Analysis

  • max time kernel
    32s
  • max time network
    34s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20241007-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system
  • submitted
    26/10/2024, 21:17 UTC

General

  • Target

    BlackBullet 2.5.1.7z

  • Size

    31.0MB

  • MD5

    d45deae0b8f65d68f197fc989d2c7b5b

  • SHA1

    f3bc5e33990a3536a105019c59715988671caf5c

  • SHA256

    30263649fa9032042bd4f1828fd41e6dc096be790c60c886741b4ae0fb86bd22

  • SHA512

    2fe2efa862434701a478774071034b40652d53445ecd33d33b8c1fc229b8e0c86cce8ac94858d5db8c96fd51974d2d5fc6769e8cba7c665223eef38346b36afe

  • SSDEEP

    786432:RqpSnNVdchlA4UoMeTsblVWmX05cNkPEhgLHLapDYWq:FnNbulUoMeY8Z5pLapDYWq

Score
10/10

Malware Config

Signatures

  • Detect ZGRat V2 1 IoCs
  • ZGRat

    ZGRat is remote access trojan written in C#.

  • Zgrat family
  • Checks computer location settings 2 TTPs 2 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Executes dropped EXE 3 IoCs
  • Loads dropped DLL 21 IoCs
  • Browser Information Discovery 1 TTPs

    Enumerate browser information.

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Location Discovery: System Language Discovery 1 TTPs 3 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Enumerates system info in registry 2 TTPs 3 IoCs
  • Suspicious behavior: EnumeratesProcesses 6 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs
  • Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 3 IoCs
  • Suspicious use of AdjustPrivilegeToken 3 IoCs
  • Suspicious use of FindShellTrayWindow 28 IoCs
  • Suspicious use of SendNotifyMessage 24 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs

Processes

  • C:\Program Files\7-Zip\7zFM.exe
    "C:\Program Files\7-Zip\7zFM.exe" "C:\Users\Admin\AppData\Local\Temp\BlackBullet 2.5.1.7z"
    1⤵
    • Suspicious behavior: GetForegroundWindowSpam
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of FindShellTrayWindow
    PID:5008
  • C:\Windows\System32\rundll32.exe
    C:\Windows\System32\rundll32.exe C:\Windows\System32\shell32.dll,SHCreateLocalServerRunDll {9aa46009-3ce0-458a-a354-715610a075e6} -Embedding
    1⤵
      PID:4352
    • C:\Users\Admin\Desktop\New folder\Launcher.exe
      "C:\Users\Admin\Desktop\New folder\Launcher.exe"
      1⤵
      • Checks computer location settings
      • Executes dropped EXE
      • System Location Discovery: System Language Discovery
      • Suspicious use of WriteProcessMemory
      PID:1684
      • C:\Users\Admin\Desktop\New folder\Data\BB2.exe
        "C:\Users\Admin\Desktop\New folder\Data\BB2.exe" {Arguments If Needed}
        2⤵
        • Checks computer location settings
        • Executes dropped EXE
        • System Location Discovery: System Language Discovery
        • Suspicious use of WriteProcessMemory
        PID:4416
        • C:\Windows\system32\cmd.exe
          "C:\Windows\sysnative\cmd.exe" /c "C:\Users\Admin\AppData\Local\Temp\E60A.tmp\E60B.tmp\E60C.bat "C:\Users\Admin\Desktop\New folder\Data\BB2.exe" {Arguments If Needed}"
          3⤵
          • Suspicious use of WriteProcessMemory
          PID:4840
          • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
            "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument http://crackingparadox.com/
            4⤵
            • Enumerates system info in registry
            • Suspicious behavior: EnumeratesProcesses
            • Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
            • Suspicious use of FindShellTrayWindow
            • Suspicious use of SendNotifyMessage
            • Suspicious use of WriteProcessMemory
            PID:3976
            • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
              "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0x11c,0x120,0x124,0xf8,0x128,0x7ffcba7846f8,0x7ffcba784708,0x7ffcba784718
              5⤵
                PID:3804
              • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2124,11837306037279471926,5441304086606691969,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2188 /prefetch:2
                5⤵
                  PID:4724
                • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                  "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2124,11837306037279471926,5441304086606691969,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2308 /prefetch:3
                  5⤵
                  • Suspicious behavior: EnumeratesProcesses
                  PID:4388
                • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                  "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2124,11837306037279471926,5441304086606691969,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2780 /prefetch:8
                  5⤵
                    PID:1808
                  • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                    "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2124,11837306037279471926,5441304086606691969,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3284 /prefetch:1
                    5⤵
                      PID:2540
                    • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                      "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2124,11837306037279471926,5441304086606691969,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3300 /prefetch:1
                      5⤵
                        PID:3040
                      • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                        "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2124,11837306037279471926,5441304086606691969,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5068 /prefetch:1
                        5⤵
                          PID:4192
                        • C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe
                          "C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2124,11837306037279471926,5441304086606691969,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5432 /prefetch:8
                          5⤵
                            PID:4856
                          • C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe
                            "C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2124,11837306037279471926,5441304086606691969,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5432 /prefetch:8
                            5⤵
                            • Suspicious behavior: EnumeratesProcesses
                            PID:4536
                        • C:\Users\Admin\Desktop\New folder\Data\BlackBullet2.exe
                          BlackBullet2.exe FL
                          4⤵
                          • Executes dropped EXE
                          • Loads dropped DLL
                          • System Location Discovery: System Language Discovery
                          PID:2468
                  • C:\Windows\System32\CompPkgSrv.exe
                    C:\Windows\System32\CompPkgSrv.exe -Embedding
                    1⤵
                      PID:1528
                    • C:\Windows\System32\CompPkgSrv.exe
                      C:\Windows\System32\CompPkgSrv.exe -Embedding
                      1⤵
                        PID:1696

