Analysis

  • max time kernel
    151s
  • max time network
    155s
  • platform
    windows7_x64
  • resource
    win7-20231215-en
  • resource tags

    arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system
  • submitted
    25/12/2023, 04:22

General

  • Target

    04f51edd6c765a44e833a13065fb3dee.exe

  • Size

    483KB

  • MD5

    04f51edd6c765a44e833a13065fb3dee

  • SHA1

    26b91f0551ded7441f207c337bafd0d4752c52ca

  • SHA256

    8ac6ab42b1eedf46f32884f295cb91e94aa785b43e2d38adc613c4e7a536cce3

  • SHA512

    1c5ef401f645866b29cfa83c62ef95a7900f9b12c3dc87f33ba1f6504100d7bccbf5648cb1fa9b670450268d0ed624599c599e757e837d715b236c2b17500c07

  • SSDEEP

    12288:vuEfwYdSiKMxVC3KxLOcQds0wmJcDJyhzmFx4ibhZpeV:vpdcMxVkuQXdqlypm8i9Zg

Malware Config

Signatures

  • Modifies WinLogon for persistence 2 TTPs 2 IoCs
  • Adds policy Run key to start application 2 TTPs 4 IoCs
  • Modifies Installed Components in the registry 2 TTPs 5 IoCs
  • ASPack v2.12-2.42 1 IoCs

    Detects executables packed with ASPack v2.12-2.42

  • Executes dropped EXE 5 IoCs
  • Loads dropped DLL 17 IoCs
  • UPX packed file 32 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Adds Run key to start application 2 TTPs 1 IoCs
  • Modifies WinLogon 2 TTPs 2 IoCs
  • Drops file in System32 directory 12 IoCs
  • Drops file in Windows directory 8 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Runs net.exe
  • Suspicious behavior: EnumeratesProcesses 63 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of SetWindowsHookEx 2 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\04f51edd6c765a44e833a13065fb3dee.exe
    "C:\Users\Admin\AppData\Local\Temp\04f51edd6c765a44e833a13065fb3dee.exe"
    1⤵
    • Loads dropped DLL
    • Adds Run key to start application
    • Suspicious use of WriteProcessMemory
    PID:2468
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\TABUUUUU.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\TABUUUUU.exe
      2⤵
      • Executes dropped EXE
      • Loads dropped DLL
      • Drops file in System32 directory
      • Suspicious use of WriteProcessMemory
      PID:1264
      • C:\Windows\SysWOW64\lncom.exe
        "C:\Windows\system32\lncom.exe"
        3⤵
        • Modifies WinLogon for persistence
        • Adds policy Run key to start application
        • Modifies Installed Components in the registry
        • Executes dropped EXE
        • Loads dropped DLL
        • Modifies WinLogon
        • Drops file in System32 directory
        • Drops file in Windows directory
        • Suspicious use of WriteProcessMemory
        PID:2720
        • C:\Windows\SysWOW64\fservice.exe
          C:\Windows\system32\fservice.exe
          4⤵
          • Executes dropped EXE
          • Loads dropped DLL
          • Drops file in System32 directory
          • Drops file in Windows directory
          • Suspicious use of WriteProcessMemory
          PID:3060
          • C:\Windows\services.exe
            C:\Windows\services.exe -XP
            5⤵
            • Modifies WinLogon for persistence
            • Adds policy Run key to start application
            • Modifies Installed Components in the registry
            • Executes dropped EXE
            • Loads dropped DLL
            • Modifies WinLogon
            • Drops file in System32 directory
            • Drops file in Windows directory
            • Suspicious behavior: EnumeratesProcesses
            • Suspicious use of SetWindowsHookEx
            • Suspicious use of WriteProcessMemory
            PID:1948
            • C:\Windows\SysWOW64\NET.exe
              NET STOP navapsvc
              6⤵
                PID:2840
                • C:\Windows\SysWOW64\net1.exe
                  C:\Windows\system32\net1 STOP navapsvc
                  7⤵
                    PID:584
                • C:\Windows\SysWOW64\NET.exe
                  NET STOP srservice
                  6⤵
                    PID:2872
                    • C:\Windows\SysWOW64\net1.exe
                      C:\Windows\system32\net1 STOP srservice
                      7⤵
                        PID:268
                • C:\Windows\SysWOW64\cmd.exe
                  cmd /c C:\Windows\SysWOW64\lncom.exe.bat
                  4⤵
                    PID:800
                • C:\Windows\SysWOW64\cmd.exe
                  cmd /c C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\TABUUUUU.exe.bat
                  3⤵
                    PID:2092
                • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\TABUUUUU.exe
                  C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\TABUUUUU.exe
                  2⤵
                  • Executes dropped EXE
                  • Loads dropped DLL
                  • Drops file in System32 directory
                  • Suspicious use of WriteProcessMemory
                  PID:2900
                  • C:\Windows\SysWOW64\cmd.exe
                    cmd /c C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\TABUUUUU.exe.bat
                    3⤵
                      PID:2668
                • C:\Windows\SysWOW64\DllHost.exe
                  C:\Windows\SysWOW64\DllHost.exe /Processid:{76D0CB12-7604-4048-B83C-1005C7DDC503}
                  1⤵
                  • Loads dropped DLL
                  • Drops file in System32 directory
                  • Suspicious use of FindShellTrayWindow
                  PID:2700

