Analysis

  • max time kernel
    119s
  • max time network
    98s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240802-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system
  • submitted
    08-09-2024 08:35

General

  • Target

    2c7b45971104780db5350d2157f88bd0N.exe

  • Size

    52KB

  • MD5

    2c7b45971104780db5350d2157f88bd0

  • SHA1

    b92165311a566731d24ca43cbd338d0335ebc2b6

  • SHA256

    a85e0fc3a8fe4ae27012364ba97f7d5c22747b0936b646e166e8bcb768345407

  • SHA512

    cb0469f1cd882a27c4d8a5959f8edfbe0c80564a621a91ec54f9d46596b643b20d87b8268975b96efc23c0c8265104928520fb264a2ed502a6ce104d1a878787

  • SSDEEP

    768:d+ciLamXW9XgMxjFkpvMVX8q18q13yO1oj5n/wYkfw:IzaEW5gMxZVXf8a3yO1opwS

Malware Config

Signatures

  • Modifies WinLogon for persistence 2 TTPs 10 IoCs
  • Modifies visibility of file extensions in Explorer 2 TTPs 5 IoCs
  • Modifies visiblity of hidden/system files in Explorer 2 TTPs 5 IoCs
  • Windows security bypass 2 TTPs 25 IoCs
  • Blocks application from running via registry modification 30 IoCs

    Adds application to list of disallowed applications.

  • Disables RegEdit via registry modification 10 IoCs
  • Disables use of System Restore points 1 TTPs
  • Event Triggered Execution: Image File Execution Options Injection 1 TTPs 10 IoCs
  • Executes dropped EXE 20 IoCs
  • Loads dropped DLL 4 IoCs
  • Modifies system executable filetype association 2 TTPs 62 IoCs
  • Windows security modification 2 TTPs 30 IoCs
  • Adds Run key to start application 2 TTPs 15 IoCs
  • Drops desktop.ini file(s) 16 IoCs
  • Enumerates connected drives 3 TTPs 64 IoCs

    Attempts to read the root path of hard drives other than the default C: drive.

