Analysis
-
max time kernel
154s -
max time network
190s -
platform
windows10-2004_x64 -
resource
win10v2004-20220812-en -
resource tags
arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system -
submitted
25-11-2022 03:04
Static task
static1
Behavioral task
behavioral1
Sample
CF芭比多功能版0403SP1.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
CF芭比多功能版0403SP1.exe
Resource
win10v2004-20220812-en
Behavioral task
behavioral3
Sample
当下软件园.url
Resource
win7-20220812-en
Behavioral task
behavioral4
Sample
当下软件园.url
Resource
win10v2004-20220812-en
General
-
Target
CF芭比多功能版0403SP1.exe
-
Size
1.7MB
-
MD5
0721bc6496cbac2439116181fcfb1f07
-
SHA1
1fae1bd4795a20331a31ce0d6c7e10d43449522f
-
SHA256
d762d0626ee6f55b35c64ac6d967d17872939494063d65031c7f4d2674d3d945
-
SHA512
55679ab7d278fa1f80950478fb41f9a6d3344f6e04ffc341435fa91b4990f5a78b4610bd474f9a2c00fc9f511bee79c79f9dfcb00e6f17c3a7d123a07bfaaf2d
-
SSDEEP
24576:++i1xhYn/l2h9SarbVTwi/VXOkJmy7ujeNFmEFv4bEk7j:++uh4Gd3VTBdOOtmE14J
Malware Config
Signatures
-
Processes:
resource yara_rule behavioral2/memory/1928-132-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral2/memory/1928-133-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral2/memory/1928-134-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral2/memory/1928-136-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral2/memory/1928-138-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral2/memory/1928-140-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral2/memory/1928-142-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral2/memory/1928-144-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral2/memory/1928-146-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral2/memory/1928-148-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral2/memory/1928-150-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral2/memory/1928-152-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral2/memory/1928-154-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral2/memory/1928-156-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral2/memory/1928-158-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral2/memory/1928-160-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral2/memory/1928-162-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral2/memory/1928-164-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral2/memory/1928-166-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral2/memory/1928-168-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral2/memory/1928-170-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral2/memory/1928-172-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral2/memory/1928-174-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral2/memory/1928-175-0x0000000010000000-0x000000001003E000-memory.dmp upx -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
Processes:
CF芭比多功能版0403SP1.exedescription ioc process Key value queried \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\Control Panel\International\Geo\Nation CF芭比多功能版0403SP1.exe -
Adds Run key to start application 2 TTPs 1 IoCs
Processes:
msedge.exedescription ioc process Key created \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\Software\Microsoft\Windows\CurrentVersion\Run msedge.exe -
Drops file in Program Files directory 2 IoCs
Processes:
setup.exedescription ioc process File opened for modification C:\Program Files (x86)\Microsoft\Edge\Application\SetupMetrics\20221125090748.pma setup.exe File created C:\Program Files (x86)\Microsoft\Edge\Application\SetupMetrics\3986663a-463b-4bdd-a67d-8f4ae65050cd.tmp setup.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Enumerates system info in registry 2 TTPs 3 IoCs
Processes:
msedge.exedescription ioc process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Processes:
iexplore.exeIEXPLORE.EXEdescription ioc process Key created \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Internet Explorer\DomainSuggestion\FileNames iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Internet Explorer\Recovery\AdminActive\{74FEFEA2-6CA0-11ED-B696-520B3B914C01} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\Software\Microsoft\Internet Explorer\International\CpMRU IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Internet Explorer\International\CpMRU\Enable = "1" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Internet Explorer\International\CpMRU\Size = "10" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Internet Explorer\VersionManager\LastTTLLowDateTime = "1251635200" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Internet Explorer\VersionManager\LastUpdateHighDateTime = "30998701" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000f20ba438a514684ea014283ce555ecc20000000002000000000010660000000100002000000056429e1bfe445f68ad0eb58c8102c63fa889248632db429be11aa59e654187ae000000000e8000000002000020000000f37254e0b3d0c73d5310fa448b529b5b097fc2dc852d013064d1ba116001e2f7200000007bc1d253d8e318a43d08465599bb09ed532316a129c7d22c67e35f21a3ab1012400000007085af3bfe09d8b58f8fe062732ea45fead3ff8b9a7d4f6c056e474399de019a8834f582098ffe1c5f8ac4ae5e1b048bcd48b4381a9a3134df8278690941b22f iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\FileNames\ iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Internet Explorer\International\CpMRU\InitHits = "100" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Internet Explorer\VersionManager\LastUpdateLowDateTime = "1305806612" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\Software\Microsoft\Internet Explorer\IESettingSync IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000f20ba438a514684ea014283ce555ecc200000000020000000000106600000001000020000000ea7d5c508c591459bdf8b14da70c441b738afe060343d19cc163cfa857b0499a000000000e800000000200002000000030650f34efffaa32d2f71a6fcbd305cc9a39b649ea4d2899f81234342a79a098200000007c0e126a68fc2bea1e6576d588bb1c375b226cbb60e5df75127677fcbbcd79f340000000efd476dcf421fec8fdd4c044636182e13224c7573fe66e6475c2b3a51963df8279e5784b28686fb0c9f4c2f8984a5b050a7f6f45fa9a29e159acf8e51a0e9a21 iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\Software\Microsoft\Internet Explorer\VersionManager IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Internet Explorer\VersionManager\LastTTLHighDateTime = "50" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Internet Explorer\DomainSuggestion\FileNames\ iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Internet Explorer\DomainSuggestion\FileNames\en-US = "en-US.1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Internet Explorer\International\CpMRU\Factor = "20" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Internet Explorer\VersionManager\LastCheckForUpdateLowDateTime = "1305806612" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Internet Explorer\VersionManager\LastCheckForUpdateHighDateTime = "30998701" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "376132169" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 8068d270ad00d901 iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 8026a779ad00d901 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Internet Explorer\IESettingSync\SlowSettingTypesChanged = "2" IEXPLORE.EXE -
Modifies registry class 1 IoCs
Processes:
msedge.exedescription ioc process Key created \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ msedge.exe -
Suspicious behavior: EnumeratesProcesses 12 IoCs
Processes:
CF芭比多功能版0403SP1.exemsedge.exemsedge.exeidentity_helper.exemsedge.exepid process 1928 CF芭比多功能版0403SP1.exe 1928 CF芭比多功能版0403SP1.exe 4496 msedge.exe 4496 msedge.exe 4788 msedge.exe 4788 msedge.exe 1284 identity_helper.exe 1284 identity_helper.exe 5556 msedge.exe 5556 msedge.exe 5556 msedge.exe 5556 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 5 IoCs
Processes:
msedge.exepid process 4788 msedge.exe 4788 msedge.exe 4788 msedge.exe 4788 msedge.exe 4788 msedge.exe -
Suspicious use of FindShellTrayWindow 3 IoCs
Processes:
iexplore.exemsedge.exepid process 2268 iexplore.exe 4788 msedge.exe 4788 msedge.exe -
Suspicious use of SetWindowsHookEx 11 IoCs
Processes:
CF芭比多功能版0403SP1.exeiexplore.exeIEXPLORE.EXEpid process 1928 CF芭比多功能版0403SP1.exe 1928 CF芭比多功能版0403SP1.exe 1928 CF芭比多功能版0403SP1.exe 1928 CF芭比多功能版0403SP1.exe 1928 CF芭比多功能版0403SP1.exe 2268 iexplore.exe 2268 iexplore.exe 3364 IEXPLORE.EXE 3364 IEXPLORE.EXE 3364 IEXPLORE.EXE 3364 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 64 IoCs
Processes:
CF芭比多功能版0403SP1.exeiexplore.exemsedge.exedescription pid process target process PID 1928 wrote to memory of 2268 1928 CF芭比多功能版0403SP1.exe iexplore.exe PID 1928 wrote to memory of 2268 1928 CF芭比多功能版0403SP1.exe iexplore.exe PID 2268 wrote to memory of 3364 2268 iexplore.exe IEXPLORE.EXE PID 2268 wrote to memory of 3364 2268 iexplore.exe IEXPLORE.EXE PID 2268 wrote to memory of 3364 2268 iexplore.exe IEXPLORE.EXE PID 1928 wrote to memory of 4788 1928 CF芭比多功能版0403SP1.exe msedge.exe PID 1928 wrote to memory of 4788 1928 CF芭比多功能版0403SP1.exe msedge.exe PID 4788 wrote to memory of 4960 4788 msedge.exe msedge.exe PID 4788 wrote to memory of 4960 4788 msedge.exe msedge.exe PID 4788 wrote to memory of 2736 4788 msedge.exe msedge.exe PID 4788 wrote to memory of 2736 4788 msedge.exe msedge.exe PID 4788 wrote to memory of 2736 4788 msedge.exe msedge.exe PID 4788 wrote to memory of 2736 4788 msedge.exe msedge.exe PID 4788 wrote to memory of 2736 4788 msedge.exe msedge.exe PID 4788 wrote to memory of 2736 4788 msedge.exe msedge.exe PID 4788 wrote to memory of 2736 4788 msedge.exe msedge.exe PID 4788 wrote to memory of 2736 4788 msedge.exe msedge.exe PID 4788 wrote to memory of 2736 4788 msedge.exe msedge.exe PID 4788 wrote to memory of 2736 4788 msedge.exe msedge.exe PID 4788 wrote to memory of 2736 4788 msedge.exe msedge.exe PID 4788 wrote to memory of 2736 4788 msedge.exe msedge.exe PID 4788 wrote to memory of 2736 4788 msedge.exe msedge.exe PID 4788 wrote to memory of 2736 4788 msedge.exe msedge.exe PID 4788 wrote to memory of 2736 4788 msedge.exe msedge.exe PID 4788 wrote to memory of 2736 4788 msedge.exe msedge.exe PID 4788 wrote to memory of 2736 4788 msedge.exe msedge.exe PID 4788 wrote to memory of 2736 4788 msedge.exe msedge.exe PID 4788 wrote to memory of 2736 4788 msedge.exe msedge.exe PID 4788 wrote to memory of 2736 4788 msedge.exe msedge.exe PID 4788 wrote to memory of 2736 4788 msedge.exe msedge.exe PID 4788 wrote to memory of 2736 4788 msedge.exe msedge.exe PID 4788 wrote to memory of 2736 4788 msedge.exe msedge.exe PID 4788 wrote to memory of 2736 4788 msedge.exe