Analysis

  • max time kernel
    186s
  • max time network
    187s
  • platform
    windows11-21h2_x64
  • resource
    win11-20241007-en
  • resource tags

    arch:x64arch:x86image:win11-20241007-enlocale:en-usos:windows11-21h2-x64system
  • submitted
    03-02-2025 17:08

General

  • Target

    Client-built (1).exe

  • Size

    78KB

  • MD5

    c305efabf3779d300d766a4e2990f6cd

  • SHA1

    febf6b16a6e3de42427fc0fbc2a1191acc66aaa8

  • SHA256

    9c538454c0d5bc061140f31eb10784e7f525f865dcdaa4b66aa689c1a85543b8

  • SHA512

    05653e94292a2aa95203857b6efb0cfe4d9562a6f94c8dce6d12063ad4e39021abc42fe5058b15a2906715b232388dca6e272f3336e915c70ded964454a850cc

  • SSDEEP

    1536:52WjO8XeEXFh5P7v88wbjNrfxCXhRoKV6+V+KPIC:5Zv5PDwbjNrmAE+WIC

Malware Config

Extracted

Family

discordrat

Attributes
  • discord_token

    MTMwODUzODYxNDg0MTM0NDAyMQ.GYcOVt.Gp_DOcHBox7P0N-zNBTm49eq6NTvt_N2AxMvF8

  • server_id

    1336013454258995351

Signatures

  • Discord RAT

    A RAT written in C# using Discord as a C2.

  • Discordrat family
  • Suspicious use of NtCreateUserProcessOtherParentProcess 1 IoCs
  • Indicator Removal: Clear Windows Event Logs 1 TTPs 1 IoCs

    Clear Windows Event Logs to hide the activity of an intrusion.

  • Legitimate hosting services abused for malware hosting/C2 1 TTPs 26 IoCs
  • Drops file in System32 directory 8 IoCs
  • Sets desktop wallpaper using registry 2 TTPs 1 IoCs
  • Suspicious use of SetThreadContext 1 IoCs
  • Browser Information Discovery 1 TTPs

    Enumerate browser information.

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Checks SCSI registry key(s) 3 TTPs 6 IoCs

    SCSI information is often read in order to detect sandboxing environments.

  • Enumerates system info in registry 2 TTPs 3 IoCs
  • Modifies data under HKEY_USERS 64 IoCs
  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs
  • Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 8 IoCs
  • Suspicious use of AdjustPrivilegeToken 64 IoCs
  • Suspicious use of FindShellTrayWindow 25 IoCs
  • Suspicious use of SendNotifyMessage 12 IoCs
  • Suspicious use of SetWindowsHookEx 3 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs

