Analysis

  • max time kernel
    51s
  • max time network
    53s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240508-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system
  • submitted
    17-06-2024 11:23

General

  • Target

    83c6ed67d11d2e938fd2b4d86ce92ff0_NeikiAnalytics.exe

  • Size

    89KB

  • MD5

    83c6ed67d11d2e938fd2b4d86ce92ff0

  • SHA1

    3621cddc7472521c85a815d869afef6f17385650

  • SHA256

    3b90a11366f18bf618719019d0d164304782ed7413ef7ce3125a895024015984

  • SHA512

    08837cc21db2c53be39647824fc60083747ef0013e7f2e71c0165216b04f124677d60e20cea55f790f7c8f6ef30297068fa88cc587856f78374682a6630c8c9d

  • SSDEEP

    1536:kt0rY3HJxP7Lz+Yd5KA1nNSqfybmsCIK282c8CPGCECa9bC7e3iaqWpOBMD:fs3HJxzjrNSqfybmhD28Qxnd9GMHqW/

Score
10/10

Malware Config

Signatures

  • Adds autorun key to be loaded by Explorer.exe on startup 2 TTPs 64 IoCs
  • Executes dropped EXE 64 IoCs
  • Drops file in System32 directory 64 IoCs
  • Program crash 1 IoCs
  • Modifies registry class 64 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\83c6ed67d11d2e938fd2b4d86ce92ff0_NeikiAnalytics.exe
    "C:\Users\Admin\AppData\Local\Temp\83c6ed67d11d2e938fd2b4d86ce92ff0_NeikiAnalytics.exe"
    1⤵
    • Adds autorun key to be loaded by Explorer.exe on startup
    • Drops file in System32 directory
    • Modifies registry class
    • Suspicious use of WriteProcessMemory
    PID:2484
    • C:\Windows\SysWOW64\Jjpeepnb.exe
      C:\Windows\system32\Jjpeepnb.exe
      2⤵
      • Executes dropped EXE
      • Drops file in System32 directory
      • Suspicious use of WriteProcessMemory
      PID:3692
      • C:\Windows\SysWOW64\Jmnaakne.exe
        C:\Windows\system32\Jmnaakne.exe
        3⤵
        • Adds autorun key to be loaded by Explorer.exe on startup
        • Executes dropped EXE
        • Drops file in System32 directory
        • Modifies registry class
        • Suspicious use of WriteProcessMemory
        PID:4632
        • C:\Windows\SysWOW64\Jplmmfmi.exe
          C:\Windows\system32\Jplmmfmi.exe
          4⤵
          • Adds autorun key to be loaded by Explorer.exe on startup
          • Executes dropped EXE
          • Drops file in System32 directory
          • Modifies registry class
          • Suspicious use of WriteProcessMemory
          PID:3408
          • C:\Windows\SysWOW64\Jfffjqdf.exe
            C:\Windows\system32\Jfffjqdf.exe
            5⤵
            • Executes dropped EXE
            • Modifies registry class
            • Suspicious use of WriteProcessMemory
            PID:1804
            • C:\Windows\SysWOW64\Jmpngk32.exe
              C:\Windows\system32\Jmpngk32.exe
              6⤵
              • Executes dropped EXE
              • Drops file in System32 directory
              • Modifies registry class
              • Suspicious use of WriteProcessMemory
              PID:3900
              • C:\Windows\SysWOW64\Jaljgidl.exe
                C:\Windows\system32\Jaljgidl.exe
                7⤵
                • Adds autorun key to be loaded by Explorer.exe on startup
                • Executes dropped EXE
                • Modifies registry class
                • Suspicious use of WriteProcessMemory
                PID:4376
                • C:\Windows\SysWOW64\Jdjfcecp.exe
                  C:\Windows\system32\Jdjfcecp.exe
                  8⤵
                  • Executes dropped EXE
                  • Drops file in System32 directory
                  • Suspicious use of WriteProcessMemory
                  PID:4408
                  • C:\Windows\SysWOW64\Jfhbppbc.exe
                    C:\Windows\system32\Jfhbppbc.exe
                    9⤵
                    • Executes dropped EXE
                    • Drops file in System32 directory
                    • Modifies registry class
                    • Suspicious use of WriteProcessMemory
                    PID:940
                    • C:\Windows\SysWOW64\Jkdnpo32.exe
                      C:\Windows\system32\Jkdnpo32.exe
                      10⤵
                      • Adds autorun key to be loaded by Explorer.exe on startup
                      • Executes dropped EXE
                      • Modifies registry class
                      • Suspicious use of WriteProcessMemory
                      PID:3528
                      • C:\Windows\SysWOW64\Jmbklj32.exe
                        C:\Windows\system32\Jmbklj32.exe
                        11⤵
                        • Adds autorun key to be loaded by Explorer.exe on startup
                        • Executes dropped EXE
                        • Modifies registry class
                        • Suspicious use of WriteProcessMemory
                        PID:2724
                        • C:\Windows\SysWOW64\Jdmcidam.exe
                          C:\Windows\system32\Jdmcidam.exe
                          12⤵
                          • Executes dropped EXE
                          • Drops file in System32 directory
                          • Suspicious use of WriteProcessMemory
                          PID:3088
                          • C:\Windows\SysWOW64\Jbocea32.exe
                            C:\Windows\system32\Jbocea32.exe
                            13⤵
                            • Adds autorun key to be loaded by Explorer.exe on startup
                            • Executes dropped EXE
                            • Suspicious use of WriteProcessMemory
                            PID:4952
                            • C:\Windows\SysWOW64\Jfkoeppq.exe
                              C:\Windows\system32\Jfkoeppq.exe
                              14⤵
                              • Adds autorun key to be loaded by Explorer.exe on startup
                              • Executes dropped EXE
                              • Drops file in System32 directory
                              • Modifies registry class
                              • Suspicious use of WriteProcessMemory
                              PID:4604
                              • C:\Windows\SysWOW64\Jiikak32.exe
                                C:\Windows\system32\Jiikak32.exe
                                15⤵
                                • Adds autorun key to be loaded by Explorer.exe on startup
                                • Executes dropped EXE
                                • Suspicious use of WriteProcessMemory
                                PID:3816
                                • C:\Windows\SysWOW64\Kmegbjgn.exe
                                  C:\Windows\system32\Kmegbjgn.exe
                                  16⤵
                                  • Executes dropped EXE
                                  • Drops file in System32 directory
                                  • Modifies registry class
                                  • Suspicious use of WriteProcessMemory
                                  PID:4572
                                  • C:\Windows\SysWOW64\Kdopod32.exe
                                    C:\Windows\system32\Kdopod32.exe
                                    17⤵
                                    • Adds autorun key to be loaded by Explorer.exe on startup
                                    • Executes dropped EXE
                                    • Drops file in System32 directory
                                    • Modifies registry class
                                    • Suspicious use of WriteProcessMemory
                                    PID:4688
                                    • C:\Windows\SysWOW64\Kmgdgjek.exe
                                      C:\Windows\system32\Kmgdgjek.exe
                                      18⤵
                                      • Adds autorun key to be loaded by Explorer.exe on startup
                                      • Executes dropped EXE
                                      • Drops file in System32 directory
                                      • Modifies registry class
                                      • Suspicious use of WriteProcessMemory
                                      PID:4916
                                      • C:\Windows\SysWOW64\Kpepcedo.exe
                                        C:\Windows\system32\Kpepcedo.exe
                                        19⤵
                                        • Executes dropped EXE
                                        • Drops file in System32 directory
                                        • Modifies registry class
                                        • Suspicious use of WriteProcessMemory
                                        PID:4472
                                        • C:\Windows\SysWOW64\Kdaldd32.exe
                                          C:\Windows\system32\Kdaldd32.exe
                                          20⤵
                                          • Adds autorun key to be loaded by Explorer.exe on startup
                                          • Executes dropped EXE
                                          • Drops file in System32 directory
                                          • Suspicious use of WriteProcessMemory
                                          PID:3660
                                          • C:\Windows\SysWOW64\Kgphpo32.exe
                                            C:\Windows\system32\Kgphpo32.exe
                                            21⤵
                                            • Adds autorun key to be loaded by Explorer.exe on startup
                                            • Executes dropped EXE
                                            • Drops file in System32 directory
                                            • Suspicious use of WriteProcessMemory
                                            PID:2092
                                            • C:\Windows\SysWOW64\Kkkdan32.exe
                                              C:\Windows\system32\Kkkdan32.exe
                                              22⤵
                                              • Adds autorun key to be loaded by Explorer.exe on startup
                                              • Executes dropped EXE
                                              • Drops file in System32 directory
                                              • Modifies registry class
                                              • Suspicious use of WriteProcessMemory
                                              PID:5680
                                              • C:\Windows\SysWOW64\Kaemnhla.exe
                                                C:\Windows\system32\Kaemnhla.exe
                                                23⤵
                                                • Adds autorun key to be loaded by Explorer.exe on startup
                                                • Executes dropped EXE
                                                • Drops file in System32 directory
                                                • Modifies registry class
                                                PID:3952
                                                • C:\Windows\SysWOW64\Kphmie32.exe
                                                  C:\Windows\system32\Kphmie32.exe
                                                  24⤵
                                                  • Adds autorun key to be loaded by Explorer.exe on startup
                                                  • Executes dropped EXE
                                                  • Modifies registry class
                                                  PID:1852
                                                  • C:\Windows\SysWOW64\Kbfiep32.exe
                                                    C:\Windows\system32\Kbfiep32.exe
                                                    25⤵
                                                    • Adds autorun key to be loaded by Explorer.exe on startup
                                                    • Executes dropped EXE
                                                    • Modifies registry class
                                                    PID:5576
                                                    • C:\Windows\SysWOW64\Kknafn32.exe
                                                      C:\Windows\system32\Kknafn32.exe
                                                      26⤵
                                                      • Adds autorun key to be loaded by Explorer.exe on startup
                                                      • Executes dropped EXE
                                                      • Drops file in System32 directory
                                                      PID:1220
                                                      • C:\Windows\SysWOW64\Kmlnbi32.exe
                                                        C:\Windows\system32\Kmlnbi32.exe
                                                        27⤵
                                                        • Executes dropped EXE
                                                        • Drops file in System32 directory
                                                        • Modifies registry class
                                                        PID:2852
                                                        • C:\Windows\SysWOW64\Kpjjod32.exe
                                                          C:\Windows\system32\Kpjjod32.exe
                                                          28⤵
                                                          • Adds autorun key to be loaded by Explorer.exe on startup
                                                          • Executes dropped EXE
                                                          • Modifies registry class
                                                          PID:3248
                                                          • C:\Windows\SysWOW64\Kcifkp32.exe
                                                            C:\Windows\system32\Kcifkp32.exe
                                                            29⤵
                                                            • Adds autorun key to be loaded by Explorer.exe on startup
                                                            • Executes dropped EXE
                                                            PID:5296
                                                            • C:\Windows\SysWOW64\Kibnhjgj.exe
                                                              C:\Windows\system32\Kibnhjgj.exe
                                                              30⤵
                                                              • Adds autorun key to be loaded by Explorer.exe on startup
                                                              • Executes dropped EXE
                                                              • Modifies registry class
                                                              PID:4216
                                                              • C:\Windows\SysWOW64\Kmnjhioc.exe
                                                                C:\Windows\system32\Kmnjhioc.exe
                                                                31⤵
                                                                • Adds autorun key to be loaded by Explorer.exe on startup
                                                                • Executes dropped EXE
                                                                • Drops file in System32 directory
                                                                • Modifies registry class
                                                                PID:3512
                                                                • C:\Windows\SysWOW64\Kpmfddnf.exe
                                                                  C:\Windows\system32\Kpmfddnf.exe
                                                                  32⤵
                                                                  • Executes dropped EXE
                                                                  • Drops file in System32 directory
                                                                  PID:660
                                                                  • C:\Windows\SysWOW64\Kdhbec32.exe
                                                                    C:\Windows\system32\Kdhbec32.exe
                                                                    33⤵
                                                                    • Adds autorun key to be loaded by Explorer.exe on startup
                                                                    • Executes dropped EXE
                                                                    • Modifies registry class
                                                                    PID:5904
                                                                    • C:\Windows\SysWOW64\Kgfoan32.exe
                                                                      C:\Windows\system32\Kgfoan32.exe
                                                                      34⤵
                                                                      • Executes dropped EXE
                                                                      PID:4352
                                                                      • C:\Windows\SysWOW64\Kkbkamnl.exe
                                                                        C:\Windows\system32\Kkbkamnl.exe
                                                                        35⤵
                                                                        • Adds autorun key to be loaded by Explorer.exe on startup
