Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    148s
  • max time network
    149s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20241007-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system
  • submitted
    07/11/2024, 03:02

General

  • Target

    1b7da4409b7936bdb02e213a8c31642f59738604f673c3725fe14597ce0423b9.exe

  • Size

    6.0MB

  • MD5

    b821c29918dec77b5a3da73d613bb833

  • SHA1

    fc5916883c3d0622e1cd546d1e05c221a4df331f

  • SHA256

    1b7da4409b7936bdb02e213a8c31642f59738604f673c3725fe14597ce0423b9

  • SHA512

    5256519b959c5f541622c0136ded2a261f60fe80cb6366cdf35a4db165bf441a2e7f529a598a927ae36c28b20b78c8602b3389730e99d69eed8d941721d2280a

  • SSDEEP

    98304:XdBMpxqdqBTrP3sjv8rrDk2a4i3K0pwskECQi97YqVPEi3axcxSF/P1r8a2Lz6U8:XdGY6Tr//f4nTwsk90qVciKKSW6

Malware Config

Extracted

Family

amadey

Version

4.42

Botnet

9c9aa5

C2

http://185.215.113.43

Attributes
  • install_dir

    abc3bc1985

  • install_file

    skotes.exe

  • strings_key

    8a35cf2ea38c2817dba29a4b5b25dcf0

  • url_paths

    /Zu7JuNko/index.php

rc4.plain

Extracted

Family

stealc

Botnet

tale

C2

http://185.215.113.206

Attributes
  • url_path

    /6c4adf523b719729.php

Extracted

Family

lumma

C2

https://founpiuer.store/api

Signatures

  • Amadey

    Amadey bot is a simple trojan bot primarily used for collecting reconnaissance information.

  • Amadey family
  • Lumma Stealer, LummaC

    Lumma or LummaC is an infostealer written in C++ first seen in August 2022.

  • Lumma family
  • Modifies Windows Defender Real-time Protection settings 3 TTPs 6 IoCs
  • Stealc

    Stealc is an infostealer written in C++.

  • Stealc family
  • Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs 9 IoCs
  • Downloads MZ/PE file
  • Checks BIOS information in registry 2 TTPs 18 IoCs

    BIOS information is often read in order to detect sandboxing environments.

  • Checks computer location settings 2 TTPs 2 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Executes dropped EXE 12 IoCs
  • Identifies Wine through registry keys 2 TTPs 9 IoCs

    Wine is a compatibility layer capable of running Windows applications, which can be used as sandboxing environment.

  • Windows security modification 2 TTPs 2 IoCs
  • Adds Run key to start application 2 TTPs 6 IoCs
  • AutoIT Executable 1 IoCs

    AutoIT scripts compiled to PE executables.

  • Suspicious use of NtSetInformationThreadHideFromDebugger 9 IoCs
  • Drops file in Windows directory 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Program crash 6 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 16 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Checks processor information in registry 2 TTPs 8 IoCs

    Processor information is often read in order to detect sandboxing environments.

  • Kills process with taskkill 5 IoCs
  • Modifies registry class 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 25 IoCs
  • Suspicious use of AdjustPrivilegeToken 8 IoCs
  • Suspicious use of FindShellTrayWindow 33 IoCs
  • Suspicious use of SendNotifyMessage 31 IoCs
  • Suspicious use of SetWindowsHookEx 1 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs
  • Uses Task Scheduler COM API 1 TTPs

    The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.

