Analysis

  • max time kernel
    147s
  • max time network
    150s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240508-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system
  • submitted
    09/05/2024, 09:18

General

  • Target

    086e6ccd87ff3650785fe78d932a7c00_NEIKI.exe

  • Size

    256KB

  • MD5

    086e6ccd87ff3650785fe78d932a7c00

  • SHA1

    cdba32a1f5834e488b47670c4205f0956c2ba267

  • SHA256

    d2f2cb2d4e0d68926c3ff462a2d1bb38b212b5964dc0ee9a8aed23c22e274de0

  • SHA512

    389b2d774f244ddf6105d07f6d6c295a4f3c78f53c8e77b00c354a8a43fddeb5c0a9ed823c0eac425972e3d3afe28b47d12dfee9ae7020b352dd2a5dc09040b5

  • SSDEEP

    6144:3bcLv4cpmfPHNVRmB3/fc/UmKyIxLDXXoq9FJZCX:3bmvKFVRf32XXf9DoX

Score
10/10

Malware Config

Signatures

  • Adds autorun key to be loaded by Explorer.exe on startup 2 TTPs 64 IoCs
  • Executes dropped EXE 64 IoCs
  • Drops file in System32 directory 64 IoCs
  • Program crash 1 IoCs
  • Modifies registry class 64 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\086e6ccd87ff3650785fe78d932a7c00_NEIKI.exe
    "C:\Users\Admin\AppData\Local\Temp\086e6ccd87ff3650785fe78d932a7c00_NEIKI.exe"
    1⤵
    • Adds autorun key to be loaded by Explorer.exe on startup
    • Drops file in System32 directory
    • Modifies registry class
    • Suspicious use of WriteProcessMemory
    PID:2196
    • C:\Windows\SysWOW64\Hpbaqj32.exe
      C:\Windows\system32\Hpbaqj32.exe
      2⤵
      • Adds autorun key to be loaded by Explorer.exe on startup
      • Executes dropped EXE
      • Modifies registry class
      • Suspicious use of WriteProcessMemory
      PID:3244
      • C:\Windows\SysWOW64\Hbanme32.exe
        C:\Windows\system32\Hbanme32.exe
        3⤵
        • Executes dropped EXE
        • Drops file in System32 directory
        • Modifies registry class
        • Suspicious use of WriteProcessMemory
        PID:3172
        • C:\Windows\SysWOW64\Hikfip32.exe
          C:\Windows\system32\Hikfip32.exe
          4⤵
          • Adds autorun key to be loaded by Explorer.exe on startup
          • Executes dropped EXE
          • Modifies registry class
          • Suspicious use of WriteProcessMemory
          PID:2632
          • C:\Windows\SysWOW64\Hbckbepg.exe
            C:\Windows\system32\Hbckbepg.exe
            5⤵
            • Adds autorun key to be loaded by Explorer.exe on startup
            • Executes dropped EXE
            • Drops file in System32 directory
            • Modifies registry class
            • Suspicious use of WriteProcessMemory
            PID:4080
            • C:\Windows\SysWOW64\Hadkpm32.exe
              C:\Windows\system32\Hadkpm32.exe
              6⤵
              • Adds autorun key to be loaded by Explorer.exe on startup
              • Executes dropped EXE
              • Drops file in System32 directory
              • Modifies registry class
              • Suspicious use of WriteProcessMemory
              PID:640
              • C:\Windows\SysWOW64\Hccglh32.exe
                C:\Windows\system32\Hccglh32.exe
                7⤵
                • Adds autorun key to be loaded by Explorer.exe on startup
                • Executes dropped EXE
                • Drops file in System32 directory
                • Modifies registry class
                • Suspicious use of WriteProcessMemory
                PID:5012
                • C:\Windows\SysWOW64\Hbeghene.exe
                  C:\Windows\system32\Hbeghene.exe
                  8⤵
                  • Adds autorun key to be loaded by Explorer.exe on startup
                  • Executes dropped EXE
                  • Drops file in System32 directory
                  • Modifies registry class
                  • Suspicious use of WriteProcessMemory
                  PID:2880
                  • C:\Windows\SysWOW64\Hpihai32.exe
                    C:\Windows\system32\Hpihai32.exe
                    9⤵
                    • Executes dropped EXE
                    • Drops file in System32 directory
                    • Modifies registry class
                    • Suspicious use of WriteProcessMemory
                    PID:4384
                    • C:\Windows\SysWOW64\Hbhdmd32.exe
                      C:\Windows\system32\Hbhdmd32.exe
                      10⤵
                      • Adds autorun key to be loaded by Explorer.exe on startup
                      • Executes dropped EXE
                      • Drops file in System32 directory
                      • Modifies registry class
                      • Suspicious use of WriteProcessMemory
                      PID:3096
                      • C:\Windows\SysWOW64\Hjolnb32.exe
                        C:\Windows\system32\Hjolnb32.exe
                        11⤵
                        • Adds autorun key to be loaded by Explorer.exe on startup
                        • Executes dropped EXE
                        • Modifies registry class
                        • Suspicious use of WriteProcessMemory
                        PID:3792
                        • C:\Windows\SysWOW64\Ibjqcd32.exe
                          C:\Windows\system32\Ibjqcd32.exe
                          12⤵
                          • Adds autorun key to be loaded by Explorer.exe on startup
                          • Executes dropped EXE
                          • Drops file in System32 directory
                          • Modifies registry class
                          • Suspicious use of WriteProcessMemory
                          PID:1256
                          • C:\Windows\SysWOW64\Impepm32.exe
                            C:\Windows\system32\Impepm32.exe
                            13⤵
                            • Adds autorun key to be loaded by Explorer.exe on startup
                            • Executes dropped EXE
                            • Modifies registry class
                            • Suspicious use of WriteProcessMemory
                            PID:4580
                            • C:\Windows\SysWOW64\Iakaql32.exe
                              C:\Windows\system32\Iakaql32.exe
                              14⤵
                              • Executes dropped EXE
                              • Drops file in System32 directory
                              • Modifies registry class
                              • Suspicious use of WriteProcessMemory
                              PID:4780
                              • C:\Windows\SysWOW64\Imbaemhc.exe
                                C:\Windows\system32\Imbaemhc.exe
                                15⤵
                                • Executes dropped EXE
                                • Drops file in System32 directory
                                • Modifies registry class
                                • Suspicious use of WriteProcessMemory
                                PID:4540
                                • C:\Windows\SysWOW64\Ipqnahgf.exe
                                  C:\Windows\system32\Ipqnahgf.exe
                                  16⤵
                                  • Executes dropped EXE
                                  • Drops file in System32 directory
                                  • Modifies registry class
                                  • Suspicious use of WriteProcessMemory
                                  PID:4772
                                  • C:\Windows\SysWOW64\Ijfboafl.exe
                                    C:\Windows\system32\Ijfboafl.exe
                                    17⤵
                                    • Adds autorun key to be loaded by Explorer.exe on startup
                                    • Executes dropped EXE
                                    • Drops file in System32 directory
                                    • Modifies registry class
                                    • Suspicious use of WriteProcessMemory
                                    PID:2568
                                    • C:\Windows\SysWOW64\Imdnklfp.exe
                                      C:\Windows\system32\Imdnklfp.exe
                                      18⤵
                                      • Executes dropped EXE
                                      • Drops file in System32 directory
                                      • Modifies registry class
                                      • Suspicious use of WriteProcessMemory
                                      PID:2228
                                      • C:\Windows\SysWOW64\Ifmcdblq.exe
                                        C:\Windows\system32\Ifmcdblq.exe
                                        19⤵
                                        • Adds autorun key to be loaded by Explorer.exe on startup
                                        • Executes dropped EXE
                                        • Drops file in System32 directory
                                        • Modifies registry class
                                        • Suspicious use of WriteProcessMemory
                                        PID:232
                                        • C:\Windows\SysWOW64\Iabgaklg.exe
                                          C:\Windows\system32\Iabgaklg.exe
                                          20⤵
                                          • Executes dropped EXE
                                          • Drops file in System32 directory
                                          • Suspicious use of WriteProcessMemory
                                          PID:452
                                          • C:\Windows\SysWOW64\Ibccic32.exe
                                            C:\Windows\system32\Ibccic32.exe
                                            21⤵
                                            • Adds autorun key to be loaded by Explorer.exe on startup
                                            • Executes dropped EXE
                                            • Drops file in System32 directory
                                            • Modifies registry class
                                            • Suspicious use of WriteProcessMemory
                                            PID:3968
                                            • C:\Windows\SysWOW64\Iinlemia.exe
                                              C:\Windows\system32\Iinlemia.exe
                                              22⤵
                                              • Adds autorun key to be loaded by Explorer.exe on startup
                                              • Executes dropped EXE
                                              • Modifies registry class
                                              • Suspicious use of WriteProcessMemory
                                              PID:4008
                                              • C:\Windows\SysWOW64\Jbfpobpb.exe
                                                C:\Windows\system32\Jbfpobpb.exe
                                                23⤵
                                                • Adds autorun key to be loaded by Explorer.exe on startup
                                                • Executes dropped EXE
                                                • Drops file in System32 directory
                                                • Modifies registry class
                                                PID:4528
                                                • C:\Windows\SysWOW64\Jiphkm32.exe
                                                  C:\Windows\system32\Jiphkm32.exe
                                                  24⤵
                                                  • Executes dropped EXE
                                                  PID:2360
                                                  • C:\Windows\SysWOW64\Jdemhe32.exe
                                                    C:\Windows\system32\Jdemhe32.exe
                                                    25⤵
                                                    • Adds autorun key to be loaded by Explorer.exe on startup
                                                    • Executes dropped EXE
                                                    • Modifies registry class
                                                    PID:3340
                                                    • C:\Windows\SysWOW64\Jjpeepnb.exe
                                                      C:\Windows\system32\Jjpeepnb.exe
                                                      26⤵
                                                      • Adds autorun key to be loaded by Explorer.exe on startup
                                                      • Executes dropped EXE
                                                      • Drops file in System32 directory
                                                      PID:220
                                                      • C:\Windows\SysWOW64\Jaimbj32.exe
                                                        C:\Windows\system32\Jaimbj32.exe
                                                        27⤵
                                                        • Adds autorun key to be loaded by Explorer.exe on startup
                                                        • Executes dropped EXE
                                                        • Drops file in System32 directory
                                                        • Modifies registry class
                                                        PID:3984
                                                        • C:\Windows\SysWOW64\Jfffjqdf.exe
                                                          C:\Windows\system32\Jfffjqdf.exe
                                                          28⤵
                                                          • Executes dropped EXE
                                                          • Drops file in System32 directory
                                                          PID:3228
                                                          • C:\Windows\SysWOW64\Jmpngk32.exe
                                                            C:\Windows\system32\Jmpngk32.exe
                                                            29⤵
                                                            • Adds autorun key to be loaded by Explorer.exe on startup
                                                            • Executes dropped EXE
                                                            • Drops file in System32 directory
                                                            • Modifies registry class
                                                            PID:3116
                                                            • C:\Windows\SysWOW64\Jdjfcecp.exe
                                                              C:\Windows\system32\Jdjfcecp.exe
                                                              30⤵
                                                              • Adds autorun key to be loaded by Explorer.exe on startup
                                                              • Executes dropped EXE
                                                              • Drops file in System32 directory
                                                              • Modifies registry class
                                                              PID:1356
                                                              • C:\Windows\SysWOW64\Jfhbppbc.exe
                                                                C:\Windows\system32\Jfhbppbc.exe
                                                                31⤵
                                                                • Adds autorun key to be loaded by Explorer.exe on startup
                                                                • Executes dropped EXE
                                                                • Drops file in System32 directory
                                                                PID:4452
                                                                • C:\Windows\SysWOW64\Jdmcidam.exe
                                                                  C:\Windows\system32\Jdmcidam.exe
                                                                  32⤵
                                                                  • Executes dropped EXE
                                                                  • Drops file in System32 directory
                                                                  PID:1632
                                                                  • C:\Windows\SysWOW64\Jfkoeppq.exe
                                                                    C:\Windows\system32\Jfkoeppq.exe
                                                                    33⤵
                                                                    • Adds autorun key to be loaded by Explorer.exe on startup
                                                                    • Executes dropped EXE
                                                                    PID:2456
                                                                    • C:\Windows\SysWOW64\Kmegbjgn.exe
