Analysis

  • max time kernel
    95s
  • max time network
    123s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240508-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system
  • submitted
    09-05-2024 00:42

General

  • Target

    b03bc271168f5c8084151135ccce4630_NEIKI.exe

  • Size

    459KB

  • MD5

    b03bc271168f5c8084151135ccce4630

  • SHA1

    9708ccc539438406cb20c57575bd3fe5af0928fd

  • SHA256

    22819ff2a7e1817b183abc830006aec4321acb321db46c933d0f20121de445e8

  • SHA512

    136a4ec642f966f87275aacdd7372b432bc0ef30acd2d85903abfaee1ad4c447672e989d9945eb1fb6653921d95f3bb551862fa2a5ee2bba21b5c488b2b31487

  • SSDEEP

    12288:RwIaJwIKfDy/phgeczlqczZd7LFB3oFHoGnFjVZnykJGvpHGdt:RwLJwFfDy/phgeczlqczZd7LFB3oFHo6

Malware Config

Signatures

  • Adds autorun key to be loaded by Explorer.exe on startup 2 TTPs 64 IoCs
  • Malware Dropper & Backdoor - Berbew 34 IoCs

    Berbew is a backdoor Trojan malware with capabilities to download and install a range of additional malicious software, such as other Trojans, ransomware, and cryptominers.

