Analysis

  • max time kernel
    119s
  • max time network
    123s
  • platform
    windows7_x64
  • resource
    win7-20240704-en
  • resource tags

    arch:x64arch:x86image:win7-20240704-enlocale:en-usos:windows7-x64system
  • submitted
    15/07/2024, 04:15

General

  • Target

    482e8ca1912e3c640600cfd311be8c42_JaffaCakes118.exe

  • Size

    6.1MB

  • MD5

    482e8ca1912e3c640600cfd311be8c42

  • SHA1

    8dda09f90d24a5357195040b6d78e1fb97eb3325

  • SHA256

    ae1529d706975f16d76d5d03c39b70d1e87564c4649c4819663e231acc7b2ef3

  • SHA512

    d05d5e8f775c957676db470c8129aabc8154acbac3f508544853246913159e9095a6ba3cd44ae26acf87062c4842f868c3685916e1c043d0d6172b769c92cd0f

  • SSDEEP

    196608:Y+m6N7cOtRobnM5d/s1vZEL7ge57/TyMmNyRKJq:Y+OnHV/A7/mmRKU

Score
8/10

Malware Config

Signatures

  • Boot or Logon Autostart Execution: Active Setup 2 TTPs 5 IoCs

    Adversaries may achieve persistence by adding a Registry key to the Active Setup of the local machine.

  • ACProtect 1.3x - 1.4x DLL software 3 IoCs

    Detects file using ACProtect software.

  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 13 IoCs
  • UPX packed file 6 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Blocklisted process makes network request 1 IoCs
  • Enumerates connected drives 3 TTPs 46 IoCs

    Attempts to read the root path of hard drives other than the default C: drive.

  • Drops file in System32 directory 4 IoCs
  • Drops file in Windows directory 18 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Checks processor information in registry 2 TTPs 2 IoCs

    Processor information is often read in order to detect sandboxing environments.

  • Modifies Internet Explorer settings 1 TTPs 7 IoCs
  • Modifies data under HKEY_USERS 46 IoCs
  • Modifies registry class 64 IoCs
  • Suspicious behavior: EnumeratesProcesses 2 IoCs
  • Suspicious use of AdjustPrivilegeToken 64 IoCs
  • Suspicious use of FindShellTrayWindow 2 IoCs
  • Suspicious use of SetWindowsHookEx 2 IoCs
  • Suspicious use of WriteProcessMemory 25 IoCs
  • Uses Volume Shadow Copy service COM API

    The Volume Shadow Copy service is used to manage backups/snapshots.

Processes

  • C:\Users\Admin\AppData\Local\Temp\482e8ca1912e3c640600cfd311be8c42_JaffaCakes118.exe
    "C:\Users\Admin\AppData\Local\Temp\482e8ca1912e3c640600cfd311be8c42_JaffaCakes118.exe"
    1⤵
    • Loads dropped DLL
    • Checks processor information in registry
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:1488
    • C:\Windows\SysWOW64\msiexec.exe
      "C:\Windows\System32\msiexec.exe" /i "C:\Users\Admin\AppData\Roaming\IFViewer\293827056\install_flash_player_active_x.msi" /passive
      2⤵
      • Enumerates connected drives
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of FindShellTrayWindow
      PID:3048
  • C:\Windows\system32\msiexec.exe
    C:\Windows\system32\msiexec.exe /V
    1⤵
    • Boot or Logon Autostart Execution: Active Setup
    • Blocklisted process makes network request
    • Enumerates connected drives
    • Drops file in System32 directory
    • Drops file in Windows directory
    • Modifies Internet Explorer settings
    • Modifies data under HKEY_USERS
    • Modifies registry class
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:2628
    • C:\Windows\syswow64\MsiExec.exe
      C:\Windows\syswow64\MsiExec.exe -Embedding 15D05143272900187D3CF1A086632297
      2⤵
      • Loads dropped DLL
      PID:792
    • C:\Windows\syswow64\MsiExec.exe
      C:\Windows\syswow64\MsiExec.exe -Embedding 89A5C27417FCAD038870DCD953815285 M Global\MSI0000
      2⤵
      • Loads dropped DLL
      • Drops file in System32 directory
      • Modifies Internet Explorer settings
      • Modifies registry class
      • Suspicious use of WriteProcessMemory
      PID:2680
      • C:\Users\Admin\AppData\Local\Temp\{DE396A07-7052-4F61-8E85-15022E0947F8}\ISBEW64.exe
        C:\Users\Admin\AppData\Local\Temp\{DE396A07-7052-4F61-8E85-15022E0947F8}\ISBEW64.exe {EFB7539B-24F3-46B6-AF6E-3B021B51EFEF}:{B5E690B6-1258-4EED-BD9E-CE94C74101C0}
        3⤵
        • Executes dropped EXE
        PID:2492
  • C:\Windows\system32\vssvc.exe
    C:\Windows\system32\vssvc.exe
    1⤵
    • Suspicious use of AdjustPrivilegeToken
    PID:2524
  • C:\Windows\system32\DrvInst.exe
    DrvInst.exe "1" "200" "STORAGE\VolumeSnapshot\HarddiskVolumeSnapshot19" "" "" "61530dda3" "0000000000000000" "000000000000005C" "0000000000000574"
    1⤵
    • Drops file in Windows directory
    • Modifies data under HKEY_USERS
    • Suspicious use of AdjustPrivilegeToken
    PID:1668

