Analysis

  • max time kernel
    113s
  • max time network
    143s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20230220-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system
  • submitted
    08/06/2023, 14:19

General

  • Target

    199e65b5e178ee568748d0af728ff66ce60d92d3eff37cd1d5152122cff5a12c.exe

  • Size

    601KB

  • MD5

    1488beba469b4c235563896ddaaad389

  • SHA1

    83a21432250568d63a64b709478c3e3da11dcae5

  • SHA256

    199e65b5e178ee568748d0af728ff66ce60d92d3eff37cd1d5152122cff5a12c

  • SHA512

    c7cd4ebe6c19eb9c6e4e341814b53c744d009a1a8cd81c126d510c1f876b8942726b566cae00a5e1a4f9336fa18534b74b6c4ffe699f912c172194212b4d4b87

  • SSDEEP

    12288:lMrpy90os5dWMT3FucEQ/al7j+AHoQN3W1Epy89Xz6:YygBhRHAHoUTpl1z6

Malware Config

Extracted

Family

redline

Botnet

diza

C2

83.97.73.129:19068

Attributes
  • auth_value

    0d09b419c8bc967f91c68be4a17e92ee

Extracted

Family

redline

Botnet

sheron

C2

83.97.73.129:19068

Attributes
  • auth_value

    2d067e7e2372227d3a03b335260112e9

Signatures

  • Modifies Windows Defender Real-time Protection settings 3 TTPs 6 IoCs
  • RedLine

    RedLine Stealer is a malware family written in C#, first appearing in early 2020.

  • RedLine payload 3 IoCs
  • Checks computer location settings 2 TTPs 2 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Executes dropped EXE 9 IoCs
  • Loads dropped DLL 1 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Windows security modification 2 TTPs 1 IoCs
  • Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
  • Adds Run key to start application 2 TTPs 6 IoCs
  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Suspicious use of SetThreadContext 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Program crash 1 IoCs
  • Creates scheduled task(s) 1 TTPs 1 IoCs

    Schtasks is often used by malware for persistence or to perform post-infection execution.

