Analysis

  • max time kernel
    134s
  • max time network
    287s
  • platform
    windows10-1703_x64
  • resource
    win10-20240404-en
  • resource tags

    arch:x64arch:x86image:win10-20240404-enlocale:en-usos:windows10-1703-x64system
  • submitted
    11/07/2024, 22:42

General

  • Target

    ec86bd905bd5524841fccc2c895e99d587ddeeced4ffa439d962e05e77c02e2b.exe

  • Size

    908KB

  • MD5

    bf74f5b3149cb45d8a0efdfeaca50c98

  • SHA1

    0bfe3661e7821586fbe8e569ffc48fa1a71d995d

  • SHA256

    ec86bd905bd5524841fccc2c895e99d587ddeeced4ffa439d962e05e77c02e2b

  • SHA512

    7ed7068b0816c547f45acf634f77377703d16ce183f488579e55a4d070d6d00bd0b337d12fc92457ba58fd66a2bfa744ad7e43af77e03361654746a979c1c31a

  • SSDEEP

    24576:Am9C2jncX0aBNt11yY65swIcU5KDoM1m96siDDyQQNDZ:oWOD18Y6WwIN5YI6xDyJDZ

Malware Config

Extracted

Family

vidar

C2

https://t.me/bu77un

https://steamcommunity.com/profiles/76561199730044335

Attributes
  • user_agent

    Mozilla/5.0 (Macintosh; Intel Mac OS X 10.15; rv:128.1) Gecko/20100101 Firefox/128.1

Signatures

  • Detect Vidar Stealer 4 IoCs
  • Stealc

    Stealc is an infostealer written in C++.

  • Suspicious use of NtCreateUserProcessOtherParentProcess 1 IoCs
  • Vidar

    Vidar is an infostealer based on Arkei stealer.

  • Drops startup file 2 IoCs
  • Executes dropped EXE 1 IoCs
  • Reads data files stored by FTP clients 2 TTPs

    Tries to access configuration files associated with programs like FileZilla.

  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Checks processor information in registry 2 TTPs 2 IoCs

    Processor information is often read in order to detect sandboxing environments.

  • Delays execution with timeout.exe 2 IoCs
  • Enumerates processes with tasklist 1 TTPs 2 IoCs
  • Suspicious behavior: EnumeratesProcesses 40 IoCs
  • Suspicious use of AdjustPrivilegeToken 2 IoCs
  • Suspicious use of FindShellTrayWindow 3 IoCs
  • Suspicious use of SendNotifyMessage 3 IoCs
  • Suspicious use of WriteProcessMemory 39 IoCs

