Analysis

  • max time kernel
    119s
  • max time network
    132s
  • platform
    windows7_x64
  • resource
    win7-20230831-en
  • resource tags

    arch:x64arch:x86image:win7-20230831-enlocale:en-usos:windows7-x64system
  • submitted
    10-10-2023 21:03

General

  • Target

    ae1acfbe0694a8320a99f624c4045284c415ea8737f951b6931786b0bc456dbb.exe

  • Size

    994KB

  • MD5

    b40c35ff4d31b02fa5af30c8a1bee06b

  • SHA1

    a6b054a5c2fabac04d3435b48fea24f88ca6f6ba

  • SHA256

    ae1acfbe0694a8320a99f624c4045284c415ea8737f951b6931786b0bc456dbb

  • SHA512

    3e4ffa1400192d4f562d95d7fa15aedf2fd30c3f626a45cd6377e65f7d0f58369491e6996e40fb1e1082e4ace54768885195b079bb7659105918103a188dec8a

  • SSDEEP

    24576:ay3c+bKefyGX7Dze6IZJCqBNB019eaMGaEgUUo/Z:hM+lXSketXeX

Malware Config

Signatures

  • Detect Mystic stealer payload 6 IoCs
  • Detects Healer an antivirus disabler dropper 4 IoCs
  • Healer

    Healer an antivirus disabler dropper.

  • Modifies Windows Defender Real-time Protection settings 3 TTPs 6 IoCs
  • Mystic

    Mystic is an infostealer written in C++.

  • Executes dropped EXE 6 IoCs
  • Loads dropped DLL 16 IoCs
  • Windows security modification 2 TTPs 2 IoCs
  • Adds Run key to start application 2 TTPs 5 IoCs
  • Suspicious use of SetThreadContext 1 IoCs
  • Program crash 2 IoCs
  • Suspicious behavior: EnumeratesProcesses 2 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\ae1acfbe0694a8320a99f624c4045284c415ea8737f951b6931786b0bc456dbb.exe
    "C:\Users\Admin\AppData\Local\Temp\ae1acfbe0694a8320a99f624c4045284c415ea8737f951b6931786b0bc456dbb.exe"
    1⤵
    • Loads dropped DLL
    • Adds Run key to start application
    • Suspicious use of WriteProcessMemory
    PID:3044
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\z9744320.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\z9744320.exe
      2⤵
      • Executes dropped EXE
      • Loads dropped DLL
      • Adds Run key to start application
      • Suspicious use of WriteProcessMemory
      PID:2480
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\z4702737.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\z4702737.exe
        3⤵
        • Executes dropped EXE
        • Loads dropped DLL
        • Adds Run key to start application
        • Suspicious use of WriteProcessMemory
        PID:2908
        • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\z2600862.exe
          C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\z2600862.exe
          4⤵
          • Executes dropped EXE
          • Loads dropped DLL
          • Adds Run key to start application
          • Suspicious use of WriteProcessMemory
          PID:1352
          • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\z6557727.exe
            C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\z6557727.exe
            5⤵
            • Executes dropped EXE
            • Loads dropped DLL
            • Adds Run key to start application
            • Suspicious use of WriteProcessMemory
            PID:2724
            • C:\Users\Admin\AppData\Local\Temp\IXP004.TMP\q7571701.exe
              C:\Users\Admin\AppData\Local\Temp\IXP004.TMP\q7571701.exe
              6⤵
              • Modifies Windows Defender Real-time Protection settings
              • Executes dropped EXE
              • Windows security modification
              • Suspicious behavior: EnumeratesProcesses
              • Suspicious use of AdjustPrivilegeToken
              PID:2644
            • C:\Users\Admin\AppData\Local\Temp\IXP004.TMP\r0665445.exe
              C:\Users\Admin\AppData\Local\Temp\IXP004.TMP\r0665445.exe
              6⤵
              • Executes dropped EXE
              • Loads dropped DLL
              • Suspicious use of SetThreadContext
              • Suspicious use of WriteProcessMemory
              PID:2332
              • C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe
                "C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"
                7⤵
                  PID:2524
                • C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe
                  "C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"
                  7⤵
                    PID:2532
                  • C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe
                    "C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"
                    7⤵
                      PID:2540
                      • C:\Windows\SysWOW64\WerFault.exe
                        C:\Windows\SysWOW64\WerFault.exe -u -p 2540 -s 268
                        8⤵
                        • Program crash
                        PID:2336
                    • C:\Windows\SysWOW64\WerFault.exe
                      C:\Windows\SysWOW64\WerFault.exe -u -p 2332 -s 284
                      7⤵
                      • Loads dropped DLL
                      • Program crash
                      PID:3036

