Analysis

  • max time kernel
    149s
  • max time network
    152s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240426-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240426-enlocale:en-usos:windows10-2004-x64system
  • submitted
    08-05-2024 19:38

General

  • Target

    24fd54db7bc727d0e43d18e328edd670_NEIKI.exe

  • Size

    1.9MB

  • MD5

    24fd54db7bc727d0e43d18e328edd670

  • SHA1

    6ef6b8438c7d5b42437702f720f22a112f76ec4f

  • SHA256

    8d7f6b53e831b0260030049e8e040854beca571bc99ef4f5c3b3c48fc8c3cb20

  • SHA512

    43027e5f205b80605c345114d0d585f7a168cf6bf27e5422ca28b9eb2e345b20bf2133b4d6375a0947cf9e59e67bb87c592691b92b9b9f6a5af81de2250abc17

  • SSDEEP

    49152:CaSHFaZRBEYyqmS2DiHPKQgmZUnaUgpC7jvha51N:CaSHFaZRBEYyqmS2DiHPKQgmZ0aUgUjY

Malware Config

Signatures

  • Adds autorun key to be loaded by Explorer.exe on startup 2 TTPs 64 IoCs
  • Malware Dropper & Backdoor - Berbew 32 IoCs

    Berbew is a backdoor Trojan malware with capabilities to download and install a range of additional malicious software, such as other Trojans, ransomware, and cryptominers.

