Analysis

  • max time kernel
    146s
  • max time network
    126s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240508-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system
  • submitted
    15/05/2024, 14:23

General

  • Target

    d63070c8a874826337769fee65cdfec0_NeikiAnalytics.exe

  • Size

    96KB

  • MD5

    d63070c8a874826337769fee65cdfec0

  • SHA1

    08c016b782e89862e63de55b7de0d566a33a678d

  • SHA256

    75e60cef3a1fb9d988794a3f158e3abf777bb42b8c8fd427e24aaa1f83204fca

  • SHA512

    3d9dc2254af7fb46d58c8212c8a537528dc58d60e5ba65f5156d0a75bb30433b82ea615180fe36c90176f9ea9ea25eea4b4b25fd88fe053ecab6efab037cf187

  • SSDEEP

    1536:sKaAY2qr1fAE9BWNVpf5OX09GsPqn+vv9D4vVcdZ2JVQBKoC/CKniTCvVAva61hl:xln6fAE9yVbOEcsPq+XF4vVqZ2fQkbno

Score
10/10

Malware Config

Signatures

  • Adds autorun key to be loaded by Explorer.exe on startup 2 TTPs 64 IoCs
  • Executes dropped EXE 64 IoCs
  • Drops file in System32 directory 64 IoCs
  • Program crash 1 IoCs
  • Modifies registry class 64 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\d63070c8a874826337769fee65cdfec0_NeikiAnalytics.exe
    "C:\Users\Admin\AppData\Local\Temp\d63070c8a874826337769fee65cdfec0_NeikiAnalytics.exe"
    1⤵
    • Adds autorun key to be loaded by Explorer.exe on startup
    • Drops file in System32 directory
    • Modifies registry class
    • Suspicious use of WriteProcessMemory
    PID:2064
    • C:\Windows\SysWOW64\Ifhiib32.exe
      C:\Windows\system32\Ifhiib32.exe
      2⤵
      • Executes dropped EXE
      • Modifies registry class
      • Suspicious use of WriteProcessMemory
      PID:1552
      • C:\Windows\SysWOW64\Iiffen32.exe
        C:\Windows\system32\Iiffen32.exe
        3⤵
        • Adds autorun key to be loaded by Explorer.exe on startup
        • Executes dropped EXE
        • Modifies registry class
        • Suspicious use of WriteProcessMemory
        PID:2484
        • C:\Windows\SysWOW64\Iannfk32.exe
          C:\Windows\system32\Iannfk32.exe
          4⤵
          • Adds autorun key to be loaded by Explorer.exe on startup
          • Executes dropped EXE
          • Drops file in System32 directory
          • Modifies registry class
          • Suspicious use of WriteProcessMemory
          PID:4484
          • C:\Windows\SysWOW64\Ibojncfj.exe
            C:\Windows\system32\Ibojncfj.exe
            5⤵
            • Adds autorun key to be loaded by Explorer.exe on startup
            • Executes dropped EXE
            • Drops file in System32 directory
            • Modifies registry class
            • Suspicious use of WriteProcessMemory
            PID:2356
            • C:\Windows\SysWOW64\Ijfboafl.exe
              C:\Windows\system32\Ijfboafl.exe
              6⤵
              • Executes dropped EXE
              • Drops file in System32 directory
              • Modifies registry class
              • Suspicious use of WriteProcessMemory
              PID:1128
              • C:\Windows\SysWOW64\Iapjlk32.exe
                C:\Windows\system32\Iapjlk32.exe
                7⤵
                • Adds autorun key to be loaded by Explorer.exe on startup
                • Executes dropped EXE
                • Drops file in System32 directory
                • Modifies registry class
                • Suspicious use of WriteProcessMemory
                PID:1636
                • C:\Windows\SysWOW64\Ibagcc32.exe
                  C:\Windows\system32\Ibagcc32.exe
                  8⤵
                  • Adds autorun key to be loaded by Explorer.exe on startup
                  • Executes dropped EXE
                  • Suspicious use of WriteProcessMemory
                  PID:3748
                  • C:\Windows\SysWOW64\Ifmcdblq.exe
                    C:\Windows\system32\Ifmcdblq.exe
                    9⤵
                    • Adds autorun key to be loaded by Explorer.exe on startup
                    • Executes dropped EXE
                    • Modifies registry class
                    • Suspicious use of WriteProcessMemory
                    PID:4876
                    • C:\Windows\SysWOW64\Iabgaklg.exe
                      C:\Windows\system32\Iabgaklg.exe
                      10⤵
                      • Adds autorun key to be loaded by Explorer.exe on startup
                      • Executes dropped EXE
                      • Modifies registry class
                      • Suspicious use of WriteProcessMemory
                      PID:8
                      • C:\Windows\SysWOW64\Ipegmg32.exe
                        C:\Windows\system32\Ipegmg32.exe
                        11⤵
                        • Executes dropped EXE
                        • Drops file in System32 directory
                        • Modifies registry class
                        • Suspicious use of WriteProcessMemory
                        PID:2092
                        • C:\Windows\SysWOW64\Ifopiajn.exe
                          C:\Windows\system32\Ifopiajn.exe
                          12⤵
                          • Adds autorun key to be loaded by Explorer.exe on startup
                          • Executes dropped EXE
                          • Drops file in System32 directory
                          • Modifies registry class
                          • Suspicious use of WriteProcessMemory
                          PID:4636
                          • C:\Windows\SysWOW64\Jaedgjjd.exe
                            C:\Windows\system32\Jaedgjjd.exe
                            13⤵
                            • Adds autorun key to be loaded by Explorer.exe on startup
                            • Executes dropped EXE
                            • Drops file in System32 directory
                            • Suspicious use of WriteProcessMemory
                            PID:1052
                            • C:\Windows\SysWOW64\Jdcpcf32.exe
                              C:\Windows\system32\Jdcpcf32.exe
                              14⤵
                              • Adds autorun key to be loaded by Explorer.exe on startup
                              • Executes dropped EXE
                              • Drops file in System32 directory
                              • Suspicious use of WriteProcessMemory
                              PID:700
                              • C:\Windows\SysWOW64\Jagqlj32.exe
                                C:\Windows\system32\Jagqlj32.exe
                                15⤵
                                • Adds autorun key to be loaded by Explorer.exe on startup
                                • Executes dropped EXE
                                • Drops file in System32 directory
                                • Modifies registry class
                                • Suspicious use of WriteProcessMemory
                                PID:4132
                                • C:\Windows\SysWOW64\Jdemhe32.exe
                                  C:\Windows\system32\Jdemhe32.exe
                                  16⤵
                                  • Adds autorun key to be loaded by Explorer.exe on startup
                                  • Executes dropped EXE
                                  • Drops file in System32 directory
                                  • Modifies registry class
                                  • Suspicious use of WriteProcessMemory
                                  PID:3312
                                  • C:\Windows\SysWOW64\Jfdida32.exe
                                    C:\Windows\system32\Jfdida32.exe
                                    17⤵
                                    • Adds autorun key to be loaded by Explorer.exe on startup
                                    • Executes dropped EXE
                                    • Drops file in System32 directory
                                    • Modifies registry class
                                    • Suspicious use of WriteProcessMemory
                                    PID:1260
                                    • C:\Windows\SysWOW64\Jmnaakne.exe
                                      C:\Windows\system32\Jmnaakne.exe
                                      18⤵
                                      • Adds autorun key to be loaded by Explorer.exe on startup
                                      • Executes dropped EXE
                                      • Drops file in System32 directory
                                      • Modifies registry class
                                      • Suspicious use of WriteProcessMemory
                                      PID:4784
                                      • C:\Windows\SysWOW64\Jdhine32.exe
                                        C:\Windows\system32\Jdhine32.exe
                                        19⤵
                                        • Executes dropped EXE
                                        • Drops file in System32 directory
                                        • Suspicious use of WriteProcessMemory
                                        PID:4860
                                        • C:\Windows\SysWOW64\Jjbako32.exe
                                          C:\Windows\system32\Jjbako32.exe
                                          20⤵
                                          • Adds autorun key to be loaded by Explorer.exe on startup
                                          • Executes dropped EXE
                                          • Modifies registry class
                                          • Suspicious use of WriteProcessMemory
                                          PID:1604
                                          • C:\Windows\SysWOW64\Jmpngk32.exe
                                            C:\Windows\system32\Jmpngk32.exe
                                            21⤵
                                            • Adds autorun key to be loaded by Explorer.exe on startup
                                            • Executes dropped EXE
                                            • Modifies registry class
                                            • Suspicious use of WriteProcessMemory
                                            PID:3176
                                            • C:\Windows\SysWOW64\Jbmfoa32.exe
                                              C:\Windows\system32\Jbmfoa32.exe
                                              22⤵
                                              • Adds autorun key to be loaded by Explorer.exe on startup
                                              • Executes dropped EXE
                                              • Drops file in System32 directory
                                              • Modifies registry class
                                              • Suspicious use of WriteProcessMemory
                                              PID:440
                                              • C:\Windows\SysWOW64\Jigollag.exe
                                                C:\Windows\system32\Jigollag.exe
                                                23⤵
                                                • Executes dropped EXE
                                                • Drops file in System32 directory
                                                PID:2724
                                                • C:\Windows\SysWOW64\Jdmcidam.exe
                                                  C:\Windows\system32\Jdmcidam.exe
                                                  24⤵
                                                  • Adds autorun key to be loaded by Explorer.exe on startup
                                                  • Executes dropped EXE
                                                  • Modifies registry class
                                                  PID:1692
                                                  • C:\Windows\SysWOW64\Jfkoeppq.exe
                                                    C:\Windows\system32\Jfkoeppq.exe
                                                    25⤵
                                                    • Executes dropped EXE
                                                    • Drops file in System32 directory
                                                    • Modifies registry class
                                                    PID:1540
                                                    • C:\Windows\SysWOW64\Kmegbjgn.exe
                                                      C:\Windows\system32\Kmegbjgn.exe
                                                      26⤵
                                                      • Adds autorun key to be loaded by Explorer.exe on startup
                                                      • Executes dropped EXE
                                                      • Modifies registry class
                                                      PID:3432
                                                      • C:\Windows\SysWOW64\Kpccnefa.exe
                                                        C:\Windows\system32\Kpccnefa.exe
                                                        27⤵
                                                        • Adds autorun key to be loaded by Explorer.exe on startup
                                                        • Executes dropped EXE
                                                        • Drops file in System32 directory
                                                        • Modifies registry class
                                                        PID:3500
                                                        • C:\Windows\SysWOW64\Kgmlkp32.exe
                                                          C:\Windows\system32\Kgmlkp32.exe
                                                          28⤵
                                                          • Adds autorun key to be loaded by Explorer.exe on startup
                                                          • Executes dropped EXE
                                                          • Modifies registry class
                                                          PID:3096
                                                          • C:\Windows\SysWOW64\Kacphh32.exe
                                                            C:\Windows\system32\Kacphh32.exe
                                                            29⤵
                                                            • Adds autorun key to be loaded by Explorer.exe on startup
                                                            • Executes dropped EXE
                                                            • Drops file in System32 directory
                                                            • Modifies registry class
                                                            PID:4236
                                                            • C:\Windows\SysWOW64\Kdaldd32.exe
                                                              C:\Windows\system32\Kdaldd32.exe
                                                              30⤵
                                                              • Adds autorun key to be loaded by Explorer.exe on startup
                                                              • Executes dropped EXE
                                                              • Drops file in System32 directory
                                                              PID:3920
                                                              • C:\Windows\SysWOW64\Kkkdan32.exe
                                                                C:\Windows\system32\Kkkdan32.exe
                                                                31⤵
                                                                • Executes dropped EXE
                                                                • Drops file in System32 directory
                                                                • Modifies registry class
                                                                PID:868
                                                                • C:\Windows\SysWOW64\Kdcijcke.exe
                                                                  C:\Windows\system32\Kdcijcke.exe
                                                                  32⤵
                                                                  • Executes dropped EXE
                                                                  • Drops file in System32 directory
                                                                  • Modifies registry class
