Analysis

  • max time kernel
    150s
  • max time network
    167s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20230220-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system
  • submitted
    01-05-2023 18:55

General

  • Target

    e74bb26fa9abfae25e76c18c04ddf0e51268d89c2dd6bb9d8cfd78bb01ff4748.exe

  • Size

    1.2MB

  • MD5

    e37b641c3dccffbe9c19247e133829e9

  • SHA1

    c6631d1745ac50077f99effbdf0af95a455d1cef

  • SHA256

    e74bb26fa9abfae25e76c18c04ddf0e51268d89c2dd6bb9d8cfd78bb01ff4748

  • SHA512

    e6b2148afaf65c610012a973faf9a8a62829a9ad4d22ba8e04c215618211898c6df5c5058ae3630def111e66b965f8df5e301700f712ec27bc9265e58edf5dd8

  • SSDEEP

    24576:wy2Xxqm2KGrSjmtRbvW06wNXlBpe5wCHyoOusDIDOGeX:3Cxp2KGWmtJWQVlBoDyo/s0DOB

Malware Config

Extracted

Family

amadey

Version

3.70

C2

212.113.119.255/joomla/index.php

Signatures

  • Amadey

    Amadey bot is a simple trojan bot primarily used for collecting reconnaissance information.

  • Detects Redline Stealer samples 1 IoCs

    This rule detects the presence of Redline Stealer samples based on their unique strings.

  • Modifies Windows Defender Real-time Protection settings 3 TTPs 11 IoCs
  • RedLine

    RedLine Stealer is a malware family written in C#, first appearing in early 2020.

  • Checks computer location settings 2 TTPs 2 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Executes dropped EXE 9 IoCs
  • Windows security modification 2 TTPs 3 IoCs
  • Adds Run key to start application 2 TTPs 8 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Program crash 1 IoCs
  • Creates scheduled task(s) 1 TTPs 1 IoCs

    Schtasks is often used by malware for persistence or to perform post-infection execution.

  • Suspicious behavior: EnumeratesProcesses 4 IoCs
  • Suspicious use of AdjustPrivilegeToken 3 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of WriteProcessMemory 27 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\e74bb26fa9abfae25e76c18c04ddf0e51268d89c2dd6bb9d8cfd78bb01ff4748.exe
    "C:\Users\Admin\AppData\Local\Temp\e74bb26fa9abfae25e76c18c04ddf0e51268d89c2dd6bb9d8cfd78bb01ff4748.exe"
    1⤵
    • Adds Run key to start application
    • Suspicious use of WriteProcessMemory
    PID:1896
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\za984872.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\za984872.exe
      2⤵
      • Executes dropped EXE
      • Adds Run key to start application
      • Suspicious use of WriteProcessMemory
      PID:1196
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\za206462.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\za206462.exe
        3⤵
        • Executes dropped EXE
        • Adds Run key to start application
        • Suspicious use of WriteProcessMemory
        PID:1640
        • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\za164429.exe
          C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\za164429.exe
          4⤵
          • Executes dropped EXE
          • Adds Run key to start application
          • Suspicious use of WriteProcessMemory
          PID:3508
          • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\99733439.exe
            C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\99733439.exe
            5⤵
            • Modifies Windows Defender Real-time Protection settings
            • Executes dropped EXE
            • Windows security modification
            • Suspicious behavior: EnumeratesProcesses
            • Suspicious use of AdjustPrivilegeToken
            PID:5040
          • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\u27480180.exe
            C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\u27480180.exe
            5⤵
            • Modifies Windows Defender Real-time Protection settings
            • Executes dropped EXE
            • Windows security modification
            • Suspicious behavior: EnumeratesProcesses
            • Suspicious use of AdjustPrivilegeToken
            PID:3660
            • C:\Windows\SysWOW64\WerFault.exe
              C:\Windows\SysWOW64\WerFault.exe -u -p 3660 -s 1076
              6⤵
              • Program crash
              PID:4524
        • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\w51sn15.exe
          C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\w51sn15.exe
          4⤵
          • Checks computer location settings
          • Executes dropped EXE
          • Suspicious use of FindShellTrayWindow
          • Suspicious use of WriteProcessMemory
          PID:1628
          • C:\Users\Admin\AppData\Local\Temp\5cb6818d6c\oneetx.exe
            "C:\Users\Admin\AppData\Local\Temp\5cb6818d6c\oneetx.exe"
            5⤵
            • Checks computer location settings
            • Executes dropped EXE
            • Suspicious use of WriteProcessMemory
            PID:2536
            • C:\Windows\SysWOW64\schtasks.exe
              "C:\Windows\System32\schtasks.exe" /Create /SC MINUTE /MO 1 /TN oneetx.exe /TR "C:\Users\Admin\AppData\Local\Temp\5cb6818d6c\oneetx.exe" /F
              6⤵
              • Creates scheduled task(s)
              PID:1092
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\xCvjn21.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\xCvjn21.exe
        3⤵
        • Executes dropped EXE
        • Suspicious use of AdjustPrivilegeToken
        PID:3888
  • C:\Windows\SysWOW64\WerFault.exe
    C:\Windows\SysWOW64\WerFault.exe -pss -s 452 -p 3660 -ip 3660
    1⤵
      PID:4484
    • C:\Users\Admin\AppData\Local\Temp\5cb6818d6c\oneetx.exe
      C:\Users\Admin\AppData\Local\Temp\5cb6818d6c\oneetx.exe
      1⤵
      • Executes dropped EXE
      PID:4444

