Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    92s
  • max time network
    98s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240704-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240704-enlocale:en-usos:windows10-2004-x64system
  • submitted
    06/07/2024, 15:03

General

  • Target

    pictrexclient-main/pictrex.exe

  • Size

    9.4MB

  • MD5

    e21afb0ebb35ac0b16ce4d5fdc053966

  • SHA1

    186930b6c3f35e440a3b53c85a1cfc407893ea2a

  • SHA256

    3cebcb7f6b293810f106656b269d6c54868018dead0b5b2ec74d1a336abb7731

  • SHA512

    501e4dbe83daa7981dfaffafc741a9161332617a00b043c412c413b3d9dfc57efd85bd4f23277a8e9c1324266bec11cf3cc4669276ef694cc10a42c598a5bdff

  • SSDEEP

    196608:13u78K/dY3pvuuDfyGR21X5Sp6GemDMPwWRA+xW0o8PYPGAfhzH:Vu7L/dY3pJDfDspfaMPlR+8PEt

Score
7/10

Malware Config

Signatures

  • Loads dropped DLL 41 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Legitimate hosting services abused for malware hosting/C2 1 TTPs 2 IoCs
  • Suspicious behavior: EnumeratesProcesses 2 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of WriteProcessMemory 6 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\pictrexclient-main\pictrex.exe
    "C:\Users\Admin\AppData\Local\Temp\pictrexclient-main\pictrex.exe"
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:1068
    • C:\Users\Admin\AppData\Local\Temp\pictrexclient-main\pictrex.exe
      "C:\Users\Admin\AppData\Local\Temp\pictrexclient-main\pictrex.exe"
      2⤵
      • Loads dropped DLL
      • Suspicious use of WriteProcessMemory
      PID:3664
      • C:\Windows\system32\cmd.exe
        C:\Windows\system32\cmd.exe /c "powershell Get-ItemPropertyValue -Path 'HKLM:SOFTWARE\Roblox\RobloxStudioBrowser\roblox.com' -Name .ROBLOSECURITY"
        3⤵
        • Suspicious use of WriteProcessMemory
        PID:3516
        • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
          powershell Get-ItemPropertyValue -Path 'HKLM:SOFTWARE\Roblox\RobloxStudioBrowser\roblox.com' -Name .ROBLOSECURITY
          4⤵
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of AdjustPrivilegeToken
          PID:4456

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\_MEI10682\Crypto\Cipher\_raw_cbc.pyd

    Filesize

    12KB

    MD5

    a1b78a3ce3165e90957880b8724d944f

    SHA1

    a69f63cc211e671a08daad7a66ed0b05f8736cc7

    SHA256

    84e071321e378054b6d3b56bbd66699e36554f637a44728b38b96a31199dfa69

    SHA512

    15847386652cbee378d0ff6aad0a3fe0d0c6c7f1939f764f86c665f3493b4bccaf98d7a29259e94ed197285d9365b9d6e697b010aff3370cf857b8cb4106d7d8

  • C:\Users\Admin\AppData\Local\Temp\_MEI10682\Crypto\Cipher\_raw_cfb.pyd

    Filesize

    13KB

    MD5

    0dca79c062f2f800132cf1748a8e147f

    SHA1

    91f525b8ca0c0db245c4d3fa4073541826e8fb89

    SHA256

    2a63e504c8aa4d291bbd8108f26eecde3dcd9bfba579ae80b777ff6dfec5e922

    SHA512

    a820299fba1d0952a00db78b92fb7d68d77c427418388cc67e3a37dc87b1895d9ae416cac32b859d11d21a07a8f4cef3bd26ebb06cc39f04ad5e60f8692c659b

  • C:\Users\Admin\AppData\Local\Temp\_MEI10682\Crypto\Cipher\_raw_ctr.pyd

    Filesize

    14KB

    MD5

    785f15dc9e505ed828356d978009ecce

    SHA1

    830e683b0e539309ecf0f1ed2c7f73dda2011563

    SHA256

    b2b68de1d7e5997eb0c8a44c9f2eb958de39b53db8d77a51a84f1d1b197b58b1

    SHA512

    16033b72be6d66ab3a44b0480eb245d853a100d13a1e820eff5b12ce0bb73e17d6e48b3e778d1b20d0c04fe1fb8a5723c02ed8af434ae64d0944f847796d98f2

