Analysis

  • max time kernel
    148s
  • max time network
    144s
  • platform
    windows7_x64
  • resource
    win7-20230220-en
  • resource tags

    arch:x64arch:x86image:win7-20230220-enlocale:en-usos:windows7-x64system
  • submitted
    06-05-2023 22:48

General

  • Target

    0872311eba59f44fe5232d52968dabc93992a79552c42ffc5c4e6336ed409118.exe

  • Size

    1.2MB

  • MD5

    021e6b3f607c727ba08ee988206c4567

  • SHA1

    0bd4f98586dfb251d9744e49aa50110e626889b1

  • SHA256

    0872311eba59f44fe5232d52968dabc93992a79552c42ffc5c4e6336ed409118

  • SHA512

    447d3f72c12db4ec4c80526a8692e66c6e557eb24cbdae6595ce386b8c49c7733de1438ee5dcfcb638fab4e099024bcdab8b8ff97357585cf614323df5dc9bb3

  • SSDEEP

    24576:Oyxu92jx9/Kcy3yOIEXuHFDTPrSkGXs77+Fu7BgF3MWIYwu5/xVF8UwyCQ:dw2WcI1zXOvEW7+U9gF3WYwu5KBy

Malware Config

Extracted

Family

redline

Botnet

gena

C2

185.161.248.73:4164

Attributes
  • auth_value

    d05bf43eef533e262271449829751d07

Extracted

Family

redline

Botnet

life

C2

185.161.248.73:4164

Attributes
  • auth_value

    8685d11953530b68ad5ec703809d9f91

Signatures

  • RedLine

    RedLine Stealer is a malware family written in C#, first appearing in early 2020.

  • Executes dropped EXE 6 IoCs
  • Loads dropped DLL 13 IoCs
  • Adds Run key to start application 2 TTPs 8 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of WriteProcessMemory 42 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\0872311eba59f44fe5232d52968dabc93992a79552c42ffc5c4e6336ed409118.exe
    "C:\Users\Admin\AppData\Local\Temp\0872311eba59f44fe5232d52968dabc93992a79552c42ffc5c4e6336ed409118.exe"
    1⤵
    • Loads dropped DLL
    • Adds Run key to start application
    • Suspicious use of WriteProcessMemory
    PID:316
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\z39739129.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\z39739129.exe
      2⤵
      • Executes dropped EXE
      • Loads dropped DLL
      • Adds Run key to start application
      • Suspicious use of WriteProcessMemory
      PID:756
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\z41836049.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\z41836049.exe
        3⤵
        • Executes dropped EXE
        • Loads dropped DLL
        • Adds Run key to start application
        • Suspicious use of WriteProcessMemory
        PID:1984
        • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\z33335380.exe
          C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\z33335380.exe
          4⤵
          • Executes dropped EXE
          • Loads dropped DLL
          • Adds Run key to start application
          • Suspicious use of WriteProcessMemory
          PID:1168
          • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\s69671186.exe
            C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\s69671186.exe
            5⤵
            • Executes dropped EXE
            • Loads dropped DLL
            • Suspicious use of AdjustPrivilegeToken
            • Suspicious use of WriteProcessMemory
            PID:1740
            • C:\Windows\Temp\1.exe
              "C:\Windows\Temp\1.exe"
              6⤵
              • Executes dropped EXE
              • Loads dropped DLL
              PID:432
          • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\t71629403.exe
            C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\t71629403.exe
            5⤵
            • Executes dropped EXE
            • Loads dropped DLL
            PID:1528

Network

MITRE ATT&CK Matrix ATT&CK v6

Persistence

Registry Run Keys / Startup Folder

1
T1060

Defense Evasion

Modify Registry

1
T1112

Discovery

System Information Discovery

1
T1082

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\z39739129.exe
    Filesize

    1.0MB

    MD5

    efd9b1c7975bc7491ce75de32975d7ed

    SHA1

    8514288b134169f8ccbe8d6d39f577fb99da2be3

    SHA256

    32b8da0dddccf37a2360f859e4a8cdf3a5b9405412819fb6374c36a75b4dc35e

    SHA512

    f1cd1c852c0d93b59a133b9a3b6efc5d46ab1a2a6d68244c3866a9d4bb83b4c19ac955ed825cca9c9b645389e6c5bce9f2c4ceeaadb1a5ccd29cd762bee4e421

