Analysis

  • max time kernel
    393s
  • max time network
    395s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20250217-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20250217-enlocale:en-usos:windows10-2004-x64system
  • submitted
    08/03/2025, 22:10

General

  • Target

    rat/SilverClient - Copy (8).exe

  • Size

    43KB

  • MD5

    44a5ff2feda2634ae7d9fadc97ebd0a0

  • SHA1

    9a763aefd806585e11a36203e575ae142f38bc6c

  • SHA256

    5dde6801897a7d76c16e64c0b36a3280fbf5371642a690b85ddd31538c4458d8

  • SHA512

    cebc24998c33d7fe8bcdba5183d60c36b3ccaac247d0ee206a73485236453c109dc269522df01d85f58efd3d7a28358221f2139f11356f95f9b8283475f576ca

  • SSDEEP

    768:GdmcASe38zJ/Ol6IoZmtPHJm7+avCJ8eEPNRULQD9PUGa7AB6Sh/lE:GdmcASeuOtvhmeZKNGsD9pYAoS/lE

Malware Config

Extracted

Family

silverrat

Version

1.0.0.0

C2

if-eventually.gl.at.ply.gg:17094

Mutex

Mutex_DthEiIseBZ

Attributes
  • certificate

    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

  • decrypted_key

    -|S.S.S|-

  • key

    yy6zDjAUmbB09pKvo5Hhug==

  • key_x509

    eGlwZU1BZVJwdkFBdllxYmdRQUJ2eWtsbVVURFhE

  • reconnect_delay

    0

  • server_signature

    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

Signatures

  • SilverRat

    SilverRat is trojan written in C#.

  • Silverrat family
  • Sets file to hidden 1 TTPs 2 IoCs

    Modifies file attributes to stop it showing in Explorer etc.

  • Checks computer location settings 2 TTPs 2 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Executes dropped EXE 1 IoCs
  • Adds Run key to start application 2 TTPs 1 IoCs
  • Command and Scripting Interpreter: PowerShell 1 TTPs 1 IoCs

    Using powershell.exe command.

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Checks processor information in registry 2 TTPs 6 IoCs

    Processor information is often read in order to detect sandboxing environments.

  • Delays execution with timeout.exe 1 IoCs
  • Enumerates system info in registry 2 TTPs 4 IoCs
  • Scheduled Task/Job: Scheduled Task 1 TTPs 2 IoCs

    Schtasks is often used by malware for persistence or to perform post-infection execution.

  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 46 IoCs
  • Suspicious use of SetWindowsHookEx 1 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs
  • Uses Task Scheduler COM API 1 TTPs

    The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.

  • Uses Volume Shadow Copy service COM API

    The Volume Shadow Copy service is used to manage backups/snapshots.

