Analysis

  • max time kernel
    138s
  • max time network
    147s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20250410-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20250410-enlocale:en-usos:windows10-2004-x64system
  • submitted
    20/04/2025, 09:25

General

  • Target

    SecuriteInfo.com.Win64.MalwareX-gen.18984.6671.exe

  • Size

    808KB

  • MD5

    7f8e5fe3443a730c3b55e170ed25e7a8

  • SHA1

    5ad4bb5a34b5906f99eb3bdedb48bc517d18136b

  • SHA256

    7c1bb5e9ae1bf20dc9aafb0605b15bd688f7d5e23db424e019315f412f11ec42

  • SHA512

    e9f7a3565868a606906d757bb1e751586685038761e8aba38e3c9156235a1280d23fbe950ccb45d545d854d545da714bb07b90ee8eaf1b28f10214fca612f516

  • SSDEEP

    12288:zbGU3fK+OmAeJWcl28vZ2CYizu+9LKLdEEo4E7ka+9LKLdEEo4E7kaEO:vGU3bNkAuaKLdjDaaKLdjDat

Malware Config

Extracted

Family

vidar

Version

13.5

Botnet

0259016785c18ed951c497596f76958c

C2

https://t.me/v00rd

https://steamcommunity.com/profiles/76561199846773220

Attributes
  • user_agent

    Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 Chrome/132.0.0.0 Safari/537.36 OPR/117.0.0.0

Signatures

  • Detect Vidar Stealer 31 IoCs
  • Vidar

    Vidar is an infostealer based on Arkei stealer.

  • Vidar family
  • Uses browser remote debugging 2 TTPs 8 IoCs

    Can be used control the browser and steal sensitive information such as credentials and session cookies.

  • Unsecured Credentials: Credentials In Files 1 TTPs

    Steal credentials from unsecured files.

  • Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
  • Suspicious use of SetThreadContext 1 IoCs
  • Browser Information Discovery 1 TTPs

    Enumerate browser information.

  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Checks processor information in registry 2 TTPs 4 IoCs

    Processor information is often read in order to detect sandboxing environments.

