Analysis

  • max time kernel
    122s
  • max time network
    135s
  • platform
    windows7_x64
  • resource
    win7-20230831-en
  • resource tags

    arch:x64arch:x86image:win7-20230831-enlocale:en-usos:windows7-x64system
  • submitted
    01-10-2023 19:52

General

  • Target

    4d348c7e2b2006371efe5562a2747bb055441232d17de88803d0a600c106eb9b_JC.exe

  • Size

    1.0MB

  • MD5

    2570641ce0a480459b56a4dd46697358

  • SHA1

    e83a8ff70f0879636aa364a53cae0d27ec482005

  • SHA256

    4d348c7e2b2006371efe5562a2747bb055441232d17de88803d0a600c106eb9b

  • SHA512

    28e16069f5baff0b89f5074c088ef839f20fef02cbb9e94f81b37588b32f448e0225083335700cc63024ea6ce3fb269c41c899bf450de629c6db7805564a998d

  • SSDEEP

    24576:gy5TGXlCznMRxKII4Blc74rROLGGDDHzA8EbOY:nNnr4Blc7oRAfDY8Eb

Malware Config

Signatures

  • Detects Healer an antivirus disabler dropper 4 IoCs
  • Healer

    Healer an antivirus disabler dropper.

  • Modifies Windows Defender Real-time Protection settings 3 TTPs 6 IoCs
  • Executes dropped EXE 6 IoCs
  • Loads dropped DLL 16 IoCs
  • Windows security modification 2 TTPs 2 IoCs
  • Adds Run key to start application 2 TTPs 5 IoCs
  • Suspicious use of SetThreadContext 1 IoCs
  • Program crash 2 IoCs
  • Suspicious behavior: EnumeratesProcesses 2 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\4d348c7e2b2006371efe5562a2747bb055441232d17de88803d0a600c106eb9b_JC.exe
    "C:\Users\Admin\AppData\Local\Temp\4d348c7e2b2006371efe5562a2747bb055441232d17de88803d0a600c106eb9b_JC.exe"
    1⤵
    • Loads dropped DLL
    • Adds Run key to start application
    • Suspicious use of WriteProcessMemory
    PID:3012
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\z4358130.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\z4358130.exe
      2⤵
      • Executes dropped EXE
      • Loads dropped DLL
      • Adds Run key to start application
      • Suspicious use of WriteProcessMemory
      PID:2872
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\z6981061.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\z6981061.exe
        3⤵
        • Executes dropped EXE
        • Loads dropped DLL
        • Adds Run key to start application
        • Suspicious use of WriteProcessMemory
        PID:2160
        • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\z8569234.exe
          C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\z8569234.exe
          4⤵
          • Executes dropped EXE
          • Loads dropped DLL
          • Adds Run key to start application
          • Suspicious use of WriteProcessMemory
          PID:1332
          • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\z0912836.exe
            C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\z0912836.exe
            5⤵
            • Executes dropped EXE
            • Loads dropped DLL
            • Adds Run key to start application
            • Suspicious use of WriteProcessMemory
            PID:2724
            • C:\Users\Admin\AppData\Local\Temp\IXP004.TMP\q2216565.exe
              C:\Users\Admin\AppData\Local\Temp\IXP004.TMP\q2216565.exe
              6⤵
              • Modifies Windows Defender Real-time Protection settings
              • Executes dropped EXE
              • Windows security modification
              • Suspicious behavior: EnumeratesProcesses
              • Suspicious use of AdjustPrivilegeToken
              PID:2884
            • C:\Users\Admin\AppData\Local\Temp\IXP004.TMP\r0169756.exe
              C:\Users\Admin\AppData\Local\Temp\IXP004.TMP\r0169756.exe
              6⤵
              • Executes dropped EXE
              • Loads dropped DLL
              • Suspicious use of SetThreadContext
              • Suspicious use of WriteProcessMemory
              PID:2756
              • C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe
                "C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"
                7⤵
                • Suspicious use of WriteProcessMemory
                PID:2548
                • C:\Windows\SysWOW64\WerFault.exe
                  C:\Windows\SysWOW64\WerFault.exe -u -p 2548 -s 268
                  8⤵
                  • Program crash
                  PID:2616
              • C:\Windows\SysWOW64\WerFault.exe
                C:\Windows\SysWOW64\WerFault.exe -u -p 2756 -s 276
                7⤵
                • Loads dropped DLL
                • Program crash
                PID:2516