  • Suspicious behavior: EnumeratesProcesses 6 IoCs
  • Suspicious use of AdjustPrivilegeToken 3 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of WriteProcessMemory 52 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\199e65b5e178ee568748d0af728ff66ce60d92d3eff37cd1d5152122cff5a12c.exe
    "C:\Users\Admin\AppData\Local\Temp\199e65b5e178ee568748d0af728ff66ce60d92d3eff37cd1d5152122cff5a12c.exe"
    1⤵
    • Adds Run key to start application
    • Suspicious use of WriteProcessMemory
    PID:4284
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\x1043452.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\x1043452.exe
      2⤵
      • Executes dropped EXE
      • Adds Run key to start application
      • Suspicious use of WriteProcessMemory
      PID:3216
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\x6985825.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\x6985825.exe
        3⤵
        • Executes dropped EXE
        • Adds Run key to start application
        • Suspicious use of WriteProcessMemory
        PID:3964
        • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\f9807988.exe
          C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\f9807988.exe
          4⤵
          • Executes dropped EXE
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of AdjustPrivilegeToken
          PID:2088
        • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\g5692524.exe
          C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\g5692524.exe
          4⤵
          • Modifies Windows Defender Real-time Protection settings
          • Executes dropped EXE
          • Windows security modification
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of AdjustPrivilegeToken
          PID:4652
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\h5294637.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\h5294637.exe
        3⤵
        • Checks computer location settings
        • Executes dropped EXE
        • Suspicious use of FindShellTrayWindow
        • Suspicious use of WriteProcessMemory
        PID:2012
        • C:\Users\Admin\AppData\Local\Temp\a9e2a16078\lamod.exe
          "C:\Users\Admin\AppData\Local\Temp\a9e2a16078\lamod.exe"
          4⤵
          • Checks computer location settings
          • Executes dropped EXE
          • Suspicious use of WriteProcessMemory
          PID:4076
          • C:\Windows\SysWOW64\schtasks.exe
            "C:\Windows\System32\schtasks.exe" /Create /SC MINUTE /MO 1 /TN lamod.exe /TR "C:\Users\Admin\AppData\Local\Temp\a9e2a16078\lamod.exe" /F
            5⤵
            • Creates scheduled task(s)
            PID:3144
          • C:\Windows\SysWOW64\cmd.exe
            "C:\Windows\System32\cmd.exe" /k echo Y|CACLS "lamod.exe" /P "Admin:N"&&CACLS "lamod.exe" /P "Admin:R" /E&&echo Y|CACLS "..\a9e2a16078" /P "Admin:N"&&CACLS "..\a9e2a16078" /P "Admin:R" /E&&Exit
            5⤵
            • Suspicious use of WriteProcessMemory
            PID:4412
            • C:\Windows\SysWOW64\cmd.exe
              C:\Windows\system32\cmd.exe /S /D /c" echo Y"
              6⤵
                PID:460
              • C:\Windows\SysWOW64\cacls.exe
                CACLS "lamod.exe" /P "Admin:N"
                6⤵
                  PID:4820
                • C:\Windows\SysWOW64\cacls.exe
                  CACLS "lamod.exe" /P "Admin:R" /E
                  6⤵
                    PID:4900
                  • C:\Windows\SysWOW64\cmd.exe
                    C:\Windows\system32\cmd.exe /S /D /c" echo Y"
                    6⤵
                      PID:4400
                    • C:\Windows\SysWOW64\cacls.exe
                      CACLS "..\a9e2a16078" /P "Admin:N"
                      6⤵
                        PID:5004
                      • C:\Windows\SysWOW64\cacls.exe
                        CACLS "..\a9e2a16078" /P "Admin:R" /E
                        6⤵
                          PID:2204
                      • C:\Windows\SysWOW64\rundll32.exe
                        "C:\Windows\System32\rundll32.exe" C:\Users\Admin\AppData\Roaming\006700e5a2ab05\clip64.dll, Main
                        5⤵
                        • Loads dropped DLL
                        PID:4012
                • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\i4411557.exe
                  C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\i4411557.exe
                  2⤵
                  • Executes dropped EXE
                  • Suspicious use of SetThreadContext
                  • Suspicious use of WriteProcessMemory
                  PID:384
                  • C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe
                    "C:\\Windows\\Microsoft.NET\\Framework\\v4.0.30319\\AppLaunch.exe"
                    3⤵
                    • Suspicious behavior: EnumeratesProcesses
                    • Suspicious use of AdjustPrivilegeToken
                    PID:1248
                  • C:\Windows\SysWOW64\WerFault.exe
                    C:\Windows\SysWOW64\WerFault.exe -u -p 384 -s 156
                    3⤵
                    • Program crash
                    PID:1596
              • C:\Windows\SysWOW64\WerFault.exe
                C:\Windows\SysWOW64\WerFault.exe -pss -s 432 -p 384 -ip 384
                1⤵
                  PID:4632
                • C:\Users\Admin\AppData\Local\Temp\a9e2a16078\lamod.exe
                  C:\Users\Admin\AppData\Local\Temp\a9e2a16078\lamod.exe
                  1⤵
                  • Executes dropped EXE
                  PID:3416
                • C:\Users\Admin\AppData\Local\Temp\a9e2a16078\lamod.exe
                  C:\Users\Admin\AppData\Local\Temp\a9e2a16078\lamod.exe
                  1⤵
                  • Executes dropped EXE
                  PID:1928

                Network

                      MITRE ATT&CK Enterprise v6

                      Replay Monitor

                      Loading Replay Monitor...

                      Downloads

                      • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\i4411557.exe

                        Filesize

                        308KB

                        MD5

                        497f19e7672a9e33f2346bfb25260e45

                        SHA1

                        320046eda5b49e560d7684b10014f435f9027c0d

                        SHA256

                        f13fda45f6f9f1ad4cd406fadfc2d6be8fc73ec88f07b6fb01a771d6e761df45

                        SHA512

                        4ff76bfc771000b92f6147ec8345621ef158697c691ad5c17ebc5855540f5de5795cce2834e7244739f4c6119ce05028b026bdc38d434ff90614eb1ce4d77959

                      • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\i4411557.exe

                        Filesize

                        308KB

                        MD5

                        497f19e7672a9e33f2346bfb25260e45

                        SHA1

                        320046eda5b49e560d7684b10014f435f9027c0d

                        SHA256

                        f13fda45f6f9f1ad4cd406fadfc2d6be8fc73ec88f07b6fb01a771d6e761df45

                        SHA512

                        4ff76bfc771000b92f6147ec8345621ef158697c691ad5c17ebc5855540f5de5795cce2834e7244739f4c6119ce05028b026bdc38d434ff90614eb1ce4d77959

                      • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\x1043452.exe

                        Filesize

                        378KB

                        MD5

                        8b00a3acaa60dddf62661cbce96cdd0c

                        SHA1

                        9eafe64307761483425753807859236d3460f7d9

                        SHA256

                        b720e277cc7a99d566ca25c5f7cb0e0ef41adb5b75f6640cb05b56457e0ae93c

                        SHA512

                        304c21d839f4327eb593c5cc2fbec7f917f1bd50da5727f6aaa705ba6faf65b801ca9883ae2b8ef6a1b6fb6fe4bf2a39216213bf6d23a247a2af0e32fee998f0

