Analysis

  • max time kernel
    119s
  • max time network
    18s
  • platform
    windows7_x64
  • resource
    win7-20240705-en
  • resource tags

    arch:x64arch:x86image:win7-20240705-enlocale:en-usos:windows7-x64system
  • submitted
    22/08/2024, 01:41

General

  • Target

    5a7d8173d9c54b048aa527453c2e6c90N.exe

  • Size

    52KB

  • MD5

    5a7d8173d9c54b048aa527453c2e6c90

  • SHA1

    83fa31a1efee3838b8f078fae28ea23cf2403708

  • SHA256

    98e68a1b23af97ae9ddaf16668edb3d7fd8e0d980f23bac1b010106dd11555c6

  • SHA512

    bbd9ba21ebc36a58226fac63015134e25e51c54733bbe73a2f8d4b26e0da663d06baae7b31678c2e7a7660510d3527c356a88fe6663fe8f15062090cd35ec3bc

  • SSDEEP

    768:d+ciLamXW9XgMxjFkpvMVX8q18q13yO1oj5n/wukfw:IzaEW5gMxZVXf8a3yO1opwc

Malware Config

Signatures

  • Modifies WinLogon for persistence 2 TTPs 10 IoCs
  • Modifies visibility of file extensions in Explorer 2 TTPs 5 IoCs
  • Modifies visiblity of hidden/system files in Explorer 2 TTPs 5 IoCs
  • Windows security bypass 2 TTPs 25 IoCs
  • Blocks application from running via registry modification 30 IoCs

    Adds application to list of disallowed applications.

  • Disables RegEdit via registry modification 10 IoCs
  • Disables use of System Restore points 1 TTPs
  • Event Triggered Execution: Image File Execution Options Injection 1 TTPs 10 IoCs
  • Executes dropped EXE 20 IoCs
  • Loads dropped DLL 28 IoCs
  • Modifies system executable filetype association 2 TTPs 62 IoCs
  • Windows security modification 2 TTPs 30 IoCs
  • Adds Run key to start application 2 TTPs 15 IoCs
  • Drops desktop.ini file(s) 8 IoCs
  • Enumerates connected drives 3 TTPs 64 IoCs

    Attempts to read the root path of hard drives other than the default C: drive.

