Analysis

  • max time kernel
    122s
  • max time network
    144s
  • platform
    windows7_x64
  • resource
    win7-20230831-en
  • resource tags

    arch:x64arch:x86image:win7-20230831-enlocale:en-usos:windows7-x64system
  • submitted
    10-10-2023 22:03

General

  • Target

    d8076ef5647c95dd39b2add05950119f7e0f004baea9314da7b0084527225aa7.exe

  • Size

    1.0MB

  • MD5

    977594c0e470257fcf0e9ed8a841b2d5

  • SHA1

    b98d5a4e71c003c2bdd00273e6a199d7eca6689c

  • SHA256

    d8076ef5647c95dd39b2add05950119f7e0f004baea9314da7b0084527225aa7

  • SHA512

    b81566cece0468c385e801fa718a937049211f1ed7a2c141510800e98778420fd8782fa3c752b77ba8f38e4c09520f3c5e0030c071b0858994186277e19306ee

  • SSDEEP

    12288:DMrgy90/uFDnu6opvwpYiuvCSexuh8J2P/w4c5suKcR7W9w/CsZFgyq35lr9WwyF:vyuuFbu4cvn/gsuD6YRiWwspfxJl

Malware Config

Extracted

Family

mystic

C2

http://5.42.92.211/loghub/master

Signatures

  • Detect Mystic stealer payload 8 IoCs
  • Detects Healer an antivirus disabler dropper 4 IoCs
  • Healer

    Healer an antivirus disabler dropper.

  • Modifies Windows Defender Real-time Protection settings 3 TTPs 6 IoCs
  • Mystic

    Mystic is an infostealer written in C++.

  • Executes dropped EXE 6 IoCs
  • Loads dropped DLL 16 IoCs
  • Windows security modification 2 TTPs 2 IoCs
  • Adds Run key to start application 2 TTPs 5 IoCs
  • Suspicious use of SetThreadContext 1 IoCs
  • Program crash 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 2 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of WriteProcessMemory 63 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\d8076ef5647c95dd39b2add05950119f7e0f004baea9314da7b0084527225aa7.exe
    "C:\Users\Admin\AppData\Local\Temp\d8076ef5647c95dd39b2add05950119f7e0f004baea9314da7b0084527225aa7.exe"
    1⤵
    • Loads dropped DLL
    • Adds Run key to start application
    • Suspicious use of WriteProcessMemory
    PID:1816
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\z1702702.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\z1702702.exe
      2⤵
      • Executes dropped EXE
      • Loads dropped DLL
      • Adds Run key to start application
      • Suspicious use of WriteProcessMemory
      PID:1712
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\z6682940.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\z6682940.exe
        3⤵
        • Executes dropped EXE
        • Loads dropped DLL
        • Adds Run key to start application
        • Suspicious use of WriteProcessMemory
        PID:2352
        • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\z0056325.exe
          C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\z0056325.exe
          4⤵
          • Executes dropped EXE
          • Loads dropped DLL
          • Adds Run key to start application
          • Suspicious use of WriteProcessMemory
          PID:2744
          • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\z3323107.exe
            C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\z3323107.exe
            5⤵
            • Executes dropped EXE
            • Loads dropped DLL
            • Adds Run key to start application
            • Suspicious use of WriteProcessMemory
            PID:2656
            • C:\Users\Admin\AppData\Local\Temp\IXP004.TMP\q9677891.exe
              C:\Users\Admin\AppData\Local\Temp\IXP004.TMP\q9677891.exe
              6⤵
              • Modifies Windows Defender Real-time Protection settings
              • Executes dropped EXE
              • Windows security modification
              • Suspicious behavior: EnumeratesProcesses
              • Suspicious use of AdjustPrivilegeToken
              PID:3028
            • C:\Users\Admin\AppData\Local\Temp\IXP004.TMP\r0370001.exe
              C:\Users\Admin\AppData\Local\Temp\IXP004.TMP\r0370001.exe
              6⤵
              • Executes dropped EXE
              • Loads dropped DLL
              • Suspicious use of SetThreadContext
              • Suspicious use of WriteProcessMemory
              PID:2668
              • C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe
                "C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"
                7⤵
                  PID:2584
                • C:\Windows\SysWOW64\WerFault.exe
                  C:\Windows\SysWOW64\WerFault.exe -u -p 2668 -s 276
                  7⤵
                  • Loads dropped DLL
                  • Program crash
                  PID:2120

