Analysis

  • max time kernel
    148s
  • max time network
    146s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240226-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system
  • submitted
    01-04-2024 20:05

General

  • Target

    16b6e8aa549422d4d45d12498c0661535f5ee54557a48b10f5bec6d1430bcd19.exe

  • Size

    1.7MB

  • MD5

    1e46d2cdcab74ee76e642b9b5adcf525

  • SHA1

    7f4a586b5f4bfbe37e5944f4301936ca32daf132

  • SHA256

    16b6e8aa549422d4d45d12498c0661535f5ee54557a48b10f5bec6d1430bcd19

  • SHA512

    5407955a7884682fd79f393c5c52222f915682e2e414e404ea86e11df6710966299192dad0f035e00a018f564847c4c18c7af35d51a9eb4870801865f8bb0e8e

  • SSDEEP

    24576:sDBmR/9CAemPxRmBYQKbM/tmaExVYmBEF9b5nF9EYtfUDIxpoIqT2sHlIvl2zXkU:R3emPqYvYlvIVJ6RF99tfbiTTHdAlm

Malware Config

Extracted

Family

amadey

Version

4.18

C2

http://193.233.132.56

Attributes
  • install_dir

    09fd851a4f

  • install_file

    explorha.exe

  • strings_key

    443351145ece4966ded809641c77cfa8

  • url_paths

    /Pneh2sXQk0/index.php

rc4.plain

Extracted

Family

amadey

Version

4.17

C2

http://185.215.113.32

Attributes
  • install_dir

    00c07260dc

  • install_file

    explorgu.exe

  • strings_key

    461809bd97c251ba0c0c8450c7055f1d

  • url_paths

    /yandex/index.php

rc4.plain

Signatures

  • Amadey

    Amadey bot is a simple trojan bot primarily used for collecting reconnaissance information.

  • RisePro

    RisePro stealer is an infostealer distributed by PrivateLoader.

  • Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs 9 IoCs
  • Blocklisted process makes network request 4 IoCs
  • Downloads MZ/PE file
  • Checks BIOS information in registry 2 TTPs 18 IoCs

    BIOS information is often read in order to detect sandboxing environments.

  • Checks computer location settings 2 TTPs 3 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Executes dropped EXE 9 IoCs
  • Identifies Wine through registry keys 2 TTPs 9 IoCs

    Wine is a compatibility layer capable of running Windows applications, which can be used as sandboxing environment.

  • Loads dropped DLL 6 IoCs
  • Reads WinSCP keys stored on the system 2 TTPs

    Tries to access WinSCP stored sessions.

  • Reads local data of messenger clients 2 TTPs

    Infostealers often target stored data of messaging applications, which can include saved credentials and account information.

  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Adds Run key to start application 2 TTPs 2 IoCs
  • AutoIT Executable 1 IoCs

    AutoIT scripts compiled to PE executables.