  • Enumerates system info in registry 2 TTPs 6 IoCs
  • Modifies data under HKEY_USERS 2 IoCs
  • Suspicious behavior: EnumeratesProcesses 14 IoCs
  • Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 6 IoCs
  • Suspicious use of AdjustPrivilegeToken 14 IoCs
  • Suspicious use of FindShellTrayWindow 27 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\SecuriteInfo.com.Win64.MalwareX-gen.18984.6671.exe
    "C:\Users\Admin\AppData\Local\Temp\SecuriteInfo.com.Win64.MalwareX-gen.18984.6671.exe"
    1⤵
    • Suspicious use of SetThreadContext
    • Suspicious use of WriteProcessMemory
    PID:2364
    • C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe
      "C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe"
      2⤵
      • System Location Discovery: System Language Discovery
      • Checks processor information in registry
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of WriteProcessMemory
      PID:4560
      • C:\Program Files\Google\Chrome\Application\chrome.exe
        "C:\Program Files\Google\Chrome\Application\chrome.exe" --remote-debugging-port=9223 --profile-directory="Default"
        3⤵
        • Uses browser remote debugging
        • Checks processor information in registry
        • Enumerates system info in registry
        • Modifies data under HKEY_USERS
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
        • Suspicious use of AdjustPrivilegeToken
        • Suspicious use of FindShellTrayWindow
        • Suspicious use of WriteProcessMemory
        PID:2276
        • C:\Program Files\Google\Chrome\Application\chrome.exe
          "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:4 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=133.0.6943.60 --initial-client-data=0xf8,0xfc,0x100,0xd4,0x104,0x7ffd1268dcf8,0x7ffd1268dd04,0x7ffd1268dd10
          4⤵
            PID:4068
          • C:\Program Files\Google\Chrome\Application\chrome.exe
            "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --string-annotations --gpu-preferences=UAAAAAAAAADgAAAEAAAAAAAAAAAAAAAAAABgAAEAAAAAAAAAAAAAAAAAAAACAAAAAAAAAAAAAAAAAAAAAAAAABAAAAAAAAAAEAAAAAAAAAAIAAAAAAAAAAgAAAAAAAAA --field-trial-handle=2064,i,6826997875413665093,6557357067335080074,262144 --variations-seed-version=20250410-050051.531000 --mojo-platform-channel-handle=1984 /prefetch:2
            4⤵
              PID:644
            • C:\Program Files\Google\Chrome\Application\chrome.exe
              "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --string-annotations --field-trial-handle=2268,i,6826997875413665093,6557357067335080074,262144 --variations-seed-version=20250410-050051.531000 --mojo-platform-channel-handle=2220 /prefetch:3
              4⤵
                PID:3480
              • C:\Program Files\Google\Chrome\Application\chrome.exe
                "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=service --string-annotations --field-trial-handle=2408,i,6826997875413665093,6557357067335080074,262144 --variations-seed-version=20250410-050051.531000 --mojo-platform-channel-handle=1912 /prefetch:8
                4⤵
                  PID:1688
                • C:\Program Files\Google\Chrome\Application\chrome.exe
                  "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --string-annotations --enable-dinosaur-easter-egg-alt-images --remote-debugging-port=9223 --video-capture-use-gpu-memory-buffer --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --field-trial-handle=3164,i,6826997875413665093,6557357067335080074,262144 --variations-seed-version=20250410-050051.531000 --mojo-platform-channel-handle=3208 /prefetch:1
                  4⤵
                  • Uses browser remote debugging
                  PID:3564
                • C:\Program Files\Google\Chrome\Application\chrome.exe
                  "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --string-annotations --enable-dinosaur-easter-egg-alt-images --remote-debugging-port=9223 --video-capture-use-gpu-memory-buffer --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --field-trial-handle=3216,i,6826997875413665093,6557357067335080074,262144 --variations-seed-version=20250410-050051.531000 --mojo-platform-channel-handle=3236 /prefetch:1
                  4⤵
                  • Uses browser remote debugging
                  PID:4368
                • C:\Program Files\Google\Chrome\Application\chrome.exe
                  "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --string-annotations --extension-process --enable-dinosaur-easter-egg-alt-images --remote-debugging-port=9223 --video-capture-use-gpu-memory-buffer --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --field-trial-handle=4276,i,6826997875413665093,6557357067335080074,262144 --variations-seed-version=20250410-050051.531000 --mojo-platform-channel-handle=4300 /prefetch:2
                  4⤵
                  • Uses browser remote debugging
                  PID:5228
                • C:\Program Files\Google\Chrome\Application\chrome.exe
                  "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --string-annotations --enable-dinosaur-easter-egg-alt-images --remote-debugging-port=9223 --video-capture-use-gpu-memory-buffer --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --field-trial-handle=4700,i,6826997875413665093,6557357067335080074,262144 --variations-seed-version=20250410-050051.531000 --mojo-platform-channel-handle=4736 /prefetch:1
                  4⤵
                  • Uses browser remote debugging
