Analysis

  • max time kernel
    150s
  • max time network
    150s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240412-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240412-enlocale:en-usos:windows10-2004-x64system
  • submitted
    23-04-2024 16:34

General

  • Target

    f99089673708f6b9403d9f29bb38e57ccbbe1db817ba76a17d424916c728348e.exe

  • Size

    1.8MB

  • MD5

    a47c31ff0e32425ba792daf86a62e6ba

  • SHA1

    a84712ecf1ab33b7c2c9d80672fb0a45da10d3cc

  • SHA256

    f99089673708f6b9403d9f29bb38e57ccbbe1db817ba76a17d424916c728348e

  • SHA512

    26bdcac91c9fc5a76e1d1c8545c3fb6c6bd25208024d070cb4d82eaf1bc8efafe7aaaeb2cff31541d810b5ce6da4a97a66950a862ef8eb2e1fdefb512e0c4038

  • SSDEEP

    49152:ckrrVR7tlJzqaOdFLlVRpUXsNWeqKtqvQT4aH4tyeJ7:ckzfJzpSUQTq+5FN

Malware Config

Extracted

Family

amadey

Version

4.17

C2

http://193.233.132.167

Attributes
  • install_dir

    4d0ab15804

  • install_file

    chrosha.exe

  • strings_key

    1a9519d7b465e1f4880fa09a6162d768

  • url_paths

    /enigma/index.php

rc4.plain

Signatures

  • Amadey

    Amadey bot is a simple trojan bot primarily used for collecting reconnaissance information.

  • Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs 2 IoCs
  • Blocklisted process makes network request 2 IoCs
  • Downloads MZ/PE file
  • Stops running service(s) 3 TTPs
  • Checks BIOS information in registry 2 TTPs 4 IoCs

    BIOS information is often read in order to detect sandboxing environments.

  • Checks computer location settings 2 TTPs 2 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Executes dropped EXE 14 IoCs
  • Identifies Wine through registry keys 2 TTPs 2 IoCs

    Wine is a compatibility layer capable of running Windows applications, which can be used as sandboxing environment.

  • Loads dropped DLL 4 IoCs
  • Reads WinSCP keys stored on the system 2 TTPs

    Tries to access WinSCP stored sessions.

  • Reads local data of messenger clients 2 TTPs

    Infostealers often target stored data of messaging applications, which can include saved credentials and account information.

  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Suspicious use of NtSetInformationThreadHideFromDebugger 2 IoCs
  • Drops file in Program Files directory 10 IoCs
  • Drops file in Windows directory 1 IoCs
  • Launches sc.exe 2 IoCs

    Sc.exe is a Windows utlilty to control services on the system.

