Analysis

  • max time kernel
    443s
  • max time network
    445s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20250217-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20250217-enlocale:en-usos:windows10-2004-x64system
  • submitted
    08/03/2025, 22:10

General

  • Target

    rat/SilverClient - Copy (6).exe

  • Size

    43KB

  • MD5

    44a5ff2feda2634ae7d9fadc97ebd0a0

  • SHA1

    9a763aefd806585e11a36203e575ae142f38bc6c

  • SHA256

    5dde6801897a7d76c16e64c0b36a3280fbf5371642a690b85ddd31538c4458d8

  • SHA512

    cebc24998c33d7fe8bcdba5183d60c36b3ccaac247d0ee206a73485236453c109dc269522df01d85f58efd3d7a28358221f2139f11356f95f9b8283475f576ca

  • SSDEEP

    768:GdmcASe38zJ/Ol6IoZmtPHJm7+avCJ8eEPNRULQD9PUGa7AB6Sh/lE:GdmcASeuOtvhmeZKNGsD9pYAoS/lE

Malware Config

Extracted

Family

silverrat

Version

1.0.0.0

C2

if-eventually.gl.at.ply.gg:17094

Mutex

Mutex_DthEiIseBZ

Attributes
  • certificate

    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

  • decrypted_key

    -|S.S.S|-

  • key

    yy6zDjAUmbB09pKvo5Hhug==

  • key_x509

    eGlwZU1BZVJwdkFBdllxYmdRQUJ2eWtsbVVURFhE

  • reconnect_delay

    0

  • server_signature

    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

Signatures

  • SilverRat

    SilverRat is trojan written in C#.

  • Silverrat family
  • Sets file to hidden 1 TTPs 2 IoCs

    Modifies file attributes to stop it showing in Explorer etc.

  • Checks computer location settings 2 TTPs 2 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Executes dropped EXE 1 IoCs
  • Adds Run key to start application 2 TTPs 1 IoCs
  • Command and Scripting Interpreter: PowerShell 1 TTPs 1 IoCs

    Using powershell.exe command.

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Checks processor information in registry 2 TTPs 3 IoCs

    Processor information is often read in order to detect sandboxing environments.

  • Delays execution with timeout.exe 1 IoCs
  • Enumerates system info in registry 2 TTPs 2 IoCs
  • Scheduled Task/Job: Scheduled Task 1 TTPs 2 IoCs

    Schtasks is often used by malware for persistence or to perform post-infection execution.

  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 46 IoCs
  • Suspicious use of SetWindowsHookEx 1 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs
  • Uses Task Scheduler COM API 1 TTPs

    The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.

  • Uses Volume Shadow Copy service COM API

    The Volume Shadow Copy service is used to manage backups/snapshots.

