Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    150s
  • max time network
    123s
  • platform
    windows7_x64
  • resource
    win7-20240221-en
  • resource tags

    arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system
  • submitted
    21/04/2024, 18:58

General

  • Target

    fff2db4aae34f2cfeb265f2a15e2d70c_JaffaCakes118.exe

  • Size

    137KB

  • MD5

    fff2db4aae34f2cfeb265f2a15e2d70c

  • SHA1

    938429020306c77d629ea9f8c19e515dff14aadc

  • SHA256

    4146b2baa1dd63c84e878e9d86f99eb4c6aa5804b62943659068e46087291134

  • SHA512

    808820695e0e504496d05ef75b0edfcfeb58b0f1d26cba4d095c43a8843699267513898bd9a1fa2dec622fdde487d84c0d2bd1a580375bb6b6be7f6876113d9e

  • SSDEEP

    3072:IpWC4YgBPlGiyllvpWC4YgBPlGiyllBpWC4YgBPlGiyllp:2WC4YgB9GiypWC4YgB9GiyTWC4YgB9GN

Score
10/10

Malware Config

Signatures

  • Modifies WinLogon for persistence 2 TTPs 12 IoCs
  • Modifies visibility of file extensions in Explorer 2 TTPs 6 IoCs
  • Modifies visiblity of hidden/system files in Explorer 2 TTPs 6 IoCs
  • Disables RegEdit via registry modification 6 IoCs
  • Disables Task Manager via registry modification
  • Disables cmd.exe use via registry modification 6 IoCs
  • Disables use of System Restore points 1 TTPs
  • Executes dropped EXE 30 IoCs
  • Loads dropped DLL 45 IoCs
  • Modifies system executable filetype association 2 TTPs 64 IoCs
  • Adds Run key to start application 2 TTPs 24 IoCs
  • Enumerates connected drives 3 TTPs 64 IoCs

    Attempts to read the root path of hard drives other than the default C: drive.

  • Modifies WinLogon 2 TTPs 18 IoCs
  • Drops autorun.inf file 1 TTPs 4 IoCs

    Malware can abuse Windows Autorun to spread further via attached volumes.