    Network

    MITRE ATT&CK Enterprise v6

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Users\Admin\AppData\Local\Temp\5cb6818d6c\oneetx.exe

      Filesize

      229KB

      MD5

      550b197e13146b5cf326d2999df1e060

      SHA1

      0c53ee0bf52ca00e6e610c9e46a9d7acf1bad630

      SHA256

      57b41095a8540f5514d9e52d5c04ef982282390d486dd907f0fdaaa8aa045eb0

      SHA512

      06fdd9a7345d8c0fe40a674e1af14dce47570164ed3382b4842a48d23441e26a215b69374551e98c4656a622186ccf6ad5e30b557a0c5931e002394e880790ad

    • C:\Users\Admin\AppData\Local\Temp\5cb6818d6c\oneetx.exe

      Filesize

      229KB

      MD5

      550b197e13146b5cf326d2999df1e060

      SHA1

      0c53ee0bf52ca00e6e610c9e46a9d7acf1bad630

      SHA256

      57b41095a8540f5514d9e52d5c04ef982282390d486dd907f0fdaaa8aa045eb0

      SHA512

      06fdd9a7345d8c0fe40a674e1af14dce47570164ed3382b4842a48d23441e26a215b69374551e98c4656a622186ccf6ad5e30b557a0c5931e002394e880790ad

    • C:\Users\Admin\AppData\Local\Temp\5cb6818d6c\oneetx.exe

      Filesize

      229KB

      MD5

      550b197e13146b5cf326d2999df1e060

      SHA1

      0c53ee0bf52ca00e6e610c9e46a9d7acf1bad630

      SHA256

      57b41095a8540f5514d9e52d5c04ef982282390d486dd907f0fdaaa8aa045eb0

      SHA512

      06fdd9a7345d8c0fe40a674e1af14dce47570164ed3382b4842a48d23441e26a215b69374551e98c4656a622186ccf6ad5e30b557a0c5931e002394e880790ad

