Analysis

  • max time kernel
    201s
  • max time network
    205s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20241007-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system
  • submitted
    27-10-2024 13:30

General

  • Target

    XWorm V5.2.rar

  • Size

    30.2MB

  • MD5

    f343d9455a27c194b221d7f1c76eef3d

  • SHA1

    ce9371c845dc7f90cfb9454192585be1598b7439

  • SHA256

    04514a36f74d6d54a58504f54ce8b20755887cffd1c9857d2efe37a94fb4056b

  • SHA512

    7a2ba77292709592cd06acf0b23ee0d17e053ce6779871343aee00567895f88bb2ec35ca2831348debabe9739d214a47be268ea4bddd0cc91a69bae61b4a2817

  • SSDEEP

    786432:yylsf3F/xaN4VCp3K7c+peEJfi2IxFTb43NJuaaJxyXzmp:7s39saVCpZ8rfi3x+TPnjmp

Score
7/10

Malware Config

Signatures

  • Executes dropped EXE 9 IoCs
  • Loads dropped DLL 22 IoCs
  • Obfuscated with Agile.Net obfuscator 4 IoCs

    Detects use of the Agile.Net commercial obfuscator, which is capable of entity renaming and control flow obfuscation.

  • Browser Information Discovery 1 TTPs

    Enumerate browser information.

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Program crash 2 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 3 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Enumerates system info in registry 2 TTPs 15 IoCs
  • Suspicious behavior: EnumeratesProcesses 24 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs
  • Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 12 IoCs
  • Suspicious use of AdjustPrivilegeToken 15 IoCs
  • Suspicious use of FindShellTrayWindow 64 IoCs
  • Suspicious use of SendNotifyMessage 48 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs

