Analysis

  • max time kernel
    146s
  • max time network
    153s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240226-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system
  • submitted
    08/03/2024, 04:47

General

  • Target

    ba8da5e99156099ef77d18f434abed16.exe

  • Size

    444KB

  • MD5

    ba8da5e99156099ef77d18f434abed16

  • SHA1

    b57a207563fef400b4cba97588e2dfe9aee80bb0

  • SHA256

    938556c5e0eaf4f365be9a6a35eabcc6473728b2602aedfe3b532731ea039b2f

  • SHA512

    0d7fdfc915516646b3fbc5d8d4a5a9162e91abf28a27fb05e5469828f9e3ba2fa8d9d4939ec9a63b62a2d8b9836ca08aab1e23773bfd4f5531d4340e51aa6329

  • SSDEEP

    6144:LLS+VJ0fmu40GfApOaHcKvjMlaE2tu40GfApOaHcKLb0X1r3mvu40GfApOaHcKvE:lVJ2llHZjKa0llHR0FLvllHZjKa0llH

Score
10/10

Malware Config

Signatures

  • Adds autorun key to be loaded by Explorer.exe on startup 2 TTPs 64 IoCs
  • Executes dropped EXE 64 IoCs
  • Drops file in System32 directory 64 IoCs
  • Program crash 1 IoCs
  • Modifies registry class 64 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\ba8da5e99156099ef77d18f434abed16.exe
    "C:\Users\Admin\AppData\Local\Temp\ba8da5e99156099ef77d18f434abed16.exe"
    1⤵
    • Drops file in System32 directory
    • Modifies registry class
    • Suspicious use of WriteProcessMemory
    PID:4232
    • C:\Windows\SysWOW64\Ibojncfj.exe
      C:\Windows\system32\Ibojncfj.exe
      2⤵
      • Adds autorun key to be loaded by Explorer.exe on startup
      • Executes dropped EXE
      • Modifies registry class
      • Suspicious use of WriteProcessMemory
      PID:3344
      • C:\Windows\SysWOW64\Imdnklfp.exe
        C:\Windows\system32\Imdnklfp.exe
        3⤵
        • Adds autorun key to be loaded by Explorer.exe on startup
        • Executes dropped EXE
        • Drops file in System32 directory
        • Modifies registry class
        • Suspicious use of WriteProcessMemory
        PID:212
        • C:\Windows\SysWOW64\Ipckgh32.exe
          C:\Windows\system32\Ipckgh32.exe
          4⤵
          • Executes dropped EXE
          • Modifies registry class
          • Suspicious use of WriteProcessMemory
          PID:4664
          • C:\Windows\SysWOW64\Imgkql32.exe
            C:\Windows\system32\Imgkql32.exe
            5⤵
            • Adds autorun key to be loaded by Explorer.exe on startup
            • Executes dropped EXE
            • Drops file in System32 directory
            • Suspicious use of WriteProcessMemory
            PID:4940
            • C:\Windows\SysWOW64\Idacmfkj.exe
              C:\Windows\system32\Idacmfkj.exe
              6⤵
              • Executes dropped EXE
              • Drops file in System32 directory
              • Modifies registry class
              • Suspicious use of WriteProcessMemory
              PID:2428
              • C:\Windows\SysWOW64\Iinlemia.exe
                C:\Windows\system32\Iinlemia.exe
                7⤵
                • Adds autorun key to be loaded by Explorer.exe on startup
                • Executes dropped EXE
                • Drops file in System32 directory
                • Suspicious use of WriteProcessMemory
                PID:5052
                • C:\Windows\SysWOW64\Jdcpcf32.exe
                  C:\Windows\system32\Jdcpcf32.exe
                  8⤵
                  • Adds autorun key to be loaded by Explorer.exe on startup
                  • Executes dropped EXE
                  • Drops file in System32 directory
                  • Suspicious use of WriteProcessMemory
                  PID:3200
                  • C:\Windows\SysWOW64\Jiphkm32.exe
                    C:\Windows\system32\Jiphkm32.exe
                    9⤵
                    • Adds autorun key to be loaded by Explorer.exe on startup
                    • Executes dropped EXE
                    • Drops file in System32 directory
                    • Suspicious use of WriteProcessMemory
                    PID:3692
                    • C:\Windows\SysWOW64\Jagqlj32.exe
                      C:\Windows\system32\Jagqlj32.exe
                      10⤵
                      • Adds autorun key to be loaded by Explorer.exe on startup
                      • Executes dropped EXE
                      • Drops file in System32 directory
                      • Modifies registry class
                      • Suspicious use of WriteProcessMemory
                      PID:4432
                      • C:\Windows\SysWOW64\Jbhmdbnp.exe
                        C:\Windows\system32\Jbhmdbnp.exe
                        11⤵
                        • Adds autorun key to be loaded by Explorer.exe on startup
                        • Executes dropped EXE
                        • Modifies registry class
                        • Suspicious use of WriteProcessMemory
                        PID:3732
                        • C:\Windows\SysWOW64\Jibeql32.exe
                          C:\Windows\system32\Jibeql32.exe
                          12⤵
                          • Adds autorun key to be loaded by Explorer.exe on startup
                          • Executes dropped EXE
                          • Drops file in System32 directory
                          • Suspicious use of WriteProcessMemory
                          PID:1588
                          • C:\Windows\SysWOW64\Jbkjjblm.exe
                            C:\Windows\system32\Jbkjjblm.exe
                            13⤵
                            • Executes dropped EXE
                            • Modifies registry class
                            • Suspicious use of WriteProcessMemory
                            PID:4608
                            • C:\Windows\SysWOW64\Jbmfoa32.exe
                              C:\Windows\system32\Jbmfoa32.exe
                              14⤵
                              • Executes dropped EXE
                              • Drops file in System32 directory
                              • Modifies registry class
                              • Suspicious use of WriteProcessMemory
                              PID:372
                              • C:\Windows\SysWOW64\Jfhbppbc.exe
                                C:\Windows\system32\Jfhbppbc.exe
                                15⤵
                                • Adds autorun key to be loaded by Explorer.exe on startup
                                • Executes dropped EXE
                                • Drops file in System32 directory
                                • Modifies registry class
                                • Suspicious use of WriteProcessMemory
                                PID:3148
                                • C:\Windows\SysWOW64\Jangmibi.exe
                                  C:\Windows\system32\Jangmibi.exe
                                  16⤵
                                  • Adds autorun key to be loaded by Explorer.exe on startup
                                  • Executes dropped EXE
                                  • Drops file in System32 directory
                                  • Modifies registry class
                                  • Suspicious use of WriteProcessMemory
                                  PID:4568
                                  • C:\Windows\SysWOW64\Jkfkfohj.exe
                                    C:\Windows\system32\Jkfkfohj.exe
                                    17⤵
                                    • Adds autorun key to be loaded by Explorer.exe on startup
                                    • Executes dropped EXE
                                    • Modifies registry class
                                    • Suspicious use of WriteProcessMemory
                                    PID:848
                                    • C:\Windows\SysWOW64\Kaqcbi32.exe
                                      C:\Windows\system32\Kaqcbi32.exe
                                      18⤵
                                      • Adds autorun key to be loaded by Explorer.exe on startup
                                      • Executes dropped EXE
                                      • Drops file in System32 directory
                                      • Modifies registry class
                                      • Suspicious use of WriteProcessMemory
                                      PID:3576
                                      • C:\Windows\SysWOW64\Kdopod32.exe
                                        C:\Windows\system32\Kdopod32.exe
                                        19⤵
                                        • Adds autorun key to be loaded by Explorer.exe on startup
                                        • Executes dropped EXE
                                        • Drops file in System32 directory
                                        • Modifies registry class
                                        • Suspicious use of WriteProcessMemory
                                        PID:3548
                                        • C:\Windows\SysWOW64\Kilhgk32.exe
                                          C:\Windows\system32\Kilhgk32.exe
                                          20⤵
                                          • Adds autorun key to be loaded by Explorer.exe on startup
                                          • Executes dropped EXE
                                          • Drops file in System32 directory
                                          • Modifies registry class
                                          • Suspicious use of WriteProcessMemory
                                          PID:624
                                          • C:\Windows\SysWOW64\Kpepcedo.exe
                                            C:\Windows\system32\Kpepcedo.exe
                                            21⤵
                                            • Adds autorun key to be loaded by Explorer.exe on startup
                                            • Executes dropped EXE
                                            • Drops file in System32 directory
                                            • Modifies registry class
                                            • Suspicious use of WriteProcessMemory
                                            PID:2908
                                            • C:\Windows\SysWOW64\Kaemnhla.exe
                                              C:\Windows\system32\Kaemnhla.exe
                                              22⤵
                                              • Adds autorun key to be loaded by Explorer.exe on startup
                                              • Executes dropped EXE
                                              • Suspicious use of WriteProcessMemory
                                              PID:4712
                                              • C:\Windows\SysWOW64\Kknafn32.exe
                                                C:\Windows\system32\Kknafn32.exe
                                                23⤵
                                                • Adds autorun key to be loaded by Explorer.exe on startup
                                                • Executes dropped EXE
                                                • Drops file in System32 directory
                                                • Modifies registry class
                                                PID:412
                                                • C:\Windows\SysWOW64\Kmlnbi32.exe
                                                  C:\Windows\system32\Kmlnbi32.exe
                                                  24⤵
                                                  • Adds autorun key to be loaded by Explorer.exe on startup
                                                  • Executes dropped EXE
                                                  • Modifies registry class
                                                  PID:1856
                                                  • C:\Windows\SysWOW64\Kdffocib.exe
                                                    C:\Windows\system32\Kdffocib.exe
                                                    25⤵
                                                    • Executes dropped EXE
                                                    • Drops file in System32 directory
                                                    PID:3756
                                                    • C:\Windows\SysWOW64\Kajfig32.exe
                                                      C:\Windows\system32\Kajfig32.exe
                                                      26⤵
                                                      • Adds autorun key to be loaded by Explorer.exe on startup
                                                      • Executes dropped EXE
                                                      • Modifies registry class
                                                      PID:2976
                                                      • C:\Windows\SysWOW64\Kgfoan32.exe
                                                        C:\Windows\system32\Kgfoan32.exe
                                                        27⤵
                                                        • Adds autorun key to be loaded by Explorer.exe on startup
                                                        • Executes dropped EXE
                                                        • Drops file in System32 directory
                                                        • Modifies registry class
                                                        PID:4688
                                                        • C:\Windows\SysWOW64\Ldkojb32.exe
                                                          C:\Windows\system32\Ldkojb32.exe
                                                          28⤵
                                                          • Adds autorun key to be loaded by Explorer.exe on startup
                                                          • Executes dropped EXE
                                                          PID:2972
                                                          • C:\Windows\SysWOW64\Lkdggmlj.exe
                                                            C:\Windows\system32\Lkdggmlj.exe
                                                            29⤵
                                                            • Adds autorun key to be loaded by Explorer.exe on startup
                                                            • Executes dropped EXE
                                                            • Modifies registry class
                                                            PID:3432
                                                            • C:\Windows\SysWOW64\Lcpllo32.exe
                                                              C:\Windows\system32\Lcpllo32.exe
                                                              30⤵
                                                              • Adds autorun key to be loaded by Explorer.exe on startup
                                                              • Executes dropped EXE
                                                              • Drops file in System32 directory
                                                              PID:4472
                                                              • C:\Windows\SysWOW64\Lijdhiaa.exe
                                                                C:\Windows\system32\Lijdhiaa.exe
                                                                31⤵
                                                                • Adds autorun key to be loaded by Explorer.exe on startup
                                                                • Executes dropped EXE
                                                                PID:1692
                                                                • C:\Windows\SysWOW64\Lpcmec32.exe
                                                                  C:\Windows\system32\Lpcmec32.exe
                                                                  32⤵
                                                                  • Adds autorun key to be loaded by Explorer.exe on startup
                                                                  • Executes dropped EXE
                                                                  • Drops file in System32 directory
                                                                  • Modifies registry class
                                                                  PID:4628
                                                                  • C:\Windows\SysWOW64\Lgneampk.exe
                                                                    C:\Windows\system32\Lgneampk.exe
                                                                    33⤵
                                                                    • Adds autorun key to be loaded by Explorer.exe on startup
                                                                    • Executes dropped EXE
                                                                    • Drops file in System32 directory
                                                                    • Modifies registry class
                                                                    PID:820
                                                                    • C:\Windows\SysWOW64\Lnhmng32.exe
                                                                      C:\Windows\system32\Lnhmng32.exe
                                                                      34⤵
                                                                      • Executes dropped EXE
                                                                      • Modifies registry class
                                                                      PID:2704
