Analysis

  • max time kernel
    94s
  • max time network
    123s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240508-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system
  • submitted
    13/05/2024, 16:02

General

  • Target

    bdd5fce404322b5598eec21954600a90_NeikiAnalytics.exe

  • Size

    80KB

  • MD5

    bdd5fce404322b5598eec21954600a90

  • SHA1

    13d94302442f90900250f60f736e30254557cc9c

  • SHA256

    1d1ed52801e55a0eef0e368ad0af18c04f86b60f9f990c0457f8504cf72499ef

  • SHA512

    ecf75f7cc59581880e13e4120c1aa1beee9eafd0c435cba5d25cd87fe6168d95ed9c672014ac59fa03d757044a16c9f40aaedda21b255e92d1fa2f495bbae425

  • SSDEEP

    1536:ql9qjbPWDmJ/J5eUtSZjSDfWqdMVrlEFtyb7IYOOqw4Td:E9qnPWDEbpgJSTWqAhELy1MTTd

Score
10/10

Malware Config

Signatures

  • Adds autorun key to be loaded by Explorer.exe on startup 2 TTPs 64 IoCs
  • Executes dropped EXE 64 IoCs
  • Drops file in System32 directory 64 IoCs
  • Program crash 1 IoCs
  • Modifies registry class 64 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\bdd5fce404322b5598eec21954600a90_NeikiAnalytics.exe
    "C:\Users\Admin\AppData\Local\Temp\bdd5fce404322b5598eec21954600a90_NeikiAnalytics.exe"
    1⤵
    • Adds autorun key to be loaded by Explorer.exe on startup
    • Modifies registry class
    • Suspicious use of WriteProcessMemory
    PID:4908
    • C:\Windows\SysWOW64\Jfffjqdf.exe
      C:\Windows\system32\Jfffjqdf.exe
      2⤵
      • Adds autorun key to be loaded by Explorer.exe on startup
      • Executes dropped EXE
      • Drops file in System32 directory
      • Suspicious use of WriteProcessMemory
      PID:4748
      • C:\Windows\SysWOW64\Jmpngk32.exe
        C:\Windows\system32\Jmpngk32.exe
        3⤵
        • Adds autorun key to be loaded by Explorer.exe on startup
        • Executes dropped EXE
        • Drops file in System32 directory
        • Suspicious use of WriteProcessMemory
        PID:3484
        • C:\Windows\SysWOW64\Jbmfoa32.exe
          C:\Windows\system32\Jbmfoa32.exe
          4⤵
          • Executes dropped EXE
          • Drops file in System32 directory
          • Modifies registry class
          • Suspicious use of WriteProcessMemory
          PID:1752
          • C:\Windows\SysWOW64\Jkdnpo32.exe
            C:\Windows\system32\Jkdnpo32.exe
            5⤵
            • Adds autorun key to be loaded by Explorer.exe on startup
            • Executes dropped EXE
            • Suspicious use of WriteProcessMemory
            PID:1140
            • C:\Windows\SysWOW64\Jangmibi.exe
              C:\Windows\system32\Jangmibi.exe
              6⤵
              • Executes dropped EXE
              • Modifies registry class
              • Suspicious use of WriteProcessMemory
              PID:3348
              • C:\Windows\SysWOW64\Jbocea32.exe
                C:\Windows\system32\Jbocea32.exe
                7⤵
                • Executes dropped EXE
                • Drops file in System32 directory
                • Suspicious use of WriteProcessMemory
                PID:744
                • C:\Windows\SysWOW64\Jiikak32.exe
                  C:\Windows\system32\Jiikak32.exe
                  8⤵
                  • Adds autorun key to be loaded by Explorer.exe on startup
                  • Executes dropped EXE
                  • Drops file in System32 directory
                  • Modifies registry class
                  • Suspicious use of WriteProcessMemory
                  PID:3200
                  • C:\Windows\SysWOW64\Kdopod32.exe
                    C:\Windows\system32\Kdopod32.exe
                    9⤵
                    • Adds autorun key to be loaded by Explorer.exe on startup
                    • Executes dropped EXE
                    • Suspicious use of WriteProcessMemory
                    PID:4672
                    • C:\Windows\SysWOW64\Kkihknfg.exe
                      C:\Windows\system32\Kkihknfg.exe
                      10⤵
                      • Adds autorun key to be loaded by Explorer.exe on startup
                      • Executes dropped EXE
                      • Modifies registry class
                      • Suspicious use of WriteProcessMemory
                      PID:2140
                      • C:\Windows\SysWOW64\Kmgdgjek.exe
                        C:\Windows\system32\Kmgdgjek.exe
                        11⤵
                        • Executes dropped EXE
                        • Drops file in System32 directory
                        • Suspicious use of WriteProcessMemory
                        PID:3240
                        • C:\Windows\SysWOW64\Kdaldd32.exe
                          C:\Windows\system32\Kdaldd32.exe
                          12⤵
                          • Adds autorun key to be loaded by Explorer.exe on startup
                          • Executes dropped EXE
                          • Modifies registry class
                          • Suspicious use of WriteProcessMemory
                          PID:940
                          • C:\Windows\SysWOW64\Kgphpo32.exe
                            C:\Windows\system32\Kgphpo32.exe
                            13⤵
                            • Adds autorun key to be loaded by Explorer.exe on startup
                            • Executes dropped EXE
                            • Drops file in System32 directory
                            • Modifies registry class
                            • Suspicious use of WriteProcessMemory
                            PID:4676
                            • C:\Windows\SysWOW64\Kmjqmi32.exe
                              C:\Windows\system32\Kmjqmi32.exe
                              14⤵
                              • Adds autorun key to be loaded by Explorer.exe on startup
                              • Executes dropped EXE
                              • Drops file in System32 directory
                              • Modifies registry class
                              • Suspicious use of WriteProcessMemory
                              PID:4232
                              • C:\Windows\SysWOW64\Kphmie32.exe
                                C:\Windows\system32\Kphmie32.exe
                                15⤵
                                • Executes dropped EXE
                                • Drops file in System32 directory
                                • Suspicious use of WriteProcessMemory
                                PID:2172
                                • C:\Windows\SysWOW64\Kbfiep32.exe
                                  C:\Windows\system32\Kbfiep32.exe
                                  16⤵
                                  • Executes dropped EXE
                                  • Drops file in System32 directory
                                  • Modifies registry class
                                  • Suspicious use of WriteProcessMemory
                                  PID:1688
                                  • C:\Windows\SysWOW64\Kipabjil.exe
                                    C:\Windows\system32\Kipabjil.exe
                                    17⤵
                                    • Adds autorun key to be loaded by Explorer.exe on startup
                                    • Executes dropped EXE
                                    • Modifies registry class
                                    • Suspicious use of WriteProcessMemory
                                    PID:1172
                                    • C:\Windows\SysWOW64\Kpjjod32.exe
                                      C:\Windows\system32\Kpjjod32.exe
                                      18⤵
                                      • Adds autorun key to be loaded by Explorer.exe on startup
                                      • Executes dropped EXE
                                      • Modifies registry class
                                      • Suspicious use of WriteProcessMemory
                                      PID:4328
                                      • C:\Windows\SysWOW64\Kcifkp32.exe
                                        C:\Windows\system32\Kcifkp32.exe
                                        19⤵
                                        • Executes dropped EXE
                                        • Modifies registry class
                                        • Suspicious use of WriteProcessMemory
                                        PID:4388
                                        • C:\Windows\SysWOW64\Kkpnlm32.exe
                                          C:\Windows\system32\Kkpnlm32.exe
                                          20⤵
                                          • Executes dropped EXE
                                          • Suspicious use of WriteProcessMemory
                                          PID:4084
                                          • C:\Windows\SysWOW64\Kajfig32.exe
                                            C:\Windows\system32\Kajfig32.exe
                                            21⤵
                                            • Adds autorun key to be loaded by Explorer.exe on startup
                                            • Executes dropped EXE
                                            • Drops file in System32 directory
                                            • Suspicious use of WriteProcessMemory
                                            PID:1964
                                            • C:\Windows\SysWOW64\Kdhbec32.exe
                                              C:\Windows\system32\Kdhbec32.exe
                                              22⤵
                                              • Adds autorun key to be loaded by Explorer.exe on startup
                                              • Executes dropped EXE
                                              • Drops file in System32 directory
                                              • Modifies registry class
                                              • Suspicious use of WriteProcessMemory
                                              PID:844
                                              • C:\Windows\SysWOW64\Kkbkamnl.exe
                                                C:\Windows\system32\Kkbkamnl.exe
                                                23⤵
                                                • Adds autorun key to be loaded by Explorer.exe on startup
                                                • Executes dropped EXE
                                                • Drops file in System32 directory
                                                • Modifies registry class
                                                PID:2632
                                                • C:\Windows\SysWOW64\Lmqgnhmp.exe
                                                  C:\Windows\system32\Lmqgnhmp.exe
                                                  24⤵
                                                  • Executes dropped EXE
                                                  • Drops file in System32 directory
                                                  • Modifies registry class
                                                  PID:336
                                                  • C:\Windows\SysWOW64\Ldkojb32.exe
                                                    C:\Windows\system32\Ldkojb32.exe
                                                    25⤵
                                                    • Executes dropped EXE
                                                    • Drops file in System32 directory
                                                    • Modifies registry class
                                                    PID:2052
                                                    • C:\Windows\SysWOW64\Lgikfn32.exe
                                                      C:\Windows\system32\Lgikfn32.exe
                                                      26⤵
                                                      • Adds autorun key to be loaded by Explorer.exe on startup
                                                      • Executes dropped EXE
                                                      • Drops file in System32 directory
                                                      • Modifies registry class
                                                      PID:4480
                                                      • C:\Windows\SysWOW64\Liggbi32.exe
                                                        C:\Windows\system32\Liggbi32.exe
                                                        27⤵
                                                        • Adds autorun key to be loaded by Explorer.exe on startup
                                                        • Executes dropped EXE
                                                        PID:3736
                                                        • C:\Windows\SysWOW64\Ldmlpbbj.exe
                                                          C:\Windows\system32\Ldmlpbbj.exe
                                                          28⤵
                                                          • Adds autorun key to be loaded by Explorer.exe on startup
                                                          • Executes dropped EXE
                                                          • Modifies registry class
                                                          PID:2384
                                                          • C:\Windows\SysWOW64\Lkgdml32.exe
                                                            C:\Windows\system32\Lkgdml32.exe
                                                            29⤵
                                                            • Adds autorun key to be loaded by Explorer.exe on startup
                                                            • Executes dropped EXE
                                                            • Drops file in System32 directory
                                                            • Modifies registry class
                                                            PID:2268
                                                            • C:\Windows\SysWOW64\Laalifad.exe
                                                              C:\Windows\system32\Laalifad.exe
                                                              30⤵
                                                              • Executes dropped EXE
                                                              • Drops file in System32 directory
                                                              PID:4716
                                                              • C:\Windows\SysWOW64\Lpcmec32.exe
                                                                C:\Windows\system32\Lpcmec32.exe
                                                                31⤵
                                                                • Executes dropped EXE
                                                                • Drops file in System32 directory
                                                                • Modifies registry class
                                                                PID:3080
                                                                • C:\Windows\SysWOW64\Lgneampk.exe
                                                                  C:\Windows\system32\Lgneampk.exe
                                                                  32⤵
                                                                  • Adds autorun key to be loaded by Explorer.exe on startup
                                                                  • Executes dropped EXE
                                                                  • Drops file in System32 directory
                                                                  • Modifies registry class
                                                                  PID:4272
                                                                  • C:\Windows\SysWOW64\Lilanioo.exe
                                                                    C:\Windows\system32\Lilanioo.exe
                                                                    33⤵
                                                                    • Executes dropped EXE
                                                                    • Drops file in System32 directory
                                                                    PID:3972
                                                                    • C:\Windows\SysWOW64\Lpfijcfl.exe
                                                                      C:\Windows\system32\Lpfijcfl.exe
                                                                      34⤵
                                                                      • Adds autorun key to be loaded by Explorer.exe on startup
                                                                      • Executes dropped EXE
                                                                      • Modifies registry class
                                                                      PID:1804
                                                                      • C:\Windows\SysWOW64\Lcdegnep.exe
                                                                        C:\Windows\system32\Lcdegnep.exe
                                                                        35⤵
                                                                        • Adds autorun key to be loaded by Explorer.exe on startup
                                                                        • Executes dropped EXE
                                                                        • Drops file in System32 directory
                                                                        • Modifies registry class
                                                                        PID:3328
                                                                        • C:\Windows\SysWOW64\Lgpagm32.exe
                                                                          C:\Windows\system32\Lgpagm32.exe
                                                                          36⤵
