Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    111s
  • max time network
    125s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240221-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240221-enlocale:en-usos:windows10-2004-x64system
  • submitted
    25/02/2024, 18:33

General

  • Target

    https://drive.google.com/file/d/1dumC_5T47XyE93fT6oSoNVhMqoras9L9/view?usp=sharing

Malware Config

Extracted

Family

redline

Botnet

1753096510_99

C2

https://pastebin.com/raw/8baCJyMF

Signatures

  • RedLine

    RedLine Stealer is a malware family written in C#, first appearing in early 2020.

  • RedLine payload 1 IoCs
  • Executes dropped EXE 1 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Legitimate hosting services abused for malware hosting/C2 1 TTPs 4 IoCs
  • Enumerates system info in registry 2 TTPs 3 IoCs
  • Modifies registry class 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 23 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs
  • Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 8 IoCs
  • Suspicious use of AdjustPrivilegeToken 4 IoCs
  • Suspicious use of FindShellTrayWindow 36 IoCs
  • Suspicious use of SendNotifyMessage 24 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs

Processes

  • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
    "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument https://drive.google.com/file/d/1dumC_5T47XyE93fT6oSoNVhMqoras9L9/view?usp=sharing
    1⤵
    • Enumerates system info in registry
    • Modifies registry class
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SendNotifyMessage
    • Suspicious use of WriteProcessMemory
    PID:4416
    • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
      "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffd18b046f8,0x7ffd18b04708,0x7ffd18b04718
      2⤵
        PID:848
      • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
        "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2188,8381614550460586584,5958925710507398058,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2240 /prefetch:3
        2⤵
        • Suspicious behavior: EnumeratesProcesses
        PID:4896
      • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
        "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2188,8381614550460586584,5958925710507398058,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2144 /prefetch:2
        2⤵
          PID:1524
        • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
          "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2188,8381614550460586584,5958925710507398058,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2972 /prefetch:8
          2⤵
            PID:4476
          • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
            "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2188,8381614550460586584,5958925710507398058,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3328 /prefetch:1
            2⤵
              PID:392
            • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
              "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2188,8381614550460586584,5958925710507398058,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3320 /prefetch:1
              2⤵
                PID:4576
              • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2188,8381614550460586584,5958925710507398058,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5028 /prefetch:1
                2⤵
                  PID:2332
                • C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe
                  "C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2188,8381614550460586584,5958925710507398058,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5392 /prefetch:8
                  2⤵
                    PID:3732
                  • C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe
                    "C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2188,8381614550460586584,5958925710507398058,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5392 /prefetch:8
                    2⤵
                    • Suspicious behavior: EnumeratesProcesses
                    PID:2880
                  • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                    "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2188,8381614550460586584,5958925710507398058,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5604 /prefetch:1
                    2⤵
                      PID:4188
                    • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                      "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2188,8381614550460586584,5958925710507398058,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5696 /prefetch:1
                      2⤵
                        PID:3080
                      • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                        "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2188,8381614550460586584,5958925710507398058,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5016 /prefetch:1
                        2⤵
                          PID:5084
                        • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                          "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2188,8381614550460586584,5958925710507398058,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5840 /prefetch:1
                          2⤵
                            PID:4044
                          • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                            "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2188,8381614550460586584,5958925710507398058,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=15 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5628 /prefetch:1
                            2⤵
                              PID:3680
                            • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                              "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=edge_collections.mojom.CollectionsDataManager --field-trial-handle=2188,8381614550460586584,5958925710507398058,131072 --lang=en-US --service-sandbox-type=collections --mojo-platform-channel-handle=5636 /prefetch:8
                              2⤵
                                PID:5036
                              • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=quarantine.mojom.Quarantine --field-trial-handle=2188,8381614550460586584,5958925710507398058,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=6132 /prefetch:8
                                2⤵
                                • Suspicious behavior: EnumeratesProcesses
                                PID:2216
                              • C:\Program Files\7-Zip\7zFM.exe
                                "C:\Program Files\7-Zip\7zFM.exe" "C:\Users\Admin\Downloads\Nursultan (Creator Shake).rar"
                                2⤵
                                • Suspicious behavior: GetForegroundWindowSpam
                                • Suspicious use of AdjustPrivilegeToken
                                • Suspicious use of FindShellTrayWindow
                                PID:2660
                            • C:\Windows\System32\CompPkgSrv.exe
                              C:\Windows\System32\CompPkgSrv.exe -Embedding
                              1⤵
                                PID:2072
                              • C:\Windows\System32\CompPkgSrv.exe
                                C:\Windows\System32\CompPkgSrv.exe -Embedding
                                1⤵
                                  PID:2064
                                • C:\Users\Admin\Desktop\Nursultan (Creator Shake).exe
                                  "C:\Users\Admin\Desktop\Nursultan (Creator Shake).exe"
                                  1⤵
                                  • Executes dropped EXE
                                  • Suspicious behavior: EnumeratesProcesses
                                  • Suspicious use of AdjustPrivilegeToken
                                  PID:3676
                                • C:\Windows\System32\rundll32.exe
                                  C:\Windows\System32\rundll32.exe C:\Windows\System32\shell32.dll,SHCreateLocalServerRunDll {9aa46009-3ce0-458a-a354-715610a075e6} -Embedding
                                  1⤵
                                    PID:5084