    • C:\Users\Admin\AppData\Local\Temp\5cb6818d6c\oneetx.exe

      Filesize

      229KB

      MD5

      550b197e13146b5cf326d2999df1e060

      SHA1

      0c53ee0bf52ca00e6e610c9e46a9d7acf1bad630

      SHA256

      57b41095a8540f5514d9e52d5c04ef982282390d486dd907f0fdaaa8aa045eb0

      SHA512

      06fdd9a7345d8c0fe40a674e1af14dce47570164ed3382b4842a48d23441e26a215b69374551e98c4656a622186ccf6ad5e30b557a0c5931e002394e880790ad

    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\za984872.exe

      Filesize

      1.0MB

      MD5

      6b0ef73e99acc5c1c04695c524d4468c

      SHA1

      28249204427505c9a82fda41ace1e6675e900758

      SHA256

      870d263c1680beb83a62251462fbe2ec9f5c2b5f0a1644cf365b918b88223524

      SHA512

      bc58c73932131d199e1f0cbe172e45864f2785aa1eb0f2ba58a8aec927444b3d0c35b17683d3c48ddda3ded6bc6666087cd38e3f5356fafad6af5a9d2dd6f05c

    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\za984872.exe

      Filesize

      1.0MB

      MD5

      6b0ef73e99acc5c1c04695c524d4468c

      SHA1

      28249204427505c9a82fda41ace1e6675e900758

      SHA256

      870d263c1680beb83a62251462fbe2ec9f5c2b5f0a1644cf365b918b88223524

      SHA512

      bc58c73932131d199e1f0cbe172e45864f2785aa1eb0f2ba58a8aec927444b3d0c35b17683d3c48ddda3ded6bc6666087cd38e3f5356fafad6af5a9d2dd6f05c

    • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\xCvjn21.exe

      Filesize

      461KB

      MD5

      0b90af945a793638d26f90867ce2598e

      SHA1

      5522961b85640b7aba9d70c3b94fb603a098ecb9

      SHA256

      6b8f640ea01d4d029c9a0b499b733888778a08802acf2995d2616b61a23fcdd9

      SHA512

      763c7d67a5fe8cc4cb8f5a8366f67db8812855a1acc5086282f56693939da6633a3fa2472c3e578abf8a31a47aaa754070473122e4057408e4f6af17d5d3f572

    • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\xCvjn21.exe

      Filesize

      461KB

      MD5

      0b90af945a793638d26f90867ce2598e

      SHA1

      5522961b85640b7aba9d70c3b94fb603a098ecb9

      SHA256

      6b8f640ea01d4d029c9a0b499b733888778a08802acf2995d2616b61a23fcdd9

      SHA512

      763c7d67a5fe8cc4cb8f5a8366f67db8812855a1acc5086282f56693939da6633a3fa2472c3e578abf8a31a47aaa754070473122e4057408e4f6af17d5d3f572

    • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\za206462.exe

      Filesize

      649KB

      MD5

      93c593eec5638ca96f4e7819f42a784d

      SHA1

      344a9894fe7a36b2f499eee75753e091189161ce

      SHA256

      5bcdb9a864c670cec037282f3cad3e92371b22cea44cb0d3d9649025d64a3c3f

      SHA512

      2217886b1653b3df69808a43e5894faa2a13980a59880696965782187f3b022e9f22a41c5234f3f4a521dec9979afaf91bc1b346e3220f58c1c7e74b46b93843

    • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\za206462.exe

      Filesize

      649KB

      MD5

      93c593eec5638ca96f4e7819f42a784d

      SHA1

      344a9894fe7a36b2f499eee75753e091189161ce

      SHA256

      5bcdb9a864c670cec037282f3cad3e92371b22cea44cb0d3d9649025d64a3c3f

      SHA512

      2217886b1653b3df69808a43e5894faa2a13980a59880696965782187f3b022e9f22a41c5234f3f4a521dec9979afaf91bc1b346e3220f58c1c7e74b46b93843

    • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\w51sn15.exe

      Filesize

      229KB

      MD5

      550b197e13146b5cf326d2999df1e060

      SHA1

      0c53ee0bf52ca00e6e610c9e46a9d7acf1bad630

      SHA256

      57b41095a8540f5514d9e52d5c04ef982282390d486dd907f0fdaaa8aa045eb0

      SHA512

      06fdd9a7345d8c0fe40a674e1af14dce47570164ed3382b4842a48d23441e26a215b69374551e98c4656a622186ccf6ad5e30b557a0c5931e002394e880790ad

    • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\w51sn15.exe

      Filesize

      229KB

      MD5

      550b197e13146b5cf326d2999df1e060

      SHA1

      0c53ee0bf52ca00e6e610c9e46a9d7acf1bad630

      SHA256

      57b41095a8540f5514d9e52d5c04ef982282390d486dd907f0fdaaa8aa045eb0

      SHA512

      06fdd9a7345d8c0fe40a674e1af14dce47570164ed3382b4842a48d23441e26a215b69374551e98c4656a622186ccf6ad5e30b557a0c5931e002394e880790ad

    • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\za164429.exe

      Filesize

      467KB

      MD5

      a9ee188b1877bad3631c278db28359f3

      SHA1

      7791449ee9b692e9b5aef3091600011e272f5f9e

      SHA256

      2e4bd083acea107a66b9661f91b792df4758cabbdf29d8801332425a39463fac

      SHA512

      d84d079eff188dafcbb6578c9f1ade39c0fdd849639a41232cd8d7b0c8a80847557ea9a4b31567c164d4afed2cc3247f7d1cae951aa34bf7a85605cfd550571d

    • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\za164429.exe

      Filesize

      467KB

      MD5

      a9ee188b1877bad3631c278db28359f3

      SHA1

      7791449ee9b692e9b5aef3091600011e272f5f9e

      SHA256

      2e4bd083acea107a66b9661f91b792df4758cabbdf29d8801332425a39463fac

      SHA512

      d84d079eff188dafcbb6578c9f1ade39c0fdd849639a41232cd8d7b0c8a80847557ea9a4b31567c164d4afed2cc3247f7d1cae951aa34bf7a85605cfd550571d

    • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\99733439.exe

      Filesize

      176KB

      MD5

      34efaad38dd82d68351d7af02be00c9b

      SHA1

      ac4dbec8c01d2cc11e49ac66ea3c37a30b9c2324

      SHA256

      df1c9178c4d0bb2dfbd77562b4198766e508414d7fd81ea6b09058caea057f00

      SHA512

      c6c92c262338a41aba9501662be760645dee869008ad4b216e3435b402f6e6d83f27b10040e9d524c64570657f4a9167068edee0e0aaf3f19e5eace596af55c0

    • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\99733439.exe

      Filesize

      176KB

      MD5

      34efaad38dd82d68351d7af02be00c9b

      SHA1

      ac4dbec8c01d2cc11e49ac66ea3c37a30b9c2324

      SHA256

      df1c9178c4d0bb2dfbd77562b4198766e508414d7fd81ea6b09058caea057f00

      SHA512

      c6c92c262338a41aba9501662be760645dee869008ad4b216e3435b402f6e6d83f27b10040e9d524c64570657f4a9167068edee0e0aaf3f19e5eace596af55c0

    • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\u27480180.exe

      Filesize

      377KB

      MD5

      a81aab9b23f67453b4868df925891d39

      SHA1

      81a0349318dacea667c554ec870c0d458e5206bd

      SHA256

      5c6d3f8f017217e14601edd1c8ebdd443007ba90a3b9cd9fdae8683291693937

      SHA512

      c17a64feda25a707eb7c80e5bb252e67ad6fc2988868dcd517f416b64c3756d400f65e6e3563aee3e8817a91f9eafcb1b28e1dfbbdfde16882382a7fe273ae58

    • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\u27480180.exe

      Filesize

      377KB

      MD5

      a81aab9b23f67453b4868df925891d39

      SHA1

      81a0349318dacea667c554ec870c0d458e5206bd

      SHA256

      5c6d3f8f017217e14601edd1c8ebdd443007ba90a3b9cd9fdae8683291693937

      SHA512

      c17a64feda25a707eb7c80e5bb252e67ad6fc2988868dcd517f416b64c3756d400f65e6e3563aee3e8817a91f9eafcb1b28e1dfbbdfde16882382a7fe273ae58

    • memory/3660-222-0x0000000004D70000-0x0000000004D82000-memory.dmp

      Filesize

      72KB

    • memory/3660-231-0x0000000004EA0000-0x0000000004EB0000-memory.dmp

      Filesize

      64KB

    • memory/3660-238-0x0000000000400000-0x0000000000802000-memory.dmp

      Filesize

      4.0MB

    • memory/3660-236-0x0000000004EA0000-0x0000000004EB0000-memory.dmp

      Filesize

      64KB

    • memory/3660-235-0x0000000004EA0000-0x0000000004EB0000-memory.dmp

      Filesize

      64KB

    • memory/3660-234-0x0000000004EA0000-0x0000000004EB0000-memory.dmp

      Filesize

      64KB

    • memory/3660-233-0x0000000000400000-0x0000000000802000-memory.dmp

      Filesize

      4.0MB

    • memory/3660-232-0x0000000004EA0000-0x0000000004EB0000-memory.dmp

      Filesize

      64KB

    • memory/3660-230-0x0000000004EA0000-0x0000000004EB0000-memory.dmp

      Filesize

      64KB

    • memory/3660-229-0x0000000000810000-0x000000000083D000-memory.dmp

      Filesize

      180KB

    • memory/3660-201-0x0000000004D70000-0x0000000004D82000-memory.dmp

      Filesize

      72KB

    • memory/3660-202-0x0000000004D70000-0x0000000004D82000-memory.dmp

      Filesize

      72KB

    • memory/3660-204-0x0000000004D70000-0x0000000004D82000-memory.dmp

      Filesize

      72KB

    • memory/3660-206-0x0000000004D70000-0x0000000004D82000-memory.dmp

      Filesize

      72KB

    • memory/3660-214-0x0000000004D70000-0x0000000004D82000-memory.dmp

      Filesize

      72KB

    • memory/3660-218-0x0000000004D70000-0x0000000004D82000-memory.dmp

      Filesize

      72KB

    • memory/3660-220-0x0000000004D70000-0x0000000004D82000-memory.dmp

      Filesize

      72KB

    • memory/3660-228-0x0000000004D70000-0x0000000004D82000-memory.dmp

      Filesize

      72KB

    • memory/3660-226-0x0000000004D70000-0x0000000004D82000-memory.dmp

      Filesize

      72KB

    • memory/3660-224-0x0000000004D70000-0x0000000004D82000-memory.dmp

      Filesize

      72KB

    • memory/3660-208-0x0000000004D70000-0x0000000004D82000-memory.dmp

      Filesize

      72KB

    • memory/3660-216-0x0000000004D70000-0x0000000004D82000-memory.dmp

      Filesize

      72KB

    • memory/3660-212-0x0000000004D70000-0x0000000004D82000-memory.dmp

      Filesize

      72KB

    • memory/3660-210-0x0000000004D70000-0x0000000004D82000-memory.dmp

      Filesize

      72KB

    • memory/3888-259-0x0000000004DF0000-0x0000000004E25000-memory.dmp

      Filesize

      212KB

    • memory/3888-1066-0x0000000004F80000-0x0000000004F90000-memory.dmp

      Filesize

      64KB

    • memory/3888-1062-0x0000000004F80000-0x0000000004F90000-memory.dmp

      Filesize

      64KB

    • memory/3888-1063-0x0000000004F80000-0x0000000004F90000-memory.dmp

      Filesize

      64KB

