Analysis

  • max time kernel
    1049s
  • max time network
    869s
  • platform
    windows10-1703_x64
  • resource
    win10-20240404-en
  • resource tags

    arch:x64arch:x86image:win10-20240404-enlocale:en-usos:windows10-1703-x64system
  • submitted
    30-06-2024 21:33

General

  • Target

    Updated-Ver-v319-04-27.html

  • Size

    7KB

  • MD5

    daef02f6b1316ad0e05d17060f1490cc

  • SHA1

    31c445c775a89734e75f93f4614dbdc5d7afd59b

  • SHA256

    544df7e0b35c825673c785c27e0bdda1f4559e4f3cef72615108d24f15ffbd58

  • SHA512

    cb63884b1f8d4815b614e2d68eba192199f5021a2d64c536ff514a8fdbeca0d928cc45013da3d9c00fc3c45b0154d4e8aad0034f9c4894859d0b65d6f81202e5

  • SSDEEP

    96:3suWziM8mMAfjmZ/r4N/PJjeIJumKF95RZjieojwXZkDpkqP18Gmf:ut7m5WJjeeu1hkrWf

Malware Config

Extracted

Family

redline

Botnet

@hersgorid

C2

94.228.166.68:80

Signatures

  • RedLine

    RedLine Stealer is a malware family written in C#, first appearing in early 2020.

  • RedLine payload 1 IoCs
  • Executes dropped EXE 1 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Suspicious use of SetThreadContext 1 IoCs
  • Drops file in Windows directory 6 IoCs
  • Program crash 1 IoCs
  • Modifies Internet Explorer settings 1 TTPs 3 IoCs
  • Modifies registry class 64 IoCs
  • NTFS ADS 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 6 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs
  • Suspicious behavior: MapViewOfSection 6 IoCs
  • Suspicious use of AdjustPrivilegeToken 17 IoCs
  • Suspicious use of FindShellTrayWindow 2 IoCs
  • Suspicious use of SetWindowsHookEx 5 IoCs
  • Suspicious use of WriteProcessMemory 30 IoCs
  • Uses Task Scheduler COM API 1 TTPs

    The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.

  • Uses Volume Shadow Copy WMI provider

    The Volume Shadow Copy service is used to manage backups/snapshots.

  • Uses Volume Shadow Copy service COM API

    The Volume Shadow Copy service is used to manage backups/snapshots.

