Analysis

  • max time kernel
    119s
  • max time network
    120s
  • platform
    windows7_x64
  • resource
    win7-20240729-en
  • resource tags

    arch:x64arch:x86image:win7-20240729-enlocale:en-usos:windows7-x64system
  • submitted
    08/09/2024, 08:35

General

  • Target

    2c7b45971104780db5350d2157f88bd0N.exe

  • Size

    52KB

  • MD5

    2c7b45971104780db5350d2157f88bd0

  • SHA1

    b92165311a566731d24ca43cbd338d0335ebc2b6

  • SHA256

    a85e0fc3a8fe4ae27012364ba97f7d5c22747b0936b646e166e8bcb768345407

  • SHA512

    cb0469f1cd882a27c4d8a5959f8edfbe0c80564a621a91ec54f9d46596b643b20d87b8268975b96efc23c0c8265104928520fb264a2ed502a6ce104d1a878787

  • SSDEEP

    768:d+ciLamXW9XgMxjFkpvMVX8q18q13yO1oj5n/wYkfw:IzaEW5gMxZVXf8a3yO1opwS

Malware Config

Signatures

  • Modifies WinLogon for persistence 2 TTPs 10 IoCs
  • Modifies visibility of file extensions in Explorer 2 TTPs 5 IoCs
  • Modifies visiblity of hidden/system files in Explorer 2 TTPs 5 IoCs
  • Windows security bypass 2 TTPs 25 IoCs
  • Blocks application from running via registry modification 30 IoCs

    Adds application to list of disallowed applications.

  • Disables RegEdit via registry modification 10 IoCs
  • Disables use of System Restore points 1 TTPs
  • Event Triggered Execution: Image File Execution Options Injection 1 TTPs 10 IoCs
  • Executes dropped EXE 20 IoCs
  • Loads dropped DLL 28 IoCs
  • Modifies system executable filetype association 2 TTPs 62 IoCs
  • Windows security modification 2 TTPs 30 IoCs
  • Adds Run key to start application 2 TTPs 15 IoCs
  • Drops desktop.ini file(s) 8 IoCs
  • Enumerates connected drives 3 TTPs 64 IoCs

    Attempts to read the root path of hard drives other than the default C: drive.

