Analysis

  • max time kernel
    119s
  • max time network
    122s
  • platform
    windows7_x64
  • resource
    win7-20230831-en
  • resource tags

    arch:x64arch:x86image:win7-20230831-enlocale:en-usos:windows7-x64system
  • submitted
    10-10-2023 21:26

General

  • Target

    429ad4903a0eb5549c81d73f1a6069f6.exe

  • Size

    990KB

  • MD5

    429ad4903a0eb5549c81d73f1a6069f6

  • SHA1

    46b6d31c7105411079989ee25081756ae971e936

  • SHA256

    2c5442a2626607cc413da2dc65b02f0fbacb261243ddde5672ba811c27f43c08

  • SHA512

    e2b73c3b47dfd96aa49e710fb41b94830900d39125c45b91135f27eb3fc613600e4500dbf03ce7647cc10550fe378ee23ad9ce3b30cccdafaefffe5c9b81adf5

  • SSDEEP

    24576:JyF5ejFHm7pOl3vlBOWsrqYcjXaQBqEnw8u2G65e:8aBHi4hfDs+YcjXaQhwHt6

Malware Config

Signatures

  • Detect Mystic stealer payload 6 IoCs
  • Detects Healer an antivirus disabler dropper 4 IoCs
  • Healer

    Healer an antivirus disabler dropper.

  • Modifies Windows Defender Real-time Protection settings 3 TTPs 6 IoCs
  • Mystic

    Mystic is an infostealer written in C++.

  • Executes dropped EXE 6 IoCs
  • Loads dropped DLL 16 IoCs
  • Windows security modification 2 TTPs 2 IoCs
  • Adds Run key to start application 2 TTPs 5 IoCs
  • Suspicious use of SetThreadContext 1 IoCs
  • Program crash 2 IoCs
  • Suspicious behavior: EnumeratesProcesses 2 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\429ad4903a0eb5549c81d73f1a6069f6.exe
    "C:\Users\Admin\AppData\Local\Temp\429ad4903a0eb5549c81d73f1a6069f6.exe"
    1⤵
    • Loads dropped DLL
    • Adds Run key to start application
    • Suspicious use of WriteProcessMemory
    PID:2972
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\z3456820.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\z3456820.exe
      2⤵
      • Executes dropped EXE
      • Loads dropped DLL
      • Adds Run key to start application
      • Suspicious use of WriteProcessMemory
      PID:2860
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\z2934588.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\z2934588.exe
        3⤵
        • Executes dropped EXE
        • Loads dropped DLL
        • Adds Run key to start application
        • Suspicious use of WriteProcessMemory
        PID:2652
        • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\z5111296.exe
          C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\z5111296.exe
          4⤵
          • Executes dropped EXE
          • Loads dropped DLL
          • Adds Run key to start application
          • Suspicious use of WriteProcessMemory
          PID:2596
          • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\z7649377.exe
            C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\z7649377.exe
            5⤵
            • Executes dropped EXE
            • Loads dropped DLL
            • Adds Run key to start application
            • Suspicious use of WriteProcessMemory
            PID:2692
            • C:\Users\Admin\AppData\Local\Temp\IXP004.TMP\q9415989.exe
              C:\Users\Admin\AppData\Local\Temp\IXP004.TMP\q9415989.exe
              6⤵
              • Modifies Windows Defender Real-time Protection settings
              • Executes dropped EXE
              • Windows security modification
              • Suspicious behavior: EnumeratesProcesses
              • Suspicious use of AdjustPrivilegeToken
              PID:3052
            • C:\Users\Admin\AppData\Local\Temp\IXP004.TMP\r0926252.exe
              C:\Users\Admin\AppData\Local\Temp\IXP004.TMP\r0926252.exe
              6⤵
              • Executes dropped EXE
              • Loads dropped DLL
              • Suspicious use of SetThreadContext
              • Suspicious use of WriteProcessMemory
              PID:2636
              • C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe
                "C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"
                7⤵
                • Suspicious use of WriteProcessMemory
                PID:2532
                • C:\Windows\SysWOW64\WerFault.exe
                  C:\Windows\SysWOW64\WerFault.exe -u -p 2532 -s 268
                  8⤵
                  • Program crash
                  PID:2956
              • C:\Windows\SysWOW64\WerFault.exe
                C:\Windows\SysWOW64\WerFault.exe -u -p 2636 -s 36
                7⤵
                • Loads dropped DLL
                • Program crash
                PID:2736

