Analysis

  • max time kernel
    146s
  • max time network
    148s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240226-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system
  • submitted
    18/03/2024, 12:07

General

  • Target

    d377c753b16748d33fb905bfb9a43ab4.exe

  • Size

    876KB

  • MD5

    d377c753b16748d33fb905bfb9a43ab4

  • SHA1

    8e4f4e4d7bc96d63500436c7853d873a5120c551

  • SHA256

    9412d5aa1137d054d292dcfca028e0d3496317aa073d1fd62819b9cef3915710

  • SHA512

    b1695791dfe82abdfe5d43c821e754c6dde0212ec85cbf92c6e5064507176e2d1c4907103acfc29c8d88727d703cd8bcd8dcfdd8298c7dc2b97818d5b1cd0014

  • SSDEEP

    24576:nyLHuEU/Ve5SXJe8qXHgaKpr6gLUIpnK2ljS27vs:yLOgR3fgLPpyU

Malware Config

Extracted

Family

redline

Botnet

Build2_Mastif

C2

95.181.157.69:8552

Signatures

  • RedLine

    RedLine Stealer is a malware family written in C#, first appearing in early 2020.

  • RedLine payload 1 IoCs
  • SectopRAT

    SectopRAT is a remote access trojan first seen in November 2019.

  • SectopRAT payload 1 IoCs
  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Executes dropped EXE 3 IoCs
  • Obfuscated with Agile.Net obfuscator 4 IoCs

    Detects use of the Agile.Net commercial obfuscator, which is capable of entity renaming and control flow obfuscation.

  • Adds Run key to start application 2 TTPs 1 IoCs
  • Legitimate hosting services abused for malware hosting/C2 1 TTPs 2 IoCs
  • Suspicious use of SetThreadContext 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Enumerates system info in registry 2 TTPs 3 IoCs
  • Suspicious behavior: EnumeratesProcesses 11 IoCs
  • Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 6 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of FindShellTrayWindow 25 IoCs
  • Suspicious use of SendNotifyMessage 24 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\d377c753b16748d33fb905bfb9a43ab4.exe
    "C:\Users\Admin\AppData\Local\Temp\d377c753b16748d33fb905bfb9a43ab4.exe"
    1⤵
    • Adds Run key to start application
    • Suspicious use of WriteProcessMemory
    PID:668
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\Install.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\Install.exe
      2⤵
      • Checks computer location settings
      • Executes dropped EXE
      • Suspicious use of WriteProcessMemory
      PID:2064
      • C:\Windows\SysWOW64\cmd.exe
        C:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\7zS3122.tmp\Install.cmd" "
        3⤵
        • Suspicious use of WriteProcessMemory
        PID:2092
        • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
          "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument https://iplogger.org/1XQju7
          4⤵
          • Enumerates system info in registry
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
          • Suspicious use of FindShellTrayWindow
          • Suspicious use of SendNotifyMessage
          • Suspicious use of WriteProcessMemory
          PID:2168
          • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
            "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0x108,0x10c,0x110,0xe4,0x114,0x7ffa068b46f8,0x7ffa068b4708,0x7ffa068b4718
            5⤵
              PID:4332
            • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
              "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=1984,8104689415138739133,5539428981954773749,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2040 /prefetch:2
              5⤵
                PID:4976
              • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=1984,8104689415138739133,5539428981954773749,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2236 /prefetch:3
                5⤵
                • Suspicious behavior: EnumeratesProcesses
                PID:3972
              • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=1984,8104689415138739133,5539428981954773749,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2924 /prefetch:8
                5⤵
                  PID:840
                • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                  "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1984,8104689415138739133,5539428981954773749,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3300 /prefetch:1
                  5⤵
                    PID:4824
                  • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                    "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1984,8104689415138739133,5539428981954773749,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3320 /prefetch:1
                    5⤵
                      PID:1640
                    • C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe
                      "C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=1984,8104689415138739133,5539428981954773749,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5148 /prefetch:8
                      5⤵
                        PID:4828
                      • C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe
                        "C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=1984,8104689415138739133,5539428981954773749,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5148 /prefetch:8
                        5⤵
                        • Suspicious behavior: EnumeratesProcesses
                        PID:3256
                      • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                        "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1984,8104689415138739133,5539428981954773749,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4088 /prefetch:1
                        5⤵
                          PID:4648
                        • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                          "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1984,8104689415138739133,5539428981954773749,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5228 /prefetch:1
                          5⤵
                            PID:1860
                          • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                            "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1984,8104689415138739133,5539428981954773749,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3948 /prefetch:1
                            5⤵
                              PID:5172
                            • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                              "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1984,8104689415138739133,5539428981954773749,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3452 /prefetch:1
                              5⤵
                                PID:5180
                              • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=1984,8104689415138739133,5539428981954773749,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=4856 /prefetch:2
                                5⤵
                                • Suspicious behavior: EnumeratesProcesses
                                PID:3480
                        • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\RUNTIM~1.EXE
                          C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\RUNTIM~1.EXE
                          2⤵
                          • Executes dropped EXE
                          • Suspicious use of SetThreadContext
                          PID:4820
                          • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\RUNTIM~1.EXE
                            "C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\RUNTIM~1.EXE"
                            3⤵
                            • Executes dropped EXE
                            • Suspicious use of AdjustPrivilegeToken
                            PID:6052
                      • C:\Windows\System32\CompPkgSrv.exe
                        C:\Windows\System32\CompPkgSrv.exe -Embedding
                        1⤵
                          PID:4944
                        • C:\Windows\System32\CompPkgSrv.exe
                          C:\Windows\System32\CompPkgSrv.exe -Embedding
                          1⤵
                            PID:3764

