Analysis

  • max time kernel
    150s
  • max time network
    146s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20230703-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20230703-enlocale:en-usos:windows10-2004-x64system
  • submitted
    01/08/2023, 17:39

General

  • Target

    05a8d4d241811455550293eab597e9fb6f12eaf9b00ed0c7e43cb6cd5f9e45fd.exe

  • Size

    641KB

  • MD5

    98638ec66a9406f8a12bb5c7cb78ba12

  • SHA1

    41afa7b4e7f1b9df49b23ad4147dcd5b9708993b

  • SHA256

    05a8d4d241811455550293eab597e9fb6f12eaf9b00ed0c7e43cb6cd5f9e45fd

  • SHA512

    8087be8c4d7194c893716e5b4b6b7d2082b8acb6eab6e6fcf150e0b23298c10348d2f654d50db0b4c61523fc41e21d3cdcaea1dcd9ee67d80d9d33da59638cf4

  • SSDEEP

    12288:FMrPy90xEWpwMurqZafoeztKloBVCYNffHS+q/gbbWfr5rwlH:aymEWporNf1ztKaTCglbKz5o

Malware Config

Extracted

Family

amadey

Version

3.86

C2

77.91.68.61/rock/index.php

Extracted

Family

smokeloader

Version

2022

C2

http://77.91.68.29/fks/

rc4.i32
rc4.i32

Extracted

Family

redline

Botnet

maxik

C2

77.91.124.156:19071

Attributes
  • auth_value

    a7714e1bc167c67e3fc8f9e368352269

Signatures

  • Amadey

    Amadey bot is a simple trojan bot primarily used for collecting reconnaissance information.

  • Detects Healer an antivirus disabler dropper 3 IoCs
  • Healer

    Healer an antivirus disabler dropper.

  • Modifies Windows Defender Real-time Protection settings 3 TTPs 6 IoCs
  • RedLine

    RedLine Stealer is a malware family written in C#, first appearing in early 2020.

  • SmokeLoader

    Modular backdoor trojan in use since 2014.

  • Executes dropped EXE 10 IoCs
  • Loads dropped DLL 1 IoCs
  • Windows security modification 2 TTPs 1 IoCs
  • Adds Run key to start application 2 TTPs 4 IoCs
  • Launches sc.exe 1 IoCs

    Sc.exe is a Windows utlilty to control services on the system.

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Creates scheduled task(s) 1 TTPs 1 IoCs

    Schtasks is often used by malware for persistence or to perform post-infection execution.

