Analysis

  • max time kernel
    150s
  • max time network
    120s
  • platform
    windows7_x64
  • resource
    win7-20240221-en
  • resource tags

    arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system
  • submitted
    16-04-2024 01:11

General

  • Target

    b3b8202580f0b47bf4d6dad051caa8bf07738d2601e4f512a26636826ecfb550.exe

  • Size

    52KB

  • MD5

    d5a12969c9c21b0eda19b157eee676d9

  • SHA1

    3bcb610ea66d2922ea2e0171cbae20b817408ef5

  • SHA256

    b3b8202580f0b47bf4d6dad051caa8bf07738d2601e4f512a26636826ecfb550

  • SHA512

    974227f4d3e664c47c73a7c08b9e2b98849982a98dad9efddcf2187c1ec9eb62f77c58ea51553bcbae5f8cbb3ded48723fa8249393d3eba7b8f731a8bd700bb9

  • SSDEEP

    768:d+ciLamXW9XgMxjFkpvMVX8q18q13yO1+33j5n/wrkfw:IzaEW5gMxZVXf8a3yO10pwb

Malware Config

Signatures

  • Modifies WinLogon for persistence 2 TTPs 10 IoCs
  • Modifies visibility of file extensions in Explorer 2 TTPs 5 IoCs
  • Modifies visiblity of hidden/system files in Explorer 2 TTPs 5 IoCs
  • Windows security bypass 2 TTPs 25 IoCs
  • Blocks application from running via registry modification 30 IoCs

    Adds application to list of disallowed applications.

  • Disables RegEdit via registry modification 10 IoCs
  • Disables use of System Restore points 1 TTPs
  • Sets file execution options in registry 2 TTPs 10 IoCs
  • Executes dropped EXE 24 IoCs
  • Loads dropped DLL 34 IoCs
  • Modifies system executable filetype association 2 TTPs 62 IoCs
  • Windows security modification 2 TTPs 30 IoCs
  • Adds Run key to start application 2 TTPs 15 IoCs
  • Drops desktop.ini file(s) 4 IoCs
  • Enumerates connected drives 3 TTPs 64 IoCs

    Attempts to read the root path of hard drives other than the default C: drive.