  • Views/modifies file attributes 1 TTPs 2 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\rat\SilverClient - Copy (6).exe
    "C:\Users\Admin\AppData\Local\Temp\rat\SilverClient - Copy (6).exe"
    1⤵
    • Checks computer location settings
    • Adds Run key to start application
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:5736
    • C:\Windows\System32\attrib.exe
      "C:\Windows\System32\attrib.exe" +s +h "C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Templates\SysTemp64"
      2⤵
      • Sets file to hidden
      • Views/modifies file attributes
      PID:208
    • C:\Windows\System32\attrib.exe
      "C:\Windows\System32\attrib.exe" +s +h "C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Templates\SysTemp64\$77Runtime Broker.exe"
      2⤵
      • Sets file to hidden
      • Views/modifies file attributes
      PID:5388
    • C:\Windows\system32\cmd.exe
      C:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\tmpB9F9.tmp.bat""
      2⤵
      • Suspicious use of WriteProcessMemory
      PID:532
      • C:\Windows\system32\timeout.exe
        timeout 3
        3⤵
        • Delays execution with timeout.exe
        PID:5612
      • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Templates\SysTemp64\$77Runtime Broker.exe
        "C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Templates\SysTemp64\$77Runtime Broker.exe"
        3⤵
        • Checks computer location settings
        • Executes dropped EXE
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious behavior: GetForegroundWindowSpam
        • Suspicious use of AdjustPrivilegeToken
        • Suspicious use of SetWindowsHookEx
        • Suspicious use of WriteProcessMemory
        PID:2712
        • C:\Windows\SYSTEM32\schtasks.exe
          "schtasks.exe" /query /TN $77Runtime Broker.exe
          4⤵
            PID:4692
          • C:\Windows\SYSTEM32\schtasks.exe
            "schtasks.exe" /Create /SC ONCE /TN "$77Runtime Broker.exe" /TR "C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Templates\SysTemp64\$77Runtime Broker.exe \"\$77Runtime Broker.exe\" /AsAdmin" /ST 00:01 /IT /F /RL HIGHEST
            4⤵
            • Scheduled Task/Job: Scheduled Task
            PID:2948
          • C:\Windows\SYSTEM32\schtasks.exe
            "schtasks.exe" /query /TN $77Runtime Broker.exe
            4⤵
              PID:1756
            • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
              "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Set-MpPreference -ExclusionExtension exe,bat,dll,ps1;exit
              4⤵
              • Command and Scripting Interpreter: PowerShell
              • Suspicious behavior: EnumeratesProcesses
              • Suspicious use of AdjustPrivilegeToken
              PID:2672
            • C:\Windows\System32\schtasks.exe
              "C:\Windows\System32\schtasks.exe" /create /sc hourly /mo 1 /tn "Runtime Broker_Task-HOURLY-01" /tr "%MyFile%" /st 00:00
              4⤵
              • Scheduled Task/Job: Scheduled Task
              PID:572
            • C:\Windows\System32\cmd.exe
              "C:\Windows\System32\cmd.exe"
              4⤵
                PID:3068
              • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"
                4⤵
                • Suspicious behavior: EnumeratesProcesses
                • Suspicious use of AdjustPrivilegeToken
                PID:2132
              • C:\Windows\System32\cmd.exe
                "C:\Windows\System32\cmd.exe"
                4⤵
                  PID:2996
                • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                  "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"
                  4⤵
                  • Suspicious behavior: EnumeratesProcesses
                  • Suspicious use of AdjustPrivilegeToken
                  PID:4448
                • C:\Windows\System32\cmd.exe
                  "C:\Windows\System32\cmd.exe"
                  4⤵
                    PID:1636
                  • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                    "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"
                    4⤵
                    • Suspicious behavior: EnumeratesProcesses
                    • Suspicious use of AdjustPrivilegeToken
                    PID:892
                  • C:\Windows\System32\cmd.exe
                    "C:\Windows\System32\cmd.exe"
                    4⤵
                      PID:3228
                    • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                      "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"
                      4⤵
                      • Suspicious behavior: EnumeratesProcesses
                      • Suspicious use of AdjustPrivilegeToken
                      PID:5164
                    • C:\Windows\System32\cmd.exe
                      "C:\Windows\System32\cmd.exe"
                      4⤵
                        PID:5296
                      • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                        "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"
                        4⤵
                        • Suspicious behavior: EnumeratesProcesses
                        • Suspicious use of AdjustPrivilegeToken
                        PID:1140
                      • C:\Windows\System32\cmd.exe
                        "C:\Windows\System32\cmd.exe"
                        4⤵
                          PID:5300
                        • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                          "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"
                          4⤵
                          • Suspicious behavior: EnumeratesProcesses
                          • Suspicious use of AdjustPrivilegeToken
                          PID:4136
                        • C:\Windows\System32\cmd.exe
                          "C:\Windows\System32\cmd.exe"
                          4⤵
                            PID:2592
                          • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                            "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"
                            4⤵
                            • Suspicious behavior: EnumeratesProcesses
                            • Suspicious use of AdjustPrivilegeToken
                            PID:2688
                          • C:\Windows\System32\cmd.exe
                            "C:\Windows\System32\cmd.exe"
                            4⤵
                              PID:4488
                            • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                              "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"
                              4⤵
                              • Suspicious behavior: EnumeratesProcesses
                              • Suspicious use of AdjustPrivilegeToken
                              PID:5092
                            • C:\Windows\System32\cmd.exe
                              "C:\Windows\System32\cmd.exe"
                              4⤵
                                PID:1100
                              • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"
                                4⤵
                                • Suspicious behavior: EnumeratesProcesses
                                • Suspicious use of AdjustPrivilegeToken
                                PID:3080
                              • C:\Windows\System32\cmd.exe
                                "C:\Windows\System32\cmd.exe"
                                4⤵
                                  PID:4036
                                • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                  "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"
                                  4⤵
                                  • Suspicious behavior: EnumeratesProcesses
                                  • Suspicious use of AdjustPrivilegeToken
                                  PID:2424
                                • C:\Windows\System32\cmd.exe
                                  "C:\Windows\System32\cmd.exe"
                                  4⤵
                                    PID:1480
                                  • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                    "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"
                                    4⤵
                                    • Suspicious behavior: EnumeratesProcesses
                                    • Suspicious use of AdjustPrivilegeToken
                                    PID:1632
                                  • C:\Windows\System32\cmd.exe
                                    "C:\Windows\System32\cmd.exe"
                                    4⤵
                                      PID:5544
                                    • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                      "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"
                                      4⤵
                                      • Suspicious behavior: EnumeratesProcesses
                                      • Suspicious use of AdjustPrivilegeToken
                                      PID:3620
                                    • C:\Windows\System32\cmd.exe
                                      "C:\Windows\System32\cmd.exe"
                                      4⤵
                                        PID:1644
                                      • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                        "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"
                                        4⤵
                                        • Suspicious use of AdjustPrivilegeToken
                                        PID:1616
                                      • C:\Windows\System32\cmd.exe
                                        "C:\Windows\System32\cmd.exe"
                                        4⤵
                                          PID:3776
                                        • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                          "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"
                                          4⤵
                                          • Suspicious use of AdjustPrivilegeToken
                                          PID:180
                                        • C:\Windows\System32\cmd.exe
                                          "C:\Windows\System32\cmd.exe"
                                          4⤵
                                            PID:3404
                                          • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                            "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"
                                            4⤵
                                            • Suspicious use of AdjustPrivilegeToken
                                            PID:2336
                                          • C:\Windows\System32\cmd.exe
                                            "C:\Windows\System32\cmd.exe"
                                            4⤵
                                              PID:5420
                                            • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                              "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"
                                              4⤵
                                              • Suspicious use of AdjustPrivilegeToken
                                              PID:2640
                                            • C:\Windows\System32\cmd.exe
                                              "C:\Windows\System32\cmd.exe"
                                              4⤵
                                                PID:3036
                                              • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"
                                                4⤵
                                                • Suspicious use of AdjustPrivilegeToken
                                                PID:5336
                                              • C:\Windows\System32\cmd.exe
                                                "C:\Windows\System32\cmd.exe"
                                                4⤵
