d11c660e4e7941f80199623b0c98c64d760edfa5c6b9dcee0c410d0f0f104

                                                  SHA512

                                                  be82ace076bf48d7fe3f5d510e7611958831e59a7af08fd74704a5c8234365a339ef2d13db1c0f0a8e4025574e269969ec2c6a36244b994818d6263a98bdbc3c

                                                • C:\Users\Admin\AppData\Local\Temp\1000044001\go.exe

                                                  Filesize

                                                  894KB

                                                  MD5

                                                  2f8912af892c160c1c24c9f38a60c1ab

                                                  SHA1

                                                  d2deae508e262444a8f15c29ebcc7ebbe08a3fdb

                                                  SHA256

                                                  59ff8e0aa665fbbf749c7548906a655cb1869bb58a3b7546efa5b416d19e6308

                                                  SHA512

                                                  0395383bde98d358b0a7f2224f903dff026ce0c6d90feb49ac0e6993ef692143b0eb25da84d9cdc9e7b373a7b75a6dbaef14746eda1bff165d59f07ca51a16bb

                                                • C:\Users\Admin\AppData\Local\Temp\1000046001\amert.exe

                                                  Filesize

                                                  1.9MB

                                                  MD5

                                                  80698cc4fa2be2ba9bad56a77fe1fd0d

                                                  SHA1

                                                  72780e2913fe6fea376942e9b993c5d6e79b0d15

                                                  SHA256

                                                  301e30d68915da5d224ec68c9c8b01dd79d910f45060c3da9823d703d39c4958

                                                  SHA512

                                                  5e07ebb91218832b70645bacbc77bd0d20e12f0844de7fde776b01dd46f26c0d7c32c842ff12ab446a1867b0c3ead9bf8803eaeacb7aaf706ee3195688c9782b

                                                • C:\Users\Admin\AppData\Local\Temp\__PSScriptPolicyTest_h5leq0ve.k3g.ps1

                                                  Filesize

                                                  60B

                                                  MD5

                                                  d17fe0a3f47be24a6453e9ef58c94641

                                                  SHA1

                                                  6ab83620379fc69f80c0242105ddffd7d98d5d9d

                                                  SHA256

                                                  96ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7

                                                  SHA512

                                                  5b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82

                                                • C:\Users\Admin\AppData\Roaming\006700e5a2ab05\clip64.dll

                                                  Filesize

                                                  109KB

                                                  MD5

                                                  2afdbe3b99a4736083066a13e4b5d11a

                                                  SHA1

                                                  4d4856cf02b3123ac16e63d4a448cdbcb1633546

                                                  SHA256

                                                  8d31b39170909595b518b1a03e9ec950540fabd545ed14817cac5c84b91599ee

                                                  SHA512

                                                  d89b3c46854153e60e3fa825b394344eee33936d7dbf186af9d95c9adae54428609e3bf21a18d38fce3d96f3e0b8e4e0ed25cb5004fbe288de3aef3a85b1d93f

                                                • C:\Users\Admin\AppData\Roaming\006700e5a2ab05\cred64.dll

                                                  Filesize

                                                  1.2MB

                                                  MD5

                                                  92fbdfccf6a63acef2743631d16652a7

                                                  SHA1

                                                  971968b1378dd89d59d7f84bf92f16fc68664506

                                                  SHA256

                                                  b4588feacc183cd5a089f9bb950827b75df04bd5a6e67c95ff258e4a34aa0d72

                                                  SHA512

                                                  b8ea216d4a59d8858fd4128abb555f8dcf3acca9138e663b488f09dc5200db6dc11ecc235a355e801145bbbb44d7beac6147949d75d78b32fe9cfd2fa200d117

                                                • C:\Users\Admin\AppData\Roaming\a091ec0a6e2227\clip64.dll

                                                  Filesize

                                                  109KB

                                                  MD5

                                                  726cd06231883a159ec1ce28dd538699

                                                  SHA1

                                                  404897e6a133d255ad5a9c26ac6414d7134285a2

                                                  SHA256

                                                  12fef2d5995d671ec0e91bdbdc91e2b0d3c90ed3a8b2b13ddaa8ad64727dcd46

                                                  SHA512

                                                  9ea82e7cb6c6a58446bd5033855947c3e2d475d2910f2b941235e0b96aa08eec822d2dd17cc86b2d3fce930f78b799291992408e309a6c63e3011266810ea83e