                      • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\x1043452.exe

                        Filesize

                        378KB

                        MD5

                        8b00a3acaa60dddf62661cbce96cdd0c

                        SHA1

                        9eafe64307761483425753807859236d3460f7d9

                        SHA256

                        b720e277cc7a99d566ca25c5f7cb0e0ef41adb5b75f6640cb05b56457e0ae93c

                        SHA512

                        304c21d839f4327eb593c5cc2fbec7f917f1bd50da5727f6aaa705ba6faf65b801ca9883ae2b8ef6a1b6fb6fe4bf2a39216213bf6d23a247a2af0e32fee998f0

                      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\h5294637.exe

                        Filesize

                        208KB

                        MD5

                        b1097ab078db20d88257abbd7e57a775

                        SHA1

                        c220cdeed77b2ad2309bef35a85f6758123606e0

                        SHA256

                        a8de03a1c871faf70f94d7010d7b42befe288a1c97fabcd6c3f92b770d3a59da

                        SHA512

                        444652118ba4e61eda8c522a24027b06be0162020089c05b8a7aef0b08657e9d504b7f76406843eba907fef01e0fc61fafcd19c00ce0e5e8775ca4b17ffad073

                      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\h5294637.exe

                        Filesize

                        208KB

                        MD5

                        b1097ab078db20d88257abbd7e57a775

                        SHA1

                        c220cdeed77b2ad2309bef35a85f6758123606e0

                        SHA256

                        a8de03a1c871faf70f94d7010d7b42befe288a1c97fabcd6c3f92b770d3a59da

                        SHA512

                        444652118ba4e61eda8c522a24027b06be0162020089c05b8a7aef0b08657e9d504b7f76406843eba907fef01e0fc61fafcd19c00ce0e5e8775ca4b17ffad073

                      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\x6985825.exe

                        Filesize

                        206KB

                        MD5

                        d2bf20051cc8dd7ce11fd1e4aba7f332

                        SHA1

                        a2af88d9010cbbddcc33718a1f218bf11d875c26

                        SHA256

                        b0fa12e935484054fce60a886c2fa93756a39fd8d361dca28f8ffa3660e82c6d

                        SHA512

                        220eddc3110a6581491e96a7aea00f0e5d0d6dc28797d5777f93fbe2b5e25ae6b1c4e3a6b3d550c2c5d154d3489896f9512d7e5f14a3f3f815880fc8225a20ee

                      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\x6985825.exe

                        Filesize

                        206KB

                        MD5

                        d2bf20051cc8dd7ce11fd1e4aba7f332

                        SHA1

                        a2af88d9010cbbddcc33718a1f218bf11d875c26

                        SHA256

                        b0fa12e935484054fce60a886c2fa93756a39fd8d361dca28f8ffa3660e82c6d

                        SHA512

                        220eddc3110a6581491e96a7aea00f0e5d0d6dc28797d5777f93fbe2b5e25ae6b1c4e3a6b3d550c2c5d154d3489896f9512d7e5f14a3f3f815880fc8225a20ee

                      • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\f9807988.exe

                        Filesize

                        173KB

                        MD5

                        06cb497cc61550092739ff6bd6553154

                        SHA1

                        f9edef0cc96c65dd6dcee349130bd36bcf445c96

                        SHA256

                        c21956bbc074a91edda57349e06cdb086b7b7e904c6b5d546ecb1df2ec358c80

                        SHA512

                        673d4187db37de642496bf1b2a3bb8a7a66dd7b68c971426dc6be2acd2cbd8fc19499e1e5d0d9456839b1cf534abd2554a17590e6ea2ddce47fc6a7075979f4e

                      • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\f9807988.exe

                        Filesize

                        173KB

                        MD5

                        06cb497cc61550092739ff6bd6553154

                        SHA1

                        f9edef0cc96c65dd6dcee349130bd36bcf445c96

                        SHA256

                        c21956bbc074a91edda57349e06cdb086b7b7e904c6b5d546ecb1df2ec358c80

                        SHA512

                        673d4187db37de642496bf1b2a3bb8a7a66dd7b68c971426dc6be2acd2cbd8fc19499e1e5d0d9456839b1cf534abd2554a17590e6ea2ddce47fc6a7075979f4e

