Analysis

  • max time kernel
    140s
  • max time network
    148s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20241007-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system
  • submitted
    04-11-2024 23:33

General

  • Target

    8188cfdd4bc2d6991d30f5c394b47b11f17f6ce920bb23bea805c5c6772b4a81.exe

  • Size

    5.5MB

  • MD5

    6ad27ed41e83e1276426abc7852a7b1a

  • SHA1

    8cf45789d1717fbd0d3fa56a5181d3a76616c0c5

  • SHA256

    8188cfdd4bc2d6991d30f5c394b47b11f17f6ce920bb23bea805c5c6772b4a81

  • SHA512

    f6c55476a68e9c798eaa7f0b942c4f133f10d5764843327c7ec79dc2011fc32404ebe18c2041d9a5c6ed1641e66d59aff91505ec0d6949fa0d5ad512c2a2374b

  • SSDEEP

    98304:GbSkC2TwlvmZeLaYOPKs/e3f0Vrr068IWK/WAWffeivlwNSD9JrKys:Q3C2Tw2eLVqKs2MRwdfcWXei9wirKys

Malware Config

Extracted

Family

stealc

Botnet

tale

C2

http://185.215.113.206

Attributes
  • url_path

    /6c4adf523b719729.php

Extracted

Family

amadey

Version

4.42

Botnet

9c9aa5

C2

http://185.215.113.43

Attributes
  • install_dir

    abc3bc1985

  • install_file

    skotes.exe

  • strings_key

    8a35cf2ea38c2817dba29a4b5b25dcf0

  • url_paths

    /Zu7JuNko/index.php

rc4.plain

Extracted

Family

lumma

C2

https://founpiuer.store/api

https://bringlanejk.site/api

https://moeventmynz.site/api

Signatures

  • Amadey

    Amadey bot is a simple trojan bot primarily used for collecting reconnaissance information.

  • Amadey family
  • Lumma Stealer, LummaC

    Lumma or LummaC is an infostealer written in C++ first seen in August 2022.

  • Lumma family
  • Modifies Windows Defender Real-time Protection settings 3 TTPs 6 IoCs
  • Stealc

    Stealc is an infostealer written in C++.

  • Stealc family
  • Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs 11 IoCs
  • Downloads MZ/PE file
  • Checks BIOS information in registry 2 TTPs 22 IoCs

    BIOS information is often read in order to detect sandboxing environments.

  • Checks computer location settings 2 TTPs 2 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Executes dropped EXE 13 IoCs
  • Identifies Wine through registry keys 2 TTPs 11 IoCs

    Wine is a compatibility layer capable of running Windows applications, which can be used as sandboxing environment.

  • Windows security modification 2 TTPs 2 IoCs
  • Adds Run key to start application 2 TTPs 6 IoCs
  • AutoIT Executable 1 IoCs

    AutoIT scripts compiled to PE executables.

  • Suspicious use of NtSetInformationThreadHideFromDebugger 11 IoCs
  • Drops file in Windows directory 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Program crash 3 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 16 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Checks processor information in registry 2 TTPs 8 IoCs

    Processor information is often read in order to detect sandboxing environments.

  • Kills process with taskkill 5 IoCs
  • Modifies registry class 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 29 IoCs
  • Suspicious use of AdjustPrivilegeToken 8 IoCs
  • Suspicious use of FindShellTrayWindow 32 IoCs
  • Suspicious use of SendNotifyMessage 30 IoCs
  • Suspicious use of SetWindowsHookEx 1 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs
  • Uses Task Scheduler COM API 1 TTPs

    The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.