  • Drops file in System32 directory 32 IoCs
  • Drops file in Windows directory 20 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Location Discovery: System Language Discovery 1 TTPs 21 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Modifies Control Panel 45 IoCs
  • Modifies Internet Explorer settings 1 TTPs 10 IoCs
  • Modifies data under HKEY_USERS 15 IoCs
  • Modifies registry class 64 IoCs
  • Suspicious behavior: EnumeratesProcesses 1 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 4 IoCs
  • Suspicious use of SetWindowsHookEx 21 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs
  • System policy modification 1 TTPs 35 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\2c7b45971104780db5350d2157f88bd0N.exe
    "C:\Users\Admin\AppData\Local\Temp\2c7b45971104780db5350d2157f88bd0N.exe"
    1⤵
    • Modifies WinLogon for persistence
    • Modifies visibility of file extensions in Explorer
    • Modifies visiblity of hidden/system files in Explorer
    • Windows security bypass
    • Blocks application from running via registry modification
    • Disables RegEdit via registry modification
    • Event Triggered Execution: Image File Execution Options Injection
    • Loads dropped DLL
    • Modifies system executable filetype association
    • Windows security modification
    • Adds Run key to start application
    • Drops file in System32 directory
    • Drops file in Windows directory
    • System Location Discovery: System Language Discovery
    • Modifies Control Panel
    • Modifies Internet Explorer settings
    • Modifies data under HKEY_USERS
    • Modifies registry class
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    • System policy modification
    PID:2640
    • C:\Windows\nEwb0Rn.exe
      C:\Windows\nEwb0Rn.exe
      2⤵
      • Modifies WinLogon for persistence
      • Modifies visibility of file extensions in Explorer
      • Modifies visiblity of hidden/system files in Explorer
      • Windows security bypass
      • Blocks application from running via registry modification
      • Disables RegEdit via registry modification
      • Event Triggered Execution: Image File Execution Options Injection
      • Executes dropped EXE
      • Loads dropped DLL
      • Modifies system executable filetype association
      • Windows security modification
      • Adds Run key to start application
      • Drops desktop.ini file(s)
      • Enumerates connected drives
      • Drops file in System32 directory
      • Drops file in Windows directory
      • System Location Discovery: System Language Discovery
      • Modifies Control Panel
      • Modifies Internet Explorer settings
      • Modifies data under HKEY_USERS
      • Modifies registry class
      • Suspicious behavior: GetForegroundWindowSpam
      • Suspicious use of SetWindowsHookEx
      • Suspicious use of WriteProcessMemory
      • System policy modification
      PID:2832
      • C:\Windows\nEwb0Rn.exe
        C:\Windows\nEwb0Rn.exe
        3⤵
        • Executes dropped EXE
        • System Location Discovery: System Language Discovery
        • Suspicious use of SetWindowsHookEx
        PID:2448
      • C:\Windows\SysWOW64\WishfulThinking.exe
        C:\Windows\system32\WishfulThinking.exe
        3⤵
        • Executes dropped EXE
        • Drops file in System32 directory
        • Drops file in Windows directory
        • System Location Discovery: System Language Discovery
        • Suspicious use of SetWindowsHookEx
        PID:428
      • C:\Users\Admin\Local Settings\Application Data\WINDOWS\WINLOGON.EXE
        "C:\Users\Admin\Local Settings\Application Data\WINDOWS\WINLOGON.EXE"
        3⤵
        • Executes dropped EXE
        • System Location Discovery: System Language Discovery
        • Suspicious use of SetWindowsHookEx
        PID:1724
      • C:\Users\Admin\Local Settings\Application Data\WINDOWS\SERVICES.EXE
        "C:\Users\Admin\Local Settings\Application Data\WINDOWS\SERVICES.EXE"
        3⤵
        • Executes dropped EXE
        • System Location Discovery: System Language Discovery
        • Suspicious use of SetWindowsHookEx
        PID:2224
    • C:\Windows\SysWOW64\WishfulThinking.exe
      C:\Windows\system32\WishfulThinking.exe
      2⤵
      • Modifies WinLogon for persistence
      • Modifies visibility of file extensions in Explorer
      • Modifies visiblity of hidden/system files in Explorer
      • Windows security bypass
      • Blocks application from running via registry modification
      • Disables RegEdit via registry modification
      • Event Triggered Execution: Image File Execution Options Injection
      • Executes dropped EXE
      • Loads dropped DLL
      • Modifies system executable filetype association
      • Windows security modification
      • Adds Run key to start application
      • Drops desktop.ini file(s)
      • Enumerates connected drives
      • Drops file in System32 directory
      • Drops file in Windows directory
      • System Location Discovery: System Language Discovery
      • Modifies Control Panel
      • Modifies Internet Explorer settings
      • Modifies data under HKEY_USERS
      • Modifies registry class
      • Suspicious behavior: GetForegroundWindowSpam
      • Suspicious use of SetWindowsHookEx
      • Suspicious use of WriteProcessMemory
      • System policy modification
      PID:2888
      • C:\Windows\nEwb0Rn.exe
        C:\Windows\nEwb0Rn.exe
        3⤵
        • Executes dropped EXE
        • System Location Discovery: System Language Discovery
        • Suspicious use of SetWindowsHookEx
        PID:2976
      • C:\Windows\SysWOW64\WishfulThinking.exe
        C:\Windows\system32\WishfulThinking.exe
        3⤵
        • Executes dropped EXE
