Analysis

  • max time kernel
    57s
  • max time network
    156s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20250314-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20250314-enlocale:en-usos:windows10-2004-x64system
  • submitted
    22/03/2025, 06:16

General

  • Target

    cf79ab31cc7f483d3b8572ef14b47804.exe

  • Size

    4.3MB

  • MD5

    cf79ab31cc7f483d3b8572ef14b47804

  • SHA1

    aea4389610858f29651d64e803966aa2c73fd066

  • SHA256

    1ee95a58aee1db0ccfc2b2e9b101709f900424fc09dfb7546a05e10af585e94e

  • SHA512

    298bb3423ebc4c36f9e995c6c19062e7f690c2a25cf5ff863c1763168408cd9e79f3c8ca903be807d923e2c0f3be3adafb5ea448e96ab0799be658bb6d71d4b1

  • SSDEEP

    98304:QPisBEKH5f3TsmgXBoRapwAY5hB+MgTFDraS:QPisBEKH53TsmlRapwAY/B+xBZ

Malware Config

Extracted

Family

xworm

Attributes
  • Install_directory

    %ProgramData%

  • install_file

    USB.exe

  • pastebin_url

    https://pastebin.com/raw/kwXPsDF3

Signatures

  • Detect Xworm Payload 4 IoCs
  • Suspicious use of NtCreateProcessExOtherParentProcess 1 IoCs
  • Suspicious use of NtCreateUserProcessOtherParentProcess 1 IoCs
  • Xworm

    Xworm is a remote access trojan written in C#.

  • Xworm family
  • Command and Scripting Interpreter: PowerShell 1 TTPs 5 IoCs

    Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.

  • Sets service image path in registry 2 TTPs 1 IoCs
  • Checks BIOS information in registry 2 TTPs 2 IoCs

    BIOS information is often read in order to detect sandboxing environments.

  • Checks computer location settings 2 TTPs 3 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Executes dropped EXE 5 IoCs
  • Indicator Removal: Clear Windows Event Logs 1 TTPs 1 IoCs

    Clear Windows Event Logs to hide the activity of an intrusion.

  • Adds Run key to start application 2 TTPs 1 IoCs
  • Enumerates connected drives 3 TTPs 23 IoCs

    Attempts to read the root path of hard drives other than the default C: drive.

  • Legitimate hosting services abused for malware hosting/C2 1 TTPs 38 IoCs
  • Looks up external IP address via web service 1 IoCs

    Uses a legitimate IP lookup service to find the infected system's external IP.

  • Writes to the Master Boot Record (MBR) 1 TTPs 1 IoCs

    Bootkits write to the MBR to gain persistence at a level below the operating system.

  • Drops file in System32 directory 9 IoCs
  • Drops file in Windows directory 6 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Checks SCSI registry key(s) 3 TTPs 24 IoCs

    SCSI information is often read in order to detect sandboxing environments.

  • Checks processor information in registry 2 TTPs 15 IoCs

    Processor information is often read in order to detect sandboxing environments.

  • Enumerates system info in registry 2 TTPs 7 IoCs
  • Modifies data under HKEY_USERS 64 IoCs
  • Modifies registry class 64 IoCs
  • Scheduled Task/Job: Scheduled Task 1 TTPs 5 IoCs

    Schtasks is often used by malware for persistence or to perform post-infection execution.

  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious use of AdjustPrivilegeToken 64 IoCs
  • Suspicious use of FindShellTrayWindow 16 IoCs
  • Suspicious use of SendNotifyMessage 2 IoCs
  • Suspicious use of SetWindowsHookEx 4 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs
  • Uses Task Scheduler COM API 1 TTPs

    The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.

  • Uses Volume Shadow Copy service COM API

    The Volume Shadow Copy service is used to manage backups/snapshots.