  • Drops file in System32 directory 33 IoCs
  • Drops file in Windows directory 20 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Location Discovery: System Language Discovery 1 TTPs 21 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Modifies Control Panel 45 IoCs
  • Modifies Internet Explorer settings 1 TTPs 10 IoCs
  • Modifies data under HKEY_USERS 15 IoCs
  • Modifies registry class 64 IoCs
  • Suspicious behavior: EnumeratesProcesses 1 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 4 IoCs
  • Suspicious use of SetWindowsHookEx 21 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs
  • System policy modification 1 TTPs 35 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\5a7d8173d9c54b048aa527453c2e6c90N.exe
    "C:\Users\Admin\AppData\Local\Temp\5a7d8173d9c54b048aa527453c2e6c90N.exe"
    1⤵
    • Modifies WinLogon for persistence
    • Modifies visibility of file extensions in Explorer
    • Modifies visiblity of hidden/system files in Explorer
    • Windows security bypass
    • Blocks application from running via registry modification
    • Disables RegEdit via registry modification
    • Event Triggered Execution: Image File Execution Options Injection
    • Loads dropped DLL
    • Modifies system executable filetype association
    • Windows security modification
    • Adds Run key to start application
    • Drops file in System32 directory
    • Drops file in Windows directory
    • System Location Discovery: System Language Discovery
    • Modifies Control Panel
    • Modifies Internet Explorer settings
    • Modifies data under HKEY_USERS
    • Modifies registry class
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    • System policy modification
    PID:3016
    • C:\Windows\nEwb0Rn.exe
      C:\Windows\nEwb0Rn.exe
      2⤵
      • Modifies WinLogon for persistence
      • Modifies visibility of file extensions in Explorer
      • Modifies visiblity of hidden/system files in Explorer
      • Windows security bypass
      • Blocks application from running via registry modification
      • Disables RegEdit via registry modification
      • Event Triggered Execution: Image File Execution Options Injection
      • Executes dropped EXE
      • Loads dropped DLL
      • Modifies system executable filetype association
      • Windows security modification
      • Adds Run key to start application
      • Drops desktop.ini file(s)
      • Enumerates connected drives
      • Drops file in System32 directory
      • Drops file in Windows directory
      • System Location Discovery: System Language Discovery
      • Modifies Control Panel
      • Modifies Internet Explorer settings
      • Modifies data under HKEY_USERS
      • Modifies registry class
      • Suspicious behavior: GetForegroundWindowSpam
      • Suspicious use of SetWindowsHookEx
      • Suspicious use of WriteProcessMemory
      • System policy modification
      PID:2820
      • C:\Windows\nEwb0Rn.exe
        C:\Windows\nEwb0Rn.exe
        3⤵
        • Executes dropped EXE
        • System Location Discovery: System Language Discovery
        • Suspicious use of SetWindowsHookEx
        PID:1816
      • C:\Windows\SysWOW64\WishfulThinking.exe
        C:\Windows\system32\WishfulThinking.exe
        3⤵
        • Executes dropped EXE
        • Drops file in System32 directory
        • Drops file in Windows directory
        • System Location Discovery: System Language Discovery
        • Suspicious use of SetWindowsHookEx
        PID:1764
      • C:\Users\Admin\Local Settings\Application Data\WINDOWS\WINLOGON.EXE
        "C:\Users\Admin\Local Settings\Application Data\WINDOWS\WINLOGON.EXE"
        3⤵
        • Executes dropped EXE
        • System Location Discovery: System Language Discovery
        • Suspicious use of SetWindowsHookEx
        PID:3044
      • C:\Users\Admin\Local Settings\Application Data\WINDOWS\SERVICES.EXE
        "C:\Users\Admin\Local Settings\Application Data\WINDOWS\SERVICES.EXE"
        3⤵
        • Executes dropped EXE
        • System Location Discovery: System Language Discovery
        • Suspicious use of SetWindowsHookEx
        PID:1728
    • C:\Windows\SysWOW64\WishfulThinking.exe
      C:\Windows\system32\WishfulThinking.exe
      2⤵
      • Modifies WinLogon for persistence
      • Modifies visibility of file extensions in Explorer
      • Modifies visiblity of hidden/system files in Explorer
      • Windows security bypass
      • Blocks application from running via registry modification
      • Disables RegEdit via registry modification
      • Event Triggered Execution: Image File Execution Options Injection
      • Executes dropped EXE
      • Loads dropped DLL
      • Modifies system executable filetype association
      • Windows security modification
      • Adds Run key to start application
      • Drops desktop.ini file(s)
      • Enumerates connected drives
      • Drops file in System32 directory
      • Drops file in Windows directory
      • System Location Discovery: System Language Discovery
      • Modifies Control Panel
      • Modifies Internet Explorer settings
      • Modifies data under HKEY_USERS
      • Modifies registry class
      • Suspicious behavior: GetForegroundWindowSpam
      • Suspicious use of SetWindowsHookEx
      • Suspicious use of WriteProcessMemory
      • System policy modification
      PID:2880
      • C:\Windows\nEwb0Rn.exe
        C:\Windows\nEwb0Rn.exe
        3⤵
        • Executes dropped EXE
        • System Location Discovery: System Language Discovery
        • Suspicious use of SetWindowsHookEx
        PID:2192
      • C:\Windows\SysWOW64\WishfulThinking.exe
        C:\Windows\system32\WishfulThinking.exe
        3⤵
        • Executes dropped EXE
        • Drops file in System32 directory