msedge.exe PID 4788 wrote to memory of 2736 4788 msedge.exe msedge.exe PID 4788 wrote to memory of 2736 4788 msedge.exe msedge.exe PID 4788 wrote to memory of 2736 4788 msedge.exe msedge.exe PID 4788 wrote to memory of 2736 4788 msedge.exe msedge.exe PID 4788 wrote to memory of 2736 4788 msedge.exe msedge.exe PID 4788 wrote to memory of 2736 4788 msedge.exe msedge.exe PID 4788 wrote to memory of 2736 4788 msedge.exe msedge.exe PID 4788 wrote to memory of 2736 4788 msedge.exe msedge.exe PID 4788 wrote to memory of 2736 4788 msedge.exe msedge.exe PID 4788 wrote to memory of 2736 4788 msedge.exe msedge.exe PID 4788 wrote to memory of 2736 4788 msedge.exe msedge.exe PID 4788 wrote to memory of 2736 4788 msedge.exe msedge.exe PID 4788 wrote to memory of 2736 4788 msedge.exe msedge.exe PID 4788 wrote to memory of 2736 4788 msedge.exe msedge.exe PID 4788 wrote to memory of 2736 4788 msedge.exe msedge.exe PID 4788 wrote to memory of 2736 4788 msedge.exe msedge.exe PID 4788 wrote to memory of 4496 4788 msedge.exe msedge.exe PID 4788 wrote to memory of 4496 4788 msedge.exe msedge.exe PID 4788 wrote to memory of 916 4788 msedge.exe msedge.exe PID 4788 wrote to memory of 916 4788 msedge.exe msedge.exe PID 4788 wrote to memory of 916 4788 msedge.exe msedge.exe PID 4788 wrote to memory of 916 4788 msedge.exe msedge.exe PID 4788 wrote to memory of 916 4788 msedge.exe msedge.exe PID 4788 wrote to memory of 916 4788 msedge.exe msedge.exe PID 4788 wrote to memory of 916 4788 msedge.exe msedge.exe PID 4788 wrote to memory of 916 4788 msedge.exe msedge.exe PID 4788 wrote to memory of 916 4788 msedge.exe msedge.exe PID 4788 wrote to memory of 916 4788 msedge.exe msedge.exe PID 4788 wrote to memory of 916 4788 msedge.exe msedge.exe PID 4788 wrote to memory of 916 4788 msedge.exe msedge.exe PID 4788 wrote to memory of 916 4788 msedge.exe msedge.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\CF芭比多功能版0403SP1.exe"C:\Users\Admin\AppData\Local\Temp\CF芭比多功能版0403SP1.exe"1⤵
- Checks computer location settings
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" www.cfbabi.com2⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
-
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2268 CREDAT:17410 /prefetch:23⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument http://www.cfbabi.com/2⤵
- Adds Run key to start application
- Enumerates system info in registry
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of WriteProcessMemory
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xf8,0xfc,0x100,0xd4,0x104,0x7ffd991746f8,0x7ffd99174708,0x7ffd991747183⤵
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2104,15889132146256772767,14247936821356736788,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2156 /prefetch:23⤵
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2104,15889132146256772767,14247936821356736788,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2208 /prefetch:33⤵
- Suspicious behavior: EnumeratesProcesses
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2104,15889132146256772767,14247936821356736788,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2720 /prefetch:83⤵
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2104,15889132146256772767,14247936821356736788,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3792 /prefetch:13⤵
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2104,15889132146256772767,14247936821356736788,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3204 /prefetch:13⤵
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --field-trial-handle=2104,15889132146256772767,14247936821356736788,131072 --lang=en-US --service-sandbox-type=service --mojo-platform-channel-handle=5164 /prefetch:83⤵
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2104,15889132146256772767,14247936821356736788,131072 --disable-gpu-compositing --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5232 /prefetch:13⤵
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2104,15889132146256772767,14247936821356736788,131072 --disable-gpu-compositing --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6040 /prefetch:13⤵
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2104,15889132146256772767,14247936821356736788,131072 --disable-gpu-compositing --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6140 /prefetch:13⤵
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --field-trial-handle=2104,15889132146256772767,14247936821356736788,131072 --lang=en-US --service-sandbox-type=service --mojo-platform-channel-handle=5660 /prefetch:83⤵
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2104,15889132146256772767,14247936821356736788,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=6492 /prefetch:83⤵
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\Installer\setup.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\Installer\setup.exe" --configure-user-settings --verbose-logging --system-level --msedge --force-configure-user-settings3⤵
- Drops file in Program Files directory
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\Installer\setup.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\Installer\setup.exe" --type=crashpad-handler /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler --database=C:\Windows\TEMP\MsEdgeCrashpad --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\Installer\setup.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0x220,0x224,0x228,0x1fc,0x22c,0x7ff7fee05460,0x7ff7fee05470,0x7ff7fee054804⤵
