Analysis

  • max time kernel
    148s
  • max time network
    151s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20241007-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system
  • submitted
    19-11-2024 09:38

General

  • Target

    5cc8f3bb4bcbd79cd9763878648df273d1957228a72bda725653b3db3346a8a4.exe

  • Size

    96KB

  • MD5

    af4f6bd986af33d834cf5ff72a59cb40

  • SHA1

    91aa2bbd828afa1cc4e0f973273dd4a3bdae1f55

  • SHA256

    5cc8f3bb4bcbd79cd9763878648df273d1957228a72bda725653b3db3346a8a4

  • SHA512

    e16f95cf7977e6795925f7f532cdeebaa1ea40f2082547f9f3f0eeec4168b6811a0c7d4776de46b3d5151e919c64d499e83853a7700a3f246a0340b3259ed940

  • SSDEEP

    1536:4Yl1iCqEqEsjeotjhctOXwSIE0w8HQdjZ9v2La7RZObZUUWaegPYA1:7lXqEsj/tjoOXwSILXwRQaClUUWaey

Malware Config

Extracted

Family

berbew

C2

http://crutop.nu/index.php

http://crutop.ru/index.php

http://mazafaka.ru/index.php

http://color-bank.ru/index.php

http://asechka.ru/index.php

http://trojan.ru/index.php

http://fuck.ru/index.php

http://goldensand.ru/index.php

http://filesearch.ru/index.php

http://devx.nm.ru/index.php

http://ros-neftbank.ru/index.php

http://lovingod.host.sk/index.php

http://www.redline.ru/index.php

http://cvv.ru/index.php

http://hackers.lv/index.php

http://fethard.biz/index.php

http://ldark.nm.ru/index.htm

http://gaz-prom.ru/index.htm

http://promo.ru/index.htm

http://potleaf.chat.ru/index.htm

Signatures

  • Adds autorun key to be loaded by Explorer.exe on startup 2 TTPs 64 IoCs
  • Berbew

    Berbew is a backdoor written in C++.