    Network

    MITRE ATT&CK Matrix ATT&CK v13

    Persistence

    Create or Modify System Process

    1
    T1543

    Windows Service

    1
    T1543.003

    Boot or Logon Autostart Execution

    1
    T1547

    Registry Run Keys / Startup Folder

    1
    T1547.001

    Privilege Escalation

    Create or Modify System Process

    1
    T1543

    Windows Service

    1
    T1543.003

    Boot or Logon Autostart Execution

    1
    T1547

    Registry Run Keys / Startup Folder

    1
    T1547.001

    Defense Evasion

    Modify Registry

    3
    T1112

    Impair Defenses

    2
    T1562

    Disable or Modify Tools

    2
    T1562.001

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\z1702702.exe
      Filesize

      967KB

      MD5

      0e0a61be5279511b09e680b8ad209eda

      SHA1

      07c841ec50be2488ef8e98111da70f9e13adc61c

      SHA256

      7fa4bfcbe487f840c047b310fefd61eac724e239e7c0f016e0ee4b6db76c9012

      SHA512

      9ac6064b5ac7454a31f37b86823b52db53f1ab06fedcb3be46a245a87539267820dbf70ace692dc200c2debc997b0ef32e311568ceaf07caaab0c32e8c89ad3a

    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\z1702702.exe
      Filesize

      967KB

      MD5

      0e0a61be5279511b09e680b8ad209eda

      SHA1

      07c841ec50be2488ef8e98111da70f9e13adc61c

      SHA256

      7fa4bfcbe487f840c047b310fefd61eac724e239e7c0f016e0ee4b6db76c9012

      SHA512

      9ac6064b5ac7454a31f37b86823b52db53f1ab06fedcb3be46a245a87539267820dbf70ace692dc200c2debc997b0ef32e311568ceaf07caaab0c32e8c89ad3a

    • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\z6682940.exe
      Filesize

      789KB

      MD5

      f0bc65cda36919a25d5363c75b3e69ef

      SHA1

      90b011386bcb308a914fcda629a96d39f01ac536

      SHA256

      0abfd51adf215b32766536115335d4194e8feee03c890274b1f6bb650b403971

      SHA512

      295a2e4e31e2e7906a9a21d7338b16a4327d5583b202718b01c2924a5e7091806241947ef808212fb277049abb2967403b5e8936a7b623a70c7b9814c95dc0da

    • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\z6682940.exe
      Filesize

      789KB

      MD5

      f0bc65cda36919a25d5363c75b3e69ef

      SHA1

      90b011386bcb308a914fcda629a96d39f01ac536

      SHA256

      0abfd51adf215b32766536115335d4194e8feee03c890274b1f6bb650b403971

      SHA512

      295a2e4e31e2e7906a9a21d7338b16a4327d5583b202718b01c2924a5e7091806241947ef808212fb277049abb2967403b5e8936a7b623a70c7b9814c95dc0da

    • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\z0056325.exe
      Filesize

      606KB

      MD5

      fad7c4b585f7470572a998ba94bfac33

      SHA1

      03ecd5126f0fa22769dffbe77e841e47608c4361

      SHA256

      10d5da321ae5726a126d977d9c51041bedcfe0a9a9bc9c3ba2c84f363707b947

      SHA512

      b6eecb19388a37635af7501b80e19efff23fa124343ad914008d6f1e1286baf901966cbf241f799f62290c2539e486cb42cae23d2c3f9219a7698e738c9234a2

    • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\z0056325.exe
      Filesize

      606KB

      MD5

      fad7c4b585f7470572a998ba94bfac33

      SHA1

      03ecd5126f0fa22769dffbe77e841e47608c4361

      SHA256

      10d5da321ae5726a126d977d9c51041bedcfe0a9a9bc9c3ba2c84f363707b947

      SHA512

      b6eecb19388a37635af7501b80e19efff23fa124343ad914008d6f1e1286baf901966cbf241f799f62290c2539e486cb42cae23d2c3f9219a7698e738c9234a2

    • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\z3323107.exe
      Filesize

      335KB

      MD5

      11b072d189aca7e572f2826c4cdb7975

      SHA1

      1c359f6f5da10caabea5a30b485f5be7968275d8

      SHA256

      47d3603fa84847f1bcd00e80abf2f064f9b54f967ede01f967888ebaee27e872

      SHA512

      7591cf4292a7efa0b63e0e192a27a2aeeb58c3638cafea1bf98ee33099739ff563a6c92bbf4b0a3bfaa9b27b09e733647caa738ee63d10aeecd49609d9f64cb5

    • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\z3323107.exe
      Filesize

      335KB

      MD5

      11b072d189aca7e572f2826c4cdb7975

      SHA1

      1c359f6f5da10caabea5a30b485f5be7968275d8

      SHA256

      47d3603fa84847f1bcd00e80abf2f064f9b54f967ede01f967888ebaee27e872

      SHA512

      7591cf4292a7efa0b63e0e192a27a2aeeb58c3638cafea1bf98ee33099739ff563a6c92bbf4b0a3bfaa9b27b09e733647caa738ee63d10aeecd49609d9f64cb5

    • C:\Users\Admin\AppData\Local\Temp\IXP004.TMP\q9677891.exe
      Filesize

      11KB

      MD5

      fbf65b9904bf8833e09530f06f4fe032

      SHA1

      8c3f9e3e7aab0694931a6423de920deef2558e17

      SHA256

      98dc95e8cb0a469932bbadf9a2ae7319533a331e85e5c862f9d06fada3255145

      SHA512

      e1cf3cc6e5fc60533dc9afa48cbcbc394518c4cb2866be334dc7d215cbed2943dfc00ee859bb5159a706e6b9128ce6a93313a796dee1f6c17dc03d7df6dc1f5b

    • C:\Users\Admin\AppData\Local\Temp\IXP004.TMP\q9677891.exe
      Filesize

      11KB

      MD5

      fbf65b9904bf8833e09530f06f4fe032

      SHA1

      8c3f9e3e7aab0694931a6423de920deef2558e17

      SHA256

      98dc95e8cb0a469932bbadf9a2ae7319533a331e85e5c862f9d06fada3255145

      SHA512

      e1cf3cc6e5fc60533dc9afa48cbcbc394518c4cb2866be334dc7d215cbed2943dfc00ee859bb5159a706e6b9128ce6a93313a796dee1f6c17dc03d7df6dc1f5b

    • C:\Users\Admin\AppData\Local\Temp\IXP004.TMP\r0370001.exe
      Filesize

      356KB

      MD5

      6c0c40c8a9ef49b50641aaa782fc6d46

      SHA1

      f12adb26ec919c67ad6db1f5670878ed9f62b771

      SHA256

      b3026162e48f66584b6acf0f543299371d82813e82c5ba785b1f343b257eeb76

      SHA512

      59978aae9f4f7eecac9130fc58fb57c06111c0a5830e7848f1dc2436782b1398f450e3f869d72115237e679cbdd79efccefc6d68b3140cb97c2e244fcc11bc36

    • C:\Users\Admin\AppData\Local\Temp\IXP004.TMP\r0370001.exe
      Filesize

      356KB

      MD5

      6c0c40c8a9ef49b50641aaa782fc6d46

      SHA1

      f12adb26ec919c67ad6db1f5670878ed9f62b771

      SHA256

      b3026162e48f66584b6acf0f543299371d82813e82c5ba785b1f343b257eeb76

      SHA512

      59978aae9f4f7eecac9130fc58fb57c06111c0a5830e7848f1dc2436782b1398f450e3f869d72115237e679cbdd79efccefc6d68b3140cb97c2e244fcc11bc36