  • Views/modifies file attributes 1 TTPs 2 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\rat\SilverClient - Copy (8).exe
    "C:\Users\Admin\AppData\Local\Temp\rat\SilverClient - Copy (8).exe"
    1⤵
    • Checks computer location settings
    • Adds Run key to start application
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:1164
    • C:\Windows\System32\attrib.exe
      "C:\Windows\System32\attrib.exe" +s +h "C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Templates\SysTemp64"
      2⤵
      • Sets file to hidden
      • Views/modifies file attributes
      PID:3016
    • C:\Windows\System32\attrib.exe
      "C:\Windows\System32\attrib.exe" +s +h "C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Templates\SysTemp64\$77Runtime Broker.exe"
      2⤵
      • Sets file to hidden
      • Views/modifies file attributes
      PID:452
    • C:\Windows\system32\cmd.exe
      C:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\tmp6898.tmp.bat""
      2⤵
      • Suspicious use of WriteProcessMemory
      PID:1536
      • C:\Windows\system32\timeout.exe
        timeout 3
        3⤵
        • Delays execution with timeout.exe
        PID:3100
      • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Templates\SysTemp64\$77Runtime Broker.exe
        "C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Templates\SysTemp64\$77Runtime Broker.exe"
        3⤵
        • Checks computer location settings
        • Executes dropped EXE
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious behavior: GetForegroundWindowSpam
        • Suspicious use of AdjustPrivilegeToken
        • Suspicious use of SetWindowsHookEx
        • Suspicious use of WriteProcessMemory
        PID:3548
        • C:\Windows\SYSTEM32\schtasks.exe
          "schtasks.exe" /query /TN $77Runtime Broker.exe
          4⤵
            PID:3992
          • C:\Windows\SYSTEM32\schtasks.exe
            "schtasks.exe" /Create /SC ONCE /TN "$77Runtime Broker.exe" /TR "C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Templates\SysTemp64\$77Runtime Broker.exe \"\$77Runtime Broker.exe\" /AsAdmin" /ST 00:01 /IT /F /RL HIGHEST
            4⤵
            • Scheduled Task/Job: Scheduled Task
            PID:60
          • C:\Windows\SYSTEM32\schtasks.exe
            "schtasks.exe" /query /TN $77Runtime Broker.exe
            4⤵
              PID:2008
            • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
              "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Set-MpPreference -ExclusionExtension exe,bat,dll,ps1;exit
              4⤵
              • Command and Scripting Interpreter: PowerShell
              • Suspicious behavior: EnumeratesProcesses
              • Suspicious use of AdjustPrivilegeToken
              PID:1820
            • C:\Windows\System32\schtasks.exe
              "C:\Windows\System32\schtasks.exe" /create /sc hourly /mo 1 /tn "Runtime Broker_Task-HOURLY-01" /tr "%MyFile%" /st 00:00
              4⤵
              • Scheduled Task/Job: Scheduled Task
              PID:4536
            • C:\Windows\System32\cmd.exe
              "C:\Windows\System32\cmd.exe"
              4⤵
                PID:4312
              • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"
                4⤵
                • Suspicious behavior: EnumeratesProcesses
                • Suspicious use of AdjustPrivilegeToken
                PID:284
              • C:\Windows\System32\cmd.exe
                "C:\Windows\System32\cmd.exe"
                4⤵
                  PID:3936
                • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                  "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"
                  4⤵
                  • Suspicious behavior: EnumeratesProcesses
                  • Suspicious use of AdjustPrivilegeToken
                  PID:4300
                • C:\Windows\System32\cmd.exe
                  "C:\Windows\System32\cmd.exe"
                  4⤵
                    PID:4664
                  • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                    "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"
                    4⤵
                    • Suspicious behavior: EnumeratesProcesses
                    • Suspicious use of AdjustPrivilegeToken
                    PID:3296
                  • C:\Windows\System32\cmd.exe
                    "C:\Windows\System32\cmd.exe"
                    4⤵
                      PID:4152
                    • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                      "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"
                      4⤵
                      • Suspicious behavior: EnumeratesProcesses
                      • Suspicious use of AdjustPrivilegeToken
                      PID:4844
                    • C:\Windows\System32\cmd.exe
                      "C:\Windows\System32\cmd.exe"
                      4⤵
                        PID:1936
                      • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                        "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"
                        4⤵
                        • Suspicious behavior: EnumeratesProcesses
                        • Suspicious use of AdjustPrivilegeToken
                        PID:4516
                      • C:\Windows\System32\cmd.exe
                        "C:\Windows\System32\cmd.exe"
                        4⤵
                          PID:832
                        • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                          "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"
                          4⤵
                          • Suspicious behavior: EnumeratesProcesses
                          • Suspicious use of AdjustPrivilegeToken
                          PID:3932
                        • C:\Windows\System32\cmd.exe
                          "C:\Windows\System32\cmd.exe"
                          4⤵
                            PID:4708
                          • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                            "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"
                            4⤵
                            • Suspicious behavior: EnumeratesProcesses
                            • Suspicious use of AdjustPrivilegeToken
                            PID:512
                          • C:\Windows\System32\cmd.exe
                            "C:\Windows\System32\cmd.exe"
                            4⤵
                              PID:1772
                            • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                              "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"
                              4⤵
                              • Suspicious behavior: EnumeratesProcesses
                              • Suspicious use of AdjustPrivilegeToken
                              PID:4048
                            • C:\Windows\System32\cmd.exe
                              "C:\Windows\System32\cmd.exe"
                              4⤵
                                PID:3188
                              • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"
                                4⤵
                                • Suspicious behavior: EnumeratesProcesses
                                • Suspicious use of AdjustPrivilegeToken
                                PID:4700
                              • C:\Windows\System32\cmd.exe
                                "C:\Windows\System32\cmd.exe"
                                4⤵
                                  PID:5148
                                • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                  "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"
                                  4⤵
                                  • Suspicious behavior: EnumeratesProcesses
                                  • Suspicious use of AdjustPrivilegeToken
                                  PID:5228
                                • C:\Windows\System32\cmd.exe
                                  "C:\Windows\System32\cmd.exe"
                                  4⤵
                                    PID:5368
                                  • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                    "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"
                                    4⤵
                                    • Suspicious behavior: EnumeratesProcesses
                                    • Suspicious use of AdjustPrivilegeToken
                                    PID:5452
                                  • C:\Windows\System32\cmd.exe
                                    "C:\Windows\System32\cmd.exe"
                                    4⤵
                                      PID:5584
                                    • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                      "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"
                                      4⤵
                                      • Suspicious behavior: EnumeratesProcesses
                                      • Suspicious use of AdjustPrivilegeToken
                                      PID:5640
                                    • C:\Windows\System32\cmd.exe
                                      "C:\Windows\System32\cmd.exe"
                                      4⤵
                                        PID:5712
                                      • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                        "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"
                                        4⤵
                                        • Suspicious use of AdjustPrivilegeToken
                                        PID:5860
                                      • C:\Windows\System32\cmd.exe
                                        "C:\Windows\System32\cmd.exe"
                                        4⤵
                                          PID:5900
                                        • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                          "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"
                                          4⤵
                                          • Suspicious use of AdjustPrivilegeToken
                                          PID:5996
                                        • C:\Windows\System32\cmd.exe
                                          "C:\Windows\System32\cmd.exe"
                                          4⤵
                                            PID:6080
                                          • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                            "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"
                                            4⤵
                                            • Suspicious use of AdjustPrivilegeToken
                                            PID:5124
                                          • C:\Windows\System32\cmd.exe
                                            "C:\Windows\System32\cmd.exe"
                                            4⤵
                                              PID:5300
                                            • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                              "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"
                                              4⤵
                                              • Suspicious use of AdjustPrivilegeToken
                                              PID:5748
                                            • C:\Windows\System32\cmd.exe
                                              "C:\Windows\System32\cmd.exe"
                                              4⤵
                                                PID:4880
                                              • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"
                                                4⤵
                                                • Suspicious use of AdjustPrivilegeToken
                                                PID:5652
                                              • C:\Windows\System32\cmd.exe
                                                "C:\Windows\System32\cmd.exe"
                                                4⤵
                                                  PID:5816
