Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    143s
  • max time network
    159s
  • platform
    windows11-21h2_x64
  • resource
    win11-20240221-en
  • resource tags

    arch:x64arch:x86image:win11-20240221-enlocale:en-usos:windows11-21h2-x64system
  • submitted
    11/03/2024, 19:11

General

  • Target

    Tgsnoser.exe

  • Size

    9.3MB

  • MD5

    cb4614b8f2c04dd6de09375d4b6ef2c5

  • SHA1

    3faa8f9f97334f6ca6be442da6759fde417e4037

  • SHA256

    74f23e21c68507d3e99894fe630d3cdacfce03da73ef887e528da8fdb317f015

  • SHA512

    168a008d50855fca59438baaccfa01e12c9010a6645efdb81a17f55d3a8abb80312e96060894ad74828997e49244a9c3937d6120f028bce66527a42f38821104

  • SSDEEP

    196608:7u8AZCZ1W903eV4QR3h4KF5ikWMWKACyByHVKjNUCtxytPR2suIin4:LAZCfW+eGQRRn/ikWMWvyQj6CajL1in4

Malware Config

Signatures

  • Loads dropped DLL 64 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Looks up external IP address via web service 2 IoCs

    Uses a legitimate IP lookup service to find the infected system's external IP.

  • Checks processor information in registry 2 TTPs 2 IoCs

    Processor information is often read in order to detect sandboxing environments.