  • Suspicious use of NtSetInformationThreadHideFromDebugger 7 IoCs
  • Suspicious use of SetThreadContext 1 IoCs
  • Drops file in Windows directory 2 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Enumerates system info in registry 2 TTPs 3 IoCs
  • Suspicious behavior: EnumeratesProcesses 54 IoCs
  • Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 10 IoCs
  • Suspicious use of AdjustPrivilegeToken 2 IoCs
  • Suspicious use of FindShellTrayWindow 30 IoCs
  • Suspicious use of SendNotifyMessage 27 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\16b6e8aa549422d4d45d12498c0661535f5ee54557a48b10f5bec6d1430bcd19.exe
    "C:\Users\Admin\AppData\Local\Temp\16b6e8aa549422d4d45d12498c0661535f5ee54557a48b10f5bec6d1430bcd19.exe"
    1⤵
    • Identifies VirtualBox via ACPI registry values (likely anti-VM)
    • Checks BIOS information in registry
    • Checks computer location settings
    • Identifies Wine through registry keys
    • Suspicious use of NtSetInformationThreadHideFromDebugger
    • Drops file in Windows directory
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of WriteProcessMemory
    PID:4580
    • C:\Users\Admin\AppData\Local\Temp\09fd851a4f\explorha.exe
      "C:\Users\Admin\AppData\Local\Temp\09fd851a4f\explorha.exe"
      2⤵
      • Identifies VirtualBox via ACPI registry values (likely anti-VM)
      • Checks BIOS information in registry
      • Checks computer location settings
      • Executes dropped EXE
      • Identifies Wine through registry keys
      • Adds Run key to start application
      • Suspicious use of NtSetInformationThreadHideFromDebugger
      • Suspicious use of SetThreadContext
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of WriteProcessMemory
      PID:4664
      • C:\Users\Admin\AppData\Local\Temp\1000042001\507b1bc1a1.exe
        "C:\Users\Admin\AppData\Local\Temp\1000042001\507b1bc1a1.exe"
        3⤵
        • Identifies VirtualBox via ACPI registry values (likely anti-VM)
        • Checks BIOS information in registry
        • Executes dropped EXE
        • Identifies Wine through registry keys
        PID:1548
      • C:\Users\Admin\AppData\Local\Temp\09fd851a4f\explorha.exe
        "C:\Users\Admin\AppData\Local\Temp\09fd851a4f\explorha.exe"
        3⤵
        • Identifies VirtualBox via ACPI registry values (likely anti-VM)
        • Checks BIOS information in registry
        • Executes dropped EXE
        • Identifies Wine through registry keys
        PID:1224
      • C:\Users\Admin\AppData\Local\Temp\1000044001\go.exe
        "C:\Users\Admin\AppData\Local\Temp\1000044001\go.exe"
        3⤵
        • Executes dropped EXE
        • Suspicious use of FindShellTrayWindow
        • Suspicious use of SendNotifyMessage
        • Suspicious use of WriteProcessMemory
        PID:4944
        • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
          "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument https://www.youtube.com/account
          4⤵
          • Suspicious use of WriteProcessMemory
          PID:316
          • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
            "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffabedb46f8,0x7ffabedb4708,0x7ffabedb4718
            5⤵
              PID:2268
            • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
              "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2124,5721726488517650685,9026032000078394029,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2136 /prefetch:2
              5⤵
                PID:4140
              • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2124,5721726488517650685,9026032000078394029,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2188 /prefetch:3
                5⤵
                • Suspicious behavior: EnumeratesProcesses
                PID:4000
            • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
              "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument https://www.facebook.com/video
              4⤵
              • Enumerates system info in registry
              • Suspicious behavior: EnumeratesProcesses
              • Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
              • Suspicious use of FindShellTrayWindow
              • Suspicious use of SendNotifyMessage
              • Suspicious use of WriteProcessMemory
              PID:4740
              • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffabedb46f8,0x7ffabedb4708,0x7ffabedb4718
                5⤵
                  PID:2588
                • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                  "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2056,4129609834921527193,10570228413910129844,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2084 /prefetch:2
                  5⤵
                    PID:2148
                  • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                    "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2056,4129609834921527193,10570228413910129844,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2328 /prefetch:3
                    5⤵
                    • Suspicious behavior: EnumeratesProcesses
                    PID:4956
                  • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                    "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2056,4129609834921527193,10570228413910129844,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2680 /prefetch:8
                    5⤵
                      PID:4720
                    • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                      "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2056,4129609834921527193,10570228413910129844,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3444 /prefetch:1
                      5⤵
                        PID:5388
                      • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                        "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2056,4129609834921527193,10570228413910129844,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3452 /prefetch:1
                        5⤵
                          PID:5400
                        • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                          "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2056,4129609834921527193,10570228413910129844,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4140 /prefetch:1
                          5⤵
                            PID:5820
                          • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                            "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2056,4129609834921527193,10570228413910129844,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4532 /prefetch:1
                            5⤵
                              PID:6024
                            • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                              "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2056,4129609834921527193,10570228413910129844,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5300 /prefetch:1
                              5⤵
                                PID:5316
                              • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2056,4129609834921527193,10570228413910129844,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5476 /prefetch:1
                                5⤵
                                  PID:5068
                                • C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe
                                  "C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2056,4129609834921527193,10570228413910129844,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=6204 /prefetch:8
                                  5⤵
                                    PID:6360
                                  • C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe
                                    "C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2056,4129609834921527193,10570228413910129844,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=6204 /prefetch:8
                                    5⤵
                                    • Suspicious behavior: EnumeratesProcesses
                                    PID:6344
                                  • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                    "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2056,4129609834921527193,10570228413910129844,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5696 /prefetch:1
                                    5⤵
                                      PID:6592
                                    • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                      "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2056,4129609834921527193,10570228413910129844,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=13 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5856 /prefetch:1
                                      5⤵
                                        PID:6608
                                      • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                        "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2056,4129609834921527193,10570228413910129844,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=14 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4012 /prefetch:1
                                        5⤵
                                          PID:6528
                                        • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                          "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2056,4129609834921527193,10570228413910129844,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=15 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5664 /prefetch:1
                                          5⤵
                                            PID:5732
                                          • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                            "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2056,4129609834921527193,10570228413910129844,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=4436 /prefetch:2
                                            5⤵
                                            • Suspicious behavior: EnumeratesProcesses
                                            PID:3020
                                        • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                          "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument https://accounts.google.com/
                                          4⤵
                                          • Suspicious use of WriteProcessMemory
                                          PID:1052
                                          • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                            "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffabedb46f8,0x7ffabedb4708,0x7ffabedb4718
                                            5⤵
                                              PID:3000
                                            • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                              "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2076,16051202374073928567,18207895064052813489,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2088 /prefetch:2
                                              5⤵
                                                PID:5660
                                              • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                                "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2076,16051202374073928567,18207895064052813489,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2140 /prefetch:3
                                                5⤵
                                                • Suspicious behavior: EnumeratesProcesses
                                                PID:5668
                                          • C:\Users\Admin\AppData\Local\Temp\1000046001\amert.exe
                                            "C:\Users\Admin\AppData\Local\Temp\1000046001\amert.exe"
                                            3⤵
                                            • Identifies VirtualBox via ACPI registry values (likely anti-VM)
                                            • Checks BIOS information in registry
                                            • Executes dropped EXE
                                            • Identifies Wine through registry keys
                                            • Suspicious use of NtSetInformationThreadHideFromDebugger
                                            • Drops file in Windows directory
                                            • Suspicious behavior: EnumeratesProcesses
                                            • Suspicious use of FindShellTrayWindow
                                            PID:5336
                                          • C:\Windows\SysWOW64\rundll32.exe
                                            "C:\Windows\System32\rundll32.exe" C:\Users\Admin\AppData\Roaming\a091ec0a6e2227\cred64.dll, Main
                                            3⤵
                                            • Loads dropped DLL
                                            PID:6288
                                            • C:\Windows\system32\rundll32.exe
                                              "C:\Windows\System32\rundll32.exe" C:\Users\Admin\AppData\Roaming\a091ec0a6e2227\cred64.dll, Main
                                              4⤵
                                              • Blocklisted process makes network request
                                              • Loads dropped DLL
                                              • Suspicious behavior: EnumeratesProcesses
                                              PID:6312
                                              • C:\Windows\system32\netsh.exe
                                                netsh wlan show profiles
                                                5⤵
                                                  PID:6576
                                                • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                  powershell -Command Compress-Archive -Path 'C:\Users\Admin\AppData\Local\Temp\_Files_\' -DestinationPath 'C:\Users\Admin\AppData\Local\Temp\270530367132_Desktop.zip' -CompressionLevel Optimal
                                                  5⤵
                                                  • Suspicious behavior: EnumeratesProcesses
                                                  • Suspicious use of AdjustPrivilegeToken
                                                  PID:6940
                                            • C:\Windows\SysWOW64\rundll32.exe
                                              "C:\Windows\System32\rundll32.exe" C:\Users\Admin\AppData\Roaming\a091ec0a6e2227\clip64.dll, Main
                                              3⤵
                                              • Blocklisted process makes network request
                                              • Loads dropped DLL
                                              PID:5688
                                        • C:\Windows\System32\CompPkgSrv.exe
                                          C:\Windows\System32\CompPkgSrv.exe -Embedding
                                          1⤵
                                            PID:5288
                                          • C:\Windows\System32\CompPkgSrv.exe
                                            C:\Windows\System32\CompPkgSrv.exe -Embedding
                                            1⤵
                                              PID:5364
                                            • C:\Windows\System32\CompPkgSrv.exe
                                              C:\Windows\System32\CompPkgSrv.exe -Embedding
                                              1⤵
                                                PID:5880
                                              • C:\Windows\System32\CompPkgSrv.exe
                                                C:\Windows\System32\CompPkgSrv.exe -Embedding
                                                1⤵
                                                  PID:6072
                                                • C:\Users\Admin\AppData\Local\Temp\09fd851a4f\explorha.exe
                                                  C:\Users\Admin\AppData\Local\Temp\09fd851a4f\explorha.exe
                                                  1⤵
                                                  • Identifies VirtualBox via ACPI registry values (likely anti-VM)
                                                  • Checks BIOS information in registry
                                                  • Executes dropped EXE
                                                  • Identifies Wine through registry keys
                                                  • Suspicious use of NtSetInformationThreadHideFromDebugger
                                                  • Suspicious behavior: EnumeratesProcesses
                                                  PID:6268
                                                • C:\Users\Admin\AppData\Local\Temp\00c07260dc\explorgu.exe
                                                  C:\Users\Admin\AppData\Local\Temp\00c07260dc\explorgu.exe
                                                  1⤵
                                                  • Identifies VirtualBox via ACPI registry values (likely anti-VM)
                                                  • Checks BIOS information in registry
                                                  • Checks computer location settings
                                                  • Executes dropped EXE
                                                  • Identifies Wine through registry keys
                                                  • Suspicious use of NtSetInformationThreadHideFromDebugger
                                                  • Suspicious behavior: EnumeratesProcesses
                                                  PID:5616
                                                  • C:\Windows\SysWOW64\rundll32.exe
                                                    "C:\Windows\System32\rundll32.exe" C:\Users\Admin\AppData\Roaming\006700e5a2ab05\cred64.dll, Main
                                                    2⤵
                                                    • Loads dropped DLL
                                                    PID:7028
                                                    • C:\Windows\system32\rundll32.exe
                                                      "C:\Windows\System32\rundll32.exe" C:\Users\Admin\AppData\Roaming\006700e5a2ab05\cred64.dll, Main
                                                      3⤵
                                                      • Blocklisted process makes network request
                                                      • Loads dropped DLL
                                                      • Suspicious behavior: EnumeratesProcesses
                                                      PID:6500
                                                      • C:\Windows\system32\netsh.exe
                                                        netsh wlan show profiles
                                                        4⤵
                                                          PID:6360
                                                        • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                          powershell -Command Compress-Archive -Path 'C:\Users\Admin\AppData\Local\Temp\_Files_\' -DestinationPath 'C:\Users\Admin\AppData\Local\Temp\270530367132_Desktop.zip' -CompressionLevel Optimal
                                                          4⤵
                                                          • Suspicious behavior: EnumeratesProcesses
                                                          • Suspicious use of AdjustPrivilegeToken
                                                          PID:6404
                                                    • C:\Windows\SysWOW64\rundll32.exe
                                                      "C:\Windows\System32\rundll32.exe" C:\Users\Admin\AppData\Roaming\006700e5a2ab05\clip64.dll, Main
                                                      2⤵
                                                      • Blocklisted process makes network request
                                                      • Loads dropped DLL
                                                      PID:976
                                                  • C:\Users\Admin\AppData\Local\Temp\09fd851a4f\explorha.exe
                                                    C:\Users\Admin\AppData\Local\Temp\09fd851a4f\explorha.exe
                                                    1⤵
                                                    • Identifies VirtualBox via ACPI registry values (likely anti-VM)
                                                    • Checks BIOS information in registry
                                                    • Executes dropped EXE
                                                    • Identifies Wine through registry keys
                                                    • Suspicious use of NtSetInformationThreadHideFromDebugger
                                                    • Suspicious behavior: EnumeratesProcesses
                                                    PID:6188
                                                  • C:\Users\Admin\AppData\Local\Temp\09fd851a4f\explorha.exe
                                                    C:\Users\Admin\AppData\Local\Temp\09fd851a4f\explorha.exe
                                                    1⤵
                                                    • Identifies VirtualBox via ACPI registry values (likely anti-VM)
                                                    • Checks BIOS information in registry
                                                    • Executes dropped EXE
                                                    • Identifies Wine through registry keys
                                                    • Suspicious use of NtSetInformationThreadHideFromDebugger
                                                    • Suspicious behavior: EnumeratesProcesses
                                                    PID:5844

