Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    137s
  • max time network
    154s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240419-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240419-enlocale:en-usos:windows10-2004-x64system
  • submitted
    07/05/2024, 23:42

General

  • Target

    6a07281940d753fa4890de42526ffec0_NEIKI.exe

  • Size

    296KB

  • MD5

    6a07281940d753fa4890de42526ffec0

  • SHA1

    3e73b81fe745c5d2d4ac4f5bec7e20333ba929e4

  • SHA256

    b8046c4f93619fa03e0380b3ae7a811c743a19257a6abe0c703bd37905e3178c

  • SHA512

    37a270c7e20ac959c4ad29e5819657ddcd3f49a799f1e04b2cb53a284bfb322bea769f01e7799e71f4a04077baeea9c8cae3549b6be9f28eecd6f9724d4e3f80

  • SSDEEP

    3072:1eykuuQZbh16igEqQHKl/YB5m/FARA1+6NhZ6P0c9fpxg6pg:/upbEqQHG/YBAPNPKG6g

Score
10/10

Malware Config

Signatures

  • Adds autorun key to be loaded by Explorer.exe on startup 2 TTPs 64 IoCs
  • Executes dropped EXE 64 IoCs
  • Drops file in System32 directory 64 IoCs
  • Program crash 1 IoCs
  • Modifies registry class 64 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\6a07281940d753fa4890de42526ffec0_NEIKI.exe
    "C:\Users\Admin\AppData\Local\Temp\6a07281940d753fa4890de42526ffec0_NEIKI.exe"
    1⤵
    • Drops file in System32 directory
    • Modifies registry class
    • Suspicious use of WriteProcessMemory
    PID:4028
    • C:\Windows\SysWOW64\Hmioonpn.exe
      C:\Windows\system32\Hmioonpn.exe
      2⤵
      • Adds autorun key to be loaded by Explorer.exe on startup
      • Executes dropped EXE
      • Drops file in System32 directory
      • Modifies registry class
      • Suspicious use of WriteProcessMemory
      PID:1572
      • C:\Windows\SysWOW64\Hippdo32.exe
        C:\Windows\system32\Hippdo32.exe
        3⤵
        • Executes dropped EXE
        • Drops file in System32 directory
        • Modifies registry class
        • Suspicious use of WriteProcessMemory
        PID:4592
        • C:\Windows\SysWOW64\Hmklen32.exe
          C:\Windows\system32\Hmklen32.exe
          4⤵
          • Adds autorun key to be loaded by Explorer.exe on startup
          • Executes dropped EXE
          • Drops file in System32 directory
          • Modifies registry class
          • Suspicious use of WriteProcessMemory
          PID:4544
          • C:\Windows\SysWOW64\Haidklda.exe
            C:\Windows\system32\Haidklda.exe
            5⤵
            • Executes dropped EXE
            • Suspicious use of WriteProcessMemory
            PID:5056
            • C:\Windows\SysWOW64\Iffmccbi.exe
              C:\Windows\system32\Iffmccbi.exe
              6⤵
              • Adds autorun key to be loaded by Explorer.exe on startup
              • Executes dropped EXE
              • Suspicious use of WriteProcessMemory
              PID:2820
              • C:\Windows\SysWOW64\Iakaql32.exe
                C:\Windows\system32\Iakaql32.exe
                7⤵
                • Executes dropped EXE
                • Modifies registry class
                • Suspicious use of WriteProcessMemory
                PID:3264
                • C:\Windows\SysWOW64\Ifhiib32.exe
                  C:\Windows\system32\Ifhiib32.exe
                  8⤵
                  • Adds autorun key to be loaded by Explorer.exe on startup
                  • Executes dropped EXE
                  • Drops file in System32 directory
                  • Modifies registry class
                  • Suspicious use of WriteProcessMemory
                  PID:3148
                  • C:\Windows\SysWOW64\Icljbg32.exe
                    C:\Windows\system32\Icljbg32.exe
                    9⤵
                    • Adds autorun key to be loaded by Explorer.exe on startup
                    • Executes dropped EXE
                    • Suspicious use of WriteProcessMemory
                    PID:512
                    • C:\Windows\SysWOW64\Ifjfnb32.exe
                      C:\Windows\system32\Ifjfnb32.exe
                      10⤵
                      • Adds autorun key to be loaded by Explorer.exe on startup
                      • Executes dropped EXE
                      • Drops file in System32 directory
                      • Suspicious use of WriteProcessMemory
                      PID:1328
                      • C:\Windows\SysWOW64\Idofhfmm.exe
                        C:\Windows\system32\Idofhfmm.exe
                        11⤵
                        • Adds autorun key to be loaded by Explorer.exe on startup
                        • Executes dropped EXE
                        • Modifies registry class
                        • Suspicious use of WriteProcessMemory
                        PID:3800
                        • C:\Windows\SysWOW64\Iikopmkd.exe
                          C:\Windows\system32\Iikopmkd.exe
                          12⤵
                          • Adds autorun key to be loaded by Explorer.exe on startup
                          • Executes dropped EXE
                          • Drops file in System32 directory
                          • Modifies registry class
                          • Suspicious use of WriteProcessMemory
                          PID:4648
                          • C:\Windows\SysWOW64\Idacmfkj.exe
                            C:\Windows\system32\Idacmfkj.exe
                            13⤵
                            • Executes dropped EXE
                            • Modifies registry class
                            • Suspicious use of WriteProcessMemory
                            PID:1384
                            • C:\Windows\SysWOW64\Jaedgjjd.exe
                              C:\Windows\system32\Jaedgjjd.exe
                              14⤵
                              • Executes dropped EXE
                              • Drops file in System32 directory
                              • Modifies registry class
                              • Suspicious use of WriteProcessMemory
                              PID:812
                              • C:\Windows\SysWOW64\Jjmhppqd.exe
                                C:\Windows\system32\Jjmhppqd.exe
                                15⤵
                                • Adds autorun key to be loaded by Explorer.exe on startup
                                • Executes dropped EXE
                                • Modifies registry class
                                • Suspicious use of WriteProcessMemory
                                PID:2604
                                • C:\Windows\SysWOW64\Jmkdlkph.exe
                                  C:\Windows\system32\Jmkdlkph.exe
                                  16⤵
                                  • Adds autorun key to be loaded by Explorer.exe on startup
                                  • Executes dropped EXE
                                  • Modifies registry class
                                  • Suspicious use of WriteProcessMemory
                                  PID:2276
                                  • C:\Windows\SysWOW64\Jbhmdbnp.exe
                                    C:\Windows\system32\Jbhmdbnp.exe
                                    17⤵
                                    • Adds autorun key to be loaded by Explorer.exe on startup
                                    • Executes dropped EXE
                                    • Drops file in System32 directory
                                    • Modifies registry class
                                    • Suspicious use of WriteProcessMemory
                                    PID:1084
                                    • C:\Windows\SysWOW64\Jaimbj32.exe
                                      C:\Windows\system32\Jaimbj32.exe
                                      18⤵
                                      • Adds autorun key to be loaded by Explorer.exe on startup
                                      • Executes dropped EXE
                                      • Drops file in System32 directory
                                      • Suspicious use of WriteProcessMemory
                                      PID:4708
                                      • C:\Windows\SysWOW64\Jfffjqdf.exe
                                        C:\Windows\system32\Jfffjqdf.exe
                                        19⤵
                                        • Adds autorun key to be loaded by Explorer.exe on startup
                                        • Executes dropped EXE
                                        • Suspicious use of WriteProcessMemory
                                        PID:884
                                        • C:\Windows\SysWOW64\Jmpngk32.exe
                                          C:\Windows\system32\Jmpngk32.exe
                                          20⤵
                                          • Executes dropped EXE
                                          • Drops file in System32 directory
                                          • Modifies registry class
                                          • Suspicious use of WriteProcessMemory
                                          PID:4240
                                          • C:\Windows\SysWOW64\Jbmfoa32.exe
                                            C:\Windows\system32\Jbmfoa32.exe
                                            21⤵
                                            • Adds autorun key to be loaded by Explorer.exe on startup
                                            • Executes dropped EXE
                                            • Drops file in System32 directory
                                            • Modifies registry class
                                            • Suspicious use of WriteProcessMemory
                                            PID:4172
                                            • C:\Windows\SysWOW64\Jpaghf32.exe
                                              C:\Windows\system32\Jpaghf32.exe
                                              22⤵
                                              • Adds autorun key to be loaded by Explorer.exe on startup
                                              • Executes dropped EXE
                                              • Drops file in System32 directory
                                              • Modifies registry class
                                              • Suspicious use of WriteProcessMemory
                                              PID:3732
                                              • C:\Windows\SysWOW64\Jiikak32.exe
                                                C:\Windows\system32\Jiikak32.exe
                                                23⤵
                                                • Adds autorun key to be loaded by Explorer.exe on startup
                                                • Executes dropped EXE
                                                • Drops file in System32 directory
                                                • Modifies registry class
                                                PID:3348
                                                • C:\Windows\SysWOW64\Kpccnefa.exe
                                                  C:\Windows\system32\Kpccnefa.exe
                                                  24⤵
                                                  • Adds autorun key to be loaded by Explorer.exe on startup
                                                  • Executes dropped EXE
                                                  • Drops file in System32 directory
                                                  PID:764
                                                  • C:\Windows\SysWOW64\Kgmlkp32.exe
                                                    C:\Windows\system32\Kgmlkp32.exe
                                                    25⤵
                                                    • Adds autorun key to be loaded by Explorer.exe on startup
                                                    • Executes dropped EXE
                                                    PID:4496
                                                    • C:\Windows\SysWOW64\Kbdmpqcb.exe
                                                      C:\Windows\system32\Kbdmpqcb.exe
                                                      26⤵
                                                      • Adds autorun key to be loaded by Explorer.exe on startup
                                                      • Executes dropped EXE
                                                      • Drops file in System32 directory
                                                      • Modifies registry class
                                                      PID:3448
                                                      • C:\Windows\SysWOW64\Kinemkko.exe
                                                        C:\Windows\system32\Kinemkko.exe
                                                        27⤵
                                                        • Adds autorun key to be loaded by Explorer.exe on startup
                                                        • Executes dropped EXE
                                                        PID:3060
                                                        • C:\Windows\SysWOW64\Kphmie32.exe
                                                          C:\Windows\system32\Kphmie32.exe
                                                          28⤵
                                                          • Adds autorun key to be loaded by Explorer.exe on startup
                                                          • Executes dropped EXE
                                                          • Drops file in System32 directory
                                                          • Modifies registry class
                                                          PID:4464
                                                          • C:\Windows\SysWOW64\Kmlnbi32.exe
                                                            C:\Windows\system32\Kmlnbi32.exe
                                                            29⤵
                                                            • Executes dropped EXE
                                                            • Drops file in System32 directory
                                                            • Modifies registry class
                                                            PID:4956
                                                            • C:\Windows\SysWOW64\Kcifkp32.exe
                                                              C:\Windows\system32\Kcifkp32.exe
                                                              30⤵
                                                              • Adds autorun key to be loaded by Explorer.exe on startup
                                                              • Executes dropped EXE
                                                              PID:384
                                                              • C:\Windows\SysWOW64\Kmnjhioc.exe
                                                                C:\Windows\system32\Kmnjhioc.exe
                                                                31⤵
                                                                • Adds autorun key to be loaded by Explorer.exe on startup
                                                                • Executes dropped EXE
                                                                • Drops file in System32 directory
                                                                • Modifies registry class
                                                                PID:936
                                                                • C:\Windows\SysWOW64\Kckbqpnj.exe
                                                                  C:\Windows\system32\Kckbqpnj.exe
                                                                  32⤵
                                                                  • Executes dropped EXE
                                                                  PID:1140
                                                                  • C:\Windows\SysWOW64\Liekmj32.exe
                                                                    C:\Windows\system32\Liekmj32.exe
                                                                    33⤵
                                                                    • Executes dropped EXE
                                                                    • Modifies registry class
                                                                    PID:3876
                                                                    • C:\Windows\SysWOW64\Lkdggmlj.exe
                                                                      C:\Windows\system32\Lkdggmlj.exe
                                                                      34⤵
                                                                      • Executes dropped EXE
                                                                      • Drops file in System32 directory
                                                                      • Modifies registry class
                                                                      PID:2396
                                                                      • C:\Windows\SysWOW64\Lmccchkn.exe
                                                                        C:\Windows\system32\Lmccchkn.exe
