Analysis

  • max time kernel
    119s
  • max time network
    122s
  • platform
    windows7_x64
  • resource
    win7-20230831-en
  • resource tags

    arch:x64arch:x86image:win7-20230831-enlocale:en-usos:windows7-x64system
  • submitted
    01-10-2023 20:09

General

  • Target

    6bf243e75ee6f0daf90f66fadd0aa7c74358e2700c00543f82f64c5a4a998085_JC.exe

  • Size

    1.0MB

  • MD5

    7712234da225ca90f4aa3a90808aa13b

  • SHA1

    86d3b4173a480355e56a8ce0a34e332544ea30b6

  • SHA256

    6bf243e75ee6f0daf90f66fadd0aa7c74358e2700c00543f82f64c5a4a998085

  • SHA512

    28e65fb1f73823d8d28f05d6ff0a5739ecb08e3e1484c064ccf243f4e84f8cfa07c7eb03ff04652ef50ba30c27af6cf678d26bf2420d809534debee15fa3aa53

  • SSDEEP

    24576:wy2/CdnVV74P0zCHwQLy1Ly7cErBJ9HeulN69:3Ndrg7sy7hthN

Malware Config

Signatures

  • Detects Healer an antivirus disabler dropper 4 IoCs
  • Healer

    Healer an antivirus disabler dropper.

  • Modifies Windows Defender Real-time Protection settings 3 TTPs 6 IoCs
  • Executes dropped EXE 6 IoCs
  • Loads dropped DLL 16 IoCs
  • Windows security modification 2 TTPs 2 IoCs
  • Adds Run key to start application 2 TTPs 5 IoCs
  • Suspicious use of SetThreadContext 1 IoCs
  • Program crash 2 IoCs
  • Suspicious behavior: EnumeratesProcesses 2 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\6bf243e75ee6f0daf90f66fadd0aa7c74358e2700c00543f82f64c5a4a998085_JC.exe
    "C:\Users\Admin\AppData\Local\Temp\6bf243e75ee6f0daf90f66fadd0aa7c74358e2700c00543f82f64c5a4a998085_JC.exe"
    1⤵
    • Loads dropped DLL
    • Adds Run key to start application
    • Suspicious use of WriteProcessMemory
    PID:2032
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\z6987964.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\z6987964.exe
      2⤵
      • Executes dropped EXE
      • Loads dropped DLL
      • Adds Run key to start application
      • Suspicious use of WriteProcessMemory
      PID:2848
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\z7780597.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\z7780597.exe
        3⤵
        • Executes dropped EXE
        • Loads dropped DLL
        • Adds Run key to start application
        • Suspicious use of WriteProcessMemory
        PID:1452
        • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\z0149140.exe
          C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\z0149140.exe
          4⤵
          • Executes dropped EXE
          • Loads dropped DLL
          • Adds Run key to start application
          • Suspicious use of WriteProcessMemory
          PID:2840
          • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\z5120150.exe
            C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\z5120150.exe
            5⤵
            • Executes dropped EXE
            • Loads dropped DLL
            • Adds Run key to start application
            • Suspicious use of WriteProcessMemory
            PID:2628
            • C:\Users\Admin\AppData\Local\Temp\IXP004.TMP\q8900311.exe
              C:\Users\Admin\AppData\Local\Temp\IXP004.TMP\q8900311.exe
              6⤵
              • Modifies Windows Defender Real-time Protection settings
              • Executes dropped EXE
              • Windows security modification
              • Suspicious behavior: EnumeratesProcesses
              • Suspicious use of AdjustPrivilegeToken
              PID:2808
            • C:\Users\Admin\AppData\Local\Temp\IXP004.TMP\r4974470.exe
              C:\Users\Admin\AppData\Local\Temp\IXP004.TMP\r4974470.exe
              6⤵
              • Executes dropped EXE
              • Loads dropped DLL
              • Suspicious use of SetThreadContext
              • Suspicious use of WriteProcessMemory
              PID:2548
              • C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe
                "C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"
                7⤵
                  PID:2212
                • C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe
                  "C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"
                  7⤵
                  • Suspicious use of WriteProcessMemory
                  PID:3016
                  • C:\Windows\SysWOW64\WerFault.exe
                    C:\Windows\SysWOW64\WerFault.exe -u -p 3016 -s 268
                    8⤵
                    • Program crash
                    PID:1956
                • C:\Windows\SysWOW64\WerFault.exe
                  C:\Windows\SysWOW64\WerFault.exe -u -p 2548 -s 284
                  7⤵
                  • Loads dropped DLL
                  • Program crash
                  PID:1764

