Analysis

  • max time kernel
    4294092s
  • max time network
    160s
  • platform
    windows7_x64
  • resource
    win7-20220223-en
  • submitted
    10-03-2022 21:04

General

  • Target

    48ca2c9c5b72d2e8d0a88e49ff055584e7efdfe8f6ceee9fdaf45fa684525a10.exe

  • Size

    3.5MB

  • MD5

    1bf954d9ed40b8050b657beb5b35a8a2

  • SHA1

    0b566dd8533aa913fe426d0d1e7e65a944a6a6e1

  • SHA256

    48ca2c9c5b72d2e8d0a88e49ff055584e7efdfe8f6ceee9fdaf45fa684525a10

  • SHA512

    c86686fee609582a6b450fda567fb29cccda1845f9f3fd20eaaf619877657b9a67ed23a3e8c8bed6b0d266983c7e0f172824f9036c2b3bfd722cc07190581ecc

Malware Config

Extracted

Family

vidar

Version

39.3

Botnet

706

C2

https://bandakere.tumblr.com/

Attributes
  • profile_id

    706

Extracted

Family

redline

Botnet

NCanal01

C2

pupdatastart.tech:80

pupdatastart.xyz:80

pupdatastar.store:80

Signatures

  • RedLine

    RedLine Stealer is a malware family written in C#, first appearing in early 2020.

  • RedLine Payload 2 IoCs
  • Vidar

    Vidar is an infostealer based on Arkei stealer.

  • Vidar Stealer 2 IoCs
  • ASPack v2.12-2.42 14 IoCs

    Detects executables packed with ASPack v2.12-2.42

  • Executes dropped EXE 12 IoCs
  • Loads dropped DLL 43 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Looks up external IP address via web service 1 IoCs

    Uses a legitimate IP lookup service to find the infected system's external IP.

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Program crash 1 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\48ca2c9c5b72d2e8d0a88e49ff055584e7efdfe8f6ceee9fdaf45fa684525a10.exe
    "C:\Users\Admin\AppData\Local\Temp\48ca2c9c5b72d2e8d0a88e49ff055584e7efdfe8f6ceee9fdaf45fa684525a10.exe"
    1⤵
    • Loads dropped DLL
    • Suspicious use of WriteProcessMemory
    PID:1792
    • C:\Users\Admin\AppData\Local\Temp\setup_installer.exe
      "C:\Users\Admin\AppData\Local\Temp\setup_installer.exe"
      2⤵
      • Executes dropped EXE
      • Loads dropped DLL
      • Suspicious use of WriteProcessMemory
      PID:948
      • C:\Users\Admin\AppData\Local\Temp\7zS4B37ED46\setup_install.exe
        "C:\Users\Admin\AppData\Local\Temp\7zS4B37ED46\setup_install.exe"
        3⤵
        • Executes dropped EXE
        • Loads dropped DLL
        • Suspicious use of WriteProcessMemory
        PID:1244
        • C:\Windows\SysWOW64\cmd.exe
          C:\Windows\system32\cmd.exe /c sonia_1.exe
          4⤵
          • Loads dropped DLL
          PID:1548
          • C:\Users\Admin\AppData\Local\Temp\7zS4B37ED46\sonia_1.exe
            sonia_1.exe
            5⤵
            • Executes dropped EXE
            PID:1968
        • C:\Windows\SysWOW64\cmd.exe
          C:\Windows\system32\cmd.exe /c sonia_2.exe
          4⤵
          • Loads dropped DLL
          PID:1628
          • C:\Users\Admin\AppData\Local\Temp\7zS4B37ED46\sonia_2.exe
            sonia_2.exe
            5⤵
            • Executes dropped EXE
            PID:1684
        • C:\Windows\SysWOW64\cmd.exe
          C:\Windows\system32\cmd.exe /c sonia_6.exe
          4⤵
          • Loads dropped DLL
          PID:992
          • C:\Users\Admin\AppData\Local\Temp\7zS4B37ED46\sonia_6.exe
            sonia_6.exe
            5⤵
            • Executes dropped EXE
            PID:2044
        • C:\Windows\SysWOW64\cmd.exe
          C:\Windows\system32\cmd.exe /c sonia_8.exe
          4⤵
          • Loads dropped DLL
          PID:988
          • C:\Users\Admin\AppData\Local\Temp\7zS4B37ED46\sonia_8.exe
            sonia_8.exe
            5⤵
            • Executes dropped EXE
            PID:1520
        • C:\Windows\SysWOW64\cmd.exe
          C:\Windows\system32\cmd.exe /c sonia_7.exe
          4⤵
          • Loads dropped DLL
          PID:1188
          • C:\Users\Admin\AppData\Local\Temp\7zS4B37ED46\sonia_7.exe
            sonia_7.exe
            5⤵
            • Executes dropped EXE
            • Loads dropped DLL
            PID:1272
        • C:\Windows\SysWOW64\cmd.exe
          C:\Windows\system32\cmd.exe /c sonia_5.exe
          4⤵
          • Loads dropped DLL
          PID:1588
          • C:\Users\Admin\AppData\Local\Temp\7zS4B37ED46\sonia_5.exe
            sonia_5.exe
            5⤵
            • Executes dropped EXE
            • Loads dropped DLL
            PID:1576
            • C:\Users\Admin\AppData\Local\Temp\is-KECJL.tmp\sonia_5.tmp
              "C:\Users\Admin\AppData\Local\Temp\is-KECJL.tmp\sonia_5.tmp" /SL5="$50120,506127,422400,C:\Users\Admin\AppData\Local\Temp\7zS4B37ED46\sonia_5.exe"
              6⤵
              • Executes dropped EXE
              • Loads dropped DLL
              PID:968
        • C:\Windows\SysWOW64\cmd.exe
          C:\Windows\system32\cmd.exe /c sonia_4.exe
          4⤵
          • Loads dropped DLL
          PID:1688
        • C:\Windows\SysWOW64\cmd.exe
          C:\Windows\system32\cmd.exe /c sonia_3.exe
          4⤵
          • Loads dropped DLL
          PID:1092
  • C:\Users\Admin\AppData\Local\Temp\7zS4B37ED46\sonia_4.exe
    sonia_4.exe
    1⤵
    • Executes dropped EXE
    • Loads dropped DLL
    PID:1516
    • C:\Users\Admin\AppData\Local\Temp\jfiag3g_gg.exe
      C:\Users\Admin\AppData\Local\Temp\jfiag3g_gg.exe /scookiestxt C:\Users\Admin\AppData\Local\Temp\fj4ghga23_fsa.txt
      2⤵
      • Executes dropped EXE
      • Loads dropped DLL
      PID:1956
    • C:\Users\Admin\AppData\Local\Temp\jfiag3g_gg.exe
      C:\Users\Admin\AppData\Local\Temp\jfiag3g_gg.exe /scookiestxt C:\Users\Admin\AppData\Local\Temp\fj4ghga23_fsa.txt
      2⤵
        PID:1640
    • C:\Users\Admin\AppData\Local\Temp\7zS4B37ED46\sonia_3.exe
      sonia_3.exe
      1⤵
      • Executes dropped EXE
      • Loads dropped DLL
      PID:892
      • C:\Windows\SysWOW64\WerFault.exe
        C:\Windows\SysWOW64\WerFault.exe -u -p 892 -s 968
        2⤵
        • Program crash
        PID:1320