  • Berbew family
  • Executes dropped EXE 64 IoCs
  • Drops file in System32 directory 64 IoCs
  • Program crash 1 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 64 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Modifies registry class 64 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\5cc8f3bb4bcbd79cd9763878648df273d1957228a72bda725653b3db3346a8a4.exe
    "C:\Users\Admin\AppData\Local\Temp\5cc8f3bb4bcbd79cd9763878648df273d1957228a72bda725653b3db3346a8a4.exe"
    1⤵
    • Adds autorun key to be loaded by Explorer.exe on startup
    • System Location Discovery: System Language Discovery
    • Modifies registry class
    • Suspicious use of WriteProcessMemory
    PID:4156
    • C:\Windows\SysWOW64\Qgqeappe.exe
      C:\Windows\system32\Qgqeappe.exe
      2⤵
      • Adds autorun key to be loaded by Explorer.exe on startup
      • Executes dropped EXE
      • Drops file in System32 directory
      • System Location Discovery: System Language Discovery
      • Modifies registry class
      • Suspicious use of WriteProcessMemory
      PID:3188
      • C:\Windows\SysWOW64\Qmmnjfnl.exe
        C:\Windows\system32\Qmmnjfnl.exe
        3⤵
        • Adds autorun key to be loaded by Explorer.exe on startup
        • Executes dropped EXE
        • System Location Discovery: System Language Discovery
        • Modifies registry class
        • Suspicious use of WriteProcessMemory
        PID:4056
        • C:\Windows\SysWOW64\Qcgffqei.exe
          C:\Windows\system32\Qcgffqei.exe
          4⤵
          • Adds autorun key to be loaded by Explorer.exe on startup
          • Executes dropped EXE
          • Drops file in System32 directory
          • System Location Discovery: System Language Discovery
          • Modifies registry class
          • Suspicious use of WriteProcessMemory
          PID:4244
          • C:\Windows\SysWOW64\Qffbbldm.exe
            C:\Windows\system32\Qffbbldm.exe
            5⤵
            • Adds autorun key to be loaded by Explorer.exe on startup
            • Executes dropped EXE
            • System Location Discovery: System Language Discovery
            • Modifies registry class
            • Suspicious use of WriteProcessMemory
            PID:4020
            • C:\Windows\SysWOW64\Ampkof32.exe
              C:\Windows\system32\Ampkof32.exe
              6⤵
              • Adds autorun key to be loaded by Explorer.exe on startup
              • Executes dropped EXE
              • Drops file in System32 directory
              • System Location Discovery: System Language Discovery
              • Modifies registry class
              • Suspicious use of WriteProcessMemory
              PID:2560
              • C:\Windows\SysWOW64\Acjclpcf.exe
                C:\Windows\system32\Acjclpcf.exe
                7⤵
                • Adds autorun key to be loaded by Explorer.exe on startup
                • Executes dropped EXE
                • System Location Discovery: System Language Discovery
                • Modifies registry class
                • Suspicious use of WriteProcessMemory
                PID:4708
                • C:\Windows\SysWOW64\Ajckij32.exe
                  C:\Windows\system32\Ajckij32.exe
                  8⤵
                  • Executes dropped EXE
                  • System Location Discovery: System Language Discovery
                  • Suspicious use of WriteProcessMemory
                  PID:1688
                  • C:\Windows\SysWOW64\Aqncedbp.exe
                    C:\Windows\system32\Aqncedbp.exe
                    9⤵
                    • Adds autorun key to be loaded by Explorer.exe on startup
                    • Executes dropped EXE
                    • Drops file in System32 directory
                    • System Location Discovery: System Language Discovery
                    • Modifies registry class
                    • Suspicious use of WriteProcessMemory
                    PID:1064
                    • C:\Windows\SysWOW64\Agglboim.exe
                      C:\Windows\system32\Agglboim.exe
                      10⤵
                      • Adds autorun key to be loaded by Explorer.exe on startup
                      • Executes dropped EXE
                      • Modifies registry class
                      • Suspicious use of WriteProcessMemory
                      PID:3056
                      • C:\Windows\SysWOW64\Anadoi32.exe
                        C:\Windows\system32\Anadoi32.exe
                        11⤵
                        • Executes dropped EXE
                        • System Location Discovery: System Language Discovery
                        • Modifies registry class
                        • Suspicious use of WriteProcessMemory
                        PID:3728
                        • C:\Windows\SysWOW64\Aqppkd32.exe
                          C:\Windows\system32\Aqppkd32.exe
                          12⤵
                          • Adds autorun key to be loaded by Explorer.exe on startup
                          • Executes dropped EXE
                          • Drops file in System32 directory
                          • System Location Discovery: System Language Discovery
                          • Modifies registry class
                          • Suspicious use of WriteProcessMemory
                          PID:692
                          • C:\Windows\SysWOW64\Acnlgp32.exe
                            C:\Windows\system32\Acnlgp32.exe
                            13⤵
                            • Executes dropped EXE
                            • Drops file in System32 directory
                            • System Location Discovery: System Language Discovery
                            • Suspicious use of WriteProcessMemory
                            PID:4872
                            • C:\Windows\SysWOW64\Afmhck32.exe
                              C:\Windows\system32\Afmhck32.exe
                              14⤵
                              • Executes dropped EXE
                              • Modifies registry class
                              • Suspicious use of WriteProcessMemory
                              PID:3568
                              • C:\Windows\SysWOW64\Andqdh32.exe
                                C:\Windows\system32\Andqdh32.exe
                                15⤵
                                • Adds autorun key to be loaded by Explorer.exe on startup
                                • Executes dropped EXE
                                • System Location Discovery: System Language Discovery
                                • Suspicious use of WriteProcessMemory
                                PID:552
                                • C:\Windows\SysWOW64\Aeniabfd.exe
                                  C:\Windows\system32\Aeniabfd.exe
                                  16⤵
                                  • Adds autorun key to be loaded by Explorer.exe on startup
                                  • Executes dropped EXE
                                  • Drops file in System32 directory
                                  • System Location Discovery: System Language Discovery
                                  • Suspicious use of WriteProcessMemory
                                  PID:2228
                                  • C:\Windows\SysWOW64\Afoeiklb.exe
                                    C:\Windows\system32\Afoeiklb.exe
                                    17⤵
                                    • Adds autorun key to be loaded by Explorer.exe on startup
                                    • Executes dropped EXE
                                    • System Location Discovery: System Language Discovery
                                    • Modifies registry class
                                    • Suspicious use of WriteProcessMemory
                                    PID:2664
                                    • C:\Windows\SysWOW64\Anfmjhmd.exe
                                      C:\Windows\system32\Anfmjhmd.exe
                                      18⤵
                                      • Adds autorun key to be loaded by Explorer.exe on startup
                                      • Executes dropped EXE
                                      • Modifies registry class
                                      • Suspicious use of WriteProcessMemory
                                      PID:828
                                      • C:\Windows\SysWOW64\Aepefb32.exe
                                        C:\Windows\system32\Aepefb32.exe
                                        19⤵
                                        • Adds autorun key to be loaded by Explorer.exe on startup
                                        • Executes dropped EXE
                                        • Drops file in System32 directory
                                        • System Location Discovery: System Language Discovery
                                        • Modifies registry class
                                        • Suspicious use of WriteProcessMemory
                                        PID:392
                                        • C:\Windows\SysWOW64\Agoabn32.exe
                                          C:\Windows\system32\Agoabn32.exe
                                          20⤵
                                          • Adds autorun key to be loaded by Explorer.exe on startup
                                          • Executes dropped EXE
                                          • Drops file in System32 directory
                                          • System Location Discovery: System Language Discovery
                                          • Modifies registry class
                                          • Suspicious use of WriteProcessMemory
                                          PID:2488
                                          • C:\Windows\SysWOW64\Bjmnoi32.exe
                                            C:\Windows\system32\Bjmnoi32.exe
                                            21⤵
                                            • Adds autorun key to be loaded by Explorer.exe on startup
                                            • Executes dropped EXE
                                            • Modifies registry class
                                            • Suspicious use of WriteProcessMemory
                                            PID:4292
                                            • C:\Windows\SysWOW64\Bmkjkd32.exe
                                              C:\Windows\system32\Bmkjkd32.exe
                                              22⤵
                                              • Adds autorun key to be loaded by Explorer.exe on startup
                                              • Executes dropped EXE
                                              • Drops file in System32 directory
                                              • System Location Discovery: System Language Discovery
                                              • Modifies registry class
                                              • Suspicious use of WriteProcessMemory
                                              PID:3588
                                              • C:\Windows\SysWOW64\Bebblb32.exe
                                                C:\Windows\system32\Bebblb32.exe
                                                23⤵
                                                • Adds autorun key to be loaded by Explorer.exe on startup
                                                • Executes dropped EXE
                                                • Drops file in System32 directory
                                                • System Location Discovery: System Language Discovery
                                                • Modifies registry class
                                                PID:3708
                                                • C:\Windows\SysWOW64\Bfdodjhm.exe
                                                  C:\Windows\system32\Bfdodjhm.exe
                                                  24⤵
                                                  • Adds autorun key to be loaded by Explorer.exe on startup
                                                  • Executes dropped EXE
                                                  • System Location Discovery: System Language Discovery
                                                  PID:3732
                                                  • C:\Windows\SysWOW64\Bjokdipf.exe
                                                    C:\Windows\system32\Bjokdipf.exe
                                                    25⤵
                                                    • Executes dropped EXE
                                                    • Drops file in System32 directory
                                                    • System Location Discovery: System Language Discovery
                                                    • Modifies registry class
                                                    PID:2116
                                                    • C:\Windows\SysWOW64\Beeoaapl.exe
                                                      C:\Windows\system32\Beeoaapl.exe
                                                      26⤵
                                                      • Executes dropped EXE
                                                      • Drops file in System32 directory
                                                      • System Location Discovery: System Language Discovery
                                                      PID:3864
                                                      • C:\Windows\SysWOW64\Bffkij32.exe
                                                        C:\Windows\system32\Bffkij32.exe
                                                        27⤵
                                                        • Adds autorun key to be loaded by Explorer.exe on startup
                                                        • Executes dropped EXE
                                                        • System Location Discovery: System Language Discovery
                                                        PID:3200
                                                        • C:\Windows\SysWOW64\Bnmcjg32.exe
                                                          C:\Windows\system32\Bnmcjg32.exe
                                                          28⤵
                                                          • Adds autorun key to be loaded by Explorer.exe on startup
                                                          • Executes dropped EXE
                                                          • Drops file in System32 directory
                                                          • System Location Discovery: System Language Discovery
                                                          PID:4864
                                                          • C:\Windows\SysWOW64\Bfhhoi32.exe
                                                            C:\Windows\system32\Bfhhoi32.exe
                                                            29⤵
                                                            • Adds autorun key to be loaded by Explorer.exe on startup
                                                            • Executes dropped EXE
                                                            • System Location Discovery: System Language Discovery
                                                            • Modifies registry class
                                                            PID:4624
                                                            • C:\Windows\SysWOW64\Bnpppgdj.exe
                                                              C:\Windows\system32\Bnpppgdj.exe
                                                              30⤵
                                                              • Executes dropped EXE
                                                              • Drops file in System32 directory
                                                              • System Location Discovery: System Language Discovery
                                                              • Modifies registry class
                                                              PID:2724
                                                              • C:\Windows\SysWOW64\Banllbdn.exe
                                                                C:\Windows\system32\Banllbdn.exe
                                                                31⤵
                                                                • Executes dropped EXE
                                                                • Drops file in System32 directory
                                                                PID:1260
                                                                • C:\Windows\SysWOW64\Bfkedibe.exe
                                                                  C:\Windows\system32\Bfkedibe.exe
                                                                  32⤵
                                                                  • Adds autorun key to be loaded by Explorer.exe on startup
                                                                  • Executes dropped EXE
                                                                  • Drops file in System32 directory
                                                                  • System Location Discovery: System Language Discovery
                                                                  • Modifies registry class
                                                                  PID:5068
                                                                  • C:\Windows\SysWOW64\Bmemac32.exe
                                                                    C:\Windows\system32\Bmemac32.exe
                                                                    33⤵
                                                                    • Adds autorun key to be loaded by Explorer.exe on startup
                                                                    • Executes dropped EXE
                                                                    • Drops file in System32 directory
                                                                    • System Location Discovery: System Language Discovery
                                                                    • Modifies registry class
                                                                    PID:624
                                                                    • C:\Windows\SysWOW64\Bapiabak.exe
                                                                      C:\Windows\system32\Bapiabak.exe
                                                                      34⤵
                                                                      • Executes dropped EXE
                                                                      • Drops file in System32 directory
                                                                      • System Location Discovery: System Language Discovery
                                                                      PID:1368
                                                                      • C:\Windows\SysWOW64\Chjaol32.exe
                                                                        C:\Windows\system32\Chjaol32.exe
                                                                        35⤵
                                                                        • Adds autorun key to be loaded by Explorer.exe on startup