                                                                      C:\Windows\system32\Kmegbjgn.exe
                                                                      34⤵
                                                                      • Executes dropped EXE
                                                                      • Modifies registry class
                                                                      PID:4332
                                                                      • C:\Windows\SysWOW64\Kpccnefa.exe
                                                                        C:\Windows\system32\Kpccnefa.exe
                                                                        35⤵
                                                                        • Adds autorun key to be loaded by Explorer.exe on startup
                                                                        • Executes dropped EXE
                                                                        • Drops file in System32 directory
                                                                        • Modifies registry class
                                                                        PID:4132
                                                                        • C:\Windows\SysWOW64\Kkihknfg.exe
                                                                          C:\Windows\system32\Kkihknfg.exe
                                                                          36⤵
                                                                          • Adds autorun key to be loaded by Explorer.exe on startup
                                                                          • Executes dropped EXE
                                                                          • Drops file in System32 directory
                                                                          • Modifies registry class
                                                                          PID:3576
                                                                          • C:\Windows\SysWOW64\Kmgdgjek.exe
                                                                            C:\Windows\system32\Kmgdgjek.exe
                                                                            37⤵
                                                                            • Adds autorun key to be loaded by Explorer.exe on startup
                                                                            • Executes dropped EXE
                                                                            • Drops file in System32 directory
                                                                            • Modifies registry class
                                                                            PID:1036
                                                                            • C:\Windows\SysWOW64\Kdaldd32.exe
                                                                              C:\Windows\system32\Kdaldd32.exe
                                                                              38⤵
                                                                              • Executes dropped EXE
                                                                              • Drops file in System32 directory
                                                                              • Modifies registry class
                                                                              PID:1000
                                                                              • C:\Windows\SysWOW64\Kbdmpqcb.exe
                                                                                C:\Windows\system32\Kbdmpqcb.exe
                                                                                39⤵
                                                                                • Adds autorun key to be loaded by Explorer.exe on startup
                                                                                • Executes dropped EXE
                                                                                • Drops file in System32 directory
                                                                                • Modifies registry class
                                                                                PID:3236
                                                                                • C:\Windows\SysWOW64\Kkkdan32.exe
                                                                                  C:\Windows\system32\Kkkdan32.exe
                                                                                  40⤵
                                                                                  • Adds autorun key to be loaded by Explorer.exe on startup
                                                                                  • Executes dropped EXE
                                                                                  • Modifies registry class
                                                                                  PID:3420
                                                                                  • C:\Windows\SysWOW64\Kmjqmi32.exe
                                                                                    C:\Windows\system32\Kmjqmi32.exe
                                                                                    41⤵
                                                                                    • Adds autorun key to be loaded by Explorer.exe on startup
                                                                                    • Executes dropped EXE
                                                                                    • Drops file in System32 directory
                                                                                    • Modifies registry class
                                                                                    PID:3808
                                                                                    • C:\Windows\SysWOW64\Kdcijcke.exe
                                                                                      C:\Windows\system32\Kdcijcke.exe
                                                                                      42⤵
                                                                                      • Adds autorun key to be loaded by Explorer.exe on startup
                                                                                      • Executes dropped EXE
                                                                                      • Drops file in System32 directory
                                                                                      • Modifies registry class
                                                                                      PID:1352
                                                                                      • C:\Windows\SysWOW64\Kagichjo.exe
                                                                                        C:\Windows\system32\Kagichjo.exe
                                                                                        43⤵
                                                                                        • Executes dropped EXE
                                                                                        • Drops file in System32 directory
                                                                                        • Modifies registry class
                                                                                        PID:2136
                                                                                        • C:\Windows\SysWOW64\Kkpnlm32.exe
                                                                                          C:\Windows\system32\Kkpnlm32.exe
                                                                                          44⤵
                                                                                          • Adds autorun key to be loaded by Explorer.exe on startup
                                                                                          • Executes dropped EXE
                                                                                          • Drops file in System32 directory
                                                                                          • Modifies registry class
                                                                                          PID:2356
                                                                                          • C:\Windows\SysWOW64\Kgfoan32.exe
                                                                                            C:\Windows\system32\Kgfoan32.exe
                                                                                            45⤵
                                                                                            • Adds autorun key to be loaded by Explorer.exe on startup
                                                                                            • Executes dropped EXE
                                                                                            • Modifies registry class
                                                                                            PID:968
                                                                                            • C:\Windows\SysWOW64\Lgikfn32.exe
                                                                                              C:\Windows\system32\Lgikfn32.exe
                                                                                              46⤵
                                                                                              • Executes dropped EXE
                                                                                              • Drops file in System32 directory
                                                                                              PID:1504
                                                                                              • C:\Windows\SysWOW64\Ldmlpbbj.exe
                                                                                                C:\Windows\system32\Ldmlpbbj.exe
                                                                                                47⤵
                                                                                                • Adds autorun key to be loaded by Explorer.exe on startup
                                                                                                • Executes dropped EXE
                                                                                                • Drops file in System32 directory
                                                                                                • Modifies registry class
                                                                                                PID:4712
                                                                                                • C:\Windows\SysWOW64\Lnepih32.exe
                                                                                                  C:\Windows\system32\Lnepih32.exe
                                                                                                  48⤵
                                                                                                  • Adds autorun key to be loaded by Explorer.exe on startup
                                                                                                  • Executes dropped EXE
                                                                                                  • Drops file in System32 directory
                                                                                                  PID:1144
                                                                                                  • C:\Windows\SysWOW64\Lcbiao32.exe
                                                                                                    C:\Windows\system32\Lcbiao32.exe
                                                                                                    49⤵
                                                                                                    • Adds autorun key to be loaded by Explorer.exe on startup
                                                                                                    • Executes dropped EXE
                                                                                                    • Modifies registry class
                                                                                                    PID:1972
                                                                                                    • C:\Windows\SysWOW64\Laciofpa.exe
                                                                                                      C:\Windows\system32\Laciofpa.exe
                                                                                                      50⤵
                                                                                                      • Adds autorun key to be loaded by Explorer.exe on startup
                                                                                                      • Executes dropped EXE
                                                                                                      • Drops file in System32 directory
                                                                                                      • Modifies registry class
                                                                                                      PID:3184
                                                                                                      • C:\Windows\SysWOW64\Lddbqa32.exe
                                                                                                        C:\Windows\system32\Lddbqa32.exe
                                                                                                        51⤵
                                                                                                        • Adds autorun key to be loaded by Explorer.exe on startup
                                                                                                        • Executes dropped EXE
                                                                                                        • Drops file in System32 directory
                                                                                                        PID:3980
                                                                                                        • C:\Windows\SysWOW64\Mpkbebbf.exe
                                                                                                          C:\Windows\system32\Mpkbebbf.exe
                                                                                                          52⤵
                                                                                                          • Adds autorun key to be loaded by Explorer.exe on startup
                                                                                                          • Executes dropped EXE
                                                                                                          • Drops file in System32 directory
                                                                                                          PID:4204
                                                                                                          • C:\Windows\SysWOW64\Mpmokb32.exe
                                                                                                            C:\Windows\system32\Mpmokb32.exe
                                                                                                            53⤵
                                                                                                            • Adds autorun key to be loaded by Explorer.exe on startup
                                                                                                            • Executes dropped EXE
                                                                                                            • Drops file in System32 directory
                                                                                                            PID:5108
                                                                                                            • C:\Windows\SysWOW64\Mpolqa32.exe
                                                                                                              C:\Windows\system32\Mpolqa32.exe
                                                                                                              54⤵
                                                                                                              • Executes dropped EXE