  • Drops file in System32 directory 32 IoCs
  • Drops file in Windows directory 20 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 21 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Modifies Control Panel 45 IoCs
  • Modifies Internet Explorer settings 1 TTPs 10 IoCs
  • Modifies data under HKEY_USERS 15 IoCs
  • Modifies registry class 64 IoCs
  • Suspicious behavior: EnumeratesProcesses 2 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 4 IoCs
  • Suspicious use of SetWindowsHookEx 21 IoCs
  • Suspicious use of WriteProcessMemory 60 IoCs
  • System policy modification 1 TTPs 35 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\2c7b45971104780db5350d2157f88bd0N.exe
    "C:\Users\Admin\AppData\Local\Temp\2c7b45971104780db5350d2157f88bd0N.exe"
    1⤵
    • Modifies WinLogon for persistence
    • Modifies visibility of file extensions in Explorer
    • Modifies visiblity of hidden/system files in Explorer
    • Windows security bypass
    • Blocks application from running via registry modification
    • Disables RegEdit via registry modification
    • Event Triggered Execution: Image File Execution Options Injection
    • Modifies system executable filetype association
    • Windows security modification
    • Adds Run key to start application
    • Drops file in System32 directory
    • Drops file in Windows directory
    • System Location Discovery: System Language Discovery
    • Modifies Control Panel
    • Modifies Internet Explorer settings
    • Modifies data under HKEY_USERS
    • Modifies registry class
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    • System policy modification
    PID:3016
    • C:\Windows\nEwb0Rn.exe
      C:\Windows\nEwb0Rn.exe
      2⤵
      • Modifies WinLogon for persistence
      • Modifies visibility of file extensions in Explorer
      • Modifies visiblity of hidden/system files in Explorer
      • Windows security bypass
      • Blocks application from running via registry modification
      • Disables RegEdit via registry modification
      • Event Triggered Execution: Image File Execution Options Injection
      • Executes dropped EXE
      • Modifies system executable filetype association
      • Windows security modification
      • Adds Run key to start application
      • Drops desktop.ini file(s)
      • Enumerates connected drives
      • Drops file in System32 directory
      • Drops file in Windows directory
      • System Location Discovery: System Language Discovery
      • Modifies Control Panel
      • Modifies Internet Explorer settings
      • Modifies data under HKEY_USERS
      • Modifies registry class
      • Suspicious behavior: GetForegroundWindowSpam
      • Suspicious use of SetWindowsHookEx
      • Suspicious use of WriteProcessMemory
      • System policy modification
      PID:1288
      • C:\Windows\nEwb0Rn.exe
        C:\Windows\nEwb0Rn.exe
        3⤵
        • Executes dropped EXE
        • Loads dropped DLL
        • System Location Discovery: System Language Discovery
        • Suspicious use of SetWindowsHookEx
        PID:1320
      • C:\Windows\SysWOW64\WishfulThinking.exe
        C:\Windows\system32\WishfulThinking.exe
        3⤵
        • Executes dropped EXE
        • Drops file in System32 directory
        • Drops file in Windows directory
        • System Location Discovery: System Language Discovery
        • Suspicious use of SetWindowsHookEx
        PID:2368
      • C:\Users\Admin\Local Settings\Application Data\WINDOWS\WINLOGON.EXE
        "C:\Users\Admin\Local Settings\Application Data\WINDOWS\WINLOGON.EXE"
        3⤵
        • Executes dropped EXE
        • System Location Discovery: System Language Discovery
        • Suspicious use of SetWindowsHookEx
        PID:3388
      • C:\Users\Admin\Local Settings\Application Data\WINDOWS\SERVICES.EXE
        "C:\Users\Admin\Local Settings\Application Data\WINDOWS\SERVICES.EXE"
        3⤵
        • Executes dropped EXE
        • System Location Discovery: System Language Discovery
        • Suspicious use of SetWindowsHookEx
        PID:4452
    • C:\Windows\SysWOW64\WishfulThinking.exe
      C:\Windows\system32\WishfulThinking.exe
      2⤵
      • Modifies WinLogon for persistence
      • Modifies visibility of file extensions in Explorer
      • Modifies visiblity of hidden/system files in Explorer
      • Windows security bypass
      • Blocks application from running via registry modification
      • Disables RegEdit via registry modification
      • Event Triggered Execution: Image File Execution Options Injection
      • Executes dropped EXE
      • Modifies system executable filetype association
      • Windows security modification
      • Adds Run key to start application
      • Drops desktop.ini file(s)
      • Enumerates connected drives
      • Drops file in System32 directory
      • Drops file in Windows directory
      • System Location Discovery: System Language Discovery
      • Modifies Control Panel
      • Modifies Internet Explorer settings
      • Modifies data under HKEY_USERS
      • Modifies registry class
      • Suspicious behavior: GetForegroundWindowSpam
      • Suspicious use of SetWindowsHookEx
      • Suspicious use of WriteProcessMemory
      • System policy modification
      PID:532
      • C:\Windows\nEwb0Rn.exe
        C:\Windows\nEwb0Rn.exe
        3⤵
        • Executes dropped EXE
        • Loads dropped DLL
        • System Location Discovery: System Language Discovery
        • Suspicious use of SetWindowsHookEx
        PID:3008
      • C:\Windows\SysWOW64\WishfulThinking.exe
        C:\Windows\system32\WishfulThinking.exe
        3⤵
        • Executes dropped EXE
        • Drops file in System32 directory
        • Drops file in Windows directory