Processes

  • C:\Windows\system32\LaunchWinApp.exe
    "C:\Windows\system32\LaunchWinApp.exe" "C:\Users\Admin\AppData\Local\Temp\Updated-Ver-v319-04-27.html"
    1⤵
      PID:3928
    • C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdge.exe
      "C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdge.exe" -ServerName:MicrosoftEdge.AppXdnhjhccw3zf0j06tkg3jtqr00qdm0khc.mca
      1⤵
      • Drops file in Windows directory
      • Modifies registry class
      • Suspicious use of SetWindowsHookEx
      PID:4684
    • C:\Windows\system32\browser_broker.exe
      C:\Windows\system32\browser_broker.exe -Embedding
      1⤵
      • Modifies Internet Explorer settings
      • NTFS ADS
      PID:356
    • C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe
      "C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe" -ServerName:ContentProcess.AppX6z3cwk4fvgady6zya12j1cw28d228a7k.mca
      1⤵
      • Modifies registry class
      • Suspicious behavior: MapViewOfSection
      • Suspicious use of SetWindowsHookEx
      • Suspicious use of WriteProcessMemory
      PID:4740
    • C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe
      "C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe" -ServerName:ContentProcess.AppX6z3cwk4fvgady6zya12j1cw28d228a7k.mca
      1⤵
      • Drops file in Windows directory
      • Modifies Internet Explorer settings
      • Modifies registry class
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of SetWindowsHookEx
      PID:3272
    • C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe
      "C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe" -ServerName:ContentProcess.AppX6z3cwk4fvgady6zya12j1cw28d228a7k.mca
      1⤵
      • Drops file in Windows directory
      • Modifies Internet Explorer settings
      • Modifies registry class
      • Suspicious use of AdjustPrivilegeToken
      PID:3016
    • C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe
      "C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe" -ServerName:ContentProcess.AppX6z3cwk4fvgady6zya12j1cw28d228a7k.mca
      1⤵
      • Modifies registry class
      PID:2208
    • C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe
      "C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe" -ServerName:ContentProcess.AppX6z3cwk4fvgady6zya12j1cw28d228a7k.mca
      1⤵
      • Drops file in Windows directory
      • Modifies registry class
      PID:2908
    • C:\Windows\System32\PickerHost.exe
      C:\Windows\System32\PickerHost.exe -Embedding
      1⤵
      • Drops file in Windows directory
      • Modifies registry class
      • Suspicious behavior: GetForegroundWindowSpam
      • Suspicious use of SetWindowsHookEx
      PID:1300
    • C:\Program Files\7-Zip\7zG.exe
      "C:\Program Files\7-Zip\7zG.exe" x -o"C:\Users\Admin\Desktop\" -an -ai#7zMap24727:74:7zEvent28374
      1⤵
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of FindShellTrayWindow
      PID:3148
    • C:\Program Files\7-Zip\7zG.exe
      "C:\Program Files\7-Zip\7zG.exe" x -o"C:\Users\Admin\Desktop\Archived\" -ad -an -ai#7zMap13226:74:7zEvent17550
      1⤵
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of FindShellTrayWindow
      PID:2332
    • C:\Windows\System32\rundll32.exe
      C:\Windows\System32\rundll32.exe C:\Windows\System32\shell32.dll,SHCreateLocalServerRunDll {9aa46009-3ce0-458a-a354-715610a075e6} -Embedding
      1⤵
        PID:4732
      • C:\Users\Admin\Desktop\Archived\Setup.exe
        "C:\Users\Admin\Desktop\Archived\Setup.exe"
        1⤵
        • Executes dropped EXE
        • Suspicious use of SetThreadContext
        • Suspicious use of WriteProcessMemory
        PID:5248
        • C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe
          "C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"
          2⤵
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of AdjustPrivilegeToken
          PID:5260
        • C:\Windows\SysWOW64\WerFault.exe
          C:\Windows\SysWOW64\WerFault.exe -u -p 5248 -s 648
          2⤵
          • Program crash
          PID:5292
      • C:\Windows\system32\browser_broker.exe
        C:\Windows\system32\browser_broker.exe -Embedding
        1⤵
          PID:6020

        Network

        MITRE ATT&CK Matrix ATT&CK v13

        Defense Evasion

        Modify Registry

        1
        T1112

        Credential Access

        Unsecured Credentials

        2
        T1552

        Credentials In Files

        2
        T1552.001

        Discovery

        Query Registry

        2
        T1012

        Collection

        Data from Local System

        2
        T1005

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • C:\Users\Admin\AppData\Local\Microsoft\Windows\Explorer\iconcache_idx.db
          Filesize

          14KB

          MD5

          37f8b01c27b2eb1cd1ad31b08b7b6742

          SHA1

          029d453e59707e87a5c12c7c7be919fad1d30793

          SHA256

          11d8c0d3e5d313434a30cc09fc546b783c45f6d7fbf3a6a82e143b6b94fe1396

          SHA512

          9bebfd146104388a49729b40a170c76b05acbc0f3c9e8536959c74d5fdc3a6c9e4ba4a87eec0724d3dd98756023d04e4cf6640594545868ff2dd148786c5eaac

        • C:\Users\Admin\AppData\Local\Microsoft\Windows\INetCache\IE\L5P12AEX\edgecompatviewlist[1].xml
          Filesize

          74KB

          MD5

          d4fc49dc14f63895d997fa4940f24378

          SHA1

          3efb1437a7c5e46034147cbbc8db017c69d02c31

          SHA256

          853d2f4eb81c9fdcea2ee079f6faf98214b111b77cdf68709b38989d123890f1

          SHA512

          cc60d79b4afe5007634ac21dc4bc92081880be4c0d798a1735b63b27e936c02f399964f744dc73711987f01e8a1064b02a4867dd6cac27538e5fbe275cc61e0a