  • Drops file in System32 directory 34 IoCs
  • Drops file in Windows directory 22 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Modifies Control Panel 45 IoCs
  • Modifies Internet Explorer settings 1 TTPs 10 IoCs
  • Modifies data under HKEY_USERS 15 IoCs
  • Modifies registry class 64 IoCs
  • Suspicious behavior: EnumeratesProcesses 1 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 4 IoCs
  • Suspicious use of SetWindowsHookEx 25 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs
  • System policy modification 1 TTPs 35 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\b3b8202580f0b47bf4d6dad051caa8bf07738d2601e4f512a26636826ecfb550.exe
    "C:\Users\Admin\AppData\Local\Temp\b3b8202580f0b47bf4d6dad051caa8bf07738d2601e4f512a26636826ecfb550.exe"
    1⤵
    • Modifies WinLogon for persistence
    • Modifies visibility of file extensions in Explorer
    • Modifies visiblity of hidden/system files in Explorer
    • Windows security bypass
    • Blocks application from running via registry modification
    • Disables RegEdit via registry modification
    • Sets file execution options in registry
    • Loads dropped DLL
    • Modifies system executable filetype association
    • Windows security modification
    • Adds Run key to start application
    • Drops desktop.ini file(s)
    • Enumerates connected drives
    • Drops file in System32 directory
    • Drops file in Windows directory
    • Modifies Control Panel
    • Modifies Internet Explorer settings
    • Modifies data under HKEY_USERS
    • Modifies registry class
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    • System policy modification
    PID:2164
    • C:\Windows\nEwb0Rn.exe
      C:\Windows\nEwb0Rn.exe
      2⤵
      • Modifies WinLogon for persistence
      • Modifies visibility of file extensions in Explorer
      • Modifies visiblity of hidden/system files in Explorer
      • Windows security bypass
      • Blocks application from running via registry modification
      • Disables RegEdit via registry modification
      • Sets file execution options in registry
      • Executes dropped EXE
      • Loads dropped DLL
      • Modifies system executable filetype association
      • Windows security modification
      • Adds Run key to start application
      • Enumerates connected drives
      • Drops file in System32 directory
      • Drops file in Windows directory
      • Modifies Control Panel
      • Modifies Internet Explorer settings
      • Modifies data under HKEY_USERS
      • Modifies registry class
      • Suspicious behavior: GetForegroundWindowSpam
      • Suspicious use of SetWindowsHookEx
      • Suspicious use of WriteProcessMemory
      • System policy modification
      PID:2652
      • C:\Windows\nEwb0Rn.exe
        C:\Windows\nEwb0Rn.exe
        3⤵
        • Executes dropped EXE
        • Suspicious use of SetWindowsHookEx
        PID:2144
      • C:\Windows\SysWOW64\WishfulThinking.exe
        C:\Windows\system32\WishfulThinking.exe
        3⤵
        • Executes dropped EXE
        • Drops file in System32 directory
        • Drops file in Windows directory
        • Suspicious use of SetWindowsHookEx
        PID:2832
      • C:\Users\Admin\Local Settings\Application Data\WINDOWS\WINLOGON.EXE
        "C:\Users\Admin\Local Settings\Application Data\WINDOWS\WINLOGON.EXE"
        3⤵
        • Executes dropped EXE
        • Suspicious use of SetWindowsHookEx
        PID:2312
      • C:\Users\Admin\Local Settings\Application Data\WINDOWS\SERVICES.EXE
        "C:\Users\Admin\Local Settings\Application Data\WINDOWS\SERVICES.EXE"
        3⤵
        • Executes dropped EXE
        • Suspicious use of SetWindowsHookEx
        PID:2612
    • C:\Windows\SysWOW64\WishfulThinking.exe
      C:\Windows\system32\WishfulThinking.exe
      2⤵
      • Modifies WinLogon for persistence
      • Modifies visibility of file extensions in Explorer
      • Modifies visiblity of hidden/system files in Explorer
      • Windows security bypass
      • Blocks application from running via registry modification
      • Disables RegEdit via registry modification
      • Sets file execution options in registry
      • Executes dropped EXE
      • Loads dropped DLL
      • Modifies system executable filetype association
      • Windows security modification
      • Adds Run key to start application
      • Enumerates connected drives
      • Drops file in System32 directory
      • Drops file in Windows directory
      • Modifies Control Panel
      • Modifies Internet Explorer settings
      • Modifies data under HKEY_USERS
      • Modifies registry class
      • Suspicious behavior: GetForegroundWindowSpam
      • Suspicious use of SetWindowsHookEx
      • Suspicious use of WriteProcessMemory
      • System policy modification
      PID:2428
      • C:\Windows\nEwb0Rn.exe
        C:\Windows\nEwb0Rn.exe
        3⤵
        • Executes dropped EXE
        • Suspicious use of SetWindowsHookEx
        PID:2092
      • C:\Windows\SysWOW64\WishfulThinking.exe
        C:\Windows\system32\WishfulThinking.exe
        3⤵
        • Executes dropped EXE
        • Drops file in System32 directory
        • Drops file in Windows directory
        • Suspicious use of SetWindowsHookEx
        PID:2496
      • C:\Users\Admin\Local Settings\Application Data\WINDOWS\WINLOGON.EXE
        "C:\Users\Admin\Local Settings\Application Data\WINDOWS\WINLOGON.EXE"
        3⤵
        • Executes dropped EXE