        • Drops file in System32 directory
        • Drops file in Windows directory
        • System Location Discovery: System Language Discovery
        • Suspicious use of SetWindowsHookEx
        PID:348
      • C:\Users\Admin\Local Settings\Application Data\WINDOWS\WINLOGON.EXE
        "C:\Users\Admin\Local Settings\Application Data\WINDOWS\WINLOGON.EXE"
        3⤵
        • Executes dropped EXE
        • System Location Discovery: System Language Discovery
        • Suspicious use of SetWindowsHookEx
        PID:1540
      • C:\Users\Admin\Local Settings\Application Data\WINDOWS\SERVICES.EXE
        "C:\Users\Admin\Local Settings\Application Data\WINDOWS\SERVICES.EXE"
        3⤵
        • Executes dropped EXE
        • System Location Discovery: System Language Discovery
        • Suspicious use of SetWindowsHookEx
        PID:2004
    • C:\Users\Admin\Local Settings\Application Data\WINDOWS\WINLOGON.EXE
      "C:\Users\Admin\Local Settings\Application Data\WINDOWS\WINLOGON.EXE"
      2⤵
      • Modifies WinLogon for persistence
      • Modifies visibility of file extensions in Explorer
      • Modifies visiblity of hidden/system files in Explorer
      • Windows security bypass
      • Blocks application from running via registry modification
      • Disables RegEdit via registry modification
      • Event Triggered Execution: Image File Execution Options Injection
      • Executes dropped EXE
      • Loads dropped DLL
      • Modifies system executable filetype association
      • Windows security modification
      • Adds Run key to start application
      • Enumerates connected drives
      • Drops file in System32 directory
      • Drops file in Windows directory
      • System Location Discovery: System Language Discovery
      • Modifies Control Panel
      • Modifies Internet Explorer settings
      • Modifies data under HKEY_USERS
      • Modifies registry class
      • Suspicious behavior: GetForegroundWindowSpam
      • Suspicious use of SetWindowsHookEx
      • Suspicious use of WriteProcessMemory
      • System policy modification
      PID:1220
      • C:\Windows\nEwb0Rn.exe
        C:\Windows\nEwb0Rn.exe
        3⤵
        • Executes dropped EXE
        • System Location Discovery: System Language Discovery
        • Suspicious use of SetWindowsHookEx
        PID:1608
      • C:\Windows\SysWOW64\WishfulThinking.exe
        C:\Windows\system32\WishfulThinking.exe
        3⤵
        • Executes dropped EXE
        • Drops file in System32 directory
        • Drops file in Windows directory
        • System Location Discovery: System Language Discovery
        • Suspicious use of SetWindowsHookEx
        PID:2028
      • C:\Users\Admin\Local Settings\Application Data\WINDOWS\WINLOGON.EXE
        "C:\Users\Admin\Local Settings\Application Data\WINDOWS\WINLOGON.EXE"
        3⤵
        • Executes dropped EXE
        • System Location Discovery: System Language Discovery
        • Suspicious use of SetWindowsHookEx
        PID:996
      • C:\Users\Admin\Local Settings\Application Data\WINDOWS\SERVICES.EXE
        "C:\Users\Admin\Local Settings\Application Data\WINDOWS\SERVICES.EXE"
        3⤵
        • Executes dropped EXE
        • System Location Discovery: System Language Discovery
        • Suspicious use of SetWindowsHookEx
        PID:2684
    • C:\Users\Admin\Local Settings\Application Data\WINDOWS\SERVICES.EXE
      "C:\Users\Admin\Local Settings\Application Data\WINDOWS\SERVICES.EXE"
      2⤵
      • Modifies WinLogon for persistence
      • Modifies visibility of file extensions in Explorer
      • Modifies visiblity of hidden/system files in Explorer
      • Windows security bypass
      • Blocks application from running via registry modification
      • Disables RegEdit via registry modification
      • Event Triggered Execution: Image File Execution Options Injection
      • Executes dropped EXE
      • Loads dropped DLL
      • Modifies system executable filetype association
      • Windows security modification
      • Adds Run key to start application
      • Enumerates connected drives
      • Drops file in System32 directory
      • Drops file in Windows directory
      • System Location Discovery: System Language Discovery
      • Modifies Control Panel
      • Modifies Internet Explorer settings
      • Modifies data under HKEY_USERS
      • Modifies registry class
      • Suspicious behavior: GetForegroundWindowSpam
      • Suspicious use of SetWindowsHookEx
      • System policy modification
      PID:2308
      • C:\Windows\nEwb0Rn.exe
        C:\Windows\nEwb0Rn.exe
        3⤵
        • Executes dropped EXE
        • System Location Discovery: System Language Discovery
        • Suspicious use of SetWindowsHookEx
        PID:1304
      • C:\Windows\SysWOW64\WishfulThinking.exe
        C:\Windows\system32\WishfulThinking.exe
        3⤵
        • Executes dropped EXE
        • Drops file in System32 directory
        • Drops file in Windows directory
        • System Location Discovery: System Language Discovery
        • Suspicious use of SetWindowsHookEx
        PID:1720
      • C:\Users\Admin\Local Settings\Application Data\WINDOWS\WINLOGON.EXE
        "C:\Users\Admin\Local Settings\Application Data\WINDOWS\WINLOGON.EXE"
        3⤵
        • Executes dropped EXE
        • System Location Discovery: System Language Discovery
        • Suspicious use of SetWindowsHookEx
        PID:1908
      • C:\Users\Admin\Local Settings\Application Data\WINDOWS\SERVICES.EXE
        "C:\Users\Admin\Local Settings\Application Data\WINDOWS\SERVICES.EXE"
        3⤵
        • Executes dropped EXE
        • System Location Discovery: System Language Discovery
        • Suspicious use of SetWindowsHookEx
        PID:264

