Analysis

  • max time kernel
    210s
  • max time network
    209s
  • platform
    windows11-21h2_x64
  • resource
    win11-20241007-en
  • resource tags

    arch:x64arch:x86image:win11-20241007-enlocale:en-usos:windows11-21h2-x64system
  • submitted
    11-01-2025 17:05

General

  • Target

    Client-built.exe

  • Size

    78KB

  • MD5

    ae435f868dfdec6d306fa6c99e832504

  • SHA1

    a3c32006a91a02a378d5cf46986001a3da127378

  • SHA256

    879434e9b5f6398a3bcc7dbeeccc41a7a8284a6d9029c1fe3db8353e61463783

  • SHA512

    19a2c3a81fad52259464b41cdc5148781ce3e4795b42bf096a1134237c2087a082e0b0fb14366947036fb472178c7373211b09e50085b1ce3928518bfa13bb3d

  • SSDEEP

    1536:52WjO8XeEXFh5P7v88wbjNrfxCXhRoKV6+V+5PIC:5Zv5PDwbjNrmAE+JIC

Malware Config

Extracted

Family

discordrat

Attributes
  • discord_token

    MTMxNzk1MTI1OTgxODMzMjI1MQ.G93Qk4.H4mAeTd_60O2WKIyzj2t9Gqxi0w69VeDvI9dT0

  • server_id

    1317948076505169970

Signatures

  • Discord RAT

    A RAT written in C# using Discord as a C2.

  • Discordrat family
  • Suspicious use of NtCreateUserProcessOtherParentProcess 1 IoCs
  • Indicator Removal: Clear Windows Event Logs 1 TTPs 1 IoCs

    Clear Windows Event Logs to hide the activity of an intrusion.

  • Legitimate hosting services abused for malware hosting/C2 1 TTPs 17 IoCs
  • Drops file in System32 directory 16 IoCs
  • Suspicious use of SetThreadContext 1 IoCs
  • Browser Information Discovery 1 TTPs

    Enumerate browser information.

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Checks SCSI registry key(s) 3 TTPs 6 IoCs

    SCSI information is often read in order to detect sandboxing environments.

  • Enumerates system info in registry 2 TTPs 3 IoCs
  • Modifies data under HKEY_USERS 64 IoCs
  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs
  • Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 9 IoCs
  • Suspicious use of AdjustPrivilegeToken 64 IoCs
  • Suspicious use of FindShellTrayWindow 25 IoCs
  • Suspicious use of SendNotifyMessage 12 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs

Processes

  • C:\Windows\system32\winlogon.exe
    winlogon.exe
    1⤵
      PID:636
      • C:\Windows\system32\dwm.exe
        "dwm.exe"
        2⤵
          PID:388
        • C:\Windows\System32\dllhost.exe
          C:\Windows\System32\dllhost.exe /Processid:{f74aafd1-762b-4339-b748-ff2c03fac089}
          2⤵
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of AdjustPrivilegeToken
          • Suspicious use of WriteProcessMemory
          PID:3128
      • C:\Windows\system32\lsass.exe
        C:\Windows\system32\lsass.exe
        1⤵
        • Drops file in System32 directory
        PID:688
      • C:\Windows\system32\svchost.exe
        C:\Windows\system32\svchost.exe -k DcomLaunch -p -s LSM
        1⤵
          PID:984
        • C:\Windows\system32\svchost.exe
          C:\Windows\system32\svchost.exe -k netsvcs -p -s gpsvc
          1⤵
            PID:768
          • C:\Windows\System32\svchost.exe
            C:\Windows\System32\svchost.exe -k LocalServiceNetworkRestricted -p -s lmhosts
            1⤵
              PID:1028
            • C:\Windows\System32\svchost.exe
              C:\Windows\System32\svchost.exe -k LocalSystemNetworkRestricted -p -s NcbService
              1⤵
                PID:1052
              • C:\Windows\system32\svchost.exe
                C:\Windows\system32\svchost.exe -k netsvcs -p -s Schedule
                1⤵
                  PID:1124
                • C:\Windows\system32\svchost.exe
                  C:\Windows\system32\svchost.exe -k LocalServiceNetworkRestricted -p -s TimeBrokerSvc
                  1⤵
                    PID:1140
                  • C:\Windows\system32\svchost.exe
                    C:\Windows\system32\svchost.exe -k LocalService -p -s nsi
                    1⤵
                      PID:1152
                    • C:\Windows\System32\svchost.exe
                      C:\Windows\System32\svchost.exe -k netprofm -p -s netprofm
                      1⤵
                        PID:1240
                      • C:\Windows\system32\svchost.exe
                        C:\Windows\system32\svchost.exe -k netsvcs -p -s ProfSvc
                        1⤵
                          PID:1276
                        • C:\Windows\system32\svchost.exe
                          C:\Windows\system32\svchost.exe -k LocalService -p -s DispBrokerDesktopSvc
                          1⤵
                            PID:1344
                          • C:\Windows\system32\svchost.exe
                            C:\Windows\system32\svchost.exe -k netsvcs -p -s UserManager
                            1⤵
                              PID:1452
                              • C:\Windows\system32\sihost.exe
                                sihost.exe
                                2⤵
                                  PID:2540
                              • C:\Windows\System32\svchost.exe
                                C:\Windows\System32\svchost.exe -k LocalServiceNetworkRestricted -p -s EventLog
                                1⤵
                                • Indicator Removal: Clear Windows Event Logs
                                PID:1508
                              • C:\Windows\System32\svchost.exe
                                C:\Windows\System32\svchost.exe -k netsvcs -p -s Themes
                                1⤵
                                  PID:1600
                                • C:\Windows\system32\svchost.exe
                                  C:\Windows\system32\svchost.exe -k LocalService -p -s EventSystem
                                  1⤵
                                    PID:1608
                                  • C:\Windows\system32\svchost.exe
                                    C:\Windows\system32\svchost.exe -k netsvcs -p -s SENS
                                    1⤵
                                      PID:1712
                                    • C:\Windows\system32\svchost.exe
                                      C:\Windows\system32\svchost.exe -k NetworkService -p
                                      1⤵
                                        PID:1732
                                      • C:\Windows\System32\svchost.exe
                                        C:\Windows\System32\svchost.exe -k LocalSystemNetworkRestricted -p -s AudioEndpointBuilder
                                        1⤵
                                          PID:1740
                                        • C:\Windows\system32\svchost.exe
                                          C:\Windows\system32\svchost.exe -k LocalServiceNetworkRestricted -p -s Dhcp
                                          1⤵
                                            PID:1824
                                          • C:\Windows\System32\svchost.exe
                                            C:\Windows\System32\svchost.exe -k LocalServiceNetworkRestricted -p
                                            1⤵
                                              PID:1924
                                            • C:\Windows\System32\svchost.exe
                                              C:\Windows\System32\svchost.exe -k LocalServiceNetworkRestricted -p
                                              1⤵
                                                PID:1992
                                              • C:\Windows\system32\svchost.exe
                                                C:\Windows\system32\svchost.exe -k LocalServiceNetworkRestricted -p
                                                1⤵
                                                  PID:2000
                                                • C:\Windows\System32\svchost.exe
                                                  C:\Windows\System32\svchost.exe -k netsvcs -p -s ShellHWDetection
                                                  1⤵
                                                    PID:1968
                                                  • C:\Windows\system32\svchost.exe
                                                    C:\Windows\system32\svchost.exe -k appmodel -p -s StateRepository
                                                    1⤵
                                                      PID:2052
                                                    • C:\Windows\System32\spoolsv.exe
                                                      C:\Windows\System32\spoolsv.exe
                                                      1⤵
                                                        PID:2132
                                                      • C:\Windows\System32\svchost.exe
                                                        C:\Windows\System32\svchost.exe -k NetworkService -p -s LanmanWorkstation
                                                        1⤵
                                                        • Suspicious use of AdjustPrivilegeToken
                                                        PID:2236
                                                      • C:\Windows\System32\svchost.exe
                                                        C:\Windows\System32\svchost.exe -k LocalServiceNetworkRestricted -s RmSvc
                                                        1⤵
                                                          PID:2292
                                                        • C:\Windows\system32\svchost.exe
                                                          C:\Windows\system32\svchost.exe -k UnistackSvcGroup -s CDPUserSvc
                                                          1⤵
                                                            PID:2564
                                                          • C:\Windows\system32\svchost.exe
                                                            C:\Windows\system32\svchost.exe -k NetworkServiceNetworkRestricted -p -s PolicyAgent
                                                            1⤵
                                                              PID:2580
                                                            • C:\Windows\system32\svchost.exe
                                                              C:\Windows\system32\svchost.exe -k netsvcs -p -s IKEEXT
                                                              1⤵
                                                                PID:2584
                                                              • C:\Windows\system32\svchost.exe
                                                                C:\Windows\system32\svchost.exe -k NetworkService -p
                                                                1⤵
                                                                • Drops file in System32 directory
                                                                • Modifies data under HKEY_USERS
                                                                PID:2652
                                                              • C:\Windows\system32\svchost.exe
                                                                C:\Windows\system32\svchost.exe -k netsvcs -p -s LanmanServer
                                                                1⤵
                                                                  PID:2736
                                                                • C:\Windows\sysmon.exe
                                                                  C:\Windows\sysmon.exe
                                                                  1⤵
                                                                    PID:2748
                                                                  • C:\Windows\system32\svchost.exe
                                                                    C:\Windows\system32\svchost.exe -k netsvcs -p -s Winmgmt
                                                                    1⤵
                                                                    • Suspicious use of AdjustPrivilegeToken
                                                                    PID:2776
                                                                  • C:\Windows\System32\svchost.exe
                                                                    C:\Windows\System32\svchost.exe -k LocalSystemNetworkRestricted -p -s TrkWks
                                                                    1⤵
                                                                      PID:2784
                                                                    • C:\Windows\system32\svchost.exe
                                                                      C:\Windows\system32\svchost.exe -k netsvcs -p -s WpnService
                                                                      1⤵
                                                                        PID:2792
                                                                      • C:\Windows\system32\wbem\unsecapp.exe
                                                                        C:\Windows\system32\wbem\unsecapp.exe -Embedding
                                                                        1⤵
                                                                          PID:780
                                                                        • C:\Windows\Explorer.EXE
                                                                          C:\Windows\Explorer.EXE
                                                                          1⤵
                                                                          • Suspicious behavior: GetForegroundWindowSpam
                                                                          • Suspicious use of AdjustPrivilegeToken
                                                                          PID:3276
                                                                          • C:\Users\Admin\AppData\Local\Temp\Client-built.exe
                                                                            "C:\Users\Admin\AppData\Local\Temp\Client-built.exe"
                                                                            2⤵
                                                                            • Suspicious use of NtCreateUserProcessOtherParentProcess
                                                                            • Suspicious use of SetThreadContext
                                                                            • Suspicious behavior: EnumeratesProcesses