                                                                        • Executes dropped EXE
                                                                        • Drops file in System32 directory
                                                                        • Modifies registry class
                                                                        PID:2080
                                                                        • C:\Windows\SysWOW64\Lmqgnhmp.exe
                                                                          C:\Windows\system32\Lmqgnhmp.exe
                                                                          36⤵
                                                                          • Executes dropped EXE
                                                                          • Drops file in System32 directory
                                                                          PID:2236
                                                                          • C:\Windows\SysWOW64\Lpocjdld.exe
                                                                            C:\Windows\system32\Lpocjdld.exe
                                                                            37⤵
                                                                            • Executes dropped EXE
                                                                            • Modifies registry class
                                                                            PID:1684
                                                                            • C:\Windows\SysWOW64\Lcmofolg.exe
                                                                              C:\Windows\system32\Lcmofolg.exe
                                                                              38⤵
                                                                              • Executes dropped EXE
                                                                              • Modifies registry class
                                                                              PID:5900
                                                                              • C:\Windows\SysWOW64\Lkdggmlj.exe
                                                                                C:\Windows\system32\Lkdggmlj.exe
                                                                                39⤵
                                                                                • Adds autorun key to be loaded by Explorer.exe on startup
                                                                                • Executes dropped EXE
                                                                                • Drops file in System32 directory
                                                                                • Modifies registry class
                                                                                PID:4824
                                                                                • C:\Windows\SysWOW64\Liggbi32.exe
                                                                                  C:\Windows\system32\Liggbi32.exe
                                                                                  40⤵
                                                                                  • Adds autorun key to be loaded by Explorer.exe on startup
                                                                                  • Executes dropped EXE
                                                                                  PID:5936
                                                                                  • C:\Windows\SysWOW64\Laopdgcg.exe
                                                                                    C:\Windows\system32\Laopdgcg.exe
                                                                                    41⤵
                                                                                    • Adds autorun key to be loaded by Explorer.exe on startup
                                                                                    • Executes dropped EXE
                                                                                    • Drops file in System32 directory
                                                                                    • Modifies registry class
                                                                                    PID:1084
                                                                                    • C:\Windows\SysWOW64\Lgkhlnbn.exe
                                                                                      C:\Windows\system32\Lgkhlnbn.exe
                                                                                      42⤵
                                                                                      • Adds autorun key to be loaded by Explorer.exe on startup
                                                                                      • Executes dropped EXE
                                                                                      • Modifies registry class
                                                                                      PID:5768
                                                                                      • C:\Windows\SysWOW64\Lnepih32.exe
                                                                                        C:\Windows\system32\Lnepih32.exe
                                                                                        43⤵
                                                                                        • Adds autorun key to be loaded by Explorer.exe on startup
                                                                                        • Executes dropped EXE
                                                                                        • Drops file in System32 directory
                                                                                        PID:3472
                                                                                        • C:\Windows\SysWOW64\Lpcmec32.exe
                                                                                          C:\Windows\system32\Lpcmec32.exe
                                                                                          44⤵
                                                                                          • Executes dropped EXE
                                                                                          • Drops file in System32 directory
                                                                                          • Modifies registry class
                                                                                          PID:4400
                                                                                          • C:\Windows\SysWOW64\Lcbiao32.exe
                                                                                            C:\Windows\system32\Lcbiao32.exe
                                                                                            45⤵
                                                                                            • Executes dropped EXE
                                                                                            • Modifies registry class
                                                                                            PID:4936
                                                                                            • C:\Windows\SysWOW64\Lkiqbl32.exe
                                                                                              C:\Windows\system32\Lkiqbl32.exe
                                                                                              46⤵
                                                                                              • Adds autorun key to be loaded by Explorer.exe on startup
                                                                                              • Executes dropped EXE
                                                                                              PID:388
                                                                                              • C:\Windows\SysWOW64\Lnhmng32.exe
                                                                                                C:\Windows\system32\Lnhmng32.exe
                                                                                                47⤵
                                                                                                • Adds autorun key to be loaded by Explorer.exe on startup
                                                                                                • Executes dropped EXE
                                                                                                • Drops file in System32 directory
                                                                                                • Modifies registry class
                                                                                                PID:212
                                                                                                • C:\Windows\SysWOW64\Ldaeka32.exe
                                                                                                  C:\Windows\system32\Ldaeka32.exe
                                                                                                  48⤵
                                                                                                  • Adds autorun key to be loaded by Explorer.exe on startup
                                                                                                  • Executes dropped EXE
                                                                                                  • Drops file in System32 directory
                                                                                                  • Modifies registry class
                                                                                                  PID:5492
                                                                                                  • C:\Windows\SysWOW64\Lgpagm32.exe
                                                                                                    C:\Windows\system32\Lgpagm32.exe
                                                                                                    49⤵
                                                                                                    • Adds autorun key to be loaded by Explorer.exe on startup
                                                                                                    • Executes dropped EXE
                                                                                                    PID:4904
                                                                                                    • C:\Windows\SysWOW64\Lphfpbdi.exe
                                                                                                      C:\Windows\system32\Lphfpbdi.exe
                                                                                                      50⤵
                                                                                                      • Adds autorun key to be loaded by Explorer.exe on startup
                                                                                                      • Executes dropped EXE
                                                                                                      • Modifies registry class
                                                                                                      PID:844
                                                                                                      • C:\Windows\SysWOW64\Mjqjih32.exe
                                                                                                        C:\Windows\system32\Mjqjih32.exe
                                                                                                        51⤵
                                                                                                        • Adds autorun key to be loaded by Explorer.exe on startup
                                                                                                        • Executes dropped EXE
                                                                                                        • Modifies registry class
                                                                                                        PID:4708
                                                                                                        • C:\Windows\SysWOW64\Mdfofakp.exe
                                                                                                          C:\Windows\system32\Mdfofakp.exe
                                                                                                          52⤵
                                                                                                          • Executes dropped EXE
                                                                                                          PID:5008
                                                                                                          • C:\Windows\SysWOW64\Mkpgck32.exe
                                                                                                            C:\Windows\system32\Mkpgck32.exe
                                                                                                            53⤵
                                                                                                            • Adds autorun key to be loaded by Explorer.exe on startup
                                                                                                            • Executes dropped EXE
                                                                                                            • Modifies registry class
                                                                                                            PID:1384
                                                                                                            • C:\Windows\SysWOW64\Mnocof32.exe
                                                                                                              C:\Windows\system32\Mnocof32.exe
                                                                                                              54⤵
                                                                                                              • Executes dropped EXE
                                                                                                              • Drops file in System32 directory
                                                                                                              • Modifies registry class
                                                                                                              PID:2660
                                                                                                              • C:\Windows\SysWOW64\Mkbchk32.exe
                                                                                                                C:\Windows\system32\Mkbchk32.exe
                                                                                                                55⤵
                                                                                                                • Adds autorun key to be loaded by Explorer.exe on startup
                                                                                                                • Executes dropped EXE
                                                                                                                • Drops file in System32 directory
                                                                                                                • Modifies registry class
                                                                                                                PID:4704
                                                                                                                • C:\Windows\SysWOW64\Mpolqa32.exe
                                                                                                                  C:\Windows\system32\Mpolqa32.exe
                                                                                                                  56⤵
                                                                                                                  • Adds autorun key to be loaded by Explorer.exe on startup
                                                                                                                  • Executes dropped EXE
                                                                                                                  • Drops file in System32 directory
                                                                                                                  • Modifies registry class
                                                                                                                  PID:3236
