Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    142s
  • max time network
    150s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240226-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system
  • submitted
    24/04/2024, 21:04

General

  • Target

    ce97e27b84e667fda5411e813c1f8d035aeeacfeb07f10674da5e99fdc92c18c.exe

  • Size

    448KB

  • MD5

    044e4e919699fc1e9a284aed8e1eb189

  • SHA1

    07dcc43984d813769e6a57ff3908f50582b42759

  • SHA256

    ce97e27b84e667fda5411e813c1f8d035aeeacfeb07f10674da5e99fdc92c18c

  • SHA512

    dd148952e91cd4aee029b699f5444d99fd29597fc0175c4b905bb43db19e34c4419977f3f31e914519b5fa389f6add083b1b33564610666446880dc1b3ffabf1

  • SSDEEP

    6144:xYBFS6s21L7/s50z/Wa3/PNlP59ENQdgrb8X6SJqGaPonZh/nr0xuIKjyAH9SKzS:mZ705kWM/9J6gqGBf/sAHZHbgdhgi

Score
10/10

Malware Config

Signatures

  • Adds autorun key to be loaded by Explorer.exe on startup 2 TTPs 64 IoCs
  • Executes dropped EXE 64 IoCs
  • Drops file in System32 directory 64 IoCs
  • Program crash 2 IoCs
  • Modifies registry class 64 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\ce97e27b84e667fda5411e813c1f8d035aeeacfeb07f10674da5e99fdc92c18c.exe
    "C:\Users\Admin\AppData\Local\Temp\ce97e27b84e667fda5411e813c1f8d035aeeacfeb07f10674da5e99fdc92c18c.exe"
    1⤵
    • Drops file in System32 directory
    • Modifies registry class
    • Suspicious use of WriteProcessMemory
    PID:4656
    • C:\Windows\SysWOW64\Nnhmnn32.exe
      C:\Windows\system32\Nnhmnn32.exe
      2⤵
      • Adds autorun key to be loaded by Explorer.exe on startup
      • Executes dropped EXE
      • Drops file in System32 directory
      • Modifies registry class
      • Suspicious use of WriteProcessMemory
      PID:2040
      • C:\Windows\SysWOW64\Opqofe32.exe
        C:\Windows\system32\Opqofe32.exe
        3⤵
        • Adds autorun key to be loaded by Explorer.exe on startup
        • Executes dropped EXE
        • Modifies registry class
        • Suspicious use of WriteProcessMemory
        PID:4300
        • C:\Windows\SysWOW64\Paeelgnj.exe
          C:\Windows\system32\Paeelgnj.exe
          4⤵
          • Executes dropped EXE
          • Drops file in System32 directory
          • Modifies registry class
          • Suspicious use of WriteProcessMemory
          PID:2656
          • C:\Windows\SysWOW64\Ppjbmc32.exe
            C:\Windows\system32\Ppjbmc32.exe
            5⤵
            • Adds autorun key to be loaded by Explorer.exe on startup
            • Executes dropped EXE
            • Drops file in System32 directory
            • Modifies registry class
            • Suspicious use of WriteProcessMemory
            PID:2188
            • C:\Windows\SysWOW64\Panhbfep.exe
              C:\Windows\system32\Panhbfep.exe
              6⤵
              • Adds autorun key to be loaded by Explorer.exe on startup
              • Executes dropped EXE
              • Drops file in System32 directory
              • Modifies registry class
              • Suspicious use of WriteProcessMemory
              PID:3160
              • C:\Windows\SysWOW64\Aagkhd32.exe
                C:\Windows\system32\Aagkhd32.exe
                7⤵
                • Adds autorun key to be loaded by Explorer.exe on startup
                • Executes dropped EXE
                • Drops file in System32 directory
                • Modifies registry class
                • Suspicious use of WriteProcessMemory
                PID:4672
                • C:\Windows\SysWOW64\Bajqda32.exe
                  C:\Windows\system32\Bajqda32.exe
                  8⤵
                  • Adds autorun key to be loaded by Explorer.exe on startup
                  • Executes dropped EXE
                  • Drops file in System32 directory
                  • Modifies registry class
                  • Suspicious use of WriteProcessMemory
                  PID:3916
                  • C:\Windows\SysWOW64\Chfegk32.exe
                    C:\Windows\system32\Chfegk32.exe
                    9⤵
                    • Adds autorun key to be loaded by Explorer.exe on startup
                    • Executes dropped EXE
                    • Suspicious use of WriteProcessMemory
                    PID:4064
                    • C:\Windows\SysWOW64\Cglbhhga.exe
                      C:\Windows\system32\Cglbhhga.exe
                      10⤵
                      • Adds autorun key to be loaded by Explorer.exe on startup
                      • Executes dropped EXE
                      • Drops file in System32 directory
                      • Suspicious use of WriteProcessMemory
                      PID:940
                      • C:\Windows\SysWOW64\Cogddd32.exe
                        C:\Windows\system32\Cogddd32.exe
                        11⤵
                        • Executes dropped EXE
                        • Drops file in System32 directory
                        • Modifies registry class
                        • Suspicious use of WriteProcessMemory
                        PID:744
                        • C:\Windows\SysWOW64\Dqnjgl32.exe
                          C:\Windows\system32\Dqnjgl32.exe
                          12⤵
                          • Adds autorun key to be loaded by Explorer.exe on startup
                          • Executes dropped EXE
                          • Modifies registry class
                          • Suspicious use of WriteProcessMemory
                          PID:1444
                          • C:\Windows\SysWOW64\Eqdpgk32.exe
                            C:\Windows\system32\Eqdpgk32.exe
                            13⤵
                            • Adds autorun key to be loaded by Explorer.exe on startup
                            • Executes dropped EXE
                            • Drops file in System32 directory
                            • Modifies registry class
                            • Suspicious use of WriteProcessMemory
                            PID:4904
                            • C:\Windows\SysWOW64\Eojiqb32.exe
                              C:\Windows\system32\Eojiqb32.exe
                              14⤵
                              • Adds autorun key to be loaded by Explorer.exe on startup
                              • Executes dropped EXE
                              • Drops file in System32 directory
                              • Suspicious use of WriteProcessMemory
                              PID:4564
                              • C:\Windows\SysWOW64\Fnbcgn32.exe
                                C:\Windows\system32\Fnbcgn32.exe
                                15⤵
                                • Adds autorun key to be loaded by Explorer.exe on startup
                                • Executes dropped EXE
                                • Drops file in System32 directory
                                • Modifies registry class
                                • Suspicious use of WriteProcessMemory
                                PID:1728
                                • C:\Windows\SysWOW64\Fofilp32.exe
                                  C:\Windows\system32\Fofilp32.exe
                                  16⤵
                                  • Executes dropped EXE
                                  • Drops file in System32 directory
                                  • Suspicious use of WriteProcessMemory
                                  PID:4084
                                  • C:\Windows\SysWOW64\Fohfbpgi.exe
                                    C:\Windows\system32\Fohfbpgi.exe
                                    17⤵
                                    • Adds autorun key to be loaded by Explorer.exe on startup
                                    • Executes dropped EXE
                                    • Drops file in System32 directory
                                    • Modifies registry class
                                    • Suspicious use of WriteProcessMemory
                                    PID:3372
                                    • C:\Windows\SysWOW64\Galoohke.exe
                                      C:\Windows\system32\Galoohke.exe
                                      18⤵
                                      • Executes dropped EXE
                                      • Drops file in System32 directory
                                      • Modifies registry class
                                      • Suspicious use of WriteProcessMemory
                                      PID:64
                                      • C:\Windows\SysWOW64\Gpolbo32.exe
                                        C:\Windows\system32\Gpolbo32.exe
                                        19⤵
                                        • Adds autorun key to be loaded by Explorer.exe on startup
                                        • Executes dropped EXE
                                        • Drops file in System32 directory
                                        • Modifies registry class
                                        • Suspicious use of WriteProcessMemory
                                        PID:3108
                                        • C:\Windows\SysWOW64\Gbpedjnb.exe
                                          C:\Windows\system32\Gbpedjnb.exe
                                          20⤵
                                          • Executes dropped EXE
                                          • Drops file in System32 directory
                                          • Suspicious use of WriteProcessMemory
                                          PID:1496
                                          • C:\Windows\SysWOW64\Geanfelc.exe
                                            C:\Windows\system32\Geanfelc.exe
                                            21⤵
                                            • Adds autorun key to be loaded by Explorer.exe on startup
                                            • Executes dropped EXE
                                            • Drops file in System32 directory
                                            • Modifies registry class
                                            • Suspicious use of WriteProcessMemory
                                            PID:2488
                                            • C:\Windows\SysWOW64\Hpkknmgd.exe
                                              C:\Windows\system32\Hpkknmgd.exe
                                              22⤵
                                              • Adds autorun key to be loaded by Explorer.exe on startup
                                              • Executes dropped EXE
                                              • Drops file in System32 directory
                                              • Modifies registry class
                                              • Suspicious use of WriteProcessMemory
                                              PID:2692
                                              • C:\Windows\SysWOW64\Hbnaeh32.exe
                                                C:\Windows\system32\Hbnaeh32.exe
                                                23⤵
                                                • Adds autorun key to be loaded by Explorer.exe on startup
                                                • Executes dropped EXE
                                                • Drops file in System32 directory
                                                PID:2404
                                                • C:\Windows\SysWOW64\Iehmmb32.exe
                                                  C:\Windows\system32\Iehmmb32.exe
                                                  24⤵
                                                  • Adds autorun key to be loaded by Explorer.exe on startup
                                                  • Executes dropped EXE
                                                  PID:4400
                                                  • C:\Windows\SysWOW64\Jifecp32.exe
                                                    C:\Windows\system32\Jifecp32.exe
                                                    25⤵
                                                    • Adds autorun key to be loaded by Explorer.exe on startup
                                                    • Executes dropped EXE
                                                    • Drops file in System32 directory
                                                    • Modifies registry class
                                                    PID:2576
                                                    • C:\Windows\SysWOW64\Jikoopij.exe
                                                      C:\Windows\system32\Jikoopij.exe
                                                      26⤵
                                                      • Adds autorun key to be loaded by Explorer.exe on startup
                                                      • Executes dropped EXE
                                                      PID:3016
                                                      • C:\Windows\SysWOW64\Kolabf32.exe
                                                        C:\Windows\system32\Kolabf32.exe
                                                        27⤵
                                                        • Executes dropped EXE
                                                        • Drops file in System32 directory
                                                        PID:4388
                                                        • C:\Windows\SysWOW64\Kamjda32.exe
                                                          C:\Windows\system32\Kamjda32.exe
                                                          28⤵
                                                          • Adds autorun key to be loaded by Explorer.exe on startup
                                                          • Executes dropped EXE
                                                          • Modifies registry class
                                                          PID:4668
                                                          • C:\Windows\SysWOW64\Lcclncbh.exe
                                                            C:\Windows\system32\Lcclncbh.exe
                                                            29⤵
                                                            • Executes dropped EXE
                                                            • Drops file in System32 directory
                                                            • Modifies registry class
                                                            PID:2860
                                                            • C:\Windows\SysWOW64\Llnnmhfe.exe
                                                              C:\Windows\system32\Llnnmhfe.exe
                                                              30⤵
                                                              • Adds autorun key to be loaded by Explorer.exe on startup
                                                              • Executes dropped EXE
                                                              PID:1096
                                                              • C:\Windows\SysWOW64\Mfnhfm32.exe
                                                                C:\Windows\system32\Mfnhfm32.exe
                                                                31⤵
                                                                • Adds autorun key to be loaded by Explorer.exe on startup
                                                                • Executes dropped EXE
                                                                • Drops file in System32 directory
                                                                PID:1900
                                                                • C:\Windows\SysWOW64\Noppeaed.exe
                                                                  C:\Windows\system32\Noppeaed.exe
                                                                  32⤵
                                                                  • Adds autorun key to be loaded by Explorer.exe on startup
                                                                  • Executes dropped EXE
                                                                  • Modifies registry class
                                                                  PID:4708
                                                                  • C:\Windows\SysWOW64\Oiccje32.exe
                                                                    C:\Windows\system32\Oiccje32.exe
                                                                    33⤵
                                                                    • Executes dropped EXE
                                                                    • Drops file in System32 directory
                                                                    • Modifies registry class
                                                                    PID:2088
                                                                    • C:\Windows\SysWOW64\Opbean32.exe
                                                                      C:\Windows\system32\Opbean32.exe
                                                                      34⤵
                                                                      • Adds autorun key to be loaded by Explorer.exe on startup
                                                                      • Executes dropped EXE
                                                                      • Drops file in System32 directory
                                                                      • Modifies registry class
                                                                      PID:3584
                                                                      • C:\Windows\SysWOW64\Pcpnhl32.exe
                                                                        C:\Windows\system32\Pcpnhl32.exe
                                                                        35⤵
                                                                        • Adds autorun key to be loaded by Explorer.exe on startup
                                                                        • Executes dropped EXE
                                                                        • Drops file in System32 directory
                                                                        • Modifies registry class
