Analysis

  • max time kernel
    118s
  • max time network
    120s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240802-en
  • submitted
    07-09-2024 00:56

General

  • Target

    0b95311ae7f66a65cd81cccf42f5b810N.exe

  • Size

    1.5MB

  • MD5

    0b95311ae7f66a65cd81cccf42f5b810

  • SHA1

    4cc872770e027f393e430bc15b8a7d82853484bb

  • SHA256

    a4a98c21e59906959e20d4a3e7125cfb637fee93d195f60c1cacb91e2503c3dd

  • SHA512

    1c02d42dccc91ab2beacaae8bccf5375022da7df343747df11f16810461ddd17fc1729f3616b19bdc6edff6dc70744bb48afcfbdab2b93cfca2cf579b204bc33

  • SSDEEP

    24576:ensJ39LyjbJkQFMhmC+6GD9Cal1RjbLoFvYgoVfxnP9CsQ34R7CF/m98vr:ensHyjtk2MYC5GDLbLoBYnxPg+p8D

Malware Config

Extracted

Family

xred

C2

xred.mooo.com

Attributes
  • email

    [email protected]

  • payload_url

    http://freedns.afraid.org/api/?action=getdyndns&sha=a30fa98efc092684e8d1c5cff797bcc613562978

    https://docs.google.com/uc?id=0BxsMXGfPIZfSVlVsOGlEVGxuZVk&export=download

    https://www.dropbox.com/s/n1w4p8gc6jzo0sg/SUpdate.ini?dl=1

    http://xred.site50.net/syn/SUpdate.ini

    https://docs.google.com/uc?id=0BxsMXGfPIZfSVzUyaHFYVkQxeFk&export=download

    https://www.dropbox.com/s/zhp1b06imehwylq/Synaptics.rar?dl=1

    http://xred.site50.net/syn/Synaptics.rar

    https://docs.google.com/uc?id=0BxsMXGfPIZfSTmlVYkxhSDg5TzQ&export=download

    https://www.dropbox.com/s/fzj752whr3ontsm/SSLLibrary.dll?dl=1

    http://xred.site50.net/syn/SSLLibrary.dll

Signatures

  • Xred

    Xred is backdoor written in Delphi.

  • Xred family
  • Checks computer location settings 2 TTPs 4 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Executes dropped EXE 11 IoCs
  • Adds Run key to start application 2 TTPs 1 IoCs
  • Drops file in Program Files directory 25 IoCs
  • Drops file in Windows directory 2 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Location Discovery: System Language Discovery 1 TTPs 8 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Checks processor information in registry 2 TTPs 3 IoCs

    Processor information is often read in order to detect sandboxing environments.