        • Suspicious use of SetWindowsHookEx
        PID:2616
      • C:\Users\Admin\Local Settings\Application Data\WINDOWS\SERVICES.EXE
        "C:\Users\Admin\Local Settings\Application Data\WINDOWS\SERVICES.EXE"
        3⤵
        • Executes dropped EXE
        • Suspicious use of SetWindowsHookEx
        PID:2968
    • C:\Users\Admin\Local Settings\Application Data\WINDOWS\WINLOGON.EXE
      "C:\Users\Admin\Local Settings\Application Data\WINDOWS\WINLOGON.EXE"
      2⤵
      • Modifies WinLogon for persistence
      • Modifies visibility of file extensions in Explorer
      • Modifies visiblity of hidden/system files in Explorer
      • Windows security bypass
      • Blocks application from running via registry modification
      • Disables RegEdit via registry modification
      • Sets file execution options in registry
      • Executes dropped EXE
      • Loads dropped DLL
      • Modifies system executable filetype association
      • Windows security modification
      • Adds Run key to start application
      • Enumerates connected drives
      • Drops file in System32 directory
      • Drops file in Windows directory
      • Modifies Control Panel
      • Modifies Internet Explorer settings
      • Modifies data under HKEY_USERS
      • Modifies registry class
      • Suspicious behavior: GetForegroundWindowSpam
      • Suspicious use of SetWindowsHookEx
      • Suspicious use of WriteProcessMemory
      • System policy modification
      PID:1996
      • C:\Windows\nEwb0Rn.exe
        C:\Windows\nEwb0Rn.exe
        3⤵
        • Executes dropped EXE
        • Suspicious use of SetWindowsHookEx
        PID:2244
      • C:\Windows\SysWOW64\WishfulThinking.exe
        C:\Windows\system32\WishfulThinking.exe
        3⤵
        • Executes dropped EXE
        • Drops file in System32 directory
        • Drops file in Windows directory
        • Suspicious use of SetWindowsHookEx
        PID:2556
      • C:\Users\Admin\Local Settings\Application Data\WINDOWS\WINLOGON.EXE
        "C:\Users\Admin\Local Settings\Application Data\WINDOWS\WINLOGON.EXE"
        3⤵
        • Executes dropped EXE
        • Suspicious use of SetWindowsHookEx
        PID:2924
      • C:\Users\Admin\Local Settings\Application Data\WINDOWS\SERVICES.EXE
        "C:\Users\Admin\Local Settings\Application Data\WINDOWS\SERVICES.EXE"
        3⤵
        • Executes dropped EXE
        • Suspicious use of SetWindowsHookEx
        PID:2480
    • C:\Windows\nEwb0Rn.exe
      C:\Windows\nEwb0Rn.exe
      2⤵
      • Executes dropped EXE
      • Suspicious use of SetWindowsHookEx
      PID:1088
    • C:\Windows\SysWOW64\WishfulThinking.exe
      C:\Windows\system32\WishfulThinking.exe
      2⤵
      • Executes dropped EXE
      • Drops file in System32 directory
      • Drops file in Windows directory
      • Suspicious use of SetWindowsHookEx
      PID:1928
    • C:\Users\Admin\Local Settings\Application Data\WINDOWS\WINLOGON.EXE
      "C:\Users\Admin\Local Settings\Application Data\WINDOWS\WINLOGON.EXE"
      2⤵
      • Executes dropped EXE
      • Suspicious use of SetWindowsHookEx
      PID:1020
    • C:\Users\Admin\Local Settings\Application Data\WINDOWS\SERVICES.EXE
      "C:\Users\Admin\Local Settings\Application Data\WINDOWS\SERVICES.EXE"
      2⤵
      • Modifies WinLogon for persistence
      • Modifies visibility of file extensions in Explorer
      • Modifies visiblity of hidden/system files in Explorer
      • Windows security bypass
      • Blocks application from running via registry modification
      • Disables RegEdit via registry modification
      • Sets file execution options in registry
      • Executes dropped EXE
      • Loads dropped DLL
      • Modifies system executable filetype association
      • Windows security modification
      • Adds Run key to start application
      • Enumerates connected drives
      • Drops file in System32 directory
      • Drops file in Windows directory
      • Modifies Control Panel
      • Modifies Internet Explorer settings
      • Modifies data under HKEY_USERS
      • Modifies registry class
      • Suspicious behavior: GetForegroundWindowSpam
      • Suspicious use of SetWindowsHookEx
      • System policy modification
      PID:2060
      • C:\Windows\nEwb0Rn.exe
        C:\Windows\nEwb0Rn.exe
        3⤵
        • Executes dropped EXE
        • Suspicious use of SetWindowsHookEx
        PID:2444
      • C:\Windows\SysWOW64\WishfulThinking.exe
        C:\Windows\system32\WishfulThinking.exe
        3⤵
        • Executes dropped EXE
        • Drops file in System32 directory
        • Drops file in Windows directory
        • Suspicious use of SetWindowsHookEx
        PID:928
      • C:\Users\Admin\Local Settings\Application Data\WINDOWS\WINLOGON.EXE
        "C:\Users\Admin\Local Settings\Application Data\WINDOWS\WINLOGON.EXE"
        3⤵
        • Executes dropped EXE
        • Suspicious use of SetWindowsHookEx
        PID:528
      • C:\Users\Admin\Local Settings\Application Data\WINDOWS\SERVICES.EXE
        "C:\Users\Admin\Local Settings\Application Data\WINDOWS\SERVICES.EXE"
        3⤵
        • Executes dropped EXE
        • Suspicious use of SetWindowsHookEx
        PID:580
    • C:\Users\Admin\Local Settings\Application Data\WINDOWS\SERVICES.EXE
      "C:\Users\Admin\Local Settings\Application Data\WINDOWS\SERVICES.EXE"
      2⤵
      • Executes dropped EXE
      • Suspicious use of SetWindowsHookEx
      PID:1584