Processes

  • C:\Windows\system32\winlogon.exe
    winlogon.exe
    1⤵
      PID:636
      • C:\Windows\system32\dwm.exe
        "dwm.exe"
        2⤵
        • Suspicious use of AdjustPrivilegeToken
        PID:480
      • C:\Windows\System32\dllhost.exe
        C:\Windows\System32\dllhost.exe /Processid:{5eca8797-f6ac-415c-b236-91d6bb02d785}
        2⤵
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        • Suspicious use of WriteProcessMemory
        PID:1496
    • C:\Windows\system32\lsass.exe
      C:\Windows\system32\lsass.exe
      1⤵
      • Drops file in System32 directory
      PID:692
    • C:\Windows\system32\svchost.exe
      C:\Windows\system32\svchost.exe -k DcomLaunch -p -s LSM
      1⤵
        PID:996
      • C:\Windows\System32\svchost.exe
        C:\Windows\System32\svchost.exe -k LocalServiceNetworkRestricted -p -s lmhosts
        1⤵
          PID:716
        • C:\Windows\system32\svchost.exe
          C:\Windows\system32\svchost.exe -k netsvcs -p -s gpsvc
          1⤵
            PID:680
          • C:\Windows\System32\svchost.exe
            C:\Windows\System32\svchost.exe -k LocalSystemNetworkRestricted -p -s NcbService
            1⤵
              PID:1076
            • C:\Windows\system32\svchost.exe
              C:\Windows\system32\svchost.exe -k LocalServiceNetworkRestricted -p -s TimeBrokerSvc
              1⤵
                PID:1084
              • C:\Windows\system32\svchost.exe
                C:\Windows\system32\svchost.exe -k LocalService -p -s nsi
                1⤵
                  PID:1228
                • C:\Windows\system32\svchost.exe
                  C:\Windows\system32\svchost.exe -k netsvcs -p -s Schedule
                  1⤵
                    PID:1244
                  • C:\Windows\System32\svchost.exe
                    C:\Windows\System32\svchost.exe -k netprofm -p -s netprofm
                    1⤵
                      PID:1292
                    • C:\Windows\system32\svchost.exe
                      C:\Windows\system32\svchost.exe -k netsvcs -p -s ProfSvc
                      1⤵
                        PID:1328
                      • C:\Windows\System32\svchost.exe
                        C:\Windows\System32\svchost.exe -k LocalServiceNetworkRestricted -p -s EventLog
                        1⤵
                        • Indicator Removal: Clear Windows Event Logs
                        PID:1344
                      • C:\Windows\system32\svchost.exe
                        C:\Windows\system32\svchost.exe -k LocalService -p -s EventSystem
                        1⤵
                          PID:1432
                        • C:\Windows\system32\svchost.exe
                          C:\Windows\system32\svchost.exe -k LocalService -p -s DispBrokerDesktopSvc
                          1⤵
                            PID:1440
                          • C:\Windows\System32\svchost.exe
                            C:\Windows\System32\svchost.exe -k netsvcs -p -s Themes
                            1⤵
                              PID:1452
                            • C:\Windows\system32\svchost.exe
                              C:\Windows\system32\svchost.exe -k netsvcs -p -s UserManager
                              1⤵
                                PID:1500
                                • C:\Windows\system32\sihost.exe
                                  sihost.exe
                                  2⤵
                                    PID:1832
                                • C:\Windows\system32\svchost.exe
                                  C:\Windows\system32\svchost.exe -k NetworkService -p
                                  1⤵
                                    PID:1736
                                  • C:\Windows\system32\svchost.exe
                                    C:\Windows\system32\svchost.exe -k netsvcs -p -s SENS
                                    1⤵
                                      PID:1744
                                    • C:\Windows\System32\svchost.exe
                                      C:\Windows\System32\svchost.exe -k LocalSystemNetworkRestricted -p -s AudioEndpointBuilder
                                      1⤵
                                        PID:1788
                                      • C:\Windows\system32\svchost.exe
                                        C:\Windows\system32\svchost.exe -k LocalServiceNetworkRestricted -p -s Dhcp
                                        1⤵
                                          PID:1864
                                        • C:\Windows\System32\svchost.exe
                                          C:\Windows\System32\svchost.exe -k LocalServiceNetworkRestricted -p
                                          1⤵
                                            PID:1952
                                          • C:\Windows\System32\svchost.exe
                                            C:\Windows\System32\svchost.exe -k LocalServiceNetworkRestricted -p
                                            1⤵
                                              PID:2028
                                            • C:\Windows\system32\svchost.exe
                                              C:\Windows\system32\svchost.exe -k LocalServiceNetworkRestricted -p
                                              1⤵
                                                PID:2040
                                              • C:\Windows\System32\svchost.exe
                                                C:\Windows\System32\svchost.exe -k netsvcs -p -s ShellHWDetection
                                                1⤵
                                                  PID:1988
                                                • C:\Windows\system32\svchost.exe
                                                  C:\Windows\system32\svchost.exe -k appmodel -p -s StateRepository
                                                  1⤵
                                                    PID:2060
                                                  • C:\Windows\System32\spoolsv.exe
                                                    C:\Windows\System32\spoolsv.exe
                                                    1⤵
                                                      PID:2172
                                                    • C:\Windows\System32\svchost.exe
                                                      C:\Windows\System32\svchost.exe -k NetworkService -p -s LanmanWorkstation
                                                      1⤵
                                                      • Suspicious use of AdjustPrivilegeToken
                                                      PID:2288
                                                    • C:\Windows\system32\svchost.exe
                                                      C:\Windows\system32\svchost.exe -k NetworkServiceNetworkRestricted -p -s PolicyAgent
                                                      1⤵
                                                        PID:2392
                                                      • C:\Windows\system32\svchost.exe
                                                        C:\Windows\system32\svchost.exe -k netsvcs -p -s IKEEXT
                                                        1⤵
                                                          PID:2400
                                                        • C:\Windows\system32\svchost.exe
                                                          C:\Windows\system32\svchost.exe -k NetworkService -p
                                                          1⤵
                                                          • Drops file in System32 directory
                                                          • Modifies data under HKEY_USERS
                                                          PID:2428
                                                        • C:\Windows\System32\svchost.exe
                                                          C:\Windows\System32\svchost.exe -k LocalServiceNetworkRestricted -s RmSvc
                                                          1⤵
                                                            PID:2496
                                                          • C:\Windows\sysmon.exe
                                                            C:\Windows\sysmon.exe
                                                            1⤵
                                                              PID:2540
                                                            • C:\Windows\system32\svchost.exe
                                                              C:\Windows\system32\svchost.exe -k netsvcs -p -s LanmanServer
                                                              1⤵
                                                              • Suspicious use of AdjustPrivilegeToken
                                                              PID:2560
                                                            • C:\Windows\System32\svchost.exe
                                                              C:\Windows\System32\svchost.exe -k LocalSystemNetworkRestricted -p -s TrkWks
                                                              1⤵
                                                                PID:2568
                                                              • C:\Windows\system32\svchost.exe
                                                                C:\Windows\system32\svchost.exe -k netsvcs -p -s Winmgmt
                                                                1⤵
                                                                • Suspicious use of AdjustPrivilegeToken
                                                                PID:2600
                                                              • C:\Windows\system32\svchost.exe
                                                                C:\Windows\system32\svchost.exe -k netsvcs -p -s WpnService
                                                                1⤵
                                                                  PID:2608
                                                                • C:\Windows\system32\wbem\unsecapp.exe
                                                                  C:\Windows\system32\wbem\unsecapp.exe -Embedding
                                                                  1⤵
                                                                    PID:2696
                                                                  • C:\Windows\system32\svchost.exe
                                                                    C:\Windows\system32\svchost.exe -k UnistackSvcGroup -s CDPUserSvc
                                                                    1⤵
                                                                      PID:432
                                                                    • C:\Windows\Explorer.EXE
                                                                      C:\Windows\Explorer.EXE
                                                                      1⤵
                                                                      • Suspicious behavior: GetForegroundWindowSpam
                                                                      • Suspicious use of AdjustPrivilegeToken
                                                                      PID:3320
                                                                      • C:\Users\Admin\AppData\Local\Temp\Client-built (1).exe
                                                                        "C:\Users\Admin\AppData\Local\Temp\Client-built (1).exe"
                                                                        2⤵
                                                                        • Suspicious use of NtCreateUserProcessOtherParentProcess
                                                                        • Sets desktop wallpaper using registry
