Analysis

  • max time kernel
    97s
  • max time network
    131s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240508-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system
  • submitted
    14/05/2024, 14:02

General

  • Target

    c98c0a16d46ddc9742c5c0b4027ff790_NeikiAnalytics.exe

  • Size

    337KB

  • MD5

    c98c0a16d46ddc9742c5c0b4027ff790

  • SHA1

    07530ab8ddbee716cb37e4bfdd6c50239e1397f3

  • SHA256

    c5a922c26d473f488f96f1c751298bbe952254918f5cfde54bd4f9c5557a1688

  • SHA512

    4b6e2353c8fecc8886e9c74051b79d38df85fc5100744a82ba9f1c93fba55e1fd7d8662d7ec07ee23818511c99f5bb370c363bfd4c22cca443052d3da315c81d

  • SSDEEP

    3072:90kzGtZ4v4wKnFE5ygYfc0DV+1BIyLK5jZWlfXXqyYwi8x4Yfc09:9VitZp7nFEy1+fIyG5jZkCwi8r

Malware Config

Signatures

  • Adds autorun key to be loaded by Explorer.exe on startup 2 TTPs 64 IoCs
  • njRAT/Bladabindi

    Widely used RAT written in .NET.

  • Executes dropped EXE 64 IoCs
  • Drops file in System32 directory 64 IoCs
  • Program crash 1 IoCs
  • Modifies registry class 64 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\c98c0a16d46ddc9742c5c0b4027ff790_NeikiAnalytics.exe
    "C:\Users\Admin\AppData\Local\Temp\c98c0a16d46ddc9742c5c0b4027ff790_NeikiAnalytics.exe"
    1⤵
    • Drops file in System32 directory
    • Modifies registry class
    • Suspicious use of WriteProcessMemory
    PID:3176
    • C:\Windows\SysWOW64\Gmhfhp32.exe
      C:\Windows\system32\Gmhfhp32.exe
      2⤵
      • Adds autorun key to be loaded by Explorer.exe on startup
      • Executes dropped EXE
      • Drops file in System32 directory
      • Modifies registry class
      • Suspicious use of WriteProcessMemory
      PID:4372
      • C:\Windows\SysWOW64\Gogbdl32.exe
        C:\Windows\system32\Gogbdl32.exe
        3⤵
        • Adds autorun key to be loaded by Explorer.exe on startup
        • Executes dropped EXE
        • Drops file in System32 directory
        • Modifies registry class
        • Suspicious use of WriteProcessMemory
        PID:3356
        • C:\Windows\SysWOW64\Gbenqg32.exe
          C:\Windows\system32\Gbenqg32.exe
          4⤵
          • Adds autorun key to be loaded by Explorer.exe on startup
          • Executes dropped EXE
          • Modifies registry class
          • Suspicious use of WriteProcessMemory
          PID:3208
          • C:\Windows\SysWOW64\Giacca32.exe
            C:\Windows\system32\Giacca32.exe
            5⤵
            • Adds autorun key to be loaded by Explorer.exe on startup
            • Executes dropped EXE
            • Drops file in System32 directory
            • Modifies registry class
            • Suspicious use of WriteProcessMemory
            PID:3904
            • C:\Windows\SysWOW64\Gpklpkio.exe
              C:\Windows\system32\Gpklpkio.exe
              6⤵
              • Executes dropped EXE
              • Modifies registry class
              • Suspicious use of WriteProcessMemory
              PID:1724
              • C:\Windows\SysWOW64\Gfhqbe32.exe
                C:\Windows\system32\Gfhqbe32.exe
                7⤵
                • Executes dropped EXE
                • Modifies registry class
                • Suspicious use of WriteProcessMemory
                PID:1012
                • C:\Windows\SysWOW64\Gmaioo32.exe
                  C:\Windows\system32\Gmaioo32.exe
                  8⤵
                  • Adds autorun key to be loaded by Explorer.exe on startup
                  • Executes dropped EXE
                  • Suspicious use of WriteProcessMemory
                  PID:1984
                  • C:\Windows\SysWOW64\Hmdedo32.exe
                    C:\Windows\system32\Hmdedo32.exe
                    9⤵
                    • Executes dropped EXE
                    • Modifies registry class
                    • Suspicious use of WriteProcessMemory
                    PID:4688
                    • C:\Windows\SysWOW64\Hcnnaikp.exe
                      C:\Windows\system32\Hcnnaikp.exe
                      10⤵
                      • Executes dropped EXE
                      • Drops file in System32 directory
                      • Modifies registry class
                      • Suspicious use of WriteProcessMemory
                      PID:4976
                      • C:\Windows\SysWOW64\Hjhfnccl.exe
                        C:\Windows\system32\Hjhfnccl.exe
                        11⤵
                        • Adds autorun key to be loaded by Explorer.exe on startup
                        • Executes dropped EXE
                        • Drops file in System32 directory
                        • Suspicious use of WriteProcessMemory
                        PID:2124
                        • C:\Windows\SysWOW64\Habnjm32.exe
                          C:\Windows\system32\Habnjm32.exe
                          12⤵
                          • Adds autorun key to be loaded by Explorer.exe on startup
                          • Executes dropped EXE
                          • Drops file in System32 directory
                          • Suspicious use of WriteProcessMemory
                          PID:1584
                          • C:\Windows\SysWOW64\Hfachc32.exe
                            C:\Windows\system32\Hfachc32.exe
                            13⤵
                            • Adds autorun key to be loaded by Explorer.exe on startup
                            • Executes dropped EXE
                            • Drops file in System32 directory
                            • Modifies registry class
                            • Suspicious use of WriteProcessMemory
                            PID:4904
                            • C:\Windows\SysWOW64\Hippdo32.exe
                              C:\Windows\system32\Hippdo32.exe
                              14⤵
                              • Adds autorun key to be loaded by Explorer.exe on startup
                              • Executes dropped EXE
                              • Drops file in System32 directory
                              • Modifies registry class
                              • Suspicious use of WriteProcessMemory
                              PID:1176
                              • C:\Windows\SysWOW64\Ipldfi32.exe
                                C:\Windows\system32\Ipldfi32.exe
                                15⤵
                                • Executes dropped EXE
                                • Modifies registry class
                                • Suspicious use of WriteProcessMemory
                                PID:3416
                                • C:\Windows\SysWOW64\Iffmccbi.exe
                                  C:\Windows\system32\Iffmccbi.exe
                                  16⤵
                                  • Adds autorun key to be loaded by Explorer.exe on startup
                                  • Executes dropped EXE
                                  • Drops file in System32 directory
                                  • Modifies registry class
                                  • Suspicious use of WriteProcessMemory
                                  PID:2812
                                  • C:\Windows\SysWOW64\Ijdeiaio.exe
                                    C:\Windows\system32\Ijdeiaio.exe
                                    17⤵
                                    • Adds autorun key to be loaded by Explorer.exe on startup
                                    • Executes dropped EXE
                                    • Drops file in System32 directory
                                    • Modifies registry class
                                    • Suspicious use of WriteProcessMemory
                                    PID:764
                                    • C:\Windows\SysWOW64\Ifjfnb32.exe
                                      C:\Windows\system32\Ifjfnb32.exe
                                      18⤵
                                      • Adds autorun key to be loaded by Explorer.exe on startup
                                      • Executes dropped EXE
                                      • Drops file in System32 directory
                                      • Modifies registry class
                                      • Suspicious use of WriteProcessMemory
                                      PID:3544
                                      • C:\Windows\SysWOW64\Ibagcc32.exe
                                        C:\Windows\system32\Ibagcc32.exe
                                        19⤵
                                        • Executes dropped EXE
                                        • Drops file in System32 directory
                                        • Modifies registry class
                                        • Suspicious use of WriteProcessMemory
                                        PID:3088
                                        • C:\Windows\SysWOW64\Idacmfkj.exe
                                          C:\Windows\system32\Idacmfkj.exe
                                          20⤵
                                          • Executes dropped EXE
                                          • Drops file in System32 directory
                                          • Suspicious use of WriteProcessMemory
                                          PID:3900
                                          • C:\Windows\SysWOW64\Iinlemia.exe
                                            C:\Windows\system32\Iinlemia.exe
                                            21⤵
                                            • Adds autorun key to be loaded by Explorer.exe on startup
                                            • Executes dropped EXE
                                            • Drops file in System32 directory
                                            • Suspicious use of WriteProcessMemory
                                            PID:2608
                                            • C:\Windows\SysWOW64\Jbfpobpb.exe
                                              C:\Windows\system32\Jbfpobpb.exe
                                              22⤵
                                              • Executes dropped EXE
                                              • Suspicious use of WriteProcessMemory
                                              PID:692
                                              • C:\Windows\SysWOW64\Jpjqhgol.exe
                                                C:\Windows\system32\Jpjqhgol.exe
                                                23⤵
                                                • Adds autorun key to be loaded by Explorer.exe on startup
                                                • Executes dropped EXE
                                                • Drops file in System32 directory
                                                PID:312
                                                • C:\Windows\SysWOW64\Jmnaakne.exe
                                                  C:\Windows\system32\Jmnaakne.exe
                                                  24⤵
                                                  • Executes dropped EXE
                                                  PID:2948
                                                  • C:\Windows\SysWOW64\Jbkjjblm.exe
                                                    C:\Windows\system32\Jbkjjblm.exe
                                                    25⤵
                                                    • Adds autorun key to be loaded by Explorer.exe on startup
                                                    • Executes dropped EXE
                                                    • Modifies registry class
                                                    PID:1612
                                                    • C:\Windows\SysWOW64\Jpojcf32.exe
                                                      C:\Windows\system32\Jpojcf32.exe
                                                      26⤵
                                                      • Executes dropped EXE
                                                      • Drops file in System32 directory
                                                      PID:4956
                                                      • C:\Windows\SysWOW64\Jfhbppbc.exe
                                                        C:\Windows\system32\Jfhbppbc.exe
                                                        27⤵
                                                        • Adds autorun key to be loaded by Explorer.exe on startup
                                                        • Executes dropped EXE
                                                        • Drops file in System32 directory
                                                        PID:2360
                                                        • C:\Windows\SysWOW64\Jdmcidam.exe
                                                          C:\Windows\system32\Jdmcidam.exe
                                                          28⤵
                                                          • Adds autorun key to be loaded by Explorer.exe on startup
                                                          • Executes dropped EXE
                                                          • Modifies registry class
                                                          PID:2892
                                                          • C:\Windows\SysWOW64\Kmegbjgn.exe
                                                            C:\Windows\system32\Kmegbjgn.exe
                                                            29⤵
                                                            • Executes dropped EXE
                                                            • Drops file in System32 directory
                                                            • Modifies registry class
                                                            PID:5004
                                                            • C:\Windows\SysWOW64\Kdopod32.exe
                                                              C:\Windows\system32\Kdopod32.exe
                                                              30⤵
                                                              • Adds autorun key to be loaded by Explorer.exe on startup
                                                              • Executes dropped EXE
                                                              • Drops file in System32 directory
                                                              • Modifies registry class
                                                              PID:4332
                                                              • C:\Windows\SysWOW64\Kilhgk32.exe
                                                                C:\Windows\system32\Kilhgk32.exe
                                                                31⤵
                                                                • Executes dropped EXE
                                                                • Drops file in System32 directory
                                                                • Modifies registry class
                                                                PID:4576
                                                                • C:\Windows\SysWOW64\Kaemnhla.exe
                                                                  C:\Windows\system32\Kaemnhla.exe
                                                                  32⤵
                                                                  • Executes dropped EXE
                                                                  • Drops file in System32 directory
                                                                  • Modifies registry class
                                                                  PID:1776
                                                                  • C:\Windows\SysWOW64\Kbfiep32.exe
                                                                    C:\Windows\system32\Kbfiep32.exe
                                                                    33⤵
                                                                    • Adds autorun key to be loaded by Explorer.exe on startup
                                                                    • Executes dropped EXE
                                                                    PID:4040
                                                                    • C:\Windows\SysWOW64\Kmlnbi32.exe
                                                                      C:\Windows\system32\Kmlnbi32.exe
                                                                      34⤵
                                                                      • Adds autorun key to be loaded by Explorer.exe on startup
                                                                      • Executes dropped EXE
                                                                      • Drops file in System32 directory
                                                                      • Modifies registry class
                                                                      PID:4744
                                                                      • C:\Windows\SysWOW64\Kgdbkohf.exe
                                                                        C:\Windows\system32\Kgdbkohf.exe
                                                                        35⤵
                                                                        • Adds autorun key to be loaded by Explorer.exe on startup
                                                                        • Executes dropped EXE
                                                                        • Drops file in System32 directory
                                                                        PID:2304
                                                                        • C:\Windows\SysWOW64\Kajfig32.exe
                                                                          C:\Windows\system32\Kajfig32.exe
