Analysis

  • max time kernel
    118s
  • max time network
    134s
  • platform
    windows7_x64
  • resource
    win7-20230831-en
  • resource tags

    arch:x64arch:x86image:win7-20230831-enlocale:en-usos:windows7-x64system
  • submitted
    10-10-2023 21:30

General

  • Target

    79561cbf51e95506570ae9ca905cbaf9ed78d80c0394dab064efd8e713509af1.exe

  • Size

    986KB

  • MD5

    5a8443c3ab73551173039212bbffb5c4

  • SHA1

    bfc34af3f9aeabc34a3f9588a17f3c876b015d2e

  • SHA256

    79561cbf51e95506570ae9ca905cbaf9ed78d80c0394dab064efd8e713509af1

  • SHA512

    810e117ee4968fa5ebfb3d12d5aa7b37e6ec011f07a93e14ef566bdc4d09af934caa03202b6b01ec41c61efc66d5ea19bf42c81b542fa9a1bfea427e43c3849d

  • SSDEEP

    24576:vyuWNvzSQnMJCToFEQ1ojLkfWNrPO4Br:61dsREMqLkfCO4B

Malware Config

Signatures

  • Detect Mystic stealer payload 6 IoCs
  • Detects Healer an antivirus disabler dropper 4 IoCs
  • Healer

    Healer an antivirus disabler dropper.

  • Modifies Windows Defender Real-time Protection settings 3 TTPs 6 IoCs
  • Mystic

    Mystic is an infostealer written in C++.

  • Executes dropped EXE 6 IoCs
  • Loads dropped DLL 16 IoCs
  • Windows security modification 2 TTPs 2 IoCs
  • Adds Run key to start application 2 TTPs 5 IoCs
  • Suspicious use of SetThreadContext 1 IoCs
  • Program crash 2 IoCs
  • Suspicious behavior: EnumeratesProcesses 2 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\79561cbf51e95506570ae9ca905cbaf9ed78d80c0394dab064efd8e713509af1.exe
    "C:\Users\Admin\AppData\Local\Temp\79561cbf51e95506570ae9ca905cbaf9ed78d80c0394dab064efd8e713509af1.exe"
    1⤵
    • Loads dropped DLL
    • Adds Run key to start application
    • Suspicious use of WriteProcessMemory
    PID:1200
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\z9596074.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\z9596074.exe
      2⤵
      • Executes dropped EXE
      • Loads dropped DLL
      • Adds Run key to start application
      • Suspicious use of WriteProcessMemory
      PID:1152
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\z7781199.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\z7781199.exe
        3⤵
        • Executes dropped EXE
        • Loads dropped DLL
        • Adds Run key to start application
        • Suspicious use of WriteProcessMemory
        PID:1732
        • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\z9543457.exe
          C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\z9543457.exe
          4⤵
          • Executes dropped EXE
          • Loads dropped DLL
          • Adds Run key to start application
          • Suspicious use of WriteProcessMemory
          PID:2664
          • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\z9854131.exe
            C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\z9854131.exe
            5⤵
            • Executes dropped EXE
            • Loads dropped DLL
            • Adds Run key to start application
            • Suspicious use of WriteProcessMemory
            PID:2976
            • C:\Users\Admin\AppData\Local\Temp\IXP004.TMP\q6516887.exe
              C:\Users\Admin\AppData\Local\Temp\IXP004.TMP\q6516887.exe
              6⤵
              • Modifies Windows Defender Real-time Protection settings
              • Executes dropped EXE
              • Windows security modification
              • Suspicious behavior: EnumeratesProcesses
              • Suspicious use of AdjustPrivilegeToken
              PID:2764
            • C:\Users\Admin\AppData\Local\Temp\IXP004.TMP\r0601551.exe
              C:\Users\Admin\AppData\Local\Temp\IXP004.TMP\r0601551.exe
              6⤵
              • Executes dropped EXE
              • Loads dropped DLL
              • Suspicious use of SetThreadContext
              • Suspicious use of WriteProcessMemory
              PID:2756
              • C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe
                "C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"
                7⤵
                • Suspicious use of WriteProcessMemory
                PID:2636
                • C:\Windows\SysWOW64\WerFault.exe
                  C:\Windows\SysWOW64\WerFault.exe -u -p 2636 -s 268
                  8⤵
                  • Program crash
                  PID:3056
              • C:\Windows\SysWOW64\WerFault.exe
                C:\Windows\SysWOW64\WerFault.exe -u -p 2756 -s 36
                7⤵
                • Loads dropped DLL
                • Program crash
                PID:2600