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Suspicious behavior: EnumeratesProcesses 17 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of WriteProcessMemory 56 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\f99089673708f6b9403d9f29bb38e57ccbbe1db817ba76a17d424916c728348e.exe
    "C:\Users\Admin\AppData\Local\Temp\f99089673708f6b9403d9f29bb38e57ccbbe1db817ba76a17d424916c728348e.exe"
    1⤵
    • Identifies VirtualBox via ACPI registry values (likely anti-VM)
    • Checks BIOS information in registry
    • Identifies Wine through registry keys
    • Suspicious use of NtSetInformationThreadHideFromDebugger
    • Drops file in Windows directory
    • Suspicious behavior: EnumeratesProcesses
    PID:4468
  • C:\Users\Admin\AppData\Local\Temp\4d0ab15804\chrosha.exe
    C:\Users\Admin\AppData\Local\Temp\4d0ab15804\chrosha.exe
    1⤵
    • Identifies VirtualBox via ACPI registry values (likely anti-VM)
    • Checks BIOS information in registry
    • Checks computer location settings
    • Executes dropped EXE
    • Identifies Wine through registry keys
    • Suspicious use of NtSetInformationThreadHideFromDebugger
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of WriteProcessMemory
    PID:3476
    • C:\Users\Admin\AppData\Local\Temp\1000208001\install.exe
      "C:\Users\Admin\AppData\Local\Temp\1000208001\install.exe"
      2⤵
      • Checks computer location settings
      • Executes dropped EXE
      • Drops file in Program Files directory
      • Suspicious use of WriteProcessMemory
      PID:1044
      • C:\Windows\SysWOW64\cmd.exe
        C:\Windows\system32\cmd.exe /c ""C:\Program Files (x86)\GameServerClient\installg.bat" "
        3⤵
        • Suspicious use of WriteProcessMemory
        PID:4464
        • C:\Windows\SysWOW64\sc.exe
          Sc delete GameServerClient
          4⤵
          • Launches sc.exe
          PID:4368
        • C:\Program Files (x86)\GameServerClient\GameService.exe
          GameService remove GameServerClient confirm
          4⤵
          • Executes dropped EXE
          PID:3548
        • C:\Program Files (x86)\GameServerClient\GameService.exe
          GameService install GameServerClient "C:\Program Files (x86)\GameServerClient\GameServerClient.exe"
          4⤵
          • Executes dropped EXE
          PID:3856
        • C:\Program Files (x86)\GameServerClient\GameService.exe
          GameService start GameServerClient
          4⤵
          • Executes dropped EXE
          PID:1612
      • C:\Windows\SysWOW64\cmd.exe
        C:\Windows\system32\cmd.exe /c ""C:\Program Files (x86)\GameServerClient\installc.bat" "
        3⤵
        • Suspicious use of WriteProcessMemory
        PID:4632
        • C:\Windows\SysWOW64\sc.exe
          Sc delete GameServerClientC
          4⤵
          • Launches sc.exe
          PID:2360
        • C:\Program Files (x86)\GameServerClient\GameService.exe
          GameService remove GameServerClientC confirm
          4⤵
          • Executes dropped EXE
          PID:684
        • C:\Program Files (x86)\GameServerClient\GameService.exe
          GameService install GameServerClientC "C:\Program Files (x86)\GameServerClient\GameServerClientC.exe"
          4⤵
          • Executes dropped EXE
          PID:4740
        • C:\Program Files (x86)\GameServerClient\GameService.exe
          GameService start GameServerClientC
          4⤵
          • Executes dropped EXE
          PID:3128
      • C:\Windows\SysWOW64\cmd.exe
        C:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\7ZSfx000.cmd" "
        3⤵
          PID:4360
      • C:\Windows\SysWOW64\rundll32.exe
        "C:\Windows\System32\rundll32.exe" C:\Users\Admin\AppData\Roaming\c1ec479e5342a2\cred64.dll, Main
        2⤵
        • Loads dropped DLL
        • Suspicious use of WriteProcessMemory
        PID:4536
        • C:\Windows\system32\rundll32.exe
          "C:\Windows\System32\rundll32.exe" C:\Users\Admin\AppData\Roaming\c1ec479e5342a2\cred64.dll, Main
          3⤵
          • Blocklisted process makes network request
          • Loads dropped DLL
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of WriteProcessMemory
          PID:3116
          • C:\Windows\system32\netsh.exe
            netsh wlan show profiles
            4⤵
              PID:4460
            • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
              powershell -Command Compress-Archive -Path 'C:\Users\Admin\AppData\Local\Temp\_Files_\' -DestinationPath 'C:\Users\Admin\AppData\Local\Temp\084619521222_Desktop.zip' -CompressionLevel Optimal
              4⤵
              • Suspicious behavior: EnumeratesProcesses
              • Suspicious use of AdjustPrivilegeToken
              PID:2640
        • C:\Windows\SysWOW64\rundll32.exe
          "C:\Windows\System32\rundll32.exe" C:\Users\Admin\AppData\Roaming\c1ec479e5342a2\clip64.dll, Main
          2⤵
          • Blocklisted process makes network request
          • Loads dropped DLL
          PID:4224
      • C:\Program Files (x86)\GameServerClient\GameService.exe
        "C:\Program Files (x86)\GameServerClient\GameService.exe"
        1⤵
        • Executes dropped EXE
        • Suspicious use of WriteProcessMemory
        PID:4312
        • C:\Program Files (x86)\GameServerClient\GameServerClient.exe
          "C:\Program Files (x86)\GameServerClient\GameServerClient.exe"
          2⤵
          • Executes dropped EXE
          • Suspicious use of WriteProcessMemory
          PID:1224
          • C:\Windows\Temp\595759.exe
            "C:\Windows\Temp\595759.exe" --list-devices
            3⤵
            • Executes dropped EXE
            • Loads dropped DLL
            PID:880
      • C:\Program Files (x86)\GameServerClient\GameService.exe
        "C:\Program Files (x86)\GameServerClient\GameService.exe"
        1⤵
        • Executes dropped EXE
        • Suspicious use of WriteProcessMemory
        PID:4828
        • C:\Program Files (x86)\GameServerClient\GameServerClientC.exe
          "C:\Program Files (x86)\GameServerClient\GameServerClientC.exe"
          2⤵
          • Executes dropped EXE
          • Suspicious use of WriteProcessMemory
          PID:1800
          • C:\Windows\Temp\941958.exe
            "C:\Windows\Temp\941958.exe" --coin BTC -m ADDRESSES -t 0 --range 30035452740000000:30035452760000000 -o xxx0.txt -i C:\Windows\Temp\curjob.bin
            3⤵
            • Executes dropped EXE
            PID:4280