                                                                        35⤵
                                                                        • Adds autorun key to be loaded by Explorer.exe on startup
                                                                        • Executes dropped EXE
                                                                        • Modifies registry class
                                                                        PID:2640
                                                                        • C:\Windows\SysWOW64\Ldmlpbbj.exe
                                                                          C:\Windows\system32\Ldmlpbbj.exe
                                                                          36⤵
                                                                          • Adds autorun key to be loaded by Explorer.exe on startup
                                                                          • Executes dropped EXE
                                                                          • Modifies registry class
                                                                          PID:2608
                                                                          • C:\Windows\SysWOW64\Lcpllo32.exe
                                                                            C:\Windows\system32\Lcpllo32.exe
                                                                            37⤵
                                                                            • Adds autorun key to be loaded by Explorer.exe on startup
                                                                            • Executes dropped EXE
                                                                            • Drops file in System32 directory
                                                                            • Modifies registry class
                                                                            PID:2924
                                                                            • C:\Windows\SysWOW64\Lijdhiaa.exe
                                                                              C:\Windows\system32\Lijdhiaa.exe
                                                                              38⤵
                                                                              • Adds autorun key to be loaded by Explorer.exe on startup
                                                                              • Executes dropped EXE
                                                                              • Modifies registry class
                                                                              PID:368
                                                                              • C:\Windows\SysWOW64\Laalifad.exe
                                                                                C:\Windows\system32\Laalifad.exe
                                                                                39⤵
                                                                                • Executes dropped EXE
                                                                                PID:1952
                                                                                • C:\Windows\SysWOW64\Lilanioo.exe
                                                                                  C:\Windows\system32\Lilanioo.exe
                                                                                  40⤵
                                                                                  • Adds autorun key to be loaded by Explorer.exe on startup
                                                                                  • Executes dropped EXE
                                                                                  • Drops file in System32 directory
                                                                                  • Modifies registry class
                                                                                  PID:4572
                                                                                  • C:\Windows\SysWOW64\Laciofpa.exe
                                                                                    C:\Windows\system32\Laciofpa.exe
                                                                                    41⤵
                                                                                    • Adds autorun key to be loaded by Explorer.exe on startup
                                                                                    • Executes dropped EXE
                                                                                    • Drops file in System32 directory
                                                                                    • Modifies registry class
                                                                                    PID:5104
                                                                                    • C:\Windows\SysWOW64\Ldaeka32.exe
                                                                                      C:\Windows\system32\Ldaeka32.exe
                                                                                      42⤵
                                                                                      • Executes dropped EXE
                                                                                      • Drops file in System32 directory
                                                                                      • Modifies registry class
                                                                                      PID:4864
                                                                                      • C:\Windows\SysWOW64\Lgpagm32.exe
                                                                                        C:\Windows\system32\Lgpagm32.exe
                                                                                        43⤵
                                                                                        • Adds autorun key to be loaded by Explorer.exe on startup
                                                                                        • Executes dropped EXE
                                                                                        • Modifies registry class
                                                                                        PID:3132
                                                                                        • C:\Windows\SysWOW64\Laefdf32.exe
                                                                                          C:\Windows\system32\Laefdf32.exe
                                                                                          44⤵
                                                                                          • Adds autorun key to be loaded by Explorer.exe on startup
                                                                                          • Executes dropped EXE
                                                                                          PID:4732
                                                                                          • C:\Windows\SysWOW64\Lddbqa32.exe
                                                                                            C:\Windows\system32\Lddbqa32.exe
                                                                                            45⤵
                                                                                            • Executes dropped EXE
                                                                                            • Drops file in System32 directory
                                                                                            • Modifies registry class
                                                                                            PID:3028
                                                                                            • C:\Windows\SysWOW64\Lgbnmm32.exe
                                                                                              C:\Windows\system32\Lgbnmm32.exe
                                                                                              46⤵
                                                                                              • Adds autorun key to be loaded by Explorer.exe on startup
                                                                                              • Executes dropped EXE
                                                                                              • Drops file in System32 directory
                                                                                              • Modifies registry class
                                                                                              PID:4896
                                                                                              • C:\Windows\SysWOW64\Mnlfigcc.exe
                                                                                                C:\Windows\system32\Mnlfigcc.exe
                                                                                                47⤵
                                                                                                • Adds autorun key to be loaded by Explorer.exe on startup
                                                                                                • Executes dropped EXE
                                                                                                • Drops file in System32 directory
                                                                                                PID:3320
                                                                                                • C:\Windows\SysWOW64\Mciobn32.exe
                                                                                                  C:\Windows\system32\Mciobn32.exe
                                                                                                  48⤵
                                                                                                  • Adds autorun key to be loaded by Explorer.exe on startup
                                                                                                  • Executes dropped EXE
                                                                                                  • Drops file in System32 directory
                                                                                                  • Modifies registry class
                                                                                                  PID:2320
                                                                                                  • C:\Windows\SysWOW64\Mjcgohig.exe
                                                                                                    C:\Windows\system32\Mjcgohig.exe
                                                                                                    49⤵
                                                                                                    • Adds autorun key to be loaded by Explorer.exe on startup
                                                                                                    • Executes dropped EXE
                                                                                                    • Drops file in System32 directory
                                                                                                    • Modifies registry class
                                                                                                    PID:4548
                                                                                                    • C:\Windows\SysWOW64\Mdiklqhm.exe
                                                                                                      C:\Windows\system32\Mdiklqhm.exe
                                                                                                      50⤵
                                                                                                      • Executes dropped EXE
                                                                                                      • Modifies registry class
                                                                                                      PID:756
                                                                                                      • C:\Windows\SysWOW64\Mkbchk32.exe
                                                                                                        C:\Windows\system32\Mkbchk32.exe
                                                                                                        51⤵
                                                                                                        • Adds autorun key to be loaded by Explorer.exe on startup
                                                                                                        • Executes dropped EXE
                                                                                                        • Drops file in System32 directory
                                                                                                        • Modifies registry class
                                                                                                        PID:4884
                                                                                                        • C:\Windows\SysWOW64\Mamleegg.exe
                                                                                                          C:\Windows\system32\Mamleegg.exe
                                                                                                          52⤵
                                                                                                          • Adds autorun key to be loaded by Explorer.exe on startup
                                                                                                          • Executes dropped EXE
                                                                                                          PID:1748
                                                                                                          • C:\Windows\SysWOW64\Mcnhmm32.exe
                                                                                                            C:\Windows\system32\Mcnhmm32.exe
                                                                                                            53⤵
                                                                                                            • Adds autorun key to be loaded by Explorer.exe on startup
                                                                                                            • Executes dropped EXE
                                                                                                            PID:2092
                                                                                                            • C:\Windows\SysWOW64\Mjhqjg32.exe
                                                                                                              C:\Windows\system32\Mjhqjg32.exe
                                                                                                              54⤵
                                                                                                              • Executes dropped EXE
                                                                                                              • Drops file in System32 directory
                                                                                                              PID:1700
                                                                                                              • C:\Windows\SysWOW64\Mpaifalo.exe
                                                                                                                C:\Windows\system32\Mpaifalo.exe
                                                                                                                55⤵
                                                                                                                • Executes dropped EXE
                                                                                                                • Modifies registry class
                                                                                                                PID:1924
                                                                                                                • C:\Windows\SysWOW64\Mcpebmkb.exe
                                                                                                                  C:\Windows\system32\Mcpebmkb.exe
                                                                                                                  56⤵
                                                                                                                  • Adds autorun key to be loaded by Explorer.exe on startup