        • System Location Discovery: System Language Discovery
        • Suspicious use of SetWindowsHookEx
        PID:3344
      • C:\Users\Admin\Local Settings\Application Data\WINDOWS\WINLOGON.EXE
        "C:\Users\Admin\Local Settings\Application Data\WINDOWS\WINLOGON.EXE"
        3⤵
        • Executes dropped EXE
        • System Location Discovery: System Language Discovery
        • Suspicious use of SetWindowsHookEx
        PID:1672
      • C:\Users\Admin\Local Settings\Application Data\WINDOWS\SERVICES.EXE
        "C:\Users\Admin\Local Settings\Application Data\WINDOWS\SERVICES.EXE"
        3⤵
        • Executes dropped EXE
        • System Location Discovery: System Language Discovery
        • Suspicious use of SetWindowsHookEx
        PID:2976
    • C:\Users\Admin\Local Settings\Application Data\WINDOWS\WINLOGON.EXE
      "C:\Users\Admin\Local Settings\Application Data\WINDOWS\WINLOGON.EXE"
      2⤵
      • Modifies WinLogon for persistence
      • Modifies visibility of file extensions in Explorer
      • Modifies visiblity of hidden/system files in Explorer
      • Windows security bypass
      • Blocks application from running via registry modification
      • Disables RegEdit via registry modification
      • Event Triggered Execution: Image File Execution Options Injection
      • Executes dropped EXE
      • Modifies system executable filetype association
      • Windows security modification
      • Adds Run key to start application
      • Drops desktop.ini file(s)
      • Enumerates connected drives
      • Drops file in System32 directory
      • Drops file in Windows directory
      • System Location Discovery: System Language Discovery
      • Modifies Control Panel
      • Modifies Internet Explorer settings
      • Modifies data under HKEY_USERS
      • Modifies registry class
      • Suspicious behavior: GetForegroundWindowSpam
      • Suspicious use of SetWindowsHookEx
      • Suspicious use of WriteProcessMemory
      • System policy modification
      PID:2436
      • C:\Windows\nEwb0Rn.exe
        C:\Windows\nEwb0Rn.exe
        3⤵
        • Executes dropped EXE
        • Loads dropped DLL
        • System Location Discovery: System Language Discovery
        • Suspicious use of SetWindowsHookEx
        PID:1692
      • C:\Windows\SysWOW64\WishfulThinking.exe
        C:\Windows\system32\WishfulThinking.exe
        3⤵
        • Executes dropped EXE
        • Drops file in System32 directory
        • Drops file in Windows directory
        • System Location Discovery: System Language Discovery
        • Suspicious use of SetWindowsHookEx
        PID:4612
      • C:\Users\Admin\Local Settings\Application Data\WINDOWS\WINLOGON.EXE
        "C:\Users\Admin\Local Settings\Application Data\WINDOWS\WINLOGON.EXE"
        3⤵
        • Executes dropped EXE
        • System Location Discovery: System Language Discovery
        • Suspicious use of SetWindowsHookEx
        PID:2588
      • C:\Users\Admin\Local Settings\Application Data\WINDOWS\SERVICES.EXE
        "C:\Users\Admin\Local Settings\Application Data\WINDOWS\SERVICES.EXE"
        3⤵
        • Executes dropped EXE
        • System Location Discovery: System Language Discovery
        • Suspicious use of SetWindowsHookEx
        PID:2704
    • C:\Users\Admin\Local Settings\Application Data\WINDOWS\SERVICES.EXE
      "C:\Users\Admin\Local Settings\Application Data\WINDOWS\SERVICES.EXE"
      2⤵
      • Modifies WinLogon for persistence
      • Modifies visibility of file extensions in Explorer
      • Modifies visiblity of hidden/system files in Explorer
      • Windows security bypass
      • Blocks application from running via registry modification
      • Disables RegEdit via registry modification
      • Event Triggered Execution: Image File Execution Options Injection
      • Executes dropped EXE
      • Modifies system executable filetype association
      • Windows security modification
      • Adds Run key to start application
      • Drops desktop.ini file(s)
      • Enumerates connected drives
      • Drops file in System32 directory
      • Drops file in Windows directory
      • System Location Discovery: System Language Discovery
      • Modifies Control Panel
      • Modifies Internet Explorer settings
      • Modifies data under HKEY_USERS
      • Modifies registry class
      • Suspicious behavior: GetForegroundWindowSpam
      • Suspicious use of SetWindowsHookEx
      • Suspicious use of WriteProcessMemory
      • System policy modification
      PID:5012
      • C:\Windows\nEwb0Rn.exe
        C:\Windows\nEwb0Rn.exe
        3⤵
        • Executes dropped EXE
        • Loads dropped DLL
        • System Location Discovery: System Language Discovery
        • Suspicious use of SetWindowsHookEx
        PID:4996
      • C:\Windows\SysWOW64\WishfulThinking.exe
        C:\Windows\system32\WishfulThinking.exe
        3⤵
        • Executes dropped EXE
        • Drops file in System32 directory
        • Drops file in Windows directory
        • System Location Discovery: System Language Discovery
        • Suspicious use of SetWindowsHookEx
        PID:112
      • C:\Users\Admin\Local Settings\Application Data\WINDOWS\WINLOGON.EXE
        "C:\Users\Admin\Local Settings\Application Data\WINDOWS\WINLOGON.EXE"
        3⤵
        • Executes dropped EXE
        • System Location Discovery: System Language Discovery
        • Suspicious use of SetWindowsHookEx
        PID:1376
      • C:\Users\Admin\Local Settings\Application Data\WINDOWS\SERVICES.EXE
        "C:\Users\Admin\Local Settings\Application Data\WINDOWS\SERVICES.EXE"
        3⤵
        • Executes dropped EXE
        • System Location Discovery: System Language Discovery
        • Suspicious use of SetWindowsHookEx
        PID:740