  • Executes dropped EXE 64 IoCs
  • Drops file in System32 directory 64 IoCs
  • Program crash 1 IoCs
  • Modifies registry class 64 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\b03bc271168f5c8084151135ccce4630_NEIKI.exe
    "C:\Users\Admin\AppData\Local\Temp\b03bc271168f5c8084151135ccce4630_NEIKI.exe"
    1⤵
    • Adds autorun key to be loaded by Explorer.exe on startup
    • Modifies registry class
    • Suspicious use of WriteProcessMemory
    PID:1052
    • C:\Windows\SysWOW64\Ifhiib32.exe
      C:\Windows\system32\Ifhiib32.exe
      2⤵
      • Adds autorun key to be loaded by Explorer.exe on startup
      • Executes dropped EXE
      • Drops file in System32 directory
      • Suspicious use of WriteProcessMemory
      PID:2024
      • C:\Windows\SysWOW64\Iiffen32.exe
        C:\Windows\system32\Iiffen32.exe
        3⤵
        • Adds autorun key to be loaded by Explorer.exe on startup
        • Executes dropped EXE
        • Drops file in System32 directory
        • Modifies registry class
        • Suspicious use of WriteProcessMemory
        PID:2004
        • C:\Windows\SysWOW64\Iannfk32.exe
          C:\Windows\system32\Iannfk32.exe
          4⤵
          • Adds autorun key to be loaded by Explorer.exe on startup
          • Executes dropped EXE
          • Drops file in System32 directory
          • Modifies registry class
          • Suspicious use of WriteProcessMemory
          PID:924
          • C:\Windows\SysWOW64\Idofhfmm.exe
            C:\Windows\system32\Idofhfmm.exe
            5⤵
            • Adds autorun key to be loaded by Explorer.exe on startup
            • Executes dropped EXE
            • Modifies registry class
            • Suspicious use of WriteProcessMemory
            PID:388
            • C:\Windows\SysWOW64\Ibagcc32.exe
              C:\Windows\system32\Ibagcc32.exe
              6⤵
              • Adds autorun key to be loaded by Explorer.exe on startup
              • Executes dropped EXE
              • Drops file in System32 directory
              • Suspicious use of WriteProcessMemory
              PID:3004
              • C:\Windows\SysWOW64\Ibccic32.exe
                C:\Windows\system32\Ibccic32.exe
                7⤵
                • Adds autorun key to be loaded by Explorer.exe on startup
                • Executes dropped EXE
                • Modifies registry class
                • Suspicious use of WriteProcessMemory
                PID:324
                • C:\Windows\SysWOW64\Jaedgjjd.exe
                  C:\Windows\system32\Jaedgjjd.exe
                  8⤵
                  • Executes dropped EXE
                  • Drops file in System32 directory
                  • Modifies registry class
                  • Suspicious use of WriteProcessMemory
                  PID:544
                  • C:\Windows\SysWOW64\Jbfpobpb.exe
                    C:\Windows\system32\Jbfpobpb.exe
                    9⤵
                    • Executes dropped EXE
                    • Drops file in System32 directory
                    • Modifies registry class
                    • Suspicious use of WriteProcessMemory
                    PID:3912
                    • C:\Windows\SysWOW64\Jmkdlkph.exe
                      C:\Windows\system32\Jmkdlkph.exe
                      10⤵
                      • Adds autorun key to be loaded by Explorer.exe on startup
                      • Executes dropped EXE
                      • Drops file in System32 directory
                      • Suspicious use of WriteProcessMemory
                      PID:2192
                      • C:\Windows\SysWOW64\Jjpeepnb.exe
                        C:\Windows\system32\Jjpeepnb.exe
                        11⤵
                        • Adds autorun key to be loaded by Explorer.exe on startup
                        • Executes dropped EXE
                        • Modifies registry class
                        • Suspicious use of WriteProcessMemory
                        PID:3680
                        • C:\Windows\SysWOW64\Jdhine32.exe
                          C:\Windows\system32\Jdhine32.exe
                          12⤵
                          • Adds autorun key to be loaded by Explorer.exe on startup
                          • Executes dropped EXE
                          • Drops file in System32 directory
                          • Suspicious use of WriteProcessMemory
                          PID:3588
                          • C:\Windows\SysWOW64\Jmpngk32.exe
                            C:\Windows\system32\Jmpngk32.exe
                            13⤵
                            • Adds autorun key to be loaded by Explorer.exe on startup
                            • Executes dropped EXE
                            • Modifies registry class
                            • Suspicious use of WriteProcessMemory
                            PID:2888
                            • C:\Windows\SysWOW64\Jbmfoa32.exe
                              C:\Windows\system32\Jbmfoa32.exe
                              14⤵
                              • Adds autorun key to be loaded by Explorer.exe on startup
                              • Executes dropped EXE
                              • Drops file in System32 directory
                              • Modifies registry class
                              • Suspicious use of WriteProcessMemory
                              PID:2008
                              • C:\Windows\SysWOW64\Jangmibi.exe
                                C:\Windows\system32\Jangmibi.exe
                                15⤵
                                • Adds autorun key to be loaded by Explorer.exe on startup
                                • Executes dropped EXE
                                • Drops file in System32 directory
                                • Suspicious use of WriteProcessMemory
                                PID:1200
                                • C:\Windows\SysWOW64\Jkfkfohj.exe
                                  C:\Windows\system32\Jkfkfohj.exe
                                  16⤵
                                  • Executes dropped EXE
                                  • Drops file in System32 directory
                                  • Modifies registry class
                                  • Suspicious use of WriteProcessMemory
                                  PID:648
                                  • C:\Windows\SysWOW64\Kaqcbi32.exe
                                    C:\Windows\system32\Kaqcbi32.exe
                                    17⤵
                                    • Adds autorun key to be loaded by Explorer.exe on startup
                                    • Executes dropped EXE
                                    • Drops file in System32 directory
                                    • Modifies registry class
                                    • Suspicious use of WriteProcessMemory
                                    PID:2352
                                    • C:\Windows\SysWOW64\Kbapjafe.exe
                                      C:\Windows\system32\Kbapjafe.exe
                                      18⤵
                                      • Adds autorun key to be loaded by Explorer.exe on startup
                                      • Executes dropped EXE
                                      • Drops file in System32 directory
                                      • Suspicious use of WriteProcessMemory
                                      PID:4152
                                      • C:\Windows\SysWOW64\Kacphh32.exe
                                        C:\Windows\system32\Kacphh32.exe
                                        19⤵
                                        • Adds autorun key to be loaded by Explorer.exe on startup
                                        • Executes dropped EXE
                                        • Modifies registry class
                                        • Suspicious use of WriteProcessMemory
                                        PID:4676
                                        • C:\Windows\SysWOW64\Kkkdan32.exe
                                          C:\Windows\system32\Kkkdan32.exe
                                          20⤵
                                          • Adds autorun key to be loaded by Explorer.exe on startup
                                          • Executes dropped EXE
                                          • Drops file in System32 directory
                                          • Modifies registry class
                                          • Suspicious use of WriteProcessMemory
                                          PID:4024
                                          • C:\Windows\SysWOW64\Kbfiep32.exe
                                            C:\Windows\system32\Kbfiep32.exe
                                            21⤵
                                            • Adds autorun key to be loaded by Explorer.exe on startup
                                            • Executes dropped EXE
                                            • Drops file in System32 directory
                                            • Modifies registry class
                                            • Suspicious use of WriteProcessMemory
                                            PID:4348
                                            • C:\Windows\SysWOW64\Kgbefoji.exe
                                              C:\Windows\system32\Kgbefoji.exe
                                              22⤵
                                              • Executes dropped EXE
                                              • Suspicious use of WriteProcessMemory
                                              PID:1876
                                              • C:\Windows\SysWOW64\Kipabjil.exe
                                                C:\Windows\system32\Kipabjil.exe
                                                23⤵
                                                • Executes dropped EXE
                                                • Drops file in System32 directory
                                                PID:3852
                                                • C:\Windows\SysWOW64\Kibnhjgj.exe
                                                  C:\Windows\system32\Kibnhjgj.exe
                                                  24⤵
                                                  • Executes dropped EXE
                                                  • Drops file in System32 directory
                                                  • Modifies registry class
                                                  PID:2076
                                                  • C:\Windows\SysWOW64\Kpmfddnf.exe
                                                    C:\Windows\system32\Kpmfddnf.exe
                                                    25⤵
                                                    • Adds autorun key to be loaded by Explorer.exe on startup
                                                    • Executes dropped EXE
                                                    • Drops file in System32 directory
                                                    PID:3696
                                                    • C:\Windows\SysWOW64\Liekmj32.exe
                                                      C:\Windows\system32\Liekmj32.exe
                                                      26⤵
                                                      • Adds autorun key to be loaded by Explorer.exe on startup
                                                      • Executes dropped EXE
                                                      • Drops file in System32 directory
                                                      • Modifies registry class
                                                      PID:3972
                                                      • C:\Windows\SysWOW64\Lalcng32.exe
                                                        C:\Windows\system32\Lalcng32.exe
                                                        27⤵
                                                        • Adds autorun key to be loaded by Explorer.exe on startup
                                                        • Executes dropped EXE
                                                        • Drops file in System32 directory
                                                        • Modifies registry class
                                                        PID:2996
                                                        • C:\Windows\SysWOW64\Lkdggmlj.exe
                                                          C:\Windows\system32\Lkdggmlj.exe
                                                          28⤵
                                                          • Executes dropped EXE
                                                          PID:4592
                                                          • C:\Windows\SysWOW64\Lmccchkn.exe
                                                            C:\Windows\system32\Lmccchkn.exe
                                                            29⤵
                                                            • Executes dropped EXE
                                                            • Modifies registry class
                                                            PID:2696
                                                            • C:\Windows\SysWOW64\Lgkhlnbn.exe
                                                              C:\Windows\system32\Lgkhlnbn.exe
                                                              30⤵
                                                              • Executes dropped EXE
                                                              • Drops file in System32 directory
                                                              PID:4556
                                                              • C:\Windows\SysWOW64\Laalifad.exe
                                                                C:\Windows\system32\Laalifad.exe
                                                                31⤵
                                                                • Adds autorun key to be loaded by Explorer.exe on startup
                                                                • Executes dropped EXE
                                                                • Drops file in System32 directory
                                                                • Modifies registry class
                                                                PID:3116
                                                                • C:\Windows\SysWOW64\Lgneampk.exe
                                                                  C:\Windows\system32\Lgneampk.exe
                                                                  32⤵
                                                                  • Executes dropped EXE
                                                                  • Drops file in System32 directory
                                                                  PID:4524
                                                                  • C:\Windows\SysWOW64\Lilanioo.exe
                                                                    C:\Windows\system32\Lilanioo.exe
                                                                    33⤵
                                                                    • Adds autorun key to be loaded by Explorer.exe on startup
                                                                    • Executes dropped EXE
                                                                    • Drops file in System32 directory
                                                                    • Modifies registry class
                                                                    PID:4888
                                                                    • C:\Windows\SysWOW64\Lgpagm32.exe
                                                                      C:\Windows\system32\Lgpagm32.exe
                                                                      34⤵
                                                                      • Adds autorun key to be loaded by Explorer.exe on startup
                                                                      • Executes dropped EXE
                                                                      • Drops file in System32 directory
                                                                      PID:2488
                                                                      • C:\Windows\SysWOW64\Lklnhlfb.exe
                                                                        C:\Windows\system32\Lklnhlfb.exe
                                                                        35⤵
                                                                        • Adds autorun key to be loaded by Explorer.exe on startup
                                                                        • Executes dropped EXE
                                                                        • Drops file in System32 directory
                                                                        PID:2864
                                                                        • C:\Windows\SysWOW64\Laefdf32.exe
                                                                          C:\Windows\system32\Laefdf32.exe
                                                                          36⤵
                                                                          • Adds autorun key to be loaded by Explorer.exe on startup
                                                                          • Executes dropped EXE
                                                                          • Drops file in System32 directory
                                                                          • Modifies registry class
                                                                          PID:1744
                                                                          • C:\Windows\SysWOW64\Lddbqa32.exe
                                                                            C:\Windows\system32\Lddbqa32.exe
                                                                            37⤵
                                                                            • Adds autorun key to be loaded by Explorer.exe on startup
                                                                            • Executes dropped EXE
                                                                            • Drops file in System32 directory
                                                                            • Modifies registry class
                                                                            PID:3080
                                                                            • C:\Windows\SysWOW64\Lgbnmm32.exe
                                                                              C:\Windows\system32\Lgbnmm32.exe
                                                                              38⤵
                                                                              • Executes dropped EXE
                                                                              • Drops file in System32 directory
                                                                              • Modifies registry class
                                                                              PID:64
                                                                              • C:\Windows\SysWOW64\Mjqjih32.exe
                                                                                C:\Windows\system32\Mjqjih32.exe
                                                                                39⤵
                                                                                • Adds autorun key to be loaded by Explorer.exe on startup
                                                                                • Executes dropped EXE
                                                                                • Modifies registry class
                                                                                PID:3040
                                                                                • C:\Windows\SysWOW64\Mciobn32.exe
                                                                                  C:\Windows\system32\Mciobn32.exe
                                                                                  40⤵
                                                                                  • Adds autorun key to be loaded by Explorer.exe on startup
                                                                                  • Executes dropped EXE
                                                                                  • Drops file in System32 directory
                                                                                  • Modifies registry class
                                                                                  PID:4196
                                                                                  • C:\Windows\SysWOW64\Mkpgck32.exe
                                                                                    C:\Windows\system32\Mkpgck32.exe
                                                                                    41⤵
                                                                                    • Executes dropped EXE
                                                                                    • Drops file in System32 directory
                                                                                    PID:3252
                                                                                    • C:\Windows\SysWOW64\Mnocof32.exe
                                                                                      C:\Windows\system32\Mnocof32.exe
                                                                                      42⤵
                                                                                      • Adds autorun key to be loaded by Explorer.exe on startup
                                                                                      • Executes dropped EXE
                                                                                      • Drops file in System32 directory
                                                                                      • Modifies registry class
                                                                                      PID:2416
                                                                                      • C:\Windows\SysWOW64\Mpmokb32.exe
                                                                                        C:\Windows\system32\Mpmokb32.exe
                                                                                        43⤵
                                                                                        • Adds autorun key to be loaded by Explorer.exe on startup
                                                                                        • Executes dropped EXE
                                                                                        • Drops file in System32 directory
                                                                                        PID:1612
                                                                                        • C:\Windows\SysWOW64\Mgghhlhq.exe
                                                                                          C:\Windows\system32\Mgghhlhq.exe
                                                                                          44⤵
                                                                                          • Adds autorun key to be loaded by Explorer.exe on startup
                                                                                          • Executes dropped EXE
                                                                                          • Drops file in System32 directory
                                                                                          • Modifies registry class
                                                                                          PID:1820
                                                                                          • C:\Windows\SysWOW64\Mjeddggd.exe
                                                                                            C:\Windows\system32\Mjeddggd.exe
                                                                                            45⤵
                                                                                            • Adds autorun key to be loaded by Explorer.exe on startup
                                                                                            • Executes dropped EXE
                                                                                            • Drops file in System32 directory
                                                                                            • Modifies registry class
                                                                                            PID:1108
                                                                                            • C:\Windows\SysWOW64\Mpolqa32.exe
                                                                                              C:\Windows\system32\Mpolqa32.exe
