Analysis

  • max time kernel
    137s
  • max time network
    134s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240802-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system
  • submitted
    16/08/2024, 20:55

General

  • Target

    322c5a6399ff024393e162ac5a026480eb1348c21c75cbc91cd926d218c3f67e.exe

  • Size

    404KB

  • MD5

    c7e0f262221cbfb74b3b43a9dead1d02

  • SHA1

    f8d6b5c115a3c78ee3b1c5b64e53fa7d8476f10a

  • SHA256

    322c5a6399ff024393e162ac5a026480eb1348c21c75cbc91cd926d218c3f67e

  • SHA512

    2e99ef18db3d315d3875b990524622cf058981464429de59394eb8078a8b96df43124a464fb5367d3de3e5cd9661cbff87b3a3cf79bcf64a2c8df9f7ead38ae9

  • SSDEEP

    6144:k1NcNhuovENm+3Mpui6yYPaIGckfru5xyDpui6yYPaIGckSU05836S5:UqAlwcMpV6yYP4rbpV6yYPg058KS

Score
10/10

Malware Config

Signatures

  • Adds autorun key to be loaded by Explorer.exe on startup 2 TTPs 64 IoCs
  • Executes dropped EXE 59 IoCs
  • Drops file in System32 directory 64 IoCs
  • Program crash 1 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 60 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Modifies registry class 64 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\322c5a6399ff024393e162ac5a026480eb1348c21c75cbc91cd926d218c3f67e.exe
    "C:\Users\Admin\AppData\Local\Temp\322c5a6399ff024393e162ac5a026480eb1348c21c75cbc91cd926d218c3f67e.exe"
    1⤵
    • Adds autorun key to be loaded by Explorer.exe on startup
    • Drops file in System32 directory
    • System Location Discovery: System Language Discovery
    • Modifies registry class
    • Suspicious use of WriteProcessMemory
    PID:340
    • C:\Windows\SysWOW64\Bdeiqgkj.exe
      C:\Windows\system32\Bdeiqgkj.exe
      2⤵
      • Executes dropped EXE
      • Drops file in System32 directory
      • System Location Discovery: System Language Discovery
      • Modifies registry class
      • Suspicious use of WriteProcessMemory
      PID:612
      • C:\Windows\SysWOW64\Bgdemb32.exe
        C:\Windows\system32\Bgdemb32.exe
        3⤵
        • Adds autorun key to be loaded by Explorer.exe on startup
        • Executes dropped EXE
        • Drops file in System32 directory
        • System Location Discovery: System Language Discovery
        • Modifies registry class
        • Suspicious use of WriteProcessMemory
        PID:1928
        • C:\Windows\SysWOW64\Ckbncapd.exe
          C:\Windows\system32\Ckbncapd.exe
          4⤵
          • Adds autorun key to be loaded by Explorer.exe on startup
          • Executes dropped EXE
          • Drops file in System32 directory
          • System Location Discovery: System Language Discovery
          • Suspicious use of WriteProcessMemory
          PID:1584
          • C:\Windows\SysWOW64\Cgiohbfi.exe
            C:\Windows\system32\Cgiohbfi.exe
            5⤵
            • Adds autorun key to be loaded by Explorer.exe on startup
            • Executes dropped EXE
            • Drops file in System32 directory
            • System Location Discovery: System Language Discovery
            • Modifies registry class
            • Suspicious use of WriteProcessMemory
            PID:3924
            • C:\Windows\SysWOW64\Ckdkhq32.exe
              C:\Windows\system32\Ckdkhq32.exe
              6⤵
              • Adds autorun key to be loaded by Explorer.exe on startup
              • Executes dropped EXE
              • Drops file in System32 directory
              • System Location Discovery: System Language Discovery
              • Suspicious use of WriteProcessMemory
              PID:3664
              • C:\Windows\SysWOW64\Caqpkjcl.exe
                C:\Windows\system32\Caqpkjcl.exe
                7⤵
                • Adds autorun key to be loaded by Explorer.exe on startup
                • Executes dropped EXE
                • Drops file in System32 directory
                • System Location Discovery: System Language Discovery
                • Modifies registry class
                • Suspicious use of WriteProcessMemory
                PID:816
                • C:\Windows\SysWOW64\Cildom32.exe
                  C:\Windows\system32\Cildom32.exe
                  8⤵
                  • Executes dropped EXE
                  • Drops file in System32 directory
                  • System Location Discovery: System Language Discovery
                  • Modifies registry class
                  • Suspicious use of WriteProcessMemory
                  PID:1532
                  • C:\Windows\SysWOW64\Cdaile32.exe
                    C:\Windows\system32\Cdaile32.exe
                    9⤵
                    • Executes dropped EXE
                    • Drops file in System32 directory
                    • System Location Discovery: System Language Discovery
                    • Modifies registry class
                    • Suspicious use of WriteProcessMemory
                    PID:4784
                    • C:\Windows\SysWOW64\Ddcebe32.exe
                      C:\Windows\system32\Ddcebe32.exe
                      10⤵
                      • Adds autorun key to be loaded by Explorer.exe on startup
                      • Executes dropped EXE
                      • System Location Discovery: System Language Discovery
                      • Modifies registry class
                      • Suspicious use of WriteProcessMemory
                      PID:1516
                      • C:\Windows\SysWOW64\Ddfbgelh.exe
                        C:\Windows\system32\Ddfbgelh.exe
                        11⤵
                        • Adds autorun key to be loaded by Explorer.exe on startup
                        • Executes dropped EXE
                        • Drops file in System32 directory
                        • System Location Discovery: System Language Discovery
                        • Modifies registry class
                        • Suspicious use of WriteProcessMemory
                        PID:2152
                        • C:\Windows\SysWOW64\Dgdncplk.exe
                          C:\Windows\system32\Dgdncplk.exe
                          12⤵
                          • Executes dropped EXE
                          • Drops file in System32 directory
                          • System Location Discovery: System Language Discovery
                          • Modifies registry class
                          • Suspicious use of WriteProcessMemory
                          PID:4608
                          • C:\Windows\SysWOW64\Dggkipii.exe
                            C:\Windows\system32\Dggkipii.exe
                            13⤵
                            • Adds autorun key to be loaded by Explorer.exe on startup
                            • Executes dropped EXE
                            • Drops file in System32 directory
                            • System Location Discovery: System Language Discovery
                            • Suspicious use of WriteProcessMemory
                            PID:1652
                            • C:\Windows\SysWOW64\Dnqcfjae.exe
                              C:\Windows\system32\Dnqcfjae.exe
                              14⤵
                              • Executes dropped EXE
                              • Drops file in System32 directory
                              • System Location Discovery: System Language Discovery
                              • Modifies registry class
                              • Suspicious use of WriteProcessMemory
                              PID:1400
                              • C:\Windows\SysWOW64\Ddklbd32.exe
                                C:\Windows\system32\Ddklbd32.exe
                                15⤵
                                • Adds autorun key to be loaded by Explorer.exe on startup
                                • Executes dropped EXE
                                • Drops file in System32 directory
                                • System Location Discovery: System Language Discovery
                                • Modifies registry class
                                • Suspicious use of WriteProcessMemory
                                PID:2360
                                • C:\Windows\SysWOW64\Dgihop32.exe
                                  C:\Windows\system32\Dgihop32.exe
                                  16⤵
                                  • Adds autorun key to be loaded by Explorer.exe on startup
                                  • Executes dropped EXE
                                  • Drops file in System32 directory
                                  • System Location Discovery: System Language Discovery
                                  • Modifies registry class
                                  • Suspicious use of WriteProcessMemory
                                  PID:3208
                                  • C:\Windows\SysWOW64\Dncpkjoc.exe
                                    C:\Windows\system32\Dncpkjoc.exe
                                    17⤵
                                    • Adds autorun key to be loaded by Explorer.exe on startup
                                    • Executes dropped EXE
                                    • Drops file in System32 directory
                                    • System Location Discovery: System Language Discovery
                                    • Modifies registry class
                                    • Suspicious use of WriteProcessMemory
                                    PID:4064
                                    • C:\Windows\SysWOW64\Dpalgenf.exe
                                      C:\Windows\system32\Dpalgenf.exe
                                      18⤵
                                      • Adds autorun key to be loaded by Explorer.exe on startup
                                      • Executes dropped EXE
                                      • Drops file in System32 directory
                                      • System Location Discovery: System Language Discovery
                                      • Modifies registry class
                                      • Suspicious use of WriteProcessMemory
                                      PID:1176
                                      • C:\Windows\SysWOW64\Egkddo32.exe
                                        C:\Windows\system32\Egkddo32.exe
                                        19⤵
                                        • Adds autorun key to be loaded by Explorer.exe on startup
                                        • Executes dropped EXE
                                        • Drops file in System32 directory
                                        • System Location Discovery: System Language Discovery
                                        • Modifies registry class
                                        • Suspicious use of WriteProcessMemory
                                        PID:2764
                                        • C:\Windows\SysWOW64\Ejjaqk32.exe
                                          C:\Windows\system32\Ejjaqk32.exe
                                          20⤵
                                          • Executes dropped EXE
                                          • Drops file in System32 directory
                                          • System Location Discovery: System Language Discovery
                                          • Modifies registry class
                                          • Suspicious use of WriteProcessMemory
                                          PID:3236
                                          • C:\Windows\SysWOW64\Ekimjn32.exe
                                            C:\Windows\system32\Ekimjn32.exe
                                            21⤵
                                            • Adds autorun key to be loaded by Explorer.exe on startup
                                            • Executes dropped EXE
                                            • System Location Discovery: System Language Discovery
                                            • Modifies registry class
                                            • Suspicious use of WriteProcessMemory
                                            PID:4004
                                            • C:\Windows\SysWOW64\Enhifi32.exe
                                              C:\Windows\system32\Enhifi32.exe
                                              22⤵