Processes

  • C:\Users\Admin\AppData\Local\Temp\1b7da4409b7936bdb02e213a8c31642f59738604f673c3725fe14597ce0423b9.exe
    "C:\Users\Admin\AppData\Local\Temp\1b7da4409b7936bdb02e213a8c31642f59738604f673c3725fe14597ce0423b9.exe"
    1⤵
    • Adds Run key to start application
    • System Location Discovery: System Language Discovery
    • Suspicious use of WriteProcessMemory
    PID:3116
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\z3c95.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\z3c95.exe
      2⤵
      • Executes dropped EXE
      • Adds Run key to start application
      • System Location Discovery: System Language Discovery
      • Suspicious use of WriteProcessMemory
      PID:5064
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\Y4e01.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\Y4e01.exe
        3⤵
        • Executes dropped EXE
        • Adds Run key to start application
        • System Location Discovery: System Language Discovery
        • Suspicious use of WriteProcessMemory
        PID:3488
        • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\1o75e9.exe
          C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\1o75e9.exe
          4⤵
          • Identifies VirtualBox via ACPI registry values (likely anti-VM)
          • Checks BIOS information in registry
          • Checks computer location settings
          • Executes dropped EXE
          • Identifies Wine through registry keys
          • Suspicious use of NtSetInformationThreadHideFromDebugger
          • Drops file in Windows directory
          • System Location Discovery: System Language Discovery
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of FindShellTrayWindow
          • Suspicious use of WriteProcessMemory
          PID:4476
          • C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe
            "C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe"
            5⤵
            • Identifies VirtualBox via ACPI registry values (likely anti-VM)
            • Checks BIOS information in registry
            • Checks computer location settings
            • Executes dropped EXE
            • Identifies Wine through registry keys
            • Adds Run key to start application
            • Suspicious use of NtSetInformationThreadHideFromDebugger
            • System Location Discovery: System Language Discovery
            • Suspicious behavior: EnumeratesProcesses
            • Suspicious use of WriteProcessMemory
            PID:5108
            • C:\Users\Admin\AppData\Local\Temp\1004511001\d3aa356448.exe
              "C:\Users\Admin\AppData\Local\Temp\1004511001\d3aa356448.exe"
              6⤵
              • Identifies VirtualBox via ACPI registry values (likely anti-VM)
              • Checks BIOS information in registry
              • Executes dropped EXE
              • Identifies Wine through registry keys
              • Suspicious use of NtSetInformationThreadHideFromDebugger
              • System Location Discovery: System Language Discovery
              • Suspicious behavior: EnumeratesProcesses
              PID:2404
              • C:\Windows\SysWOW64\WerFault.exe
                C:\Windows\SysWOW64\WerFault.exe -u -p 2404 -s 1588
                7⤵
                • Program crash
                PID:4264
              • C:\Windows\SysWOW64\WerFault.exe
                C:\Windows\SysWOW64\WerFault.exe -u -p 2404 -s 1568
                7⤵
                • Program crash
                PID:2692
            • C:\Users\Admin\AppData\Local\Temp\1004512001\daa059a175.exe
              "C:\Users\Admin\AppData\Local\Temp\1004512001\daa059a175.exe"
              6⤵
              • Identifies VirtualBox via ACPI registry values (likely anti-VM)
              • Checks BIOS information in registry
              • Executes dropped EXE
              • Identifies Wine through registry keys
              • Suspicious use of NtSetInformationThreadHideFromDebugger
              • System Location Discovery: System Language Discovery
              • Suspicious behavior: EnumeratesProcesses
              PID:4940
            • C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe
              "C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe"
              6⤵
                PID:4848
              • C:\Users\Admin\AppData\Local\Temp\1004514001\8d776ac4ee.exe
                "C:\Users\Admin\AppData\Local\Temp\1004514001\8d776ac4ee.exe"
                6⤵
                • Modifies Windows Defender Real-time Protection settings
                • Identifies VirtualBox via ACPI registry values (likely anti-VM)
                • Checks BIOS information in registry
                • Executes dropped EXE
                • Identifies Wine through registry keys
                • Windows security modification
                • Suspicious use of NtSetInformationThreadHideFromDebugger
                • System Location Discovery: System Language Discovery
                • Suspicious behavior: EnumeratesProcesses
                • Suspicious use of AdjustPrivilegeToken
                PID:1112
          • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\2w4515.exe
            C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\2w4515.exe
            4⤵
            • Identifies VirtualBox via ACPI registry values (likely anti-VM)
            • Checks BIOS information in registry
            • Executes dropped EXE