  • Enumerates system info in registry 2 TTPs 3 IoCs
  • Modifies registry class 2 IoCs
  • Suspicious behavior: AddClipboardFormatListener 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 6 IoCs
  • Suspicious use of AdjustPrivilegeToken 2 IoCs
  • Suspicious use of SetWindowsHookEx 9 IoCs
  • Suspicious use of WriteProcessMemory 27 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\0b95311ae7f66a65cd81cccf42f5b810N.exe
    "C:\Users\Admin\AppData\Local\Temp\0b95311ae7f66a65cd81cccf42f5b810N.exe"
    1⤵
    • Checks computer location settings
    • Adds Run key to start application
    • System Location Discovery: System Language Discovery
    • Modifies registry class
    • Suspicious use of WriteProcessMemory
    PID:2340
    • C:\Users\Admin\AppData\Local\Temp\._cache_0b95311ae7f66a65cd81cccf42f5b810N.exe
      "C:\Users\Admin\AppData\Local\Temp\._cache_0b95311ae7f66a65cd81cccf42f5b810N.exe"
      2⤵
      • Executes dropped EXE
      • Drops file in Windows directory
      • System Location Discovery: System Language Discovery
      • Suspicious use of WriteProcessMemory
      PID:2592
      • C:\Windows\svchost.exe
        "C:\Windows\svchost.exe" "C:\Users\Admin\AppData\Local\Temp\._cache_0b95311ae7f66a65cd81cccf42f5b810N.exe"
        3⤵
        • Executes dropped EXE
        • System Location Discovery: System Language Discovery
        • Suspicious use of WriteProcessMemory
        PID:3112
        • C:\Users\Admin\AppData\Local\Temp\._cache_0b95311ae7f66a65cd81cccf42f5b810N.exe
          "C:\Users\Admin\AppData\Local\Temp\._cache_0b95311ae7f66a65cd81cccf42f5b810N.exe"
          4⤵
          • Checks computer location settings
          • Executes dropped EXE
          • System Location Discovery: System Language Discovery
          • Suspicious use of WriteProcessMemory
          PID:380
          • C:\Users\Admin\AppData\Local\Temp\7zSC71AADC7\BlueStacksInstaller.exe
            "C:\Users\Admin\AppData\Local\Temp\7zSC71AADC7\BlueStacksInstaller.exe"
            5⤵
            • Executes dropped EXE
            • Suspicious behavior: EnumeratesProcesses
            • Suspicious use of AdjustPrivilegeToken
            • Suspicious use of WriteProcessMemory
            PID:3528
            • C:\Users\Admin\AppData\Local\Temp\7zSC71AADC7\HD-Hvutl.exe
              "C:\Users\Admin\AppData\Local\Temp\7zSC71AADC7\HD-Hvutl.exe" --cmd checkHypervEnabled
              6⤵
              • Executes dropped EXE
              PID:1824
    • C:\ProgramData\Synaptics\Synaptics.exe
      "C:\ProgramData\Synaptics\Synaptics.exe" InjUpdate
      2⤵
      • Checks computer location settings
      • Executes dropped EXE
      • System Location Discovery: System Language Discovery
      • Modifies registry class
      • Suspicious use of WriteProcessMemory
      PID:1952
      • C:\Users\Admin\AppData\Local\Temp\._cache_Synaptics.exe
        "C:\Users\Admin\AppData\Local\Temp\._cache_Synaptics.exe" InjUpdate
        3⤵
        • Executes dropped EXE
        • Drops file in Windows directory
        • System Location Discovery: System Language Discovery
        • Suspicious use of WriteProcessMemory
        PID:4408
        • C:\Windows\svchost.exe
          "C:\Windows\svchost.exe" "C:\Users\Admin\AppData\Local\Temp\._cache_Synaptics.exe" InjUpdate
          4⤵
          • Executes dropped EXE
          • System Location Discovery: System Language Discovery
          • Suspicious use of WriteProcessMemory
          PID:512
          • C:\Users\Admin\AppData\Local\Temp\._cache_Synaptics.exe
            "C:\Users\Admin\AppData\Local\Temp\._cache_Synaptics.exe" InjUpdate
            5⤵
            • Checks computer location settings
            • Executes dropped EXE
            • System Location Discovery: System Language Discovery
            • Suspicious use of WriteProcessMemory
            PID:2056
            • C:\Users\Admin\AppData\Local\Temp\7zS808291C7\BlueStacksInstaller.exe
              "C:\Users\Admin\AppData\Local\Temp\7zS808291C7\BlueStacksInstaller.exe" InjUpdate
              6⤵
              • Executes dropped EXE
              • Suspicious behavior: EnumeratesProcesses
              • Suspicious use of AdjustPrivilegeToken
              PID:2592
  • C:\Windows\svchost.exe
    C:\Windows\svchost.exe
    1⤵
    • Executes dropped EXE
    • Drops file in Program Files directory
    PID:4060
  • C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE
    "C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE" /automation -Embedding
    1⤵
    • Checks processor information in registry
    • Enumerates system info in registry
    • Suspicious behavior: AddClipboardFormatListener
    • Suspicious use of SetWindowsHookEx
    PID:4876

