Analysis

  • max time kernel
    122s
  • max time network
    129s
  • platform
    windows7_x64
  • resource
    win7-20230831-en
  • resource tags

    arch:x64arch:x86image:win7-20230831-enlocale:en-usos:windows7-x64system
  • submitted
    10-10-2023 21:35

General

  • Target

    e0826d1a39cb4f47ed518014dc698b69.exe

  • Size

    994KB

  • MD5

    e0826d1a39cb4f47ed518014dc698b69

  • SHA1

    b80dd56eedb92a037c70fb14a88d69a26ab849e5

  • SHA256

    7cb01016999849441abca4e084af74755a5fae1bbbfdaf8bcb9203917b777a72

  • SHA512

    f71ea3fb04344c8e589103802cda0ab3bf8cac84b61cee2443a010e3f991f5399af21bd5eb98d7aa69c4e50e359f9433af1f7ea329301b9661c616d508e6f5c0

  • SSDEEP

    24576:oBy8vVs/xaT2BN9a5ZkzmQOWsLVGz9ofCFcff:t8Vs/IT2BN895Gz9yMcf

Malware Config

Signatures

  • Detect Mystic stealer payload 6 IoCs
  • Detects Healer an antivirus disabler dropper 4 IoCs
  • Healer

    Healer an antivirus disabler dropper.

  • Modifies Windows Defender Real-time Protection settings 3 TTPs 6 IoCs
  • Mystic

    Mystic is an infostealer written in C++.

  • Executes dropped EXE 6 IoCs
  • Loads dropped DLL 16 IoCs
  • Windows security modification 2 TTPs 2 IoCs
  • Adds Run key to start application 2 TTPs 5 IoCs
  • Suspicious use of SetThreadContext 1 IoCs
  • Program crash 2 IoCs
  • Suspicious behavior: EnumeratesProcesses 2 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\e0826d1a39cb4f47ed518014dc698b69.exe
    "C:\Users\Admin\AppData\Local\Temp\e0826d1a39cb4f47ed518014dc698b69.exe"
    1⤵
    • Loads dropped DLL
    • Adds Run key to start application
    • Suspicious use of WriteProcessMemory
    PID:2120
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\z9343511.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\z9343511.exe
      2⤵
      • Executes dropped EXE
      • Loads dropped DLL
      • Adds Run key to start application
      • Suspicious use of WriteProcessMemory
      PID:2684
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\z0532921.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\z0532921.exe
        3⤵
        • Executes dropped EXE
        • Loads dropped DLL
        • Adds Run key to start application
        • Suspicious use of WriteProcessMemory
        PID:2832
        • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\z8879212.exe
          C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\z8879212.exe
          4⤵
          • Executes dropped EXE
          • Loads dropped DLL
          • Adds Run key to start application
          • Suspicious use of WriteProcessMemory
          PID:2824
          • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\z3732890.exe
            C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\z3732890.exe
            5⤵
            • Executes dropped EXE
            • Loads dropped DLL
            • Adds Run key to start application
            • Suspicious use of WriteProcessMemory
            PID:2640
            • C:\Users\Admin\AppData\Local\Temp\IXP004.TMP\q8112196.exe
              C:\Users\Admin\AppData\Local\Temp\IXP004.TMP\q8112196.exe
              6⤵
              • Modifies Windows Defender Real-time Protection settings
              • Executes dropped EXE
              • Windows security modification
              • Suspicious behavior: EnumeratesProcesses
              • Suspicious use of AdjustPrivilegeToken
              PID:2572
            • C:\Users\Admin\AppData\Local\Temp\IXP004.TMP\r0035227.exe
              C:\Users\Admin\AppData\Local\Temp\IXP004.TMP\r0035227.exe
              6⤵
              • Executes dropped EXE
              • Loads dropped DLL
              • Suspicious use of SetThreadContext
              • Suspicious use of WriteProcessMemory
              PID:2936
              • C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe
                "C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"
                7⤵
                • Suspicious use of WriteProcessMemory
                PID:2056
                • C:\Windows\SysWOW64\WerFault.exe
                  C:\Windows\SysWOW64\WerFault.exe -u -p 2056 -s 268
                  8⤵
                  • Program crash
                  PID:1800
              • C:\Windows\SysWOW64\WerFault.exe
                C:\Windows\SysWOW64\WerFault.exe -u -p 2936 -s 36
                7⤵
                • Loads dropped DLL
                • Program crash
                PID:2628