  • C:\Users\Admin\AppData\Local\Temp\_MEI10682\Crypto\Cipher\_raw_ecb.pyd

    Filesize

    10KB

    MD5

    aec314222600ade3d96b6dc33af380a6

    SHA1

    c6af3edadb09ea3a56048b57237c0a2dca33bee1

    SHA256

    ea96505b38d27c085544fb129f2b0e00df5020d323d7853e6a6a8645ac785304

    SHA512

    bbc00aa7fdf178bb6b2d86419c31967f2bc32d157aa7ee3ac308c28d8bf4823c1fafcde6c91651edc05c146e44d7e59e02a76283890652b27c52f509c3b9ef9a

  • C:\Users\Admin\AppData\Local\Temp\_MEI10682\Crypto\Cipher\_raw_ofb.pyd

    Filesize

    12KB

    MD5

    4ed6d4b1b100384d13f25dfa3737fb78

    SHA1

    852a2f76c853db02e65512af35f5b4b4a2346abd

    SHA256

    084e4b2da2180ad2a2e96e8804a6f2fc37bce6349eb8a5f6b182116b4d04bd82

    SHA512

    276201a9bcb9f88f4bbac0cd9e3ea2da83e0fb4854b1a0dd63cff2af08af3883be34af6f06ece32fad2fd4271a0a09a3b576f1ed78b8a227d13c04a07eaf0827

  • C:\Users\Admin\AppData\Local\Temp\_MEI10682\Crypto\Hash\_BLAKE2s.pyd

    Filesize

    14KB

    MD5

    c482fe81df435cddef783ab0d8ad78b6

    SHA1

    25e0e650f9135110234091d5263be1721b8fe719

    SHA256

    55e20e1effe80f0d6655d690fa445659e0c692b800c4a01ecf3d43dfcb3324b2

    SHA512

    ef5a965b8505944e6b37581763cd9d525bbf1b877bfed319535aab675d0382b8655cd6a4f2832f608c1d89cfd0dae6005deda73a86b9d2d6e874953788ee0d36

  • C:\Users\Admin\AppData\Local\Temp\_MEI10682\Crypto\Hash\_MD5.pyd

    Filesize

    15KB

    MD5

    9de2cfd4fe88f9e8e3820ce931fc1129

    SHA1

    c2ea2284200ebbdc1179f36e8fa79f9ed0b27e80

    SHA256

    49e10215e1d6966b03470af10e7d3b8bd5b5d6707a258c3b1286ff002145e3d1

    SHA512

    c6d0e43df0e8f8e665bb1a78005a04f673e6b5211db0a0f1d640088782d736838944f0612a59a3c0cb930631108b93fd8c2d51bf191a81a06fb6d5a3388cff06

  • C:\Users\Admin\AppData\Local\Temp\_MEI10682\Crypto\Hash\_SHA1.pyd

    Filesize

    17KB

    MD5

    67e8ab67b5db0a50af2aedea886eb362

    SHA1

    a7d071a3be454b78a0a0bb100e5d9859c12f98e6

    SHA256

    044b09a6351db40fe1f242c70942d865ce4cd42a12f24e358f84ae790677d92d

    SHA512

    b2e41422b6642e000d9220a1cf4188b1845a8cf9498338d66ca0dcc0724540694719a4d3eda017ca6f2f77c3d6a6c427c6c86db3910c686cecb58a40c5239e2e

  • C:\Users\Admin\AppData\Local\Temp\_MEI10682\Crypto\Hash\_SHA256.pyd

    Filesize

    21KB

    MD5

    7a573f50bd6942e9bb68307e5b6a0bff

    SHA1

    7e0e435c8589ec3cecfe6354ae9e5ae868b9b209

    SHA256

    c6cd3f23d027febdf48161d3b74edb6c9d4d1bde23f775990f49572d8eb9dfb9

    SHA512

    9ecd754b99e020a169366cb8c99816070221c4db2c1ef8c23b6dac765e6bb56ea3abbe969025aecede8eb6c3ea8c626562f2cda3c4ea537c5db1a841f19c2ad5

