Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    361s
  • max time network
    354s
  • platform
    windows10-ltsc 2021_x64
  • resource
    win10ltsc2021-20241023-en
  • resource tags

    arch:x64arch:x86image:win10ltsc2021-20241023-enlocale:en-usos:windows10-ltsc 2021-x64system
  • submitted
    07/11/2024, 01:34

General

  • Target

    temp.rar

  • Size

    1.3MB

  • MD5

    45817b3b5dbd2b3f0f4b5716651e5781

  • SHA1

    283757c4bbc4c1202234d1999f024adab8e2c2a7

  • SHA256

    0d9cad0c0e4b58ef3cf1537b5888071e4e7a90091da2848745559605fcbcefc2

  • SHA512

    227ca7fbe2b3b502c9ef13e501184300ff0940c616c326d78968d056b7d6c9a77e99b3e2da9a0be32dc1ceb988c49610f7273bfee520cd1734e29ecd3f9d0e36

  • SSDEEP

    24576:y1KK6ImbokiLRq3dieSQiua9oxaAPaNTEoBFgPeO6Uid27ku2GPxn9O/H52:ycCoo5L4Nn/s+xRPal7Sj6Uid27kuBxR

Malware Config

Extracted

Family

xred

C2

xred.mooo.com

Attributes
  • email

    [email protected]

  • payload_url

    http://freedns.afraid.org/api/?action=getdyndns&sha=a30fa98efc092684e8d1c5cff797bcc613562978

    https://docs.google.com/uc?id=0BxsMXGfPIZfSVlVsOGlEVGxuZVk&export=download

    https://www.dropbox.com/s/n1w4p8gc6jzo0sg/SUpdate.ini?dl=1

    http://xred.site50.net/syn/SUpdate.ini

    https://docs.google.com/uc?id=0BxsMXGfPIZfSVzUyaHFYVkQxeFk&export=download

    https://www.dropbox.com/s/zhp1b06imehwylq/Synaptics.rar?dl=1

    http://xred.site50.net/syn/Synaptics.rar

    https://docs.google.com/uc?id=0BxsMXGfPIZfSTmlVYkxhSDg5TzQ&export=download

    https://www.dropbox.com/s/fzj752whr3ontsm/SSLLibrary.dll?dl=1

    http://xred.site50.net/syn/SSLLibrary.dll

Signatures

  • Xred

    Xred is backdoor written in Delphi.

  • Xred family
  • Downloads MZ/PE file
  • Sets service image path in registry 2 TTPs 5 IoCs
  • Checks computer location settings 2 TTPs 2 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Executes dropped EXE 8 IoCs
  • Loads dropped DLL 6 IoCs
  • Adds Run key to start application 2 TTPs 1 IoCs
  • Drops file in System32 directory 14 IoCs
  • Drops file in Program Files directory 10 IoCs
  • Drops file in Windows directory 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Location Discovery: System Language Discovery 1 TTPs 21 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • System Network Configuration Discovery: Internet Connection Discovery 1 TTPs 5 IoCs

    Adversaries may check for Internet connectivity on compromised systems.

  • Checks processor information in registry 2 TTPs 3 IoCs

    Processor information is often read in order to detect sandboxing environments.

  • Enumerates system info in registry 2 TTPs 6 IoCs
  • Modifies registry class 2 IoCs
  • Opens file in notepad (likely ransom note) 1 IoCs
  • Runs net.exe
  • Suspicious behavior: AddClipboardFormatListener 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 10 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 2 IoCs
  • Suspicious behavior: LoadsDriver 5 IoCs
  • Suspicious use of AdjustPrivilegeToken 64 IoCs
  • Suspicious use of FindShellTrayWindow 4 IoCs
  • Suspicious use of SetWindowsHookEx 9 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs

