Analysis

  • max time kernel
    73s
  • max time network
    148s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20231215-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system
  • submitted
    02-04-2024 10:09

General

  • Target

    58e2f786321d58631386654265c8fc5298e1e396c219a424de57a3623b4bd994.msi

  • Size

    4.3MB

  • MD5

    4f238c2093606fc296f1f819c2f0fc67

  • SHA1

    f8535858fcee6b96e0f49e6156fa110fc0698880

  • SHA256

    58e2f786321d58631386654265c8fc5298e1e396c219a424de57a3623b4bd994

  • SHA512

    c2422db8871d6303b5903c4b11cca3debd62cb25a406655db5a0ba407f33c9fef739371d297e5ccad45efc99e040e6ae29079b4b9325f52d54c5e780f8c346f7

  • SSDEEP

    49152:jpUPN9qhCxzT+WKjSXcmNt6+XzP4BYIeBfCXqyfdo1DDDDDDDDDDPuDgO9hTnxA5:jpqCQbm+jg12f3yaiga6yU

Malware Config

Extracted

Family

darkgate

Botnet

admin888

C2

jenb128hiuedfhajduihfa.com

Attributes
  • anti_analysis

    false

  • anti_debug

    false

  • anti_vm

    false

  • c2_port

    80

  • check_disk

    true

  • check_ram

    true

  • check_xeon

    false

  • crypter_au3

    false

  • crypter_dll

    false

  • crypter_raw_stub

    false

  • internal_mutex

    RZymDRsm

  • minimum_disk

    100

  • minimum_ram

    7000

  • ping_interval

    6

  • rootkit

    false

  • startup_persistence

    true

  • username

    admin888

Extracted

Family

darkgate

Version

6.1.7

Botnet

admin888

C2

jenb128hiuedfhajduihfa.com

Attributes
  • anti_analysis

    false

  • anti_debug

    false

  • anti_vm

    false

  • c2_port

    80

  • check_disk

    true

  • check_ram

    true

  • check_xeon

    false

  • crypter_au3

    false

  • crypter_dll

    false

  • crypter_raw_stub

    false

  • internal_mutex

    RZymDRsm

  • minimum_disk

    100

  • minimum_ram

    7000

  • ping_interval

    6

  • rootkit

    false

  • startup_persistence

    true

  • username

    admin888

Signatures

  • DarkGate

    DarkGate is an infostealer written in C++.

  • Detect DarkGate stealer 40 IoCs
  • Suspicious use of NtCreateUserProcessOtherParentProcess 3 IoCs
  • Modifies file permissions 1 TTPs 2 IoCs
  • Uses the VBS compiler for execution 1 TTPs
  • Adds Run key to start application 2 TTPs 1 IoCs
  • Enumerates connected drives 3 TTPs 46 IoCs

    Attempts to read the root path of hard drives other than the default C: drive.

  • Suspicious use of SetThreadContext 2 IoCs
  • Drops file in Windows directory 11 IoCs
  • Executes dropped EXE 2 IoCs
  • Loads dropped DLL 3 IoCs
  • Checks SCSI registry key(s) 3 TTPs 5 IoCs

    SCSI information is often read in order to detect sandboxing environments.

  • Checks processor information in registry 2 TTPs 6 IoCs

    Processor information is often read in order to detect sandboxing environments.

  • Suspicious behavior: EnumeratesProcesses 16 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 53 IoCs
  • Suspicious use of FindShellTrayWindow 2 IoCs
  • Suspicious use of WriteProcessMemory 29 IoCs
  • Uses Volume Shadow Copy service COM API

    The Volume Shadow Copy service is used to manage backups/snapshots.