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\ProgramData\Synaptics\Synaptics.exe

    Filesize

    1.5MB

    MD5

    0b95311ae7f66a65cd81cccf42f5b810

    SHA1

    4cc872770e027f393e430bc15b8a7d82853484bb

    SHA256

    a4a98c21e59906959e20d4a3e7125cfb637fee93d195f60c1cacb91e2503c3dd

    SHA512

    1c02d42dccc91ab2beacaae8bccf5375022da7df343747df11f16810461ddd17fc1729f3616b19bdc6edff6dc70744bb48afcfbdab2b93cfca2cf579b204bc33

  • C:\Users\Admin\AppData\Local\BlueStacks\BlueStacksMicroInstaller_5.5.10.1001.log

    Filesize

    419B

    MD5

    c129a6a55cd70b8bc9060d565c44d322

    SHA1

    c9881176f1256138110668d4ab54da17e0ca0eb2

    SHA256

    e609d05039b778dde1c38be356fe0193a1b8bc12f786d4ed069570abed5e9b46

    SHA512

    7bba9b401840dda4287bd08540a011b35fdde0968e93dab69f5c82056f9a573cbb3a4a6df5cd08c4e8aec7fa25c4d6641d9beb6dc5eb2d316ba574caf36cdabf

  • C:\Users\Admin\AppData\Local\Temp\._cache_0b95311ae7f66a65cd81cccf42f5b810N.exe

    Filesize

    756KB

    MD5

    38879db2c80f3de4a790da1ddf096025

    SHA1

    8f7794861949350204213aeaee91cfa2349af62a

    SHA256

    fc774b995a45e2ffefbd9932677a97ad4de07742fc7cef7fb9b7f5e95e85a33b

    SHA512

    7417b23d023d7a11d5575995e4ecb02728ea983ea6a35469ec887178bc3868f02d8137f9b127976f7d165152a5e15d5ca72019bf117d9b56b7c979b2456eabaf

  • C:\Users\Admin\AppData\Local\Temp\._cache_0b95311ae7f66a65cd81cccf42f5b810N.exe

    Filesize

    791KB

    MD5

    51dcb9401857617e47cc17b3677ff410

    SHA1

    4a13844cbddf50a282a138489c234857b9ff52d1

    SHA256

    85ba41b87b1146079f539b869d6110c909ea347b9bbafaa7e69a47a1e694eb97

    SHA512

    b2aec057d29fb0d43431473f0a82fbfe1f5f878dd12e2e6a3d5c26bb0433a7ea8bed966451689fe64f0da8e506cc8346b74043bddae01aada7f3ffed5674d380

  • C:\Users\Admin\AppData\Local\Temp\._cache_Synaptics.exe

    Filesize

    756KB

    MD5

    1bba48c5b5cc96675450f2cc074fecfb

    SHA1

    bd8f07ec075ba827c5f8101b922ecfcdc0209073

    SHA256

    9d649dc7a5fcc340a8b82221c4709ad3aeba8f0a40e755b408698315bbd889cb

    SHA512

    71a10579ef7ee846b718a3aef0b44a3b96bbc53c08d04aa6ca48357716513e5fdc9f69604abc051e9f97a1e6131c8feca86f8fe469f4e62cf783cc0e30e60fdc

  • C:\Users\Admin\AppData\Local\Temp\7zS808291C7\Assets\exit_close.png

    Filesize

    670B

    MD5

    26eb04b9e0105a7b121ea9c6601bbf2a

    SHA1

    efc08370d90c8173df8d8c4b122d2bb64c07ccd8

    SHA256

    7aaef329ba9fa052791d1a09f127551289641ea743baba171de55faa30ec1157

    SHA512

    9df3c723314d11a6b4ce0577eb61488061f2f96a9746a944eb6a4ee8c0c4d29131231a1b20988ef5454b79f9475b43d62c710839ecc0a9c98324f977cab6db68