  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs
  • Suspicious behavior: MapViewOfSection 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of UnmapMainImage 1 IoCs
  • Suspicious use of WriteProcessMemory 50 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\05a8d4d241811455550293eab597e9fb6f12eaf9b00ed0c7e43cb6cd5f9e45fd.exe
    "C:\Users\Admin\AppData\Local\Temp\05a8d4d241811455550293eab597e9fb6f12eaf9b00ed0c7e43cb6cd5f9e45fd.exe"
    1⤵
    • Adds Run key to start application
    • Suspicious use of WriteProcessMemory
    PID:1916
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\v9048644.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\v9048644.exe
      2⤵
      • Executes dropped EXE
      • Adds Run key to start application
      • Suspicious use of WriteProcessMemory
      PID:964
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\v8695064.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\v8695064.exe
        3⤵
        • Executes dropped EXE
        • Adds Run key to start application
        • Suspicious use of WriteProcessMemory
        PID:3364
        • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\v3166900.exe
          C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\v3166900.exe
          4⤵
          • Executes dropped EXE
          • Adds Run key to start application
          • Suspicious use of WriteProcessMemory
          PID:3604
          • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\a6628464.exe
            C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\a6628464.exe
            5⤵
            • Modifies Windows Defender Real-time Protection settings
            • Executes dropped EXE
            • Windows security modification
            • Suspicious behavior: EnumeratesProcesses
            • Suspicious use of AdjustPrivilegeToken
            PID:3868
          • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\b1462230.exe
            C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\b1462230.exe
            5⤵
            • Executes dropped EXE
            • Suspicious use of FindShellTrayWindow
            • Suspicious use of WriteProcessMemory
            PID:3592
            • C:\Users\Admin\AppData\Local\Temp\925e7e99c5\pdates.exe
              "C:\Users\Admin\AppData\Local\Temp\925e7e99c5\pdates.exe"
              6⤵
              • Executes dropped EXE
              • Suspicious use of WriteProcessMemory
              PID:2100
              • C:\Windows\SysWOW64\schtasks.exe
                "C:\Windows\System32\schtasks.exe" /Create /SC MINUTE /MO 1 /TN pdates.exe /TR "C:\Users\Admin\AppData\Local\Temp\925e7e99c5\pdates.exe" /F
                7⤵
                • Creates scheduled task(s)
                PID:460
              • C:\Windows\SysWOW64\cmd.exe
                "C:\Windows\System32\cmd.exe" /k echo Y|CACLS "pdates.exe" /P "Admin:N"&&CACLS "pdates.exe" /P "Admin:R" /E&&echo Y|CACLS "..\925e7e99c5" /P "Admin:N"&&CACLS "..\925e7e99c5" /P "Admin:R" /E&&Exit
                7⤵
                • Suspicious use of WriteProcessMemory
                PID:4108
                • C:\Windows\SysWOW64\cmd.exe
                  C:\Windows\system32\cmd.exe /S /D /c" echo Y"
                  8⤵
                    PID:4780
                  • C:\Windows\SysWOW64\cacls.exe
                    CACLS "pdates.exe" /P "Admin:N"
                    8⤵
                      PID:1776
                    • C:\Windows\SysWOW64\cacls.exe
                      CACLS "pdates.exe" /P "Admin:R" /E
                      8⤵
                        PID:3432
                      • C:\Windows\SysWOW64\cmd.exe
                        C:\Windows\system32\cmd.exe /S /D /c" echo Y"
                        8⤵
                          PID:1876
                        • C:\Windows\SysWOW64\cacls.exe
                          CACLS "..\925e7e99c5" /P "Admin:N"
                          8⤵
                            PID:2152
                          • C:\Windows\SysWOW64\cacls.exe
                            CACLS "..\925e7e99c5" /P "Admin:R" /E
                            8⤵
                              PID:3064
                          • C:\Windows\SysWOW64\rundll32.exe
                            "C:\Windows\System32\rundll32.exe" C:\Users\Admin\AppData\Roaming\006700e5a2ab05\clip64.dll, Main
                            7⤵
                            • Loads dropped DLL
                            PID:4884
                    • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\c6901029.exe
                      C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\c6901029.exe
                      4⤵
                      • Executes dropped EXE
                      • Suspicious behavior: EnumeratesProcesses
                      • Suspicious behavior: MapViewOfSection
                      PID:1120
                  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\d1744324.exe
                    C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\d1744324.exe
                    3⤵
                    • Executes dropped EXE
                    PID:5000
              • C:\Users\Admin\AppData\Local\Temp\925e7e99c5\pdates.exe
                C:\Users\Admin\AppData\Local\Temp\925e7e99c5\pdates.exe
                1⤵
                • Executes dropped EXE
                PID:4176
              • C:\Users\Admin\AppData\Local\Temp\925e7e99c5\pdates.exe
                C:\Users\Admin\AppData\Local\Temp\925e7e99c5\pdates.exe
                1⤵
                • Executes dropped EXE
                PID:212
              • C:\Windows\system32\sc.exe
                C:\Windows\system32\sc.exe start wuauserv
                1⤵
                • Launches sc.exe
                PID:1268

              Network

              MITRE ATT&CK Enterprise v15

              Replay Monitor

              Loading Replay Monitor...