  • Kills process with taskkill 7 IoCs
  • Suspicious behavior: EnumeratesProcesses 2 IoCs
  • Suspicious use of AdjustPrivilegeToken 7 IoCs
  • Suspicious use of WriteProcessMemory 44 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\Tgsnoser.exe
    "C:\Users\Admin\AppData\Local\Temp\Tgsnoser.exe"
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:1948
    • C:\Users\Admin\AppData\Local\Temp\Tgsnoser.exe
      "C:\Users\Admin\AppData\Local\Temp\Tgsnoser.exe"
      2⤵
      • Loads dropped DLL
      • Suspicious use of WriteProcessMemory
      PID:3452
      • C:\Users\Admin\AppData\Local\Temp\Tgsnoser.exe
        "C:\Users\Admin\AppData\Local\Temp\Tgsnoser.exe" "--multiprocessing-fork" "parent_pid=3452" "pipe_handle=524"
        3⤵
        • Loads dropped DLL
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of WriteProcessMemory
        PID:1312
        • C:\Windows\system32\cmd.exe
          C:\Windows\system32\cmd.exe /c "taskkill /f /im opera.exe"
          4⤵
          • Suspicious use of WriteProcessMemory
          PID:3036
          • C:\Windows\system32\taskkill.exe
            taskkill /f /im opera.exe
            5⤵
            • Kills process with taskkill
            • Suspicious use of AdjustPrivilegeToken
            PID:3068
      • C:\Users\Admin\AppData\Local\Temp\Tgsnoser.exe
        "C:\Users\Admin\AppData\Local\Temp\Tgsnoser.exe" "--multiprocessing-fork" "parent_pid=3452" "pipe_handle=532"
        3⤵
        • Loads dropped DLL
        • Checks processor information in registry
        • Suspicious use of WriteProcessMemory
        PID:884
        • C:\Windows\system32\cmd.exe
          C:\Windows\system32\cmd.exe /c "taskkill /f /im chrome.exe"
          4⤵
          • Suspicious use of WriteProcessMemory
          PID:2632
          • C:\Windows\system32\taskkill.exe
            taskkill /f /im chrome.exe
            5⤵
            • Kills process with taskkill
            • Suspicious use of AdjustPrivilegeToken
            PID:2196
        • C:\Windows\system32\cmd.exe
          C:\Windows\system32\cmd.exe /c "ver"
          4⤵
            PID:1040
          • C:\Windows\system32\cmd.exe
            C:\Windows\system32\cmd.exe /c "ver"
            4⤵
              PID:392
          • C:\Users\Admin\AppData\Local\Temp\Tgsnoser.exe
            "C:\Users\Admin\AppData\Local\Temp\Tgsnoser.exe" "--multiprocessing-fork" "parent_pid=3452" "pipe_handle=620"
            3⤵
            • Loads dropped DLL
            • Suspicious use of WriteProcessMemory
            PID:5088
            • C:\Windows\system32\cmd.exe
              C:\Windows\system32\cmd.exe /c "taskkill /f /im brave.exe"
              4⤵
              • Suspicious use of WriteProcessMemory
              PID:3840
              • C:\Windows\system32\taskkill.exe
                taskkill /f /im brave.exe
                5⤵
                • Kills process with taskkill
                • Suspicious use of AdjustPrivilegeToken
                PID:3376
            • C:\Windows\system32\cmd.exe
              C:\Windows\system32\cmd.exe /c "taskkill /f /im browser.exe"
              4⤵
              • Suspicious use of WriteProcessMemory
              PID:4520
              • C:\Windows\system32\taskkill.exe
                taskkill /f /im browser.exe
                5⤵
                • Kills process with taskkill
                • Suspicious use of AdjustPrivilegeToken
                PID:4496
          • C:\Users\Admin\AppData\Local\Temp\Tgsnoser.exe
            "C:\Users\Admin\AppData\Local\Temp\Tgsnoser.exe" "--multiprocessing-fork" "parent_pid=3452" "pipe_handle=544"
            3⤵
            • Loads dropped DLL
            • Suspicious use of WriteProcessMemory
            PID:2952
            • C:\Windows\system32\cmd.exe
              C:\Windows\system32\cmd.exe /c "taskkill /f /im opera.exe"
              4⤵
              • Suspicious use of WriteProcessMemory
              PID:4656
              • C:\Windows\system32\taskkill.exe
                taskkill /f /im opera.exe
                5⤵
                • Kills process with taskkill
                • Suspicious use of AdjustPrivilegeToken
                PID:232
            • C:\Windows\system32\cmd.exe
              C:\Windows\system32\cmd.exe /c "taskkill /f /im vivaldi.exe"
              4⤵
              • Suspicious use of WriteProcessMemory
              PID:2068
              • C:\Windows\system32\taskkill.exe
                taskkill /f /im vivaldi.exe
                5⤵
                • Kills process with taskkill
                • Suspicious use of AdjustPrivilegeToken
                PID:2704
          • C:\Users\Admin\AppData\Local\Temp\Tgsnoser.exe
            "C:\Users\Admin\AppData\Local\Temp\Tgsnoser.exe" "--multiprocessing-fork" "parent_pid=3452" "pipe_handle=596"
            3⤵
            • Loads dropped DLL
            • Suspicious use of WriteProcessMemory
            PID:2200
            • C:\Windows\system32\cmd.exe
              C:\Windows\system32\cmd.exe /c "taskkill /f /im msedge.exe"
              4⤵
              • Suspicious use of WriteProcessMemory
              PID:2736
              • C:\Windows\system32\taskkill.exe
                taskkill /f /im msedge.exe
                5⤵
                • Kills process with taskkill
                • Suspicious use of AdjustPrivilegeToken
                PID:1380

      Network

      MITRE ATT&CK Enterprise v15

      Replay Monitor

      Loading Replay Monitor...

      Downloads

      • C:\Users\Admin\AppData\Local\Temp\_MEI19482\VCRUNTIME140.dll

        Filesize

        116KB

        MD5

        be8dbe2dc77ebe7f88f910c61aec691a

        SHA1

        a19f08bb2b1c1de5bb61daf9f2304531321e0e40

        SHA256

        4d292623516f65c80482081e62d5dadb759dc16e851de5db24c3cbb57b87db83

        SHA512

        0da644472b374f1da449a06623983d0477405b5229e386accadb154b43b8b083ee89f07c3f04d2c0c7501ead99ad95aecaa5873ff34c5eeb833285b598d5a655

      • C:\Users\Admin\AppData\Local\Temp\_MEI19482\_bz2.pyd

        Filesize

        82KB

        MD5

        afaa11704fda2ed686389080b6ffcb11

        SHA1

        9a9c83546c2e3b3ccf823e944d5fd07d22318a1b

        SHA256

        ab34b804da5b8e814b2178754d095a4e8aead77eefd3668da188769392cdb5f4

        SHA512

        de23bb50f1d416cf4716a5d25fe12f4b66e6226bb39e964d0de0fef1724d35b48c681809589c731d3061a97c62b4dc7b9b7dfe2978f196f2d82ccce286be8a2a