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\z4358130.exe
    Filesize

    971KB

    MD5

    f4bde4bfc795f20478c5acf9bc552d19

    SHA1

    4ee9da0f957d15fb7f29aee606072d76b5fc4a11

    SHA256

    006f34cbdbfc1c7f2307bc7eba241e94b082c409b62e8b35266b71854a041c4a

    SHA512

    b65f1037e35e6a037228d0e49146a1d5f04bb86b5c88e92e228eb112890a3603ae3690a219462f1c29ac027bd634be7a2620e7a9ef187b97974ff05dddf843e8

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\z4358130.exe
    Filesize

    971KB

    MD5

    f4bde4bfc795f20478c5acf9bc552d19

    SHA1

    4ee9da0f957d15fb7f29aee606072d76b5fc4a11

    SHA256

    006f34cbdbfc1c7f2307bc7eba241e94b082c409b62e8b35266b71854a041c4a

    SHA512

    b65f1037e35e6a037228d0e49146a1d5f04bb86b5c88e92e228eb112890a3603ae3690a219462f1c29ac027bd634be7a2620e7a9ef187b97974ff05dddf843e8

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\z6981061.exe
    Filesize

    788KB

    MD5

    78c8df373b7d881994b2ca00c9a6629f

    SHA1

    a7ab7efacc388ac8826e2c412a721dbaedf1ffa7

    SHA256

    47ecfc7473c88b64bea0f835fc28fd31764ef463324087c247a380672599837f

    SHA512

    95b6a5bc54abd7c0bff5b550c85d9e1a036970ebaf0d196d7c0f03de815badd88217b53d297ac896d62fcd99e2b2d2c808f9f010ec8936dcebed6b50fc9447e1

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\z6981061.exe
    Filesize

    788KB

    MD5

    78c8df373b7d881994b2ca00c9a6629f

    SHA1

    a7ab7efacc388ac8826e2c412a721dbaedf1ffa7

    SHA256

    47ecfc7473c88b64bea0f835fc28fd31764ef463324087c247a380672599837f

    SHA512

    95b6a5bc54abd7c0bff5b550c85d9e1a036970ebaf0d196d7c0f03de815badd88217b53d297ac896d62fcd99e2b2d2c808f9f010ec8936dcebed6b50fc9447e1

  • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\z8569234.exe
    Filesize

    606KB

    MD5

    dbd0ca1c52ccee106017732f93be2a5f

    SHA1

    5d92fd083c694cdad46d09ea8d3fc6195e8a0db5

    SHA256

    3e50a61dc7c69a3f7208eccf0590501052dc5bd6daaa62cd554b341a8abb709b

    SHA512

    6815bc5a22828b637c03e42024772355aba581edb772a31ca71a8fefe8d361071089d5d36bbe704d8c72442027db099c5f2a78e7b59699af991a1a49920092a2

  • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\z8569234.exe
    Filesize

    606KB

    MD5

    dbd0ca1c52ccee106017732f93be2a5f

    SHA1

    5d92fd083c694cdad46d09ea8d3fc6195e8a0db5

    SHA256

    3e50a61dc7c69a3f7208eccf0590501052dc5bd6daaa62cd554b341a8abb709b

    SHA512

    6815bc5a22828b637c03e42024772355aba581edb772a31ca71a8fefe8d361071089d5d36bbe704d8c72442027db099c5f2a78e7b59699af991a1a49920092a2

  • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\z0912836.exe
    Filesize

    335KB

    MD5

    e4cd3e9229b4eb608383a6ed841c3f18

    SHA1

    b3f81ff90ceb7ad6a2ecd3165523da5b9d60ffd1

    SHA256

    fe5598ca99a4c1e03179d1d71603dfd9561fc2ecf19c69131f088a476bc46ee9

    SHA512

    a5a63feb718349661a1e398090fa323368f47182b8edcc292d6720368aeed024a5ee4a1bfb1273b7fb5eb20e189202a9ecb78128c28e35cf8df8a985a3bc2616

  • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\z0912836.exe
    Filesize

    335KB

    MD5

    e4cd3e9229b4eb608383a6ed841c3f18

    SHA1

    b3f81ff90ceb7ad6a2ecd3165523da5b9d60ffd1

    SHA256

    fe5598ca99a4c1e03179d1d71603dfd9561fc2ecf19c69131f088a476bc46ee9

    SHA512

    a5a63feb718349661a1e398090fa323368f47182b8edcc292d6720368aeed024a5ee4a1bfb1273b7fb5eb20e189202a9ecb78128c28e35cf8df8a985a3bc2616

  • C:\Users\Admin\AppData\Local\Temp\IXP004.TMP\q2216565.exe
    Filesize

    11KB

    MD5

    3ec76a3d19df8632a63ccc13f3336d11

    SHA1

    4e9eec55105c03a1547e244b57ffdc3faf58f9a3

    SHA256

    a65c567b9e45a78f24d68e01d34605e5d35c0ce6ccc80b62b44d038fb0b55fe2

    SHA512

    c5d6f2fdadbb2db3c864304f7b7d1d4dec3f7c2cd4c7b2d9aa665376ca88972ce98558104aece1eb72c3797befe67911e9f08c1e344bd584b871385507498b71

  • C:\Users\Admin\AppData\Local\Temp\IXP004.TMP\q2216565.exe
    Filesize

    11KB

    MD5

    3ec76a3d19df8632a63ccc13f3336d11

    SHA1

    4e9eec55105c03a1547e244b57ffdc3faf58f9a3

    SHA256

    a65c567b9e45a78f24d68e01d34605e5d35c0ce6ccc80b62b44d038fb0b55fe2

    SHA512

    c5d6f2fdadbb2db3c864304f7b7d1d4dec3f7c2cd4c7b2d9aa665376ca88972ce98558104aece1eb72c3797befe67911e9f08c1e344bd584b871385507498b71

  • C:\Users\Admin\AppData\Local\Temp\IXP004.TMP\r0169756.exe
    Filesize

    356KB

    MD5

    4b34bc973188a00276734c28e118d395

    SHA1

    9cb61a5f2d592fbdaf5decb6abc93b315ac3aab6

    SHA256

    0cf3d6c685db2a91da9d50ff149dda565a5250a2e6f43add8cf59c8bd0759fc6

    SHA512

    c55b70e0f8f5f2801e1f67e2c969550f7e5f31b59fa7baa9eeb9702de89a1784eae2b84b00c8b287fbafcd5bc2acdcfd805e4a71f44b357b373204d7dbf1195c

  • C:\Users\Admin\AppData\Local\Temp\IXP004.TMP\r0169756.exe
    Filesize

    356KB

    MD5

    4b34bc973188a00276734c28e118d395

    SHA1

    9cb61a5f2d592fbdaf5decb6abc93b315ac3aab6

    SHA256

    0cf3d6c685db2a91da9d50ff149dda565a5250a2e6f43add8cf59c8bd0759fc6

    SHA512

    c55b70e0f8f5f2801e1f67e2c969550f7e5f31b59fa7baa9eeb9702de89a1784eae2b84b00c8b287fbafcd5bc2acdcfd805e4a71f44b357b373204d7dbf1195c

  • C:\Users\Admin\AppData\Local\Temp\IXP004.TMP\r0169756.exe
    Filesize

    356KB

    MD5

    4b34bc973188a00276734c28e118d395

    SHA1

    9cb61a5f2d592fbdaf5decb6abc93b315ac3aab6

    SHA256

    0cf3d6c685db2a91da9d50ff149dda565a5250a2e6f43add8cf59c8bd0759fc6

    SHA512

    c55b70e0f8f5f2801e1f67e2c969550f7e5f31b59fa7baa9eeb9702de89a1784eae2b84b00c8b287fbafcd5bc2acdcfd805e4a71f44b357b373204d7dbf1195c