Processes

  • C:\Windows\system32\winlogon.exe
    winlogon.exe
    1⤵
      PID:604
      • C:\Windows\system32\dwm.exe
        "dwm.exe"
        2⤵
          PID:312
          • C:\Windows\system32\WerFault.exe
            C:\Windows\system32\WerFault.exe -u -p 312 -s 3620
            3⤵
            • Checks processor information in registry
            • Enumerates system info in registry
            • Suspicious behavior: EnumeratesProcesses
            PID:1912
        • C:\Windows\system32\dwm.exe
          "dwm.exe"
          2⤵
          • Checks SCSI registry key(s)
          • Enumerates system info in registry
          • Modifies data under HKEY_USERS
          • Suspicious use of AdjustPrivilegeToken
          PID:4188
      • C:\Windows\system32\lsass.exe
        C:\Windows\system32\lsass.exe
        1⤵
          PID:664
        • C:\Windows\system32\svchost.exe
          C:\Windows\system32\svchost.exe -k DcomLaunch -p -s LSM
          1⤵
            PID:956
          • C:\Windows\system32\svchost.exe
            C:\Windows\system32\svchost.exe -k netsvcs -p -s gpsvc
            1⤵
              PID:376
            • C:\Windows\System32\svchost.exe
              C:\Windows\System32\svchost.exe -k LocalServiceNetworkRestricted -p -s lmhosts
              1⤵
                PID:384
              • C:\Windows\System32\svchost.exe
                C:\Windows\System32\svchost.exe -k LocalSystemNetworkRestricted -p -s NcbService
                1⤵
                  PID:920
                • C:\Windows\system32\svchost.exe
                  C:\Windows\system32\svchost.exe -k LocalServiceNetworkRestricted -p -s TimeBrokerSvc
                  1⤵
                    PID:996
                  • C:\Windows\system32\svchost.exe
                    C:\Windows\system32\svchost.exe -k netsvcs -p -s Schedule
                    1⤵
                    • Drops file in System32 directory
                    PID:1128
                    • C:\Windows\system32\taskhostw.exe
                      taskhostw.exe {222A245B-E637-4AE9-A93F-A59CA119A75E}
                      2⤵
                        PID:2984
                      • C:\ProgramData\taskhostw.exe
                        C:\ProgramData\taskhostw.exe
                        2⤵
                        • Checks computer location settings
                        • Executes dropped EXE
                        PID:3040
                        • C:\Users\Admin\AppData\Local\Temp\eetmzf40.pi0.exe
                          "C:\Users\Admin\AppData\Local\Temp\eetmzf40.pi0.exe"
                          3⤵
                          • Executes dropped EXE
                          PID:452
                        • C:\Windows\system32\SCHTASKS.exe
                          "SCHTASKS.exe" /create /tn "Masontaskhostw.exe" /tr "'C:\ProgramData\taskhostw.exe'" /sc onlogon /rl HIGHEST
                          3⤵
                          • Scheduled Task/Job: Scheduled Task
                          PID:3156
                          • C:\Windows\System32\Conhost.exe
                            \??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                            4⤵
                              PID:932
                          • C:\Windows\system32\SCHTASKS.exe
                            "SCHTASKS.exe" /create /tn "Masontaskhostw.exe" /tr "'C:\ProgramData\taskhostw.exe'" /sc onlogon /rl HIGHEST
                            3⤵
                            • Scheduled Task/Job: Scheduled Task
                            PID:3016
                            • C:\Windows\System32\Conhost.exe
                              \??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                              4⤵
                                PID:4156
                            • C:\ProgramData\WizClient.exe
                              "C:\ProgramData\WizClient.exe"
                              3⤵
                              • Checks computer location settings
                              • Executes dropped EXE
                              • Adds Run key to start application
                              PID:4312
                              • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionPath 'C:\ProgramData\WizClient.exe'
                                4⤵
                                • Command and Scripting Interpreter: PowerShell
                                PID:1284
                                • C:\Windows\System32\Conhost.exe
                                  \??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                  5⤵
                                  • Suspicious use of SetWindowsHookEx
                                  PID:2228
                              • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionProcess 'WizClient.exe'
                                4⤵
                                • Command and Scripting Interpreter: PowerShell
                                PID:816
                                • C:\Windows\System32\Conhost.exe
                                  \??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                  5⤵
                                    PID:4232
                                • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                  "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionPath 'C:\ProgramData\WizClient.exe'
                                  4⤵
                                  • Command and Scripting Interpreter: PowerShell
                                  PID:3032
                                  • C:\Windows\System32\Conhost.exe
                                    \??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                    5⤵
                                    • Suspicious use of SetWindowsHookEx
                                    PID:32
                                • C:\Windows\System32\schtasks.exe
                                  "C:\Windows\System32\schtasks.exe" /create /f /RL HIGHEST /sc minute /mo 1 /tn "WizClient" /tr "C:\ProgramData\WizClient.exe"
                                  4⤵
                                  • Scheduled Task/Job: Scheduled Task
                                  PID:4932
                                  • C:\Windows\System32\Conhost.exe
                                    \??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                    5⤵
                                    • Suspicious use of SetWindowsHookEx
                                    PID:2148
                              • C:\ProgramData\XBinder v2.exe
                                "C:\ProgramData\XBinder v2.exe"
                                3⤵
                                • Executes dropped EXE
                                PID:2864
                            • C:\ProgramData\WizClient.exe
                              C:\ProgramData\WizClient.exe
                              2⤵
                                PID:1160
                              • C:\ProgramData\WizClient.exe
                                C:\ProgramData\WizClient.exe
                                2⤵
                                  PID:1780
                              • C:\Windows\System32\svchost.exe
                                C:\Windows\System32\svchost.exe -k LocalServiceNetworkRestricted -p -s EventLog
                                1⤵
                                • Indicator Removal: Clear Windows Event Logs
                                PID:1188
                              • C:\Windows\system32\svchost.exe
                                C:\Windows\system32\svchost.exe -k netsvcs -p -s ProfSvc
                                1⤵
                                  PID:1208
                                • C:\Windows\system32\svchost.exe
                                  C:\Windows\system32\svchost.exe -k LocalService -p -s nsi
                                  1⤵
                                    PID:1268
                                  • C:\Windows\system32\svchost.exe
                                    C:\Windows\system32\svchost.exe -k LocalService -p -s DispBrokerDesktopSvc
                                    1⤵
                                      PID:1340
                                    • C:\Windows\system32\svchost.exe
                                      C:\Windows\system32\svchost.exe -k LocalService -p -s EventSystem
                                      1⤵
                                        PID:1396
                                      • C:\Windows\System32\svchost.exe
                                        C:\Windows\System32\svchost.exe -k netsvcs -p -s Themes
                                        1⤵
                                          PID:1404
                                        • C:\Windows\system32\svchost.exe
                                          C:\Windows\system32\svchost.exe -k netsvcs -p -s UserManager
                                          1⤵
                                            PID:1432
                                            • C:\Windows\system32\sihost.exe
                                              sihost.exe
                                              2⤵
                                                PID:2656
                                            • C:\Windows\system32\svchost.exe
                                              C:\Windows\system32\svchost.exe -k LocalServiceNetworkRestricted -p -s Dhcp
                                              1⤵
                                                PID:1452
                                              • C:\Windows\system32\svchost.exe
                                                C:\Windows\system32\svchost.exe -k netsvcs -p -s SENS
                                                1⤵
                                                  PID:1596
                                                • C:\Windows\System32\svchost.exe
                                                  C:\Windows\System32\svchost.exe -k NetworkService -p -s NlaSvc
                                                  1⤵
                                                    PID:1632
                                                  • C:\Windows\System32\svchost.exe
                                                    C:\Windows\System32\svchost.exe -k LocalSystemNetworkRestricted -p -s AudioEndpointBuilder
                                                    1⤵
                                                      PID:1700
                                                    • C:\Windows\System32\svchost.exe
                                                      C:\Windows\System32\svchost.exe -k LocalService -p -s netprofm
                                                      1⤵
                                                        PID:1740
                                                      • C:\Windows\System32\svchost.exe
                                                        C:\Windows\System32\svchost.exe -k LocalServiceNetworkRestricted -p
                                                        1⤵
                                                          PID:1864
                                                        • C:\Windows\system32\svchost.exe
                                                          C:\Windows\system32\svchost.exe -k appmodel -p -s StateRepository
                                                          1⤵
                                                            PID:1980
                                                          • C:\Windows\System32\svchost.exe
                                                            C:\Windows\System32\svchost.exe -k LocalServiceNetworkRestricted -p
                                                            1⤵
                                                              PID:2036
                                                            • C:\Windows\system32\svchost.exe
                                                              C:\Windows\system32\svchost.exe -k NetworkService -p -s Dnscache
                                                              1⤵
                                                                PID:1064
                                                              • C:\Windows\system32\svchost.exe
                                                                C:\Windows\system32\svchost.exe -k netsvcs -p -s Winmgmt
                                                                1⤵
                                                                • Suspicious use of AdjustPrivilegeToken
                                                                PID:1228
                                                              • C:\Windows\System32\svchost.exe
                                                                C:\Windows\System32\svchost.exe -k netsvcs -p -s ShellHWDetection
                                                                1⤵
                                                                  PID:1896
                                                                • C:\Windows\System32\spoolsv.exe
                                                                  C:\Windows\System32\spoolsv.exe
                                                                  1⤵
                                                                    PID:2132
                                                                  • C:\Windows\System32\svchost.exe
                                                                    C:\Windows\System32\svchost.exe -k NetworkService -p -s LanmanWorkstation
                                                                    1⤵
                                                                      PID:2208
                                                                    • C:\Windows\System32\svchost.exe
                                                                      C:\Windows\System32\svchost.exe -k LocalServiceNetworkRestricted -s RmSvc
                                                                      1⤵
                                                                        PID:2316
                                                                      • C:\Windows\system32\svchost.exe
                                                                        C:\Windows\system32\svchost.exe -k netsvcs -p -s IKEEXT
                                                                        1⤵
                                                                          PID:2520
                                                                        • C:\Windows\system32\svchost.exe
                                                                          C:\Windows\system32\svchost.exe -k NetworkServiceNetworkRestricted -p -s PolicyAgent
                                                                          1⤵
                                                                            PID:2528
                                                                          • C:\Windows\system32\svchost.exe
                                                                            C:\Windows\system32\svchost.exe -k NetworkService -p -s CryptSvc
                                                                            1⤵
                                                                            • Drops file in System32 directory
                                                                            PID:2692
                                                                          • C:\Windows\system32\svchost.exe
                                                                            C:\Windows\system32\svchost.exe -k netsvcs -p -s LanmanServer
                                                                            1⤵
                                                                            • Enumerates connected drives
                                                                            PID:2732
                                                                          • C:\Windows\system32\svchost.exe
                                                                            C:\Windows\system32\svchost.exe -k UnistackSvcGroup -s CDPUserSvc
                                                                            1⤵
                                                                              PID:2792
                                                                            • C:\Windows\sysmon.exe
                                                                              C:\Windows\sysmon.exe
                                                                              1⤵