                  PID:4640
                • C:\Program Files\Google\Chrome\Application\chrome.exe
                  "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.ProcessorMetrics --lang=en-US --service-sandbox-type=none --video-capture-use-gpu-memory-buffer --string-annotations --field-trial-handle=5340,i,6826997875413665093,6557357067335080074,262144 --variations-seed-version=20250410-050051.531000 --mojo-platform-channel-handle=5280 /prefetch:8
                  4⤵
                    PID:5268
                  • C:\Program Files\Google\Chrome\Application\chrome.exe
                    "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --video-capture-use-gpu-memory-buffer --string-annotations --field-trial-handle=5356,i,6826997875413665093,6557357067335080074,262144 --variations-seed-version=20250410-050051.531000 --mojo-platform-channel-handle=5424 /prefetch:8
                    4⤵
                      PID:2040
                  • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                    "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --remote-debugging-port=9223 --profile-directory="Default"
                    3⤵
                    • Uses browser remote debugging
                    • Enumerates system info in registry
                    • Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
                    • Suspicious use of FindShellTrayWindow
                    PID:920
                    • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                      "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:4 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=133.0.6943.99 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 --annotation=prod=Edge --annotation=ver=133.0.3065.69 --initial-client-data=0x23c,0x240,0x244,0x238,0x268,0x7ffd11b8f208,0x7ffd11b8f214,0x7ffd11b8f220
                      4⤵
                        PID:5592
                      • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                        "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --string-annotations --always-read-main-dll --field-trial-handle=1920,i,14633722934563400236,17994486306122363200,262144 --variations-seed-version --mojo-platform-channel-handle=2716 /prefetch:3
                        4⤵
                          PID:4496
                        • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                          "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --string-annotations --gpu-preferences=UAAAAAAAAADgAAAEAAAAAAAAAAAAAAAAAABgAAEAAAAAAAAAAAAAAAAAAAACAAAAAAAAAAAAAAAAAAAAAAAAABAAAAAAAAAAEAAAAAAAAAAIAAAAAAAAAAgAAAAAAAAA --always-read-main-dll --field-trial-handle=2688,i,14633722934563400236,17994486306122363200,262144 --variations-seed-version --mojo-platform-channel-handle=2676 /prefetch:2
                          4⤵
                            PID:4492
                          • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                            "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=service --string-annotations --always-read-main-dll --field-trial-handle=2288,i,14633722934563400236,17994486306122363200,262144 --variations-seed-version --mojo-platform-channel-handle=2724 /prefetch:8
                            4⤵
                              PID:4532
                            • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                              "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --string-annotations --pdf-upsell-enabled --remote-debugging-port=9223 --video-capture-use-gpu-memory-buffer --lang=en-US --js-flags=--ms-user-locale= --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --always-read-main-dll --field-trial-handle=3560,i,14633722934563400236,17994486306122363200,262144 --variations-seed-version --mojo-platform-channel-handle=3600 /prefetch:1
                              4⤵
                              • Uses browser remote debugging
                              PID:4252
                            • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                              "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --string-annotations --instant-process --pdf-upsell-enabled --remote-debugging-port=9223 --video-capture-use-gpu-memory-buffer --lang=en-US --js-flags=--ms-user-locale= --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --always-read-main-dll --field-trial-handle=3572,i,14633722934563400236,17994486306122363200,262144 --variations-seed-version --mojo-platform-channel-handle=3608 /prefetch:1
                              4⤵
                              • Uses browser remote debugging
                              PID:5340
                      • C:\Program Files\Google\Chrome\Application\133.0.6943.60\elevation_service.exe
                        "C:\Program Files\Google\Chrome\Application\133.0.6943.60\elevation_service.exe"
                        1⤵
                          PID:2896
                        • C:\Windows\system32\svchost.exe
                          C:\Windows\system32\svchost.exe -k LocalSystemNetworkRestricted -p -s NgcSvc
                          1⤵
                            PID:3676
                          • C:\Program Files (x86)\Microsoft\Edge\Application\133.0.3065.69\elevation_service.exe
                            "C:\Program Files (x86)\Microsoft\Edge\Application\133.0.3065.69\elevation_service.exe"
                            1⤵
                              PID:112