  • \Users\Admin\AppData\Local\Temp\IXP000.TMP\z4358130.exe
    Filesize

    971KB

    MD5

    f4bde4bfc795f20478c5acf9bc552d19

    SHA1

    4ee9da0f957d15fb7f29aee606072d76b5fc4a11

    SHA256

    006f34cbdbfc1c7f2307bc7eba241e94b082c409b62e8b35266b71854a041c4a

    SHA512

    b65f1037e35e6a037228d0e49146a1d5f04bb86b5c88e92e228eb112890a3603ae3690a219462f1c29ac027bd634be7a2620e7a9ef187b97974ff05dddf843e8

  • \Users\Admin\AppData\Local\Temp\IXP000.TMP\z4358130.exe
    Filesize

    971KB

    MD5

    f4bde4bfc795f20478c5acf9bc552d19

    SHA1

    4ee9da0f957d15fb7f29aee606072d76b5fc4a11

    SHA256

    006f34cbdbfc1c7f2307bc7eba241e94b082c409b62e8b35266b71854a041c4a

    SHA512

    b65f1037e35e6a037228d0e49146a1d5f04bb86b5c88e92e228eb112890a3603ae3690a219462f1c29ac027bd634be7a2620e7a9ef187b97974ff05dddf843e8

  • \Users\Admin\AppData\Local\Temp\IXP001.TMP\z6981061.exe
    Filesize

    788KB

    MD5

    78c8df373b7d881994b2ca00c9a6629f

    SHA1

    a7ab7efacc388ac8826e2c412a721dbaedf1ffa7

    SHA256

    47ecfc7473c88b64bea0f835fc28fd31764ef463324087c247a380672599837f

    SHA512

    95b6a5bc54abd7c0bff5b550c85d9e1a036970ebaf0d196d7c0f03de815badd88217b53d297ac896d62fcd99e2b2d2c808f9f010ec8936dcebed6b50fc9447e1

  • \Users\Admin\AppData\Local\Temp\IXP001.TMP\z6981061.exe
    Filesize

    788KB

    MD5

    78c8df373b7d881994b2ca00c9a6629f

    SHA1

    a7ab7efacc388ac8826e2c412a721dbaedf1ffa7

    SHA256

    47ecfc7473c88b64bea0f835fc28fd31764ef463324087c247a380672599837f

    SHA512

    95b6a5bc54abd7c0bff5b550c85d9e1a036970ebaf0d196d7c0f03de815badd88217b53d297ac896d62fcd99e2b2d2c808f9f010ec8936dcebed6b50fc9447e1

  • \Users\Admin\AppData\Local\Temp\IXP002.TMP\z8569234.exe
    Filesize

    606KB

    MD5

    dbd0ca1c52ccee106017732f93be2a5f

    SHA1

    5d92fd083c694cdad46d09ea8d3fc6195e8a0db5

    SHA256

    3e50a61dc7c69a3f7208eccf0590501052dc5bd6daaa62cd554b341a8abb709b

    SHA512

    6815bc5a22828b637c03e42024772355aba581edb772a31ca71a8fefe8d361071089d5d36bbe704d8c72442027db099c5f2a78e7b59699af991a1a49920092a2

  • \Users\Admin\AppData\Local\Temp\IXP002.TMP\z8569234.exe
    Filesize

    606KB

    MD5

    dbd0ca1c52ccee106017732f93be2a5f

    SHA1

    5d92fd083c694cdad46d09ea8d3fc6195e8a0db5

    SHA256

    3e50a61dc7c69a3f7208eccf0590501052dc5bd6daaa62cd554b341a8abb709b

    SHA512

    6815bc5a22828b637c03e42024772355aba581edb772a31ca71a8fefe8d361071089d5d36bbe704d8c72442027db099c5f2a78e7b59699af991a1a49920092a2