                          Network

                          MITRE ATT&CK Enterprise v15

                          Replay Monitor

                          Loading Replay Monitor...

                          Downloads

                          • C:\Users\Admin\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\RUNTIM~1.EXE.log

                            Filesize

                            1KB

                            MD5

                            17573558c4e714f606f997e5157afaac

                            SHA1

                            13e16e9415ceef429aaf124139671ebeca09ed23

                            SHA256

                            c18db6aecad2436da4a63ff26af4e3a337cca48f01c21b8db494fe5ccc60e553

                            SHA512

                            f4edf13f05a0d142e4dd42802098c8c44988ee8869621a62c2b565a77c9a95857f636583ff8d6d9baa366603d98b9bfbf1fc75bc6f9f8f83c80cb1215b2941cc

                          • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad\settings.dat

                            Filesize

                            152B

                            MD5

                            e0811105475d528ab174dfdb69f935f3

                            SHA1

                            dd9689f0f70a07b4e6fb29607e42d2d5faf1f516

                            SHA256

                            c91388c87878a9e2c530c6096dbdd993b0a26fefe8ad797e0133547225032d6c

                            SHA512

                            8374a721ea3ff3a1ea70d8a074e5c193dbba27ba7e301f19cea89d648b2378c376e48310c33fe81078cd40b1863daec935e8ac22e8e3878dc3a5bb529d028852

                          • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad\settings.dat

                            Filesize

                            152B

                            MD5

                            47b2c6613360b818825d076d14c051f7

                            SHA1

                            7df7304568313a06540f490bf3305cb89bc03e5c

                            SHA256

                            47a22bea2e7d0154c59bf5d8790ec68274eb05e9fa6cf0eab0d648121f1a02ac

                            SHA512

                            08d2366fc1ce87dbe96b9bf997e4c59c9206fcfea47c1f17b01e79aeb0580f25cac5c7349bb453a50775b2743053446653f4129f835f81f4a8547ca392557aac

                          • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Network Persistent State

                            Filesize

                            180B

                            MD5

                            4bc8a3540a546cfe044e0ed1a0a22a95

                            SHA1

                            5387f78f1816dee5393bfca1fffe49cede5f59c1

                            SHA256

                            f90fcadf34fbec9cabd9bcfdea0a63a1938aef5ea4c1f7b313e77f5d3f5bbdca

                            SHA512

                            e75437d833a3073132beed8280d30e4bb99b32e94d8671528aec53f39231c30476afb9067791e4eb9f1258611c167bfe98b09986d1877ca3ed96ea37b8bceecf

