Analysis

  • max time kernel
    119s
  • max time network
    135s
  • platform
    windows7_x64
  • resource
    win7-20230831-en
  • resource tags

    arch:x64arch:x86image:win7-20230831-enlocale:en-usos:windows7-x64system
  • submitted
    10-10-2023 21:04

General

  • Target

    a1fc5762906cf8412a80bf673a4502be.exe

  • Size

    991KB

  • MD5

    a1fc5762906cf8412a80bf673a4502be

  • SHA1

    368b8bc1ec67c73412b32933010d1b0d9ddca298

  • SHA256

    68dd900449984b916d3837f3e066e2515d258d3866d9e0cf500d6f731b73c3c5

  • SHA512

    10365cca3de3dcb8104970a1bfdd787479fd5a9b059d12927a0cda7fe77270224ad41cd16d6dca482e0408e3e425b8541fef4283ee5fe4aaa1044134ecb1ce5f

  • SSDEEP

    24576:+y3W5ZvXdMBynJJhUqrUxd9PbKaHZlpatb9KjCja:N3W5Zf+qXnUxzbJHZlpopKjC

Malware Config

Signatures

  • Detect Mystic stealer payload 6 IoCs
  • Detects Healer an antivirus disabler dropper 4 IoCs
  • Healer

    Healer an antivirus disabler dropper.

  • Modifies Windows Defender Real-time Protection settings 3 TTPs 6 IoCs
  • Mystic

    Mystic is an infostealer written in C++.

  • Executes dropped EXE 6 IoCs
  • Loads dropped DLL 16 IoCs
  • Windows security modification 2 TTPs 2 IoCs
  • Adds Run key to start application 2 TTPs 5 IoCs
  • Suspicious use of SetThreadContext 1 IoCs
  • Program crash 2 IoCs
  • Suspicious behavior: EnumeratesProcesses 2 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\a1fc5762906cf8412a80bf673a4502be.exe
    "C:\Users\Admin\AppData\Local\Temp\a1fc5762906cf8412a80bf673a4502be.exe"
    1⤵
    • Loads dropped DLL
    • Adds Run key to start application
    • Suspicious use of WriteProcessMemory
    PID:2072
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\z7743467.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\z7743467.exe
      2⤵
      • Executes dropped EXE
      • Loads dropped DLL
      • Adds Run key to start application
      • Suspicious use of WriteProcessMemory
      PID:2600
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\z7317608.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\z7317608.exe
        3⤵
        • Executes dropped EXE
        • Loads dropped DLL
        • Adds Run key to start application
        • Suspicious use of WriteProcessMemory
        PID:2708
        • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\z5199427.exe
          C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\z5199427.exe
          4⤵
          • Executes dropped EXE
          • Loads dropped DLL
          • Adds Run key to start application
          • Suspicious use of WriteProcessMemory
          PID:2700
          • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\z1738756.exe
            C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\z1738756.exe
            5⤵
            • Executes dropped EXE
            • Loads dropped DLL
            • Adds Run key to start application
            • Suspicious use of WriteProcessMemory
            PID:2500
            • C:\Users\Admin\AppData\Local\Temp\IXP004.TMP\q2283497.exe
              C:\Users\Admin\AppData\Local\Temp\IXP004.TMP\q2283497.exe
              6⤵
              • Modifies Windows Defender Real-time Protection settings
              • Executes dropped EXE
              • Windows security modification
              • Suspicious behavior: EnumeratesProcesses
              • Suspicious use of AdjustPrivilegeToken
              PID:2624
            • C:\Users\Admin\AppData\Local\Temp\IXP004.TMP\r2141359.exe
              C:\Users\Admin\AppData\Local\Temp\IXP004.TMP\r2141359.exe
              6⤵
              • Executes dropped EXE
              • Loads dropped DLL
              • Suspicious use of SetThreadContext
              • Suspicious use of WriteProcessMemory
              PID:3012
              • C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe
                "C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"
                7⤵
                • Suspicious use of WriteProcessMemory
                PID:240
                • C:\Windows\SysWOW64\WerFault.exe
                  C:\Windows\SysWOW64\WerFault.exe -u -p 240 -s 268
                  8⤵
                  • Program crash
                  PID:1800
              • C:\Windows\SysWOW64\WerFault.exe
                C:\Windows\SysWOW64\WerFault.exe -u -p 3012 -s 36
                7⤵
                • Loads dropped DLL
                • Program crash
                PID:2444