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\WINDOWS\SERVICES.EXE

    Filesize

    52KB

    MD5

    dd9956fa47936e7adc19cbe9df0ddc7f

    SHA1

    22bada3de3e6b718aaaa2f22800ad11e008cd1a7

    SHA256

    a61ac4223f25eaa4aacc93c91ea79c90cfd40d81d722f2351b9297f7e0e06862

    SHA512

    cf9f6b34ac959dda770dcbf686cd65dc7361a646f663785bfe0206b193acfdda0b4f0897727b6ead6cf547c222380541f2178fa0e1d8bd77659bc8c620601f09

  • C:\Users\All Users\Start Menu\Programs\Startup\Empty.pif

    Filesize

    52KB

    MD5

    8e8f5c57ab9001d5cb1d05d13a0104af

    SHA1

    6fbc8074928446b94259bf7152cb70a2b92a66fa

    SHA256

    3dc0f4b680af893588dd2eaef6930fb6554e2d256892d151f9969fc59c53db05

    SHA512

    c23aca6e63ea4fe7c2e16374f23a77e050a4d07d41dd622132f81bf0697ab43815e9439ef2e2be160b5b5cb1463ada631f13c9d5f448e83b3be72e23ce020706

  • C:\Windows\MSVBVM60.DLL

    Filesize

    1.3MB

    MD5

    5343a19c618bc515ceb1695586c6c137

    SHA1

    4dedae8cbde066f31c8e6b52c0baa3f8b1117742

    SHA256

    2246b4feae199408ea66d4a90c1589026f4a5800ce5a28e583b94506a8a73dce

    SHA512

    708d8a252a167fa94e3e1a49e2630d07613ff75a9a3e779a0c1fcbec44aa853a68c401f31a2b84152f46a05f7d93f4e5e502afc7a60236a22ac58dea73fa5606

  • C:\Windows\SysWOW64\DamageControl.scr

    Filesize

    52KB

    MD5

    947ab3ddde9763329f46b30c3e84321a

    SHA1

    852ec64e99858a34d7ee744b7a67ea3d70be3794

    SHA256

    72fe98f183a1b309aff446a2288c787ae592584b14afc5e5b9159b1399bbb302

    SHA512

    c5189dc3f253947e6fb3702ea13b836448c19b3a050e4c153e4ebec60bcb068a1e9e6720f0310965e1e36b5ba4666effebf2a060c9aecec20f7a017034094540

  • C:\Windows\SysWOW64\DamageControl.scr

    Filesize

    52KB

    MD5

    d5a12969c9c21b0eda19b157eee676d9

    SHA1

    3bcb610ea66d2922ea2e0171cbae20b817408ef5

    SHA256

    b3b8202580f0b47bf4d6dad051caa8bf07738d2601e4f512a26636826ecfb550

    SHA512

    974227f4d3e664c47c73a7c08b9e2b98849982a98dad9efddcf2187c1ec9eb62f77c58ea51553bcbae5f8cbb3ded48723fa8249393d3eba7b8f731a8bd700bb9

