Resubmissions

05/07/2024, 16:54

240705-vesbwavapf 10

05/07/2024, 16:49

240705-vb469ssamr 7

04/07/2024, 16:17

240704-trmrgs1eja 10

04/07/2024, 16:14

240704-tpl26syfqj 7

04/07/2024, 16:11

240704-tmx2na1dne 10

Analysis

  • max time kernel
    392s
  • max time network
    393s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240508-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system
  • submitted
    04/07/2024, 16:17

General

  • Target

    https://gofile.io/d/SRT9tP

Malware Config

Extracted

Family

redline

Botnet

s6murai on telegram

C2

178.40.160.213:3333

Signatures

  • RedLine

    RedLine Stealer is a malware family written in C#, first appearing in early 2020.

  • RedLine payload 1 IoCs
  • SectopRAT

    SectopRAT is a remote access trojan first seen in November 2019.

  • SectopRAT payload 1 IoCs
  • Executes dropped EXE 3 IoCs
  • Adds Run key to start application 2 TTPs 3 IoCs
  • Drops file in System32 directory 3 IoCs
  • Suspicious use of SetThreadContext 3 IoCs
  • Drops file in Program Files directory 31 IoCs
  • Checks SCSI registry key(s) 3 TTPs 3 IoCs

    SCSI information is often read in order to detect sandboxing environments.

  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious use of AdjustPrivilegeToken 14 IoCs
  • Suspicious use of FindShellTrayWindow 64 IoCs
  • Suspicious use of SendNotifyMessage 64 IoCs
  • Suspicious use of WriteProcessMemory 36 IoCs