  • C:\Users\Admin\AppData\Local\Temp\_MEI10682\Crypto\Util\_strxor.pyd

    Filesize

    10KB

    MD5

    5738d83e2a66b6ace4f631a9255f81d9

    SHA1

    5b6ebb0b82738781732cf7cfd497f5aeb3453de2

    SHA256

    f2718adadb6e9958081dcb5570ef737c66772c166a6ad8c0401adcd9a70f46a0

    SHA512

    bb21b62fd7fee22dfa04274d0fa1aec666c7845cd2ec3f01f1a0418a2c68f228ec0ae451c793ccae3aa88f1efee5d6019138c0975497518f990b8511b2fd0e75

  • C:\Users\Admin\AppData\Local\Temp\_MEI10682\VCRUNTIME140.dll

    Filesize

    106KB

    MD5

    4585a96cc4eef6aafd5e27ea09147dc6

    SHA1

    489cfff1b19abbec98fda26ac8958005e88dd0cb

    SHA256

    a8f950b4357ec12cfccddc9094cca56a3d5244b95e09ea6e9a746489f2d58736

    SHA512

    d78260c66331fe3029d2cc1b41a5d002ec651f2e3bbf55076d65839b5e3c6297955afd4d9ab8951fbdc9f929dbc65eb18b14b59bce1f2994318564eb4920f286

  • C:\Users\Admin\AppData\Local\Temp\_MEI10682\VCRUNTIME140_1.dll

    Filesize

    48KB

    MD5

    7e668ab8a78bd0118b94978d154c85bc

    SHA1

    dbac42a02a8d50639805174afd21d45f3c56e3a0

    SHA256

    e4b533a94e02c574780e4b333fcf0889f65ed00d39e32c0fbbda2116f185873f

    SHA512

    72bb41db17256141b06e2eaeb8fc65ad4abdb65e4b5f604c82b9e7e7f60050734137d602e0f853f1a38201515655b6982f2761ee0fa77c531aa58591c95f0032

  • C:\Users\Admin\AppData\Local\Temp\_MEI10682\_bz2.pyd

    Filesize

    82KB

    MD5

    a62207fc33140de460444e191ae19b74

    SHA1

    9327d3d4f9d56f1846781bcb0a05719dea462d74

    SHA256

    ebcac51449f323ae3ae961a33843029c34b6a82138ccd9214cf99f98dd2148c2

    SHA512

    90f9db9ee225958cb3e872b79f2c70cb1fd2248ebaa8f3282afff9250285852156bf668f5cfec49a4591b416ce7ebaaac62d2d887152f5356512f2347e3762b7

  • C:\Users\Admin\AppData\Local\Temp\_MEI10682\_ctypes.pyd

    Filesize

    120KB

    MD5

    9b344f8d7ce5b57e397a475847cc5f66

    SHA1

    aff1ccc2608da022ecc8d0aba65d304fe74cdf71

    SHA256

    b1214d7b7efd9d4b0f465ec3463512a1cbc5f59686267030f072e6ce4b2a95cf

    SHA512

    2b0d9e1b550bf108fa842324ab26555f2a224aefff517fdb16df85693e05adaf0d77ebe49382848f1ec68dc9b5ae75027a62c33721e42a1566274d1a2b1baa41

  • C:\Users\Admin\AppData\Local\Temp\_MEI10682\_hashlib.pyd

    Filesize

    63KB

    MD5

    787b82d4466f393366657b8f1bc5f1a9

    SHA1

    658639cddda55ac3bfc452db4ec9cf88851e606b

    SHA256

    241322647ba9f94bdc3ae387413ffb57ae14c8cf88bd564a31fe193c6ca43e37

    SHA512

    afcf66962958f38eec8b591aa30d380eb0e1b41028836058ff91b4d1472658de9fba3262f5c27ba688bd73da018e938f398e45911cd37584f623073067f575b6

