Analysis

  • max time kernel
    720s
  • max time network
    890s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20250217-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20250217-enlocale:en-usos:windows10-2004-x64system
  • submitted
    08/03/2025, 22:10

General

  • Target

    rat/SilverClient - Copy (12).exe

  • Size

    43KB

  • MD5

    44a5ff2feda2634ae7d9fadc97ebd0a0

  • SHA1

    9a763aefd806585e11a36203e575ae142f38bc6c

  • SHA256

    5dde6801897a7d76c16e64c0b36a3280fbf5371642a690b85ddd31538c4458d8

  • SHA512

    cebc24998c33d7fe8bcdba5183d60c36b3ccaac247d0ee206a73485236453c109dc269522df01d85f58efd3d7a28358221f2139f11356f95f9b8283475f576ca

  • SSDEEP

    768:GdmcASe38zJ/Ol6IoZmtPHJm7+avCJ8eEPNRULQD9PUGa7AB6Sh/lE:GdmcASeuOtvhmeZKNGsD9pYAoS/lE

Malware Config

Extracted

Family

silverrat

Version

1.0.0.0

C2

if-eventually.gl.at.ply.gg:17094

Mutex

Mutex_DthEiIseBZ

Attributes
  • certificate

    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

  • decrypted_key

    -|S.S.S|-

  • key

    yy6zDjAUmbB09pKvo5Hhug==

  • key_x509

    eGlwZU1BZVJwdkFBdllxYmdRQUJ2eWtsbVVURFhE

  • reconnect_delay

    0

  • server_signature

    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

Signatures

  • SilverRat

    SilverRat is trojan written in C#.

  • Silverrat family
  • Sets file to hidden 1 TTPs 2 IoCs

    Modifies file attributes to stop it showing in Explorer etc.

  • Checks computer location settings 2 TTPs 2 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Executes dropped EXE 1 IoCs
  • Adds Run key to start application 2 TTPs 1 IoCs
  • Command and Scripting Interpreter: PowerShell 1 TTPs 1 IoCs

    Using powershell.exe command.

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Delays execution with timeout.exe 1 IoCs
  • Scheduled Task/Job: Scheduled Task 1 TTPs 2 IoCs

    Schtasks is often used by malware for persistence or to perform post-infection execution.

  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 46 IoCs
  • Suspicious use of SetWindowsHookEx 1 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs
  • Uses Task Scheduler COM API 1 TTPs

    The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.

  • Uses Volume Shadow Copy service COM API

    The Volume Shadow Copy service is used to manage backups/snapshots.

