Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    18s
  • max time network
    24s
  • platform
    windows10-ltsc 2021_x64
  • resource
    win10ltsc2021-20241023-en
  • resource tags

    arch:x64arch:x86image:win10ltsc2021-20241023-enlocale:en-usos:windows10-ltsc 2021-x64system
  • submitted
    07/12/2024, 22:46

General

  • Target

    Discord Account Generator v2/RDXService/Jint.exe

  • Size

    959KB

  • MD5

    68a9f00a8e353b412f6f874c319aa5f1

  • SHA1

    53a0e6f2ee1405c98871c5f5eb1fd2bf4b8d8d7d

  • SHA256

    4de87cf5d3b6e29a4f5a870d2f267eb9628ca158ef9504508dec6e06503406cd

  • SHA512

    f00123c27153f0bb540237f80e3526d0d36d7cf873d061a4db3d68de6b10827d6dec5fe2aca43d30365416f6caa7537686ca8c9a78de18aad333d90e188a357b

  • SSDEEP

    12288:3MSApJVYG5lDLyjsb0eOzkv4R7QnvUUilQ35+6G75V9CltSGCFuJ9lTDd6S7sQoh:3nsJ39LyjbJkQFMhmC+6GD9mtSa7s1h

Malware Config

Extracted

Family

xred

C2

xred.mooo.com

Attributes
  • email

    [email protected]

  • payload_url

    http://freedns.afraid.org/api/?action=getdyndns&sha=a30fa98efc092684e8d1c5cff797bcc613562978

    https://docs.google.com/uc?id=0BxsMXGfPIZfSVlVsOGlEVGxuZVk&export=download

    https://www.dropbox.com/s/n1w4p8gc6jzo0sg/SUpdate.ini?dl=1

    http://xred.site50.net/syn/SUpdate.ini

    https://docs.google.com/uc?id=0BxsMXGfPIZfSVzUyaHFYVkQxeFk&export=download

    https://www.dropbox.com/s/zhp1b06imehwylq/Synaptics.rar?dl=1

    http://xred.site50.net/syn/Synaptics.rar

    https://docs.google.com/uc?id=0BxsMXGfPIZfSTmlVYkxhSDg5TzQ&export=download

    https://www.dropbox.com/s/fzj752whr3ontsm/SSLLibrary.dll?dl=1

    http://xred.site50.net/syn/SSLLibrary.dll

Signatures

  • Xred

    Xred is backdoor written in Delphi.

  • Xred family
  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Executes dropped EXE 3 IoCs
  • Loads dropped DLL 20 IoCs
  • Adds Run key to start application 2 TTPs 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Location Discovery: System Language Discovery 1 TTPs 4 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Checks processor information in registry 2 TTPs 3 IoCs

    Processor information is often read in order to detect sandboxing environments.