                                                                          36⤵
                                                                          • Adds autorun key to be loaded by Explorer.exe on startup
                                                                          • Executes dropped EXE
                                                                          PID:4424
                                                                          • C:\Windows\SysWOW64\Kkbkamnl.exe
                                                                            C:\Windows\system32\Kkbkamnl.exe
                                                                            37⤵
                                                                            • Adds autorun key to be loaded by Explorer.exe on startup
                                                                            • Executes dropped EXE
                                                                            • Drops file in System32 directory
                                                                            PID:1460
                                                                            • C:\Windows\SysWOW64\Lpocjdld.exe
                                                                              C:\Windows\system32\Lpocjdld.exe
                                                                              38⤵
                                                                              • Adds autorun key to be loaded by Explorer.exe on startup
                                                                              • Executes dropped EXE
                                                                              PID:3688
                                                                              • C:\Windows\SysWOW64\Lgikfn32.exe
                                                                                C:\Windows\system32\Lgikfn32.exe
                                                                                39⤵
                                                                                • Executes dropped EXE
                                                                                • Drops file in System32 directory
                                                                                • Modifies registry class
                                                                                PID:1636
                                                                                • C:\Windows\SysWOW64\Liggbi32.exe
                                                                                  C:\Windows\system32\Liggbi32.exe
                                                                                  40⤵
                                                                                  • Adds autorun key to be loaded by Explorer.exe on startup
                                                                                  • Executes dropped EXE
                                                                                  PID:1356
                                                                                  • C:\Windows\SysWOW64\Lcpllo32.exe
                                                                                    C:\Windows\system32\Lcpllo32.exe
                                                                                    41⤵
                                                                                    • Executes dropped EXE
                                                                                    • Modifies registry class
                                                                                    PID:2224
                                                                                    • C:\Windows\SysWOW64\Lnepih32.exe
                                                                                      C:\Windows\system32\Lnepih32.exe
                                                                                      42⤵
                                                                                      • Executes dropped EXE
                                                                                      • Modifies registry class
                                                                                      PID:1744
                                                                                      • C:\Windows\SysWOW64\Lpcmec32.exe
                                                                                        C:\Windows\system32\Lpcmec32.exe
                                                                                        43⤵
                                                                                        • Adds autorun key to be loaded by Explorer.exe on startup
                                                                                        • Executes dropped EXE
                                                                                        • Drops file in System32 directory
                                                                                        • Modifies registry class
                                                                                        PID:3684
                                                                                        • C:\Windows\SysWOW64\Lgneampk.exe
                                                                                          C:\Windows\system32\Lgneampk.exe
                                                                                          44⤵
                                                                                          • Adds autorun key to be loaded by Explorer.exe on startup
                                                                                          • Executes dropped EXE
                                                                                          • Drops file in System32 directory
                                                                                          PID:3528
                                                                                          • C:\Windows\SysWOW64\Lnhmng32.exe
                                                                                            C:\Windows\system32\Lnhmng32.exe
                                                                                            45⤵
                                                                                            • Adds autorun key to be loaded by Explorer.exe on startup
                                                                                            • Executes dropped EXE
                                                                                            • Drops file in System32 directory
                                                                                            PID:3280
                                                                                            • C:\Windows\SysWOW64\Ldaeka32.exe
                                                                                              C:\Windows\system32\Ldaeka32.exe
                                                                                              46⤵
                                                                                              • Adds autorun key to be loaded by Explorer.exe on startup
                                                                                              • Executes dropped EXE
                                                                                              • Drops file in System32 directory
                                                                                              • Modifies registry class
                                                                                              PID:4636
                                                                                              • C:\Windows\SysWOW64\Lgpagm32.exe
                                                                                                C:\Windows\system32\Lgpagm32.exe
                                                                                                47⤵
                                                                                                • Adds autorun key to be loaded by Explorer.exe on startup
                                                                                                • Executes dropped EXE
                                                                                                • Drops file in System32 directory
                                                                                                PID:3724
                                                                                                • C:\Windows\SysWOW64\Laefdf32.exe
                                                                                                  C:\Windows\system32\Laefdf32.exe
                                                                                                  48⤵
                                                                                                  • Adds autorun key to be loaded by Explorer.exe on startup
                                                                                                  • Executes dropped EXE
                                                                                                  • Drops file in System32 directory
                                                                                                  PID:1216
                                                                                                  • C:\Windows\SysWOW64\Lcgblncm.exe
                                                                                                    C:\Windows\system32\Lcgblncm.exe
                                                                                                    49⤵
                                                                                                    • Executes dropped EXE
                                                                                                    • Drops file in System32 directory
                                                                                                    • Modifies registry class
                                                                                                    PID:4436
                                                                                                    • C:\Windows\SysWOW64\Mnlfigcc.exe
                                                                                                      C:\Windows\system32\Mnlfigcc.exe
                                                                                                      50⤵
                                                                                                      • Executes dropped EXE
                                                                                                      • Drops file in System32 directory
                                                                                                      • Modifies registry class
                                                                                                      PID:3104
                                                                                                      • C:\Windows\SysWOW64\Mdfofakp.exe
                                                                                                        C:\Windows\system32\Mdfofakp.exe
                                                                                                        51⤵
                                                                                                        • Adds autorun key to be loaded by Explorer.exe on startup
                                                                                                        • Executes dropped EXE
                                                                                                        • Drops file in System32 directory
                                                                                                        • Modifies registry class
                                                                                                        PID:4516
                                                                                                        • C:\Windows\SysWOW64\Mgekbljc.exe
                                                                                                          C:\Windows\system32\Mgekbljc.exe
                                                                                                          52⤵
                                                                                                          • Adds autorun key to be loaded by Explorer.exe on startup
                                                                                                          • Executes dropped EXE
                                                                                                          • Modifies registry class
                                                                                                          PID:880
                                                                                                          • C:\Windows\SysWOW64\Majopeii.exe
                                                                                                            C:\Windows\system32\Majopeii.exe
                                                                                                            53⤵
                                                                                                            • Adds autorun key to be loaded by Explorer.exe on startup
                                                                                                            • Executes dropped EXE
                                                                                                            • Drops file in System32 directory
                                                                                                            PID:2764
                                                                                                            • C:\Windows\SysWOW64\Mdiklqhm.exe
                                                                                                              C:\Windows\system32\Mdiklqhm.exe
                                                                                                              54⤵
                                                                                                              • Adds autorun key to be loaded by Explorer.exe on startup
                                                                                                              • Executes dropped EXE
                                                                                                              • Modifies registry class
                                                                                                              PID:672
                                                                                                              • C:\Windows\SysWOW64\Mgghhlhq.exe
                                                                                                                C:\Windows\system32\Mgghhlhq.exe
                                                                                                                55⤵
                                                                                                                • Adds autorun key to be loaded by Explorer.exe on startup
                                                                                                                • Executes dropped EXE
                                                                                                                PID:1948
                                                                                                                • C:\Windows\SysWOW64\Mnapdf32.exe
                                                                                                                  C:\Windows\system32\Mnapdf32.exe
                                                                                                                  56⤵
                                                                                                                  • Adds autorun key to be loaded by Explorer.exe on startup
                                                                                                                  • Executes dropped EXE
                                                                                                                  • Drops file in System32 directory
                                                                                                                  • Modifies registry class
                                                                                                                  PID:4208
                                                                                                                  • C:\Windows\SysWOW64\Mdkhapfj.exe
                                                                                                                    C:\Windows\system32\Mdkhapfj.exe
                                                                                                                    57⤵
                                                                                                                    • Adds autorun key to be loaded by Explorer.exe on startup
                                                                                                                    • Executes dropped EXE