                                                  Network

                                                  MITRE ATT&CK Enterprise v15

                                                  Replay Monitor

                                                  Loading Replay Monitor...

                                                  Downloads

                                                  • C:\Users\Admin\AppData\Local\Microsoft\CLR_v4.0\UsageLogs\powershell.exe.log

                                                    Filesize

                                                    3KB

                                                    MD5

                                                    fe3aab3ae544a134b68e881b82b70169

                                                    SHA1

                                                    926e9b4e527ae1bd9b3b25726e1f59d5a34d36a6

                                                    SHA256

                                                    bda499e3f69d8fe0227e734bbb935dc5bf0050d37adf03bc41356dfcb5bcca0b

                                                    SHA512

                                                    3fbd3499d98280b6c79c67b0ee183b27692dbc31acf103b4f8ca4dcdf392afff2b3aad500037f4288581ed37e85f45c3bbb5dcde11cddf3ef0609f44b2ecb280

                                                  • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad\settings.dat

                                                    Filesize

                                                    152B

                                                    MD5

                                                    279e783b0129b64a8529800a88fbf1ee

                                                    SHA1

                                                    204c62ec8cef8467e5729cad52adae293178744f

                                                    SHA256

                                                    3619c3b82a8cbdce37bfd88b66d4fdfcd728a1112b05eb26998bea527d187932

                                                    SHA512

                                                    32730d9124dd28c196bd4abcfd6a283a04553f3f6b050c057264bc883783d30d6602781137762e66e1f90847724d0e994bddf6e729de11a809f263f139023d3b

                                                  • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad\settings.dat

                                                    Filesize

                                                    152B

                                                    MD5

                                                    cbec32729772aa6c576e97df4fef48f5

                                                    SHA1

                                                    6ec173d5313f27ba1e46ad66c7bbe7c0a9767dba

                                                    SHA256

                                                    d34331aa91a21e127bbe68f55c4c1898c429d9d43545c3253d317ffb105aa24e

                                                    SHA512

                                                    425b3638fed70da3bc16bba8b9878de528aca98669203f39473b931f487a614d3f66073b8c3d9bc2211e152b4bbdeceb2777001467954eec491f862912f3c7a0

                                                  • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\97e66837-a3c4-46fa-93d6-1add0f9a5df2.tmp

                                                    Filesize

                                                    707B

                                                    MD5

                                                    137a3bb4d90078c68ed9cb3febec5792

                                                    SHA1

                                                    7a41beaf9d8cfd7f6be1bcc77b8f96f5b8425a46

                                                    SHA256

                                                    4515cb547269269c1324b959db53cefb89f04714789e28d48406806a3ba7b7a0

                                                    SHA512

                                                    db17b335154b5afcdad9dd46b6c2ea4aeb748b7bbbe59402d7fbe46131261c4bbe216003ab126a724a425856230d6c95edb6ae823a3eab1c389bffdf5062c815

                                                  • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index

                                                    Filesize

                                                    960B

                                                    MD5

                                                    aaa2ac38dae617ea96f5afbc04d45520

                                                    SHA1

                                                    d825e955f5babbdda4125c92d0a4ff1028b1d2cd

                                                    SHA256

                                                    7513843de4371a1fd518ccb95e72275f099921463200301df46597b0aab85443

                                                    SHA512

                                                    f500c2bd162c76c9cb48bed40a892ece2a17c1477bc28d4d397afc9ac2dcbe8278b2e2e52c85c3b722cd4f632f9f7aed1f7e581f13dc5090d106db2395beafc9