Network

MITRE ATT&CK Matrix ATT&CK v13

Persistence

Create or Modify System Process

1
T1543

Windows Service

1
T1543.003

Boot or Logon Autostart Execution

1
T1547

Registry Run Keys / Startup Folder

1
T1547.001

Privilege Escalation

Create or Modify System Process

1
T1543

Windows Service

1
T1543.003

Boot or Logon Autostart Execution

1
T1547

Registry Run Keys / Startup Folder

1
T1547.001

Defense Evasion

Modify Registry

3
T1112

Impair Defenses

2
T1562

Disable or Modify Tools

2
T1562.001

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\z7743467.exe
    Filesize

    890KB

    MD5

    99579236b41d7070047907dede87df86

    SHA1

    0e7a9c38419b8b85cb3265a506bf920ca1ccef34

    SHA256

    c73e2c6d86fcd5380cd38a90d9b4aacc24d8e5843de2d33f15bca1496575f04e

    SHA512

    60ccc005d19fca9d9af872e8f0446c4223c9990449f0909a8ef8a116eac8069668d9cef7cdabbc26f606e8325af55183c90bca1f75bf0517d62baf1f2005b847

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\z7743467.exe
    Filesize

    890KB

    MD5

    99579236b41d7070047907dede87df86

    SHA1

    0e7a9c38419b8b85cb3265a506bf920ca1ccef34

    SHA256

    c73e2c6d86fcd5380cd38a90d9b4aacc24d8e5843de2d33f15bca1496575f04e

    SHA512

    60ccc005d19fca9d9af872e8f0446c4223c9990449f0909a8ef8a116eac8069668d9cef7cdabbc26f606e8325af55183c90bca1f75bf0517d62baf1f2005b847

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\z7317608.exe
    Filesize

    709KB

    MD5

    87c3e0b59c44904dcb7aa7777d81ec16

    SHA1

    767da650a3940755561aa827efd98d9fab1e0c21

    SHA256

    fe9500fdb30b9cd2ad9de0f1b42d369ae8d8d8585c31218910ed1a1591ddb6ea

    SHA512

    72af7771156deb86046572a827e77881323dc48ad920aeb850105572b42f6349ec72d5ab89dd535395e6eac5e32e25aedddc2f9058c4628383baf1db0a555535

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\z7317608.exe
    Filesize

    709KB

    MD5

    87c3e0b59c44904dcb7aa7777d81ec16

    SHA1

    767da650a3940755561aa827efd98d9fab1e0c21

    SHA256

    fe9500fdb30b9cd2ad9de0f1b42d369ae8d8d8585c31218910ed1a1591ddb6ea

    SHA512

    72af7771156deb86046572a827e77881323dc48ad920aeb850105572b42f6349ec72d5ab89dd535395e6eac5e32e25aedddc2f9058c4628383baf1db0a555535

  • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\z5199427.exe
    Filesize

    526KB

    MD5

    7c9193c898f2632c795c9c1345dd5d49

    SHA1

    b00c53aefade849cc5774b8aa00318e417847a6b

    SHA256

    57eb02f1eb7fdaa7b776d201b4776a22184e700f7a351ebb498ce89d7cf7df39

    SHA512

    f807e2771b4f5223357972f2baaf2275afc509ac0550cd8890221c5316093fd17b3ca109ab874be3f7ced9d8b0a427e366fbe920d6989ef77ee7134807c649f0

  • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\z5199427.exe
    Filesize

    526KB

    MD5

    7c9193c898f2632c795c9c1345dd5d49

    SHA1

    b00c53aefade849cc5774b8aa00318e417847a6b

    SHA256

    57eb02f1eb7fdaa7b776d201b4776a22184e700f7a351ebb498ce89d7cf7df39

    SHA512

    f807e2771b4f5223357972f2baaf2275afc509ac0550cd8890221c5316093fd17b3ca109ab874be3f7ced9d8b0a427e366fbe920d6989ef77ee7134807c649f0

  • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\z1738756.exe
    Filesize

    296KB

    MD5

    996ecd3b50bf5437062bf203de06d1e6

    SHA1

    0183bff0c7d943110178e951898788835ec4a143

    SHA256

    df81b2281cade867af259f9b14a4fe3f4e5073883806478be9a65cdcc6bda24f

    SHA512

    3824a075cadb527d1b51433f8e7c1af2a8b455413e7fbadeb5570c4f7b4b2ed71caa750f79578b831b6da57c78ff07b39dcba51986561370579010afee7a66a8

  • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\z1738756.exe
    Filesize

    296KB

    MD5

    996ecd3b50bf5437062bf203de06d1e6

    SHA1

    0183bff0c7d943110178e951898788835ec4a143

    SHA256

    df81b2281cade867af259f9b14a4fe3f4e5073883806478be9a65cdcc6bda24f

    SHA512

    3824a075cadb527d1b51433f8e7c1af2a8b455413e7fbadeb5570c4f7b4b2ed71caa750f79578b831b6da57c78ff07b39dcba51986561370579010afee7a66a8

  • C:\Users\Admin\AppData\Local\Temp\IXP004.TMP\q2283497.exe
    Filesize

    11KB

    MD5

    f1192cacffcfa84eb702b9ba7a3afeeb

    SHA1

    ca4e6ccf69873de09572dad637cb6fa05e201bd7

    SHA256

    3517a090418034893dac026a3440e3352e75bb58008542434e0fd2d7e0d14700

    SHA512

    1778b77dc634b22f73dcbd0a697c347ce7d9373d6d0029f6440414844108e87ae6543ab6124651489ad853c37ea9bfaf5dbf3cec365d85f1244f0c04a5d8dbb0

  • C:\Users\Admin\AppData\Local\Temp\IXP004.TMP\q2283497.exe
    Filesize

    11KB

    MD5

    f1192cacffcfa84eb702b9ba7a3afeeb

    SHA1

    ca4e6ccf69873de09572dad637cb6fa05e201bd7

    SHA256

    3517a090418034893dac026a3440e3352e75bb58008542434e0fd2d7e0d14700

    SHA512

    1778b77dc634b22f73dcbd0a697c347ce7d9373d6d0029f6440414844108e87ae6543ab6124651489ad853c37ea9bfaf5dbf3cec365d85f1244f0c04a5d8dbb0

  • C:\Users\Admin\AppData\Local\Temp\IXP004.TMP\r2141359.exe
    Filesize

    276KB

    MD5

    e39bb40fa9dc28efafbf530e7948bc17

    SHA1

    9bc2fae79641d29ea7b9c7224654929fc367ca20

    SHA256

    c7480feb0e35e7aceadd02963503d3c2af440085ef9a5827d7a13600fb3f2ea1

    SHA512

    5b674110f6296536835b5218802e2e24f4b3ab2283b40cdd4becbc2c902ec9ad07a101bd6177d03a7497494f4968de721d521f0b7fffce9fac36c6d72d69701e

  • C:\Users\Admin\AppData\Local\Temp\IXP004.TMP\r2141359.exe
    Filesize

    276KB

    MD5

    e39bb40fa9dc28efafbf530e7948bc17

    SHA1

    9bc2fae79641d29ea7b9c7224654929fc367ca20

    SHA256

    c7480feb0e35e7aceadd02963503d3c2af440085ef9a5827d7a13600fb3f2ea1

    SHA512

    5b674110f6296536835b5218802e2e24f4b3ab2283b40cdd4becbc2c902ec9ad07a101bd6177d03a7497494f4968de721d521f0b7fffce9fac36c6d72d69701e