        • C:\Users\Admin\AppData\Local\Packages\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\AC\#!001\MicrosoftEdge\User\Default\DOMStore\GFN7VJDV\www.mediafire[1].xml
          Filesize

          13B

          MD5

          c1ddea3ef6bbef3e7060a1a9ad89e4c5

          SHA1

          35e3224fcbd3e1af306f2b6a2c6bbea9b0867966

          SHA256

          b71e4d17274636b97179ba2d97c742735b6510eb54f22893d3a2daff2ceb28db

          SHA512

          6be8cec7c862afae5b37aa32dc5bb45912881a3276606da41bf808a4ef92c318b355e616bf45a257b995520d72b7c08752c0be445dceade5cf79f73480910fed

        • C:\Users\Admin\AppData\Local\Packages\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\AC\#!001\MicrosoftEdge\User\Default\DOMStore\GFN7VJDV\www.mediafire[1].xml
          Filesize

          1KB

          MD5

          91c5401f140216840d0248eecc3e17d1

          SHA1

          4f53f5374e99bd4ec1f0f4be71336ad712887541

          SHA256

          e07632ece0ca827cb4141350958db0140b930f6da2fabb7ba2ba451221478de1

          SHA512

          f2443bf2384e9c06dd233bf077eadc7a3be4644b4844502664eda72d6197fb97d9d0d4063ea1baf835e13e67524986dec819fc4d3d27c58afec2330353616040

        • C:\Users\Admin\AppData\Local\Packages\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\AC\MicrosoftEdge\Cache\4RWS5CSS\suggestions[1].en-US
          Filesize

          17KB

          MD5

          5a34cb996293fde2cb7a4ac89587393a

          SHA1

          3c96c993500690d1a77873cd62bc639b3a10653f

          SHA256

          c6a5377cbc07eece33790cfc70572e12c7a48ad8296be25c0cc805a1f384dbad

          SHA512

          e1b7d0107733f81937415104e70f68b1be6fd0ca65dccf4ff72637943d44278d3a77f704aedff59d2dbc0d56a609b2590c8ec0dd6bc48ab30f1dad0c07a0a3ee

        • C:\Users\Admin\AppData\Local\Packages\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\AC\MicrosoftEdge\Cache\NVYB3WZ7\favicon[1].ico
          Filesize

          10KB

          MD5

          a301c91c118c9e041739ad0c85dfe8c5

          SHA1

          039962373b35960ef2bb5fbbe3856c0859306bf7

          SHA256

          cdc78cc8b2994712a041a2a4cb02f488afbab00981771bdd3a8036c2dddf540f

          SHA512

          3a5a2801e0556c96574d8ab5782fc5eab0be2af7003162da819ac99e0737c8876c0db7b42bb7c149c4f4d9cfe61d2878ff1945017708f5f7254071f342a6880a

        • C:\Users\Admin\AppData\Local\Packages\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\AC\Microsoft\CryptnetUrlCache\Content\57C8EDB95DF3F0AD4EE2DC2B8CFD4157
          Filesize

          4KB

          MD5

          1bfe591a4fe3d91b03cdf26eaacd8f89

          SHA1

          719c37c320f518ac168c86723724891950911cea

          SHA256

          9cf94355051bf0f4a45724ca20d1cc02f76371b963ab7d1e38bd8997737b13d8

          SHA512

          02f88da4b610678c31664609bcfa9d61db8d0b0617649981af948f670f41a6207b4ec19fecce7385a24e0c609cbbf3f2b79a8acaf09a03c2c432cc4dce75e9db

        • C:\Users\Admin\AppData\Local\Packages\microsoft.microsoftedge_8wekyb3d8bbwe\AC\#!001\MicrosoftEdge\Cache\94QRFRGU\Archived[1].rar
          Filesize

