Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    143s
  • max time network
    149s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240508-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system
  • submitted
    16/05/2024, 17:49

General

  • Target

    04c6b0c7aa01eae38c4fa59bb0dd5780_NeikiAnalytics.exe

  • Size

    305KB

  • MD5

    04c6b0c7aa01eae38c4fa59bb0dd5780

  • SHA1

    b496f50307e2ae237d606f9309da87471908b327

  • SHA256

    6db171d925573d499a586d6906d2a687c73ddc2e370a6c6a0f749bf0fc29b95f

  • SHA512

    522c57707e790ac984ff927fe3411fd16f9614a14e28256ff6f86bde8909beff6e3e32ee96d95984bd5a3b862b67ff029c8284c39f6527b44b2803525fb2a6d9

  • SSDEEP

    6144:DS+hOXRLFYNxunXe8yhrtMsQBvli+RQFdq:2+hnvAO8qRMsrOQF

Malware Config

Signatures

  • Adds autorun key to be loaded by Explorer.exe on startup 2 TTPs 64 IoCs
  • Malware Dropper & Backdoor - Berbew 32 IoCs

    Berbew is a backdoor Trojan malware with capabilities to download and install a range of additional malicious software, such as other Trojans, ransomware, and cryptominers.

  • Executes dropped EXE 64 IoCs
  • Drops file in System32 directory 64 IoCs
  • Program crash 1 IoCs
  • Modifies registry class 64 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\04c6b0c7aa01eae38c4fa59bb0dd5780_NeikiAnalytics.exe
    "C:\Users\Admin\AppData\Local\Temp\04c6b0c7aa01eae38c4fa59bb0dd5780_NeikiAnalytics.exe"
    1⤵
    • Adds autorun key to be loaded by Explorer.exe on startup
    • Drops file in System32 directory
    • Modifies registry class
    • Suspicious use of WriteProcessMemory
    PID:3768
    • C:\Windows\SysWOW64\Kinemkko.exe
      C:\Windows\system32\Kinemkko.exe
      2⤵
      • Executes dropped EXE
      • Drops file in System32 directory
      • Suspicious use of WriteProcessMemory
      PID:216
      • C:\Windows\SysWOW64\Kgbefoji.exe
        C:\Windows\system32\Kgbefoji.exe
        3⤵
        • Executes dropped EXE
        • Drops file in System32 directory
        • Suspicious use of WriteProcessMemory
        PID:1004
        • C:\Windows\SysWOW64\Kmlnbi32.exe
          C:\Windows\system32\Kmlnbi32.exe
          4⤵
          • Adds autorun key to be loaded by Explorer.exe on startup
          • Executes dropped EXE
          • Drops file in System32 directory
          • Modifies registry class
          • Suspicious use of WriteProcessMemory
          PID:1360
          • C:\Windows\SysWOW64\Kcifkp32.exe
            C:\Windows\system32\Kcifkp32.exe
            5⤵
            • Adds autorun key to be loaded by Explorer.exe on startup
            • Executes dropped EXE
            • Modifies registry class
            • Suspicious use of WriteProcessMemory
            PID:5048
            • C:\Windows\SysWOW64\Kkpnlm32.exe
              C:\Windows\system32\Kkpnlm32.exe
              6⤵
              • Executes dropped EXE
              • Drops file in System32 directory
              • Modifies registry class
              • Suspicious use of WriteProcessMemory
              PID:3400
              • C:\Windows\SysWOW64\Kdhbec32.exe
                C:\Windows\system32\Kdhbec32.exe
                7⤵
                • Adds autorun key to be loaded by Explorer.exe on startup
                • Executes dropped EXE
                • Drops file in System32 directory
                • Modifies registry class
                • Suspicious use of WriteProcessMemory
                PID:3576
                • C:\Windows\SysWOW64\Kckbqpnj.exe
                  C:\Windows\system32\Kckbqpnj.exe
                  8⤵
                  • Adds autorun key to be loaded by Explorer.exe on startup
                  • Executes dropped EXE
                  • Drops file in System32 directory
                  • Suspicious use of WriteProcessMemory
                  PID:4080
                  • C:\Windows\SysWOW64\Kkbkamnl.exe
                    C:\Windows\system32\Kkbkamnl.exe
                    9⤵
                    • Executes dropped EXE
                    • Drops file in System32 directory
                    • Modifies registry class
                    • Suspicious use of WriteProcessMemory
                    PID:4504
                    • C:\Windows\SysWOW64\Lmqgnhmp.exe
                      C:\Windows\system32\Lmqgnhmp.exe
                      10⤵
                      • Adds autorun key to be loaded by Explorer.exe on startup
                      • Executes dropped EXE
                      • Modifies registry class
                      • Suspicious use of WriteProcessMemory
                      PID:1556
                      • C:\Windows\SysWOW64\Lalcng32.exe
                        C:\Windows\system32\Lalcng32.exe
                        11⤵
                        • Executes dropped EXE
                        • Drops file in System32 directory
                        • Modifies registry class
                        • Suspicious use of WriteProcessMemory
                        PID:4528
                        • C:\Windows\SysWOW64\Ldkojb32.exe
                          C:\Windows\system32\Ldkojb32.exe
                          12⤵
                          • Adds autorun key to be loaded by Explorer.exe on startup
                          • Executes dropped EXE
                          • Suspicious use of WriteProcessMemory
                          PID:4184
                          • C:\Windows\SysWOW64\Lcmofolg.exe
                            C:\Windows\system32\Lcmofolg.exe
                            13⤵
                            • Executes dropped EXE
                            • Drops file in System32 directory
                            • Suspicious use of WriteProcessMemory
                            PID:3948
                            • C:\Windows\SysWOW64\Lgikfn32.exe
                              C:\Windows\system32\Lgikfn32.exe
                              14⤵
                              • Executes dropped EXE
                              • Modifies registry class
                              • Suspicious use of WriteProcessMemory
                              PID:4656
                              • C:\Windows\SysWOW64\Lkdggmlj.exe
                                C:\Windows\system32\Lkdggmlj.exe
                                15⤵
                                • Adds autorun key to be loaded by Explorer.exe on startup
                                • Executes dropped EXE
                                • Suspicious use of WriteProcessMemory
                                PID:2980
                                • C:\Windows\SysWOW64\Liggbi32.exe
                                  C:\Windows\system32\Liggbi32.exe
                                  16⤵
                                  • Adds autorun key to be loaded by Explorer.exe on startup
                                  • Executes dropped EXE
                                  • Drops file in System32 directory
                                  • Suspicious use of WriteProcessMemory
                                  PID:392
                                  • C:\Windows\SysWOW64\Laopdgcg.exe
                                    C:\Windows\system32\Laopdgcg.exe
                                    17⤵
                                    • Adds autorun key to be loaded by Explorer.exe on startup
                                    • Executes dropped EXE
                                    • Drops file in System32 directory
                                    • Suspicious use of WriteProcessMemory
                                    PID:892
                                    • C:\Windows\SysWOW64\Lpappc32.exe
                                      C:\Windows\system32\Lpappc32.exe
                                      18⤵
                                      • Adds autorun key to be loaded by Explorer.exe on startup
                                      • Executes dropped EXE
                                      • Drops file in System32 directory
                                      • Suspicious use of WriteProcessMemory
                                      PID:4748
                                      • C:\Windows\SysWOW64\Ldmlpbbj.exe
                                        C:\Windows\system32\Ldmlpbbj.exe
                                        19⤵
                                        • Executes dropped EXE
                                        • Drops file in System32 directory
                                        • Suspicious use of WriteProcessMemory
                                        PID:1220
                                        • C:\Windows\SysWOW64\Lcpllo32.exe
                                          C:\Windows\system32\Lcpllo32.exe
                                          20⤵
                                          • Adds autorun key to be loaded by Explorer.exe on startup
                                          • Executes dropped EXE
                                          • Drops file in System32 directory
                                          • Modifies registry class
                                          • Suspicious use of WriteProcessMemory
                                          PID:3308
                                          • C:\Windows\SysWOW64\Lkgdml32.exe
                                            C:\Windows\system32\Lkgdml32.exe
                                            21⤵
                                            • Adds autorun key to be loaded by Explorer.exe on startup
                                            • Executes dropped EXE
                                            • Modifies registry class
                                            • Suspicious use of WriteProcessMemory
                                            PID:2248
                                            • C:\Windows\SysWOW64\Lijdhiaa.exe
                                              C:\Windows\system32\Lijdhiaa.exe
                                              22⤵
                                              • Executes dropped EXE
                                              • Drops file in System32 directory
                                              • Modifies registry class
                                              • Suspicious use of WriteProcessMemory
                                              PID:4488
                                              • C:\Windows\SysWOW64\Lnepih32.exe
                                                C:\Windows\system32\Lnepih32.exe
                                                23⤵
                                                • Adds autorun key to be loaded by Explorer.exe on startup
                                                • Executes dropped EXE
                                                • Drops file in System32 directory
                                                PID:1280
                                                • C:\Windows\SysWOW64\Laalifad.exe
                                                  C:\Windows\system32\Laalifad.exe
                                                  24⤵
                                                  • Adds autorun key to be loaded by Explorer.exe on startup
                                                  • Executes dropped EXE
                                                  • Drops file in System32 directory
                                                  PID:2840
                                                  • C:\Windows\SysWOW64\Lpcmec32.exe
                                                    C:\Windows\system32\Lpcmec32.exe
                                                    25⤵
                                                    • Adds autorun key to be loaded by Explorer.exe on startup
                                                    • Executes dropped EXE
                                                    • Modifies registry class
                                                    PID:3500
                                                    • C:\Windows\SysWOW64\Lcbiao32.exe
                                                      C:\Windows\system32\Lcbiao32.exe
                                                      26⤵
                                                      • Adds autorun key to be loaded by Explorer.exe on startup
                                                      • Executes dropped EXE
                                                      • Drops file in System32 directory
                                                      • Modifies registry class
                                                      PID:4788
                                                      • C:\Windows\SysWOW64\Lgneampk.exe
                                                        C:\Windows\system32\Lgneampk.exe
                                                        27⤵
                                                        • Executes dropped EXE
                                                        • Drops file in System32 directory
                                                        • Modifies registry class
                                                        PID:3256
                                                        • C:\Windows\SysWOW64\Lkiqbl32.exe
                                                          C:\Windows\system32\Lkiqbl32.exe
                                                          28⤵
                                                          • Adds autorun key to be loaded by Explorer.exe on startup
                                                          • Executes dropped EXE
                                                          PID:5016
                                                          • C:\Windows\SysWOW64\Lilanioo.exe
                                                            C:\Windows\system32\Lilanioo.exe
                                                            29⤵
                                                            • Adds autorun key to be loaded by Explorer.exe on startup
                                                            • Executes dropped EXE
                                                            PID:2860
                                                            • C:\Windows\SysWOW64\Lnhmng32.exe
                                                              C:\Windows\system32\Lnhmng32.exe
                                                              30⤵
                                                              • Adds autorun key to be loaded by Explorer.exe on startup
                                                              • Executes dropped EXE
                                                              • Drops file in System32 directory
                                                              PID:3076
                                                              • C:\Windows\SysWOW64\Laciofpa.exe
                                                                C:\Windows\system32\Laciofpa.exe
                                                                31⤵
                                                                • Executes dropped EXE
                                                                • Drops file in System32 directory
                                                                • Modifies registry class
                                                                PID:1632
                                                                • C:\Windows\SysWOW64\Lpfijcfl.exe
                                                                  C:\Windows\system32\Lpfijcfl.exe
                                                                  32⤵
                                                                  • Executes dropped EXE
                                                                  • Drops file in System32 directory
                                                                  PID:3564
