Analysis

  • max time kernel
    119s
  • max time network
    123s
  • platform
    windows7_x64
  • resource
    win7-20230831-en
  • resource tags

    arch:x64arch:x86image:win7-20230831-enlocale:en-usos:windows7-x64system
  • submitted
    01-10-2023 20:38

General

  • Target

    bebf0e0bbd5722c3b9e0e511eabb7e9055a321272b0f90b0bd38197b800b60ec_JC.exe

  • Size

    1.0MB

  • MD5

    f1308333597455d0be4f1823bb1d6dde

  • SHA1

    94885cd6a83c21a0a371f0b94cf36f37d6e51663

  • SHA256

    bebf0e0bbd5722c3b9e0e511eabb7e9055a321272b0f90b0bd38197b800b60ec

  • SHA512

    77245c72fc287b1e768472f5cfa13db2e824ae86a2f8ce23b3b0dff399469549fedf2d88c9a8e29ccacfcec6fe540d133683df736234179f80df43c203ec8c47

  • SSDEEP

    24576:qyPCtoTy6WRMxO4HMZrAb7P0AykurlIdq90fIga:xPgoTy64h4HMdO0IdqY

Malware Config

Signatures

  • Detects Healer an antivirus disabler dropper 4 IoCs
  • Healer

    Healer an antivirus disabler dropper.

  • Modifies Windows Defender Real-time Protection settings 3 TTPs 6 IoCs
  • Mystic

    Mystic is an infostealer written in C++.

  • Executes dropped EXE 6 IoCs
  • Loads dropped DLL 16 IoCs
  • Windows security modification 2 TTPs 2 IoCs
  • Adds Run key to start application 2 TTPs 5 IoCs
  • Suspicious use of SetThreadContext 1 IoCs
  • Program crash 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 2 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\bebf0e0bbd5722c3b9e0e511eabb7e9055a321272b0f90b0bd38197b800b60ec_JC.exe
    "C:\Users\Admin\AppData\Local\Temp\bebf0e0bbd5722c3b9e0e511eabb7e9055a321272b0f90b0bd38197b800b60ec_JC.exe"
    1⤵
    • Loads dropped DLL
    • Adds Run key to start application
    • Suspicious use of WriteProcessMemory
    PID:2148
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\z4368756.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\z4368756.exe
      2⤵
      • Executes dropped EXE
      • Loads dropped DLL
      • Adds Run key to start application
      • Suspicious use of WriteProcessMemory
      PID:2332
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\z9589471.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\z9589471.exe
        3⤵
        • Executes dropped EXE
        • Loads dropped DLL
        • Adds Run key to start application
        • Suspicious use of WriteProcessMemory
        PID:2580
        • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\z9518577.exe
          C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\z9518577.exe
          4⤵
          • Executes dropped EXE
          • Loads dropped DLL
          • Adds Run key to start application
          • Suspicious use of WriteProcessMemory
          PID:2640
          • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\z4320457.exe
            C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\z4320457.exe
            5⤵
            • Executes dropped EXE
            • Loads dropped DLL
            • Adds Run key to start application
            • Suspicious use of WriteProcessMemory
            PID:2948
            • C:\Users\Admin\AppData\Local\Temp\IXP004.TMP\q4526543.exe
              C:\Users\Admin\AppData\Local\Temp\IXP004.TMP\q4526543.exe
              6⤵
              • Modifies Windows Defender Real-time Protection settings
              • Executes dropped EXE
              • Windows security modification
              • Suspicious behavior: EnumeratesProcesses
              • Suspicious use of AdjustPrivilegeToken
              PID:2616
            • C:\Users\Admin\AppData\Local\Temp\IXP004.TMP\r0778071.exe
              C:\Users\Admin\AppData\Local\Temp\IXP004.TMP\r0778071.exe
              6⤵
              • Executes dropped EXE
              • Loads dropped DLL
              • Suspicious use of SetThreadContext
              • Suspicious use of WriteProcessMemory
              PID:2512
              • C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe
                "C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"
                7⤵
                  PID:2528
                • C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe
                  "C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"
                  7⤵
                    PID:2560
                  • C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe
                    "C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"
                    7⤵
                      PID:2604
                    • C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe
                      "C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"
                      7⤵
                        PID:3012
                      • C:\Windows\SysWOW64\WerFault.exe
                        C:\Windows\SysWOW64\WerFault.exe -u -p 2512 -s 300
                        7⤵
                        • Loads dropped DLL
                        • Program crash
                        PID:2192

          Network

          MITRE ATT&CK Enterprise v15

          Replay Monitor

          Loading Replay Monitor...