  • C:\Users\Admin\AppData\Local\Temp\7zS808291C7\Assets\minimize_progress.png

    Filesize

    212B

    MD5

    1504b80f2a6f2d3fefc305da54a2a6c2

    SHA1

    432a9d89ebc2f693836d3c2f0743ea5d2077848d

    SHA256

    2f62d4e8c643051093f907058dddc78cc525147d9c4f4a0d78b4d0e5c90979f6

    SHA512

    675db04baf3199c8d94af30a1f1c252830a56a90f633c3a72aa9841738b04242902a5e7c56dd792626338e8b7eabc1f359514bb3a2e62bc36c16919e196cfd94

  • C:\Users\Admin\AppData\Local\Temp\7zSC71AADC7\Assets\backicon.png

    Filesize

    15KB

    MD5

    7ff5dc8270b5fa7ef6c4a1420bd67a7f

    SHA1

    b224300372feaa97d882ca2552b227c0f2ef4e3e

    SHA256

    fa64884054171515e97b78aaa1aad1ec5baa9d1daf9c682e0b3fb4a41a9cb1c1

    SHA512

    f0d5a842a01b99f189f3d46ab59d2c388a974951b042b25bbce54a15f5a3f386984d19cfca22ba1440eebd79260066a37dfeff6cb0d1332fca136add14488eef

  • C:\Users\Admin\AppData\Local\Temp\7zSC71AADC7\Assets\checked_gray.png

    Filesize

    538B

    MD5

    ce144d2aab3bf213af693d4e18f87a59

    SHA1

    df59dc3dbba88bdc5ffc25f2e5e7b73ac3de5afa

    SHA256

    d8e502fab00b0c6f06ba6abede6922ab3b423fe6f2d2f56941dabc887b229ad3

    SHA512

    0f930edd485a0d49ef157f6cc8856609c087c91b77845adeb5cc8c8a80ebc7ec5416df351ffa1af780caad884dbb49dcc778b0b30de6fb7c85ffef22d7220ebe

  • C:\Users\Admin\AppData\Local\Temp\7zSC71AADC7\Assets\close_red.png

    Filesize

    15KB

    MD5

    93216b2f9d66d423b3e1311c0573332d

    SHA1

    5efaebec5f20f91f164f80d1e36f98c9ddaff805

    SHA256

    d0b6d143642d356b40c47459a996131a344cade6bb86158f1b74693426b09bfb

    SHA512

    922a7292de627c5e637818556d25d9842a88e89f2b198885835925679500dfd44a1e25ce79e521e63c4f84a6b0bd6bf98e46143ad8cee80ecdbaf3d3bc0f3a32

  • C:\Users\Admin\AppData\Local\Temp\7zSC71AADC7\Assets\custom.png

    Filesize

    17KB

    MD5

    03b17f0b1c067826b0fcc6746cced2cb

    SHA1

    e07e4434e10df4d6c81b55fceb6eca2281362477

    SHA256

    fbece8bb5f4dfa55dcfbf41151b10608af807b9477e99acf0940954a11e68f7b

    SHA512

    67c78ec01e20e9c8d9cdbba665bb2fd2bb150356f30b88d3d400bbdb0ae92010f5d7bcb683dcf6f895722a9151d8e669d8bef913eb6e728ba56bb02f264573b2

  • C:\Users\Admin\AppData\Local\Temp\7zSC71AADC7\Assets\installer_bg.jpg

    Filesize

    42KB

    MD5

    162c23f5962381efba79be503b41089c

    SHA1

    fc5a95e6eb2bb015fe27457873528c24b3bc459d

    SHA256

    04d70d0968675290294df78800ed48fe4a681a72803405fbdc541b927b445457

    SHA512

    9bd6e634d6cb362ab40f2646ca59a865f05e6049ac55b9d03b3df1f8e853715119438771196a351ca98c6cb61a212bbc0bedb7bf2d306563f6198353a7680c54