  • C:\Users\Admin\AppData\Local\Temp\_MEI10682\_lzma.pyd

    Filesize

    155KB

    MD5

    0c7ea68ca88c07ae6b0a725497067891

    SHA1

    c2b61a3e230b30416bc283d1f3ea25678670eb74

    SHA256

    f74aaf0aa08cf90eb1eb23a474ccb7cb706b1ede7f911daf7ae68480765bdf11

    SHA512

    fd52f20496a12e6b20279646663d880b1354cffea10793506fe4560ed7da53e4efba900ae65c9996fbb3179c83844a9674051385e6e3c26fb2622917351846b9

  • C:\Users\Admin\AppData\Local\Temp\_MEI10682\_queue.pyd

    Filesize

    31KB

    MD5

    06248702a6cd9d2dd20c0b1c6b02174d

    SHA1

    3f14d8af944fe0d35d17701033ff1501049e856f

    SHA256

    ac177cd84c12e03e3a68bca30290bc0b8f173eee518ef1fa6a9dce3a3e755a93

    SHA512

    5b22bbff56a8b48655332ebd77387d307f5c0a526626f3654267a34bc4863d8afaf08ff3946606f3cf00b660530389c37bdfac91843808dbebc7373040fec4c1

  • C:\Users\Admin\AppData\Local\Temp\_MEI10682\_socket.pyd

    Filesize

    77KB

    MD5

    26dd19a1f5285712068b9e41808e8fa0

    SHA1

    90c9a112dd34d45256b4f2ed38c1cbbc9f24dba5

    SHA256

    eaabf6b78840daeaf96b5bdbf06adf0e4e2994dfeee5c5e27fefd824dbda5220

    SHA512

    173e1eda05d297d7da2193e8566201f05428437adcac80aecefe80f82d46295b15ce10990b5c080325dc59a432a587eef84a15ec688a62b82493ad501a1e4520

  • C:\Users\Admin\AppData\Local\Temp\_MEI10682\_sqlite3.pyd

    Filesize

    117KB

    MD5

    ffb03c18ed0f340fe9d86abaa9eef835

    SHA1

    d6295d7a100414ce76797c826d2d3c0b4df0c80e

    SHA256

    1d4e17237a10b68d16634fc9698edf342b40478d92fa15d574d212c7a44b05bb

    SHA512

    e911ce6e6b5de50696d7e7f14560c90b83c1179a946d2f5ddcf6fcf797c031dc65b42300685e97cfdc592bae5f974cc31c81d2e12994cd9c28d3f67df282dda5

  • C:\Users\Admin\AppData\Local\Temp\_MEI10682\_ssl.pyd

    Filesize

    157KB

    MD5

    ab0e4fbffb6977d0196c7d50bc76cf2d

    SHA1

    680e581c27d67cd1545c810dbb175c2a2a4ef714

    SHA256

    680ad2de8a6cff927822c1d7dd22112a3e8a824e82a7958ee409a7b9ce45ec70

    SHA512

    2bff84a8ec7a26dde8d1bb09792ead8636009c8ef3fa68300a75420197cd7b6c8eaaf8db6a5f97442723e5228afa62961f002948e0eeee8c957c6517547dffba

  • C:\Users\Admin\AppData\Local\Temp\_MEI10682\base_library.zip

    Filesize

    1.7MB

    MD5

    ebb4f1a115f0692698b5640869f30853

    SHA1

    9ba77340a6a32af08899e7f3c97841724dd78c3f

    SHA256

    4ab0deb6a298d14a0f50d55dc6ce5673b6c5320817ec255acf282191642a4576

    SHA512

    3f6ba7d86c9f292344f4ad196f4ae863bf936578dd7cfac7dc4aaf05c2c78e68d5f813c4ed36048b6678451f1717deeb77493d8557ee6778c6a70beb5294d21a

  • C:\Users\Admin\AppData\Local\Temp\_MEI10682\charset_normalizer\md.cp311-win_amd64.pyd