                                                                                                                    PID:4620
                                                                                                                    • C:\Windows\SysWOW64\Mjhqjg32.exe
                                                                                                                      C:\Windows\system32\Mjhqjg32.exe
                                                                                                                      58⤵
                                                                                                                      • Adds autorun key to be loaded by Explorer.exe on startup
                                                                                                                      • Executes dropped EXE
                                                                                                                      • Drops file in System32 directory
                                                                                                                      PID:2288
                                                                                                                      • C:\Windows\SysWOW64\Mdmegp32.exe
                                                                                                                        C:\Windows\system32\Mdmegp32.exe
                                                                                                                        59⤵
                                                                                                                        • Adds autorun key to be loaded by Explorer.exe on startup
                                                                                                                        • Executes dropped EXE
                                                                                                                        • Drops file in System32 directory
                                                                                                                        PID:4448
                                                                                                                        • C:\Windows\SysWOW64\Mglack32.exe
                                                                                                                          C:\Windows\system32\Mglack32.exe
                                                                                                                          60⤵
                                                                                                                          • Adds autorun key to be loaded by Explorer.exe on startup
                                                                                                                          • Executes dropped EXE
                                                                                                                          • Drops file in System32 directory
                                                                                                                          • Modifies registry class
                                                                                                                          PID:3116
                                                                                                                          • C:\Windows\SysWOW64\Mjjmog32.exe
                                                                                                                            C:\Windows\system32\Mjjmog32.exe
                                                                                                                            61⤵
                                                                                                                            • Adds autorun key to be loaded by Explorer.exe on startup
                                                                                                                            • Executes dropped EXE
                                                                                                                            • Modifies registry class
                                                                                                                            PID:4748
                                                                                                                            • C:\Windows\SysWOW64\Maaepd32.exe
                                                                                                                              C:\Windows\system32\Maaepd32.exe
                                                                                                                              62⤵
                                                                                                                              • Adds autorun key to be loaded by Explorer.exe on startup
                                                                                                                              • Executes dropped EXE
                                                                                                                              • Modifies registry class
                                                                                                                              PID:4832
                                                                                                                              • C:\Windows\SysWOW64\Mgnnhk32.exe
                                                                                                                                C:\Windows\system32\Mgnnhk32.exe
                                                                                                                                63⤵
                                                                                                                                • Executes dropped EXE
                                                                                                                                • Drops file in System32 directory
                                                                                                                                • Modifies registry class
                                                                                                                                PID:1320
                                                                                                                                • C:\Windows\SysWOW64\Nnhfee32.exe
                                                                                                                                  C:\Windows\system32\Nnhfee32.exe
                                                                                                                                  64⤵
                                                                                                                                  • Adds autorun key to be loaded by Explorer.exe on startup
                                                                                                                                  • Executes dropped EXE
                                                                                                                                  • Drops file in System32 directory
                                                                                                                                  • Modifies registry class
                                                                                                                                  PID:2324
                                                                                                                                  • C:\Windows\SysWOW64\Ngpjnkpf.exe
                                                                                                                                    C:\Windows\system32\Ngpjnkpf.exe
                                                                                                                                    65⤵
                                                                                                                                    • Adds autorun key to be loaded by Explorer.exe on startup
                                                                                                                                    • Executes dropped EXE
                                                                                                                                    • Drops file in System32 directory
                                                                                                                                    • Modifies registry class
                                                                                                                                    PID:2864
                                                                                                                                    • C:\Windows\SysWOW64\Njogjfoj.exe
                                                                                                                                      C:\Windows\system32\Njogjfoj.exe
                                                                                                                                      66⤵
                                                                                                                                      • Modifies registry class
                                                                                                                                      PID:2344
                                                                                                                                      • C:\Windows\SysWOW64\Nafokcol.exe
                                                                                                                                        C:\Windows\system32\Nafokcol.exe
                                                                                                                                        67⤵
                                                                                                                                        • Adds autorun key to be loaded by Explorer.exe on startup
                                                                                                                                        • Drops file in System32 directory
                                                                                                                                        PID:3580
                                                                                                                                        • C:\Windows\SysWOW64\Ngcgcjnc.exe
                                                                                                                                          C:\Windows\system32\Ngcgcjnc.exe
                                                                                                                                          68⤵
                                                                                                                                          • Adds autorun key to be loaded by Explorer.exe on startup
                                                                                                                                          • Drops file in System32 directory
                                                                                                                                          • Modifies registry class
                                                                                                                                          PID:4532
                                                                                                                                          • C:\Windows\SysWOW64\Nbhkac32.exe
                                                                                                                                            C:\Windows\system32\Nbhkac32.exe
                                                                                                                                            69⤵
                                                                                                                                            • Adds autorun key to be loaded by Explorer.exe on startup
                                                                                                                                            • Drops file in System32 directory
                                                                                                                                            • Modifies registry class
                                                                                                                                            PID:4356
                                                                                                                                            • C:\Windows\SysWOW64\Ndghmo32.exe
                                                                                                                                              C:\Windows\system32\Ndghmo32.exe
                                                                                                                                              70⤵
                                                                                                                                              • Adds autorun key to be loaded by Explorer.exe on startup
                                                                                                                                              • Drops file in System32 directory
                                                                                                                                              PID:2280
                                                                                                                                              • C:\Windows\SysWOW64\Njcpee32.exe
                                                                                                                                                C:\Windows\system32\Njcpee32.exe
                                                                                                                                                71⤵
                                                                                                                                                • Adds autorun key to be loaded by Explorer.exe on startup
                                                                                                                                                • Drops file in System32 directory
                                                                                                                                                PID:3940
                                                                                                                                                • C:\Windows\SysWOW64\Ncldnkae.exe
                                                                                                                                                  C:\Windows\system32\Ncldnkae.exe
                                                                                                                                                  72⤵
                                                                                                                                                  • Adds autorun key to be loaded by Explorer.exe on startup
                                                                                                                                                  • Drops file in System32 directory
                                                                                                                                                  • Modifies registry class
                                                                                                                                                  PID:1028
                                                                                                                                                  • C:\Windows\SysWOW64\Nkcmohbg.exe
                                                                                                                                                    C:\Windows\system32\Nkcmohbg.exe
                                                                                                                                                    73⤵
                                                                                                                                                      PID:5000
                                                                                                                                                      • C:\Windows\SysWOW64\WerFault.exe
                                                                                                                                                        C:\Windows\SysWOW64\WerFault.exe -u -p 5000 -s 400
                                                                                                                                                        74⤵
                                                                                                                                                        • Program crash
                                                                                                                                                        PID:2900
    • C:\Windows\SysWOW64\WerFault.exe
      C:\Windows\SysWOW64\WerFault.exe -pss -s 416 -p 5000 -ip 5000
      1⤵
        PID:4212