                                                                        • Suspicious use of SetThreadContext
                                                                        • Suspicious behavior: EnumeratesProcesses
                                                                        • Suspicious use of AdjustPrivilegeToken
                                                                        • Suspicious use of SetWindowsHookEx
                                                                        • Suspicious use of WriteProcessMemory
                                                                        PID:4948
                                                                        • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                                                          "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument http://www.pornhub.com/
                                                                          3⤵
                                                                          • Enumerates system info in registry
                                                                          • Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
                                                                          • Suspicious use of FindShellTrayWindow
                                                                          • Suspicious use of SendNotifyMessage
                                                                          PID:2828
                                                                          • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                                                            "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=90.0.4430.212 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=90.0.818.66 --initial-client-data=0x120,0x124,0x128,0xfc,0x12c,0x7ff89dab3cb8,0x7ff89dab3cc8,0x7ff89dab3cd8
                                                                            4⤵
                                                                              PID:440
                                                                            • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                                                              "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=1900,12359139689158892886,6645928379459829562,131072 --gpu-preferences=SAAAAAAAAADgAAAwAAAAAAAAAAAAAAAAAABgAAAAAAAoAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAB4AAAAAAAAAHgAAAAAAAAAKAAAAAQAAAAgAAAAAAAAACgAAAAAAAAAMAAAAAAAAAA4AAAAAAAAABAAAAAAAAAAAAAAAAUAAAAQAAAAAAAAAAAAAAAGAAAAEAAAAAAAAAABAAAABQAAABAAAAAAAAAAAQAAAAYAAAAIAAAAAAAAAAgAAAAAAAAA --mojo-platform-channel-handle=1916 /prefetch:2
                                                                              4⤵
                                                                                PID:2336
                                                                              • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                                                                "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=1900,12359139689158892886,6645928379459829562,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=1972 /prefetch:3
                                                                                4⤵
                                                                                  PID:564
                                                                                • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                                                                  "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=1900,12359139689158892886,6645928379459829562,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2344 /prefetch:8
                                                                                  4⤵
                                                                                    PID:1304
                                                                                  • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                                                                    "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1900,12359139689158892886,6645928379459829562,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3208 /prefetch:1
                                                                                    4⤵
                                                                                      PID:4240
                                                                                    • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                                                                      "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1900,12359139689158892886,6645928379459829562,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3220 /prefetch:1
                                                                                      4⤵
                                                                                        PID:1808
                                                                                      • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                                                                        "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1900,12359139689158892886,6645928379459829562,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4612 /prefetch:1
                                                                                        4⤵
                                                                                          PID:4964
                                                                                        • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                                                                          "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1900,12359139689158892886,6645928379459829562,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4108 /prefetch:1
                                                                                          4⤵
                                                                                            PID:2408
                                                                                          • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                                                                            "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --field-trial-handle=1900,12359139689158892886,6645928379459829562,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5028 /prefetch:8
                                                                                            4⤵
                                                                                              PID:4488
                                                                                            • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                                                                              "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1900,12359139689158892886,6645928379459829562,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5624 /prefetch:1
                                                                                              4⤵
                                                                                                PID:464
                                                                                              • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                                                                                "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1900,12359139689158892886,6645928379459829562,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5664 /prefetch:1
                                                                                                4⤵
                                                                                                  PID:3232
                                                                                                • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                                                                                  "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1900,12359139689158892886,6645928379459829562,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6004 /prefetch:1
                                                                                                  4⤵
                                                                                                    PID:4936
                                                                                                  • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                                                                                    "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1900,12359139689158892886,6645928379459829562,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=13 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6048 /prefetch:1
                                                                                                    4⤵
                                                                                                      PID:952
                                                                                                    • C:\Program Files (x86)\Microsoft\Edge\Application\90.0.818.66\identity_helper.exe
                                                                                                      "C:\Program Files (x86)\Microsoft\Edge\Application\90.0.818.66\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=1900,12359139689158892886,6645928379459829562,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5184 /prefetch:8
                                                                                                      4⤵
                                                                                                        PID:4704
                                                                                                    • C:\Windows\SYSTEM32\cmd.exe
                                                                                                      "cmd.exe" /C sudo rm -rf/
                                                                                                      3⤵
                                                                                                        PID:3232
                                                                                                        • C:\Windows\System32\Conhost.exe
                                                                                                          \??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                                                                                          4⤵
                                                                                                            PID:980
                                                                                                    • C:\Windows\system32\svchost.exe
                                                                                                      C:\Windows\system32\svchost.exe -k ClipboardSvcGroup -p -s cbdhsvc
                                                                                                      1⤵
                                                                                                        PID:3448
                                                                                                      • C:\Windows\system32\svchost.exe
                                                                                                        C:\Windows\system32\svchost.exe -k netsvcs -p -s Appinfo
                                                                                                        1⤵
                                                                                                          PID:3504