                                                                                                                  • Executes dropped EXE
                                                                                                                  • Drops file in System32 directory
                                                                                                                  • Modifies registry class
                                                                                                                  PID:1212
                                                                                                                  • C:\Windows\SysWOW64\Mkgmcjld.exe
                                                                                                                    C:\Windows\system32\Mkgmcjld.exe
                                                                                                                    57⤵
                                                                                                                    • Adds autorun key to be loaded by Explorer.exe on startup
                                                                                                                    • Executes dropped EXE
                                                                                                                    PID:552
                                                                                                                    • C:\Windows\SysWOW64\Mnfipekh.exe
                                                                                                                      C:\Windows\system32\Mnfipekh.exe
                                                                                                                      58⤵
                                                                                                                      • Adds autorun key to be loaded by Explorer.exe on startup
                                                                                                                      • Executes dropped EXE
                                                                                                                      • Drops file in System32 directory
                                                                                                                      • Modifies registry class
                                                                                                                      PID:4012
                                                                                                                      • C:\Windows\SysWOW64\Mdpalp32.exe
                                                                                                                        C:\Windows\system32\Mdpalp32.exe
                                                                                                                        59⤵
                                                                                                                        • Adds autorun key to be loaded by Explorer.exe on startup
                                                                                                                        • Executes dropped EXE
                                                                                                                        • Drops file in System32 directory
                                                                                                                        • Modifies registry class
                                                                                                                        PID:3136
                                                                                                                        • C:\Windows\SysWOW64\Mgnnhk32.exe
                                                                                                                          C:\Windows\system32\Mgnnhk32.exe
                                                                                                                          60⤵
                                                                                                                          • Adds autorun key to be loaded by Explorer.exe on startup
                                                                                                                          • Executes dropped EXE
                                                                                                                          • Modifies registry class
                                                                                                                          PID:4764
                                                                                                                          • C:\Windows\SysWOW64\Nnhfee32.exe
                                                                                                                            C:\Windows\system32\Nnhfee32.exe
                                                                                                                            61⤵
                                                                                                                            • Adds autorun key to be loaded by Explorer.exe on startup
                                                                                                                            • Executes dropped EXE
                                                                                                                            • Drops file in System32 directory
                                                                                                                            PID:3584
                                                                                                                            • C:\Windows\SysWOW64\Nqfbaq32.exe
                                                                                                                              C:\Windows\system32\Nqfbaq32.exe
                                                                                                                              62⤵
                                                                                                                              • Adds autorun key to be loaded by Explorer.exe on startup
                                                                                                                              • Executes dropped EXE
                                                                                                                              • Drops file in System32 directory
                                                                                                                              • Modifies registry class
                                                                                                                              PID:5024
                                                                                                                              • C:\Windows\SysWOW64\Nceonl32.exe
                                                                                                                                C:\Windows\system32\Nceonl32.exe
                                                                                                                                63⤵
                                                                                                                                • Adds autorun key to be loaded by Explorer.exe on startup
                                                                                                                                • Executes dropped EXE
                                                                                                                                • Drops file in System32 directory
                                                                                                                                PID:4904
                                                                                                                                • C:\Windows\SysWOW64\Njogjfoj.exe
                                                                                                                                  C:\Windows\system32\Njogjfoj.exe
                                                                                                                                  64⤵
                                                                                                                                  • Adds autorun key to be loaded by Explorer.exe on startup
                                                                                                                                  • Executes dropped EXE
                                                                                                                                  • Drops file in System32 directory
                                                                                                                                  • Modifies registry class
                                                                                                                                  PID:4608
                                                                                                                                  • C:\Windows\SysWOW64\Nqiogp32.exe
                                                                                                                                    C:\Windows\system32\Nqiogp32.exe
                                                                                                                                    65⤵
                                                                                                                                    • Executes dropped EXE
                                                                                                                                    • Drops file in System32 directory
                                                                                                                                    • Modifies registry class
                                                                                                                                    PID:2740
                                                                                                                                    • C:\Windows\SysWOW64\Ngcgcjnc.exe
                                                                                                                                      C:\Windows\system32\Ngcgcjnc.exe
                                                                                                                                      66⤵
                                                                                                                                      • Adds autorun key to be loaded by Explorer.exe on startup
                                                                                                                                      • Drops file in System32 directory
                                                                                                                                      PID:2724
                                                                                                                                      • C:\Windows\SysWOW64\Nqklmpdd.exe
                                                                                                                                        C:\Windows\system32\Nqklmpdd.exe
                                                                                                                                        67⤵
                                                                                                                                        • Drops file in System32 directory
                                                                                                                                        • Modifies registry class
                                                                                                                                        PID:2384
                                                                                                                                        • C:\Windows\SysWOW64\Ngedij32.exe
                                                                                                                                          C:\Windows\system32\Ngedij32.exe
                                                                                                                                          68⤵
                                                                                                                                          • Adds autorun key to be loaded by Explorer.exe on startup
                                                                                                                                          • Drops file in System32 directory
                                                                                                                                          • Modifies registry class
                                                                                                                                          PID:4144
                                                                                                                                          • C:\Windows\SysWOW64\Nbkhfc32.exe
                                                                                                                                            C:\Windows\system32\Nbkhfc32.exe
                                                                                                                                            69⤵
                                                                                                                                            • Adds autorun key to be loaded by Explorer.exe on startup
                                                                                                                                            • Drops file in System32 directory
                                                                                                                                            PID:1832
                                                                                                                                            • C:\Windows\SysWOW64\Nggqoj32.exe
                                                                                                                                              C:\Windows\system32\Nggqoj32.exe
                                                                                                                                              70⤵
                                                                                                                                              • Adds autorun key to be loaded by Explorer.exe on startup
                                                                                                                                              • Drops file in System32 directory
                                                                                                                                              • Modifies registry class
                                                                                                                                              PID:3760
                                                                                                                                              • C:\Windows\SysWOW64\Nkcmohbg.exe
                                                                                                                                                C:\Windows\system32\Nkcmohbg.exe
                                                                                                                                                71⤵
                                                                                                                                                  PID:2408
                                                                                                                                                  • C:\Windows\SysWOW64\WerFault.exe
                                                                                                                                                    C:\Windows\SysWOW64\WerFault.exe -u -p 2408 -s 412
                                                                                                                                                    72⤵
                                                                                                                                                    • Program crash
                                                                                                                                                    PID:1804
    • C:\Windows\SysWOW64\WerFault.exe
      C:\Windows\SysWOW64\WerFault.exe -pss -s 428 -p 2408 -ip 2408
      1⤵
        PID:2712