Processes

  • C:\Windows\system32\svchost.exe
    C:\Windows\system32\svchost.exe -k UnistackSvcGroup -s CDPUserSvc
    1⤵
      PID:2968
      • \??\c:\windows\Microsoft.NET\Framework\v2.0.50727\vbc.exe
        c:\windows\Microsoft.NET\Framework\v2.0.50727\vbc.exe
        2⤵
        • Suspicious use of NtCreateUserProcessOtherParentProcess
        • Adds Run key to start application
        • Suspicious use of SetThreadContext
        • Checks processor information in registry
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious behavior: GetForegroundWindowSpam
        • Suspicious use of WriteProcessMemory
        PID:4460
    • C:\Windows\system32\taskhostw.exe
      taskhostw.exe {222A245B-E637-4AE9-A93F-A59CA119A75E}
      1⤵
        PID:3032
        • \??\c:\windows\Microsoft.NET\Framework\v2.0.50727\vbc.exe
          c:\windows\Microsoft.NET\Framework\v2.0.50727\vbc.exe
          2⤵
          • Checks processor information in registry
          • Suspicious behavior: EnumeratesProcesses
          PID:2576
      • C:\Windows\SystemApps\Microsoft.Windows.Search_cw5n1h2txyewy\SearchApp.exe
        "C:\Windows\SystemApps\Microsoft.Windows.Search_cw5n1h2txyewy\SearchApp.exe" -ServerName:CortanaUI.AppX8z9r6jm96hw4bsbneegw0kyxx296wr9t.mca
        1⤵
          PID:3992
        • C:\Windows\system32\msiexec.exe
          msiexec.exe /I C:\Users\Admin\AppData\Local\Temp\58e2f786321d58631386654265c8fc5298e1e396c219a424de57a3623b4bd994.msi
          1⤵
          • Enumerates connected drives
          • Suspicious use of AdjustPrivilegeToken
          • Suspicious use of FindShellTrayWindow
          PID:3408
        • C:\Windows\system32\msiexec.exe
          C:\Windows\system32\msiexec.exe /V
          1⤵
          • Enumerates connected drives
          • Drops file in Windows directory
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of AdjustPrivilegeToken
          • Suspicious use of WriteProcessMemory
          PID:2108
          • C:\Windows\system32\srtasks.exe
            C:\Windows\system32\srtasks.exe ExecuteScopeRestorePoint /WaitForRestorePoint:2
            2⤵
            • Suspicious use of AdjustPrivilegeToken
            PID:3900
          • C:\Windows\syswow64\MsiExec.exe
            C:\Windows\syswow64\MsiExec.exe -Embedding A93BF31E64262D0B45E8A030B015AFBC
            2⤵
            • Loads dropped DLL
            • Suspicious use of WriteProcessMemory
            PID:1152
            • C:\Windows\SysWOW64\ICACLS.EXE
              "C:\Windows\system32\ICACLS.EXE" "C:\Users\Admin\AppData\Local\Temp\MW-fdedef63-bcc6-43da-8b1c-fc6d58d018c9\." /SETINTEGRITYLEVEL (CI)(OI)HIGH
              3⤵
              • Modifies file permissions
              PID:1680
            • C:\Windows\SysWOW64\EXPAND.EXE
              "C:\Windows\system32\EXPAND.EXE" -R files.cab -F:* files
              3⤵
              • Drops file in Windows directory
              PID:1224
            • C:\Users\Admin\AppData\Local\Temp\MW-fdedef63-bcc6-43da-8b1c-fc6d58d018c9\files\vlc.exe
              "C:\Users\Admin\AppData\Local\Temp\MW-fdedef63-bcc6-43da-8b1c-fc6d58d018c9\files\vlc.exe"
              3⤵
              • Executes dropped EXE
              • Loads dropped DLL
              • Suspicious use of WriteProcessMemory
              PID:1676
              • \??\c:\temp\Autoit3.exe
                "c:\temp\Autoit3.exe" c:\temp\script.au3
                4⤵
                • Suspicious use of NtCreateUserProcessOtherParentProcess
                • Suspicious use of SetThreadContext
                • Executes dropped EXE
                • Checks processor information in registry
                • Suspicious behavior: EnumeratesProcesses
                • Suspicious use of WriteProcessMemory
                PID:428
            • C:\Windows\SysWOW64\ICACLS.EXE
              "C:\Windows\system32\ICACLS.EXE" "C:\Users\Admin\AppData\Local\Temp\MW-fdedef63-bcc6-43da-8b1c-fc6d58d018c9\." /SETINTEGRITYLEVEL (CI)(OI)LOW
              3⤵
              • Modifies file permissions
              PID:856
        • C:\Windows\system32\vssvc.exe
          C:\Windows\system32\vssvc.exe
          1⤵
          • Checks SCSI registry key(s)
          • Suspicious use of AdjustPrivilegeToken
          PID:216

