Analysis

  • max time kernel
    118s
  • max time network
    125s
  • platform
    windows7_x64
  • resource
    win7-20230831-en
  • resource tags

    arch:x64arch:x86image:win7-20230831-enlocale:en-usos:windows7-x64system
  • submitted
    10-10-2023 20:30

General

  • Target

    e12b0298c400aeaba40cd0c5086303188cbc5773334d51f8d3da01f05fa44fbb.exe

  • Size

    990KB

  • MD5

    5df1ff21e78186054b57c4beffb97ea7

  • SHA1

    a2ed6fb4261b92a26b4d5ee97d0774afaf3d13c7

  • SHA256

    e12b0298c400aeaba40cd0c5086303188cbc5773334d51f8d3da01f05fa44fbb

  • SHA512

    6bd15e776f4f0df8f2fb0b64d62fcabcb015891292674cc309741973027540b5e0b49ac8180d4ad5eb36417abdb93dcd6c7d0bbb082fb3042bf61f1f2f626fdd

  • SSDEEP

    24576:gyrK9ZvhdH41N89L0noCZOaEKkNDzsSEd3Sca+7Moe:nYhdmN8rCZO1KktzsSQaS

Malware Config

Signatures

  • Detect Mystic stealer payload 6 IoCs
  • Detects Healer an antivirus disabler dropper 4 IoCs
  • Healer

    Healer an antivirus disabler dropper.

  • Modifies Windows Defender Real-time Protection settings 3 TTPs 6 IoCs
  • Mystic

    Mystic is an infostealer written in C++.

  • Executes dropped EXE 6 IoCs
  • Loads dropped DLL 16 IoCs
  • Windows security modification 2 TTPs 2 IoCs
  • Adds Run key to start application 2 TTPs 5 IoCs
  • Suspicious use of SetThreadContext 1 IoCs
  • Program crash 2 IoCs
  • Suspicious behavior: EnumeratesProcesses 2 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\e12b0298c400aeaba40cd0c5086303188cbc5773334d51f8d3da01f05fa44fbb.exe
    "C:\Users\Admin\AppData\Local\Temp\e12b0298c400aeaba40cd0c5086303188cbc5773334d51f8d3da01f05fa44fbb.exe"
    1⤵
    • Loads dropped DLL
    • Adds Run key to start application
    • Suspicious use of WriteProcessMemory
    PID:3056
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\z7708764.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\z7708764.exe
      2⤵
      • Executes dropped EXE
      • Loads dropped DLL
      • Adds Run key to start application
      • Suspicious use of WriteProcessMemory
      PID:2648
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\z8990320.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\z8990320.exe
        3⤵
        • Executes dropped EXE
        • Loads dropped DLL
        • Adds Run key to start application
        • Suspicious use of WriteProcessMemory
        PID:2892
        • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\z8955626.exe
          C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\z8955626.exe
          4⤵
          • Executes dropped EXE
          • Loads dropped DLL
          • Adds Run key to start application
          • Suspicious use of WriteProcessMemory
          PID:2448
  • C:\Users\Admin\AppData\Local\Temp\IXP004.TMP\q6503163.exe
    C:\Users\Admin\AppData\Local\Temp\IXP004.TMP\q6503163.exe
    1⤵
    • Modifies Windows Defender Real-time Protection settings
    • Executes dropped EXE
    • Windows security modification
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    PID:2484
  • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\z8540147.exe
    C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\z8540147.exe
    1⤵
    • Executes dropped EXE
    • Loads dropped DLL
    • Adds Run key to start application
    • Suspicious use of WriteProcessMemory
    PID:2468
    • C:\Users\Admin\AppData\Local\Temp\IXP004.TMP\r2929865.exe
      C:\Users\Admin\AppData\Local\Temp\IXP004.TMP\r2929865.exe
      2⤵
      • Executes dropped EXE
      • Loads dropped DLL
      • Suspicious use of SetThreadContext
      • Suspicious use of WriteProcessMemory
      PID:2516
      • C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe
        "C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"
        3⤵
        • Suspicious use of WriteProcessMemory
        PID:2424
        • C:\Windows\SysWOW64\WerFault.exe
          C:\Windows\SysWOW64\WerFault.exe -u -p 2424 -s 268
          4⤵
          • Program crash
          PID:472
      • C:\Windows\SysWOW64\WerFault.exe
        C:\Windows\SysWOW64\WerFault.exe -u -p 2516 -s 36
        3⤵
        • Loads dropped DLL
        • Program crash
        PID:268