                                                                                PID:2800
                                                                              • C:\Windows\System32\svchost.exe
                                                                                C:\Windows\System32\svchost.exe -k LocalSystemNetworkRestricted -p -s TrkWks
                                                                                1⤵
                                                                                  PID:2820
                                                                                • C:\Windows\system32\svchost.exe
                                                                                  C:\Windows\system32\svchost.exe -k netsvcs -p -s WpnService
                                                                                  1⤵
                                                                                    PID:2836
                                                                                  • C:\Windows\system32\svchost.exe
                                                                                    C:\Windows\system32\svchost.exe -k netsvcs -p -s TokenBroker
                                                                                    1⤵
                                                                                      PID:2236
                                                                                    • C:\Windows\system32\wbem\unsecapp.exe
                                                                                      C:\Windows\system32\wbem\unsecapp.exe -Embedding
                                                                                      1⤵
                                                                                        PID:748
                                                                                      • C:\Windows\system32\svchost.exe
                                                                                        C:\Windows\system32\svchost.exe -k LocalService -p -s CDPSvc
                                                                                        1⤵
                                                                                          PID:3412
                                                                                        • C:\Windows\Explorer.EXE
                                                                                          C:\Windows\Explorer.EXE
                                                                                          1⤵
                                                                                          • Suspicious use of AdjustPrivilegeToken
                                                                                          • Suspicious use of FindShellTrayWindow
                                                                                          • Suspicious use of SendNotifyMessage
                                                                                          PID:3424
                                                                                          • C:\Users\Admin\AppData\Local\Temp\cf79ab31cc7f483d3b8572ef14b47804.exe
                                                                                            "C:\Users\Admin\AppData\Local\Temp\cf79ab31cc7f483d3b8572ef14b47804.exe"
                                                                                            2⤵
                                                                                            • Checks computer location settings
                                                                                            • Suspicious use of AdjustPrivilegeToken
                                                                                            • Suspicious use of WriteProcessMemory
                                                                                            PID:4040
                                                                                            • C:\Users\Admin\AppData\Local\Temp\p0pymc1u.lek.exe
                                                                                              "C:\Users\Admin\AppData\Local\Temp\p0pymc1u.lek.exe"
                                                                                              3⤵
                                                                                              • Executes dropped EXE
                                                                                              • Suspicious behavior: EnumeratesProcesses
                                                                                              • Suspicious use of AdjustPrivilegeToken
                                                                                              • Suspicious use of WriteProcessMemory
                                                                                              PID:1480
                                                                                            • C:\Windows\SYSTEM32\SCHTASKS.exe
                                                                                              "SCHTASKS.exe" /create /tn "Masoncf79ab31cc7f483d3b8572ef14b47804.exe" /tr "'C:\Users\Admin\AppData\Local\Temp\cf79ab31cc7f483d3b8572ef14b47804.exe'" /sc onlogon /rl HIGHEST
                                                                                              3⤵
                                                                                              • Scheduled Task/Job: Scheduled Task
                                                                                              PID:616
                                                                                            • C:\Windows\SYSTEM32\SCHTASKS.exe
                                                                                              "SCHTASKS.exe" /create /tn "Masoncf79ab31cc7f483d3b8572ef14b47804.exe" /tr "'C:\Users\Admin\AppData\Local\Temp\cf79ab31cc7f483d3b8572ef14b47804.exe'" /sc onlogon /rl HIGHEST
                                                                                              3⤵
                                                                                              • Scheduled Task/Job: Scheduled Task
                                                                                              PID:1748
                                                                                              • C:\Windows\System32\Conhost.exe
                                                                                                \??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                                                                                4⤵
                                                                                                  PID:3316
                                                                                              • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                                                                "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionPath 'C:\ProgramData\taskhostw.exe'
                                                                                                3⤵
                                                                                                • Command and Scripting Interpreter: PowerShell
                                                                                                PID:2864
                                                                                                • C:\Windows\System32\Conhost.exe
                                                                                                  \??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                                                                                  4⤵
                                                                                                    PID:2228
                                                                                                • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                                                                  "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionProcess 'taskhostw.exe'
                                                                                                  3⤵
                                                                                                  • Command and Scripting Interpreter: PowerShell
                                                                                                  PID:4476
                                                                                                  • C:\Windows\System32\Conhost.exe
                                                                                                    \??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                                                                                    4⤵
                                                                                                    • Suspicious use of SetWindowsHookEx
                                                                                                    PID:2552
                                                                                            • C:\Windows\system32\svchost.exe
                                                                                              C:\Windows\system32\svchost.exe -k ClipboardSvcGroup -p -s cbdhsvc
                                                                                              1⤵
                                                                                                PID:3632
                                                                                              • C:\Windows\system32\DllHost.exe
                                                                                                C:\Windows\system32\DllHost.exe /Processid:{3EB3C877-1F16-487C-9050-104DBCD66683}
                                                                                                1⤵
                                                                                                  PID:3800
                                                                                                • C:\Windows\System32\RuntimeBroker.exe
                                                                                                  C:\Windows\System32\RuntimeBroker.exe -Embedding
                                                                                                  1⤵
                                                                                                    PID:3960
                                                                                                  • C:\Windows\System32\RuntimeBroker.exe
                                                                                                    C:\Windows\System32\RuntimeBroker.exe -Embedding
                                                                                                    1⤵
                                                                                                      PID:4180
                                                                                                    • C:\Windows\System32\svchost.exe
                                                                                                      C:\Windows\System32\svchost.exe -k netsvcs -p
                                                                                                      1⤵
                                                                                                        PID:4888
                                                                                                      • C:\Windows\System32\svchost.exe
                                                                                                        C:\Windows\System32\svchost.exe -k LocalService -p -s LicenseManager
                                                                                                        1⤵
                                                                                                          PID:4048
                                                                                                        • C:\Windows\System32\svchost.exe
                                                                                                          C:\Windows\System32\svchost.exe -k LocalSystemNetworkRestricted -p -s StorSvc
                                                                                                          1⤵
                                                                                                            PID:3240
                                                                                                          • C:\Windows\system32\svchost.exe
                                                                                                            C:\Windows\system32\svchost.exe -k LocalServiceAndNoImpersonation -p -s SSDPSRV
                                                                                                            1⤵
                                                                                                              PID:1196
                                                                                                            • C:\Windows\system32\svchost.exe
                                                                                                              C:\Windows\system32\svchost.exe -k LocalServiceNetworkRestricted -p -s WinHttpAutoProxySvc
                                                                                                              1⤵
                                                                                                              • Modifies data under HKEY_USERS
                                                                                                              PID:3356
                                                                                                            • C:\Program Files\Common Files\Microsoft Shared\ClickToRun\OfficeClickToRun.exe
                                                                                                              "C:\Program Files\Common Files\Microsoft Shared\ClickToRun\OfficeClickToRun.exe" /service
                                                                                                              1⤵
                                                                                                              • Drops file in System32 directory
                                                                                                              • Modifies data under HKEY_USERS
                                                                                                              PID:3236
                                                                                                            • C:\Windows\system32\SppExtComObj.exe
                                                                                                              C:\Windows\system32\SppExtComObj.exe -Embedding
                                                                                                              1⤵
                                                                                                                PID:3952
                                                                                                              • C:\Windows\system32\svchost.exe
                                                                                                                C:\Windows\system32\svchost.exe -k netsvcs -p -s wlidsvc
                                                                                                                1⤵
                                                                                                                • Modifies data under HKEY_USERS
                                                                                                                PID:3408
                                                                                                              • C:\Windows\system32\DllHost.exe
                                                                                                                C:\Windows\system32\DllHost.exe /Processid:{3EB3C877-1F16-487C-9050-104DBCD66683}
                                                                                                                1⤵
