Analysis

  • max time kernel
    144s
  • max time network
    171s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20230915-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20230915-enlocale:en-usos:windows10-2004-x64system
  • submitted
    11/10/2023, 15:00

General

  • Target

    file.exe

  • Size

    1.3MB

  • MD5

    813b11893d5e6eba84f93dfac75647bf

  • SHA1

    00acdd2bcc7f5e9c43e53ac3f98e9679a721a125

  • SHA256

    fa96f32dffc26c286f041c805998e70bb94f3ece02d1e791b5b604880aba297c

  • SHA512

    1f3e18ed8d87245a55836d17e454022133b660eb69c055b2ecc8e72dbcec30efb763f8be02cda56c4fedb735b91192955f0ca2c219dfd5e9faa18ac421b5e1fc

  • SSDEEP

    24576:7ytr9PzrKs/ETwpimtsA6ewpI/n65hnL/xFkcgUQxRhpcIAdvLa4iZzyr2H8Syss:ussiKaeF/S5yUYXi+4iAr2cSys

Malware Config

Extracted

Family

redline

Botnet

darts

C2

77.91.124.82:19071

Attributes
  • auth_value

    3c8818da7045365845f15ec0946ebf11

Extracted

Family

redline

Botnet

kendo

C2

77.91.124.82:19071

Attributes
  • auth_value

    5a22a881561d49941415902859b51f14

Extracted

Family

mystic

C2

http://5.42.92.211/loghub/master

Signatures

  • Detect Mystic stealer payload 6 IoCs
  • Detects Healer an antivirus disabler dropper 1 IoCs
  • Healer

    Healer an antivirus disabler dropper.

  • Modifies Windows Defender Real-time Protection settings 3 TTPs 6 IoCs
  • Mystic

    Mystic is an infostealer written in C++.

  • RedLine

    RedLine Stealer is a malware family written in C#, first appearing in early 2020.