                                                                      • C:\Windows\SysWOW64\Lpfijcfl.exe
                                                                        C:\Windows\system32\Lpfijcfl.exe
                                                                        35⤵
                                                                        • Adds autorun key to be loaded by Explorer.exe on startup
                                                                        • Executes dropped EXE
                                                                        • Modifies registry class
                                                                        PID:4992
                                                                        • C:\Windows\SysWOW64\Lcdegnep.exe
                                                                          C:\Windows\system32\Lcdegnep.exe
                                                                          36⤵
                                                                          • Adds autorun key to be loaded by Explorer.exe on startup
                                                                          • Executes dropped EXE
                                                                          PID:1688
                                                                          • C:\Windows\SysWOW64\Ljnnch32.exe
                                                                            C:\Windows\system32\Ljnnch32.exe
                                                                            37⤵
                                                                            • Adds autorun key to be loaded by Explorer.exe on startup
                                                                            • Executes dropped EXE
                                                                            • Modifies registry class
                                                                            PID:3720
                                                                            • C:\Windows\SysWOW64\Laefdf32.exe
                                                                              C:\Windows\system32\Laefdf32.exe
                                                                              38⤵
                                                                              • Adds autorun key to be loaded by Explorer.exe on startup
                                                                              • Executes dropped EXE
                                                                              • Modifies registry class
                                                                              PID:1632
                                                                              • C:\Windows\SysWOW64\Lphfpbdi.exe
                                                                                C:\Windows\system32\Lphfpbdi.exe
                                                                                39⤵
                                                                                • Adds autorun key to be loaded by Explorer.exe on startup
                                                                                • Executes dropped EXE
                                                                                • Modifies registry class
                                                                                PID:540
                                                                                • C:\Windows\SysWOW64\Lcgblncm.exe
                                                                                  C:\Windows\system32\Lcgblncm.exe
                                                                                  40⤵
                                                                                  • Executes dropped EXE
                                                                                  • Drops file in System32 directory
                                                                                  • Modifies registry class
                                                                                  PID:1300
                                                                                  • C:\Windows\SysWOW64\Lknjmkdo.exe
                                                                                    C:\Windows\system32\Lknjmkdo.exe
                                                                                    41⤵
                                                                                    • Adds autorun key to be loaded by Explorer.exe on startup
                                                                                    • Executes dropped EXE
                                                                                    • Drops file in System32 directory
                                                                                    PID:3268
                                                                                    • C:\Windows\SysWOW64\Mjqjih32.exe
                                                                                      C:\Windows\system32\Mjqjih32.exe
                                                                                      42⤵
                                                                                      • Adds autorun key to be loaded by Explorer.exe on startup
                                                                                      • Executes dropped EXE
                                                                                      • Drops file in System32 directory
                                                                                      • Modifies registry class
                                                                                      PID:2252
                                                                                      • C:\Windows\SysWOW64\Mahbje32.exe
                                                                                        C:\Windows\system32\Mahbje32.exe
                                                                                        43⤵
                                                                                        • Adds autorun key to be loaded by Explorer.exe on startup
                                                                                        • Executes dropped EXE
                                                                                        • Drops file in System32 directory
                                                                                        • Modifies registry class
                                                                                        PID:2452
                                                                                        • C:\Windows\SysWOW64\Mdfofakp.exe
                                                                                          C:\Windows\system32\Mdfofakp.exe
                                                                                          44⤵
                                                                                          • Executes dropped EXE
                                                                                          • Drops file in System32 directory
                                                                                          • Modifies registry class
                                                                                          PID:3212
                                                                                          • C:\Windows\SysWOW64\Mnocof32.exe
                                                                                            C:\Windows\system32\Mnocof32.exe
                                                                                            45⤵
                                                                                            • Adds autorun key to be loaded by Explorer.exe on startup
                                                                                            • Executes dropped EXE
                                                                                            • Modifies registry class
                                                                                            PID:3380
                                                                                            • C:\Windows\SysWOW64\Mpmokb32.exe
                                                                                              C:\Windows\system32\Mpmokb32.exe
                                                                                              46⤵
                                                                                              • Executes dropped EXE
                                                                                              • Modifies registry class
                                                                                              PID:3772
                                                                                              • C:\Windows\SysWOW64\Mcklgm32.exe
                                                                                                C:\Windows\system32\Mcklgm32.exe
                                                                                                47⤵
                                                                                                • Executes dropped EXE
                                                                                                • Drops file in System32 directory
                                                                                                • Modifies registry class
                                                                                                PID:3540
                                                                                                • C:\Windows\SysWOW64\Mkbchk32.exe
                                                                                                  C:\Windows\system32\Mkbchk32.exe
                                                                                                  48⤵
                                                                                                  • Adds autorun key to be loaded by Explorer.exe on startup
                                                                                                  • Executes dropped EXE
                                                                                                  • Drops file in System32 directory
                                                                                                  PID:1964
                                                                                                  • C:\Windows\SysWOW64\Mnapdf32.exe
                                                                                                    C:\Windows\system32\Mnapdf32.exe
                                                                                                    49⤵
                                                                                                    • Adds autorun key to be loaded by Explorer.exe on startup
                                                                                                    • Executes dropped EXE
                                                                                                    • Modifies registry class
                                                                                                    PID:4624
                                                                                                    • C:\Windows\SysWOW64\Mamleegg.exe
                                                                                                      C:\Windows\system32\Mamleegg.exe
                                                                                                      50⤵
                                                                                                      • Adds autorun key to be loaded by Explorer.exe on startup
                                                                                                      • Executes dropped EXE
                                                                                                      • Drops file in System32 directory
                                                                                                      PID:4504
                                                                                                      • C:\Windows\SysWOW64\Mgidml32.exe
                                                                                                        C:\Windows\system32\Mgidml32.exe
                                                                                                        51⤵
                                                                                                        • Adds autorun key to be loaded by Explorer.exe on startup
                                                                                                        • Executes dropped EXE
                                                                                                        PID:3796
                                                                                                        • C:\Windows\SysWOW64\Mncmjfmk.exe
                                                                                                          C:\Windows\system32\Mncmjfmk.exe
                                                                                                          52⤵
                                                                                                          • Executes dropped EXE
                                                                                                          • Drops file in System32 directory
                                                                                                          • Modifies registry class
                                                                                                          PID:2424
                                                                                                          • C:\Windows\SysWOW64\Mpaifalo.exe
                                                                                                            C:\Windows\system32\Mpaifalo.exe
                                                                                                            53⤵
                                                                                                            • Executes dropped EXE
                                                                                                            • Drops file in System32 directory
                                                                                                            • Modifies registry class
                                                                                                            PID:4648
                                                                                                            • C:\Windows\SysWOW64\Mcpebmkb.exe
                                                                                                              C:\Windows\system32\Mcpebmkb.exe
                                                                                                              54⤵
                                                                                                              • Adds autorun key to be loaded by Explorer.exe on startup
                                                                                                              • Executes dropped EXE
                                                                                                              • Drops file in System32 directory
                                                                                                              • Modifies registry class
                                                                                                              PID:3932
                                                                                                              • C:\Windows\SysWOW64\Mnfipekh.exe
                                                                                                                C:\Windows\system32\Mnfipekh.exe
                                                                                                                55⤵
                                                                                                                • Adds autorun key to be loaded by Explorer.exe on startup
                                                                                                                • Executes dropped EXE
                                                                                                                PID:1680
                                                                                                                • C:\Windows\SysWOW64\Mpdelajl.exe
                                                                                                                  C:\Windows\system32\Mpdelajl.exe
                                                                                                                  56⤵
                                                                                                                  • Adds autorun key to be loaded by Explorer.exe on startup
                                                                                                                  • Executes dropped EXE