                Network

                MITRE ATT&CK Enterprise v15

                Replay Monitor

                Loading Replay Monitor...

                Downloads

                • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\TABUUUUU.JPG

                  Filesize

                  84KB

                  MD5

                  e6b87924a6569a4677cb9071e242d618

                  SHA1

                  9455057be66031c47551b3c9b3f9d73ea0973933

                  SHA256

                  da9d9c653734483de61a90d241314f7d759cad046accf5b07205d7ccfcb1994e

                  SHA512

                  166c1e92249c05622522c500926bfbb5b005dedaedb9e0bef221c1ddbc2c7a5d7fea6d8645c1c7761857a68f97eac9b609ac6ce1e9f0494b00b24e3dfa79849b

                • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\TABUUUUU.exe

                  Filesize

                  319KB

                  MD5

                  20aa480ab29ccd98ed68be3db6873c40

                  SHA1

                  b4c79e2a2fe17c03065589363be2d565f4a5dc3c

                  SHA256

                  c56854ee86e58c6fce5f1cbe3ebd90bf89ae2426b3f9bccd0fe2ff0235f94a0e

                  SHA512

                  dc9e61163b6806288f5845db1f49311220e749dae0a4fc356ae68f91fb7ed6fcb3b39ad9860891ff7623bf33dd9cb74a438be2d8603ad68523787289ac2261ba

                • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\TABUUUUU.exe

                  Filesize

                  237KB

                  MD5

                  8e4632e09617870b8065ebd20819fb01

                  SHA1

                  c473e12d6d01e64cf416471818fd576c614a2a25

                  SHA256

                  e80bd0007caae2572254cce3ea01d099c0d9e3554f7f164db5bf8dbe6cec65ca

                  SHA512

                  3105315722a73df9fd299097adafdddba54072d81fb535f6efdf21b85ef256158bc118672bbdf1a4e6d2064bf8af5f83f16ccc02abc386951ba77b439b1d387b

                • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\TABUUUUU.exe.bat

                  Filesize

                  155B

                  MD5

                  03907e1a7a8e9fbe36ab1f953a146bb2

                  SHA1

                  3c3cbffe323eca64922f1b37300139abfc06c0bc

                  SHA256

                  838bf54245fb7f3cddc2024893be63bfbfb62507ed2b678360c5023a1cac9d54

                  SHA512

                  2685c346c3cce82730459234a930f0bf02333f9fb1eee588734ea08241bcc8b3f676e53984f88aa304b311d5e672f0a5590eabd366d82a023936e35c286d0337