                                                                  PID:1472
                                                                  • C:\Windows\SysWOW64\Kknafn32.exe
                                                                    C:\Windows\system32\Kknafn32.exe
                                                                    33⤵
                                                                    • Executes dropped EXE
                                                                    • Drops file in System32 directory
                                                                    • Modifies registry class
                                                                    PID:2600
                                                                    • C:\Windows\SysWOW64\Kagichjo.exe
                                                                      C:\Windows\system32\Kagichjo.exe
                                                                      34⤵
                                                                      • Adds autorun key to be loaded by Explorer.exe on startup
                                                                      • Executes dropped EXE
                                                                      • Drops file in System32 directory
                                                                      • Modifies registry class
                                                                      PID:1408
                                                                      • C:\Windows\SysWOW64\Kdffocib.exe
                                                                        C:\Windows\system32\Kdffocib.exe
                                                                        35⤵
                                                                        • Adds autorun key to be loaded by Explorer.exe on startup
                                                                        • Executes dropped EXE
                                                                        • Drops file in System32 directory
                                                                        • Modifies registry class
                                                                        PID:2820
                                                                        • C:\Windows\SysWOW64\Kkpnlm32.exe
                                                                          C:\Windows\system32\Kkpnlm32.exe
                                                                          36⤵
                                                                          • Adds autorun key to be loaded by Explorer.exe on startup
                                                                          • Executes dropped EXE
                                                                          • Drops file in System32 directory
                                                                          PID:1256
                                                                          • C:\Windows\SysWOW64\Kpmfddnf.exe
                                                                            C:\Windows\system32\Kpmfddnf.exe
                                                                            37⤵
                                                                            • Executes dropped EXE
                                                                            • Modifies registry class
                                                                            PID:1080
                                                                            • C:\Windows\SysWOW64\Kkbkamnl.exe
                                                                              C:\Windows\system32\Kkbkamnl.exe
                                                                              38⤵
                                                                              • Executes dropped EXE
                                                                              • Drops file in System32 directory
                                                                              PID:748
                                                                              • C:\Windows\SysWOW64\Lmqgnhmp.exe
                                                                                C:\Windows\system32\Lmqgnhmp.exe
                                                                                39⤵
                                                                                • Adds autorun key to be loaded by Explorer.exe on startup
                                                                                • Executes dropped EXE
                                                                                • Modifies registry class
                                                                                PID:4424
                                                                                • C:\Windows\SysWOW64\Lgikfn32.exe
                                                                                  C:\Windows\system32\Lgikfn32.exe
                                                                                  40⤵
                                                                                  • Adds autorun key to be loaded by Explorer.exe on startup
                                                                                  • Executes dropped EXE
                                                                                  • Drops file in System32 directory
                                                                                  PID:432
                                                                                  • C:\Windows\SysWOW64\Lkdggmlj.exe
                                                                                    C:\Windows\system32\Lkdggmlj.exe
                                                                                    41⤵
                                                                                    • Executes dropped EXE
                                                                                    • Drops file in System32 directory
                                                                                    • Modifies registry class
                                                                                    PID:2760
                                                                                    • C:\Windows\SysWOW64\Laopdgcg.exe
                                                                                      C:\Windows\system32\Laopdgcg.exe
                                                                                      42⤵
                                                                                      • Executes dropped EXE
                                                                                      • Drops file in System32 directory
                                                                                      • Modifies registry class
                                                                                      PID:3584
                                                                                      • C:\Windows\SysWOW64\Lgkhlnbn.exe
                                                                                        C:\Windows\system32\Lgkhlnbn.exe
                                                                                        43⤵
                                                                                        • Adds autorun key to be loaded by Explorer.exe on startup
                                                                                        • Executes dropped EXE
                                                                                        • Drops file in System32 directory
                                                                                        • Modifies registry class
                                                                                        PID:1196
                                                                                        • C:\Windows\SysWOW64\Ldohebqh.exe
                                                                                          C:\Windows\system32\Ldohebqh.exe
                                                                                          44⤵
                                                                                          • Executes dropped EXE
                                                                                          PID:3628
                                                                                          • C:\Windows\SysWOW64\Lkiqbl32.exe
                                                                                            C:\Windows\system32\Lkiqbl32.exe
                                                                                            45⤵
                                                                                            • Adds autorun key to be loaded by Explorer.exe on startup
                                                                                            • Executes dropped EXE
                                                                                            • Modifies registry class
                                                                                            PID:4692
                                                                                            • C:\Windows\SysWOW64\Ldaeka32.exe
                                                                                              C:\Windows\system32\Ldaeka32.exe
                                                                                              46⤵
                                                                                              • Adds autorun key to be loaded by Explorer.exe on startup
                                                                                              • Executes dropped EXE
                                                                                              • Modifies registry class
                                                                                              PID:448
                                                                                              • C:\Windows\SysWOW64\Lklnhlfb.exe
                                                                                                C:\Windows\system32\Lklnhlfb.exe
                                                                                                47⤵
                                                                                                • Adds autorun key to be loaded by Explorer.exe on startup
                                                                                                • Executes dropped EXE
                                                                                                • Drops file in System32 directory
                                                                                                PID:1616
                                                                                                • C:\Windows\SysWOW64\Lphfpbdi.exe
                                                                                                  C:\Windows\system32\Lphfpbdi.exe
                                                                                                  48⤵
                                                                                                  • Adds autorun key to be loaded by Explorer.exe on startup
                                                                                                  • Executes dropped EXE
                                                                                                  • Drops file in System32 directory
                                                                                                  PID:1356
                                                                                                  • C:\Windows\SysWOW64\Lgbnmm32.exe
                                                                                                    C:\Windows\system32\Lgbnmm32.exe
                                                                                                    49⤵
                                                                                                    • Adds autorun key to be loaded by Explorer.exe on startup
                                                                                                    • Executes dropped EXE
                                                                                                    PID:4632
                                                                                                    • C:\Windows\SysWOW64\Mnlfigcc.exe
                                                                                                      C:\Windows\system32\Mnlfigcc.exe
                                                                                                      50⤵
                                                                                                      • Adds autorun key to be loaded by Explorer.exe on startup
                                                                                                      • Executes dropped EXE
                                                                                                      • Drops file in System32 directory
                                                                                                      • Modifies registry class
                                                                                                      PID:676
                                                                                                      • C:\Windows\SysWOW64\Mgekbljc.exe
                                                                                                        C:\Windows\system32\Mgekbljc.exe
                                                                                                        51⤵
                                                                                                        • Adds autorun key to be loaded by Explorer.exe on startup
                                                                                                        • Executes dropped EXE
                                                                                                        • Modifies registry class
                                                                                                        PID:1088
                                                                                                        • C:\Windows\SysWOW64\Mkpgck32.exe
                                                                                                          C:\Windows\system32\Mkpgck32.exe
                                                                                                          52⤵
                                                                                                          • Adds autorun key to be loaded by Explorer.exe on startup
                                                                                                          • Executes dropped EXE
                                                                                                          • Drops file in System32 directory
                                                                                                          PID:1560
                                                                                                          • C:\Windows\SysWOW64\Mpmokb32.exe
                                                                                                            C:\Windows\system32\Mpmokb32.exe
                                                                                                            53⤵
                                                                                                            • Adds autorun key to be loaded by Explorer.exe on startup
                                                                                                            • Executes dropped EXE
                                                                                                            • Drops file in System32 directory