              Downloads

              • C:\Users\Admin\AppData\Local\Temp\925e7e99c5\pdates.exe

                Filesize

                230KB

                MD5

                cb45c0d0677f5bc7038d1342589593f4

                SHA1

                13ca0d14ff2a2a95e86bee1a0b040895684f7d5b

                SHA256

                af73136bafe1498c9a97fdbe6a80265d9abd96885ab0f8dbc356e420dd25b1e2

                SHA512

                e11796de27a21ac672b53b09b81f20dab3945aee80846b448b6c174bc02551b791e14db7829bcae155a07d9a4aa10c908acb7520b95c091fff914394c1c384f1

              • C:\Users\Admin\AppData\Local\Temp\925e7e99c5\pdates.exe

                Filesize

                230KB

                MD5

                cb45c0d0677f5bc7038d1342589593f4

                SHA1

                13ca0d14ff2a2a95e86bee1a0b040895684f7d5b

                SHA256

                af73136bafe1498c9a97fdbe6a80265d9abd96885ab0f8dbc356e420dd25b1e2

                SHA512

                e11796de27a21ac672b53b09b81f20dab3945aee80846b448b6c174bc02551b791e14db7829bcae155a07d9a4aa10c908acb7520b95c091fff914394c1c384f1

              • C:\Users\Admin\AppData\Local\Temp\925e7e99c5\pdates.exe

                Filesize

                230KB

                MD5

                cb45c0d0677f5bc7038d1342589593f4

                SHA1

                13ca0d14ff2a2a95e86bee1a0b040895684f7d5b

                SHA256

                af73136bafe1498c9a97fdbe6a80265d9abd96885ab0f8dbc356e420dd25b1e2

                SHA512

                e11796de27a21ac672b53b09b81f20dab3945aee80846b448b6c174bc02551b791e14db7829bcae155a07d9a4aa10c908acb7520b95c091fff914394c1c384f1

              • C:\Users\Admin\AppData\Local\Temp\925e7e99c5\pdates.exe

                Filesize

                230KB

                MD5

                cb45c0d0677f5bc7038d1342589593f4

                SHA1

                13ca0d14ff2a2a95e86bee1a0b040895684f7d5b

                SHA256

                af73136bafe1498c9a97fdbe6a80265d9abd96885ab0f8dbc356e420dd25b1e2

                SHA512

                e11796de27a21ac672b53b09b81f20dab3945aee80846b448b6c174bc02551b791e14db7829bcae155a07d9a4aa10c908acb7520b95c091fff914394c1c384f1

              • C:\Users\Admin\AppData\Local\Temp\925e7e99c5\pdates.exe

                Filesize

                230KB

                MD5

                cb45c0d0677f5bc7038d1342589593f4

                SHA1

                13ca0d14ff2a2a95e86bee1a0b040895684f7d5b

                SHA256

                af73136bafe1498c9a97fdbe6a80265d9abd96885ab0f8dbc356e420dd25b1e2

                SHA512

                e11796de27a21ac672b53b09b81f20dab3945aee80846b448b6c174bc02551b791e14db7829bcae155a07d9a4aa10c908acb7520b95c091fff914394c1c384f1

              • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\v9048644.exe

                Filesize

                514KB

                MD5

                58bcdaca3a9bf5011184d835dbe9003c

                SHA1

                ad46220f9ecd7feae28702a4085b02d8644c7bc7

                SHA256

                b7a00ae218cafae6052855bea59a48338f00b4b7d3c35a19e2c686977cae836d

                SHA512

                ee80fd0fb7bd5b9e69cc65fc4e06f75e989a026b97612e8e549c3938b7c92657ba9459e6c361b0e39c6e7ad9b56fb41b9c97fab2d10cc7c79a0bf18133bfe30b

              • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\v9048644.exe

                Filesize

                514KB

                MD5

                58bcdaca3a9bf5011184d835dbe9003c

                SHA1

                ad46220f9ecd7feae28702a4085b02d8644c7bc7

                SHA256

                b7a00ae218cafae6052855bea59a48338f00b4b7d3c35a19e2c686977cae836d

                SHA512

                ee80fd0fb7bd5b9e69cc65fc4e06f75e989a026b97612e8e549c3938b7c92657ba9459e6c361b0e39c6e7ad9b56fb41b9c97fab2d10cc7c79a0bf18133bfe30b

              • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\d1744324.exe

                Filesize

                173KB

                MD5

                c4b50241dd8d9532e6fdc76a390e4319

                SHA1

                cc5d42678ba1ab6d69d7f0b74921a8b2abeccc87

                SHA256

                35ccb0735c0cc3164c9f8cdaf2f731a93b596e590612f8517252debb5a5ab8c0

                SHA512

                6fbf16e220466762070c79a508eecbe93cc517da1568ea981e6dbec98148d9de183fced4b14f1eccc29e418c86a95e86143448f072ff1c2e7800e0b2d8782654

              • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\d1744324.exe

                Filesize

                173KB

                MD5

                c4b50241dd8d9532e6fdc76a390e4319

                SHA1

                cc5d42678ba1ab6d69d7f0b74921a8b2abeccc87

                SHA256

                35ccb0735c0cc3164c9f8cdaf2f731a93b596e590612f8517252debb5a5ab8c0

                SHA512

                6fbf16e220466762070c79a508eecbe93cc517da1568ea981e6dbec98148d9de183fced4b14f1eccc29e418c86a95e86143448f072ff1c2e7800e0b2d8782654

              • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\v8695064.exe

                Filesize

                359KB

                MD5

                c45bdbd95a3b133d0a58ed398244e5d4

                SHA1

                44b58569339013b7f5f3b55028a587beae0665b6

                SHA256

                c305e2f02709aa17708ff3dfa313c3746e4f9f9747bee828f9217964734c967f

                SHA512

                20a319e66582d3d634d2d640be922b22e975e9e55830dc98b862934b892d6d3e303a4181f2619303e1ccd53f2c1f56e772d5b687a57b31b3c7f7dc44275297be

              • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\v8695064.exe

                Filesize

                359KB

                MD5

                c45bdbd95a3b133d0a58ed398244e5d4

                SHA1

                44b58569339013b7f5f3b55028a587beae0665b6

                SHA256

                c305e2f02709aa17708ff3dfa313c3746e4f9f9747bee828f9217964734c967f

                SHA512

                20a319e66582d3d634d2d640be922b22e975e9e55830dc98b862934b892d6d3e303a4181f2619303e1ccd53f2c1f56e772d5b687a57b31b3c7f7dc44275297be

              • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\c6901029.exe

                Filesize

                39KB

                MD5

                57518cb20f306b7e6a9e91894b945d0f

                SHA1

                cdb7991f785189eb9f9a109c7a0e9283a1b294e2

                SHA256

                a37eaf6b39efc56d7e299161090024c47f8e77f7bd10244ec8ffcfe5d763c113

                SHA512

                6030f3ce4913f5cd9953eb34b12e80f9b0567b053cbd42a38f1228886753a2345708ec574e87bafa28b94530826c48fcb76b4b41190eb05f25567e40605e37bf

              • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\c6901029.exe

                Filesize

                39KB

                MD5

                57518cb20f306b7e6a9e91894b945d0f

                SHA1

                cdb7991f785189eb9f9a109c7a0e9283a1b294e2

                SHA256

                a37eaf6b39efc56d7e299161090024c47f8e77f7bd10244ec8ffcfe5d763c113

                SHA512

                6030f3ce4913f5cd9953eb34b12e80f9b0567b053cbd42a38f1228886753a2345708ec574e87bafa28b94530826c48fcb76b4b41190eb05f25567e40605e37bf

              • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\v3166900.exe

                Filesize

                234KB

                MD5

                9a3e195998acbee0856991343d690e4c

                SHA1

                e1d5fe5bdb690ea70f6c9e9791e7b100377d28da

                SHA256

                79a9425a0031e847139a39ea130c279646e61c11f5321ed0d614959d69f14a0c

                SHA512

                74cc88f3af8b1446fe25a3c69fbac38e7738106017b0961ea1537951cbfce93c5b12a33cf030a3e1fa4a97bf9aab14524f7e180c96380cc5c6959f64212c1a89

              • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\v3166900.exe

                Filesize

                234KB

                MD5

                9a3e195998acbee0856991343d690e4c

                SHA1

                e1d5fe5bdb690ea70f6c9e9791e7b100377d28da

                SHA256

                79a9425a0031e847139a39ea130c279646e61c11f5321ed0d614959d69f14a0c

                SHA512

                74cc88f3af8b1446fe25a3c69fbac38e7738106017b0961ea1537951cbfce93c5b12a33cf030a3e1fa4a97bf9aab14524f7e180c96380cc5c6959f64212c1a89

              • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\a6628464.exe

                Filesize

                11KB

                MD5

                7e93bacbbc33e6652e147e7fe07572a0

                SHA1

                421a7167da01c8da4dc4d5234ca3dd84e319e762

                SHA256

                850cd190aaeebcf1505674d97f51756f325e650320eaf76785d954223a9bee38

                SHA512

                250169d7b6fcebff400be89edae8340f14130ced70c340ba9da9f225f62b52b35f6645bfb510962efb866f988688cb42392561d3e6b72194bc89d310ea43aa91

              • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\a6628464.exe

                Filesize

                11KB

                MD5

                7e93bacbbc33e6652e147e7fe07572a0

                SHA1

                421a7167da01c8da4dc4d5234ca3dd84e319e762

                SHA256

                850cd190aaeebcf1505674d97f51756f325e650320eaf76785d954223a9bee38

                SHA512

                250169d7b6fcebff400be89edae8340f14130ced70c340ba9da9f225f62b52b35f6645bfb510962efb866f988688cb42392561d3e6b72194bc89d310ea43aa91

              • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\b1462230.exe

                Filesize

                230KB

                MD5

                cb45c0d0677f5bc7038d1342589593f4

                SHA1

                13ca0d14ff2a2a95e86bee1a0b040895684f7d5b

                SHA256

                af73136bafe1498c9a97fdbe6a80265d9abd96885ab0f8dbc356e420dd25b1e2

                SHA512

                e11796de27a21ac672b53b09b81f20dab3945aee80846b448b6c174bc02551b791e14db7829bcae155a07d9a4aa10c908acb7520b95c091fff914394c1c384f1

              • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\b1462230.exe

                Filesize

                230KB

                MD5

                cb45c0d0677f5bc7038d1342589593f4

                SHA1

                13ca0d14ff2a2a95e86bee1a0b040895684f7d5b

                SHA256

                af73136bafe1498c9a97fdbe6a80265d9abd96885ab0f8dbc356e420dd25b1e2

                SHA512

                e11796de27a21ac672b53b09b81f20dab3945aee80846b448b6c174bc02551b791e14db7829bcae155a07d9a4aa10c908acb7520b95c091fff914394c1c384f1

              • C:\Users\Admin\AppData\Roaming\006700e5a2ab05\clip64.dll

                Filesize

                89KB

                MD5

                2392b231cf4a80739b5cb09bf808127d

                SHA1

                41b5cf81c50884954911d96444fe83cfd0da465b

                SHA256

                2244b4dc9afc6cfab7ef1dea92420e2acd275bac7349b929a69f3c1ae25f5e2f

                SHA512

                19ceba063fa1cc1d0116eb11b18d6301a0e1eeda1cb5b983e331e59e4f12e4d0e36d7b4a1d8259dff57a79c47fdcedf89de8e255d932452e441762e4d440ce34

