Analysis

  • max time kernel
    138s
  • max time network
    156s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240226-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system
  • submitted
    05-03-2024 23:33

General

  • Target

    a2102aa10e24fafcab87cc14b93a5fd0a2133a27a6d4243b54eb995495b47c62.exe

  • Size

    128KB

  • MD5

    f0f2008e304427142c34fb191cf2a637

  • SHA1

    9213eb529ba731d73d6f010c147d0844152f85ce

  • SHA256

    a2102aa10e24fafcab87cc14b93a5fd0a2133a27a6d4243b54eb995495b47c62

  • SHA512

    a15f3feecae278cfd40c0ea1b383b1c7e2c66fe3633fb835125d3cd364bd7dd5b2052e53a45e8f83bcdecdc0864883662cf73cafec5fd7fd50389068ccaf721c

  • SSDEEP

    3072:uSuRyG2B+OCbum57O0DrLXfzoeqarm9mTKpAImA:ub3243S+XfxqySSKpRmA

Score
10/10

Malware Config

Signatures

  • Adds autorun key to be loaded by Explorer.exe on startup 2 TTPs 64 IoCs
  • Executes dropped EXE 64 IoCs
  • Drops file in System32 directory 64 IoCs
  • Program crash 1 IoCs
  • Modifies registry class 64 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\a2102aa10e24fafcab87cc14b93a5fd0a2133a27a6d4243b54eb995495b47c62.exe
    "C:\Users\Admin\AppData\Local\Temp\a2102aa10e24fafcab87cc14b93a5fd0a2133a27a6d4243b54eb995495b47c62.exe"
    1⤵
    • Modifies registry class
    • Suspicious use of WriteProcessMemory
    PID:3564
    • C:\Windows\SysWOW64\Kgiiiidd.exe
      C:\Windows\system32\Kgiiiidd.exe
      2⤵
      • Executes dropped EXE
      • Modifies registry class
      • Suspicious use of WriteProcessMemory
      PID:2892
      • C:\Windows\SysWOW64\Lcdciiec.exe
        C:\Windows\system32\Lcdciiec.exe
        3⤵
        • Adds autorun key to be loaded by Explorer.exe on startup
        • Executes dropped EXE
        • Suspicious use of WriteProcessMemory
        PID:1240
        • C:\Windows\SysWOW64\Lokdnjkg.exe
          C:\Windows\system32\Lokdnjkg.exe
          4⤵
          • Adds autorun key to be loaded by Explorer.exe on startup
          • Executes dropped EXE
          • Drops file in System32 directory
          • Modifies registry class
          • Suspicious use of WriteProcessMemory
          PID:2724
          • C:\Windows\SysWOW64\Llodgnja.exe
            C:\Windows\system32\Llodgnja.exe
            5⤵
            • Executes dropped EXE
            • Drops file in System32 directory
            • Modifies registry class
            • Suspicious use of WriteProcessMemory
            PID:2716
            • C:\Windows\SysWOW64\Lnangaoa.exe
              C:\Windows\system32\Lnangaoa.exe
              6⤵
              • Executes dropped EXE
              • Modifies registry class
              • Suspicious use of WriteProcessMemory
              PID:3864
              • C:\Windows\SysWOW64\Mqafhl32.exe
                C:\Windows\system32\Mqafhl32.exe
                7⤵
                • Executes dropped EXE
                • Suspicious use of WriteProcessMemory
                PID:964
                • C:\Windows\SysWOW64\Mogcihaj.exe
                  C:\Windows\system32\Mogcihaj.exe
                  8⤵
                  • Executes dropped EXE
                  • Drops file in System32 directory
                  • Suspicious use of WriteProcessMemory
                  PID:3660
                  • C:\Windows\SysWOW64\Moipoh32.exe
                    C:\Windows\system32\Moipoh32.exe
                    9⤵
                    • Executes dropped EXE
                    • Suspicious use of WriteProcessMemory
                    PID:1544
                    • C:\Windows\SysWOW64\Mnjqmpgg.exe
                      C:\Windows\system32\Mnjqmpgg.exe
                      10⤵
                      • Adds autorun key to be loaded by Explorer.exe on startup
                      • Executes dropped EXE
                      • Drops file in System32 directory
                      • Modifies registry class
                      • Suspicious use of WriteProcessMemory
                      PID:3428
                      • C:\Windows\SysWOW64\Mqkiok32.exe
                        C:\Windows\system32\Mqkiok32.exe
                        11⤵
                        • Adds autorun key to be loaded by Explorer.exe on startup
                        • Executes dropped EXE
                        • Modifies registry class
                        • Suspicious use of WriteProcessMemory
                        PID:3836
                        • C:\Windows\SysWOW64\Nmbjcljl.exe
                          C:\Windows\system32\Nmbjcljl.exe
                          12⤵
                          • Adds autorun key to be loaded by Explorer.exe on startup
                          • Executes dropped EXE
                          • Drops file in System32 directory
                          • Modifies registry class
                          • Suspicious use of WriteProcessMemory
                          PID:2008
                          • C:\Windows\SysWOW64\Nmfcok32.exe
                            C:\Windows\system32\Nmfcok32.exe
                            13⤵
                            • Executes dropped EXE
                            • Drops file in System32 directory
                            • Suspicious use of WriteProcessMemory
                            PID:1708
                            • C:\Windows\SysWOW64\Nadleilm.exe
                              C:\Windows\system32\Nadleilm.exe
                              14⤵
                              • Executes dropped EXE
                              • Suspicious use of WriteProcessMemory
                              PID:1480
                              • C:\Windows\SysWOW64\Nagiji32.exe
                                C:\Windows\system32\Nagiji32.exe
                                15⤵
                                • Executes dropped EXE
                                • Drops file in System32 directory
                                • Suspicious use of WriteProcessMemory
                                PID:4136
                                • C:\Windows\SysWOW64\Ojomcopk.exe
                                  C:\Windows\system32\Ojomcopk.exe
                                  16⤵
                                  • Executes dropped EXE
                                  • Suspicious use of WriteProcessMemory
                                  PID:4428
                                  • C:\Windows\SysWOW64\Ojajin32.exe
                                    C:\Windows\system32\Ojajin32.exe
                                    17⤵
                                    • Executes dropped EXE
                                    • Suspicious use of WriteProcessMemory
                                    PID:1704
                                    • C:\Windows\SysWOW64\Ojdgnn32.exe
                                      C:\Windows\system32\Ojdgnn32.exe
                                      18⤵
                                      • Adds autorun key to be loaded by Explorer.exe on startup
                                      • Executes dropped EXE
                                      • Suspicious use of WriteProcessMemory
                                      PID:452
                                      • C:\Windows\SysWOW64\Opclldhj.exe
                                        C:\Windows\system32\Opclldhj.exe
                                        19⤵
                                        • Adds autorun key to be loaded by Explorer.exe on startup
                                        • Executes dropped EXE
                                        • Suspicious use of WriteProcessMemory
                                        PID:4348
                                        • C:\Windows\SysWOW64\Oabhfg32.exe
                                          C:\Windows\system32\Oabhfg32.exe
                                          20⤵
                                          • Adds autorun key to be loaded by Explorer.exe on startup
                                          • Executes dropped EXE
                                          • Drops file in System32 directory
                                          • Suspicious use of WriteProcessMemory
                                          PID:436
                                          • C:\Windows\SysWOW64\Pmiikh32.exe
                                            C:\Windows\system32\Pmiikh32.exe
                                            21⤵
                                            • Executes dropped EXE
                                            • Suspicious use of WriteProcessMemory
                                            PID:4988
                                            • C:\Windows\SysWOW64\Pnifekmd.exe
                                              C:\Windows\system32\Pnifekmd.exe
                                              22⤵
                                              • Adds autorun key to be loaded by Explorer.exe on startup
                                              • Executes dropped EXE
                                              • Modifies registry class
                                              • Suspicious use of WriteProcessMemory
                                              PID:4072
                                              • C:\Windows\SysWOW64\Pdhkcb32.exe
                                                C:\Windows\system32\Pdhkcb32.exe
                                                23⤵
                                                • Executes dropped EXE
                                                PID:2980
                                                • C:\Windows\SysWOW64\Qjfmkk32.exe
                                                  C:\Windows\system32\Qjfmkk32.exe
                                                  24⤵
                                                  • Executes dropped EXE
                                                  • Drops file in System32 directory
                                                  PID:3076
                                                  • C:\Windows\SysWOW64\Aoioli32.exe
                                                    C:\Windows\system32\Aoioli32.exe
                                                    25⤵
                                                    • Adds autorun key to be loaded by Explorer.exe on startup
                                                    • Executes dropped EXE
                                                    • Modifies registry class
                                                    PID:3044
                                                    • C:\Windows\SysWOW64\Amqhbe32.exe
                                                      C:\Windows\system32\Amqhbe32.exe
                                                      26⤵
                                                      • Adds autorun key to be loaded by Explorer.exe on startup
                                                      • Executes dropped EXE
                                                      PID:972
                                                      • C:\Windows\SysWOW64\Bgkiaj32.exe
                                                        C:\Windows\system32\Bgkiaj32.exe
                                                        27⤵
                                                        • Adds autorun key to be loaded by Explorer.exe on startup
                                                        • Executes dropped EXE
                                                        PID:456
                                                        • C:\Windows\SysWOW64\Bdagpnbk.exe
                                                          C:\Windows\system32\Bdagpnbk.exe
                                                          28⤵
                                                          • Executes dropped EXE
                                                          • Modifies registry class
                                                          PID:4584
                                                          • C:\Windows\SysWOW64\Bnlhncgi.exe
                                                            C:\Windows\system32\Bnlhncgi.exe
                                                            29⤵
                                                            • Adds autorun key to be loaded by Explorer.exe on startup
                                                            • Executes dropped EXE
                                                            • Drops file in System32 directory
                                                            • Modifies registry class
                                                            PID:3364
                                                            • C:\Windows\SysWOW64\Cdkifmjq.exe
                                                              C:\Windows\system32\Cdkifmjq.exe
                                                              30⤵
                                                              • Executes dropped EXE
                                                              PID:2144
                                                              • C:\Windows\SysWOW64\Chiblk32.exe
                                                                C:\Windows\system32\Chiblk32.exe
                                                                31⤵
                                                                • Executes dropped EXE
                                                                • Drops file in System32 directory
                                                                • Modifies registry class
                                                                PID:3396
                                                                • C:\Windows\SysWOW64\Ckjknfnh.exe
                                                                  C:\Windows\system32\Ckjknfnh.exe
                                                                  32⤵
                                                                  • Adds autorun key to be loaded by Explorer.exe on startup
                                                                  • Executes dropped EXE
                                                                  • Drops file in System32 directory
                                                                  • Modifies registry class
                                                                  PID:4788
                                                                  • C:\Windows\SysWOW64\Cpfcfmlp.exe
                                                                    C:\Windows\system32\Cpfcfmlp.exe
                                                                    33⤵
                                                                    • Adds autorun key to be loaded by Explorer.exe on startup
                                                                    • Executes dropped EXE
                                                                    PID:4184
                                                                    • C:\Windows\SysWOW64\Dddllkbf.exe
                                                                      C:\Windows\system32\Dddllkbf.exe
                                                                      34⤵
                                                                      • Executes dropped EXE
                                                                      • Modifies registry class
                                                                      PID:2876
                                                                      • C:\Windows\SysWOW64\Dojqjdbl.exe
                                                                        C:\Windows\system32\Dojqjdbl.exe
                                                                        35⤵
                                                                        • Executes dropped EXE
                                                                        PID:1100
                                                                        • C:\Windows\SysWOW64\Dolmodpi.exe
                                                                          C:\Windows\system32\Dolmodpi.exe
                                                                          36⤵
                                                                          • Adds autorun key to be loaded by Explorer.exe on startup
                                                                          • Executes dropped EXE
                                                                          • Modifies registry class
                                                                          PID:1316
                                                                          • C:\Windows\SysWOW64\Dhdbhifj.exe
                                                                            C:\Windows\system32\Dhdbhifj.exe
                                                                            37⤵
                                                                            • Executes dropped EXE
                                                                            • Drops file in System32 directory
                                                                            • Modifies registry class
                                                                            PID:1956
                                                                            • C:\Windows\SysWOW64\Dnajppda.exe
                                                                              C:\Windows\system32\Dnajppda.exe
                                                                              38⤵
                                                                              • Adds autorun key to be loaded by Explorer.exe on startup
                                                                              • Executes dropped EXE
                                                                              PID:2728
                                                                              • C:\Windows\SysWOW64\Doagjc32.exe
                                                                                C:\Windows\system32\Doagjc32.exe
                                                                                39⤵
                                                                                • Executes dropped EXE
                                                                                • Drops file in System32 directory
                                                                                PID:1884
                                                                                • C:\Windows\SysWOW64\Egaejeej.exe
                                                                                  C:\Windows\system32\Egaejeej.exe
                                                                                  40⤵
                                                                                  • Executes dropped EXE
                                                                                  • Modifies registry class
                                                                                  PID:4536
                                                                                  • C:\Windows\SysWOW64\Ebfign32.exe
                                                                                    C:\Windows\system32\Ebfign32.exe
                                                                                    41⤵
                                                                                    • Executes dropped EXE
                                                                                    PID:4592
                                                                                    • C:\Windows\SysWOW64\Ebifmm32.exe
                                                                                      C:\Windows\system32\Ebifmm32.exe
                                                                                      42⤵
                                                                                      • Adds autorun key to be loaded by Explorer.exe on startup
                                                                                      • Executes dropped EXE
                                                                                      • Drops file in System32 directory
                                                                                      • Modifies registry class
                                                                                      PID:4364
                                                                                      • C:\Windows\SysWOW64\Fgjhpcmo.exe
                                                                                        C:\Windows\system32\Fgjhpcmo.exe
                                                                                        43⤵
                                                                                        • Executes dropped EXE
                                                                                        • Modifies registry class
                                                                                        PID:1556
                                                                                        • C:\Windows\SysWOW64\Fgmdec32.exe
                                                                                          C:\Windows\system32\Fgmdec32.exe
                                                                                          44⤵
                                                                                          • Adds autorun key to be loaded by Explorer.exe on startup
