Analysis

  • max time kernel
    121s
  • max time network
    127s
  • platform
    windows7_x64
  • resource
    win7-20230831-en
  • resource tags

    arch:x64arch:x86image:win7-20230831-enlocale:en-usos:windows7-x64system
  • submitted
    10-10-2023 20:21

General

  • Target

    6cced2d0864c147675f604a6472c03cb1a94651e04162e4ab34b8b4346cab0d9.exe

  • Size

    994KB

  • MD5

    e83e7d33de9abd0dacace48f73f9af4f

  • SHA1

    63cf0238e8d6c2e3c729b215fa1e0479e25fe527

  • SHA256

    6cced2d0864c147675f604a6472c03cb1a94651e04162e4ab34b8b4346cab0d9

  • SHA512

    5470a98b9801f9e07e2690fc5ee08c11b03423455e72f90baa81bfed999a3f400322def1ec832d32f088172e7a9bf9f18b4d3f2b196f72bfe2b2896dffd8d07c

  • SSDEEP

    24576:3yVQV+tg7MQ+AouGMV3+Cq9CBA4SCcVuq+:C2UmMNuOtcA4T

Malware Config

Signatures

  • Detect Mystic stealer payload 6 IoCs
  • Detects Healer an antivirus disabler dropper 4 IoCs
  • Healer

    Healer an antivirus disabler dropper.

  • Modifies Windows Defender Real-time Protection settings 3 TTPs 6 IoCs
  • Mystic

    Mystic is an infostealer written in C++.

  • Executes dropped EXE 6 IoCs
  • Loads dropped DLL 16 IoCs
  • Windows security modification 2 TTPs 2 IoCs
  • Adds Run key to start application 2 TTPs 5 IoCs
  • Suspicious use of SetThreadContext 1 IoCs
  • Program crash 2 IoCs
  • Suspicious behavior: EnumeratesProcesses 2 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\6cced2d0864c147675f604a6472c03cb1a94651e04162e4ab34b8b4346cab0d9.exe
    "C:\Users\Admin\AppData\Local\Temp\6cced2d0864c147675f604a6472c03cb1a94651e04162e4ab34b8b4346cab0d9.exe"
    1⤵
    • Loads dropped DLL
    • Adds Run key to start application
    • Suspicious use of WriteProcessMemory
    PID:2092
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\z1413441.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\z1413441.exe
      2⤵
      • Executes dropped EXE
      • Loads dropped DLL
      • Adds Run key to start application
      • Suspicious use of WriteProcessMemory
      PID:3068
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\z0061231.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\z0061231.exe
        3⤵
        • Executes dropped EXE
        • Loads dropped DLL
        • Adds Run key to start application
        • Suspicious use of WriteProcessMemory
        PID:2764
        • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\z0550209.exe
          C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\z0550209.exe
          4⤵
          • Executes dropped EXE
          • Loads dropped DLL
          • Adds Run key to start application
          • Suspicious use of WriteProcessMemory
          PID:2576
          • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\z4836988.exe
            C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\z4836988.exe
            5⤵
            • Executes dropped EXE
            • Loads dropped DLL
            • Adds Run key to start application
            • Suspicious use of WriteProcessMemory
            PID:2632
            • C:\Users\Admin\AppData\Local\Temp\IXP004.TMP\q0974317.exe
              C:\Users\Admin\AppData\Local\Temp\IXP004.TMP\q0974317.exe
              6⤵
              • Modifies Windows Defender Real-time Protection settings
              • Executes dropped EXE
              • Windows security modification
              • Suspicious behavior: EnumeratesProcesses
              • Suspicious use of AdjustPrivilegeToken
              PID:3000
            • C:\Users\Admin\AppData\Local\Temp\IXP004.TMP\r5175735.exe
              C:\Users\Admin\AppData\Local\Temp\IXP004.TMP\r5175735.exe
              6⤵
              • Executes dropped EXE
              • Loads dropped DLL
              • Suspicious use of SetThreadContext
              • Suspicious use of WriteProcessMemory
              PID:2468
              • C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe
                "C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"
                7⤵
                  PID:2976
                • C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe
                  "C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"
                  7⤵
                    PID:2984
                  • C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe
                    "C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"
                    7⤵
                      PID:2124
                    • C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe
                      "C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"
                      7⤵
                        PID:1956
                        • C:\Windows\SysWOW64\WerFault.exe
                          C:\Windows\SysWOW64\WerFault.exe -u -p 1956 -s 268
                          8⤵
                          • Program crash
                          PID:2776
                      • C:\Windows\SysWOW64\WerFault.exe
                        C:\Windows\SysWOW64\WerFault.exe -u -p 2468 -s 292
                        7⤵
                        • Loads dropped DLL
                        • Program crash
                        PID:2692