Processes

  • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
    "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument https://gofile.io/d/SRT9tP
    1⤵
      PID:1504
    • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
      "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --enable-dinosaur-easter-egg-alt-images --no-appcompat-clear --lang=en-US --js-flags=--ms-user-locale= --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=16 --field-trial-handle=4108,i,11266875042087428226,16669718873272757238,262144 --variations-seed-version --mojo-platform-channel-handle=4304 /prefetch:1
      1⤵
        PID:2892
      • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
        "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --enable-dinosaur-easter-egg-alt-images --no-appcompat-clear --lang=en-US --js-flags=--ms-user-locale= --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=15 --field-trial-handle=3680,i,11266875042087428226,16669718873272757238,262144 --variations-seed-version --mojo-platform-channel-handle=4152 /prefetch:1
        1⤵
          PID:456
        • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
          "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --enable-dinosaur-easter-egg-alt-images --no-appcompat-clear --lang=en-US --js-flags=--ms-user-locale= --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=17 --field-trial-handle=4916,i,11266875042087428226,16669718873272757238,262144 --variations-seed-version --mojo-platform-channel-handle=5296 /prefetch:1
          1⤵
            PID:4752
          • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
            "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=asset_store.mojom.AssetStoreService --lang=en-US --service-sandbox-type=asset_store_service --no-appcompat-clear --field-trial-handle=5436,i,11266875042087428226,16669718873272757238,262144 --variations-seed-version --mojo-platform-channel-handle=5456 /prefetch:8
            1⤵
              PID:2300
            • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
              "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=entity_extraction_service.mojom.Extractor --lang=en-US --service-sandbox-type=entity_extraction --onnx-enabled-for-ee --no-appcompat-clear --field-trial-handle=5460,i,11266875042087428226,16669718873272757238,262144 --variations-seed-version --mojo-platform-channel-handle=5528 /prefetch:8
              1⤵
                PID:2424
              • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --enable-dinosaur-easter-egg-alt-images --no-appcompat-clear --disable-gpu-compositing --lang=en-US --js-flags=--ms-user-locale= --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=20 --field-trial-handle=5900,i,11266875042087428226,16669718873272757238,262144 --variations-seed-version --mojo-platform-channel-handle=5892 /prefetch:1
                1⤵
                  PID:4000
                • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                  "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --enable-dinosaur-easter-egg-alt-images --no-appcompat-clear --disable-gpu-compositing --lang=en-US --js-flags=--ms-user-locale= --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=21 --field-trial-handle=6028,i,11266875042087428226,16669718873272757238,262144 --variations-seed-version --mojo-platform-channel-handle=5240 /prefetch:1
                  1⤵
                    PID:1236
                  • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                    "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --no-appcompat-clear --field-trial-handle=5176,i,11266875042087428226,16669718873272757238,262144 --variations-seed-version --mojo-platform-channel-handle=5476 /prefetch:8
                    1⤵
                      PID:5100
                    • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                      "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --enable-dinosaur-easter-egg-alt-images --no-appcompat-clear --disable-gpu-compositing --lang=en-US --js-flags=--ms-user-locale= --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=23 --field-trial-handle=6204,i,11266875042087428226,16669718873272757238,262144 --variations-seed-version --mojo-platform-channel-handle=6216 /prefetch:1
                      1⤵
                        PID:4632
                      • C:\Windows\System32\rundll32.exe
                        C:\Windows\System32\rundll32.exe C:\Windows\System32\shell32.dll,SHCreateLocalServerRunDll {9aa46009-3ce0-458a-a354-715610a075e6} -Embedding
                        1⤵
                          PID:4048
                        • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                          "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=edge_collections.mojom.CollectionsDataManager --lang=en-US --service-sandbox-type=collections --no-appcompat-clear --field-trial-handle=5784,i,11266875042087428226,16669718873272757238,262144 --variations-seed-version --mojo-platform-channel-handle=6568 /prefetch:8
                          1⤵
                            PID:5076
                          • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                            "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --enable-dinosaur-easter-egg-alt-images --no-appcompat-clear --disable-gpu-compositing --lang=en-US --js-flags=--ms-user-locale= --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=25 --field-trial-handle=6264,i,11266875042087428226,16669718873272757238,262144 --variations-seed-version --mojo-platform-channel-handle=6712 /prefetch:1
                            1⤵
                              PID:1248
                            • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                              "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --enable-dinosaur-easter-egg-alt-images --no-appcompat-clear --disable-gpu-compositing --lang=en-US --js-flags=--ms-user-locale= --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=26 --field-trial-handle=6920,i,11266875042087428226,16669718873272757238,262144 --variations-seed-version --mojo-platform-channel-handle=6976 /prefetch:1
                              1⤵
                                PID:2636
                              • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --enable-dinosaur-easter-egg-alt-images --no-appcompat-clear --disable-gpu-compositing --lang=en-US --js-flags=--ms-user-locale= --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=27 --field-trial-handle=7124,i,11266875042087428226,16669718873272757238,262144 --variations-seed-version --mojo-platform-channel-handle=6852 /prefetch:1
                                1⤵
                                  PID:5088
                                • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                  "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=chrome.mojom.FileUtilService --lang=en-US --service-sandbox-type=service --no-appcompat-clear --field-trial-handle=6540,i,11266875042087428226,16669718873272757238,262144 --variations-seed-version --mojo-platform-channel-handle=6216 /prefetch:8
                                  1⤵
                                  • Drops file in Program Files directory
                                  PID:2876
                                • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                  "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=quarantine.mojom.Quarantine --lang=en-US --service-sandbox-type=none --no-appcompat-clear --field-trial-handle=4148,i,11266875042087428226,16669718873272757238,262144 --variations-seed-version --mojo-platform-channel-handle=7340 /prefetch:8