Processes

  • C:\Program Files\7-Zip\7zFM.exe
    "C:\Program Files\7-Zip\7zFM.exe" "C:\Users\Admin\AppData\Local\Temp\XWorm V5.2.rar"
    1⤵
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious behavior: GetForegroundWindowSpam
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of WriteProcessMemory
    PID:1028
    • C:\Users\Admin\AppData\Local\Temp\7zO404E3178\XWorm V5.2.exe
      "C:\Users\Admin\AppData\Local\Temp\7zO404E3178\XWorm V5.2.exe"
      2⤵
      • Executes dropped EXE
      • Loads dropped DLL
      • Suspicious use of AdjustPrivilegeToken
      PID:4936
    • C:\Users\Admin\AppData\Local\Temp\7zO404E1698\XWormLoader 5.2 x32.exe
      "C:\Users\Admin\AppData\Local\Temp\7zO404E1698\XWormLoader 5.2 x32.exe"
      2⤵
      • Executes dropped EXE
      • System Location Discovery: System Language Discovery
      PID:2244
      • C:\Windows\SysWOW64\WerFault.exe
        C:\Windows\SysWOW64\WerFault.exe -u -p 2244 -s 880
        3⤵
        • Program crash
        PID:1788
    • C:\Users\Admin\AppData\Local\Temp\7zO40450CC8\XWorm V5.2.exe
      "C:\Users\Admin\AppData\Local\Temp\7zO40450CC8\XWorm V5.2.exe"
      2⤵
      • Executes dropped EXE
      • Loads dropped DLL
      • Suspicious use of AdjustPrivilegeToken
      PID:4940
    • C:\Users\Admin\AppData\Local\Temp\7zO4049FED8\XWormLoader 5.2 x32.exe
      "C:\Users\Admin\AppData\Local\Temp\7zO4049FED8\XWormLoader 5.2 x32.exe"
      2⤵
      • Executes dropped EXE
      • System Location Discovery: System Language Discovery
      PID:1972
      • C:\Windows\SysWOW64\WerFault.exe
        C:\Windows\SysWOW64\WerFault.exe -u -p 1972 -s 892
        3⤵
        • Program crash
        PID:3504
    • C:\Users\Admin\AppData\Local\Temp\7zO404636D8\XWormLoader 5.2 x64.exe
      "C:\Users\Admin\AppData\Local\Temp\7zO404636D8\XWormLoader 5.2 x64.exe"
      2⤵
      • Executes dropped EXE
      PID:1496
    • C:\Users\Admin\AppData\Local\Temp\7zO404867E8\XWorm V5.2.exe
      "C:\Users\Admin\AppData\Local\Temp\7zO404867E8\XWorm V5.2.exe"
      2⤵
      • Executes dropped EXE
      • Loads dropped DLL
      • Suspicious use of AdjustPrivilegeToken
      PID:4616
  • C:\Windows\SysWOW64\WerFault.exe
    C:\Windows\SysWOW64\WerFault.exe -pss -s 444 -p 2244 -ip 2244
    1⤵
      PID:1692
    • C:\Windows\SysWOW64\WerFault.exe
      C:\Windows\SysWOW64\WerFault.exe -pss -s 460 -p 1972 -ip 1972
      1⤵
        PID:976
      • C:\Windows\System32\rundll32.exe
        C:\Windows\System32\rundll32.exe C:\Windows\System32\shell32.dll,SHCreateLocalServerRunDll {9aa46009-3ce0-458a-a354-715610a075e6} -Embedding
        1⤵
          PID:3280
        • C:\Users\Admin\Desktop\cum in my ass\XWorm V5.2.exe
          "C:\Users\Admin\Desktop\cum in my ass\XWorm V5.2.exe"
          1⤵
          • Executes dropped EXE
          • Loads dropped DLL
          • Enumerates system info in registry
          • Suspicious use of AdjustPrivilegeToken
          • Suspicious use of FindShellTrayWindow
          • Suspicious use of WriteProcessMemory
          PID:3984
          • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
            "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument https://t.me/XCoderTools
            2⤵
            • Enumerates system info in registry
            • Suspicious behavior: EnumeratesProcesses
            • Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
            • Suspicious use of FindShellTrayWindow
            • Suspicious use of SendNotifyMessage
            • Suspicious use of WriteProcessMemory
            PID:3532
            • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
              "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0x128,0x12c,0x130,0xf8,0x134,0x7ffd675d46f8,0x7ffd675d4708,0x7ffd675d4718
              3⤵
                PID:2256
              • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2056,1993461116081915994,14232110829341613259,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2080 /prefetch:2
                3⤵
                  PID:4628
                • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                  "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2056,1993461116081915994,14232110829341613259,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2204 /prefetch:3
                  3⤵
                  • Suspicious behavior: EnumeratesProcesses
                  PID:4760
                • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                  "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2056,1993461116081915994,14232110829341613259,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2736 /prefetch:8
                  3⤵
                    PID:2252
                  • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                    "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2056,1993461116081915994,14232110829341613259,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3408 /prefetch:1
                    3⤵
                      PID:3284
                    • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                      "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2056,1993461116081915994,14232110829341613259,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3424 /prefetch:1
                      3⤵
                        PID:4452
                      • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                        "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2056,1993461116081915994,14232110829341613259,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5072 /prefetch:1
                        3⤵
                          PID:4608
                        • C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe
                          "C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2056,1993461116081915994,14232110829341613259,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5344 /prefetch:8
                          3⤵
                            PID:4548
                          • C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe
                            "C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2056,1993461116081915994,14232110829341613259,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5344 /prefetch:8
                            3⤵
                            • Suspicious behavior: EnumeratesProcesses
                            PID:1940
                          • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                            "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2056,1993461116081915994,14232110829341613259,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4080 /prefetch:1
                            3⤵
                              PID:3832
                            • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                              "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2056,1993461116081915994,14232110829341613259,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5424 /prefetch:1
                              3⤵
                                PID:4180
                              • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2056,1993461116081915994,14232110829341613259,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5652 /prefetch:1
                                3⤵
                                  PID:4736
                                • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                  "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2056,1993461116081915994,14232110829341613259,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5612 /prefetch:1
                                  3⤵
                                    PID:5000
                              • C:\Windows\System32\CompPkgSrv.exe
                                C:\Windows\System32\CompPkgSrv.exe -Embedding
                                1⤵
                                  PID:3156
                                • C:\Windows\System32\CompPkgSrv.exe
                                  C:\Windows\System32\CompPkgSrv.exe -Embedding
                                  1⤵
                                    PID:4996
                                  • C:\Users\Admin\Desktop\cum in my ass\XWormLoader 5.2 x32.exe
                                    "C:\Users\Admin\Desktop\cum in my ass\XWormLoader 5.2 x32.exe"
                                    1⤵
                                    • Executes dropped EXE
                                    • Loads dropped DLL
                                    • System Location Discovery: System Language Discovery
                                    • Enumerates system info in registry
                                    • Suspicious use of AdjustPrivilegeToken
                                    PID:1416
                                  • C:\Users\Admin\Desktop\cum in my ass\XWormLoader 5.2 x64.exe
                                    "C:\Users\Admin\Desktop\cum in my ass\XWormLoader 5.2 x64.exe"
                                    1⤵
                                    • Executes dropped EXE
                                    • Loads dropped DLL
                                    • Enumerates system info in registry
                                    • Suspicious use of AdjustPrivilegeToken
                                    PID:3832
                                    • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                      "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument https://t.me/XCoderTools
                                      2⤵
                                      • Enumerates system info in registry
                                      • Suspicious behavior: EnumeratesProcesses
                                      • Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
                                      • Suspicious use of SendNotifyMessage
                                      PID:3932
                                      • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                        "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0x11c,0x120,0x124,0xf8,0x128,0x7ffd675d46f8,0x7ffd675d4708,0x7ffd675d4718
                                        3⤵
                                          PID:3552
                                        • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                          "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2236,17583552857706250892,15253227418448926240,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2244 /prefetch:2
                                          3⤵
                                            PID:2368
                                          • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                            "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2236,17583552857706250892,15253227418448926240,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2296 /prefetch:3
                                            3⤵
                                            • Suspicious behavior: EnumeratesProcesses
                                            PID:4252
                                          • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                            "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2236,17583552857706250892,15253227418448926240,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2912 /prefetch:8
                                            3⤵
                                              PID:2064
                                            • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                              "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2236,17583552857706250892,15253227418448926240,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3192 /prefetch:1
                                              3⤵
                                                PID:4976
                                              • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                                "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2236,17583552857706250892,15253227418448926240,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3288 /prefetch:1
                                                3⤵
                                                  PID:3944
                                                • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                                  "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2236,17583552857706250892,15253227418448926240,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5024 /prefetch:1
                                                  3⤵
                                                    PID:1128
                                                  • C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe
                                                    "C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2236,17583552857706250892,15253227418448926240,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=3344 /prefetch:8
                                                    3⤵
                                                      PID:4780
                                                    • C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe
                                                      "C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2236,17583552857706250892,15253227418448926240,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=3344 /prefetch:8
                                                      3⤵
                                                      • Suspicious behavior: EnumeratesProcesses
                                                      PID:4940
                                                    • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                                      "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2236,17583552857706250892,15253227418448926240,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4508 /prefetch:1
                                                      3⤵
                                                        PID:1100
                                                      • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                                        "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2236,17583552857706250892,15253227418448926240,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5468 /prefetch:1
                                                        3⤵
                                                          PID:3340
                                                      • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                                        "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument https://t.me/XCoderTools
                                                        2⤵
                                                          PID:1728
                                                          • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                                            "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0x11c,0x120,0x124,0xf8,0x128,0x7ffd675d46f8,0x7ffd675d4708,0x7ffd675d4718
                                                            3⤵
                                                              PID:2148
                                                        • C:\Windows\System32\CompPkgSrv.exe
                                                          C:\Windows\System32\CompPkgSrv.exe -Embedding
                                                          1⤵
                                                            PID:1728
                                                          • C:\Windows\System32\CompPkgSrv.exe
                                                            C:\Windows\System32\CompPkgSrv.exe -Embedding
                                                            1⤵
                                                              PID:1324