                      • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\g5692524.exe

                        Filesize

                        14KB

                        MD5

                        ee1cdee4d496014d26fe9584e23fc276

                        SHA1

                        2213f6ec2b6624839c97ac8a55e5ff76bb9177bc

                        SHA256

                        4d46c9df365a9e0a5752604fe95b3162c1a372a3860503d4d1921938627c31be

                        SHA512

                        09aff0cb3dfeb94124cad984c73b6141451a10456c91a0a7d042ef26a9e25a29ab77693af8d4cf081097d694d514c62657f40e1abfc0956a7f3efceae03b102d

                      • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\g5692524.exe

                        Filesize

                        14KB

                        MD5

                        ee1cdee4d496014d26fe9584e23fc276

                        SHA1

                        2213f6ec2b6624839c97ac8a55e5ff76bb9177bc

                        SHA256

                        4d46c9df365a9e0a5752604fe95b3162c1a372a3860503d4d1921938627c31be

                        SHA512

                        09aff0cb3dfeb94124cad984c73b6141451a10456c91a0a7d042ef26a9e25a29ab77693af8d4cf081097d694d514c62657f40e1abfc0956a7f3efceae03b102d

                      • C:\Users\Admin\AppData\Local\Temp\a9e2a16078\lamod.exe

                        Filesize

                        208KB

                        MD5

                        b1097ab078db20d88257abbd7e57a775

                        SHA1

                        c220cdeed77b2ad2309bef35a85f6758123606e0

                        SHA256

                        a8de03a1c871faf70f94d7010d7b42befe288a1c97fabcd6c3f92b770d3a59da

                        SHA512

                        444652118ba4e61eda8c522a24027b06be0162020089c05b8a7aef0b08657e9d504b7f76406843eba907fef01e0fc61fafcd19c00ce0e5e8775ca4b17ffad073

                      • C:\Users\Admin\AppData\Local\Temp\a9e2a16078\lamod.exe

                        Filesize

                        208KB

                        MD5

                        b1097ab078db20d88257abbd7e57a775

                        SHA1

                        c220cdeed77b2ad2309bef35a85f6758123606e0

                        SHA256

                        a8de03a1c871faf70f94d7010d7b42befe288a1c97fabcd6c3f92b770d3a59da

                        SHA512

                        444652118ba4e61eda8c522a24027b06be0162020089c05b8a7aef0b08657e9d504b7f76406843eba907fef01e0fc61fafcd19c00ce0e5e8775ca4b17ffad073

                      • C:\Users\Admin\AppData\Local\Temp\a9e2a16078\lamod.exe

                        Filesize

                        208KB

                        MD5

                        b1097ab078db20d88257abbd7e57a775

                        SHA1

                        c220cdeed77b2ad2309bef35a85f6758123606e0

                        SHA256

                        a8de03a1c871faf70f94d7010d7b42befe288a1c97fabcd6c3f92b770d3a59da

                        SHA512

                        444652118ba4e61eda8c522a24027b06be0162020089c05b8a7aef0b08657e9d504b7f76406843eba907fef01e0fc61fafcd19c00ce0e5e8775ca4b17ffad073

                      • C:\Users\Admin\AppData\Local\Temp\a9e2a16078\lamod.exe

                        Filesize

                        208KB

                        MD5

                        b1097ab078db20d88257abbd7e57a775

                        SHA1

                        c220cdeed77b2ad2309bef35a85f6758123606e0

                        SHA256

                        a8de03a1c871faf70f94d7010d7b42befe288a1c97fabcd6c3f92b770d3a59da

                        SHA512

                        444652118ba4e61eda8c522a24027b06be0162020089c05b8a7aef0b08657e9d504b7f76406843eba907fef01e0fc61fafcd19c00ce0e5e8775ca4b17ffad073

                      • C:\Users\Admin\AppData\Local\Temp\a9e2a16078\lamod.exe

                        Filesize

                        208KB

                        MD5

                        b1097ab078db20d88257abbd7e57a775

                        SHA1

                        c220cdeed77b2ad2309bef35a85f6758123606e0

                        SHA256

                        a8de03a1c871faf70f94d7010d7b42befe288a1c97fabcd6c3f92b770d3a59da

                        SHA512

                        444652118ba4e61eda8c522a24027b06be0162020089c05b8a7aef0b08657e9d504b7f76406843eba907fef01e0fc61fafcd19c00ce0e5e8775ca4b17ffad073