                                                • C:\Users\Admin\AppData\Roaming\a091ec0a6e2227\cred64.dll

                                                  Filesize

                                                  1.2MB

                                                  MD5

                                                  15a42d3e4579da615a384c717ab2109b

                                                  SHA1

                                                  22aeedeb2307b1370cdab70d6a6b6d2c13ad2301

                                                  SHA256

                                                  3c97bb410e49b11af8116feb7240b7101e1967cae7538418c45c3d2e072e8103

                                                  SHA512

                                                  1eb7f126dccc88a2479e3818c36120f5af3caa0d632b9ea803485ee6531d6e2a1fd0805b1c4364983d280df23ea5ca3ad4a5fca558ac436efae36af9b795c444

                                                • \??\pipe\LOCAL\crashpad_4992_GPOVMLJXDMHAYHHL

                                                  MD5

                                                  d41d8cd98f00b204e9800998ecf8427e

                                                  SHA1

                                                  da39a3ee5e6b4b0d3255bfef95601890afd80709

                                                  SHA256

                                                  e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855

                                                  SHA512

                                                  cf83e1357eefb8bdf1542850d66d8007d620e4050b5715dc83f4a921d36ce9ce47d0d13c5d85f2b0ff8318d2877eec2f63b931bd47417a81a538327af927da3e