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2104,15889132146256772767,14247936821356736788,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=6492 /prefetch:83⤵
- Suspicious behavior: EnumeratesProcesses
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=unzip.mojom.Unzipper --field-trial-handle=2104,15889132146256772767,14247936821356736788,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=5060 /prefetch:83⤵
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2104,15889132146256772767,14247936821356736788,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=5140 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1304 /prefetch:23⤵
- Suspicious behavior: EnumeratesProcesses
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵
Network
MITRE ATT&CK Matrix ATT&CK v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\07CEF2F654E3ED6050FFC9B6EB844250_3431D4C539FB2CFCB781821E9902850DFilesize
2KB
MD58cd381eca2d5342e36b1e65a9b7f82d5
SHA1d9b529576e1ea26e8daf88fcda26b7a0069da217
SHA25617ff373fb2deb3ef3931ae098202097211226848ea6c581ceb9514e7a6e49369
SHA512c888bcac5413df3eac3b068d37c866362d37915f1a25508743d818f79ce5b0518fe7ec7a4ff29be51d2404eb5f999b5d2238e60a8670375b82a8a96566101154
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\0DA515F703BB9B49479E8697ADB0B955_4136D3715888E22D65EBE484B233D81BFilesize
1KB
MD5af64be36ac5c5c54fc41fb95320a6d54
SHA1520e16a728a706306f9f903a711ec33f09633b8e
SHA25654f5c0372f19387f5793e617181009cf65e7c6068290c89f1ff6eade2d7aa299
SHA5125b86f9c202b3824c63f9506f97202b0685079b1d76ec0f5475bb52af4925fa371ae80c01fecb61081fba009bded507c4681bff0711f141e70c06f4f656251d57
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\14561BF7422BB6F70A9CB14F5AA8A7DA_4BBF835940B52E608C6CD9E4709361A1Filesize
727B
MD53c802933cbcc9e541e2f677ea7d32465
SHA1189b12dcbf7a957d0808bed1b7738abe5fdcf31a
SHA256b48a53359186928285167549c54fbcf2033d0971441aa57de3f59561626dae95
SHA512a5a76e5e8b1fc7a044be0592b3ca235f4766e043fcbbb508c9bb1ef996c17252f6b32115349418a68aa4b9f43c8166d1a3a004a214c7e2e4317bd6ead0b71a7e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\16628EE66279C9C49395DC37039C8CC2Filesize
471B
MD5bd05065a53ad0b467e08bebaf080c1ef
SHA1f2bf98c511ebe6ffb73c751082a8cc984cd04d30
SHA256b6816ab715ba62a2b29ed985297a1d33b27a4c3653a5a9c575fb2097c80f76df
SHA512355502a79fc51e87bcb8249a06f6fcf1098f9fa64a24087f5213729b2958886721e85315344d889d1996b5a373c3fbc146f2dd75dca973db045b98b2fbd3d2c8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\223DE96EE265046957A660ED7C9DD9E7_EFF9B9BA98DEAA773F261FA85A0B1771Filesize
1KB
MD5ff7a1328d03d89f85e161952e93005e3
SHA1aecdf98ae95f71037554588c495b547051435260
SHA256d19e8153c488f20af0d680a62fa4b97d4936f737142fa8abe72f8eb24bff0d10
SHA512d98ee4f86b3d12de51af1823533bfddf854a101090fc799764b973cb9c00b4c38e298055f02f41fac0091e29e81fc3433483f1186f49d7bf6c6e41e52c03c124
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\226E8D92F74792D8B13A2E04E87F4AEDFilesize
345B
MD51673d659b63ccbac69d4d6d9dfda05c1
SHA141c83cdd73a8ce5304506d321bb7113e27b4830b
SHA256978ee4c79ea6551d175ade035a0c03023836d35ecd6dab06bf9b3ab5520c6645
SHA512663ea7ca698cbdeadd0d6399c9dd972e31cce1382e924de232152adaf0bab813ac8a6728feb95eb9a99f8d99251b48d0786af0f73871e0edebbd68f5178d5cbc
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\2E1BAF2D590F24A166C0BF1C68D5824EFilesize
472B
MD5dce8ee1fa8d1015fb532092abacc9359
SHA1169b07506a34587443ded2cb51fe798c9b3c9f97
SHA25662b436793a7f4f0171c15eac68dc2bf3c612349ef273d4c1d6d2d86a088d083f
SHA512a48532aff4206f85c2764a1b4a413e8a2aec95df26814a4af6793d917fd77f4a7bbea8471d9a5f91f0330b4a42bb33e30650fb74c084e9ba2200bdcbb63f832a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\54F5B92406F4ED47F7D60A7F5C0F10C6Filesize
471B
MD571df1e085c9e205b44a89fb77648cefa
SHA18df66dfac0dd03797395e2417a88bf6f8ad12c88
SHA25608b3c4a4eceb7004d3565ad172ccc24a0b79610d486cc5a69ae3de42a29d1dfa
SHA512ef34b9cada89fb2cb919365ee449dd4a914bd43737042f6ca896c6c0264a8423338426edaf5cb58d0fe42f1fae6671893879e84327363c0d29733599a9018ead
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\6BADA8974A10C4BD62CC921D13E43B18_1DC6D7385EA816C957BA2B715AC5C442Filesize
1KB
MD540fc2d3fd38a171ca49f1ebf632e1903
SHA13acc79a441ac1aea5e50d24a0cc619ccf7a3b81c
SHA2563675deed33abf58cdf735b4f52de6a7300c2c3c0d330fa6a0134cb46b43ef8c7
SHA5129a54f9771b0d0afd24efa465f3f52ec357bd7e7b9e0973319dec29172344f8777a837ad0fd4c5b42d725a3da4eb4810db684712d2ee6df6393f7947465991685
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\6BADA8974A10C4BD62CC921D13E43B18_28DEA62A0AE77228DD387E155AD0BA27Filesize
1KB
MD52f108e05ed741c61d7e0541f9aa2fd95
SHA1c2c9db7404c846a94d92c296855ebb59030cb352
SHA256429057d0b17a31f507119e93d488814ab306344c3fbc7241fe47eab54e1635b7
SHA5126297a240374426503b30a6c1608b7555e130a425f5dfabf728eb032f4526bbdbb5745a938d4c7d62cba4a7a49a91b1ec88f25d2759f701e10e5418194c94e277
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\6E8015D977B35F3D0963A082AA7231F1Filesize
503B
MD5ede9d7df49a7e00d51c415d5022c7936
SHA1bf85e6580bf13510d145273c27b0ed7f35fd76a4
