Analysis

  • max time kernel
    150s
  • max time network
    150s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20230703-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20230703-enlocale:en-usos:windows10-2004-x64system
  • submitted
    02/08/2023, 16:27

General

  • Target

    3888e69a25ddcddc3af5a054ad68753e851c7d457323578bb66f3397d826a060exe_JC.exe

  • Size

    642KB

  • MD5

    a108f7d47792cb8c605a702363ba1870

  • SHA1

    1d005b4537eda1aef19b755701a31defbf39818e

  • SHA256

    3888e69a25ddcddc3af5a054ad68753e851c7d457323578bb66f3397d826a060

  • SHA512

    9e445e318bfe9315142dba1c46488392b82a56f452175db824d630334819237ef81e88bb31ce7d78fa2c1a82a845dcf93d66b076b43eaf6b1e03445c81e09574

  • SSDEEP

    12288:EMrKy90n+lbnFvSHm5gtsfPmbbUSUy23DbsVTEp6U87U:OyaMxvuXUDXTbspDU

Malware Config

Extracted

Family

amadey

Version

3.86

C2

77.91.68.61/rock/index.php

Extracted

Family

smokeloader

Version

2022

C2

http://77.91.68.29/fks/

rc4.i32
rc4.i32

Extracted

Family

redline

Botnet

papik

C2

77.91.124.156:19071

Attributes
  • auth_value

    325a615d8be5db8e2f7a4c2448fdac3a

Signatures

  • Amadey

    Amadey bot is a simple trojan bot primarily used for collecting reconnaissance information.

  • Detects Healer an antivirus disabler dropper 3 IoCs
  • Healer

    Healer an antivirus disabler dropper.

  • Modifies Windows Defender Real-time Protection settings 3 TTPs 6 IoCs
  • RedLine

    RedLine Stealer is a malware family written in C#, first appearing in early 2020.

  • SmokeLoader

    Modular backdoor trojan in use since 2014.

  • Executes dropped EXE 10 IoCs
  • Loads dropped DLL 1 IoCs
  • Windows security modification 2 TTPs 1 IoCs
  • Adds Run key to start application 2 TTPs 4 IoCs
  • Launches sc.exe 1 IoCs

    Sc.exe is a Windows utlilty to control services on the system.

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Creates scheduled task(s) 1 TTPs 1 IoCs

    Schtasks is often used by malware for persistence or to perform post-infection execution.