    • C:\Users\Admin\AppData\Local\Temp\IXP004.TMP\r0370001.exe
      Filesize

      356KB

      MD5

      6c0c40c8a9ef49b50641aaa782fc6d46

      SHA1

      f12adb26ec919c67ad6db1f5670878ed9f62b771

      SHA256

      b3026162e48f66584b6acf0f543299371d82813e82c5ba785b1f343b257eeb76

      SHA512

      59978aae9f4f7eecac9130fc58fb57c06111c0a5830e7848f1dc2436782b1398f450e3f869d72115237e679cbdd79efccefc6d68b3140cb97c2e244fcc11bc36

    • \Users\Admin\AppData\Local\Temp\IXP000.TMP\z1702702.exe
      Filesize

      967KB

      MD5

      0e0a61be5279511b09e680b8ad209eda

      SHA1

      07c841ec50be2488ef8e98111da70f9e13adc61c

      SHA256

      7fa4bfcbe487f840c047b310fefd61eac724e239e7c0f016e0ee4b6db76c9012

      SHA512

      9ac6064b5ac7454a31f37b86823b52db53f1ab06fedcb3be46a245a87539267820dbf70ace692dc200c2debc997b0ef32e311568ceaf07caaab0c32e8c89ad3a

    • \Users\Admin\AppData\Local\Temp\IXP000.TMP\z1702702.exe
      Filesize

      967KB

      MD5

      0e0a61be5279511b09e680b8ad209eda

      SHA1

      07c841ec50be2488ef8e98111da70f9e13adc61c

      SHA256

      7fa4bfcbe487f840c047b310fefd61eac724e239e7c0f016e0ee4b6db76c9012

      SHA512

      9ac6064b5ac7454a31f37b86823b52db53f1ab06fedcb3be46a245a87539267820dbf70ace692dc200c2debc997b0ef32e311568ceaf07caaab0c32e8c89ad3a

    • \Users\Admin\AppData\Local\Temp\IXP001.TMP\z6682940.exe
      Filesize

      789KB

      MD5

      f0bc65cda36919a25d5363c75b3e69ef

      SHA1

      90b011386bcb308a914fcda629a96d39f01ac536

      SHA256

      0abfd51adf215b32766536115335d4194e8feee03c890274b1f6bb650b403971

      SHA512

      295a2e4e31e2e7906a9a21d7338b16a4327d5583b202718b01c2924a5e7091806241947ef808212fb277049abb2967403b5e8936a7b623a70c7b9814c95dc0da

    • \Users\Admin\AppData\Local\Temp\IXP001.TMP\z6682940.exe
      Filesize

      789KB

      MD5

      f0bc65cda36919a25d5363c75b3e69ef

      SHA1

      90b011386bcb308a914fcda629a96d39f01ac536

      SHA256

      0abfd51adf215b32766536115335d4194e8feee03c890274b1f6bb650b403971

      SHA512

      295a2e4e31e2e7906a9a21d7338b16a4327d5583b202718b01c2924a5e7091806241947ef808212fb277049abb2967403b5e8936a7b623a70c7b9814c95dc0da

    • \Users\Admin\AppData\Local\Temp\IXP002.TMP\z0056325.exe
      Filesize

      606KB

      MD5

      fad7c4b585f7470572a998ba94bfac33

      SHA1

      03ecd5126f0fa22769dffbe77e841e47608c4361

      SHA256

      10d5da321ae5726a126d977d9c51041bedcfe0a9a9bc9c3ba2c84f363707b947

      SHA512

      b6eecb19388a37635af7501b80e19efff23fa124343ad914008d6f1e1286baf901966cbf241f799f62290c2539e486cb42cae23d2c3f9219a7698e738c9234a2

    • \Users\Admin\AppData\Local\Temp\IXP002.TMP\z0056325.exe
      Filesize

      606KB

      MD5

      fad7c4b585f7470572a998ba94bfac33

      SHA1

      03ecd5126f0fa22769dffbe77e841e47608c4361

      SHA256

      10d5da321ae5726a126d977d9c51041bedcfe0a9a9bc9c3ba2c84f363707b947

      SHA512

      b6eecb19388a37635af7501b80e19efff23fa124343ad914008d6f1e1286baf901966cbf241f799f62290c2539e486cb42cae23d2c3f9219a7698e738c9234a2