          Downloads

          • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\z4368756.exe
            Filesize

            972KB

            MD5

            afcdcd8d348edefefd7fb23eaeee7ac9

            SHA1

            6231f901bdfc1da60b7be7ef49d8eb2ad9a8d041

            SHA256

            08ba40cd05a6cb4bcbee314e86531dea7bc1b97a3afb257d348bb78f1f34b614

            SHA512

            8b5d45553ddd4830ec53b108a09074551366ed5aad371847b67a5fda976d22b3e1fe7217bad4f31cbda2bd35f4112202c02718635dd005318c984c5ea1630762

          • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\z4368756.exe
            Filesize

            972KB

            MD5

            afcdcd8d348edefefd7fb23eaeee7ac9

            SHA1

            6231f901bdfc1da60b7be7ef49d8eb2ad9a8d041

            SHA256

            08ba40cd05a6cb4bcbee314e86531dea7bc1b97a3afb257d348bb78f1f34b614

            SHA512

            8b5d45553ddd4830ec53b108a09074551366ed5aad371847b67a5fda976d22b3e1fe7217bad4f31cbda2bd35f4112202c02718635dd005318c984c5ea1630762

          • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\z9589471.exe
            Filesize

            789KB

            MD5

            5fd4cb87b1b8c2a77bcf1865871417b8

            SHA1

            ba01834009cc187dc048dab71d06eb07b9b264cc

            SHA256

            13e95dde5bace9d81a601b79fc49a55ac658131da2651dfe9e56b7773ba53524

            SHA512

            ac7a0f6f2591356d54c9c566831a6226406ece2c9fdfc5293a1538a48905f07e12c66360594bead5df91eea4e1bcfc28e6464c63400d4c510f9fe34ab1f01db6

          • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\z9589471.exe
            Filesize

            789KB

            MD5

            5fd4cb87b1b8c2a77bcf1865871417b8

            SHA1

            ba01834009cc187dc048dab71d06eb07b9b264cc

            SHA256

            13e95dde5bace9d81a601b79fc49a55ac658131da2651dfe9e56b7773ba53524

            SHA512

            ac7a0f6f2591356d54c9c566831a6226406ece2c9fdfc5293a1538a48905f07e12c66360594bead5df91eea4e1bcfc28e6464c63400d4c510f9fe34ab1f01db6

          • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\z9518577.exe
            Filesize

            607KB

            MD5

            378a7efe6795c965da78c0f9ebc10a2e

            SHA1

            e54cd370f992cce18849d9f273cb7ec8adb5dd12

            SHA256

            b1b2ee783b7fadb58c1928e97d89bf5e932df06610d2ed0e59dd59a92a812beb

            SHA512

            f8bd9d40806f2cfec17d2bf6f52b497c5fd71b642e9f5e345aac3e3b2ae17c9381b22fe7272ec02c7abf5b3d850fda048847c93483c472bef085518e7b5695e2

          • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\z9518577.exe
            Filesize

            607KB

            MD5

            378a7efe6795c965da78c0f9ebc10a2e

            SHA1

            e54cd370f992cce18849d9f273cb7ec8adb5dd12

            SHA256

            b1b2ee783b7fadb58c1928e97d89bf5e932df06610d2ed0e59dd59a92a812beb

            SHA512

            f8bd9d40806f2cfec17d2bf6f52b497c5fd71b642e9f5e345aac3e3b2ae17c9381b22fe7272ec02c7abf5b3d850fda048847c93483c472bef085518e7b5695e2

          • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\z4320457.exe
            Filesize

            336KB

            MD5

            7e9cf2944c54e077a48cb807f88cacfe

            SHA1

            1f5487799bc363b67b8efd54300078ccd4584e8e

            SHA256

            a259ab5520600d4eb8a6933255daa9e2d78e0de445f21e319c063c3d9f4c05b2

            SHA512

            f7f87118dffecf06314d1745b3a556bc182a017e9b96ffeb336337dcaf29c7f6ea8d013efc3f55020fc83aa8f617f2a274c03b8d3db89b38223b178546868573

          • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\z4320457.exe
            Filesize

            336KB

            MD5

            7e9cf2944c54e077a48cb807f88cacfe

            SHA1

            1f5487799bc363b67b8efd54300078ccd4584e8e

            SHA256

            a259ab5520600d4eb8a6933255daa9e2d78e0de445f21e319c063c3d9f4c05b2

            SHA512

            f7f87118dffecf06314d1745b3a556bc182a017e9b96ffeb336337dcaf29c7f6ea8d013efc3f55020fc83aa8f617f2a274c03b8d3db89b38223b178546868573

          • C:\Users\Admin\AppData\Local\Temp\IXP004.TMP\q4526543.exe
            Filesize

            11KB

            MD5

            882a67e5fd493f6bd53c1017fc83560b

            SHA1

            1ded2aad86cbbd08642c958dde824ae21064f045

            SHA256

            54b69b90a598a0481908d727d34b90c87c93eca5ef74ad44afe09971e77fae00

            SHA512

            5cbf8aeb1e6ce65397a24018a49a0c9c3b6863d11bfaf7d0ea432bc756995700cbc80ef13da3a8ceab818416dbca95da7721a69b55a1158ca5e04832cd2e7820

          • C:\Users\Admin\AppData\Local\Temp\IXP004.TMP\q4526543.exe
            Filesize

            11KB

            MD5

            882a67e5fd493f6bd53c1017fc83560b

            SHA1

            1ded2aad86cbbd08642c958dde824ae21064f045

            SHA256

            54b69b90a598a0481908d727d34b90c87c93eca5ef74ad44afe09971e77fae00

            SHA512

            5cbf8aeb1e6ce65397a24018a49a0c9c3b6863d11bfaf7d0ea432bc756995700cbc80ef13da3a8ceab818416dbca95da7721a69b55a1158ca5e04832cd2e7820

          • C:\Users\Admin\AppData\Local\Temp\IXP004.TMP\r0778071.exe
            Filesize

            356KB

            MD5

            140b456257560adc0238f0d66c63edbc

            SHA1

            022ed1a8deb6edb27634317bc63102648aa1a916

            SHA256

            43520c480793dd0ffccb2885c2ab5e82770ff586c422ce665ab748de56f25c0d

            SHA512

            1a836139c8c7b1176b27bd3ad8dbfba3279f29934806dccb9775e6ea028b408787149c0e196bbe0b420dba8dda63841081f9a1390063078cb01a781ec192165b

          • C:\Users\Admin\AppData\Local\Temp\IXP004.TMP\r0778071.exe
            Filesize

            356KB

            MD5

            140b456257560adc0238f0d66c63edbc

            SHA1

            022ed1a8deb6edb27634317bc63102648aa1a916

            SHA256

            43520c480793dd0ffccb2885c2ab5e82770ff586c422ce665ab748de56f25c0d

            SHA512

            1a836139c8c7b1176b27bd3ad8dbfba3279f29934806dccb9775e6ea028b408787149c0e196bbe0b420dba8dda63841081f9a1390063078cb01a781ec192165b

          • C:\Users\Admin\AppData\Local\Temp\IXP004.TMP\r0778071.exe
            Filesize

            356KB

            MD5

            140b456257560adc0238f0d66c63edbc

            SHA1

            022ed1a8deb6edb27634317bc63102648aa1a916

            SHA256

            43520c480793dd0ffccb2885c2ab5e82770ff586c422ce665ab748de56f25c0d

            SHA512

            1a836139c8c7b1176b27bd3ad8dbfba3279f29934806dccb9775e6ea028b408787149c0e196bbe0b420dba8dda63841081f9a1390063078cb01a781ec192165b

