Analysis

  • max time kernel
    144s
  • max time network
    158s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240226-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system
  • submitted
    02/06/2024, 00:22

General

  • Target

    968e3b5eab5b701a6e87d3b6cad2da88bf7681b63e7effbb55c3d610a1e8d35c.exe

  • Size

    346KB

  • MD5

    08a96773c09618bbde88582a569dfaaa

  • SHA1

    70745269459a1e35f05a31811ff2c627be8d0257

  • SHA256

    968e3b5eab5b701a6e87d3b6cad2da88bf7681b63e7effbb55c3d610a1e8d35c

  • SHA512

    521b2561488078d8692ca5735bb6449a4e83a20d79bf09a6a0e550b64e30ef0faa46298b956de3aff0cecf39c896be5c8eb30e3e447892e9acf3ab1a9a8dd66d

  • SSDEEP

    6144:TL+o7O6Tho5t13LJhrmMsFj5tzOvfFOM6:3+oqiho5tFrls15tz4FT6

Score
10/10

Malware Config

Signatures

  • Adds autorun key to be loaded by Explorer.exe on startup 2 TTPs 64 IoCs
  • Executes dropped EXE 64 IoCs
  • Drops file in System32 directory 64 IoCs
  • Program crash 1 IoCs
  • Modifies registry class 64 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\968e3b5eab5b701a6e87d3b6cad2da88bf7681b63e7effbb55c3d610a1e8d35c.exe
    "C:\Users\Admin\AppData\Local\Temp\968e3b5eab5b701a6e87d3b6cad2da88bf7681b63e7effbb55c3d610a1e8d35c.exe"
    1⤵
    • Modifies registry class
    • Suspicious use of WriteProcessMemory
    PID:2428
    • C:\Windows\SysWOW64\Ahdpjn32.exe
      C:\Windows\system32\Ahdpjn32.exe
      2⤵
      • Executes dropped EXE
      • Modifies registry class
      • Suspicious use of WriteProcessMemory
      PID:3620
      • C:\Windows\SysWOW64\Aaoaic32.exe
        C:\Windows\system32\Aaoaic32.exe
        3⤵
        • Adds autorun key to be loaded by Explorer.exe on startup
        • Executes dropped EXE
        • Suspicious use of WriteProcessMemory
        PID:1924
        • C:\Windows\SysWOW64\Bobabg32.exe
          C:\Windows\system32\Bobabg32.exe
          4⤵
          • Adds autorun key to be loaded by Explorer.exe on startup
          • Executes dropped EXE
          • Drops file in System32 directory
          • Modifies registry class
          • Suspicious use of WriteProcessMemory
          PID:5552
          • C:\Windows\SysWOW64\Boenhgdd.exe
            C:\Windows\system32\Boenhgdd.exe
            5⤵
            • Executes dropped EXE
            • Drops file in System32 directory
            • Modifies registry class
            • Suspicious use of WriteProcessMemory
            PID:4696
            • C:\Windows\SysWOW64\Bklomh32.exe
              C:\Windows\system32\Bklomh32.exe
              6⤵
              • Executes dropped EXE
              • Modifies registry class
              • Suspicious use of WriteProcessMemory
              PID:3504
              • C:\Windows\SysWOW64\Bddcenpi.exe
                C:\Windows\system32\Bddcenpi.exe
                7⤵
                • Adds autorun key to be loaded by Explorer.exe on startup
                • Executes dropped EXE
                • Drops file in System32 directory
                • Modifies registry class
                • Suspicious use of WriteProcessMemory
                PID:5136
                • C:\Windows\SysWOW64\Bpkdjofm.exe
                  C:\Windows\system32\Bpkdjofm.exe
                  8⤵
                  • Executes dropped EXE
                  • Modifies registry class
                  • Suspicious use of WriteProcessMemory
                  PID:5444
                  • C:\Windows\SysWOW64\Bkphhgfc.exe
                    C:\Windows\system32\Bkphhgfc.exe
                    9⤵
                    • Executes dropped EXE
                    • Drops file in System32 directory
                    • Suspicious use of WriteProcessMemory
                    PID:2224
                    • C:\Windows\SysWOW64\Cdkifmjq.exe
                      C:\Windows\system32\Cdkifmjq.exe
                      10⤵
                      • Executes dropped EXE
                      • Suspicious use of WriteProcessMemory
                      PID:5332
                      • C:\Windows\SysWOW64\Cdmfllhn.exe
                        C:\Windows\system32\Cdmfllhn.exe
                        11⤵
                        • Adds autorun key to be loaded by Explorer.exe on startup
                        • Executes dropped EXE
                        • Modifies registry class
                        • Suspicious use of WriteProcessMemory
                        PID:5516
                        • C:\Windows\SysWOW64\Cpdgqmnb.exe
                          C:\Windows\system32\Cpdgqmnb.exe
                          12⤵
                          • Adds autorun key to be loaded by Explorer.exe on startup
                          • Executes dropped EXE
                          • Drops file in System32 directory
                          • Suspicious use of WriteProcessMemory
                          PID:3272
                          • C:\Windows\SysWOW64\Cpfcfmlp.exe
                            C:\Windows\system32\Cpfcfmlp.exe
                            13⤵
                            • Adds autorun key to be loaded by Explorer.exe on startup
                            • Executes dropped EXE
                            • Drops file in System32 directory
                            • Modifies registry class
                            • Suspicious use of WriteProcessMemory
                            PID:1796
                            • C:\Windows\SysWOW64\Dafppp32.exe
                              C:\Windows\system32\Dafppp32.exe
                              14⤵
                              • Executes dropped EXE
                              • Drops file in System32 directory
                              • Modifies registry class
                              • Suspicious use of WriteProcessMemory
                              PID:5920
                              • C:\Windows\SysWOW64\Ddgibkpc.exe
                                C:\Windows\system32\Ddgibkpc.exe
                                15⤵
                                • Executes dropped EXE
                                • Drops file in System32 directory
                                • Suspicious use of WriteProcessMemory
                                PID:5940
                                • C:\Windows\SysWOW64\Doagjc32.exe
                                  C:\Windows\system32\Doagjc32.exe
                                  16⤵
                                  • Executes dropped EXE
                                  • Drops file in System32 directory
                                  • Modifies registry class
                                  • Suspicious use of WriteProcessMemory
                                  PID:5992
                                  • C:\Windows\SysWOW64\Doccpcja.exe
                                    C:\Windows\system32\Doccpcja.exe
                                    17⤵
                                    • Adds autorun key to be loaded by Explorer.exe on startup
                                    • Executes dropped EXE
                                    • Drops file in System32 directory
                                    • Modifies registry class
                                    • Suspicious use of WriteProcessMemory
                                    PID:5484
                                    • C:\Windows\SysWOW64\Eqgmmk32.exe
                                      C:\Windows\system32\Eqgmmk32.exe
                                      18⤵
                                      • Executes dropped EXE
                                      • Drops file in System32 directory
                                      • Suspicious use of WriteProcessMemory
                                      PID:1408
                                      • C:\Windows\SysWOW64\Eqiibjlj.exe
                                        C:\Windows\system32\Eqiibjlj.exe
                                        19⤵
                                        • Executes dropped EXE
                                        • Drops file in System32 directory
                                        • Suspicious use of WriteProcessMemory
                                        PID:5492
                                        • C:\Windows\SysWOW64\Eqlfhjig.exe
                                          C:\Windows\system32\Eqlfhjig.exe
                                          20⤵
                                          • Adds autorun key to be loaded by Explorer.exe on startup
                                          • Executes dropped EXE
                                          • Drops file in System32 directory
                                          • Suspicious use of WriteProcessMemory
                                          PID:1320
                                          • C:\Windows\SysWOW64\Eomffaag.exe
                                            C:\Windows\system32\Eomffaag.exe
                                            21⤵
                                            • Adds autorun key to be loaded by Explorer.exe on startup
                                            • Executes dropped EXE
                                            • Drops file in System32 directory
                                            • Suspicious use of WriteProcessMemory
                                            PID:4508
                                            • C:\Windows\SysWOW64\Fkhpfbce.exe
                                              C:\Windows\system32\Fkhpfbce.exe
                                              22⤵
                                              • Executes dropped EXE
                                              • Suspicious use of WriteProcessMemory
                                              PID:5116
                                              • C:\Windows\SysWOW64\Filapfbo.exe
                                                C:\Windows\system32\Filapfbo.exe
                                                23⤵
                                                • Adds autorun key to be loaded by Explorer.exe on startup
                                                • Executes dropped EXE
                                                • Modifies registry class
                                                PID:1056
                                                • C:\Windows\SysWOW64\Fnkfmm32.exe
                                                  C:\Windows\system32\Fnkfmm32.exe
                                                  24⤵
                                                  • Adds autorun key to be loaded by Explorer.exe on startup
                                                  • Executes dropped EXE
                                                  • Drops file in System32 directory
                                                  PID:6064
                                                  • C:\Windows\SysWOW64\Fgcjfbed.exe
                                                    C:\Windows\system32\Fgcjfbed.exe
                                                    25⤵
                                                    • Adds autorun key to be loaded by Explorer.exe on startup
                                                    • Executes dropped EXE
                                                    PID:2160
                                                    • C:\Windows\SysWOW64\Galoohke.exe
                                                      C:\Windows\system32\Galoohke.exe
                                                      26⤵
                                                      • Executes dropped EXE
                                                      • Drops file in System32 directory
                                                      • Modifies registry class
                                                      PID:116
                                                      • C:\Windows\SysWOW64\Gihpkd32.exe
                                                        C:\Windows\system32\Gihpkd32.exe
                                                        27⤵
                                                        • Adds autorun key to be loaded by Explorer.exe on startup
                                                        • Executes dropped EXE
                                                        PID:3084
                                                        • C:\Windows\SysWOW64\Hnibokbd.exe
                                                          C:\Windows\system32\Hnibokbd.exe
                                                          28⤵
                                                          • Adds autorun key to be loaded by Explorer.exe on startup
                                                          • Executes dropped EXE
                                                          • Modifies registry class
                                                          PID:4160
                                                          • C:\Windows\SysWOW64\Hnnljj32.exe
                                                            C:\Windows\system32\Hnnljj32.exe
                                                            29⤵
                                                            • Executes dropped EXE
                                                            • Drops file in System32 directory
                                                            PID:2052
                                                            • C:\Windows\SysWOW64\Hbnaeh32.exe
                                                              C:\Windows\system32\Hbnaeh32.exe
                                                              30⤵
                                                              • Executes dropped EXE
                                                              • Drops file in System32 directory
                                                              • Modifies registry class
                                                              PID:2640
                                                              • C:\Windows\SysWOW64\Ilphdlqh.exe
                                                                C:\Windows\system32\Ilphdlqh.exe
                                                                31⤵
                                                                • Executes dropped EXE
                                                                • Drops file in System32 directory
                                                                • Modifies registry class
                                                                PID:3332
                                                                • C:\Windows\SysWOW64\Joqafgni.exe
                                                                  C:\Windows\system32\Joqafgni.exe
                                                                  32⤵
                                                                  • Adds autorun key to be loaded by Explorer.exe on startup
                                                                  • Executes dropped EXE
                                                                  • Drops file in System32 directory
                                                                  • Modifies registry class
                                                                  PID:2960
                                                                  • C:\Windows\SysWOW64\Jihbip32.exe
                                                                    C:\Windows\system32\Jihbip32.exe
                                                                    33⤵
                                                                    • Executes dropped EXE
                                                                    • Modifies registry class
                                                                    PID:2588
                                                                    • C:\Windows\SysWOW64\Jllhpkfk.exe
                                                                      C:\Windows\system32\Jllhpkfk.exe
                                                                      34⤵
                                                                      • Adds autorun key to be loaded by Explorer.exe on startup
                                                                      • Executes dropped EXE
                                                                      • Drops file in System32 directory
                                                                      • Modifies registry class
                                                                      PID:3980
                                                                      • C:\Windows\SysWOW64\Klpakj32.exe
                                                                        C:\Windows\system32\Klpakj32.exe
                                                                        35⤵
                                                                        • Executes dropped EXE
                                                                        • Drops file in System32 directory
                                                                        • Modifies registry class
                                                                        PID:4444
                                                                        • C:\Windows\SysWOW64\Kekbjo32.exe
                                                                          C:\Windows\system32\Kekbjo32.exe
                                                                          36⤵
                                                                          • Adds autorun key to be loaded by Explorer.exe on startup
                                                                          • Executes dropped EXE
                                                                          • Modifies registry class
                                                                          PID:5124
                                                                          • C:\Windows\SysWOW64\Kpccmhdg.exe
                                                                            C:\Windows\system32\Kpccmhdg.exe
                                                                            37⤵
                                                                            • Adds autorun key to be loaded by Explorer.exe on startup
                                                                            • Executes dropped EXE
                                                                            PID:1864
                                                                            • C:\Windows\SysWOW64\Lebijnak.exe
                                                                              C:\Windows\system32\Lebijnak.exe
                                                                              38⤵
                                                                              • Adds autorun key to be loaded by Explorer.exe on startup
                                                                              • Executes dropped EXE
                                                                              • Drops file in System32 directory
                                                                              • Modifies registry class
                                                                              PID:6140
                                                                              • C:\Windows\SysWOW64\Laiipofp.exe
                                                                                C:\Windows\system32\Laiipofp.exe
                                                                                39⤵
                                                                                • Adds autorun key to be loaded by Explorer.exe on startup
                                                                                • Executes dropped EXE
                                                                                • Modifies registry class
                                                                                PID:1988
                                                                                • C:\Windows\SysWOW64\Legben32.exe
                                                                                  C:\Windows\system32\Legben32.exe
                                                                                  40⤵
                                                                                  • Adds autorun key to be loaded by Explorer.exe on startup
                                                                                  • Executes dropped EXE
                                                                                  • Drops file in System32 directory
                                                                                  PID:1452
                                                                                  • C:\Windows\SysWOW64\Llcghg32.exe
                                                                                    C:\Windows\system32\Llcghg32.exe
                                                                                    41⤵
                                                                                    • Adds autorun key to be loaded by Explorer.exe on startup
                                                                                    • Executes dropped EXE
                                                                                    PID:5080
                                                                                    • C:\Windows\SysWOW64\Modpib32.exe
                                                                                      C:\Windows\system32\Modpib32.exe