            • Identifies Wine through registry keys
            • Suspicious use of NtSetInformationThreadHideFromDebugger
            • System Location Discovery: System Language Discovery
            • Suspicious behavior: EnumeratesProcesses
            PID:3744
            • C:\Windows\SysWOW64\WerFault.exe
              C:\Windows\SysWOW64\WerFault.exe -u -p 3744 -s 1612
              5⤵
              • Program crash
              PID:372
            • C:\Windows\SysWOW64\WerFault.exe
              C:\Windows\SysWOW64\WerFault.exe -u -p 3744 -s 1604
              5⤵
              • Program crash
              PID:3980
            • C:\Windows\SysWOW64\WerFault.exe
              C:\Windows\SysWOW64\WerFault.exe -u -p 3744 -s 1612
              5⤵
              • Program crash
              PID:4212
            • C:\Windows\SysWOW64\WerFault.exe
              C:\Windows\SysWOW64\WerFault.exe -u -p 3744 -s 1692
              5⤵
              • Program crash
              PID:1136
        • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\3Z45b.exe
          C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\3Z45b.exe
          3⤵
          • Identifies VirtualBox via ACPI registry values (likely anti-VM)
          • Checks BIOS information in registry
          • Executes dropped EXE
          • Identifies Wine through registry keys
          • Suspicious use of NtSetInformationThreadHideFromDebugger
          • System Location Discovery: System Language Discovery
          • Suspicious behavior: EnumeratesProcesses
          PID:1616
      • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\4J955a.exe
        C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\4J955a.exe
        2⤵
        • Executes dropped EXE
        • System Location Discovery: System Language Discovery
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of FindShellTrayWindow
        • Suspicious use of SendNotifyMessage
        • Suspicious use of WriteProcessMemory
        PID:4952
        • C:\Windows\SysWOW64\taskkill.exe
          taskkill /F /IM firefox.exe /T
          3⤵
          • System Location Discovery: System Language Discovery
          • Kills process with taskkill
          • Suspicious use of AdjustPrivilegeToken
          PID:2700
        • C:\Windows\SysWOW64\taskkill.exe
          taskkill /F /IM chrome.exe /T
          3⤵
          • System Location Discovery: System Language Discovery
          • Kills process with taskkill
          • Suspicious use of AdjustPrivilegeToken
          PID:5028
        • C:\Windows\SysWOW64\taskkill.exe
          taskkill /F /IM msedge.exe /T
          3⤵
          • System Location Discovery: System Language Discovery
          • Kills process with taskkill
          • Suspicious use of AdjustPrivilegeToken
          PID:5056
        • C:\Windows\SysWOW64\taskkill.exe
          taskkill /F /IM opera.exe /T
          3⤵
          • System Location Discovery: System Language Discovery
          • Kills process with taskkill
          • Suspicious use of AdjustPrivilegeToken
          PID:4252
        • C:\Windows\SysWOW64\taskkill.exe
          taskkill /F /IM brave.exe /T
          3⤵
          • System Location Discovery: System Language Discovery
          • Kills process with taskkill
          • Suspicious use of AdjustPrivilegeToken
          PID:640
        • C:\Program Files\Mozilla Firefox\firefox.exe
          "C:\Program Files\Mozilla Firefox\firefox.exe" --kiosk "https://youtube.com/account?=https://accounts.google.com/v3/signin/challenge/pwd" --no-default-browser-check --disable-popup-blocking
          3⤵
          • Suspicious use of WriteProcessMemory
          PID:1520
          • C:\Program Files\Mozilla Firefox\firefox.exe
            "C:\Program Files\Mozilla Firefox\firefox.exe" --kiosk https://youtube.com/account?=https://accounts.google.com/v3/signin/challenge/pwd --no-default-browser-check --disable-popup-blocking
            4⤵
            • Checks processor information in registry
            • Modifies registry class
            • Suspicious use of AdjustPrivilegeToken
            • Suspicious use of FindShellTrayWindow
            • Suspicious use of SendNotifyMessage
            • Suspicious use of SetWindowsHookEx
            • Suspicious use of WriteProcessMemory
            PID:4356
            • C:\Program Files\Mozilla Firefox\firefox.exe
              "C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=2060 -parentBuildID 20240401114208 -prefsHandle 1984 -prefMapHandle 1976 -prefsLen 23680 -prefMapSize 244658 -appDir "C:\Program Files\Mozilla Firefox\browser" - {c360c3a0-db1d-4afc-9b6f-61a7c73ff0c0} 4356 "\\.\pipe\gecko-crash-server-pipe.4356" gpu
              5⤵
                PID:2952
              • C:\Program Files\Mozilla Firefox\firefox.exe
                "C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=2488 -parentBuildID 20240401114208 -prefsHandle 2472 -prefMapHandle 2468 -prefsLen 24600 -prefMapSize 244658 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {d2db2bf7-dcf9-457a-bea7-74ad8a5d8f85} 4356 "\\.\pipe\gecko-crash-server-pipe.4356" socket
                5⤵
                  PID:2580
                • C:\Program Files\Mozilla Firefox\firefox.exe
                  "C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=2864 -childID 1 -isForBrowser -prefsHandle 3036 -prefMapHandle 3116 -prefsLen 22652 -prefMapSize 244658 -jsInitHandle 936 -jsInitLen 234952 -parentBuildID 20240401114208 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {33517b31-9dfd-4c28-9d76-7a1d672ae717} 4356 "\\.\pipe\gecko-crash-server-pipe.4356" tab