                                                • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                  "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"
                                                  4⤵
                                                  • Suspicious use of AdjustPrivilegeToken
                                                  PID:6176
                                                • C:\Windows\System32\cmd.exe
                                                  "C:\Windows\System32\cmd.exe"
                                                  4⤵
                                                    PID:6340
                                                  • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                    "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"
                                                    4⤵
                                                    • Suspicious use of AdjustPrivilegeToken
                                                    PID:6440
                                                  • C:\Windows\System32\cmd.exe
                                                    "C:\Windows\System32\cmd.exe"
                                                    4⤵
                                                      PID:6652
                                                    • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                      "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"
                                                      4⤵
                                                      • Suspicious use of AdjustPrivilegeToken
                                                      PID:6756
                                                    • C:\Windows\System32\cmd.exe
                                                      "C:\Windows\System32\cmd.exe"
                                                      4⤵
                                                        PID:6812
                                                      • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                        "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"
                                                        4⤵
                                                        • Suspicious use of AdjustPrivilegeToken
                                                        PID:6892
                                                      • C:\Windows\System32\cmd.exe
                                                        "C:\Windows\System32\cmd.exe"
                                                        4⤵
                                                          PID:7040
                                                        • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                          "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"
                                                          4⤵
                                                          • Suspicious use of AdjustPrivilegeToken
                                                          PID:7152
                                                        • C:\Windows\System32\cmd.exe
                                                          "C:\Windows\System32\cmd.exe"
                                                          4⤵
                                                            PID:5924
                                                          • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                            "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"
                                                            4⤵
                                                            • Suspicious use of AdjustPrivilegeToken
                                                            PID:6720
                                                          • C:\Windows\System32\cmd.exe
                                                            "C:\Windows\System32\cmd.exe"
                                                            4⤵
                                                              PID:6964
                                                            • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                              "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"
                                                              4⤵
                                                              • Suspicious use of AdjustPrivilegeToken
                                                              PID:292
                                                            • C:\Windows\System32\cmd.exe
                                                              "C:\Windows\System32\cmd.exe"
                                                              4⤵
                                                                PID:6856
                                                              • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                                "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"
                                                                4⤵
                                                                • Suspicious use of AdjustPrivilegeToken
                                                                PID:7224
                                                                • C:\Windows\system32\wermgr.exe
                                                                  "C:\Windows\system32\wermgr.exe" "-outproc" "0" "7224" "2460" "2568" "2464" "0" "0" "2468" "0" "0" "0" "0" "0"
                                                                  5⤵
                                                                  • Checks processor information in registry
                                                                  • Enumerates system info in registry
                                                                  PID:8888
                                                              • C:\Windows\System32\cmd.exe
                                                                "C:\Windows\System32\cmd.exe"
                                                                4⤵
                                                                  PID:7320
                                                                • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                                  "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"
                                                                  4⤵
                                                                  • Suspicious use of AdjustPrivilegeToken
                                                                  PID:7476
                                                                • C:\Windows\System32\cmd.exe
                                                                  "C:\Windows\System32\cmd.exe"
                                                                  4⤵
                                                                    PID:7580
                                                                  • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                                    "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"
                                                                    4⤵
                                                                    • Suspicious use of AdjustPrivilegeToken
                                                                    PID:7648
                                                                  • C:\Windows\System32\cmd.exe
                                                                    "C:\Windows\System32\cmd.exe"
                                                                    4⤵
                                                                      PID:7728
                                                                    • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                                      "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"
                                                                      4⤵
                                                                      • Suspicious use of AdjustPrivilegeToken
                                                                      PID:7828
                                                                    • C:\Windows\System32\cmd.exe
                                                                      "C:\Windows\System32\cmd.exe"
                                                                      4⤵
                                                                        PID:7936
                                                                      • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                                        "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"
                                                                        4⤵
                                                                        • Suspicious use of AdjustPrivilegeToken
                                                                        PID:8008
                                                                      • C:\Windows\System32\cmd.exe
                                                                        "C:\Windows\System32\cmd.exe"
                                                                        4⤵
                                                                          PID:8132
                                                                        • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                                          "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"
                                                                          4⤵
                                                                          • Suspicious use of AdjustPrivilegeToken
                                                                          PID:6228
                                                                        • C:\Windows\System32\cmd.exe
                                                                          "C:\Windows\System32\cmd.exe"
                                                                          4⤵
                                                                            PID:7756
                                                                          • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                                            "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"
                                                                            4⤵
                                                                            • Suspicious use of AdjustPrivilegeToken
                                                                            PID:8036
                                                                          • C:\Windows\System32\cmd.exe
                                                                            "C:\Windows\System32\cmd.exe"
                                                                            4⤵
                                                                              PID:8208
                                                                            • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                                              "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"
                                                                              4⤵
                                                                              • Suspicious use of AdjustPrivilegeToken
                                                                              PID:8292
                                                                            • C:\Windows\System32\cmd.exe
                                                                              "C:\Windows\System32\cmd.exe"
                                                                              4⤵
                                                                                PID:8404
                                                                              • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                                                "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"