      Network

            MITRE ATT&CK Enterprise v15

            Replay Monitor

            Loading Replay Monitor...

            Downloads

            • C:\Windows\SysWOW64\Gbenqg32.exe

              Filesize

              337KB

              MD5

              0081c5f2f19b6b65ff4a691dc604a906

              SHA1

              0f84adcfad139ace416b8e45aa8e8488f42dc5e4

              SHA256

              8b52b62c2cabd4cad41d8fb296610d9c8d7b56acebd1fdfef519622739a2a5ee

              SHA512

              7b036181ad9e941b40fdd2c8dc35d9fd96a474f40a8fd9a5286ec6639637019e31b25c18e729e51da4405786ce55b34c5f8c0c0dcecbbe96273e8a78c53515a1

            • C:\Windows\SysWOW64\Gfhqbe32.exe

              Filesize

              337KB

              MD5

              540b6a961eb93b539f385df93703e317

              SHA1

              268853ffc2af5ca9e9399499ff4936828ff03b7f

              SHA256

              429f54a4a707b527c37fbe302cb826bb0d3df0828f8bc09eb0bbbed5e79eea2e

              SHA512

              e2fd036ede203a97029bf43e02176a2d16a91d8bf1afd47137eb7d9fe6f536d3cb437f7c120ef9ce909485bdf4e8fb49ecc5f7f563330253f524050946afce93

            • C:\Windows\SysWOW64\Giacca32.exe

              Filesize

              337KB

              MD5

              ae0e7760bca009f1372c0d4ea75959fc

              SHA1

              28b40c72ce5c3d22687e6268ad36eff6325ddd58

              SHA256

              72c66f0c4e782731a9c7102c1d984dce35279571c5aa10cbae9027d1a18a0d4d

              SHA512

              c18a7767b851cb602da17a021497bab923b14fe73e2b9ce93d2d2c6f323939a70e6a6294a7706a5a7b5fd0ccfa6c6f7e4c72892d022579fc83052ef54425a341

            • C:\Windows\SysWOW64\Gmaioo32.exe

              Filesize

              337KB

              MD5

              66a597cb5fccad96e79c8bb124794e88

              SHA1

              18b4369cc68ce1f5b8c249f3322b9876d5a931c9

              SHA256

              4fd187fceb066c3a3a3f8484d88e03fd952cb7da2012ff2e5d10684aa5dc7ce7

              SHA512

              e62bdc24de1c4920823fc89566e05602e5b674305aa1c0f7390a68d2df5084334c3bfc07c5e2e981af180b3891a78854dfa21e5f9cd5a0eeddf6f75030a7b717

            • C:\Windows\SysWOW64\Gmhfhp32.exe

              Filesize

              337KB

              MD5

              468f5d00107d266fae89eb8cec0058ee

              SHA1

              6c6cec6a44dbaedbbc8d2d335b046eaef92f9c9c

              SHA256

              4103cd2584f5d469224c2f33a844f0c2df030ddb7291dfecaf2eaa50a51daf51

              SHA512

              6158d2bd30e34334fe4ce4982821d7aefb22c7b61fc544a58f3eb925d79fad097d30b80f39349fb256d437d1b215e253c47f74e9843047835f1dc95e2e711465

            • C:\Windows\SysWOW64\Gogbdl32.exe

              Filesize

              337KB

              MD5

              2652b83c1593b47d6bcff79481314c5c

              SHA1

              b20fb1bce11d90770a579f259cf4317fa57c035a

              SHA256

              9ada956eb102ea59105675f34bfab275a31c2d6ba1e30f18422b65c7022b18bc

              SHA512

              df1f7990e7002190e514cf8bc5084261b7e60059ff8763bf8b3585d0155bffbe1e0cd74802a357443767e29281d2feabeb9a2932ab17b3b9ea6051f7b3e5e56e

            • C:\Windows\SysWOW64\Gpklpkio.exe

              Filesize

              337KB

              MD5

              de10f0169db4ae7f75ff07f50e08d9ae

              SHA1

              da640a63cfbc1969bf1bd0b23bc296fe961265a3

              SHA256

              3f0a2e8a9d3a08a608d8c95c913f865d6f2c9304c31122363e946ebf763b71b9

              SHA512

              0afb616bc3f5eaed9256ac2bc121cc790f162b103d55f04eb91546ae637487d2a8399e236947d0cd406f364ec48aab3911c8dc8d1e5952fead669b3d61954520

            • C:\Windows\SysWOW64\Habnjm32.exe

              Filesize

              337KB

              MD5

              2259fd5de7d20b2a786ea4b67fcd4b7b

              SHA1

              7daa58ed4c59596e0bcec102be7fd442cb89d339

              SHA256

              1f868f20b983243003abce2df973944fd541a2998bf5184a117ea3f0679db28d

              SHA512

              42cee53c08a664c14e335bed8b415203fbf7c723efc01fc9d2003f6532ffa8ccc6fe16168d557900114113b24be6d589ca89d66b2291ae5ec73740ad144a016d

            • C:\Windows\SysWOW64\Hcnnaikp.exe

              Filesize

              337KB

              MD5

              6c2d63e36597c55bdfffa1efd5713727

              SHA1

              dcdab60dddedccde0a31c89bf80c764e01f5a826

              SHA256

              6ffb15a9383b80432b13e6953e3c755d0cea3c3f8ab6ffc25a0459b02c3f800c

              SHA512

              83fa98133db039b5e96bfeac5477ee33b757d30f9784b9c60ebf9df84c45e6fed3c95abf99bbdecd3cf604026ca8ed9624c05d5aaa3ec7997e86d00760f2184f