                                                                                                                  • C:\Windows\SysWOW64\Mgidml32.exe
                                                                                                                    C:\Windows\system32\Mgidml32.exe
                                                                                                                    57⤵
                                                                                                                    • Adds autorun key to be loaded by Explorer.exe on startup
                                                                                                                    • Executes dropped EXE
                                                                                                                    • Drops file in System32 directory
                                                                                                                    PID:2428
                                                                                                                    • C:\Windows\SysWOW64\Maohkd32.exe
                                                                                                                      C:\Windows\system32\Maohkd32.exe
                                                                                                                      58⤵
                                                                                                                      • Executes dropped EXE
                                                                                                                      • Drops file in System32 directory
                                                                                                                      PID:4456
                                                                                                                      • C:\Windows\SysWOW64\Mkgmcjld.exe
                                                                                                                        C:\Windows\system32\Mkgmcjld.exe
                                                                                                                        59⤵
                                                                                                                        • Executes dropped EXE
                                                                                                                        • Modifies registry class
                                                                                                                        PID:2752
                                                                                                                        • C:\Windows\SysWOW64\Mnfipekh.exe
                                                                                                                          C:\Windows\system32\Mnfipekh.exe
                                                                                                                          60⤵
                                                                                                                          • Adds autorun key to be loaded by Explorer.exe on startup
                                                                                                                          • Executes dropped EXE
                                                                                                                          PID:4012
                                                                                                                          • C:\Windows\SysWOW64\Nkjjij32.exe
                                                                                                                            C:\Windows\system32\Nkjjij32.exe
                                                                                                                            61⤵
                                                                                                                            • Adds autorun key to be loaded by Explorer.exe on startup
                                                                                                                            • Executes dropped EXE
                                                                                                                            • Drops file in System32 directory
                                                                                                                            • Modifies registry class
                                                                                                                            PID:3688
                                                                                                                            • C:\Windows\SysWOW64\Nnhfee32.exe
                                                                                                                              C:\Windows\system32\Nnhfee32.exe
                                                                                                                              62⤵
                                                                                                                              • Adds autorun key to be loaded by Explorer.exe on startup
                                                                                                                              • Executes dropped EXE
                                                                                                                              • Drops file in System32 directory
                                                                                                                              PID:1696
                                                                                                                              • C:\Windows\SysWOW64\Nacbfdao.exe
                                                                                                                                C:\Windows\system32\Nacbfdao.exe
                                                                                                                                63⤵
                                                                                                                                • Executes dropped EXE
                                                                                                                                • Drops file in System32 directory
                                                                                                                                PID:6068
                                                                                                                                • C:\Windows\SysWOW64\Nceonl32.exe
                                                                                                                                  C:\Windows\system32\Nceonl32.exe
                                                                                                                                  64⤵
                                                                                                                                  • Adds autorun key to be loaded by Explorer.exe on startup
                                                                                                                                  • Executes dropped EXE
                                                                                                                                  • Drops file in System32 directory
                                                                                                                                  • Modifies registry class
                                                                                                                                  PID:384
                                                                                                                                  • C:\Windows\SysWOW64\Ngpjnkpf.exe
                                                                                                                                    C:\Windows\system32\Ngpjnkpf.exe
                                                                                                                                    65⤵
                                                                                                                                    • Executes dropped EXE
                                                                                                                                    • Modifies registry class
                                                                                                                                    PID:4488
                                                                                                                                    • C:\Windows\SysWOW64\Nqiogp32.exe
                                                                                                                                      C:\Windows\system32\Nqiogp32.exe
                                                                                                                                      66⤵
                                                                                                                                      • Adds autorun key to be loaded by Explorer.exe on startup
                                                                                                                                      • Drops file in System32 directory
                                                                                                                                      • Modifies registry class
                                                                                                                                      PID:4804
                                                                                                                                      • C:\Windows\SysWOW64\Njacpf32.exe
                                                                                                                                        C:\Windows\system32\Njacpf32.exe
                                                                                                                                        67⤵
                                                                                                                                        • Drops file in System32 directory
                                                                                                                                        • Modifies registry class
                                                                                                                                        PID:5976
                                                                                                                                        • C:\Windows\SysWOW64\Nqklmpdd.exe
                                                                                                                                          C:\Windows\system32\Nqklmpdd.exe
                                                                                                                                          68⤵
                                                                                                                                          • Adds autorun key to be loaded by Explorer.exe on startup
                                                                                                                                          • Drops file in System32 directory
                                                                                                                                          • Modifies registry class
                                                                                                                                          PID:5024
                                                                                                                                          • C:\Windows\SysWOW64\Ngedij32.exe
                                                                                                                                            C:\Windows\system32\Ngedij32.exe
                                                                                                                                            69⤵
                                                                                                                                            • Adds autorun key to be loaded by Explorer.exe on startup
                                                                                                                                            • Drops file in System32 directory
                                                                                                                                            PID:2424
                                                                                                                                            • C:\Windows\SysWOW64\Njcpee32.exe
                                                                                                                                              C:\Windows\system32\Njcpee32.exe
                                                                                                                                              70⤵
                                                                                                                                              • Drops file in System32 directory
                                                                                                                                              PID:1356
                                                                                                                                              • C:\Windows\SysWOW64\Nbkhfc32.exe
                                                                                                                                                C:\Windows\system32\Nbkhfc32.exe
                                                                                                                                                71⤵
                                                                                                                                                • Adds autorun key to be loaded by Explorer.exe on startup
                                                                                                                                                • Drops file in System32 directory
                                                                                                                                                PID:2372
                                                                                                                                                • C:\Windows\SysWOW64\Ndidbn32.exe
                                                                                                                                                  C:\Windows\system32\Ndidbn32.exe
                                                                                                                                                  72⤵
                                                                                                                                                  • Drops file in System32 directory
                                                                                                                                                  • Modifies registry class
                                                                                                                                                  PID:2756
                                                                                                                                                  • C:\Windows\SysWOW64\Nkcmohbg.exe
                                                                                                                                                    C:\Windows\system32\Nkcmohbg.exe
                                                                                                                                                    73⤵
                                                                                                                                                      PID:1988
                                                                                                                                                      • C:\Windows\SysWOW64\WerFault.exe
                                                                                                                                                        C:\Windows\SysWOW64\WerFault.exe -u -p 1988 -s 400
                                                                                                                                                        74⤵
                                                                                                                                                        • Program crash
                                                                                                                                                        PID:5000
    • C:\Windows\SysWOW64\WerFault.exe
      C:\Windows\SysWOW64\WerFault.exe -pss -s 192 -p 1988 -ip 1988
      1⤵
        PID:6100