                                                            Network

                                                            MITRE ATT&CK Enterprise v15

                                                            Replay Monitor

                                                            Loading Replay Monitor...

                                                            Downloads

                                                            • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad\settings.dat

                                                              Filesize

                                                              152B

                                                              MD5

                                                              d22073dea53e79d9b824f27ac5e9813e

                                                              SHA1

                                                              6d8a7281241248431a1571e6ddc55798b01fa961

                                                              SHA256

                                                              86713962c3bb287964678b148ee08ea83fb83483dff8be91c8a6085ca560b2a6

                                                              SHA512

                                                              97152091ee24b6e713b8ec8123cb62511f8a7e8a6c6c3f2f6727d0a60497be28814613b476009b853575d4931e5df950e28a41afbf6707cb672206f1219c4413

                                                            • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad\settings.dat

                                                              Filesize

                                                              152B

                                                              MD5

                                                              bffcefacce25cd03f3d5c9446ddb903d

                                                              SHA1

                                                              8923f84aa86db316d2f5c122fe3874bbe26f3bab

                                                              SHA256

                                                              23e7cbbf64c81122c3cb30a0933c10a320e254447771737a326ce37a0694d405

                                                              SHA512

                                                              761dae5315b35ec0b2fe68019881397f5d2eadba3963aba79a89f8953a0cd705012d7faf3a204a5f36008926b9f614980e333351596b06ce7058d744345ce2e7

                                                            • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad\settings.dat

                                                              Filesize

                                                              152B

                                                              MD5

                                                              e7feee9f349fe639e77ec6334d089fbb

                                                              SHA1

                                                              2b546425a30c49f63a123dac0b74c58ebb707629

                                                              SHA256

                                                              8ef95abc9b6856e1e6177364ff00f607b64b13470ef00fd541c9be72b5cfa57d

                                                              SHA512

                                                              cdba12e6ccc8abe32fbc2bfc15c6c8939c3bdbf12f17920fde0ac65a919fd122074857b682c51ca52dceed49bceb6ce7f558bf544697e80af23c0c84a45951c4

                                                            • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\5abf0d90-7295-4363-b5e8-ccd7e5895956.tmp

                                                              Filesize

                                                              5KB

                                                              MD5

                                                              fd2d0cad41bf70ce4684e13903f7cf96

                                                              SHA1

                                                              577f22de9005fcc2f38c12ba5b16dcb067bd416c

                                                              SHA256

                                                              841728410beb18294101d1b7e9c90415b3eceea3108bc875432adba00044f1a2

                                                              SHA512

                                                              484c998d056170462dd1862e6df707e7305b327a821805e3db184df340265359681b94fb592bc147c36c1c7eff3757a5974548e76744294cbb93f8275b100199

