Resubmissions

02-06-2024 02:06

240602-cjl2jsfb91 10

02-06-2024 01:34

240602-bzlv2sfa36 10

Analysis

  • max time kernel
    300s
  • max time network
    258s
  • platform
    windows11-21h2_x64
  • resource
    win11-20240426-fr
  • resource tags

    arch:x64arch:x86image:win11-20240426-frlocale:fr-fros:windows11-21h2-x64systemwindows
  • submitted
    02-06-2024 01:34

General

  • Target

    my-app-1.0.0.exe

  • Size

    169.1MB

  • MD5

    b43efe56dd3c84590056c8c87ad3e6f4

  • SHA1

    9e490bbec3f132b7eb8ac39dd4d001da8b275b58

  • SHA256

    d851af974512dc132e8931f8a5d9f443af614e7eb45c140fc8c8971dbb960d78

  • SHA512

    0800a75016ba6b81de945aed51cac599b21fc24fd416ed360599f585d95a20781b7fa11cd9d7225a30b544ae768f0a38da1f427a42d406e21024b1a742fcaf74

  • SSDEEP

    1572864:kKrstWwz6PqazPK3qyBcr35JBNLDD/FaCA7pmLMzCOtoAJnn/N0wIbyraIjR:8W0qr26byra

Score
10/10

Malware Config

Signatures

  • Epsilon Stealer

    Information stealer.

  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 2 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Looks up external IP address via web service 2 IoCs

    Uses a legitimate IP lookup service to find the infected system's external IP.

  • Drops file in Windows directory 1 IoCs
  • Detects videocard installed 1 TTPs 2 IoCs

    Uses WMIC.exe to determine videocard installed.

