Analysis

  • max time kernel
    234s
  • max time network
    243s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240226-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system
  • submitted
    27-04-2024 18:26

General

  • Target

    XWorm v5.1-5.2.7z

  • Size

    54.5MB

  • MD5

    76219b3556e25086fc52f8e2b93fbd0c

  • SHA1

    066a0f875820e51a60c3552a06b7b97f8bab6bbc

  • SHA256

    fe6371034d55bb7583081b03f4aec7274f8340cfea4740325cb52e1c6ac77f6d

  • SHA512

    ccc974b8e446409c7940ef8314b2a912a2f8c0272721148d4dca5b739702106e69c9c7d106137a576b7a7a846d4f9ac770685a07d7a588ba34d0167acb07f104

  • SSDEEP

    786432:8IagoCEXKlCpMqIEJkseGG+5ELbzcFdcyt5/ks3FkAPYxpL+q7RRHEm+0NyvZZGl:8JgXCzIsGrPzcFrt1F3Yxxrr+4yvZE

Malware Config

Signatures

  • AgentTesla

    Agent Tesla is a remote access tool (RAT) written in visual basic.

  • Detect Xworm Payload 1 IoCs
  • Xworm

    Xworm is a remote access trojan written in C#.

  • AgentTesla payload 2 IoCs
  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 1 IoCs
  • Obfuscated with Agile.Net obfuscator 2 IoCs

    Detects use of the Agile.Net commercial obfuscator, which is capable of entity renaming and control flow obfuscation.

  • Uses the VBS compiler for execution 1 TTPs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Enumerates system info in registry 2 TTPs 3 IoCs
  • Modifies registry class 40 IoCs
  • Suspicious behavior: EnumeratesProcesses 28 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 2 IoCs
  • Suspicious use of AdjustPrivilegeToken 6 IoCs
  • Suspicious use of FindShellTrayWindow 6 IoCs
  • Suspicious use of SendNotifyMessage 1 IoCs
  • Suspicious use of SetWindowsHookEx 1 IoCs
  • Suspicious use of WriteProcessMemory 8 IoCs