                                                            • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index

                                                              Filesize

                                                              72B

                                                              MD5

                                                              a008c564a1d358954648f95f22ad47c8

                                                              SHA1

                                                              44acf4b7ea23d1f15c312932aefcf26be301f2f9

                                                              SHA256

                                                              57efb94c5794a6634dc568ce97e0fbada18cb28fc39ea35d4e677c96205d9760

                                                              SHA512

                                                              514cb2c02cbded72bb0d01ac644cc45bf3a4c9af863bb568a21d4ac2a8f0fed6ca8449849cfa00eb1329d30179ebbb2c19f0819d31c173c2c9f8b91642bb6a2f

                                                            • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index

                                                              Filesize

                                                              72B

                                                              MD5

                                                              dec447b0e9f8ea90ef4349fc27e4c659

                                                              SHA1

                                                              37d8d1f7b5b3c88484e915939c139421c1dd713b

                                                              SHA256

                                                              b2dbd8556690182bb7b9e2fb5dcb3042fc6b828f0e33196578bb528fc33ed9fe

                                                              SHA512

                                                              cfc3e221140f6dac468c5dad45f67adaa426f5e2dc3de9a1abed1a7604e691b7cefebcfa1d3740563e884edc8eb755bf1aac0ff2a7d67c131d7ca8cc5a56e4b4

                                                            • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\GPUCache\data_1

                                                              Filesize

                                                              264KB

                                                              MD5

                                                              f50f89a0a91564d0b8a211f8921aa7de

                                                              SHA1

                                                              112403a17dd69d5b9018b8cede023cb3b54eab7d

                                                              SHA256

                                                              b1e963d702392fb7224786e7d56d43973e9b9efd1b89c17814d7c558ffc0cdec

                                                              SHA512

                                                              bf8cda48cf1ec4e73f0dd1d4fa5562af1836120214edb74957430cd3e4a2783e801fa3f4ed2afb375257caeed4abe958265237d6e0aacf35a9ede7a2e8898d58

                                                            • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Network Persistent State

                                                              Filesize

                                                              442B

                                                              MD5

                                                              365fdf290e173ba9a8895aa2f998d2c6

                                                              SHA1

                                                              52875910e175cfc29b2addada563b0f291a42706

                                                              SHA256

                                                              b6de134eb77d68179f4207539cddda7e99111af2e66657ced856dc7f97eb1d62

                                                              SHA512

                                                              89a94fc638926b572eb78ded203d0728772b7bf37510b8f5d4e177a52437994adb5cc4b0fe0f3717d5798482d072705913efb87c35a0d033f05bcbcfad0c003f

                                                            • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Preferences

                                                              Filesize

                                                              6KB

                                                              MD5

                                                              487a4d6e79703c3c83466ed0ea027aed

                                                              SHA1

                                                              a76150c724fb3a5480ac1f363fb17c596df61990

                                                              SHA256

                                                              51bb9ca46132dcc44c0297e63d9f016d1fff7289fd50f40c7e5cc418747d8d29

                                                              SHA512

                                                              835fad2e579acce0641062e4086f863211d44747fe21b6c7ed7fa477802e36a0d4d0c020633ab7781768a00367e8df1205c5d2fc5cb421074c8bf7361dfd4ff4

                                                            • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Preferences

                                                              Filesize

                                                              6KB

                                                              MD5

                                                              7398bb1cc7793cccdd2ae969c9b92df8

                                                              SHA1

                                                              655ec1f45e027f2cfe580f26046d04856d3ad929

                                                              SHA256

                                                              f6b80e3488b9ea738fe4b127c794ce884149270e6199e8fc7760cf8c7aa05a23

                                                              SHA512

                                                              888c4b0c324a99be7e980b76cbc2c00c4cfddbdb2ff2d8dfd1f181ec05bb906fccd9c410f069f0d5a52de2b0c25965d40cc3fa98f7c794b84e7207999794cfa7

                                                            • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Preferences

                                                              Filesize

                                                              6KB

                                                              MD5

                                                              433da121b61674e4e177e111313c9c3a

                                                              SHA1

                                                              996b4ee6f963b103148cb82f33b9896ef09b2acd

                                                              SHA256

                                                              f6bd0d61bc72277307bf040d347e4caebb015d81c537c756c7b627eaaf977958

                                                              SHA512

                                                              9b9c307e2a79b2b33310f7abe2a61451b136ec19e46e2df897dacc48304e4ce15d997045bab120d51b506dde9114448d7fb64e279a6afb864bf89c5144318eca

                                                            • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\TransportSecurity

                                                              Filesize

                                                              538B

                                                              MD5

                                                              9a290a5311ed025fb2c50985621f1f08

                                                              SHA1

                                                              d50c8433a89d7dbf22c3091378174faa3f7cc6ea

                                                              SHA256

                                                              5ca8165887af5b998e0800ee4536681ae25fe2d77ef2270ff150143d74c0d889

                                                              SHA512

                                                              10e207e77e9cd02013be0f554774e5762389f600a0f629d3522c2b60d66f7929f8a412c6d3f45596d86866937845d8b4f07f67a843c60ea088ad9795d4694484

                                                            • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\data_reduction_proxy_leveldb\CURRENT