                                                                                                                  • Drops file in System32 directory
                                                                                                                  • Modifies registry class
                                                                                                                  PID:4848
                                                                                                                  • C:\Windows\SysWOW64\Mcbahlip.exe
                                                                                                                    C:\Windows\system32\Mcbahlip.exe
                                                                                                                    57⤵
                                                                                                                    • Adds autorun key to be loaded by Explorer.exe on startup
                                                                                                                    • Executes dropped EXE
                                                                                                                    • Drops file in System32 directory
                                                                                                                    PID:640
                                                                                                                    • C:\Windows\SysWOW64\Nkjjij32.exe
                                                                                                                      C:\Windows\system32\Nkjjij32.exe
                                                                                                                      58⤵
                                                                                                                      • Adds autorun key to be loaded by Explorer.exe on startup
                                                                                                                      • Executes dropped EXE
                                                                                                                      • Drops file in System32 directory
                                                                                                                      • Modifies registry class
                                                                                                                      PID:972
                                                                                                                      • C:\Windows\SysWOW64\Nqfbaq32.exe
                                                                                                                        C:\Windows\system32\Nqfbaq32.exe
                                                                                                                        59⤵
                                                                                                                        • Adds autorun key to be loaded by Explorer.exe on startup
                                                                                                                        • Executes dropped EXE
                                                                                                                        • Modifies registry class
                                                                                                                        PID:1640
                                                                                                                        • C:\Windows\SysWOW64\Ngpjnkpf.exe
                                                                                                                          C:\Windows\system32\Ngpjnkpf.exe
                                                                                                                          60⤵
                                                                                                                          • Adds autorun key to be loaded by Explorer.exe on startup
                                                                                                                          • Executes dropped EXE
                                                                                                                          PID:4136
                                                                                                                          • C:\Windows\SysWOW64\Njogjfoj.exe
                                                                                                                            C:\Windows\system32\Njogjfoj.exe
                                                                                                                            61⤵
                                                                                                                            • Adds autorun key to be loaded by Explorer.exe on startup
                                                                                                                            • Executes dropped EXE
                                                                                                                            • Drops file in System32 directory
                                                                                                                            PID:544
                                                                                                                            • C:\Windows\SysWOW64\Nafokcol.exe
                                                                                                                              C:\Windows\system32\Nafokcol.exe
                                                                                                                              62⤵
                                                                                                                              • Adds autorun key to be loaded by Explorer.exe on startup
                                                                                                                              • Executes dropped EXE
                                                                                                                              • Drops file in System32 directory
                                                                                                                              PID:3316
                                                                                                                              • C:\Windows\SysWOW64\Ncgkcl32.exe
                                                                                                                                C:\Windows\system32\Ncgkcl32.exe
                                                                                                                                63⤵
                                                                                                                                • Executes dropped EXE
                                                                                                                                • Drops file in System32 directory
                                                                                                                                PID:3080
                                                                                                                                • C:\Windows\SysWOW64\Ngcgcjnc.exe
                                                                                                                                  C:\Windows\system32\Ngcgcjnc.exe
                                                                                                                                  64⤵
                                                                                                                                  • Adds autorun key to be loaded by Explorer.exe on startup
                                                                                                                                  • Executes dropped EXE
                                                                                                                                  • Modifies registry class
                                                                                                                                  PID:960
                                                                                                                                  • C:\Windows\SysWOW64\Njacpf32.exe
                                                                                                                                    C:\Windows\system32\Njacpf32.exe
                                                                                                                                    65⤵
                                                                                                                                    • Adds autorun key to be loaded by Explorer.exe on startup
                                                                                                                                    • Executes dropped EXE
                                                                                                                                    • Drops file in System32 directory
                                                                                                                                    • Modifies registry class
                                                                                                                                    PID:1820
                                                                                                                                    • C:\Windows\SysWOW64\Nbhkac32.exe
                                                                                                                                      C:\Windows\system32\Nbhkac32.exe
                                                                                                                                      66⤵
                                                                                                                                      • Adds autorun key to be loaded by Explorer.exe on startup
                                                                                                                                      • Drops file in System32 directory
                                                                                                                                      • Modifies registry class
                                                                                                                                      PID:4768
                                                                                                                                      • C:\Windows\SysWOW64\Ndghmo32.exe
                                                                                                                                        C:\Windows\system32\Ndghmo32.exe
                                                                                                                                        67⤵
                                                                                                                                        • Adds autorun key to be loaded by Explorer.exe on startup
                                                                                                                                        PID:1044
                                                                                                                                        • C:\Windows\SysWOW64\Ngedij32.exe
                                                                                                                                          C:\Windows\system32\Ngedij32.exe
                                                                                                                                          68⤵
                                                                                                                                          • Adds autorun key to be loaded by Explorer.exe on startup
                                                                                                                                          • Drops file in System32 directory
                                                                                                                                          • Modifies registry class
                                                                                                                                          PID:4816
                                                                                                                                          • C:\Windows\SysWOW64\Njcpee32.exe
                                                                                                                                            C:\Windows\system32\Njcpee32.exe
                                                                                                                                            69⤵
                                                                                                                                            • Drops file in System32 directory
                                                                                                                                            PID:5060
                                                                                                                                            • C:\Windows\SysWOW64\Nqmhbpba.exe
                                                                                                                                              C:\Windows\system32\Nqmhbpba.exe
                                                                                                                                              70⤵
                                                                                                                                              • Adds autorun key to be loaded by Explorer.exe on startup
                                                                                                                                              • Drops file in System32 directory
                                                                                                                                              • Modifies registry class
                                                                                                                                              PID:4948
                                                                                                                                              • C:\Windows\SysWOW64\Ndidbn32.exe
                                                                                                                                                C:\Windows\system32\Ndidbn32.exe
                                                                                                                                                71⤵
                                                                                                                                                • Adds autorun key to be loaded by Explorer.exe on startup
                                                                                                                                                • Drops file in System32 directory
                                                                                                                                                • Modifies registry class
                                                                                                                                                PID:1800
                                                                                                                                                • C:\Windows\SysWOW64\Nkcmohbg.exe
                                                                                                                                                  C:\Windows\system32\Nkcmohbg.exe
                                                                                                                                                  72⤵
                                                                                                                                                    PID:4440
                                                                                                                                                    • C:\Windows\SysWOW64\WerFault.exe
                                                                                                                                                      C:\Windows\SysWOW64\WerFault.exe -u -p 4440 -s 404
                                                                                                                                                      73⤵
                                                                                                                                                      • Program crash
                                                                                                                                                      PID:4424
    • C:\Windows\SysWOW64\WerFault.exe
      C:\Windows\SysWOW64\WerFault.exe -pss -s 452 -p 4440 -ip 4440
      1⤵
        PID:2608