Processes

  • C:\Users\Admin\AppData\Local\Temp\8188cfdd4bc2d6991d30f5c394b47b11f17f6ce920bb23bea805c5c6772b4a81.exe
    "C:\Users\Admin\AppData\Local\Temp\8188cfdd4bc2d6991d30f5c394b47b11f17f6ce920bb23bea805c5c6772b4a81.exe"
    1⤵
    • Adds Run key to start application
    • System Location Discovery: System Language Discovery
    • Suspicious use of WriteProcessMemory
    PID:4336
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\B1I52.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\B1I52.exe
      2⤵
      • Executes dropped EXE
      • Adds Run key to start application
      • System Location Discovery: System Language Discovery
      • Suspicious use of WriteProcessMemory
      PID:1840
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\2z9064.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\2z9064.exe
        3⤵
        • Identifies VirtualBox via ACPI registry values (likely anti-VM)
        • Checks BIOS information in registry
        • Executes dropped EXE
        • Identifies Wine through registry keys
        • Suspicious use of NtSetInformationThreadHideFromDebugger
        • System Location Discovery: System Language Discovery
        • Suspicious behavior: EnumeratesProcesses
        PID:5040
        • C:\Windows\SysWOW64\WerFault.exe
          C:\Windows\SysWOW64\WerFault.exe -u -p 5040 -s 1628
          4⤵
          • Program crash
          PID:3336
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\3D10h.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\3D10h.exe
        3⤵
        • Identifies VirtualBox via ACPI registry values (likely anti-VM)
        • Checks BIOS information in registry
        • Executes dropped EXE
        • Identifies Wine through registry keys
        • Suspicious use of NtSetInformationThreadHideFromDebugger
        • System Location Discovery: System Language Discovery
        • Suspicious behavior: EnumeratesProcesses
        PID:2388
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\4W130F.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\4W130F.exe
      2⤵
      • Identifies VirtualBox via ACPI registry values (likely anti-VM)
      • Checks BIOS information in registry
      • Checks computer location settings
      • Executes dropped EXE
      • Identifies Wine through registry keys
      • Suspicious use of NtSetInformationThreadHideFromDebugger
      • Drops file in Windows directory
      • System Location Discovery: System Language Discovery
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of FindShellTrayWindow
      • Suspicious use of WriteProcessMemory
      PID:2376
      • C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe
        "C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe"
        3⤵
        • Identifies VirtualBox via ACPI registry values (likely anti-VM)
        • Checks BIOS information in registry
        • Checks computer location settings
        • Executes dropped EXE
        • Identifies Wine through registry keys
        • Adds Run key to start application
        • Suspicious use of NtSetInformationThreadHideFromDebugger
        • System Location Discovery: System Language Discovery
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of WriteProcessMemory
        PID:388
        • C:\Users\Admin\AppData\Local\Temp\1003963001\665.exe
          "C:\Users\Admin\AppData\Local\Temp\1003963001\665.exe"
          4⤵
          • Identifies VirtualBox via ACPI registry values (likely anti-VM)
          • Checks BIOS information in registry
          • Executes dropped EXE
          • Identifies Wine through registry keys
          • Suspicious use of NtSetInformationThreadHideFromDebugger
          • System Location Discovery: System Language Discovery
          • Suspicious behavior: EnumeratesProcesses
          PID:4044
        • C:\Users\Admin\AppData\Local\Temp\1003968001\0047e88dac.exe
          "C:\Users\Admin\AppData\Local\Temp\1003968001\0047e88dac.exe"
          4⤵
          • Identifies VirtualBox via ACPI registry values (likely anti-VM)
          • Checks BIOS information in registry
          • Executes dropped EXE
          • Identifies Wine through registry keys
          • Suspicious use of NtSetInformationThreadHideFromDebugger
          • System Location Discovery: System Language Discovery
          • Suspicious behavior: EnumeratesProcesses
          PID:4124
          • C:\Windows\SysWOW64\WerFault.exe
            C:\Windows\SysWOW64\WerFault.exe -u -p 4124 -s 1572
            5⤵
            • Program crash
            PID:556
          • C:\Windows\SysWOW64\WerFault.exe
            C:\Windows\SysWOW64\WerFault.exe -u -p 4124 -s 1624
            5⤵
            • Program crash
            PID:1848
        • C:\Users\Admin\AppData\Local\Temp\1003969001\d06c8dd7f5.exe
          "C:\Users\Admin\AppData\Local\Temp\1003969001\d06c8dd7f5.exe"
          4⤵
          • Identifies VirtualBox via ACPI registry values (likely anti-VM)
          • Checks BIOS information in registry
          • Executes dropped EXE
          • Identifies Wine through registry keys
          • Suspicious use of NtSetInformationThreadHideFromDebugger
          • System Location Discovery: System Language Discovery
          • Suspicious behavior: EnumeratesProcesses
          PID:2128
        • C:\Users\Admin\AppData\Local\Temp\1003970001\704ad3efd2.exe
          "C:\Users\Admin\AppData\Local\Temp\1003970001\704ad3efd2.exe"
          4⤵
          • Executes dropped EXE
          • System Location Discovery: System Language Discovery
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of FindShellTrayWindow
          • Suspicious use of SendNotifyMessage
          • Suspicious use of WriteProcessMemory
          PID:4240
          • C:\Windows\SysWOW64\taskkill.exe
            taskkill /F /IM firefox.exe /T
            5⤵
            • System Location Discovery: System Language Discovery
            • Kills process with taskkill
            • Suspicious use of AdjustPrivilegeToken
            PID:2960
          • C:\Windows\SysWOW64\taskkill.exe
            taskkill /F /IM chrome.exe /T
            5⤵
            • System Location Discovery: System Language Discovery
            • Kills process with taskkill
            • Suspicious use of AdjustPrivilegeToken
            PID:3336
          • C:\Windows\SysWOW64\taskkill.exe
            taskkill /F /IM msedge.exe /T
            5⤵
            • System Location Discovery: System Language Discovery
            • Kills process with taskkill
            • Suspicious use of AdjustPrivilegeToken
            PID:2248
          • C:\Windows\SysWOW64\taskkill.exe
            taskkill /F /IM opera.exe /T
            5⤵
            • System Location Discovery: System Language Discovery
            • Kills process with taskkill
            • Suspicious use of AdjustPrivilegeToken
            PID:1596
          • C:\Windows\SysWOW64\taskkill.exe
            taskkill /F /IM brave.exe /T
            5⤵
            • System Location Discovery: System Language Discovery
            • Kills process with taskkill
            • Suspicious use of AdjustPrivilegeToken
            PID:4908
          • C:\Program Files\Mozilla Firefox\firefox.exe
            "C:\Program Files\Mozilla Firefox\firefox.exe" --kiosk "https://youtube.com/account?=https://accounts.google.com/v3/signin/challenge/pwd" --no-default-browser-check --disable-popup-blocking
            5⤵
            • Suspicious use of WriteProcessMemory
            PID:832
            • C:\Program Files\Mozilla Firefox\firefox.exe
              "C:\Program Files\Mozilla Firefox\firefox.exe" --kiosk https://youtube.com/account?=https://accounts.google.com/v3/signin/challenge/pwd --no-default-browser-check --disable-popup-blocking