                                                                                                                  PID:1544
                                                                                                                • C:\Windows\system32\svchost.exe
                                                                                                                  C:\Windows\system32\svchost.exe -k LocalServiceNetworkRestricted -p -s NgcCtnrSvc
                                                                                                                  1⤵
                                                                                                                    PID:2556
                                                                                                                  • C:\Windows\system32\svchost.exe
                                                                                                                    C:\Windows\system32\svchost.exe -k appmodel -p -s camsvc
                                                                                                                    1⤵
                                                                                                                      PID:1008
                                                                                                                    • C:\Windows\system32\svchost.exe
                                                                                                                      C:\Windows\system32\svchost.exe -k netsvcs -p -s Appinfo
                                                                                                                      1⤵
                                                                                                                        PID:3600
                                                                                                                      • C:\Windows\system32\backgroundTaskHost.exe
                                                                                                                        "C:\Windows\system32\backgroundTaskHost.exe" -ServerName:App.AppXmtcan0h2tfbfy7k9kn8hbxb6dmzz1zh0.mca
                                                                                                                        1⤵
                                                                                                                          PID:2152
                                                                                                                        • C:\Windows\System32\RuntimeBroker.exe
                                                                                                                          C:\Windows\System32\RuntimeBroker.exe -Embedding
                                                                                                                          1⤵
                                                                                                                            PID:2056
                                                                                                                          • C:\Windows\System32\RuntimeBroker.exe
                                                                                                                            C:\Windows\System32\RuntimeBroker.exe -Embedding
                                                                                                                            1⤵
                                                                                                                            • Modifies registry class
                                                                                                                            PID:4592
                                                                                                                          • C:\Windows\System32\svchost.exe
                                                                                                                            C:\Windows\System32\svchost.exe -k WerSvcGroup
                                                                                                                            1⤵
                                                                                                                            • Suspicious use of NtCreateUserProcessOtherParentProcess
                                                                                                                            • Suspicious behavior: EnumeratesProcesses
                                                                                                                            PID:2844
                                                                                                                            • C:\Windows\system32\WerFault.exe
                                                                                                                              C:\Windows\system32\WerFault.exe -pss -s 488 -p 312 -ip 312
                                                                                                                              2⤵
                                                                                                                              • Suspicious use of NtCreateProcessExOtherParentProcess
                                                                                                                              PID:3948
                                                                                                                          • C:\Windows\system32\backgroundTaskHost.exe
                                                                                                                            "C:\Windows\system32\backgroundTaskHost.exe" -ServerName:ShellFeedsUI.AppXnj65k2d1a1rnztt2t2nng5ctmk3e76pn.mca
                                                                                                                            1⤵
                                                                                                                              PID:1880
                                                                                                                            • C:\Windows\System32\WaaSMedicAgent.exe
                                                                                                                              C:\Windows\System32\WaaSMedicAgent.exe d739083ad850ff0e568cd469ba738557 aBbQdDcQIUG2Xaeo8ooVMg.0.1.0.0.0
                                                                                                                              1⤵
                                                                                                                              • Sets service image path in registry
                                                                                                                              • Modifies data under HKEY_USERS
                                                                                                                              PID:4468
                                                                                                                              • C:\Windows\System32\Conhost.exe
                                                                                                                                \??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                                                                                                                2⤵
                                                                                                                                  PID:3032
                                                                                                                              • C:\Windows\system32\svchost.exe
                                                                                                                                C:\Windows\system32\svchost.exe -k netsvcs -p -s wuauserv
                                                                                                                                1⤵
                                                                                                                                • Drops file in Windows directory
                                                                                                                                • Suspicious use of AdjustPrivilegeToken
                                                                                                                                PID:4456
                                                                                                                              • C:\Windows\system32\wbem\wmiprvse.exe
                                                                                                                                C:\Windows\system32\wbem\wmiprvse.exe -secured -Embedding
                                                                                                                                1⤵
                                                                                                                                • Checks BIOS information in registry
                                                                                                                                • Writes to the Master Boot Record (MBR)
                                                                                                                                • Checks SCSI registry key(s)
                                                                                                                                • Checks processor information in registry
                                                                                                                                • Enumerates system info in registry
                                                                                                                                PID:2496
                                                                                                                              • C:\Windows\system32\DllHost.exe
                                                                                                                                C:\Windows\system32\DllHost.exe /Processid:{F32D97DF-E3E5-4CB9-9E3E-0EB5B4E49801}
                                                                                                                                1⤵
                                                                                                                                  PID:1616
                                                                                                                                • C:\Windows\system32\vssvc.exe
                                                                                                                                  C:\Windows\system32\vssvc.exe
                                                                                                                                  1⤵
                                                                                                                                    PID:1872
                                                                                                                                  • C:\Windows\System32\svchost.exe
                                                                                                                                    C:\Windows\System32\svchost.exe -k swprv
                                                                                                                                    1⤵
                                                                                                                                      PID:1100
                                                                                                                                    • C:\Windows\servicing\TrustedInstaller.exe
                                                                                                                                      C:\Windows\servicing\TrustedInstaller.exe
                                                                                                                                      1⤵
                                                                                                                                        PID:3528
                                                                                                                                      • C:\Windows\system32\svchost.exe
                                                                                                                                        C:\Windows\system32\svchost.exe -k netsvcs -p -s UsoSvc
                                                                                                                                        1⤵
                                                                                                                                          PID:3884
                                                                                                                                        • C:\Windows\System32\mousocoreworker.exe
                                                                                                                                          C:\Windows\System32\mousocoreworker.exe -Embedding
                                                                                                                                          1⤵
                                                                                                                                          • Checks processor information in registry
                                                                                                                                          • Enumerates system info in registry
                                                                                                                                          • Modifies data under HKEY_USERS
                                                                                                                                          PID:5060
                                                                                                                                        • C:\Windows\winsxs\amd64_microsoft-windows-servicingstack_31bf3856ad364e35_10.0.19041.1220_none_7e21bc567c7ed16b\TiWorker.exe
                                                                                                                                          C:\Windows\winsxs\amd64_microsoft-windows-servicingstack_31bf3856ad364e35_10.0.19041.1220_none_7e21bc567c7ed16b\TiWorker.exe -Embedding
                                                                                                                                          1⤵
                                                                                                                                            PID:3224
                                                                                                                                          • C:\Windows\system32\backgroundTaskHost.exe
                                                                                                                                            "C:\Windows\system32\backgroundTaskHost.exe" -ServerName:App.AppXmtcan0h2tfbfy7k9kn8hbxb6dmzz1zh0.mca
                                                                                                                                            1⤵
                                                                                                                                              PID:3232
                                                                                                                                            • C:\Windows\system32\BackgroundTransferHost.exe
                                                                                                                                              "BackgroundTransferHost.exe" -ServerName:BackgroundTransferHost.1
                                                                                                                                              1⤵
                                                                                                                                                PID:3544