                                                  PID:4496
                                                • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                  "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"
                                                  4⤵
                                                  • Suspicious use of AdjustPrivilegeToken
                                                  PID:4436
                                                • C:\Windows\System32\cmd.exe
                                                  "C:\Windows\System32\cmd.exe"
                                                  4⤵
                                                    PID:5500
                                                  • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                    "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"
                                                    4⤵
                                                    • Suspicious use of AdjustPrivilegeToken
                                                    PID:3772
                                                  • C:\Windows\System32\cmd.exe
                                                    "C:\Windows\System32\cmd.exe"
                                                    4⤵
                                                      PID:4324
                                                    • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                      "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"
                                                      4⤵
                                                      • Suspicious use of AdjustPrivilegeToken
                                                      PID:220
                                                    • C:\Windows\System32\cmd.exe
                                                      "C:\Windows\System32\cmd.exe"
                                                      4⤵
                                                        PID:5860
                                                      • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                        "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"
                                                        4⤵
                                                        • Suspicious use of AdjustPrivilegeToken
                                                        PID:3876
                                                      • C:\Windows\System32\cmd.exe
                                                        "C:\Windows\System32\cmd.exe"
                                                        4⤵
                                                          PID:2880
                                                        • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                          "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"
                                                          4⤵
                                                          • Suspicious use of AdjustPrivilegeToken
                                                          PID:6192
                                                        • C:\Windows\System32\cmd.exe
                                                          "C:\Windows\System32\cmd.exe"
                                                          4⤵
                                                            PID:6256
                                                          • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                            "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"
                                                            4⤵
                                                            • Suspicious use of AdjustPrivilegeToken
                                                            PID:6360
                                                          • C:\Windows\System32\cmd.exe
                                                            "C:\Windows\System32\cmd.exe"
                                                            4⤵
                                                              PID:6480
                                                            • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                              "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"
                                                              4⤵
                                                              • Suspicious use of AdjustPrivilegeToken
                                                              PID:6576
                                                            • C:\Windows\System32\cmd.exe
                                                              "C:\Windows\System32\cmd.exe"
                                                              4⤵
                                                                PID:6696
                                                              • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                                "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"
                                                                4⤵
                                                                • Suspicious use of AdjustPrivilegeToken
                                                                PID:6792
                                                              • C:\Windows\System32\cmd.exe
                                                                "C:\Windows\System32\cmd.exe"
                                                                4⤵
                                                                  PID:6904
                                                                • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                                  "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"
                                                                  4⤵
                                                                  • Suspicious use of AdjustPrivilegeToken
                                                                  PID:7008
                                                                • C:\Windows\System32\cmd.exe
                                                                  "C:\Windows\System32\cmd.exe"
                                                                  4⤵
                                                                    PID:7108
                                                                  • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                                    "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"
                                                                    4⤵
                                                                    • Suspicious use of AdjustPrivilegeToken
                                                                    PID:6232
                                                                  • C:\Windows\System32\cmd.exe
                                                                    "C:\Windows\System32\cmd.exe"
                                                                    4⤵
                                                                      PID:6320
                                                                    • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                                      "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"
                                                                      4⤵
                                                                      • Suspicious use of AdjustPrivilegeToken
                                                                      PID:6452
                                                                      • C:\Windows\system32\wermgr.exe
                                                                        "C:\Windows\system32\wermgr.exe" "-outproc" "0" "6452" "2608" "2548" "2612" "0" "0" "2616" "0" "0" "0" "0" "0"
                                                                        5⤵
                                                                        • Checks processor information in registry
                                                                        • Enumerates system info in registry
                                                                        PID:10000
                                                                    • C:\Windows\System32\cmd.exe
                                                                      "C:\Windows\System32\cmd.exe"
                                                                      4⤵
                                                                        PID:7024
                                                                      • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                                        "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"
                                                                        4⤵
                                                                        • Suspicious use of AdjustPrivilegeToken
                                                                        PID:1840
                                                                      • C:\Windows\System32\cmd.exe
                                                                        "C:\Windows\System32\cmd.exe"
                                                                        4⤵
                                                                          PID:7228
                                                                        • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                                          "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"
                                                                          4⤵
                                                                          • Suspicious use of AdjustPrivilegeToken
                                                                          PID:7348
                                                                        • C:\Windows\System32\cmd.exe
                                                                          "C:\Windows\System32\cmd.exe"
                                                                          4⤵
                                                                            PID:7428
                                                                          • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                                            "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"
                                                                            4⤵
                                                                            • Suspicious use of AdjustPrivilegeToken
                                                                            PID:7504
                                                                          • C:\Windows\System32\cmd.exe
                                                                            "C:\Windows\System32\cmd.exe"
                                                                            4⤵
                                                                              PID:7716
                                                                            • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                                              "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"
                                                                              4⤵
                                                                              • Suspicious use of AdjustPrivilegeToken
                                                                              PID:7796
                                                                            • C:\Windows\System32\cmd.exe
                                                                              "C:\Windows\System32\cmd.exe"
                                                                              4⤵
                                                                                PID:7952