                  5⤵
                    PID:3576
                  • C:\Program Files\Mozilla Firefox\firefox.exe
                    "C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=4012 -childID 2 -isForBrowser -prefsHandle 3996 -prefMapHandle 2776 -prefsLen 29090 -prefMapSize 244658 -jsInitHandle 936 -jsInitLen 234952 -parentBuildID 20240401114208 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {388bb376-32fa-4f7e-a52d-7d3ae5acd294} 4356 "\\.\pipe\gecko-crash-server-pipe.4356" tab
                    5⤵
                      PID:4208
                    • C:\Program Files\Mozilla Firefox\firefox.exe
                      "C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=3992 -parentBuildID 20240401114208 -sandboxingKind 0 -prefsHandle 4772 -prefMapHandle 4180 -prefsLen 29090 -prefMapSize 244658 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {2a9ca3df-1cf8-4f78-8e9b-6bf233a95cda} 4356 "\\.\pipe\gecko-crash-server-pipe.4356" utility
                      5⤵
                      • Checks processor information in registry
                      PID:4360
                    • C:\Program Files\Mozilla Firefox\firefox.exe
                      "C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=5592 -childID 3 -isForBrowser -prefsHandle 4820 -prefMapHandle 5544 -prefsLen 27132 -prefMapSize 244658 -jsInitHandle 936 -jsInitLen 234952 -parentBuildID 20240401114208 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {d97f2605-1e21-4cb3-b93c-7da097ca20d8} 4356 "\\.\pipe\gecko-crash-server-pipe.4356" tab
                      5⤵
                        PID:3848
                      • C:\Program Files\Mozilla Firefox\firefox.exe
                        "C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=5692 -childID 4 -isForBrowser -prefsHandle 5656 -prefMapHandle 4796 -prefsLen 27132 -prefMapSize 244658 -jsInitHandle 936 -jsInitLen 234952 -parentBuildID 20240401114208 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {7a2f872f-f88d-48e3-adf4-adc2a15f2cc7} 4356 "\\.\pipe\gecko-crash-server-pipe.4356" tab
                        5⤵
                          PID:6140
                        • C:\Program Files\Mozilla Firefox\firefox.exe
                          "C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=5868 -childID 5 -isForBrowser -prefsHandle 5876 -prefMapHandle 5880 -prefsLen 27132 -prefMapSize 244658 -jsInitHandle 936 -jsInitLen 234952 -parentBuildID 20240401114208 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {fe56f6fa-fdf5-450f-8406-befc463e2758} 4356 "\\.\pipe\gecko-crash-server-pipe.4356" tab
                          5⤵
                            PID:5236
                  • C:\Windows\SysWOW64\WerFault.exe
                    C:\Windows\SysWOW64\WerFault.exe -pss -s 448 -p 3744 -ip 3744
                    1⤵
                      PID:1956
                    • C:\Windows\SysWOW64\WerFault.exe
                      C:\Windows\SysWOW64\WerFault.exe -pss -s 412 -p 3744 -ip 3744
                      1⤵
                        PID:3828
                      • C:\Windows\SysWOW64\WerFault.exe
                        C:\Windows\SysWOW64\WerFault.exe -pss -s 516 -p 2404 -ip 2404
                        1⤵
                          PID:2644
                        • C:\Windows\SysWOW64\WerFault.exe
                          C:\Windows\SysWOW64\WerFault.exe -pss -s 492 -p 2404 -ip 2404
                          1⤵
                            PID:2348
                          • C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe
                            C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe
                            1⤵
                            • Identifies VirtualBox via ACPI registry values (likely anti-VM)
                            • Checks BIOS information in registry
                            • Executes dropped EXE
                            • Identifies Wine through registry keys
                            • Suspicious use of NtSetInformationThreadHideFromDebugger
                            • Suspicious behavior: EnumeratesProcesses
                            PID:2444
                          • C:\Windows\SysWOW64\WerFault.exe
                            C:\Windows\SysWOW64\WerFault.exe -pss -s 572 -p 3744 -ip 3744
                            1⤵
                              PID:3964
                            • C:\Windows\SysWOW64\WerFault.exe
                              C:\Windows\SysWOW64\WerFault.exe -pss -s 484 -p 3744 -ip 3744
                              1⤵
                                PID:3044
                              • C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe
                                C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe
                                1⤵
                                • Identifies VirtualBox via ACPI registry values (likely anti-VM)
                                • Checks BIOS information in registry
                                • Executes dropped EXE
                                • Identifies Wine through registry keys
                                • Suspicious use of NtSetInformationThreadHideFromDebugger
                                • Suspicious behavior: EnumeratesProcesses
                                PID:7148