                                                                        PID:628
                                                                        • C:\Windows\SysWOW64\Pfhmjf32.exe
                                                                          C:\Windows\system32\Pfhmjf32.exe
                                                                          36⤵
                                                                          • Executes dropped EXE
                                                                          • Modifies registry class
                                                                          PID:4164
                                                                          • C:\Windows\SysWOW64\Apggckbf.exe
                                                                            C:\Windows\system32\Apggckbf.exe
                                                                            37⤵
                                                                            • Adds autorun key to be loaded by Explorer.exe on startup
                                                                            • Executes dropped EXE
                                                                            • Drops file in System32 directory
                                                                            PID:2244
                                                                            • C:\Windows\SysWOW64\Ajmladbl.exe
                                                                              C:\Windows\system32\Ajmladbl.exe
                                                                              38⤵
                                                                              • Executes dropped EXE
                                                                              • Drops file in System32 directory
                                                                              • Modifies registry class
                                                                              PID:2124
                                                                              • C:\Windows\SysWOW64\Bdlfjh32.exe
                                                                                C:\Windows\system32\Bdlfjh32.exe
                                                                                39⤵
                                                                                • Adds autorun key to be loaded by Explorer.exe on startup
                                                                                • Executes dropped EXE
                                                                                • Drops file in System32 directory
                                                                                PID:3556
                                                                                • C:\Windows\SysWOW64\Cgfbbb32.exe
                                                                                  C:\Windows\system32\Cgfbbb32.exe
                                                                                  40⤵
                                                                                  • Executes dropped EXE
                                                                                  • Modifies registry class
                                                                                  PID:1528
                                                                                  • C:\Windows\SysWOW64\Cdmoafdb.exe
                                                                                    C:\Windows\system32\Cdmoafdb.exe
                                                                                    41⤵
                                                                                    • Adds autorun key to be loaded by Explorer.exe on startup
                                                                                    • Executes dropped EXE
                                                                                    PID:3952
                                                                                    • C:\Windows\SysWOW64\Cildom32.exe
                                                                                      C:\Windows\system32\Cildom32.exe
                                                                                      42⤵
                                                                                      • Executes dropped EXE
                                                                                      • Drops file in System32 directory
                                                                                      • Modifies registry class
                                                                                      PID:1048
                                                                                      • C:\Windows\SysWOW64\Djegekil.exe
                                                                                        C:\Windows\system32\Djegekil.exe
                                                                                        43⤵
                                                                                        • Executes dropped EXE
                                                                                        • Drops file in System32 directory
                                                                                        PID:4456
                                                                                        • C:\Windows\SysWOW64\Edoencdm.exe
                                                                                          C:\Windows\system32\Edoencdm.exe
                                                                                          44⤵
                                                                                          • Adds autorun key to be loaded by Explorer.exe on startup
                                                                                          • Executes dropped EXE
                                                                                          PID:4724
                                                                                          • C:\Windows\SysWOW64\Ephbhd32.exe
                                                                                            C:\Windows\system32\Ephbhd32.exe
                                                                                            45⤵
                                                                                            • Adds autorun key to be loaded by Explorer.exe on startup
                                                                                            • Executes dropped EXE
                                                                                            • Drops file in System32 directory
                                                                                            • Modifies registry class
                                                                                            PID:1716
                                                                                            • C:\Windows\SysWOW64\Enlcahgh.exe
                                                                                              C:\Windows\system32\Enlcahgh.exe
                                                                                              46⤵
                                                                                              • Executes dropped EXE
                                                                                              • Drops file in System32 directory
                                                                                              PID:4420
                                                                                              • C:\Windows\SysWOW64\Fdbkja32.exe
                                                                                                C:\Windows\system32\Fdbkja32.exe
                                                                                                47⤵
                                                                                                • Executes dropped EXE
                                                                                                • Modifies registry class
                                                                                                PID:1832
                                                                                                • C:\Windows\SysWOW64\Fbfkceca.exe
                                                                                                  C:\Windows\system32\Fbfkceca.exe
                                                                                                  48⤵
                                                                                                  • Adds autorun key to be loaded by Explorer.exe on startup
                                                                                                  • Executes dropped EXE
                                                                                                  • Drops file in System32 directory
                                                                                                  PID:3304
                                                                                                  • C:\Windows\SysWOW64\Gqpapacd.exe
                                                                                                    C:\Windows\system32\Gqpapacd.exe
                                                                                                    49⤵
                                                                                                    • Adds autorun key to be loaded by Explorer.exe on startup
                                                                                                    • Executes dropped EXE
                                                                                                    • Drops file in System32 directory
                                                                                                    PID:2444
                                                                                                    • C:\Windows\SysWOW64\Hkjohi32.exe
                                                                                                      C:\Windows\system32\Hkjohi32.exe
                                                                                                      50⤵
                                                                                                      • Executes dropped EXE
                                                                                                      • Drops file in System32 directory
                                                                                                      • Modifies registry class
                                                                                                      PID:2492
                                                                                                      • C:\Windows\SysWOW64\Hcedmkmp.exe
                                                                                                        C:\Windows\system32\Hcedmkmp.exe
                                                                                                        51⤵
                                                                                                        • Executes dropped EXE
                                                                                                        • Drops file in System32 directory
                                                                                                        • Modifies registry class
                                                                                                        PID:2524
                                                                                                        • C:\Windows\SysWOW64\Hjaioe32.exe
                                                                                                          C:\Windows\system32\Hjaioe32.exe
                                                                                                          52⤵
                                                                                                          • Executes dropped EXE
                                                                                                          • Drops file in System32 directory
                                                                                                          • Modifies registry class
                                                                                                          PID:3656
                                                                                                          • C:\Windows\SysWOW64\Hnpaec32.exe
                                                                                                            C:\Windows\system32\Hnpaec32.exe
                                                                                                            53⤵
                                                                                                            • Adds autorun key to be loaded by Explorer.exe on startup
                                                                                                            • Executes dropped EXE
                                                                                                            • Drops file in System32 directory
                                                                                                            PID:2112
                                                                                                            • C:\Windows\SysWOW64\Ijpepcfj.exe
                                                                                                              C:\Windows\system32\Ijpepcfj.exe
                                                                                                              54⤵
                                                                                                              • Executes dropped EXE
                                                                                                              • Modifies registry class
                                                                                                              PID:3632
                                                                                                              • C:\Windows\SysWOW64\Idhiii32.exe
                                                                                                                C:\Windows\system32\Idhiii32.exe
                                                                                                                55⤵
                                                                                                                • Adds autorun key to be loaded by Explorer.exe on startup
                                                                                                                • Executes dropped EXE
                                                                                                                PID:1908
                                                                                                                • C:\Windows\SysWOW64\Jddiegbm.exe
                                                                                                                  C:\Windows\system32\Jddiegbm.exe
                                                                                                                  56⤵
                                                                                                                  • Adds autorun key to be loaded by Explorer.exe on startup
                                                                                                                  • Executes dropped EXE
                                                                                                                  • Drops file in System32 directory
                                                                                                                  • Modifies registry class
                                                                                                                  PID:3572
                                                                                                                  • C:\Windows\SysWOW64\Kkpnga32.exe
                                                                                                                    C:\Windows\system32\Kkpnga32.exe
                                                                                                                    57⤵
                                                                                                                    • Adds autorun key to be loaded by Explorer.exe on startup
                                                                                                                    • Executes dropped EXE
                                                                                                                    • Modifies registry class
                                                                                                                    PID:2876
                                                                                                                    • C:\Windows\SysWOW64\Kongmo32.exe
                                                                                                                      C:\Windows\system32\Kongmo32.exe
                                                                                                                      58⤵
                                                                                                                      • Adds autorun key to be loaded by Explorer.exe on startup
                                                                                                                      • Executes dropped EXE
                                                                                                                      • Drops file in System32 directory