                      Network

                      • flag-us
                        DNS
                        20.160.190.20.in-addr.arpa
                        Remote address:
                        8.8.8.8:53
                        Request
                        20.160.190.20.in-addr.arpa
                        IN PTR
                        Response
                      • flag-us
                        DNS
                        95.221.229.192.in-addr.arpa
                        Remote address:
                        8.8.8.8:53
                        Request
                        95.221.229.192.in-addr.arpa
                        IN PTR
                        Response
                      • flag-us
                        DNS
                        g.bing.com
                        Remote address:
                        8.8.8.8:53
                        Request
                        g.bing.com
                        IN A
                        Response
                        g.bing.com
                        IN CNAME
                        g-bing-com.ax-0001.ax-msedge.net
                        g-bing-com.ax-0001.ax-msedge.net
                        IN CNAME
                        ax-0001.ax-msedge.net
                        ax-0001.ax-msedge.net
                        IN A
                        150.171.27.10
                        ax-0001.ax-msedge.net
                        IN A
                        150.171.28.10
                      • flag-us
                        GET
                        https://g.bing.com/neg/0?action=emptycreativeimpression&adUnitId=11730597&publisherId=251978541&rid=d0baa7f36280429880c53bb00b0cd9e8&localId=w:2D3093FA-6F32-4948-30D6-822D6819A5AC&deviceId=6755476188894822&anid=
                        Remote address:
                        150.171.27.10:443
                        Request
                        GET /neg/0?action=emptycreativeimpression&adUnitId=11730597&publisherId=251978541&rid=d0baa7f36280429880c53bb00b0cd9e8&localId=w:2D3093FA-6F32-4948-30D6-822D6819A5AC&deviceId=6755476188894822&anid= HTTP/2.0
                        host: g.bing.com
                        accept-encoding: gzip, deflate
                        user-agent: WindowsShellClient/9.0.40929.0 (Windows)
                        Response
                        HTTP/2.0 204
                        cache-control: no-cache, must-revalidate
                        pragma: no-cache
                        expires: Fri, 01 Jan 1990 00:00:00 GMT
                        set-cookie: MUID=2ECD7ECBC38C620C1BBC6BEFC28A63E4; domain=.bing.com; expires=Thu, 20-Nov-2025 21:17:49 GMT; path=/; SameSite=None; Secure; Priority=High;
                        strict-transport-security: max-age=31536000; includeSubDomains; preload
                        access-control-allow-origin: *
                        x-cache: CONFIG_NOCACHE
                        accept-ch: Sec-CH-UA-Arch, Sec-CH-UA-Bitness, Sec-CH-UA-Full-Version, Sec-CH-UA-Full-Version-List, Sec-CH-UA-Mobile, Sec-CH-UA-Model, Sec-CH-UA-Platform, Sec-CH-UA-Platform-Version
                        x-msedge-ref: Ref A: C086694B24744DF1837B1F16FF0B75F0 Ref B: LON601060108036 Ref C: 2024-10-26T21:17:49Z
                        date: Sat, 26 Oct 2024 21:17:49 GMT
                      • flag-us
                        GET
                        https://g.bing.com/neg/0?action=emptycreative&adUnitId=11730597&publisherId=251978541&rid=d0baa7f36280429880c53bb00b0cd9e8&localId=w:2D3093FA-6F32-4948-30D6-822D6819A5AC&deviceId=6755476188894822&anid=
                        Remote address:
                        150.171.27.10:443
                        Request
                        GET /neg/0?action=emptycreative&adUnitId=11730597&publisherId=251978541&rid=d0baa7f36280429880c53bb00b0cd9e8&localId=w:2D3093FA-6F32-4948-30D6-822D6819A5AC&deviceId=6755476188894822&anid= HTTP/2.0
                        host: g.bing.com
                        accept-encoding: gzip, deflate
                        user-agent: WindowsShellClient/9.0.40929.0 (Windows)
                        cookie: MUID=2ECD7ECBC38C620C1BBC6BEFC28A63E4
                        Response
                        HTTP/2.0 204
                        cache-control: no-cache, must-revalidate
                        pragma: no-cache
                        expires: Fri, 01 Jan 1990 00:00:00 GMT
                        set-cookie: MSPTC=2QBkZqq6lUSXqPBqvcrAcxApNCA0V3mBCI-NlmHIH50; domain=.bing.com; expires=Thu, 20-Nov-2025 21:17:49 GMT; path=/; Partitioned; secure; SameSite=None
                        strict-transport-security: max-age=31536000; includeSubDomains; preload
                        access-control-allow-origin: *
                        x-cache: CONFIG_NOCACHE
                        accept-ch: Sec-CH-UA-Arch, Sec-CH-UA-Bitness, Sec-CH-UA-Full-Version, Sec-CH-UA-Full-Version-List, Sec-CH-UA-Mobile, Sec-CH-UA-Model, Sec-CH-UA-Platform, Sec-CH-UA-Platform-Version
                        x-msedge-ref: Ref A: 8A98BF0D529940F78BED789CB522DAC0 Ref B: LON601060108036 Ref C: 2024-10-26T21:17:49Z
                        date: Sat, 26 Oct 2024 21:17:49 GMT
                      • flag-us
                        GET
                        https://g.bing.com/neg/0?action=emptycreativeimpression&adUnitId=11730597&publisherId=251978541&rid=d0baa7f36280429880c53bb00b0cd9e8&localId=w:2D3093FA-6F32-4948-30D6-822D6819A5AC&deviceId=6755476188894822&anid=
                        Remote address:
                        150.171.27.10:443
                        Request
                        GET /neg/0?action=emptycreativeimpression&adUnitId=11730597&publisherId=251978541&rid=d0baa7f36280429880c53bb00b0cd9e8&localId=w:2D3093FA-6F32-4948-30D6-822D6819A5AC&deviceId=6755476188894822&anid= HTTP/2.0
                        host: g.bing.com
                        accept-encoding: gzip, deflate
                        user-agent: WindowsShellClient/9.0.40929.0 (Windows)
                        cookie: MUID=2ECD7ECBC38C620C1BBC6BEFC28A63E4; MSPTC=2QBkZqq6lUSXqPBqvcrAcxApNCA0V3mBCI-NlmHIH50
                        Response
                        HTTP/2.0 204
                        cache-control: no-cache, must-revalidate
                        pragma: no-cache
                        expires: Fri, 01 Jan 1990 00:00:00 GMT
                        strict-transport-security: max-age=31536000; includeSubDomains; preload
                        access-control-allow-origin: *
                        x-cache: CONFIG_NOCACHE
                        accept-ch: Sec-CH-UA-Arch, Sec-CH-UA-Bitness, Sec-CH-UA-Full-Version, Sec-CH-UA-Full-Version-List, Sec-CH-UA-Mobile, Sec-CH-UA-Model, Sec-CH-UA-Platform, Sec-CH-UA-Platform-Version
                        x-msedge-ref: Ref A: 9549E6D3960540B58ACDC2267436052A Ref B: LON601060108036 Ref C: 2024-10-26T21:17:49Z
                        date: Sat, 26 Oct 2024 21:17:49 GMT
                      • flag-us
                        DNS
                        209.205.72.20.in-addr.arpa
                        Remote address:
                        8.8.8.8:53
                        Request
                        209.205.72.20.in-addr.arpa
                        IN PTR
                        Response
                      • flag-us
                        DNS
                        57.169.31.20.in-addr.arpa
                        Remote address:
                        8.8.8.8:53
                        Request
                        57.169.31.20.in-addr.arpa
                        IN PTR
                        Response
                      • flag-us
                        DNS
                        228.249.119.40.in-addr.arpa
                        Remote address:
                        8.8.8.8:53
                        Request
                        228.249.119.40.in-addr.arpa
                        IN PTR
                        Response
                      • flag-us
                        DNS
                        crackingparadox.com
                        msedge.exe
                        Remote address:
                        8.8.8.8:53
                        Request
                        crackingparadox.com
                        IN A
                        Response
                        crackingparadox.com
                        IN A
                        185.107.56.60
                      • flag-nl
                        GET
                        http://crackingparadox.com/
                        msedge.exe
                        Remote address:
                        185.107.56.60:80
                        Request
                        GET / HTTP/1.1
                        Host: crackingparadox.com
                        Connection: keep-alive
                        DNT: 1
                        Upgrade-Insecure-Requests: 1
                        User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/92.0.4515.131 Safari/537.36 Edg/92.0.902.67
                        Accept: text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3;q=0.9
                        Accept-Encoding: gzip, deflate
                        Accept-Language: en-US,en;q=0.9
                        Response
                        HTTP/1.1 302 Found
                        cache-control: max-age=0, private, must-revalidate
                        connection: close
                        content-length: 11
                        date: Sat, 26 Oct 2024 21:18:07 GMT
                        location: http://ww1.crackingparadox.com
                        server: nginx
                        set-cookie: sid=cb837bee-93df-11ef-89a3-cb88985bbb45; path=/; domain=.crackingparadox.com; expires=Fri, 14 Nov 2092 00:32:14 GMT; max-age=2147483647; HttpOnly
                      • flag-us
                        DNS
                        s353361pk4fi.preview.gamesparks.net
                        BlackBullet2.exe
                        Remote address:
                        8.8.8.8:53
                        Request
                        s353361pk4fi.preview.gamesparks.net
                        IN A
                        Response
                        s353361pk4fi.preview.gamesparks.net
                        IN A
                        18.239.208.128
                        s353361pk4fi.preview.gamesparks.net
                        IN A
                        18.239.208.112
                        s353361pk4fi.preview.gamesparks.net
                        IN A
                        18.239.208.88
                        s353361pk4fi.preview.gamesparks.net
                        IN A
                        18.239.208.9
                      • flag-us
                        DNS
                        ww1.crackingparadox.com
                        msedge.exe
                        Remote address:
                        8.8.8.8:53
                        Request
                        ww1.crackingparadox.com
                        IN A
                        Response
                        ww1.crackingparadox.com
                        IN CNAME
                        12065.bodis.com
                        12065.bodis.com