                                                                  • C:\Windows\SysWOW64\Lcdegnep.exe
                                                                    C:\Windows\system32\Lcdegnep.exe
                                                                    33⤵
                                                                    • Executes dropped EXE
                                                                    • Drops file in System32 directory
                                                                    • Modifies registry class
                                                                    PID:3108
                                                                    • C:\Windows\SysWOW64\Lgpagm32.exe
                                                                      C:\Windows\system32\Lgpagm32.exe
                                                                      34⤵
                                                                      • Executes dropped EXE
                                                                      • Drops file in System32 directory
                                                                      • Modifies registry class
                                                                      PID:1792
                                                                      • C:\Windows\SysWOW64\Lklnhlfb.exe
                                                                        C:\Windows\system32\Lklnhlfb.exe
                                                                        35⤵
                                                                        • Adds autorun key to be loaded by Explorer.exe on startup
                                                                        • Executes dropped EXE
                                                                        • Modifies registry class
                                                                        PID:4100
                                                                        • C:\Windows\SysWOW64\Ljnnch32.exe
                                                                          C:\Windows\system32\Ljnnch32.exe
                                                                          36⤵
                                                                          • Adds autorun key to be loaded by Explorer.exe on startup
                                                                          • Executes dropped EXE
                                                                          • Modifies registry class
                                                                          PID:448
                                                                          • C:\Windows\SysWOW64\Lnjjdgee.exe
                                                                            C:\Windows\system32\Lnjjdgee.exe
                                                                            37⤵
                                                                            • Executes dropped EXE
                                                                            • Modifies registry class
                                                                            PID:2156
                                                                            • C:\Windows\SysWOW64\Laefdf32.exe
                                                                              C:\Windows\system32\Laefdf32.exe
                                                                              38⤵
                                                                              • Adds autorun key to be loaded by Explorer.exe on startup
                                                                              • Executes dropped EXE
                                                                              • Drops file in System32 directory
                                                                              PID:2544
                                                                              • C:\Windows\SysWOW64\Lddbqa32.exe
                                                                                C:\Windows\system32\Lddbqa32.exe
                                                                                39⤵
                                                                                • Adds autorun key to be loaded by Explorer.exe on startup
                                                                                • Executes dropped EXE
                                                                                PID:3616
                                                                                • C:\Windows\SysWOW64\Lcgblncm.exe
                                                                                  C:\Windows\system32\Lcgblncm.exe
                                                                                  40⤵
                                                                                  • Adds autorun key to be loaded by Explorer.exe on startup
                                                                                  • Executes dropped EXE
                                                                                  • Drops file in System32 directory
                                                                                  PID:4360
                                                                                  • C:\Windows\SysWOW64\Lgbnmm32.exe
                                                                                    C:\Windows\system32\Lgbnmm32.exe
                                                                                    41⤵
                                                                                    • Adds autorun key to be loaded by Explorer.exe on startup
                                                                                    • Executes dropped EXE
                                                                                    • Drops file in System32 directory
                                                                                    PID:224
                                                                                    • C:\Windows\SysWOW64\Lknjmkdo.exe
                                                                                      C:\Windows\system32\Lknjmkdo.exe
                                                                                      42⤵
                                                                                      • Executes dropped EXE
                                                                                      • Drops file in System32 directory
                                                                                      • Modifies registry class
                                                                                      PID:1192
                                                                                      • C:\Windows\SysWOW64\Mjqjih32.exe
                                                                                        C:\Windows\system32\Mjqjih32.exe
                                                                                        43⤵
                                                                                        • Adds autorun key to be loaded by Explorer.exe on startup
                                                                                        • Executes dropped EXE
                                                                                        • Modifies registry class
                                                                                        PID:4340
                                                                                        • C:\Windows\SysWOW64\Mnlfigcc.exe
                                                                                          C:\Windows\system32\Mnlfigcc.exe
                                                                                          44⤵
                                                                                          • Executes dropped EXE
                                                                                          • Modifies registry class
                                                                                          PID:3092
                                                                                          • C:\Windows\SysWOW64\Mahbje32.exe
                                                                                            C:\Windows\system32\Mahbje32.exe
                                                                                            45⤵
                                                                                            • Adds autorun key to be loaded by Explorer.exe on startup
                                                                                            • Executes dropped EXE
                                                                                            PID:3004
                                                                                            • C:\Windows\SysWOW64\Mpkbebbf.exe
                                                                                              C:\Windows\system32\Mpkbebbf.exe
                                                                                              46⤵
                                                                                              • Adds autorun key to be loaded by Explorer.exe on startup
                                                                                              • Executes dropped EXE
                                                                                              • Drops file in System32 directory
                                                                                              • Modifies registry class
                                                                                              PID:5004
                                                                                              • C:\Windows\SysWOW64\Mciobn32.exe
                                                                                                C:\Windows\system32\Mciobn32.exe
                                                                                                47⤵
                                                                                                • Executes dropped EXE
                                                                                                • Drops file in System32 directory
                                                                                                • Modifies registry class
                                                                                                PID:888
                                                                                                • C:\Windows\SysWOW64\Mgekbljc.exe
                                                                                                  C:\Windows\system32\Mgekbljc.exe
                                                                                                  48⤵
                                                                                                  • Adds autorun key to be loaded by Explorer.exe on startup
                                                                                                  • Executes dropped EXE
                                                                                                  PID:1872
                                                                                                  • C:\Windows\SysWOW64\Mkpgck32.exe
                                                                                                    C:\Windows\system32\Mkpgck32.exe
                                                                                                    49⤵
                                                                                                    • Adds autorun key to be loaded by Explorer.exe on startup
                                                                                                    • Executes dropped EXE
                                                                                                    • Drops file in System32 directory
                                                                                                    • Modifies registry class
                                                                                                    PID:3056
                                                                                                    • C:\Windows\SysWOW64\Mjcgohig.exe
                                                                                                      C:\Windows\system32\Mjcgohig.exe
                                                                                                      50⤵
                                                                                                      • Adds autorun key to be loaded by Explorer.exe on startup
                                                                                                      • Executes dropped EXE
                                                                                                      • Modifies registry class
                                                                                                      PID:840
                                                                                                      • C:\Windows\SysWOW64\Mnocof32.exe
                                                                                                        C:\Windows\system32\Mnocof32.exe
                                                                                                        51⤵
                                                                                                        • Executes dropped EXE
                                                                                                        • Modifies registry class
                                                                                                        PID:8
                                                                                                        • C:\Windows\SysWOW64\Majopeii.exe
                                                                                                          C:\Windows\system32\Majopeii.exe
                                                                                                          52⤵
                                                                                                          • Adds autorun key to be loaded by Explorer.exe on startup
                                                                                                          • Executes dropped EXE
                                                                                                          • Drops file in System32 directory
                                                                                                          • Modifies registry class
                                                                                                          PID:1764
                                                                                                          • C:\Windows\SysWOW64\Mpmokb32.exe
                                                                                                            C:\Windows\system32\Mpmokb32.exe
                                                                                                            53⤵
                                                                                                            • Adds autorun key to be loaded by Explorer.exe on startup