  • Suspicious behavior: EnumeratesProcesses 4 IoCs
  • Suspicious use of AdjustPrivilegeToken 64 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\my-app-1.0.0.exe
    "C:\Users\Admin\AppData\Local\Temp\my-app-1.0.0.exe"
    1⤵
    • Loads dropped DLL
    • Drops file in Windows directory
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of WriteProcessMemory
    PID:2608
    • C:\Windows\system32\cmd.exe
      C:\Windows\system32\cmd.exe /d /s /c "wmic bios get smbiosbiosversion"
      2⤵
        PID:5048
        • C:\Windows\System32\Wbem\WMIC.exe
          wmic bios get smbiosbiosversion
          3⤵
          • Suspicious use of AdjustPrivilegeToken
          PID:716
      • C:\Windows\system32\cmd.exe
        C:\Windows\system32\cmd.exe /d /s /c "wmic path win32_VideoController get name"
        2⤵
        • Suspicious use of WriteProcessMemory
        PID:4100
        • C:\Windows\System32\Wbem\WMIC.exe
          wmic path win32_VideoController get name
          3⤵
          • Detects videocard installed
          • Suspicious use of AdjustPrivilegeToken
          PID:3584
      • C:\Windows\system32\cmd.exe
        C:\Windows\system32\cmd.exe /d /s /c "powershell Get-ItemPropertyValue -Path 'HKLM:SOFTWARE\Microsoft\Windows NT\CurrentVersion' -Name ProductName"
        2⤵
          PID:5076
          • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
            powershell Get-ItemPropertyValue -Path 'HKLM:SOFTWARE\Microsoft\Windows NT\CurrentVersion' -Name ProductName
            3⤵
            • Suspicious behavior: EnumeratesProcesses
            • Suspicious use of AdjustPrivilegeToken
            PID:4560
        • C:\Windows\system32\cmd.exe
          C:\Windows\system32\cmd.exe /d /s /c "wmic CsProduct Get UUID"
          2⤵
            PID:1172
            • C:\Windows\System32\Wbem\WMIC.exe
              wmic CsProduct Get UUID
              3⤵
              • Suspicious use of AdjustPrivilegeToken
              PID:4452
          • C:\Users\Admin\AppData\Local\Temp\my-app-1.0.0.exe
            "C:\Users\Admin\AppData\Local\Temp\my-app-1.0.0.exe" --type=gpu-process --user-data-dir="C:\Users\Admin\AppData\Roaming\my-app-1.0.0" --gpu-preferences=WAAAAAAAAADgAAAMAAAAAAAAAAAAAAAAAABgAAEAAAA4AAAAAAAAAAAAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAGAAAAAAAAAAYAAAAAAAAAAgAAAAAAAAACAAAAAAAAAAIAAAAAAAAAA== --field-trial-handle=1896,i,2009338875725529113,9370315321826597105,262144 --enable-features=kWebSQLAccess --disable-features=SpareRendererForSitePerProcess,WinDelaySpellcheckServiceInit,WinRetrieveSuggestionsOnlyOnDemand --variations-seed-version --mojo-platform-channel-handle=1888 /prefetch:2
            2⤵
              PID:240
            • C:\Users\Admin\AppData\Local\Temp\my-app-1.0.0.exe
              "C:\Users\Admin\AppData\Local\Temp\my-app-1.0.0.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --user-data-dir="C:\Users\Admin\AppData\Roaming\my-app-1.0.0" --field-trial-handle=2348,i,2009338875725529113,9370315321826597105,262144 --enable-features=kWebSQLAccess --disable-features=SpareRendererForSitePerProcess,WinDelaySpellcheckServiceInit,WinRetrieveSuggestionsOnlyOnDemand --variations-seed-version --mojo-platform-channel-handle=2340 /prefetch:3
              2⤵
                PID:3432
              • C:\Users\Admin\AppData\Local\Temp\my-app-1.0.0.exe
                "C:\Users\Admin\AppData\Local\Temp\my-app-1.0.0.exe" --type=renderer --user-data-dir="C:\Users\Admin\AppData\Roaming\my-app-1.0.0" --app-path="C:\Users\Admin\AppData\Local\Temp\resources\app.asar" --enable-sandbox --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=4 --field-trial-handle=2572,i,2009338875725529113,9370315321826597105,262144 --enable-features=kWebSQLAccess --disable-features=SpareRendererForSitePerProcess,WinDelaySpellcheckServiceInit,WinRetrieveSuggestionsOnlyOnDemand --variations-seed-version --mojo-platform-channel-handle=2584 /prefetch:1
                2⤵
                  PID:1180
                • C:\Users\Admin\AppData\Local\Temp\my-app-1.0.0.exe
                  "C:\Users\Admin\AppData\Local\Temp\my-app-1.0.0.exe" --type=utility --utility-sub-type=audio.mojom.AudioService --lang=en-US --service-sandbox-type=audio --user-data-dir="C:\Users\Admin\AppData\Roaming\my-app-1.0.0" --field-trial-handle=3112,i,2009338875725529113,9370315321826597105,262144 --enable-features=kWebSQLAccess --disable-features=SpareRendererForSitePerProcess,WinDelaySpellcheckServiceInit,WinRetrieveSuggestionsOnlyOnDemand --variations-seed-version --mojo-platform-channel-handle=3448 /prefetch:8
                  2⤵
                    PID:5100
                  • C:\Windows\system32\cmd.exe
                    C:\Windows\system32\cmd.exe /d /s /c ""C:\Users\Admin\AppData\Local\Temp\screenCapture\screenCapture_1.3.2.bat" "C:\Users\Admin\AppData\Local\Temp\epsilon-Admin\screenshot.png" "
                    2⤵
                      PID:4848
                      • C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exe
                        C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exe /nologo /r:"Microsoft.VisualBasic.dll" /win32manifest:"app.manifest" /out:"screenCapture_1.3.2.exe" "C:\Users\Admin\AppData\Local\Temp\SCREEN~1\SCREEN~1.BAT"
                        3⤵
                          PID:2436