Processes

  • C:\Windows\Explorer.EXE
    C:\Windows\Explorer.EXE
    1⤵
      PID:3344
      • C:\Users\Admin\AppData\Local\Temp\ec86bd905bd5524841fccc2c895e99d587ddeeced4ffa439d962e05e77c02e2b.exe
        "C:\Users\Admin\AppData\Local\Temp\ec86bd905bd5524841fccc2c895e99d587ddeeced4ffa439d962e05e77c02e2b.exe"
        2⤵
        • Suspicious use of WriteProcessMemory
        PID:1580
        • C:\Windows\SysWOW64\cmd.exe
          "C:\Windows\System32\cmd.exe" /k copy Painted Painted.cmd & Painted.cmd & exit
          3⤵
          • Suspicious use of WriteProcessMemory
          PID:2668
          • C:\Windows\SysWOW64\tasklist.exe
            tasklist
            4⤵
            • Enumerates processes with tasklist
            • Suspicious use of AdjustPrivilegeToken
            PID:4676
          • C:\Windows\SysWOW64\findstr.exe
            findstr /I "wrsa.exe opssvc.exe"
            4⤵
              PID:520
            • C:\Windows\SysWOW64\tasklist.exe
              tasklist
              4⤵
              • Enumerates processes with tasklist
              • Suspicious use of AdjustPrivilegeToken
              PID:3532
            • C:\Windows\SysWOW64\findstr.exe
              findstr /I "avastui.exe avgui.exe bdservicehost.exe nswscsvc.exe sophoshealth.exe"
              4⤵
                PID:500
              • C:\Windows\SysWOW64\cmd.exe
                cmd /c md 140027
                4⤵
                  PID:2076
                • C:\Windows\SysWOW64\findstr.exe
                  findstr /V "ongoingdarknessheardfundamentals" Dicke
                  4⤵
                    PID:4128
                  • C:\Windows\SysWOW64\cmd.exe
                    cmd /c copy /b Coordinator + Hold + Rhythm 140027\H
                    4⤵
                      PID:4896
                    • C:\Users\Admin\AppData\Local\Temp\140027\Happening.pif
                      140027\Happening.pif 140027\H
                      4⤵
                      • Suspicious use of NtCreateUserProcessOtherParentProcess
                      • Executes dropped EXE
                      • Checks processor information in registry
                      • Suspicious behavior: EnumeratesProcesses
                      • Suspicious use of FindShellTrayWindow
                      • Suspicious use of SendNotifyMessage
                      • Suspicious use of WriteProcessMemory
                      PID:4908
                      • C:\Windows\SysWOW64\cmd.exe
                        "C:\Windows\system32\cmd.exe" /c timeout /t 10 & del /f /q "C:\Users\Admin\AppData\Local\Temp\140027\Happening.pif" & rd /s /q "C:\ProgramData\GIEHJKEBAAEB" & exit
                        5⤵
                        • Suspicious use of WriteProcessMemory
                        PID:648
                        • C:\Windows\SysWOW64\timeout.exe
                          timeout /t 10
                          6⤵
                          • Delays execution with timeout.exe
                          PID:4480
                    • C:\Windows\SysWOW64\timeout.exe
                      timeout 5
                      4⤵
                      • Delays execution with timeout.exe
                      PID:3568
                • C:\Windows\SysWOW64\cmd.exe
                  cmd /k echo [InternetShortcut] > "C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\TechHarbor.url" & echo URL="C:\Users\Admin\AppData\Local\MaritimeTech Dynamics\TechHarbor.js" >> "C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\TechHarbor.url" & exit
                  2⤵
                  • Drops startup file
                  PID:4184

              Network

              MITRE ATT&CK Enterprise v15

              Replay Monitor

              Loading Replay Monitor...

              Downloads

              • C:\Users\Admin\AppData\Local\Temp\140027\H

                Filesize

                346KB

                MD5

                88f9e51b8d309d3dac18a189584ab1d3

                SHA1

                f34dff401f7064d055d837c9b5d884ed75a40609

                SHA256

                322f275e5b893b8da1f2ffde8ec3472d9356aeebd3f8e1203fd500a9534c4cdb

                SHA512

                0cdf2268ded838ba84df02bc22cb6646c23f02a3634e2b67b343f0fbbef2b08bc1bf26f4cef8823fd81698e7031a785749c78f6c802035b945ce28998bbf65a8

              • C:\Users\Admin\AppData\Local\Temp\140027\Happening.pif

                Filesize

                915KB

                MD5

                b06e67f9767e5023892d9698703ad098

                SHA1

                acc07666f4c1d4461d3e1c263cf6a194a8dd1544

                SHA256

                8498900e57a490404e7ec4d8159bee29aed5852ae88bd484141780eaadb727bb

                SHA512

                7972c78acebdd86c57d879c12cb407120155a24a52fda23ddb7d9e181dd59dac1eb74f327817adbc364d37c8dc704f8236f3539b4d3ee5a022814924a1616943

              • C:\Users\Admin\AppData\Local\Temp\Analyze

                Filesize

                10KB

                MD5

                2df4a1a59802d59d69ca80e122d32bd4

                SHA1

                c7f3c71c22ad384ccb7317abe2e984ea6e257c75

                SHA256

                f2ff747cfdfcf13d007609405f56fd6250135b50885dfd66ae217c3e8f0e0ac2

                SHA512

                a3db36f488a2f7ad86b165d0e70a714f6aa9eadb3203534e597a5939994c253941e0b58f3700de09e637192ccd7ef685e619fbfd78e29bf7e3956049a095cbea