                                                                              • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                                                "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"
                                                                                4⤵
                                                                                • Suspicious use of AdjustPrivilegeToken
                                                                                PID:8072
                                                                              • C:\Windows\System32\cmd.exe
                                                                                "C:\Windows\System32\cmd.exe"
                                                                                4⤵
                                                                                  PID:7444
                                                                                • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                                                  "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"
                                                                                  4⤵
                                                                                  • Suspicious use of AdjustPrivilegeToken
                                                                                  PID:7988
                                                                                • C:\Windows\System32\cmd.exe
                                                                                  "C:\Windows\System32\cmd.exe"
                                                                                  4⤵
                                                                                    PID:7912
                                                                                  • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                                                    "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"
                                                                                    4⤵
                                                                                    • Suspicious use of AdjustPrivilegeToken
                                                                                    PID:8196
                                                                                  • C:\Windows\System32\cmd.exe
                                                                                    "C:\Windows\System32\cmd.exe"
                                                                                    4⤵
                                                                                      PID:8276
                                                                                    • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                                                      "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"
                                                                                      4⤵
                                                                                      • Suspicious use of AdjustPrivilegeToken
                                                                                      PID:8440
                                                                                    • C:\Windows\System32\cmd.exe
                                                                                      "C:\Windows\System32\cmd.exe"
                                                                                      4⤵
                                                                                        PID:8508
                                                                                      • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                                                        "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"
                                                                                        4⤵
                                                                                        • Suspicious use of AdjustPrivilegeToken
                                                                                        PID:8548
                                                                                      • C:\Windows\System32\cmd.exe
                                                                                        "C:\Windows\System32\cmd.exe"
                                                                                        4⤵
                                                                                          PID:8692
                                                                                        • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                                                          "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"
                                                                                          4⤵
                                                                                          • Suspicious use of AdjustPrivilegeToken
                                                                                          PID:8752
                                                                                        • C:\Windows\System32\cmd.exe
                                                                                          "C:\Windows\System32\cmd.exe"
                                                                                          4⤵
                                                                                            PID:8856
                                                                                          • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                                                            "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"
                                                                                            4⤵
                                                                                            • Suspicious use of AdjustPrivilegeToken
                                                                                            PID:8996
                                                                                          • C:\Windows\System32\cmd.exe
                                                                                            "C:\Windows\System32\cmd.exe"
                                                                                            4⤵
                                                                                              PID:9080
                                                                                            • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                                                              "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"
                                                                                              4⤵
                                                                                              • Suspicious use of AdjustPrivilegeToken
                                                                                              PID:9212
                                                                                            • C:\Windows\System32\cmd.exe
                                                                                              "C:\Windows\System32\cmd.exe"
                                                                                              4⤵
                                                                                                PID:8452
                                                                                              • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                                                                "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"
                                                                                                4⤵
                                                                                                  PID:8868
                                                                                                • C:\Windows\System32\cmd.exe
                                                                                                  "C:\Windows\System32\cmd.exe"
                                                                                                  4⤵
                                                                                                    PID:7748
                                                                                                  • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                                                                    "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"
                                                                                                    4⤵
                                                                                                      PID:9372
                                                                                                    • C:\Windows\System32\cmd.exe
                                                                                                      "C:\Windows\System32\cmd.exe"
                                                                                                      4⤵
                                                                                                        PID:9480
                                                                                                      • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                                                                        "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"
                                                                                                        4⤵
                                                                                                          PID:9560
                                                                                                        • C:\Windows\System32\cmd.exe
                                                                                                          "C:\Windows\System32\cmd.exe"
                                                                                                          4⤵
                                                                                                            PID:9624
                                                                                                          • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                                                                            "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"
                                                                                                            4⤵
                                                                                                              PID:9664
                                                                                                            • C:\Windows\System32\cmd.exe
                                                                                                              "C:\Windows\System32\cmd.exe"
                                                                                                              4⤵
                                                                                                                PID:9816
                                                                                                        • C:\Windows\system32\vssvc.exe
                                                                                                          C:\Windows\system32\vssvc.exe
                                                                                                          1⤵
                                                                                                          • Suspicious use of AdjustPrivilegeToken
                                                                                                          PID:3396

