Analysis

  • max time kernel
    117s
  • max time network
    129s
  • platform
    windows7_x64
  • resource
    win7-20230831-en
  • resource tags

    arch:x64arch:x86image:win7-20230831-enlocale:en-usos:windows7-x64system
  • submitted
    10-10-2023 22:03

General

  • Target

    cc877a6758666b7cc93b104f64fe10e6.exe

  • Size

    1.0MB

  • MD5

    cc877a6758666b7cc93b104f64fe10e6

  • SHA1

    a3750bacf4316ce1a35ca0dc2939cf222eccbf1d

  • SHA256

    3f05fa13fc8fa66ccce4360bd4579998b081cfb096faf148e7df1a84f487dad7

  • SHA512

    8aecc5400349f5390b8a2b62e792172eeebd6f419d3f0855d534ba98c5da2fe4dfa54d62b9ccb9993e103bcd0e074a00fac330752f91bdfee71ed798bdaf4da9

  • SSDEEP

    12288:9Mriy90DO2jm/aTCHWrGRRNHVc5MXvxfCx5sJwzih14ZwcWqFSVl2ZXZPLPKs+hU:by6jTfkRcWpax5qw2r4ScGVgvTmZF7S

Malware Config

Signatures

  • Detect Mystic stealer payload 6 IoCs
  • Detects Healer an antivirus disabler dropper 4 IoCs
  • Healer

    Healer an antivirus disabler dropper.

  • Modifies Windows Defender Real-time Protection settings 3 TTPs 6 IoCs
  • Mystic

    Mystic is an infostealer written in C++.

  • Executes dropped EXE 6 IoCs
  • Loads dropped DLL 16 IoCs
  • Windows security modification 2 TTPs 2 IoCs
  • Adds Run key to start application 2 TTPs 5 IoCs
  • Suspicious use of SetThreadContext 1 IoCs
  • Program crash 2 IoCs
  • Suspicious behavior: EnumeratesProcesses 2 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\cc877a6758666b7cc93b104f64fe10e6.exe
    "C:\Users\Admin\AppData\Local\Temp\cc877a6758666b7cc93b104f64fe10e6.exe"
    1⤵
    • Loads dropped DLL
    • Adds Run key to start application
    • Suspicious use of WriteProcessMemory
    PID:2260
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\z1625615.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\z1625615.exe
      2⤵
      • Executes dropped EXE
      • Loads dropped DLL
      • Adds Run key to start application
      • Suspicious use of WriteProcessMemory
      PID:2092
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\z8167961.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\z8167961.exe
        3⤵
        • Executes dropped EXE
        • Loads dropped DLL
        • Adds Run key to start application
        • Suspicious use of WriteProcessMemory
        PID:2216
        • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\z1788813.exe
          C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\z1788813.exe
          4⤵
          • Executes dropped EXE
          • Loads dropped DLL
          • Adds Run key to start application
          • Suspicious use of WriteProcessMemory
          PID:1168
          • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\z8273431.exe
            C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\z8273431.exe
            5⤵
            • Executes dropped EXE
            • Loads dropped DLL
            • Adds Run key to start application
            • Suspicious use of WriteProcessMemory
            PID:2660
            • C:\Users\Admin\AppData\Local\Temp\IXP004.TMP\q4991198.exe
              C:\Users\Admin\AppData\Local\Temp\IXP004.TMP\q4991198.exe
              6⤵
              • Modifies Windows Defender Real-time Protection settings
              • Executes dropped EXE
              • Windows security modification
              • Suspicious behavior: EnumeratesProcesses
              • Suspicious use of AdjustPrivilegeToken
              PID:2668
            • C:\Users\Admin\AppData\Local\Temp\IXP004.TMP\r9230333.exe
              C:\Users\Admin\AppData\Local\Temp\IXP004.TMP\r9230333.exe
              6⤵
              • Executes dropped EXE
              • Loads dropped DLL
              • Suspicious use of SetThreadContext
              • Suspicious use of WriteProcessMemory
              PID:2568
              • C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe
                "C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"
                7⤵
                • Suspicious use of WriteProcessMemory
                PID:3048
                • C:\Windows\SysWOW64\WerFault.exe
                  C:\Windows\SysWOW64\WerFault.exe -u -p 3048 -s 268
                  8⤵
                  • Program crash
                  PID:372
              • C:\Windows\SysWOW64\WerFault.exe
                C:\Windows\SysWOW64\WerFault.exe -u -p 2568 -s 276
                7⤵
                • Loads dropped DLL
                • Program crash
                PID:1920