    Network

    MITRE ATT&CK Enterprise v15

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\z6987964.exe

      Filesize

      972KB

      MD5

      dd6ccc45e8d640e1fcda163fd52c4415

      SHA1

      77461e72b1a4f9d0f1ebb009022fa723767f69c3

      SHA256

      dcfd9d948b37c0098078d0ff67877abf7791ad9b9d085600330dc343de5ff85b

      SHA512

      f1c42e3a642d819a3563c6c3370a76fd66dfc45f23fc972a3cf44079a32bd68f45a3cc6f17de2bc35061e76b9ed4f07de5b2d9ea67081d23bc984d6540754043

    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\z6987964.exe

      Filesize

      972KB

      MD5

      dd6ccc45e8d640e1fcda163fd52c4415

      SHA1

      77461e72b1a4f9d0f1ebb009022fa723767f69c3

      SHA256

      dcfd9d948b37c0098078d0ff67877abf7791ad9b9d085600330dc343de5ff85b

      SHA512

      f1c42e3a642d819a3563c6c3370a76fd66dfc45f23fc972a3cf44079a32bd68f45a3cc6f17de2bc35061e76b9ed4f07de5b2d9ea67081d23bc984d6540754043

    • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\z7780597.exe

      Filesize

      789KB

      MD5

      eb1da66924265a2f311c306eb20a000a

      SHA1

      af29a29fba3f92243b32dade5f7248fe462c9a79

      SHA256

      c4eee406681fdf1bb3bed6b26fc5136621c942669c81aaa857b9df42f21f5931

      SHA512

      8a2e2e4fd5f89b64b2b685129d17ff2e252ce9cb14d75fa34e6ca05f0954cee813689f49eb0c44a56e9dbb95f6b567d5d8ab2f4b6713c1a8de8f6b7f3258ed3e

    • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\z7780597.exe

      Filesize

      789KB

      MD5

      eb1da66924265a2f311c306eb20a000a

      SHA1

      af29a29fba3f92243b32dade5f7248fe462c9a79

      SHA256

      c4eee406681fdf1bb3bed6b26fc5136621c942669c81aaa857b9df42f21f5931

      SHA512

      8a2e2e4fd5f89b64b2b685129d17ff2e252ce9cb14d75fa34e6ca05f0954cee813689f49eb0c44a56e9dbb95f6b567d5d8ab2f4b6713c1a8de8f6b7f3258ed3e

    • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\z0149140.exe

      Filesize

      606KB

      MD5

      2bf2e4de501c3bfcacea752ddd5b0ba8

      SHA1

      99ff45b18050d11f8d9eb9574e2ec54ce787192e

      SHA256

      1c0f2d519c3c7562bc3ef50fa0ff3a86b5698079399e06ca61e7c82efe74366c

      SHA512

      e6a7824f842be58c774d8a54ea9b47d3ede8856aa0d5f8a1fbbd908d8cb485aae0a9c8f01e312b3e8f183ec3fd8d44c33366a0b26933dfc398b1b2d387605418

    • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\z0149140.exe

      Filesize

      606KB

      MD5

      2bf2e4de501c3bfcacea752ddd5b0ba8

      SHA1

      99ff45b18050d11f8d9eb9574e2ec54ce787192e

      SHA256

      1c0f2d519c3c7562bc3ef50fa0ff3a86b5698079399e06ca61e7c82efe74366c

      SHA512

      e6a7824f842be58c774d8a54ea9b47d3ede8856aa0d5f8a1fbbd908d8cb485aae0a9c8f01e312b3e8f183ec3fd8d44c33366a0b26933dfc398b1b2d387605418

    • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\z5120150.exe

      Filesize

      335KB

      MD5

      d33fc30e70b003633ede3ca453e451d0

      SHA1

      f8cf97228b3630014cf2eb6e4998b79579c996ec

      SHA256

      91c1950126f14859a864232d4aa3c17072699477d3aa945db7825c9cd39a3ed8

      SHA512

      4e2146341c985aad932185b25e489e11c2a50ae52cdfa3d9e3f410f0c7d7ae071478bbc0d01b342ca92ce9c46a134476df8eaad6778f582efe43febd70278728

    • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\z5120150.exe

      Filesize

      335KB

      MD5

      d33fc30e70b003633ede3ca453e451d0

      SHA1

      f8cf97228b3630014cf2eb6e4998b79579c996ec

      SHA256

      91c1950126f14859a864232d4aa3c17072699477d3aa945db7825c9cd39a3ed8

      SHA512

      4e2146341c985aad932185b25e489e11c2a50ae52cdfa3d9e3f410f0c7d7ae071478bbc0d01b342ca92ce9c46a134476df8eaad6778f582efe43febd70278728

    • C:\Users\Admin\AppData\Local\Temp\IXP004.TMP\q8900311.exe

      Filesize

      11KB

      MD5

      05f049502dc5ee07a883d0daad0dacc1

      SHA1

      f1cda329ad3748539f131e452c5822f02fc23abb

      SHA256

      a03257ef46bb82c6d8b36de4277c37baecd90120cfbe94b1c9b5bc3ae98248ba

      SHA512

      a7c5c4ca777cefbcbb95d1b8299a64ae3de7ef4bdca9357426ad9433ab01f6850634e6b2e61471153c079cbf5ce5e55a356efb6223d9d7b2306c5af1542c2402

    • C:\Users\Admin\AppData\Local\Temp\IXP004.TMP\q8900311.exe

      Filesize

      11KB

      MD5

      05f049502dc5ee07a883d0daad0dacc1

      SHA1

      f1cda329ad3748539f131e452c5822f02fc23abb

      SHA256

      a03257ef46bb82c6d8b36de4277c37baecd90120cfbe94b1c9b5bc3ae98248ba

      SHA512

      a7c5c4ca777cefbcbb95d1b8299a64ae3de7ef4bdca9357426ad9433ab01f6850634e6b2e61471153c079cbf5ce5e55a356efb6223d9d7b2306c5af1542c2402

    • C:\Users\Admin\AppData\Local\Temp\IXP004.TMP\r4974470.exe

      Filesize

      356KB

      MD5

      88e51dff007b07fb7797619c3dce8769

      SHA1

      fcaa71ff123f7e8af810e20f7a30bf47c32d61b7

      SHA256

      aed9e8f24831aadd8e5da9b6249096f0bd5e8468f9b791e752ffa95f9d8d2837

      SHA512

      698745eab58180717b0bc0c474c48807d3c03333ee2fd03a96d2a9a854b55a5e69a3c97f190badbdd679cbb6129d8d60ed6ff84ad6c262fb437530947f4cc3d9

    • C:\Users\Admin\AppData\Local\Temp\IXP004.TMP\r4974470.exe

      Filesize

      356KB

      MD5

      88e51dff007b07fb7797619c3dce8769

      SHA1

      fcaa71ff123f7e8af810e20f7a30bf47c32d61b7

      SHA256

      aed9e8f24831aadd8e5da9b6249096f0bd5e8468f9b791e752ffa95f9d8d2837

      SHA512

      698745eab58180717b0bc0c474c48807d3c03333ee2fd03a96d2a9a854b55a5e69a3c97f190badbdd679cbb6129d8d60ed6ff84ad6c262fb437530947f4cc3d9

    • C:\Users\Admin\AppData\Local\Temp\IXP004.TMP\r4974470.exe

      Filesize

      356KB

      MD5

      88e51dff007b07fb7797619c3dce8769

      SHA1

      fcaa71ff123f7e8af810e20f7a30bf47c32d61b7

      SHA256

      aed9e8f24831aadd8e5da9b6249096f0bd5e8468f9b791e752ffa95f9d8d2837

      SHA512

      698745eab58180717b0bc0c474c48807d3c03333ee2fd03a96d2a9a854b55a5e69a3c97f190badbdd679cbb6129d8d60ed6ff84ad6c262fb437530947f4cc3d9