                                                                                              46⤵
                                                                                              • Adds autorun key to be loaded by Explorer.exe on startup
                                                                                              • Executes dropped EXE
                                                                                              • Modifies registry class
                                                                                              PID:868
                                                                                              • C:\Windows\SysWOW64\Mcnhmm32.exe
                                                                                                C:\Windows\system32\Mcnhmm32.exe
                                                                                                47⤵
                                                                                                • Adds autorun key to be loaded by Explorer.exe on startup
                                                                                                • Executes dropped EXE
                                                                                                • Drops file in System32 directory
                                                                                                • Modifies registry class
                                                                                                PID:1912
                                                                                                • C:\Windows\SysWOW64\Mkepnjng.exe
                                                                                                  C:\Windows\system32\Mkepnjng.exe
                                                                                                  48⤵
                                                                                                  • Adds autorun key to be loaded by Explorer.exe on startup
                                                                                                  • Executes dropped EXE
                                                                                                  PID:2212
                                                                                                  • C:\Windows\SysWOW64\Maohkd32.exe
                                                                                                    C:\Windows\system32\Maohkd32.exe
                                                                                                    49⤵
                                                                                                    • Executes dropped EXE
                                                                                                    • Drops file in System32 directory
                                                                                                    • Modifies registry class
                                                                                                    PID:3752
                                                                                                    • C:\Windows\SysWOW64\Mpaifalo.exe
                                                                                                      C:\Windows\system32\Mpaifalo.exe
                                                                                                      50⤵
                                                                                                      • Executes dropped EXE
                                                                                                      • Modifies registry class
                                                                                                      PID:2296
                                                                                                      • C:\Windows\SysWOW64\Mkgmcjld.exe
                                                                                                        C:\Windows\system32\Mkgmcjld.exe
                                                                                                        51⤵
                                                                                                        • Adds autorun key to be loaded by Explorer.exe on startup
                                                                                                        • Executes dropped EXE
                                                                                                        • Modifies registry class
                                                                                                        PID:3924
                                                                                                        • C:\Windows\SysWOW64\Mnfipekh.exe
                                                                                                          C:\Windows\system32\Mnfipekh.exe
                                                                                                          52⤵
                                                                                                          • Adds autorun key to be loaded by Explorer.exe on startup
                                                                                                          • Executes dropped EXE
                                                                                                          • Drops file in System32 directory
                                                                                                          • Modifies registry class
                                                                                                          PID:3340
                                                                                                          • C:\Windows\SysWOW64\Mpdelajl.exe
                                                                                                            C:\Windows\system32\Mpdelajl.exe
                                                                                                            53⤵
                                                                                                            • Executes dropped EXE
                                                                                                            • Drops file in System32 directory
                                                                                                            • Modifies registry class
                                                                                                            PID:1276
                                                                                                            • C:\Windows\SysWOW64\Mcbahlip.exe
                                                                                                              C:\Windows\system32\Mcbahlip.exe
                                                                                                              54⤵
                                                                                                              • Adds autorun key to be loaded by Explorer.exe on startup
                                                                                                              • Executes dropped EXE
                                                                                                              • Drops file in System32 directory
                                                                                                              PID:3584
                                                                                                              • C:\Windows\SysWOW64\Nkjjij32.exe
                                                                                                                C:\Windows\system32\Nkjjij32.exe
                                                                                                                55⤵
                                                                                                                • Adds autorun key to be loaded by Explorer.exe on startup
                                                                                                                • Executes dropped EXE
                                                                                                                • Modifies registry class
                                                                                                                PID:4608
                                                                                                                • C:\Windows\SysWOW64\Nnhfee32.exe
                                                                                                                  C:\Windows\system32\Nnhfee32.exe
                                                                                                                  56⤵
                                                                                                                  • Adds autorun key to be loaded by Explorer.exe on startup
                                                                                                                  • Executes dropped EXE
                                                                                                                  • Modifies registry class
                                                                                                                  PID:3020
                                                                                                                  • C:\Windows\SysWOW64\Nqfbaq32.exe
                                                                                                                    C:\Windows\system32\Nqfbaq32.exe
                                                                                                                    57⤵
                                                                                                                    • Executes dropped EXE
                                                                                                                    • Drops file in System32 directory
                                                                                                                    • Modifies registry class
                                                                                                                    PID:3416
                                                                                                                    • C:\Windows\SysWOW64\Nceonl32.exe
                                                                                                                      C:\Windows\system32\Nceonl32.exe
                                                                                                                      58⤵
                                                                                                                      • Executes dropped EXE
                                                                                                                      • Drops file in System32 directory
                                                                                                                      PID:764
                                                                                                                      • C:\Windows\SysWOW64\Njogjfoj.exe
                                                                                                                        C:\Windows\system32\Njogjfoj.exe
                                                                                                                        59⤵
                                                                                                                        • Adds autorun key to be loaded by Explorer.exe on startup
                                                                                                                        • Executes dropped EXE
                                                                                                                        • Drops file in System32 directory
                                                                                                                        • Modifies registry class
                                                                                                                        PID:2436
                                                                                                                        • C:\Windows\SysWOW64\Nafokcol.exe
                                                                                                                          C:\Windows\system32\Nafokcol.exe
                                                                                                                          60⤵
                                                                                                                          • Adds autorun key to be loaded by Explorer.exe on startup
                                                                                                                          • Executes dropped EXE
                                                                                                                          • Modifies registry class
                                                                                                                          PID:4484
                                                                                                                          • C:\Windows\SysWOW64\Nddkgonp.exe
                                                                                                                            C:\Windows\system32\Nddkgonp.exe
                                                                                                                            61⤵
                                                                                                                            • Adds autorun key to be loaded by Explorer.exe on startup
                                                                                                                            • Executes dropped EXE
                                                                                                                            • Drops file in System32 directory
                                                                                                                            PID:4904
                                                                                                                            • C:\Windows\SysWOW64\Ncgkcl32.exe
                                                                                                                              C:\Windows\system32\Ncgkcl32.exe
                                                                                                                              62⤵
                                                                                                                              • Executes dropped EXE
                                                                                                                              • Drops file in System32 directory
                                                                                                                              • Modifies registry class
                                                                                                                              PID:3512
                                                                                                                              • C:\Windows\SysWOW64\Njacpf32.exe
                                                                                                                                C:\Windows\system32\Njacpf32.exe
                                                                                                                                63⤵
                                                                                                                                • Executes dropped EXE
                                                                                                                                • Drops file in System32 directory
                                                                                                                                • Modifies registry class
                                                                                                                                PID:1844
                                                                                                                                • C:\Windows\SysWOW64\Nnmopdep.exe
                                                                                                                                  C:\Windows\system32\Nnmopdep.exe
                                                                                                                                  64⤵
                                                                                                                                  • Adds autorun key to be loaded by Explorer.exe on startup
                                                                                                                                  • Executes dropped EXE
                                                                                                                                  • Drops file in System32 directory
                                                                                                                                  • Modifies registry class
                                                                                                                                  PID:640
                                                                                                                                  • C:\Windows\SysWOW64\Nqklmpdd.exe
                                                                                                                                    C:\Windows\system32\Nqklmpdd.exe
                                                                                                                                    65⤵
                                                                                                                                    • Executes dropped EXE
                                                                                                                                    • Drops file in System32 directory
                                                                                                                                    PID:2224
                                                                                                                                    • C:\Windows\SysWOW64\Ncihikcg.exe
                                                                                                                                      C:\Windows\system32\Ncihikcg.exe
                                                                                                                                      66⤵
                                                                                                                                      • Adds autorun key to be loaded by Explorer.exe on startup
                                                                                                                                      • Modifies registry class
                                                                                                                                      PID:2108
                                                                                                                                      • C:\Windows\SysWOW64\Nkqpjidj.exe
                                                                                                                                        C:\Windows\system32\Nkqpjidj.exe
                                                                                                                                        67⤵
                                                                                                                                        • Adds autorun key to be loaded by Explorer.exe on startup
                                                                                                                                        • Modifies registry class
                                                                                                                                        PID:2868
                                                                                                                                        • C:\Windows\SysWOW64\Njcpee32.exe
                                                                                                                                          C:\Windows\system32\Njcpee32.exe
                                                                                                                                          68⤵
                                                                                                                                          • Adds autorun key to be loaded by Explorer.exe on startup
                                                                                                                                          • Drops file in System32 directory
                                                                                                                                          • Modifies registry class
                                                                                                                                          PID:4128
                                                                                                                                          • C:\Windows\SysWOW64\Nqmhbpba.exe
                                                                                                                                            C:\Windows\system32\Nqmhbpba.exe
                                                                                                                                            69⤵
                                                                                                                                            • Modifies registry class
                                                                                                                                            PID:3844
                                                                                                                                            • C:\Windows\SysWOW64\Ncldnkae.exe
                                                                                                                                              C:\Windows\system32\Ncldnkae.exe
                                                                                                                                              70⤵
                                                                                                                                              • Adds autorun key to be loaded by Explorer.exe on startup
                                                                                                                                              • Drops file in System32 directory
                                                                                                                                              • Modifies registry class
                                                                                                                                              PID:1500
                                                                                                                                              • C:\Windows\SysWOW64\Nkcmohbg.exe
                                                                                                                                                C:\Windows\system32\Nkcmohbg.exe
                                                                                                                                                71⤵
                                                                                                                                                  PID:4108
                                                                                                                                                  • C:\Windows\SysWOW64\WerFault.exe
                                                                                                                                                    C:\Windows\SysWOW64\WerFault.exe -u -p 4108 -s 400
                                                                                                                                                    72⤵
                                                                                                                                                    • Program crash
                                                                                                                                                    PID:1684
    • C:\Windows\SysWOW64\WerFault.exe
      C:\Windows\SysWOW64\WerFault.exe -pss -s 408 -p 4108 -ip 4108
      1⤵
        PID:3992