  • Enumerates system info in registry 2 TTPs 3 IoCs
  • Modifies registry class 1 IoCs
  • Suspicious behavior: AddClipboardFormatListener 2 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of SetWindowsHookEx 6 IoCs
  • Suspicious use of WriteProcessMemory 23 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\Discord Account Generator v2\RDXService\Jint.exe
    "C:\Users\Admin\AppData\Local\Temp\Discord Account Generator v2\RDXService\Jint.exe"
    1⤵
    • Checks computer location settings
    • Adds Run key to start application
    • System Location Discovery: System Language Discovery
    • Modifies registry class
    • Suspicious use of WriteProcessMemory
    PID:4440
    • C:\Users\Admin\AppData\Local\Temp\Discord Account Generator v2\RDXService\._cache_Jint.exe
      "C:\Users\Admin\AppData\Local\Temp\Discord Account Generator v2\RDXService\._cache_Jint.exe"
      2⤵
      • Executes dropped EXE
      • System Location Discovery: System Language Discovery
      • Suspicious use of WriteProcessMemory
      PID:3604
      • C:\ProgramData\Windows Portable Clipboard\Runtime Broker.exe
        "C:\\ProgramData\\Windows Portable Clipboard\\Runtime Broker.exe"
        3⤵
        • Executes dropped EXE
        • System Location Discovery: System Language Discovery
        • Suspicious behavior: AddClipboardFormatListener
        PID:2092
      • C:\Users\Admin\AppData\Local\Temp\Discord Account Generator v2\RDXService\AlphaFS.lib
        "AlphaFS.lib"
        3⤵
        • Suspicious use of WriteProcessMemory
        PID:1784
        • C:\Users\Admin\AppData\Local\Temp\Discord Account Generator v2\RDXService\AlphaFS.lib
          "AlphaFS.lib"
          4⤵
          • Loads dropped DLL
          • Suspicious use of AdjustPrivilegeToken
          • Suspicious use of WriteProcessMemory
          PID:3432
          • C:\Windows\system32\cmd.exe
            C:\Windows\system32\cmd.exe /c cls
            5⤵
              PID:3324
            • C:\Windows\system32\cmd.exe
              C:\Windows\system32\cmd.exe /c title Discord Generator ^| coded by Nightfall#2512
              5⤵
                PID:4992
              • C:\Windows\system32\cmd.exe
                C:\Windows\system32\cmd.exe /c cls
                5⤵
                  PID:4320
                • C:\Windows\system32\cmd.exe
                  C:\Windows\system32\cmd.exe /c cls
                  5⤵
                    PID:4576
                  • C:\Windows\system32\cmd.exe
                    C:\Windows\system32\cmd.exe /c title Discord Generator ^| Proxy: False ^| Threading: False
                    5⤵
                      PID:1288
              • C:\ProgramData\Synaptics\Synaptics.exe
                "C:\ProgramData\Synaptics\Synaptics.exe" InjUpdate
                2⤵
                • Executes dropped EXE
                • System Location Discovery: System Language Discovery
                PID:4156
            • C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE
              "C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE" /automation -Embedding
              1⤵
              • Checks processor information in registry
              • Enumerates system info in registry
              • Suspicious behavior: AddClipboardFormatListener
              • Suspicious use of SetWindowsHookEx
              PID:1180

            Network

            MITRE ATT&CK Enterprise v15

            Replay Monitor

            Loading Replay Monitor...

            Downloads

            • C:\ProgramData\Synaptics\Synaptics.exe

              Filesize

              753KB

              MD5

              85c4062ca855443ba02c2b83503ddc14

              SHA1

              5fa7451b7808c19a3d28dbbd4f662d0a584b6c77

              SHA256

              9770a6476b607f28077320caa244bbdde08611769338485faa64ad3bee4616cf

              SHA512

              851b48968e44604db4d02ec29744e6e2ca006e20bfb8883152860984dd4a648684e20b97b83a0b76afd21a922b3ac1afa9b2d54d9e3125b2e9b6958a8a7f5c7e

            • C:\ProgramData\Windows Portable Clipboard\Runtime Broker.exe

              Filesize

              255KB

              MD5

              8629c65903ca26e7ffada84c69ae0972

              SHA1

              015673ba0498ae35bd4da1c3ba45bab5fbfa18ce

              SHA256

              adc6887d772f9f47ab67406cc9ea7dd0177b94d84f98124fc712b9e66208dd0d

              SHA512

              6a3b8717daeaed8dde18cedcb1c6fc31932f01234a63b80f37c6960f7212255cd32d1c3135d84da773e7b94ad1f326cc965463b9fc68f35b8b5449ff70d79af7

            • C:\Users\Admin\AppData\Local\Temp\C2D75E00

              Filesize

              24KB

              MD5

              baaeb227f5c316e4e1094338da9c1f99

              SHA1

              f10c8ba0347d97d71fb65504319e3ebf7b97a394

              SHA256

              828d000244f63015aab00e6958347c250287d6c0e54c10e27d4d00b8f82dd100

              SHA512

              c0b9692d2ba5c7e6a2532c6ad31a8c6050b3d23f0e93d7ec51c16263af3c559f8574907bc83be1e34839a2c48eb79d11b60e841b8f3c4ad7f4dad62b40f17bfc

            • C:\Users\Admin\AppData\Local\Temp\Discord Account Generator v2\RDXService\._cache_Jint.exe

              Filesize

              206KB

              MD5

              01954f322fc670b93d59b9bdf710d3f5

              SHA1

              7c9e9af5da35de32c41d9a883c61d6a773905059

              SHA256

              43a1c5f3292787add7507c3aa57179682b69dc499965039c1179560bd2b567fd

              SHA512

              c160714b91ee7f86edb3462d7b88b8121ef369aa24499708e2e05c41cf31f4677d4e8da56b0b495cc60eae98768b7110722790f316da88eb51c3a9100f7baa05

