Analysis

  • max time kernel
    144s
  • max time network
    152s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20230220-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system
  • submitted
    07/03/2023, 21:03

General

  • Target

    426536a0df2560df0e3070b9bd9862b9911df1936e11c81ca4d42a25b13661c0.exe

  • Size

    726KB

  • MD5

    3b2a525934e34b6a34632671c850e1fd

  • SHA1

    ee381f78ed559d23bb6bd9541a26b01b9a3d41d7

  • SHA256

    426536a0df2560df0e3070b9bd9862b9911df1936e11c81ca4d42a25b13661c0

  • SHA512

    5d11fe901c97437c21fd0a45cd7ce65241b55c6a57c240bf028f60f9f77c2430f5bfa58d322fd701cc12e62271725da842c478d50f0714a9629f198de8f88a55

  • SSDEEP

    12288:YnG266/Am2vu7ov7sjH+dhRf5ZL0qpxpERGhVc4hgsaVMtxj3Z+4JxQO:hT5tgadhRf5ZbjpERn4teMtxjZFIO

Malware Config

Extracted

Family

redline

Botnet

misha

C2

193.56.146.11:4173

Attributes
  • auth_value

    e17e441c954db214b94a603a7b0b1aea

Extracted

Family

amadey

Version

3.68

C2

193.56.146.218/images/IMG_489440/index.php

Signatures

  • Amadey

    Amadey bot is a simple trojan bot primarily used for collecting reconnaissance information.

  • Modifies Windows Defender Real-time Protection settings 3 TTPs 6 IoCs
  • RedLine

    RedLine Stealer is a malware family written in C#, first appearing in early 2020.

  • Checks computer location settings 2 TTPs 2 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Executes dropped EXE 7 IoCs
  • Loads dropped DLL 1 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Windows security modification 2 TTPs 2 IoCs
  • Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
  • Adds Run key to start application 2 TTPs 4 IoCs
  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Launches sc.exe 1 IoCs

    Sc.exe is a Windows utlilty to control services on the system.

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Program crash 2 IoCs
  • Creates scheduled task(s) 1 TTPs 1 IoCs

    Schtasks is often used by malware for persistence or to perform post-infection execution.