                                                                                4⤵
                                                                                • Suspicious use of AdjustPrivilegeToken
                                                                                PID:8556
                                                                              • C:\Windows\System32\cmd.exe
                                                                                "C:\Windows\System32\cmd.exe"
                                                                                4⤵
                                                                                  PID:8632
                                                                                • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                                                  "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"
                                                                                  4⤵
                                                                                  • Suspicious use of AdjustPrivilegeToken
                                                                                  PID:8724
                                                                                • C:\Windows\System32\cmd.exe
                                                                                  "C:\Windows\System32\cmd.exe"
                                                                                  4⤵
                                                                                    PID:8900
                                                                                  • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                                                    "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"
                                                                                    4⤵
                                                                                    • Suspicious use of AdjustPrivilegeToken
                                                                                    PID:8948
                                                                                  • C:\Windows\System32\cmd.exe
                                                                                    "C:\Windows\System32\cmd.exe"
                                                                                    4⤵
                                                                                      PID:9096
                                                                                    • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                                                      "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"
                                                                                      4⤵
                                                                                      • Suspicious use of AdjustPrivilegeToken
                                                                                      PID:9184
                                                                                    • C:\Windows\System32\cmd.exe
                                                                                      "C:\Windows\System32\cmd.exe"
                                                                                      4⤵
                                                                                        PID:1192
                                                                                      • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                                                        "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"
                                                                                        4⤵
                                                                                        • Suspicious use of AdjustPrivilegeToken
                                                                                        PID:8424
                                                                                      • C:\Windows\System32\cmd.exe
                                                                                        "C:\Windows\System32\cmd.exe"
                                                                                        4⤵
                                                                                          PID:8652
                                                                                        • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                                                          "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"
                                                                                          4⤵
                                                                                          • Suspicious use of AdjustPrivilegeToken
                                                                                          PID:2200
                                                                                        • C:\Windows\System32\cmd.exe
                                                                                          "C:\Windows\System32\cmd.exe"
                                                                                          4⤵
                                                                                            PID:8816
                                                                                          • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                                                            "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"
                                                                                            4⤵
                                                                                            • Suspicious use of AdjustPrivilegeToken
                                                                                            PID:9300
                                                                                          • C:\Windows\System32\cmd.exe
                                                                                            "C:\Windows\System32\cmd.exe"
                                                                                            4⤵
                                                                                              PID:9528
                                                                                            • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                                                              "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"
                                                                                              4⤵
                                                                                              • Suspicious use of AdjustPrivilegeToken
                                                                                              PID:9604
                                                                                              • C:\Windows\system32\wermgr.exe
                                                                                                "C:\Windows\system32\wermgr.exe" "-outproc" "0" "9604" "2488" "2420" "2492" "0" "0" "2496" "0" "0" "0" "0" "0"
                                                                                                5⤵
                                                                                                • Checks processor information in registry
                                                                                                • Enumerates system info in registry
                                                                                                PID:9628
                                                                                            • C:\Windows\System32\cmd.exe
                                                                                              "C:\Windows\System32\cmd.exe"
                                                                                              4⤵
                                                                                                PID:9784
                                                                                              • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                                                                "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"
                                                                                                4⤵
                                                                                                  PID:9896
                                                                                                • C:\Windows\System32\cmd.exe
                                                                                                  "C:\Windows\System32\cmd.exe"
                                                                                                  4⤵
                                                                                                    PID:9964
                                                                                                  • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                                                                    "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"
                                                                                                    4⤵
                                                                                                      PID:10152
                                                                                                    • C:\Windows\System32\cmd.exe
                                                                                                      "C:\Windows\System32\cmd.exe"
                                                                                                      4⤵
                                                                                                        PID:4888
                                                                                                      • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                                                                        "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"
                                                                                                        4⤵
                                                                                                          PID:9592
                                                                                                        • C:\Windows\System32\cmd.exe
                                                                                                          "C:\Windows\System32\cmd.exe"
                                                                                                          4⤵
                                                                                                            PID:4968
                                                                                                          • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                                                                            "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"
                                                                                                            4⤵
                                                                                                              PID:1308
                                                                                                      • C:\Windows\system32\vssvc.exe
                                                                                                        C:\Windows\system32\vssvc.exe
                                                                                                        1⤵
                                                                                                        • Suspicious use of AdjustPrivilegeToken
                                                                                                        PID:2404

