Analysis

  • max time kernel
    117s
  • max time network
    153s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240412-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240412-enlocale:en-usos:windows10-2004-x64system
  • submitted
    20-04-2024 21:39

General

  • Target

    46ce218d357fc950845ce6f6c1315c8487b13e704c4a937750ec81b9dd443784.exe

  • Size

    400KB

  • MD5

    a54800e429f83ac8cbecbf2879bd8b7d

  • SHA1

    13144bf051110c006a8cec09f08f25b594cdb7de

  • SHA256

    46ce218d357fc950845ce6f6c1315c8487b13e704c4a937750ec81b9dd443784

  • SHA512

    ad961d2525b602f0635712b6dead1875977b2914f6857246fb115eeae5474f3b03bc5318cc9fe1fcfdab54d604f493e3007df79ba22478a32db0008e895ac9f0

  • SSDEEP

    12288:gB1rOSs/+zrWAI5KFum/+zrWAIAqWim/k:SrOSsm0BmmvFimc

Score
10/10

Malware Config

Signatures

  • Adds autorun key to be loaded by Explorer.exe on startup 2 TTPs 64 IoCs
  • Executes dropped EXE 64 IoCs
  • Drops file in System32 directory 64 IoCs
  • Program crash 1 IoCs
  • Modifies registry class 64 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\46ce218d357fc950845ce6f6c1315c8487b13e704c4a937750ec81b9dd443784.exe
    "C:\Users\Admin\AppData\Local\Temp\46ce218d357fc950845ce6f6c1315c8487b13e704c4a937750ec81b9dd443784.exe"
    1⤵
    • Adds autorun key to be loaded by Explorer.exe on startup
    • Suspicious use of WriteProcessMemory
    PID:1256
    • C:\Windows\SysWOW64\Ojjolnaq.exe
      C:\Windows\system32\Ojjolnaq.exe
      2⤵
      • Executes dropped EXE
      • Drops file in System32 directory
      • Modifies registry class
      • Suspicious use of WriteProcessMemory
      PID:2424
      • C:\Windows\SysWOW64\Olhlhjpd.exe
        C:\Windows\system32\Olhlhjpd.exe
        3⤵
        • Adds autorun key to be loaded by Explorer.exe on startup
        • Executes dropped EXE
        • Drops file in System32 directory
        • Modifies registry class
        • Suspicious use of WriteProcessMemory
        PID:2016
        • C:\Windows\SysWOW64\Ocbddc32.exe
          C:\Windows\system32\Ocbddc32.exe
          4⤵
          • Executes dropped EXE
          • Drops file in System32 directory
          • Modifies registry class
          • Suspicious use of WriteProcessMemory
          PID:4756
          • C:\Windows\SysWOW64\Odapnf32.exe
            C:\Windows\system32\Odapnf32.exe
            5⤵
            • Executes dropped EXE
            • Modifies registry class
            • Suspicious use of WriteProcessMemory
            PID:916
            • C:\Windows\SysWOW64\Ofcmfodb.exe
              C:\Windows\system32\Ofcmfodb.exe
              6⤵
              • Adds autorun key to be loaded by Explorer.exe on startup
              • Executes dropped EXE
              • Drops file in System32 directory
              • Suspicious use of WriteProcessMemory
              PID:1840
              • C:\Windows\SysWOW64\Onjegled.exe
                C:\Windows\system32\Onjegled.exe
                7⤵
                • Adds autorun key to be loaded by Explorer.exe on startup
                • Executes dropped EXE
                • Drops file in System32 directory
                • Modifies registry class
                • Suspicious use of WriteProcessMemory
                PID:1548
                • C:\Windows\SysWOW64\Ojaelm32.exe
                  C:\Windows\system32\Ojaelm32.exe
                  8⤵
                  • Executes dropped EXE
                  • Drops file in System32 directory
                  • Suspicious use of WriteProcessMemory
                  PID:1592
                  • C:\Windows\SysWOW64\Pmoahijl.exe
                    C:\Windows\system32\Pmoahijl.exe
                    9⤵
                    • Adds autorun key to be loaded by Explorer.exe on startup
                    • Executes dropped EXE
                    • Drops file in System32 directory
                    • Modifies registry class
                    • Suspicious use of WriteProcessMemory
                    PID:552
                    • C:\Windows\SysWOW64\Pgefeajb.exe
                      C:\Windows\system32\Pgefeajb.exe
                      10⤵
                      • Adds autorun key to be loaded by Explorer.exe on startup
                      • Executes dropped EXE
                      • Drops file in System32 directory
                      • Suspicious use of WriteProcessMemory
                      PID:3452
                      • C:\Windows\SysWOW64\Pmannhhj.exe
                        C:\Windows\system32\Pmannhhj.exe
                        11⤵
                        • Adds autorun key to be loaded by Explorer.exe on startup
                        • Executes dropped EXE
                        • Suspicious use of WriteProcessMemory
                        PID:2288
                        • C:\Windows\SysWOW64\Pclgkb32.exe
                          C:\Windows\system32\Pclgkb32.exe
                          12⤵
                          • Adds autorun key to be loaded by Explorer.exe on startup
                          • Executes dropped EXE
                          • Drops file in System32 directory
                          • Modifies registry class
                          • Suspicious use of WriteProcessMemory
                          PID:2880
                          • C:\Windows\SysWOW64\Pnakhkol.exe
                            C:\Windows\system32\Pnakhkol.exe
                            13⤵
                            • Adds autorun key to be loaded by Explorer.exe on startup
                            • Executes dropped EXE
                            • Drops file in System32 directory
                            • Modifies registry class
                            • Suspicious use of WriteProcessMemory
                            PID:208
                            • C:\Windows\SysWOW64\Pqpgdfnp.exe
                              C:\Windows\system32\Pqpgdfnp.exe
                              14⤵
                              • Executes dropped EXE
                              • Suspicious use of WriteProcessMemory
                              PID:1860
                              • C:\Windows\SysWOW64\Pgioqq32.exe
                                C:\Windows\system32\Pgioqq32.exe
                                15⤵
                                • Executes dropped EXE
                                • Drops file in System32 directory
                                • Modifies registry class
                                • Suspicious use of WriteProcessMemory
                                PID:4672
                                • C:\Windows\SysWOW64\Pfolbmje.exe
                                  C:\Windows\system32\Pfolbmje.exe
                                  16⤵
                                  • Executes dropped EXE
                                  • Drops file in System32 directory
                                  • Suspicious use of WriteProcessMemory
                                  PID:1108
                                  • C:\Windows\SysWOW64\Pmidog32.exe
                                    C:\Windows\system32\Pmidog32.exe
                                    17⤵
                                    • Adds autorun key to be loaded by Explorer.exe on startup
                                    • Executes dropped EXE
                                    • Drops file in System32 directory
                                    • Modifies registry class
                                    • Suspicious use of WriteProcessMemory
                                    PID:3956
                                    • C:\Windows\SysWOW64\Pcbmka32.exe
                                      C:\Windows\system32\Pcbmka32.exe
                                      18⤵
                                      • Adds autorun key to be loaded by Explorer.exe on startup
                                      • Executes dropped EXE
                                      • Drops file in System32 directory
                                      • Modifies registry class
                                      • Suspicious use of WriteProcessMemory
                                      PID:2556
                                      • C:\Windows\SysWOW64\Qnhahj32.exe
                                        C:\Windows\system32\Qnhahj32.exe
                                        19⤵
                                        • Adds autorun key to be loaded by Explorer.exe on startup
                                        • Executes dropped EXE
                                        • Suspicious use of WriteProcessMemory
                                        PID:1192
                                        • C:\Windows\SysWOW64\Qgqeappe.exe
                                          C:\Windows\system32\Qgqeappe.exe
                                          20⤵
                                          • Executes dropped EXE
                                          • Drops file in System32 directory
                                          • Modifies registry class
                                          • Suspicious use of WriteProcessMemory
                                          PID:3676
                                          • C:\Windows\SysWOW64\Qnjnnj32.exe
                                            C:\Windows\system32\Qnjnnj32.exe
                                            21⤵
                                            • Adds autorun key to be loaded by Explorer.exe on startup
                                            • Executes dropped EXE
                                            • Drops file in System32 directory
                                            • Modifies registry class
                                            • Suspicious use of WriteProcessMemory
                                            PID:1776
                                            • C:\Windows\SysWOW64\Qgcbgo32.exe
                                              C:\Windows\system32\Qgcbgo32.exe
                                              22⤵
                                              • Executes dropped EXE
                                              • Drops file in System32 directory
                                              • Modifies registry class
                                              • Suspicious use of WriteProcessMemory
                                              PID:3668
                                              • C:\Windows\SysWOW64\Aqkgpedc.exe
                                                C:\Windows\system32\Aqkgpedc.exe
                                                23⤵
                                                • Adds autorun key to be loaded by Explorer.exe on startup
                                                • Executes dropped EXE
                                                • Drops file in System32 directory
                                                PID:4608
                                                • C:\Windows\SysWOW64\Ambgef32.exe
                                                  C:\Windows\system32\Ambgef32.exe
                                                  24⤵
                                                  • Adds autorun key to be loaded by Explorer.exe on startup
                                                  • Executes dropped EXE
                                                  • Drops file in System32 directory
                                                  • Modifies registry class
                                                  PID:1224
                                                  • C:\Windows\SysWOW64\Agglboim.exe
                                                    C:\Windows\system32\Agglboim.exe
                                                    25⤵
                                                    • Executes dropped EXE
                                                    • Modifies registry class
                                                    PID:3300
                                                    • C:\Windows\SysWOW64\Amddjegd.exe
                                                      C:\Windows\system32\Amddjegd.exe
                                                      26⤵
                                                      • Adds autorun key to be loaded by Explorer.exe on startup
                                                      • Executes dropped EXE
                                                      • Drops file in System32 directory
                                                      PID:3620
                                                      • C:\Windows\SysWOW64\Aeklkchg.exe
                                                        C:\Windows\system32\Aeklkchg.exe
                                                        27⤵
                                                        • Adds autorun key to be loaded by Explorer.exe on startup
                                                        • Executes dropped EXE
                                                        • Modifies registry class
                                                        PID:1708
                                                        • C:\Windows\SysWOW64\Aabmqd32.exe
                                                          C:\Windows\system32\Aabmqd32.exe
                                                          28⤵
                                                          • Executes dropped EXE
                                                          • Drops file in System32 directory
                                                          • Modifies registry class
                                                          PID:2660
                                                          • C:\Windows\SysWOW64\Aglemn32.exe
                                                            C:\Windows\system32\Aglemn32.exe
                                                            29⤵
                                                            • Adds autorun key to be loaded by Explorer.exe on startup
                                                            • Executes dropped EXE
                                                            • Modifies registry class
                                                            PID:1896
                                                            • C:\Windows\SysWOW64\Anfmjhmd.exe
                                                              C:\Windows\system32\Anfmjhmd.exe
                                                              30⤵
                                                              • Adds autorun key to be loaded by Explorer.exe on startup
                                                              • Executes dropped EXE
                                                              • Drops file in System32 directory
                                                              • Modifies registry class
                                                              PID:4440
                                                              • C:\Windows\SysWOW64\Aepefb32.exe
                                                                C:\Windows\system32\Aepefb32.exe
                                                                31⤵
                                                                • Executes dropped EXE
                                                                • Modifies registry class
                                                                PID:3212
                                                                • C:\Windows\SysWOW64\Bnhjohkb.exe
                                                                  C:\Windows\system32\Bnhjohkb.exe
                                                                  32⤵
                                                                  • Executes dropped EXE
                                                                  • Drops file in System32 directory
                                                                  PID:2828
                                                                  • C:\Windows\SysWOW64\Bebblb32.exe
                                                                    C:\Windows\system32\Bebblb32.exe
                                                                    33⤵
                                                                    • Adds autorun key to be loaded by Explorer.exe on startup
                                                                    • Executes dropped EXE
                                                                    • Drops file in System32 directory
                                                                    • Modifies registry class
                                                                    PID:2900
                                                                    • C:\Windows\SysWOW64\Bffkij32.exe
                                                                      C:\Windows\system32\Bffkij32.exe
                                                                      34⤵
                                                                      • Adds autorun key to be loaded by Explorer.exe on startup
                                                                      • Executes dropped EXE
                                                                      PID:3456
                                                                      • C:\Windows\SysWOW64\Bnmcjg32.exe