Network

MITRE ATT&CK Matrix ATT&CK v13

Persistence

Create or Modify System Process

1
T1543

Windows Service

1
T1543.003

Boot or Logon Autostart Execution

1
T1547

Registry Run Keys / Startup Folder

1
T1547.001

Privilege Escalation

Create or Modify System Process

1
T1543

Windows Service

1
T1543.003

Boot or Logon Autostart Execution

1
T1547

Registry Run Keys / Startup Folder

1
T1547.001

Defense Evasion

Modify Registry

3
T1112

Impair Defenses

2
T1562

Disable or Modify Tools

2
T1562.001

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\z1625615.exe
    Filesize

    972KB

    MD5

    df48378a0f7e1d1ff3b7691fec3325f5

    SHA1

    832f49fdf5a2e5b11ace7c5587f3427cd6295b47

    SHA256

    c025fc004ab4236c0332cbfdd0f9d8316ef3b995d52c4ebbff8a8b26e32a74da

    SHA512

    543e097b4def79368cfb241a19c3f345e499e54a45e6e5368c1bf5538c93615383d5c995745fcfc8acaba06bdf99bcd82fe7be6e8cff837dd2d474b25b6d1b1b

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\z1625615.exe
    Filesize

    972KB

    MD5

    df48378a0f7e1d1ff3b7691fec3325f5

    SHA1

    832f49fdf5a2e5b11ace7c5587f3427cd6295b47

    SHA256

    c025fc004ab4236c0332cbfdd0f9d8316ef3b995d52c4ebbff8a8b26e32a74da

    SHA512

    543e097b4def79368cfb241a19c3f345e499e54a45e6e5368c1bf5538c93615383d5c995745fcfc8acaba06bdf99bcd82fe7be6e8cff837dd2d474b25b6d1b1b

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\z8167961.exe
    Filesize

    789KB

    MD5

    53fa74c69752e7e38d0a1c437b087e87

    SHA1

    0ce737f30bc632f031566b0e46234da92a74abf5

    SHA256

    5577f2224329d3af4e7ca137513acdb69cc996cb1ed2bcc62481afecf9ec862f

    SHA512

    0668a5b377b37dcacd6048604cb24c1f7909ba3d5c85cd1aad6d2d83c7e63b8f35832d209b01e3a4c56a8c6d2bc504497f3ce4d63e8d8e30f332d852e59c5be4

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\z8167961.exe
    Filesize

    789KB

    MD5

    53fa74c69752e7e38d0a1c437b087e87

    SHA1

    0ce737f30bc632f031566b0e46234da92a74abf5

    SHA256

    5577f2224329d3af4e7ca137513acdb69cc996cb1ed2bcc62481afecf9ec862f

    SHA512

    0668a5b377b37dcacd6048604cb24c1f7909ba3d5c85cd1aad6d2d83c7e63b8f35832d209b01e3a4c56a8c6d2bc504497f3ce4d63e8d8e30f332d852e59c5be4

  • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\z1788813.exe
    Filesize

    606KB

    MD5

    32bfb004316d7b65f8c0315a9557bf1b

    SHA1

    c960c3d110aee404049e099298426f5a39b2ab07

    SHA256

    e59e10c631b857acaa1b378e5673aae9f44aadff236255c9eb76ee1c176faa4f

    SHA512

    0c1c33dea6cf7c9e09057b9f7487ff2c8d1f72f8f2a59c3355d7f773aa6b45ddffe6aea98d6dfb735cb506ca2693bf49297e8f8a211b7c758eefad055c2a2673

  • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\z1788813.exe
    Filesize

    606KB

    MD5

    32bfb004316d7b65f8c0315a9557bf1b

    SHA1

    c960c3d110aee404049e099298426f5a39b2ab07

    SHA256

    e59e10c631b857acaa1b378e5673aae9f44aadff236255c9eb76ee1c176faa4f

    SHA512

    0c1c33dea6cf7c9e09057b9f7487ff2c8d1f72f8f2a59c3355d7f773aa6b45ddffe6aea98d6dfb735cb506ca2693bf49297e8f8a211b7c758eefad055c2a2673

  • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\z8273431.exe
    Filesize

    335KB

    MD5

    a773a8bb0ff6c9d233095f93dec5b94d

    SHA1

    ad785dd83398eed836c49afbb752314ad22c871f

    SHA256

    45a03c3727c5e4eb5ad7929cfc9bc5154959c3b348fb36f094c35bb3bdeea772

    SHA512

    ec69caecac23746c939cbad6b73979d129f2c4b16b6f090eeca1ecfca237f196ed99f2be2264c4234ffa3acc2c43f68914f9b143e5004ce701193fefd2f6d76c

  • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\z8273431.exe
    Filesize

    335KB

    MD5

    a773a8bb0ff6c9d233095f93dec5b94d

    SHA1

    ad785dd83398eed836c49afbb752314ad22c871f

    SHA256

    45a03c3727c5e4eb5ad7929cfc9bc5154959c3b348fb36f094c35bb3bdeea772

    SHA512

    ec69caecac23746c939cbad6b73979d129f2c4b16b6f090eeca1ecfca237f196ed99f2be2264c4234ffa3acc2c43f68914f9b143e5004ce701193fefd2f6d76c

  • C:\Users\Admin\AppData\Local\Temp\IXP004.TMP\q4991198.exe
    Filesize

    11KB

    MD5

    6fd0be63aa8a65b2493c4b3603bce8d0

    SHA1

    8c863c4fdbec6bba661c64d9029a1a33f69b5abc

    SHA256

    a072db61cc4dbd41317f758378435870693812c3f2d431ef69188d49bb01bb5c

    SHA512

    8efed7997bc25b4b3949b7dd588ba872b17dc8d01d43a60c8fcb32b9380a165765389ecae5389c1305be494044aa63ccb024566938820523dd0bd50bbcc1be1b

  • C:\Users\Admin\AppData\Local\Temp\IXP004.TMP\q4991198.exe
    Filesize

    11KB

    MD5

    6fd0be63aa8a65b2493c4b3603bce8d0

    SHA1

    8c863c4fdbec6bba661c64d9029a1a33f69b5abc

    SHA256

    a072db61cc4dbd41317f758378435870693812c3f2d431ef69188d49bb01bb5c

    SHA512

    8efed7997bc25b4b3949b7dd588ba872b17dc8d01d43a60c8fcb32b9380a165765389ecae5389c1305be494044aa63ccb024566938820523dd0bd50bbcc1be1b

  • C:\Users\Admin\AppData\Local\Temp\IXP004.TMP\r9230333.exe
    Filesize

    356KB

    MD5

    15a73979134d925ec46c6ac90a2cf02c

    SHA1

    31e1cff66b31b244df909aa1919953a134d1fb90

    SHA256

    0fe4db718b0249b7716ba1f694ec7da301e82763e9a095cef885616ad9d7ac72

    SHA512

    d0ab1ca27e8843710275e00a2964ed30ad05b2585e312abeb335fa369c677d86a7593a39956d4e15ed0db901207b814c9cb90d8aba132431e2c64675fa6db7ae

  • C:\Users\Admin\AppData\Local\Temp\IXP004.TMP\r9230333.exe
    Filesize

    356KB

    MD5

    15a73979134d925ec46c6ac90a2cf02c

    SHA1

    31e1cff66b31b244df909aa1919953a134d1fb90

    SHA256

    0fe4db718b0249b7716ba1f694ec7da301e82763e9a095cef885616ad9d7ac72

    SHA512

    d0ab1ca27e8843710275e00a2964ed30ad05b2585e312abeb335fa369c677d86a7593a39956d4e15ed0db901207b814c9cb90d8aba132431e2c64675fa6db7ae