              6⤵
              • Checks processor information in registry
              • Modifies registry class
              • Suspicious use of AdjustPrivilegeToken
              • Suspicious use of FindShellTrayWindow
              • Suspicious use of SendNotifyMessage
              • Suspicious use of SetWindowsHookEx
              • Suspicious use of WriteProcessMemory
              PID:3528
              • C:\Program Files\Mozilla Firefox\firefox.exe
                "C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=2076 -parentBuildID 20240401114208 -prefsHandle 2000 -prefMapHandle 1992 -prefsLen 23680 -prefMapSize 244658 -appDir "C:\Program Files\Mozilla Firefox\browser" - {de2f6e42-77bd-4361-be98-bc8168c58773} 3528 "\\.\pipe\gecko-crash-server-pipe.3528" gpu
                7⤵
                  PID:1792
                • C:\Program Files\Mozilla Firefox\firefox.exe
                  "C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=2508 -parentBuildID 20240401114208 -prefsHandle 2500 -prefMapHandle 2496 -prefsLen 24600 -prefMapSize 244658 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {e7989c26-1e38-43b4-ade7-a36b1e38a319} 3528 "\\.\pipe\gecko-crash-server-pipe.3528" socket
                  7⤵
                    PID:4184
                  • C:\Program Files\Mozilla Firefox\firefox.exe
                    "C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=3040 -childID 1 -isForBrowser -prefsHandle 3052 -prefMapHandle 3212 -prefsLen 22652 -prefMapSize 244658 -jsInitHandle 1348 -jsInitLen 234952 -parentBuildID 20240401114208 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {6b85b948-9e09-41f9-ab23-e901358f9322} 3528 "\\.\pipe\gecko-crash-server-pipe.3528" tab
                    7⤵
                      PID:4484
                    • C:\Program Files\Mozilla Firefox\firefox.exe
                      "C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=3508 -childID 2 -isForBrowser -prefsHandle 3600 -prefMapHandle 2760 -prefsLen 29090 -prefMapSize 244658 -jsInitHandle 1348 -jsInitLen 234952 -parentBuildID 20240401114208 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {eb2a5f48-5ab9-4dd2-aff6-16b380aa4d4c} 3528 "\\.\pipe\gecko-crash-server-pipe.3528" tab
                      7⤵
                        PID:4692
                      • C:\Program Files\Mozilla Firefox\firefox.exe
                        "C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=4488 -parentBuildID 20240401114208 -sandboxingKind 0 -prefsHandle 4496 -prefMapHandle 4448 -prefsLen 29090 -prefMapSize 244658 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {49d52d4f-706d-43aa-9231-3dd00f9beec8} 3528 "\\.\pipe\gecko-crash-server-pipe.3528" utility
                        7⤵
                        • Checks processor information in registry
                        PID:5352
                      • C:\Program Files\Mozilla Firefox\firefox.exe
                        "C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=5584 -childID 3 -isForBrowser -prefsHandle 5524 -prefMapHandle 5508 -prefsLen 27132 -prefMapSize 244658 -jsInitHandle 1348 -jsInitLen 234952 -parentBuildID 20240401114208 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {645e6acd-eba3-4a47-a689-8e9157e4d496} 3528 "\\.\pipe\gecko-crash-server-pipe.3528" tab
                        7⤵
                          PID:5680
                        • C:\Program Files\Mozilla Firefox\firefox.exe
                          "C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=5744 -childID 4 -isForBrowser -prefsHandle 5752 -prefMapHandle 5756 -prefsLen 27132 -prefMapSize 244658 -jsInitHandle 1348 -jsInitLen 234952 -parentBuildID 20240401114208 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {5f3c6c27-e016-4e29-b10c-be1040da9e42} 3528 "\\.\pipe\gecko-crash-server-pipe.3528" tab
                          7⤵
                            PID:5692
                          • C:\Program Files\Mozilla Firefox\firefox.exe
                            "C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=5960 -childID 5 -isForBrowser -prefsHandle 5964 -prefMapHandle 5972 -prefsLen 27132 -prefMapSize 244658 -jsInitHandle 1348 -jsInitLen 234952 -parentBuildID 20240401114208 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {037d66e0-023c-4114-9adc-f59a277f0e4a} 3528 "\\.\pipe\gecko-crash-server-pipe.3528" tab
                            7⤵
                              PID:5708
                      • C:\Users\Admin\AppData\Local\Temp\1003971001\0a6ff09215.exe
                        "C:\Users\Admin\AppData\Local\Temp\1003971001\0a6ff09215.exe"
                        4⤵
                        • Modifies Windows Defender Real-time Protection settings
                        • Identifies VirtualBox via ACPI registry values (likely anti-VM)
                        • Checks BIOS information in registry
                        • Executes dropped EXE
                        • Identifies Wine through registry keys
                        • Windows security modification
                        • Suspicious use of NtSetInformationThreadHideFromDebugger
                        • System Location Discovery: System Language Discovery
                        • Suspicious behavior: EnumeratesProcesses
                        • Suspicious use of AdjustPrivilegeToken
                        PID:5240
                • C:\Windows\SysWOW64\WerFault.exe
                  C:\Windows\SysWOW64\WerFault.exe -pss -s 408 -p 5040 -ip 5040
                  1⤵
                    PID:1184
                  • C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe
                    C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe
                    1⤵
                    • Identifies VirtualBox via ACPI registry values (likely anti-VM)
                    • Checks BIOS information in registry
                    • Executes dropped EXE
                    • Identifies Wine through registry keys
                    • Suspicious use of NtSetInformationThreadHideFromDebugger
                    • Suspicious behavior: EnumeratesProcesses
                    PID:4624
                  • C:\Windows\SysWOW64\WerFault.exe
                    C:\Windows\SysWOW64\WerFault.exe -pss -s 528 -p 4124 -ip 4124
                    1⤵
                      PID:3164
                    • C:\Windows\SysWOW64\WerFault.exe
                      C:\Windows\SysWOW64\WerFault.exe -pss -s 536 -p 4124 -ip 4124
                      1⤵
                        PID:1424
                      • C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe
                        C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe
                        1⤵
                        • Identifies VirtualBox via ACPI registry values (likely anti-VM)
                        • Checks BIOS information in registry
                        • Executes dropped EXE
                        • Identifies Wine through registry keys
                        • Suspicious use of NtSetInformationThreadHideFromDebugger
                        • Suspicious behavior: EnumeratesProcesses
                        PID:6636
                      • C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe
                        C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe
                        1⤵
                        • Identifies VirtualBox via ACPI registry values (likely anti-VM)
                        • Checks BIOS information in registry
                        • Executes dropped EXE
                        • Identifies Wine through registry keys
                        • Suspicious use of NtSetInformationThreadHideFromDebugger
                        • Suspicious behavior: EnumeratesProcesses
                        PID:6324