        • Drops file in Windows directory
        • System Location Discovery: System Language Discovery
        • Suspicious use of SetWindowsHookEx
        PID:1752
      • C:\Users\Admin\Local Settings\Application Data\WINDOWS\WINLOGON.EXE
        "C:\Users\Admin\Local Settings\Application Data\WINDOWS\WINLOGON.EXE"
        3⤵
        • Executes dropped EXE
        • System Location Discovery: System Language Discovery
        • Suspicious use of SetWindowsHookEx
        PID:2564
      • C:\Users\Admin\Local Settings\Application Data\WINDOWS\SERVICES.EXE
        "C:\Users\Admin\Local Settings\Application Data\WINDOWS\SERVICES.EXE"
        3⤵
        • Executes dropped EXE
        • System Location Discovery: System Language Discovery
        • Suspicious use of SetWindowsHookEx
        PID:2840
    • C:\Users\Admin\Local Settings\Application Data\WINDOWS\WINLOGON.EXE
      "C:\Users\Admin\Local Settings\Application Data\WINDOWS\WINLOGON.EXE"
      2⤵
      • Modifies WinLogon for persistence
      • Modifies visibility of file extensions in Explorer
      • Modifies visiblity of hidden/system files in Explorer
      • Windows security bypass
      • Blocks application from running via registry modification
      • Disables RegEdit via registry modification
      • Event Triggered Execution: Image File Execution Options Injection
      • Executes dropped EXE
      • Loads dropped DLL
      • Modifies system executable filetype association
      • Windows security modification
      • Adds Run key to start application
      • Enumerates connected drives
      • Drops file in System32 directory
      • Drops file in Windows directory
      • System Location Discovery: System Language Discovery
      • Modifies Control Panel
      • Modifies Internet Explorer settings
      • Modifies data under HKEY_USERS
      • Modifies registry class
      • Suspicious behavior: GetForegroundWindowSpam
      • Suspicious use of SetWindowsHookEx
      • Suspicious use of WriteProcessMemory
      • System policy modification
      PID:2032
      • C:\Windows\nEwb0Rn.exe
        C:\Windows\nEwb0Rn.exe
        3⤵
        • Executes dropped EXE
        • System Location Discovery: System Language Discovery
        • Suspicious use of SetWindowsHookEx
        PID:2028
      • C:\Windows\SysWOW64\WishfulThinking.exe
        C:\Windows\system32\WishfulThinking.exe
        3⤵
        • Executes dropped EXE
        • Drops file in System32 directory
        • Drops file in Windows directory
        • System Location Discovery: System Language Discovery
        • Suspicious use of SetWindowsHookEx
        PID:2520
      • C:\Users\Admin\Local Settings\Application Data\WINDOWS\WINLOGON.EXE
        "C:\Users\Admin\Local Settings\Application Data\WINDOWS\WINLOGON.EXE"
        3⤵
        • Executes dropped EXE
        • System Location Discovery: System Language Discovery
        • Suspicious use of SetWindowsHookEx
        PID:2304
      • C:\Users\Admin\Local Settings\Application Data\WINDOWS\SERVICES.EXE
        "C:\Users\Admin\Local Settings\Application Data\WINDOWS\SERVICES.EXE"
        3⤵
        • Executes dropped EXE
        • System Location Discovery: System Language Discovery
        • Suspicious use of SetWindowsHookEx
        PID:3064
    • C:\Users\Admin\Local Settings\Application Data\WINDOWS\SERVICES.EXE
      "C:\Users\Admin\Local Settings\Application Data\WINDOWS\SERVICES.EXE"
      2⤵
      • Modifies WinLogon for persistence
      • Modifies visibility of file extensions in Explorer
      • Modifies visiblity of hidden/system files in Explorer
      • Windows security bypass
      • Blocks application from running via registry modification
      • Disables RegEdit via registry modification
      • Event Triggered Execution: Image File Execution Options Injection
      • Executes dropped EXE
      • Loads dropped DLL
      • Modifies system executable filetype association
      • Windows security modification
      • Adds Run key to start application
      • Drops desktop.ini file(s)
      • Enumerates connected drives
      • Drops file in System32 directory
      • Drops file in Windows directory
      • System Location Discovery: System Language Discovery
      • Modifies Control Panel
      • Modifies Internet Explorer settings
      • Modifies data under HKEY_USERS
      • Modifies registry class
      • Suspicious behavior: GetForegroundWindowSpam
      • Suspicious use of SetWindowsHookEx
      • Suspicious use of WriteProcessMemory
      • System policy modification
      PID:1800
      • C:\Windows\nEwb0Rn.exe
        C:\Windows\nEwb0Rn.exe
        3⤵
        • Executes dropped EXE
        • System Location Discovery: System Language Discovery
        • Suspicious use of SetWindowsHookEx
        PID:1700
      • C:\Windows\SysWOW64\WishfulThinking.exe
        C:\Windows\system32\WishfulThinking.exe
        3⤵
        • Executes dropped EXE
        • Drops file in System32 directory
        • Drops file in Windows directory
        • System Location Discovery: System Language Discovery
        • Suspicious use of SetWindowsHookEx
        PID:1496
      • C:\Users\Admin\Local Settings\Application Data\WINDOWS\WINLOGON.EXE
        "C:\Users\Admin\Local Settings\Application Data\WINDOWS\WINLOGON.EXE"
        3⤵
        • Executes dropped EXE
        • System Location Discovery: System Language Discovery
        • Suspicious use of SetWindowsHookEx
        PID:2508
      • C:\Users\Admin\Local Settings\Application Data\WINDOWS\SERVICES.EXE
        "C:\Users\Admin\Local Settings\Application Data\WINDOWS\SERVICES.EXE"
        3⤵
        • Executes dropped EXE
        • System Location Discovery: System Language Discovery
        • Suspicious use of SetWindowsHookEx
        PID:2280