  • Executes dropped EXE 10 IoCs
  • Adds Run key to start application 2 TTPs 6 IoCs
  • Suspicious use of SetThreadContext 3 IoCs
  • Program crash 4 IoCs
  • Suspicious behavior: EnumeratesProcesses 2 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of WriteProcessMemory 62 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\file.exe
    "C:\Users\Admin\AppData\Local\Temp\file.exe"
    1⤵
    • Adds Run key to start application
    • Suspicious use of WriteProcessMemory
    PID:2020
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\v7878794.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\v7878794.exe
      2⤵
      • Executes dropped EXE
      • Adds Run key to start application
      • Suspicious use of WriteProcessMemory
      PID:1100
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\v8880905.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\v8880905.exe
        3⤵
        • Executes dropped EXE
        • Adds Run key to start application
        • Suspicious use of WriteProcessMemory
        PID:2116
        • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\v2212635.exe
          C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\v2212635.exe
          4⤵
          • Executes dropped EXE
          • Adds Run key to start application
          • Suspicious use of WriteProcessMemory
          PID:1136
          • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\v8976906.exe
            C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\v8976906.exe
            5⤵
            • Executes dropped EXE
            • Adds Run key to start application
            • Suspicious use of WriteProcessMemory
            PID:1364
            • C:\Users\Admin\AppData\Local\Temp\IXP004.TMP\v3563900.exe
              C:\Users\Admin\AppData\Local\Temp\IXP004.TMP\v3563900.exe
              6⤵
              • Executes dropped EXE
              • Adds Run key to start application
              • Suspicious use of WriteProcessMemory
              PID:2776
              • C:\Users\Admin\AppData\Local\Temp\IXP005.TMP\a6004896.exe
                C:\Users\Admin\AppData\Local\Temp\IXP005.TMP\a6004896.exe
                7⤵
                • Executes dropped EXE
                • Suspicious use of SetThreadContext
                • Suspicious use of WriteProcessMemory
                PID:4360
                • C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe
                  "C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"
                  8⤵
                    PID:2180
                  • C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe
                    "C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"
                    8⤵
                    • Modifies Windows Defender Real-time Protection settings
                    • Suspicious behavior: EnumeratesProcesses
                    • Suspicious use of AdjustPrivilegeToken
                    PID:852
                  • C:\Windows\SysWOW64\WerFault.exe
                    C:\Windows\SysWOW64\WerFault.exe -u -p 4360 -s 588
                    8⤵
                    • Program crash
                    PID:3640
                • C:\Users\Admin\AppData\Local\Temp\IXP005.TMP\b4993620.exe
                  C:\Users\Admin\AppData\Local\Temp\IXP005.TMP\b4993620.exe
                  7⤵
                  • Executes dropped EXE
                  • Suspicious use of SetThreadContext
                  • Suspicious use of WriteProcessMemory
                  PID:4732
                  • C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe
                    "C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"
                    8⤵
                      PID:1256
                    • C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe
                      "C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"
                      8⤵
                        PID:1424
                        • C:\Windows\SysWOW64\WerFault.exe
                          C:\Windows\SysWOW64\WerFault.exe -u -p 1424 -s 540
                          9⤵
                          • Program crash
                          PID:1192
                      • C:\Windows\SysWOW64\WerFault.exe
                        C:\Windows\SysWOW64\WerFault.exe -u -p 4732 -s 572
                        8⤵
                        • Program crash
                        PID:4036
                  • C:\Users\Admin\AppData\Local\Temp\IXP004.TMP\c8673143.exe
                    C:\Users\Admin\AppData\Local\Temp\IXP004.TMP\c8673143.exe
                    6⤵
                    • Executes dropped EXE
                    • Suspicious use of SetThreadContext
                    • Suspicious use of WriteProcessMemory
                    PID:1820
                    • C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe
                      "C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"
                      7⤵
                        PID:3192
                      • C:\Windows\SysWOW64\WerFault.exe
                        C:\Windows\SysWOW64\WerFault.exe -u -p 1820 -s 552
                        7⤵
                        • Program crash
                        PID:1604
                  • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\d6207196.exe
                    C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\d6207196.exe
                    5⤵
                    • Executes dropped EXE
                    PID:4184
                • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\e7761357.exe
                  C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\e7761357.exe
                  4⤵
                  • Executes dropped EXE
                  PID:3980
          • C:\Windows\SysWOW64\WerFault.exe
            C:\Windows\SysWOW64\WerFault.exe -pss -s 476 -p 4360 -ip 4360
            1⤵
              PID:4940
            • C:\Windows\SysWOW64\WerFault.exe
              C:\Windows\SysWOW64\WerFault.exe -pss -s 564 -p 4732 -ip 4732
              1⤵
                PID:412
              • C:\Windows\SysWOW64\WerFault.exe
                C:\Windows\SysWOW64\WerFault.exe -pss -s 416 -p 1424 -ip 1424
                1⤵
                  PID:4768
                • C:\Windows\SysWOW64\WerFault.exe
                  C:\Windows\SysWOW64\WerFault.exe -pss -s 604 -p 1820 -ip 1820
                  1⤵
                    PID:2860

                  Network

                  MITRE ATT&CK Enterprise v15

                  Replay Monitor

                  Loading Replay Monitor...

                  Downloads

                  • C:\Users\Admin\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\AppLaunch.exe.log

                    Filesize

                    226B

                    MD5

                    916851e072fbabc4796d8916c5131092

                    SHA1

                    d48a602229a690c512d5fdaf4c8d77547a88e7a2

                    SHA256

                    7e750c904c43d27c89e55af809a679a96c0bb63fc511006ffbceffc2c7f6fb7d

                    SHA512

                    07ce4c881d6c411cac0b62364377e77950797c486804fb10d00555458716e3c47b1efc0d1f37e4cc3b7e6565bb402ca01c7ea8c963f9f9ace941a6e3883d2521

