Analysis

  • max time kernel
    139s
  • max time network
    160s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20230220-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system
  • submitted
    21-05-2023 14:50

General

  • Target

    gateway166.exe

  • Size

    1.0MB

  • MD5

    d22841fedec1f27ba00a8e80e2c8fa24

  • SHA1

    ff1b0ae641acc647c12c5bb10bc60e758ff0faa7

  • SHA256

    adfec237806020d3d9a56a686c502f0122104eea5dc25e76fe00f7b576adc9fc

  • SHA512

    91a661299bb222450c4cf164ebf3788e1689f81b202d32f4d4b302fdd0b0f807a532309bdc4085db12b54df9676a30465ec98c5e0072d1fabe6cb310c675f4e8

  • SSDEEP

    12288:YMrhy90J2Fe4V6QkKSBbBeAB0202eDY6m+de1OmN6QbcMHr2epEw/Uvx8HhOlqND:ZyMGkK8wA026vsOQHDKPyBOMe3+

Malware Config

Extracted

Family

redline

Botnet

diza

C2

185.161.248.37:4138

Attributes
  • auth_value

    0d09b419c8bc967f91c68be4a17e92ee

Signatures

  • Modifies Windows Defender Real-time Protection settings 3 TTPs 6 IoCs
  • RedLine

    RedLine Stealer is a malware family written in C#, first appearing in early 2020.

  • RedLine payload 18 IoCs
  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Executes dropped EXE 10 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Windows security modification 2 TTPs 2 IoCs
  • Adds Run key to start application 2 TTPs 6 IoCs
  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Suspicious use of SetThreadContext 2 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Program crash 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 6 IoCs
  • Suspicious use of AdjustPrivilegeToken 5 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of UnmapMainImage 1 IoCs
  • Suspicious use of WriteProcessMemory 45 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\gateway166.exe
    "C:\Users\Admin\AppData\Local\Temp\gateway166.exe"
    1⤵
    • Adds Run key to start application
    • Suspicious use of WriteProcessMemory
    PID:5108
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\x8004042.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\x8004042.exe
      2⤵
      • Executes dropped EXE
      • Adds Run key to start application
      • Suspicious use of WriteProcessMemory
      PID:1916
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\x1865287.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\x1865287.exe
        3⤵
        • Executes dropped EXE
        • Adds Run key to start application
        • Suspicious use of WriteProcessMemory
        PID:3128
        • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\f6367725.exe
          C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\f6367725.exe
          4⤵
          • Executes dropped EXE
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of AdjustPrivilegeToken
          PID:3640
        • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\g6479982.exe
          C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\g6479982.exe
          4⤵
          • Modifies Windows Defender Real-time Protection settings
          • Executes dropped EXE
          • Windows security modification
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of AdjustPrivilegeToken
          PID:4472
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\h1208658.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\h1208658.exe
        3⤵
        • Executes dropped EXE
        • Suspicious use of SetThreadContext
        • Suspicious use of AdjustPrivilegeToken
        • Suspicious use of WriteProcessMemory
        PID:1992
        • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\h1208658.exe
          C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\h1208658.exe
          4⤵
          • Checks computer location settings
          • Executes dropped EXE
          • Suspicious use of FindShellTrayWindow
          • Suspicious use of WriteProcessMemory
          PID:2640
          • C:\Users\Admin\AppData\Local\Temp\c3912af058\oneetx.exe
            "C:\Users\Admin\AppData\Local\Temp\c3912af058\oneetx.exe"
            5⤵
            • Executes dropped EXE
            • Suspicious use of SetThreadContext
            • Suspicious use of AdjustPrivilegeToken
            • Suspicious use of WriteProcessMemory
            PID:1600
            • C:\Users\Admin\AppData\Local\Temp\c3912af058\oneetx.exe
              C:\Users\Admin\AppData\Local\Temp\c3912af058\oneetx.exe
              6⤵
              • Executes dropped EXE
              PID:2088
            • C:\Users\Admin\AppData\Local\Temp\c3912af058\oneetx.exe
              C:\Users\Admin\AppData\Local\Temp\c3912af058\oneetx.exe
              6⤵
              • Executes dropped EXE
              • Suspicious use of UnmapMainImage
              PID:1608
              • C:\Windows\SysWOW64\WerFault.exe
                C:\Windows\SysWOW64\WerFault.exe -u -p 1608 -s 12
                7⤵
                • Program crash
                PID:1048
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\i5528674.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\i5528674.exe
      2⤵
      • Executes dropped EXE
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      PID:3860
  • C:\Windows\SysWOW64\WerFault.exe
    C:\Windows\SysWOW64\WerFault.exe -pss -s 420 -p 1608 -ip 1608
    1⤵
      PID:848