                                                                                      42⤵
                                                                                      • Adds autorun key to be loaded by Explorer.exe on startup
                                                                                      • Executes dropped EXE
                                                                                      • Drops file in System32 directory
                                                                                      PID:2984
                                                                                      • C:\Windows\SysWOW64\Mpclce32.exe
                                                                                        C:\Windows\system32\Mpclce32.exe
                                                                                        43⤵
                                                                                        • Adds autorun key to be loaded by Explorer.exe on startup
                                                                                        • Executes dropped EXE
                                                                                        • Drops file in System32 directory
                                                                                        • Modifies registry class
                                                                                        PID:3540
                                                                                        • C:\Windows\SysWOW64\Mpeiie32.exe
                                                                                          C:\Windows\system32\Mpeiie32.exe
                                                                                          44⤵
                                                                                          • Adds autorun key to be loaded by Explorer.exe on startup
                                                                                          • Executes dropped EXE
                                                                                          • Drops file in System32 directory
                                                                                          PID:1648
                                                                                          • C:\Windows\SysWOW64\Mokfja32.exe
                                                                                            C:\Windows\system32\Mokfja32.exe
                                                                                            45⤵
                                                                                            • Adds autorun key to be loaded by Explorer.exe on startup
                                                                                            • Executes dropped EXE
                                                                                            • Modifies registry class
                                                                                            PID:1404
                                                                                            • C:\Windows\SysWOW64\Mlofcf32.exe
                                                                                              C:\Windows\system32\Mlofcf32.exe
                                                                                              46⤵
                                                                                              • Adds autorun key to be loaded by Explorer.exe on startup
                                                                                              • Executes dropped EXE
                                                                                              • Drops file in System32 directory
                                                                                              • Modifies registry class
                                                                                              PID:3236
                                                                                              • C:\Windows\SysWOW64\Njbgmjgl.exe
                                                                                                C:\Windows\system32\Njbgmjgl.exe
                                                                                                47⤵
                                                                                                • Adds autorun key to be loaded by Explorer.exe on startup
                                                                                                • Executes dropped EXE
                                                                                                PID:1956
                                                                                                • C:\Windows\SysWOW64\Nbnlaldg.exe
                                                                                                  C:\Windows\system32\Nbnlaldg.exe
                                                                                                  48⤵
                                                                                                  • Executes dropped EXE
                                                                                                  PID:2568
                                                                                                  • C:\Windows\SysWOW64\Ncmhko32.exe
                                                                                                    C:\Windows\system32\Ncmhko32.exe
                                                                                                    49⤵
                                                                                                    • Executes dropped EXE
                                                                                                    PID:1428
                                                                                                    • C:\Windows\SysWOW64\Nqaiecjd.exe
                                                                                                      C:\Windows\system32\Nqaiecjd.exe
                                                                                                      50⤵
                                                                                                      • Adds autorun key to be loaded by Explorer.exe on startup
                                                                                                      • Executes dropped EXE
                                                                                                      • Modifies registry class
                                                                                                      PID:4280
                                                                                                      • C:\Windows\SysWOW64\Nimmifgo.exe
                                                                                                        C:\Windows\system32\Nimmifgo.exe
                                                                                                        51⤵
                                                                                                        • Adds autorun key to be loaded by Explorer.exe on startup
                                                                                                        • Executes dropped EXE
                                                                                                        PID:1204
                                                                                                        • C:\Windows\SysWOW64\Nofefp32.exe
                                                                                                          C:\Windows\system32\Nofefp32.exe
                                                                                                          52⤵
                                                                                                          • Executes dropped EXE
                                                                                                          • Drops file in System32 directory
                                                                                                          PID:4848
                                                                                                          • C:\Windows\SysWOW64\Nmjfodne.exe
                                                                                                            C:\Windows\system32\Nmjfodne.exe
                                                                                                            53⤵
                                                                                                            • Adds autorun key to be loaded by Explorer.exe on startup
                                                                                                            • Executes dropped EXE
                                                                                                            PID:5556
                                                                                                            • C:\Windows\SysWOW64\Ocgkan32.exe
                                                                                                              C:\Windows\system32\Ocgkan32.exe
                                                                                                              54⤵
                                                                                                              • Adds autorun key to be loaded by Explorer.exe on startup
                                                                                                              • Executes dropped EXE
                                                                                                              • Drops file in System32 directory
                                                                                                              PID:1960
                                                                                                              • C:\Windows\SysWOW64\Omopjcjp.exe
                                                                                                                C:\Windows\system32\Omopjcjp.exe
                                                                                                                55⤵
                                                                                                                • Executes dropped EXE
                                                                                                                • Drops file in System32 directory
                                                                                                                • Modifies registry class
                                                                                                                PID:1448
                                                                                                                • C:\Windows\SysWOW64\Ocihgnam.exe
                                                                                                                  C:\Windows\system32\Ocihgnam.exe
                                                                                                                  56⤵
                                                                                                                  • Executes dropped EXE
                                                                                                                  PID:5908
                                                                                                                  • C:\Windows\SysWOW64\Omalpc32.exe
                                                                                                                    C:\Windows\system32\Omalpc32.exe
                                                                                                                    57⤵
                                                                                                                    • Executes dropped EXE
                                                                                                                    • Modifies registry class
                                                                                                                    PID:3592
                                                                                                                    • C:\Windows\SysWOW64\Obnehj32.exe
                                                                                                                      C:\Windows\system32\Obnehj32.exe
                                                                                                                      58⤵
                                                                                                                      • Executes dropped EXE
                                                                                                                      • Drops file in System32 directory
                                                                                                                      • Modifies registry class
                                                                                                                      PID:3208
                                                                                                                      • C:\Windows\SysWOW64\Oqoefand.exe
                                                                                                                        C:\Windows\system32\Oqoefand.exe
                                                                                                                        59⤵
                                                                                                                        • Adds autorun key to be loaded by Explorer.exe on startup
                                                                                                                        • Executes dropped EXE
                                                                                                                        • Drops file in System32 directory
                                                                                                                        PID:4988
                                                                                                                        • C:\Windows\SysWOW64\Obqanjdb.exe
                                                                                                                          C:\Windows\system32\Obqanjdb.exe
                                                                                                                          60⤵
                                                                                                                          • Executes dropped EXE
                                                                                                                          PID:5076
                                                                                                                          • C:\Windows\SysWOW64\Pimfpc32.exe
                                                                                                                            C:\Windows\system32\Pimfpc32.exe
                                                                                                                            61⤵
                                                                                                                            • Executes dropped EXE
                                                                                                                            • Modifies registry class
                                                                                                                            PID:5532
                                                                                                                            • C:\Windows\SysWOW64\Pbekii32.exe
                                                                                                                              C:\Windows\system32\Pbekii32.exe
                                                                                                                              62⤵
                                                                                                                              • Adds autorun key to be loaded by Explorer.exe on startup
                                                                                                                              • Executes dropped EXE
                                                                                                                              • Modifies registry class
                                                                                                                              PID:5816
                                                                                                                              • C:\Windows\SysWOW64\Pmmlla32.exe
                                                                                                                                C:\Windows\system32\Pmmlla32.exe
                                                                                                                                63⤵
                                                                                                                                • Adds autorun key to be loaded by Explorer.exe on startup
                                                                                                                                • Executes dropped EXE
                                                                                                                                PID:2168
                                                                                                                                • C:\Windows\SysWOW64\Pakdbp32.exe
                                                                                                                                  C:\Windows\system32\Pakdbp32.exe
                                                                                                                                  64⤵
                                                                                                                                  • Executes dropped EXE
                                                                                                                                  PID:1092
                                                                                                                                  • C:\Windows\SysWOW64\Pblajhje.exe
                                                                                                                                    C:\Windows\system32\Pblajhje.exe
                                                                                                                                    65⤵
                                                                                                                                    • Executes dropped EXE
                                                                                                                                    PID:768
                                                                                                                                    • C:\Windows\SysWOW64\Qclmck32.exe
                                                                                                                                      C:\Windows\system32\Qclmck32.exe
                                                                                                                                      66⤵
                                                                                                                                      • Adds autorun key to be loaded by Explorer.exe on startup
                                                                                                                                      • Modifies registry class
                                                                                                                                      PID:1768
                                                                                                                                      • C:\Windows\SysWOW64\Qjffpe32.exe
                                                                                                                                        C:\Windows\system32\Qjffpe32.exe
                                                                                                                                        67⤵
                                                                                                                                        • Modifies registry class
                                                                                                                                        PID:5208
                                                                                                                                        • C:\Windows\SysWOW64\Qpbnhl32.exe
                                                                                                                                          C:\Windows\system32\Qpbnhl32.exe
