Analysis

  • max time kernel
    121s
  • max time network
    136s
  • platform
    windows7_x64
  • resource
    win7-20230831-en
  • resource tags

    arch:x64arch:x86image:win7-20230831-enlocale:en-usos:windows7-x64system
  • submitted
    10-10-2023 20:28

General

  • Target

    42a136c900f23537bd25ec83a138ee734ccebdc1eaa0c7b78c6794b28b38a1c3.exe

  • Size

    995KB

  • MD5

    ae69682e8169c4bf4243447e9faa42c5

  • SHA1

    047e601a23dc7d6971815111d8e567d000f0bb8b

  • SHA256

    42a136c900f23537bd25ec83a138ee734ccebdc1eaa0c7b78c6794b28b38a1c3

  • SHA512

    f585d987e88af2f8d3200266179b07bdb17aff6d88bdc79bdaf714f7cce4133f399f0224760c9a512692feddf0b88ce6e7fb1ec8afc204c45c7668774662f4bc

  • SSDEEP

    24576:dy8PPrP+JahH112et+V6HgX7rfe+atI6LAG8i9k1s2fv8g:48P6JaJX2i/gXPffaLLhGf

Malware Config

Extracted

Family

mystic

C2

http://5.42.92.211/loghub/master

Signatures

  • Detect Mystic stealer payload 8 IoCs
  • Detects Healer an antivirus disabler dropper 4 IoCs
  • Healer

    Healer an antivirus disabler dropper.

  • Modifies Windows Defender Real-time Protection settings 3 TTPs 6 IoCs
  • Mystic

    Mystic is an infostealer written in C++.

  • Executes dropped EXE 6 IoCs
  • Loads dropped DLL 16 IoCs
  • Windows security modification 2 TTPs 2 IoCs
  • Adds Run key to start application 2 TTPs 5 IoCs
  • Suspicious use of SetThreadContext 1 IoCs
  • Program crash 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 2 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of WriteProcessMemory 63 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\42a136c900f23537bd25ec83a138ee734ccebdc1eaa0c7b78c6794b28b38a1c3.exe
    "C:\Users\Admin\AppData\Local\Temp\42a136c900f23537bd25ec83a138ee734ccebdc1eaa0c7b78c6794b28b38a1c3.exe"
    1⤵
    • Loads dropped DLL
    • Adds Run key to start application
    • Suspicious use of WriteProcessMemory
    PID:3060
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\z4719501.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\z4719501.exe
      2⤵
      • Executes dropped EXE
      • Loads dropped DLL
      • Adds Run key to start application
      • Suspicious use of WriteProcessMemory
      PID:1992
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\z5933752.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\z5933752.exe
        3⤵
        • Executes dropped EXE
        • Loads dropped DLL
        • Adds Run key to start application
        • Suspicious use of WriteProcessMemory
        PID:2768
        • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\z4344298.exe
          C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\z4344298.exe
          4⤵
          • Executes dropped EXE
          • Loads dropped DLL
          • Adds Run key to start application
          • Suspicious use of WriteProcessMemory
          PID:2788
          • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\z0379505.exe
            C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\z0379505.exe
            5⤵
            • Executes dropped EXE
            • Loads dropped DLL
            • Adds Run key to start application
            • Suspicious use of WriteProcessMemory
            PID:2684
            • C:\Users\Admin\AppData\Local\Temp\IXP004.TMP\q4182726.exe
              C:\Users\Admin\AppData\Local\Temp\IXP004.TMP\q4182726.exe
              6⤵
              • Modifies Windows Defender Real-time Protection settings
              • Executes dropped EXE
              • Windows security modification
              • Suspicious behavior: EnumeratesProcesses
              • Suspicious use of AdjustPrivilegeToken
              PID:2728
            • C:\Users\Admin\AppData\Local\Temp\IXP004.TMP\r5927552.exe
              C:\Users\Admin\AppData\Local\Temp\IXP004.TMP\r5927552.exe
              6⤵
              • Executes dropped EXE
              • Loads dropped DLL
              • Suspicious use of SetThreadContext
              • Suspicious use of WriteProcessMemory
              PID:1668
              • C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe
                "C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"
                7⤵
                  PID:2872
                • C:\Windows\SysWOW64\WerFault.exe
                  C:\Windows\SysWOW64\WerFault.exe -u -p 1668 -s 36
                  7⤵
                  • Loads dropped DLL
                  • Program crash
                  PID:1956

