Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    149s
  • max time network
    151s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240412-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240412-enlocale:en-usos:windows10-2004-x64system
  • submitted
    16/04/2024, 01:11

General

  • Target

    b3b8202580f0b47bf4d6dad051caa8bf07738d2601e4f512a26636826ecfb550.exe

  • Size

    52KB

  • MD5

    d5a12969c9c21b0eda19b157eee676d9

  • SHA1

    3bcb610ea66d2922ea2e0171cbae20b817408ef5

  • SHA256

    b3b8202580f0b47bf4d6dad051caa8bf07738d2601e4f512a26636826ecfb550

  • SHA512

    974227f4d3e664c47c73a7c08b9e2b98849982a98dad9efddcf2187c1ec9eb62f77c58ea51553bcbae5f8cbb3ded48723fa8249393d3eba7b8f731a8bd700bb9

  • SSDEEP

    768:d+ciLamXW9XgMxjFkpvMVX8q18q13yO1+33j5n/wrkfw:IzaEW5gMxZVXf8a3yO10pwb

Malware Config

Signatures

  • Modifies WinLogon for persistence 2 TTPs 10 IoCs
  • Modifies visibility of file extensions in Explorer 2 TTPs 5 IoCs
  • Modifies visiblity of hidden/system files in Explorer 2 TTPs 5 IoCs
  • Windows security bypass 2 TTPs 25 IoCs
  • Blocks application from running via registry modification 30 IoCs

    Adds application to list of disallowed applications.

  • Disables RegEdit via registry modification 10 IoCs
  • Disables use of System Restore points 1 TTPs
  • Sets file execution options in registry 2 TTPs 10 IoCs
  • Executes dropped EXE 20 IoCs
  • Loads dropped DLL 4 IoCs
  • Modifies system executable filetype association 2 TTPs 62 IoCs
  • Windows security modification 2 TTPs 30 IoCs
  • Adds Run key to start application 2 TTPs 15 IoCs
  • Drops desktop.ini file(s) 4 IoCs
  • Enumerates connected drives 3 TTPs 64 IoCs

    Attempts to read the root path of hard drives other than the default C: drive.