    Network

    MITRE ATT&CK Matrix ATT&CK v6

    Credential Access

    Credentials in Files

    1
    T1081

    Discovery

    System Information Discovery

    1
    T1082

    Collection

    Data from Local System

    1
    T1005

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Users\Admin\AppData\Local\Temp\7zS4B37ED46\libcurl.dll
      MD5

      d09be1f47fd6b827c81a4812b4f7296f

      SHA1

      028ae3596c0790e6d7f9f2f3c8e9591527d267f7

      SHA256

      0de53e7be51789adaec5294346220b20f793e7f8d153a3c110a92d658760697e

      SHA512

      857f44a1383c29208509b8f1164b6438d750d5bb4419add7626986333433e67a0d1211ec240ce9472f30a1f32b16c8097aceba4b2255641b3d8928f94237f595

    • C:\Users\Admin\AppData\Local\Temp\7zS4B37ED46\libcurlpp.dll
      MD5

      e6e578373c2e416289a8da55f1dc5e8e

      SHA1

      b601a229b66ec3d19c2369b36216c6f6eb1c063e

      SHA256

      43e86d650a68f1f91fa2f4375aff2720e934aa78fa3d33e06363122bf5a9535f

      SHA512

      9df6a8c418113a77051f6cb02745ad48c521c13cdadb85e0e37f79e29041464c8c7d7ba8c558fdd877035eb8475b6f93e7fc62b38504ddfe696a61480cabac89

    • C:\Users\Admin\AppData\Local\Temp\7zS4B37ED46\libgcc_s_dw2-1.dll
      MD5

      9aec524b616618b0d3d00b27b6f51da1

      SHA1

      64264300801a353db324d11738ffed876550e1d3

      SHA256

      59a466f77584438fc3abc0f43edc0fc99d41851726827a008841f05cfe12da7e

      SHA512

      0648a26940e8f4aad73b05ad53e43316dd688e5d55e293cce88267b2b8744412be2e0d507dadad830776bf715bcd819f00f5d1f7ac1c5f1c4f682fb7457a20d0

    • C:\Users\Admin\AppData\Local\Temp\7zS4B37ED46\libstdc++-6.dll
      MD5

      5e279950775baae5fea04d2cc4526bcc

      SHA1

      8aef1e10031c3629512c43dd8b0b5d9060878453

      SHA256

      97de47068327bb822b33c7106f9cbb489480901a6749513ef5c31d229dcaca87

      SHA512

      666325e9ed71da4955058aea31b91e2e848be43211e511865f393b7f537c208c6b31c182f7d728c2704e9fc87e7d1be3f98f5fee4d34f11c56764e1c599afd02

    • C:\Users\Admin\AppData\Local\Temp\7zS4B37ED46\libwinpthread-1.dll
      MD5

      1e0d62c34ff2e649ebc5c372065732ee

      SHA1

      fcfaa36ba456159b26140a43e80fbd7e9d9af2de

      SHA256

      509cb1d1443b623a02562ac760bced540e327c65157ffa938a22f75e38155723

      SHA512

      3653f8ed8ad3476632f731a3e76c6aae97898e4bf14f70007c93e53bc443906835be29f861c4a123db5b11e0f3dd5013b2b3833469a062060825df9ee708dc61

    • C:\Users\Admin\AppData\Local\Temp\7zS4B37ED46\setup_install.exe
      MD5

      f8a340071d8faac07854daf0c3262cfc

      SHA1

      83bf588a2715ca4e332ba637a76082527520e5a9

      SHA256

      a62463997a479df23f84e3537706ccc66f542ad59fc02248b31082f7ce3038c9

      SHA512

      5a2a0649f499cc77b5c40c4637b5d5cea6ecca13da82295b0350c740cbff227decb74c7439c2a3922709eec71562c8984684dfb1d43370948cdabe92fd448376

    • C:\Users\Admin\AppData\Local\Temp\7zS4B37ED46\setup_install.exe
      MD5

      f8a340071d8faac07854daf0c3262cfc

      SHA1

      83bf588a2715ca4e332ba637a76082527520e5a9

      SHA256

      a62463997a479df23f84e3537706ccc66f542ad59fc02248b31082f7ce3038c9

      SHA512

      5a2a0649f499cc77b5c40c4637b5d5cea6ecca13da82295b0350c740cbff227decb74c7439c2a3922709eec71562c8984684dfb1d43370948cdabe92fd448376

    • C:\Users\Admin\AppData\Local\Temp\7zS4B37ED46\sonia_1.exe
      MD5

      7837314688b7989de1e8d94f598eb2dd

      SHA1

      889ae8ce433d5357f8ea2aff64daaba563dc94e3

      SHA256

      d8c28d07c365873b4e8332f057f062e65f2dd0cd4d599fd8b16d82eca5cf4247

      SHA512

      3df0c24a9f51a82716abb8e87ff44fdb6686183423d1f2f7d6bfb4cd03c3a18490f2c7987c29f3e1b2d25c48d428c2e73033998a872b185f70bb68a7aedb3e7c