        Network

        MITRE ATT&CK Enterprise v15

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • C:\ProgramData\beefggg\affbdfc

          Filesize

          1KB

          MD5

          97d63a38cc93e508bbc8f843db006bf2

          SHA1

          f0731bafeb18c6b3b7d5b47c2d534a3744c2ca64

          SHA256

          8c5b26a0bd074f9d5a320d2679dfe8cc00e81a68b17893a4649aef7493783fd1

          SHA512

          012b1a5638d435ec0c63719cb3f12cff459ba4dc0b8c8831672b925edbcf2cb7fdcc7cd673e68731eb22e5837f9bb9e6ce00bd1743f9a8cbf5cc49eb4284784e

        • C:\Users\Admin\AppData\Local\Temp\MW-fdedef63-bcc6-43da-8b1c-fc6d58d018c9\files.cab

          Filesize

          4.0MB

          MD5

          b617d565e52112548d239e32b05eecb4

          SHA1

          5e37585718e80f11c44537f21ecd6d1c45f44c6b

          SHA256

          96146d2cb6aa614ffe3aac47f5e0d8a3bcf28bacb3f27bc9a80a18ede73ac607

          SHA512

          23f2b21f4bb19eba68c39bd93964160f55611686546aee904cac925ee058a6f8f6c6e1f113cdeb7c42ca5375d83de1169051c9a001aeb1f48f322dbe5d6bcd7d

        • C:\Users\Admin\AppData\Local\Temp\MW-fdedef63-bcc6-43da-8b1c-fc6d58d018c9\files\libvlc.dll

          Filesize

          1.5MB

          MD5

          3843f0f904fc531b2c528b65ada84dff

          SHA1

          7ad3a66bd8be7456ceb7a5976548cdd6c2643d8f

          SHA256

          f3cbababb4ba75f65b4a5ec6d603ef93ed23089aef777b22db710d5bc873a11a

          SHA512

          e099cef3bd5f80f9e861f97e6c7ddace0adddfb26e316c76a4d66cda7942c2e46f6f66ed6ca9a6d06a587645c6a01527f542420e3720d462d6b09d5fe44cbf5c

        • C:\Users\Admin\AppData\Local\Temp\MW-fdedef63-bcc6-43da-8b1c-fc6d58d018c9\files\sqlite3.dll

          Filesize

          1.6MB

          MD5

          775d01ac4a84cf493c27759ae6b55355

          SHA1

          e27078488d12e7ab7feff45fe2b2b7f60d72b0f3

          SHA256

          e894e2781806b306298f85a1af60b1ca38b4695bde30cf6839518e10501b6b5a

          SHA512

          b6168b83deb2c95e88b6eb4e1fbc1bf7f3a3353e6fee9b016f5e25472ed202225aed0338f196fbcd116a480d6708487191afa8be4a21cd5316f90f6167d1c978

        • C:\Users\Admin\AppData\Local\Temp\MW-fdedef63-bcc6-43da-8b1c-fc6d58d018c9\files\vlc.exe

          Filesize

          966KB

          MD5

          035860e139ba6db1b38d5346cb6ff5b6

          SHA1

          d515303cbca3a8ae7a0463fecd418d81b314e650

          SHA256

          16197a321fc7b0a2a311e689621fe4a7cd50fdcb2d163973a31e4fd6352232d7

          SHA512

          14dab9108d85af72001631130923b94483dd1440f24a8eedad41756db3030c5e11e80ec894922c389e09c86e8b721bcbd8594bd3646f484560f89963a7e18cc7

        • C:\Users\Admin\AppData\Local\Temp\MW-fdedef63-bcc6-43da-8b1c-fc6d58d018c9\msiwrapper.ini

          Filesize

          396B

          MD5

          33fa84966b7b0d789d88a58df730943a

          SHA1

          f75996574a20957315b255278a9f84941e562bf1

          SHA256

          c0096a100a37507bb654184ee08e2ad122e800767f75a2caabb8e148357fd385

          SHA512

          1362a5ee9b34d6fe6f8148b8017e0b69cbd9fc1e55203c0d6022b8a3265b65fca826ef068eb70e3aa677a788c85282bdf9b3ea606a2bfba5264e40eff433ba80