                                                                        • Executes dropped EXE
                                                                        • Drops file in System32 directory
                                                                        • System Location Discovery: System Language Discovery
                                                                        • Modifies registry class
                                                                        PID:4180
                                                                        • C:\Windows\SysWOW64\Cjinkg32.exe
                                                                          C:\Windows\system32\Cjinkg32.exe
                                                                          36⤵
                                                                          • Adds autorun key to be loaded by Explorer.exe on startup
                                                                          • Executes dropped EXE
                                                                          • System Location Discovery: System Language Discovery
                                                                          • Modifies registry class
                                                                          PID:2728
                                                                          • C:\Windows\SysWOW64\Cmgjgcgo.exe
                                                                            C:\Windows\system32\Cmgjgcgo.exe
                                                                            37⤵
                                                                            • Adds autorun key to be loaded by Explorer.exe on startup
                                                                            • Executes dropped EXE
                                                                            • Drops file in System32 directory
                                                                            • System Location Discovery: System Language Discovery
                                                                            PID:4100
                                                                            • C:\Windows\SysWOW64\Cenahpha.exe
                                                                              C:\Windows\system32\Cenahpha.exe
                                                                              38⤵
                                                                              • Executes dropped EXE
                                                                              • Drops file in System32 directory
                                                                              • System Location Discovery: System Language Discovery
                                                                              PID:2396
                                                                              • C:\Windows\SysWOW64\Chmndlge.exe
                                                                                C:\Windows\system32\Chmndlge.exe
                                                                                39⤵
                                                                                • Executes dropped EXE
                                                                                • System Location Discovery: System Language Discovery
                                                                                • Modifies registry class
                                                                                PID:5052
                                                                                • C:\Windows\SysWOW64\Cjkjpgfi.exe
                                                                                  C:\Windows\system32\Cjkjpgfi.exe
                                                                                  40⤵
                                                                                  • Adds autorun key to be loaded by Explorer.exe on startup
                                                                                  • Executes dropped EXE
                                                                                  • Drops file in System32 directory
                                                                                  • System Location Discovery: System Language Discovery
                                                                                  PID:4140
                                                                                  • C:\Windows\SysWOW64\Cmiflbel.exe
                                                                                    C:\Windows\system32\Cmiflbel.exe
                                                                                    41⤵
                                                                                    • Adds autorun key to be loaded by Explorer.exe on startup
                                                                                    • Executes dropped EXE
                                                                                    • Drops file in System32 directory
                                                                                    • System Location Discovery: System Language Discovery
                                                                                    • Modifies registry class
                                                                                    PID:4988
                                                                                    • C:\Windows\SysWOW64\Ceqnmpfo.exe
                                                                                      C:\Windows\system32\Ceqnmpfo.exe
                                                                                      42⤵
                                                                                      • Adds autorun key to be loaded by Explorer.exe on startup
                                                                                      • Executes dropped EXE
                                                                                      • System Location Discovery: System Language Discovery
                                                                                      PID:4168
                                                                                      • C:\Windows\SysWOW64\Chokikeb.exe
                                                                                        C:\Windows\system32\Chokikeb.exe
                                                                                        43⤵
                                                                                        • Adds autorun key to be loaded by Explorer.exe on startup
                                                                                        • Executes dropped EXE
                                                                                        • Drops file in System32 directory
                                                                                        • System Location Discovery: System Language Discovery
                                                                                        • Modifies registry class
                                                                                        PID:2132
                                                                                        • C:\Windows\SysWOW64\Cfbkeh32.exe
                                                                                          C:\Windows\system32\Cfbkeh32.exe
                                                                                          44⤵
                                                                                          • Executes dropped EXE
                                                                                          • System Location Discovery: System Language Discovery
                                                                                          PID:4844
                                                                                          • C:\Windows\SysWOW64\Cnicfe32.exe
                                                                                            C:\Windows\system32\Cnicfe32.exe
                                                                                            45⤵
                                                                                            • Adds autorun key to be loaded by Explorer.exe on startup
                                                                                            • Executes dropped EXE
                                                                                            • Drops file in System32 directory
                                                                                            • System Location Discovery: System Language Discovery
                                                                                            • Modifies registry class
                                                                                            PID:2492
                                                                                            • C:\Windows\SysWOW64\Ceckcp32.exe
                                                                                              C:\Windows\system32\Ceckcp32.exe
                                                                                              46⤵
                                                                                              • Adds autorun key to be loaded by Explorer.exe on startup
                                                                                              • Executes dropped EXE
                                                                                              • Drops file in System32 directory
                                                                                              • System Location Discovery: System Language Discovery
                                                                                              • Modifies registry class
                                                                                              PID:3580
                                                                                              • C:\Windows\SysWOW64\Chagok32.exe
                                                                                                C:\Windows\system32\Chagok32.exe
                                                                                                47⤵
                                                                                                • Adds autorun key to be loaded by Explorer.exe on startup
                                                                                                • Executes dropped EXE
                                                                                                • Drops file in System32 directory
                                                                                                • Modifies registry class
                                                                                                PID:1232
                                                                                                • C:\Windows\SysWOW64\Cfdhkhjj.exe
                                                                                                  C:\Windows\system32\Cfdhkhjj.exe
                                                                                                  48⤵
                                                                                                  • Executes dropped EXE
                                                                                                  • Drops file in System32 directory
                                                                                                  • System Location Discovery: System Language Discovery
                                                                                                  PID:1720
                                                                                                  • C:\Windows\SysWOW64\Cnkplejl.exe
                                                                                                    C:\Windows\system32\Cnkplejl.exe
                                                                                                    49⤵
                                                                                                    • Adds autorun key to be loaded by Explorer.exe on startup
                                                                                                    • Executes dropped EXE
                                                                                                    • Drops file in System32 directory
                                                                                                    • System Location Discovery: System Language Discovery
                                                                                                    PID:2712
                                                                                                    • C:\Windows\SysWOW64\Cajlhqjp.exe
                                                                                                      C:\Windows\system32\Cajlhqjp.exe
                                                                                                      50⤵
                                                                                                      • Executes dropped EXE
                                                                                                      • Drops file in System32 directory
                                                                                                      • System Location Discovery: System Language Discovery
                                                                                                      • Modifies registry class
                                                                                                      PID:3312
                                                                                                      • C:\Windows\SysWOW64\Cdhhdlid.exe
                                                                                                        C:\Windows\system32\Cdhhdlid.exe
                                                                                                        51⤵
                                                                                                        • Executes dropped EXE
                                                                                                        • Drops file in System32 directory
                                                                                                        • System Location Discovery: System Language Discovery
                                                                                                        PID:3308
                                                                                                        • C:\Windows\SysWOW64\Cffdpghg.exe
                                                                                                          C:\Windows\system32\Cffdpghg.exe
                                                                                                          52⤵
                                                                                                          • Adds autorun key to be loaded by Explorer.exe on startup
                                                                                                          • Executes dropped EXE
                                                                                                          • System Location Discovery: System Language Discovery
                                                                                                          • Modifies registry class
                                                                                                          PID:4600
                                                                                                          • C:\Windows\SysWOW64\Cnnlaehj.exe
                                                                                                            C:\Windows\system32\Cnnlaehj.exe
                                                                                                            53⤵
                                                                                                            • System Location Discovery: System Language Discovery
                                                                                                            PID:4564
                                                                                                            • C:\Windows\SysWOW64\Cegdnopg.exe
                                                                                                              C:\Windows\system32\Cegdnopg.exe
                                                                                                              54⤵
                                                                                                              • Adds autorun key to be loaded by Explorer.exe on startup
                                                                                                              • Executes dropped EXE
                                                                                                              • Drops file in System32 directory
                                                                                                              • System Location Discovery: System Language Discovery
                                                                                                              • Modifies registry class
                                                                                                              PID:4496
                                                                                                              • C:\Windows\SysWOW64\Dfiafg32.exe
                                                                                                                C:\Windows\system32\Dfiafg32.exe
                                                                                                                55⤵
                                                                                                                • Executes dropped EXE
                                                                                                                • Drops file in System32 directory
                                                                                                                • System Location Discovery: System Language Discovery
                                                                                                                • Modifies registry class
                                                                                                                PID:4052
                                                                                                                • C:\Windows\SysWOW64\Dopigd32.exe
                                                                                                                  C:\Windows\system32\Dopigd32.exe
                                                                                                                  56⤵