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\All Users\Start Menu\Programs\Startup\Empty.pif

    Filesize

    52KB

    MD5

    f827f3d4429550b75bbd364da98ab2a8

    SHA1

    38db8f6fb67e134b76c2f674a0e8377399e69692

    SHA256

    d5cc3df622beb345b269f2a12f8921c887df0d8beeb96c56e9d7ce29372cd661

    SHA512

    559690edd904b2dba106e7c57a2b5eb2ec4a0cc5e674bc4dc9548d768f23dd6bef99da9057d4d16062441fdc756717c88621b32036d927f610563b27ab36f4ed

  • C:\Windows\MSVBVM60.DLL

    Filesize

    1.3MB

    MD5

    5343a19c618bc515ceb1695586c6c137

    SHA1

    4dedae8cbde066f31c8e6b52c0baa3f8b1117742

    SHA256

    2246b4feae199408ea66d4a90c1589026f4a5800ce5a28e583b94506a8a73dce

    SHA512

    708d8a252a167fa94e3e1a49e2630d07613ff75a9a3e779a0c1fcbec44aa853a68c401f31a2b84152f46a05f7d93f4e5e502afc7a60236a22ac58dea73fa5606

  • C:\Windows\SysWOW64\DamageControl.scr

    Filesize

    52KB

    MD5

    d8d36c338a45ef2a706a3fb6e0f69808

    SHA1

    1d4aa33be65d099d4469285bdb8fe3d124b23e89

    SHA256

    1e20bf52c63278e34cf64401752a11fce9401d83cdd7a9801501f740a1aa74f5

    SHA512

    35c0cfb8edfdf253dad771da36629d6140efb98a5f1b2ef1264963f59c09a1044064f665dc4531b9cd85d90e39c23d1b6633af350f6956d9de0fc7f602c500a4

  • C:\Windows\SysWOW64\DamageControl.scr

    Filesize

    52KB

    MD5

    2c7b45971104780db5350d2157f88bd0

    SHA1

    b92165311a566731d24ca43cbd338d0335ebc2b6

    SHA256

    a85e0fc3a8fe4ae27012364ba97f7d5c22747b0936b646e166e8bcb768345407

    SHA512

    cb0469f1cd882a27c4d8a5959f8edfbe0c80564a621a91ec54f9d46596b643b20d87b8268975b96efc23c0c8265104928520fb264a2ed502a6ce104d1a878787