                                                  • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Network Persistent State

                                                    Filesize

                                                    2KB

                                                    MD5

                                                    97c400e2afd8e6714e8c59e9f80bc02d

                                                    SHA1

                                                    463af5cf4df86e893ca27aff4aa109ddde0a6f7c

                                                    SHA256

                                                    df5d760be41165580d47df4edd2643d999d49737c4b73b24f165f8780d78de2b

                                                    SHA512

                                                    2aba8d836dcf58fad94ebde14e82dc126a9a617edaa9a3e5e6e428e5b31e41fe81c0d2be0d4096cd84cad0242ee5fb447a49f2768d3cf1b5f669139b3d87e038

                                                  • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Preferences

                                                    Filesize

                                                    6KB

                                                    MD5

                                                    239cd6ae84d99c36f4f153a2e62a96cc

                                                    SHA1

                                                    1172369526ee914c8f855830ee9fcf99a40d9eb5

                                                    SHA256

                                                    3a85bc03f43789b13272ac84092cdaf9ca2e2574fe83539fa017b3e6a347035c

                                                    SHA512

                                                    20aed5288b93c9b0ca3fde3246bbec631d95aa4a55bb28fcbd807b26eee9523ae8c69ac30046dea62ea7bc06c6fcfe93b7209c8ddb3092013226584e04460413

                                                  • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Preferences

                                                    Filesize

                                                    7KB

                                                    MD5

                                                    5958f748757b972a498bc3087750c58b

                                                    SHA1

                                                    03bf2be8aba25c4e603448caeef75f3c7488173a

                                                    SHA256

                                                    696cae710d0f5a47d3fe87c85c3a918c43d22eaf8b5480d370aa9941fecc1f6b

                                                    SHA512

                                                    5c88fda4d10d339043b717bad11dbee5b1c965dc9f4ce2e53d5e61d183c806ea80ff0c37640f067cd2aafe58673a48d9421f7563f3c824276a46ef6d9816f5da

                                                  • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\TransportSecurity

                                                    Filesize

                                                    707B

                                                    MD5

                                                    d89d23c5075a1b2c80d74fb7842dee31

                                                    SHA1

                                                    8340ab077824d409212b155711eecb8e7ca3d420

                                                    SHA256

                                                    ca1c82825a14bce73386eb865a444567dfa5111bcfe0687787aa71c7adf339ca

                                                    SHA512

                                                    5cf3577612d59d2d313438c02156bbce8df509df4f11bf548b98fdc478ee2d0341e47e81ec599491f90fdbe13a883b95e21bda585a1f63036c8832bcd83b0b89

                                                  • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\TransportSecurity

                                                    Filesize

                                                    707B

                                                    MD5

                                                    9276ff24c8f0f78b2c818ae58be21070

                                                    SHA1

                                                    9b4cdd50bd92dbc006d1989c9eb847b454909664

                                                    SHA256

                                                    c3d7fd3d65708d853bd143ffb6f8b2e5fbbd21810802643bb16f0345217b4c12

                                                    SHA512

                                                    0a5e802ccb1fbfc45196503bf259f7555c722f1e2eebcc64b160ef0992570b4b18210af89dbcb1e66672941b2bd02a686f9a3246c919f7a9b20d536145d592f7

                                                  • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\TransportSecurity

                                                    Filesize

                                                    707B

                                                    MD5

                                                    78d77553b7e1ce5cb389a13d6abb13e5

                                                    SHA1

                                                    74178239e81152492fe00b38af0934e716f9b2cf

                                                    SHA256

                                                    d41312cad219ba5d92af6e5d0c016b6dbf1f84e21312fb4b32ce0fd6074b20cd

                                                    SHA512

                                                    bc2bf68d628a6d7ae0386faa78cfb3f87a792eb7a743835d6c716cba02d3e97881e5d8bcac0888222c6477e2ccb7b9f9398926ad665834714adadf26c408d1cc

                                                  • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\TransportSecurity~RFe57dce3.TMP

                                                    Filesize

                                                    707B

                                                    MD5

                                                    992ce6510862c4099ee941bcae14582d

                                                    SHA1

                                                    05a9979316738183cbf5725335ade5d1604ddd4e

                                                    SHA256

                                                    2eaee4bfd1f9e392f7a9bd8bf1da45daaf43572ac98f1155d35ab2cf429acd93

                                                    SHA512

                                                    c3ad552aaf4e3c442150f52914a588d7e9ef272c3045afa789b35a5b6457752cee32615926a669121cb08a9a32024d41b9f9f8ecd5474fb8eee139b018ef43b3

                                                  • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\data_reduction_proxy_leveldb\CURRENT

                                                    Filesize

                                                    16B

                                                    MD5

                                                    6752a1d65b201c13b62ea44016eb221f

                                                    SHA1

                                                    58ecf154d01a62233ed7fb494ace3c3d4ffce08b

                                                    SHA256

                                                    0861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd

                                                    SHA512

                                                    9cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389

                                                  • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Local State

                                                    Filesize

                                                    12KB

                                                    MD5

                                                    e24832a3e2bfb02be97627c61017ffba

                                                    SHA1

                                                    76557b2024b7da9bf29f0761a5992c0057ede8b7

                                                    SHA256

                                                    551b7f69c09737f0e446f597044d852e788a9aa12b3a17f0a9324a0802669f94

                                                    SHA512

                                                    1c48e537d8b24dca0c6cc82d94c8d1d52b15f958e307b6e4362f36731e37c6aa970d7b0a991590fcbef1a3ce834a3b9bcc1228e372df6e96fbe1a098347ae758

                                                  • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Local State

                                                    Filesize

                                                    8KB

                                                    MD5

                                                    361bcd317c363a33fa5e0cfceb989b2c

                                                    SHA1

                                                    fece6f799ca58d69518e97937ad6760a0a218558

                                                    SHA256

                                                    01fd514a773c518f3d05a71ef58ce879a3c5220224b7dea66fb6d876744b41ee

                                                    SHA512

                                                    a8b16ecf0b9bae84bbcdeeef36cbfa3102e8e50d4985021d72230a747a1fb6c8cd9da4fa6ec19e355d0f32315da020ff12b5ffe04cf486c972f35f3da4675590