                                                                                                        • C:\Windows\System32\RuntimeBroker.exe
                                                                                                          C:\Windows\System32\RuntimeBroker.exe -Embedding
                                                                                                          1⤵
                                                                                                            PID:3896
                                                                                                          • C:\Windows\System32\RuntimeBroker.exe
                                                                                                            C:\Windows\System32\RuntimeBroker.exe -Embedding
                                                                                                            1⤵
                                                                                                              PID:3968
                                                                                                            • C:\Windows\system32\DllHost.exe
                                                                                                              C:\Windows\system32\DllHost.exe /Processid:{3EB3C877-1F16-487C-9050-104DBCD66683}
                                                                                                              1⤵
                                                                                                                PID:4020
                                                                                                              • C:\Windows\system32\svchost.exe
                                                                                                                C:\Windows\system32\svchost.exe -k UdkSvcGroup -s UdkUserSvc
                                                                                                                1⤵
                                                                                                                  PID:4084
                                                                                                                • C:\Windows\system32\DllHost.exe
                                                                                                                  C:\Windows\system32\DllHost.exe /Processid:{973D20D7-562D-44B9-B70B-5A0F49CCDF3F}
                                                                                                                  1⤵
                                                                                                                    PID:4276
                                                                                                                  • C:\Windows\system32\svchost.exe
                                                                                                                    C:\Windows\system32\svchost.exe -k osprivacy -p -s camsvc
                                                                                                                    1⤵
                                                                                                                      PID:4528
                                                                                                                    • C:\Windows\system32\svchost.exe
                                                                                                                      C:\Windows\system32\svchost.exe -k LocalService -p -s CDPSvc
                                                                                                                      1⤵
                                                                                                                        PID:1844
                                                                                                                      • C:\Windows\System32\svchost.exe
                                                                                                                        C:\Windows\System32\svchost.exe -k LocalSystemNetworkRestricted -p -s StorSvc
                                                                                                                        1⤵
                                                                                                                          PID:2320
                                                                                                                        • C:\Windows\system32\svchost.exe
                                                                                                                          C:\Windows\system32\svchost.exe -k LocalServiceNetworkRestricted -p -s WinHttpAutoProxySvc
                                                                                                                          1⤵
                                                                                                                            PID:2744
                                                                                                                          • C:\Program Files\Common Files\Microsoft Shared\ClickToRun\OfficeClickToRun.exe
                                                                                                                            "C:\Program Files\Common Files\Microsoft Shared\ClickToRun\OfficeClickToRun.exe" /service
                                                                                                                            1⤵
                                                                                                                            • Drops file in System32 directory
                                                                                                                            • Modifies data under HKEY_USERS
                                                                                                                            PID:1488
                                                                                                                          • C:\Windows\system32\SppExtComObj.exe
                                                                                                                            C:\Windows\system32\SppExtComObj.exe -Embedding
                                                                                                                            1⤵
                                                                                                                              PID:3040
                                                                                                                            • C:\Windows\System32\svchost.exe
                                                                                                                              C:\Windows\System32\svchost.exe -k LocalService -p -s LicenseManager
                                                                                                                              1⤵
                                                                                                                                PID:4632
                                                                                                                              • C:\Windows\system32\svchost.exe
                                                                                                                                C:\Windows\system32\svchost.exe -k netsvcs -p -s wlidsvc
                                                                                                                                1⤵
                                                                                                                                  PID:2364
                                                                                                                                • C:\Windows\system32\DllHost.exe
                                                                                                                                  C:\Windows\system32\DllHost.exe /Processid:{3EB3C877-1F16-487C-9050-104DBCD66683}
                                                                                                                                  1⤵
                                                                                                                                    PID:3756
                                                                                                                                  • C:\Windows\system32\svchost.exe
                                                                                                                                    C:\Windows\system32\svchost.exe -k LocalServiceNetworkRestricted -p -s NgcCtnrSvc
                                                                                                                                    1⤵
                                                                                                                                      PID:3728
                                                                                                                                    • C:\Windows\system32\svchost.exe
                                                                                                                                      C:\Windows\system32\svchost.exe -k netsvcs -p -s wlidsvc
                                                                                                                                      1⤵
                                                                                                                                      • Checks SCSI registry key(s)
                                                                                                                                      • Modifies data under HKEY_USERS
                                                                                                                                      PID:3056
                                                                                                                                    • C:\Windows\System32\CompPkgSrv.exe
                                                                                                                                      C:\Windows\System32\CompPkgSrv.exe -Embedding
                                                                                                                                      1⤵
                                                                                                                                        PID:1200
                                                                                                                                      • C:\Windows\System32\CompPkgSrv.exe
                                                                                                                                        C:\Windows\System32\CompPkgSrv.exe -Embedding
                                                                                                                                        1⤵
                                                                                                                                          PID:3180
                                                                                                                                        • C:\Windows\system32\wbem\wmiprvse.exe
                                                                                                                                          C:\Windows\system32\wbem\wmiprvse.exe -secured -Embedding
                                                                                                                                          1⤵
                                                                                                                                            PID:1356