                                  1⤵
                                    PID:3372
                                  • C:\Program Files\7-Zip\7zG.exe
                                    "C:\Program Files\7-Zip\7zG.exe" x -o"C:\Users\Admin\Downloads\Redline Crack\" -ad -an -ai#7zMap27787:88:7zEvent7086
                                    1⤵
                                    • Suspicious use of AdjustPrivilegeToken
                                    • Suspicious use of FindShellTrayWindow
                                    PID:2764
                                  • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                    "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=edge_search_indexer.mojom.SearchIndexerInterfaceBroker --lang=en-US --service-sandbox-type=search_indexer --message-loop-type-ui --no-appcompat-clear --field-trial-handle=5816,i,11266875042087428226,16669718873272757238,262144 --variations-seed-version --mojo-platform-channel-handle=6720 /prefetch:8
                                    1⤵
                                      PID:3088
                                    • C:\Users\Admin\Downloads\Redline Crack\Redline Crack\Panel\RedLine_20_2\Panel\Panel.exe
                                      "C:\Users\Admin\Downloads\Redline Crack\Redline Crack\Panel\RedLine_20_2\Panel\Panel.exe"
                                      1⤵
                                      • Executes dropped EXE
                                      • Drops file in System32 directory
                                      • Suspicious use of SetThreadContext
                                      • Suspicious use of WriteProcessMemory
                                      PID:4440
                                      • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                                        "powershell.exe" Remove-ItemProperty -Path 'HKCU:\SOFTWARE\Microsoft\Windows\CurrentVersion\Run' -Name 'Unkown';New-ItemProperty -Path 'HKCU:\SOFTWARE\Microsoft\Windows\CurrentVersion\Run' -Name 'Unkown' -Value '"C:\Windows\system32\chome_exe\CraxSMS Beta test.exe"' -PropertyType 'String'
                                        2⤵
                                        • Adds Run key to start application
                                        • Suspicious behavior: EnumeratesProcesses
                                        • Suspicious use of AdjustPrivilegeToken
                                        PID:1712
                                      • C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe
                                        "C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"
                                        2⤵
                                        • Suspicious use of AdjustPrivilegeToken
                                        PID:3600
                                    • C:\Users\Admin\Downloads\Redline Crack\Redline Crack\Panel\RedLine_20_2\Panel\Panel.exe
                                      "C:\Users\Admin\Downloads\Redline Crack\Redline Crack\Panel\RedLine_20_2\Panel\Panel.exe"
                                      1⤵
                                      • Executes dropped EXE
                                      • Drops file in System32 directory
                                      • Suspicious use of SetThreadContext
                                      • Suspicious use of WriteProcessMemory
                                      PID:2828
                                      • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                                        "powershell.exe" Remove-ItemProperty -Path 'HKCU:\SOFTWARE\Microsoft\Windows\CurrentVersion\Run' -Name 'Unkown';New-ItemProperty -Path 'HKCU:\SOFTWARE\Microsoft\Windows\CurrentVersion\Run' -Name 'Unkown' -Value '"C:\Windows\system32\chome_exe\CraxSMS Beta test.exe"' -PropertyType 'String'
                                        2⤵
                                        • Adds Run key to start application
                                        • Suspicious behavior: EnumeratesProcesses
                                        • Suspicious use of AdjustPrivilegeToken
                                        PID:2124
                                      • C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe
                                        "C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"
                                        2⤵
                                        • Suspicious use of AdjustPrivilegeToken
                                        PID:2760
                                    • C:\Windows\system32\taskmgr.exe
                                      "C:\Windows\system32\taskmgr.exe" /0
                                      1⤵
                                      • Checks SCSI registry key(s)
                                      • Suspicious behavior: EnumeratesProcesses
                                      • Suspicious use of AdjustPrivilegeToken
                                      • Suspicious use of FindShellTrayWindow
                                      • Suspicious use of SendNotifyMessage
                                      PID:4856
                                    • C:\Users\Admin\Downloads\Redline Crack\Redline Crack\Panel\RedLine_20_2\Panel\Panel.exe
                                      "C:\Users\Admin\Downloads\Redline Crack\Redline Crack\Panel\RedLine_20_2\Panel\Panel.exe"
                                      1⤵
                                      • Executes dropped EXE
                                      • Drops file in System32 directory
                                      • Suspicious use of SetThreadContext
                                      • Suspicious behavior: EnumeratesProcesses
                                      • Suspicious use of AdjustPrivilegeToken
                                      • Suspicious use of WriteProcessMemory
                                      PID:1960
                                      • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                                        "powershell.exe" Remove-ItemProperty -Path 'HKCU:\SOFTWARE\Microsoft\Windows\CurrentVersion\Run' -Name 'Unkown';New-ItemProperty -Path 'HKCU:\SOFTWARE\Microsoft\Windows\CurrentVersion\Run' -Name 'Unkown' -Value '"C:\Windows\system32\chome_exe\CraxSMS Beta test.exe"' -PropertyType 'String'
                                        2⤵
                                        • Adds Run key to start application
                                        • Suspicious behavior: EnumeratesProcesses
                                        • Suspicious use of AdjustPrivilegeToken
                                        PID:4496
                                      • C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe
                                        "C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"
                                        2⤵
                                          PID:4316
                                        • C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe
                                          "C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"
                                          2⤵
                                          • Suspicious use of AdjustPrivilegeToken
                                          PID:1340