                                              • Adds autorun key to be loaded by Explorer.exe on startup
                                              • Executes dropped EXE
                                              • Drops file in System32 directory
                                              • System Location Discovery: System Language Discovery
                                              • Modifies registry class
                                              • Suspicious use of WriteProcessMemory
                                              PID:5112
                                              • C:\Windows\SysWOW64\Epffbd32.exe
                                                C:\Windows\system32\Epffbd32.exe
                                                23⤵
                                                • Adds autorun key to be loaded by Explorer.exe on startup
                                                • Executes dropped EXE
                                                • Drops file in System32 directory
                                                • System Location Discovery: System Language Discovery
                                                • Modifies registry class
                                                PID:1848
                                                • C:\Windows\SysWOW64\Ecdbop32.exe
                                                  C:\Windows\system32\Ecdbop32.exe
                                                  24⤵
                                                  • Adds autorun key to be loaded by Explorer.exe on startup
                                                  • Executes dropped EXE
                                                  • Drops file in System32 directory
                                                  • System Location Discovery: System Language Discovery
                                                  • Modifies registry class
                                                  PID:2008
                                                  • C:\Windows\SysWOW64\Ekljpm32.exe
                                                    C:\Windows\system32\Ekljpm32.exe
                                                    25⤵
                                                    • Adds autorun key to be loaded by Explorer.exe on startup
                                                    • Executes dropped EXE
                                                    • Drops file in System32 directory
                                                    • System Location Discovery: System Language Discovery
                                                    • Modifies registry class
                                                    PID:2264
                                                    • C:\Windows\SysWOW64\Enjfli32.exe
                                                      C:\Windows\system32\Enjfli32.exe
                                                      26⤵
                                                      • Executes dropped EXE
                                                      • Drops file in System32 directory
                                                      • System Location Discovery: System Language Discovery
                                                      PID:5072
                                                      • C:\Windows\SysWOW64\Eafbmgad.exe
                                                        C:\Windows\system32\Eafbmgad.exe
                                                        27⤵
                                                        • Adds autorun key to be loaded by Explorer.exe on startup
                                                        • Executes dropped EXE
                                                        • Drops file in System32 directory
                                                        • System Location Discovery: System Language Discovery
                                                        PID:2564
                                                        • C:\Windows\SysWOW64\Eddnic32.exe
                                                          C:\Windows\system32\Eddnic32.exe
                                                          28⤵
                                                          • Adds autorun key to be loaded by Explorer.exe on startup
                                                          • Executes dropped EXE
                                                          • System Location Discovery: System Language Discovery
                                                          • Modifies registry class
                                                          PID:2776
                                                          • C:\Windows\SysWOW64\Ecgodpgb.exe
                                                            C:\Windows\system32\Ecgodpgb.exe
                                                            29⤵
                                                            • Adds autorun key to be loaded by Explorer.exe on startup
                                                            • Executes dropped EXE
                                                            • Drops file in System32 directory
                                                            • System Location Discovery: System Language Discovery
                                                            • Modifies registry class
                                                            PID:1644
                                                            • C:\Windows\SysWOW64\Ekngemhd.exe
                                                              C:\Windows\system32\Ekngemhd.exe
                                                              30⤵
                                                              • Adds autorun key to be loaded by Explorer.exe on startup
                                                              • Executes dropped EXE
                                                              • Drops file in System32 directory
                                                              • System Location Discovery: System Language Discovery
                                                              • Modifies registry class
                                                              PID:2812
                                                              • C:\Windows\SysWOW64\Enlcahgh.exe
                                                                C:\Windows\system32\Enlcahgh.exe
                                                                31⤵
                                                                • Adds autorun key to be loaded by Explorer.exe on startup
                                                                • Executes dropped EXE
                                                                • Drops file in System32 directory
                                                                • System Location Discovery: System Language Discovery
                                                                PID:1208
                                                                • C:\Windows\SysWOW64\Eahobg32.exe
                                                                  C:\Windows\system32\Eahobg32.exe
                                                                  32⤵
                                                                  • Adds autorun key to be loaded by Explorer.exe on startup
                                                                  • Executes dropped EXE
                                                                  • Drops file in System32 directory
                                                                  • System Location Discovery: System Language Discovery
                                                                  PID:2236
                                                                  • C:\Windows\SysWOW64\Edfknb32.exe
                                                                    C:\Windows\system32\Edfknb32.exe
                                                                    33⤵
                                                                    • Adds autorun key to be loaded by Explorer.exe on startup
                                                                    • Executes dropped EXE
                                                                    • System Location Discovery: System Language Discovery
                                                                    • Modifies registry class
                                                                    PID:32
                                                                    • C:\Windows\SysWOW64\Egegjn32.exe
                                                                      C:\Windows\system32\Egegjn32.exe
                                                                      34⤵
                                                                      • Adds autorun key to be loaded by Explorer.exe on startup
                                                                      • Executes dropped EXE
                                                                      • Drops file in System32 directory
                                                                      • System Location Discovery: System Language Discovery
                                                                      • Modifies registry class
                                                                      PID:3240
                                                                      • C:\Windows\SysWOW64\Ejccgi32.exe
                                                                        C:\Windows\system32\Ejccgi32.exe
                                                                        35⤵
                                                                        • Adds autorun key to be loaded by Explorer.exe on startup
                                                                        • Executes dropped EXE
                                                                        • Drops file in System32 directory
                                                                        • System Location Discovery: System Language Discovery
                                                                        • Modifies registry class
                                                                        PID:4904
                                                                        • C:\Windows\SysWOW64\Eqmlccdi.exe
                                                                          C:\Windows\system32\Eqmlccdi.exe
                                                                          36⤵
                                                                          • Adds autorun key to be loaded by Explorer.exe on startup
                                                                          • Executes dropped EXE
                                                                          • Drops file in System32 directory
                                                                          • System Location Discovery: System Language Discovery
                                                                          • Modifies registry class
                                                                          PID:4036
                                                                          • C:\Windows\SysWOW64\Fclhpo32.exe
                                                                            C:\Windows\system32\Fclhpo32.exe
                                                                            37⤵
                                                                            • Adds autorun key to be loaded by Explorer.exe on startup
                                                                            • Executes dropped EXE
                                                                            • System Location Discovery: System Language Discovery
                                                                            • Modifies registry class
                                                                            PID:2340
                                                                            • C:\Windows\SysWOW64\Fggdpnkf.exe