Network

MITRE ATT&CK Matrix ATT&CK v13

Persistence

Create or Modify System Process

1
T1543

Windows Service

1
T1543.003

Boot or Logon Autostart Execution

1
T1547

Registry Run Keys / Startup Folder

1
T1547.001

Privilege Escalation

Create or Modify System Process

1
T1543

Windows Service

1
T1543.003

Boot or Logon Autostart Execution

1
T1547

Registry Run Keys / Startup Folder

1
T1547.001

Defense Evasion

Modify Registry

3
T1112

Impair Defenses

2
T1562

Disable or Modify Tools

2
T1562.001

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\z9343511.exe
    Filesize

    892KB

    MD5

    0fa37f642f0bbc710ccdc27f7900d338

    SHA1

    62cd5069486f31b34ebb8556887d71c3fc2541be

    SHA256

    70f88710d42bb4cf853ee17858550bd933d7b5bd61b065e0aca990f8d2dbb007

    SHA512

    534623322ad7d4c1aa2818e337356dff50ac9e22d21876b6ff25763e39465f15a1677c6d0b4d4da093863efe4a4589b87211a49b02b37b948d5881a16e005b9f

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\z9343511.exe
    Filesize

    892KB

    MD5

    0fa37f642f0bbc710ccdc27f7900d338

    SHA1

    62cd5069486f31b34ebb8556887d71c3fc2541be

    SHA256

    70f88710d42bb4cf853ee17858550bd933d7b5bd61b065e0aca990f8d2dbb007

    SHA512

    534623322ad7d4c1aa2818e337356dff50ac9e22d21876b6ff25763e39465f15a1677c6d0b4d4da093863efe4a4589b87211a49b02b37b948d5881a16e005b9f

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\z0532921.exe
    Filesize

    709KB

    MD5

    b80183b0abac9c955e5ee10ca26376ec

    SHA1

    4cd7d14ce493ab22881433d8060da534edb69bf2

    SHA256

    4f51ab3cf5d83590978b4caaeab57bb871995e48e04ea219b00898f0da8eda0e

    SHA512

    156f3bf3ee881d8f36eaf9a2f549aa079eba5c8f51c552f167a16bf360e03e45f209ee8acb5f42590fe34987dd9bdea8dc7d3b2bcd05c02d6079da805abe9e63

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\z0532921.exe
    Filesize

    709KB

    MD5

    b80183b0abac9c955e5ee10ca26376ec

    SHA1

    4cd7d14ce493ab22881433d8060da534edb69bf2

    SHA256

    4f51ab3cf5d83590978b4caaeab57bb871995e48e04ea219b00898f0da8eda0e

    SHA512

    156f3bf3ee881d8f36eaf9a2f549aa079eba5c8f51c552f167a16bf360e03e45f209ee8acb5f42590fe34987dd9bdea8dc7d3b2bcd05c02d6079da805abe9e63

  • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\z8879212.exe
    Filesize

    526KB

    MD5

    7ddd70edc09447e0e47cf7fd2763d50a

    SHA1

    1fafc49a2cd3fbae411fe47721ac3bcd8be39f1f

    SHA256

    7cfe051c245923a8939bf9c57b2ef9cfd20f53a981399a9fe73e8d32b748a51c

    SHA512

    3d117fe7cf80ddbeaf5e61a9d0ccdd4a2e6f8c1b22336f55a65de77ecd9f2310c22c53aa6eb0e214fe372f5a0f3e45a81ecc4a5c954eacbc7753cb2639338e35

  • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\z8879212.exe
    Filesize

    526KB

    MD5

    7ddd70edc09447e0e47cf7fd2763d50a

    SHA1

    1fafc49a2cd3fbae411fe47721ac3bcd8be39f1f

    SHA256

    7cfe051c245923a8939bf9c57b2ef9cfd20f53a981399a9fe73e8d32b748a51c

    SHA512

    3d117fe7cf80ddbeaf5e61a9d0ccdd4a2e6f8c1b22336f55a65de77ecd9f2310c22c53aa6eb0e214fe372f5a0f3e45a81ecc4a5c954eacbc7753cb2639338e35

  • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\z3732890.exe
    Filesize

    296KB

    MD5

    15b564a1c891ee619b83d4614d4dd520

    SHA1

    f38e61fa2fc63d670c46b84f5e6d8e9a1ad36e97

    SHA256

    f6fec41a567a0b89afadfa424fd58433f5eb0794ce2af4404286f03f822b3b50

    SHA512

    f59aca73469403593691256d088f56de175f2a4406b6288040a41fd31ea4713653803150d29edab7c78ff3d8ca0979cd93a80775fdde75715bb5537149c2a703

  • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\z3732890.exe
    Filesize

    296KB

    MD5

    15b564a1c891ee619b83d4614d4dd520

    SHA1

    f38e61fa2fc63d670c46b84f5e6d8e9a1ad36e97

    SHA256

    f6fec41a567a0b89afadfa424fd58433f5eb0794ce2af4404286f03f822b3b50

    SHA512

    f59aca73469403593691256d088f56de175f2a4406b6288040a41fd31ea4713653803150d29edab7c78ff3d8ca0979cd93a80775fdde75715bb5537149c2a703

  • C:\Users\Admin\AppData\Local\Temp\IXP004.TMP\q8112196.exe
    Filesize

    11KB

    MD5

    f2beb8f47105e57c31af85fe1d119435

    SHA1

    9132afcff5bd9961507c5fb039de4bb5857e7ef5

    SHA256

    28f71325b472ca6a592ae1876f50cc5319c6cf2029996af074b51dd72b12e918

    SHA512

    616005cd7b8f8b5a1523f795fbfbb689d1bd0482e8ec3182298c0ceb0366913d2cffbddf61c06124beae211f8dcd26ab3e1885f060eaa8619dea518546c03b5d

  • C:\Users\Admin\AppData\Local\Temp\IXP004.TMP\q8112196.exe
    Filesize

    11KB

    MD5

    f2beb8f47105e57c31af85fe1d119435

    SHA1

    9132afcff5bd9961507c5fb039de4bb5857e7ef5

    SHA256

    28f71325b472ca6a592ae1876f50cc5319c6cf2029996af074b51dd72b12e918

    SHA512

    616005cd7b8f8b5a1523f795fbfbb689d1bd0482e8ec3182298c0ceb0366913d2cffbddf61c06124beae211f8dcd26ab3e1885f060eaa8619dea518546c03b5d

  • C:\Users\Admin\AppData\Local\Temp\IXP004.TMP\r0035227.exe
    Filesize

    276KB

    MD5

    45097c0f58dced28b150b4c6c25d51b3

    SHA1

    a0e97b97876c7a3120bfc9fd45643fff4b85e357

    SHA256

    e5075747cc242093d3780dfe0eb8d38e1db5d3cbda1a7d772f84896ee1f285cc

    SHA512

    0f4105b36d2d495931f0791d963e9193ea4c5f74bf1bf0f53d6529a30e4aeb89376b2103e95c9a9cdf65f5b5f0c2df5168be7fbe91da6527e4d3818faa366918

  • C:\Users\Admin\AppData\Local\Temp\IXP004.TMP\r0035227.exe
    Filesize

    276KB

    MD5

    45097c0f58dced28b150b4c6c25d51b3

    SHA1

    a0e97b97876c7a3120bfc9fd45643fff4b85e357

    SHA256

    e5075747cc242093d3780dfe0eb8d38e1db5d3cbda1a7d772f84896ee1f285cc

    SHA512

    0f4105b36d2d495931f0791d963e9193ea4c5f74bf1bf0f53d6529a30e4aeb89376b2103e95c9a9cdf65f5b5f0c2df5168be7fbe91da6527e4d3818faa366918