Network

MITRE ATT&CK Matrix ATT&CK v13

Persistence

Create or Modify System Process

1
T1543

Windows Service

1
T1543.003

Boot or Logon Autostart Execution

1
T1547

Registry Run Keys / Startup Folder

1
T1547.001

Privilege Escalation

Create or Modify System Process

1
T1543

Windows Service

1
T1543.003

Boot or Logon Autostart Execution

1
T1547

Registry Run Keys / Startup Folder

1
T1547.001

Defense Evasion

Modify Registry

3
T1112

Impair Defenses

2
T1562

Disable or Modify Tools

2
T1562.001

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\z3456820.exe
    Filesize

    889KB

    MD5

    7b2198d48d70022ff7b3a10efcac8acf

    SHA1

    5e50b89067ff2445b1c6563a1b50b2a5eaeca6c0

    SHA256

    5beca64a8aea1aa8a09ae886ef4bc2bfebf2e25ca080c227e306ade2720bb938

    SHA512

    21fcb0161470cc4037896db3d11c461b1385ab8a3401aec2bf9de20ef1b096ad8ecf23052f99678afeb6d7021525048b042bb52e979644dd03f27aa57a0a0464

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\z3456820.exe
    Filesize

    889KB

    MD5

    7b2198d48d70022ff7b3a10efcac8acf

    SHA1

    5e50b89067ff2445b1c6563a1b50b2a5eaeca6c0

    SHA256

    5beca64a8aea1aa8a09ae886ef4bc2bfebf2e25ca080c227e306ade2720bb938

    SHA512

    21fcb0161470cc4037896db3d11c461b1385ab8a3401aec2bf9de20ef1b096ad8ecf23052f99678afeb6d7021525048b042bb52e979644dd03f27aa57a0a0464

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\z2934588.exe
    Filesize

    709KB

    MD5

    c087471094c89ec93e056259fa747d08

    SHA1

    c8ae0c7894d8daad5e7d583514e2104ce0ccef6e

    SHA256

    a86c7e5b3ae2c00419688b5d930c5131ddd8482e7f90a1f1163a92f43a4bbd29

    SHA512

    b2159a056420b72657b811698789d66a3ba880fa0c9102b58910d29419603754a9d7e0a191ef6034ef49e857ba1418293da9c276f4673bbe1d307486d46bbc02

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\z2934588.exe
    Filesize

    709KB

    MD5

    c087471094c89ec93e056259fa747d08

    SHA1

    c8ae0c7894d8daad5e7d583514e2104ce0ccef6e

    SHA256

    a86c7e5b3ae2c00419688b5d930c5131ddd8482e7f90a1f1163a92f43a4bbd29

    SHA512

    b2159a056420b72657b811698789d66a3ba880fa0c9102b58910d29419603754a9d7e0a191ef6034ef49e857ba1418293da9c276f4673bbe1d307486d46bbc02

  • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\z5111296.exe
    Filesize

    526KB

    MD5

    508ab970afb4ac300f42f0c1a87063a7

    SHA1

    43e2655210c8e0131c8bb540cdab1816013f5ef3

    SHA256

    c8a0611fc96b03ec92fbbac392fc2c7c81cb20a580fe81eca9390012d2fc93f5

    SHA512

    55f5e0c2cff61c348d6728c3ff6f19ff17c04374306033ab1f7d028469d8964b338029c3df8bc960529132ce2d6aafe431e796de1a82c44d17b36637f1057417

  • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\z5111296.exe
    Filesize

    526KB

    MD5

    508ab970afb4ac300f42f0c1a87063a7

    SHA1

    43e2655210c8e0131c8bb540cdab1816013f5ef3

    SHA256

    c8a0611fc96b03ec92fbbac392fc2c7c81cb20a580fe81eca9390012d2fc93f5

    SHA512

    55f5e0c2cff61c348d6728c3ff6f19ff17c04374306033ab1f7d028469d8964b338029c3df8bc960529132ce2d6aafe431e796de1a82c44d17b36637f1057417

  • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\z7649377.exe
    Filesize

    296KB

    MD5

    1daa9572f97fd034ae59945b714e206a

    SHA1

    62c680d407d2057265801988f40c34a2953dca89

    SHA256

    fcb43bad07dbc70c273b78f591f41a1826cec51b9f2af6cb016504e26ad72cba

    SHA512

    0d563f59026506f5f1cd411cc070e22a045f16b2223e1bb62cc535be5ab8b52a2feedcf46b2b701b286d2054adae5e26d93f406a10076523e1b1e82578ea9637

  • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\z7649377.exe
    Filesize

    296KB

    MD5

    1daa9572f97fd034ae59945b714e206a

    SHA1

    62c680d407d2057265801988f40c34a2953dca89

    SHA256

    fcb43bad07dbc70c273b78f591f41a1826cec51b9f2af6cb016504e26ad72cba

    SHA512

    0d563f59026506f5f1cd411cc070e22a045f16b2223e1bb62cc535be5ab8b52a2feedcf46b2b701b286d2054adae5e26d93f406a10076523e1b1e82578ea9637

  • C:\Users\Admin\AppData\Local\Temp\IXP004.TMP\q9415989.exe
    Filesize

    11KB

    MD5

    9e710f9caa4b24f28b8d0fa5b0544b6e

    SHA1

    9f7d03509e02a1dedfd72b4b2197ec77de68a06f

    SHA256

    08f7b6929b78ae823572c05a0b1d2b349396f58cabc9573b469033f897d41e94

    SHA512

    9d66cee104f9f83cee248fa730402e9bc5fb0e2b9195ce57e19d28d7595f31be61d2d67746fa7df46913b527ca613f154209efb669ca7a1a95a5a2347db624ac

  • C:\Users\Admin\AppData\Local\Temp\IXP004.TMP\q9415989.exe
    Filesize

    11KB

    MD5

    9e710f9caa4b24f28b8d0fa5b0544b6e

    SHA1

    9f7d03509e02a1dedfd72b4b2197ec77de68a06f

    SHA256

    08f7b6929b78ae823572c05a0b1d2b349396f58cabc9573b469033f897d41e94

    SHA512

    9d66cee104f9f83cee248fa730402e9bc5fb0e2b9195ce57e19d28d7595f31be61d2d67746fa7df46913b527ca613f154209efb669ca7a1a95a5a2347db624ac

  • C:\Users\Admin\AppData\Local\Temp\IXP004.TMP\r0926252.exe
    Filesize

    276KB

    MD5

    76a2f1d59ebafc54cb439fa26557ded5

    SHA1

    8ae1664146fbc007d502848f91c6abda54e194f3

    SHA256

    0f5912f41ae0c71f3f0a9a6254cbd1ccbda73e46703d095fe433eda5928393ed

    SHA512

    3b8fc29f1b50629f074cf78968f744e19bc64e83c8ad2a25972dd302ee2b73d0828e70ce508688a76d710b6d37c1013f4e7da6412a601a6c2c2e4d4a0aa18cc9

  • C:\Users\Admin\AppData\Local\Temp\IXP004.TMP\r0926252.exe
    Filesize

    276KB

    MD5

    76a2f1d59ebafc54cb439fa26557ded5

    SHA1

    8ae1664146fbc007d502848f91c6abda54e194f3

    SHA256

    0f5912f41ae0c71f3f0a9a6254cbd1ccbda73e46703d095fe433eda5928393ed

    SHA512

    3b8fc29f1b50629f074cf78968f744e19bc64e83c8ad2a25972dd302ee2b73d0828e70ce508688a76d710b6d37c1013f4e7da6412a601a6c2c2e4d4a0aa18cc9