                                                                                                            • Executes dropped EXE
                                                                                                            PID:2828
                                                                                                            • C:\Windows\SysWOW64\Mdiklqhm.exe
                                                                                                              C:\Windows\system32\Mdiklqhm.exe
                                                                                                              54⤵
                                                                                                              • Adds autorun key to be loaded by Explorer.exe on startup
                                                                                                              • Executes dropped EXE
                                                                                                              • Modifies registry class
                                                                                                              PID:3008
                                                                                                              • C:\Windows\SysWOW64\Mgghhlhq.exe
                                                                                                                C:\Windows\system32\Mgghhlhq.exe
                                                                                                                55⤵
                                                                                                                • Adds autorun key to be loaded by Explorer.exe on startup
                                                                                                                • Executes dropped EXE
                                                                                                                PID:3812
                                                                                                                • C:\Windows\SysWOW64\Mkbchk32.exe
                                                                                                                  C:\Windows\system32\Mkbchk32.exe
                                                                                                                  56⤵
                                                                                                                  • Executes dropped EXE
                                                                                                                  • Modifies registry class
                                                                                                                  PID:2052
                                                                                                                  • C:\Windows\SysWOW64\Mjeddggd.exe
                                                                                                                    C:\Windows\system32\Mjeddggd.exe
                                                                                                                    57⤵
                                                                                                                    • Adds autorun key to be loaded by Explorer.exe on startup
                                                                                                                    • Executes dropped EXE
                                                                                                                    PID:980
                                                                                                                    • C:\Windows\SysWOW64\Mnapdf32.exe
                                                                                                                      C:\Windows\system32\Mnapdf32.exe
                                                                                                                      58⤵
                                                                                                                      • Adds autorun key to be loaded by Explorer.exe on startup
                                                                                                                      • Executes dropped EXE
                                                                                                                      • Drops file in System32 directory
                                                                                                                      • Modifies registry class
                                                                                                                      PID:3820
                                                                                                                      • C:\Windows\SysWOW64\Mamleegg.exe
                                                                                                                        C:\Windows\system32\Mamleegg.exe
                                                                                                                        59⤵
                                                                                                                        • Executes dropped EXE
                                                                                                                        PID:3248
                                                                                                                        • C:\Windows\SysWOW64\Mpolqa32.exe
                                                                                                                          C:\Windows\system32\Mpolqa32.exe
                                                                                                                          60⤵
                                                                                                                          • Adds autorun key to be loaded by Explorer.exe on startup
                                                                                                                          • Executes dropped EXE
                                                                                                                          • Drops file in System32 directory
                                                                                                                          PID:4920
                                                                                                                          • C:\Windows\SysWOW64\Mdkhapfj.exe
                                                                                                                            C:\Windows\system32\Mdkhapfj.exe
                                                                                                                            61⤵
                                                                                                                            • Executes dropped EXE
                                                                                                                            • Drops file in System32 directory
                                                                                                                            • Modifies registry class
                                                                                                                            PID:2592
                                                                                                                            • C:\Windows\SysWOW64\Mgidml32.exe
                                                                                                                              C:\Windows\system32\Mgidml32.exe
                                                                                                                              62⤵
                                                                                                                              • Executes dropped EXE
                                                                                                                              • Drops file in System32 directory
                                                                                                                              PID:1440
                                                                                                                              • C:\Windows\SysWOW64\Mkepnjng.exe
                                                                                                                                C:\Windows\system32\Mkepnjng.exe
                                                                                                                                63⤵
                                                                                                                                • Executes dropped EXE
                                                                                                                                • Drops file in System32 directory
                                                                                                                                PID:1992
                                                                                                                                • C:\Windows\SysWOW64\Mjhqjg32.exe
                                                                                                                                  C:\Windows\system32\Mjhqjg32.exe
                                                                                                                                  64⤵
                                                                                                                                  • Adds autorun key to be loaded by Explorer.exe on startup
                                                                                                                                  • Executes dropped EXE
                                                                                                                                  • Drops file in System32 directory
                                                                                                                                  • Modifies registry class
                                                                                                                                  PID:1956
                                                                                                                                  • C:\Windows\SysWOW64\Mncmjfmk.exe
                                                                                                                                    C:\Windows\system32\Mncmjfmk.exe
                                                                                                                                    65⤵
                                                                                                                                    • Adds autorun key to be loaded by Explorer.exe on startup
                                                                                                                                    • Executes dropped EXE
                                                                                                                                    • Drops file in System32 directory
                                                                                                                                    • Modifies registry class
                                                                                                                                    PID:2324
                                                                                                                                    • C:\Windows\SysWOW64\Maohkd32.exe
                                                                                                                                      C:\Windows\system32\Maohkd32.exe
                                                                                                                                      66⤵
                                                                                                                                      • Drops file in System32 directory
                                                                                                                                      PID:4396
                                                                                                                                      • C:\Windows\SysWOW64\Mpaifalo.exe
                                                                                                                                        C:\Windows\system32\Mpaifalo.exe
                                                                                                                                        67⤵
                                                                                                                                        • Drops file in System32 directory
                                                                                                                                        PID:764
                                                                                                                                        • C:\Windows\SysWOW64\Mnfipekh.exe
                                                                                                                                          C:\Windows\system32\Mnfipekh.exe
                                                                                                                                          68⤵
                                                                                                                                          • Adds autorun key to be loaded by Explorer.exe on startup
                                                                                                                                          • Drops file in System32 directory
                                                                                                                                          PID:5084
                                                                                                                                          • C:\Windows\SysWOW64\Mpdelajl.exe
                                                                                                                                            C:\Windows\system32\Mpdelajl.exe
                                                                                                                                            69⤵
                                                                                                                                            • Adds autorun key to be loaded by Explorer.exe on startup
                                                                                                                                            • Drops file in System32 directory
                                                                                                                                            • Modifies registry class
                                                                                                                                            PID:4972
                                                                                                                                            • C:\Windows\SysWOW64\Mdpalp32.exe
                                                                                                                                              C:\Windows\system32\Mdpalp32.exe