                                                                                                                                          68⤵
                                                                                                                                          • Modifies registry class
                                                                                                                                          PID:2840
                                                                                                                                          • C:\Windows\SysWOW64\Qfmfefni.exe
                                                                                                                                            C:\Windows\system32\Qfmfefni.exe
                                                                                                                                            69⤵
                                                                                                                                            • Modifies registry class
                                                                                                                                            PID:4568
                                                                                                                                            • C:\Windows\SysWOW64\Aabkbono.exe
                                                                                                                                              C:\Windows\system32\Aabkbono.exe
                                                                                                                                              70⤵
                                                                                                                                              • Adds autorun key to be loaded by Explorer.exe on startup
                                                                                                                                              • Drops file in System32 directory
                                                                                                                                              PID:4496
                                                                                                                                              • C:\Windows\SysWOW64\Abcgjg32.exe
                                                                                                                                                C:\Windows\system32\Abcgjg32.exe
                                                                                                                                                71⤵
                                                                                                                                                • Adds autorun key to be loaded by Explorer.exe on startup
                                                                                                                                                • Modifies registry class
                                                                                                                                                PID:4788
                                                                                                                                                • C:\Windows\SysWOW64\Amikgpcc.exe
                                                                                                                                                  C:\Windows\system32\Amikgpcc.exe
                                                                                                                                                  72⤵
                                                                                                                                                    PID:2376
                                                                                                                                                    • C:\Windows\SysWOW64\Afappe32.exe
                                                                                                                                                      C:\Windows\system32\Afappe32.exe
                                                                                                                                                      73⤵
                                                                                                                                                      • Adds autorun key to be loaded by Explorer.exe on startup
                                                                                                                                                      • Drops file in System32 directory
                                                                                                                                                      • Modifies registry class
                                                                                                                                                      PID:4952
                                                                                                                                                      • C:\Windows\SysWOW64\Adepji32.exe
                                                                                                                                                        C:\Windows\system32\Adepji32.exe
                                                                                                                                                        74⤵
                                                                                                                                                        • Adds autorun key to be loaded by Explorer.exe on startup
                                                                                                                                                        PID:3516
                                                                                                                                                        • C:\Windows\SysWOW64\Aibibp32.exe
                                                                                                                                                          C:\Windows\system32\Aibibp32.exe
                                                                                                                                                          75⤵
                                                                                                                                                          • Modifies registry class
                                                                                                                                                          PID:2204
                                                                                                                                                          • C:\Windows\SysWOW64\Affikdfn.exe
                                                                                                                                                            C:\Windows\system32\Affikdfn.exe
                                                                                                                                                            76⤵
                                                                                                                                                            • Adds autorun key to be loaded by Explorer.exe on startup
                                                                                                                                                            PID:4512
                                                                                                                                                            • C:\Windows\SysWOW64\Aalmimfd.exe
                                                                                                                                                              C:\Windows\system32\Aalmimfd.exe
                                                                                                                                                              77⤵
                                                                                                                                                              • Drops file in System32 directory
                                                                                                                                                              • Modifies registry class
                                                                                                                                                              PID:4916
                                                                                                                                                              • C:\Windows\SysWOW64\Bfkbfd32.exe
                                                                                                                                                                C:\Windows\system32\Bfkbfd32.exe
                                                                                                                                                                78⤵
                                                                                                                                                                • Adds autorun key to be loaded by Explorer.exe on startup
                                                                                                                                                                • Modifies registry class
                                                                                                                                                                PID:4304
                                                                                                                                                                • C:\Windows\SysWOW64\Bpcgpihi.exe
                                                                                                                                                                  C:\Windows\system32\Bpcgpihi.exe
                                                                                                                                                                  79⤵
                                                                                                                                                                  • Adds autorun key to be loaded by Explorer.exe on startup
                                                                                                                                                                  • Drops file in System32 directory
                                                                                                                                                                  PID:4572
                                                                                                                                                                  • C:\Windows\SysWOW64\Cmnnimak.exe
                                                                                                                                                                    C:\Windows\system32\Cmnnimak.exe
                                                                                                                                                                    80⤵
                                                                                                                                                                    • Drops file in System32 directory
                                                                                                                                                                    • Modifies registry class
                                                                                                                                                                    PID:448
                                                                                                                                                                    • C:\Windows\SysWOW64\Cgfbbb32.exe
                                                                                                                                                                      C:\Windows\system32\Cgfbbb32.exe
                                                                                                                                                                      81⤵
                                                                                                                                                                      • Adds autorun key to be loaded by Explorer.exe on startup
                                                                                                                                                                      • Modifies registry class
                                                                                                                                                                      PID:840
                                                                                                                                                                      • C:\Windows\SysWOW64\Ccmcgcmp.exe
                                                                                                                                                                        C:\Windows\system32\Ccmcgcmp.exe
                                                                                                                                                                        82⤵
                                                                                                                                                                        • Adds autorun key to be loaded by Explorer.exe on startup
                                                                                                                                                                        • Drops file in System32 directory
                                                                                                                                                                        PID:4692
                                                                                                                                                                        • C:\Windows\SysWOW64\Cpacqg32.exe
                                                                                                                                                                          C:\Windows\system32\Cpacqg32.exe
                                                                                                                                                                          83⤵
                                                                                                                                                                          • Adds autorun key to be loaded by Explorer.exe on startup
                                                                                                                                                                          • Drops file in System32 directory
                                                                                                                                                                          PID:1484
                                                                                                                                                                          • C:\Windows\SysWOW64\Cacmpj32.exe
                                                                                                                                                                            C:\Windows\system32\Cacmpj32.exe
                                                                                                                                                                            84⤵
                                                                                                                                                                            • Adds autorun key to be loaded by Explorer.exe on startup
                                                                                                                                                                            • Modifies registry class
                                                                                                                                                                            PID:5500
                                                                                                                                                                            • C:\Windows\SysWOW64\Dmjmekgn.exe
                                                                                                                                                                              C:\Windows\system32\Dmjmekgn.exe
                                                                                                                                                                              85⤵
                                                                                                                                                                              • Adds autorun key to be loaded by Explorer.exe on startup
                                                                                                                                                                              • Modifies registry class
                                                                                                                                                                              PID:4872
                                                                                                                                                                              • C:\Windows\SysWOW64\Dknnoofg.exe
                                                                                                                                                                                C:\Windows\system32\Dknnoofg.exe
                                                                                                                                                                                86⤵
                                                                                                                                                                                • Modifies registry class
                                                                                                                                                                                PID:5340
                                                                                                                                                                                • C:\Windows\SysWOW64\Dgdncplk.exe
                                                                                                                                                                                  C:\Windows\system32\Dgdncplk.exe
                                                                                                                                                                                  87⤵
                                                                                                                                                                                  • Adds autorun key to be loaded by Explorer.exe on startup
                                                                                                                                                                                  • Drops file in System32 directory
                                                                                                                                                                                  PID:2420
                                                                                                                                                                                  • C:\Windows\SysWOW64\Dpmcmf32.exe
                                                                                                                                                                                    C:\Windows\system32\Dpmcmf32.exe
                                                                                                                                                                                    88⤵
                                                                                                                                                                                    • Adds autorun key to be loaded by Explorer.exe on startup
                                                                                                                                                                                    PID:1108
                                                                                                                                                                                    • C:\Windows\SysWOW64\Dkbgjo32.exe