          Network

          MITRE ATT&CK Enterprise v15

          Replay Monitor

          Loading Replay Monitor...

          Downloads

          • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\z1413441.exe

            Filesize

            892KB

            MD5

            22581ca7f2b8b6e53bc77817e7d41ecb

            SHA1

            6b733672c038e8b190b9ef3198453884d3dbd894

            SHA256

            da34664226ba6d1b9ab0d8988a39d9d6f5ea09010c0a61716c481d9fa723ad57

            SHA512

            ac7429d52043c29f62a160a4f3008195185405b1bf0cf2ddcda97c79b0c4d07fa36b83758957d74c97e9f79d4260290bcb266b5a39e957866c188c184e2f03b8

          • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\z1413441.exe

            Filesize

            892KB

            MD5

            22581ca7f2b8b6e53bc77817e7d41ecb

            SHA1

            6b733672c038e8b190b9ef3198453884d3dbd894

            SHA256

            da34664226ba6d1b9ab0d8988a39d9d6f5ea09010c0a61716c481d9fa723ad57

            SHA512

            ac7429d52043c29f62a160a4f3008195185405b1bf0cf2ddcda97c79b0c4d07fa36b83758957d74c97e9f79d4260290bcb266b5a39e957866c188c184e2f03b8

          • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\z0061231.exe

            Filesize

            710KB

            MD5

            97dadd9195fd8cb5247d60825bcaf47b

            SHA1

            fe74aae6f95c5d5a2b2830c5710ec2a172f73447

            SHA256

            b1d16c09a226686051aec64e7904411baa85a6cc8db23e3978de3ec87b394e95

            SHA512

            eff1c9fa4af4458d27a03dbe68d4f9d18470fe21c5664f7604a15721d4c71c0b2a1fb3cacac3e54cc847100052c23ba640307b2448d449163875f5cf75603d9e

          • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\z0061231.exe

            Filesize

            710KB

            MD5

            97dadd9195fd8cb5247d60825bcaf47b

            SHA1

            fe74aae6f95c5d5a2b2830c5710ec2a172f73447

            SHA256

            b1d16c09a226686051aec64e7904411baa85a6cc8db23e3978de3ec87b394e95

            SHA512

            eff1c9fa4af4458d27a03dbe68d4f9d18470fe21c5664f7604a15721d4c71c0b2a1fb3cacac3e54cc847100052c23ba640307b2448d449163875f5cf75603d9e

          • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\z0550209.exe

            Filesize

            527KB

            MD5

            fe6b00397a69789dace341553ab5b7dc

            SHA1

            ac42567e851d22c3766a85d83f6a2cb59d4d364a

            SHA256

            2294b60339f4879233d918368c8939d510ba6cf250e2477ec30dc59a20d8232e

            SHA512

            d33e7cef04ff54cbcb949fca20c07a46cfc1e09a39a01d18da1034ccac08cf2afd7e0799f7dfb201063cac7c2e54aea12dccbc834a1d14472c8b4d4fea94eb70

          • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\z0550209.exe

            Filesize

            527KB

            MD5

            fe6b00397a69789dace341553ab5b7dc

            SHA1

            ac42567e851d22c3766a85d83f6a2cb59d4d364a

            SHA256

            2294b60339f4879233d918368c8939d510ba6cf250e2477ec30dc59a20d8232e

            SHA512

            d33e7cef04ff54cbcb949fca20c07a46cfc1e09a39a01d18da1034ccac08cf2afd7e0799f7dfb201063cac7c2e54aea12dccbc834a1d14472c8b4d4fea94eb70

          • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\z4836988.exe

            Filesize

            296KB

            MD5

            c2958eafbd1df34e363aac64872d3767

            SHA1

            c38ed42ec3e481b61f93148701ec1cf15b1e2ead

            SHA256

            76f8cfab37c732615ae71a4f9c1ddf1092f2545ab426819a71cfb558b09c7827

            SHA512

            42657f261fd0de09d273beb6b595e77f70fda71d1ad53c3d5f0fe2ecc74fd3dbbc6616552e26a7e2cb39158d1f0ebd3b04f960a2250c597abd4cbb54dc8e1798

          • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\z4836988.exe

            Filesize

            296KB

            MD5

            c2958eafbd1df34e363aac64872d3767

            SHA1

            c38ed42ec3e481b61f93148701ec1cf15b1e2ead

            SHA256

            76f8cfab37c732615ae71a4f9c1ddf1092f2545ab426819a71cfb558b09c7827

            SHA512

            42657f261fd0de09d273beb6b595e77f70fda71d1ad53c3d5f0fe2ecc74fd3dbbc6616552e26a7e2cb39158d1f0ebd3b04f960a2250c597abd4cbb54dc8e1798

          • C:\Users\Admin\AppData\Local\Temp\IXP004.TMP\q0974317.exe

            Filesize

            11KB

            MD5

            23f943f98b2eef1d8427ba90111c34e2

            SHA1

            47be76d126057e63dd8c9be3f7eac252a86a9b53

            SHA256

            76ee34b15e8f7d1a38ba5d8221ac5144bc624a7253195afee8e83d93c68de6d5

            SHA512

            32ea29df413fdc8f630212957a8e4fd91575a9431da4750758b156ec013f6c5c700feca8271aee81fb5dc6ef12ea4578f107781149563be2988a28a2feb9d811

          • C:\Users\Admin\AppData\Local\Temp\IXP004.TMP\q0974317.exe

            Filesize

            11KB

            MD5

            23f943f98b2eef1d8427ba90111c34e2

            SHA1

            47be76d126057e63dd8c9be3f7eac252a86a9b53

            SHA256

            76ee34b15e8f7d1a38ba5d8221ac5144bc624a7253195afee8e83d93c68de6d5

            SHA512

            32ea29df413fdc8f630212957a8e4fd91575a9431da4750758b156ec013f6c5c700feca8271aee81fb5dc6ef12ea4578f107781149563be2988a28a2feb9d811

          • C:\Users\Admin\AppData\Local\Temp\IXP004.TMP\r5175735.exe

            Filesize

            276KB

            MD5

            90974946e2cc83f25f5dc34cf2c6c691

            SHA1

            fe7fb4d0a45d95b4e94d5c08f07a076dfbfa9568

            SHA256

            72d81c4490446b01bdee7fae368a4ba893821430ee0541ed545171b9de7f2267

            SHA512

            44993865b3d708d36d7c688c09ded36bdec03148a8476601357fe29af9cac9be6c028aedc887d8bd31a3f4103b8745a86dfe341e6c5ee5a7b8737ea3d64b8cfb

          • C:\Users\Admin\AppData\Local\Temp\IXP004.TMP\r5175735.exe

            Filesize

            276KB

            MD5

            90974946e2cc83f25f5dc34cf2c6c691

            SHA1

            fe7fb4d0a45d95b4e94d5c08f07a076dfbfa9568

            SHA256

            72d81c4490446b01bdee7fae368a4ba893821430ee0541ed545171b9de7f2267

            SHA512

            44993865b3d708d36d7c688c09ded36bdec03148a8476601357fe29af9cac9be6c028aedc887d8bd31a3f4103b8745a86dfe341e6c5ee5a7b8737ea3d64b8cfb