    • C:\Users\Admin\AppData\Local\Temp\7zS4B37ED46\sonia_1.txt
      MD5

      7837314688b7989de1e8d94f598eb2dd

      SHA1

      889ae8ce433d5357f8ea2aff64daaba563dc94e3

      SHA256

      d8c28d07c365873b4e8332f057f062e65f2dd0cd4d599fd8b16d82eca5cf4247

      SHA512

      3df0c24a9f51a82716abb8e87ff44fdb6686183423d1f2f7d6bfb4cd03c3a18490f2c7987c29f3e1b2d25c48d428c2e73033998a872b185f70bb68a7aedb3e7c

    • C:\Users\Admin\AppData\Local\Temp\7zS4B37ED46\sonia_2.exe
      MD5

      6000e56bbeedcc660edb30d35239b64e

      SHA1

      32b46b49460ae483baee87c206d4fba37ef92912

      SHA256

      b6b2ea8d78e5782e5252fec287e5e50d3a215455b0b2e3edbac3616c972986e6

      SHA512

      dc7bb8205ca244260fe1299c2d1475ca0ae9c69346d3875a4fd4601789e8f21a64ad3a91e5764ab34833ee2e5143a1bfeae90cec71c77e33a8de72025714f58e

    • C:\Users\Admin\AppData\Local\Temp\7zS4B37ED46\sonia_2.txt
      MD5

      6000e56bbeedcc660edb30d35239b64e

      SHA1

      32b46b49460ae483baee87c206d4fba37ef92912

      SHA256

      b6b2ea8d78e5782e5252fec287e5e50d3a215455b0b2e3edbac3616c972986e6

      SHA512

      dc7bb8205ca244260fe1299c2d1475ca0ae9c69346d3875a4fd4601789e8f21a64ad3a91e5764ab34833ee2e5143a1bfeae90cec71c77e33a8de72025714f58e

    • C:\Users\Admin\AppData\Local\Temp\7zS4B37ED46\sonia_3.exe
      MD5

      4f96a8bb2010dcb1fd4721b2210f8d22

      SHA1

      3878978e4091d9089443dbad844e108b8f4f1620

      SHA256

      553ee5cc87e4268f2439e9dd36b4b35afc9d06cc62dad7e05d31348b9cf7d7cf

      SHA512

      04e08f0e9ace63dc54bda5c44f1d3c2bace32b91d22eeff77e7f3d49cbc1ebafaa51dd7d89561bf46c04aa01eda9b7476e64f3ed0b0e46b987647897666218b5

    • C:\Users\Admin\AppData\Local\Temp\7zS4B37ED46\sonia_3.txt
      MD5

      4f96a8bb2010dcb1fd4721b2210f8d22

      SHA1

      3878978e4091d9089443dbad844e108b8f4f1620

      SHA256

      553ee5cc87e4268f2439e9dd36b4b35afc9d06cc62dad7e05d31348b9cf7d7cf

      SHA512

      04e08f0e9ace63dc54bda5c44f1d3c2bace32b91d22eeff77e7f3d49cbc1ebafaa51dd7d89561bf46c04aa01eda9b7476e64f3ed0b0e46b987647897666218b5

    • C:\Users\Admin\AppData\Local\Temp\7zS4B37ED46\sonia_4.exe
      MD5

      5668cb771643274ba2c375ec6403c266

      SHA1

      dd78b03428b99368906fe62fc46aaaf1db07a8b9

      SHA256

      d417bd4de6a5227f5ea5cff3567e74fe2b2a25c0a80123b7b37b27db89adc384

      SHA512

      135bd12414773cc84270af5225920a01487626528d7bbc2b703be71652265772c2e5488ee3f7e2c53b0b01c617b8c7920e0b457472b6724cfa9ec4c390b0a55a

    • C:\Users\Admin\AppData\Local\Temp\7zS4B37ED46\sonia_4.txt
      MD5

      5668cb771643274ba2c375ec6403c266

      SHA1

      dd78b03428b99368906fe62fc46aaaf1db07a8b9

      SHA256

      d417bd4de6a5227f5ea5cff3567e74fe2b2a25c0a80123b7b37b27db89adc384

      SHA512

      135bd12414773cc84270af5225920a01487626528d7bbc2b703be71652265772c2e5488ee3f7e2c53b0b01c617b8c7920e0b457472b6724cfa9ec4c390b0a55a

    • C:\Users\Admin\AppData\Local\Temp\7zS4B37ED46\sonia_5.exe
      MD5

      3630ff5c281859f4f95aa0516a33f24a

      SHA1

      32943c4bf92b7b763736af2bf360e91de1f9ef77

      SHA256

      2f1f85c6ea774f0337c5028d557489eb48bf82783c891dec229270e6fcc8d496

      SHA512

      f5a1268d78faa349ddf054fb8cfcf39344065b828181191431ea0bb7d82216a85fab96db902940ec574d992b75b954978fcad96d36d585e6df27623c6320e640

    • C:\Users\Admin\AppData\Local\Temp\7zS4B37ED46\sonia_5.txt
      MD5

      3630ff5c281859f4f95aa0516a33f24a

      SHA1

      32943c4bf92b7b763736af2bf360e91de1f9ef77

      SHA256

      2f1f85c6ea774f0337c5028d557489eb48bf82783c891dec229270e6fcc8d496

      SHA512

      f5a1268d78faa349ddf054fb8cfcf39344065b828181191431ea0bb7d82216a85fab96db902940ec574d992b75b954978fcad96d36d585e6df27623c6320e640

    • C:\Users\Admin\AppData\Local\Temp\7zS4B37ED46\sonia_6.exe
      MD5

      3568d61a49b61ce18bd6093748ffd32a

      SHA1

      0f6c4618eb4fca4972869a56bf6d8b020e1440f8

      SHA256

      af350212764e6304bf417e81cf0009b494119670e4bc1b187cd79cf4c487c7b6

      SHA512

      5c0129297fe07f919fe228633e193f56167e4f92815aa2cb1b9749ff14f377ec4d5c0414dffc733cbdc0b448e4552e06a527a481a144cd3af413c77fe2937cde

    • C:\Users\Admin\AppData\Local\Temp\7zS4B37ED46\sonia_6.txt
      MD5

      3568d61a49b61ce18bd6093748ffd32a

      SHA1

      0f6c4618eb4fca4972869a56bf6d8b020e1440f8

      SHA256

      af350212764e6304bf417e81cf0009b494119670e4bc1b187cd79cf4c487c7b6

      SHA512

      5c0129297fe07f919fe228633e193f56167e4f92815aa2cb1b9749ff14f377ec4d5c0414dffc733cbdc0b448e4552e06a527a481a144cd3af413c77fe2937cde

