Analysis

  • max time kernel
    147s
  • max time network
    155s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240508-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system
  • submitted
    06/07/2024, 01:11

General

  • Target

    a5ba26efde466fc77fafa5bff7badf33fd7db4b6c6380f6e25481085a55c4edf.exe

  • Size

    219KB

  • MD5

    a69174dce3f4614574dd90120d5c2c43

  • SHA1

    82dd7f2cfb1895ceba7f047ad410fc3d2b190d95

  • SHA256

    a5ba26efde466fc77fafa5bff7badf33fd7db4b6c6380f6e25481085a55c4edf

  • SHA512

    9c5362ceba5aafcec0001f79c09b96bdabd5df892e49c93978fd81ed3dbac5bfc68a52262b1f1a9567753b1b8915c8149b2dc33fad55556a920f4f96f0a76507

  • SSDEEP

    3072:tduVj4XkwWkOTBPzwuZkO0aDb/IBPCOQvU6z314EXrjvwSfYrwBt:tb5WkWJzDOO0aDD4PCxdXXwSfYrwB

Score
10/10

Malware Config

Signatures

  • Adds autorun key to be loaded by Explorer.exe on startup 2 TTPs 64 IoCs
  • Executes dropped EXE 64 IoCs
  • Drops file in System32 directory 64 IoCs
  • Program crash 1 IoCs
  • Modifies registry class 64 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\a5ba26efde466fc77fafa5bff7badf33fd7db4b6c6380f6e25481085a55c4edf.exe
    "C:\Users\Admin\AppData\Local\Temp\a5ba26efde466fc77fafa5bff7badf33fd7db4b6c6380f6e25481085a55c4edf.exe"
    1⤵
    • Adds autorun key to be loaded by Explorer.exe on startup
    • Drops file in System32 directory
    • Modifies registry class
    • Suspicious use of WriteProcessMemory
    PID:4920
    • C:\Windows\SysWOW64\Kbfiep32.exe
      C:\Windows\system32\Kbfiep32.exe
      2⤵
      • Executes dropped EXE
      • Modifies registry class
      • Suspicious use of WriteProcessMemory
      PID:4996
      • C:\Windows\SysWOW64\Kagichjo.exe
        C:\Windows\system32\Kagichjo.exe
        3⤵
        • Adds autorun key to be loaded by Explorer.exe on startup
        • Executes dropped EXE
        • Drops file in System32 directory
        • Suspicious use of WriteProcessMemory
        PID:4504
        • C:\Windows\SysWOW64\Kdffocib.exe
          C:\Windows\system32\Kdffocib.exe
          4⤵
          • Adds autorun key to be loaded by Explorer.exe on startup
          • Executes dropped EXE
          • Drops file in System32 directory
          • Modifies registry class
          • Suspicious use of WriteProcessMemory
          PID:3560
          • C:\Windows\SysWOW64\Kgdbkohf.exe
            C:\Windows\system32\Kgdbkohf.exe
            5⤵
            • Adds autorun key to be loaded by Explorer.exe on startup
            • Executes dropped EXE
            • Drops file in System32 directory
            • Modifies registry class
            • Suspicious use of WriteProcessMemory
            PID:4912
            • C:\Windows\SysWOW64\Kibnhjgj.exe
              C:\Windows\system32\Kibnhjgj.exe
              6⤵
              • Executes dropped EXE
              • Drops file in System32 directory
              • Modifies registry class
              • Suspicious use of WriteProcessMemory
              PID:3960
              • C:\Windows\SysWOW64\Kmnjhioc.exe
                C:\Windows\system32\Kmnjhioc.exe
                7⤵
                • Adds autorun key to be loaded by Explorer.exe on startup
                • Executes dropped EXE
                • Drops file in System32 directory
                • Suspicious use of WriteProcessMemory
                PID:976
                • C:\Windows\SysWOW64\Kpmfddnf.exe
                  C:\Windows\system32\Kpmfddnf.exe
                  8⤵
                  • Executes dropped EXE
                  • Drops file in System32 directory
                  • Modifies registry class
                  • Suspicious use of WriteProcessMemory
                  PID:3920
                  • C:\Windows\SysWOW64\Kdhbec32.exe
                    C:\Windows\system32\Kdhbec32.exe
                    9⤵
                    • Adds autorun key to be loaded by Explorer.exe on startup
                    • Executes dropped EXE
                    • Modifies registry class
                    • Suspicious use of WriteProcessMemory
                    PID:3580
                    • C:\Windows\SysWOW64\Kckbqpnj.exe
                      C:\Windows\system32\Kckbqpnj.exe
                      10⤵
                      • Adds autorun key to be loaded by Explorer.exe on startup
                      • Executes dropped EXE
                      • Drops file in System32 directory
                      • Modifies registry class
                      • Suspicious use of WriteProcessMemory
                      PID:2064
                      • C:\Windows\SysWOW64\Kkbkamnl.exe
                        C:\Windows\system32\Kkbkamnl.exe
                        11⤵
                        • Executes dropped EXE
                        • Drops file in System32 directory
                        • Modifies registry class
                        • Suspicious use of WriteProcessMemory
                        PID:3440
                        • C:\Windows\SysWOW64\Lmqgnhmp.exe
                          C:\Windows\system32\Lmqgnhmp.exe
                          12⤵
                          • Adds autorun key to be loaded by Explorer.exe on startup
                          • Executes dropped EXE
                          • Drops file in System32 directory
                          • Modifies registry class
                          • Suspicious use of WriteProcessMemory
                          PID:4800
                          • C:\Windows\SysWOW64\Lalcng32.exe
                            C:\Windows\system32\Lalcng32.exe
                            13⤵
                            • Executes dropped EXE
                            • Modifies registry class
                            • Suspicious use of WriteProcessMemory
                            PID:2116
                            • C:\Windows\SysWOW64\Ldkojb32.exe
                              C:\Windows\system32\Ldkojb32.exe
                              14⤵
                              • Executes dropped EXE
                              • Drops file in System32 directory
                              • Modifies registry class
                              • Suspicious use of WriteProcessMemory
                              PID:4844
                              • C:\Windows\SysWOW64\Lmccchkn.exe
                                C:\Windows\system32\Lmccchkn.exe
                                15⤵
                                • Adds autorun key to be loaded by Explorer.exe on startup
                                • Executes dropped EXE
                                • Suspicious use of WriteProcessMemory
                                PID:1892
                                • C:\Windows\SysWOW64\Lpappc32.exe
                                  C:\Windows\system32\Lpappc32.exe
                                  16⤵
                                  • Adds autorun key to be loaded by Explorer.exe on startup
                                  • Executes dropped EXE
                                  • Drops file in System32 directory
                                  • Suspicious use of WriteProcessMemory
                                  PID:2288
                                  • C:\Windows\SysWOW64\Lcpllo32.exe
                                    C:\Windows\system32\Lcpllo32.exe
                                    17⤵
                                    • Adds autorun key to be loaded by Explorer.exe on startup
                                    • Executes dropped EXE
                                    • Drops file in System32 directory
                                    • Modifies registry class
                                    • Suspicious use of WriteProcessMemory
                                    PID:3152
                                    • C:\Windows\SysWOW64\Lnepih32.exe
                                      C:\Windows\system32\Lnepih32.exe
                                      18⤵
                                      • Adds autorun key to be loaded by Explorer.exe on startup
                                      • Executes dropped EXE
                                      • Modifies registry class
                                      • Suspicious use of WriteProcessMemory
                                      PID:1080
                                      • C:\Windows\SysWOW64\Ldohebqh.exe
                                        C:\Windows\system32\Ldohebqh.exe
                                        19⤵
                                        • Executes dropped EXE
                                        • Drops file in System32 directory
                                        • Modifies registry class
                                        • Suspicious use of WriteProcessMemory
                                        PID:2440
                                        • C:\Windows\SysWOW64\Lcbiao32.exe
                                          C:\Windows\system32\Lcbiao32.exe
                                          20⤵
                                          • Executes dropped EXE
                                          • Drops file in System32 directory
                                          • Modifies registry class
                                          • Suspicious use of WriteProcessMemory
                                          PID:2844
                                          • C:\Windows\SysWOW64\Lilanioo.exe
                                            C:\Windows\system32\Lilanioo.exe
                                            21⤵
                                            • Executes dropped EXE
                                            • Suspicious use of WriteProcessMemory
                                            PID:2768
                                            • C:\Windows\SysWOW64\Laciofpa.exe
                                              C:\Windows\system32\Laciofpa.exe
                                              22⤵
                                              • Adds autorun key to be loaded by Explorer.exe on startup
                                              • Executes dropped EXE
                                              • Modifies registry class
                                              • Suspicious use of WriteProcessMemory
                                              PID:3444
                                              • C:\Windows\SysWOW64\Ldaeka32.exe
                                                C:\Windows\system32\Ldaeka32.exe
                                                23⤵
                                                • Executes dropped EXE
                                                • Drops file in System32 directory
                                                PID:1816
                                                • C:\Windows\SysWOW64\Lgpagm32.exe
                                                  C:\Windows\system32\Lgpagm32.exe
                                                  24⤵
                                                  • Adds autorun key to be loaded by Explorer.exe on startup
                                                  • Executes dropped EXE
                                                  • Drops file in System32 directory
                                                  PID:3916
                                                  • C:\Windows\SysWOW64\Lnjjdgee.exe
                                                    C:\Windows\system32\Lnjjdgee.exe
                                                    25⤵
                                                    • Adds autorun key to be loaded by Explorer.exe on startup
                                                    • Executes dropped EXE
                                                    • Modifies registry class
                                                    PID:948
                                                    • C:\Windows\SysWOW64\Lddbqa32.exe
                                                      C:\Windows\system32\Lddbqa32.exe
                                                      26⤵
                                                      • Executes dropped EXE
                                                      • Drops file in System32 directory
                                                      • Modifies registry class
                                                      PID:408
                                                      • C:\Windows\SysWOW64\Lknjmkdo.exe
                                                        C:\Windows\system32\Lknjmkdo.exe
                                                        27⤵
                                                        • Adds autorun key to be loaded by Explorer.exe on startup
                                                        • Executes dropped EXE
                                                        • Drops file in System32 directory
                                                        • Modifies registry class
                                                        PID:1236
                                                        • C:\Windows\SysWOW64\Mnlfigcc.exe
                                                          C:\Windows\system32\Mnlfigcc.exe
                                                          28⤵
                                                          • Adds autorun key to be loaded by Explorer.exe on startup
                                                          • Executes dropped EXE
                                                          PID:4440
                                                          • C:\Windows\SysWOW64\Mdfofakp.exe
                                                            C:\Windows\system32\Mdfofakp.exe
                                                            29⤵
                                                            • Executes dropped EXE
                                                            PID:2732
                                                            • C:\Windows\SysWOW64\Mciobn32.exe
                                                              C:\Windows\system32\Mciobn32.exe
                                                              30⤵
                                                              • Adds autorun key to be loaded by Explorer.exe on startup
                                                              • Executes dropped EXE
                                                              PID:336
                                                              • C:\Windows\SysWOW64\Mjcgohig.exe
                                                                C:\Windows\system32\Mjcgohig.exe
                                                                31⤵
                                                                • Executes dropped EXE
                                                                • Modifies registry class
                                                                PID:3244
                                                                • C:\Windows\SysWOW64\Mnocof32.exe
                                                                  C:\Windows\system32\Mnocof32.exe
                                                                  32⤵
                                                                  • Executes dropped EXE
                                                                  PID:2456
                                                                  • C:\Windows\SysWOW64\Mdiklqhm.exe
                                                                    C:\Windows\system32\Mdiklqhm.exe
                                                                    33⤵
                                                                    • Adds autorun key to be loaded by Explorer.exe on startup
                                                                    • Executes dropped EXE
                                                                    • Drops file in System32 directory
                                                                    • Modifies registry class
                                                                    PID:4876
                                                                    • C:\Windows\SysWOW64\Mkbchk32.exe
                                                                      C:\Windows\system32\Mkbchk32.exe
                                                                      34⤵
                                                                      • Adds autorun key to be loaded by Explorer.exe on startup
                                                                      • Executes dropped EXE
                                                                      PID:972
                                                                      • C:\Windows\SysWOW64\Mnapdf32.exe