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\WINDOWS\SERVICES.EXE

    Filesize

    52KB

    MD5

    530a1c2f36f4f219949d2177fb9a16d8

    SHA1

    511d5351d768912b12d3244892e4d31df3ca2f4d

    SHA256

    7ef065b14acca6acb6e4273902c765142c2799319022848f908d86034f0f4365

    SHA512

    2e47c15d75114aeef0f9253a59d533cc9f7ba5902e8c8ee729e1ad748a42c10574ee89044fc1ccc90efd00327e06b55742a70e60fb267e8868935274621c541c

  • C:\Users\Admin\AppData\Local\WINDOWS\WINLOGON.EXE

    Filesize

    52KB

    MD5

    58d02d4fb85e7f390433c01c5c11bc48

    SHA1

    f12861fba571a5c0c400c4dd399c313ea205d9b6

    SHA256

    982489e6c283734aaa383c8596c4bd15fa9302fed025906bfde9be7ae5c0aaed

    SHA512

    9f4c7289d5509b50f2ebf5ad47a96184389be643da9cda10b7977c4c947689655e52df261b0e69c4b663012a3cdeac51380e482713919735d1c4d7e813679ee2

  • C:\Users\All Users\Start Menu\Programs\Startup\Empty.pif

    Filesize

    52KB

    MD5

    af4406b6f66663ffb4bc46d3c84a4f33

    SHA1

    9b94b638e91bf8997499e44c07747b63ae7a4e61

    SHA256

    43e36b98019c851ffa92b3a850517927317e2579806da164891105d2a73b8246

    SHA512

    799107f54bc6df2fb29d5962fed66a4fec3086342f48aaa76e8322fe16dda4b6af6e7a5db0a66e3de5da04ef40e606fa3220cd3654d8690a0aff2e858e0f678c

  • C:\Users\All Users\Start Menu\Programs\Startup\Empty.pif

    Filesize

    52KB

    MD5

    c1bc6a2ca876ec51de91f0ec31b14056

    SHA1

    22e7013894c65627a88db2f110f167d6d3c4f2b8

    SHA256

    7ddb92eeb0cb742a5d71f1c1e10516135d24438411c2a670ea47b912045f3bc2

    SHA512

    79fc5f5b61ab4953d1675ae0cead75f7c37893946fcc371cc1b94c1abf5cb922cee5f08b7df765047dd1b5420e8ac6c3e0159258d1eaa7caf496f63bec8a6b26

  • C:\Users\All Users\Start Menu\Programs\Startup\Empty.pif

    Filesize

    52KB

    MD5

    198d09c58c648eacaf38ea5c2a2435d1

    SHA1

    0d9d71dc9e63482246c1ddbdd181b0c6af4be927

    SHA256

    4ef5a0bc71388d22b5dda394a98ece165c093e2c5ee411547c773b173b23114f

    SHA512

    fef433c52fcc5d81ffa60091ef227111e435fa187c47db8c629795905ca133e5abed1887d5507b851375d67f49d057f0432a0a8a0bff51cb69c4486491b0adee