  • C:\Users\Admin\AppData\Local\Temp\7zSC71AADC7\Assets\installer_logo.png

    Filesize

    7KB

    MD5

    d6f746b61d5c91d6688faab54ecc74c3

    SHA1

    9581cafbc93d6189c7e0633bd43dfd017510f731

    SHA256

    ed7e205b0ccdd454d4fa47c48834ad36a6e9fb51f4042a2dcd39a7fe01244d95

    SHA512

    0139711388976628ebd46a2f1dc7e0c38184d3b4ab63a8f2b6c8cd9e6032cddcd2dafb8ce4ab3ba8008beba9d6c3e444577cd7953bb48e39635e5c9666fdf478

  • C:\Users\Admin\AppData\Local\Temp\7zSC71AADC7\Assets\installer_minimize.png

    Filesize

    113B

    MD5

    38b539a1e4229738e5c196eedb4eb225

    SHA1

    f027b08dce77c47aaed75a28a2fce218ff8c936c

    SHA256

    a064f417e3c2b8f3121a14bbded268b2cdf635706880b7006f931de31476bbc2

    SHA512

    2ce433689a94fae454ef65e0e9ec33657b89718bbb5a038bf32950f6d68722803922f3a427278bad432395a1716523e589463fcce4279dc2a895fd77434821cc

  • C:\Users\Admin\AppData\Local\Temp\7zSC71AADC7\Assets\loader.png

    Filesize

    279B

    MD5

    03903fd42ed2ee3cb014f0f3b410bcb4

    SHA1

    762a95240607fe8a304867a46bc2d677f494f5c2

    SHA256

    076263cc65f9824f4f82eb6beaa594d1df90218a2ee21664cf209181557e04b1

    SHA512

    8b0e717268590e5287c07598a06d89220c5e9a33cd1c29c55f8720321f4b3efc869d20c61fcc892e13188d77f0fdc4c73a2ee6dece174bf876fcc3a6c5683857

  • C:\Users\Admin\AppData\Local\Temp\7zSC71AADC7\Assets\setpath.png

    Filesize

    15KB

    MD5

    b2e7f40179744c74fded932e829cb12a

    SHA1

    a0059ab8158a497d2cf583a292b13f87326ec3f0

    SHA256

    5bbb2f41f9f3a805986c3c88a639bcc22d90067d4b8de9f1e21e3cf9e5c1766b

    SHA512

    b95b7ebdb4a74639276eaa5c055fd8d9431e2f58a5f7c57303f7cf22e8b599f6f2a7852074cf71b19b49eb31cc9bf2509aedf41d608981d116e49a00030c797c

  • C:\Users\Admin\AppData\Local\Temp\7zSC71AADC7\Assets\unchecked_gray.png

    Filesize

    192B

    MD5

    e50df2a0768f7fc4c3fe8d784564fea3

    SHA1

    d1fc4db50fe8e534019eb7ce70a61fd4c954621a

    SHA256

    671f26795b12008fbea1943143f660095f3dca5d925f67d765e2352fd7ee2396

    SHA512

    c87a8308a73b17cbdd179737631fb1ba7fdaeb65e82263f6617727519b70a81266bb695867b9e599c1306ee2cf0de525452f77ce367ca89bf870ea3ae7189998

  • C:\Users\Admin\AppData\Local\Temp\7zSC71AADC7\BlueStacksInstaller.exe

    Filesize

    547KB

    MD5

    6e649a25d5cc4922c49fd6f63522e8c1

    SHA1

    77628b8f93d4d751e108a01c4d8fca0385635d13

    SHA256

    2bbc833a2b3d23b6990d400c0064c909f22c50259531046f6e3b407a46f70bbd

    SHA512

    630165ecad1ef06fc88b4a699e70888f7136a3f60523715015bc06ba407e736e45c75a4f75bca3a2185f03c7599d4201e691b78ead28dab79b0e20b1d3129238