                  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\v7878794.exe

                    Filesize

                    1.2MB

                    MD5

                    7737e80b017cd71e83b1b925710e4605

                    SHA1

                    14b816f7fa9e5dce7a4d8175f76d2d435778068d

                    SHA256

                    06c09be6dd27c6b40e7ce307aa2266476b9e2c04989b7f03da24d588cc49d7c4

                    SHA512

                    5a9134f795d741ac43a9d799264101d44e6e7ad4f3b5594f5b2f893463d216000b37697f658340d022b172213541e0f9d020fe98b3ba5a40113dd18440efdc77

                  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\v7878794.exe

                    Filesize

                    1.2MB

                    MD5

                    7737e80b017cd71e83b1b925710e4605

                    SHA1

                    14b816f7fa9e5dce7a4d8175f76d2d435778068d

                    SHA256

                    06c09be6dd27c6b40e7ce307aa2266476b9e2c04989b7f03da24d588cc49d7c4

                    SHA512

                    5a9134f795d741ac43a9d799264101d44e6e7ad4f3b5594f5b2f893463d216000b37697f658340d022b172213541e0f9d020fe98b3ba5a40113dd18440efdc77

                  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\v8880905.exe

                    Filesize

                    939KB

                    MD5

                    f124481a40d388571d1da8596e520f1b

                    SHA1

                    7ecbc6c502d2c4074636cd4e15c1df3a28532516

                    SHA256

                    584688f84074c2d0d9398648a91153b79c4a853d3800b8f1dbd48a4fc8d11842

                    SHA512

                    e4d8fd9e4ffbfbf925be569f12443b732d1d2040069c02364ec37bce987720089db8b9c2292ac32f575061fb082556b76a9761f45b5fc82e9f5bdb84496a2bdf

                  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\v8880905.exe

                    Filesize

                    939KB

                    MD5

                    f124481a40d388571d1da8596e520f1b

                    SHA1

                    7ecbc6c502d2c4074636cd4e15c1df3a28532516

                    SHA256

                    584688f84074c2d0d9398648a91153b79c4a853d3800b8f1dbd48a4fc8d11842

                    SHA512

                    e4d8fd9e4ffbfbf925be569f12443b732d1d2040069c02364ec37bce987720089db8b9c2292ac32f575061fb082556b76a9761f45b5fc82e9f5bdb84496a2bdf

                  • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\e7761357.exe

                    Filesize

                    174KB

                    MD5

                    a89450e6dc196591c0f7278a3d563844

                    SHA1

                    59e1a598facc826e4e648fb53bc07c6e0d1ba9ee

                    SHA256

                    1ece47f4b67d2346c1ecd568a8df7818bdd49c372a6507527f5ed8f58101bc7d

                    SHA512

                    420beb44e07d8ab04db439617d79db9557a7025e37dfb151535c12033e351b856bc2469a092aebdd6f1321b0219914c6a3fd7f693e05431e9eba34d2bcf9c858

                  • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\e7761357.exe

                    Filesize

                    174KB

                    MD5

                    a89450e6dc196591c0f7278a3d563844

                    SHA1

                    59e1a598facc826e4e648fb53bc07c6e0d1ba9ee

                    SHA256

                    1ece47f4b67d2346c1ecd568a8df7818bdd49c372a6507527f5ed8f58101bc7d

                    SHA512

                    420beb44e07d8ab04db439617d79db9557a7025e37dfb151535c12033e351b856bc2469a092aebdd6f1321b0219914c6a3fd7f693e05431e9eba34d2bcf9c858

                  • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\v2212635.exe

                    Filesize

                    783KB

                    MD5

                    670fbb95b400bd7c7db58303914c0c26

                    SHA1

                    f327763c8223a1d3e3c899d98c101b317cd64b0c

                    SHA256

                    f885d06dcaa54a34f6413c44332b73351c07cd3a137f09592067921e49a78562

                    SHA512

                    3230c5776e42f56c0977319b29f47c2e5c5e2581e32fff5727349e9b3c1c91c7c27dad98a92daf2de9de1949b10e83c3af79cccc6c4b329c9a296d11e1cec195