  • Drops file in System32 directory 38 IoCs
  • Drops file in Windows directory 24 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Modifies Control Panel 54 IoCs
  • Modifies Internet Explorer settings 1 TTPs 18 IoCs
  • Modifies Internet Explorer start page 1 TTPs 6 IoCs
  • Modifies registry class 64 IoCs
  • Suspicious behavior: EnumeratesProcesses 1 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 5 IoCs
  • Suspicious use of SetWindowsHookEx 31 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs
  • System policy modification 1 TTPs 12 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\fff2db4aae34f2cfeb265f2a15e2d70c_JaffaCakes118.exe
    "C:\Users\Admin\AppData\Local\Temp\fff2db4aae34f2cfeb265f2a15e2d70c_JaffaCakes118.exe"
    1⤵
    • Modifies WinLogon for persistence
    • Modifies visibility of file extensions in Explorer
    • Modifies visiblity of hidden/system files in Explorer
    • Disables RegEdit via registry modification
    • Disables cmd.exe use via registry modification
    • Loads dropped DLL
    • Modifies system executable filetype association
    • Adds Run key to start application
    • Modifies WinLogon
    • Drops file in System32 directory
    • Drops file in Windows directory
    • Modifies Control Panel
    • Modifies Internet Explorer settings
    • Modifies Internet Explorer start page
    • Modifies registry class
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    • System policy modification
    PID:2844
    • C:\Windows\Tiwi.exe
      C:\Windows\Tiwi.exe
      2⤵
      • Modifies WinLogon for persistence
      • Modifies visibility of file extensions in Explorer
      • Modifies visiblity of hidden/system files in Explorer
      • Disables RegEdit via registry modification
      • Disables cmd.exe use via registry modification
      • Executes dropped EXE
      • Loads dropped DLL
      • Modifies system executable filetype association
      • Adds Run key to start application
      • Enumerates connected drives
      • Modifies WinLogon
      • Drops autorun.inf file
      • Drops file in System32 directory
      • Drops file in Windows directory
      • Modifies Control Panel
      • Modifies Internet Explorer settings
      • Modifies Internet Explorer start page
      • Modifies registry class
      • Suspicious behavior: GetForegroundWindowSpam
      • Suspicious use of SetWindowsHookEx
      • Suspicious use of WriteProcessMemory
      • System policy modification
      PID:2512
      • C:\Windows\Tiwi.exe
        C:\Windows\Tiwi.exe
        3⤵
        • Executes dropped EXE
        • Suspicious use of SetWindowsHookEx
        PID:2332
      • C:\Windows\SysWOW64\IExplorer.exe
        C:\Windows\system32\IExplorer.exe
        3⤵
        • Executes dropped EXE
        • Drops file in System32 directory
        • Drops file in Windows directory
        • Suspicious use of SetWindowsHookEx
        PID:1876
      • C:\Users\Admin\Local Settings\Application Data\WINDOWS\winlogon.exe
        "C:\Users\Admin\Local Settings\Application Data\WINDOWS\winlogon.exe"
        3⤵
        • Executes dropped EXE
        • Suspicious use of SetWindowsHookEx
        PID:636
      • C:\Users\Admin\Local Settings\Application Data\WINDOWS\imoet.exe
        "C:\Users\Admin\Local Settings\Application Data\WINDOWS\imoet.exe"
        3⤵
        • Executes dropped EXE
        • Suspicious use of SetWindowsHookEx
        PID:2412
      • C:\Users\Admin\Local Settings\Application Data\WINDOWS\cute.exe
        "C:\Users\Admin\Local Settings\Application Data\WINDOWS\cute.exe"
        3⤵
        • Executes dropped EXE
        • Suspicious use of SetWindowsHookEx
        PID:2968
    • C:\Windows\SysWOW64\IExplorer.exe
      C:\Windows\system32\IExplorer.exe
      2⤵
      • Modifies WinLogon for persistence
      • Modifies visibility of file extensions in Explorer
      • Modifies visiblity of hidden/system files in Explorer
      • Disables RegEdit via registry modification
      • Disables cmd.exe use via registry modification
      • Executes dropped EXE
      • Loads dropped DLL
      • Modifies system executable filetype association
      • Adds Run key to start application
      • Enumerates connected drives
      • Modifies WinLogon
      • Drops file in System32 directory
      • Drops file in Windows directory
      • Modifies Control Panel
      • Modifies Internet Explorer settings
      • Modifies Internet Explorer start page
      • Modifies registry class
      • Suspicious behavior: GetForegroundWindowSpam
      • Suspicious use of SetWindowsHookEx
      • Suspicious use of WriteProcessMemory
      • System policy modification
      PID:2948
      • C:\Windows\Tiwi.exe
        C:\Windows\Tiwi.exe
        3⤵
        • Executes dropped EXE
        • Suspicious use of SetWindowsHookEx
        PID:308
      • C:\Windows\SysWOW64\IExplorer.exe
        C:\Windows\system32\IExplorer.exe
        3⤵
        • Executes dropped EXE
        • Drops file in System32 directory
        • Drops file in Windows directory
        • Suspicious use of SetWindowsHookEx
        PID:1828
      • C:\Users\Admin\Local Settings\Application Data\WINDOWS\winlogon.exe
        "C:\Users\Admin\Local Settings\Application Data\WINDOWS\winlogon.exe"
        3⤵
        • Executes dropped EXE
        • Suspicious use of SetWindowsHookEx
        PID:2008
      • C:\Users\Admin\Local Settings\Application Data\WINDOWS\imoet.exe
        "C:\Users\Admin\Local Settings\Application Data\WINDOWS\imoet.exe"
        3⤵
        • Executes dropped EXE
        • Suspicious use of SetWindowsHookEx
        PID:2580
      • C:\Users\Admin\Local Settings\Application Data\WINDOWS\cute.exe
        "C:\Users\Admin\Local Settings\Application Data\WINDOWS\cute.exe"
        3⤵
        • Executes dropped EXE
        • Suspicious use of SetWindowsHookEx
        PID:2724
    • C:\Users\Admin\Local Settings\Application Data\WINDOWS\winlogon.exe
      "C:\Users\Admin\Local Settings\Application Data\WINDOWS\winlogon.exe"
      2⤵
      • Modifies WinLogon for persistence
      • Modifies visibility of file extensions in Explorer
      • Modifies visiblity of hidden/system files in Explorer
      • Disables RegEdit via registry modification
      • Disables cmd.exe use via registry modification
      • Executes dropped EXE