      Network

      MITRE ATT&CK Enterprise v15

      Replay Monitor

      Loading Replay Monitor...

      Downloads

      • C:\Windows\SysWOW64\Ibojncfj.exe

        Filesize

        444KB

        MD5

        0ef54f761e50330c26e7f60fa9dfbdb8

        SHA1

        25b9c01d945dedb0b691d3543a2a978872bfb898

        SHA256

        3813d6dab3c80f96c84ce7d90bb8f164f6900b3dcac558db191470160bcca577

        SHA512

        729dfbd75d3644d8f9e9db8a0bd86f5f3600334fb05492d64ac025c1ed444c53960f9e4e17b332cbc2807292d8701a83c49360ba5cd8e3af4a093c584d1d82cd

      • C:\Windows\SysWOW64\Idacmfkj.exe

        Filesize

        444KB

        MD5

        8eb620ea2e474536c7863a9ce67cb713

        SHA1

        1f2aca9f1bed07068e639ea7da36d9436a7b30d5

        SHA256

        300b346cf96fccb243c62efcc8971501a64dec3eb57a9fa5a5c79e9334dd152c

        SHA512

        e517ccadf6e1925efe7cfcda027f8267f85a7a5e62b1dff4af8f27afa371788e7215872968f68c070198405b5c17f1b5c821e4070a1d3c20257c8574c66cd79d

      • C:\Windows\SysWOW64\Iinlemia.exe

        Filesize

        444KB

        MD5

        f43548d5022cff538d328b6c5c28e408

        SHA1

        a65d450f20271a24537a0d0487e1c17990689624

        SHA256

        db3f4e678c9bc1d6264d9e758f6be6fb1bef01144ef3fee101157e78d7df2904

        SHA512

        68de2c50c88efd197050147d7a7b30cf85e6b6e24191a00c37d63782d92cdae16313f967ec2e8d05c8d150861102021aff177b91eb6205b422887a81ddc962a1

      • C:\Windows\SysWOW64\Imdnklfp.exe

        Filesize

        444KB

        MD5

        025dc8caa3c103ebdc317c030cecf67d

        SHA1

        198a42d24392e4b29d36aa32d00237e3a23787a6

        SHA256

        b1b2a3957378ce338d611af3ad698186698bd50d48473722686c36f011a9e3bc

        SHA512

        91c4e34dc13e34573794ac4c852173ae4179b624ea8a362f8dfd13e95df60fb5e8c8cb5bb984f280a7f82e26a668ad44cf013267558e33442a157ed744a2c7cc

      • C:\Windows\SysWOW64\Imgkql32.exe

        Filesize

        444KB

        MD5

        25543156108cf691b612644793dd5c1f

        SHA1

        8eeece6d037685a02b71fc03ac5769bf33475a68

        SHA256

        c16d4231d9b8545457ebdd910cbbed2f6e1cf533b75f99e879ed88b9b4240ffc

        SHA512

        18ab9638a092a0b72e0dd1453016014e3ec9164a8f33545ff860ab122b0129ce33f1f9dd0f07f5dce188cacc4c2ba797e980c491d19d27894ca561ada458ee76

      • C:\Windows\SysWOW64\Ipckgh32.exe

        Filesize

        444KB

        MD5

        8d39af9579b2b60dca4b34840b278c45

        SHA1

        fb5abbb07d03d8b2a08d4f6500f85cd3cc685c75

        SHA256

        c0d846eeaab08fb6cf42f7a1b184bc76f3f47ae883f2f507fbd97d1ed5f3da59

        SHA512

        41629fed8b15ee8ee6d238b272dd73981d7097d987305be8d8f9ce34de620ac346dede51e193216b80ea210e9215b1e941cadc4f8b80d45f40ab65ec2928465a