                              Network

                              MITRE ATT&CK Enterprise v15

                              Replay Monitor

                              Loading Replay Monitor...

                              Downloads

                              • C:\Users\Admin\AppData\Local\Mozilla\Firefox\Profiles\g9per00b.default-release\activity-stream.discovery_stream.json

                                Filesize

                                24KB

                                MD5

                                5f40ca4f2874bf87823af20eaaca6478

                                SHA1

                                51628bd9c60c1cf17c667d025d0a63098b505b2d

                                SHA256

                                a497e51de0aa1dfc7e347bd21ec818fc9b8c0590774b2da6294a37817037abfa

                                SHA512

                                9971e9d69c2ac00e5da65262ccab8adc7fa091db8faf7b9e204ba9ea4ee301a6d6f790d603692f61a0675c28798440b35d6078f5c5cb1b856eb442b45d2c58e0

                              • C:\Users\Admin\AppData\Local\Mozilla\Firefox\Profiles\g9per00b.default-release\cache2\entries\D500AD994A7515157BB2A6ADD5B18B754E4D2F99

                                Filesize

                                13KB

                                MD5

                                7ea49f05d48bec27af59e948867f42fd

                                SHA1

                                54cc473a04ae65a163a01d3861526acaf5442eaf

                                SHA256

                                9d609bfb8ec70268092bb51719cf2515b46169054f7e95d794275bb191fdf8df

                                SHA512

                                ef9b572b4cb25da5cfc9e8e9ac41b223bcd2dcc3f73c5317373dbd06e4d5ad7404d1f54a28cb0111471f746fe2dc50e0bf387b097f947587a7a91f6e490b8092

                              • C:\Users\Admin\AppData\Local\Temp\1004511001\d3aa356448.exe

                                Filesize

                                3.0MB

                                MD5

                                a17f03daddf4ffd5b038f13ca94cca7d

                                SHA1

                                ba20321c4f47082502dadddec7a70769c21e253a

                                SHA256

                                4149dded7fd91b0eca160fff8d1e48d81bd206ef719bd54d1d5f86bc023eb4f9

                                SHA512

                                7a4d981c68e5be25078a18ae2844c1842c491f93137b7b3037a3ae2af9dd1074ce37f33bcf79c7bb9e47eb83a3ceb595918171f09039c2d1d398e7d892479a54