              • C:\Users\Admin\AppData\Roaming\006700e5a2ab05\clip64.dll

                Filesize

                89KB

                MD5

                2392b231cf4a80739b5cb09bf808127d

                SHA1

                41b5cf81c50884954911d96444fe83cfd0da465b

                SHA256

                2244b4dc9afc6cfab7ef1dea92420e2acd275bac7349b929a69f3c1ae25f5e2f

                SHA512

                19ceba063fa1cc1d0116eb11b18d6301a0e1eeda1cb5b983e331e59e4f12e4d0e36d7b4a1d8259dff57a79c47fdcedf89de8e255d932452e441762e4d440ce34

              • C:\Users\Admin\AppData\Roaming\006700e5a2ab05\clip64.dll

                Filesize

                89KB

                MD5

                2392b231cf4a80739b5cb09bf808127d

                SHA1

                41b5cf81c50884954911d96444fe83cfd0da465b

                SHA256

                2244b4dc9afc6cfab7ef1dea92420e2acd275bac7349b929a69f3c1ae25f5e2f

                SHA512

                19ceba063fa1cc1d0116eb11b18d6301a0e1eeda1cb5b983e331e59e4f12e4d0e36d7b4a1d8259dff57a79c47fdcedf89de8e255d932452e441762e4d440ce34

              • C:\Users\Admin\AppData\Roaming\006700e5a2ab05\cred64.dll

                Filesize

                273B

                MD5

                9851b884bf4aadfade57d911a3f03332

                SHA1

                aaadd1c1856c22844bb9fbb030cf4f586ed8866a

                SHA256

                03afb988f3eec62c2da682af371625adcac5a0e69615298f83d99365ab07ac0f

                SHA512

                a7de560f51bacd381d3e741f887c3c40ece88521ee93a22a4f7448297e8bda2131be866d9ae6438c528d9f40a277c18bae517deec16b6b723f67d4c308031327

              • memory/1120-183-0x0000000000400000-0x0000000000409000-memory.dmp

                Filesize

                36KB

              • memory/1120-181-0x0000000000400000-0x0000000000409000-memory.dmp

                Filesize

                36KB

              • memory/2648-182-0x0000000003270000-0x0000000003286000-memory.dmp

                Filesize

                88KB

              • memory/3868-162-0x00007FFA0AA80000-0x00007FFA0B541000-memory.dmp

                Filesize

                10.8MB

              • memory/3868-164-0x00007FFA0AA80000-0x00007FFA0B541000-memory.dmp

                Filesize

                10.8MB

              • memory/3868-161-0x0000000000F80000-0x0000000000F8A000-memory.dmp

                Filesize

                40KB

              • memory/5000-194-0x0000000004B70000-0x0000000004B80000-memory.dmp

                Filesize

                64KB

              • memory/5000-193-0x0000000004B10000-0x0000000004B22000-memory.dmp

                Filesize

                72KB

              • memory/5000-195-0x0000000004B80000-0x0000000004BBC000-memory.dmp

                Filesize

                240KB

              • memory/5000-196-0x0000000072D00000-0x00000000734B0000-memory.dmp

                Filesize

                7.7MB

              • memory/5000-197-0x0000000004B70000-0x0000000004B80000-memory.dmp

                Filesize

                64KB

              • memory/5000-192-0x0000000004C90000-0x0000000004D9A000-memory.dmp

                Filesize

                1.0MB

              • memory/5000-191-0x00000000051A0000-0x00000000057B8000-memory.dmp

                Filesize

                6.1MB

              • memory/5000-190-0x0000000072D00000-0x00000000734B0000-memory.dmp

                Filesize

                7.7MB

              • memory/5000-189-0x0000000000050000-0x0000000000080000-memory.dmp

                Filesize

                192KB