                      Network

                      MITRE ATT&CK Enterprise v15

                      Replay Monitor

                      Loading Replay Monitor...

                      Downloads

                      • C:\Users\Admin\AppData\Local\Mozilla\Firefox\Profiles\4ws2kncw.default-release\activity-stream.discovery_stream.json

                        Filesize

                        18KB

                        MD5

                        2c01a49a6f2b4564576d7d19e7ae3c80

                        SHA1

                        830b157e4566c85afa893d762054eccb64f36dff

                        SHA256

                        671a58f7b7ce0187c37665ece47920529e873cf1a9f2ca1cb38ecca8a67a79f2

                        SHA512

                        ad290e9a91ada89fd6f5103936c6638865b494f62d5fb23783f0c400940d9086c75d0e2eb58b372c4fdd12492e8d21930a8a69817e1e0e94fb7b5f620f7ebb66

                      • C:\Users\Admin\AppData\Local\Mozilla\Firefox\Profiles\4ws2kncw.default-release\cache2\entries\D500AD994A7515157BB2A6ADD5B18B754E4D2F99

                        Filesize

                        13KB

                        MD5

                        05b35dfafa46d698044da4532f303d77

                        SHA1

                        13cc1ef19c39d8828a643e5344f7900d5906d61b

                        SHA256

                        4b46fcc8477cd7c7834e25c3ca18ac520ca64abdb546125bec51bda500180ab8

                        SHA512

                        1a07650c4eed7cc09de52f44eafd5a3d8a10452084089db53818a7eed2e02727f9157a698832020979651707cebfa050998fdfe77926b420c8b8ff17c62d291f

                      • C:\Users\Admin\AppData\Local\Temp\1003963001\665.exe

                        Filesize

                        2.9MB

                        MD5

                        58dc151d5fc1a239fc75c9a19e5ecbcf

                        SHA1

                        82637b80d03a477b5bfb793f97093a4e77eae259

                        SHA256

                        cbc893e5989abb593668abceddfd5ee021bc47475aadcf0f17a77e279bfe861f

                        SHA512

                        42470db72278a9422fcde594d00a37a719fb3144e5988ec31139a83a9c9cf361c4c78771e7363d5d6c538c202e7ad5ea4bf714d9081bd0d4d7e3635189cf3721

                      • C:\Users\Admin\AppData\Local\Temp\1003968001\0047e88dac.exe

                        Filesize

                        2.9MB

                        MD5

                        8d999adf1925470a0c1cb14302416dda

                        SHA1

                        d38705d99bcd9470f95ba3835f220653a8817439

                        SHA256

                        28d49fd106080aadfac205f4461b7afaf79e43af59d05613a4f78a03b4bc0d53

                        SHA512

                        9ee097a1fb56bb0120a0aa095bdf761e5fccce6dd765c1a53a6f497c6abd14aaef98b17debc5346c1c5f1704e5ed972c861704ff614e753bd06665db6760c328

                      • C:\Users\Admin\AppData\Local\Temp\1003969001\d06c8dd7f5.exe

                        Filesize

                        2.0MB

                        MD5

                        dd5d490f1451d01bfc3ab1f2dec6e62f

                        SHA1

                        76b00533da1537cbea76d48a8d94ed0515d5a11d

                        SHA256

                        2beffec571dce2052e563a0651424ac2a4be219dc068a283e5904a4ce767cdc0

                        SHA512

                        053dba255ef0802130241416e85fe07ab4445739d5e75a7f65fc6e3d94c6b8881c7fb2b5560cfa35504540d9e75c65a221291ca5efe9ebf48e40580ce95c8d7d

                      • C:\Users\Admin\AppData\Local\Temp\1003970001\704ad3efd2.exe

                        Filesize

                        898KB

                        MD5

                        c40a431e9148be221e97e1041384e4f8

                        SHA1

                        5b6d4a6b670116c9644f050b5f59c8da6438f479

                        SHA256

                        0cb3fdee7cbee9cab55d63a755a04513c2bf2e98f6e4863b13d8300a9975e046

                        SHA512

                        54ba58c46625e24ee4fc0a11b902fdbe06d1e2ec317292f8cf7504168264a3d621e9f68e5136d6a58c76bd90847bdacf671cb0600ffcf1d7fab96bacd60f1017

                      • C:\Users\Admin\AppData\Local\Temp\1003971001\0a6ff09215.exe

                        Filesize

                        2.7MB

                        MD5

                        44f2a19d558f87d2ad13248097e8efc5

                        SHA1

                        2dfb7112a808a1f0006164aa646e2ee66c17d31c

                        SHA256

                        0c53329caa20f66d8126c2dd37e455689b36a4f3c29f0a5435b350337d6b32c0

                        SHA512

                        470ec29041351cbfa70bcdc9505a9736fb9f595bc0c4133b89e4b8bc4adfffb145b991aabab8c25f9616e0a9398a15573832da235348480e5188821b9736f1c7

                      • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\4W130F.exe

                        Filesize

                        3.1MB

                        MD5

                        40d0a9a302cafa04a16c25948c5d1743

                        SHA1

                        cd881baf15f4997516531c568dd4e780b25678bc

                        SHA256

                        21527060aa825602cce291ed6a371dd7eaeeec36a006dc2ce45533e3dbfec2e4

                        SHA512

                        0ced8896299e0751570e5f5f790177d80f525c0dd7340f1ef56d4b82f9b974fe0e3de0d7e6fddf5a4a9981b2f55c5811b02791db74a2795ae071bd9220d64a9c