                                                                                          • Executes dropped EXE
                                                                                          • Modifies registry class
                                                                                          PID:4648
                                                                                          • C:\Windows\SysWOW64\Fgoakc32.exe
                                                                                            C:\Windows\system32\Fgoakc32.exe
                                                                                            45⤵
                                                                                            • Adds autorun key to be loaded by Explorer.exe on startup
                                                                                            • Executes dropped EXE
                                                                                            • Drops file in System32 directory
                                                                                            PID:2084
                                                                                            • C:\Windows\SysWOW64\Fniihmpf.exe
                                                                                              C:\Windows\system32\Fniihmpf.exe
                                                                                              46⤵
                                                                                              • Adds autorun key to be loaded by Explorer.exe on startup
                                                                                              • Executes dropped EXE
                                                                                              • Drops file in System32 directory
                                                                                              PID:2852
                                                                                              • C:\Windows\SysWOW64\Fecadghc.exe
                                                                                                C:\Windows\system32\Fecadghc.exe
                                                                                                47⤵
                                                                                                • Adds autorun key to be loaded by Explorer.exe on startup
                                                                                                • Executes dropped EXE
                                                                                                • Drops file in System32 directory
                                                                                                PID:2232
                                                                                                • C:\Windows\SysWOW64\Fohfbpgi.exe
                                                                                                  C:\Windows\system32\Fohfbpgi.exe
                                                                                                  48⤵
                                                                                                  • Adds autorun key to be loaded by Explorer.exe on startup
                                                                                                  • Executes dropped EXE
                                                                                                  • Modifies registry class
                                                                                                  PID:3224
                                                                                                  • C:\Windows\SysWOW64\Fajbjh32.exe
                                                                                                    C:\Windows\system32\Fajbjh32.exe
                                                                                                    49⤵
                                                                                                    • Executes dropped EXE
                                                                                                    • Drops file in System32 directory
                                                                                                    • Modifies registry class
                                                                                                    PID:4412
                                                                                                    • C:\Windows\SysWOW64\Fkofga32.exe
                                                                                                      C:\Windows\system32\Fkofga32.exe
                                                                                                      50⤵
                                                                                                      • Executes dropped EXE
                                                                                                      • Drops file in System32 directory
                                                                                                      PID:2164
                                                                                                      • C:\Windows\SysWOW64\Gicgpelg.exe
                                                                                                        C:\Windows\system32\Gicgpelg.exe
                                                                                                        51⤵
                                                                                                        • Executes dropped EXE
                                                                                                        • Drops file in System32 directory
                                                                                                        PID:2484
                                                                                                        • C:\Windows\SysWOW64\Gijmad32.exe
                                                                                                          C:\Windows\system32\Gijmad32.exe
                                                                                                          52⤵
                                                                                                          • Adds autorun key to be loaded by Explorer.exe on startup
                                                                                                          • Executes dropped EXE
                                                                                                          PID:4284
                                                                                                          • C:\Windows\SysWOW64\Geanfelc.exe
                                                                                                            C:\Windows\system32\Geanfelc.exe
                                                                                                            53⤵
                                                                                                            • Executes dropped EXE
                                                                                                            PID:5140
                                                                                                            • C:\Windows\SysWOW64\Hlkfbocp.exe
                                                                                                              C:\Windows\system32\Hlkfbocp.exe
                                                                                                              54⤵
                                                                                                              • Executes dropped EXE
                                                                                                              • Modifies registry class
                                                                                                              PID:5180
                                                                                                              • C:\Windows\SysWOW64\Hioflcbj.exe
                                                                                                                C:\Windows\system32\Hioflcbj.exe
                                                                                                                55⤵
                                                                                                                • Adds autorun key to be loaded by Explorer.exe on startup
                                                                                                                • Executes dropped EXE
                                                                                                                • Drops file in System32 directory
                                                                                                                PID:5220
                                                                                                                • C:\Windows\SysWOW64\Heegad32.exe
                                                                                                                  C:\Windows\system32\Heegad32.exe
                                                                                                                  56⤵
                                                                                                                  • Executes dropped EXE
                                                                                                                  • Drops file in System32 directory
                                                                                                                  PID:5264
                                                                                                                  • C:\Windows\SysWOW64\Hejqldci.exe
                                                                                                                    C:\Windows\system32\Hejqldci.exe
                                                                                                                    57⤵
                                                                                                                    • Adds autorun key to be loaded by Explorer.exe on startup
                                                                                                                    • Executes dropped EXE
                                                                                                                    • Drops file in System32 directory
                                                                                                                    • Modifies registry class
                                                                                                                    PID:5304
                                                                                                                    • C:\Windows\SysWOW64\Inebjihf.exe
                                                                                                                      C:\Windows\system32\Inebjihf.exe
                                                                                                                      58⤵
                                                                                                                      • Adds autorun key to be loaded by Explorer.exe on startup
                                                                                                                      • Executes dropped EXE
                                                                                                                      PID:5348
                                                                                                                      • C:\Windows\SysWOW64\Ilphdlqh.exe
                                                                                                                        C:\Windows\system32\Ilphdlqh.exe
                                                                                                                        59⤵
                                                                                                                        • Executes dropped EXE
                                                                                                                        • Modifies registry class
                                                                                                                        PID:5388
                                                                                                                        • C:\Windows\SysWOW64\Jpnakk32.exe
                                                                                                                          C:\Windows\system32\Jpnakk32.exe
                                                                                                                          60⤵
                                                                                                                          • Adds autorun key to be loaded by Explorer.exe on startup
                                                                                                                          • Executes dropped EXE
                                                                                                                          • Drops file in System32 directory
                                                                                                                          • Modifies registry class
                                                                                                                          PID:5432
                                                                                                                          • C:\Windows\SysWOW64\Jihbip32.exe
                                                                                                                            C:\Windows\system32\Jihbip32.exe
                                                                                                                            61⤵
                                                                                                                            • Executes dropped EXE
                                                                                                                            • Drops file in System32 directory
                                                                                                                            • Modifies registry class
                                                                                                                            PID:5476
                                                                                                                            • C:\Windows\SysWOW64\Jhplpl32.exe
                                                                                                                              C:\Windows\system32\Jhplpl32.exe
                                                                                                                              62⤵
                                                                                                                              • Adds autorun key to be loaded by Explorer.exe on startup
                                                                                                                              • Executes dropped EXE
                                                                                                                              PID:5516
                                                                                                                              • C:\Windows\SysWOW64\Kedlip32.exe
                                                                                                                                C:\Windows\system32\Kedlip32.exe
                                                                                                                                63⤵
                                                                                                                                • Adds autorun key to be loaded by Explorer.exe on startup
                                                                                                                                • Executes dropped EXE
                                                                                                                                • Drops file in System32 directory
                                                                                                                                • Modifies registry class
                                                                                                                                PID:5556
                                                                                                                                • C:\Windows\SysWOW64\Kolabf32.exe
                                                                                                                                  C:\Windows\system32\Kolabf32.exe
                                                                                                                                  64⤵
                                                                                                                                  • Adds autorun key to be loaded by Explorer.exe on startup
                                                                                                                                  • Executes dropped EXE
                                                                                                                                  PID:5596
                                                                                                                                  • C:\Windows\SysWOW64\Kibeoo32.exe
                                                                                                                                    C:\Windows\system32\Kibeoo32.exe
                                                                                                                                    65⤵
                                                                                                                                    • Adds autorun key to be loaded by Explorer.exe on startup
                                                                                                                                    • Executes dropped EXE
                                                                                                                                    • Modifies registry class
                                                                                                                                    PID:5636
                                                                                                                                    • C:\Windows\SysWOW64\Kapfiqoj.exe
                                                                                                                                      C:\Windows\system32\Kapfiqoj.exe
                                                                                                                                      66⤵
                                                                                                                                      • Adds autorun key to be loaded by Explorer.exe on startup
                                                                                                                                      • Drops file in System32 directory
                                                                                                                                      • Modifies registry class
                                                                                                                                      PID:5680
                                                                                                                                      • C:\Windows\SysWOW64\Khlklj32.exe
                                                                                                                                        C:\Windows\system32\Khlklj32.exe
                                                                                                                                        67⤵
                                                                                                                                        • Modifies registry class
                                                                                                                                        PID:5720
                                                                                                                                        • C:\Windows\SysWOW64\Kadpdp32.exe
                                                                                                                                          C:\Windows\system32\Kadpdp32.exe
