Analysis

  • max time kernel
    150s
  • max time network
    153s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20250207-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20250207-enlocale:en-usos:windows10-2004-x64system
  • submitted
    10-02-2025 20:39

General

  • Target

    bootstrapper/Bootstrapper.exe

  • Size

    117.7MB

  • MD5

    e7e6cc81288e3b35d2efb5f6846c1ec8

  • SHA1

    c73545e645192d8171be823385ac345ea96fc0b1

  • SHA256

    a501e15cc6ca645b0c690d07cb83ddea73daa3660ddb82ceb8ee20517deabf79

  • SHA512

    d39514f656d1ca8a52d8599a8bb1f776f2cf0eb220782c1f8b7a526ba1f3e26d959096fefb867012df8f401d13b330be8fb69f43fb04c42bd764a936ec1d330a

  • SSDEEP

    1572864:/idzDXWP7g6zRByS9LnLgZNcRLYaxgC5gbu:imTCW/LYaxBgq

Malware Config

Signatures

  • Detects Rhadamanthys payload 10 IoCs
  • Rhadamanthys

    Rhadamanthys is an info stealer written in C++ first seen in August 2022.

  • Rhadamanthys family
  • Suspicious use of NtCreateUserProcessOtherParentProcess 6 IoCs
  • Boot or Logon Autostart Execution: Active Setup 2 TTPs 7 IoCs

    Adversaries may achieve persistence by adding a Registry key to the Active Setup of the local machine.

  • Downloads MZ/PE file 1 IoCs
  • Checks computer location settings 2 TTPs 3 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Event Triggered Execution: Component Object Model Hijacking 1 TTPs

    Adversaries may establish persistence by executing malicious content triggered by hijacked references to Component Object Model (COM) objects.

  • Executes dropped EXE 10 IoCs
  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Installs/modifies Browser Helper Object 2 TTPs 8 IoCs

    BHOs are DLL modules which act as plugins for Internet Explorer.

  • Drops file in System32 directory 1 IoCs
  • Suspicious use of SetThreadContext 9 IoCs
  • Drops file in Program Files directory 64 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Event Triggered Execution: Netsh Helper DLL 1 TTPs 3 IoCs

    Netsh.exe (also referred to as Netshell) is a command-line scripting utility used to interact with the network configuration of a system.

  • Program crash 7 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 16 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • System Network Configuration Discovery: Internet Connection Discovery 1 TTPs 1 IoCs

    Adversaries may check for Internet connectivity on compromised systems.

  • Gathers network information 2 TTPs 1 IoCs

    Uses commandline utility to view network configuration.

  • Modifies Internet Explorer settings 1 TTPs 24 IoCs
  • Modifies data under HKEY_USERS 2 IoCs
  • Modifies registry class 64 IoCs
  • Modifies system certificate store 2 TTPs 5 IoCs
  • Suspicious behavior: EnumeratesProcesses 48 IoCs
  • Suspicious use of AdjustPrivilegeToken 64 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs
  • System policy modification 1 TTPs 4 IoCs
  • Uses Task Scheduler COM API 1 TTPs

    The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.