Network

MITRE ATT&CK Matrix ATT&CK v13

Persistence

Create or Modify System Process

1
T1543

Windows Service

1
T1543.003

Boot or Logon Autostart Execution

1
T1547

Registry Run Keys / Startup Folder

1
T1547.001

Privilege Escalation

Create or Modify System Process

1
T1543

Windows Service

1
T1543.003

Boot or Logon Autostart Execution

1
T1547

Registry Run Keys / Startup Folder

1
T1547.001

Defense Evasion

Modify Registry

3
T1112

Impair Defenses

2
T1562

Disable or Modify Tools

2
T1562.001

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\z9596074.exe
    Filesize

    892KB

    MD5

    c773277cef17b32fb201f4df8dda4a0b

    SHA1

    d3c81e2b36618d0055c3bb81963c41667eee29e3

    SHA256

    f073f6a96bd6e922c02d78eed7f074c0feb90b197333b14fb46be7d39b2bc5c0

    SHA512

    ec089b9b5d325a0588b6bf817a14fa688c5fa0bae353325ac1ea7493def093e88872270e399172236cfc94255beba251654946a2ed89024d9d914ca1c8219a4e

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\z9596074.exe
    Filesize

    892KB

    MD5

    c773277cef17b32fb201f4df8dda4a0b

    SHA1

    d3c81e2b36618d0055c3bb81963c41667eee29e3

    SHA256

    f073f6a96bd6e922c02d78eed7f074c0feb90b197333b14fb46be7d39b2bc5c0

    SHA512

    ec089b9b5d325a0588b6bf817a14fa688c5fa0bae353325ac1ea7493def093e88872270e399172236cfc94255beba251654946a2ed89024d9d914ca1c8219a4e

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\z7781199.exe
    Filesize

    709KB

    MD5

    c6ecf1e7f02681f54ed9e18e447c7271

    SHA1

    26629b29e940392cb830b71a711802841255c275

    SHA256

    b6f9e23022a3b6d6e6b4690884f04dbacc3006312431f54cf9e0e8216fc64d17

    SHA512

    ff63cb11a20db7708d463fb0930e749b3b4235dfe488f435f1556e3600d728c754a7425157f43f7e08061b81d4a2fbe79db533d849c956d2255759cd124c58e9

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\z7781199.exe
    Filesize

    709KB

    MD5

    c6ecf1e7f02681f54ed9e18e447c7271

    SHA1

    26629b29e940392cb830b71a711802841255c275

    SHA256

    b6f9e23022a3b6d6e6b4690884f04dbacc3006312431f54cf9e0e8216fc64d17

    SHA512

    ff63cb11a20db7708d463fb0930e749b3b4235dfe488f435f1556e3600d728c754a7425157f43f7e08061b81d4a2fbe79db533d849c956d2255759cd124c58e9

  • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\z9543457.exe
    Filesize

    527KB

    MD5

    cb33f51b981dcb1a92a9f6a325d9d8da

    SHA1

    4fde1969e263fde71daf4953ca322140f1a6314c

    SHA256

    d01ac9bf574738defb4e5de08ad7ccf10f5fc80f3f5d63fef2c38d41638a675b

    SHA512

    faf1471c24ceb1c25db8b8ff21ac02834c07436288c04194d7f4c629b6628db051ab34e29d9bb2ed95b800ecb9197de6a96f2d556d550cd9200b8f0f576bd63f

  • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\z9543457.exe
    Filesize

    527KB

    MD5

    cb33f51b981dcb1a92a9f6a325d9d8da

    SHA1

    4fde1969e263fde71daf4953ca322140f1a6314c

    SHA256

    d01ac9bf574738defb4e5de08ad7ccf10f5fc80f3f5d63fef2c38d41638a675b

    SHA512

    faf1471c24ceb1c25db8b8ff21ac02834c07436288c04194d7f4c629b6628db051ab34e29d9bb2ed95b800ecb9197de6a96f2d556d550cd9200b8f0f576bd63f

  • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\z9854131.exe
    Filesize

    296KB

    MD5

    783227166710af3289d6339de34c0318

    SHA1

    f32aa284060d617b4ad1e9e978ec9339d0470be9

    SHA256

    82553883c23a6737699f44e005479a515bad36a7ebf1200e8b9aa8ed6f8f0147

    SHA512

    8666e98c23fbf72ad53a2beac965d07a65186b88c14bdcb2f911a85930f8fe429fa96a354d4c960ccfd610f14d2cdd37964cba97b79bde8606d2807ab92046a4

  • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\z9854131.exe
    Filesize

    296KB

    MD5

    783227166710af3289d6339de34c0318

    SHA1

    f32aa284060d617b4ad1e9e978ec9339d0470be9

    SHA256

    82553883c23a6737699f44e005479a515bad36a7ebf1200e8b9aa8ed6f8f0147

    SHA512

    8666e98c23fbf72ad53a2beac965d07a65186b88c14bdcb2f911a85930f8fe429fa96a354d4c960ccfd610f14d2cdd37964cba97b79bde8606d2807ab92046a4

  • C:\Users\Admin\AppData\Local\Temp\IXP004.TMP\q6516887.exe
    Filesize

    11KB

    MD5

    acda0284e5532a31966022353a43d684

    SHA1

    ee2110afad2eca51058b20a12db3af07c45b7740

    SHA256

    3c4221cb5ecc1d043953ac6ecca2a4261fa2c0422cce56c460a691d0d2546323

    SHA512

    1304a12cfc0558ce73e5b30f7841d7eee6b0323300e499fca2da28264d770496c7ee0ecb187b194dd82ab689a6f40ef3bcb167a46df0a3722c882110f36a4542

  • C:\Users\Admin\AppData\Local\Temp\IXP004.TMP\q6516887.exe
    Filesize

    11KB

    MD5

    acda0284e5532a31966022353a43d684

    SHA1

    ee2110afad2eca51058b20a12db3af07c45b7740

    SHA256

    3c4221cb5ecc1d043953ac6ecca2a4261fa2c0422cce56c460a691d0d2546323

    SHA512

    1304a12cfc0558ce73e5b30f7841d7eee6b0323300e499fca2da28264d770496c7ee0ecb187b194dd82ab689a6f40ef3bcb167a46df0a3722c882110f36a4542

  • C:\Users\Admin\AppData\Local\Temp\IXP004.TMP\r0601551.exe
    Filesize

    276KB

    MD5

    0a559552a352228bd6e73783b6e67451

    SHA1

    defbfdbb0c42c7ff4ffa5ed30b6c511f3e2eda0f

    SHA256

    f47d00f3df5f034d5447c4de07e6e726ab0a18f37fd732afb7ecece8861852e4

    SHA512

    b5dc3e63c4e341be85e0ae8fa76bf5824c5aaf08a564c21554b4a1075e0fae48be5e16ddff1ba6cd924e73dc6b24f72f34879fdc8c6b8d16143305c1d80a16cd

  • C:\Users\Admin\AppData\Local\Temp\IXP004.TMP\r0601551.exe
    Filesize

    276KB

    MD5

    0a559552a352228bd6e73783b6e67451

    SHA1

    defbfdbb0c42c7ff4ffa5ed30b6c511f3e2eda0f

    SHA256

    f47d00f3df5f034d5447c4de07e6e726ab0a18f37fd732afb7ecece8861852e4

    SHA512

    b5dc3e63c4e341be85e0ae8fa76bf5824c5aaf08a564c21554b4a1075e0fae48be5e16ddff1ba6cd924e73dc6b24f72f34879fdc8c6b8d16143305c1d80a16cd