    Network

    MITRE ATT&CK Enterprise v6

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\i5528674.exe

      Filesize

      285KB

      MD5

      cafafaf5c3cb51c62856d9b82701327b

      SHA1

      574e69ea34b6c46d1a9d1cb6b3f114d35dd2dd52

      SHA256

      5008d44e7e83beeef1473ddba3ad4684880b55fe403f6c3d5906a6769b892a94

      SHA512

      51a0bac14f96698715ee4bcf1022e51f031d055867d5ff11dab37d417f3eb1e29ec23aed1d7aeac7fca06f82e27c874ac1e8d205c5617bc979b327c4ec219c48

    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\i5528674.exe

      Filesize

      285KB

      MD5

      cafafaf5c3cb51c62856d9b82701327b

      SHA1

      574e69ea34b6c46d1a9d1cb6b3f114d35dd2dd52

      SHA256

      5008d44e7e83beeef1473ddba3ad4684880b55fe403f6c3d5906a6769b892a94

      SHA512

      51a0bac14f96698715ee4bcf1022e51f031d055867d5ff11dab37d417f3eb1e29ec23aed1d7aeac7fca06f82e27c874ac1e8d205c5617bc979b327c4ec219c48

    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\x8004042.exe

      Filesize

      750KB

      MD5

      d68a82c4ba4f5ae38baf68987e527793

      SHA1

      c161990a5d6b99fcf83b149587a5823f6bfad7af

      SHA256

      f0e9484062bcb27ee62ad907745e16ab4de37213ddd397a03d3511688da0307d

      SHA512

      542abbea4d11923d75b5e38f3d6f56d071c6e0a77a99c02f3f037a17660d9c2b7a3e31be6a18dbccbf497e1c18357a2578c1b79b2780f07d76a68e6bbd153f86

    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\x8004042.exe

      Filesize

      750KB

      MD5

      d68a82c4ba4f5ae38baf68987e527793

      SHA1

      c161990a5d6b99fcf83b149587a5823f6bfad7af

      SHA256

      f0e9484062bcb27ee62ad907745e16ab4de37213ddd397a03d3511688da0307d

      SHA512

      542abbea4d11923d75b5e38f3d6f56d071c6e0a77a99c02f3f037a17660d9c2b7a3e31be6a18dbccbf497e1c18357a2578c1b79b2780f07d76a68e6bbd153f86

    • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\h1208658.exe

      Filesize

      965KB

      MD5

      c00bec783ed6c812f5dd8196b26b6fec

      SHA1

      f640065b017a622968ebd11112d9c8ff532d09f8

      SHA256

      3fdade21930bc901eea96af9356a70d50213b4c34a227bbb8d206545e2bfb90c

      SHA512

      e0f4de67fdc8741db33044497d526960cdc8fe49574eae480addfbb5d00b294bbb6fa7e1e50745bf5e80de447a10f075e57757d10551aa8bdacf9f7cc1b321de

    • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\h1208658.exe

      Filesize

      965KB

      MD5

      c00bec783ed6c812f5dd8196b26b6fec

      SHA1

      f640065b017a622968ebd11112d9c8ff532d09f8

      SHA256

      3fdade21930bc901eea96af9356a70d50213b4c34a227bbb8d206545e2bfb90c

      SHA512

      e0f4de67fdc8741db33044497d526960cdc8fe49574eae480addfbb5d00b294bbb6fa7e1e50745bf5e80de447a10f075e57757d10551aa8bdacf9f7cc1b321de

    • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\h1208658.exe

      Filesize

      965KB

      MD5

      c00bec783ed6c812f5dd8196b26b6fec

      SHA1

      f640065b017a622968ebd11112d9c8ff532d09f8

      SHA256

      3fdade21930bc901eea96af9356a70d50213b4c34a227bbb8d206545e2bfb90c

      SHA512

      e0f4de67fdc8741db33044497d526960cdc8fe49574eae480addfbb5d00b294bbb6fa7e1e50745bf5e80de447a10f075e57757d10551aa8bdacf9f7cc1b321de

    • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\x1865287.exe

      Filesize

      306KB

      MD5

      2c178f3c2c112e835f6ab4a7747b2550

      SHA1

      062d7c8dfae7b935105e5fe7ceeb57444691aff0

      SHA256

      0317b0497e44c16c6642a30c28cfd8f6cb240a82889474b39028079b7f6f373e

      SHA512

      08618235f24f486a5ec581e8e0fac9f65e2b28844e5ff18065e427f0f6f4cbddda7dfaa944eb23b7eab5d067e2ac69467284456f31fca18c4380237e6dc92221

    • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\x1865287.exe

      Filesize

      306KB

      MD5

      2c178f3c2c112e835f6ab4a7747b2550

      SHA1

      062d7c8dfae7b935105e5fe7ceeb57444691aff0

      SHA256

      0317b0497e44c16c6642a30c28cfd8f6cb240a82889474b39028079b7f6f373e

      SHA512

      08618235f24f486a5ec581e8e0fac9f65e2b28844e5ff18065e427f0f6f4cbddda7dfaa944eb23b7eab5d067e2ac69467284456f31fca18c4380237e6dc92221

    • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\f6367725.exe

      Filesize

      145KB

      MD5

      4b68dc98899da2228184483f78f22830

      SHA1

      eab691e8a850c7c8c781ff9b5d90f0bd06b15caa

      SHA256

      d33616f9a84b002aa13c19e95d8b1f8725b31885185301c4bce33ef20872ed2d

      SHA512

      f4e3d81ea2755a9cf6f8d90b21d264f9893ce9910d1446346ad899822a0075234f82e76ab106a716e75fce6a7c419796c253e33507dc669aac2152f8f54094b1

    • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\f6367725.exe

      Filesize

      145KB

      MD5

      4b68dc98899da2228184483f78f22830

      SHA1

      eab691e8a850c7c8c781ff9b5d90f0bd06b15caa

      SHA256

      d33616f9a84b002aa13c19e95d8b1f8725b31885185301c4bce33ef20872ed2d

      SHA512

      f4e3d81ea2755a9cf6f8d90b21d264f9893ce9910d1446346ad899822a0075234f82e76ab106a716e75fce6a7c419796c253e33507dc669aac2152f8f54094b1

    • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\g6479982.exe

      Filesize

      185KB

      MD5

      408b2f1ee8c09cde45e22f2c0838ffb5

      SHA1

      812a94dd1c6414749ea68ee24a91bc38e3982371

      SHA256

      6c67ba7a0655a9024e61ef6996d715e5d3727af030305eaeed1ca4f945d40229

      SHA512

      a93d00395b2f37c339b3b7654320f654423b9762ac9b5786e774adfef09917b1a66c4ab49e8f4486daa05b512d00625d814d34ef3d2921747ee2e1b541d5993c

    • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\g6479982.exe

      Filesize

      185KB

      MD5

      408b2f1ee8c09cde45e22f2c0838ffb5

      SHA1

      812a94dd1c6414749ea68ee24a91bc38e3982371

      SHA256

      6c67ba7a0655a9024e61ef6996d715e5d3727af030305eaeed1ca4f945d40229

      SHA512

      a93d00395b2f37c339b3b7654320f654423b9762ac9b5786e774adfef09917b1a66c4ab49e8f4486daa05b512d00625d814d34ef3d2921747ee2e1b541d5993c

    • C:\Users\Admin\AppData\Local\Temp\c3912af058\oneetx.exe

      Filesize

      965KB

      MD5

      c00bec783ed6c812f5dd8196b26b6fec

      SHA1

      f640065b017a622968ebd11112d9c8ff532d09f8

      SHA256

      3fdade21930bc901eea96af9356a70d50213b4c34a227bbb8d206545e2bfb90c

      SHA512

      e0f4de67fdc8741db33044497d526960cdc8fe49574eae480addfbb5d00b294bbb6fa7e1e50745bf5e80de447a10f075e57757d10551aa8bdacf9f7cc1b321de

    • C:\Users\Admin\AppData\Local\Temp\c3912af058\oneetx.exe

      Filesize

      965KB

      MD5

      c00bec783ed6c812f5dd8196b26b6fec

      SHA1

      f640065b017a622968ebd11112d9c8ff532d09f8

      SHA256

      3fdade21930bc901eea96af9356a70d50213b4c34a227bbb8d206545e2bfb90c

      SHA512

      e0f4de67fdc8741db33044497d526960cdc8fe49574eae480addfbb5d00b294bbb6fa7e1e50745bf5e80de447a10f075e57757d10551aa8bdacf9f7cc1b321de

    • C:\Users\Admin\AppData\Local\Temp\c3912af058\oneetx.exe

      Filesize

      965KB

      MD5

      c00bec783ed6c812f5dd8196b26b6fec

      SHA1

      f640065b017a622968ebd11112d9c8ff532d09f8

      SHA256

      3fdade21930bc901eea96af9356a70d50213b4c34a227bbb8d206545e2bfb90c

      SHA512

      e0f4de67fdc8741db33044497d526960cdc8fe49574eae480addfbb5d00b294bbb6fa7e1e50745bf5e80de447a10f075e57757d10551aa8bdacf9f7cc1b321de

    • C:\Users\Admin\AppData\Local\Temp\c3912af058\oneetx.exe

      Filesize

      965KB

      MD5

      c00bec783ed6c812f5dd8196b26b6fec

      SHA1

      f640065b017a622968ebd11112d9c8ff532d09f8

      SHA256

      3fdade21930bc901eea96af9356a70d50213b4c34a227bbb8d206545e2bfb90c

      SHA512

      e0f4de67fdc8741db33044497d526960cdc8fe49574eae480addfbb5d00b294bbb6fa7e1e50745bf5e80de447a10f075e57757d10551aa8bdacf9f7cc1b321de

    • C:\Users\Admin\AppData\Local\Temp\c3912af058\oneetx.exe

      Filesize

      965KB

      MD5

      c00bec783ed6c812f5dd8196b26b6fec

      SHA1

      f640065b017a622968ebd11112d9c8ff532d09f8

      SHA256

      3fdade21930bc901eea96af9356a70d50213b4c34a227bbb8d206545e2bfb90c

      SHA512

      e0f4de67fdc8741db33044497d526960cdc8fe49574eae480addfbb5d00b294bbb6fa7e1e50745bf5e80de447a10f075e57757d10551aa8bdacf9f7cc1b321de