              • C:\Users\Admin\AppData\Local\Temp\Computation

                Filesize

                5KB

                MD5

                d4c95b67feb441bbd00b05fe3668062f

                SHA1

                dcbc29c3a13f95bfbec93625a50118627005132b

                SHA256

                d24410b87bd280e0a239c08af3f911f39022414c978f60f79dfbc17611fea3b0

                SHA512

                62e9f49d77122c8b1a5131b3abfb4b89a5f974f1a2f330879ec3b095f4934d314fb976a39204e563e49f1fef54dc78e9417f7a6c2a4db71e77b16c66b03e956e

              • C:\Users\Admin\AppData\Local\Temp\Coordinator

                Filesize

                124KB

                MD5

                97395d29e3a083f1abab5579268f4c77

                SHA1

                b45448e4c8f4c16b22e761abeec6ac13c1525d15

                SHA256

                ec9d3b36f7410b6356ae9b53bf8d49534ca5493c6c866958d997025e958b29a9

                SHA512

                495a762cbe1fe81a1ccd966ca045ed61b11068018b484ec442fe3e2b61b5bd2909e8c72ab2fd64339c13072cdbbc6f6b2d30c7ae63a4a59fff5c26535565e3c9

              • C:\Users\Admin\AppData\Local\Temp\Decrease

                Filesize

                64KB

                MD5

                5a2ee96b158f710ff95f804af7b750b4

                SHA1

                cb3a2e352fcec54db3213b02992193e8e1259660

                SHA256

                17bdd0a593c3a70c920d3dc4e758a8f7a5676cc17b2cd920cfccebf076e42851

                SHA512

                eca622a80d1faae52e3a7d36c7acfbc5973cce968a9446955dcf455e5d0158adad1c41513e557b9bef4bfe43a55f42dab1311dcb136d5d822c70b577a00fce3b

              • C:\Users\Admin\AppData\Local\Temp\Dicke

                Filesize

                157B

                MD5

                359fa6e177dd14d0ded68c7dec672f19

                SHA1

                e2d60d5540a9eef584719a06cbba1083d6c17146

                SHA256

                9c635ba52246dfb81225a539bddf62a323ec25391d9e52181be88f6cb443c788

                SHA512

                1cdb0a5c706f184b9300853fd69cc025dc7fd37b61beb6e8dd4233d37528da9b7a04fee445ca07413d5bdccec8594dbcd02a416ab5503624f51aa2ad9eda91f6

              • C:\Users\Admin\AppData\Local\Temp\Doctrine

                Filesize

                69KB

                MD5

                2cbaa3baf5f04a4abca66cac2c7b7499

                SHA1

                03c26c4a11ec938200918dbf943ec40842014e50

                SHA256

                748d1be0ef94c8823c148e69b8d81377385a4aa4afc005c67c6466f188c2afce

                SHA512

                b0e57c21e4cfd3fde7dd863e52bacdeab53d1c1550680609fbd44e032084875d440b101e8e144c0b9fd7e28e34ae5580857d3021ea2717abcec8fb677df3fec4

              • C:\Users\Admin\AppData\Local\Temp\Ensure

                Filesize

                46KB

                MD5

                1c75ac78fe98752e9aa204e4b7314e04

                SHA1

                d49cb4863074180413739ecc71a92ad02dc57291

                SHA256

                ac5ab3ead6322e91733e3a3e0b294b9830c6148f345ec21d22bf92d6b8ca5f71

                SHA512

                3edde1a9fe99e2a809b1b35afcfb8adeb35315fc86e3328211f0be18db62ca583b6ffd5575700ceab17247718db1c458bc84c27404d810902e0588d8ba746181

              • C:\Users\Admin\AppData\Local\Temp\Fetish

                Filesize

                61KB

                MD5

                2266822d6fe3eae517eec05f881ac1c2

                SHA1

                b7f4e29a975ccabb699b9fa4b0289118b47048fc

                SHA256

                6ca3abd72183df349cfcc3cc866e65854c3b409cd0e3c780b4819c2672fc481b

                SHA512

                d2828171c9c795d8fb7fa72715daf0fec291c49e30d0580ccca7ff31c000954502e2606e802367144d93d9fec5d150d44c6e3191c92ce1c6a0f42baee1fdac37