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\z39739129.exe
    Filesize

    1.0MB

    MD5

    efd9b1c7975bc7491ce75de32975d7ed

    SHA1

    8514288b134169f8ccbe8d6d39f577fb99da2be3

    SHA256

    32b8da0dddccf37a2360f859e4a8cdf3a5b9405412819fb6374c36a75b4dc35e

    SHA512

    f1cd1c852c0d93b59a133b9a3b6efc5d46ab1a2a6d68244c3866a9d4bb83b4c19ac955ed825cca9c9b645389e6c5bce9f2c4ceeaadb1a5ccd29cd762bee4e421

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\z41836049.exe
    Filesize

    764KB

    MD5

    c4bd3c6b808b5dbfede5a0a9881878ab

    SHA1

    8e716c01ddb6f8ed17e21c0fe8db279cf9e0c66c

    SHA256

    684c6af080124e841b27b28dc2b6ed628fd1be63adf1a88b31054a33b2967743

    SHA512

    8b7f067fd09be91be3699f7c946595de848969a442ca33389224c6076aca4d42fb2a2e94e34cce7e9d43761c85dda259d75db9ac43c26769cb5c9176255696a0

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\z41836049.exe
    Filesize

    764KB

    MD5

    c4bd3c6b808b5dbfede5a0a9881878ab

    SHA1

    8e716c01ddb6f8ed17e21c0fe8db279cf9e0c66c

    SHA256

    684c6af080124e841b27b28dc2b6ed628fd1be63adf1a88b31054a33b2967743

    SHA512

    8b7f067fd09be91be3699f7c946595de848969a442ca33389224c6076aca4d42fb2a2e94e34cce7e9d43761c85dda259d75db9ac43c26769cb5c9176255696a0

  • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\z33335380.exe
    Filesize

    581KB

    MD5

    509abe7f7d2a406e26f1b3a059a9153a

    SHA1

    624ed5e67367a8db5b6f01e6debe0da97fe08257

    SHA256

    88e93816db25b2c4955dc92f1528d6faf8c3d04a1d0c5dc68d27f3b04e43daa0

    SHA512

    691e8334256cf8b42fcedb2c360a795ae061e6ea820a068a9324cafb4f04a7f7205f08be4e50afd4f959f4a751871435baf1bfd95a9a7eac077ef107939b9623

  • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\z33335380.exe
    Filesize

    581KB

    MD5

    509abe7f7d2a406e26f1b3a059a9153a

    SHA1

    624ed5e67367a8db5b6f01e6debe0da97fe08257

    SHA256

    88e93816db25b2c4955dc92f1528d6faf8c3d04a1d0c5dc68d27f3b04e43daa0

    SHA512

    691e8334256cf8b42fcedb2c360a795ae061e6ea820a068a9324cafb4f04a7f7205f08be4e50afd4f959f4a751871435baf1bfd95a9a7eac077ef107939b9623

  • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\s69671186.exe
    Filesize

    582KB

    MD5

    83324ec99eb7c6f0523fdf097a6e7ad7

    SHA1

    f1d6feb3f220ec69a14b265da021d968a9083d61

    SHA256

    6af01d4be3b3270b3d11e175309288e7fbdb12db4fb2d8f1ef100cfd61a777d6

    SHA512

    ffd513e1518df107b45f52769d6ef8c55c6c90742c57adfffb6207458e99785066f8bfd35094b8c258ecf71b86835ce2d8315b997a608f70476b0cf7cf20e7d4

  • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\s69671186.exe
    Filesize