      Network

      MITRE ATT&CK Enterprise v15

      Replay Monitor

      Loading Replay Monitor...

      Downloads

      • C:\Windows\SysWOW64\Haidklda.exe

        Filesize

        296KB

        MD5

        c93ced9e29ecf179542409327afa7739

        SHA1

        2541cbce7d9d6d89ef2fdc08ceb09c160aebca03

        SHA256

        13275ca842a95e8e5e24ab99adf2cfbef3e2b7f2542abb9b6139ec44999c264f

        SHA512

        81f2e8a8115a3062aa5c0e93f716eadbfb77c533302ac1d75f3598f1a230b890ef8d417c16ec71c86e5a85c407e631023e4299d675a239a9a6f5d9436a12bd3d

      • C:\Windows\SysWOW64\Hippdo32.exe

        Filesize

        296KB

        MD5

        a2c7e81bca6644c8327e0e7f967ad24f

        SHA1

        f00b400e62b7dc48b46fe162e47a7df11c45447f

        SHA256

        88789152484df2917e87de906c9a099f0921e56d9691974bf1807e55de932901

        SHA512

        080d02d728971cff40ea325a2a61f0cc040b62ff02ff2806d5eeb1288563b660124be9e77124e2ac701cddd54de1496fc1ab59507cb3e1273f9f075dce91ef12

      • C:\Windows\SysWOW64\Hmioonpn.exe

        Filesize

        296KB

        MD5

        e7112ec594d9c7b405aa6a335543868a

        SHA1

        2a9b25369361842701d653bc1dea83bffb433ec0

        SHA256

        da29beb2639c7bd1df50df6f3593aa56de1aab76348afc0aedb4718303587299

        SHA512

        c4c1618fd78711df4ecf43ac79dcd5993a9ea06ebf72ba90e038b9541f460b544cb1dab6e18163e0642c247ca1a50bc5a2557e58c730af9bb00d584ed06df5cb

      • C:\Windows\SysWOW64\Hmklen32.exe

        Filesize

        296KB

        MD5

        d056a2bbba6a04e5383368341dcbdacd

        SHA1

        2a4a8efb6daa7f316d89e7130e82b88731d2453c

        SHA256

        15c6447f145852faa000aa44ab48a9bd0169abd13b4dc3a3bb09d328ff070b24

        SHA512

        c985cc6322a029aba50dc2e7e1f61a8d47fe3a762c5c460f2b819544b17d249372f9f33ef840d5ae2860661a75ed327bfabc3f77b621c8c0a94b3844229c626b

      • C:\Windows\SysWOW64\Iakaql32.exe

        Filesize

        296KB

        MD5

        9a42875d8236de1645c710665a0857ad

        SHA1

        9e1fdae3fdbffd898939016e5ac75876dd84cac0

        SHA256

        c38cfdb3ce8e610f808279c88b687d2ac7048eca6078a25204ee531cbe2be1b9

        SHA512

        1b4c70c562da7027a37a092489364ce96d8efb41f91bdbe0a9ee5015f0561d3f7169f3c9cd08d86cea1b99a0b1c16efa440e2464050802047a7018fdfd22e338

      • C:\Windows\SysWOW64\Icljbg32.exe

        Filesize

        296KB

        MD5

        8f2cdae2a56de114876fb3df0c0bd4bf

        SHA1

        2770124c3b4b7ec59a111e6f452564bbeb706ac1

        SHA256

        df99cc82ffa4056651b5a4df057eebcc35fcb5a19850ec145aecf68236f9fffa

        SHA512

        02f54dd5488fd6e908db1665ff4aff1bbb40d9211df16ad34723448f3699b30767ea7208990c7c4074725d8c3024a9ed0012b0300d888f906bc9683d51167294