  • C:\Users\Admin\AppData\Local\Temp\IXP004.TMP\r2141359.exe
    Filesize

    276KB

    MD5

    e39bb40fa9dc28efafbf530e7948bc17

    SHA1

    9bc2fae79641d29ea7b9c7224654929fc367ca20

    SHA256

    c7480feb0e35e7aceadd02963503d3c2af440085ef9a5827d7a13600fb3f2ea1

    SHA512

    5b674110f6296536835b5218802e2e24f4b3ab2283b40cdd4becbc2c902ec9ad07a101bd6177d03a7497494f4968de721d521f0b7fffce9fac36c6d72d69701e

  • \Users\Admin\AppData\Local\Temp\IXP000.TMP\z7743467.exe
    Filesize

    890KB

    MD5

    99579236b41d7070047907dede87df86

    SHA1

    0e7a9c38419b8b85cb3265a506bf920ca1ccef34

    SHA256

    c73e2c6d86fcd5380cd38a90d9b4aacc24d8e5843de2d33f15bca1496575f04e

    SHA512

    60ccc005d19fca9d9af872e8f0446c4223c9990449f0909a8ef8a116eac8069668d9cef7cdabbc26f606e8325af55183c90bca1f75bf0517d62baf1f2005b847

  • \Users\Admin\AppData\Local\Temp\IXP000.TMP\z7743467.exe
    Filesize

    890KB

    MD5

    99579236b41d7070047907dede87df86

    SHA1

    0e7a9c38419b8b85cb3265a506bf920ca1ccef34

    SHA256

    c73e2c6d86fcd5380cd38a90d9b4aacc24d8e5843de2d33f15bca1496575f04e

    SHA512

    60ccc005d19fca9d9af872e8f0446c4223c9990449f0909a8ef8a116eac8069668d9cef7cdabbc26f606e8325af55183c90bca1f75bf0517d62baf1f2005b847

  • \Users\Admin\AppData\Local\Temp\IXP001.TMP\z7317608.exe
    Filesize

    709KB

    MD5

    87c3e0b59c44904dcb7aa7777d81ec16

    SHA1

    767da650a3940755561aa827efd98d9fab1e0c21

    SHA256

    fe9500fdb30b9cd2ad9de0f1b42d369ae8d8d8585c31218910ed1a1591ddb6ea

    SHA512

    72af7771156deb86046572a827e77881323dc48ad920aeb850105572b42f6349ec72d5ab89dd535395e6eac5e32e25aedddc2f9058c4628383baf1db0a555535

  • \Users\Admin\AppData\Local\Temp\IXP001.TMP\z7317608.exe
    Filesize

    709KB

    MD5

    87c3e0b59c44904dcb7aa7777d81ec16

    SHA1

    767da650a3940755561aa827efd98d9fab1e0c21

    SHA256

    fe9500fdb30b9cd2ad9de0f1b42d369ae8d8d8585c31218910ed1a1591ddb6ea

    SHA512

    72af7771156deb86046572a827e77881323dc48ad920aeb850105572b42f6349ec72d5ab89dd535395e6eac5e32e25aedddc2f9058c4628383baf1db0a555535

  • \Users\Admin\AppData\Local\Temp\IXP002.TMP\z5199427.exe
    Filesize

    526KB

    MD5

    7c9193c898f2632c795c9c1345dd5d49

    SHA1

    b00c53aefade849cc5774b8aa00318e417847a6b

    SHA256

    57eb02f1eb7fdaa7b776d201b4776a22184e700f7a351ebb498ce89d7cf7df39

    SHA512

    f807e2771b4f5223357972f2baaf2275afc509ac0550cd8890221c5316093fd17b3ca109ab874be3f7ced9d8b0a427e366fbe920d6989ef77ee7134807c649f0

  • \Users\Admin\AppData\Local\Temp\IXP002.TMP\z5199427.exe
    Filesize

    526KB

    MD5

    7c9193c898f2632c795c9c1345dd5d49

    SHA1

    b00c53aefade849cc5774b8aa00318e417847a6b

    SHA256

    57eb02f1eb7fdaa7b776d201b4776a22184e700f7a351ebb498ce89d7cf7df39

    SHA512

    f807e2771b4f5223357972f2baaf2275afc509ac0550cd8890221c5316093fd17b3ca109ab874be3f7ced9d8b0a427e366fbe920d6989ef77ee7134807c649f0