      Network

      MITRE ATT&CK Matrix ATT&CK v13

      Persistence

      Create or Modify System Process

      1
      T1543

      Windows Service

      1
      T1543.003

      Privilege Escalation

      Create or Modify System Process

      1
      T1543

      Windows Service

      1
      T1543.003

      Defense Evasion

      Virtualization/Sandbox Evasion

      2
      T1497

      Impair Defenses

      1
      T1562

      Credential Access

      Unsecured Credentials

      3
      T1552

      Credentials In Files

      2
      T1552.001

      Credentials in Registry

      1
      T1552.002

      Discovery

      Query Registry

      4
      T1012

      Virtualization/Sandbox Evasion

      2
      T1497

      System Information Discovery

      3
      T1082

      Collection

      Data from Local System

      3
      T1005

      Impact

      Service Stop

      1
      T1489

      Replay Monitor

      Loading Replay Monitor...

      Downloads

      • C:\Program Files (x86)\GameServerClient\GameServerClient.exe
        Filesize

        2.5MB

        MD5

        bf4360d76b38ed71a8ec2391f1985a5f

        SHA1

        57d28dc8fd4ac052d0ae32ca22143e7b57733003

        SHA256

        4ebec636d15203378e15cc11967d00cbd17e040db1fca85cf3c10bbf7451adaf

        SHA512

        7b46bc87dc384d8227adf5b538861165fa9efa18e28f2de5c1a1bb1a3a9f6bef29b449706c4d8e637ae9805bb51c8548cb761facf82d1c273d3e3699ae727acd

      • C:\Program Files (x86)\GameServerClient\GameServerClientC.exe
        Filesize

        13.2MB

        MD5

        41b332ddc0b2faad06c4e94f689803af

        SHA1

        f30985161ff56a9a6af7e8c5e666494513e587ba

        SHA256

        49c32c99e5602a6fa8c8d0df198f0e3bb530777384d5103e90630a1b94f65ab0

        SHA512

        808b9c909741ebe64feb24c18b5dd9a802501adaa793670b899cdb26375baa0d35095b74cde768c462a085d76c4129abe7c8523132f5836c4e1ea2b081b755e1

      • C:\Program Files (x86)\GameServerClient\GameService.exe
        Filesize

        288KB

        MD5

        d9ec6f3a3b2ac7cd5eef07bd86e3efbc

        SHA1

        e1908caab6f938404af85a7df0f80f877a4d9ee6

        SHA256

        472232ca821b5c2ef562ab07f53638bc2cc82eae84cea13fbe674d6022b6481c

        SHA512

        1b6b8702dca3cb90fe64c4e48f2477045900c5e71dd96b84f673478bab1089febfa186bfc55aebd721ca73db1669145280ebb4e1862d3b9dc21f712cd76a07c4