                                                                                                                                          68⤵
                                                                                                                                          • Drops file in System32 directory
                                                                                                                                          • Modifies registry class
                                                                                                                                          PID:5760
                                                                                                                                          • C:\Windows\SysWOW64\Lhnhajba.exe
                                                                                                                                            C:\Windows\system32\Lhnhajba.exe
                                                                                                                                            69⤵
                                                                                                                                            • Drops file in System32 directory
                                                                                                                                            PID:5800
                                                                                                                                            • C:\Windows\SysWOW64\Lafmjp32.exe
                                                                                                                                              C:\Windows\system32\Lafmjp32.exe
                                                                                                                                              70⤵
                                                                                                                                              • Adds autorun key to be loaded by Explorer.exe on startup
                                                                                                                                              • Drops file in System32 directory
                                                                                                                                              • Modifies registry class
                                                                                                                                              PID:5840
                                                                                                                                              • C:\Windows\SysWOW64\Lhqefjpo.exe
                                                                                                                                                C:\Windows\system32\Lhqefjpo.exe
                                                                                                                                                71⤵
                                                                                                                                                • Drops file in System32 directory
                                                                                                                                                • Modifies registry class
                                                                                                                                                PID:5880
                                                                                                                                                • C:\Windows\SysWOW64\Lpjjmg32.exe
                                                                                                                                                  C:\Windows\system32\Lpjjmg32.exe
                                                                                                                                                  72⤵
                                                                                                                                                  • Adds autorun key to be loaded by Explorer.exe on startup
                                                                                                                                                  • Drops file in System32 directory
                                                                                                                                                  • Modifies registry class
                                                                                                                                                  PID:5920
                                                                                                                                                  • C:\Windows\SysWOW64\Lakfeodm.exe
                                                                                                                                                    C:\Windows\system32\Lakfeodm.exe
                                                                                                                                                    73⤵
                                                                                                                                                    • Adds autorun key to be loaded by Explorer.exe on startup
                                                                                                                                                    • Modifies registry class
                                                                                                                                                    PID:5960
                                                                                                                                                    • C:\Windows\SysWOW64\Loofnccf.exe
                                                                                                                                                      C:\Windows\system32\Loofnccf.exe
                                                                                                                                                      74⤵
                                                                                                                                                      • Adds autorun key to be loaded by Explorer.exe on startup
                                                                                                                                                      • Modifies registry class
                                                                                                                                                      PID:6008
                                                                                                                                                      • C:\Windows\SysWOW64\Mpclce32.exe
                                                                                                                                                        C:\Windows\system32\Mpclce32.exe
                                                                                                                                                        75⤵
                                                                                                                                                        • Drops file in System32 directory
                                                                                                                                                        • Modifies registry class
                                                                                                                                                        PID:6048
                                                                                                                                                        • C:\Windows\SysWOW64\Mljmhflh.exe
                                                                                                                                                          C:\Windows\system32\Mljmhflh.exe
                                                                                                                                                          76⤵
                                                                                                                                                          • Adds autorun key to be loaded by Explorer.exe on startup
                                                                                                                                                          • Drops file in System32 directory
                                                                                                                                                          • Modifies registry class
                                                                                                                                                          PID:6084
                                                                                                                                                          • C:\Windows\SysWOW64\Mcdeeq32.exe
                                                                                                                                                            C:\Windows\system32\Mcdeeq32.exe
                                                                                                                                                            77⤵
                                                                                                                                                            • Adds autorun key to be loaded by Explorer.exe on startup
                                                                                                                                                            • Modifies registry class
                                                                                                                                                            PID:6128
                                                                                                                                                            • C:\Windows\SysWOW64\Mqjbddpl.exe
                                                                                                                                                              C:\Windows\system32\Mqjbddpl.exe
                                                                                                                                                              78⤵
                                                                                                                                                              • Drops file in System32 directory
                                                                                                                                                              • Modifies registry class
                                                                                                                                                              PID:5172
                                                                                                                                                              • C:\Windows\SysWOW64\Nblolm32.exe
                                                                                                                                                                C:\Windows\system32\Nblolm32.exe
                                                                                                                                                                79⤵
                                                                                                                                                                • Adds autorun key to be loaded by Explorer.exe on startup
                                                                                                                                                                PID:5228
                                                                                                                                                                • C:\Windows\SysWOW64\Nhegig32.exe
                                                                                                                                                                  C:\Windows\system32\Nhegig32.exe
                                                                                                                                                                  80⤵
                                                                                                                                                                  • Adds autorun key to be loaded by Explorer.exe on startup
                                                                                                                                                                  • Drops file in System32 directory
                                                                                                                                                                  • Modifies registry class
                                                                                                                                                                  PID:4628
                                                                                                                                                                  • C:\Windows\SysWOW64\Nqmojd32.exe
                                                                                                                                                                    C:\Windows\system32\Nqmojd32.exe
                                                                                                                                                                    81⤵
                                                                                                                                                                    • Adds autorun key to be loaded by Explorer.exe on startup
                                                                                                                                                                    • Drops file in System32 directory
                                                                                                                                                                    • Modifies registry class
                                                                                                                                                                    PID:4452
                                                                                                                                                                    • C:\Windows\SysWOW64\Noblkqca.exe
                                                                                                                                                                      C:\Windows\system32\Noblkqca.exe
                                                                                                                                                                      82⤵
                                                                                                                                                                      • Adds autorun key to be loaded by Explorer.exe on startup
                                                                                                                                                                      PID:5272
                                                                                                                                                                      • C:\Windows\SysWOW64\Nfldgk32.exe
                                                                                                                                                                        C:\Windows\system32\Nfldgk32.exe
                                                                                                                                                                        83⤵
                                                                                                                                                                          PID:5324
                                                                                                                                                                          • C:\Windows\SysWOW64\Nbbeml32.exe
                                                                                                                                                                            C:\Windows\system32\Nbbeml32.exe
                                                                                                                                                                            84⤵
                                                                                                                                                                            • Drops file in System32 directory
                                                                                                                                                                            PID:5424
                                                                                                                                                                            • C:\Windows\SysWOW64\Nimmifgo.exe
                                                                                                                                                                              C:\Windows\system32\Nimmifgo.exe
                                                                                                                                                                              85⤵
                                                                                                                                                                              • Modifies registry class
                                                                                                                                                                              PID:5460
                                                                                                                                                                              • C:\Windows\SysWOW64\Nqcejcha.exe
                                                                                                                                                                                C:\Windows\system32\Nqcejcha.exe
                                                                                                                                                                                86⤵
                                                                                                                                                                                • Adds autorun key to be loaded by Explorer.exe on startup
                                                                                                                                                                                • Drops file in System32 directory
                                                                                                                                                                                • Modifies registry class
                                                                                                                                                                                PID:5564
                                                                                                                                                                                • C:\Windows\SysWOW64\Ofegni32.exe
                                                                                                                                                                                  C:\Windows\system32\Ofegni32.exe
                                                                                                                                                                                  87⤵
                                                                                                                                                                                  • Drops file in System32 directory
                                                                                                                                                                                  • Modifies registry class
                                                                                                                                                                                  PID:5628
                                                                                                                                                                                  • C:\Windows\SysWOW64\Omopjcjp.exe
                                                                                                                                                                                    C:\Windows\system32\Omopjcjp.exe