                                                                              C:\Windows\system32\Fggdpnkf.exe
                                                                              38⤵
                                                                              • Adds autorun key to be loaded by Explorer.exe on startup
                                                                              • Executes dropped EXE
                                                                              • System Location Discovery: System Language Discovery
                                                                              • Modifies registry class
                                                                              PID:960
                                                                              • C:\Windows\SysWOW64\Fjeplijj.exe
                                                                                C:\Windows\system32\Fjeplijj.exe
                                                                                39⤵
                                                                                • Adds autorun key to be loaded by Explorer.exe on startup
                                                                                • Executes dropped EXE
                                                                                • System Location Discovery: System Language Discovery
                                                                                • Modifies registry class
                                                                                PID:2924
                                                                                • C:\Windows\SysWOW64\Famhmfkl.exe
                                                                                  C:\Windows\system32\Famhmfkl.exe
                                                                                  40⤵
                                                                                  • Executes dropped EXE
                                                                                  • Drops file in System32 directory
                                                                                  • System Location Discovery: System Language Discovery
                                                                                  • Modifies registry class
                                                                                  PID:2356
                                                                                  • C:\Windows\SysWOW64\Fdkdibjp.exe
                                                                                    C:\Windows\system32\Fdkdibjp.exe
                                                                                    41⤵
                                                                                    • Executes dropped EXE
                                                                                    • System Location Discovery: System Language Discovery
                                                                                    • Modifies registry class
                                                                                    PID:2988
                                                                                    • C:\Windows\SysWOW64\Fgiaemic.exe
                                                                                      C:\Windows\system32\Fgiaemic.exe
                                                                                      42⤵
                                                                                      • Adds autorun key to be loaded by Explorer.exe on startup
                                                                                      • Executes dropped EXE
                                                                                      • System Location Discovery: System Language Discovery
                                                                                      • Modifies registry class
                                                                                      PID:4396
                                                                                      • C:\Windows\SysWOW64\Fjhmbihg.exe
                                                                                        C:\Windows\system32\Fjhmbihg.exe
                                                                                        43⤵
                                                                                        • Adds autorun key to be loaded by Explorer.exe on startup
                                                                                        • Executes dropped EXE
                                                                                        • Drops file in System32 directory
                                                                                        • System Location Discovery: System Language Discovery
                                                                                        • Modifies registry class
                                                                                        PID:2488
                                                                                        • C:\Windows\SysWOW64\Fncibg32.exe
                                                                                          C:\Windows\system32\Fncibg32.exe
                                                                                          44⤵
                                                                                          • Adds autorun key to be loaded by Explorer.exe on startup
                                                                                          • Executes dropped EXE
                                                                                          • Drops file in System32 directory
                                                                                          • System Location Discovery: System Language Discovery
                                                                                          PID:4012
                                                                                          • C:\Windows\SysWOW64\Fqbeoc32.exe
                                                                                            C:\Windows\system32\Fqbeoc32.exe
                                                                                            45⤵
                                                                                            • Adds autorun key to be loaded by Explorer.exe on startup
                                                                                            • Executes dropped EXE
                                                                                            • System Location Discovery: System Language Discovery
                                                                                            • Modifies registry class
                                                                                            PID:1756
                                                                                            • C:\Windows\SysWOW64\Fcpakn32.exe
                                                                                              C:\Windows\system32\Fcpakn32.exe
                                                                                              46⤵
                                                                                              • Executes dropped EXE
                                                                                              • System Location Discovery: System Language Discovery
                                                                                              • Modifies registry class
                                                                                              PID:5164
                                                                                              • C:\Windows\SysWOW64\Fkgillpj.exe
                                                                                                C:\Windows\system32\Fkgillpj.exe
                                                                                                47⤵
                                                                                                • Adds autorun key to be loaded by Explorer.exe on startup
                                                                                                • Executes dropped EXE
                                                                                                • System Location Discovery: System Language Discovery
                                                                                                • Modifies registry class
                                                                                                PID:5200
                                                                                                • C:\Windows\SysWOW64\Fnffhgon.exe
                                                                                                  C:\Windows\system32\Fnffhgon.exe
                                                                                                  48⤵
                                                                                                  • Adds autorun key to be loaded by Explorer.exe on startup
                                                                                                  • Executes dropped EXE
                                                                                                  • Drops file in System32 directory
                                                                                                  • System Location Discovery: System Language Discovery
                                                                                                  PID:5244
                                                                                                  • C:\Windows\SysWOW64\Fbaahf32.exe
                                                                                                    C:\Windows\system32\Fbaahf32.exe
                                                                                                    49⤵
                                                                                                    • Adds autorun key to be loaded by Explorer.exe on startup
                                                                                                    • Executes dropped EXE
                                                                                                    • Drops file in System32 directory
                                                                                                    • System Location Discovery: System Language Discovery
                                                                                                    PID:5276
                                                                                                    • C:\Windows\SysWOW64\Fdpnda32.exe
                                                                                                      C:\Windows\system32\Fdpnda32.exe
                                                                                                      50⤵
                                                                                                      • Adds autorun key to be loaded by Explorer.exe on startup
                                                                                                      • Executes dropped EXE
                                                                                                      • Drops file in System32 directory
                                                                                                      • System Location Discovery: System Language Discovery
                                                                                                      PID:5324
                                                                                                      • C:\Windows\SysWOW64\Fgnjqm32.exe