            • C:\Windows\SysWOW64\Hfachc32.exe

              Filesize

              337KB

              MD5

              d1e766c97ca723d81572e92c271df034

              SHA1

              9fdb5bba3deebe5d8edcb519f5f0097c4eb88af2

              SHA256

              3988d5b65a674f91dbd6ca00b98b75abd86edf9dd4dffb943530824752d9f774

              SHA512

              1f24926de31e58418a0af962b3eaf99c93cc4aab8aae2da159e0ef41d888ec64046ab91186c63698bc7da3e261d0e47555ba6058d8c050cf1088f06b0355ba14

            • C:\Windows\SysWOW64\Hippdo32.exe

              Filesize

              337KB

              MD5

              5ca6e173f6c829af50b119146c3b4118

              SHA1

              8f8716099370c204ee78f10d3329f4cedc66ef7c

              SHA256

              fabe51273f5a0e96a13456ff42aaec9d582c21670fd1a332ec1f37073002183b

              SHA512

              62928c2ba086764a9aa31920b7119102366ce640e958f987706e387c021461861a319bbd34fc69bb33ad6d38450041b067d674a3db4830f59b45475e6daf4f0f

            • C:\Windows\SysWOW64\Hjhfnccl.exe

              Filesize

              337KB

              MD5

              bc06b3194b5239c7d37a9c03a1cd2f0a

              SHA1

              55591ec9e165e69176a1b29905b74eeeadad4b22

              SHA256

              3d4b2fdaaa38782f55faa3d6dbdc7ca28f9cce0ecc1b6e35f4914d3b453f2866

              SHA512

              d3dfdbbd267bb965e7be2492031c850441453cc1498f4991919b0bd68cf242b6ff9a06c5f3cbe004ffc77da35defdca57f6b212732e62c325ef0babb09e786b1

            • C:\Windows\SysWOW64\Hmdedo32.exe

              Filesize

              337KB

              MD5

              4868d62c798e68d725c0bac9a2482441

              SHA1

              038a9ef44872c9a835e0f8fe061f0abcd0d7835c

              SHA256

              2f90a804c253c4db797bb7030b3b24318483d67e91981927318900e5176f9b33

              SHA512

              1184dc91b7a696b559cc0eca463ae445487b78901fab187fd5bef20c89f59e665b6fb04ee10a0e7d957b8117eba0ab6a91b1c7f2b49ac25d912df245b00d6d5f

            • C:\Windows\SysWOW64\Ibagcc32.exe

              Filesize

              337KB

              MD5

              ae4e92302510ab4429e77b23de834860

              SHA1

              08cb8b08ca906aa9cfdf002a234f2e89a8d87fad

              SHA256

              553319763e7436806c0cfe80529f3916588ba389e0c844c2e50ab883e0f529ca

              SHA512

              15bea8c2cc57c167784f44511579b8c065f6f24f1f364d75f3fba7186507a6e081610d324a97d1627df55d23484ed07427e71d604ef2b76d42e73b80771bfdeb

            • C:\Windows\SysWOW64\Idacmfkj.exe

              Filesize

              337KB

              MD5

              1f1e359014d4d958fde9ea51bb7a7623

              SHA1

              5be9c11d841f2feb72b77e3a25aff00adc2c0e97

              SHA256

              43b44ed908166aac1d52a3c1e513983cd855daf11d5ee0a9208103f5dca99d15

              SHA512

              96e121144e4c7612db86c167e58a3b8ce170687c8794be0539a7c33ecd370957a0991fae05fc9108d05f82366499fb7af105a4d9f75c1225045d44e3b032174f

            • C:\Windows\SysWOW64\Iffmccbi.exe

              Filesize

              337KB

              MD5

              fe66b827ea59c2bc487da24051238a29

              SHA1

              dcdf40a049eb075719863720b7cbffdfa6802abd

              SHA256

              ff81f342031dc5fc159eba2df544e9c4e9bb52447ae2340ae14f846a8a642daf

              SHA512

              f89aabaa12d5dbf5287fae4f20f51bd64e2402ce789dd2cffdc5b1266b676603a4389886f93276cdf7d07b04eab593be99116353e82c91c63a52f57f3b3d9457

            • C:\Windows\SysWOW64\Ifjfnb32.exe

              Filesize

              337KB

              MD5

              702e85ffb9e2168d22821243e099a40a

              SHA1

              5d738d4e1bd541006f7e7ed9fb23a9c5b7ae21a6

              SHA256

              07bef3e08dfda55e8561e016c5393258306b5d5329be990a5e7cded1d8da7115

              SHA512

              4a7c8463e0c16ab1d9736855258d1b03fb9ff486bb055141b9e9376ab6481ed2348837d6afb4d89f8b27ac21684bc20e0b0bfadd40127e3e1bbb6f22a7d85464

            • C:\Windows\SysWOW64\Iinlemia.exe

              Filesize

              337KB

              MD5

              5f7df9b721e09d183f29387e7386e803

              SHA1

              a37094bbcf81046b3acb5cd777ad7c9f9af2038f

              SHA256

              320584825d478d5e34f14a64150bc748a38a8112d6eb08ad71a6ea404978f33d

              SHA512

              7cdb5e9bccc4f9999a1fb3b86cef1fb0d0db00caa2b7a4c291f6c7472b4bbb505a00690698aa1c34d05d2d23ab70e4badacd769a3be61783036a76cb84bc95cc

            • C:\Windows\SysWOW64\Ijdeiaio.exe

              Filesize

              337KB

              MD5

              8cd1bf650aad574a61b52076ad5099d8

              SHA1

              d7c7b9f3260ef978400a4300aebc4a66b5241122

              SHA256

              eff34a485d00f576785b7ac86df252f474819ae2988ec3bd52b835464c44a476

              SHA512

              e4f6b0ddf5ed2f6b2bd998d731a7aea08a682f31210037b5ce3ec517610c809f3924c11da78970cb36aec13a416c25217f691a6a0c4e7ef84a8f9cc0bfa6b861

            • C:\Windows\SysWOW64\Ipldfi32.exe

              Filesize

              337KB

              MD5

              21c95d979ffcceddd371ed4bca6e8954

              SHA1

              ccde224dbef505923dc7a099705a61efd69bcff6

              SHA256

              0b42c56ce8bcfa0d9ad43b1b064864f24f186c629b87ed0bbf7ba8b03b5ff2d4

              SHA512

              3bab1e573d11f8ef03871a1730055b68e50c6be34e2e800980cebaefb82463b7cde022ac981d6c71304a3f63b488f117a79eba7c871454b83d42faedcd7026d9

            • C:\Windows\SysWOW64\Jbfpobpb.exe

              Filesize

              337KB

              MD5

              28e893ba069d42083e85ca2d0cecd8c8

              SHA1

              1794a8b23e055047508ba844ff4b096c880dad3c

              SHA256

              090be95a6ebdebac66f90b7d91dd1f11dd14c8d814c10399d1315d6ba5970246

              SHA512

              a551b72b06c2229f4f5fe61c3d9e437e768e47a2ebc051be36cb064b64a21925db90b7dd3b576cfbaa9af2516463571cacf552aa8abb289cb032825e7a1af8ac

            • C:\Windows\SysWOW64\Jbkjjblm.exe

              Filesize

              337KB

              MD5

              a16255d40e3f8ce8ae415de575b69942

              SHA1

              39badd2edbd21b3e58fdb5bb5c2aa5e7ba6312fd

              SHA256

              3e2d394c693f176d4079500a149daca4a3f91778de44149b8a7395505f4e2a84

              SHA512

              eeb1f40fc8f3db6a7b6d2905d84690131a02e7dd4e0702a9c5f8f2bf55cc8847cd3c65733de736f217b0d28ef928035012de5490523684c49dbb0601274e86b3

            • C:\Windows\SysWOW64\Jdmcidam.exe

              Filesize

              337KB

              MD5

              06dd7dd9e01fa3336e1eb12ab341bfb1

              SHA1

              cf2ba7157d34c34134ab7eb1c2a6973fa5f9fa34

              SHA256

              b6845f46b1f2e48ab462bd6e9d9ea65cc0ba330794527a384d328cd82804743b

              SHA512

              4535e452e17bfeda56df1775542ddaea53b3989c195b006a7a6025462864201938185c9f78bb9529951063afa48131714449defcfb0bb2287436ab657669a4f8