  • C:\Windows\SysWOW64\JawsOfLife.exe

    Filesize

    52KB

    MD5

    2507adee4d70f7ec2441645d04d66b09

    SHA1

    ec123fea03823a16a5baa5b3943e4321cfa3a3f5

    SHA256

    dc3aca6b77f848b1bbbcab472abccbf1b07732d28c02ac54b78a538b10092347

    SHA512

    45b63d2e37bbc39a3581fbc42b3024282af39430a467ab181c67f5e6fc8f4f213e6cda98015ef728b52d3317f229d27d4553bf4df5b9d8e4cd96618958d06c78

  • C:\Windows\nEwb0Rn.exe

    Filesize

    52KB

    MD5

    d51a11ae98418b40172d94a76498dc90

    SHA1

    3af02f97c842662e818e497898a2143edf4a9685

    SHA256

    4c767936b8948ef7c573d75b671e215a983a94b88302bcde78767f6b2f85a65d

    SHA512

    51de72e521631448324530d017e05509216717c04200b39c99a0bb8f75a3d8f89b8442692f27c2ce048bef5ef2961e4adaafbbb61e31ee1a782db7ad56946b80

  • C:\about.htm

    Filesize

    2KB

    MD5

    94c0c5518c4f4bb044842a006d04932a

    SHA1

    23d9a914f6681d65e2b1faa171f4cf492562ebdb

    SHA256

    224c4e5cdc0e7495c5fb5d1f52d76807092b5cc2d0a7c95fa612ff7b1412706e

    SHA512

    79cb2cd9e19ac3cc8bd94f1a20369e61224f8db02bc04d1f5768d62163b68467a3d317808a942bc7cca6ca84c221bb54a76e097f543c88bb89f0a3c9534ff3bb

  • C:\nEwb0Rn.exe

    Filesize

    52KB

    MD5

    ec575ca116023c50cd18eec0bb929328

    SHA1

    4e729b0723d4fb6167474b7e02cdc3d9547c8d82

    SHA256

    1d9c5dc12f3caceb7c94e572469c28785a45fc043768bfa57d6a2adafa4b3ed5

    SHA512

    81558a0fa8f29085b2ce7eb9ce2d46a757ca45dc1dd791eef1ba04ca1d121ecc3e45ea1677477c4fa12a3db709494f794e4032d2fc014192b3dd1f8bd170b337

  • \Users\Admin\AppData\Local\WINDOWS\WINLOGON.EXE

    Filesize

    52KB

    MD5

    2af957fddc2dc512bec06021d237ceb1

    SHA1

    2d7ea767d3444297cfcff9f694983cb19cd991f3

    SHA256

    257f5e27312385d2f6cb0a26074d28598a20d95951235d0f5479381aad5b40a7

    SHA512

    4950560213f6b5ddb94e62b1a901d224e38c1a19a64599659c4852897dfabb942cd64d8adc8327744849fd0c728282bb760bca5bdc087d29b9ea960c8d8ddf31

  • \Windows\SysWOW64\WishfulThinking.exe

    Filesize

    52KB

    MD5

    62b69e2e8c9e2889fa5821632e9fc126

    SHA1

    8bfee69b50c6ffeef4236d8974afc84de782e845

    SHA256

    d88bfe649c8e77e3d41c57a2eb7611896c6cd136661412ce11082d3059f08297

    SHA512

    fb31a42809d3509cd28ead4828a745712f561f717e42329b8a4cc491f50929f53583581dbf8712a952414ce73d44367e0dbba3d20b04cb7416f5b6954ef028d3