    • C:\Users\Admin\AppData\Local\Temp\7zS4B37ED46\sonia_7.exe
      MD5

      8526a0606334b5e9cccd811456aa2294

      SHA1

      d11bd3ae2d4217337d23937f620da296a22d84ac

      SHA256

      d429e634b43a7567fcb39469c1b5a49bb8ce5db49720e3e8ba8f5a30472fd5f2

      SHA512

      e4d59ca299237d24c576422c20bb1d15502ea67e3d89f723e42be74d25729d46aad85e3fd6a0e16da820a001ae52b6239e8c3c062131f162e03b83d1842bbcb9

    • C:\Users\Admin\AppData\Local\Temp\7zS4B37ED46\sonia_7.txt
      MD5

      8526a0606334b5e9cccd811456aa2294

      SHA1

      d11bd3ae2d4217337d23937f620da296a22d84ac

      SHA256

      d429e634b43a7567fcb39469c1b5a49bb8ce5db49720e3e8ba8f5a30472fd5f2

      SHA512

      e4d59ca299237d24c576422c20bb1d15502ea67e3d89f723e42be74d25729d46aad85e3fd6a0e16da820a001ae52b6239e8c3c062131f162e03b83d1842bbcb9

    • C:\Users\Admin\AppData\Local\Temp\7zS4B37ED46\sonia_8.exe
      MD5

      c549246895fdf8d8725255427e2a7168

      SHA1

      ae7e4d99b82e6aba4366b34eba32b750d75a0234

      SHA256

      e607c6376ebb6db55e15852b51dfe666a09eb498c00cc86be9491564b5751c1d

      SHA512

      b6e8694d3e2bea07072dc643e6c2fe96defc2c8f2f7d9364e7cc1e8568039e340d81c541a8fbb91cd5e9b41b2b97716c0d22844cf179c16b53f96b7f64efc41a

    • C:\Users\Admin\AppData\Local\Temp\7zS4B37ED46\sonia_8.txt
      MD5

      c549246895fdf8d8725255427e2a7168

      SHA1

      ae7e4d99b82e6aba4366b34eba32b750d75a0234

      SHA256

      e607c6376ebb6db55e15852b51dfe666a09eb498c00cc86be9491564b5751c1d

      SHA512

      b6e8694d3e2bea07072dc643e6c2fe96defc2c8f2f7d9364e7cc1e8568039e340d81c541a8fbb91cd5e9b41b2b97716c0d22844cf179c16b53f96b7f64efc41a

    • C:\Users\Admin\AppData\Local\Temp\is-KECJL.tmp\sonia_5.tmp
      MD5

      4cd3babd15cb599aca85cc7f9804a347

      SHA1

      f3e7b1e376e2aa5e2c25af62395b953b373b8baf

      SHA256

      2752ffaa3030729fcb577d04d59eb6d03f43769bd85f733250960acb86096f43

      SHA512

      10afaa6523ed05839e63cd151f5159e2d707d9e74e52bc09d1e4bdeb7ec34a39aae20894b2cd3f0bacad4b709e0b61744983a6f97e825413329e90b8e6868b28

    • C:\Users\Admin\AppData\Local\Temp\is-KECJL.tmp\sonia_5.tmp
      MD5

      4cd3babd15cb599aca85cc7f9804a347

      SHA1

      f3e7b1e376e2aa5e2c25af62395b953b373b8baf

      SHA256

      2752ffaa3030729fcb577d04d59eb6d03f43769bd85f733250960acb86096f43

      SHA512

      10afaa6523ed05839e63cd151f5159e2d707d9e74e52bc09d1e4bdeb7ec34a39aae20894b2cd3f0bacad4b709e0b61744983a6f97e825413329e90b8e6868b28

    • C:\Users\Admin\AppData\Local\Temp\setup_installer.exe
      MD5

      9d17d5337009105e01762813aa8e3c49

      SHA1

      c4b4cbcb6c956ca8b823e873d0f2012afc3856b9

      SHA256

      8ac5d80081c96d3f48eb4fa96a0c533353143f9e984dd81a4fb5558278bc3b87

      SHA512

      9373f5817e58efdd074147754b4e293e5454f885800abd4b18f175297062e72dea1c764bc6c8bb6a27cdf35cb039b6d274bdcd555bab2056192d6d147e5e882e

    • C:\Users\Admin\AppData\Local\Temp\setup_installer.exe
      MD5

      9d17d5337009105e01762813aa8e3c49

      SHA1

      c4b4cbcb6c956ca8b823e873d0f2012afc3856b9

      SHA256

      8ac5d80081c96d3f48eb4fa96a0c533353143f9e984dd81a4fb5558278bc3b87

      SHA512

      9373f5817e58efdd074147754b4e293e5454f885800abd4b18f175297062e72dea1c764bc6c8bb6a27cdf35cb039b6d274bdcd555bab2056192d6d147e5e882e

    • \Users\Admin\AppData\Local\Temp\7zS4B37ED46\libcurl.dll
      MD5

      d09be1f47fd6b827c81a4812b4f7296f

      SHA1

      028ae3596c0790e6d7f9f2f3c8e9591527d267f7

      SHA256

      0de53e7be51789adaec5294346220b20f793e7f8d153a3c110a92d658760697e

      SHA512

      857f44a1383c29208509b8f1164b6438d750d5bb4419add7626986333433e67a0d1211ec240ce9472f30a1f32b16c8097aceba4b2255641b3d8928f94237f595

    • \Users\Admin\AppData\Local\Temp\7zS4B37ED46\libcurlpp.dll
      MD5

      e6e578373c2e416289a8da55f1dc5e8e

      SHA1

      b601a229b66ec3d19c2369b36216c6f6eb1c063e

      SHA256

      43e86d650a68f1f91fa2f4375aff2720e934aa78fa3d33e06363122bf5a9535f

      SHA512

      9df6a8c418113a77051f6cb02745ad48c521c13cdadb85e0e37f79e29041464c8c7d7ba8c558fdd877035eb8475b6f93e7fc62b38504ddfe696a61480cabac89