    582KB

    MD5

    83324ec99eb7c6f0523fdf097a6e7ad7

    SHA1

    f1d6feb3f220ec69a14b265da021d968a9083d61

    SHA256

    6af01d4be3b3270b3d11e175309288e7fbdb12db4fb2d8f1ef100cfd61a777d6

    SHA512

    ffd513e1518df107b45f52769d6ef8c55c6c90742c57adfffb6207458e99785066f8bfd35094b8c258ecf71b86835ce2d8315b997a608f70476b0cf7cf20e7d4

  • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\s69671186.exe
    Filesize

    582KB

    MD5

    83324ec99eb7c6f0523fdf097a6e7ad7

    SHA1

    f1d6feb3f220ec69a14b265da021d968a9083d61

    SHA256

    6af01d4be3b3270b3d11e175309288e7fbdb12db4fb2d8f1ef100cfd61a777d6

    SHA512

    ffd513e1518df107b45f52769d6ef8c55c6c90742c57adfffb6207458e99785066f8bfd35094b8c258ecf71b86835ce2d8315b997a608f70476b0cf7cf20e7d4

  • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\t71629403.exe
    Filesize

    169KB

    MD5

    0f471d78632d22fa173eef2e9fc30770

    SHA1

    256db7496f80290c1fec79a04b7bc8896be08f21

    SHA256

    f6cb2745d0321b6fac9a5c22b5b7968f81bd845db27c200d6573934d42de6ac1

    SHA512

    0f9315b331ba1d9317a18d28abf5f6d31966feac4101d5a493e670e4f73a2e856a97a38d48d999e8d7faccde4d1ab444e5cec203904d4c34e116045a43e8d8c5

  • C:\Windows\Temp\1.exe
    Filesize

    168KB

    MD5

    f16fb63d4e551d3808e8f01f2671b57e

    SHA1

    781153ad6235a1152da112de1fb39a6f2d063575

    SHA256

    8a34627d2a802a7222661926a21bfe7e05835d8dca23459a50c62ccac4619581

    SHA512

    fad96ade34ff0637238ebf22941dcf21d9ddbe41e10b04d32a904c6018e0c9914345fc86e0ef8c27b95e3813eb60af233b2e47a585c150b9d1c14d48906f78cf

  • C:\Windows\Temp\1.exe
    Filesize

    168KB

    MD5

    f16fb63d4e551d3808e8f01f2671b57e

    SHA1

    781153ad6235a1152da112de1fb39a6f2d063575

    SHA256

    8a34627d2a802a7222661926a21bfe7e05835d8dca23459a50c62ccac4619581

    SHA512

    fad96ade34ff0637238ebf22941dcf21d9ddbe41e10b04d32a904c6018e0c9914345fc86e0ef8c27b95e3813eb60af233b2e47a585c150b9d1c14d48906f78cf

  • \Users\Admin\AppData\Local\Temp\IXP000.TMP\z39739129.exe
    Filesize

    1.0MB

    MD5

    efd9b1c7975bc7491ce75de32975d7ed

    SHA1

    8514288b134169f8ccbe8d6d39f577fb99da2be3

    SHA256

    32b8da0dddccf37a2360f859e4a8cdf3a5b9405412819fb6374c36a75b4dc35e

    SHA512

    f1cd1c852c0d93b59a133b9a3b6efc5d46ab1a2a6d68244c3866a9d4bb83b4c19ac955ed825cca9c9b645389e6c5bce9f2c4ceeaadb1a5ccd29cd762bee4e421

  • \Users\Admin\AppData\Local\Temp\IXP000.TMP\z39739129.exe
    Filesize

    1.0MB

    MD5

    efd9b1c7975bc7491ce75de32975d7ed

    SHA1

    8514288b134169f8ccbe8d6d39f577fb99da2be3

    SHA256

    32b8da0dddccf37a2360f859e4a8cdf3a5b9405412819fb6374c36a75b4dc35e

    SHA512

    f1cd1c852c0d93b59a133b9a3b6efc5d46ab1a2a6d68244c3866a9d4bb83b4c19ac955ed825cca9c9b645389e6c5bce9f2c4ceeaadb1a5ccd29cd762bee4e421