                                                                                                                                              Network

                                                                                                                                              MITRE ATT&CK Enterprise v15

                                                                                                                                              Replay Monitor

                                                                                                                                              Loading Replay Monitor...

                                                                                                                                              Downloads

                                                                                                                                              • C:\ProgramData\Microsoft\Windows\WER\Temp\WERBF87.tmp.csv

                                                                                                                                                Filesize

                                                                                                                                                38KB

                                                                                                                                                MD5

                                                                                                                                                1003f20ee2ded23c94d99093f378d69c

                                                                                                                                                SHA1

                                                                                                                                                4cd2df56ff825a080813e6388d185b4326693f2b

                                                                                                                                                SHA256

                                                                                                                                                f30cbd01f64f05c9497d0e6101f9a0e6cbe7b4abba20e15145fde9a873b8a879

                                                                                                                                                SHA512

                                                                                                                                                73598b4ec0e347faaa4680dae1ce057719f000f128e198a6806c7c3144da9ea29a027702e5e151b34b103b544257064c17fb5a555c5d5a2ae82b6574f6341359

                                                                                                                                              • C:\ProgramData\Microsoft\Windows\WER\Temp\WERBFA7.tmp.txt

                                                                                                                                                Filesize

                                                                                                                                                13KB

                                                                                                                                                MD5

                                                                                                                                                bbded0f1b06e1d6f536474af068a1a4b

                                                                                                                                                SHA1

                                                                                                                                                3fcebf20d034af97741d88c2a2730b210b648e96

                                                                                                                                                SHA256

                                                                                                                                                9c47a64cc94d5c73d717a73c8682cfeb1812cb018d7c78e46ae418b2a260175d

                                                                                                                                                SHA512

                                                                                                                                                6e25292215728677825d3e6a2dcf0adc970dbf25f28c69446a7770d5b935cc67b8b1d1dd0b745566c5343d30a7641e5b9e62c667ce07154b37ca16238e043486

                                                                                                                                              • C:\ProgramData\WizClient.exe

                                                                                                                                                Filesize

                                                                                                                                                55KB

                                                                                                                                                MD5

                                                                                                                                                ee90f24ed0ce3c6ff15634b21e76e461

                                                                                                                                                SHA1

                                                                                                                                                8cb336bf0a41544dba7752732b777b9bd1d88d93

                                                                                                                                                SHA256

                                                                                                                                                82936465db9f948961dc516588207ee4ab5766f6db0604e29cbd318e8a5edc98

                                                                                                                                                SHA512

                                                                                                                                                c3223c9803943bd00689ec4234d1f0ac6cde1c64b4e4b5957529a44a0abd98cc663c5204ca4c688e2fd536c5d8e63042d7bf65f81b5e4ea85d8e557e8c554320

                                                                                                                                              • C:\ProgramData\XBinder v2.exe

                                                                                                                                                Filesize

                                                                                                                                                3.5MB

                                                                                                                                                MD5

                                                                                                                                                a98358eb7f4953aa6d60015ccd8506ce

                                                                                                                                                SHA1

                                                                                                                                                d9be0c9d6d968c1baef11027a7ace6a0e869e75a

                                                                                                                                                SHA256

                                                                                                                                                21e0cc9ef715cc2147b9ec481b3fb876dbae8a4491367b478513128d7f7b8555

                                                                                                                                                SHA512

                                                                                                                                                62389e840c375a15d317d024d2e07b861b5b66447abb0423f603b73d2ec0853e3f947f78498a40dd835b48ca50562af9364c65c448a60172fa9011b6e564fac4

