Analysis

  • max time kernel
    119s
  • max time network
    94s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240802-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system
  • submitted
    05/09/2024, 02:40

General

  • Target

    e2c73d3fbfe5f6a95f18eda74b664390N.exe

  • Size

    52KB

  • MD5

    e2c73d3fbfe5f6a95f18eda74b664390

  • SHA1

    aaba4452ad2a783be8385e857749a8aa4eb01b55

  • SHA256

    d0cc93336bb5a4413a5a2bd737b5408cd66e244610de54dbdca2780b60c8d054

  • SHA512

    e3395c59d0d6b8f619fd0611a6d1c3738eb066a528d53b23eb5b54159596a2b03f2cb8b89bb0e2ff44de51c9d0b23ebf11ce0c9e4ba833d0522a97eb03134cc6

  • SSDEEP

    768:d+ciLamXW9XgMxjFkpvMVX8q18q13yO1oj5n/wWkfw:IzaEW5gMxZVXf8a3yO1opwE

Malware Config

Signatures

  • Modifies WinLogon for persistence 2 TTPs 10 IoCs
  • Modifies visibility of file extensions in Explorer 2 TTPs 5 IoCs
  • Modifies visiblity of hidden/system files in Explorer 2 TTPs 5 IoCs
  • Windows security bypass 2 TTPs 25 IoCs
  • Blocks application from running via registry modification 30 IoCs

    Adds application to list of disallowed applications.

  • Disables RegEdit via registry modification 10 IoCs
  • Disables use of System Restore points 1 TTPs
  • Event Triggered Execution: Image File Execution Options Injection 1 TTPs 10 IoCs
  • Executes dropped EXE 20 IoCs
  • Loads dropped DLL 4 IoCs
  • Modifies system executable filetype association 2 TTPs 62 IoCs
  • Windows security modification 2 TTPs 30 IoCs
  • Adds Run key to start application 2 TTPs 15 IoCs
  • Drops desktop.ini file(s) 10 IoCs
  • Enumerates connected drives 3 TTPs 64 IoCs

    Attempts to read the root path of hard drives other than the default C: drive.