  • \Users\Admin\AppData\Local\Temp\IXP001.TMP\z41836049.exe
    Filesize

    764KB

    MD5

    c4bd3c6b808b5dbfede5a0a9881878ab

    SHA1

    8e716c01ddb6f8ed17e21c0fe8db279cf9e0c66c

    SHA256

    684c6af080124e841b27b28dc2b6ed628fd1be63adf1a88b31054a33b2967743

    SHA512

    8b7f067fd09be91be3699f7c946595de848969a442ca33389224c6076aca4d42fb2a2e94e34cce7e9d43761c85dda259d75db9ac43c26769cb5c9176255696a0

  • \Users\Admin\AppData\Local\Temp\IXP001.TMP\z41836049.exe
    Filesize

    764KB

    MD5

    c4bd3c6b808b5dbfede5a0a9881878ab

    SHA1

    8e716c01ddb6f8ed17e21c0fe8db279cf9e0c66c

    SHA256

    684c6af080124e841b27b28dc2b6ed628fd1be63adf1a88b31054a33b2967743

    SHA512

    8b7f067fd09be91be3699f7c946595de848969a442ca33389224c6076aca4d42fb2a2e94e34cce7e9d43761c85dda259d75db9ac43c26769cb5c9176255696a0

  • \Users\Admin\AppData\Local\Temp\IXP002.TMP\z33335380.exe
    Filesize

    581KB

    MD5

    509abe7f7d2a406e26f1b3a059a9153a

    SHA1

    624ed5e67367a8db5b6f01e6debe0da97fe08257

    SHA256

    88e93816db25b2c4955dc92f1528d6faf8c3d04a1d0c5dc68d27f3b04e43daa0

    SHA512

    691e8334256cf8b42fcedb2c360a795ae061e6ea820a068a9324cafb4f04a7f7205f08be4e50afd4f959f4a751871435baf1bfd95a9a7eac077ef107939b9623

  • \Users\Admin\AppData\Local\Temp\IXP002.TMP\z33335380.exe
    Filesize

    581KB

    MD5

    509abe7f7d2a406e26f1b3a059a9153a

    SHA1

    624ed5e67367a8db5b6f01e6debe0da97fe08257

    SHA256

    88e93816db25b2c4955dc92f1528d6faf8c3d04a1d0c5dc68d27f3b04e43daa0

    SHA512

    691e8334256cf8b42fcedb2c360a795ae061e6ea820a068a9324cafb4f04a7f7205f08be4e50afd4f959f4a751871435baf1bfd95a9a7eac077ef107939b9623

  • \Users\Admin\AppData\Local\Temp\IXP003.TMP\s69671186.exe
    Filesize

    582KB

    MD5

    83324ec99eb7c6f0523fdf097a6e7ad7

    SHA1

    f1d6feb3f220ec69a14b265da021d968a9083d61

    SHA256

    6af01d4be3b3270b3d11e175309288e7fbdb12db4fb2d8f1ef100cfd61a777d6

    SHA512

    ffd513e1518df107b45f52769d6ef8c55c6c90742c57adfffb6207458e99785066f8bfd35094b8c258ecf71b86835ce2d8315b997a608f70476b0cf7cf20e7d4

  • \Users\Admin\AppData\Local\Temp\IXP003.TMP\s69671186.exe
    Filesize

    582KB

    MD5

    83324ec99eb7c6f0523fdf097a6e7ad7

    SHA1

    f1d6feb3f220ec69a14b265da021d968a9083d61

    SHA256

    6af01d4be3b3270b3d11e175309288e7fbdb12db4fb2d8f1ef100cfd61a777d6

    SHA512

    ffd513e1518df107b45f52769d6ef8c55c6c90742c57adfffb6207458e99785066f8bfd35094b8c258ecf71b86835ce2d8315b997a608f70476b0cf7cf20e7d4