                                                                                                      Network

                                                                                                      MITRE ATT&CK Enterprise v15

                                                                                                      Replay Monitor

                                                                                                      Loading Replay Monitor...

                                                                                                      Downloads

                                                                                                      • C:\Users\Admin\AppData\Local\Microsoft\CLR_v4.0\UsageLogs\powershell.exe.log

                                                                                                        Filesize

                                                                                                        2KB

                                                                                                        MD5

                                                                                                        d85ba6ff808d9e5444a4b369f5bc2730

                                                                                                        SHA1

                                                                                                        31aa9d96590fff6981b315e0b391b575e4c0804a

                                                                                                        SHA256

                                                                                                        84739c608a73509419748e4e20e6cc4e1846056c3fe1929a8300d5a1a488202f

                                                                                                        SHA512

                                                                                                        8c414eb55b45212af385accc16d9d562adba2123583ce70d22b91161fe878683845512a78f04dedd4ea98ed9b174dbfa98cf696370598ad8e6fbd1e714f1f249

                                                                                                      • C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\ModuleAnalysisCache

                                                                                                        Filesize

                                                                                                        53KB

                                                                                                        MD5

                                                                                                        a26df49623eff12a70a93f649776dab7

                                                                                                        SHA1

                                                                                                        efb53bd0df3ac34bd119adf8788127ad57e53803

                                                                                                        SHA256

                                                                                                        4ebde1c12625cb55034d47e5169f709b0bd02a8caa76b5b9854efad7f4710245

                                                                                                        SHA512

                                                                                                        e5f9b8645fb2a50763fcbffe877ca03e9cadf099fe2d510b74bfa9ff18d0a6563d11160e00f495eeefebde63450d0ade8d6b6a824e68bd8a59e1971dc842709c

                                                                                                      • C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive

                                                                                                        Filesize

                                                                                                        64B

                                                                                                        MD5

                                                                                                        446dd1cf97eaba21cf14d03aebc79f27

                                                                                                        SHA1

                                                                                                        36e4cc7367e0c7b40f4a8ace272941ea46373799

                                                                                                        SHA256

                                                                                                        a7de5177c68a64bd48b36d49e2853799f4ebcfa8e4761f7cc472f333dc5f65cf

                                                                                                        SHA512

                                                                                                        a6d754709f30b122112ae30e5ab22486393c5021d33da4d1304c061863d2e1e79e8aeb029cae61261bb77d0e7becd53a7b0106d6ea4368b4c302464e3d941cf7

                                                                                                      • C:\Users\Admin\AppData\Local\Temp\__PSScriptPolicyTest_woduhfir.aqa.ps1

                                                                                                        Filesize

                                                                                                        60B

                                                                                                        MD5

                                                                                                        d17fe0a3f47be24a6453e9ef58c94641

                                                                                                        SHA1

                                                                                                        6ab83620379fc69f80c0242105ddffd7d98d5d9d

                                                                                                        SHA256

                                                                                                        96ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7

                                                                                                        SHA512

                                                                                                        5b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82

                                                                                                      • C:\Users\Admin\AppData\Local\Temp\tmp6898.tmp.bat

                                                                                                        Filesize

                                                                                                        199B

                                                                                                        MD5

                                                                                                        426efe35445e346ffa4850b2e05906ea

                                                                                                        SHA1

                                                                                                        d79221d7f50f7dbb83044c3cf818d4fd4657da1f

                                                                                                        SHA256

                                                                                                        2851f64a4dab06a61a701fdd82d6f21a7a54ef81161eba3a01b88276f7eb9af5

                                                                                                        SHA512

                                                                                                        0d1ab82a4fd8fc5eba12efa24ed49dcc5ad9b43c13b78f9c455b5a41a0cbd67e7c2e3d9c0e2c77acad5be7cc86f06950dc70bcd4536fea942e4e285fa2c061f3

                                                                                                      • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\590aee7bdd69b59b.customDestinations-ms

                                                                                                        Filesize

                                                                                                        6KB

                                                                                                        MD5

                                                                                                        ff81255996cf10159075c2f6018a0fe0

                                                                                                        SHA1

                                                                                                        ebb307c3b7dfd5f17c522db9eeb8a105d3398626

                                                                                                        SHA256

                                                                                                        4f0aca8a1fc57fe3df64dc948133d739177a89764b934a8446db79385c1cd966

                                                                                                        SHA512

                                                                                                        408660df8bc8774268de539d8a046022d5e12e81a9b2aba25204ba4038339ca9e5a2cd94ec34447938b016a129694ed090a23e9430fa9b4dca27bc103fde21e8

                                                                                                      • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\590aee7bdd69b59b.customDestinations-ms

                                                                                                        Filesize

                                                                                                        6KB

                                                                                                        MD5

                                                                                                        6a4b7a98e8a88ac7ce87fde3354fd28b

                                                                                                        SHA1

                                                                                                        845634b6db39eafb935a0b3cc5430e4b07a0ef75

                                                                                                        SHA256

                                                                                                        406de68e9e38c5bde5993dad39de9ac5d4367fbc5e51d9ed081bb9c126ccef47

                                                                                                        SHA512

                                                                                                        e5c6064145ffaaba6e23dcc4bc0d49a672e36cdf82567b51aca4112ef9f6fb9f9850bce7b533748e4c521d499dc950dd295de3c9231d44be419472d9175066f7

                                                                                                      • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\590aee7bdd69b59b.customDestinations-ms

                                                                                                        Filesize

                                                                                                        6KB

                                                                                                        MD5

                                                                                                        26cf7db62f50c4b2bf5b3b7f79623cd6

                                                                                                        SHA1

                                                                                                        364df2e9318b3fe681519c4822994b4cb2158278

                                                                                                        SHA256

                                                                                                        fe995ef4c717fa5f552ae72d20526e9f7ea3756c157250b93f66507dace83533

                                                                                                        SHA512

                                                                                                        6e740592052af91fabc27aaff8087eaa2b8b92c82b445a1a033119d078c59ab9e111aa9e797231ff4d67c5e8f54e9d4aea9f13e6ab04cfdd7218a5051dc6d73b