  • C:\Users\Admin\AppData\Local\Temp\IXP004.TMP\r0926252.exe
    Filesize

    276KB

    MD5

    76a2f1d59ebafc54cb439fa26557ded5

    SHA1

    8ae1664146fbc007d502848f91c6abda54e194f3

    SHA256

    0f5912f41ae0c71f3f0a9a6254cbd1ccbda73e46703d095fe433eda5928393ed

    SHA512

    3b8fc29f1b50629f074cf78968f744e19bc64e83c8ad2a25972dd302ee2b73d0828e70ce508688a76d710b6d37c1013f4e7da6412a601a6c2c2e4d4a0aa18cc9

  • \Users\Admin\AppData\Local\Temp\IXP000.TMP\z3456820.exe
    Filesize

    889KB

    MD5

    7b2198d48d70022ff7b3a10efcac8acf

    SHA1

    5e50b89067ff2445b1c6563a1b50b2a5eaeca6c0

    SHA256

    5beca64a8aea1aa8a09ae886ef4bc2bfebf2e25ca080c227e306ade2720bb938

    SHA512

    21fcb0161470cc4037896db3d11c461b1385ab8a3401aec2bf9de20ef1b096ad8ecf23052f99678afeb6d7021525048b042bb52e979644dd03f27aa57a0a0464

  • \Users\Admin\AppData\Local\Temp\IXP000.TMP\z3456820.exe
    Filesize

    889KB

    MD5

    7b2198d48d70022ff7b3a10efcac8acf

    SHA1

    5e50b89067ff2445b1c6563a1b50b2a5eaeca6c0

    SHA256

    5beca64a8aea1aa8a09ae886ef4bc2bfebf2e25ca080c227e306ade2720bb938

    SHA512

    21fcb0161470cc4037896db3d11c461b1385ab8a3401aec2bf9de20ef1b096ad8ecf23052f99678afeb6d7021525048b042bb52e979644dd03f27aa57a0a0464

  • \Users\Admin\AppData\Local\Temp\IXP001.TMP\z2934588.exe
    Filesize

    709KB

    MD5

    c087471094c89ec93e056259fa747d08

    SHA1

    c8ae0c7894d8daad5e7d583514e2104ce0ccef6e

    SHA256

    a86c7e5b3ae2c00419688b5d930c5131ddd8482e7f90a1f1163a92f43a4bbd29

    SHA512

    b2159a056420b72657b811698789d66a3ba880fa0c9102b58910d29419603754a9d7e0a191ef6034ef49e857ba1418293da9c276f4673bbe1d307486d46bbc02

  • \Users\Admin\AppData\Local\Temp\IXP001.TMP\z2934588.exe
    Filesize

    709KB

    MD5

    c087471094c89ec93e056259fa747d08

    SHA1

    c8ae0c7894d8daad5e7d583514e2104ce0ccef6e

    SHA256

    a86c7e5b3ae2c00419688b5d930c5131ddd8482e7f90a1f1163a92f43a4bbd29

    SHA512

    b2159a056420b72657b811698789d66a3ba880fa0c9102b58910d29419603754a9d7e0a191ef6034ef49e857ba1418293da9c276f4673bbe1d307486d46bbc02

  • \Users\Admin\AppData\Local\Temp\IXP002.TMP\z5111296.exe
    Filesize

    526KB

    MD5

    508ab970afb4ac300f42f0c1a87063a7

    SHA1

    43e2655210c8e0131c8bb540cdab1816013f5ef3

    SHA256

    c8a0611fc96b03ec92fbbac392fc2c7c81cb20a580fe81eca9390012d2fc93f5

    SHA512

    55f5e0c2cff61c348d6728c3ff6f19ff17c04374306033ab1f7d028469d8964b338029c3df8bc960529132ce2d6aafe431e796de1a82c44d17b36637f1057417

  • \Users\Admin\AppData\Local\Temp\IXP002.TMP\z5111296.exe
    Filesize

    526KB

    MD5

    508ab970afb4ac300f42f0c1a87063a7

    SHA1

    43e2655210c8e0131c8bb540cdab1816013f5ef3

    SHA256

    c8a0611fc96b03ec92fbbac392fc2c7c81cb20a580fe81eca9390012d2fc93f5

    SHA512

    55f5e0c2cff61c348d6728c3ff6f19ff17c04374306033ab1f7d028469d8964b338029c3df8bc960529132ce2d6aafe431e796de1a82c44d17b36637f1057417