  • Executes dropped EXE 64 IoCs
  • Drops file in System32 directory 64 IoCs
  • Program crash 1 IoCs
  • Modifies registry class 64 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\24fd54db7bc727d0e43d18e328edd670_NEIKI.exe
    "C:\Users\Admin\AppData\Local\Temp\24fd54db7bc727d0e43d18e328edd670_NEIKI.exe"
    1⤵
    • Drops file in System32 directory
    • Modifies registry class
    • Suspicious use of WriteProcessMemory
    PID:2028
    • C:\Windows\SysWOW64\Ffekegon.exe
      C:\Windows\system32\Ffekegon.exe
      2⤵
      • Adds autorun key to be loaded by Explorer.exe on startup
      • Executes dropped EXE
      • Drops file in System32 directory
      • Modifies registry class
      • Suspicious use of WriteProcessMemory
      PID:1536
      • C:\Windows\SysWOW64\Ffggkgmk.exe
        C:\Windows\system32\Ffggkgmk.exe
        3⤵
        • Adds autorun key to be loaded by Explorer.exe on startup
        • Executes dropped EXE
        • Drops file in System32 directory
        • Modifies registry class
        • Suspicious use of WriteProcessMemory
        PID:4788
        • C:\Windows\SysWOW64\Fjhmgeao.exe
          C:\Windows\system32\Fjhmgeao.exe
          4⤵
          • Adds autorun key to be loaded by Explorer.exe on startup
          • Executes dropped EXE
          • Drops file in System32 directory
          • Modifies registry class
          • Suspicious use of WriteProcessMemory
          PID:3720
          • C:\Windows\SysWOW64\Gbcakg32.exe
            C:\Windows\system32\Gbcakg32.exe
            5⤵
            • Adds autorun key to be loaded by Explorer.exe on startup
            • Executes dropped EXE
            • Modifies registry class
            • Suspicious use of WriteProcessMemory
            PID:2392
            • C:\Windows\SysWOW64\Gmmocpjk.exe
              C:\Windows\system32\Gmmocpjk.exe
              6⤵
              • Adds autorun key to be loaded by Explorer.exe on startup
              • Executes dropped EXE
              • Drops file in System32 directory
              • Modifies registry class
              • Suspicious use of WriteProcessMemory
              PID:3488
              • C:\Windows\SysWOW64\Gcggpj32.exe
                C:\Windows\system32\Gcggpj32.exe
                7⤵
                • Executes dropped EXE
                • Suspicious use of WriteProcessMemory
                PID:3472
                • C:\Windows\SysWOW64\Gjapmdid.exe
                  C:\Windows\system32\Gjapmdid.exe
                  8⤵
                  • Adds autorun key to be loaded by Explorer.exe on startup
                  • Executes dropped EXE
                  • Modifies registry class
                  • Suspicious use of WriteProcessMemory
                  PID:4976
                  • C:\Windows\SysWOW64\Hbanme32.exe
                    C:\Windows\system32\Hbanme32.exe
                    9⤵
                    • Adds autorun key to be loaded by Explorer.exe on startup
                    • Executes dropped EXE
                    • Suspicious use of WriteProcessMemory
                    PID:3520
                    • C:\Windows\SysWOW64\Hpgkkioa.exe
                      C:\Windows\system32\Hpgkkioa.exe
                      10⤵
                      • Adds autorun key to be loaded by Explorer.exe on startup
                      • Executes dropped EXE
                      • Drops file in System32 directory
                      • Suspicious use of WriteProcessMemory
                      PID:3264
                      • C:\Windows\SysWOW64\Hjmoibog.exe
                        C:\Windows\system32\Hjmoibog.exe
                        11⤵
                        • Executes dropped EXE
                        • Modifies registry class
                        • Suspicious use of WriteProcessMemory
                        PID:2768
                        • C:\Windows\SysWOW64\Hpihai32.exe
                          C:\Windows\system32\Hpihai32.exe
                          12⤵
                          • Adds autorun key to be loaded by Explorer.exe on startup
                          • Executes dropped EXE
                          • Drops file in System32 directory
                          • Modifies registry class
                          • Suspicious use of WriteProcessMemory
                          PID:1116
                          • C:\Windows\SysWOW64\Hfcpncdk.exe
                            C:\Windows\system32\Hfcpncdk.exe
                            13⤵
                            • Adds autorun key to be loaded by Explorer.exe on startup
                            • Executes dropped EXE
                            • Drops file in System32 directory
                            • Modifies registry class
                            • Suspicious use of WriteProcessMemory
                            PID:5052
                            • C:\Windows\SysWOW64\Hmmhjm32.exe
                              C:\Windows\system32\Hmmhjm32.exe
                              14⤵
                              • Adds autorun key to be loaded by Explorer.exe on startup
                              • Executes dropped EXE
                              • Suspicious use of WriteProcessMemory
                              PID:5092
                              • C:\Windows\SysWOW64\Icgqggce.exe
                                C:\Windows\system32\Icgqggce.exe
                                15⤵
                                • Adds autorun key to be loaded by Explorer.exe on startup
                                • Executes dropped EXE
                                • Drops file in System32 directory
                                • Modifies registry class
                                • Suspicious use of WriteProcessMemory
                                PID:1980
                                • C:\Windows\SysWOW64\Idacmfkj.exe
                                  C:\Windows\system32\Idacmfkj.exe
                                  16⤵
                                  • Adds autorun key to be loaded by Explorer.exe on startup
                                  • Executes dropped EXE
                                  • Drops file in System32 directory
                                  • Modifies registry class
                                  • Suspicious use of WriteProcessMemory
                                  PID:4460
                                  • C:\Windows\SysWOW64\Iinlemia.exe
                                    C:\Windows\system32\Iinlemia.exe
                                    17⤵
                                    • Executes dropped EXE
                                    • Drops file in System32 directory
                                    • Modifies registry class
                                    • Suspicious use of WriteProcessMemory
                                    PID:3016
                                    • C:\Windows\SysWOW64\Jpgdbg32.exe
                                      C:\Windows\system32\Jpgdbg32.exe
                                      18⤵
                                      • Executes dropped EXE
                                      • Suspicious use of WriteProcessMemory
                                      PID:1356
                                      • C:\Windows\SysWOW64\Jmbklj32.exe
                                        C:\Windows\system32\Jmbklj32.exe
                                        19⤵
                                        • Executes dropped EXE
                                        • Modifies registry class
                                        • Suspicious use of WriteProcessMemory
                                        PID:3004
                                        • C:\Windows\SysWOW64\Jfkoeppq.exe
                                          C:\Windows\system32\Jfkoeppq.exe
                                          20⤵
                                          • Executes dropped EXE
                                          • Modifies registry class
                                          • Suspicious use of WriteProcessMemory
                                          PID:4856
                                          • C:\Windows\SysWOW64\Kbapjafe.exe
                                            C:\Windows\system32\Kbapjafe.exe
                                            21⤵
                                            • Adds autorun key to be loaded by Explorer.exe on startup
                                            • Executes dropped EXE
                                            • Drops file in System32 directory
                                            • Suspicious use of WriteProcessMemory
                                            PID:2520
                                            • C:\Windows\SysWOW64\Kmlnbi32.exe
                                              C:\Windows\system32\Kmlnbi32.exe
                                              22⤵
                                              • Adds autorun key to be loaded by Explorer.exe on startup
                                              • Executes dropped EXE
                                              • Drops file in System32 directory
                                              • Suspicious use of WriteProcessMemory
                                              PID:4704
                                              • C:\Windows\SysWOW64\Kmnjhioc.exe
                                                C:\Windows\system32\Kmnjhioc.exe
                                                23⤵
                                                • Executes dropped EXE
                                                • Drops file in System32 directory
                                                PID:1452
                                                • C:\Windows\SysWOW64\Kpmfddnf.exe
                                                  C:\Windows\system32\Kpmfddnf.exe
                                                  24⤵
                                                  • Adds autorun key to be loaded by Explorer.exe on startup
                                                  • Executes dropped EXE
                                                  • Drops file in System32 directory
                                                  PID:2364
                                                  • C:\Windows\SysWOW64\Kkbkamnl.exe
                                                    C:\Windows\system32\Kkbkamnl.exe
                                                    25⤵
                                                    • Executes dropped EXE
                                                    • Drops file in System32 directory
                                                    PID:432
                                                    • C:\Windows\SysWOW64\Lgkhlnbn.exe
                                                      C:\Windows\system32\Lgkhlnbn.exe
                                                      26⤵
                                                      • Executes dropped EXE
                                                      • Drops file in System32 directory
                                                      PID:952
                                                      • C:\Windows\SysWOW64\Lpcmec32.exe
                                                        C:\Windows\system32\Lpcmec32.exe
                                                        27⤵
                                                        • Adds autorun key to be loaded by Explorer.exe on startup
                                                        • Executes dropped EXE
                                                        • Drops file in System32 directory
                                                        • Modifies registry class
                                                        PID:1988
                                                        • C:\Windows\SysWOW64\Lcbiao32.exe
                                                          C:\Windows\system32\Lcbiao32.exe
                                                          28⤵
                                                          • Executes dropped EXE
                                                          PID:1532
                                                          • C:\Windows\SysWOW64\Lilanioo.exe
                                                            C:\Windows\system32\Lilanioo.exe
                                                            29⤵
                                                            • Adds autorun key to be loaded by Explorer.exe on startup
                                                            • Executes dropped EXE
                                                            • Drops file in System32 directory
                                                            PID:2492
                                                            • C:\Windows\SysWOW64\Laciofpa.exe
                                                              C:\Windows\system32\Laciofpa.exe
                                                              30⤵
                                                              • Executes dropped EXE
                                                              • Drops file in System32 directory
                                                              PID:1528
                                                              • C:\Windows\SysWOW64\Ldaeka32.exe
                                                                C:\Windows\system32\Ldaeka32.exe
                                                                31⤵
                                                                • Executes dropped EXE
                                                                • Modifies registry class
                                                                PID:3860
                                                                • C:\Windows\SysWOW64\Lklnhlfb.exe
                                                                  C:\Windows\system32\Lklnhlfb.exe
                                                                  32⤵
                                                                  • Executes dropped EXE
                                                                  • Modifies registry class
                                                                  PID:3916
                                                                  • C:\Windows\SysWOW64\Lnjjdgee.exe
                                                                    C:\Windows\system32\Lnjjdgee.exe
                                                                    33⤵
                                                                    • Adds autorun key to be loaded by Explorer.exe on startup
                                                                    • Executes dropped EXE
                                                                    • Drops file in System32 directory
                                                                    • Modifies registry class
                                                                    PID:1696
                                                                    • C:\Windows\SysWOW64\Lphfpbdi.exe
                                                                      C:\Windows\system32\Lphfpbdi.exe
                                                                      34⤵
                                                                      • Adds autorun key to be loaded by Explorer.exe on startup
                                                                      • Executes dropped EXE
                                                                      • Drops file in System32 directory
                                                                      • Modifies registry class
                                                                      PID:464
                                                                      • C:\Windows\SysWOW64\Lcgblncm.exe
                                                                        C:\Windows\system32\Lcgblncm.exe
                                                                        35⤵
                                                                        • Adds autorun key to be loaded by Explorer.exe on startup
                                                                        • Executes dropped EXE
                                                                        • Drops file in System32 directory
                                                                        • Modifies registry class
                                                                        PID:744
                                                                        • C:\Windows\SysWOW64\Mjqjih32.exe
                                                                          C:\Windows\system32\Mjqjih32.exe
                                                                          36⤵
                                                                          • Adds autorun key to be loaded by Explorer.exe on startup
                                                                          • Executes dropped EXE
                                                                          • Drops file in System32 directory
                                                                          • Modifies registry class
                                                                          PID:408
                                                                          • C:\Windows\SysWOW64\Mpkbebbf.exe
                                                                            C:\Windows\system32\Mpkbebbf.exe
                                                                            37⤵
                                                                            • Adds autorun key to be loaded by Explorer.exe on startup
                                                                            • Executes dropped EXE
                                                                            • Drops file in System32 directory
                                                                            • Modifies registry class
                                                                            PID:2684
                                                                            • C:\Windows\SysWOW64\Mciobn32.exe
                                                                              C:\Windows\system32\Mciobn32.exe
                                                                              38⤵
                                                                              • Adds autorun key to be loaded by Explorer.exe on startup
                                                                              • Executes dropped EXE
                                                                              • Modifies registry class
                                                                              PID:3644
                                                                              • C:\Windows\SysWOW64\Mjcgohig.exe
                                                                                C:\Windows\system32\Mjcgohig.exe
                                                                                39⤵
                                                                                • Adds autorun key to be loaded by Explorer.exe on startup
                                                                                • Executes dropped EXE
                                                                                • Drops file in System32 directory
                                                                                PID:628
                                                                                • C:\Windows\SysWOW64\Majopeii.exe
                                                                                  C:\Windows\system32\Majopeii.exe
                                                                                  40⤵
                                                                                  • Adds autorun key to be loaded by Explorer.exe on startup
                                                                                  • Executes dropped EXE
                                                                                  PID:2828
                                                                                  • C:\Windows\SysWOW64\Mdiklqhm.exe
                                                                                    C:\Windows\system32\Mdiklqhm.exe
                                                                                    41⤵
                                                                                    • Adds autorun key to be loaded by Explorer.exe on startup
                                                                                    • Executes dropped EXE
                                                                                    • Modifies registry class
                                                                                    PID:664
                                                                                    • C:\Windows\SysWOW64\Mgghhlhq.exe
                                                                                      C:\Windows\system32\Mgghhlhq.exe
                                                                                      42⤵
                                                                                      • Adds autorun key to be loaded by Explorer.exe on startup
                                                                                      • Executes dropped EXE
                                                                                      • Drops file in System32 directory
                                                                                      • Modifies registry class
                                                                                      PID:4952
                                                                                      • C:\Windows\SysWOW64\Mjeddggd.exe
                                                                                        C:\Windows\system32\Mjeddggd.exe
                                                                                        43⤵
                                                                                        • Executes dropped EXE
                                                                                        • Drops file in System32 directory
                                                                                        PID:2632
                                                                                        • C:\Windows\SysWOW64\Mamleegg.exe
                                                                                          C:\Windows\system32\Mamleegg.exe
                                                                                          44⤵
                                                                                          • Adds autorun key to be loaded by Explorer.exe on startup
                                                                                          • Executes dropped EXE
                                                                                          PID:2240
                                                                                          • C:\Windows\SysWOW64\Mdkhapfj.exe