            • C:\Users\Admin\AppData\Local\Temp\_MEI17842\VCRUNTIME140.dll

              Filesize

              87KB

              MD5

              0e675d4a7a5b7ccd69013386793f68eb

              SHA1

              6e5821ddd8fea6681bda4448816f39984a33596b

              SHA256

              bf5ff4603557c9959acec995653d052d9054ad4826df967974efd2f377c723d1

              SHA512

              cae69a90f92936febde67dacd6ce77647cb3b3ed82bb66463cd9047e90723f633aa2fc365489de09fecdc510be15808c183b12e6236b0893af19633f6a670e66

            • C:\Users\Admin\AppData\Local\Temp\_MEI17842\_bz2.pyd

              Filesize

              87KB

              MD5

              8b40a68ae537c0aab25a8b30b10ab098

              SHA1

              1c8ac1f7f5c3697c457dd98f05296c2354ff7f55

              SHA256

              0b86ef4810d53e79f1d934b427fdbacf3792eebb37ed241bc89148238af763fa

              SHA512

              620ad61ff05c73adee4ac8f4b88a3880c11893eaac77ccca4e88edb29b492366a5bcf813d18628f005730f7e45ce373af9275776ea768b67b8d0e3bc62949229

            • C:\Users\Admin\AppData\Local\Temp\_MEI17842\_ctypes.pyd

              Filesize

              131KB

              MD5

              9a69561e94859bc3411c6499bc46c4bd

              SHA1

              3fa5bc2d4ffc23c4c383252c51098d6211949b99

              SHA256

              6bbde732c5bcb89455f43f370a444bb6bca321825de56f9a1f2e947b0a006f1c

              SHA512

              31d9e3844f1b8e72ec80acd1e224a94d11039c130e69c498a668e07e0d8bba8d1ed1ebe0b7a16376ca597d0e2b74a0d5e3bf53d1cbadf5bf099d3bf78db659a4

            • C:\Users\Admin\AppData\Local\Temp\_MEI17842\_elementtree.pyd

              Filesize

              203KB

              MD5

              80788d9c36aa4f950d1a71518abfa5fc

              SHA1

              3bcf2f8df698160d01c74f934ab4c06555ae1f8c

              SHA256

              75b93ebab7de27022d1d9f468c5051be5ac64b436b6a10928d75b3de19dbcb6b

              SHA512

              f26187e364c80c5ff423699fbcf62a8035969592a6da339c80fa862185f1f2e674c44325321c6643cb6cb7e2034623e04603a9491d1e8f06a4063efbf85ef48e

            • C:\Users\Admin\AppData\Local\Temp\_MEI17842\_hashlib.pyd

              Filesize

              38KB

              MD5

              1f77f7a5f36c48e7c596e7031c80e4ff

              SHA1

              79f86e31203b60b3388047e39a2a26275da411f5

              SHA256

              30dfbd97883b1545513ca5bb857a9aad6e9bf4b8b4272569818346eaf25033f7

              SHA512

              b647e820ae4854921839a6cc92610fd63ef79623d442fd17503a39ca145dfd6cde3719c50473c0c74fe487f980b12e90bd3d3beb5729fa5498a357d44f81809c

            • C:\Users\Admin\AppData\Local\Temp\_MEI17842\_lzma.pyd

              Filesize

              251KB

              MD5

              16fb5a2363ce8dd12a65a9823a517b59

              SHA1

              59979d9195259f48c678cdaa36b5efee13472ff5

              SHA256

              bb78ca0dd1478027e2e9f06f56fc7c3cc6f157b4151562d58a7f6646e463fcc2

              SHA512

              d9801cdd8cc9809781b79882a226ee7a56d93eac0181295c80cb1f088f0fbf46e3eb35c7d8ff208dbd5a3e93a190a04c48fd254c9971a3740b020547973683e1

            • C:\Users\Admin\AppData\Local\Temp\_MEI17842\_queue.pyd

              Filesize

              27KB

              MD5

              94b57996008875822a0b13fa089ae513

              SHA1

              340ab82c3653c7e664f28d2dffb6863f1df20709

              SHA256

              28136612834be0dd236f085f46c1d9b8a1830b9c073557464e22bc006d81e494

              SHA512

              aa9db065609dbae700a5c04266afa99ef838a9f5dc58acdca1c9b95c5d845195cfce895b81d718e761e69b5cfaeb71e9e8450fb76c590f991850e67f65b32abe