      Network

      MITRE ATT&CK Enterprise v15

      Replay Monitor

      Loading Replay Monitor...

      Downloads

      • C:\Windows\SysWOW64\Jaljgidl.exe

        Filesize

        89KB

        MD5

        6bc52d1becbaeb2dc7578e16f7c79e8f

        SHA1

        aceacf9f9def65eb7f035826397098949e3c9f31

        SHA256

        50c1816cde9fd73a194f0e63dccd12b3bf29783585cf899f4644b66dba110b7b

        SHA512

        496f0861e7ff4e89571c3df7cbed98439b23fafa841567a84653632fe2df7682ebd78313bf27e624faf4963abff555a137faa7f217b30815da28bda1a37b5bf8

      • C:\Windows\SysWOW64\Jbocea32.exe

        Filesize

        89KB

        MD5

        88e28beb820f82ebbe27ebdd934fc399

        SHA1

        fa5a7686a1fcef287f14c1d4408cb9d1a605c29f

        SHA256

        cbe57504e0311f4f48a2d95617332eb7ea2e1fc6cdd0efd46e6e99a0f0b4b2ad

        SHA512

        062518c04e3af1a72a653e5e9f199442c59fbe65a3cd681adc41d199a2b043cd05de650ec19988b9c8b161dd6a9f5c99f7f97c2e642a95e8f689a454456926af

      • C:\Windows\SysWOW64\Jdjfcecp.exe

        Filesize

        89KB

        MD5

        9676cf92c4c7225c42cb8a0d3d9204d4

        SHA1

        2c0fb472d31eb87aa39c8d40708a2f900dc26daa

        SHA256

        9076e289b8c5c8e888e28464ff9d6aedae157cf65867c9d00eeb3d110c012910

        SHA512

        3da934b17edc99fc9feed76dbca96324bfa4e469cc3dd0cc4351a48b1afa51edf6e34b3d94efd6a1db165ec39ff989d6f23828684ff262a8904d49d583185948

      • C:\Windows\SysWOW64\Jdmcidam.exe

        Filesize

        89KB

        MD5

        bf0d2491fc49287272cac2060afd3b4d

        SHA1

        06593fcdcc0936acab76d2f3ea80778d1cf9c371

        SHA256

        012eb78be3153df257097e295e387f11e575ecd36465c1ffad7b14b5553fd134

        SHA512

        4290cfc67bd65d9bdd497a620bd4891443a490a035c152f3d5464a5c317b21bf5a607be2e1cfcc36b24cdd0b38a008bda7d7765f60dba0dce6f1483d40c7e44f

      • C:\Windows\SysWOW64\Jfffjqdf.exe

        Filesize

        89KB

        MD5

        26df3d3a90e63cdc6f78448459d80fc2

        SHA1

        e8b3204b93bdf51c7c0296217576cf3cc0071cfe

        SHA256

        b84dae12d43137adac69214eea47f5db4443d9665f08456a15712c7613c24a41

        SHA512

        b6e2d84e3e84701066c022defbfadac769852b5ded7720d1f83c37967dc926c505145145c9db5e0c68a154967a3092dcdf7e1bc497a650e73f7a9a7c798fd33a

      • C:\Windows\SysWOW64\Jfhbppbc.exe

        Filesize

        89KB

        MD5

        5264ed46fd28040d82d05e5a5d51d13e

        SHA1

        9178b9466e4a34c0bdbb4935feb63788fb8a9b52

        SHA256

        326fe28059bd5d8008ce5726cae8cbbc1a670d30c4e9015e25634fdbc969f5aa

        SHA512

        297b73ff7c6e1711b425d19b5560b462ba6f650960e77eeb30783843aca3d2ff3a4febe2d4628ef9388e86202ee69a83b951e41652616e189442773570cb1364