  • C:\Users\Admin\AppData\Local\Temp\IXP004.TMP\r9230333.exe
    Filesize

    356KB

    MD5

    15a73979134d925ec46c6ac90a2cf02c

    SHA1

    31e1cff66b31b244df909aa1919953a134d1fb90

    SHA256

    0fe4db718b0249b7716ba1f694ec7da301e82763e9a095cef885616ad9d7ac72

    SHA512

    d0ab1ca27e8843710275e00a2964ed30ad05b2585e312abeb335fa369c677d86a7593a39956d4e15ed0db901207b814c9cb90d8aba132431e2c64675fa6db7ae

  • \Users\Admin\AppData\Local\Temp\IXP000.TMP\z1625615.exe
    Filesize

    972KB

    MD5

    df48378a0f7e1d1ff3b7691fec3325f5

    SHA1

    832f49fdf5a2e5b11ace7c5587f3427cd6295b47

    SHA256

    c025fc004ab4236c0332cbfdd0f9d8316ef3b995d52c4ebbff8a8b26e32a74da

    SHA512

    543e097b4def79368cfb241a19c3f345e499e54a45e6e5368c1bf5538c93615383d5c995745fcfc8acaba06bdf99bcd82fe7be6e8cff837dd2d474b25b6d1b1b

  • \Users\Admin\AppData\Local\Temp\IXP000.TMP\z1625615.exe
    Filesize

    972KB

    MD5

    df48378a0f7e1d1ff3b7691fec3325f5

    SHA1

    832f49fdf5a2e5b11ace7c5587f3427cd6295b47

    SHA256

    c025fc004ab4236c0332cbfdd0f9d8316ef3b995d52c4ebbff8a8b26e32a74da

    SHA512

    543e097b4def79368cfb241a19c3f345e499e54a45e6e5368c1bf5538c93615383d5c995745fcfc8acaba06bdf99bcd82fe7be6e8cff837dd2d474b25b6d1b1b

  • \Users\Admin\AppData\Local\Temp\IXP001.TMP\z8167961.exe
    Filesize

    789KB

    MD5

    53fa74c69752e7e38d0a1c437b087e87

    SHA1

    0ce737f30bc632f031566b0e46234da92a74abf5

    SHA256

    5577f2224329d3af4e7ca137513acdb69cc996cb1ed2bcc62481afecf9ec862f

    SHA512

    0668a5b377b37dcacd6048604cb24c1f7909ba3d5c85cd1aad6d2d83c7e63b8f35832d209b01e3a4c56a8c6d2bc504497f3ce4d63e8d8e30f332d852e59c5be4

  • \Users\Admin\AppData\Local\Temp\IXP001.TMP\z8167961.exe
    Filesize

    789KB

    MD5

    53fa74c69752e7e38d0a1c437b087e87

    SHA1

    0ce737f30bc632f031566b0e46234da92a74abf5

    SHA256

    5577f2224329d3af4e7ca137513acdb69cc996cb1ed2bcc62481afecf9ec862f

    SHA512

    0668a5b377b37dcacd6048604cb24c1f7909ba3d5c85cd1aad6d2d83c7e63b8f35832d209b01e3a4c56a8c6d2bc504497f3ce4d63e8d8e30f332d852e59c5be4

  • \Users\Admin\AppData\Local\Temp\IXP002.TMP\z1788813.exe
    Filesize

    606KB

    MD5

    32bfb004316d7b65f8c0315a9557bf1b

    SHA1

    c960c3d110aee404049e099298426f5a39b2ab07

    SHA256

    e59e10c631b857acaa1b378e5673aae9f44aadff236255c9eb76ee1c176faa4f

    SHA512

    0c1c33dea6cf7c9e09057b9f7487ff2c8d1f72f8f2a59c3355d7f773aa6b45ddffe6aea98d6dfb735cb506ca2693bf49297e8f8a211b7c758eefad055c2a2673

