Analysis

  • max time kernel
    119s
  • max time network
    123s
  • platform
    windows7_x64
  • resource
    win7-20230831-en
  • resource tags

    arch:x64arch:x86image:win7-20230831-enlocale:en-usos:windows7-x64system
  • submitted
    11/10/2023, 23:02

General

  • Target

    4ca25082d2172b7dee0dd62afcd9793db79ac0fdcd920a6b0bfd5f9668bb16a5.exe

  • Size

    1.2MB

  • MD5

    fbd3f69fbd58a94f821e1c16c593f91e

  • SHA1

    94588c4d1fd9ca3689593b616ea402ff7fae12b8

  • SHA256

    4ca25082d2172b7dee0dd62afcd9793db79ac0fdcd920a6b0bfd5f9668bb16a5

  • SHA512

    0dd68acf5c22dbaf01115c366e977422a66a67589d92a0b2571d4de693267fdecc248b00e90eb334d6f8303f9ea4f052997cacfa711e00fa8a2f635778b3f013

  • SSDEEP

    24576:Ty5RETi/Rr6DD2PIUSf+aL8wybyXvA+hs+5EYzTuEzeZkKEFkuHdFY8dBnbu:m8TiJr6DqgDf+aL3y2Y+hsqEYmOeavFl

Malware Config

Signatures

  • Detects Healer an antivirus disabler dropper 5 IoCs
  • Healer

    Healer an antivirus disabler dropper.

  • Modifies Windows Defender Real-time Protection settings 3 TTPs 6 IoCs
  • Executes dropped EXE 6 IoCs
  • Loads dropped DLL 17 IoCs
  • Adds Run key to start application 2 TTPs 6 IoCs
  • Suspicious use of SetThreadContext 1 IoCs
  • Program crash 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 2 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\4ca25082d2172b7dee0dd62afcd9793db79ac0fdcd920a6b0bfd5f9668bb16a5.exe
    "C:\Users\Admin\AppData\Local\Temp\4ca25082d2172b7dee0dd62afcd9793db79ac0fdcd920a6b0bfd5f9668bb16a5.exe"
    1⤵
    • Loads dropped DLL
    • Adds Run key to start application
    • Suspicious use of WriteProcessMemory
    PID:2032
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\v2815499.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\v2815499.exe
      2⤵
      • Executes dropped EXE
      • Loads dropped DLL
      • Adds Run key to start application
      • Suspicious use of WriteProcessMemory
      PID:484
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\v9472908.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\v9472908.exe
        3⤵
        • Executes dropped EXE
        • Loads dropped DLL
        • Adds Run key to start application
        • Suspicious use of WriteProcessMemory
        PID:2092
        • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\v4384472.exe
          C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\v4384472.exe
          4⤵
          • Executes dropped EXE
          • Loads dropped DLL
          • Adds Run key to start application
          • Suspicious use of WriteProcessMemory
          PID:2844
          • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\v9293228.exe
            C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\v9293228.exe
            5⤵
            • Executes dropped EXE
            • Loads dropped DLL
            • Adds Run key to start application
            • Suspicious use of WriteProcessMemory
            PID:2860
            • C:\Users\Admin\AppData\Local\Temp\IXP004.TMP\v8718732.exe
              C:\Users\Admin\AppData\Local\Temp\IXP004.TMP\v8718732.exe
              6⤵
              • Executes dropped EXE
              • Loads dropped DLL
              • Adds Run key to start application
              • Suspicious use of WriteProcessMemory
              PID:2276
              • C:\Users\Admin\AppData\Local\Temp\IXP005.TMP\a0467991.exe
                C:\Users\Admin\AppData\Local\Temp\IXP005.TMP\a0467991.exe
                7⤵
                • Executes dropped EXE
                • Loads dropped DLL
                • Suspicious use of SetThreadContext
                • Suspicious use of WriteProcessMemory
                PID:2660
                • C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe
                  "C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"
                  8⤵
                    PID:2512
                  • C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe
                    "C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"
                    8⤵
                      PID:2520
                    • C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe
                      "C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"
                      8⤵
                      • Modifies Windows Defender Real-time Protection settings
                      • Suspicious behavior: EnumeratesProcesses
                      • Suspicious use of AdjustPrivilegeToken
                      PID:2544
                    • C:\Windows\SysWOW64\WerFault.exe
                      C:\Windows\SysWOW64\WerFault.exe -u -p 2660 -s 288
                      8⤵
                      • Loads dropped DLL
                      • Program crash
                      PID:2220

      Network

      MITRE ATT&CK Enterprise v15

      Replay Monitor

      Loading Replay Monitor...