  • C:\Users\Admin\AppData\Local\Temp\IXP004.TMP\r0601551.exe
    Filesize

    276KB

    MD5

    0a559552a352228bd6e73783b6e67451

    SHA1

    defbfdbb0c42c7ff4ffa5ed30b6c511f3e2eda0f

    SHA256

    f47d00f3df5f034d5447c4de07e6e726ab0a18f37fd732afb7ecece8861852e4

    SHA512

    b5dc3e63c4e341be85e0ae8fa76bf5824c5aaf08a564c21554b4a1075e0fae48be5e16ddff1ba6cd924e73dc6b24f72f34879fdc8c6b8d16143305c1d80a16cd

  • \Users\Admin\AppData\Local\Temp\IXP000.TMP\z9596074.exe
    Filesize

    892KB

    MD5

    c773277cef17b32fb201f4df8dda4a0b

    SHA1

    d3c81e2b36618d0055c3bb81963c41667eee29e3

    SHA256

    f073f6a96bd6e922c02d78eed7f074c0feb90b197333b14fb46be7d39b2bc5c0

    SHA512

    ec089b9b5d325a0588b6bf817a14fa688c5fa0bae353325ac1ea7493def093e88872270e399172236cfc94255beba251654946a2ed89024d9d914ca1c8219a4e

  • \Users\Admin\AppData\Local\Temp\IXP000.TMP\z9596074.exe
    Filesize

    892KB

    MD5

    c773277cef17b32fb201f4df8dda4a0b

    SHA1

    d3c81e2b36618d0055c3bb81963c41667eee29e3

    SHA256

    f073f6a96bd6e922c02d78eed7f074c0feb90b197333b14fb46be7d39b2bc5c0

    SHA512

    ec089b9b5d325a0588b6bf817a14fa688c5fa0bae353325ac1ea7493def093e88872270e399172236cfc94255beba251654946a2ed89024d9d914ca1c8219a4e

  • \Users\Admin\AppData\Local\Temp\IXP001.TMP\z7781199.exe
    Filesize

    709KB

    MD5

    c6ecf1e7f02681f54ed9e18e447c7271

    SHA1

    26629b29e940392cb830b71a711802841255c275

    SHA256

    b6f9e23022a3b6d6e6b4690884f04dbacc3006312431f54cf9e0e8216fc64d17

    SHA512

    ff63cb11a20db7708d463fb0930e749b3b4235dfe488f435f1556e3600d728c754a7425157f43f7e08061b81d4a2fbe79db533d849c956d2255759cd124c58e9

  • \Users\Admin\AppData\Local\Temp\IXP001.TMP\z7781199.exe
    Filesize

    709KB

    MD5

    c6ecf1e7f02681f54ed9e18e447c7271

    SHA1

    26629b29e940392cb830b71a711802841255c275

    SHA256

    b6f9e23022a3b6d6e6b4690884f04dbacc3006312431f54cf9e0e8216fc64d17

    SHA512

    ff63cb11a20db7708d463fb0930e749b3b4235dfe488f435f1556e3600d728c754a7425157f43f7e08061b81d4a2fbe79db533d849c956d2255759cd124c58e9

  • \Users\Admin\AppData\Local\Temp\IXP002.TMP\z9543457.exe
    Filesize

    527KB

    MD5

    cb33f51b981dcb1a92a9f6a325d9d8da

    SHA1

    4fde1969e263fde71daf4953ca322140f1a6314c

    SHA256

    d01ac9bf574738defb4e5de08ad7ccf10f5fc80f3f5d63fef2c38d41638a675b

    SHA512

    faf1471c24ceb1c25db8b8ff21ac02834c07436288c04194d7f4c629b6628db051ab34e29d9bb2ed95b800ecb9197de6a96f2d556d550cd9200b8f0f576bd63f

  • \Users\Admin\AppData\Local\Temp\IXP002.TMP\z9543457.exe
    Filesize

    527KB

    MD5

    cb33f51b981dcb1a92a9f6a325d9d8da

    SHA1

    4fde1969e263fde71daf4953ca322140f1a6314c

    SHA256

    d01ac9bf574738defb4e5de08ad7ccf10f5fc80f3f5d63fef2c38d41638a675b

    SHA512

    faf1471c24ceb1c25db8b8ff21ac02834c07436288c04194d7f4c629b6628db051ab34e29d9bb2ed95b800ecb9197de6a96f2d556d550cd9200b8f0f576bd63f