                                                                          • Adds autorun key to be loaded by Explorer.exe on startup
                                                                          • Executes dropped EXE
                                                                          • Drops file in System32 directory
                                                                          • Modifies registry class
                                                                          PID:2948
                                                                          • C:\Windows\SysWOW64\Ljnnch32.exe
                                                                            C:\Windows\system32\Ljnnch32.exe
                                                                            37⤵
                                                                            • Adds autorun key to be loaded by Explorer.exe on startup
                                                                            • Executes dropped EXE
                                                                            • Modifies registry class
                                                                            PID:1888
                                                                            • C:\Windows\SysWOW64\Lphfpbdi.exe
                                                                              C:\Windows\system32\Lphfpbdi.exe
                                                                              38⤵
                                                                              • Adds autorun key to be loaded by Explorer.exe on startup
                                                                              • Executes dropped EXE
                                                                              • Drops file in System32 directory
                                                                              • Modifies registry class
                                                                              PID:4476
                                                                              • C:\Windows\SysWOW64\Lgbnmm32.exe
                                                                                C:\Windows\system32\Lgbnmm32.exe
                                                                                39⤵
                                                                                • Adds autorun key to be loaded by Explorer.exe on startup
                                                                                • Executes dropped EXE
                                                                                • Modifies registry class
                                                                                PID:5060
                                                                                • C:\Windows\SysWOW64\Mnlfigcc.exe
                                                                                  C:\Windows\system32\Mnlfigcc.exe
                                                                                  40⤵
                                                                                  • Executes dropped EXE
                                                                                  • Modifies registry class
                                                                                  PID:3264
                                                                                  • C:\Windows\SysWOW64\Mpkbebbf.exe
                                                                                    C:\Windows\system32\Mpkbebbf.exe
                                                                                    41⤵
                                                                                    • Adds autorun key to be loaded by Explorer.exe on startup
                                                                                    • Executes dropped EXE
                                                                                    • Drops file in System32 directory
                                                                                    • Modifies registry class
                                                                                    PID:4968
                                                                                    • C:\Windows\SysWOW64\Mgekbljc.exe
                                                                                      C:\Windows\system32\Mgekbljc.exe
                                                                                      42⤵
                                                                                      • Executes dropped EXE
                                                                                      • Drops file in System32 directory
                                                                                      PID:2208
                                                                                      • C:\Windows\SysWOW64\Mjcgohig.exe
                                                                                        C:\Windows\system32\Mjcgohig.exe
                                                                                        43⤵
                                                                                        • Adds autorun key to be loaded by Explorer.exe on startup
                                                                                        • Executes dropped EXE
                                                                                        • Drops file in System32 directory
                                                                                        • Modifies registry class
                                                                                        PID:4040
                                                                                        • C:\Windows\SysWOW64\Majopeii.exe
                                                                                          C:\Windows\system32\Majopeii.exe
                                                                                          44⤵
                                                                                          • Adds autorun key to be loaded by Explorer.exe on startup
                                                                                          • Executes dropped EXE
                                                                                          • Drops file in System32 directory
                                                                                          PID:3092
                                                                                          • C:\Windows\SysWOW64\Mdiklqhm.exe
                                                                                            C:\Windows\system32\Mdiklqhm.exe
                                                                                            45⤵
                                                                                            • Executes dropped EXE
                                                                                            • Drops file in System32 directory
                                                                                            • Modifies registry class
                                                                                            PID:3496
                                                                                            • C:\Windows\SysWOW64\Mgghhlhq.exe
                                                                                              C:\Windows\system32\Mgghhlhq.exe
                                                                                              46⤵
                                                                                              • Executes dropped EXE
                                                                                              • Drops file in System32 directory
                                                                                              PID:4680
                                                                                              • C:\Windows\SysWOW64\Mkbchk32.exe
                                                                                                C:\Windows\system32\Mkbchk32.exe
                                                                                                47⤵
                                                                                                • Executes dropped EXE
                                                                                                • Drops file in System32 directory
                                                                                                • Modifies registry class
                                                                                                PID:4180
                                                                                                • C:\Windows\SysWOW64\Mnapdf32.exe
                                                                                                  C:\Windows\system32\Mnapdf32.exe
                                                                                                  48⤵
                                                                                                  • Adds autorun key to be loaded by Explorer.exe on startup
                                                                                                  • Executes dropped EXE
                                                                                                  PID:3480
                                                                                                  • C:\Windows\SysWOW64\Mdkhapfj.exe
                                                                                                    C:\Windows\system32\Mdkhapfj.exe
                                                                                                    49⤵
                                                                                                    • Adds autorun key to be loaded by Explorer.exe on startup
                                                                                                    • Executes dropped EXE
                                                                                                    • Drops file in System32 directory
                                                                                                    • Modifies registry class
                                                                                                    PID:2056
                                                                                                    • C:\Windows\SysWOW64\Mgidml32.exe
                                                                                                      C:\Windows\system32\Mgidml32.exe
                                                                                                      50⤵
                                                                                                      • Adds autorun key to be loaded by Explorer.exe on startup
                                                                                                      • Executes dropped EXE
                                                                                                      • Drops file in System32 directory
                                                                                                      • Modifies registry class
                                                                                                      PID:3528
                                                                                                      • C:\Windows\SysWOW64\Mjhqjg32.exe
                                                                                                        C:\Windows\system32\Mjhqjg32.exe
                                                                                                        51⤵
                                                                                                        • Executes dropped EXE
                                                                                                        PID:2256
                                                                                                        • C:\Windows\SysWOW64\Mncmjfmk.exe
                                                                                                          C:\Windows\system32\Mncmjfmk.exe
                                                                                                          52⤵
                                                                                                          • Adds autorun key to be loaded by Explorer.exe on startup
                                                                                                          • Executes dropped EXE
                                                                                                          • Modifies registry class
                                                                                                          PID:2300
                                                                                                          • C:\Windows\SysWOW64\Mdmegp32.exe
                                                                                                            C:\Windows\system32\Mdmegp32.exe
                                                                                                            53⤵
                                                                                                            • Adds autorun key to be loaded by Explorer.exe on startup
                                                                                                            • Executes dropped EXE
                                                                                                            • Modifies registry class
                                                                                                            PID:4816
                                                                                                            • C:\Windows\SysWOW64\Mcpebmkb.exe
                                                                                                              C:\Windows\system32\Mcpebmkb.exe
                                                                                                              54⤵
                                                                                                              • Adds autorun key to be loaded by Explorer.exe on startup
                                                                                                              • Executes dropped EXE
                                                                                                              • Drops file in System32 directory
                                                                                                              • Modifies registry class
                                                                                                              PID:408
                                                                                                              • C:\Windows\SysWOW64\Mkgmcjld.exe
                                                                                                                C:\Windows\system32\Mkgmcjld.exe
                                                                                                                55⤵
                                                                                                                • Adds autorun key to be loaded by Explorer.exe on startup
                                                                                                                • Executes dropped EXE
                                                                                                                • Drops file in System32 directory
                                                                                                                • Modifies registry class
                                                                                                                PID:3196
                                                                                                                • C:\Windows\SysWOW64\Mnfipekh.exe
                                                                                                                  C:\Windows\system32\Mnfipekh.exe
                                                                                                                  56⤵
                                                                                                                  • Adds autorun key to be loaded by Explorer.exe on startup
                                                                                                                  • Executes dropped EXE
                                                                                                                  • Drops file in System32 directory
                                                                                                                  • Modifies registry class
                                                                                                                  PID:1808
                                                                                                                  • C:\Windows\SysWOW64\Mpdelajl.exe
                                                                                                                    C:\Windows\system32\Mpdelajl.exe
                                                                                                                    57⤵
                                                                                                                    • Adds autorun key to be loaded by Explorer.exe on startup
                                                                                                                    • Executes dropped EXE