                                                                                                                                          Network

                                                                                                                                          MITRE ATT&CK Enterprise v15

                                                                                                                                          Replay Monitor

                                                                                                                                          Loading Replay Monitor...

                                                                                                                                          Downloads

                                                                                                                                          • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\57C8EDB95DF3F0AD4EE2DC2B8CFD4157

                                                                                                                                            Filesize

                                                                                                                                            4KB

                                                                                                                                            MD5

                                                                                                                                            77b20b5cd41bc6bb475cca3f91ae6e3c

                                                                                                                                            SHA1

                                                                                                                                            9e98ace72bd2ab931341427a856ef4cea6faf806

                                                                                                                                            SHA256

                                                                                                                                            5511a9b9f9144ed7bde4ccb074733b7c564d918d2a8b10d391afc6be5b3b1509

                                                                                                                                            SHA512

                                                                                                                                            3537da5e7f3aba3dafe6a86e9511aba20b7a3d34f30aea6cc11feef7768bd63c0c85679c49e99c3291bd1b552ded2c6973b6c2f7f6d731bcfacecab218e72fd4

                                                                                                                                          • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\57C8EDB95DF3F0AD4EE2DC2B8CFD4157

                                                                                                                                            Filesize

                                                                                                                                            340B

                                                                                                                                            MD5

                                                                                                                                            5cfe47601974ba0d5f931d93fb6cda60

                                                                                                                                            SHA1

                                                                                                                                            12a649e6a68384a69509eaaa842b42cb17a48e9c

                                                                                                                                            SHA256

                                                                                                                                            f5a330f61d9bbf8eb001b23e80598ea1adbd216d7777f28d9d47eeef73dfe5bc

                                                                                                                                            SHA512

                                                                                                                                            93286f9201f4bf8a76922719604717ab219ae73ea12785e115b53fdc97d8c782f3841c088907035061606c1cf1b39531c1bd1295d98d8d946fb7f50b17757052

                                                                                                                                          • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\57C8EDB95DF3F0AD4EE2DC2B8CFD4157