        Network

        MITRE ATT&CK Matrix ATT&CK v13

        Persistence

        Create or Modify System Process

        1
        T1543

        Windows Service

        1
        T1543.003

        Boot or Logon Autostart Execution

        1
        T1547

        Registry Run Keys / Startup Folder

        1
        T1547.001

        Privilege Escalation

        Create or Modify System Process

        1
        T1543

        Windows Service

        1
        T1543.003

        Boot or Logon Autostart Execution

        1
        T1547

        Registry Run Keys / Startup Folder

        1
        T1547.001

        Defense Evasion

        Modify Registry

        3
        T1112

        Impair Defenses

        2
        T1562

        Disable or Modify Tools

        2
        T1562.001

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\z9744320.exe
          Filesize

          892KB

          MD5

          95aed7ea133de6b77ca35ab593a90d20

          SHA1

          3bf13d9c34177754a62394636b337f4b1e0712d1

          SHA256

          47c47724e0e39e1ec5d07bad6aa14127de9176e62ff34503bc22552079f80ba9

          SHA512

          dd1ef82e54e22cc742e6138f0bf539ac2067aa2a36adfff9ccac40966fee7081cf8f205798daf710ce61650cc21985db660ae40100180b83bada455b3d669e33

        • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\z9744320.exe
          Filesize

          892KB

          MD5

          95aed7ea133de6b77ca35ab593a90d20

          SHA1

          3bf13d9c34177754a62394636b337f4b1e0712d1

          SHA256

          47c47724e0e39e1ec5d07bad6aa14127de9176e62ff34503bc22552079f80ba9

          SHA512

          dd1ef82e54e22cc742e6138f0bf539ac2067aa2a36adfff9ccac40966fee7081cf8f205798daf710ce61650cc21985db660ae40100180b83bada455b3d669e33

        • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\z4702737.exe
          Filesize

          709KB

          MD5

          05de0102565a05d8b7b59c93d6da3475

          SHA1

          6e3c6adec93944c95f9fea85110b683287063978

          SHA256

          b6ae8ed180b9cbe5a71096658bab270b1083da0b668c9f9705bee4e635ac12b9

          SHA512

          f0e97ef0f3cf0c1c194266eb761d7475fadc7bfc003e23a23faa3d7301c75e3cfd4bd70e37fbc04a3c6be68217f6bfb53a420ecdbf546056854a322b5ce8d418

        • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\z4702737.exe
          Filesize

          709KB

          MD5

          05de0102565a05d8b7b59c93d6da3475

          SHA1

          6e3c6adec93944c95f9fea85110b683287063978

          SHA256

          b6ae8ed180b9cbe5a71096658bab270b1083da0b668c9f9705bee4e635ac12b9

          SHA512

          f0e97ef0f3cf0c1c194266eb761d7475fadc7bfc003e23a23faa3d7301c75e3cfd4bd70e37fbc04a3c6be68217f6bfb53a420ecdbf546056854a322b5ce8d418

        • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\z2600862.exe
          Filesize

          527KB

          MD5

          2e656137785dde63234b4dd4c9207487

          SHA1

          dff29582543d8d00f78389b4938af24460e73d7e

          SHA256

          cc83b6dd9e6e61857bd1026266f5dd5484a09adea698a55bbf5c967b96fe6dbb

          SHA512

          2fffafbcf1494eab70c90aa474f2b896e23dd15e5bd8c06b7ca1dda6c25791bb15bec8f5b26bc1ce4f03e678b2ba72c4813defb541f786de00d07664e7e4ec00

        • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\z2600862.exe
          Filesize