Processes

  • C:\Windows\system32\sihost.exe
    sihost.exe
    1⤵
      PID:2588
      • C:\Windows\SysWOW64\svchost.exe
        "C:\Windows\System32\svchost.exe"
        2⤵
        • System Location Discovery: System Language Discovery
        PID:4468
      • C:\Windows\SysWOW64\svchost.exe
        "C:\Windows\System32\svchost.exe"
        2⤵
        • System Location Discovery: System Language Discovery
        • Suspicious behavior: EnumeratesProcesses
        PID:1240
      • C:\Windows\SysWOW64\svchost.exe
        "C:\Windows\System32\svchost.exe"
        2⤵
        • System Location Discovery: System Language Discovery
        PID:4832
      • C:\Windows\SysWOW64\svchost.exe
        "C:\Windows\System32\svchost.exe"
        2⤵
        • System Location Discovery: System Language Discovery
        • Suspicious behavior: EnumeratesProcesses
        PID:3000
      • C:\Windows\SysWOW64\svchost.exe
        "C:\Windows\System32\svchost.exe"
        2⤵
        • System Location Discovery: System Language Discovery
        • Suspicious behavior: EnumeratesProcesses
        PID:4508
      • C:\Windows\SysWOW64\svchost.exe
        "C:\Windows\System32\svchost.exe"
        2⤵
        • System Location Discovery: System Language Discovery
        PID:400
    • C:\Users\Admin\AppData\Local\Temp\bootstrapper\Bootstrapper.exe
      "C:\Users\Admin\AppData\Local\Temp\bootstrapper\Bootstrapper.exe"
      1⤵
      • Checks computer location settings
      • Suspicious use of SetThreadContext
      • Suspicious use of WriteProcessMemory
      PID:1784
      • C:\Windows\system32\cmd.exe
        C:\Windows\system32\cmd.exe /d /s /c "chcp"
        2⤵
        • Suspicious use of WriteProcessMemory
        PID:3104
        • C:\Windows\system32\chcp.com
          chcp
          3⤵
            PID:1924
        • C:\Users\Admin\AppData\Local\Temp\bootstrapper\Bootstrapper.exe
          C:\Users\Admin\AppData\Local\Temp\bootstrapper\Bootstrapper.exe --type=crashpad-handler --user-data-dir=C:\Users\Admin\AppData\Roaming\Binance /prefetch:7 --no-rate-limit --no-upload-gzip --monitor-self-annotation=ptype=crashpad-handler --database=C:\Users\Admin\AppData\Roaming\Binance\Crashpad --url=https://report.binance.gg/api/597/minidump?sentry_key=db5e5bdef255402d9f02cbe4f3acf95a --annotation=_productName=Binance --annotation=_version=1.7.2 --annotation=prod=Electron --annotation=ver=10.1.5 --initial-client-data=0x494,0x498,0x49c,0x454,0x4a0,0x7ff696d4bce0,0x7ff696d4bcf0,0x7ff696d4bd00
          2⤵
            PID:4916
          • C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_wp.exe
            "C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_wp.exe"
            2⤵
            • Suspicious use of NtCreateUserProcessOtherParentProcess
            • System Location Discovery: System Language Discovery
            • Suspicious behavior: EnumeratesProcesses
            PID:2636
          • C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_wp.exe
            "C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_wp.exe"
            2⤵
              PID:3444
            • C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exe
              "C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exe"
              2⤵
              • Suspicious use of NtCreateUserProcessOtherParentProcess
              • System Location Discovery: System Language Discovery
              • Suspicious behavior: EnumeratesProcesses
              PID:2808
              • C:\Windows\SysWOW64\WerFault.exe
                C:\Windows\SysWOW64\WerFault.exe -u -p 2808 -s 312
                3⤵
                • Program crash
                PID:1464
            • C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_wp.exe
              "C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_wp.exe"
              2⤵
              • Suspicious use of NtCreateUserProcessOtherParentProcess
              • System Location Discovery: System Language Discovery
              • Suspicious behavior: EnumeratesProcesses
              PID:1796
            • C:\Users\Admin\AppData\Local\Temp\bootstrapper\Bootstrapper.exe
              "C:\Users\Admin\AppData\Local\Temp\bootstrapper\Bootstrapper.exe" --type=gpu-process --field-trial-handle=1744,7714213476102443272,8922437043208898585,131072 --enable-features=WebComponentsV0Enabled --disable-features=CookiesWithoutSameSiteMustBeSecure,OutOfBlinkCors,SameSiteByDefaultCookies,SpareRendererForSitePerProcess --gpu-preferences=MAAAAAAAAADgAAAwAAAAAAAAAAAAAAAAAABgAAAAAAAQAAAAAAAAAAAAAAAAAAAAKAAAAAQAAAAgAAAAAAAAACgAAAAAAAAAMAAAAAAAAAA4AAAAAAAAABAAAAAAAAAAAAAAAAUAAAAQAAAAAAAAAAAAAAAGAAAAEAAAAAAAAAABAAAABQAAABAAAAAAAAAAAQAAAAYAAAA= --mojo-platform-channel-handle=1752 /prefetch:2
              2⤵
                PID:3048
              • C:\Users\Admin\AppData\Local\Temp\bootstrapper\Bootstrapper.exe
                "C:\Users\Admin\AppData\Local\Temp\bootstrapper\Bootstrapper.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=1744,7714213476102443272,8922437043208898585,131072 --enable-features=WebComponentsV0Enabled --disable-features=CookiesWithoutSameSiteMustBeSecure,OutOfBlinkCors,SameSiteByDefaultCookies,SpareRendererForSitePerProcess --lang=en-US --service-sandbox-type=network --standard-schemes=binance-resources,app --secure-schemes=binance-resources,app --bypasscsp-schemes --cors-schemes=binance-resources,app --fetch-schemes=binance-resources,app --service-worker-schemes --mojo-platform-channel-handle=2316 /prefetch:8
                2⤵
                • Modifies system certificate store
                • Suspicious behavior: EnumeratesProcesses
                PID:2024
              • C:\Users\Admin\AppData\Local\Temp\bootstrapper\Bootstrapper.exe
                "C:\Users\Admin\AppData\Local\Temp\bootstrapper\Bootstrapper.exe" --type=renderer --field-trial-handle=1744,7714213476102443272,8922437043208898585,131072 --enable-features=WebComponentsV0Enabled --disable-features=CookiesWithoutSameSiteMustBeSecure,OutOfBlinkCors,SameSiteByDefaultCookies,SpareRendererForSitePerProcess --lang=en-US --standard-schemes=binance-resources,app --secure-schemes=binance-resources,app --bypasscsp-schemes --cors-schemes=binance-resources,app --fetch-schemes=binance-resources,app --service-worker-schemes --app-path="C:\Users\Admin\AppData\Local\Temp\bootstrapper\resources\app.asar" --node-integration --no-sandbox --no-zygote --enable-remote-module --background-color=#0E121C --disable-blink-features=Auxclick --enable-websql --disable-electron-site-instance-overrides --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=4 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=2656 /prefetch:1
                2⤵
                • Checks computer location settings
                • Suspicious use of SetThreadContext
                • Suspicious behavior: EnumeratesProcesses
                PID:180
                • C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_wp.exe
                  "C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_wp.exe"
                  3⤵
                  • Suspicious use of NtCreateUserProcessOtherParentProcess
                  • System Location Discovery: System Language Discovery
                  • Suspicious behavior: EnumeratesProcesses
                  PID:4552
                  • C:\Windows\SysWOW64\WerFault.exe
                    C:\Windows\SysWOW64\WerFault.exe -u -p 4552 -s 324
                    4⤵
                    • Program crash
                    PID:4852
                • C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_wp.exe
                  "C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_wp.exe"
                  3⤵
                    PID:4568
                  • C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exe
                    "C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exe"
                    3⤵
                    • System Location Discovery: System Language Discovery
                    PID:368
                    • C:\Windows\SysWOW64\WerFault.exe
                      C:\Windows\SysWOW64\WerFault.exe -u -p 368 -s 300
                      4⤵
                      • Program crash
                      PID:400
                  • C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_wp.exe
                    "C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_wp.exe"
                    3⤵
                    • System Location Discovery: System Language Discovery
                    PID:3612
                    • C:\Windows\SysWOW64\WerFault.exe
                      C:\Windows\SysWOW64\WerFault.exe -u -p 3612 -s 304
                      4⤵
                      • Program crash
                      PID:624
                • C:\Windows\system32\cmd.exe
                  C:\Windows\system32\cmd.exe /d /s /c "C:\Windows\system32\wbem\wmic.exe os get /value"
                  2⤵
                    PID:4100
                    • C:\Windows\system32\wbem\WMIC.exe
                      C:\Windows\system32\wbem\wmic.exe os get /value
                      3⤵
                      • Suspicious use of AdjustPrivilegeToken
                      PID:2268
                  • C:\Windows\system32\cmd.exe
                    C:\Windows\system32\cmd.exe /d /s /c "findstr /C:"Detected boot environment" "%windir%\Panther\setupact.log""
                    2⤵
                      PID:1184
                      • C:\Windows\system32\findstr.exe
                        findstr /C:"Detected boot environment" "C:\Windows\Panther\setupact.log"
                        3⤵
                          PID:2812
                      • C:\Windows\system32\cmd.exe
                        C:\Windows\system32\cmd.exe /d /s /c "C:\Windows\system32\wbem\wmic.exe csproduct get /value"
                        2⤵
                          PID:432
                          • C:\Windows\system32\wbem\WMIC.exe
                            C:\Windows\system32\wbem\wmic.exe csproduct get /value
                            3⤵
                            • Suspicious use of AdjustPrivilegeToken
                            PID:2776
                        • C:\Windows\system32\cmd.exe
                          C:\Windows\system32\cmd.exe /d /s /c "C:\Windows\system32\wbem\wmic.exe nic get MACAddress, name, NetEnabled, Speed, NetConnectionStatus, AdapterTypeId /value"
                          2⤵
                            PID:2828
                            • C:\Windows\system32\wbem\WMIC.exe
                              C:\Windows\system32\wbem\wmic.exe nic get MACAddress, name, NetEnabled, Speed, NetConnectionStatus, AdapterTypeId /value
                              3⤵
                                PID:2500
                            • C:\Windows\system32\cmd.exe
                              C:\Windows\system32\cmd.exe /d /s /c "C:\Windows\system32\wbem\wmic.exe nicconfig get dhcpEnabled /value"
                              2⤵
                                PID:4448
                                • C:\Windows\system32\wbem\WMIC.exe
                                  C:\Windows\system32\wbem\wmic.exe nicconfig get dhcpEnabled /value
                                  3⤵
                                    PID:2936
                                • C:\Windows\system32\cmd.exe
                                  C:\Windows\system32\cmd.exe /d /s /c "netsh lan show profiles"
                                  2⤵
                                    PID:2376
                                    • C:\Windows\system32\netsh.exe
                                      netsh lan show profiles
                                      3⤵
                                      • Event Triggered Execution: Netsh Helper DLL
                                      PID:820
                                  • C:\Windows\system32\cmd.exe
                                    C:\Windows\system32\cmd.exe /d /s /c "C:\Windows\system32\wbem\wmic.exe nic get MACAddress, name, NetEnabled, Speed, NetConnectionStatus, AdapterTypeId /value"
                                    2⤵
                                      PID:740
                                      • C:\Windows\system32\wbem\WMIC.exe
                                        C:\Windows\system32\wbem\wmic.exe nic get MACAddress, name, NetEnabled, Speed, NetConnectionStatus, AdapterTypeId /value
                                        3⤵
                                          PID:4160
                                      • C:\Windows\system32\cmd.exe
                                        C:\Windows\system32\cmd.exe /d /s /c "C:\Windows\system32\wbem\wmic.exe nicconfig get dhcpEnabled /value"
                                        2⤵
                                          PID:3904
                                          • C:\Windows\system32\wbem\WMIC.exe
                                            C:\Windows\system32\wbem\wmic.exe nicconfig get dhcpEnabled /value
                                            3⤵
                                              PID:4100
                                          • C:\Windows\system32\cmd.exe
                                            C:\Windows\system32\cmd.exe /d /s /c "ipconfig /all"
                                            2⤵
                                              PID:2268
                                              • C:\Windows\system32\ipconfig.exe