  • Drops file in System32 directory 32 IoCs
  • Drops file in Windows directory 20 IoCs
  • Modifies Control Panel 45 IoCs
  • Modifies Internet Explorer settings 1 TTPs 10 IoCs
  • Modifies data under HKEY_USERS 15 IoCs
  • Modifies registry class 64 IoCs
  • Suspicious behavior: EnumeratesProcesses 2 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 4 IoCs
  • Suspicious use of SetWindowsHookEx 21 IoCs
  • Suspicious use of WriteProcessMemory 60 IoCs
  • System policy modification 1 TTPs 35 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\b3b8202580f0b47bf4d6dad051caa8bf07738d2601e4f512a26636826ecfb550.exe
    "C:\Users\Admin\AppData\Local\Temp\b3b8202580f0b47bf4d6dad051caa8bf07738d2601e4f512a26636826ecfb550.exe"
    1⤵
    • Modifies WinLogon for persistence
    • Modifies visibility of file extensions in Explorer
    • Modifies visiblity of hidden/system files in Explorer
    • Windows security bypass
    • Blocks application from running via registry modification
    • Disables RegEdit via registry modification
    • Sets file execution options in registry
    • Modifies system executable filetype association
    • Windows security modification
    • Adds Run key to start application
    • Drops file in System32 directory
    • Drops file in Windows directory
    • Modifies Control Panel
    • Modifies Internet Explorer settings
    • Modifies data under HKEY_USERS
    • Modifies registry class
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    • System policy modification
    PID:3472
    • C:\Windows\nEwb0Rn.exe
      C:\Windows\nEwb0Rn.exe
      2⤵
      • Modifies WinLogon for persistence
      • Modifies visibility of file extensions in Explorer
      • Modifies visiblity of hidden/system files in Explorer
      • Windows security bypass
      • Blocks application from running via registry modification
      • Disables RegEdit via registry modification
      • Sets file execution options in registry
      • Executes dropped EXE
      • Modifies system executable filetype association
      • Windows security modification
      • Adds Run key to start application
      • Drops desktop.ini file(s)
      • Enumerates connected drives
      • Drops file in System32 directory
      • Drops file in Windows directory
      • Modifies Control Panel
      • Modifies Internet Explorer settings
      • Modifies data under HKEY_USERS
      • Modifies registry class
      • Suspicious behavior: GetForegroundWindowSpam
      • Suspicious use of SetWindowsHookEx
      • Suspicious use of WriteProcessMemory
      • System policy modification
      PID:4776
      • C:\Windows\nEwb0Rn.exe
        C:\Windows\nEwb0Rn.exe
        3⤵
        • Executes dropped EXE
        • Loads dropped DLL
        • Suspicious use of SetWindowsHookEx
        PID:2016
      • C:\Windows\SysWOW64\WishfulThinking.exe
        C:\Windows\system32\WishfulThinking.exe
        3⤵
        • Executes dropped EXE
        • Drops file in System32 directory
        • Drops file in Windows directory
        • Suspicious use of SetWindowsHookEx
        PID:1796
      • C:\Users\Admin\Local Settings\Application Data\WINDOWS\WINLOGON.EXE
        "C:\Users\Admin\Local Settings\Application Data\WINDOWS\WINLOGON.EXE"
        3⤵
        • Executes dropped EXE
        • Suspicious use of SetWindowsHookEx
        PID:4348
      • C:\Users\Admin\Local Settings\Application Data\WINDOWS\SERVICES.EXE
        "C:\Users\Admin\Local Settings\Application Data\WINDOWS\SERVICES.EXE"
        3⤵
        • Executes dropped EXE
        • Suspicious use of SetWindowsHookEx
        PID:2584
    • C:\Windows\SysWOW64\WishfulThinking.exe
      C:\Windows\system32\WishfulThinking.exe
      2⤵
      • Modifies WinLogon for persistence
      • Modifies visibility of file extensions in Explorer
      • Modifies visiblity of hidden/system files in Explorer
      • Windows security bypass
      • Blocks application from running via registry modification
      • Disables RegEdit via registry modification
      • Sets file execution options in registry
      • Executes dropped EXE
      • Modifies system executable filetype association
      • Windows security modification
      • Adds Run key to start application
      • Enumerates connected drives
      • Drops file in System32 directory
      • Drops file in Windows directory
      • Modifies Control Panel
      • Modifies Internet Explorer settings
      • Modifies data under HKEY_USERS
      • Modifies registry class
      • Suspicious behavior: GetForegroundWindowSpam
      • Suspicious use of SetWindowsHookEx
      • Suspicious use of WriteProcessMemory
      • System policy modification
      PID:3896
      • C:\Windows\nEwb0Rn.exe
        C:\Windows\nEwb0Rn.exe
        3⤵
        • Executes dropped EXE
        • Loads dropped DLL
        • Suspicious use of SetWindowsHookEx
        PID:4444
      • C:\Windows\SysWOW64\WishfulThinking.exe
        C:\Windows\system32\WishfulThinking.exe