  • Views/modifies file attributes 1 TTPs 2 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\rat\SilverClient - Copy (12).exe
    "C:\Users\Admin\AppData\Local\Temp\rat\SilverClient - Copy (12).exe"
    1⤵
    • Checks computer location settings
    • Adds Run key to start application
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:2052
    • C:\Windows\System32\attrib.exe
      "C:\Windows\System32\attrib.exe" +s +h "C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Templates\SysTemp64"
      2⤵
      • Sets file to hidden
      • Views/modifies file attributes
      PID:924
    • C:\Windows\System32\attrib.exe
      "C:\Windows\System32\attrib.exe" +s +h "C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Templates\SysTemp64\$77Runtime Broker.exe"
      2⤵
      • Sets file to hidden
      • Views/modifies file attributes
      PID:3748
    • C:\Windows\system32\cmd.exe
      C:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\tmpF4EF.tmp.bat""
      2⤵
      • Suspicious use of WriteProcessMemory
      PID:3992
      • C:\Windows\system32\timeout.exe
        timeout 3
        3⤵
        • Delays execution with timeout.exe
        PID:1080
      • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Templates\SysTemp64\$77Runtime Broker.exe
        "C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Templates\SysTemp64\$77Runtime Broker.exe"
        3⤵
        • Checks computer location settings
        • Executes dropped EXE
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious behavior: GetForegroundWindowSpam
        • Suspicious use of AdjustPrivilegeToken
        • Suspicious use of SetWindowsHookEx
        • Suspicious use of WriteProcessMemory
        PID:4476
        • C:\Windows\SYSTEM32\schtasks.exe
          "schtasks.exe" /query /TN $77Runtime Broker.exe
          4⤵
            PID:3868
          • C:\Windows\SYSTEM32\schtasks.exe
            "schtasks.exe" /Create /SC ONCE /TN "$77Runtime Broker.exe" /TR "C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Templates\SysTemp64\$77Runtime Broker.exe \"\$77Runtime Broker.exe\" /AsAdmin" /ST 00:01 /IT /F /RL HIGHEST
            4⤵
            • Scheduled Task/Job: Scheduled Task
            PID:1700
          • C:\Windows\SYSTEM32\schtasks.exe
            "schtasks.exe" /query /TN $77Runtime Broker.exe
            4⤵
              PID:208
            • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
              "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Set-MpPreference -ExclusionExtension exe,bat,dll,ps1;exit
              4⤵
              • Command and Scripting Interpreter: PowerShell
              • Suspicious behavior: EnumeratesProcesses
              • Suspicious use of AdjustPrivilegeToken
              PID:5004
            • C:\Windows\System32\schtasks.exe
              "C:\Windows\System32\schtasks.exe" /create /sc hourly /mo 1 /tn "Runtime Broker_Task-HOURLY-01" /tr "%MyFile%" /st 00:00
              4⤵
              • Scheduled Task/Job: Scheduled Task
              PID:4904
            • C:\Windows\System32\cmd.exe
              "C:\Windows\System32\cmd.exe"
              4⤵
                PID:908
              • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"
                4⤵
                • Suspicious behavior: EnumeratesProcesses
                • Suspicious use of AdjustPrivilegeToken
                PID:3000
              • C:\Windows\System32\cmd.exe
                "C:\Windows\System32\cmd.exe"
                4⤵
                  PID:4068
                • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                  "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"
                  4⤵
                  • Suspicious behavior: EnumeratesProcesses
                  • Suspicious use of AdjustPrivilegeToken
                  PID:1380
                • C:\Windows\System32\cmd.exe
                  "C:\Windows\System32\cmd.exe"
                  4⤵
                    PID:3576
                  • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                    "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"
                    4⤵
                    • Suspicious behavior: EnumeratesProcesses
                    • Suspicious use of AdjustPrivilegeToken
                    PID:4780
                  • C:\Windows\System32\cmd.exe
                    "C:\Windows\System32\cmd.exe"
                    4⤵
                      PID:3524
                    • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                      "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"
                      4⤵
                      • Suspicious behavior: EnumeratesProcesses
                      • Suspicious use of AdjustPrivilegeToken
                      PID:2184
                    • C:\Windows\System32\cmd.exe
                      "C:\Windows\System32\cmd.exe"
                      4⤵
                        PID:2344
                      • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                        "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"
                        4⤵
                        • Suspicious behavior: EnumeratesProcesses
                        • Suspicious use of AdjustPrivilegeToken
                        PID:184
                      • C:\Windows\System32\cmd.exe
                        "C:\Windows\System32\cmd.exe"
                        4⤵
                          PID:2804
                        • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                          "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"
                          4⤵
                          • Suspicious behavior: EnumeratesProcesses
                          • Suspicious use of AdjustPrivilegeToken
                          PID:3440
                        • C:\Windows\System32\cmd.exe
                          "C:\Windows\System32\cmd.exe"
                          4⤵
                            PID:308
                          • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                            "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"
                            4⤵
                            • Suspicious behavior: EnumeratesProcesses
                            • Suspicious use of AdjustPrivilegeToken
                            PID:4356
                          • C:\Windows\System32\cmd.exe
                            "C:\Windows\System32\cmd.exe"
                            4⤵
                              PID:4816
                            • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                              "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"
                              4⤵
                              • Suspicious behavior: EnumeratesProcesses
                              • Suspicious use of AdjustPrivilegeToken
                              PID:3284
                            • C:\Windows\System32\cmd.exe
                              "C:\Windows\System32\cmd.exe"
                              4⤵
                                PID:4852
                              • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"
                                4⤵
                                • Suspicious behavior: EnumeratesProcesses
                                • Suspicious use of AdjustPrivilegeToken
                                PID:3536
                              • C:\Windows\System32\cmd.exe
                                "C:\Windows\System32\cmd.exe"
                                4⤵
                                  PID:2276
                                • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                  "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"
                                  4⤵
                                  • Suspicious behavior: EnumeratesProcesses
                                  • Suspicious use of AdjustPrivilegeToken
                                  PID:2628
                                • C:\Windows\System32\cmd.exe
                                  "C:\Windows\System32\cmd.exe"
                                  4⤵
                                    PID:940
                                  • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                    "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"
                                    4⤵
                                    • Suspicious behavior: EnumeratesProcesses
                                    • Suspicious use of AdjustPrivilegeToken
                                    PID:5068
                                  • C:\Windows\System32\cmd.exe
                                    "C:\Windows\System32\cmd.exe"
                                    4⤵
                                      PID:5024
                                    • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                      "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"
                                      4⤵
                                      • Suspicious behavior: EnumeratesProcesses
                                      • Suspicious use of AdjustPrivilegeToken
                                      PID:4576
                                    • C:\Windows\System32\cmd.exe
                                      "C:\Windows\System32\cmd.exe"
                                      4⤵
                                        PID:4008
                                      • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                        "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"
                                        4⤵
                                        • Suspicious use of AdjustPrivilegeToken
                                        PID:2072
                                      • C:\Windows\System32\cmd.exe
                                        "C:\Windows\System32\cmd.exe"
                                        4⤵
                                          PID:1000
                                        • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                          "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"
                                          4⤵
                                          • Suspicious use of AdjustPrivilegeToken
                                          PID:1192
                                        • C:\Windows\System32\cmd.exe
                                          "C:\Windows\System32\cmd.exe"
                                          4⤵
                                            PID:5076
                                          • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                            "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"
                                            4⤵
                                            • Suspicious use of AdjustPrivilegeToken
                                            PID:4344
                                          • C:\Windows\System32\cmd.exe
                                            "C:\Windows\System32\cmd.exe"
                                            4⤵
                                              PID:4736
                                            • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                              "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"
                                              4⤵
                                              • Suspicious use of AdjustPrivilegeToken
                                              PID:4952
                                            • C:\Windows\System32\cmd.exe
                                              "C:\Windows\System32\cmd.exe"
                                              4⤵
                                                PID:2740
                                              • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"
                                                4⤵
                                                • Suspicious use of AdjustPrivilegeToken
                                                PID:3404
                                              • C:\Windows\System32\cmd.exe
                                                "C:\Windows\System32\cmd.exe"
                                                4⤵
                                                  PID:612
                                                • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                  "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"
