Analysis

  • max time kernel
    103s
  • max time network
    134s
  • platform
    windows10-1703_x64
  • resource
    win10-20230220-en
  • resource tags

    arch:x64arch:x86image:win10-20230220-enlocale:en-usos:windows10-1703-x64system
  • submitted
    03-06-2023 08:24

General

  • Target

    7a64605f6a636987519204a759bed0480d669e6cad831f22a9e82b3d3dcfc957.exe

  • Size

    777KB

  • MD5

    824c8ad05d99472e6375ceb65674e612

  • SHA1

    8b26d26b3080e05b5b1db25b2b78af5cd94bbdf4

  • SHA256

    7a64605f6a636987519204a759bed0480d669e6cad831f22a9e82b3d3dcfc957

  • SHA512

    e611cf520056097b549f62499bcfac984411c6faac7d65de1681912b5e081d6e64f9fffa060d6edcc9500aa8049411340ad4007112ca95859abc41a393d6de61

  • SSDEEP

    24576:WyIhauvvT2BZs221AJjua2eGddRMfpJzMW83u:lAH4ZIaUeGd0fT

Malware Config

Extracted

Family

redline

Botnet

diza

C2

83.97.73.126:19046

Attributes
  • auth_value

    0d09b419c8bc967f91c68be4a17e92ee

Extracted

Family

redline

Botnet

metro

C2

83.97.73.126:19046

Attributes
  • auth_value

    f7fd4aa816bdbaad933b45b51d9b6b1a

Signatures

  • Modifies Windows Defender Real-time Protection settings 3 TTPs 5 IoCs
  • RedLine

    RedLine Stealer is a malware family written in C#, first appearing in early 2020.

  • Executes dropped EXE 9 IoCs
  • Loads dropped DLL 1 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
  • Adds Run key to start application 2 TTPs 6 IoCs
  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Suspicious use of SetThreadContext 2 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Creates scheduled task(s) 1 TTPs 1 IoCs

    Schtasks is often used by malware for persistence or to perform post-infection execution.