                                                                        C:\Windows\system32\Bnmcjg32.exe
                                                                        35⤵
                                                                        • Executes dropped EXE
                                                                        • Drops file in System32 directory
                                                                        • Modifies registry class
                                                                        PID:2280
                                                                        • C:\Windows\SysWOW64\Beglgani.exe
                                                                          C:\Windows\system32\Beglgani.exe
                                                                          36⤵
                                                                          • Adds autorun key to be loaded by Explorer.exe on startup
                                                                          • Executes dropped EXE
                                                                          PID:4468
                                                                          • C:\Windows\SysWOW64\Bfhhoi32.exe
                                                                            C:\Windows\system32\Bfhhoi32.exe
                                                                            37⤵
                                                                            • Adds autorun key to be loaded by Explorer.exe on startup
                                                                            • Executes dropped EXE
                                                                            • Drops file in System32 directory
                                                                            • Modifies registry class
                                                                            PID:432
                                                                            • C:\Windows\SysWOW64\Banllbdn.exe
                                                                              C:\Windows\system32\Banllbdn.exe
                                                                              38⤵
                                                                              • Executes dropped EXE
                                                                              • Drops file in System32 directory
                                                                              • Modifies registry class
                                                                              PID:1512
                                                                              • C:\Windows\SysWOW64\Bhhdil32.exe
                                                                                C:\Windows\system32\Bhhdil32.exe
                                                                                39⤵
                                                                                • Adds autorun key to be loaded by Explorer.exe on startup
                                                                                • Executes dropped EXE
                                                                                • Drops file in System32 directory
                                                                                • Modifies registry class
                                                                                PID:4656
                                                                                • C:\Windows\SysWOW64\Bjfaeh32.exe
                                                                                  C:\Windows\system32\Bjfaeh32.exe
                                                                                  40⤵
                                                                                  • Executes dropped EXE
                                                                                  PID:2436
                                                                                  • C:\Windows\SysWOW64\Bmemac32.exe
                                                                                    C:\Windows\system32\Bmemac32.exe
                                                                                    41⤵
                                                                                    • Adds autorun key to be loaded by Explorer.exe on startup
                                                                                    • Executes dropped EXE
                                                                                    • Drops file in System32 directory
                                                                                    • Modifies registry class
                                                                                    PID:4444
                                                                                    • C:\Windows\SysWOW64\Bapiabak.exe
                                                                                      C:\Windows\system32\Bapiabak.exe
                                                                                      42⤵
                                                                                      • Adds autorun key to be loaded by Explorer.exe on startup
                                                                                      • Executes dropped EXE
                                                                                      • Drops file in System32 directory
                                                                                      • Modifies registry class
                                                                                      PID:4796
                                                                                      • C:\Windows\SysWOW64\Chjaol32.exe
                                                                                        C:\Windows\system32\Chjaol32.exe
                                                                                        43⤵
                                                                                        • Adds autorun key to be loaded by Explorer.exe on startup
                                                                                        • Executes dropped EXE
                                                                                        • Drops file in System32 directory
                                                                                        • Modifies registry class
                                                                                        PID:4924
                                                                                        • C:\Windows\SysWOW64\Cndikf32.exe
                                                                                          C:\Windows\system32\Cndikf32.exe
                                                                                          44⤵
                                                                                          • Executes dropped EXE
                                                                                          • Drops file in System32 directory
                                                                                          • Modifies registry class
                                                                                          PID:4584
                                                                                          • C:\Windows\SysWOW64\Cenahpha.exe
                                                                                            C:\Windows\system32\Cenahpha.exe
                                                                                            45⤵
                                                                                            • Executes dropped EXE
                                                                                            • Drops file in System32 directory
                                                                                            • Modifies registry class
                                                                                            PID:5044
                                                                                            • C:\Windows\SysWOW64\Chmndlge.exe
                                                                                              C:\Windows\system32\Chmndlge.exe
                                                                                              46⤵
                                                                                              • Adds autorun key to be loaded by Explorer.exe on startup
                                                                                              • Executes dropped EXE
                                                                                              • Drops file in System32 directory
                                                                                              • Modifies registry class
                                                                                              PID:4024
                                                                                              • C:\Windows\SysWOW64\Cjkjpgfi.exe
                                                                                                C:\Windows\system32\Cjkjpgfi.exe
                                                                                                47⤵
                                                                                                • Adds autorun key to be loaded by Explorer.exe on startup
                                                                                                • Executes dropped EXE
                                                                                                • Drops file in System32 directory
                                                                                                • Modifies registry class
                                                                                                PID:3644
                                                                                                • C:\Windows\SysWOW64\Caebma32.exe
                                                                                                  C:\Windows\system32\Caebma32.exe
                                                                                                  48⤵
                                                                                                  • Adds autorun key to be loaded by Explorer.exe on startup
                                                                                                  • Executes dropped EXE
                                                                                                  • Drops file in System32 directory
                                                                                                  • Modifies registry class
                                                                                                  PID:4476
                                                                                                  • C:\Windows\SysWOW64\Cfbkeh32.exe
                                                                                                    C:\Windows\system32\Cfbkeh32.exe
                                                                                                    49⤵
                                                                                                    • Adds autorun key to be loaded by Explorer.exe on startup
                                                                                                    • Executes dropped EXE
                                                                                                    • Drops file in System32 directory
                                                                                                    • Modifies registry class
                                                                                                    PID:1720
                                                                                                    • C:\Windows\SysWOW64\Cmlcbbcj.exe
                                                                                                      C:\Windows\system32\Cmlcbbcj.exe
                                                                                                      50⤵
                                                                                                      • Adds autorun key to be loaded by Explorer.exe on startup
                                                                                                      • Executes dropped EXE
                                                                                                      • Drops file in System32 directory
                                                                                                      • Modifies registry class
                                                                                                      PID:4380
                                                                                                      • C:\Windows\SysWOW64\Chagok32.exe
                                                                                                        C:\Windows\system32\Chagok32.exe
                                                                                                        51⤵
                                                                                                        • Adds autorun key to be loaded by Explorer.exe on startup
                                                                                                        • Executes dropped EXE
                                                                                                        • Drops file in System32 directory
                                                                                                        • Modifies registry class
                                                                                                        PID:1792
                                                                                                        • C:\Windows\SysWOW64\Cnkplejl.exe
                                                                                                          C:\Windows\system32\Cnkplejl.exe
                                                                                                          52⤵
                                                                                                          • Adds autorun key to be loaded by Explorer.exe on startup
                                                                                                          • Executes dropped EXE
                                                                                                          • Drops file in System32 directory
                                                                                                          • Modifies registry class
                                                                                                          PID:4564
                                                                                                          • C:\Windows\SysWOW64\Ceehho32.exe
                                                                                                            C:\Windows\system32\Ceehho32.exe
                                                                                                            53⤵
                                                                                                            • Adds autorun key to be loaded by Explorer.exe on startup
                                                                                                            • Executes dropped EXE
                                                                                                            • Modifies registry class
                                                                                                            PID:4240
                                                                                                            • C:\Windows\SysWOW64\Chcddk32.exe
                                                                                                              C:\Windows\system32\Chcddk32.exe
                                                                                                              54⤵
                                                                                                              • Adds autorun key to be loaded by Explorer.exe on startup
                                                                                                              • Executes dropped EXE
                                                                                                              PID:4040
                                                                                                              • C:\Windows\SysWOW64\Cjbpaf32.exe
                                                                                                                C:\Windows\system32\Cjbpaf32.exe