      Downloads

      • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\v2815499.exe

        Filesize

        1.1MB

        MD5

        9a25fba577b3e125095654786341339a

        SHA1

        16edf75247c633601e0b6e761c8455f873cbc1c4

        SHA256

        573ca549bdfe5e15f7522033ddf88ec2e9d1c3f5cba44fdf841d47c6f0a8552e

        SHA512

        2ca65f9cc47cc8beda821c48282524c23ea1dba3ce5d133d39e7b927ddaed441295a6f6c06871bfa2fce1b335770954202b18729f8fba0c70bd214f2e53f3591

      • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\v2815499.exe

        Filesize

        1.1MB

        MD5

        9a25fba577b3e125095654786341339a

        SHA1

        16edf75247c633601e0b6e761c8455f873cbc1c4

        SHA256

        573ca549bdfe5e15f7522033ddf88ec2e9d1c3f5cba44fdf841d47c6f0a8552e

        SHA512

        2ca65f9cc47cc8beda821c48282524c23ea1dba3ce5d133d39e7b927ddaed441295a6f6c06871bfa2fce1b335770954202b18729f8fba0c70bd214f2e53f3591

      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\v9472908.exe

        Filesize

        935KB

        MD5

        16728955790d4af50578c0900fa6d8bc

        SHA1

        5f41f969d3adc4d5828d43de09643a2b5fccdb64

        SHA256

        4515e15079d8c50320452a925277e2b5caee703e21cb988b28aeb3127f8fe724

        SHA512

        11dfeb884895efec7eee77c214c4778c7b7ff0423fcee96ac21970dbd1c279e908f2734b1e62452787c74dac014ca0e3e954965092b3b6c2dbd6a6de29ab7efc

      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\v9472908.exe

        Filesize

        935KB

        MD5

        16728955790d4af50578c0900fa6d8bc

        SHA1

        5f41f969d3adc4d5828d43de09643a2b5fccdb64

        SHA256

        4515e15079d8c50320452a925277e2b5caee703e21cb988b28aeb3127f8fe724

        SHA512

        11dfeb884895efec7eee77c214c4778c7b7ff0423fcee96ac21970dbd1c279e908f2734b1e62452787c74dac014ca0e3e954965092b3b6c2dbd6a6de29ab7efc

      • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\v4384472.exe

        Filesize

        780KB

        MD5

        eeff5fc98dcc24585b9d000041f47706

        SHA1

        467537206bb963b105896e1a42b682d083c7d1af

        SHA256

        66589b7e61580ff42a26b4527856aabf0f9c19818ecc8019641d6a95e8f28207

        SHA512

        46971216b9cbb87432d28b9a29ca752680a84726421385631431c7a2ffc4ef43c319c39fc979360a4c8709806719b1808e3cfc664468a8718b0e1e3c59986f55

      • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\v4384472.exe

        Filesize

        780KB

        MD5

        eeff5fc98dcc24585b9d000041f47706

        SHA1

        467537206bb963b105896e1a42b682d083c7d1af

        SHA256

        66589b7e61580ff42a26b4527856aabf0f9c19818ecc8019641d6a95e8f28207

        SHA512

        46971216b9cbb87432d28b9a29ca752680a84726421385631431c7a2ffc4ef43c319c39fc979360a4c8709806719b1808e3cfc664468a8718b0e1e3c59986f55

      • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\v9293228.exe

        Filesize

        603KB

        MD5

        845eaab187a218aab91d33726a806f20

        SHA1

        24198f33a5b05ef5fab39376c65eb63b22b651d3

        SHA256

        eab68cebc8d61353e1bb475928f229f37230a406ab23390103c869a8168ba166

        SHA512

        64ba2fa898e0a27e9a73e8b29dcf6a3492677dbaeaec27600fd302aae4e80ee584e02530347a08a762a9ca38c661b255af33758acb09f2d46db8d441dec76688

      • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\v9293228.exe

        Filesize

        603KB

        MD5

        845eaab187a218aab91d33726a806f20

        SHA1

        24198f33a5b05ef5fab39376c65eb63b22b651d3

        SHA256

        eab68cebc8d61353e1bb475928f229f37230a406ab23390103c869a8168ba166

        SHA512

        64ba2fa898e0a27e9a73e8b29dcf6a3492677dbaeaec27600fd302aae4e80ee584e02530347a08a762a9ca38c661b255af33758acb09f2d46db8d441dec76688

      • C:\Users\Admin\AppData\Local\Temp\IXP004.TMP\v8718732.exe

        Filesize

        344KB

        MD5

        3e66e75329c1ce1ea535015a4a8f2b3d

        SHA1

        83f4b5b50387bcee316751a52ef1e9e42258ca99

        SHA256

        8a6c1d0e9333b89fa9b2c2a47a321e1cc3dac15db731f0057518befa3c5601e1

        SHA512

        c054e65128b0f9568c21642ca4fcd6419d4d57ad1ea8ee260ef3a2e2307f32369bb7c7e0434113b218727574efcca1579b48807e7b4ab75ba85918306df40eba

      • C:\Users\Admin\AppData\Local\Temp\IXP004.TMP\v8718732.exe

        Filesize

        344KB

        MD5

        3e66e75329c1ce1ea535015a4a8f2b3d

        SHA1

        83f4b5b50387bcee316751a52ef1e9e42258ca99

        SHA256

        8a6c1d0e9333b89fa9b2c2a47a321e1cc3dac15db731f0057518befa3c5601e1

        SHA512

        c054e65128b0f9568c21642ca4fcd6419d4d57ad1ea8ee260ef3a2e2307f32369bb7c7e0434113b218727574efcca1579b48807e7b4ab75ba85918306df40eba

      • C:\Users\Admin\AppData\Local\Temp\IXP005.TMP\a0467991.exe

        Filesize

        220KB

        MD5

        a29461d4d849bf5b277e66b42a8a1a0e

        SHA1

        ddd48318528f4864fb25b205c3639160bb40f752

        SHA256

        a49ea7c1ece6ef20195b2bcfe085032a6b8ceb84aeab0800438b04f41b1a4ffa

        SHA512

        2e3a644fc98b409a74bc1dcc0959f38bcf8d4d3c9d4ea3f7dc9c36c798cc539787a1bc9af0ca19a4b8b7b1b54c6a80e805bd29e8251587833570e326dd8ad864

      • C:\Users\Admin\AppData\Local\Temp\IXP005.TMP\a0467991.exe

        Filesize

        220KB

        MD5

        a29461d4d849bf5b277e66b42a8a1a0e

        SHA1

        ddd48318528f4864fb25b205c3639160bb40f752

        SHA256

        a49ea7c1ece6ef20195b2bcfe085032a6b8ceb84aeab0800438b04f41b1a4ffa

        SHA512

        2e3a644fc98b409a74bc1dcc0959f38bcf8d4d3c9d4ea3f7dc9c36c798cc539787a1bc9af0ca19a4b8b7b1b54c6a80e805bd29e8251587833570e326dd8ad864

      • C:\Users\Admin\AppData\Local\Temp\IXP005.TMP\a0467991.exe

        Filesize

        220KB

        MD5

        a29461d4d849bf5b277e66b42a8a1a0e

        SHA1

        ddd48318528f4864fb25b205c3639160bb40f752

        SHA256

        a49ea7c1ece6ef20195b2bcfe085032a6b8ceb84aeab0800438b04f41b1a4ffa

        SHA512

        2e3a644fc98b409a74bc1dcc0959f38bcf8d4d3c9d4ea3f7dc9c36c798cc539787a1bc9af0ca19a4b8b7b1b54c6a80e805bd29e8251587833570e326dd8ad864