                                                                                                                                            Filesize

                                                                                                                                            340B

                                                                                                                                            MD5

                                                                                                                                            aeb14a460507cb74e838c8bc36ef421c

                                                                                                                                            SHA1

                                                                                                                                            3ddc985fa7f84645721fe5b77fc2d678ca31d016

                                                                                                                                            SHA256

                                                                                                                                            3943f41eaf3aa59c4c51f2dc451a2af3029145fc4c3e0e988391cc1cc2024325

                                                                                                                                            SHA512

                                                                                                                                            252526f6f9a70e510ec3fd77ec15e09af3ef8fd115f737775544ff1b812ffbda9958ef8cef1d4de164a4682caa5c221ecf0916f0ba6a04c2a2baf207982477f5

                                                                                                                                          • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad\settings.dat

                                                                                                                                            Filesize

                                                                                                                                            152B

                                                                                                                                            MD5

                                                                                                                                            46e6ad711a84b5dc7b30b75297d64875

                                                                                                                                            SHA1

                                                                                                                                            8ca343bfab1e2c04e67b9b16b8e06ba463b4f485

                                                                                                                                            SHA256

                                                                                                                                            77b51492a40a511e57e7a7ecf76715a2fd46533c0f0d0d5a758f0224e201c77f

                                                                                                                                            SHA512

                                                                                                                                            8472710b638b0aeee4678f41ed2dff72b39b929b2802716c0c9f96db24c63096b94c9969575e4698f16e412f82668b5c9b5cb747e8a2219429dbb476a31d297e

                                                                                                                                          • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad\settings.dat

                                                                                                                                            Filesize

                                                                                                                                            152B

                                                                                                                                            MD5

                                                                                                                                            fdee96b970080ef7f5bfa5964075575e

                                                                                                                                            SHA1

                                                                                                                                            2c821998dc2674d291bfa83a4df46814f0c29ab4

                                                                                                                                            SHA256

                                                                                                                                            a241023f360b300e56b2b0e1205b651e1244b222e1f55245ca2d06d3162a62f0

                                                                                                                                            SHA512

                                                                                                                                            20875c3002323f5a9b1b71917d6bd4e4c718c9ca325c90335bd475ddcb25eac94cb3f29795fa6476d6d6e757622b8b0577f008eec2c739c2eec71d2e8b372cff

                                                                                                                                          • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index

                                                                                                                                            Filesize

                                                                                                                                            816B

                                                                                                                                            MD5

                                                                                                                                            2e94316a58c3d52f3770147640b1e9db

                                                                                                                                            SHA1

                                                                                                                                            6cca8f3354a81660b888c70b71b4304f81d22eea

                                                                                                                                            SHA256

                                                                                                                                            5029947a76f8686f465a4c99fb4c6beab574bfadc7a8cf3b9ca0d9cb119ec0b4

                                                                                                                                            SHA512

                                                                                                                                            a321dbe8968454eb71d382d254234c2a2d2722e67f5653cf7f86d5861d994e4fe5c33e49e5915c108730021c5e3d284bbd9076a9c203d8ee0e06be6a9767322c

                                                                                                                                          • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Preferences

                                                                                                                                            Filesize

                                                                                                                                            6KB

                                                                                                                                            MD5

                                                                                                                                            07ee01a54b2412adb61e8b28794db705

                                                                                                                                            SHA1

                                                                                                                                            ac415497252acb8addc5ec27aca78cd35b0f24b1

                                                                                                                                            SHA256

                                                                                                                                            671b78221e446abfa4adb8eecc4efec1e8e1918ccf306c1d0fbf56bf664ecf46

                                                                                                                                            SHA512

                                                                                                                                            72c0e967d656b365e0f60831126d2954b2e0abacbc4064928d4863ea933ce9cec545aa6c91464bacc3e4e62b692af25277d7f590a74ea7ebde96465976c1a2ff

                                                                                                                                          • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Preferences

                                                                                                                                            Filesize

                                                                                                                                            5KB

                                                                                                                                            MD5

                                                                                                                                            cae242083ce5c59cf599617d4d5c5c3e

                                                                                                                                            SHA1

                                                                                                                                            2bd5e7d28cd0632511b4843125b086421b271caf

                                                                                                                                            SHA256

                                                                                                                                            3c79f76c8127e4d4158798ef3f2211d4766393de2976c8269e0ce637de62faff

                                                                                                                                            SHA512

                                                                                                                                            5a64a9ceb63df66e480af132d0cc0fc622ac42f05ef265d74b9eae431cdd85f297ae5c568c9fd710536a1607476c7494f7a2030feda62d1eef8688472e736617

                                                                                                                                          • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Service Worker\ScriptCache\index-dir\the-real-index

                                                                                                                                            Filesize

                                                                                                                                            96B

                                                                                                                                            MD5

                                                                                                                                            0ba53f651f57b62da5956d50c97a38cc

                                                                                                                                            SHA1

                                                                                                                                            71babb40d9ef3a6a12580e2e6813c64c58fda578

                                                                                                                                            SHA256

                                                                                                                                            e8005c89662d2a36c40fb4737cac59fb32bdb9319f639f3da408f8ee40589cb1

                                                                                                                                            SHA512

                                                                                                                                            8ef8047baf765ca5a314e684d56e686a440e2d5af66a64f311a1683b1562d24da145a675f7a639cf6d1552f1d98ce557a8cc7b798e697a26da094cf74c4293ab

                                                                                                                                          • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Service Worker\ScriptCache\index-dir\the-real-index~RFe59f488.TMP

                                                                                                                                            Filesize

                                                                                                                                            48B

                                                                                                                                            MD5

                                                                                                                                            c0fa405816c9431c01db27060c5c74c6

                                                                                                                                            SHA1

                                                                                                                                            cb5dc9ade30da34874bad40028ce404f6bb231ac

                                                                                                                                            SHA256

                                                                                                                                            e40f1fd15844a2fcbabe59fa103d747a07310d5f7d35cbe62bd159bcf15d1c09

                                                                                                                                            SHA512

                                                                                                                                            a64926f53505684df5f823c2d6b3ef1ba33e73d25d6a2c8bc80e8827239312e71b037220e6423e279c5a2f1fd86667eb316e819eec61c9a4cc50addc1793d5f6