                                                                                                                55⤵
                                                                                                                • Adds autorun key to be loaded by Explorer.exe on startup
                                                                                                                • Executes dropped EXE
                                                                                                                • Drops file in System32 directory
                                                                                                                PID:3248
                                                                                                                • C:\Windows\SysWOW64\Calhnpgn.exe
                                                                                                                  C:\Windows\system32\Calhnpgn.exe
                                                                                                                  56⤵
                                                                                                                  • Adds autorun key to be loaded by Explorer.exe on startup
                                                                                                                  • Executes dropped EXE
                                                                                                                  • Modifies registry class
                                                                                                                  PID:4140
                                                                                                                  • C:\Windows\SysWOW64\Dfiafg32.exe
                                                                                                                    C:\Windows\system32\Dfiafg32.exe
                                                                                                                    57⤵
                                                                                                                    • Executes dropped EXE
                                                                                                                    • Drops file in System32 directory
                                                                                                                    • Modifies registry class
                                                                                                                    PID:4768
                                                                                                                    • C:\Windows\SysWOW64\Dopigd32.exe
                                                                                                                      C:\Windows\system32\Dopigd32.exe
                                                                                                                      58⤵
                                                                                                                      • Adds autorun key to be loaded by Explorer.exe on startup
                                                                                                                      • Executes dropped EXE
                                                                                                                      PID:4504
                                                                                                                      • C:\Windows\SysWOW64\Danecp32.exe
                                                                                                                        C:\Windows\system32\Danecp32.exe
                                                                                                                        59⤵
                                                                                                                        • Adds autorun key to be loaded by Explorer.exe on startup
                                                                                                                        • Executes dropped EXE
                                                                                                                        • Drops file in System32 directory
                                                                                                                        • Modifies registry class
                                                                                                                        PID:4244
                                                                                                                        • C:\Windows\SysWOW64\Ddmaok32.exe
                                                                                                                          C:\Windows\system32\Ddmaok32.exe
                                                                                                                          60⤵
                                                                                                                          • Adds autorun key to be loaded by Explorer.exe on startup
                                                                                                                          • Executes dropped EXE
                                                                                                                          PID:532
                                                                                                                          • C:\Windows\SysWOW64\Djgjlelk.exe
                                                                                                                            C:\Windows\system32\Djgjlelk.exe
                                                                                                                            61⤵
                                                                                                                            • Adds autorun key to be loaded by Explorer.exe on startup
                                                                                                                            • Executes dropped EXE
                                                                                                                            • Modifies registry class
                                                                                                                            PID:1576
                                                                                                                            • C:\Windows\SysWOW64\Dmefhako.exe
                                                                                                                              C:\Windows\system32\Dmefhako.exe
                                                                                                                              62⤵
                                                                                                                              • Adds autorun key to be loaded by Explorer.exe on startup
                                                                                                                              • Executes dropped EXE
                                                                                                                              PID:2936
                                                                                                                              • C:\Windows\SysWOW64\Delnin32.exe
                                                                                                                                C:\Windows\system32\Delnin32.exe
                                                                                                                                63⤵
                                                                                                                                • Adds autorun key to be loaded by Explorer.exe on startup
                                                                                                                                • Executes dropped EXE
                                                                                                                                • Drops file in System32 directory
                                                                                                                                PID:348
                                                                                                                                • C:\Windows\SysWOW64\Dhkjej32.exe
                                                                                                                                  C:\Windows\system32\Dhkjej32.exe
                                                                                                                                  64⤵
                                                                                                                                  • Adds autorun key to be loaded by Explorer.exe on startup
                                                                                                                                  • Executes dropped EXE
                                                                                                                                  • Drops file in System32 directory
                                                                                                                                  • Modifies registry class
                                                                                                                                  PID:800
                                                                                                                                  • C:\Windows\SysWOW64\Dodbbdbb.exe
                                                                                                                                    C:\Windows\system32\Dodbbdbb.exe
                                                                                                                                    65⤵
                                                                                                                                    • Adds autorun key to be loaded by Explorer.exe on startup
                                                                                                                                    • Executes dropped EXE
                                                                                                                                    • Modifies registry class
                                                                                                                                    PID:3600
                                                                                                                                    • C:\Windows\SysWOW64\Daconoae.exe
                                                                                                                                      C:\Windows\system32\Daconoae.exe
                                                                                                                                      66⤵
                                                                                                                                      • Adds autorun key to be loaded by Explorer.exe on startup
                                                                                                                                      • Drops file in System32 directory
                                                                                                                                      • Modifies registry class
                                                                                                                                      PID:4968
                                                                                                                                      • C:\Windows\SysWOW64\Ddakjkqi.exe
                                                                                                                                        C:\Windows\system32\Ddakjkqi.exe
                                                                                                                                        67⤵
                                                                                                                                        • Adds autorun key to be loaded by Explorer.exe on startup
                                                                                                                                        • Drops file in System32 directory
                                                                                                                                        • Modifies registry class
                                                                                                                                        PID:620
                                                                                                                                        • C:\Windows\SysWOW64\Dfpgffpm.exe
                                                                                                                                          C:\Windows\system32\Dfpgffpm.exe
                                                                                                                                          68⤵
                                                                                                                                            PID:4560
                                                                                                                                            • C:\Windows\SysWOW64\Dmjocp32.exe
                                                                                                                                              C:\Windows\system32\Dmjocp32.exe
                                                                                                                                              69⤵
                                                                                                                                              • Adds autorun key to be loaded by Explorer.exe on startup
                                                                                                                                              • Modifies registry class
                                                                                                                                              PID:2376
                                                                                                                                              • C:\Windows\SysWOW64\Daekdooc.exe
                                                                                                                                                C:\Windows\system32\Daekdooc.exe
                                                                                                                                                70⤵
                                                                                                                                                • Adds autorun key to be loaded by Explorer.exe on startup
                                                                                                                                                PID:3608
                                                                                                                                                • C:\Windows\SysWOW64\Dmllipeg.exe
                                                                                                                                                  C:\Windows\system32\Dmllipeg.exe
                                                                                                                                                  71⤵
                                                                                                                                                    PID:2916
                                                                                                                                                    • C:\Windows\SysWOW64\WerFault.exe
                                                                                                                                                      C:\Windows\SysWOW64\WerFault.exe -u -p 2916 -s 408
                                                                                                                                                      72⤵
                                                                                                                                                      • Program crash
                                                                                                                                                      PID:652
      • C:\Windows\SysWOW64\WerFault.exe
        C:\Windows\SysWOW64\WerFault.exe -pss -s 440 -p 2916 -ip 2916
        1⤵
          PID:2252