Processes

  • C:\Windows\system32\cmd.exe
    cmd /c "C:\Users\Admin\AppData\Local\Temp\XWorm v5.1-5.2.7z"
    1⤵
    • Checks computer location settings
    • Modifies registry class
    • Suspicious use of WriteProcessMemory
    PID:1604
    • C:\Program Files\7-Zip\7zFM.exe
      "C:\Program Files\7-Zip\7zFM.exe" "C:\Users\Admin\AppData\Local\Temp\XWorm v5.1-5.2.7z"
      2⤵
      • Suspicious behavior: GetForegroundWindowSpam
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of FindShellTrayWindow
      PID:4864
  • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
    "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=asset_store.mojom.AssetStoreService --lang=en-US --service-sandbox-type=asset_store_service --no-appcompat-clear --mojo-platform-channel-handle=4192 --field-trial-handle=2248,i,10247514684337323751,15511974759131734137,262144 --variations-seed-version /prefetch:8
    1⤵
      PID:3164
    • C:\Windows\System32\rundll32.exe
      C:\Windows\System32\rundll32.exe C:\Windows\System32\shell32.dll,SHCreateLocalServerRunDll {9aa46009-3ce0-458a-a354-715610a075e6} -Embedding
      1⤵
        PID:208
      • C:\Users\Admin\Desktop\XWorm\XWorm V5.2\XWormLoader 5.2 x64.exe
        "C:\Users\Admin\Desktop\XWorm\XWorm V5.2\XWormLoader 5.2 x64.exe"
        1⤵
        • Executes dropped EXE
        • Loads dropped DLL
        • Enumerates system info in registry
        • Modifies registry class
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious behavior: GetForegroundWindowSpam
        • Suspicious use of AdjustPrivilegeToken
        • Suspicious use of FindShellTrayWindow
        • Suspicious use of SendNotifyMessage
        • Suspicious use of SetWindowsHookEx
        • Suspicious use of WriteProcessMemory
        PID:2428
        • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
          "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument https://t.me/XCoderTools
          2⤵
            PID:3568
          • C:\Windows\Microsoft.NET\Framework64\v4.0.30319\vbc.exe
            "C:\Windows\Microsoft.NET\Framework64\v4.0.30319\vbc.exe" /noconfig @"C:\Users\Admin\AppData\Local\Temp\oyfht5tq\oyfht5tq.cmdline"
            2⤵
            • Suspicious use of WriteProcessMemory
            PID:4464
            • C:\Windows\Microsoft.NET\Framework64\v4.0.30319\cvtres.exe
              C:\Windows\Microsoft.NET\Framework64\v4.0.30319\cvtres.exe /NOLOGO /READONLY /MACHINE:IX86 "/OUT:C:\Users\Admin\AppData\Local\Temp\RES66B5.tmp" "C:\Users\Admin\AppData\Local\Temp\vbcDCE5DC792ABB4BB6AF2BC1A53624B39A.TMP"
              3⤵
                PID:1168
          • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
            "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --no-appcompat-clear --lang=en-US --js-flags=--ms-user-locale= --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=18 --mojo-platform-channel-handle=4856 --field-trial-handle=2248,i,10247514684337323751,15511974759131734137,262144 --variations-seed-version /prefetch:1
            1⤵
              PID:3872
            • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
              "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --no-appcompat-clear --lang=en-US --js-flags=--ms-user-locale= --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=19 --mojo-platform-channel-handle=3792 --field-trial-handle=2248,i,10247514684337323751,15511974759131734137,262144 --variations-seed-version /prefetch:1
              1⤵
                PID:2112
              • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=asset_store.mojom.AssetStoreService --lang=en-US --service-sandbox-type=asset_store_service --no-appcompat-clear --mojo-platform-channel-handle=5296 --field-trial-handle=2248,i,10247514684337323751,15511974759131734137,262144 --variations-seed-version /prefetch:8
                1⤵
                  PID:4344
                • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                  "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --no-appcompat-clear --disable-gpu-compositing --lang=en-US --js-flags=--ms-user-locale= --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=21 --mojo-platform-channel-handle=5800 --field-trial-handle=2248,i,10247514684337323751,15511974759131734137,262144 --variations-seed-version /prefetch:1
                  1⤵
                    PID:1628
                  • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                    "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --no-appcompat-clear --mojo-platform-channel-handle=5832 --field-trial-handle=2248,i,10247514684337323751,15511974759131734137,262144 --variations-seed-version /prefetch:8
                    1⤵
                      PID:4956
                    • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                      "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --no-appcompat-clear --disable-gpu-compositing --lang=en-US --js-flags=--ms-user-locale= --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=23 --mojo-platform-channel-handle=4544 --field-trial-handle=2248,i,10247514684337323751,15511974759131734137,262144 --variations-seed-version /prefetch:1
                      1⤵
                        PID:2992
                      • C:\Windows\system32\wbem\WmiApSrv.exe
                        C:\Windows\system32\wbem\WmiApSrv.exe
                        1⤵
                          PID:4652
                        • C:\Windows\system32\AUDIODG.EXE
                          C:\Windows\system32\AUDIODG.EXE 0x324 0x2d0
                          1⤵
                          • Suspicious use of AdjustPrivilegeToken
                          PID:4896
                        • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                          "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=edge_search_indexer.mojom.SearchIndexerInterfaceBroker --lang=en-US --service-sandbox-type=search_indexer --message-loop-type-ui --no-appcompat-clear --mojo-platform-channel-handle=6028 --field-trial-handle=2248,i,10247514684337323751,15511974759131734137,262144 --variations-seed-version /prefetch:8
                          1⤵
                            PID:2300

                          Network

                          MITRE ATT&CK Matrix ATT&CK v13

                          Execution

                          Scripting

                          1
                          T1064

                          Defense Evasion

                          Scripting

                          1
                          T1064

                          Discovery

                          Query Registry

                          2
                          T1012

                          System Information Discovery

                          3
                          T1082

                          Replay Monitor

                          Loading Replay Monitor...