                        IN A
                        199.59.243.227
                      • flag-us
                        DNS
                        60.56.107.185.in-addr.arpa
                        Remote address:
                        8.8.8.8:53
                        Request
                        60.56.107.185.in-addr.arpa
                        IN PTR
                        Response
                      • flag-us
                        DNS
                        preview.gamesparks.net
                        BlackBullet2.exe
                        Remote address:
                        8.8.8.8:53
                        Request
                        preview.gamesparks.net
                        IN A
                        Response
                        preview.gamesparks.net
                        IN A
                        18.239.208.128
                        preview.gamesparks.net
                        IN A
                        18.239.208.88
                        preview.gamesparks.net
                        IN A
                        18.239.208.112
                        preview.gamesparks.net
                        IN A
                        18.239.208.9
                      • flag-us
                        GET
                        http://ww1.crackingparadox.com/
                        msedge.exe
                        Remote address:
                        199.59.243.227:80
                        Request
                        GET / HTTP/1.1
                        Host: ww1.crackingparadox.com
                        Connection: keep-alive
                        DNT: 1
                        Upgrade-Insecure-Requests: 1
                        User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/92.0.4515.131 Safari/537.36 Edg/92.0.902.67
                        Accept: text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3;q=0.9
                        Accept-Encoding: gzip, deflate
                        Accept-Language: en-US,en;q=0.9
                        Cookie: sid=cb837bee-93df-11ef-89a3-cb88985bbb45
                        Response
                        HTTP/1.1 200 OK
                        date: Sat, 26 Oct 2024 21:18:07 GMT
                        content-type: text/html; charset=utf-8
                        content-length: 1070
                        x-request-id: 129bfa13-f9fd-4eb3-8c25-8aec3d9b6046
                        cache-control: no-store, max-age=0
                        accept-ch: sec-ch-prefers-color-scheme
                        critical-ch: sec-ch-prefers-color-scheme
                        vary: sec-ch-prefers-color-scheme
                        x-adblock-key: MFwwDQYJKoZIhvcNAQEBBQADSwAwSAJBANDrp2lz7AOmADaN8tA50LsWcjLFyQFcb/P2Txc58oYOeILb3vBw7J6f4pamkAQVSQuqYsKx3YzdUHCvbVZvFUsCAwEAAQ==_EG+cPmtHP6NdQGc/85PzupjZAJ2q+WZ10wJxSUCWhgp0izVnDFJWqNLikaWu3AA/OgC42Xxj+/mUl55cdWjxNQ==
                        set-cookie: parking_session=129bfa13-f9fd-4eb3-8c25-8aec3d9b6046; expires=Sat, 26 Oct 2024 21:33:07 GMT; path=/
                      • flag-us
                        GET
                        http://ww1.crackingparadox.com/bDMwUXEEo.js
                        msedge.exe
                        Remote address:
                        199.59.243.227:80
                        Request
                        GET /bDMwUXEEo.js HTTP/1.1
                        Host: ww1.crackingparadox.com
                        Connection: keep-alive
                        User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/92.0.4515.131 Safari/537.36 Edg/92.0.902.67
                        DNT: 1
                        Accept: */*
                        Referer: http://ww1.crackingparadox.com/
                        Accept-Encoding: gzip, deflate
                        Accept-Language: en-US,en;q=0.9
                        Cookie: sid=cb837bee-93df-11ef-89a3-cb88985bbb45; parking_session=129bfa13-f9fd-4eb3-8c25-8aec3d9b6046
                        Response
                        HTTP/1.1 200 OK
                        date: Sat, 26 Oct 2024 21:18:07 GMT
                        content-type: application/javascript; charset=utf-8
                        content-length: 34737
                        x-request-id: 6de64120-5109-48c0-96de-0b8dfbe14c93
                        set-cookie: parking_session=129bfa13-f9fd-4eb3-8c25-8aec3d9b6046; expires=Sat, 26 Oct 2024 21:33:07 GMT
                      • flag-us
                        POST
                        http://ww1.crackingparadox.com/_fd
                        msedge.exe
                        Remote address:
                        199.59.243.227:80
                        Request
                        POST /_fd HTTP/1.1
                        Host: ww1.crackingparadox.com
                        Connection: keep-alive
                        Content-Length: 0
                        Accept: application/json
                        DNT: 1
                        User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/92.0.4515.131 Safari/537.36 Edg/92.0.902.67
                        Content-Type: application/json
                        Origin: http://ww1.crackingparadox.com
                        Referer: http://ww1.crackingparadox.com/
                        Accept-Encoding: gzip, deflate
                        Accept-Language: en-US,en;q=0.9
                        Cookie: sid=cb837bee-93df-11ef-89a3-cb88985bbb45; parking_session=129bfa13-f9fd-4eb3-8c25-8aec3d9b6046
                        Response
                        HTTP/1.1 200 OK
                        date: Sat, 26 Oct 2024 21:18:07 GMT
                        content-type: application/json; charset=utf-8
                        content-length: 5265
                        x-request-id: a45e2aae-b2d2-498c-ac9e-5c3d27d4fa23
                        set-cookie: parking_session=129bfa13-f9fd-4eb3-8c25-8aec3d9b6046; expires=Sat, 26 Oct 2024 21:33:07 GMT
                      • flag-us
                        POST
                        http://ww1.crackingparadox.com/_tr
                        msedge.exe
                        Remote address:
                        199.59.243.227:80
                        Request
                        POST /_tr HTTP/1.1
                        Host: ww1.crackingparadox.com
                        Connection: keep-alive
                        Content-Length: 1825
                        Accept: application/json
                        DNT: 1
                        User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/92.0.4515.131 Safari/537.36 Edg/92.0.902.67
                        Content-Type: application/json
                        Origin: http://ww1.crackingparadox.com
                        Referer: http://ww1.crackingparadox.com/
                        Accept-Encoding: gzip, deflate
                        Accept-Language: en-US,en;q=0.9
                        Cookie: sid=cb837bee-93df-11ef-89a3-cb88985bbb45; parking_session=129bfa13-f9fd-4eb3-8c25-8aec3d9b6046; __gsas=ID=22c17185775fa01a:T=1729977488:RT=1729977488:S=ALNI_MaT6ZhKg8tBtc6dRqjnJdVgbftMVg
                        Response
                        HTTP/1.1 200 OK
                        date: Sat, 26 Oct 2024 21:18:07 GMT
                        content-type: application/json; charset=utf-8
                        content-length: 2
                        x-request-id: afb54afa-4edd-4712-b0da-0feed39b1343
                        set-cookie: parking_session=129bfa13-f9fd-4eb3-8c25-8aec3d9b6046; expires=Sat, 26 Oct 2024 21:33:08 GMT
                      • flag-us
                        DNS
                        gamesparks.net
                        BlackBullet2.exe
                        Remote address:
                        8.8.8.8:53
                        Request
                        gamesparks.net
                        IN A
                        Response
                        gamesparks.net
                        IN A
                        18.239.208.112
                        gamesparks.net
                        IN A
                        18.239.208.128
                        gamesparks.net
                        IN A
                        18.239.208.9
                        gamesparks.net
                        IN A
                        18.239.208.88
                      • flag-us
                        DNS
                        www.google.com
                        msedge.exe
                        Remote address:
                        8.8.8.8:53
                        Request
                        www.google.com
                        IN A
                        Response
                        www.google.com
                        IN A
                        172.217.169.36
                      • flag-gb
                        GET
                        https://www.google.com/adsense/domains/caf.js?abp=1&bodis=true
                        msedge.exe
                        Remote address:
                        172.217.169.36:443
                        Request
                        GET /adsense/domains/caf.js?abp=1&bodis=true HTTP/2.0
                        host: www.google.com
                        sec-ch-ua: "Chromium";v="92", " Not A;Brand";v="99", "Microsoft Edge";v="92"
                        dnt: 1
                        sec-ch-ua-mobile: ?0
                        user-agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/92.0.4515.131 Safari/537.36 Edg/92.0.902.67
                        accept: */*
                        sec-fetch-site: cross-site
                        sec-fetch-mode: no-cors
                        sec-fetch-dest: script
                        referer: http://ww1.crackingparadox.com/
                        accept-encoding: gzip, deflate, br
                        accept-language: en-US,en;q=0.9
                      • flag-us
                        DNS
                        syndicatedsearch.goog
                        msedge.exe
                        Remote address:
                        8.8.8.8:53
                        Request
                        syndicatedsearch.goog
                        IN A
                        Response
                        syndicatedsearch.goog
                        IN A
                        216.58.201.110
                      • flag-gb
                        GET
                        https://syndicatedsearch.goog/afs/ads?adtest=off&psid=3113057640&pcsa=false&channel=pid-bodis-gcontrol97%2Cpid-bodis-gcontrol121%2Cpid-bodis-gcontrol485%2Cpid-bodis-gcontrol151%2Cpid-bodis-gcontrol186&client=dp-bodis30_3ph&r=m&hl=en&ivt=0&rpbu=http%3A%2F%2Fww1.crackingparadox.com%2F%3Fcaf%3D1%26bpt%3D345&max_radlink_len=50&type=3&uiopt=false&swp=as-drid-2898040491288658&oe=UTF-8&ie=UTF-8&fexp=21404%2C17301437%2C17301439%2C17301442%2C17301542%2C17301266%2C72717108&format=r3&nocache=521729977485904&num=0&output=afd_ads&domain_name=ww1.crackingparadox.com&v=3&bsl=8&pac=0&u_his=1&u_tz=0&dt=1729977485905&u_w=1280&u_h=720&biw=1280&bih=609&psw=1280&psh=549&frm=0&uio=-&cont=rs&drt=0&jsid=caf&jsv=688160506&rurl=http%3A%2F%2Fww1.crackingparadox.com%2F