                • C:\Windows\SysWOW64\fservice.exe

                  Filesize

                  204KB

                  MD5

                  60df01d17c64610ab48fcb507a4d783c

                  SHA1

                  760316d6acb8a1ed98dbc1dc0607c20938e32193

                  SHA256

                  1ed0a79b4c7178d7651ece0cb8027ee1ae117704ff6e6f18cfbbb4132378d732

                  SHA512

                  2f2ff8419b5ba3f26fdef7de1c0db2769d2351f0fbc4c39293e2a0c183d78b7774b8a15cc453cb03871ef659981a7333ee8ff9f2a60b0ab7601cb4e78cdc919e

                • C:\Windows\SysWOW64\fservice.exe

                  Filesize

                  100KB

                  MD5

                  a4494241e35cd70447d9d3e8a8bc9fde

                  SHA1

                  6a2e3b1bde41d89303b188aa4758e178f056a17a

                  SHA256

                  51f2b4b931b41ac8a9a7563f8506b54e5ff0674d4e99b4aa01d789b6bc88e17b

                  SHA512

                  fb8dfed835f421f353649ab4eb24125df8521b815106ddc373679d5527435aa8f5b45a5860f3c476da6da6234839cc945de95c702f8ad828558a2756bdff47f3

                • C:\Windows\SysWOW64\lncom.exe

                  Filesize

                  272KB

                  MD5

                  76f86ab0cc8688ed3763fb37368e3658

                  SHA1

                  c4eab59290ece9fb4d7bc88f0a55cafda0ea3971

                  SHA256

                  5e2491fec59f665d2f82f1eff7f975fb81fdb4893d596c68f482f45a2369d4f2

                  SHA512

                  7224d7fac55cbfd949662b845b147e16ac304641d8fe37542aa12b83cacd14018020f2c4086653dc49c13dd7f0cd9579aaa10bcdea77c2a859611cb463258381

                • C:\Windows\SysWOW64\lncom.exe.bat

                  Filesize

                  99B

                  MD5

                  1f73e450d92934cd37c041eb3f1ff51f

                  SHA1

                  f3e9dece5d6b7d7a0e4966c16ffe31437539d4a0

                  SHA256

                  3a57d154715459926a51a9e3925687c0c78ec9c88bc39c303b5b93385d34d67e

                  SHA512

                  5f982d614e54870ae3ad212f049ca3685602812c1bb066a5f6155e694adb994d6d1608ca7a25bcab605812c6e7e6b22817aaf0dba9e906787add9b0a8e3f32a5

                • C:\Windows\services.exe

                  Filesize

                  81KB

                  MD5

                  d191d9dc694847cc0c2d5339a0c9578b

                  SHA1

                  ffb0ddcc1056c754083f646741b6b82cb76dc8c8

                  SHA256

                  5fdeafd1d55e3623d53fb7bf85cb2759fdf6ce67e885288ded2030cb8538c186

                  SHA512

                  e0cfb26707e838892754bbebada48421b4450dc7a537a560d6859666b3295ee2f01acf6b2458e2b11d5f88f6df9a366be215292b2b91790d333bb745b5dc80ba

                • C:\Windows\services.exe

                  Filesize

                  185KB

                  MD5

                  1130f36690c9ef3495ccd3a34d8f5fa3

                  SHA1

                  dbcbf804797ae597b17b5a3b2b6c11ed902ca73d

                  SHA256

                  b0e79e68630f4e7879dbc0f0912cb4750e4ceadb92f9c13d224ea45f04169671

                  SHA512

                  0cefb2d03eb27706234bf8d69d21bd6e84f9e91aecd504fd01093d11b108dcde3b83e49a4dcec4002a1c4e68d920b8d2078e4aa0ef8001a8e1bf4f1aec252899

                • C:\Windows\system\sservice.exe

                  Filesize

                  153KB

                  MD5

                  325f4e2ba7f33105082de349d5ec6d38

                  SHA1

                  707b80fa44131562e56111b1b391caa2a29ff564

                  SHA256

                  97f9f66fdff82542adacaabbfba98e8c20fc8854a4c0ad07c2334de2b173902d

                  SHA512

                  e160e261231945b8b88774e9cc9b86104e113e4af3ffb93fa1d0fc99c5cfbba8853db07ddd2cdbf7a49e1151eb26033934b21e70be4630ed6e6d95bc58ffb976