      • C:\Windows\SysWOW64\Jagqlj32.exe

        Filesize

        444KB

        MD5

        153759c1098ee368afdbecccd4e6ead1

        SHA1

        ce860e5d905be8bc03e3f02599c06a4542a2d308

        SHA256

        aa4042a04f17d8bfa2439542881001fad14046557ff39b8636ea95069cd4d193

        SHA512

        180817a9573fd1ff91cbe464a752716f6c9bb731e60fb48b467adf94f85a92fa8cd85a5ea2143c8a18ed8c686fc8b1ac539dde9919a0a9185d2e12573c8f3c1a

      • C:\Windows\SysWOW64\Jangmibi.exe

        Filesize

        444KB

        MD5

        deca987d267cc5db6411242645cab62e

        SHA1

        0fa7d18ead4c73efaebd3d40997d1aa26c1acac4

        SHA256

        dc5029e8cda72899484ec21dbbcccdfced1a2dc24702619b45acc2d1b215c4e4

        SHA512

        3c405c3c3d83af48e3f1c49b01bb4dbd886e6a6536674bfc738ddd1b81dfc926a74042628114d838e658926ab1addd9b836b8e9f344006343c6af51d207b01c5

      • C:\Windows\SysWOW64\Jbhmdbnp.exe

        Filesize

        444KB

        MD5

        6ef64b1adef4c44442b7a35650845f01

        SHA1

        ea21980192bb964e1ede42f6a95881cc5251f6d5

        SHA256

        487aa6a1340b25ad30ccfc1d78047825c1277b20fc9f739a2f96c832f8b74a7a

        SHA512

        d80ffe0fe2bd5a6bfb78c44f759d29dc0fd01eba12a017fd15a0a7146d0974afd190d401e216245c74da0f85aa2da16362e481f5a9331920bdd7b37ad4d2613d

      • C:\Windows\SysWOW64\Jbkjjblm.exe

        Filesize

        444KB

        MD5

        586eeced42ec0023bce5146e846bb41b

        SHA1

        17539719dc93d799cce40ca94342f82eb9fbe796

        SHA256

        0381e002e652f8cb265380316df3423e7a82f5c4bb76cdb999468a517af91914

        SHA512

        3d91b1330310e6f95d8aa5620e3cd6ef901bd4bc42ff0514931cda426e251734d5c4b4cbe0f4e3d5dd970ea38d7bfad014923b743758bb641ebaf82e91ca5626

      • C:\Windows\SysWOW64\Jbmfoa32.exe

        Filesize

        444KB

        MD5

        5bd47b090d0b7fe2e01916033863113e

        SHA1

        ec47c674f3b943c8c2c1b63ac28c9af1a200cfdd

        SHA256

        32a7da844b5592cc0d470ed64ec846eb2ab1bc7dc6ae6461bbf9638104a53daf

        SHA512

        62042a9cfcc2d74385f2fce7377e041155b10f450380ff5bf1f91b7d1901371574f59fd8cc741761ae07aaff24be5d9ebddd63d1aa1ef2e97053ef5040bef0ae

      • C:\Windows\SysWOW64\Jdcpcf32.exe

        Filesize

        444KB

        MD5

        0dbcf877e2f767486328f2d0c8b63471

        SHA1

        e2e07878415479c3d764f7b476fc02591dea4236

        SHA256

        7b3c8da8438ed32d7f41ae8991998f3d20151b76a8e46ff5cc28848459c2f5cf

        SHA512

        e30e2278e0dc3293eb098db5c339211d1e5b4af71157fbd658f6e7240638d48c9d55601266d7c68c192081ea11c373376750557b7790674dc81065e59cb225e8

      • C:\Windows\SysWOW64\Jfhbppbc.exe

        Filesize

        444KB

        MD5

        90f07f185e1a0d94dfaafdcb39cc1c8f

        SHA1

        3e38c6b768e275fad187a62a6a35aac921c47a0c

        SHA256

        23806a6f50ede93bcc54944626852ab456cb38cc9a7ee46a720bf4b597ac5c1a

        SHA512

        19638998f78ca7f7bf08eda2fa2c590f8142ef5f0b4ccf74090231e993fd50c96a26a99a91b2bc4110bd72f33931bdab90e78a5502dc15d4aca33792d7d00423

      • C:\Windows\SysWOW64\Jibeql32.exe

        Filesize

        444KB

        MD5

        477600af19e81527b9068075469f6cba

        SHA1

        619a5575918c9348c04c065ffa43cbcf0b5f1e47

        SHA256

        a513bd4f983d58fc9bf66b114bca5f06a44b3f5e18a8c924d5a25e4d8445dd0b

        SHA512

        4a00e53985146e7b7f4a46a8450b428a6751e0630e594e3460cb8d53e14b63d5dca428238be8a041ab0469b77f27a365c3dc6d245e70e38d19a0f09ccfd15392

      • C:\Windows\SysWOW64\Jiphkm32.exe

        Filesize

        444KB

        MD5

        c8d969ecf0950bd74dc7c3fe3bb4ea40

        SHA1

        7b429008e0ddae7473aefffb93a532a3e813d2ff

        SHA256

        afe39fc7b8ec79cab93c1c10a2e5fb04c667d903f61f9f0f79778115b4f2fd44

        SHA512

        772b44853691d456de23cc2bd11b921ef8e9821f09559d21b4519529bda51b0c4f7061033b138fc5a8dd27ce6804a5d5703eb819aca10a0d56ac921ac3e5cbe6

      • C:\Windows\SysWOW64\Jkfkfohj.exe

        Filesize

        444KB

        MD5

        1e47aa159b65fe071d067f169c517621

        SHA1

        9709896043dae4d21e839c3be3d6f55e4fd9e574

        SHA256

        40d1523372928e29c1761b9e7889c6510efbfc6c657ce7e61b9b93c6dfbeda1b

        SHA512

        9e625f4aefa55b0e746316aab9b475be2fc91af2e2d3be71f44f658b55f455b57ddd5c72918b309dc037421b88732553fd8c6019f74d2c8395d7f66cdc2b910c

      • C:\Windows\SysWOW64\Kaemnhla.exe

        Filesize

        444KB

        MD5

        5fa550d983608f47f64fc35aff0fbb96

        SHA1

        8d3e7ee9f0d4c63a0e20db045913b245b5f0987d

        SHA256

        dcdea54e783f099a541489559f4065130acbc42386c7fa8797e747a2c1b3d82e

        SHA512

        6a3cc0bea319c885454fee9c2500fefea1594da5b7a85af79e690bf92a7bdccfe8c4c25005e078f39c7df835ea8d07352d952ea49b60549e355d9036ad80965c

      • C:\Windows\SysWOW64\Kajfig32.exe

        Filesize

        444KB

        MD5

        3cc344900a54010764f0f2b34a8a36e3

        SHA1

        640bf03ab214898ee51ccb2005632c30a95c2df8

        SHA256

        e0dfeaebf05b7c47865c939d77c14dd3cac6787f75ccea69fea067459a63bb1b

        SHA512

        61829d668b5f331558e44d9a6ce6a2a0040582c152d4b9b71ffefc7e5feb63195e929bd7e37ca0368e7ee8e6a8f92842de109a6437b4f1eca17f5d87ccfe596d

      • C:\Windows\SysWOW64\Kaqcbi32.exe

        Filesize

        444KB

        MD5

        e2750afbfead809b9daf1e22bbf59b5b

        SHA1

        8bdcb1aa4f0b91262d1dc5df006e4f59ab259543

        SHA256

        6df38f59a97147ba0e1b106ce9ab92dae5a9fbc2f591f64b2c262dcbab0999e9

        SHA512

        1220bb2d18517b1095391e703e425a6fb030a02784c73a4fbf8cf2de21d9f8cf61ea6932e6ae25481579184daf42bd8021ad39f39cc73c6eb98ee70ea5b120a0