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\WINDOWS\WINLOGON.EXE

    Filesize

    52KB

    MD5

    ed743f1c1790ceead38675ed42afba2f

    SHA1

    4bc4f8470189e1af3d00c51df02d6c5b0309b090

    SHA256

    0302f5a14b693309eee9ac03bd950dcdad2fda8950f8ea1c04bcea29896b328e

    SHA512

    3bf4c322c0dc7ddb2f7f09a8eadac185287b05f6144c7cea08a009698b0e26ac1da701bc9c5e4e5227cdc703e26711fbfa67d902081e214f31a73f01bd17aa70

  • C:\Users\All Users\Start Menu\Programs\Startup\Empty.pif

    Filesize

    52KB

    MD5

    e9f897d9f71ecd48f0afc7002085592f

    SHA1

    b0f58554396452c42bf792f523a71ffa04388cb8

    SHA256

    ca9c6ada002872998e36f99b2dddd316cb4d92212307485a4cb04fe5317cae35

    SHA512

    4399a13707e082666664b2594a63d63e0d454e340bffe80d31e1b180034215c1f0daee0e00f5f33030d1261cbb19c6a769447d0379ffcd0d5b7daf7e7f04c8dc

  • C:\Users\All Users\Start Menu\Programs\Startup\Empty.pif

    Filesize

    52KB

    MD5

    cefd6522fb2b0628662e668044110151

    SHA1

    9659c58974bf125c8bbd0046b4614f07ad5ee543

    SHA256

    b962965262a1dbea53222d26fb9dc0cd23d277bfe853271b753eee4d64737244

    SHA512

    1c5b2243450896dede99ed593ca7b2f62e79c0ebd20fbcf1e063648a8efad08c128701771690a79845c1eae4e5a5352f6446b701013b167b7da27ff5607cf18d

  • C:\Users\All Users\Start Menu\Programs\Startup\Empty.pif

    Filesize

    52KB

    MD5

    d0e8db11b2e803f348f0239c6c5dcec4

    SHA1

    c1bb90e72fb67d0d6aaea79e0f951a06fc56f347

    SHA256

    076b44342c95b667d58f14536c241c00912338d148188fefe018f6cfe16faaf1

    SHA512

    71c51014e522dff114a85f85dfbceee935dd015e16d68635871c5eabb0c38d7c4c13859b33b31ac7446c95e0752f0783bff666608b09b25c4933978d6679e2eb

  • C:\Windows\MSVBVM60.DLL

    Filesize

    1.3MB

    MD5

    5343a19c618bc515ceb1695586c6c137

    SHA1

    4dedae8cbde066f31c8e6b52c0baa3f8b1117742

    SHA256

    2246b4feae199408ea66d4a90c1589026f4a5800ce5a28e583b94506a8a73dce

    SHA512

    708d8a252a167fa94e3e1a49e2630d07613ff75a9a3e779a0c1fcbec44aa853a68c401f31a2b84152f46a05f7d93f4e5e502afc7a60236a22ac58dea73fa5606