                                                                                            C:\Windows\system32\Mdkhapfj.exe
                                                                                            45⤵
                                                                                            • Adds autorun key to be loaded by Explorer.exe on startup
                                                                                            • Executes dropped EXE
                                                                                            • Drops file in System32 directory
                                                                                            • Modifies registry class
                                                                                            PID:4640
                                                                                            • C:\Windows\SysWOW64\Mkepnjng.exe
                                                                                              C:\Windows\system32\Mkepnjng.exe
                                                                                              46⤵
                                                                                              • Executes dropped EXE
                                                                                              • Drops file in System32 directory
                                                                                              • Modifies registry class
                                                                                              PID:784
                                                                                              • C:\Windows\SysWOW64\Mncmjfmk.exe
                                                                                                C:\Windows\system32\Mncmjfmk.exe
                                                                                                47⤵
                                                                                                • Adds autorun key to be loaded by Explorer.exe on startup
                                                                                                • Executes dropped EXE
                                                                                                • Drops file in System32 directory
                                                                                                PID:2164
                                                                                                • C:\Windows\SysWOW64\Mpaifalo.exe
                                                                                                  C:\Windows\system32\Mpaifalo.exe
                                                                                                  48⤵
                                                                                                  • Adds autorun key to be loaded by Explorer.exe on startup
                                                                                                  • Executes dropped EXE
                                                                                                  • Drops file in System32 directory
                                                                                                  • Modifies registry class
                                                                                                  PID:2628
                                                                                                  • C:\Windows\SysWOW64\Mcpebmkb.exe
                                                                                                    C:\Windows\system32\Mcpebmkb.exe
                                                                                                    49⤵
                                                                                                    • Adds autorun key to be loaded by Explorer.exe on startup
                                                                                                    • Executes dropped EXE
                                                                                                    • Drops file in System32 directory
                                                                                                    • Modifies registry class
                                                                                                    PID:624
                                                                                                    • C:\Windows\SysWOW64\Mjjmog32.exe
                                                                                                      C:\Windows\system32\Mjjmog32.exe
                                                                                                      50⤵
                                                                                                      • Adds autorun key to be loaded by Explorer.exe on startup
                                                                                                      • Executes dropped EXE
                                                                                                      • Drops file in System32 directory
                                                                                                      PID:760
                                                                                                      • C:\Windows\SysWOW64\Maaepd32.exe
                                                                                                        C:\Windows\system32\Maaepd32.exe
                                                                                                        51⤵
                                                                                                        • Adds autorun key to be loaded by Explorer.exe on startup
                                                                                                        • Executes dropped EXE
                                                                                                        • Drops file in System32 directory
                                                                                                        • Modifies registry class
                                                                                                        PID:840
                                                                                                        • C:\Windows\SysWOW64\Mdpalp32.exe
                                                                                                          C:\Windows\system32\Mdpalp32.exe
                                                                                                          52⤵
                                                                                                          • Adds autorun key to be loaded by Explorer.exe on startup
                                                                                                          • Executes dropped EXE
                                                                                                          • Drops file in System32 directory
                                                                                                          • Modifies registry class
                                                                                                          PID:4552
                                                                                                          • C:\Windows\SysWOW64\Mgnnhk32.exe
                                                                                                            C:\Windows\system32\Mgnnhk32.exe
                                                                                                            53⤵
                                                                                                            • Adds autorun key to be loaded by Explorer.exe on startup
                                                                                                            • Executes dropped EXE
                                                                                                            • Drops file in System32 directory
                                                                                                            • Modifies registry class
                                                                                                            PID:768
                                                                                                            • C:\Windows\SysWOW64\Nqfbaq32.exe
                                                                                                              C:\Windows\system32\Nqfbaq32.exe
                                                                                                              54⤵
                                                                                                              • Adds autorun key to be loaded by Explorer.exe on startup
                                                                                                              • Executes dropped EXE
                                                                                                              • Drops file in System32 directory
                                                                                                              PID:3864
                                                                                                              • C:\Windows\SysWOW64\Nceonl32.exe
                                                                                                                C:\Windows\system32\Nceonl32.exe
                                                                                                                55⤵
                                                                                                                • Adds autorun key to be loaded by Explorer.exe on startup
                                                                                                                • Executes dropped EXE
                                                                                                                • Drops file in System32 directory
                                                                                                                • Modifies registry class
                                                                                                                PID:2560
                                                                                                                • C:\Windows\SysWOW64\Nklfoi32.exe
                                                                                                                  C:\Windows\system32\Nklfoi32.exe
                                                                                                                  56⤵
                                                                                                                  • Adds autorun key to be loaded by Explorer.exe on startup
                                                                                                                  • Executes dropped EXE
                                                                                                                  • Drops file in System32 directory
                                                                                                                  • Modifies registry class
                                                                                                                  PID:3844
                                                                                                                  • C:\Windows\SysWOW64\Nafokcol.exe
                                                                                                                    C:\Windows\system32\Nafokcol.exe
                                                                                                                    57⤵
                                                                                                                    • Executes dropped EXE
                                                                                                                    PID:2796
                                                                                                                    • C:\Windows\SysWOW64\Nddkgonp.exe
                                                                                                                      C:\Windows\system32\Nddkgonp.exe
                                                                                                                      58⤵
                                                                                                                      • Executes dropped EXE
                                                                                                                      • Drops file in System32 directory
                                                                                                                      • Modifies registry class
                                                                                                                      PID:4644
                                                                                                                      • C:\Windows\SysWOW64\Ngcgcjnc.exe
                                                                                                                        C:\Windows\system32\Ngcgcjnc.exe
                                                                                                                        59⤵
                                                                                                                        • Adds autorun key to be loaded by Explorer.exe on startup
                                                                                                                        • Executes dropped EXE
                                                                                                                        • Modifies registry class
                                                                                                                        PID:2524
                                                                                                                        • C:\Windows\SysWOW64\Njacpf32.exe
                                                                                                                          C:\Windows\system32\Njacpf32.exe
                                                                                                                          60⤵
                                                                                                                          • Adds autorun key to be loaded by Explorer.exe on startup
                                                                                                                          • Executes dropped EXE
                                                                                                                          • Drops file in System32 directory
                                                                                                                          • Modifies registry class
                                                                                                                          PID:3204
                                                                                                                          • C:\Windows\SysWOW64\Nqklmpdd.exe
                                                                                                                            C:\Windows\system32\Nqklmpdd.exe
                                                                                                                            61⤵
                                                                                                                            • Adds autorun key to be loaded by Explorer.exe on startup
                                                                                                                            • Executes dropped EXE
                                                                                                                            • Drops file in System32 directory
                                                                                                                            • Modifies registry class
                                                                                                                            PID:3724
                                                                                                                            • C:\Windows\SysWOW64\Ncihikcg.exe
                                                                                                                              C:\Windows\system32\Ncihikcg.exe
                                                                                                                              62⤵
                                                                                                                              • Executes dropped EXE
                                                                                                                              • Drops file in System32 directory
                                                                                                                              • Modifies registry class
                                                                                                                              PID:4792
                                                                                                                              • C:\Windows\SysWOW64\Nkqpjidj.exe
                                                                                                                                C:\Windows\system32\Nkqpjidj.exe
                                                                                                                                63⤵
                                                                                                                                • Adds autorun key to be loaded by Explorer.exe on startup
                                                                                                                                • Executes dropped EXE
                                                                                                                                • Modifies registry class
                                                                                                                                PID:3884
                                                                                                                                • C:\Windows\SysWOW64\Nnolfdcn.exe
                                                                                                                                  C:\Windows\system32\Nnolfdcn.exe
                                                                                                                                  64⤵
                                                                                                                                  • Executes dropped EXE
                                                                                                                                  • Drops file in System32 directory
                                                                                                                                  PID:2096
                                                                                                                                  • C:\Windows\SysWOW64\Nqmhbpba.exe
                                                                                                                                    C:\Windows\system32\Nqmhbpba.exe
                                                                                                                                    65⤵
                                                                                                                                    • Executes dropped EXE
                                                                                                                                    • Drops file in System32 directory
                                                                                                                                    PID:5016
                                                                                                                                    • C:\Windows\SysWOW64\Ncldnkae.exe
                                                                                                                                      C:\Windows\system32\Ncldnkae.exe
                                                                                                                                      66⤵
                                                                                                                                      • Adds autorun key to be loaded by Explorer.exe on startup
                                                                                                                                      • Drops file in System32 directory
                                                                                                                                      PID:4596
                                                                                                                                      • C:\Windows\SysWOW64\Nkcmohbg.exe
                                                                                                                                        C:\Windows\system32\Nkcmohbg.exe
                                                                                                                                        67⤵
                                                                                                                                          PID:4100
                                                                                                                                          • C:\Windows\SysWOW64\WerFault.exe
                                                                                                                                            C:\Windows\SysWOW64\WerFault.exe -u -p 4100 -s 400
                                                                                                                                            68⤵
                                                                                                                                            • Program crash
                                                                                                                                            PID:2792
    • C:\Windows\SysWOW64\WerFault.exe
      C:\Windows\SysWOW64\WerFault.exe -pss -s 408 -p 4100 -ip 4100
      1⤵
        PID:452
      • C:\Windows\system32\svchost.exe
        C:\Windows\system32\svchost.exe -k netsvcs -p -s wuauserv
        1⤵
          PID:3884