              • C:\Users\Admin\AppData\Local\Temp\Governing

                Filesize

                64KB

                MD5

                efd1a7956d6ca50fe7affefecc45a610

                SHA1

                7c473b33c4b79e531ddc99d65774c7c4e3611675

                SHA256

                db51d1ee61e70191fe40633d121a4660b047a9a820fa37a1d84673947cc8bd7b

                SHA512

                7aece4b0e7bb95bb9f6a8c22e081a9babee4f78f964571a72e3e6836e351c0be9a18a92a45f232f173ae7f292e5f558d837a6c4d917341ec48d20442c2a0649b

              • C:\Users\Admin\AppData\Local\Temp\Gratuit

                Filesize

                64KB

                MD5

                939798cbe2711d9ee4b46b829240b198

                SHA1

                ca04be6fef2d26eb09d74882744ff111d927e83e

                SHA256

                5980acaf95da28c5eff0770cc7779c2551dd44d95fdb2ac415b7f6f400150c94

                SHA512

                0a523d941de49823528c45678e8bc3fe872d4d9e7fc8cbeb3fb5c7dc4ef3920bd12e9bc85f7f0c88251fb2c7072ebecc112046e536daed837e4d0119dd805b99

              • C:\Users\Admin\AppData\Local\Temp\Halo

                Filesize

                26KB

                MD5

                3e2dc01cbd7defd58b7d9a2e7fa5a947

                SHA1

                c6369f1ad3d076c3555d74060a6946d45c4753a5

                SHA256

                72634f99a6f4b4d3d7194e191a9e62957648faa8bd5d429d537d500414da8056

                SHA512

                9cbd9ddc89b0eeeebd6313a9ec9dc36dd7b7c3729615c3bd3e168b5fb6f98a9974eb4c89fc1692aaa5e2f2cd90588f0ba248760ba9ae0f45a6117c6329e45c2b

              • C:\Users\Admin\AppData\Local\Temp\Healing

                Filesize

                6KB

                MD5

                de13f6966bff7073e99d19df22b70347

                SHA1

                e6aa2f4bc4e1c49e5fd33a14445f4fcb694c7231

                SHA256

                ceaff2127fba389db5a434eaffff6dd9a5ea5fb59d389b9514e5df2c682e6946

                SHA512

                2463940e5be0c09b373833e59bc0ddc9c6ddb27ba7ed6d1115603ce45c1cf98f67ad8793562596638ba22b56844378954b0423401aad27c64a6e55eba94c5fc7

              • C:\Users\Admin\AppData\Local\Temp\Hold

                Filesize

                179KB

                MD5

                89298b3f9140206de17b99593c32a300

                SHA1

                abd9f2163ab22289d0c8d6f21c12cd273c11032f

                SHA256

                925f257a91f4651a975b9dc8d9c971a5f5ec97ce31f1cf9ae9b06c45cbd9f773

                SHA512

                7221def959bfbaf2bef608c993a47198349c7a237a00697c8965471a7652471b98cf51cdab0dd1c8eb7e1e2f34787d3a48988650317c2d0986fa3f998a4d554f

              • C:\Users\Admin\AppData\Local\Temp\Missing

                Filesize

                27KB

                MD5

                d675ed631ebc15ef59476d485062157a

                SHA1

                f61f737ae894ab9fb569a4c90c43d8019610299f

                SHA256

                8cca4052b5e7a9c9c730c0486716bfdd1cc12d167a4c485aae81c506b6717347

                SHA512

                b09e22d043324d80ff513b12410aad09e52f163747eb2cf7070e6463590f3f5a9fff3d764183cbbf3f2072f3f4f50120899a45babfc35c73e8e1755482263cdf

              • C:\Users\Admin\AppData\Local\Temp\Painted

                Filesize

                13KB

                MD5

                193a3d556bc1eacd55efa5d8db3c9c9a

                SHA1

                41268345311bfb644b63292d83801f1ea06f07e3

                SHA256

                a7a4281bb0ede83cb54f185872226e0f634ac87d3ea56a9ebe4cb1fda852f7f7

                SHA512

                9a492e843654b835bc23df90a88c5e0bb93ecf8eef19a94db1225de34d1769d4fc6cf3859fb40049283cf9d61b08e4d7ae74942652305c814807f713268de3c9