                                                                                                        Network

                                                                                                        MITRE ATT&CK Enterprise v15

                                                                                                        Replay Monitor

                                                                                                        Loading Replay Monitor...

                                                                                                        Downloads

                                                                                                        • C:\Users\Admin\AppData\Local\Microsoft\CLR_v4.0\UsageLogs\powershell.exe.log

                                                                                                          Filesize

                                                                                                          2KB

                                                                                                          MD5

                                                                                                          d85ba6ff808d9e5444a4b369f5bc2730

                                                                                                          SHA1

                                                                                                          31aa9d96590fff6981b315e0b391b575e4c0804a

                                                                                                          SHA256

                                                                                                          84739c608a73509419748e4e20e6cc4e1846056c3fe1929a8300d5a1a488202f

                                                                                                          SHA512

                                                                                                          8c414eb55b45212af385accc16d9d562adba2123583ce70d22b91161fe878683845512a78f04dedd4ea98ed9b174dbfa98cf696370598ad8e6fbd1e714f1f249

                                                                                                        • C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\ModuleAnalysisCache

                                                                                                          Filesize

                                                                                                          53KB

                                                                                                          MD5

                                                                                                          a26df49623eff12a70a93f649776dab7

                                                                                                          SHA1

                                                                                                          efb53bd0df3ac34bd119adf8788127ad57e53803

                                                                                                          SHA256

                                                                                                          4ebde1c12625cb55034d47e5169f709b0bd02a8caa76b5b9854efad7f4710245

                                                                                                          SHA512

                                                                                                          e5f9b8645fb2a50763fcbffe877ca03e9cadf099fe2d510b74bfa9ff18d0a6563d11160e00f495eeefebde63450d0ade8d6b6a824e68bd8a59e1971dc842709c

                                                                                                        • C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive

                                                                                                          Filesize

                                                                                                          64B

                                                                                                          MD5

                                                                                                          446dd1cf97eaba21cf14d03aebc79f27

                                                                                                          SHA1

                                                                                                          36e4cc7367e0c7b40f4a8ace272941ea46373799

                                                                                                          SHA256

                                                                                                          a7de5177c68a64bd48b36d49e2853799f4ebcfa8e4761f7cc472f333dc5f65cf

                                                                                                          SHA512

                                                                                                          a6d754709f30b122112ae30e5ab22486393c5021d33da4d1304c061863d2e1e79e8aeb029cae61261bb77d0e7becd53a7b0106d6ea4368b4c302464e3d941cf7

                                                                                                        • C:\Users\Admin\AppData\Local\Temp\__PSScriptPolicyTest_gx342v32.2fm.ps1

                                                                                                          Filesize

                                                                                                          60B

                                                                                                          MD5

                                                                                                          d17fe0a3f47be24a6453e9ef58c94641

                                                                                                          SHA1

                                                                                                          6ab83620379fc69f80c0242105ddffd7d98d5d9d

                                                                                                          SHA256

                                                                                                          96ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7

                                                                                                          SHA512

                                                                                                          5b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82

                                                                                                        • C:\Users\Admin\AppData\Local\Temp\tmpB9F9.tmp.bat

                                                                                                          Filesize

                                                                                                          199B

                                                                                                          MD5

                                                                                                          9c2b0789b7e0f35c6401df7410335630

                                                                                                          SHA1

                                                                                                          b1e5694b8d41cc6e431fac663114bc3bca54711c

                                                                                                          SHA256

                                                                                                          60c7f2deae3af49af856508f1b3c46cf565e9ec033a806d9b4e4e0c6edaaa507

                                                                                                          SHA512

                                                                                                          f8ebb196c72e77b7fb6509f9c4f28714fe963005911f07f6150ffecb3af83343b7f30965c4c61b46c01adfd7df2344341d18c143cbbf0d37d4e88b8d2344f285

                                                                                                        • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\590aee7bdd69b59b.customDestinations-ms

                                                                                                          Filesize

                                                                                                          6KB

                                                                                                          MD5

                                                                                                          e371d20dba2e3004025ec6dac70d3547

                                                                                                          SHA1

                                                                                                          c87bfb7381f49f9533f1aa609b4bf7cb782ea6af

                                                                                                          SHA256

                                                                                                          99a30e3e3c8646a049d186c0d082c21cd246c89c6d59568656c974c4d4ce82b4

                                                                                                          SHA512

                                                                                                          279980e9513238373c4f74a712e715a9c7c183dbc1a2984f5a46d5e25be03c8f623e8e4bcc77a05e2d76f077ef4d7c9669622d4769d324f6d706f508409b8a24

                                                                                                        • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\590aee7bdd69b59b.customDestinations-ms

                                                                                                          Filesize

                                                                                                          6KB

                                                                                                          MD5

                                                                                                          9c7420236321dd804ef0bf30958fdf44

                                                                                                          SHA1

                                                                                                          e98cae1f28cd3700c781f2a9bdeb53c4bcedc574

                                                                                                          SHA256

                                                                                                          fce60127f8dce3221944bf9fb62b8a6453bc9722aaf7424d682b4e01d37e7ba2

                                                                                                          SHA512

                                                                                                          c61f8a7065eec3a49b5e2f6f48f1ca843c50ca2d835a0d805e9811e9f167013878e4802a2583e4d45ecea4d5e85fa6681fdb678c316930fc7b52cdd6365a5da3