  • memory/528-442-0x0000000000400000-0x0000000000428000-memory.dmp

    Filesize

    160KB

  • memory/580-446-0x0000000000400000-0x0000000000428000-memory.dmp

    Filesize

    160KB

  • memory/928-438-0x0000000000400000-0x0000000000428000-memory.dmp

    Filesize

    160KB

  • memory/1020-208-0x0000000000400000-0x0000000000428000-memory.dmp

    Filesize

    160KB

  • memory/1088-150-0x0000000000400000-0x0000000000428000-memory.dmp

    Filesize

    160KB

  • memory/1088-144-0x0000000000400000-0x0000000000428000-memory.dmp

    Filesize

    160KB

  • memory/1584-377-0x0000000000400000-0x0000000000428000-memory.dmp

    Filesize

    160KB

  • memory/1584-359-0x0000000000400000-0x0000000000428000-memory.dmp

    Filesize

    160KB

  • memory/1928-157-0x0000000000400000-0x0000000000428000-memory.dmp

    Filesize

    160KB

  • memory/1928-161-0x0000000000400000-0x0000000000428000-memory.dmp

    Filesize

    160KB

  • memory/1996-453-0x00000000007D0000-0x00000000007F8000-memory.dmp

    Filesize

    160KB

  • memory/1996-223-0x0000000000400000-0x0000000000428000-memory.dmp

    Filesize

    160KB

  • memory/1996-432-0x00000000007D0000-0x00000000007F8000-memory.dmp

    Filesize

    160KB

  • memory/1996-451-0x0000000000400000-0x0000000000428000-memory.dmp

    Filesize

    160KB

  • memory/1996-401-0x00000000007D0000-0x00000000007F8000-memory.dmp

    Filesize

    160KB

  • memory/2060-452-0x0000000000400000-0x0000000000428000-memory.dmp

    Filesize

    160KB

  • memory/2060-217-0x0000000000400000-0x0000000000428000-memory.dmp

    Filesize

    160KB

  • memory/2060-458-0x00000000025D0000-0x00000000025F8000-memory.dmp

    Filesize

    160KB

  • memory/2060-440-0x00000000025D0000-0x00000000025F8000-memory.dmp

    Filesize

    160KB

  • memory/2060-383-0x0000000000400000-0x0000000000428000-memory.dmp

    Filesize

    160KB

  • memory/2092-370-0x0000000000400000-0x0000000000428000-memory.dmp

    Filesize

    160KB

  • memory/2144-224-0x0000000000400000-0x0000000000428000-memory.dmp

    Filesize

    160KB

  • memory/2164-145-0x0000000000400000-0x0000000000428000-memory.dmp

    Filesize

    160KB

  • memory/2164-369-0x0000000000500000-0x0000000000528000-memory.dmp

    Filesize

    160KB

  • memory/2164-84-0x0000000000500000-0x0000000000528000-memory.dmp

    Filesize

    160KB

  • memory/2164-358-0x0000000000500000-0x0000000000528000-memory.dmp

    Filesize

    160KB

  • memory/2164-356-0x0000000000500000-0x0000000000528000-memory.dmp

    Filesize

    160KB

  • memory/2164-101-0x0000000000500000-0x0000000000528000-memory.dmp

    Filesize

    160KB

  • memory/2164-77-0x0000000000500000-0x0000000000528000-memory.dmp

    Filesize

    160KB

  • memory/2164-0-0x0000000000400000-0x0000000000428000-memory.dmp

    Filesize

    160KB

  • memory/2164-98-0x0000000000500000-0x0000000000528000-memory.dmp

    Filesize

    160KB

  • memory/2164-141-0x0000000000500000-0x0000000000528000-memory.dmp

    Filesize

    160KB

  • memory/2164-80-0x0000000000500000-0x0000000000528000-memory.dmp

    Filesize

    160KB

  • memory/2164-215-0x0000000000500000-0x0000000000528000-memory.dmp

    Filesize

    160KB

  • memory/2164-168-0x0000000000500000-0x0000000000528000-memory.dmp

    Filesize

    160KB

  • memory/2164-379-0x0000000000400000-0x0000000000428000-memory.dmp

    Filesize

    160KB

  • memory/2244-392-0x0000000000400000-0x0000000000428000-memory.dmp

    Filesize

    160KB