  • C:\Windows\SysWOW64\DamageControl.scr

    Filesize

    52KB

    MD5

    6f20e7a4c587e6e490a9ebddf887b02b

    SHA1

    2a40edcce9b304224939551fe2560aa9da22d048

    SHA256

    48cdbb56bd8d5107458b07b3d730af7c341226fd8dfbf1962d9157f2bc4dc31b

    SHA512

    557e6241680b2267635e152a4d0806d0d31ef786df4ec836abfc73b1286ac2b9aa6f5430fa756cd2b3366b4f390356deb65dee514a0f21f9e5550e19c0579ecf

  • C:\Windows\SysWOW64\DamageControl.scr

    Filesize

    52KB

    MD5

    5a7d8173d9c54b048aa527453c2e6c90

    SHA1

    83fa31a1efee3838b8f078fae28ea23cf2403708

    SHA256

    98e68a1b23af97ae9ddaf16668edb3d7fd8e0d980f23bac1b010106dd11555c6

    SHA512

    bbd9ba21ebc36a58226fac63015134e25e51c54733bbe73a2f8d4b26e0da663d06baae7b31678c2e7a7660510d3527c356a88fe6663fe8f15062090cd35ec3bc

  • C:\Windows\SysWOW64\JawsOfLife.exe

    Filesize

    52KB

    MD5

    87affc793bd0a97a62bcde95a0b90aa2

    SHA1

    dfcbd95fe93f906856e7d576997720bb47a53255

    SHA256

    26b3c033536b0c01af616c7d7c5df8865c3b2928306b314219f6f2f9ac10520f

    SHA512

    8612be3f1354b1f9705d68448aa8b70aca8fb754db3471069b00fcc10082af5ffea180684b0ec507faeba1f0c79862f3c24cf6c0431c187113640ee4856848e9

  • C:\Windows\nEwb0Rn.exe

    Filesize

    52KB

    MD5

    9671c2e8025f5ec036292543f11b12f4

    SHA1

    e07a2b1ad69b32386cbb254932a8629d208a31f2

    SHA256

    1d2fbf6bee672e2671fedc26295fac9436ad193255c7b9b20d9645b48ad1236d

    SHA512

    b31a1687104d1f5ddc03e5c6d38a9ae263e099b78f11b4e136390625b73288e659154eb6cc1de6dc2080924ed3c72962a2df96ff8a3d94760438cd8841d43aa7

  • C:\about.htm

    Filesize

    2KB

    MD5

    94c0c5518c4f4bb044842a006d04932a

    SHA1

    23d9a914f6681d65e2b1faa171f4cf492562ebdb

    SHA256

    224c4e5cdc0e7495c5fb5d1f52d76807092b5cc2d0a7c95fa612ff7b1412706e

    SHA512

    79cb2cd9e19ac3cc8bd94f1a20369e61224f8db02bc04d1f5768d62163b68467a3d317808a942bc7cca6ca84c221bb54a76e097f543c88bb89f0a3c9534ff3bb

  • \Users\Admin\AppData\Local\WINDOWS\SERVICES.EXE

    Filesize

    52KB

    MD5

    7b7a1fbd5df6b134488fe523d111efe7

    SHA1

    1a41e64f13638f481934beda5226cae4c18a9fde

    SHA256

    76b60a1bcf1b7897b024919de968a2fb266a26708a4aeb7a8802bea16b14dc42

    SHA512

    c738c181563648228cd842b2f3550f9ca8e5f11f58e048a2b82321b25bb2595d10f6d7f389f1c854399a426f41c4c93900d1d0c102eb998981ddd29ee5e6a037

  • \Windows\SysWOW64\WishfulThinking.exe

    Filesize

    52KB

    MD5

    f03e34b70a393e5a36bedd76b40bf9ab

    SHA1

    db6cc3cd4dc7b51e17b5948015f035c76e1b12ac

    SHA256

    373932995d85c15effca175e582f8e1b26ab2285effaa6ca159d1ea3a14ec50b

    SHA512

    30682cbfcb144c90f88b004441147d822c12d31c3d1c516aed1ebf895eb583c8f7c2e6e5a12e21886201449585264efc1bffe628b2a0b198b7ae987a54777249