                          • C:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exe
                            C:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exe /NOLOGO /READONLY /MACHINE:IX86 "/OUT:C:\Users\Admin\AppData\Local\Temp\RES635D.tmp" "c:\Users\Admin\AppData\Local\Temp\screenCapture\CSC90D1A87867DF400D8B6DE1798DA35EF.TMP"
                            4⤵
                              PID:2744
                          • C:\Users\Admin\AppData\Local\Temp\screenCapture\screenCapture_1.3.2.exe
                            screenCapture_1.3.2.exe "C:\Users\Admin\AppData\Local\Temp\epsilon-Admin\screenshot.png"
                            3⤵
                            • Executes dropped EXE
                            PID:2348
                        • C:\Windows\system32\cmd.exe
                          C:\Windows\system32\cmd.exe /d /s /c "C:\Windows\system32\reg.exe QUERY "HKCU\SOFTWARE\Martin Prikryl\WinSCP 2\Sessions""
                          2⤵
                            PID:1308
                            • C:\Windows\system32\reg.exe
                              C:\Windows\system32\reg.exe QUERY "HKCU\SOFTWARE\Martin Prikryl\WinSCP 2\Sessions"
                              3⤵
                                PID:1888
                            • C:\Windows\system32\cmd.exe
                              C:\Windows\system32\cmd.exe /d /s /c "C:\Windows\system32\reg.exe QUERY "HKCU\Software\Valve\Steam" /v SteamPath"
                              2⤵
                                PID:2256
                                • C:\Windows\system32\reg.exe
                                  C:\Windows\system32\reg.exe QUERY "HKCU\Software\Valve\Steam" /v SteamPath
                                  3⤵
                                    PID:3340
                                • C:\Windows\system32\cmd.exe
                                  C:\Windows\system32\cmd.exe /d /s /c "wmic /Node:localhost /Namespace:\\root\SecurityCenter2 Path AntiVirusProduct Get displayName /Format:List"
                                  2⤵
                                    PID:4144
                                    • C:\Windows\System32\Wbem\WMIC.exe
                                      wmic /Node:localhost /Namespace:\\root\SecurityCenter2 Path AntiVirusProduct Get displayName /Format:List
                                      3⤵
                                        PID:2512
                                    • C:\Windows\system32\cmd.exe
                                      C:\Windows\system32\cmd.exe /d /s /c "wmic path win32_VideoController get name"
                                      2⤵
                                        PID:4132
                                        • C:\Windows\System32\Wbem\WMIC.exe
                                          wmic path win32_VideoController get name
                                          3⤵
                                          • Detects videocard installed
                                          PID:752
                                      • C:\Windows\system32\cmd.exe
                                        C:\Windows\system32\cmd.exe /d /s /c "cmd /c chcp 65001>nul && netsh wlan show profiles"
                                        2⤵
                                          PID:956
                                          • C:\Windows\system32\cmd.exe
                                            cmd /c chcp 65001
                                            3⤵
                                              PID:2524
                                              • C:\Windows\system32\chcp.com
                                                chcp 65001
                                                4⤵
                                                  PID:2644
                                              • C:\Windows\system32\netsh.exe
                                                netsh wlan show profiles
                                                3⤵
                                                  PID:3184
                                              • C:\Users\Admin\AppData\Local\Temp\my-app-1.0.0.exe
                                                "C:\Users\Admin\AppData\Local\Temp\my-app-1.0.0.exe" --type=gpu-process --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.22000.1 --user-data-dir="C:\Users\Admin\AppData\Roaming\my-app-1.0.0" --gpu-preferences=WAAAAAAAAADoAAAMAAAAAAAAAAAAAAAAAABgAAEAAAA4AAAAAAAAAAAAAACEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAGAAAAAAAAAAYAAAAAAAAAAgAAAAAAAAACAAAAAAAAAAIAAAAAAAAAA== --field-trial-handle=2520,i,2009338875725529113,9370315321826597105,262144 --enable-features=kWebSQLAccess --disable-features=SpareRendererForSitePerProcess,WinDelaySpellcheckServiceInit,WinRetrieveSuggestionsOnlyOnDemand --variations-seed-version --mojo-platform-channel-handle=2632 /prefetch:8
                                                2⤵
                                                • Suspicious behavior: EnumeratesProcesses
                                                PID:2180
                                            • C:\Windows\system32\AUDIODG.EXE
                                              C:\Windows\system32\AUDIODG.EXE 0x00000000000004D0 0x00000000000004C8
                                              1⤵
                                                PID:4084