  • Drops file in System32 directory 32 IoCs
  • Drops file in Windows directory 20 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 21 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Modifies Control Panel 45 IoCs
  • Modifies Internet Explorer settings 1 TTPs 10 IoCs
  • Modifies data under HKEY_USERS 15 IoCs
  • Modifies registry class 64 IoCs
  • Suspicious behavior: EnumeratesProcesses 2 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 4 IoCs
  • Suspicious use of SetWindowsHookEx 21 IoCs
  • Suspicious use of WriteProcessMemory 60 IoCs
  • System policy modification 1 TTPs 35 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\e2c73d3fbfe5f6a95f18eda74b664390N.exe
    "C:\Users\Admin\AppData\Local\Temp\e2c73d3fbfe5f6a95f18eda74b664390N.exe"
    1⤵
    • Modifies WinLogon for persistence
    • Modifies visibility of file extensions in Explorer
    • Modifies visiblity of hidden/system files in Explorer
    • Windows security bypass
    • Blocks application from running via registry modification
    • Disables RegEdit via registry modification
    • Event Triggered Execution: Image File Execution Options Injection
    • Modifies system executable filetype association
    • Windows security modification
    • Adds Run key to start application
    • Drops file in System32 directory
    • Drops file in Windows directory
    • System Location Discovery: System Language Discovery
    • Modifies Control Panel
    • Modifies Internet Explorer settings
    • Modifies data under HKEY_USERS
    • Modifies registry class
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    • System policy modification
    PID:4532
    • C:\Windows\nEwb0Rn.exe
      C:\Windows\nEwb0Rn.exe
      2⤵
      • Modifies WinLogon for persistence
      • Modifies visibility of file extensions in Explorer
      • Modifies visiblity of hidden/system files in Explorer
      • Windows security bypass
      • Blocks application from running via registry modification
      • Disables RegEdit via registry modification
      • Event Triggered Execution: Image File Execution Options Injection
      • Executes dropped EXE
      • Modifies system executable filetype association
      • Windows security modification
      • Adds Run key to start application
      • Drops desktop.ini file(s)
      • Enumerates connected drives
      • Drops file in System32 directory
      • Drops file in Windows directory
      • System Location Discovery: System Language Discovery
      • Modifies Control Panel
      • Modifies Internet Explorer settings
      • Modifies data under HKEY_USERS
      • Modifies registry class
      • Suspicious behavior: GetForegroundWindowSpam
      • Suspicious use of SetWindowsHookEx
      • Suspicious use of WriteProcessMemory
      • System policy modification
      PID:1344
      • C:\Windows\nEwb0Rn.exe
        C:\Windows\nEwb0Rn.exe
        3⤵
        • Executes dropped EXE
        • Loads dropped DLL
        • System Location Discovery: System Language Discovery
        • Suspicious use of SetWindowsHookEx
        PID:4788
      • C:\Windows\SysWOW64\WishfulThinking.exe
        C:\Windows\system32\WishfulThinking.exe
        3⤵
        • Executes dropped EXE
        • Drops file in System32 directory
        • Drops file in Windows directory
        • System Location Discovery: System Language Discovery
        • Suspicious use of SetWindowsHookEx
        PID:2340
      • C:\Users\Admin\Local Settings\Application Data\WINDOWS\WINLOGON.EXE
        "C:\Users\Admin\Local Settings\Application Data\WINDOWS\WINLOGON.EXE"
        3⤵
        • Executes dropped EXE
        • System Location Discovery: System Language Discovery
        • Suspicious use of SetWindowsHookEx
        PID:3772
      • C:\Users\Admin\Local Settings\Application Data\WINDOWS\SERVICES.EXE
        "C:\Users\Admin\Local Settings\Application Data\WINDOWS\SERVICES.EXE"
        3⤵
        • Executes dropped EXE
        • System Location Discovery: System Language Discovery
        • Suspicious use of SetWindowsHookEx
        PID:4044
    • C:\Windows\SysWOW64\WishfulThinking.exe
      C:\Windows\system32\WishfulThinking.exe
      2⤵
      • Modifies WinLogon for persistence
      • Modifies visibility of file extensions in Explorer
      • Modifies visiblity of hidden/system files in Explorer
      • Windows security bypass
      • Blocks application from running via registry modification
      • Disables RegEdit via registry modification
      • Event Triggered Execution: Image File Execution Options Injection
      • Executes dropped EXE
      • Modifies system executable filetype association
      • Windows security modification
      • Adds Run key to start application
      • Drops desktop.ini file(s)
      • Enumerates connected drives
      • Drops file in System32 directory
      • Drops file in Windows directory
      • System Location Discovery: System Language Discovery
      • Modifies Control Panel
      • Modifies Internet Explorer settings
      • Modifies data under HKEY_USERS
      • Modifies registry class
      • Suspicious behavior: GetForegroundWindowSpam
      • Suspicious use of SetWindowsHookEx
      • Suspicious use of WriteProcessMemory
      • System policy modification
      PID:1688
      • C:\Windows\nEwb0Rn.exe
        C:\Windows\nEwb0Rn.exe
        3⤵
        • Executes dropped EXE
        • Loads dropped DLL
        • System Location Discovery: System Language Discovery
        • Suspicious use of SetWindowsHookEx
        PID:880
      • C:\Windows\SysWOW64\WishfulThinking.exe
        C:\Windows\system32\WishfulThinking.exe
        3⤵
        • Executes dropped EXE
        • Drops file in System32 directory
        • Drops file in Windows directory