                                                                                                              • Modifies registry class
                                                                                                              PID:628
                                                                                                              • C:\Windows\SysWOW64\Mcnhmm32.exe
                                                                                                                C:\Windows\system32\Mcnhmm32.exe
                                                                                                                55⤵
                                                                                                                • Executes dropped EXE
                                                                                                                • Modifies registry class
                                                                                                                PID:4064
                                                                                                                • C:\Windows\SysWOW64\Maohkd32.exe
                                                                                                                  C:\Windows\system32\Maohkd32.exe
                                                                                                                  56⤵
                                                                                                                  • Adds autorun key to be loaded by Explorer.exe on startup
                                                                                                                  • Executes dropped EXE
                                                                                                                  • Modifies registry class
                                                                                                                  PID:4292
                                                                                                                  • C:\Windows\SysWOW64\Mcpebmkb.exe
                                                                                                                    C:\Windows\system32\Mcpebmkb.exe
                                                                                                                    57⤵
                                                                                                                    • Adds autorun key to be loaded by Explorer.exe on startup
                                                                                                                    • Executes dropped EXE
                                                                                                                    • Drops file in System32 directory
                                                                                                                    • Modifies registry class
                                                                                                                    PID:2888
                                                                                                                    • C:\Windows\SysWOW64\Mjjmog32.exe
                                                                                                                      C:\Windows\system32\Mjjmog32.exe
                                                                                                                      58⤵
                                                                                                                      • Executes dropped EXE
                                                                                                                      • Drops file in System32 directory
                                                                                                                      PID:3812
                                                                                                                      • C:\Windows\SysWOW64\Mpdelajl.exe
                                                                                                                        C:\Windows\system32\Mpdelajl.exe
                                                                                                                        59⤵
                                                                                                                        • Adds autorun key to be loaded by Explorer.exe on startup
                                                                                                                        • Executes dropped EXE
                                                                                                                        • Modifies registry class
                                                                                                                        PID:3600
                                                                                                                        • C:\Windows\SysWOW64\Mgnnhk32.exe
                                                                                                                          C:\Windows\system32\Mgnnhk32.exe
                                                                                                                          60⤵
                                                                                                                          • Adds autorun key to be loaded by Explorer.exe on startup
                                                                                                                          • Executes dropped EXE
                                                                                                                          • Modifies registry class
                                                                                                                          PID:1560
                                                                                                                          • C:\Windows\SysWOW64\Nacbfdao.exe
                                                                                                                            C:\Windows\system32\Nacbfdao.exe
                                                                                                                            61⤵
                                                                                                                            • Adds autorun key to be loaded by Explorer.exe on startup
                                                                                                                            • Executes dropped EXE
                                                                                                                            • Modifies registry class
                                                                                                                            PID:752
                                                                                                                            • C:\Windows\SysWOW64\Ndbnboqb.exe
                                                                                                                              C:\Windows\system32\Ndbnboqb.exe
                                                                                                                              62⤵
                                                                                                                              • Executes dropped EXE
                                                                                                                              • Modifies registry class
                                                                                                                              PID:2344
                                                                                                                              • C:\Windows\SysWOW64\Nklfoi32.exe
                                                                                                                                C:\Windows\system32\Nklfoi32.exe
                                                                                                                                63⤵
                                                                                                                                • Executes dropped EXE
                                                                                                                                • Drops file in System32 directory
                                                                                                                                • Modifies registry class
                                                                                                                                PID:1260
                                                                                                                                • C:\Windows\SysWOW64\Nafokcol.exe
                                                                                                                                  C:\Windows\system32\Nafokcol.exe
                                                                                                                                  64⤵
                                                                                                                                  • Adds autorun key to be loaded by Explorer.exe on startup
                                                                                                                                  • Executes dropped EXE
                                                                                                                                  • Modifies registry class
                                                                                                                                  PID:3372
                                                                                                                                  • C:\Windows\SysWOW64\Ncgkcl32.exe
                                                                                                                                    C:\Windows\system32\Ncgkcl32.exe
                                                                                                                                    65⤵
                                                                                                                                    • Executes dropped EXE
                                                                                                                                    PID:400
                                                                                                                                    • C:\Windows\SysWOW64\Ngcgcjnc.exe
                                                                                                                                      C:\Windows\system32\Ngcgcjnc.exe
                                                                                                                                      66⤵
                                                                                                                                      • Adds autorun key to be loaded by Explorer.exe on startup
                                                                                                                                      PID:3248
                                                                                                                                      • C:\Windows\SysWOW64\Nnmopdep.exe
                                                                                                                                        C:\Windows\system32\Nnmopdep.exe
                                                                                                                                        67⤵
                                                                                                                                        • Adds autorun key to be loaded by Explorer.exe on startup
                                                                                                                                        PID:4524
                                                                                                                                        • C:\Windows\SysWOW64\Ncihikcg.exe
                                                                                                                                          C:\Windows\system32\Ncihikcg.exe
                                                                                                                                          68⤵
                                                                                                                                          • Adds autorun key to be loaded by Explorer.exe on startup
                                                                                                                                          • Drops file in System32 directory
                                                                                                                                          PID:3504
                                                                                                                                          • C:\Windows\SysWOW64\Njcpee32.exe
                                                                                                                                            C:\Windows\system32\Njcpee32.exe
                                                                                                                                            69⤵
                                                                                                                                            • Adds autorun key to be loaded by Explorer.exe on startup
                                                                                                                                            • Drops file in System32 directory
                                                                                                                                            PID:2848
                                                                                                                                            • C:\Windows\SysWOW64\Ndidbn32.exe
                                                                                                                                              C:\Windows\system32\Ndidbn32.exe
                                                                                                                                              70⤵
                                                                                                                                              • Adds autorun key to be loaded by Explorer.exe on startup
                                                                                                                                              • Drops file in System32 directory
                                                                                                                                              PID:2536
                                                                                                                                              • C:\Windows\SysWOW64\Nkcmohbg.exe
                                                                                                                                                C:\Windows\system32\Nkcmohbg.exe
                                                                                                                                                71⤵
                                                                                                                                                  PID:4508
                                                                                                                                                  • C:\Windows\SysWOW64\WerFault.exe
                                                                                                                                                    C:\Windows\SysWOW64\WerFault.exe -u -p 4508 -s 432
                                                                                                                                                    72⤵
                                                                                                                                                    • Program crash
                                                                                                                                                    PID:920
    • C:\Windows\SysWOW64\WerFault.exe
      C:\Windows\SysWOW64\WerFault.exe -pss -s 412 -p 4508 -ip 4508
      1⤵
        PID:3516