                  • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\v2212635.exe

                    Filesize

                    783KB

                    MD5

                    670fbb95b400bd7c7db58303914c0c26

                    SHA1

                    f327763c8223a1d3e3c899d98c101b317cd64b0c

                    SHA256

                    f885d06dcaa54a34f6413c44332b73351c07cd3a137f09592067921e49a78562

                    SHA512

                    3230c5776e42f56c0977319b29f47c2e5c5e2581e32fff5727349e9b3c1c91c7c27dad98a92daf2de9de1949b10e83c3af79cccc6c4b329c9a296d11e1cec195

                  • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\d6207196.exe

                    Filesize

                    140KB

                    MD5

                    b200e0b4dfdbe129f6a72ac3e9261a2f

                    SHA1

                    88231355441b4eb173d3084d7904aefba7e7687e

                    SHA256

                    901ec5f7ff085330112810a8a9a235b2e189d4744ffd2da7c6437f15b172ba64

                    SHA512

                    ec6ad900274b5d4ce533ebb7733f94d806d19b1afacda70dac7101cce9650d5780532cb9544b962810b12be788f5a7359d3a8935e750ca44161051be3183891a

                  • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\d6207196.exe

                    Filesize

                    140KB

                    MD5

                    b200e0b4dfdbe129f6a72ac3e9261a2f

                    SHA1

                    88231355441b4eb173d3084d7904aefba7e7687e

                    SHA256

                    901ec5f7ff085330112810a8a9a235b2e189d4744ffd2da7c6437f15b172ba64

                    SHA512

                    ec6ad900274b5d4ce533ebb7733f94d806d19b1afacda70dac7101cce9650d5780532cb9544b962810b12be788f5a7359d3a8935e750ca44161051be3183891a

                  • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\v8976906.exe

                    Filesize

                    617KB

                    MD5

                    6c0f76b729260b1b679eda22b9ccc6b2

                    SHA1

                    91755ccc984a0cd9fcfcd37e8267f6f09e9c882b

                    SHA256

                    9c33a9f2410742cfd3d4c678ea0f57a29fc6aa324db7f3c2c9285e84f3bee67a

                    SHA512

                    8e4267a94a6a6071c64586e05e1c159c7404b85c8b1d6285e1ff072709ae30c8b98c5479bc567e71c741fcb881ae93bff9c68150c34ee01c6c73d12e8672c4e8

                  • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\v8976906.exe

                    Filesize

                    617KB

                    MD5

                    6c0f76b729260b1b679eda22b9ccc6b2

                    SHA1

                    91755ccc984a0cd9fcfcd37e8267f6f09e9c882b

                    SHA256

                    9c33a9f2410742cfd3d4c678ea0f57a29fc6aa324db7f3c2c9285e84f3bee67a

                    SHA512

                    8e4267a94a6a6071c64586e05e1c159c7404b85c8b1d6285e1ff072709ae30c8b98c5479bc567e71c741fcb881ae93bff9c68150c34ee01c6c73d12e8672c4e8

                  • C:\Users\Admin\AppData\Local\Temp\IXP004.TMP\c8673143.exe

                    Filesize

                    398KB

                    MD5

                    2685dc4b5b4e62a15314c728faca5870

                    SHA1

                    2073fe029377cc831212597470c09f83708dd6c3

                    SHA256

                    809ff2a82115457978ec891b7e0e7deda088a751c2c5b6d8be893728b37172ca

                    SHA512

                    8e2ce4974b6e718b62498f41dffc6c76199ac8e0762136f6dd01dc964da4c71567119f482eef3ad50a69a28cae7579094b22e579e56a3053aae2f8d0bd658c48