                                                ipconfig /all
                                                3⤵
                                                • Gathers network information
                                                PID:3824
                                            • C:\Windows\system32\cmd.exe
                                              C:\Windows\system32\cmd.exe /d /s /c "%windir%\System32\REG.exe QUERY HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Cryptography /v MachineGuid"
                                              2⤵
                                                PID:1044
                                                • C:\Windows\System32\reg.exe
                                                  C:\Windows\System32\REG.exe QUERY HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Cryptography /v MachineGuid
                                                  3⤵
                                                    PID:4544
                                                • C:\Windows\system32\cmd.exe
                                                  C:\Windows\system32\cmd.exe /d /s /c "C:\Windows\system32\wbem\wmic.exe /namespace:\\root\wmi path MS_SystemInformation get /value"
                                                  2⤵
                                                    PID:2204
                                                    • C:\Windows\system32\wbem\WMIC.exe
                                                      C:\Windows\system32\wbem\wmic.exe /namespace:\\root\wmi path MS_SystemInformation get /value
                                                      3⤵
                                                        PID:2168
                                                    • C:\Users\Admin\AppData\Local\Temp\bootstrapper\Bootstrapper.exe
                                                      "C:\Users\Admin\AppData\Local\Temp\bootstrapper\Bootstrapper.exe" --type=renderer --field-trial-handle=1744,7714213476102443272,8922437043208898585,131072 --enable-features=WebComponentsV0Enabled --disable-features=CookiesWithoutSameSiteMustBeSecure,OutOfBlinkCors,SameSiteByDefaultCookies,SpareRendererForSitePerProcess --lang=en-US --standard-schemes=binance-resources,app --secure-schemes=binance-resources,app --bypasscsp-schemes --cors-schemes=binance-resources,app --fetch-schemes=binance-resources,app --service-worker-schemes --app-path="C:\Users\Admin\AppData\Local\Temp\bootstrapper\resources\app.asar" --node-integration --no-sandbox --no-zygote --enable-remote-module --background-color=#0E121C --disable-blink-features=Auxclick --enable-websql --disable-electron-site-instance-overrides --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=2736 /prefetch:1
                                                      2⤵
                                                      • Checks computer location settings
                                                      • Suspicious use of SetThreadContext
                                                      • Suspicious behavior: EnumeratesProcesses
                                                      PID:4380
                                                      • C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_wp.exe
                                                        "C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_wp.exe"
                                                        3⤵
                                                          PID:1744
                                                        • C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exe
                                                          "C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exe"
                                                          3⤵
                                                            PID:5012
                                                          • C:\Windows\Microsoft.NET\Framework\v4.0.30319\ilasm.exe
                                                            "C:\Windows\Microsoft.NET\Framework\v4.0.30319\ilasm.exe"
                                                            3⤵
                                                            • System Location Discovery: System Language Discovery
                                                            PID:2072
                                                            • C:\Windows\SysWOW64\WerFault.exe
                                                              C:\Windows\SysWOW64\WerFault.exe -u -p 2072 -s 208
                                                              4⤵
                                                              • Program crash
                                                              PID:3632
                                                          • C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_wp.exe
                                                            "C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_wp.exe"
                                                            3⤵
                                                              PID:4080
                                                            • C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exe
                                                              "C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exe"
                                                              3⤵
                                                              • Suspicious use of NtCreateUserProcessOtherParentProcess
                                                              • System Location Discovery: System Language Discovery
                                                              • Suspicious behavior: EnumeratesProcesses
                                                              PID:732
                                                              • C:\Windows\SysWOW64\WerFault.exe
                                                                C:\Windows\SysWOW64\WerFault.exe -u -p 732 -s 324
                                                                4⤵
                                                                • Program crash
                                                                PID:224
                                                            • C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_wp.exe
                                                              "C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_wp.exe"
                                                              3⤵
                                                              • Suspicious use of NtCreateUserProcessOtherParentProcess
                                                              • System Location Discovery: System Language Discovery
                                                              • Suspicious behavior: EnumeratesProcesses
                                                              PID:2816
                                                              • C:\Windows\SysWOW64\WerFault.exe
                                                                C:\Windows\SysWOW64\WerFault.exe -u -p 2816 -s 312
                                                                4⤵
                                                                • Program crash
                                                                PID:3744
                                                            • C:\Windows\system32\cmd.exe
                                                              C:\Windows\system32\cmd.exe /d /s /c "%windir%\System32\REG.exe QUERY HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Cryptography /v MachineGuid"
                                                              3⤵
                                                                PID:4784
                                                                • C:\Windows\System32\reg.exe
                                                                  C:\Windows\System32\REG.exe QUERY HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Cryptography /v MachineGuid
                                                                  4⤵
                                                                    PID:2412
                                                              • C:\Users\Admin\AppData\Local\Temp\bootstrapper\Bootstrapper.exe
                                                                "C:\Users\Admin\AppData\Local\Temp\bootstrapper\Bootstrapper.exe" --type=gpu-process --field-trial-handle=1744,7714213476102443272,8922437043208898585,131072 --enable-features=WebComponentsV0Enabled --disable-features=CookiesWithoutSameSiteMustBeSecure,OutOfBlinkCors,SameSiteByDefaultCookies,SpareRendererForSitePerProcess --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=MAAAAAAAAADoAAAwAAAAAAAAAAAAAAAAAABgAAAIAAAQAAAAAAAAAAAAAAAAAAAAKAAAAAQAAAAgAAAAAAAAACgAAAAAAAAAMAAAAAAAAAA4AAAAAAAAABAAAAAAAAAAAAAAAAUAAAAQAAAAAAAAAAAAAAAGAAAAEAAAAAAAAAABAAAABQAAABAAAAAAAAAAAQAAAAYAAAA= --mojo-platform-channel-handle=3044 /prefetch:2
                                                                2⤵
                                                                • Suspicious behavior: EnumeratesProcesses
                                                                PID:4440
                                                            • C:\Windows\System32\CompPkgSrv.exe
                                                              C:\Windows\System32\CompPkgSrv.exe -Embedding
                                                              1⤵
                                                                PID:5012
                                                              • C:\Windows\SysWOW64\WerFault.exe
                                                                C:\Windows\SysWOW64\WerFault.exe -pss -s 464 -p 3612 -ip 3612
                                                                1⤵
                                                                  PID:1900
                                                                • C:\Windows\SysWOW64\WerFault.exe
                                                                  C:\Windows\SysWOW64\WerFault.exe -pss -s 496 -p 4552 -ip 4552
                                                                  1⤵
                                                                    PID:5068
                                                                  • C:\Windows\SysWOW64\WerFault.exe
                                                                    C:\Windows\SysWOW64\WerFault.exe -pss -s 524 -p 368 -ip 368
                                                                    1⤵
                                                                      PID:4824
                                                                    • C:\Windows\SysWOW64\WerFault.exe
                                                                      C:\Windows\SysWOW64\WerFault.exe -pss -s 552 -p 2808 -ip 2808
                                                                      1⤵
                                                                        PID:1492
                                                                      • C:\Windows\SysWOW64\WerFault.exe
                                                                        C:\Windows\SysWOW64\WerFault.exe -pss -s 580 -p 1796 -ip 1796
                                                                        1⤵
                                                                          PID:1360
                                                                        • C:\Windows\SysWOW64\WerFault.exe
                                                                          C:\Windows\SysWOW64\WerFault.exe -pss -s 608 -p 2636 -ip 2636
                                                                          1⤵
                                                                            PID:4540
                                                                          • C:\Windows\SysWOW64\WerFault.exe
                                                                            C:\Windows\SysWOW64\WerFault.exe -pss -s 416 -p 2072 -ip 2072
                                                                            1⤵
                                                                              PID:5096
                                                                            • C:\Windows\SysWOW64\WerFault.exe
                                                                              C:\Windows\SysWOW64\WerFault.exe -pss -s 712 -p 732 -ip 732
                                                                              1⤵
                                                                                PID:2824
                                                                              • C:\Windows\SysWOW64\WerFault.exe
                                                                                C:\Windows\SysWOW64\WerFault.exe -pss -s 520 -p 2816 -ip 2816
                                                                                1⤵
                                                                                  PID:1640
                                                                                • C:\Program Files (x86)\Microsoft\EdgeUpdate\MicrosoftEdgeUpdate.exe