Network

MITRE ATT&CK Matrix ATT&CK v13

Persistence

Create or Modify System Process

1
T1543

Windows Service

1
T1543.003

Boot or Logon Autostart Execution

1
T1547

Registry Run Keys / Startup Folder

1
T1547.001

Privilege Escalation

Create or Modify System Process

1
T1543

Windows Service

1
T1543.003

Boot or Logon Autostart Execution

1
T1547

Registry Run Keys / Startup Folder

1
T1547.001

Defense Evasion

Modify Registry

3
T1112

Impair Defenses

2
T1562

Disable or Modify Tools

2
T1562.001

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\z7708764.exe
    Filesize

    892KB

    MD5

    abb15fc52c135af48dc5c67e743c5341

    SHA1

    7f1c79e9bfeccd39bbff672ca57bd56b2785fcc0

    SHA256

    32744c34670b0338d73546ceb59949d6b6dbe96b3baa599197c470d725939457

    SHA512

    af09a8f06ff26947afe06c7848c37f281f8c72953839baf9c3ed8197648b117b194d9e81519fe13510d4f0cfd798ee4a4ce963bed7ec2d739a38a8717d8fdbec

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\z7708764.exe
    Filesize

    892KB

    MD5

    abb15fc52c135af48dc5c67e743c5341

    SHA1

    7f1c79e9bfeccd39bbff672ca57bd56b2785fcc0

    SHA256

    32744c34670b0338d73546ceb59949d6b6dbe96b3baa599197c470d725939457

    SHA512

    af09a8f06ff26947afe06c7848c37f281f8c72953839baf9c3ed8197648b117b194d9e81519fe13510d4f0cfd798ee4a4ce963bed7ec2d739a38a8717d8fdbec

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\z8990320.exe
    Filesize

    709KB

    MD5

    5fc2fa53fc8323052371c99f84a3ec9f

    SHA1

    ffcc4f49bebf03d99b9dfcb46fc4402eef4e03b0

    SHA256

    df2d928b489f20c36733dceddb01ab2d2d168ca84b34d6ddc8679ff8861f87b6

    SHA512

    5c234fd06fb9dce79ab178201bd81a1dcb7c05ef750b0a371abddd6164faa10740d8e862587db04ebab33b2da06ff6175bc2e5cd66cff696940b7ee987dc181e

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\z8990320.exe
    Filesize

    709KB

    MD5

    5fc2fa53fc8323052371c99f84a3ec9f

    SHA1

    ffcc4f49bebf03d99b9dfcb46fc4402eef4e03b0

    SHA256

    df2d928b489f20c36733dceddb01ab2d2d168ca84b34d6ddc8679ff8861f87b6

    SHA512

    5c234fd06fb9dce79ab178201bd81a1dcb7c05ef750b0a371abddd6164faa10740d8e862587db04ebab33b2da06ff6175bc2e5cd66cff696940b7ee987dc181e

  • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\z8955626.exe
    Filesize

    527KB

    MD5

    8b3f7c84fb69b7a5fd606ca4364f1557

    SHA1

    a9bd46fc9fc4a79de786227944fe84a3aef87f2d

    SHA256

    ae889d276d7b27bdabc2f6d5cd9c9c2b532b33f9417688bfe4a2328d41de79fc

    SHA512

    d4cd7294829d3fa14d4f67128c8afa54cdeccfca8263c213caa0a145f5cf1e3d33760dfceba6fc29dbed3812862359e73fc5214c3011cf0e1bf7c674a03694d8

  • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\z8955626.exe
    Filesize

    527KB

    MD5

    8b3f7c84fb69b7a5fd606ca4364f1557

    SHA1

    a9bd46fc9fc4a79de786227944fe84a3aef87f2d

    SHA256

    ae889d276d7b27bdabc2f6d5cd9c9c2b532b33f9417688bfe4a2328d41de79fc

    SHA512

    d4cd7294829d3fa14d4f67128c8afa54cdeccfca8263c213caa0a145f5cf1e3d33760dfceba6fc29dbed3812862359e73fc5214c3011cf0e1bf7c674a03694d8

  • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\z8540147.exe
    Filesize

    296KB

    MD5

    4ad70df21f293b05f4b4d38a23df1531

    SHA1

    00bf3d55f2ca474e79e9790dea1c844cbd3d29ce

    SHA256

    da122936654fadc2ab058e2ee24e6b223a046f7d2ee4ea616be38ef5235ab0ee

    SHA512

    1fc0bd62509233a318657654821059096fd63a7f56548c62ea622e1984f9e9403abcecc9b0efa932cba6b6b79e316d11bb94757c9dd7f5d0a5cd873d464c3b7d

  • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\z8540147.exe
    Filesize

    296KB

    MD5

    4ad70df21f293b05f4b4d38a23df1531

    SHA1

    00bf3d55f2ca474e79e9790dea1c844cbd3d29ce

    SHA256

    da122936654fadc2ab058e2ee24e6b223a046f7d2ee4ea616be38ef5235ab0ee

    SHA512

    1fc0bd62509233a318657654821059096fd63a7f56548c62ea622e1984f9e9403abcecc9b0efa932cba6b6b79e316d11bb94757c9dd7f5d0a5cd873d464c3b7d

  • C:\Users\Admin\AppData\Local\Temp\IXP004.TMP\q6503163.exe
    Filesize

    11KB

    MD5

    46b6b202f5d09ecb5d316a4becb1ea12

    SHA1

    7336cad615db5bbb34f62ef5e028c3f38ac2af3c

    SHA256

    b10c874c59321a0d2534bb2adbe6a4d8f9eccc64056b7b74c2eb7b50944bec4c

    SHA512

    919e8aecafe75424cc4182452ab557ca08cc8e8b1bec14876a5b3183da4bb752fc3b5e308040e2c50f5797ba9e9a0e5b1d4222426285df13b2a9d891adc7e93b

  • C:\Users\Admin\AppData\Local\Temp\IXP004.TMP\q6503163.exe
    Filesize

    11KB

    MD5

    46b6b202f5d09ecb5d316a4becb1ea12

    SHA1

    7336cad615db5bbb34f62ef5e028c3f38ac2af3c

    SHA256

    b10c874c59321a0d2534bb2adbe6a4d8f9eccc64056b7b74c2eb7b50944bec4c

    SHA512

    919e8aecafe75424cc4182452ab557ca08cc8e8b1bec14876a5b3183da4bb752fc3b5e308040e2c50f5797ba9e9a0e5b1d4222426285df13b2a9d891adc7e93b

  • C:\Users\Admin\AppData\Local\Temp\IXP004.TMP\r2929865.exe
    Filesize

    276KB

    MD5

    068f00cd70936e791a7fb3a75620b58a

    SHA1

    5dd84558f580201309418e3476d69d1361f6ac3f

    SHA256

    881777ba037364fd8f44b92e994ccf0da89ec4b46481f27b8d12967f0fe976eb

    SHA512

    21676e14af88b87d59618f12c646ed73d68e3f393ed293d1761430db330cabc02806b1bf3887a70f07c12e52fa24ec792d09b4f4d91845a67d451612339ea553

  • C:\Users\Admin\AppData\Local\Temp\IXP004.TMP\r2929865.exe
    Filesize

    276KB

    MD5

    068f00cd70936e791a7fb3a75620b58a

    SHA1

    5dd84558f580201309418e3476d69d1361f6ac3f

    SHA256

    881777ba037364fd8f44b92e994ccf0da89ec4b46481f27b8d12967f0fe976eb

    SHA512

    21676e14af88b87d59618f12c646ed73d68e3f393ed293d1761430db330cabc02806b1bf3887a70f07c12e52fa24ec792d09b4f4d91845a67d451612339ea553