                                                                                                                                              70⤵
                                                                                                                                              • Drops file in System32 directory
                                                                                                                                              • Modifies registry class
                                                                                                                                              PID:4764
                                                                                                                                              • C:\Windows\SysWOW64\Mcbahlip.exe
                                                                                                                                                C:\Windows\system32\Mcbahlip.exe
                                                                                                                                                71⤵
                                                                                                                                                • Adds autorun key to be loaded by Explorer.exe on startup
                                                                                                                                                • Modifies registry class
                                                                                                                                                PID:436
                                                                                                                                                • C:\Windows\SysWOW64\Nkjjij32.exe
                                                                                                                                                  C:\Windows\system32\Nkjjij32.exe
                                                                                                                                                  72⤵
                                                                                                                                                  • Adds autorun key to be loaded by Explorer.exe on startup
                                                                                                                                                  PID:4108
                                                                                                                                                  • C:\Windows\SysWOW64\Njljefql.exe
                                                                                                                                                    C:\Windows\system32\Njljefql.exe
                                                                                                                                                    73⤵
                                                                                                                                                    • Drops file in System32 directory
                                                                                                                                                    • Modifies registry class
                                                                                                                                                    PID:2680
                                                                                                                                                    • C:\Windows\SysWOW64\Nnhfee32.exe
                                                                                                                                                      C:\Windows\system32\Nnhfee32.exe
                                                                                                                                                      74⤵
                                                                                                                                                      • Adds autorun key to be loaded by Explorer.exe on startup
                                                                                                                                                      • Modifies registry class
                                                                                                                                                      PID:1056
                                                                                                                                                      • C:\Windows\SysWOW64\Nqfbaq32.exe
                                                                                                                                                        C:\Windows\system32\Nqfbaq32.exe
                                                                                                                                                        75⤵
                                                                                                                                                        • Adds autorun key to be loaded by Explorer.exe on startup
                                                                                                                                                        PID:2920
                                                                                                                                                        • C:\Windows\SysWOW64\Nklfoi32.exe
                                                                                                                                                          C:\Windows\system32\Nklfoi32.exe
                                                                                                                                                          76⤵
                                                                                                                                                          • Adds autorun key to be loaded by Explorer.exe on startup
                                                                                                                                                          • Drops file in System32 directory
                                                                                                                                                          PID:4116
                                                                                                                                                          • C:\Windows\SysWOW64\Ngedij32.exe
                                                                                                                                                            C:\Windows\system32\Ngedij32.exe
                                                                                                                                                            77⤵
                                                                                                                                                            • Adds autorun key to be loaded by Explorer.exe on startup
                                                                                                                                                            • Drops file in System32 directory
                                                                                                                                                            • Modifies registry class
                                                                                                                                                            PID:3904
                                                                                                                                                            • C:\Windows\SysWOW64\Njcpee32.exe
                                                                                                                                                              C:\Windows\system32\Njcpee32.exe
                                                                                                                                                              78⤵
                                                                                                                                                              • Adds autorun key to be loaded by Explorer.exe on startup
                                                                                                                                                              • Drops file in System32 directory
                                                                                                                                                              PID:2916
                                                                                                                                                              • C:\Windows\SysWOW64\Nnolfdcn.exe
                                                                                                                                                                C:\Windows\system32\Nnolfdcn.exe
                                                                                                                                                                79⤵
                                                                                                                                                                • Adds autorun key to be loaded by Explorer.exe on startup
                                                                                                                                                                • Drops file in System32 directory
                                                                                                                                                                • Modifies registry class
                                                                                                                                                                PID:544
                                                                                                                                                                • C:\Windows\SysWOW64\Nqmhbpba.exe
                                                                                                                                                                  C:\Windows\system32\Nqmhbpba.exe
                                                                                                                                                                  80⤵
                                                                                                                                                                  • Modifies registry class
                                                                                                                                                                  PID:3264
                                                                                                                                                                  • C:\Windows\SysWOW64\Ndidbn32.exe
                                                                                                                                                                    C:\Windows\system32\Ndidbn32.exe
                                                                                                                                                                    81⤵
                                                                                                                                                                    • Adds autorun key to be loaded by Explorer.exe on startup
                                                                                                                                                                    PID:924
                                                                                                                                                                    • C:\Windows\SysWOW64\Ncldnkae.exe
                                                                                                                                                                      C:\Windows\system32\Ncldnkae.exe
                                                                                                                                                                      82⤵
                                                                                                                                                                      • Drops file in System32 directory
                                                                                                                                                                      • Modifies registry class
                                                                                                                                                                      PID:3416
                                                                                                                                                                      • C:\Windows\SysWOW64\Nggqoj32.exe
                                                                                                                                                                        C:\Windows\system32\Nggqoj32.exe
                                                                                                                                                                        83⤵
                                                                                                                                                                          PID:4352
                                                                                                                                                                          • C:\Windows\SysWOW64\Nkcmohbg.exe
                                                                                                                                                                            C:\Windows\system32\Nkcmohbg.exe
                                                                                                                                                                            84⤵
                                                                                                                                                                              PID:748
                                                                                                                                                                              • C:\Windows\SysWOW64\WerFault.exe
                                                                                                                                                                                C:\Windows\SysWOW64\WerFault.exe -u -p 748 -s 412
                                                                                                                                                                                85⤵
                                                                                                                                                                                • Program crash
                                                                                                                                                                                PID:4388
      • C:\Windows\SysWOW64\WerFault.exe
        C:\Windows\SysWOW64\WerFault.exe -pss -s 408 -p 748 -ip 748
        1⤵
          PID:956