                                  Network

                                  MITRE ATT&CK Enterprise v15

                                  Replay Monitor

                                  Loading Replay Monitor...

                                  Downloads

                                  • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad\settings.dat

                                    Filesize

                                    152B

                                    MD5

                                    1af9fbc1d4655baf2df9e8948103d616

                                    SHA1

                                    c58d5c208d0d5aab5b6979b64102b0086799b0bf

                                    SHA256

                                    e83daa7b2af963dbb884d82919710164e2337f0f9f5e5c56ee4b7129d160c135

                                    SHA512

                                    714d0ff527a8a24ec5d32a0a2b74e402ee933ea86e42d3e2fb5615c8345e6c09aa1c2ddf2dea53d71c5a666483a3b494b894326fea0cc1d8a06d3b32ec9397d3

                                  • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad\settings.dat

                                    Filesize

                                    152B

                                    MD5

                                    aa6f46176fbc19ccf3e361dc1135ece0

                                    SHA1

                                    cb1f8c693b88331e9513b77efe47be9e43c43b12

                                    SHA256

                                    2f5ba493c7c4192e9310cea3a96cfec4fd14c6285af6e3659627ab177e560819

                                    SHA512

                                    5d26fdffebeb1eb5adde9f7da19fe7069e364d3f68670013cb0cc3e2b40bf1fbcb9bdebbfe999747caf141c88ccd53bd4acf2074283e4bde46b8c28fbae296f5

                                  • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index

                                    Filesize

                                    408B

                                    MD5

                                    0b9a3fa9f0cac5301577491d799f829e

                                    SHA1

                                    3cffb4f48934b78c40f7cca8427e8d076c244fe9

                                    SHA256

                                    ceafcc1dbb8e70bbf391617b2045bc6684756658c8d040f7677259eed53fdb39

                                    SHA512

                                    77d488c3d1fd762e7d723c2df4edbf84cc4b55082ca0e2acc23926aaa76a6968f1283e09a92a2d3b689d0584177a016b6c89dd3826cae5f3deb08d05323c91e0

                                  • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Cookies

                                    Filesize

                                    20KB

                                    MD5

                                    32b18ab43b87a7d8815969c72ffddd0e

                                    SHA1

                                    d7e74c87ea60cc2180d6a217424f57de7aae630c

                                    SHA256

                                    f9bcb809bfac4afee9053090a4af4a46c9c93858382b0076fb8cab22a7eadfc8

                                    SHA512

                                    17e4a49398601f2f4a213f2344519a717dcce48f410a07b67c448ca56a1e1befcb65e9c3af79a1794cec2593808be6b267c0b5c69c86923d001b151382d6b614

                                  • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Network Persistent State

                                    Filesize

                                    3KB

                                    MD5

                                    7fc586980589212ac788f4f3197415a0

                                    SHA1

                                    537cb856c0892f8fd0cd5a0543bb97d452d68e98

                                    SHA256

                                    b7ef0fad5ed92cc2dc561742d85d7f314e516f761f13a6dac5c96c251833a183

                                    SHA512

                                    15ed8a91623468114cdb86b4c4ca68b3319ef15e37261d77ea161b00f6c601197e233a7926196f36a557a292c95b460f80439505a2c7ea1b2658ea3f0c84ee76