  • C:\Windows\SysWOW64\JawsOfLife.exe

    Filesize

    52KB

    MD5

    88730cf9f321d58330841933024d45ab

    SHA1

    4144ee07ff286bd2a535b6e19605242f2d761573

    SHA256

    c0a83594324046bf56657640c3a0e6da9250968065c10d798da18b8728c994de

    SHA512

    a650fec809a8b589e802c4019fe5d2cc8cf6cb5f45e7755fcfad06207b3e488c6465eb79b778a0e814f032e6d8f0f08523995750fa05348566b042317b4f46dd

  • C:\Windows\SysWOW64\JawsOfLife.exe

    Filesize

    52KB

    MD5

    04bd3bcaa11925e0d541dfbac818cf36

    SHA1

    141dfeae3619b0049eb1880fe4c61dc0d2919268

    SHA256

    3fe214e0f6f4b5b25642e31245275d80b30dd52ae8e51c5ac1104a6781482b1f

    SHA512

    e32869c7743029b09ac3fb1b3346047bad450dcaf8fd2c9a580492c750408d029bca8e22d37933c61cf9350520f410a5545ca2a2ecaf8f80a2dc2a36056a05b5

  • C:\Windows\SysWOW64\WishfulThinking.exe

    Filesize

    52KB

    MD5

    c9c7598571f89f25f0f591a621640f69

    SHA1

    781ef1cd17deed87a65104b6c67704655a7c00cc

    SHA256

    02dd17e6de58d3c5a3e4c10d56d989f599a8f5066a541af0928955183b8deb7c

    SHA512

    27371228fecc8dec20341b0376f3b881939419327f191f4b5242c7978a11f618b8b7ec1da2f949da1d38cb7a1ecc3eb1ed121955407f5d5da555d0822f810b17

  • C:\Windows\nEwb0Rn.exe

    Filesize

    52KB

    MD5

    cfdf09eb7cafa1a439b6cb6428643aa2

    SHA1

    0014f52fd1aaa76bf013c60dc48affe46cf255fc

    SHA256

    4cbe1417a4146230ce5f1bee1dec59622bc2d8d2c3ec8fc518c73107d12d5ff9

    SHA512

    6fec4319f134158d6126f6097d86a9360764ae6f46bf7193b78ad873b73ab19399096bc943394c27f4dfc606b1da45003612a41dff54eb173f18f94eff95a5f2

  • C:\about.htm

    Filesize

    2KB

    MD5

    94c0c5518c4f4bb044842a006d04932a

    SHA1

    23d9a914f6681d65e2b1faa171f4cf492562ebdb

    SHA256

    224c4e5cdc0e7495c5fb5d1f52d76807092b5cc2d0a7c95fa612ff7b1412706e

    SHA512

    79cb2cd9e19ac3cc8bd94f1a20369e61224f8db02bc04d1f5768d62163b68467a3d317808a942bc7cca6ca84c221bb54a76e097f543c88bb89f0a3c9534ff3bb

  • C:\nEwb0Rn.exe

    Filesize

    52KB

    MD5

    b68cbedb8ae7d295da3f28c85b5d0187

    SHA1

    10424c9995da02fdd14c64d2fe69d42bfa2d0232

    SHA256

    901b9284b974dceeafc206325ced714955bb6b310f5e9cf7c571b74a442c0118

    SHA512

    efb41eb4be6f48e1633f383a0a26dacfab3d1f50f77f4e9205e48747a4e28546f433ee95f8fc7660d29ee3ea03dd329f0fb7b7aa8af75fc35451068f58d0b3ea

  • \Users\Admin\AppData\Local\WINDOWS\SERVICES.EXE

    Filesize

    52KB

    MD5

    354d604e272d430a05a35e907ffacf34

    SHA1

    faaeb112733a9bdd2a0c5d16deedebd9d99c584d

    SHA256

    0b00f274c4ac4c1871fd7b529ce53a8db3b1fe03bd4c17f622b6e689539f7446

    SHA512

    3cf7e2efb7dce0cd47ec82d0adc91c366ec432c88b61d5ff1557d27357dfab928a426f1c5ac1e5759c51dd47b2c2c68a8667d3c770d292afba58da69f20fa209

