Analysis

  • max time kernel
    144s
  • max time network
    150s
  • platform
    windows7_x64
  • resource
    win7-20240611-en
  • resource tags

    arch:x64arch:x86image:win7-20240611-enlocale:en-usos:windows7-x64system
  • submitted
    02-07-2024 02:09

General

  • Target

    e5170b080959816e3a0911125d5de97bd4de77574b091646a681d65cb5bc04e0.exe

  • Size

    1.9MB

  • MD5

    5ad5e4f1f3126c5d6cfdbfbbe5597c84

  • SHA1

    47b46cbe987e0e33c9d23f4c6cc304d116e5e80f

  • SHA256

    e5170b080959816e3a0911125d5de97bd4de77574b091646a681d65cb5bc04e0

  • SHA512

    8c58379f3107cc67944d003df964f123848c9e7b55edbda3d256915cbbf666fa62e8878bb0c091c84e0057fe5097fef8e3eb49f2382519dc4a06f31a4c37b163

  • SSDEEP

    49152:izPvPgeS5GaqaHrxCTZtEsO/kLMUunFvGA0WyUAD:YfgbNHrxCTkRWunZRyUA

Malware Config

Extracted

Family

amadey

Version

8254624243

Botnet

e76b71

C2

http://77.91.77.81

Attributes
  • install_dir

    8254624243

  • install_file

    axplong.exe

  • strings_key

    90049e51fabf09df0d6748e0b271922e

  • url_paths

    /Kiru9gu/index.php

rc4.plain

Extracted

Family

redline

Botnet

newlogs

C2

85.28.47.7:17210

Extracted

Family

stealc

Botnet

ZOV

C2

http://40.86.87.10

Attributes
  • url_path

    /108e010e8f91c38c.php

Extracted

Family

redline

Botnet

newbuild

C2

185.215.113.67:40960

Signatures

  • Amadey

    Amadey bot is a simple trojan bot primarily used for collecting reconnaissance information.

  • RedLine

    RedLine Stealer is a malware family written in C#, first appearing in early 2020.

  • RedLine payload 4 IoCs
  • Stealc

    Stealc is an infostealer written in C++.

  • Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs 2 IoCs
  • Command and Scripting Interpreter: PowerShell 1 TTPs 1 IoCs

    Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.

  • Downloads MZ/PE file
  • Checks BIOS information in registry 2 TTPs 4 IoCs

    BIOS information is often read in order to detect sandboxing environments.

  • Executes dropped EXE 10 IoCs
  • Identifies Wine through registry keys 2 TTPs 2 IoCs

    Wine is a compatibility layer capable of running Windows applications, which can be used as sandboxing environment.

  • Loads dropped DLL 19 IoCs
  • Reads data files stored by FTP clients 2 TTPs

    Tries to access configuration files associated with programs like FileZilla.

  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Legitimate hosting services abused for malware hosting/C2 1 TTPs 2 IoCs
  • Suspicious use of NtSetInformationThreadHideFromDebugger 2 IoCs
  • Suspicious use of SetThreadContext 1 IoCs
  • Drops file in Windows directory 2 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Program crash 1 IoCs
  • Checks processor information in registry 2 TTPs 2 IoCs

    Processor information is often read in order to detect sandboxing environments.