        • System Location Discovery: System Language Discovery
        • Suspicious use of SetWindowsHookEx
        PID:2736
      • C:\Users\Admin\Local Settings\Application Data\WINDOWS\WINLOGON.EXE
        "C:\Users\Admin\Local Settings\Application Data\WINDOWS\WINLOGON.EXE"
        3⤵
        • Executes dropped EXE
        • System Location Discovery: System Language Discovery
        • Suspicious use of SetWindowsHookEx
        PID:1644
      • C:\Users\Admin\Local Settings\Application Data\WINDOWS\SERVICES.EXE
        "C:\Users\Admin\Local Settings\Application Data\WINDOWS\SERVICES.EXE"
        3⤵
        • Executes dropped EXE
        • System Location Discovery: System Language Discovery
        • Suspicious use of SetWindowsHookEx
        PID:1456
    • C:\Users\Admin\Local Settings\Application Data\WINDOWS\WINLOGON.EXE
      "C:\Users\Admin\Local Settings\Application Data\WINDOWS\WINLOGON.EXE"
      2⤵
      • Modifies WinLogon for persistence
      • Modifies visibility of file extensions in Explorer
      • Modifies visiblity of hidden/system files in Explorer
      • Windows security bypass
      • Blocks application from running via registry modification
      • Disables RegEdit via registry modification
      • Event Triggered Execution: Image File Execution Options Injection
      • Executes dropped EXE
      • Modifies system executable filetype association
      • Windows security modification
      • Adds Run key to start application
      • Drops desktop.ini file(s)
      • Enumerates connected drives
      • Drops file in System32 directory
      • Drops file in Windows directory
      • System Location Discovery: System Language Discovery
      • Modifies Control Panel
      • Modifies Internet Explorer settings
      • Modifies data under HKEY_USERS
      • Modifies registry class
      • Suspicious behavior: GetForegroundWindowSpam
      • Suspicious use of SetWindowsHookEx
      • Suspicious use of WriteProcessMemory
      • System policy modification
      PID:744
      • C:\Windows\nEwb0Rn.exe
        C:\Windows\nEwb0Rn.exe
        3⤵
        • Executes dropped EXE
        • Loads dropped DLL
        • System Location Discovery: System Language Discovery
        • Suspicious use of SetWindowsHookEx
        PID:1748
      • C:\Windows\SysWOW64\WishfulThinking.exe
        C:\Windows\system32\WishfulThinking.exe
        3⤵
        • Executes dropped EXE
        • Drops file in System32 directory
        • Drops file in Windows directory
        • System Location Discovery: System Language Discovery
        • Suspicious use of SetWindowsHookEx
        PID:3804
      • C:\Users\Admin\Local Settings\Application Data\WINDOWS\WINLOGON.EXE
        "C:\Users\Admin\Local Settings\Application Data\WINDOWS\WINLOGON.EXE"
        3⤵
        • Executes dropped EXE
        • System Location Discovery: System Language Discovery
        • Suspicious use of SetWindowsHookEx
        PID:1096
      • C:\Users\Admin\Local Settings\Application Data\WINDOWS\SERVICES.EXE
        "C:\Users\Admin\Local Settings\Application Data\WINDOWS\SERVICES.EXE"
        3⤵
        • Executes dropped EXE
        • System Location Discovery: System Language Discovery
        • Suspicious use of SetWindowsHookEx
        PID:3216
    • C:\Users\Admin\Local Settings\Application Data\WINDOWS\SERVICES.EXE
      "C:\Users\Admin\Local Settings\Application Data\WINDOWS\SERVICES.EXE"
      2⤵
      • Modifies WinLogon for persistence
      • Modifies visibility of file extensions in Explorer
      • Modifies visiblity of hidden/system files in Explorer
      • Windows security bypass
      • Blocks application from running via registry modification
      • Disables RegEdit via registry modification
      • Event Triggered Execution: Image File Execution Options Injection
      • Executes dropped EXE
      • Modifies system executable filetype association
      • Windows security modification
      • Adds Run key to start application
      • Enumerates connected drives
      • Drops file in System32 directory
      • Drops file in Windows directory
      • System Location Discovery: System Language Discovery
      • Modifies Control Panel
      • Modifies Internet Explorer settings
      • Modifies data under HKEY_USERS
      • Modifies registry class
      • Suspicious behavior: GetForegroundWindowSpam
      • Suspicious use of SetWindowsHookEx
      • Suspicious use of WriteProcessMemory
      • System policy modification
      PID:4872
      • C:\Windows\nEwb0Rn.exe
        C:\Windows\nEwb0Rn.exe
        3⤵
        • Executes dropped EXE
        • Loads dropped DLL
        • System Location Discovery: System Language Discovery
        • Suspicious use of SetWindowsHookEx
        PID:4444
      • C:\Windows\SysWOW64\WishfulThinking.exe
        C:\Windows\system32\WishfulThinking.exe
        3⤵
        • Executes dropped EXE
        • Drops file in System32 directory
        • Drops file in Windows directory
        • System Location Discovery: System Language Discovery
        • Suspicious use of SetWindowsHookEx
        PID:4876
      • C:\Users\Admin\Local Settings\Application Data\WINDOWS\WINLOGON.EXE
        "C:\Users\Admin\Local Settings\Application Data\WINDOWS\WINLOGON.EXE"
        3⤵
        • Executes dropped EXE
        • System Location Discovery: System Language Discovery
        • Suspicious use of SetWindowsHookEx
        PID:1936
      • C:\Users\Admin\Local Settings\Application Data\WINDOWS\SERVICES.EXE
        "C:\Users\Admin\Local Settings\Application Data\WINDOWS\SERVICES.EXE"
        3⤵
        • Executes dropped EXE
        • System Location Discovery: System Language Discovery
        • Suspicious use of SetWindowsHookEx
        PID:224