                                                                                                                                                                                      C:\Windows\system32\Dkbgjo32.exe
                                                                                                                                                                                      89⤵
                                                                                                                                                                                      • Adds autorun key to be loaded by Explorer.exe on startup
                                                                                                                                                                                      PID:2908
                                                                                                                                                                                      • C:\Windows\SysWOW64\Ddklbd32.exe
                                                                                                                                                                                        C:\Windows\system32\Ddklbd32.exe
                                                                                                                                                                                        90⤵
                                                                                                                                                                                        • Drops file in System32 directory
                                                                                                                                                                                        PID:1972
                                                                                                                                                                                        • C:\Windows\SysWOW64\Djgdkk32.exe
                                                                                                                                                                                          C:\Windows\system32\Djgdkk32.exe
                                                                                                                                                                                          91⤵
                                                                                                                                                                                          • Modifies registry class
                                                                                                                                                                                          PID:5796
                                                                                                                                                                                          • C:\Windows\SysWOW64\Dcphdqmj.exe
                                                                                                                                                                                            C:\Windows\system32\Dcphdqmj.exe
                                                                                                                                                                                            92⤵
                                                                                                                                                                                            • Adds autorun key to be loaded by Explorer.exe on startup
                                                                                                                                                                                            PID:5128
                                                                                                                                                                                            • C:\Windows\SysWOW64\Eaaiahei.exe
                                                                                                                                                                                              C:\Windows\system32\Eaaiahei.exe
                                                                                                                                                                                              93⤵
                                                                                                                                                                                                PID:3188
                                                                                                                                                                                                • C:\Windows\SysWOW64\Ejlnfjbd.exe
                                                                                                                                                                                                  C:\Windows\system32\Ejlnfjbd.exe
                                                                                                                                                                                                  94⤵
                                                                                                                                                                                                  • Drops file in System32 directory
                                                                                                                                                                                                  • Modifies registry class
                                                                                                                                                                                                  PID:3304
                                                                                                                                                                                                  • C:\Windows\SysWOW64\Ecdbop32.exe
                                                                                                                                                                                                    C:\Windows\system32\Ecdbop32.exe
                                                                                                                                                                                                    95⤵
                                                                                                                                                                                                    • Modifies registry class
                                                                                                                                                                                                    PID:1096
                                                                                                                                                                                                    • C:\Windows\SysWOW64\Ekngemhd.exe
                                                                                                                                                                                                      C:\Windows\system32\Ekngemhd.exe
                                                                                                                                                                                                      96⤵
                                                                                                                                                                                                      • Adds autorun key to be loaded by Explorer.exe on startup
                                                                                                                                                                                                      • Drops file in System32 directory
                                                                                                                                                                                                      PID:332
                                                                                                                                                                                                      • C:\Windows\SysWOW64\Edfknb32.exe
                                                                                                                                                                                                        C:\Windows\system32\Edfknb32.exe
                                                                                                                                                                                                        97⤵
                                                                                                                                                                                                          PID:2220
                                                                                                                                                                                                          • C:\Windows\SysWOW64\Eqmlccdi.exe
                                                                                                                                                                                                            C:\Windows\system32\Eqmlccdi.exe
                                                                                                                                                                                                            98⤵
                                                                                                                                                                                                            • Adds autorun key to be loaded by Explorer.exe on startup
                                                                                                                                                                                                            • Drops file in System32 directory
                                                                                                                                                                                                            PID:5412
                                                                                                                                                                                                            • C:\Windows\SysWOW64\Fnalmh32.exe
                                                                                                                                                                                                              C:\Windows\system32\Fnalmh32.exe
                                                                                                                                                                                                              99⤵
                                                                                                                                                                                                              • Drops file in System32 directory
                                                                                                                                                                                                              • Modifies registry class
                                                                                                                                                                                                              PID:6004
                                                                                                                                                                                                              • C:\Windows\SysWOW64\Fkemfl32.exe
                                                                                                                                                                                                                C:\Windows\system32\Fkemfl32.exe
                                                                                                                                                                                                                100⤵
                                                                                                                                                                                                                • Modifies registry class
                                                                                                                                                                                                                PID:5356
                                                                                                                                                                                                                • C:\Windows\SysWOW64\Fqbeoc32.exe
                                                                                                                                                                                                                  C:\Windows\system32\Fqbeoc32.exe
                                                                                                                                                                                                                  101⤵
                                                                                                                                                                                                                  • Drops file in System32 directory
                                                                                                                                                                                                                  PID:5328
                                                                                                                                                                                                                  • C:\Windows\SysWOW64\Fjjjgh32.exe
                                                                                                                                                                                                                    C:\Windows\system32\Fjjjgh32.exe
                                                                                                                                                                                                                    102⤵
                                                                                                                                                                                                                      PID:1016
                                                                                                                                                                                                                      • C:\Windows\SysWOW64\Fcbnpnme.exe
                                                                                                                                                                                                                        C:\Windows\system32\Fcbnpnme.exe
                                                                                                                                                                                                                        103⤵
                                                                                                                                                                                                                        • Drops file in System32 directory
                                                                                                                                                                                                                        • Modifies registry class
                                                                                                                                                                                                                        PID:5848
                                                                                                                                                                                                                        • C:\Windows\SysWOW64\Fnhbmgmk.exe
                                                                                                                                                                                                                          C:\Windows\system32\Fnhbmgmk.exe
                                                                                                                                                                                                                          104⤵
                                                                                                                                                                                                                            PID:5764
                                                                                                                                                                                                                            • C:\Windows\SysWOW64\Fklcgk32.exe
                                                                                                                                                                                                                              C:\Windows\system32\Fklcgk32.exe
                                                                                                                                                                                                                              105⤵
                                                                                                                                                                                                                              • Adds autorun key to be loaded by Explorer.exe on startup
                                                                                                                                                                                                                              PID:4768
                                                                                                                                                                                                                              • C:\Windows\SysWOW64\Gddgpqbe.exe
                                                                                                                                                                                                                                C:\Windows\system32\Gddgpqbe.exe
                                                                                                                                                                                                                                106⤵
                                                                                                                                                                                                                                  PID:4388
                                                                                                                                                                                                                                  • C:\Windows\SysWOW64\WerFault.exe
                                                                                                                                                                                                                                    C:\Windows\SysWOW64\WerFault.exe -u -p 4388 -s 400
                                                                                                                                                                                                                                    107⤵
                                                                                                                                                                                                                                    • Program crash
                                                                                                                                                                                                                                    PID:5932
              • C:\Windows\SysWOW64\WerFault.exe
                C:\Windows\SysWOW64\WerFault.exe -pss -s 428 -p 4388 -ip 4388
                1⤵
                  PID:1616
                • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                  "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=asset_store.mojom.AssetStoreService --lang=en-US --service-sandbox-type=asset_store_service --no-appcompat-clear --mojo-platform-channel-handle=4132 --field-trial-handle=2280,i,1836084024518340990,18250262151825427757,262144 --variations-seed-version /prefetch:8
                  1⤵
                    PID:1104