  • Modifies system certificate store 2 TTPs 10 IoCs
  • Suspicious behavior: EnumeratesProcesses 6 IoCs
  • Suspicious use of AdjustPrivilegeToken 2 IoCs
  • Suspicious use of FindShellTrayWindow 2 IoCs
  • Suspicious use of WriteProcessMemory 57 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\e5170b080959816e3a0911125d5de97bd4de77574b091646a681d65cb5bc04e0.exe
    "C:\Users\Admin\AppData\Local\Temp\e5170b080959816e3a0911125d5de97bd4de77574b091646a681d65cb5bc04e0.exe"
    1⤵
    • Identifies VirtualBox via ACPI registry values (likely anti-VM)
    • Checks BIOS information in registry
    • Identifies Wine through registry keys
    • Loads dropped DLL
    • Suspicious use of NtSetInformationThreadHideFromDebugger
    • Drops file in Windows directory
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of WriteProcessMemory
    PID:1808
    • C:\Users\Admin\AppData\Local\Temp\8254624243\axplong.exe
      "C:\Users\Admin\AppData\Local\Temp\8254624243\axplong.exe"
      2⤵
      • Identifies VirtualBox via ACPI registry values (likely anti-VM)
      • Checks BIOS information in registry
      • Executes dropped EXE
      • Identifies Wine through registry keys
      • Loads dropped DLL
      • Suspicious use of NtSetInformationThreadHideFromDebugger
      • Modifies system certificate store
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of WriteProcessMemory
      PID:2316
      • C:\Users\Admin\AppData\Local\Temp\1000111001\streamer.exe
        "C:\Users\Admin\AppData\Local\Temp\1000111001\streamer.exe"
        3⤵
        • Executes dropped EXE
        PID:1920
      • C:\Users\Admin\AppData\Local\Temp\1000112001\TpWWMUpe0LEV.exe
        "C:\Users\Admin\AppData\Local\Temp\1000112001\TpWWMUpe0LEV.exe"
        3⤵
        • Executes dropped EXE
        • Loads dropped DLL
        PID:1476
      • C:\Users\Admin\AppData\Local\Temp\1000125001\Freshbuild.exe
        "C:\Users\Admin\AppData\Local\Temp\1000125001\Freshbuild.exe"
        3⤵
        • Executes dropped EXE
        • Loads dropped DLL
        • Drops file in Windows directory
        • Suspicious use of FindShellTrayWindow
        • Suspicious use of WriteProcessMemory
        PID:1672
        • C:\Users\Admin\AppData\Local\Temp\b66a8ae076\Hkbsse.exe
          "C:\Users\Admin\AppData\Local\Temp\b66a8ae076\Hkbsse.exe"
          4⤵
          • Executes dropped EXE
          PID:1068
      • C:\Users\Admin\AppData\Local\Temp\1000128001\crypt6.exe
        "C:\Users\Admin\AppData\Local\Temp\1000128001\crypt6.exe"
        3⤵
        • Executes dropped EXE
        • Suspicious use of WriteProcessMemory
        PID:2764
        • C:\Windows\SysWOW64\WerFault.exe
          C:\Windows\SysWOW64\WerFault.exe -u -p 2764 -s 96
          4⤵
          • Loads dropped DLL
          • Program crash
          PID:1164
      • C:\Users\Admin\AppData\Local\Temp\1000130001\newlogs.exe
        "C:\Users\Admin\AppData\Local\Temp\1000130001\newlogs.exe"
        3⤵
        • Executes dropped EXE
        PID:1072
      • C:\Users\Admin\AppData\Local\Temp\1000131001\stealc_zov.exe
        "C:\Users\Admin\AppData\Local\Temp\1000131001\stealc_zov.exe"
        3⤵
        • Executes dropped EXE
        • Loads dropped DLL
        • Checks processor information in registry
        • Suspicious behavior: EnumeratesProcesses
        PID:2716
      • C:\Users\Admin\AppData\Local\Temp\1000132001\newbuild.exe
        "C:\Users\Admin\AppData\Local\Temp\1000132001\newbuild.exe"
        3⤵
        • Executes dropped EXE
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:3040
      • C:\Users\Admin\AppData\Local\Temp\1000149001\ZharkBOT.exe
        "C:\Users\Admin\AppData\Local\Temp\1000149001\ZharkBOT.exe"
        3⤵
        • Executes dropped EXE
        • Suspicious use of SetThreadContext
        • Suspicious use of WriteProcessMemory
        PID:3052
        • C:\Windows\system32\WindowsPowerShell\v1.0\powershell.exe
          C:\Windows\system32\WindowsPowerShell\v1.0\powershell.exe Add-MpPreference -ExclusionPath $env:UserProfile
          4⤵
          • Command and Scripting Interpreter: PowerShell
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of AdjustPrivilegeToken
          PID:1940
        • C:\Program Files (x86)\Windows Mail\wab.exe
          "C:\Program Files (x86)\Windows Mail\wab.exe"
          4⤵
            PID:2816