      Network

            MITRE ATT&CK Enterprise v15

            Replay Monitor

            Loading Replay Monitor...

            Downloads

            • C:\Windows\SysWOW64\Geekfi32.dll

              Filesize

              7KB

              MD5

              46ad44f9f908a5e1950605060f284644

              SHA1

              330d4d5e0dadeeded34f942c0361774591977474

              SHA256

              4fed6dd57d9543435273cecb2d90def184acdd5560f564e8b05ffd254d1b65fa

              SHA512

              ad76d3c37138da71c72a2f29a9e89b601ede08a10d37623de47cf92a4e9799f8f076254805df2d19230f12dfa75dde1464efe30e96f9c576ea3df301233ff7ab

            • C:\Windows\SysWOW64\Hadkpm32.exe

              Filesize

              256KB

              MD5

              cda35e2e7b1c47697da9db55cf39106a

              SHA1

              fcd57aacb72da89787386b5cc7824b431060bdd5

              SHA256

              5c147d5a117118bb0d9d18bded77b32ab97f4cece8fd7401758c1dfde107ce83

              SHA512

              c0152a1f20b9fdeca631cb8c10a53fc38b8e4ab2fbfcf31eabf1c1662cabb76a6e1b9f43bb80d10ecd9b050b4e5f22f288cd7f5a6b2ddf38beadc720b8479151

            • C:\Windows\SysWOW64\Hbanme32.exe

              Filesize

              256KB

              MD5

              f3c7517050ae127e707c788424036baa

              SHA1

              51eebfb55d782a33d97b45d61ebf3a2893a896d5

              SHA256

              9f20013b88aebe2089ac2f14100fd0cd2fbefc0d3e6efe5831d064923543d5d8

              SHA512

              fb3a0f260d77d8860855e76c04837ba9bbdc7674bbb473f72bfa80a5ad8ede611614838f13420bda8e9ab1c940d6e3048c7b7f6b7618dfc3fb7cd8a7715f8607

            • C:\Windows\SysWOW64\Hbckbepg.exe

              Filesize

              256KB

              MD5

              f1ef510ec1452551bebcb7c347fa9f4b

              SHA1

              b1eab9d1e9ec299986b20a3cc97a91c2c94a5164

              SHA256

              91f4da3981e8e21cbe448b238da12f0eb85f9a250f17e61663efc3149ba126e6

              SHA512

              d848027e289bed078fed25400b1f2882ccd05b6f79915f842ceb3db4bb2ee85e65dbfc4b72b978a83159f3904ee84ec6962205527180dd3828251e3b4461cf8d

            • C:\Windows\SysWOW64\Hbeghene.exe

              Filesize

              256KB

              MD5

              fd16659e11c584ce5daed447f56e01de

              SHA1

              cf7ed1ae893a2ead45ca10deac7aa2f7a75a6269

              SHA256

              002882ce3d922056471ce70cd992dc083b963c04c92b44f170db2121ed334fed

              SHA512

              90a83d3827c4200b7380d0e8576d729cd662b39300c49175e75ba0dafa8c76299c221031a9d02d0f8486e6d30b869e621bf7c96190eb38d20f50dccd0c537b5d

            • C:\Windows\SysWOW64\Hbhdmd32.exe

              Filesize

              256KB

              MD5

              6705d7913bddf5d8ce278b87e58b8a8c

              SHA1

              9e83c879e041281ab0697925b18f501a99914b25

              SHA256

              37266d60d3cdac7bf5d5f1c5dd102e1680a6707847b1a4b38f272d5747953a5d

              SHA512

              585703e8a9a5ebfeb8da732157d748cb695b34da6c7cbc1d2aaf7ce52d93e4da91ee36f55b00d603cef997e80e4c22aa44edf545dbdbedb5d1be4f3313008e28