                                                                                                                    • Drops file in System32 directory
                                                                                                                    • Modifies registry class
                                                                                                                    PID:4572
                                                                                                                    • C:\Windows\SysWOW64\Mdpalp32.exe
                                                                                                                      C:\Windows\system32\Mdpalp32.exe
                                                                                                                      58⤵
                                                                                                                      • Adds autorun key to be loaded by Explorer.exe on startup
                                                                                                                      • Executes dropped EXE
                                                                                                                      • Drops file in System32 directory
                                                                                                                      PID:1828
                                                                                                                      • C:\Windows\SysWOW64\Nkjjij32.exe
                                                                                                                        C:\Windows\system32\Nkjjij32.exe
                                                                                                                        59⤵
                                                                                                                        • Adds autorun key to be loaded by Explorer.exe on startup
                                                                                                                        • Executes dropped EXE
                                                                                                                        • Drops file in System32 directory
                                                                                                                        PID:3400
                                                                                                                        • C:\Windows\SysWOW64\Nnhfee32.exe
                                                                                                                          C:\Windows\system32\Nnhfee32.exe
                                                                                                                          60⤵
                                                                                                                          • Adds autorun key to be loaded by Explorer.exe on startup
                                                                                                                          • Executes dropped EXE
                                                                                                                          • Drops file in System32 directory
                                                                                                                          • Modifies registry class
                                                                                                                          PID:3104
                                                                                                                          • C:\Windows\SysWOW64\Nacbfdao.exe
                                                                                                                            C:\Windows\system32\Nacbfdao.exe
                                                                                                                            61⤵
                                                                                                                            • Adds autorun key to be loaded by Explorer.exe on startup
                                                                                                                            • Executes dropped EXE
                                                                                                                            • Drops file in System32 directory
                                                                                                                            PID:532
                                                                                                                            • C:\Windows\SysWOW64\Ndbnboqb.exe
                                                                                                                              C:\Windows\system32\Ndbnboqb.exe
                                                                                                                              62⤵
                                                                                                                              • Adds autorun key to be loaded by Explorer.exe on startup
                                                                                                                              • Executes dropped EXE
                                                                                                                              • Drops file in System32 directory
                                                                                                                              • Modifies registry class
                                                                                                                              PID:2332
                                                                                                                              • C:\Windows\SysWOW64\Nceonl32.exe
                                                                                                                                C:\Windows\system32\Nceonl32.exe
                                                                                                                                63⤵
                                                                                                                                • Executes dropped EXE
                                                                                                                                • Modifies registry class
                                                                                                                                PID:2832
                                                                                                                                • C:\Windows\SysWOW64\Njogjfoj.exe
                                                                                                                                  C:\Windows\system32\Njogjfoj.exe
                                                                                                                                  64⤵
                                                                                                                                  • Adds autorun key to be loaded by Explorer.exe on startup
                                                                                                                                  • Executes dropped EXE
                                                                                                                                  • Drops file in System32 directory
                                                                                                                                  • Modifies registry class
                                                                                                                                  PID:4652
                                                                                                                                  • C:\Windows\SysWOW64\Nafokcol.exe
                                                                                                                                    C:\Windows\system32\Nafokcol.exe
                                                                                                                                    65⤵
                                                                                                                                    • Adds autorun key to be loaded by Explorer.exe on startup
                                                                                                                                    • Executes dropped EXE
                                                                                                                                    • Drops file in System32 directory
                                                                                                                                    PID:3752
                                                                                                                                    • C:\Windows\SysWOW64\Ncgkcl32.exe
                                                                                                                                      C:\Windows\system32\Ncgkcl32.exe
                                                                                                                                      66⤵
                                                                                                                                      • Adds autorun key to be loaded by Explorer.exe on startup
                                                                                                                                      • Drops file in System32 directory
                                                                                                                                      PID:4056
                                                                                                                                      • C:\Windows\SysWOW64\Njacpf32.exe
                                                                                                                                        C:\Windows\system32\Njacpf32.exe
                                                                                                                                        67⤵
                                                                                                                                        • Modifies registry class
                                                                                                                                        PID:4104
                                                                                                                                        • C:\Windows\SysWOW64\Nnmopdep.exe
                                                                                                                                          C:\Windows\system32\Nnmopdep.exe
                                                                                                                                          68⤵
                                                                                                                                          • Adds autorun key to be loaded by Explorer.exe on startup
                                                                                                                                          • Modifies registry class
                                                                                                                                          PID:2128
                                                                                                                                          • C:\Windows\SysWOW64\Nqklmpdd.exe
                                                                                                                                            C:\Windows\system32\Nqklmpdd.exe
                                                                                                                                            69⤵
                                                                                                                                              PID:4524
                                                                                                                                              • C:\Windows\SysWOW64\Ncihikcg.exe
                                                                                                                                                C:\Windows\system32\Ncihikcg.exe
                                                                                                                                                70⤵
                                                                                                                                                • Adds autorun key to be loaded by Explorer.exe on startup
                                                                                                                                                • Modifies registry class
                                                                                                                                                PID:3304
                                                                                                                                                • C:\Windows\SysWOW64\Nkqpjidj.exe
                                                                                                                                                  C:\Windows\system32\Nkqpjidj.exe
                                                                                                                                                  71⤵
                                                                                                                                                  • Modifies registry class
                                                                                                                                                  PID:3108
                                                                                                                                                  • C:\Windows\SysWOW64\Nbkhfc32.exe
                                                                                                                                                    C:\Windows\system32\Nbkhfc32.exe
                                                                                                                                                    72⤵
                                                                                                                                                    • Adds autorun key to be loaded by Explorer.exe on startup
                                                                                                                                                    • Drops file in System32 directory
                                                                                                                                                    PID:1036
                                                                                                                                                    • C:\Windows\SysWOW64\Ndidbn32.exe
                                                                                                                                                      C:\Windows\system32\Ndidbn32.exe
                                                                                                                                                      73⤵
                                                                                                                                                      • Adds autorun key to be loaded by Explorer.exe on startup
                                                                                                                                                      • Modifies registry class
                                                                                                                                                      PID:232
                                                                                                                                                      • C:\Windows\SysWOW64\Nkcmohbg.exe
                                                                                                                                                        C:\Windows\system32\Nkcmohbg.exe
                                                                                                                                                        74⤵
                                                                                                                                                          PID:1724
                                                                                                                                                          • C:\Windows\SysWOW64\WerFault.exe
                                                                                                                                                            C:\Windows\SysWOW64\WerFault.exe -u -p 1724 -s 232
                                                                                                                                                            75⤵
                                                                                                                                                            • Program crash
                                                                                                                                                            PID:624
      • C:\Windows\SysWOW64\WerFault.exe
        C:\Windows\SysWOW64\WerFault.exe -pss -s 424 -p 1724 -ip 1724
        1⤵
          PID:2876