                                                                                  "C:\Program Files (x86)\Microsoft\EdgeUpdate\MicrosoftEdgeUpdate.exe" /ping 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-PGFwcCBhcHBpZD0iezhBNjlEMzQ1LUQ1NjQtNDYzYy1BRkYxLUE2OUQ5RTUzMEY5Nn0iIHZlcnNpb249IjEyMy4wLjYzMTIuMTIzIiBuZXh0dmVyc2lvbj0iIiBsYW5nPSJlbiIgYnJhbmQ9IkdHTFMiIGNsaWVudD0iIiBpbnN0YWxsYWdlPSIzIiBpbnN0YWxsZGF0ZXRpbWU9IjE3Mzg5NDU1NzgiIG9vYmVfaW5zdGFsbF90aW1lPSIxMzM4MzQxODAxNjUyMzAwMDAiPjxldmVudCBldmVudHR5cGU9IjMxIiBldmVudHJlc3VsdD0iMSIgZXJyb3Jjb2RlPSIwIiBleHRyYWNvZGUxPSIyMTc5ODYyIiBzeXN0ZW1fdXB0aW1lX3RpY2tzPSI1MzgxMTAzNDkzIi8-PC9hcHA-PC9yZXF1ZXN0Pg
                                                                                  1⤵
                                                                                  • System Location Discovery: System Language Discovery
                                                                                  • System Network Configuration Discovery: Internet Connection Discovery
                                                                                  PID:5016
                                                                                • C:\Program Files (x86)\Microsoft\EdgeUpdate\Install\{08E7AFDE-FA01-4566-A885-BEC56773CC18}\MicrosoftEdge_X64_132.0.2957.140.exe
                                                                                  "C:\Program Files (x86)\Microsoft\EdgeUpdate\Install\{08E7AFDE-FA01-4566-A885-BEC56773CC18}\MicrosoftEdge_X64_132.0.2957.140.exe" --msedge --verbose-logging --do-not-launch-msedge --system-level --channel=stable
                                                                                  1⤵
                                                                                  • Drops file in Program Files directory
                                                                                  PID:1580
                                                                                  • C:\Program Files (x86)\Microsoft\EdgeUpdate\Install\{08E7AFDE-FA01-4566-A885-BEC56773CC18}\EDGEMITMP_75CD3.tmp\setup.exe
                                                                                    "C:\Program Files (x86)\Microsoft\EdgeUpdate\Install\{08E7AFDE-FA01-4566-A885-BEC56773CC18}\EDGEMITMP_75CD3.tmp\setup.exe" --install-archive="C:\Program Files (x86)\Microsoft\EdgeUpdate\Install\{08E7AFDE-FA01-4566-A885-BEC56773CC18}\MicrosoftEdge_X64_132.0.2957.140.exe" --msedge --verbose-logging --do-not-launch-msedge --system-level --channel=stable
                                                                                    2⤵
                                                                                    • Boot or Logon Autostart Execution: Active Setup
                                                                                    • Executes dropped EXE
                                                                                    • Installs/modifies Browser Helper Object
                                                                                    • Drops file in Program Files directory
                                                                                    • Modifies Internet Explorer settings
                                                                                    • Modifies registry class
                                                                                    • System policy modification
                                                                                    PID:3536
                                                                                    • C:\Program Files (x86)\Microsoft\EdgeUpdate\Install\{08E7AFDE-FA01-4566-A885-BEC56773CC18}\EDGEMITMP_75CD3.tmp\setup.exe
                                                                                      "C:\Program Files (x86)\Microsoft\EdgeUpdate\Install\{08E7AFDE-FA01-4566-A885-BEC56773CC18}\EDGEMITMP_75CD3.tmp\setup.exe" --type=crashpad-handler /prefetch:4 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Program Files\MsEdgeCrashpad" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=132.0.6834.160 "--annotation=exe=C:\Program Files (x86)\Microsoft\EdgeUpdate\Install\{08E7AFDE-FA01-4566-A885-BEC56773CC18}\EDGEMITMP_75CD3.tmp\setup.exe" --annotation=plat=Win64 --annotation=prod=Edge --annotation=ver=132.0.2957.140 --initial-client-data=0x224,0x228,0x22c,0x200,0x230,0x7ff7663da818,0x7ff7663da824,0x7ff7663da830
                                                                                      3⤵
                                                                                      • Executes dropped EXE
                                                                                      PID:3280
                                                                                    • C:\Program Files (x86)\Microsoft\EdgeUpdate\Install\{08E7AFDE-FA01-4566-A885-BEC56773CC18}\EDGEMITMP_75CD3.tmp\setup.exe
                                                                                      "C:\Program Files (x86)\Microsoft\EdgeUpdate\Install\{08E7AFDE-FA01-4566-A885-BEC56773CC18}\EDGEMITMP_75CD3.tmp\setup.exe" --msedge --channel=stable --system-level --verbose-logging --create-shortcuts=2 --install-level=1
                                                                                      3⤵
                                                                                      • Executes dropped EXE
                                                                                      • Drops file in System32 directory
                                                                                      • Drops file in Program Files directory
                                                                                      • Modifies data under HKEY_USERS
                                                                                      PID:3368
                                                                                      • C:\Program Files (x86)\Microsoft\EdgeUpdate\Install\{08E7AFDE-FA01-4566-A885-BEC56773CC18}\EDGEMITMP_75CD3.tmp\setup.exe
                                                                                        "C:\Program Files (x86)\Microsoft\EdgeUpdate\Install\{08E7AFDE-FA01-4566-A885-BEC56773CC18}\EDGEMITMP_75CD3.tmp\setup.exe" --type=crashpad-handler /prefetch:4 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Program Files\MsEdgeCrashpad" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=132.0.6834.160 "--annotation=exe=C:\Program Files (x86)\Microsoft\EdgeUpdate\Install\{08E7AFDE-FA01-4566-A885-BEC56773CC18}\EDGEMITMP_75CD3.tmp\setup.exe" --annotation=plat=Win64 --annotation=prod=Edge --annotation=ver=132.0.2957.140 --initial-client-data=0x224,0x228,0x22c,0x200,0x230,0x7ff7663da818,0x7ff7663da824,0x7ff7663da830
                                                                                        4⤵
                                                                                        • Executes dropped EXE
                                                                                        PID:4416
                                                                                    • C:\Program Files (x86)\Microsoft\Edge\Application\132.0.2957.140\Installer\setup.exe
                                                                                      "C:\Program Files (x86)\Microsoft\Edge\Application\132.0.2957.140\Installer\setup.exe" --msedge --channel=stable --register-package-identity --verbose-logging --system-level
                                                                                      3⤵
                                                                                      • Executes dropped EXE
                                                                                      • Suspicious behavior: EnumeratesProcesses
                                                                                      PID:1492
                                                                                      • C:\Program Files (x86)\Microsoft\Edge\Application\132.0.2957.140\Installer\setup.exe
                                                                                        "C:\Program Files (x86)\Microsoft\Edge\Application\132.0.2957.140\Installer\setup.exe" --type=crashpad-handler /prefetch:4 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Program Files\MsEdgeCrashpad" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=132.0.6834.160 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\132.0.2957.140\Installer\setup.exe" --annotation=plat=Win64 --annotation=prod=Edge --annotation=ver=132.0.2957.140 --initial-client-data=0x224,0x228,0x22c,0x200,0x230,0x7ff67adda818,0x7ff67adda824,0x7ff67adda830
                                                                                        4⤵
                                                                                        • Executes dropped EXE
                                                                                        PID:1936
                                                                                    • C:\Program Files (x86)\Microsoft\Edge\Application\132.0.2957.140\Installer\setup.exe
                                                                                      "C:\Program Files (x86)\Microsoft\Edge\Application\132.0.2957.140\Installer\setup.exe" --msedge --channel=stable --remove-deprecated-packages --verbose-logging --system-level
                                                                                      3⤵
                                                                                      • Executes dropped EXE
                                                                                      • Drops file in Program Files directory
                                                                                      PID:3092
                                                                                      • C:\Program Files (x86)\Microsoft\Edge\Application\132.0.2957.140\Installer\setup.exe
                                                                                        "C:\Program Files (x86)\Microsoft\Edge\Application\132.0.2957.140\Installer\setup.exe" --type=crashpad-handler /prefetch:4 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Program Files\MsEdgeCrashpad" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=132.0.6834.160 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\132.0.2957.140\Installer\setup.exe" --annotation=plat=Win64 --annotation=prod=Edge --annotation=ver=132.0.2957.140 --initial-client-data=0x224,0x228,0x22c,0x200,0x230,0x7ff67adda818,0x7ff67adda824,0x7ff67adda830
                                                                                        4⤵
                                                                                        • Executes dropped EXE
                                                                                        • Drops file in Program Files directory
                                                                                        PID:1072
                                                                                    • C:\Program Files (x86)\Microsoft\Edge\Application\132.0.2957.140\Installer\setup.exe
                                                                                      "C:\Program Files (x86)\Microsoft\Edge\Application\132.0.2957.140\Installer\setup.exe" --msedge --channel=stable --update-game-assist-package --verbose-logging --system-level
                                                                                      3⤵
                                                                                      • Executes dropped EXE
                                                                                      PID:2940
                                                                                      • C:\Program Files (x86)\Microsoft\Edge\Application\132.0.2957.140\Installer\setup.exe
                                                                                        "C:\Program Files (x86)\Microsoft\Edge\Application\132.0.2957.140\Installer\setup.exe" --type=crashpad-handler /prefetch:4 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Program Files\MsEdgeCrashpad" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=132.0.6834.160 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\132.0.2957.140\Installer\setup.exe" --annotation=plat=Win64 --annotation=prod=Edge --annotation=ver=132.0.2957.140 --initial-client-data=0x224,0x228,0x22c,0x200,0x230,0x7ff67adda818,0x7ff67adda824,0x7ff67adda830
                                                                                        4⤵
                                                                                        • Executes dropped EXE
                                                                                        PID:2824
                                                                                • C:\Windows\System32\svchost.exe
                                                                                  C:\Windows\System32\svchost.exe -k AppReadiness -p -s AppReadiness
                                                                                  1⤵
                                                                                    PID:1736