                      • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\B1I52.exe

                        Filesize

                        3.7MB

                        MD5

                        4f224df3452b9c1c68797ea6f8936fb0

                        SHA1

                        50d3aaa6dd399be3fd92f2e570631e2300daf792

                        SHA256

                        0dede2dac7382f688c0dccc9cc8bc63207f751489f8c59833f3b8499e05e3c0d

                        SHA512

                        078431d221440c81888c240a652c58e9337afbb2ac9729897a566b6ace3baf5930f6a80ec97d353d61f0a0d8535a180b4f6535fcfb75893658af5d40c73d97da

                      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\2z9064.exe

                        Filesize

                        2.8MB

                        MD5

                        3ecd18933647e380909e891891dc9b2d

                        SHA1

                        4cde594108e341c829fae17b0b2517c1d797488e

                        SHA256

                        541ca863e7eaaf20781b0ad6a049d34ccf41da106598f29a0f61239251e6965e

                        SHA512

                        fccf8ec7d6fe215305b54e3e179e20a5bb3a06891f5873b4e7942162aa9a763f8cc8c23debc9767a9ebada3ca0aac7895f4ed62f3641d5617362b8e80d877c9e

                      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\3D10h.exe

                        Filesize

                        2.0MB

                        MD5

                        2a29388bf33283298f9e7627e8949930

                        SHA1

                        d0344a99409a59964592060d1741432f063e7ff0

                        SHA256

                        46a4affbb44bdc5c43f6656123e4d886112e2b46479d08fc59751bef5f4c2da5

                        SHA512

                        e3afe5d0cc172853600d6f54817623c85a4ce41809a515a90d62085e7a693868eeb215f2e0fb055f45b0cbddb733679d61d24bb77e5b750c012dcaf6d4451a29

                      • C:\Users\Admin\AppData\Local\Temp\tmpaddon

                        Filesize

                        479KB

                        MD5

                        09372174e83dbbf696ee732fd2e875bb

                        SHA1

                        ba360186ba650a769f9303f48b7200fb5eaccee1

                        SHA256

                        c32efac42faf4b9878fb8917c5e71d89ff40de580c4f52f62e11c6cfab55167f

                        SHA512

                        b667086ed49579592d435df2b486fe30ba1b62ddd169f19e700cd079239747dd3e20058c285fa9c10a533e34f22b5198ed9b1f92ae560a3067f3e3feacc724f1

                      • C:\Users\Admin\AppData\Local\Temp\tmpaddon-1

                        Filesize

                        13.8MB

                        MD5

                        0a8747a2ac9ac08ae9508f36c6d75692

                        SHA1

                        b287a96fd6cc12433adb42193dfe06111c38eaf0

                        SHA256

                        32d544baf2facc893057a1d97db33207e642f0dacf235d8500a0b5eff934ce03

                        SHA512

                        59521f8c61236641b3299ab460c58c8f5f26fa67e828de853c2cf372f9614d58b9f541aae325b1600ec4f3a47953caacb8122b0dfce7481acfec81045735947d

                      • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\4ws2kncw.default-release\AlternateServices.bin

                        Filesize

                        8KB

                        MD5

                        41d7eaca08cf1be5f8b875d967bbf029

                        SHA1

                        04dec7a5f75da377a9dca18230de341b07157160

                        SHA256

                        956596bfb094144fbfbc30f053bb1f7ea2923cc05c58bd314b0d97781d0fdfd1

                        SHA512

                        0ed7b4f99ecc9f8b4ff6b6400256d01a1928e3f92266027b59eca9ab5c29ed93eb97aa21a3b299667aa3230e107ac4340c0d9ef874a3ef2de32418217ccc9830

                      • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\4ws2kncw.default-release\AlternateServices.bin

                        Filesize

                        12KB

                        MD5

                        e67a31c7c466c0eeff6e4f85be15c0c6

                        SHA1

                        ad019341aeeaeed4c7a69eec5a7e4ff39bb8c7f9

                        SHA256

                        f57b233122b84ba95c83ec6c8ff00436aa82f8a34b9600980435be577f2edcf1

                        SHA512

                        ee5facbc71f422cc4041bd40441e7041ba0922612704735714217029c965b6f930022784875e4ac39ad9ca6b720f009d474853527d38fd3539db5b924ff38502

                      • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\4ws2kncw.default-release\datareporting\glean\db\data.safe.bin

                        Filesize

                        23KB

                        MD5

                        e0f0849abfc340c9160b3ec4105a6745

                        SHA1

                        2b8e446352702d25e3dd6380b4dc52c74c4f75ce

                        SHA256

                        ce694b8c1e64b596ff442ada79455768a597afdd9fe7a7037fb393fab4ac00ad

                        SHA512

                        26a451fbca770438d51abd7ace9243d56fac3ed7b793b63bfa7b8d3dff6ede96363c7da94b69299bd558cc66a638cf9d855c2ed41edc13daa64fdb33ba68009f

                      • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\4ws2kncw.default-release\datareporting\glean\db\data.safe.bin

                        Filesize

                        15KB

                        MD5

                        1335d13c43804549f91242a7a40f5ed0

                        SHA1

                        77ccf9c6bc367bea7fcbc83e0f7341ef0721856f

                        SHA256

                        b8d111482d6cc2b44c606218157987fa8ef8201af0caeb593bce437e222cbcc2

                        SHA512

                        7b451999b6134964c5417d05b4465c62765094f3fee8b7568db1eb194d0b378c5170400fb7d265aab0f6811811f1dfaff0d053733b4510f16d3d6666bfa0562c