                                                  • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Local State

                                                    Filesize

                                                    8KB

                                                    MD5

                                                    fffeccfce8c2c429b03f0f59177cab1a

                                                    SHA1

                                                    8ab339f3f8f1b1d71fde9482517175950ded3525

                                                    SHA256

                                                    535cf5e1568a6cdf4c885621d11634075042f400d3a34613991fb1012996ec97

                                                    SHA512

                                                    b6dce5e714264e5b11573657c67f5a9df4f7a54148022b80a179e32351dbc9673cbe6f5a7128411498a2ea8dbae88f02f8098c5aa9332c28bdf5e788339596c4

                                                  • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Local State

                                                    Filesize

                                                    11KB

                                                    MD5

                                                    d45c193b2c54cc8637a2fef3d93d7a1c

                                                    SHA1

                                                    fcee6aa2c427f26cbd12eec488ae325469ee4874

                                                    SHA256

                                                    3e19ecc8930d5a51dc83186eaab06633c63d68809155daf2784e7d22f81c3d9e

                                                    SHA512

                                                    6ea5808a088778208437be90719adef4a4feda19614d2cefba54c29852a40895b743d99e5cd33e52769aef0d8d5b3440dc0e2ed4a5a62ab5eba2609a79253c8e

                                                  • C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive

                                                    Filesize

                                                    1KB

                                                    MD5

                                                    74cd4674166ac8f1bea0a81b6bb8eabc

                                                    SHA1

                                                    0e7e9faee65e22e86a0f47664f3489c12e710d90

                                                    SHA256

                                                    430d083ba64e6ecf668e892360b5a4a3423ff492e84f01f14aa69957de2e1e44

                                                    SHA512

                                                    ce07207402aefa1503da21c5cc29e55f777abd5a04b2b41061c6d6a37da7ec3a2df0388c7481bf0c71e4f656cb703ca19c6ecde9cbe5ae21d2948321ee7d7391

                                                  • C:\Users\Admin\AppData\Local\Temp\09fd851a4f\explorha.exe

                                                    Filesize

                                                    1.7MB

                                                    MD5

                                                    1e46d2cdcab74ee76e642b9b5adcf525

                                                    SHA1

                                                    7f4a586b5f4bfbe37e5944f4301936ca32daf132

                                                    SHA256

                                                    16b6e8aa549422d4d45d12498c0661535f5ee54557a48b10f5bec6d1430bcd19

                                                    SHA512

                                                    5407955a7884682fd79f393c5c52222f915682e2e414e404ea86e11df6710966299192dad0f035e00a018f564847c4c18c7af35d51a9eb4870801865f8bb0e8e

                                                  • C:\Users\Admin\AppData\Local\Temp\1000042001\507b1bc1a1.exe

                                                    Filesize

                                                    3.0MB

                                                    MD5

                                                    8444eaf15ee11d044dd6133b0268a0af

                                                    SHA1

                                                    fcbd127ca09dc689a55687e4c99c2460f2dd703d

                                                    SHA256

                                                    81d926b412b4fdb5f3839fdd2e1b43846ecd840effceb61e8986e73b59bd556e

                                                    SHA512

                                                    24045f8dd31c21e46923a6997fbf9f9279b9ac0dddcfef181a37ce37710236ad0ac0467bf98a96e911f996707fe91b7f1dffba63600200b319f79812d6fed0ed

                                                  • C:\Users\Admin\AppData\Local\Temp\1000044001\go.exe

                                                    Filesize

                                                    894KB

                                                    MD5

                                                    2f8912af892c160c1c24c9f38a60c1ab

                                                    SHA1

                                                    d2deae508e262444a8f15c29ebcc7ebbe08a3fdb

                                                    SHA256

                                                    59ff8e0aa665fbbf749c7548906a655cb1869bb58a3b7546efa5b416d19e6308

                                                    SHA512

                                                    0395383bde98d358b0a7f2224f903dff026ce0c6d90feb49ac0e6993ef692143b0eb25da84d9cdc9e7b373a7b75a6dbaef14746eda1bff165d59f07ca51a16bb

                                                  • C:\Users\Admin\AppData\Local\Temp\1000046001\amert.exe

                                                    Filesize

                                                    1.8MB

                                                    MD5

                                                    bf2b428250d710cd9b61aeac205cebe5

                                                    SHA1

                                                    bf4e97656d6d7cf5f20590b4e1b0bbe7245a1bf1

                                                    SHA256

                                                    00a647a2d5971e2bb1f5dfc83725bae0d5123d63a2e617a496e266d3378cf073

                                                    SHA512

                                                    81a2b87e173f9ee1abf2f68c79611d47d88b74ef5b6a45693e17d67bbc6c1e9eeb360888eb2f2d1b51ef9640175ec00e4999b252899c9e8c1ac19e022962943a

                                                  • C:\Users\Admin\AppData\Local\Temp\__PSScriptPolicyTest_oan1jp21.5wn.ps1

                                                    Filesize

                                                    60B

                                                    MD5

                                                    d17fe0a3f47be24a6453e9ef58c94641

                                                    SHA1

                                                    6ab83620379fc69f80c0242105ddffd7d98d5d9d

                                                    SHA256

                                                    96ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7

                                                    SHA512

                                                    5b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82

                                                  • C:\Users\Admin\AppData\Roaming\006700e5a2ab05\clip64.dll

                                                    Filesize

                                                    109KB

                                                    MD5

                                                    2afdbe3b99a4736083066a13e4b5d11a

                                                    SHA1

                                                    4d4856cf02b3123ac16e63d4a448cdbcb1633546

                                                    SHA256

                                                    8d31b39170909595b518b1a03e9ec950540fabd545ed14817cac5c84b91599ee

                                                    SHA512

                                                    d89b3c46854153e60e3fa825b394344eee33936d7dbf186af9d95c9adae54428609e3bf21a18d38fce3d96f3e0b8e4e0ed25cb5004fbe288de3aef3a85b1d93f

                                                  • C:\Users\Admin\AppData\Roaming\006700e5a2ab05\cred64.dll

                                                    Filesize

                                                    1.2MB

                                                    MD5

                                                    92fbdfccf6a63acef2743631d16652a7

                                                    SHA1

                                                    971968b1378dd89d59d7f84bf92f16fc68664506

                                                    SHA256

                                                    b4588feacc183cd5a089f9bb950827b75df04bd5a6e67c95ff258e4a34aa0d72

                                                    SHA512

                                                    b8ea216d4a59d8858fd4128abb555f8dcf3acca9138e663b488f09dc5200db6dc11ecc235a355e801145bbbb44d7beac6147949d75d78b32fe9cfd2fa200d117