          527KB

          MD5

          2e656137785dde63234b4dd4c9207487

          SHA1

          dff29582543d8d00f78389b4938af24460e73d7e

          SHA256

          cc83b6dd9e6e61857bd1026266f5dd5484a09adea698a55bbf5c967b96fe6dbb

          SHA512

          2fffafbcf1494eab70c90aa474f2b896e23dd15e5bd8c06b7ca1dda6c25791bb15bec8f5b26bc1ce4f03e678b2ba72c4813defb541f786de00d07664e7e4ec00

        • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\z6557727.exe
          Filesize

          296KB

          MD5

          e50842ad4f8890cc350bd17a6ea238eb

          SHA1

          29e522c976e42d885257f69f172a189df54823da

          SHA256

          9d909ffe7a25a7682ae941062f85c523aa0cdaa0d51159c8bbf44101c60847aa

          SHA512

          fa7fe34304e7d35c3e76c790030ff617882f50140c726dbb5ebc331561df0d088d9ce103c2d815a9c04bba6da44b0d408fafa6aaa0c48570fcde3cb550b9d110

        • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\z6557727.exe
          Filesize

          296KB

          MD5

          e50842ad4f8890cc350bd17a6ea238eb

          SHA1

          29e522c976e42d885257f69f172a189df54823da

          SHA256

          9d909ffe7a25a7682ae941062f85c523aa0cdaa0d51159c8bbf44101c60847aa

          SHA512

          fa7fe34304e7d35c3e76c790030ff617882f50140c726dbb5ebc331561df0d088d9ce103c2d815a9c04bba6da44b0d408fafa6aaa0c48570fcde3cb550b9d110

        • C:\Users\Admin\AppData\Local\Temp\IXP004.TMP\q7571701.exe
          Filesize

          11KB

          MD5

          06cc4542497dc61345ce9eb7eb7ee4b5

          SHA1

          874d20f23b41d45591162e386e3c4ec7e40f88eb

          SHA256

          4717ae79c1619a589e6183f1ca268649cde6950b8b21080a2af0fe94ccd4ee64

          SHA512

          b6fdf0d94126f980ed2fff6b8646a27ef25c0f4ef569ab660e06c7701899e0365eb9af8ee3aeb7de3d3da1e75e979a17bba5dcdcb75020ee53bc39ca3f12181a

        • C:\Users\Admin\AppData\Local\Temp\IXP004.TMP\q7571701.exe
          Filesize

          11KB

          MD5

          06cc4542497dc61345ce9eb7eb7ee4b5

          SHA1

          874d20f23b41d45591162e386e3c4ec7e40f88eb

          SHA256

          4717ae79c1619a589e6183f1ca268649cde6950b8b21080a2af0fe94ccd4ee64

          SHA512

          b6fdf0d94126f980ed2fff6b8646a27ef25c0f4ef569ab660e06c7701899e0365eb9af8ee3aeb7de3d3da1e75e979a17bba5dcdcb75020ee53bc39ca3f12181a

        • C:\Users\Admin\AppData\Local\Temp\IXP004.TMP\r0665445.exe
          Filesize

          276KB

          MD5

          f7d3a3df0f5bbb0b722b9346afb484d4

          SHA1

          558773a9dfcc7004898c155f5a20d30cb745013d

          SHA256

          fad573c8ea55eb79d30e721d45a564084d82ee8e28c35fcc49ee02e8f98891bd

          SHA512

          a983ed516c7c27aa53e4141a80ec930f33c9c03fe611c4d47a1bbd7b7c22320a3676c612e782c7b0c64c4f90cfa14d677a23698aa4532603e3e0d052f859ba04

        • C:\Users\Admin\AppData\Local\Temp\IXP004.TMP\r0665445.exe
          Filesize

          276KB

          MD5

          f7d3a3df0f5bbb0b722b9346afb484d4

          SHA1

          558773a9dfcc7004898c155f5a20d30cb745013d

          SHA256

          fad573c8ea55eb79d30e721d45a564084d82ee8e28c35fcc49ee02e8f98891bd

          SHA512

          a983ed516c7c27aa53e4141a80ec930f33c9c03fe611c4d47a1bbd7b7c22320a3676c612e782c7b0c64c4f90cfa14d677a23698aa4532603e3e0d052f859ba04