    • memory/3888-1061-0x0000000004F80000-0x0000000004F90000-memory.dmp

      Filesize

      64KB

    • memory/3888-1060-0x00000000080B0000-0x00000000080EC000-memory.dmp

      Filesize

      240KB

    • memory/3888-1059-0x0000000004F80000-0x0000000004F90000-memory.dmp

      Filesize

      64KB

    • memory/3888-1057-0x0000000007F90000-0x000000000809A000-memory.dmp

      Filesize

      1.0MB

    • memory/3888-1056-0x0000000007F70000-0x0000000007F82000-memory.dmp

      Filesize

      72KB

    • memory/3888-1055-0x00000000078C0000-0x0000000007ED8000-memory.dmp

      Filesize

      6.1MB

    • memory/3888-780-0x0000000004F80000-0x0000000004F90000-memory.dmp

      Filesize

      64KB

    • memory/3888-782-0x0000000004F80000-0x0000000004F90000-memory.dmp

      Filesize

      64KB

    • memory/3888-778-0x0000000004F80000-0x0000000004F90000-memory.dmp

      Filesize

      64KB

    • memory/3888-776-0x0000000000820000-0x0000000000866000-memory.dmp

      Filesize

      280KB

    • memory/3888-260-0x0000000004DF0000-0x0000000004E25000-memory.dmp

      Filesize

      212KB

    • memory/5040-188-0x0000000004950000-0x0000000004963000-memory.dmp

      Filesize

      76KB

    • memory/5040-186-0x0000000004950000-0x0000000004963000-memory.dmp

      Filesize

      76KB

    • memory/5040-165-0x0000000004950000-0x0000000004963000-memory.dmp

      Filesize

      76KB

    • memory/5040-164-0x0000000004A30000-0x0000000004A40000-memory.dmp

      Filesize

      64KB

    • memory/5040-163-0x0000000004A30000-0x0000000004A40000-memory.dmp

      Filesize

      64KB

    • memory/5040-162-0x0000000004A30000-0x0000000004A40000-memory.dmp

      Filesize

      64KB

    • memory/5040-168-0x0000000004950000-0x0000000004963000-memory.dmp

      Filesize

      76KB

    • memory/5040-170-0x0000000004950000-0x0000000004963000-memory.dmp

      Filesize

      76KB

    • memory/5040-180-0x0000000004950000-0x0000000004963000-memory.dmp

      Filesize

      76KB

    • memory/5040-182-0x0000000004950000-0x0000000004963000-memory.dmp

      Filesize

      76KB

    • memory/5040-184-0x0000000004950000-0x0000000004963000-memory.dmp

      Filesize

      76KB

    • memory/5040-166-0x0000000004950000-0x0000000004963000-memory.dmp

      Filesize

      76KB

    • memory/5040-172-0x0000000004950000-0x0000000004963000-memory.dmp

      Filesize

      76KB

    • memory/5040-190-0x0000000004950000-0x0000000004963000-memory.dmp

      Filesize

      76KB

    • memory/5040-178-0x0000000004950000-0x0000000004963000-memory.dmp

      Filesize

      76KB

    • memory/5040-192-0x0000000004950000-0x0000000004963000-memory.dmp

      Filesize

      76KB

    • memory/5040-193-0x0000000004A30000-0x0000000004A40000-memory.dmp

      Filesize

      64KB

    • memory/5040-194-0x0000000004A30000-0x0000000004A40000-memory.dmp

      Filesize

      64KB

    • memory/5040-195-0x0000000004A30000-0x0000000004A40000-memory.dmp

      Filesize

      64KB

    • memory/5040-176-0x0000000004950000-0x0000000004963000-memory.dmp

      Filesize

      76KB

    • memory/5040-161-0x0000000004A40000-0x0000000004FE4000-memory.dmp

      Filesize

      5.6MB

    • memory/5040-174-0x0000000004950000-0x0000000004963000-memory.dmp

      Filesize

      76KB