      • C:\Windows\SysWOW64\Idacmfkj.exe

        Filesize

        296KB

        MD5

        515ce4350e61b555f96931c94229a4f0

        SHA1

        366146d23f2f7f6b4629a1789dc38589f69fc84d

        SHA256

        84b3e3f325f3d08c267fb54f7d1101eab7737ccbb663d1a8b920599510e4b625

        SHA512

        70644c88b865afdc16087eae2725ae64a5e706739939384b16a14e96202eb4d301d35f7a75f782a4be3407b557f8b8b9b0b40885d163951e7e85503d3ebe282b

      • C:\Windows\SysWOW64\Idofhfmm.exe

        Filesize

        296KB

        MD5

        3579f0da587e75a561fa6da84c0197f6

        SHA1

        94bdc0198870547874d8f4fdc58fd04fa12f4f77

        SHA256

        6149b84ff1082e8c7fccac58f76e5c49c3267adfad13c9aeb8952ffde5458ae6

        SHA512

        9db9a83bdc0fff5d1a4cc3e8b94433bb7ff8102f60c62d4539751a4b996589351e64e9b673d7c5c661f3a93cf9a49b43e552f8d8efc6cf8a9d6233e39ced4360

      • C:\Windows\SysWOW64\Iffmccbi.exe

        Filesize

        296KB

        MD5

        2e9ee58ccf8b18d692e10327d9ed0ef6

        SHA1

        be85e806b199b2a37e29a8a53b4c2cb9249d492e

        SHA256

        bcdd1eb3b5244c39d9a7abfe11abab35030d1c3a1dac97c5c1c011033fb97229

        SHA512

        2f8355353566d2136a6e84d8ce738887b41ebce7902c8bd6d3043ee3909ba9b2e32a3dc6922b62e9be0e5d352a66741bdbad1d6eb1a18f2e963a729a51149884

      • C:\Windows\SysWOW64\Ifhiib32.exe

        Filesize

        296KB

        MD5

        804d65686fb26b19b389acd3ffb59ec9

        SHA1

        cfb96a58138980b5bcd4ce869a398e6cccb9037a

        SHA256

        ddb3d6aac04ece36e0330da422338cfe0b1df27a3162fbb9622c0beee9a52eac

        SHA512

        c6c8ec42b6d48004528a4b2d46964850287ea08d1a81f0d4c3054dfc84585fd85eec27faebddf718eae6f4f895bd98c84815d98006b4b464bd785fa7d919c6a5

      • C:\Windows\SysWOW64\Ifjfnb32.exe

        Filesize

        296KB

        MD5

        68e84b8baf1c93ef3ee896db60793631

        SHA1

        9461bf386c0b1dc313272bdcde58fb8ca257c4ea

        SHA256

        7b931f76f7d2e4eaba4f7847804a9962ab2eefbc20d491c59d95f5a44522343c

        SHA512

        856455dee928c611c0a7f0d6554df471acc847a8357bd15393668f3e197d767e8aa96c3118a93ab0b9d8584cb447a2ff3dc5a4b4042de3a9a2d69833dea2dde4

      • C:\Windows\SysWOW64\Iikopmkd.exe

        Filesize

        296KB

        MD5

        38741845fec9141b9072467cba275b9f

        SHA1

        ff141a1ef37be7d60dbb9785d3d26bbc52e32691

        SHA256

        991f11e2ec76e12f16b607a01703a27e68905450b0345831d50ee6df3eb7850b

        SHA512

        30ff692608c57d43490259256369082ea82e017d844a809f9f7518e4bc24c2f36e7736a11e501a6ed1a893fab9e356719097509e51eca0bdca05e0909a657c09

      • C:\Windows\SysWOW64\Jaedgjjd.exe

        Filesize

        296KB

        MD5

        e9ff903fa26ae19ac924057eaa13a824

        SHA1

        b54f9207719c56b967abf7cf24537136394ae447

        SHA256

        5a86dea08f8682c6f0b7b1de10802ed1c7ec3000d16c94f8dc54c095f7fff52e

        SHA512

        a397e8262b28f2a0704100672a07c3193d6e69351e84c3aa62b1054ea72cd40b634adcaa02c9ba8a8c69907fa8c0faf3a69053a4f9a427ae411e4f4f2008a8a6

      • C:\Windows\SysWOW64\Jaimbj32.exe

        Filesize

        296KB

        MD5

        8f242f9d186d973f8706cf87316ad56a

        SHA1

        0f6a1502d1e798357142f5341ec2fe0f927812eb

        SHA256

        4e74a12ece20fc7a4516bf22b47c6f7a7c311452f5efe6de8e0a7316fae93c93

        SHA512

        a590642e439f0617cc77a7b0ae7c606801edf9f9244ef0a1a012df75e0882bf055258155cdd9a17af1334e1e50e09bccf8c24e33993eabb402bf0b71680289d6

      • C:\Windows\SysWOW64\Jbhmdbnp.exe

        Filesize

        296KB

        MD5

        a01c0ab81152352d1b8f0671d3387ca3

        SHA1

        a08b8c310bfbffdbeedb639f9c8c0f372dc19535

        SHA256

        826a9ad15cb01be2f2ee0060269a114222e3732b45396fe6d148fd5d012749dd

        SHA512

        3f5a19b52e8a81331c57770d3aa0ba37d8ad67ebeb145c760f7b09edd966f18bdb8f901be24d0772441d43d8458b2c3b79c644761abba758aebad07f1b82b71d

      • C:\Windows\SysWOW64\Jbmfoa32.exe

        Filesize

        296KB

        MD5

        5bceec3b6ce283afe489f5d3292a6d48

        SHA1

        73a8f8164388f9ebfcb4c3209a63518818d8dd96

        SHA256

        27edcbd21c6c7523a23571b31ad66e5243a2f512ec763b84fc13626277f7b303

        SHA512

        57471ec96d933b76ae1ed141ce1dc4d012fa039d8d60d93c016c11db085334eaa143bbf0640911b1d32c91e62179fed3bcbe2b235aa1160b5148c998df25d74e

      • C:\Windows\SysWOW64\Jfffjqdf.exe

        Filesize

        296KB

        MD5

        50785d9f5589bed4eeea513a74352e9f

        SHA1

        11af1ed8e0d46e1c24ba58503f4504084373758f

        SHA256

        341b836e7260a08193c97d9b307e48eb0809ea4bc54dfe5f03bd20fb049d6b4c

        SHA512

        e0b44be7e83d2304e49dde142adcbe6496662f6163006809f53ae88c9c2b87611f5a712ed9879125e4de7da436ffbd8b4b59cd97c440ff728964c3159652bdec

      • C:\Windows\SysWOW64\Jiikak32.exe

        Filesize

        296KB

        MD5

        9f1c13b59329c6940ca0d90f4bc23c7e

        SHA1

        44dc619023cf93e28530807c56cb0485e7cb8fd7

        SHA256

        e99f515e725bce0098f0b622d67f30da1a67b24bd4d13562d743fd42b86f1acd

        SHA512

        f4718d44a7d450376c46c4245c94e39bf09913d00ebd9cd35fef5e64ce54a86edca0d093637f8803e976052011f068ca02e76450bf3113a572c2f0c0e154496a

      • C:\Windows\SysWOW64\Jjmhppqd.exe

        Filesize

        296KB

        MD5

        a4e36a49887648f8b3e2601b93cabebe

        SHA1

        6d30d518c69beeac24701fa4a89fedb2ee08a865

        SHA256

        b3fae3c0a75c27ff411d0e782442c1a936f2ff5e5eaee8f3369c8b683b10de85

        SHA512

        097410c356bc57f94fbc9bfa1b11f22d6517a0a40a6e2bbf34c8df6d326a5c57d003add1bd71fdce51f34d40680910dba2db9174d33c29715ddb4195853f3c69