Processes

  • C:\Program Files\7-Zip\7zFM.exe
    "C:\Program Files\7-Zip\7zFM.exe" "C:\Users\Admin\AppData\Local\Temp\temp.rar"
    1⤵
    • Suspicious behavior: GetForegroundWindowSpam
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of FindShellTrayWindow
    PID:4216
  • C:\Windows\System32\rundll32.exe
    C:\Windows\System32\rundll32.exe C:\Windows\System32\shell32.dll,SHCreateLocalServerRunDll {9aa46009-3ce0-458a-a354-715610a075e6} -Embedding
    1⤵
      PID:2940
    • C:\Windows\system32\NOTEPAD.EXE
      "C:\Windows\system32\NOTEPAD.EXE" C:\Users\Admin\Desktop\temp\X0f4dXjaxXHoWyCqkmhXv.txt
      1⤵
      • Opens file in notepad (likely ransom note)
      PID:3392
    • C:\Users\Admin\Desktop\temp\Plasma Temp.exe
      "C:\Users\Admin\Desktop\temp\Plasma Temp.exe"
      1⤵
      • Checks computer location settings
      • Executes dropped EXE
      • Adds Run key to start application
      • System Location Discovery: System Language Discovery
      • Modifies registry class
      • Suspicious use of WriteProcessMemory
      PID:1108
      • C:\Users\Admin\Desktop\temp\._cache_Plasma Temp.exe
        "C:\Users\Admin\Desktop\temp\._cache_Plasma Temp.exe"
        2⤵
        • Checks computer location settings
        • Executes dropped EXE
        • Loads dropped DLL
        • Drops file in Program Files directory
        • System Location Discovery: System Language Discovery
        • Enumerates system info in registry
        • Suspicious use of AdjustPrivilegeToken
        • Suspicious use of WriteProcessMemory
        PID:64
        • C:\Windows\SysWOW64\getmac.exe
          "getmac"
          3⤵
          • System Location Discovery: System Language Discovery
          PID:3268
        • C:\Windows\SysWOW64\cmd.exe
          "C:\Windows\System32\cmd.exe" /c "C:\Program Files\Snippingtool\plasmasetup.bat"
          3⤵
          • System Location Discovery: System Language Discovery
          • System Network Configuration Discovery: Internet Connection Discovery
          • Suspicious use of WriteProcessMemory
          PID:2472
          • C:\Windows\SysWOW64\net.exe
            net stop winmgmt
            4⤵
            • System Location Discovery: System Language Discovery
            • Suspicious use of WriteProcessMemory
            PID:3528
            • C:\Windows\SysWOW64\net1.exe
              C:\Windows\system32\net1 stop winmgmt
              5⤵
              • System Location Discovery: System Language Discovery
              PID:3576
          • C:\Program Files\Snippingtool\mapper.exe
            "C:\Program Files\Snippingtool\mapper.exe" spoof.sys .data
            4⤵
            • Sets service image path in registry
            • Executes dropped EXE
            • Drops file in Program Files directory
            • Suspicious behavior: EnumeratesProcesses
            • Suspicious behavior: LoadsDriver
            • Suspicious use of AdjustPrivilegeToken
            PID:3676
        • C:\Windows\SysWOW64\cmd.exe
          "C:\Windows\System32\cmd.exe" /c "C:\Program Files\Snippingtool\plasmasetup.bat"
          3⤵
          • System Location Discovery: System Language Discovery
          • System Network Configuration Discovery: Internet Connection Discovery
          • Suspicious use of WriteProcessMemory
          PID:3392
          • C:\Windows\SysWOW64\net.exe
            net stop winmgmt
            4⤵
            • System Location Discovery: System Language Discovery
            • Suspicious use of WriteProcessMemory
            PID:716
            • C:\Windows\SysWOW64\net1.exe
              C:\Windows\system32\net1 stop winmgmt
              5⤵
              • System Location Discovery: System Language Discovery
              PID:3296
          • C:\Program Files\Snippingtool\mapper.exe
            "C:\Program Files\Snippingtool\mapper.exe" spoof.sys .data
            4⤵
            • Sets service image path in registry
            • Executes dropped EXE
            • Drops file in Program Files directory
            • Suspicious behavior: EnumeratesProcesses
            • Suspicious behavior: LoadsDriver
            • Suspicious use of AdjustPrivilegeToken
            PID:4676
        • C:\Windows\SysWOW64\getmac.exe
          "getmac"
          3⤵
          • System Location Discovery: System Language Discovery
          PID:3828
        • C:\Windows\SysWOW64\cmd.exe
          "C:\Windows\System32\cmd.exe" /c "C:\Program Files\Snippingtool\plasmasetup.bat"
          3⤵
          • System Location Discovery: System Language Discovery
          • System Network Configuration Discovery: Internet Connection Discovery
          • Suspicious use of WriteProcessMemory
          PID:4868
          • C:\Windows\SysWOW64\net.exe
            net stop winmgmt
            4⤵
            • System Location Discovery: System Language Discovery
            • Suspicious use of WriteProcessMemory
            PID:444
            • C:\Windows\SysWOW64\net1.exe