      • C:\Users\Admin\AppData\Local\Temp\_MEI19482\_ctypes.pyd

        Filesize

        121KB

        MD5

        78df76aa0ff8c17edc60376724d206cd

        SHA1

        9818bd514d3d0fc1749b2d5ef9e4d72d781b51dd

        SHA256

        b75560db79ba6fb56c393a4886eedd72e60df1e2f7f870fe2e356d08155f367b

        SHA512

        6189c1bd56db5b7a9806960bc27742d97d2794acebc32e0a5f634fe0ff863e1775dcf90224504d5e2920a1192a3c1511fb84d41d7a2b69c67d3bdfbab2f968fa

      • C:\Users\Admin\AppData\Local\Temp\_MEI19482\_decimal.pyd

        Filesize

        247KB

        MD5

        33f721f1cbb413cd4f26fe0ed4a597e7

        SHA1

        476d5fab7b2db3f53b90b7cc6099d5541e72883e

        SHA256

        080d0fbbff68d17b670110c95210347be7b8ab7c385f956f123a66dc2f434ab3

        SHA512

        8fbc82af0fe063c4eb8fdefae5650924ac607be54b81c4d51064ca720bb85bfc9e1705ba93df5be6add156a6b360dd1f700618862877e28de7c13e21b470b507

      • C:\Users\Admin\AppData\Local\Temp\_MEI19482\_elementtree.pyd

        Filesize

        125KB

        MD5

        f3e1ebfaba9fb36fa7f0fb5e4eb55f40

        SHA1

        098b3e5745329ebf309923e715e8673e4364ca76

        SHA256

        73b69bbf77237c7343dbd0cac22c6ab19feb8a49d56c78e34ce209da26c9692f

        SHA512

        981c3a125ba152cb61ab7a6547079f8a0ba09ca1c5508fdadafb783b466c0e1e3b02e3bfcfe4cf8e37dae70c9112b18ab49f5f37f27056c45f22b275f6bed281

      • C:\Users\Admin\AppData\Local\Temp\_MEI19482\_hashlib.pyd

        Filesize

        63KB

        MD5

        534902be1d8a57974efd025aff4f11ef

        SHA1

        1179c6153dc52f72c29fe1591dc9a889c2e229e9

        SHA256

        30adfb86513282e59d7e27968e1ff6686e43b8559994a50c17be66d0789f82b3

        SHA512

        7f0cdcf8576faf30fc8104b9bc9586d85ad50b7803074a7bcaa192eed05b1e2bd988a91873554fb63f204fcad86c667e95755c5ff13c43f96dc334ef3ea37240

      • C:\Users\Admin\AppData\Local\Temp\_MEI19482\_lzma.pyd

        Filesize

        155KB

        MD5

        2ae2464bfcc442083424bc05ed9be7d2

        SHA1

        f64b100b59713e51d90d2e016b1fe573b6507b5d

        SHA256

        64ba475a28781dca81180a1b8722a81893704f8d8fac0b022c846fdcf95b15b9

        SHA512

        6c3acd3dcae733452ad68477417693af64a7d79558e8ec9f0581289903c2412e2f29195b90e396bfdcd765337a6dea9632e4b8d936ac39b1351cd593cb12ce27

      • C:\Users\Admin\AppData\Local\Temp\_MEI19482\_multiprocessing.pyd

        Filesize

        33KB

        MD5

        6a987a67c1aa8d842011cdff84fcaa0f

        SHA1

        c54d0a16f1fb0cfc15cea67cfcfe17509bde29d2

        SHA256

        bc7dc19f52a0521f1a9998c47facc27917f560a739fbcf57e322290f7c6973af

        SHA512

        db8a6649a9aa9db746126f45b636797c18f55d2830849e89533028a9aa099f89c297c23dcf5b6f6a2262cad2ebeec882dfe772d6e621e54c41bef4d7e67164d3