  • Suspicious behavior: EnumeratesProcesses 4 IoCs
  • Suspicious use of AdjustPrivilegeToken 2 IoCs
  • Suspicious use of WriteProcessMemory 42 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\426536a0df2560df0e3070b9bd9862b9911df1936e11c81ca4d42a25b13661c0.exe
    "C:\Users\Admin\AppData\Local\Temp\426536a0df2560df0e3070b9bd9862b9911df1936e11c81ca4d42a25b13661c0.exe"
    1⤵
    • Adds Run key to start application
    • Suspicious use of WriteProcessMemory
    PID:2052
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\m295x110.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\m295x110.exe
      2⤵
      • Executes dropped EXE
      • Adds Run key to start application
      • Suspicious use of WriteProcessMemory
      PID:4228
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\a451fXaJ.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\a451fXaJ.exe
        3⤵
        • Modifies Windows Defender Real-time Protection settings
        • Executes dropped EXE
        • Windows security modification
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:2608
        • C:\Windows\SysWOW64\WerFault.exe
          C:\Windows\SysWOW64\WerFault.exe -u -p 2608 -s 1084
          4⤵
          • Program crash
          PID:488
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\fkdwo759.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\fkdwo759.exe
        3⤵
        • Executes dropped EXE
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:4000
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\k218sMIs.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\k218sMIs.exe
      2⤵
      • Checks computer location settings
      • Executes dropped EXE
      • Suspicious use of WriteProcessMemory
      PID:2288
      • C:\Users\Admin\AppData\Local\Temp\46aee2aca4\redlines.exe
        "C:\Users\Admin\AppData\Local\Temp\46aee2aca4\redlines.exe"
        3⤵
        • Checks computer location settings
        • Executes dropped EXE
        • Suspicious use of WriteProcessMemory
        PID:2908
        • C:\Windows\SysWOW64\schtasks.exe
          "C:\Windows\System32\schtasks.exe" /Create /SC MINUTE /MO 1 /TN redlines.exe /TR "C:\Users\Admin\AppData\Local\Temp\46aee2aca4\redlines.exe" /F
          4⤵
          • Creates scheduled task(s)
          PID:1840
        • C:\Windows\SysWOW64\cmd.exe
          "C:\Windows\System32\cmd.exe" /k echo Y|CACLS "redlines.exe" /P "Admin:N"&&CACLS "redlines.exe" /P "Admin:R" /E&&echo Y|CACLS "..\46aee2aca4" /P "Admin:N"&&CACLS "..\46aee2aca4" /P "Admin:R" /E&&Exit
          4⤵
          • Suspicious use of WriteProcessMemory
          PID:224
          • C:\Windows\SysWOW64\cmd.exe
            C:\Windows\system32\cmd.exe /S /D /c" echo Y"
            5⤵
              PID:5040
            • C:\Windows\SysWOW64\cacls.exe
              CACLS "redlines.exe" /P "Admin:N"
              5⤵
                PID:3128
              • C:\Windows\SysWOW64\cacls.exe
                CACLS "redlines.exe" /P "Admin:R" /E
                5⤵
                  PID:2460
                • C:\Windows\SysWOW64\cmd.exe
                  C:\Windows\system32\cmd.exe /S /D /c" echo Y"
                  5⤵
                    PID:3644
                  • C:\Windows\SysWOW64\cacls.exe
                    CACLS "..\46aee2aca4" /P "Admin:N"
                    5⤵
                      PID:1016
                    • C:\Windows\SysWOW64\cacls.exe
                      CACLS "..\46aee2aca4" /P "Admin:R" /E
                      5⤵
                        PID:3472
                    • C:\Windows\SysWOW64\rundll32.exe
                      "C:\Windows\System32\rundll32.exe" C:\Users\Admin\AppData\Roaming\c1ec479e5342a2\clip64.dll, Main
                      4⤵
                      • Loads dropped DLL
                      PID:3120
                • C:\Windows\SysWOW64\WerFault.exe
                  C:\Windows\SysWOW64\WerFault.exe -u -p 2052 -s 424
                  2⤵
                  • Program crash
                  PID:228
              • C:\Windows\SysWOW64\WerFault.exe
                C:\Windows\SysWOW64\WerFault.exe -pss -s 460 -p 2608 -ip 2608
                1⤵
                  PID:3920
                • C:\Windows\SysWOW64\WerFault.exe
                  C:\Windows\SysWOW64\WerFault.exe -pss -s 420 -p 2052 -ip 2052
                  1⤵
                    PID:3976
                  • C:\Users\Admin\AppData\Local\Temp\46aee2aca4\redlines.exe
                    C:\Users\Admin\AppData\Local\Temp\46aee2aca4\redlines.exe
                    1⤵
                    • Executes dropped EXE
                    PID:4176
                  • C:\Users\Admin\AppData\Local\Temp\46aee2aca4\redlines.exe
                    C:\Users\Admin\AppData\Local\Temp\46aee2aca4\redlines.exe
                    1⤵
                    • Executes dropped EXE
                    PID:3916
                  • C:\Windows\system32\sc.exe
                    C:\Windows\system32\sc.exe start wuauserv
                    1⤵
                    • Launches sc.exe
                    PID:4868

                  Network

                  MITRE ATT&CK Enterprise v6

                  Replay Monitor

                  Loading Replay Monitor...