                                                              Filesize

                                                              16B

                                                              MD5

                                                              6752a1d65b201c13b62ea44016eb221f

                                                              SHA1

                                                              58ecf154d01a62233ed7fb494ace3c3d4ffce08b

                                                              SHA256

                                                              0861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd

                                                              SHA512

                                                              9cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389

                                                            • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\data_reduction_proxy_leveldb\CURRENT

                                                              Filesize

                                                              16B

                                                              MD5

                                                              aefd77f47fb84fae5ea194496b44c67a

                                                              SHA1

                                                              dcfbb6a5b8d05662c4858664f81693bb7f803b82

                                                              SHA256

                                                              4166bf17b2da789b0d0cc5c74203041d98005f5d4ef88c27e8281e00148cd611

                                                              SHA512

                                                              b733d502138821948267a8b27401d7c0751e590e1298fda1428e663ccd02f55d0d2446ff4bc265bdcdc61f952d13c01524a5341bc86afc3c2cde1d8589b2e1c3

                                                            • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Local State

                                                              Filesize

                                                              10KB

                                                              MD5

                                                              937efcb3687b5e1e81959064c869c7ef

                                                              SHA1

                                                              7462c0976f772ae5f8558ca6d90453a62a8a5295

                                                              SHA256

                                                              06ac151eedece55473d72df612fa15ff9b668feb7954bc60205bb54cf9bebac4

                                                              SHA512

                                                              b70b76324df82e9967b3a8d53448797c709e88532b80735f748e7089f0bafbabec2ad556d7987a3dcfacb6e3472eac5a6df3e9325c4d4bb4ad51165592d4b7a6

                                                            • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Local State

                                                              Filesize

                                                              11KB

                                                              MD5

                                                              ff4eafe671cc3f0711479e732a7d24e1

                                                              SHA1

                                                              4289761913b3a931f18ae109147e52cd4f740023

                                                              SHA256

                                                              0dbf2e00b49ccc60fbc4f5556f7a4cd1eb0a51916e7698ad4d4ac9a622d5fd01

                                                              SHA512

                                                              0011fa5e947c2f20099156a1753e342bff2105109d570b1d7611b351275db7afb4c1f9e6ac0f9f3e120b63e0320d6379f92fe460b20a0a59f0761241f1a839ee

                                                            • C:\Users\Admin\AppData\Local\Temp\7zE404CE849\Icons\icon (15).ico

                                                              Filesize

                                                              361KB

                                                              MD5

                                                              e3143e8c70427a56dac73a808cba0c79

                                                              SHA1

                                                              63556c7ad9e778d5bd9092f834b5cc751e419d16

                                                              SHA256

                                                              b2f57a23ecc789c1bbf6037ac0825bf98babc7bf0c5d438af5e2767a27a79188

                                                              SHA512

                                                              74e0f4b55625df86a87b9315e4007be8e05bbecca4346a6ea06ef5b1528acb5a8bb636ef3e599a3820dbddcf69563a0a22e2c1062c965544fd75ec96fd9803fc

                                                            • C:\Users\Admin\AppData\Local\Temp\7zO404636D8\XWormLoader 5.2 x64.exe

                                                              Filesize

                                                              109KB

                                                              MD5

                                                              e6a20535b636d6402164a8e2d871ef6d

                                                              SHA1

                                                              981cb1fd9361ca58f8985104e00132d1836a8736

                                                              SHA256

                                                              b461c985b53de4f6921d83925b3c2a62de3bbc5b8f9c02eecd27926f0197fae2

                                                              SHA512

                                                              35856a0268ed9d17b1570d5392833ed168c8515d73fac9f150cf63cc1aea61c096aa2e6b3c8e091a1058ba062f9333f6767e323a37dfb6f4fa7e508a2a138a30

                                                            • C:\Users\Admin\AppData\Local\Temp\7zO404E1698\XWormLoader 5.2 x32.exe

                                                              Filesize

                                                              109KB

                                                              MD5

                                                              f3b2ec58b71ba6793adcc2729e2140b1

                                                              SHA1

                                                              d9e93a33ac617afe326421df4f05882a61e0a4f2

                                                              SHA256

                                                              2d74eb709aea89a181cf8dfcc7e551978889f0d875401a2f1140487407bf18ae

                                                              SHA512

                                                              473edcaba9cb8044e28e30fc502a08a648359b3ed0deba85e559fe76b484fc8db0fc2375f746851623e30be33da035cec1d6038e1fcf4842a2afb6f9cd397495

                                                            • C:\Users\Admin\AppData\Local\Temp\7zO404E3178\XWorm V5.2.exe

                                                              Filesize

                                                              12.2MB

                                                              MD5

                                                              8b7b015c1ea809f5c6ade7269bdc5610

                                                              SHA1

                                                              c67d5d83ca18731d17f79529cfdb3d3dcad36b96

                                                              SHA256

                                                              7fc9c7002b65bc1b33f72e019ed1e82008cc7b8e5b8eaf73fc41a3e6a246980e

                                                              SHA512

                                                              e652913f73326f9d8461ac2a631e1e413719df28c7938b38949c005fda501d9e159554c3e17a0d5826d279bb81efdef394f7fb6ff7289cf296c19e92fd924180