                          • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Preferences

                            Filesize

                            6KB

                            MD5

                            52a6223f2a667eb3d12f5d58dbf620b7

                            SHA1

                            eb3fbbf7f91ac74ac6a2ec648c096f4219767a0b

                            SHA256

                            593eadf51c370a64a8675d4e8432b5fb353442f19eff0db83224457b7f3083c9

                            SHA512

                            0f24e25ec72f870d285a168d65cbe4cb0b5d4bf5a797bc4b052b25d7faa89805aad6f01f770f74388b163a4c109c548eb429f194c8b47dd5077b8fabf6741407

                          • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Preferences

                            Filesize

                            6KB

                            MD5

                            8cf2ee077ed65dc2fd96884c884a1ed7

                            SHA1

                            dc4639b5a56d6927ebdce264814b82345ffbef14

                            SHA256

                            172917c63c314e2eb9df590a6ce7e8282657824c213ac869f2b61417fe72bbb6

                            SHA512

                            646c400fa01b3678be19a00fcf2950f964e823c00a9ceaf805a682e08bd08dee89666dd8b4faf8eaf7eec59c5407503aa0772ae4903484b986721d705c1412a1

                          • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\data_reduction_proxy_leveldb\CURRENT

                            Filesize

                            16B

                            MD5

                            6752a1d65b201c13b62ea44016eb221f

                            SHA1

                            58ecf154d01a62233ed7fb494ace3c3d4ffce08b

                            SHA256

                            0861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd

                            SHA512

                            9cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389

                          • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Local State

                            Filesize

                            11KB

                            MD5

                            027ea30ce8126851194efd05b32b7b6f

                            SHA1

                            67fc2c4312009f2415ccf0a63264aa8e8667b935

                            SHA256

                            3006c4a0b04daf43ad0cc97feefd4e6c4a142ce096e0172ec53ca48574203c49

                            SHA512

                            379e609eb643579271a365e0ec54de467483c746d33c088d924606fdc966479af1429f3934c58a320d2e45a3b85d8853efbb2cf97a9f3e0600db61532c9eeba5

                          • C:\Users\Admin\AppData\Local\Temp\7zS3122.tmp\Install.cmd

                            Filesize

                            51B

                            MD5

                            21661026606353f423078c883708787d

                            SHA1

                            338e288b851e0e5bee26f887e50bfcd8150e8257

                            SHA256

                            6a77796213adbc0eb764c070a3fdfcb5bfa3ad9b6215c1be43f09bfd32014782

                            SHA512

                            61760ab64e2c38d9bd5102ab0106e451a5c91e1598906f92e1285b7ae1ca1c6e02480d4157d0f350d2dc816088b5b0838a5d7c7b9d80444ecbf9d62b9ca5b65b

                          • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\Install.exe

                            Filesize

                            117KB

                            MD5

                            3973c47bf5f334ea720a9d603d2c6510

                            SHA1

                            bf2b72dc12d4d41e08b452e465c40d010b2aba4e

                            SHA256

                            4e9a1202844e30f1d62d837cdb440764c851740ab8ee2bd4a8a31475bd449eea

                            SHA512

                            cafc322ba71bafad2b15b82553a2a0749d0b6cb8349fe7fd24de25f7dca48c5aa0c9e7d170571c87a55381ec21d33045d7ba9a17891aabee187358da9b406861

                          • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\RUNTIM~1.EXE

                            Filesize

                            544KB

                            MD5

                            cd785eea58f7aea23cbab3219b60c1d6

                            SHA1

                            4c882112192aceeda719cc6998a1a536e3a75ee5

                            SHA256

                            7b6927a60cdffa65ff6ae677b69ccb29a251373d7044cf0236d953f3490cc8ae

                            SHA512

                            f33536187372fdf773c8e056793f0bc166810510531dbc1c4cef9164211a0f06c8d566a0333de06721f408e5670a2658b78d773028d1d2959fa0286b0ec7dc6d