    • \Users\Admin\AppData\Local\Temp\IXP000.TMP\z6987964.exe

      Filesize

      972KB

      MD5

      dd6ccc45e8d640e1fcda163fd52c4415

      SHA1

      77461e72b1a4f9d0f1ebb009022fa723767f69c3

      SHA256

      dcfd9d948b37c0098078d0ff67877abf7791ad9b9d085600330dc343de5ff85b

      SHA512

      f1c42e3a642d819a3563c6c3370a76fd66dfc45f23fc972a3cf44079a32bd68f45a3cc6f17de2bc35061e76b9ed4f07de5b2d9ea67081d23bc984d6540754043

    • \Users\Admin\AppData\Local\Temp\IXP000.TMP\z6987964.exe

      Filesize

      972KB

      MD5

      dd6ccc45e8d640e1fcda163fd52c4415

      SHA1

      77461e72b1a4f9d0f1ebb009022fa723767f69c3

      SHA256

      dcfd9d948b37c0098078d0ff67877abf7791ad9b9d085600330dc343de5ff85b

      SHA512

      f1c42e3a642d819a3563c6c3370a76fd66dfc45f23fc972a3cf44079a32bd68f45a3cc6f17de2bc35061e76b9ed4f07de5b2d9ea67081d23bc984d6540754043

    • \Users\Admin\AppData\Local\Temp\IXP001.TMP\z7780597.exe

      Filesize

      789KB

      MD5

      eb1da66924265a2f311c306eb20a000a

      SHA1

      af29a29fba3f92243b32dade5f7248fe462c9a79

      SHA256

      c4eee406681fdf1bb3bed6b26fc5136621c942669c81aaa857b9df42f21f5931

      SHA512

      8a2e2e4fd5f89b64b2b685129d17ff2e252ce9cb14d75fa34e6ca05f0954cee813689f49eb0c44a56e9dbb95f6b567d5d8ab2f4b6713c1a8de8f6b7f3258ed3e

    • \Users\Admin\AppData\Local\Temp\IXP001.TMP\z7780597.exe

      Filesize

      789KB

      MD5

      eb1da66924265a2f311c306eb20a000a

      SHA1

      af29a29fba3f92243b32dade5f7248fe462c9a79

      SHA256

      c4eee406681fdf1bb3bed6b26fc5136621c942669c81aaa857b9df42f21f5931

      SHA512

      8a2e2e4fd5f89b64b2b685129d17ff2e252ce9cb14d75fa34e6ca05f0954cee813689f49eb0c44a56e9dbb95f6b567d5d8ab2f4b6713c1a8de8f6b7f3258ed3e

    • \Users\Admin\AppData\Local\Temp\IXP002.TMP\z0149140.exe

      Filesize

      606KB

      MD5

      2bf2e4de501c3bfcacea752ddd5b0ba8

      SHA1

      99ff45b18050d11f8d9eb9574e2ec54ce787192e

      SHA256

      1c0f2d519c3c7562bc3ef50fa0ff3a86b5698079399e06ca61e7c82efe74366c

      SHA512

      e6a7824f842be58c774d8a54ea9b47d3ede8856aa0d5f8a1fbbd908d8cb485aae0a9c8f01e312b3e8f183ec3fd8d44c33366a0b26933dfc398b1b2d387605418

    • \Users\Admin\AppData\Local\Temp\IXP002.TMP\z0149140.exe

      Filesize

      606KB

      MD5

      2bf2e4de501c3bfcacea752ddd5b0ba8

      SHA1

      99ff45b18050d11f8d9eb9574e2ec54ce787192e

      SHA256

      1c0f2d519c3c7562bc3ef50fa0ff3a86b5698079399e06ca61e7c82efe74366c

      SHA512

      e6a7824f842be58c774d8a54ea9b47d3ede8856aa0d5f8a1fbbd908d8cb485aae0a9c8f01e312b3e8f183ec3fd8d44c33366a0b26933dfc398b1b2d387605418