        Network

              MITRE ATT&CK Enterprise v15

              Replay Monitor

              Loading Replay Monitor...

              Downloads

              • C:\Windows\SysWOW64\Jangmibi.exe

                Filesize

                80KB

                MD5

                b9930c06b06fccbaedbc092efce33fad

                SHA1

                dc94e82ef8ee9bb836a8e46a26f66f141690d942

                SHA256

                e01a7d13f6dd0f63ad6360bd9ba92299c81eb744650711df20211bcaccd7134c

                SHA512

                318a95ed21b904be3ea3a89d0dff68b252c5d2becc2fadaa21a21be181777baf8501346e2e75cab775df5e32bc7301b9073b3cdf3ec7524791f5c89317e1fd86

              • C:\Windows\SysWOW64\Jbmfoa32.exe

                Filesize

                80KB

                MD5

                daf1360ae550a00d76f6cd402f0081f5

                SHA1

                e627a36be7caa53f3a2c46946e93ee11ff4a77ca

                SHA256

                daebb254c26766a9acb8b6a6f1b8b23ac4a5f91fc8c84781c12f2f9be91f7ef2

                SHA512

                3187f9dba33676222e91935edb4a63ff96753f428584e4edf2b2908e257339bbf7bb6f0651b0248ab719ed75edaf39b8d629f5b21429ecdf2ea0dda8976ba5ca

              • C:\Windows\SysWOW64\Jbocea32.exe

                Filesize

                80KB

                MD5

                c2e13527c84d311012965e9a504bc9ad

                SHA1

                efd4544e2f105c0cc8a731587560a242701804cb

                SHA256

                e4629eae79c6eaee528b59781124a687ddcf1d4c65de3ecf19813b31d1e0aa20

                SHA512

                7f84c82868ef56a3fb9ad4117a3f694408be6ea38f428057ae62055781e4c4e3030189bd004e8d92f107f833c8d2f764f1efd1ac242ccea637ef1a3ab94a9f11

              • C:\Windows\SysWOW64\Jfffjqdf.exe

                Filesize

                80KB

                MD5

                1358beff091455c26c6b95fece06eb3c

                SHA1

                c4bf4efa2271425d23c0044593a86a1d7533eaf5

                SHA256

                88aaf52afc292c44ac25dba5860c09a581a9f0233927a4a7aa52c034fcceb5c6

                SHA512

                2da347e45fe93c43e369ba6c3593428387742f4de8e72f88194bf861aa1d84c8f461f474ebc7a77e4ee9ff47eefe1b32fa3a35671038fbcc6bea29dcdf4165ec