                • \Users\Admin\AppData\Local\Temp\IXP000.TMP\TABUUUUU.exe

                  Filesize

                  197KB

                  MD5

                  2181e3d0314d7f3f4061bd66ae475b5a

                  SHA1

                  f177d89f7223854eae7015a9e436de33eac417de

                  SHA256

                  f785df39c31d89849b99e41c6691a9c2ce40bd1703b6bb92d1dadc6063eaf709

                  SHA512

                  bde47228738c9c40a0c4207da212c463da22d3f4eb3b810b594bc305853388f9ed087376a3a9fd9182dd9c8ba924982945f6dd088b6eaf99140144f20ea41502

                • \Users\Admin\AppData\Local\Temp\IXP000.TMP\TABUUUUU.exe

                  Filesize

                  431KB

                  MD5

                  feb46757e030a98fa38e9f692c4bbfce

                  SHA1

                  42b855d1318bb28dcfc73d00b08249e9080863ab

                  SHA256

                  ef623e384e0f276e0a1df832fc68d8273ab8d6d0e689fb018a471b86031584a7

                  SHA512

                  66cb8f77152922012f7c0a547e5c4e91da9e2a5d3e2d9d194c8907c345da857f7ccfe096f950aa4737261675a6f12dbabd123e6d074e97dc836004b20e2b0360

                • \Users\Admin\AppData\Local\Temp\IXP000.TMP\TABUUUUU.exe

                  Filesize

                  343KB

                  MD5

                  4648b54042445052e8ddc709f9ebe4df

                  SHA1

                  4bd82d61e9e333322e93d031037c3e67714c1e6f

                  SHA256

                  1aa2c87b9b1f4b59dea4c3b20d0d112e08c1c2722d0c73c7b4c3fb8bd245e1a3

                  SHA512

                  a42ebe1293c77b4548028d15f71b4e7fe0858bce174db6158a1f6ee03fce4cee31d9743ee16bf9ebe1856470494223a106cb35490d7492d6680cec628c9e7316

                • \Users\Admin\AppData\Local\Temp\IXP000.TMP\TABUUUUU.exe

                  Filesize

                  351KB

                  MD5

                  96975c91be409be709d4bb1ad7525869

                  SHA1

                  300caedd8ce5ba747db5c5333494258ed5b03636

                  SHA256

                  87a7b28f6447c3c9c2019255096b100fdc6ffa574c65ed222e439955c082241a

                  SHA512

                  03c9b7a4040a7ac3ae532fdf0ef6e3a80b0bd134894644c6a6b343bddaf7983978f8853ea65e2b3c2c435352aa7fa9a5b0945fc3a095a595d673e2f3d87e2d02

                • \Users\Admin\AppData\Local\Temp\IXP000.TMP\TABUUUUU.exe

                  Filesize

                  320KB

                  MD5

                  7d318f4d192f2d4bd69cb37705ed6c7d

                  SHA1

                  7cd364f49a3a2a03fb3e6fa0636c8e8e203bcd0b

                  SHA256

                  4839b53f09237ed883e8009eadce76830440e0c4dfc2a09441298cbf973ac730

                  SHA512

                  edaf61583119a2a9e0c19a3198dc31bf41ffecd32a442aa482ac3b52aa84973281ce462e30db5cb248301d5f0774e56378b298f43c9109fbea9fd73285fdc30b

                • \Windows\SysWOW64\fservice.exe

                  Filesize

                  136KB

                  MD5

                  b75f8e3c3bb8f00a190844dc6c7b21eb

                  SHA1

                  4a83d6a6a5f4f44feed44d9f489791284460daa0

                  SHA256

                  bb9e76fc27eecf9549a7f1f2207ed1cbb5dd6efbec21e364d4ec714428633176

                  SHA512

                  5c87697ceae1720e12c2d1671f1ff61ca07a70132742509e90bd6ea92fea4866a0d8d296f8c7eeb7c7970875c9530b592f935fec63275aa16570cfafe1a5a411