        • C:\Users\Admin\AppData\Local\Temp\MW-fdedef63-bcc6-43da-8b1c-fc6d58d018c9\msiwrapper.ini

          Filesize

          1KB

          MD5

          1b6429f039fd9e3bf4e4ff77dd009553

          SHA1

          ce0c98a3848c5eda5c493aaf02dfb5382db2e0bf

          SHA256

          8d80745fe288becd638eb3ab5ccb8ca8a9d09b578a0f04f7cba4322006e1dad9

          SHA512

          c7a11392447415aef5b2551dd24220e2905f2f5e7b35a701981f8cb3354814f074f9541bd1f23b22fa89b487867af7f9dec508cdc948455a781fcf0ee52210c4

        • C:\Users\Admin\AppData\Local\Temp\MW-fdedef63-bcc6-43da-8b1c-fc6d58d018c9\msiwrapper.ini

          Filesize

          1KB

          MD5

          b42b434265f5b5bdd1d2f1fd9e3ff785

          SHA1

          f6feba7369e2d43a1e2e7a25ba61c04e9ff235d9

          SHA256

          62e60f047ffb60e20c80e838f7e2972dc84e0caa0aff5b733e2fc13b966d56ca

          SHA512

          eda807fed2113afdc64c6f7e5716a9e3c96318681b9c41cf7a0b933800431afa634f2dc5b77be845c4f921c7fe0c1510c84d7c2521074f86e46502791b618b6b

        • C:\Users\Admin\AppData\Local\Temp\MW-fdedef63-bcc6-43da-8b1c-fc6d58d018c9\msiwrapper.ini

          Filesize

          1KB

          MD5

          1adf653f1f5460c999e9996b3b321656

          SHA1

          8cb07d393358219c52951ffb580234bb8e634ffe

          SHA256

          bfadf8d24c115a88cb0f528896e87a42dc6e6a412c54292d31126cd6e5014b2f

          SHA512

          3b5c48b2faedd734b168397fcb179a4f5bccf6861044fe61eeb642c51c22581782de3fd6bc267598650047b0c69d0f59860bcbfb436cd35148a6978e36bcae92

        • C:\Users\Admin\AppData\Roaming\fBbhDdh

          Filesize

          32B

          MD5

          e2f41208f02cff6fee0329d17ca6559c

          SHA1

          5b4035bb68bfd9555734b88846c312770761487d

          SHA256

          f82ab4a1da7ba348910fecd0157f854fe09b51f076d002bfc1101db5cb4bf13f

          SHA512

          97bf5045a269f8bec7f67f3d9a88c49a29eda5b19510a95e34adff222374b368c571fed8442e5f68a1685ca1c0fa0cd0bf8d29a2b6a5ca7538acef7e24ccc6fd

        • C:\Windows\Installer\MSI6E89.tmp

          Filesize

          208KB

          MD5

          d82b3fb861129c5d71f0cd2874f97216

          SHA1

          f3fe341d79224126e950d2691d574d147102b18d

          SHA256

          107b32c5b789be9893f24d5bfe22633d25b7a3cae80082ef37b30e056869cc5c

          SHA512

          244b7675e70ab12aa5776f26e30577268573b725d0f145bfc6b848d2bd8f014c9c6eab0fc0e4f0a574ed9ca1d230b2094dd88a2146ef0a6db70dbd815f9a5f5b

        • C:\temp\Autoit3.exe

          Filesize

          872KB

          MD5

          c56b5f0201a3b3de53e561fe76912bfd

          SHA1

          2a4062e10a5de813f5688221dbeb3f3ff33eb417

          SHA256

          237d1bca6e056df5bb16a1216a434634109478f882d3b1d58344c801d184f95d

          SHA512

          195b98245bb820085ae9203cdb6d470b749d1f228908093e8606453b027b7d7681ccd7952e30c2f5dd40f8f0b999ccfc60ebb03419b574c08de6816e75710d2c

        • C:\temp\cc.txt

          Filesize

          4B

          MD5

          5bdc8815c7ebaac0e641d4e39923515e

          SHA1

          1b96a75cdee314dc26aff92792002ab191d0c80f

          SHA256

          0c65bf441c5afe284b48ba506177f6e089eb71de3137837b890a74841ceac406

          SHA512

          f423fdb0f60749f33a7dcfa58a60c5037f86ed7ed99e771d184d2ea9140159669c4edd357264c6121616d6e4d799c55edbd86857262c3d245321644f88f949ef