                                                                            • Suspicious use of AdjustPrivilegeToken
                                                                            • Suspicious use of WriteProcessMemory
                                                                            PID:3472
                                                                            • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                                                              "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument http://www.google.com/
                                                                              3⤵
                                                                              • Enumerates system info in registry
                                                                              • Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
                                                                              • Suspicious use of FindShellTrayWindow
                                                                              • Suspicious use of SendNotifyMessage
                                                                              PID:2668
                                                                              • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                                                                "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=90.0.4430.212 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=90.0.818.66 --initial-client-data=0x120,0x124,0x128,0xfc,0x12c,0x7fff70093cb8,0x7fff70093cc8,0x7fff70093cd8
                                                                                4⤵
                                                                                  PID:3116
                                                                                • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                                                                  "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=1900,15102335431301368913,16631419366385286489,131072 --gpu-preferences=SAAAAAAAAADgAAAwAAAAAAAAAAAAAAAAAABgAAAAAAAoAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAB4AAAAAAAAAHgAAAAAAAAAKAAAAAQAAAAgAAAAAAAAACgAAAAAAAAAMAAAAAAAAAA4AAAAAAAAABAAAAAAAAAAAAAAAAUAAAAQAAAAAAAAAAAAAAAGAAAAEAAAAAAAAAABAAAABQAAABAAAAAAAAAAAQAAAAYAAAAIAAAAAAAAAAgAAAAAAAAA --mojo-platform-channel-handle=1960 /prefetch:2
                                                                                  4⤵
                                                                                    PID:2252
                                                                                  • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                                                                    "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=1900,15102335431301368913,16631419366385286489,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2272 /prefetch:3
                                                                                    4⤵
                                                                                      PID:2528
                                                                                    • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                                                                      "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=1900,15102335431301368913,16631419366385286489,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2748 /prefetch:8
                                                                                      4⤵
                                                                                        PID:3168
                                                                                      • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                                                                        "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1900,15102335431301368913,16631419366385286489,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3192 /prefetch:1
                                                                                        4⤵
                                                                                          PID:4740
                                                                                        • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                                                                          "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1900,15102335431301368913,16631419366385286489,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3240 /prefetch:1
                                                                                          4⤵
                                                                                            PID:1468
                                                                                          • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                                                                            "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1900,15102335431301368913,16631419366385286489,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4612 /prefetch:1
                                                                                            4⤵
                                                                                              PID:1896
                                                                                            • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                                                                              "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --field-trial-handle=1900,15102335431301368913,16631419366385286489,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5596 /prefetch:8
                                                                                              4⤵
                                                                                                PID:4920
                                                                                              • C:\Program Files (x86)\Microsoft\Edge\Application\90.0.818.66\identity_helper.exe
                                                                                                "C:\Program Files (x86)\Microsoft\Edge\Application\90.0.818.66\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=1900,15102335431301368913,16631419366385286489,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5800 /prefetch:8
                                                                                                4⤵
                                                                                                  PID:4444
                                                                                                • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                                                                                  "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1900,15102335431301368913,16631419366385286489,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5572 /prefetch:1
                                                                                                  4⤵
                                                                                                    PID:3356
                                                                                                  • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                                                                                    "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1900,15102335431301368913,16631419366385286489,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5532 /prefetch:1
                                                                                                    4⤵
                                                                                                      PID:704
                                                                                                    • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                                                                                      "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1900,15102335431301368913,16631419366385286489,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4708 /prefetch:1
                                                                                                      4⤵
                                                                                                        PID:4988
                                                                                                      • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                                                                                        "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1900,15102335431301368913,16631419366385286489,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=13 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4776 /prefetch:1
                                                                                                        4⤵
                                                                                                          PID:396
                                                                                                        • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                                                                                          "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1900,15102335431301368913,16631419366385286489,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=14 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5528 /prefetch:1
                                                                                                          4⤵
                                                                                                            PID:2092
                                                                                                          • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                                                                                            "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1900,15102335431301368913,16631419366385286489,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=15 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5968 /prefetch:1
                                                                                                            4⤵
                                                                                                              PID:3580
                                                                                                          • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                                                                                            "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument http://www.e621.net/
                                                                                                            3⤵
                                                                                                              PID:4512
                                                                                                              • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                                                                                                "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=90.0.4430.212 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=90.0.818.66 --initial-client-data=0x120,0x124,0x128,0xfc,0x12c,0x7fff70093cb8,0x7fff70093cc8,0x7fff70093cd8
                                                                                                                4⤵
                                                                                                                  PID:2300
                                                                                                          • C:\Windows\system32\svchost.exe
                                                                                                            C:\Windows\system32\svchost.exe -k ClipboardSvcGroup -p -s cbdhsvc
                                                                                                            1⤵