                                                                                                      • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\590aee7bdd69b59b.customDestinations-ms

                                                                                                        Filesize

                                                                                                        6KB

                                                                                                        MD5

                                                                                                        893b5f848384992a2405491dc1529b0b

                                                                                                        SHA1

                                                                                                        24e367e20daf0b8bc5d75dd77ba94c84b5261cda

                                                                                                        SHA256

                                                                                                        adbb3de5aff85700fc693b1f0428b1d1ffd4a6d1ace8b7f53eb4684e2cde444c

                                                                                                        SHA512

                                                                                                        70c142bb43e21e3c0dc2bb055c660793a6228d868783296114f7fb0140472b2e260cbf9ae5f6ec5f3caba359c4897e9a6e8f6e17151b9806c1d9ff9c931b71a2

                                                                                                      • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\590aee7bdd69b59b.customDestinations-ms

                                                                                                        Filesize

                                                                                                        6KB

                                                                                                        MD5

                                                                                                        00925639cadf4b24089ca8cccfd873dc

                                                                                                        SHA1

                                                                                                        f5a5849ab6097e45af72c4a2540ff99459ef6994

                                                                                                        SHA256

                                                                                                        d14bcc0a2614e2fb772bed22c67d5837a790cd45f2c5b74183574aa2d4263d77

                                                                                                        SHA512

                                                                                                        5a64fec41199db28ffbe56278210006fdebd17489a3bc555bdfcdf49c7df22db72e6d108828a668b255992ee2591d9cfa367cf1f4d66872611dc22143e3e061c

                                                                                                      • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\590aee7bdd69b59b.customDestinations-ms

                                                                                                        Filesize

                                                                                                        6KB

                                                                                                        MD5

                                                                                                        c7b3376be46c17620c67e4efa63aae5c

                                                                                                        SHA1

                                                                                                        8eed604c83dea8d68c63afeac2b434f0d84c2da5

                                                                                                        SHA256

                                                                                                        6c2a00cea308c647017872646673511f053d5eceba56c86b6ce9a23d15ebd50b

                                                                                                        SHA512

                                                                                                        11e5419d2425de74a2c939677361b28b5c8fe7fed1cc72774a27113c586aeb515005a9f8716ee31e24b8e507e1dbe6779ea71da14dc327453dac8b0f35ae711e

                                                                                                      • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\590aee7bdd69b59b.customDestinations-ms

                                                                                                        Filesize

                                                                                                        6KB

                                                                                                        MD5

                                                                                                        1365bd79665fb6dc552640fda71ee9e5

                                                                                                        SHA1

                                                                                                        bdc806def226aa40f87f3c17081d2e4e862032e6

                                                                                                        SHA256

                                                                                                        a628157a0b1d33973ceab21ceabc9fda36b2c8c6cf653215527c3e4b35617049

                                                                                                        SHA512

                                                                                                        7eb06c54c58e36012bc4ff21b4963263ecd57c9d5af9682ed47060a4f8840cd662a650589a7a07a619ae6d96d5b78791b340f6830ab8319abe2286acb7441cb8

                                                                                                      • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\590aee7bdd69b59b.customDestinations-ms

                                                                                                        Filesize

                                                                                                        6KB

                                                                                                        MD5

                                                                                                        78a1014afbab81ad15faae8fe4ede710

                                                                                                        SHA1

                                                                                                        5147ef71f6aa15fd13cfbaba4e0277f40fb4d60d

                                                                                                        SHA256

                                                                                                        2d34dba051e416e4e1828b78a99c79e0370fe30f4290c928d016aac68b751db3

                                                                                                        SHA512

                                                                                                        890e5d54b675518b4be052c463fe12a5f16abb173054c92eed5fcc08a60dad75173e13a546705a4e894c1e128908f288f2978802317cde50aa7baeb1d0fb71d2

                                                                                                      • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\590aee7bdd69b59b.customDestinations-ms

                                                                                                        Filesize

                                                                                                        6KB

                                                                                                        MD5

                                                                                                        edfb37d7b422ad5a62ba645215c9f672

                                                                                                        SHA1

                                                                                                        61edfd941024288fe934c44337133b414118437b

                                                                                                        SHA256

                                                                                                        e7fd9dcc44dc4b39b294809e61a56e8d44a3e7956eb8b3e1dc74ba17588fce3f

                                                                                                        SHA512

                                                                                                        2af6f56995d2d3a303af3c0989eb8484f7915acb01bc6560fdfa6201767bccd2ff732d7ff3b825cc3cc9f6ceca5345fc83e1829adf9ec1366043d1ce92b0c6b4

                                                                                                      • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\590aee7bdd69b59b.customDestinations-ms