      • C:\Windows\SysWOW64\Jfkoeppq.exe

        Filesize

        89KB

        MD5

        8f3cc1c8afdb4015e42e45d425bdf095

        SHA1

        eec55d6d08d02b46a178686ef4a2b4c5e6985b13

        SHA256

        4c688ff5ea5c406e4c91d9602c376f5f7ffefad16948650afc6f29e151d3e3c1

        SHA512

        ce5a3a4c9b49d9916981e681c8f19671c8e383762c311197204bff8d7b8cfe56ae51a6149d08bfb297e51e1727654c5297bf463cc4fbed12334b44ecfd571bc2

      • C:\Windows\SysWOW64\Jiikak32.exe

        Filesize

        89KB

        MD5

        747c46fa70c8f27bfe03f24dcfafb53e

        SHA1

        a25f3f6e6e11359a9e671cc23f2228f9631b48f4

        SHA256

        9bf5af74edeb72e4c8e6f9394dcd3bcaebf965b4246f12c6d852ce9d8aab6d33

        SHA512

        ad67c178d7db5f66d5228ca2787c1a900ef23619e1f937c8fd6fb4ca70113c76d81199516cd9fd7725d5ebb4ff4d6012c0d5b4dda35eb3f2fe909566732b9c15

      • C:\Windows\SysWOW64\Jjpeepnb.exe

        Filesize

        89KB

        MD5

        fffd1a76f407d3356f3a6e51a389168d

        SHA1

        166d3e2734ca0d1354b3ff59bc91d358c9bc5d00

        SHA256

        8b45936ceead71e87590175607fa0f082742e7568b685426c91376286b7bf0c6

        SHA512

        49ccf43a4f40028167c31bc9d8516ea9ff749b929a95490b5f2d520daebc0c117188ccf64b8018ab050bc4134d08beae051097d5f5204cdd8aed8a4428ca908e

      • C:\Windows\SysWOW64\Jkdnpo32.exe

        Filesize

        89KB

        MD5

        0fbf777f81ec5be1ed1eb5d3c9a3299f

        SHA1

        acc2fd92c35d12f41637896a479f1e9fa8be2685

        SHA256

        ac1113025b56545d40d12232c5e185cb05456348d142f463b13b1c49c7c208d6

        SHA512

        332b740e646b43cd6d830039ea3e26159c2bc324a5352efdaf565ac38d5fde74452aa9b604f89c4841b5524b32a30f8dabd6968a75968871537333da3255d273

      • C:\Windows\SysWOW64\Jmbklj32.exe

        Filesize

        89KB

        MD5

        56c21b1bad7ffc05bcbee0fb4023ddf7

        SHA1

        e2d0370d5b692f47c84dc107a6f9648527ef6cb8

        SHA256

        344f71ddc19a6f4f3de5546885051a082a72c0d80b2b4f5f5a7ded8f611f200f

        SHA512

        8fcf0e48d454e3e13e45025feb0cd9f88b9095013adf2f54b86b07438abf9d49cf659259de64926426fb6a99d7c96b7db1fe2ac7e5064e1644cd51ee90bd55dc

      • C:\Windows\SysWOW64\Jmnaakne.exe

        Filesize

        89KB

        MD5

        4b45f6f19a8114b829e3ec3dc057cfcd

        SHA1

        60105e601077657c71ca7428eaf3708738b57494

        SHA256

        e63e44e61af810344bf81258cdb748875a276e860831ebb572848e809ea61dd0

        SHA512

        6bf75ee8c50d9c4bc357cc6d9bedf4ddb9b8d35a57c29e557a3665c17f67640934a10ae099ed8df334c1b87b0a6f1a6fb410c8944f4c1829d0fffe566a997520

      • C:\Windows\SysWOW64\Jmpngk32.exe

        Filesize

        89KB

        MD5

        23421c3a13210d83a60d7d4a5c4d9414

        SHA1

        240578f5d872b75c49d70c1a3745d27f83a64735

        SHA256

        7bf8d6b0b68bde1908788e020119f734efda8d4412f9d7ba7b2b3734860323fd

        SHA512

        b5a5db97e376653ae5331a89ab9acb3cdf3e4a8ac9c3f9fef2cb8217e4606dd702552c6489d3044278642fe30a829db85d42c7064e1a3ca2c11854e802ba22fd

      • C:\Windows\SysWOW64\Jplmmfmi.exe

        Filesize

        89KB

        MD5

        f6902a01f527100538d29f54ac726042

        SHA1

        f06424e101a53dcd25bcee6050fdae74644ecdb6

        SHA256

        24b4b37b43dd26a78e904ae6805ff4f3d3890e925fb459121bc855dfad57b9c6

        SHA512

        aea83388b22df1e4b55b4c1cc8b643e47cb14b67b7e2dc3c25137100475bbfbb9af2f7e4d714116e6e6ff8a21b178fc5ade7734f270c0dacac90e4c84633e5b2

      • C:\Windows\SysWOW64\Kbfiep32.exe

        Filesize

        89KB

        MD5

        e4c628dc116824216ad4df777ebda402

        SHA1

        8bca9a7ed1fa2b14866b6dc13723de7dca20ee2d

        SHA256

        81a846fa07666920c0ccbfa90d8cf686196248bd6e751746bc8c86ab9170ca1c

        SHA512

        621e126a1f3c0d2a8aed8d20e3cc2a2ca193fa0dcfa3a9906d856424827d5e6adc2182ef85eced19156e44eaae12933dc1ec661010b5418480824925c0ef09c0

      • C:\Windows\SysWOW64\Kcifkp32.exe

        Filesize

        89KB

        MD5

        4109b6b4f62065c219b506bedd048259

        SHA1

        ec94d7b908c263b14c11b6e72f561b73466706e2

        SHA256

        d36e0737065ae0cd792b572d57bde285951e831f5b336ec2dba00580a6ede4dc

        SHA512

        d8f2ee351b725334eb18e0b01c3df4f0b34d06861cd2d64fefd643ecb9b5e2f0069a8e5002dee7eed63f4b344a88379f5983f92d76badc52d61c846a79543608

      • C:\Windows\SysWOW64\Kdaldd32.exe

        Filesize

        89KB

        MD5

        69de00b821f8246410a5e349d4be2eef

        SHA1

        c309dc153878e091cfde941379ef9a4e91d28a8d

        SHA256

        a71fa2b05ac65c89b868a78c5bbf217087ed22be1e0999d136574502048cec8b

        SHA512

        31c5091b5c0a5dd4440733a14fc995c61a0c8542d648bfef71109e858d50595f89f992cf37e1d483056b12813c079069b415be9998bc3d87a2d97e92e4dc34e7

      • C:\Windows\SysWOW64\Kdhbec32.exe

        Filesize

        89KB

        MD5

        af9ea6fd0aaf3192ea6d9bf5923f6516

        SHA1

        93b39adaf512a4480788778fa3edea67e688176d

        SHA256

        ea346035f4f06f8b89e805dd2da545bf61c95a937cfdf14e204cc9b3382f2acb

        SHA512

        bf0ba919d994dc4e1913070041d6de04f0b21ff7e86984d669782413182639fc4f7125832301029271fd63e12ba1f7af44c905354cd59a3806419327c9277c20