              • C:\Windows\SysWOW64\Jiikak32.exe

                Filesize

                80KB

                MD5

                6512f11574b44c270b60b7bcc41ab811

                SHA1

                d065b2ac808e9e91c5502d857d4e13160f38f698

                SHA256

                6c7d45d2dbbe3a8965ba92002a1a688ec0c90d5aad6808505588f311fd6b64de

                SHA512

                8b482eccb91bdcae81dd7d4a845a023e17c50fbed1a2d63cc6fe8749b5d77498710c41b738cce12719ebf8ef9a445d18f2ef8cdd9b0a1ae358544a70b1cc9484

              • C:\Windows\SysWOW64\Jkdnpo32.exe

                Filesize

                80KB

                MD5

                1bf8870a14808bb97f714ce2d17bb2ce

                SHA1

                1b1e70a45ace6957c42213959a5d96e51b068f64

                SHA256

                aa5349a30a428b74610b337ddc8466e82e4e7411bb70b1f79d852affcd861791

                SHA512

                40ea83b19fbd4b2dd3bd7188208ef304d0e997f795776b4433c887d1f7b196d69fe80ee253ce93aadd1865a8e4c162cb0dc68ec4c51eae9d31ca5b29d08390d8

              • C:\Windows\SysWOW64\Jmpngk32.exe

                Filesize

                80KB

                MD5

                99f28508be553158ec64d57bf67ca192

                SHA1

                baf4a6e1d3debe8e6e6b8522d42eb17cc7eda061

                SHA256

                70065d5f1ec2dd063ea75b248e6263ad14d65cfde548a1ae773943789ea0435f

                SHA512

                b170db500a84d1e4e0ed9381c48136a107796e977a034fae8eb8a7b2d79cda8b7556343b112b2e6c3928dfb18ddb977cf88747fdc09de7fd8cdb27fb05b4834b

              • C:\Windows\SysWOW64\Kajfig32.exe

                Filesize

                80KB

                MD5

                546462e14a4441edc0cd98d5da8b1f23

                SHA1

                f38770a38d896becc1c703daaf36bcbe61adb127

                SHA256

                1acf4e0fb7f2026e91b682f1a705f0bf1ff2c8cd43e36d9e875c2c0c986552e3

                SHA512

                6b0cbf1988994bc94184d5d2197ebff43c2a3c84f8de46cb4bf94b5450ddb73337697009272391fe4ecd98ba748c943e1681c620049ad83d2ffac92eeec9ac51

              • C:\Windows\SysWOW64\Kbfiep32.exe

                Filesize

                80KB

                MD5

                f2f48d46424736d0932610f66a0ce429

                SHA1

                2d489462c2c1df3dd5db4f4f7c799d7257ca4abd

                SHA256

                586937db8bc20c08484c6a91406b953b8c153d2bd9cb6cd8fed8dd2681e801cf

                SHA512

                00456001680065a5dd4fe5de1fbf7d77298bf12fb16e349cb642de3ebc13a4d054865193914c4fc70e7d00ef18b7f40a455ea1cb3bb92fc9ac593604c26994e5

              • C:\Windows\SysWOW64\Kcifkp32.exe

                Filesize

                80KB

                MD5

                9bf14a8c427d8142a2fe086f9f329bbb

                SHA1

                41d4d73bb40ec6b9584996bd0e4b0a73b1367c1a

                SHA256

                d0fc759b6dde9ec39fb4bce7722abc9fb73a2f82947befcae36aff56ab42d351

                SHA512

                af6a0e768b8e78e4ebbc742787e5ced050a12cb9ce11b7358d5aa9f0c56dd99da00210ecfcc90f8abf6a1b485e63a6fdeaccecfa08ccac49c1af1f5314611cf3

              • C:\Windows\SysWOW64\Kdaldd32.exe

                Filesize

                80KB

                MD5

                3998c65e812768b3f8dd984905fc7e75

                SHA1

                1e61c4790877425cffbff1fe48d9e955a6321052

                SHA256

                d21bc1ffca74a3a9bf0f98193f88bcda93c34cbd69530ce6c1e1aac4a4e38d1d

                SHA512

                c43a9ecf64647178786040e2156ecbd5bdf82199155b53cf2401a17a281c4b257b2094381fe0eef5606001da74612467b91918aba1fe96ebcbafa169a1b17a64

              • C:\Windows\SysWOW64\Kdhbec32.exe

                Filesize

                80KB

                MD5

                2b8284756c511dc6c38996b11bbd936a

                SHA1

                ff7b34b62d8368eda0e13b9e450fa78db926ea7b

                SHA256

                ae337496dbb534a76cb6c9feb6e3b70e5c32ef6cd7ed33141aeb5a96966ede41

                SHA512

                3e14888ad88afa67590d3172b17fa2126dd2c3616f4b0582d8413c9bab6632c27d372c2f8d5ce235415a35b3751cb14c5256a9522bc189f335d82f681cd46431

              • C:\Windows\SysWOW64\Kdopod32.exe

                Filesize

                80KB

                MD5

                6d6d4e6553cee25a9b60cd0471969628

                SHA1

                5ce212fe72fde7a4d4a20c1c23231c6e9bd01566

                SHA256

                ac4a9fe4d713bc09bd96859a356daba28a36c48b35da45e55b8eb44d6987f189

                SHA512

                4cb9d48c0330f412a6ae5988ea65fd665c8a37b2e2531c3d000d08bb62edc6cd834489cd436b30fa8e95a8558e81a64f08dd9fe922ed18e1914e7c6332ed6aff

              • C:\Windows\SysWOW64\Kgphpo32.exe

                Filesize

                80KB

                MD5

                81594f88092aae793d6523cb3b2430be

                SHA1

                0778bd94ed3b82eabefda538bf859057207286bb

                SHA256

                4a76a1d2a53db878c5b821fbeff4d597b6adda344d3dd9bc124a3bae46242432

                SHA512

                cc610ffe51fbf9e200641eb21f405d479f443a8a4f2e766f5c942b9141e59894543f8d49f142477864c83c775a1aa0044541ad87864e880450049866849800e9

              • C:\Windows\SysWOW64\Kipabjil.exe

                Filesize

                80KB

                MD5

                9e9f9ca2584a9fd74bdcc082143343d9

                SHA1

                00a7f2bf1c8330cfd06318ca225b368686337d58

                SHA256

                662accfbaf0d7010fe68202601d728d90e28b230b78dc3417e10cfc7cb21f85b

                SHA512

                3639739a8b1c6bdc2a7ad06ad5d1cc4354a7fd72dacb3ec90d57bffd1ae6c2dc1eca94ba684c61bda879e2deaa27fb25ff2467eebff1f4a701e515a51189a4c0

              • C:\Windows\SysWOW64\Kkbkamnl.exe

                Filesize

                80KB

                MD5

                5b3270d723e8dc8a8a2af5db31b179a8

                SHA1

                b3ab0ae3c96f829b176e1d35801bfa609184667b

                SHA256

                6a7e9d91ce02ea8de12a1ba1f8bfcb560d6aa6ed122328cecbd380f5fbf216fd

                SHA512

                259e134d0ce10e9a916f6bfff82e9be972d330f0dfdd9f60c9b38d9ebad1b3c6ceb752cb297c2f7d27550fcd2ca4482030f7c74d7cd60982e7d43aa8d1af4e52

              • C:\Windows\SysWOW64\Kkihknfg.exe

                Filesize

                80KB

                MD5

                1c8de31b157f87502cd51a97a632136c

                SHA1

                10bb5f3d682acdd8c9ac49164f7bfc888f6fb3fa

                SHA256

                35ba9af0ebc04719d41cd6d2e94b22151cc334bfbc71b6382bef429981716f1d

                SHA512

                8190a58cced28ee0153cd2bc579914b095527a44a5c88b7b3d43f8bd1ef40e667712446aa3cb613c52abffc8a143212cf4a259e75f2a7c202c68987935d7bdfd