        Network

        MITRE ATT&CK Enterprise v15

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • C:\Windows\SysWOW64\Ffekegon.exe

          Filesize

          1.9MB

          MD5

          2000cf3eb3606b4465d110c13d36d46e

          SHA1

          8edc83d9a03cdce455220d348c14750b76beae2d

          SHA256

          9af1e4c7dc5659de099bd08ea62a60410d1af3f9c042938bcf9941619ae88b93

          SHA512

          3932f9eb93a1f9d1cb9c342b88087d69509969c0b0d356a0e60a1308ee32099e5ffeca9baea69b84cc9156ea7b2c893b8c347be6c5cbc05fbdbe30425553936b

        • C:\Windows\SysWOW64\Ffggkgmk.exe

          Filesize

          1.9MB

          MD5

          7f35582192f27ed6bf52b1842f2172ce

          SHA1

          fa3e944f9a9865a29a15da276938d9b94c18f33f

          SHA256

          2cd8c9e78cf6149407060e3653ea33ff7b75803590100ac2cf87012cd98f01bf

          SHA512

          a694ea6d4a94ea32a269d3742577e28ec5e08fe5b4f6ed189afb2244fe81737aa16049fbd9374b12dfe63f4d8229585e02e3b7fe45e580a870313033d58584a7

        • C:\Windows\SysWOW64\Fjhmgeao.exe

          Filesize

          1.9MB

          MD5

          000950b5038c82468a43ffe82e80b2cd

          SHA1

          cc159303ecec6d2fdc75ccc1c9785cc35352f0c9

          SHA256

          fc0a6293a0e038e8d9e7f6b06d23b14297414bfda7d9fd08e997e3f56aa6bb0c

          SHA512

          ee09a50f73136d79bdaed389412eaae3b8e0dfe9e95f991665ee683c7bff37107be7d8ff31c52884a321dff0ff1b839a171f861b49c78adff6d364ce576d5d4e