      Network

      MITRE ATT&CK Enterprise v15

      Replay Monitor

      Loading Replay Monitor...

      Downloads

      • C:\Windows\SysWOW64\Iannfk32.exe

        Filesize

        459KB

        MD5

        95556f87e13ce13f3d93416d132e6e4c

        SHA1

        dd19af250c0f948c66ff3cfc753b85d328b6a377

        SHA256

        37fdd296cf105e14ec6071f892dfc3c2b431c068c44598b789a9de0c1d50a781

        SHA512

        44f8d086359eff05b7f5c6fb64facadacf5fa0abdde74ea23324eab58ffa0a00dcde116b29e489f463a5fab7a067905b9f32cad1f993baef67a110ae8756fea3

      • C:\Windows\SysWOW64\Ibagcc32.exe

        Filesize

        459KB

        MD5

        6b3db4250485071b6e52b4bc6363b469

        SHA1

        f4d35d8823c24e3346bdfb43efc31c517dd517ba

        SHA256

        b0876692d35cd01f17af3e047d3f71211bce71b160a5c19ef010ef87d78273da

        SHA512

        3b1ba1817aba262ac1bc95a85367b0950e1e85ea7ba03b40aadce61b41fa20585bef1496a64bc2fcc8c3b282b4be1d67d8da3827c272923f9319def40f665285

      • C:\Windows\SysWOW64\Ibccic32.exe

        Filesize

        459KB

        MD5

        ad4808e3ec28f5d5dada7f391d73ffe4

        SHA1

        a65e4c3f30efff7eda0dd0b25916f768dde54b5a

        SHA256

        89fb5965b8313518840da58eb7b2e1229be4c050fcdfc02ff2cf33ca043ccedc

        SHA512

        e2bdda48f61d8fe07f15399f8886584f2c58264e3e44075c18c482911f4ff891f7e01e4ad00163f6d3efda739907c0c9f53803bbe1d902277c8b4f5426b88611

      • C:\Windows\SysWOW64\Idofhfmm.exe

        Filesize

        459KB

        MD5

        012c3b75694f892f3d20c5d64e0154df

        SHA1

        cbe2b8b4d1913280714eb67d13c8557d03598a05

        SHA256

        c9e2d06cb11d9a1dce492920b083d1ddfc808110bf20196b242f84b37710a831

        SHA512

        0b781a59275a2266dc124e15b505c8ba8d2a6205d7b37c546d501f5c1c31652f3ac21a77ae92677f573d94c062af4a978f5b92ce3f567ec2837f9ea993dad97f