SHA256924dbbab8cfc5f6878c78e36b562723253fdcf06826fdab6bb4b2af6f5242e4b
SHA5129382d8d585a4bbcb7e3a46ec7ec88421be1dc1d0141777971229868a250fa972289633fae7400345c94c3e2059db5b1eae5c93a4d0419e0fae15001c45b435e3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\7C7BF5A56AC0B3030861580B409B5234Filesize
472B
MD5baf34f0c544fe3143a56fa9d45055f80
SHA1ec6912e751a6c4c937e8d2d3cbf765b299f0202c
SHA256003f47b1e286395e56868a67b3aad941cc1d2584e45dcbf039179dfb217d91c7
SHA512e786d1ce64e1dcd8c7d3b166af62334b570aed189f22da4f5ee921a085636ff491589e43aa33c09d504e14e4bf17cd1398ad8abbf0f398e4334e1659e8913f72
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\845C72A23CEF159851A2FD1918B65C5BFilesize
471B
MD59d60883eb9b7e643b322cfcc52c56404
SHA1ff6e3aece4d077c2265f3e7d9785bb5073b12cd4
SHA256cd09c389f016d544b6220402a7c763a2c64d6cae0a678292510c0cfd0a6508bb
SHA512c3e3ad87b9437a165cf7f0428658ac70cdd06814b60b2a3a2303d607202660695f846a7bb5a194581083b96fb92f2bf56618b4c82c07353433a2a4eef9db9490
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\8552626702FCB905EEC0C2C5A088A5DCFilesize
471B
MD5b815fcc2b5d94a99b92dc8a5bb315c27
SHA125bdbf62d40db6056e7a8184403827f3091cb55e
SHA256119f1e02d3c3fcb07238fb55e25369f1e74c70733fa6636eaa2e026e24644c31
SHA512c8c18a40529421f41efe18d3eb5e295c22d86715242e6854b0e0a4300aae06def4c4ecc8ac3c032ef0e0ca95796bbc08d65d45f4513941c87d78a0e711cb631e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\9FF67FB3141440EED32363089565AE60_F435C56B1B02D5D9D7BF87CD25796E9FFilesize
279B
MD5d92cc9ef52b7b3d5f3fee6debc4dc6e1
SHA1b99691f2f55e0c9250293549200ce20c8962475a
SHA256ce84dc9eb0bc29b1273bf90e667e25ba4bacfdecf8be58d8ad534f1b3ce808d5
SHA512595693aafb384a8eb6a5699f0575ae26bb38a950e920f7cab44cde0f84d000b2d0e9a585bab636623d40250d59a2a7e10fe860216ffc29b661b91747c066da15
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\AA1114751FEE724162F042D27F7E79CCFilesize
503B
MD556310c6e6ca66324f31c4405b3b23108
SHA14ecc7a97cc17eed10486292c7e127d3eab486965
SHA256268c4d940a7a31bb53331ed027ceafbc562d00004aafbc17256dd31551c1903a
SHA512f958906a07dcd651a87da0267faa5427b48cbef6c0a0f41b5863a59b3165b15a73a6b38c44bbfb8f136bf8c3507a3e7df1408eab056c9e0f35842412ee143e3f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\AD12E4EACADB7426CBC14217D557E522Filesize
471B
MD5162e03398f226e35fe8c9f0dd2f491ea
SHA113913f5245e4814203c47854d9ccc9b84f3b17c8
SHA256972c044da6d68b8dff060ab9ea8c5f85ab5eb4aecafc18887d23bbb619928d36
SHA512a82c861a24e2d0a7289f55039f30b83b7cbaf7a30099e5b79bbc4803bdd9d1668282a95f440fcf56395d7e0d1ffac306c66c5aea92336ee00be002ecacdc6af9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\AEB7580F4C2B26351E8D5E1EDC5A14CEFilesize
503B
MD5126b350e4040c077022664982ff6c250
SHA14d4b4d724ae62092821fc865fd21f65795bdbe30
SHA256a017b848397b53565674ca82686830b7d7749478afd3c4cc752a136fc2bd12fe
SHA512b17d57583675687be3c191c372d6c6fee375885181f01607fcfdac8ce48ed4a4b1e4f79c4536e4f01decc7bab6daf9ab7d98a3a2e5cc367f2b5684b4b13b1b15
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\B039FEA45CB4CC4BBACFC013C7C55604_50D7940D5D3FEDD8634D83074C7A46A3Filesize
1KB
MD57fcadcd6b5acb37b42f6a2a3460f20a3
SHA1483c498a1d93f9adc329f9251fa83d903685ecf4
SHA25690ca6bf4eac6e01c97dab9c59284d387c5e46fa72bb624fed403d96e4143da17
SHA5122ebd9b485c2d4d7bf325b52671cf2e6edb14f21c6c7e99cc722af89d6bba91a5403033f50b81c250a17a7d008aab10f0d59d765b6785eba9c0fdb991fb4bbb37
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\B2FAF7692FD9FFBD64EDE317E42334BA_89854CA6A0F0936A4D2ECA78845CEA25Filesize
1KB
MD5fab08fa0d4783cc6b4e8a27d2658ce0a
SHA12eb3b6949c25a2e0638b085818d89702bab65398
SHA256774028ec730e503118621755a2f9197a0e02ae0a021c9f1b5b932312ad6a167a
SHA5128c1b2f5cac672463b2e294a31eb59d57f51f47279a50ea0e44abbfff0f9c2b85c3b223edf41bceca1c0fe70b4dd14173502b6be6431cda298ac0e38e341cf1e0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\B2FAF7692FD9FFBD64EDE317E42334BA_D7393C8F62BDE4D4CB606228BC7A711EFilesize
1KB
MD58641ac0a62e1e72023be75ceed4638a9
SHA1a347dbd79e99d81cdd6ec77783008fec9f7e7d42
SHA256d291f90a287f0bf8702208bab880ef95c5b2bd22a2c21762e828a707a004da2c
SHA5129a12e4baf2ca8bc5c4ca5a8606a9200241da8fb413e50ef6c0b6b4597c25a2636915bd9dfd7e9a97e0f58a15859629bad9222188dccdaf4efdbb8e14884d0ffe
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\B3479A2B5CAC4413CC37099FBFD1CA53Filesize
471B
MD5c43cd7eff889c7574c754fcecd2118fe
SHA17c8118b4e27d144f96f375ae985e1676223229a6
SHA2567eda225f9eff08db9385d8193069dee4799d31a987040c215fe130b8ddadce20
SHA512d68fb6bb2250e16c65ec79d602b6311f029cb5b2e96eb8053b95cf461ba09e32234812fb33dae68b8dba9561b891f0d0ee17defe1705b8c2d6943ef9863e3a4e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\B398B80134F72209547439DB21AB308D_23FFFDCAABB8E63694AD1202ED02BF57Filesize
471B
MD514649398969986029d415ff4bf7bb0fc
SHA1b1a221eb7be242c14faa5a55e3a993c22de27d44
SHA256ce603589eecbdee7a2732c789829af12ae3e43d9b98d5523e2d0cbc4f018f922
SHA512bc666f195165e442d47cc57b0387e4ef6aad0d8b970b115d1b50baaaf8aa0f7e542fd6796010d22e0a25e1457531ca34e31bdf940206dd159be7db78389e0a93
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\B398B80134F72209547439DB21AB308D_A4CF52CCA82D7458083F7280801A3A04Filesize
471B
MD5b269d74cfe043828baa092a242f9aa66
SHA175002c778a2a2784940ed9d097014279858f172c
SHA256044dd36c37639c3542247810e70a716cab619a5c09d5088dd32c922684a01c0f