  • \Users\Admin\AppData\Local\Temp\IXP003.TMP\z7649377.exe
    Filesize

    296KB

    MD5

    1daa9572f97fd034ae59945b714e206a

    SHA1

    62c680d407d2057265801988f40c34a2953dca89

    SHA256

    fcb43bad07dbc70c273b78f591f41a1826cec51b9f2af6cb016504e26ad72cba

    SHA512

    0d563f59026506f5f1cd411cc070e22a045f16b2223e1bb62cc535be5ab8b52a2feedcf46b2b701b286d2054adae5e26d93f406a10076523e1b1e82578ea9637

  • \Users\Admin\AppData\Local\Temp\IXP003.TMP\z7649377.exe
    Filesize

    296KB

    MD5

    1daa9572f97fd034ae59945b714e206a

    SHA1

    62c680d407d2057265801988f40c34a2953dca89

    SHA256

    fcb43bad07dbc70c273b78f591f41a1826cec51b9f2af6cb016504e26ad72cba

    SHA512

    0d563f59026506f5f1cd411cc070e22a045f16b2223e1bb62cc535be5ab8b52a2feedcf46b2b701b286d2054adae5e26d93f406a10076523e1b1e82578ea9637

  • \Users\Admin\AppData\Local\Temp\IXP004.TMP\q9415989.exe
    Filesize

    11KB

    MD5

    9e710f9caa4b24f28b8d0fa5b0544b6e

    SHA1

    9f7d03509e02a1dedfd72b4b2197ec77de68a06f

    SHA256

    08f7b6929b78ae823572c05a0b1d2b349396f58cabc9573b469033f897d41e94

    SHA512

    9d66cee104f9f83cee248fa730402e9bc5fb0e2b9195ce57e19d28d7595f31be61d2d67746fa7df46913b527ca613f154209efb669ca7a1a95a5a2347db624ac

  • \Users\Admin\AppData\Local\Temp\IXP004.TMP\r0926252.exe
    Filesize

    276KB

    MD5

    76a2f1d59ebafc54cb439fa26557ded5

    SHA1

    8ae1664146fbc007d502848f91c6abda54e194f3

    SHA256

    0f5912f41ae0c71f3f0a9a6254cbd1ccbda73e46703d095fe433eda5928393ed

    SHA512

    3b8fc29f1b50629f074cf78968f744e19bc64e83c8ad2a25972dd302ee2b73d0828e70ce508688a76d710b6d37c1013f4e7da6412a601a6c2c2e4d4a0aa18cc9

  • \Users\Admin\AppData\Local\Temp\IXP004.TMP\r0926252.exe
    Filesize

    276KB

    MD5

    76a2f1d59ebafc54cb439fa26557ded5

    SHA1

    8ae1664146fbc007d502848f91c6abda54e194f3

    SHA256

    0f5912f41ae0c71f3f0a9a6254cbd1ccbda73e46703d095fe433eda5928393ed

    SHA512

    3b8fc29f1b50629f074cf78968f744e19bc64e83c8ad2a25972dd302ee2b73d0828e70ce508688a76d710b6d37c1013f4e7da6412a601a6c2c2e4d4a0aa18cc9

  • \Users\Admin\AppData\Local\Temp\IXP004.TMP\r0926252.exe
    Filesize

    276KB

    MD5

    76a2f1d59ebafc54cb439fa26557ded5

    SHA1

    8ae1664146fbc007d502848f91c6abda54e194f3

    SHA256

    0f5912f41ae0c71f3f0a9a6254cbd1ccbda73e46703d095fe433eda5928393ed

    SHA512

    3b8fc29f1b50629f074cf78968f744e19bc64e83c8ad2a25972dd302ee2b73d0828e70ce508688a76d710b6d37c1013f4e7da6412a601a6c2c2e4d4a0aa18cc9