              • C:\Users\Admin\AppData\Local\Temp\Paintings

                Filesize

                27KB

                MD5

                109790f77e7569651334f1b7287d80c3

                SHA1

                43d20f33383ee50a6225deec6ba650e32f2340fa

                SHA256

                bd8eaea46a1be8740accf43d12d7b73e0113ec33ff0a5e07d070289278f5562c

                SHA512

                c95e168961c6d9892217fa8784d238b1b380aef344a8d9e28091cff67ddee983dc20f779915779c54cae81c1bcc597e3ba7b6e280cd36ef196baec7a89be1da7

              • C:\Users\Admin\AppData\Local\Temp\Promotion

                Filesize

                66KB

                MD5

                dd650c832370c19f4ec4ccaa7d92fa7b

                SHA1

                70b3466e12242d76ca2cf89ef8302ed41fefe57a

                SHA256

                62b70c044cbd870b07ff67aaa9c5a4a64a99e2f683911e134436c2f08b530dba

                SHA512

                f352c29745bbb48b2bbe3f5df6aac80c9a383dba5625c8e9949130f86d4b5e42708ac09059d2f09cc9bdad1e51376b74e38c1b1b17a8ac214327ef8f6f3bb477

              • C:\Users\Admin\AppData\Local\Temp\Recreation

                Filesize

                56KB

                MD5

                009d0f9d2383a2cb8bbcd0e778c1f132

                SHA1

                08e0943fcbe12d1537ae7e614f573374db8fad71

                SHA256

                1160a3c21164a6fb1f2a6f7f67cf7cfe7c1726717f631119224ca1f72034403b

                SHA512

                26beadd124aea4dd37036821e441a6d87b157cf730b21f86f062652437c701785d1657cb717c85ed4cb03fddcbbd06906be7db2ab8e3e1c077a2eefc43af0523

              • C:\Users\Admin\AppData\Local\Temp\Rhythm

                Filesize

                43KB

                MD5

                aefca217c8935f69889d1dba95dfc289

                SHA1

                5fffc9c4184f5ceacc77ba62497a3f8645408012

                SHA256

                0683228c1fd52868ac49e3c3fcb9a266e94ffb86812c3aaf58d497da771e631d

                SHA512

                32c45647cc4647fac8f3b6215b9c3b307ba8eda622ce6ce87f36197d5103aa781394796bb473bcf43d2511a706dc3a4b7d5b2a1da07ce5c85feeb24d51fcee85

              • C:\Users\Admin\AppData\Local\Temp\Room

                Filesize

                24KB

                MD5

                d93fb8a2a986b3e625943949f2c4f2c6

                SHA1

                5e1f0e4c3534668f4885e5551e418b4256a99c37

                SHA256

                485191b6c573d26c287bbcdd3d38ee571f01ae81e21461220d294529d3afc5e1

                SHA512

                454c2d6ea0ca61fda2757c8d2b6bbc8189de33bb9e7e504f67b223c089bf9d238b564151432981645edcbdafdcadd2f37f1cacf2f7fb5d5dab7877cac289410c

              • C:\Users\Admin\AppData\Local\Temp\Social

                Filesize

                52KB

                MD5

                2fe49400991a9c288e5e52341d85acb9

                SHA1

                4792eebb6bd294fc2661d45f24491b6b15cb22bc

                SHA256

                84802ff0309f059530939690ffeefc77f31c6ffde9842adae9f3861b6b015172

                SHA512

                6cc420d55f2d8969aff6d51d114a9971d8b9528eca8242f55db5e4293d073a15b50a8f45523f61ff6a280dc44a3eb7795cad6df34c5096a1698437c1f8cdb400

              • C:\Users\Admin\AppData\Local\Temp\Talked

                Filesize

                10KB

                MD5

                0a2fa399ef0664d11854b817ac4ffc32

                SHA1

                8411236c5bef9592f0ced381604b286a19e83e0e

                SHA256

                06bcb3b0b85bf13c9be9928392e9f8de08390f33989b10705b1ac978de19f473

                SHA512

                d7673a4755c12b72c12480f4774007200eeb35232c3d18a1228e10fa9920956c04d79b07af9b176e43cbe8161ec613445dc8224da983a867f4840fb1c5229b65