                                                                                                        C:\Windows\system32\Fgnjqm32.exe
                                                                                                        51⤵
                                                                                                        • Executes dropped EXE
                                                                                                        • Drops file in System32 directory
                                                                                                        • System Location Discovery: System Language Discovery
                                                                                                        • Modifies registry class
                                                                                                        PID:5364
                                                                                                        • C:\Windows\SysWOW64\Fjmfmh32.exe
                                                                                                          C:\Windows\system32\Fjmfmh32.exe
                                                                                                          52⤵
                                                                                                          • Executes dropped EXE
                                                                                                          • Drops file in System32 directory
                                                                                                          • System Location Discovery: System Language Discovery
                                                                                                          PID:5396
                                                                                                          • C:\Windows\SysWOW64\Fnhbmgmk.exe
                                                                                                            C:\Windows\system32\Fnhbmgmk.exe
                                                                                                            53⤵
                                                                                                            • Adds autorun key to be loaded by Explorer.exe on startup
                                                                                                            • Executes dropped EXE
                                                                                                            • Drops file in System32 directory
                                                                                                            • System Location Discovery: System Language Discovery
                                                                                                            • Modifies registry class
                                                                                                            PID:5444
                                                                                                            • C:\Windows\SysWOW64\Fqfojblo.exe
                                                                                                              C:\Windows\system32\Fqfojblo.exe
                                                                                                              54⤵
                                                                                                              • Adds autorun key to be loaded by Explorer.exe on startup
                                                                                                              • Executes dropped EXE
                                                                                                              • System Location Discovery: System Language Discovery
                                                                                                              • Modifies registry class
                                                                                                              PID:5476
                                                                                                              • C:\Windows\SysWOW64\Fdbkja32.exe
                                                                                                                C:\Windows\system32\Fdbkja32.exe
                                                                                                                55⤵
                                                                                                                • Executes dropped EXE
                                                                                                                • Drops file in System32 directory
                                                                                                                • System Location Discovery: System Language Discovery
                                                                                                                • Modifies registry class
                                                                                                                PID:5516
                                                                                                                • C:\Windows\SysWOW64\Fgqgfl32.exe
                                                                                                                  C:\Windows\system32\Fgqgfl32.exe
                                                                                                                  56⤵
                                                                                                                  • Adds autorun key to be loaded by Explorer.exe on startup
                                                                                                                  • Executes dropped EXE
                                                                                                                  • Drops file in System32 directory
                                                                                                                  • System Location Discovery: System Language Discovery
                                                                                                                  PID:5564
                                                                                                                  • C:\Windows\SysWOW64\Fklcgk32.exe
                                                                                                                    C:\Windows\system32\Fklcgk32.exe
                                                                                                                    57⤵
                                                                                                                    • Adds autorun key to be loaded by Explorer.exe on startup
                                                                                                                    • Executes dropped EXE
                                                                                                                    • Drops file in System32 directory
                                                                                                                    • System Location Discovery: System Language Discovery
                                                                                                                    PID:5604
                                                                                                                    • C:\Windows\SysWOW64\Fnjocf32.exe
                                                                                                                      C:\Windows\system32\Fnjocf32.exe
                                                                                                                      58⤵
                                                                                                                      • Adds autorun key to be loaded by Explorer.exe on startup
                                                                                                                      • Executes dropped EXE
                                                                                                                      • Drops file in System32 directory
                                                                                                                      • System Location Discovery: System Language Discovery
                                                                                                                      PID:5636
                                                                                                                      • C:\Windows\SysWOW64\Fbfkceca.exe
                                                                                                                        C:\Windows\system32\Fbfkceca.exe
                                                                                                                        59⤵
                                                                                                                        • Adds autorun key to be loaded by Explorer.exe on startup
                                                                                                                        • Executes dropped EXE
                                                                                                                        • Drops file in System32 directory
                                                                                                                        • System Location Discovery: System Language Discovery
                                                                                                                        • Modifies registry class
                                                                                                                        PID:5684
                                                                                                                        • C:\Windows\SysWOW64\Gddgpqbe.exe
                                                                                                                          C:\Windows\system32\Gddgpqbe.exe
                                                                                                                          60⤵
                                                                                                                          • Executes dropped EXE
                                                                                                                          • System Location Discovery: System Language Discovery
                                                                                                                          PID:5716
                                                                                                                          • C:\Windows\SysWOW64\WerFault.exe
                                                                                                                            C:\Windows\SysWOW64\WerFault.exe -u -p 5716 -s 412
                                                                                                                            61⤵
                                                                                                                            • Program crash
                                                                                                                            PID:5808
  • C:\Windows\SysWOW64\WerFault.exe
    C:\Windows\SysWOW64\WerFault.exe -pss -s 408 -p 5716 -ip 5716
    1⤵
      PID:5784
    • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
      "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=asset_store.mojom.AssetStoreService --lang=en-US --service-sandbox-type=asset_store_service --field-trial-handle=4180,i,3210801877307184477,8078594481454001567,262144 --variations-seed-version --mojo-platform-channel-handle=4612 /prefetch:8
      1⤵
        PID:3252