  • \Users\Admin\AppData\Local\Temp\IXP003.TMP\z1738756.exe
    Filesize

    296KB

    MD5

    996ecd3b50bf5437062bf203de06d1e6

    SHA1

    0183bff0c7d943110178e951898788835ec4a143

    SHA256

    df81b2281cade867af259f9b14a4fe3f4e5073883806478be9a65cdcc6bda24f

    SHA512

    3824a075cadb527d1b51433f8e7c1af2a8b455413e7fbadeb5570c4f7b4b2ed71caa750f79578b831b6da57c78ff07b39dcba51986561370579010afee7a66a8

  • \Users\Admin\AppData\Local\Temp\IXP003.TMP\z1738756.exe
    Filesize

    296KB

    MD5

    996ecd3b50bf5437062bf203de06d1e6

    SHA1

    0183bff0c7d943110178e951898788835ec4a143

    SHA256

    df81b2281cade867af259f9b14a4fe3f4e5073883806478be9a65cdcc6bda24f

    SHA512

    3824a075cadb527d1b51433f8e7c1af2a8b455413e7fbadeb5570c4f7b4b2ed71caa750f79578b831b6da57c78ff07b39dcba51986561370579010afee7a66a8

  • \Users\Admin\AppData\Local\Temp\IXP004.TMP\q2283497.exe
    Filesize

    11KB

    MD5

    f1192cacffcfa84eb702b9ba7a3afeeb

    SHA1

    ca4e6ccf69873de09572dad637cb6fa05e201bd7

    SHA256

    3517a090418034893dac026a3440e3352e75bb58008542434e0fd2d7e0d14700

    SHA512

    1778b77dc634b22f73dcbd0a697c347ce7d9373d6d0029f6440414844108e87ae6543ab6124651489ad853c37ea9bfaf5dbf3cec365d85f1244f0c04a5d8dbb0

  • \Users\Admin\AppData\Local\Temp\IXP004.TMP\r2141359.exe
    Filesize

    276KB

    MD5

    e39bb40fa9dc28efafbf530e7948bc17

    SHA1

    9bc2fae79641d29ea7b9c7224654929fc367ca20

    SHA256

    c7480feb0e35e7aceadd02963503d3c2af440085ef9a5827d7a13600fb3f2ea1

    SHA512

    5b674110f6296536835b5218802e2e24f4b3ab2283b40cdd4becbc2c902ec9ad07a101bd6177d03a7497494f4968de721d521f0b7fffce9fac36c6d72d69701e

  • \Users\Admin\AppData\Local\Temp\IXP004.TMP\r2141359.exe
    Filesize

    276KB

    MD5

    e39bb40fa9dc28efafbf530e7948bc17

    SHA1

    9bc2fae79641d29ea7b9c7224654929fc367ca20

    SHA256

    c7480feb0e35e7aceadd02963503d3c2af440085ef9a5827d7a13600fb3f2ea1

    SHA512

    5b674110f6296536835b5218802e2e24f4b3ab2283b40cdd4becbc2c902ec9ad07a101bd6177d03a7497494f4968de721d521f0b7fffce9fac36c6d72d69701e

  • \Users\Admin\AppData\Local\Temp\IXP004.TMP\r2141359.exe
    Filesize

    276KB

    MD5

    e39bb40fa9dc28efafbf530e7948bc17

    SHA1

    9bc2fae79641d29ea7b9c7224654929fc367ca20

    SHA256

    c7480feb0e35e7aceadd02963503d3c2af440085ef9a5827d7a13600fb3f2ea1

    SHA512

    5b674110f6296536835b5218802e2e24f4b3ab2283b40cdd4becbc2c902ec9ad07a101bd6177d03a7497494f4968de721d521f0b7fffce9fac36c6d72d69701e