  • \Users\Admin\AppData\Local\Temp\IXP003.TMP\z0912836.exe
    Filesize

    335KB

    MD5

    e4cd3e9229b4eb608383a6ed841c3f18

    SHA1

    b3f81ff90ceb7ad6a2ecd3165523da5b9d60ffd1

    SHA256

    fe5598ca99a4c1e03179d1d71603dfd9561fc2ecf19c69131f088a476bc46ee9

    SHA512

    a5a63feb718349661a1e398090fa323368f47182b8edcc292d6720368aeed024a5ee4a1bfb1273b7fb5eb20e189202a9ecb78128c28e35cf8df8a985a3bc2616

  • \Users\Admin\AppData\Local\Temp\IXP003.TMP\z0912836.exe
    Filesize

    335KB

    MD5

    e4cd3e9229b4eb608383a6ed841c3f18

    SHA1

    b3f81ff90ceb7ad6a2ecd3165523da5b9d60ffd1

    SHA256

    fe5598ca99a4c1e03179d1d71603dfd9561fc2ecf19c69131f088a476bc46ee9

    SHA512

    a5a63feb718349661a1e398090fa323368f47182b8edcc292d6720368aeed024a5ee4a1bfb1273b7fb5eb20e189202a9ecb78128c28e35cf8df8a985a3bc2616

  • \Users\Admin\AppData\Local\Temp\IXP004.TMP\q2216565.exe
    Filesize

    11KB

    MD5

    3ec76a3d19df8632a63ccc13f3336d11

    SHA1

    4e9eec55105c03a1547e244b57ffdc3faf58f9a3

    SHA256

    a65c567b9e45a78f24d68e01d34605e5d35c0ce6ccc80b62b44d038fb0b55fe2

    SHA512

    c5d6f2fdadbb2db3c864304f7b7d1d4dec3f7c2cd4c7b2d9aa665376ca88972ce98558104aece1eb72c3797befe67911e9f08c1e344bd584b871385507498b71

  • \Users\Admin\AppData\Local\Temp\IXP004.TMP\r0169756.exe
    Filesize

    356KB

    MD5

    4b34bc973188a00276734c28e118d395

    SHA1

    9cb61a5f2d592fbdaf5decb6abc93b315ac3aab6

    SHA256

    0cf3d6c685db2a91da9d50ff149dda565a5250a2e6f43add8cf59c8bd0759fc6

    SHA512

    c55b70e0f8f5f2801e1f67e2c969550f7e5f31b59fa7baa9eeb9702de89a1784eae2b84b00c8b287fbafcd5bc2acdcfd805e4a71f44b357b373204d7dbf1195c

  • \Users\Admin\AppData\Local\Temp\IXP004.TMP\r0169756.exe
    Filesize

    356KB

    MD5

    4b34bc973188a00276734c28e118d395

    SHA1

    9cb61a5f2d592fbdaf5decb6abc93b315ac3aab6

    SHA256

    0cf3d6c685db2a91da9d50ff149dda565a5250a2e6f43add8cf59c8bd0759fc6

    SHA512

    c55b70e0f8f5f2801e1f67e2c969550f7e5f31b59fa7baa9eeb9702de89a1784eae2b84b00c8b287fbafcd5bc2acdcfd805e4a71f44b357b373204d7dbf1195c

  • \Users\Admin\AppData\Local\Temp\IXP004.TMP\r0169756.exe
    Filesize

    356KB

    MD5

    4b34bc973188a00276734c28e118d395

    SHA1

    9cb61a5f2d592fbdaf5decb6abc93b315ac3aab6

    SHA256

    0cf3d6c685db2a91da9d50ff149dda565a5250a2e6f43add8cf59c8bd0759fc6

    SHA512

    c55b70e0f8f5f2801e1f67e2c969550f7e5f31b59fa7baa9eeb9702de89a1784eae2b84b00c8b287fbafcd5bc2acdcfd805e4a71f44b357b373204d7dbf1195c