                                                                                                            • Modifies registry class
                                                                                                            PID:456
                                                                                                            • C:\Windows\SysWOW64\Mkbchk32.exe
                                                                                                              C:\Windows\system32\Mkbchk32.exe
                                                                                                              54⤵
                                                                                                              • Adds autorun key to be loaded by Explorer.exe on startup
                                                                                                              • Executes dropped EXE
                                                                                                              PID:4968
                                                                                                              • C:\Windows\SysWOW64\Mpolqa32.exe
                                                                                                                C:\Windows\system32\Mpolqa32.exe
                                                                                                                55⤵
                                                                                                                • Adds autorun key to be loaded by Explorer.exe on startup
                                                                                                                • Executes dropped EXE
                                                                                                                • Modifies registry class
                                                                                                                PID:1040
                                                                                                                • C:\Windows\SysWOW64\Mkepnjng.exe
                                                                                                                  C:\Windows\system32\Mkepnjng.exe
                                                                                                                  56⤵
                                                                                                                  • Adds autorun key to be loaded by Explorer.exe on startup
                                                                                                                  • Executes dropped EXE
                                                                                                                  • Drops file in System32 directory
                                                                                                                  • Modifies registry class
                                                                                                                  PID:3380
                                                                                                                  • C:\Windows\SysWOW64\Mjhqjg32.exe
                                                                                                                    C:\Windows\system32\Mjhqjg32.exe
                                                                                                                    57⤵
                                                                                                                    • Executes dropped EXE
                                                                                                                    • Drops file in System32 directory
                                                                                                                    PID:2960
                                                                                                                    • C:\Windows\SysWOW64\Mpaifalo.exe
                                                                                                                      C:\Windows\system32\Mpaifalo.exe
                                                                                                                      58⤵
                                                                                                                      • Adds autorun key to be loaded by Explorer.exe on startup
                                                                                                                      • Executes dropped EXE
                                                                                                                      • Drops file in System32 directory
                                                                                                                      PID:772
                                                                                                                      • C:\Windows\SysWOW64\Mglack32.exe
                                                                                                                        C:\Windows\system32\Mglack32.exe
                                                                                                                        59⤵
                                                                                                                        • Executes dropped EXE
                                                                                                                        • Modifies registry class
                                                                                                                        PID:468
                                                                                                                        • C:\Windows\SysWOW64\Maaepd32.exe
                                                                                                                          C:\Windows\system32\Maaepd32.exe
                                                                                                                          60⤵
                                                                                                                          • Adds autorun key to be loaded by Explorer.exe on startup
                                                                                                                          • Executes dropped EXE
                                                                                                                          • Modifies registry class
                                                                                                                          PID:4872
                                                                                                                          • C:\Windows\SysWOW64\Mcbahlip.exe
                                                                                                                            C:\Windows\system32\Mcbahlip.exe
                                                                                                                            61⤵
                                                                                                                            • Adds autorun key to be loaded by Explorer.exe on startup
                                                                                                                            • Executes dropped EXE
                                                                                                                            • Drops file in System32 directory
                                                                                                                            PID:3892
                                                                                                                            • C:\Windows\SysWOW64\Nqfbaq32.exe
                                                                                                                              C:\Windows\system32\Nqfbaq32.exe
                                                                                                                              62⤵
                                                                                                                              • Adds autorun key to be loaded by Explorer.exe on startup
                                                                                                                              • Executes dropped EXE
                                                                                                                              • Drops file in System32 directory
                                                                                                                              PID:5028
                                                                                                                              • C:\Windows\SysWOW64\Ngpjnkpf.exe
                                                                                                                                C:\Windows\system32\Ngpjnkpf.exe
                                                                                                                                63⤵
                                                                                                                                • Executes dropped EXE
                                                                                                                                • Drops file in System32 directory
                                                                                                                                • Modifies registry class
                                                                                                                                PID:4464
                                                                                                                                • C:\Windows\SysWOW64\Nafokcol.exe
                                                                                                                                  C:\Windows\system32\Nafokcol.exe
                                                                                                                                  64⤵
                                                                                                                                  • Executes dropped EXE
                                                                                                                                  • Drops file in System32 directory
                                                                                                                                  PID:4256
                                                                                                                                  • C:\Windows\SysWOW64\Njacpf32.exe
                                                                                                                                    C:\Windows\system32\Njacpf32.exe
                                                                                                                                    65⤵
                                                                                                                                    • Adds autorun key to be loaded by Explorer.exe on startup
                                                                                                                                    • Executes dropped EXE
                                                                                                                                    • Modifies registry class
                                                                                                                                    PID:388
                                                                                                                                    • C:\Windows\SysWOW64\Nbhkac32.exe
                                                                                                                                      C:\Windows\system32\Nbhkac32.exe
                                                                                                                                      66⤵
                                                                                                                                      • Adds autorun key to be loaded by Explorer.exe on startup
                                                                                                                                      • Drops file in System32 directory
                                                                                                                                      PID:372
                                                                                                                                      • C:\Windows\SysWOW64\Nkqpjidj.exe
                                                                                                                                        C:\Windows\system32\Nkqpjidj.exe
                                                                                                                                        67⤵
                                                                                                                                        • Adds autorun key to be loaded by Explorer.exe on startup
                                                                                                                                        • Drops file in System32 directory
                                                                                                                                        • Modifies registry class
                                                                                                                                        PID:804
                                                                                                                                        • C:\Windows\SysWOW64\Ndidbn32.exe
                                                                                                                                          C:\Windows\system32\Ndidbn32.exe
                                                                                                                                          68⤵
                                                                                                                                          • Modifies registry class
                                                                                                                                          PID:1948
                                                                                                                                          • C:\Windows\SysWOW64\Nkcmohbg.exe
                                                                                                                                            C:\Windows\system32\Nkcmohbg.exe
                                                                                                                                            69⤵
                                                                                                                                              PID:4112
                                                                                                                                              • C:\Windows\SysWOW64\WerFault.exe
                                                                                                                                                C:\Windows\SysWOW64\WerFault.exe -u -p 4112 -s 412
                                                                                                                                                70⤵
                                                                                                                                                • Program crash
                                                                                                                                                PID:4592
    • C:\Windows\SysWOW64\WerFault.exe
      C:\Windows\SysWOW64\WerFault.exe -pss -s 408 -p 4112 -ip 4112
      1⤵
        PID:4228