    • \Users\Admin\AppData\Local\Temp\7zS4B37ED46\libgcc_s_dw2-1.dll
      MD5

      9aec524b616618b0d3d00b27b6f51da1

      SHA1

      64264300801a353db324d11738ffed876550e1d3

      SHA256

      59a466f77584438fc3abc0f43edc0fc99d41851726827a008841f05cfe12da7e

      SHA512

      0648a26940e8f4aad73b05ad53e43316dd688e5d55e293cce88267b2b8744412be2e0d507dadad830776bf715bcd819f00f5d1f7ac1c5f1c4f682fb7457a20d0

    • \Users\Admin\AppData\Local\Temp\7zS4B37ED46\libstdc++-6.dll
      MD5

      5e279950775baae5fea04d2cc4526bcc

      SHA1

      8aef1e10031c3629512c43dd8b0b5d9060878453

      SHA256

      97de47068327bb822b33c7106f9cbb489480901a6749513ef5c31d229dcaca87

      SHA512

      666325e9ed71da4955058aea31b91e2e848be43211e511865f393b7f537c208c6b31c182f7d728c2704e9fc87e7d1be3f98f5fee4d34f11c56764e1c599afd02

    • \Users\Admin\AppData\Local\Temp\7zS4B37ED46\libwinpthread-1.dll
      MD5

      1e0d62c34ff2e649ebc5c372065732ee

      SHA1

      fcfaa36ba456159b26140a43e80fbd7e9d9af2de

      SHA256

      509cb1d1443b623a02562ac760bced540e327c65157ffa938a22f75e38155723

      SHA512

      3653f8ed8ad3476632f731a3e76c6aae97898e4bf14f70007c93e53bc443906835be29f861c4a123db5b11e0f3dd5013b2b3833469a062060825df9ee708dc61

    • \Users\Admin\AppData\Local\Temp\7zS4B37ED46\setup_install.exe
      MD5

      f8a340071d8faac07854daf0c3262cfc

      SHA1

      83bf588a2715ca4e332ba637a76082527520e5a9

      SHA256

      a62463997a479df23f84e3537706ccc66f542ad59fc02248b31082f7ce3038c9

      SHA512

      5a2a0649f499cc77b5c40c4637b5d5cea6ecca13da82295b0350c740cbff227decb74c7439c2a3922709eec71562c8984684dfb1d43370948cdabe92fd448376

    • \Users\Admin\AppData\Local\Temp\7zS4B37ED46\setup_install.exe
      MD5

      f8a340071d8faac07854daf0c3262cfc

      SHA1

      83bf588a2715ca4e332ba637a76082527520e5a9

      SHA256

      a62463997a479df23f84e3537706ccc66f542ad59fc02248b31082f7ce3038c9

      SHA512

      5a2a0649f499cc77b5c40c4637b5d5cea6ecca13da82295b0350c740cbff227decb74c7439c2a3922709eec71562c8984684dfb1d43370948cdabe92fd448376

    • \Users\Admin\AppData\Local\Temp\7zS4B37ED46\setup_install.exe
      MD5

      f8a340071d8faac07854daf0c3262cfc

      SHA1

      83bf588a2715ca4e332ba637a76082527520e5a9

      SHA256

      a62463997a479df23f84e3537706ccc66f542ad59fc02248b31082f7ce3038c9

      SHA512

      5a2a0649f499cc77b5c40c4637b5d5cea6ecca13da82295b0350c740cbff227decb74c7439c2a3922709eec71562c8984684dfb1d43370948cdabe92fd448376

    • \Users\Admin\AppData\Local\Temp\7zS4B37ED46\setup_install.exe
      MD5

      f8a340071d8faac07854daf0c3262cfc

      SHA1

      83bf588a2715ca4e332ba637a76082527520e5a9

      SHA256

      a62463997a479df23f84e3537706ccc66f542ad59fc02248b31082f7ce3038c9

      SHA512

      5a2a0649f499cc77b5c40c4637b5d5cea6ecca13da82295b0350c740cbff227decb74c7439c2a3922709eec71562c8984684dfb1d43370948cdabe92fd448376

    • \Users\Admin\AppData\Local\Temp\7zS4B37ED46\setup_install.exe
      MD5

      f8a340071d8faac07854daf0c3262cfc

      SHA1

      83bf588a2715ca4e332ba637a76082527520e5a9

      SHA256

      a62463997a479df23f84e3537706ccc66f542ad59fc02248b31082f7ce3038c9

      SHA512

      5a2a0649f499cc77b5c40c4637b5d5cea6ecca13da82295b0350c740cbff227decb74c7439c2a3922709eec71562c8984684dfb1d43370948cdabe92fd448376

    • \Users\Admin\AppData\Local\Temp\7zS4B37ED46\setup_install.exe
      MD5

      f8a340071d8faac07854daf0c3262cfc

      SHA1

      83bf588a2715ca4e332ba637a76082527520e5a9

      SHA256

      a62463997a479df23f84e3537706ccc66f542ad59fc02248b31082f7ce3038c9

      SHA512

      5a2a0649f499cc77b5c40c4637b5d5cea6ecca13da82295b0350c740cbff227decb74c7439c2a3922709eec71562c8984684dfb1d43370948cdabe92fd448376

    • \Users\Admin\AppData\Local\Temp\7zS4B37ED46\sonia_1.exe
      MD5

      7837314688b7989de1e8d94f598eb2dd

      SHA1

      889ae8ce433d5357f8ea2aff64daaba563dc94e3

      SHA256

      d8c28d07c365873b4e8332f057f062e65f2dd0cd4d599fd8b16d82eca5cf4247

      SHA512

      3df0c24a9f51a82716abb8e87ff44fdb6686183423d1f2f7d6bfb4cd03c3a18490f2c7987c29f3e1b2d25c48d428c2e73033998a872b185f70bb68a7aedb3e7c

    • \Users\Admin\AppData\Local\Temp\7zS4B37ED46\sonia_2.exe
      MD5

      6000e56bbeedcc660edb30d35239b64e

      SHA1

      32b46b49460ae483baee87c206d4fba37ef92912

      SHA256

      b6b2ea8d78e5782e5252fec287e5e50d3a215455b0b2e3edbac3616c972986e6

      SHA512

      dc7bb8205ca244260fe1299c2d1475ca0ae9c69346d3875a4fd4601789e8f21a64ad3a91e5764ab34833ee2e5143a1bfeae90cec71c77e33a8de72025714f58e