                          Downloads

                          • C:\Users\Admin\AppData\Local\Temp\7zE003CECE9\XWorm\XWorm V5.1\Icons\icon (15).ico
                            Filesize

                            361KB

                            MD5

                            e3143e8c70427a56dac73a808cba0c79

                            SHA1

                            63556c7ad9e778d5bd9092f834b5cc751e419d16

                            SHA256

                            b2f57a23ecc789c1bbf6037ac0825bf98babc7bf0c5d438af5e2767a27a79188

                            SHA512

                            74e0f4b55625df86a87b9315e4007be8e05bbecca4346a6ea06ef5b1528acb5a8bb636ef3e599a3820dbddcf69563a0a22e2c1062c965544fd75ec96fd9803fc

                          • C:\Users\Admin\AppData\Local\Temp\7zE003CECE9\XWorm\XWorm V5.2\XWormLoader 5.2 x32.exe.config
                            Filesize

                            187B

                            MD5

                            15c8c4ba1aa574c0c00fd45bb9cce1ab

                            SHA1

                            0dad65a3d4e9080fa29c42aa485c6102d2fa8bc8

                            SHA256

                            f82338e8e9c746b5d95cd2ccc7bf94dd5de2b9b8982fffddf2118e475de50e15

                            SHA512

                            52baac63399340427b94bfdeb7a42186d5359ce439c3d775497f347089edfbf72a6637b23bb008ab55b8d4dd3b79a7b2eb7c7ef922ea23d0716d5c3536b359d4

                          • C:\Users\Admin\AppData\Local\Temp\RES66B5.tmp
                            Filesize

                            1KB

                            MD5

                            8a96d5ff080a721b053186d13ed706d7

                            SHA1

                            351cdb4b7a633008cad511e88d66330b463ff83a

                            SHA256

                            6e505e15162e2b3b8f6a2ea34c0d3df1c4c4889017c87264f761043be2328086

                            SHA512

                            c0f3bc7027da92d25611ddd9f27eb96aa622c1690bb2b93c8c69df49211e80256b41c0d3d8fbf56efba59aa771588aa11881dc345d80a4daab93acf90820f8fc

                          • C:\Users\Admin\AppData\Local\Temp\TMzpx\TMzpx.dll
                            Filesize

                            112KB

                            MD5

                            2f1a50031dcf5c87d92e8b2491fdcea6

                            SHA1

                            71e2aaa2d1bb7dbe32a00e1d01d744830ecce08f

                            SHA256

                            47578a37901c82f66e4dba47acd5c3cab6d09c9911d16f5ad0413275342147ed

                            SHA512

                            1c66dbe1320c1a84023bdf77686a2a7ab79a3e86ba5a4ea2cda9a37f8a916137d5cfec30b28ceae181355f6f279270465ef63ae90b7e8dcd4c1a8198a7fd36a8

                          • C:\Users\Admin\AppData\Local\Temp\oyfht5tq\oyfht5tq.0.vb
                            Filesize

                            77KB

                            MD5

                            b39d3b9141f3ae8c37ebdf2858cf8d84

                            SHA1

                            74e6175b16a2307b3b2ba7549b481d76c3212ba2

                            SHA256

                            6a235c74a87ccd57325a929a08bfa7d2e64a9cf6d14351e2bbeb3d866caa39c1

                            SHA512

                            664b331804584bb9ada716e51c62c6526ea414f4c2059dbc97acae1ca9633daa25da960e821cd10ec5510be8e6677eee06bd11e03ed5606fef9306bb5507491e

                          • C:\Users\Admin\AppData\Local\Temp\oyfht5tq\oyfht5tq.cmdline
                            Filesize

                            307B

                            MD5

                            a82a79f709a644f9d5dc5d67e2ab81aa

                            SHA1

                            f56577043955d4d39da48e605ce6b5624d0941bd

                            SHA256

                            cc8be69a6b6ce4c2ff15049e0f6eb52e443f7bf48d33e6d78315625d71bc84cf

                            SHA512

                            44fffda0def2c1bee5695138e95c8ad214c56a744398fdcd1e236f6445f015423b33eb18a128011e0a482a19b3d6b7d86ebc80fa862851138a3ebd573aa2695e