    Network

    MITRE ATT&CK Enterprise v15

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\z4719501.exe
      Filesize

      893KB

      MD5

      a7077ca4fc302bd0d1f73800e892ae43

      SHA1

      5deec330dd1fc8b3f594cbb07e59896a0c31faa8

      SHA256

      a79d5042b7173c9be665bca34b033903ad9c43b27d2263e5edcff03e5ca65ca1

      SHA512

      d769dc9bc9c2a52e0afa51b8f4b7df792a6046b62a34b30bdaed730fbb5b6f5b294d3503cc9631a94c9b0a477df3759d5d3eeb0bca8e72f483ac8d97d4f05b6a

    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\z4719501.exe
      Filesize

      893KB

      MD5

      a7077ca4fc302bd0d1f73800e892ae43

      SHA1

      5deec330dd1fc8b3f594cbb07e59896a0c31faa8

      SHA256

      a79d5042b7173c9be665bca34b033903ad9c43b27d2263e5edcff03e5ca65ca1

      SHA512

      d769dc9bc9c2a52e0afa51b8f4b7df792a6046b62a34b30bdaed730fbb5b6f5b294d3503cc9631a94c9b0a477df3759d5d3eeb0bca8e72f483ac8d97d4f05b6a

    • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\z5933752.exe
      Filesize

      710KB

      MD5

      f0c11aa04516a3997995a3486a19c81a

      SHA1

      fa574bb79cbf356dba307ddd7a5e9f8d6829aa2f

      SHA256

      38e56aede2a07faa23ecd89017266fbbce65d9a4b1d157b66118e3147fa60e47

      SHA512

      bf0344737411bbdb6eb5ac7e7d652b1d984a60d5923986a41b16bd8745d2d4b7cdd845d0839a8f3b68f5ff39e0af24b4b80c8db626449fc4fb1995a20319ae8e

    • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\z5933752.exe
      Filesize

      710KB

      MD5

      f0c11aa04516a3997995a3486a19c81a

      SHA1

      fa574bb79cbf356dba307ddd7a5e9f8d6829aa2f

      SHA256

      38e56aede2a07faa23ecd89017266fbbce65d9a4b1d157b66118e3147fa60e47

      SHA512

      bf0344737411bbdb6eb5ac7e7d652b1d984a60d5923986a41b16bd8745d2d4b7cdd845d0839a8f3b68f5ff39e0af24b4b80c8db626449fc4fb1995a20319ae8e

    • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\z4344298.exe
      Filesize

      528KB

      MD5

      910c13e3c323b1a944ff1f5e6e4a49f3

      SHA1

      94463f0386f7e2734df577b653cd7fde2cfd6946

      SHA256

      82d534ad6190f4db6f8390dc468c66d42a7903f73fd2dc3f71189d98b1aaf7da

      SHA512

      c0526f29a7ffce979cfaa1745ee0225862a204dc31047ba2cc81ebb6c3f0ddc812bddb9ab652f34562ac2c23408eff7d7afcc80eb6695c86006c477560ebdf0d

    • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\z4344298.exe
      Filesize

      528KB

      MD5

      910c13e3c323b1a944ff1f5e6e4a49f3

      SHA1

      94463f0386f7e2734df577b653cd7fde2cfd6946

      SHA256

      82d534ad6190f4db6f8390dc468c66d42a7903f73fd2dc3f71189d98b1aaf7da

      SHA512

      c0526f29a7ffce979cfaa1745ee0225862a204dc31047ba2cc81ebb6c3f0ddc812bddb9ab652f34562ac2c23408eff7d7afcc80eb6695c86006c477560ebdf0d

    • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\z0379505.exe
      Filesize