      • C:\Users\Admin\AppData\Local\Temp\_MEI19482\_queue.pyd

        Filesize

        31KB

        MD5

        dbd3c2c0a348a44a96d76100690c606d

        SHA1

        04e901eac1161255adb16155459ac50f124b30a6

        SHA256

        2bfd8459ba01c741d676f79ee96802fb2c29cb30f50301d67fde8bbce8e7e7d4

        SHA512

        99fee97c272bfff4515407d588b2761af7be39a83be070e01128fba71ff75404fbad6352bcdbe5465786ce86a6550f47b177d022ccb53f32f5a482db61bee3b4

      • C:\Users\Admin\AppData\Local\Temp\_MEI19482\_socket.pyd

        Filesize

        77KB

        MD5

        11b7936a5bd929cc76ac3f4f137b5236

        SHA1

        09cb712fa43dc008eb5185481a5080997aff82ab

        SHA256

        8956b11c07d08d289425e7240b8fa37841a27c435617dbbd02bfe3f9405f422b

        SHA512

        7b050df283a0ad4295a5be47b99d7361f49a3cfd20691e201c5da5349a9eb8f5710ab3a26a66d194567539660ed227411485f4edf2269567a55a6b8ccfd71096

      • C:\Users\Admin\AppData\Local\Temp\_MEI19482\_sqlite3.pyd

        Filesize

        117KB

        MD5

        c8f178bc416050640d547c69115855a1

        SHA1

        f1ebffe50e4245504848b25b966b0d176c23606f

        SHA256

        bd3c36976854fa0c885bdd95fb4eb096e29b1967c1f043019b5fa5be1b7bde51

        SHA512

        5b85c9e48f4128bc6958b20bfc3954bd5ff3554298b43f06cfd1930b7c4214d1b61f8d8345cd11fe9ecfee802938aa6c74758ffbf459457f9eecb40ac0ae12f3

      • C:\Users\Admin\AppData\Local\Temp\_MEI19482\_ssl.pyd

        Filesize

        172KB

        MD5

        0e9e6d6839d74ad40bb9f16cc6601b13

        SHA1

        6671039088793f4ba42f5bd4409c26b1283ceafa

        SHA256

        bca1f490c9f7ba25cbbb4b39785dda8aa651123e22d4e7edc299b218c8157a81

        SHA512

        cb8742ae5db83487c21ba17d9efaca736df49f8f3c4a72355ede119717b83e0b4c6d94bd1c75a992abaf4ab89502a805f81b2529e85fd6a656600d6e7b0c90f5

      • C:\Users\Admin\AppData\Local\Temp\_MEI19482\_uuid.pyd

        Filesize

        24KB

        MD5

        4ba1fcf5f12ebc514e86d7e02901b3c3

        SHA1

        0fd88df618da41cdeb4afdaded039932a66ce5f6

        SHA256

        51cb69267f77c094d687af5b80c560eaf325d0990304baf20242d477d8b156a1

        SHA512

        3601331a84a9dcf62bbdadfc5c273853acf229931e70f5ff6f541d5f23474373f9366c606534ffdbf73c1044e98e464877b395f2e285821f264a57cd90021705

      • C:\Users\Admin\AppData\Local\Temp\_MEI19482\base_library.zip

        Filesize

        1.4MB

        MD5

        d54c82078f8a16cc3fd082d8eac75a23

        SHA1

        264c1908223035119508950e9c7946e6c73559d1

        SHA256

        9a18d1dbee7f17395b2a1aae2089b51b461cfbd2722b4b5646faafc8bc5500ce

        SHA512

        ac132059839f6c7a50d35144e93c10932b5d7c41efb7e0bc22eff4493977b112d3709fde592f27c8898689c09908b7b36bae21416ec95b900ef9c779112c77f9

      • C:\Users\Admin\AppData\Local\Temp\_MEI19482\libcrypto-3.dll

        Filesize

        3.5MB

        MD5

        57deac9628d197821ae599b00efb227a

        SHA1

        8921b2e982be97cee0e707590e231bb4f344dc3b

        SHA256

        c3629d9c31db4b22eec58a50e9c2a207535e30809bbf7145b109f7c39c2c299c

        SHA512

        af7a6251e42dbb36b98514d3c0f52445da9fcf8ff8c5debaf7575a1692f64a92c5fc570dc8a61554d198a88b082dd9276965f6395e171f5b9829f74797ac25c9