            • C:\Windows\SysWOW64\Hccglh32.exe

              Filesize

              256KB

              MD5

              a1c865b79aaf9693cbd366df6efa8bde

              SHA1

              b87b83058fa4bff2c7cc81bb08d023ec1f460e99

              SHA256

              5151ea091a96ee2e9dc6ba83d647f69d62400bde1d034c30bdf6ea016aae9825

              SHA512

              5171cc6503b6133d8c23ec6951b7616b6c638139137043c32504d9731e31f6075eba435df5b209d1fe31f414c6b87cfcaa45ecbe11d0f4b5cb9301bb889fe5d6

            • C:\Windows\SysWOW64\Hikfip32.exe

              Filesize

              256KB

              MD5

              47f54488d09ec2bb877f70fc0f6468f1

              SHA1

              22c1a68a9566d0a7268df76ce1c138c0cb21daea

              SHA256

              dc3134261cb9518c7f0df9ecabbfc3aae6cb62a3adc077ef9c1fe9efb167c055

              SHA512

              09c075c0a62611a0995c62ec78c7419605b2b66f564db34232207bacfae420c9eed61b0316391605cec258135d9d94ac68bed71301ccebf0f6c0b906a2dda15b

            • C:\Windows\SysWOW64\Hjolnb32.exe

              Filesize

              256KB

              MD5

              9fb1d4518a9b773265c10d3c803d97b9

              SHA1

              320d115954f3dff4cbcac9043687b3e918278426

              SHA256

              5cb6d30d1801e0fd1faed44a9a62cabc5fe60790afed34e09c5e60065a64e93c

              SHA512

              d67dcedd408851c04244cb67db93ad847d93641dfde028fd9879bf6566b2753f535cb54b8f3438c968f838f0df75841d9348946882ccddf528f9cc8b3dce0833

            • C:\Windows\SysWOW64\Hpbaqj32.exe

              Filesize

              256KB

              MD5

              1236b9339e6f9282240c1afb34e3e849

              SHA1

              0cc21ea83ed186c95b99c9f262b8161c1eec26ae

              SHA256

              2d5920231a743b0bdb21d1fb3efdb429355ef45b0ffb20f53a35955d501cee29

              SHA512

              98dda507462342cea055ca129660914bc85b7ab45da7417cc46e698edc9d2e20ee41c00e8b69e411344741e645e5570f51567be1429f38fdb181c147b69519ae

            • C:\Windows\SysWOW64\Hpihai32.exe

              Filesize

              256KB

              MD5

              0416582b6fe1cf11dc674e7f2f126a5a

              SHA1

              762276b47345d71aff1af1375dbaf0ab5f1ae97f

              SHA256

              eefc6a5fafc0c2fa12bf689b664ccf7c50dcaa17023044f282f69718d2f9b5d9

              SHA512

              73dbebe95e258f6825021456e71d8d14e1f722d9680c2d1e1f2156f5aef86aa6023146e8b93685b1d5030cdfb653c07684c63f3a6ce691075a96369a33d8d6f8

            • C:\Windows\SysWOW64\Iabgaklg.exe

              Filesize

              256KB

              MD5

              996ae15a8d0cd09b4a0b118877b36151

              SHA1

              f912ccdf8465fcefae2a3abb9faf128bfecf736f

              SHA256

              d6924f159f371468e333c56774ac3ef04a181e1c723636ae5716f8ae4c819b70

              SHA512

              e2e437aaeda4f03e5f2e895ad87f7dcad8693b7bb25491f46e0f855aadada49606bb1131a527cb16accbc54dd9c3721031362ab97e992237061641cc8ef5f04b

            • C:\Windows\SysWOW64\Iakaql32.exe

              Filesize

              256KB

              MD5

              344e8a08159293fead3a412b1774841a

              SHA1

              d64b8187556f4cefd31036985e1d1c7e8fb13ea1

              SHA256

              b3fbba914c98691171e29f6ffe452eda0a58b6e352d8efb3d25ea6bb13cba69e

              SHA512

              683e47bcdc18339f93afba60f4083f42afeb6b621edc6081fa953356e74056d03a805d3110b0687d7e540572f20189fd9a1a94ac9be5a2ff5f68fa16dc8127a3

            • C:\Windows\SysWOW64\Ibccic32.exe

              Filesize

              256KB

              MD5

              f7fd7d5536ca443ccc486f553468773c

              SHA1

              68c7a374365e09b39b9eac9dae5b0e8d4608ff34

              SHA256

              3e58ec88c6f26d0c1cc77efb04ecd2ee8e2c1a219093d470f5314055f3b39c66

              SHA512

              d824c62ee90135855f7fe2c5d6cf3dad03a3edc24cebce519aef953ba713a19d9f7983a02b33ff53ff1e30ed88efe92100ca8cdf951023e6b481b1e33d75c88e

            • C:\Windows\SysWOW64\Ibjqcd32.exe

              Filesize

              256KB

              MD5

              275ef94de5a81f0b7d9265565098818b

              SHA1

              f67f92325c642aa127121a808d9bab8ab2b2784b

              SHA256

              f4abc08aaefc40a0866bd1bb1a152433fc91a54ad3ef0990e010352d7fbdc1e3

              SHA512

              5c8288d55889c216d7742fcb2f2b3e4fd1a2d5aa4fc76593d2b3faf93fab583e05ea4b2958ec4c669b07ff6c61bc4a6a9abb8f2718a7e9e4ab9aa527c01efdf2

            • C:\Windows\SysWOW64\Ifmcdblq.exe

              Filesize

              256KB

              MD5

              45470b3225d6e7613a467a6633b4eea1

              SHA1

              1935e09bd45f8f173d0625fd1b8c648def4aa1bb

              SHA256

              8c14e1739a5fa2c8abc14023a77d3df185411298174b8de7853ad1f98f16c9fc

              SHA512

              08723f20720bdcf29fb7400bdc7e26694c8c36975e9f5dc0fac4fdcf93d2b4d8b8b207876b810a5ec7d0793169db10f10f81cda393974d652721e9c27ed920a2

            • C:\Windows\SysWOW64\Iinlemia.exe

              Filesize

              256KB

              MD5

              0950b402d02c2c01c2b4114e496dd3fd

              SHA1

              36f4d738f2dd236199adb269f0d812d37c72a591

              SHA256

              5f6d9c74f5fab84a5ffbccd09ebafb3e46072d7174823e8d1812a0aa91b55173

              SHA512

              d2a78e0c4784d24d9b9348e3965c2c9452509af0809d88849c3cc0e2e067b1ed111fb7cd12ae9aeeb37b14458d38b9c8c297214ac85a3000899d7d10121ce12e

            • C:\Windows\SysWOW64\Ijfboafl.exe

              Filesize

              256KB

              MD5

              75879e4120893cd20e4fb330db97b970

              SHA1

              2d647d2422293a82b71e06e06c875a6e92e40c14

              SHA256

              ce75b022f486c0d8a077e994f42ae0c6bf7b4004f9955114c8917bd2deedd623

              SHA512

              59bbc2969cde71897fd0d7761bb62184ba4f3be9407d659ca86259f7af6adcfd89730a5b3f824321af341ceaf6d75b9c39f83dbf5a9c3818a22d70b6867649c9

            • C:\Windows\SysWOW64\Imbaemhc.exe

              Filesize

              256KB

              MD5

              e0b8b5c9432b09a003dbd35a174c6059

              SHA1

              4890f81277478ef3c5ecc1ea78230c4e4e4d6d25

              SHA256

              91f7fa1e61c26e98437f785b39744063b57897d6f652cade2771fbd5b234d12c

              SHA512

              93ab9a5dce8d16def305bab39de76eac148713ad296697d65dba81c391eb6d9a0c4e1b31733d997396a12559ab494487464c77fdef445f56d9fff024b818682b