                  Downloads

                  • C:\Users\Admin\AppData\Local\Temp\46aee2aca4\redlines.exe

                    Filesize

                    235KB

                    MD5

                    2cf60f8337d5b2ac1ecd5a702fe8119f

                    SHA1

                    491f843831a2ae68847cb612be7f5886eac354d6

                    SHA256

                    2a3dbe07f949ead607ad6aa3ab4cf7e544c1d7482e6a72ce109dff5a81f38336

                    SHA512

                    fba0b731d36e4ce708f46629c18d04ee9a940037abaa57f7667ccbe226a01956c5ff99b029c46feaafea326a7e5aa606c0bb73cd3ed25f8fbae8410209322ac7

                  • C:\Users\Admin\AppData\Local\Temp\46aee2aca4\redlines.exe

                    Filesize

                    235KB

                    MD5

                    2cf60f8337d5b2ac1ecd5a702fe8119f

                    SHA1

                    491f843831a2ae68847cb612be7f5886eac354d6

                    SHA256

                    2a3dbe07f949ead607ad6aa3ab4cf7e544c1d7482e6a72ce109dff5a81f38336

                    SHA512

                    fba0b731d36e4ce708f46629c18d04ee9a940037abaa57f7667ccbe226a01956c5ff99b029c46feaafea326a7e5aa606c0bb73cd3ed25f8fbae8410209322ac7

                  • C:\Users\Admin\AppData\Local\Temp\46aee2aca4\redlines.exe

                    Filesize

                    235KB

                    MD5

                    2cf60f8337d5b2ac1ecd5a702fe8119f

                    SHA1

                    491f843831a2ae68847cb612be7f5886eac354d6

                    SHA256

                    2a3dbe07f949ead607ad6aa3ab4cf7e544c1d7482e6a72ce109dff5a81f38336

                    SHA512

                    fba0b731d36e4ce708f46629c18d04ee9a940037abaa57f7667ccbe226a01956c5ff99b029c46feaafea326a7e5aa606c0bb73cd3ed25f8fbae8410209322ac7

                  • C:\Users\Admin\AppData\Local\Temp\46aee2aca4\redlines.exe

                    Filesize

                    235KB

                    MD5

                    2cf60f8337d5b2ac1ecd5a702fe8119f

                    SHA1

                    491f843831a2ae68847cb612be7f5886eac354d6

                    SHA256

                    2a3dbe07f949ead607ad6aa3ab4cf7e544c1d7482e6a72ce109dff5a81f38336

                    SHA512

                    fba0b731d36e4ce708f46629c18d04ee9a940037abaa57f7667ccbe226a01956c5ff99b029c46feaafea326a7e5aa606c0bb73cd3ed25f8fbae8410209322ac7

                  • C:\Users\Admin\AppData\Local\Temp\46aee2aca4\redlines.exe

                    Filesize

                    235KB

                    MD5

                    2cf60f8337d5b2ac1ecd5a702fe8119f

                    SHA1

                    491f843831a2ae68847cb612be7f5886eac354d6

                    SHA256

                    2a3dbe07f949ead607ad6aa3ab4cf7e544c1d7482e6a72ce109dff5a81f38336

                    SHA512

                    fba0b731d36e4ce708f46629c18d04ee9a940037abaa57f7667ccbe226a01956c5ff99b029c46feaafea326a7e5aa606c0bb73cd3ed25f8fbae8410209322ac7

                  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\k218sMIs.exe

                    Filesize

                    235KB

                    MD5

                    2cf60f8337d5b2ac1ecd5a702fe8119f

                    SHA1

                    491f843831a2ae68847cb612be7f5886eac354d6

                    SHA256

                    2a3dbe07f949ead607ad6aa3ab4cf7e544c1d7482e6a72ce109dff5a81f38336

                    SHA512

                    fba0b731d36e4ce708f46629c18d04ee9a940037abaa57f7667ccbe226a01956c5ff99b029c46feaafea326a7e5aa606c0bb73cd3ed25f8fbae8410209322ac7