                                                  4⤵
                                                  • Suspicious use of AdjustPrivilegeToken
                                                  PID:5144
                                                • C:\Windows\System32\cmd.exe
                                                  "C:\Windows\System32\cmd.exe"
                                                  4⤵
                                                    PID:5360
                                                  • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                    "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"
                                                    4⤵
                                                    • Suspicious use of AdjustPrivilegeToken
                                                    PID:5476
                                                  • C:\Windows\System32\cmd.exe
                                                    "C:\Windows\System32\cmd.exe"
                                                    4⤵
                                                      PID:5660
                                                    • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                      "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"
                                                      4⤵
                                                      • Suspicious use of AdjustPrivilegeToken
                                                      PID:5776
                                                    • C:\Windows\System32\cmd.exe
                                                      "C:\Windows\System32\cmd.exe"
                                                      4⤵
                                                        PID:5828
                                                      • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                        "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"
                                                        4⤵
                                                        • Suspicious use of AdjustPrivilegeToken
                                                        PID:6000
                                                      • C:\Windows\System32\cmd.exe
                                                        "C:\Windows\System32\cmd.exe"
                                                        4⤵
                                                          PID:6048
                                                        • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                          "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"
                                                          4⤵
                                                          • Suspicious use of AdjustPrivilegeToken
                                                          PID:6136
                                                        • C:\Windows\System32\cmd.exe
                                                          "C:\Windows\System32\cmd.exe"
                                                          4⤵
                                                            PID:5512
                                                          • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                            "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"
                                                            4⤵
                                                            • Suspicious use of AdjustPrivilegeToken
                                                            PID:5616
                                                          • C:\Windows\System32\cmd.exe
                                                            "C:\Windows\System32\cmd.exe"
                                                            4⤵
                                                              PID:5716
                                                            • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                              "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"
                                                              4⤵
                                                              • Suspicious use of AdjustPrivilegeToken
                                                              PID:5956
                                                            • C:\Windows\System32\cmd.exe
                                                              "C:\Windows\System32\cmd.exe"
                                                              4⤵
                                                                PID:5168
                                                              • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                                "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"
                                                                4⤵
                                                                • Suspicious use of AdjustPrivilegeToken
                                                                PID:6236
                                                              • C:\Windows\System32\cmd.exe
                                                                "C:\Windows\System32\cmd.exe"
                                                                4⤵
                                                                  PID:6284
                                                                • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                                  "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"
                                                                  4⤵
                                                                  • Suspicious use of AdjustPrivilegeToken
                                                                  PID:6392
                                                                • C:\Windows\System32\cmd.exe
                                                                  "C:\Windows\System32\cmd.exe"
                                                                  4⤵
                                                                    PID:6540
                                                                  • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                                    "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"
                                                                    4⤵
                                                                    • Suspicious use of AdjustPrivilegeToken
                                                                    PID:6696
                                                                  • C:\Windows\System32\cmd.exe
                                                                    "C:\Windows\System32\cmd.exe"
                                                                    4⤵
                                                                      PID:6844
                                                                    • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                                      "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"
                                                                      4⤵
                                                                      • Suspicious use of AdjustPrivilegeToken
                                                                      PID:7008
                                                                      • C:\Windows\system32\wermgr.exe
                                                                        "C:\Windows\system32\wermgr.exe" "-outproc" "0" "7008" "2488" "2340" "2492" "0" "0" "2496" "0" "0" "0" "0" "0"
                                                                        5⤵
                                                                          PID:8208
                                                                      • C:\Windows\System32\cmd.exe
                                                                        "C:\Windows\System32\cmd.exe"
                                                                        4⤵
                                                                          PID:7108
                                                                        • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                                          "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"
                                                                          4⤵
                                                                          • Suspicious use of AdjustPrivilegeToken
                                                                          PID:4452
                                                                        • C:\Windows\System32\cmd.exe
                                                                          "C:\Windows\System32\cmd.exe"
                                                                          4⤵
                                                                            PID:5176
                                                                          • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                                            "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"
                                                                            4⤵
                                                                            • Suspicious use of AdjustPrivilegeToken
                                                                            PID:5888
                                                                          • C:\Windows\System32\cmd.exe
                                                                            "C:\Windows\System32\cmd.exe"
                                                                            4⤵
                                                                              PID:6860
                                                                            • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                                              "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"
                                                                              4⤵
                                                                              • Suspicious use of AdjustPrivilegeToken
                                                                              PID:6336
                                                                            • C:\Windows\System32\cmd.exe
                                                                              "C:\Windows\System32\cmd.exe"
                                                                              4⤵
                                                                                PID:6496
                                                                              • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                                                "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"
                                                                                4⤵
                                                                                • Suspicious use of AdjustPrivilegeToken
                                                                                PID:6900
                                                                              • C:\Windows\System32\cmd.exe
                                                                                "C:\Windows\System32\cmd.exe"
                                                                                4⤵
                                                                                  PID:7268
                                                                                • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                                                  "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"
                                                                                  4⤵
                                                                                  • Suspicious use of AdjustPrivilegeToken
                                                                                  PID:7452
                                                                                • C:\Windows\System32\cmd.exe