        3⤵
        • Executes dropped EXE
        • Drops file in System32 directory
        • Drops file in Windows directory
        • Suspicious use of SetWindowsHookEx
        PID:3988
      • C:\Users\Admin\Local Settings\Application Data\WINDOWS\WINLOGON.EXE
        "C:\Users\Admin\Local Settings\Application Data\WINDOWS\WINLOGON.EXE"
        3⤵
        • Executes dropped EXE
        • Suspicious use of SetWindowsHookEx
        PID:4180
      • C:\Users\Admin\Local Settings\Application Data\WINDOWS\SERVICES.EXE
        "C:\Users\Admin\Local Settings\Application Data\WINDOWS\SERVICES.EXE"
        3⤵
        • Executes dropped EXE
        • Suspicious use of SetWindowsHookEx
        PID:4488
    • C:\Users\Admin\Local Settings\Application Data\WINDOWS\WINLOGON.EXE
      "C:\Users\Admin\Local Settings\Application Data\WINDOWS\WINLOGON.EXE"
      2⤵
      • Modifies WinLogon for persistence
      • Modifies visibility of file extensions in Explorer
      • Modifies visiblity of hidden/system files in Explorer
      • Windows security bypass
      • Blocks application from running via registry modification
      • Disables RegEdit via registry modification
      • Sets file execution options in registry
      • Executes dropped EXE
      • Modifies system executable filetype association
      • Windows security modification
      • Adds Run key to start application
      • Enumerates connected drives
      • Drops file in System32 directory
      • Drops file in Windows directory
      • Modifies Control Panel
      • Modifies Internet Explorer settings
      • Modifies data under HKEY_USERS
      • Modifies registry class
      • Suspicious behavior: GetForegroundWindowSpam
      • Suspicious use of SetWindowsHookEx
      • Suspicious use of WriteProcessMemory
      • System policy modification
      PID:4424
      • C:\Windows\nEwb0Rn.exe
        C:\Windows\nEwb0Rn.exe
        3⤵
        • Executes dropped EXE
        • Loads dropped DLL
        • Suspicious use of SetWindowsHookEx
        PID:3344
      • C:\Windows\SysWOW64\WishfulThinking.exe
        C:\Windows\system32\WishfulThinking.exe
        3⤵
        • Executes dropped EXE
        • Drops file in System32 directory
        • Drops file in Windows directory
        • Suspicious use of SetWindowsHookEx
        PID:1716
      • C:\Users\Admin\Local Settings\Application Data\WINDOWS\WINLOGON.EXE
        "C:\Users\Admin\Local Settings\Application Data\WINDOWS\WINLOGON.EXE"
        3⤵
        • Executes dropped EXE
        • Suspicious use of SetWindowsHookEx
        PID:2376
      • C:\Users\Admin\Local Settings\Application Data\WINDOWS\SERVICES.EXE
        "C:\Users\Admin\Local Settings\Application Data\WINDOWS\SERVICES.EXE"
        3⤵
        • Executes dropped EXE
        • Suspicious use of SetWindowsHookEx
        PID:4248
    • C:\Users\Admin\Local Settings\Application Data\WINDOWS\SERVICES.EXE
      "C:\Users\Admin\Local Settings\Application Data\WINDOWS\SERVICES.EXE"
      2⤵
      • Modifies WinLogon for persistence
      • Modifies visibility of file extensions in Explorer
      • Modifies visiblity of hidden/system files in Explorer
      • Windows security bypass
      • Blocks application from running via registry modification
      • Disables RegEdit via registry modification
      • Sets file execution options in registry
      • Executes dropped EXE
      • Modifies system executable filetype association
      • Windows security modification
      • Adds Run key to start application
      • Enumerates connected drives
      • Drops file in System32 directory
      • Drops file in Windows directory
      • Modifies Control Panel
      • Modifies Internet Explorer settings
      • Modifies data under HKEY_USERS
      • Modifies registry class
      • Suspicious behavior: GetForegroundWindowSpam
      • Suspicious use of SetWindowsHookEx
      • Suspicious use of WriteProcessMemory
      • System policy modification
      PID:3924
      • C:\Windows\nEwb0Rn.exe
        C:\Windows\nEwb0Rn.exe
        3⤵
        • Executes dropped EXE
        • Loads dropped DLL
        • Suspicious use of SetWindowsHookEx
        PID:2752
      • C:\Windows\SysWOW64\WishfulThinking.exe
        C:\Windows\system32\WishfulThinking.exe
        3⤵
        • Executes dropped EXE
        • Drops file in System32 directory
        • Drops file in Windows directory
        • Suspicious use of SetWindowsHookEx
        PID:1696
      • C:\Users\Admin\Local Settings\Application Data\WINDOWS\WINLOGON.EXE
        "C:\Users\Admin\Local Settings\Application Data\WINDOWS\WINLOGON.EXE"
        3⤵
        • Executes dropped EXE
        • Suspicious use of SetWindowsHookEx
        PID:4560
      • C:\Users\Admin\Local Settings\Application Data\WINDOWS\SERVICES.EXE
        "C:\Users\Admin\Local Settings\Application Data\WINDOWS\SERVICES.EXE"
        3⤵
        • Executes dropped EXE
        • Suspicious use of SetWindowsHookEx
        PID:3304