    • \Users\Admin\AppData\Local\Temp\7zS4B37ED46\sonia_2.exe
      MD5

      6000e56bbeedcc660edb30d35239b64e

      SHA1

      32b46b49460ae483baee87c206d4fba37ef92912

      SHA256

      b6b2ea8d78e5782e5252fec287e5e50d3a215455b0b2e3edbac3616c972986e6

      SHA512

      dc7bb8205ca244260fe1299c2d1475ca0ae9c69346d3875a4fd4601789e8f21a64ad3a91e5764ab34833ee2e5143a1bfeae90cec71c77e33a8de72025714f58e

    • \Users\Admin\AppData\Local\Temp\7zS4B37ED46\sonia_3.exe
      MD5

      4f96a8bb2010dcb1fd4721b2210f8d22

      SHA1

      3878978e4091d9089443dbad844e108b8f4f1620

      SHA256

      553ee5cc87e4268f2439e9dd36b4b35afc9d06cc62dad7e05d31348b9cf7d7cf

      SHA512

      04e08f0e9ace63dc54bda5c44f1d3c2bace32b91d22eeff77e7f3d49cbc1ebafaa51dd7d89561bf46c04aa01eda9b7476e64f3ed0b0e46b987647897666218b5

    • \Users\Admin\AppData\Local\Temp\7zS4B37ED46\sonia_3.exe
      MD5

      4f96a8bb2010dcb1fd4721b2210f8d22

      SHA1

      3878978e4091d9089443dbad844e108b8f4f1620

      SHA256

      553ee5cc87e4268f2439e9dd36b4b35afc9d06cc62dad7e05d31348b9cf7d7cf

      SHA512

      04e08f0e9ace63dc54bda5c44f1d3c2bace32b91d22eeff77e7f3d49cbc1ebafaa51dd7d89561bf46c04aa01eda9b7476e64f3ed0b0e46b987647897666218b5

    • \Users\Admin\AppData\Local\Temp\7zS4B37ED46\sonia_3.exe
      MD5

      4f96a8bb2010dcb1fd4721b2210f8d22

      SHA1

      3878978e4091d9089443dbad844e108b8f4f1620

      SHA256

      553ee5cc87e4268f2439e9dd36b4b35afc9d06cc62dad7e05d31348b9cf7d7cf

      SHA512

      04e08f0e9ace63dc54bda5c44f1d3c2bace32b91d22eeff77e7f3d49cbc1ebafaa51dd7d89561bf46c04aa01eda9b7476e64f3ed0b0e46b987647897666218b5

    • \Users\Admin\AppData\Local\Temp\7zS4B37ED46\sonia_3.exe
      MD5

      4f96a8bb2010dcb1fd4721b2210f8d22

      SHA1

      3878978e4091d9089443dbad844e108b8f4f1620

      SHA256

      553ee5cc87e4268f2439e9dd36b4b35afc9d06cc62dad7e05d31348b9cf7d7cf

      SHA512

      04e08f0e9ace63dc54bda5c44f1d3c2bace32b91d22eeff77e7f3d49cbc1ebafaa51dd7d89561bf46c04aa01eda9b7476e64f3ed0b0e46b987647897666218b5

    • \Users\Admin\AppData\Local\Temp\7zS4B37ED46\sonia_4.exe
      MD5

      5668cb771643274ba2c375ec6403c266

      SHA1

      dd78b03428b99368906fe62fc46aaaf1db07a8b9

      SHA256

      d417bd4de6a5227f5ea5cff3567e74fe2b2a25c0a80123b7b37b27db89adc384

      SHA512

      135bd12414773cc84270af5225920a01487626528d7bbc2b703be71652265772c2e5488ee3f7e2c53b0b01c617b8c7920e0b457472b6724cfa9ec4c390b0a55a

    • \Users\Admin\AppData\Local\Temp\7zS4B37ED46\sonia_4.exe
      MD5

      5668cb771643274ba2c375ec6403c266

      SHA1

      dd78b03428b99368906fe62fc46aaaf1db07a8b9

      SHA256

      d417bd4de6a5227f5ea5cff3567e74fe2b2a25c0a80123b7b37b27db89adc384

      SHA512

      135bd12414773cc84270af5225920a01487626528d7bbc2b703be71652265772c2e5488ee3f7e2c53b0b01c617b8c7920e0b457472b6724cfa9ec4c390b0a55a

    • \Users\Admin\AppData\Local\Temp\7zS4B37ED46\sonia_4.exe
      MD5

      5668cb771643274ba2c375ec6403c266

      SHA1

      dd78b03428b99368906fe62fc46aaaf1db07a8b9

      SHA256

      d417bd4de6a5227f5ea5cff3567e74fe2b2a25c0a80123b7b37b27db89adc384

      SHA512

      135bd12414773cc84270af5225920a01487626528d7bbc2b703be71652265772c2e5488ee3f7e2c53b0b01c617b8c7920e0b457472b6724cfa9ec4c390b0a55a

    • \Users\Admin\AppData\Local\Temp\7zS4B37ED46\sonia_5.exe
      MD5

      3630ff5c281859f4f95aa0516a33f24a

      SHA1

      32943c4bf92b7b763736af2bf360e91de1f9ef77

      SHA256

      2f1f85c6ea774f0337c5028d557489eb48bf82783c891dec229270e6fcc8d496

      SHA512

      f5a1268d78faa349ddf054fb8cfcf39344065b828181191431ea0bb7d82216a85fab96db902940ec574d992b75b954978fcad96d36d585e6df27623c6320e640

    • \Users\Admin\AppData\Local\Temp\7zS4B37ED46\sonia_5.exe
      MD5

      3630ff5c281859f4f95aa0516a33f24a

      SHA1

      32943c4bf92b7b763736af2bf360e91de1f9ef77

      SHA256

      2f1f85c6ea774f0337c5028d557489eb48bf82783c891dec229270e6fcc8d496

      SHA512

      f5a1268d78faa349ddf054fb8cfcf39344065b828181191431ea0bb7d82216a85fab96db902940ec574d992b75b954978fcad96d36d585e6df27623c6320e640