                                                                                                                      • Modifies registry class
                                                                                                                      PID:4960
                                                                                                                      • C:\Windows\SysWOW64\Lbqinm32.exe
                                                                                                                        C:\Windows\system32\Lbqinm32.exe
                                                                                                                        59⤵
                                                                                                                        • Executes dropped EXE
                                                                                                                        • Drops file in System32 directory
                                                                                                                        • Modifies registry class
                                                                                                                        PID:32
                                                                                                                        • C:\Windows\SysWOW64\Laffpi32.exe
                                                                                                                          C:\Windows\system32\Laffpi32.exe
                                                                                                                          60⤵
                                                                                                                          • Adds autorun key to be loaded by Explorer.exe on startup
                                                                                                                          • Executes dropped EXE
                                                                                                                          • Modifies registry class
                                                                                                                          PID:1364
                                                                                                                          • C:\Windows\SysWOW64\Lknjhokg.exe
                                                                                                                            C:\Windows\system32\Lknjhokg.exe
                                                                                                                            61⤵
                                                                                                                            • Adds autorun key to be loaded by Explorer.exe on startup
                                                                                                                            • Executes dropped EXE
                                                                                                                            • Modifies registry class
                                                                                                                            PID:3768
                                                                                                                            • C:\Windows\SysWOW64\Lkcccn32.exe
                                                                                                                              C:\Windows\system32\Lkcccn32.exe
                                                                                                                              62⤵
                                                                                                                              • Adds autorun key to be loaded by Explorer.exe on startup
                                                                                                                              • Executes dropped EXE
                                                                                                                              • Drops file in System32 directory
                                                                                                                              • Modifies registry class
                                                                                                                              PID:3376
                                                                                                                              • C:\Windows\SysWOW64\Mccokj32.exe
                                                                                                                                C:\Windows\system32\Mccokj32.exe
                                                                                                                                63⤵
                                                                                                                                • Adds autorun key to be loaded by Explorer.exe on startup
                                                                                                                                • Executes dropped EXE
                                                                                                                                • Drops file in System32 directory
                                                                                                                                • Modifies registry class
                                                                                                                                PID:1000
                                                                                                                                • C:\Windows\SysWOW64\Ncmaai32.exe
                                                                                                                                  C:\Windows\system32\Ncmaai32.exe
                                                                                                                                  64⤵
                                                                                                                                  • Adds autorun key to be loaded by Explorer.exe on startup
                                                                                                                                  • Executes dropped EXE
                                                                                                                                  PID:1624
                                                                                                                                  • C:\Windows\SysWOW64\Oloipmfd.exe
                                                                                                                                    C:\Windows\system32\Oloipmfd.exe
                                                                                                                                    65⤵
                                                                                                                                    • Executes dropped EXE
                                                                                                                                    • Modifies registry class
                                                                                                                                    PID:3564
                                                                                                                                    • C:\Windows\SysWOW64\Okfbgiij.exe
                                                                                                                                      C:\Windows\system32\Okfbgiij.exe
                                                                                                                                      66⤵
                                                                                                                                      • Modifies registry class
                                                                                                                                      PID:4604
                                                                                                                                      • C:\Windows\SysWOW64\Qifbll32.exe
                                                                                                                                        C:\Windows\system32\Qifbll32.exe
                                                                                                                                        67⤵
                                                                                                                                        • Adds autorun key to be loaded by Explorer.exe on startup
                                                                                                                                        • Drops file in System32 directory
                                                                                                                                        PID:4336
                                                                                                                                        • C:\Windows\SysWOW64\Alpnde32.exe
                                                                                                                                          C:\Windows\system32\Alpnde32.exe
                                                                                                                                          68⤵
                                                                                                                                          • Adds autorun key to be loaded by Explorer.exe on startup
                                                                                                                                          • Drops file in System32 directory
                                                                                                                                          • Modifies registry class
                                                                                                                                          PID:4104
                                                                                                                                          • C:\Windows\SysWOW64\Cbjogmlf.exe
                                                                                                                                            C:\Windows\system32\Cbjogmlf.exe
                                                                                                                                            69⤵
                                                                                                                                            • Adds autorun key to be loaded by Explorer.exe on startup
                                                                                                                                            • Modifies registry class
                                                                                                                                            PID:3196
                                                                                                                                            • C:\Windows\SysWOW64\Cpcila32.exe
                                                                                                                                              C:\Windows\system32\Cpcila32.exe
                                                                                                                                              70⤵
                                                                                                                                              • Drops file in System32 directory
                                                                                                                                              PID:3204
                                                                                                                                              • C:\Windows\SysWOW64\Cepadh32.exe
                                                                                                                                                C:\Windows\system32\Cepadh32.exe
                                                                                                                                                71⤵
                                                                                                                                                • Adds autorun key to be loaded by Explorer.exe on startup
                                                                                                                                                • Modifies registry class
                                                                                                                                                PID:2728
                                                                                                                                                • C:\Windows\SysWOW64\Dgdgijhp.exe
                                                                                                                                                  C:\Windows\system32\Dgdgijhp.exe
                                                                                                                                                  72⤵
                                                                                                                                                  • Adds autorun key to be loaded by Explorer.exe on startup
                                                                                                                                                  • Modifies registry class
                                                                                                                                                  PID:4936
                                                                                                                                                  • C:\Windows\SysWOW64\Dmnpfd32.exe
                                                                                                                                                    C:\Windows\system32\Dmnpfd32.exe
                                                                                                                                                    73⤵
                                                                                                                                                    • Adds autorun key to be loaded by Explorer.exe on startup
                                                                                                                                                    • Drops file in System32 directory
                                                                                                                                                    • Modifies registry class
                                                                                                                                                    PID:388
                                                                                                                                                    • C:\Windows\SysWOW64\Dbkhnk32.exe
                                                                                                                                                      C:\Windows\system32\Dbkhnk32.exe
                                                                                                                                                      74⤵
                                                                                                                                                        PID:2848
                                                                                                                                                        • C:\Windows\SysWOW64\WerFault.exe
                                                                                                                                                          C:\Windows\SysWOW64\WerFault.exe -u -p 2848 -s 400
                                                                                                                                                          75⤵
                                                                                                                                                          • Program crash
                                                                                                                                                          PID:364
                                                                                                                                                        • C:\Windows\SysWOW64\WerFault.exe
                                                                                                                                                          C:\Windows\SysWOW64\WerFault.exe -u -p 2848 -s 400
                                                                                                                                                          75⤵
                                                                                                                                                          • Program crash
                                                                                                                                                          PID:5028
    • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
      "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=asset_store.mojom.AssetStoreService --lang=en-US --service-sandbox-type=asset_store_service --no-appcompat-clear --mojo-platform-channel-handle=3720 --field-trial-handle=2252,i,16504368816373493055,9578615028378602855,262144 --variations-seed-version /prefetch:8
      1⤵
        PID:4036
      • C:\Windows\SysWOW64\WerFault.exe
        C:\Windows\SysWOW64\WerFault.exe -pss -s 432 -p 2848 -ip 2848
        1⤵
          PID:3128