      • C:\Users\Admin\AppData\Local\Temp\_MEI19482\libcrypto-3.dll

        Filesize

        4.9MB

        MD5

        51e8a5281c2092e45d8c97fbdbf39560

        SHA1

        c499c810ed83aaadce3b267807e593ec6b121211

        SHA256

        2a234b5aa20c3faecf725bbb54fb33f3d94543f78fa7045408e905593e49960a

        SHA512

        98b91719b0975cb38d3b3c7b6f820d184ef1b64d38ad8515be0b8b07730e2272376b9e51631fe9efd9b8a1709fea214cf3f77b34eeb9fd282eb09e395120e7cb

      • C:\Users\Admin\AppData\Local\Temp\_MEI19482\libffi-8.dll

        Filesize

        38KB

        MD5

        0f8e4992ca92baaf54cc0b43aaccce21

        SHA1

        c7300975df267b1d6adcbac0ac93fd7b1ab49bd2

        SHA256

        eff52743773eb550fcc6ce3efc37c85724502233b6b002a35496d828bd7b280a

        SHA512

        6e1b223462dc124279bfca74fd2c66fe18b368ffbca540c84e82e0f5bcbea0e10cc243975574fa95ace437b9d8b03a446ed5ee0c9b1b094147cefaf704dfe978

      • C:\Users\Admin\AppData\Local\Temp\_MEI19482\libssl-3.dll

        Filesize

        771KB

        MD5

        bfc834bb2310ddf01be9ad9cff7c2a41

        SHA1

        fb1d601b4fcb29ff1b13b0d2ed7119bd0472205c

        SHA256

        41ad1a04ca27a7959579e87fbbda87c93099616a64a0e66260c983381c5570d1

        SHA512

        6af473c7c0997f2847ebe7cee8ef67cd682dee41720d4f268964330b449ba71398fda8954524f9a97cc4cdf9893b8bdc7a1cf40e9e45a73f4f35a37f31c6a9c3

      • C:\Users\Admin\AppData\Local\Temp\_MEI19482\pyexpat.pyd

        Filesize

        193KB

        MD5

        bfe46323faea201f6d18d60723e06852

        SHA1

        f93afeebb3ea1e6d1cc8ab3618c9d4c88eaa7475

        SHA256

        35134cca2dcf7c2b7e592b677833322b6b72a6a88afcd3935afe5907a282e89e

        SHA512

        7342c309c98b7ef0d8e7d02e6a31afbd765b077b9061a185b160842b24af3fb629d5757001ae647b8c660defd41b765bbb6175cca431d569ff9bd580fd8f7913

      • C:\Users\Admin\AppData\Local\Temp\_MEI19482\python311.dll

        Filesize

        3.4MB

        MD5

        f34041f4a81473ebc606c037750774fc

        SHA1

        2a357373367d6a8e0b29c1aa5b53ab56cea32002

        SHA256

        9c1cbf54b9ebb543a008d93458fa8228665441f8833d78d8b291783aa5047336

        SHA512

        29303e3e4bd1e03ff8165749cbd38de07322497ec2be1dbb3f65d0ce8da0b14f8dd30945d79107568fa752223a4c344e23e20fb7f048f8d0b800c05a22df99b9

      • C:\Users\Admin\AppData\Local\Temp\_MEI19482\python311.dll

        Filesize

        3.5MB

        MD5

        550f16fb905d8d53b054679acf48a1c0

        SHA1

        249b8938b977277275f008fc16d3432b4f40490f

        SHA256

        84e290c5fbae3d413d8efd08b351dd2b5ccef2a0e178102c6547ec58a4751a92

        SHA512

        4a3857eccb482a67fb3a4b9dfd04b1afb97fba2ea0bfb77ef990d4d886b68bdf7aa2e572494e478f41dca95e47e5ba6f2eb17ad2dbf2a3e3e0aaf591e3795ffd

      • C:\Users\Admin\AppData\Local\Temp\_MEI19482\python311.dll

        Filesize

        2.5MB

        MD5

        bd032ec8436b27696d7c5f4089a612f6

        SHA1

        0f5f9bb447d1abf3f62917789761c8d2857c2770

        SHA256

        fcce540a3a2d24be9d150036486d397d50f7bb6b37e4650bcdda3ee48beed637

        SHA512

        53891fd0251597344b1080183842a4dba111bffc25b0164284ea0a4e44ed061752cf814600647d2ae5812fe49c5427a8ae22338e5ebe1edb742c09892870cb43