        • C:\Users\Admin\AppData\Local\Temp\IXP004.TMP\r0665445.exe
          Filesize

          276KB

          MD5

          f7d3a3df0f5bbb0b722b9346afb484d4

          SHA1

          558773a9dfcc7004898c155f5a20d30cb745013d

          SHA256

          fad573c8ea55eb79d30e721d45a564084d82ee8e28c35fcc49ee02e8f98891bd

          SHA512

          a983ed516c7c27aa53e4141a80ec930f33c9c03fe611c4d47a1bbd7b7c22320a3676c612e782c7b0c64c4f90cfa14d677a23698aa4532603e3e0d052f859ba04

        • \Users\Admin\AppData\Local\Temp\IXP000.TMP\z9744320.exe
          Filesize

          892KB

          MD5

          95aed7ea133de6b77ca35ab593a90d20

          SHA1

          3bf13d9c34177754a62394636b337f4b1e0712d1

          SHA256

          47c47724e0e39e1ec5d07bad6aa14127de9176e62ff34503bc22552079f80ba9

          SHA512

          dd1ef82e54e22cc742e6138f0bf539ac2067aa2a36adfff9ccac40966fee7081cf8f205798daf710ce61650cc21985db660ae40100180b83bada455b3d669e33

        • \Users\Admin\AppData\Local\Temp\IXP000.TMP\z9744320.exe
          Filesize

          892KB

          MD5

          95aed7ea133de6b77ca35ab593a90d20

          SHA1

          3bf13d9c34177754a62394636b337f4b1e0712d1

          SHA256

          47c47724e0e39e1ec5d07bad6aa14127de9176e62ff34503bc22552079f80ba9

          SHA512

          dd1ef82e54e22cc742e6138f0bf539ac2067aa2a36adfff9ccac40966fee7081cf8f205798daf710ce61650cc21985db660ae40100180b83bada455b3d669e33

        • \Users\Admin\AppData\Local\Temp\IXP001.TMP\z4702737.exe
          Filesize

          709KB

          MD5

          05de0102565a05d8b7b59c93d6da3475

          SHA1

          6e3c6adec93944c95f9fea85110b683287063978

          SHA256

          b6ae8ed180b9cbe5a71096658bab270b1083da0b668c9f9705bee4e635ac12b9

          SHA512

          f0e97ef0f3cf0c1c194266eb761d7475fadc7bfc003e23a23faa3d7301c75e3cfd4bd70e37fbc04a3c6be68217f6bfb53a420ecdbf546056854a322b5ce8d418

        • \Users\Admin\AppData\Local\Temp\IXP001.TMP\z4702737.exe
          Filesize

          709KB

          MD5

          05de0102565a05d8b7b59c93d6da3475

          SHA1

          6e3c6adec93944c95f9fea85110b683287063978

          SHA256

          b6ae8ed180b9cbe5a71096658bab270b1083da0b668c9f9705bee4e635ac12b9

          SHA512

          f0e97ef0f3cf0c1c194266eb761d7475fadc7bfc003e23a23faa3d7301c75e3cfd4bd70e37fbc04a3c6be68217f6bfb53a420ecdbf546056854a322b5ce8d418

        • \Users\Admin\AppData\Local\Temp\IXP002.TMP\z2600862.exe
          Filesize

          527KB

          MD5

          2e656137785dde63234b4dd4c9207487

          SHA1

          dff29582543d8d00f78389b4938af24460e73d7e

          SHA256

          cc83b6dd9e6e61857bd1026266f5dd5484a09adea698a55bbf5c967b96fe6dbb

          SHA512

          2fffafbcf1494eab70c90aa474f2b896e23dd15e5bd8c06b7ca1dda6c25791bb15bec8f5b26bc1ce4f03e678b2ba72c4813defb541f786de00d07664e7e4ec00

        • \Users\Admin\AppData\Local\Temp\IXP002.TMP\z2600862.exe
          Filesize

          527KB

          MD5

          2e656137785dde63234b4dd4c9207487

          SHA1

          dff29582543d8d00f78389b4938af24460e73d7e

          SHA256

          cc83b6dd9e6e61857bd1026266f5dd5484a09adea698a55bbf5c967b96fe6dbb

          SHA512

          2fffafbcf1494eab70c90aa474f2b896e23dd15e5bd8c06b7ca1dda6c25791bb15bec8f5b26bc1ce4f03e678b2ba72c4813defb541f786de00d07664e7e4ec00