                          • C:\Users\Admin\AppData\Local\Temp\vbcDCE5DC792ABB4BB6AF2BC1A53624B39A.TMP
                            Filesize

                            1KB

                            MD5

                            d40c58bd46211e4ffcbfbdfac7c2bb69

                            SHA1

                            c5cf88224acc284a4e81bd612369f0e39f3ac604

                            SHA256

                            01902f1903d080c6632ae2209136e8e713e9fd408db4621ae21246b65bfea2ca

                            SHA512

                            48b14748e86b7d92a3ea18f29caf1d7b4b2e1de75377012378d146575048a2531d2e5aaeae1abf2d322d06146177cdbf0c2940ac023efae007b9f235f18e2c68

                          • C:\Users\Admin\Desktop\XWorm\XWorm V5.2\GeoIP.dat
                            Filesize

                            1.2MB

                            MD5

                            8ef41798df108ce9bd41382c9721b1c9

                            SHA1

                            1e6227635a12039f4d380531b032bf773f0e6de0

                            SHA256

                            bc07ff22d4ee0b6fafcc12482ecf2981c172a672194c647cedf9b4d215ad9740

                            SHA512

                            4c62af04d4a141b94eb3e1b0dbf3669cb53fe9b942072ed7bea6a848d87d8994cff5a5f639ab70f424eb79a4b7adabdde4da6d2f02f995bd8d55db23ce99f01b

                          • C:\Users\Admin\Desktop\XWorm\XWorm V5.2\Guna.UI2.dll
                            Filesize

                            1.9MB

                            MD5

                            bcc0fe2b28edd2da651388f84599059b

                            SHA1

                            44d7756708aafa08730ca9dbdc01091790940a4f

                            SHA256

                            c6264665a882e73eb2262a74fea2c29b1921a9af33180126325fb67a851310ef

                            SHA512

                            3bfc3d27c095dde988f779021d0479c8c1de80a404454813c6cae663e3fe63dc636bffa7de1094e18594c9d608fa7420a0651509544722f2a00288f0b7719cc8

                          • C:\Users\Admin\Desktop\XWorm\XWorm V5.2\Mono.Cecil.dll
                            Filesize

                            350KB

                            MD5

                            de69bb29d6a9dfb615a90df3580d63b1

                            SHA1

                            74446b4dcc146ce61e5216bf7efac186adf7849b

                            SHA256

                            f66f97866433e688acc3e4cd1e6ef14505f81df6b26dd6215e376767f6f954bc

                            SHA512

                            6e96a510966a4acbca900773d4409720b0771fede37f24431bf0d8b9c611eaa152ba05ee588bb17f796d7b8caaccc10534e7cc1c907c28ddfa54ac4ce3952015

                          • C:\Users\Admin\Desktop\XWorm\XWorm V5.2\MonoMod.Backports.dll
                            Filesize

                            138KB

                            MD5

                            dd43356f07fc0ce082db4e2f102747a2

                            SHA1

                            aa0782732e2d60fa668b0aadbf3447ef70b6a619

                            SHA256

                            e375b83a3e242212a2ed9478e1f0b8383c1bf1fdfab5a1cf766df740b631afd6

                            SHA512

                            284d64b99931ed1f2e839a7b19ee8389eefaf6c72bac556468a01f3eb17000252613c01dbae88923e9a02f3c84bcab02296659648fad727123f63d0ac38d258e

                          • C:\Users\Admin\Desktop\XWorm\XWorm V5.2\MonoMod.Core.dll
                            Filesize

                            216KB

                            MD5

                            b808181453b17f3fc1ab153bf11be197

                            SHA1

                            bce86080b7eb76783940d1ff277e2b46f231efe9

                            SHA256

                            da00cdfab411f8f535f17258981ec51d1af9b0bfcee3a360cbd0cb6f692dbcdd

                            SHA512

                            a2d941c6e69972f99707ade5c5325eb50b0ec4c5abf6a189eb11a46606fed8076be44c839d83cf310b67e66471e0ea3f6597857a8e2c7e2a7ad6de60c314f7d3