          • \Users\Admin\AppData\Local\Temp\IXP000.TMP\z4368756.exe
            Filesize

            972KB

            MD5

            afcdcd8d348edefefd7fb23eaeee7ac9

            SHA1

            6231f901bdfc1da60b7be7ef49d8eb2ad9a8d041

            SHA256

            08ba40cd05a6cb4bcbee314e86531dea7bc1b97a3afb257d348bb78f1f34b614

            SHA512

            8b5d45553ddd4830ec53b108a09074551366ed5aad371847b67a5fda976d22b3e1fe7217bad4f31cbda2bd35f4112202c02718635dd005318c984c5ea1630762

          • \Users\Admin\AppData\Local\Temp\IXP000.TMP\z4368756.exe
            Filesize

            972KB

            MD5

            afcdcd8d348edefefd7fb23eaeee7ac9

            SHA1

            6231f901bdfc1da60b7be7ef49d8eb2ad9a8d041

            SHA256

            08ba40cd05a6cb4bcbee314e86531dea7bc1b97a3afb257d348bb78f1f34b614

            SHA512

            8b5d45553ddd4830ec53b108a09074551366ed5aad371847b67a5fda976d22b3e1fe7217bad4f31cbda2bd35f4112202c02718635dd005318c984c5ea1630762

          • \Users\Admin\AppData\Local\Temp\IXP001.TMP\z9589471.exe
            Filesize

            789KB

            MD5

            5fd4cb87b1b8c2a77bcf1865871417b8

            SHA1

            ba01834009cc187dc048dab71d06eb07b9b264cc

            SHA256

            13e95dde5bace9d81a601b79fc49a55ac658131da2651dfe9e56b7773ba53524

            SHA512

            ac7a0f6f2591356d54c9c566831a6226406ece2c9fdfc5293a1538a48905f07e12c66360594bead5df91eea4e1bcfc28e6464c63400d4c510f9fe34ab1f01db6

          • \Users\Admin\AppData\Local\Temp\IXP001.TMP\z9589471.exe
            Filesize

            789KB

            MD5

            5fd4cb87b1b8c2a77bcf1865871417b8

            SHA1

            ba01834009cc187dc048dab71d06eb07b9b264cc

            SHA256

            13e95dde5bace9d81a601b79fc49a55ac658131da2651dfe9e56b7773ba53524

            SHA512

            ac7a0f6f2591356d54c9c566831a6226406ece2c9fdfc5293a1538a48905f07e12c66360594bead5df91eea4e1bcfc28e6464c63400d4c510f9fe34ab1f01db6

          • \Users\Admin\AppData\Local\Temp\IXP002.TMP\z9518577.exe
            Filesize

            607KB

            MD5

            378a7efe6795c965da78c0f9ebc10a2e

            SHA1

            e54cd370f992cce18849d9f273cb7ec8adb5dd12

            SHA256

            b1b2ee783b7fadb58c1928e97d89bf5e932df06610d2ed0e59dd59a92a812beb

            SHA512

            f8bd9d40806f2cfec17d2bf6f52b497c5fd71b642e9f5e345aac3e3b2ae17c9381b22fe7272ec02c7abf5b3d850fda048847c93483c472bef085518e7b5695e2

          • \Users\Admin\AppData\Local\Temp\IXP002.TMP\z9518577.exe
            Filesize

            607KB

            MD5

            378a7efe6795c965da78c0f9ebc10a2e

            SHA1

            e54cd370f992cce18849d9f273cb7ec8adb5dd12

            SHA256

            b1b2ee783b7fadb58c1928e97d89bf5e932df06610d2ed0e59dd59a92a812beb

            SHA512

            f8bd9d40806f2cfec17d2bf6f52b497c5fd71b642e9f5e345aac3e3b2ae17c9381b22fe7272ec02c7abf5b3d850fda048847c93483c472bef085518e7b5695e2