                                                                                                                  • Adds autorun key to be loaded by Explorer.exe on startup
                                                                                                                  • Executes dropped EXE
                                                                                                                  • System Location Discovery: System Language Discovery
                                                                                                                  PID:2388
                                                                                                                  • C:\Windows\SysWOW64\Dejacond.exe
                                                                                                                    C:\Windows\system32\Dejacond.exe
                                                                                                                    57⤵
                                                                                                                    • Executes dropped EXE
                                                                                                                    • Modifies registry class
                                                                                                                    PID:2436
                                                                                                                    • C:\Windows\SysWOW64\Dhhnpjmh.exe
                                                                                                                      C:\Windows\system32\Dhhnpjmh.exe
                                                                                                                      58⤵
                                                                                                                      • Adds autorun key to be loaded by Explorer.exe on startup
                                                                                                                      • Executes dropped EXE
                                                                                                                      • Drops file in System32 directory
                                                                                                                      • System Location Discovery: System Language Discovery
                                                                                                                      PID:3116
                                                                                                                      • C:\Windows\SysWOW64\Djgjlelk.exe
                                                                                                                        C:\Windows\system32\Djgjlelk.exe
                                                                                                                        59⤵
                                                                                                                        • Adds autorun key to be loaded by Explorer.exe on startup
                                                                                                                        • Executes dropped EXE
                                                                                                                        • Drops file in System32 directory
                                                                                                                        • System Location Discovery: System Language Discovery
                                                                                                                        • Modifies registry class
                                                                                                                        PID:1152
                                                                                                                        • C:\Windows\SysWOW64\Dmefhako.exe
                                                                                                                          C:\Windows\system32\Dmefhako.exe
                                                                                                                          60⤵
                                                                                                                          • Adds autorun key to be loaded by Explorer.exe on startup
                                                                                                                          • Executes dropped EXE
                                                                                                                          • Drops file in System32 directory
                                                                                                                          • System Location Discovery: System Language Discovery
                                                                                                                          • Modifies registry class
                                                                                                                          PID:1472
                                                                                                                          • C:\Windows\SysWOW64\Dhkjej32.exe
                                                                                                                            C:\Windows\system32\Dhkjej32.exe
                                                                                                                            61⤵
                                                                                                                            • Executes dropped EXE
                                                                                                                            • System Location Discovery: System Language Discovery
                                                                                                                            • Modifies registry class
                                                                                                                            PID:1248
                                                                                                                            • C:\Windows\SysWOW64\Dkifae32.exe
                                                                                                                              C:\Windows\system32\Dkifae32.exe
                                                                                                                              62⤵
                                                                                                                              • Adds autorun key to be loaded by Explorer.exe on startup
                                                                                                                              • Executes dropped EXE
                                                                                                                              • Drops file in System32 directory
                                                                                                                              • System Location Discovery: System Language Discovery
                                                                                                                              • Modifies registry class
                                                                                                                              PID:4300
                                                                                                                              • C:\Windows\SysWOW64\Dmgbnq32.exe
                                                                                                                                C:\Windows\system32\Dmgbnq32.exe
                                                                                                                                63⤵
                                                                                                                                • Executes dropped EXE
                                                                                                                                • Drops file in System32 directory
                                                                                                                                • System Location Discovery: System Language Discovery
                                                                                                                                • Modifies registry class
                                                                                                                                PID:4908
                                                                                                                                • C:\Windows\SysWOW64\Daconoae.exe
                                                                                                                                  C:\Windows\system32\Daconoae.exe
                                                                                                                                  64⤵
                                                                                                                                  • Adds autorun key to be loaded by Explorer.exe on startup
                                                                                                                                  • Executes dropped EXE
                                                                                                                                  • Drops file in System32 directory
                                                                                                                                  • System Location Discovery: System Language Discovery
                                                                                                                                  PID:824
                                                                                                                                  • C:\Windows\SysWOW64\Dhmgki32.exe
                                                                                                                                    C:\Windows\system32\Dhmgki32.exe
                                                                                                                                    65⤵
                                                                                                                                    • Adds autorun key to be loaded by Explorer.exe on startup
                                                                                                                                    • Executes dropped EXE
                                                                                                                                    • Drops file in System32 directory
                                                                                                                                    • System Location Discovery: System Language Discovery
                                                                                                                                    • Modifies registry class
                                                                                                                                    PID:640
                                                                                                                                    • C:\Windows\SysWOW64\Dkkcge32.exe
                                                                                                                                      C:\Windows\system32\Dkkcge32.exe
                                                                                                                                      66⤵
                                                                                                                                      • Adds autorun key to be loaded by Explorer.exe on startup
                                                                                                                                      • Executes dropped EXE
                                                                                                                                      • System Location Discovery: System Language Discovery
                                                                                                                                      • Modifies registry class
                                                                                                                                      PID:4152
                                                                                                                                      • C:\Windows\SysWOW64\Dmjocp32.exe
                                                                                                                                        C:\Windows\system32\Dmjocp32.exe
                                                                                                                                        67⤵
                                                                                                                                        • Adds autorun key to be loaded by Explorer.exe on startup
                                                                                                                                        • Drops file in System32 directory
                                                                                                                                        • System Location Discovery: System Language Discovery
                                                                                                                                        • Modifies registry class
                                                                                                                                        PID:4484
                                                                                                                                        • C:\Windows\SysWOW64\Deagdn32.exe
                                                                                                                                          C:\Windows\system32\Deagdn32.exe
                                                                                                                                          68⤵
                                                                                                                                          • Adds autorun key to be loaded by Explorer.exe on startup
                                                                                                                                          • Drops file in System32 directory
                                                                                                                                          • System Location Discovery: System Language Discovery
                                                                                                                                          PID:3196
                                                                                                                                          • C:\Windows\SysWOW64\Dhocqigp.exe
                                                                                                                                            C:\Windows\system32\Dhocqigp.exe
                                                                                                                                            69⤵
                                                                                                                                            • Adds autorun key to be loaded by Explorer.exe on startup
                                                                                                                                            • Drops file in System32 directory
                                                                                                                                            • System Location Discovery: System Language Discovery
                                                                                                                                            PID:3716
                                                                                                                                            • C:\Windows\SysWOW64\Dknpmdfc.exe
                                                                                                                                              C:\Windows\system32\Dknpmdfc.exe
                                                                                                                                              70⤵
                                                                                                                                              • Adds autorun key to be loaded by Explorer.exe on startup
                                                                                                                                              • Drops file in System32 directory
                                                                                                                                              • System Location Discovery: System Language Discovery
                                                                                                                                              PID:320
                                                                                                                                              • C:\Windows\SysWOW64\Dmllipeg.exe
                                                                                                                                                C:\Windows\system32\Dmllipeg.exe
                                                                                                                                                71⤵
                                                                                                                                                • System Location Discovery: System Language Discovery
                                                                                                                                                PID:856
                                                                                                                                                • C:\Windows\SysWOW64\WerFault.exe
                                                                                                                                                  C:\Windows\SysWOW64\WerFault.exe -u -p 856 -s 396
                                                                                                                                                  72⤵
                                                                                                                                                  • Program crash
                                                                                                                                                  PID:2060
  • C:\Windows\SysWOW64\WerFault.exe
    C:\Windows\SysWOW64\WerFault.exe -pss -s 408 -p 856 -ip 856
    1⤵
      PID:4776