      Network

            MITRE ATT&CK Enterprise v15

            Replay Monitor

            Loading Replay Monitor...

            Downloads

            • C:\Windows\SysWOW64\Iabgaklg.exe

              Filesize

              96KB

              MD5

              90be1eca9c3914b4329836f75cb3e722

              SHA1

              85d79b3f7e5318998bb9417d9c2a63df4241ab2f

              SHA256

              8af093e0a618497debcce0153b9e457908b62e3dad711f73137739e67ca0bbd0

              SHA512

              789c8dbd48dc4bedd6a1019e562656a42e601c93fea565a94520e97c78736c781b377667bf043f6c884eb3912cd0d2b8bb2ed8c553e59d1147f081f8262ae9a7

            • C:\Windows\SysWOW64\Iannfk32.exe

              Filesize

              96KB

              MD5

              0b0f3af9ecffd2fc1a74f50b780f11bd

              SHA1

              da1d52eabec24b74097f1c43e63c4a3c6a80fbe4

              SHA256

              19ccbec8e04a53ab13531e576a886fb74877f1d22fa76673bad02b9468d4879b

              SHA512

              d199bc0b1bdaf5f05b3443b8db11651e9dddcbf48fa2ad0e3af0561dec370476ece6cd032baa94eac9105358662101bc063675a4a35d5faea8d00b88396fb5c0

            • C:\Windows\SysWOW64\Iapjlk32.exe

              Filesize

              96KB

              MD5

              dcd0ebdcf7b1c0f5666ab31d845cbb9c

              SHA1

              9247ef3605e4c8049f4df920e8a8be5345bbf20f

              SHA256

              0d0e9decbb77c44a44a3226a2a69247d7738059e90d1b2067e63c099b46065b0

              SHA512

              db69803e5a4da40baf5be367bd1897343b819a74ca7e3620d290da102bc5f8ce664a67157058635726010e47dd1d25b98793d1face3b2336971176899e91f277

            • C:\Windows\SysWOW64\Ibagcc32.exe

              Filesize

              96KB

              MD5

              8d8e8fb2a3c36317ab98bf4d96b811c3

              SHA1

              2d4ee24a85aea3f1eceaf3e3640c0df69291e898

              SHA256

              0211359b9301f11e9d849750821861e3b74135b23eb65d9b709a95addb541afa

              SHA512

              31246da69f76ac4de62f821dceafef2bf47060ba36d91105ed082e805529cb3e174fcbf1dc208db67dfb87300fdcbe87c763c54e601d4b43f9e3a6f966d59faa

            • C:\Windows\SysWOW64\Ibojncfj.exe

              Filesize

              96KB

              MD5

              a9490288cf409f2eae3e1b08f18e97fb

              SHA1

              0770b783c732ff832fb2ab6f93fbe7cbd156ff4a

              SHA256

              93d0169261bae6cfbb68b579d2e170ab63d65c24befa8f8482e03c336d623d4f

              SHA512

              018cf0476646c31bc411a92ac2328b40b37e0facfe0a55bc3ae76c026027eda89c228f236779d6dd5807d5398181cfa344ecd8ef2263417ac52d4007f6c64c29

            • C:\Windows\SysWOW64\Ifhiib32.exe

              Filesize

              96KB

              MD5

              4cdfeb1114d3f6d05c1ab084259f5486

              SHA1

              3fde9993d86deba0d199444455a77f8d1f702938

              SHA256

              a3b7cb11d470aa952931463e56764a4a806cb86bea9f5df6851395f8c40839fe

              SHA512

              1c5f28a16e4916d0d45391c900dce33ca1a6762a7065f1ec69e9cc198007ac874727b73fd15464e0bbee216f58957884e30496811764376e473babea818f5dc2

            • C:\Windows\SysWOW64\Ifmcdblq.exe

              Filesize

              96KB

              MD5

              db52f330c854639f404ccfa8afb85a5b

              SHA1

              6e429689afb7647907dd716bb7f1ff207ccbc370

              SHA256

              1f32315033d8947d8e2d9b7e762f500fdd5405cad3daca91a25cd8bf98733a19

              SHA512

              24d8d4a6b75405ced69662e3ea6f51a0affeb94d11633bd46bdc953194132bc919245f48768b4d6e3885d31baefe28903fcc606ffba15af9d65fa17c902ef654