  • \Users\Admin\AppData\Local\WINDOWS\WINLOGON.EXE

    Filesize

    52KB

    MD5

    a5bbac674a01b842ece81d2b01cc27ae

    SHA1

    1abead07c99b9dadff33e7656300668c91c559db

    SHA256

    268ce09f04ab2391a7f06b2a6028e0e5103e2915b5548f88813d570fef22caf1

    SHA512

    0ba14c9c788bf3d495c84f0bacd281777121d2ebbf81be43bc153cf2607f0da1fe368e2aec4c098c008b4c646f1a62aaa7bf3d34a995bec649424bf21e814232

  • memory/264-453-0x0000000000400000-0x0000000000428000-memory.dmp

    Filesize

    160KB

  • memory/264-451-0x0000000000400000-0x0000000000428000-memory.dmp

    Filesize

    160KB

  • memory/348-241-0x0000000000400000-0x0000000000428000-memory.dmp

    Filesize

    160KB

  • memory/428-248-0x0000000000400000-0x0000000000428000-memory.dmp

    Filesize

    160KB

  • memory/996-341-0x0000000000400000-0x0000000000428000-memory.dmp

    Filesize

    160KB

  • memory/996-294-0x0000000000400000-0x0000000000428000-memory.dmp

    Filesize

    160KB

  • memory/1220-428-0x0000000002400000-0x0000000002428000-memory.dmp

    Filesize

    160KB

  • memory/1220-239-0x0000000000400000-0x0000000000428000-memory.dmp

    Filesize

    160KB

  • memory/1220-104-0x0000000000400000-0x0000000000428000-memory.dmp

    Filesize

    160KB

  • memory/1220-456-0x0000000000400000-0x0000000000428000-memory.dmp

    Filesize

    160KB

  • memory/1304-433-0x0000000000400000-0x0000000000428000-memory.dmp

    Filesize

    160KB

  • memory/1304-438-0x0000000072940000-0x0000000072A93000-memory.dmp

    Filesize

    1.3MB

  • memory/1304-439-0x0000000000400000-0x0000000000428000-memory.dmp

    Filesize

    160KB

  • memory/1540-250-0x0000000000400000-0x0000000000428000-memory.dmp

    Filesize

    160KB

  • memory/1608-268-0x0000000000400000-0x0000000000428000-memory.dmp

    Filesize

    160KB

  • memory/1608-267-0x0000000072940000-0x0000000072A93000-memory.dmp

    Filesize

    1.3MB

  • memory/1720-443-0x0000000000400000-0x0000000000428000-memory.dmp

    Filesize

    160KB

  • memory/1724-261-0x0000000000400000-0x0000000000428000-memory.dmp

    Filesize

    160KB

  • memory/1724-264-0x0000000000400000-0x0000000000428000-memory.dmp

    Filesize

    160KB

  • memory/1908-448-0x0000000000400000-0x0000000000428000-memory.dmp

    Filesize

    160KB

  • memory/1908-444-0x0000000000400000-0x0000000000428000-memory.dmp

    Filesize

    160KB

  • memory/2004-279-0x00000000001B0000-0x00000000001C0000-memory.dmp

    Filesize

    64KB

  • memory/2004-280-0x00000000001B0000-0x00000000001C0000-memory.dmp

    Filesize

    64KB

  • memory/2004-286-0x0000000000400000-0x0000000000428000-memory.dmp

    Filesize

    160KB

  • memory/2004-289-0x0000000000400000-0x0000000000428000-memory.dmp

    Filesize

    160KB

  • memory/2028-276-0x0000000000400000-0x0000000000428000-memory.dmp

    Filesize

    160KB

  • memory/2224-282-0x00000000001B0000-0x00000000001C0000-memory.dmp

    Filesize

    64KB

  • memory/2224-283-0x00000000001B0000-0x00000000001C0000-memory.dmp

    Filesize

    64KB

  • memory/2224-287-0x0000000000400000-0x0000000000428000-memory.dmp

    Filesize

    160KB