                                                                                                                                          • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\data_reduction_proxy_leveldb\CURRENT

                                                                                                                                            Filesize

                                                                                                                                            16B

                                                                                                                                            MD5

                                                                                                                                            46295cac801e5d4857d09837238a6394

                                                                                                                                            SHA1

                                                                                                                                            44e0fa1b517dbf802b18faf0785eeea6ac51594b

                                                                                                                                            SHA256

                                                                                                                                            0f1bad70c7bd1e0a69562853ec529355462fcd0423263a3d39d6d0d70b780443

                                                                                                                                            SHA512

                                                                                                                                            8969402593f927350e2ceb4b5bc2a277f3754697c1961e3d6237da322257fbab42909e1a742e22223447f3a4805f8d8ef525432a7c3515a549e984d3eff72b23

                                                                                                                                          • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\data_reduction_proxy_leveldb\CURRENT

                                                                                                                                            Filesize

                                                                                                                                            16B

                                                                                                                                            MD5

                                                                                                                                            206702161f94c5cd39fadd03f4014d98

                                                                                                                                            SHA1

                                                                                                                                            bd8bfc144fb5326d21bd1531523d9fb50e1b600a

                                                                                                                                            SHA256

                                                                                                                                            1005a525006f148c86efcbfb36c6eac091b311532448010f70f7de9a68007167

                                                                                                                                            SHA512

                                                                                                                                            0af09f26941b11991c750d1a2b525c39a8970900e98cba96fd1b55dbf93fee79e18b8aab258f48b4f7bda40d059629bc7770d84371235cdb1352a4f17f80e145

                                                                                                                                          • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Local State

                                                                                                                                            Filesize

                                                                                                                                            10KB

                                                                                                                                            MD5

                                                                                                                                            13ec173558148f0c37b7d46aad123735

                                                                                                                                            SHA1

                                                                                                                                            a008b59850538f6ce6a9384c2f70cd3fc1563f43

                                                                                                                                            SHA256

                                                                                                                                            c97fe267e4ea5e897a17e66806ad603a8d8b82967c1c73bfc24ea1bd7616b5a9

                                                                                                                                            SHA512

                                                                                                                                            bf7a1bbe289902a3bdd9030ed5cbaf69bbfe17000f7fc80cbdda5d7e7a32c202de8112692d838a28c459fc0858be54f637d324207825d3b11150f98c1c161f13

                                                                                                                                          • C:\Users\Admin\AppData\Local\Temp\tmpA4A7.tmp.png

                                                                                                                                            Filesize

                                                                                                                                            8KB

                                                                                                                                            MD5

                                                                                                                                            771088481c5015f812913eda4cdb6217

                                                                                                                                            SHA1

                                                                                                                                            c74f400b81f7cad80ee77a1a0509aee4c8e86424

                                                                                                                                            SHA256

                                                                                                                                            fc92e580ca07c788ced70ff57f2c8d5bbbaeb02ecc5c3b6a77378c4be2d07f6d

                                                                                                                                            SHA512

                                                                                                                                            5bb52cb579bee53dea93af6d86f264a1b578a8a8ade71b6be700d65bc8412971372989ce7e4e80f9817ec5698cc3748aae90c459fbb7d8432a42fe6dd3922066

                                                                                                                                          • C:\Users\Admin\AppData\Roaming\Microsoft\Protect\S-1-5-21-3587106988-279496464-3440778474-1000\Preferred

                                                                                                                                            Filesize

                                                                                                                                            24B

                                                                                                                                            MD5

                                                                                                                                            5729f09cd074d59d775fdf2c889df6f4

                                                                                                                                            SHA1

                                                                                                                                            deddd79ce8f5269e97aea11f8819c01dbc46598a

                                                                                                                                            SHA256

                                                                                                                                            81c14ff399f4164a5d6fb0809fa506131827b63b749370037ee97f3926fef92e

                                                                                                                                            SHA512

                                                                                                                                            5b13e92e5df050f04668613740c471a8c673980e60bf0d25f76ab93acb4e780b75153c2e817a5d7842a5a47e2a235e5e65ffe5212de90d4fa94f519ee457b74f

                                                                                                                                          • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Themes\CachedFiles\CachedImage_1280_720_POS4.jpg

                                                                                                                                            Filesize

                                                                                                                                            105KB

                                                                                                                                            MD5

                                                                                                                                            48bc72e5572d39d1d6695a93dd710e75

                                                                                                                                            SHA1

                                                                                                                                            01e0aba68465932dec70206c230516ac971f4a78

                                                                                                                                            SHA256

                                                                                                                                            f439c862dcd25e18f5a9d9cb74d2dfad4fdf1f6ee9b758fc3e74cc4aa4eee104

                                                                                                                                            SHA512

                                                                                                                                            047bfa09135b5b3e20e05562561be650e01f5f682326438c69350bce563d7a73c9d0360a02db91f05ee6dac9637933b0fdb74958e215012f42f6e838d832b179

                                                                                                                                          • C:\Windows\System32\Microsoft\Protect\S-1-5-18\User\Preferred

                                                                                                                                            Filesize

                                                                                                                                            24B

                                                                                                                                            MD5

                                                                                                                                            013c46d3729b0afc50ed4ca200c93308

                                                                                                                                            SHA1

                                                                                                                                            77c153c5c142578a0e54958f661c89bc501ce983

                                                                                                                                            SHA256

                                                                                                                                            2c938e84535fa2059bcc1ef6e374c2fcaf1c512de29380dd9dbcb2028c2a5681

                                                                                                                                            SHA512

                                                                                                                                            a209903d3b4a9312b947973d23c481c0e36c1d249207d4fd6c3ba8e759b0073676763c2a82dda9fe35b562120bfd9ff941116797ea2cde578432dddf5f2854bc