  • C:\Users\Admin\AppData\Local\Temp\IXP004.TMP\r0035227.exe
    Filesize

    276KB

    MD5

    45097c0f58dced28b150b4c6c25d51b3

    SHA1

    a0e97b97876c7a3120bfc9fd45643fff4b85e357

    SHA256

    e5075747cc242093d3780dfe0eb8d38e1db5d3cbda1a7d772f84896ee1f285cc

    SHA512

    0f4105b36d2d495931f0791d963e9193ea4c5f74bf1bf0f53d6529a30e4aeb89376b2103e95c9a9cdf65f5b5f0c2df5168be7fbe91da6527e4d3818faa366918

  • \Users\Admin\AppData\Local\Temp\IXP000.TMP\z9343511.exe
    Filesize

    892KB

    MD5

    0fa37f642f0bbc710ccdc27f7900d338

    SHA1

    62cd5069486f31b34ebb8556887d71c3fc2541be

    SHA256

    70f88710d42bb4cf853ee17858550bd933d7b5bd61b065e0aca990f8d2dbb007

    SHA512

    534623322ad7d4c1aa2818e337356dff50ac9e22d21876b6ff25763e39465f15a1677c6d0b4d4da093863efe4a4589b87211a49b02b37b948d5881a16e005b9f

  • \Users\Admin\AppData\Local\Temp\IXP000.TMP\z9343511.exe
    Filesize

    892KB

    MD5

    0fa37f642f0bbc710ccdc27f7900d338

    SHA1

    62cd5069486f31b34ebb8556887d71c3fc2541be

    SHA256

    70f88710d42bb4cf853ee17858550bd933d7b5bd61b065e0aca990f8d2dbb007

    SHA512

    534623322ad7d4c1aa2818e337356dff50ac9e22d21876b6ff25763e39465f15a1677c6d0b4d4da093863efe4a4589b87211a49b02b37b948d5881a16e005b9f

  • \Users\Admin\AppData\Local\Temp\IXP001.TMP\z0532921.exe
    Filesize

    709KB

    MD5

    b80183b0abac9c955e5ee10ca26376ec

    SHA1

    4cd7d14ce493ab22881433d8060da534edb69bf2

    SHA256

    4f51ab3cf5d83590978b4caaeab57bb871995e48e04ea219b00898f0da8eda0e

    SHA512

    156f3bf3ee881d8f36eaf9a2f549aa079eba5c8f51c552f167a16bf360e03e45f209ee8acb5f42590fe34987dd9bdea8dc7d3b2bcd05c02d6079da805abe9e63

  • \Users\Admin\AppData\Local\Temp\IXP001.TMP\z0532921.exe
    Filesize

    709KB

    MD5

    b80183b0abac9c955e5ee10ca26376ec

    SHA1

    4cd7d14ce493ab22881433d8060da534edb69bf2

    SHA256

    4f51ab3cf5d83590978b4caaeab57bb871995e48e04ea219b00898f0da8eda0e

    SHA512

    156f3bf3ee881d8f36eaf9a2f549aa079eba5c8f51c552f167a16bf360e03e45f209ee8acb5f42590fe34987dd9bdea8dc7d3b2bcd05c02d6079da805abe9e63

  • \Users\Admin\AppData\Local\Temp\IXP002.TMP\z8879212.exe
    Filesize

    526KB

    MD5

    7ddd70edc09447e0e47cf7fd2763d50a

    SHA1

    1fafc49a2cd3fbae411fe47721ac3bcd8be39f1f

    SHA256

    7cfe051c245923a8939bf9c57b2ef9cfd20f53a981399a9fe73e8d32b748a51c

    SHA512

    3d117fe7cf80ddbeaf5e61a9d0ccdd4a2e6f8c1b22336f55a65de77ecd9f2310c22c53aa6eb0e214fe372f5a0f3e45a81ecc4a5c954eacbc7753cb2639338e35

  • \Users\Admin\AppData\Local\Temp\IXP002.TMP\z8879212.exe
    Filesize

    526KB

    MD5

    7ddd70edc09447e0e47cf7fd2763d50a

    SHA1

    1fafc49a2cd3fbae411fe47721ac3bcd8be39f1f

    SHA256

    7cfe051c245923a8939bf9c57b2ef9cfd20f53a981399a9fe73e8d32b748a51c

    SHA512

    3d117fe7cf80ddbeaf5e61a9d0ccdd4a2e6f8c1b22336f55a65de77ecd9f2310c22c53aa6eb0e214fe372f5a0f3e45a81ecc4a5c954eacbc7753cb2639338e35