                      • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\4ws2kncw.default-release\datareporting\glean\db\data.safe.bin

                        Filesize

                        15KB

                        MD5

                        c76d783eda1ede8a771d85fc3d19639f

                        SHA1

                        f9a3cdc6ed14201d73852321fe7caef7195ef483

                        SHA256

                        8a2389cdb51955899d0b01f60b6ed4636f24cba515f6c5abe27c0ae0e713d459

                        SHA512

                        426b44c5b1e191dcadbdd57fa723114c292a9f0a304bbf98bcaeb470e25f13fd841e3f9153ec84531bd0f4f964ee625a954579c5cee0a016b433f846598db088

                      • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\4ws2kncw.default-release\datareporting\glean\db\data.safe.bin

                        Filesize

                        6KB

                        MD5

                        83ff1f6ee084d4fa000c0cd6fe6bfc44

                        SHA1

                        e13f3692d2ed9c8557a2f14f5b1f42922725b5a8

                        SHA256

                        425b80a5c6ca90ef75504d22fee4a7010fec668a65f7cd2b9a887fab14545d7d

                        SHA512

                        0df8189e309b70af553c3ae5d4ffaa3982a5bedad13474cf48cf97ea3399853ad803f75a0d44a3ef9934ba677711e44fe9b71e81eb3fb421efe41642388c19b0

                      • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\4ws2kncw.default-release\datareporting\glean\db\data.safe.tmp

                        Filesize

                        15KB

                        MD5

                        aff9d545f331c6aca2faab023fd3f60e

                        SHA1

                        0974abcf40feb4d8f052996913d292095cc64d09

                        SHA256

                        083ae82db7c86e407a1a2e40a36dd9399bc564c19cd99cc9f5d83a7a0ec13ffa

                        SHA512

                        dcefeea66cd839b3dcf61ada689d45f5a3d134f005f2e1e0d190b4297fa6e233b2f8be88370a073234e86049d8bf3dcb892a145c96400595b4b0f55474ccb814

                      • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\4ws2kncw.default-release\datareporting\glean\db\data.safe.tmp

                        Filesize

                        6KB

                        MD5

                        cfe4d58433af497b45daa08d4b16b9cc

                        SHA1

                        a013cf09eacb052270acde04c50ce8bb778de74e

                        SHA256

                        f3b28f51e57bb9cc4f5b66fce764b1e7e5320e535d91ff9247af13e41810b843

                        SHA512

                        536ebc7037112ba6f94a4fe371ac344304949f7867caee3980fc2703e4057e23eda07fd8bb846e6550a5c594ba3a3ce8fc9604845214ae42baf3fde7e14c4f11

                      • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\4ws2kncw.default-release\datareporting\glean\db\data.safe.tmp

                        Filesize

                        15KB

                        MD5

                        71521927ac7ce6554ba57a8eac62c9dc

                        SHA1

                        acd017389a819b344fe054ab805bf62d9405b27d

                        SHA256

                        511e8cffb65db013b4ca66a7a167c078db7dd1951047f6351482abde155748e4

                        SHA512

                        f248c9304239e607fd31385f300368fa6a32f1bab6ff0b5501cf2f44b117a6215137a106c7f81f0464280913b7d1f9c711c1af17f3206b557e6eb671828f4dec

                      • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\4ws2kncw.default-release\datareporting\glean\db\data.safe.tmp

                        Filesize

                        5KB

                        MD5

                        017cd50ab14054e0329d6074d76ea740

                        SHA1

                        e57a5e39c68694617f329e8c4eaac7e3ca5db9d8

                        SHA256

                        54e01a253f1c819f1821bc100a75b322cd164724256dfcc4095b2329233c9583

                        SHA512

                        f557366897c77283a5d2ce6493c1f162c2448c6aa1b0ba317284251202589aa572ffcaa587a2f5ea3a6c22fb15d24954526609b086c1af3144f03c22ae2573dd

                      • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\4ws2kncw.default-release\datareporting\glean\pending_pings\a6541ccc-13e0-46d8-bccd-319d41cce22a

                        Filesize

                        671B

                        MD5

                        e889090d0159943bc7f6bef09fb618aa

                        SHA1

                        807e4934fe86f69808419c015461efe19f497571

                        SHA256

                        00ba56cb9bc028e5005730839f75632397eb079e41ffa8132cc76b596c4454b2

                        SHA512

                        60a2635580b87a63e150f1b29be43c5d10b83ce0fa8d1c564e53dafc8e8034d3c50419d0545e327941f229a83a22dba8758d28f9e4bf5d3211f3795ec0f1229d

                      • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\4ws2kncw.default-release\datareporting\glean\pending_pings\ca7e0635-cade-4e86-aabf-20aab0c10823

                        Filesize

                        28KB

                        MD5

                        11d8f183ed0b40d6ccce3afa4e834764

                        SHA1

                        5a30c451ae08df5831edd7d26a28d8210715859b

                        SHA256

                        8df5b3878c22708d97f70be0e6b5388d805c7426b6e0200ab9eb2abc2d2a0f69

                        SHA512

                        c1ad108b1bc24366548bae0c88afeb470d53388b6ce38763ce9a86eed3a9e8a335d866b30fc2455861cdd2b83613d2ade7273927cacb3023ab6cb2bfd573819b

                      • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\4ws2kncw.default-release\datareporting\glean\pending_pings\f0677a36-8bde-48b0-8029-9b23a5c03eb3