    • memory/1600-344-0x0000000007600000-0x0000000007610000-memory.dmp

      Filesize

      64KB

    • memory/1992-211-0x0000000007D00000-0x0000000007D10000-memory.dmp

      Filesize

      64KB

    • memory/1992-210-0x0000000000E60000-0x0000000000F58000-memory.dmp

      Filesize

      992KB

    • memory/2640-228-0x0000000000400000-0x0000000000438000-memory.dmp

      Filesize

      224KB

    • memory/2640-216-0x0000000000400000-0x0000000000438000-memory.dmp

      Filesize

      224KB

    • memory/2640-212-0x0000000000400000-0x0000000000438000-memory.dmp

      Filesize

      224KB

    • memory/2640-215-0x0000000000400000-0x0000000000438000-memory.dmp

      Filesize

      224KB

    • memory/2640-260-0x0000000000400000-0x0000000000438000-memory.dmp

      Filesize

      224KB

    • memory/3640-164-0x0000000002830000-0x0000000002840000-memory.dmp

      Filesize

      64KB

    • memory/3640-167-0x0000000006750000-0x00000000067A0000-memory.dmp

      Filesize

      320KB

    • memory/3640-162-0x0000000005A80000-0x0000000005AE6000-memory.dmp

      Filesize

      408KB

    • memory/3640-161-0x0000000006030000-0x00000000065D4000-memory.dmp

      Filesize

      5.6MB

    • memory/3640-160-0x0000000005230000-0x00000000052C2000-memory.dmp

      Filesize

      584KB

    • memory/3640-159-0x0000000002830000-0x0000000002840000-memory.dmp

      Filesize

      64KB

    • memory/3640-158-0x0000000004F00000-0x0000000004F3C000-memory.dmp

      Filesize

      240KB

    • memory/3640-163-0x00000000067B0000-0x0000000006972000-memory.dmp

      Filesize

      1.8MB

    • memory/3640-165-0x0000000006EB0000-0x00000000073DC000-memory.dmp

      Filesize

      5.2MB

    • memory/3640-157-0x0000000004EA0000-0x0000000004EB2000-memory.dmp

      Filesize

      72KB

    • memory/3640-166-0x00000000066D0000-0x0000000006746000-memory.dmp

      Filesize

      472KB

    • memory/3640-156-0x0000000004F90000-0x000000000509A000-memory.dmp

      Filesize

      1.0MB

    • memory/3640-155-0x0000000005460000-0x0000000005A78000-memory.dmp

      Filesize

      6.1MB

    • memory/3640-154-0x00000000004C0000-0x00000000004EA000-memory.dmp

      Filesize

      168KB

    • memory/3860-234-0x00000000049A0000-0x00000000049DC000-memory.dmp

      Filesize

      240KB

    • memory/3860-264-0x00000000049A0000-0x00000000049DC000-memory.dmp

      Filesize

      240KB

    • memory/3860-1154-0x0000000004AD0000-0x0000000004AE0000-memory.dmp

      Filesize

      64KB

    • memory/3860-1155-0x0000000004AD0000-0x0000000004AE0000-memory.dmp

      Filesize

      64KB

    • memory/3860-1153-0x0000000004AD0000-0x0000000004AE0000-memory.dmp

      Filesize

      64KB

    • memory/3860-1149-0x0000000004AD0000-0x0000000004AE0000-memory.dmp

      Filesize

      64KB

    • memory/3860-270-0x00000000049A0000-0x00000000049DC000-memory.dmp

      Filesize

      240KB

    • memory/3860-268-0x00000000049A0000-0x00000000049DC000-memory.dmp

      Filesize

      240KB

    • memory/3860-266-0x00000000049A0000-0x00000000049DC000-memory.dmp

      Filesize

      240KB

    • memory/3860-261-0x00000000049A0000-0x00000000049DC000-memory.dmp

      Filesize

      240KB

    • memory/3860-257-0x00000000049A0000-0x00000000049DC000-memory.dmp

      Filesize

      240KB

    • memory/3860-254-0x00000000049A0000-0x00000000049DC000-memory.dmp