            • C:\Windows\SysWOW64\Ifopiajn.exe

              Filesize

              96KB

              MD5

              07bbbbf6ad8fcd2549b40ee631e628cc

              SHA1

              5af315ed8dfd50b00c52e31da108a74e4094707e

              SHA256

              803d368ef5f6ba0726373a1e21472acae801590ce74c7c1071b2db0077a77475

              SHA512

              f433180b9e4014e56982c0efa41d3016dcefa72441f09d869007828a1a8cf89f1ee2292e07deb4825aaf7269b029d94966c263d8a0e876ea6f10daad2c4bd56a

            • C:\Windows\SysWOW64\Iiffen32.exe

              Filesize

              96KB

              MD5

              c23c0d45fb1b34c846ea79a38bb7b433

              SHA1

              9c8d71cb394ece48ea1b9eb00c85ed5846556515

              SHA256

              d4bfc5539cd510d596e60d6ea1aefde0ab487103758d3bf80269d81b43269140

              SHA512

              9162ad7da657c1df84523dae877ab9a12092810577cc63b5c94ea1bd786674963cdecc28f5f38277deda9e82758465f1563d610cce11684a7397798716adb890

            • C:\Windows\SysWOW64\Ijfboafl.exe

              Filesize

              96KB

              MD5

              b9e3e83df736b9353c71a265bc679418

              SHA1

              20fd536ed78559de2de9b21f0cc97d78657b472c

              SHA256

              437ab4ce1bb27166fb61e1a4ce4c1b4ee4fab872b3fdbcc53c95db42c15684a6

              SHA512

              e5f89b4987aa978d7be41d524d293ab70329fb98069e93e95561cdd88399eee2b78e571ec2ec9e949833968148901d906a944ec7e620331c21d04e7f4cf3b530

            • C:\Windows\SysWOW64\Ipegmg32.exe

              Filesize

              96KB

              MD5

              4b936fdbf3a41b38130cce44ca7f6b03

              SHA1

              eaf6cbe0e3b8151f2691642105e6afccf5a8d91e

              SHA256

              e8dc02c94f198892967a20387b35acbc6d985c63d7f56793c89368ea75d66240

              SHA512

              2e4a9b3265bb2e6188a27118a1b73c9fdecc53d477b8aad15b96cc6fdc87656693b24231cc43b7aeeb13cd409113c649a0dc31ebfad2f311a0e13952f8c1d05d

            • C:\Windows\SysWOW64\Jaedgjjd.exe

              Filesize

              96KB

              MD5

              03d5b583d2cae63b22994d428410069a

              SHA1

              22748f83c0b974c76e08683f2046aa64d120c7a1

              SHA256

              d76058d510ebd28f2319028b96ae2557c3ca66cb2b8f8684c41b7fefd182a601

              SHA512

              8240610cc749c29d8fb234b2eb963d65dc39f5ae99db6323e9e7e0e6da2c44c607d48026094122b2257dc4ca05048860f63fcabb930aada6c226684864eeabe4

            • C:\Windows\SysWOW64\Jagqlj32.exe

              Filesize

              96KB

              MD5

              e662c921ea49f15089e20292f17227db

              SHA1

              c57c19f7fd61e85be41abf22dbeacf70dfe644c3

              SHA256

              921da76b3e55d9337bc69d656c4e91cec147810c2ddf97af2f2b1429ba6cec03

              SHA512

              3ca655650ec7379d833789a4d33072c657ed1517df7aa9e1e13c156ca123e618c505826f0b3c6fc778a39ae96da3aab2ef6892d0ee36c09f980ec00f6602a51c

            • C:\Windows\SysWOW64\Jbmfoa32.exe

              Filesize

              96KB

              MD5

              270bccef35d863f2d65671a8ce8c0053

              SHA1

              e5a133b723c5a49e88f83e4bfc9caef52e2260c8

              SHA256

              f02cd2a2f6bb55964494a08409ffd690d3672613d1a702083f520c28f0dc93ce

              SHA512

              e259c386e67d6ac7422e2c6722899e7c884358814529531619d11656d5cdd8c35ca7c20770bed49ec4637f2bd739fbf7129019983fb27b81c4017c578e830d4e

            • C:\Windows\SysWOW64\Jdcpcf32.exe

              Filesize

              96KB

              MD5

              f7e1847ee8a136eac9bcbfc513bda90c

              SHA1

              db4562fc46db739a3571e3f5f17fd16b52f73b64

              SHA256

              2180f8686dabb406ef2e8474119665d6756d7478554cde53267674a2b9afcbdc

              SHA512

              553c76b485bb7aced4cffbb4515282a50d7ed08690d5c5a9d931241b563fe6ba331818abb66acd06e33c4d507729139441563dfc70661ab8896899756f327a96

            • C:\Windows\SysWOW64\Jdemhe32.exe

              Filesize

              96KB

              MD5

              cde9ca17f1a23aa9220da974e4d0bfd1

              SHA1

              cb8cff2e696fdc7488d7d1c7c39e58f28ad8bafb

              SHA256

              ae09c9a97db7cb781fe59a364aed03cc545e84a82b8e3d36e800ee2494218a33

              SHA512

              dc2e494b3b82d8422473a669558eec042e7df072bdb4814b70844da8f861d16d355fed471de208b1b6cafebfa26efd9359ad9701ad97c089238f4ac16ec22848

            • C:\Windows\SysWOW64\Jdhine32.exe

              Filesize

              96KB

              MD5

              e77536b4908479dc9c4d43ef8ab4e4ca

              SHA1

              84b5db8f83792a6e80ab9514f99688bedc86d68f

              SHA256

              e83684594be245ff4911c942edb31eddad86d9c03f0e1afbb88105848e283391

              SHA512

              d655e23ebe51fabb90feceb73d38e5a8b060a322cd9df99befaf4db17250ce564c46f89f06398901ea97488957408a9a7c3b0522cf9d3299472a6779dd88c602

            • C:\Windows\SysWOW64\Jdmcidam.exe

              Filesize

              96KB

              MD5

              989a6f1424f2fca2024dd09c2f73521b

              SHA1

              3eef09efdc91d977f5add93be081f7d633e0bc6c

              SHA256

              c323826c0079aca86ead3d7ad4d6f7ff3681bdfcd634934b2a699b2de94b5ff8

              SHA512

              7ae49669967af0a5cf80125f4abff66daec13a773f1394f26b916796302f1c5a4ce68140e596dfc5aa0255af97cce2206c92ef7b1cb9157dfeed1738399b4965

            • C:\Windows\SysWOW64\Jfdida32.exe

              Filesize

              96KB

              MD5

              56a748f303a6e7d4a343a47ccff964ab

              SHA1

              23067f5224a0837cf69ced3ee553b0ee9b7edb29

              SHA256

              23d2fa654acb01f70a7d5f0d23a4770ab5930b6cf139b033fa30ed9e379da44c

              SHA512

              ce3a5ee1735c3513006acfc95ef2b52a8f649371c6af8508f19196af935e9a82aa6c237caac95410502669e9b3bd559d1818e5a1c916db87e7990968943e6b39

            • C:\Windows\SysWOW64\Jfkoeppq.exe

              Filesize

              96KB

              MD5

              9cba242444ce619202997e3db64dac53

              SHA1

              f5ae4eb945bd714456125168218ef477a2f23f0a

              SHA256

              17ffdc0fd5d492f3b0eed30831811dff67ba285f54c4af9778d1fd7c773b767a

              SHA512

              51fe58213d7909f61530213e54f12464f0204c6df3ebefb3a47890b89a9c3ecf92e612a6944de05d528cc3bbaed4a6ddfb3e9afa2c8e2d7da634d6bb11533b77