            • C:\Windows\SysWOW64\Imdnklfp.exe

              Filesize

              256KB

              MD5

              146b5fcae16d84aa970b1e5d75f05231

              SHA1

              e2f6a9a973c50f9459c61c02cee4448b7e4066d8

              SHA256

              47abe11ff43889c8d6fdfb999e4944b66a8d2c68db4e2a304707eccaa767911a

              SHA512

              877d5f0e1079268bd43b8eeb15362a962053821bfd275a7f5379fa225afac388667422b0b32b91ea3404c5ea12d805f0164274644d70c5bd013e190f66fd421e

            • C:\Windows\SysWOW64\Impepm32.exe

              Filesize

              256KB

              MD5

              68c6848aaa261ecc01019a52d762c77e

              SHA1

              974c4d268471267ddeda9934e8e60e12f630e171

              SHA256

              9500da99f70ba25b4e4676ee31a92270d8d8d09210ca7cb86ee6a48393470d95

              SHA512

              1c439b340273423a745a8238ff6ee2b2715188365ee4776b2d332f6c60f65dbb25dfbbb7a91e5e970e49036dd75e8d29f76ff9dc8005332b04577374cd7c7b5c

            • C:\Windows\SysWOW64\Ipqnahgf.exe

              Filesize

              256KB

              MD5

              fbad31307e277ad6bcff5d6244cb619f

              SHA1

              31442d6c6aa53c78ea887b8c4c2aae96351ac5e5

              SHA256

              1df204d1eaa54f75627f55086fecb2f7d82b18044585d3bb07ee5236e66ac73d

              SHA512

              0ae764ecd4dcc3e44554b9b0b8f56cd3c04f00affa4d2cc3fe1c646cf0446a04b7fa4018f19516e12e3ac8180145fd294c37f8639690cbc9aa2cef2df09c2ceb

            • C:\Windows\SysWOW64\Jaimbj32.exe

              Filesize

              256KB

              MD5

              32eb00db631a5f36a6e775a40fb386b6

              SHA1

              218c051df2a3fd50af4e892a266db86db7dfac4d

              SHA256

              e99275d390ca6da9e917d2309f164d58d957131d75738a3441f59369d08170ee

              SHA512

              70c269bb352a592be3d753c797579fd0dfc6962398a6c0cd1394a0c3ecc7ca31b19a377bc1d7aa442ef806efdfdc2aef2e26475ca4101ccbc96c9d99ed15ed1c

            • C:\Windows\SysWOW64\Jbfpobpb.exe

              Filesize

              256KB

              MD5

              dc2865706342a739ba0ce4fcabd656cb

              SHA1

              90770888eb2a5896acb53c566f0900478b71ac06

              SHA256

              80db9dd2bdb1b1c6c3072845a16a67968fb3d66c0996fe57ff2b06f829206507

              SHA512

              f3bc43a7e8dc801cccd9a012a39eb4c412bc2294f81db511ea31a04d8cd47ed106dd388f04c0b5f3fd3596f79bbefc939924a016e63e92a960bf0c40ad06c205

            • C:\Windows\SysWOW64\Jdemhe32.exe

              Filesize

              256KB

              MD5

              3553fef47b2ba2f81decd8cbb285c5e1

              SHA1

              31614d7a920b5efe2663ab1190d22f708459a7ac

              SHA256

              8b6a3ca26ad0a642d399749c1685eb3340fd5915b8de950a756275d6729ccb06

              SHA512

              24f9391015dc9c379d9b8367503e6f1b7d209b35554504e90cd56dbb6707ec80f081ca2b99615d8501127b8a11b9ad1b7bd217357913331e1ebb7e97f339c9a6

            • C:\Windows\SysWOW64\Jdjfcecp.exe

              Filesize

              256KB

              MD5

              2a212a9fcc148914739db43a4b771f39

              SHA1

              e208da6cfc36ce76e2c4706ae4ab58e63e3e5a12

              SHA256

              ee13de7890616f11c8ef18083ffc92858a14434cd60ddfaa5994a0688dc96632

              SHA512

              676eac8d983a681dacd03bea11e811c6e23b1362d4ba22319279211badffc767634652ba4ea4a1a8ad2fce9bd2d1ee5584374c3e94dd7f136d3c5b88e0a6bd7a

            • C:\Windows\SysWOW64\Jdmcidam.exe

              Filesize

              256KB

              MD5

              d12e9cd7d5e7a9a9f9a95d0090f683bb

              SHA1

              271b7450ea420c38769e03fd166cbbc68dfbf06c

              SHA256

              53c97e72fd720cd769cfe2e6508e026076d9a15251fb152586e9f484b374025e

              SHA512

              06fba411a5708e88d3f194713e292a575fd51423652293ca9be1a604430b40c632df0e90ab9f1d300eaffd254dbba08d082bc197a9a6de5297b56e7539f61e43

            • C:\Windows\SysWOW64\Jfffjqdf.exe

              Filesize

              256KB

              MD5

              443805071793019bfa731482e4160df8

              SHA1

              cd97a75421052c89cfea5332d923c9354c879ab1

              SHA256

              1227e287f3996ed3a5660c8755c2a47d65eed8e3525e26a1401d988204210810

              SHA512

              ed4ee2a38ea7b6a6feb5640e840cca6aed371733fbd62337ecd294682f9452a5ac75e9f339beb4dbf9f4ae53ffe517b26b5f9c13deb903f00325657e2e50fb9c

            • C:\Windows\SysWOW64\Jfhbppbc.exe

              Filesize

              256KB

              MD5

              145c34c6a744151bfd5fdc8b23967c14

              SHA1

              82e948101700b714b2026d4055094809716dffb0

              SHA256

              c5e06e1d62e688375b674a0eefa6261275ecdfedeb33bdd1e2d331ed33846054

              SHA512

              1f2dfe84c6d55b723dd51ae017c02a0e36b17176cb1f6c158f17588d447d0c135e61e75a5ba1d2a946e1f9fa369d5d21c76b6ec4e1320632725f3aafc9ad87fd

            • C:\Windows\SysWOW64\Jfkoeppq.exe

              Filesize

              256KB

              MD5

              b23fd9d4295918ae08e4beefe37da819

              SHA1

              02ec600824027c32071ddcf9954b312f3d5427c5

              SHA256

              877d03b14bad070242199e162b8296992b404e27a1cab1bca7f98355d6c9a3af

              SHA512

              a718f4aba12323120f76fbc60ebb3da4b662ce46785d3e3a1caa36979561862bb8bf5b9e5af9200eb446f3ceb289de9afa3954a9bebc614c4de05132da7cca5e

            • C:\Windows\SysWOW64\Jiphkm32.exe

              Filesize

              256KB

              MD5

              640b15a8413a5f59c6330a4b981ef78d

              SHA1

              6ec95ee6353956255fddd1a49c2cd3f80a2bfe89

              SHA256

              71905ccc4fca54cbb069666a41941e7eecfbcf296cba033ce8f049218317ffd9

              SHA512

              c9dbec2978151fb347a512bb8e7e7f161e0bd843663fe2878cd7ab3213573e8c4bff5a3ff09f73c82d1a92442fc730d53658a4d3d9da39d134919c4555aff662

            • C:\Windows\SysWOW64\Jjpeepnb.exe

              Filesize

              256KB

              MD5

              037768a8e6f2ac983924983cd51b65a9

              SHA1

              98087955ec2afafe4935569c01d118b0b4815121

              SHA256

              44dd4b3868809824cc88be716e1dd29ec6d7a85e8d0b1df7f0c98117f1adc508

              SHA512

              8fc8ac0885472024c832ed60f1c4196e295f8d5b99fdcfcbd5138c835c60edebd0aea52b321f74bf06537071a1d964c1429d1976c521f2299e65a49c84b616d4