                                                  • C:\Users\Admin\AppData\Roaming\a091ec0a6e2227\clip64.dll

                                                    Filesize

                                                    109KB

                                                    MD5

                                                    726cd06231883a159ec1ce28dd538699

                                                    SHA1

                                                    404897e6a133d255ad5a9c26ac6414d7134285a2

                                                    SHA256

                                                    12fef2d5995d671ec0e91bdbdc91e2b0d3c90ed3a8b2b13ddaa8ad64727dcd46

                                                    SHA512

                                                    9ea82e7cb6c6a58446bd5033855947c3e2d475d2910f2b941235e0b96aa08eec822d2dd17cc86b2d3fce930f78b799291992408e309a6c63e3011266810ea83e

                                                  • C:\Users\Admin\AppData\Roaming\a091ec0a6e2227\cred64.dll

                                                    Filesize

                                                    1.2MB

                                                    MD5

                                                    15a42d3e4579da615a384c717ab2109b

                                                    SHA1

                                                    22aeedeb2307b1370cdab70d6a6b6d2c13ad2301

                                                    SHA256

                                                    3c97bb410e49b11af8116feb7240b7101e1967cae7538418c45c3d2e072e8103

                                                    SHA512

                                                    1eb7f126dccc88a2479e3818c36120f5af3caa0d632b9ea803485ee6531d6e2a1fd0805b1c4364983d280df23ea5ca3ad4a5fca558ac436efae36af9b795c444

                                                  • \??\pipe\LOCAL\crashpad_4740_LAAWWBTHKUBBHRBN

                                                    MD5

                                                    d41d8cd98f00b204e9800998ecf8427e

                                                    SHA1

                                                    da39a3ee5e6b4b0d3255bfef95601890afd80709

                                                    SHA256

                                                    e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855

                                                    SHA512

                                                    cf83e1357eefb8bdf1542850d66d8007d620e4050b5715dc83f4a921d36ce9ce47d0d13c5d85f2b0ff8318d2877eec2f63b931bd47417a81a538327af927da3e