    Network

    MITRE ATT&CK Enterprise v15

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Windows\SysWOW64\Acjclpcf.exe

      Filesize

      96KB

      MD5

      d4f260c499ee7f8837f3e12f60f41490

      SHA1

      dd4313cf6bfcc7f670f628bb71f4589f451639cb

      SHA256

      55d8a4d5de7a4f7d09164f5b3e6b3d3c8c5c1a0c53835e62dbef52333e5b6636

      SHA512

      9438c9eb1bb7d57bd8cc3b6496937bf46c6e5f04d8403c04e38a36ba4f36bc827dd97dd849090379c4e0dc2c50c94e02c7cb448f891c9e40a0eabc162e4f732e

    • C:\Windows\SysWOW64\Acnlgp32.exe

      Filesize

      96KB

      MD5

      8ac385a1c03e92687f30c36ef3cbafc0

      SHA1

      5709604c7a7f36a0a88734e90a89599b156538b6

      SHA256

      a9752ef879ac0bac412856efe3eb16e2ed9185cd9ad635b154db519dcd1dedb4

      SHA512

      0315b99d8f2cee73d2f669bc009ddf2461189dea35becd979cd0c91290c6649656bc07d226ce1d2577388fe31d1491cde38144f0e1b8a01fad014ad26f70d7c2

    • C:\Windows\SysWOW64\Aeniabfd.exe

      Filesize

      96KB

      MD5

      3d28c2f008ab44c281b3f41a9ed0c257

      SHA1

      e6b4b30201b0d0480e4ea27227ebf89c1056d82b

      SHA256

      52376e3c1b0bd1079056b62b2e1705d9d68aa8ef5dfd702330971372e9531381

      SHA512

      b70b79fd2bda128dfa172ff629dadac25671a149b2197d699f2ac1deb360363ddfbf06fc51853e3f370842170f5f589dd7ac182a478b44566f7157f322bf4543

    • C:\Windows\SysWOW64\Aepefb32.exe

      Filesize

      96KB

      MD5

      75e406b7eb23d638ae33ba05fd977b4d

      SHA1

      a0703c863321baf3bc91130a4a2573a7aa2963b5

      SHA256

      de841dde71c21f6730ed99a3e7e5eb2f2e67e1588b54decc087eb39fc3051c95

      SHA512

      e1b7bcceae436d78072810413b9e9a2b692eb9a631400e9267b97f9ba952b0cf1a55e70197c8312dca0b8dfd15cc1990b2c681180b352084b5cac3fd0f2fade8

    • C:\Windows\SysWOW64\Afmhck32.exe

      Filesize

      96KB

      MD5

      722bf8b4ed2ff4d0d0db0de007625295

      SHA1

      ee91731e8d044c9d8e37388f3bff9a6778b635a4

      SHA256

      474f2cb9ce372843569e9cb2e7cf4dd153bc34e0e9d38c94591ef9a4012fa7b2

      SHA512

      fa48470c56bf1667a0b0310759ff6ca8498ecb1deafd020ed7d93e44ef16b8d4634db20d5b642e74763e82635b17a0afcb6bfbd8c2ef3ba04af088146a5d814b

    • C:\Windows\SysWOW64\Afoeiklb.exe

      Filesize

      96KB

      MD5

      9606233434113bb1b333ad09f15d1fc0

      SHA1

      0b98f5462f3b4ca9260707e275a55d4b7d21cabf

      SHA256

      acf53464e254fb1e110b5d12e9cca1decf444d53ff10d7b72d4fe2e78c7c641b

      SHA512

      cbdef30acb5c7e5ccec5b4992d2242bf03f4b420f15db7eb24d9daccf9ebddbacfbb3d6827dad2a3b6e965daee16eae2431fa9bdbd97efa92b6113f2672655f6

    • C:\Windows\SysWOW64\Agglboim.exe

      Filesize

      96KB

      MD5

      ab749556eefa27b542f59efad6e46ecf

      SHA1

      b4afdd735cb466e88306b36e941d11c1e6d1a148

      SHA256

      d81b0332862623451e11a02712da24eb5878ba1b32fcb5c5c69e32199206c25d

      SHA512

      5519d2b366a8529f658d497d2c0aa53fb5a9c1fa6f4e19dabdd29d319224e4780d92ee9bcd8e55e6b8c2ca3249a8fa54f0ff4fbb5e1a5aac51bc7c9ea3d3ff13

    • C:\Windows\SysWOW64\Agoabn32.exe

      Filesize

      96KB

      MD5

      459a6afb96194a99bd1cc89f2674c58c

      SHA1

      86c94d89b4243e263ba638d5250b7cd62816fe4f

      SHA256

      31f030c68ca98a96dcb19b07667b4db310b7288812c65c39f342e4918da478ac

      SHA512

      50991679cd5e79acdf5267afe328e91c14b2ef46a8687e90d9312501b6ecfc9344f3334cf0fff98c6934437e117f6223e22e9ed06d1f3519d46efd4884f0351c

    • C:\Windows\SysWOW64\Ajckij32.exe

      Filesize

      96KB

      MD5

      33c7c93302f0359ade9ccb09dccc6002

      SHA1

      4be680570b41496b48714a137226d31c501447ca

      SHA256

      a761ce345f8eb5ddb2ed4cb6db5019e4bc90ea7c6f1e8cf2188bade1fd12fc01

      SHA512

      0cabd3769c3fa28e7b9b7875acdd7e32e8fb749db2a644d578a2abf0f6736c042fae61adf880706153bce09ed527bedc6fa128d7ab6690018b24afa62ebe87cd

    • C:\Windows\SysWOW64\Ampkof32.exe

      Filesize

      96KB

      MD5

      93344a8f4ec9037d232389cd3d0eff51

      SHA1

      4a872ec60e87e8df3073c27462e398e96cb14a37

      SHA256

      23e9462f08f51a0a367302e25ae62a6a72be0b0ca6c25fbce19b24f3ff38c20c

      SHA512

      805d338c7abbf912a2e4cc65f4ba6cdeee9f704699cdaf46a5603e1dd0161e77c4cd1bb694280334cad16292d76e123d073dbcf67fdd042e1161775321763fc0

    • C:\Windows\SysWOW64\Anadoi32.exe

      Filesize

      96KB

      MD5

      5bff4a22623613bdbf269255cce00dff

      SHA1

      91b6300806d4e6e3c6087ff706b1555aad4bb3d5

      SHA256

      2aeb58af1e06443d361507fe9b3d6aab89f97f1d3ef0ae966881a03d1c39b9cd

      SHA512

      0e48d93c797f059949cf0e3767118a52939e4bcd3a215f37537a05a223e7a727aaf1a271b45a1f0cda3a361c670e56940b56360917ab89ec99e3f834e4a11afb

    • C:\Windows\SysWOW64\Andqdh32.exe

      Filesize

      96KB

      MD5

      73940195ff88f96e14c9d12f0108a4a6

      SHA1

      46925cb709ed5d203ba16b17cfe0ce771052617a

      SHA256

      1f83c67515d9894f8612da48f36a2699335a8e8a8cab2f4e74065aeca7e677cc

      SHA512

      f0b2dbfc15a2bb6e0425a6388fff9afad7ec5c976c045be19c8169953a6b2651770f2657cef7c72e03d48de68e2d072935f67b99729e8b86fe15f3edf57ba230

    • C:\Windows\SysWOW64\Anfmjhmd.exe

      Filesize

      96KB

      MD5

      26ad7116243b6e30da0a39c3cecf0a14

      SHA1

      5f776e88b59fe466b9143ff3aa49a97784d002c2

      SHA256

      3af8758d1f3a9ee2464bf699ed8b9519459fb85454e2dd1ad1ddcc06a54df832

      SHA512

      b010b25d042ee77fca4f81ce73908b008f17ce18d960c47aab34f87224df6225e1a800f566a64ffe3af72ff9482ecaee1c26587ba5f45feb1e4195fd37b78884