      Network

      MITRE ATT&CK Enterprise v15

      Replay Monitor

      Loading Replay Monitor...

      Downloads

      • C:\Windows\SysWOW64\Bdeiqgkj.exe

        Filesize

        404KB

        MD5

        d2a81af9e0e2d74000ab7a9ecfd99e53

        SHA1

        6315701ad27c4da84577d7a12eb757f563933d5a

        SHA256

        8143af7ab82feae9d462bf6298c99fe539eddb530b58768ab3a96134b18e46aa

        SHA512

        b5ab615a0cf92852dfdd7f62fbad1be2abfa98587b604fc6b77bc89bbc039382cd9ead8ae02dee3dbcd40b81644fb7faeb88389ae307a584c119b64d0372399b

      • C:\Windows\SysWOW64\Bgdemb32.exe

        Filesize

        404KB

        MD5

        36897ea171eff4f7cd05e1da15c84b89

        SHA1

        af4f8038a61390ee2e06f871579d4d1163e6762a

        SHA256

        efbd7727c087491c6b067b3663b021f82b0e1d404a16dff79fc8c3e2ababcddc

        SHA512

        cae585afc3d09ce34dfec5c293b338fc895353ec6ebca070867a3c62f798e7320557a59d8d55edd95f249cde9dfdbe67202adc7f0ca18cf305edafed43e4521c

      • C:\Windows\SysWOW64\Caqpkjcl.exe

        Filesize

        404KB

        MD5

        3fe54c54361338dbc9b6d032b3769e64

        SHA1

        31698d12f674cbce78b8d1dcf725fe72b42996a4

        SHA256

        5a1c79c8a7ad611c6974c55260130db07fc4512d103d029d9a20c978d45e9fbd

        SHA512

        ee79915beda2e047847cafc2dc07c12cd8b865cdad0e27adc1b5dc9253af2279f2f75966c470afbe342de471f9384c1b18f52734bafd6acd8b4e8e73b41ee4de

      • C:\Windows\SysWOW64\Cdaile32.exe

        Filesize

        404KB

        MD5

        ec3bb9ebe9bd0e41f1fc867b8bf5f664

        SHA1

        7941059be7212cc21e7aceca705fd15901afa43f

        SHA256

        6e30f1f0ddf6b688781c7933a0bc7cccf0895b96cc254390b9c62ab2e0d25c86

        SHA512

        8867404fcc862288243e45eb692eabf6a28f3c10d97eb02adc837b25906b5b527f30ea764f7c66e56fe7c98a3c7d51286e2b42973c7878ecba9d894161e3abf7

      • C:\Windows\SysWOW64\Cgiohbfi.exe

        Filesize

        404KB

        MD5

        023034165ec1bc1f61e6feb38f8e798f

        SHA1

        eb5eb4380ab4754f62cc9f06efeea27b5211b441

        SHA256

        020c612f64314fa85a77af5ab35f6d194af35bb47b16804eff07ac7709403a05

        SHA512

        490ce1a67d5c947332dc51dac24b6abe2dc280c69ff105998d959a9b6cc4a514c521f22ab60ab36afd94893b34ba773aad0819159049a1525308fee874ac4d5f

      • C:\Windows\SysWOW64\Cildom32.exe

        Filesize

        404KB

        MD5

        ccf947e16722584a24e5551e7eb2fad4

        SHA1

        2b518548d3863e3fd71fb9f7666a3850f42ec7a4

        SHA256

        4b194b2552658f06a6e1a6c1fc0587efab421374a1da228333be1d93006f2cad

        SHA512

        e97704f820561858ef4d2b9511bc0fa2012e0401f2520ce9351bb60ebf7d6975e17da14f9338df33a97251b001aef0ac51f5eeb6f09caca2216c1f3d488659bc

      • C:\Windows\SysWOW64\Ckbncapd.exe

        Filesize

        404KB

        MD5

        5c7559a79d38f65c8dd556d327308ba8

        SHA1

        0c6e61a0260b4e01e81cec3bb5393b703c492bf1

        SHA256

        c13b014d0c51d2efaa8e79549d5411e4b04afb6d4194bab69d4725b19be640ab

        SHA512

        7ad766c24763c3809dc5c4dfc553565209bd76a4f8bc765f16eab388712f80379542ea2910d7883fe804f1e1985398a84a7fc0fe020060c4ae5b0f6d2808358c

      • C:\Windows\SysWOW64\Ckdkhq32.exe

        Filesize

        404KB

        MD5

        0af647ae53651351e63ef8d81c40f777

        SHA1

        77fb9c820fe3c9cbb60f26b07fa214716526abe9

        SHA256

        8eb2e413182d17225cf878cda821efbd5e3afeae81f9431cf941a813fa65fac6

        SHA512

        484232d08c5bd8e72203b23d84a764c6f5046049d7059af91cfcbfcc8b5c607fd6a97ea6733ff44b5f63870f15ce86e012d8708ea8f749478a2d8f6c7ea350b8

      • C:\Windows\SysWOW64\Ddcebe32.exe

        Filesize

        404KB

        MD5

        0ffe9fca96dc03319e2f736675e00c5b

        SHA1

        d9544ace631e68344e4e7d845f99d3a7776e8e87

        SHA256

        6fde4d03f45f714d591921aa887338ecf2d577bdf759d691122b7bcd6528cf46

        SHA512

        75e4a54d4fe94e5818cb4bc43e4fce35e4033fb90b4f9beca9c69674f3738ef486a029e6e3ef5250687d9d9e0ddd1b4f107f3121349c06002bfceb2670136240

      • C:\Windows\SysWOW64\Ddfbgelh.exe

        Filesize

        404KB

        MD5

        95c202244d8d78774a00819c83121f04

        SHA1

        1fce164792540d9de38f3a563584a66c84ca0baf

        SHA256

        11a069b7e4dfee034910b80fe376780590de89a78b400af7e4a2aac724cba872

        SHA512

        ac72ff424b635b5bceda35a47974caef736b61e5c1895fe7bca81039496787750430d629b54b29a7aebeca463066b4a2587fc5358cbc1f42ab14cc89f8520a6c

      • C:\Windows\SysWOW64\Ddklbd32.exe

        Filesize

        404KB

        MD5

        65e374b7f0dd1119731b286c09ae62ea

        SHA1

        b162720f8fcf117d1ad97e0b9579f26cdce6f956

        SHA256

        206307ff867e34878f86aaf4c359d77672d559ba12bc5a1302a621645d1ac6c8

        SHA512

        dce159d561646e6d5c64226e3905948e7c09907855aa96c184e399d407d83dccbbfc8d2556c4f1f2ac6e216a77492c4ee2fc8fb1ba2317ab003476cd2c9fef94

      • C:\Windows\SysWOW64\Dgdncplk.exe

        Filesize

        404KB

        MD5

        e2243231c60ea976381ee42b2cf8f4a5

        SHA1

        57a016312ddcb9920c4b4ff5bd5a7f8c77256487

        SHA256

        22f8c27e34d4801ca4aa5304537e369c6a4ae26cdd1c914f2d9b54bc85e5196b

        SHA512

        2643d23843553b7cf19762c41b2cb9056759dcca1fb0ae6e6e5623bd8f476548d2be752b08afa5d67b4bfaf6177f1cc94ba0a59bd0964b8c716212ef6567054b

      • C:\Windows\SysWOW64\Dggkipii.exe

        Filesize

        404KB

        MD5

        ca5239b09cb5450e06f040fdaf76a815

        SHA1

        db9b8ce125a5a9c795bca30beb0fa832e3b988a2

        SHA256

        a03a230ec5ab7af065b8e56b1a9f77977227cb22bf6edaea8bfd1740c8e0324c

        SHA512

        4189ba2857e44460cabddc0f856d04d26bb60fb4bdc4ad92f0a0b5a09b1f0a24ed5bdbfb9bff164b046d550119fe365c12a94d4804bf7e6e9a5f9d1de26d5b88