                              • C:\Users\Admin\AppData\Local\Temp\1004512001\daa059a175.exe

                                Filesize

                                2.1MB

                                MD5

                                d21a2eb1558c04af68aa39932c381a77

                                SHA1

                                8a1c7f2c06fcf55ccdfb8155a2aa2ec94cb8c5bb

                                SHA256

                                ba62e9e2f8ace5672fbc814db0b5fbd5a2d0a5d2d8ef55fd359e91ac756b4bbc

                                SHA512

                                bffa84774f7857c827702c1f21619f55e4fe7b8fab650b1e8598ab5d5c327b9ddf80724a3be0acb605c5e177b330830276c59e999754fc28809f1781feba2fc7

                              • C:\Users\Admin\AppData\Local\Temp\1004514001\8d776ac4ee.exe

                                Filesize

                                2.6MB

                                MD5

                                941e61557ef13f76a606c961a64ed6ab

                                SHA1

                                4e95ec0b08c384f4c9752b21df3a50c1a049d00a

                                SHA256

                                a9f670416324be30fb1ebf3aceb1d7874624461fd3cd7fb094bf8ec917a9720f

                                SHA512

                                7f804f2dcbb3f8ae209bdddea61259a5c94648661c29f44a6425cd89fcd4ab93f2550a0f05558dfa6071cfd2ebf9831b42e19d967a76f12fbdda62df68d323c3

                              • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\4J955a.exe

                                Filesize

                                898KB

                                MD5

                                64ad9ef8dcac308f74eefef859c797e9

                                SHA1

                                50e9852b733e233cffb9e7a28e1d7240cc197f8c

                                SHA256

                                f776a56670e3a59f7392fd42dda4d72a5de85aefc1bbc30c603dbd2916dc9a18

                                SHA512

                                82f180f36cd44519d7014fc19ad0ebc184c4077c370b4923feec2946af722fa8fcbb2a9892a5d2f39dc584c28aab6c8846d8aee6898f8d50776205226b80135d

                              • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\z3c95.exe

                                Filesize

                                5.5MB

                                MD5

                                42070ffad8aa29b730d00882411370a6

                                SHA1

                                c186d886387a3218935eae4d21f3162f4f3f13f9

                                SHA256

                                e43a9168e3d99f3a8df9cd9bec868e0825d20712b02e06fbe5f12d05d31718de

                                SHA512

                                ea661c6d0fc88b5ca64e0fa6f46207dfba2b104bbfe9e9e01c4bd00b8f8fa5d4f56529dfce734729333841f72ecab8b1f5e70f657b8a46ac834e461e40e925de

                              • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\3Z45b.exe

                                Filesize

                                2.0MB

                                MD5

                                5c656fca21313b706060727ffe93f6bb

                                SHA1

                                481b192814532355b6e2045091ee300f307349e8

                                SHA256

                                bfcf6c46d64eb87be63df45a15ff9c2a89bd66af62942756ec4dbd45cdfe6ebd

                                SHA512

                                a7035a9bfb230ed1621dfabcfa43ee07b62e95b82858f2cac1bdaba16c5654574f5af0f445082d5ba6695bc5734a8e0d99d05a810ba27344ec0fe709e20cd589

                              • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\Y4e01.exe

                                Filesize

                                3.4MB

                                MD5

                                a60cee17959dcac2524b4d90658355df

                                SHA1

                                97190824d32abce3817efb9318dd8dcdb83d5160

                                SHA256

                                a259cc538fa7e761822a8145b28dbc78bac3f50ff95ce74bd57391d72c46b923

                                SHA512

                                7d28ff316a4f357c51565a31fc58773f3b8acc2e24334a095cd42fe834654bf644764f9b4edb1c03599883099bd3beb6c30b1e98656e86a9ec6b8a16fa424e56