                                              Network

                                              MITRE ATT&CK Enterprise v15

                                              Replay Monitor

                                              Loading Replay Monitor...

                                              Downloads

                                              • C:\Users\Admin\AppData\Local\Temp\8acb96ef-dc2d-4394-933a-e65e4803c928.tmp.node

                                                Filesize

                                                1.6MB

                                                MD5

                                                1e5b6635e09e662d01e9a97c69f1cc27

                                                SHA1

                                                08e3a9e35940ee1ecd37ad762909529c64bc04b5

                                                SHA256

                                                b440ea84c0814e48b20433a8046087b997ab988eef9aacef896a4fd490150c6b

                                                SHA512

                                                1a7f835a51b62d5b512a2008830861bfb3892aa349379e3334c9c8aa5808ac5dd9dfcc5fb2c05736474ca5728347003a60e234e4044dc79d688ab35168b4bbc8

                                              • C:\Users\Admin\AppData\Local\Temp\RES635D.tmp

                                                Filesize

                                                1KB

                                                MD5

                                                d8f4ffc0c9cbb89933e97a40387ba919

                                                SHA1

                                                6004cecc583a5afde962594f68357024a2c3b1d6

                                                SHA256

                                                0560330524d8cd0be46e0b60c7e36c53a5e48dce14e2a6a7ce32b5df49e44c93

                                                SHA512

                                                18b1fd1f84ec646f1d580fb0f3bb9a66b2088265e781bd30142f876c283163338bfaf1f4c518945f30c15bb72a25373cd1bc2fee9d7fca43d79d730c122839be

                                              • C:\Users\Admin\AppData\Local\Temp\__PSScriptPolicyTest_bgfkkbhl.suq.ps1

                                                Filesize

                                                60B

                                                MD5

                                                d17fe0a3f47be24a6453e9ef58c94641

                                                SHA1

                                                6ab83620379fc69f80c0242105ddffd7d98d5d9d

                                                SHA256

                                                96ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7

                                                SHA512

                                                5b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82

                                              • C:\Users\Admin\AppData\Local\Temp\c39026fe-ab43-44c6-89c4-f91e83fd9db1.tmp.node

                                                Filesize

                                                2.2MB

                                                MD5

                                                8b0ee0b40dc18dd5638c45dd2299ae65

                                                SHA1

                                                83a8b245a64332225d8762d18f661c88df0c4968

                                                SHA256

                                                808ab5e0ca0fb3818e65ed7e689b4b92fbeda82656c9cd714eeede27445c0b4c

                                                SHA512

                                                738d9f92b01df49713122cd5ba6b037b80f4364711c321c348f82bb6efbfa0787575c7594e573e2d26f7aba7dc46b938e8525c113d9dc59d2a5c17ba3d4358ef

                                              • C:\Users\Admin\AppData\Local\Temp\epsilon-Admin\AutoFill Data\All Autofill Data.txt

                                                Filesize

                                                1KB

                                                MD5

                                                698a35da81736fce6e1521788d24f28c

                                                SHA1

                                                9e5ea5f4de84582507b8081e3e8d51b2972333b3

                                                SHA256

                                                b2d8ddde8a147f931cf5ba65a4afd3ca582107aca8c163b5427b17af9b3a0886

                                                SHA512

                                                09d2bed13c87d3ffcb55a3417de69830d141900289059d601a7a32cbdedd740ad9d239b29e747485efbf70741c03bd9d72b9324b9f0b18c53d5ddb669569b91d

                                              • C:\Users\Admin\AppData\Local\Temp\epsilon-Admin\Credit Cards\All Credit Cards.txt