                                                                                                                                              • C:\ProgramData\taskhostw.exe

                                                                                                                                                Filesize

                                                                                                                                                4.3MB

                                                                                                                                                MD5

                                                                                                                                                cf79ab31cc7f483d3b8572ef14b47804

                                                                                                                                                SHA1

                                                                                                                                                aea4389610858f29651d64e803966aa2c73fd066

                                                                                                                                                SHA256

                                                                                                                                                1ee95a58aee1db0ccfc2b2e9b101709f900424fc09dfb7546a05e10af585e94e

                                                                                                                                                SHA512

                                                                                                                                                298bb3423ebc4c36f9e995c6c19062e7f690c2a25cf5ff863c1763168408cd9e79f3c8ca903be807d923e2c0f3be3adafb5ea448e96ab0799be658bb6d71d4b1

                                                                                                                                              • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\7423F88C7F265F0DEFC08EA88C3BDE45_AA1E8580D4EBC816148CE81268683776

                                                                                                                                                Filesize

                                                                                                                                                404B

                                                                                                                                                MD5

                                                                                                                                                4de7ff2fc31d473c781ad36ffb02a267

                                                                                                                                                SHA1

                                                                                                                                                048143cf98ead22b7fb427ee597a83e149bfafdb

                                                                                                                                                SHA256

                                                                                                                                                2f5bdb1d65e1b43c24e5eb6e4c4414516a75eea94456fc17c64ae0f8e1a96a84

                                                                                                                                                SHA512

                                                                                                                                                7dde3bc855f04e6b92bdab21bbd6fccc66cc549614de52068880f033ee108557bbc760ebe9b1e9bf98dcdc00dac112a1098b50e95cca3e55e69f67d4616cbb85

                                                                                                                                              • C:\Users\Admin\AppData\Local\Microsoft\CLR_v4.0\UsageLogs\WizClient.exe.log

                                                                                                                                                Filesize

                                                                                                                                                654B

                                                                                                                                                MD5

                                                                                                                                                2ff39f6c7249774be85fd60a8f9a245e

                                                                                                                                                SHA1

                                                                                                                                                684ff36b31aedc1e587c8496c02722c6698c1c4e

                                                                                                                                                SHA256

                                                                                                                                                e1b91642d85d98124a6a31f710e137ab7fd90dec30e74a05ab7fcf3b7887dced

                                                                                                                                                SHA512

                                                                                                                                                1d7e8b92ef4afd463d62cfa7e8b9d1799db5bf2a263d3cd7840df2e0a1323d24eb595b5f8eb615c6cb15f9e3a7b4fc99f8dd6a3d34479222e966ec708998aed1

                                                                                                                                              • C:\Users\Admin\AppData\Local\Microsoft\CLR_v4.0\UsageLogs\powershell.exe.log

                                                                                                                                                Filesize

                                                                                                                                                2KB

                                                                                                                                                MD5

                                                                                                                                                a43e653ffb5ab07940f4bdd9cc8fade4

                                                                                                                                                SHA1

                                                                                                                                                af43d04e3427f111b22dc891c5c7ee8a10ac4123

                                                                                                                                                SHA256

                                                                                                                                                c4c53abb13e99475aebfbe9fec7a8fead81c14c80d9dcc2b81375304f3a683fe

                                                                                                                                                SHA512

                                                                                                                                                62a97e95e1f19a8d4302847110dae44f469877eed6aa8ea22345c6eb25ee220e7d310fa0b7ec5df42356815421c0af7c46a0f1fee8933cc446641800eda6cd1b

                                                                                                                                              • C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive

                                                                                                                                                Filesize

                                                                                                                                                944B

                                                                                                                                                MD5

                                                                                                                                                31a798736404a04216e00cb0a7d20bb5

                                                                                                                                                SHA1

                                                                                                                                                c39417cee7b9bcbc1168999414149855e8b4847c

                                                                                                                                                SHA256

                                                                                                                                                506cd9ee9ca4b79fdc63a4458c4984fc3a6ca384f673d2145ece54126901315c

                                                                                                                                                SHA512

                                                                                                                                                57014c6f0e3febeacf7f1df60d118ecc1cb4abf277a0cb49fa736b2d0a15f97303f202200b87536a715358bea8c9346122430f0c09e87ba6a8b4ff7e4a8e7014

                                                                                                                                              • C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive

                                                                                                                                                Filesize

                                                                                                                                                944B

                                                                                                                                                MD5

                                                                                                                                                54522d22658e4f8f87ecb947b71b8feb

                                                                                                                                                SHA1

                                                                                                                                                6a6144bdf9c445099f52211b6122a2ecf72b77e9

                                                                                                                                                SHA256

                                                                                                                                                af18fc4864bc2982879aed928c960b6266f372c928f8c9632c5a4eecd64e448a

                                                                                                                                                SHA512

                                                                                                                                                55f2c5a455be20dcb4cb93a29e5389e0422237bdd7ac40112fec6f16a36e5e19df50d25d39a6d5acb2d41a96514c7ecd8631ce8e67c4ff04997282f49d947aba

                                                                                                                                              • C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive

                                                                                                                                                Filesize

                                                                                                                                                944B

                                                                                                                                                MD5

                                                                                                                                                34f595487e6bfd1d11c7de88ee50356a

                                                                                                                                                SHA1

                                                                                                                                                4caad088c15766cc0fa1f42009260e9a02f953bb

                                                                                                                                                SHA256

                                                                                                                                                0f9a4b52e01cb051052228a55d0515911b7ef5a8db3cf925528c746df511424d

                                                                                                                                                SHA512

                                                                                                                                                10976c5deaf9fac449e703e852c3b08d099f430de2d7c7b8e2525c35d63e28b890e5aab63feff9b20bca0aaf9f35a3ba411aee3fbeee9ea59f90ed25bd617a0b

                                                                                                                                              • C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive

                                                                                                                                                Filesize

                                                                                                                                                944B

                                                                                                                                                MD5

                                                                                                                                                96d012dd35ee43a23db987854cc9f3eb

                                                                                                                                                SHA1

                                                                                                                                                68fb6c90ec116b5464c1a1e7764fd17dc043bf5b

                                                                                                                                                SHA256

                                                                                                                                                7e35c3ce2380410d8c23b9475a5b9f0f9a9f43002638a41219e4e8023afd0ef2

                                                                                                                                                SHA512

                                                                                                                                                c487d1a9eb7b2290cdbfce6d81df3836d22877efc6fa6aa5357c59ae70f3b577ae7094e69bb589d207f7657c2110a65b669880922c56817c055e5addad0daee7