  • \Users\Admin\AppData\Local\Temp\IXP003.TMP\z3732890.exe
    Filesize

    296KB

    MD5

    15b564a1c891ee619b83d4614d4dd520

    SHA1

    f38e61fa2fc63d670c46b84f5e6d8e9a1ad36e97

    SHA256

    f6fec41a567a0b89afadfa424fd58433f5eb0794ce2af4404286f03f822b3b50

    SHA512

    f59aca73469403593691256d088f56de175f2a4406b6288040a41fd31ea4713653803150d29edab7c78ff3d8ca0979cd93a80775fdde75715bb5537149c2a703

  • \Users\Admin\AppData\Local\Temp\IXP003.TMP\z3732890.exe
    Filesize

    296KB

    MD5

    15b564a1c891ee619b83d4614d4dd520

    SHA1

    f38e61fa2fc63d670c46b84f5e6d8e9a1ad36e97

    SHA256

    f6fec41a567a0b89afadfa424fd58433f5eb0794ce2af4404286f03f822b3b50

    SHA512

    f59aca73469403593691256d088f56de175f2a4406b6288040a41fd31ea4713653803150d29edab7c78ff3d8ca0979cd93a80775fdde75715bb5537149c2a703

  • \Users\Admin\AppData\Local\Temp\IXP004.TMP\q8112196.exe
    Filesize

    11KB

    MD5

    f2beb8f47105e57c31af85fe1d119435

    SHA1

    9132afcff5bd9961507c5fb039de4bb5857e7ef5

    SHA256

    28f71325b472ca6a592ae1876f50cc5319c6cf2029996af074b51dd72b12e918

    SHA512

    616005cd7b8f8b5a1523f795fbfbb689d1bd0482e8ec3182298c0ceb0366913d2cffbddf61c06124beae211f8dcd26ab3e1885f060eaa8619dea518546c03b5d

  • \Users\Admin\AppData\Local\Temp\IXP004.TMP\r0035227.exe
    Filesize

    276KB

    MD5

    45097c0f58dced28b150b4c6c25d51b3

    SHA1

    a0e97b97876c7a3120bfc9fd45643fff4b85e357

    SHA256

    e5075747cc242093d3780dfe0eb8d38e1db5d3cbda1a7d772f84896ee1f285cc

    SHA512

    0f4105b36d2d495931f0791d963e9193ea4c5f74bf1bf0f53d6529a30e4aeb89376b2103e95c9a9cdf65f5b5f0c2df5168be7fbe91da6527e4d3818faa366918

  • \Users\Admin\AppData\Local\Temp\IXP004.TMP\r0035227.exe
    Filesize

    276KB

    MD5

    45097c0f58dced28b150b4c6c25d51b3

    SHA1

    a0e97b97876c7a3120bfc9fd45643fff4b85e357

    SHA256

    e5075747cc242093d3780dfe0eb8d38e1db5d3cbda1a7d772f84896ee1f285cc

    SHA512

    0f4105b36d2d495931f0791d963e9193ea4c5f74bf1bf0f53d6529a30e4aeb89376b2103e95c9a9cdf65f5b5f0c2df5168be7fbe91da6527e4d3818faa366918

  • \Users\Admin\AppData\Local\Temp\IXP004.TMP\r0035227.exe
    Filesize

    276KB

    MD5

    45097c0f58dced28b150b4c6c25d51b3

    SHA1

    a0e97b97876c7a3120bfc9fd45643fff4b85e357

    SHA256

    e5075747cc242093d3780dfe0eb8d38e1db5d3cbda1a7d772f84896ee1f285cc

    SHA512

    0f4105b36d2d495931f0791d963e9193ea4c5f74bf1bf0f53d6529a30e4aeb89376b2103e95c9a9cdf65f5b5f0c2df5168be7fbe91da6527e4d3818faa366918