            • C:\Users\Admin\AppData\Local\Temp\_MEI17842\_socket.pyd

              Filesize

              74KB

              MD5

              0ea1df6137ee3369546a806a175aecf4

              SHA1

              95fd1ad45892cb9e655bfa62ca1be80a0b9b2d43

              SHA256

              6fcc31573ae6b380db1d4e23731755465fd2cee0856e7a6c0e396759bcbf73b5

              SHA512

              6497fdb86ac69f6551a7794c090ca695bf22eb647b7a503fa23d7944ad375f061429f17e2ea043c809460e7cb9fc3df77c7bfe0b64f00ddd65de1aa744d3adcb

            • C:\Users\Admin\AppData\Local\Temp\_MEI17842\_ssl.pyd

              Filesize

              121KB

              MD5

              0e970f3353e65094165edcdfcaf1c299

              SHA1

              e86d2c4723ae09890f69ab1a6f4a1a935dc0a0e7

              SHA256

              4fed9f05da139d66e0582b47c20ee91c91be44d379c225f89b22462bedc989d3

              SHA512

              4621d1add268f9aadf0119055d6cce23739eec969ab031fc0a510c40cf4cce60230a89735fd85c38f28c22ed9dc829ff294ef48590fc56191464e1fec1fa4595

            • C:\Users\Admin\AppData\Local\Temp\_MEI17842\base_library.zip

              Filesize

              768KB

              MD5

              eb723b4c1b48d3e8969ff3f4d897b79e

              SHA1

              a03479e7a916d0ee5e3647322307aceb0b1c30b9

              SHA256

              ed6356556e3a86b92f9995bce5b1c3182d5df8976a2ca2e400ebf4eaed592ef5

              SHA512

              4c9902b5698e4e3d8837d594e337a6696ce03d9f6d0d3fc7f5f144c53c2fb7494ac10d303ea597c25c159076f74a7b7c59eb2d29db068878ab6f4bbb510fd13f

            • C:\Users\Admin\AppData\Local\Temp\_MEI17842\certifi\cacert.pem

              Filesize

              257KB

              MD5

              1ba3b44f73a6b25711063ea5232f4883

              SHA1

              1b1a84804f896b7085924f8bf0431721f3b5bdbe

              SHA256

              bb77f13d3fbec9e98bbf28ac95046b44196c7d8f55ab7720061e99991a829197

              SHA512

              0dd2a14331308b1de757d56fab43678431e0ad6f5f5b12c32fa515d142bd955f8be690b724e07f41951dd03c9fee00e604f4e0b9309da3ea438c8e9b56ca581b

            • C:\Users\Admin\AppData\Local\Temp\_MEI17842\libcrypto-1_1.dll

              Filesize

              3.2MB

              MD5

              bf83f8ad60cb9db462ce62c73208a30d

              SHA1

              f1bc7dbc1e5b00426a51878719196d78981674c4

              SHA256

              012866b68f458ec204b9bce067af8f4a488860774e7e17973c49e583b52b828d

              SHA512

              ae1bdda1c174ddf4205ab19a25737fe523dca6a9a339030cd8a95674c243d0011121067c007be56def4eaeffc40cbdadfdcbd1e61df3404d6a3921d196dcd81e

            • C:\Users\Admin\AppData\Local\Temp\_MEI17842\libssl-1_1.dll

              Filesize

              670KB

              MD5

              fe1f3632af98e7b7a2799e3973ba03cf

              SHA1

              353c7382e2de3ccdd2a4911e9e158e7c78648496

              SHA256

              1ce7ba99e817c1c2d71bc88a1bdd6fcad82aa5c3e519b91ebd56c96f22e3543b

              SHA512

              a0123dfe324d3ebf68a44afafca7c6f33d918716f29b063c72c4a8bd2006b81faea6848f4f2423778d57296d7bf4f99a3638fc87b37520f0dcbeefa3a2343de0

            • C:\Users\Admin\AppData\Local\Temp\_MEI17842\lxml\_elementpath.cp37-win_amd64.pyd