                                                                                                                                              • C:\Users\Admin\AppData\Local\Packages\Microsoft.Windows.Search_cw5n1h2txyewy\AC\Microsoft\CryptnetUrlCache\MetaData\FB0D848F74F70BB2EAA93746D24D9749

                                                                                                                                                Filesize

                                                                                                                                                290B

                                                                                                                                                MD5

                                                                                                                                                a9d54b222c92e744829a59b0a3991da8

                                                                                                                                                SHA1

                                                                                                                                                165bc8498839a2c4085c7209b88af6b8f419eef4

                                                                                                                                                SHA256

                                                                                                                                                64b48879d1a103c2337db54463e98091d80b47c99130884a01cd3c0aa985b9f9

                                                                                                                                                SHA512

                                                                                                                                                9ccb3a2c7624f3853f6a1926d4dcd52909ab8c09b053273d9a152e0e90901e805de3b15b58149e89affb8976f622734565773a156f30e64360d5ee00e7d9e3a8

                                                                                                                                              • C:\Users\Admin\AppData\Local\Temp\__PSScriptPolicyTest_q3g00tg3.0kh.ps1

                                                                                                                                                Filesize

                                                                                                                                                60B

                                                                                                                                                MD5

                                                                                                                                                d17fe0a3f47be24a6453e9ef58c94641

                                                                                                                                                SHA1

                                                                                                                                                6ab83620379fc69f80c0242105ddffd7d98d5d9d

                                                                                                                                                SHA256

                                                                                                                                                96ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7

                                                                                                                                                SHA512

                                                                                                                                                5b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82

                                                                                                                                              • C:\Users\Admin\AppData\Local\Temp\p0pymc1u.lek.exe

                                                                                                                                                Filesize

                                                                                                                                                161KB

                                                                                                                                                MD5

                                                                                                                                                94f1ab3a068f83b32639579ec9c5d025

                                                                                                                                                SHA1

                                                                                                                                                38f3d5bc5de46feb8de093d11329766b8e2054ae

                                                                                                                                                SHA256

                                                                                                                                                879cc20b41635709bb304e315aaa5ca4708b480a1bfc2f4935fcf2215188efb0

                                                                                                                                                SHA512

                                                                                                                                                44d5236a804d63302b21ca25ebc148a64605508d03c990a244c44ceb8630849da0510b7b2d0bee72e01ca6681e2d86d7e6aee8847674a26f0028d149b9abee0c

                                                                                                                                              • C:\Windows\System32\Tasks\Microsoft\Windows\UpdateOrchestrator\Schedule Maintenance Work

                                                                                                                                                Filesize

                                                                                                                                                2KB

                                                                                                                                                MD5

                                                                                                                                                f313c5b4f95605026428425586317353

                                                                                                                                                SHA1

                                                                                                                                                06be66fa06e1cffc54459c38d3d258f46669d01a

                                                                                                                                                SHA256

                                                                                                                                                129d0b993cd3858af5b7e87fdf74d8e59e6f2110184b5c905df8f5f6f2c39d8b

                                                                                                                                                SHA512

                                                                                                                                                b87a829c86eff1d10e1590b18a9909f05101a535e5f4cef914a4192956eb35a8bfef614c9f95d53783d77571687f3eb3c4e8ee2f24d23ad24e0976d8266b8890

                                                                                                                                              • C:\Windows\System32\Tasks\Microsoft\Windows\UpdateOrchestrator\Schedule Wake To Work

                                                                                                                                                Filesize

                                                                                                                                                2KB

                                                                                                                                                MD5

                                                                                                                                                ceb7caa4e9c4b8d760dbf7e9e5ca44c5

                                                                                                                                                SHA1

                                                                                                                                                a3879621f9493414d497ea6d70fbf17e283d5c08

                                                                                                                                                SHA256

                                                                                                                                                98c054088df4957e8d6361fd2539c219bcf35f8a524aad8f5d1a95f218e990e9

                                                                                                                                                SHA512

                                                                                                                                                1eddfbf4cb62d3c5b4755a371316304aaeabb00f01bad03fb4f925a98a2f0824f613537d86deddd648a74d694dc13ed5183e761fdc1ec92589f6fa28beb7fbff

                                                                                                                                              • C:\Windows\System32\Tasks\Microsoft\Windows\UpdateOrchestrator\Schedule Wake To Work

                                                                                                                                                Filesize

                                                                                                                                                2KB

                                                                                                                                                MD5

                                                                                                                                                7d612892b20e70250dbd00d0cdd4f09b

                                                                                                                                                SHA1

                                                                                                                                                63251cfa4e5d6cbf6fb14f6d8a7407dbe763d3f5

                                                                                                                                                SHA256

                                                                                                                                                727c9e7b91e144e453d5b32e18f12508ee84dabe71bc852941d9c9b4923f9e02

                                                                                                                                                SHA512

                                                                                                                                                f8d481f3300947d49ce5ab988a9d4e3154746afccc97081cbed1135ffb24fc107203d485dda2d5d714e74e752c614d8cfd16781ea93450fe782ffae3f77066d1

                                                                                                                                              • C:\Windows\System32\Tasks\Microsoft\Windows\UpdateOrchestrator\Schedule Work

                                                                                                                                                Filesize

                                                                                                                                                2KB

                                                                                                                                                MD5

                                                                                                                                                1e8e2076314d54dd72e7ee09ff8a52ab

                                                                                                                                                SHA1

                                                                                                                                                5fd0a67671430f66237f483eef39ff599b892272

                                                                                                                                                SHA256

                                                                                                                                                55f203d6b40a39a6beba9dd3a2cb9034284f49578009835dd4f0f8e1db6ebe2f

                                                                                                                                                SHA512

                                                                                                                                                5b0c97284923c4619d9c00cba20ce1c6d65d1826abe664c390b04283f7a663256b4a6efe51f794cb5ec82ccea80307729addde841469da8d041cbcfd94feb0f6

                                                                                                                                              • C:\Windows\System32\Tasks\Microsoft\Windows\UpdateOrchestrator\Schedule Work

                                                                                                                                                Filesize

                                                                                                                                                2KB

                                                                                                                                                MD5

                                                                                                                                                0b990e24f1e839462c0ac35fef1d119e

                                                                                                                                                SHA1

                                                                                                                                                9e17905f8f68f9ce0a2024d57b537aa8b39c6708

                                                                                                                                                SHA256

                                                                                                                                                a1106ed0845cd438e074344e0fe296dc10ee121a0179e09398eaaea2357c614a

                                                                                                                                                SHA512

                                                                                                                                                c65ba42fc0a2cb0b70888beb8ca334f7d5a8eaf954a5ef7adaecbcb4ce8d61b34858dfd9560954f95f59b4d8110a79ceaa39088b6a0caf8b42ceda41b46ec4a4