        Network

        MITRE ATT&CK Enterprise v15

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • C:\Windows\SysWOW64\Aabmqd32.exe

          Filesize

          400KB

          MD5

          0679e9105b585270ea6994cf652993ec

          SHA1

          8b2eae52a4de2595268712f654047f3ec3baafd3

          SHA256

          8eb14c5315bd7d030f24d65ac30efafae5b0a3f7c9ba1cea1af378248f90a178

          SHA512

          3826c1cb0510ec4a9a5633bb5690b7607e0da0a1bcad0c2b5a5a9e378890c92ca809c7298fae652d28e9f3bdaadb0081bb0771f29252ae022488b5173ae858dc

        • C:\Windows\SysWOW64\Aeklkchg.exe

          Filesize

          400KB

          MD5

          61d9db916d290a3c2dca5b4099479dc0

          SHA1

          71d037f2f28ea005d35ba4774d92723b85832dcf

          SHA256

          7bffa2bbca4a0b1f13987c80725dc2a8bad78443ed66c3be8565a1e04c4f3a7a

          SHA512

          c85926b51716a8d8be199caee5e4dd745de21bffdfae62080958e985948005bf4fc018b785bb10677dee3086902b6c47e1033131d9285d01fe6f810e7acd2df9

        • C:\Windows\SysWOW64\Aepefb32.exe

          Filesize

          400KB

          MD5

          2c1f0ffa19e4e5152d18383d9ef742c2

          SHA1

          21f1b3a7f938b357dd7436d4b958aa70da28d878

          SHA256

          c21b6b5ef16a87984130e5d185bee2df0f75ee71f91b598949eb569365cf1593

          SHA512

          74ed9ebb68d6dc8734ea0db0e442f4cb9d67f52dd40ace83d6c41dc8b797603d52fc3bac0caadb1b2863ff8fe21ce38e71cd77473a2e79926ce754f36922ac26

        • C:\Windows\SysWOW64\Agglboim.exe

          Filesize

          400KB

          MD5

          e3de7367727ebd2e21b08fa5daad1553

          SHA1

          91feb54a83322ad0581bd57cce241916a568bee6

          SHA256

          7cf68f2c182ccde64b990193230b1f2afac818afbaba7def4055d63bd56fc48d

          SHA512

          8a338793c4bd972e6a7efd6199677d2751719e9d4b94484ab57f89c4fe80b7f5fa3571cab9471b8facda39984f0668e16d70f8973c9c024c3aecd0d15d5a7f32

        • C:\Windows\SysWOW64\Aglemn32.exe

          Filesize

          400KB

          MD5

          00c36c332203a41cac77ff3c938f3cb0

          SHA1

          f3eae634b926f04522a29e6603f2675529f66fc0

          SHA256

          714d22255a1d54b7c3da43187686830aa28e72e9e9f30719ee0971fa9a9ab360

          SHA512

          3f2bab80f065eab128a393ff51a6a171097f19156661cfc4540b0eee46be7dd701213d3a32bbc800ada5907e49fb1bff0ac63883e0058501aa47d0a1211aca98

        • C:\Windows\SysWOW64\Ambgef32.exe

          Filesize

          400KB

          MD5

          6b43dd415a788125bc0c701648efe7b1

          SHA1

          0855857c3e536da29df060ed31b76aea92551e57

          SHA256

          e011021f10c378d314f4af056410aea6a298410aca8b5c33398acd256f140329

          SHA512

          1127bf644c1bfe174126e9d9f02dec8da41f58c4b47ed721bce2122e29693c36feca12b2ac0bebf4bc5abb89788e4a9d3de4d12960b4369a95ce56482b7b4b56

        • C:\Windows\SysWOW64\Amddjegd.exe

          Filesize

          400KB

          MD5

          b20d12791608ded793edc98860268e60

          SHA1

          28b7a2aab608276c9f5b026cd517bbf8909ba011

          SHA256

          86b07fbd845d15186e2d9e8ad7a666aaef86fed4411977b901e6a2c27d421295

          SHA512

          1fa3aeb3689cb292209502ada29c302f0913c30c91241174afa7fe1b97c3841fb3364aad23af4f07e0a5555058ad763b2fd332b6415e7adef146484fd1ffca20