                          • C:\Users\Admin\Desktop\XWorm\XWorm V5.2\MonoMod.ILHelpers.dll
                            Filesize

                            6KB

                            MD5

                            6512e89e0cb92514ef24be43f0bf4500

                            SHA1

                            a039c51f89656d9d5c584f063b2b675a9ff44b8e

                            SHA256

                            1411e4858412ded195f0e65544a4ec8e8249118b76375050a35c076940826cd0

                            SHA512

                            9ffb2ff050cce82dbfbbb0e85ab5f976fcd81086b3d8695502c5221c23d14080f0e494a33e0092b4feb2eda12e2130a2f02df3125733c2f5ec31356e92dea00b

                          • C:\Users\Admin\Desktop\XWorm\XWorm V5.2\MonoMod.Utils.dll
                            Filesize

                            319KB

                            MD5

                            79f1c4c312fdbb9258c2cdde3772271f

                            SHA1

                            a143434883e4ef2c0190407602b030f5c4fdf96f

                            SHA256

                            f22a4fa1e8b1b70286ecf07effb15d2184454fa88325ce4c0f31ffadb4bef50a

                            SHA512

                            b28ed3c063ae3a15cd52e625a860bbb65f6cd38ccad458657a163cd927c74ebf498fb12f1e578e869bcea00c6cd3f47ede10866e34a48c133c5ac26b902ae5d9

                          • C:\Users\Admin\Desktop\XWorm\XWorm V5.2\RVGLib.dll
                            Filesize

                            241KB

                            MD5

                            d34c13128c6c7c93af2000a45196df81

                            SHA1

                            664c821c9d2ed234aea31d8b4f17d987e4b386f1

                            SHA256

                            aaf9fb0158bd40ab562a4212c2a795cb40ef6864042dc12f3a2415f2446ba1c7

                            SHA512

                            91f4e0e795f359b03595b01cbf29188a2a0b52ab9d64eadd8fb8b3508e417b8c7a70be439940975bf5bdf26493ea161aa45025beb83bc95076ed269e82d39689

                          • C:\Users\Admin\Desktop\XWorm\XWorm V5.2\SimpleObfuscator.dll
                            Filesize

                            1.4MB

                            MD5

                            9043d712208178c33ba8e942834ce457

                            SHA1

                            e0fa5c730bf127a33348f5d2a5673260ae3719d1

                            SHA256

                            b7a6eea19188b987dad97b32d774107e9a1beb4f461a654a00197d73f7fad54c

                            SHA512

                            dd6fa02ab70c58cde75fd4d4714e0ed0df5d3b18f737c68c93dba40c30376cc93957f8eef69fea86041489546ce4239b35a3b5d639472fd54b80f2f7260c8f65

                          • C:\Users\Admin\Desktop\XWorm\XWorm V5.2\Sounds\Intro.wav
                            Filesize

                            238KB

                            MD5

                            ad3b4fae17bcabc254df49f5e76b87a6

                            SHA1

                            1683ff029eebaffdc7a4827827da7bb361c8747e

                            SHA256

                            e3e5029bf5f29fa32d2f6cdda35697cd8e6035d5c78615f64d0b305d1bd926cf

                            SHA512

                            3d6ecc9040b5079402229c214cb5f9354315131a630c43d1da95248edc1b97627fb9ba032d006380a67409619763fb91976295f8d22ca91894c88f38bb610cd3

                          • C:\Users\Admin\Desktop\XWorm\XWorm V5.2\XWorm V5.2.exe
                            Filesize

                            12.2MB

                            MD5

                            8b7b015c1ea809f5c6ade7269bdc5610

                            SHA1

                            c67d5d83ca18731d17f79529cfdb3d3dcad36b96

                            SHA256

                            7fc9c7002b65bc1b33f72e019ed1e82008cc7b8e5b8eaf73fc41a3e6a246980e

                            SHA512

                            e652913f73326f9d8461ac2a631e1e413719df28c7938b38949c005fda501d9e159554c3e17a0d5826d279bb81efdef394f7fb6ff7289cf296c19e92fd924180