      296KB

      MD5

      9e0ed6726b1908027774fdf97a013a53

      SHA1

      528988e5c2a5a87aa43f35358d867f7e61f7c1c0

      SHA256

      7715246047fd36f1a1b1660e86db7b73bfe8079fde9a7479bf7e5a3f0f01005f

      SHA512

      6fe1fc07d9b9199a60a94552a0ad002ddb350d4350d3ddeadb269bee67ebe996e0dd448dd14b2fd1c8c93c68db77d2c96686f899a3cfdf35cd3053aaad2cc2af

    • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\z0379505.exe
      Filesize

      296KB

      MD5

      9e0ed6726b1908027774fdf97a013a53

      SHA1

      528988e5c2a5a87aa43f35358d867f7e61f7c1c0

      SHA256

      7715246047fd36f1a1b1660e86db7b73bfe8079fde9a7479bf7e5a3f0f01005f

      SHA512

      6fe1fc07d9b9199a60a94552a0ad002ddb350d4350d3ddeadb269bee67ebe996e0dd448dd14b2fd1c8c93c68db77d2c96686f899a3cfdf35cd3053aaad2cc2af

    • C:\Users\Admin\AppData\Local\Temp\IXP004.TMP\q4182726.exe
      Filesize

      11KB

      MD5

      3f4a7169268f120eee5647e72569b7ac

      SHA1

      1b84e23142b6b9a2686b891d575b683772fde50a

      SHA256

      82f20b18adfee2fd76a73fad5c4f4ba76aaa57a668acd266cda19a0f2886bb2f

      SHA512

      c7c5c4ee269e5768de57564b750c3243bc1d7ab086a624ed779a502380ed652b5cf4b5168b6c42ac7f9c01aa6f0b6603427dab9c7ce3daa6ea98d6756632e9af

    • C:\Users\Admin\AppData\Local\Temp\IXP004.TMP\q4182726.exe
      Filesize

      11KB

      MD5

      3f4a7169268f120eee5647e72569b7ac

      SHA1

      1b84e23142b6b9a2686b891d575b683772fde50a

      SHA256

      82f20b18adfee2fd76a73fad5c4f4ba76aaa57a668acd266cda19a0f2886bb2f

      SHA512

      c7c5c4ee269e5768de57564b750c3243bc1d7ab086a624ed779a502380ed652b5cf4b5168b6c42ac7f9c01aa6f0b6603427dab9c7ce3daa6ea98d6756632e9af

    • C:\Users\Admin\AppData\Local\Temp\IXP004.TMP\r5927552.exe
      Filesize

      276KB

      MD5

      3b08f4571e930aa67dacbaace0edae29

      SHA1

      b89f86a739b26542f2ccf794a93e29a565131b40

      SHA256

      d0f163dfe61ad4f478cf43d5efc6c086c23618f60bd581a5214a61133aba53e3

      SHA512

      5988b5420d62724d7abeec2f0024dc6f9287c1302180ac89a97370efa81829ce59b5779ce2bfb1a34b8b481ee262ae58b7a4749c5f9a84d97d9147c1974510fb

    • C:\Users\Admin\AppData\Local\Temp\IXP004.TMP\r5927552.exe
      Filesize

      276KB

      MD5

      3b08f4571e930aa67dacbaace0edae29

      SHA1

      b89f86a739b26542f2ccf794a93e29a565131b40

      SHA256

      d0f163dfe61ad4f478cf43d5efc6c086c23618f60bd581a5214a61133aba53e3

      SHA512

      5988b5420d62724d7abeec2f0024dc6f9287c1302180ac89a97370efa81829ce59b5779ce2bfb1a34b8b481ee262ae58b7a4749c5f9a84d97d9147c1974510fb

    • C:\Users\Admin\AppData\Local\Temp\IXP004.TMP\r5927552.exe
      Filesize

      276KB

      MD5

      3b08f4571e930aa67dacbaace0edae29

      SHA1

      b89f86a739b26542f2ccf794a93e29a565131b40

      SHA256

      d0f163dfe61ad4f478cf43d5efc6c086c23618f60bd581a5214a61133aba53e3

      SHA512

      5988b5420d62724d7abeec2f0024dc6f9287c1302180ac89a97370efa81829ce59b5779ce2bfb1a34b8b481ee262ae58b7a4749c5f9a84d97d9147c1974510fb