                                      Network

                                      MITRE ATT&CK Enterprise v15

                                      Replay Monitor

                                      Loading Replay Monitor...

                                      Downloads

                                      • C:\Users\Admin\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\Panel.exe.log

                                        Filesize

                                        1KB

                                        MD5

                                        b5291f3dcf2c13784e09a057f2e43d13

                                        SHA1

                                        fbb72f4b04269e0d35b1d9c29d02d63dbc7ad07e

                                        SHA256

                                        ad995b51344d71019f96fc3a424de00256065daad8595ff599f6849c87ae75ce

                                        SHA512

                                        11c89caac425bccaa24e2bb24c6f2b4e6d6863278bf8a5304a42bb44475b08ca586e09143e7d5b14db7f1cd9adacd5358769e0d999dc348073431031067bd4d4

                                      • C:\Users\Admin\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\powershell.exe.log

                                        Filesize

                                        1KB

                                        MD5

                                        def65711d78669d7f8e69313be4acf2e

                                        SHA1

                                        6522ebf1de09eeb981e270bd95114bc69a49cda6

                                        SHA256

                                        aa1c97cdbce9a848f1db2ad483f19caa535b55a3a1ef2ad1260e0437002bc82c

                                        SHA512

                                        05b2f9cd9bc3b46f52fded320b68e05f79b2b3ceaeb13e5d87ae9f8cd8e6c90bbb4ffa4da8192c2bfe0f58826cabff2e99e7c5cc8dd47037d4eb7bfc6f2710a7

                                      • C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive

                                        Filesize

                                        18KB

                                        MD5

                                        90a5b0dbffe7a2b64d0960fdb6f63227

                                        SHA1

                                        8866beea62c9cca51bd835f5e4186b4d41d1c805

                                        SHA256

                                        e1b333af6bfb5d89a343b3cbd14ff6e8a32bf923766ef31e25df0b063718f8cd

                                        SHA512

                                        6bd89b21bdc42cabbe6531195db83a523acc20f1d684b4936aed06710da6ca6e11b64cb15ac10dfa4dfe5512aed852016eb2383cb1a60ea4b8b10b75f71c2119

                                      • C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive

                                        Filesize

                                        16KB

                                        MD5

                                        66a9ac496e85d2fcd9bedbe8da93ccc7

                                        SHA1

                                        ddf5ac6d9d8f33ff333aef113a3c48315bca6a9b

                                        SHA256

                                        961f1dff2562f3995a90d43927a839ccac29307daa32612da1cc677dd1b47bea

                                        SHA512

                                        f9f975bdece87501b3e3e4a3f49ab433a5daee3c046b41e4aff2748ae15f3cd285e056d7aafd235641d39de79c4ac506c56aef8d1f91b1c47c425c5912f40599