                        msedge.exe
                        Remote address:
                        216.58.201.110:443
                        Request
                        GET /afs/ads?adtest=off&psid=3113057640&pcsa=false&channel=pid-bodis-gcontrol97%2Cpid-bodis-gcontrol121%2Cpid-bodis-gcontrol485%2Cpid-bodis-gcontrol151%2Cpid-bodis-gcontrol186&client=dp-bodis30_3ph&r=m&hl=en&ivt=0&rpbu=http%3A%2F%2Fww1.crackingparadox.com%2F%3Fcaf%3D1%26bpt%3D345&max_radlink_len=50&type=3&uiopt=false&swp=as-drid-2898040491288658&oe=UTF-8&ie=UTF-8&fexp=21404%2C17301437%2C17301439%2C17301442%2C17301542%2C17301266%2C72717108&format=r3&nocache=521729977485904&num=0&output=afd_ads&domain_name=ww1.crackingparadox.com&v=3&bsl=8&pac=0&u_his=1&u_tz=0&dt=1729977485905&u_w=1280&u_h=720&biw=1280&bih=609&psw=1280&psh=549&frm=0&uio=-&cont=rs&drt=0&jsid=caf&jsv=688160506&rurl=http%3A%2F%2Fww1.crackingparadox.com%2F HTTP/2.0
                        host: syndicatedsearch.goog
                        sec-ch-ua: "Chromium";v="92", " Not A;Brand";v="99", "Microsoft Edge";v="92"
                        sec-ch-ua-mobile: ?0
                        upgrade-insecure-requests: 1
                        dnt: 1
                        user-agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/92.0.4515.131 Safari/537.36 Edg/92.0.902.67
                        accept: text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3;q=0.9
                        sec-fetch-site: cross-site
                        sec-fetch-mode: navigate
                        sec-fetch-dest: iframe
                        referer: http://ww1.crackingparadox.com/
                        accept-encoding: gzip, deflate, br
                        accept-language: en-US,en;q=0.9
                      • flag-gb
                        GET
                        https://syndicatedsearch.goog/adsense/domains/caf.js
                        msedge.exe
                        Remote address:
                        216.58.201.110:443
                        Request
                        GET /adsense/domains/caf.js HTTP/2.0
                        host: syndicatedsearch.goog
                        sec-ch-ua: "Chromium";v="92", " Not A;Brand";v="99", "Microsoft Edge";v="92"
                        dnt: 1
                        sec-ch-ua-mobile: ?0
                        user-agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/92.0.4515.131 Safari/537.36 Edg/92.0.902.67
                        accept: */*
                        sec-fetch-site: same-origin
                        sec-fetch-mode: no-cors
                        sec-fetch-dest: script
                        referer: https://syndicatedsearch.goog/
                        accept-encoding: gzip, deflate, br
                        accept-language: en-US,en;q=0.9
                      • flag-us
                        DNS
                        partner.googleadservices.com
                        msedge.exe
                        Remote address:
                        8.8.8.8:53
                        Request
                        partner.googleadservices.com
                        IN A
                        Response
                        partner.googleadservices.com
                        IN A
                        142.250.187.194
                      • flag-gb
                        GET
                        https://partner.googleadservices.com/gampad/cookie.js?domain=ww1.crackingparadox.com&client=partner-dp-bodis30_3ph&product=SAS&callback=__sasCookie&cookie_types=v1%2Cv2
                        msedge.exe
                        Remote address:
                        142.250.187.194:443
                        Request
                        GET /gampad/cookie.js?domain=ww1.crackingparadox.com&client=partner-dp-bodis30_3ph&product=SAS&callback=__sasCookie&cookie_types=v1%2Cv2 HTTP/2.0
                        host: partner.googleadservices.com
                        sec-ch-ua: "Chromium";v="92", " Not A;Brand";v="99", "Microsoft Edge";v="92"
                        dnt: 1
                        sec-ch-ua-mobile: ?0
                        user-agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/92.0.4515.131 Safari/537.36 Edg/92.0.902.67
                        accept: */*
                        sec-fetch-site: cross-site
                        sec-fetch-mode: no-cors
                        sec-fetch-dest: script
                        referer: http://ww1.crackingparadox.com/
                        accept-encoding: gzip, deflate, br
                        accept-language: en-US,en;q=0.9
                      • flag-us
                        DNS
                        227.243.59.199.in-addr.arpa
                        Remote address:
                        8.8.8.8:53
                        Request
                        227.243.59.199.in-addr.arpa
                        IN PTR
                        Response
                      • flag-us
                        DNS
                        36.169.217.172.in-addr.arpa
                        Remote address:
                        8.8.8.8:53
                        Request
                        36.169.217.172.in-addr.arpa
                        IN PTR
                        Response
                        36.169.217.172.in-addr.arpa
                        IN PTR
                        lhr48s08-in-f41e100net
                      • flag-us
                        DNS
                        110.201.58.216.in-addr.arpa
                        Remote address:
                        8.8.8.8:53
                        Request
                        110.201.58.216.in-addr.arpa
                        IN PTR
                        Response
                        110.201.58.216.in-addr.arpa
                        IN PTR
                        prg03s02-in-f141e100net
                        110.201.58.216.in-addr.arpa
                        IN PTR
                        lhr48s48-in-f14�I
                        110.201.58.216.in-addr.arpa
                        IN PTR
                        prg03s02-in-f110�I
                      • flag-us
                        DNS
                        194.187.250.142.in-addr.arpa
                        Remote address:
                        8.8.8.8:53
                        Request
                        194.187.250.142.in-addr.arpa
                        IN PTR
                        Response
                        194.187.250.142.in-addr.arpa
                        IN PTR
                        lhr25s33-in-f21e100net
                      • flag-us
                        DNS
                        afs.googleusercontent.com
                        msedge.exe
                        Remote address:
                        8.8.8.8:53
                        Request
                        afs.googleusercontent.com
                        IN A
                        Response
                        afs.googleusercontent.com
                        IN CNAME
                        googlehosted.l.googleusercontent.com
                        googlehosted.l.googleusercontent.com
                        IN A
                        142.250.200.1
                      • flag-gb
                        GET
                        https://afs.googleusercontent.com/ad_icons/standard/publisher_icon_image/chevron.svg?c=%2302198b
                        msedge.exe
                        Remote address:
                        142.250.200.1:443
                        Request
                        GET /ad_icons/standard/publisher_icon_image/chevron.svg?c=%2302198b HTTP/2.0
                        host: afs.googleusercontent.com
                        sec-ch-ua: "Chromium";v="92", " Not A;Brand";v="99", "Microsoft Edge";v="92"
                        dnt: 1
                        sec-ch-ua-mobile: ?0
                        user-agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/92.0.4515.131 Safari/537.36 Edg/92.0.902.67
                        accept: image/webp,image/apng,image/svg+xml,image/*,*/*;q=0.8
                        sec-fetch-site: cross-site
                        sec-fetch-mode: no-cors
                        sec-fetch-dest: image
                        referer: https://syndicatedsearch.goog/
                        accept-encoding: gzip, deflate, br
                        accept-language: en-US,en;q=0.9
                      • flag-gb
                        GET
                        https://afs.googleusercontent.com/ad_icons/standard/publisher_icon_image/call_to_action_arrow.svg?c=%23ffffff
                        msedge.exe
                        Remote address:
                        142.250.200.1:443
                        Request
                        GET /ad_icons/standard/publisher_icon_image/call_to_action_arrow.svg?c=%23ffffff HTTP/2.0
                        host: afs.googleusercontent.com
                        sec-ch-ua: "Chromium";v="92", " Not A;Brand";v="99", "Microsoft Edge";v="92"
                        dnt: 1
                        sec-ch-ua-mobile: ?0
                        user-agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/92.0.4515.131 Safari/537.36 Edg/92.0.902.67
                        accept: image/webp,image/apng,image/svg+xml,image/*,*/*;q=0.8
                        sec-fetch-site: cross-site
                        sec-fetch-mode: no-cors
                        sec-fetch-dest: image
                        referer: https://syndicatedsearch.goog/
                        accept-encoding: gzip, deflate, br
                        accept-language: en-US,en;q=0.9
                      • flag-us
                        DNS
                        1.200.250.142.in-addr.arpa
                        Remote address:
                        8.8.8.8:53
                        Request
                        1.200.250.142.in-addr.arpa
                        IN PTR
                        Response
                        1.200.250.142.in-addr.arpa
                        IN PTR
                        lhr48s29-in-f11e100net
                      • flag-us
                        DNS
                        212.20.149.52.in-addr.arpa
                        Remote address:
                        8.8.8.8:53
                        Request
                        212.20.149.52.in-addr.arpa
                        IN PTR
                        Response
                      • flag-us
                        DNS
                        241.42.69.40.in-addr.arpa
                        Remote address:
                        8.8.8.8:53
                        Request
                        241.42.69.40.in-addr.arpa
                        IN PTR
                        Response
                      • 150.171.27.10:443
                        https://g.bing.com/neg/0?action=emptycreativeimpression&adUnitId=11730597&publisherId=251978541&rid=d0baa7f36280429880c53bb00b0cd9e8&localId=w:2D3093FA-6F32-4948-30D6-822D6819A5AC&deviceId=6755476188894822&anid=
                        tls, http2
                        2.0kB
                        9.3kB
                        21
                        18