          32KB

          MD5

          62dc6d41bcb3ac2d9919bc60d56cfcb8

          SHA1

          67bc4375bae4966306e93d6ac7e3700abd249792

          SHA256

          badab1bd2b9e60f02cf0abfa8c361c9e01bc5ceaaebab1f6974b78fc69c642fa

          SHA512

          14603c9c6e63aa3ced48fc0e6fdfd1835aa5789568188b290fd4d88146facfca3c7d853754db2e6cf8a800913451ea7016a6e42437e05179d676c0278e32d98d

        • C:\Users\Admin\Desktop\Archived.rar.hxlr8dn.partial
          Filesize

          49.2MB

          MD5

          77b9a95c60cde62779e3f0529784e5ab

          SHA1

          417f2c93af7205f0005a969706e10b3dd52528d1

          SHA256

          79e710d53964ea8876aa2b385576ad2ab0b13065f0a146f1711c16ba3ef41d0b

          SHA512

          42298290641d8cddf0a30a6c72d6713efc4ab7f41869181c49d1416d75e16d1600d1c1a1a46226539a8745c35b77b2686d9f8c518d8e1781eec6c24fb493a79e

        • C:\Users\Admin\Desktop\Archived\Setup.exe
          Filesize

          500KB

          MD5

          523b68fbf40f8f2735a280c4cddaebb2

          SHA1

          5b94c5e72ec15b22709b5b8ad20cf9d7e3393456

          SHA256

          f263b69e857fa6ef99906028fb4755aa02134fc6b6462895206a285dff00ab5c

          SHA512

          63feb15a45f0668ab14da9ed0a78f85f74d6511b72e36899ac815208c76c15c6e76024456d633208ee131c73b980d070c4a2c50136b5876a40551c97687545c3

        • C:\Users\Admin\Desktop\Archived\css\fonts\Open-Sans\generator_config.txt
          Filesize

          720B

          MD5

          1064c6f4385932ff89befbd918912a0e

          SHA1

          0dd2238d662f7a72017a9be4087fe0475a95133e

          SHA256

          fb649287303416e9d2019b86fa1d1e8ff68f7d2be0dc25c4bf79d0c7fc4937a4

          SHA512

          da157d06168aaafa5658844cae8ee933aaae8e2bbfaf079700094caad2658e983d48a72df4cb7528280260e0e0d0e63eda40d6ff8346fc378ded62d170a128c0

        • C:\Users\Admin\Desktop\Archived\graphics\btnOvrOffRight.tga
          Filesize

          444B

          MD5

          89cb2bc5ccdab01b0653d4dbb3d6a062

          SHA1

          afb947fffd5f5f3723e0c8c3b52cb8cbff406ee9

          SHA256

          ecd13153d9d438809a38de30f3abbb0f6f92837a7e3cacb442a9a9309bcd78d9

          SHA512

          e5bef83bfad930e2b68720e00d450aa879619dcabcf8d96f9f8c47636a95a9662bc91b04cfa9160081d8af79a1257b75647d89677123f28b8c609808d5b86653

        • C:\Users\Admin\Desktop\Archived\graphics\[email protected]
          Filesize

          6KB

          MD5

          5a5715177822e69c98aab578421ae78f

          SHA1

          175ea27d6ef6df27fae93a724c94b2c770f78205

          SHA256

          5afc5816946e0d7b6d57a99a60be71d9e88670d9a63c18e249c9266d8e95cd2f

          SHA512

          b11d05dff7f9ce55c2b30de82709f5aa9b410734e1b88a6879e3489394a5b36a27389022de0a741a16f70d0639439d4f75942c3fd604567d63b9ec229d86b331

        • C:\Users\Admin\Desktop\Archived\graphics\html_lock_disabled.tga
          Filesize