      • C:\Windows\SysWOW64\Dgihop32.exe

        Filesize

        404KB

        MD5

        90e472be07de38ff8b3e7fde1797be7e

        SHA1

        5f39d3b12b49736e09487fe891f71a2612f67479

        SHA256

        c4ae5d70d3abf3e51c52ba9a3ac144cb722c0fe85e0ea074710aeb46367f1ddc

        SHA512

        4fd9fdb177ab2af2172ea200d9b1b3cf16010bd8387890315066fb965c1d51a73cc7c9b2aa1c81e5834069a907db03062fc32c1ccb5d83d691c5acd29cef12bb

      • C:\Windows\SysWOW64\Dncpkjoc.exe

        Filesize

        404KB

        MD5

        760a672bc1023484dd9038957a081783

        SHA1

        0ea6bedee8ef7881287c16468cf802172e167cdf

        SHA256

        e62dad0e1a50f6ed15d246f3ce43b6eec37ce02f3605a14832bbf1930d4899af

        SHA512

        4c94cd13649748feee95b30c1567306141c2cad51c6a66b5e1cf62b6748de429d63701d26287a71c65bb5ffa4727dd9557cc4b83963555f3fe4a8c5b7d48e281

      • C:\Windows\SysWOW64\Dnqcfjae.exe

        Filesize

        404KB

        MD5

        6e6939b0bbce45680729277da09f0c5a

        SHA1

        404aa4a166c015fa217eef5bb52a00389e23322e

        SHA256

        76572a00079e0896976657a9eefc9f4f6bfc0e5ecb59cb67977febbd1a68a640

        SHA512

        820d7f9d6f3c175657bb10b9beb7e8c057d7b0838c52e715d5c1e9c6bbf22a7b0fa305485d176bff99c350846a76eefaf69e86072c7334bb3e54c246f3ceb512

      • C:\Windows\SysWOW64\Dooaccfg.dll

        Filesize

        7KB

        MD5

        e9487cefc8a3f6f1b85cea6f0963b0f7

        SHA1

        0a1d90b07064fa9e94fee8d634a6ce25078097b9

        SHA256

        c8aee7d7e70fdc12da21892a7a501511f34a38003320c28f6ff44b7e7ca8da41

        SHA512

        28820a7f2073762aa6abcb48cd6df2a4c9e83a377ea71a186c35c8ebae71e1fb791fbccc09fc944faa62586bed71dd5578ddc16f4cc6ace80c34b21812bf21df

      • C:\Windows\SysWOW64\Dpalgenf.exe

        Filesize

        404KB

        MD5

        76de97ab8d3abed9c0a10cc59851853e

        SHA1

        3ee936613ca2f5487be7c3943b5ca18e62731fed

        SHA256

        645dfb86c9640b80a70dccdd1620f53cf71034a9987c624a44536611c44d8d39

        SHA512

        2cbb3d8b1773d0675ad3fde6c6697ab1f802c885049a3683f80e7c1424bdca3c2ccc298c7050d596d9846844df48473a4bdbddd4adc148b2ce41905a1fb6952d

      • C:\Windows\SysWOW64\Eafbmgad.exe

        Filesize

        404KB

        MD5

        c080034a8d541e7f0c2b2b8cc71c8944

        SHA1

        39b3d822793f1172c65476db32a86fc8ac5e8627

        SHA256

        15fa499842b97cc1c0a29a97322231924dfeef032b129e75e5b3fcba0413e53c

        SHA512

        1948f7cb235c2301ed12a2c4d7a0dc781a29190e08d81a57734c527eedd12eeeca7134940025ff3ca51ce0ba91b86c83ba46e764e22059e64dbb9d0d5ce3bb2d

      • C:\Windows\SysWOW64\Eahobg32.exe

        Filesize

        404KB

        MD5

        65da558e392c170650556f33ecc4d6a3

        SHA1

        cf45d07a26f9a34dd97ec87374e6feb54c88644e

        SHA256

        17bb97994310ad82c0f406d3e25cbc866c8def1603daa35e1d8918666eb440bf

        SHA512

        94a55967a728bbd6452b27101c621b45a5b7c51f5e7747af4fa082fb8b3a775a6e29c3ad1b08353a628da8c9eb580644a8a184a3dc29d314ef88876b597ee764

      • C:\Windows\SysWOW64\Ecdbop32.exe

        Filesize

        404KB

        MD5

        75a31d7742a5cc99cb13394404ee4d54

        SHA1

        e42f2151d7952bcc8a1fd4e862d1b85e47d7e71e

        SHA256

        78c70089eaa7fd07f686bff5cbec864259a9cb92a42ddfe93e757f0c2f2c7f47

        SHA512

        32f4ee886597a68a7dbf3f9cb4634b910b82d6b6c0e44620cf8a0c6f255f2e80d743e18947167dd23af888b64cf0c32e2271a401e68cfbf1d57264af0dcf3657

      • C:\Windows\SysWOW64\Ecgodpgb.exe

        Filesize

        404KB

        MD5

        f95daab225493e6584cbaf89b2aeb122

        SHA1

        8e1e5fc5563fbc04f670029a74f34ef927b414bf

        SHA256

        9158e4c4821b26e3ff0dbaf8eed6722d92886645accbc24143a19cebbb3b4f45

        SHA512

        d9901bceaa15d3ea5b9297f91116b5ff9544e2bd5f36e436b4b3f503e779c569e4bbfafbb95edec821f14c368bc9e2587303d2372fa8229c7e298a8865b4ef62

      • C:\Windows\SysWOW64\Eddnic32.exe

        Filesize

        404KB

        MD5

        e13aa18aa5c286676e53c59e7eea5b79

        SHA1

        2cf37d03b16e414f3533d3884e29aca9cae69b16

        SHA256

        f676c590d842722bf4ce1c4c2188ae83414616b1c13db193e46caf7a2682a96f

        SHA512

        21f63a3fe465bc930aebe131bacfe31d17d7275a228f7ce16057c8c8f5ba0e95fb462a3f588d20adb586dc41bb2c4b8da63275c54129180fbbf6691b2aca53aa

      • C:\Windows\SysWOW64\Edfknb32.exe

        Filesize

        404KB

        MD5

        e1d133da0a1718a1c3e9b9f828cbca61

        SHA1

        72f978632848a14b0a8ce63a2175e481dbe5b191

        SHA256

        490e6467755954a2ce741060afecfdd27abc306fbda47ac7717ad4290118d365

        SHA512

        c7c2d3def96ce13ceba58bd8a56bf565a30448b61c994dc5a1b3a25f39cba46640cf8ac04e74a490d54aef5b0766cecfaf669fb36b5df6996341a23e1542757b