                        HTTP Request

                        GET https://g.bing.com/neg/0?action=emptycreativeimpression&adUnitId=11730597&publisherId=251978541&rid=d0baa7f36280429880c53bb00b0cd9e8&localId=w:2D3093FA-6F32-4948-30D6-822D6819A5AC&deviceId=6755476188894822&anid=

                        HTTP Response

                        204

                        HTTP Request

                        GET https://g.bing.com/neg/0?action=emptycreative&adUnitId=11730597&publisherId=251978541&rid=d0baa7f36280429880c53bb00b0cd9e8&localId=w:2D3093FA-6F32-4948-30D6-822D6819A5AC&deviceId=6755476188894822&anid=

                        HTTP Response

                        204

                        HTTP Request

                        GET https://g.bing.com/neg/0?action=emptycreativeimpression&adUnitId=11730597&publisherId=251978541&rid=d0baa7f36280429880c53bb00b0cd9e8&localId=w:2D3093FA-6F32-4948-30D6-822D6819A5AC&deviceId=6755476188894822&anid=

                        HTTP Response

                        204
                      • 185.107.56.60:80
                        crackingparadox.com
                        msedge.exe
                        190 B
                        84 B
                        4
                        2
                      • 185.107.56.60:80
                        http://crackingparadox.com/
                        http
                        msedge.exe
                        681 B
                        582 B
                        5
                        5

                        HTTP Request

                        GET http://crackingparadox.com/

                        HTTP Response

                        302
                      • 199.59.243.227:80
                        http://ww1.crackingparadox.com/_tr
                        http
                        msedge.exe
                        5.4kB
                        44.9kB
                        31
                        44

                        HTTP Request

                        GET http://ww1.crackingparadox.com/

                        HTTP Response

                        200

                        HTTP Request

                        GET http://ww1.crackingparadox.com/bDMwUXEEo.js

                        HTTP Response

                        200

                        HTTP Request

                        POST http://ww1.crackingparadox.com/_fd

                        HTTP Response

                        200

                        HTTP Request

                        POST http://ww1.crackingparadox.com/_tr

                        HTTP Response

                        200
                      • 172.217.169.36:443
                        https://www.google.com/adsense/domains/caf.js?abp=1&bodis=true
                        tls, http2
                        msedge.exe
                        3.2kB
                        66.1kB
                        46
                        59

                        HTTP Request

                        GET https://www.google.com/adsense/domains/caf.js?abp=1&bodis=true
                      • 216.58.201.110:443
                        https://syndicatedsearch.goog/adsense/domains/caf.js
                        tls, http2
                        msedge.exe
                        3.8kB
                        79.3kB
                        42
                        69

                        HTTP Request

                        GET https://syndicatedsearch.goog/afs/ads?adtest=off&psid=3113057640&pcsa=false&channel=pid-bodis-gcontrol97%2Cpid-bodis-gcontrol121%2Cpid-bodis-gcontrol485%2Cpid-bodis-gcontrol151%2Cpid-bodis-gcontrol186&client=dp-bodis30_3ph&r=m&hl=en&ivt=0&rpbu=http%3A%2F%2Fww1.crackingparadox.com%2F%3Fcaf%3D1%26bpt%3D345&max_radlink_len=50&type=3&uiopt=false&swp=as-drid-2898040491288658&oe=UTF-8&ie=UTF-8&fexp=21404%2C17301437%2C17301439%2C17301442%2C17301542%2C17301266%2C72717108&format=r3&nocache=521729977485904&num=0&output=afd_ads&domain_name=ww1.crackingparadox.com&v=3&bsl=8&pac=0&u_his=1&u_tz=0&dt=1729977485905&u_w=1280&u_h=720&biw=1280&bih=609&psw=1280&psh=549&frm=0&uio=-&cont=rs&drt=0&jsid=caf&jsv=688160506&rurl=http%3A%2F%2Fww1.crackingparadox.com%2F

                        HTTP Request

                        GET https://syndicatedsearch.goog/adsense/domains/caf.js
                      • 142.250.187.194:443
                        https://partner.googleadservices.com/gampad/cookie.js?domain=ww1.crackingparadox.com&client=partner-dp-bodis30_3ph&product=SAS&callback=__sasCookie&cookie_types=v1%2Cv2
                        tls, http2
                        msedge.exe
                        1.9kB
                        6.8kB
                        16
                        16

                        HTTP Request

                        GET https://partner.googleadservices.com/gampad/cookie.js?domain=ww1.crackingparadox.com&client=partner-dp-bodis30_3ph&product=SAS&callback=__sasCookie&cookie_types=v1%2Cv2
                      • 142.250.200.1:443
                        https://afs.googleusercontent.com/ad_icons/standard/publisher_icon_image/call_to_action_arrow.svg?c=%23ffffff
                        tls, http2
                        msedge.exe
                        2.0kB
                        12.3kB
                        17
                        19

                        HTTP Request

                        GET https://afs.googleusercontent.com/ad_icons/standard/publisher_icon_image/chevron.svg?c=%2302198b

                        HTTP Request

                        GET https://afs.googleusercontent.com/ad_icons/standard/publisher_icon_image/call_to_action_arrow.svg?c=%23ffffff
                      • 142.250.200.1:443
                        afs.googleusercontent.com
                        tls, http2
                        msedge.exe
                        1.0kB
                        10.8kB
                        10
                        11
                      • 8.8.8.8:53
                        20.160.190.20.in-addr.arpa
                        dns
                        72 B
                        158 B
                        1
                        1

                        DNS Request

                        20.160.190.20.in-addr.arpa

                      • 8.8.8.8:53
                        95.221.229.192.in-addr.arpa
                        dns
                        73 B
                        144 B
                        1
                        1

                        DNS Request

                        95.221.229.192.in-addr.arpa

                      • 8.8.8.8:53
                        g.bing.com
                        dns
                        56 B
                        148 B
                        1
                        1

                        DNS Request

                        g.bing.com

                        DNS Response

                        150.171.27.10
                        150.171.28.10

                      • 8.8.8.8:53
                        209.205.72.20.in-addr.arpa
                        dns
                        72 B
                        158 B
                        1
                        1

                        DNS Request

                        209.205.72.20.in-addr.arpa

                      • 8.8.8.8:53
                        57.169.31.20.in-addr.arpa
                        dns
                        71 B
                        157 B
                        1
                        1

                        DNS Request

                        57.169.31.20.in-addr.arpa

                      • 8.8.8.8:53
                        228.249.119.40.in-addr.arpa
                        dns
                        73 B
                        159 B
                        1
                        1

                        DNS Request

                        228.249.119.40.in-addr.arpa

                      • 8.8.8.8:53
                        crackingparadox.com
                        dns
                        msedge.exe
                        65 B
                        81 B
                        1
                        1

                        DNS Request

                        crackingparadox.com

                        DNS Response

                        185.107.56.60

                      • 8.8.8.8:53
                        s353361pk4fi.preview.gamesparks.net
                        dns
                        BlackBullet2.exe
                        81 B
                        145 B
                        1
                        1

                        DNS Request

                        s353361pk4fi.preview.gamesparks.net

                        DNS Response

                        18.239.208.128
                        18.239.208.112
                        18.239.208.88
                        18.239.208.9

                      • 8.8.8.8:53
                        ww1.crackingparadox.com
                        dns
                        msedge.exe
                        69 B
                        111 B
                        1
                        1

                        DNS Request

                        ww1.crackingparadox.com

                        DNS Response

                        199.59.243.227

                      • 8.8.8.8:53
                        60.56.107.185.in-addr.arpa
                        dns
                        72 B
                        133 B
                        1
                        1