                                                Filesize

                                                1KB

                                                MD5

                                                9ef0cbfa739a8cd4daa50041e13da0b6

                                                SHA1

                                                f8f96c8ddae556e86c65b14ec96976eb2b11db55

                                                SHA256

                                                168781455be4ffbca7bd2ae3c0b765a5953f52fdf0d8e56f7d817630ae27be21

                                                SHA512

                                                afc76f3026b64041e5d964d6445f627c69b9ad6c2db479f02d157d764e57176ec469ca85226ef3bb22871e00d6ee771f2a4fd2f674aed933f83b03d146bb6e73

                                              • C:\Users\Admin\AppData\Local\Temp\epsilon-Admin\screenshot.png

                                                Filesize

                                                410KB

                                                MD5

                                                a81b29d67045793f8ad0358a44974ab2

                                                SHA1

                                                0dfb9dd8cb92fd27375ffda3c39e879dd6fb3a6e

                                                SHA256

                                                7385db7ac8eb280cf53c831ae62d0dca88061544e77da6eab08565142ab68484

                                                SHA512

                                                3a771554a807e096c7e3116d6ee7a322f1faf1f0cf06836c5b60c1a62b088390d674717247f674c85c2c1347863a6e1738987bd1212878133cb7e5a32dd4e353

                                              • C:\Users\Admin\AppData\Local\Temp\screenCapture\screenCapture_1.3.2.bat

                                                Filesize

                                                13KB

                                                MD5

                                                da0f40d84d72ae3e9324ad9a040a2e58

                                                SHA1

                                                4ca7f6f90fb67dce8470b67010aa19aa0fd6253f

                                                SHA256

                                                818350a4fb4146072a25f0467c5c99571c854d58bec30330e7db343bceca008b

                                                SHA512

                                                30b7d4921f39c2601d94a3e3bb0e3be79b4b7b505e52523d2562f2e2f32154d555a593df87a71cddb61b98403265f42e0d6705950b37a155dc1d64113c719fd9

                                              • C:\Users\Admin\AppData\Local\Temp\screenCapture\screenCapture_1.3.2.exe

                                                Filesize

                                                12KB

                                                MD5

                                                d59171a2b9f91a66026519ea215b6d0d

                                                SHA1

                                                6062db9cb57d8aedd7aa8a5e974de58a7e9b8385

                                                SHA256

                                                f0664c1a8bdf1048ab11cb0bdb5b278032500fe9d526735d736854026c821b20

                                                SHA512

                                                cc333739875a5e5c947f4b68dad52b2eb0924d520c0c8d2236208451d634c560632e66b8e3dfb58f7e23b53dee45959c3ee8d64606510edc13b7c805cb088610

                                              • C:\Users\Admin\AppData\Roaming\Microsoft\Spelling\en-US\default.dic

                                                Filesize

                                                2B

                                                MD5

                                                f3b25701fe362ec84616a93a45ce9998

                                                SHA1

                                                d62636d8caec13f04e28442a0a6fa1afeb024bbb

                                                SHA256

                                                b3d510ef04275ca8e698e5b3cbb0ece3949ef9252f0cdc839e9ee347409a2209

                                                SHA512

                                                98c5f56f3de340690c139e58eb7dac111979f0d4dffe9c4b24ff849510f4b6ffa9fd608c0a3de9ac3c9fd2190f0efaf715309061490f9755a9bfdf1c54ca0d84

                                              • C:\Users\Admin\AppData\Roaming\my-app-1.0.0\Network\Network Persistent State

                                                Filesize

                                                300B

                                                MD5

                                                e3f7545f82775eb96d1763f4d9bec9b7

                                                SHA1

                                                27e323c82c98cc16cdebeed9ea5c5152747ddf8b

                                                SHA256

                                                1484f4bca8f5b57e27f462aa61f14b42140156a8f03061afb251394b98dbca24

                                                SHA512

                                                e62715a873d9cb2579e96a03f9d8ccff2381a9d2d2ccfdf05587e03ca9c1d6f36e01c9e22b3d6c42eb26a5a913e778c9c324f35fefd1571b26298528a3b7243b

                                              • C:\Users\Admin\AppData\Roaming\my-app-1.0.0\Network\Network Persistent State~RFe588344.TMP