  • \Users\Admin\AppData\Local\Temp\IXP003.TMP\z9854131.exe
    Filesize

    296KB

    MD5

    783227166710af3289d6339de34c0318

    SHA1

    f32aa284060d617b4ad1e9e978ec9339d0470be9

    SHA256

    82553883c23a6737699f44e005479a515bad36a7ebf1200e8b9aa8ed6f8f0147

    SHA512

    8666e98c23fbf72ad53a2beac965d07a65186b88c14bdcb2f911a85930f8fe429fa96a354d4c960ccfd610f14d2cdd37964cba97b79bde8606d2807ab92046a4

  • \Users\Admin\AppData\Local\Temp\IXP003.TMP\z9854131.exe
    Filesize

    296KB

    MD5

    783227166710af3289d6339de34c0318

    SHA1

    f32aa284060d617b4ad1e9e978ec9339d0470be9

    SHA256

    82553883c23a6737699f44e005479a515bad36a7ebf1200e8b9aa8ed6f8f0147

    SHA512

    8666e98c23fbf72ad53a2beac965d07a65186b88c14bdcb2f911a85930f8fe429fa96a354d4c960ccfd610f14d2cdd37964cba97b79bde8606d2807ab92046a4

  • \Users\Admin\AppData\Local\Temp\IXP004.TMP\q6516887.exe
    Filesize

    11KB

    MD5

    acda0284e5532a31966022353a43d684

    SHA1

    ee2110afad2eca51058b20a12db3af07c45b7740

    SHA256

    3c4221cb5ecc1d043953ac6ecca2a4261fa2c0422cce56c460a691d0d2546323

    SHA512

    1304a12cfc0558ce73e5b30f7841d7eee6b0323300e499fca2da28264d770496c7ee0ecb187b194dd82ab689a6f40ef3bcb167a46df0a3722c882110f36a4542

  • \Users\Admin\AppData\Local\Temp\IXP004.TMP\r0601551.exe
    Filesize

    276KB

    MD5

    0a559552a352228bd6e73783b6e67451

    SHA1

    defbfdbb0c42c7ff4ffa5ed30b6c511f3e2eda0f

    SHA256

    f47d00f3df5f034d5447c4de07e6e726ab0a18f37fd732afb7ecece8861852e4

    SHA512

    b5dc3e63c4e341be85e0ae8fa76bf5824c5aaf08a564c21554b4a1075e0fae48be5e16ddff1ba6cd924e73dc6b24f72f34879fdc8c6b8d16143305c1d80a16cd

  • \Users\Admin\AppData\Local\Temp\IXP004.TMP\r0601551.exe
    Filesize

    276KB

    MD5

    0a559552a352228bd6e73783b6e67451

    SHA1

    defbfdbb0c42c7ff4ffa5ed30b6c511f3e2eda0f

    SHA256

    f47d00f3df5f034d5447c4de07e6e726ab0a18f37fd732afb7ecece8861852e4

    SHA512

    b5dc3e63c4e341be85e0ae8fa76bf5824c5aaf08a564c21554b4a1075e0fae48be5e16ddff1ba6cd924e73dc6b24f72f34879fdc8c6b8d16143305c1d80a16cd

  • \Users\Admin\AppData\Local\Temp\IXP004.TMP\r0601551.exe
    Filesize

    276KB

    MD5

    0a559552a352228bd6e73783b6e67451

    SHA1

    defbfdbb0c42c7ff4ffa5ed30b6c511f3e2eda0f

    SHA256

    f47d00f3df5f034d5447c4de07e6e726ab0a18f37fd732afb7ecece8861852e4

    SHA512

    b5dc3e63c4e341be85e0ae8fa76bf5824c5aaf08a564c21554b4a1075e0fae48be5e16ddff1ba6cd924e73dc6b24f72f34879fdc8c6b8d16143305c1d80a16cd

