Analysis

  • max time kernel
    117s
  • max time network
    121s
  • platform
    windows7_x64
  • resource
    win7-20230831-en
  • resource tags

    arch:x64arch:x86image:win7-20230831-enlocale:en-usos:windows7-x64system
  • submitted
    01-10-2023 19:18

General

  • Target

    01c599527dc62eba8ba0acb2b70450dedb1892efb9bfa57dac69394df43a6728_JC.exe

  • Size

    1.0MB

  • MD5

    5658f79541070a0e9cb7aefb079d5b0a

  • SHA1

    8c5dab81f88a94ad3ba7bf465c4484566f2d6c6a

  • SHA256

    01c599527dc62eba8ba0acb2b70450dedb1892efb9bfa57dac69394df43a6728

  • SHA512

    4730c9a4306ec3114419b92cbedccc4980c77c4f4f48fdaf1cf1b11fe18c5947c1123b7d04e5c6c180af29bf255d0615644353bd53dc47c73627520752afa198

  • SSDEEP

    24576:8yT32gm1kuznBPN8clPvR9Jrb0mEPtYV3BglCi48bbpGbTkG4:rT32gqkuznBOclPhrb4KQC38bbpG0

Malware Config

Signatures

  • Detects Healer an antivirus disabler dropper 4 IoCs
  • Healer

    Healer an antivirus disabler dropper.

  • Modifies Windows Defender Real-time Protection settings 3 TTPs 6 IoCs
  • Executes dropped EXE 6 IoCs
  • Loads dropped DLL 16 IoCs
  • Windows security modification 2 TTPs 2 IoCs
  • Adds Run key to start application 2 TTPs 5 IoCs
  • Suspicious use of SetThreadContext 1 IoCs
  • Program crash 2 IoCs
  • Suspicious behavior: EnumeratesProcesses 2 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\01c599527dc62eba8ba0acb2b70450dedb1892efb9bfa57dac69394df43a6728_JC.exe
    "C:\Users\Admin\AppData\Local\Temp\01c599527dc62eba8ba0acb2b70450dedb1892efb9bfa57dac69394df43a6728_JC.exe"
    1⤵
    • Loads dropped DLL
    • Adds Run key to start application
    • Suspicious use of WriteProcessMemory
    PID:1676
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\z4394743.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\z4394743.exe
      2⤵
      • Executes dropped EXE
      • Loads dropped DLL
      • Adds Run key to start application
      • Suspicious use of WriteProcessMemory
      PID:3020
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\z6419608.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\z6419608.exe
        3⤵
        • Executes dropped EXE
        • Loads dropped DLL
        • Adds Run key to start application
        • Suspicious use of WriteProcessMemory
        PID:2612
        • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\z8892533.exe
          C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\z8892533.exe
          4⤵
          • Executes dropped EXE
          • Loads dropped DLL
          • Adds Run key to start application
          • Suspicious use of WriteProcessMemory
          PID:2728
          • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\z8376247.exe
            C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\z8376247.exe
            5⤵
            • Executes dropped EXE
            • Loads dropped DLL
            • Adds Run key to start application
            • Suspicious use of WriteProcessMemory
            PID:2604
            • C:\Users\Admin\AppData\Local\Temp\IXP004.TMP\q4631931.exe
              C:\Users\Admin\AppData\Local\Temp\IXP004.TMP\q4631931.exe
              6⤵
              • Modifies Windows Defender Real-time Protection settings
              • Executes dropped EXE
              • Windows security modification
              • Suspicious behavior: EnumeratesProcesses
              • Suspicious use of AdjustPrivilegeToken
              PID:2496
            • C:\Users\Admin\AppData\Local\Temp\IXP004.TMP\r3549085.exe
              C:\Users\Admin\AppData\Local\Temp\IXP004.TMP\r3549085.exe
              6⤵
              • Executes dropped EXE
              • Loads dropped DLL
              • Suspicious use of SetThreadContext
              • Suspicious use of WriteProcessMemory
              PID:1864
              • C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe
                "C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"
                7⤵
                  PID:2952
                • C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe
                  "C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"
                  7⤵
                    PID:2996
                  • C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe
                    "C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"
                    7⤵
                      PID:2520
                    • C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe
                      "C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"
                      7⤵
                        PID:2308
                        • C:\Windows\SysWOW64\WerFault.exe
                          C:\Windows\SysWOW64\WerFault.exe -u -p 2308 -s 268
                          8⤵
                          • Program crash
                          PID:2840
                      • C:\Windows\SysWOW64\WerFault.exe
                        C:\Windows\SysWOW64\WerFault.exe -u -p 1864 -s 300
                        7⤵
                        • Loads dropped DLL
                        • Program crash
                        PID:2796