      • \Users\Admin\AppData\Local\Temp\IXP000.TMP\v2815499.exe

        Filesize

        1.1MB

        MD5

        9a25fba577b3e125095654786341339a

        SHA1

        16edf75247c633601e0b6e761c8455f873cbc1c4

        SHA256

        573ca549bdfe5e15f7522033ddf88ec2e9d1c3f5cba44fdf841d47c6f0a8552e

        SHA512

        2ca65f9cc47cc8beda821c48282524c23ea1dba3ce5d133d39e7b927ddaed441295a6f6c06871bfa2fce1b335770954202b18729f8fba0c70bd214f2e53f3591

      • \Users\Admin\AppData\Local\Temp\IXP000.TMP\v2815499.exe

        Filesize

        1.1MB

        MD5

        9a25fba577b3e125095654786341339a

        SHA1

        16edf75247c633601e0b6e761c8455f873cbc1c4

        SHA256

        573ca549bdfe5e15f7522033ddf88ec2e9d1c3f5cba44fdf841d47c6f0a8552e

        SHA512

        2ca65f9cc47cc8beda821c48282524c23ea1dba3ce5d133d39e7b927ddaed441295a6f6c06871bfa2fce1b335770954202b18729f8fba0c70bd214f2e53f3591

      • \Users\Admin\AppData\Local\Temp\IXP001.TMP\v9472908.exe

        Filesize

        935KB

        MD5

        16728955790d4af50578c0900fa6d8bc

        SHA1

        5f41f969d3adc4d5828d43de09643a2b5fccdb64

        SHA256

        4515e15079d8c50320452a925277e2b5caee703e21cb988b28aeb3127f8fe724

        SHA512

        11dfeb884895efec7eee77c214c4778c7b7ff0423fcee96ac21970dbd1c279e908f2734b1e62452787c74dac014ca0e3e954965092b3b6c2dbd6a6de29ab7efc

      • \Users\Admin\AppData\Local\Temp\IXP001.TMP\v9472908.exe

        Filesize

        935KB

        MD5

        16728955790d4af50578c0900fa6d8bc

        SHA1

        5f41f969d3adc4d5828d43de09643a2b5fccdb64

        SHA256

        4515e15079d8c50320452a925277e2b5caee703e21cb988b28aeb3127f8fe724

        SHA512

        11dfeb884895efec7eee77c214c4778c7b7ff0423fcee96ac21970dbd1c279e908f2734b1e62452787c74dac014ca0e3e954965092b3b6c2dbd6a6de29ab7efc

      • \Users\Admin\AppData\Local\Temp\IXP002.TMP\v4384472.exe

        Filesize

        780KB

        MD5

        eeff5fc98dcc24585b9d000041f47706

        SHA1

        467537206bb963b105896e1a42b682d083c7d1af

        SHA256

        66589b7e61580ff42a26b4527856aabf0f9c19818ecc8019641d6a95e8f28207

        SHA512

        46971216b9cbb87432d28b9a29ca752680a84726421385631431c7a2ffc4ef43c319c39fc979360a4c8709806719b1808e3cfc664468a8718b0e1e3c59986f55

      • \Users\Admin\AppData\Local\Temp\IXP002.TMP\v4384472.exe

        Filesize

        780KB

        MD5

        eeff5fc98dcc24585b9d000041f47706

        SHA1

        467537206bb963b105896e1a42b682d083c7d1af

        SHA256

        66589b7e61580ff42a26b4527856aabf0f9c19818ecc8019641d6a95e8f28207

        SHA512

        46971216b9cbb87432d28b9a29ca752680a84726421385631431c7a2ffc4ef43c319c39fc979360a4c8709806719b1808e3cfc664468a8718b0e1e3c59986f55