                            Network

                            MITRE ATT&CK Enterprise v16

                            Replay Monitor

                            Loading Replay Monitor...

                            Downloads

                            • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\BrowsingTopicsState

                              Filesize

                              649B

                              MD5

                              e09266cf9dc38d6ab64c72d30c6acce2

                              SHA1

                              aba04c160a966a9514585f74435a8540d4d76261

                              SHA256

                              04b94c1d13856f512a62d53e4f58963c50e80b47b69c71b506e1a2290e8e289e

                              SHA512

                              fef87203e2635ff84daf9e44d42cd1d10ffa34b03ecca02da6e274a1ab0cc3f118217068635c30fd2629696ba536d7c67cdb285a3e36a3d548f721947807e464

                            • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Network\SCT Auditing Pending Reports

                              Filesize

                              2B

                              MD5

                              d751713988987e9331980363e24189ce

                              SHA1

                              97d170e1550eee4afc0af065b78cda302a97674c

                              SHA256

                              4f53cda18c2baa0c0354bb5f9a3ecbe5ed12ab4d8e11ba873c2f11161202b945

                              SHA512

                              b25b294cb4deb69ea00a4c3cf3113904801b6015e5956bd019a8570b1fe1d6040e944ef3cdee16d0a46503ca6e659a25f21cf9ceddc13f352a3c98138c15d6af

                            • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Local State

                              Filesize

                              78KB

                              MD5

                              b885b6ca1b754899f1af730bd3ff3716

                              SHA1

                              dc51f695b88069f2f43cf6bb669fb7ccf60b796c

                              SHA256

                              cbf0b97dbd9303f21caceff24bacd027d47f2f80c914d9c845c75295ce27d607

                              SHA512

                              f865606b3e1f327ab8d507a15b2b1d5772cf81d7435cb5a585e2c8c5ec7d0d9142e09247e724d5144036dc0c4e6dca4c78a68a5ff3cf7c8313462ac0a8e01570

                            • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad\settings.dat

                              Filesize

                              280B

                              MD5

                              576f64b8f21f4203eed3f6c7b065f527

                              SHA1

                              e0c4e8f914319e112a4b3562d2d6f4107750aba8

                              SHA256

                              c39a636afaeae67ebd98682bf35ff7afafceac020ed21cb564ab954ab1ef6f87

                              SHA512

                              af606a5d7d4d96afd80d8e0117f2d5f02cc82b810149f50e26d46a5b8fd7c6b2aa119aa1b7123c54d2ef19d05ca92ca738994e047e24e567e53765fc1c52f653

                            • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Service Worker\CacheStorage\3cedfb74d44f2e84198d23075aef16c34a668ceb\f4c676d2-896d-4e89-b4ea-3e01d7bd1ded\index-dir\the-real-index

                              Filesize

                              1KB

                              MD5

                              853cb76b6533f5da916ffa3b9955b927

                              SHA1

                              42580281d76271728f2b8729f94a24cf4d971dfd

                              SHA256

                              6dbf101c9d3d7f3d394ba04587b163d13349d2148391371b6cbe71dc1654fa73

                              SHA512

                              0c8206f28c252b99c480ccca9d4843e07e0522c2d3436bb42ab14c289f49f2d9b80749ec4d2a7c2e964a17ea554229b83b8eacf7d7d89baa3f2ddf68c5734bb8

                            • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Service Worker\CacheStorage\3cedfb74d44f2e84198d23075aef16c34a668ceb\f4c676d2-896d-4e89-b4ea-3e01d7bd1ded\index-dir\the-real-index~RFe589e5e.TMP

                              Filesize

                              1KB

                              MD5

                              dbcbfa604d7c9182f7ce71b5c7dbf96d

                              SHA1

                              bf1ec4645e021cbeb41f1f20b73aa375f3452d01

                              SHA256

                              6bcb102a9db0f55722cf198fb1a31f720ad30661f17ac7c82e120a4f6784db2b

                              SHA512

                              4ebe5efbfaac33347cebc9b474e363cdc680a59a3b3a6e6fe3eefc33b255466c9fbb8525f46126d7d56aac1072819ad4e54b014fc47bda2e8f0f6e43793a3ffb

                            • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Local State

                              Filesize

                              40KB

                              MD5

                              8f108422fcb43449a587ca5f1d67a64d

                              SHA1

                              5dc2ffef8bfe4f6ca85ce7cb935b9af9cc6b4a3a

                              SHA256

                              66ed7f9308ca5674a7e17eb2d5d9a40dee5b55bf84f9fe34aaa41994a9f3209b

                              SHA512

                              0c98e75679ffcb182fa0c55ef12706568c736a01949fe6d7cf0c1267174f9e0b4b561e53a824f99b1fe82c42929fe248a1ed763450e80cedb7fe29adde9222ee