                  Network

                        MITRE ATT&CK Enterprise v15

                        Replay Monitor

                        Loading Replay Monitor...

                        Downloads

                        • C:\Windows\SysWOW64\Aaoaic32.exe

                          Filesize

                          346KB

                          MD5

                          1c637625591293d8b78e6a241ae7db7e

                          SHA1

                          dcb7f648cd59620f592dd5a93281f6bbb2d51c96

                          SHA256

                          dcca2f966230150a2586d598a10e46ed7e7846602e96994083a359f1cc47c6d8

                          SHA512

                          515734f81a5b1793014006c5a2819d7087bce6a6e67cc7102cf7dfd4ec7245270562c062453e23a145a36e21a48ff5f2598a6c7985337e3a99381990995653d8

                        • C:\Windows\SysWOW64\Affikdfn.exe

                          Filesize

                          346KB

                          MD5

                          5a01665d76bd3f883df669805b54a44b

                          SHA1

                          bd522526c0a9f9ffaf881b834e93184da5aaeb32

                          SHA256

                          c4d6fc752bf788f8d5bfe7cfcac0b39607f294a6f6d2335e6d064853a5b30ffc

                          SHA512

                          1fd94aec56dfa845d73c8d3b979184c5a914ec6e4b0eb88ee9f7852de90dd4d98e768a338065a3a0c6648be4e0132ec01448fbc2e97ff9414df432344a2567b2

                        • C:\Windows\SysWOW64\Ahdpjn32.exe

                          Filesize

                          346KB

                          MD5

                          e567f7b1199002a2712d9b7c7c39eac6

                          SHA1

                          d1ab86471799db148709cf3c9f50942e8e76f2d6

                          SHA256

                          88a7569d949d40e39419e507dfc9391666e57da0034baa4150ef1ca935a630e2

                          SHA512

                          db78803b0714055545cbbcb9245983b9cd9c8e09afb3631dc970e055b1e8882f9fa5f40065727894412f42bfa12508c316a07bad4ca1f9fe11e25db58726075d

                        • C:\Windows\SysWOW64\Bddcenpi.exe

                          Filesize

                          346KB

                          MD5

                          c636226efaef9ac33431e1fbf1677b37

                          SHA1

                          6c8c8ebfed501a768fbdf66d7b608f965bae4191

                          SHA256

                          57ec4bc88937b7c90e7f3136e9a866e036ee45f5232117b8ed77e5bd6e0b07c8

                          SHA512

                          f15faeb5342578e347ebfbf16797ab074b0c5f8bbd65ab8fb637e5c251f26488b5edc0171a0f9d87fed8d42cb11e8ab9796f70cecc8525dbef5f0dc34026f9aa

                        • C:\Windows\SysWOW64\Bklomh32.exe

                          Filesize

                          346KB

                          MD5

                          7141a34a14b9986ab6d8f120ed84e0dc

                          SHA1

                          a473769faf8a101267ff28ba45fd030b9d14b816

                          SHA256

                          32bb042752a8688c3377425a3b1c1262fe67c7d741efbcf9070d643d299e3ac0

                          SHA512

                          501aae5395a72187a3a77625bc4fae50ad9ada934e80b3dc885282a219cd7de14368d5e2526daaefe2f13162004c47d203ab8a3a4b67575cd4cd6099ff2f8e0b

                        • C:\Windows\SysWOW64\Bkphhgfc.exe

                          Filesize

                          346KB

                          MD5

                          fd964b61b9b5b8d2022c0470a60ac7c1

                          SHA1

                          4431c5d7ca89e2856beaed5413a4e0e7907af72b

                          SHA256

                          361fde3fdb71538586a8653b74f79bdb3e37b97aa1db77cd1e3a39e0012094dc

                          SHA512

                          9efa3e853ac195ddf49b1ba7f9710b3e1e5207d9329a3ad40a15f8e395b40c416a82e788474c19d795f6bf82ce395c6f35552d63451f364db355e9c570e6d861

                        • C:\Windows\SysWOW64\Bobabg32.exe

                          Filesize

                          346KB

                          MD5

                          3938e9ad67c58a3565d26710770f6c7f

                          SHA1

                          a6339ec3e9d0862501cab3e501372cfb764a9631

                          SHA256

                          b71dbbe5c8624e7d7e9fcc9a2918067133a7872260de768717ed67b511636db6

                          SHA512

                          dd6058305b850d1edeacbf0879d05f7ba76930c410327d7f0d68f786e39eef47b84ddcdadf9ac00fd8bbaa830a141d8df86a69327ffd596b03d3259805f58381

                        • C:\Windows\SysWOW64\Boenhgdd.exe

                          Filesize

                          346KB

                          MD5

                          f225a21ae983aeae214173f326cb9de9

                          SHA1

                          153831fbfa2084765088341ad67c55f947f25833

                          SHA256

                          83d454a399ce622f904944aebe9ce4886d183256216e4fcd8cdd8eb713bc9007

                          SHA512

                          5d08f6cd86542555f0edef4f058b264d96a4c32c21d99fa4f577c1a0f0ccc97891893fe0ddf5ab3c9b4e8e5c25f4cef0cec094496e8b56d3624ee39576f49b34

                        • C:\Windows\SysWOW64\Bpkdjofm.exe

                          Filesize

                          346KB

                          MD5

                          05af629cdf7f0201d0a943e22ea0030e

                          SHA1

                          7a42345bf70f6a97b0e4c2060042de1f679016af

                          SHA256

                          270afd4580884add68fee314fbb359591d3f0379ac24ad7501a9e4b8d3441a06

                          SHA512

                          451f5d90424e59d6237d69d02a6cba51357624c88fb6e3e5b28820227561674b83ef8e4188625f560ba82f8d00d71c0aadb344c6ac476c201eae04d89c1ecbca

                        • C:\Windows\SysWOW64\Cdkifmjq.exe

                          Filesize

                          346KB

                          MD5

                          cd1643a6661c02de3e8137468809f5a4

                          SHA1

                          147c9401feb912634025a0772ea9c8b64bee167a

                          SHA256

                          c97616482c2c6fac13b6123b6bc8975a2ecc8c986c61203097635d058dbd6d92

                          SHA512

                          15115c48ed17e09f716178df529c502e0dddcc33673c5e806aab1731e10a94de4162287480687cb37c13d24c1a5a8aef2f91a3d50cf43204a9ae02f7747b3050

                        • C:\Windows\SysWOW64\Cdmfllhn.exe

                          Filesize

                          346KB

                          MD5

                          aa3fe0007b5a63c73a7c7fcea0290ffc

                          SHA1

                          5788ebde5fd1dc3f107f50fecd33e6d164db73c1

                          SHA256

                          ce98b1506e1e082bd606b54802fe30d9a51955e3c4ee4b1ce864f5ef437b0465

                          SHA512

                          96a64a45c799ad674e7dd9e9942a9ed4c777926cb96017afdf011f296700193b4d779e6e1ddf2ec85e7d304e01e9082f79cab24bedef4079cf15f150ab0d37b2

                        • C:\Windows\SysWOW64\Cgfbbb32.exe

                          Filesize

                          346KB

                          MD5

                          1aca0539d6f36fd243dadf23a2215fc4

                          SHA1

                          921bd83dab393984d27915b94644a4c8086a8b24

                          SHA256

                          b8a5a524fe1c69ef729f1b19cf747e9e5e7f82247e0f918e264e2f50f1ef5d40

                          SHA512

                          def1f62fa354953ac76aa8ffde7b3c6f23a5dbe330a9db0510c292e103483841ae01252ffd78a6642316170c606adb51c17f02ee86a9bff0850c56d83cee8a41

                        • C:\Windows\SysWOW64\Cpacqg32.exe

                          Filesize

                          346KB

                          MD5

                          563ee4843d4c794cbb9ca00ebd64dc94

                          SHA1

                          d06cfbdf3cc5bb2509c40e2874523d5bfa386224

                          SHA256

                          267e6601cfc8b6986a5792cdd1b8ffc1490f6a65805b9209b06af134a64b3f9f

                          SHA512

                          b571fe2a9921e906de55bd5d8b085916ff033fda25f7be6908710c544f0e66613f4a95a1d4bb809eaedd78e1dc3ea15faf312a9bc51dbc626b98dda672919d9a

                        • C:\Windows\SysWOW64\Cpdgqmnb.exe

                          Filesize

                          346KB

                          MD5

                          43fa8d994acb289a2023bbc2e0eb11b4

                          SHA1

                          8e888a9500a64d299813637f66d4080cad819732

                          SHA256

                          1ba8965bbbdd958e8c108b6357f01156ebeb533be038ed8c13873d3380a4ae70

                          SHA512

                          2ce2d08643b279d14d601c3504005f5a1ad6ab3ce9cddd2d501e9e2508670d0f5db8872925d4626f077eb9373afc3309f5d1a231d561159229aea4246990bb87

                        • C:\Windows\SysWOW64\Dafppp32.exe

                          Filesize

                          346KB

                          MD5

                          de0e1b086782a15f194655f3c0197fb0

                          SHA1

                          73021dfb54a6fbaf878343f059d934babc450830

                          SHA256

                          e3c39b1831ed31f7852da73b6ab74f6c3790f6e18ffa5d93fb6f21ae8d487ad9

                          SHA512

                          90908be500c7b80c8f52e8622b4bb4ca52b2107b50176fb1186388a6d4b03c7924366c5f1cb26ec5d73fc3d542d1f681011faab73baebf3e7e4891c9952cf709

                        • C:\Windows\SysWOW64\Dafppp32.exe

                          Filesize

                          346KB

                          MD5

                          c0964a43c248a80faaeb3bfc06c28b38

                          SHA1

                          a5d04f91c7ef9d2bac1afcc5851c948eac947967

                          SHA256

                          e0a530bfc27c941751c5f8639a1668cb1adfc614568b41b91c5dc40230316ebc

                          SHA512

                          7a48eb9cef98b57c56378eaa85043e581e2b4e2d77d6fab6743fe53c3057f12ffdc9986f54b2c943ff36b8012fb732614a6b1406daddc1f9d885372a558f5dc6