                                                                                                        • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\590aee7bdd69b59b.customDestinations-ms

                                                                                                          Filesize

                                                                                                          6KB

                                                                                                          MD5

                                                                                                          ac1ca67617636ea70052600f30a760fd

                                                                                                          SHA1

                                                                                                          098e9f1fd2674acbbda349946cf0d96e4f3bfeaa

                                                                                                          SHA256

                                                                                                          cb0626029ad397e61434363a6daddead7471c730b41c0e8bd98c6c32474b6e24

                                                                                                          SHA512

                                                                                                          e1418372133a16ec29e09634b4beb104a49c6cb19a30af349e6e585ff20498aab1555321a88f41b2251038da66e28388cc8d0558c74756059744fcbf0488c14c

                                                                                                        • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\590aee7bdd69b59b.customDestinations-ms

                                                                                                          Filesize

                                                                                                          6KB

                                                                                                          MD5

                                                                                                          2b793c0512f7fcc91ab48b03d2d0a296

                                                                                                          SHA1

                                                                                                          0fb88dc91fa12ac8cfa7f800bc706b1b46bc1094

                                                                                                          SHA256

                                                                                                          180808ff6c69b1727392904fb67690c63ece5b8063ee51c5c95829b4595d0445

                                                                                                          SHA512

                                                                                                          14aaa91e7574fc45674982a0eee881e824420e35c4fa450016ec45795617768baea2da02a4e93244519922fd025bc885058ad16c204e4837ebb823b9018869aa

                                                                                                        • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\590aee7bdd69b59b.customDestinations-ms

                                                                                                          Filesize

                                                                                                          6KB

                                                                                                          MD5

                                                                                                          91911ad720899c460c63fb9addafe480

                                                                                                          SHA1

                                                                                                          a2d2c0d17d2c9a847874a0a4b19db7b4f2f7cf04

                                                                                                          SHA256

                                                                                                          ae407fc4cb9a7ea7ec410a4a1b2c289bf5f23bf3bb6810c60a1a44ba5b0c7142

                                                                                                          SHA512

                                                                                                          8954bef7e5d5b5855dd43b77ba67606eb6d013700388e91d821220961bf9a3c939d5cb1414a11f021f1c81f9932074ac73ea34243ef5338c7da40353388ec82b

                                                                                                        • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\590aee7bdd69b59b.customDestinations-ms

                                                                                                          Filesize

                                                                                                          6KB

                                                                                                          MD5

                                                                                                          73a1955675f1fcd07bd219b7f9de9369

                                                                                                          SHA1

                                                                                                          12f6adffa86f2868a8c5c2a53e45befb535767fe

                                                                                                          SHA256

                                                                                                          405d902a5f657d120b9a1375af1ecb605762a060ac9a8ff013002177ec12b378

                                                                                                          SHA512

                                                                                                          823b7a830d02e4fb4ada806a407a0d1a518e3308805a5f8a9f97b318e86e876f9051a661e9073aecabe487a44f102a01026b2180c20ab44a105515e1a4dda18e

                                                                                                        • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\590aee7bdd69b59b.customDestinations-ms

                                                                                                          Filesize

                                                                                                          6KB

                                                                                                          MD5

                                                                                                          75d9cb715558c8a81f9c1a249d62568f

                                                                                                          SHA1

                                                                                                          50986d91b6db70a70f0ef813e79c96479c605470

                                                                                                          SHA256

                                                                                                          1dbb178e671ab831ab4898b913e7dc7742075fca515cd1c84dd213b19951c805

                                                                                                          SHA512

                                                                                                          09775325eb735336013fca421058f1b9363e4c95b08c7f577bbbb0c2548ef5a5b0b5d29f1d3e3f6397d47076f64f1b6e52d9cd0fe43e945ea722bbabebb01b8e

                                                                                                        • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\590aee7bdd69b59b.customDestinations-ms

                                                                                                          Filesize

                                                                                                          6KB

                                                                                                          MD5

                                                                                                          039ecbad022e09ebadb5e4a6f991d4b9

                                                                                                          SHA1

                                                                                                          24326aca31bd181c0a7e87ae3b07ec00c110e4b2

                                                                                                          SHA256

                                                                                                          e177d7559641af3781b792dca1b66b22637565b5a77938d5d7279970b4b126c4

                                                                                                          SHA512

                                                                                                          d2e1501b44d2191618812c236c0552fe93eae72a9d6ceddabbd939e8cae34b93e053d148b8d6ae8cf681839464657010ed2f1f684c1dddd1afe278f303e266a6

                                                                                                        • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\590aee7bdd69b59b.customDestinations-ms

                                                                                                          Filesize

                                                                                                          6KB

                                                                                                          MD5

                                                                                                          ac5e19c41ad0b368003eff44cd731239

                                                                                                          SHA1

                                                                                                          52254db36f2e4e38c293d01becc6ea7b5e2cc7e3

                                                                                                          SHA256

                                                                                                          2ccacc8af1d0a7dadadc87644c5b9d1a5aa3c51f4f6704f579441f3f0c057ea9

                                                                                                          SHA512

                                                                                                          2b013aeb10e784d6ce8ff62a996b29e564b9533590f828dba5a65cfd4655e21c3e610badbb355bcbd030f0b0b3a3649298bbfb546b195b677b4112e13a7c1a64