                                                                                  "C:\Windows\System32\cmd.exe"
                                                                                  4⤵
                                                                                    PID:7504
                                                                                  • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                                                    "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"
                                                                                    4⤵
                                                                                    • Suspicious use of AdjustPrivilegeToken
                                                                                    PID:7596
                                                                                    • C:\Windows\system32\wermgr.exe
                                                                                      "C:\Windows\system32\wermgr.exe" "-outproc" "0" "7596" "2284" "2240" "2288" "0" "0" "2292" "0" "0" "0" "0" "0"
                                                                                      5⤵
                                                                                        PID:8616
                                                                                    • C:\Windows\System32\cmd.exe
                                                                                      "C:\Windows\System32\cmd.exe"
                                                                                      4⤵
                                                                                        PID:7748
                                                                                      • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                                                        "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"
                                                                                        4⤵
                                                                                        • Suspicious use of AdjustPrivilegeToken
                                                                                        PID:7852
                                                                                      • C:\Windows\System32\cmd.exe
                                                                                        "C:\Windows\System32\cmd.exe"
                                                                                        4⤵
                                                                                          PID:7940
                                                                                        • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                                                          "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"
                                                                                          4⤵
                                                                                          • Suspicious use of AdjustPrivilegeToken
                                                                                          PID:8104
                                                                                        • C:\Windows\System32\cmd.exe
                                                                                          "C:\Windows\System32\cmd.exe"
                                                                                          4⤵
                                                                                            PID:6328
                                                                                          • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                                                            "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"
                                                                                            4⤵
                                                                                            • Suspicious use of AdjustPrivilegeToken
                                                                                            PID:7324
                                                                                          • C:\Windows\System32\cmd.exe
                                                                                            "C:\Windows\System32\cmd.exe"
                                                                                            4⤵
                                                                                              PID:8088
                                                                                            • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                                                              "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"
                                                                                              4⤵
                                                                                              • Suspicious use of AdjustPrivilegeToken
                                                                                              PID:6568
                                                                                            • C:\Windows\System32\cmd.exe
                                                                                              "C:\Windows\System32\cmd.exe"
                                                                                              4⤵
                                                                                                PID:8236
                                                                                              • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                                                                "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"
                                                                                                4⤵
                                                                                                • Suspicious use of AdjustPrivilegeToken
                                                                                                PID:8300
                                                                                              • C:\Windows\System32\cmd.exe
                                                                                                "C:\Windows\System32\cmd.exe"
                                                                                                4⤵
                                                                                                  PID:8456
                                                                                                • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                                                                  "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"
                                                                                                  4⤵
                                                                                                  • Suspicious use of AdjustPrivilegeToken
                                                                                                  PID:8532
                                                                                                • C:\Windows\System32\cmd.exe
                                                                                                  "C:\Windows\System32\cmd.exe"
                                                                                                  4⤵
                                                                                                    PID:8608
                                                                                                  • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                                                                    "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"
                                                                                                    4⤵
                                                                                                      PID:8772
                                                                                                    • C:\Windows\System32\cmd.exe
                                                                                                      "C:\Windows\System32\cmd.exe"
                                                                                                      4⤵
                                                                                                        PID:8856
                                                                                                      • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                                                                        "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"
                                                                                                        4⤵
                                                                                                          PID:9028
                                                                                                        • C:\Windows\System32\cmd.exe
                                                                                                          "C:\Windows\System32\cmd.exe"
                                                                                                          4⤵
                                                                                                            PID:9092
                                                                                                          • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                                                                            "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"
                                                                                                            4⤵
                                                                                                              PID:9184
                                                                                                            • C:\Windows\System32\cmd.exe
                                                                                                              "C:\Windows\System32\cmd.exe"
                                                                                                              4⤵
                                                                                                                PID:8332
                                                                                                              • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                                                                                "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"
                                                                                                                4⤵
                                                                                                                  PID:8500
                                                                                                                • C:\Windows\System32\cmd.exe
                                                                                                                  "C:\Windows\System32\cmd.exe"
                                                                                                                  4⤵
                                                                                                                    PID:8892
                                                                                                            • C:\Windows\system32\vssvc.exe
                                                                                                              C:\Windows\system32\vssvc.exe
                                                                                                              1⤵
                                                                                                              • Suspicious use of AdjustPrivilegeToken
                                                                                                              PID:4380