  • Suspicious behavior: EnumeratesProcesses 6 IoCs
  • Suspicious use of AdjustPrivilegeToken 3 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of WriteProcessMemory 58 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\7a64605f6a636987519204a759bed0480d669e6cad831f22a9e82b3d3dcfc957.exe
    "C:\Users\Admin\AppData\Local\Temp\7a64605f6a636987519204a759bed0480d669e6cad831f22a9e82b3d3dcfc957.exe"
    1⤵
    • Adds Run key to start application
    • Suspicious use of WriteProcessMemory
    PID:2876
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\x9725528.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\x9725528.exe
      2⤵
      • Executes dropped EXE
      • Adds Run key to start application
      • Suspicious use of WriteProcessMemory
      PID:3076
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\x0680335.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\x0680335.exe
        3⤵
        • Executes dropped EXE
        • Adds Run key to start application
        • Suspicious use of WriteProcessMemory
        PID:4532
        • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\f1489301.exe
          C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\f1489301.exe
          4⤵
          • Executes dropped EXE
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of AdjustPrivilegeToken
          PID:4988
        • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\g3308217.exe
          C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\g3308217.exe
          4⤵
          • Executes dropped EXE
          • Suspicious use of SetThreadContext
          • Suspicious use of WriteProcessMemory
          PID:3104
          • C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe
            "C:\\Windows\\Microsoft.NET\\Framework\\v4.0.30319\\AppLaunch.exe"
            5⤵
            • Modifies Windows Defender Real-time Protection settings
            • Suspicious behavior: EnumeratesProcesses
            • Suspicious use of AdjustPrivilegeToken
            PID:4916
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\h7394686.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\h7394686.exe
        3⤵
        • Executes dropped EXE
        • Suspicious use of FindShellTrayWindow
        • Suspicious use of WriteProcessMemory
        PID:1932
        • C:\Users\Admin\AppData\Local\Temp\a9e2a16078\metado.exe
          "C:\Users\Admin\AppData\Local\Temp\a9e2a16078\metado.exe"
          4⤵
          • Executes dropped EXE
          • Suspicious use of WriteProcessMemory
          PID:4840
          • C:\Windows\SysWOW64\schtasks.exe
            "C:\Windows\System32\schtasks.exe" /Create /SC MINUTE /MO 1 /TN metado.exe /TR "C:\Users\Admin\AppData\Local\Temp\a9e2a16078\metado.exe" /F
            5⤵
            • Creates scheduled task(s)
            PID:4388
          • C:\Windows\SysWOW64\cmd.exe
            "C:\Windows\System32\cmd.exe" /k echo Y|CACLS "metado.exe" /P "Admin:N"&&CACLS "metado.exe" /P "Admin:R" /E&&echo Y|CACLS "..\a9e2a16078" /P "Admin:N"&&CACLS "..\a9e2a16078" /P "Admin:R" /E&&Exit
            5⤵
            • Suspicious use of WriteProcessMemory
            PID:4368
            • C:\Windows\SysWOW64\cmd.exe
              C:\Windows\system32\cmd.exe /S /D /c" echo Y"
              6⤵
                PID:3908
              • C:\Windows\SysWOW64\cacls.exe
                CACLS "metado.exe" /P "Admin:N"
                6⤵
                  PID:4712
                • C:\Windows\SysWOW64\cacls.exe
                  CACLS "metado.exe" /P "Admin:R" /E
                  6⤵
                    PID:1792
                  • C:\Windows\SysWOW64\cmd.exe
                    C:\Windows\system32\cmd.exe /S /D /c" echo Y"
                    6⤵
                      PID:2564
                    • C:\Windows\SysWOW64\cacls.exe
                      CACLS "..\a9e2a16078" /P "Admin:N"
                      6⤵
                        PID:4960
                      • C:\Windows\SysWOW64\cacls.exe
                        CACLS "..\a9e2a16078" /P "Admin:R" /E
                        6⤵
                          PID:2620
                      • C:\Windows\SysWOW64\rundll32.exe
                        "C:\Windows\System32\rundll32.exe" C:\Users\Admin\AppData\Roaming\006700e5a2ab05\clip64.dll, Main
                        5⤵
                        • Loads dropped DLL
                        PID:3680
                • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\i3421617.exe
                  C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\i3421617.exe
                  2⤵
                  • Executes dropped EXE
                  • Suspicious use of SetThreadContext
                  • Suspicious use of WriteProcessMemory
                  PID:4456
                  • C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe
                    "C:\\Windows\\Microsoft.NET\\Framework\\v4.0.30319\\AppLaunch.exe"
                    3⤵
                    • Suspicious behavior: EnumeratesProcesses
                    • Suspicious use of AdjustPrivilegeToken
                    PID:3064
              • C:\Users\Admin\AppData\Local\Temp\a9e2a16078\metado.exe
                C:\Users\Admin\AppData\Local\Temp\a9e2a16078\metado.exe
                1⤵
                • Executes dropped EXE
                PID:1792
              • C:\Users\Admin\AppData\Local\Temp\a9e2a16078\metado.exe
                C:\Users\Admin\AppData\Local\Temp\a9e2a16078\metado.exe
                1⤵
                • Executes dropped EXE
                PID:2664

              Network

              MITRE ATT&CK Enterprise v6

              Replay Monitor

              Loading Replay Monitor...

              Downloads

              • C:\Users\Admin\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\AppLaunch.exe.log

                Filesize

                226B

                MD5

                957779c42144282d8cd83192b8fbc7cf

                SHA1

                de83d08d2cca06b9ff3d1ef239d6b60b705d25fe

                SHA256

                0d7ca7ba65e2b465e4878e324ceab8f8981f5ec06dcf5bc32559a4467a9c7d51

                SHA512

                f1549c61b4f2906d13b2aabb74772c2bc826cd42373d7bb6c48cbb125d5aa2ec17617e6b5e67e8aae3bb5790cc831cdba48a45008ed01df4fba8be448cce39fd

              • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\i3421617.exe

                Filesize

                304KB

                MD5

                4596add7c43606a5e82521b52d317389

                SHA1

                c22e7482af96839d56ed972cce81278fc73dfb3d

                SHA256

                2546c2a5e5eeedaa9ddeda298f0ea9d69722d9415612091e1e3752f66ea26de6

                SHA512

                a5d9bc8b9786964d825ec5c5dc13deec41ee59e8a31448fa5f70b84c5f7ca800520c1ae5f5fbcb90bea46acc121626ffd82331ea42721d58de472449bff5377f

              • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\i3421617.exe

                Filesize

                304KB

                MD5

                4596add7c43606a5e82521b52d317389

                SHA1

                c22e7482af96839d56ed972cce81278fc73dfb3d

                SHA256

                2546c2a5e5eeedaa9ddeda298f0ea9d69722d9415612091e1e3752f66ea26de6

                SHA512

                a5d9bc8b9786964d825ec5c5dc13deec41ee59e8a31448fa5f70b84c5f7ca800520c1ae5f5fbcb90bea46acc121626ffd82331ea42721d58de472449bff5377f

              • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\x9725528.exe

                Filesize

                447KB

                MD5

                7045d97f85d80bf1d268535f4e4934e7

                SHA1

                190b40a09e2eafecefee62b8477e86e47937bd2a

                SHA256

                de7d9d55a6af0a8f55b9ef8a158db235e430cf19d23457ca72b50c82cc512f13

                SHA512

                3f3a44416715cd2842c7e5596240e2066def17e68564a5d27f60212aa5b1328e00bc1b6a1daeeedb748ab34cb9cd477d9f9b453c80079d19f62d06da11234f35

              • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\x9725528.exe

                Filesize

                447KB

                MD5

                7045d97f85d80bf1d268535f4e4934e7

                SHA1

                190b40a09e2eafecefee62b8477e86e47937bd2a

                SHA256

                de7d9d55a6af0a8f55b9ef8a158db235e430cf19d23457ca72b50c82cc512f13

                SHA512

                3f3a44416715cd2842c7e5596240e2066def17e68564a5d27f60212aa5b1328e00bc1b6a1daeeedb748ab34cb9cd477d9f9b453c80079d19f62d06da11234f35

              • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\h7394686.exe

                Filesize

                216KB

                MD5

                b45917398c7efc8d0f710879ab3fc892

                SHA1

                6691ab8b5e330ed9f779421b91eb35f26996acd8

                SHA256

                a16d751ccb1b45db3b55d2398e89c075606eb20980d503e9d1d5aaaea7f8d49a

                SHA512

                956d8f78a697001a384386167ae1483d46bfb1ebffb7064cb9c3a2a7eedabcec8c1219a5ba18684721f4468b19a4265bcfbfb75541de9adec15373dcfc51ddbb

              • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\h7394686.exe

                Filesize

                216KB

                MD5

                b45917398c7efc8d0f710879ab3fc892

                SHA1

                6691ab8b5e330ed9f779421b91eb35f26996acd8

                SHA256

                a16d751ccb1b45db3b55d2398e89c075606eb20980d503e9d1d5aaaea7f8d49a

                SHA512

                956d8f78a697001a384386167ae1483d46bfb1ebffb7064cb9c3a2a7eedabcec8c1219a5ba18684721f4468b19a4265bcfbfb75541de9adec15373dcfc51ddbb

              • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\x0680335.exe

                Filesize

                276KB

                MD5

                27297ce595c4b19bfa2a41eda6a0ec1f

                SHA1

                f5ed2e05119d2a1b0f108339ea9cc063a464cbaf

                SHA256

                49cf7b6c708a5cd17fd7edcca8157e3d2ec5fa3c0753f60e2e4677fc522d5256

                SHA512

                f8312857ae27d59c917425a1668d92530e617b06818d1b947886da7ca72862e8372972e984f7c4684f2ab08ae049f5b9d33b6e2e7f536f1a3f386bb53c8ce560

              • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\x0680335.exe

                Filesize

                276KB

                MD5

                27297ce595c4b19bfa2a41eda6a0ec1f

                SHA1

                f5ed2e05119d2a1b0f108339ea9cc063a464cbaf

                SHA256

                49cf7b6c708a5cd17fd7edcca8157e3d2ec5fa3c0753f60e2e4677fc522d5256

                SHA512

                f8312857ae27d59c917425a1668d92530e617b06818d1b947886da7ca72862e8372972e984f7c4684f2ab08ae049f5b9d33b6e2e7f536f1a3f386bb53c8ce560

              • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\f1489301.exe

                Filesize

                168KB

                MD5

                1fb80ec9ae9118b313b1836867dbe803

                SHA1

                69a8226a5354434a9b3b4f193185cef7909aaf9c

                SHA256

                adc1ac7ac840308bc6b7e73e1b1a3ae5832d322b92a6f1f44675b8c3c93cd204

                SHA512

                111d8af4205d0f9aca1eb20a6d9fea1d7fa633523f95d319f923f3454c2cc8b366bbde481f9a20badc4988fd07baf6d20071159c913b221ecc0c355edd882906

              • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\f1489301.exe

                Filesize

                168KB

                MD5

                1fb80ec9ae9118b313b1836867dbe803

                SHA1

                69a8226a5354434a9b3b4f193185cef7909aaf9c

                SHA256

                adc1ac7ac840308bc6b7e73e1b1a3ae5832d322b92a6f1f44675b8c3c93cd204

                SHA512

                111d8af4205d0f9aca1eb20a6d9fea1d7fa633523f95d319f923f3454c2cc8b366bbde481f9a20badc4988fd07baf6d20071159c913b221ecc0c355edd882906

              • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\g3308217.exe

                Filesize

                147KB

                MD5

                d51191c9c31924a11bb44fff07d494cc

                SHA1

                56e04d93bf96dee9a4cf96e48eb6e89feee4dfc7

                SHA256

                ac2d2ae3d10d965d879bcbc53ca0af0379179f2f0af572adb185f275dfa95b25

                SHA512

                0b28edd00cbe194644ddeda956d95073b86de7b3960fa94562085605a9b86402d2ca7359f1577ddce6cd55ec62e4dbe94915f5554eb1455314f4b7be13e2b2de

              • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\g3308217.exe

                Filesize

                147KB

                MD5

                d51191c9c31924a11bb44fff07d494cc

                SHA1

                56e04d93bf96dee9a4cf96e48eb6e89feee4dfc7

                SHA256

                ac2d2ae3d10d965d879bcbc53ca0af0379179f2f0af572adb185f275dfa95b25

                SHA512

                0b28edd00cbe194644ddeda956d95073b86de7b3960fa94562085605a9b86402d2ca7359f1577ddce6cd55ec62e4dbe94915f5554eb1455314f4b7be13e2b2de

              • C:\Users\Admin\AppData\Local\Temp\a9e2a16078\metado.exe

                Filesize

                216KB

                MD5

                b45917398c7efc8d0f710879ab3fc892

                SHA1

                6691ab8b5e330ed9f779421b91eb35f26996acd8

                SHA256

                a16d751ccb1b45db3b55d2398e89c075606eb20980d503e9d1d5aaaea7f8d49a

                SHA512

                956d8f78a697001a384386167ae1483d46bfb1ebffb7064cb9c3a2a7eedabcec8c1219a5ba18684721f4468b19a4265bcfbfb75541de9adec15373dcfc51ddbb

              • C:\Users\Admin\AppData\Local\Temp\a9e2a16078\metado.exe

                Filesize

                216KB

                MD5

                b45917398c7efc8d0f710879ab3fc892

                SHA1

                6691ab8b5e330ed9f779421b91eb35f26996acd8

                SHA256

                a16d751ccb1b45db3b55d2398e89c075606eb20980d503e9d1d5aaaea7f8d49a

                SHA512

                956d8f78a697001a384386167ae1483d46bfb1ebffb7064cb9c3a2a7eedabcec8c1219a5ba18684721f4468b19a4265bcfbfb75541de9adec15373dcfc51ddbb

              • C:\Users\Admin\AppData\Local\Temp\a9e2a16078\metado.exe

                Filesize

                216KB

                MD5

                b45917398c7efc8d0f710879ab3fc892

                SHA1

                6691ab8b5e330ed9f779421b91eb35f26996acd8

                SHA256

                a16d751ccb1b45db3b55d2398e89c075606eb20980d503e9d1d5aaaea7f8d49a

                SHA512

                956d8f78a697001a384386167ae1483d46bfb1ebffb7064cb9c3a2a7eedabcec8c1219a5ba18684721f4468b19a4265bcfbfb75541de9adec15373dcfc51ddbb

              • C:\Users\Admin\AppData\Local\Temp\a9e2a16078\metado.exe

                Filesize

                216KB

                MD5

                b45917398c7efc8d0f710879ab3fc892

                SHA1

                6691ab8b5e330ed9f779421b91eb35f26996acd8

                SHA256

                a16d751ccb1b45db3b55d2398e89c075606eb20980d503e9d1d5aaaea7f8d49a

                SHA512

                956d8f78a697001a384386167ae1483d46bfb1ebffb7064cb9c3a2a7eedabcec8c1219a5ba18684721f4468b19a4265bcfbfb75541de9adec15373dcfc51ddbb

              • C:\Users\Admin\AppData\Local\Temp\a9e2a16078\metado.exe

                Filesize

                216KB

                MD5

                b45917398c7efc8d0f710879ab3fc892

                SHA1

                6691ab8b5e330ed9f779421b91eb35f26996acd8

                SHA256

                a16d751ccb1b45db3b55d2398e89c075606eb20980d503e9d1d5aaaea7f8d49a

                SHA512

                956d8f78a697001a384386167ae1483d46bfb1ebffb7064cb9c3a2a7eedabcec8c1219a5ba18684721f4468b19a4265bcfbfb75541de9adec15373dcfc51ddbb

              • C:\Users\Admin\AppData\Roaming\006700e5a2ab05\clip64.dll

                Filesize

                89KB

                MD5

                547bae937be965d63f61d89e8eafb4a1

                SHA1

                85466c95625bcbb7f68aa89a367149d35f80e1fa

                SHA256

                015d60486e75035f83ea454e87afb38d11ec39643c33b07f61a40343078ee4f5

                SHA512

                1869b1cd3dcc09fbf9f965a8f45b647390e8859e6bf476293cbfd8b1122c660eca5db2943f0b1e77d451684fdef34ae503d5f357408e1a4fe5c1237871f5d02f