          Network

          MITRE ATT&CK Enterprise v15

          Replay Monitor

          Loading Replay Monitor...

          Downloads

          • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\z4394743.exe
            Filesize

            971KB

            MD5

            6becf9720370b7d197e6903c12c68dad

            SHA1

            b0458af76106e13bd7f5570a9001e8a8d70e05fb

            SHA256

            5362f0678cf83f51b5d26038008f16e6be18f325fb7f7c4d0bd0ce921651860f

            SHA512

            afffe479334076fead87a8e371cfffb578248b0e71fd2646ef48ddaef280b39ce8894d45132f804ab828984e4cfc16c505f3ebd5295e993c8643b3883c440308

          • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\z4394743.exe
            Filesize

            971KB

            MD5

            6becf9720370b7d197e6903c12c68dad

            SHA1

            b0458af76106e13bd7f5570a9001e8a8d70e05fb

            SHA256

            5362f0678cf83f51b5d26038008f16e6be18f325fb7f7c4d0bd0ce921651860f

            SHA512

            afffe479334076fead87a8e371cfffb578248b0e71fd2646ef48ddaef280b39ce8894d45132f804ab828984e4cfc16c505f3ebd5295e993c8643b3883c440308

          • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\z6419608.exe
            Filesize

            789KB

            MD5

            80c9261a408225aa097661d2701478ca

            SHA1

            ddc9440cd752d0c57757c36b20f8b131d70905c4

            SHA256

            a7a7ea80c381ef788951c215c5b1d2bc75f7f8a089546ed6dd3c211d9b2eff5e

            SHA512

            0f28555ee493fdd055d746fded833f055cb029b5d51cb692019751ee9cbfd4f473b2988a9db532799d52db51fd0886e7ef5c6d9ba58598a8453f3f772da6af08

          • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\z6419608.exe
            Filesize

            789KB

            MD5

            80c9261a408225aa097661d2701478ca

            SHA1

            ddc9440cd752d0c57757c36b20f8b131d70905c4

            SHA256

            a7a7ea80c381ef788951c215c5b1d2bc75f7f8a089546ed6dd3c211d9b2eff5e

            SHA512

            0f28555ee493fdd055d746fded833f055cb029b5d51cb692019751ee9cbfd4f473b2988a9db532799d52db51fd0886e7ef5c6d9ba58598a8453f3f772da6af08

          • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\z8892533.exe
            Filesize

            606KB

            MD5

            a5430ed4f9c20df94ab783828869ee6e

            SHA1

            4c08869a431905e659303352ec37445f25edb458

            SHA256

            1a59398d2cf3f9412f1283d78ea1422b796294c90b51d10f5161e91846a19c9e

            SHA512

            50aac8d427556eeeaeceb4c4df60dc3aa5e2e46c0d3c44738d691d79d5cf04917585c0ad2f6f0ddfd1250b01362378a2421d34fd0e5a0ef007e16d5511499e7c

          • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\z8892533.exe
            Filesize

            606KB

            MD5

            a5430ed4f9c20df94ab783828869ee6e

            SHA1

            4c08869a431905e659303352ec37445f25edb458

            SHA256

            1a59398d2cf3f9412f1283d78ea1422b796294c90b51d10f5161e91846a19c9e

            SHA512

            50aac8d427556eeeaeceb4c4df60dc3aa5e2e46c0d3c44738d691d79d5cf04917585c0ad2f6f0ddfd1250b01362378a2421d34fd0e5a0ef007e16d5511499e7c

          • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\z8376247.exe
            Filesize

            335KB

            MD5

            ba58c863e4832dd706d1059eb620a307

            SHA1

            fcc96aa8d1fff1b0fc8a49cd6b7b7e5a540b6e0b

            SHA256

            027c94384183d99d047e161bc4ca932d56937ffd3adecf0fc332d722dc54fe2d

            SHA512

            355bd4429c84b69ac98c14f80a821165beade9a9aa46c30ef7550c5b5de5e112d8213f610e3c0b2a3ecfbada5fa8a0ce52cb490047ae05d197cd15acb34cd988

          • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\z8376247.exe
            Filesize

            335KB

            MD5

            ba58c863e4832dd706d1059eb620a307

            SHA1

            fcc96aa8d1fff1b0fc8a49cd6b7b7e5a540b6e0b

            SHA256

            027c94384183d99d047e161bc4ca932d56937ffd3adecf0fc332d722dc54fe2d

            SHA512

            355bd4429c84b69ac98c14f80a821165beade9a9aa46c30ef7550c5b5de5e112d8213f610e3c0b2a3ecfbada5fa8a0ce52cb490047ae05d197cd15acb34cd988

          • C:\Users\Admin\AppData\Local\Temp\IXP004.TMP\q4631931.exe
            Filesize

            11KB

            MD5

            dc60f0c6c3c7a8ac4f2a4f95a36f94bc

            SHA1

            5daba85b1a40c2ca8e34ff00612e8070cd426768

            SHA256

            338e974fcfa569f03bc276983ad2ac3d1413e1c492b8efaada49f83442eca3b4

            SHA512

            f56f5cc9652c24716ea8f556027cb2c9c1a9a708b3150b73f174221e639904fea8136edd5c18a27b049b077d8f33c7e9bb6d3df210684686ffa70deb5c7101bd

          • C:\Users\Admin\AppData\Local\Temp\IXP004.TMP\q4631931.exe
            Filesize

            11KB

            MD5

            dc60f0c6c3c7a8ac4f2a4f95a36f94bc

            SHA1

            5daba85b1a40c2ca8e34ff00612e8070cd426768

            SHA256

            338e974fcfa569f03bc276983ad2ac3d1413e1c492b8efaada49f83442eca3b4

            SHA512

            f56f5cc9652c24716ea8f556027cb2c9c1a9a708b3150b73f174221e639904fea8136edd5c18a27b049b077d8f33c7e9bb6d3df210684686ffa70deb5c7101bd

          • C:\Users\Admin\AppData\Local\Temp\IXP004.TMP\r3549085.exe
            Filesize

            356KB

            MD5

            2394d979956c5b244ba343910d832f00

            SHA1

            5517e72200cf6097771dfa0e55d0aec6ea5e2f88

            SHA256

            ca714c0a5cc3ebcdcf95e34d1b8e13436acfcefb9378cfac1b9dfc709adf62a3

            SHA512

            d3685a1c56ca450ffb1ddd131fdce8fe88051f77500a3057b1e44d4652e79a79fe1d409560621c97aeda950a9436541c8e439e58944570ea64791de9e68bcf72

          • C:\Users\Admin\AppData\Local\Temp\IXP004.TMP\r3549085.exe
            Filesize

            356KB

            MD5

            2394d979956c5b244ba343910d832f00

            SHA1

            5517e72200cf6097771dfa0e55d0aec6ea5e2f88

            SHA256

            ca714c0a5cc3ebcdcf95e34d1b8e13436acfcefb9378cfac1b9dfc709adf62a3

            SHA512

            d3685a1c56ca450ffb1ddd131fdce8fe88051f77500a3057b1e44d4652e79a79fe1d409560621c97aeda950a9436541c8e439e58944570ea64791de9e68bcf72