    • C:\Windows\SysWOW64\Aqncedbp.exe

      Filesize

      96KB

      MD5

      cac95a2d2d04779bd98b510114d4ddfd

      SHA1

      f25ee125eb88af2053d842660d7345eb3eb2b995

      SHA256

      32efd0fd87b4454f64c061bc0b1eb2862aaa3fcd880fce234e86442e2c305f76

      SHA512

      9445e09e6e0f9627bcade49c66bef7530f9ef23a26a1362c8281ef9d1e92d8ad56d5c5ce69195ceb1f1a6221b8a79dc91430d7e637eafe8a8056756e7cfd9aca

    • C:\Windows\SysWOW64\Aqppkd32.exe

      Filesize

      96KB

      MD5

      9ce6d91a94d86713da06c69d6992a63e

      SHA1

      22c95e5af62d69593bba6d9d0c21755f5e1ae5be

      SHA256

      bfe238f352b10abccc64b9f48abcafa679e187376c7f52f9cc76bde5e3bec671

      SHA512

      d1cb99c340ac2d90b8167d0e684531f42728c203d990119d2bb50fa474e5165c5b34cf5efb88ccc584a9121b50cc2f5511469bee3185b20a3ee7d7dff20b587a

    • C:\Windows\SysWOW64\Banllbdn.exe

      Filesize

      96KB

      MD5

      836e64a7b8e21da2b5d4c1f3e37a00ff

      SHA1

      8f06c6584004af97dfcc8e0f0fd75adcb726acf9

      SHA256

      8af9cf4d7a8586f952c3c40597a291c008a5b05fe3d84a0dcdaa1c7eaa4d27b7

      SHA512

      c46d8818413bcd534a2a763e7c302b908b5c3ce97b01be6223f7193019dc6a7450057cedaf408821b10f735431b82ea3c2a3bdd9f790c97115d42be333ce327f

    • C:\Windows\SysWOW64\Bebblb32.exe

      Filesize

      96KB

      MD5

      11b1fb2f14d49f0e0c279a9be105a719

      SHA1

      e4c107c5d7d1624844fa0c141a6e99dbd41b681b

      SHA256

      b4f531ee5bc23b6def87cbee15ab990a54508cf65cef0ae579bbe8a202002b0f

      SHA512

      5501ccb5298ff6042e32d877f9de4d25ae38ef3605ff02e0e80f82e1ace6080859118395a2277cd13128e5db8d65c550af1ab740039854e894d23b11f114af4a

    • C:\Windows\SysWOW64\Beeoaapl.exe

      Filesize

      96KB

      MD5

      547d7c0efcc70a36657846fedd718061

      SHA1

      b09bb0f2a05ef6931333175c2310e5826459cd36

      SHA256

      d218899259edc586cb1ae9a03d394435adb9b612660559587b23bc37a15586bc

      SHA512

      8c417ff6ae5bb230f534aae37d19810778a84e14c207f44c53d9441a3730852515cf90258feaecf029658f4a252187f6e13ac2232ad03a55f378f93ca8c5d962

    • C:\Windows\SysWOW64\Bfdodjhm.exe

      Filesize

      96KB

      MD5

      8e3da31ba9dd8bccc5ebc319c54aa52e

      SHA1

      fb4b6bb9a124bf9e34a31b0174d4139045c6a7f8

      SHA256

      517cd940cf605a9265dcd24dc190bce5e96b289db891bab33a049666f729f99f

      SHA512

      ed27a1025fe9961a3eb96547b269f94cc4115e12409c8f4bcf545badeae0e55edeb5ad7820ab0c3fcd8278ee5d9f53bb6a8652ebe920a850280bbc257c8e9f78

    • C:\Windows\SysWOW64\Bffkij32.exe

      Filesize

      96KB

      MD5

      0e2001117287f00986632adf4ffa3efe

      SHA1

      903b10a2973c2122cfa7cfdb55c72eb0fbb26a3e

      SHA256

      be51ef2ea8af14a992e91cd80f454bc9312b4af1fe8425e29481afb6f4e5a800

      SHA512

      30eb21060d7d4c90b3a2b733f88e6f31907d3d705aafacd683031f7f1d93ff6f77e557d334eddc25d293483a66bfe21b20e8b609e8052fb3bc8f34847f9ae1e7

    • C:\Windows\SysWOW64\Bfhhoi32.exe

      Filesize

      96KB

      MD5

      27b1335f695861f05797c1285d9481ed

      SHA1

      c4d0da9b98c3c0cbd60688d887a7b0cc17f5bead

      SHA256

      9e427b2bdcaca45088ccd0ea8af9e58d9ee450cae24a32de05077f7657c80c1c

      SHA512

      078fee9d7771c13f6bc85d92a038e7bef9727d6e4e211111792aa08c37e3970039bece2264f2aff6cadfde329b52cfb12a33a88d4804bafbc745009e9e815dbb

    • C:\Windows\SysWOW64\Bfkedibe.exe

      Filesize

      96KB

      MD5

      5ba7ad6f3a4e878749a0f70639de8dcc

      SHA1

      fc9e3ba88e0e7b9079ea27d99b9a82302b993b64

      SHA256

      da6bfac2193f986894e04126152fb78c03573970e021cf8a7a114fb5cbf9eea0

      SHA512

      9897506a252b80d1826c3957e30f211d31a92149e41c31bf02b524b058b2c758377d097cb48f5e9da8f6d6fdeb5b50c91c5ea655590d39dab1cdd2c006399d7a

    • C:\Windows\SysWOW64\Bjmnoi32.exe

      Filesize

      96KB

      MD5

      75acf40df738d8e582f24e899fabbf9b

      SHA1

      46df26e9b15762dad4a4a836bb81b24fa9fa7531

      SHA256

      7caaeb45a11600da1c8a75877c98c8b042945ac3de9d84625a4a5e8625baceb2

      SHA512

      67d41b02d3d9850e68e8145d817e0cf765ccb20b49e32639f670972d9bb3d96a164aefee91af4eb20b75e4136c0c9496e58b98bcb7511e5623b464868fe773b0

    • C:\Windows\SysWOW64\Bjokdipf.exe

      Filesize

      96KB

      MD5

      eda7030ad673051a18abbe6a8ba0d612

      SHA1

      6663661d1429dc3c5006894294e1ba804c260c9b

      SHA256

      9c5df1e02e5aedeb8a2b889b6da0be7bc14233f1e510b8ec76e05a15f546a74c

      SHA512

      9894405e44ad15723228bbcbdf30161e847117d7b7ee499f395fe13c226d0a79cdffa2e622a4307fb9b1284907abd64f824d4028685e86011ec541639b2a6745

    • C:\Windows\SysWOW64\Bmemac32.exe

      Filesize

      96KB

      MD5

      171f0417dd63529eb1d9aaf47ee9718e

      SHA1

      f98ab22a56b6c8123443b4ed0c99003992b0ca90

      SHA256

      3d2567984434a1230c756c647db240ed907c9b655444f09673321a9f11da0021

      SHA512

      93a124613c55639b9258d391fa44078fe02ca32a4b5e92fed12a27a5e926c59de5a17e2177637a1c3cadce46d7830fb2a0495ff5022562202fbda9a0946abe02