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Config.Msi\f771115.rbs

    Filesize

    9KB

    MD5

    081528e2d09e4e6207b056b053d7d5d3

    SHA1

    21df538734f6cefc0bf679c57bbe28ea321f6fc0

    SHA256

    a9e5263654fdf3ffaa1e0915ef1a10b06e04b155c581e37ff18db2f021c9a9e1

    SHA512

    fb6d70aa8412a17ac04b8295877ea1a815ae3094eb84cfbde739a4a30cae5262714579aeb01265791067fd2836a9863299fdec389c54d43ba4f24c130e1c0a11

  • C:\Users\Admin\AppData\Local\Temp\MSI6f622.LOG

    Filesize

    2KB

    MD5

    7ac7597bdc6d339db298f699804ff48f

    SHA1

    bf5a88d450585e0af271597d693f3912bcd4ff51

    SHA256

    8d8557949996211be162b08b6ca9f1870d3324834102507bb62f1271f80c4e45

    SHA512

    45bcefc5a293ec0b44d53fecfce2261b8f2ef42c0a75f7c670b2aee8a23af628e8de7b0015d93846467309da37807319ab4a3266e16f5d48d206efa5b414a907

  • C:\Users\Admin\AppData\Local\Temp\~14B9.tmp

    Filesize

    401B

    MD5

    e681af4b30141cc7af06d43e51f772ce

    SHA1

    7a751fea2c7a1de80b9193b3c58586dcc83daf05

    SHA256

    adae7cf6e98950a1aa31e411a86722dd2892d7d9a554f1b295d322f15d9e6adb

    SHA512

    55193722248ccb941d1d2b78ee98e5bac82991f0380e281b97ccac5736c7bafa07a96096443e5208260965ce70510ffea5092a3b7b167568a73d9d73937417fc

  • C:\Users\Admin\AppData\Local\Temp\~14B9.tmp

    Filesize

    396B

    MD5

    84f32e3c663158c361741119c4868240

    SHA1

    cefe2f988697113300a2687925f73937c421b237

    SHA256

    36ec7dd065c2749acd2c5aa4d4f69e740a7828fbef5ddb1c2d4005fc858df655

    SHA512

    2cabe2dd188be8cee807b24c73e4f67f9567470b9f938b141d0209d63bc02252d51bc58e1f9524d0e04ffb365599cfd6acfbb04834a7fd062dfb21b989642226

  • C:\Users\Admin\AppData\Local\Temp\~14B9.tmp

    Filesize

    390B

    MD5

    d23b2ee6f763cd6029335b6bf0e9a9c1

    SHA1

    20f9794e2dde279cfa4fcb22234606812597225a

    SHA256

    09bbaef3dc139bd20c8d5e47031c7b005a1f41ecb91b7ee4195d6ad8664d975e

    SHA512

    f32eb5110521822f65242deca9f5c5906ab44e6368a880396499ea2ae899f7f5e901bc423bab116ce575bbcb9e3939ddcc0525ecc4dc93a31bc9c10e0a8fabd6