                        Filesize

                        982B

                        MD5

                        dc9ff444a14fefcdd4639d083a26a484

                        SHA1

                        882526a5cc4a733a5f8078e3edbd6fd52361ff23

                        SHA256

                        84c0f874ba6c7017bcc2c7621713864aa5f908a3e171312dc3ca5eb26198ff71

                        SHA512

                        d0010e0de770c43463c6a1203f43b5e33fb7535686cc7f8338e303b18deda7ec2ea0a492cfa0d7ae91135bc2cd5ab9a04d658f652dbc5b88bf86c1c59a2d978d

                      • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\4ws2kncw.default-release\gmp-gmpopenh264\2.3.2\gmpopenh264.dll

                        Filesize

                        1.1MB

                        MD5

                        842039753bf41fa5e11b3a1383061a87

                        SHA1

                        3e8fe1d7b3ad866b06dca6c7ef1e3c50c406e153

                        SHA256

                        d88dd3bfc4a558bb943f3caa2e376da3942e48a7948763bf9a38f707c2cd0c1c

                        SHA512

                        d3320f7ac46327b7b974e74320c4d853e569061cb89ca849cd5d1706330aca629abeb4a16435c541900d839f46ff72dfde04128c450f3e1ee63c025470c19157

                      • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\4ws2kncw.default-release\gmp-gmpopenh264\2.3.2\gmpopenh264.info

                        Filesize

                        116B

                        MD5

                        2a461e9eb87fd1955cea740a3444ee7a

                        SHA1

                        b10755914c713f5a4677494dbe8a686ed458c3c5

                        SHA256

                        4107f76ba1d9424555f4e8ea0acef69357dfff89dfa5f0ec72aa4f2d489b17bc

                        SHA512

                        34f73f7bf69d7674907f190f257516e3956f825e35a2f03d58201a5a630310b45df393f2b39669f9369d1ac990505a4b6849a0d34e8c136e1402143b6cedf2d3

                      • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\4ws2kncw.default-release\gmp-widevinecdm\4.10.2710.0\manifest.json

                        Filesize

                        372B

                        MD5

                        bf957ad58b55f64219ab3f793e374316

                        SHA1

                        a11adc9d7f2c28e04d9b35e23b7616d0527118a1

                        SHA256

                        bbab6ca07edbed72a966835c7907b3e60c7aa3d48ddea847e5076bd05f4b1eda

                        SHA512

                        79c179b56e4893fb729b225818ab4b95a50b69666ac41d17aad0b37ab0ca8cd9f0848cbc3c5d9e69e4640a8b261d7ced592eae9bcb0e0b63c05a56e7c477f44e

                      • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\4ws2kncw.default-release\gmp-widevinecdm\4.10.2710.0\widevinecdm.dll

                        Filesize

                        17.8MB

                        MD5

                        daf7ef3acccab478aaa7d6dc1c60f865

                        SHA1

                        f8246162b97ce4a945feced27b6ea114366ff2ad

                        SHA256

                        bc40c7821dcd3fea9923c6912ab1183a942c11b7690cfd79ed148ded0228777e

                        SHA512

                        5840a45cfdb12c005e117608b1e5d946e1b2e76443ed39ba940d7f56de4babeab09bee7e64b903eb82bb37624c0a0ef19e9b59fbe2ce2f0e0b1c7a6015a63f75

                      • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\4ws2kncw.default-release\prefs-1.js

                        Filesize

                        10KB

                        MD5

                        c595394efa07976eaaff3494613b34dc

                        SHA1

                        66b2f03381ccbced4c2ec4e431d708404e630305

                        SHA256

                        c64f77f34c56d0fa0f73d5776468d2830bba81bc75ccdf89f209a84ee1ded4c8

                        SHA512

                        e9f6237a29c8d1f76cff5f24a4585c3a39e803cebc5790129bcc835e6feef833a45acda965c296d74056ffbe720eb4c23a9409b01e85d0b4e140ca3f54911f6d

                      • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\4ws2kncw.default-release\prefs-1.js

                        Filesize

                        12KB

                        MD5

                        a62fd00134ec16b9a0d71485bad56609

                        SHA1

                        22d3cc6409499d652f3a6ebedf66a4e632ee760f

                        SHA256

                        ccfa7f255055b83a0326af205405384d204e1d1a7beb2727b8ccf1e50714f462

                        SHA512

                        981bd028997d02952e15c774bae418101442e0b9e09d66b0de924c2b2d45dbed18e9d9f2b85c3754c32f8bf8099f36325b8d53ec311c04b0b845f13b4641678a

                      • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\4ws2kncw.default-release\prefs-1.js

                        Filesize

                        15KB

                        MD5

                        8389ec6be3ae1e8d7df9fce0e1503644

                        SHA1

                        3d44a94d5e659826b5632e2f41ca8ac77aea7917

                        SHA256

                        7151244c7459d639a68475f6219536cf257aa8797a2372492f3d86d980c56277

                        SHA512

                        6f24df31a4e31d880ccf7d7f245284651cd0ed370f5b72fc53e1215e24cbd9b259ffdeb5934446dcb4c6bf61b2b01a64d883f7fa51e5e3607e3f9642e2dbba7f

                      • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\4ws2kncw.default-release\prefs.js

                        Filesize

                        11KB

                        MD5

                        d7ac0fc93030cc514dc5036be75ca780

                        SHA1

                        6bddadbc2664a625e207698f3da21407df7ecafd

                        SHA256

                        d6720ae7cac83ddb5219c7ce00afe375e0b3c8aa8ebd0218510625437ab74f77

                        SHA512

                        a5c30009fa6e3bdb53d3c29d82e1214fb59fdbaae5b2c7e3ff7f2229bb89d73cb9335db4813ab321978f61a83c021d296379321973dfb88bd8681ff716526b86

                      • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\4ws2kncw.default-release\storage\permanent\chrome\idb\3870112724rsegmnoittet-es.sqlite