                                                Filesize

                                                59B

                                                MD5

                                                2800881c775077e1c4b6e06bf4676de4

                                                SHA1

                                                2873631068c8b3b9495638c865915be822442c8b

                                                SHA256

                                                226eec4486509917aa336afebd6ff65777b75b65f1fb06891d2a857a9421a974

                                                SHA512

                                                e342407ab65cc68f1b3fd706cd0a37680a0864ffd30a6539730180ede2cdcd732cc97ae0b9ef7db12da5c0f83e429df0840dbf7596aca859a0301665e517377b

                                              • \??\c:\Users\Admin\AppData\Local\Temp\screenCapture\CSC90D1A87867DF400D8B6DE1798DA35EF.TMP

                                                Filesize

                                                1KB

                                                MD5

                                                a6f2d21624678f54a2abed46e9f3ab17

                                                SHA1

                                                a2a6f07684c79719007d434cbd1cd2164565734a

                                                SHA256

                                                ab96911d094b6070cbfb48e07407371ddb41b86e36628b6a10cdb11478192344

                                                SHA512

                                                0b286df41c3887eecff5c38cbd6818078313b555ef001151b41ac11b80466b2f4f39da518ab9c51eeff35295cb39d52824de13e026c35270917d7274f764c676

                                              • \??\c:\Users\Admin\AppData\Local\Temp\screenCapture\app.manifest

                                                Filesize

                                                350B

                                                MD5

                                                8951565428aa6644f1505edb592ab38f

                                                SHA1

                                                9c4bee78e7338f4f8b2c8b6c0e187f43cfe88bf2

                                                SHA256

                                                8814db9e125d0c2b7489f8c7c3e95adf41f992d4397ed718bda8573cb8fb0e83

                                                SHA512

                                                7577bad37b67bf13a0d7f9b8b7d6c077ecdfb81a5bee94e06dc99e84cb20db2d568f74d1bb2cef906470b4f6859e00214beacca7d82e2b99126d27820bf3b8f5

                                              • memory/1180-19-0x00007FFCD4560000-0x00007FFCD4561000-memory.dmp

                                                Filesize

                                                4KB

                                              • memory/1180-20-0x00007FFCD59C0000-0x00007FFCD59C1000-memory.dmp

                                                Filesize

                                                4KB

                                              • memory/2180-182-0x0000028BB9880000-0x0000028BB9881000-memory.dmp

                                                Filesize

                                                4KB

                                              • memory/2180-183-0x0000028BB9880000-0x0000028BB9881000-memory.dmp

                                                Filesize

                                                4KB

                                              • memory/2180-184-0x0000028BB9880000-0x0000028BB9881000-memory.dmp

                                                Filesize

                                                4KB

                                              • memory/2180-188-0x0000028BB9880000-0x0000028BB9881000-memory.dmp

                                                Filesize

                                                4KB

                                              • memory/2180-194-0x0000028BB9880000-0x0000028BB9881000-memory.dmp

                                                Filesize

                                                4KB

                                              • memory/2180-192-0x0000028BB9880000-0x0000028BB9881000-memory.dmp

                                                Filesize

                                                4KB

                                              • memory/2180-191-0x0000028BB9880000-0x0000028BB9881000-memory.dmp

                                                Filesize

                                                4KB

                                              • memory/2180-193-0x0000028BB9880000-0x0000028BB9881000-memory.dmp

                                                Filesize

                                                4KB

                                              • memory/2180-190-0x0000028BB9880000-0x0000028BB9881000-memory.dmp

                                                Filesize

                                                4KB

                                              • memory/2180-189-0x0000028BB9880000-0x0000028BB9881000-memory.dmp

                                                Filesize

                                                4KB

                                              • memory/2348-132-0x0000000000FD0000-0x0000000000FDA000-memory.dmp

                                                Filesize

                                                40KB

                                              • memory/4560-66-0x00000225BEA90000-0x00000225BEAB2000-memory.dmp

                                                Filesize

                                                136KB