                  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\k218sMIs.exe

                    Filesize

                    235KB

                    MD5

                    2cf60f8337d5b2ac1ecd5a702fe8119f

                    SHA1

                    491f843831a2ae68847cb612be7f5886eac354d6

                    SHA256

                    2a3dbe07f949ead607ad6aa3ab4cf7e544c1d7482e6a72ce109dff5a81f38336

                    SHA512

                    fba0b731d36e4ce708f46629c18d04ee9a940037abaa57f7667ccbe226a01956c5ff99b029c46feaafea326a7e5aa606c0bb73cd3ed25f8fbae8410209322ac7

                  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\m295x110.exe

                    Filesize

                    391KB

                    MD5

                    76eeb5bbf0c4bd69403aa2b955f944f0

                    SHA1

                    37c5cebd5db3a379d36083b4b9b4f1a0aad4f6bb

                    SHA256

                    94f0ac00e6ab6ebe460cd5e25f6adb983d45674b95437b39125194d3cbb81221

                    SHA512

                    dd0328c7e1f469a8dccbd557cc6782f063e63fb16b9c52757852196cf49b5bee74ded6920f086f36325b784d2cd22acccbfcde727e77654f73e3db5779db20ed

                  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\m295x110.exe

                    Filesize

                    391KB

                    MD5

                    76eeb5bbf0c4bd69403aa2b955f944f0

                    SHA1

                    37c5cebd5db3a379d36083b4b9b4f1a0aad4f6bb

                    SHA256

                    94f0ac00e6ab6ebe460cd5e25f6adb983d45674b95437b39125194d3cbb81221

                    SHA512

                    dd0328c7e1f469a8dccbd557cc6782f063e63fb16b9c52757852196cf49b5bee74ded6920f086f36325b784d2cd22acccbfcde727e77654f73e3db5779db20ed

                  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\a451fXaJ.exe

                    Filesize

                    363KB

                    MD5

                    5f9106c1a4ae0150887ac3eadc521f31

                    SHA1

                    b7c59f033e09829e70ebf380ef9c33aff98d2bf4

                    SHA256

                    ddda2d12c18f4944b44af8c6bb030ae608060d087483c423acf217c4c4ed5411

                    SHA512

                    80ab71ecb332f2316abf7cb73c4811bf2162c2e95fc0670fcd8d26370158e2b2f342328ece12e9edeed90a7568d24d0048bdb9ee3ea928fd80d1499851c5caf3

                  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\a451fXaJ.exe

                    Filesize

                    363KB

                    MD5

                    5f9106c1a4ae0150887ac3eadc521f31

                    SHA1

                    b7c59f033e09829e70ebf380ef9c33aff98d2bf4

                    SHA256

                    ddda2d12c18f4944b44af8c6bb030ae608060d087483c423acf217c4c4ed5411

                    SHA512

                    80ab71ecb332f2316abf7cb73c4811bf2162c2e95fc0670fcd8d26370158e2b2f342328ece12e9edeed90a7568d24d0048bdb9ee3ea928fd80d1499851c5caf3

                  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\fkdwo759.exe

                    Filesize

                    175KB

                    MD5

                    fb6b1dfc1d31819df66b4eba004f4f1e

                    SHA1

                    8fb4085acc6bdac0c653130d20ccf87dc0a4bc16

                    SHA256

                    4a8cf958110e605398244c588878680f5f367bf064573a69fded3f4ca70c7549

                    SHA512

                    270f0208fac6330d413709de2f1aa348f20e434bb70b886a96e7db87f74607c9dcbee92b458ea375ca9d22a89af46b31655b84d6f26fac3d12e63f8242d41f3a

                  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\fkdwo759.exe

                    Filesize

                    175KB

                    MD5

                    fb6b1dfc1d31819df66b4eba004f4f1e

                    SHA1

                    8fb4085acc6bdac0c653130d20ccf87dc0a4bc16

                    SHA256

                    4a8cf958110e605398244c588878680f5f367bf064573a69fded3f4ca70c7549

                    SHA512

                    270f0208fac6330d413709de2f1aa348f20e434bb70b886a96e7db87f74607c9dcbee92b458ea375ca9d22a89af46b31655b84d6f26fac3d12e63f8242d41f3a