                                                                                  Network

                                                                                  MITRE ATT&CK Enterprise v15

                                                                                  Replay Monitor

                                                                                  Loading Replay Monitor...

                                                                                  Downloads

                                                                                  • C:\Program Files (x86)\Microsoft\EdgeUpdate\Install\{08E7AFDE-FA01-4566-A885-BEC56773CC18}\EDGEMITMP_75CD3.tmp\setup.exe

                                                                                    Filesize

                                                                                    6.6MB

                                                                                    MD5

                                                                                    b4c8ad75087b8634d4f04dc6f92da9aa

                                                                                    SHA1

                                                                                    7efaa2472521c79d58c4ef18a258cc573704fb5d

                                                                                    SHA256

                                                                                    522a25568bb503cf8b44807661f31f0921dee91d37691bf399868733205690bf

                                                                                    SHA512

                                                                                    5094505b33a848badcffd6b3b93aad9ad73f391e201dee052376c4f8573ba351f0b8c102131216088ffb38d0ed7b5fe70ba95c3ac2c33a50c993584fe7c435e3

                                                                                  • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe

                                                                                    Filesize

                                                                                    3.7MB

                                                                                    MD5

                                                                                    3646786aea064c0845f5bb1b8e976985

                                                                                    SHA1

                                                                                    a31ba2d2192898d4c0a01511395bdf87b0e53873

                                                                                    SHA256

                                                                                    a129a6de7b90500483226192b260eaca1ee116a007771d421aa3eee38af48d6f

                                                                                    SHA512

                                                                                    145f8abf2ecffd8ecc3745dbd9ab2e360826fa46d6f21dbebece7802b9b5980f4ab19e2dfd180ce0cfb84366f3ac5c87cd1b74a085e1a0dd620b6c097900e0f4

                                                                                  • C:\Program Files\msedge_installer.log

                                                                                    Filesize

                                                                                    70KB

                                                                                    MD5

                                                                                    75fe421d567b1341d1c9297ed96215a1

                                                                                    SHA1

                                                                                    8b27294bae4c72515afa8a110d76a835103c051f

                                                                                    SHA256

                                                                                    c914bbe6df3409a531db9c29f0cc592a077e195778ef7b8e0d020a7f1e56a0a6

                                                                                    SHA512

                                                                                    8c1aad81018b7e61bad92d26cb67fc54b552af1f491c36b26f633705b759f7f3ac4144afdf8e6dd638b9ea7b6527065cbe77b3b0324f602730b46b998789c8ea

                                                                                  • C:\Program Files\msedge_installer.log

                                                                                    Filesize

                                                                                    96KB

                                                                                    MD5

                                                                                    e8eda732cfd20d1609a2bb7c97f107da

                                                                                    SHA1

                                                                                    04ae7b163c475cf33f8cd823fd31847da3ce3fb2

                                                                                    SHA256

                                                                                    1cc69c718f64488ae7d9a464f469effa66bf63dee5799f5bcb92ccefe42d9212

                                                                                    SHA512

                                                                                    22e2fb2f18cc38d31f0b01bad4706c787f08f7c5b6e4ffa713e1ce50e583603153d0454d5bdb989ee9d9b497fead6cce1325814e58901fabaddef027e8440fd6

                                                                                  • C:\Program Files\msedge_installer.log

                                                                                    Filesize

                                                                                    100KB

                                                                                    MD5

                                                                                    71483bfeebd11c5cadcdf3ddaf52e8f2

                                                                                    SHA1

                                                                                    97c2194784133ee9700cc707f5e1a0ca1c624a61

                                                                                    SHA256

                                                                                    b92b216c4ccfbcd69ecd9b36c310d54092c00a088d75a5c154b65ba35d1bce97

                                                                                    SHA512

                                                                                    b09e2989c9b0ea6d09561e22933c2c53e7ad8987a6ba255c203e094e38b8ec3d421499611049f606ac311e171f8ee4d00fbad963bd2b9e71042eb110b51f4f1d