    • \Users\Admin\AppData\Local\Temp\IXP000.TMP\z4719501.exe
      Filesize

      893KB

      MD5

      a7077ca4fc302bd0d1f73800e892ae43

      SHA1

      5deec330dd1fc8b3f594cbb07e59896a0c31faa8

      SHA256

      a79d5042b7173c9be665bca34b033903ad9c43b27d2263e5edcff03e5ca65ca1

      SHA512

      d769dc9bc9c2a52e0afa51b8f4b7df792a6046b62a34b30bdaed730fbb5b6f5b294d3503cc9631a94c9b0a477df3759d5d3eeb0bca8e72f483ac8d97d4f05b6a

    • \Users\Admin\AppData\Local\Temp\IXP000.TMP\z4719501.exe
      Filesize

      893KB

      MD5

      a7077ca4fc302bd0d1f73800e892ae43

      SHA1

      5deec330dd1fc8b3f594cbb07e59896a0c31faa8

      SHA256

      a79d5042b7173c9be665bca34b033903ad9c43b27d2263e5edcff03e5ca65ca1

      SHA512

      d769dc9bc9c2a52e0afa51b8f4b7df792a6046b62a34b30bdaed730fbb5b6f5b294d3503cc9631a94c9b0a477df3759d5d3eeb0bca8e72f483ac8d97d4f05b6a

    • \Users\Admin\AppData\Local\Temp\IXP001.TMP\z5933752.exe
      Filesize

      710KB

      MD5

      f0c11aa04516a3997995a3486a19c81a

      SHA1

      fa574bb79cbf356dba307ddd7a5e9f8d6829aa2f

      SHA256

      38e56aede2a07faa23ecd89017266fbbce65d9a4b1d157b66118e3147fa60e47

      SHA512

      bf0344737411bbdb6eb5ac7e7d652b1d984a60d5923986a41b16bd8745d2d4b7cdd845d0839a8f3b68f5ff39e0af24b4b80c8db626449fc4fb1995a20319ae8e

    • \Users\Admin\AppData\Local\Temp\IXP001.TMP\z5933752.exe
      Filesize

      710KB

      MD5

      f0c11aa04516a3997995a3486a19c81a

      SHA1

      fa574bb79cbf356dba307ddd7a5e9f8d6829aa2f

      SHA256

      38e56aede2a07faa23ecd89017266fbbce65d9a4b1d157b66118e3147fa60e47

      SHA512

      bf0344737411bbdb6eb5ac7e7d652b1d984a60d5923986a41b16bd8745d2d4b7cdd845d0839a8f3b68f5ff39e0af24b4b80c8db626449fc4fb1995a20319ae8e

    • \Users\Admin\AppData\Local\Temp\IXP002.TMP\z4344298.exe
      Filesize

      528KB

      MD5

      910c13e3c323b1a944ff1f5e6e4a49f3

      SHA1

      94463f0386f7e2734df577b653cd7fde2cfd6946

      SHA256

      82d534ad6190f4db6f8390dc468c66d42a7903f73fd2dc3f71189d98b1aaf7da

      SHA512

      c0526f29a7ffce979cfaa1745ee0225862a204dc31047ba2cc81ebb6c3f0ddc812bddb9ab652f34562ac2c23408eff7d7afcc80eb6695c86006c477560ebdf0d

    • \Users\Admin\AppData\Local\Temp\IXP002.TMP\z4344298.exe
      Filesize

      528KB

      MD5

      910c13e3c323b1a944ff1f5e6e4a49f3

      SHA1

      94463f0386f7e2734df577b653cd7fde2cfd6946

      SHA256

      82d534ad6190f4db6f8390dc468c66d42a7903f73fd2dc3f71189d98b1aaf7da

      SHA512

      c0526f29a7ffce979cfaa1745ee0225862a204dc31047ba2cc81ebb6c3f0ddc812bddb9ab652f34562ac2c23408eff7d7afcc80eb6695c86006c477560ebdf0d