          14KB

          MD5

          0a9594013ed88e0ef4f33f8e923a5a29

          SHA1

          52fa6265060d744d208b1c21dffc58dcb8cf7c52

          SHA256

          a7d51b286ceeb535d4de432d9c98ed38ba1bce04a3b4f467918a893babbc8606

          SHA512

          91c577456726bbfbf0e97e9add3df87286fce7965eaa9bcae91ce6888dd1957868264d1d2a0c91e48f78f4dd53dbbe534613de14b6b82e9bfba3f3741a13ab58

        • C:\Users\Admin\Desktop\Archived\graphics\[email protected]
          Filesize

          15KB

          MD5

          197451ccba3445f0649ea70af2478b67

          SHA1

          d5d8870de59dd92b2689bba27aee85f85211fe7b

          SHA256

          d3af480fe975487ea4754c88dd56df0d4cfe68633eb9abb2458f42ae3df34479

          SHA512

          348b98e050c6f9525e3a6aa291e4da9b30542e62d229e002b0e325e6d967903d18d853eb9eaa460eb152f3add3583e7fdf3b69d48f024a830ad929878b12f651

        • C:\Users\Admin\Desktop\Archived\graphics\icon_button_friends_mouseover.tga
          Filesize

          20KB

          MD5

          4231435f1957759057ec02169c20a2ff

          SHA1

          aa27d01fff4e986558acf8f056695d6b5a0f273e

          SHA256

          06edfe142eb6977cd123109b040dd19e5af92aa7399d876a3e2bfd5b03cc2117

          SHA512

          cf4bac853a388625a44cce4b4818201989fcd01abe044bee5a5aa8d523f1f73c8e35eb1d0108d7442aa6ef287fe10a37028566792f03447d85a9611a6c322de9

        • C:\Users\Admin\Desktop\Archived\graphics\[email protected]
          Filesize

          92KB

          MD5

          57200ac4f495266f043f6d2c602b35a8

          SHA1

          da7b499312cfbfb32ef8966945cd84a32b971387

          SHA256

          f200aca23ac6739a6d521298094972383f835d8fcac24b7bdef820181ae8c37a

          SHA512

          5c5b6b729db7874605901519ab7a0e5701550b5aa909b0f9124ce4d5ed8d1370993806f7b70e71e6c93e79e84e7ba40d007c6942951ac49cfef3a9dd75ed50a9

        • C:\Users\Admin\Desktop\Archived\graphics\tabStdRight.tga
          Filesize

          48B

          MD5

          bd64c051ae2410eef96839a3cb7297f7

          SHA1

          95a5b0455d69127fe50e396153c795d9914ce0d4

          SHA256

          5caa5fa3e79dcd8ec5ec20256ed7c77efaae77e0ae8d89e4a974c484cb177d84

          SHA512

          ea2f76c8cf5dc2fd15017ad9b942d020c3ad5ce1cedc2a1604137ea02f8411cfff4166ffe93c101756b404344488b304cf2b4a71c25b2929654dda9a88a88793

        • memory/2908-146-0x0000015E14FC0000-0x0000015E14FE0000-memory.dmp
          Filesize

          128KB

        • memory/2908-264-0x0000015E15F50000-0x0000015E15F70000-memory.dmp
          Filesize

          128KB

        • memory/2908-322-0x0000015E14200000-0x0000015E14300000-memory.dmp
          Filesize

          1024KB

        • memory/2908-100-0x0000015E04000000-0x0000015E04100000-memory.dmp
          Filesize

          1024KB

        • memory/2908-298-0x0000015E16700000-0x0000015E16800000-memory.dmp
          Filesize

          1024KB

        • memory/2908-357-0x0000015E15D10000-0x0000015E15D12000-memory.dmp
          Filesize

          8KB

        • memory/2908-361-0x0000015E161F0000-0x0000015E161F2000-memory.dmp
          Filesize

          8KB

        • memory/2908-364-0x0000015E16410000-0x0000015E16412000-memory.dmp
          Filesize

          8KB

        • memory/2908-370-0x0000015E164E0000-0x0000015E164E2000-memory.dmp
          Filesize

          8KB

        • memory/2908-367-0x0000015E164D0000-0x0000015E164D2000-memory.dmp
          Filesize