                                                            • C:\Users\Admin\AppData\Local\Temp\TMzpx\TMzpx.dll

                                                              Filesize

                                                              112KB

                                                              MD5

                                                              2f1a50031dcf5c87d92e8b2491fdcea6

                                                              SHA1

                                                              71e2aaa2d1bb7dbe32a00e1d01d744830ecce08f

                                                              SHA256

                                                              47578a37901c82f66e4dba47acd5c3cab6d09c9911d16f5ad0413275342147ed

                                                              SHA512

                                                              1c66dbe1320c1a84023bdf77686a2a7ab79a3e86ba5a4ea2cda9a37f8a916137d5cfec30b28ceae181355f6f279270465ef63ae90b7e8dcd4c1a8198a7fd36a8

                                                            • C:\Users\Admin\AppData\Local\Temp\aPjMR\aPjMR.dll

                                                              Filesize

                                                              84KB

                                                              MD5

                                                              0b0e63957367e620b8697c5341af35b9

                                                              SHA1

                                                              69361c2762b2d1cada80667cd55bc5082e60af86

                                                              SHA256

                                                              bd9cdcfaa0edecdb89a204965d20f4a896c6650d4840e28736d9bd832390e1c5

                                                              SHA512

                                                              07d0e52c863f52ecb3d12fab9e71c7a18d54cbedb47250bee7e4297ff72ed793c23a2735c48090c261fe4633d53d03e305c1338dfc881bb86874d1633ff6ecee

                                                            • C:\Users\Admin\Desktop\cum in my ass\GeoIP.dat

                                                              Filesize

                                                              1.2MB

                                                              MD5

                                                              8ef41798df108ce9bd41382c9721b1c9

                                                              SHA1

                                                              1e6227635a12039f4d380531b032bf773f0e6de0

                                                              SHA256

                                                              bc07ff22d4ee0b6fafcc12482ecf2981c172a672194c647cedf9b4d215ad9740

                                                              SHA512

                                                              4c62af04d4a141b94eb3e1b0dbf3669cb53fe9b942072ed7bea6a848d87d8994cff5a5f639ab70f424eb79a4b7adabdde4da6d2f02f995bd8d55db23ce99f01b

                                                            • C:\Users\Admin\Desktop\cum in my ass\Guna.UI2.dll

                                                              Filesize

                                                              1.9MB

                                                              MD5

                                                              bcc0fe2b28edd2da651388f84599059b

                                                              SHA1

                                                              44d7756708aafa08730ca9dbdc01091790940a4f

                                                              SHA256

                                                              c6264665a882e73eb2262a74fea2c29b1921a9af33180126325fb67a851310ef

                                                              SHA512

                                                              3bfc3d27c095dde988f779021d0479c8c1de80a404454813c6cae663e3fe63dc636bffa7de1094e18594c9d608fa7420a0651509544722f2a00288f0b7719cc8

                                                            • C:\Users\Admin\Desktop\cum in my ass\Mono.Cecil.dll

                                                              Filesize

                                                              350KB

                                                              MD5

                                                              de69bb29d6a9dfb615a90df3580d63b1

                                                              SHA1

                                                              74446b4dcc146ce61e5216bf7efac186adf7849b

                                                              SHA256

                                                              f66f97866433e688acc3e4cd1e6ef14505f81df6b26dd6215e376767f6f954bc

                                                              SHA512

                                                              6e96a510966a4acbca900773d4409720b0771fede37f24431bf0d8b9c611eaa152ba05ee588bb17f796d7b8caaccc10534e7cc1c907c28ddfa54ac4ce3952015

                                                            • C:\Users\Admin\Desktop\cum in my ass\MonoMod.Backports.dll

                                                              Filesize

                                                              138KB

                                                              MD5

                                                              dd43356f07fc0ce082db4e2f102747a2

                                                              SHA1

                                                              aa0782732e2d60fa668b0aadbf3447ef70b6a619

                                                              SHA256

                                                              e375b83a3e242212a2ed9478e1f0b8383c1bf1fdfab5a1cf766df740b631afd6

                                                              SHA512

                                                              284d64b99931ed1f2e839a7b19ee8389eefaf6c72bac556468a01f3eb17000252613c01dbae88923e9a02f3c84bcab02296659648fad727123f63d0ac38d258e

                                                            • C:\Users\Admin\Desktop\cum in my ass\MonoMod.Core.dll

                                                              Filesize

                                                              216KB

                                                              MD5

                                                              b808181453b17f3fc1ab153bf11be197

                                                              SHA1

                                                              bce86080b7eb76783940d1ff277e2b46f231efe9

                                                              SHA256

                                                              da00cdfab411f8f535f17258981ec51d1af9b0bfcee3a360cbd0cb6f692dbcdd

                                                              SHA512

                                                              a2d941c6e69972f99707ade5c5325eb50b0ec4c5abf6a189eb11a46606fed8076be44c839d83cf310b67e66471e0ea3f6597857a8e2c7e2a7ad6de60c314f7d3