          • C:\Users\Admin\AppData\Local\Temp\IXP004.TMP\r5175735.exe

            Filesize

            276KB

            MD5

            90974946e2cc83f25f5dc34cf2c6c691

            SHA1

            fe7fb4d0a45d95b4e94d5c08f07a076dfbfa9568

            SHA256

            72d81c4490446b01bdee7fae368a4ba893821430ee0541ed545171b9de7f2267

            SHA512

            44993865b3d708d36d7c688c09ded36bdec03148a8476601357fe29af9cac9be6c028aedc887d8bd31a3f4103b8745a86dfe341e6c5ee5a7b8737ea3d64b8cfb

          • \Users\Admin\AppData\Local\Temp\IXP000.TMP\z1413441.exe

            Filesize

            892KB

            MD5

            22581ca7f2b8b6e53bc77817e7d41ecb

            SHA1

            6b733672c038e8b190b9ef3198453884d3dbd894

            SHA256

            da34664226ba6d1b9ab0d8988a39d9d6f5ea09010c0a61716c481d9fa723ad57

            SHA512

            ac7429d52043c29f62a160a4f3008195185405b1bf0cf2ddcda97c79b0c4d07fa36b83758957d74c97e9f79d4260290bcb266b5a39e957866c188c184e2f03b8

          • \Users\Admin\AppData\Local\Temp\IXP000.TMP\z1413441.exe

            Filesize

            892KB

            MD5

            22581ca7f2b8b6e53bc77817e7d41ecb

            SHA1

            6b733672c038e8b190b9ef3198453884d3dbd894

            SHA256

            da34664226ba6d1b9ab0d8988a39d9d6f5ea09010c0a61716c481d9fa723ad57

            SHA512

            ac7429d52043c29f62a160a4f3008195185405b1bf0cf2ddcda97c79b0c4d07fa36b83758957d74c97e9f79d4260290bcb266b5a39e957866c188c184e2f03b8

          • \Users\Admin\AppData\Local\Temp\IXP001.TMP\z0061231.exe

            Filesize

            710KB

            MD5

            97dadd9195fd8cb5247d60825bcaf47b

            SHA1

            fe74aae6f95c5d5a2b2830c5710ec2a172f73447

            SHA256

            b1d16c09a226686051aec64e7904411baa85a6cc8db23e3978de3ec87b394e95

            SHA512

            eff1c9fa4af4458d27a03dbe68d4f9d18470fe21c5664f7604a15721d4c71c0b2a1fb3cacac3e54cc847100052c23ba640307b2448d449163875f5cf75603d9e

          • \Users\Admin\AppData\Local\Temp\IXP001.TMP\z0061231.exe

            Filesize

            710KB

            MD5

            97dadd9195fd8cb5247d60825bcaf47b

            SHA1

            fe74aae6f95c5d5a2b2830c5710ec2a172f73447

            SHA256

            b1d16c09a226686051aec64e7904411baa85a6cc8db23e3978de3ec87b394e95

            SHA512

            eff1c9fa4af4458d27a03dbe68d4f9d18470fe21c5664f7604a15721d4c71c0b2a1fb3cacac3e54cc847100052c23ba640307b2448d449163875f5cf75603d9e

          • \Users\Admin\AppData\Local\Temp\IXP002.TMP\z0550209.exe

            Filesize

            527KB

            MD5

            fe6b00397a69789dace341553ab5b7dc

            SHA1

            ac42567e851d22c3766a85d83f6a2cb59d4d364a

            SHA256

            2294b60339f4879233d918368c8939d510ba6cf250e2477ec30dc59a20d8232e

            SHA512

            d33e7cef04ff54cbcb949fca20c07a46cfc1e09a39a01d18da1034ccac08cf2afd7e0799f7dfb201063cac7c2e54aea12dccbc834a1d14472c8b4d4fea94eb70

          • \Users\Admin\AppData\Local\Temp\IXP002.TMP\z0550209.exe

            Filesize

            527KB

            MD5

            fe6b00397a69789dace341553ab5b7dc

            SHA1

            ac42567e851d22c3766a85d83f6a2cb59d4d364a

            SHA256

            2294b60339f4879233d918368c8939d510ba6cf250e2477ec30dc59a20d8232e

            SHA512

            d33e7cef04ff54cbcb949fca20c07a46cfc1e09a39a01d18da1034ccac08cf2afd7e0799f7dfb201063cac7c2e54aea12dccbc834a1d14472c8b4d4fea94eb70