  • C:\Users\Admin\AppData\Roaming\IFViewer\293827056\Workspace\GW_e-catalog.swf

    Filesize

    182KB

    MD5

    9789b5c072808ce698653e53b811efb3

    SHA1

    88a25b0aa10c055f86ad9e8ac6bee18f768183be

    SHA256

    498a5eaa39fc7b1a4977e849e713168e413043e24fffdea97bc7d2a7042b8c06

    SHA512

    05c3cb4aa7adca914bd167ec01dbebc0b3ad67ea79a91c4e758d30c25e7ce90d00b8df40b6922bbd7786fa9dce5fc3eeafcae4cab5592e0f49da0ae4575cc3de

  • C:\Users\Admin\AppData\Roaming\IFViewer\293827056\Workspace\page1.jpg

    Filesize

    161KB

    MD5

    514c2f08931377481f4ccbc888d781e1

    SHA1

    48221f59c6e1b0a5ca0a3dd85df63c6822e613ed

    SHA256

    c0be06375d76ddacdaab1baf67dc5a1a2391ac3028e32f6f736a375aea2ff5ab

    SHA512

    e5f3ee3719a05dc3cf1eb9edeebaf68b44dbf14835bc59b653f15c40934fedd9e38ec04a579dc1166f3a72e33cd00c26d574f096c15e7ffef74be972823de790

  • C:\Users\Admin\AppData\Roaming\IFViewer\293827056\Workspace\page10.jpg

    Filesize

    149KB

    MD5

    2230ff33d466ea381e856e95811e2a30

    SHA1

    f8babed357fd4e78241ef925486aae50e4fee201

    SHA256

    a0ebe5fca1b7ae3363b76831ee3d9eb1022456b0b10046b0f6cdc5bb75224114

    SHA512

    bf9b880021cd1211479c91ac05b946ab717c92c84be05fdc94dd5336e87107d104be0a689e34313eb58c2c3843191e9bbafa26608d8610981b7fd05a3f163142

  • C:\Users\Admin\AppData\Roaming\IFViewer\293827056\Workspace\page11.jpg

    Filesize

    104KB

    MD5

    712a4319f6f35cac430a1ad67f4570d2

    SHA1

    27089f1fde1d777d4fba39f1f8f8b311ff196ad6

    SHA256

    09f034d3ffcf2860ec2101285c6f728cd6af47bb8441dc80f1116c9128161cb6

    SHA512

    4010cde5063af822409f9ef4c1cc0cad38d087093f074cb625daa7ce806450de4a982b41cb63bcfbfa0d525dfa27ad68886407263736794c17dda6246c2df671

  • C:\Users\Admin\AppData\Roaming\IFViewer\293827056\Workspace\page12.jpg

    Filesize

    123KB

    MD5

    acf7e0910200712f8718693f1e335b99

    SHA1

    aa0143e409cc87687e47519733d8ed7154c48d8f

    SHA256

    97b9ea7d2b6797f9b3057bbbf577d9b28868f355860fbbdaff76fdce8f638530

    SHA512

    532e4144b13760c5b7a513456997a634d66947d619c84734c7eab383c9bc6203fb427b96dd1325ac8ccbb2b2cb62649738f873f79c9341da2394922ba29bc474

  • C:\Users\Admin\AppData\Roaming\IFViewer\293827056\Workspace\page2.jpg

    Filesize

    140KB

    MD5

    e43e51b86a17a2f247b9764c16571c1b

    SHA1

    8213b9a5749248b8f22364d9bf48ae78361a2000

    SHA256

    3b441fa8595a898a25b4f2c9aab9d67bba7a8bfc7d328b25a9dfcc1452ece1c2

    SHA512

    7dc73ada5d512b9ed4c24fc7e559e462dc2de65b2ac875c7186b21f678b355082e70a744c87f876f12e6a1ae81c48a84c5f647a61f67312b58159c6e871ce7ef