      • C:\Program Files (x86)\GameServerClient\installc.bat
        Filesize

        244B

        MD5

        a3d3d85bc0b7945908dd1a5eaf6e6266

        SHA1

        8979e79895226f2d05f8af1e10b99e8496348131

        SHA256

        3aad1c9feb23c9383ee7e5c8cb966afd262142b2e0124b8e9cda010ea53f24c6

        SHA512

        9184b09bdc10fb3ec981624f286ab4228917f8b1f5cbec7ee875d468c38461395d970d860e3ff99cb184e8839ed6c3ca85a9eaffdd24f15c74b311623c48f618

      • C:\Program Files (x86)\GameServerClient\installg.bat
        Filesize

        238B

        MD5

        b6b57c523f3733580d973f0f79d5c609

        SHA1

        2cc30cfd66817274c84f71d46f60d9e578b7bf95

        SHA256

        d8d718641bdf39cca1a5db7bb52d3c66d400a97bef3cafdd81cd7e711a51c570

        SHA512

        d39440163592bc3b1cb7830f236a97d5819c10775e453637d5a04a981e9a336480c6b4701afdceba0d52dfe09413b7abe2ad58ff55b5057a26229f3ccdc3a7c7

      • C:\Users\Admin\AppData\Local\Temp\1000208001\install.exe
        Filesize

        2.4MB

        MD5

        55f780ea4dc5a5401b80915d69a55481

        SHA1

        5ebdde7f87637493de0a5e7a4ffcd59839672c4e

        SHA256

        c3014a898f63fab694a759d56bb0b3c979484eedd32708e1467e566b4f3dfa70

        SHA512

        680ca9d6f5aa4d53e7083858bfd4d3fc71f567993968edc83ddf262e15b2ed06f07c5a4c47e65f4874074213adf3cd978b8eaa658563694caf013fb126948697

      • C:\Users\Admin\AppData\Local\Temp\4d0ab15804\chrosha.exe
        Filesize

        1.8MB

        MD5

        a47c31ff0e32425ba792daf86a62e6ba

        SHA1

        a84712ecf1ab33b7c2c9d80672fb0a45da10d3cc

        SHA256

        f99089673708f6b9403d9f29bb38e57ccbbe1db817ba76a17d424916c728348e

        SHA512

        26bdcac91c9fc5a76e1d1c8545c3fb6c6bd25208024d070cb4d82eaf1bc8efafe7aaaeb2cff31541d810b5ce6da4a97a66950a862ef8eb2e1fdefb512e0c4038

      • C:\Users\Admin\AppData\Local\Temp\7ZSfx000.cmd
        Filesize

        208B

        MD5

        e6529123a8aa7b91e1b975db5b7a6702

        SHA1

        d3e61433b4e92b1be62df16eb832fe500f9c2b01

        SHA256

        4ea738aa13683e30a40ece53737a3370dcbf875894fbb1b7a367f375c46ea8d4

        SHA512

        a5eca909aea204bc6069349bea9edb389135d2d97acebcaf57bdf7d8e55e7d84bc046720e0a425a1f8060936ebb2b13dfb902abd5638a2485ff5e3cc461e2453

      • C:\Users\Admin\AppData\Local\Temp\__PSScriptPolicyTest_jyd2nr25.iur.ps1
        Filesize

        60B

        MD5

        d17fe0a3f47be24a6453e9ef58c94641

        SHA1

        6ab83620379fc69f80c0242105ddffd7d98d5d9d

        SHA256

        96ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7

        SHA512

        5b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82

      • C:\Users\Admin\AppData\Roaming\c1ec479e5342a2\clip64.dll
        Filesize

        109KB

        MD5

        154c3f1334dd435f562672f2664fea6b

        SHA1

        51dd25e2ba98b8546de163b8f26e2972a90c2c79

        SHA256

        5f431129f97f3d56929f1e5584819e091bd6c854d7e18503074737fc6d79e33f

        SHA512

        1bca69bbcdb7ecd418769e9d4befc458f9f8e3cee81feb7316bb61e189e2904f4431e4cc7d291e179a5dec441b959d428d8e433f579036f763bbad6460222841