                • \Windows\SysWOW64\fservice.exe

                  Filesize

                  136KB

                  MD5

                  1381800ae3e5f073e80d58e0d8ab7fbc

                  SHA1

                  2446f095a3ce3d853c061ae34c1a83f8785bc651

                  SHA256

                  4489f2689cddf4e6f653781dcde78213ca909f9a70b91496e0ddab682f9211e5

                  SHA512

                  813b0946c1ea5a5fe2e78cb71ff8b889b5f739b0e5e7a0304075025bb8b73b7d75bf08bd444edef8ffad99f1c697ee94bc3c2eb1e5690c6e80df3f90d9f430ff

                • \Windows\SysWOW64\fservice.exe

                  Filesize

                  78KB

                  MD5

                  25af72c04522d68d16110faf06d23ff2

                  SHA1

                  ddc06821eb849e2c7845eb1c224617eae1c631a1

                  SHA256

                  c8721136ac1d664bf72db8e82754167805b3c696bf50186c04a2468ada39f43d

                  SHA512

                  17f68f2591e481116f04e238be1803340c966ca3392715d1f6623d67d318cff470d3a9cd00caa1d0a2dd4917413bd37b69f4e07b2ac3f123890f5bb2b12d98a0

                • \Windows\SysWOW64\lncom.exe

                  Filesize

                  342KB

                  MD5

                  6c02b1fdb72e1f50501053335a961e5f

                  SHA1

                  3ef7b1517ab69c99d63bdbd7ea3cd154fde1de39

                  SHA256

                  0ae9a34b85b6cc98b2aa4f593932e6e441b2001df9b989d59245e100d89ebbea

                  SHA512

                  3d96b0edf4559d8726cdddddc9349a15fae7a6248ab1047ada30fc1814ea34939493fcf678dd134b88f069c526a8c2887a4745a3a643e29d56ad4f47349fc609

                • \Windows\SysWOW64\lncom.exe

                  Filesize

                  259KB

                  MD5

                  07c4b26769703606d6b757839772a20d

                  SHA1

                  4780cc58d01edfda20712ba2f172fe967cd95204

                  SHA256

                  444bed69d49de66acdcd35d4bc61dba9603094e3c0136016b9702af29f81c49b

                  SHA512

                  fdba07935f830be2481820e1034036de36702b8edfddae83be0a3ba87e812dacb8138388c9cbc59d45da507934f1302c251407b5b9f9bd9d734bcaa5cbf4ea7c

                • \Windows\SysWOW64\reginv.dll

                  Filesize

                  18KB

                  MD5

                  2d0cc489c835d85770e355c117d47640

                  SHA1

                  9390be03b01095bfe1f93147aec086daed1cb67c

                  SHA256

                  7d15b72005de5a178fbf04e8a19c56432213ba9e10941533746e238374509b4c

                  SHA512

                  07328f1ff6f2e82da43b6b5f7befc200577999924a13669419ed1c139809ddbbbe7c8f6792a90b307674c3bc595128804ea0115880f6633d4250ba00de5e3457

                • \Windows\SysWOW64\reginv.dll

                  Filesize

                  36KB

                  MD5

                  562e0d01d6571fa2251a1e9f54c6cc69

                  SHA1

                  83677ad3bc630aa6327253c7b3deffbd4a8ce905

                  SHA256

                  c5b1d800c86d550c0b68c57c0d9911c1dd21df9e5e37e9e7bc032b5e66fdebe6

                  SHA512

                  166e132432eca24061f7e7d0c58c0b286e971ae2bc50f7c890b7707dd5dede19fcd83a5f79b6fd3f93dd691e07ad9bc1bd05fe82ccaade1610282188571585ea

                • \Windows\SysWOW64\winkey.dll

                  Filesize

                  13KB

                  MD5

                  b4c72da9fd1a0dcb0698b7da97daa0cd

                  SHA1

                  b25a79e8ea4c723c58caab83aed6ea48de7ed759

                  SHA256

                  45d266269634ba2de70f179a26d7224111e677e66b38dff2802851b71ce4458f

                  SHA512

                  f5f184416c5381d275bc093c9275e9fdb35c58e2c401d188aef097950013de6e43269da5d4dd5e7baea34735bd7de664d15fe487b2292fd66926c9845b0cd066