      • Loads dropped DLL
      • Modifies system executable filetype association
      • Adds Run key to start application
      • Enumerates connected drives
      • Modifies WinLogon
      • Drops file in System32 directory
      • Drops file in Windows directory
      • Modifies Control Panel
      • Modifies Internet Explorer settings
      • Modifies Internet Explorer start page
      • Modifies registry class
      • Suspicious behavior: GetForegroundWindowSpam
      • Suspicious use of SetWindowsHookEx
      • Suspicious use of WriteProcessMemory
      • System policy modification
      PID:2804
      • C:\Windows\Tiwi.exe
        C:\Windows\Tiwi.exe
        3⤵
        • Executes dropped EXE
        • Suspicious use of SetWindowsHookEx
        PID:1380
      • C:\Windows\SysWOW64\IExplorer.exe
        C:\Windows\system32\IExplorer.exe
        3⤵
        • Executes dropped EXE
        • Drops file in System32 directory
        • Drops file in Windows directory
        • Suspicious use of SetWindowsHookEx
        PID:1736
      • C:\Users\Admin\Local Settings\Application Data\WINDOWS\winlogon.exe
        "C:\Users\Admin\Local Settings\Application Data\WINDOWS\winlogon.exe"
        3⤵
        • Executes dropped EXE
        • Suspicious use of SetWindowsHookEx
        PID:2012
      • C:\Users\Admin\Local Settings\Application Data\WINDOWS\imoet.exe
        "C:\Users\Admin\Local Settings\Application Data\WINDOWS\imoet.exe"
        3⤵
        • Executes dropped EXE
        • Suspicious use of SetWindowsHookEx
        PID:2856
      • C:\Users\Admin\Local Settings\Application Data\WINDOWS\cute.exe
        "C:\Users\Admin\Local Settings\Application Data\WINDOWS\cute.exe"
        3⤵
        • Executes dropped EXE
        • Suspicious use of SetWindowsHookEx
        PID:2712
    • C:\Users\Admin\Local Settings\Application Data\WINDOWS\imoet.exe
      "C:\Users\Admin\Local Settings\Application Data\WINDOWS\imoet.exe"
      2⤵
      • Modifies WinLogon for persistence
      • Modifies visibility of file extensions in Explorer
      • Modifies visiblity of hidden/system files in Explorer
      • Disables RegEdit via registry modification
      • Disables cmd.exe use via registry modification
      • Executes dropped EXE
      • Loads dropped DLL
      • Modifies system executable filetype association
      • Adds Run key to start application
      • Enumerates connected drives
      • Modifies WinLogon
      • Drops file in System32 directory
      • Drops file in Windows directory
      • Modifies Control Panel
      • Modifies Internet Explorer settings
      • Modifies Internet Explorer start page
      • Modifies registry class
      • Suspicious behavior: GetForegroundWindowSpam
      • Suspicious use of SetWindowsHookEx
      • Suspicious use of WriteProcessMemory
      • System policy modification
      PID:2936
      • C:\Windows\Tiwi.exe
        C:\Windows\Tiwi.exe
        3⤵
        • Executes dropped EXE
        • Suspicious use of SetWindowsHookEx
        PID:1720
      • C:\Windows\SysWOW64\IExplorer.exe
        C:\Windows\system32\IExplorer.exe
        3⤵
        • Executes dropped EXE
        • Drops file in System32 directory
        • Drops file in Windows directory
        • Suspicious use of SetWindowsHookEx
        PID:2632
      • C:\Users\Admin\Local Settings\Application Data\WINDOWS\winlogon.exe
        "C:\Users\Admin\Local Settings\Application Data\WINDOWS\winlogon.exe"
        3⤵
        • Executes dropped EXE
        • Suspicious use of SetWindowsHookEx
        PID:2704
      • C:\Users\Admin\Local Settings\Application Data\WINDOWS\imoet.exe
        "C:\Users\Admin\Local Settings\Application Data\WINDOWS\imoet.exe"
        3⤵
        • Executes dropped EXE
        • Suspicious use of SetWindowsHookEx
        PID:1884
      • C:\Users\Admin\Local Settings\Application Data\WINDOWS\cute.exe
        "C:\Users\Admin\Local Settings\Application Data\WINDOWS\cute.exe"
        3⤵
        • Executes dropped EXE
        • Suspicious use of SetWindowsHookEx
        PID:2828
    • C:\Users\Admin\Local Settings\Application Data\WINDOWS\cute.exe
      "C:\Users\Admin\Local Settings\Application Data\WINDOWS\cute.exe"
      2⤵
      • Modifies WinLogon for persistence
      • Modifies visibility of file extensions in Explorer
      • Modifies visiblity of hidden/system files in Explorer
      • Disables RegEdit via registry modification
      • Disables cmd.exe use via registry modification
      • Executes dropped EXE
      • Loads dropped DLL
      • Modifies system executable filetype association
      • Adds Run key to start application
      • Enumerates connected drives
      • Modifies WinLogon
      • Drops file in System32 directory
      • Drops file in Windows directory
      • Modifies Control Panel
      • Modifies Internet Explorer settings
      • Modifies Internet Explorer start page
      • Modifies registry class
      • Suspicious behavior: GetForegroundWindowSpam
      • Suspicious use of SetWindowsHookEx
      • Suspicious use of WriteProcessMemory
      • System policy modification
      PID:1920
      • C:\Windows\Tiwi.exe
        C:\Windows\Tiwi.exe
        3⤵
        • Executes dropped EXE
        • Suspicious use of SetWindowsHookEx
        PID:1404
      • C:\Windows\SysWOW64\IExplorer.exe
        C:\Windows\system32\IExplorer.exe
        3⤵
        • Executes dropped EXE
        • Drops file in System32 directory
        • Drops file in Windows directory
        • Suspicious use of SetWindowsHookEx
        PID:2620
      • C:\Users\Admin\Local Settings\Application Data\WINDOWS\winlogon.exe
        "C:\Users\Admin\Local Settings\Application Data\WINDOWS\winlogon.exe"
        3⤵
        • Executes dropped EXE
        • Suspicious use of SetWindowsHookEx
        PID:2816
      • C:\Users\Admin\Local Settings\Application Data\WINDOWS\imoet.exe
        "C:\Users\Admin\Local Settings\Application Data\WINDOWS\imoet.exe"
        3⤵
        • Executes dropped EXE
        • Suspicious use of SetWindowsHookEx
        PID:2700
      • C:\Users\Admin\Local Settings\Application Data\WINDOWS\cute.exe
        "C:\Users\Admin\Local Settings\Application Data\WINDOWS\cute.exe"
        3⤵
        • Executes dropped EXE
        • Suspicious use of SetWindowsHookEx
        PID:2668