            • C:\Windows\SysWOW64\Jfhbppbc.exe

              Filesize

              337KB

              MD5

              2a99be84f77c8830bbfa1e9f200261b8

              SHA1

              764bb32171e517e2393fe174a5c1d2d61bd3a9c4

              SHA256

              6632276932aea16ae4583105620ca156ba04d13851783e196a558d2069486ab8

              SHA512

              7cca5caad1849a9dde8a017bfeead105ca19e7b542bd3668b2fd953d6f3437db0a00fa620bfea19f6aea441653a4a2948d9c9b45e1d342580da3ba1fcda1d517

            • C:\Windows\SysWOW64\Jmnaakne.exe

              Filesize

              337KB

              MD5

              3636ea8a933e583206b6a3fd393a1757

              SHA1

              5bbe07626820767f4700359900a414f64507a208

              SHA256

              2b0d24eb5baf5dc86031a38044a006434f1544f9a2335d48fffaa36269953e94

              SHA512

              739d40db0bd0df72e5b0b3ff2af3483c2bd3043417e8d05aa3b207bfde84c3a7ac87b0c52ab34e7658744661c2dfb3604688504986b28c4cf86ff706ced182f1

            • C:\Windows\SysWOW64\Jpjqhgol.exe

              Filesize

              337KB

              MD5

              e88f19d2f4a5ed4bbeae6964f95fddd4

              SHA1

              55cf774fe04f4334c6481de64a477c9d6fb22e4d

              SHA256

              65f4ab2d811624681a9813f1dbb5a00a7c49c482d7c8bae7202295fcf546438b

              SHA512

              480ec8ec47a28fdc860811eed149b4c0642e1fea67c0dc4dd01cb656b181e090eae929f5515b3d3bb8164c45867dc6e8c5a84ce9562569ab8041b69353a75cd0

            • C:\Windows\SysWOW64\Jpojcf32.exe

              Filesize

              337KB

              MD5

              24b5fbfc488343268e80ee2a3c3ce6ea

              SHA1

              22744276dbb6eec93b8321dc472796b29caeea5b

              SHA256

              2614e090b92adade40885492de0b2c136b53c08f9cc94a77b17a271e676d28c2

              SHA512

              1ccfe08836cb981a356eb6e26bc615768aa40f8ae3f862762e4d47b26a88ef25f7ede68d0d2c56c495bc5a5efeda38d8528647a86d29dc13d190b952b9849e56

            • C:\Windows\SysWOW64\Kaemnhla.exe

              Filesize

              337KB

              MD5

              970d5087056e9cfa36d1111a569d3b50

              SHA1

              938dad9436248b2f6eb959a1d8d33fd1681097be

              SHA256

              b1304619a88881df8b875345b4152d48832ad9cb9820188e9e80c8ca883f1f89

              SHA512

              e9e15995bdeaa8adeec3099bf53234825a5d18001d9a8786dba51933a672068520b6128a9ecaa9d52f9c904cd4fce4428861a38e25449b582e6151c90075c6bd

            • C:\Windows\SysWOW64\Kbfiep32.exe

              Filesize

              337KB

              MD5

              2220d0a460a788fb94ece5e6fbc58a22

              SHA1

              f4e11bc34f718ef21ad6a8c5153aa87c173a4132

              SHA256

              c5bd4760989799d13585c374ede5c28b151c923135cd3d5338a812cd77082bb1

              SHA512

              25bdf8e27fcff080b1072e051bfa599237f29cd967d272f43b2e70ffb96dc44f376e93e75360df224dd199e063418b073796464b378219ab64572978b7fc389b

            • C:\Windows\SysWOW64\Kdopod32.exe

              Filesize

              337KB

              MD5

              910c8a446688e11801724c6d42d32ff5

              SHA1

              257c4eacbd2f0a88ee011b7bbc97a55e01c82a6e

              SHA256

              f43ddf6e146063679d54645d6230c5c7908f6885ccc6515a8fb46d119c90e23f

              SHA512

              02bd2685ad5642dff2998e012006642adfbff973288535f51ca3b8232999790070d7b7e4ad8ac9259503e2a85e5e73b883da7f3251cea3412c346e55ca35d387

            • C:\Windows\SysWOW64\Kgdbkohf.exe

              Filesize

              337KB

              MD5

              4f7f5730e785d75c477a16e99625eea0

              SHA1

              2aa6e44deadad1a3d5a34817fdc64eb40bb30172

              SHA256

              0a524bfd6b881984a7ae1e3983ea3b827876cfb21ff24cad10c3a82974e24c0e

              SHA512

              6424f62311767f14d71b38ab989f81bf89872282d06052af11aee718460bf19001f9875b225a6586883126398c454e64d7700a7c9d30f0121d890b92d29f9335

            • C:\Windows\SysWOW64\Kilhgk32.exe

              Filesize

              337KB

              MD5

              992153da58bfa2ce9ede209586f4ee1c

              SHA1

              6c676ca1b92f744e98941284db6b10cba6be236e

              SHA256

              ac97816d71d1b698cbe92fd4ef9caeadb786373ddff914daf4eebbdce9c40933

              SHA512

              56f05113e61d890177c1194ea861528fd2716c9f7aca96cfe2a4a57b3f7b420c019a43f5777e2463ab87b4f4dd4a289296d5fce5d1653981de38ed47dc459974

            • C:\Windows\SysWOW64\Kmegbjgn.exe

              Filesize

              337KB

              MD5

              1ef6c58034d6edb5c5ad2170d0588138

              SHA1

              d0677b0bfcb4175e1f1886c3a0accba921bc37cb

              SHA256

              546a328bb29276f5cc116d3646235efdecd66c860abf329cc48b1aebff5e1d09

              SHA512

              2f84cff40c5f1aa1e134ba06d924eac0012b897585ecb5dc935f70ee7081cc8cca935799194758139957ae362117269e4716b060c96b0e36fa675f348e363bc1

            • C:\Windows\SysWOW64\Lgpagm32.exe

              Filesize

              337KB

              MD5

              58f216af657f6c20e7c8bcb1b992bbe6

              SHA1

              3a89d0835f778f63c4b2177dc00f0ae834a6a74c

              SHA256

              647bcca014247f99f792b18c5e72b61fe204ebbcd8fc012ca5cda2d2f458133d

              SHA512

              4e952b0ea4a06b23adc57c25d50e0ae7a5b023cf2a34f22095dc96afe4091128cd44bdd593dd2e92da9dca058d5c560bd9b2dd7945ee2fb834785b6e4f25d506

            • C:\Windows\SysWOW64\Lpocjdld.exe

              Filesize

              337KB

              MD5

              6fa7c60f0607c6dd7edca4a9f3c36d0e

              SHA1

              fb38fdfac6c7805b4ca8b4f6fd6f53702755d9ab

              SHA256

              1336311e53a11c099a4d04513e09482e3a5aec28d11e5a71d039b1b2f06edf11

              SHA512

              bde1a792b932072bc4ab901949dc7097eda9ab27549244ce008f3d06c24146102df99fbfc1c29219891515f331c47a9b2729c1c95aa5d17914a1be31e889cb73

            • C:\Windows\SysWOW64\Mdkhapfj.exe

              Filesize

              337KB

              MD5

              b180e4f6e109649f56dc53cf57442641

              SHA1

              86cf93bf6cd4e16228fdc6cf1e4f54730a1d40e9

              SHA256

              e07f6722a9419e667d5643e107ecfb1a5685b5368db662e67ba804e9b1487e3f

              SHA512

              63d098b743d1c47408a570ccf385f0b80f8e349a9f8a6050400ad2a60d865d8f362fa260da4e144b7fb53228f5bc571f0e730441dc734115705a6460c812f7cb

            • C:\Windows\SysWOW64\Mnlfigcc.exe

              Filesize

              337KB

              MD5

              cb1e1360f36897799c1616305da0e51a

              SHA1

              1d490949a4951c262bab98823796dab392ec09a3

              SHA256

              f6f6e46c6154da43647d8f900b503af11c10c2696c24190dc205ee0aa6ca154a

              SHA512

              d53b17b9a7d4c11ffc2d2b5ea7655f9d4478c5256372267486e9a1bf8f38c60c052f8624d0b522dcdf583685302e1502617dd838d779fad4b96f8f48594f4367