                                                                                  • C:\Program Files\msedge_installer.log

                                                                                    Filesize

                                                                                    102KB

                                                                                    MD5

                                                                                    fa304c4b2f7024557c51b75595a15c9b

                                                                                    SHA1

                                                                                    0015fce4255e66e87aae95f807b31c1730a88ff1

                                                                                    SHA256

                                                                                    5d04be807c87491f9fd83dfedba4c1256b24b9bddae215e80222d23eb77a6cbf

                                                                                    SHA512

                                                                                    e6fde62123b7321d79a99e6fddcc06545f56e4edf7e915f8c9d7a0e094c1a3047fe0e91213a9dfbb64aa1c920a28849afd390147a04e8de223e4ac4a6b32a9ec

                                                                                  • C:\Users\Admin\AppData\Roaming\Binance\Code Cache\js\index

                                                                                    Filesize

                                                                                    24B

                                                                                    MD5

                                                                                    54cb446f628b2ea4a5bce5769910512e

                                                                                    SHA1

                                                                                    c27ca848427fe87f5cf4d0e0e3cd57151b0d820d

                                                                                    SHA256

                                                                                    fbcfe23a2ecb82b7100c50811691dde0a33aa3da8d176be9882a9db485dc0f2d

                                                                                    SHA512

                                                                                    8f6ed2e91aed9bd415789b1dbe591e7eab29f3f1b48fdfa5e864d7bf4ae554acc5d82b4097a770dabc228523253623e4296c5023cf48252e1b94382c43123cb0

                                                                                  • C:\Users\Admin\AppData\Roaming\Binance\Crashpad\settings.dat

                                                                                    Filesize

                                                                                    40B

                                                                                    MD5

                                                                                    107c4c72f55d8e95d6357fb369cc1269

                                                                                    SHA1

                                                                                    9346c5f2e4d63fd2a629ae03fa94e02dd61428ae

                                                                                    SHA256

                                                                                    95e5f0fd5e45b22d45906a8a6462334b25ebd83f6700ff99a0199bd4003c0a4d

                                                                                    SHA512

                                                                                    a8de3f61f311c8ece44e5130192edb7d017ceb2358dfb6d2c4c3b4f505eccbb6ecc164e91100619b52e8f1715d1c0aa3a328355ec4d658af0f5a34491b8324bc

                                                                                  • C:\Users\Admin\AppData\Roaming\Binance\Partitions\binance.app\Code Cache\js\index-dir\temp-index

                                                                                    Filesize

                                                                                    48B

                                                                                    MD5

                                                                                    949f1d6c390d8c1752ddd0855dc2b957

                                                                                    SHA1

                                                                                    765516b71f2e5be7bb9e6c6c1a90496349b62a9c

                                                                                    SHA256

                                                                                    5fc88ab9f5cd215af8abd60f670bca60f6badb37265ded9ac220da81c7d765bd

                                                                                    SHA512

                                                                                    a7111f49aa2f44d6027ccdf5a248cd9b8d7f1b046daeb581ad8e6f973a4e2d3edae53117c52310c68c1a7c3d7f30d78b5621da7c0a7f4f715eb03d040bf5481f

                                                                                  • C:\Users\Admin\AppData\Roaming\Binance\Partitions\binance.app\Code Cache\wasm\index-dir\temp-index

                                                                                    Filesize

                                                                                    48B

                                                                                    MD5

                                                                                    53a69230c9b108d08f0edf14239aa54d

                                                                                    SHA1

                                                                                    64d094e825e581362b76a7311fe9c5727152f74d

                                                                                    SHA256

                                                                                    dfb16d1fed4f496b249d3b3f71f8bf849f943694df2edb0d667fdc174a19773f

                                                                                    SHA512

                                                                                    0ad230ba43b5f2000c616dca0a62cb568ef557cd513281a08d41d064dcca2a4b6e51caa55d6145898a816bf4b5bca235d8318f245d8d8d96fb08f2fcb2451617

                                                                                  • C:\Users\Admin\AppData\Roaming\Binance\Partitions\binance.app\Local Storage\leveldb\CURRENT

                                                                                    Filesize

                                                                                    16B

                                                                                    MD5

                                                                                    46295cac801e5d4857d09837238a6394

                                                                                    SHA1

                                                                                    44e0fa1b517dbf802b18faf0785eeea6ac51594b

                                                                                    SHA256

                                                                                    0f1bad70c7bd1e0a69562853ec529355462fcd0423263a3d39d6d0d70b780443

                                                                                    SHA512

                                                                                    8969402593f927350e2ceb4b5bc2a277f3754697c1961e3d6237da322257fbab42909e1a742e22223447f3a4805f8d8ef525432a7c3515a549e984d3eff72b23

                                                                                  • C:\Users\Admin\AppData\Roaming\Binance\Partitions\binance.app\Local Storage\leveldb\MANIFEST-000001

                                                                                    Filesize

                                                                                    41B

                                                                                    MD5

                                                                                    5af87dfd673ba2115e2fcf5cfdb727ab

                                                                                    SHA1

                                                                                    d5b5bbf396dc291274584ef71f444f420b6056f1

                                                                                    SHA256

                                                                                    f9d31b278e215eb0d0e9cd709edfa037e828f36214ab7906f612160fead4b2b4

                                                                                    SHA512

                                                                                    de34583a7dbafe4dd0dc0601e8f6906b9bc6a00c56c9323561204f77abbc0dc9007c480ffe4092ff2f194d54616caf50aecbd4a1e9583cae0c76ad6dd7c2375b

                                                                                  • C:\Users\Admin\AppData\Roaming\Binance\Partitions\binance.app\f7a6b975-f570-46b6-b72a-0dcf5b64878e.tmp

                                                                                    Filesize

                                                                                    266B

                                                                                    MD5

                                                                                    483542a79e80d6afe98c845d435c143a

                                                                                    SHA1

                                                                                    7ccb6165a252d34e30ff857fc96ca306de15fd3a

                                                                                    SHA256

                                                                                    2a5bad7353614c327edd52893537a3aa7138bc003a7f9d715fbf3d462020c80c

                                                                                    SHA512

                                                                                    45cb000c9116887471c21a76eb7e4dd304fa639289744eead4b9b17287ed7f268542764eb5132d6c68ab1d20b4438618235c79fa3ed9c7e76a0fa39fd0afae46

                                                                                  • C:\Users\Admin\AppData\Roaming\Binance\Partitions\binance.embed-app\Cache\data_0

                                                                                    Filesize

                                                                                    44KB

                                                                                    MD5

                                                                                    d4fbf42c937d28f40bbe69eab6de4e2e

                                                                                    SHA1

                                                                                    4f71bac71ed5e04809e63d605a6b1e4bf9cf5a66

                                                                                    SHA256

                                                                                    2d9ae94abbfb6efaed76193ca0cfec18aa31204c7ddf4d85d19c10ca58652cf9

                                                                                    SHA512

                                                                                    b4fabe64fe8459f5e76df24a6fc327983691d5a36ee19869d78e80b558499a7ee62b0acd63f53adfd54361b09f0be1b995af1def9c4484a873e4557f108f1549

                                                                                  • C:\Users\Admin\AppData\Roaming\Binance\Partitions\binance.embed-app\Cache\data_1

                                                                                    Filesize

                                                                                    264KB

                                                                                    MD5

                                                                                    530616f8196d29295d0f57f9d6a706fd

                                                                                    SHA1

                                                                                    128d4d6558bc5748431eb277ff8da2db380cbc06

                                                                                    SHA256

                                                                                    b432cff39f88e535b33638b445b769451f85adc869d5dc1cd5401978dc86c78a

                                                                                    SHA512

                                                                                    c38cc02078b5f446cf93e31bf8a3544a9a0d09f9a17412e02207d20d8d65f3616e120cdca80dd0a2e98f582eeb02092649e88ebfdbbba17c745fb7862705c727