  • C:\Users\Admin\AppData\Local\Temp\7zSC71AADC7\BlueStacksInstaller.exe.config

    Filesize

    324B

    MD5

    1b456d88546e29f4f007cd0bf1025703

    SHA1

    e5c444fcfe5baf2ef71c1813afc3f2c1100cab86

    SHA256

    d6d316584b63bb0d670a42f88b8f84e0de0db4275f1a342084dc383ebeb278eb

    SHA512

    c545e416c841b8786e4589fc9ca2b732b16cdd759813ec03f558332f2436f165ec1ad2fbc65012b5709fa19ff1e8396639c17bfad150cabeb51328a39ea556e6

  • C:\Users\Admin\AppData\Local\Temp\7zSC71AADC7\HD-Hvutl.exe

    Filesize

    236KB

    MD5

    4cc86d695c4d1c1b2afddf1d4730b670

    SHA1

    5b91bd0d9b4c699393a041a2bae8b4192c01781b

    SHA256

    179bb310762df382a5a0201651251429bf45283d7088aeecd6d42af4bd9fa399

    SHA512

    65e7d7c88eb2300231b22279441c64b84e6f3d0091ecf317f997504b43c7e0088a3edb447c15198fbeabe6a11e904d89a28a24736417aade0b3590cfc105c1c9

  • C:\Users\Admin\AppData\Local\Temp\7zSC71AADC7\JSON.dll

    Filesize

    411KB

    MD5

    f5fd966e29f5c359f78cb61a571d1be4

    SHA1

    a55e7ed593b4bc7a77586da0f1223cfd9d51a233

    SHA256

    d2c8d26f95f55431e632c8581154db7c19547b656380e051194a9d2583dd2156

    SHA512

    d99e6fe250bb106257f86135938635f6e7ad689b2c11a96bb274f4c4c5e9a85cfacba40122dbc953f77b5d33d886c6af30bff821f10945e15b21a24b66f6c8be

  • C:\Users\Admin\AppData\Local\Temp\7zSC71AADC7\Locales\i18n.en-US.txt

    Filesize

    14KB

    MD5

    11a1ed0cd63272586ad687e031fb249d

    SHA1

    d79f0f69b0939002cfc19f83d42a184653b4678c

    SHA256

    7f950d0a5382c8326427b87a0fdeca0ea6eee6bb73c13b5d4364041de64fc718

    SHA512

    1bb0d78a9cac231406eb85399103991fe4f172f02dda95f5137b0ce88c8f21bbdcb5cd4de1a7eaa75614bf9fb5bf459b60ad6b9a9a6a8209e1944b95082a2d3c

  • C:\Users\Admin\AppData\Local\Temp\7zSC71AADC7\ThemeFile

    Filesize

    80KB

    MD5

    c3e6bab4f92ee40b9453821136878993

    SHA1

    94493a6b3dfb3135e5775b7d3be227659856fbc4

    SHA256

    de1a2e6b560e036da5ea6b042e29e81a5bfcf67dde89670c332fc5199e811ba6

    SHA512

    a64b6b06b3a0f3591892b60e59699682700f4018b898efe55d6bd5fb417965a55027671c58092d1eb7e21c2dbac42bc68dfb8c70468d98bed45a8cff0e945895

  • C:\Users\Admin\AppData\Local\Temp\9FD75E00

    Filesize

    23KB

    MD5

    31c0dae8280a28c6d088e2a9aa952669

    SHA1

    74f9b43d89f635af8e1096dd9db4cbae9ba89a2d

    SHA256

    a8b4343e2c7a9ca3c610e7e42d2e8df2b69591ba74d31eadfaf77de8c2c83458

    SHA512

    603c4bc5ae2e1c78c34997672d6de4697b95fcb9f5549ff95fdcb1d389c0a3b0d634e471139691ea0721f0bb6a897c82ec12c2fe1a718a063f270262ebe7fa8d