    Filesize

    10KB

    MD5

    fa50d9f8bce6bd13652f5090e7b82c4d

    SHA1

    ee137da302a43c2f46d4323e98ffd46d92cf4bef

    SHA256

    fff69928dea1432e0c7cb1225ab96f94fd38d5d852de9a6bb8bf30b7d2bedceb

    SHA512

    341cec015e74348eab30d86ebb35c028519703006814a2ecd19b9fe5e6fcb05eda6dde0aaf4fe624d254b0d0180ec32adf3b93ee96295f8f0f4c9d4ed27a7c0c

  • C:\Users\Admin\AppData\Local\Temp\_MEI10682\charset_normalizer\md__mypyc.cp311-win_amd64.pyd

    Filesize

    113KB

    MD5

    2d1f2ffd0fecf96a053043daad99a5df

    SHA1

    b03d5f889e55e802d3802d0f0caa4d29c538406b

    SHA256

    207bbae9ddf8bdd64e65a8d600fe1dd0465f2afcd6dc6e28d4d55887cd6cbd13

    SHA512

    4f7d68f241a7f581e143a010c78113154072c63adff5f200ef67eb34d766d14ce872d53183eb2b96b1895aa9c8d4ca82ee5e61e1c5e655ff5be56970be9ebe3e

  • C:\Users\Admin\AppData\Local\Temp\_MEI10682\libcrypto-1_1.dll

    Filesize

    3.3MB

    MD5

    9d7a0c99256c50afd5b0560ba2548930

    SHA1

    76bd9f13597a46f5283aa35c30b53c21976d0824

    SHA256

    9b7b4a0ad212095a8c2e35c71694d8a1764cd72a829e8e17c8afe3a55f147939

    SHA512

    cb39aa99b9d98c735fdacf1c5ed68a4d09d11f30262b91f6aa48c3f8520eff95e499400d0ce7e280ca7a90ff6d7141d2d893ef0b33a8803a1cadb28ba9a9e3e2

  • C:\Users\Admin\AppData\Local\Temp\_MEI10682\libffi-8.dll

    Filesize

    38KB

    MD5

    0f8e4992ca92baaf54cc0b43aaccce21

    SHA1

    c7300975df267b1d6adcbac0ac93fd7b1ab49bd2

    SHA256

    eff52743773eb550fcc6ce3efc37c85724502233b6b002a35496d828bd7b280a

    SHA512

    6e1b223462dc124279bfca74fd2c66fe18b368ffbca540c84e82e0f5bcbea0e10cc243975574fa95ace437b9d8b03a446ed5ee0c9b1b094147cefaf704dfe978

  • C:\Users\Admin\AppData\Local\Temp\_MEI10682\libssl-1_1.dll

    Filesize

    688KB

    MD5

    bec0f86f9da765e2a02c9237259a7898

    SHA1

    3caa604c3fff88e71f489977e4293a488fb5671c

    SHA256

    d74ce01319ae6f54483a19375524aa39d9f5fd91f06cf7df238ca25e043130fd

    SHA512

    ffbc4e5ffdb49704e7aa6d74533e5af76bbe5db297713d8e59bd296143fe5f145fbb616b343eed3c48eceaccccc2431630470d8975a4a17c37eafcc12edd19f4

  • C:\Users\Admin\AppData\Local\Temp\_MEI10682\python311.dll

    Filesize

    5.5MB

    MD5

    e2bd5ae53427f193b42d64b8e9bf1943

    SHA1

    7c317aad8e2b24c08d3b8b3fba16dd537411727f

    SHA256

    c4844b05e3a936b130adedb854d3c04d49ee54edb43e9d36f8c4ae94ccb78400

    SHA512

    ae23a6707e539c619fd5c5b4fc6e4734edc91f89ebe024d25ff2a70168da6105ac0bd47cf6bf3715af6411963caf0acbb4632464e1619ca6361abf53adfe7036