        Network

        MITRE ATT&CK Enterprise v15

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • C:\Windows\SysWOW64\Aagkhd32.exe

          Filesize

          448KB

          MD5

          e9f65ac0c9b124ed7fd3dc9c00819cec

          SHA1

          a38ab6c76d2dea3ef586d24dd5ddc9503a6a09f7

          SHA256

          1d2d52da10a4f6f4fab60a165d92e7c43df7873cf479904b2b1105b35ecc754b

          SHA512

          229e16931c05f79e03251a57bf7946b98813a466b3661e414730bd72272171873aeb1805642f283af104db7058d4972de0b4d3e4bc3c40581dd0d297e173bc97

        • C:\Windows\SysWOW64\Bajqda32.exe

          Filesize

          448KB

          MD5

          2182ad05f4efea30cc1825e7fefec506

          SHA1

          d10c68e69a26026198dc24c1e66fe029133611ad

          SHA256

          87519fe76d0d4dc022a2e159f0c1271e701fe882adb501b1bc8ade051ffb072b

          SHA512

          fc436d189f764190740662deab600b6954f5a0d58c8c3e64cd356d062ef8edb0eab1671b6617599a440215d240dd8a0f619370a55b90ac18ba26674c1c8cd9a1

        • C:\Windows\SysWOW64\Cglbhhga.exe

          Filesize

          448KB

          MD5

          efac5e500e979c0583377c0b79fae000

          SHA1

          4ea2988ce5f2c69bcc05fae6df21e6941b681cc3

          SHA256

          83a6d63a9f5e5a7185513cc435c09b9188d30e515160c3d9d77a678568591c70

          SHA512

          875639884738d29a6b2e059788edd2e3b0bc37ceb620b6506947b5183159a39931ba3605f003ef29bf840712d93690e476b1d51f900064e3cbbed37d208af252

        • C:\Windows\SysWOW64\Chfegk32.exe

          Filesize

          448KB

          MD5

          11893d23f17f4480e12a25a5a43549b7

          SHA1

          25601273882b0f1dd1f73bc50561c8894dac35b5

          SHA256

          ebbee35bafccbafc60c67b6bc878302521a748071ff82dd01fb33f62eda84f4d

          SHA512

          bd5353f0e425fd0bc6febe81dc7c4d24d5b7dae4b2a15833aafe95a38f00f3ade6b21e2f8eae1730bca000ff044e9c83b4f55df71841d118ce9100030333e0fe