  • \Users\Admin\AppData\Local\Temp\IXP004.TMP\r0601551.exe
    Filesize

    276KB

    MD5

    0a559552a352228bd6e73783b6e67451

    SHA1

    defbfdbb0c42c7ff4ffa5ed30b6c511f3e2eda0f

    SHA256

    f47d00f3df5f034d5447c4de07e6e726ab0a18f37fd732afb7ecece8861852e4

    SHA512

    b5dc3e63c4e341be85e0ae8fa76bf5824c5aaf08a564c21554b4a1075e0fae48be5e16ddff1ba6cd924e73dc6b24f72f34879fdc8c6b8d16143305c1d80a16cd

  • \Users\Admin\AppData\Local\Temp\IXP004.TMP\r0601551.exe
    Filesize

    276KB

    MD5

    0a559552a352228bd6e73783b6e67451

    SHA1

    defbfdbb0c42c7ff4ffa5ed30b6c511f3e2eda0f

    SHA256

    f47d00f3df5f034d5447c4de07e6e726ab0a18f37fd732afb7ecece8861852e4

    SHA512

    b5dc3e63c4e341be85e0ae8fa76bf5824c5aaf08a564c21554b4a1075e0fae48be5e16ddff1ba6cd924e73dc6b24f72f34879fdc8c6b8d16143305c1d80a16cd

  • \Users\Admin\AppData\Local\Temp\IXP004.TMP\r0601551.exe
    Filesize

    276KB

    MD5

    0a559552a352228bd6e73783b6e67451

    SHA1

    defbfdbb0c42c7ff4ffa5ed30b6c511f3e2eda0f

    SHA256

    f47d00f3df5f034d5447c4de07e6e726ab0a18f37fd732afb7ecece8861852e4

    SHA512

    b5dc3e63c4e341be85e0ae8fa76bf5824c5aaf08a564c21554b4a1075e0fae48be5e16ddff1ba6cd924e73dc6b24f72f34879fdc8c6b8d16143305c1d80a16cd

  • \Users\Admin\AppData\Local\Temp\IXP004.TMP\r0601551.exe
    Filesize

    276KB

    MD5

    0a559552a352228bd6e73783b6e67451

    SHA1

    defbfdbb0c42c7ff4ffa5ed30b6c511f3e2eda0f

    SHA256

    f47d00f3df5f034d5447c4de07e6e726ab0a18f37fd732afb7ecece8861852e4

    SHA512

    b5dc3e63c4e341be85e0ae8fa76bf5824c5aaf08a564c21554b4a1075e0fae48be5e16ddff1ba6cd924e73dc6b24f72f34879fdc8c6b8d16143305c1d80a16cd

  • memory/2636-62-0x0000000000400000-0x0000000000428000-memory.dmp
    Filesize

    160KB

  • memory/2636-61-0x0000000000400000-0x0000000000428000-memory.dmp
    Filesize

    160KB

  • memory/2636-63-0x0000000000400000-0x0000000000428000-memory.dmp
    Filesize

    160KB

  • memory/2636-64-0x0000000000400000-0x0000000000428000-memory.dmp
    Filesize

    160KB

  • memory/2636-65-0x0000000000400000-0x0000000000428000-memory.dmp
    Filesize

    160KB

  • memory/2636-66-0x0000000000400000-0x0000000000428000-memory.dmp
    Filesize

    160KB

  • memory/2636-67-0x00000000FFFDE000-0x00000000FFFDF000-memory.dmp
    Filesize

    4KB

  • memory/2636-68-0x0000000000400000-0x0000000000428000-memory.dmp
    Filesize

    160KB

  • memory/2636-70-0x0000000000400000-0x0000000000428000-memory.dmp
    Filesize

    160KB

  • memory/2636-72-0x0000000000400000-0x0000000000428000-memory.dmp
    Filesize

    160KB

  • memory/2764-51-0x000007FEF5570000-0x000007FEF5F5C000-memory.dmp
    Filesize

    9.9MB

  • memory/2764-50-0x000007FEF5570000-0x000007FEF5F5C000-memory.dmp
    Filesize

    9.9MB

  • memory/2764-49-0x000007FEF5570000-0x000007FEF5F5C000-memory.dmp
    Filesize

    9.9MB

  • memory/2764-48-0x00000000003F0000-0x00000000003FA000-memory.dmp
    Filesize

    40KB