      Filesize

      240KB

    • memory/3860-252-0x00000000049A0000-0x00000000049DC000-memory.dmp

      Filesize

      240KB

    • memory/3860-221-0x00000000049A0000-0x00000000049DC000-memory.dmp

      Filesize

      240KB

    • memory/3860-222-0x00000000049A0000-0x00000000049DC000-memory.dmp

      Filesize

      240KB

    • memory/3860-224-0x00000000049A0000-0x00000000049DC000-memory.dmp

      Filesize

      240KB

    • memory/3860-226-0x00000000049A0000-0x00000000049DC000-memory.dmp

      Filesize

      240KB

    • memory/3860-243-0x00000000049A0000-0x00000000049DC000-memory.dmp

      Filesize

      240KB

    • memory/3860-230-0x0000000004AD0000-0x0000000004AE0000-memory.dmp

      Filesize

      64KB

    • memory/3860-229-0x00000000049A0000-0x00000000049DC000-memory.dmp

      Filesize

      240KB

    • memory/3860-232-0x0000000004AD0000-0x0000000004AE0000-memory.dmp

      Filesize

      64KB

    • memory/3860-233-0x0000000004AD0000-0x0000000004AE0000-memory.dmp

      Filesize

      64KB

    • memory/3860-241-0x00000000049A0000-0x00000000049DC000-memory.dmp

      Filesize

      240KB

    • memory/3860-238-0x00000000049A0000-0x00000000049DC000-memory.dmp

      Filesize

      240KB

    • memory/4472-204-0x0000000004AD0000-0x0000000004AE0000-memory.dmp

      Filesize

      64KB

    • memory/4472-192-0x0000000004AD0000-0x0000000004AE0000-memory.dmp

      Filesize

      64KB

    • memory/4472-183-0x0000000004960000-0x0000000004976000-memory.dmp

      Filesize

      88KB

    • memory/4472-191-0x0000000004960000-0x0000000004976000-memory.dmp

      Filesize

      88KB

    • memory/4472-195-0x0000000004AD0000-0x0000000004AE0000-memory.dmp

      Filesize

      64KB

    • memory/4472-181-0x0000000004960000-0x0000000004976000-memory.dmp

      Filesize

      88KB

    • memory/4472-179-0x0000000004960000-0x0000000004976000-memory.dmp

      Filesize

      88KB

    • memory/4472-177-0x0000000004960000-0x0000000004976000-memory.dmp

      Filesize

      88KB

    • memory/4472-193-0x0000000004AD0000-0x0000000004AE0000-memory.dmp

      Filesize

      64KB

    • memory/4472-196-0x0000000004960000-0x0000000004976000-memory.dmp

      Filesize

      88KB

    • memory/4472-187-0x0000000004960000-0x0000000004976000-memory.dmp

      Filesize

      88KB

    • memory/4472-185-0x0000000004960000-0x0000000004976000-memory.dmp

      Filesize

      88KB

    • memory/4472-189-0x0000000004960000-0x0000000004976000-memory.dmp

      Filesize

      88KB

    • memory/4472-198-0x0000000004960000-0x0000000004976000-memory.dmp

      Filesize

      88KB

    • memory/4472-175-0x0000000004960000-0x0000000004976000-memory.dmp

      Filesize

      88KB

    • memory/4472-173-0x0000000004960000-0x0000000004976000-memory.dmp

      Filesize

      88KB

    • memory/4472-200-0x0000000004960000-0x0000000004976000-memory.dmp

      Filesize

      88KB

    • memory/4472-172-0x0000000004960000-0x0000000004976000-memory.dmp

      Filesize

      88KB

    • memory/4472-202-0x0000000004960000-0x0000000004976000-memory.dmp

      Filesize

      88KB

    • memory/4472-203-0x0000000004AD0000-0x0000000004AE0000-memory.dmp

      Filesize

      64KB

    • memory/4472-205-0x0000000004AD0000-0x0000000004AE0000-memory.dmp

      Filesize

      64KB