        • C:\Windows\SysWOW64\Gbcakg32.exe

          Filesize

          1.9MB

          MD5

          c766310de3c2c11f3ee244d66d8238e5

          SHA1

          45687746204019a03e3aaeb38204161a83f94642

          SHA256

          4d6421e399fe2098d0ffbba4290b3db1b0120812af2187ec6e3b5bb5f8278bfb

          SHA512

          ef3bee5263936e7ab4ed0885551fceca94f059827bf6efec5fc1536e89267ece68782d39c916f40c6bf743eea8c0bd635ac5440b22f98898bad798deda6df74e

        • C:\Windows\SysWOW64\Gcggpj32.exe

          Filesize

          1.9MB

          MD5

          783919326c11d19768ce54c4ce146dd5

          SHA1

          d55dce7fe09d6403d46a46874b40e42714ced8c0

          SHA256

          a5f9339c3f52b722fb81dbae448cc552a79754ec58b9620f31473b0b557d1940

          SHA512

          7cf66571eea458c4fd171d8a1ba3befd5e5497826e2dc528487865e68f3a1e0f7777925ab697bb82a9d7644ca4b18a19afe5e440dc49661edf4bf390c3af2a5d

        • C:\Windows\SysWOW64\Gjapmdid.exe

          Filesize

          1.9MB

          MD5

          01ab90731beb8e3a4b32d6e8842f4f52

          SHA1

          572e5eb96b7b2eb82347a668803ab1a333a0d088

          SHA256

          d7b4c60df9a8649219b511270a17d6460457b2700967a5f066689d06e760ce6c

          SHA512

          1aea74871309f56230d9efbf5633e0ba8a3815a810c96ee87f93e2f3aa017b94bfd64455fada30ff12f34e59159ea608a2f65d524630e83b729130e78eae8e28

        • C:\Windows\SysWOW64\Gmmocpjk.exe

          Filesize

          1.9MB

          MD5

          edbfe4a0239b410dae798b0afa99eec2

          SHA1

          b7bbc53f6dce0b5a92fea5fa656f2d0249c80f8d

          SHA256

          4ea4e0d25fca09bb5412a88073e3f2d9f859d70b8d76ead56f934ac2b90025ec

          SHA512

          1995634d833b9e6f77697723beecec23f2925a5ae1b36a3e480f0a4c3136006abb02819b463ec798541bf1617da8b243ac9a7a82bc82913d264b46852a1f264d

        • C:\Windows\SysWOW64\Hbanme32.exe

          Filesize

          1.9MB

          MD5

          417aa6ccbfe1bedc3319dcc508d29d94

          SHA1

          2c80dec0094224e0599633c8d58dc90f3cb5c645

          SHA256

          c8ec55f9e9cb9f377caff61624a290ce56eb2a3b353afa28d984c676457d4719

          SHA512

          94e86d9dab95e06a045e01b3982b262a63a880f9d546e530edcc0c3aa900a18fea3ff29c20533c4f12cd9aec7b0f94c84dd66dc28e40173157b578209be7a8b7

        • C:\Windows\SysWOW64\Hfcpncdk.exe

          Filesize

          1.9MB

          MD5

          2d5fe51535630e2f8826b928148fbd16

          SHA1

          6f40e315ed619f60d11e59f4de33753714e5716d

          SHA256

          2da47693ceba17c17dde1c0f2a78eb43c5e33ea360af95483eb2851ed53a889a

          SHA512

          1cb76f841671a47d0a80a0b9e9711ed8d468a128580b2558e56b9985480d43095bc42ecff6b886ea24e1d66a90306c1d23d2e86e6bc53b2a1542292b97b6855d

        • C:\Windows\SysWOW64\Hjmoibog.exe

          Filesize

          1.9MB

          MD5

          e9fd05adfb33ca1ba7ead8cb7af0ab6b

          SHA1

          6bb8fa19cc588c49236f49d0802e9adf0b8633ab

          SHA256

          d0442989ee86a42a99ea994a2fa827328f2b5de505eb79881a1e1b0643de237c

          SHA512

          bbdb07e3dc639dc05fc49d70998c4732de5946a79ad85d83087f5ad481b6b64457a502473c17553a09bdf19de036045cf4ed733101ab0f747157754b81f994fe

        • C:\Windows\SysWOW64\Hmmhjm32.exe

          Filesize

          1.9MB

          MD5

          52b668437b097a1d29e6d6cd39c2e697

          SHA1

          a4d9c9e5db5d3dc4858c7b1b06d5d7a968d9e683

          SHA256

          9b89691b05015efdd5b65d96f8bf5804694743addfbe6b6af41b6550ddcb0eb8

          SHA512

          7ffc3cb3dac6fbe91553b3e99b8f89920d80233b2a003ffe361c947043cdb864e0ba8ebed987c6054faf119e003ea9b2f677e2cb6410fa82f258c5aab64a995a

        • C:\Windows\SysWOW64\Hpgkkioa.exe

          Filesize

          1.9MB

          MD5

          b55a21095903f1194e07d4e3c0927b22

          SHA1

          06852356ef06a25434a2a6d4f88f60df74267c10

          SHA256

          4e259d5dc76e5028398472d139042baae2df9802896890acbca71f7e9708c339

          SHA512

          90e7594844dc7358889ce003f15553f3192432147a0d7f0a1cba7ba77b491f65b5f9d6bedf95ca3e638bdcdac1e6dd5b15924d8a15b827670862da9798adc379

        • C:\Windows\SysWOW64\Hpihai32.exe

          Filesize

          1.9MB

          MD5

          007a6ca0c39fc34ba538671cf2da257e

          SHA1

          a7057cfc049be2dfa6e240666e2f10f04a0f6338

          SHA256

          d334dca6c4e0661dad63a0ab4a6956e9dad2fc27229062a1c36767bd529ab2bf

          SHA512

          83fdef85e864aca738dbacaf78fd1df99779342ffc8b738ea7f9062b276ba23ec5e2d8fab82e6090b80d9c68182073d6e28458d0b55ab853eec1c0d69ee0dc81

        • C:\Windows\SysWOW64\Icgqggce.exe

          Filesize

          1.9MB

          MD5

          3ad77098bf022b85970fdb8591dad5d0

          SHA1

          469d4aee8b48d60060cd8f81dca43e86ba6d9559

          SHA256

          233cd8297d46a067260f6ce83aa138f7278fc1b158796642c1e03116a64672c1

          SHA512

          f9f55163af3a6f1e3bfd2960a3e537b27bb89e1947134dccbebbd98d82cdc973596c5c1cda51eda8eb0196ffeb7983348c3070be2adf68a11cf2f59192560744

        • C:\Windows\SysWOW64\Idacmfkj.exe

          Filesize

          1.9MB

          MD5

          85e2de82a8c5ffd7661374dad8101c1d

          SHA1

          abed9a5572f75d77b70ed906bc8ff0c1b8eb9e08

          SHA256

          e7cf882ff1630a6d92733aaa11157162725e09e740e8111cb29e91621f7d73a8

          SHA512

          72d8782185418f3b2e602ab85f78bc4c653a9e271049b10de6ac0252e6e9cc32494a27f0afdd3c4bee7bc0d17211189bf5b564183a69e417dcef41d15d3cb9da