    Network

    MITRE ATT&CK Matrix ATT&CK v13

    Execution

    Command and Scripting Interpreter

    1
    T1059

    PowerShell

    1
    T1059.001

    Defense Evasion

    Virtualization/Sandbox Evasion

    2
    T1497

    Subvert Trust Controls

    1
    T1553

    Install Root Certificate

    1
    T1553.004

    Modify Registry

    1
    T1112

    Credential Access

    Unsecured Credentials

    3
    T1552

    Credentials In Files

    3
    T1552.001

    Discovery

    Query Registry

    5
    T1012

    Virtualization/Sandbox Evasion

    2
    T1497

    System Information Discovery

    3
    T1082

    Collection

    Data from Local System

    3
    T1005

    Command and Control

    Web Service

    1
    T1102

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
      Filesize

      342B

      MD5

      e0fb0495698fcb849142f6df45129d84

      SHA1

      cc9ace2e170e5b56ccb577c59e0821a5774e9a42

      SHA256

      835d75a6220320c37950a115ddf947f26c12c95c56a507b6e5cace0c4d88ebcc

      SHA512

      d95ee548115af914bfe13758a414705e95bd66c36198f3df1e091eb6ae8370c3cc49564fce176820f82f1f35ae7f67e38b43c12fedbddc34172422f765efd1fa

    • C:\Users\Admin\AppData\Local\Temp\1000111001\streamer.exe
      Filesize

      7.7MB

      MD5

      2bc0db539a8fab08bf4104eb7f2de7e7

      SHA1

      ff4a5defedb18c93ef815434b40e19b9452ca410

      SHA256

      ec84ec11567566db3ba9096df164f0b7a8217d50ffab16fa3642f8f12d759b04

      SHA512

      ffaeb6c876d2aeda75b6576d2b307964a7b5330a0ab73352a4c95ef18ac3b1b1bfff350805553833a754582ed54215337c376bce0abd44c117b5d8a0e1468d71

    • C:\Users\Admin\AppData\Local\Temp\1000112001\TpWWMUpe0LEV.exe
      Filesize

      1.2MB

      MD5

      242214131486132e33ceda794d66ca1f

      SHA1

      4ce34fd91f5c9e35b8694007b286635663ef9bf2

      SHA256

      bac402b5749b2da2211db6d2404c1c621ccd0c2e5d492eb6f973b3e2d38dd361

      SHA512

      031e0904d949cec515f2d6f2b5e4b9c0df03637787ff14f20c58e711c54eec77d1f22aa0cf0f6efd65362c1fc0066645d5d005c6a77fe5b169427cdd42555d29

    • C:\Users\Admin\AppData\Local\Temp\1000115001\build.exe
      Filesize

      26KB

      MD5

      5fab3b9073e40ca5ee8ec7e09e4a9e83

      SHA1

      e36e3be783e602e5fba6ae17d174dbc350cd6680

      SHA256

      e667d516aecae694d79dad7c5a895866789e973c5e862c0ffa6f827c8f04f59b

      SHA512

      0cc54ee493065fe94de649b1e6da31cf21e70e315c1d55041f204f386891a329426be6a1d457833103c98e7689e3735e371ddf83c9cf1cb2cb0ce5fb9c2a0d10

    • C:\Users\Admin\AppData\Local\Temp\1000116001\FILE1.exe
      Filesize

      26KB

      MD5

      b2122a84663441aec5fe576040ecbb32

      SHA1

      2494b61fb31751fd80fcf2855f8df925ce464b6c

      SHA256

      b5e359d8d7120a4913156612f2b4ef29f1fded9c8dfcc251c1ff72da429ddd12

      SHA512

      682c44812ed536fc22d089aaaeb4531e4e1d271b982348d4616eebd21ebef9c6e6104c1d3cbc9fd9bb7ce5276d5f47a3bbfe222522358b30ad6ebbf92b099ab8