        • C:\Windows\SysWOW64\Cogddd32.exe

          Filesize

          448KB

          MD5

          7ebc585ac1d308cb78ef0e1fb46f10a7

          SHA1

          dd5e83e63c44517d57f734bae9416912fc15fda1

          SHA256

          64e073c87f53c4700e3ecda3f172c8aa4b73c20daa151bb2913851bb206b1a73

          SHA512

          1a36a4097ba21f679eae849c3f7a55f98c6ec445b6b024df75aa00d5aa8386d05f92b71909f0b88c67a671b74a4dcb841e0a2df053d642d4cfc35cd140c69486

        • C:\Windows\SysWOW64\Dqnjgl32.exe

          Filesize

          448KB

          MD5

          111fd3c9dff2159e36871d251d4278f6

          SHA1

          40c4337176aadf2debe434c1e0f712247a134a24

          SHA256

          d72ae0903b1fed8aa691b52f7ca008efc66b06a4607b5605bdb469953dee8b3a

          SHA512

          c99d878e88ba9d0b916c105ef7ad3c7ff27d01537954d7b9093760795b0e44ecc4f76bb055c7b546dadcf2dff6e5cb06f58959d472062e4cf599dcf45c45e71b

        • C:\Windows\SysWOW64\Edoencdm.exe

          Filesize

          448KB

          MD5

          ae8a1084fa89257079a2ca1d23ca0ad2

          SHA1

          a446029ba72a8a9c772e60da4ab487516162e791

          SHA256

          cb4a4e20e9d94997cb8902e640751dda31024c717c4d998839fbe30f9504994d

          SHA512

          12a6b8e32985c841018432f36b0f9a613a07b4f35b51d6981c5d20b332335879dfd46ee2f137c2b8ca66b952c556e650e78002927e75f3f1875ba163e8dd8ac8

        • C:\Windows\SysWOW64\Eojiqb32.exe

          Filesize

          448KB

          MD5

          840d9f40078eb546e7064e6efa523a42

          SHA1

          fcb86d40fb089c297df895e98501e78c0e9ae401

          SHA256

          8d524117be053f11466a3e6a25df0c68194aa9a431a4cb504dacfeec3f7846a0

          SHA512

          5b5f495f29e85ae4d2526399dee34a4ee9eacf6be100fdbae3dcd88611af499aea1d2a35af123b08d64e1f54d5fc96bd8876d3eae015e45fb4b1a43ec9cf60ac

        • C:\Windows\SysWOW64\Eqdpgk32.exe

          Filesize

          448KB

          MD5

          3a436a07acf879e3618f7562d96a54c5

          SHA1

          20f5bf85beb6eda2379e8d0c9fc642a9318376b8

          SHA256

          c59c02718712cc217b7f78e4d626d6c8d164923bf20de41f3a2e5ab9832be11b

          SHA512

          90c90cb86e1ad93df36b538dca424b5694075ea4e9c7d74b6ed6bb5c115603bc0b3be69de0f2faf94bc75879a62f2b465aacd422b6fbc3f1aa13f09720f62e51

        • C:\Windows\SysWOW64\Fnbcgn32.exe

          Filesize

          448KB

          MD5

          4eda774249470e1cf3df52b511bafa35

          SHA1

          e343480d1539a0e6073ccf42a2dc25d3c5288afb

          SHA256

          51cbef5803f79a587ebbfad3792eb82644929b842e43961890fecdf44a0f326b

          SHA512

          1517ec40d21949d6d9c0f259fe7d830e9d4d351180122eb40fae839f223db6a957e5b7bbe211754e86f64a58999cadae3e5de993056b9d964722d494088f27a7

        • C:\Windows\SysWOW64\Fofilp32.exe

          Filesize

          448KB

          MD5

          7031b3973a6519fa4866b0d595376281

          SHA1

          2c3716e9850b0119169d0cf099ce5fa6b4ceb721

          SHA256

          754a229d0625cb8b0123da131937319ceb152e08e95880975411a19cb627623e

          SHA512

          921124b02aa8ba49b59e283762212222ae430e236bab942e50c35bc90c4b349076e89d731f799be6ba0d5084bb1d1bea38e3a3968449e28277565ae55d908d40

        • C:\Windows\SysWOW64\Fohfbpgi.exe

          Filesize

          448KB

          MD5

          caae2fc7461e3883cbb67f2af8031e5c

          SHA1

          4e1ed68f38f94219dcfc0bec15b21747fd6e45ac

          SHA256

          6ce2578dbe6760ad942a2df66c2d159caf434e5b95cfe599db7d931650a7e553

          SHA512

          dd56547979d929387bb61aa082453ff2d93f108194c7ce8eb8a25736e13d9d14f34fdd3c8a83301edec7398209a1dcb713c3ed7210fbd078b512cd2c0f005428

        • C:\Windows\SysWOW64\Galoohke.exe

          Filesize

          448KB

          MD5

          2c36822be2bf5d55fc9088ea86225348

          SHA1

          518e32ed27d72ce13851c5b4eb568115389e3b98

          SHA256

          b4cfc85776131992337293389a122f3dc0c5c729e382ba45aa4b39ce9ff1b19b

          SHA512

          ce064389f7a9c8bfafae0f646cf028b51836fa20cfc92b3d8a6b3727da68b826e61f8ec44a054642c51fc5a9489ca8836722f7cea301b7a4f633dc2ed44ac644

        • C:\Windows\SysWOW64\Gbpedjnb.exe

          Filesize

          448KB

          MD5

          4f4a9873f46c7ab25cf167fc2e1c1d20

          SHA1

          18ed7dfe53cf9862e447b7a48073509d2da3c863

          SHA256

          3036cc91239fe440ce549a30df793321ed37623015d5af922c90ffdca6019984

          SHA512

          7bed59f2c8494b3c9fd049673f9d2200ceaa9df5bd69943084dcbecdb4795aff351a4be2d29c04b56b1b6435a5f4b191b85167882fd51bbf0f7e2bedc7c0b876

        • C:\Windows\SysWOW64\Geanfelc.exe

          Filesize

          448KB

          MD5

          2656a78fed867c6ba7c6578ddd3c8e6c

          SHA1

          12a2b3a787efd9a0e4e391cb08ae15f9d6347c84

          SHA256

          f19518fc88b8b68d039f5f7b419f28c27999bfd5cb1b23290e353166cea5c6d4

          SHA512

          85279b1218a5170ddc86b378bed354f14595c0dbfc127b0ee0676dc463cb3af722270e799b143081e3731a22831a7212649e50f302f65c5d077fa551a4632407

        • C:\Windows\SysWOW64\Gpolbo32.exe

          Filesize

          448KB

          MD5

          c2927d09870fc138073e23db0a4bb54d

          SHA1

          4291fb5666d31eef52ac430abf4d26b899878b22

          SHA256

          d7b50cf54bcd361f4e57aab81005347a4515f659d37f19f721385bd428416968

          SHA512

          e58fd425f948a473f07279a61b2936a41057b9827ed39d6d3a4615a47f8c01e3a41e7f0039fa0149c3811d5feb1844cd088b6e3fa1399b55f81fcea3e64ac15e