  • \Users\Admin\AppData\Local\Temp\IXP004.TMP\r0169756.exe
    Filesize

    356KB

    MD5

    4b34bc973188a00276734c28e118d395

    SHA1

    9cb61a5f2d592fbdaf5decb6abc93b315ac3aab6

    SHA256

    0cf3d6c685db2a91da9d50ff149dda565a5250a2e6f43add8cf59c8bd0759fc6

    SHA512

    c55b70e0f8f5f2801e1f67e2c969550f7e5f31b59fa7baa9eeb9702de89a1784eae2b84b00c8b287fbafcd5bc2acdcfd805e4a71f44b357b373204d7dbf1195c

  • \Users\Admin\AppData\Local\Temp\IXP004.TMP\r0169756.exe
    Filesize

    356KB

    MD5

    4b34bc973188a00276734c28e118d395

    SHA1

    9cb61a5f2d592fbdaf5decb6abc93b315ac3aab6

    SHA256

    0cf3d6c685db2a91da9d50ff149dda565a5250a2e6f43add8cf59c8bd0759fc6

    SHA512

    c55b70e0f8f5f2801e1f67e2c969550f7e5f31b59fa7baa9eeb9702de89a1784eae2b84b00c8b287fbafcd5bc2acdcfd805e4a71f44b357b373204d7dbf1195c

  • \Users\Admin\AppData\Local\Temp\IXP004.TMP\r0169756.exe
    Filesize

    356KB

    MD5

    4b34bc973188a00276734c28e118d395

    SHA1

    9cb61a5f2d592fbdaf5decb6abc93b315ac3aab6

    SHA256

    0cf3d6c685db2a91da9d50ff149dda565a5250a2e6f43add8cf59c8bd0759fc6

    SHA512

    c55b70e0f8f5f2801e1f67e2c969550f7e5f31b59fa7baa9eeb9702de89a1784eae2b84b00c8b287fbafcd5bc2acdcfd805e4a71f44b357b373204d7dbf1195c

  • \Users\Admin\AppData\Local\Temp\IXP004.TMP\r0169756.exe
    Filesize

    356KB

    MD5

    4b34bc973188a00276734c28e118d395

    SHA1

    9cb61a5f2d592fbdaf5decb6abc93b315ac3aab6

    SHA256

    0cf3d6c685db2a91da9d50ff149dda565a5250a2e6f43add8cf59c8bd0759fc6

    SHA512

    c55b70e0f8f5f2801e1f67e2c969550f7e5f31b59fa7baa9eeb9702de89a1784eae2b84b00c8b287fbafcd5bc2acdcfd805e4a71f44b357b373204d7dbf1195c

  • memory/2548-66-0x0000000000400000-0x0000000000428000-memory.dmp
    Filesize

    160KB

  • memory/2548-62-0x0000000000400000-0x0000000000428000-memory.dmp
    Filesize

    160KB

  • memory/2548-67-0x00000000FFFDE000-0x00000000FFFDF000-memory.dmp
    Filesize

    4KB

  • memory/2548-68-0x0000000000400000-0x0000000000428000-memory.dmp
    Filesize

    160KB

  • memory/2548-65-0x0000000000400000-0x0000000000428000-memory.dmp
    Filesize

    160KB

  • memory/2548-64-0x0000000000400000-0x0000000000428000-memory.dmp
    Filesize

    160KB

  • memory/2548-63-0x0000000000400000-0x0000000000428000-memory.dmp
    Filesize

    160KB

  • memory/2548-61-0x0000000000400000-0x0000000000428000-memory.dmp
    Filesize

    160KB

  • memory/2548-70-0x0000000000400000-0x0000000000428000-memory.dmp
    Filesize

    160KB

  • memory/2548-72-0x0000000000400000-0x0000000000428000-memory.dmp
    Filesize

    160KB

  • memory/2884-51-0x000007FEF5C80000-0x000007FEF666C000-memory.dmp
    Filesize

    9.9MB

  • memory/2884-50-0x000007FEF5C80000-0x000007FEF666C000-memory.dmp
    Filesize

    9.9MB

  • memory/2884-49-0x000007FEF5C80000-0x000007FEF666C000-memory.dmp
    Filesize

    9.9MB

  • memory/2884-48-0x00000000010E0000-0x00000000010EA000-memory.dmp
    Filesize

    40KB