                                                                                                        Filesize

                                                                                                        6KB

                                                                                                        MD5

                                                                                                        f5690e4647fb1f67d7c4d8a712a324d1

                                                                                                        SHA1

                                                                                                        e89cda2c05c29307ae759a4bf9efc54b66ca5b19

                                                                                                        SHA256

                                                                                                        608e838a539ad48634fd36d4964e466f0ad88f90526d02f739bb3c0531b1c9d7

                                                                                                        SHA512

                                                                                                        75f6383adfe7800dcba82cd568165a1974b10824da5347a162dc28bfa5724eefbb7d7948b7507ee86fc80e1ddc322f74a11f0987c5edfb226f3b9a127cc5ee0c

                                                                                                      • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\590aee7bdd69b59b.customDestinations-ms

                                                                                                        Filesize

                                                                                                        6KB

                                                                                                        MD5

                                                                                                        0c0115d5b1c22c626efae92212897fe1

                                                                                                        SHA1

                                                                                                        2de23de5177c6729b174361d12394b7c3b4535db

                                                                                                        SHA256

                                                                                                        ff418910ff84dda5a292c3ea5d01593dc4df7aef18a6c4839f9b0dd42c349a89

                                                                                                        SHA512

                                                                                                        dd80aad3c853b842ec76d4769097005dc7066056d8266ce00b9bd0d9267abcbe610e47b55e186be0c8c5754e40923c53e77de6a1838cd86342dae4b914d1dc5f

                                                                                                      • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\590aee7bdd69b59b.customDestinations-ms

                                                                                                        Filesize

                                                                                                        6KB

                                                                                                        MD5

                                                                                                        7c664ede40454b482b29b4d7b25fb414

                                                                                                        SHA1

                                                                                                        ca805f41e8300d06ef3af7c1240629a574ed8dd7

                                                                                                        SHA256

                                                                                                        d462b10a53b670efc9ccf67663443db870b1febbf984b43d842a38ad0305a2b2

                                                                                                        SHA512

                                                                                                        d7f4660b350baf80e3b1481dcca1d7c365314812c3e33be6d7a95a18952982b55c2201013b30ceacb43b9223d9d5058df1d5e818d45c83970193546ee7391971

                                                                                                      • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\590aee7bdd69b59b.customDestinations-ms

                                                                                                        Filesize

                                                                                                        6KB

                                                                                                        MD5

                                                                                                        4fc1bce536569e184b7a66c2f2dd7e56

                                                                                                        SHA1

                                                                                                        e662ad46ce7fe6eebf73e87e96b91ba7f5647ae6

                                                                                                        SHA256

                                                                                                        d7381a4c95a117bbf0b1daffa8b09ea6723b5a1766ac01538a1741b46a65d1cc

                                                                                                        SHA512

                                                                                                        5d3f2faab2d6bfcba3572e435b6174d880a2819c9ab1be81beb058726c7cad2f51f84342551be0a7d61896c353cbbe563efa2d7d57880f10ef2c4b5179d65f2c

                                                                                                      • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\590aee7bdd69b59b.customDestinations-ms

                                                                                                        Filesize

                                                                                                        6KB

                                                                                                        MD5

                                                                                                        1cca9a787b6221d2e82658faeaf4427c

                                                                                                        SHA1

                                                                                                        db2a616a96bd3f0c0b652a65ab3308ec6750ae01

                                                                                                        SHA256

                                                                                                        4dd914beb9569205c00053c43f6935a5ccfc093f617eebefc0ca6d6f6ca40df4

                                                                                                        SHA512

                                                                                                        b8d5d505527b742b08224b40eeceb4244fbd2ec0faef4e2ee64522c92438d608680e7eff3a56144afb23fecdb5903f99c9b3b679d2d0e5c9cbb67b4687bfcebf

                                                                                                      • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\590aee7bdd69b59b.customDestinations-ms

                                                                                                        Filesize

                                                                                                        6KB

                                                                                                        MD5

                                                                                                        4d207afe879ce2ffcc09973727f7dcfa

                                                                                                        SHA1

                                                                                                        b1b6be99931a0076935ce9ea9b77af61d0870e3d

                                                                                                        SHA256

                                                                                                        c48f631599fe4ca86ddc89ef58d45416a3d05dbf898007d540a20bbdf4d07f43

                                                                                                        SHA512

                                                                                                        72cf5471fe660e21dae10d1fb695a26d425d6455de2825f70c7bb83d146851cd078048e719416999540ac47db6dfc2c1990754fad5c2c08ea5cd4f9ba5c95bfe

                                                                                                      • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\590aee7bdd69b59b.customDestinations-ms

                                                                                                        Filesize

                                                                                                        6KB

                                                                                                        MD5

                                                                                                        24d913e1fb556e91411d9f14b75dda3b

                                                                                                        SHA1

                                                                                                        3c4bce9965e173bab486d5ea883bd5391e8c1ced

                                                                                                        SHA256

                                                                                                        6590157e8e1552bfb2b5b5bc2bde3cc2a13431cbdbf3927e7bcde454ea051724

                                                                                                        SHA512

                                                                                                        046c5552258099a189c18b508e5f753512cbaf6fc3319279eba5dfc8902bd14d64abef2e328b5378218ed154639cc241003432a8203f00cc399727263e6ad1d6

                                                                                                      • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\590aee7bdd69b59b.customDestinations-ms