                        • C:\Windows\SysWOW64\Ddgibkpc.exe

                          Filesize

                          346KB

                          MD5

                          dc5b6277493c06ab8314f7f678c9a16e

                          SHA1

                          882be38515c287747dadf41889520467be653efd

                          SHA256

                          cb0075d77e779e2588b965e6adbbdb9366dfe63e3bb52e7711eafc6f0592991d

                          SHA512

                          202718bebbe35f6e4f4dcac14627a7a5a0c0b834f76efbaffcb6b849007e4c0c39601317aa993c6df33c1d5a664bdba5c7e16664731e21a1460685275fb7a1cc

                        • C:\Windows\SysWOW64\Ddklbd32.exe

                          Filesize

                          346KB

                          MD5

                          6e93458e084fb27f33132c693d2b149e

                          SHA1

                          39c8baac7013f62cc866c0d998788657fd2abe6e

                          SHA256

                          7541b0de4a3ea73a150da568beacd6a2216353cddea1e545f4996364f21762a0

                          SHA512

                          acc2701480679f8fd5555a0938e63147fd80a1c4601ecabd3ec331bd9f740abe177cdf4ca66aa3d563c9ac03749218950cfd26ed68e8f233df94b81497afae53

                        • C:\Windows\SysWOW64\Doagjc32.exe

                          Filesize

                          346KB

                          MD5

                          09ce6684a6e39199be7f1664957548e8

                          SHA1

                          04da4d4812c3a7e873815a3fab497ffc9d24198a

                          SHA256

                          759414bfcbb895ec3dbc7e30a0811f75fff0ffa127bffd259dbce67c0d44db5a

                          SHA512

                          d3773ae02fd8cbf679a06afbb5a362d956bbfe40b4e35c933e51624a4f6ec6ed4634f539f054b6e7d9ef0eb33d4f658ff313cb362cbbede5647dbe6b6c6ce706

                        • C:\Windows\SysWOW64\Doccpcja.exe

                          Filesize

                          346KB

                          MD5

                          613048bbf04752118f475f426f305e41

                          SHA1

                          5343ce82b7c2da57b07667dda42ab69becc617f1

                          SHA256

                          4a40984a8610c2dbbff3c24829620d1408b2652d9c9707880e6d49774a1006cc

                          SHA512

                          b5ece18fbfbb12e286b028b6b10942297f68cba892cdf7ee441b42c609ffbb64a2a1e032b254cdcd0448bb0af6cfca86f41766b8537cbea91bc8e827178c89a1

                        • C:\Windows\SysWOW64\Ekngemhd.exe

                          Filesize

                          346KB

                          MD5

                          c3c8743c3ae64691fd1d989ab848cf6a

                          SHA1

                          bc3177b80aa51f49446acee0e732e0906e1e955e

                          SHA256

                          30ae4005df533149721c0a5e74aee9c7559e4957f63a22c8723e72821c84b3a0

                          SHA512

                          191b4170730d2eedb6dd21f66c07f919ffa4fb4791032616c01fff59bbd40565c2fe2df91ec0cd72d33e09b676aa8fcab68aba65d058c3b39b98960a5d5dee8f

                        • C:\Windows\SysWOW64\Eomffaag.exe

                          Filesize

                          346KB

                          MD5

                          a47be3d610af7f002831f1373f8297ef

                          SHA1

                          9a011a9a1991755d3cacb37791f8863ab56e6cd0

                          SHA256

                          26f7b2fa8ca81ae3912a6042935b5f79413ae315f0f7fa04a6ef5e04494a8da0

                          SHA512

                          2685d3071adb9559bd52a3088234250c37ef3bd9c6e743bd3dd9b84e9ccc98005613cd6d5c269d5d4eea8178eac8a6b81b4fd91d5af8861b343d3bd5c2efa9e2

                        • C:\Windows\SysWOW64\Eqgmmk32.exe

                          Filesize

                          346KB

                          MD5

                          01bc2bfbe3a2487358f96674973f1ca0

                          SHA1

                          847791b4f1b1e20b8ff933d7469212576587082f

                          SHA256

                          9e0b42fcb93d0e3e3017740557130f76e02cc5c7feeaa01ec4a944da54b2d2f3

                          SHA512

                          9af781e3267a4a9523966d0ae26f9503de9c68b3ff6e5c8dfa7240e847eb8fcd4b2e03c58aeff74b867adbb5679c907e712ab0733c0e22140062d536ab32af6a

                        • C:\Windows\SysWOW64\Eqiibjlj.exe

                          Filesize

                          346KB

                          MD5

                          1fe4f0e989c207d5d719c52b21ed03c3

                          SHA1

                          09551b8a6de808dba402ad9ee4456f52095395d4

                          SHA256

                          1666114fba4a038dcb6d728a2005ce8264f4691d6f5f7aacc31bec5a89399000

                          SHA512

                          888fe24bcd0a60260874218a1f37b17805880c39ce9ff4cf44259120747c008e7f0c9c55eee6e679d469f25f0fb57fd382433fa196328a37aca60076c738959c

                        • C:\Windows\SysWOW64\Eqlfhjig.exe

                          Filesize

                          346KB

                          MD5

                          c900b04f33ba376c9ada576b7e1eeebb

                          SHA1

                          0d53782bcd209a06e15d4269a367a29d1c334ded

                          SHA256

                          c4347a6037778a72d431c96f1a760d6e61252af6f489dd7150844912d59f218c

                          SHA512

                          a6919041d0dc17da11a61c474ba8f1da5e26ecaab6340d3a6372c73e9f3632ba43df31f619af92a21906d1be28c76d199b3abd5238b62179475dc001b7478fc0

                        • C:\Windows\SysWOW64\Fgcjfbed.exe

                          Filesize

                          346KB

                          MD5

                          587fc9f3bbf2a7e11860e128925eb74a

                          SHA1

                          81a8146fed0d1c1663fdc8ca3b9a2d34199a34ed

                          SHA256

                          1198681cade7180d59b293e3c35eec0a1883867abf7657bef18af621c8c33af5

                          SHA512

                          5c2159cdcffaef199e5e1a81b7527f2cd6c86d413677ca65af2b49930ea2d3e3afcdef6edcc8098ea79bf83e718eee6e51008e6e9cf317074a7c593806952675

                        • C:\Windows\SysWOW64\Filapfbo.exe

                          Filesize

                          346KB

                          MD5

                          4f3109ebb04c879b260bc0b027b8cc3c

                          SHA1

                          55c52ee51cfff8a0464ace4d4501af82988d0a59

                          SHA256

                          ba6ceb92d01fd9bf3c69f90cd9813db63fd7d97b7a30f49966b8ef4de84907d1

                          SHA512

                          36988ab0bddbbbd9a0cf34a4d2165573893f247e1ad8eda719e392d5061b49f01eb2daf1da5672c443cd6597ad3cadf42c701edbd9f02240dab3356dd9d24ed1

                        • C:\Windows\SysWOW64\Fkhpfbce.exe

                          Filesize

                          346KB

                          MD5

                          955a71a5ffb1bcff6074fb7a4c2cd3f9

                          SHA1

                          dbbfe732aee3c01d71ce5a9fa2e476c8dd1bf1e7

                          SHA256

                          3af473e4462138c73e8b81a692c5ed3c95e6ec49ed2d9a0d31fe7614235b85a2

                          SHA512

                          f11adfccb7664ac9fa59536d56f9985fe374d0b45d2f92571332c6ffdf780a02e72fcb7a6e967f028d005b1649f2747985ef33d8ab7f43cee87abf89d24df904

                        • C:\Windows\SysWOW64\Fnkfmm32.exe

                          Filesize

                          346KB

                          MD5

                          e7946553bb0013651cb3786fcc02a7c1

                          SHA1

                          27c06b495ea05f8b81866ac295cbd71881e4c587

                          SHA256

                          89730ad0ca2e61a5fc13afd2a8850aba175ad7f1550f30286772d75d9cec3468

                          SHA512

                          5566a429656849e8a5de7f7cede7289378c2b3f8f018a80058ff0915519a3a78d3aaacb65447690896a2d59d02511b5ba6f0553b6dca27897ca0ef39673c4cc8

                        • C:\Windows\SysWOW64\Galoohke.exe

                          Filesize

                          346KB

                          MD5

                          f02cce038b110cc371b315c696a5fcee

                          SHA1

                          11c6478f6d619cb11b06275b961389d94a8787c5

                          SHA256

                          a36103e2226cf9c6601c569e8e053314436c653b68a93ecf57368da80cb394cc

                          SHA512

                          ebdbfe688da49002caaaa097c1fcf7845ffa4ed4ae532a8275d2b271b2819b533a80bc6c3364c159ec33d0f09ba246d8c9b8efd4ac101d7c76816f510e92936c

                        • C:\Windows\SysWOW64\Gihpkd32.exe

                          Filesize

                          346KB

                          MD5

                          22aeb80b10201177328ec938294f9972

                          SHA1

                          01164385eba4419ccda0d435022164dc9a251193

                          SHA256

                          2fa81c9defd0ee7b17d3759eadeef3c7db672ac987e7a42ec50f81361e10eb43

                          SHA512

                          c2eea122f8fc9dbd84e6e6be0ba384e80afe5dd519790e0e0e74404e3717dee2650df4e981e076e7359a005df8d58f239f11130992ee64ffd7db8fb0a421d297