  • C:\Users\Admin\AppData\Local\Temp\IXP004.TMP\r2929865.exe
    Filesize

    276KB

    MD5

    068f00cd70936e791a7fb3a75620b58a

    SHA1

    5dd84558f580201309418e3476d69d1361f6ac3f

    SHA256

    881777ba037364fd8f44b92e994ccf0da89ec4b46481f27b8d12967f0fe976eb

    SHA512

    21676e14af88b87d59618f12c646ed73d68e3f393ed293d1761430db330cabc02806b1bf3887a70f07c12e52fa24ec792d09b4f4d91845a67d451612339ea553

  • \Users\Admin\AppData\Local\Temp\IXP000.TMP\z7708764.exe
    Filesize

    892KB

    MD5

    abb15fc52c135af48dc5c67e743c5341

    SHA1

    7f1c79e9bfeccd39bbff672ca57bd56b2785fcc0

    SHA256

    32744c34670b0338d73546ceb59949d6b6dbe96b3baa599197c470d725939457

    SHA512

    af09a8f06ff26947afe06c7848c37f281f8c72953839baf9c3ed8197648b117b194d9e81519fe13510d4f0cfd798ee4a4ce963bed7ec2d739a38a8717d8fdbec

  • \Users\Admin\AppData\Local\Temp\IXP000.TMP\z7708764.exe
    Filesize

    892KB

    MD5

    abb15fc52c135af48dc5c67e743c5341

    SHA1

    7f1c79e9bfeccd39bbff672ca57bd56b2785fcc0

    SHA256

    32744c34670b0338d73546ceb59949d6b6dbe96b3baa599197c470d725939457

    SHA512

    af09a8f06ff26947afe06c7848c37f281f8c72953839baf9c3ed8197648b117b194d9e81519fe13510d4f0cfd798ee4a4ce963bed7ec2d739a38a8717d8fdbec

  • \Users\Admin\AppData\Local\Temp\IXP001.TMP\z8990320.exe
    Filesize

    709KB

    MD5

    5fc2fa53fc8323052371c99f84a3ec9f

    SHA1

    ffcc4f49bebf03d99b9dfcb46fc4402eef4e03b0

    SHA256

    df2d928b489f20c36733dceddb01ab2d2d168ca84b34d6ddc8679ff8861f87b6

    SHA512

    5c234fd06fb9dce79ab178201bd81a1dcb7c05ef750b0a371abddd6164faa10740d8e862587db04ebab33b2da06ff6175bc2e5cd66cff696940b7ee987dc181e

  • \Users\Admin\AppData\Local\Temp\IXP001.TMP\z8990320.exe
    Filesize

    709KB

    MD5

    5fc2fa53fc8323052371c99f84a3ec9f

    SHA1

    ffcc4f49bebf03d99b9dfcb46fc4402eef4e03b0

    SHA256

    df2d928b489f20c36733dceddb01ab2d2d168ca84b34d6ddc8679ff8861f87b6

    SHA512

    5c234fd06fb9dce79ab178201bd81a1dcb7c05ef750b0a371abddd6164faa10740d8e862587db04ebab33b2da06ff6175bc2e5cd66cff696940b7ee987dc181e

  • \Users\Admin\AppData\Local\Temp\IXP002.TMP\z8955626.exe
    Filesize

    527KB

    MD5

    8b3f7c84fb69b7a5fd606ca4364f1557

    SHA1

    a9bd46fc9fc4a79de786227944fe84a3aef87f2d

    SHA256

    ae889d276d7b27bdabc2f6d5cd9c9c2b532b33f9417688bfe4a2328d41de79fc

    SHA512

    d4cd7294829d3fa14d4f67128c8afa54cdeccfca8263c213caa0a145f5cf1e3d33760dfceba6fc29dbed3812862359e73fc5214c3011cf0e1bf7c674a03694d8