    • \Users\Admin\AppData\Local\Temp\7zS4B37ED46\sonia_5.exe
      MD5

      3630ff5c281859f4f95aa0516a33f24a

      SHA1

      32943c4bf92b7b763736af2bf360e91de1f9ef77

      SHA256

      2f1f85c6ea774f0337c5028d557489eb48bf82783c891dec229270e6fcc8d496

      SHA512

      f5a1268d78faa349ddf054fb8cfcf39344065b828181191431ea0bb7d82216a85fab96db902940ec574d992b75b954978fcad96d36d585e6df27623c6320e640

    • \Users\Admin\AppData\Local\Temp\7zS4B37ED46\sonia_6.exe
      MD5

      3568d61a49b61ce18bd6093748ffd32a

      SHA1

      0f6c4618eb4fca4972869a56bf6d8b020e1440f8

      SHA256

      af350212764e6304bf417e81cf0009b494119670e4bc1b187cd79cf4c487c7b6

      SHA512

      5c0129297fe07f919fe228633e193f56167e4f92815aa2cb1b9749ff14f377ec4d5c0414dffc733cbdc0b448e4552e06a527a481a144cd3af413c77fe2937cde

    • \Users\Admin\AppData\Local\Temp\7zS4B37ED46\sonia_7.exe
      MD5

      8526a0606334b5e9cccd811456aa2294

      SHA1

      d11bd3ae2d4217337d23937f620da296a22d84ac

      SHA256

      d429e634b43a7567fcb39469c1b5a49bb8ce5db49720e3e8ba8f5a30472fd5f2

      SHA512

      e4d59ca299237d24c576422c20bb1d15502ea67e3d89f723e42be74d25729d46aad85e3fd6a0e16da820a001ae52b6239e8c3c062131f162e03b83d1842bbcb9

    • \Users\Admin\AppData\Local\Temp\7zS4B37ED46\sonia_7.exe
      MD5

      8526a0606334b5e9cccd811456aa2294

      SHA1

      d11bd3ae2d4217337d23937f620da296a22d84ac

      SHA256

      d429e634b43a7567fcb39469c1b5a49bb8ce5db49720e3e8ba8f5a30472fd5f2

      SHA512

      e4d59ca299237d24c576422c20bb1d15502ea67e3d89f723e42be74d25729d46aad85e3fd6a0e16da820a001ae52b6239e8c3c062131f162e03b83d1842bbcb9

    • \Users\Admin\AppData\Local\Temp\7zS4B37ED46\sonia_7.exe
      MD5

      8526a0606334b5e9cccd811456aa2294

      SHA1

      d11bd3ae2d4217337d23937f620da296a22d84ac

      SHA256

      d429e634b43a7567fcb39469c1b5a49bb8ce5db49720e3e8ba8f5a30472fd5f2

      SHA512

      e4d59ca299237d24c576422c20bb1d15502ea67e3d89f723e42be74d25729d46aad85e3fd6a0e16da820a001ae52b6239e8c3c062131f162e03b83d1842bbcb9

    • \Users\Admin\AppData\Local\Temp\7zS4B37ED46\sonia_7.exe
      MD5

      8526a0606334b5e9cccd811456aa2294

      SHA1

      d11bd3ae2d4217337d23937f620da296a22d84ac

      SHA256

      d429e634b43a7567fcb39469c1b5a49bb8ce5db49720e3e8ba8f5a30472fd5f2

      SHA512

      e4d59ca299237d24c576422c20bb1d15502ea67e3d89f723e42be74d25729d46aad85e3fd6a0e16da820a001ae52b6239e8c3c062131f162e03b83d1842bbcb9

    • \Users\Admin\AppData\Local\Temp\7zS4B37ED46\sonia_8.exe
      MD5

      c549246895fdf8d8725255427e2a7168

      SHA1

      ae7e4d99b82e6aba4366b34eba32b750d75a0234

      SHA256

      e607c6376ebb6db55e15852b51dfe666a09eb498c00cc86be9491564b5751c1d

      SHA512

      b6e8694d3e2bea07072dc643e6c2fe96defc2c8f2f7d9364e7cc1e8568039e340d81c541a8fbb91cd5e9b41b2b97716c0d22844cf179c16b53f96b7f64efc41a

    • \Users\Admin\AppData\Local\Temp\7zS4B37ED46\sonia_8.exe
      MD5

      c549246895fdf8d8725255427e2a7168

      SHA1

      ae7e4d99b82e6aba4366b34eba32b750d75a0234

      SHA256

      e607c6376ebb6db55e15852b51dfe666a09eb498c00cc86be9491564b5751c1d

      SHA512

      b6e8694d3e2bea07072dc643e6c2fe96defc2c8f2f7d9364e7cc1e8568039e340d81c541a8fbb91cd5e9b41b2b97716c0d22844cf179c16b53f96b7f64efc41a

    • \Users\Admin\AppData\Local\Temp\is-KECJL.tmp\sonia_5.tmp
      MD5

      4cd3babd15cb599aca85cc7f9804a347

      SHA1

      f3e7b1e376e2aa5e2c25af62395b953b373b8baf

      SHA256

      2752ffaa3030729fcb577d04d59eb6d03f43769bd85f733250960acb86096f43

      SHA512

      10afaa6523ed05839e63cd151f5159e2d707d9e74e52bc09d1e4bdeb7ec34a39aae20894b2cd3f0bacad4b709e0b61744983a6f97e825413329e90b8e6868b28

    • \Users\Admin\AppData\Local\Temp\is-U90F3.tmp\_isetup\_shfoldr.dll
      MD5

      92dc6ef532fbb4a5c3201469a5b5eb63

      SHA1

      3e89ff837147c16b4e41c30d6c796374e0b8e62c

      SHA256

      9884e9d1b4f8a873ccbd81f8ad0ae257776d2348d027d811a56475e028360d87

      SHA512

      9908e573921d5dbc3454a1c0a6c969ab8a81cc2e8b5385391d46b1a738fb06a76aa3282e0e58d0d2ffa6f27c85668cd5178e1500b8a39b1bbae04366ae6a86d3

    • \Users\Admin\AppData\Local\Temp\setup_installer.exe
      MD5

      9d17d5337009105e01762813aa8e3c49

      SHA1

      c4b4cbcb6c956ca8b823e873d0f2012afc3856b9

      SHA256

      8ac5d80081c96d3f48eb4fa96a0c533353143f9e984dd81a4fb5558278bc3b87

      SHA512

      9373f5817e58efdd074147754b4e293e5454f885800abd4b18f175297062e72dea1c764bc6c8bb6a27cdf35cb039b6d274bdcd555bab2056192d6d147e5e882e