                              • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\1o75e9.exe

                                Filesize

                                3.2MB

                                MD5

                                6f213f2f520f485c1c32fd6bcf6481f1

                                SHA1

                                41c95b88aafa1698829b61e6bfb2aac933c7a73c

                                SHA256

                                de1ef71fb0bca243198ae1dc1c0a18247656737d532a5c885cee5dd224e43aa4

                                SHA512

                                1e5cc7a0601fa491a8ee9340f52321f24168dd0f75d9df7903958a869b768a66108dc9d118b7824475b0e53d81dd08f69e583226d19cbaba70adcb1ef41901d3

                              • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\2w4515.exe

                                Filesize

                                3.0MB

                                MD5

                                8cf8b11e1553e2381b0c2376d013e951

                                SHA1

                                33d8bc52fe1fc709ee086a5a84d39024b6e2db92

                                SHA256

                                d3ea3d360b4e4c6bc1da5adbd8c8bbe689b0541166e2a77dac821517be81de98

                                SHA512

                                a876d770734998f8397efea36c94bf7b61d14aa317f4b9e62b95333171068b626ebe2336c6fefc3a0f02f16b454df5c852b9fe4cbb3af59fe1d11ae2f77303a4

                              • C:\Users\Admin\AppData\Local\Temp\tmpaddon

                                Filesize

                                479KB

                                MD5

                                09372174e83dbbf696ee732fd2e875bb

                                SHA1

                                ba360186ba650a769f9303f48b7200fb5eaccee1

                                SHA256

                                c32efac42faf4b9878fb8917c5e71d89ff40de580c4f52f62e11c6cfab55167f

                                SHA512

                                b667086ed49579592d435df2b486fe30ba1b62ddd169f19e700cd079239747dd3e20058c285fa9c10a533e34f22b5198ed9b1f92ae560a3067f3e3feacc724f1

                              • C:\Users\Admin\AppData\Local\Temp\tmpaddon-1

                                Filesize

                                13.8MB

                                MD5

                                0a8747a2ac9ac08ae9508f36c6d75692

                                SHA1

                                b287a96fd6cc12433adb42193dfe06111c38eaf0

                                SHA256

                                32d544baf2facc893057a1d97db33207e642f0dacf235d8500a0b5eff934ce03

                                SHA512

                                59521f8c61236641b3299ab460c58c8f5f26fa67e828de853c2cf372f9614d58b9f541aae325b1600ec4f3a47953caacb8122b0dfce7481acfec81045735947d

                              • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\g9per00b.default-release\AlternateServices.bin

                                Filesize

                                6KB

                                MD5

                                acf465906d5a7d6bc78d20f2628628da

                                SHA1

                                47aa26b754cd001e7f8a78b5f06a312abb660186

                                SHA256

                                c2d8655810a6ca2d0dc6fda3218e2ea5f10d08a5d69e2bd1fcbabb6d15964662

                                SHA512

                                7804e7ef8c265a775281bb9f017393dd5390428074160be04300012eefa3ff9bee57a53687b5da3a34a0bf2d13df642eca503fd408ac77c86e5fe5db225aab23

                              • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\g9per00b.default-release\AlternateServices.bin

                                Filesize

                                8KB

                                MD5

                                a0e77f7bc9343e215df36f532f000751

                                SHA1

                                2c1ce95d954c2fded0380f9927061f163c344998

                                SHA256

                                7aceb6694fcb3a450c63b0b679ae0e87f5276ef5d2bc2bfb01241889064c61e9

                                SHA512

                                331ecd2dcbf862f061fd618a204f8d15dc0fdc2d577f36a993dc8d826b446a5f27c6f2369b60378d41919ff1c74f8c42294da3be24dc47dc5342628c8886f925

                              • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\g9per00b.default-release\datareporting\glean\db\data.safe.bin

                                Filesize

                                24KB

                                MD5

                                396f058f7cba1ce16d7a42ccf7452011

                                SHA1

                                64b75ea8a7e4726c61b4d3469bb28e75a4bc0380

                                SHA256

                                3ee16d276e991f3e253819cac41720e3287c9b00b4329a1b7832ffb947ec73e5

                                SHA512

                                718228b3f4a5cfd3cda191bcd2d472bbe0a68271723038b40fc02e967acb7aa52b6b98622c07cd6f818b276bf98377e640d6546b8130bf46a1184833ddb715d4