                                                                        C:\Windows\system32\Mnapdf32.exe
                                                                        35⤵
                                                                        • Executes dropped EXE
                                                                        • Drops file in System32 directory
                                                                        • Modifies registry class
                                                                        PID:2036
                                                                        • C:\Windows\SysWOW64\Mpolqa32.exe
                                                                          C:\Windows\system32\Mpolqa32.exe
                                                                          36⤵
                                                                          • Adds autorun key to be loaded by Explorer.exe on startup
                                                                          • Executes dropped EXE
                                                                          • Drops file in System32 directory
                                                                          PID:1696
                                                                          • C:\Windows\SysWOW64\Mdkhapfj.exe
                                                                            C:\Windows\system32\Mdkhapfj.exe
                                                                            37⤵
                                                                            • Adds autorun key to be loaded by Explorer.exe on startup
                                                                            • Executes dropped EXE
                                                                            • Drops file in System32 directory
                                                                            • Modifies registry class
                                                                            PID:624
                                                                            • C:\Windows\SysWOW64\Mgidml32.exe
                                                                              C:\Windows\system32\Mgidml32.exe
                                                                              38⤵
                                                                              • Adds autorun key to be loaded by Explorer.exe on startup
                                                                              • Executes dropped EXE
                                                                              • Modifies registry class
                                                                              PID:4804
                                                                              • C:\Windows\SysWOW64\Mjhqjg32.exe
                                                                                C:\Windows\system32\Mjhqjg32.exe
                                                                                39⤵
                                                                                • Adds autorun key to be loaded by Explorer.exe on startup
                                                                                • Executes dropped EXE
                                                                                • Drops file in System32 directory
                                                                                PID:3632
                                                                                • C:\Windows\SysWOW64\Mncmjfmk.exe
                                                                                  C:\Windows\system32\Mncmjfmk.exe
                                                                                  40⤵
                                                                                  • Adds autorun key to be loaded by Explorer.exe on startup
                                                                                  • Executes dropped EXE
                                                                                  • Drops file in System32 directory
                                                                                  • Modifies registry class
                                                                                  PID:4368
                                                                                  • C:\Windows\SysWOW64\Mpaifalo.exe
                                                                                    C:\Windows\system32\Mpaifalo.exe
                                                                                    41⤵
                                                                                    • Executes dropped EXE
                                                                                    • Drops file in System32 directory
                                                                                    • Modifies registry class
                                                                                    PID:4740
                                                                                    • C:\Windows\SysWOW64\Mcpebmkb.exe
                                                                                      C:\Windows\system32\Mcpebmkb.exe
                                                                                      42⤵
                                                                                      • Adds autorun key to be loaded by Explorer.exe on startup
                                                                                      • Executes dropped EXE
                                                                                      • Modifies registry class
                                                                                      PID:1536
                                                                                      • C:\Windows\SysWOW64\Mglack32.exe
                                                                                        C:\Windows\system32\Mglack32.exe
                                                                                        43⤵
                                                                                        • Adds autorun key to be loaded by Explorer.exe on startup
                                                                                        • Executes dropped EXE
                                                                                        PID:4292
                                                                                        • C:\Windows\SysWOW64\Mkgmcjld.exe
                                                                                          C:\Windows\system32\Mkgmcjld.exe
                                                                                          44⤵
                                                                                          • Adds autorun key to be loaded by Explorer.exe on startup
                                                                                          • Executes dropped EXE
                                                                                          • Drops file in System32 directory
                                                                                          • Modifies registry class
                                                                                          PID:4296
                                                                                          • C:\Windows\SysWOW64\Mnfipekh.exe
                                                                                            C:\Windows\system32\Mnfipekh.exe
                                                                                            45⤵
                                                                                            • Executes dropped EXE
                                                                                            • Drops file in System32 directory
                                                                                            • Modifies registry class
                                                                                            PID:3852
                                                                                            • C:\Windows\SysWOW64\Maaepd32.exe
                                                                                              C:\Windows\system32\Maaepd32.exe
                                                                                              46⤵
                                                                                              • Adds autorun key to be loaded by Explorer.exe on startup
                                                                                              • Executes dropped EXE
                                                                                              • Modifies registry class
                                                                                              PID:3596
                                                                                              • C:\Windows\SysWOW64\Mdpalp32.exe
                                                                                                C:\Windows\system32\Mdpalp32.exe
                                                                                                47⤵
                                                                                                • Adds autorun key to be loaded by Explorer.exe on startup
                                                                                                • Executes dropped EXE
                                                                                                • Drops file in System32 directory
                                                                                                • Modifies registry class
                                                                                                PID:3248
                                                                                                • C:\Windows\SysWOW64\Mgnnhk32.exe
                                                                                                  C:\Windows\system32\Mgnnhk32.exe
                                                                                                  48⤵
                                                                                                  • Adds autorun key to be loaded by Explorer.exe on startup
                                                                                                  • Executes dropped EXE
                                                                                                  • Drops file in System32 directory
                                                                                                  • Modifies registry class
                                                                                                  PID:208
                                                                                                  • C:\Windows\SysWOW64\Nkjjij32.exe
                                                                                                    C:\Windows\system32\Nkjjij32.exe
                                                                                                    49⤵
                                                                                                    • Executes dropped EXE
                                                                                                    • Drops file in System32 directory
                                                                                                    PID:656
                                                                                                    • C:\Windows\SysWOW64\Nnhfee32.exe
                                                                                                      C:\Windows\system32\Nnhfee32.exe
                                                                                                      50⤵
                                                                                                      • Adds autorun key to be loaded by Explorer.exe on startup
                                                                                                      • Executes dropped EXE
                                                                                                      • Drops file in System32 directory
                                                                                                      PID:1964
                                                                                                      • C:\Windows\SysWOW64\Nqfbaq32.exe
                                                                                                        C:\Windows\system32\Nqfbaq32.exe
                                                                                                        51⤵
                                                                                                        • Adds autorun key to be loaded by Explorer.exe on startup
                                                                                                        • Executes dropped EXE
                                                                                                        • Drops file in System32 directory
                                                                                                        • Modifies registry class
                                                                                                        PID:2012
                                                                                                        • C:\Windows\SysWOW64\Ndbnboqb.exe
                                                                                                          C:\Windows\system32\Ndbnboqb.exe
                                                                                                          52⤵
                                                                                                          • Adds autorun key to be loaded by Explorer.exe on startup
                                                                                                          • Executes dropped EXE
                                                                                                          • Modifies registry class
                                                                                                          PID:3384
                                                                                                          • C:\Windows\SysWOW64\Ngpjnkpf.exe
                                                                                                            C:\Windows\system32\Ngpjnkpf.exe
                                                                                                            53⤵
                                                                                                            • Adds autorun key to be loaded by Explorer.exe on startup
                                                                                                            • Executes dropped EXE
                                                                                                            • Drops file in System32 directory
                                                                                                            • Modifies registry class
                                                                                                            PID:2552
                                                                                                            • C:\Windows\SysWOW64\Nklfoi32.exe
                                                                                                              C:\Windows\system32\Nklfoi32.exe
                                                                                                              54⤵
                                                                                                              • Adds autorun key to be loaded by Explorer.exe on startup
                                                                                                              • Executes dropped EXE
                                                                                                              • Drops file in System32 directory