  • C:\Windows\MSVBVM60.DLL

    Filesize

    1.4MB

    MD5

    25f62c02619174b35851b0e0455b3d94

    SHA1

    4e8ee85157f1769f6e3f61c0acbe59072209da71

    SHA256

    898288bd3b21d0e7d5f406df2e0b69a5bbfa4f241baf29a2cdf8a3cf4d4619f2

    SHA512

    f4529fd9eca4e4696f7f06874866ff98a1447a9b0d3a20ef0de54d4d694e2497fd39c452f73fab9b8a02962a7b2b88d1e85f6e35c7cbcb9555003c6828bebc3a

  • C:\Windows\SysWOW64\DamageControl.scr

    Filesize

    52KB

    MD5

    d8063d75add37f981eb0db23722266db

    SHA1

    349823e4a2cf826947082d5bd6e70b3785fd87d0

    SHA256

    c5bbb901524826d85898e17a6ab3af752b44d89e4413f919fd37ece2c9c615c3

    SHA512

    90fba652f039545ac015242622d470d88d90415698d919ac91299458f6113fe3f8bb390da0e49a968d184e552ea03794c9998400e7d9a4f44638c94a4eaba0fe

  • C:\Windows\SysWOW64\DamageControl.scr

    Filesize

    52KB

    MD5

    f26791b5d2f195c71314070a3d9285cb

    SHA1

    4001e389a7e2b393c9ecbd78f3a2dab4e44ee1e1

    SHA256

    65d32a8cb3eea36ccd8e041aedb732aa34c6069fed825c0455eb8bf99c7397ea

    SHA512

    07daade24fd2c13e4718c560921899afcd2dc6b9151ba4ca53a4aa879f78530eefeb885de5dd0b06fcdc46e04239d5ff6a7332acd001dd0289bf5a95b6d83e9c

  • C:\Windows\SysWOW64\DamageControl.scr

    Filesize

    52KB

    MD5

    86f90ab07ac5c8ad388407eaf2800485

    SHA1

    4bf9d84b074f7c93c49f7e01e96f41b43382e68c

    SHA256

    1377702c656a8491eeb42855a01fdc001505a23f7269713cb07bc9a6f54370ef

    SHA512

    bdf9cf18d2faaed155c76692731b8eee9686bc57a60c975bee06da69b2bfc535a3578f893aeb43749f8f6225b414b61777839681452d80d8f346505afd02bd53

  • C:\Windows\SysWOW64\JawsOfLife.exe

    Filesize

    52KB

    MD5

    c31528f79cc8407b964e11fe36eb94c8

    SHA1

    537585220359cdab3dc5533e81774b7385414fdd

    SHA256

    8caa78228146020bc753737572313f525c5c6c0b5ee87f0b4766fb980b3276fc

    SHA512

    1032a0bc085006780fadfe7857b80b2e60d658158001d9edeef6f47181f7d6ec33d4dfa6503a334029d1f19e79dbe06b377c89f264a9a5ec5212f96cae508470

  • C:\Windows\SysWOW64\JawsOfLife.exe

    Filesize

    52KB

    MD5

    b9a50427812492d67cf174813302e9ab

    SHA1

    5c193673c358c41b45234744470c0ca84c5c362a

    SHA256

    ca6a6d4d131ea59bc3ddf0008d6fbc892e9ea036a3a3135be626f9e28924eb95

    SHA512

    8e5d86ab0655911c7125da34c2c2e7e797ac03eb079d2d2f82ae6fde3d94a0c92e43f9b50f8c40968505358222fd6eecc4b32c952e9051a7c7ba0f56f282ac41

  • C:\Windows\SysWOW64\JawsOfLife.exe

    Filesize

    52KB

    MD5

    5b283669f7caf21959e3442ccb145646

    SHA1

    edbcf4c9a85503b3a45f829ac82b3368e4871499

    SHA256

    f52b17263166f93bdc236a77ff6caf1ccdc19a6e086ea5877f6a493a33c3c8df

    SHA512

    3f2700599b4eb1df12fa6c39d9bb131772444629368f228d97c307375d54fd944b7db8ba340904fb090010f0159c84ed9a90e2a5a7c289932f8c94d46a47b234