              • C:\Users\Admin\AppData\Local\Temp\Trucks

                Filesize

                33KB

                MD5

                957ff114f22139cb41626606d57c828d

                SHA1

                a5392c9af1e78bff2c389cf2f43a6345e2fa34b7

                SHA256

                7ded30fe0e555dbe4d0494de71b14befe89ef9ee2aee9ba1715ab45a01bd108d

                SHA512

                8c20a3d6f6f92a4900e11357718d4de5ac3f3405c44752ad8dbb882a89b0ebf13d4bf201ba376053b88c44117365fb84054b594395d5175deca280a016b9e975

              • C:\Users\Admin\AppData\Local\Temp\Unnecessary

                Filesize

                6KB

                MD5

                515f100ba7bc7a24ab66f0f072ad1865

                SHA1

                65fb9bdb3ead40f926022ae04768b16f885e75cf

                SHA256

                e1d1f95b7eddd8aa99ec1dba8b65b16eee4be311fabee439c8f1050035ada7aa

                SHA512

                fc38504e22721793335deaf22686f44d556bcc9c217409a38f0758058532cfa8f288a6419187146657c18a0fbddebaa176bce6ad1865d214b703856c46b62a58

              • C:\Users\Admin\AppData\Local\Temp\Until

                Filesize

                49KB

                MD5

                574b5f8ed8cc16fb8d3baca4c02c6511

                SHA1

                b6636f45f63e048a551cf29158acecde147ac4e5

                SHA256

                11df0e68b617f574d910fc02f79346a510458f5176cbdeeec06dcc1bcff9c5e4

                SHA512

                71c2a4625b362a3df427341f9cea61d3c5c11ecc456b2a0254d6aafc938f701a10ccea623356f6315e403cc1464838232fac4243dca1187afba265e83f0dfd93

              • C:\Users\Admin\AppData\Local\Temp\Val

                Filesize

                59KB

                MD5

                bc8f40032ab1d6bfa1c3a92ea6b8f978

                SHA1

                2a979964f0cf45d0e917cfea2cd8f15b95564e28

                SHA256

                51bf8ceffc6128f75f39a61c2ff59f0c0ba3c90f772e607cac730c16a83d6b47

                SHA512

                3c11f2340e066325335660c0ff63ba014dfbb4a545f96bbbede10ae75e22954d204cf32636c74fc24b35ad1cd800b81d30bc6b8c22000384ef4e5e67d233b983

              • C:\Users\Admin\AppData\Local\Temp\Wilderness

                Filesize

                43KB

                MD5

                8ed7db674778dbd0de5031ad40c1d526

                SHA1

                aada9a2e00b3b70924cd027a2b8d39a323f0266a

                SHA256

                587d7fad1949d722ba304c591514cc677d41d8aa1da83d640899be79f32d8966

                SHA512

                3840c2a6bddeb6722bcd257e015c887038150a2fb3184c680fb098748ed2b083e0f0b77d811d383f70b38fb34f9cc436d36ce3075e2457effc6fa4c14362f058

              • C:\Users\Admin\AppData\Local\Temp\Zope

                Filesize

                48KB

                MD5

                de040c7a8973668b178554ca50721483

                SHA1

                144175aebaf0c0499afb4281061600b6cc7596ec

                SHA256

                455a1cff615cb851e99c3a7d2f419cc072ff61636f8c19e3b27a64ae9d89434d

                SHA512

                d0c37fc7820cf53ddabf9d27e26cb1c313498d53de1466913ddf3a00a4ff0204056f82a87c71dc4ff509c751858bd61036e43e9243f61f821adfda55eee5fc27

              • memory/4908-373-0x0000000004130000-0x0000000004378000-memory.dmp

                Filesize

                2.3MB

              • memory/4908-372-0x0000000004130000-0x0000000004378000-memory.dmp

                Filesize

                2.3MB

              • memory/4908-374-0x0000000004130000-0x0000000004378000-memory.dmp

                Filesize

                2.3MB

              • memory/4908-375-0x0000000004130000-0x0000000004378000-memory.dmp

                Filesize

                2.3MB

              • memory/4908-376-0x0000000004130000-0x0000000004378000-memory.dmp

                Filesize

                2.3MB

              • memory/4908-390-0x0000000004130000-0x0000000004378000-memory.dmp

                Filesize

                2.3MB

              • memory/4908-391-0x0000000004130000-0x0000000004378000-memory.dmp

                Filesize

                2.3MB