                                                                                                              PID:2484
                                                                                                              • C:\Windows\SysWOW64\Nnjbke32.exe
                                                                                                                C:\Windows\system32\Nnjbke32.exe
                                                                                                                55⤵
                                                                                                                • Executes dropped EXE
                                                                                                                PID:3772
                                                                                                                • C:\Windows\SysWOW64\Nafokcol.exe
                                                                                                                  C:\Windows\system32\Nafokcol.exe
                                                                                                                  56⤵
                                                                                                                  • Adds autorun key to be loaded by Explorer.exe on startup
                                                                                                                  • Executes dropped EXE
                                                                                                                  • Drops file in System32 directory
                                                                                                                  PID:3412
                                                                                                                  • C:\Windows\SysWOW64\Nddkgonp.exe
                                                                                                                    C:\Windows\system32\Nddkgonp.exe
                                                                                                                    57⤵
                                                                                                                    • Executes dropped EXE
                                                                                                                    PID:1228
                                                                                                                    • C:\Windows\SysWOW64\Ncgkcl32.exe
                                                                                                                      C:\Windows\system32\Ncgkcl32.exe
                                                                                                                      58⤵
                                                                                                                      • Adds autorun key to be loaded by Explorer.exe on startup
                                                                                                                      • Executes dropped EXE
                                                                                                                      PID:3780
                                                                                                                      • C:\Windows\SysWOW64\Nkncdifl.exe
                                                                                                                        C:\Windows\system32\Nkncdifl.exe
                                                                                                                        59⤵
                                                                                                                        • Adds autorun key to be loaded by Explorer.exe on startup
                                                                                                                        • Executes dropped EXE
                                                                                                                        • Drops file in System32 directory
                                                                                                                        • Modifies registry class
                                                                                                                        PID:4612
                                                                                                                        • C:\Windows\SysWOW64\Nnmopdep.exe
                                                                                                                          C:\Windows\system32\Nnmopdep.exe
                                                                                                                          60⤵
                                                                                                                          • Adds autorun key to be loaded by Explorer.exe on startup
                                                                                                                          • Executes dropped EXE
                                                                                                                          • Drops file in System32 directory
                                                                                                                          • Modifies registry class
                                                                                                                          PID:2196
                                                                                                                          • C:\Windows\SysWOW64\Nbhkac32.exe
                                                                                                                            C:\Windows\system32\Nbhkac32.exe
                                                                                                                            61⤵
                                                                                                                            • Adds autorun key to be loaded by Explorer.exe on startup
                                                                                                                            • Executes dropped EXE
                                                                                                                            • Drops file in System32 directory
                                                                                                                            • Modifies registry class
                                                                                                                            PID:1912
                                                                                                                            • C:\Windows\SysWOW64\Nqklmpdd.exe
                                                                                                                              C:\Windows\system32\Nqklmpdd.exe
                                                                                                                              62⤵
                                                                                                                              • Adds autorun key to be loaded by Explorer.exe on startup
                                                                                                                              • Executes dropped EXE
                                                                                                                              • Modifies registry class
                                                                                                                              PID:3144
                                                                                                                              • C:\Windows\SysWOW64\Ncihikcg.exe
                                                                                                                                C:\Windows\system32\Ncihikcg.exe
                                                                                                                                63⤵
                                                                                                                                • Adds autorun key to be loaded by Explorer.exe on startup
                                                                                                                                • Executes dropped EXE
                                                                                                                                • Modifies registry class
                                                                                                                                PID:2444
                                                                                                                                • C:\Windows\SysWOW64\Nkqpjidj.exe
                                                                                                                                  C:\Windows\system32\Nkqpjidj.exe
                                                                                                                                  64⤵
                                                                                                                                  • Adds autorun key to be loaded by Explorer.exe on startup
                                                                                                                                  • Executes dropped EXE
                                                                                                                                  • Modifies registry class
                                                                                                                                  PID:1380
                                                                                                                                  • C:\Windows\SysWOW64\Njcpee32.exe
                                                                                                                                    C:\Windows\system32\Njcpee32.exe
                                                                                                                                    65⤵
                                                                                                                                    • Adds autorun key to be loaded by Explorer.exe on startup
                                                                                                                                    • Executes dropped EXE
                                                                                                                                    PID:2312
                                                                                                                                    • C:\Windows\SysWOW64\Nnolfdcn.exe
                                                                                                                                      C:\Windows\system32\Nnolfdcn.exe
                                                                                                                                      66⤵
                                                                                                                                      • Adds autorun key to be loaded by Explorer.exe on startup
                                                                                                                                      • Drops file in System32 directory
                                                                                                                                      • Modifies registry class
                                                                                                                                      PID:1444
                                                                                                                                      • C:\Windows\SysWOW64\Nbkhfc32.exe
                                                                                                                                        C:\Windows\system32\Nbkhfc32.exe
                                                                                                                                        67⤵
                                                                                                                                        • Drops file in System32 directory
                                                                                                                                        • Modifies registry class
                                                                                                                                        PID:4704
                                                                                                                                        • C:\Windows\SysWOW64\Ndidbn32.exe
                                                                                                                                          C:\Windows\system32\Ndidbn32.exe
                                                                                                                                          68⤵
                                                                                                                                          • Adds autorun key to be loaded by Explorer.exe on startup
                                                                                                                                          • Modifies registry class
                                                                                                                                          PID:4332
                                                                                                                                          • C:\Windows\SysWOW64\Ncldnkae.exe
                                                                                                                                            C:\Windows\system32\Ncldnkae.exe
                                                                                                                                            69⤵
                                                                                                                                            • Adds autorun key to be loaded by Explorer.exe on startup
                                                                                                                                            • Drops file in System32 directory
                                                                                                                                            PID:4452
                                                                                                                                            • C:\Windows\SysWOW64\Nkcmohbg.exe
                                                                                                                                              C:\Windows\system32\Nkcmohbg.exe
                                                                                                                                              70⤵
                                                                                                                                                PID:1996
                                                                                                                                                • C:\Windows\SysWOW64\WerFault.exe
                                                                                                                                                  C:\Windows\SysWOW64\WerFault.exe -u -p 1996 -s 408
                                                                                                                                                  71⤵
                                                                                                                                                  • Program crash
                                                                                                                                                  PID:1756
    • C:\Windows\SysWOW64\WerFault.exe
      C:\Windows\SysWOW64\WerFault.exe -pss -s 428 -p 1996 -ip 1996
      1⤵
        PID:1048