              C:\Windows\system32\net1 stop winmgmt
              5⤵
              • System Location Discovery: System Language Discovery
              PID:2524
          • C:\Program Files\Snippingtool\mapper.exe
            "C:\Program Files\Snippingtool\mapper.exe" spoof.sys .data
            4⤵
            • Sets service image path in registry
            • Executes dropped EXE
            • Drops file in Program Files directory
            • Suspicious behavior: EnumeratesProcesses
            • Suspicious behavior: LoadsDriver
            PID:3832
        • C:\Windows\SysWOW64\getmac.exe
          "getmac"
          3⤵
          • System Location Discovery: System Language Discovery
          PID:1140
        • C:\Windows\SysWOW64\cmd.exe
          "C:\Windows\System32\cmd.exe" /c "C:\Program Files\Snippingtool\plasmasetup.bat"
          3⤵
          • System Location Discovery: System Language Discovery
          • System Network Configuration Discovery: Internet Connection Discovery
          • Suspicious use of WriteProcessMemory
          PID:4592
          • C:\Windows\SysWOW64\net.exe
            net stop winmgmt
            4⤵
            • System Location Discovery: System Language Discovery
            • Suspicious use of WriteProcessMemory
            PID:2844
            • C:\Windows\SysWOW64\net1.exe
              C:\Windows\system32\net1 stop winmgmt
              5⤵
              • System Location Discovery: System Language Discovery
              PID:416
          • C:\Program Files\Snippingtool\mapper.exe
            "C:\Program Files\Snippingtool\mapper.exe" spoof.sys .data
            4⤵
            • Sets service image path in registry
            • Executes dropped EXE
            • Drops file in Program Files directory
            • Suspicious behavior: EnumeratesProcesses
            • Suspicious behavior: LoadsDriver
            PID:2708
        • C:\Windows\SysWOW64\cmd.exe
          "C:\Windows\System32\cmd.exe" /c "C:\Program Files\Snippingtool\plasmasetup.bat"
          3⤵
          • System Location Discovery: System Language Discovery
          • System Network Configuration Discovery: Internet Connection Discovery
          • Suspicious use of WriteProcessMemory
          PID:3340
          • C:\Windows\SysWOW64\net.exe
            net stop winmgmt
            4⤵
            • System Location Discovery: System Language Discovery
            PID:3808
            • C:\Windows\SysWOW64\net1.exe
              C:\Windows\system32\net1 stop winmgmt
              5⤵
              • System Location Discovery: System Language Discovery
              PID:3356
          • C:\Program Files\Snippingtool\mapper.exe
            "C:\Program Files\Snippingtool\mapper.exe" spoof.sys .data
            4⤵
            • Sets service image path in registry
            • Executes dropped EXE
            • Drops file in Program Files directory
            • Suspicious behavior: EnumeratesProcesses
            • Suspicious behavior: LoadsDriver
            PID:3120
      • C:\ProgramData\Synaptics\Synaptics.exe
        "C:\ProgramData\Synaptics\Synaptics.exe" InjUpdate
        2⤵
        • Executes dropped EXE
        • Loads dropped DLL
        • System Location Discovery: System Language Discovery
        PID:2236
    • C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE
      "C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE" /automation -Embedding
      1⤵
      • Checks processor information in registry
      • Enumerates system info in registry
      • Suspicious behavior: AddClipboardFormatListener
      • Suspicious use of SetWindowsHookEx
      PID:2732
    • C:\Windows\System32\rundll32.exe
      C:\Windows\System32\rundll32.exe shell32.dll,SHCreateLocalServerRunDll {c82192ee-6cb5-4bc0-9ef0-fb818773790a} -Embedding
      1⤵
        PID:1032
      • C:\Windows\system32\svchost.exe
        C:\Windows\system32\svchost.exe -k netsvcs -p -s Winmgmt
        1⤵
        • Drops file in System32 directory
        • Suspicious use of AdjustPrivilegeToken
        PID:3848
      • C:\Windows\system32\svchost.exe
        C:\Windows\system32\svchost.exe -k netsvcs -p -s Winmgmt
        1⤵
        • Drops file in System32 directory
        PID:4620
      • C:\Program Files\7-Zip\7zG.exe
        "C:\Program Files\7-Zip\7zG.exe" a -i#7zMap11135:36:7zEvent27309 -ad -saa -- "C:\Windows\Fonts"
        1⤵
        • Drops file in Windows directory
        • Suspicious use of FindShellTrayWindow
        PID:1836
      • C:\Windows\system32\OpenWith.exe
        C:\Windows\system32\OpenWith.exe -Embedding
        1⤵
        • Modifies registry class
        • Suspicious use of SetWindowsHookEx
        PID:2688
      • C:\Program Files\7-Zip\7zFM.exe
        "C:\Program Files\7-Zip\7zFM.exe" "C:\Users\Admin\Desktop\erigu.7z"
        1⤵
        • Suspicious behavior: GetForegroundWindowSpam
        • Suspicious use of FindShellTrayWindow
        PID:4652