              • C:\Windows\SysWOW64\Kkpnlm32.exe

                Filesize

                80KB

                MD5

                890e15fe86385e4d8f8cc7ed8ca35a38

                SHA1

                296c769094c6c0c663206b9957af5c8afd4ea9e9

                SHA256

                d1ce7dada4a9a15eaa8c161fbfa848e0957d705d9b2c902194339f3a6c1916d4

                SHA512

                c0cce71900634ce04c7658de440ecc0774d5b800e9693601edf8961af5a5a091920a0b14146ec85bf2b6b6caa1d05da25b113a69027f162b28a4dcd4585a0e53

              • C:\Windows\SysWOW64\Kmgdgjek.exe

                Filesize

                80KB

                MD5

                8a3947766436ad46e791305d3f994e4b

                SHA1

                924b3aa89bd4b4488890a6159206ba1f61059163

                SHA256

                ebfc21b49a1b154276ee4ffa5465a40393412ccb810567b701dfe074d748ccd2

                SHA512

                8586b5b1c58f050ff25c48c668527a53a76f72f94a1bf2f9e7ddb82029c90ea2b28fd42d7a4d060734cab69fc32decb20650c94092cbddf38051f4aab0624b7d

              • C:\Windows\SysWOW64\Kmjqmi32.exe

                Filesize

                80KB

                MD5

                aa6dc7c1597bbb8fa48ca015156f22f1

                SHA1

                6f50ab2a327987ea1745a45ad02dea906c011a92

                SHA256

                3fab8e78c762c397b7371524aa2928c6ac6f6573763ab115e4c29119ef96e246

                SHA512

                6b2a6410cec332dbb9ede8131a946469e77cd0c03438befc2371cae626bee7d4521a0743d55a5b70c6822d8e8e238e6164a573233837b8f78482dc25a1817d5c

              • C:\Windows\SysWOW64\Kphmie32.exe

                Filesize

                80KB

                MD5

                db22bca6087f4f6de5c0a58f260687b8

                SHA1

                32bdc3abb7cc4dc062c92a7d70ce557907fe6695

                SHA256

                2f810a763ea967a839fb9d0b60e5ec0a64283dc7660f3124fdae27def2364055

                SHA512

                b0b0faa97902c3338f3b2a455f090277a86cd28fbcb9b304e5058e9f3cb26353e2d76c1ea00e3e1320fd2c4eadf73bdc3e2178124f0baaa6f7bc9e8c66dc20b3

              • C:\Windows\SysWOW64\Kpjjod32.exe

                Filesize

                80KB

                MD5

                e0b22f3cd8424dfd6a2368a5f8630664

                SHA1

                77dfe9c4e52b224ab647a7877398e7b7299f8adb

                SHA256

                891fb41af685cf7320c7c1f7ed075047c8cf5e906e5468cc8e1cd94e9c32c128

                SHA512

                0521a950bc28da46ada047fc10220dc23abe3bb894de47c40de50620127081f810f991c021e51e4a3ba6a0aded59c6bc1860ff6731fce13a87643d0fe5757be9

              • C:\Windows\SysWOW64\Laalifad.exe

                Filesize

                80KB

                MD5

                6f33032e4a7d6c8278a2436b106fc166

                SHA1

                d19df33e53695c05dbcaf5ff635dbd31e2d846bf

                SHA256

                6109e63af979b3c8b2e5187f544b35474733a48ecfded203bfe8e4d0e02c3e45

                SHA512

                02198557b787908e8c149af28e4595c4ac357f9ea55d2c483e1c6950a197909ae53b84d653e13be6efcdcf3e83a092a648238a5358ade4e699786f170cd1e138

              • C:\Windows\SysWOW64\Ldkojb32.exe

                Filesize

                80KB

                MD5

                71d25bb4310a2c35b562322b1ec7b67e

                SHA1

                050a0c3af213c97e70b86fe714a614e2cb926cb5

                SHA256

                68e855e911dec440e3c5fe857d0a37d1910cb2e5d5755e9176128b46180937ea

                SHA512

                b4110d0adfeee39411214084afb71fad65e3441a7163c08a506437e6786fe2595dfb55e6aee9ceaea743a1c1d1a58c470fbb7cb9175d19f23618c9a05193ef99

              • C:\Windows\SysWOW64\Ldmlpbbj.exe

                Filesize

                80KB

                MD5

                8a0a1fc58a3b5cb7485726c32ca3ced4

                SHA1

                5aecd3efe5745df13fe0ae628f9e25331d831f2d

                SHA256

                d736312858034a2e37c986e16e2ad31bf94fff787670902c1a37fa81b8ed95b7

                SHA512

                76baeb36212f6a19aca9df401e1d8064c7a08bf7fe88ab6770b3c4e5927a0df8ba5e305c25b250b0343382f54884cd5528c918c49af79b1626f2d74300d11fd4

              • C:\Windows\SysWOW64\Lgikfn32.exe

                Filesize

                80KB

                MD5

                d556c226b3872970543ca6b8424f5d86

                SHA1

                81fdda34633f22fba32182fb7e4a66b5240e897b

                SHA256

                c4eca5e2b1f379a24be8c8f1c36a42f073752a959cf9acfa3ccc05fa2ef64a44

                SHA512

                9b20ad6ac81cb3f377e2ea18b6427255c725a8d3b9ff8384d3a90e359ea3edd4c94dfea134b61dea29e49cc2cef3763ea40ff3b01829ceb2d4d188b9246403fe

              • C:\Windows\SysWOW64\Lgneampk.exe

                Filesize

                80KB

                MD5

                f0bdec62b42cf178034a030c8a78480f

                SHA1

                c34511153246b4ccc848851f56366bce6ac85b52

                SHA256

                db4f6e0a3722a867478a5c8b3088cf70c3136fdc97c2f4f5ee3a92e1a1ecc4a4

                SHA512

                418220a78ef2677eec31bac463420ef2f081fcc35f5414cf13919873da770d9a1eabe1683d88852ba073c537d410e9c5d26d9408147ddfc1a16a7130ee2cd8aa

              • C:\Windows\SysWOW64\Liggbi32.exe

                Filesize

                80KB

                MD5

                31ad8a3a37edadec07845d86892e885d

                SHA1

                106d7036bd4f8af4b4f0ccc5aca1cf4bd23892da

                SHA256

                a92fc84d7faccdfc356a4940186d2ef19f4c1264e6a1576211ff9165330c1526

                SHA512

                eb479248f63e42608a191307eef693145b745b96cf89af2983089975eec47c6f24c73ed99f9a43d3f517cc017c8bc119f6696290155211f9a7760598c8e99b30

              • C:\Windows\SysWOW64\Lilanioo.exe

                Filesize

                80KB

                MD5

                d04e8a12199d4a9df2e9088876f70331

                SHA1

                e206060d0b66547f50e3e7a0233da3a7ddbfac89

                SHA256

                3b0f32d19e09ae0da4326c5c62b828afed43b9f24fa0c9cabf1b3086ce33a9fa

                SHA512

                ef14cef0608be2a1f4ea6348265e4b47c683df75fbce253828a7de0e8999456bd527e46f7f5bb796b40aead1428db1c5f0f9a7bbd731e8871e78d987a7d8160d