      Network

      MITRE ATT&CK Enterprise v15

      Replay Monitor

      Loading Replay Monitor...

      Downloads

      • C:\Windows\SysWOW64\Kagichjo.exe

        Filesize

        219KB

        MD5

        c49c4e164f102946b51d42e8eb7bccd7

        SHA1

        bbe2b48de0e4df9f2d79fcf9348eca2a69f7f837

        SHA256

        6282b0a47ddb3ef9d2e06a900dd7b4104f097b11f95a04cbafd6c6ca600b6517

        SHA512

        c6aead463d1686e9e6d6e8d417614e08919e42c06b55cb31a7d0b48c661783fda7072c1337652d1a363a370052e3b169d8c47b6c34ac588d35b234acfbc271fb

      • C:\Windows\SysWOW64\Kbfiep32.exe

        Filesize

        219KB

        MD5

        d2c2a95dcbcef6a43dff4e6ac3fc617c

        SHA1

        b5df9c0a224840d16613608ee182d297a4e37c05

        SHA256

        5762a28dfd43acc0f7db62de889bf537ad6556b35db64416abf7d121eaa0fc75

        SHA512

        983ef59e330c0aef9e25457e729fc78c3c17892d85100c3518d6282941fd299dd5b8c132b4d7ca13ec9721e2730e34bfb6e532fb1ea74d7a0ff83e73c9eb2021

      • C:\Windows\SysWOW64\Kckbqpnj.exe

        Filesize

        219KB

        MD5

        4d2399528f89ed05b6bdfdc87f0c7de3

        SHA1

        ba46692be9a2c130c3e60d0a93e5f06f2b035da3

        SHA256

        012eb372bfb09dc620054d41769b756a392752bda93b7749b175cd20e868f705

        SHA512

        f46280c06cc0a5e994bc65751573d7dbcaab2e704857e46d6b2bd979ab7cddd3e7bf25a56e17b75748d95e639d872bb62705b6ef312665a87f206a755d116ea5

      • C:\Windows\SysWOW64\Kdffocib.exe

        Filesize

        219KB

        MD5

        75ca33ea1470e9b5d36b25daad6bcb05

        SHA1

        367aaca3c2c0340420625f6e20d33be4e8657739

        SHA256

        57000c2fcb01d18345c725d9a9c55870195c4a01684dd47af00755eee085c308

        SHA512

        430645ce50b2f1a3dd91deade18a9f2083c1bc23bcf7eca4027bc869a1b9d94b000609f4783a8704da0312332fabbeb94205c7b7779a83a1a203e45af9033225

      • C:\Windows\SysWOW64\Kdhbec32.exe

        Filesize

        219KB

        MD5

        3aad7a12e3ba2214f4c7de2689b5c7b6

        SHA1

        96360a2eb6fdd3df8bebff6489e2c564c3b21591

        SHA256

        b55e3342f06959b32169f6652633059e4d8112c4737619f1241f430d574ab4cc

        SHA512

        795df63ed583f56550c7bb80f4905f84952918634b465be5b650494214e5a07b6e8f4510b397f3fe54187570efe77055a3e00c53022112478294d8f52b2a35c6

      • C:\Windows\SysWOW64\Kgdbkohf.exe

        Filesize

        219KB

        MD5

        bcb1862dbef67bed1a8ebaf70a99c981

        SHA1

        0c728b6fb9bc1d84e89b44cf65af50606e203042

        SHA256

        b6a1f5a0f5108118a74d8202890f23e062974fbecab6e46ee2623e59c004326a

        SHA512

        229fa3b30a1a13e30e71ff43e5e62193dbc13c9303ca34eb821376d74a3e684ec0dee3eb18b7e9af051ab593a8459744c23886ee292562acf3e131c2891e3e9a

      • C:\Windows\SysWOW64\Kibnhjgj.exe

        Filesize

        219KB

        MD5

        cabc578864ff0a5aaee4a4461b65b38c

        SHA1

        264cbe106744d9550f3f50f9cbd842a74db9437a

        SHA256

        a84db87c37d4a805e96c08c3ccb3de7a6643efde4ca060d70ec4908fc87584a4

        SHA512

        37895260c2caa32fee1bb21299cc719fc6a40077d650886901f6dd9b1ae46d2963756c0f7b472e6da83213d87fc30fe501153549e50d05bb95635b0f459a4165