          • C:\Users\Admin\AppData\Local\Temp\IXP004.TMP\r3549085.exe
            Filesize

            356KB

            MD5

            2394d979956c5b244ba343910d832f00

            SHA1

            5517e72200cf6097771dfa0e55d0aec6ea5e2f88

            SHA256

            ca714c0a5cc3ebcdcf95e34d1b8e13436acfcefb9378cfac1b9dfc709adf62a3

            SHA512

            d3685a1c56ca450ffb1ddd131fdce8fe88051f77500a3057b1e44d4652e79a79fe1d409560621c97aeda950a9436541c8e439e58944570ea64791de9e68bcf72

          • \Users\Admin\AppData\Local\Temp\IXP000.TMP\z4394743.exe
            Filesize

            971KB

            MD5

            6becf9720370b7d197e6903c12c68dad

            SHA1

            b0458af76106e13bd7f5570a9001e8a8d70e05fb

            SHA256

            5362f0678cf83f51b5d26038008f16e6be18f325fb7f7c4d0bd0ce921651860f

            SHA512

            afffe479334076fead87a8e371cfffb578248b0e71fd2646ef48ddaef280b39ce8894d45132f804ab828984e4cfc16c505f3ebd5295e993c8643b3883c440308

          • \Users\Admin\AppData\Local\Temp\IXP000.TMP\z4394743.exe
            Filesize

            971KB

            MD5

            6becf9720370b7d197e6903c12c68dad

            SHA1

            b0458af76106e13bd7f5570a9001e8a8d70e05fb

            SHA256

            5362f0678cf83f51b5d26038008f16e6be18f325fb7f7c4d0bd0ce921651860f

            SHA512

            afffe479334076fead87a8e371cfffb578248b0e71fd2646ef48ddaef280b39ce8894d45132f804ab828984e4cfc16c505f3ebd5295e993c8643b3883c440308

          • \Users\Admin\AppData\Local\Temp\IXP001.TMP\z6419608.exe
            Filesize

            789KB

            MD5

            80c9261a408225aa097661d2701478ca

            SHA1

            ddc9440cd752d0c57757c36b20f8b131d70905c4

            SHA256

            a7a7ea80c381ef788951c215c5b1d2bc75f7f8a089546ed6dd3c211d9b2eff5e

            SHA512

            0f28555ee493fdd055d746fded833f055cb029b5d51cb692019751ee9cbfd4f473b2988a9db532799d52db51fd0886e7ef5c6d9ba58598a8453f3f772da6af08

          • \Users\Admin\AppData\Local\Temp\IXP001.TMP\z6419608.exe
            Filesize

            789KB

            MD5

            80c9261a408225aa097661d2701478ca

            SHA1

            ddc9440cd752d0c57757c36b20f8b131d70905c4

            SHA256

            a7a7ea80c381ef788951c215c5b1d2bc75f7f8a089546ed6dd3c211d9b2eff5e

            SHA512

            0f28555ee493fdd055d746fded833f055cb029b5d51cb692019751ee9cbfd4f473b2988a9db532799d52db51fd0886e7ef5c6d9ba58598a8453f3f772da6af08

          • \Users\Admin\AppData\Local\Temp\IXP002.TMP\z8892533.exe
            Filesize

            606KB

            MD5

            a5430ed4f9c20df94ab783828869ee6e

            SHA1

            4c08869a431905e659303352ec37445f25edb458

            SHA256

            1a59398d2cf3f9412f1283d78ea1422b796294c90b51d10f5161e91846a19c9e

            SHA512

            50aac8d427556eeeaeceb4c4df60dc3aa5e2e46c0d3c44738d691d79d5cf04917585c0ad2f6f0ddfd1250b01362378a2421d34fd0e5a0ef007e16d5511499e7c

          • \Users\Admin\AppData\Local\Temp\IXP002.TMP\z8892533.exe
            Filesize

            606KB

            MD5

            a5430ed4f9c20df94ab783828869ee6e

            SHA1

            4c08869a431905e659303352ec37445f25edb458

            SHA256

            1a59398d2cf3f9412f1283d78ea1422b796294c90b51d10f5161e91846a19c9e

            SHA512

            50aac8d427556eeeaeceb4c4df60dc3aa5e2e46c0d3c44738d691d79d5cf04917585c0ad2f6f0ddfd1250b01362378a2421d34fd0e5a0ef007e16d5511499e7c