              • C:\Windows\SysWOW64\Lkgdml32.exe

                Filesize

                80KB

                MD5

                18f22bce2725621b7f1600c764b9e821

                SHA1

                747d84b715334a4cc27c325b85488aa93b0f1077

                SHA256

                028f63721b2bef4c735e73fc5b1e9eb12d8c3cc58882afd38953d0174ad7f1c5

                SHA512

                21899733d10889d985fef8e79edfaab7ac7e4df408079ac21f48df2faec6192613e203c49754a8d0e2f5896191d7e9f778025372936f0252429892fb1d4dad94

              • C:\Windows\SysWOW64\Lmqgnhmp.exe

                Filesize

                80KB

                MD5

                44288469c327cf2dfa4c6c9e1886fe3e

                SHA1

                d7480df72e9510784d218658a4f536ed1fe56b8f

                SHA256

                3d203c3fb8e0172dbcb77d2537b3539f58fe91405b9dbb6e0b74aadb74213f33

                SHA512

                e10eec899f87dbca4be8e05a4216679ca4900eb0984a7352aa33492d364ddca9af707aec4e26f6844ecc610c8f09e4173e51ebdc0bad84d280950f44a68f4640

              • C:\Windows\SysWOW64\Lpcmec32.exe

                Filesize

                80KB

                MD5

                9cfa2eb6cec333315267ce07dc5a671a

                SHA1

                96299f488fdb1582ce55d428c9d0a5ba8ba1e0cc

                SHA256

                dd89c8746ca0ef0144e01a405fbbefb3a9fd74c29e4508b1721c6b4f3649a394

                SHA512

                301b341c8da26a2f83a8207514e1c32722f1c87d6f7c7afad461234e466d5c0cda4b8d668f1a4e826dde57c0f59913cd1fa32cf8ef7e33342e19b2efaf1ff9de

              • C:\Windows\SysWOW64\Mdkhapfj.exe

                Filesize

                80KB

                MD5

                72365092f9b0b56ddcfb04eb066e5c17

                SHA1

                5aefa7530ff318a1c58d10419cecead133b4b3c9

                SHA256

                86965a421aaa1952c0dfd6ef29109184a504f1cb9fb99d574cbb19905c1a5268

                SHA512

                0f4e7dbc14fff5d7f3624946b18a29445a50a10dd2bf6075bd54192b33862f924f1a14483ecc27024dd2dd9ef4cb8336a20d83d8adc452da7038901f03399382

              • C:\Windows\SysWOW64\Mgghhlhq.exe

                Filesize

                80KB

                MD5

                2715f1bc2a64e1bb13cb588fa290f9d4

                SHA1

                94adb1854eb89983d77d11255e0739b343a5c250

                SHA256

                f7ea4f244cf7c8039bf3d4087265a886e6b69dab176294777cf91f92807ee414

                SHA512

                bb69656357132660f5d993346a1444394cfda4a5418604684a603feda0c2468eba0bbf999309ed072752635a40a225d64497b344f5cd130362c65ba1091fd6da

              • C:\Windows\SysWOW64\Mpkbebbf.exe

                Filesize

                64KB

                MD5

                703715d6ba33c765a9fe623ff831c890

                SHA1

                917af07f3605f797a5ee587f72e4a57b53b78453

                SHA256

                4ebe0ae0649fbbcfa400d2d523742b01346df632bfd44898d94e1885df80bd41

                SHA512

                79742422bf8608b8dc337c1bbc0e809e99c0aa6e7bf167d266d3c38ba2f0ee70c1b367fb751a30b78c8b17b1080f4a0af0cd32b2e8decb1391eb77b090f6e205

              • C:\Windows\SysWOW64\Nkqpjidj.exe

                Filesize

                80KB

                MD5

                043a6ec6057ff93c68a70754f42b964b

                SHA1

                6f58ea5728c482ca1b25bb6c0e8e746cf91d72a1

                SHA256

                d7d25198fc4ee72961ae21c4e010b983d4767aa52c5cffdebba568a60319a1a2

                SHA512

                cd3f660b7e5f21a5c2a146704df11ba307404d5a7785633c0340931ff234408db1bc177145f3f444702b9276640fcaadf411e9539816eeac53fa6c7c384937dc