      • C:\Windows\SysWOW64\Ifhiib32.exe

        Filesize

        459KB

        MD5

        57c9bcd488149a7dcaa1edbffbf7461e

        SHA1

        7f158bb35c4e802476ace1f93fa13cdf168f0d19

        SHA256

        268735461b57e70ecb6dc0f1efa3b008a90f705bd19bbc55fecc6cca9534f4f0

        SHA512

        904a5f4e1f0965cab86e2c0c9084b199479d9db50ac966cf63c3916a6959ed214e527bea6eae84dedebeb480c004f6f6bcf4352c656eb87b4e3342aa64c1a355

      • C:\Windows\SysWOW64\Iiffen32.exe

        Filesize

        459KB

        MD5

        b4640b0e34fa133977a819c672d45bbb

        SHA1

        c82fdfd074744d0ff7113af3e062f872255f8744

        SHA256

        021d397eed3e73df768e21eee2014c359f8ef1ef8fc31ccf2ed3971218f18b02

        SHA512

        8e01ccd070e01be91c97558bde6a213de70f79bab42c17bb8b82b4e7ce9b8091f5359114486f6ddba14c498b45e5086499320f127f40a9669f026db1e8ab3b29

      • C:\Windows\SysWOW64\Jaedgjjd.exe

        Filesize

        459KB

        MD5

        20caa2fdac96dab183818b818157b329

        SHA1

        f30d81c15e47176cfbeb6bd2716f9df85c4fcb09

        SHA256

        e1f202bd810de7c8f288b5a0891457f71c8853e250a2672716c4052f867ea01b

        SHA512

        4410fff6a8d71f6810d93d58301df8d4dc2fff1ce4916b971c592e2273092db0067da1b014bd72ed80e451e30ac5bf5d24053b2eb1bf428e20bd2252d6922b16

      • C:\Windows\SysWOW64\Jangmibi.exe

        Filesize

        459KB

        MD5

        6b07c6a748e166bf16ae235aae8c0691

        SHA1

        f282253295fcc06dfffa8f5e6206519eae4da293

        SHA256

        dc9a785a540f1bb6e3d399cb03eda565f0ad10a8d9d06c4d8fde51d5caf7c7cb

        SHA512

        de05e6d8f5e6554735f38daa566186edf5287d8cd9f975a03bd1d9c2eefe9bd63942a4316e9382204150d8fdf7a800a89e3753e7732e2548aa8f0ef708416767

      • C:\Windows\SysWOW64\Jbfpobpb.exe

        Filesize

        459KB

        MD5

        317dfe6bea1a789c521b7e7a01ab08f6

        SHA1

        5322e395353305c09bb50987335d6f1d9237cd76

        SHA256

        09ff7bbec4eabd0bafe7692f070b1fe1f3d8711a0e93f2f129e75eb5b453184c

        SHA512

        7025f516b9a0ba7defc8e0b5099567ca8b502d894cd30be95650ef2e70b25e014f3504fdc8d0d30e8de75767f3cf95c56aee2a33b8fd6309154000d995ba2dbd

      • C:\Windows\SysWOW64\Jbmfoa32.exe

        Filesize

        459KB

        MD5

        c2e8ddd33bc7c0d9b029b902a904b336

        SHA1

        0ba15b9fb2869b815cf6e97558852e92c43f5efe

        SHA256

        a193d2ca8e7c84f13e7d0c6e1293f9ac0b2fb260192a57a9f49c848724c03156

        SHA512

        6f5e8433c55044225b6ede4cafc0975f1e8858f253fdc5ff63abb2e889e4929e16b3a3557b2811b79945be1c136986066c163782dda0dcd26d0ed9803998a342

      • C:\Windows\SysWOW64\Jdhine32.exe

        Filesize

        320KB

        MD5

        00930ccdd7332e701e12b4583595b336

        SHA1

        31e373b337a8b451299f36951ffdb225d2304092

        SHA256

        a116e643c9655f3a3800cdde8095c35760fe75fc0e61c5336c0f8ef2731396f6

        SHA512

        b889fdba845d9421d034dea0f97edf2ae71398598cda4946b3a3cf5b771d4a7727ff933cabc7f507771395409e5825a3f1ddab1259f710e974802b71d35b93a4

      • C:\Windows\SysWOW64\Jdhine32.exe

        Filesize

        459KB

        MD5

        7a71cdf149db516a5f630b25fffeaf1f

        SHA1

        20a02e7a52ec6eb3b537ba9956e4a7e2b8865d97

        SHA256

        0ecd121bcd548bbfb2388acad901c3b8571dff7fe6f325f76cf1ef8f0717acc5

        SHA512

        d1f929360b361f69cfc31fce49a912382a83fe005f91118e6c21876cdd60bcd346d2fec3d8ef44dd697203d1d3cc5d9fc9b40789aa7250ff4593c9b5025ad32a

      • C:\Windows\SysWOW64\Jjpeepnb.exe

        Filesize

        459KB

        MD5

        47504e6ca4e5772e1341652e3c3218ec

        SHA1

        0089766261d361ecc353fbcefa17cea55babbc77

        SHA256

        fe414939628b0569823e4a5fd3eb8afb0afdc963a5a47cc5524491e1393e3405

        SHA512

        bbddd4ef7ea8eb8703f5b5426198bf5444109416424b260aab9127e18fb64f25fc847fe0ab195c94b4847a400132dae9f1442fa83cb6a1ee5850033928a1ad66

      • C:\Windows\SysWOW64\Jkfkfohj.exe

        Filesize

        459KB

        MD5

        15bc0efb39cc208c2cbfd485e495e2a7

        SHA1

        e73a54c29bfee39990cd3836ea0547e9e1771f92

        SHA256

        fac2f3d51d75b5490f3f8c6a12627319ff5c57cc6e3712dd5c3df69142e518b2

        SHA512

        fb922bdf8a60efa9806425c18e303aa8807d60d3d3623aa287382f06fa208f4342ef0722c67c666262a12ab77b811e9e328818b86111a993f67cd18ff82e40f3

      • C:\Windows\SysWOW64\Jmkdlkph.exe

        Filesize

        459KB

        MD5

        b4b1ac5bba85f991ab6e7f6f0887e825

        SHA1

        5af0103b3f6e7ce67d4681a490bc119a390be0fc

        SHA256

        f995ac30923ce23dbc293ee807ca62834840fb182c30e4b99963e2182a3ff61e

        SHA512

        030206d0f52149e9deb07a4f7ce1160a9450cc5e2572192e6b2f32820557681e2d557e4257fc8788c748bdcb2289b2840dac4a5dd91c688b241531136e399f55

      • C:\Windows\SysWOW64\Jmpngk32.exe

        Filesize

        459KB

        MD5

        999f6d14c24ad00fa56908cd2d7e7184

        SHA1

        ad6288f501fb1e15af58e91eb514f6dd4f0c9823

        SHA256

        7d1ce53311e82d049ca1ce885f65199e5debb1f725953e9b3bb38f6d6368f5d1

        SHA512

        7f090c8bcc49d5d978e3f8b5c8ba3d3b782f0fdc49c0ecb8db4a9dfed01a3c515c9ef464ef9bfa312d993f0aa283f1394aba37e06c6c5b77a27d43135f102bb8