      • C:\Windows\SysWOW64\Jmkdlkph.exe

        Filesize

        296KB

        MD5

        257f11691cd0635f3e09f0718a4fe032

        SHA1

        5943b758ab877688f587cd64eed78b50e20ae5a3

        SHA256

        5b0a2454d6c03681af186e3417da15dbe985fb483ccd215a408c438dc42fb3bb

        SHA512

        8b2d6caa515dcadbaa8b22a441d4e663b411d5310f3efc271b77bea97834583a897b9e5e22b5c5adae6b16df0a40f9caaae58ef9db2a4b54c17391110abb6015

      • C:\Windows\SysWOW64\Jmpngk32.exe

        Filesize

        296KB

        MD5

        16c0bf012d17218f8f86ce62e373f6df

        SHA1

        9a1b18cdb68512d60a518ce08269b03df2d8a1e4

        SHA256

        c7c8072e6cbebcbeaaf0776602c2924fa83b80a1fe875ed8b02b2d5b5853c952

        SHA512

        74a1756aa633c069ec9a7751bf76ef163986cd5dfe31bfa6a187e8a741ab0e1a0b3a88d051af87c1ada88b0d4502cf1276e146449f6ae1a4b4d1152fa9141148

      • C:\Windows\SysWOW64\Jpaghf32.exe

        Filesize

        296KB

        MD5

        8aac25a83ee74c0eda181c4d45710137

        SHA1

        a4f03ae3d01c415b12f8e0730b30b27651c9111e

        SHA256

        baf398c175b0fd0a2f7e5a62e36165494add6b1bbd733e4090a6c2aff13f6d0b

        SHA512

        4f6be6c2f6520f75a205740ff9f9cc17848f73b48f93396a24e175e4e2f21c54c3bd799879e502be8448bd2f58149e8abe58d17c908267a750dfc62fb9c5abce

      • C:\Windows\SysWOW64\Kbdmpqcb.exe

        Filesize

        296KB

        MD5

        13ed45a7acd8ad21c78878b5964b9e1a

        SHA1

        092f6e1fe0d117d2d848dc643a6f7a4a28ce52bd

        SHA256

        3e18118c192ad4ad82bd34ba288ba602ad1e6485e80982ab9fe2bef4eaa5a8e8

        SHA512

        af75b577a30a2ccf8298e9404490aeedee5609b738d781f89d7020a9df447b960a905b244d76ff01817a6206a3cb0ba62f269f545620720bc73599650a9d731c

      • C:\Windows\SysWOW64\Kcifkp32.exe

        Filesize

        296KB

        MD5

        e635ede1a329e76aa3ebf1fa1a9de09e

        SHA1

        f8a6ace55e0443ef85eaa719b71eb6b3d4a75648

        SHA256

        5b232c05971439f899e5f104caf55b60a13a2a0d6826272ff043c36a14a3d4e1

        SHA512

        227bd891ca5c657020e79b525e44270635dc5bec2faae9148d915217b25caf86ff4f1b46186b2cf46f284b860e3e3efed69e74928268d76dc9f4f1df65b5d907

      • C:\Windows\SysWOW64\Kckbqpnj.exe

        Filesize

        296KB

        MD5

        0fdf9ffd0ae8b462ffc38cfe6153e8f2

        SHA1

        5364671f81ee37e5fe36fd4bf5596b43e55e5b76

        SHA256

        23e05dd3f5924478acc70c5e654d622cad2d75429a8a4c226c07f2ad63f2f5f2

        SHA512

        8f8ca639a3896b464864fec189105789233c1628517583376ef1ef7b43f510771600558c9660e685d55a57647de62befe8503ed67a89d24fe0f25947a06e2cf3

      • C:\Windows\SysWOW64\Kgmlkp32.exe

        Filesize

        296KB

        MD5

        4b1018a5eb78ec1c4183efd8c73512d9

        SHA1

        7308ed90bca78c099f85227ab8a67a952d7a400c

        SHA256

        649b724cdfe7c2ca01a38daf8aa52b88fdac37365dedc8353700a427c4a92d5a

        SHA512

        7b8632e43db219ced6e82e7d0e24ee73200119dac108c6d64af367a4fcc63cb61baa0563ad3e7155a9e9cb5b8b9ac2b8420b5c58a9a646cad6297a1c9d843e45

      • C:\Windows\SysWOW64\Kinemkko.exe

        Filesize

        296KB

        MD5

        b0700049b5b39429d709719e54d39060

        SHA1

        00b295ff4915fd6fef9b5f6d5c12db2b0c8df89e

        SHA256

        b0d1aad04b480e17c71db043fb278ac216ff0834ba3242d0e2f25f2fe061ee0f

        SHA512

        823271857de8c5b8e063d2c67840912e67f2127f227bd54fb8b95c04017b92ac1dfb35daee94bf2627c59420ae5d713081894b3f562b112c30018325e4a47568

      • C:\Windows\SysWOW64\Kmlnbi32.exe

        Filesize

        296KB

        MD5

        ed1d0653497ccb96d0a18372b9f0c2a3

        SHA1

        e9c8f10a15e1131f1fef573676588c500744d5db

        SHA256

        00bac469f82ab2aed71592c236a02df9354ba97306dfe9b4c08fd317cb5790b8

        SHA512

        63d82a25a5fccaa6bb50a1a9a252e7ebab62a19288f04ff94c68778a72cda2fe46d346d543b662ebc1708bdae9b9baf5b2b2e28182bd61c6c34abddbee3125e1

      • C:\Windows\SysWOW64\Kmnjhioc.exe

        Filesize

        296KB

        MD5

        962edc238e2d020d862b20d319cafddd

        SHA1

        36f140f48740f28cb92a294472c9fd0e0a6334a5

        SHA256

        1c3eef8fc870c191d798a5cca6b04ee1a8b64e32886543d0db84a76cdb2c804d

        SHA512

        892796471fa5650650132e40d74b88b54a62b60ab6eb2779dba35a68e3084f13f2ee4f670a638a25b38eaf89f37ad8ae91867dc294a05838defeafcd9e893821

      • C:\Windows\SysWOW64\Kpccnefa.exe

        Filesize

        296KB

        MD5

        d9c41669b199d1df784023fe3aba8359

        SHA1

        77cd646910f6bcf659e023f3c50f528e2dd32a06

        SHA256

        b3cad00edc5130541d00ccb4029078cb151558773d7d75fa3bc02e258c61aa38

        SHA512

        8f24910bfded66a244519a276e0c061815cde206084eef9707dba9e7c01a75096a4d0871ba5f8271966db990441a25bc4f19559d7366aa46072c5094721ee8cb

      • C:\Windows\SysWOW64\Kphmie32.exe

        Filesize

        296KB

        MD5

        1bec91c24c340d42f31fcfb0a88ef7dc

        SHA1

        0c8410b3f412f09ab4da131c6363df369bed652d

        SHA256

        6aaedae27f76a052c89d8ff3d9c7b01c87cd4cee97439446b6bdb18ade8a93d6

        SHA512

        73d8cdb9613b0f097f17b23531c5618a8d99736c02fb1d9c5ba84e9a70f58d39e8777b0655f847fe7eebf76e2cea79e90cc1055d989a8e96231583b8ea0291b9

      • C:\Windows\SysWOW64\Laalifad.exe

        Filesize

        296KB

        MD5

        c015b5b9b7c70441ea76df19a7f0ca0f

        SHA1

        bcee26350a282554cb6442de11548634b2825491

        SHA256

        6aea52eba5b506ce8915b9892de3b41cfd76b154075b356c8ebc975c2f587dc5

        SHA512

        2dc89188ed2c6e1b129f38dccb60e50020ba80b3d03bf9f1d579289b27068777d39dbadf94fc2d92be86df8101317c8db8ee03e32e05420c8a1bf86b0f20b858