          • \Users\Admin\AppData\Local\Temp\IXP003.TMP\z4836988.exe

            Filesize

            296KB

            MD5

            c2958eafbd1df34e363aac64872d3767

            SHA1

            c38ed42ec3e481b61f93148701ec1cf15b1e2ead

            SHA256

            76f8cfab37c732615ae71a4f9c1ddf1092f2545ab426819a71cfb558b09c7827

            SHA512

            42657f261fd0de09d273beb6b595e77f70fda71d1ad53c3d5f0fe2ecc74fd3dbbc6616552e26a7e2cb39158d1f0ebd3b04f960a2250c597abd4cbb54dc8e1798

          • \Users\Admin\AppData\Local\Temp\IXP003.TMP\z4836988.exe

            Filesize

            296KB

            MD5

            c2958eafbd1df34e363aac64872d3767

            SHA1

            c38ed42ec3e481b61f93148701ec1cf15b1e2ead

            SHA256

            76f8cfab37c732615ae71a4f9c1ddf1092f2545ab426819a71cfb558b09c7827

            SHA512

            42657f261fd0de09d273beb6b595e77f70fda71d1ad53c3d5f0fe2ecc74fd3dbbc6616552e26a7e2cb39158d1f0ebd3b04f960a2250c597abd4cbb54dc8e1798

          • \Users\Admin\AppData\Local\Temp\IXP004.TMP\q0974317.exe

            Filesize

            11KB

            MD5

            23f943f98b2eef1d8427ba90111c34e2

            SHA1

            47be76d126057e63dd8c9be3f7eac252a86a9b53

            SHA256

            76ee34b15e8f7d1a38ba5d8221ac5144bc624a7253195afee8e83d93c68de6d5

            SHA512

            32ea29df413fdc8f630212957a8e4fd91575a9431da4750758b156ec013f6c5c700feca8271aee81fb5dc6ef12ea4578f107781149563be2988a28a2feb9d811

          • \Users\Admin\AppData\Local\Temp\IXP004.TMP\r5175735.exe

            Filesize

            276KB

            MD5

            90974946e2cc83f25f5dc34cf2c6c691

            SHA1

            fe7fb4d0a45d95b4e94d5c08f07a076dfbfa9568

            SHA256

            72d81c4490446b01bdee7fae368a4ba893821430ee0541ed545171b9de7f2267

            SHA512

            44993865b3d708d36d7c688c09ded36bdec03148a8476601357fe29af9cac9be6c028aedc887d8bd31a3f4103b8745a86dfe341e6c5ee5a7b8737ea3d64b8cfb

          • \Users\Admin\AppData\Local\Temp\IXP004.TMP\r5175735.exe

            Filesize

            276KB

            MD5

            90974946e2cc83f25f5dc34cf2c6c691

            SHA1

            fe7fb4d0a45d95b4e94d5c08f07a076dfbfa9568

            SHA256

            72d81c4490446b01bdee7fae368a4ba893821430ee0541ed545171b9de7f2267

            SHA512

            44993865b3d708d36d7c688c09ded36bdec03148a8476601357fe29af9cac9be6c028aedc887d8bd31a3f4103b8745a86dfe341e6c5ee5a7b8737ea3d64b8cfb

          • \Users\Admin\AppData\Local\Temp\IXP004.TMP\r5175735.exe

            Filesize

            276KB

            MD5

            90974946e2cc83f25f5dc34cf2c6c691

            SHA1

            fe7fb4d0a45d95b4e94d5c08f07a076dfbfa9568

            SHA256

            72d81c4490446b01bdee7fae368a4ba893821430ee0541ed545171b9de7f2267

            SHA512

            44993865b3d708d36d7c688c09ded36bdec03148a8476601357fe29af9cac9be6c028aedc887d8bd31a3f4103b8745a86dfe341e6c5ee5a7b8737ea3d64b8cfb