                  • C:\Users\Admin\AppData\Roaming\c1ec479e5342a2\clip64.dll

                    Filesize

                    89KB

                    MD5

                    57cf7ce2696f4ac87b27879886a089bf

                    SHA1

                    897fc8605b17f47fd51272a8a5f5605d939c744f

                    SHA256

                    388abaad8701de54dcc5e0d8380630e1b6f0b323f1a9cf4377e38399753842b3

                    SHA512

                    fd5a09e5908817a612eb59bf424272a749ff6ccccbd66f1900d29c58564befef981bd8bf7049d6d6690ffb8553bf9647f7051a9fb4b57ea1d68e256a769b6a86

                  • C:\Users\Admin\AppData\Roaming\c1ec479e5342a2\clip64.dll

                    Filesize

                    89KB

                    MD5

                    57cf7ce2696f4ac87b27879886a089bf

                    SHA1

                    897fc8605b17f47fd51272a8a5f5605d939c744f

                    SHA256

                    388abaad8701de54dcc5e0d8380630e1b6f0b323f1a9cf4377e38399753842b3

                    SHA512

                    fd5a09e5908817a612eb59bf424272a749ff6ccccbd66f1900d29c58564befef981bd8bf7049d6d6690ffb8553bf9647f7051a9fb4b57ea1d68e256a769b6a86

                  • C:\Users\Admin\AppData\Roaming\c1ec479e5342a2\clip64.dll

                    Filesize

                    89KB

                    MD5

                    57cf7ce2696f4ac87b27879886a089bf

                    SHA1

                    897fc8605b17f47fd51272a8a5f5605d939c744f

                    SHA256

                    388abaad8701de54dcc5e0d8380630e1b6f0b323f1a9cf4377e38399753842b3

                    SHA512

                    fd5a09e5908817a612eb59bf424272a749ff6ccccbd66f1900d29c58564befef981bd8bf7049d6d6690ffb8553bf9647f7051a9fb4b57ea1d68e256a769b6a86

                  • C:\Users\Admin\AppData\Roaming\c1ec479e5342a2\cred64.dll

                    Filesize

                    162B

                    MD5

                    1b7c22a214949975556626d7217e9a39

                    SHA1

                    d01c97e2944166ed23e47e4a62ff471ab8fa031f

                    SHA256

                    340c8464c2007ce3f80682e15dfafa4180b641d53c14201b929906b7b0284d87

                    SHA512

                    ba64847cf1d4157d50abe4f4a1e5c1996fe387c5808e2f758c7fb3213bfefe1f3712d343f0c30a16819749840954654a70611d2250fd0f7b032429db7afd2cc5