      • C:\Windows\SysWOW64\Kdopod32.exe

        Filesize

        89KB

        MD5

        dcf410c8e5b546d409da3c355b37aa5f

        SHA1

        3ca9d08023005ca31132737437e0b5a531796939

        SHA256

        c71464881b189ef1bb2d0a8df31ade827b798a84279a03cc5d10f95b5a03fa45

        SHA512

        d43eb8424d77fd2b060bf71db4bbaddd8fab2c3aa26af69749a3b01357df83b7aaf5b5a1322b8a689b6026bbec096a966f3e6cc30544227f8eed5c3f41c62e01

      • C:\Windows\SysWOW64\Kgphpo32.exe

        Filesize

        89KB

        MD5

        ee1048540d5fd64e5bd54d05533b7c65

        SHA1

        2c9685f96812aa465ab0ca6071f8b9a37844ef40

        SHA256

        a3715b0d7fee7d928c28160c3beab240c90c86613695c73f81a9ff82b5589194

        SHA512

        ebaef6f6b80c00017ab73aac644fb5aa2c706d081ecdd6dd02d386c4981337c49689dc8aa9f21f61b87964b68d511cdfedd252b7f034bd74a6aef4a0f04a8fd6

      • C:\Windows\SysWOW64\Kibnhjgj.exe

        Filesize

        89KB

        MD5

        a604633967228726e443fa715f43f093

        SHA1

        909800932b8e7fcd583a2c3fcd72cef0ba82c55f

        SHA256

        d960000953cc65fbdbb8cf849affd558dfa6977bea0610e8ed188ff9b81d048e

        SHA512

        6861aa5654f379f443f9dad022cb6d6b9350331ed5752db237ef15455a70af07c9972edde05bf07aeb532e01a04abd6f8435bb58eda344e18254b6fba45758cb

      • C:\Windows\SysWOW64\Kkkdan32.exe

        Filesize

        89KB

        MD5

        90f9689eb9a1b56391d4484b75a77081

        SHA1

        e67f73138790c965428746802fed984c4198b481

        SHA256

        d8c829651d6e93ab1658ba12a933c8940fd2156156c242bab8a3e4aa21b30f26

        SHA512

        23450295e7c9ecb1035a879d0d05051b011c0251ac6b933c7f479ece21dd723d79fc886e59052cbd109f7676fd00ca97eb861127643f08135249c343465b6d00

      • C:\Windows\SysWOW64\Kknafn32.exe

        Filesize

        89KB

        MD5

        9dcf854764ca089f465a289ff471e64b

        SHA1

        7755423b0aede18507ac8fd2d10e19bf58097c05

        SHA256

        2400c408ede2757e8bd683010024f2ef0e533fbf73e66a7afe01e849b2649931

        SHA512

        e9e4663c0be5dc4f644c400123f1ee856c76aa02d095051e1c3e87b9ddc4f40879c28de44764d7fb045fc12f02df502e05a47f5b389ae6127fbec60c328975d9

      • C:\Windows\SysWOW64\Kmegbjgn.exe

        Filesize

        89KB

        MD5

        48fb8c1a83c7f6eba1a0ebcb13472cba

        SHA1

        147bfd07a6deeaf6325e5f7622f2d18844e6e783

        SHA256

        c4b81c1cdffce214c29fd3f767ccab188e6440d8997a93d36d030f6beab5b8ec

        SHA512

        5eeafcb8e7993470e7228880e69d212ee74b09815a145db516e9cd97e4fb0629b820af6ef283024a08abd462272775d64a9b9bce1fa96cd1133bb31965227ce2

      • C:\Windows\SysWOW64\Kmgdgjek.exe

        Filesize

        89KB

        MD5

        cc7b614be44aba6c23a6e3b11eb0eae3

        SHA1

        526abf84b79d52c2a0dab05548c38d7b175884e3

        SHA256

        8c60f88b687652176c6e53df5c44670735cf60487dd0db351d0ba23cf97d803b

        SHA512

        c739c264fb60a81a1336667d62d57feb4aca4bd11c543b4ae9b67df7560be19698cf2cd873b6f2e018a222b35f0379f934fc81a2db1d2b34cd49a8a418b35bad

      • C:\Windows\SysWOW64\Kmlnbi32.exe

        Filesize

        89KB

        MD5

        895dba25576fa899fad29a17aee67e2f

        SHA1

        aadcb3b8f66fd538378c21d077bb81d1ac7e3fdd

        SHA256

        c4a487f6322784cc4152f4f5a65d2869defe94ed87ebe0b18c493093b3144b3f

        SHA512

        2771ff3631ea0ce030fa42622bdc2bd40ae98b13d1e64409bfd80a5752587e6994836e1953ccd9c850c7b8220132be3eb366e04ae527a2526d55680be83622f2

      • C:\Windows\SysWOW64\Kmnjhioc.exe

        Filesize

        89KB

        MD5

        9f187386a3003b6fcdf554955a950bbf

        SHA1

        7343b4ac6f24ae4c68b6303b7913e564e05f3ca7

        SHA256

        228993d24a35f708c44bd810025e627e8e35fd63c84dc9fc0f6e6f494742e214

        SHA512

        02f60e3569fd60434f83777d6d1cb97b2e8fcc165af0cf95eca0ee8030ec0de3553b6c8b860fd816c15198f71ff7b997594cfebe8d2cd1e97b170f88b80e8891

      • C:\Windows\SysWOW64\Kpepcedo.exe

        Filesize

        89KB

        MD5

        648fcd371a18edc30cf9fd91831dd57f

        SHA1

        5057a6a8b71d78ee0b4143bcb62a12908c9d5ae4

        SHA256

        5da4eb0b545226a9016b2fa373b615f897ccaf53a42b5831d0e0b8be2dc14eea

        SHA512

        ae65b60aed9cdbc9be5eef0a6370222e05a3eaa2921a4eb3c0294e6cc50a3c96995ef67a62e6edad2cfbd1a5a924c54549e325b70890f5d18a3222e4db7c68de

      • C:\Windows\SysWOW64\Kphmie32.exe

        Filesize

        89KB

        MD5

        d98f97a44f17f4da52b5c62b5be9f97d

        SHA1

        4dfb1833fc78dbb66fbd1362259b94e1c2adb5ea

        SHA256

        16ecda24101abfef970e0935da3f02bd09242583fcec4b04199b4ed56d6cde35

        SHA512

        c3a48a98e3be00d8879234a12086a3de53083bcc77e9b3518cdec57250e06ca923dd217ac37c181ee83aa93ff76b7884bc8839ffaced2cbdc9ac83ed211b98bb

      • C:\Windows\SysWOW64\Kphmie32.exe

        Filesize

        89KB

        MD5

        fc8488fab8fb74da3d6f4c5b2b0d384c

        SHA1

        b3cfa18a0aaaef8ab9d6d06465ce43a3153be120

        SHA256

        4036da37178633db701662f4e7554023ca818b5305d20ebd592e4e11cc2be397

        SHA512

        6c5a7f4739a769b5f4e1e76fb0f40cfcf0756c12237fc59cb3a0de755ccc442b4b44bb6aa57387d83844b63ca6a1c52d0dfb090af925213caa3b987a96bd509a

      • C:\Windows\SysWOW64\Kpjjod32.exe

        Filesize

        89KB

        MD5

        a8a4c77cdf99e5d63e05e1d42906b689

        SHA1

        552974c49c40795f33d7c7563f5e2f8457e78d45

        SHA256

        69190e3eff5172511857b0e5d2f96157f7eb31195b11e4c6824b38916a5a9177

        SHA512

        eaed8824cfc1d12a9483cf1b164d42ea9846e6bbf78e8b89efb662816cb2d23636ba6bd71b498ef7eb9fc5be0ee23ce0a4c895419bf98b06fc174c8dab3c5277