            • C:\Windows\SysWOW64\Jigollag.exe

              Filesize

              96KB

              MD5

              861daa1645b2dccfa7f0b083d0043333

              SHA1

              076f7f3e6a6807c6f164b1c318b5a7f6171e66e3

              SHA256

              2c986a06e576374a2490d5bf26fc4a6a810c43dd9e3b6aead798b0c94893e506

              SHA512

              384499c7dcbbc4db7fa0e9768fb27b6ced4df3177f17951a91efde5dbcff4fa37ce10d9837235cc34bc3194c2541af40c699dff21da7a410e5cf92da4055da3a

            • C:\Windows\SysWOW64\Jjbako32.exe

              Filesize

              96KB

              MD5

              ab581512c465fd5d86f911c1a12f2093

              SHA1

              c45b18fb1bbf05cdbcc9701cf6cf7a3e031ba6de

              SHA256

              35f8eed379ca08ed859c30e0ade6fe719ed9cd640614b63a2395b8f959995721

              SHA512

              4df2f4055d6b39a7c1a3492548a20604315b8d614e06c96075e903da0a79893484386209a6759bfed6c8d6902dd13e80ee49c793a8c0ac5502434011b96b9fea

            • C:\Windows\SysWOW64\Jmnaakne.exe

              Filesize

              96KB

              MD5

              5b4a7f6bacd1ac9c8e72f18684495cbe

              SHA1

              7bd17b7d53bca09bf15ba98d1e751457550ee45f

              SHA256

              84224765dced85bfcf4c40f2956a0c154dfb3750ac226f28f99948a25b335985

              SHA512

              8fec14781040d6fc59ad6661ea7849616d1d9f77f867f4ff2215ef2269469f5d12600654c11436328996bde3e81189661630dde1726334df5f28992f7c1a2156

            • C:\Windows\SysWOW64\Jmpngk32.exe

              Filesize

              96KB

              MD5

              27b1db8a6c133641947a69503905fe87

              SHA1

              ab67397b1b0414f79b40bc2011f65f156ac9dd75

              SHA256

              35fb46a829064d177fbd9703f35cc23765fd4f6ed17510099b09d3409bd9a707

              SHA512

              22cf4c09fde72c821cdb8c98d5662c0aa8c8b4cc944bc549d3c647fc9a94f564ac6437edd771cdd16aa46c9e8f664db565ae2c9f86dc52c057caad1594a8f2f3

            • C:\Windows\SysWOW64\Kacphh32.exe

              Filesize

              96KB

              MD5

              5cc92fb419740b671ba939cd289e2ca6

              SHA1

              916f63c256b4b851221f04a228b9fb952025e11c

              SHA256

              25cc9eccd313f94d0086e86f1e1e3c44afa002e5f3df6afddbba815612abb0e3

              SHA512

              3acefbf18106c760d2bdb2c6a586e282175d63281ee3ac27d7515ee331cefe9e145a83f6976ad26abed09b40971a1140d2b649fb15e61d2736fab24a92ffc8c0

            • C:\Windows\SysWOW64\Kdaldd32.exe

              Filesize

              96KB

              MD5

              69c67b0f49c866bff175685a610104c7

              SHA1

              23512085733f64ea0904f329c0e8bc9614ba513d

              SHA256

              103b6fa7afb7b8a6765fa9f04d6391f4b0012179554e75847e53409033846cb3

              SHA512

              9fad01253956ea1a1c8127b3ff3e4ab93715e41bd83474ae8f990ba64d97fbc7b6e3b7145e61e41f35ed263866d2e0a84094777b330491cb1e2712833d04c08c

            • C:\Windows\SysWOW64\Kdcijcke.exe

              Filesize

              96KB

              MD5

              63b33de2430dae31f10862ca142b8e56

              SHA1

              9271238726e48e6a31ce006082eaa9fcb2d89096

              SHA256

              8ba6c4c1b76996456b6cc20782decf37cf0c455ebc4380f92537d886d2987266

              SHA512

              650562a09e6332c39d75328f3fcccb4c012a1c3b133ad3d70d6642b1aaf17eb50df2aae4270515ff1cdebfb0afc3ce095733f2432cf7b84a9f5681117bd2d063

            • C:\Windows\SysWOW64\Kgmlkp32.exe

              Filesize

              96KB

              MD5

              3cce9233642bb3664ad5749bf3cefce0

              SHA1

              6693817f1a5fb3ca67f5e3699e8bf957f3387d1b

              SHA256

              68b58570a6be773faef92d1083e0ad328f67c0465115f2d4a8183798b7e9f285

              SHA512

              35accee682adb1935007a0a25aaf871f7079520c0a4cfe8d159dab41e2899f555b109015eb6ffbbf54a5eda390e928fe5b4759a826d436df9875ee63acb219d0

            • C:\Windows\SysWOW64\Kkkdan32.exe

              Filesize

              96KB

              MD5

              bf1b6a29e360e3315121d3c1c4990d77

              SHA1

              d980b0395da27a5796ead6a8a39f7f54cbd476e4

              SHA256

              89d5e4b47fe3017f939c198650d7931099865a9d32fe5dce4c296659f657b045

              SHA512

              af4edf912a1e9db307a4dcc80ae5d27114e3db07851c9d7e8f4141abfdae212f95e9043943a24eee7e653f07a55d358002a0cad8823750288a67a721a15826c9

            • C:\Windows\SysWOW64\Kknafn32.exe

              Filesize

              96KB

              MD5

              767470089ed434e1836eaab38e0e8491

              SHA1

              1639ea0da1d42e6356320eba6336a5548f945733

              SHA256

              e0bc7ce2bc2dda2e8b3318dc1e33025cb40947257a9338b3bc79bf79c34e33c0

              SHA512

              1f358cd61b871ea51fbc393b55773995fda6636afa7ed6dc21ac6bea0c4280bb39a37733e5c2c017ed395e3c7b3abec0c43bb020d942c7e18886b0a932a9354a

            • C:\Windows\SysWOW64\Kmegbjgn.exe

              Filesize

              96KB

              MD5

              cd92b5a50c63fd499642e21f68a25dc0

              SHA1

              6087c21a6cfceb64602683de050eec4c90ad52fd

              SHA256

              763e5b63c83dc36800bdf7c0e8ec50937165eb6ba612b58805ddafdee0291c6f

              SHA512

              5f2bf3ed0183df869df2bd6f8990de3b5420b0d2246c7a1dba7f20f63b46bb98c1bf27e602ac76a3b05a4b7f42c7083d8d3c1d2c0e14077ebf41f32a1359a7d4

            • C:\Windows\SysWOW64\Kpccnefa.exe

              Filesize

              96KB

              MD5

              0a209a181964ab52edfc15eafe338229

              SHA1

              b8ebba3b5ef9a314f9c968785870e835d9c7ff25

              SHA256

              bcf272ff31b65a49485cd25f7139c55863f3f3df9e30d0ffb5f3fa82095365e2

              SHA512

              9f07c9178e182483597ac3eec912f773f0076865d2b509612def92e2aa9def3cc0fb31ddf7c9ab75dc618264107226ec46b45f7484bbced851a51780d18ef7e9