SHA5125f7aba278abc1937857ab923208600b33f1f6b555d747f45ad496a464eec6a41155b0f8e507599c1ff9a4108a3b21f8052b9cde900644f9cd272b9a6d96523de
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\D0E1C4B6144E7ECAB3F020E4A19EFC29_03D1B482EE3032A122274428715A4E19Filesize
978B
MD5d89aaa332ff070dbb753d18530f65aa2
SHA1c10e14049041bfec8cc7c8a5ac0c8b47ba2e27f9
SHA256194b4e09af74aa3b75d3b8e359742828750cbbed678ccf29d7a5d3b94ea88fd2
SHA512836532ea81cfad5a81c57a65c2bde9dd24eade9eabe45b81926032cf093c1207391db601475435dbf12afa7dc88bf51e5f22f11d48df924c915df060bc40acde
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\EB2C4AB8B68FFA4B7733A9139239A396_D76DB901EE986B889F30D8CC06229E2DFilesize
1KB
MD5ae4c59f376741d992e1a34f4e23173fe
SHA1dfdd8ac2640fb99b550c2ead2b8361cee812eb7d
SHA256b9b98052f0077540ea2f5a7d53c84f84032ababb5a289904a523001eb6dce310
SHA512db91f84a62d7a7064145edaba1e95975491cbbac437e7d744cf3de449657cd50b6e06414376ef5d1a7e6a02a6a371b47ad14dd65fe297146b48abc50bd4d0e4e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\F4496BFF0C58CD98019B68CB34C0353C_76275F7CE3DB4B76F10A51150F574CB1Filesize
1KB
MD5e0b8c57158cdbe1344b29cca6225d226
SHA122fbefb9a0ce8eeda2ce08a4e504a02847f7d37d
SHA25664f8242764752e7a2bdaafbf04f9ff2c51fb6d1d69c6cff84c3b33320b9cbe48
SHA512fe4b1f1475574c8dde3a471974b6ba5e5e51f0dda2d1a70efb4b8c75d45598f46cd46f67cff9316e167bc4a446b4dc2f078b1fff1ce38279d6012eddaef94bc9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\07CEF2F654E3ED6050FFC9B6EB844250_3431D4C539FB2CFCB781821E9902850DFilesize
488B
MD56cd4fd964dc429901d27c0fe41c78558
SHA147996b7264b635db7a518ab8c9ee7bae45a6249b
SHA2569f16d64a9a085ce953dd1721c2995ea7fea4ddcad6593cd2d5193c9335d26490
SHA512f93049f6384156603392a3303c9d151f577c15e581d663865cf2afba9fc13ad26a5a8c2822a4bd41573dc5532c26519c13fa3debcc2e37a974fad2755c544b2a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\0DA515F703BB9B49479E8697ADB0B955_4136D3715888E22D65EBE484B233D81BFilesize
508B
MD5566f2eba8edd9c61b5c02949bbecc49e
SHA19f8a1fa3809284fff1c91346cdc3ebfd11a4e721
SHA256fa9168a43f5e4ccb086c7251177bdd27b5624efe7bf58265dfd92d82fc559e8b
SHA5124a7ab7bea209c233e602f55b127ab7a9009f4759a62ffd5ae45e9dbe1394fc73467d9bb9d1b45228e93d679856d506910f99c5434bb90ab41a18e6da78da462d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\14561BF7422BB6F70A9CB14F5AA8A7DA_4BBF835940B52E608C6CD9E4709361A1Filesize
438B
MD526dfa6ee99b89d05871082967eacad65
SHA109d26908c23c43404a588194e4a455a6d91f86e0
SHA256ffd2b902e45aea7da2a4b95d778e2ef6dd648907d918fa63d1063aedeb707dcf
SHA51225a6dd4e1a40e94ca06ea800d347533bccd71d5a635751cd76eae6cdc5a829cb4697b55f06931a4ca867d2eb86bc97b102ad0040e68a73a4834737c943e34125
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\16628EE66279C9C49395DC37039C8CC2Filesize
480B
MD5229fc4fca8aee4889e727a7afca08e9f
SHA1dfa846f25ec0fc838d2014a4fbf51ac7e3073144
SHA256067db3e103606d9bf3fe4b40a2c4524692b7150936fdde47596ef89b4b18df3d
SHA51245afdc5ea42690ecac8aba60eb1d54bf7852c12ea730d86ed513f2ad5ed6ab51c9e42e7bc43fc80a45a3411c540f8a9ab253c36f7eb0d21513563bfcfcf5ad5e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\223DE96EE265046957A660ED7C9DD9E7_EFF9B9BA98DEAA773F261FA85A0B1771Filesize
450B
MD58467caf4316071b8e11937038d0729a6
SHA17091aca9d350ef51ed224f386902571819c0c5c1
SHA256bb8ebf52926f2265db6e118daff64d6f65cbe71dd9493ab1868674dd356328cc
SHA51238266125f87ffa61f4d468328c3a44cd344f126974932d2c28c75f4ea29485fba7ae43743218823998c445f0f120c9531442bbd8e945e3c305af47ecaafe9251
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\226E8D92F74792D8B13A2E04E87F4AEDFilesize
540B
MD5bafa1cc80c784595e89a452497554215
SHA1e0b117ffff978ee9795dbc9618b6bab8ba94d5fd
SHA2564903b9570847e77803db1b61002feffdbdf9845eb91004be3575b777f8baa58d
SHA5123b953a7d1f7384a69fc354692375daace646caffa6a187b0bfc667160f0e2aa97133f23b5e520a4f9cc7769bb18175e74ffa67738a57e03df72f1e93a0495b2b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\2E1BAF2D590F24A166C0BF1C68D5824EFilesize
476B
MD57429bdce7eb5cf050291d081d9a39de8
SHA10683ce40c03a88de644201f0a14b3e8cd371a6e3
SHA256eac1a24364d5e7d4f9d5f19a0d97c971156db87953ffed9870729b580df8268d
SHA5121fd9b37eb6d900c66fcdf6bf8753e98c9350949139c2c12fded3b0324883bda1e70af00949482cfd04df55279dbf36778315a7f5d78df52bea82ad05f56e8860
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\54F5B92406F4ED47F7D60A7F5C0F10C6Filesize
488B
MD52d974e6f59aacfcc4f131cadfa5f021a
SHA1300dadf090d865b6ae76d45f36b1fdb8bb399d0a
SHA2569140ebcbdfaf4dc6c886c28cc95c659ac7101becbb3ec71da7a7a725e9f12ae6
SHA5125ab9d22a08daff475f8dce7d23c7546f52bf305f7c56d261841ddf87bb512b59ec493108141c13892b2ad1abddb3238abe389e8041d4ab2b885c9e3f5989ba09
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\6BADA8974A10C4BD62CC921D13E43B18_1DC6D7385EA816C957BA2B715AC5C442Filesize
446B
MD54a6c451468e43375601629aea0274bd3
SHA1db46880ec3220d9a2c0681050fdf27c0fa0bf790
SHA2563081ffa2082243425ffc6df476c0448e1e354133eaeec3e3361e72c14d96ab6d
SHA512242843ca82d0cf527471b485e14265983be06f7da4b248fee4d2dc28f5d3921eb70ba3e654396dfe51a62a7457a147cb9344ea7da1d5840e66c0ab355f9a3dd7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\6BADA8974A10C4BD62CC921D13E43B18_28DEA62A0AE77228DD387E155AD0BA27Filesize
408B
MD50e6c11bcf334bf2a7040a7af0f9f04f6
SHA1ef33b01a3399b72cb1b1e56840bb352ae28237fc