                                                                                  • C:\Users\Admin\AppData\Roaming\Binance\Partitions\binance.embed-app\Network Persistent State

                                                                                    Filesize

                                                                                    187B

                                                                                    MD5

                                                                                    53d78c860595d4a80df62723916e35fe

                                                                                    SHA1

                                                                                    96c1681e7f01646561cc34105635185105f16cdc

                                                                                    SHA256

                                                                                    fadd70320bf4be1e31268c19fa82fe6e60b1fde0440fb37bda5d1cf50be56bd6

                                                                                    SHA512

                                                                                    2b1c6e0460f0ac0de4ec51744f0a3ad64403286b9c0302cdf98cb85718205b389e0a7213418eaa84cc852a5018e71295952eeade136ffcce5e22cae9d123d5a8

                                                                                  • C:\Users\Admin\AppData\Roaming\Binance\Partitions\binance.microapp\959cd0cb-e8da-4016-9734-66370a89d487.tmp

                                                                                    Filesize

                                                                                    59B

                                                                                    MD5

                                                                                    2800881c775077e1c4b6e06bf4676de4

                                                                                    SHA1

                                                                                    2873631068c8b3b9495638c865915be822442c8b

                                                                                    SHA256

                                                                                    226eec4486509917aa336afebd6ff65777b75b65f1fb06891d2a857a9421a974

                                                                                    SHA512

                                                                                    e342407ab65cc68f1b3fd706cd0a37680a0864ffd30a6539730180ede2cdcd732cc97ae0b9ef7db12da5c0f83e429df0840dbf7596aca859a0301665e517377b

                                                                                  • C:\Users\Admin\AppData\Roaming\Binance\Partitions\binance.web-page\Cache\data_2

                                                                                    Filesize

                                                                                    8KB

                                                                                    MD5

                                                                                    0962291d6d367570bee5454721c17e11

                                                                                    SHA1

                                                                                    59d10a893ef321a706a9255176761366115bedcb

                                                                                    SHA256

                                                                                    ec1702806f4cc7c42a82fc2b38e89835fde7c64bb32060e0823c9077ca92efb7

                                                                                    SHA512

                                                                                    f555e961b69e09628eaf9c61f465871e6984cd4d31014f954bb747351dad9cea6d17c1db4bca2c1eb7f187cb5f3c0518748c339c8b43bbd1dbd94aeaa16f58ed

                                                                                  • C:\Users\Admin\AppData\Roaming\Binance\Partitions\binance.web-page\Cache\data_3

                                                                                    Filesize

                                                                                    8KB

                                                                                    MD5

                                                                                    41876349cb12d6db992f1309f22df3f0

                                                                                    SHA1

                                                                                    5cf26b3420fc0302cd0a71e8d029739b8765be27

                                                                                    SHA256

                                                                                    e09f42c398d688dce168570291f1f92d079987deda3099a34adb9e8c0522b30c

                                                                                    SHA512

                                                                                    e9a4fc1f7cb6ae2901f8e02354a92c4aaa7a53c640dcf692db42a27a5acc2a3bfb25a0de0eb08ab53983132016e7d43132ea4292e439bb636aafd53fb6ef907e

                                                                                  • C:\Users\Admin\AppData\Roaming\Binance\Partitions\binance.web-page\e664e2d0-4a66-4659-b65d-48e17bf7bbb3.tmp

                                                                                    Filesize

                                                                                    57B

                                                                                    MD5

                                                                                    58127c59cb9e1da127904c341d15372b

                                                                                    SHA1

                                                                                    62445484661d8036ce9788baeaba31d204e9a5fc

                                                                                    SHA256

                                                                                    be4b8924ab38e8acf350e6e3b9f1f63a1a94952d8002759acd6946c4d5d0b5de

                                                                                    SHA512

                                                                                    8d1815b277a93ad590ff79b6f52c576cf920c38c4353c24193f707d66884c942f39ff3989530055d2fade540ade243b41b6eb03cd0cc361c3b5d514cca28b50a

                                                                                  • C:\Users\Admin\AppData\Roaming\Binance\app-store.json

                                                                                    Filesize

                                                                                    3KB

                                                                                    MD5

                                                                                    b93b4da3546c212851306bc8d3cdf6c4

                                                                                    SHA1

                                                                                    8548800281739a235d62cff2f85701590ddb66d3

                                                                                    SHA256

                                                                                    054127b0aa2086475a3aa2f8727709878fbbbc7ca3c092b82b9ff832d3fe553d

                                                                                    SHA512

                                                                                    735a15432e7624d59a556409320fd9fd1d223ffe0b90900de4ec338341494f31c2ea4b92c8025ac3eee25c93e83ff741351e6bc9c98c962beb46227be6ab4cc2

                                                                                  • C:\Users\Admin\AppData\Roaming\Binance\app-store.json

                                                                                    Filesize

                                                                                    4KB

                                                                                    MD5

                                                                                    1fddb12c94ca8b72743fd796a73aa6a3

                                                                                    SHA1

                                                                                    d5c12870f108270ea3f692acacc1dd54dc8deb72

                                                                                    SHA256

                                                                                    a84df4c16d9225a793b706d06799603dc4ad81876c7794feffc6f8cf661ee181

                                                                                    SHA512

                                                                                    0c1437cac054961eabd520ff336bb3e67ff516efbf9b8eb1a7d30732a8da03040972a58ee2595c3c8913873593909f489708e6b9e0621e95439ce12e6fd45620

                                                                                  • C:\Users\Admin\AppData\Roaming\Binance\app-store.json

                                                                                    Filesize

                                                                                    4KB

                                                                                    MD5

                                                                                    c5b50d237d73c69b85b040968a3fbf6f

                                                                                    SHA1

                                                                                    30129f9573bde712920b9edfda2f862d1a49798f

                                                                                    SHA256

                                                                                    06c42cd8c29e34fd5cb8f072b0d41742c7e70d81b3ab2fb489712be34e1e61ea

                                                                                    SHA512

                                                                                    1e07967f30c4683f5a7294e3a7e8167e073c7f4ca9654bb82e1eebd48a457edc38705a41f47a8a6c801d8a3541336dd1e141c6201d81506542ee888555705265

                                                                                  • C:\Users\Admin\AppData\Roaming\Binance\en-US-9-0.bdic

                                                                                    Filesize

                                                                                    441KB

                                                                                    MD5

                                                                                    a78ad14e77147e7de3647e61964c0335

                                                                                    SHA1

                                                                                    cecc3dd41f4cea0192b24300c71e1911bd4fce45

                                                                                    SHA256

                                                                                    0d6803758ff8f87081fafd62e90f0950dfb2dd7991e9607fe76a8f92d0e893fa

                                                                                    SHA512

                                                                                    dde24d5ad50d68fc91e9e325d31e66ef8f624b6bb3a07d14ffed1104d3ab5f4ef1d7969a5cde0dfbb19cb31c506f7de97af67c2f244f7e7e8e10648ea8321101

                                                                                  • C:\Users\Admin\AppData\Roaming\Binance\logs\main.log

                                                                                    Filesize

                                                                                    46KB

                                                                                    MD5

                                                                                    20b135be052068b4d144f07577b8d546

                                                                                    SHA1

                                                                                    25526a5b0790295a6a4b06c29a8728657425519a

                                                                                    SHA256

                                                                                    5ed584b706082dfcd5150fdeca4e27123e3731039355b3d1000b20ee3302d290

                                                                                    SHA512

                                                                                    2e8f0748ef9c8a00fee2829c4e7d6f51ec4070dfbb5a3a963577c1fd041707eb570d764fb43f4b5ae133fc8e5031ab5b61e875a827684d529db75abdfa38aa4d