        • C:\Windows\SysWOW64\Iinlemia.exe

          Filesize

          1.9MB

          MD5

          f4cf644ae983f5c3b16ef62df75f9670

          SHA1

          50b7c2eb88b1a6efe3678708895a8c823cbfdae2

          SHA256

          a6038d4129b5b819ea4946388547b65b194088e6c3181a0f4bffe909720653fe

          SHA512

          4bf40fb5fd951806e0d0267c0e827f5c25c950830d966c3018cd223b866595cc1a462fca452a422b6634081e67c1cc96b5bbbfbb6c5c49689a31096f792b8229

        • C:\Windows\SysWOW64\Jfkoeppq.exe

          Filesize

          1.9MB

          MD5

          440f0e903421b437cf513e9f7f146579

          SHA1

          6e326acac815d4a17eef719c02fa68717f19a05f

          SHA256

          ddcd454eb9b1bef87916191f3313f0bd84fdfbf4acd16ae034679be85a8b28db

          SHA512

          ca856e13d2adf26bf4cf4443124e0a163c197848bd42cba5c6bbd466f205eb7aae903e7cb73e3fa25381845fcd01e2c3e368a03343de029b04217c6ff70a1256

        • C:\Windows\SysWOW64\Jmbklj32.exe

          Filesize

          1.9MB

          MD5

          9dcbd6d24a506edca0db81b4178189b2

          SHA1

          addd27d1a72a38fe5bbd26fbf3b90fae0e48ca58

          SHA256

          32f5bed75dfb88fcde2763cf1c0de1094640525cdf779a4293066a45cd98fd8c

          SHA512

          7096e5b415305be31b046ddcdc3de4d358c54749ca32163f740ca2439393449ab4955a0ff2c68c3667930ea51aa9160dcf1550627fb27e47d21d942efd94a123

        • C:\Windows\SysWOW64\Jpgdbg32.exe

          Filesize

          1.9MB

          MD5

          bb694f32d660c21f2d4774b0d13289aa

          SHA1

          1f3924c03c05992e759d9b666e8752b37245716b

          SHA256

          c75267bf5272c7d397717b01300393e28c83f33360f1390c2518b8c5ea73c6e2

          SHA512

          678b1acafc5117c0ec9122b38a79b43981e72a1bd5791c539746816f7e8e19bd9c47390b4882e20df4c1118fc92ebdc37e9a69fcb3d37da969802e1828565245

        • C:\Windows\SysWOW64\Kbapjafe.exe

          Filesize

          1.9MB

          MD5

          966a065b83c1724fe106a8f385c361eb

          SHA1

          8184e4f8a46dd94efb7a4fd5de5de8711a500991

          SHA256

          c864a8124806e517b58f5e86dfd5b86ecc73e3859516167b6014f03f813a5b2d

          SHA512

          f35d65fbbc85c223b7fcccef0ee0962b89385b8edcaf8eee99bfbf5e20f960d6ad57ac16a815e0c68f9ebbc330ed0251f6aa6eab321590218aebc3bc7acb5f8d

        • C:\Windows\SysWOW64\Kkbkamnl.exe

          Filesize

          1.9MB

          MD5

          320c427ef131aa36e88dded55340f8ac

          SHA1

          315e8ce3e59137d7db6e01eaf445dc21812f8b37

          SHA256

          389e1b15fa811c20908fb242c4d4f1f160f5a5d7355d4a9219a4f80746efef7d

          SHA512

          be1a9695aca791bec3711cfb321d4901d42fce220356e781a837bd9dc24cf6ee630447c5847f12b6dadf8d1eba4bfc1f5ebbe86bd060dd1526a3dc50eaef2371

        • C:\Windows\SysWOW64\Kmlnbi32.exe

          Filesize

          1.9MB

          MD5

          831f9d9df06a39c785a738c67e71f521

          SHA1

          d24bf6e090c5742914b6051565e3791190fe24af

          SHA256

          8efcfe7b6e3597dd47741e689a5955be10e23d37ba25281a0893fb017c0c0c3f

          SHA512

          3539c3182b800d94c13773aea2fbd91a7fc8d8c535acc0289eefd56b98bf91c9eb96e14a8c08ac89ba814e6074ba1c216fdd296f834b23bd311f695535779378

        • C:\Windows\SysWOW64\Kmnjhioc.exe

          Filesize

          1.9MB

          MD5

          7f86ac03bb4c70e48f32a93f3e68df75

          SHA1

          a7d34e9a14bb01e238716b5bef2b238dad45dbcb

          SHA256

          1ebe53ed1e447d06a13dc3199414ec945fc41b802cdb60218b39282766591469

          SHA512

          3148b786557f6fc4c64d667117b0fe1c70254639c86a33dcad1059c1cec558b09bc10565fa9edc57642c96cf22ab6772674434546f505cf7268dbfd5b2bce199

        • C:\Windows\SysWOW64\Kpmfddnf.exe

          Filesize

          1.9MB

          MD5

          e88e092a8f16329d1e2332268357363f

          SHA1

          f9ea294f2f8cb17c01160403ff1410e9f110d653

          SHA256

          489b665f72779a567f47731fa8a2fac5f628241f63fd63475c7093f95cac8845

          SHA512

          2c8fbd33a348d842d57b4d340374d70dfa1cc832114d985a5cad1e6480bf29f98db4aa72357507dc49b576c852e0394ac69c53c36c601bb35ee5cafb8a2f97f8

        • C:\Windows\SysWOW64\Laciofpa.exe

          Filesize

          1.9MB

          MD5

          67460d5988f26d17ef4f295a76da9c0a

          SHA1

          bc9ffc6492d6684efc6de69d418749dbd9f83dfe

          SHA256

          31103178f3e05bd3f92e57487175823fb0aeeebe7233db7818559f8a6c3dc8f2

          SHA512

          feec14747b7e61376e5896eb90c743611d49ffd0661ebb1643638302fdf6c34c6f0e97168d11f877a1a2269c140a01910d8f2aeaf99df6bf0e78b45582500197

        • C:\Windows\SysWOW64\Lcbiao32.exe

          Filesize

          1.9MB

          MD5

          a77d3bda032f703e2f45f06e9dec713e

          SHA1

          e388628814a3717b44a4cc87cd97247a526304ac

          SHA256

          6bebeb6f56efa55abb1afc335d162ec8545599f329e7b0e4454892719b13f333

          SHA512

          fa54a615e67502bce098d1b47def2f7434114490d6b2f5d86ce4e922fec1d2d9bd0a0b883450adb87788334d1c1bb077677b431cc1e078791fd1c2739ba90b22