                                                                                                                                                                                    88⤵
                                                                                                                                                                                    • Adds autorun key to be loaded by Explorer.exe on startup
                                                                                                                                                                                    • Drops file in System32 directory
                                                                                                                                                                                    • Modifies registry class
                                                                                                                                                                                    PID:5716
                                                                                                                                                                                    • C:\Windows\SysWOW64\Oqoefand.exe
                                                                                                                                                                                      C:\Windows\system32\Oqoefand.exe
                                                                                                                                                                                      89⤵
                                                                                                                                                                                      • Adds autorun key to be loaded by Explorer.exe on startup
                                                                                                                                                                                      • Drops file in System32 directory
                                                                                                                                                                                      PID:5756
                                                                                                                                                                                      • C:\Windows\SysWOW64\Pimfpc32.exe
                                                                                                                                                                                        C:\Windows\system32\Pimfpc32.exe
                                                                                                                                                                                        90⤵
                                                                                                                                                                                        • Adds autorun key to be loaded by Explorer.exe on startup
                                                                                                                                                                                        PID:5836
                                                                                                                                                                                        • C:\Windows\SysWOW64\Pcegclgp.exe
                                                                                                                                                                                          C:\Windows\system32\Pcegclgp.exe
                                                                                                                                                                                          91⤵
                                                                                                                                                                                          • Drops file in System32 directory
                                                                                                                                                                                          PID:5908
                                                                                                                                                                                          • C:\Windows\SysWOW64\Pbjddh32.exe
                                                                                                                                                                                            C:\Windows\system32\Pbjddh32.exe
                                                                                                                                                                                            92⤵
                                                                                                                                                                                            • Adds autorun key to be loaded by Explorer.exe on startup
                                                                                                                                                                                            • Modifies registry class
                                                                                                                                                                                            PID:5988
                                                                                                                                                                                            • C:\Windows\SysWOW64\Pmphaaln.exe
                                                                                                                                                                                              C:\Windows\system32\Pmphaaln.exe
                                                                                                                                                                                              93⤵
                                                                                                                                                                                              • Adds autorun key to be loaded by Explorer.exe on startup
                                                                                                                                                                                              • Drops file in System32 directory
                                                                                                                                                                                              • Modifies registry class
                                                                                                                                                                                              PID:6096
                                                                                                                                                                                              • C:\Windows\SysWOW64\Qmdblp32.exe
                                                                                                                                                                                                C:\Windows\system32\Qmdblp32.exe
                                                                                                                                                                                                94⤵
                                                                                                                                                                                                • Drops file in System32 directory
                                                                                                                                                                                                • Modifies registry class
                                                                                                                                                                                                PID:5148
                                                                                                                                                                                                • C:\Windows\SysWOW64\Qfmfefni.exe
                                                                                                                                                                                                  C:\Windows\system32\Qfmfefni.exe
                                                                                                                                                                                                  95⤵
                                                                                                                                                                                                  • Modifies registry class
                                                                                                                                                                                                  PID:5160
                                                                                                                                                                                                  • C:\Windows\SysWOW64\Abcgjg32.exe
                                                                                                                                                                                                    C:\Windows\system32\Abcgjg32.exe
                                                                                                                                                                                                    96⤵
                                                                                                                                                                                                      PID:3576
                                                                                                                                                                                                      • C:\Windows\SysWOW64\Aimogakj.exe
                                                                                                                                                                                                        C:\Windows\system32\Aimogakj.exe
                                                                                                                                                                                                        97⤵
                                                                                                                                                                                                        • Adds autorun key to be loaded by Explorer.exe on startup
                                                                                                                                                                                                        PID:5332
                                                                                                                                                                                                        • C:\Windows\SysWOW64\Adepji32.exe
                                                                                                                                                                                                          C:\Windows\system32\Adepji32.exe
                                                                                                                                                                                                          98⤵
                                                                                                                                                                                                          • Adds autorun key to be loaded by Explorer.exe on startup
                                                                                                                                                                                                          PID:1072
                                                                                                                                                                                                          • C:\Windows\SysWOW64\Bapgdm32.exe
                                                                                                                                                                                                            C:\Windows\system32\Bapgdm32.exe
                                                                                                                                                                                                            99⤵
                                                                                                                                                                                                            • Adds autorun key to be loaded by Explorer.exe on startup
                                                                                                                                                                                                            • Modifies registry class
                                                                                                                                                                                                            PID:5464
                                                                                                                                                                                                            • C:\Windows\SysWOW64\Cdhffg32.exe
                                                                                                                                                                                                              C:\Windows\system32\Cdhffg32.exe
                                                                                                                                                                                                              100⤵
                                                                                                                                                                                                                PID:5664
                                                                                                                                                                                                                • C:\Windows\SysWOW64\Calfpk32.exe
                                                                                                                                                                                                                  C:\Windows\system32\Calfpk32.exe
                                                                                                                                                                                                                  101⤵
                                                                                                                                                                                                                  • Drops file in System32 directory
                                                                                                                                                                                                                  PID:5740
                                                                                                                                                                                                                  • C:\Windows\SysWOW64\Caqpkjcl.exe
                                                                                                                                                                                                                    C:\Windows\system32\Caqpkjcl.exe
                                                                                                                                                                                                                    102⤵
                                                                                                                                                                                                                    • Adds autorun key to be loaded by Explorer.exe on startup
                                                                                                                                                                                                                    • Modifies registry class
                                                                                                                                                                                                                    PID:5864
                                                                                                                                                                                                                    • C:\Windows\SysWOW64\Dmjmekgn.exe
                                                                                                                                                                                                                      C:\Windows\system32\Dmjmekgn.exe
                                                                                                                                                                                                                      103⤵
                                                                                                                                                                                                                      • Adds autorun key to be loaded by Explorer.exe on startup
                                                                                                                                                                                                                      • Drops file in System32 directory
                                                                                                                                                                                                                      PID:5952
                                                                                                                                                                                                                      • C:\Windows\SysWOW64\Diqnjl32.exe
                                                                                                                                                                                                                        C:\Windows\system32\Diqnjl32.exe
                                                                                                                                                                                                                        104⤵
                                                                                                                                                                                                                          PID:4288
                                                                                                                                                                                                                          • C:\Windows\SysWOW64\WerFault.exe
                                                                                                                                                                                                                            C:\Windows\SysWOW64\WerFault.exe -u -p 4288 -s 412
                                                                                                                                                                                                                            105⤵
                                                                                                                                                                                                                            • Program crash
                                                                                                                                                                                                                            PID:5624
          • C:\Windows\SysWOW64\WerFault.exe
            C:\Windows\SysWOW64\WerFault.exe -pss -s 424 -p 4288 -ip 4288
            1⤵
              PID:5044
            • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
              "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=asset_store.mojom.AssetStoreService --lang=en-US --service-sandbox-type=asset_store_service --no-appcompat-clear --mojo-platform-channel-handle=3848 --field-trial-handle=2276,i,11674642242468042059,14711253743544118298,262144 --variations-seed-version /prefetch:8
              1⤵
                PID:6624