  • C:\Windows\SysWOW64\WishfulThinking.exe

    Filesize

    52KB

    MD5

    2c7b45971104780db5350d2157f88bd0

    SHA1

    b92165311a566731d24ca43cbd338d0335ebc2b6

    SHA256

    a85e0fc3a8fe4ae27012364ba97f7d5c22747b0936b646e166e8bcb768345407

    SHA512

    cb0469f1cd882a27c4d8a5959f8edfbe0c80564a621a91ec54f9d46596b643b20d87b8268975b96efc23c0c8265104928520fb264a2ed502a6ce104d1a878787

  • C:\Windows\SysWOW64\WishfulThinking.exe

    Filesize

    52KB

    MD5

    81a4b21b091ca55360b830284e3846aa

    SHA1

    9c7959e8d2f4f0a8ef0d45cb0f49caaa0f9d6b61

    SHA256

    db2c5be9e8754c0fd7bb418864dd4b1fca2eab2cf04e6732c16f3f113e3d632e

    SHA512

    5d6672251fa9946f8bf207d811c8fe597e48d39e8ff5eec28fd37a45906562919d9d60f2ad6af9d9ef29cf6f598b12d5702f9ed46f514314e2a825754d129de3

  • C:\Windows\nEwb0Rn.exe

    Filesize

    52KB

    MD5

    49e9143cfe1c46f7f38e624f00b42ae6

    SHA1

    7bfc2d6ed42d20c674956447d222eda76e97f771

    SHA256

    29ab411f107b78c688812055edd2766c517f77bb70517b8e1d989e2e17e6d6cc

    SHA512

    dbb49451e08c4128299f752c6079f0a4eba7bf0cef3ae0ff331ea220b6ea785b65d738aa32b23672278fcc899aa9ae1bc3ac6a860d7f2b9451363e0ee1c8ee55

  • C:\about.htm

    Filesize

    2KB

    MD5

    94c0c5518c4f4bb044842a006d04932a

    SHA1

    23d9a914f6681d65e2b1faa171f4cf492562ebdb

    SHA256

    224c4e5cdc0e7495c5fb5d1f52d76807092b5cc2d0a7c95fa612ff7b1412706e

    SHA512

    79cb2cd9e19ac3cc8bd94f1a20369e61224f8db02bc04d1f5768d62163b68467a3d317808a942bc7cca6ca84c221bb54a76e097f543c88bb89f0a3c9534ff3bb

  • C:\nEwb0Rn.exe

    Filesize

    52KB

    MD5

    2b1c8a04d2247e85a67415153ffe464c

    SHA1

    4fb54af51310734efcf0ac1bfed80f46b928886a

    SHA256

    6884e9ac1dcaa9e427791018b75715b30f6ecbb74e07991eaa2ed81b057a7eab

    SHA512

    e483a8172b2644d58e63e9aaff393455606f145b906482e8036d3d0dccb4a48aa61de3c2cf57f53bf4e3cf1271e49fb0029f1fd51bbccc059f8860a43eab5e94

  • C:\nEwb0Rn.exe

    Filesize

    52KB

    MD5

    2435dccc071af2c041d662999e314fed

    SHA1

    6bc5de67c0b9a9e9272d9cce7ff65115a03352ef

    SHA256

    c1fe3cfde278cae7b1d7297dbdd7514505db75109a8d38781ade2028d5a75249

    SHA512

    19ddaa1dd5bc4c6946b15328b91f6d9460e50c9f3a269941f26ac1d067cde97b4a90b9a288078a152eeaa6eded7989db26beafb1d37d42861925ffc25439c445

  • C:\nEwb0Rn.exe

    Filesize

    52KB

    MD5

    2f7698512ef26c9bd5ed670885fb54ee

    SHA1

    40aa79193687b82e4a2322c47789b6f99f0ea236

    SHA256

    645b6bb4bb178d8b0b7deacc8ee028c16df2ee067fe1033be66be98688f89918

    SHA512

    3220110b24937ddff776eaf4e0a4123a03b1fb500b6293058924435f240a4eb621d1003ce8fc6fa54cd3ee3f784e61dfef6e650bf0144087eda3f80af3e0135a