          • \Users\Admin\AppData\Local\Temp\IXP003.TMP\z4320457.exe
            Filesize

            336KB

            MD5

            7e9cf2944c54e077a48cb807f88cacfe

            SHA1

            1f5487799bc363b67b8efd54300078ccd4584e8e

            SHA256

            a259ab5520600d4eb8a6933255daa9e2d78e0de445f21e319c063c3d9f4c05b2

            SHA512

            f7f87118dffecf06314d1745b3a556bc182a017e9b96ffeb336337dcaf29c7f6ea8d013efc3f55020fc83aa8f617f2a274c03b8d3db89b38223b178546868573

          • \Users\Admin\AppData\Local\Temp\IXP003.TMP\z4320457.exe
            Filesize

            336KB

            MD5

            7e9cf2944c54e077a48cb807f88cacfe

            SHA1

            1f5487799bc363b67b8efd54300078ccd4584e8e

            SHA256

            a259ab5520600d4eb8a6933255daa9e2d78e0de445f21e319c063c3d9f4c05b2

            SHA512

            f7f87118dffecf06314d1745b3a556bc182a017e9b96ffeb336337dcaf29c7f6ea8d013efc3f55020fc83aa8f617f2a274c03b8d3db89b38223b178546868573

          • \Users\Admin\AppData\Local\Temp\IXP004.TMP\q4526543.exe
            Filesize

            11KB

            MD5

            882a67e5fd493f6bd53c1017fc83560b

            SHA1

            1ded2aad86cbbd08642c958dde824ae21064f045

            SHA256

            54b69b90a598a0481908d727d34b90c87c93eca5ef74ad44afe09971e77fae00

            SHA512

            5cbf8aeb1e6ce65397a24018a49a0c9c3b6863d11bfaf7d0ea432bc756995700cbc80ef13da3a8ceab818416dbca95da7721a69b55a1158ca5e04832cd2e7820

          • \Users\Admin\AppData\Local\Temp\IXP004.TMP\r0778071.exe
            Filesize

            356KB

            MD5

            140b456257560adc0238f0d66c63edbc

            SHA1

            022ed1a8deb6edb27634317bc63102648aa1a916

            SHA256

            43520c480793dd0ffccb2885c2ab5e82770ff586c422ce665ab748de56f25c0d

            SHA512

            1a836139c8c7b1176b27bd3ad8dbfba3279f29934806dccb9775e6ea028b408787149c0e196bbe0b420dba8dda63841081f9a1390063078cb01a781ec192165b

          • \Users\Admin\AppData\Local\Temp\IXP004.TMP\r0778071.exe
            Filesize

            356KB

            MD5

            140b456257560adc0238f0d66c63edbc

            SHA1

            022ed1a8deb6edb27634317bc63102648aa1a916

            SHA256

            43520c480793dd0ffccb2885c2ab5e82770ff586c422ce665ab748de56f25c0d

            SHA512

            1a836139c8c7b1176b27bd3ad8dbfba3279f29934806dccb9775e6ea028b408787149c0e196bbe0b420dba8dda63841081f9a1390063078cb01a781ec192165b

          • \Users\Admin\AppData\Local\Temp\IXP004.TMP\r0778071.exe
            Filesize

            356KB

            MD5

            140b456257560adc0238f0d66c63edbc

            SHA1

            022ed1a8deb6edb27634317bc63102648aa1a916

            SHA256

            43520c480793dd0ffccb2885c2ab5e82770ff586c422ce665ab748de56f25c0d

            SHA512

            1a836139c8c7b1176b27bd3ad8dbfba3279f29934806dccb9775e6ea028b408787149c0e196bbe0b420dba8dda63841081f9a1390063078cb01a781ec192165b