                                                                                                              PID:3428
                                                                                                            • C:\Windows\system32\svchost.exe
                                                                                                              C:\Windows\system32\svchost.exe -k netsvcs -p -s Appinfo
                                                                                                              1⤵
                                                                                                                PID:3488
                                                                                                              • C:\Windows\System32\RuntimeBroker.exe
                                                                                                                C:\Windows\System32\RuntimeBroker.exe -Embedding
                                                                                                                1⤵
                                                                                                                  PID:3808
                                                                                                                • C:\Windows\system32\svchost.exe
                                                                                                                  C:\Windows\system32\svchost.exe -k UdkSvcGroup -s UdkUserSvc
                                                                                                                  1⤵
                                                                                                                    PID:3880
                                                                                                                  • C:\Windows\System32\RuntimeBroker.exe
                                                                                                                    C:\Windows\System32\RuntimeBroker.exe -Embedding
                                                                                                                    1⤵
                                                                                                                      PID:3892
                                                                                                                    • C:\Windows\system32\DllHost.exe
                                                                                                                      C:\Windows\system32\DllHost.exe /Processid:{3EB3C877-1F16-487C-9050-104DBCD66683}
                                                                                                                      1⤵
                                                                                                                        PID:4028
                                                                                                                      • C:\Windows\system32\DllHost.exe
                                                                                                                        C:\Windows\system32\DllHost.exe /Processid:{973D20D7-562D-44B9-B70B-5A0F49CCDF3F}
                                                                                                                        1⤵
                                                                                                                          PID:4296
                                                                                                                        • C:\Windows\system32\svchost.exe
                                                                                                                          C:\Windows\system32\svchost.exe -k osprivacy -p -s camsvc
                                                                                                                          1⤵
                                                                                                                            PID:4404
                                                                                                                          • C:\Windows\system32\svchost.exe
                                                                                                                            C:\Windows\system32\svchost.exe -k LocalService -p -s CDPSvc
                                                                                                                            1⤵
                                                                                                                              PID:4700
                                                                                                                            • C:\Windows\System32\svchost.exe
                                                                                                                              C:\Windows\System32\svchost.exe -k LocalSystemNetworkRestricted -p -s StorSvc
                                                                                                                              1⤵
                                                                                                                                PID:4852
                                                                                                                              • C:\Windows\system32\svchost.exe
                                                                                                                                C:\Windows\system32\svchost.exe -k LocalServiceNetworkRestricted -p -s WinHttpAutoProxySvc
                                                                                                                                1⤵
                                                                                                                                  PID:4424
                                                                                                                                • C:\Program Files\Common Files\Microsoft Shared\ClickToRun\OfficeClickToRun.exe
                                                                                                                                  "C:\Program Files\Common Files\Microsoft Shared\ClickToRun\OfficeClickToRun.exe" /service
                                                                                                                                  1⤵
                                                                                                                                    PID:3468
                                                                                                                                  • C:\Windows\system32\SppExtComObj.exe
                                                                                                                                    C:\Windows\system32\SppExtComObj.exe -Embedding
                                                                                                                                    1⤵
                                                                                                                                      PID:1580
                                                                                                                                    • C:\Windows\System32\svchost.exe
                                                                                                                                      C:\Windows\System32\svchost.exe -k LocalService -p -s LicenseManager
                                                                                                                                      1⤵
                                                                                                                                        PID:1776
                                                                                                                                      • C:\Windows\system32\DllHost.exe
                                                                                                                                        C:\Windows\system32\DllHost.exe /Processid:{3EB3C877-1F16-487C-9050-104DBCD66683}
                                                                                                                                        1⤵
                                                                                                                                          PID:2304
                                                                                                                                        • C:\Windows\system32\svchost.exe
                                                                                                                                          C:\Windows\system32\svchost.exe -k LocalServiceNetworkRestricted -p -s NgcCtnrSvc
                                                                                                                                          1⤵
                                                                                                                                            PID:3500
                                                                                                                                          • C:\Windows\system32\svchost.exe
                                                                                                                                            C:\Windows\system32\svchost.exe -k netsvcs -p -s wlidsvc
                                                                                                                                            1⤵
                                                                                                                                            • Drops file in System32 directory
                                                                                                                                            • Checks SCSI registry key(s)
                                                                                                                                            • Modifies data under HKEY_USERS
                                                                                                                                            PID:3584
                                                                                                                                          • C:\Windows\System32\CompPkgSrv.exe
                                                                                                                                            C:\Windows\System32\CompPkgSrv.exe -Embedding
                                                                                                                                            1⤵
                                                                                                                                              PID:3288
                                                                                                                                            • C:\Windows\System32\CompPkgSrv.exe
                                                                                                                                              C:\Windows\System32\CompPkgSrv.exe -Embedding
                                                                                                                                              1⤵
                                                                                                                                                PID:5084
                                                                                                                                              • C:\Windows\system32\wbem\wmiprvse.exe
                                                                                                                                                C:\Windows\system32\wbem\wmiprvse.exe -secured -Embedding
                                                                                                                                                1⤵
                                                                                                                                                  PID:3292