          • \Users\Admin\AppData\Local\Temp\IXP003.TMP\z8376247.exe
            Filesize

            335KB

            MD5

            ba58c863e4832dd706d1059eb620a307

            SHA1

            fcc96aa8d1fff1b0fc8a49cd6b7b7e5a540b6e0b

            SHA256

            027c94384183d99d047e161bc4ca932d56937ffd3adecf0fc332d722dc54fe2d

            SHA512

            355bd4429c84b69ac98c14f80a821165beade9a9aa46c30ef7550c5b5de5e112d8213f610e3c0b2a3ecfbada5fa8a0ce52cb490047ae05d197cd15acb34cd988

          • \Users\Admin\AppData\Local\Temp\IXP003.TMP\z8376247.exe
            Filesize

            335KB

            MD5

            ba58c863e4832dd706d1059eb620a307

            SHA1

            fcc96aa8d1fff1b0fc8a49cd6b7b7e5a540b6e0b

            SHA256

            027c94384183d99d047e161bc4ca932d56937ffd3adecf0fc332d722dc54fe2d

            SHA512

            355bd4429c84b69ac98c14f80a821165beade9a9aa46c30ef7550c5b5de5e112d8213f610e3c0b2a3ecfbada5fa8a0ce52cb490047ae05d197cd15acb34cd988

          • \Users\Admin\AppData\Local\Temp\IXP004.TMP\q4631931.exe
            Filesize

            11KB

            MD5

            dc60f0c6c3c7a8ac4f2a4f95a36f94bc

            SHA1

            5daba85b1a40c2ca8e34ff00612e8070cd426768

            SHA256

            338e974fcfa569f03bc276983ad2ac3d1413e1c492b8efaada49f83442eca3b4

            SHA512

            f56f5cc9652c24716ea8f556027cb2c9c1a9a708b3150b73f174221e639904fea8136edd5c18a27b049b077d8f33c7e9bb6d3df210684686ffa70deb5c7101bd

          • \Users\Admin\AppData\Local\Temp\IXP004.TMP\r3549085.exe
            Filesize

            356KB

            MD5

            2394d979956c5b244ba343910d832f00

            SHA1

            5517e72200cf6097771dfa0e55d0aec6ea5e2f88

            SHA256

            ca714c0a5cc3ebcdcf95e34d1b8e13436acfcefb9378cfac1b9dfc709adf62a3

            SHA512

            d3685a1c56ca450ffb1ddd131fdce8fe88051f77500a3057b1e44d4652e79a79fe1d409560621c97aeda950a9436541c8e439e58944570ea64791de9e68bcf72

          • \Users\Admin\AppData\Local\Temp\IXP004.TMP\r3549085.exe
            Filesize

            356KB

            MD5

            2394d979956c5b244ba343910d832f00

            SHA1

            5517e72200cf6097771dfa0e55d0aec6ea5e2f88

            SHA256

            ca714c0a5cc3ebcdcf95e34d1b8e13436acfcefb9378cfac1b9dfc709adf62a3

            SHA512

            d3685a1c56ca450ffb1ddd131fdce8fe88051f77500a3057b1e44d4652e79a79fe1d409560621c97aeda950a9436541c8e439e58944570ea64791de9e68bcf72

          • \Users\Admin\AppData\Local\Temp\IXP004.TMP\r3549085.exe
            Filesize

            356KB

            MD5

            2394d979956c5b244ba343910d832f00

            SHA1

            5517e72200cf6097771dfa0e55d0aec6ea5e2f88

            SHA256

            ca714c0a5cc3ebcdcf95e34d1b8e13436acfcefb9378cfac1b9dfc709adf62a3

            SHA512

            d3685a1c56ca450ffb1ddd131fdce8fe88051f77500a3057b1e44d4652e79a79fe1d409560621c97aeda950a9436541c8e439e58944570ea64791de9e68bcf72