    • \Users\Admin\AppData\Local\Temp\IXP003.TMP\z0379505.exe
      Filesize

      296KB

      MD5

      9e0ed6726b1908027774fdf97a013a53

      SHA1

      528988e5c2a5a87aa43f35358d867f7e61f7c1c0

      SHA256

      7715246047fd36f1a1b1660e86db7b73bfe8079fde9a7479bf7e5a3f0f01005f

      SHA512

      6fe1fc07d9b9199a60a94552a0ad002ddb350d4350d3ddeadb269bee67ebe996e0dd448dd14b2fd1c8c93c68db77d2c96686f899a3cfdf35cd3053aaad2cc2af

    • \Users\Admin\AppData\Local\Temp\IXP003.TMP\z0379505.exe
      Filesize

      296KB

      MD5

      9e0ed6726b1908027774fdf97a013a53

      SHA1

      528988e5c2a5a87aa43f35358d867f7e61f7c1c0

      SHA256

      7715246047fd36f1a1b1660e86db7b73bfe8079fde9a7479bf7e5a3f0f01005f

      SHA512

      6fe1fc07d9b9199a60a94552a0ad002ddb350d4350d3ddeadb269bee67ebe996e0dd448dd14b2fd1c8c93c68db77d2c96686f899a3cfdf35cd3053aaad2cc2af

    • \Users\Admin\AppData\Local\Temp\IXP004.TMP\q4182726.exe
      Filesize

      11KB

      MD5

      3f4a7169268f120eee5647e72569b7ac

      SHA1

      1b84e23142b6b9a2686b891d575b683772fde50a

      SHA256

      82f20b18adfee2fd76a73fad5c4f4ba76aaa57a668acd266cda19a0f2886bb2f

      SHA512

      c7c5c4ee269e5768de57564b750c3243bc1d7ab086a624ed779a502380ed652b5cf4b5168b6c42ac7f9c01aa6f0b6603427dab9c7ce3daa6ea98d6756632e9af

    • \Users\Admin\AppData\Local\Temp\IXP004.TMP\r5927552.exe
      Filesize

      276KB

      MD5

      3b08f4571e930aa67dacbaace0edae29

      SHA1

      b89f86a739b26542f2ccf794a93e29a565131b40

      SHA256

      d0f163dfe61ad4f478cf43d5efc6c086c23618f60bd581a5214a61133aba53e3

      SHA512

      5988b5420d62724d7abeec2f0024dc6f9287c1302180ac89a97370efa81829ce59b5779ce2bfb1a34b8b481ee262ae58b7a4749c5f9a84d97d9147c1974510fb

    • \Users\Admin\AppData\Local\Temp\IXP004.TMP\r5927552.exe
      Filesize

      276KB

      MD5

      3b08f4571e930aa67dacbaace0edae29

      SHA1

      b89f86a739b26542f2ccf794a93e29a565131b40

      SHA256

      d0f163dfe61ad4f478cf43d5efc6c086c23618f60bd581a5214a61133aba53e3

      SHA512

      5988b5420d62724d7abeec2f0024dc6f9287c1302180ac89a97370efa81829ce59b5779ce2bfb1a34b8b481ee262ae58b7a4749c5f9a84d97d9147c1974510fb

    • \Users\Admin\AppData\Local\Temp\IXP004.TMP\r5927552.exe
      Filesize

      276KB

      MD5

      3b08f4571e930aa67dacbaace0edae29

      SHA1

      b89f86a739b26542f2ccf794a93e29a565131b40

      SHA256

      d0f163dfe61ad4f478cf43d5efc6c086c23618f60bd581a5214a61133aba53e3

      SHA512

      5988b5420d62724d7abeec2f0024dc6f9287c1302180ac89a97370efa81829ce59b5779ce2bfb1a34b8b481ee262ae58b7a4749c5f9a84d97d9147c1974510fb

    • \Users\Admin\AppData\Local\Temp\IXP004.TMP\r5927552.exe
      Filesize

      276KB

      MD5

      3b08f4571e930aa67dacbaace0edae29

      SHA1

      b89f86a739b26542f2ccf794a93e29a565131b40

      SHA256

      d0f163dfe61ad4f478cf43d5efc6c086c23618f60bd581a5214a61133aba53e3

      SHA512

      5988b5420d62724d7abeec2f0024dc6f9287c1302180ac89a97370efa81829ce59b5779ce2bfb1a34b8b481ee262ae58b7a4749c5f9a84d97d9147c1974510fb