            • C:\Windows\SysWOW64\Ldaeka32.exe

              Filesize

              96KB

              MD5

              26e524603b22fc1f05130a6c23d64bf0

              SHA1

              e80b83e5d07d8a78cfffe2af482b88fb2ded2702

              SHA256

              2c8c57d9f749fdbbdd07906ef18d9c66ed0959bc5e68cb794824e7d3f87746a2

              SHA512

              fccf8bb9e8afe22bcae5b583e7ba2a4cb9420e44da9332e2dd2a4dcd43c99c95870b2a0529963d7bd91104eb04e0bf534433cefcae82cea03bbb16f2d05ff5d4

            • C:\Windows\SysWOW64\Lgkhlnbn.exe

              Filesize

              96KB

              MD5

              25841e0f7c5fb96b36bab6bf0b530549

              SHA1

              2004f9fd2306744566e5bfb9c8b2b8ec6c5c7c9a

              SHA256

              addb106cb8e96036d1fd303fb9b1e1ac9f14d900f28c7c9ec6a414bed915a27d

              SHA512

              4d4fed54b8413300ad39fe4287f86f98d90488a20bf9c00d9c2294960c045b43565337680dbb3dc988750c1b75b3d841098d52ab061e4417d7d7f4cf0a0588a3

            • C:\Windows\SysWOW64\Mnlfigcc.exe

              Filesize

              96KB

              MD5

              d6f88630e7dfb445530d87dcbfa36347

              SHA1

              1c56c04f4f3fcde546464b7eb32eb1a0349abdd9

              SHA256

              09a9a85d50abbb12b87a76da1be4f4ff7245be8b0abc3f508627b430fc7e3f6b

              SHA512

              bbac012e7400bc458b660a3868716cff0305bcf69c1986323a61b115b04b2a0ab9e81f367a97f6dee79d6cabcf6554d8086901c6784a0231e0fc77ca7ad668d1

            • C:\Windows\SysWOW64\Mpaifalo.exe

              Filesize

              96KB

              MD5

              4fb95590ef25e46129a198059ed733ff

              SHA1

              2eb85871247681c189596afaf90f354d15f614fa

              SHA256

              f9ea4f0353892fd30776dc4cdf9eb4ecd8d776afa0db70d2e5b257d31b2e1d67

              SHA512

              a4297ae2c427e3540035b5a775fb1472f7ca064850783a3e58104125e462b2d2b81ffc2db3f976658de2f3103e4109154ada2c908c8793fc6931cdd5c76319cb

            • C:\Windows\SysWOW64\Mpmokb32.exe

              Filesize

              96KB

              MD5

              07a41eae8dc88110633b93c31266f969

              SHA1

              b4a68af976ba1a2af3f81786164811d16b7d6ad3

              SHA256

              05a0b16ce83aa60a4a7145642f53305f9738864037e15468ef4248e62385e829

              SHA512

              0f5fc95c5d3ba2262607b364cc571b9f11c90c4d72a0236d0b0dc0bbeff4537e43a767d18547eefa9b707492d3772988e6cbc8bcad90dfad9084b9f855019b93

            • C:\Windows\SysWOW64\Ngpjnkpf.exe

              Filesize

              96KB

              MD5

              218b88ba7ad3ceb00cc9a8a62250fe8d

              SHA1

              449512081db7397c7d1804e223831631b926efc1

              SHA256

              788afb9d4335e92d8ee713fc61f66ea422429de57630ce33e15f058101cdd9da

              SHA512

              c003393edf21248b47f6792f5b69c9e18fd193bbd2134a512f1e6f3dfeca14e4d2a93d81ef498628a301a895b6c0e89b08fa0871e03ad168018b19b6140c8cf0

            • C:\Windows\SysWOW64\Nkqpjidj.exe

              Filesize

              96KB

              MD5

              8edf153d2590c29785ef00e8d20cd057

              SHA1

              4edb117f5b079d629e6fc6aa07301fabbc3c6046

              SHA256

              3699c4eae65219f3f236febc7a6f387d1b4770707e0720eafcb0ea84c95b680f

              SHA512

              fe90436f46d0f3afc00b01ccde59ceab317f5773d561277d74d8e4104701f2544c05c622297c9313230b20d50e6c1e0964e2f2e043a242ad5f156254bb21cea1