      • C:\Windows\SysWOW64\Kacphh32.exe

        Filesize

        459KB

        MD5

        c6b6e2437cf4193dd6ed41c439f45ddc

        SHA1

        757b0c93088ea21e50b0d3e3c47484819ad56733

        SHA256

        8674c2b764d0e06d27dc96e534fe256d7aba8f07b618f5be5db4fe95fc587056

        SHA512

        7fe4804506f8f881c29e3f8323fc0cbd0b98b9454ddd3bf924a3a31fca276b16c2a77a7c5fc54af2e687dc2b8b22eab11803d1dd1299d7054fef43a153b89c5a

      • C:\Windows\SysWOW64\Kaqcbi32.exe

        Filesize

        459KB

        MD5

        dab011dc42ac37b0bb4971a5a5977285

        SHA1

        2aa8b8c4d60ae44afc64cc25438ece4e815fc1ac

        SHA256

        ad6656b3e07133322e36efc31f0ae88f6baa7870ac1076a3c5f6c0ea6011778f

        SHA512

        032600ac536949d3229aff8caa087febdf944d5e1e49dfc1c2b9fcc00904e40c31a8992a685065b24c587a0f3c9a14945d489d6d10e2dbf2643fb59c43619a4b

      • C:\Windows\SysWOW64\Kbapjafe.exe

        Filesize

        459KB

        MD5

        20466aa2b25be1e45c727d56a1114a4e

        SHA1

        f693e4d66bf35a96be5d7b6f5bcaa63fc7307c88

        SHA256

        4092776deadeacef3f5c3f85762f656e4bc5daf931d4dc4743ea6c8123d96629

        SHA512

        b339c7c2e6f461a4019df1bfe93671a8b597f4ac3fb5e323dbb2fcbc553d756be35b2a36cf99b3ffecb75aac07903d802d4f4f0bdf369bcf5fefdc1a7138cbb0

      • C:\Windows\SysWOW64\Kbfiep32.exe

        Filesize

        459KB

        MD5

        c690040241f4aabb66382000303e747d

        SHA1

        4d8eeae97860ff8480be6adfd4260dba05b0bed3

        SHA256

        fb0bbe8a145288c65125a7dad98009f4406214c7e3985f50b2b6806503c505f1

        SHA512

        c29b21388d18c84ae5ab5e57159ede8775b9f463e48c85103680cdbedc71fd646c9adc4119e7e93c45c4ea5416f4f234aa7f30004e0a18452e7168afb3c88e1c

      • C:\Windows\SysWOW64\Kgbefoji.exe

        Filesize

        459KB

        MD5

        e86ad12e7e01bd946ccbadd22247379c

        SHA1

        c3ba3d0faac05291c8bfa4cec1eb2c97011e72d8

        SHA256

        2370d2f437be59071eefc3d71f059188bf0d6fb66aa494f99a459382e6ed1b46

        SHA512

        367c144091924c587fc0d7ec68e2a3607b6deb7852400ae1589dc3c86a545408bac0bad4db5cc2ec048857adad951620e2289cdba61f95337275507b3bf1fce2

      • C:\Windows\SysWOW64\Kibnhjgj.exe

        Filesize

        459KB

        MD5

        1539538f0a45d6502178d766ebe342b9

        SHA1

        76dfcc4feb56c81c94406a9aa69d8ed6b49a28a1

        SHA256

        a5eb451b6a6fcd8cf66d23590d991c9171c64613d7ed844158409a7ad87f1aec

        SHA512

        8f5d1bf4b6ab04155cf2761bbd3c2beae8b8be006bce6afca1b928a088bd6840486f5e23c15352784f4a37e8452f3a21dd0ebb3ced64ff1417680a7c043809c3

      • C:\Windows\SysWOW64\Kipabjil.exe

        Filesize

        459KB

        MD5

        c58a3a43c5cdd81c92778502d6774745

        SHA1

        da7ba029e1f2414580ab9b6412e430e32406bec9

        SHA256

        ddc37c208bfb5bd704baea8b72c6283e15834240c813f90cfd2bc851a7e60869

        SHA512

        5c24698b7626df55963154d9b71acd9b4e78a0d1c7113bf4ef99c9ea11be721f7a6db2764a8be6a6d304ca36dd1aa40ba201b07884b6bb32240f051f1f3b7c11

      • C:\Windows\SysWOW64\Kkkdan32.exe

        Filesize

        459KB

        MD5

        79a3fae39dc9d698a5a87e2b4c3dd037

        SHA1

        97790f92fa8424d978d680bd59200ccb0c8c45c5

        SHA256

        c7cd8727f53c94197c1914740c54b05c04513d7ea3780408961ac62032b6beac

        SHA512

        62b0c2f603580d48462297c5d3d993463f2dcece131e68cfccd9a25030b6e43f9c5d5233782818e99e596f68dbe26b09c1d681c59c2a4a24b7a624303ce66484

      • C:\Windows\SysWOW64\Kpmfddnf.exe

        Filesize

        459KB

        MD5

        53dd4d50e84f07c1855582a949ad831b

        SHA1

        52ebaa56030c1ff81a90282fcaeebb050187ec7b

        SHA256

        736c691577006a715fc8dc934e08b2faf80a35a5998469562e2e9fbb74a17cb3

        SHA512

        e6254b5e21b8b87758a04bb489a473e8a2223bca7f0a3acbfa28e814dde8821b0fcf3f867f82d785dfd13819cf8b0d3440dbb0d26fa828fa54996088775bc96a

      • C:\Windows\SysWOW64\Laalifad.exe

        Filesize

        459KB

        MD5

        fd096eda31758d902251b16511f6e168

        SHA1

        411cea30eadf5f54dca0f6af1f926b001b002d25

        SHA256

        d5ed168b4d8360efea8f34a1f06fc75897c10db8508c2eb0d2490b8494336bf9

        SHA512

        105f4f35f4d0780efe5438ed3d5a91f39ef657e4a0f0a38305c09714fd641b4955bde40653706ab2004c39dcbf88747409eb463c3c7ef04b3a04d99159a6c859

      • C:\Windows\SysWOW64\Lalcng32.exe

        Filesize

        459KB

        MD5

        7f212a6c57a50141471f1e0e8d32b68b

        SHA1

        42e606b80657912a36f611de2e97b9083d6321fe

        SHA256

        d7ff641e28d70b0c1ffc9adce42de017c2f33897e535f3589584aedaf287ac98

        SHA512

        b842cf2b368906871b2e60da2f2579a47fae1ee7479b090f2ab8bc4a1855c6f7f88a2ff171f41e6d2f90057819f5dc9acac6aff05d6ff8e4b5b566bd96d1b39f

      • C:\Windows\SysWOW64\Lgkhlnbn.exe

        Filesize

        459KB

        MD5

        b732b66768bdeabc3db7fcd38768275d

        SHA1

        14bf0a2b9f1056eb6129acb2d6aba5a3eb132aa5

        SHA256

        9a68a378fe66ac017b4c98651c8b483dfe477032cc5f595930c40ab84669a33a

        SHA512

        a546afca3a8dbc1223b24d2c1ecd0c30f2ea084a11ead24468eaaa5713a8d5b0cad7620cf5686d6878490830f22efd4d2bbf82a0ac690819c09fa32f7018f50a