  • Modifies registry class 2 IoCs
  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs
  • Suspicious behavior: MapViewOfSection 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of UnmapMainImage 1 IoCs
  • Suspicious use of WriteProcessMemory 50 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\3888e69a25ddcddc3af5a054ad68753e851c7d457323578bb66f3397d826a060exe_JC.exe
    "C:\Users\Admin\AppData\Local\Temp\3888e69a25ddcddc3af5a054ad68753e851c7d457323578bb66f3397d826a060exe_JC.exe"
    1⤵
    • Adds Run key to start application
    • Suspicious use of WriteProcessMemory
    PID:4712
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\v5465294.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\v5465294.exe
      2⤵
      • Executes dropped EXE
      • Adds Run key to start application
      • Suspicious use of WriteProcessMemory
      PID:3120
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\v7480921.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\v7480921.exe
        3⤵
        • Executes dropped EXE
        • Adds Run key to start application
        • Suspicious use of WriteProcessMemory
        PID:3128
        • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\v8162098.exe
          C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\v8162098.exe
          4⤵
          • Executes dropped EXE
          • Adds Run key to start application
          • Suspicious use of WriteProcessMemory
          PID:2344
          • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\a6633147.exe
            C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\a6633147.exe
            5⤵
            • Modifies Windows Defender Real-time Protection settings
            • Executes dropped EXE
            • Windows security modification
            • Suspicious behavior: EnumeratesProcesses
            • Suspicious use of AdjustPrivilegeToken
            PID:2428
          • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\b5635833.exe
            C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\b5635833.exe
            5⤵
            • Executes dropped EXE
            • Suspicious use of FindShellTrayWindow
            • Suspicious use of WriteProcessMemory
            PID:4496
            • C:\Users\Admin\AppData\Local\Temp\925e7e99c5\pdates.exe
              "C:\Users\Admin\AppData\Local\Temp\925e7e99c5\pdates.exe"
              6⤵
              • Executes dropped EXE
              • Suspicious use of WriteProcessMemory
              PID:4352
              • C:\Windows\SysWOW64\schtasks.exe
                "C:\Windows\System32\schtasks.exe" /Create /SC MINUTE /MO 1 /TN pdates.exe /TR "C:\Users\Admin\AppData\Local\Temp\925e7e99c5\pdates.exe" /F
                7⤵
                • Creates scheduled task(s)
                PID:3832
              • C:\Windows\SysWOW64\cmd.exe
                "C:\Windows\System32\cmd.exe" /k echo Y|CACLS "pdates.exe" /P "Admin:N"&&CACLS "pdates.exe" /P "Admin:R" /E&&echo Y|CACLS "..\925e7e99c5" /P "Admin:N"&&CACLS "..\925e7e99c5" /P "Admin:R" /E&&Exit
                7⤵
                • Suspicious use of WriteProcessMemory
                PID:3672
                • C:\Windows\SysWOW64\cmd.exe
                  C:\Windows\system32\cmd.exe /S /D /c" echo Y"
                  8⤵
                    PID:1596
                  • C:\Windows\SysWOW64\cacls.exe
                    CACLS "pdates.exe" /P "Admin:N"
                    8⤵
                      PID:5072
                    • C:\Windows\SysWOW64\cacls.exe
                      CACLS "pdates.exe" /P "Admin:R" /E
                      8⤵
                        PID:4872
                      • C:\Windows\SysWOW64\cmd.exe
                        C:\Windows\system32\cmd.exe /S /D /c" echo Y"
                        8⤵
                          PID:980
                        • C:\Windows\SysWOW64\cacls.exe
                          CACLS "..\925e7e99c5" /P "Admin:N"
                          8⤵
                            PID:3792
                          • C:\Windows\SysWOW64\cacls.exe
                            CACLS "..\925e7e99c5" /P "Admin:R" /E
                            8⤵
                              PID:2572
                          • C:\Windows\SysWOW64\rundll32.exe
                            "C:\Windows\System32\rundll32.exe" C:\Users\Admin\AppData\Roaming\006700e5a2ab05\clip64.dll, Main
                            7⤵
                            • Loads dropped DLL
                            PID:3920
                    • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\c6674632.exe
                      C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\c6674632.exe
                      4⤵
                      • Executes dropped EXE
                      • Suspicious behavior: EnumeratesProcesses
                      • Suspicious behavior: MapViewOfSection
                      PID:2848
                  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\d1030566.exe
                    C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\d1030566.exe
                    3⤵
                    • Executes dropped EXE
                    PID:4504
              • C:\Users\Admin\AppData\Local\Temp\925e7e99c5\pdates.exe
                C:\Users\Admin\AppData\Local\Temp\925e7e99c5\pdates.exe
                1⤵
                • Executes dropped EXE
                PID:4988
              • C:\Users\Admin\AppData\Local\Temp\925e7e99c5\pdates.exe
                C:\Users\Admin\AppData\Local\Temp\925e7e99c5\pdates.exe
                1⤵
                • Executes dropped EXE
                PID:3360
              • C:\Windows\system32\sc.exe
                C:\Windows\system32\sc.exe start wuauserv
                1⤵
                • Launches sc.exe
                PID:4972

              Network

              MITRE ATT&CK Enterprise v15

              Replay Monitor

              Loading Replay Monitor...