      • C:\Windows\SysWOW64\Egkddo32.exe

        Filesize

        404KB

        MD5

        83d7907fa76846b5f32997bd88cd2366

        SHA1

        0bb3035880839fb04efd81b54ade636d61d97aea

        SHA256

        e07cb7c0b0835a78be392502f00028aa73e41aa5708f87e6331bae3be608a7e1

        SHA512

        866059c7c10b87aca2f76f23c01f8ccc171dd2541ce6ce30f70c0deb8c2181b0ad80cc63d102289095a6ca1cfa08f71c9a373efd33f87f96df7cb95997ae8548

      • C:\Windows\SysWOW64\Ejjaqk32.exe

        Filesize

        404KB

        MD5

        9b0e5af09ac094f34b9f378e97893c28

        SHA1

        2e9ad297f4f0824582e3264ac1c695c3d5170d22

        SHA256

        173aace9bd1f4026d4e72877951e25b6aa8c32b4821a7ece2be60bab930c6e1e

        SHA512

        b91442550d54bfae7066fe0c6050ad7bab29b58287e74ccf4472f188a06f01fbf8a7963831b240982589b4c4fe77855871a258003b49f0cbf9c7ce9168e1c9d3

      • C:\Windows\SysWOW64\Ekimjn32.exe

        Filesize

        404KB

        MD5

        02dfefb81c61cd921143d434ad5c22b2

        SHA1

        9aa9b27f7ab064dcc2117cf6891f35b7ab5b3173

        SHA256

        17ef7fef1f026fa079f5e6b2ba571b865b742e25b57eb2c2318ecce2e46a8238

        SHA512

        a2823ebb1a1e0c95c1ee23c1e8b43537311523106fedbe11bf1be98f10c8541a9c81dff84cc3e7e882ca460ec9aea44f38fbd1ae8f3a429a448ed5f228b453ea

      • C:\Windows\SysWOW64\Ekljpm32.exe

        Filesize

        404KB

        MD5

        9cb0be0b164342c25579adb9dfb1c91d

        SHA1

        77f952a4f3aaed4c07b6104a70ed140228d0cb49

        SHA256

        6795c7b61e2ac95ad87b1adce3f598056db8d1a30db277b46338ded691ffd372

        SHA512

        35f79ae816c8c9c5adf8e5ed637767c03b1b587cb4f2f7a3107078acf4307ead6bbea8932cfc14b1d9500e63029df3d2b08c3f3fabde2517445c0e1b01e0fc83

      • C:\Windows\SysWOW64\Ekngemhd.exe

        Filesize

        404KB

        MD5

        a9456451320661dea249a1e0eed8c068

        SHA1

        978ddc6a429538386d6b6a85f0a67356336835fe

        SHA256

        fd7bb87a71d8879f3fcc8fab752c1fb252e40781c73ee811c1595c309f4e1869

        SHA512

        ade25e99ab288c81cf2ce3d4d11ec416f5873304ef93fafad3177aa5068a168852dee91ce0d29580ce8196dc66b7cfed49bf06414c6caef479f8d312028c3d94

      • C:\Windows\SysWOW64\Enhifi32.exe

        Filesize

        404KB

        MD5

        bc9e3019b89069f6ca74730d50415932

        SHA1

        a5f89c64ee0b18d1f54719f98733a1d2db802580

        SHA256

        8cff2988daa8f99dab64f79a50553132b8cacae9d5d89e44fe3f648b2bf36c01

        SHA512

        03d659f04b86eae90cc9c7b677ab8fe531b124d1a5d7b77ced2932b54440828c1c41338912fe8c0a2954887e9e82df5b3b3fb0fc47997808e323d76d91021255

      • C:\Windows\SysWOW64\Enjfli32.exe

        Filesize

        404KB

        MD5

        12a0ce3c784642ee56add221dcab9f57

        SHA1

        2bda563a74c14f6ff30f6ea48c0a4a408758ed0a

        SHA256

        ac19634f9f56fd514c9d174361d7fba6f4b0d5b2ebe36ab7c09741c19f4d3bff

        SHA512

        8ade653abc74bf48420728a7114981b3da8ae5d9b141fe15361429a7ee9bd07bbe1c08c38119580fb508106ea5ef64543cbeca41ac5553cd024e5b69d1e0a061

      • C:\Windows\SysWOW64\Enlcahgh.exe

        Filesize

        404KB

        MD5

        c9d00bbf10db2b9408c4350626e8abf5

        SHA1

        7b568ec2c8a8c2f71107c7a932e4b72cfa987db9

        SHA256

        bd210fbfd531fa1c584cf4acc40b5ac9f3fbeb61031ebff469d3c23ac5a1c841

        SHA512

        32d3db73596ab4197888869b2324b2417cd0db81518a5a4d4c30bcfc81477a6656835a61cf73c9f1c8757a6bc0b3a991793c8f3903cbea21db303bac75eac0ac

      • C:\Windows\SysWOW64\Epffbd32.exe

        Filesize

        404KB

        MD5

        d732450d61ade123c6c27c8c5ea0eb34

        SHA1

        2712d49c08329c7ac2849b681de0d4c1085b3452

        SHA256

        1b2127c1cbbf37b5301d455bf52cc1365010f3b0ca3e143fd365e14fd0e82c91

        SHA512

        4438c1826a1b517e244bb09fef6a179d56adcce52607019d7f317042f9b2fb330c50b2faceac9458d67d79a3381370c44772747fb6b6497610522d1fdbb0a7e1