                                                                                                                                              • memory/312-21-0x0000026003B00000-0x0000026003B2B000-memory.dmp

                                                                                                                                                Filesize

                                                                                                                                                172KB

                                                                                                                                              • memory/312-313-0x00007FFE7A98C000-0x00007FFE7A98D000-memory.dmp

                                                                                                                                                Filesize

                                                                                                                                                4KB

                                                                                                                                              • memory/312-90-0x0000026003B00000-0x0000026003B2B000-memory.dmp

                                                                                                                                                Filesize

                                                                                                                                                172KB

                                                                                                                                              • memory/312-92-0x00007FFE7A98F000-0x00007FFE7A990000-memory.dmp

                                                                                                                                                Filesize

                                                                                                                                                4KB

                                                                                                                                              • memory/312-91-0x00007FFE7A98D000-0x00007FFE7A98E000-memory.dmp

                                                                                                                                                Filesize

                                                                                                                                                4KB

                                                                                                                                              • memory/604-13-0x00000280EAF90000-0x00000280EAFB5000-memory.dmp

                                                                                                                                                Filesize

                                                                                                                                                148KB

                                                                                                                                              • memory/604-14-0x00000280EB3C0000-0x00000280EB3EB000-memory.dmp

                                                                                                                                                Filesize

                                                                                                                                                172KB

                                                                                                                                              • memory/604-35-0x00000280EB3C0000-0x00000280EB3EB000-memory.dmp

                                                                                                                                                Filesize

                                                                                                                                                172KB

                                                                                                                                              • memory/604-37-0x00007FFE7A98D000-0x00007FFE7A98E000-memory.dmp

                                                                                                                                                Filesize

                                                                                                                                                4KB

                                                                                                                                              • memory/604-15-0x00007FFE3A970000-0x00007FFE3A980000-memory.dmp

                                                                                                                                                Filesize

                                                                                                                                                64KB

                                                                                                                                              • memory/664-89-0x0000024AAC100000-0x0000024AAC12B000-memory.dmp

                                                                                                                                                Filesize

                                                                                                                                                172KB

                                                                                                                                              • memory/664-20-0x0000024AAC100000-0x0000024AAC12B000-memory.dmp

                                                                                                                                                Filesize

                                                                                                                                                172KB

                                                                                                                                              • memory/664-94-0x00007FFE7A98F000-0x00007FFE7A990000-memory.dmp

                                                                                                                                                Filesize

                                                                                                                                                4KB

                                                                                                                                              • memory/664-93-0x00007FFE7A98C000-0x00007FFE7A98D000-memory.dmp

                                                                                                                                                Filesize

                                                                                                                                                4KB

                                                                                                                                              • memory/664-22-0x00007FFE3A970000-0x00007FFE3A980000-memory.dmp

                                                                                                                                                Filesize

                                                                                                                                                64KB

                                                                                                                                              • memory/1160-981-0x0000000000910000-0x0000000000924000-memory.dmp

                                                                                                                                                Filesize

                                                                                                                                                80KB

                                                                                                                                              • memory/1480-12-0x00007FFE789B0000-0x00007FFE78A6E000-memory.dmp

                                                                                                                                                Filesize

                                                                                                                                                760KB

                                                                                                                                              • memory/1480-11-0x00007FFE7A8F0000-0x00007FFE7AAE5000-memory.dmp

                                                                                                                                                Filesize

                                                                                                                                                2.0MB

                                                                                                                                              • memory/1780-1020-0x0000000000060000-0x0000000000074000-memory.dmp

                                                                                                                                                Filesize

                                                                                                                                                80KB

                                                                                                                                              • memory/2864-449-0x000001A4FF9E0000-0x000001A4FFA02000-memory.dmp

                                                                                                                                                Filesize

                                                                                                                                                136KB

                                                                                                                                              • memory/2864-794-0x0000015DE7E20000-0x0000015DE81AE000-memory.dmp

                                                                                                                                                Filesize

                                                                                                                                                3.6MB

                                                                                                                                              • memory/2864-796-0x0000015DEA860000-0x0000015DEA8FC000-memory.dmp

                                                                                                                                                Filesize

                                                                                                                                                624KB

                                                                                                                                              • memory/3040-508-0x0000015C355A0000-0x0000015C359F0000-memory.dmp

                                                                                                                                                Filesize

                                                                                                                                                4.3MB

                                                                                                                                              • memory/3040-760-0x0000015C50710000-0x0000015C50ACA000-memory.dmp

                                                                                                                                                Filesize

                                                                                                                                                3.7MB

                                                                                                                                              • memory/3424-95-0x0000000002700000-0x000000000272B000-memory.dmp

                                                                                                                                                Filesize

                                                                                                                                                172KB

                                                                                                                                              • memory/3424-66-0x0000000002700000-0x000000000272B000-memory.dmp

                                                                                                                                                Filesize

                                                                                                                                                172KB

                                                                                                                                              • memory/3424-67-0x00007FFE3A970000-0x00007FFE3A980000-memory.dmp

                                                                                                                                                Filesize

                                                                                                                                                64KB

                                                                                                                                              • memory/4040-412-0x00007FFE5C3B3000-0x00007FFE5C3B5000-memory.dmp

                                                                                                                                                Filesize

                                                                                                                                                8KB

                                                                                                                                              • memory/4040-498-0x00007FFE7A8F0000-0x00007FFE7AAE5000-memory.dmp

                                                                                                                                                Filesize

                                                                                                                                                2.0MB

                                                                                                                                              • memory/4040-369-0x00000129365E0000-0x00000129369E4000-memory.dmp

                                                                                                                                                Filesize

                                                                                                                                                4.0MB

                                                                                                                                              • memory/4040-0-0x00007FFE5C3B3000-0x00007FFE5C3B5000-memory.dmp

                                                                                                                                                Filesize

                                                                                                                                                8KB

                                                                                                                                              • memory/4040-413-0x00007FFE7A8F0000-0x00007FFE7AAE5000-memory.dmp

                                                                                                                                                Filesize

                                                                                                                                                2.0MB

                                                                                                                                              • memory/4040-2-0x000001291DA10000-0x000001291DA3C000-memory.dmp

                                                                                                                                                Filesize

                                                                                                                                                176KB

                                                                                                                                              • memory/4040-1-0x000001291B970000-0x000001291BDC0000-memory.dmp

                                                                                                                                                Filesize

                                                                                                                                                4.3MB

                                                                                                                                              • memory/4312-777-0x0000000000780000-0x0000000000794000-memory.dmp

                                                                                                                                                Filesize

                                                                                                                                                80KB