                        Filesize

                        1.2MB

                        MD5

                        a3cee6a746055b2ab9822b766cc96b2c

                        SHA1

                        138c5b53e5929358f5bd610c636d916c9e09d814

                        SHA256

                        87f9d9ff7a3777b25fc51d0090d4bee00b090168aa2a97a51bbd6731fa930453

                        SHA512

                        9e303bef1e79259c41f5b46d4d659209b4e3b13f83937e9096df660e54e429fb8d0d2a746d36d8b264cad3fb121639130b0017d85287f3d8b877cba0fed753c9

                      • memory/388-3450-0x0000000000610000-0x0000000000932000-memory.dmp

                        Filesize

                        3.1MB

                      • memory/388-1456-0x0000000000610000-0x0000000000932000-memory.dmp

                        Filesize

                        3.1MB

                      • memory/388-3458-0x0000000000610000-0x0000000000932000-memory.dmp

                        Filesize

                        3.1MB

                      • memory/388-63-0x0000000000610000-0x0000000000932000-memory.dmp

                        Filesize

                        3.1MB

                      • memory/388-3453-0x0000000000610000-0x0000000000932000-memory.dmp

                        Filesize

                        3.1MB

                      • memory/388-3460-0x0000000000610000-0x0000000000932000-memory.dmp

                        Filesize

                        3.1MB

                      • memory/388-3136-0x0000000000610000-0x0000000000932000-memory.dmp

                        Filesize

                        3.1MB

                      • memory/388-41-0x0000000000610000-0x0000000000932000-memory.dmp

                        Filesize

                        3.1MB

                      • memory/388-65-0x0000000000610000-0x0000000000932000-memory.dmp

                        Filesize

                        3.1MB

                      • memory/388-3459-0x0000000000610000-0x0000000000932000-memory.dmp

                        Filesize

                        3.1MB

                      • memory/388-3461-0x0000000000610000-0x0000000000932000-memory.dmp

                        Filesize

                        3.1MB

                      • memory/388-877-0x0000000000610000-0x0000000000932000-memory.dmp

                        Filesize

                        3.1MB

                      • memory/388-3464-0x0000000000610000-0x0000000000932000-memory.dmp

                        Filesize

                        3.1MB

                      • memory/388-118-0x0000000000610000-0x0000000000932000-memory.dmp

                        Filesize

                        3.1MB

                      • memory/388-893-0x0000000000610000-0x0000000000932000-memory.dmp

                        Filesize

                        3.1MB

                      • memory/2128-99-0x00000000009D0000-0x00000000010E8000-memory.dmp

                        Filesize

                        7.1MB

                      • memory/2128-97-0x00000000009D0000-0x00000000010E8000-memory.dmp

                        Filesize

                        7.1MB

                      • memory/2376-28-0x0000000000300000-0x0000000000622000-memory.dmp

                        Filesize

                        3.1MB

                      • memory/2376-42-0x0000000000300000-0x0000000000622000-memory.dmp

                        Filesize

                        3.1MB

                      • memory/2388-25-0x0000000000670000-0x0000000000D90000-memory.dmp

                        Filesize

                        7.1MB

                      • memory/2388-23-0x0000000000670000-0x0000000000D90000-memory.dmp

                        Filesize

                        7.1MB

                      • memory/4044-64-0x00000000001A0000-0x00000000004AB000-memory.dmp

                        Filesize

                        3.0MB

                      • memory/4044-59-0x00000000001A0000-0x00000000004AB000-memory.dmp

                        Filesize

                        3.0MB

                      • memory/4124-82-0x0000000000B60000-0x0000000000E76000-memory.dmp

                        Filesize

                        3.1MB

                      • memory/4124-81-0x0000000000B60000-0x0000000000E76000-memory.dmp

                        Filesize

                        3.1MB

                      • memory/4624-62-0x0000000000610000-0x0000000000932000-memory.dmp

                        Filesize

                        3.1MB

                      • memory/4624-61-0x0000000000610000-0x0000000000932000-memory.dmp

                        Filesize

                        3.1MB

                      • memory/5040-16-0x0000000000501000-0x0000000000529000-memory.dmp

                        Filesize

                        160KB

                      • memory/5040-14-0x0000000000500000-0x0000000000806000-memory.dmp

                        Filesize

                        3.0MB

                      • memory/5040-15-0x0000000077064000-0x0000000077066000-memory.dmp

                        Filesize

                        8KB

                      • memory/5040-17-0x0000000000500000-0x0000000000806000-memory.dmp

                        Filesize

                        3.0MB

                      • memory/5040-18-0x0000000000500000-0x0000000000806000-memory.dmp

                        Filesize

                        3.0MB

                      • memory/5040-20-0x0000000000500000-0x0000000000806000-memory.dmp

                        Filesize

                        3.0MB

                      • memory/5240-818-0x0000000000BF0000-0x0000000000EB2000-memory.dmp

                        Filesize

                        2.8MB

                      • memory/5240-819-0x0000000000BF0000-0x0000000000EB2000-memory.dmp

                        Filesize

                        2.8MB

                      • memory/5240-885-0x0000000000BF0000-0x0000000000EB2000-memory.dmp

                        Filesize

                        2.8MB

                      • memory/5240-781-0x0000000000BF0000-0x0000000000EB2000-memory.dmp

                        Filesize

                        2.8MB

                      • memory/5240-888-0x0000000000BF0000-0x0000000000EB2000-memory.dmp

                        Filesize

                        2.8MB

                      • memory/6324-3463-0x0000000000610000-0x0000000000932000-memory.dmp

                        Filesize

                        3.1MB

                      • memory/6636-3449-0x0000000000610000-0x0000000000932000-memory.dmp

                        Filesize

                        3.1MB