  • memory/112-270-0x0000000000400000-0x0000000000428000-memory.dmp

    Filesize

    160KB

  • memory/532-257-0x0000000000400000-0x0000000000428000-memory.dmp

    Filesize

    160KB

  • memory/532-446-0x0000000000400000-0x0000000000428000-memory.dmp

    Filesize

    160KB

  • memory/532-81-0x0000000000400000-0x0000000000428000-memory.dmp

    Filesize

    160KB

  • memory/740-335-0x0000000000400000-0x0000000000428000-memory.dmp

    Filesize

    160KB

  • memory/1288-75-0x0000000000400000-0x0000000000428000-memory.dmp

    Filesize

    160KB

  • memory/1288-445-0x0000000000400000-0x0000000000428000-memory.dmp

    Filesize

    160KB

  • memory/1288-250-0x0000000000400000-0x0000000000428000-memory.dmp

    Filesize

    160KB

  • memory/1320-189-0x0000000000400000-0x0000000000428000-memory.dmp

    Filesize

    160KB

  • memory/1376-296-0x0000000000400000-0x0000000000428000-memory.dmp

    Filesize

    160KB

  • memory/1672-275-0x0000000000400000-0x0000000000428000-memory.dmp

    Filesize

    160KB

  • memory/1692-235-0x0000000000400000-0x0000000000428000-memory.dmp

    Filesize

    160KB

  • memory/1692-252-0x0000000000400000-0x0000000000428000-memory.dmp

    Filesize

    160KB

  • memory/2368-239-0x0000000000400000-0x0000000000428000-memory.dmp

    Filesize

    160KB

  • memory/2368-190-0x0000000000400000-0x0000000000428000-memory.dmp

    Filesize

    160KB

  • memory/2436-447-0x0000000000400000-0x0000000000428000-memory.dmp

    Filesize

    160KB

  • memory/2436-89-0x0000000000400000-0x0000000000428000-memory.dmp

    Filesize

    160KB

  • memory/2436-264-0x0000000000400000-0x0000000000428000-memory.dmp

    Filesize

    160KB

  • memory/2588-278-0x0000000000400000-0x0000000000428000-memory.dmp

    Filesize

    160KB

  • memory/2588-294-0x0000000000400000-0x0000000000428000-memory.dmp

    Filesize

    160KB

  • memory/2704-297-0x0000000000400000-0x0000000000428000-memory.dmp

    Filesize

    160KB

  • memory/2704-333-0x0000000000400000-0x0000000000428000-memory.dmp

    Filesize

    160KB

  • memory/2976-314-0x0000000000400000-0x0000000000428000-memory.dmp

    Filesize

    160KB

  • memory/2976-290-0x0000000000400000-0x0000000000428000-memory.dmp

    Filesize

    160KB

  • memory/3008-237-0x0000000000400000-0x0000000000428000-memory.dmp

    Filesize

    160KB

  • memory/3008-177-0x0000000000400000-0x0000000000428000-memory.dmp

    Filesize

    160KB

  • memory/3016-0-0x0000000000400000-0x0000000000428000-memory.dmp

    Filesize

    160KB

  • memory/3016-100-0x0000000000400000-0x0000000000428000-memory.dmp

    Filesize

    160KB

  • memory/3344-254-0x0000000000400000-0x0000000000428000-memory.dmp

    Filesize

    160KB

  • memory/3388-259-0x0000000000400000-0x0000000000428000-memory.dmp

    Filesize

    160KB

  • memory/3388-244-0x0000000000400000-0x0000000000428000-memory.dmp

    Filesize

    160KB

  • memory/4452-288-0x0000000000400000-0x0000000000428000-memory.dmp

    Filesize

    160KB

  • memory/4612-273-0x0000000000400000-0x0000000000428000-memory.dmp

    Filesize

    160KB

  • memory/4996-234-0x0000000000400000-0x0000000000428000-memory.dmp

    Filesize

    160KB

  • memory/4996-256-0x0000000000400000-0x0000000000428000-memory.dmp

    Filesize

    160KB

  • memory/5012-265-0x0000000000400000-0x0000000000428000-memory.dmp

    Filesize

    160KB

  • memory/5012-95-0x0000000000400000-0x0000000000428000-memory.dmp

    Filesize

    160KB

  • memory/5012-448-0x0000000000400000-0x0000000000428000-memory.dmp

    Filesize

    160KB