                          • C:\Users\Admin\Desktop\XWorm\XWorm V5.2\XWorm V5.2.exe.Config
                            Filesize

                            183B

                            MD5

                            66f09a3993dcae94acfe39d45b553f58

                            SHA1

                            9d09f8e22d464f7021d7f713269b8169aed98682

                            SHA256

                            7ea08548c23bd7fd7c75ca720ac5a0e8ca94cb51d06cd45ebf5f412e4bbdd7d7

                            SHA512

                            c8ea53ab187a720080bd8d879704e035f7e632afe1ee93e7637fad6bb7e40d33a5fe7e5c3d69134209487d225e72d8d944a43a28dc32922e946023e89abc93ed

                          • C:\Users\Admin\Desktop\XWorm\XWorm V5.2\XWormLoader 5.2 x32.exe
                            Filesize

                            109KB

                            MD5

                            f3b2ec58b71ba6793adcc2729e2140b1

                            SHA1

                            d9e93a33ac617afe326421df4f05882a61e0a4f2

                            SHA256

                            2d74eb709aea89a181cf8dfcc7e551978889f0d875401a2f1140487407bf18ae

                            SHA512

                            473edcaba9cb8044e28e30fc502a08a648359b3ed0deba85e559fe76b484fc8db0fc2375f746851623e30be33da035cec1d6038e1fcf4842a2afb6f9cd397495

                          • C:\Users\Admin\Desktop\XWorm\XWorm V5.2\XWormLoader 5.2 x64.exe
                            Filesize

                            109KB

                            MD5

                            e6a20535b636d6402164a8e2d871ef6d

                            SHA1

                            981cb1fd9361ca58f8985104e00132d1836a8736

                            SHA256

                            b461c985b53de4f6921d83925b3c2a62de3bbc5b8f9c02eecd27926f0197fae2

                            SHA512

                            35856a0268ed9d17b1570d5392833ed168c8515d73fac9f150cf63cc1aea61c096aa2e6b3c8e091a1058ba062f9333f6767e323a37dfb6f4fa7e508a2a138a30

                          • memory/2428-354-0x000001AA4F910000-0x000001AA4F92A000-memory.dmp
                            Filesize

                            104KB

                          • memory/2428-353-0x000001AA68350000-0x000001AA6838C000-memory.dmp
                            Filesize

                            240KB

                          • memory/2428-345-0x000001AA4F890000-0x000001AA4F896000-memory.dmp
                            Filesize

                            24KB

                          • memory/2428-366-0x000001AA68DE0000-0x000001AA68FD4000-memory.dmp
                            Filesize

                            2.0MB

                          • memory/2428-343-0x000001AA4F8C0000-0x000001AA4F8E8000-memory.dmp
                            Filesize

                            160KB

                          • memory/2428-347-0x000001AA68150000-0x000001AA681AE000-memory.dmp
                            Filesize

                            376KB

                          • memory/2428-356-0x000001AA69090000-0x000001AA69CC8000-memory.dmp
                            Filesize

                            12.2MB

                          • memory/2428-364-0x000001AA6A4D0000-0x000001AA6B0BC000-memory.dmp
                            Filesize

                            11.9MB

                          • memory/2428-349-0x000001AA681B0000-0x000001AA68206000-memory.dmp
                            Filesize

                            344KB

                          • memory/2428-374-0x000001AA75610000-0x000001AA75778000-memory.dmp
                            Filesize

                            1.4MB

                          • memory/2428-341-0x000001AA4F830000-0x000001AA4F872000-memory.dmp
                            Filesize

                            264KB

                          • memory/2428-351-0x000001AA4F820000-0x000001AA4F826000-memory.dmp
                            Filesize

                            24KB

                          • memory/2428-339-0x00000000006B0000-0x00000000006D0000-memory.dmp
                            Filesize

                            128KB

                          • memory/2428-350-0x000001AA4E020000-0x000001AA4E026000-memory.dmp
                            Filesize

                            24KB