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\WINDOWS\SERVICES.EXE

    Filesize

    52KB

    MD5

    cd0b1bf17ec23186851bc27e2fd56953

    SHA1

    fe6f569a697a0ce79da976407a90467782ba976f

    SHA256

    9fb7a3e37b87f855e6c386df0e3505566a0b609e90cf97101659cdda7e220048

    SHA512

    fdfe8e478bd3f43626bb8ead5eb79311a2e4aa6ba030e2e5849861341e8b62af19d8e5dc413910e6f47a4fa1e70cb910ff47cd79d25e21d87850ef30111603d8

  • C:\Users\Admin\AppData\Local\WINDOWS\WINLOGON.EXE

    Filesize

    52KB

    MD5

    63265c065e454385c36b0876923fe826

    SHA1

    cc91e264417d5e588543c173cda96469d85ff7a0

    SHA256

    f987eb02b38d7bb02b322e026369cebb238957f4b85a02a0ba1b0ef306e7df42

    SHA512

    1b6b2222c87b4c82490605da2596900d5fa050897e5a50eeba506d92180e86536c94fda3165aa96e661b2bec21b00bf3c6edd18b2f609abfd2072817af737cdb

  • C:\Windows\MSVBVM60.DLL

    Filesize

    1.4MB

    MD5

    25f62c02619174b35851b0e0455b3d94

    SHA1

    4e8ee85157f1769f6e3f61c0acbe59072209da71

    SHA256

    898288bd3b21d0e7d5f406df2e0b69a5bbfa4f241baf29a2cdf8a3cf4d4619f2

    SHA512

    f4529fd9eca4e4696f7f06874866ff98a1447a9b0d3a20ef0de54d4d694e2497fd39c452f73fab9b8a02962a7b2b88d1e85f6e35c7cbcb9555003c6828bebc3a

  • C:\Windows\SysWOW64\DamageControl.scr

    Filesize

    52KB

    MD5

    ec8d82559cfd9b65fd9ee061bcd4b386

    SHA1

    509e42a4faa49d33f275450bf26017f0ca421484

    SHA256

    e3dff42f2799c92aa90d534b7bab41f06d53be77a3680cad20eecaa03aeb09e8

    SHA512

    3fa6e0206d8366d47dc57f83eeabdf7fc46bc47752fab75405914a1c429804a80fd72fb7db18e1f40ad035360a75a1f69b52c26dce9962974e9f633ac7303c6e

  • C:\Windows\SysWOW64\DamageControl.scr

    Filesize

    52KB

    MD5

    e2c73d3fbfe5f6a95f18eda74b664390

    SHA1

    aaba4452ad2a783be8385e857749a8aa4eb01b55

    SHA256

    d0cc93336bb5a4413a5a2bd737b5408cd66e244610de54dbdca2780b60c8d054

    SHA512

    e3395c59d0d6b8f619fd0611a6d1c3738eb066a528d53b23eb5b54159596a2b03f2cb8b89bb0e2ff44de51c9d0b23ebf11ce0c9e4ba833d0522a97eb03134cc6

  • C:\Windows\SysWOW64\JawsOfLife.exe

    Filesize

    52KB

    MD5

    9d52647dc552d5a6f2f82165c9e6faad

    SHA1

    af53c24e5112f6bf102c86be643714c051a85f3a

    SHA256

    b6b9e3253f2c11b6dcd02ddf5e53f5d9131ef779fcd6dec1be47ccd3ab226fa3

    SHA512

    3771e47ba9aad539d9cb5f9b53e4dc67ff53375deda104b65e6c25d188fe724be9593f83f38796e1fe073755b68dd157e569e368e0691cb6bdbc11239088113e