      • \Users\Admin\AppData\Local\Temp\IXP003.TMP\v9293228.exe

        Filesize

        603KB

        MD5

        845eaab187a218aab91d33726a806f20

        SHA1

        24198f33a5b05ef5fab39376c65eb63b22b651d3

        SHA256

        eab68cebc8d61353e1bb475928f229f37230a406ab23390103c869a8168ba166

        SHA512

        64ba2fa898e0a27e9a73e8b29dcf6a3492677dbaeaec27600fd302aae4e80ee584e02530347a08a762a9ca38c661b255af33758acb09f2d46db8d441dec76688

      • \Users\Admin\AppData\Local\Temp\IXP003.TMP\v9293228.exe

        Filesize

        603KB

        MD5

        845eaab187a218aab91d33726a806f20

        SHA1

        24198f33a5b05ef5fab39376c65eb63b22b651d3

        SHA256

        eab68cebc8d61353e1bb475928f229f37230a406ab23390103c869a8168ba166

        SHA512

        64ba2fa898e0a27e9a73e8b29dcf6a3492677dbaeaec27600fd302aae4e80ee584e02530347a08a762a9ca38c661b255af33758acb09f2d46db8d441dec76688

      • \Users\Admin\AppData\Local\Temp\IXP004.TMP\v8718732.exe

        Filesize

        344KB

        MD5

        3e66e75329c1ce1ea535015a4a8f2b3d

        SHA1

        83f4b5b50387bcee316751a52ef1e9e42258ca99

        SHA256

        8a6c1d0e9333b89fa9b2c2a47a321e1cc3dac15db731f0057518befa3c5601e1

        SHA512

        c054e65128b0f9568c21642ca4fcd6419d4d57ad1ea8ee260ef3a2e2307f32369bb7c7e0434113b218727574efcca1579b48807e7b4ab75ba85918306df40eba

      • \Users\Admin\AppData\Local\Temp\IXP004.TMP\v8718732.exe

        Filesize

        344KB

        MD5

        3e66e75329c1ce1ea535015a4a8f2b3d

        SHA1

        83f4b5b50387bcee316751a52ef1e9e42258ca99

        SHA256

        8a6c1d0e9333b89fa9b2c2a47a321e1cc3dac15db731f0057518befa3c5601e1

        SHA512

        c054e65128b0f9568c21642ca4fcd6419d4d57ad1ea8ee260ef3a2e2307f32369bb7c7e0434113b218727574efcca1579b48807e7b4ab75ba85918306df40eba

      • \Users\Admin\AppData\Local\Temp\IXP005.TMP\a0467991.exe

        Filesize

        220KB

        MD5

        a29461d4d849bf5b277e66b42a8a1a0e

        SHA1

        ddd48318528f4864fb25b205c3639160bb40f752

        SHA256

        a49ea7c1ece6ef20195b2bcfe085032a6b8ceb84aeab0800438b04f41b1a4ffa

        SHA512

        2e3a644fc98b409a74bc1dcc0959f38bcf8d4d3c9d4ea3f7dc9c36c798cc539787a1bc9af0ca19a4b8b7b1b54c6a80e805bd29e8251587833570e326dd8ad864

      • \Users\Admin\AppData\Local\Temp\IXP005.TMP\a0467991.exe

        Filesize

        220KB

        MD5

        a29461d4d849bf5b277e66b42a8a1a0e

        SHA1

        ddd48318528f4864fb25b205c3639160bb40f752

        SHA256

        a49ea7c1ece6ef20195b2bcfe085032a6b8ceb84aeab0800438b04f41b1a4ffa

        SHA512

        2e3a644fc98b409a74bc1dcc0959f38bcf8d4d3c9d4ea3f7dc9c36c798cc539787a1bc9af0ca19a4b8b7b1b54c6a80e805bd29e8251587833570e326dd8ad864