        • C:\Windows\SysWOW64\Hbnaeh32.exe

          Filesize

          448KB

          MD5

          fb7aab86832d5de21260d36687dbe714

          SHA1

          89f62229f2fa198b2097ce085c5399612c230459

          SHA256

          d9e5ece91e8b09f3065c1d50fc1673aad8f073953dd853c147fd85cfb5940f5f

          SHA512

          c046a5f5295998ac005eff40589ddceafd0657d8bd225ecc599bc1d14243b386219e9a448fcf67e38beabdd455dc28999769ed622637e117dc850a834f92c32f

        • C:\Windows\SysWOW64\Hjaioe32.exe

          Filesize

          448KB

          MD5

          f31eb0e6e5da020ba8f11f7d93385f0a

          SHA1

          33c32802c08aa0c49b28cf2c433570637fb058c4

          SHA256

          8ec0884bce54481a5623f141c037f105741f557aa0c6ad7e84c5049ca3d98195

          SHA512

          de36383ddedbe58d097db36d222568643e8423039fad70342f818b2b05a0ef88e7de32f990dfae950d9343f96ac6187e3c1cf44e35a160c044347e396edd39ff

        • C:\Windows\SysWOW64\Hpkknmgd.exe

          Filesize

          448KB

          MD5

          09775313781af54b6f9cadd1d56f40f9

          SHA1

          fd06f562a5be57fca1d75ae6bd811a27792846c6

          SHA256

          d2fa908f2360b1bd4c3ef19fbbf26e04a6561bd406249de2562c490e411ceca0

          SHA512

          b615a60a9ad4249106c3b3aa66fb0178618286fda7a9b26e936aedc89f626e42af983666f8a092849bb2445bfb4d80fa3ba675cb1617e3efb835d0511f074fde

        • C:\Windows\SysWOW64\Iehmmb32.exe

          Filesize

          448KB

          MD5

          b2ede6a47c0d18c6d53f842f6c652e5d

          SHA1

          4e1ea37254a2cb243dc468cc60db8838b6f7a073

          SHA256

          6b33e5fbe0bf72d9a71864446900793be1b409ddd2899d0fae0d9a2950614729

          SHA512

          06cd10d5c4921e6c92508c3b71ee0c5d8f35dd324016dc21310dcabdebc31a60d1b8ffc39600355913ad70cdbd2c1b2afb70786851d81091ab7be220a9f07ed4

        • C:\Windows\SysWOW64\Ijpepcfj.exe

          Filesize

          448KB

          MD5

          e826343fcf2476b1dfe7e323db22b507

          SHA1

          f36d2db6621f22f91efee9222e837b8ba66e7a4a

          SHA256

          b1aa697530ee48cc5f6b31d5c94c397c5fd7c77546d76f9ac19f0301246499ec

          SHA512

          1921dee62014be4dedef2f53f4eaa40f9c73253ba6fe2c125eb4b124d7cdce5d8f9bbc9281fbcaae87f10ea7979cb6411fdf757ae766396d9c4dcec022a95026

        • C:\Windows\SysWOW64\Jifecp32.exe

          Filesize

          448KB

          MD5

          ea3cb3c92a1020950a44d8514e2e787c

          SHA1

          b8b5a3b058cde07f0aa24bd9bbc39c981b1d6375

          SHA256

          aaa2f2cf89642dace4550ed737f57bed79416e4945a03a1330c840667a24f6cd

          SHA512

          90a1c1ce5a9eed918d8e081c287b11980faf00908ca552ccf0b495e3a291efad6110d702a44f7494691d780fd8ae8496819043a4ccae2a5b7ef72842bf29f6b7

        • C:\Windows\SysWOW64\Jikoopij.exe

          Filesize

          448KB

          MD5

          83d55f13f942b08eb908c4a9ef9eab2b

          SHA1

          7ca57a175146cab786c71c4e888c825025b56e9b

          SHA256

          e22a23de2e68b92f943611962c49c1258e0e1a6f515a8f40c371ddd2d70f05c9

          SHA512

          2ab630a04c3a0fd68ad7bb7f30fd2e47c9a3fdbb07d53247cb00ff34f90a5e83664bd48812615ff153af3607a3d33098e6f985b3f25db9469773aef84bd5e9a8

        • C:\Windows\SysWOW64\Kamjda32.exe

          Filesize

          448KB

          MD5

          e12070bbbb9bd786b30fc1abedf406e9

          SHA1

          ba4f637f36cd9f49648e47d47c5faee39557ddb4

          SHA256

          ab6478f134bf6c47ad9cf9acb927a7565643fb1d8a5d8084c2ab8ff3392b3c48

          SHA512

          63302c3dbd5682e514d2a2a7be10f5084ff9df3f7540b62294b7459b48764e8633e518508e15844f529e7ba53e7ae1cdad277933180afba845d6368aeccfbd03

        • C:\Windows\SysWOW64\Kolabf32.exe

          Filesize

          448KB

          MD5

          678446fc04d44364751a431979f9ace0

          SHA1

          e9186bfe1c7cf9cad705eca3d41c98997a85564c

          SHA256

          fbdce78d1385f02f390ed7448977cd105650eec48820a6556e4ec548a5baef24

          SHA512

          dfbbd60f08ca3162e19e6119074a3c5d79bc2e86919eb58a4029e679a333d8346581fcda268b8cd04134a68b3db5d4b84c679d341a061e698cd4ec8734185061

        • C:\Windows\SysWOW64\Lcclncbh.exe

          Filesize

          448KB

          MD5

          a42ccf28cfec6e7b722c34ad429351b8

          SHA1

          313c75e31dc88a0d510ee5b564c4db9debf0f501

          SHA256

          3e14f100339c376a9c49a5fac6a9f7c91feba6640c77264c7768ad448f7addbd

          SHA512

          e41e91233461f195ebf82bdf42b4ce049cef08161cc5aee0b8fa1abf9c664158b6a2869f7da4f9f529b2debf6780b83fa794c0e4621be18d87226ef9a7a5708d

        • C:\Windows\SysWOW64\Lknjhokg.exe

          Filesize

          448KB

          MD5

          8c91d39832cdfaec3de111b378dfad4a

          SHA1

          45424fbffe088272525ed609b7510414ad0db43d

          SHA256

          9468bb47a2c9055e076d210a9e905cd67d5726dd0d69c52f80da5ee098b11780

          SHA512

          d3764623ddeec9348839e9bca0260ee7d2ce17ad0f29d3b2cc988edb0d5cac50bc20dd99376b74076bd0515f1e0e27641246a007d167132cfa1c1d4cc9547694

        • C:\Windows\SysWOW64\Llnnmhfe.exe

          Filesize

          448KB

          MD5

          cec8ddfc47b5be389f527405d3602b34

          SHA1

          9afd4632272857a927561ca4b9a9c78a7a3c4104

          SHA256

          ba41d15cc49e0ab3130b5fb01277fa81ea950955eb8bc263f26d11ba1b3bbbae

          SHA512

          0db723ef75b44ead294778945b810e49b56f7ec24198a79b836d28d635a9f18dfc7cbfc5f853ac9977e40678bd67617b35a399dcd5323991b1f15e80d51194fc

        • C:\Windows\SysWOW64\Mfnhfm32.exe

          Filesize

          448KB

          MD5

          1153c63d44fb917a242a7f69c595fefa

          SHA1

          6736eb8419256c953d473fc1e78c4bc0de8810f3

          SHA256

          c8bb771d30ec69abd2e26961f4378bee2db3a076f3787af33ee4868af25c3670

          SHA512

          e2f5d452900229562c7fa400fc7401849477db2a3cb6d303528143069ad171fe1b13e96dcb76adee7b61708e9192533602552ef7e14b281e0a354b19467ccfa7