              Network

              MITRE ATT&CK Enterprise v15

              Replay Monitor

              Loading Replay Monitor...

              Downloads

              • C:\Windows\SysWOW64\Amqhbe32.exe

                Filesize

                24KB

                MD5

                a33ee021dc82a85af32da571e36d7037

                SHA1

                3532c2ed5bf2032f899c95124235f71c2caa9b58

                SHA256

                7002c52ef32b8f26e19444c5adf027b6b6c0d7707f19ec327cbbbede436aa34a

                SHA512

                54e2cc1337ab6c75f43b8de0636c68d06b7c2a454fa99e12694e23c5c77f21a6878cb6c89a8f872e2fb327595bbcffe3090f3e2892e0063e092340b02c0701a3

              • C:\Windows\SysWOW64\Amqhbe32.exe

                Filesize

                1KB

                MD5

                dae02f33dac46cc8775531d18510f04c

                SHA1

                8a13580e63536a9f5969aff9abea507dd1a1f0ce

                SHA256

                743b5066af793c7c7a7ae37954e71838c973cbd66ec93323b33ebccdc0509639

                SHA512

                40b7c0f85db634babde0f62768fdc0f1f76fc96c70e2d7d3fac44c505387e4947b0cf9e4c9db57461845041ad86cb74df66c6498f3e3e6dcfb93e6b8423276fc

              • C:\Windows\SysWOW64\Aoioli32.exe

                Filesize

                79KB

                MD5

                fe8563ab5c3ce5f7d318ed6fa04a241d

                SHA1

                90aec19c612e6c2d7a9e9b04da680b0198cbb8f2

                SHA256

                236890479fbf4e00b0f46fd9d7a36b1da0ff8f91ceb7b75346842777a9e7d26f

                SHA512

                63ded03c8a4a762c22d322c70dc252bd277bf1f54b5e3a19c9cfe7c3ef6761946e96afb0eb9d232b86fddc9fb84399d79faa4aeff640490edd89cb7cadde05f8

              • C:\Windows\SysWOW64\Aoioli32.exe

                Filesize

                128KB

                MD5

                bf196ccd9942ae907dd440aae18edcc7

                SHA1

                3e4b852dbe71569699205b097ab0c673d30455ba

                SHA256

                48175b51e101893fa89ebb0aecd8a9d0e3c009d80514af7ef959c221e643bad7

                SHA512

                79f86f94ec56180b8c5e78b40d575b4cb995f55954014f7658cf7d0c9a6baa86d3a0cbc4cdf34ce7b33d12de53e48c51c1922df637c64c5f6e2af53810f710e6

              • C:\Windows\SysWOW64\Bdagpnbk.exe

                Filesize

                128KB

                MD5

                da0b3f0e96c1387052b4ae0beaab6a82

                SHA1

                446f38a477dbc28e3d5bfb6d0af4cee8db3e0dcb

                SHA256

                b57504e6b7252fa79579b242effd9c4d746f0bdc983a127099a16d8a3f4b1c96

                SHA512

                636d3311d32f9ae0f83bbedae303b1bde49fa65428f329cd939055b6245dd012838ca5da1cbd62fc289f650e797119856d15480547139fc97cd812440f8424ee

              • C:\Windows\SysWOW64\Bgkiaj32.exe

                Filesize

                128KB

                MD5

                140514aad669b0e892f340122e488111

                SHA1

                708be6936737b8a7d4a7e141a3855c2081c58264

                SHA256

                37403523a046414c350819c61474e88deed39a103dd4c1ce59d617b0c584822a

                SHA512

                e201f247a28bbcf2b27590f9562104f32364850066a4da3cff4af94aec2cf1591ede4f678f6a28f476e2365589fd627674b94b65f96cb5b12aa1cab1e7c4a6e4

              • C:\Windows\SysWOW64\Bgkiaj32.exe

                Filesize

                128KB

                MD5

                4b8f3c316fd8e76dee6327b514f829ae

                SHA1

                bb7f7bc2528eed9236898a0ffe39f7cbf2e5bc55

                SHA256

                ea3d66c3406f673b5f05e75eeb10bfce27c261cd0c374ec581daa54caad4a5c4

                SHA512

                84ac0165b7998760c71b2b52981ad970b84f2876add9f40c45eb46ca6b5a33cdc7e8d24a9943e4e2e3523a3d543b091fea8643d7dbf298bac3a9b998da5e336c

              • C:\Windows\SysWOW64\Bnlhncgi.exe

                Filesize

                128KB

                MD5

                8f526b7b0b3d58bfbd9d9e2aad5d93f6

                SHA1

                cce0483c82977413cae25dc4b7e18427f92a922d

                SHA256

                3de2f3efc621c7517df31c3a61f287bb51335e9f23570cbf44c11acd53f99a22

                SHA512

                50c1d86e53b5d7b79fa6deecf81773dd315c2dbaea81f45ec7eb98b702882993f5df7d818261a7b66f023b3d48ed33d18315692e2297841d42d5bfe86aeae2c4

              • C:\Windows\SysWOW64\Bnlhncgi.exe

                Filesize

                128KB

                MD5

                f056c58b4ef449ccd0839697331d94e9

                SHA1

                11a7ad5700518df59e729afb1ce7318304a34e72

                SHA256

                a7d2bbc51cb59fbbd09eab15da2c3a702da9008c3ece4a6fb775942ec15fc518

                SHA512

                215ffab72e32f7229025e500bcbc26f7a75c0b6ce759b51d5e99996c2068e382a2bc8b73e04dd4bd4b0d27994d34cbb99025843131f40a8b3dc2feac96994817

              • C:\Windows\SysWOW64\Cdkifmjq.exe

                Filesize

                128KB

                MD5

                c62089809f6da11b628fc4defe1085ae

                SHA1

                d347803481600b05cfa3cef5dc0e057a8ac5ca3e

                SHA256

                aaee57e6abf72e32c1ea6148d8ff11d764d3893b7c54e22cbda2d4e76bd5e12a

                SHA512

                2da8849c5c978c80a23d454b29caba3944133557065d7541833899a425ec268a2d594216698781112881a2d39897e7535550df059316671d71bb588ba42ae27e

              • C:\Windows\SysWOW64\Chiblk32.exe

                Filesize

                128KB

                MD5

                90cb8f97027ce5d21afbc94066c6b8be

                SHA1

                44ac8984bd3d21b57fbbc411c0848805648e0faf

                SHA256

                7e12710a2f7db41f1b3e58e3d755b75d47743d0935c609e4d53fdc2948ab92a3

                SHA512

                ea14fa8d18873be5ab1e9ae1479d578618966f5c320ba8fca344206a020fae1f8489da941dbdf0ede65deb23245a45f3789890c1608e65723c5d08182745e0da

              • C:\Windows\SysWOW64\Ckjknfnh.exe

                Filesize

                128KB

                MD5

                ca21c056b84a3cab7beef0c0343b6557

                SHA1

                3d645077eca8e78fe955f26acea174731aeefb09

                SHA256

                d455e5dec0a5dcf301f1d9f35b5ba1db8c32da9cda0a31b62d119c7c1fa7ce29

                SHA512

                c00a74343db0e4a94cc2f7e3e3958168aca060f564ef42bef3b0ea1fbfefbfcddbd3c492bc6bc60478500821c53846b7455b7efbdb31ba448125f58e6a972db2

              • C:\Windows\SysWOW64\Ckjknfnh.exe

                Filesize

                128KB

                MD5

                c9c2b1e2c9910a4a1af1c61d2c95a838

                SHA1

                dbc93723499645700dd1e53da1b77b05d60b28b8

                SHA256

                105e6ea61afe34d68fc5203ae82d58e1e434608ffa196538c91d8518d3192a8f

                SHA512

                a0fb60b433fe7e9d3e922cfd3de35f94e9eaf668cb9bb072fcbe62d794433cce073cb69ddc8f8c3f9e13e93b2ee57477391e2e44326a6210dc310d46da0f7213

              • C:\Windows\SysWOW64\Cpfcfmlp.exe

                Filesize

                128KB

                MD5

                b12d7448522b7de8a780e460658a2cd2

                SHA1

                6913a90c5605b26b111b4e5dd2c50edd020eff33

                SHA256

                464c4e9354cffd2fede1d23b85f5bcdecb3e52b528f17b4864e425f3eb421db5

                SHA512

                b6ffea758f258e884eccc00d039c3b87d25273e5558375127344c8b6ce0b832fc446f92407cb47474b92a1609cfead645f2fd49bed07329bdd2f615e8b7ef60f

              • C:\Windows\SysWOW64\Dmjmekgn.exe

                Filesize

                128KB

                MD5

                08cc2a1c3c4b51dcbae1f980066b98ac

                SHA1

                98686308a62ab5fac31c891b6d6751b0d5ef87fb

                SHA256

                d0528ff2afd2b3019b422f81bd72400925514e0d1f5076fba5496e4882aee2df

                SHA512

                f5885c2f9ac82e9abb52a819ae6fe5796a206ed2921979cb751488ac29601ac8b50b192e608c7f8e6cfb18ae5223d1bf435e639a3af2364c416d4ea854158681

              • C:\Windows\SysWOW64\Ebifmm32.exe

                Filesize

                128KB

                MD5

                43e6aa203442f9e6560bde54224b8cec

                SHA1

                75f315a4f9ada5e8fa1f256852c54f85884adea8

                SHA256

                029e416a35d9627381d8192e205661cc8b485f3640cc47b047f1272f993faa4d

                SHA512

                392ec6be08589be68fb2d839b941ef47ef9878cc280499dd707700021ef8fe969cbffe7d8936db1eb42829a0de6d0df62f3925c792c2fbaa6b6fd80d9dc3d763

              • C:\Windows\SysWOW64\Fgmdec32.exe

                Filesize

                128KB

                MD5

                4799f69c1cb5a28894ff6091d551e063

                SHA1

                6b3a8d68178961d39df33c73de862200740ae88f

                SHA256

                ed2a53c9324b56412f5d2b3eb9df7050bd0b01d7ec7b079fa6206fcf17fdb295

                SHA512

                bb1589dc5061d30cf8fe20778fd59f0c6f4610eb5c7d19d699151329550fbf88e402abf1ae90755ad3e7b507174670459686536edb2345f930b2c34f49e243b0