  • \Users\Admin\AppData\Local\Temp\IXP004.TMP\r0035227.exe
    Filesize

    276KB

    MD5

    45097c0f58dced28b150b4c6c25d51b3

    SHA1

    a0e97b97876c7a3120bfc9fd45643fff4b85e357

    SHA256

    e5075747cc242093d3780dfe0eb8d38e1db5d3cbda1a7d772f84896ee1f285cc

    SHA512

    0f4105b36d2d495931f0791d963e9193ea4c5f74bf1bf0f53d6529a30e4aeb89376b2103e95c9a9cdf65f5b5f0c2df5168be7fbe91da6527e4d3818faa366918

  • \Users\Admin\AppData\Local\Temp\IXP004.TMP\r0035227.exe
    Filesize

    276KB

    MD5

    45097c0f58dced28b150b4c6c25d51b3

    SHA1

    a0e97b97876c7a3120bfc9fd45643fff4b85e357

    SHA256

    e5075747cc242093d3780dfe0eb8d38e1db5d3cbda1a7d772f84896ee1f285cc

    SHA512

    0f4105b36d2d495931f0791d963e9193ea4c5f74bf1bf0f53d6529a30e4aeb89376b2103e95c9a9cdf65f5b5f0c2df5168be7fbe91da6527e4d3818faa366918

  • \Users\Admin\AppData\Local\Temp\IXP004.TMP\r0035227.exe
    Filesize

    276KB

    MD5

    45097c0f58dced28b150b4c6c25d51b3

    SHA1

    a0e97b97876c7a3120bfc9fd45643fff4b85e357

    SHA256

    e5075747cc242093d3780dfe0eb8d38e1db5d3cbda1a7d772f84896ee1f285cc

    SHA512

    0f4105b36d2d495931f0791d963e9193ea4c5f74bf1bf0f53d6529a30e4aeb89376b2103e95c9a9cdf65f5b5f0c2df5168be7fbe91da6527e4d3818faa366918

  • \Users\Admin\AppData\Local\Temp\IXP004.TMP\r0035227.exe
    Filesize

    276KB

    MD5

    45097c0f58dced28b150b4c6c25d51b3

    SHA1

    a0e97b97876c7a3120bfc9fd45643fff4b85e357

    SHA256

    e5075747cc242093d3780dfe0eb8d38e1db5d3cbda1a7d772f84896ee1f285cc

    SHA512

    0f4105b36d2d495931f0791d963e9193ea4c5f74bf1bf0f53d6529a30e4aeb89376b2103e95c9a9cdf65f5b5f0c2df5168be7fbe91da6527e4d3818faa366918

  • memory/2056-62-0x0000000000400000-0x0000000000428000-memory.dmp
    Filesize

    160KB

  • memory/2056-61-0x0000000000400000-0x0000000000428000-memory.dmp
    Filesize

    160KB

  • memory/2056-63-0x0000000000400000-0x0000000000428000-memory.dmp
    Filesize

    160KB

  • memory/2056-64-0x0000000000400000-0x0000000000428000-memory.dmp
    Filesize

    160KB

  • memory/2056-65-0x0000000000400000-0x0000000000428000-memory.dmp
    Filesize

    160KB

  • memory/2056-66-0x0000000000400000-0x0000000000428000-memory.dmp
    Filesize

    160KB

  • memory/2056-67-0x00000000FFFDE000-0x00000000FFFDF000-memory.dmp
    Filesize

    4KB

  • memory/2056-68-0x0000000000400000-0x0000000000428000-memory.dmp
    Filesize

    160KB

  • memory/2056-70-0x0000000000400000-0x0000000000428000-memory.dmp
    Filesize

    160KB

  • memory/2056-72-0x0000000000400000-0x0000000000428000-memory.dmp
    Filesize

    160KB

  • memory/2572-51-0x000007FEF5330000-0x000007FEF5D1C000-memory.dmp
    Filesize

    9.9MB

  • memory/2572-50-0x000007FEF5330000-0x000007FEF5D1C000-memory.dmp
    Filesize

    9.9MB

  • memory/2572-49-0x000007FEF5330000-0x000007FEF5D1C000-memory.dmp
    Filesize

    9.9MB

  • memory/2572-48-0x00000000011E0000-0x00000000011EA000-memory.dmp
    Filesize

    40KB