              • C:\Users\Admin\AppData\Roaming\006700e5a2ab05\clip64.dll

                Filesize

                89KB

                MD5

                547bae937be965d63f61d89e8eafb4a1

                SHA1

                85466c95625bcbb7f68aa89a367149d35f80e1fa

                SHA256

                015d60486e75035f83ea454e87afb38d11ec39643c33b07f61a40343078ee4f5

                SHA512

                1869b1cd3dcc09fbf9f965a8f45b647390e8859e6bf476293cbfd8b1122c660eca5db2943f0b1e77d451684fdef34ae503d5f357408e1a4fe5c1237871f5d02f

              • C:\Users\Admin\AppData\Roaming\006700e5a2ab05\cred64.dll

                Filesize

                162B

                MD5

                1b7c22a214949975556626d7217e9a39

                SHA1

                d01c97e2944166ed23e47e4a62ff471ab8fa031f

                SHA256

                340c8464c2007ce3f80682e15dfafa4180b641d53c14201b929906b7b0284d87

                SHA512

                ba64847cf1d4157d50abe4f4a1e5c1996fe387c5808e2f758c7fb3213bfefe1f3712d343f0c30a16819749840954654a70611d2250fd0f7b032429db7afd2cc5

              • \Users\Admin\AppData\Roaming\006700e5a2ab05\clip64.dll

                Filesize

                89KB

                MD5

                547bae937be965d63f61d89e8eafb4a1

                SHA1

                85466c95625bcbb7f68aa89a367149d35f80e1fa

                SHA256

                015d60486e75035f83ea454e87afb38d11ec39643c33b07f61a40343078ee4f5

                SHA512

                1869b1cd3dcc09fbf9f965a8f45b647390e8859e6bf476293cbfd8b1122c660eca5db2943f0b1e77d451684fdef34ae503d5f357408e1a4fe5c1237871f5d02f

              • memory/3064-181-0x0000000000400000-0x000000000042E000-memory.dmp

                Filesize

                184KB

              • memory/3064-189-0x0000000006FE0000-0x0000000006FE6000-memory.dmp

                Filesize

                24KB

              • memory/3064-194-0x000000000EB90000-0x000000000EBDB000-memory.dmp

                Filesize

                300KB

              • memory/3064-199-0x00000000095C0000-0x00000000095D0000-memory.dmp

                Filesize

                64KB

              • memory/4916-160-0x0000000000400000-0x000000000040A000-memory.dmp

                Filesize

                40KB

              • memory/4988-144-0x0000000005500000-0x0000000005512000-memory.dmp

                Filesize

                72KB

              • memory/4988-155-0x00000000068E0000-0x0000000006930000-memory.dmp

                Filesize

                320KB

              • memory/4988-154-0x00000000054F0000-0x0000000005500000-memory.dmp

                Filesize

                64KB

              • memory/4988-153-0x0000000008DB0000-0x00000000092DC000-memory.dmp

                Filesize

                5.2MB

              • memory/4988-152-0x0000000006A00000-0x0000000006BC2000-memory.dmp

                Filesize

                1.8MB

              • memory/4988-151-0x0000000006C30000-0x000000000712E000-memory.dmp

                Filesize

                5.0MB

              • memory/4988-150-0x00000000058E0000-0x0000000005946000-memory.dmp

                Filesize

                408KB

              • memory/4988-149-0x0000000005980000-0x0000000005A12000-memory.dmp

                Filesize

                584KB

              • memory/4988-148-0x0000000005860000-0x00000000058D6000-memory.dmp

                Filesize

                472KB

              • memory/4988-147-0x00000000055A0000-0x00000000055EB000-memory.dmp

                Filesize

                300KB

              • memory/4988-146-0x00000000054F0000-0x0000000005500000-memory.dmp

                Filesize

                64KB

              • memory/4988-145-0x0000000005560000-0x000000000559E000-memory.dmp

                Filesize

                248KB

              • memory/4988-143-0x0000000005610000-0x000000000571A000-memory.dmp

                Filesize

                1.0MB

              • memory/4988-142-0x0000000005B10000-0x0000000006116000-memory.dmp

                Filesize

                6.0MB

              • memory/4988-141-0x0000000002E00000-0x0000000002E06000-memory.dmp

                Filesize

                24KB

              • memory/4988-140-0x0000000000BD0000-0x0000000000BFE000-memory.dmp

                Filesize

                184KB