    • \Users\Admin\AppData\Local\Temp\IXP003.TMP\z5120150.exe

      Filesize

      335KB

      MD5

      d33fc30e70b003633ede3ca453e451d0

      SHA1

      f8cf97228b3630014cf2eb6e4998b79579c996ec

      SHA256

      91c1950126f14859a864232d4aa3c17072699477d3aa945db7825c9cd39a3ed8

      SHA512

      4e2146341c985aad932185b25e489e11c2a50ae52cdfa3d9e3f410f0c7d7ae071478bbc0d01b342ca92ce9c46a134476df8eaad6778f582efe43febd70278728

    • \Users\Admin\AppData\Local\Temp\IXP003.TMP\z5120150.exe

      Filesize

      335KB

      MD5

      d33fc30e70b003633ede3ca453e451d0

      SHA1

      f8cf97228b3630014cf2eb6e4998b79579c996ec

      SHA256

      91c1950126f14859a864232d4aa3c17072699477d3aa945db7825c9cd39a3ed8

      SHA512

      4e2146341c985aad932185b25e489e11c2a50ae52cdfa3d9e3f410f0c7d7ae071478bbc0d01b342ca92ce9c46a134476df8eaad6778f582efe43febd70278728

    • \Users\Admin\AppData\Local\Temp\IXP004.TMP\q8900311.exe

      Filesize

      11KB

      MD5

      05f049502dc5ee07a883d0daad0dacc1

      SHA1

      f1cda329ad3748539f131e452c5822f02fc23abb

      SHA256

      a03257ef46bb82c6d8b36de4277c37baecd90120cfbe94b1c9b5bc3ae98248ba

      SHA512

      a7c5c4ca777cefbcbb95d1b8299a64ae3de7ef4bdca9357426ad9433ab01f6850634e6b2e61471153c079cbf5ce5e55a356efb6223d9d7b2306c5af1542c2402

    • \Users\Admin\AppData\Local\Temp\IXP004.TMP\r4974470.exe

      Filesize

      356KB

      MD5

      88e51dff007b07fb7797619c3dce8769

      SHA1

      fcaa71ff123f7e8af810e20f7a30bf47c32d61b7

      SHA256

      aed9e8f24831aadd8e5da9b6249096f0bd5e8468f9b791e752ffa95f9d8d2837

      SHA512

      698745eab58180717b0bc0c474c48807d3c03333ee2fd03a96d2a9a854b55a5e69a3c97f190badbdd679cbb6129d8d60ed6ff84ad6c262fb437530947f4cc3d9

    • \Users\Admin\AppData\Local\Temp\IXP004.TMP\r4974470.exe

      Filesize

      356KB

      MD5

      88e51dff007b07fb7797619c3dce8769

      SHA1

      fcaa71ff123f7e8af810e20f7a30bf47c32d61b7

      SHA256

      aed9e8f24831aadd8e5da9b6249096f0bd5e8468f9b791e752ffa95f9d8d2837

      SHA512

      698745eab58180717b0bc0c474c48807d3c03333ee2fd03a96d2a9a854b55a5e69a3c97f190badbdd679cbb6129d8d60ed6ff84ad6c262fb437530947f4cc3d9

    • \Users\Admin\AppData\Local\Temp\IXP004.TMP\r4974470.exe

      Filesize

      356KB

      MD5

      88e51dff007b07fb7797619c3dce8769

      SHA1

      fcaa71ff123f7e8af810e20f7a30bf47c32d61b7

      SHA256

      aed9e8f24831aadd8e5da9b6249096f0bd5e8468f9b791e752ffa95f9d8d2837

      SHA512

      698745eab58180717b0bc0c474c48807d3c03333ee2fd03a96d2a9a854b55a5e69a3c97f190badbdd679cbb6129d8d60ed6ff84ad6c262fb437530947f4cc3d9