      • C:\Users\Admin\AppData\Roaming\c1ec479e5342a2\cred64.dll
        Filesize

        1.2MB

        MD5

        f35b671fda2603ec30ace10946f11a90

        SHA1

        059ad6b06559d4db581b1879e709f32f80850872

        SHA256

        83e3df5bec15d5333935bea8b719a6d677e2fb3dc1cf9e18e7b82fd0438285c7

        SHA512

        b5fa27d08c64727cef7fdda5e68054a4359cd697df50d70d1d90da583195959a139066a6214531bbc5f20cd4f9bc1ca3e4244396547381291a6a1d2df9cf8705

      • C:\Windows\Temp\595759.exe
        Filesize

        2.0MB

        MD5

        5c9e996ee95437c15b8d312932e72529

        SHA1

        eb174c76a8759f4b85765fa24d751846f4a2d2ef

        SHA256

        0eecdbfabaaef36f497e944a6ceb468d01824f3ae6457b4ae4b3ac8e95eebb55

        SHA512

        935102aad64da7eeb3e4b172488b3a0395298d480f885ecedc5d8325f0a9eabeea8ba1ece512753ac170a03016c80ba4990786ab608b4de0b11e6343fbf2192b

      • C:\Windows\Temp\941958.exe
        Filesize

        13.1MB

        MD5

        bfe6b13011bbba05c28109cf6730f8a1

        SHA1

        28da37544341c3587c11c1f1f294505516434d40

        SHA256

        93fc509fc9fad8d0191ceb7fe43ae7be1ed176862eacf0f905120257b15ecbdd

        SHA512

        d717859dd8b04832588e9ada5f83a8e2953c6214364a189b1b731212a5d4cdd1ac441646339efc9484b38a49d518d70f09624028e0a12921d7f2778fd9982660

      • C:\Windows\Temp\cudart64_101.dll
        Filesize

        398KB

        MD5

        1d7955354884a9058e89bb8ea34415c9

        SHA1

        62c046984afd51877ecadad1eca209fda74c8cb1

        SHA256

        111f216aef35f45086888c3f0a30bb9ab48e2b333daeddafd3a76be037a22a6e

        SHA512

        7eb8739841c476cda3cf4c8220998bc8c435c04a89c4bbef27b8f3b904762dede224552b4204d35935562aa73f258c4e0ddb69d065f732cb06cc357796cdd1b2

      • C:\Windows\Temp\curjob.bin
        Filesize

        40B

        MD5

        193b08dc759cc99903fe03368dfe28fc

        SHA1

        cb88824917e3dfd377aa2fa9414ac4dc5f0548ca

        SHA256

        3bbabaf34f4b665814b26a70109cf5a20649e7ce9cc38b3e5a3e9c14bb22350a

        SHA512

        edecb72420350540aef987ff08d98196ebeffddea5285a4c36a6c36deb43286abba82004544c03daac457972a3fd79f74c2c8efdd12a1f49bf9d52f02ba69c30

      • memory/2640-124-0x000002B0EDBB0000-0x000002B0EDBC0000-memory.dmp
        Filesize

        64KB

      • memory/2640-122-0x000002B0EE360000-0x000002B0EE382000-memory.dmp
        Filesize

        136KB

      • memory/2640-133-0x00007FFF48470000-0x00007FFF48F31000-memory.dmp
        Filesize

        10.8MB

      • memory/2640-127-0x000002B0EDC80000-0x000002B0EDC8A000-memory.dmp
        Filesize

        40KB

      • memory/2640-126-0x000002B0EE3D0000-0x000002B0EE3E2000-memory.dmp
        Filesize

        72KB

      • memory/2640-125-0x000002B0EDBB0000-0x000002B0EDBC0000-memory.dmp
        Filesize

        64KB

      • memory/2640-123-0x00007FFF48470000-0x00007FFF48F31000-memory.dmp
        Filesize

        10.8MB

      • memory/3476-18-0x0000000000ED0000-0x000000000138C000-memory.dmp
        Filesize

        4.7MB

      • memory/3476-149-0x0000000000ED0000-0x000000000138C000-memory.dmp
        Filesize