                        DNS Request

                        60.56.107.185.in-addr.arpa

                      • 8.8.8.8:53
                        preview.gamesparks.net
                        dns
                        BlackBullet2.exe
                        68 B
                        132 B
                        1
                        1

                        DNS Request

                        preview.gamesparks.net

                        DNS Response

                        18.239.208.128
                        18.239.208.88
                        18.239.208.112
                        18.239.208.9

                      • 8.8.8.8:53
                        gamesparks.net
                        dns
                        BlackBullet2.exe
                        60 B
                        124 B
                        1
                        1

                        DNS Request

                        gamesparks.net

                        DNS Response

                        18.239.208.112
                        18.239.208.128
                        18.239.208.9
                        18.239.208.88

                      • 8.8.8.8:53
                        www.google.com
                        dns
                        msedge.exe
                        60 B
                        76 B
                        1
                        1

                        DNS Request

                        www.google.com

                        DNS Response

                        172.217.169.36

                      • 8.8.8.8:53
                        syndicatedsearch.goog
                        dns
                        msedge.exe
                        67 B
                        83 B
                        1
                        1

                        DNS Request

                        syndicatedsearch.goog

                        DNS Response

                        216.58.201.110

                      • 8.8.8.8:53
                        partner.googleadservices.com
                        dns
                        msedge.exe
                        74 B
                        90 B
                        1
                        1

                        DNS Request

                        partner.googleadservices.com

                        DNS Response

                        142.250.187.194

                      • 216.58.201.110:443
                        syndicatedsearch.goog
                        https
                        msedge.exe
                        4.3kB
                        7.3kB
                        11
                        13
                      • 8.8.8.8:53
                        227.243.59.199.in-addr.arpa
                        dns
                        73 B
                        131 B
                        1
                        1

                        DNS Request

                        227.243.59.199.in-addr.arpa

                      • 8.8.8.8:53
                        36.169.217.172.in-addr.arpa
                        dns
                        73 B
                        111 B
                        1
                        1

                        DNS Request

                        36.169.217.172.in-addr.arpa

                      • 8.8.8.8:53
                        110.201.58.216.in-addr.arpa
                        dns
                        73 B
                        173 B
                        1
                        1

                        DNS Request

                        110.201.58.216.in-addr.arpa

                      • 8.8.8.8:53
                        194.187.250.142.in-addr.arpa
                        dns
                        74 B
                        112 B
                        1
                        1

                        DNS Request

                        194.187.250.142.in-addr.arpa

                      • 172.217.169.36:443
                        www.google.com
                        https
                        msedge.exe
                        4.2kB
                        29.9kB
                        18
                        26
                      • 8.8.8.8:53
                        afs.googleusercontent.com
                        dns
                        msedge.exe
                        71 B
                        116 B
                        1
                        1

                        DNS Request

                        afs.googleusercontent.com

                        DNS Response

                        142.250.200.1

                      • 8.8.8.8:53
                        1.200.250.142.in-addr.arpa
                        dns
                        72 B
                        110 B
                        1
                        1

                        DNS Request

                        1.200.250.142.in-addr.arpa

                      • 224.0.0.251:5353
                        msedge.exe
                        136 B
                        2
                      • 8.8.8.8:53
                        212.20.149.52.in-addr.arpa
                        dns
                        72 B
                        146 B
                        1
                        1

                        DNS Request

                        212.20.149.52.in-addr.arpa

                      • 8.8.8.8:53
                        241.42.69.40.in-addr.arpa
                        dns
                        71 B
                        145 B
                        1
                        1

                        DNS Request

                        241.42.69.40.in-addr.arpa

                      MITRE ATT&CK Enterprise v15

                      Replay Monitor

                      Loading Replay Monitor...

                      Downloads

                      • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad\settings.dat

                        Filesize

                        152B

                        MD5

                        61cef8e38cd95bf003f5fdd1dc37dae1

                        SHA1

                        11f2f79ecb349344c143eea9a0fed41891a3467f

                        SHA256

                        ae671613623b4477fbd5daf1fd2d148ae2a09ddcc3804b2b6d4ffcb60b317e3e

                        SHA512

                        6fb9b333fe0e8fde19fdd0bd01a1990a4e60a87c0a02bc8297da1206e42f8690d06b030308e58c862e9e77714a585eed7cc1627590d99a10aeb77fc0dd3d864d

                      • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad\settings.dat

                        Filesize

                        152B

                        MD5

                        0a9dc42e4013fc47438e96d24beb8eff

                        SHA1

                        806ab26d7eae031a58484188a7eb1adab06457fc

                        SHA256

                        58d66151799526b3fa372552cd99b385415d9e9a119302b99aadc34dd51dd151

                        SHA512

                        868d6b421ae2501a519595d0c34ddef25b2a98b082c5203da8349035f1f6764ddf183197f1054e7e86a752c71eccbc0649e515b63c55bc18cf5f0592397e258f

                      • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index

                        Filesize

                        144B

                        MD5

                        903290203da4db84ca56a31b64478417

                        SHA1

                        2e55269f0253888ae3e1c9e29b025554575b4bc4

                        SHA256

                        c6dc30f67d2be0901866d1a624a6d252f92db2569b014970c4a037b50e1101a1

                        SHA512

                        e721a0bcf9104bfea100f4f010cacb038ea22a8fcfd40073e91c1992fdde4408ae8affd439048c10d9b75b13ee97c7d303c2810b1a974d90b30d8bf034708191

                      • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Network Persistent State

                        Filesize

                        1KB

                        MD5

                        93b09e9c09943ebcf218e98ee4aef8f9

                        SHA1

                        f67a77e26e5ca60e295296f87fd5cbb540effdc4

                        SHA256

                        487a1d31b7353b07e68917c024bd6f86d221650fa7bf2b15db7f708dfc719546

                        SHA512

                        ff77fd3e506fa698a52bcceb75b72dfde4e298d1de64ca71e71f8c804234a8480c7b97a316cc50ec6ae27d57b05331894efabb578e4119b589fd0845ee47e8cb

                      • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Preferences

                        Filesize

                        5KB

                        MD5

                        09916e190d73fbebfb320c6205f1ec40

                        SHA1

                        5a5f977ee43a5b6ceb9067a5bcd04b728592b364

                        SHA256

                        4d59d1b9519cfc786cde4b924fa786b55ed1ee92e5091f5a0ad5f7275236d943

                        SHA512

                        4486db735f3c8c7a3bec2fc9969ea0ac270744388bd4a036622312c4e474c1fcffdef7f369ee884f0df6e8398a8a7bc3690542a77abd9a6d96319498503e87a1

                      • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Preferences

                        Filesize

                        6KB

                        MD5

                        1ea49f22ec2ad7ba5f18560338e0bf57

                        SHA1

                        246315703ac91499c9c97f3a1ba13819d8a1c589

                        SHA256

                        5764e81cec4f0c94aeb097d1da167ef7fa894642e7babea0bb96b360de1da2e7

                        SHA512

                        9168f9266eb832cbceefada34eb702c8f181465cca1f4e4b8e279d7209117f25b79699fdd8b95c82b471ad20f3c155180efd07c8c78a9d6506e886bda2a68cca

                      • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\data_reduction_proxy_leveldb\CURRENT

                        Filesize

                        16B

                        MD5

                        6752a1d65b201c13b62ea44016eb221f

                        SHA1

                        58ecf154d01a62233ed7fb494ace3c3d4ffce08b

                        SHA256

                        0861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd

                        SHA512

                        9cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389

                      • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Local State

                        Filesize

                        11KB

                        MD5

                        129e4f6252b6ac0e65e416acf8012645

                        SHA1

                        3c739a93dd4ac21c40e61f914cdb74a49822b5ae

                        SHA256

                        aef45060c09fff5c2aabb079427915cb618688217687e0412205c15ad8767b85

                        SHA512

                        7959882673d46c9e0ce0aec736891947114d1ce250bf6cb60d1ed5cbdad953a2ad700e1bfb6e78db7b9b810e078ad5c5d5a5403ede570c7a70d25e5b6c49630b

                      • C:\Users\Admin\AppData\Local\Temp\E60A.tmp\E60B.tmp\E60C.bat

                        Filesize

                        71B

                        MD5

                        2a0d73d98b428296a6e4dd75d20356c8

                        SHA1

                        48fb89a2afb456f31d75e23e6a7df0fda4ef3e2f

                        SHA256

                        36afdc556332525b8de95bfb7b83e266dc9d90746084cc6ded0f74a96cba26b2

                        SHA512

                        6f2bd412360157d1b7edbe1501adb978fb6f47aae0c7161c40c608c1317ac8e6ade80aecaf6297ca2e6fdea04f490954b7a91d5a6df03ab6e00f70ff78307697