      • C:\Windows\SysWOW64\Kkbkamnl.exe

        Filesize

        219KB

        MD5

        acaa19913d2f90dc79c484372034105d

        SHA1

        b1b3def99699dbdca7f949712ae7a26d68b82ea2

        SHA256

        5e6064283cd9335b9f1ea0267b8a410ef5ef1fd01c980d8989f3cf6c62bf3d45

        SHA512

        088885f831e18603d1255e076b4c1d79e4b604a090c020629977bc346a20d9c81d24fa1cef4a38222e790420e46df325c8cc685660500de57018a7df85cb073c

      • C:\Windows\SysWOW64\Kmnjhioc.exe

        Filesize

        219KB

        MD5

        a1d1a15c15b9b59251494d57b9a2fb6b

        SHA1

        9b94a8a7c5f7a220e01189e7564655fb699f025d

        SHA256

        0da097082c42957e3688989cf55894e91aab5baff8626e436146a3bc99587ad4

        SHA512

        b3d6c956e46e38b4174a8ce279d5e5e2cc28fd53789b673dbb9d918f6800186261c6059502220d906a42f16507bc8e3c783e5e6345fb53d265286603449587fa

      • C:\Windows\SysWOW64\Kpmfddnf.exe

        Filesize

        219KB

        MD5

        c6b2ea643f92a91d54fbe0638afdda22

        SHA1

        61f33599aa1246bb0b6e5cac53a695046db6130b

        SHA256

        d2a3a8ba1b727a3d3650cd7c24622f965f4d51b17a0b19ab994ce290a3f167e3

        SHA512

        3ef4430f38eb699160f6b22dcc42c2d231322f765933fb43f3d60f9ce0ba2c7737fe2ab22c1cea28714018deb466117709da658b80bf7af4ac8f90e2e22e4f68

      • C:\Windows\SysWOW64\Laciofpa.exe

        Filesize

        219KB

        MD5

        9e7805526b41dac58e43e3177cb39f51

        SHA1

        fc1603b48e2f03ab18c43b97b9260e411593479a

        SHA256

        281ad239cdcf5fca8d15c24da7fcfedc42e3188e7aa6e28f6cdd0e8237ffb6e4

        SHA512

        0fa002f2f8fcd2b784f5b82aabfcc2f0d8c460c0165cfb7476b6945690d6de724378e0c89f48e7fa7e565428006df9a99e18a008d57aadfe87821f294fe05168

      • C:\Windows\SysWOW64\Lalcng32.exe

        Filesize

        219KB

        MD5

        18d5e8be37df94d69535d61df1c592ff

        SHA1

        ef41cdc4c6fb0fea089ebdceb97798c902222af4

        SHA256

        24abcef846dfc7e7bc0f0ad015d4db417a29205d81123fe7685885325c4f350f

        SHA512

        06667bb936fe3abb31611d6e0ee00d706a2ff68c5964686a468b5ac90ca724f9f09e03aa5b15e864496c86c1b482b36a5ed055b28072c39ca1de013e7e417d51

      • C:\Windows\SysWOW64\Lcbiao32.exe

        Filesize

        219KB

        MD5

        f161cbdd3b006621848bb743f5061843

        SHA1

        7290ea2962d34fa10ae80159bf2873ea84034f80

        SHA256

        3aea516706e43ac4abc463c27ab1a7eac0ee483a34c83a0ec8da9733d03d6b3d

        SHA512

        e0768cbc7e63610ab84b52313840bd4167649a457e6bd8d2955b551ce2e503e7d8044953fac65f266feb3b4649aa78d6bc2219ca9d0640f464cae0a4e797c832

      • C:\Windows\SysWOW64\Lcpllo32.exe

        Filesize

        219KB

        MD5

        ce59491e7c551fd648c2d56f0ef463f9

        SHA1

        7a1758c3ccf8562dfa166a277eaadb40b231374f

        SHA256

        a3430d586e882e99118b5880c5bf088a8a9598505c59db631dead954ab25cc66

        SHA512

        d5f9fee5ef0b5d8ceda911b8cb7b9a44bab9ef10cdb9781420af48556ff6dd23dda26b3cb9de0d6638f15ea1db1c68c6ba7329012b5449afef07a652009ffb01

      • C:\Windows\SysWOW64\Ldaeka32.exe

        Filesize

        219KB

        MD5

        ace796919979c9224f3cd551c7f7380f

        SHA1

        b72b8c39b444fbe901b2080a91bf3472af6902b4

        SHA256

        05a4b41744d1798379ca40b6e28b9b9766ffe77aa0159f48fe8d2fe7a20e0059

        SHA512

        026c967b286a6fc3186b081a5e5ce66b0e6e872f34fc267deacb4d85507de790c2a2676142ee66f878fbbaea4a74d310283ab014eb455c7bde6ab2ca119695e6

      • C:\Windows\SysWOW64\Lddbqa32.exe

        Filesize

        219KB

        MD5

        fc543b63ab1c64925382c943f7340f90

        SHA1

        3204908b16e294474c1ce75901a08b07e52946aa

        SHA256

        865cd028da2a9b839aecba647e1dce14082f893af0c53de9b03f10479672e1c6

        SHA512

        2efc9e5f85a9d85f84945089658fe1877062ec3b2f1181f658a1459fd1a52c7c5139d0947dd408f709a7448ae3d6ec06f7370be791a5fd1053858b060516d36f

      • C:\Windows\SysWOW64\Ldkojb32.exe

        Filesize

        219KB

        MD5

        1d9f6a04461c33c42b8431ec331be6a8

        SHA1

        6e478b5d3b303f2b6b3ca0ceb441d91992daa793

        SHA256

        4e5678ec3ac7d9a4eb1a8a3291898ee335ad5f1cb5472b1cc114dd0ea34d60d1

        SHA512

        33bd80d8ba0e56183c6d2eed9bd43e6cf955e408cdfd57da50e70669e0ee628c2caabbe66ff0b223c4afd6e1010c243c597bc73937ea67fa2d78b53acf9c7c3e

      • C:\Windows\SysWOW64\Ldohebqh.exe

        Filesize

        219KB

        MD5

        9d25acddf629b86dd9593ab8a115afda

        SHA1

        12163fad02aed0e6b70f8b6e488bd3c23a077995

        SHA256

        6b6f67ef5fd1bb787f847286356eaf6e5dfe138039e8ded3495e17951bf2e060

        SHA512

        cfe3c540f777207d1843874d8b160ee634a00e8d2c849733f376db89eb5e1681ffb88f8ca73ea9251a3584f8d7528cc9301123a8b94335287b88707e1036a08e

      • C:\Windows\SysWOW64\Lgpagm32.exe

        Filesize

        219KB

        MD5

        09198d0481f09f98f93da6b86eaf1809

        SHA1

        93c073acddf3f97ecd2ad44de5659164a22e1a39

        SHA256

        2723444f71cc9bd6650b0a5cf3e2763588bd307aac6ea8f9e7c2134aab75e192

        SHA512

        ca493683a558c4ed1beab1e2d6f977f367324922098caee6c5bb1ea342eb6f2b0c75b44aa63791147bcd3274b064a8b8709fa914e977fe75670b80a81b1c5ee5