  • \Users\Admin\AppData\Local\Temp\IXP004.TMP\r2141359.exe
    Filesize

    276KB

    MD5

    e39bb40fa9dc28efafbf530e7948bc17

    SHA1

    9bc2fae79641d29ea7b9c7224654929fc367ca20

    SHA256

    c7480feb0e35e7aceadd02963503d3c2af440085ef9a5827d7a13600fb3f2ea1

    SHA512

    5b674110f6296536835b5218802e2e24f4b3ab2283b40cdd4becbc2c902ec9ad07a101bd6177d03a7497494f4968de721d521f0b7fffce9fac36c6d72d69701e

  • \Users\Admin\AppData\Local\Temp\IXP004.TMP\r2141359.exe
    Filesize

    276KB

    MD5

    e39bb40fa9dc28efafbf530e7948bc17

    SHA1

    9bc2fae79641d29ea7b9c7224654929fc367ca20

    SHA256

    c7480feb0e35e7aceadd02963503d3c2af440085ef9a5827d7a13600fb3f2ea1

    SHA512

    5b674110f6296536835b5218802e2e24f4b3ab2283b40cdd4becbc2c902ec9ad07a101bd6177d03a7497494f4968de721d521f0b7fffce9fac36c6d72d69701e

  • \Users\Admin\AppData\Local\Temp\IXP004.TMP\r2141359.exe
    Filesize

    276KB

    MD5

    e39bb40fa9dc28efafbf530e7948bc17

    SHA1

    9bc2fae79641d29ea7b9c7224654929fc367ca20

    SHA256

    c7480feb0e35e7aceadd02963503d3c2af440085ef9a5827d7a13600fb3f2ea1

    SHA512

    5b674110f6296536835b5218802e2e24f4b3ab2283b40cdd4becbc2c902ec9ad07a101bd6177d03a7497494f4968de721d521f0b7fffce9fac36c6d72d69701e

  • \Users\Admin\AppData\Local\Temp\IXP004.TMP\r2141359.exe
    Filesize

    276KB

    MD5

    e39bb40fa9dc28efafbf530e7948bc17

    SHA1

    9bc2fae79641d29ea7b9c7224654929fc367ca20

    SHA256

    c7480feb0e35e7aceadd02963503d3c2af440085ef9a5827d7a13600fb3f2ea1

    SHA512

    5b674110f6296536835b5218802e2e24f4b3ab2283b40cdd4becbc2c902ec9ad07a101bd6177d03a7497494f4968de721d521f0b7fffce9fac36c6d72d69701e

  • memory/240-65-0x0000000000400000-0x0000000000428000-memory.dmp
    Filesize

    160KB

  • memory/240-66-0x0000000000400000-0x0000000000428000-memory.dmp
    Filesize

    160KB

  • memory/240-68-0x0000000000400000-0x0000000000428000-memory.dmp
    Filesize

    160KB

  • memory/240-67-0x00000000FFFDE000-0x00000000FFFDF000-memory.dmp
    Filesize

    4KB

  • memory/240-70-0x0000000000400000-0x0000000000428000-memory.dmp
    Filesize

    160KB

  • memory/240-72-0x0000000000400000-0x0000000000428000-memory.dmp
    Filesize

    160KB

  • memory/240-64-0x0000000000400000-0x0000000000428000-memory.dmp
    Filesize

    160KB

  • memory/240-63-0x0000000000400000-0x0000000000428000-memory.dmp
    Filesize

    160KB

  • memory/240-62-0x0000000000400000-0x0000000000428000-memory.dmp
    Filesize

    160KB

  • memory/240-61-0x0000000000400000-0x0000000000428000-memory.dmp
    Filesize

    160KB

  • memory/2624-51-0x000007FEF5820000-0x000007FEF620C000-memory.dmp
    Filesize

    9.9MB

  • memory/2624-50-0x000007FEF5820000-0x000007FEF620C000-memory.dmp
    Filesize

    9.9MB

  • memory/2624-49-0x0000000000140000-0x000000000014A000-memory.dmp
    Filesize

    40KB

  • memory/2624-48-0x000007FEF5820000-0x000007FEF620C000-memory.dmp
    Filesize

    9.9MB