                      • C:\Users\Admin\AppData\Local\Temp\evbEFC1.tmp

                        Filesize

                        1KB

                        MD5

                        ffce54e20826d374ab5e2ee01b4cb247

                        SHA1

                        ec13d3732150aec775d71d9d3d97f25995a1eb88

                        SHA256

                        d5aada4701f8cf3cb22fa5092c98e784741dbf84d9905daf0928b9270a0ec11a

                        SHA512

                        266673cc361747987ac5ca1b3a0c136f8812405a4646b5be7df18639ee6b893eb26429a41c2fa0b7ddb250289af86fbb7893dce4ddf5b37cd22fa7aace2e2d3d

                      • C:\Users\Admin\AppData\Local\Temp\evbEFE2.tmp

                        Filesize

                        1KB

                        MD5

                        0ce4834f5cba48c98b0956c0de6d9169

                        SHA1

                        53e862ef50a712a43ebb11edbabe85edbc9011b9

                        SHA256

                        cd27cf9a36d0f791925d581b4f107536428026e5ec67ac8ec064cfb855d1c135

                        SHA512

                        3be3497f811339c6ce2f3d16d43e97d7b83da40ae1c54b6ac53e7dee23d71439318111a7967e16131eb46b62aae84ce54ee5a819cdeece6a9576df5595b3dbd0

                      • C:\Users\Admin\AppData\Local\Temp\evbEFF4.tmp

                        Filesize

                        1KB

                        MD5

                        992f3b6741f74aeba23a38aa61665501

                        SHA1

                        ea1dc14e3dbfd10e5b78e0c5c66b99c90bff507d

                        SHA256

                        6acbecfd4644be3ab04625dc517d812abdd0437d68980d55dcbda319f6e184c1

                        SHA512

                        32c6151a270aa32317fc2878ca216fd512379b48238448da383e68168e527265d234d7e63ae3603fb09929282b62c5fae0539222814f25d3e0268bac0b6c6d37

                      • C:\Users\Admin\AppData\Local\Temp\evbF1C9.tmp

                        Filesize

                        1KB

                        MD5

                        dd6e920cae4262f4116706722b5c2d2b

                        SHA1

                        823c70ddfd94e4108001a2da7720aaa0aa721a39

                        SHA256

                        cce540819490859a84ba53c71b3a9e57978c7c1ef00114b24712037e0e5080a1

                        SHA512

                        30ef35e89e3150e9309519d14a270a36822b58a30d784ae1377a66b4655b428eb935c354d0fd4768e09d0115900ff1138795feddbffd98315ef2922cf44cd667

                      • C:\Users\Admin\AppData\Local\Temp\evbF26B.tmp

                        Filesize

                        1KB

                        MD5

                        0b8d921d6a673285be78a679f3d451f5

                        SHA1

                        5fd3370b6ee09ffeffaf1f2d1b472fe1ab2e44e3

                        SHA256

                        44914a1ee2dd069afc47dbc8e836adaeab915b6a652e25475e52e598b91a8b54

                        SHA512

                        eb3bde14a1c3dc5670f8d92b2c6f055b1b3408f89dafd22aea55f42d361ffdd4a1c19490f52d2cce2726ba2812026e493591dbebe9ad1a52ecc749749824af5b

                      • C:\Users\Admin\Desktop\New folder\Data\BB2.exe

                        Filesize

                        247KB

                        MD5

                        0f71306382369d8d08598bee5403bcb5

                        SHA1

                        b4530c2d598c9d48d18e53cb26b87a07ab4108a1

                        SHA256

                        dc0f37fdd2414feba7fc57d18fe8407cb4d891e139a462f75758ef97f61694cd

                        SHA512

                        07644af616316c155ae20220aafe83d2a6b911d73f9af7bd3a3ffbe8a4517d0cb5c41bbbca32d5d0e0772ad54bdeed44705e1c903af450724dccfb4e2f3e7fc5

                      • C:\Users\Admin\Desktop\New folder\Data\BlackBullet2.exe

                        Filesize

                        6.6MB

                        MD5

                        65b716d641a1a0f1d4652d4201bde84e

                        SHA1

                        39b49bb45ad3204daf92fa9d5545a2e8a5f083d9

                        SHA256

                        934d3d466a25472f639188ea088a2c01198bdcbe418841cfa65b85cf97f100d5

                        SHA512

                        95f37ba7612650b331802cf7a14dfcc544f7d18d479067e156652fd428ce72fe6cdfd41f22dd5a8c81828e182156b34f85f15f31bb587b18633a9ae97bfb75e7

                      • C:\Users\Admin\Desktop\New folder\Data\BlackBullet2.exe.config

                        Filesize

                        858B

                        MD5

                        919236f98bca660111b7eb3703c387bc

                        SHA1

                        eed03be30f98b6cce546389d96bf8a9ed0224e93

                        SHA256

                        7f05f68f739ad4f463f831ef81d0bbf954dc7e29ef86cc87bf041e1f6cec29dc

                        SHA512

                        5437eccedcc2e0a3b2a57144dba3ebcac3eac09fa0004c5abca141e5e0def5686a75e85437bb697c1f907d53feac4bc4265d1cbcbeff92288e90a82b0b6f3744

                      • C:\Users\Admin\Desktop\New folder\Data\DB\BlackBullet.db

                        Filesize

                        40KB

                        MD5

                        43828a37b18cef90e0e0fdb3ccba7e20

                        SHA1

                        5213a1752046a5ab0887630a05396e2485a03dd8

                        SHA256

                        06fa45959ff1cad0d429c4fabd2393ee04bdcca6baeb92abbecf10df963ea4f6

                        SHA512

                        02fe7695c16c56edb11c76a236dc5c9ec11f34ffc9a0370bee4c2f0f8e988591ac153e5d890169452727f39dc58f542bfd9d39f82e9d5fed76f750c11deff7f0

                      • C:\Users\Admin\Desktop\New folder\Data\Settings\License.txt

                        Filesize

                        39B

                        MD5

                        9dda87fa514b74a1ddf0fe63bbfbae7c

                        SHA1

                        93348e0dbeb1626af26017438a3bffc6c3a538a2

                        SHA256

                        3f287a6cce86d002f49f7f05c08079fe837abb41b091102db3a92403e2a81ce2

                        SHA512

                        340fab019cc3ca60060660645f0d33d6fc58eb189ba21e4157d370bb61f60e158243cc64c37b103a5326920724e7886b3f64313e72357928a36ee243db234cc9

                      • C:\Users\Admin\Desktop\New folder\Data\Settings\Settings.ini

                        Filesize

                        2KB

                        MD5

                        b6a71a4d4e230a0ed69398a22c89ce22

                        SHA1

                        c1c87da8111c4faeab63acd0297691cf3cdad462

                        SHA256

                        d759e002924cad832074dd4cdd9c8e7ba666eb2a7bca414b7c07f567c9660dd8

                        SHA512

                        de2cb44bc9b1de82c3daecd7d3dbeb6de9158a6ced6a0c595406615cb390bfa948872d3d9a463b0b46a2f3d8d4387999de8a844b122ae893c95a4a2b1454ae7a

                      • C:\Users\Admin\Desktop\New folder\Data\bin\Extreme.Net.dll

                        Filesize

                        108KB

                        MD5

                        36da665396a78b0d47fb3744503c92da

                        SHA1

                        e7e75d1344a298ff830edd350a7b5e1ec97c4862

                        SHA256

                        5ab95c5660476bf562509859cae8fac1c8509bc6410076c57b4641b4e9b48b00

                        SHA512

                        074346db1eab9a1981a866ba9e909a38aac689424c655ee5a40a43f1978bf39bf2edba967d41a6beb2f878bbf182575da9444d18988f93f459f1ffd1906c4be4

                      • C:\Users\Admin\Desktop\New folder\Data\bin\Newtonsoft.Json.dll

                        Filesize

                        647KB

                        MD5

                        5afda7c7d4f7085e744c2e7599279db3

                        SHA1

                        3a833eb7c6be203f16799d7b7ccd8b8c9d439261

                        SHA256

                        f58c374ffcaae4e36d740d90fbf7fe70d0abb7328cd9af3a0a7b70803e994ba4

                        SHA512

                        7cbbbef742f56af80f1012d7da86fe5375ac05813045756fb45d0691c36ef13c069361457500ba4200157d5ee7922fd118bf4c0635e5192e3f8c6183fd580944