                                                                                                            Network

                                                                                                            MITRE ATT&CK Enterprise v15

                                                                                                            Replay Monitor

                                                                                                            Loading Replay Monitor...

                                                                                                            Downloads

                                                                                                            • C:\Users\Admin\AppData\Local\Microsoft\CLR_v4.0\UsageLogs\powershell.exe.log

                                                                                                              Filesize

                                                                                                              2KB

                                                                                                              MD5

                                                                                                              d85ba6ff808d9e5444a4b369f5bc2730

                                                                                                              SHA1

                                                                                                              31aa9d96590fff6981b315e0b391b575e4c0804a

                                                                                                              SHA256

                                                                                                              84739c608a73509419748e4e20e6cc4e1846056c3fe1929a8300d5a1a488202f

                                                                                                              SHA512

                                                                                                              8c414eb55b45212af385accc16d9d562adba2123583ce70d22b91161fe878683845512a78f04dedd4ea98ed9b174dbfa98cf696370598ad8e6fbd1e714f1f249

                                                                                                            • C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\ModuleAnalysisCache

                                                                                                              Filesize

                                                                                                              53KB

                                                                                                              MD5

                                                                                                              a26df49623eff12a70a93f649776dab7

                                                                                                              SHA1

                                                                                                              efb53bd0df3ac34bd119adf8788127ad57e53803

                                                                                                              SHA256

                                                                                                              4ebde1c12625cb55034d47e5169f709b0bd02a8caa76b5b9854efad7f4710245

                                                                                                              SHA512

                                                                                                              e5f9b8645fb2a50763fcbffe877ca03e9cadf099fe2d510b74bfa9ff18d0a6563d11160e00f495eeefebde63450d0ade8d6b6a824e68bd8a59e1971dc842709c

                                                                                                            • C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive

                                                                                                              Filesize

                                                                                                              2KB

                                                                                                              MD5

                                                                                                              2c52ec27b476d71a988dc2b5c4e2c1c3

                                                                                                              SHA1

                                                                                                              e99a9a66e124b3e895f4865404f51dee5253d28e

                                                                                                              SHA256

                                                                                                              428c82a370fad031b73017d67766918a806f6070f3a48c5062432b629d416f07

                                                                                                              SHA512

                                                                                                              2ed70ba38ff948c20a094ee65e14a266549597c70710c5cdf8b73ed29ab1de9213a4feb3ade307f998a6c4e879a4817d3dd6f6adcf9d53f0ea879f7695ec13e9

                                                                                                            • C:\Users\Admin\AppData\Local\Temp\__PSScriptPolicyTest_5qfaltrv.q4j.ps1

                                                                                                              Filesize

                                                                                                              60B

                                                                                                              MD5

                                                                                                              d17fe0a3f47be24a6453e9ef58c94641

                                                                                                              SHA1

                                                                                                              6ab83620379fc69f80c0242105ddffd7d98d5d9d

                                                                                                              SHA256

                                                                                                              96ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7

                                                                                                              SHA512

                                                                                                              5b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82

                                                                                                            • C:\Users\Admin\AppData\Local\Temp\tmpF4EF.tmp.bat

                                                                                                              Filesize

                                                                                                              199B

                                                                                                              MD5

                                                                                                              0ca1e782aecbeaf7a3b66cac4a978337

                                                                                                              SHA1

                                                                                                              0b6758783253b1b73de293b5246e6de502e8b858

                                                                                                              SHA256

                                                                                                              1d6b23707f105669f24684dcf047fda78cdcbe9b015e9726188235688ba41b53

                                                                                                              SHA512

                                                                                                              cc254ed8f9e4e914fdef0654391fbf218380de9aa35b2ed4ada26e578e668d728f2dde644e6589dca60813964cc4f31635a672b1ed0e3f24918bd6d84ae6b220

                                                                                                            • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\590aee7bdd69b59b.customDestinations-ms

                                                                                                              Filesize

                                                                                                              6KB

                                                                                                              MD5

                                                                                                              cc31f3d8e962fffb664ba8b2ac1a618e

                                                                                                              SHA1

                                                                                                              8f130ec842f4ff483be899edefd7ff5b2615bcc5

                                                                                                              SHA256

                                                                                                              f3a5be9a8c2e0395d2edd61317891918bb2d625e4d479ff92345553cdabaeee2

                                                                                                              SHA512

                                                                                                              e2736faa8b7db031254c9245e9c48c948a8a4c94fcb8f6fcf74ce74f7ea2562a1ddeffa3743f77c07e85195009475064d6eee73fdd6197aa97fee7836e414d7d

                                                                                                            • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\590aee7bdd69b59b.customDestinations-ms