            • memory/8-74-0x0000000000400000-0x0000000000444000-memory.dmp

              Filesize

              272KB

            • memory/8-160-0x0000000000400000-0x0000000000444000-memory.dmp

              Filesize

              272KB

            • memory/432-326-0x0000000000400000-0x0000000000444000-memory.dmp

              Filesize

              272KB

            • memory/432-395-0x0000000000400000-0x0000000000444000-memory.dmp

              Filesize

              272KB

            • memory/440-179-0x0000000000400000-0x0000000000444000-memory.dmp

              Filesize

              272KB

            • memory/440-266-0x0000000000400000-0x0000000000444000-memory.dmp

              Filesize

              272KB

            • memory/448-368-0x0000000000400000-0x0000000000444000-memory.dmp

              Filesize

              272KB

            • memory/456-421-0x0000000000400000-0x0000000000444000-memory.dmp

              Filesize

              272KB

            • memory/676-396-0x0000000000400000-0x0000000000444000-memory.dmp

              Filesize

              272KB

            • memory/700-196-0x0000000000400000-0x0000000000444000-memory.dmp

              Filesize

              272KB

            • memory/700-108-0x0000000000400000-0x0000000000444000-memory.dmp

              Filesize

              272KB

            • memory/748-312-0x0000000000400000-0x0000000000444000-memory.dmp

              Filesize

              272KB

            • memory/748-381-0x0000000000400000-0x0000000000444000-memory.dmp

              Filesize

              272KB

            • memory/868-332-0x0000000000400000-0x0000000000444000-memory.dmp

              Filesize

              272KB

            • memory/868-259-0x0000000000400000-0x0000000000444000-memory.dmp

              Filesize

              272KB

            • memory/1052-186-0x0000000000400000-0x0000000000444000-memory.dmp

              Filesize

              272KB

            • memory/1052-100-0x0000000000400000-0x0000000000444000-memory.dmp

              Filesize

              272KB

            • memory/1080-374-0x0000000000400000-0x0000000000444000-memory.dmp

              Filesize

              272KB

            • memory/1080-305-0x0000000000400000-0x0000000000444000-memory.dmp

              Filesize

              272KB

            • memory/1088-408-0x0000000000400000-0x0000000000444000-memory.dmp

              Filesize

              272KB

            • memory/1128-42-0x0000000000400000-0x0000000000444000-memory.dmp

              Filesize

              272KB

            • memory/1128-125-0x0000000000400000-0x0000000000444000-memory.dmp

              Filesize

              272KB

            • memory/1196-420-0x0000000000400000-0x0000000000444000-memory.dmp

              Filesize

              272KB

            • memory/1196-347-0x0000000000400000-0x0000000000444000-memory.dmp

              Filesize

              272KB

            • memory/1256-367-0x0000000000400000-0x0000000000444000-memory.dmp

              Filesize

              272KB

            • memory/1256-298-0x0000000000400000-0x0000000000444000-memory.dmp

              Filesize

              272KB

            • memory/1260-222-0x0000000000400000-0x0000000000444000-memory.dmp

              Filesize

              272KB

            • memory/1260-135-0x0000000000400000-0x0000000000444000-memory.dmp

              Filesize

              272KB

            • memory/1356-382-0x0000000000400000-0x0000000000444000-memory.dmp

              Filesize

              272KB

            • memory/1408-285-0x0000000000400000-0x0000000000444000-memory.dmp

              Filesize

              272KB

            • memory/1408-357-0x0000000000400000-0x0000000000444000-memory.dmp

              Filesize

              272KB

            • memory/1472-268-0x0000000000400000-0x0000000000444000-memory.dmp

              Filesize

              272KB

            • memory/1472-339-0x0000000000400000-0x0000000000444000-memory.dmp

              Filesize

              272KB

            • memory/1540-290-0x0000000000400000-0x0000000000444000-memory.dmp

              Filesize

              272KB

            • memory/1540-206-0x0000000000400000-0x0000000000444000-memory.dmp

              Filesize

              272KB

            • memory/1552-90-0x0000000000400000-0x0000000000444000-memory.dmp

              Filesize

              272KB

            • memory/1552-13-0x0000000000400000-0x0000000000444000-memory.dmp

              Filesize

              272KB

            • memory/1560-410-0x0000000000400000-0x0000000000444000-memory.dmp

              Filesize

              272KB

            • memory/1604-249-0x0000000000400000-0x0000000000444000-memory.dmp

              Filesize

              272KB

            • memory/1604-161-0x0000000000400000-0x0000000000444000-memory.dmp

              Filesize

              272KB

            • memory/1616-375-0x0000000000400000-0x0000000000444000-memory.dmp

              Filesize

              272KB

            • memory/1636-48-0x0000000000400000-0x0000000000444000-memory.dmp

              Filesize

              272KB

            • memory/1636-134-0x0000000000400000-0x0000000000444000-memory.dmp

              Filesize

              272KB

            • memory/1692-197-0x0000000000400000-0x0000000000444000-memory.dmp

              Filesize

              272KB

            • memory/1692-283-0x0000000000400000-0x0000000000444000-memory.dmp

              Filesize

              272KB

            • memory/2064-73-0x0000000000400000-0x0000000000444000-memory.dmp

              Filesize

              272KB

            • memory/2064-5-0x0000000000431000-0x0000000000432000-memory.dmp

              Filesize

              4KB

            • memory/2064-0-0x0000000000400000-0x0000000000444000-memory.dmp

              Filesize

              272KB

            • memory/2092-169-0x0000000000400000-0x0000000000444000-memory.dmp

              Filesize

              272KB

            • memory/2092-82-0x0000000000400000-0x0000000000444000-memory.dmp

              Filesize

              272KB

            • memory/2356-37-0x0000000000400000-0x0000000000444000-memory.dmp

              Filesize

              272KB

            • memory/2484-99-0x0000000000400000-0x0000000000444000-memory.dmp

              Filesize

              272KB

            • memory/2484-21-0x0000000000400000-0x0000000000444000-memory.dmp

              Filesize

              272KB

            • memory/2600-276-0x0000000000400000-0x0000000000444000-memory.dmp

              Filesize

              272KB

            • memory/2600-346-0x0000000000400000-0x0000000000444000-memory.dmp

              Filesize

              272KB

            • memory/2724-275-0x0000000000400000-0x0000000000444000-memory.dmp

              Filesize

              272KB

            • memory/2724-187-0x0000000000400000-0x0000000000444000-memory.dmp

              Filesize

              272KB

            • memory/2760-333-0x0000000000400000-0x0000000000444000-memory.dmp

              Filesize

              272KB

            • memory/2760-406-0x0000000000400000-0x0000000000444000-memory.dmp

              Filesize

              272KB

            • memory/2820-360-0x0000000000400000-0x0000000000444000-memory.dmp

              Filesize

              272KB

            • memory/2820-295-0x0000000000400000-0x0000000000444000-memory.dmp

              Filesize

              272KB

            • memory/3096-232-0x0000000000400000-0x0000000000444000-memory.dmp

              Filesize

              272KB

            • memory/3096-311-0x0000000000400000-0x0000000000444000-memory.dmp

              Filesize

              272KB

            • memory/3176-258-0x0000000000400000-0x0000000000444000-memory.dmp

              Filesize

              272KB

            • memory/3176-170-0x0000000000400000-0x0000000000444000-memory.dmp

              Filesize

              272KB

            • memory/3312-130-0x0000000000400000-0x0000000000444000-memory.dmp

              Filesize

              272KB

            • memory/3432-214-0x0000000000400000-0x0000000000444000-memory.dmp

              Filesize

              272KB

            • memory/3432-297-0x0000000000400000-0x0000000000444000-memory.dmp

              Filesize

              272KB

            • memory/3500-304-0x0000000000400000-0x0000000000444000-memory.dmp

              Filesize

              272KB

            • memory/3500-227-0x0000000000400000-0x0000000000444000-memory.dmp

              Filesize

              272KB

            • memory/3584-409-0x0000000000400000-0x0000000000444000-memory.dmp

              Filesize

              272KB

            • memory/3584-340-0x0000000000400000-0x0000000000444000-memory.dmp

              Filesize

              272KB

            • memory/3628-359-0x0000000000400000-0x0000000000444000-memory.dmp

              Filesize

              272KB

            • memory/3748-61-0x0000000000400000-0x0000000000444000-memory.dmp

              Filesize

              272KB

            • memory/3920-250-0x0000000000400000-0x0000000000444000-memory.dmp

              Filesize

              272KB

            • memory/3920-325-0x0000000000400000-0x0000000000444000-memory.dmp

              Filesize

              272KB

            • memory/4132-120-0x0000000000400000-0x0000000000444000-memory.dmp

              Filesize

              272KB

            • memory/4132-205-0x0000000000400000-0x0000000000444000-memory.dmp

              Filesize

              272KB

            • memory/4236-241-0x0000000000400000-0x0000000000444000-memory.dmp

              Filesize

              272KB

            • memory/4236-318-0x0000000000400000-0x0000000000444000-memory.dmp

              Filesize

              272KB

            • memory/4424-319-0x0000000000400000-0x0000000000444000-memory.dmp

              Filesize

              272KB

            • memory/4424-388-0x0000000000400000-0x0000000000444000-memory.dmp

              Filesize

              272KB

            • memory/4484-107-0x0000000000400000-0x0000000000444000-memory.dmp

              Filesize

              272KB

            • memory/4484-25-0x0000000000400000-0x0000000000444000-memory.dmp

              Filesize

              272KB

            • memory/4632-389-0x0000000000400000-0x0000000000444000-memory.dmp

              Filesize

              272KB

            • memory/4636-91-0x0000000000400000-0x0000000000444000-memory.dmp

              Filesize

              272KB

            • memory/4636-178-0x0000000000400000-0x0000000000444000-memory.dmp

              Filesize

              272KB

            • memory/4692-429-0x0000000000400000-0x0000000000444000-memory.dmp

              Filesize

              272KB

            • memory/4692-361-0x0000000000400000-0x0000000000444000-memory.dmp

              Filesize

              272KB

            • memory/4784-231-0x0000000000400000-0x0000000000444000-memory.dmp

              Filesize

              272KB

            • memory/4784-143-0x0000000000400000-0x0000000000444000-memory.dmp

              Filesize

              272KB

            • memory/4860-152-0x0000000000400000-0x0000000000444000-memory.dmp

              Filesize

              272KB

            • memory/4860-239-0x0000000000400000-0x0000000000444000-memory.dmp

              Filesize

              272KB

            • memory/4876-151-0x0000000000400000-0x0000000000444000-memory.dmp

              Filesize

              272KB

            • memory/4876-65-0x0000000000400000-0x0000000000444000-memory.dmp

              Filesize

              272KB

            • memory/4968-427-0x0000000000400000-0x0000000000444000-memory.dmp

              Filesize

              272KB