                                                  • memory/1224-69-0x0000000000400000-0x000000000090A000-memory.dmp

                                                    Filesize

                                                    5.0MB

                                                  • memory/1224-108-0x0000000000400000-0x000000000090A000-memory.dmp

                                                    Filesize

                                                    5.0MB

                                                  • memory/1224-61-0x0000000000400000-0x000000000090A000-memory.dmp

                                                    Filesize

                                                    5.0MB

                                                  • memory/1224-412-0x0000000000400000-0x000000000090A000-memory.dmp

                                                    Filesize

                                                    5.0MB

                                                  • memory/1224-63-0x0000000000400000-0x000000000090A000-memory.dmp

                                                    Filesize

                                                    5.0MB

                                                  • memory/1224-64-0x0000000000400000-0x000000000090A000-memory.dmp

                                                    Filesize

                                                    5.0MB

                                                  • memory/1224-65-0x0000000000400000-0x000000000090A000-memory.dmp

                                                    Filesize

                                                    5.0MB

                                                  • memory/1224-67-0x0000000000400000-0x000000000090A000-memory.dmp

                                                    Filesize

                                                    5.0MB

                                                  • memory/1224-66-0x0000000000400000-0x000000000090A000-memory.dmp

                                                    Filesize

                                                    5.0MB

                                                  • memory/1224-68-0x0000000000400000-0x000000000090A000-memory.dmp

                                                    Filesize

                                                    5.0MB

                                                  • memory/1224-60-0x0000000000E60000-0x00000000012EE000-memory.dmp

                                                    Filesize

                                                    4.6MB

                                                  • memory/1224-70-0x0000000000400000-0x000000000090A000-memory.dmp

                                                    Filesize

                                                    5.0MB

                                                  • memory/1224-71-0x0000000000400000-0x000000000090A000-memory.dmp

                                                    Filesize

                                                    5.0MB

                                                  • memory/1224-73-0x0000000000400000-0x000000000090A000-memory.dmp

                                                    Filesize

                                                    5.0MB

                                                  • memory/1224-72-0x0000000000400000-0x000000000090A000-memory.dmp

                                                    Filesize

                                                    5.0MB

                                                  • memory/1224-74-0x0000000000400000-0x000000000090A000-memory.dmp

                                                    Filesize

                                                    5.0MB

                                                  • memory/1224-75-0x0000000000400000-0x000000000090A000-memory.dmp

                                                    Filesize

                                                    5.0MB

                                                  • memory/1224-76-0x0000000000400000-0x000000000090A000-memory.dmp

                                                    Filesize

                                                    5.0MB

                                                  • memory/1224-77-0x0000000000400000-0x000000000090A000-memory.dmp

                                                    Filesize

                                                    5.0MB

                                                  • memory/1224-78-0x0000000000400000-0x000000000090A000-memory.dmp

                                                    Filesize

                                                    5.0MB

                                                  • memory/1224-79-0x0000000000400000-0x000000000090A000-memory.dmp

                                                    Filesize

                                                    5.0MB

                                                  • memory/1224-80-0x0000000000400000-0x000000000090A000-memory.dmp

                                                    Filesize

                                                    5.0MB

                                                  • memory/1224-81-0x0000000000400000-0x000000000090A000-memory.dmp

                                                    Filesize

                                                    5.0MB

                                                  • memory/1224-82-0x0000000000400000-0x000000000090A000-memory.dmp

                                                    Filesize

                                                    5.0MB

                                                  • memory/1224-83-0x0000000000400000-0x000000000090A000-memory.dmp

                                                    Filesize

                                                    5.0MB

                                                  • memory/1224-57-0x0000000000400000-0x000000000090A000-memory.dmp

                                                    Filesize

                                                    5.0MB

                                                  • memory/1224-93-0x0000000000400000-0x000000000090A000-memory.dmp

                                                    Filesize

                                                    5.0MB

                                                  • memory/1224-94-0x0000000000400000-0x000000000090A000-memory.dmp

                                                    Filesize

                                                    5.0MB

                                                  • memory/1224-84-0x0000000000400000-0x000000000090A000-memory.dmp

                                                    Filesize

                                                    5.0MB

                                                  • memory/1224-95-0x0000000000400000-0x000000000090A000-memory.dmp

                                                    Filesize

                                                    5.0MB

                                                  • memory/1224-107-0x0000000000400000-0x000000000090A000-memory.dmp

                                                    Filesize

                                                    5.0MB

                                                  • memory/1224-110-0x0000000000400000-0x000000000090A000-memory.dmp

                                                    Filesize

                                                    5.0MB

                                                  • memory/1224-111-0x0000000000400000-0x000000000090A000-memory.dmp

                                                    Filesize

                                                    5.0MB

                                                  • memory/1548-536-0x0000000000A90000-0x0000000000E44000-memory.dmp

                                                    Filesize

                                                    3.7MB

                                                  • memory/1548-435-0x0000000000A90000-0x0000000000E44000-memory.dmp

                                                    Filesize

                                                    3.7MB

                                                  • memory/1548-53-0x0000000000A90000-0x0000000000E44000-memory.dmp

                                                    Filesize

                                                    3.7MB

                                                  • memory/1548-52-0x0000000000A90000-0x0000000000E44000-memory.dmp

                                                    Filesize

                                                    3.7MB

                                                  • memory/1548-598-0x0000000000A90000-0x0000000000E44000-memory.dmp

                                                    Filesize

                                                    3.7MB

                                                  • memory/1548-595-0x0000000000A90000-0x0000000000E44000-memory.dmp

                                                    Filesize

                                                    3.7MB

                                                  • memory/1548-460-0x0000000000A90000-0x0000000000E44000-memory.dmp

                                                    Filesize

                                                    3.7MB

                                                  • memory/1548-195-0x0000000000A90000-0x0000000000E44000-memory.dmp

                                                    Filesize

                                                    3.7MB

                                                  • memory/1548-580-0x0000000000A90000-0x0000000000E44000-memory.dmp

                                                    Filesize

                                                    3.7MB

                                                  • memory/1548-462-0x0000000000A90000-0x0000000000E44000-memory.dmp

                                                    Filesize

                                                    3.7MB

                                                  • memory/1548-601-0x0000000000A90000-0x0000000000E44000-memory.dmp

                                                    Filesize

                                                    3.7MB

                                                  • memory/1548-488-0x0000000000A90000-0x0000000000E44000-memory.dmp

                                                    Filesize

                                                    3.7MB

                                                  • memory/1548-411-0x0000000000A90000-0x0000000000E44000-memory.dmp

                                                    Filesize

                                                    3.7MB

                                                  • memory/1548-327-0x0000000000A90000-0x0000000000E44000-memory.dmp

                                                    Filesize

                                                    3.7MB

                                                  • memory/1548-482-0x0000000000A90000-0x0000000000E44000-memory.dmp

                                                    Filesize

                                                    3.7MB

                                                  • memory/4580-4-0x0000000004EB0000-0x0000000004EB1000-memory.dmp

                                                    Filesize

                                                    4KB

                                                  • memory/4580-5-0x0000000004F00000-0x0000000004F01000-memory.dmp

                                                    Filesize

                                                    4KB

                                                  • memory/4580-0-0x0000000000DC0000-0x000000000124E000-memory.dmp

                                                    Filesize

                                                    4.6MB

                                                  • memory/4580-3-0x0000000004ED0000-0x0000000004ED1000-memory.dmp

                                                    Filesize

                                                    4KB

                                                  • memory/4580-7-0x0000000004EA0000-0x0000000004EA1000-memory.dmp

                                                    Filesize

                                                    4KB

                                                  • memory/4580-9-0x0000000004EF0000-0x0000000004EF1000-memory.dmp

                                                    Filesize

                                                    4KB

                                                  • memory/4580-2-0x0000000000DC0000-0x000000000124E000-memory.dmp

                                                    Filesize

                                                    4.6MB

                                                  • memory/4580-23-0x0000000000DC0000-0x000000000124E000-memory.dmp

                                                    Filesize

                                                    4.6MB

                                                  • memory/4580-11-0x0000000004F10000-0x0000000004F11000-memory.dmp

                                                    Filesize

                                                    4KB

                                                  • memory/4580-10-0x0000000004F20000-0x0000000004F21000-memory.dmp

                                                    Filesize

                                                    4KB

                                                  • memory/4580-8-0x0000000004EC0000-0x0000000004EC1000-memory.dmp

                                                    Filesize

                                                    4KB

                                                  • memory/4580-1-0x0000000077004000-0x0000000077006000-memory.dmp

                                                    Filesize

                                                    8KB

                                                  • memory/4580-6-0x0000000004E90000-0x0000000004E91000-memory.dmp

                                                    Filesize

                                                    4KB

                                                  • memory/4664-483-0x0000000000E60000-0x00000000012EE000-memory.dmp

                                                    Filesize

                                                    4.6MB

                                                  • memory/4664-461-0x0000000000E60000-0x00000000012EE000-memory.dmp

                                                    Filesize

                                                    4.6MB

                                                  • memory/4664-611-0x0000000000E60000-0x00000000012EE000-memory.dmp