  • memory/1496-315-0x0000000000400000-0x0000000000428000-memory.dmp

    Filesize

    160KB

  • memory/1496-294-0x0000000000400000-0x0000000000428000-memory.dmp

    Filesize

    160KB

  • memory/1700-276-0x0000000000400000-0x0000000000428000-memory.dmp

    Filesize

    160KB

  • memory/1700-298-0x0000000072940000-0x0000000072A93000-memory.dmp

    Filesize

    1.3MB

  • memory/1700-303-0x0000000000400000-0x0000000000428000-memory.dmp

    Filesize

    160KB

  • memory/1728-280-0x0000000000400000-0x0000000000428000-memory.dmp

    Filesize

    160KB

  • memory/1728-296-0x0000000000400000-0x0000000000428000-memory.dmp

    Filesize

    160KB

  • memory/1752-284-0x0000000000400000-0x0000000000428000-memory.dmp

    Filesize

    160KB

  • memory/1752-313-0x0000000000400000-0x0000000000428000-memory.dmp

    Filesize

    160KB

  • memory/1764-195-0x0000000000400000-0x0000000000428000-memory.dmp

    Filesize

    160KB

  • memory/1764-202-0x0000000000400000-0x0000000000428000-memory.dmp

    Filesize

    160KB

  • memory/1800-282-0x0000000000400000-0x0000000000428000-memory.dmp

    Filesize

    160KB

  • memory/1800-352-0x0000000000570000-0x0000000000598000-memory.dmp

    Filesize

    160KB

  • memory/1800-353-0x0000000000570000-0x0000000000598000-memory.dmp

    Filesize

    160KB

  • memory/1800-274-0x0000000000570000-0x0000000000598000-memory.dmp

    Filesize

    160KB

  • memory/1800-275-0x0000000000570000-0x0000000000598000-memory.dmp

    Filesize

    160KB

  • memory/1800-429-0x0000000000400000-0x0000000000428000-memory.dmp

    Filesize

    160KB

  • memory/1800-293-0x0000000000570000-0x0000000000598000-memory.dmp

    Filesize

    160KB

  • memory/1800-119-0x0000000000400000-0x0000000000428000-memory.dmp

    Filesize

    160KB

  • memory/1800-339-0x0000000000570000-0x0000000000598000-memory.dmp

    Filesize

    160KB

  • memory/1816-173-0x0000000000400000-0x0000000000428000-memory.dmp

    Filesize

    160KB

  • memory/1816-172-0x0000000072940000-0x0000000072A93000-memory.dmp

    Filesize

    1.3MB

  • memory/2028-317-0x0000000072940000-0x0000000072A93000-memory.dmp

    Filesize

    1.3MB

  • memory/2028-318-0x0000000000400000-0x0000000000428000-memory.dmp

    Filesize

    160KB

  • memory/2032-208-0x0000000000400000-0x0000000000428000-memory.dmp

    Filesize

    160KB

  • memory/2032-428-0x0000000000400000-0x0000000000428000-memory.dmp

    Filesize

    160KB

  • memory/2032-273-0x0000000001D70000-0x0000000001D98000-memory.dmp

    Filesize

    160KB

  • memory/2032-104-0x0000000000400000-0x0000000000428000-memory.dmp

    Filesize

    160KB

  • memory/2032-340-0x0000000001D70000-0x0000000001D98000-memory.dmp

    Filesize

    160KB

  • memory/2032-277-0x0000000001D70000-0x0000000001D98000-memory.dmp

    Filesize

    160KB

  • memory/2192-200-0x0000000000400000-0x0000000000428000-memory.dmp

    Filesize

    160KB

  • memory/2192-304-0x0000000072940000-0x0000000072A93000-memory.dmp

    Filesize

    1.3MB

  • memory/2192-283-0x0000000000400000-0x0000000000428000-memory.dmp

    Filesize

    160KB

  • memory/2280-369-0x0000000000400000-0x0000000000428000-memory.dmp

    Filesize

    160KB

  • memory/2280-349-0x0000000000400000-0x0000000000428000-memory.dmp