                                                                                                                                                Network

                                                                                                                                                MITRE ATT&CK Enterprise v15

                                                                                                                                                Replay Monitor

                                                                                                                                                Loading Replay Monitor...

                                                                                                                                                Downloads

                                                                                                                                                • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\57C8EDB95DF3F0AD4EE2DC2B8CFD4157

                                                                                                                                                  Filesize

                                                                                                                                                  340B

                                                                                                                                                  MD5

                                                                                                                                                  c977c8da0cd0287fbb56b09daec6c88a

                                                                                                                                                  SHA1

                                                                                                                                                  09a332f63256766455ec0256379d98a2f83451cf

                                                                                                                                                  SHA256

                                                                                                                                                  a9990592d974dd3c0c36cb8d65c51d3a8ca4301c8d32329f4948bbdde861024c

                                                                                                                                                  SHA512

                                                                                                                                                  130b5ef3d14d3d97a01f5c8b4156af6e01a62551ece3c49dce01d4013729d485267cac4bedfc10d792dfa8555357505584fb8c503b5d7efad218255d42b8758d

                                                                                                                                                • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad\settings.dat

                                                                                                                                                  Filesize

                                                                                                                                                  152B

                                                                                                                                                  MD5

                                                                                                                                                  9314124f4f0ad9f845a0d7906fd8dfd8

                                                                                                                                                  SHA1

                                                                                                                                                  0d4f67fb1a11453551514f230941bdd7ef95693c

                                                                                                                                                  SHA256

                                                                                                                                                  cbd58fa358e4b1851c3da2d279023c29eba66fb4d438c6e87e7ce5169ffb910e

                                                                                                                                                  SHA512

                                                                                                                                                  87b9060ca4942974bd8f95b8998df7b2702a3f4aba88c53b2e3423a532a75407070368f813a5bbc0251864b4eae47e015274a839999514386d23c8a526d05d85

                                                                                                                                                • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad\settings.dat

                                                                                                                                                  Filesize

                                                                                                                                                  152B

                                                                                                                                                  MD5

                                                                                                                                                  e1544690d41d950f9c1358068301cfb5

                                                                                                                                                  SHA1

                                                                                                                                                  ae3ff81363fcbe33c419e49cabef61fb6837bffa

                                                                                                                                                  SHA256

                                                                                                                                                  53d69c9cc3c8aaf2c8b58ea6a2aa47c49c9ec11167dd9414cd9f4192f9978724

                                                                                                                                                  SHA512

                                                                                                                                                  1e4f1fe2877f4f947d33490e65898752488e48de34d61e197e4448127d6b1926888de80b62349d5a88b96140eed0a5b952ef4dd7ca318689f76e12630c9029da

                                                                                                                                                • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Cache\f_000003

                                                                                                                                                  Filesize

                                                                                                                                                  215KB

                                                                                                                                                  MD5

                                                                                                                                                  d79b35ccf8e6af6714eb612714349097

                                                                                                                                                  SHA1

                                                                                                                                                  eb3ccc9ed29830df42f3fd129951cb8b791aaf98

                                                                                                                                                  SHA256

                                                                                                                                                  c8459799169b81fdab64d028a9ebb058ea2d0ad5feb33a11f6a45a54a5ccc365

                                                                                                                                                  SHA512

                                                                                                                                                  f4be1c1e192a700139d7cff5059af81c0234ed5f032796036a1a4879b032ce4eedd16a121bbf776f17bc84a0012846f467ad48b46db4008841c25b779c7d8f5a