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\WINDOWS\imoet.exe

    Filesize

    137KB

    MD5

    3ee7dd21057add6f9bdf45678f1cb7f8

    SHA1

    e4a3a18c109776bfb0530b07c9daa7b369446c38

    SHA256

    0ff6f46fb2a1bf5832b7ea34277e897785f52607415dc5acccd257e2469c11e5

    SHA512

    f64e0da5b3d1ec38be73877744d1b476a4c3956dd6dadb678c8d149f1377c04340c3f7913bd53f24c0063e3ca197d0b9bcd2e6a65bf5420cc4229d26eb156e74

  • C:\Users\Admin\AppData\Local\WINDOWS\lsass.exe

    Filesize

    45KB

    MD5

    1b1c817ed2abd2a09d653a9790881719

    SHA1

    d7955d06c67fc8056cc80453623529b727941430

    SHA256

    a741d8a2a062e3a87eaf896e65328e3a5d9545a57c4e078ec02a9790e057a833

    SHA512

    61b745368d19939c8123ea32c46f7d26960fc617831d2173e09e11d43c6cc2930adfe8fca38646b24bee660dc2fa0d4066b759e603f0d299ded933fc1c22a65b

  • C:\Users\Admin\Local Settings\Application Data\WINDOWS\lsass.exe

    Filesize

    45KB

    MD5

    9e36e3bfda91ca1b72f67fa3b8cf3da4

    SHA1

    624612e3ef9a240f92e6d09ad9c26782e206c31c

    SHA256

    749b8428d3ab3d7a21d1d9b0f3817cc2631cc898a64e348465f48751b3ae501c

    SHA512

    e7c9f61b4a2c1fb532af2c2b24e1715e835c2a3fbec8b4b43c0646f7f87d7b6c9b9bfc8ff8ba2aa5112ddd0f14a63c2694fb0c82e7454bf8b246915af5777a62