  • C:\Users\Admin\AppData\Roaming\IFViewer\293827056\Workspace\page3.jpg

    Filesize

    199KB

    MD5

    233dcedc57c5e0e4dcdaddd583979c16

    SHA1

    48e7a43abf8af98c982bb4a1245ee4826c903fb3

    SHA256

    68615929ebc97f6803d60c60916ae73df39408c21472f4c38c04e97e95f8f9bc

    SHA512

    844641bf66771375f6edec2a8ff0a489c4861f3873c121055faa14086a477365fbf76e8ab5831d9876a01bb11fdb2977795178736f0d2e78fc87632ddea9c1ce

  • C:\Users\Admin\AppData\Roaming\IFViewer\293827056\Workspace\page4.jpg

    Filesize

    152KB

    MD5

    b7d6e5c03387868e41c21b0b61f9fb58

    SHA1

    853feccdbb97bb0c9f80aead93e6f447e6bf6b93

    SHA256

    4c294c7cd205039b4e561873a375fd97794a5ce41c7c1ad98daa8d62e2c65a91

    SHA512

    b26b20c0d33e33d7c6724a3b983f61d5b6d2ead90f490f1b34a36c6da964a093fa676a34315ea2d429534dc96110d5592d33ad3132150f28d33903b50fde0644

  • C:\Users\Admin\AppData\Roaming\IFViewer\293827056\Workspace\page5.jpg

    Filesize

    126KB

    MD5

    b676228ee4ec65ff1f91aa27866d16c1

    SHA1

    185268dd329137a928daf4edc1b39d0ce0d886c1

    SHA256

    932f92c9fe13f010e8b0a57d35b3e7e2d959fc163c935f253c4ae69607a41ce4

    SHA512

    b7f68f656d4511e1d977702bef987e01896cf3f6922c3690e35cbe376f7d8bac9e0558e809c2ffccbfd0fc0cc5db5522219e2b46ff296e64b71ef7bea09d8c83

  • C:\Users\Admin\AppData\Roaming\IFViewer\293827056\Workspace\page6.jpg

    Filesize

    134KB

    MD5

    926746112ad393e5cddba97ef148059c

    SHA1

    e5fb5a92780ea04633e399617ec30f53e6201e96

    SHA256

    e25535700f081eb5fecc08f021628e77ae806f4ca590fba7e5e5dbc20d5ef9a6

    SHA512

    cf94b4fc727efdb58c82b37bf900ab31561a2a64180c16432f9af02b6818cca868f99881cf5178859a680fa7acc623921f419b2debd1bccd012b3a261487c8b8

  • C:\Users\Admin\AppData\Roaming\IFViewer\293827056\Workspace\page7.jpg

    Filesize

    132KB

    MD5

    0d424c5a52b178152deef7cfc15cd53e

    SHA1

    c818d460bbe90fbe7459f1b42b28dd834cfef3c0

    SHA256

    b3596aef46efc824a83978460c4b1faccfe81c39ba3b4e4e60cd2630c60ed874

    SHA512

    63f6b10a3a591b335da62c29f628023930966adf7661f5bb9a0157955fad33d9d0ce90792ceb897724daafcee26c5afeae438225d76446d79c41eb8f03a60e3b

  • C:\Users\Admin\AppData\Roaming\IFViewer\293827056\Workspace\page8.jpg

    Filesize

    117KB

    MD5

    bf70bd6674d85574efcbcb7560759e17

    SHA1

    b725a3504b9ce1fb34d9e657c40cd1fad3b221fc

    SHA256

    a80d87548c4871684021daab1874cccd507a0d8fe165bf5e40054b9ca264675d

    SHA512

    c815176811490645a1e047f71345de23ed42228a39fa4b6ed4cb945438a3435ecdf07dc7b5fcf403fa277267844b5ec451fb64c9a9aa1b497ebe443c391dbab8

  • C:\Users\Admin\AppData\Roaming\IFViewer\293827056\Workspace\page9.jpg

    Filesize

    182KB

    MD5

    ff081141b98653c7a300af5f13963e7f

    SHA1

    21ed10ed4221597b633d2dcb74ca3b2c843654bf

    SHA256

    05de473f391dbc1db6eeafae673300e99f339ff5609b78fe55aa934be601e492

    SHA512

    7e2df537976057e9e68078d558b732f9b13afeb8d8c5bfd6cec1e18a0ce80527c0aef30c8a5edf5dc31f1719e30706eb6d1cc8a9093daa3425d14a9d28b7fc16