  • \Users\Admin\AppData\Local\Temp\IXP002.TMP\z8955626.exe
    Filesize

    527KB

    MD5

    8b3f7c84fb69b7a5fd606ca4364f1557

    SHA1

    a9bd46fc9fc4a79de786227944fe84a3aef87f2d

    SHA256

    ae889d276d7b27bdabc2f6d5cd9c9c2b532b33f9417688bfe4a2328d41de79fc

    SHA512

    d4cd7294829d3fa14d4f67128c8afa54cdeccfca8263c213caa0a145f5cf1e3d33760dfceba6fc29dbed3812862359e73fc5214c3011cf0e1bf7c674a03694d8

  • \Users\Admin\AppData\Local\Temp\IXP003.TMP\z8540147.exe
    Filesize

    296KB

    MD5

    4ad70df21f293b05f4b4d38a23df1531

    SHA1

    00bf3d55f2ca474e79e9790dea1c844cbd3d29ce

    SHA256

    da122936654fadc2ab058e2ee24e6b223a046f7d2ee4ea616be38ef5235ab0ee

    SHA512

    1fc0bd62509233a318657654821059096fd63a7f56548c62ea622e1984f9e9403abcecc9b0efa932cba6b6b79e316d11bb94757c9dd7f5d0a5cd873d464c3b7d

  • \Users\Admin\AppData\Local\Temp\IXP003.TMP\z8540147.exe
    Filesize

    296KB

    MD5

    4ad70df21f293b05f4b4d38a23df1531

    SHA1

    00bf3d55f2ca474e79e9790dea1c844cbd3d29ce

    SHA256

    da122936654fadc2ab058e2ee24e6b223a046f7d2ee4ea616be38ef5235ab0ee

    SHA512

    1fc0bd62509233a318657654821059096fd63a7f56548c62ea622e1984f9e9403abcecc9b0efa932cba6b6b79e316d11bb94757c9dd7f5d0a5cd873d464c3b7d

  • \Users\Admin\AppData\Local\Temp\IXP004.TMP\q6503163.exe
    Filesize

    11KB

    MD5

    46b6b202f5d09ecb5d316a4becb1ea12

    SHA1

    7336cad615db5bbb34f62ef5e028c3f38ac2af3c

    SHA256

    b10c874c59321a0d2534bb2adbe6a4d8f9eccc64056b7b74c2eb7b50944bec4c

    SHA512

    919e8aecafe75424cc4182452ab557ca08cc8e8b1bec14876a5b3183da4bb752fc3b5e308040e2c50f5797ba9e9a0e5b1d4222426285df13b2a9d891adc7e93b

  • \Users\Admin\AppData\Local\Temp\IXP004.TMP\r2929865.exe
    Filesize

    276KB

    MD5

    068f00cd70936e791a7fb3a75620b58a

    SHA1

    5dd84558f580201309418e3476d69d1361f6ac3f

    SHA256

    881777ba037364fd8f44b92e994ccf0da89ec4b46481f27b8d12967f0fe976eb

    SHA512

    21676e14af88b87d59618f12c646ed73d68e3f393ed293d1761430db330cabc02806b1bf3887a70f07c12e52fa24ec792d09b4f4d91845a67d451612339ea553

  • \Users\Admin\AppData\Local\Temp\IXP004.TMP\r2929865.exe
    Filesize

    276KB

    MD5

    068f00cd70936e791a7fb3a75620b58a

    SHA1

    5dd84558f580201309418e3476d69d1361f6ac3f

    SHA256

    881777ba037364fd8f44b92e994ccf0da89ec4b46481f27b8d12967f0fe976eb

    SHA512

    21676e14af88b87d59618f12c646ed73d68e3f393ed293d1761430db330cabc02806b1bf3887a70f07c12e52fa24ec792d09b4f4d91845a67d451612339ea553

  • \Users\Admin\AppData\Local\Temp\IXP004.TMP\r2929865.exe
    Filesize

    276KB

    MD5

    068f00cd70936e791a7fb3a75620b58a

    SHA1

    5dd84558f580201309418e3476d69d1361f6ac3f

    SHA256

    881777ba037364fd8f44b92e994ccf0da89ec4b46481f27b8d12967f0fe976eb

    SHA512

    21676e14af88b87d59618f12c646ed73d68e3f393ed293d1761430db330cabc02806b1bf3887a70f07c12e52fa24ec792d09b4f4d91845a67d451612339ea553