      • C:\Windows\SysWOW64\Lgneampk.exe

        Filesize

        459KB

        MD5

        2d140b5b3e137c80ef4103aa97f91d03

        SHA1

        51010b7caf90f81fcb4a2cebd880c16d8d56d7f8

        SHA256

        04a143395c0172213e431ba3411375ad9c29fad82f9ae4a5f6ed6c70d329d99c

        SHA512

        0637e033ddcf85d9758d67a68e1afd46f1b3df2462e3a29c2b61e151a8dc57f645eb11a218b21284694b8d9c9ed297745b8f520a5cfdc47aff038d3abdf043e4

      • C:\Windows\SysWOW64\Liekmj32.exe

        Filesize

        459KB

        MD5

        361d8d02c249c33d9ef668feb736898c

        SHA1

        a6e62d30ec69870b3df66da6e4a1038f0ff52f09

        SHA256

        7b98d2566cb03d48afaacfbb8495c7e7fda6fd6a95e2e57297c0c2df39e0c7ed

        SHA512

        d1d2daa48b60df896eeafb6a1fd56b82039a8700c6f4d71f0f421bf3f5e27004ea5a32cd06481847d2d4fdf9528586bdfd5af36e690a5a709fbb134b6c014285

      • C:\Windows\SysWOW64\Lilanioo.exe

        Filesize

        459KB

        MD5

        c8fa2fda67911a39b16c994ce9ce97cd

        SHA1

        ea14f675374cb88a555499cdfa95c96b0386f7b1

        SHA256

        585f1dddf72ed68ffbf534ffbbe56e415b480d3cb9a25d8386ffd04488b8a0cf

        SHA512

        67d5f07409b8abfcc80a8020e2b59d25797b13747c12660a243f7104a3ece2a3e8c0f0b7907fb0150aded62f1fa0d097bb22c0f34eaa25dbc60b5c8b0e18aff6

      • C:\Windows\SysWOW64\Lkdggmlj.exe

        Filesize

        459KB

        MD5

        6150a18a10c50c1b4b7b6a8cec85abc5

        SHA1

        7790f4ee8900da6f08580e99eb09cb94c14b666c

        SHA256

        758823ccfc84b824e441c22dffca556bae052f25ab3c634fb769180761f7388c

        SHA512

        dae2978071d07a470f441a4c70151cbf799a140548eb905f607646c0d6c3de90e3153292cb98261405f3afa7475253577304b580f2c1a3a8e86a9e1180dd12b6

      • C:\Windows\SysWOW64\Lmccchkn.exe

        Filesize

        459KB

        MD5

        beb994e53fa867c86dd4ade6c5d9d7a3

        SHA1

        66ef23172f7a17ba798af230653aa7beca74217e

        SHA256

        7a3f128afdc5a37bed461fc4887cf9b67667da8631de4f133ab0cff11679cae5

        SHA512

        61dc7277362f3c337f583fca7417f8ad38fe62a03bad7574fb99a0197b6045a56431296086b77959ba77ee7168dd85bc4cf3f1be91356bb5010eaa090805758d

      • C:\Windows\SysWOW64\Mpaifalo.exe

        Filesize

        459KB

        MD5

        f8100e32c864be8e43025f541edfbcc0

        SHA1

        ad91b09535088833af7eca49416a9b7375249843

        SHA256

        1e5bcebad73bef049cd7f9f43e3e33a81bffafd28c2a446f1fa35c22b561fdc1

        SHA512

        32722391baa438e12e0ce623c75473ee6d6719a60c2956f2923e63ee9d24f447cfc8883f82c84a5ec855fcd9d3aef500c621a7bc0e6cc661dd4250490c85cce5