              Filesize

              141KB

              MD5

              3702f8ff3e1af9be72126683fca3a1ce

              SHA1

              82e6be08797fcd9558cb3e7759c0e3de2ffcea88

              SHA256

              28fd0337a5251d409d8d8d27383f682ba63b3d52bd0691a22a90b208e23b4f93

              SHA512

              d18ffd06d6580b52d07749bd6f2927bc1bc445c3a7c8267288b9e4f00de321ad897959519e1aed199e36ff7008be26cc7af486bab0b2c7433a9c72c349a24713

            • C:\Users\Admin\AppData\Local\Temp\_MEI17842\lxml\etree.cp37-win_amd64.pyd

              Filesize

              3.7MB

              MD5

              e685bf02d3b11fa4715a94107a7292be

              SHA1

              b5822fda8f6ae3b7c5117c524584a490c6e95c91

              SHA256

              04db5dfd6b41b3245b86d4f97e96664d0199ae2af755b71e011a4e0e92124633

              SHA512

              c6118cf72c6cadb68b33e37197ac64cf5151f3266e8059619e2a30fc7a12bc9176e2b2a2a8257a7b0a68c96665b566c606ab294e8798d578a62957fe34cf65f0

            • C:\Users\Admin\AppData\Local\Temp\_MEI17842\pyexpat.pyd

              Filesize

              194KB

              MD5

              ebf42794afd81d3a158f1d4eb4096483

              SHA1

              9c49d840a600d126b1d0b3a294218f82c2292c8d

              SHA256

              0cb9ae2dfd64c291de65aee89a524a0bbfe7755c34c8215e8b47a4f409ef3743

              SHA512

              28db296525d48e970c40bf267523dfdcd823fbd471e606b97cd61af373af9d42bb72765f846df4bf33457124fd1a039e7e06b5e6e863503a26a3efc9b15078f0

            • C:\Users\Admin\AppData\Local\Temp\_MEI17842\python37.dll

              Filesize

              3.6MB

              MD5

              86af9b888a72bdceb8fd8ed54975edd5

              SHA1

              c9d67c9243f818c0a8cc279267cca44d9995f0cf

              SHA256

              e11aa3893597d7c408349ebb11f47a24e388fd702c4d38b5d6f363f7ad6e8e5f

              SHA512

              5d8fd9040f466e23af7f17772e3769ad83c5f55f8c70dcc3cfb1f827e105f0f4e6133f0e183fabc67dd44799495c47f931bf92546342b30b9c4a5c2b4aeee7c7

            • C:\Users\Admin\AppData\Local\Temp\_MEI17842\pywintypes37.dll

              Filesize

              136KB

              MD5

              77b6875977e77c4619bbb471d5eaf790

              SHA1

              f08c3bc5e918c0a197fbfd1b15e7c0491bd5fade

              SHA256

              780a72ba3215ff413d5a9e98861d8bb87c15c43a75bb81dc985034ae7dcf5ef6

              SHA512

              783939fc97b2445dfe7e21eb6b71711aba6d85e275e489eddcc4f20c2ed018678d8d14c9e1856f66e3876f318312d69c22cee77f9105a72e56a1be4f3e8a7c2e

            • C:\Users\Admin\AppData\Local\Temp\_MEI17842\select.pyd

              Filesize

              26KB

              MD5

              e1d0d18a0dd8e82f9b677a86d32e3124

              SHA1

              96a00541d86d03529b55c1ac5ff1c6cfb5e91d1e

              SHA256

              4595675949851bd0ff65521e936647fcc5c8d2f32f0ac2641a262fb6323896dd

              SHA512

              38e3b6b23ebcbdc60eeeed0bf3dddc69004a1ccd4a2486f3a9f8c0d4624b690e2e5704e3fe05bf1bf2c900bf4f5bc9439f45f3c02fd4c67783056b3da15e0f56

            • C:\Users\Admin\AppData\Local\Temp\_MEI17842\selenium\webdriver\remote\getAttribute.js

              Filesize

              6KB

              MD5

              e6b3169414f3b9c47a9b826bb71a0337

              SHA1

              d22278a492d03863ce51569482dcfb30a0b006e9

              SHA256

              1198a9999dde24dd2da0d9877cc2e8f8dd70bfdaeee0b5012b24e5474b50e88c

              SHA512

              bf9e48caf03e19274b5020d5eae6a3d6d75b611676f307346cf28117da71410e6022a72da0f82a8f2c6ca06a2c503c8e6528c6a164c4fb488c5195d6aa3e3819