        4.7MB

      • memory/3476-37-0x0000000000ED0000-0x000000000138C000-memory.dmp
        Filesize

        4.7MB

      • memory/3476-19-0x0000000004C60000-0x0000000004C61000-memory.dmp
        Filesize

        4KB

      • memory/3476-25-0x0000000004C90000-0x0000000004C91000-memory.dmp
        Filesize

        4KB

      • memory/3476-17-0x0000000000ED0000-0x000000000138C000-memory.dmp
        Filesize

        4.7MB

      • memory/3476-153-0x0000000000ED0000-0x000000000138C000-memory.dmp
        Filesize

        4.7MB

      • memory/3476-152-0x0000000000ED0000-0x000000000138C000-memory.dmp
        Filesize

        4.7MB

      • memory/3476-151-0x0000000000ED0000-0x000000000138C000-memory.dmp
        Filesize

        4.7MB

      • memory/3476-23-0x0000000004C30000-0x0000000004C31000-memory.dmp
        Filesize

        4KB

      • memory/3476-150-0x0000000000ED0000-0x000000000138C000-memory.dmp
        Filesize

        4.7MB

      • memory/3476-24-0x0000000004C40000-0x0000000004C41000-memory.dmp
        Filesize

        4KB

      • memory/3476-148-0x0000000000ED0000-0x000000000138C000-memory.dmp
        Filesize

        4.7MB

      • memory/3476-98-0x0000000000ED0000-0x000000000138C000-memory.dmp
        Filesize

        4.7MB

      • memory/3476-99-0x0000000000ED0000-0x000000000138C000-memory.dmp
        Filesize

        4.7MB

      • memory/3476-100-0x0000000000ED0000-0x000000000138C000-memory.dmp
        Filesize

        4.7MB

      • memory/3476-147-0x0000000000ED0000-0x000000000138C000-memory.dmp
        Filesize

        4.7MB

      • memory/3476-146-0x0000000000ED0000-0x000000000138C000-memory.dmp
        Filesize

        4.7MB

      • memory/3476-26-0x0000000004CC0000-0x0000000004CC1000-memory.dmp
        Filesize

        4KB

      • memory/3476-27-0x0000000004CB0000-0x0000000004CB1000-memory.dmp
        Filesize

        4KB

      • memory/3476-134-0x0000000000ED0000-0x000000000138C000-memory.dmp
        Filesize

        4.7MB

      • memory/3476-20-0x0000000004C70000-0x0000000004C71000-memory.dmp
        Filesize

        4KB

      • memory/3476-21-0x0000000004C50000-0x0000000004C51000-memory.dmp
        Filesize

        4KB

      • memory/3476-22-0x0000000004CA0000-0x0000000004CA1000-memory.dmp
        Filesize

        4KB

      • memory/4468-4-0x0000000004AB0000-0x0000000004AB1000-memory.dmp
        Filesize

        4KB

      • memory/4468-0-0x0000000000CA0000-0x000000000115C000-memory.dmp
        Filesize

        4.7MB

      • memory/4468-1-0x00000000777D4000-0x00000000777D6000-memory.dmp
        Filesize

        8KB

      • memory/4468-2-0x0000000000CA0000-0x000000000115C000-memory.dmp
        Filesize

        4.7MB

      • memory/4468-8-0x0000000004A80000-0x0000000004A81000-memory.dmp
        Filesize

        4KB

      • memory/4468-7-0x0000000004A70000-0x0000000004A71000-memory.dmp
        Filesize

        4KB

      • memory/4468-6-0x0000000004AD0000-0x0000000004AD1000-memory.dmp
        Filesize

        4KB

      • memory/4468-5-0x0000000004A90000-0x0000000004A91000-memory.dmp
        Filesize

        4KB

      • memory/4468-3-0x0000000004AA0000-0x0000000004AA1000-memory.dmp
        Filesize

        4KB

      • memory/4468-9-0x0000000004AF0000-0x0000000004AF1000-memory.dmp
        Filesize

        4KB

      • memory/4468-14-0x0000000000CA0000-0x000000000115C000-memory.dmp
        Filesize

        4.7MB