  • \Users\Admin\AppData\Local\Temp\IXP002.TMP\z1788813.exe
    Filesize

    606KB

    MD5

    32bfb004316d7b65f8c0315a9557bf1b

    SHA1

    c960c3d110aee404049e099298426f5a39b2ab07

    SHA256

    e59e10c631b857acaa1b378e5673aae9f44aadff236255c9eb76ee1c176faa4f

    SHA512

    0c1c33dea6cf7c9e09057b9f7487ff2c8d1f72f8f2a59c3355d7f773aa6b45ddffe6aea98d6dfb735cb506ca2693bf49297e8f8a211b7c758eefad055c2a2673

  • \Users\Admin\AppData\Local\Temp\IXP003.TMP\z8273431.exe
    Filesize

    335KB

    MD5

    a773a8bb0ff6c9d233095f93dec5b94d

    SHA1

    ad785dd83398eed836c49afbb752314ad22c871f

    SHA256

    45a03c3727c5e4eb5ad7929cfc9bc5154959c3b348fb36f094c35bb3bdeea772

    SHA512

    ec69caecac23746c939cbad6b73979d129f2c4b16b6f090eeca1ecfca237f196ed99f2be2264c4234ffa3acc2c43f68914f9b143e5004ce701193fefd2f6d76c

  • \Users\Admin\AppData\Local\Temp\IXP003.TMP\z8273431.exe
    Filesize

    335KB

    MD5

    a773a8bb0ff6c9d233095f93dec5b94d

    SHA1

    ad785dd83398eed836c49afbb752314ad22c871f

    SHA256

    45a03c3727c5e4eb5ad7929cfc9bc5154959c3b348fb36f094c35bb3bdeea772

    SHA512

    ec69caecac23746c939cbad6b73979d129f2c4b16b6f090eeca1ecfca237f196ed99f2be2264c4234ffa3acc2c43f68914f9b143e5004ce701193fefd2f6d76c

  • \Users\Admin\AppData\Local\Temp\IXP004.TMP\q4991198.exe
    Filesize

    11KB

    MD5

    6fd0be63aa8a65b2493c4b3603bce8d0

    SHA1

    8c863c4fdbec6bba661c64d9029a1a33f69b5abc

    SHA256

    a072db61cc4dbd41317f758378435870693812c3f2d431ef69188d49bb01bb5c

    SHA512

    8efed7997bc25b4b3949b7dd588ba872b17dc8d01d43a60c8fcb32b9380a165765389ecae5389c1305be494044aa63ccb024566938820523dd0bd50bbcc1be1b

  • \Users\Admin\AppData\Local\Temp\IXP004.TMP\r9230333.exe
    Filesize

    356KB

    MD5

    15a73979134d925ec46c6ac90a2cf02c

    SHA1

    31e1cff66b31b244df909aa1919953a134d1fb90

    SHA256

    0fe4db718b0249b7716ba1f694ec7da301e82763e9a095cef885616ad9d7ac72

    SHA512

    d0ab1ca27e8843710275e00a2964ed30ad05b2585e312abeb335fa369c677d86a7593a39956d4e15ed0db901207b814c9cb90d8aba132431e2c64675fa6db7ae

  • \Users\Admin\AppData\Local\Temp\IXP004.TMP\r9230333.exe
    Filesize

    356KB

    MD5

    15a73979134d925ec46c6ac90a2cf02c

    SHA1

    31e1cff66b31b244df909aa1919953a134d1fb90

    SHA256

    0fe4db718b0249b7716ba1f694ec7da301e82763e9a095cef885616ad9d7ac72

    SHA512

    d0ab1ca27e8843710275e00a2964ed30ad05b2585e312abeb335fa369c677d86a7593a39956d4e15ed0db901207b814c9cb90d8aba132431e2c64675fa6db7ae

  • \Users\Admin\AppData\Local\Temp\IXP004.TMP\r9230333.exe
    Filesize

    356KB

    MD5

    15a73979134d925ec46c6ac90a2cf02c

    SHA1

    31e1cff66b31b244df909aa1919953a134d1fb90

    SHA256

    0fe4db718b0249b7716ba1f694ec7da301e82763e9a095cef885616ad9d7ac72

    SHA512

    d0ab1ca27e8843710275e00a2964ed30ad05b2585e312abeb335fa369c677d86a7593a39956d4e15ed0db901207b814c9cb90d8aba132431e2c64675fa6db7ae