      • C:\Windows\SysWOW64\Kpmfddnf.exe

        Filesize

        89KB

        MD5

        6a8d0f82a11c98732fd66c10b9ad827f

        SHA1

        95118b406b5ccf181f98975e1209f772c60dfe2f

        SHA256

        134d17d2581e21e5bf961f7a8275ab3b056a958b367f778c6b4de217b4925e50

        SHA512

        0ff9439651ea504b1c916727422922a8457f92f13b91c0ceabd624b91a25fc83d8d6563da4d412787aa08f23c68e9c168035881265822822cf9019272e99b2b2

      • C:\Windows\SysWOW64\Lgkhlnbn.exe

        Filesize

        89KB

        MD5

        9686d5305df7e31ff1d2b77977b53cbc

        SHA1

        fe47677e31fc6c324429712b12c7c5087ead984f

        SHA256

        e140bc78310ee81d91d9ad32edf140c12f9817fab521297e5843aabf9bf21ca8

        SHA512

        2ab4f39afcfef3766856ac6257920db63ac5b0c2d5359a3bd3bbba73008f319fd7d7c68456e6c7a6b3ce162d961f6e9875280cc8781f99964ee4a94f81697a72

      • C:\Windows\SysWOW64\Lgpagm32.exe

        Filesize

        89KB

        MD5

        d3818dc33b0d761eebe95042eff230e1

        SHA1

        e3ab459e0d1efa3629aebfbbfadc17217ddf5e8f

        SHA256

        d40d0ff918bcb7f0f170617448c302420be62239e69411e49207e713f31d1c41

        SHA512

        f15d1237fdb89244d0f4f4f4a0b45c944ef051b3dfe8783a77540c9248cdd172d41e78da35f7820187cc96512b849b94ca500f839d1e391d40fcffabdb421d51

      • C:\Windows\SysWOW64\Liggbi32.exe

        Filesize

        89KB

        MD5

        08c55434ae37a4e018141f568114faa5

        SHA1

        9ea56440a5bab1d51fbb9d1752e9c44f7cbccf2f

        SHA256

        9dcecb3373f48fab651d4b03c402aa7c60e37cdfb4127f1f6017e0abfaf8c7af

        SHA512

        784b8bc7b2fc6932925e45cd6ba366a8eb863c56cee228ccac14eecd67dbeb091a4115350942f79e896f4abd593541bf19a3406d58d40967e4723a0232eda770

      • C:\Windows\SysWOW64\Maohkd32.exe

        Filesize

        89KB

        MD5

        2e6ed5b1c5f073ba5dc2b6fd0d742a0c

        SHA1

        b5afc2b6fa2547b2ae729d6b3d8ae102a0ce2755

        SHA256

        709ef2d3855a92430a378d75d46919f34939c46fc68b0d32a5d694e21547947a

        SHA512

        5db236c34cad647ef3cbe286ee134ae49530a90db5cd41b3b5b40304249267d1bbc2ae38af81e113f216e1958f83732a1ccca6b4b4a1d91ec3a74782b2f69e05

      • C:\Windows\SysWOW64\Mnocof32.exe

        Filesize

        89KB

        MD5

        4d70a28e79b962018603b0da7de66090

        SHA1

        2a2292e16f44d47f45e4e13469540d7a5c428dd4

        SHA256

        c32ca8e2eb8d6966feeb3d76394c2df8faf5ddd2082e016fdef5bf2e0a5d0891

        SHA512

        5deee4356ba61312706291ca16d0289312d207f0b30633a407cd7e4d66e298562677fd7d3f77010cc8783e5831212c04ce9ec6bc0841992e70efdfbe996803d3

      • C:\Windows\SysWOW64\Nqiogp32.exe

        Filesize

        89KB

        MD5

        425b8a595e626eb5697dfbc70cbcbe6e

        SHA1

        32b9a6dde3f54274857acaf8214578ea77b05bef

        SHA256

        baf6793d095a720bccc318fff1b36f954d2580087b4fce9c4b27c14ceb3a6179

        SHA512

        9d4a0c33a3d8d014e5cc3f76379c240c3d95f9a04caa9fb20fabfacb2ae8f27162147a1b64adc9c01ac711d35737598fdbf855603cd9c8827138cb1cc2f70f4d