            • C:\Windows\SysWOW64\Jmpngk32.exe

              Filesize

              256KB

              MD5

              bded1380bcb01af5a5b90cc974e9a291

              SHA1

              2f4bdd489d402309b2683621dc8dde1ea36e3d58

              SHA256

              41c0c93f94262532f8a0b561b1fd1c92e1bf8be6cb8a5b2446e3eed635e569ff

              SHA512

              9ca58eb31b227019e00b016ea061e39dbb918fb575c60448f50fd0aca69b6686e8b34e05c7cd6b4100d5f669aa57ca590fba639d84322e9735614572c2abbc1e

            • C:\Windows\SysWOW64\Kagichjo.exe

              Filesize

              256KB

              MD5

              912e9c227892cf1763aa45c7c1a8265a

              SHA1

              9de0c571bb76f84279ac61b3dd5ad32e6e4a9b8c

              SHA256

              e6d29e90b6762fa43ae655e338728be198beddc1d5ac5737adb87a3bffe3b722

              SHA512

              37b054a254995c779c3ba78cacbf3a33022a5a7262f9ede48958eb0cfca11fdaa011d09fccf33aadb9afe9b267211a3a7baf4b808fee938d0786a0da2c351ee7

            • C:\Windows\SysWOW64\Kgfoan32.exe

              Filesize

              256KB

              MD5

              aaa19b30f652f35a3384ed7903a12a98

              SHA1

              7bd2b774a667da3f28b0a543263be4dcfdb0fe21

              SHA256

              54fa27c0fe620c5643f86fa39e62aba87e0c507f2d313fe9bb9cfea1009acb3e

              SHA512

              0b660e3fbc330436d706f49a0a579a6cf612deb11995f26c6c92b837f902becfbe5e06bcafa521823cdb53630b85a9dd5d57d99ed8ea9a1055522ee6c2e4bc1f

            • C:\Windows\SysWOW64\Laciofpa.exe

              Filesize

              256KB

              MD5

              c45ab72496ff51ff16e068a9e1f9f8c5

              SHA1

              d48c3253a2d9dee31a7d312e2726cfb6958926bd

              SHA256

              06a87cbbfa59a7eedf0920bd678d054077cc12ed5de74307b90195301784def6

              SHA512

              c50987685046a55bebeb9c4055fde811e6efd95348953b76b176d3583fbed2925b094e31745502e74a418b3ae21d5d503cf3eab0d09458b243479a18ef376d95

            • C:\Windows\SysWOW64\Ldmlpbbj.exe

              Filesize

              256KB

              MD5

              b0210630ed0673479e41de656ec6de5b

              SHA1

              58a681f163e2bfc0225c9783555cbabf9231ed2c

              SHA256

              34d79a293d8a02725bd2668f2f903c2f721309c39721b6b9bd07996a4b6c6e33

              SHA512

              d9414f6eb4cce21c07259efb0b48b15368207192121dcd8cec360866abd7e1e226c3564e6c1a1202e6bae4efae94e76826dabc4394a4ec3f4e69b0264b685650

            • C:\Windows\SysWOW64\Mpkbebbf.exe

              Filesize

              256KB

              MD5

              0ba394489068ae0f03024d0cce73123e

              SHA1

              54b89008583cfa62337e3d41f3628662ea4bc336

              SHA256

              e59b8be822111f091d0de328a714252fd1cb4d92e0758604701f30e8c4e35e8f

              SHA512

              64cc3e87543752c4f783cd12a684a5c9129c228c12cc1facd3f3a8db9c9bf5254dda59f58a3565da92522710877344134e2d098da50d93cb1f5a8a31308bea8b

            • C:\Windows\SysWOW64\Ncihikcg.exe

              Filesize

              256KB

              MD5

              a8d478a8923534abfe3aed6622ed0d69

              SHA1

              392686c333d1ff324756a16adb6b13b53f315ff8

              SHA256

              daf5936d66d88a05b453f7748c8b7383d0c79a876e44a43f8e72d7f6d8c62d7a

              SHA512

              2b5408a903732827cac958ee89bab2a33e63ccc36c817be3a2c785dd6cde53b85dce0c49306bc5946c794426a6241392e7043f2ad92fe3857307125aa2165519