        • C:\Windows\SysWOW64\Anfmjhmd.exe

          Filesize

          400KB

          MD5

          651bef6ad29b7c3f5713190c1d83950a

          SHA1

          cbc21bf6ad5a16907923a506772e5b3cf27c0469

          SHA256

          ae7d3c32a95513e06762c9688f697751589cce6dd5b22857239a01d60ea9efab

          SHA512

          0d348987205a7364327b4b40ab4838c67313c81cb0fe24c4548693c2fed6d6705ff367b6a2afbde93ecff2347239c5f79991926a326bb66c804bb1898b1ea91c

        • C:\Windows\SysWOW64\Aqkgpedc.exe

          Filesize

          400KB

          MD5

          2f3d7ba85a395bc5064bbd3f84443044

          SHA1

          a45eeb47ca92da7f2f5e423473bc7513df6ced5f

          SHA256

          ebaf737ba4b5ea02db77338162680d0ba0eb370a7aa1774f6eb88df050c020d2

          SHA512

          7ad93e49b283ba245ec06561e14f24662f70049c5b50ac706f4f00bd9fe62b1c4d3479840083966e1f94da4e0e0da287c56561b26647d8c458bfde5a89e618c6

        • C:\Windows\SysWOW64\Bebblb32.exe

          Filesize

          400KB

          MD5

          2e6879a45223e646e75296574ebc8dd5

          SHA1

          50e3e6022a510c6845a17aec4807fb5f7a981e6f

          SHA256

          95faadaa3e51fc893031dbc7d6ce9ffb3536018e6852354ac89c694162fd999f

          SHA512

          e6d69ca620c3876f0c8df9f51dc87b23b1b5271e0ecfc0387ddd254cb291161f34e1a949b31a9925dea4f0b154a75e52fa824e5fc5f3342a1e30d39ba3755909

        • C:\Windows\SysWOW64\Bnhjohkb.exe

          Filesize

          400KB

          MD5

          90ccd0a29dd81a404be89b0495f8b4ff

          SHA1

          17117f31003efff0422a4a4cb853629961cd17c2

          SHA256

          e9bc0256a15c87f16811fe3bc18bbdf32c28755c1fdf81c550128f06256e4427

          SHA512

          dcf56b48a370003f3edc11a0796c6af25e956206ff01519a3bd25524883914689c0a1910fc4c60fe931a895464bf08ef9da664d7edd7b0483304175899520214

        • C:\Windows\SysWOW64\Caebma32.exe

          Filesize

          400KB

          MD5

          62e865e209cf1221055eaa7e52f4f629

          SHA1

          e625f7beea42039309ce7143fabc3bf545629ad1

          SHA256

          5c3347e361b7e773b668aea5ea65865dd7b4138080c2eab14ee88dc300cb43e3

          SHA512

          c7e1900654a7ff567250983c236517aa97b3f5c1d3b6c490377bc74e67e343241a5bb59425b5debfd18fc3ee509d1988c55412184a03ceea9f3816459c552f6d

        • C:\Windows\SysWOW64\Ceehho32.exe

          Filesize

          400KB

          MD5

          ab0dc9177a406fb1c87e3ca19af4db48

          SHA1

          9472b7fc283160469e2149f939e7de91053618fb

          SHA256

          095a039723ef5319e712fb48af5a678613f1172ef2bf7a57797667d5125b08e8

          SHA512

          732c4d224ff979da36e6a03e095a0251ad5a2bcb76fd5612454b5043cdd067c1759dd31437468fc95ec3427c5ceb6344b041397e9926a2a782b1885fec81f322

        • C:\Windows\SysWOW64\Dmllipeg.exe

          Filesize

          400KB

          MD5

          532ff2ff23c30c1c3e317a871b346457

          SHA1

          a7b3792fcbf4b72a7616ce0cde9ff8dcff17c96b

          SHA256

          d4ca905b7d797b362492304ff31bc38a7ede8d63470927ae15f833dc93671453

          SHA512

          e17b9c682eb5909619b976a702ae38bb7c6e7fe9e146dffd996a2f7468cf3c00bf17f704c0e52be0d9690edff5ce60d9b62cb4862fb8680c70224ac1ddf4c08f

        • C:\Windows\SysWOW64\Gcdmai32.dll

          Filesize

          7KB

          MD5

          e9a90f88bdf6884ab0a80ebed28f188b

          SHA1

          2e66609ee32f2f396fce557afe06727b978cda6c

          SHA256

          fa093e65445a46520fef9fc74654588044b89b72a3e82ae6df0e7a779cd5660b

          SHA512

          707315674a47b92be4039a71251605e792b60645dca372ed139a7ec27c333827aaab717380319bfc9bb05515ab224f9e0d7f6f33eddbaa06ab2aba1ff2ea2cde

        • C:\Windows\SysWOW64\Ocbddc32.exe

          Filesize

          400KB

          MD5

          1c169713dfe91c0976f289038bb3e519

          SHA1

          b2f5d823bee49df7ecd4087ffbb0f4d650422fa8

          SHA256

          20ed76a57569244667a5faf50bf8cb520d0caeec1dfb4c5396c06d6948aed389

          SHA512

          d84993ad2b3f6cfba448658067ec18fb2c3f31f52ac7966a267fd50e9c324d5d4f4b86c3a2afa934f790c1f4fd63ebbf75e606673c3492978d2f9027d53108bd

        • C:\Windows\SysWOW64\Odapnf32.exe

          Filesize

          400KB

          MD5

          35d46ae302de74ac7acbce9493ec356b

          SHA1

          37d4d8999d62e0cb4d65fdcebd2c4d8d622e30dd

          SHA256

          9e1579551451cbf1962ed0f919a48f1ba789b513229aa3c573982f9dbe021a2f

          SHA512

          7d342d38e47e76faac43f3651d8c113e7eacb50529d360a9edbec2001c7e90b35ff6e3d30bc2c0b4515cab873ceb08b1b9e6a587bc993a6a835727b834288837

        • C:\Windows\SysWOW64\Ofcmfodb.exe

          Filesize

          400KB

          MD5

          ed06f214020de721a2f4a20cb51db1d0

          SHA1

          354a4d8ab618932989d57920a5826681da43e104

          SHA256

          ca3dcead8eab1e59dba7a84836079d0c867427741eaaf18401babc09cf8efca1

          SHA512

          29ff6c12597c3523bf979895c438f26d0d16d00b3b34a199cb216185e598f6a305e55b5c9e019b3aea29c058a0c4fdf90b6da0a2d2609a2a43ea5eb868eb392d

        • C:\Windows\SysWOW64\Ojaelm32.exe

          Filesize

          400KB

          MD5

          2708fab27d08f1396315b045b66ed615

          SHA1

          ce0d58c8e881181aa64948857d71fa9ce83d8e4e

          SHA256

          92719f0f0bf0f95dc4627548e21ad7dfe6597a11d945c849ba552e7e3689d5c1

          SHA512

          5263efdf56a3c72b907a93fd2f5b08fdd8048f2c4641cf752ff4370d8b210eb4e2a4d1ec8a5df5b81e188a9c1bad1bd3971dfa4b1bfae43f87cf298d102eb92f

        • C:\Windows\SysWOW64\Ojjolnaq.exe

          Filesize

          400KB

          MD5

          3df2f8912a61c1d8ddb7cc510dfe94aa

          SHA1

          ac53ddf3b6e048fe6d008707b2a18941d388daaa

          SHA256

          fc0d9966fb456ebd6014ae20ed3cc705e937ea3318f8fe0d73127c898faea7d4

          SHA512

          13562a9fb9b2afd85b78dea1328c22c5716965ac5aeafe1388cc0e60671ad8dec9045aa62882078add93d2f840cee40caee1e41d195f20d94a7b25894faf3d64