  • C:\Windows\SysWOW64\JawsOfLife.exe

    Filesize

    52KB

    MD5

    d1e9b73c6ec0639edd2ed3090bb1fb8c

    SHA1

    20247bf14f60dbf1b994d519ab1e250adf3eb3f1

    SHA256

    dfb31c8dc20147e9f1177df203659bb7c280a9308edf42ebbbf9dec9b5dc0659

    SHA512

    f19509079c9d2f8b530fce85d3d3ae76bd31ac0739e69b6edfbdb4ae72a0ed5401d11376ea4aab2fa2596c183cb8161bb08559320f0d609407d71c712fb3a4b2

  • C:\Windows\SysWOW64\WishfulThinking.exe

    Filesize

    52KB

    MD5

    3d1d74f53ac57d44fd9985bfb131e205

    SHA1

    8737e1598d1c23a83b064f62231818bc120cd0aa

    SHA256

    7278b357de09ae27b5b212b75e8ae3aef01af4ea88b45df8289159841963e805

    SHA512

    bab73260cfaf5f1fe03e511b34c4b24478dd0cc875a88f19a35267a892f637605b05fcfe530280e55cb5d832e530d16ea50ef56648df151f92b4771c4ae2a531

  • C:\Windows\nEwb0Rn.exe

    Filesize

    52KB

    MD5

    072ff2582f4bfecf3c2ce14ef86d14d3

    SHA1

    2c3f26ec9ed2e868eba54bfa6c251a3190f973df

    SHA256

    866f219d3cdd17b12570845f04c14745ad6897db926d6f2842f2ee93a767a33b

    SHA512

    19024b9be07051a0ccdfbd8c6cf4cf59b0501b57f439fa287551fff25dec1414e7dd67226c51d75eb8658e56286e13901dc1e6a5f0d213cb1a006797da68ff89

  • C:\about.htm

    Filesize

    2KB

    MD5

    94c0c5518c4f4bb044842a006d04932a

    SHA1

    23d9a914f6681d65e2b1faa171f4cf492562ebdb

    SHA256

    224c4e5cdc0e7495c5fb5d1f52d76807092b5cc2d0a7c95fa612ff7b1412706e

    SHA512

    79cb2cd9e19ac3cc8bd94f1a20369e61224f8db02bc04d1f5768d62163b68467a3d317808a942bc7cca6ca84c221bb54a76e097f543c88bb89f0a3c9534ff3bb

  • C:\desktop.ini

    Filesize

    222B

    MD5

    b78e2c99b0e66f6f6accbebdaa4d8442

    SHA1

    a546aaed8820b44437538600deba9d08a4a11ddc

    SHA256

    59e9ccbcb65a03c7965b93c758e4562ff8ddd5500b8ec1b66811f9b62744b2ca

    SHA512

    82d09d87f8dffbc9c261b8d9dc9437350638197430ecee513bf1803ad18db3b939c56141e970d0d9523c93befebd1e76743b860d9dfd2072280becdf5aa2fc6e

  • C:\nEwb0Rn.exe

    Filesize

    52KB

    MD5

    081627f159cbf374878b43cd8ce6c669

    SHA1

    1245ad8ccc281d85a17db67f296b41e0dea93640

    SHA256

    ed24f1e370b10cfc5b2f8133c1a6d2164db4a0e9e298d51b597c4c8982ab650b

    SHA512

    0a39735c449393548929bbffbcfed7f6b41c6f7533c797c838417adac2109d48c4c8fe956391e6dbdec3b621cb77a09d2b6f97b9df0a3b61b04dbb49caa44e04

  • C:\nEwb0Rn.exe

    Filesize

    52KB

    MD5

    15460bce7373b37fbbd9351f488aebc4

    SHA1

    30534a9aeec6fe88cc24584c157bc41d11ab67ca

    SHA256

    055ddfba01c14d573f145f0e16e55e58b0aa2a6b6a653e4ab42d28f70a1f5170

    SHA512

    dd50dcfef0745daa412613f188faa4d13595b41cd713f7174a5ad2037419dc8bc8bfa3875053a0dce7717fb0cfc7b935488e70bee79d19b620c681bdbc2a3b5b