                  • memory/2052-223-0x0000000000400000-0x000000000053A000-memory.dmp

                    Filesize

                    1.2MB

                  • memory/2052-186-0x0000000000400000-0x000000000053A000-memory.dmp

                    Filesize

                    1.2MB

                  • memory/2052-152-0x0000000002400000-0x0000000002491000-memory.dmp

                    Filesize

                    580KB

                  • memory/2608-185-0x00000000071B0000-0x00000000071C0000-memory.dmp

                    Filesize

                    64KB

                  • memory/2608-164-0x0000000007130000-0x0000000007142000-memory.dmp

                    Filesize

                    72KB

                  • memory/2608-174-0x0000000007130000-0x0000000007142000-memory.dmp

                    Filesize

                    72KB

                  • memory/2608-178-0x0000000007130000-0x0000000007142000-memory.dmp

                    Filesize

                    72KB

                  • memory/2608-176-0x0000000007130000-0x0000000007142000-memory.dmp

                    Filesize

                    72KB

                  • memory/2608-180-0x0000000007130000-0x0000000007142000-memory.dmp

                    Filesize

                    72KB

                  • memory/2608-182-0x0000000007130000-0x0000000007142000-memory.dmp

                    Filesize

                    72KB

                  • memory/2608-183-0x00000000071B0000-0x00000000071C0000-memory.dmp

                    Filesize

                    64KB

                  • memory/2608-172-0x0000000007130000-0x0000000007142000-memory.dmp

                    Filesize

                    72KB

                  • memory/2608-184-0x00000000071B0000-0x00000000071C0000-memory.dmp

                    Filesize

                    64KB

                  • memory/2608-187-0x0000000000400000-0x0000000002BC9000-memory.dmp

                    Filesize

                    39.8MB

                  • memory/2608-189-0x00000000071B0000-0x00000000071C0000-memory.dmp

                    Filesize

                    64KB

                  • memory/2608-190-0x00000000071B0000-0x00000000071C0000-memory.dmp

                    Filesize

                    64KB

                  • memory/2608-191-0x00000000071B0000-0x00000000071C0000-memory.dmp

                    Filesize

                    64KB

                  • memory/2608-192-0x0000000000400000-0x0000000002BC9000-memory.dmp

                    Filesize

                    39.8MB

                  • memory/2608-153-0x0000000002CA0000-0x0000000002CCD000-memory.dmp

                    Filesize

                    180KB

                  • memory/2608-154-0x00000000071C0000-0x0000000007764000-memory.dmp

                    Filesize

                    5.6MB

                  • memory/2608-155-0x0000000007130000-0x0000000007142000-memory.dmp

                    Filesize

                    72KB

                  • memory/2608-156-0x0000000007130000-0x0000000007142000-memory.dmp

                    Filesize

                    72KB

                  • memory/2608-158-0x0000000007130000-0x0000000007142000-memory.dmp

                    Filesize

                    72KB

                  • memory/2608-160-0x0000000007130000-0x0000000007142000-memory.dmp

                    Filesize

                    72KB

                  • memory/2608-162-0x0000000007130000-0x0000000007142000-memory.dmp

                    Filesize

                    72KB

                  • memory/2608-170-0x0000000007130000-0x0000000007142000-memory.dmp

                    Filesize

                    72KB

                  • memory/2608-166-0x0000000007130000-0x0000000007142000-memory.dmp

                    Filesize

                    72KB

                  • memory/2608-168-0x0000000007130000-0x0000000007142000-memory.dmp

                    Filesize

                    72KB

                  • memory/4000-200-0x0000000004B80000-0x0000000004BBC000-memory.dmp

                    Filesize

                    240KB

                  • memory/4000-206-0x0000000006BC0000-0x00000000070EC000-memory.dmp

                    Filesize

                    5.2MB

                  • memory/4000-205-0x00000000064C0000-0x0000000006682000-memory.dmp

                    Filesize

                    1.8MB

                  • memory/4000-204-0x0000000004F60000-0x0000000004FC6000-memory.dmp

                    Filesize

                    408KB

                  • memory/4000-203-0x0000000004EC0000-0x0000000004F52000-memory.dmp

                    Filesize

                    584KB

                  • memory/4000-201-0x0000000004E00000-0x0000000004E10000-memory.dmp

                    Filesize

                    64KB

                  • memory/4000-207-0x0000000004E00000-0x0000000004E10000-memory.dmp

                    Filesize

                    64KB

                  • memory/4000-199-0x0000000004B20000-0x0000000004B32000-memory.dmp

                    Filesize

                    72KB

                  • memory/4000-198-0x0000000004BF0000-0x0000000004CFA000-memory.dmp

                    Filesize

                    1.0MB

                  • memory/4000-197-0x0000000005070000-0x0000000005688000-memory.dmp

                    Filesize

                    6.1MB

                  • memory/4000-196-0x0000000000280000-0x00000000002B2000-memory.dmp

                    Filesize

                    200KB

                  • memory/4000-208-0x0000000006710000-0x0000000006786000-memory.dmp

                    Filesize

                    472KB

                  • memory/4000-209-0x0000000006690000-0x00000000066E0000-memory.dmp

                    Filesize

                    320KB