  • C:\Users\Admin\AppData\Local\Temp\POSFR56s.xlsm

    Filesize

    17KB

    MD5

    e566fc53051035e1e6fd0ed1823de0f9

    SHA1

    00bc96c48b98676ecd67e81a6f1d7754e4156044

    SHA256

    8e574b4ae6502230c0829e2319a6c146aebd51b7008bf5bbfb731424d7952c15

    SHA512

    a12f56ff30ea35381c2b8f8af2446cf1daa21ee872e98cad4b863db060acd4c33c5760918c277dadb7a490cb4ca2f925d59c70dc5171e16601a11bc4a6542b04

  • C:\Windows\svchost.exe

    Filesize

    35KB

    MD5

    9e3c13b6556d5636b745d3e466d47467

    SHA1

    2ac1c19e268c49bc508f83fe3d20f495deb3e538

    SHA256

    20af03add533a6870d524a7c4753b42bfceb56cddd46016c051e23581ba743f8

    SHA512

    5a07ba8a7fcb15f64b129fada2621252b8bc37eb34d4f614c075c064f8ac0d367301eba0c32c5e28b8aa633f6ab604f0dfcc363b34734ce0207ef0d4e8817c4b

  • memory/512-327-0x0000000000400000-0x000000000040D000-memory.dmp

    Filesize

    52KB

  • memory/1952-539-0x0000000000400000-0x0000000000588000-memory.dmp

    Filesize

    1.5MB

  • memory/1952-585-0x0000000000400000-0x0000000000588000-memory.dmp

    Filesize

    1.5MB

  • memory/2340-0-0x0000000002440000-0x0000000002441000-memory.dmp

    Filesize

    4KB

  • memory/2340-136-0x0000000000400000-0x0000000000588000-memory.dmp

    Filesize

    1.5MB

  • memory/2592-65-0x0000000000400000-0x0000000000427000-memory.dmp

    Filesize

    156KB

  • memory/2592-492-0x000000001DE50000-0x000000001DE58000-memory.dmp

    Filesize

    32KB

  • memory/3112-146-0x0000000000400000-0x000000000040D000-memory.dmp

    Filesize

    52KB

  • memory/3528-489-0x0000000020AF0000-0x0000000020B28000-memory.dmp

    Filesize

    224KB

  • memory/3528-464-0x000000001DA50000-0x000000001DF78000-memory.dmp

    Filesize

    5.2MB

  • memory/3528-317-0x0000000000740000-0x00000000007CC000-memory.dmp

    Filesize

    560KB

  • memory/3528-442-0x000000001CC70000-0x000000001CCD8000-memory.dmp

    Filesize

    416KB

  • memory/3528-490-0x0000000020220000-0x000000002022E000-memory.dmp

    Filesize

    56KB

  • memory/4060-540-0x0000000000400000-0x000000000040D000-memory.dmp

    Filesize

    52KB

  • memory/4060-561-0x0000000000400000-0x000000000040D000-memory.dmp

    Filesize

    52KB

  • memory/4408-321-0x0000000000400000-0x0000000000427000-memory.dmp

    Filesize

    156KB

  • memory/4876-455-0x00007FFBB2DD0000-0x00007FFBB2DE0000-memory.dmp

    Filesize

    64KB

  • memory/4876-443-0x00007FFBB2DD0000-0x00007FFBB2DE0000-memory.dmp

    Filesize

    64KB

  • memory/4876-335-0x00007FFBB4FF0000-0x00007FFBB5000000-memory.dmp

    Filesize

    64KB

  • memory/4876-336-0x00007FFBB4FF0000-0x00007FFBB5000000-memory.dmp

    Filesize

    64KB

  • memory/4876-439-0x00007FFBB4FF0000-0x00007FFBB5000000-memory.dmp

    Filesize

    64KB

  • memory/4876-337-0x00007FFBB4FF0000-0x00007FFBB5000000-memory.dmp

    Filesize

    64KB

  • memory/4876-400-0x00007FFBB4FF0000-0x00007FFBB5000000-memory.dmp

    Filesize

    64KB