      • C:\Windows\SysWOW64\Lilanioo.exe

        Filesize

        219KB

        MD5

        4e8f11aed696c9ea6992c6d706abff90

        SHA1

        808a9f5ea2b974a30849461ac71d75e5825eba2d

        SHA256

        91896f20963ab32874d68fcc6571b246cd12c57c7cdd959ee2f748167b03b6fb

        SHA512

        e723adf87b9eeba0ec7c1bd254770ef272778891e911c02d06f618407b080726d5a7db8815515f4c8ca5996402906937973d428a269f175d03957f99e11afcde

      • C:\Windows\SysWOW64\Lknjmkdo.exe

        Filesize

        219KB

        MD5

        fd503b2eba73c3b5bea2d0df6a59ee8e

        SHA1

        44054646570f0712b31d9b153a2e9b5b036ce013

        SHA256

        0f8ba38e3a150717ba7eced44c2921cd59823c1226daac1f2b270e81321a283e

        SHA512

        75a3bed75bedc177c1668794ac0192269e1cdc354170d5484e09334017f591536a0a4d3cdd082d1166870f156f66afa9a77961e306a3882d11446dfe13d7415e

      • C:\Windows\SysWOW64\Lmccchkn.exe

        Filesize

        219KB

        MD5

        fe7f9f9c7c555a288ccf7d0db72ed6a9

        SHA1

        86c7f69d342a940d6b90f0d52ed59e0e42bdc7f8

        SHA256

        88c03370bec9a2d4d9024c22f34aa68e36e0be2b7b6abaff4533bd5b04a28436

        SHA512

        460ce43951875e1b9444851ccb61fb211891041db7db94575ed028d10aa70fd9b927a4d63124733e8e002ed735edfe78828c0ba6f2f125e18387d70fc16551b3

      • C:\Windows\SysWOW64\Lmqgnhmp.exe

        Filesize

        219KB

        MD5

        008095cca4d255a5f2714b710b8bceb7

        SHA1

        f5d28c32174843fe39df464fef36ee35ac4e5dc1

        SHA256

        78501ec94a5c7f1a79568d22b5e1a26897913519ae6e06fa533a14732bd8d78e

        SHA512

        bf83c012b1637d417113a5a69e2b3a0292af4836e8284f39d8dababadaaa579348c2c8c6ece73d42cbb0b358b4acaa0ffddd0dce6863fd1b7b2beb6b05667c85

      • C:\Windows\SysWOW64\Lnepih32.exe

        Filesize

        219KB

        MD5

        980aa6a5254659d6ad7e7b4d86b2e6d1

        SHA1

        f328ce10c53d86a5988859c5fa14e0edf780ffc0

        SHA256

        6cf5fd0cb8371b23fa65bae298c9109a49e200fd40ce96371d574e1802ddd99d

        SHA512

        2e1de9db6472b70deb51b84026a885bf4ca9d25093100c78c37dd0017f3b517d304c2d3f1ab052c618ddf435ad48dd67cd44e77880b0a2e8421e959e3143d5eb

      • C:\Windows\SysWOW64\Lnjjdgee.exe

        Filesize

        219KB

        MD5

        a955cd2af9dc89de3cdf540f20d172df

        SHA1

        23450124510b66a815635cf2fde889c48695476c

        SHA256

        69e1a072114a2172c19fd919068b0d5c2f4c422d38fdcd37dc8e35c35198cf9c

        SHA512

        9e8d53f8b1587bbbe6656b1a3ed9f31feafb75e385388a5d1558ac05dc8f46448b160c4ef14d3f5997634e583f83fdbdc51265c96ffee40692806692d0830a7f

      • C:\Windows\SysWOW64\Lpappc32.exe

        Filesize

        219KB

        MD5

        beaa8745779f5801421653604ebc5bf1

        SHA1

        c106846fa7677fa12038ead7afcb212114e242a1

        SHA256

        b12e7cd90909c94c978b83ff240ad91429b8873cd6e2c34c90e5e3e4121e4be2

        SHA512

        28e0d7355d866f023f892b9aa4a7a77b4095227d46143e3abada523146cffb5e181035b14a97640c03b4b60f5ac18ca664faa3cf732845007dc95bb3af022ace

      • C:\Windows\SysWOW64\Mdfofakp.exe

        Filesize

        219KB

        MD5

        addeb05f1f3cdef7926b4a04650b5482

        SHA1

        43d3d346efa6945a0d3a60fcd69e218761129942

        SHA256

        91e826e880305fee71dfd4b9fbcfee7e09c6f91a84a835be0e712721b7edc5ba

        SHA512

        e71508b83180e9b0a2e5f86e9287155dfec1ad7658c1486a427b0b31b9aee7b0f8d871cc3113c3fbc24b373acef840ec67cccd55990eb24d37d3ac064f7ded70

      • C:\Windows\SysWOW64\Mdpalp32.exe

        Filesize

        219KB

        MD5

        767320ee713189a6af70897340570c77

        SHA1

        58d71049bd5ce19245e13518dacef655f9d1946e

        SHA256

        c8b3a42a5fbb58a4ec4eb7347ae1f564711ba286a50d041bf73d0e22d70aa21e

        SHA512

        0f8a6854017268231224469f8c746fb0b9ce31cb5eebc02eadeee1d255da7510ccd1b6920045c99fe56c2f2ce5bfbcee8b91552f64553897b31739b97eb374f8

      • C:\Windows\SysWOW64\Mjcgohig.exe

        Filesize

        219KB

        MD5

        fc9978edd33facdfe86298ddb11bb737

        SHA1

        aceb627d08900b7979808c87024ba3d4646738ed

        SHA256

        be2871fda25fe3377a0342f38e3a5bba81c97ff51708a9dd06a678867f13e3a3

        SHA512

        d1fc083e921db7ceeec344cc553bc38f19bceda82a39d59ef05edd3e307d0bc3af553af5cda6e525b8e094b5e7752f18c588b26c21f45fa2d96891b48dbb9ddf

      • C:\Windows\SysWOW64\Mjcgohig.exe

        Filesize

        219KB

        MD5

        8690006334ea92a493b406cf720a675b

        SHA1

        aee363c67670a922786f9f15f28b8bad7f1279f6

        SHA256

        6e29cdabb5fc69b2e9a70ee4316bc9898abe6d67097534e9dc27c92ffd298302

        SHA512

        31c6c16caf6a8d71629717e45db3557903a7e953d740ded06fa3ce9a6cd66aaee91753456f3aae3fbd84805c44adb99f1d4f7d9576afbd3c701a55787bcb4999

      • C:\Windows\SysWOW64\Mkbchk32.exe

        Filesize

        219KB

        MD5

        78cf3df21a2ed5bce6ced25e79889cfa

        SHA1

        3daf5c7df8ab382061f32abf5ddc796783dfb687

        SHA256

        f8688d31aa7a4c53ff15d5477cfc0b4e82b2ee40d8297b6ff8b24eba47066512

        SHA512

        de347ce55bc854de7613fc21f20fd37398588895a926bc85ba516effc076271c407f57d8ae260f5af6bddd2aa2f657c9123143d06b2a76e429988e9620dc379b

      • C:\Windows\SysWOW64\Mkgmcjld.exe

        Filesize

        219KB

        MD5

        9d4c6ca0170a4a8422369bf6b0bef58c

        SHA1

        60ac53a02f356c4162386d84ed5cc50a56c845a3

        SHA256

        0634ef350d25fc543d32d5576f302fcaf05b383c9e16f3fa218a7a81f55ffdf5

        SHA512

        d08b895655b378b8b1bab368618e377a5e1d338578f85c2af5a85e8e48f45282980c3f6c5ab33d491a7e65586e9146094d0f190f37ecf0a015d008270ff35361