      • memory/212-341-0x0000000000400000-0x000000000043E000-memory.dmp

        Filesize

        248KB

      • memory/384-443-0x0000000000400000-0x000000000043E000-memory.dmp

        Filesize

        248KB

      • memory/384-506-0x0000000000400000-0x000000000043E000-memory.dmp

        Filesize

        248KB

      • memory/388-337-0x0000000000400000-0x000000000043E000-memory.dmp

        Filesize

        248KB

      • memory/660-253-0x0000000000400000-0x000000000043E000-memory.dmp

        Filesize

        248KB

      • memory/844-518-0x0000000000400000-0x000000000043E000-memory.dmp

        Filesize

        248KB

      • memory/844-359-0x0000000000400000-0x000000000043E000-memory.dmp

        Filesize

        248KB

      • memory/940-69-0x0000000000400000-0x000000000043E000-memory.dmp

        Filesize

        248KB

      • memory/1084-305-0x0000000000400000-0x000000000043E000-memory.dmp

        Filesize

        248KB

      • memory/1220-201-0x0000000000400000-0x000000000043E000-memory.dmp

        Filesize

        248KB

      • memory/1356-500-0x0000000000400000-0x000000000043E000-memory.dmp

        Filesize

        248KB

      • memory/1356-481-0x0000000000400000-0x000000000043E000-memory.dmp

        Filesize

        248KB

      • memory/1384-516-0x0000000000400000-0x000000000043E000-memory.dmp

        Filesize

        248KB

      • memory/1384-377-0x0000000000400000-0x000000000043E000-memory.dmp

        Filesize

        248KB

      • memory/1684-285-0x0000000000400000-0x000000000043E000-memory.dmp

        Filesize

        248KB

      • memory/1696-435-0x0000000000400000-0x000000000043E000-memory.dmp

        Filesize

        248KB

      • memory/1804-33-0x0000000000400000-0x000000000043E000-memory.dmp

        Filesize

        248KB

      • memory/1852-185-0x0000000000400000-0x000000000043E000-memory.dmp

        Filesize

        248KB

      • memory/1988-498-0x0000000000400000-0x000000000043E000-memory.dmp

        Filesize

        248KB

      • memory/1988-497-0x0000000000400000-0x000000000043E000-memory.dmp

        Filesize

        248KB

      • memory/2080-273-0x0000000000400000-0x000000000043E000-memory.dmp

        Filesize

        248KB

      • memory/2092-160-0x0000000000400000-0x000000000043E000-memory.dmp

        Filesize

        248KB

      • memory/2236-275-0x0000000000400000-0x000000000043E000-memory.dmp

        Filesize

        248KB

      • memory/2372-489-0x0000000000400000-0x000000000043E000-memory.dmp

        Filesize

        248KB

      • memory/2424-501-0x0000000000400000-0x000000000043E000-memory.dmp

        Filesize

        248KB

      • memory/2424-473-0x0000000000400000-0x000000000043E000-memory.dmp

        Filesize

        248KB

      • memory/2428-401-0x0000000000400000-0x000000000043E000-memory.dmp

        Filesize

        248KB

      • memory/2428-512-0x0000000000400000-0x000000000043E000-memory.dmp

        Filesize

        248KB

      • memory/2484-0-0x0000000000400000-0x000000000043E000-memory.dmp

        Filesize

        248KB

      • memory/2484-1-0x0000000000432000-0x0000000000433000-memory.dmp

        Filesize

        4KB

      • memory/2660-515-0x0000000000400000-0x000000000043E000-memory.dmp

        Filesize

        248KB

      • memory/2660-383-0x0000000000400000-0x000000000043E000-memory.dmp

        Filesize

        248KB

      • memory/2724-81-0x0000000000400000-0x000000000043E000-memory.dmp

        Filesize

        248KB

      • memory/2752-413-0x0000000000400000-0x000000000043E000-memory.dmp

        Filesize

        248KB

      • memory/2752-510-0x0000000000400000-0x000000000043E000-memory.dmp

        Filesize

        248KB

      • memory/2756-495-0x0000000000400000-0x000000000043E000-memory.dmp

        Filesize

        248KB

      • memory/2756-499-0x0000000000400000-0x000000000043E000-memory.dmp

        Filesize

        248KB

      • memory/2852-209-0x0000000000400000-0x000000000043E000-memory.dmp

        Filesize

        248KB

      • memory/3088-89-0x0000000000400000-0x000000000043E000-memory.dmp

        Filesize

        248KB

      • memory/3236-399-0x0000000000400000-0x000000000043E000-memory.dmp

        Filesize

        248KB

      • memory/3236-513-0x0000000000400000-0x000000000043E000-memory.dmp

        Filesize

        248KB

      • memory/3248-217-0x0000000000400000-0x000000000043E000-memory.dmp

        Filesize

        248KB

      • memory/3408-25-0x0000000000400000-0x000000000043E000-memory.dmp

        Filesize

        248KB

      • memory/3472-321-0x0000000000400000-0x000000000043E000-memory.dmp

        Filesize

        248KB

      • memory/3512-241-0x0000000000400000-0x000000000043E000-memory.dmp

        Filesize

        248KB

      • memory/3528-73-0x0000000000400000-0x000000000043E000-memory.dmp

        Filesize

        248KB

      • memory/3660-157-0x0000000000400000-0x000000000043E000-memory.dmp

        Filesize

        248KB

      • memory/3688-425-0x0000000000400000-0x000000000043E000-memory.dmp

        Filesize

        248KB

      • memory/3688-508-0x0000000000400000-0x000000000043E000-memory.dmp

        Filesize

        248KB

      • memory/3692-13-0x0000000000400000-0x000000000043E000-memory.dmp

        Filesize

        248KB

      • memory/3816-117-0x0000000000400000-0x000000000043E000-memory.dmp

        Filesize

        248KB

      • memory/3900-44-0x0000000000400000-0x000000000043E000-memory.dmp

        Filesize

        248KB

      • memory/3952-181-0x0000000000400000-0x000000000043E000-memory.dmp

        Filesize

        248KB

      • memory/4012-509-0x0000000000400000-0x000000000043E000-memory.dmp

        Filesize

        248KB

      • memory/4012-419-0x0000000000400000-0x000000000043E000-memory.dmp

        Filesize

        248KB

      • memory/4216-233-0x0000000000400000-0x000000000043E000-memory.dmp

        Filesize

        248KB

      • memory/4352-263-0x0000000000400000-0x000000000043E000-memory.dmp

        Filesize

        248KB

      • memory/4376-49-0x0000000000400000-0x000000000043E000-memory.dmp

        Filesize

        248KB

      • memory/4400-327-0x0000000000400000-0x000000000043E000-memory.dmp

        Filesize

        248KB

      • memory/4408-57-0x0000000000400000-0x000000000043E000-memory.dmp

        Filesize

        248KB

      • memory/4456-407-0x0000000000400000-0x000000000043E000-memory.dmp

        Filesize

        248KB

      • memory/4456-511-0x0000000000400000-0x000000000043E000-memory.dmp

        Filesize

        248KB

      • memory/4472-145-0x0000000000400000-0x000000000043E000-memory.dmp

        Filesize

        248KB

      • memory/4488-449-0x0000000000400000-0x000000000043E000-memory.dmp

        Filesize

        248KB

      • memory/4488-505-0x0000000000400000-0x000000000043E000-memory.dmp

        Filesize

        248KB

      • memory/4572-121-0x0000000000400000-0x000000000043E000-memory.dmp

        Filesize

        248KB

      • memory/4604-105-0x0000000000400000-0x000000000043E000-memory.dmp

        Filesize

        248KB

      • memory/4632-21-0x0000000000400000-0x000000000043E000-memory.dmp

        Filesize

        248KB

      • memory/4688-129-0x0000000000400000-0x000000000043E000-memory.dmp

        Filesize

        248KB

      • memory/4704-389-0x0000000000400000-0x000000000043E000-memory.dmp

        Filesize

        248KB

      • memory/4704-514-0x0000000000400000-0x000000000043E000-memory.dmp

        Filesize

        248KB

      • memory/4708-365-0x0000000000400000-0x000000000043E000-memory.dmp

        Filesize

        248KB

      • memory/4708-517-0x0000000000400000-0x000000000043E000-memory.dmp

        Filesize

        248KB

      • memory/4804-455-0x0000000000400000-0x000000000043E000-memory.dmp

        Filesize

        248KB

      • memory/4804-504-0x0000000000400000-0x000000000043E000-memory.dmp

        Filesize

        248KB

      • memory/4824-293-0x0000000000400000-0x000000000043E000-memory.dmp

        Filesize

        248KB

      • memory/4904-353-0x0000000000400000-0x000000000043E000-memory.dmp

        Filesize

        248KB

      • memory/4904-519-0x0000000000400000-0x000000000043E000-memory.dmp

        Filesize

        248KB

      • memory/4916-136-0x0000000000400000-0x000000000043E000-memory.dmp

        Filesize

        248KB

      • memory/4936-333-0x0000000000400000-0x000000000043E000-memory.dmp

        Filesize

        248KB

      • memory/4952-101-0x0000000000400000-0x000000000043E000-memory.dmp

        Filesize

        248KB

      • memory/5008-375-0x0000000000400000-0x000000000043E000-memory.dmp

        Filesize

        248KB

      • memory/5024-468-0x0000000000400000-0x000000000043E000-memory.dmp

        Filesize

        248KB

      • memory/5024-502-0x0000000000400000-0x000000000043E000-memory.dmp

        Filesize

        248KB

      • memory/5296-225-0x0000000000400000-0x000000000043E000-memory.dmp

        Filesize

        248KB

      • memory/5492-347-0x0000000000400000-0x000000000043E000-memory.dmp

        Filesize

        248KB

      • memory/5576-193-0x0000000000400000-0x000000000043E000-memory.dmp

        Filesize

        248KB

      • memory/5680-168-0x0000000000400000-0x000000000043E000-memory.dmp

        Filesize

        248KB

      • memory/5768-311-0x0000000000400000-0x000000000043E000-memory.dmp

        Filesize

        248KB

      • memory/5900-291-0x0000000000400000-0x000000000043E000-memory.dmp

        Filesize

        248KB

      • memory/5904-257-0x0000000000400000-0x000000000043E000-memory.dmp

        Filesize

        248KB

      • memory/5936-303-0x0000000000400000-0x000000000043E000-memory.dmp

        Filesize

        248KB

      • memory/5976-461-0x0000000000400000-0x000000000043E000-memory.dmp

        Filesize

        248KB

      • memory/5976-503-0x0000000000400000-0x000000000043E000-memory.dmp

        Filesize

        248KB

      • memory/6068-507-0x0000000000400000-0x000000000043E000-memory.dmp

        Filesize

        248KB

      • memory/6068-437-0x0000000000400000-0x000000000043E000-memory.dmp

        Filesize

        248KB