  • C:\Users\Admin\Local Settings\Application Data\WINDOWS\lsass.exe

    Filesize

    45KB

    MD5

    4db82790872d197be2a47f63e677f8c6

    SHA1

    a582c5c647296df5a1fd098664cc2f3cf77972b8

    SHA256

    68444d63f013d9ac18b53b5f21d09d16fc13b2b616132919bfd56833ec05ec31

    SHA512

    2bd97d2d5066bdef4a555090a12411faac9d4deeba6001b5bf8cc813189cb50e9c341073fe21536296f96ad3a93d28740dd6bb199d3018733d98069a4bd1c456

  • C:\Users\Admin\Local Settings\Application Data\WINDOWS\lsass.exe

    Filesize

    45KB

    MD5

    b09c6e8a1a91472f4bf021c1eef9e779

    SHA1

    0b553efaff9817621c3e289d4aa3df13e9f9c8ae

    SHA256

    c161379af4988127c4af30a76b41d5d6a9f528477bf10118fff7d1c89217ebf3

    SHA512

    c7ca2fe0f5bb9cd4d7c663c43287b453dd222427fb0ba529a7287015aa439ddaacd00efdd7cfe61f191478d4352e522af42f8d3d7c5b135fb51b472a5db9570c

  • C:\Windows\MSVBVM60.DLL

    Filesize

    1.3MB

    MD5

    5343a19c618bc515ceb1695586c6c137

    SHA1

    4dedae8cbde066f31c8e6b52c0baa3f8b1117742

    SHA256

    2246b4feae199408ea66d4a90c1589026f4a5800ce5a28e583b94506a8a73dce

    SHA512

    708d8a252a167fa94e3e1a49e2630d07613ff75a9a3e779a0c1fcbec44aa853a68c401f31a2b84152f46a05f7d93f4e5e502afc7a60236a22ac58dea73fa5606

  • C:\Windows\SysWOW64\shell.exe

    Filesize

    137KB

    MD5

    bc05aa27036f7b19a1dfd869831ce96b

    SHA1

    0c03495b0196fa5c65dde2389ed18c9cf21bf710

    SHA256

    99b3d75250a01e7c502f650ae1d41ce87f33f4a158c0c4407263e3eebb53f59a

    SHA512

    7008471f11abd8dad9f6bf88471456e209786fb840da89955bbc18cee1b4b33bb160bb0130aabd0abfd9576053ea2ba349925e7450b71ea6e25685d8251de300

  • C:\Windows\SysWOW64\shell.exe

    Filesize

    137KB

    MD5

    fff2db4aae34f2cfeb265f2a15e2d70c

    SHA1

    938429020306c77d629ea9f8c19e515dff14aadc

    SHA256

    4146b2baa1dd63c84e878e9d86f99eb4c6aa5804b62943659068e46087291134

    SHA512

    808820695e0e504496d05ef75b0edfcfeb58b0f1d26cba4d095c43a8843699267513898bd9a1fa2dec622fdde487d84c0d2bd1a580375bb6b6be7f6876113d9e

  • C:\Windows\tiwi.exe

    Filesize

    137KB

    MD5

    33a8927490d61d7253439057bc3a86f3

    SHA1

    3b66d679c68288602ec62455cea0fd80c62a6519

    SHA256

    4d0048ced0436b1fa4dbc1092bbc6dbe2be93f4d979c2a81f39aef1cec225ad2

    SHA512

    23b770062ef55fc0056d1887a6575b7faabfd396a4a6780b3bb21dda010b07143fe3744630f6cdd59ea2f97f460bfa5dad52bb9fe2217ffbc46b9d264fae4c4c

  • C:\present.txt

    Filesize

    729B

    MD5

    8e3c734e8dd87d639fb51500d42694b5

    SHA1

    f76371d31eed9663e9a4fd7cb95f54dcfc51f87f

    SHA256

    574a3a546332854d82e4f5b54cc5e8731fe9828e14e89a728be7e53ed21f6bad

    SHA512

    06ef1ddd1dd2b30d7db261e9ac78601111eeb1315d2c46f42ec71d14611376a951af3e9c6178bb7235f0d61c022d4715aeb528f775a3cf7da249ab0b2e706853