                                                    Filesize

                                                    4.6MB

                                                  • memory/4664-62-0x0000000000E60000-0x00000000012EE000-memory.dmp

                                                    Filesize

                                                    4.6MB

                                                  • memory/4664-315-0x0000000000E60000-0x00000000012EE000-memory.dmp

                                                    Filesize

                                                    4.6MB

                                                  • memory/4664-31-0x0000000005770000-0x0000000005771000-memory.dmp

                                                    Filesize

                                                    4KB

                                                  • memory/4664-56-0x0000000000E60000-0x00000000012EE000-memory.dmp

                                                    Filesize

                                                    4.6MB

                                                  • memory/4664-600-0x0000000000E60000-0x00000000012EE000-memory.dmp

                                                    Filesize

                                                    4.6MB

                                                  • memory/4664-33-0x00000000057E0000-0x00000000057E1000-memory.dmp

                                                    Filesize

                                                    4KB

                                                  • memory/4664-597-0x0000000000E60000-0x00000000012EE000-memory.dmp

                                                    Filesize

                                                    4.6MB

                                                  • memory/4664-32-0x00000000057F0000-0x00000000057F1000-memory.dmp

                                                    Filesize

                                                    4KB

                                                  • memory/4664-26-0x0000000005790000-0x0000000005791000-memory.dmp

                                                    Filesize

                                                    4KB

                                                  • memory/4664-583-0x0000000000E60000-0x00000000012EE000-memory.dmp

                                                    Filesize

                                                    4.6MB

                                                  • memory/4664-197-0x0000000000E60000-0x00000000012EE000-memory.dmp

                                                    Filesize

                                                    4.6MB

                                                  • memory/4664-29-0x00000000057C0000-0x00000000057C1000-memory.dmp

                                                    Filesize

                                                    4KB

                                                  • memory/4664-27-0x00000000057A0000-0x00000000057A1000-memory.dmp

                                                    Filesize

                                                    4KB

                                                  • memory/4664-28-0x0000000005780000-0x0000000005781000-memory.dmp

                                                    Filesize

                                                    4KB

                                                  • memory/4664-538-0x0000000000E60000-0x00000000012EE000-memory.dmp

                                                    Filesize

                                                    4.6MB

                                                  • memory/4664-25-0x0000000000E60000-0x00000000012EE000-memory.dmp

                                                    Filesize

                                                    4.6MB

                                                  • memory/4664-24-0x0000000000E60000-0x00000000012EE000-memory.dmp

                                                    Filesize

                                                    4.6MB

                                                  • memory/4664-434-0x0000000000E60000-0x00000000012EE000-memory.dmp

                                                    Filesize

                                                    4.6MB

                                                  • memory/4664-510-0x0000000000E60000-0x00000000012EE000-memory.dmp

                                                    Filesize

                                                    4.6MB

                                                  • memory/4664-436-0x0000000000E60000-0x00000000012EE000-memory.dmp

                                                    Filesize

                                                    4.6MB

                                                  • memory/4664-30-0x0000000005760000-0x0000000005761000-memory.dmp

                                                    Filesize

                                                    4KB

                                                  • memory/4664-463-0x0000000000E60000-0x00000000012EE000-memory.dmp

                                                    Filesize

                                                    4.6MB

                                                  • memory/5336-215-0x0000000000160000-0x000000000060D000-memory.dmp

                                                    Filesize

                                                    4.7MB

                                                  • memory/5336-198-0x0000000004B00000-0x0000000004B01000-memory.dmp

                                                    Filesize

                                                    4KB

                                                  • memory/5336-210-0x0000000004B40000-0x0000000004B41000-memory.dmp

                                                    Filesize

                                                    4KB

                                                  • memory/5336-235-0x0000000004B50000-0x0000000004B51000-memory.dmp

                                                    Filesize

                                                    4KB

                                                  • memory/5336-252-0x0000000004B60000-0x0000000004B61000-memory.dmp

                                                    Filesize

                                                    4KB

                                                  • memory/5336-212-0x0000000004AF0000-0x0000000004AF1000-memory.dmp

                                                    Filesize

                                                    4KB

                                                  • memory/5336-213-0x0000000004AE0000-0x0000000004AE1000-memory.dmp

                                                    Filesize

                                                    4KB

                                                  • memory/5336-214-0x0000000004B30000-0x0000000004B31000-memory.dmp

                                                    Filesize

                                                    4KB

                                                  • memory/5336-261-0x0000000000160000-0x000000000060D000-memory.dmp

                                                    Filesize

                                                    4.7MB

                                                  • memory/5336-211-0x0000000004AD0000-0x0000000004AD1000-memory.dmp

                                                    Filesize

                                                    4KB

                                                  • memory/5336-199-0x0000000004B10000-0x0000000004B11000-memory.dmp

                                                    Filesize

                                                    4KB

                                                  • memory/5336-196-0x0000000000160000-0x000000000060D000-memory.dmp

                                                    Filesize

                                                    4.7MB

                                                  • memory/5616-596-0x0000000000F20000-0x00000000013CD000-memory.dmp

                                                    Filesize

                                                    4.7MB

                                                  • memory/5616-582-0x0000000000F20000-0x00000000013CD000-memory.dmp

                                                    Filesize

                                                    4.7MB

                                                  • memory/5616-491-0x0000000000F20000-0x00000000013CD000-memory.dmp

                                                    Filesize

                                                    4.7MB

                                                  • memory/5616-537-0x0000000000F20000-0x00000000013CD000-memory.dmp

                                                    Filesize

                                                    4.7MB

                                                  • memory/5616-599-0x0000000000F20000-0x00000000013CD000-memory.dmp

                                                    Filesize

                                                    4.7MB

                                                  • memory/6188-494-0x0000000000E60000-0x00000000012EE000-memory.dmp

                                                    Filesize

                                                    4.6MB

                                                  • memory/6188-497-0x00000000050F0000-0x00000000050F1000-memory.dmp

                                                    Filesize

                                                    4KB

                                                  • memory/6188-509-0x0000000000E60000-0x00000000012EE000-memory.dmp

                                                    Filesize

                                                    4.6MB

                                                  • memory/6188-499-0x00000000050D0000-0x00000000050D1000-memory.dmp

                                                    Filesize

                                                    4KB

                                                  • memory/6188-498-0x0000000005150000-0x0000000005151000-memory.dmp

                                                    Filesize

                                                    4KB

                                                  • memory/6188-493-0x0000000000E60000-0x00000000012EE000-memory.dmp

                                                    Filesize

                                                    4.6MB

                                                  • memory/6188-495-0x0000000005100000-0x0000000005101000-memory.dmp

                                                    Filesize

                                                    4KB

                                                  • memory/6188-496-0x0000000005130000-0x0000000005131000-memory.dmp

                                                    Filesize

                                                    4KB

                                                  • memory/6268-229-0x0000000000E60000-0x00000000012EE000-memory.dmp

                                                    Filesize

                                                    4.6MB

                                                  • memory/6268-247-0x00000000051D0000-0x00000000051D1000-memory.dmp

                                                    Filesize

                                                    4KB

                                                  • memory/6268-248-0x0000000005200000-0x0000000005201000-memory.dmp

                                                    Filesize

                                                    4KB

                                                  • memory/6268-250-0x00000000051C0000-0x00000000051C1000-memory.dmp

                                                    Filesize

                                                    4KB

                                                  • memory/6268-251-0x00000000051B0000-0x00000000051B1000-memory.dmp

                                                    Filesize

                                                    4KB

                                                  • memory/6268-246-0x00000000051E0000-0x00000000051E1000-memory.dmp

                                                    Filesize

                                                    4KB

                                                  • memory/6268-275-0x0000000000E60000-0x00000000012EE000-memory.dmp

                                                    Filesize

                                                    4.6MB

                                                  • memory/6268-239-0x0000000000E60000-0x00000000012EE000-memory.dmp

                                                    Filesize

                                                    4.6MB

                                                  • memory/6268-249-0x00000000051A0000-0x00000000051A1000-memory.dmp

                                                    Filesize

                                                    4KB

                                                  • memory/6940-329-0x00000221B3320000-0x00000221B3330000-memory.dmp

                                                    Filesize

                                                    64KB

                                                  • memory/6940-328-0x00000221B3320000-0x00000221B3330000-memory.dmp

                                                    Filesize

                                                    64KB

                                                  • memory/6940-371-0x00007FFABB860000-0x00007FFABC321000-memory.dmp

                                                    Filesize

                                                    10.8MB

                                                  • memory/6940-326-0x00007FFABB860000-0x00007FFABC321000-memory.dmp

                                                    Filesize

                                                    10.8MB

                                                  • memory/6940-316-0x00000221B33A0000-0x00000221B33C2000-memory.dmp

                                                    Filesize

                                                    136KB

                                                  • memory/6940-364-0x00000221CB8B0000-0x00000221CB8C2000-memory.dmp

                                                    Filesize

                                                    72KB

                                                  • memory/6940-365-0x00000221CB890000-0x00000221CB89A000-memory.dmp

                                                    Filesize

                                                    40KB