    • C:\Users\Admin\AppData\Local\Temp\1000125001\Freshbuild.exe
      Filesize

      415KB

      MD5

      07101cac5b9477ba636cd8ca7b9932cb

      SHA1

      59ea7fd9ae6ded8c1b7240a4bf9399b4eb3849f1

      SHA256

      488385cd54d14790b03fa7c7dc997ebea3f7b2a8499e5927eb437a3791102a77

      SHA512

      02240ff51a74966bc31cfcc901105096eb871f588efaa9be1a829b4ee6f245bd9dca37be7e2946ba6315feea75c3dce5f490847250e62081445cd25b0f406887

    • C:\Users\Admin\AppData\Local\Temp\1000128001\crypt6.exe
      Filesize

      512KB

      MD5

      a957dc16d684fbd7e12fc87e8ee12fea

      SHA1

      20c73ccfdba13fd9b79c9e02432be39e48e4b37d

      SHA256

      071b6c448d2546dea8caed872fca0d002f59a6b9849f0de2a565fc74b487fa37

      SHA512

      fd6982587fba779d6febb84dfa65ec3e048e17733c2f01b61996bedb170bb4bb1cbb822c0dd2cf44a7e601373abaf499885b13b7957dd2a307bbd8f2120e9b3b

    • C:\Users\Admin\AppData\Local\Temp\1000130001\newlogs.exe
      Filesize

      297KB

      MD5

      0970456d2e2bcb36f49d23f5f2eec4ce

      SHA1

      1e427bbeb209b636371d17801b14fabff87921be

      SHA256

      264db4d677606c95912a93a457675d5ebaa24dc886da8bbcb800fe831c540a54

      SHA512

      43c233e6c6fb20ee5830672f68eec2a1930aff6c3da185b7af56ede90970041157755b8893a86336711c8ba8cbe3f22818de8ddc1789ed65a7aacd596771909e

    • C:\Users\Admin\AppData\Local\Temp\1000131001\stealc_zov.exe
      Filesize

      158KB

      MD5

      253ccac8a47b80287f651987c0c779ea

      SHA1

      11db405849dbaa9b3759de921835df20fab35bc3

      SHA256

      262a400b339deea5089433709ce559d23253e23d23c07595b515755114147e2f

      SHA512

      af40e01bc3d36baf47eba1d5d6406220dfbcc52c6123dd8450e709fed3e72bed82aac6257fa7bdf7dd774f182919a5051e9712b2e7f1329defd0b159cb08385d

    • C:\Users\Admin\AppData\Local\Temp\1000132001\newbuild.exe
      Filesize

      297KB

      MD5

      9ab4de8b2f2b99f009d32aa790cd091b

      SHA1

      a86b16ee4676850bac14c50ee698a39454d0231e

      SHA256

      8a254344702dc6560312a8028e08f844b16804b1fbf4c438c3ca5058d7b65ea1

      SHA512

      a79341ec3407529daa0384de4cac25b665d3b0cb81e52ecada0ebfe37d7616b16da96b47b04f50ce0a6e46d5fced3298a459f78a087c6b6eac4ed444434c5fbe

    • C:\Users\Admin\AppData\Local\Temp\1000149001\ZharkBOT.exe
      Filesize

      2.9MB

      MD5

      80958a4b85453f4df82ec131554a5412

      SHA1

      44cefe96467895934ec9d1c2461036704c971458

      SHA256

      70afebe71346475e1f6d4a1c591f920f7ed1d055261eb5d6a4276831aef77783

      SHA512

      cab01e1d63b4ff9a8d35c48fddd18b0959068510b1ca0e66997ed2d59a34b8903f23d3b3736180b52130a325eda3665f9babe2dcad91308f16526e8812fee1c8