                                                                                                                                                • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index

                                                                                                                                                  Filesize

                                                                                                                                                  288B

                                                                                                                                                  MD5

                                                                                                                                                  82f5da32fbd4f965574334ccd3123ae6

                                                                                                                                                  SHA1

                                                                                                                                                  c73c7c59771dfb71717483e7d5b4bb8775d73d67

                                                                                                                                                  SHA256

                                                                                                                                                  943b95a25b31e8c8924a96c630e38098daa67e2015ab1e7aa0afad2804d1682d

                                                                                                                                                  SHA512

                                                                                                                                                  be48c7c6472ec896f4ca6ff0772cf7267a7e872b53d5bc45c45e14097e5477209b9f0cb4baf5f780571d13d8635af6a3dd30af01d73d1a6c8ea79b16dfb777f8

                                                                                                                                                • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Network Persistent State

                                                                                                                                                  Filesize

                                                                                                                                                  1KB

                                                                                                                                                  MD5

                                                                                                                                                  6f5da27d617f34190651f809d8a65a34

                                                                                                                                                  SHA1

                                                                                                                                                  3e8a27eb69a10d5d31d1be5b038d72cf11c146a2

                                                                                                                                                  SHA256

                                                                                                                                                  a691819db45b555cf8f6a0603fd69fb130747108edd5abef3207e162e1822e52

                                                                                                                                                  SHA512

                                                                                                                                                  333e0a1022cef88eee1ff30a7783cb3310d45f2b280971cc46fcb26368e960fdcbc66077104fd3804a155ea19f8644e47138c0bf69cab15bae7f3100ea430f29

                                                                                                                                                • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Preferences

                                                                                                                                                  Filesize

                                                                                                                                                  6KB

                                                                                                                                                  MD5

                                                                                                                                                  d80b8bc6206f1c69d74c5d4ca13d0377

                                                                                                                                                  SHA1

                                                                                                                                                  86e95006d86b78828505b46e943f79937425a105

                                                                                                                                                  SHA256

                                                                                                                                                  040a2aafef05e49c586df071c5b00854aae60ee7eae1f2070488bc2d50177253

                                                                                                                                                  SHA512

                                                                                                                                                  25a98dbb9889aa7e53bac16d6253398d7d2efab55ea59c257fc76de7ec3087660c78ee9adcd38d30cc382fdaac18f05e22344e586d722cc744a556c66423a33f

                                                                                                                                                • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Preferences

                                                                                                                                                  Filesize

                                                                                                                                                  6KB

                                                                                                                                                  MD5

                                                                                                                                                  e879d8d28811a6e3db4c5221ed04fb5a

                                                                                                                                                  SHA1

                                                                                                                                                  ee4e12b41493c67ac8e09594e67420a7b170e62b

                                                                                                                                                  SHA256

                                                                                                                                                  dfe6d1831dc3b0c1e9845bfd761a1af053109b2e5230a798dfb8df0b4421b829

                                                                                                                                                  SHA512

                                                                                                                                                  5850eb89c69c588d5ef4b5ef79c19e80c6a8b2c272e42e327f254584cb3551823f91192a3651c37e27e6079946c43430290a9d27ee6fc45f5d001c28cb51ea66

                                                                                                                                                • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Preferences

                                                                                                                                                  Filesize

                                                                                                                                                  5KB

                                                                                                                                                  MD5

                                                                                                                                                  d9fc3abf3ab6ddd50f061ea1de489624

                                                                                                                                                  SHA1

                                                                                                                                                  38cbdbfa99a026e9e6de29594d5dd4a89a3e0d67

                                                                                                                                                  SHA256

                                                                                                                                                  d71f191d17a671003ff8f7cdb105c66a2d50f908c8960e428109ab5c022bdc72

                                                                                                                                                  SHA512

                                                                                                                                                  487e1ab5d11709770a6718e6cb9dcff7590607a1cd085ddc6f4421eb9dfa4ac0e45362e0ce776a9fd9858b3ab0190207a79c8c2df03218306b4bb0e8b356f413

                                                                                                                                                • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Preferences

                                                                                                                                                  Filesize

                                                                                                                                                  6KB

                                                                                                                                                  MD5

                                                                                                                                                  c50a985b5ff3d2775edefa0dd77f348a

                                                                                                                                                  SHA1

                                                                                                                                                  1b64e9fed4bb8bd0faa9a9d5d1ef879e2dd74e73

                                                                                                                                                  SHA256

                                                                                                                                                  1bc2b3ce16f886a5fe5b2d5a4985908fd913830cc4e7577bdd25e905aaa100ff

                                                                                                                                                  SHA512

                                                                                                                                                  302783fb3d85e607b049b9ff1abb22d0280668787f5381e2b856979b5a4371f7891d6118f1ccad4d9f5cd0480aa1ce75b78929768c0c2c63683d6ac20457a68d

                                                                                                                                                • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\data_reduction_proxy_leveldb\CURRENT

                                                                                                                                                  Filesize

                                                                                                                                                  16B

                                                                                                                                                  MD5

                                                                                                                                                  46295cac801e5d4857d09837238a6394

                                                                                                                                                  SHA1

                                                                                                                                                  44e0fa1b517dbf802b18faf0785eeea6ac51594b

                                                                                                                                                  SHA256

                                                                                                                                                  0f1bad70c7bd1e0a69562853ec529355462fcd0423263a3d39d6d0d70b780443

                                                                                                                                                  SHA512

                                                                                                                                                  8969402593f927350e2ceb4b5bc2a277f3754697c1961e3d6237da322257fbab42909e1a742e22223447f3a4805f8d8ef525432a7c3515a549e984d3eff72b23

                                                                                                                                                • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\data_reduction_proxy_leveldb\CURRENT

                                                                                                                                                  Filesize

                                                                                                                                                  16B

                                                                                                                                                  MD5

                                                                                                                                                  206702161f94c5cd39fadd03f4014d98

                                                                                                                                                  SHA1

                                                                                                                                                  bd8bfc144fb5326d21bd1531523d9fb50e1b600a

                                                                                                                                                  SHA256

                                                                                                                                                  1005a525006f148c86efcbfb36c6eac091b311532448010f70f7de9a68007167

                                                                                                                                                  SHA512

                                                                                                                                                  0af09f26941b11991c750d1a2b525c39a8970900e98cba96fd1b55dbf93fee79e18b8aab258f48b4f7bda40d059629bc7770d84371235cdb1352a4f17f80e145