                                                            • C:\Users\Admin\Desktop\cum in my ass\MonoMod.ILHelpers.dll

                                                              Filesize

                                                              6KB

                                                              MD5

                                                              6512e89e0cb92514ef24be43f0bf4500

                                                              SHA1

                                                              a039c51f89656d9d5c584f063b2b675a9ff44b8e

                                                              SHA256

                                                              1411e4858412ded195f0e65544a4ec8e8249118b76375050a35c076940826cd0

                                                              SHA512

                                                              9ffb2ff050cce82dbfbbb0e85ab5f976fcd81086b3d8695502c5221c23d14080f0e494a33e0092b4feb2eda12e2130a2f02df3125733c2f5ec31356e92dea00b

                                                            • C:\Users\Admin\Desktop\cum in my ass\MonoMod.Utils.dll

                                                              Filesize

                                                              319KB

                                                              MD5

                                                              79f1c4c312fdbb9258c2cdde3772271f

                                                              SHA1

                                                              a143434883e4ef2c0190407602b030f5c4fdf96f

                                                              SHA256

                                                              f22a4fa1e8b1b70286ecf07effb15d2184454fa88325ce4c0f31ffadb4bef50a

                                                              SHA512

                                                              b28ed3c063ae3a15cd52e625a860bbb65f6cd38ccad458657a163cd927c74ebf498fb12f1e578e869bcea00c6cd3f47ede10866e34a48c133c5ac26b902ae5d9

                                                            • C:\Users\Admin\Desktop\cum in my ass\RVGLib.dll

                                                              Filesize

                                                              241KB

                                                              MD5

                                                              d34c13128c6c7c93af2000a45196df81

                                                              SHA1

                                                              664c821c9d2ed234aea31d8b4f17d987e4b386f1

                                                              SHA256

                                                              aaf9fb0158bd40ab562a4212c2a795cb40ef6864042dc12f3a2415f2446ba1c7

                                                              SHA512

                                                              91f4e0e795f359b03595b01cbf29188a2a0b52ab9d64eadd8fb8b3508e417b8c7a70be439940975bf5bdf26493ea161aa45025beb83bc95076ed269e82d39689

                                                            • C:\Users\Admin\Desktop\cum in my ass\XWorm V5.2.exe.config

                                                              Filesize

                                                              183B

                                                              MD5

                                                              66f09a3993dcae94acfe39d45b553f58

                                                              SHA1

                                                              9d09f8e22d464f7021d7f713269b8169aed98682

                                                              SHA256

                                                              7ea08548c23bd7fd7c75ca720ac5a0e8ca94cb51d06cd45ebf5f412e4bbdd7d7

                                                              SHA512

                                                              c8ea53ab187a720080bd8d879704e035f7e632afe1ee93e7637fad6bb7e40d33a5fe7e5c3d69134209487d225e72d8d944a43a28dc32922e946023e89abc93ed

                                                            • C:\Users\Admin\Desktop\cum in my ass\XWormLoader 5.2 x32.exe.config

                                                              Filesize

                                                              187B

                                                              MD5

                                                              15c8c4ba1aa574c0c00fd45bb9cce1ab

                                                              SHA1

                                                              0dad65a3d4e9080fa29c42aa485c6102d2fa8bc8

                                                              SHA256

                                                              f82338e8e9c746b5d95cd2ccc7bf94dd5de2b9b8982fffddf2118e475de50e15

                                                              SHA512

                                                              52baac63399340427b94bfdeb7a42186d5359ce439c3d775497f347089edfbf72a6637b23bb008ab55b8d4dd3b79a7b2eb7c7ef922ea23d0716d5c3536b359d4

                                                            • \??\pipe\LOCAL\crashpad_3532_YBTPJUSJXCCKDDXJ

                                                              MD5

                                                              d41d8cd98f00b204e9800998ecf8427e

                                                              SHA1

                                                              da39a3ee5e6b4b0d3255bfef95601890afd80709

                                                              SHA256

                                                              e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855

                                                              SHA512

                                                              cf83e1357eefb8bdf1542850d66d8007d620e4050b5715dc83f4a921d36ce9ce47d0d13c5d85f2b0ff8318d2877eec2f63b931bd47417a81a538327af927da3e