              Downloads

              • C:\Users\Admin\AppData\Local\Temp\925e7e99c5\pdates.exe

                Filesize

                227KB

                MD5

                0e6850bd6a688876c7a054e428a43248

                SHA1

                04aef49bf665b405fa95b5e3e36e163a5cb7c1d7

                SHA256

                f66429c1c384c1209561af87609aef2400303cacbef3d8a4d3f35778125213f0

                SHA512

                e98080c96c560d7fe73d8b45bc11880f73b503d63b929991b1a6e50f058fe164a8ae2721b6085052e0f6cb823f2738170643ec3bdefd1939001d248a8776e605

              • C:\Users\Admin\AppData\Local\Temp\925e7e99c5\pdates.exe

                Filesize

                227KB

                MD5

                0e6850bd6a688876c7a054e428a43248

                SHA1

                04aef49bf665b405fa95b5e3e36e163a5cb7c1d7

                SHA256

                f66429c1c384c1209561af87609aef2400303cacbef3d8a4d3f35778125213f0

                SHA512

                e98080c96c560d7fe73d8b45bc11880f73b503d63b929991b1a6e50f058fe164a8ae2721b6085052e0f6cb823f2738170643ec3bdefd1939001d248a8776e605

              • C:\Users\Admin\AppData\Local\Temp\925e7e99c5\pdates.exe

                Filesize

                227KB

                MD5

                0e6850bd6a688876c7a054e428a43248

                SHA1

                04aef49bf665b405fa95b5e3e36e163a5cb7c1d7

                SHA256

                f66429c1c384c1209561af87609aef2400303cacbef3d8a4d3f35778125213f0

                SHA512

                e98080c96c560d7fe73d8b45bc11880f73b503d63b929991b1a6e50f058fe164a8ae2721b6085052e0f6cb823f2738170643ec3bdefd1939001d248a8776e605

              • C:\Users\Admin\AppData\Local\Temp\925e7e99c5\pdates.exe

                Filesize

                227KB

                MD5

                0e6850bd6a688876c7a054e428a43248

                SHA1

                04aef49bf665b405fa95b5e3e36e163a5cb7c1d7

                SHA256

                f66429c1c384c1209561af87609aef2400303cacbef3d8a4d3f35778125213f0

                SHA512

                e98080c96c560d7fe73d8b45bc11880f73b503d63b929991b1a6e50f058fe164a8ae2721b6085052e0f6cb823f2738170643ec3bdefd1939001d248a8776e605

              • C:\Users\Admin\AppData\Local\Temp\925e7e99c5\pdates.exe

                Filesize

                227KB

                MD5

                0e6850bd6a688876c7a054e428a43248

                SHA1

                04aef49bf665b405fa95b5e3e36e163a5cb7c1d7

                SHA256

                f66429c1c384c1209561af87609aef2400303cacbef3d8a4d3f35778125213f0

                SHA512

                e98080c96c560d7fe73d8b45bc11880f73b503d63b929991b1a6e50f058fe164a8ae2721b6085052e0f6cb823f2738170643ec3bdefd1939001d248a8776e605

              • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\v5465294.exe

                Filesize

                514KB

                MD5

                1a4e949b3c06279ff86107941b848ab9

                SHA1

                50c9fa5975a45e0aa837bf9ccaa4361dd6821427

                SHA256

                68ffd85e666b33333d977eaf43f2d0c7137fb59244f584e36f4e197c4e2b5b7e

                SHA512

                fdfce863edaec6faf75a16554314b07337a5cd98ce12cebb007900d5c99e43c345e3e8605040ba3b97db477c110b425ec7d6fb13df6e62adf19c9372959f44c9

              • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\v5465294.exe

                Filesize

                514KB

                MD5

                1a4e949b3c06279ff86107941b848ab9

                SHA1

                50c9fa5975a45e0aa837bf9ccaa4361dd6821427

                SHA256

                68ffd85e666b33333d977eaf43f2d0c7137fb59244f584e36f4e197c4e2b5b7e

                SHA512

                fdfce863edaec6faf75a16554314b07337a5cd98ce12cebb007900d5c99e43c345e3e8605040ba3b97db477c110b425ec7d6fb13df6e62adf19c9372959f44c9

              • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\d1030566.exe

                Filesize

                173KB

                MD5

                f330d4d00ef4cd0f560ce1d483c6c245

                SHA1

                4f009504dafefaea981ccb243e38cc91b0c81b2b

                SHA256

                a656b71177290cdae9e1ebda2b5df0428f9ede8139daa0af5772980034c6d511

                SHA512

                1e14acba90501e9b27249ec0b07397a02dc446a1a2820ebe55c9c3858fa1e1d7694cbcfc45795b9e2babed9662cd2a18f4433899235df90412797d012fe7dfc5

              • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\d1030566.exe

                Filesize

                173KB

                MD5

                f330d4d00ef4cd0f560ce1d483c6c245

                SHA1

                4f009504dafefaea981ccb243e38cc91b0c81b2b

                SHA256

                a656b71177290cdae9e1ebda2b5df0428f9ede8139daa0af5772980034c6d511

                SHA512

                1e14acba90501e9b27249ec0b07397a02dc446a1a2820ebe55c9c3858fa1e1d7694cbcfc45795b9e2babed9662cd2a18f4433899235df90412797d012fe7dfc5

              • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\v7480921.exe

                Filesize

                359KB

                MD5

                a387e6058e366522eb32ffc52755aedf

                SHA1

                51e20e19fec5adf49ca24d0a8374b47e895a7343

                SHA256

                987ad88446d0f4d36f29cbd218bf9d3150353a3240ae3860f9dfec6b48544773

                SHA512

                c792be7018eb101dbecd51b16cd777963c2cdc0dede83f7912ce5b1b7450e8f841a6c2fd1d34de05f1082d4654138ecf9cec916ea40ddf6e49cb6e5da37ec3b3

              • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\v7480921.exe

                Filesize

                359KB

                MD5

                a387e6058e366522eb32ffc52755aedf

                SHA1

                51e20e19fec5adf49ca24d0a8374b47e895a7343

                SHA256

                987ad88446d0f4d36f29cbd218bf9d3150353a3240ae3860f9dfec6b48544773

                SHA512

                c792be7018eb101dbecd51b16cd777963c2cdc0dede83f7912ce5b1b7450e8f841a6c2fd1d34de05f1082d4654138ecf9cec916ea40ddf6e49cb6e5da37ec3b3

              • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\c6674632.exe

                Filesize

                37KB

                MD5

                e3d17fba92a6faf9c63f62e678650db1

                SHA1

                fec2c7959226f5a1ddadd6fd654d86d1882f77c3

                SHA256

                f41b32d779954ff3b2808679384be0eb0fed411ce899551cd49f3b1e284b7d64

                SHA512

                0bfc2b99453606b80502b72d5c10eb1def5476b74aca8405ad1b57f5f1e4fa3d354af73d55883c3452dff6d5a12c6c245a110d17142bec1d1c1f1a8ad3b04a39

              • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\c6674632.exe

                Filesize

                37KB

                MD5

                e3d17fba92a6faf9c63f62e678650db1

                SHA1

                fec2c7959226f5a1ddadd6fd654d86d1882f77c3

                SHA256

                f41b32d779954ff3b2808679384be0eb0fed411ce899551cd49f3b1e284b7d64

                SHA512

                0bfc2b99453606b80502b72d5c10eb1def5476b74aca8405ad1b57f5f1e4fa3d354af73d55883c3452dff6d5a12c6c245a110d17142bec1d1c1f1a8ad3b04a39

              • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\v8162098.exe

                Filesize

                234KB

                MD5

                beebd0fce2366060385374d93e70f39f

                SHA1

                b0fc6a1d356372072ae8868c4d534167a0780a6a

                SHA256

                22898a4ff228bf180d3d6e2af38d54a1acd2526b1219103d8612b9590644c34d

                SHA512

                c19ef2ad187a0fc7423191d4b8c66c9810b25158ac558b47cc8c91d9fa02f6d2e49da73cfce98d45c10ec4e8a7270c66f8287d03543d9c7d7fedc68fc924675c

              • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\v8162098.exe

                Filesize

                234KB

                MD5

                beebd0fce2366060385374d93e70f39f

                SHA1

                b0fc6a1d356372072ae8868c4d534167a0780a6a

                SHA256

                22898a4ff228bf180d3d6e2af38d54a1acd2526b1219103d8612b9590644c34d

                SHA512

                c19ef2ad187a0fc7423191d4b8c66c9810b25158ac558b47cc8c91d9fa02f6d2e49da73cfce98d45c10ec4e8a7270c66f8287d03543d9c7d7fedc68fc924675c

              • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\a6633147.exe

                Filesize

                11KB

                MD5

                5708320d0a2057b1f7f1378217f3c1ee

                SHA1

                e5668a11e0ec705ae47e52c54ea46013848ac9d7

                SHA256

                bc26a2f94418b2b4aa866d6c6f17903bea6a6db783d2c6fdda7b6e90046f7290

                SHA512

                51afc0e5ec6af6c0b38ad6960df288324ff2f7417fc8af69861767f5ae3a9b6b3dada05cd7a1d8a0a401de92d090f156f8bde469c57dded6b8c27ac90f27e59c

              • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\a6633147.exe

                Filesize

                11KB

                MD5

                5708320d0a2057b1f7f1378217f3c1ee

                SHA1

                e5668a11e0ec705ae47e52c54ea46013848ac9d7

                SHA256

                bc26a2f94418b2b4aa866d6c6f17903bea6a6db783d2c6fdda7b6e90046f7290

                SHA512

                51afc0e5ec6af6c0b38ad6960df288324ff2f7417fc8af69861767f5ae3a9b6b3dada05cd7a1d8a0a401de92d090f156f8bde469c57dded6b8c27ac90f27e59c

              • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\b5635833.exe

                Filesize

                227KB

                MD5

                0e6850bd6a688876c7a054e428a43248

                SHA1

                04aef49bf665b405fa95b5e3e36e163a5cb7c1d7

                SHA256

                f66429c1c384c1209561af87609aef2400303cacbef3d8a4d3f35778125213f0

                SHA512

                e98080c96c560d7fe73d8b45bc11880f73b503d63b929991b1a6e50f058fe164a8ae2721b6085052e0f6cb823f2738170643ec3bdefd1939001d248a8776e605

              • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\b5635833.exe

                Filesize

                227KB

                MD5

                0e6850bd6a688876c7a054e428a43248

                SHA1

                04aef49bf665b405fa95b5e3e36e163a5cb7c1d7

                SHA256

                f66429c1c384c1209561af87609aef2400303cacbef3d8a4d3f35778125213f0

                SHA512

                e98080c96c560d7fe73d8b45bc11880f73b503d63b929991b1a6e50f058fe164a8ae2721b6085052e0f6cb823f2738170643ec3bdefd1939001d248a8776e605

              • C:\Users\Admin\AppData\Roaming\006700e5a2ab05\clip64.dll

                Filesize

                89KB

                MD5

                2392b231cf4a80739b5cb09bf808127d

                SHA1

                41b5cf81c50884954911d96444fe83cfd0da465b

                SHA256

                2244b4dc9afc6cfab7ef1dea92420e2acd275bac7349b929a69f3c1ae25f5e2f

                SHA512

                19ceba063fa1cc1d0116eb11b18d6301a0e1eeda1cb5b983e331e59e4f12e4d0e36d7b4a1d8259dff57a79c47fdcedf89de8e255d932452e441762e4d440ce34