        • C:\temp\fs.txt

          Filesize

          4B

          MD5

          fe8956da3bcda15e4accd729d9aaa7bc

          SHA1

          a92a5ee97a5dae046c2c609905b7198c38de6832

          SHA256

          a67316c165e507cc720e57d1aca278a58f062e027bd1e8f0ffb28955a8be4aeb

          SHA512

          ec748b96d3f4ad854d71fc4589cb8d478d818238c23295842a7701dbd249f72b78609cc5bce64f2d536068560a9fed0edf5ebc479314cb46664d77af8127e73c

        • \??\GLOBALROOT\Device\HarddiskVolumeShadowCopy2\System Volume Information\SPP\metadata-2

          Filesize

          23.0MB

          MD5

          094c4ad24ec69695f423a77f95195043

          SHA1

          76739ce399b2c9c9dd075dbd9a3776ec0befe6b3

          SHA256

          0343e6e3202b7233ee6fc4b984922ba00a18820826e5df7bd53bd88514ad6d49

          SHA512

          bbdfeaa1858cbab22950414b9a242c7e2299ac98a4b56c07390a9e7fd18a4aaf24054fdb90e6be26f55c943ca590e95de056e4a1b6564c8eab407c13270d593a

        • \??\Volume{14f6f45c-0000-0000-0000-d01200000000}\System Volume Information\SPP\OnlineMetadataCache\{6c5cbbcd-284b-468a-a7d1-9081e82987c8}_OnDiskSnapshotProp

          Filesize

          6KB

          MD5

          33d037a098757cf7099e6b90c93ed515

          SHA1

          e4dd2228eeb5681d03b65358a299d3f6c3dac162

          SHA256

          0971fa1c94b481aec7f520047f5b3a98664feece35ff968b45e03cdc0aedca6b

          SHA512

          40162f0bea7d704a61376ac74c93ed0bdc7761fdf710c469882f4b781f7fa5df00f031eb57df19a1d8d3a8973509786516a569b97a0d64953ba86648f8262b4a

        • \??\c:\temp\script.au3

          Filesize

          466KB

          MD5

          caf6d14ee91108f878d6108071d72b7a

          SHA1

          6166b2db78c93bdb24dc693b18a8bc6f1cd96fe6

          SHA256

          3182937fdba31b1fe9f18f78e0901fe8d3bac7ed72b87f8409dcd19e2e1f4184

          SHA512

          74b46ffd50acf54055e05ac12b8167b8f4976de345f478b648f71c05cf8f1f9cb584cdc2711d605aaea05c1f0fb643028ef8524e0f9144b0ab2975792c9681c9

        • \??\c:\temp\test.txt

          Filesize

          76B

          MD5

          eb493e70c279b059272d93eb86156a25

          SHA1

          cc6d75663d2647ce59741958b9334d9319dc1e40

          SHA256

          c5c350d106264a59acb4049244933261da379b6fc5577b519cfc113c83fb1e31

          SHA512

          c4617f8d45d00bf3fbe6a1ab4b25052e2012e2f2783022528d625618956814ab6497a82800f14592eda1886903d88a075ffeff29d72bec8c4817927b9dcac514