  • memory/2312-389-0x0000000000400000-0x0000000000428000-memory.dmp

    Filesize

    160KB

  • memory/2428-213-0x0000000000400000-0x0000000000428000-memory.dmp

    Filesize

    160KB

  • memory/2428-450-0x0000000000400000-0x0000000000428000-memory.dmp

    Filesize

    160KB

  • memory/2428-384-0x00000000024C0000-0x00000000024E8000-memory.dmp

    Filesize

    160KB

  • memory/2428-427-0x00000000024C0000-0x00000000024E8000-memory.dmp

    Filesize

    160KB

  • memory/2428-91-0x0000000000400000-0x0000000000428000-memory.dmp

    Filesize

    160KB

  • memory/2428-448-0x00000000024C0000-0x00000000024E8000-memory.dmp

    Filesize

    160KB

  • memory/2428-368-0x00000000024C0000-0x00000000024E8000-memory.dmp

    Filesize

    160KB

  • memory/2428-313-0x00000000024C0000-0x00000000024E8000-memory.dmp

    Filesize

    160KB

  • memory/2428-429-0x00000000024C0000-0x00000000024E8000-memory.dmp

    Filesize

    160KB

  • memory/2428-443-0x00000000024C0000-0x00000000024E8000-memory.dmp

    Filesize

    160KB

  • memory/2428-393-0x00000000024C0000-0x00000000024E8000-memory.dmp

    Filesize

    160KB

  • memory/2444-423-0x0000000000400000-0x0000000000428000-memory.dmp

    Filesize

    160KB

  • memory/2444-434-0x0000000000400000-0x0000000000428000-memory.dmp

    Filesize

    160KB

  • memory/2480-435-0x0000000000400000-0x0000000000428000-memory.dmp

    Filesize

    160KB

  • memory/2480-433-0x0000000000400000-0x0000000000428000-memory.dmp

    Filesize

    160KB

  • memory/2496-388-0x0000000000400000-0x0000000000428000-memory.dmp

    Filesize

    160KB

  • memory/2556-409-0x0000000000400000-0x0000000000428000-memory.dmp

    Filesize

    160KB

  • memory/2556-378-0x0000000000400000-0x0000000000428000-memory.dmp

    Filesize

    160KB

  • memory/2612-412-0x0000000000400000-0x0000000000428000-memory.dmp

    Filesize

    160KB

  • memory/2612-394-0x0000000000400000-0x0000000000428000-memory.dmp

    Filesize

    160KB

  • memory/2616-385-0x0000000000400000-0x0000000000428000-memory.dmp

    Filesize

    160KB

  • memory/2616-395-0x0000000000400000-0x0000000000428000-memory.dmp

    Filesize

    160KB

  • memory/2652-386-0x00000000004B0000-0x00000000004D8000-memory.dmp

    Filesize

    160KB

  • memory/2652-273-0x00000000004B0000-0x00000000004D8000-memory.dmp

    Filesize

    160KB

  • memory/2652-447-0x00000000004B0000-0x00000000004D8000-memory.dmp

    Filesize

    160KB

  • memory/2652-387-0x00000000004B0000-0x00000000004D8000-memory.dmp

    Filesize

    160KB

  • memory/2652-422-0x00000000004B0000-0x00000000004D8000-memory.dmp

    Filesize

    160KB

  • memory/2652-82-0x0000000000400000-0x0000000000428000-memory.dmp

    Filesize

    160KB

  • memory/2652-156-0x0000000000400000-0x0000000000428000-memory.dmp

    Filesize

    160KB

  • memory/2652-225-0x00000000004B0000-0x00000000004D8000-memory.dmp

    Filesize

    160KB

  • memory/2652-449-0x0000000000400000-0x0000000000428000-memory.dmp

    Filesize

    160KB

  • memory/2652-367-0x00000000004B0000-0x00000000004D8000-memory.dmp

    Filesize

    160KB

  • memory/2832-372-0x0000000000400000-0x0000000000428000-memory.dmp

    Filesize

    160KB

  • memory/2924-424-0x0000000000400000-0x0000000000428000-memory.dmp

    Filesize

    160KB

  • memory/2968-405-0x0000000000400000-0x0000000000428000-memory.dmp

    Filesize

    160KB

  • memory/2968-428-0x0000000000400000-0x0000000000428000-memory.dmp

    Filesize

    160KB