                                                                                                              Filesize

                                                                                                              6KB

                                                                                                              MD5

                                                                                                              15a897b28511ea34784695f9888d7932

                                                                                                              SHA1

                                                                                                              a6ab28500fc3294c4ec32321e06734d027bf2f14

                                                                                                              SHA256

                                                                                                              2a8870a82156c73e33ee17b03e1710e7d52f35b9bba937b8f5f90791775cf687

                                                                                                              SHA512

                                                                                                              163e976c0ba3a4191bbb5d6fef4abff8627d395b3765d8e7b2a138fb160dcae69fa6c5940e2d61ccd51f1ef4c93ef2b2d2439e02177b8d228aaea93699d03d17

                                                                                                            • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\590aee7bdd69b59b.customDestinations-ms

                                                                                                              Filesize

                                                                                                              6KB

                                                                                                              MD5

                                                                                                              5b0dfde5e9a086b2c1dcc7d3aec4b33f

                                                                                                              SHA1

                                                                                                              4a4d9cd04b4c6caa2a9fd73aecb663f4c608ac61

                                                                                                              SHA256

                                                                                                              b569b5e5543c2ad6a0392be3189184fe45aebf1d8676dd666bbbb8546fe869fa

                                                                                                              SHA512

                                                                                                              84f1b8e3a5161eef89f81e1ff5097e57d9311e92def7858fe1ce39c553d1e518abe05bf4d66e95db4edb29959c40afecade4bfb859f68e5e12ae9a1a7744a64b

                                                                                                            • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\590aee7bdd69b59b.customDestinations-ms

                                                                                                              Filesize

                                                                                                              6KB

                                                                                                              MD5

                                                                                                              2f13cb410603e71acd41ecad8540358e

                                                                                                              SHA1

                                                                                                              82b3f555d3d1516067f15f450a5c05f34c821643

                                                                                                              SHA256

                                                                                                              0d517a6f27b3256890bcab3c69fbfcb48dd09764d6cee5280b74dd3abca1c868

                                                                                                              SHA512

                                                                                                              1b6c413fa39c7a49a2d6ea476eebbbf80d031bb39a21aa4c3094984b009e9d273c5b5710b357c21d19b5dd5e592545bc727f21a1de95ee1da770ba920fe77345

                                                                                                            • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\590aee7bdd69b59b.customDestinations-ms

                                                                                                              Filesize

                                                                                                              6KB

                                                                                                              MD5

                                                                                                              59db0063e8e07d9c0359acdfdb2ba58a

                                                                                                              SHA1

                                                                                                              7e6d93099b0451e3c690dbe8b1709ca49f85583f

                                                                                                              SHA256

                                                                                                              ad2d2d8abc8f5200ce7c8cc58330169b05b41c6cd8115325e5454f9f50197181

                                                                                                              SHA512

                                                                                                              d95b079e2f0093fae34622229bdbf300998930ba8f60708b8ff88117fe0c713c7e7aaf64908df3e5c18e47d7d10ff22f884ca49e1c2ef206d74665b343ae0f71

                                                                                                            • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\590aee7bdd69b59b.customDestinations-ms

                                                                                                              Filesize

                                                                                                              6KB

                                                                                                              MD5

                                                                                                              3b23f798e163370ebd6a37c05d35911e

                                                                                                              SHA1

                                                                                                              fde57be9184e162317f71bcc65aa36f2fef203f3

                                                                                                              SHA256

                                                                                                              9b89319d7a53513e14dc8f8be561572ad3433ee434f2c7d77aaf0b99d470c6cc

                                                                                                              SHA512

                                                                                                              e0e3e46f9b783cfdfa67e3852a2bb8e8a25de9267cb4b9631a6c1526304a5d1794dc46f1416dd7313a8a6d6c59729ebff0e8c0c6b837e6dc29d4e90a7505cbf2

                                                                                                            • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\590aee7bdd69b59b.customDestinations-ms

                                                                                                              Filesize

                                                                                                              6KB

                                                                                                              MD5

                                                                                                              752d0709a313679fc77758b04c39a3d1

                                                                                                              SHA1

                                                                                                              5a567abeeb7e466e3b98ccff19b8d8c4d0b53677

                                                                                                              SHA256

                                                                                                              706ae09a27a5daa36514d6ad8b29bc8dd0cf067ed9a406604d2406f1d4179a27

                                                                                                              SHA512

                                                                                                              cb162c2c3fe90d2718f888fa2679e6c772ab7de9d5f3832ab8d32c8e7e7f48781f64d86e5207b9e2f41b8fc7fa1a9a7cf3d181a8dd4286f98d817c271e8fa601

                                                                                                            • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\590aee7bdd69b59b.customDestinations-ms

                                                                                                              Filesize

                                                                                                              6KB

                                                                                                              MD5

                                                                                                              80820612e6c2fb9c949bf2992b629fac

                                                                                                              SHA1

                                                                                                              b892cd3fa6c17afe8a10a4a65e6a17c96981f9c5

                                                                                                              SHA256

                                                                                                              d684fb94059b609e328dc978e91aeac6767fbd16c2ac80a988434867b02d632e

                                                                                                              SHA512

                                                                                                              f8ae3153376690084615a796ecb7a26a3a844107da95e5dacb9ed373e5a34a31d17e8720e0c4ea577bdafa06f77b078b56cf53ac6f8bac42a8a8973929422ec3