    Filesize

    160KB

  • memory/2304-419-0x0000000000400000-0x0000000000428000-memory.dmp

    Filesize

    160KB

  • memory/2508-331-0x0000000000400000-0x0000000000428000-memory.dmp

    Filesize

    160KB

  • memory/2520-341-0x0000000000400000-0x0000000000428000-memory.dmp

    Filesize

    160KB

  • memory/2520-346-0x0000000000400000-0x0000000000428000-memory.dmp

    Filesize

    160KB

  • memory/2564-415-0x0000000000400000-0x0000000000428000-memory.dmp

    Filesize

    160KB

  • memory/2564-355-0x0000000000400000-0x0000000000428000-memory.dmp

    Filesize

    160KB

  • memory/2820-80-0x0000000000400000-0x0000000000428000-memory.dmp

    Filesize

    160KB

  • memory/2820-153-0x0000000002620000-0x0000000002648000-memory.dmp

    Filesize

    160KB

  • memory/2820-426-0x0000000000400000-0x0000000000428000-memory.dmp

    Filesize

    160KB

  • memory/2820-311-0x0000000002620000-0x0000000002648000-memory.dmp

    Filesize

    160KB

  • memory/2820-155-0x0000000000400000-0x0000000000428000-memory.dmp

    Filesize

    160KB

  • memory/2820-278-0x0000000002620000-0x0000000002648000-memory.dmp

    Filesize

    160KB

  • memory/2820-194-0x0000000002620000-0x0000000002648000-memory.dmp

    Filesize

    160KB

  • memory/2820-193-0x0000000002620000-0x0000000002648000-memory.dmp

    Filesize

    160KB

  • memory/2840-371-0x0000000000400000-0x0000000000428000-memory.dmp

    Filesize

    160KB

  • memory/2880-372-0x0000000002490000-0x00000000024B8000-memory.dmp

    Filesize

    160KB

  • memory/2880-427-0x0000000000400000-0x0000000000428000-memory.dmp

    Filesize

    160KB

  • memory/2880-354-0x0000000002490000-0x00000000024B8000-memory.dmp

    Filesize

    160KB

  • memory/2880-199-0x0000000000400000-0x0000000000428000-memory.dmp

    Filesize

    160KB

  • memory/2880-422-0x0000000002490000-0x00000000024B8000-memory.dmp

    Filesize

    160KB

  • memory/2880-92-0x0000000000400000-0x0000000000428000-memory.dmp

    Filesize

    160KB

  • memory/2880-338-0x0000000002490000-0x00000000024B8000-memory.dmp

    Filesize

    160KB

  • memory/2880-423-0x0000000002490000-0x00000000024B8000-memory.dmp

    Filesize

    160KB

  • memory/3016-89-0x0000000002500000-0x0000000002528000-memory.dmp

    Filesize

    160KB

  • memory/3016-115-0x0000000000400000-0x0000000000428000-memory.dmp

    Filesize

    160KB

  • memory/3016-78-0x0000000002500000-0x0000000002528000-memory.dmp

    Filesize

    160KB

  • memory/3016-77-0x0000000002500000-0x0000000002528000-memory.dmp

    Filesize

    160KB

  • memory/3016-0-0x0000000000400000-0x0000000000428000-memory.dmp

    Filesize

    160KB

  • memory/3016-109-0x0000000002500000-0x0000000002528000-memory.dmp

    Filesize

    160KB

  • memory/3016-90-0x0000000002500000-0x0000000002528000-memory.dmp

    Filesize

    160KB

  • memory/3016-120-0x0000000000400000-0x0000000000428000-memory.dmp

    Filesize

    160KB

  • memory/3044-225-0x0000000000400000-0x0000000000428000-memory.dmp

    Filesize

    160KB

  • memory/3044-209-0x0000000000400000-0x0000000000428000-memory.dmp

    Filesize

    160KB

  • memory/3064-424-0x0000000000400000-0x0000000000428000-memory.dmp

    Filesize

    160KB