        • memory/428-94-0x0000000004B90000-0x0000000005B60000-memory.dmp

          Filesize

          15.8MB

        • memory/428-95-0x0000000006080000-0x00000000063CE000-memory.dmp

          Filesize

          3.3MB

        • memory/428-113-0x0000000006080000-0x00000000063CE000-memory.dmp

          Filesize

          3.3MB

        • memory/1676-85-0x0000024C5E490000-0x0000024C5E62E000-memory.dmp

          Filesize

          1.6MB

        • memory/1676-84-0x00000000772F0000-0x000000007747D000-memory.dmp

          Filesize

          1.6MB

        • memory/1676-83-0x00007FF6EE790000-0x00007FF6EE888000-memory.dmp

          Filesize

          992KB

        • memory/1676-78-0x0000024C5E490000-0x0000024C5E62E000-memory.dmp

          Filesize

          1.6MB

        • memory/2576-128-0x0000000000400000-0x0000000000470000-memory.dmp

          Filesize

          448KB

        • memory/2576-138-0x0000000000400000-0x0000000000470000-memory.dmp

          Filesize

          448KB

        • memory/2576-161-0x0000000000400000-0x0000000000470000-memory.dmp

          Filesize

          448KB

        • memory/2576-159-0x0000000000400000-0x0000000000470000-memory.dmp

          Filesize

          448KB

        • memory/2576-126-0x0000000000400000-0x0000000000470000-memory.dmp

          Filesize

          448KB

        • memory/2576-157-0x0000000000400000-0x0000000000470000-memory.dmp

          Filesize

          448KB

        • memory/2576-155-0x0000000000400000-0x0000000000470000-memory.dmp

          Filesize

          448KB

        • memory/2576-153-0x0000000000400000-0x0000000000470000-memory.dmp

          Filesize

          448KB

        • memory/2576-151-0x0000000000400000-0x0000000000470000-memory.dmp

          Filesize

          448KB

        • memory/2576-149-0x0000000000400000-0x0000000000470000-memory.dmp

          Filesize

          448KB

        • memory/2576-147-0x0000000000400000-0x0000000000470000-memory.dmp

          Filesize

          448KB

        • memory/2576-132-0x0000000000400000-0x0000000000470000-memory.dmp

          Filesize

          448KB

        • memory/2576-145-0x0000000000400000-0x0000000000470000-memory.dmp

          Filesize

          448KB

        • memory/2576-134-0x0000000000400000-0x0000000000470000-memory.dmp

          Filesize

          448KB

        • memory/2576-140-0x0000000000400000-0x0000000000470000-memory.dmp

          Filesize

          448KB

        • memory/2576-136-0x0000000000400000-0x0000000000470000-memory.dmp

          Filesize

          448KB

        • memory/4460-131-0x0000000000400000-0x0000000000470000-memory.dmp

          Filesize

          448KB

        • memory/4460-108-0x0000000000400000-0x0000000000470000-memory.dmp

          Filesize

          448KB

        • memory/4460-139-0x0000000000400000-0x0000000000470000-memory.dmp

          Filesize

          448KB

        • memory/4460-135-0x0000000000400000-0x0000000000470000-memory.dmp

          Filesize

          448KB

        • memory/4460-144-0x0000000000400000-0x0000000000470000-memory.dmp

          Filesize

          448KB

        • memory/4460-133-0x0000000000400000-0x0000000000470000-memory.dmp

          Filesize

          448KB

        • memory/4460-146-0x0000000000400000-0x0000000000470000-memory.dmp

          Filesize

          448KB

        • memory/4460-118-0x0000000000400000-0x0000000000470000-memory.dmp

          Filesize

          448KB

        • memory/4460-148-0x0000000000400000-0x0000000000470000-memory.dmp

          Filesize

          448KB

        • memory/4460-107-0x0000000000400000-0x0000000000470000-memory.dmp

          Filesize

          448KB

        • memory/4460-150-0x0000000000400000-0x0000000000470000-memory.dmp

          Filesize

          448KB

        • memory/4460-137-0x0000000000400000-0x0000000000470000-memory.dmp

          Filesize

          448KB

        • memory/4460-152-0x0000000000400000-0x0000000000470000-memory.dmp

          Filesize

          448KB

        • memory/4460-109-0x0000000000400000-0x0000000000470000-memory.dmp

          Filesize

          448KB

        • memory/4460-154-0x0000000000400000-0x0000000000470000-memory.dmp

          Filesize

          448KB

        • memory/4460-112-0x0000000000400000-0x0000000000470000-memory.dmp

          Filesize

          448KB

        • memory/4460-156-0x0000000000400000-0x0000000000470000-memory.dmp

          Filesize

          448KB

        • memory/4460-124-0x0000000000400000-0x0000000000470000-memory.dmp

          Filesize

          448KB

        • memory/4460-158-0x0000000000400000-0x0000000000470000-memory.dmp

          Filesize

          448KB

        • memory/4460-122-0x0000000000400000-0x0000000000470000-memory.dmp

          Filesize

          448KB

        • memory/4460-160-0x0000000000400000-0x0000000000470000-memory.dmp

          Filesize

          448KB

        • memory/4460-120-0x0000000000400000-0x0000000000470000-memory.dmp

          Filesize

          448KB