            • C:\Windows\SysWOW64\Nnhfee32.exe

              Filesize

              337KB

              MD5

              45f651a693b4d86925eb460cb07793b0

              SHA1

              b7c728ff4dfdf1270f475ce2ff47ebf2db10251c

              SHA256

              660d9e28d0965c679ad9f3ae52ae478a6f2652846c1963af6303d3d5d75188da

              SHA512

              cd0e169ca1c7f10eda722f7f8916aaa35059d604634e6bb072719cb666cf5dc139dd3aa7a1931710849461145d4f5a059f26e01efb760e94215d54bf6fed64d3

            • memory/312-556-0x0000000000400000-0x0000000000433000-memory.dmp

              Filesize

              204KB

            • memory/312-177-0x0000000000400000-0x0000000000433000-memory.dmp

              Filesize

              204KB

            • memory/672-524-0x0000000000400000-0x0000000000433000-memory.dmp

              Filesize

              204KB

            • memory/672-383-0x0000000000400000-0x0000000000433000-memory.dmp

              Filesize

              204KB

            • memory/692-576-0x0000000000400000-0x0000000000433000-memory.dmp

              Filesize

              204KB

            • memory/692-169-0x0000000000400000-0x0000000000433000-memory.dmp

              Filesize

              204KB

            • memory/764-562-0x0000000000400000-0x0000000000433000-memory.dmp

              Filesize

              204KB

            • memory/764-129-0x0000000000400000-0x0000000000433000-memory.dmp

              Filesize

              204KB

            • memory/880-371-0x0000000000400000-0x0000000000433000-memory.dmp

              Filesize

              204KB

            • memory/880-526-0x0000000000400000-0x0000000000433000-memory.dmp

              Filesize

              204KB

            • memory/1012-569-0x0000000000400000-0x0000000000433000-memory.dmp

              Filesize

              204KB

            • memory/1012-48-0x0000000000400000-0x0000000000433000-memory.dmp

              Filesize

              204KB

            • memory/1028-491-0x0000000000400000-0x0000000000433000-memory.dmp

              Filesize

              204KB

            • memory/1028-501-0x0000000000400000-0x0000000000433000-memory.dmp

              Filesize

              204KB

            • memory/1176-109-0x0000000000400000-0x0000000000433000-memory.dmp

              Filesize

              204KB

            • memory/1216-531-0x0000000000400000-0x0000000000433000-memory.dmp

              Filesize

              204KB

            • memory/1216-347-0x0000000000400000-0x0000000000433000-memory.dmp

              Filesize

              204KB

            • memory/1320-517-0x0000000000400000-0x0000000000433000-memory.dmp

              Filesize

              204KB

            • memory/1320-437-0x0000000000400000-0x0000000000433000-memory.dmp

              Filesize

              204KB

            • memory/1356-299-0x0000000000400000-0x0000000000433000-memory.dmp

              Filesize

              204KB

            • memory/1356-539-0x0000000000400000-0x0000000000433000-memory.dmp

              Filesize

              204KB

            • memory/1460-281-0x0000000000400000-0x0000000000433000-memory.dmp

              Filesize

              204KB

            • memory/1460-542-0x0000000000400000-0x0000000000433000-memory.dmp

              Filesize

              204KB

            • memory/1584-566-0x0000000000400000-0x0000000000433000-memory.dmp

              Filesize

              204KB

            • memory/1584-89-0x0000000000400000-0x0000000000433000-memory.dmp

              Filesize

              204KB

            • memory/1612-193-0x0000000000400000-0x0000000000433000-memory.dmp

              Filesize

              204KB

            • memory/1612-554-0x0000000000400000-0x0000000000433000-memory.dmp

              Filesize

              204KB

            • memory/1636-297-0x0000000000400000-0x0000000000433000-memory.dmp

              Filesize

              204KB

            • memory/1724-570-0x0000000000400000-0x0000000000433000-memory.dmp

              Filesize

              204KB

            • memory/1724-41-0x0000000000400000-0x0000000000433000-memory.dmp

              Filesize

              204KB

            • memory/1744-311-0x0000000000400000-0x0000000000433000-memory.dmp

              Filesize

              204KB

            • memory/1744-538-0x0000000000400000-0x0000000000433000-memory.dmp

              Filesize

              204KB

            • memory/1776-547-0x0000000000400000-0x0000000000433000-memory.dmp

              Filesize

              204KB

            • memory/1776-249-0x0000000000400000-0x0000000000433000-memory.dmp

              Filesize

              204KB

            • memory/1948-389-0x0000000000400000-0x0000000000433000-memory.dmp

              Filesize

              204KB

            • memory/1948-525-0x0000000000400000-0x0000000000433000-memory.dmp

              Filesize

              204KB

            • memory/1984-56-0x0000000000400000-0x0000000000433000-memory.dmp

              Filesize

              204KB

            • memory/1984-568-0x0000000000400000-0x0000000000433000-memory.dmp

              Filesize

              204KB

            • memory/2124-85-0x0000000000400000-0x0000000000433000-memory.dmp

              Filesize

              204KB

            • memory/2224-578-0x0000000000400000-0x0000000000433000-memory.dmp

              Filesize

              204KB

            • memory/2224-305-0x0000000000400000-0x0000000000433000-memory.dmp

              Filesize

              204KB

            • memory/2280-479-0x0000000000400000-0x0000000000433000-memory.dmp

              Filesize

              204KB

            • memory/2280-505-0x0000000000400000-0x0000000000433000-memory.dmp

              Filesize

              204KB

            • memory/2288-407-0x0000000000400000-0x0000000000433000-memory.dmp

              Filesize

              204KB

            • memory/2288-523-0x0000000000400000-0x0000000000433000-memory.dmp

              Filesize

              204KB

            • memory/2304-544-0x0000000000400000-0x0000000000433000-memory.dmp

              Filesize

              204KB

            • memory/2304-269-0x0000000000400000-0x0000000000433000-memory.dmp

              Filesize

              204KB

            • memory/2324-516-0x0000000000400000-0x0000000000433000-memory.dmp

              Filesize

              204KB

            • memory/2324-443-0x0000000000400000-0x0000000000433000-memory.dmp

              Filesize

              204KB

            • memory/2344-513-0x0000000000400000-0x0000000000433000-memory.dmp

              Filesize

              204KB

            • memory/2344-456-0x0000000000400000-0x0000000000433000-memory.dmp

              Filesize

              204KB

            • memory/2360-209-0x0000000000400000-0x0000000000433000-memory.dmp

              Filesize

              204KB

            • memory/2360-552-0x0000000000400000-0x0000000000433000-memory.dmp

              Filesize

              204KB

            • memory/2608-558-0x0000000000400000-0x0000000000433000-memory.dmp

              Filesize

              204KB

            • memory/2608-160-0x0000000000400000-0x0000000000433000-memory.dmp

              Filesize

              204KB

            • memory/2764-381-0x0000000000400000-0x0000000000433000-memory.dmp

              Filesize

              204KB

            • memory/2812-120-0x0000000000400000-0x0000000000433000-memory.dmp

              Filesize

              204KB

            • memory/2812-563-0x0000000000400000-0x0000000000433000-memory.dmp

              Filesize

              204KB

            • memory/2864-515-0x0000000000400000-0x0000000000433000-memory.dmp

              Filesize

              204KB

            • memory/2864-452-0x0000000000400000-0x0000000000433000-memory.dmp

              Filesize

              204KB

            • memory/2892-221-0x0000000000400000-0x0000000000433000-memory.dmp

              Filesize

              204KB

            • memory/2892-551-0x0000000000400000-0x0000000000433000-memory.dmp

              Filesize

              204KB

            • memory/2948-189-0x0000000000400000-0x0000000000433000-memory.dmp

              Filesize

              204KB

            • memory/3088-560-0x0000000000400000-0x0000000000433000-memory.dmp

              Filesize

              204KB

            • memory/3088-145-0x0000000000400000-0x0000000000433000-memory.dmp

              Filesize

              204KB

            • memory/3104-529-0x0000000000400000-0x0000000000433000-memory.dmp

              Filesize

              204KB

            • memory/3104-359-0x0000000000400000-0x0000000000433000-memory.dmp