                • memory/1264-33-0x0000000000400000-0x0000000000404000-memory.dmp

                  Filesize

                  16KB

                • memory/1264-22-0x00000000079B0000-0x0000000007BAC000-memory.dmp

                  Filesize

                  2.0MB

                • memory/1264-13-0x0000000000480000-0x0000000000482000-memory.dmp

                  Filesize

                  8KB

                • memory/1948-108-0x0000000010000000-0x000000001000B000-memory.dmp

                  Filesize

                  44KB

                • memory/1948-127-0x0000000000400000-0x00000000005FC000-memory.dmp

                  Filesize

                  2.0MB

                • memory/1948-135-0x0000000000400000-0x00000000005FC000-memory.dmp

                  Filesize

                  2.0MB

                • memory/1948-80-0x0000000000400000-0x00000000005FC000-memory.dmp

                  Filesize

                  2.0MB

                • memory/1948-133-0x0000000000400000-0x00000000005FC000-memory.dmp

                  Filesize

                  2.0MB

                • memory/1948-131-0x0000000000400000-0x00000000005FC000-memory.dmp

                  Filesize

                  2.0MB

                • memory/1948-86-0x0000000010000000-0x000000001000B000-memory.dmp

                  Filesize

                  44KB

                • memory/1948-84-0x00000000001E0000-0x00000000001E1000-memory.dmp

                  Filesize

                  4KB

                • memory/1948-129-0x0000000000400000-0x00000000005FC000-memory.dmp

                  Filesize

                  2.0MB

                • memory/1948-112-0x00000000001E0000-0x00000000001E1000-memory.dmp

                  Filesize

                  4KB

                • memory/1948-121-0x0000000000400000-0x00000000005FC000-memory.dmp

                  Filesize

                  2.0MB

                • memory/1948-119-0x0000000000400000-0x00000000005FC000-memory.dmp

                  Filesize

                  2.0MB

                • memory/1948-117-0x0000000000400000-0x00000000005FC000-memory.dmp

                  Filesize

                  2.0MB

                • memory/1948-115-0x0000000000400000-0x00000000005FC000-memory.dmp

                  Filesize

                  2.0MB

                • memory/1948-107-0x0000000000400000-0x00000000005FC000-memory.dmp

                  Filesize

                  2.0MB

                • memory/1948-113-0x0000000000400000-0x00000000005FC000-memory.dmp

                  Filesize

                  2.0MB

                • memory/1948-109-0x0000000000400000-0x00000000005FC000-memory.dmp

                  Filesize

                  2.0MB

                • memory/1948-110-0x0000000000400000-0x00000000005FC000-memory.dmp

                  Filesize

                  2.0MB

                • memory/2700-14-0x00000000001C0000-0x00000000001C2000-memory.dmp

                  Filesize

                  8KB

                • memory/2720-35-0x0000000000400000-0x00000000005FC000-memory.dmp

                  Filesize

                  2.0MB

                • memory/2720-53-0x0000000000DF0000-0x0000000000FEC000-memory.dmp

                  Filesize

                  2.0MB

                • memory/2720-102-0x0000000000400000-0x00000000005FC000-memory.dmp

                  Filesize

                  2.0MB

                • memory/2720-65-0x0000000002FB0000-0x00000000031AC000-memory.dmp

                  Filesize

                  2.0MB

                • memory/2720-73-0x0000000002FB0000-0x00000000031AC000-memory.dmp

                  Filesize

                  2.0MB

                • memory/3060-79-0x00000000032A0000-0x000000000349C000-memory.dmp

                  Filesize

                  2.0MB

                • memory/3060-93-0x0000000000400000-0x00000000005FC000-memory.dmp

                  Filesize

                  2.0MB

                • memory/3060-72-0x0000000000F00000-0x00000000010FC000-memory.dmp

                  Filesize

                  2.0MB

                • memory/3060-68-0x0000000000400000-0x00000000005FC000-memory.dmp

                  Filesize

                  2.0MB

                • memory/3060-85-0x00000000032A0000-0x000000000349C000-memory.dmp

                  Filesize

                  2.0MB