  • memory/2224-291-0x0000000000400000-0x0000000000428000-memory.dmp

    Filesize

    160KB

  • memory/2308-117-0x0000000000400000-0x0000000000428000-memory.dmp

    Filesize

    160KB

  • memory/2308-262-0x0000000000400000-0x0000000000428000-memory.dmp

    Filesize

    160KB

  • memory/2308-432-0x00000000023F0000-0x0000000002418000-memory.dmp

    Filesize

    160KB

  • memory/2308-457-0x0000000000400000-0x0000000000428000-memory.dmp

    Filesize

    160KB

  • memory/2308-436-0x00000000023F0000-0x0000000002418000-memory.dmp

    Filesize

    160KB

  • memory/2448-211-0x0000000072940000-0x0000000072A93000-memory.dmp

    Filesize

    1.3MB

  • memory/2640-120-0x0000000000400000-0x0000000000428000-memory.dmp

    Filesize

    160KB

  • memory/2640-74-0x00000000004B0000-0x00000000004D8000-memory.dmp

    Filesize

    160KB

  • memory/2640-78-0x00000000004B0000-0x00000000004D8000-memory.dmp

    Filesize

    160KB

  • memory/2640-103-0x00000000004B0000-0x00000000004D8000-memory.dmp

    Filesize

    160KB

  • memory/2640-90-0x00000000004B0000-0x00000000004D8000-memory.dmp

    Filesize

    160KB

  • memory/2640-118-0x0000000000400000-0x0000000000428000-memory.dmp

    Filesize

    160KB

  • memory/2640-109-0x00000000004B0000-0x00000000004D8000-memory.dmp

    Filesize

    160KB

  • memory/2640-0-0x0000000000400000-0x0000000000428000-memory.dmp

    Filesize

    160KB

  • memory/2832-285-0x0000000002680000-0x00000000026A8000-memory.dmp

    Filesize

    160KB

  • memory/2832-284-0x0000000002680000-0x00000000026A8000-memory.dmp

    Filesize

    160KB

  • memory/2832-207-0x0000000002680000-0x00000000026A8000-memory.dmp

    Filesize

    160KB

  • memory/2832-185-0x0000000000400000-0x0000000000428000-memory.dmp

    Filesize

    160KB

  • memory/2832-205-0x0000000002680000-0x00000000026A8000-memory.dmp

    Filesize

    160KB

  • memory/2832-454-0x0000000000400000-0x0000000000428000-memory.dmp

    Filesize

    160KB

  • memory/2832-80-0x0000000000400000-0x0000000000428000-memory.dmp

    Filesize

    160KB

  • memory/2832-430-0x0000000002680000-0x00000000026A8000-memory.dmp

    Filesize

    160KB

  • memory/2832-429-0x0000000002680000-0x00000000026A8000-memory.dmp

    Filesize

    160KB

  • memory/2888-260-0x0000000000570000-0x0000000000598000-memory.dmp

    Filesize

    160KB

  • memory/2888-208-0x0000000000570000-0x0000000000598000-memory.dmp

    Filesize

    160KB

  • memory/2888-184-0x0000000000570000-0x0000000000598000-memory.dmp

    Filesize

    160KB

  • memory/2888-91-0x0000000000400000-0x0000000000428000-memory.dmp

    Filesize

    160KB

  • memory/2888-209-0x0000000000570000-0x0000000000598000-memory.dmp

    Filesize

    160KB

  • memory/2888-204-0x0000000000400000-0x0000000000428000-memory.dmp

    Filesize

    160KB

  • memory/2888-455-0x0000000000400000-0x0000000000428000-memory.dmp

    Filesize

    160KB

  • memory/2888-431-0x0000000000570000-0x0000000000598000-memory.dmp

    Filesize

    160KB

  • memory/2976-203-0x0000000072940000-0x0000000072A93000-memory.dmp

    Filesize

    1.3MB

  • memory/2976-206-0x0000000000400000-0x0000000000428000-memory.dmp

    Filesize

    160KB