    • C:\Windows\SysWOW64\Bmkjkd32.exe

      Filesize

      96KB

      MD5

      d0c9d1191035b18a2b097dab5335680e

      SHA1

      f154b93c48ae9e3b77446fea8bf61ded53a9baf7

      SHA256

      0269c8b227e4ddb1322bc314a929626a0a9232745accdde9213de96d60e57a7b

      SHA512

      0252ea5ec134c90f80c04cc2006b1b2fdf36282252688a11c72d7ad1488c9536648e82cbb3fc4f04bd2fe2fc3712ad29c53467bbd8da257a92068235207f3acb

    • C:\Windows\SysWOW64\Bnmcjg32.exe

      Filesize

      96KB

      MD5

      8b36d20c9a8b70be9d022b988272b151

      SHA1

      48b764803909d8481bcc2ff6cfb9fe8d8b2371c9

      SHA256

      09e066408c1097d20309694695c5ebb3750070024bc532b625796a16954cf81d

      SHA512

      86a53cfdad25f962aebf89fa8f998f1f2333311e6fb6891a5406ff9ef036a1660c942524275d86e31493e0f2a975a282a496c5183e44420f54a10f46a48dd342

    • C:\Windows\SysWOW64\Bnpppgdj.exe

      Filesize

      96KB

      MD5

      af8ea88e214815bee5c7440084c7c5aa

      SHA1

      51f5931b31b5864c851cf2712523855ebe04f46d

      SHA256

      2dc44831316622b270847506371ba6e88be244f0e63fc39b5c4699318b068cb4

      SHA512

      797f9422fb5b136de81070c7b36504e581ebabc7a28784df1e7374b191630ae9e8db899d336a3895acb625a050fa5b9ec052801a9b0e7b4734da1015d0fa9e68

    • C:\Windows\SysWOW64\Cdhhdlid.exe

      Filesize

      96KB

      MD5

      531581effb92244ca982812032461ed5

      SHA1

      64717c566c443ca8e52534605241ffb789866afc

      SHA256

      d37317e39b619197bab1181e4bd28f7fd0423bf1bf504d76aa3e16f17dbcde27

      SHA512

      fe8ca0a31685e1525fa43a800af43e771cbc1852f15974b4be9292bc65cc152e975debb3c14b8cd8d41df866d17b7b274060a4c4f07f77efd9bd6807cf335330

    • C:\Windows\SysWOW64\Qcgffqei.exe

      Filesize

      96KB

      MD5

      8c2aa0f0a68949c10501d14ef628f9a5

      SHA1

      a62641e220bf75285c2c7178179135256021f771

      SHA256

      3eccaf2f64815caa850f7a25ece88894dc241c91e278556f09229ae46cece785

      SHA512

      309240f94276af402d8c5a9ba6012af67eb4f54b46d99e8d51912630e06096adfd8d026c47954e2eb37993aded3a4ff77be2ca56941d8521f7709863aec15cfb

    • C:\Windows\SysWOW64\Qffbbldm.exe

      Filesize

      96KB

      MD5

      27ced998f181d3c4daa187fb76d0a809

      SHA1

      33a4e197ca602abbb62c84049d44235f920e854f

      SHA256

      92113d3ca4906473b4da57501fd473f1bd3886dec8a0e11cafbe99dbb4628481

      SHA512

      9a03de9b1ab196b017abfd9e35400b81ff6fe7804f04464c4809d615c8611aeb7309c6b703d152ed4b8f434a62e7c04acd9013daffd9f12496b633e9f37ed189

    • C:\Windows\SysWOW64\Qgqeappe.exe

      Filesize

      96KB

      MD5

      032f90742535ac18ab9be12eefaa5478

      SHA1

      e04b298a25397b3315ab0fb9cff07b2158040c39

      SHA256

      da4caf4e72fc9b133ff5c0b796b383e8d426d293875ddaf075a492f1df13402c

      SHA512

      7d5387ca3c0416c46b17d42d7b21054c0547398ef4a0a8cd222b8672bc011ea666803fc96914940e8e202405f0cdf0806f7228261e08ba08cf0dad85deb85a42

    • C:\Windows\SysWOW64\Qmmnjfnl.exe

      Filesize

      96KB

      MD5

      3c474f257081b3c5f334c298eb142005

      SHA1

      da32ece8b21976401cd08c58f4f7c5eb3f9bf8fd

      SHA256

      c63fdcaf3abaa33a8ef3b52fc0191a3daf81c214496a1fb549603cea365c4d86

      SHA512

      a5f2f4437fdfa90a0a2d3c98c03e57129c47c9c5c12f3c278e20197625d3d3bdd0c17b298d97a5137c8ad072151364851cf69816c53c96a2e175894f3a102e2e