                        • C:\Windows\SysWOW64\Hbnaeh32.exe

                          Filesize

                          346KB

                          MD5

                          9df2aafb982b0f16ed94f954e7b875de

                          SHA1

                          8176382a636107124822327bfab954dbb8affd43

                          SHA256

                          e6353766a1f8dc6e73d6c8f1619da96b80a54d59d4d8e71ba077c554a3c067e2

                          SHA512

                          f72dcc909ea553d28472c5e27ca781c3a3e4e4117d999d3505ffa6071de080307a7554887b521f63d47ad7a203638db740e4b7f15cc6a525ffb7692bb554112e

                        • C:\Windows\SysWOW64\Hnibokbd.exe

                          Filesize

                          346KB

                          MD5

                          229e9c5f2d6f33617163fa6c9a5b24c6

                          SHA1

                          9318a5ea98caed18476840e9011ab04f81beaadd

                          SHA256

                          f583cb69dbb343a9a5e691419f6b876f8096eed5c81189e3f647cb350c5699e1

                          SHA512

                          680d8deee6360e36a3714498caa583f79daed7588bc9c5477e5df841412c917d852aa5ef0fd952769bca0a43524141be1b21ce8d1b65410e98826d79c4ff83c5

                        • C:\Windows\SysWOW64\Hnnljj32.exe

                          Filesize

                          346KB

                          MD5

                          44dfa03aaccb8e76ad09f19023e4e6d4

                          SHA1

                          1405263c232ea4b0365dcfcbb9fe156d3c5e703a

                          SHA256

                          2752cd762b98d757299fc522fef5895f1632fd5777e0499823712b32747c5502

                          SHA512

                          138f69d00f89b8fd7300a0df5ac0a656cde2f27dffc10656c98c56c28c0a964647fd4ecdbc92b3fa39ce21a2b20cee009e29c0fb8d76eaea46da44dffce0b410

                        • C:\Windows\SysWOW64\Ilphdlqh.exe

                          Filesize

                          346KB

                          MD5

                          0cd7682645fa6c8da8fb603d504d7333

                          SHA1

                          e9e72ffe254717ace5aad56030d3f1e464d233c3

                          SHA256

                          1c8dc94a350ee1c13a0a04b04bed059809f72181ce4b7262dc9a7374bd37fc76

                          SHA512

                          bd82fb344143c30b51132750980e9582e32698d4501d91fc5727c30286fe8f526f75f0b262ec97614667483181f2ffdbf829372fdb6a585843cdbc844273bd4d

                        • C:\Windows\SysWOW64\Jihbip32.exe

                          Filesize

                          346KB

                          MD5

                          1d0ae7d7ada7430e35d81ae2687a672f

                          SHA1

                          6e92cb898dc4b609f263806ebe3ab29c40015667

                          SHA256

                          24f9cefb67b13d2c41f089f714b08e250f89ae445e9fdbb8c5bfc5ab36d45b74

                          SHA512

                          884cbbc3d58c87258dd8c4e48d4a5637fd83bbb625b746f74481e7f014639fa22b98c6e7286b954520de607a84cc01f3d0e5135700bfa088152b3a68ec8c7c04

                        • C:\Windows\SysWOW64\Joqafgni.exe

                          Filesize

                          346KB

                          MD5

                          e93909a98311cb5a12b2fa3acde71c88

                          SHA1

                          f81e794b70cb6965f38b4991c2fdee32be6a8256

                          SHA256

                          91d94eaf2f44a4462f105b8deb4db6eb41804ca6a05e8ca45f2ca243a7da3386

                          SHA512

                          b338192fb5de11c51596f747653cb6f99887481a88051ead9822c1b5c3e1ff46fb8c6e7f260c663436f7633e4d389b403dbf366a21ef40d7cd7d7bcdc1589182

                        • C:\Windows\SysWOW64\Nmjfodne.exe

                          Filesize

                          346KB

                          MD5

                          32c975637482ff69c010bec5c325eb20

                          SHA1

                          2ce9d4055bbb573263de60873fffb27a6e8c8939

                          SHA256

                          b51a8ca253915ce4a1e8a9ee83316363b5852f85d04c23f8b93025f2f3a73f5a

                          SHA512

                          d5fa60272318655510fb12b32759db352a7d7054ebadad7d710fbbbc790bd4f9c9cea4365af3277ca794a6f688ba69df6fb4e30447817411ab8c8e1475ed1721

                        • C:\Windows\SysWOW64\Nqaiecjd.exe

                          Filesize

                          346KB

                          MD5

                          e3a95b5d34f12ff09ab551066109681f

                          SHA1

                          23a29995202eda1129e39df1f999d5d593cdc4fc

                          SHA256

                          7b211a202adb666af5bfe64f4b5e7a1e1467697e58d774ae3b36f4e01dcca585

                          SHA512

                          292b5a0b9b38b10cc690cef33bd318756ab84ad48ccb8dcc4b4d25ef43816249875835df5a9fb96857bcf282615baf675876a100e005d8f7eb404e424c061e3f

                        • C:\Windows\SysWOW64\Obqanjdb.exe

                          Filesize

                          346KB

                          MD5

                          4b38e7cce7760c7b43552dc83597875d

                          SHA1

                          a8a81004f4348487f867eafdc7bc306bb3e244f7

                          SHA256

                          66f407919dab72ad481d101399a7e1d0d56547389ec21a0b8b8c1d821e575113

                          SHA512

                          595558f579af9600b7d4adec55f1b8494a1f7675885bc34205822864ebdb183abc85cc1cd5956f196188ee39ae5e7cd2eee42e3fd13b1f5bf09617f5696cae63

                        • C:\Windows\SysWOW64\Ocihgnam.exe

                          Filesize

                          346KB

                          MD5

                          bbcdee6239f41d8937e6b848d2d3c4ab

                          SHA1

                          53049d2246e180a573e5b79e8ff91ba799ef7688

                          SHA256

                          ab7d376be31a2c4814594c39c74362b057d4c94fc6a6d78c18e267f4a5d472b0

                          SHA512

                          6ef05b1fcf87278a1ccd0df01f08189a5a696a7e095ccdb443fc422a4907d1bbf6fbbe138e2242f2cebe0886f649be025fb55d8ce3114288efd3632aa7d19df9

                        • C:\Windows\SysWOW64\Pmmlla32.exe

                          Filesize

                          346KB

                          MD5

                          b55b269c733d740d9455dd11fe665f76

                          SHA1

                          b1da8f9f94e5fe9ff60fa8fc6a576c3e4ac901ba

                          SHA256

                          5dd7a86554897255cad0b4d0aa0fb03e84e350252b9749893680e8f9f91de75a

                          SHA512

                          8e95fa83e64a41ad35ae429ba98625eaa575f4c57cdda3b4e91fd287f13b92e9c2161203a552f87f3b6d16e1abd83b5f40b278e5e26ffbfc4a88ed7a8761fe65

                        • C:\Windows\SysWOW64\Qfmfefni.exe

                          Filesize

                          346KB

                          MD5

                          2273b6405c692e4f9453a1b8ffed1cc4

                          SHA1

                          7a068e39531063a90ad7c19d3f885a12fbfddb92

                          SHA256

                          4c5c9981ef4a5e2b694d66751d4c8ae2f21030a77a198037f4bcff0c320ec549

                          SHA512

                          8f9d43a8856c201fee147a851ee4ca7072742548e71757fdd3f6a9958dee2f519ca5a69db6cf0126811d56ba90c958258895d46c226669405924313e76bfdfc0