SHA256d1716b306c0baf7a206cbbb6f7b5e2c5b1a98fbca54be2da7a87baa055315ebf
SHA512a9ae435ab29d4ea19a88b256cec955408a3a0ea57679300ecdb3e4d185df691117618ec868faf08d8cbe5a87364918a8b056b3c423cd39f47a76e69c263c3d22
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\6E8015D977B35F3D0963A082AA7231F1Filesize
556B
MD5354ade12d90ab3b4f30cb1bb20f85ace
SHA1ef82116c6c7785be64da3bb75151f44df346194a
SHA2566f3a0508be619c01ab841db6385a7c947b2caf961686b433f9491616ff93ebc4
SHA51218661943a112369c89d8aba10abe4e2229288a43812eabf4439809ed3a9498404197fbbbfc77e7461dec337110a946645cf4062810fbc1e48e4d521b274df148
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\7C7BF5A56AC0B3030861580B409B5234Filesize
476B
MD52df32e9b5d8c4b786c1114d11fb3d8f8
SHA1433e145d2930dbc89bec3b06753a7a6a98068567
SHA256a28edb1f09142a9ecd990a8b9929761170d70d14b5d7ff3fdee893d2dde97023
SHA5129464e7d2db7b24c9dccb03f7ac527a20d8761dce304f46803cc98363fc8e1eb747e2cf1130f770821564922cbdbc8520d8c72309fa412121b32b4a741a6989ae
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\845C72A23CEF159851A2FD1918B65C5BFilesize
496B
MD5206cadcb4e205846cfffba344e750ed7
SHA1e4e586a6f2f9a019d84a7aa0f6cec3cb711ba7d7
SHA256ab7262d771a6ececf87d7bc5a1931b172264dd46c3238af315237dbd82b64f01
SHA51225fee037ca55afd4ebd6179200dee17d5f9fd7f03d01125a9a46d4a0baf893bf6509cc8af1429208afac816b307192995578d07bfe727589c98e42f772e48004
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\8552626702FCB905EEC0C2C5A088A5DCFilesize
480B
MD5cbf9b7110770375beb967777ac466690
SHA142aa8de99cc2c3e7974602184b7a474a225f496a
SHA256a6a6373575c9fc8f567336e99e9736ba74f6bf44f5a45afc9fe3d41209233438
SHA51220cc56eae51a370b8ccc882f6ae51c4f4b19872d31e71dc5c2e1e1494423ccde3dace1cee9342edb607c1810a0f6e4a129e34402192369c20d8c803616795f69
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\9FF67FB3141440EED32363089565AE60_F435C56B1B02D5D9D7BF87CD25796E9FFilesize
426B
MD5d2d3f7388b507c11b07b3915f18dee29
SHA1ae02621c9f9d2c4dc207cc15e8ab3dcf51e0881d
SHA256d2b81e0ef887aa4567520ae167d9c38416e28cf7456cd264b215a4bc8d4baf9a
SHA512ef380eb6bd6526b79b429439d6ef42cbefb04827922f2c13545eb0bdd9eadb509d72982a0a10ce905a0683268146cfce14240a93ae4652c457d06f32584159a1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\AA1114751FEE724162F042D27F7E79CCFilesize
548B
MD5038ab25e7699fa9ccb2c9b6538cf9a38
SHA17022214b00a1a0c4a53b98be20a62827fca2eb2c
SHA256f931c2590c15e15b163f637048d9d29f2420c282f0a0566dc090b695919aaf59
SHA5124ae1047f5fc40e37f247a8a87e67cd943d04a5e6620b7f36df0699e7182ece4dfe122e50d7350c5e6d1ddc7fa02fd826d03607d993392510bb62a4a0e9d5538d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\AD12E4EACADB7426CBC14217D557E522Filesize
488B
MD5d325a89a737b703be00a90cdd4067517
SHA1fe1bd805a57d3c4517a074c82a040461a930e8c5
SHA2563b5ac1ebab5af8b7a5330408533a1451be373784817dcb9b04fd7ce65aff5658
SHA512cb330f199048cf7be1e31834e0cfa67f53f821863d834c6c3ac92456c639c0c741b0a7e7aa6b24a93c22ddb229d86543bda70a587b043c089877e0c480e033f7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\AEB7580F4C2B26351E8D5E1EDC5A14CEFilesize
548B
MD548600003168268dd7c947070eb7c4a69
SHA1d94d9bf4529b94632057474aaa39b1a9af58aba9
SHA2560ce3dbecb4e6e7d1156f568a7c5885acf257be591b233846be3dac568f7fb729
SHA512a2cb4d0b6f684a1c46f536f1ae3db409a3b3ef65447a3facede6649ed3f969d5bda88059bc7dd2a204600064b4abedca19f80ae5c3c722ebc019fa6ca78486fe
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\B039FEA45CB4CC4BBACFC013C7C55604_50D7940D5D3FEDD8634D83074C7A46A3Filesize
506B
MD5f9fbe82cacedc164701b4184237d152b
SHA17c2d3284e614e32401c5f8081f4792ed148f8371
SHA2561dd27c627b12fdef27a17515031c2e619faac174fc9a06f641ff6d7ee9394e2f
SHA512da6702e3af8d3c9a18efe841b70a01206e27651975a545f96c9942a3b2e75d03aa116e599a4fa66ecc5fc5a8a884f4357038ad8ecf1a951ee65da0a3b8ca7743
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\B2FAF7692FD9FFBD64EDE317E42334BA_89854CA6A0F0936A4D2ECA78845CEA25Filesize
482B
MD5c5f80649225922cc79a6be5ca1b94d89
SHA1829fc3dc855e6253d6018b285c506b67b91eb912
SHA256589239f65678b21ae8a857726b91ac1b52fac07a89e354e50f184df56e07e1a5
SHA5124d752fe22299c39f95612fcf77f958785bc1b3ec29b779e49b156fadb53bc8adb87b63612dd499713095dd988feb53338a32aa36220936714b10184200de49b0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\B2FAF7692FD9FFBD64EDE317E42334BA_D7393C8F62BDE4D4CB606228BC7A711EFilesize
482B
MD59656a727143cf6b0081c9173a5f40303
SHA17888b3002362f26eb2ae13db9bbae284eb4d831e
SHA2565e8a111f4cdddb4da75c5fb1277613f00110b91efb99d8c617f5bb5120cd9bb4
SHA512cc9443a1bb34247ef0196895984e35c1aa92c6c88099fbc006b45f0322e4a9f3ca0cbfbe3c4e96f47970d567581a50aea297397aaecec32296dfd9d5fef94c65
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\B3479A2B5CAC4413CC37099FBFD1CA53Filesize
480B
MD5a45550365ac61f1586e8b1544ba63ba3
SHA1cc162c810dd02727c4819c5ba2d70da1bfcf5177
SHA2568b88ccd79028314cc866e679b6e9150bf5d3936212d4376cb7b733cce01ac823
SHA512445fd8b23d01b311fd04174dd847965c6eff56ffd5ac5aa98a7e5da729984ab314afcde9a712f4c5968eae965d4b7a0ca33662e61d6c1f85a2a25f7f78f80c48
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\B398B80134F72209547439DB21AB308D_23FFFDCAABB8E63694AD1202ED02BF57Filesize
430B
MD5494b555af9260ec324a67b6a4d348ac1
SHA19d68b69848beccfae229d23745e40b9259548feb
SHA256ab4421fa86926567192b6125437237ca3f46393a1dfce994b7e41a8024c708ad