    • \Users\Admin\AppData\Local\Temp\IXP004.TMP\r4974470.exe

      Filesize

      356KB

      MD5

      88e51dff007b07fb7797619c3dce8769

      SHA1

      fcaa71ff123f7e8af810e20f7a30bf47c32d61b7

      SHA256

      aed9e8f24831aadd8e5da9b6249096f0bd5e8468f9b791e752ffa95f9d8d2837

      SHA512

      698745eab58180717b0bc0c474c48807d3c03333ee2fd03a96d2a9a854b55a5e69a3c97f190badbdd679cbb6129d8d60ed6ff84ad6c262fb437530947f4cc3d9

    • \Users\Admin\AppData\Local\Temp\IXP004.TMP\r4974470.exe

      Filesize

      356KB

      MD5

      88e51dff007b07fb7797619c3dce8769

      SHA1

      fcaa71ff123f7e8af810e20f7a30bf47c32d61b7

      SHA256

      aed9e8f24831aadd8e5da9b6249096f0bd5e8468f9b791e752ffa95f9d8d2837

      SHA512

      698745eab58180717b0bc0c474c48807d3c03333ee2fd03a96d2a9a854b55a5e69a3c97f190badbdd679cbb6129d8d60ed6ff84ad6c262fb437530947f4cc3d9

    • \Users\Admin\AppData\Local\Temp\IXP004.TMP\r4974470.exe

      Filesize

      356KB

      MD5

      88e51dff007b07fb7797619c3dce8769

      SHA1

      fcaa71ff123f7e8af810e20f7a30bf47c32d61b7

      SHA256

      aed9e8f24831aadd8e5da9b6249096f0bd5e8468f9b791e752ffa95f9d8d2837

      SHA512

      698745eab58180717b0bc0c474c48807d3c03333ee2fd03a96d2a9a854b55a5e69a3c97f190badbdd679cbb6129d8d60ed6ff84ad6c262fb437530947f4cc3d9

    • \Users\Admin\AppData\Local\Temp\IXP004.TMP\r4974470.exe

      Filesize

      356KB

      MD5

      88e51dff007b07fb7797619c3dce8769

      SHA1

      fcaa71ff123f7e8af810e20f7a30bf47c32d61b7

      SHA256

      aed9e8f24831aadd8e5da9b6249096f0bd5e8468f9b791e752ffa95f9d8d2837

      SHA512

      698745eab58180717b0bc0c474c48807d3c03333ee2fd03a96d2a9a854b55a5e69a3c97f190badbdd679cbb6129d8d60ed6ff84ad6c262fb437530947f4cc3d9

    • memory/2808-49-0x000007FEF6000000-0x000007FEF69EC000-memory.dmp

      Filesize

      9.9MB

    • memory/2808-51-0x000007FEF6000000-0x000007FEF69EC000-memory.dmp

      Filesize

      9.9MB

    • memory/2808-48-0x0000000000D20000-0x0000000000D2A000-memory.dmp

      Filesize

      40KB

    • memory/2808-50-0x000007FEF6000000-0x000007FEF69EC000-memory.dmp

      Filesize

      9.9MB

    • memory/3016-68-0x0000000000400000-0x0000000000428000-memory.dmp

      Filesize

      160KB

    • memory/3016-66-0x0000000000400000-0x0000000000428000-memory.dmp

      Filesize

      160KB

    • memory/3016-67-0x00000000FFFDE000-0x00000000FFFDF000-memory.dmp

      Filesize

      4KB

    • memory/3016-63-0x0000000000400000-0x0000000000428000-memory.dmp

      Filesize

      160KB

    • memory/3016-70-0x0000000000400000-0x0000000000428000-memory.dmp

      Filesize

      160KB

    • memory/3016-72-0x0000000000400000-0x0000000000428000-memory.dmp

      Filesize

      160KB

    • memory/3016-61-0x0000000000400000-0x0000000000428000-memory.dmp

      Filesize

      160KB

    • memory/3016-65-0x0000000000400000-0x0000000000428000-memory.dmp

      Filesize

      160KB

    • memory/3016-62-0x0000000000400000-0x0000000000428000-memory.dmp

      Filesize

      160KB

    • memory/3016-64-0x0000000000400000-0x0000000000428000-memory.dmp

      Filesize

      160KB