      • memory/64-291-0x0000000000400000-0x0000000000433000-memory.dmp

        Filesize

        204KB

      • memory/324-49-0x0000000000400000-0x0000000000433000-memory.dmp

        Filesize

        204KB

      • memory/388-32-0x0000000000400000-0x0000000000433000-memory.dmp

        Filesize

        204KB

      • memory/544-57-0x0000000000400000-0x0000000000433000-memory.dmp

        Filesize

        204KB

      • memory/640-497-0x0000000000400000-0x0000000000433000-memory.dmp

        Filesize

        204KB

      • memory/640-443-0x0000000000400000-0x0000000000433000-memory.dmp

        Filesize

        204KB

      • memory/648-125-0x0000000000400000-0x0000000000433000-memory.dmp

        Filesize

        204KB

      • memory/764-407-0x0000000000400000-0x0000000000433000-memory.dmp

        Filesize

        204KB

      • memory/764-506-0x0000000000400000-0x0000000000433000-memory.dmp

        Filesize

        204KB

      • memory/868-339-0x0000000000400000-0x0000000000433000-memory.dmp

        Filesize

        204KB

      • memory/924-25-0x0000000000400000-0x0000000000433000-memory.dmp

        Filesize

        204KB

      • memory/1052-0-0x0000000000400000-0x0000000000433000-memory.dmp

        Filesize

        204KB

      • memory/1052-4-0x0000000000431000-0x0000000000432000-memory.dmp

        Filesize

        4KB

      • memory/1108-530-0x0000000000400000-0x0000000000433000-memory.dmp

        Filesize

        204KB

      • memory/1108-329-0x0000000000400000-0x0000000000433000-memory.dmp

        Filesize

        204KB

      • memory/1200-113-0x0000000000400000-0x0000000000433000-memory.dmp

        Filesize

        204KB

      • memory/1276-515-0x0000000000400000-0x0000000000433000-memory.dmp

        Filesize

        204KB

      • memory/1276-377-0x0000000000400000-0x0000000000433000-memory.dmp

        Filesize

        204KB

      • memory/1500-479-0x0000000000400000-0x0000000000433000-memory.dmp

        Filesize

        204KB

      • memory/1500-489-0x0000000000400000-0x0000000000433000-memory.dmp

        Filesize

        204KB

      • memory/1612-317-0x0000000000400000-0x0000000000433000-memory.dmp

        Filesize

        204KB

      • memory/1612-534-0x0000000000400000-0x0000000000433000-memory.dmp

        Filesize

        204KB

      • memory/1744-275-0x0000000000400000-0x0000000000433000-memory.dmp

        Filesize

        204KB

      • memory/1820-323-0x0000000000400000-0x0000000000433000-memory.dmp

        Filesize

        204KB

      • memory/1820-532-0x0000000000400000-0x0000000000433000-memory.dmp

        Filesize

        204KB

      • memory/1844-499-0x0000000000400000-0x0000000000433000-memory.dmp

        Filesize

        204KB

      • memory/1844-437-0x0000000000400000-0x0000000000433000-memory.dmp

        Filesize

        204KB

      • memory/1876-169-0x0000000000400000-0x0000000000433000-memory.dmp

        Filesize

        204KB

      • memory/1912-527-0x0000000000400000-0x0000000000433000-memory.dmp

        Filesize

        204KB

      • memory/1912-341-0x0000000000400000-0x0000000000433000-memory.dmp

        Filesize

        204KB

      • memory/2004-21-0x0000000000400000-0x0000000000433000-memory.dmp

        Filesize

        204KB

      • memory/2008-105-0x0000000000400000-0x0000000000433000-memory.dmp

        Filesize

        204KB

      • memory/2024-14-0x0000000000400000-0x0000000000433000-memory.dmp

        Filesize

        204KB

      • memory/2076-185-0x0000000000400000-0x0000000000433000-memory.dmp

        Filesize

        204KB

      • memory/2108-459-0x0000000000400000-0x0000000000433000-memory.dmp

        Filesize

        204KB

      • memory/2108-494-0x0000000000400000-0x0000000000433000-memory.dmp

        Filesize

        204KB

      • memory/2192-72-0x0000000000400000-0x0000000000433000-memory.dmp

        Filesize

        204KB

      • memory/2212-347-0x0000000000400000-0x0000000000433000-memory.dmp

        Filesize

        204KB

      • memory/2212-525-0x0000000000400000-0x0000000000433000-memory.dmp

        Filesize

        204KB

      • memory/2224-453-0x0000000000400000-0x0000000000433000-memory.dmp

        Filesize

        204KB

      • memory/2296-521-0x0000000000400000-0x0000000000433000-memory.dmp

        Filesize

        204KB

      • memory/2296-359-0x0000000000400000-0x0000000000433000-memory.dmp

        Filesize

        204KB

      • memory/2352-129-0x0000000000400000-0x0000000000433000-memory.dmp

        Filesize

        204KB

      • memory/2416-311-0x0000000000400000-0x0000000000433000-memory.dmp

        Filesize

        204KB

      • memory/2416-536-0x0000000000400000-0x0000000000433000-memory.dmp

        Filesize

        204KB

      • memory/2436-413-0x0000000000400000-0x0000000000433000-memory.dmp

        Filesize

        204KB

      • memory/2436-505-0x0000000000400000-0x0000000000433000-memory.dmp

        Filesize

        204KB

      • memory/2488-263-0x0000000000400000-0x0000000000433000-memory.dmp

        Filesize

        204KB

      • memory/2696-225-0x0000000000400000-0x0000000000433000-memory.dmp

        Filesize

        204KB

      • memory/2864-269-0x0000000000400000-0x0000000000433000-memory.dmp

        Filesize

        204KB

      • memory/2868-466-0x0000000000400000-0x0000000000433000-memory.dmp

        Filesize

        204KB

      • memory/2888-97-0x0000000000400000-0x0000000000433000-memory.dmp

        Filesize

        204KB

      • memory/2996-211-0x0000000000400000-0x0000000000433000-memory.dmp

        Filesize

        204KB

      • memory/3004-41-0x0000000000400000-0x0000000000433000-memory.dmp

        Filesize

        204KB

      • memory/3020-510-0x0000000000400000-0x0000000000433000-memory.dmp

        Filesize

        204KB

      • memory/3020-395-0x0000000000400000-0x0000000000433000-memory.dmp

        Filesize

        204KB

      • memory/3040-293-0x0000000000400000-0x0000000000433000-memory.dmp

        Filesize

        204KB

      • memory/3040-542-0x0000000000400000-0x0000000000433000-memory.dmp

        Filesize

        204KB

      • memory/3080-281-0x0000000000400000-0x0000000000433000-memory.dmp

        Filesize

        204KB

      • memory/3116-241-0x0000000000400000-0x0000000000433000-memory.dmp

        Filesize

        204KB

      • memory/3252-538-0x0000000000400000-0x0000000000433000-memory.dmp

        Filesize

        204KB

      • memory/3252-305-0x0000000000400000-0x0000000000433000-memory.dmp

        Filesize

        204KB

      • memory/3340-517-0x0000000000400000-0x0000000000433000-memory.dmp

        Filesize

        204KB

      • memory/3340-375-0x0000000000400000-0x0000000000433000-memory.dmp

        Filesize

        204KB

      • memory/3416-508-0x0000000000400000-0x0000000000433000-memory.dmp

        Filesize

        204KB

      • memory/3416-401-0x0000000000400000-0x0000000000433000-memory.dmp

        Filesize

        204KB

      • memory/3512-431-0x0000000000400000-0x0000000000433000-memory.dmp

        Filesize

        204KB

      • memory/3512-501-0x0000000000400000-0x0000000000433000-memory.dmp

        Filesize

        204KB

      • memory/3584-513-0x0000000000400000-0x0000000000433000-memory.dmp

        Filesize

        204KB

      • memory/3584-387-0x0000000000400000-0x0000000000433000-memory.dmp

        Filesize

        204KB

      • memory/3588-88-0x0000000000400000-0x0000000000433000-memory.dmp

        Filesize

        204KB

      • memory/3680-80-0x0000000000400000-0x0000000000433000-memory.dmp

        Filesize

        204KB

      • memory/3696-192-0x0000000000400000-0x0000000000433000-memory.dmp

        Filesize

        204KB

      • memory/3752-353-0x0000000000400000-0x0000000000433000-memory.dmp

        Filesize

        204KB

      • memory/3752-523-0x0000000000400000-0x0000000000433000-memory.dmp

        Filesize

        204KB

      • memory/3844-473-0x0000000000400000-0x0000000000433000-memory.dmp

        Filesize

        204KB

      • memory/3844-490-0x0000000000400000-0x0000000000433000-memory.dmp

        Filesize

        204KB

      • memory/3852-177-0x0000000000400000-0x0000000000433000-memory.dmp

        Filesize

        204KB

      • memory/3912-65-0x0000000000400000-0x0000000000433000-memory.dmp

        Filesize

        204KB

      • memory/3924-519-0x0000000000400000-0x0000000000433000-memory.dmp

        Filesize

        204KB

      • memory/3924-365-0x0000000000400000-0x0000000000433000-memory.dmp

        Filesize

        204KB

      • memory/3972-203-0x0000000000400000-0x0000000000433000-memory.dmp

        Filesize

        204KB

      • memory/4024-153-0x0000000000400000-0x0000000000433000-memory.dmp

        Filesize

        204KB

      • memory/4108-485-0x0000000000400000-0x0000000000433000-memory.dmp

        Filesize

        204KB

      • memory/4128-471-0x0000000000400000-0x0000000000433000-memory.dmp

        Filesize

        204KB

      • memory/4152-137-0x0000000000400000-0x0000000000433000-memory.dmp

        Filesize

        204KB

      • memory/4196-540-0x0000000000400000-0x0000000000433000-memory.dmp

        Filesize

        204KB

      • memory/4196-299-0x0000000000400000-0x0000000000433000-memory.dmp

        Filesize

        204KB

      • memory/4348-161-0x0000000000400000-0x0000000000433000-memory.dmp

        Filesize

        204KB

      • memory/4484-424-0x0000000000400000-0x0000000000433000-memory.dmp

        Filesize

        204KB

      • memory/4524-249-0x0000000000400000-0x0000000000433000-memory.dmp

        Filesize

        204KB

      • memory/4556-233-0x0000000000400000-0x0000000000433000-memory.dmp

        Filesize

        204KB

      • memory/4592-217-0x0000000000400000-0x0000000000433000-memory.dmp

        Filesize

        204KB

      • memory/4608-393-0x0000000000400000-0x0000000000433000-memory.dmp

        Filesize

        204KB

      • memory/4676-145-0x0000000000400000-0x0000000000433000-memory.dmp

        Filesize

        204KB

      • memory/4888-257-0x0000000000400000-0x0000000000433000-memory.dmp

        Filesize

        204KB

      • memory/4904-429-0x0000000000400000-0x0000000000433000-memory.dmp

        Filesize

        204KB