        • C:\Windows\SysWOW64\Olhlhjpd.exe

          Filesize

          400KB

          MD5

          3c42d102c14ec6452931292137c73dd1

          SHA1

          c3dc546ec4c596c906258d59677c8164ffdfbdf8

          SHA256

          8708a4502b8bff7ac630a089411d2c29a77cf560ef9b8947daeead12fbe578b8

          SHA512

          5a83483d5386437d182c85dff2eb6ec0a9397eb26ed9a5aceee25d9eed2bd1f036245314fb0b9c9fea0060921b41c04eb356996fa98278537240ce6c6c4c0a1e

        • C:\Windows\SysWOW64\Onjegled.exe

          Filesize

          400KB

          MD5

          276475dab6bf7e9b601e590e070095c6

          SHA1

          045f654821406abd75d4c9f30f6ac6448fbd2914

          SHA256

          0319ed4877ccff7b9bb9a423e861ad13928e193c390d4a74b3624ae2ab849183

          SHA512

          4ccf3383443470088a53cd0947bc2ef5b836152fd974a9500fd05e51adb2135352d53800401034fbc0b8d948ea1febef7f0829a77ba64e61a0d736d565e04a57

        • C:\Windows\SysWOW64\Pcbmka32.exe

          Filesize

          400KB

          MD5

          a3e4f852751139223be2f731acb1d02f

          SHA1

          1d2b81fbb626a99115538a5f6f0c75fac87e87f5

          SHA256

          44d9fcedd4d58234691e94e4344a2521a7d3fe841f89465712e9adc9d3cfe04d

          SHA512

          e8cc7a7a8d9727646e0657fa11c4d79b5dcc02fbe975890782f9540b32969cb6323f9de0a99d7da9db7d63e14a1b5d1e68aa740463346fd1d2588f3b41730fc5

        • C:\Windows\SysWOW64\Pclgkb32.exe

          Filesize

          400KB

          MD5

          254b8c4c7aa2f1eac8460ac9c3ca395e

          SHA1

          3d9b917aa97c453749536f00b472680f89217ba6

          SHA256

          100daaa0a8a5e8609ce7ac180c6674e4a86adbe849a03fe60b37168d4d1c2561

          SHA512

          7032816f5a02581e218c99808fd67f96ace879f2bbaff2137fd8d6b59900f38312e6b1a7e4e124a3d0bc078d730747268901fadeb2803b8ffdbdc882e2f7135a

        • C:\Windows\SysWOW64\Pfolbmje.exe

          Filesize

          400KB

          MD5

          b9bb0fcf0781f44da64dc3338ef277d1

          SHA1

          260fc948ccc08c37570212149e1a9ad5c4a65d0f

          SHA256

          4bbfb39d744f890f166fbdb1ba9f931911d9894d5d78f9e151c76cd4e6a1cd3c

          SHA512

          f4f31b05bc7e1393ddd9c75457a5eeab133faa217aebcaf56550370fbe766b8dd04a3737d93334f47def7d0d48fc6a123b1334ea156e8305ff2aa1935e986bc0

        • C:\Windows\SysWOW64\Pgefeajb.exe

          Filesize

          400KB

          MD5

          333e26dfdfc7cb9b5174cb862954c64c

          SHA1

          556a7b05a8a6a970004a7f3926ae6d09ab79a76a

          SHA256

          47db03fad54bb838f418fbce4af072072c9446aa45e11443cbf36e11d1bbe314

          SHA512

          fb1f243460d78244f5253d40cbddd31530b322fa6a22dc9d35b72bc080ea16dd1c52c1fd0e1362ddc435f5f4983b65bb382dc838eabbd8bd13857c467ebccf36

        • C:\Windows\SysWOW64\Pgioqq32.exe

          Filesize

          400KB

          MD5

          4f85fac2bec9a4406693b7af436544d6

          SHA1

          649bd866bc8ec8a7c4639c93678748198ba6bea5

          SHA256

          b058f6f48bb3edf66c0759fcbb36f591837356d1a283a3097875a8ed72d602ae

          SHA512

          d6c04a6ede82dbf6156bc384c19880e008675ed65fef83577e426a3f5577b564d00ab5415970d3f9b6349019cad72458a659bb1894fca5f0e434cdcc68692015

        • C:\Windows\SysWOW64\Pmannhhj.exe

          Filesize

          400KB

          MD5

          9089fe737d564e4fef8e4ff97c7cd56d

          SHA1

          65acd7f91beae671b334527b3d45f9ff290efefd

          SHA256

          6aa6dbfe4f4ceae5d0ebb66da51fcc37549674e33460adff38e419d463881c22

          SHA512

          539f0764f5e2681abca4400a1401f40906619f58e9e2cce86b01d241556577a6715e8b9f914617c39ae1b9b677e274558a0bae3eebe65d7766efb02b93ce32d3

        • C:\Windows\SysWOW64\Pmidog32.exe

          Filesize

          400KB

          MD5

          9ecd2604c945e25cf70b1efefe6eeb0e

          SHA1

          357a876fb64f05b448f0af7d133c21c85cb4b845

          SHA256

          d81976ceded3c566b56d4c01e120a5a132ac64fc7a7fb7c29e2e7cb40c1a6a24

          SHA512

          8f4ce3f52155efe8af02862ab56135f55069b4417c623eaefbc3358693e1901e10344d2289facebe7831e069e8eb923d28319c4048a24f0f8e3a85722bfdda06

        • C:\Windows\SysWOW64\Pmoahijl.exe

          Filesize

          400KB

          MD5

          917a06973dc0692df4c7baf47d0c5fae

          SHA1

          ddf43dfee98174548e92c154ae0c9aadafb9938d

          SHA256

          9fd573237b4f199417db69fc9ec15d63be11a69963abc4b1d217f17b983ef739

          SHA512

          d2a8dfa3e26f4b8e22f801a7e6547d780a0177d44b1f5a667f8f4eb443f4639b3f4c8e3cd10b3aca632405d2f0f715a6723d186db39829aaa2e9a21b42bc9a45

        • C:\Windows\SysWOW64\Pnakhkol.exe

          Filesize

          400KB

          MD5

          00e00315a242f01e52558abef052bb85

          SHA1

          9af89379dceb47e49900b80ad15d62ceece4674d

          SHA256

          0e6e86e0e864975c89832837842bf1411124ff42ee2267ed1791bae14e3d6291

          SHA512

          9a9a85a3f82aa02be43bf4310a656270365f23a3bf37fa5cea96d7db9879f1e25f9270ba3b8dabe0c55c08129d1e1385de35f397d9f55f2a94de77e8cfcae117

        • C:\Windows\SysWOW64\Pqpgdfnp.exe

          Filesize

          400KB

          MD5

          8065e9e1abe62f38442f0e17e633b605

          SHA1

          bc8d25d8397a6bbe5e00c416b37559ac6f284010

          SHA256

          a51c89da8e80a283ded4016bd007d32e03b239b6e26f5dc3a48f7efe57a9b155

          SHA512

          0c38b796bd143ecd3b70111d399877872ab298faaa025cd5c862c2c7d40441a7c78465b5dae09ceaf911c2575f2e7b1947cd444c08e0dcfe6ed7e7635441b171

        • C:\Windows\SysWOW64\Qgcbgo32.exe

          Filesize

          400KB

          MD5

          75a5dca5f55e4f0b5b14c2d207721e1e

          SHA1

          377ffcf0bba0866ec0af8b34998061d81638a0f5

          SHA256

          7d88e2a84156f1532c932ecaff62419dc038b9ced4ef2d1556c6118a432fa8ec

          SHA512

          3ba6c7d3e5ef1632c4f8c7b93aa806ce23243bb6856d6935df17b06670ba2f751b481f7756c6bc0a2074ccf02ec1cf7b8c92106cc2a1c693c972d63a3d057b14