  • \Users\Admin\AppData\Local\Temp\IXP003.TMP\s69671186.exe
    Filesize

    582KB

    MD5

    83324ec99eb7c6f0523fdf097a6e7ad7

    SHA1

    f1d6feb3f220ec69a14b265da021d968a9083d61

    SHA256

    6af01d4be3b3270b3d11e175309288e7fbdb12db4fb2d8f1ef100cfd61a777d6

    SHA512

    ffd513e1518df107b45f52769d6ef8c55c6c90742c57adfffb6207458e99785066f8bfd35094b8c258ecf71b86835ce2d8315b997a608f70476b0cf7cf20e7d4

  • \Users\Admin\AppData\Local\Temp\IXP003.TMP\t71629403.exe
    Filesize

    169KB

    MD5

    0f471d78632d22fa173eef2e9fc30770

    SHA1

    256db7496f80290c1fec79a04b7bc8896be08f21

    SHA256

    f6cb2745d0321b6fac9a5c22b5b7968f81bd845db27c200d6573934d42de6ac1

    SHA512

    0f9315b331ba1d9317a18d28abf5f6d31966feac4101d5a493e670e4f73a2e856a97a38d48d999e8d7faccde4d1ab444e5cec203904d4c34e116045a43e8d8c5

  • \Users\Admin\AppData\Local\Temp\IXP003.TMP\t71629403.exe
    Filesize

    169KB

    MD5

    0f471d78632d22fa173eef2e9fc30770

    SHA1

    256db7496f80290c1fec79a04b7bc8896be08f21

    SHA256

    f6cb2745d0321b6fac9a5c22b5b7968f81bd845db27c200d6573934d42de6ac1

    SHA512

    0f9315b331ba1d9317a18d28abf5f6d31966feac4101d5a493e670e4f73a2e856a97a38d48d999e8d7faccde4d1ab444e5cec203904d4c34e116045a43e8d8c5

  • \Windows\Temp\1.exe
    Filesize

    168KB

    MD5

    f16fb63d4e551d3808e8f01f2671b57e

    SHA1

    781153ad6235a1152da112de1fb39a6f2d063575

    SHA256

    8a34627d2a802a7222661926a21bfe7e05835d8dca23459a50c62ccac4619581

    SHA512

    fad96ade34ff0637238ebf22941dcf21d9ddbe41e10b04d32a904c6018e0c9914345fc86e0ef8c27b95e3813eb60af233b2e47a585c150b9d1c14d48906f78cf

  • \Windows\Temp\1.exe
    Filesize

    168KB

    MD5

    f16fb63d4e551d3808e8f01f2671b57e

    SHA1

    781153ad6235a1152da112de1fb39a6f2d063575

    SHA256

    8a34627d2a802a7222661926a21bfe7e05835d8dca23459a50c62ccac4619581

    SHA512

    fad96ade34ff0637238ebf22941dcf21d9ddbe41e10b04d32a904c6018e0c9914345fc86e0ef8c27b95e3813eb60af233b2e47a585c150b9d1c14d48906f78cf