                                                                                                                                                • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\f50ee61e-553f-4b31-9ed0-dc9903640935.tmp

                                                                                                                                                  Filesize

                                                                                                                                                  37B

                                                                                                                                                  MD5

                                                                                                                                                  661760f65468e15dd28c1fd21fb55e6d

                                                                                                                                                  SHA1

                                                                                                                                                  207638003735c9b113b1f47bb043cdcdbf4b0b5f

                                                                                                                                                  SHA256

                                                                                                                                                  0a5f22651f8fe6179e924a10a444b7c394c56e1ed6015d3fc336198252984c0e

                                                                                                                                                  SHA512

                                                                                                                                                  6454c5f69a2d7d7f0df4f066f539561c365bb6b14c466f282a99bf1116b72d757bef0bf03a0e0c68a7538a02a993fc070c52133ca2162c8496017053194f441c

                                                                                                                                                • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Local State

                                                                                                                                                  Filesize

                                                                                                                                                  10KB

                                                                                                                                                  MD5

                                                                                                                                                  44388305a9c3a51a2151575450baaf8d

                                                                                                                                                  SHA1

                                                                                                                                                  c504181ccdb10ac74d0d99036568b9eefbcb4c1c

                                                                                                                                                  SHA256

                                                                                                                                                  de8eb8cacee086fd5052f3b146c619a6604bcd8cf33ec9d5d30fd8ec7a136b1b

                                                                                                                                                  SHA512

                                                                                                                                                  65e7af367d5cd1e76dc7f0fc8c2d5dc2221f58859f1129ce68f79d58b4d8dc0733074ba36e3080f40fb80e5b4be8337091e0045b93b7be35eefe19b9b3438244

                                                                                                                                                • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Local State

                                                                                                                                                  Filesize

                                                                                                                                                  10KB

                                                                                                                                                  MD5

                                                                                                                                                  c4d92b6af6e06c4c0a5d875ffc5497cf

                                                                                                                                                  SHA1

                                                                                                                                                  d3db7a2227c148b7dc272287cdb973956eb31a8e

                                                                                                                                                  SHA256

                                                                                                                                                  2eb2f1c8da0a95e998a9b676fdb19469a7eede6a3d710ca084a56bb838bf3061

                                                                                                                                                  SHA512

                                                                                                                                                  1ded17f915e10f03b20efd35a738cbb075b212176377fe35057c8bd86ace52800930442fd599a0f3fa401174e2f355a02956330c327b1019dc3d6010a72656d5

                                                                                                                                                • C:\Users\Admin\AppData\Roaming\Microsoft\Protect\S-1-5-21-2253712635-4068079004-3870069674-1000\Preferred

                                                                                                                                                  Filesize

                                                                                                                                                  24B

                                                                                                                                                  MD5

                                                                                                                                                  5a56567286000523fc0893f367165ca2

                                                                                                                                                  SHA1

                                                                                                                                                  78e7e2d8d1bc8d53d147d1763803fbbf26a825ae

                                                                                                                                                  SHA256

                                                                                                                                                  6d395ebd0b9ad14b8ba0b562d15345571b226b5ea0e0f4595df45a493a2ad420

                                                                                                                                                  SHA512

                                                                                                                                                  b677634c696bc4e1d414e2dc5b1171d3bb7903eecf06436b83eb58107a26b476d08182b575313d99402c2229183c3c3fecbca2c9e2adf0f451c7301736941f5e

                                                                                                                                                • C:\Users\Admin\AppData\Roaming\Microsoft\Spelling\en-US\default.dic

                                                                                                                                                  Filesize

                                                                                                                                                  2B

                                                                                                                                                  MD5

                                                                                                                                                  f3b25701fe362ec84616a93a45ce9998

                                                                                                                                                  SHA1

                                                                                                                                                  d62636d8caec13f04e28442a0a6fa1afeb024bbb

                                                                                                                                                  SHA256

                                                                                                                                                  b3d510ef04275ca8e698e5b3cbb0ece3949ef9252f0cdc839e9ee347409a2209

                                                                                                                                                  SHA512

                                                                                                                                                  98c5f56f3de340690c139e58eb7dac111979f0d4dffe9c4b24ff849510f4b6ffa9fd608c0a3de9ac3c9fd2190f0efaf715309061490f9755a9bfdf1c54ca0d84

                                                                                                                                                • C:\Windows\System32\Microsoft\Protect\S-1-5-18\User\Preferred

                                                                                                                                                  Filesize

                                                                                                                                                  24B

                                                                                                                                                  MD5

                                                                                                                                                  4a189d6aa85906347e5b5d6e9fe5b0a4

                                                                                                                                                  SHA1

                                                                                                                                                  259c230b97735532cbfdc0b9fe910a0a724191a9

                                                                                                                                                  SHA256

                                                                                                                                                  e1cc9cb35f61a0a5196b25484a343d55e39971cfccbf8988dddd3d7b6125fbbe

                                                                                                                                                  SHA512

                                                                                                                                                  821ef0484061c05a641c0489d0688ef65e7a3f09b74e7fbf8d59887d2d1fdec3a2d02d6f5d2fe3cd01b798b07e93046b7234c78126066e87547a878a9d8a9e8b

                                                                                                                                                • C:\Windows\system32\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\57C8EDB95DF3F0AD4EE2DC2B8CFD4157

                                                                                                                                                  Filesize

                                                                                                                                                  340B

                                                                                                                                                  MD5

                                                                                                                                                  1c0b94244f3514d87666f05ba2a61426

                                                                                                                                                  SHA1

                                                                                                                                                  527abad9c147d7ad90807889b7dd0500d7d1017b

                                                                                                                                                  SHA256

                                                                                                                                                  fa84b215230ac00522a66593fedc7622f13216577b9a992fb50b87fed918cea6

                                                                                                                                                  SHA512

                                                                                                                                                  9a974a186513eaa0d0c672851fba74749cad00e711b08fc2ef2ad49a00d5d2aeaead37ff8e4cd53a16700e534400acd88b2f610d2855fb701b159a77aced5008