      • memory/32-274-0x0000000000400000-0x0000000000440000-memory.dmp

        Filesize

        256KB

      • memory/340-0-0x0000000000400000-0x0000000000440000-memory.dmp

        Filesize

        256KB

      • memory/340-80-0x0000000000400000-0x0000000000440000-memory.dmp

        Filesize

        256KB

      • memory/612-89-0x0000000000400000-0x0000000000440000-memory.dmp

        Filesize

        256KB

      • memory/612-12-0x0000000000400000-0x0000000000440000-memory.dmp

        Filesize

        256KB

      • memory/816-138-0x0000000000400000-0x0000000000440000-memory.dmp

        Filesize

        256KB

      • memory/816-47-0x0000000000400000-0x0000000000440000-memory.dmp

        Filesize

        256KB

      • memory/960-304-0x0000000000400000-0x0000000000440000-memory.dmp

        Filesize

        256KB

      • memory/1176-148-0x0000000000400000-0x0000000000440000-memory.dmp

        Filesize

        256KB

      • memory/1208-258-0x0000000000400000-0x0000000000440000-memory.dmp

        Filesize

        256KB

      • memory/1400-112-0x0000000000400000-0x0000000000440000-memory.dmp

        Filesize

        256KB

      • memory/1516-72-0x0000000000400000-0x0000000000440000-memory.dmp

        Filesize

        256KB

      • memory/1516-165-0x0000000000400000-0x0000000000440000-memory.dmp

        Filesize

        256KB

      • memory/1532-56-0x0000000000400000-0x0000000000440000-memory.dmp

        Filesize

        256KB

      • memory/1532-147-0x0000000000400000-0x0000000000440000-memory.dmp

        Filesize

        256KB

      • memory/1584-111-0x0000000000400000-0x0000000000440000-memory.dmp

        Filesize

        256KB

      • memory/1584-24-0x0000000000400000-0x0000000000440000-memory.dmp

        Filesize

        256KB

      • memory/1644-242-0x0000000000400000-0x0000000000440000-memory.dmp

        Filesize

        256KB

      • memory/1652-192-0x0000000000400000-0x0000000000440000-memory.dmp

        Filesize

        256KB

      • memory/1652-98-0x0000000000400000-0x0000000000440000-memory.dmp

        Filesize

        256KB

      • memory/1756-346-0x0000000000400000-0x0000000000440000-memory.dmp

        Filesize

        256KB

      • memory/1848-193-0x0000000000400000-0x0000000000440000-memory.dmp

        Filesize

        256KB

      • memory/1928-15-0x0000000000400000-0x0000000000440000-memory.dmp

        Filesize

        256KB

      • memory/1928-97-0x0000000000400000-0x0000000000440000-memory.dmp

        Filesize

        256KB

      • memory/2008-201-0x0000000000400000-0x0000000000440000-memory.dmp

        Filesize

        256KB

      • memory/2152-81-0x0000000000400000-0x0000000000440000-memory.dmp

        Filesize

        256KB

      • memory/2152-174-0x0000000000400000-0x0000000000440000-memory.dmp

        Filesize

        256KB

      • memory/2236-266-0x0000000000400000-0x0000000000440000-memory.dmp

        Filesize

        256KB

      • memory/2264-210-0x0000000000400000-0x0000000000440000-memory.dmp

        Filesize

        256KB

      • memory/2340-298-0x0000000000400000-0x0000000000440000-memory.dmp

        Filesize

        256KB

      • memory/2356-316-0x0000000000400000-0x0000000000440000-memory.dmp

        Filesize

        256KB

      • memory/2360-117-0x0000000000400000-0x0000000000440000-memory.dmp

        Filesize

        256KB

      • memory/2360-209-0x0000000000400000-0x0000000000440000-memory.dmp

        Filesize

        256KB

      • memory/2488-334-0x0000000000400000-0x0000000000440000-memory.dmp

        Filesize

        256KB

      • memory/2564-226-0x0000000000400000-0x0000000000440000-memory.dmp

        Filesize

        256KB

      • memory/2764-157-0x0000000000400000-0x0000000000440000-memory.dmp

        Filesize

        256KB

      • memory/2776-234-0x0000000000400000-0x0000000000440000-memory.dmp

        Filesize

        256KB

      • memory/2812-250-0x0000000000400000-0x0000000000440000-memory.dmp

        Filesize

        256KB

      • memory/2924-310-0x0000000000400000-0x0000000000440000-memory.dmp

        Filesize

        256KB

      • memory/2988-322-0x0000000000400000-0x0000000000440000-memory.dmp

        Filesize

        256KB

      • memory/3208-130-0x0000000000400000-0x0000000000440000-memory.dmp

        Filesize

        256KB

      • memory/3236-166-0x0000000000400000-0x0000000000440000-memory.dmp

        Filesize

        256KB

      • memory/3240-280-0x0000000000400000-0x0000000000440000-memory.dmp

        Filesize

        256KB

      • memory/3664-40-0x0000000000400000-0x0000000000440000-memory.dmp

        Filesize

        256KB

      • memory/3664-129-0x0000000000400000-0x0000000000440000-memory.dmp

        Filesize

        256KB

      • memory/3924-32-0x0000000000400000-0x0000000000440000-memory.dmp

        Filesize

        256KB

      • memory/3924-116-0x0000000000400000-0x0000000000440000-memory.dmp

        Filesize

        256KB

      • memory/4004-175-0x0000000000400000-0x0000000000440000-memory.dmp

        Filesize

        256KB

      • memory/4012-340-0x0000000000400000-0x0000000000440000-memory.dmp

        Filesize

        256KB

      • memory/4036-292-0x0000000000400000-0x0000000000440000-memory.dmp

        Filesize

        256KB

      • memory/4064-139-0x0000000000400000-0x0000000000440000-memory.dmp

        Filesize

        256KB

      • memory/4396-328-0x0000000000400000-0x0000000000440000-memory.dmp

        Filesize

        256KB

      • memory/4608-183-0x0000000000400000-0x0000000000440000-memory.dmp

        Filesize

        256KB

      • memory/4608-90-0x0000000000400000-0x0000000000440000-memory.dmp

        Filesize

        256KB

      • memory/4784-156-0x0000000000400000-0x0000000000440000-memory.dmp

        Filesize

        256KB

      • memory/4784-63-0x0000000000400000-0x0000000000440000-memory.dmp

        Filesize

        256KB

      • memory/4904-286-0x0000000000400000-0x0000000000440000-memory.dmp

        Filesize

        256KB

      • memory/5072-218-0x0000000000400000-0x0000000000440000-memory.dmp

        Filesize

        256KB

      • memory/5112-184-0x0000000000400000-0x0000000000440000-memory.dmp

        Filesize

        256KB

      • memory/5164-352-0x0000000000400000-0x0000000000440000-memory.dmp

        Filesize

        256KB

      • memory/5200-358-0x0000000000400000-0x0000000000440000-memory.dmp

        Filesize

        256KB

      • memory/5244-364-0x0000000000400000-0x0000000000440000-memory.dmp

        Filesize

        256KB

      • memory/5276-370-0x0000000000400000-0x0000000000440000-memory.dmp

        Filesize

        256KB

      • memory/5324-376-0x0000000000400000-0x0000000000440000-memory.dmp

        Filesize

        256KB

      • memory/5364-382-0x0000000000400000-0x0000000000440000-memory.dmp

        Filesize

        256KB

      • memory/5396-388-0x0000000000400000-0x0000000000440000-memory.dmp

        Filesize

        256KB

      • memory/5444-394-0x0000000000400000-0x0000000000440000-memory.dmp

        Filesize

        256KB

      • memory/5476-400-0x0000000000400000-0x0000000000440000-memory.dmp

        Filesize

        256KB

      • memory/5516-406-0x0000000000400000-0x0000000000440000-memory.dmp

        Filesize

        256KB

      • memory/5564-412-0x0000000000400000-0x0000000000440000-memory.dmp

        Filesize

        256KB

      • memory/5604-418-0x0000000000400000-0x0000000000440000-memory.dmp

        Filesize

        256KB

      • memory/5636-424-0x0000000000400000-0x0000000000440000-memory.dmp

        Filesize

        256KB

      • memory/5684-430-0x0000000000400000-0x0000000000440000-memory.dmp

        Filesize

        256KB

      • memory/5716-432-0x0000000000400000-0x0000000000440000-memory.dmp

        Filesize

        256KB