  • \Users\Admin\AppData\Local\Temp\IXP004.TMP\r2929865.exe
    Filesize

    276KB

    MD5

    068f00cd70936e791a7fb3a75620b58a

    SHA1

    5dd84558f580201309418e3476d69d1361f6ac3f

    SHA256

    881777ba037364fd8f44b92e994ccf0da89ec4b46481f27b8d12967f0fe976eb

    SHA512

    21676e14af88b87d59618f12c646ed73d68e3f393ed293d1761430db330cabc02806b1bf3887a70f07c12e52fa24ec792d09b4f4d91845a67d451612339ea553

  • \Users\Admin\AppData\Local\Temp\IXP004.TMP\r2929865.exe
    Filesize

    276KB

    MD5

    068f00cd70936e791a7fb3a75620b58a

    SHA1

    5dd84558f580201309418e3476d69d1361f6ac3f

    SHA256

    881777ba037364fd8f44b92e994ccf0da89ec4b46481f27b8d12967f0fe976eb

    SHA512

    21676e14af88b87d59618f12c646ed73d68e3f393ed293d1761430db330cabc02806b1bf3887a70f07c12e52fa24ec792d09b4f4d91845a67d451612339ea553

  • \Users\Admin\AppData\Local\Temp\IXP004.TMP\r2929865.exe
    Filesize

    276KB

    MD5

    068f00cd70936e791a7fb3a75620b58a

    SHA1

    5dd84558f580201309418e3476d69d1361f6ac3f

    SHA256

    881777ba037364fd8f44b92e994ccf0da89ec4b46481f27b8d12967f0fe976eb

    SHA512

    21676e14af88b87d59618f12c646ed73d68e3f393ed293d1761430db330cabc02806b1bf3887a70f07c12e52fa24ec792d09b4f4d91845a67d451612339ea553

  • \Users\Admin\AppData\Local\Temp\IXP004.TMP\r2929865.exe
    Filesize

    276KB

    MD5

    068f00cd70936e791a7fb3a75620b58a

    SHA1

    5dd84558f580201309418e3476d69d1361f6ac3f

    SHA256

    881777ba037364fd8f44b92e994ccf0da89ec4b46481f27b8d12967f0fe976eb

    SHA512

    21676e14af88b87d59618f12c646ed73d68e3f393ed293d1761430db330cabc02806b1bf3887a70f07c12e52fa24ec792d09b4f4d91845a67d451612339ea553

  • memory/2424-68-0x0000000000400000-0x0000000000428000-memory.dmp
    Filesize

    160KB

  • memory/2424-63-0x0000000000400000-0x0000000000428000-memory.dmp
    Filesize

    160KB

  • memory/2424-72-0x0000000000400000-0x0000000000428000-memory.dmp
    Filesize

    160KB

  • memory/2424-70-0x0000000000400000-0x0000000000428000-memory.dmp
    Filesize

    160KB

  • memory/2424-61-0x0000000000400000-0x0000000000428000-memory.dmp
    Filesize

    160KB

  • memory/2424-62-0x0000000000400000-0x0000000000428000-memory.dmp
    Filesize

    160KB

  • memory/2424-67-0x00000000FFFDE000-0x00000000FFFDF000-memory.dmp
    Filesize

    4KB

  • memory/2424-66-0x0000000000400000-0x0000000000428000-memory.dmp
    Filesize

    160KB

  • memory/2424-65-0x0000000000400000-0x0000000000428000-memory.dmp
    Filesize

    160KB

  • memory/2424-64-0x0000000000400000-0x0000000000428000-memory.dmp
    Filesize

    160KB

  • memory/2484-49-0x000007FEF5460000-0x000007FEF5E4C000-memory.dmp
    Filesize

    9.9MB

  • memory/2484-50-0x000007FEF5460000-0x000007FEF5E4C000-memory.dmp
    Filesize

    9.9MB

  • memory/2484-51-0x000007FEF5460000-0x000007FEF5E4C000-memory.dmp
    Filesize

    9.9MB

  • memory/2484-48-0x0000000000E10000-0x0000000000E1A000-memory.dmp
    Filesize

    40KB