                  • C:\Users\Admin\AppData\Local\Temp\IXP004.TMP\c8673143.exe

                    Filesize

                    398KB

                    MD5

                    2685dc4b5b4e62a15314c728faca5870

                    SHA1

                    2073fe029377cc831212597470c09f83708dd6c3

                    SHA256

                    809ff2a82115457978ec891b7e0e7deda088a751c2c5b6d8be893728b37172ca

                    SHA512

                    8e2ce4974b6e718b62498f41dffc6c76199ac8e0762136f6dd01dc964da4c71567119f482eef3ad50a69a28cae7579094b22e579e56a3053aae2f8d0bd658c48

                  • C:\Users\Admin\AppData\Local\Temp\IXP004.TMP\v3563900.exe

                    Filesize

                    346KB

                    MD5

                    56b6f992cec1c8126e84cd956393b7d1

                    SHA1

                    930def526998a662268dc726d73462ce2f5ec285

                    SHA256

                    ea4495fbb1ce8bbd4a5666d28153701708e57b276befb3425d6b845400e7809c

                    SHA512

                    6c5ebeb7cfd1e3f13640385955f411521bc7ae4fac94eeb185f3a705d9a141f353dbba4a36e6e3c69095c32527a5dc5666f163daa35471f00b7af97203f51367

                  • C:\Users\Admin\AppData\Local\Temp\IXP004.TMP\v3563900.exe

                    Filesize

                    346KB

                    MD5

                    56b6f992cec1c8126e84cd956393b7d1

                    SHA1

                    930def526998a662268dc726d73462ce2f5ec285

                    SHA256

                    ea4495fbb1ce8bbd4a5666d28153701708e57b276befb3425d6b845400e7809c

                    SHA512

                    6c5ebeb7cfd1e3f13640385955f411521bc7ae4fac94eeb185f3a705d9a141f353dbba4a36e6e3c69095c32527a5dc5666f163daa35471f00b7af97203f51367

                  • C:\Users\Admin\AppData\Local\Temp\IXP005.TMP\a6004896.exe

                    Filesize

                    235KB

                    MD5

                    fba4fb38f3cbf2260b62a4e604f66082

                    SHA1

                    b2de378967c375b186cafa796f371241a47c5936

                    SHA256

                    99cfe20d3200f5320594905448b676d3a51f915685942f7c543ffe5c16529185

                    SHA512

                    40937876ab46a943a49520e7da86dc2e59cafd3ff1d9baba7bae63d31c5a63cfa4e80624d7b5816f647e5b4ba47796f2537e7b5e9a71f57395b7c81c7023de5e

                  • C:\Users\Admin\AppData\Local\Temp\IXP005.TMP\a6004896.exe

                    Filesize

                    235KB

                    MD5

                    fba4fb38f3cbf2260b62a4e604f66082

                    SHA1

                    b2de378967c375b186cafa796f371241a47c5936

                    SHA256

                    99cfe20d3200f5320594905448b676d3a51f915685942f7c543ffe5c16529185

                    SHA512

                    40937876ab46a943a49520e7da86dc2e59cafd3ff1d9baba7bae63d31c5a63cfa4e80624d7b5816f647e5b4ba47796f2537e7b5e9a71f57395b7c81c7023de5e

                  • C:\Users\Admin\AppData\Local\Temp\IXP005.TMP\b4993620.exe

                    Filesize

                    364KB

                    MD5

                    4733def067883715f7c8b4c998c05353

                    SHA1

                    b6f7d9153b78fc2c083556398c941999301624e8

                    SHA256

                    b19d73011a0f5f2b8d36ca63ea05027851a83c6885dedcb50569267a66ac08e2

                    SHA512

                    e6ea1fda17b78d99c3bc1d109abf8cdb0bc047ea08e6cb7b7fc820efe019e0ef020df9253f1974b20c5b48614337b434b52a6449ecb3b886e6ea831e54a3b86b