        Network

        MITRE ATT&CK Enterprise v15

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • C:\Windows\SysWOW64\Eeecjqkd.dll

          Filesize

          7KB

          MD5

          63adcd5530e1a339a2d5a435c00e2ee4

          SHA1

          333b84d105c482124f83b43d15b45cd350fa6532

          SHA256

          0d6e93e0727302536356d0e9db498320ed4d0686adf9e1fb13cfd9721c0c7e04

          SHA512

          d493f526ce6f5680e800d4cfbff474aa408fa5fd6fa50935b5a08d768748f41c9b086418a5513ea6db2f7b35d9d59a593d5cd895471ac266b6c2fd200d2774a3

        • C:\Windows\SysWOW64\Kcifkp32.exe

          Filesize

          305KB

          MD5

          846035846229f09a9f33e6596c9f8e54

          SHA1

          5e5551dfc286596ca87c9421b4c7b00c143d8fc9

          SHA256

          320e350a398624bb07aa495f90e2b65f8bc7099d7e0ee6b814180ebc31975d9a

          SHA512

          29292d430284710118c90d09042516db7f1eee580aa9839b63ddfcbae078c75fa249cda7dd9955608fa51c1173e924f001246ccb6b329a18ba3a9ed4f2552e17

        • C:\Windows\SysWOW64\Kckbqpnj.exe

          Filesize

          305KB

          MD5

          9c05abc672e7ce64dee3776958e91d4e

          SHA1

          39d373538c74655095a35bd32d5360993bdc3166

          SHA256

          ec58ff5b34c1d1de70ca6373622c6a2282b1e42ea991e4667ef8751dd99b2b65

          SHA512

          e194b6ee6aea9f4cbd89fb3b5ab6daec1d994f05eada37532c6cfc9e01c3a19a0a250fe6e1635f3c8738a9eff912064d7864e9b4bcf2d748d3922e877e032588

        • C:\Windows\SysWOW64\Kdhbec32.exe

          Filesize

          305KB

          MD5

          80c6001f21c780dd4a4240c0f37f7f79

          SHA1

          da87ba9497de205c3e5dcb13c6333a0071e98e89

          SHA256

          78fc670fa76fc577a4a0dfbf82d058b40f119ef850b6336c6ae63ad008b4a9eb

          SHA512

          16f657b8dba03a95b0d97e88d63edc1065abeaac6ba00686f0627573e0d81e2e18b799e7ccceff42784dbb7b93f9a0e37778554e8151ebdea7d3d067980d60f4

        • C:\Windows\SysWOW64\Kgbefoji.exe

          Filesize

          305KB

          MD5

          74872a2900ffaf9e9872d9b285e1579e

          SHA1

          6d65b8a1129601997905e641e0ad832d690582be

          SHA256

          b2408fd01f5fa82f8c9f775de37e87e0eb3e6d50606dd015cf3ee68c425990a1

          SHA512

          5f1f1aae42915d6bd3760555cb79492494f5cb4f03c524a00d22d54f9b12f45de8d2d6881f8b5a81c614570015abe9c210ce4f79bf03f2320cc586e019a7d13b

        • C:\Windows\SysWOW64\Kinemkko.exe

          Filesize

          305KB

          MD5

          2f346e06f2f53ae628582daaa772d742

          SHA1

          297d93354efdddd75f98255e8eb877744c30d40e

          SHA256

          61b101b6901de9753c223a98239db309dc66f1659da12a00d872436f2fd3fde1

          SHA512

          1240c619883f05f6d405168f337ca8d10cc60f813ebb378462afed865e2cfeea3f8766ba510700b9d8318c481a51bf40db9ffa5f4be4de40bac09fef246fba38

        • C:\Windows\SysWOW64\Kkbkamnl.exe

          Filesize

          305KB

          MD5

          8e0a132ae9cbe4f55481297d88855367

          SHA1

          3fe3a9ec237bce40082639d19a5e38a6e7d8c42f

          SHA256

          310b5611ca02dd09689cdb9026375338d20e6d3bad2de0ad5de5265de5661916

          SHA512

          c93171de905b1055609b1d9de872a1426158d2fe30fe57134eb202b33784fe00e0b972bb2ffb1286a0cc1f9546ea43ec41241f2b4cb50d6dac1d89f649dd1863

        • C:\Windows\SysWOW64\Kkpnlm32.exe

          Filesize

          305KB

          MD5

          696efee2d267c4bdac2c6e5f66aa6b4f

          SHA1

          8f17f26ef1a0ccf0c2b2758a8a211994bd4830d7

          SHA256

          856f6acd303d3b62f53e784da62d548d82873179a7103112696d7599f4f6cb0a

          SHA512

          46fa429987ffc4308e14377bad8d88e738067c2a9693ade98c0987849860b1b5283d14b88a3ee7aea7cff622df3c64a1c9e974bea5270fd3891a5f24077dadab

        • C:\Windows\SysWOW64\Kmlnbi32.exe

          Filesize

          305KB

          MD5

          4a83c413fa0fb55a0837b17b7dd961d8

          SHA1

          c5394f3608d524159aca760ffc9941810b89cf1b

          SHA256

          2d79973a3d6768a5c139ae78d7ac9312f01f67dd7e96c8a95c66aa976b3bb860

          SHA512

          e4df345707360325a9e5c65392a3ec5106f2981a70fd0816fd2b13631ddd7ccb7c26ef8a8e53deda57deaf70f32ec3f5c755fbb85edd197258addaf348af22ed

        • C:\Windows\SysWOW64\Laalifad.exe

          Filesize

          305KB

          MD5

          9245bbedf1253973a8eaa6b98510a3ec

          SHA1

          09f6c6bd4fcd67199d97f9c207be68b4fd90734c

          SHA256

          8cdb1ff6b59ad623d0b1bbf13408383781e08fa34b5aeffcd070260bdba8be1a

          SHA512

          b6126c250e53cf1f5f300fc8edfce3c7a0da657583e020de98b00efb2c1b6e2482152929236c07467e8ca3cd012eedfaa294e597814125182c50225be5c6137a

        • C:\Windows\SysWOW64\Laciofpa.exe

          Filesize

          305KB

          MD5

          73404733b5ab7d5519a7d2cf399f8a95

          SHA1

          718fe54efb93c93837e282a016a1152cd0a68df1

          SHA256

          2f5780b8f076b05469c1c41a3db61a658fd4dc4f38634c7c4fc161cfdf1e2fef

          SHA512

          e007c08d9894a7fd4e4713a0c79658ac482a894a6fb8dc2a7a0b1491e31a71660a90f0ac4cc0ab174f364d4c7af899cd5c47e58f7468a59897df1d48ff1bf0d7

        • C:\Windows\SysWOW64\Lalcng32.exe

          Filesize

          305KB

          MD5

          ce0f070f97067d70d24bd170e1c97eef

          SHA1

          f316287736f8305043c10080562b97897cfa33fc

          SHA256

          66116c64fe8092de41b855dc4816c14e0dfa79c5689a3bc818025a6ce531e235

          SHA512

          c8442f0e83261a2722b052d868ff5030998459120dd89b04b5fdaf0d6d690cef6a549b0547dd397c835127a66c9f162fe2cd4198efaae5967a5167964303baec