        • C:\Windows\SysWOW64\Qgqeappe.exe

          Filesize

          400KB

          MD5

          ee73e343a38fa9f8d4ddc4554bcd44a9

          SHA1

          06b5263abec3c9150aff41da67a6a45a755f8250

          SHA256

          0e1749a73193b22c44151c854bb968d71005f890c684f2677da0f2494bd5a717

          SHA512

          b72c0e5caa1ccae87e5c420dd79b05ae02f4e03c29b5292350f11b69d780abcbe17388e76296ada8f23abd2dcc8e8fbd5d3768d04b79a06ead376e87d95f2dc3

        • C:\Windows\SysWOW64\Qnhahj32.exe

          Filesize

          400KB

          MD5

          72b27876a97c26ab1223bec8d7cf470c

          SHA1

          df6b8e23def2a5f9ced4a87241a1161983fbcd53

          SHA256

          0d74115f6dd9a80b0562c8550b20f6c54227c1f09db98de30e707ff96791144c

          SHA512

          7c87eb4aad85ce940fa2706d751e8d50a24d8d4f1d48bac00fead1ca1d7c28b46824ce25853f9cf2257625dc9623b453ecc987be22ddfdb2a04bc6c4f7658029

        • C:\Windows\SysWOW64\Qnjnnj32.exe

          Filesize

          400KB

          MD5

          4f8b9b62888310a7515fd764d5e2071c

          SHA1

          4b56f8d45143bb03eeba501a447de61129f67972

          SHA256

          a59dbb6205b462cda5f0203a57a0b6890bbb7cddb83674b6d495d6392454d92b

          SHA512

          296aa904905ec437dd9896d62a39fdd6adc10a268f138a1de4830f85e94d1b1a606eccf0408e9dcd1cfef2f9b9dc95dd22f130397abeb0f5eeed60b0e98bf5e7