              • C:\Windows\SysWOW64\Fgoakc32.exe

                Filesize

                128KB

                MD5

                7d558ff1b355534326312bfc0dd6d225

                SHA1

                cfcf60aa6816b7c0ab0722ad93e81e1b96a17607

                SHA256

                e0a9bf29e3bb093e572a2bde3edbe06857c218b266d3750b948c4fd90bba83a0

                SHA512

                6152a00681f0984fe539012ac2125b2e28c4b247c7dd091952767b3dab3c3f2103aaa14018bc548959dd3acedcd0e429bf6463fd0d0a7e19caae20ace9e851fe

              • C:\Windows\SysWOW64\Fkofga32.exe

                Filesize

                128KB

                MD5

                78d35b44f54005b73a4741478a6963ab

                SHA1

                fa10dfe21b5ff744cfe6a66c320cf832030041a9

                SHA256

                a48a7307b842b78e355ad385f35c784320d0b8eea6bb8f7c557be0ab947c43bd

                SHA512

                ecdfa46d9fbdf408607e86285a4e30afd625535c7542ab91125425baf389f78a6744fe91d2c90f08aa2e85c5dcfbdb00ab7d2290e0dadb8c29f54d136220cf3f

              • C:\Windows\SysWOW64\Inebjihf.exe

                Filesize

                128KB

                MD5

                fb2d4971213287863440d0eca2adc39e

                SHA1

                bfa4d9fa204bf2884428e879850d21749d583cc9

                SHA256

                705e5e702156d8bc1acc9a6e717734ca5bbf32a0c627518462b742fe388d22fd

                SHA512

                50d7a52a9161482cde727c15310a03a8bcd526c4d3abc18ae377dd86dd53bfea0ca4e3263004cfa4613f1c7eaa4016180d2213b730d4c02f0c70294c579b0d5e

              • C:\Windows\SysWOW64\Jhplpl32.exe

                Filesize

                128KB

                MD5

                011d58d23a4e18ce5942da2f4d935dbd

                SHA1

                00a837ccdebd4ebb4ff810f6b6a567b1bebed91e

                SHA256

                9ccf96e6882d457f8dbef3c759e12dd606fb1864443bf1752713f28e893b04af

                SHA512

                71275f81d4d355065429602ae6a1c998cac028384338550cdd325e18ce2c34049a82dee1df03fc4296f3b4bd34d5c40b4f959a9e9013816dc0769f2fe233fb84

              • C:\Windows\SysWOW64\Kapfiqoj.exe

                Filesize

                128KB

                MD5

                1d2bc5aefa4b6658eae58b4dcfd9d112

                SHA1

                7a3b6dfa73894569b996c60e80faf623408230d8

                SHA256

                29d2b75db99fad1079ebfdebcf34d50bbcfefdff93d0dfadb31aeebb63201664

                SHA512

                2138452ef226381acd618c97e6d3da2735f126dd91fb730ac608f89296051c7c36a324972977e97577d767b647630857e13adaa1fb8b556eccbffbb7f1ad76ce

              • C:\Windows\SysWOW64\Kgiiiidd.exe

                Filesize

                128KB

                MD5

                87813827594b4af89fd1d39ae73079d1

                SHA1

                12a9d7cea613095e5d4ade3b977bd0676120673d

                SHA256

                d43687dd9125c8fde0ef560afd64d749b2d2ff205bba04a1da4c86f527f30942

                SHA512

                9374efa559ff26542626dcd9db47f0e0450c2d5b5b0ef0da45fe1aac0e2137ce90ca22581bb84f96d31b4b7e8503c15d0c0d691ec78b83ad0faabf46f473759c

              • C:\Windows\SysWOW64\Kpdjljdk.dll

                Filesize

                7KB

                MD5

                d641f3af48b7d39785dece2b3c3fd161

                SHA1

                b18d78e0c1c3183dc08fc3e55c5df1047f7aec18

                SHA256

                fdba2be613b4154642f87d1550ecb549558ae5c889b40d1b35d28a44dd960959

                SHA512

                7821909c22f0238120d3954dba82a9f23e4006f2fe5b03af1cf2ac4ff38d9461d6c74ea9e5e3c9c1f46ec970a1a517380b291a7abb039a751bab435ff8467746

              • C:\Windows\SysWOW64\Lcdciiec.exe

                Filesize

                128KB

                MD5

                5ddc7a755493d1b0298e7a585f3f4ed8

                SHA1

                f9fab5d805fd03a5393d4046ad9b6c486c009c89

                SHA256

                a42141802bb82e216c010d56a8b5a3448c41aafede4f550643454d1d15048531

                SHA512

                d93c6c772bd69bec75c911d94a3a741d0086f2bef8befcf4957436a203fd9ed0896fe630f33973750a343bdcd388af6a3206693bd744f73ae969719da6c4cf4a

              • C:\Windows\SysWOW64\Llodgnja.exe

                Filesize

                128KB

                MD5

                1b699337908dc716afa532909103c95a

                SHA1

                48e00603f9f3f1e9ebc23df5e7ac3315be5a4972

                SHA256

                fdc2000da8e3404431e11e5729e34eb2afa4452babb6dd702aa605c4709be54c

                SHA512

                90744e3be9717f7e6412e00363c3b6d00da98e389e569bed891bf5e5919129a67df71b722dee78d5ce1eae6f993a53208274eb7761b699248289cb8f902f8b02

              • C:\Windows\SysWOW64\Lnangaoa.exe

                Filesize

                128KB

                MD5

                273e07cca152bb2ff348cda2205e5aa2

                SHA1

                fa5c89db559934715026856e665a2a919f69f8da

                SHA256

                fbad38905cbdcf29300ef175f75203de3e26ee0b668f919b9c5fc8d99852d0ad

                SHA512

                70a1dc89b2d79c76ab0cb3020d07e7498d9925d03e5684349b3f993c0f45d5f35843b63ad2de1b081f6a28d53890d3742ddedebdd33b9bc0a213a422f35adb7b

              • C:\Windows\SysWOW64\Lokdnjkg.exe

                Filesize

                128KB

                MD5

                687e94d8791c32e9113d55c1462ded7f

                SHA1

                7e9a45771e1adebc2403654538fc0f917086d335

                SHA256

                8ede65e15a409fbb189394f9bd41e8ee01959b06fe0d2f7363a1586d780e1d29

                SHA512

                757ad1978afedcb16f71c886ccbabd8a11d65012b231a5c75fd8e526b80580dc4913857691bf7c1f2f261144f1efd94638e4a680cabfb7158eae19a54fbad7b6

              • C:\Windows\SysWOW64\Lokdnjkg.exe

                Filesize

                128KB

                MD5

                724564960269e52900d178c15c04b5c1

                SHA1

                62c75566ad9098c63a8246f7e8c5e2a9d3c99807

                SHA256

                e1455ad493d0aaeef4bfc05510a96b19c8033a5f37ef885e571c4b0400f21eaf

                SHA512

                727d71abe99dbb5ab30766e8e0f00f4480ce0e8d70f31ad4a3e7673d879f62ee0c70501b3a96b78eeadf57c51b0c192666a642ecb1e561095dc9ece4f458ed1c

              • C:\Windows\SysWOW64\Mcdeeq32.exe

                Filesize

                128KB

                MD5

                956a16453d136bc5ad3a32df3fecd4b6

                SHA1

                1cb59d474486e7a2735d12522ab5e95543091e37

                SHA256

                7d450094c020c542bf570fe0762d1d739e1371b82d03771df9b3f4db37e55aaa

                SHA512

                894dc0544f2160f0387c665ebbb7eccce2cff83d72cc06e5a1c9264722a99b745b52bb127c32c10d8445be782e702c227fea61706b8499d5f2176a20e26dfaae

              • C:\Windows\SysWOW64\Mnjqmpgg.exe

                Filesize

                128KB

                MD5

                685163223d751c5b898971c85bd20042

                SHA1

                d14d705d097fd828fcd8ba29b2560d9b104d4a64

                SHA256

                506fd3241e63a1ccade83ae76271d7930fa1a9a0282127b86926022d10e3cdf3

                SHA512

                2ccdb55d9101ba83872ab84a3a49cca1315c9bc40b0599b0be19687a467df953199a3cbd0a11f8b184a6c2e9e7687171775a92852ef786aff02527141d221898

              • C:\Windows\SysWOW64\Mogcihaj.exe

                Filesize

                128KB

                MD5

                6050fd3aae91d7387b63f3e2eda30575

                SHA1

                c587559d6d4dd59855ee0ab6d9c95f6c56626dc3

                SHA256

                1e4663686aa417b3d7d542c97e061285b774e3db5aecf27ffe0d01e15d0f5791

                SHA512

                ea0233e776cd20be689271c7403899448f6e5775bb7a5c7899ff06334c423c4385ef9f141555ffb5ebf5a486c2b45043e3fd4af0ccc4683cc305bf28ab3e6396

              • C:\Windows\SysWOW64\Moipoh32.exe

                Filesize

                128KB

                MD5

                726e19f7e944ca80ab363e37ed15c22e

                SHA1

                b7f04df116957f683ac05c9773d590c06a5fdcf6

                SHA256

                d611a5cc41a7426cb6a8ff27bb28d94d6e41f1807c8a75a4139ab6412c189d45

                SHA512

                3c14afd9ebdd47854cb34191e6c520dee76d177c434a296e6012cd2f32a0c483434c106b924ffb0115af183143850305b471e48e8f02b8018307b7a69432bd19