        • \Users\Admin\AppData\Local\Temp\IXP003.TMP\z6557727.exe
          Filesize

          296KB

          MD5

          e50842ad4f8890cc350bd17a6ea238eb

          SHA1

          29e522c976e42d885257f69f172a189df54823da

          SHA256

          9d909ffe7a25a7682ae941062f85c523aa0cdaa0d51159c8bbf44101c60847aa

          SHA512

          fa7fe34304e7d35c3e76c790030ff617882f50140c726dbb5ebc331561df0d088d9ce103c2d815a9c04bba6da44b0d408fafa6aaa0c48570fcde3cb550b9d110

        • \Users\Admin\AppData\Local\Temp\IXP003.TMP\z6557727.exe
          Filesize

          296KB

          MD5

          e50842ad4f8890cc350bd17a6ea238eb

          SHA1

          29e522c976e42d885257f69f172a189df54823da

          SHA256

          9d909ffe7a25a7682ae941062f85c523aa0cdaa0d51159c8bbf44101c60847aa

          SHA512

          fa7fe34304e7d35c3e76c790030ff617882f50140c726dbb5ebc331561df0d088d9ce103c2d815a9c04bba6da44b0d408fafa6aaa0c48570fcde3cb550b9d110

        • \Users\Admin\AppData\Local\Temp\IXP004.TMP\q7571701.exe
          Filesize

          11KB

          MD5

          06cc4542497dc61345ce9eb7eb7ee4b5

          SHA1

          874d20f23b41d45591162e386e3c4ec7e40f88eb

          SHA256

          4717ae79c1619a589e6183f1ca268649cde6950b8b21080a2af0fe94ccd4ee64

          SHA512

          b6fdf0d94126f980ed2fff6b8646a27ef25c0f4ef569ab660e06c7701899e0365eb9af8ee3aeb7de3d3da1e75e979a17bba5dcdcb75020ee53bc39ca3f12181a

        • \Users\Admin\AppData\Local\Temp\IXP004.TMP\r0665445.exe
          Filesize

          276KB

          MD5

          f7d3a3df0f5bbb0b722b9346afb484d4

          SHA1

          558773a9dfcc7004898c155f5a20d30cb745013d

          SHA256

          fad573c8ea55eb79d30e721d45a564084d82ee8e28c35fcc49ee02e8f98891bd

          SHA512

          a983ed516c7c27aa53e4141a80ec930f33c9c03fe611c4d47a1bbd7b7c22320a3676c612e782c7b0c64c4f90cfa14d677a23698aa4532603e3e0d052f859ba04

        • \Users\Admin\AppData\Local\Temp\IXP004.TMP\r0665445.exe
          Filesize

          276KB

          MD5

          f7d3a3df0f5bbb0b722b9346afb484d4

          SHA1

          558773a9dfcc7004898c155f5a20d30cb745013d

          SHA256

          fad573c8ea55eb79d30e721d45a564084d82ee8e28c35fcc49ee02e8f98891bd

          SHA512

          a983ed516c7c27aa53e4141a80ec930f33c9c03fe611c4d47a1bbd7b7c22320a3676c612e782c7b0c64c4f90cfa14d677a23698aa4532603e3e0d052f859ba04

        • \Users\Admin\AppData\Local\Temp\IXP004.TMP\r0665445.exe
          Filesize

          276KB

          MD5

          f7d3a3df0f5bbb0b722b9346afb484d4

          SHA1

          558773a9dfcc7004898c155f5a20d30cb745013d

          SHA256

          fad573c8ea55eb79d30e721d45a564084d82ee8e28c35fcc49ee02e8f98891bd

          SHA512

          a983ed516c7c27aa53e4141a80ec930f33c9c03fe611c4d47a1bbd7b7c22320a3676c612e782c7b0c64c4f90cfa14d677a23698aa4532603e3e0d052f859ba04