      Network

      MITRE ATT&CK Enterprise v15

      Replay Monitor

      Loading Replay Monitor...

      Downloads

      • C:\Program Files\Snippingtool\mapper.exe

        Filesize

        142KB

        MD5

        e3bf7e9eae9469ecea8e908c5acdd9f4

        SHA1

        6524e87ef540ed86de0ec862fd5952525e3c2bd1

        SHA256

        c15ac8da60074efc3df172060997e7a6962cb49e4a13460adb1d3b7bdda2ff9d

        SHA512

        c3fd98b6c301e0f5280d4583344cc2f49fc92095258d85e71bb30fba3814cc269ddb84ff8e769f1dc3c7d6c660b6437c30c1e698b8a7bc9026720e4c55cfb1d8

      • C:\Program Files\Snippingtool\plasmasetup.bat

        Filesize

        610B

        MD5

        c8dd3213843acb63eb3c5059878f5edb

        SHA1

        38d9e307625a0ae8f369cc72e3629db791e56a76

        SHA256

        a12ba7960473414dbb5ed71d333d53b8867f73cdfcfbc18bd88ad68c7ea31b39

        SHA512

        3e05a27d578827f73e908d1521ffc8fc6bacdad9cfb3887125b4f456c9fb4e6c59bf954cbf5bd01d56347fe69ca31dd3f7e7d0d17c6128689623e09c69635116

      • C:\Program Files\Snippingtool\spoof.sys

        Filesize

        24KB

        MD5

        2f4e8e112f4ba3a590b7d82ae1560408

        SHA1

        1147d3e95752a48e5d9c48fb9f2da818acbe93a5

        SHA256

        938737343419255ebcf31b29a33e9af083535c0b12f72ab7eeafc6d63dd6ab8b

        SHA512

        3dcf49d4cd2b2f3ef5e95eb795aa9dd740f424b0e2789d7fe35b0cd2f7f9db37f3ebcdc7ae8a9f22071d5119cc2a6b6c8df35f9c6fffd38d72abddf6355de0ad

      • C:\Program Files\Snippingtool\symbols\46bd5bd5b4ac076025e641070546ecc0.pdb

        Filesize

        907KB

        MD5

        34a108d0ba2d7c6b1d72b69fe8861891

        SHA1

        67edc61c4c71c4ed43835f7173c6f9c4a70e61ac

        SHA256

        94ae9a107b118bfa3f734c73d8d270562d16c5d9d6c23d8831561a24bd77aaf6

        SHA512

        46a82cdd2d8019d09c4913f1929b438108f09ec07adc684196810386769f5d181b06ebdb4bbec4ce8785e34f6f75398a85779b4bce210d8284eb5e8a5b453440

      • C:\Program Files\Snippingtool\symbols\46bd5bd5b4ac076025e641070546ecc0.pdb.md5

        Filesize

        32B

        MD5

        022320318ace6cfa12f139874dad086c

        SHA1

        b330f387cf3844997fe314949ccb54b735eb01a9

        SHA256

        0d912c3170bcc85fcca9349b572027691cb05bb51901645da05c0aed8a3e36a9

        SHA512

        33706e4f5e5993f3b65f7d1a1b1e22a58f424281a59cf15cf13d3ffbe3e5fb305a24ca601259ff33e4004b6ab2aca93dcac536e9b3dd8f9e92751dfa194e6ea4