          • \Users\Admin\AppData\Local\Temp\IXP004.TMP\r3549085.exe
            Filesize

            356KB

            MD5

            2394d979956c5b244ba343910d832f00

            SHA1

            5517e72200cf6097771dfa0e55d0aec6ea5e2f88

            SHA256

            ca714c0a5cc3ebcdcf95e34d1b8e13436acfcefb9378cfac1b9dfc709adf62a3

            SHA512

            d3685a1c56ca450ffb1ddd131fdce8fe88051f77500a3057b1e44d4652e79a79fe1d409560621c97aeda950a9436541c8e439e58944570ea64791de9e68bcf72

          • \Users\Admin\AppData\Local\Temp\IXP004.TMP\r3549085.exe
            Filesize

            356KB

            MD5

            2394d979956c5b244ba343910d832f00

            SHA1

            5517e72200cf6097771dfa0e55d0aec6ea5e2f88

            SHA256

            ca714c0a5cc3ebcdcf95e34d1b8e13436acfcefb9378cfac1b9dfc709adf62a3

            SHA512

            d3685a1c56ca450ffb1ddd131fdce8fe88051f77500a3057b1e44d4652e79a79fe1d409560621c97aeda950a9436541c8e439e58944570ea64791de9e68bcf72

          • \Users\Admin\AppData\Local\Temp\IXP004.TMP\r3549085.exe
            Filesize

            356KB

            MD5

            2394d979956c5b244ba343910d832f00

            SHA1

            5517e72200cf6097771dfa0e55d0aec6ea5e2f88

            SHA256

            ca714c0a5cc3ebcdcf95e34d1b8e13436acfcefb9378cfac1b9dfc709adf62a3

            SHA512

            d3685a1c56ca450ffb1ddd131fdce8fe88051f77500a3057b1e44d4652e79a79fe1d409560621c97aeda950a9436541c8e439e58944570ea64791de9e68bcf72

          • \Users\Admin\AppData\Local\Temp\IXP004.TMP\r3549085.exe
            Filesize

            356KB

            MD5

            2394d979956c5b244ba343910d832f00

            SHA1

            5517e72200cf6097771dfa0e55d0aec6ea5e2f88

            SHA256

            ca714c0a5cc3ebcdcf95e34d1b8e13436acfcefb9378cfac1b9dfc709adf62a3

            SHA512

            d3685a1c56ca450ffb1ddd131fdce8fe88051f77500a3057b1e44d4652e79a79fe1d409560621c97aeda950a9436541c8e439e58944570ea64791de9e68bcf72

          • memory/2308-62-0x0000000000400000-0x0000000000428000-memory.dmp
            Filesize

            160KB

          • memory/2308-61-0x0000000000400000-0x0000000000428000-memory.dmp
            Filesize

            160KB

          • memory/2308-63-0x0000000000400000-0x0000000000428000-memory.dmp
            Filesize

            160KB

          • memory/2308-67-0x00000000FFFDE000-0x00000000FFFDF000-memory.dmp
            Filesize

            4KB

          • memory/2308-66-0x0000000000400000-0x0000000000428000-memory.dmp
            Filesize

            160KB

          • memory/2308-65-0x0000000000400000-0x0000000000428000-memory.dmp
            Filesize

            160KB

          • memory/2308-64-0x0000000000400000-0x0000000000428000-memory.dmp
            Filesize

            160KB

          • memory/2308-68-0x0000000000400000-0x0000000000428000-memory.dmp
            Filesize

            160KB

          • memory/2308-70-0x0000000000400000-0x0000000000428000-memory.dmp
            Filesize

            160KB

          • memory/2308-72-0x0000000000400000-0x0000000000428000-memory.dmp
            Filesize

            160KB

          • memory/2496-51-0x000007FEF5750000-0x000007FEF613C000-memory.dmp
            Filesize

            9.9MB

          • memory/2496-50-0x000007FEF5750000-0x000007FEF613C000-memory.dmp
            Filesize

            9.9MB

          • memory/2496-49-0x000007FEF5750000-0x000007FEF613C000-memory.dmp
            Filesize

            9.9MB

          • memory/2496-48-0x0000000000FE0000-0x0000000000FEA000-memory.dmp
            Filesize

            40KB