            • C:\Users\Admin\AppData\Local\Temp\_MEI17842\selenium\webdriver\remote\isDisplayed.js

              Filesize

              42KB

              MD5

              313589fe40cbb546415aec5377da0e7d

              SHA1

              bc2b6e547b1da94682e379af1ea11579e26de65b

              SHA256

              c1a04024e5414fca8c1deedb452be77a8b9d13bb3cf67ff4230d5983537a3096

              SHA512

              bbdfa98ecd07a27f20966b5eb0cdcc0fac6085bebd6868a061563d210262f61d630b823e6eabd3217175b7f01516cda9c162adbfe063130d6510e0a3f4be2f7d

            • C:\Users\Admin\AppData\Local\Temp\_MEI17842\ucrtbase.dll

              Filesize

              987KB

              MD5

              61eb0ad4c285b60732353a0cb5c9b2ab

              SHA1

              21a1bea01f6ca7e9828a522c696853706d0a457b

              SHA256

              10521fe73fe05f2ba95d40757d9f676f2091e2ed578da9d5cdef352f986f3bcd

              SHA512

              44cd871f48b5193abb3b9664dbea8cdad19e72c47b6967c685cf1cc803bc9abb48a8a93009c972ef4936e7f78e3c92110828790aa0a9d26b80e6a523bbcd830d

            • C:\Users\Admin\AppData\Local\Temp\_MEI17842\unicodedata.pyd

              Filesize

              1.0MB

              MD5

              23bba751c8a182262856eeba20db3341

              SHA1

              0120468629aa035d92ebdf97f9f32a02085fbccf

              SHA256

              96eafcb208518f6df0674ef6f1a48f4687eb73f785c87b11cb4a52dcf1ce5c66

              SHA512

              482fdb6f542be27d6bf3b41bc7aa7d7fda3077cd763f32bb25e0c50cf8ae11ebd8173d18cb0a52126b2150fc737109d384971298e8e2cf8a199ad1f1956d9326

            • C:\Users\Admin\AppData\Local\Temp\tVHFBCuU.xlsm

              Filesize

              17KB

              MD5

              e566fc53051035e1e6fd0ed1823de0f9

              SHA1

              00bc96c48b98676ecd67e81a6f1d7754e4156044

              SHA256

              8e574b4ae6502230c0829e2319a6c146aebd51b7008bf5bbfb731424d7952c15

              SHA512

              a12f56ff30ea35381c2b8f8af2446cf1daa21ee872e98cad4b863db060acd4c33c5760918c277dadb7a490cb4ca2f925d59c70dc5171e16601a11bc4a6542b04

            • memory/1180-254-0x00007FF85ED50000-0x00007FF85ED60000-memory.dmp

              Filesize

              64KB

            • memory/1180-252-0x00007FF85ED50000-0x00007FF85ED60000-memory.dmp

              Filesize

              64KB

            • memory/1180-255-0x00007FF85ED50000-0x00007FF85ED60000-memory.dmp

              Filesize

              64KB

            • memory/1180-253-0x00007FF85ED50000-0x00007FF85ED60000-memory.dmp

              Filesize

              64KB

            • memory/1180-256-0x00007FF85ED50000-0x00007FF85ED60000-memory.dmp

              Filesize

              64KB

            • memory/1180-257-0x00007FF85CA30000-0x00007FF85CA40000-memory.dmp

              Filesize

              64KB

            • memory/1180-258-0x00007FF85CA30000-0x00007FF85CA40000-memory.dmp

              Filesize

              64KB

            • memory/4156-103-0x0000000000770000-0x0000000000771000-memory.dmp

              Filesize

              4KB

            • memory/4156-299-0x0000000000400000-0x00000000004C2000-memory.dmp

              Filesize

              776KB

            • memory/4156-300-0x0000000000770000-0x0000000000771000-memory.dmp

              Filesize

              4KB

            • memory/4440-0-0x0000000002280000-0x0000000002281000-memory.dmp

              Filesize

              4KB

            • memory/4440-101-0x0000000000400000-0x00000000004F6000-memory.dmp

              Filesize

              984KB