                                                                                                                                                • C:\Windows\system32\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\7423F88C7F265F0DEFC08EA88C3BDE45_AA1E8580D4EBC816148CE81268683776

                                                                                                                                                  Filesize

                                                                                                                                                  404B

                                                                                                                                                  MD5

                                                                                                                                                  58023107e94530b9a6afc9f3026d5b2b

                                                                                                                                                  SHA1

                                                                                                                                                  2e667a3bce41c927cede1ab868050dd20bd13164

                                                                                                                                                  SHA256

                                                                                                                                                  8b9517bbcf6c04c3d9a0d91bbcad25c3358bee9871488f076b9b0a4c56b16acb

                                                                                                                                                  SHA512

                                                                                                                                                  12a1bf84c906bf3fcb41b63e531c5fff0a2bccc364827c31273acb2944013567d21e950151e29ad5ff07fd871b3967557bba81de45b3f3c3f87449d17c069a7a

                                                                                                                                                • memory/388-42-0x0000020CFF500000-0x0000020CFF52A000-memory.dmp

                                                                                                                                                  Filesize

                                                                                                                                                  168KB

                                                                                                                                                • memory/388-37-0x00007FFF3F7D0000-0x00007FFF3F7E0000-memory.dmp

                                                                                                                                                  Filesize

                                                                                                                                                  64KB

                                                                                                                                                • memory/388-36-0x0000020CFF500000-0x0000020CFF52A000-memory.dmp

                                                                                                                                                  Filesize

                                                                                                                                                  168KB

                                                                                                                                                • memory/636-25-0x00007FFF3F7D0000-0x00007FFF3F7E0000-memory.dmp

                                                                                                                                                  Filesize

                                                                                                                                                  64KB

                                                                                                                                                • memory/636-24-0x000001A173A30000-0x000001A173A5A000-memory.dmp

                                                                                                                                                  Filesize

                                                                                                                                                  168KB

                                                                                                                                                • memory/636-32-0x00007FFF7F7E4000-0x00007FFF7F7E5000-memory.dmp

                                                                                                                                                  Filesize

                                                                                                                                                  4KB

                                                                                                                                                • memory/636-31-0x000001A173A30000-0x000001A173A5A000-memory.dmp

                                                                                                                                                  Filesize

                                                                                                                                                  168KB

                                                                                                                                                • memory/636-23-0x000001A173A00000-0x000001A173A23000-memory.dmp

                                                                                                                                                  Filesize

                                                                                                                                                  140KB

                                                                                                                                                • memory/688-29-0x00007FFF3F7D0000-0x00007FFF3F7E0000-memory.dmp

                                                                                                                                                  Filesize

                                                                                                                                                  64KB

                                                                                                                                                • memory/688-33-0x0000020DD65B0000-0x0000020DD65DA000-memory.dmp

                                                                                                                                                  Filesize

                                                                                                                                                  168KB

                                                                                                                                                • memory/688-28-0x0000020DD65B0000-0x0000020DD65DA000-memory.dmp

                                                                                                                                                  Filesize

                                                                                                                                                  168KB

                                                                                                                                                • memory/768-267-0x0000024931140000-0x000002493116A000-memory.dmp

                                                                                                                                                  Filesize

                                                                                                                                                  168KB

                                                                                                                                                • memory/768-46-0x00007FFF3F7D0000-0x00007FFF3F7E0000-memory.dmp

                                                                                                                                                  Filesize

                                                                                                                                                  64KB

                                                                                                                                                • memory/768-48-0x0000024931140000-0x000002493116A000-memory.dmp

                                                                                                                                                  Filesize

                                                                                                                                                  168KB

                                                                                                                                                • memory/768-45-0x0000024931140000-0x000002493116A000-memory.dmp

                                                                                                                                                  Filesize

                                                                                                                                                  168KB

                                                                                                                                                • memory/984-39-0x0000017415DB0000-0x0000017415DDA000-memory.dmp

                                                                                                                                                  Filesize

                                                                                                                                                  168KB

                                                                                                                                                • memory/984-266-0x0000017415DB0000-0x0000017415DDA000-memory.dmp

                                                                                                                                                  Filesize

                                                                                                                                                  168KB

                                                                                                                                                • memory/984-43-0x0000017415DB0000-0x0000017415DDA000-memory.dmp

                                                                                                                                                  Filesize

                                                                                                                                                  168KB

                                                                                                                                                • memory/984-40-0x00007FFF3F7D0000-0x00007FFF3F7E0000-memory.dmp

                                                                                                                                                  Filesize

                                                                                                                                                  64KB

                                                                                                                                                • memory/1028-54-0x000001EA66800000-0x000001EA6682A000-memory.dmp

                                                                                                                                                  Filesize

                                                                                                                                                  168KB

                                                                                                                                                • memory/1028-268-0x000001EA66800000-0x000001EA6682A000-memory.dmp

                                                                                                                                                  Filesize

                                                                                                                                                  168KB

                                                                                                                                                • memory/1028-51-0x000001EA66800000-0x000001EA6682A000-memory.dmp

                                                                                                                                                  Filesize

                                                                                                                                                  168KB

                                                                                                                                                • memory/1028-52-0x00007FFF3F7D0000-0x00007FFF3F7E0000-memory.dmp

                                                                                                                                                  Filesize

                                                                                                                                                  64KB

                                                                                                                                                • memory/1052-61-0x00007FFF3F7D0000-0x00007FFF3F7E0000-memory.dmp

                                                                                                                                                  Filesize

                                                                                                                                                  64KB

                                                                                                                                                • memory/1052-60-0x000001BB01260000-0x000001BB0128A000-memory.dmp

                                                                                                                                                  Filesize

                                                                                                                                                  168KB

                                                                                                                                                • memory/1124-63-0x0000011186320000-0x000001118634A000-memory.dmp

                                                                                                                                                  Filesize

                                                                                                                                                  168KB

                                                                                                                                                • memory/1124-64-0x00007FFF3F7D0000-0x00007FFF3F7E0000-memory.dmp

                                                                                                                                                  Filesize

                                                                                                                                                  64KB

                                                                                                                                                • memory/1140-66-0x0000024B2DA60000-0x0000024B2DA8A000-memory.dmp

                                                                                                                                                  Filesize

                                                                                                                                                  168KB

                                                                                                                                                • memory/1140-67-0x00007FFF3F7D0000-0x00007FFF3F7E0000-memory.dmp

                                                                                                                                                  Filesize

                                                                                                                                                  64KB

                                                                                                                                                • memory/1152-69-0x0000025A38160000-0x0000025A3818A000-memory.dmp

                                                                                                                                                  Filesize

                                                                                                                                                  168KB

                                                                                                                                                • memory/1152-70-0x00007FFF3F7D0000-0x00007FFF3F7E0000-memory.dmp

                                                                                                                                                  Filesize

                                                                                                                                                  64KB

                                                                                                                                                • memory/1240-73-0x00007FFF3F7D0000-0x00007FFF3F7E0000-memory.dmp

                                                                                                                                                  Filesize

                                                                                                                                                  64KB

                                                                                                                                                • memory/1240-72-0x000001902D200000-0x000001902D22A000-memory.dmp

                                                                                                                                                  Filesize

                                                                                                                                                  168KB

                                                                                                                                                • memory/1276-76-0x0000015DE2860000-0x0000015DE288A000-memory.dmp

                                                                                                                                                  Filesize

                                                                                                                                                  168KB

                                                                                                                                                • memory/1276-77-0x00007FFF3F7D0000-0x00007FFF3F7E0000-memory.dmp

                                                                                                                                                  Filesize

                                                                                                                                                  64KB

                                                                                                                                                • memory/3128-16-0x00007FFF7F740000-0x00007FFF7F949000-memory.dmp

                                                                                                                                                  Filesize

                                                                                                                                                  2.0MB

                                                                                                                                                • memory/3128-13-0x0000000140000000-0x0000000140040000-memory.dmp

                                                                                                                                                  Filesize

                                                                                                                                                  256KB

                                                                                                                                                • memory/3128-265-0x00007FFF7F740000-0x00007FFF7F949000-memory.dmp

                                                                                                                                                  Filesize

                                                                                                                                                  2.0MB

                                                                                                                                                • memory/3128-14-0x0000000140000000-0x0000000140040000-memory.dmp

                                                                                                                                                  Filesize

                                                                                                                                                  256KB

                                                                                                                                                • memory/3128-15-0x0000000140000000-0x0000000140040000-memory.dmp

                                                                                                                                                  Filesize

                                                                                                                                                  256KB

                                                                                                                                                • memory/3128-17-0x00007FFF7E4B0000-0x00007FFF7E56D000-memory.dmp

                                                                                                                                                  Filesize

                                                                                                                                                  756KB

                                                                                                                                                • memory/3128-18-0x0000000140000000-0x0000000140040000-memory.dmp

                                                                                                                                                  Filesize

                                                                                                                                                  256KB

                                                                                                                                                • memory/3128-19-0x00007FFF7F741000-0x00007FFF7F86A000-memory.dmp

                                                                                                                                                  Filesize

                                                                                                                                                  1.2MB

                                                                                                                                                • memory/3128-20-0x00007FFF7F740000-0x00007FFF7F949000-memory.dmp

                                                                                                                                                  Filesize

                                                                                                                                                  2.0MB

                                                                                                                                                • memory/3472-8-0x000001D5BAB20000-0x000001D5BAB5E000-memory.dmp

                                                                                                                                                  Filesize

                                                                                                                                                  248KB

                                                                                                                                                • memory/3472-49-0x00007FFF5E8F0000-0x00007FFF5F3B2000-memory.dmp

                                                                                                                                                  Filesize

                                                                                                                                                  10.8MB

                                                                                                                                                • memory/3472-0-0x00007FFF5E8F3000-0x00007FFF5E8F5000-memory.dmp

                                                                                                                                                  Filesize

                                                                                                                                                  8KB

                                                                                                                                                • memory/3472-11-0x00007FFF5E8F0000-0x00007FFF5F3B2000-memory.dmp

                                                                                                                                                  Filesize

                                                                                                                                                  10.8MB

                                                                                                                                                • memory/3472-10-0x00007FFF7E4B0000-0x00007FFF7E56D000-memory.dmp

                                                                                                                                                  Filesize

                                                                                                                                                  756KB

                                                                                                                                                • memory/3472-9-0x00007FFF7F740000-0x00007FFF7F949000-memory.dmp

                                                                                                                                                  Filesize

                                                                                                                                                  2.0MB

                                                                                                                                                • memory/3472-12-0x00007FFF5E8F0000-0x00007FFF5F3B2000-memory.dmp

                                                                                                                                                  Filesize

                                                                                                                                                  10.8MB

                                                                                                                                                • memory/3472-7-0x000001D5B93B0000-0x000001D5B93BE000-memory.dmp

                                                                                                                                                  Filesize

                                                                                                                                                  56KB

                                                                                                                                                • memory/3472-4-0x000001D5D4730000-0x000001D5D4C58000-memory.dmp

                                                                                                                                                  Filesize

                                                                                                                                                  5.2MB

                                                                                                                                                • memory/3472-5-0x00007FFF5E8F3000-0x00007FFF5E8F5000-memory.dmp

                                                                                                                                                  Filesize

                                                                                                                                                  8KB

                                                                                                                                                • memory/3472-6-0x00007FFF5E8F0000-0x00007FFF5F3B2000-memory.dmp

                                                                                                                                                  Filesize

                                                                                                                                                  10.8MB

                                                                                                                                                • memory/3472-3-0x00007FFF5E8F0000-0x00007FFF5F3B2000-memory.dmp

                                                                                                                                                  Filesize

                                                                                                                                                  10.8MB

                                                                                                                                                • memory/3472-2-0x000001D5D3460000-0x000001D5D3622000-memory.dmp

                                                                                                                                                  Filesize

                                                                                                                                                  1.8MB

                                                                                                                                                • memory/3472-1-0x000001D5B8CE0000-0x000001D5B8CF8000-memory.dmp

                                                                                                                                                  Filesize

                                                                                                                                                  96KB