          • \Users\Admin\AppData\Local\Temp\IXP004.TMP\r5175735.exe

            Filesize

            276KB

            MD5

            90974946e2cc83f25f5dc34cf2c6c691

            SHA1

            fe7fb4d0a45d95b4e94d5c08f07a076dfbfa9568

            SHA256

            72d81c4490446b01bdee7fae368a4ba893821430ee0541ed545171b9de7f2267

            SHA512

            44993865b3d708d36d7c688c09ded36bdec03148a8476601357fe29af9cac9be6c028aedc887d8bd31a3f4103b8745a86dfe341e6c5ee5a7b8737ea3d64b8cfb

          • \Users\Admin\AppData\Local\Temp\IXP004.TMP\r5175735.exe

            Filesize

            276KB

            MD5

            90974946e2cc83f25f5dc34cf2c6c691

            SHA1

            fe7fb4d0a45d95b4e94d5c08f07a076dfbfa9568

            SHA256

            72d81c4490446b01bdee7fae368a4ba893821430ee0541ed545171b9de7f2267

            SHA512

            44993865b3d708d36d7c688c09ded36bdec03148a8476601357fe29af9cac9be6c028aedc887d8bd31a3f4103b8745a86dfe341e6c5ee5a7b8737ea3d64b8cfb

          • \Users\Admin\AppData\Local\Temp\IXP004.TMP\r5175735.exe

            Filesize

            276KB

            MD5

            90974946e2cc83f25f5dc34cf2c6c691

            SHA1

            fe7fb4d0a45d95b4e94d5c08f07a076dfbfa9568

            SHA256

            72d81c4490446b01bdee7fae368a4ba893821430ee0541ed545171b9de7f2267

            SHA512

            44993865b3d708d36d7c688c09ded36bdec03148a8476601357fe29af9cac9be6c028aedc887d8bd31a3f4103b8745a86dfe341e6c5ee5a7b8737ea3d64b8cfb

          • \Users\Admin\AppData\Local\Temp\IXP004.TMP\r5175735.exe

            Filesize

            276KB

            MD5

            90974946e2cc83f25f5dc34cf2c6c691

            SHA1

            fe7fb4d0a45d95b4e94d5c08f07a076dfbfa9568

            SHA256

            72d81c4490446b01bdee7fae368a4ba893821430ee0541ed545171b9de7f2267

            SHA512

            44993865b3d708d36d7c688c09ded36bdec03148a8476601357fe29af9cac9be6c028aedc887d8bd31a3f4103b8745a86dfe341e6c5ee5a7b8737ea3d64b8cfb

          • memory/1956-62-0x0000000000400000-0x0000000000428000-memory.dmp

            Filesize

            160KB

          • memory/1956-61-0x0000000000400000-0x0000000000428000-memory.dmp

            Filesize

            160KB

          • memory/1956-63-0x0000000000400000-0x0000000000428000-memory.dmp

            Filesize

            160KB

          • memory/1956-64-0x0000000000400000-0x0000000000428000-memory.dmp

            Filesize

            160KB

          • memory/1956-65-0x0000000000400000-0x0000000000428000-memory.dmp

            Filesize

            160KB

          • memory/1956-66-0x0000000000400000-0x0000000000428000-memory.dmp

            Filesize

            160KB

          • memory/1956-67-0x00000000FFFDE000-0x00000000FFFDF000-memory.dmp

            Filesize

            4KB

          • memory/1956-68-0x0000000000400000-0x0000000000428000-memory.dmp

            Filesize

            160KB

          • memory/1956-70-0x0000000000400000-0x0000000000428000-memory.dmp

            Filesize

            160KB

          • memory/1956-72-0x0000000000400000-0x0000000000428000-memory.dmp

            Filesize

            160KB

          • memory/3000-51-0x000007FEF55F0000-0x000007FEF5FDC000-memory.dmp

            Filesize

            9.9MB

          • memory/3000-50-0x000007FEF55F0000-0x000007FEF5FDC000-memory.dmp

            Filesize

            9.9MB

          • memory/3000-49-0x000007FEF55F0000-0x000007FEF5FDC000-memory.dmp

            Filesize

            9.9MB

          • memory/3000-48-0x00000000000C0000-0x00000000000CA000-memory.dmp

            Filesize

            40KB