                                      • C:\Users\Admin\AppData\Local\Temp\__PSScriptPolicyTest_izsvphmp.uv2.ps1

                                        Filesize

                                        60B

                                        MD5

                                        d17fe0a3f47be24a6453e9ef58c94641

                                        SHA1

                                        6ab83620379fc69f80c0242105ddffd7d98d5d9d

                                        SHA256

                                        96ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7

                                        SHA512

                                        5b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82

                                      • C:\Users\Admin\Downloads\Redline Crack\Redline Crack\Panel\RedLine_20_2\Panel\Panel.exe

                                        Filesize

                                        181KB

                                        MD5

                                        d12407c805a128099e2ae7929ec81030

                                        SHA1

                                        d5de8f0adff0d33780d1307ddbaa08c210b21432

                                        SHA256

                                        74e5079e7eb3e39ecf0f0d2d48a119770100bfd44f7f776a12ec0c25ed5936b8

                                        SHA512

                                        bc67efe96ef236eec83dbfd6b5258f79c2e99e1454132f75e399fdcede06f4468e355d263c06c507f47dc0c7273b87e99fd142a1f6841d9c56ef318908f8bef1

                                      • C:\Users\Admin\Downloads\Redline Crack\Redline Crack\Panel\RedLine_20_2\Panel\Panel.exe.config

                                        Filesize

                                        26KB

                                        MD5

                                        494890d393a5a8c54771186a87b0265e

                                        SHA1

                                        162fa5909c1c3f84d34bda5d3370a957fe58c9c8

                                        SHA256

                                        f2a5a06359713226aeacfe239eeb8ae8606f4588d8e58a19947c3a190efbdfc7

                                        SHA512

                                        40fbd033f288fee074fc36e899796efb30d3c582784b834fc583706f19a0b8d5a134c6d1405afe563d2676072e4eefc4e169b2087867cab77a3fa1aa1a7c9395