                          • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\RUNTIM~1.EXE

                            Filesize

                            279KB

                            MD5

                            1b90faa6693a70e4e11899bf7e8c813c

                            SHA1

                            4ec6b965a3f7343bb241afcc68755c0f8ecca265

                            SHA256

                            8190058066b3c99a1291b4c521d92b6e8ae32940286637afffef062c08fa31eb

                            SHA512

                            7362577ad806b7003cd6e9bab89bd0ad5070d53ba2161d314486bb09216215bb8fb459ecce2251eefe1aef5912daf5e751b92a8aad1abd6f54df6274f592705d

                          • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\RUNTIM~1.EXE

                            Filesize

                            1.0MB

                            MD5

                            0c6ef320b361f01d63147dec80c3f34c

                            SHA1

                            c04adc3da100118f72e41c1c4645cbf8fa813cee

                            SHA256

                            bf89a45619528967430c483c01da54306e4f1b200a8c062697218fdd60bac93f

                            SHA512

                            f204ea35dffab3bd703ccf3a52e8ce26be5cde8f24b485b8a0c34a7dc9948bfcae3c7d2d268d5e4fd736dd55245ee995a4bfe0726e2b7fbb379095c69e9ddb69

                          • memory/4820-34-0x0000000005060000-0x00000000050F2000-memory.dmp

                            Filesize

                            584KB

                          • memory/4820-23-0x0000000004EA0000-0x0000000004F3C000-memory.dmp

                            Filesize

                            624KB

                          • memory/4820-55-0x00000000053C0000-0x00000000053D8000-memory.dmp

                            Filesize

                            96KB

                          • memory/4820-43-0x0000000004FC0000-0x0000000004FCA000-memory.dmp

                            Filesize

                            40KB

                          • memory/4820-42-0x00000000051B0000-0x00000000051C0000-memory.dmp

                            Filesize

                            64KB

                          • memory/4820-24-0x0000000005570000-0x0000000005B14000-memory.dmp

                            Filesize

                            5.6MB

                          • memory/4820-85-0x0000000074850000-0x0000000075000000-memory.dmp

                            Filesize

                            7.7MB

                          • memory/4820-86-0x00000000051B0000-0x00000000051C0000-memory.dmp

                            Filesize

                            64KB

                          • memory/4820-96-0x0000000007E50000-0x0000000007EDA000-memory.dmp

                            Filesize

                            552KB

                          • memory/4820-97-0x000000000A5B0000-0x000000000A5CE000-memory.dmp

                            Filesize

                            120KB

                          • memory/4820-22-0x0000000000420000-0x000000000052A000-memory.dmp

                            Filesize

                            1.0MB

                          • memory/4820-44-0x0000000005100000-0x0000000005156000-memory.dmp

                            Filesize

                            344KB

                          • memory/4820-21-0x0000000074850000-0x0000000075000000-memory.dmp

                            Filesize

                            7.7MB

                          • memory/4820-102-0x0000000074850000-0x0000000075000000-memory.dmp

                            Filesize

                            7.7MB

                          • memory/6052-103-0x00000000055D0000-0x0000000005BE8000-memory.dmp

                            Filesize

                            6.1MB

                          • memory/6052-105-0x0000000005010000-0x0000000005022000-memory.dmp

                            Filesize

                            72KB

                          • memory/6052-104-0x0000000074850000-0x0000000075000000-memory.dmp

                            Filesize

                            7.7MB

                          • memory/6052-106-0x0000000005070000-0x00000000050AC000-memory.dmp

                            Filesize

                            240KB

                          • memory/6052-107-0x0000000005240000-0x0000000005250000-memory.dmp

                            Filesize

                            64KB

                          • memory/6052-108-0x00000000050B0000-0x00000000050FC000-memory.dmp

                            Filesize

                            304KB

                          • memory/6052-109-0x0000000005360000-0x000000000546A000-memory.dmp

                            Filesize

                            1.0MB

                          • memory/6052-123-0x0000000074850000-0x0000000075000000-memory.dmp

                            Filesize

                            7.7MB

                          • memory/6052-124-0x0000000005240000-0x0000000005250000-memory.dmp

                            Filesize

                            64KB

                          • memory/6052-98-0x0000000000400000-0x000000000041E000-memory.dmp

                            Filesize

                            120KB