                  • C:\Users\Admin\AppData\Local\Temp\IXP005.TMP\b4993620.exe

                    Filesize

                    364KB

                    MD5

                    4733def067883715f7c8b4c998c05353

                    SHA1

                    b6f7d9153b78fc2c083556398c941999301624e8

                    SHA256

                    b19d73011a0f5f2b8d36ca63ea05027851a83c6885dedcb50569267a66ac08e2

                    SHA512

                    e6ea1fda17b78d99c3bc1d109abf8cdb0bc047ea08e6cb7b7fc820efe019e0ef020df9253f1974b20c5b48614337b434b52a6449ecb3b886e6ea831e54a3b86b

                  • memory/852-42-0x0000000000400000-0x000000000040A000-memory.dmp

                    Filesize

                    40KB

                  • memory/852-44-0x0000000074450000-0x0000000074C00000-memory.dmp

                    Filesize

                    7.7MB

                  • memory/852-57-0x0000000074450000-0x0000000074C00000-memory.dmp

                    Filesize

                    7.7MB

                  • memory/852-43-0x0000000074450000-0x0000000074C00000-memory.dmp

                    Filesize

                    7.7MB

                  • memory/1424-52-0x0000000000400000-0x0000000000428000-memory.dmp

                    Filesize

                    160KB

                  • memory/1424-49-0x0000000000400000-0x0000000000428000-memory.dmp

                    Filesize

                    160KB

                  • memory/1424-50-0x0000000000400000-0x0000000000428000-memory.dmp

                    Filesize

                    160KB

                  • memory/1424-48-0x0000000000400000-0x0000000000428000-memory.dmp

                    Filesize

                    160KB

                  • memory/3192-61-0x0000000003160000-0x0000000003166000-memory.dmp

                    Filesize

                    24KB

                  • memory/3192-60-0x00000000743D0000-0x0000000074B80000-memory.dmp

                    Filesize

                    7.7MB

                  • memory/3192-76-0x0000000005870000-0x0000000005880000-memory.dmp

                    Filesize

                    64KB

                  • memory/3192-58-0x0000000000400000-0x0000000000430000-memory.dmp

                    Filesize

                    192KB

                  • memory/3192-81-0x0000000005750000-0x000000000579C000-memory.dmp

                    Filesize

                    304KB

                  • memory/3192-71-0x00000000743D0000-0x0000000074B80000-memory.dmp

                    Filesize

                    7.7MB

                  • memory/3192-80-0x0000000005870000-0x0000000005880000-memory.dmp

                    Filesize

                    64KB

                  • memory/3980-78-0x0000000004F80000-0x0000000004FBC000-memory.dmp

                    Filesize

                    240KB

                  • memory/3980-73-0x00000000743D0000-0x0000000074B80000-memory.dmp

                    Filesize

                    7.7MB

                  • memory/3980-74-0x0000000004FF0000-0x00000000050FA000-memory.dmp

                    Filesize

                    1.0MB

                  • memory/3980-72-0x0000000005500000-0x0000000005B18000-memory.dmp

                    Filesize

                    6.1MB

                  • memory/3980-75-0x0000000004ED0000-0x0000000004EE0000-memory.dmp

                    Filesize

                    64KB

                  • memory/3980-77-0x0000000004F20000-0x0000000004F32000-memory.dmp

                    Filesize

                    72KB

                  • memory/3980-69-0x00000000743D0000-0x0000000074B80000-memory.dmp

                    Filesize

                    7.7MB

                  • memory/3980-70-0x0000000004E70000-0x0000000004E76000-memory.dmp

                    Filesize

                    24KB

                  • memory/3980-79-0x0000000004ED0000-0x0000000004EE0000-memory.dmp

                    Filesize

                    64KB

                  • memory/3980-68-0x0000000000590000-0x00000000005C0000-memory.dmp

                    Filesize

                    192KB