                            • memory/4560-24-0x0000000000400000-0x0000000000429000-memory.dmp

                              Filesize

                              164KB

                            • memory/4560-90-0x0000000000400000-0x0000000000429000-memory.dmp

                              Filesize

                              164KB

                            • memory/4560-25-0x0000000000400000-0x0000000000429000-memory.dmp

                              Filesize

                              164KB

                            • memory/4560-29-0x0000000000400000-0x0000000000429000-memory.dmp

                              Filesize

                              164KB

                            • memory/4560-33-0x0000000000400000-0x0000000000429000-memory.dmp

                              Filesize

                              164KB

                            • memory/4560-23-0x0000000000400000-0x0000000000429000-memory.dmp

                              Filesize

                              164KB

                            • memory/4560-19-0x0000000000400000-0x0000000000429000-memory.dmp

                              Filesize

                              164KB

                            • memory/4560-16-0x0000000000400000-0x0000000000429000-memory.dmp

                              Filesize

                              164KB

                            • memory/4560-15-0x0000000000400000-0x0000000000429000-memory.dmp

                              Filesize

                              164KB

                            • memory/4560-75-0x0000000000400000-0x0000000000429000-memory.dmp

                              Filesize

                              164KB

                            • memory/4560-76-0x0000000000400000-0x0000000000429000-memory.dmp

                              Filesize

                              164KB

                            • memory/4560-79-0x0000000000400000-0x0000000000429000-memory.dmp

                              Filesize

                              164KB

                            • memory/4560-80-0x0000000000400000-0x0000000000429000-memory.dmp

                              Filesize

                              164KB

                            • memory/4560-85-0x0000000000400000-0x0000000000429000-memory.dmp

                              Filesize

                              164KB

                            • memory/4560-89-0x0000000000400000-0x0000000000429000-memory.dmp

                              Filesize

                              164KB

                            • memory/4560-0-0x0000000000400000-0x0000000000429000-memory.dmp

                              Filesize

                              164KB

                            • memory/4560-10-0x0000000000400000-0x0000000000429000-memory.dmp

                              Filesize

                              164KB

                            • memory/4560-115-0x0000000000400000-0x0000000000429000-memory.dmp

                              Filesize

                              164KB

                            • memory/4560-9-0x0000000000400000-0x0000000000429000-memory.dmp

                              Filesize

                              164KB

                            • memory/4560-2-0x0000000000400000-0x0000000000429000-memory.dmp

                              Filesize

                              164KB

                            • memory/4560-1-0x0000000000400000-0x0000000000429000-memory.dmp

                              Filesize

                              164KB

                            • memory/4560-435-0x0000000000400000-0x0000000000429000-memory.dmp

                              Filesize

                              164KB

                            • memory/4560-462-0x0000000000400000-0x0000000000429000-memory.dmp

                              Filesize

                              164KB

                            • memory/4560-459-0x0000000000400000-0x0000000000429000-memory.dmp

                              Filesize

                              164KB

                            • memory/4560-465-0x0000000000400000-0x0000000000429000-memory.dmp

                              Filesize

                              164KB

                            • memory/4560-466-0x0000000000400000-0x0000000000429000-memory.dmp

                              Filesize

                              164KB

                            • memory/4560-467-0x0000000000400000-0x0000000000429000-memory.dmp

                              Filesize

                              164KB

                            • memory/4560-468-0x0000000000400000-0x0000000000429000-memory.dmp

                              Filesize

                              164KB

                            • memory/4560-469-0x0000000000400000-0x0000000000429000-memory.dmp

                              Filesize

                              164KB

                            • memory/4560-470-0x0000000000400000-0x0000000000429000-memory.dmp

                              Filesize

                              164KB

                            • memory/4560-471-0x0000000000400000-0x0000000000429000-memory.dmp

                              Filesize

                              164KB