                      • C:\Users\Admin\Desktop\New folder\Data\bin\System.Data.SQLite.dll

                        Filesize

                        337KB

                        MD5

                        66a3d16000dae771fb5cd00d33344e8d

                        SHA1

                        d33a5ea4f0241001240332c6ba663405d26e6672

                        SHA256

                        54b105ff8ad7aac149e4f42615a37a063fec7ce9b3edd2cd6cdec1eb6c57e2c0

                        SHA512

                        9ee8213a39aebf99a2068b3fc23b228b93a8e76061ae6011e8efd11451eaac2e992ae3537a9714ed046f4fd8e23b9ac01ec56e47e8fd1c402f5f88b91f8bc44a

                      • C:\Users\Admin\Desktop\New folder\Data\bin\System.Data.SQLite.dll.config

                        Filesize

                        671B

                        MD5

                        384dd2c6f11ffbebc4a8fd0f7d255c9e

                        SHA1

                        38e352300655ddd8eeccf45c1dafd5b8616f6cd2

                        SHA256

                        8a4a9908d893122d427354aa6e5973cae4165d175db3e3c48f7f37730c04d997

                        SHA512

                        1e71ad56475708be6cb24fb652853f4a815999928aa249e3dbdc50d124169ce19aec6d54935f9f1853a2cf7d4e65854a05582c3c870a1a03c7c68f81bbdc2d46

                      • C:\Users\Admin\Desktop\New folder\Data\bin\Xceed.Wpf.Toolkit.dll

                        Filesize

                        1.1MB

                        MD5

                        5349b07f9c0c63cf66486e37bc3c4b0d

                        SHA1

                        af3482030d701a013d145406c4f969eb61341f71

                        SHA256

                        711001125ff67ce9c8041beedaac3fa6441d64f3b202db53e34010cd42e16ed0

                        SHA512

                        814841f4c918638abcc4b95fd76c7fd38aad1015cd532b713eac4975d6772ec865291d7ffb4c5c31fe66014ce504529e755ab4badbaffdad8d28482f8de6d951

                      • C:\Users\Admin\Desktop\New folder\Data\x86\SQLite.Interop.dll

                        Filesize

                        1.2MB

                        MD5

                        12e5757b49eb50dde2c91aeab1b65c7f

                        SHA1

                        7fa3a5d4bd0ae92d0789275ff971c3eba1ea0d8c

                        SHA256

                        2f629ea1c9790ca1ffdcf790a845ad5a0bc47b66b4f5d3ce09fbe26ceb19e3e2

                        SHA512

                        e8344f553d45642bbb1a32863dd0948bbbbd64e047f6f4d4945b165e9475456acb545f42e0d484cf356c1584f6a736444cf30a63e81664c6ae297ea734a802e8

                      • C:\Users\Admin\Desktop\New folder\Launcher.exe

                        Filesize

                        210KB

                        MD5

                        a10f7bd626f4316948c67df572d53415

                        SHA1

                        289a3762a1df17dca68c96836fe033ee87445ae4

                        SHA256

                        a34f7e96926f234a3ebe13f3daf612e7a514370a254b51ac05ecc1c1763a3232

                        SHA512

                        70d4989be53f4b5f63d83113846af5407926265ec5594fd2cc19b77f0eb456d4a7d4afe8334c96f717cc49eeeac5399e20d4939507876c2472e61337625bd49a

                      • memory/1684-459-0x0000000005090000-0x000000000509A000-memory.dmp

                        Filesize

                        40KB

                      • memory/1684-458-0x0000000074B80000-0x0000000075330000-memory.dmp

                        Filesize

                        7.7MB

                      • memory/1684-457-0x0000000004FF0000-0x0000000005082000-memory.dmp

                        Filesize

                        584KB

                      • memory/1684-456-0x0000000005500000-0x0000000005AA4000-memory.dmp

                        Filesize

                        5.6MB

                      • memory/1684-455-0x00000000005A0000-0x00000000005DA000-memory.dmp

                        Filesize

                        232KB

                      • memory/1684-454-0x0000000074B8E000-0x0000000074B8F000-memory.dmp

                        Filesize

                        4KB

                      • memory/1684-464-0x0000000074B80000-0x0000000075330000-memory.dmp

                        Filesize

                        7.7MB

                      • memory/2468-530-0x00000000062B0000-0x0000000006328000-memory.dmp

                        Filesize

                        480KB

                      • memory/2468-564-0x000000000A130000-0x000000000A138000-memory.dmp

                        Filesize

                        32KB

                      • memory/2468-565-0x000000000A420000-0x000000000A428000-memory.dmp

                        Filesize

                        32KB

                      • memory/2468-566-0x000000000A370000-0x000000000A3A8000-memory.dmp

                        Filesize

                        224KB

                      • memory/2468-567-0x000000000A3C0000-0x000000000A3CE000-memory.dmp

                        Filesize

                        56KB

                      • memory/2468-574-0x00000000030E0000-0x0000000003100000-memory.dmp

                        Filesize

                        128KB

                      • memory/2468-558-0x000000000A110000-0x000000000A118000-memory.dmp

                        Filesize

                        32KB

                      • memory/2468-539-0x0000000006230000-0x00000000062A8000-memory.dmp

                        Filesize

                        480KB

                      • memory/2468-550-0x0000000006230000-0x0000000006270000-memory.dmp

                        Filesize

                        256KB

                      • memory/2468-552-0x0000000006000000-0x0000000006008000-memory.dmp

                        Filesize

                        32KB

                      • memory/2468-553-0x0000000000400000-0x0000000000940000-memory.dmp

                        Filesize

                        5.2MB

                      • memory/2468-551-0x0000000005700000-0x000000000570A000-memory.dmp

                        Filesize

                        40KB

                      • memory/2468-684-0x0000000005E20000-0x0000000005E8A000-memory.dmp

                        Filesize

                        424KB

                      • memory/2468-683-0x00000000030E0000-0x00000000030FC000-memory.dmp

                        Filesize

                        112KB

                      • memory/2468-540-0x0000000006230000-0x00000000062A8000-memory.dmp

                        Filesize

                        480KB

                      • memory/2468-689-0x000000000A290000-0x000000000A2B2000-memory.dmp

                        Filesize

                        136KB

                      • memory/2468-541-0x0000000006230000-0x00000000062A8000-memory.dmp

                        Filesize

                        480KB

                      • memory/2468-693-0x000000000A2C0000-0x000000000A31A000-memory.dmp

                        Filesize

                        360KB

                      • memory/2468-694-0x000000000C0E0000-0x000000000C434000-memory.dmp

                        Filesize

                        3.3MB

                      • memory/2468-695-0x000000000C440000-0x000000000C48C000-memory.dmp

                        Filesize

                        304KB

                      • memory/2468-510-0x0000000005E90000-0x0000000005EFA000-memory.dmp

                        Filesize

                        424KB

                      • memory/2468-501-0x00000000030E0000-0x00000000030FC000-memory.dmp

                        Filesize

                        112KB

                      • memory/2468-499-0x00000000056C0000-0x00000000056DC000-memory.dmp

                        Filesize

                        112KB

                      • memory/2468-700-0x000000000D0E0000-0x000000000D11C000-memory.dmp

                        Filesize

                        240KB

                      • memory/2468-701-0x000000000D120000-0x000000000D141000-memory.dmp

                        Filesize

                        132KB

                      • memory/2468-486-0x00000000055C0000-0x00000000055E0000-memory.dmp

                        Filesize

                        128KB

                      • memory/2468-477-0x0000000000400000-0x00000000008FA000-memory.dmp

                        Filesize

                        5.0MB

                      • memory/2468-705-0x000000000D1C0000-0x000000000D268000-memory.dmp

                        Filesize

                        672KB

                      • memory/2468-707-0x000000000D290000-0x000000000D2B2000-memory.dmp

                        Filesize

                        136KB

                      • memory/2468-470-0x0000000000400000-0x0000000000940000-memory.dmp

                        Filesize

                        5.2MB

                      • memory/2468-711-0x000000000D340000-0x000000000D454000-memory.dmp

                        Filesize

                        1.1MB

                      • memory/2468-712-0x0000000006230000-0x00000000062A8000-memory.dmp

                        Filesize

                        480KB

                      • memory/2468-722-0x0000000010000000-0x0000000010040000-memory.dmp

                        Filesize

                        256KB

                      We care about your privacy.

                      This website stores cookies on your computer. These cookies are used to improve your website experience and provide more personalized services to you, both on this website and through other media. To find out more about the cookies we use, see our Privacy Policy.