      • C:\Windows\SysWOW64\Mnlfigcc.exe

        Filesize

        219KB

        MD5

        f6c696d05398ae1bdb836b08a6c4baba

        SHA1

        5ae1409e31a8fdb707944cf1b68f11aecd7daed0

        SHA256

        701827a25fdb7a801c0c95b31e0118bad94d64e4672fc0060c44fb9507e2fe5c

        SHA512

        c7cfcb033dc6c8a8c43822c07004358af155af712365d2fa34d08a893b9f5088774cb23e3f660cb5580768ac96f93f927be38607e22f2718e7d5164a55107a34

      • C:\Windows\SysWOW64\Mnocof32.exe

        Filesize

        219KB

        MD5

        8226bd791630b6643ff9ec04b66ba3b1

        SHA1

        5d693fd12efb0f7fe6704b5ffe32f7f599e38ce7

        SHA256

        7f4c2457a6199c2df7d53d8fa83a9f451a003b2a52138f18c55f5db871ca93c6

        SHA512

        cfccfb4371bd87fa714ed89a4f4552fbe58c7f5f1a158243d15627acade6c473a05ed9cbc0a535a7a819b7f9c1483ed5cb1f864f7cebe07bb65996f05487d763

      • C:\Windows\SysWOW64\Nbhkac32.exe

        Filesize

        219KB

        MD5

        e6f14e54d2b518e470f81ccf9221919c

        SHA1

        1b948ee0287c57af62e9e7a169f3b4b22cc2bd9e

        SHA256

        89d1a856db2abb8ec70f3dbce1370d7f546adb6832186352cb8ba830debadcc1

        SHA512

        efd59acf15a80021facd85ec9372024665426ddd5850b38475a428e2b53280a214974a6809464928d0488f3658b1dd0c8f80398f277b116c0334464e6db082c6

      • C:\Windows\SysWOW64\Njcpee32.exe

        Filesize

        219KB

        MD5

        c9ca6ffdb387a9dfcb378207c0771439

        SHA1

        941bcea5b9ed6d1b6b0a51bce59fa439c22e2007

        SHA256

        e0024fb8378d1900e03ab975a1cce3dfb888cffec289b62ba9ea4e9e9d1880d6

        SHA512

        b74c778a960f330dacf5195abb229af0c565b3ecb52e60cba43d1e677bd6ed820e9381ebe3396efb9a85810ad94cf658082751cba3309fab7a6d322709fa7768

      • C:\Windows\SysWOW64\Nkcmohbg.exe

        Filesize

        219KB

        MD5

        4156726d836c6aed39daa892386e8746

        SHA1

        4bdb508552b0c955804d61888eb90c24d2f33dc2

        SHA256

        1b7e93341a601c01da3914e3a7f3a9b472997a4b1322e8641351a78733963dcc

        SHA512

        970c203191d1ac25dcab0aabd18e37a39084a3f6058ee6afbd8413d166551a7ba2db6dd0553ec7886ffc868d3872eb61be29bfc72a5085314a7a40a37ba82f71

      • C:\Windows\SysWOW64\Nnhfee32.exe

        Filesize

        219KB

        MD5

        5e6dc1cfa7ee43adb48b7573baa28d18

        SHA1

        0350ae7a394b4608801a913bb32c2cee085cfc67

        SHA256

        fde824c9f001ec7ce6edda0eabb725bdd27285c5d1afd2471b654abb0cde848c

        SHA512

        3501b981aa0445002c4891b3f139924ba1d682ec3de40c5a039a6ec998bdfa26ad9bc9be37dde2c16b73ae05439c56f455fe4021d227a299149ab3030b3b78b8