                                                            • memory/1416-461-0x00000000054C0000-0x0000000005552000-memory.dmp

                                                              Filesize

                                                              584KB

                                                            • memory/1416-454-0x0000000005040000-0x0000000005050000-memory.dmp

                                                              Filesize

                                                              64KB

                                                            • memory/1416-438-0x0000000004D70000-0x0000000004D76000-memory.dmp

                                                              Filesize

                                                              24KB

                                                            • memory/1416-446-0x0000000004F90000-0x0000000004FE6000-memory.dmp

                                                              Filesize

                                                              344KB

                                                            • memory/1416-434-0x0000000004DD0000-0x0000000004DF8000-memory.dmp

                                                              Filesize

                                                              160KB

                                                            • memory/1416-442-0x0000000004F30000-0x0000000004F8E000-memory.dmp

                                                              Filesize

                                                              376KB

                                                            • memory/1416-447-0x0000000004ED0000-0x0000000004ED6000-memory.dmp

                                                              Filesize

                                                              24KB

                                                            • memory/1416-448-0x0000000004F00000-0x0000000004F06000-memory.dmp

                                                              Filesize

                                                              24KB

                                                            • memory/1416-483-0x0000000005D00000-0x0000000005D56000-memory.dmp

                                                              Filesize

                                                              344KB

                                                            • memory/1416-452-0x0000000005080000-0x00000000050BC000-memory.dmp

                                                              Filesize

                                                              240KB

                                                            • memory/1416-453-0x00000000050E0000-0x00000000050FA000-memory.dmp

                                                              Filesize

                                                              104KB

                                                            • memory/1416-429-0x0000000004970000-0x00000000049B2000-memory.dmp

                                                              Filesize

                                                              264KB

                                                            • memory/1416-459-0x0000000005D70000-0x00000000069A8000-memory.dmp

                                                              Filesize

                                                              12.2MB

                                                            • memory/1416-460-0x00000000069B0000-0x0000000006F54000-memory.dmp

                                                              Filesize

                                                              5.6MB

                                                            • memory/1416-482-0x0000000004510000-0x000000000451A000-memory.dmp

                                                              Filesize

                                                              40KB

                                                            • memory/1416-430-0x0000000004E30000-0x0000000004ECC000-memory.dmp

                                                              Filesize

                                                              624KB

                                                            • memory/1416-425-0x00000000009E0000-0x0000000000A00000-memory.dmp

                                                              Filesize

                                                              128KB

                                                            • memory/1416-486-0x000000000B230000-0x000000000B424000-memory.dmp

                                                              Filesize

                                                              2.0MB

                                                            • memory/1416-488-0x000000000E1D0000-0x000000000E236000-memory.dmp

                                                              Filesize

                                                              408KB

                                                            • memory/1496-76-0x0000000000860000-0x0000000000880000-memory.dmp

                                                              Filesize

                                                              128KB

                                                            • memory/1972-63-0x0000000000850000-0x0000000000870000-memory.dmp

                                                              Filesize

                                                              128KB

                                                            • memory/2244-36-0x0000000000630000-0x0000000000650000-memory.dmp

                                                              Filesize

                                                              128KB

                                                            • memory/3832-472-0x0000021156E40000-0x0000021156E82000-memory.dmp

                                                              Filesize

                                                              264KB

                                                            • memory/3832-478-0x000002113E5C0000-0x000002113E5C6000-memory.dmp

                                                              Filesize

                                                              24KB

                                                            • memory/3832-479-0x0000021157140000-0x000002115717C000-memory.dmp

                                                              Filesize

                                                              240KB

                                                            • memory/3832-480-0x0000021157000000-0x000002115701A000-memory.dmp

                                                              Filesize

                                                              104KB

                                                            • memory/3832-481-0x0000021157DC0000-0x00000211589F8000-memory.dmp

                                                              Filesize

                                                              12.2MB

                                                            • memory/3832-477-0x000002113E5B0000-0x000002113E5B6000-memory.dmp

                                                              Filesize

                                                              24KB

                                                            • memory/3832-475-0x0000021157080000-0x00000211570DE000-memory.dmp

                                                              Filesize

                                                              376KB

                                                            • memory/3832-476-0x00000211570E0000-0x0000021157136000-memory.dmp

                                                              Filesize

                                                              344KB

                                                            • memory/3832-473-0x0000021156E90000-0x0000021156EB8000-memory.dmp

                                                              Filesize

                                                              160KB

                                                            • memory/3832-474-0x000002113E700000-0x000002113E706000-memory.dmp

                                                              Filesize

                                                              24KB

                                                            • memory/3832-471-0x0000000000370000-0x0000000000390000-memory.dmp

                                                              Filesize

                                                              128KB

                                                            • memory/3984-265-0x000001FCE8DE0000-0x000001FCE8FD4000-memory.dmp

                                                              Filesize

                                                              2.0MB

                                                            • memory/4936-23-0x00007FFD65470000-0x00007FFD65F31000-memory.dmp

                                                              Filesize

                                                              10.8MB

                                                            • memory/4936-22-0x00000220CDB20000-0x00000220CE70C000-memory.dmp

                                                              Filesize

                                                              11.9MB

                                                            • memory/4936-21-0x00007FFD65470000-0x00007FFD65F31000-memory.dmp

                                                              Filesize

                                                              10.8MB

                                                            • memory/4936-13-0x00000220B1A70000-0x00000220B26A8000-memory.dmp

                                                              Filesize

                                                              12.2MB

                                                            • memory/4936-12-0x00007FFD65473000-0x00007FFD65475000-memory.dmp

                                                              Filesize

                                                              8KB