  • C:\Users\Admin\AppData\Roaming\IFViewer\293827056\Workspace\pages.xml

    Filesize

    694B

    MD5

    d4df254660f893919d1adf03ce500141

    SHA1

    1d926801bb6361630e4c7f3780be93b9bd4e60f1

    SHA256

    deeaa83b114c97ec1ecf1e124b621fb117db6202dc765c3cb1f14df5f42e1224

    SHA512

    01355882e85101586f1a8a200e6fd745fc2815ac8d4074c198830db28b806d20a914d25fc43b729bf14a2ab26ec04870726c04dd97f601517c00743c45b30b22

  • C:\Users\Admin\AppData\Roaming\IFViewer\293827056\Workspace\tempW.png

    Filesize

    2KB

    MD5

    b896f4037970e0957e4dc8f4168fa299

    SHA1

    d3989bde92290aaa52aa4fd8419fd23c6a666f5e

    SHA256

    d64f44450ede0329c73c76fccb4d7d50cc8c11fedd397618ec46c6e2344a2c3b

    SHA512

    55d6840de30af00f65d3f1596f36e577aa7cefc0ec0a5101d6cb79ec0dc6c8837ac9596a6db6dad181719c9e371c321af2be07a218d0979ccf88f4d5b16cb453

  • C:\Users\Admin\AppData\Roaming\IFViewer\293827056\install_flash_player_active_x.msi

    Filesize

    4.3MB

    MD5

    c5f1b59b7b9ea497f3745f43f08c3189

    SHA1

    04ac79c4f1eb1e1ca689f27fa71f12bb5cd11cc2

    SHA256

    90772c2311ba9c7420875d48064c458f4f68a6d82d9ab31aa711be449d5ad2aa

    SHA512

    5325fce6a5e57200b9e7914b6341420382063183832dfbd369aab7e60beceb312a4fa5cc165ada185f79131658e7a53df1cafcb5fc5e30eaec43ddaec5748388

  • C:\Windows\Installer\MSI13A2.tmp

    Filesize

    84KB

    MD5

    abb81f7897bb48a036686ccf840287ae

    SHA1

    d6d648782584340bfa56c8e6d34fd70707af5d36

    SHA256

    9dc871199cc9e96067a32401d225af50683ac14efaf35edc61aa45f346374494

    SHA512

    4769d555b95ad593eae41e1cb91a9c7539b1c115b9b19a4954dec791f4d662388b459e3b7ad2964d5e0db4270406816582986d5a184bf55fd6c067906c2e0b25

  • C:\Windows\Installer\MSI14BD.tmp

    Filesize

    108KB

    MD5

    3e87796bb483793fc8abc7cf8a77402d

    SHA1

    a055374870adeea97105ddc9e330bdae38f41d61

    SHA256

    f90aebf1d4d4a29658d33f71c874dbfcb0821001ffee48433a44498b4b8eb2a5

    SHA512

    97d41428a4c45602595cdb7cdb5ce495d2834438290d9d872a18fbd6ffa0ceda7eb6da070350913177101ae86837997fff8ce8602afb33e5d644b04018aa4eeb

  • C:\Windows\Installer\MSI15D9.tmp

    Filesize

    1.9MB

    MD5

    587670886591e9820893b51e07c830c7

    SHA1

    160278262ea58d92c9905e5840c12878fd8a93af

    SHA256

    c1bfc4385924da37fac1200f9c97f0c6d40cd7d8344b12d63275bf11a7e21518

    SHA512

    632d1cb3727fbbb0766a7c4a1dbad3d44dd5fb38c0c7818beeccd84878d0b0d5bdc25352c6ee40c16585e64602eee051f6667f608c08c5d3097f5afe0969842e

  • C:\Windows\SysWOW64\Macromed\Flash\Flash9f.ocx

    Filesize

    2.9MB

    MD5

    48fdf435b8595604e54125b321924510

    SHA1

    e13d25bdac576e95e9134c3f95f0f8cbe94d6185

    SHA256

    7fcd80f7f56a841a4c5ef950afac8991da71ba9eae82f20db2954c7b4b72efd9

    SHA512

    86a59d83cc3d39b752b7a9c98e79b3f8fbcca66087926f026aabf5453bde83321928b77947e2aa5f625a53dafc89c0bf224daa7ce004b1851345abe93c6e83f3