                                                • memory/1028-148-0x00000000004E0000-0x00000000009BA000-memory.dmp

                                                  Filesize

                                                  4.9MB

                                                • memory/1028-157-0x0000000004EC0000-0x0000000004EC1000-memory.dmp

                                                  Filesize

                                                  4KB

                                                • memory/1028-128-0x00000000004E0000-0x00000000009BA000-memory.dmp

                                                  Filesize

                                                  4.9MB

                                                • memory/1028-214-0x00000000004E0000-0x00000000009BA000-memory.dmp

                                                  Filesize

                                                  4.9MB

                                                • memory/1028-190-0x0000000004F30000-0x0000000004F31000-memory.dmp

                                                  Filesize

                                                  4KB

                                                • memory/1028-195-0x0000000004F20000-0x0000000004F21000-memory.dmp

                                                  Filesize

                                                  4KB

                                                • memory/1028-149-0x0000000004ED0000-0x0000000004ED1000-memory.dmp

                                                  Filesize

                                                  4KB

                                                • memory/1028-166-0x0000000004EB0000-0x0000000004EB1000-memory.dmp

                                                  Filesize

                                                  4KB

                                                • memory/1028-158-0x0000000004F00000-0x0000000004F01000-memory.dmp

                                                  Filesize

                                                  4KB

                                                • memory/1028-165-0x0000000004EA0000-0x0000000004EA1000-memory.dmp

                                                  Filesize

                                                  4KB

                                                • memory/1028-150-0x0000000004EE0000-0x0000000004EE1000-memory.dmp

                                                  Filesize

                                                  4KB

                                                • memory/2352-3-0x0000000004EF0000-0x0000000004EF1000-memory.dmp

                                                  Filesize

                                                  4KB

                                                • memory/2352-2-0x0000000000870000-0x0000000000D21000-memory.dmp

                                                  Filesize

                                                  4.7MB

                                                • memory/2352-22-0x0000000000870000-0x0000000000D21000-memory.dmp

                                                  Filesize

                                                  4.7MB

                                                • memory/2352-0-0x0000000000870000-0x0000000000D21000-memory.dmp

                                                  Filesize

                                                  4.7MB

                                                • memory/2352-1-0x00000000774D4000-0x00000000774D6000-memory.dmp

                                                  Filesize

                                                  8KB

                                                • memory/2352-10-0x0000000004F40000-0x0000000004F41000-memory.dmp

                                                  Filesize

                                                  4KB

                                                • memory/2352-9-0x0000000004F50000-0x0000000004F51000-memory.dmp

                                                  Filesize

                                                  4KB

                                                • memory/2352-8-0x0000000004ED0000-0x0000000004ED1000-memory.dmp

                                                  Filesize

                                                  4KB

                                                • memory/2352-7-0x0000000004EC0000-0x0000000004EC1000-memory.dmp

                                                  Filesize

                                                  4KB

                                                • memory/2352-6-0x0000000004F20000-0x0000000004F21000-memory.dmp

                                                  Filesize

                                                  4KB

                                                • memory/2352-5-0x0000000004EE0000-0x0000000004EE1000-memory.dmp

                                                  Filesize

                                                  4KB

                                                • memory/2352-4-0x0000000004F00000-0x0000000004F01000-memory.dmp

                                                  Filesize

                                                  4KB

                                                • memory/4568-329-0x00000000007B0000-0x0000000000C61000-memory.dmp

                                                  Filesize

                                                  4.7MB

                                                • memory/4568-311-0x00000000007B0000-0x0000000000C61000-memory.dmp

                                                  Filesize

                                                  4.7MB

                                                • memory/4568-312-0x00000000007B0000-0x0000000000C61000-memory.dmp

                                                  Filesize

                                                  4.7MB

                                                • memory/4568-314-0x00000000054E0000-0x00000000054E1000-memory.dmp

                                                  Filesize

                                                  4KB

                                                • memory/4568-313-0x00000000054D0000-0x00000000054D1000-memory.dmp

                                                  Filesize

                                                  4KB

                                                • memory/4568-319-0x0000000005500000-0x0000000005501000-memory.dmp

                                                  Filesize

                                                  4KB

                                                • memory/4568-318-0x00000000054B0000-0x00000000054B1000-memory.dmp

                                                  Filesize

                                                  4KB

                                                • memory/4568-317-0x00000000054A0000-0x00000000054A1000-memory.dmp

                                                  Filesize

                                                  4KB

                                                • memory/4568-316-0x0000000005510000-0x0000000005511000-memory.dmp

                                                  Filesize

                                                  4KB

                                                • memory/4568-315-0x00000000054C0000-0x00000000054C1000-memory.dmp

                                                  Filesize

                                                  4KB

                                                • memory/4864-533-0x00000000007B0000-0x0000000000C61000-memory.dmp

                                                  Filesize

                                                  4.7MB

                                                • memory/4864-492-0x00000000007B0000-0x0000000000C61000-memory.dmp

                                                  Filesize

                                                  4.7MB

                                                • memory/4864-580-0x00000000007B0000-0x0000000000C61000-memory.dmp

                                                  Filesize