        • C:\Windows\SysWOW64\Ldaeka32.exe

          Filesize

          1.9MB

          MD5

          de846d0f75064ad32d5013e02a7fec7b

          SHA1

          0afd80c35201305fc57cd273dddea4f7a811b608

          SHA256

          0957a00fde203bf399feb30918923160fb9cbef1e6ba7e8f60dbc19b272e6df3

          SHA512

          104e34a4964825d63f912481bb65bf537f119c7d88d23c3bf956785e5fb6d84ce0d4695bd5dfd27890ecead8ac12f4416ca7b57b0c5900d9c09289688e2c1fb2

        • C:\Windows\SysWOW64\Lgkhlnbn.exe

          Filesize

          1.9MB

          MD5

          1fd35f81f2ef6715f7b9c1c94ede7864

          SHA1

          a2c6b2477d1442659c12a6559368d4eb56aac1da

          SHA256

          00fa19a444c898ce8362578ed936ad53ac4e7f61b0ceb66f452e64bf22635d51

          SHA512

          739c78bd6e8f60b7c15c9d84fe6d51eedb17bd0d5397a4927b9fe833224648ed7cb48e77a40f84c9a625b44f29ea3031e05ce3bf48496d40f1d19d4b99de6cb8

        • C:\Windows\SysWOW64\Lilanioo.exe

          Filesize

          1.9MB

          MD5

          e5f15062b22a57f45eb02884fa18e9d4

          SHA1

          135395e2bdd708ada5a59b5ecede8226cc36a67e

          SHA256

          2b6216c7d6579c39d5808d4cc555bbb75cb830042c7d0d3bfe7a0f336c0c1797

          SHA512

          b69e3559825e6c9424730eb481ad92c8c6b044043017cf6925887b7628bd5e87fb66dea45b561651a953f13422ec8b364162771fe1c58dca35ae0c41dbc674c8

        • C:\Windows\SysWOW64\Lklnhlfb.exe

          Filesize

          1.9MB

          MD5

          2d2c61aa7ea1eb2f70e77f01b4fe1cd9

          SHA1

          c63f332729e5022393345bb13082aae03cc7f66b

          SHA256

          cd36345dd95ad8dfeb74ddd34bfe1d395cb043ccb9a9fb88d4f6f8c07d4d388d

          SHA512

          592a6aed3add798ccae548850e458d6831836a8660695d6f0a138ec7daef4468b623088adf65e2c184b21528df3af503549a0c96657ead0bfe4c7ef07e8ee3a7

        • C:\Windows\SysWOW64\Lnjjdgee.exe

          Filesize

          1.9MB

          MD5

          34638f83a435978c55e77fc3d580c6c7

          SHA1

          d1f5bf083fac602d3a09882ffce0cf5527979a30

          SHA256

          311526c6cc9cd5ea2db3c96d5fe3e07bc460b0901830c1a1c616186c1908c79f

          SHA512

          e3feee2b2a7c364f327e5ed78050c21cb81388d3d0a5f20eb3d35c1e390eaead85732f0bb8a8f591728d3a5c6174b24d243265d2f1cf41834e48bf823852ec1f

        • C:\Windows\SysWOW64\Lpcmec32.exe

          Filesize

          1.9MB

          MD5

          4e5cb3de1fda6a88125e1be4c70dee29

          SHA1

          40093d7489d29d7d0fe71539a9097aa27cd7d961

          SHA256

          c2863b33d2afa583e566ef9f1bdbacd058af8429f1380c1637089d92738807b7

          SHA512

          e77a764fa8a47e0d8142cbbd14982ff2a692c19449498ff4ad0857cea79a5b4355e41c64f9a08efdfbfe469db9bee2aaa63594d0677540cb5dbfebdacddd23a0