  • C:\Users\Admin\AppData\Local\Temp\_MEI10682\pywin32_system32\pywintypes311.dll

    Filesize

    131KB

    MD5

    90b786dc6795d8ad0870e290349b5b52

    SHA1

    592c54e67cf5d2d884339e7a8d7a21e003e6482f

    SHA256

    89f2a5c6be1e70b3d895318fdd618506b8c0e9a63b6a1a4055dff4abdc89f18a

    SHA512

    c6e1dbf25d260c723a26c88ec027d40d47f5e28fc9eb2dbc72a88813a1d05c7f75616b31836b68b87df45c65eef6f3eaed2a9f9767f9e2f12c45f672c2116e72

  • C:\Users\Admin\AppData\Local\Temp\_MEI10682\select.pyd

    Filesize

    29KB

    MD5

    756c95d4d9b7820b00a3099faf3f4f51

    SHA1

    893954a45c75fb45fe8048a804990ca33f7c072d

    SHA256

    13e4d9a734a453a3613e11b6a518430099ad7e3d874ea407d1f9625b7f60268a

    SHA512

    0f54f0262cf8d71f00bf5666eb15541c6ecc5246cd298efd3b7dd39cdd29553a8242d204c42cfb28c537c3d61580153200373c34a94769f102b3baa288f6c398

  • C:\Users\Admin\AppData\Local\Temp\_MEI10682\sqlite3.dll

    Filesize

    1.4MB

    MD5

    35f55e2ad0ae11a273408cfeff75b1ab

    SHA1

    672bff2dea4351e1245806e6af7f1be5da9dd055

    SHA256

    919572560c314e46b1dba56418bbb50e1620c0af328aec394eaff580c58f2fc5

    SHA512

    b84a42b42a710cd5fe91def37207200141a03a8e93488d05099115f16961255248aa74c3a9800a82a0c4eb79348b570ca1a2bfa4e3168b5359ce063a688d26a4

  • C:\Users\Admin\AppData\Local\Temp\_MEI10682\unicodedata.pyd

    Filesize

    1.1MB

    MD5

    58f7988b50cba7b793884f580c7083e1

    SHA1

    d52c06b19861f074e41d8b521938dee8b56c1f2e

    SHA256

    e36d14cf49ca2af44fae8f278e883341167bc380099dac803276a11e57c9cfa1

    SHA512

    397fa46b90582f8a8cd7df23b722204c38544717bf546837c45e138b39112f33a1850be790e248fca5b5ecd9ed7c91cd1af1864f72717d9805c486db0505fb9c

  • C:\Users\Admin\AppData\Local\Temp\_MEI10682\win32crypt.pyd

    Filesize

    121KB

    MD5

    5390ade0ed5428024f3d854b5b9bfe9f

    SHA1

    dada7b44887dcb7b77dcadb9690baecf3ee2b937

    SHA256

    9771f09be29bd7a69abe774e28472a392382883c18a3cc524f8141e84b1be22c

    SHA512

    92e82eff79f45d4de1cf27946a357f122c5337a85315d7c139458a1a6a51dffbf3cbfcf832851fbdcd0ec1bd0f82e7089125ffbbe3275675433089bddbff865b

  • C:\Users\Admin\AppData\Local\Temp\__PSScriptPolicyTest_ry0jbn3i.eya.ps1

    Filesize

    60B

    MD5

    d17fe0a3f47be24a6453e9ef58c94641

    SHA1

    6ab83620379fc69f80c0242105ddffd7d98d5d9d

    SHA256

    96ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7

    SHA512

    5b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82

  • memory/4456-139-0x00007FFAC7DA3000-0x00007FFAC7DA5000-memory.dmp

    Filesize

    8KB

  • memory/4456-140-0x000001DFE3770000-0x000001DFE3792000-memory.dmp

    Filesize

    136KB

  • memory/4456-150-0x00007FFAC7DA0000-0x00007FFAC8861000-memory.dmp

    Filesize

    10.8MB

  • memory/4456-151-0x00007FFAC7DA0000-0x00007FFAC8861000-memory.dmp

    Filesize

    10.8MB

  • memory/4456-152-0x00007FFAC7DA0000-0x00007FFAC8861000-memory.dmp

    Filesize

    10.8MB

  • memory/4456-155-0x00007FFAC7DA0000-0x00007FFAC8861000-memory.dmp

    Filesize

    10.8MB