        • C:\Windows\SysWOW64\Nnhmnn32.exe

          Filesize

          448KB

          MD5

          c43c5dbe491a96816c0305b9d4d98886

          SHA1

          6138d967324873af143dc7a7482b104d144479c3

          SHA256

          f51fdc493e84f07f9d5bc153226d81c2380641e82c24872326a171f6b87dd206

          SHA512

          cc64afe4eaf8630c958a2ae7dea400682e878529acd64ab869501c221a4d4853b388bd84810a091fceb83bd5781406da5989b44ed863f3c07480307cca174adc

        • C:\Windows\SysWOW64\Noppeaed.exe

          Filesize

          448KB

          MD5

          504eefcb6f61c28fbd4fdd9c3ff00c0a

          SHA1

          e61aee71626f8e1258925fe9f82ee4e5e93f4359

          SHA256

          4a3bd7016d86cc00e4855336a33001887ccab40015d0827462084dd47626718c

          SHA512

          7b69ce1f132b8cbe67ed4bb0a6889f63b80f710630db63e268a86fd6be403d25cd8a920f620751acfa79c22e1939309a2e76c4a064153a2bf851cfc04ae187cb

        • C:\Windows\SysWOW64\Oiccje32.exe

          Filesize

          448KB

          MD5

          8c0bde4759459bccfcb34900505c2eff

          SHA1

          290531d02217f0bcb955098f36ffd72ad4f3c906

          SHA256

          879500070b80662b29e3cfb26b835807952151d93965a32a08ea3f032c2dc30a

          SHA512

          7442b02c633a732de59e4fe73057899abaca8a14ee120dfb00b598b3595134d9bb49f9ed3bcfb5b7831a4c1683b5399de5885061e9216899cfc13dfd5a4a6c0d

        • C:\Windows\SysWOW64\Opqofe32.exe

          Filesize

          448KB

          MD5

          0ff87bde195cb92dc2f08b57497ba43f

          SHA1

          ceaeea0e3c62a2576256c7a3b37d02baccaea660

          SHA256

          2288bf3b31592257779f5ab1de11f43b72a7eb9bf69c3bdabdef90ee4151adff

          SHA512

          3ea109a189ca67de25311e06d624823f7906267c548a299993fe172c1cb03ec62e91a57d3a0085ddc29e34ede6e978525738cbf6994f2ecc4bcfb804cfaa3d22

        • C:\Windows\SysWOW64\Paeelgnj.exe

          Filesize

          448KB

          MD5

          24972ba80c6dccb0dba50739fd566f7c

          SHA1

          fc6b64ecb03e4e7673acd86043c9bfdfe7d17ea6

          SHA256

          2defa2ebcfd047c57e7e8d9ec623647a5b192bcd7f58a08b122f4e3720b93dde

          SHA512

          1fd0dc4e059ea5a224178928b9f0d34c44337cc9de6df0f9dfa590670027dae199c3acc756d1511f86f974e60654ec69d470e0a473c9f70f66795f79500667da

        • C:\Windows\SysWOW64\Panhbfep.exe

          Filesize

          448KB

          MD5

          b6e30c5eca18a9e623d13a8c7cef6a2c

          SHA1

          7cd9f20745c4796ac638d24b6ab02f5a01c2b60d

          SHA256

          0cfa8415c478e15d59c9c080ae16b330968015b8a94c330f2361c36bf6546272

          SHA512

          143ad9a3bda3956f27a5ba982ab73448c13d95cc157217c5bb11ef11324a5f0a420e5db46254b4f93ee22975bd8e08220663e1a02477482efb7666294edd46ed

        • C:\Windows\SysWOW64\Ppjbmc32.exe

          Filesize

          448KB

          MD5

          371c6a34c0da9431b216f2c823bdacb5

          SHA1

          4d12aba1213c95e079b56c7454d2be681ef05213

          SHA256

          4cc03c5465f2cc4bc431cbde43add3d8b28af124535dacc0d556271c31ed2f32

          SHA512

          9652f15b62b18efa7a8d9f134b30d207f091a35b9b6cbd8b248d5e6f91fca8db0c7906e8859b488a1545687ca2203c9bfa137a229cc1251b80dff45963e56ece