SHA5125423abbad7ef7356a752419caa827dd10b548ce41f43e77929f76119c492b82a9f5947b7956f70c203c3a23706696d320cbbf4dcaebf3a3c4dec835759a8b9b1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\B398B80134F72209547439DB21AB308D_A4CF52CCA82D7458083F7280801A3A04Filesize
430B
MD52520ab71d465db1288dbf87b57a63099
SHA1dbd129c76246497cb69b43ca21e34dbc6d32ef80
SHA256f55db7fed6acde6a1f7d076c48a4f6cb06f30afcd2c4df0a65a5e204216f8020
SHA512c229ecbe4cf6ded3f08b0451b352d0f1ff30178bc5ca5cc0fb988cfe797f790c1d0fd9d733b1824dd53e5b71f5501fa463ecea1ff43d0029c9e9ee2cab3924f6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\D0E1C4B6144E7ECAB3F020E4A19EFC29_03D1B482EE3032A122274428715A4E19Filesize
484B
MD5188a4c020b92732c4f4de60dfdbae4dc
SHA17fd7317dc994e343c2597ba7a28f9ad4cffd533d
SHA256bf43408c2eeba798087a5aee1859dfce26dbd5d0f40747c8a7d1973b62947101
SHA512896f7735ea7ed8be1b1601f3e0e067099d85e2aff0852064d2a8bfebe7a52022b6ce3d1114007bbde87de72614b38457da5884b91a3ce1375e99d9d7ea8107dd
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\EB2C4AB8B68FFA4B7733A9139239A396_D76DB901EE986B889F30D8CC06229E2DFilesize
458B
MD5730d05ebedc9aca1f443eccb5aa46582
SHA1750df4d9517dc2b1c811184af5131fbf14a89034
SHA2564214de3230cb5bfeb9faab33353b2f421f0bb32c5a4789bf9d566d2ddd71d01c
SHA5120fe2dedf838b282143f45e0073af9a5aafaae11d5da531ab94051db63c37357676d31b93355b8594415f646b95c25a53628e794176a77ea69f5f10946717da23
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\F4496BFF0C58CD98019B68CB34C0353C_76275F7CE3DB4B76F10A51150F574CB1Filesize
474B
MD586577eb0d977b2d516a08deaebb15094
SHA168d1f19ca9daca75513a88e4bfea918a88999d8e
SHA256954a5cc064800d78d7a6fc470b44e982c901f4ff9e052e485404b62349f9242b
SHA51228d6acee7af33e8a3ac952e8a860a25bd31ac409f072551108739fd6f8c1e3d482b078cf95dfb00ae9caa1b145eeede05a597198dd3e6e4f8ba07eeb42a79c34
-
C:\Users\Admin\AppData\Local\Microsoft\Internet Explorer\imagestore\dqptnfu\imagestore.datFilesize
1KB
MD5874846efe911e4a38545d61e00918a38
SHA1c3225d084fb99e47e8def27bd0073b320e3cdd3c
SHA256d52801e3534a96b7c05d776edaef988c30a6d92deb569212e606e4bf6dbe56ac
SHA512e2c1af80e02147ef391234aa661f8dc01785b9b32d2d9720687c5d923907e642225859700409f5fdbd55372d5cb67ed9f2007395e826e92210d79efceda6399c
-
\??\pipe\LOCAL\crashpad_4788_WSQBLZSPUJFNYNDPMD5
d41d8cd98f00b204e9800998ecf8427e
SHA1da39a3ee5e6b4b0d3255bfef95601890afd80709
SHA256e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855
SHA512cf83e1357eefb8bdf1542850d66d8007d620e4050b5715dc83f4a921d36ce9ce47d0d13c5d85f2b0ff8318d2877eec2f63b931bd47417a81a538327af927da3e
-
memory/748-187-0x0000000000000000-mapping.dmp
-
memory/916-183-0x0000000000000000-mapping.dmp
-
memory/1284-255-0x0000000000000000-mapping.dmp
-
memory/1688-254-0x0000000000000000-mapping.dmp
-
memory/1808-185-0x0000000000000000-mapping.dmp
-
memory/1928-172-0x0000000010000000-0x000000001003E000-memory.dmpFilesize
248KB
-
memory/1928-142-0x0000000010000000-0x000000001003E000-memory.dmpFilesize
248KB
-
memory/1928-156-0x0000000010000000-0x000000001003E000-memory.dmpFilesize
248KB
-
memory/1928-160-0x0000000010000000-0x000000001003E000-memory.dmpFilesize
248KB
-
memory/1928-154-0x0000000010000000-0x000000001003E000-memory.dmpFilesize
248KB
-
memory/1928-162-0x0000000010000000-0x000000001003E000-memory.dmpFilesize
248KB
-
memory/1928-164-0x0000000010000000-0x000000001003E000-memory.dmpFilesize
248KB
-
memory/1928-152-0x0000000010000000-0x000000001003E000-memory.dmpFilesize
248KB
-
memory/1928-150-0x0000000010000000-0x000000001003E000-memory.dmpFilesize
248KB
-
memory/1928-166-0x0000000010000000-0x000000001003E000-memory.dmpFilesize
248KB
-
memory/1928-148-0x0000000010000000-0x000000001003E000-memory.dmpFilesize
248KB
-
memory/1928-168-0x0000000010000000-0x000000001003E000-memory.dmpFilesize
248KB
-
memory/1928-146-0x0000000010000000-0x000000001003E000-memory.dmpFilesize
248KB
-
memory/1928-170-0x0000000010000000-0x000000001003E000-memory.dmpFilesize
248KB
-
memory/1928-144-0x0000000010000000-0x000000001003E000-memory.dmpFilesize
248KB
-
memory/1928-132-0x0000000010000000-0x000000001003E000-memory.dmpFilesize
248KB
-
memory/1928-174-0x0000000010000000-0x000000001003E000-memory.dmpFilesize
248KB
-
memory/1928-158-0x0000000010000000-0x000000001003E000-memory.dmpFilesize
248KB
-
memory/1928-140-0x0000000010000000-0x000000001003E000-memory.dmpFilesize
248KB
-
memory/1928-175-0x0000000010000000-0x000000001003E000-memory.dmpFilesize
248KB
-
memory/1928-138-0x0000000010000000-0x000000001003E000-memory.dmpFilesize
248KB
-
memory/1928-133-0x0000000010000000-0x000000001003E000-memory.dmpFilesize
248KB
-
memory/1928-136-0x0000000010000000-0x000000001003E000-memory.dmpFilesize
248KB
-
memory/1928-134-0x0000000010000000-0x000000001003E000-memory.dmpFilesize
248KB
-
memory/2540-246-0x0000000000000000-mapping.dmp
-
memory/2736-179-0x0000000000000000-mapping.dmp
-
memory/3532-250-0x0000000000000000-mapping.dmp
-
memory/4220-189-0x0000000000000000-mapping.dmp
-
memory/4496-180-0x0000000000000000-mapping.dmp
-
memory/4532-248-0x0000000000000000-mapping.dmp
-
memory/4788-176-0x0000000000000000-mapping.dmp
-
memory/4872-253-0x0000000000000000-mapping.dmp
-
memory/4904-191-0x0000000000000000-mapping.dmp
-
memory/4960-177-0x0000000000000000-mapping.dmp
-
memory/5476-257-0x0000000000000000-mapping.dmp
-
memory/5556-258-0x0000000000000000-mapping.dmp