  • C:\Windows\SysWOW64\Macromed\Flash\FlashUtil9f.exe

    Filesize

    213KB

    MD5

    5abe08eeb790d2322565dbd11bf70a19

    SHA1

    c8c1447dcee8d47087a8f938560fe81ae9613b59

    SHA256

    14ea495e00e05c476f2af9965c6137bc744518f7241e6ac922a0da295b9c8c51

    SHA512

    0aec04ead0e26af98d495372423e607f252a345d9406398b9f2a960df525a6839e50a0b2751c57530e19b852c2fc5cb03585429e9ba8c1b15fad7bdb8944e4ea

  • \Users\Admin\AppData\Local\Temp\{DE396A07-7052-4F61-8E85-15022E0947F8}\ISBEW64.exe

    Filesize

    112KB

    MD5

    4acfe43491a4e0b66200470194eee4cd

    SHA1

    788a43ac5f54f0bdbff09ed816634ccdede6ef6a

    SHA256

    92986a3b474accd0850377be9c4cbc764acf2f90525a9eee18d93ad3ef6cba9e

    SHA512

    9df5c9a93f5e6a493c648b42e4ffdd7149d7293e8b0a7bc3302eeae7837a60297fe309c1ca288dc8b5ca3a14be683dd585a61ca05d0e0543d094a0a0e1189982

  • \Users\Admin\AppData\Local\Temp\{DE396A07-7052-4F61-8E85-15022E0947F8}\ISRT.dll

    Filesize

    198KB

    MD5

    244f7566604c6ae24efc9b07fd29674b

    SHA1

    9fd86b2213e7dbfaf3eab6189c1f7bdfd7a72e0d

    SHA256

    6aedf40e66f8d356ccfe25b85499c2f49d4aef271e89cad56b95e9846a9e19c4

    SHA512

    96a667cd7bd30a7109b3c0542b3531f03ae33ab11509c9cdf06912bc8bd09cd123b49356fcf24a5f96a1e657959a32ae3939b635b7393a6456813f21a3c2043d

  • \Users\Admin\AppData\Local\Temp\{DE396A07-7052-4F61-8E85-15022E0947F8}\_isres.dll

    Filesize

    120KB

    MD5

    e54601d8a464a455de081d63d4b7927d

    SHA1

    0ff6da399c123394cca3b4cc64a41d8037787b73

    SHA256

    1e154a29673d129414ab56b995d04afcfa1a02af47dabaa28cd11c25f7d6026a

    SHA512

    5a213430fb8dc6a19c24122f8d9cd03479ee7ae421eac77d1026f16bf520a1f113d43380e2a60d5f0133e09aa7ad323a7ef9d1cccc3eea1e905f09701b118e05

  • \Users\Admin\AppData\Roaming\IFViewer\293827056\Workspace\FSCommandDLL\FSDesktop.dll

    Filesize

    570KB

    MD5

    32efd5fa1e43305776b0a015561fbd1b

    SHA1

    ea91d324a50fe2102574ef55e86a757374c7361f

    SHA256

    3a07e813f66743629115b4f959ebd7a30a83abda2c7677a94167fbf73d9b776a

    SHA512

    0dd083246ff088e773260dfd0cbe02b41b98a62c9dd3c219753f8b708d4db87e486c234e4391024c5c6fd566995a52f31c007e3a70dece308a0546c930e9b34c

  • memory/1488-190-0x0000000010000000-0x00000000100CB000-memory.dmp

    Filesize

    812KB

  • memory/2680-148-0x00000000042A0000-0x00000000046E9000-memory.dmp

    Filesize

    4.3MB

  • memory/2680-121-0x00000000032A0000-0x0000000003330000-memory.dmp

    Filesize

    576KB

  • memory/2680-117-0x0000000002DB0000-0x0000000002E3C000-memory.dmp

    Filesize

    560KB

  • memory/2680-99-0x0000000010000000-0x0000000010195000-memory.dmp

    Filesize

    1.6MB