  • \Users\Admin\AppData\Local\Temp\IXP004.TMP\r0926252.exe
    Filesize

    276KB

    MD5

    76a2f1d59ebafc54cb439fa26557ded5

    SHA1

    8ae1664146fbc007d502848f91c6abda54e194f3

    SHA256

    0f5912f41ae0c71f3f0a9a6254cbd1ccbda73e46703d095fe433eda5928393ed

    SHA512

    3b8fc29f1b50629f074cf78968f744e19bc64e83c8ad2a25972dd302ee2b73d0828e70ce508688a76d710b6d37c1013f4e7da6412a601a6c2c2e4d4a0aa18cc9

  • \Users\Admin\AppData\Local\Temp\IXP004.TMP\r0926252.exe
    Filesize

    276KB

    MD5

    76a2f1d59ebafc54cb439fa26557ded5

    SHA1

    8ae1664146fbc007d502848f91c6abda54e194f3

    SHA256

    0f5912f41ae0c71f3f0a9a6254cbd1ccbda73e46703d095fe433eda5928393ed

    SHA512

    3b8fc29f1b50629f074cf78968f744e19bc64e83c8ad2a25972dd302ee2b73d0828e70ce508688a76d710b6d37c1013f4e7da6412a601a6c2c2e4d4a0aa18cc9

  • \Users\Admin\AppData\Local\Temp\IXP004.TMP\r0926252.exe
    Filesize

    276KB

    MD5

    76a2f1d59ebafc54cb439fa26557ded5

    SHA1

    8ae1664146fbc007d502848f91c6abda54e194f3

    SHA256

    0f5912f41ae0c71f3f0a9a6254cbd1ccbda73e46703d095fe433eda5928393ed

    SHA512

    3b8fc29f1b50629f074cf78968f744e19bc64e83c8ad2a25972dd302ee2b73d0828e70ce508688a76d710b6d37c1013f4e7da6412a601a6c2c2e4d4a0aa18cc9

  • \Users\Admin\AppData\Local\Temp\IXP004.TMP\r0926252.exe
    Filesize

    276KB

    MD5

    76a2f1d59ebafc54cb439fa26557ded5

    SHA1

    8ae1664146fbc007d502848f91c6abda54e194f3

    SHA256

    0f5912f41ae0c71f3f0a9a6254cbd1ccbda73e46703d095fe433eda5928393ed

    SHA512

    3b8fc29f1b50629f074cf78968f744e19bc64e83c8ad2a25972dd302ee2b73d0828e70ce508688a76d710b6d37c1013f4e7da6412a601a6c2c2e4d4a0aa18cc9

  • memory/2532-66-0x0000000000400000-0x0000000000428000-memory.dmp
    Filesize

    160KB

  • memory/2532-67-0x00000000FFFDE000-0x00000000FFFDF000-memory.dmp
    Filesize

    4KB

  • memory/2532-68-0x0000000000400000-0x0000000000428000-memory.dmp
    Filesize

    160KB

  • memory/2532-65-0x0000000000400000-0x0000000000428000-memory.dmp
    Filesize

    160KB

  • memory/2532-64-0x0000000000400000-0x0000000000428000-memory.dmp
    Filesize

    160KB

  • memory/2532-63-0x0000000000400000-0x0000000000428000-memory.dmp
    Filesize

    160KB

  • memory/2532-62-0x0000000000400000-0x0000000000428000-memory.dmp
    Filesize

    160KB

  • memory/2532-61-0x0000000000400000-0x0000000000428000-memory.dmp
    Filesize

    160KB

  • memory/2532-70-0x0000000000400000-0x0000000000428000-memory.dmp
    Filesize

    160KB

  • memory/2532-72-0x0000000000400000-0x0000000000428000-memory.dmp
    Filesize

    160KB

  • memory/3052-51-0x000007FEF5BE0000-0x000007FEF65CC000-memory.dmp
    Filesize

    9.9MB

  • memory/3052-50-0x000007FEF5BE0000-0x000007FEF65CC000-memory.dmp
    Filesize

    9.9MB

  • memory/3052-49-0x000007FEF5BE0000-0x000007FEF65CC000-memory.dmp
    Filesize

    9.9MB

  • memory/3052-48-0x0000000001100000-0x000000000110A000-memory.dmp
    Filesize

    40KB