                                  • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Preferences

                                    Filesize

                                    6KB

                                    MD5

                                    74b0e52f2764f651837e5870f592c751

                                    SHA1

                                    ad31f785c7934502e5ff0a196bcddbdd99ca5207

                                    SHA256

                                    ec1e3e707702f48b1509ce0a2c2807b3f2be7938442e4c31cbc3d495ce7c79f5

                                    SHA512

                                    43fa1087e8974786a473d85852eeaa5e6833f6aa319b9899f67626a61c7ce2e165e9f4d4a64d1ffd256672c65fc17fb681806b036ac71707b5748b41a6ea686c

                                  • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Preferences

                                    Filesize

                                    6KB

                                    MD5

                                    fb354bc12a88dc4de52116cd1c7f4c4a

                                    SHA1

                                    e35fc82b2025d028bbb129101a8664ea4d4a67fc

                                    SHA256

                                    acb35cf53369f44272bef5f1134f8efdf3aea05f337e8937c3ba0f7251775a1c

                                    SHA512

                                    a22d84859ed59e674fbff9010db09a4a8db4e89a4582de28bf01770f23dc14675745cea6d283edf3594d8f66f9d93737d5d5b1712f436dd8e88e6c93655357c5

                                  • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Preferences

                                    Filesize

                                    7KB

                                    MD5

                                    65aa1f3491d6fd50d28fd5d8bc4fb9df

                                    SHA1

                                    0e84b958c1b8e78078e27b1f260481177e85f122

                                    SHA256

                                    d09ded80ab73cc33850e5e6afaad74dc0ee1213ab73b55061f0b65ef0557030f

                                    SHA512

                                    fc69ff1615156f725f8486ff0f003d1fc91d43ba4184aba3eec8d4192de125bb188c682435f67a2ae40fb23b20c43c6cf010c7cb59c7d1f4b3a9728ed69ef33c

                                  • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\bbf49640-9b5f-4961-9611-a4ce21ae705e.tmp

                                    Filesize

                                    7KB

                                    MD5

                                    ea7c4d15a35928e19e1f510f8a49bb7a

                                    SHA1

                                    fe7ef8b96746c13d845dbd18a05718d9cc677764

                                    SHA256

                                    ba5e46ddd3cd3a54ac1172045c6d22705d9ac07444c38e8324366fe34bf83447

                                    SHA512

                                    e49752c64be712c6717b3aaf17103584eddbc8758238b382c07641b5b1feb156b61a336ec2a29f2a1daac27673a6a6f13c6e0e2d02cd70bcb30081d828312c08

                                  • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\data_reduction_proxy_leveldb\CURRENT

                                    Filesize

                                    16B

                                    MD5

                                    6752a1d65b201c13b62ea44016eb221f

                                    SHA1

                                    58ecf154d01a62233ed7fb494ace3c3d4ffce08b

                                    SHA256

                                    0861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd

                                    SHA512

                                    9cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389

                                  • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Local State

                                    Filesize

                                    11KB

                                    MD5

                                    16777a3dbad656f693e4202354135ad3

                                    SHA1

                                    91cf0ab0e76a1bc3a9c734f9a47d07b119ebcd37

                                    SHA256

                                    3c5f699b9d13555d763ea67b9363443413b1d0f244fe041b45a33509b9c35835

                                    SHA512

                                    bf2790ba74032d8147357f4ee645693342e1c818895870b901b84c146d8f90851338f91d02ed8727fddf34ac3d19b24015ac16071ae662ac1de3b34fdaf74ab3

                                  • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Local State

                                    Filesize

                                    11KB

                                    MD5

                                    46c3b8067404ea877168e4c8a4ad6f73

                                    SHA1

                                    f15e955f734eedcb3852e067d9d93b37954bd70a

                                    SHA256

                                    a6bfc4083c038e4b9cbdfa9065533567cf59ef64e4c3abc292616e217a9419d1

                                    SHA512

                                    ffb200fff8071d66c56b01de9a4d7d98232629694bef948589ba6872cde6521bcb247b38fd0148961f961b9339d3ea791595404b1d7e0894d78b399df69cdb86

                                  • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Local State

                                    Filesize

                                    11KB

                                    MD5

                                    9e02eb5fc7f4769cd998ab8e4643d112

                                    SHA1

                                    11b05081b6361642babc9f652ef252d7a67898e3

                                    SHA256

                                    87a945a810094dd5f900098b9680ef5b8fe08d90ee1bf1798c8d22db2ab2b451

                                    SHA512

                                    7a1e3a641b5b7738ab99dc73ca31694bb6c8a8c624385aeb7e94fe49fff240aea5242e0e01ebbc8f4ab82c1e053d9cee44fb5fea2b102d14a742963e277f693e