              • C:\Windows\SysWOW64\Moipoh32.exe

                Filesize

                128KB

                MD5

                b125c80540d1eefa76242bfc383d72d2

                SHA1

                f84d4f70531ebbf3faafadcfa716feb9a8c15b5d

                SHA256

                ee42ca78ccc23fc5dd619e0f76f169ca3d422085bdb5fa902d0dc0da64cf946f

                SHA512

                22221fcec072dbf6be68f220dbe362ae278a5c7f9fe64d3bfc953fa752d99e66141e69002adf1cf8fd34084d1e277034098cd451bf5686a4e5d761e3d4c869e7

              • C:\Windows\SysWOW64\Mqafhl32.exe

                Filesize

                128KB

                MD5

                5d9fd6cf9a9b3b5ed7d7d3b299ec6b95

                SHA1

                f8622d741bf9efe8a30a4eaa92b6e063202903c2

                SHA256

                06262073645308acd827024b687703fdfe9f941383961e5fef6dd5d56faadc8e

                SHA512

                4e6a7127c0720ca980d2831e39ca49b15d405d64127ff266b56fe1c68ad7e96a04afd2257e5924eafdb6e4e85bfbdca9de3271ffa14fa49051fa817543a3d4c1

              • C:\Windows\SysWOW64\Mqkiok32.exe

                Filesize

                128KB

                MD5

                dce992da6085eab072f7ccd71a30c5a8

                SHA1

                5e70e998febf37f94c2c5fd1610e4c47d6b5986e

                SHA256

                b8ddc33c32e1332366cb26aecfdc44fa632ce638c11f8879403136719e305ad0

                SHA512

                9fdaa9fc9b6fc4441d0c83962043813e5ee102f5215be6e1fce22c624d992742bc26a1355f396ad57e4544dc1c8a5d4e4e1ed6c6db3a24d76cdd4ac9c871c35f

              • C:\Windows\SysWOW64\Nadleilm.exe

                Filesize

                128KB

                MD5

                86c981c59b7430c9fa83f5b6e4d8170f

                SHA1

                23da91e997275b75ac0ada3402f0238b416c1cda

                SHA256

                aaadc7c12da8e942ba24c25ed6e23e8f23ba38e8403dc2e537cf7d6a4367f1d2

                SHA512

                d7feb239a726bddaae513b71f834031f73c524466d593eb9c0924bd10f54d1f0a169e06a5b43b3ffc15e197f637f6dd4977cd97ccf527fa175e91ee054d4de33

              • C:\Windows\SysWOW64\Nagiji32.exe

                Filesize

                128KB

                MD5

                bb901c846b1a3e64cf04cd2ab7e9ac2c

                SHA1

                dbb7cbd7051f4da849fd400085d609c91f4fd454

                SHA256

                d07977021523e2cb65e1f82a49210bedfead7d36babc19af7fe7adf91cdb9af2

                SHA512

                acc328b25ff2c7ab67866176c79c5f7d50107c3a8efaa912fcad7112ea3d7db38e73e6c413afa4d674d902fde86522a4c50ed393c2cdfd8dddab626333e8b857

              • C:\Windows\SysWOW64\Nmbjcljl.exe

                Filesize

                128KB

                MD5

                c33d4220a5536553b8b33699c132affc

                SHA1

                91c15882b12a163c5ff87dbadd7f13386c3fb8d3

                SHA256

                f29945ef109efabdfb84f9afaced8c421e4482dc0d74cd5c9d1a308350fef721

                SHA512

                88188df809b3cdf779f0549c942922866c9a2a5d6981cf1769a2a4d208312402a06019da9e5cadfe0876bced4acfcf3988a8852bde3232425054f19681397e45

              • C:\Windows\SysWOW64\Nmfcok32.exe

                Filesize

                128KB

                MD5

                c05712981a889591f250e1a99f8d91b9

                SHA1

                ff1571063671d4420a58d5167e86e24bc0577d06

                SHA256

                6312b3a9fcb1aa37d69ae1e2bddaccf6573a66a419d92cfb7c869decddb4e8c4

                SHA512

                124059f81cfb9c9e31531aa839a9a50e10fb7c549285e89f6a59869133f95b3271493da601e70b593f5442131b06d3c38ab220c3ce16b7193f5de9c9bf5d249a

              • C:\Windows\SysWOW64\Oabhfg32.exe

                Filesize

                128KB

                MD5

                a98c482b7b72de1ef259acb7b3c1a6fa

                SHA1

                a25f4426c3630f6346656aaebf024c4ec0d2edc0

                SHA256

                c9e02d5293c7d5f3f1bcc312e7f0c442626b9fe84dae5b056de10b5556ecd3c9

                SHA512

                b61561e1887aa4ca1fdef71bd3f50b636adb3de0d625f6fd874268b125b92463b95c6926b35d5b52bf11651870a78b81793454effd1811bd1fbbf7dac4700c53

              • C:\Windows\SysWOW64\Ojajin32.exe

                Filesize

                128KB

                MD5

                f29e03b84d960ae2bdfe2b921f902c64

                SHA1

                55271e6a0f2114f81122081109ed625a348b9d3d

                SHA256

                98654a9d6de16317d3f426cff94a73906ad1682be1d074d188b8811f6f5b6aed

                SHA512

                0521959fc4b5a34feeab77f13e2b434e089e5fc8fa8391285a0dc668317eb16dc18afdd96a841f468c9933c7b86929c53b3ce0420285cfb693afaea0b276eef5

              • C:\Windows\SysWOW64\Ojdgnn32.exe

                Filesize

                128KB

                MD5

                39d99e5d1ae00f84c196f543b2e0e2f1

                SHA1

                aad99820505776ab7c699c4eec4d956f0a9e02e1

                SHA256

                d9824e16ad54e85edc62f0f0079e0b84d31626c7ccbb05f99784f69569321780

                SHA512

                e608d4f9d615bc9477eb029a1b08c7891afee93667608a676bb43907cdc687780c7ae4cede8c5be626ba0eeec04ff4f2cf1958811038ad7c4058440ed000326f

              • C:\Windows\SysWOW64\Ojomcopk.exe

                Filesize

                128KB

                MD5

                61717a5c7b0036f63ce3ab14099b49b9

                SHA1

                5785d346ccbed52b04aed4303beb7e4958c81a3a

                SHA256

                54538b90b5085c47da9eb30fd50d324050581f575d4b6bf55e60938959f7c8bc

                SHA512

                564aa61ff026790ba53ac81ddbcababe82c30fa7986fdd23c6bf2cb476844afdf3af63ab2f9056f8a49447f0f20a7a06d4e0cd2b5661ceb733e6f02e68d655fb

              • C:\Windows\SysWOW64\Opclldhj.exe

                Filesize

                128KB

                MD5

                0d03959b5bc4528a0e87dc9a55bfef30

                SHA1

                9dd7bbc6dcaf148d387892b8434faa4ad49c348d

                SHA256

                2d4ea36880f688c58474a1ca802307dbfac1a00bd5ea4cae25b1caaa56f213c4

                SHA512

                50c0250363f7639a9ba407d2330dbc3f807b78cad7205e7505467c37cb2fe88d6c877fba737c196689cddf573297e52a6f26f9d2b7448f3feb81c38e23fbe14f

              • C:\Windows\SysWOW64\Pcegclgp.exe

                Filesize

                128KB

                MD5

                50b5af40f94aa1f01e641caeeade7377

                SHA1

                53217ee559bb27eaad5b458d522ca18b4e205de7

                SHA256

                75f30872a0bb7c4e76f797d669232d5e7131b76b958ac9e5b94cd1993a70aecb

                SHA512

                1504f49fa6fa7642af290ff6a50b290dfa378677d58b11506dd061fc4ba4afa42c982b5aa8a63f51fb5d84d7809d201ceaba5a241dc2a9921a2f5bacb995f8f7

              • C:\Windows\SysWOW64\Pdhkcb32.exe

                Filesize

                128KB

                MD5

                d8e4c2be76797e6324665102698d22ca

                SHA1

                bf7b4e81b6b753a2cdb8f42217b2940e8433be29

                SHA256

                eae1f5f0c112a2f1d8cac4563a3f2ddde2c3df8b6993e078997c2d479f37839a

                SHA512

                18e499b697f484bcf3153ae8874391d1286ae4e223a1fac04e8fac73d27a3e5dc26118481b4b75fb6966164e9c1902ebd530e74630b0e440c91d7acd0188d564

              • C:\Windows\SysWOW64\Pmiikh32.exe

                Filesize

                128KB

                MD5

                53f92b772742f931987e287c01972310

                SHA1

                2fc429acce73eb8e10b60a5cf1981e66e09514cf

                SHA256

                062cc9f3adbf78dd9432ab9c9a5a18378a567bba93636c0e4667394e9f30ad33

                SHA512

                f84b177f74827a93f22ac97f64279919e55c26a48ce8dd78f1cf8379cccc852204830140a6894b52a15f195e3caf4661ebc024fb9a315f5631e932492b2e4054