    • \Users\Admin\AppData\Local\Temp\IXP003.TMP\z3323107.exe
      Filesize

      335KB

      MD5

      11b072d189aca7e572f2826c4cdb7975

      SHA1

      1c359f6f5da10caabea5a30b485f5be7968275d8

      SHA256

      47d3603fa84847f1bcd00e80abf2f064f9b54f967ede01f967888ebaee27e872

      SHA512

      7591cf4292a7efa0b63e0e192a27a2aeeb58c3638cafea1bf98ee33099739ff563a6c92bbf4b0a3bfaa9b27b09e733647caa738ee63d10aeecd49609d9f64cb5

    • \Users\Admin\AppData\Local\Temp\IXP003.TMP\z3323107.exe
      Filesize

      335KB

      MD5

      11b072d189aca7e572f2826c4cdb7975

      SHA1

      1c359f6f5da10caabea5a30b485f5be7968275d8

      SHA256

      47d3603fa84847f1bcd00e80abf2f064f9b54f967ede01f967888ebaee27e872

      SHA512

      7591cf4292a7efa0b63e0e192a27a2aeeb58c3638cafea1bf98ee33099739ff563a6c92bbf4b0a3bfaa9b27b09e733647caa738ee63d10aeecd49609d9f64cb5

    • \Users\Admin\AppData\Local\Temp\IXP004.TMP\q9677891.exe
      Filesize

      11KB

      MD5

      fbf65b9904bf8833e09530f06f4fe032

      SHA1

      8c3f9e3e7aab0694931a6423de920deef2558e17

      SHA256

      98dc95e8cb0a469932bbadf9a2ae7319533a331e85e5c862f9d06fada3255145

      SHA512

      e1cf3cc6e5fc60533dc9afa48cbcbc394518c4cb2866be334dc7d215cbed2943dfc00ee859bb5159a706e6b9128ce6a93313a796dee1f6c17dc03d7df6dc1f5b

    • \Users\Admin\AppData\Local\Temp\IXP004.TMP\r0370001.exe
      Filesize

      356KB

      MD5

      6c0c40c8a9ef49b50641aaa782fc6d46

      SHA1

      f12adb26ec919c67ad6db1f5670878ed9f62b771

      SHA256

      b3026162e48f66584b6acf0f543299371d82813e82c5ba785b1f343b257eeb76

      SHA512

      59978aae9f4f7eecac9130fc58fb57c06111c0a5830e7848f1dc2436782b1398f450e3f869d72115237e679cbdd79efccefc6d68b3140cb97c2e244fcc11bc36

    • \Users\Admin\AppData\Local\Temp\IXP004.TMP\r0370001.exe
      Filesize

      356KB

      MD5

      6c0c40c8a9ef49b50641aaa782fc6d46

      SHA1

      f12adb26ec919c67ad6db1f5670878ed9f62b771

      SHA256

      b3026162e48f66584b6acf0f543299371d82813e82c5ba785b1f343b257eeb76

      SHA512

      59978aae9f4f7eecac9130fc58fb57c06111c0a5830e7848f1dc2436782b1398f450e3f869d72115237e679cbdd79efccefc6d68b3140cb97c2e244fcc11bc36

    • \Users\Admin\AppData\Local\Temp\IXP004.TMP\r0370001.exe
      Filesize

      356KB

      MD5

      6c0c40c8a9ef49b50641aaa782fc6d46

      SHA1

      f12adb26ec919c67ad6db1f5670878ed9f62b771

      SHA256

      b3026162e48f66584b6acf0f543299371d82813e82c5ba785b1f343b257eeb76

      SHA512

      59978aae9f4f7eecac9130fc58fb57c06111c0a5830e7848f1dc2436782b1398f450e3f869d72115237e679cbdd79efccefc6d68b3140cb97c2e244fcc11bc36