      • C:\Windows\SysWOW64\Kdffocib.exe

        Filesize

        444KB

        MD5

        6e40787aa3bb067958924eff7d969f47

        SHA1

        f98aadfb79a67a6e90b788dd2fa091ccb42a502b

        SHA256

        a75aa6399c43ad8776ae86c58bd0151b92f9655143a01cb32a9050d50f077001

        SHA512

        1c552a4d12263536b2ca7b538901742047962d7c41172b361aade25ec3ecd305622aac09c33d897af2e6523f7488c73103bf8ce8fc261a27c8203bd62839590a

      • C:\Windows\SysWOW64\Kdopod32.exe

        Filesize

        444KB

        MD5

        f4267caf1821fb68e0aa0b98e15c0631

        SHA1

        2418a60de4f6c8e57a9867ecd51db65a28396130

        SHA256

        21b370ec8cb8208333f8c8eb4112bfb7881c8f1d94162754205ea30b020282fe

        SHA512

        adf7c659508e5d90b54dd235a93cc4b4b0ec9ccd6eeede25c4d15c94cb3781fac99b4ee5291e4f7ba050557f553739769f0fffbae16daea33860f6d8f6eac86d

      • C:\Windows\SysWOW64\Kgfoan32.exe

        Filesize

        444KB

        MD5

        e63c517c649f0ac35e1023886f24832b

        SHA1

        424f6a78cd422c2f248bbc763865ead297e98b8c

        SHA256

        50077d7616a356982fdbba044c05f01c181606825c4670bac5a77b19cd3120c1

        SHA512

        e1fa0ccfe912320338023b74f9b995cfa28f11dd8c506ac417a3db2d0c59ab7c126bb53e0ded2228abd90db70b5c4f07566b1a8419009375c4daa200b10a4a00

      • C:\Windows\SysWOW64\Kilhgk32.exe

        Filesize

        444KB

        MD5

        c77e5986375e5ed1455c1a72c988c9c0

        SHA1

        4753caa313af8e401ef18f75912bab740e49b91f

        SHA256

        cb03582d245f303c127882c8f5ad3a63bfe4306179c10b4dea4f2a0ea0563401

        SHA512

        ca1efb2c3ce6c0b14600cdc80373ae5cb27a59456cd0e3e4fe255fcf8cc0d8bb17727a3ba3c79f2a458185e9be71eb1957189a526aa01d7ad64eaa8f24991a40

      • C:\Windows\SysWOW64\Kknafn32.exe

        Filesize

        444KB

        MD5

        c613b6a13e39759f41d76ef4226eae78

        SHA1

        134a29fee0fb12ff6400b3ff9f53c2ae252c0b6b

        SHA256

        65ca1e4f7091e0c326c38813351b423a6998cda060f03bbd526bd81c1ec95c8d

        SHA512

        f018aec439362602c1626520fd317cd29b2a921015854dfce7dfc781b22c2e80e2fe71b387de95566505e8d07ba19f850d6599255da2c4887c6ad5cc9ac5a025

      • C:\Windows\SysWOW64\Kmlnbi32.exe

        Filesize

        444KB

        MD5

        904811f687dd143e7d9e8dde8b3b19cf

        SHA1

        4bee1ff1a7bfb96902ff2a8934aeb5e3aab51167

        SHA256

        5aa7ba128cdb7cee8c222f7906d88dfa615a4f1dbcb61098d1062748c98ec7af

        SHA512

        8ce7f04c275268d780fec3360fb07108d401ead43d80c6946888d000c96a32bc0b50848e2aa2e7a70f1e1071733eb8b6301da9ef64827bf16a97d1b6d3720034

      • C:\Windows\SysWOW64\Kpepcedo.exe

        Filesize

        444KB

        MD5

        6de3702fd58af84073cef1ad2470ede6

        SHA1

        9cbf9fde2847590e1158a262c6172bc23dbd35e6

        SHA256

        0d4312da145df5be9fa7bed669a7a75ddd0c53c264e87ea795a1d3aa52c6cd60

        SHA512

        d412bed07573eb171dee70c3b3c3644b91610440ac11598cb6bb41da903c1e5dfc33fae5c88d8ab3fb74f3182882eb22fa8597e2b4e303b0f639cdd22efb367c

      • C:\Windows\SysWOW64\Lcpllo32.exe

        Filesize

        444KB

        MD5

        14f54247592972003633ed23d3497ab2

        SHA1

        fa3fb5e8d24fdfa62a4c02881f2529dab9c0b8d7

        SHA256

        7a58164f8fb7253477b89e12c2a3ed7aaafe497580b5dfd1db7b0026b63c51b9

        SHA512

        99cd3ba2f105c7f746f427976efc8f3998fba8817a6dcc2fb239a78e3487c8114036c3acf438488299bf15a72b2aa57d5b6691329974e17874299df0cdf2ce0b

      • C:\Windows\SysWOW64\Ldkojb32.exe

        Filesize

        444KB

        MD5

        83328b7766b45cbeb17c74bcd6424ee5

        SHA1

        5eaa83a2821c19fe22a8ee1d4db8d36859ab8a4e

        SHA256

        59141f362f5cc0bf6f37b657411d43923936b16d03a3035c0a873b56e8ef033d

        SHA512

        2d133e7979b01336f3cdf4e103e6e8131d85264f77d005d7de75c3d78e7121faa088e038b60f82f74c348ec76634b1d20c6e8667389afc581fc3204886141ce6

      • C:\Windows\SysWOW64\Lgneampk.exe

        Filesize

        444KB

        MD5

        4be2f8747fbc27098e8aeb5d353c2acb

        SHA1

        c3a6fffedbd22b4ea413a4abd1eae40ad2231e1c

        SHA256

        7626a311930f09883336c2adf2b73d9bc1efc051210a4924948e8bfe3993a6c1

        SHA512

        486d30b0e1562684e7c30f76726b789bbd865eee29b22bf9522b6b11c998a93da48c190d355b7158df87cbdb9084a2b8336fd76adde4134a350e9e2092f2ca9d

      • C:\Windows\SysWOW64\Lijdhiaa.exe

        Filesize

        444KB

        MD5

        c9c9f45430df4fa8e221097061fbd363

        SHA1

        c7178dbe53cf80383c5ef71325d5824417ed68e6

        SHA256

        c4672766df41782aa5e5cbb94ce73d23ea0327df13bf19423d11f80f40569f20

        SHA512

        c0a2f1b300ebc498afc56527afdad798aec0070026cdcf9fe37e3f47a0eab4b3f077bc796d2c4913bcf866495ca818d5f5c43e2d76b208ec0d9668a7540870a8

      • C:\Windows\SysWOW64\Lkdggmlj.exe

        Filesize

        444KB

        MD5

        941c656333a870812211192d7c3e4512

        SHA1

        fa8a03b8087c62cc30f51338b30ebc41e98b3b43

        SHA256

        23dc43af95c8265cf55b51071b1050145db3f9a2726c307d98c59859696548e5

        SHA512

        b2ca48ee1c9a7eb1ef07a4a1499881f1cb36136252285eba42a37b321d6e19a38e78b995bb00e7cd61890ad246b8d8e122c13868365ca5c5ad4adb2bcc6731c6