  • C:\tiwi.exe

    Filesize

    137KB

    MD5

    c84ebb4a60309fd373dbd8123070f5bf

    SHA1

    9d5ab9d151d1d4660c1c90423eba5520354eddc5

    SHA256

    ba6dca24f0ae48107b12c3584d603ecb4f7fd7e4a856fb7ecbf5ba568d72af49

    SHA512

    eed9a83f4fd4e373456f386b9cf6d6e1fb619b3e9538898750e5ea5092946fea53b9428f5cec8f891b8a18026e79738594a00c9dc6ff7252cfc506528ee80510

  • F:\autorun.inf

    Filesize

    39B

    MD5

    415c421ba7ae46e77bdee3a681ecc156

    SHA1

    b0db5782b7688716d6fc83f7e650ffe1143201b7

    SHA256

    e6e9c5ea41aaf8b2145701f94289458ef5c8467f8c8a2954caddf8513adcf26e

    SHA512

    dbafe82d3fe0f9cda3fa9131271636381e548da5cc58cd01dd68d50e3795ff9d857143f30db9cd2a0530c06ce1adef4de9a61289e0014843ac7fefcbd31a8f62

  • \Users\Admin\AppData\Local\WINDOWS\cute.exe

    Filesize

    137KB

    MD5

    a6b2632f9d779e4464ae44440b373c76

    SHA1

    c4cf18302292e1174d627e9ecd46a6419d60c00b

    SHA256

    688720997fb29bdaa516533d8807cd5d440de6c6db9b63dd1951c8bf13030ceb

    SHA512

    c246135a321682b7f6215049a696e9c76e22f636b6e2967ddfe63c9dcc0b36dfc70983c2ec7df72038a30bb8b259b5f04284b88faa364d2e4c06b2afe6121ac4

  • \Users\Admin\AppData\Local\WINDOWS\winlogon.exe

    Filesize

    137KB

    MD5

    ab14b7f1cd12a2d14fa7227d7d078f21

    SHA1

    1129f0c5954968336b39c153ed6f83218ca1a4eb

    SHA256

    65effde15c22f10bcdb3bd766e3aa5ec3fc3f645e826d0ddd4cab5329c4efa36

    SHA512

    f55fc861a889d4934dc4aaf25522b213c24d708fe100e763f45b4965ad88f33770ad8212200202f38c25b98325a49c1ed56b18264bf923b1d6c10feb793796dd

  • \Windows\SysWOW64\IExplorer.exe

    Filesize

    137KB

    MD5

    ad8a681ccbe4e0119e1839f48082a7cf

    SHA1

    ca32ef8cccc16b9fd4576edda7ad66a282dbaae2

    SHA256

    236f0c903771191bc3b47516fab3d84de68ac4396014dd9496eba4f5f192d89d

    SHA512

    b538d3e53f522aaa17c93ab27a1aa1eda8b6213e65c510f1a08073e9a217ce3e17e21fbbfef487a15b841d4e75c1b92e550a72922678fbd1e9554bbc5d2580f2