              Filesize

              204KB

            • memory/3116-520-0x0000000000400000-0x0000000000433000-memory.dmp

              Filesize

              204KB

            • memory/3116-419-0x0000000000400000-0x0000000000433000-memory.dmp

              Filesize

              204KB

            • memory/3176-0-0x0000000000400000-0x0000000000433000-memory.dmp

              Filesize

              204KB

            • memory/3176-1-0x0000000000431000-0x0000000000432000-memory.dmp

              Filesize

              4KB

            • memory/3176-586-0x0000000000400000-0x0000000000433000-memory.dmp

              Filesize

              204KB

            • memory/3208-25-0x0000000000400000-0x0000000000433000-memory.dmp

              Filesize

              204KB

            • memory/3208-583-0x0000000000400000-0x0000000000433000-memory.dmp

              Filesize

              204KB

            • memory/3280-329-0x0000000000400000-0x0000000000433000-memory.dmp

              Filesize

              204KB

            • memory/3280-535-0x0000000000400000-0x0000000000433000-memory.dmp

              Filesize

              204KB

            • memory/3356-21-0x0000000000400000-0x0000000000433000-memory.dmp

              Filesize

              204KB

            • memory/3416-113-0x0000000000400000-0x0000000000433000-memory.dmp

              Filesize

              204KB

            • memory/3416-587-0x0000000000400000-0x0000000000433000-memory.dmp

              Filesize

              204KB

            • memory/3528-323-0x0000000000400000-0x0000000000433000-memory.dmp

              Filesize

              204KB

            • memory/3528-534-0x0000000000400000-0x0000000000433000-memory.dmp

              Filesize

              204KB

            • memory/3544-137-0x0000000000400000-0x0000000000433000-memory.dmp

              Filesize

              204KB

            • memory/3544-561-0x0000000000400000-0x0000000000433000-memory.dmp

              Filesize

              204KB

            • memory/3580-461-0x0000000000400000-0x0000000000433000-memory.dmp

              Filesize

              204KB

            • memory/3580-511-0x0000000000400000-0x0000000000433000-memory.dmp

              Filesize

              204KB

            • memory/3684-321-0x0000000000400000-0x0000000000433000-memory.dmp

              Filesize

              204KB

            • memory/3688-541-0x0000000000400000-0x0000000000433000-memory.dmp

              Filesize

              204KB

            • memory/3688-287-0x0000000000400000-0x0000000000433000-memory.dmp

              Filesize

              204KB

            • memory/3724-532-0x0000000000400000-0x0000000000433000-memory.dmp

              Filesize

              204KB

            • memory/3724-341-0x0000000000400000-0x0000000000433000-memory.dmp

              Filesize

              204KB

            • memory/3900-153-0x0000000000400000-0x0000000000433000-memory.dmp

              Filesize

              204KB

            • memory/3900-559-0x0000000000400000-0x0000000000433000-memory.dmp

              Filesize

              204KB

            • memory/3904-584-0x0000000000400000-0x0000000000433000-memory.dmp

              Filesize

              204KB

            • memory/3904-36-0x0000000000400000-0x0000000000433000-memory.dmp

              Filesize

              204KB

            • memory/3940-503-0x0000000000400000-0x0000000000433000-memory.dmp

              Filesize

              204KB

            • memory/3940-485-0x0000000000400000-0x0000000000433000-memory.dmp

              Filesize

              204KB

            • memory/4040-257-0x0000000000400000-0x0000000000433000-memory.dmp

              Filesize

              204KB

            • memory/4040-546-0x0000000000400000-0x0000000000433000-memory.dmp

              Filesize

              204KB

            • memory/4208-536-0x0000000000400000-0x0000000000433000-memory.dmp

              Filesize

              204KB

            • memory/4208-395-0x0000000000400000-0x0000000000433000-memory.dmp

              Filesize

              204KB

            • memory/4332-233-0x0000000000400000-0x0000000000433000-memory.dmp

              Filesize

              204KB

            • memory/4332-549-0x0000000000400000-0x0000000000433000-memory.dmp

              Filesize

              204KB

            • memory/4356-507-0x0000000000400000-0x0000000000433000-memory.dmp

              Filesize

              204KB

            • memory/4356-476-0x0000000000400000-0x0000000000433000-memory.dmp

              Filesize

              204KB

            • memory/4372-9-0x0000000000400000-0x0000000000433000-memory.dmp

              Filesize

              204KB

            • memory/4372-585-0x0000000000400000-0x0000000000433000-memory.dmp

              Filesize

              204KB

            • memory/4424-275-0x0000000000400000-0x0000000000433000-memory.dmp

              Filesize

              204KB

            • memory/4424-543-0x0000000000400000-0x0000000000433000-memory.dmp

              Filesize

              204KB

            • memory/4436-353-0x0000000000400000-0x0000000000433000-memory.dmp

              Filesize

              204KB

            • memory/4436-530-0x0000000000400000-0x0000000000433000-memory.dmp

              Filesize

              204KB

            • memory/4448-521-0x0000000000400000-0x0000000000433000-memory.dmp

              Filesize

              204KB

            • memory/4448-413-0x0000000000400000-0x0000000000433000-memory.dmp

              Filesize

              204KB

            • memory/4516-528-0x0000000000400000-0x0000000000433000-memory.dmp

              Filesize

              204KB

            • memory/4516-365-0x0000000000400000-0x0000000000433000-memory.dmp

              Filesize

              204KB

            • memory/4532-509-0x0000000000400000-0x0000000000433000-memory.dmp

              Filesize

              204KB

            • memory/4532-467-0x0000000000400000-0x0000000000433000-memory.dmp

              Filesize

              204KB

            • memory/4576-245-0x0000000000400000-0x0000000000433000-memory.dmp

              Filesize

              204KB

            • memory/4620-406-0x0000000000400000-0x0000000000433000-memory.dmp

              Filesize

              204KB

            • memory/4636-335-0x0000000000400000-0x0000000000433000-memory.dmp

              Filesize

              204KB

            • memory/4636-533-0x0000000000400000-0x0000000000433000-memory.dmp

              Filesize

              204KB

            • memory/4688-65-0x0000000000400000-0x0000000000433000-memory.dmp

              Filesize

              204KB

            • memory/4688-567-0x0000000000400000-0x0000000000433000-memory.dmp

              Filesize

              204KB

            • memory/4744-263-0x0000000000400000-0x0000000000433000-memory.dmp

              Filesize

              204KB

            • memory/4744-577-0x0000000000400000-0x0000000000433000-memory.dmp

              Filesize

              204KB

            • memory/4748-425-0x0000000000400000-0x0000000000433000-memory.dmp

              Filesize

              204KB

            • memory/4748-519-0x0000000000400000-0x0000000000433000-memory.dmp

              Filesize

              204KB

            • memory/4832-431-0x0000000000400000-0x0000000000433000-memory.dmp

              Filesize

              204KB

            • memory/4832-518-0x0000000000400000-0x0000000000433000-memory.dmp

              Filesize

              204KB

            • memory/4904-101-0x0000000000400000-0x0000000000433000-memory.dmp

              Filesize

              204KB

            • memory/4956-553-0x0000000000400000-0x0000000000433000-memory.dmp

              Filesize

              204KB

            • memory/4956-200-0x0000000000400000-0x0000000000433000-memory.dmp

              Filesize

              204KB

            • memory/4976-565-0x0000000000400000-0x0000000000433000-memory.dmp

              Filesize

              204KB

            • memory/4976-72-0x0000000000400000-0x0000000000433000-memory.dmp

              Filesize

              204KB

            • memory/5000-497-0x0000000000400000-0x0000000000433000-memory.dmp

              Filesize

              204KB

            • memory/5000-499-0x0000000000400000-0x0000000000433000-memory.dmp

              Filesize

              204KB

            • memory/5004-550-0x0000000000400000-0x0000000000433000-memory.dmp

              Filesize

              204KB

            • memory/5004-225-0x0000000000400000-0x0000000000433000-memory.dmp

              Filesize

              204KB