    • C:\Users\Admin\AppData\Local\Temp\Cab82D8.tmp
      Filesize

      70KB

      MD5

      49aebf8cbd62d92ac215b2923fb1b9f5

      SHA1

      1723be06719828dda65ad804298d0431f6aff976

      SHA256

      b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f

      SHA512

      bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b

    • C:\Users\Admin\AppData\Local\Temp\Tar8348.tmp
      Filesize

      181KB

      MD5

      4ea6026cf93ec6338144661bf1202cd1

      SHA1

      a1dec9044f750ad887935a01430bf49322fbdcb7

      SHA256

      8efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8

      SHA512

      6c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b

    • \ProgramData\mozglue.dll
      Filesize

      593KB

      MD5

      c8fd9be83bc728cc04beffafc2907fe9

      SHA1

      95ab9f701e0024cedfbd312bcfe4e726744c4f2e

      SHA256

      ba06a6ee0b15f5be5c4e67782eec8b521e36c107a329093ec400fe0404eb196a

      SHA512

      fbb446f4a27ef510e616caad52945d6c9cc1fd063812c41947e579ec2b54df57c6dc46237ded80fca5847f38cbe1747a6c66a13e2c8c19c664a72be35eb8b040

    • \ProgramData\nss3.dll
      Filesize

      2.0MB

      MD5

      1cc453cdf74f31e4d913ff9c10acdde2

      SHA1

      6e85eae544d6e965f15fa5c39700fa7202f3aafe

      SHA256

      ac5c92fe6c51cfa742e475215b83b3e11a4379820043263bf50d4068686c6fa5

      SHA512

      dd9ff4e06b00dc831439bab11c10e9b2ae864ea6e780d3835ea7468818f35439f352ef137da111efcdf2bb6465f6ca486719451bf6cf32c6a4420a56b1d64571

    • \Users\Admin\AppData\Local\Temp\8254624243\axplong.exe
      Filesize

      1.9MB

      MD5

      5ad5e4f1f3126c5d6cfdbfbbe5597c84

      SHA1

      47b46cbe987e0e33c9d23f4c6cc304d116e5e80f

      SHA256

      e5170b080959816e3a0911125d5de97bd4de77574b091646a681d65cb5bc04e0

      SHA512

      8c58379f3107cc67944d003df964f123848c9e7b55edbda3d256915cbbf666fa62e8878bb0c091c84e0057fe5097fef8e3eb49f2382519dc4a06f31a4c37b163

    • \Users\Admin\AppData\Roaming\d3d9.dll
      Filesize

      279KB

      MD5

      8fa26f1e37d3ff7f736fc93d520bc8ab

      SHA1

      ad532e1cb4a1b3cd82c7a85647f8f6dd99833bb1

      SHA256

      6c47da8fbd12f22d7272fbf223e054bf5093c0922d0e8fb7d6289a5913c2e45d

      SHA512

      8a0b53cbc3a20e2f0fd41c486b1af1fbbcf7f2fed9f7368b672a07f25faaa2568bbdbcf0841233ac8c473a4d1dee099e90bf6098a6fa15e44b8526efdafc1287

    • memory/1072-325-0x0000000000250000-0x00000000002A0000-memory.dmp
      Filesize

      320KB

    • memory/1476-245-0x00000000008F0000-0x0000000000A22000-memory.dmp
      Filesize

      1.2MB

    • memory/1808-3-0x0000000000B10000-0x0000000000FE8000-memory.dmp
      Filesize

      4.8MB

    • memory/1808-5-0x0000000000B10000-0x0000000000FE8000-memory.dmp
      Filesize

      4.8MB

    • memory/1808-0-0x0000000000B10000-0x0000000000FE8000-memory.dmp
      Filesize

      4.8MB

    • memory/1808-2-0x0000000000B11000-0x0000000000B3F000-memory.dmp
      Filesize

      184KB

    • memory/1808-16-0x0000000000B10000-0x0000000000FE8000-memory.dmp
      Filesize

      4.8MB

    • memory/1808-1-0x0000000077DB0000-0x0000000077DB2000-memory.dmp
      Filesize

      8KB

    • memory/1808-9-0x0000000000B10000-0x0000000000FE8000-memory.dmp
      Filesize

      4.8MB

    • memory/1920-228-0x000000013F3B0000-0x000000013FBFB000-memory.dmp
      Filesize