                                                  4.7MB

                                                • memory/4864-577-0x00000000007B0000-0x0000000000C61000-memory.dmp

                                                  Filesize

                                                  4.7MB

                                                • memory/4864-574-0x00000000007B0000-0x0000000000C61000-memory.dmp

                                                  Filesize

                                                  4.7MB

                                                • memory/4864-583-0x00000000007B0000-0x0000000000C61000-memory.dmp

                                                  Filesize

                                                  4.7MB

                                                • memory/4864-539-0x00000000007B0000-0x0000000000C61000-memory.dmp

                                                  Filesize

                                                  4.7MB

                                                • memory/4864-27-0x0000000005350000-0x0000000005351000-memory.dmp

                                                  Filesize

                                                  4KB

                                                • memory/4864-28-0x0000000005390000-0x0000000005391000-memory.dmp

                                                  Filesize

                                                  4KB

                                                • memory/4864-130-0x00000000007B0000-0x0000000000C61000-memory.dmp

                                                  Filesize

                                                  4.7MB

                                                • memory/4864-520-0x00000000007B0000-0x0000000000C61000-memory.dmp

                                                  Filesize

                                                  4.7MB

                                                • memory/4864-23-0x00000000007B0000-0x0000000000C61000-memory.dmp

                                                  Filesize

                                                  4.7MB

                                                • memory/4864-294-0x00000000007B0000-0x0000000000C61000-memory.dmp

                                                  Filesize

                                                  4.7MB

                                                • memory/4864-31-0x00000000053B0000-0x00000000053B1000-memory.dmp

                                                  Filesize

                                                  4KB

                                                • memory/4864-366-0x00000000007B0000-0x0000000000C61000-memory.dmp

                                                  Filesize

                                                  4.7MB

                                                • memory/4864-26-0x0000000005370000-0x0000000005371000-memory.dmp

                                                  Filesize

                                                  4KB

                                                • memory/4864-29-0x0000000005330000-0x0000000005331000-memory.dmp

                                                  Filesize

                                                  4KB

                                                • memory/4864-286-0x00000000007B0000-0x0000000000C61000-memory.dmp

                                                  Filesize

                                                  4.7MB

                                                • memory/4864-588-0x00000000007B0000-0x0000000000C61000-memory.dmp

                                                  Filesize

                                                  4.7MB

                                                • memory/4864-30-0x0000000005340000-0x0000000005341000-memory.dmp

                                                  Filesize

                                                  4KB

                                                • memory/4864-25-0x0000000005360000-0x0000000005361000-memory.dmp

                                                  Filesize

                                                  4KB

                                                • memory/4864-600-0x00000000007B0000-0x0000000000C61000-memory.dmp

                                                  Filesize

                                                  4.7MB

                                                • memory/4864-441-0x00000000007B0000-0x0000000000C61000-memory.dmp

                                                  Filesize

                                                  4.7MB

                                                • memory/4864-24-0x00000000007B0000-0x0000000000C61000-memory.dmp

                                                  Filesize

                                                  4.7MB

                                                • memory/4864-181-0x00000000007B0000-0x0000000000C61000-memory.dmp

                                                  Filesize

                                                  4.7MB

                                                • memory/5076-521-0x0000000000440000-0x00000000007F6000-memory.dmp

                                                  Filesize

                                                  3.7MB

                                                • memory/5076-581-0x0000000000440000-0x00000000007F6000-memory.dmp

                                                  Filesize

                                                  3.7MB

                                                • memory/5076-430-0x0000000000440000-0x00000000007F6000-memory.dmp

                                                  Filesize

                                                  3.7MB

                                                • memory/5076-52-0x0000000000440000-0x00000000007F6000-memory.dmp

                                                  Filesize

                                                  3.7MB

                                                • memory/5076-598-0x0000000000440000-0x00000000007F6000-memory.dmp

                                                  Filesize

                                                  3.7MB

                                                • memory/5076-50-0x0000000000440000-0x00000000007F6000-memory.dmp

                                                  Filesize

                                                  3.7MB

                                                • memory/5076-279-0x0000000000440000-0x00000000007F6000-memory.dmp

                                                  Filesize

                                                  3.7MB

                                                • memory/5076-584-0x0000000000440000-0x00000000007F6000-memory.dmp

                                                  Filesize

                                                  3.7MB

                                                • memory/5076-310-0x0000000000440000-0x00000000007F6000-memory.dmp

                                                  Filesize

                                                  3.7MB

                                                • memory/5076-509-0x0000000000440000-0x00000000007F6000-memory.dmp

                                                  Filesize

                                                  3.7MB

                                                • memory/5076-537-0x0000000000440000-0x00000000007F6000-memory.dmp

                                                  Filesize

                                                  3.7MB

                                                • memory/5076-332-0x0000000000440000-0x00000000007F6000-memory.dmp

                                                  Filesize

                                                  3.7MB

                                                • memory/5076-490-0x0000000000440000-0x00000000007F6000-memory.dmp

                                                  Filesize

                                                  3.7MB

                                                • memory/5076-578-0x0000000000440000-0x00000000007F6000-memory.dmp