    • \Users\Admin\AppData\Local\Temp\setup_installer.exe
      MD5

      9d17d5337009105e01762813aa8e3c49

      SHA1

      c4b4cbcb6c956ca8b823e873d0f2012afc3856b9

      SHA256

      8ac5d80081c96d3f48eb4fa96a0c533353143f9e984dd81a4fb5558278bc3b87

      SHA512

      9373f5817e58efdd074147754b4e293e5454f885800abd4b18f175297062e72dea1c764bc6c8bb6a27cdf35cb039b6d274bdcd555bab2056192d6d147e5e882e

    • \Users\Admin\AppData\Local\Temp\setup_installer.exe
      MD5

      9d17d5337009105e01762813aa8e3c49

      SHA1

      c4b4cbcb6c956ca8b823e873d0f2012afc3856b9

      SHA256

      8ac5d80081c96d3f48eb4fa96a0c533353143f9e984dd81a4fb5558278bc3b87

      SHA512

      9373f5817e58efdd074147754b4e293e5454f885800abd4b18f175297062e72dea1c764bc6c8bb6a27cdf35cb039b6d274bdcd555bab2056192d6d147e5e882e

    • \Users\Admin\AppData\Local\Temp\setup_installer.exe
      MD5

      9d17d5337009105e01762813aa8e3c49

      SHA1

      c4b4cbcb6c956ca8b823e873d0f2012afc3856b9

      SHA256

      8ac5d80081c96d3f48eb4fa96a0c533353143f9e984dd81a4fb5558278bc3b87

      SHA512

      9373f5817e58efdd074147754b4e293e5454f885800abd4b18f175297062e72dea1c764bc6c8bb6a27cdf35cb039b6d274bdcd555bab2056192d6d147e5e882e

    • memory/892-167-0x0000000000A60000-0x0000000000AC2000-memory.dmp
      Filesize

      392KB

    • memory/892-168-0x0000000000320000-0x00000000003B7000-memory.dmp
      Filesize

      604KB

    • memory/892-171-0x0000000000400000-0x000000000093E000-memory.dmp
      Filesize

      5.2MB

    • memory/892-161-0x0000000000A60000-0x0000000000AC2000-memory.dmp
      Filesize

      392KB

    • memory/968-162-0x00000000001F0000-0x00000000001F1000-memory.dmp
      Filesize

      4KB

    • memory/1244-87-0x000000006FE40000-0x000000006FFC6000-memory.dmp
      Filesize

      1.5MB

    • memory/1244-151-0x000000006B440000-0x000000006B4CF000-memory.dmp
      Filesize

      572KB

    • memory/1244-82-0x000000006B440000-0x000000006B4CF000-memory.dmp
      Filesize

      572KB

    • memory/1244-83-0x000000006B440000-0x000000006B4CF000-memory.dmp
      Filesize

      572KB

    • memory/1244-84-0x000000006FE40000-0x000000006FFC6000-memory.dmp
      Filesize

      1.5MB

    • memory/1244-85-0x000000006FE40000-0x000000006FFC6000-memory.dmp
      Filesize

      1.5MB

    • memory/1244-86-0x000000006FE40000-0x000000006FFC6000-memory.dmp
      Filesize

      1.5MB

    • memory/1244-149-0x0000000000400000-0x000000000051D000-memory.dmp
      Filesize

      1.1MB

    • memory/1244-150-0x000000006B280000-0x000000006B2A6000-memory.dmp
      Filesize

      152KB

    • memory/1244-81-0x000000006B440000-0x000000006B4CF000-memory.dmp
      Filesize

      572KB

    • memory/1244-152-0x000000006FE40000-0x000000006FFC6000-memory.dmp
      Filesize

      1.5MB

    • memory/1244-153-0x0000000064940000-0x0000000064959000-memory.dmp
      Filesize

      100KB

    • memory/1244-88-0x000000006B280000-0x000000006B2A6000-memory.dmp
      Filesize

      152KB

    • memory/1244-89-0x0000000000400000-0x000000000051D000-memory.dmp
      Filesize

      1.1MB

    • memory/1244-91-0x0000000000400000-0x000000000051D000-memory.dmp
      Filesize

      1.1MB

    • memory/1244-94-0x0000000000400000-0x000000000051D000-memory.dmp
      Filesize

      1.1MB

    • memory/1244-90-0x0000000000400000-0x000000000051D000-memory.dmp
      Filesize

      1.1MB

    • memory/1244-92-0x0000000000400000-0x000000000051D000-memory.dmp
      Filesize

      1.1MB

    • memory/1244-93-0x0000000000400000-0x000000000051D000-memory.dmp
      Filesize

      1.1MB

    • memory/1272-165-0x0000000000240000-0x000000000026F000-memory.dmp
      Filesize

      188KB

    • memory/1272-173-0x0000000002982000-0x0000000002983000-memory.dmp
      Filesize

      4KB

    • memory/1272-158-0x0000000000AB0000-0x0000000000AD1000-memory.dmp
      Filesize

      132KB

    • memory/1272-166-0x0000000000400000-0x00000000008FD000-memory.dmp
      Filesize

      5.0MB

    • memory/1272-176-0x0000000002984000-0x0000000002986000-memory.dmp
      Filesize

      8KB

    • memory/1272-175-0x0000000000A50000-0x0000000000A6E000-memory.dmp
      Filesize

      120KB

    • memory/1272-169-0x00000000009C0000-0x00000000009E0000-memory.dmp
      Filesize

      128KB

    • memory/1272-170-0x0000000072D40000-0x000000007342E000-memory.dmp
      Filesize

      6.9MB

    • memory/1272-174-0x0000000002983000-0x0000000002984000-memory.dmp
      Filesize

      4KB

    • memory/1272-172-0x0000000002981000-0x0000000002982000-memory.dmp
      Filesize

      4KB

    • memory/1272-164-0x0000000000AB0000-0x0000000000AD1000-memory.dmp
      Filesize

      132KB

    • memory/1576-147-0x0000000000400000-0x000000000046D000-memory.dmp
      Filesize

      436KB

    • memory/1576-154-0x0000000000400000-0x000000000046D000-memory.dmp
      Filesize

      436KB

    • memory/1792-54-0x00000000752A1000-0x00000000752A3000-memory.dmp
      Filesize

      8KB