                                                                                                            • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\590aee7bdd69b59b.customDestinations-ms

                                                                                                              Filesize

                                                                                                              6KB

                                                                                                              MD5

                                                                                                              086994bca838dc25af16419e2b98e567

                                                                                                              SHA1

                                                                                                              da4f91248e492cc9af693ab1a4583bba161a781b

                                                                                                              SHA256

                                                                                                              ac2b3ba67fa85f849ce739ee54d94406fcda23ba8017b24ce7ca93388858b766

                                                                                                              SHA512

                                                                                                              b9a0a3ea3e7ba8ec126f536ca4c05404f002dee11bc40b8e4dca096711227bd6f171c97933cd4091a147cd9ee3efd80f6cdb78ad6b3fdd63f9217c2623e36ff1

                                                                                                            • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\590aee7bdd69b59b.customDestinations-ms

                                                                                                              Filesize

                                                                                                              6KB

                                                                                                              MD5

                                                                                                              65857a91cccfc396c92324b858ebd583

                                                                                                              SHA1

                                                                                                              53eba44c57c623a9ea0d1d63ad71f4ae83f27b5f

                                                                                                              SHA256

                                                                                                              236449a9ece20c7fdcc8e1b98eba0533582064518a3515d3b22455ec1a30e635

                                                                                                              SHA512

                                                                                                              d3614b47e09094dd3339888f848227ce657e37e475ae51e8329bbe17dba61c29874d703315913b6f061439cd71bc80bd2161b30ee956570bf9fe504ad3a2c205

                                                                                                            • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\590aee7bdd69b59b.customDestinations-ms

                                                                                                              Filesize

                                                                                                              6KB

                                                                                                              MD5

                                                                                                              83f15b3a9916ea1ef472be307bd5967e

                                                                                                              SHA1

                                                                                                              52802d04027429e73f06f38857f81a0487a0b78b

                                                                                                              SHA256

                                                                                                              ce9fc831fd659504237f65b944fcb6a2b662c37b39264341542505f51a41f927

                                                                                                              SHA512

                                                                                                              ded21dbfe4e121b3cf747f0ac84143188a7f5df3cf58fae42667c53aaf7be7efad1dddd07d08171371957787faadbbadf0183c642deee2546e91b3d4e7ef328d

                                                                                                            • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\590aee7bdd69b59b.customDestinations-ms

                                                                                                              Filesize

                                                                                                              6KB

                                                                                                              MD5

                                                                                                              5ce4d1726a467eb4e02f3dcde9f45861

                                                                                                              SHA1

                                                                                                              968410edbfa4e7e86f2a273acd15eac5804ce929

                                                                                                              SHA256

                                                                                                              c993fd86407676f336943c12ec930885494743c6a8db5f295d19aecab18c413f

                                                                                                              SHA512

                                                                                                              2024822a6ebf51a56454cec1b6b7b5bfb2d242bc4ffb72c6ba93bef1a5103a07649775a5dec5984d578d29507fd0e840c5f3c976772234f5a3440b52e5938de3

                                                                                                            • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\590aee7bdd69b59b.customDestinations-ms

                                                                                                              Filesize

                                                                                                              6KB

                                                                                                              MD5

                                                                                                              7c289b54c8ad689a9a67c911a1b40666

                                                                                                              SHA1

                                                                                                              907f988d68819a4005af693257f3ae741655b375

                                                                                                              SHA256

                                                                                                              663c551aa42ef92346d6aa0c84f583c884045f27c08dd8790db7fe0c760ac74d

                                                                                                              SHA512

                                                                                                              84b274777ee31f499f44928bba51f3eaee15e834b4627edd647f028a84e4e369f544e2a0c80da8012e96108252bc4d1968f4392b2694b3e3809c5ed5d1807753

                                                                                                            • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\590aee7bdd69b59b.customDestinations-ms

                                                                                                              Filesize

                                                                                                              6KB

                                                                                                              MD5

                                                                                                              fc08ae240eca5e708b96c8715adffadb

                                                                                                              SHA1

                                                                                                              820467de9cf20b9e155f2949361e4e5f3015ad32

                                                                                                              SHA256

                                                                                                              abda925031def02a88473c058df01db3139dc86c4651321a45802e3d4b3de8a1

                                                                                                              SHA512

                                                                                                              ebb94ff6e38abeae0b4fda6ee0b720a6284e03969310785ab9e23076a03cd6716f73dbf0080f21e3e1ab65e06181c5d7254f49a549dd5684a2cc189f39baf056

                                                                                                            • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\590aee7bdd69b59b.customDestinations-ms

                                                                                                              Filesize

                                                                                                              6KB

                                                                                                              MD5

                                                                                                              13823e3a5779497651d10a3dad1e7b34

                                                                                                              SHA1

                                                                                                              9cc99bb90e624e20890a4bbc0fdde5657608f00c

                                                                                                              SHA256

                                                                                                              b8ee6a8b77d62234427397edda89cc64c2364b7e8f0997bf3defe0ff60ac0d86

                                                                                                              SHA512

                                                                                                              9d23826e7f8d8a55e1a435a0c5666f180472fdf4ceac612e59db0f6ee40cbf59a5cd2dd60e72994f7ea8d173a26b3af2b31bf589a5294b31fa27a2b97154dff9