      • \Users\Admin\AppData\Local\Temp\IXP005.TMP\a0467991.exe

        Filesize

        220KB

        MD5

        a29461d4d849bf5b277e66b42a8a1a0e

        SHA1

        ddd48318528f4864fb25b205c3639160bb40f752

        SHA256

        a49ea7c1ece6ef20195b2bcfe085032a6b8ceb84aeab0800438b04f41b1a4ffa

        SHA512

        2e3a644fc98b409a74bc1dcc0959f38bcf8d4d3c9d4ea3f7dc9c36c798cc539787a1bc9af0ca19a4b8b7b1b54c6a80e805bd29e8251587833570e326dd8ad864

      • \Users\Admin\AppData\Local\Temp\IXP005.TMP\a0467991.exe

        Filesize

        220KB

        MD5

        a29461d4d849bf5b277e66b42a8a1a0e

        SHA1

        ddd48318528f4864fb25b205c3639160bb40f752

        SHA256

        a49ea7c1ece6ef20195b2bcfe085032a6b8ceb84aeab0800438b04f41b1a4ffa

        SHA512

        2e3a644fc98b409a74bc1dcc0959f38bcf8d4d3c9d4ea3f7dc9c36c798cc539787a1bc9af0ca19a4b8b7b1b54c6a80e805bd29e8251587833570e326dd8ad864

      • \Users\Admin\AppData\Local\Temp\IXP005.TMP\a0467991.exe

        Filesize

        220KB

        MD5

        a29461d4d849bf5b277e66b42a8a1a0e

        SHA1

        ddd48318528f4864fb25b205c3639160bb40f752

        SHA256

        a49ea7c1ece6ef20195b2bcfe085032a6b8ceb84aeab0800438b04f41b1a4ffa

        SHA512

        2e3a644fc98b409a74bc1dcc0959f38bcf8d4d3c9d4ea3f7dc9c36c798cc539787a1bc9af0ca19a4b8b7b1b54c6a80e805bd29e8251587833570e326dd8ad864

      • \Users\Admin\AppData\Local\Temp\IXP005.TMP\a0467991.exe

        Filesize

        220KB

        MD5

        a29461d4d849bf5b277e66b42a8a1a0e

        SHA1

        ddd48318528f4864fb25b205c3639160bb40f752

        SHA256

        a49ea7c1ece6ef20195b2bcfe085032a6b8ceb84aeab0800438b04f41b1a4ffa

        SHA512

        2e3a644fc98b409a74bc1dcc0959f38bcf8d4d3c9d4ea3f7dc9c36c798cc539787a1bc9af0ca19a4b8b7b1b54c6a80e805bd29e8251587833570e326dd8ad864

      • \Users\Admin\AppData\Local\Temp\IXP005.TMP\a0467991.exe

        Filesize

        220KB

        MD5

        a29461d4d849bf5b277e66b42a8a1a0e

        SHA1

        ddd48318528f4864fb25b205c3639160bb40f752

        SHA256

        a49ea7c1ece6ef20195b2bcfe085032a6b8ceb84aeab0800438b04f41b1a4ffa

        SHA512

        2e3a644fc98b409a74bc1dcc0959f38bcf8d4d3c9d4ea3f7dc9c36c798cc539787a1bc9af0ca19a4b8b7b1b54c6a80e805bd29e8251587833570e326dd8ad864

      • memory/2544-63-0x0000000000400000-0x000000000040A000-memory.dmp

        Filesize

        40KB

      • memory/2544-65-0x0000000000400000-0x000000000040A000-memory.dmp

        Filesize

        40KB

      • memory/2544-67-0x0000000000400000-0x000000000040A000-memory.dmp

        Filesize

        40KB

      • memory/2544-69-0x0000000000400000-0x000000000040A000-memory.dmp

        Filesize

        40KB

      • memory/2544-71-0x00000000FFFDE000-0x00000000FFFDF000-memory.dmp

        Filesize

        4KB

      • memory/2544-72-0x0000000000400000-0x000000000040A000-memory.dmp

        Filesize

        40KB

      • memory/2544-74-0x0000000000400000-0x000000000040A000-memory.dmp

        Filesize

        40KB

      • memory/2544-76-0x0000000000400000-0x000000000040A000-memory.dmp

        Filesize

        40KB