                                                                                                        Filesize

                                                                                                        6KB

                                                                                                        MD5

                                                                                                        5aadc73dccae0f36d147a01f1dc8f2b3

                                                                                                        SHA1

                                                                                                        867a6bb0f6d2d55092d3c07f54091ffa2e0ef3af

                                                                                                        SHA256

                                                                                                        646fd09b6e8f89bf3629468a0c7c6a7a0838b7812508e140c826fce7117b445d

                                                                                                        SHA512

                                                                                                        b1e15be17cf94a876a40f341c78378e0e0bae9a63148f5be17a5e41ae096b7b1c6c2700ac5422609eac715499900adfe3487c6ef707c17f752ab6fb9f8f953ec

                                                                                                      • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\590aee7bdd69b59b.customDestinations-ms

                                                                                                        Filesize

                                                                                                        6KB

                                                                                                        MD5

                                                                                                        70249844622f127ebe60516403ae3584

                                                                                                        SHA1

                                                                                                        d50d638cef653f79910bac64029b3b4fa3fa99bf

                                                                                                        SHA256

                                                                                                        04173259d6a44b1453d4c252880ee11a96fcd6b6aa439860adc72e834fa87e52

                                                                                                        SHA512

                                                                                                        425f1b9c04ff22719de777110caf4ffb7363625eb4d1e80b24db0621924d453cd91b1b80dda025ba4672e4d2c29a4d90255f8539da452921f0615cc1203bcd60

                                                                                                      • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\590aee7bdd69b59b.customDestinations-ms

                                                                                                        Filesize

                                                                                                        6KB

                                                                                                        MD5

                                                                                                        4a260750393e3a5ccfc9d82d4245a8fa

                                                                                                        SHA1

                                                                                                        deda90099448513d501eefa94c70b981a25be1c9

                                                                                                        SHA256

                                                                                                        d2d8f6e72dae362e5e563e7c81d5f002ba1f4f35e54b9678c74de8d790b5890c

                                                                                                        SHA512

                                                                                                        b5522690a1cbe1640582f54275acac162ba413a6d2bb6afb6f608f3c1aec3b713e25c1d76d6fe5fd96e4f8c7c61c1447f1393663657a60af33789eccb901f15b

                                                                                                      • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\590aee7bdd69b59b.customDestinations-ms

                                                                                                        Filesize

                                                                                                        6KB

                                                                                                        MD5

                                                                                                        a63f365c000a7269a3b340155d1a935b

                                                                                                        SHA1

                                                                                                        925c6a9034c38b213bfc46257eb3426eee98d645

                                                                                                        SHA256

                                                                                                        7b1d88377b1f94412187995e9109294302014306a1fc02734c6371079d0fccee

                                                                                                        SHA512

                                                                                                        7e499c8c037ec0076c6127641aeb5cf32bdd70f20aa3f1badabefc6c49c5b32b2c5f3d8e4783774bcef12991045da6e5a752938670ac217b7be53470e34688d5

                                                                                                      • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Templates\SysTemp64\$77Runtime Broker.exe

                                                                                                        Filesize

                                                                                                        43KB

                                                                                                        MD5

                                                                                                        44a5ff2feda2634ae7d9fadc97ebd0a0

                                                                                                        SHA1

                                                                                                        9a763aefd806585e11a36203e575ae142f38bc6c

                                                                                                        SHA256

                                                                                                        5dde6801897a7d76c16e64c0b36a3280fbf5371642a690b85ddd31538c4458d8

                                                                                                        SHA512

                                                                                                        cebc24998c33d7fe8bcdba5183d60c36b3ccaac247d0ee206a73485236453c109dc269522df01d85f58efd3d7a28358221f2139f11356f95f9b8283475f576ca

                                                                                                      • memory/284-122-0x000001DA7FFC0000-0x000001DA80036000-memory.dmp

                                                                                                        Filesize

                                                                                                        472KB

                                                                                                      • memory/284-104-0x000001DA7FEF0000-0x000001DA7FF34000-memory.dmp

                                                                                                        Filesize

                                                                                                        272KB

                                                                                                      • memory/1164-4-0x00007FF811810000-0x00007FF8122D1000-memory.dmp

                                                                                                        Filesize

                                                                                                        10.8MB

                                                                                                      • memory/1164-10-0x00007FF811810000-0x00007FF8122D1000-memory.dmp

                                                                                                        Filesize

                                                                                                        10.8MB

                                                                                                      • memory/1164-3-0x00007FF811813000-0x00007FF811815000-memory.dmp

                                                                                                        Filesize

                                                                                                        8KB

                                                                                                      • memory/1164-0-0x00007FF811813000-0x00007FF811815000-memory.dmp

                                                                                                        Filesize

                                                                                                        8KB

                                                                                                      • memory/1164-2-0x00007FF811810000-0x00007FF8122D1000-memory.dmp

                                                                                                        Filesize

                                                                                                        10.8MB

                                                                                                      • memory/1164-1-0x0000000000480000-0x0000000000490000-memory.dmp

                                                                                                        Filesize

                                                                                                        64KB

                                                                                                      • memory/1820-18-0x000001C2AD2A0000-0x000001C2AD2C2000-memory.dmp

                                                                                                        Filesize

                                                                                                        136KB

                                                                                                      • memory/3548-28-0x000000001DC60000-0x000000001DC80000-memory.dmp

                                                                                                        Filesize

                                                                                                        128KB