    • \Users\Admin\AppData\Local\Temp\IXP004.TMP\r5927552.exe
      Filesize

      276KB

      MD5

      3b08f4571e930aa67dacbaace0edae29

      SHA1

      b89f86a739b26542f2ccf794a93e29a565131b40

      SHA256

      d0f163dfe61ad4f478cf43d5efc6c086c23618f60bd581a5214a61133aba53e3

      SHA512

      5988b5420d62724d7abeec2f0024dc6f9287c1302180ac89a97370efa81829ce59b5779ce2bfb1a34b8b481ee262ae58b7a4749c5f9a84d97d9147c1974510fb

    • \Users\Admin\AppData\Local\Temp\IXP004.TMP\r5927552.exe
      Filesize

      276KB

      MD5

      3b08f4571e930aa67dacbaace0edae29

      SHA1

      b89f86a739b26542f2ccf794a93e29a565131b40

      SHA256

      d0f163dfe61ad4f478cf43d5efc6c086c23618f60bd581a5214a61133aba53e3

      SHA512

      5988b5420d62724d7abeec2f0024dc6f9287c1302180ac89a97370efa81829ce59b5779ce2bfb1a34b8b481ee262ae58b7a4749c5f9a84d97d9147c1974510fb

    • \Users\Admin\AppData\Local\Temp\IXP004.TMP\r5927552.exe
      Filesize

      276KB

      MD5

      3b08f4571e930aa67dacbaace0edae29

      SHA1

      b89f86a739b26542f2ccf794a93e29a565131b40

      SHA256

      d0f163dfe61ad4f478cf43d5efc6c086c23618f60bd581a5214a61133aba53e3

      SHA512

      5988b5420d62724d7abeec2f0024dc6f9287c1302180ac89a97370efa81829ce59b5779ce2bfb1a34b8b481ee262ae58b7a4749c5f9a84d97d9147c1974510fb

    • memory/2728-51-0x000007FEF58C0000-0x000007FEF62AC000-memory.dmp
      Filesize

      9.9MB

    • memory/2728-50-0x000007FEF58C0000-0x000007FEF62AC000-memory.dmp
      Filesize

      9.9MB

    • memory/2728-48-0x0000000000840000-0x000000000084A000-memory.dmp
      Filesize

      40KB

    • memory/2728-49-0x000007FEF58C0000-0x000007FEF62AC000-memory.dmp
      Filesize

      9.9MB

    • memory/2872-70-0x0000000000400000-0x0000000000428000-memory.dmp
      Filesize

      160KB

    • memory/2872-66-0x0000000000400000-0x0000000000428000-memory.dmp
      Filesize

      160KB

    • memory/2872-65-0x0000000000400000-0x0000000000428000-memory.dmp
      Filesize

      160KB

    • memory/2872-63-0x0000000000400000-0x0000000000428000-memory.dmp
      Filesize

      160KB

    • memory/2872-72-0x0000000000400000-0x0000000000428000-memory.dmp
      Filesize

      160KB

    • memory/2872-74-0x0000000000400000-0x0000000000428000-memory.dmp
      Filesize

      160KB

    • memory/2872-75-0x0000000000400000-0x0000000000428000-memory.dmp
      Filesize

      160KB

    • memory/2872-61-0x0000000000400000-0x0000000000428000-memory.dmp
      Filesize

      160KB

    • memory/2872-67-0x0000000000400000-0x0000000000428000-memory.dmp
      Filesize

      160KB

    • memory/2872-69-0x00000000FFFDE000-0x00000000FFFDF000-memory.dmp
      Filesize

      4KB

    • memory/2872-68-0x0000000000400000-0x0000000000428000-memory.dmp
      Filesize

      160KB

    • memory/2872-80-0x0000000000400000-0x0000000000428000-memory.dmp
      Filesize

      160KB