    • \Users\Admin\AppData\Local\Temp\IXP004.TMP\r0370001.exe
      Filesize

      356KB

      MD5

      6c0c40c8a9ef49b50641aaa782fc6d46

      SHA1

      f12adb26ec919c67ad6db1f5670878ed9f62b771

      SHA256

      b3026162e48f66584b6acf0f543299371d82813e82c5ba785b1f343b257eeb76

      SHA512

      59978aae9f4f7eecac9130fc58fb57c06111c0a5830e7848f1dc2436782b1398f450e3f869d72115237e679cbdd79efccefc6d68b3140cb97c2e244fcc11bc36

    • \Users\Admin\AppData\Local\Temp\IXP004.TMP\r0370001.exe
      Filesize

      356KB

      MD5

      6c0c40c8a9ef49b50641aaa782fc6d46

      SHA1

      f12adb26ec919c67ad6db1f5670878ed9f62b771

      SHA256

      b3026162e48f66584b6acf0f543299371d82813e82c5ba785b1f343b257eeb76

      SHA512

      59978aae9f4f7eecac9130fc58fb57c06111c0a5830e7848f1dc2436782b1398f450e3f869d72115237e679cbdd79efccefc6d68b3140cb97c2e244fcc11bc36

    • \Users\Admin\AppData\Local\Temp\IXP004.TMP\r0370001.exe
      Filesize

      356KB

      MD5

      6c0c40c8a9ef49b50641aaa782fc6d46

      SHA1

      f12adb26ec919c67ad6db1f5670878ed9f62b771

      SHA256

      b3026162e48f66584b6acf0f543299371d82813e82c5ba785b1f343b257eeb76

      SHA512

      59978aae9f4f7eecac9130fc58fb57c06111c0a5830e7848f1dc2436782b1398f450e3f869d72115237e679cbdd79efccefc6d68b3140cb97c2e244fcc11bc36

    • \Users\Admin\AppData\Local\Temp\IXP004.TMP\r0370001.exe
      Filesize

      356KB

      MD5

      6c0c40c8a9ef49b50641aaa782fc6d46

      SHA1

      f12adb26ec919c67ad6db1f5670878ed9f62b771

      SHA256

      b3026162e48f66584b6acf0f543299371d82813e82c5ba785b1f343b257eeb76

      SHA512

      59978aae9f4f7eecac9130fc58fb57c06111c0a5830e7848f1dc2436782b1398f450e3f869d72115237e679cbdd79efccefc6d68b3140cb97c2e244fcc11bc36

    • memory/2584-65-0x0000000000400000-0x0000000000428000-memory.dmp
      Filesize

      160KB

    • memory/2584-72-0x0000000000400000-0x0000000000428000-memory.dmp
      Filesize

      160KB

    • memory/2584-67-0x0000000000400000-0x0000000000428000-memory.dmp
      Filesize

      160KB

    • memory/2584-68-0x0000000000400000-0x0000000000428000-memory.dmp
      Filesize

      160KB

    • memory/2584-61-0x0000000000400000-0x0000000000428000-memory.dmp
      Filesize

      160KB

    • memory/2584-66-0x0000000000400000-0x0000000000428000-memory.dmp
      Filesize

      160KB

    • memory/2584-69-0x00000000FFFDE000-0x00000000FFFDF000-memory.dmp
      Filesize

      4KB

    • memory/2584-63-0x0000000000400000-0x0000000000428000-memory.dmp
      Filesize

      160KB

    • memory/2584-74-0x0000000000400000-0x0000000000428000-memory.dmp
      Filesize

      160KB

    • memory/2584-75-0x0000000000400000-0x0000000000428000-memory.dmp
      Filesize

      160KB

    • memory/2584-70-0x0000000000400000-0x0000000000428000-memory.dmp
      Filesize

      160KB

    • memory/2584-80-0x0000000000400000-0x0000000000428000-memory.dmp
      Filesize

      160KB

    • memory/3028-50-0x000007FEF5D80000-0x000007FEF676C000-memory.dmp
      Filesize

      9.9MB

    • memory/3028-49-0x000007FEF5D80000-0x000007FEF676C000-memory.dmp
      Filesize

      9.9MB

    • memory/3028-48-0x0000000000970000-0x000000000097A000-memory.dmp
      Filesize

      40KB

    • memory/3028-51-0x000007FEF5D80000-0x000007FEF676C000-memory.dmp
      Filesize

      9.9MB