      • memory/208-346-0x0000000000400000-0x000000000042F000-memory.dmp

        Filesize

        188KB

      • memory/208-514-0x0000000000400000-0x000000000042F000-memory.dmp

        Filesize

        188KB

      • memory/336-232-0x0000000000400000-0x000000000042F000-memory.dmp

        Filesize

        188KB

      • memory/408-200-0x0000000000400000-0x000000000042F000-memory.dmp

        Filesize

        188KB

      • memory/624-280-0x0000000000400000-0x000000000042F000-memory.dmp

        Filesize

        188KB

      • memory/624-534-0x0000000000400000-0x000000000042F000-memory.dmp

        Filesize

        188KB

      • memory/656-352-0x0000000000400000-0x000000000042F000-memory.dmp

        Filesize

        188KB

      • memory/656-513-0x0000000000400000-0x000000000042F000-memory.dmp

        Filesize

        188KB

      • memory/948-192-0x0000000000400000-0x000000000042F000-memory.dmp

        Filesize

        188KB

      • memory/972-263-0x0000000000400000-0x000000000042F000-memory.dmp

        Filesize

        188KB

      • memory/972-540-0x0000000000400000-0x000000000042F000-memory.dmp

        Filesize

        188KB

      • memory/976-48-0x0000000000400000-0x000000000042F000-memory.dmp

        Filesize

        188KB

      • memory/1080-135-0x0000000000400000-0x000000000042F000-memory.dmp

        Filesize

        188KB

      • memory/1228-400-0x0000000000400000-0x000000000042F000-memory.dmp

        Filesize

        188KB

      • memory/1228-500-0x0000000000400000-0x000000000042F000-memory.dmp

        Filesize

        188KB

      • memory/1236-207-0x0000000000400000-0x000000000042F000-memory.dmp

        Filesize

        188KB

      • memory/1380-486-0x0000000000400000-0x000000000042F000-memory.dmp

        Filesize

        188KB

      • memory/1380-442-0x0000000000400000-0x000000000042F000-memory.dmp

        Filesize

        188KB

      • memory/1444-458-0x0000000000400000-0x000000000042F000-memory.dmp

        Filesize

        188KB

      • memory/1536-524-0x0000000000400000-0x000000000042F000-memory.dmp

        Filesize

        188KB

      • memory/1536-310-0x0000000000400000-0x000000000042F000-memory.dmp

        Filesize

        188KB

      • memory/1696-274-0x0000000000400000-0x000000000042F000-memory.dmp

        Filesize

        188KB

      • memory/1696-536-0x0000000000400000-0x000000000042F000-memory.dmp

        Filesize

        188KB

      • memory/1816-176-0x0000000000400000-0x000000000042F000-memory.dmp

        Filesize

        188KB

      • memory/1892-112-0x0000000000400000-0x000000000042F000-memory.dmp

        Filesize

        188KB

      • memory/1912-492-0x0000000000400000-0x000000000042F000-memory.dmp

        Filesize

        188KB

      • memory/1912-424-0x0000000000400000-0x000000000042F000-memory.dmp

        Filesize

        188KB

      • memory/1964-359-0x0000000000400000-0x000000000042F000-memory.dmp

        Filesize

        188KB

      • memory/1964-510-0x0000000000400000-0x000000000042F000-memory.dmp

        Filesize

        188KB

      • memory/1996-478-0x0000000000400000-0x000000000042F000-memory.dmp

        Filesize

        188KB

      • memory/2012-369-0x0000000000400000-0x000000000042F000-memory.dmp

        Filesize

        188KB

      • memory/2036-538-0x0000000000400000-0x000000000042F000-memory.dmp

        Filesize

        188KB

      • memory/2036-268-0x0000000000400000-0x000000000042F000-memory.dmp

        Filesize

        188KB

      • memory/2064-72-0x0000000000400000-0x000000000042F000-memory.dmp

        Filesize

        188KB

      • memory/2116-96-0x0000000000400000-0x000000000042F000-memory.dmp

        Filesize

        188KB

      • memory/2196-494-0x0000000000400000-0x000000000042F000-memory.dmp

        Filesize

        188KB

      • memory/2196-418-0x0000000000400000-0x000000000042F000-memory.dmp

        Filesize

        188KB

      • memory/2288-120-0x0000000000400000-0x000000000042F000-memory.dmp

        Filesize

        188KB

      • memory/2312-448-0x0000000000400000-0x000000000042F000-memory.dmp

        Filesize

        188KB

      • memory/2312-487-0x0000000000400000-0x000000000042F000-memory.dmp

        Filesize

        188KB

      • memory/2440-143-0x0000000000400000-0x000000000042F000-memory.dmp

        Filesize

        188KB

      • memory/2444-440-0x0000000000400000-0x000000000042F000-memory.dmp

        Filesize

        188KB

      • memory/2444-489-0x0000000000400000-0x000000000042F000-memory.dmp

        Filesize

        188KB

      • memory/2456-247-0x0000000000400000-0x000000000042F000-memory.dmp

        Filesize

        188KB

      • memory/2484-504-0x0000000000400000-0x000000000042F000-memory.dmp

        Filesize

        188KB

      • memory/2484-382-0x0000000000400000-0x000000000042F000-memory.dmp

        Filesize

        188KB

      • memory/2552-380-0x0000000000400000-0x000000000042F000-memory.dmp

        Filesize

        188KB

      • memory/2732-228-0x0000000000400000-0x000000000042F000-memory.dmp

        Filesize

        188KB

      • memory/2768-160-0x0000000000400000-0x000000000042F000-memory.dmp

        Filesize

        188KB

      • memory/2844-151-0x0000000000400000-0x000000000042F000-memory.dmp

        Filesize

        188KB

      • memory/3144-430-0x0000000000400000-0x000000000042F000-memory.dmp

        Filesize

        188KB

      • memory/3144-491-0x0000000000400000-0x000000000042F000-memory.dmp

        Filesize

        188KB

      • memory/3152-127-0x0000000000400000-0x000000000042F000-memory.dmp

        Filesize

        188KB

      • memory/3244-239-0x0000000000400000-0x000000000042F000-memory.dmp

        Filesize

        188KB

      • memory/3248-516-0x0000000000400000-0x000000000042F000-memory.dmp

        Filesize

        188KB

      • memory/3248-340-0x0000000000400000-0x000000000042F000-memory.dmp

        Filesize

        188KB

      • memory/3384-507-0x0000000000400000-0x000000000042F000-memory.dmp

        Filesize

        188KB

      • memory/3384-370-0x0000000000400000-0x000000000042F000-memory.dmp

        Filesize

        188KB

      • memory/3412-502-0x0000000000400000-0x000000000042F000-memory.dmp

        Filesize

        188KB

      • memory/3412-394-0x0000000000400000-0x000000000042F000-memory.dmp

        Filesize

        188KB

      • memory/3440-87-0x0000000000400000-0x000000000042F000-memory.dmp

        Filesize

        188KB

      • memory/3444-168-0x0000000000400000-0x000000000042F000-memory.dmp

        Filesize

        188KB

      • memory/3560-28-0x0000000000400000-0x000000000042F000-memory.dmp

        Filesize

        188KB

      • memory/3580-71-0x0000000000400000-0x000000000042F000-memory.dmp

        Filesize

        188KB

      • memory/3596-338-0x0000000000400000-0x000000000042F000-memory.dmp

        Filesize

        188KB

      • memory/3632-292-0x0000000000400000-0x000000000042F000-memory.dmp

        Filesize

        188KB

      • memory/3632-530-0x0000000000400000-0x000000000042F000-memory.dmp

        Filesize

        188KB

      • memory/3772-392-0x0000000000400000-0x000000000042F000-memory.dmp

        Filesize

        188KB

      • memory/3780-406-0x0000000000400000-0x000000000042F000-memory.dmp

        Filesize

        188KB

      • memory/3780-498-0x0000000000400000-0x000000000042F000-memory.dmp

        Filesize

        188KB

      • memory/3852-330-0x0000000000400000-0x000000000042F000-memory.dmp

        Filesize

        188KB

      • memory/3852-519-0x0000000000400000-0x000000000042F000-memory.dmp

        Filesize

        188KB

      • memory/3916-184-0x0000000000400000-0x000000000042F000-memory.dmp

        Filesize

        188KB

      • memory/3920-70-0x0000000000400000-0x000000000042F000-memory.dmp

        Filesize

        188KB

      • memory/3960-40-0x0000000000400000-0x000000000042F000-memory.dmp

        Filesize

        188KB

      • memory/4292-320-0x0000000000400000-0x000000000042F000-memory.dmp

        Filesize

        188KB

      • memory/4296-322-0x0000000000400000-0x000000000042F000-memory.dmp

        Filesize

        188KB

      • memory/4296-521-0x0000000000400000-0x000000000042F000-memory.dmp

        Filesize

        188KB

      • memory/4332-471-0x0000000000400000-0x000000000042F000-memory.dmp

        Filesize

        188KB

      • memory/4368-298-0x0000000000400000-0x000000000042F000-memory.dmp

        Filesize

        188KB

      • memory/4368-528-0x0000000000400000-0x000000000042F000-memory.dmp

        Filesize

        188KB

      • memory/4440-216-0x0000000000400000-0x000000000042F000-memory.dmp

        Filesize

        188KB

      • memory/4452-472-0x0000000000400000-0x000000000042F000-memory.dmp

        Filesize

        188KB

      • memory/4452-481-0x0000000000400000-0x000000000042F000-memory.dmp

        Filesize

        188KB

      • memory/4504-15-0x0000000000400000-0x000000000042F000-memory.dmp

        Filesize

        188KB

      • memory/4612-416-0x0000000000400000-0x000000000042F000-memory.dmp

        Filesize

        188KB

      • memory/4612-496-0x0000000000400000-0x000000000042F000-memory.dmp

        Filesize

        188KB

      • memory/4704-483-0x0000000000400000-0x000000000042F000-memory.dmp

        Filesize

        188KB

      • memory/4704-461-0x0000000000400000-0x000000000042F000-memory.dmp

        Filesize

        188KB

      • memory/4740-304-0x0000000000400000-0x000000000042F000-memory.dmp

        Filesize

        188KB

      • memory/4740-526-0x0000000000400000-0x000000000042F000-memory.dmp

        Filesize

        188KB

      • memory/4800-88-0x0000000000400000-0x000000000042F000-memory.dmp

        Filesize

        188KB

      • memory/4804-286-0x0000000000400000-0x000000000042F000-memory.dmp

        Filesize

        188KB

      • memory/4804-532-0x0000000000400000-0x000000000042F000-memory.dmp

        Filesize

        188KB

      • memory/4844-103-0x0000000000400000-0x000000000042F000-memory.dmp

        Filesize

        188KB

      • memory/4876-543-0x0000000000400000-0x000000000042F000-memory.dmp

        Filesize

        188KB

      • memory/4876-256-0x0000000000400000-0x000000000042F000-memory.dmp

        Filesize

        188KB

      • memory/4912-37-0x0000000000400000-0x000000000042F000-memory.dmp

        Filesize

        188KB

      • memory/4920-0-0x0000000000400000-0x000000000042F000-memory.dmp

        Filesize

        188KB

      • memory/4996-8-0x0000000000400000-0x000000000042F000-memory.dmp

        Filesize

        188KB