                                                                                                                                          • memory/480-35-0x0000029DAF480000-0x0000029DAF4AA000-memory.dmp

                                                                                                                                            Filesize

                                                                                                                                            168KB

                                                                                                                                          • memory/480-41-0x0000029DAF480000-0x0000029DAF4AA000-memory.dmp

                                                                                                                                            Filesize

                                                                                                                                            168KB

                                                                                                                                          • memory/480-36-0x00007FF864670000-0x00007FF864680000-memory.dmp

                                                                                                                                            Filesize

                                                                                                                                            64KB

                                                                                                                                          • memory/636-29-0x00000246E7CA0000-0x00000246E7CC3000-memory.dmp

                                                                                                                                            Filesize

                                                                                                                                            140KB

                                                                                                                                          • memory/636-21-0x00007FF864670000-0x00007FF864680000-memory.dmp

                                                                                                                                            Filesize

                                                                                                                                            64KB

                                                                                                                                          • memory/636-20-0x00000246E7CD0000-0x00000246E7CFA000-memory.dmp

                                                                                                                                            Filesize

                                                                                                                                            168KB

                                                                                                                                          • memory/636-30-0x00000246E7CD0000-0x00000246E7CFA000-memory.dmp

                                                                                                                                            Filesize

                                                                                                                                            168KB

                                                                                                                                          • memory/636-31-0x00007FF8A4684000-0x00007FF8A4685000-memory.dmp

                                                                                                                                            Filesize

                                                                                                                                            4KB

                                                                                                                                          • memory/680-273-0x000001CA40370000-0x000001CA4039A000-memory.dmp

                                                                                                                                            Filesize

                                                                                                                                            168KB

                                                                                                                                          • memory/680-52-0x000001CA40370000-0x000001CA4039A000-memory.dmp

                                                                                                                                            Filesize

                                                                                                                                            168KB

                                                                                                                                          • memory/680-50-0x00007FF864670000-0x00007FF864680000-memory.dmp

                                                                                                                                            Filesize

                                                                                                                                            64KB

                                                                                                                                          • memory/680-49-0x000001CA40370000-0x000001CA4039A000-memory.dmp

                                                                                                                                            Filesize

                                                                                                                                            168KB

                                                                                                                                          • memory/692-24-0x0000024B57730000-0x0000024B5775A000-memory.dmp

                                                                                                                                            Filesize

                                                                                                                                            168KB

                                                                                                                                          • memory/692-25-0x00007FF864670000-0x00007FF864680000-memory.dmp

                                                                                                                                            Filesize

                                                                                                                                            64KB

                                                                                                                                          • memory/692-32-0x0000024B57730000-0x0000024B5775A000-memory.dmp

                                                                                                                                            Filesize

                                                                                                                                            168KB

                                                                                                                                          • memory/716-272-0x0000024408DB0000-0x0000024408DDA000-memory.dmp

                                                                                                                                            Filesize

                                                                                                                                            168KB

                                                                                                                                          • memory/716-47-0x0000024408DB0000-0x0000024408DDA000-memory.dmp

                                                                                                                                            Filesize

                                                                                                                                            168KB

                                                                                                                                          • memory/716-44-0x0000024408DB0000-0x0000024408DDA000-memory.dmp

                                                                                                                                            Filesize

                                                                                                                                            168KB

                                                                                                                                          • memory/716-45-0x00007FF864670000-0x00007FF864680000-memory.dmp

                                                                                                                                            Filesize

                                                                                                                                            64KB

                                                                                                                                          • memory/996-42-0x0000021549140000-0x000002154916A000-memory.dmp

                                                                                                                                            Filesize

                                                                                                                                            168KB

                                                                                                                                          • memory/996-38-0x0000021549140000-0x000002154916A000-memory.dmp

                                                                                                                                            Filesize

                                                                                                                                            168KB

                                                                                                                                          • memory/996-271-0x0000021549140000-0x000002154916A000-memory.dmp

                                                                                                                                            Filesize

                                                                                                                                            168KB

                                                                                                                                          • memory/996-39-0x00007FF864670000-0x00007FF864680000-memory.dmp

                                                                                                                                            Filesize

                                                                                                                                            64KB

                                                                                                                                          • memory/1076-62-0x00007FF864670000-0x00007FF864680000-memory.dmp

                                                                                                                                            Filesize

                                                                                                                                            64KB

                                                                                                                                          • memory/1076-61-0x000001A801890000-0x000001A8018BA000-memory.dmp

                                                                                                                                            Filesize

                                                                                                                                            168KB

                                                                                                                                          • memory/1084-64-0x000002D610EC0000-0x000002D610EEA000-memory.dmp

                                                                                                                                            Filesize

                                                                                                                                            168KB

                                                                                                                                          • memory/1084-65-0x00007FF864670000-0x00007FF864680000-memory.dmp

                                                                                                                                            Filesize

                                                                                                                                            64KB

                                                                                                                                          • memory/1228-67-0x000002D176190000-0x000002D1761BA000-memory.dmp

                                                                                                                                            Filesize

                                                                                                                                            168KB

                                                                                                                                          • memory/1228-68-0x00007FF864670000-0x00007FF864680000-memory.dmp

                                                                                                                                            Filesize

                                                                                                                                            64KB

                                                                                                                                          • memory/1244-71-0x00007FF864670000-0x00007FF864680000-memory.dmp

                                                                                                                                            Filesize

                                                                                                                                            64KB

                                                                                                                                          • memory/1244-70-0x00000191AE970000-0x00000191AE99A000-memory.dmp

                                                                                                                                            Filesize

                                                                                                                                            168KB

                                                                                                                                          • memory/1292-74-0x00007FF864670000-0x00007FF864680000-memory.dmp

                                                                                                                                            Filesize

                                                                                                                                            64KB

                                                                                                                                          • memory/1292-73-0x000002D88B550000-0x000002D88B57A000-memory.dmp

                                                                                                                                            Filesize

                                                                                                                                            168KB

                                                                                                                                          • memory/1328-76-0x000001D053F10000-0x000001D053F3A000-memory.dmp

                                                                                                                                            Filesize

                                                                                                                                            168KB

                                                                                                                                          • memory/1328-77-0x00007FF864670000-0x00007FF864680000-memory.dmp

                                                                                                                                            Filesize

                                                                                                                                            64KB

                                                                                                                                          • memory/1344-79-0x000001E1F4C60000-0x000001E1F4C8A000-memory.dmp

                                                                                                                                            Filesize

                                                                                                                                            168KB

                                                                                                                                          • memory/1344-80-0x00007FF864670000-0x00007FF864680000-memory.dmp

                                                                                                                                            Filesize

                                                                                                                                            64KB

                                                                                                                                          • memory/1432-82-0x00000278D1670000-0x00000278D169A000-memory.dmp

                                                                                                                                            Filesize

                                                                                                                                            168KB

                                                                                                                                          • memory/1432-83-0x00007FF864670000-0x00007FF864680000-memory.dmp

                                                                                                                                            Filesize

                                                                                                                                            64KB

                                                                                                                                          • memory/1496-13-0x0000000140000000-0x0000000140040000-memory.dmp

                                                                                                                                            Filesize

                                                                                                                                            256KB

                                                                                                                                          • memory/1496-15-0x00007FF8A3180000-0x00007FF8A323D000-memory.dmp

                                                                                                                                            Filesize

                                                                                                                                            756KB

                                                                                                                                          • memory/1496-11-0x0000000140000000-0x0000000140040000-memory.dmp

                                                                                                                                            Filesize

                                                                                                                                            256KB

                                                                                                                                          • memory/1496-14-0x00007FF8A45E0000-0x00007FF8A47E9000-memory.dmp

                                                                                                                                            Filesize

                                                                                                                                            2.0MB

                                                                                                                                          • memory/1496-270-0x00007FF8A45E0000-0x00007FF8A47E9000-memory.dmp

                                                                                                                                            Filesize

                                                                                                                                            2.0MB

                                                                                                                                          • memory/1496-28-0x00007FF8A45E0000-0x00007FF8A47E9000-memory.dmp

                                                                                                                                            Filesize

                                                                                                                                            2.0MB

                                                                                                                                          • memory/1496-12-0x0000000140000000-0x0000000140040000-memory.dmp

                                                                                                                                            Filesize

                                                                                                                                            256KB

                                                                                                                                          • memory/1496-16-0x0000000140000000-0x0000000140040000-memory.dmp

                                                                                                                                            Filesize

                                                                                                                                            256KB

                                                                                                                                          • memory/1496-27-0x00007FF8A45E1000-0x00007FF8A470A000-memory.dmp

                                                                                                                                            Filesize

                                                                                                                                            1.2MB

                                                                                                                                          • memory/4948-9-0x00007FF8A3180000-0x00007FF8A323D000-memory.dmp

                                                                                                                                            Filesize

                                                                                                                                            756KB

                                                                                                                                          • memory/4948-6-0x00007FF883110000-0x00007FF883BD2000-memory.dmp

                                                                                                                                            Filesize

                                                                                                                                            10.8MB

                                                                                                                                          • memory/4948-267-0x00007FF883110000-0x00007FF883BD2000-memory.dmp

                                                                                                                                            Filesize

                                                                                                                                            10.8MB

                                                                                                                                          • memory/4948-0-0x00007FF883113000-0x00007FF883115000-memory.dmp

                                                                                                                                            Filesize

                                                                                                                                            8KB

                                                                                                                                          • memory/4948-269-0x00007FF883110000-0x00007FF883BD2000-memory.dmp

                                                                                                                                            Filesize

                                                                                                                                            10.8MB

                                                                                                                                          • memory/4948-8-0x00007FF8A45E0000-0x00007FF8A47E9000-memory.dmp

                                                                                                                                            Filesize

                                                                                                                                            2.0MB

                                                                                                                                          • memory/4948-10-0x00007FF883110000-0x00007FF883BD2000-memory.dmp

                                                                                                                                            Filesize

                                                                                                                                            10.8MB

                                                                                                                                          • memory/4948-7-0x000001FFA57F0000-0x000001FFA582E000-memory.dmp

                                                                                                                                            Filesize

                                                                                                                                            248KB

                                                                                                                                          • memory/4948-18-0x00007FF883110000-0x00007FF883BD2000-memory.dmp

                                                                                                                                            Filesize

                                                                                                                                            10.8MB

                                                                                                                                          • memory/4948-5-0x00007FF883113000-0x00007FF883115000-memory.dmp

                                                                                                                                            Filesize

                                                                                                                                            8KB

                                                                                                                                          • memory/4948-514-0x000001FFA7390000-0x000001FFA739E000-memory.dmp

                                                                                                                                            Filesize

                                                                                                                                            56KB

                                                                                                                                          • memory/4948-4-0x000001FFA6CF0000-0x000001FFA7218000-memory.dmp

                                                                                                                                            Filesize

                                                                                                                                            5.2MB

                                                                                                                                          • memory/4948-3-0x00007FF883110000-0x00007FF883BD2000-memory.dmp

                                                                                                                                            Filesize

                                                                                                                                            10.8MB

                                                                                                                                          • memory/4948-2-0x000001FFA5870000-0x000001FFA5A32000-memory.dmp

                                                                                                                                            Filesize

                                                                                                                                            1.8MB

                                                                                                                                          • memory/4948-1-0x000001FF8B1C0000-0x000001FF8B1D8000-memory.dmp

                                                                                                                                            Filesize

                                                                                                                                            96KB