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\WINDOWS\SERVICES.EXE

    Filesize

    52KB

    MD5

    d7763901b31b2393e07ff3da76505d5b

    SHA1

    9afb809601efaf9e510fbeb777aa9d009e96ef9e

    SHA256

    10b6b102ceaee384ae02fad62d2376e64608e805946d771d4f296829edab7b97

    SHA512

    d3430bb4c1111386e2893ee2a786dde3006bfd087355c796cc55b444d92e3c3e45c62b1b3cc4a4d3563e6703329586b9ce094175d7c161deba1584fc118e2a86

  • C:\Users\Admin\AppData\Local\WINDOWS\WINLOGON.EXE

    Filesize

    52KB

    MD5

    dff958c8d753aec8f9c807cb154facef

    SHA1

    32408a463cfec62da21cf1626edff511b360bc46

    SHA256

    cb6b919f9f7abfd8c1af74f342231db8dd14b2d53580abb64cac0cbe0bebb49b

    SHA512

    258ca00cdd85ddb54f6f1417f6d6b220c495cdc7c9f898e250eb857102a854bc296b9e5ae2f6c84424852068485adb9069f8294db90c88f09e09ec3397de395e

  • C:\Users\All Users\Start Menu\Programs\Startup\Empty.pif

    Filesize

    52KB

    MD5

    e6ddb7a31dc20a80a108eb13a363d104

    SHA1

    d355d492dc1f372404b81f4705e119275e08a7a9

    SHA256

    4ac7c1e037f8828dc08a7e1162e6647487b5a3cd0b0b4dd51eec256ae3f7169f

    SHA512

    db45a3bf4352ef5ac43d9d25173fd9317504a83fd9463446ffbe0abe6989744e504ad67d1c0beefb2110bd6e09c49765eab31c1f9163ffe9a7f5cb174e075a40

  • C:\Windows\MSVBVM60.DLL

    Filesize

    1.4MB

    MD5

    25f62c02619174b35851b0e0455b3d94

    SHA1

    4e8ee85157f1769f6e3f61c0acbe59072209da71

    SHA256

    898288bd3b21d0e7d5f406df2e0b69a5bbfa4f241baf29a2cdf8a3cf4d4619f2

    SHA512

    f4529fd9eca4e4696f7f06874866ff98a1447a9b0d3a20ef0de54d4d694e2497fd39c452f73fab9b8a02962a7b2b88d1e85f6e35c7cbcb9555003c6828bebc3a

  • C:\Windows\SysWOW64\DamageControl.scr

    Filesize

    52KB

    MD5

    275a4513dc0493ed125349be90fc999d

    SHA1

    c86164e8184a9020812bd03d0d3bdaa623980aff

    SHA256

    615885680c1369d85e72af83f3a8a2087b88fcab1c5bfb48fc2bf5c202f49baa

    SHA512

    7e0dfacc891369e7f89dc4a8bb2bc6a6fdded201b5c0839152b4a18b51bad86f95299208a07f5db1c41b45727f9da5879c437d54cd3481fc107796af05937010

  • C:\Windows\SysWOW64\DamageControl.scr

    Filesize

    52KB

    MD5

    ab3b47ba7a4b2c64930a22e5fe5a9e59

    SHA1

    b163c8d94193c6f16ba0a89c37c2e8ae5a52ff26

    SHA256

    f65f445a7b7aef83a0934d0f02ea485acc945757081427dee21722c0845dbef7

    SHA512

    b2667c291d457763e7ecceeb6e4d7c796261cfc0fabe10cb339f715a00babb53193b68c0e53c252817fd0e60a53825c6deb6cee8603cdd3ea1bccef5e6484ffd

  • C:\Windows\SysWOW64\DamageControl.scr

    Filesize

    52KB

    MD5

    d5a12969c9c21b0eda19b157eee676d9

    SHA1

    3bcb610ea66d2922ea2e0171cbae20b817408ef5

    SHA256

    b3b8202580f0b47bf4d6dad051caa8bf07738d2601e4f512a26636826ecfb550

    SHA512

    974227f4d3e664c47c73a7c08b9e2b98849982a98dad9efddcf2187c1ec9eb62f77c58ea51553bcbae5f8cbb3ded48723fa8249393d3eba7b8f731a8bd700bb9

  • C:\Windows\SysWOW64\JawsOfLife.exe

    Filesize

    52KB

    MD5

    86dc0e24854bb83e6f09604e121a1d3a

    SHA1

    6c07713af92ed75d68da4362414d9c865210f0be

    SHA256

    ed716cc2920d002c38279a9ef8fd1a3af1bea806d324836b94a93e76e253fc5a

    SHA512

    58bf2a5b55526f0e8271d056c7ce87e1ab75a7f55d0e72946928a8845af707cedca5ab21e4791bc44a3c89782c04bb1f84d538afde7de3dae2bec8fafa7ebfba