                                  • C:\Users\Admin\Desktop\Nursultan (Creator Shake).exe

                                    Filesize

                                    20.9MB

                                    MD5

                                    9cf69dff5758b761c3b0dbf25cb86ad6

                                    SHA1

                                    f8bdaa2d26acb1da547dc06474cba8bb1ddf94e4

                                    SHA256

                                    3441550d5e8ff61bc1f7e3b20e2f356d2711d3d13d74e34f1229dfddddfa012a

                                    SHA512

                                    513484be44c628f5716c027bcdca0bbffab37f7906a0b350adaedf4a7a661415a5c9159008f5d30e4a5b30cbc6ada5694842d8148bc30a81f6b1d28e4d4aa60e

                                  • C:\Users\Admin\Desktop\Nursultan (Creator Shake).exe

                                    Filesize

                                    13.5MB

                                    MD5

                                    4cd04be795e4377928d31f117b65a677

                                    SHA1

                                    591da918e88bb686c83f8258bf669790f54b110d

                                    SHA256

                                    daa7c4de1f110629c19d6bd0afea09baaae0363104e80d899c3a8131c8bdb91c

                                    SHA512

                                    f7ebf90150bf8a5835944c06beb99960f49e844c7c4c240c35b0efdc9fab2e652f11d4041323f873962f62aa2393bceb8101d015191b352a7230a862f2cc10ee

                                  • C:\Users\Admin\Downloads\Unconfirmed 411071.crdownload

                                    Filesize

                                    174KB

                                    MD5

                                    593166b8d67cd161c7f9908228462d67

                                    SHA1

                                    3e80747533834af8dd3b97e763704c4c06741ac4

                                    SHA256

                                    209055b8bc67a1ea610fedc7ac1a3dcb30cc67e1e66c216c5e0e80ba98aaef15

                                    SHA512

                                    4c194c971810509d95a5aaf1c72ebbb3d502986c9f9c04b1939490d2fa08884b31ed832e11594e54e39e1e4a99cbf44fd78b598fc253ba638fb3505a3a8a1465

                                  • memory/3676-254-0x0000000000B00000-0x0000000000B22000-memory.dmp

                                    Filesize

                                    136KB

                                  • memory/3676-259-0x0000000004F20000-0x0000000004F86000-memory.dmp

                                    Filesize

                                    408KB

                                  • memory/3676-260-0x0000000005A50000-0x0000000006068000-memory.dmp

                                    Filesize

                                    6.1MB

                                  • memory/3676-261-0x00000000054D0000-0x00000000054E2000-memory.dmp

                                    Filesize

                                    72KB

                                  • memory/3676-262-0x0000000005600000-0x000000000570A000-memory.dmp

                                    Filesize

                                    1.0MB

                                  • memory/3676-263-0x0000000002A40000-0x0000000002A50000-memory.dmp

                                    Filesize

                                    64KB

                                  • memory/3676-264-0x0000000006670000-0x00000000066AC000-memory.dmp

                                    Filesize

                                    240KB

                                  • memory/3676-265-0x00000000066B0000-0x00000000066FC000-memory.dmp

                                    Filesize

                                    304KB

                                  • memory/3676-266-0x00000000069E0000-0x0000000006BA2000-memory.dmp

                                    Filesize

                                    1.8MB

                                  • memory/3676-267-0x00000000070E0000-0x000000000760C000-memory.dmp

                                    Filesize

                                    5.2MB

                                  • memory/3676-268-0x0000000007BC0000-0x0000000008164000-memory.dmp

                                    Filesize

                                    5.6MB

                                  • memory/3676-269-0x0000000006BB0000-0x0000000006C42000-memory.dmp

                                    Filesize

                                    584KB

                                  • memory/3676-270-0x0000000006F30000-0x0000000006FA6000-memory.dmp

                                    Filesize

                                    472KB

                                  • memory/3676-271-0x0000000006FB0000-0x0000000006FCE000-memory.dmp

                                    Filesize

                                    120KB

                                  • memory/3676-274-0x0000000007610000-0x0000000007660000-memory.dmp

                                    Filesize

                                    320KB

                                  • memory/3676-258-0x0000000074A30000-0x00000000751E0000-memory.dmp

                                    Filesize

                                    7.7MB

                                  • memory/3676-277-0x0000000074A30000-0x00000000751E0000-memory.dmp

                                    Filesize

                                    7.7MB