                                      • memory/1712-106-0x0000000006680000-0x00000000066A2000-memory.dmp

                                        Filesize

                                        136KB

                                      • memory/1712-105-0x0000000006630000-0x000000000664A000-memory.dmp

                                        Filesize

                                        104KB

                                      • memory/1712-104-0x00000000066B0000-0x0000000006746000-memory.dmp

                                        Filesize

                                        600KB

                                      • memory/1712-103-0x0000000006140000-0x000000000615E000-memory.dmp

                                        Filesize

                                        120KB

                                      • memory/1712-101-0x0000000005B90000-0x0000000005EE4000-memory.dmp

                                        Filesize

                                        3.3MB

                                      • memory/1712-89-0x0000000005A00000-0x0000000005A66000-memory.dmp

                                        Filesize

                                        408KB

                                      • memory/1712-84-0x0000000005220000-0x0000000005848000-memory.dmp

                                        Filesize

                                        6.2MB

                                      • memory/1712-90-0x0000000005B20000-0x0000000005B86000-memory.dmp

                                        Filesize

                                        408KB

                                      • memory/1712-82-0x0000000002810000-0x0000000002846000-memory.dmp

                                        Filesize

                                        216KB

                                      • memory/1712-87-0x0000000005180000-0x00000000051A2000-memory.dmp

                                        Filesize

                                        136KB

                                      • memory/2124-116-0x00000000060F0000-0x0000000006444000-memory.dmp

                                        Filesize

                                        3.3MB

                                      • memory/2828-74-0x0000000075320000-0x0000000075AD0000-memory.dmp

                                        Filesize

                                        7.7MB

                                      • memory/2828-114-0x0000000075320000-0x0000000075AD0000-memory.dmp

                                        Filesize

                                        7.7MB

                                      • memory/2828-109-0x0000000075320000-0x0000000075AD0000-memory.dmp

                                        Filesize

                                        7.7MB

                                      • memory/2828-73-0x0000000075320000-0x0000000075AD0000-memory.dmp

                                        Filesize

                                        7.7MB

                                      • memory/3600-86-0x00000000057E0000-0x00000000057F2000-memory.dmp

                                        Filesize

                                        72KB

                                      • memory/3600-80-0x0000000000400000-0x000000000041E000-memory.dmp

                                        Filesize

                                        120KB

                                      • memory/3600-88-0x0000000005880000-0x00000000058BC000-memory.dmp

                                        Filesize

                                        240KB

                                      • memory/3600-85-0x0000000005E00000-0x0000000006418000-memory.dmp

                                        Filesize

                                        6.1MB

                                      • memory/3600-96-0x00000000058C0000-0x000000000590C000-memory.dmp

                                        Filesize

                                        304KB

                                      • memory/3600-102-0x0000000005B10000-0x0000000005C1A000-memory.dmp

                                        Filesize

                                        1.0MB

                                      • memory/4440-69-0x0000000004D30000-0x0000000004D3A000-memory.dmp

                                        Filesize

                                        40KB

                                      • memory/4440-76-0x0000000075320000-0x0000000075AD0000-memory.dmp

                                        Filesize

                                        7.7MB

                                      • memory/4440-71-0x0000000004F80000-0x0000000004FF6000-memory.dmp

                                        Filesize

                                        472KB

                                      • memory/4440-77-0x0000000004E30000-0x0000000004E52000-memory.dmp

                                        Filesize

                                        136KB

                                      • memory/4440-70-0x0000000075320000-0x0000000075AD0000-memory.dmp

                                        Filesize

                                        7.7MB

                                      • memory/4440-78-0x0000000005190000-0x00000000051AE000-memory.dmp

                                        Filesize

                                        120KB

                                      • memory/4440-83-0x0000000075320000-0x0000000075AD0000-memory.dmp

                                        Filesize

                                        7.7MB

                                      • memory/4440-68-0x0000000004D50000-0x0000000004DE2000-memory.dmp

                                        Filesize

                                        584KB

                                      • memory/4440-67-0x0000000005300000-0x00000000058A4000-memory.dmp

                                        Filesize

                                        5.6MB

                                      • memory/4440-66-0x00000000002F0000-0x0000000000324000-memory.dmp

                                        Filesize

                                        208KB

                                      • memory/4440-75-0x000000007532E000-0x000000007532F000-memory.dmp

                                        Filesize

                                        4KB

                                      • memory/4440-65-0x000000007532E000-0x000000007532F000-memory.dmp

                                        Filesize

                                        4KB

                                      • memory/4496-154-0x0000000005700000-0x0000000005A54000-memory.dmp

                                        Filesize

                                        3.3MB

                                      • memory/4856-130-0x000001D4AC750000-0x000001D4AC751000-memory.dmp

                                        Filesize

                                        4KB

                                      • memory/4856-135-0x000001D4AC750000-0x000001D4AC751000-memory.dmp

                                        Filesize

                                        4KB

                                      • memory/4856-139-0x000001D4AC750000-0x000001D4AC751000-memory.dmp

                                        Filesize

                                        4KB

                                      • memory/4856-138-0x000001D4AC750000-0x000001D4AC751000-memory.dmp

                                        Filesize

                                        4KB

                                      • memory/4856-137-0x000001D4AC750000-0x000001D4AC751000-memory.dmp

                                        Filesize

                                        4KB

                                      • memory/4856-140-0x000001D4AC750000-0x000001D4AC751000-memory.dmp

                                        Filesize

                                        4KB

                                      • memory/4856-134-0x000001D4AC750000-0x000001D4AC751000-memory.dmp

                                        Filesize

                                        4KB

                                      • memory/4856-136-0x000001D4AC750000-0x000001D4AC751000-memory.dmp

                                        Filesize

                                        4KB

                                      • memory/4856-128-0x000001D4AC750000-0x000001D4AC751000-memory.dmp

                                        Filesize

                                        4KB

                                      • memory/4856-129-0x000001D4AC750000-0x000001D4AC751000-memory.dmp

                                        Filesize

                                        4KB