      • C:\ProgramData\Synaptics\Synaptics.exe

        Filesize

        753KB

        MD5

        b753207b14c635f29b2abf64f603570a

        SHA1

        8a40e828224f22361b09494a556a20db82fc97b9

        SHA256

        7f16106f3354a65fc749737905b77df7bbefa28bf8bbc966dc1f8c53fa4660f2

        SHA512

        0dd32803b95d53badd33c0c84df1002451090ff5f74736680e3a53a0bfc0e723eee7d795626bc10a1fb431de7e6e276c5a66349ef385a8b92b48425b0bdd036f

      • C:\Users\Admin\AppData\Local\Temp\5DF75E00

        Filesize

        22KB

        MD5

        bca47f278dfd145c2898b1df5de77ea9

        SHA1

        6293a0967b0053f5917b8731396e2a530d425dde

        SHA256

        e9e3c9175ec6f13c82d38ef475e36b757c660eaca53ae1498cbee1c81c3cf3cc

        SHA512

        6ef4c2978fec121c308443337f607272fd60131a3d29d7c361af46d5397dd7510ec7d2fd2eda41d3c07fbeb97f698a998e71b055afaee2a1ca03b1a91c60959a

      • C:\Users\Admin\AppData\Local\Temp\BYKGjVve.xlsm

        Filesize

        17KB

        MD5

        e566fc53051035e1e6fd0ed1823de0f9

        SHA1

        00bc96c48b98676ecd67e81a6f1d7754e4156044

        SHA256

        8e574b4ae6502230c0829e2319a6c146aebd51b7008bf5bbfb731424d7952c15

        SHA512

        a12f56ff30ea35381c2b8f8af2446cf1daa21ee872e98cad4b863db060acd4c33c5760918c277dadb7a490cb4ca2f925d59c70dc5171e16601a11bc4a6542b04

      • C:\Users\Admin\AppData\Local\Temp\fWPPagQAYkjWoelOQ

        Filesize

        13KB

        MD5

        2d8e4f38b36c334d0a32a7324832501d

        SHA1

        f6f11ad2cd2b0cf95ed42324876bee1d83e01775

        SHA256

        01aa278b07b58dc46c84bd0b1b5c8e9ee4e62ea0bf7a695862444af32e87f1fd

        SHA512

        b0329590d2402ddb6dc98553be3cdc48e0e70cd9797a44b6448b97ca31754b999beeebf593225a6254fdddaa9453920431dd8eae894732b6e6438e5b2d8a72fd

      • C:\Users\Admin\Desktop\temp\._cache_Plasma Temp.exe

        Filesize

        124KB

        MD5

        a73e87a0ad626312ace6eb56fd8f4133

        SHA1

        e2e803af903fd1f0863952be481106d5a6993646

        SHA256

        1017b3d548aadc0fe735460d50424f2f4d7ac70b506ed8c55d6857a62d83dd9c

        SHA512

        8b5093f20443a730cc51a4d247a5594bd91305ba81ebd9d3f860b49c770c03adb1665e9123e939f1cce4ba8f4d639009c356d6ff98def3ec501459136fc950ad

      • C:\Users\Admin\Desktop\temp\Guna.UI2.dll

        Filesize

        2.1MB

        MD5

        c19e9e6a4bc1b668d19505a0437e7f7e

        SHA1

        73be712aef4baa6e9dabfc237b5c039f62a847fa

        SHA256

        9ac8b65e5c13292a8e564187c1e7446adc4230228b669383bd7b07035ab99a82

        SHA512

        b6cd0af436459f35a97db2d928120c53d3691533b01e4f0e8b382f2bd81d9a9a2c57e5e2aa6ade9d6a1746d5c4b2ef6c88d3a0cf519424b34445d0d30aab61de

      • C:\Users\Admin\Desktop\temp\Newtonsoft.Json.dll

        Filesize

        695KB

        MD5

        195ffb7167db3219b217c4fd439eedd6

        SHA1

        1e76e6099570ede620b76ed47cf8d03a936d49f8

        SHA256

        e1e27af7b07eeedf5ce71a9255f0422816a6fc5849a483c6714e1b472044fa9d

        SHA512

        56eb7f070929b239642dab729537dde2c2287bdb852ad9e80b5358c74b14bc2b2dded910d0e3b6304ea27eb587e5f19db0a92e1cbae6a70fb20b4ef05057e4ac