              • C:\Windows\SysWOW64\Pnifekmd.exe

                Filesize

                128KB

                MD5

                b9d8146a7ea755c19660b43cc2ee207a

                SHA1

                5c7578ce6ecb08bd9ce32783ac1c8e48d0f9c012

                SHA256

                ab0de698fbd18393b87e263f0dfcb1bc2a227b5ac7cbdb490e788c2cd605eac0

                SHA512

                1cab0c769e1ce92c99080f079794148252e2f72a3c0d37a4ca800829b354da700333b54685ad6d1bc74d1348c33414a72750446050bd6dd25fe7048e1f40d538

              • C:\Windows\SysWOW64\Pnifekmd.exe

                Filesize

                128KB

                MD5

                ed3f0a78f96ba51e65f4497558e08c56

                SHA1

                f1aa8f8e7492b7c61c9fe17056e77ec46aa3c4fa

                SHA256

                a120e8e1df05c25682549a2fd7e12be05465a989600bfadda98f9083d7cf842d

                SHA512

                07abe5f5a2b8c7342d61baf36e56b2f6b87e8b6e33e8eb45b8f51f02bef52c5601fc079d5ba5192d303f7bcf69e39114f25fd237a6e3cbf24320b7b10d5a18c8

              • C:\Windows\SysWOW64\Qjfmkk32.exe

                Filesize

                128KB

                MD5

                cd366ef16d7db7a7147d5d33721c4366

                SHA1

                6aae041d4b009e5f64dd66b9d276df7a16b60b01

                SHA256

                36ab70afb56ed460eb9c5a653bdaac5ed9ee03a4305d93ac4d58fe9cb747cdc5

                SHA512

                73cfc9af30fa8906a7a28ee35d3b6f81844c51b496f4668f1ca9f82a5715d00e6b8f372d5b411d70eb4832d0110bf48a89df2bc637893e934d77b0fafe0fa827

              • C:\Windows\SysWOW64\Qjfmkk32.exe

                Filesize

                128KB

                MD5

                7d915685951e31bb767f09831e2229f7

                SHA1

                e558375acd89ed2ef6edc6f361db0f79d9b3601e

                SHA256

                173106585a37a5096905f215870bf1431477fe2467f6f5113766e40d86c1eff1

                SHA512

                ee1c483a0cda6088f462a3e6cccb0fa7f97f258479a7824742013b298e2c2644c4a73a997e3a2f4f1f457d2911b9b938871afd4a02896fda0cc713c419e7435c

              • memory/436-151-0x0000000000400000-0x0000000000441000-memory.dmp

                Filesize

                260KB

              • memory/452-135-0x0000000000400000-0x0000000000441000-memory.dmp

                Filesize

                260KB

              • memory/456-208-0x0000000000400000-0x0000000000441000-memory.dmp

                Filesize

                260KB

              • memory/964-48-0x0000000000400000-0x0000000000441000-memory.dmp

                Filesize

                260KB

              • memory/972-199-0x0000000000400000-0x0000000000441000-memory.dmp

                Filesize

                260KB

              • memory/1100-268-0x0000000000400000-0x0000000000441000-memory.dmp

                Filesize

                260KB

              • memory/1240-15-0x0000000000400000-0x0000000000441000-memory.dmp

                Filesize

                260KB

              • memory/1316-274-0x0000000000400000-0x0000000000441000-memory.dmp

                Filesize

                260KB

              • memory/1480-103-0x0000000000400000-0x0000000000441000-memory.dmp

                Filesize

                260KB

              • memory/1544-63-0x0000000000400000-0x0000000000441000-memory.dmp

                Filesize

                260KB

              • memory/1556-316-0x0000000000400000-0x0000000000441000-memory.dmp

                Filesize

                260KB

              • memory/1704-127-0x0000000000400000-0x0000000000441000-memory.dmp

                Filesize

                260KB

              • memory/1708-95-0x0000000000400000-0x0000000000441000-memory.dmp

                Filesize

                260KB

              • memory/1884-292-0x0000000000400000-0x0000000000441000-memory.dmp

                Filesize

                260KB

              • memory/1956-280-0x0000000000400000-0x0000000000441000-memory.dmp

                Filesize

                260KB

              • memory/2008-87-0x0000000000400000-0x0000000000441000-memory.dmp

                Filesize

                260KB

              • memory/2084-328-0x0000000000400000-0x0000000000441000-memory.dmp

                Filesize

                260KB

              • memory/2144-232-0x0000000000400000-0x0000000000441000-memory.dmp

                Filesize

                260KB

              • memory/2164-362-0x0000000000400000-0x0000000000441000-memory.dmp

                Filesize

                260KB

              • memory/2232-340-0x0000000000400000-0x0000000000441000-memory.dmp

                Filesize

                260KB

              • memory/2484-368-0x0000000000400000-0x0000000000441000-memory.dmp

                Filesize

                260KB

              • memory/2716-31-0x0000000000400000-0x0000000000441000-memory.dmp

                Filesize

                260KB

              • memory/2724-23-0x0000000000400000-0x0000000000441000-memory.dmp

                Filesize

                260KB

              • memory/2728-286-0x0000000000400000-0x0000000000441000-memory.dmp

                Filesize

                260KB

              • memory/2852-334-0x0000000000400000-0x0000000000441000-memory.dmp

                Filesize

                260KB

              • memory/2876-262-0x0000000000400000-0x0000000000441000-memory.dmp

                Filesize

                260KB

              • memory/2892-8-0x0000000000400000-0x0000000000441000-memory.dmp

                Filesize

                260KB

              • memory/2980-175-0x0000000000400000-0x0000000000441000-memory.dmp

                Filesize

                260KB

              • memory/3044-192-0x0000000000400000-0x0000000000441000-memory.dmp

                Filesize

                260KB

              • memory/3076-184-0x0000000000400000-0x0000000000441000-memory.dmp

                Filesize

                260KB

              • memory/3224-346-0x0000000000400000-0x0000000000441000-memory.dmp

                Filesize

                260KB

              • memory/3364-224-0x0000000000400000-0x0000000000441000-memory.dmp

                Filesize

                260KB

              • memory/3396-240-0x0000000000400000-0x0000000000441000-memory.dmp

                Filesize

                260KB

              • memory/3428-72-0x0000000000400000-0x0000000000441000-memory.dmp

                Filesize

                260KB

              • memory/3564-0-0x0000000000400000-0x0000000000441000-memory.dmp

                Filesize

                260KB

              • memory/3660-56-0x0000000000400000-0x0000000000441000-memory.dmp

                Filesize

                260KB

              • memory/3836-79-0x0000000000400000-0x0000000000441000-memory.dmp

                Filesize

                260KB

              • memory/3864-40-0x0000000000400000-0x0000000000441000-memory.dmp

                Filesize

                260KB

              • memory/4072-168-0x0000000000400000-0x0000000000441000-memory.dmp

                Filesize

                260KB

              • memory/4136-111-0x0000000000400000-0x0000000000441000-memory.dmp

                Filesize

                260KB

              • memory/4184-256-0x0000000000400000-0x0000000000441000-memory.dmp

                Filesize

                260KB

              • memory/4284-370-0x0000000000400000-0x0000000000441000-memory.dmp

                Filesize

                260KB

              • memory/4348-143-0x0000000000400000-0x0000000000441000-memory.dmp

                Filesize

                260KB

              • memory/4364-310-0x0000000000400000-0x0000000000441000-memory.dmp

                Filesize

                260KB

              • memory/4412-352-0x0000000000400000-0x0000000000441000-memory.dmp

                Filesize

                260KB

              • memory/4428-120-0x0000000000400000-0x0000000000441000-memory.dmp

                Filesize

                260KB

              • memory/4536-298-0x0000000000400000-0x0000000000441000-memory.dmp

                Filesize

                260KB

              • memory/4584-216-0x0000000000400000-0x0000000000441000-memory.dmp

                Filesize

                260KB

              • memory/4592-304-0x0000000000400000-0x0000000000441000-memory.dmp

                Filesize

                260KB

              • memory/4648-322-0x0000000000400000-0x0000000000441000-memory.dmp

                Filesize

                260KB

              • memory/4788-248-0x0000000000400000-0x0000000000441000-memory.dmp

                Filesize

                260KB

              • memory/4988-160-0x0000000000400000-0x0000000000441000-memory.dmp

                Filesize

                260KB

              • memory/5140-376-0x0000000000400000-0x0000000000441000-memory.dmp

                Filesize

                260KB

              • memory/5180-382-0x0000000000400000-0x0000000000441000-memory.dmp

                Filesize

                260KB

              • memory/5220-388-0x0000000000400000-0x0000000000441000-memory.dmp

                Filesize

                260KB

              • memory/5264-394-0x0000000000400000-0x0000000000441000-memory.dmp

                Filesize

                260KB

              • memory/5304-400-0x0000000000400000-0x0000000000441000-memory.dmp

                Filesize

                260KB

              • memory/5348-406-0x0000000000400000-0x0000000000441000-memory.dmp

                Filesize

                260KB

              • memory/5388-412-0x0000000000400000-0x0000000000441000-memory.dmp

                Filesize

                260KB

              • memory/5432-421-0x0000000000400000-0x0000000000441000-memory.dmp

                Filesize

                260KB

              • memory/5476-424-0x0000000000400000-0x0000000000441000-memory.dmp

                Filesize

                260KB

              • memory/5516-430-0x0000000000400000-0x0000000000441000-memory.dmp

                Filesize

                260KB

              • memory/5556-436-0x0000000000400000-0x0000000000441000-memory.dmp

                Filesize

                260KB

              • memory/5596-442-0x0000000000400000-0x0000000000441000-memory.dmp

                Filesize

                260KB