        • C:\Windows\SysWOW64\Laopdgcg.exe

          Filesize

          305KB

          MD5

          f15ea5f7d2a07756774db75cdcfaa637

          SHA1

          e44c9071405b2af182c7054c1bd837927968e71d

          SHA256

          d9be67e9b58a4598ca0e2e5e9a7a19a8f1f290da48c6244e7962c157d973e86e

          SHA512

          04b4dccfdc507b0dcb95ed70041d9efd724bc3c28be551f461d3c09afa6a1a9fcead4fbc96cd77b51b60863f50a94caef727463ffa1c74aef5fb4e5174309545

        • C:\Windows\SysWOW64\Lcbiao32.exe

          Filesize

          305KB

          MD5

          e5ba8e64a07b388e1cec63d2d31a3b34

          SHA1

          ceec54ac2254c75041aa0b64493681914c07e36b

          SHA256

          3aaebf95e7fcd5d37c48a0bda0de88d9be781b4d9cd4157483d2c73a914f37ac

          SHA512

          b2515b9f7b6ae13e19068bb97cecc4251dbccdcd9e2cf8ccc1a46adbdf1bb2995fa4e71e4989103660f1b47153426fba93f4e670b6b572c62f14e0b3a959afba

        • C:\Windows\SysWOW64\Lcdegnep.exe

          Filesize

          305KB

          MD5

          ff44a5730f92c2fe5926c8379bb26388

          SHA1

          543881868b78d8b1f7942b0aedef05d3c89af170

          SHA256

          843f8c3a8a29d2914b57b9927f3af80f374c58a1d6606ff7ec92557e1ddde65a

          SHA512

          fdd9ac063371fc13ec2a3e1ccf1ea944936c85c04a7643cb9bad1dd9674e50ed05cb28a5d038f4e8cbefef92a68fbb4662e634e1a04725eab9cb3005811524a7

        • C:\Windows\SysWOW64\Lcmofolg.exe

          Filesize

          305KB

          MD5

          2f2212ff058cdcfbf58cde085baac26e

          SHA1

          29c3334541732e5a1486b1e3416e72de0b0f464a

          SHA256

          5b21df63bf81a26033f6ee54f78b5f676838d8d0c245371f10a628ea51b103d4

          SHA512

          ade356d6fcc50ee924fc08f17bbcf3d0e8a4c8d4619c16c96ec5375e4625167c719d44db97ab005af2b9cf74eeada52fbd3c0e078750a422091726b6da5b0491

        • C:\Windows\SysWOW64\Lcpllo32.exe

          Filesize

          305KB

          MD5

          c63daf400bbff2ff0f0bcf0f8d2ed8bf

          SHA1

          0916401ca0e7aa76820be2c62eb414da47bc4c0c

          SHA256

          634a12d52238248c0f797e2022772695864c895b696296f04afcf812f3227f06

          SHA512

          a0abfc1e071a9d1d1c2350de0570e83d7d055b82b028030b20de222268de2bbb169d56c96324139cbf278b0d85cd836e3a1ea8d7bc5d6eb221011ab2b7564916

        • C:\Windows\SysWOW64\Ldkojb32.exe

          Filesize

          305KB

          MD5

          199210bfbfbd342cb4f8713d1c6c6736

          SHA1

          801bfcd62f0bee79a798a2a75cf59f04eaaa61c3

          SHA256

          260f334407f6e7403d0cb50d3baf09c4fb7dc665318b9a24d5709ab6caf73e5f

          SHA512

          291183fbae4f19da4a318effaf335b9b27cb97c74ae551f5b24fe86e29b7084916650618481ed4178b398d1fa89a64ef225de508b3d31cc4e2122cc128da50d4

        • C:\Windows\SysWOW64\Ldmlpbbj.exe

          Filesize

          305KB

          MD5

          8e0daf3e030eb81e5fd4181174c300f8

          SHA1

          4f5d3ed08ba06779942cfb1f4375de2318107fd2

          SHA256

          661d43b5bd7f47bb0db3a87d44f4173a81dfb0f5c0a0235ff38300f2fe4173e9

          SHA512

          c4533759f419538f28172a33191163a7539753e828810f758ac2a5ae88cf42aaf3646f91a62e43ec8a37d51d86227492fdf56ae78a32b342682e23957efc87cb

        • C:\Windows\SysWOW64\Lgikfn32.exe

          Filesize

          305KB

          MD5

          4907e97e42b97eca5ecc71705f05a0a4

          SHA1

          dfe1eeca2906cf7184aa17d4d09d54ab5855bd65

          SHA256

          1adc1741713e9defb3763e3a5009b6d9ee898fc57b40508f41c9aed247c53bc1

          SHA512

          bf0f967abbe71fe4994430527a3579214f5b3c441c3bacd28fbe9be3b4acc6d65e40d1bda168114d75d9d206fd55e13470f4ba65339ccce135408fa7cfca9a3f

        • C:\Windows\SysWOW64\Lgneampk.exe

          Filesize

          305KB

          MD5

          4fb2176e126c64755c0a7e2548cd61d8

          SHA1

          c6341408fa1a5a88fa34b102aacbdb242f98bf49

          SHA256

          28821edd224c80d4c24c2def53da55388b2451d3f45eafe99ec850bff5dcc11b

          SHA512

          cfdf6aaddd591f7138bfb907b0d1b05f86c9a142e7a52d79bec4156590dc65826740f51f753e40e6a7a6ab8ca4fbee4c7d2063cf7ba22b997d8f6b8b81fe11f4

        • C:\Windows\SysWOW64\Liggbi32.exe

          Filesize

          305KB

          MD5

          a7b3c3a5329464e96ea9ab0b48871bd5

          SHA1

          7a77cd2de432eaebb9c404ac3c225515cecfbc1a

          SHA256

          45ef286b32b00f25da3aba70fe118cd18feca190c8395948884389341a11db5f

          SHA512

          153a2c6ee0d7d43a745b3e8201078b2cd91305695ba4ff7372ebee5b40155e92125691e7638450ce33c15780351136866e7b3e52e4defe09c8d4b326bab9701d

        • C:\Windows\SysWOW64\Lijdhiaa.exe

          Filesize

          305KB

          MD5

          42df4a7998ac85c58dc980f2159ab41f

          SHA1

          d87088c302c90dbb16c54b57ba681d525c33b53d

          SHA256

          c212147fd3f7143fabf540f25ea9899f94be51e9353f799ad4ae49d956a831cc

          SHA512

          a935d7ecf9b411a10c3cd5c51cdf0ee613a831c215fdbc35c78708317f5146d5266387777a479dfb9fe52f4b8f7905680a42ad7c78250b6496db2d50a963cedd

        • C:\Windows\SysWOW64\Lilanioo.exe

          Filesize

          305KB

          MD5

          de82c7cf25ad8100ac745243b5e529db

          SHA1

          4709b8401c837a25e9e88c102b3e1e838398a0f1

          SHA256

          6ec4dbaba7ae79c5bb0ba1d33b53c69f4adb6e5317be83e29fe7baf0be7b9e7e

          SHA512

          2fbfcad6611e57eb3d7d8b3eb212c1cf476577584e766e5852428b635c19b3f083e83ecab15b4b42739d7071e893f80d7bc1af92bdadd98368513fbf23a69286

        • C:\Windows\SysWOW64\Lkdggmlj.exe

          Filesize

          305KB

          MD5

          36c2ad3518a621d3ce3d32d8a689a904

          SHA1

          907d7a4693c688354d938b721a2b655b3fba136d

          SHA256

          86d19b482b725318798ae0e43dd7a7fd31d56dd814dc1ba118022e81407fbc5b

          SHA512

          a991f270b2bae1dd41c6c55b10f9a9d2c2c55e1437cf8caa8e6089681a15598d3f420c49fd63b9db0fd549193a28465b5f69348b968ae9658d1d0d0c6d066362