                                                                                                        • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\590aee7bdd69b59b.customDestinations-ms

                                                                                                          Filesize

                                                                                                          6KB

                                                                                                          MD5

                                                                                                          521f585401eedfe718802a9de6df8d56

                                                                                                          SHA1

                                                                                                          0df49a9eb190cea9c149cb7ff1cb8eebeb5d5c3e

                                                                                                          SHA256

                                                                                                          aa0feb868a1092b20f53f316baf18c899da17180d1282fef26cbef0082d31e4a

                                                                                                          SHA512

                                                                                                          439695202df2302ac78876ac788c3933602f28d517b3d78f4ca3d145f4302ced9177768edb42fb64d313bacb67d6289a0e5ac383ccf2c960cbd2980d34e31aa3

                                                                                                        • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\590aee7bdd69b59b.customDestinations-ms

                                                                                                          Filesize

                                                                                                          6KB

                                                                                                          MD5

                                                                                                          daff28dc99d8917936c763bf2ef9fcaa

                                                                                                          SHA1

                                                                                                          88b011350f5f8ed1b1001b3b51b414bb684d7949

                                                                                                          SHA256

                                                                                                          bd0a273ee88e80d13428ff8f758748507f718ab4abab5abd0703ddb38736e6b4

                                                                                                          SHA512

                                                                                                          d9c30fb6dfdeb5505c290550a083b5c5972b20a4f916f8666d3f5e82e019ddc446e592256e9195966254f32926b5b9ee71b53d6e1789dadc4e77a0f970b7aca4

                                                                                                        • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\590aee7bdd69b59b.customDestinations-ms

                                                                                                          Filesize

                                                                                                          6KB

                                                                                                          MD5

                                                                                                          153ac10c51a6f4f9b5100b4f68a166df

                                                                                                          SHA1

                                                                                                          87a5743a6d2bf167083e1e53a77d15adb9a0bc29

                                                                                                          SHA256

                                                                                                          772a6238162633e088506c725cb7228f68c131134b1b6087939d7337ea6b0030

                                                                                                          SHA512

                                                                                                          e3cd311cf6b47e0dc56e28e926803a5f262b6d51be4595deb3a2f977df9af9964bbbf82e0ba0410a127cc80fc60ee5234c31bb7f436b894e786501758e0dbeed

                                                                                                        • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\590aee7bdd69b59b.customDestinations-ms

                                                                                                          Filesize

                                                                                                          6KB

                                                                                                          MD5

                                                                                                          05933ee3098f43baad0d907cf8873a25

                                                                                                          SHA1

                                                                                                          d832993f13027ae1a1d923dd83f1151654dec834

                                                                                                          SHA256

                                                                                                          8943f939f38f514e911c4fda862a03b81feba83cf54b617085b7f7a791ec7af8

                                                                                                          SHA512

                                                                                                          c9f03a3792fcb754e92d77fb0e59e61bdf4571fe1c13efb54770dd5c81a9bcdb3426b33cdc7326965ecebc7cd1ce03aa411823c98fa7646aabbdfe38a45e812c

                                                                                                        • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\590aee7bdd69b59b.customDestinations-ms

                                                                                                          Filesize

                                                                                                          6KB

                                                                                                          MD5

                                                                                                          825413ee8f9ae8e2f53d2626e52c221b

                                                                                                          SHA1

                                                                                                          910c2d847ac42f939c1e7cef49aff51bc01656a1

                                                                                                          SHA256

                                                                                                          38750fb9ee43f8c6187ffab6545c361a936b421c1691f24a540deaad2bfa353d

                                                                                                          SHA512

                                                                                                          0b7a071151cfe1f5c054a7e3b37b2b695c142d476ad30fd7b50297214e6893b97c45ae71bb3830a75e53b9df1766370fc29e3870d03c95e53bd564237c2c5e66

                                                                                                        • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\590aee7bdd69b59b.customDestinations-ms

                                                                                                          Filesize

                                                                                                          6KB

                                                                                                          MD5

                                                                                                          ac94fdc8f6feea681f5474da24622aef

                                                                                                          SHA1

                                                                                                          2ddfbbbf0938655d1ff9e4e792371bb80d8b9e20

                                                                                                          SHA256

                                                                                                          1cb3cc44b9e6d47e21fa91464059c31bea311f973c8f07f9725ee591c7a1e01c

                                                                                                          SHA512

                                                                                                          adf1219766b9af43951b64547cf35f0c8b2e374a1148986715e1e121be8bf69fa0c16cdf89e21d05f51c4c350eceafadc20c4c9fbb86292a82d13938c96e5e0c

                                                                                                        • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\590aee7bdd69b59b.customDestinations-ms