      • C:\Windows\SysWOW64\Liekmj32.exe

        Filesize

        296KB

        MD5

        67430db646a14d8e8f6292b1683c22de

        SHA1

        9f4740732f926353b06540aa4f237ab563fbed31

        SHA256

        70623a2af46bfd1f927a9cd9a34fe6618d8c9e9cb0ec1a0f9db81a61170d53b2

        SHA512

        9fbc03a867794a33603193bc46f493d775763b2f55f8edd0e60498958fc757b7405819e0db5cdc4d93ab5ec38be899e58f118de0d84e43aefb5835d352b2fb4a

      • C:\Windows\SysWOW64\Mciobn32.exe

        Filesize

        296KB

        MD5

        f669939b7385ea41564359cb8d40d26b

        SHA1

        ee6153bf718722295175ac18421f4fbd8aff3cbe

        SHA256

        202c66524427bc144873bd163426d7a66bb65a6fc0cc419da2205f8878bec47c

        SHA512

        9d8619552d4ed9afb9ee19cd12d7b192bcb709783b1b9a89ee6e776da61495b333f5710d1796044b2575b3e1b520e6b8eebc7996a306d18d85142c99d7409265

      • C:\Windows\SysWOW64\Mkbchk32.exe

        Filesize

        296KB

        MD5

        b6f4a08de9ebbe01aa457b1a18a4f4ab

        SHA1

        91ad42706a5aad5ec3667c27b88a9f8933773eaf

        SHA256

        6d3cb43faba2cc9d22b9e52ee96e1823a6c25a379847eaa5dfc4826f262b23e0

        SHA512

        e4dd83458efbaf29f00165aa02847f7bb01d77edb17d8b5d7819a473a0e2f8c43ddc43cde2232c6ccd969d9a91b8f7570b2616f430d53b3247f0506f60b91e21

      • C:\Windows\SysWOW64\Mnfipekh.exe

        Filesize

        296KB

        MD5

        80de8963de49135d3a4371b3387c797b

        SHA1

        7e4004a6a931b687c9605eabf76d032fbbfaac4a

        SHA256

        e729cbc1196b00fbb91b33815bc65637591471996322cd4ec93ed2c41f791df4

        SHA512

        1e332ab2179dde2586132e56ff05e46c6f487e588ea0cf771924046e7bb30e515c3868a855332e07b0287e0e1e6474afffe0764125e48d81cdf2a85d1cbd149e

      • C:\Windows\SysWOW64\Nbkhfc32.exe

        Filesize

        296KB

        MD5

        1eb76c86afa1cecea1a34c7082b3e306

        SHA1

        4714b5b198928fd03738854e66dc74c61a013f19

        SHA256

        dd73ec29bd8f0d1c13db555bd57f82106818eda3d5f203225d548b3225cf2e4c

        SHA512

        c890732f8fba862f543b8e843622f318f66d77df9301719f1f8f3917cd9a539cc893d8f8c6217ad0b52cdce66bd539ecac8c6ceb6e89360ce1c710f72d77e5d0

      • C:\Windows\SysWOW64\Nqklmpdd.exe

        Filesize

        296KB

        MD5

        9c57fcbb4340fa3970cc15d262af14c2

        SHA1

        0fea5af0b3de7844ef5f31756c14ce65b63204b9

        SHA256

        dbb8c2e6ccf83bb68a4bd03759b4f0f8100a85f12a31d0c990ab71a46e44566c

        SHA512

        ddada5066b12b041c24e61533a5277522e442ce5cbe26a7de012062dee80ec7f7952e5326d8c19d6c68e0ca4e008d84bd218eb3e86e2d1444e698ea4242bfccd

      • C:\Windows\SysWOW64\Onkhkpho.dll

        Filesize

        7KB

        MD5

        3f212678a646ed743b2e7bb7c76403a4

        SHA1

        e46d7ecff048bddd16e054ae63cc6aa6e7f686f1

        SHA256

        05e0e73183e0145341ffe7bef90c85c8ff207d386b32857ae8e25b78b77f9d05

        SHA512

        44cc10e6f7d7f1ee19702de194b347843d788451f33abe11dabe6f4e42dc41e10e610f2082e9e2572f856c29229827114d2f626ac7e94a77b9c801bf4c5b1a94