        • memory/408-360-0x0000000000400000-0x0000000000433000-memory.dmp

          Filesize

          204KB

        • memory/432-193-0x0000000000400000-0x0000000000433000-memory.dmp

          Filesize

          204KB

        • memory/432-545-0x0000000000400000-0x0000000000433000-memory.dmp

          Filesize

          204KB

        • memory/464-358-0x0000000000400000-0x0000000000433000-memory.dmp

          Filesize

          204KB

        • memory/624-373-0x0000000000400000-0x0000000000433000-memory.dmp

          Filesize

          204KB

        • memory/628-363-0x0000000000400000-0x0000000000433000-memory.dmp

          Filesize

          204KB

        • memory/664-365-0x0000000000400000-0x0000000000433000-memory.dmp

          Filesize

          204KB

        • memory/744-359-0x0000000000400000-0x0000000000433000-memory.dmp

          Filesize

          204KB

        • memory/760-374-0x0000000000400000-0x0000000000433000-memory.dmp

          Filesize

          204KB

        • memory/768-447-0x0000000000400000-0x0000000000433000-memory.dmp

          Filesize

          204KB

        • memory/784-370-0x0000000000400000-0x0000000000433000-memory.dmp

          Filesize

          204KB

        • memory/840-375-0x0000000000400000-0x0000000000433000-memory.dmp

          Filesize

          204KB

        • memory/952-206-0x0000000000400000-0x0000000000433000-memory.dmp

          Filesize

          204KB

        • memory/1116-94-0x0000000000400000-0x0000000000433000-memory.dmp

          Filesize

          204KB

        • memory/1356-137-0x0000000000400000-0x0000000000433000-memory.dmp

          Filesize

          204KB

        • memory/1356-513-0x0000000000400000-0x0000000000433000-memory.dmp

          Filesize

          204KB

        • memory/1452-179-0x0000000000400000-0x0000000000433000-memory.dmp

          Filesize

          204KB

        • memory/1452-506-0x0000000000400000-0x0000000000433000-memory.dmp

          Filesize

          204KB

        • memory/1528-238-0x0000000000400000-0x0000000000433000-memory.dmp

          Filesize

          204KB

        • memory/1532-229-0x0000000000400000-0x0000000000433000-memory.dmp

          Filesize

          204KB

        • memory/1536-541-0x0000000000400000-0x0000000000433000-memory.dmp

          Filesize

          204KB

        • memory/1536-9-0x0000000000400000-0x0000000000433000-memory.dmp

          Filesize

          204KB

        • memory/1696-357-0x0000000000400000-0x0000000000433000-memory.dmp

          Filesize

          204KB

        • memory/1980-114-0x0000000000400000-0x0000000000433000-memory.dmp

          Filesize

          204KB

        • memory/1980-518-0x0000000000400000-0x0000000000433000-memory.dmp

          Filesize

          204KB

        • memory/1988-214-0x0000000000400000-0x0000000000433000-memory.dmp

          Filesize

          204KB

        • memory/2028-543-0x0000000000400000-0x0000000000433000-memory.dmp

          Filesize

          204KB

        • memory/2028-2-0x0000000000431000-0x0000000000432000-memory.dmp

          Filesize

          4KB

        • memory/2028-0-0x0000000000400000-0x0000000000433000-memory.dmp

          Filesize

          204KB

        • memory/2096-458-0x0000000000400000-0x0000000000433000-memory.dmp

          Filesize

          204KB

        • memory/2164-371-0x0000000000400000-0x0000000000433000-memory.dmp

          Filesize

          204KB

        • memory/2240-368-0x0000000000400000-0x0000000000433000-memory.dmp

          Filesize

          204KB

        • memory/2364-189-0x0000000000400000-0x0000000000433000-memory.dmp

          Filesize

          204KB

        • memory/2392-33-0x0000000000400000-0x0000000000433000-memory.dmp

          Filesize

          204KB

        • memory/2392-535-0x0000000000400000-0x0000000000433000-memory.dmp

          Filesize

          204KB

        • memory/2492-230-0x0000000000400000-0x0000000000433000-memory.dmp

          Filesize

          204KB

        • memory/2520-508-0x0000000000400000-0x0000000000433000-memory.dmp

          Filesize

          204KB

        • memory/2520-161-0x0000000000400000-0x0000000000433000-memory.dmp

          Filesize

          204KB

        • memory/2524-453-0x0000000000400000-0x0000000000433000-memory.dmp

          Filesize

          204KB

        • memory/2560-449-0x0000000000400000-0x0000000000433000-memory.dmp

          Filesize

          204KB

        • memory/2628-372-0x0000000000400000-0x0000000000433000-memory.dmp

          Filesize

          204KB

        • memory/2632-367-0x0000000000400000-0x0000000000433000-memory.dmp

          Filesize

          204KB

        • memory/2684-361-0x0000000000400000-0x0000000000433000-memory.dmp

          Filesize

          204KB

        • memory/2768-81-0x0000000000400000-0x0000000000433000-memory.dmp

          Filesize

          204KB

        • memory/2768-523-0x0000000000400000-0x0000000000433000-memory.dmp

          Filesize

          204KB

        • memory/2796-451-0x0000000000400000-0x0000000000433000-memory.dmp

          Filesize

          204KB

        • memory/2828-364-0x0000000000400000-0x0000000000433000-memory.dmp

          Filesize

          204KB

        • memory/3004-145-0x0000000000400000-0x0000000000433000-memory.dmp

          Filesize

          204KB

        • memory/3004-511-0x0000000000400000-0x0000000000433000-memory.dmp

          Filesize

          204KB

        • memory/3016-514-0x0000000000400000-0x0000000000433000-memory.dmp

          Filesize

          204KB

        • memory/3016-129-0x0000000000400000-0x0000000000433000-memory.dmp

          Filesize

          204KB

        • memory/3204-454-0x0000000000400000-0x0000000000433000-memory.dmp

          Filesize

          204KB

        • memory/3264-525-0x0000000000400000-0x0000000000433000-memory.dmp

          Filesize

          204KB

        • memory/3264-73-0x0000000000400000-0x0000000000433000-memory.dmp

          Filesize

          204KB

        • memory/3472-49-0x0000000000400000-0x0000000000433000-memory.dmp

          Filesize

          204KB

        • memory/3472-531-0x0000000000400000-0x0000000000433000-memory.dmp

          Filesize

          204KB

        • memory/3488-41-0x0000000000400000-0x0000000000433000-memory.dmp

          Filesize

          204KB

        • memory/3488-533-0x0000000000400000-0x0000000000433000-memory.dmp

          Filesize

          204KB

        • memory/3520-65-0x0000000000400000-0x0000000000433000-memory.dmp

          Filesize

          204KB

        • memory/3520-527-0x0000000000400000-0x0000000000433000-memory.dmp

          Filesize

          204KB

        • memory/3644-362-0x0000000000400000-0x0000000000433000-memory.dmp

          Filesize

          204KB

        • memory/3720-537-0x0000000000400000-0x0000000000433000-memory.dmp

          Filesize

          204KB

        • memory/3720-24-0x0000000000400000-0x0000000000433000-memory.dmp

          Filesize

          204KB

        • memory/3724-455-0x0000000000400000-0x0000000000433000-memory.dmp

          Filesize

          204KB

        • memory/3844-450-0x0000000000400000-0x0000000000433000-memory.dmp

          Filesize

          204KB

        • memory/3860-355-0x0000000000400000-0x0000000000433000-memory.dmp

          Filesize

          204KB

        • memory/3864-448-0x0000000000400000-0x0000000000433000-memory.dmp

          Filesize

          204KB

        • memory/3884-457-0x0000000000400000-0x0000000000433000-memory.dmp

          Filesize

          204KB

        • memory/3916-356-0x0000000000400000-0x0000000000433000-memory.dmp

          Filesize

          204KB

        • memory/4100-461-0x0000000000400000-0x0000000000433000-memory.dmp

          Filesize

          204KB

        • memory/4460-516-0x0000000000400000-0x0000000000433000-memory.dmp

          Filesize

          204KB

        • memory/4460-120-0x0000000000400000-0x0000000000433000-memory.dmp

          Filesize

          204KB

        • memory/4552-376-0x0000000000400000-0x0000000000433000-memory.dmp

          Filesize

          204KB

        • memory/4596-460-0x0000000000400000-0x0000000000433000-memory.dmp

          Filesize

          204KB

        • memory/4640-369-0x0000000000400000-0x0000000000433000-memory.dmp

          Filesize

          204KB

        • memory/4644-452-0x0000000000400000-0x0000000000433000-memory.dmp

          Filesize

          204KB

        • memory/4704-173-0x0000000000400000-0x0000000000433000-memory.dmp

          Filesize

          204KB

        • memory/4788-16-0x0000000000400000-0x0000000000433000-memory.dmp

          Filesize

          204KB

        • memory/4788-539-0x0000000000400000-0x0000000000433000-memory.dmp

          Filesize

          204KB

        • memory/4792-456-0x0000000000400000-0x0000000000433000-memory.dmp

          Filesize

          204KB

        • memory/4856-153-0x0000000000400000-0x0000000000433000-memory.dmp

          Filesize

          204KB

        • memory/4856-510-0x0000000000400000-0x0000000000433000-memory.dmp

          Filesize

          204KB

        • memory/4952-366-0x0000000000400000-0x0000000000433000-memory.dmp

          Filesize

          204KB

        • memory/4976-57-0x0000000000400000-0x0000000000433000-memory.dmp

          Filesize

          204KB

        • memory/4976-529-0x0000000000400000-0x0000000000433000-memory.dmp

          Filesize

          204KB

        • memory/5016-459-0x0000000000400000-0x0000000000433000-memory.dmp

          Filesize

          204KB

        • memory/5052-108-0x0000000000400000-0x0000000000433000-memory.dmp

          Filesize

          204KB

        • memory/5092-109-0x0000000000400000-0x0000000000433000-memory.dmp

          Filesize

          204KB