      • C:\Windows\SysWOW64\Lpcmec32.exe

        Filesize

        444KB

        MD5

        14e9237c92d23c41d3e0b0254623ced5

        SHA1

        5a65912310994771d33ec58054205f8433e464d9

        SHA256

        ca3ba3c6786516cc87c9bff6f5201ae9691d648763828b8575dc991b8b16b7a6

        SHA512

        2fd8cea66c26bfbf56aed88feac248b4284972aca3abcb69f498a75818b0e966d880e4b189bec5a1baab1548a37bd66ea9b188e1ea7eff8993e18eaef05fb825

      • C:\Windows\SysWOW64\Ncgkcl32.exe

        Filesize

        444KB

        MD5

        5950c89d64e2ad453401536d3cc663e4

        SHA1

        b416025924c52b5d2b1574c485c0df13ed1c34a2

        SHA256

        65444f64e67cbde6c66c3b0ad896d4e9f44b10d34a310ac1fefb0c115f3322fd

        SHA512

        c6e1726f845f57d6ebe48983f877c7a74f5dde87a1646fe02481cb3720874f56fb22d0db15fbc57da77c95d7ddcd84195b77438e9dc01b4f4439a2591b50ed17

      • C:\Windows\SysWOW64\Nkcmohbg.exe

        Filesize

        444KB

        MD5

        9dbb3bbc3c9e1beaab4415243c142c4f

        SHA1

        83999683fd177b8fffe3d225b7b90fb1395d4bcd

        SHA256

        7c4c764f9eff354dfeb1b86224cac65073f81245fd79a9daa6599c49e68ba53e

        SHA512

        4edf4d46ae5277cc5a9a1cd865c589e6c89f9b6b2b34a549678791542b09a9aa68887230f9f9fcf87402936bec0f4b8508279bf96f53e8fa79fc36f0ab8717c1

      • C:\Windows\SysWOW64\Nkjjij32.exe

        Filesize

        444KB

        MD5

        8ee4c6be2cb5151b87592f2cd443e5e2

        SHA1

        c440e6630029c0eeb45f680d6a17875edc773a34

        SHA256

        efcda812d4f020fccfc86b2e7cc1c80f90ce51038e5d12e7579a3d5527c0a0ae

        SHA512

        8ad3ff7f25d7a801468fa65aa551a74d8923d5047f4bafb8143280a76b617678f322b6f8598a640b41c9ad7db9764aec33248342ff0aef5dae185afbafed6ca8

      • C:\Windows\SysWOW64\Nqmhbpba.exe

        Filesize

        444KB

        MD5

        aeb9aa894ef1e80fb8fc3cdabb65b774

        SHA1

        ddff0a6e1557694c0f6a2d57de953738fde6283f

        SHA256

        22504bf0c1a531c72c2929ceca5e347b4a470423e99e5936d99b4a6f4d5f39aa

        SHA512

        c8e1fc8475e5146a45f0b201076eaac7d7eda0a68aae83f0aadf049ce47dd911418e46f983a7fa712912772470179b00fc56718f768215cbdc5f126251c026a0