              • memory/232-497-0x0000000000400000-0x0000000000433000-memory.dmp

                Filesize

                204KB

              • memory/232-504-0x0000000000400000-0x0000000000433000-memory.dmp

                Filesize

                204KB

              • memory/336-185-0x0000000000400000-0x0000000000433000-memory.dmp

                Filesize

                204KB

              • memory/408-533-0x0000000000400000-0x0000000000433000-memory.dmp

                Filesize

                204KB

              • memory/408-383-0x0000000000400000-0x0000000000433000-memory.dmp

                Filesize

                204KB

              • memory/532-525-0x0000000000400000-0x0000000000433000-memory.dmp

                Filesize

                204KB

              • memory/532-429-0x0000000000400000-0x0000000000433000-memory.dmp

                Filesize

                204KB

              • memory/744-49-0x0000000000400000-0x0000000000433000-memory.dmp

                Filesize

                204KB

              • memory/844-169-0x0000000000400000-0x0000000000433000-memory.dmp

                Filesize

                204KB

              • memory/940-89-0x0000000000400000-0x0000000000433000-memory.dmp

                Filesize

                204KB

              • memory/1036-495-0x0000000000400000-0x0000000000433000-memory.dmp

                Filesize

                204KB

              • memory/1036-506-0x0000000000400000-0x0000000000433000-memory.dmp

                Filesize

                204KB

              • memory/1140-32-0x0000000000400000-0x0000000000433000-memory.dmp

                Filesize

                204KB

              • memory/1172-133-0x0000000000400000-0x0000000000433000-memory.dmp

                Filesize

                204KB

              • memory/1688-121-0x0000000000400000-0x0000000000433000-memory.dmp

                Filesize

                204KB

              • memory/1724-503-0x0000000000400000-0x0000000000433000-memory.dmp

                Filesize

                204KB

              • memory/1724-508-0x0000000000400000-0x0000000000433000-memory.dmp

                Filesize

                204KB

              • memory/1752-24-0x0000000000400000-0x0000000000433000-memory.dmp

                Filesize

                204KB

              • memory/1804-263-0x0000000000400000-0x0000000000433000-memory.dmp

                Filesize

                204KB

              • memory/1808-400-0x0000000000400000-0x0000000000433000-memory.dmp

                Filesize

                204KB

              • memory/1828-411-0x0000000000400000-0x0000000000433000-memory.dmp

                Filesize

                204KB

              • memory/1888-281-0x0000000000400000-0x0000000000433000-memory.dmp

                Filesize

                204KB

              • memory/1964-165-0x0000000000400000-0x0000000000433000-memory.dmp

                Filesize

                204KB

              • memory/2052-193-0x0000000000400000-0x0000000000433000-memory.dmp

                Filesize

                204KB

              • memory/2056-357-0x0000000000400000-0x0000000000433000-memory.dmp

                Filesize

                204KB

              • memory/2128-515-0x0000000000400000-0x0000000000433000-memory.dmp

                Filesize

                204KB

              • memory/2128-467-0x0000000000400000-0x0000000000433000-memory.dmp

                Filesize

                204KB

              • memory/2140-72-0x0000000000400000-0x0000000000433000-memory.dmp

                Filesize

                204KB

              • memory/2172-113-0x0000000000400000-0x0000000000433000-memory.dmp

                Filesize

                204KB

              • memory/2208-311-0x0000000000400000-0x0000000000433000-memory.dmp

                Filesize

                204KB

              • memory/2208-555-0x0000000000400000-0x0000000000433000-memory.dmp

                Filesize

                204KB

              • memory/2256-539-0x0000000000400000-0x0000000000433000-memory.dmp

                Filesize

                204KB

              • memory/2256-365-0x0000000000400000-0x0000000000433000-memory.dmp

                Filesize

                204KB

              • memory/2268-229-0x0000000000400000-0x0000000000433000-memory.dmp

                Filesize

                204KB

              • memory/2300-371-0x0000000000400000-0x0000000000433000-memory.dmp

                Filesize

                204KB

              • memory/2300-537-0x0000000000400000-0x0000000000433000-memory.dmp

                Filesize

                204KB

              • memory/2332-435-0x0000000000400000-0x0000000000433000-memory.dmp

                Filesize

                204KB

              • memory/2384-216-0x0000000000400000-0x0000000000433000-memory.dmp

                Filesize

                204KB

              • memory/2632-177-0x0000000000400000-0x0000000000433000-memory.dmp

                Filesize

                204KB

              • memory/2832-522-0x0000000000400000-0x0000000000433000-memory.dmp

                Filesize

                204KB

              • memory/2832-437-0x0000000000400000-0x0000000000433000-memory.dmp

                Filesize

                204KB

              • memory/2948-275-0x0000000000400000-0x0000000000433000-memory.dmp

                Filesize

                204KB

              • memory/3080-241-0x0000000000400000-0x0000000000433000-memory.dmp

                Filesize

                204KB

              • memory/3092-323-0x0000000000400000-0x0000000000433000-memory.dmp

                Filesize

                204KB

              • memory/3092-551-0x0000000000400000-0x0000000000433000-memory.dmp

                Filesize

                204KB

              • memory/3104-423-0x0000000000400000-0x0000000000433000-memory.dmp

                Filesize

                204KB

              • memory/3108-510-0x0000000000400000-0x0000000000433000-memory.dmp

                Filesize

                204KB

              • memory/3108-485-0x0000000000400000-0x0000000000433000-memory.dmp

                Filesize

                204KB

              • memory/3196-393-0x0000000000400000-0x0000000000433000-memory.dmp

                Filesize

                204KB

              • memory/3200-56-0x0000000000400000-0x0000000000433000-memory.dmp

                Filesize

                204KB

              • memory/3240-80-0x0000000000400000-0x0000000000433000-memory.dmp

                Filesize

                204KB

              • memory/3264-559-0x0000000000400000-0x0000000000433000-memory.dmp

                Filesize

                204KB

              • memory/3264-299-0x0000000000400000-0x0000000000433000-memory.dmp

                Filesize

                204KB

              • memory/3304-479-0x0000000000400000-0x0000000000433000-memory.dmp

                Filesize

                204KB

              • memory/3304-512-0x0000000000400000-0x0000000000433000-memory.dmp

                Filesize

                204KB

              • memory/3328-273-0x0000000000400000-0x0000000000433000-memory.dmp

                Filesize

                204KB

              • memory/3348-41-0x0000000000400000-0x0000000000433000-memory.dmp

                Filesize

                204KB

              • memory/3400-417-0x0000000000400000-0x0000000000433000-memory.dmp

                Filesize

                204KB

              • memory/3480-347-0x0000000000400000-0x0000000000433000-memory.dmp

                Filesize

                204KB

              • memory/3480-543-0x0000000000400000-0x0000000000433000-memory.dmp

                Filesize

                204KB

              • memory/3484-16-0x0000000000400000-0x0000000000433000-memory.dmp

                Filesize

                204KB

              • memory/3496-329-0x0000000000400000-0x0000000000433000-memory.dmp

                Filesize

                204KB

              • memory/3496-549-0x0000000000400000-0x0000000000433000-memory.dmp

                Filesize

                204KB

              • memory/3528-364-0x0000000000400000-0x0000000000433000-memory.dmp

                Filesize

                204KB

              • memory/3736-209-0x0000000000400000-0x0000000000433000-memory.dmp

                Filesize

                204KB

              • memory/3752-449-0x0000000000400000-0x0000000000433000-memory.dmp

                Filesize

                204KB

              • memory/3752-519-0x0000000000400000-0x0000000000433000-memory.dmp

                Filesize

                204KB

              • memory/3972-257-0x0000000000400000-0x0000000000433000-memory.dmp

                Filesize

                204KB

              • memory/4040-317-0x0000000000400000-0x0000000000433000-memory.dmp

                Filesize

                204KB

              • memory/4040-553-0x0000000000400000-0x0000000000433000-memory.dmp

                Filesize

                204KB

              • memory/4056-459-0x0000000000400000-0x0000000000433000-memory.dmp

                Filesize

                204KB

              • memory/4084-153-0x0000000000400000-0x0000000000433000-memory.dmp

                Filesize

                204KB

              • memory/4104-465-0x0000000000400000-0x0000000000433000-memory.dmp

                Filesize

                204KB

              • memory/4180-545-0x0000000000400000-0x0000000000433000-memory.dmp

                Filesize

                204KB

              • memory/4180-341-0x0000000000400000-0x0000000000433000-memory.dmp

                Filesize

                204KB

              • memory/4232-105-0x0000000000400000-0x0000000000433000-memory.dmp

                Filesize

                204KB

              • memory/4272-249-0x0000000000400000-0x0000000000433000-memory.dmp

                Filesize

                204KB

              • memory/4328-136-0x0000000000400000-0x0000000000433000-memory.dmp

                Filesize

                204KB

              • memory/4388-145-0x0000000000400000-0x0000000000433000-memory.dmp

                Filesize

                204KB

              • memory/4476-287-0x0000000000400000-0x0000000000433000-memory.dmp

                Filesize

                204KB

              • memory/4480-201-0x0000000000400000-0x0000000000433000-memory.dmp

                Filesize

                204KB

              • memory/4524-477-0x0000000000400000-0x0000000000433000-memory.dmp

                Filesize

                204KB

              • memory/4572-405-0x0000000000400000-0x0000000000433000-memory.dmp

                Filesize

                204KB

              • memory/4652-447-0x0000000000400000-0x0000000000433000-memory.dmp

                Filesize

                204KB

              • memory/4672-65-0x0000000000400000-0x0000000000433000-memory.dmp

                Filesize

                204KB

              • memory/4676-96-0x0000000000400000-0x0000000000433000-memory.dmp

                Filesize

                204KB

              • memory/4680-547-0x0000000000400000-0x0000000000433000-memory.dmp

                Filesize

                204KB

              • memory/4680-335-0x0000000000400000-0x0000000000433000-memory.dmp

                Filesize

                204KB

              • memory/4716-237-0x0000000000400000-0x0000000000433000-memory.dmp

                Filesize

                204KB

              • memory/4748-9-0x0000000000400000-0x0000000000433000-memory.dmp

                Filesize

                204KB

              • memory/4816-535-0x0000000000400000-0x0000000000433000-memory.dmp

                Filesize

                204KB

              • memory/4816-377-0x0000000000400000-0x0000000000433000-memory.dmp

                Filesize

                204KB

              • memory/4908-0-0x0000000000400000-0x0000000000433000-memory.dmp

                Filesize

                204KB

              • memory/4908-5-0x0000000000431000-0x0000000000432000-memory.dmp

                Filesize

                4KB

              • memory/4968-557-0x0000000000400000-0x0000000000433000-memory.dmp

                Filesize

                204KB

              • memory/4968-305-0x0000000000400000-0x0000000000433000-memory.dmp

                Filesize

                204KB

              • memory/5060-297-0x0000000000400000-0x0000000000433000-memory.dmp

                Filesize

                204KB