              • C:\Users\Admin\AppData\Roaming\006700e5a2ab05\clip64.dll

                Filesize

                89KB

                MD5

                2392b231cf4a80739b5cb09bf808127d

                SHA1

                41b5cf81c50884954911d96444fe83cfd0da465b

                SHA256

                2244b4dc9afc6cfab7ef1dea92420e2acd275bac7349b929a69f3c1ae25f5e2f

                SHA512

                19ceba063fa1cc1d0116eb11b18d6301a0e1eeda1cb5b983e331e59e4f12e4d0e36d7b4a1d8259dff57a79c47fdcedf89de8e255d932452e441762e4d440ce34

              • C:\Users\Admin\AppData\Roaming\006700e5a2ab05\clip64.dll

                Filesize

                89KB

                MD5

                2392b231cf4a80739b5cb09bf808127d

                SHA1

                41b5cf81c50884954911d96444fe83cfd0da465b

                SHA256

                2244b4dc9afc6cfab7ef1dea92420e2acd275bac7349b929a69f3c1ae25f5e2f

                SHA512

                19ceba063fa1cc1d0116eb11b18d6301a0e1eeda1cb5b983e331e59e4f12e4d0e36d7b4a1d8259dff57a79c47fdcedf89de8e255d932452e441762e4d440ce34

              • C:\Users\Admin\AppData\Roaming\006700e5a2ab05\cred64.dll

                Filesize

                273B

                MD5

                9851b884bf4aadfade57d911a3f03332

                SHA1

                aaadd1c1856c22844bb9fbb030cf4f586ed8866a

                SHA256

                03afb988f3eec62c2da682af371625adcac5a0e69615298f83d99365ab07ac0f

                SHA512

                a7de560f51bacd381d3e741f887c3c40ece88521ee93a22a4f7448297e8bda2131be866d9ae6438c528d9f40a277c18bae517deec16b6b723f67d4c308031327

              • memory/704-182-0x0000000003140000-0x0000000003156000-memory.dmp

                Filesize

                88KB

              • memory/2428-162-0x00007FFBD0E40000-0x00007FFBD1901000-memory.dmp

                Filesize

                10.8MB

              • memory/2428-161-0x0000000000170000-0x000000000017A000-memory.dmp

                Filesize

                40KB

              • memory/2428-164-0x00007FFBD0E40000-0x00007FFBD1901000-memory.dmp

                Filesize

                10.8MB

              • memory/2848-183-0x0000000000400000-0x0000000000409000-memory.dmp

                Filesize

                36KB

              • memory/2848-181-0x0000000000400000-0x0000000000409000-memory.dmp

                Filesize

                36KB

              • memory/4504-193-0x000000000A970000-0x000000000A982000-memory.dmp

                Filesize

                72KB

              • memory/4504-196-0x0000000072A90000-0x0000000073240000-memory.dmp

                Filesize

                7.7MB

              • memory/4504-197-0x00000000053E0000-0x00000000053F0000-memory.dmp

                Filesize

                64KB

              • memory/4504-190-0x0000000072A90000-0x0000000073240000-memory.dmp

                Filesize

                7.7MB

              • memory/4504-189-0x0000000000A80000-0x0000000000AB0000-memory.dmp

                Filesize

                192KB

              • memory/4504-195-0x000000000A9D0000-0x000000000AA0C000-memory.dmp

                Filesize

                240KB

              • memory/4504-191-0x000000000AED0000-0x000000000B4E8000-memory.dmp

                Filesize

                6.1MB

              • memory/4504-194-0x00000000053E0000-0x00000000053F0000-memory.dmp

                Filesize

                64KB

              • memory/4504-192-0x000000000AA30000-0x000000000AB3A000-memory.dmp

                Filesize

                1.0MB