      • memory/212-17-0x0000000000400000-0x0000000000433000-memory.dmp

        Filesize

        204KB

      • memory/372-106-0x0000000000400000-0x0000000000433000-memory.dmp

        Filesize

        204KB

      • memory/372-547-0x0000000000400000-0x0000000000433000-memory.dmp

        Filesize

        204KB

      • memory/412-182-0x0000000000400000-0x0000000000433000-memory.dmp

        Filesize

        204KB

      • memory/540-522-0x0000000000400000-0x0000000000433000-memory.dmp

        Filesize

        204KB

      • memory/540-298-0x0000000000400000-0x0000000000433000-memory.dmp

        Filesize

        204KB

      • memory/544-426-0x0000000000400000-0x0000000000433000-memory.dmp

        Filesize

        204KB

      • memory/624-154-0x0000000000400000-0x0000000000433000-memory.dmp

        Filesize

        204KB

      • memory/624-541-0x0000000000400000-0x0000000000433000-memory.dmp

        Filesize

        204KB

      • memory/640-406-0x0000000000400000-0x0000000000433000-memory.dmp

        Filesize

        204KB

      • memory/820-258-0x0000000000400000-0x0000000000433000-memory.dmp

        Filesize

        204KB

      • memory/820-528-0x0000000000400000-0x0000000000433000-memory.dmp

        Filesize

        204KB

      • memory/848-129-0x0000000000400000-0x0000000000433000-memory.dmp

        Filesize

        204KB

      • memory/848-544-0x0000000000400000-0x0000000000433000-memory.dmp

        Filesize

        204KB

      • memory/972-408-0x0000000000400000-0x0000000000433000-memory.dmp

        Filesize

        204KB

      • memory/1044-498-0x0000000000400000-0x0000000000433000-memory.dmp

        Filesize

        204KB

      • memory/1300-304-0x0000000000400000-0x0000000000433000-memory.dmp

        Filesize

        204KB

      • memory/1300-521-0x0000000000400000-0x0000000000433000-memory.dmp

        Filesize

        204KB

      • memory/1588-90-0x0000000000400000-0x0000000000433000-memory.dmp

        Filesize

        204KB

      • memory/1588-549-0x0000000000400000-0x0000000000433000-memory.dmp

        Filesize

        204KB

      • memory/1632-292-0x0000000000400000-0x0000000000433000-memory.dmp

        Filesize

        204KB

      • memory/1640-414-0x0000000000400000-0x0000000000433000-memory.dmp

        Filesize

        204KB

      • memory/1680-390-0x0000000000400000-0x0000000000433000-memory.dmp

        Filesize

        204KB

      • memory/1680-506-0x0000000000400000-0x0000000000433000-memory.dmp

        Filesize

        204KB

      • memory/1688-525-0x0000000000400000-0x0000000000433000-memory.dmp

        Filesize

        204KB

      • memory/1688-276-0x0000000000400000-0x0000000000433000-memory.dmp

        Filesize

        204KB

      • memory/1692-530-0x0000000000400000-0x0000000000433000-memory.dmp

        Filesize

        204KB

      • memory/1692-241-0x0000000000400000-0x0000000000433000-memory.dmp

        Filesize

        204KB

      • memory/1800-494-0x0000000000400000-0x0000000000433000-memory.dmp

        Filesize

        204KB

      • memory/1820-500-0x0000000000400000-0x0000000000433000-memory.dmp

        Filesize

        204KB

      • memory/1856-186-0x0000000000400000-0x0000000000433000-memory.dmp

        Filesize

        204KB

      • memory/1856-537-0x0000000000400000-0x0000000000433000-memory.dmp

        Filesize

        204KB

      • memory/1964-513-0x0000000000400000-0x0000000000433000-memory.dmp

        Filesize

        204KB

      • memory/1964-348-0x0000000000400000-0x0000000000433000-memory.dmp

        Filesize

        204KB

      • memory/2252-312-0x0000000000400000-0x0000000000433000-memory.dmp

        Filesize

        204KB

      • memory/2252-519-0x0000000000400000-0x0000000000433000-memory.dmp

        Filesize

        204KB

      • memory/2424-376-0x0000000000400000-0x0000000000433000-memory.dmp

        Filesize

        204KB

      • memory/2428-41-0x0000000000400000-0x0000000000433000-memory.dmp

        Filesize

        204KB

      • memory/2428-555-0x0000000000400000-0x0000000000433000-memory.dmp

        Filesize

        204KB

      • memory/2452-518-0x0000000000400000-0x0000000000433000-memory.dmp

        Filesize

        204KB

      • memory/2452-318-0x0000000000400000-0x0000000000433000-memory.dmp

        Filesize

        204KB

      • memory/2704-264-0x0000000000400000-0x0000000000433000-memory.dmp

        Filesize

        204KB

      • memory/2704-527-0x0000000000400000-0x0000000000433000-memory.dmp

        Filesize

        204KB

      • memory/2908-540-0x0000000000400000-0x0000000000433000-memory.dmp

        Filesize

        204KB

      • memory/2908-161-0x0000000000400000-0x0000000000433000-memory.dmp

        Filesize

        204KB

      • memory/2972-218-0x0000000000400000-0x0000000000433000-memory.dmp

        Filesize

        204KB

      • memory/2972-533-0x0000000000400000-0x0000000000433000-memory.dmp

        Filesize

        204KB

      • memory/2976-535-0x0000000000400000-0x0000000000433000-memory.dmp

        Filesize

        204KB

      • memory/2976-201-0x0000000000400000-0x0000000000433000-memory.dmp

        Filesize

        204KB

      • memory/3080-502-0x0000000000400000-0x0000000000433000-memory.dmp

        Filesize

        204KB

      • memory/3148-114-0x0000000000400000-0x0000000000433000-memory.dmp

        Filesize

        204KB

      • memory/3148-546-0x0000000000400000-0x0000000000433000-memory.dmp

        Filesize

        204KB

      • memory/3200-553-0x0000000000400000-0x0000000000433000-memory.dmp

        Filesize

        204KB

      • memory/3200-57-0x0000000000400000-0x0000000000433000-memory.dmp

        Filesize

        204KB

      • memory/3212-328-0x0000000000400000-0x0000000000433000-memory.dmp

        Filesize

        204KB

      • memory/3268-306-0x0000000000400000-0x0000000000433000-memory.dmp

        Filesize

        204KB

      • memory/3268-520-0x0000000000400000-0x0000000000433000-memory.dmp

        Filesize

        204KB

      • memory/3316-503-0x0000000000400000-0x0000000000433000-memory.dmp

        Filesize

        204KB

      • memory/3316-432-0x0000000000400000-0x0000000000433000-memory.dmp

        Filesize

        204KB

      • memory/3344-13-0x0000000000400000-0x0000000000433000-memory.dmp

        Filesize

        204KB

      • memory/3380-334-0x0000000000400000-0x0000000000433000-memory.dmp

        Filesize

        204KB

      • memory/3432-532-0x0000000000400000-0x0000000000433000-memory.dmp

        Filesize

        204KB

      • memory/3432-225-0x0000000000400000-0x0000000000433000-memory.dmp

        Filesize

        204KB

      • memory/3540-514-0x0000000000400000-0x0000000000433000-memory.dmp

        Filesize

        204KB

      • memory/3540-342-0x0000000000400000-0x0000000000433000-memory.dmp

        Filesize

        204KB

      • memory/3548-146-0x0000000000400000-0x0000000000433000-memory.dmp

        Filesize

        204KB

      • memory/3548-542-0x0000000000400000-0x0000000000433000-memory.dmp

        Filesize

        204KB

      • memory/3576-137-0x0000000000400000-0x0000000000433000-memory.dmp

        Filesize

        204KB

      • memory/3576-543-0x0000000000400000-0x0000000000433000-memory.dmp

        Filesize

        204KB

      • memory/3692-65-0x0000000000400000-0x0000000000433000-memory.dmp

        Filesize

        204KB

      • memory/3692-552-0x0000000000400000-0x0000000000433000-memory.dmp

        Filesize

        204KB

      • memory/3720-524-0x0000000000400000-0x0000000000433000-memory.dmp

        Filesize

        204KB

      • memory/3720-282-0x0000000000400000-0x0000000000433000-memory.dmp

        Filesize

        204KB

      • memory/3732-86-0x0000000000400000-0x0000000000433000-memory.dmp

        Filesize

        204KB

      • memory/3756-536-0x0000000000400000-0x0000000000433000-memory.dmp

        Filesize

        204KB

      • memory/3756-194-0x0000000000400000-0x0000000000433000-memory.dmp

        Filesize

        204KB

      • memory/3772-336-0x0000000000400000-0x0000000000433000-memory.dmp

        Filesize

        204KB

      • memory/3772-515-0x0000000000400000-0x0000000000433000-memory.dmp

        Filesize

        204KB

      • memory/3796-370-0x0000000000400000-0x0000000000433000-memory.dmp

        Filesize

        204KB

      • memory/3932-388-0x0000000000400000-0x0000000000433000-memory.dmp

        Filesize

        204KB

      • memory/4136-420-0x0000000000400000-0x0000000000433000-memory.dmp

        Filesize

        204KB

      • memory/4232-4-0x0000000000400000-0x0000000000433000-memory.dmp

        Filesize

        204KB

      • memory/4232-0-0x0000000000400000-0x0000000000433000-memory.dmp

        Filesize

        204KB

      • memory/4232-81-0x0000000000400000-0x0000000000433000-memory.dmp

        Filesize

        204KB

      • memory/4432-551-0x0000000000400000-0x0000000000433000-memory.dmp

        Filesize

        204KB

      • memory/4432-73-0x0000000000400000-0x0000000000433000-memory.dmp

        Filesize

        204KB

      • memory/4440-493-0x0000000000400000-0x0000000000433000-memory.dmp

        Filesize

        204KB

      • memory/4472-531-0x0000000000400000-0x0000000000433000-memory.dmp

        Filesize

        204KB

      • memory/4472-233-0x0000000000400000-0x0000000000433000-memory.dmp

        Filesize

        204KB

      • memory/4504-364-0x0000000000400000-0x0000000000433000-memory.dmp

        Filesize

        204KB

      • memory/4568-545-0x0000000000400000-0x0000000000433000-memory.dmp

        Filesize

        204KB

      • memory/4568-122-0x0000000000400000-0x0000000000433000-memory.dmp

        Filesize

        204KB

      • memory/4608-97-0x0000000000400000-0x0000000000433000-memory.dmp

        Filesize

        204KB

      • memory/4608-548-0x0000000000400000-0x0000000000433000-memory.dmp

        Filesize

        204KB

      • memory/4624-358-0x0000000000400000-0x0000000000433000-memory.dmp

        Filesize

        204KB

      • memory/4628-250-0x0000000000400000-0x0000000000433000-memory.dmp

        Filesize

        204KB

      • memory/4628-529-0x0000000000400000-0x0000000000433000-memory.dmp

        Filesize

        204KB

      • memory/4648-382-0x0000000000400000-0x0000000000433000-memory.dmp

        Filesize

        204KB

      • memory/4664-25-0x0000000000400000-0x0000000000433000-memory.dmp

        Filesize

        204KB

      • memory/4688-209-0x0000000000400000-0x0000000000433000-memory.dmp

        Filesize

        204KB

      • memory/4688-534-0x0000000000400000-0x0000000000433000-memory.dmp

        Filesize

        204KB

      • memory/4712-170-0x0000000000400000-0x0000000000433000-memory.dmp

        Filesize

        204KB

      • memory/4712-539-0x0000000000400000-0x0000000000433000-memory.dmp

        Filesize

        204KB

      • memory/4768-499-0x0000000000400000-0x0000000000433000-memory.dmp

        Filesize

        204KB

      • memory/4816-497-0x0000000000400000-0x0000000000433000-memory.dmp

        Filesize

        204KB

      • memory/4848-400-0x0000000000400000-0x0000000000433000-memory.dmp

        Filesize

        204KB

      • memory/4940-33-0x0000000000400000-0x0000000000433000-memory.dmp

        Filesize

        204KB

      • memory/4940-556-0x0000000000400000-0x0000000000433000-memory.dmp

        Filesize

        204KB

      • memory/4992-274-0x0000000000400000-0x0000000000433000-memory.dmp

        Filesize

        204KB

      • memory/5052-48-0x0000000000400000-0x0000000000433000-memory.dmp

        Filesize

        204KB

      • memory/5052-554-0x0000000000400000-0x0000000000433000-memory.dmp

        Filesize

        204KB