          • \Users\Admin\AppData\Local\Temp\IXP004.TMP\r0778071.exe
            Filesize

            356KB

            MD5

            140b456257560adc0238f0d66c63edbc

            SHA1

            022ed1a8deb6edb27634317bc63102648aa1a916

            SHA256

            43520c480793dd0ffccb2885c2ab5e82770ff586c422ce665ab748de56f25c0d

            SHA512

            1a836139c8c7b1176b27bd3ad8dbfba3279f29934806dccb9775e6ea028b408787149c0e196bbe0b420dba8dda63841081f9a1390063078cb01a781ec192165b

          • \Users\Admin\AppData\Local\Temp\IXP004.TMP\r0778071.exe
            Filesize

            356KB

            MD5

            140b456257560adc0238f0d66c63edbc

            SHA1

            022ed1a8deb6edb27634317bc63102648aa1a916

            SHA256

            43520c480793dd0ffccb2885c2ab5e82770ff586c422ce665ab748de56f25c0d

            SHA512

            1a836139c8c7b1176b27bd3ad8dbfba3279f29934806dccb9775e6ea028b408787149c0e196bbe0b420dba8dda63841081f9a1390063078cb01a781ec192165b

          • \Users\Admin\AppData\Local\Temp\IXP004.TMP\r0778071.exe
            Filesize

            356KB

            MD5

            140b456257560adc0238f0d66c63edbc

            SHA1

            022ed1a8deb6edb27634317bc63102648aa1a916

            SHA256

            43520c480793dd0ffccb2885c2ab5e82770ff586c422ce665ab748de56f25c0d

            SHA512

            1a836139c8c7b1176b27bd3ad8dbfba3279f29934806dccb9775e6ea028b408787149c0e196bbe0b420dba8dda63841081f9a1390063078cb01a781ec192165b

          • \Users\Admin\AppData\Local\Temp\IXP004.TMP\r0778071.exe
            Filesize

            356KB

            MD5

            140b456257560adc0238f0d66c63edbc

            SHA1

            022ed1a8deb6edb27634317bc63102648aa1a916

            SHA256

            43520c480793dd0ffccb2885c2ab5e82770ff586c422ce665ab748de56f25c0d

            SHA512

            1a836139c8c7b1176b27bd3ad8dbfba3279f29934806dccb9775e6ea028b408787149c0e196bbe0b420dba8dda63841081f9a1390063078cb01a781ec192165b

          • memory/2616-51-0x000007FEF57B0000-0x000007FEF619C000-memory.dmp
            Filesize

            9.9MB

          • memory/2616-50-0x000007FEF57B0000-0x000007FEF619C000-memory.dmp
            Filesize

            9.9MB

          • memory/2616-49-0x000007FEF57B0000-0x000007FEF619C000-memory.dmp
            Filesize

            9.9MB

          • memory/2616-48-0x0000000001180000-0x000000000118A000-memory.dmp
            Filesize

            40KB

          • memory/3012-74-0x0000000000400000-0x0000000000428000-memory.dmp
            Filesize

            160KB

          • memory/3012-71-0x0000000000400000-0x0000000000428000-memory.dmp
            Filesize

            160KB

          • memory/3012-73-0x00000000FFFDE000-0x00000000FFFDF000-memory.dmp
            Filesize

            4KB

          • memory/3012-63-0x0000000000400000-0x0000000000428000-memory.dmp
            Filesize

            160KB

          • memory/3012-76-0x0000000000400000-0x0000000000428000-memory.dmp
            Filesize

            160KB

          • memory/3012-78-0x0000000000400000-0x0000000000428000-memory.dmp
            Filesize

            160KB

          • memory/3012-79-0x0000000000400000-0x0000000000428000-memory.dmp
            Filesize

            160KB

          • memory/3012-61-0x0000000000400000-0x0000000000428000-memory.dmp
            Filesize

            160KB

          • memory/3012-69-0x0000000000400000-0x0000000000428000-memory.dmp
            Filesize

            160KB

          • memory/3012-67-0x0000000000400000-0x0000000000428000-memory.dmp
            Filesize

            160KB

          • memory/3012-83-0x0000000000400000-0x0000000000428000-memory.dmp
            Filesize

            160KB

          • memory/3012-65-0x0000000000400000-0x0000000000428000-memory.dmp
            Filesize

            160KB