                                                                                                            • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\590aee7bdd69b59b.customDestinations-ms

                                                                                                              Filesize

                                                                                                              6KB

                                                                                                              MD5

                                                                                                              4238a8afca488717bac6a14fffc44b70

                                                                                                              SHA1

                                                                                                              6c6ce1f648d431fad969b466a4292e7f527a0e86

                                                                                                              SHA256

                                                                                                              0ff95764dd3199c99ca5aca6164ac0e3e935cdc0a87e8f60ae6969888176186b

                                                                                                              SHA512

                                                                                                              d8d24bfb27279d7206f0a0838a566334b87fc969a1cceb7749fd89a8a4ccb81fa0cb14a6da3548a972845c40b6245c0c6543fe48245db93acede7ed59af0f334

                                                                                                            • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\590aee7bdd69b59b.customDestinations-ms

                                                                                                              Filesize

                                                                                                              6KB

                                                                                                              MD5

                                                                                                              9e51a92d4e9b720c007e97e296a38da5

                                                                                                              SHA1

                                                                                                              a31168ba2e3ca9c4c65563ac1ebba6776ab65a5e

                                                                                                              SHA256

                                                                                                              9a7a31205de724d55567a0cf57178d63b745bb14eff3b731eec90e713f4d86dc

                                                                                                              SHA512

                                                                                                              4f1eee605c8407f5bd38c6118147c4be09b85b11f9a84a7d4392d794896808dc4bbdcc25fae15ba1f5e98291290cfaeb99fdcc50509db559bd5eeff30a8a0245

                                                                                                            • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\590aee7bdd69b59b.customDestinations-ms

                                                                                                              Filesize

                                                                                                              6KB

                                                                                                              MD5

                                                                                                              ca22eb185233b4e979d09f937cff0ba1

                                                                                                              SHA1

                                                                                                              53b348a9a311ad88d11769709fb2b3bc435a0556

                                                                                                              SHA256

                                                                                                              9f82734b5bba55592423575542ff224c96a19f2e59cbf5f2b7b475cc2781b1fe

                                                                                                              SHA512

                                                                                                              8c6d859c564fa8a1070df8eac92781a2937d535580136dc7d091515313bccae5e32f5d39d2331a43ef875564fb6184f5c2b6aab22a1a89aa7aa219babefd0e7d

                                                                                                            • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Templates\SysTemp64\$77Runtime Broker.exe

                                                                                                              Filesize

                                                                                                              43KB

                                                                                                              MD5

                                                                                                              44a5ff2feda2634ae7d9fadc97ebd0a0

                                                                                                              SHA1

                                                                                                              9a763aefd806585e11a36203e575ae142f38bc6c

                                                                                                              SHA256

                                                                                                              5dde6801897a7d76c16e64c0b36a3280fbf5371642a690b85ddd31538c4458d8

                                                                                                              SHA512

                                                                                                              cebc24998c33d7fe8bcdba5183d60c36b3ccaac247d0ee206a73485236453c109dc269522df01d85f58efd3d7a28358221f2139f11356f95f9b8283475f576ca

                                                                                                            • memory/2052-0-0x00007FFEE87D3000-0x00007FFEE87D5000-memory.dmp

                                                                                                              Filesize

                                                                                                              8KB

                                                                                                            • memory/2052-4-0x00007FFEE87D0000-0x00007FFEE9291000-memory.dmp

                                                                                                              Filesize

                                                                                                              10.8MB

                                                                                                            • memory/2052-10-0x00007FFEE87D0000-0x00007FFEE9291000-memory.dmp

                                                                                                              Filesize

                                                                                                              10.8MB

                                                                                                            • memory/2052-3-0x00007FFEE87D3000-0x00007FFEE87D5000-memory.dmp

                                                                                                              Filesize

                                                                                                              8KB

                                                                                                            • memory/2052-2-0x00007FFEE87D0000-0x00007FFEE9291000-memory.dmp

                                                                                                              Filesize

                                                                                                              10.8MB

                                                                                                            • memory/2052-1-0x0000000000B40000-0x0000000000B50000-memory.dmp

                                                                                                              Filesize

                                                                                                              64KB

                                                                                                            • memory/3000-89-0x00000241BCE90000-0x00000241BCED4000-memory.dmp

                                                                                                              Filesize

                                                                                                              272KB

                                                                                                            • memory/3000-98-0x00000241BCF60000-0x00000241BCFD6000-memory.dmp

                                                                                                              Filesize

                                                                                                              472KB

                                                                                                            • memory/4476-28-0x000000001C8C0000-0x000000001C8E0000-memory.dmp

                                                                                                              Filesize

                                                                                                              128KB

                                                                                                            • memory/5004-21-0x000001F4B8BD0000-0x000001F4B8BF2000-memory.dmp

                                                                                                              Filesize

                                                                                                              136KB