  • C:\nEwb0Rn\Folder.htt

    Filesize

    640B

    MD5

    5d142e7978321fde49abd9a068b64d97

    SHA1

    70020fcf7f3d6dafb6c8cd7a55395196a487bef4

    SHA256

    fe222b08327bbfb35cbd627c0526ba7b5755b02ce0a95823a4c0bf58e601d061

    SHA512

    2351284652a9a1b35006baf4727a85199406e464ac33cb4701a6182e1076aaff022c227dbe4ad6e916eba15ebad08b10719a8e86d5a0f89844a163a7d4a7bbf9

  • memory/224-396-0x0000000000400000-0x0000000000428000-memory.dmp

    Filesize

    160KB

  • memory/744-235-0x0000000000400000-0x0000000000428000-memory.dmp

    Filesize

    160KB

  • memory/744-89-0x0000000000400000-0x0000000000428000-memory.dmp

    Filesize

    160KB

  • memory/744-400-0x0000000000400000-0x0000000000428000-memory.dmp

    Filesize

    160KB

  • memory/880-180-0x0000000000400000-0x0000000000428000-memory.dmp

    Filesize

    160KB

  • memory/880-188-0x0000000000400000-0x0000000000428000-memory.dmp

    Filesize

    160KB

  • memory/1096-272-0x0000000000400000-0x0000000000428000-memory.dmp

    Filesize

    160KB

  • memory/1096-314-0x0000000000400000-0x0000000000428000-memory.dmp

    Filesize

    160KB

  • memory/1344-220-0x0000000000400000-0x0000000000428000-memory.dmp

    Filesize

    160KB

  • memory/1344-76-0x0000000000400000-0x0000000000428000-memory.dmp

    Filesize

    160KB

  • memory/1344-398-0x0000000000400000-0x0000000000428000-memory.dmp

    Filesize

    160KB

  • memory/1456-253-0x0000000000400000-0x0000000000428000-memory.dmp

    Filesize

    160KB

  • memory/1644-206-0x0000000000400000-0x0000000000428000-memory.dmp

    Filesize

    160KB

  • memory/1644-213-0x0000000000400000-0x0000000000428000-memory.dmp

    Filesize

    160KB

  • memory/1688-229-0x0000000000400000-0x0000000000428000-memory.dmp

    Filesize

    160KB

  • memory/1688-81-0x0000000000400000-0x0000000000428000-memory.dmp

    Filesize

    160KB

  • memory/1688-399-0x0000000000400000-0x0000000000428000-memory.dmp

    Filesize

    160KB

  • memory/1748-248-0x0000000000400000-0x0000000000428000-memory.dmp

    Filesize

    160KB

  • memory/1936-378-0x0000000000400000-0x0000000000428000-memory.dmp

    Filesize

    160KB

  • memory/2340-215-0x0000000000400000-0x0000000000428000-memory.dmp

    Filesize

    160KB

  • memory/2340-151-0x0000000000400000-0x0000000000428000-memory.dmp

    Filesize

    160KB

  • memory/2736-211-0x0000000000400000-0x0000000000428000-memory.dmp

    Filesize

    160KB

  • memory/2736-189-0x0000000000400000-0x0000000000428000-memory.dmp

    Filesize

    160KB

  • memory/3772-239-0x0000000000400000-0x0000000000428000-memory.dmp

    Filesize

    160KB

  • memory/3804-264-0x0000000000400000-0x0000000000428000-memory.dmp

    Filesize

    160KB

  • memory/4044-251-0x0000000000400000-0x0000000000428000-memory.dmp

    Filesize

    160KB

  • memory/4044-236-0x0000000000400000-0x0000000000428000-memory.dmp

    Filesize

    160KB

  • memory/4444-331-0x0000000000400000-0x0000000000428000-memory.dmp

    Filesize

    160KB

  • memory/4532-0-0x0000000000400000-0x0000000000428000-memory.dmp

    Filesize

    160KB

  • memory/4532-100-0x0000000000400000-0x0000000000428000-memory.dmp

    Filesize

    160KB

  • memory/4788-141-0x0000000000400000-0x0000000000428000-memory.dmp

    Filesize

    160KB

  • memory/4872-246-0x0000000000400000-0x0000000000428000-memory.dmp

    Filesize

    160KB

  • memory/4872-95-0x0000000000400000-0x0000000000428000-memory.dmp

    Filesize

    160KB

  • memory/4872-401-0x0000000000400000-0x0000000000428000-memory.dmp

    Filesize

    160KB

  • memory/4876-347-0x0000000000400000-0x0000000000428000-memory.dmp

    Filesize

    160KB