        • C:\Windows\SysWOW64\Lkgdml32.exe

          Filesize

          305KB

          MD5

          e8cd93e55c2714c03851cd9e87202589

          SHA1

          db34444d19ae977e7a216cffe4e842cfc60b917e

          SHA256

          dc046160d5e46b5e837a4c50cee4710286e3f19160988921baeb173fd249c69a

          SHA512

          d0195fa39c3c051d344ca57ef428dfa36ab72b2976d9d74ceced4b00fbda4b586a427f74c2a8219921ef777ff6dbb29242d5d4a57e53e50d39704d0edbfbd1f3

        • C:\Windows\SysWOW64\Lkiqbl32.exe

          Filesize

          305KB

          MD5

          49f94d68718ed865e5f5dc7cddb8711f

          SHA1

          9fd668ffe0250592e91f980cab22caaddd7b6420

          SHA256

          b60f888d504adc603050ea021259d85125783ba287aa658b2d1cdf8648ba9fa0

          SHA512

          c0c4e2eb4403fa2ebf3a5f743073cd6690b71fdd0a523272eeb2d30647c18172c00f222c3db0a945fb1e1b5144eab5940624648c0926f8cfc17db8e7189a5831

        • C:\Windows\SysWOW64\Lmqgnhmp.exe

          Filesize

          305KB

          MD5

          a773f5cf728ca41b813b1b66f0b8685c

          SHA1

          c99ce7ac96f4faf7fc5f59459455e6feeb0a3122

          SHA256

          d9305ed5ccacf76bbdd0610c88ee65857565909034f9611e7c192331e74483f2

          SHA512

          e652802791af5df47607ed112461240d4a8822430ce4aaf44db57a11ac73e7d4e8dbb8e0b59e702ee42b05f65c3338c7debe6df6dd96d57a40cb2731b07e6207

        • C:\Windows\SysWOW64\Lnepih32.exe

          Filesize

          305KB

          MD5

          5055da8fd92c3aa9f823a5246112d2d4

          SHA1

          eac8e47bec94b4b3811acf01bbaf6f3af0a6c6b1

          SHA256

          9de2d4b58b54fd6b56507dc9f202e928f41e54659fbdad17b7e79091f6cd1b04

          SHA512

          6cd7a987ac0121cac93e19ed06f36a2d2a7887afb60e2d43ce021185398048c46ad8c369324cd982786934690f8954dc8263a49ce248b217d0f353d928287e48

        • C:\Windows\SysWOW64\Lnhmng32.exe

          Filesize

          305KB

          MD5

          28aeaf64277c65e72da6e7fe95d8cccc

          SHA1

          db98b4e71b98665883593e2ecb6fbbb2d0ff532b

          SHA256

          41a905d4adbb8e39bcab7d09b2ffde4148e1837152baf26fb97e9083e590b6b8

          SHA512

          692e99b9ba4aad662adf18448ab1c1f5e5780db998d3141922309ad51f5c3d8b9751281b0409e9153020438ad64c8e71cadea9a0cc58361bc146f6cafaa8c214

        • C:\Windows\SysWOW64\Lpappc32.exe

          Filesize

          305KB

          MD5

          367c172ce20cd505e173ffc507abe66d

          SHA1

          a530cd54a0c0efd41aab91d895c33b0ec8125637

          SHA256

          a5e055630b103a3fbcedd7155ee3d10a3030b8762e5edc4162ba6d5df47d6d0d

          SHA512

          f0035c90f28e19316c8cb0bab1c9a64b1726b1399803e23a524e4591edd2ebdea7b91a4d8b60f170ad0687a3ef8fa487149db2e7f277afead13251ac9d1d9214

        • C:\Windows\SysWOW64\Lpcmec32.exe

          Filesize

          305KB

          MD5

          487af12d46faa4c1491805a5b08e1b13

          SHA1

          52f866dcb6788d8687916dc3c82b5ff556e35907

          SHA256

          cc224cebc58dc5bdce48a87e931c3420821bbcd68558726d6c3687a73bd886ab

          SHA512

          98a6776bfa667c5a21173f7fd12f3bb0b519db51f88b9ffa1468af61eff22f9bc101ba80c15fcc2abefa3fbcc79df8e0c24ec62eb0f2462f1453797919175d20

        • C:\Windows\SysWOW64\Lpfijcfl.exe

          Filesize

          305KB

          MD5

          60af226bb35c6fb1b5e777e712b4fe6d

          SHA1

          f45c5058db6db335baaa321fdf15b6b7265a247a

          SHA256

          810a7e8fa4c75688bbdc83784f42eaa01d09d5722c5b6eec30fdd44bfc1f9a99

          SHA512

          a0b4fc2f15c109e7708a6cc420d57c613a120be5b1ff6802808d0ddaa42281eea2f5871470ac22606ca0b4d6f470a2304cd282009c52c03f591a11677e12892f