  • memory/432-2265-0x00000000004E0000-0x00000000004E6000-memory.dmp
    Filesize

    24KB

  • memory/432-2260-0x0000000001300000-0x000000000132E000-memory.dmp
    Filesize

    184KB

  • memory/432-2267-0x0000000004B70000-0x0000000004BB0000-memory.dmp
    Filesize

    256KB

  • memory/432-2270-0x0000000004B70000-0x0000000004BB0000-memory.dmp
    Filesize

    256KB

  • memory/1740-125-0x0000000002670000-0x00000000026D0000-memory.dmp
    Filesize

    384KB

  • memory/1740-152-0x0000000002670000-0x00000000026D0000-memory.dmp
    Filesize

    384KB

  • memory/1740-117-0x0000000002670000-0x00000000026D0000-memory.dmp
    Filesize

    384KB

  • memory/1740-121-0x0000000002670000-0x00000000026D0000-memory.dmp
    Filesize

    384KB

  • memory/1740-123-0x0000000002670000-0x00000000026D0000-memory.dmp
    Filesize

    384KB

  • memory/1740-115-0x0000000002670000-0x00000000026D0000-memory.dmp
    Filesize

    384KB

  • memory/1740-127-0x0000000002670000-0x00000000026D0000-memory.dmp
    Filesize

    384KB

  • memory/1740-129-0x0000000002670000-0x00000000026D0000-memory.dmp
    Filesize

    384KB

  • memory/1740-135-0x0000000002670000-0x00000000026D0000-memory.dmp
    Filesize

    384KB

  • memory/1740-137-0x0000000002670000-0x00000000026D0000-memory.dmp
    Filesize

    384KB

  • memory/1740-133-0x0000000002670000-0x00000000026D0000-memory.dmp
    Filesize

    384KB

  • memory/1740-131-0x0000000002670000-0x00000000026D0000-memory.dmp
    Filesize

    384KB

  • memory/1740-139-0x0000000002670000-0x00000000026D0000-memory.dmp
    Filesize

    384KB

  • memory/1740-141-0x0000000002670000-0x00000000026D0000-memory.dmp
    Filesize

    384KB

  • memory/1740-143-0x0000000002670000-0x00000000026D0000-memory.dmp
    Filesize

    384KB

  • memory/1740-149-0x0000000002670000-0x00000000026D0000-memory.dmp
    Filesize

    384KB

  • memory/1740-147-0x0000000002670000-0x00000000026D0000-memory.dmp
    Filesize

    384KB

  • memory/1740-145-0x0000000002670000-0x00000000026D0000-memory.dmp
    Filesize

    384KB

  • memory/1740-151-0x0000000004FC0000-0x0000000005000000-memory.dmp
    Filesize

    256KB

  • memory/1740-119-0x0000000002670000-0x00000000026D0000-memory.dmp
    Filesize

    384KB

  • memory/1740-154-0x0000000002670000-0x00000000026D0000-memory.dmp
    Filesize

    384KB

  • memory/1740-158-0x0000000002670000-0x00000000026D0000-memory.dmp
    Filesize

    384KB

  • memory/1740-156-0x0000000002670000-0x00000000026D0000-memory.dmp
    Filesize

    384KB

  • memory/1740-160-0x0000000002670000-0x00000000026D0000-memory.dmp
    Filesize

    384KB

  • memory/1740-162-0x0000000002670000-0x00000000026D0000-memory.dmp
    Filesize

    384KB

  • memory/1740-164-0x0000000002670000-0x00000000026D0000-memory.dmp
    Filesize

    384KB

  • memory/1740-166-0x0000000002670000-0x00000000026D0000-memory.dmp
    Filesize

    384KB

  • memory/1740-2250-0x0000000000FA0000-0x0000000000FD2000-memory.dmp
    Filesize

    200KB

  • memory/1740-113-0x0000000002670000-0x00000000026D0000-memory.dmp
    Filesize

    384KB

  • memory/1740-111-0x0000000002670000-0x00000000026D0000-memory.dmp
    Filesize

    384KB

  • memory/1740-109-0x0000000002670000-0x00000000026D0000-memory.dmp
    Filesize

    384KB

  • memory/1740-107-0x0000000002670000-0x00000000026D0000-memory.dmp
    Filesize

    384KB

  • memory/1740-105-0x0000000002670000-0x00000000026D0000-memory.dmp
    Filesize

    384KB

  • memory/1740-103-0x0000000002670000-0x00000000026D0000-memory.dmp
    Filesize

    384KB

  • memory/1740-102-0x0000000002670000-0x00000000026D0000-memory.dmp
    Filesize

    384KB

  • memory/1740-101-0x0000000002670000-0x00000000026D6000-memory.dmp
    Filesize

    408KB

  • memory/1740-100-0x0000000004FC0000-0x0000000005000000-memory.dmp
    Filesize

    256KB

  • memory/1740-99-0x0000000000280000-0x00000000002DB000-memory.dmp
    Filesize

    364KB

  • memory/1740-98-0x00000000025A0000-0x0000000002608000-memory.dmp
    Filesize

    416KB