  • memory/308-280-0x0000000000400000-0x000000000042B000-memory.dmp

    Filesize

    172KB

  • memory/636-249-0x0000000000400000-0x000000000042B000-memory.dmp

    Filesize

    172KB

  • memory/1380-298-0x0000000000400000-0x000000000042B000-memory.dmp

    Filesize

    172KB

  • memory/1380-284-0x0000000000400000-0x000000000042B000-memory.dmp

    Filesize

    172KB

  • memory/1404-370-0x0000000000400000-0x000000000042B000-memory.dmp

    Filesize

    172KB

  • memory/1720-377-0x0000000000400000-0x000000000042B000-memory.dmp

    Filesize

    172KB

  • memory/1736-304-0x0000000000400000-0x000000000042B000-memory.dmp

    Filesize

    172KB

  • memory/1736-367-0x0000000000400000-0x000000000042B000-memory.dmp

    Filesize

    172KB

  • memory/1828-353-0x0000000000400000-0x000000000042B000-memory.dmp

    Filesize

    172KB

  • memory/1876-229-0x0000000000400000-0x000000000042B000-memory.dmp

    Filesize

    172KB

  • memory/1876-205-0x0000000000400000-0x000000000042B000-memory.dmp

    Filesize

    172KB

  • memory/1884-420-0x0000000000400000-0x000000000042B000-memory.dmp

    Filesize

    172KB

  • memory/1920-410-0x0000000002900000-0x000000000292B000-memory.dmp

    Filesize

    172KB

  • memory/1920-398-0x0000000002900000-0x000000000292B000-memory.dmp

    Filesize

    172KB

  • memory/1920-409-0x0000000000400000-0x000000000042B000-memory.dmp

    Filesize

    172KB

  • memory/1920-431-0x0000000002900000-0x000000000292B000-memory.dmp

    Filesize

    172KB

  • memory/1920-426-0x0000000002900000-0x000000000292B000-memory.dmp

    Filesize

    172KB

  • memory/1920-430-0x0000000002900000-0x000000000292B000-memory.dmp

    Filesize

    172KB

  • memory/1920-308-0x0000000000400000-0x000000000042B000-memory.dmp

    Filesize

    172KB

  • memory/1920-401-0x0000000002900000-0x000000000292B000-memory.dmp

    Filesize

    172KB

  • memory/1920-355-0x0000000002900000-0x000000000292B000-memory.dmp

    Filesize

    172KB

  • memory/2008-336-0x0000000000400000-0x000000000042B000-memory.dmp

    Filesize

    172KB

  • memory/2008-376-0x0000000000400000-0x000000000042B000-memory.dmp

    Filesize

    172KB

  • memory/2012-381-0x0000000000400000-0x000000000042B000-memory.dmp

    Filesize

    172KB

  • memory/2332-201-0x0000000000400000-0x000000000042B000-memory.dmp

    Filesize

    172KB

  • memory/2332-180-0x0000000000400000-0x000000000042B000-memory.dmp

    Filesize

    172KB

  • memory/2412-312-0x0000000000400000-0x000000000042B000-memory.dmp

    Filesize

    172KB

  • memory/2412-283-0x0000000000400000-0x000000000042B000-memory.dmp

    Filesize

    172KB

  • memory/2512-332-0x0000000002470000-0x000000000249B000-memory.dmp

    Filesize

    172KB

  • memory/2512-279-0x0000000002470000-0x000000000249B000-memory.dmp

    Filesize

    172KB

  • memory/2512-101-0x0000000000400000-0x000000000042B000-memory.dmp

    Filesize

    172KB

  • memory/2512-405-0x0000000000400000-0x000000000042B000-memory.dmp

    Filesize

    172KB

  • memory/2512-334-0x0000000002470000-0x000000000249B000-memory.dmp

    Filesize

    172KB

  • memory/2512-273-0x0000000002470000-0x000000000249B000-memory.dmp

    Filesize

    172KB

  • memory/2512-182-0x0000000000400000-0x000000000042B000-memory.dmp

    Filesize

    172KB

  • memory/2512-338-0x0000000002470000-0x000000000249B000-memory.dmp

    Filesize

    172KB

  • memory/2512-337-0x0000000002470000-0x000000000249B000-memory.dmp

    Filesize

    172KB

  • memory/2512-198-0x0000000002470000-0x000000000249B000-memory.dmp

    Filesize

    172KB

  • memory/2512-200-0x0000000002470000-0x000000000249B000-memory.dmp

    Filesize

    172KB

  • memory/2580-385-0x0000000000400000-0x000000000042B000-memory.dmp

    Filesize

    172KB

  • memory/2620-378-0x0000000000400000-0x000000000042B000-memory.dmp

    Filesize

    172KB