  • C:\Windows\SysWOW64\JawsOfLife.exe

    Filesize

    52KB

    MD5

    ea3fcc55650809dc0af96d6418cb9119

    SHA1

    40d00a1125f324afb6d53d3b462931f5277c041e

    SHA256

    8520f27c883b23e2c758b0a7489fb184ef8acaa5ee2ae3cc3cd909e9d1a540c6

    SHA512

    8ba7a1d473b7bde3f632c6d493e2fcd7a4e3725368dbb8d6cb3e58e583cb29961063515c62aa5dd0e34c9253981cdc4221ee3609ddfb2d5a75f5769e73626ca4

  • C:\Windows\SysWOW64\JawsOfLife.exe

    Filesize

    52KB

    MD5

    3c2d24105dca45acdff9ed2de9cade46

    SHA1

    53bf936edac9e6803284f3c31e384929b98e1732

    SHA256

    527b0144a77c26cfb84c741fd2945da4ad2e2f1a8dea029404b94fec80ae3855

    SHA512

    fd1effaa13311cb14ab545b32e05623e32c6b3f91d64997aeacdd84f9f9ba9b8775739a6535d5f19b8ebed2092651dadc3877fe5d3defc68e8fd6162738a0e0a

  • C:\Windows\SysWOW64\WishfulThinking.exe

    Filesize

    52KB

    MD5

    6cefea91ea6c2561f007f704948c2c34

    SHA1

    5ff038ab8b69edbf8082c5a545d7a9c1a7d4af51

    SHA256

    b42cc7bce300c3aaec77f0ea9750e9f6512060c5314da0c7a690e6d9403a08f2

    SHA512

    40385cb8f4fc36628ce296aa3521ca822c6402e27d0f7f88f8223e1ca7047215c7fb286c218b2fe75baa2b11b2631a0fc01fcde5fda53d070ee6cf0a94e66380

  • C:\Windows\nEwb0Rn.exe

    Filesize

    52KB

    MD5

    1b4633ae0d6d6432371557a6f0fb10d3

    SHA1

    0d8180a0cea1e02945318b2b888dda6fd5b0c6e9

    SHA256

    c9d4a8878d33c726a5eab5cb6be766a0990cbca12d7ed1bbb405241477a02c7e

    SHA512

    814a40b635c8ffa72c20f0bace62ed0c836cc3f18d7a5e4488127f95645bf49a4fcb234145639879ad4c94397c0417978de988b19d50cf26218cd4c8705dacca

  • C:\about.htm

    Filesize

    2KB

    MD5

    94c0c5518c4f4bb044842a006d04932a

    SHA1

    23d9a914f6681d65e2b1faa171f4cf492562ebdb

    SHA256

    224c4e5cdc0e7495c5fb5d1f52d76807092b5cc2d0a7c95fa612ff7b1412706e

    SHA512

    79cb2cd9e19ac3cc8bd94f1a20369e61224f8db02bc04d1f5768d62163b68467a3d317808a942bc7cca6ca84c221bb54a76e097f543c88bb89f0a3c9534ff3bb

  • C:\nEwb0Rn.exe

    Filesize

    52KB

    MD5

    091c900f12840dbffb0d2941c5b65a7e

    SHA1

    a9ae7961315925cd59c212768d25b7c7694cdecf

    SHA256

    ef55820a41ae059e4c2a4042e2added2c3a4e87b8ad8afa11d2f959b45bec953

    SHA512

    d166f2112ae03f525dbc4b855d1064bda2207453b93378f633c9c25e64b45f98592e7bd5f8ef45533695382df5199f8f8d30aa040cd3ee1846bb7383596e7aee

  • C:\nEwb0Rn.exe

    Filesize

    52KB

    MD5

    8421ab98fc620b47c1a4e1fba986cec2

    SHA1

    1c475aed3538c5273d1a718f51086c2c2a4ddf56

    SHA256

    b86795d23e9fcf5d2afe7453f35d3975ec184600ae0a2a8b87635a9ee6784322

    SHA512

    e454b94bdac0f64bcb2ad6eda4246c011d35055beb686fe4d00dcef11f748423f18ba6ec0a7931434f5a7ff9d2cebf49e91af0d3812c8e58fcd4f882f7b3b14c

  • C:\nEwb0Rn.exe

    Filesize

    52KB

    MD5

    f24e06c3bc32c905b1438b350e259542

    SHA1

    e18c7c546c74dac768e00d67b24edc8757e97986

    SHA256

    e2bc42af1e3f9227c211ffa26a469267fef732f7d7ab7b1736f73a7f8ee31e1e

    SHA512

    922dc88869f13cc5352c446af0c18c6b4952f4314869194c14fb0d7d5dba2fdda3cef27f8fa835493482a8bb8550bedc2e0c73dfd39a936d25d2de8e30a8ff80