      • memory/368-286-0x0000000000400000-0x0000000000434000-memory.dmp

        Filesize

        208KB

      • memory/368-540-0x0000000000400000-0x0000000000434000-memory.dmp

        Filesize

        208KB

      • memory/384-232-0x0000000000400000-0x0000000000434000-memory.dmp

        Filesize

        208KB

      • memory/512-64-0x0000000000400000-0x0000000000434000-memory.dmp

        Filesize

        208KB

      • memory/552-509-0x0000000000400000-0x0000000000434000-memory.dmp

        Filesize

        208KB

      • memory/552-400-0x0000000000400000-0x0000000000434000-memory.dmp

        Filesize

        208KB

      • memory/756-521-0x0000000000400000-0x0000000000434000-memory.dmp

        Filesize

        208KB

      • memory/756-358-0x0000000000400000-0x0000000000434000-memory.dmp

        Filesize

        208KB

      • memory/764-189-0x0000000000400000-0x0000000000434000-memory.dmp

        Filesize

        208KB

      • memory/812-103-0x0000000000400000-0x0000000000434000-memory.dmp

        Filesize

        208KB

      • memory/884-144-0x0000000000400000-0x0000000000434000-memory.dmp

        Filesize

        208KB

      • memory/936-240-0x0000000000400000-0x0000000000434000-memory.dmp

        Filesize

        208KB

      • memory/1084-128-0x0000000000400000-0x0000000000434000-memory.dmp

        Filesize

        208KB

      • memory/1140-248-0x0000000000400000-0x0000000000434000-memory.dmp

        Filesize

        208KB

      • memory/1212-398-0x0000000000400000-0x0000000000434000-memory.dmp

        Filesize

        208KB

      • memory/1328-72-0x0000000000400000-0x0000000000434000-memory.dmp

        Filesize

        208KB

      • memory/1384-95-0x0000000000400000-0x0000000000434000-memory.dmp

        Filesize

        208KB

      • memory/1572-8-0x0000000000400000-0x0000000000434000-memory.dmp

        Filesize

        208KB

      • memory/1700-514-0x0000000000400000-0x0000000000434000-memory.dmp

        Filesize

        208KB

      • memory/1700-382-0x0000000000400000-0x0000000000434000-memory.dmp

        Filesize

        208KB

      • memory/1748-517-0x0000000000400000-0x0000000000434000-memory.dmp

        Filesize

        208KB

      • memory/1748-370-0x0000000000400000-0x0000000000434000-memory.dmp

        Filesize

        208KB

      • memory/1832-476-0x0000000000400000-0x0000000000434000-memory.dmp

        Filesize

        208KB

      • memory/1924-512-0x0000000000400000-0x0000000000434000-memory.dmp

        Filesize

        208KB

      • memory/1924-388-0x0000000000400000-0x0000000000434000-memory.dmp

        Filesize

        208KB

      • memory/1952-538-0x0000000000400000-0x0000000000434000-memory.dmp

        Filesize

        208KB

      • memory/1952-292-0x0000000000400000-0x0000000000434000-memory.dmp

        Filesize

        208KB

      • memory/2092-380-0x0000000000400000-0x0000000000434000-memory.dmp

        Filesize

        208KB

      • memory/2276-120-0x0000000000400000-0x0000000000434000-memory.dmp

        Filesize

        208KB

      • memory/2320-350-0x0000000000400000-0x0000000000434000-memory.dmp

        Filesize

        208KB

      • memory/2384-460-0x0000000000400000-0x0000000000434000-memory.dmp

        Filesize

        208KB

      • memory/2384-491-0x0000000000400000-0x0000000000434000-memory.dmp

        Filesize

        208KB

      • memory/2396-262-0x0000000000400000-0x0000000000434000-memory.dmp

        Filesize

        208KB

      • memory/2396-547-0x0000000000400000-0x0000000000434000-memory.dmp

        Filesize

        208KB

      • memory/2408-484-0x0000000000400000-0x0000000000434000-memory.dmp

        Filesize

        208KB

      • memory/2604-116-0x0000000000400000-0x0000000000434000-memory.dmp

        Filesize

        208KB

      • memory/2608-277-0x0000000000400000-0x0000000000434000-memory.dmp

        Filesize

        208KB

      • memory/2608-543-0x0000000000400000-0x0000000000434000-memory.dmp

        Filesize

        208KB

      • memory/2640-268-0x0000000000400000-0x0000000000434000-memory.dmp

        Filesize

        208KB

      • memory/2640-545-0x0000000000400000-0x0000000000434000-memory.dmp

        Filesize

        208KB

      • memory/2724-493-0x0000000000400000-0x0000000000434000-memory.dmp

        Filesize

        208KB

      • memory/2724-454-0x0000000000400000-0x0000000000434000-memory.dmp

        Filesize

        208KB

      • memory/2740-495-0x0000000000400000-0x0000000000434000-memory.dmp

        Filesize

        208KB

      • memory/2740-448-0x0000000000400000-0x0000000000434000-memory.dmp

        Filesize

        208KB

      • memory/2820-45-0x0000000000400000-0x0000000000434000-memory.dmp

        Filesize

        208KB

      • memory/2924-284-0x0000000000400000-0x0000000000434000-memory.dmp

        Filesize

        208KB

      • memory/3028-332-0x0000000000400000-0x0000000000434000-memory.dmp

        Filesize

        208KB

      • memory/3060-212-0x0000000000400000-0x0000000000434000-memory.dmp

        Filesize

        208KB

      • memory/3132-532-0x0000000000400000-0x0000000000434000-memory.dmp

        Filesize

        208KB

      • memory/3132-316-0x0000000000400000-0x0000000000434000-memory.dmp

        Filesize

        208KB

      • memory/3136-506-0x0000000000400000-0x0000000000434000-memory.dmp

        Filesize

        208KB

      • memory/3136-412-0x0000000000400000-0x0000000000434000-memory.dmp

        Filesize

        208KB

      • memory/3148-56-0x0000000000400000-0x0000000000434000-memory.dmp

        Filesize

        208KB

      • memory/3264-47-0x0000000000400000-0x0000000000434000-memory.dmp

        Filesize

        208KB

      • memory/3320-526-0x0000000000400000-0x0000000000434000-memory.dmp

        Filesize

        208KB

      • memory/3320-340-0x0000000000400000-0x0000000000434000-memory.dmp

        Filesize

        208KB

      • memory/3348-176-0x0000000000400000-0x0000000000434000-memory.dmp

        Filesize

        208KB

      • memory/3448-200-0x0000000000400000-0x0000000000434000-memory.dmp

        Filesize

        208KB

      • memory/3584-424-0x0000000000400000-0x0000000000434000-memory.dmp

        Filesize

        208KB

      • memory/3584-503-0x0000000000400000-0x0000000000434000-memory.dmp

        Filesize

        208KB

      • memory/3732-167-0x0000000000400000-0x0000000000434000-memory.dmp

        Filesize

        208KB

      • memory/3760-478-0x0000000000400000-0x0000000000434000-memory.dmp

        Filesize

        208KB

      • memory/3760-486-0x0000000000400000-0x0000000000434000-memory.dmp

        Filesize

        208KB

      • memory/3800-80-0x0000000000400000-0x0000000000434000-memory.dmp

        Filesize

        208KB

      • memory/3876-256-0x0000000000400000-0x0000000000434000-memory.dmp

        Filesize

        208KB

      • memory/4012-411-0x0000000000400000-0x0000000000434000-memory.dmp

        Filesize

        208KB

      • memory/4028-0-0x0000000000400000-0x0000000000434000-memory.dmp

        Filesize

        208KB

      • memory/4144-466-0x0000000000400000-0x0000000000434000-memory.dmp

        Filesize

        208KB

      • memory/4144-489-0x0000000000400000-0x0000000000434000-memory.dmp

        Filesize

        208KB

      • memory/4172-160-0x0000000000400000-0x0000000000434000-memory.dmp

        Filesize

        208KB

      • memory/4240-157-0x0000000000400000-0x0000000000434000-memory.dmp

        Filesize

        208KB

      • memory/4464-215-0x0000000000400000-0x0000000000434000-memory.dmp

        Filesize

        208KB

      • memory/4496-191-0x0000000000400000-0x0000000000434000-memory.dmp

        Filesize

        208KB

      • memory/4544-24-0x0000000000400000-0x0000000000434000-memory.dmp

        Filesize

        208KB

      • memory/4548-352-0x0000000000400000-0x0000000000434000-memory.dmp

        Filesize

        208KB

      • memory/4548-523-0x0000000000400000-0x0000000000434000-memory.dmp

        Filesize

        208KB

      • memory/4572-536-0x0000000000400000-0x0000000000434000-memory.dmp

        Filesize

        208KB

      • memory/4572-298-0x0000000000400000-0x0000000000434000-memory.dmp

        Filesize

        208KB

      • memory/4592-17-0x0000000000400000-0x0000000000434000-memory.dmp

        Filesize

        208KB

      • memory/4608-442-0x0000000000400000-0x0000000000434000-memory.dmp

        Filesize

        208KB

      • memory/4608-497-0x0000000000400000-0x0000000000434000-memory.dmp

        Filesize

        208KB

      • memory/4648-88-0x0000000000400000-0x0000000000434000-memory.dmp

        Filesize

        208KB

      • memory/4708-136-0x0000000000400000-0x0000000000434000-memory.dmp

        Filesize

        208KB

      • memory/4732-326-0x0000000000400000-0x0000000000434000-memory.dmp

        Filesize

        208KB

      • memory/4764-422-0x0000000000400000-0x0000000000434000-memory.dmp

        Filesize

        208KB

      • memory/4864-314-0x0000000000400000-0x0000000000434000-memory.dmp

        Filesize

        208KB

      • memory/4884-364-0x0000000000400000-0x0000000000434000-memory.dmp

        Filesize

        208KB

      • memory/4884-519-0x0000000000400000-0x0000000000434000-memory.dmp

        Filesize

        208KB

      • memory/4896-334-0x0000000000400000-0x0000000000434000-memory.dmp

        Filesize

        208KB

      • memory/4896-528-0x0000000000400000-0x0000000000434000-memory.dmp

        Filesize

        208KB

      • memory/4904-436-0x0000000000400000-0x0000000000434000-memory.dmp

        Filesize

        208KB

      • memory/4904-499-0x0000000000400000-0x0000000000434000-memory.dmp

        Filesize

        208KB

      • memory/4956-223-0x0000000000400000-0x0000000000434000-memory.dmp

        Filesize

        208KB

      • memory/5024-501-0x0000000000400000-0x0000000000434000-memory.dmp

        Filesize

        208KB

      • memory/5024-430-0x0000000000400000-0x0000000000434000-memory.dmp

        Filesize

        208KB

      • memory/5056-32-0x0000000000400000-0x0000000000434000-memory.dmp

        Filesize

        208KB

      • memory/5104-308-0x0000000000400000-0x0000000000434000-memory.dmp

        Filesize

        208KB