            • memory/220-199-0x0000000000400000-0x000000000043F000-memory.dmp

              Filesize

              252KB

            • memory/232-144-0x0000000000400000-0x000000000043F000-memory.dmp

              Filesize

              252KB

            • memory/400-452-0x0000000000400000-0x000000000043F000-memory.dmp

              Filesize

              252KB

            • memory/452-151-0x0000000000400000-0x000000000043F000-memory.dmp

              Filesize

              252KB

            • memory/628-501-0x0000000000400000-0x000000000043F000-memory.dmp

              Filesize

              252KB

            • memory/628-382-0x0000000000400000-0x000000000043F000-memory.dmp

              Filesize

              252KB

            • memory/640-44-0x0000000000400000-0x000000000043F000-memory.dmp

              Filesize

              252KB

            • memory/752-494-0x0000000000400000-0x000000000043F000-memory.dmp

              Filesize

              252KB

            • memory/752-424-0x0000000000400000-0x000000000043F000-memory.dmp

              Filesize

              252KB

            • memory/968-328-0x0000000000400000-0x000000000043F000-memory.dmp

              Filesize

              252KB

            • memory/1000-286-0x0000000000400000-0x000000000043F000-memory.dmp

              Filesize

              252KB

            • memory/1036-280-0x0000000000400000-0x000000000043F000-memory.dmp

              Filesize

              252KB

            • memory/1144-507-0x0000000000400000-0x000000000043F000-memory.dmp

              Filesize

              252KB

            • memory/1144-346-0x0000000000400000-0x000000000043F000-memory.dmp

              Filesize

              252KB

            • memory/1256-87-0x0000000000400000-0x000000000043F000-memory.dmp

              Filesize

              252KB

            • memory/1260-492-0x0000000000400000-0x000000000043F000-memory.dmp

              Filesize

              252KB

            • memory/1260-436-0x0000000000400000-0x000000000043F000-memory.dmp

              Filesize

              252KB

            • memory/1352-310-0x0000000000400000-0x000000000043F000-memory.dmp

              Filesize

              252KB

            • memory/1356-232-0x0000000000400000-0x000000000043F000-memory.dmp

              Filesize

              252KB

            • memory/1504-509-0x0000000000400000-0x000000000043F000-memory.dmp

              Filesize

              252KB

            • memory/1504-334-0x0000000000400000-0x000000000043F000-memory.dmp

              Filesize

              252KB

            • memory/1560-495-0x0000000000400000-0x000000000043F000-memory.dmp

              Filesize

              252KB

            • memory/1560-418-0x0000000000400000-0x000000000043F000-memory.dmp

              Filesize

              252KB

            • memory/1632-248-0x0000000000400000-0x000000000043F000-memory.dmp

              Filesize

              252KB

            • memory/1972-352-0x0000000000400000-0x000000000043F000-memory.dmp

              Filesize

              252KB

            • memory/1972-506-0x0000000000400000-0x000000000043F000-memory.dmp

              Filesize

              252KB

            • memory/2136-316-0x0000000000400000-0x000000000043F000-memory.dmp

              Filesize

              252KB

            • memory/2196-0-0x0000000000400000-0x000000000043F000-memory.dmp

              Filesize

              252KB

            • memory/2228-135-0x0000000000400000-0x000000000043F000-memory.dmp

              Filesize

              252KB

            • memory/2344-493-0x0000000000400000-0x000000000043F000-memory.dmp

              Filesize

              252KB

            • memory/2344-430-0x0000000000400000-0x000000000043F000-memory.dmp

              Filesize

              252KB

            • memory/2356-322-0x0000000000400000-0x000000000043F000-memory.dmp

              Filesize

              252KB

            • memory/2360-183-0x0000000000400000-0x000000000043F000-memory.dmp

              Filesize

              252KB

            • memory/2456-260-0x0000000000400000-0x000000000043F000-memory.dmp

              Filesize

              252KB

            • memory/2536-478-0x0000000000400000-0x000000000043F000-memory.dmp

              Filesize

              252KB

            • memory/2536-486-0x0000000000400000-0x000000000043F000-memory.dmp

              Filesize

              252KB

            • memory/2568-132-0x0000000000400000-0x000000000043F000-memory.dmp

              Filesize

              252KB

            • memory/2632-24-0x0000000000400000-0x000000000043F000-memory.dmp

              Filesize

              252KB

            • memory/2848-472-0x0000000000400000-0x000000000043F000-memory.dmp

              Filesize

              252KB

            • memory/2848-487-0x0000000000400000-0x000000000043F000-memory.dmp

              Filesize

              252KB

            • memory/2880-56-0x0000000000400000-0x000000000043F000-memory.dmp

              Filesize

              252KB

            • memory/2888-400-0x0000000000400000-0x000000000043F000-memory.dmp

              Filesize

              252KB

            • memory/2888-498-0x0000000000400000-0x000000000043F000-memory.dmp

              Filesize

              252KB

            • memory/3096-72-0x0000000000400000-0x000000000043F000-memory.dmp

              Filesize

              252KB

            • memory/3116-224-0x0000000000400000-0x000000000043F000-memory.dmp

              Filesize

              252KB

            • memory/3172-16-0x0000000000400000-0x000000000043F000-memory.dmp

              Filesize

              252KB

            • memory/3184-358-0x0000000000400000-0x000000000043F000-memory.dmp

              Filesize

              252KB

            • memory/3184-505-0x0000000000400000-0x000000000043F000-memory.dmp

              Filesize

              252KB

            • memory/3228-215-0x0000000000400000-0x000000000043F000-memory.dmp

              Filesize

              252KB

            • memory/3236-292-0x0000000000400000-0x000000000043F000-memory.dmp

              Filesize

              252KB

            • memory/3244-12-0x0000000000400000-0x000000000043F000-memory.dmp

              Filesize

              252KB

            • memory/3248-454-0x0000000000400000-0x000000000043F000-memory.dmp

              Filesize

              252KB

            • memory/3248-490-0x0000000000400000-0x000000000043F000-memory.dmp

              Filesize

              252KB

            • memory/3340-192-0x0000000000400000-0x000000000043F000-memory.dmp

              Filesize

              252KB

            • memory/3372-442-0x0000000000400000-0x000000000043F000-memory.dmp

              Filesize

              252KB

            • memory/3372-491-0x0000000000400000-0x000000000043F000-memory.dmp

              Filesize

              252KB

            • memory/3420-302-0x0000000000400000-0x000000000043F000-memory.dmp

              Filesize

              252KB

            • memory/3504-488-0x0000000000400000-0x000000000043F000-memory.dmp

              Filesize

              252KB

            • memory/3504-466-0x0000000000400000-0x000000000043F000-memory.dmp

              Filesize

              252KB

            • memory/3576-274-0x0000000000400000-0x000000000043F000-memory.dmp

              Filesize

              252KB

            • memory/3600-412-0x0000000000400000-0x000000000043F000-memory.dmp

              Filesize

              252KB

            • memory/3600-496-0x0000000000400000-0x000000000043F000-memory.dmp

              Filesize

              252KB

            • memory/3792-80-0x0000000000400000-0x000000000043F000-memory.dmp

              Filesize

              252KB

            • memory/3808-304-0x0000000000400000-0x000000000043F000-memory.dmp

              Filesize

              252KB

            • memory/3812-497-0x0000000000400000-0x000000000043F000-memory.dmp

              Filesize

              252KB

            • memory/3812-406-0x0000000000400000-0x000000000043F000-memory.dmp

              Filesize

              252KB

            • memory/3968-160-0x0000000000400000-0x000000000043F000-memory.dmp

              Filesize

              252KB

            • memory/3980-364-0x0000000000400000-0x000000000043F000-memory.dmp

              Filesize

              252KB

            • memory/3980-504-0x0000000000400000-0x000000000043F000-memory.dmp

              Filesize

              252KB

            • memory/3984-208-0x0000000000400000-0x000000000043F000-memory.dmp

              Filesize

              252KB

            • memory/4008-168-0x0000000000400000-0x000000000043F000-memory.dmp

              Filesize

              252KB

            • memory/4064-388-0x0000000000400000-0x000000000043F000-memory.dmp

              Filesize

              252KB

            • memory/4064-500-0x0000000000400000-0x000000000043F000-memory.dmp

              Filesize

              252KB

            • memory/4080-32-0x0000000000400000-0x000000000043F000-memory.dmp

              Filesize

              252KB

            • memory/4132-268-0x0000000000400000-0x000000000043F000-memory.dmp

              Filesize

              252KB

            • memory/4204-370-0x0000000000400000-0x000000000043F000-memory.dmp

              Filesize

              252KB

            • memory/4204-503-0x0000000000400000-0x000000000043F000-memory.dmp

              Filesize

              252KB

            • memory/4292-394-0x0000000000400000-0x000000000043F000-memory.dmp

              Filesize

              252KB

            • memory/4292-499-0x0000000000400000-0x000000000043F000-memory.dmp

              Filesize

              252KB

            • memory/4332-266-0x0000000000400000-0x000000000043F000-memory.dmp

              Filesize

              252KB

            • memory/4384-68-0x0000000000400000-0x000000000043F000-memory.dmp

              Filesize

              252KB

            • memory/4452-240-0x0000000000400000-0x000000000043F000-memory.dmp

              Filesize

              252KB

            • memory/4508-485-0x0000000000400000-0x000000000043F000-memory.dmp

              Filesize

              252KB

            • memory/4508-484-0x0000000000400000-0x000000000043F000-memory.dmp

              Filesize

              252KB

            • memory/4524-460-0x0000000000400000-0x000000000043F000-memory.dmp

              Filesize

              252KB

            • memory/4524-489-0x0000000000400000-0x000000000043F000-memory.dmp

              Filesize

              252KB

            • memory/4528-175-0x0000000000400000-0x000000000043F000-memory.dmp

              Filesize

              252KB

            • memory/4540-111-0x0000000000400000-0x000000000043F000-memory.dmp

              Filesize

              252KB

            • memory/4580-100-0x0000000000400000-0x000000000043F000-memory.dmp

              Filesize

              252KB

            • memory/4712-508-0x0000000000400000-0x000000000043F000-memory.dmp

              Filesize

              252KB

            • memory/4712-340-0x0000000000400000-0x000000000043F000-memory.dmp

              Filesize

              252KB

            • memory/4772-120-0x0000000000400000-0x000000000043F000-memory.dmp

              Filesize

              252KB

            • memory/4780-104-0x0000000000400000-0x000000000043F000-memory.dmp

              Filesize

              252KB

            • memory/5012-52-0x0000000000400000-0x000000000043F000-memory.dmp

              Filesize

              252KB

            • memory/5108-376-0x0000000000400000-0x000000000043F000-memory.dmp

              Filesize

              252KB

            • memory/5108-502-0x0000000000400000-0x000000000043F000-memory.dmp

              Filesize

              252KB