      • C:\Users\Admin\AppData\Local\Temp\_MEI19482\python311.dll

        Filesize

        2.5MB

        MD5

        e2b5546e05abb168b3db63e4147c728e

        SHA1

        266a18bd024f568c049d41d860cc27e51d10024a

        SHA256

        31aa69fae70d90ce724bf1126cc769f45d02615ac0723b832bf801b36e03e8ca

        SHA512

        8084446e8cd505c088760533ccb3bc244c3a4b92a3106bfe9a71d9f41877d71d3b4aa5b389c8b1c791d10e2436b717b03a066283664e84412a2de334c2f58acd

      • C:\Users\Admin\AppData\Local\Temp\_MEI19482\python311.dll

        Filesize

        2.2MB

        MD5

        a155c4d80cb3f8dc2ed6cde10bd8be90

        SHA1

        82e73337b7148741feb129b7722d1b07f53d6d9e

        SHA256

        d02ce50eab3df62204f2d04cd22325c7b2a79706bde76f2dab9829bb36c3c7ca

        SHA512

        b765b720cf89bbfc255396aa1d78a925441ff4cccb1c677dc39899e4f292ff60476ad5c009aeb27c6d062587c2d0eed7c5600c64764ae711b828ecd1ddbb0c3e

      • C:\Users\Admin\AppData\Local\Temp\_MEI19482\python311.dll

        Filesize

        1.9MB

        MD5

        30033293c49e6becd0a6af0e6b77c152

        SHA1

        9c18129dd3fe00ec32634f7034d6f12e91af4934

        SHA256

        4a9f4ea13c6f901289ab72dce2b88d4b402fd86fde58cb69f59bfd3b95664924

        SHA512

        1ebf8b5ee68edfa4bc9e5cab41be9a17bfe18788a685178ae313a412ef6c1060d669f8b8317c00cde0c5ae2ddb91c2e55eef6d5455c32b26aca2264111712860

      • C:\Users\Admin\AppData\Local\Temp\_MEI19482\select.pyd

        Filesize

        29KB

        MD5

        0b55f18218f4c8f30105db9f179afb2c

        SHA1

        f1914831cf0a1af678970824f1c4438cc05f5587

        SHA256

        e7fe45baef9cee192c65fcfce1790ccb6f3f9b81e86df82c08f838e86275af02

        SHA512

        428ee25e99f882af5ad0dedf1ccdbeb1b4022ac286af23b209947a910bf02ae18a761f3152990c84397649702d8208fed269aa3e3a3c65770e21ee1eec064cc1

      • C:\Users\Admin\AppData\Local\Temp\_MEI19482\sqlite3.dll

        Filesize

        1.4MB

        MD5

        200db183a1b65800f27dab6bd3db0588

        SHA1

        063d851f0ef323c2dfb8f3a2d4bcc49f5348944a

        SHA256

        5a8d544b341f50913d4925fb1b6982cc492d9b4a4e96c0583b61de6f141f67c9

        SHA512

        5d6745690faf71ccacab08f13982c944d4193dd05a44aca8e9e235090d2b9f41daf9dc2052ca584ab79968ca188c819b121b5fe6bbcf93dfe47e79208046739a

      • C:\Users\Admin\AppData\Local\Temp\_MEI19482\unicodedata.pyd

        Filesize

        1.1MB

        MD5

        d4323ac0baab59aed34c761f056d50a9

        SHA1

        843687689d21ede9818c6fc5f3772bcf914f8a6e

        SHA256

        71d27537eb1e6de76fd145da4fdcbc379dc54de7854c99b2e61aae00109c13d0

        SHA512

        e31d071ce920b3e83c89505dfa22b2d0f09d43c408fcadbc910f021481c4a53c47919fce0215ae61f00956dcb7171449eabda8eef63a6fdd47aa13c7158577be

      • memory/2200-221-0x000001BEB2810000-0x000001BEB2811000-memory.dmp

        Filesize

        4KB