      8.3MB

    • memory/1940-419-0x000000001B270000-0x000000001B552000-memory.dmp
      Filesize

      2.9MB

    • memory/1940-420-0x0000000002690000-0x0000000002698000-memory.dmp
      Filesize

      32KB

    • memory/2316-480-0x00000000003D0000-0x00000000008A8000-memory.dmp
      Filesize

      4.8MB

    • memory/2316-473-0x00000000003D0000-0x00000000008A8000-memory.dmp
      Filesize

      4.8MB

    • memory/2316-343-0x0000000007810000-0x0000000007A4C000-memory.dmp
      Filesize

      2.2MB

    • memory/2316-342-0x0000000007810000-0x0000000007A4C000-memory.dmp
      Filesize

      2.2MB

    • memory/2316-481-0x00000000003D0000-0x00000000008A8000-memory.dmp
      Filesize

      4.8MB

    • memory/2316-374-0x00000000003D0000-0x00000000008A8000-memory.dmp
      Filesize

      4.8MB

    • memory/2316-479-0x00000000003D0000-0x00000000008A8000-memory.dmp
      Filesize

      4.8MB

    • memory/2316-478-0x00000000003D0000-0x00000000008A8000-memory.dmp
      Filesize

      4.8MB

    • memory/2316-229-0x00000000003D0000-0x00000000008A8000-memory.dmp
      Filesize

      4.8MB

    • memory/2316-19-0x00000000003D0000-0x00000000008A8000-memory.dmp
      Filesize

      4.8MB

    • memory/2316-319-0x00000000003D0000-0x00000000008A8000-memory.dmp
      Filesize

      4.8MB

    • memory/2316-21-0x00000000003D0000-0x00000000008A8000-memory.dmp
      Filesize

      4.8MB

    • memory/2316-424-0x00000000003D0000-0x00000000008A8000-memory.dmp
      Filesize

      4.8MB

    • memory/2316-279-0x00000000003D0000-0x00000000008A8000-memory.dmp
      Filesize

      4.8MB

    • memory/2316-17-0x00000000003D0000-0x00000000008A8000-memory.dmp
      Filesize

      4.8MB

    • memory/2316-18-0x00000000003D1000-0x00000000003FF000-memory.dmp
      Filesize

      184KB

    • memory/2316-470-0x00000000003D0000-0x00000000008A8000-memory.dmp
      Filesize

      4.8MB

    • memory/2316-477-0x00000000003D0000-0x00000000008A8000-memory.dmp
      Filesize

      4.8MB

    • memory/2316-472-0x00000000003D0000-0x00000000008A8000-memory.dmp
      Filesize

      4.8MB

    • memory/2316-476-0x00000000003D0000-0x00000000008A8000-memory.dmp
      Filesize

      4.8MB

    • memory/2316-474-0x00000000003D0000-0x00000000008A8000-memory.dmp
      Filesize

      4.8MB

    • memory/2316-475-0x00000000003D0000-0x00000000008A8000-memory.dmp
      Filesize

      4.8MB

    • memory/2716-344-0x0000000000AA0000-0x0000000000CDC000-memory.dmp
      Filesize

      2.2MB

    • memory/2716-471-0x0000000000AA0000-0x0000000000CDC000-memory.dmp
      Filesize

      2.2MB

    • memory/2716-388-0x0000000061E00000-0x0000000061EF3000-memory.dmp
      Filesize

      972KB

    • memory/2816-417-0x0000000000400000-0x00000000004D6000-memory.dmp
      Filesize

      856KB

    • memory/2816-418-0x0000000000400000-0x00000000004D6000-memory.dmp
      Filesize

      856KB

    • memory/3040-359-0x0000000000360000-0x00000000003B0000-memory.dmp
      Filesize

      320KB