        • \Users\Admin\AppData\Local\Temp\IXP004.TMP\r0665445.exe
          Filesize

          276KB

          MD5

          f7d3a3df0f5bbb0b722b9346afb484d4

          SHA1

          558773a9dfcc7004898c155f5a20d30cb745013d

          SHA256

          fad573c8ea55eb79d30e721d45a564084d82ee8e28c35fcc49ee02e8f98891bd

          SHA512

          a983ed516c7c27aa53e4141a80ec930f33c9c03fe611c4d47a1bbd7b7c22320a3676c612e782c7b0c64c4f90cfa14d677a23698aa4532603e3e0d052f859ba04

        • \Users\Admin\AppData\Local\Temp\IXP004.TMP\r0665445.exe
          Filesize

          276KB

          MD5

          f7d3a3df0f5bbb0b722b9346afb484d4

          SHA1

          558773a9dfcc7004898c155f5a20d30cb745013d

          SHA256

          fad573c8ea55eb79d30e721d45a564084d82ee8e28c35fcc49ee02e8f98891bd

          SHA512

          a983ed516c7c27aa53e4141a80ec930f33c9c03fe611c4d47a1bbd7b7c22320a3676c612e782c7b0c64c4f90cfa14d677a23698aa4532603e3e0d052f859ba04

        • \Users\Admin\AppData\Local\Temp\IXP004.TMP\r0665445.exe
          Filesize

          276KB

          MD5

          f7d3a3df0f5bbb0b722b9346afb484d4

          SHA1

          558773a9dfcc7004898c155f5a20d30cb745013d

          SHA256

          fad573c8ea55eb79d30e721d45a564084d82ee8e28c35fcc49ee02e8f98891bd

          SHA512

          a983ed516c7c27aa53e4141a80ec930f33c9c03fe611c4d47a1bbd7b7c22320a3676c612e782c7b0c64c4f90cfa14d677a23698aa4532603e3e0d052f859ba04

        • \Users\Admin\AppData\Local\Temp\IXP004.TMP\r0665445.exe
          Filesize

          276KB

          MD5

          f7d3a3df0f5bbb0b722b9346afb484d4

          SHA1

          558773a9dfcc7004898c155f5a20d30cb745013d

          SHA256

          fad573c8ea55eb79d30e721d45a564084d82ee8e28c35fcc49ee02e8f98891bd

          SHA512

          a983ed516c7c27aa53e4141a80ec930f33c9c03fe611c4d47a1bbd7b7c22320a3676c612e782c7b0c64c4f90cfa14d677a23698aa4532603e3e0d052f859ba04

        • memory/2540-62-0x0000000000400000-0x0000000000428000-memory.dmp
          Filesize

          160KB

        • memory/2540-61-0x0000000000400000-0x0000000000428000-memory.dmp
          Filesize

          160KB

        • memory/2540-63-0x0000000000400000-0x0000000000428000-memory.dmp
          Filesize

          160KB

        • memory/2540-64-0x0000000000400000-0x0000000000428000-memory.dmp
          Filesize

          160KB

        • memory/2540-65-0x0000000000400000-0x0000000000428000-memory.dmp
          Filesize

          160KB

        • memory/2540-66-0x0000000000400000-0x0000000000428000-memory.dmp
          Filesize

          160KB

        • memory/2540-67-0x00000000FFFDE000-0x00000000FFFDF000-memory.dmp
          Filesize

          4KB

        • memory/2540-68-0x0000000000400000-0x0000000000428000-memory.dmp
          Filesize

          160KB

        • memory/2540-70-0x0000000000400000-0x0000000000428000-memory.dmp
          Filesize

          160KB

        • memory/2540-72-0x0000000000400000-0x0000000000428000-memory.dmp
          Filesize

          160KB

        • memory/2644-51-0x000007FEF59A0000-0x000007FEF638C000-memory.dmp
          Filesize

          9.9MB

        • memory/2644-50-0x000007FEF59A0000-0x000007FEF638C000-memory.dmp
          Filesize

          9.9MB

        • memory/2644-49-0x000007FEF59A0000-0x000007FEF638C000-memory.dmp
          Filesize

          9.9MB

        • memory/2644-48-0x0000000001100000-0x000000000110A000-memory.dmp
          Filesize

          40KB