                                                  Filesize

                                                  3.7MB

                                                • memory/5076-575-0x0000000000440000-0x00000000007F6000-memory.dmp

                                                  Filesize

                                                  3.7MB

                                                • memory/5076-572-0x0000000000440000-0x00000000007F6000-memory.dmp

                                                  Filesize

                                                  3.7MB

                                                • memory/5480-461-0x00007FFFE9D80000-0x00007FFFEA841000-memory.dmp

                                                  Filesize

                                                  10.8MB

                                                • memory/5656-491-0x0000000000510000-0x00000000009EA000-memory.dmp

                                                  Filesize

                                                  4.9MB

                                                • memory/5656-365-0x00000000050E0000-0x00000000050E1000-memory.dmp

                                                  Filesize

                                                  4KB

                                                • memory/5656-356-0x00000000050C0000-0x00000000050C1000-memory.dmp

                                                  Filesize

                                                  4KB

                                                • memory/5656-355-0x0000000005070000-0x0000000005071000-memory.dmp

                                                  Filesize

                                                  4KB

                                                • memory/5656-522-0x0000000000510000-0x00000000009EA000-memory.dmp

                                                  Filesize

                                                  4.9MB

                                                • memory/5656-353-0x00000000050D0000-0x00000000050D1000-memory.dmp

                                                  Filesize

                                                  4KB

                                                • memory/5656-352-0x0000000005080000-0x0000000005081000-memory.dmp

                                                  Filesize

                                                  4KB

                                                • memory/5656-354-0x0000000005060000-0x0000000005061000-memory.dmp

                                                  Filesize

                                                  4KB

                                                • memory/5656-538-0x0000000000510000-0x00000000009EA000-memory.dmp

                                                  Filesize

                                                  4.9MB

                                                • memory/5656-343-0x00000000050A0000-0x00000000050A1000-memory.dmp

                                                  Filesize

                                                  4KB

                                                • memory/5656-336-0x0000000005090000-0x0000000005091000-memory.dmp

                                                  Filesize

                                                  4KB

                                                • memory/5656-431-0x0000000000510000-0x00000000009EA000-memory.dmp

                                                  Filesize

                                                  4.9MB

                                                • memory/5656-364-0x00000000050F0000-0x00000000050F1000-memory.dmp

                                                  Filesize

                                                  4KB

                                                • memory/5656-573-0x0000000000510000-0x00000000009EA000-memory.dmp

                                                  Filesize

                                                  4.9MB

                                                • memory/5656-334-0x0000000000510000-0x00000000009EA000-memory.dmp

                                                  Filesize

                                                  4.9MB

                                                • memory/5656-510-0x0000000000510000-0x00000000009EA000-memory.dmp

                                                  Filesize

                                                  4.9MB

                                                • memory/5656-576-0x0000000000510000-0x00000000009EA000-memory.dmp

                                                  Filesize

                                                  4.9MB

                                                • memory/5656-333-0x0000000000510000-0x00000000009EA000-memory.dmp

                                                  Filesize

                                                  4.9MB

                                                • memory/5656-599-0x0000000000510000-0x00000000009EA000-memory.dmp

                                                  Filesize

                                                  4.9MB

                                                • memory/5656-579-0x0000000000510000-0x00000000009EA000-memory.dmp

                                                  Filesize

                                                  4.9MB

                                                • memory/5656-585-0x0000000000510000-0x00000000009EA000-memory.dmp

                                                  Filesize

                                                  4.9MB

                                                • memory/5656-582-0x0000000000510000-0x00000000009EA000-memory.dmp

                                                  Filesize

                                                  4.9MB

                                                • memory/5748-611-0x00000000007B0000-0x0000000000C61000-memory.dmp

                                                  Filesize

                                                  4.7MB

                                                • memory/5776-399-0x00007FFFE9D80000-0x00007FFFEA841000-memory.dmp

                                                  Filesize

                                                  10.8MB

                                                • memory/5776-400-0x000001FA571B0000-0x000001FA571C0000-memory.dmp

                                                  Filesize

                                                  64KB

                                                • memory/5776-401-0x000001FA571B0000-0x000001FA571C0000-memory.dmp

                                                  Filesize

                                                  64KB

                                                • memory/5776-387-0x000001FA57180000-0x000001FA571A2000-memory.dmp

                                                  Filesize

                                                  136KB

                                                • memory/5776-402-0x000001FA571B0000-0x000001FA571C0000-memory.dmp

                                                  Filesize

                                                  64KB

                                                • memory/5776-408-0x000001FA57690000-0x000001FA576A2000-memory.dmp

                                                  Filesize

                                                  72KB

                                                • memory/5776-418-0x000001FA57680000-0x000001FA5768A000-memory.dmp

                                                  Filesize

                                                  40KB

                                                • memory/5776-425-0x00007FFFE9D80000-0x00007FFFEA841000-memory.dmp

                                                  Filesize

                                                  10.8MB

                                                • memory/5796-571-0x00000000007B0000-0x0000000000C61000-memory.dmp

                                                  Filesize

                                                  4.7MB