  • memory/1696-331-0x0000000000400000-0x0000000000428000-memory.dmp

    Filesize

    160KB

  • memory/1716-332-0x0000000000400000-0x0000000000428000-memory.dmp

    Filesize

    160KB

  • memory/1796-149-0x0000000000400000-0x0000000000428000-memory.dmp

    Filesize

    160KB

  • memory/1796-169-0x0000000000400000-0x0000000000428000-memory.dmp

    Filesize

    160KB

  • memory/2016-147-0x0000000000400000-0x0000000000428000-memory.dmp

    Filesize

    160KB

  • memory/2376-339-0x0000000000400000-0x0000000000428000-memory.dmp

    Filesize

    160KB

  • memory/2376-335-0x0000000000400000-0x0000000000428000-memory.dmp

    Filesize

    160KB

  • memory/2584-192-0x0000000000400000-0x0000000000428000-memory.dmp

    Filesize

    160KB

  • memory/2752-323-0x0000000000400000-0x0000000000428000-memory.dmp

    Filesize

    160KB

  • memory/2752-317-0x0000000000400000-0x0000000000428000-memory.dmp

    Filesize

    160KB

  • memory/3304-345-0x0000000000400000-0x0000000000428000-memory.dmp

    Filesize

    160KB

  • memory/3344-325-0x0000000000400000-0x0000000000428000-memory.dmp

    Filesize

    160KB

  • memory/3472-0-0x0000000000400000-0x0000000000428000-memory.dmp

    Filesize

    160KB

  • memory/3472-99-0x0000000000400000-0x0000000000428000-memory.dmp

    Filesize

    160KB

  • memory/3896-319-0x0000000000400000-0x0000000000428000-memory.dmp

    Filesize

    160KB

  • memory/3896-347-0x0000000000400000-0x0000000000428000-memory.dmp

    Filesize

    160KB

  • memory/3896-82-0x0000000000400000-0x0000000000428000-memory.dmp

    Filesize

    160KB

  • memory/3924-97-0x0000000000400000-0x0000000000428000-memory.dmp

    Filesize

    160KB

  • memory/3924-326-0x0000000000400000-0x0000000000428000-memory.dmp

    Filesize

    160KB

  • memory/3924-349-0x0000000000400000-0x0000000000428000-memory.dmp

    Filesize

    160KB

  • memory/3988-191-0x0000000000400000-0x0000000000428000-memory.dmp

    Filesize

    160KB

  • memory/3988-178-0x0000000000400000-0x0000000000428000-memory.dmp

    Filesize

    160KB

  • memory/4180-248-0x0000000000400000-0x0000000000428000-memory.dmp

    Filesize

    160KB

  • memory/4248-344-0x0000000000400000-0x0000000000428000-memory.dmp

    Filesize

    160KB

  • memory/4348-171-0x0000000000400000-0x0000000000428000-memory.dmp

    Filesize

    160KB

  • memory/4348-179-0x0000000000400000-0x0000000000428000-memory.dmp

    Filesize

    160KB

  • memory/4424-90-0x0000000000400000-0x0000000000428000-memory.dmp

    Filesize

    160KB

  • memory/4424-324-0x0000000000400000-0x0000000000428000-memory.dmp

    Filesize

    160KB

  • memory/4424-348-0x0000000000400000-0x0000000000428000-memory.dmp

    Filesize

    160KB

  • memory/4444-170-0x0000000000400000-0x0000000000428000-memory.dmp

    Filesize

    160KB

  • memory/4444-177-0x0000000000400000-0x0000000000428000-memory.dmp

    Filesize

    160KB

  • memory/4488-288-0x0000000000400000-0x0000000000428000-memory.dmp

    Filesize

    160KB

  • memory/4488-256-0x0000000000400000-0x0000000000428000-memory.dmp

    Filesize

    160KB

  • memory/4560-338-0x0000000000400000-0x0000000000428000-memory.dmp

    Filesize

    160KB

  • memory/4776-76-0x0000000000400000-0x0000000000428000-memory.dmp

    Filesize

    160KB

  • memory/4776-262-0x0000000000400000-0x0000000000428000-memory.dmp

    Filesize

    160KB