        • memory/8-484-0x0000000000400000-0x0000000000443000-memory.dmp

          Filesize

          268KB

        • memory/216-7-0x0000000000400000-0x0000000000443000-memory.dmp

          Filesize

          268KB

        • memory/216-565-0x0000000000400000-0x0000000000443000-memory.dmp

          Filesize

          268KB

        • memory/224-473-0x0000000000400000-0x0000000000443000-memory.dmp

          Filesize

          268KB

        • memory/392-408-0x0000000000400000-0x0000000000443000-memory.dmp

          Filesize

          268KB

        • memory/436-508-0x0000000000400000-0x0000000000443000-memory.dmp

          Filesize

          268KB

        • memory/448-468-0x0000000000400000-0x0000000000443000-memory.dmp

          Filesize

          268KB

        • memory/544-557-0x0000000000400000-0x0000000000443000-memory.dmp

          Filesize

          268KB

        • memory/748-562-0x0000000000400000-0x0000000000443000-memory.dmp

          Filesize

          268KB

        • memory/764-512-0x0000000000400000-0x0000000000443000-memory.dmp

          Filesize

          268KB

        • memory/840-483-0x0000000000400000-0x0000000000443000-memory.dmp

          Filesize

          268KB

        • memory/888-480-0x0000000000400000-0x0000000000443000-memory.dmp

          Filesize

          268KB

        • memory/892-409-0x0000000000400000-0x0000000000443000-memory.dmp

          Filesize

          268KB

        • memory/924-559-0x0000000000400000-0x0000000000443000-memory.dmp

          Filesize

          268KB

        • memory/980-490-0x0000000000400000-0x0000000000443000-memory.dmp

          Filesize

          268KB

        • memory/1004-15-0x0000000000400000-0x0000000000443000-memory.dmp

          Filesize

          268KB

        • memory/1004-564-0x0000000000400000-0x0000000000443000-memory.dmp

          Filesize

          268KB

        • memory/1056-511-0x0000000000400000-0x0000000000443000-memory.dmp

          Filesize

          268KB

        • memory/1192-475-0x0000000000400000-0x0000000000443000-memory.dmp

          Filesize

          268KB

        • memory/1220-411-0x0000000000400000-0x0000000000443000-memory.dmp

          Filesize

          268KB

        • memory/1280-415-0x0000000000400000-0x0000000000443000-memory.dmp

          Filesize

          268KB

        • memory/1360-563-0x0000000000400000-0x0000000000443000-memory.dmp

          Filesize

          268KB

        • memory/1360-24-0x0000000000400000-0x0000000000443000-memory.dmp

          Filesize

          268KB

        • memory/1440-500-0x0000000000400000-0x0000000000443000-memory.dmp

          Filesize

          268KB

        • memory/1556-83-0x0000000000400000-0x0000000000443000-memory.dmp

          Filesize

          268KB

        • memory/1632-463-0x0000000000400000-0x0000000000443000-memory.dmp

          Filesize

          268KB

        • memory/1764-485-0x0000000000400000-0x0000000000443000-memory.dmp

          Filesize

          268KB

        • memory/1792-466-0x0000000000400000-0x0000000000443000-memory.dmp

          Filesize

          268KB

        • memory/1872-481-0x0000000000400000-0x0000000000443000-memory.dmp

          Filesize

          268KB

        • memory/1956-502-0x0000000000400000-0x0000000000443000-memory.dmp

          Filesize

          268KB

        • memory/1992-501-0x0000000000400000-0x0000000000443000-memory.dmp

          Filesize

          268KB

        • memory/2052-489-0x0000000000400000-0x0000000000443000-memory.dmp

          Filesize

          268KB

        • memory/2156-469-0x0000000000400000-0x0000000000443000-memory.dmp

          Filesize

          268KB

        • memory/2248-413-0x0000000000400000-0x0000000000443000-memory.dmp

          Filesize

          268KB

        • memory/2324-503-0x0000000000400000-0x0000000000443000-memory.dmp

          Filesize

          268KB

        • memory/2544-470-0x0000000000400000-0x0000000000443000-memory.dmp

          Filesize

          268KB

        • memory/2592-499-0x0000000000400000-0x0000000000443000-memory.dmp

          Filesize

          268KB

        • memory/2680-510-0x0000000000400000-0x0000000000443000-memory.dmp

          Filesize

          268KB

        • memory/2828-486-0x0000000000400000-0x0000000000443000-memory.dmp

          Filesize

          268KB

        • memory/2840-416-0x0000000000400000-0x0000000000443000-memory.dmp

          Filesize

          268KB

        • memory/2860-461-0x0000000000400000-0x0000000000443000-memory.dmp

          Filesize

          268KB

        • memory/2916-556-0x0000000000400000-0x0000000000443000-memory.dmp

          Filesize

          268KB

        • memory/2920-513-0x0000000000400000-0x0000000000443000-memory.dmp

          Filesize

          268KB

        • memory/2980-407-0x0000000000400000-0x0000000000443000-memory.dmp

          Filesize

          268KB

        • memory/3004-478-0x0000000000400000-0x0000000000443000-memory.dmp

          Filesize

          268KB

        • memory/3008-487-0x0000000000400000-0x0000000000443000-memory.dmp

          Filesize

          268KB

        • memory/3056-482-0x0000000000400000-0x0000000000443000-memory.dmp

          Filesize

          268KB

        • memory/3076-462-0x0000000000400000-0x0000000000443000-memory.dmp

          Filesize

          268KB

        • memory/3092-477-0x0000000000400000-0x0000000000443000-memory.dmp

          Filesize

          268KB

        • memory/3108-465-0x0000000000400000-0x0000000000443000-memory.dmp

          Filesize

          268KB

        • memory/3248-497-0x0000000000400000-0x0000000000443000-memory.dmp

          Filesize

          268KB

        • memory/3256-459-0x0000000000400000-0x0000000000443000-memory.dmp

          Filesize

          268KB

        • memory/3264-558-0x0000000000400000-0x0000000000443000-memory.dmp

          Filesize

          268KB

        • memory/3308-412-0x0000000000400000-0x0000000000443000-memory.dmp

          Filesize

          268KB

        • memory/3400-45-0x0000000000400000-0x0000000000443000-memory.dmp

          Filesize

          268KB

        • memory/3416-560-0x0000000000400000-0x0000000000443000-memory.dmp

          Filesize

          268KB

        • memory/3500-417-0x0000000000400000-0x0000000000443000-memory.dmp

          Filesize

          268KB

        • memory/3564-464-0x0000000000400000-0x0000000000443000-memory.dmp

          Filesize

          268KB

        • memory/3576-52-0x0000000000400000-0x0000000000443000-memory.dmp

          Filesize

          268KB

        • memory/3616-471-0x0000000000400000-0x0000000000443000-memory.dmp

          Filesize

          268KB

        • memory/3768-566-0x0000000000400000-0x0000000000443000-memory.dmp

          Filesize

          268KB

        • memory/3768-3-0x0000000000400000-0x0000000000443000-memory.dmp

          Filesize

          268KB

        • memory/3812-488-0x0000000000400000-0x0000000000443000-memory.dmp

          Filesize

          268KB

        • memory/3820-496-0x0000000000400000-0x0000000000443000-memory.dmp

          Filesize

          268KB

        • memory/3904-555-0x0000000000400000-0x0000000000443000-memory.dmp

          Filesize

          268KB

        • memory/3948-405-0x0000000000400000-0x0000000000443000-memory.dmp

          Filesize

          268KB

        • memory/4080-60-0x0000000000400000-0x0000000000443000-memory.dmp

          Filesize

          268KB

        • memory/4100-467-0x0000000000400000-0x0000000000443000-memory.dmp

          Filesize

          268KB

        • memory/4108-509-0x0000000000400000-0x0000000000443000-memory.dmp

          Filesize

          268KB

        • memory/4116-554-0x0000000000400000-0x0000000000443000-memory.dmp

          Filesize

          268KB

        • memory/4184-404-0x0000000000400000-0x0000000000443000-memory.dmp

          Filesize

          268KB

        • memory/4340-476-0x0000000000400000-0x0000000000443000-memory.dmp

          Filesize

          268KB

        • memory/4352-561-0x0000000000400000-0x0000000000443000-memory.dmp

          Filesize

          268KB

        • memory/4360-472-0x0000000000400000-0x0000000000443000-memory.dmp

          Filesize

          268KB

        • memory/4396-504-0x0000000000400000-0x0000000000443000-memory.dmp

          Filesize

          268KB

        • memory/4488-414-0x0000000000400000-0x0000000000443000-memory.dmp

          Filesize

          268KB

        • memory/4504-68-0x0000000000400000-0x0000000000443000-memory.dmp

          Filesize

          268KB

        • memory/4528-84-0x0000000000400000-0x0000000000443000-memory.dmp

          Filesize

          268KB

        • memory/4656-406-0x0000000000400000-0x0000000000443000-memory.dmp

          Filesize

          268KB

        • memory/4748-410-0x0000000000400000-0x0000000000443000-memory.dmp

          Filesize

          268KB

        • memory/4764-507-0x0000000000400000-0x0000000000443000-memory.dmp

          Filesize

          268KB

        • memory/4788-418-0x0000000000400000-0x0000000000443000-memory.dmp

          Filesize

          268KB

        • memory/4920-498-0x0000000000400000-0x0000000000443000-memory.dmp

          Filesize

          268KB

        • memory/4972-506-0x0000000000400000-0x0000000000443000-memory.dmp

          Filesize

          268KB

        • memory/5004-479-0x0000000000400000-0x0000000000443000-memory.dmp

          Filesize

          268KB

        • memory/5016-460-0x0000000000400000-0x0000000000443000-memory.dmp

          Filesize

          268KB

        • memory/5048-36-0x0000000000400000-0x0000000000443000-memory.dmp

          Filesize

          268KB

        • memory/5084-505-0x0000000000400000-0x0000000000443000-memory.dmp

          Filesize

          268KB