                        • memory/116-299-0x0000000000400000-0x000000000043C000-memory.dmp

                          Filesize

                          240KB

                        • memory/116-215-0x0000000000400000-0x000000000043C000-memory.dmp

                          Filesize

                          240KB

                        • memory/1056-277-0x0000000000400000-0x000000000043C000-memory.dmp

                          Filesize

                          240KB

                        • memory/1056-188-0x0000000000400000-0x000000000043C000-memory.dmp

                          Filesize

                          240KB

                        • memory/1204-409-0x0000000000400000-0x000000000043C000-memory.dmp

                          Filesize

                          240KB

                        • memory/1320-162-0x0000000000400000-0x000000000043C000-memory.dmp

                          Filesize

                          240KB

                        • memory/1320-250-0x0000000000400000-0x000000000043C000-memory.dmp

                          Filesize

                          240KB

                        • memory/1404-363-0x0000000000400000-0x000000000043C000-memory.dmp

                          Filesize

                          240KB

                        • memory/1408-144-0x0000000000400000-0x000000000043C000-memory.dmp

                          Filesize

                          240KB

                        • memory/1408-232-0x0000000000400000-0x000000000043C000-memory.dmp

                          Filesize

                          240KB

                        • memory/1428-391-0x0000000000400000-0x000000000043C000-memory.dmp

                          Filesize

                          240KB

                        • memory/1452-397-0x0000000000400000-0x000000000043C000-memory.dmp

                          Filesize

                          240KB

                        • memory/1452-328-0x0000000000400000-0x000000000043C000-memory.dmp

                          Filesize

                          240KB

                        • memory/1648-356-0x0000000000400000-0x000000000043C000-memory.dmp

                          Filesize

                          240KB

                        • memory/1796-98-0x0000000000400000-0x000000000043C000-memory.dmp

                          Filesize

                          240KB

                        • memory/1796-187-0x0000000000400000-0x000000000043C000-memory.dmp

                          Filesize

                          240KB

                        • memory/1864-376-0x0000000000400000-0x000000000043C000-memory.dmp

                          Filesize

                          240KB

                        • memory/1864-307-0x0000000000400000-0x000000000043C000-memory.dmp

                          Filesize

                          240KB

                        • memory/1924-15-0x0000000000400000-0x000000000043C000-memory.dmp

                          Filesize

                          240KB

                        • memory/1924-97-0x0000000000400000-0x000000000043C000-memory.dmp

                          Filesize

                          240KB

                        • memory/1956-377-0x0000000000400000-0x000000000043C000-memory.dmp

                          Filesize

                          240KB

                        • memory/1988-321-0x0000000000400000-0x000000000043C000-memory.dmp

                          Filesize

                          240KB

                        • memory/1988-390-0x0000000000400000-0x000000000043C000-memory.dmp

                          Filesize

                          240KB

                        • memory/2052-320-0x0000000000400000-0x000000000043C000-memory.dmp

                          Filesize

                          240KB

                        • memory/2052-242-0x0000000000400000-0x000000000043C000-memory.dmp

                          Filesize

                          240KB

                        • memory/2160-206-0x0000000000400000-0x000000000043C000-memory.dmp

                          Filesize

                          240KB

                        • memory/2160-292-0x0000000000400000-0x000000000043C000-memory.dmp

                          Filesize

                          240KB

                        • memory/2224-151-0x0000000000400000-0x000000000043C000-memory.dmp

                          Filesize

                          240KB

                        • memory/2224-65-0x0000000000400000-0x000000000043C000-memory.dmp

                          Filesize

                          240KB

                        • memory/2428-64-0x0000000000400000-0x000000000043C000-memory.dmp

                          Filesize

                          240KB

                        • memory/2428-0-0x0000000000400000-0x000000000043C000-memory.dmp

                          Filesize

                          240KB

                        • memory/2568-384-0x0000000000400000-0x000000000043C000-memory.dmp

                          Filesize

                          240KB

                        • memory/2588-348-0x0000000000400000-0x000000000043C000-memory.dmp

                          Filesize

                          240KB

                        • memory/2588-278-0x0000000000400000-0x000000000043C000-memory.dmp

                          Filesize

                          240KB

                        • memory/2640-251-0x0000000000400000-0x000000000043C000-memory.dmp

                          Filesize

                          240KB

                        • memory/2640-327-0x0000000000400000-0x000000000043C000-memory.dmp

                          Filesize

                          240KB

                        • memory/2960-270-0x0000000000400000-0x000000000043C000-memory.dmp

                          Filesize

                          240KB

                        • memory/2960-341-0x0000000000400000-0x000000000043C000-memory.dmp

                          Filesize

                          240KB

                        • memory/2984-342-0x0000000000400000-0x000000000043C000-memory.dmp

                          Filesize

                          240KB

                        • memory/2984-411-0x0000000000400000-0x000000000043C000-memory.dmp

                          Filesize

                          240KB

                        • memory/3084-225-0x0000000000400000-0x000000000043C000-memory.dmp

                          Filesize

                          240KB

                        • memory/3084-306-0x0000000000400000-0x000000000043C000-memory.dmp

                          Filesize

                          240KB

                        • memory/3236-370-0x0000000000400000-0x000000000043C000-memory.dmp

                          Filesize

                          240KB

                        • memory/3272-89-0x0000000000400000-0x000000000043C000-memory.dmp

                          Filesize

                          240KB

                        • memory/3272-178-0x0000000000400000-0x000000000043C000-memory.dmp

                          Filesize

                          240KB

                        • memory/3332-260-0x0000000000400000-0x000000000043C000-memory.dmp

                          Filesize

                          240KB

                        • memory/3332-334-0x0000000000400000-0x000000000043C000-memory.dmp

                          Filesize

                          240KB

                        • memory/3504-124-0x0000000000400000-0x000000000043C000-memory.dmp

                          Filesize

                          240KB

                        • memory/3504-44-0x0000000000400000-0x000000000043C000-memory.dmp

                          Filesize

                          240KB

                        • memory/3540-418-0x0000000000400000-0x000000000043C000-memory.dmp

                          Filesize

                          240KB

                        • memory/3540-349-0x0000000000400000-0x000000000043C000-memory.dmp

                          Filesize

                          240KB

                        • memory/3620-8-0x0000000000400000-0x000000000043C000-memory.dmp

                          Filesize

                          240KB

                        • memory/3620-88-0x0000000000400000-0x000000000043C000-memory.dmp

                          Filesize

                          240KB

                        • memory/3980-286-0x0000000000400000-0x000000000043C000-memory.dmp

                          Filesize

                          240KB

                        • memory/3980-355-0x0000000000400000-0x000000000043C000-memory.dmp

                          Filesize

                          240KB

                        • memory/4160-313-0x0000000000400000-0x000000000043C000-memory.dmp

                          Filesize

                          240KB

                        • memory/4160-233-0x0000000000400000-0x000000000043C000-memory.dmp

                          Filesize

                          240KB

                        • memory/4280-398-0x0000000000400000-0x000000000043C000-memory.dmp

                          Filesize

                          240KB

                        • memory/4444-362-0x0000000000400000-0x000000000043C000-memory.dmp

                          Filesize

                          240KB

                        • memory/4444-293-0x0000000000400000-0x000000000043C000-memory.dmp

                          Filesize

                          240KB

                        • memory/4508-259-0x0000000000400000-0x000000000043C000-memory.dmp

                          Filesize

                          240KB

                        • memory/4508-171-0x0000000000400000-0x000000000043C000-memory.dmp

                          Filesize

                          240KB

                        • memory/4696-115-0x0000000000400000-0x000000000043C000-memory.dmp

                          Filesize

                          240KB

                        • memory/4696-32-0x0000000000400000-0x000000000043C000-memory.dmp

                          Filesize

                          240KB

                        • memory/4848-412-0x0000000000400000-0x000000000043C000-memory.dmp

                          Filesize

                          240KB

                        • memory/5080-335-0x0000000000400000-0x000000000043C000-memory.dmp

                          Filesize

                          240KB

                        • memory/5080-408-0x0000000000400000-0x000000000043C000-memory.dmp

                          Filesize

                          240KB

                        • memory/5116-268-0x0000000000400000-0x000000000043C000-memory.dmp

                          Filesize

                          240KB

                        • memory/5116-180-0x0000000000400000-0x000000000043C000-memory.dmp

                          Filesize

                          240KB

                        • memory/5124-300-0x0000000000400000-0x000000000043C000-memory.dmp

                          Filesize

                          240KB

                        • memory/5124-369-0x0000000000400000-0x000000000043C000-memory.dmp

                          Filesize

                          240KB

                        • memory/5136-133-0x0000000000400000-0x000000000043C000-memory.dmp

                          Filesize

                          240KB

                        • memory/5136-47-0x0000000000400000-0x000000000043C000-memory.dmp

                          Filesize

                          240KB

                        • memory/5332-72-0x0000000000400000-0x000000000043C000-memory.dmp

                          Filesize

                          240KB

                        • memory/5332-160-0x0000000000400000-0x000000000043C000-memory.dmp

                          Filesize

                          240KB

                        • memory/5444-143-0x0000000000400000-0x000000000043C000-memory.dmp

                          Filesize

                          240KB

                        • memory/5444-56-0x0000000000400000-0x000000000043C000-memory.dmp

                          Filesize

                          240KB

                        • memory/5484-134-0x0000000000400000-0x000000000043C000-memory.dmp

                          Filesize

                          240KB

                        • memory/5484-224-0x0000000000400000-0x000000000043C000-memory.dmp

                          Filesize

                          240KB

                        • memory/5492-152-0x0000000000400000-0x000000000043C000-memory.dmp

                          Filesize

                          240KB

                        • memory/5492-241-0x0000000000400000-0x000000000043C000-memory.dmp

                          Filesize

                          240KB

                        • memory/5516-169-0x0000000000400000-0x000000000043C000-memory.dmp

                          Filesize

                          240KB

                        • memory/5516-80-0x0000000000400000-0x000000000043C000-memory.dmp

                          Filesize

                          240KB

                        • memory/5552-106-0x0000000000400000-0x000000000043C000-memory.dmp

                          Filesize

                          240KB

                        • memory/5552-23-0x0000000000400000-0x000000000043C000-memory.dmp

                          Filesize

                          240KB

                        • memory/5556-419-0x0000000000400000-0x000000000043C000-memory.dmp

                          Filesize

                          240KB

                        • memory/5920-196-0x0000000000400000-0x000000000043C000-memory.dmp

                          Filesize

                          240KB

                        • memory/5920-107-0x0000000000400000-0x000000000043C000-memory.dmp

                          Filesize

                          240KB

                        • memory/5940-116-0x0000000000400000-0x000000000043C000-memory.dmp

                          Filesize

                          240KB

                        • memory/5940-205-0x0000000000400000-0x000000000043C000-memory.dmp

                          Filesize

                          240KB

                        • memory/5992-126-0x0000000000400000-0x000000000043C000-memory.dmp

                          Filesize

                          240KB

                        • memory/5992-214-0x0000000000400000-0x000000000043C000-memory.dmp

                          Filesize

                          240KB

                        • memory/6064-197-0x0000000000400000-0x000000000043C000-memory.dmp

                          Filesize

                          240KB

                        • memory/6064-285-0x0000000000400000-0x000000000043C000-memory.dmp

                          Filesize

                          240KB

                        • memory/6140-383-0x0000000000400000-0x000000000043C000-memory.dmp

                          Filesize

                          240KB

                        • memory/6140-314-0x0000000000400000-0x000000000043C000-memory.dmp

                          Filesize

                          240KB