  • memory/2632-380-0x0000000000400000-0x000000000042B000-memory.dmp

    Filesize

    172KB

  • memory/2668-404-0x0000000000400000-0x000000000042B000-memory.dmp

    Filesize

    172KB

  • memory/2700-400-0x0000000000400000-0x000000000042B000-memory.dmp

    Filesize

    172KB

  • memory/2712-418-0x0000000000400000-0x000000000042B000-memory.dmp

    Filesize

    172KB

  • memory/2724-391-0x0000000000400000-0x000000000042B000-memory.dmp

    Filesize

    172KB

  • memory/2724-392-0x0000000000400000-0x000000000042B000-memory.dmp

    Filesize

    172KB

  • memory/2804-434-0x0000000000400000-0x000000000042B000-memory.dmp

    Filesize

    172KB

  • memory/2804-415-0x0000000001D60000-0x0000000001D8B000-memory.dmp

    Filesize

    172KB

  • memory/2804-416-0x0000000001D60000-0x0000000001D8B000-memory.dmp

    Filesize

    172KB

  • memory/2804-354-0x0000000001D60000-0x0000000001D8B000-memory.dmp

    Filesize

    172KB

  • memory/2804-272-0x0000000000400000-0x000000000042B000-memory.dmp

    Filesize

    172KB

  • memory/2804-123-0x0000000000400000-0x000000000042B000-memory.dmp

    Filesize

    172KB

  • memory/2828-425-0x0000000000400000-0x000000000042B000-memory.dmp

    Filesize

    172KB

  • memory/2828-427-0x0000000000400000-0x000000000042B000-memory.dmp

    Filesize

    172KB

  • memory/2844-0-0x0000000000400000-0x000000000042B000-memory.dmp

    Filesize

    172KB

  • memory/2844-104-0x0000000000820000-0x000000000084B000-memory.dmp

    Filesize

    172KB

  • memory/2844-143-0x0000000000400000-0x000000000042B000-memory.dmp

    Filesize

    172KB

  • memory/2844-99-0x0000000000820000-0x000000000084B000-memory.dmp

    Filesize

    172KB

  • memory/2844-141-0x0000000000820000-0x000000000084B000-memory.dmp

    Filesize

    172KB

  • memory/2844-146-0x0000000000400000-0x000000000042B000-memory.dmp

    Filesize

    172KB

  • memory/2844-98-0x0000000000820000-0x000000000084B000-memory.dmp

    Filesize

    172KB

  • memory/2856-382-0x0000000000400000-0x000000000042B000-memory.dmp

    Filesize

    172KB

  • memory/2856-429-0x0000000000400000-0x000000000042B000-memory.dmp

    Filesize

    172KB

  • memory/2936-423-0x00000000031C0000-0x00000000031EB000-memory.dmp

    Filesize

    172KB

  • memory/2936-331-0x00000000031C0000-0x00000000031EB000-memory.dmp

    Filesize

    172KB

  • memory/2936-132-0x0000000000400000-0x000000000042B000-memory.dmp

    Filesize

    172KB

  • memory/2936-435-0x0000000000400000-0x000000000042B000-memory.dmp

    Filesize

    172KB

  • memory/2936-372-0x00000000031C0000-0x00000000031EB000-memory.dmp

    Filesize

    172KB

  • memory/2936-408-0x0000000000400000-0x000000000042B000-memory.dmp

    Filesize

    172KB

  • memory/2936-388-0x00000000031C0000-0x00000000031EB000-memory.dmp

    Filesize

    172KB

  • memory/2936-303-0x0000000000400000-0x000000000042B000-memory.dmp

    Filesize

    172KB

  • memory/2948-238-0x0000000000400000-0x000000000042B000-memory.dmp

    Filesize

    172KB

  • memory/2948-421-0x00000000023C0000-0x00000000023EB000-memory.dmp

    Filesize

    172KB

  • memory/2948-396-0x00000000023C0000-0x00000000023EB000-memory.dmp

    Filesize

    172KB

  • memory/2948-230-0x00000000023C0000-0x00000000023EB000-memory.dmp

    Filesize

    172KB

  • memory/2948-389-0x00000000023C0000-0x00000000023EB000-memory.dmp

    Filesize

    172KB

  • memory/2948-335-0x00000000023C0000-0x00000000023EB000-memory.dmp

    Filesize

    172KB

  • memory/2948-340-0x00000000023C0000-0x00000000023EB000-memory.dmp

    Filesize

    172KB

  • memory/2948-406-0x0000000000400000-0x000000000042B000-memory.dmp

    Filesize

    172KB

  • memory/2968-310-0x0000000000400000-0x000000000042B000-memory.dmp

    Filesize

    172KB

  • memory/2968-352-0x0000000000400000-0x000000000042B000-memory.dmp

    Filesize

    172KB