        • memory/208-543-0x0000000000400000-0x0000000000434000-memory.dmp

          Filesize

          208KB

        • memory/208-95-0x0000000000400000-0x0000000000434000-memory.dmp

          Filesize

          208KB

        • memory/348-493-0x0000000000400000-0x0000000000434000-memory.dmp

          Filesize

          208KB

        • memory/348-436-0x0000000000400000-0x0000000000434000-memory.dmp

          Filesize

          208KB

        • memory/432-280-0x0000000000400000-0x0000000000434000-memory.dmp

          Filesize

          208KB

        • memory/432-519-0x0000000000400000-0x0000000000434000-memory.dmp

          Filesize

          208KB

        • memory/532-496-0x0000000000400000-0x0000000000434000-memory.dmp

          Filesize

          208KB

        • memory/532-418-0x0000000000400000-0x0000000000434000-memory.dmp

          Filesize

          208KB

        • memory/552-63-0x0000000000400000-0x0000000000434000-memory.dmp

          Filesize

          208KB

        • memory/552-547-0x0000000000400000-0x0000000000434000-memory.dmp

          Filesize

          208KB

        • memory/620-489-0x0000000000400000-0x0000000000434000-memory.dmp

          Filesize

          208KB

        • memory/800-492-0x0000000000400000-0x0000000000434000-memory.dmp

          Filesize

          208KB

        • memory/800-443-0x0000000000400000-0x0000000000434000-memory.dmp

          Filesize

          208KB

        • memory/916-32-0x0000000000400000-0x0000000000434000-memory.dmp

          Filesize

          208KB

        • memory/1108-540-0x0000000000400000-0x0000000000434000-memory.dmp

          Filesize

          208KB

        • memory/1108-120-0x0000000000400000-0x0000000000434000-memory.dmp

          Filesize

          208KB

        • memory/1192-144-0x0000000000400000-0x0000000000434000-memory.dmp

          Filesize

          208KB

        • memory/1192-537-0x0000000000400000-0x0000000000434000-memory.dmp

          Filesize

          208KB

        • memory/1224-532-0x0000000000400000-0x0000000000434000-memory.dmp

          Filesize

          208KB

        • memory/1224-184-0x0000000000400000-0x0000000000434000-memory.dmp

          Filesize

          208KB

        • memory/1256-0-0x0000000000400000-0x0000000000434000-memory.dmp

          Filesize

          208KB

        • memory/1512-518-0x0000000000400000-0x0000000000434000-memory.dmp

          Filesize

          208KB

        • memory/1512-286-0x0000000000400000-0x0000000000434000-memory.dmp

          Filesize

          208KB

        • memory/1548-47-0x0000000000400000-0x0000000000434000-memory.dmp

          Filesize

          208KB

        • memory/1576-495-0x0000000000400000-0x0000000000434000-memory.dmp

          Filesize

          208KB

        • memory/1576-424-0x0000000000400000-0x0000000000434000-memory.dmp

          Filesize

          208KB

        • memory/1592-548-0x0000000000400000-0x0000000000434000-memory.dmp

          Filesize

          208KB

        • memory/1592-56-0x0000000000400000-0x0000000000434000-memory.dmp

          Filesize

          208KB

        • memory/1708-529-0x0000000000400000-0x0000000000434000-memory.dmp

          Filesize

          208KB

        • memory/1708-207-0x0000000000400000-0x0000000000434000-memory.dmp

          Filesize

          208KB

        • memory/1720-352-0x0000000000400000-0x0000000000434000-memory.dmp

          Filesize

          208KB

        • memory/1720-507-0x0000000000400000-0x0000000000434000-memory.dmp

          Filesize

          208KB

        • memory/1776-535-0x0000000000400000-0x0000000000434000-memory.dmp

          Filesize

          208KB

        • memory/1776-159-0x0000000000400000-0x0000000000434000-memory.dmp

          Filesize

          208KB

        • memory/1792-364-0x0000000000400000-0x0000000000434000-memory.dmp

          Filesize

          208KB

        • memory/1792-505-0x0000000000400000-0x0000000000434000-memory.dmp

          Filesize

          208KB

        • memory/1840-40-0x0000000000400000-0x0000000000434000-memory.dmp

          Filesize

          208KB

        • memory/1860-104-0x0000000000400000-0x0000000000434000-memory.dmp

          Filesize

          208KB

        • memory/1860-542-0x0000000000400000-0x0000000000434000-memory.dmp

          Filesize

          208KB

        • memory/1896-228-0x0000000000400000-0x0000000000434000-memory.dmp

          Filesize

          208KB

        • memory/2016-16-0x0000000000400000-0x0000000000434000-memory.dmp

          Filesize

          208KB

        • memory/2280-521-0x0000000000400000-0x0000000000434000-memory.dmp

          Filesize

          208KB

        • memory/2280-268-0x0000000000400000-0x0000000000434000-memory.dmp

          Filesize

          208KB

        • memory/2288-80-0x0000000000400000-0x0000000000434000-memory.dmp

          Filesize

          208KB

        • memory/2288-545-0x0000000000400000-0x0000000000434000-memory.dmp

          Filesize

          208KB

        • memory/2376-487-0x0000000000400000-0x0000000000434000-memory.dmp

          Filesize

          208KB

        • memory/2424-8-0x0000000000400000-0x0000000000434000-memory.dmp

          Filesize

          208KB

        • memory/2436-516-0x0000000000400000-0x0000000000434000-memory.dmp

          Filesize

          208KB

        • memory/2436-302-0x0000000000400000-0x0000000000434000-memory.dmp

          Filesize

          208KB

        • memory/2556-538-0x0000000000400000-0x0000000000434000-memory.dmp

          Filesize

          208KB

        • memory/2556-136-0x0000000000400000-0x0000000000434000-memory.dmp

          Filesize

          208KB

        • memory/2660-528-0x0000000000400000-0x0000000000434000-memory.dmp

          Filesize

          208KB

        • memory/2660-216-0x0000000000400000-0x0000000000434000-memory.dmp

          Filesize

          208KB

        • memory/2828-255-0x0000000000400000-0x0000000000434000-memory.dmp

          Filesize

          208KB

        • memory/2880-544-0x0000000000400000-0x0000000000434000-memory.dmp

          Filesize

          208KB

        • memory/2880-88-0x0000000000400000-0x0000000000434000-memory.dmp

          Filesize

          208KB

        • memory/2900-523-0x0000000000400000-0x0000000000434000-memory.dmp

          Filesize

          208KB

        • memory/2900-256-0x0000000000400000-0x0000000000434000-memory.dmp

          Filesize

          208KB

        • memory/2916-485-0x0000000000400000-0x0000000000434000-memory.dmp

          Filesize

          208KB

        • memory/2936-430-0x0000000000400000-0x0000000000434000-memory.dmp

          Filesize

          208KB

        • memory/2936-494-0x0000000000400000-0x0000000000434000-memory.dmp

          Filesize

          208KB

        • memory/3212-247-0x0000000000400000-0x0000000000434000-memory.dmp

          Filesize

          208KB

        • memory/3248-388-0x0000000000400000-0x0000000000434000-memory.dmp

          Filesize

          208KB

        • memory/3248-501-0x0000000000400000-0x0000000000434000-memory.dmp

          Filesize

          208KB

        • memory/3300-531-0x0000000000400000-0x0000000000434000-memory.dmp

          Filesize

          208KB

        • memory/3300-192-0x0000000000400000-0x0000000000434000-memory.dmp

          Filesize

          208KB

        • memory/3452-546-0x0000000000400000-0x0000000000434000-memory.dmp

          Filesize

          208KB

        • memory/3452-71-0x0000000000400000-0x0000000000434000-memory.dmp

          Filesize

          208KB

        • memory/3456-262-0x0000000000400000-0x0000000000434000-memory.dmp

          Filesize

          208KB

        • memory/3456-522-0x0000000000400000-0x0000000000434000-memory.dmp

          Filesize

          208KB

        • memory/3600-491-0x0000000000400000-0x0000000000434000-memory.dmp

          Filesize

          208KB

        • memory/3608-486-0x0000000000400000-0x0000000000434000-memory.dmp

          Filesize

          208KB

        • memory/3620-200-0x0000000000400000-0x0000000000434000-memory.dmp

          Filesize

          208KB

        • memory/3620-530-0x0000000000400000-0x0000000000434000-memory.dmp

          Filesize

          208KB

        • memory/3644-509-0x0000000000400000-0x0000000000434000-memory.dmp

          Filesize

          208KB

        • memory/3644-340-0x0000000000400000-0x0000000000434000-memory.dmp

          Filesize

          208KB

        • memory/3668-534-0x0000000000400000-0x0000000000434000-memory.dmp

          Filesize

          208KB

        • memory/3668-168-0x0000000000400000-0x0000000000434000-memory.dmp

          Filesize

          208KB

        • memory/3676-536-0x0000000000400000-0x0000000000434000-memory.dmp

          Filesize

          208KB

        • memory/3676-152-0x0000000000400000-0x0000000000434000-memory.dmp

          Filesize

          208KB

        • memory/3956-539-0x0000000000400000-0x0000000000434000-memory.dmp

          Filesize

          208KB

        • memory/3956-127-0x0000000000400000-0x0000000000434000-memory.dmp

          Filesize

          208KB

        • memory/4024-334-0x0000000000400000-0x0000000000434000-memory.dmp

          Filesize

          208KB

        • memory/4024-510-0x0000000000400000-0x0000000000434000-memory.dmp

          Filesize

          208KB

        • memory/4040-502-0x0000000000400000-0x0000000000434000-memory.dmp

          Filesize

          208KB

        • memory/4040-382-0x0000000000400000-0x0000000000434000-memory.dmp

          Filesize

          208KB

        • memory/4140-394-0x0000000000400000-0x0000000000434000-memory.dmp

          Filesize

          208KB

        • memory/4140-500-0x0000000000400000-0x0000000000434000-memory.dmp

          Filesize

          208KB

        • memory/4240-503-0x0000000000400000-0x0000000000434000-memory.dmp

          Filesize

          208KB

        • memory/4240-376-0x0000000000400000-0x0000000000434000-memory.dmp

          Filesize

          208KB

        • memory/4244-497-0x0000000000400000-0x0000000000434000-memory.dmp

          Filesize

          208KB

        • memory/4244-412-0x0000000000400000-0x0000000000434000-memory.dmp

          Filesize

          208KB

        • memory/4380-358-0x0000000000400000-0x0000000000434000-memory.dmp

          Filesize

          208KB

        • memory/4380-506-0x0000000000400000-0x0000000000434000-memory.dmp

          Filesize

          208KB

        • memory/4440-232-0x0000000000400000-0x0000000000434000-memory.dmp

          Filesize

          208KB

        • memory/4440-526-0x0000000000400000-0x0000000000434000-memory.dmp

          Filesize

          208KB

        • memory/4444-308-0x0000000000400000-0x0000000000434000-memory.dmp

          Filesize

          208KB

        • memory/4468-520-0x0000000000400000-0x0000000000434000-memory.dmp

          Filesize

          208KB

        • memory/4468-274-0x0000000000400000-0x0000000000434000-memory.dmp

          Filesize

          208KB

        • memory/4476-350-0x0000000000400000-0x0000000000434000-memory.dmp

          Filesize

          208KB

        • memory/4504-406-0x0000000000400000-0x0000000000434000-memory.dmp

          Filesize

          208KB

        • memory/4504-498-0x0000000000400000-0x0000000000434000-memory.dmp

          Filesize

          208KB

        • memory/4560-488-0x0000000000400000-0x0000000000434000-memory.dmp

          Filesize

          208KB

        • memory/4564-504-0x0000000000400000-0x0000000000434000-memory.dmp

          Filesize

          208KB

        • memory/4564-370-0x0000000000400000-0x0000000000434000-memory.dmp

          Filesize

          208KB

        • memory/4584-322-0x0000000000400000-0x0000000000434000-memory.dmp

          Filesize

          208KB

        • memory/4584-512-0x0000000000400000-0x0000000000434000-memory.dmp

          Filesize

          208KB

        • memory/4608-175-0x0000000000400000-0x0000000000434000-memory.dmp

          Filesize

          208KB

        • memory/4608-533-0x0000000000400000-0x0000000000434000-memory.dmp

          Filesize

          208KB

        • memory/4656-292-0x0000000000400000-0x0000000000434000-memory.dmp

          Filesize

          208KB

        • memory/4656-517-0x0000000000400000-0x0000000000434000-memory.dmp

          Filesize

          208KB

        • memory/4672-541-0x0000000000400000-0x0000000000434000-memory.dmp

          Filesize

          208KB

        • memory/4672-111-0x0000000000400000-0x0000000000434000-memory.dmp

          Filesize

          208KB

        • memory/4756-24-0x0000000000400000-0x0000000000434000-memory.dmp

          Filesize

          208KB

        • memory/4768-404-0x0000000000400000-0x0000000000434000-memory.dmp

          Filesize

          208KB

        • memory/4796-514-0x0000000000400000-0x0000000000434000-memory.dmp

          Filesize

          208KB

        • memory/4796-310-0x0000000000400000-0x0000000000434000-memory.dmp

          Filesize

          208KB

        • memory/4924-316-0x0000000000400000-0x0000000000434000-memory.dmp

          Filesize

          208KB

        • memory/4924-513-0x0000000000400000-0x0000000000434000-memory.dmp

          Filesize

          208KB

        • memory/4968-490-0x0000000000400000-0x0000000000434000-memory.dmp

          Filesize

          208KB

        • memory/5044-328-0x0000000000400000-0x0000000000434000-memory.dmp

          Filesize

          208KB

        • memory/5044-511-0x0000000000400000-0x0000000000434000-memory.dmp

          Filesize

          208KB