                                                                                                          Filesize

                                                                                                          6KB

                                                                                                          MD5

                                                                                                          3ca8d38ac2772947a598401319a3ae99

                                                                                                          SHA1

                                                                                                          5668fdf854fd1415052112f072b50597ca03cf65

                                                                                                          SHA256

                                                                                                          8fd66411d63b8533c4ead689158fdd0d052b146b96ad34e97ff898a1f8d9fb82

                                                                                                          SHA512

                                                                                                          bd31e46024dd280c9a68fb22870a4f72e038908a21afaf55a34795a15725203f2843b11a4af7e116a41aceec73acd670acfaafc9d63abad169619861e786380d

                                                                                                        • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\590aee7bdd69b59b.customDestinations-ms

                                                                                                          Filesize

                                                                                                          6KB

                                                                                                          MD5

                                                                                                          2ab484435126ba8aa29469ef6f24d57d

                                                                                                          SHA1

                                                                                                          107e5d74ddad2248f957c7b507831a8c3d845e3d

                                                                                                          SHA256

                                                                                                          bf063d081373b5dc0fdc848500604096023ad6e209d000935a5a36e95a87d74b

                                                                                                          SHA512

                                                                                                          635f4ec890da1eaed5dcef220484297f30347993d244ebab1e57e285d0a7e04b983907735e189b91db45c93a62252519471506128ef32ac3264712a863c2b834

                                                                                                        • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\590aee7bdd69b59b.customDestinations-ms

                                                                                                          Filesize

                                                                                                          6KB

                                                                                                          MD5

                                                                                                          f2f516cf58956b887f69b10914eb9d92

                                                                                                          SHA1

                                                                                                          37ea997c70c259a21927b298bf75b8b62f1c7946

                                                                                                          SHA256

                                                                                                          7f969f2c984859f867325e4bc8de749746db3ae8db22363dd644d0d9569decb1

                                                                                                          SHA512

                                                                                                          4fe10b5a751690bb8202136459d64d886cf7be691965d6f217cc3de690847b27cb506b4e11c167d43fba0ccf282a50ffb62ca13ab3541e343728b15799149272

                                                                                                        • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\ORK40Y6KITLR6C5O97AB.temp

                                                                                                          Filesize

                                                                                                          6KB

                                                                                                          MD5

                                                                                                          a6dbf6928c6a8f28c068551814173b17

                                                                                                          SHA1

                                                                                                          b48977291c314dcba774cfd07e68318925e4127f

                                                                                                          SHA256

                                                                                                          f388e8904972ec0e0d5a5af7fbf1d77c7eb4c0c7c7f96334e0cce2db3dbdb899

                                                                                                          SHA512

                                                                                                          d1c773cab0ea9b538d7b9faf9be34904dab580ce6a567c9f819f8918845b7e6913e40f977610c944686054af67478a233ee2b4f7b794b94bf76fc5e36d02970e

                                                                                                        • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Templates\SysTemp64\$77Runtime Broker.exe

                                                                                                          Filesize

                                                                                                          43KB

                                                                                                          MD5

                                                                                                          44a5ff2feda2634ae7d9fadc97ebd0a0

                                                                                                          SHA1

                                                                                                          9a763aefd806585e11a36203e575ae142f38bc6c

                                                                                                          SHA256

                                                                                                          5dde6801897a7d76c16e64c0b36a3280fbf5371642a690b85ddd31538c4458d8

                                                                                                          SHA512

                                                                                                          cebc24998c33d7fe8bcdba5183d60c36b3ccaac247d0ee206a73485236453c109dc269522df01d85f58efd3d7a28358221f2139f11356f95f9b8283475f576ca

                                                                                                        • memory/2132-74-0x0000022F9BCA0000-0x0000022F9BCE4000-memory.dmp

                                                                                                          Filesize

                                                                                                          272KB

                                                                                                        • memory/2132-106-0x0000022F9CA40000-0x0000022F9CAB6000-memory.dmp

                                                                                                          Filesize

                                                                                                          472KB

                                                                                                        • memory/2672-19-0x0000018E59F10000-0x0000018E59F32000-memory.dmp

                                                                                                          Filesize

                                                                                                          136KB

                                                                                                        • memory/2712-28-0x000000001F070000-0x000000001F090000-memory.dmp

                                                                                                          Filesize

                                                                                                          128KB

                                                                                                        • memory/5736-10-0x00007FF9BCB60000-0x00007FF9BD621000-memory.dmp

                                                                                                          Filesize

                                                                                                          10.8MB

                                                                                                        • memory/5736-4-0x00007FF9BCB60000-0x00007FF9BD621000-memory.dmp

                                                                                                          Filesize

                                                                                                          10.8MB

                                                                                                        • memory/5736-0-0x00007FF9BCB63000-0x00007FF9BCB65000-memory.dmp

                                                                                                          Filesize

                                                                                                          8KB

                                                                                                        • memory/5736-3-0x00007FF9BCB63000-0x00007FF9BCB65000-memory.dmp

                                                                                                          Filesize

                                                                                                          8KB

                                                                                                        • memory/5736-2-0x00007FF9BCB60000-0x00007FF9BD621000-memory.dmp

                                                                                                          Filesize

                                                                                                          10.8MB

                                                                                                        • memory/5736-1-0x0000000000CE0000-0x0000000000CF0000-memory.dmp

                                                                                                          Filesize

                                                                                                          64KB