                                                                                  • C:\Users\Admin\AppData\Roaming\Binance\sentry\scope_v2.json

                                                                                    Filesize

                                                                                    5KB

                                                                                    MD5

                                                                                    0697dc8089f52e5f1c158258902ed906

                                                                                    SHA1

                                                                                    0c27ac0d537285a7c7f6026f182d792dcb5db7aa

                                                                                    SHA256

                                                                                    e0e064bc8ff53a01ca5815ee2ed92ee434cfad158beb53d9c92f0aee12ef2301

                                                                                    SHA512

                                                                                    0a97f23ba207d3e1933042b84157c3ed2bb4a963bf5645da455351590399df6059b54d8818bce57262d1cb9a4005620c90bd4014b6ab8f1ad83f15471d623222

                                                                                  • memory/368-148-0x0000000001540000-0x0000000001940000-memory.dmp

                                                                                    Filesize

                                                                                    4.0MB

                                                                                  • memory/368-106-0x0000000000400000-0x0000000000481000-memory.dmp

                                                                                    Filesize

                                                                                    516KB

                                                                                  • memory/732-283-0x0000000000400000-0x0000000000481000-memory.dmp

                                                                                    Filesize

                                                                                    516KB

                                                                                  • memory/732-310-0x00000000010C0000-0x00000000014C0000-memory.dmp

                                                                                    Filesize

                                                                                    4.0MB

                                                                                  • memory/732-315-0x00007FFB17230000-0x00007FFB17425000-memory.dmp

                                                                                    Filesize

                                                                                    2.0MB

                                                                                  • memory/1240-156-0x0000000076690000-0x00000000768A5000-memory.dmp

                                                                                    Filesize

                                                                                    2.1MB

                                                                                  • memory/1240-145-0x0000000001850000-0x0000000001C50000-memory.dmp

                                                                                    Filesize

                                                                                    4.0MB

                                                                                  • memory/1240-149-0x00007FFB17230000-0x00007FFB17425000-memory.dmp

                                                                                    Filesize

                                                                                    2.0MB

                                                                                  • memory/1796-10-0x0000000000400000-0x0000000000481000-memory.dmp

                                                                                    Filesize

                                                                                    516KB

                                                                                  • memory/1796-136-0x0000000076690000-0x00000000768A5000-memory.dmp

                                                                                    Filesize

                                                                                    2.1MB

                                                                                  • memory/1796-124-0x0000000000D70000-0x0000000001170000-memory.dmp

                                                                                    Filesize

                                                                                    4.0MB

                                                                                  • memory/1796-130-0x00007FFB17230000-0x00007FFB17425000-memory.dmp

                                                                                    Filesize

                                                                                    2.0MB

                                                                                  • memory/2072-281-0x0000000000400000-0x0000000000481000-memory.dmp

                                                                                    Filesize

                                                                                    516KB

                                                                                  • memory/2072-311-0x0000000001670000-0x0000000001A70000-memory.dmp

                                                                                    Filesize

                                                                                    4.0MB

                                                                                  • memory/2636-114-0x0000000000D70000-0x0000000001170000-memory.dmp

                                                                                    Filesize

                                                                                    4.0MB

                                                                                  • memory/2636-5-0x0000000000400000-0x0000000000481000-memory.dmp

                                                                                    Filesize

                                                                                    516KB

                                                                                  • memory/2636-6-0x0000000000400000-0x0000000000481000-memory.dmp

                                                                                    Filesize

                                                                                    516KB

                                                                                  • memory/2636-123-0x0000000000D70000-0x0000000001170000-memory.dmp

                                                                                    Filesize

                                                                                    4.0MB

                                                                                  • memory/2636-134-0x0000000076690000-0x00000000768A5000-memory.dmp

                                                                                    Filesize

                                                                                    2.1MB

                                                                                  • memory/2636-127-0x00007FFB17230000-0x00007FFB17425000-memory.dmp

                                                                                    Filesize

                                                                                    2.0MB

                                                                                  • memory/2808-121-0x00000000018D0000-0x0000000001CD0000-memory.dmp

                                                                                    Filesize

                                                                                    4.0MB

                                                                                  • memory/2808-8-0x0000000000400000-0x0000000000481000-memory.dmp

                                                                                    Filesize

                                                                                    516KB

                                                                                  • memory/2808-132-0x00007FFB17230000-0x00007FFB17425000-memory.dmp

                                                                                    Filesize

                                                                                    2.0MB

                                                                                  • memory/2808-138-0x0000000076690000-0x00000000768A5000-memory.dmp

                                                                                    Filesize

                                                                                    2.1MB

                                                                                  • memory/2816-314-0x00007FFB17230000-0x00007FFB17425000-memory.dmp

                                                                                    Filesize

                                                                                    2.0MB

                                                                                  • memory/2816-285-0x0000000000400000-0x0000000000481000-memory.dmp

                                                                                    Filesize

                                                                                    516KB

                                                                                  • memory/2816-313-0x0000000000F70000-0x0000000001370000-memory.dmp

                                                                                    Filesize

                                                                                    4.0MB

                                                                                  • memory/3000-163-0x00007FFB17230000-0x00007FFB17425000-memory.dmp

                                                                                    Filesize

                                                                                    2.0MB

                                                                                  • memory/3000-162-0x0000000000C60000-0x0000000001060000-memory.dmp

                                                                                    Filesize

                                                                                    4.0MB

                                                                                  • memory/3000-154-0x0000000000620000-0x000000000062A000-memory.dmp

                                                                                    Filesize

                                                                                    40KB

                                                                                  • memory/3000-165-0x0000000076690000-0x00000000768A5000-memory.dmp

                                                                                    Filesize

                                                                                    2.1MB

                                                                                  • memory/3048-12-0x00007FFB16EA0000-0x00007FFB16EA1000-memory.dmp

                                                                                    Filesize

                                                                                    4KB

                                                                                  • memory/3612-109-0x0000000000400000-0x0000000000481000-memory.dmp

                                                                                    Filesize

                                                                                    516KB

                                                                                  • memory/3612-157-0x0000000001440000-0x0000000001840000-memory.dmp

                                                                                    Filesize

                                                                                    4.0MB

                                                                                  • memory/4468-158-0x0000000001200000-0x0000000001600000-memory.dmp

                                                                                    Filesize

                                                                                    4.0MB

                                                                                  • memory/4468-135-0x0000000000990000-0x000000000099A000-memory.dmp

                                                                                    Filesize

                                                                                    40KB

                                                                                  • memory/4552-151-0x00007FFB17230000-0x00007FFB17425000-memory.dmp

                                                                                    Filesize

                                                                                    2.0MB

                                                                                  • memory/4552-84-0x0000000000400000-0x0000000000481000-memory.dmp

                                                                                    Filesize

                                                                                    516KB

                                                                                  • memory/4552-153-0x0000000076690000-0x00000000768A5000-memory.dmp

                                                                                    Filesize

                                                                                    2.1MB

                                                                                  • memory/4552-142-0x0000000001400000-0x0000000001800000-memory.dmp

                                                                                    Filesize

                                                                                    4.0MB

                                                                                  • memory/4832-146-0x0000000001510000-0x0000000001910000-memory.dmp

                                                                                    Filesize

                                                                                    4.0MB