        • memory/32-441-0x0000000000400000-0x000000000042F000-memory.dmp

          Filesize

          188KB

        • memory/64-136-0x0000000000400000-0x000000000042F000-memory.dmp

          Filesize

          188KB

        • memory/64-364-0x0000000000400000-0x000000000042F000-memory.dmp

          Filesize

          188KB

        • memory/628-278-0x0000000000400000-0x000000000042F000-memory.dmp

          Filesize

          188KB

        • memory/744-321-0x0000000000400000-0x000000000042F000-memory.dmp

          Filesize

          188KB

        • memory/744-81-0x0000000000400000-0x000000000042F000-memory.dmp

          Filesize

          188KB

        • memory/940-72-0x0000000000400000-0x000000000042F000-memory.dmp

          Filesize

          188KB

        • memory/940-314-0x0000000000400000-0x000000000042F000-memory.dmp

          Filesize

          188KB

        • memory/1000-473-0x0000000000400000-0x000000000042F000-memory.dmp

          Filesize

          188KB

        • memory/1048-326-0x0000000000400000-0x000000000042F000-memory.dmp

          Filesize

          188KB

        • memory/1096-460-0x0000000000400000-0x000000000042F000-memory.dmp

          Filesize

          188KB

        • memory/1096-232-0x0000000000400000-0x000000000042F000-memory.dmp

          Filesize

          188KB

        • memory/1364-448-0x0000000000400000-0x000000000042F000-memory.dmp

          Filesize

          188KB

        • memory/1444-327-0x0000000000400000-0x000000000042F000-memory.dmp

          Filesize

          188KB

        • memory/1444-88-0x0000000000400000-0x000000000042F000-memory.dmp

          Filesize

          188KB

        • memory/1496-372-0x0000000000400000-0x000000000042F000-memory.dmp

          Filesize

          188KB

        • memory/1496-153-0x0000000000400000-0x000000000042F000-memory.dmp

          Filesize

          188KB

        • memory/1528-312-0x0000000000400000-0x000000000042F000-memory.dmp

          Filesize

          188KB

        • memory/1624-481-0x0000000000400000-0x000000000042F000-memory.dmp

          Filesize

          188KB

        • memory/1716-342-0x0000000000400000-0x000000000042F000-memory.dmp

          Filesize

          188KB

        • memory/1728-349-0x0000000000400000-0x000000000042F000-memory.dmp

          Filesize

          188KB

        • memory/1728-112-0x0000000000400000-0x000000000042F000-memory.dmp

          Filesize

          188KB

        • memory/1832-362-0x0000000000400000-0x000000000042F000-memory.dmp

          Filesize

          188KB

        • memory/1900-472-0x0000000000400000-0x000000000042F000-memory.dmp

          Filesize

          188KB

        • memory/1900-241-0x0000000000400000-0x000000000042F000-memory.dmp

          Filesize

          188KB

        • memory/1908-420-0x0000000000400000-0x000000000042F000-memory.dmp

          Filesize

          188KB

        • memory/2040-257-0x0000000000400000-0x000000000042F000-memory.dmp

          Filesize

          188KB

        • memory/2040-9-0x0000000000400000-0x000000000042F000-memory.dmp

          Filesize

          188KB

        • memory/2088-258-0x0000000000400000-0x000000000042F000-memory.dmp

          Filesize

          188KB

        • memory/2112-400-0x0000000000400000-0x000000000042F000-memory.dmp

          Filesize

          188KB

        • memory/2124-293-0x0000000000400000-0x000000000042F000-memory.dmp

          Filesize

          188KB

        • memory/2188-32-0x0000000000400000-0x000000000042F000-memory.dmp

          Filesize

          188KB

        • memory/2188-277-0x0000000000400000-0x000000000042F000-memory.dmp

          Filesize

          188KB

        • memory/2244-287-0x0000000000400000-0x000000000042F000-memory.dmp

          Filesize

          188KB

        • memory/2404-176-0x0000000000400000-0x000000000042F000-memory.dmp

          Filesize

          188KB

        • memory/2404-399-0x0000000000400000-0x000000000042F000-memory.dmp

          Filesize

          188KB

        • memory/2444-378-0x0000000000400000-0x000000000042F000-memory.dmp

          Filesize

          188KB

        • memory/2488-379-0x0000000000400000-0x000000000042F000-memory.dmp

          Filesize

          188KB

        • memory/2488-160-0x0000000000400000-0x000000000042F000-memory.dmp

          Filesize

          188KB

        • memory/2492-384-0x0000000000400000-0x000000000042F000-memory.dmp

          Filesize

          188KB

        • memory/2524-386-0x0000000000400000-0x000000000042F000-memory.dmp

          Filesize

          188KB

        • memory/2576-417-0x0000000000400000-0x000000000042F000-memory.dmp

          Filesize

          188KB

        • memory/2576-192-0x0000000000400000-0x000000000042F000-memory.dmp

          Filesize

          188KB

        • memory/2656-24-0x0000000000400000-0x000000000042F000-memory.dmp

          Filesize

          188KB

        • memory/2656-272-0x0000000000400000-0x000000000042F000-memory.dmp

          Filesize

          188KB

        • memory/2692-168-0x0000000000400000-0x000000000042F000-memory.dmp

          Filesize

          188KB

        • memory/2692-392-0x0000000000400000-0x000000000042F000-memory.dmp

          Filesize

          188KB

        • memory/2860-447-0x0000000000400000-0x000000000042F000-memory.dmp

          Filesize

          188KB

        • memory/2860-224-0x0000000000400000-0x000000000042F000-memory.dmp

          Filesize

          188KB

        • memory/2876-428-0x0000000000400000-0x000000000042F000-memory.dmp

          Filesize

          188KB

        • memory/3016-201-0x0000000000400000-0x000000000042F000-memory.dmp

          Filesize

          188KB

        • memory/3016-419-0x0000000000400000-0x000000000042F000-memory.dmp

          Filesize

          188KB

        • memory/3108-369-0x0000000000400000-0x000000000042F000-memory.dmp

          Filesize

          188KB

        • memory/3108-145-0x0000000000400000-0x000000000042F000-memory.dmp

          Filesize

          188KB

        • memory/3160-40-0x0000000000400000-0x000000000042F000-memory.dmp

          Filesize

          188KB

        • memory/3160-280-0x0000000000400000-0x000000000042F000-memory.dmp

          Filesize

          188KB

        • memory/3304-370-0x0000000000400000-0x000000000042F000-memory.dmp

          Filesize

          188KB

        • memory/3372-128-0x0000000000400000-0x000000000042F000-memory.dmp

          Filesize

          188KB

        • memory/3372-355-0x0000000000400000-0x000000000042F000-memory.dmp

          Filesize

          188KB

        • memory/3376-465-0x0000000000400000-0x000000000042F000-memory.dmp

          Filesize

          188KB

        • memory/3556-305-0x0000000000400000-0x000000000042F000-memory.dmp

          Filesize

          188KB

        • memory/3572-421-0x0000000000400000-0x000000000042F000-memory.dmp

          Filesize

          188KB

        • memory/3584-266-0x0000000000400000-0x000000000042F000-memory.dmp

          Filesize

          188KB

        • memory/3632-406-0x0000000000400000-0x000000000042F000-memory.dmp

          Filesize

          188KB

        • memory/3656-397-0x0000000000400000-0x000000000042F000-memory.dmp

          Filesize

          188KB

        • memory/3768-454-0x0000000000400000-0x000000000042F000-memory.dmp

          Filesize

          188KB

        • memory/3916-56-0x0000000000400000-0x000000000042F000-memory.dmp

          Filesize

          188KB

        • memory/3916-304-0x0000000000400000-0x000000000042F000-memory.dmp

          Filesize

          188KB

        • memory/3952-319-0x0000000000400000-0x000000000042F000-memory.dmp

          Filesize

          188KB

        • memory/4064-307-0x0000000000400000-0x000000000042F000-memory.dmp

          Filesize

          188KB

        • memory/4064-64-0x0000000000400000-0x000000000042F000-memory.dmp

          Filesize

          188KB

        • memory/4084-350-0x0000000000400000-0x000000000042F000-memory.dmp

          Filesize

          188KB

        • memory/4084-120-0x0000000000400000-0x000000000042F000-memory.dmp

          Filesize

          188KB

        • memory/4164-285-0x0000000000400000-0x000000000042F000-memory.dmp

          Filesize

          188KB

        • memory/4300-21-0x0000000000400000-0x000000000042F000-memory.dmp

          Filesize

          188KB

        • memory/4388-422-0x0000000000400000-0x000000000042F000-memory.dmp

          Filesize

          188KB

        • memory/4388-208-0x0000000000400000-0x000000000042F000-memory.dmp

          Filesize

          188KB

        • memory/4400-185-0x0000000000400000-0x000000000042F000-memory.dmp

          Filesize

          188KB

        • memory/4400-412-0x0000000000400000-0x000000000042F000-memory.dmp

          Filesize

          188KB

        • memory/4420-357-0x0000000000400000-0x000000000042F000-memory.dmp

          Filesize

          188KB

        • memory/4456-329-0x0000000000400000-0x000000000042F000-memory.dmp

          Filesize

          188KB

        • memory/4564-104-0x0000000000400000-0x000000000042F000-memory.dmp

          Filesize

          188KB

        • memory/4564-347-0x0000000000400000-0x000000000042F000-memory.dmp

          Filesize

          188KB

        • memory/4656-1-0x0000000000400000-0x000000000042F000-memory.dmp

          Filesize

          188KB

        • memory/4656-240-0x0000000000400000-0x000000000042F000-memory.dmp

          Filesize

          188KB

        • memory/4656-0-0x0000000000400000-0x000000000042F000-memory.dmp

          Filesize

          188KB

        • memory/4668-434-0x0000000000400000-0x000000000042F000-memory.dmp

          Filesize

          188KB

        • memory/4668-216-0x0000000000400000-0x000000000042F000-memory.dmp

          Filesize

          188KB

        • memory/4672-48-0x0000000000400000-0x000000000042F000-memory.dmp

          Filesize

          188KB

        • memory/4672-299-0x0000000000400000-0x000000000042F000-memory.dmp

          Filesize

          188KB

        • memory/4708-250-0x0000000000400000-0x000000000042F000-memory.dmp

          Filesize

          188KB

        • memory/4708-480-0x0000000000400000-0x000000000042F000-memory.dmp

          Filesize

          188KB

        • memory/4724-336-0x0000000000400000-0x000000000042F000-memory.dmp

          Filesize

          188KB

        • memory/4904-335-0x0000000000400000-0x000000000042F000-memory.dmp

          Filesize

          188KB

        • memory/4904-96-0x0000000000400000-0x000000000042F000-memory.dmp

          Filesize

          188KB

        • memory/4960-435-0x0000000000400000-0x000000000042F000-memory.dmp

          Filesize

          188KB