      • C:\Users\Admin\Desktop\temp\Plasma Temp.exe

        Filesize

        877KB

        MD5

        44b1e07558fac9c7d26e5d3347afaee7

        SHA1

        220280fee94e17188d027a46b3047b0f8a73a722

        SHA256

        a7db46b0ee6fa42808f35ebc28d8bbeaff7f3f665bec867e8bc9e6916af6e0c6

        SHA512

        df4aa702858deb3fadfecedf0185049bfdd8f66d13ff7e86bd00b111660cf3976b157208e61a71f07dd6cf8dd357ac32364993c86dea6ab9c9f157771a6660c5

      • C:\Users\Admin\Desktop\temp\X0f4dXjaxXHoWyCqkmhXv.txt

        Filesize

        21B

        MD5

        5b26046b29818176c57f76ba2edd216f

        SHA1

        ce41038570883814eded7c4beaf03f37faaf942c

        SHA256

        6f5f8ca9a11ff0119784386b0626d03bdfe099dbd5d9235ed6b9b0863d9cfc75

        SHA512

        cdd900d514ac5b26791930f974301079de7aaa7003062a649cc96adf0d279afeafbefd992c7280ae9b7827ae38bee546feaa878e17d8caf7f1eca9d386827fb9

      • C:\Windows\system32\wbem\repository\MAPPING2.MAP

        Filesize

        207KB

        MD5

        2c67be2ac50e4dd8683ad9640eb61477

        SHA1

        456ceabe88844627c28d22bf04b66d6f5f57bb15

        SHA256

        0f559b4d1e2db8c16f1a037fe790be2fa13d07f642176a76c93cd12349330b76

        SHA512

        004364f18d410d63fdfa907768a85c65e74049e23428d78bad2bf36dff9648d519b2aca155261567ba5f19d3a40d0e5f98eb2a34891e53e1af7217b7ddde9db8

      • memory/64-207-0x000000000B480000-0x000000000B4E6000-memory.dmp

        Filesize

        408KB

      • memory/64-144-0x0000000004CE0000-0x0000000004CEA000-memory.dmp

        Filesize

        40KB

      • memory/64-158-0x0000000007380000-0x0000000007392000-memory.dmp

        Filesize

        72KB

      • memory/64-152-0x00000000062F0000-0x0000000006504000-memory.dmp

        Filesize

        2.1MB

      • memory/64-139-0x0000000000260000-0x0000000000286000-memory.dmp

        Filesize

        152KB

      • memory/64-183-0x0000000009070000-0x0000000009122000-memory.dmp

        Filesize

        712KB

      • memory/64-184-0x0000000008FE0000-0x0000000009002000-memory.dmp

        Filesize

        136KB

      • memory/64-185-0x0000000009130000-0x0000000009487000-memory.dmp

        Filesize

        3.3MB

      • memory/64-187-0x00000000094D0000-0x000000000950C000-memory.dmp

        Filesize

        240KB

      • memory/64-140-0x0000000005120000-0x00000000056C6000-memory.dmp

        Filesize

        5.6MB

      • memory/64-143-0x0000000004C20000-0x0000000004CB2000-memory.dmp

        Filesize

        584KB

      • memory/1108-138-0x0000000000400000-0x00000000004E1000-memory.dmp

        Filesize

        900KB

      • memory/2236-205-0x0000000000400000-0x00000000004C2000-memory.dmp

        Filesize

        776KB

      • memory/2236-258-0x0000000000400000-0x00000000004C2000-memory.dmp

        Filesize

        776KB

      • memory/2236-327-0x0000000000400000-0x00000000004C2000-memory.dmp

        Filesize

        776KB

      • memory/2732-148-0x00007FF887D70000-0x00007FF887D80000-memory.dmp

        Filesize

        64KB

      • memory/2732-147-0x00007FF887D70000-0x00007FF887D80000-memory.dmp

        Filesize

        64KB

      • memory/2732-146-0x00007FF887D70000-0x00007FF887D80000-memory.dmp

        Filesize

        64KB

      • memory/2732-154-0x00007FF885850000-0x00007FF885860000-memory.dmp

        Filesize

        64KB

      • memory/2732-145-0x00007FF887D70000-0x00007FF887D80000-memory.dmp

        Filesize

        64KB

      • memory/2732-153-0x00007FF887D70000-0x00007FF887D80000-memory.dmp

        Filesize

        64KB

      • memory/2732-155-0x00007FF885850000-0x00007FF885860000-memory.dmp

        Filesize

        64KB