                      • C:\Users\Admin\AppData\Roaming\006700e5a2ab05\clip64.dll

                        Filesize

                        89KB

                        MD5

                        a5ed103ec4719a27ab3d3c01dac66f01

                        SHA1

                        c830d6980d7edea60568a518eccd36c0bc2a4924

                        SHA256

                        dbcdc009781edffc3c4e5234d3d23d26364d6bff47e2e384cffdef148d7b5b36

                        SHA512

                        b7fbe709a44f0e84a94c9e82f790d04e3d86b5409b5eb2d9f1d4d775b9669694c189042f04001acadb6da4c6284f4fbcbe39fd97427d41619191928510db9d80

                      • C:\Users\Admin\AppData\Roaming\006700e5a2ab05\clip64.dll

                        Filesize

                        89KB

                        MD5

                        a5ed103ec4719a27ab3d3c01dac66f01

                        SHA1

                        c830d6980d7edea60568a518eccd36c0bc2a4924

                        SHA256

                        dbcdc009781edffc3c4e5234d3d23d26364d6bff47e2e384cffdef148d7b5b36

                        SHA512

                        b7fbe709a44f0e84a94c9e82f790d04e3d86b5409b5eb2d9f1d4d775b9669694c189042f04001acadb6da4c6284f4fbcbe39fd97427d41619191928510db9d80

                      • C:\Users\Admin\AppData\Roaming\006700e5a2ab05\clip64.dll

                        Filesize

                        89KB

                        MD5

                        a5ed103ec4719a27ab3d3c01dac66f01

                        SHA1

                        c830d6980d7edea60568a518eccd36c0bc2a4924

                        SHA256

                        dbcdc009781edffc3c4e5234d3d23d26364d6bff47e2e384cffdef148d7b5b36

                        SHA512

                        b7fbe709a44f0e84a94c9e82f790d04e3d86b5409b5eb2d9f1d4d775b9669694c189042f04001acadb6da4c6284f4fbcbe39fd97427d41619191928510db9d80

                      • C:\Users\Admin\AppData\Roaming\006700e5a2ab05\cred64.dll

                        Filesize

                        162B

                        MD5

                        1b7c22a214949975556626d7217e9a39

                        SHA1

                        d01c97e2944166ed23e47e4a62ff471ab8fa031f

                        SHA256

                        340c8464c2007ce3f80682e15dfafa4180b641d53c14201b929906b7b0284d87

                        SHA512

                        ba64847cf1d4157d50abe4f4a1e5c1996fe387c5808e2f758c7fb3213bfefe1f3712d343f0c30a16819749840954654a70611d2250fd0f7b032429db7afd2cc5

                      • memory/1248-190-0x0000000000400000-0x0000000000430000-memory.dmp

                        Filesize

                        192KB

                      • memory/1248-195-0x0000000004F30000-0x0000000004F40000-memory.dmp

                        Filesize

                        64KB

                      • memory/2088-157-0x000000000A4F0000-0x000000000A502000-memory.dmp

                        Filesize

                        72KB

                      • memory/2088-162-0x000000000B600000-0x000000000BBA4000-memory.dmp

                        Filesize

                        5.6MB

                      • memory/2088-167-0x000000000C5D0000-0x000000000CAFC000-memory.dmp

                        Filesize

                        5.2MB

                      • memory/2088-166-0x000000000BED0000-0x000000000C092000-memory.dmp

                        Filesize

                        1.8MB

                      • memory/2088-165-0x000000000BCB0000-0x000000000BD00000-memory.dmp

                        Filesize

                        320KB

                      • memory/2088-164-0x0000000004F70000-0x0000000004F80000-memory.dmp

                        Filesize

                        64KB

                      • memory/2088-163-0x000000000B050000-0x000000000B0B6000-memory.dmp

                        Filesize

                        408KB

                      • memory/2088-154-0x0000000000630000-0x0000000000660000-memory.dmp

                        Filesize

                        192KB

                      • memory/2088-161-0x000000000A980000-0x000000000AA12000-memory.dmp

                        Filesize

                        584KB

                      • memory/2088-160-0x000000000A860000-0x000000000A8D6000-memory.dmp

                        Filesize

                        472KB

                      • memory/2088-159-0x000000000A550000-0x000000000A58C000-memory.dmp

                        Filesize

                        240KB

                      • memory/2088-158-0x0000000004F70000-0x0000000004F80000-memory.dmp

                        Filesize

                        64KB

                      • memory/2088-156-0x000000000A5B0000-0x000000000A6BA000-memory.dmp

                        Filesize

                        1.0MB

                      • memory/2088-155-0x000000000AA30000-0x000000000B048000-memory.dmp

                        Filesize

                        6.1MB

                      • memory/4652-172-0x00000000000A0000-0x00000000000AA000-memory.dmp

                        Filesize

                        40KB