          8KB

        • memory/2908-359-0x0000015E161B0000-0x0000015E161B2000-memory.dmp
          Filesize

          8KB

        • memory/2908-387-0x0000015E1A400000-0x0000015E1A420000-memory.dmp
          Filesize

          128KB

        • memory/2908-455-0x0000015E19CF0000-0x0000015E19CF2000-memory.dmp
          Filesize

          8KB

        • memory/2908-472-0x0000015E19B20000-0x0000015E19B40000-memory.dmp
          Filesize

          128KB

        • memory/3016-63-0x0000028FFF600000-0x0000028FFF602000-memory.dmp
          Filesize

          8KB

        • memory/3016-61-0x0000028FFF4E0000-0x0000028FFF4E2000-memory.dmp
          Filesize

          8KB

        • memory/3016-67-0x0000028FFF6E0000-0x0000028FFF6E2000-memory.dmp
          Filesize

          8KB

        • memory/3016-81-0x0000028FFF7A0000-0x0000028FFF7A2000-memory.dmp
          Filesize

          8KB

        • memory/3016-55-0x0000028FEE8C0000-0x0000028FEE8C2000-memory.dmp
          Filesize

          8KB

        • memory/3016-57-0x0000028FEE8E0000-0x0000028FEE8E2000-memory.dmp
          Filesize

          8KB

        • memory/3016-59-0x0000028FFF4C0000-0x0000028FFF4C2000-memory.dmp
          Filesize

          8KB

        • memory/3016-65-0x0000028FFF6C0000-0x0000028FFF6C2000-memory.dmp
          Filesize

          8KB

        • memory/3272-44-0x000002210EE00000-0x000002210EF00000-memory.dmp
          Filesize

          1024KB

        • memory/4684-338-0x0000017233B10000-0x0000017233B11000-memory.dmp
          Filesize

          4KB

        • memory/4684-337-0x0000017232A70000-0x0000017232A71000-memory.dmp
          Filesize

          4KB

        • memory/4684-0-0x000001722DF20000-0x000001722DF30000-memory.dmp
          Filesize

          64KB

        • memory/4684-35-0x000001722D000000-0x000001722D002000-memory.dmp
          Filesize

          8KB

        • memory/4684-16-0x000001722E020000-0x000001722E030000-memory.dmp
          Filesize

          64KB

        • memory/5260-3210-0x0000000000400000-0x0000000000450000-memory.dmp
          Filesize

          320KB

        • memory/5260-3212-0x0000000004FA0000-0x0000000005032000-memory.dmp
          Filesize

          584KB

        • memory/5260-3213-0x00000000050B0000-0x00000000050BA000-memory.dmp
          Filesize

          40KB

        • memory/5260-3214-0x00000000064B0000-0x0000000006AB6000-memory.dmp
          Filesize

          6.0MB

        • memory/5260-3216-0x0000000006410000-0x0000000006422000-memory.dmp
          Filesize

          72KB

        • memory/5260-3215-0x0000000007C80000-0x0000000007D8A000-memory.dmp
          Filesize

          1.0MB

        • memory/5260-3217-0x0000000006470000-0x00000000064AE000-memory.dmp
          Filesize

          248KB

        • memory/5260-3218-0x0000000007D90000-0x0000000007DDB000-memory.dmp
          Filesize

          300KB

        • memory/5260-3219-0x00000000088F0000-0x0000000008956000-memory.dmp
          Filesize

          408KB

        • memory/5260-3220-0x0000000008BB0000-0x0000000008C00000-memory.dmp
          Filesize

          320KB

        • memory/5260-3221-0x0000000009CE0000-0x0000000009EA2000-memory.dmp
          Filesize

          1.8MB

        • memory/5260-3222-0x000000000A3E0000-0x000000000A90C000-memory.dmp
          Filesize

          5.2MB

        • memory/5260-3211-0x00000000054A0000-0x000000000599E000-memory.dmp
          Filesize

          5.0MB