    • memory/320-474-0x0000000000400000-0x0000000000433000-memory.dmp

      Filesize

      204KB

    • memory/320-484-0x0000000000400000-0x0000000000433000-memory.dmp

      Filesize

      204KB

    • memory/392-145-0x0000000000400000-0x0000000000433000-memory.dmp

      Filesize

      204KB

    • memory/552-113-0x0000000000400000-0x0000000000433000-memory.dmp

      Filesize

      204KB

    • memory/624-259-0x0000000000400000-0x0000000000433000-memory.dmp

      Filesize

      204KB

    • memory/640-444-0x0000000000400000-0x0000000000433000-memory.dmp

      Filesize

      204KB

    • memory/640-494-0x0000000000400000-0x0000000000433000-memory.dmp

      Filesize

      204KB

    • memory/692-89-0x0000000000400000-0x0000000000433000-memory.dmp

      Filesize

      204KB

    • memory/824-438-0x0000000000400000-0x0000000000433000-memory.dmp

      Filesize

      204KB

    • memory/824-496-0x0000000000400000-0x0000000000433000-memory.dmp

      Filesize

      204KB

    • memory/828-136-0x0000000000400000-0x0000000000433000-memory.dmp

      Filesize

      204KB

    • memory/856-482-0x0000000000400000-0x0000000000433000-memory.dmp

      Filesize

      204KB

    • memory/856-480-0x0000000000400000-0x0000000000433000-memory.dmp

      Filesize

      204KB

    • memory/1064-64-0x0000000000400000-0x0000000000433000-memory.dmp

      Filesize

      204KB

    • memory/1152-504-0x0000000000400000-0x0000000000433000-memory.dmp

      Filesize

      204KB

    • memory/1152-408-0x0000000000400000-0x0000000000433000-memory.dmp

      Filesize

      204KB

    • memory/1232-528-0x0000000000400000-0x0000000000433000-memory.dmp

      Filesize

      204KB

    • memory/1232-341-0x0000000000400000-0x0000000000433000-memory.dmp

      Filesize

      204KB

    • memory/1248-500-0x0000000000400000-0x0000000000433000-memory.dmp

      Filesize

      204KB

    • memory/1248-420-0x0000000000400000-0x0000000000433000-memory.dmp

      Filesize

      204KB

    • memory/1260-241-0x0000000000400000-0x0000000000433000-memory.dmp

      Filesize

      204KB

    • memory/1368-263-0x0000000000400000-0x0000000000433000-memory.dmp

      Filesize

      204KB

    • memory/1472-502-0x0000000000400000-0x0000000000433000-memory.dmp

      Filesize

      204KB

    • memory/1472-414-0x0000000000400000-0x0000000000433000-memory.dmp

      Filesize

      204KB

    • memory/1688-56-0x0000000000400000-0x0000000000433000-memory.dmp

      Filesize

      204KB

    • memory/1720-526-0x0000000000400000-0x0000000000433000-memory.dmp

      Filesize

      204KB

    • memory/1720-347-0x0000000000400000-0x0000000000433000-memory.dmp

      Filesize

      204KB

    • memory/2116-192-0x0000000000400000-0x0000000000433000-memory.dmp

      Filesize

      204KB

    • memory/2132-321-0x0000000000400000-0x0000000000433000-memory.dmp

      Filesize

      204KB

    • memory/2228-120-0x0000000000400000-0x0000000000433000-memory.dmp

      Filesize

      204KB

    • memory/2388-390-0x0000000000400000-0x0000000000433000-memory.dmp

      Filesize

      204KB

    • memory/2388-510-0x0000000000400000-0x0000000000433000-memory.dmp

      Filesize

      204KB

    • memory/2396-287-0x0000000000400000-0x0000000000433000-memory.dmp

      Filesize

      204KB

    • memory/2436-396-0x0000000000400000-0x0000000000433000-memory.dmp

      Filesize

      204KB

    • memory/2436-508-0x0000000000400000-0x0000000000433000-memory.dmp

      Filesize

      204KB

    • memory/2488-152-0x0000000000400000-0x0000000000433000-memory.dmp

      Filesize

      204KB

    • memory/2492-329-0x0000000000400000-0x0000000000433000-memory.dmp

      Filesize

      204KB

    • memory/2560-40-0x0000000000400000-0x0000000000433000-memory.dmp

      Filesize

      204KB

    • memory/2664-128-0x0000000000400000-0x0000000000433000-memory.dmp

      Filesize

      204KB

    • memory/2712-524-0x0000000000400000-0x0000000000433000-memory.dmp

      Filesize

      204KB

    • memory/2712-353-0x0000000000400000-0x0000000000433000-memory.dmp

      Filesize

      204KB

    • memory/2724-233-0x0000000000400000-0x0000000000433000-memory.dmp

      Filesize

      204KB

    • memory/2728-275-0x0000000000400000-0x0000000000433000-memory.dmp

      Filesize

      204KB

    • memory/3056-72-0x0000000000400000-0x0000000000433000-memory.dmp

      Filesize

      204KB

    • memory/3116-402-0x0000000000400000-0x0000000000433000-memory.dmp

      Filesize

      204KB

    • memory/3116-506-0x0000000000400000-0x0000000000433000-memory.dmp

      Filesize

      204KB

    • memory/3188-8-0x0000000000400000-0x0000000000433000-memory.dmp

      Filesize

      204KB

    • memory/3196-488-0x0000000000400000-0x0000000000433000-memory.dmp

      Filesize

      204KB

    • memory/3196-462-0x0000000000400000-0x0000000000433000-memory.dmp

      Filesize

      204KB

    • memory/3200-208-0x0000000000400000-0x0000000000433000-memory.dmp

      Filesize

      204KB

    • memory/3308-520-0x0000000000400000-0x0000000000433000-memory.dmp

      Filesize

      204KB

    • memory/3308-365-0x0000000000400000-0x0000000000433000-memory.dmp

      Filesize

      204KB

    • memory/3312-359-0x0000000000400000-0x0000000000433000-memory.dmp

      Filesize

      204KB

    • memory/3312-522-0x0000000000400000-0x0000000000433000-memory.dmp

      Filesize

      204KB

    • memory/3568-104-0x0000000000400000-0x0000000000433000-memory.dmp

      Filesize

      204KB

    • memory/3580-335-0x0000000000400000-0x0000000000433000-memory.dmp

      Filesize

      204KB

    • memory/3580-530-0x0000000000400000-0x0000000000433000-memory.dmp

      Filesize

      204KB

    • memory/3588-168-0x0000000000400000-0x0000000000433000-memory.dmp

      Filesize

      204KB

    • memory/3708-177-0x0000000000400000-0x0000000000433000-memory.dmp

      Filesize

      204KB

    • memory/3716-468-0x0000000000400000-0x0000000000433000-memory.dmp

      Filesize

      204KB

    • memory/3716-486-0x0000000000400000-0x0000000000433000-memory.dmp

      Filesize

      204KB

    • memory/3728-80-0x0000000000400000-0x0000000000433000-memory.dmp

      Filesize

      204KB

    • memory/3732-185-0x0000000000400000-0x0000000000433000-memory.dmp

      Filesize

      204KB

    • memory/3864-201-0x0000000000400000-0x0000000000433000-memory.dmp

      Filesize

      204KB

    • memory/4020-32-0x0000000000400000-0x0000000000433000-memory.dmp

      Filesize

      204KB

    • memory/4052-384-0x0000000000400000-0x0000000000433000-memory.dmp

      Filesize

      204KB

    • memory/4052-512-0x0000000000400000-0x0000000000433000-memory.dmp

      Filesize

      204KB

    • memory/4056-16-0x0000000000400000-0x0000000000433000-memory.dmp

      Filesize

      204KB

    • memory/4100-281-0x0000000000400000-0x0000000000433000-memory.dmp

      Filesize

      204KB

    • memory/4140-299-0x0000000000400000-0x0000000000433000-memory.dmp

      Filesize

      204KB

    • memory/4152-492-0x0000000000400000-0x0000000000433000-memory.dmp

      Filesize

      204KB

    • memory/4152-450-0x0000000000400000-0x0000000000433000-memory.dmp

      Filesize

      204KB

    • memory/4156-1-0x0000000000431000-0x0000000000432000-memory.dmp

      Filesize

      4KB

    • memory/4156-0-0x0000000000400000-0x0000000000433000-memory.dmp

      Filesize

      204KB

    • memory/4168-311-0x0000000000400000-0x0000000000433000-memory.dmp

      Filesize

      204KB

    • memory/4180-269-0x0000000000400000-0x0000000000433000-memory.dmp

      Filesize

      204KB

    • memory/4244-24-0x0000000000400000-0x0000000000433000-memory.dmp

      Filesize

      204KB

    • memory/4292-161-0x0000000000400000-0x0000000000433000-memory.dmp

      Filesize

      204KB

    • memory/4300-431-0x0000000000400000-0x0000000000433000-memory.dmp

      Filesize

      204KB

    • memory/4484-490-0x0000000000400000-0x0000000000433000-memory.dmp

      Filesize

      204KB

    • memory/4484-456-0x0000000000400000-0x0000000000433000-memory.dmp

      Filesize

      204KB

    • memory/4496-378-0x0000000000400000-0x0000000000433000-memory.dmp

      Filesize

      204KB

    • memory/4496-514-0x0000000000400000-0x0000000000433000-memory.dmp

      Filesize

      204KB

    • memory/4564-516-0x0000000000400000-0x0000000000433000-memory.dmp

      Filesize

      204KB

    • memory/4564-372-0x0000000000400000-0x0000000000433000-memory.dmp

      Filesize

      204KB

    • memory/4600-518-0x0000000000400000-0x0000000000433000-memory.dmp

      Filesize

      204KB

    • memory/4600-371-0x0000000000400000-0x0000000000433000-memory.dmp

      Filesize

      204KB

    • memory/4624-230-0x0000000000400000-0x0000000000433000-memory.dmp

      Filesize

      204KB

    • memory/4708-49-0x0000000000400000-0x0000000000433000-memory.dmp

      Filesize

      204KB

    • memory/4844-327-0x0000000000400000-0x0000000000433000-memory.dmp

      Filesize

      204KB

    • memory/4864-216-0x0000000000400000-0x0000000000433000-memory.dmp

      Filesize

      204KB

    • memory/4872-101-0x0000000000400000-0x0000000000433000-memory.dmp

      Filesize

      204KB

    • memory/4908-497-0x0000000000400000-0x0000000000433000-memory.dmp

      Filesize

      204KB

    • memory/4908-432-0x0000000000400000-0x0000000000433000-memory.dmp

      Filesize

      204KB

    • memory/4988-305-0x0000000000400000-0x0000000000433000-memory.dmp

      Filesize

      204KB

    • memory/5052-293-0x0000000000400000-0x0000000000433000-memory.dmp

      Filesize

      204KB

    • memory/5068-248-0x0000000000400000-0x0000000000433000-memory.dmp

      Filesize

      204KB