  • \Users\Admin\AppData\Local\Temp\IXP004.TMP\r9230333.exe
    Filesize

    356KB

    MD5

    15a73979134d925ec46c6ac90a2cf02c

    SHA1

    31e1cff66b31b244df909aa1919953a134d1fb90

    SHA256

    0fe4db718b0249b7716ba1f694ec7da301e82763e9a095cef885616ad9d7ac72

    SHA512

    d0ab1ca27e8843710275e00a2964ed30ad05b2585e312abeb335fa369c677d86a7593a39956d4e15ed0db901207b814c9cb90d8aba132431e2c64675fa6db7ae

  • \Users\Admin\AppData\Local\Temp\IXP004.TMP\r9230333.exe
    Filesize

    356KB

    MD5

    15a73979134d925ec46c6ac90a2cf02c

    SHA1

    31e1cff66b31b244df909aa1919953a134d1fb90

    SHA256

    0fe4db718b0249b7716ba1f694ec7da301e82763e9a095cef885616ad9d7ac72

    SHA512

    d0ab1ca27e8843710275e00a2964ed30ad05b2585e312abeb335fa369c677d86a7593a39956d4e15ed0db901207b814c9cb90d8aba132431e2c64675fa6db7ae

  • \Users\Admin\AppData\Local\Temp\IXP004.TMP\r9230333.exe
    Filesize

    356KB

    MD5

    15a73979134d925ec46c6ac90a2cf02c

    SHA1

    31e1cff66b31b244df909aa1919953a134d1fb90

    SHA256

    0fe4db718b0249b7716ba1f694ec7da301e82763e9a095cef885616ad9d7ac72

    SHA512

    d0ab1ca27e8843710275e00a2964ed30ad05b2585e312abeb335fa369c677d86a7593a39956d4e15ed0db901207b814c9cb90d8aba132431e2c64675fa6db7ae

  • \Users\Admin\AppData\Local\Temp\IXP004.TMP\r9230333.exe
    Filesize

    356KB

    MD5

    15a73979134d925ec46c6ac90a2cf02c

    SHA1

    31e1cff66b31b244df909aa1919953a134d1fb90

    SHA256

    0fe4db718b0249b7716ba1f694ec7da301e82763e9a095cef885616ad9d7ac72

    SHA512

    d0ab1ca27e8843710275e00a2964ed30ad05b2585e312abeb335fa369c677d86a7593a39956d4e15ed0db901207b814c9cb90d8aba132431e2c64675fa6db7ae

  • memory/2668-49-0x000007FEF5680000-0x000007FEF606C000-memory.dmp
    Filesize

    9.9MB

  • memory/2668-51-0x000007FEF5680000-0x000007FEF606C000-memory.dmp
    Filesize

    9.9MB

  • memory/2668-48-0x0000000001090000-0x000000000109A000-memory.dmp
    Filesize

    40KB

  • memory/2668-50-0x000007FEF5680000-0x000007FEF606C000-memory.dmp
    Filesize

    9.9MB

  • memory/3048-61-0x0000000000400000-0x0000000000428000-memory.dmp
    Filesize

    160KB

  • memory/3048-63-0x0000000000400000-0x0000000000428000-memory.dmp
    Filesize

    160KB

  • memory/3048-62-0x0000000000400000-0x0000000000428000-memory.dmp
    Filesize

    160KB

  • memory/3048-67-0x00000000FFFDE000-0x00000000FFFDF000-memory.dmp
    Filesize

    4KB

  • memory/3048-70-0x0000000000400000-0x0000000000428000-memory.dmp
    Filesize

    160KB

  • memory/3048-72-0x0000000000400000-0x0000000000428000-memory.dmp
    Filesize

    160KB

  • memory/3048-64-0x0000000000400000-0x0000000000428000-memory.dmp
    Filesize

    160KB

  • memory/3048-65-0x0000000000400000-0x0000000000428000-memory.dmp
    Filesize

    160KB

  • memory/3048-68-0x0000000000400000-0x0000000000428000-memory.dmp
    Filesize

    160KB

  • memory/3048-66-0x0000000000400000-0x0000000000428000-memory.dmp
    Filesize

    160KB