                              • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\g9per00b.default-release\datareporting\glean\db\data.safe.bin

                                Filesize

                                25KB

                                MD5

                                f97512482297fa17b99b09e35667f69f

                                SHA1

                                401e57cad533067e4b7e422c2afb00283c290af2

                                SHA256

                                2678d99ca4ff09bbc37fd63f55d46b71092436d05dd766b09c2eaa778e48d2df

                                SHA512

                                9b6915f902a73e1866a3d7ecdd831a80f6159e0e4263c2050786dc162e5e91669e3d4b2b50c5d590661066ac614864759c37e9c30328f3a45b18e6b656958ade

                              • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\g9per00b.default-release\datareporting\glean\db\data.safe.bin

                                Filesize

                                26KB

                                MD5

                                0426a8fdf22de6f77dcf022253c8db96

                                SHA1

                                1952e3e75bcf6ed96058fdfaccc0f37f843f7993

                                SHA256

                                13d76b8f667a9adabc641b292d3e962fca4735387a566f85d5cde952d8ac3b46

                                SHA512

                                a3aff9af364488a220fc9a828d67ad21d73e64b160615bcd568843c7737304dca1c566bef3350d65f58b7fd650004762a2e6c05030ce3d8a2b8aedba8aa8674a

                              • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\g9per00b.default-release\datareporting\glean\db\data.safe.bin

                                Filesize

                                23KB

                                MD5

                                865168378033543e6ab2827d06fdbc16

                                SHA1

                                a4b73f0148ccf663d2939d08ae920767ade6b934

                                SHA256

                                7aebd2e608866d21805d9462c13dba8e05f2688ccdb0f476a9a88c54b520b5e7

                                SHA512

                                35591afdbec4cee69d35ff9151b8956a1a253ebfb9d417317cf509882b1cf7e907445da16759b2b6a4eb8720eea15b07fd3790d706f1fef45decc2674b0731a7

                              • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\g9per00b.default-release\datareporting\glean\db\data.safe.tmp

                                Filesize

                                23KB

                                MD5

                                7429c923a171c7d58a28f864c49fad3f

                                SHA1

                                cd8095b69ab4e4907ada190f7f49ced439eebf45

                                SHA256

                                d87eec4ce465988309df3878e7d1c6d25515de2961ed4174f6e63e6b37368850

                                SHA512

                                fc45d67a66b54d0b873a534f2d3f2061217a9a608e55ffcda08a6174802fc92598ac595ee7c4d5062ac7c03d2ca65244955e0f8d2813107d25d2c11d3d45bcbd

                              • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\g9per00b.default-release\datareporting\glean\db\data.safe.tmp

                                Filesize

                                23KB

                                MD5

                                3916676c8bb97af6593806a13675fae3

                                SHA1

                                d37299af8f8a5538f2e22903ace404ddc65106fb

                                SHA256

                                41f6f42b65fcfc43a9859304061ed845987d00f298e89c4f76bb2e34fe08f559

                                SHA512

                                66f9cdca523a7cc4e2694070ad2e548fe46d65599ebb687e0376d73ae3f4264f31753ef51ca995bd6ac768e1373af60636d9a50882670851a5e729a4b7629990

                              • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\g9per00b.default-release\datareporting\glean\db\data.safe.tmp

                                Filesize

                                26KB

                                MD5

                                0435e00daff504c4c800131f94c0b3cd

                                SHA1

                                447387d277ce63a8b1e0d21b2de34d2875aa6ff0

                                SHA256

                                769fbca0d8798a142903de5e4508c749edebcc66d8362830eb86ca4cf4a26de0

                                SHA512

                                99a1b07dbc877e2da6276c5b562ed6541e3bdf7b9663c955123a949750e61d0b0bdec597b49987a1af6cbe2c947c3e09a5a47484f150fb89358cfb15f506a25b

                              • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\g9per00b.default-release\datareporting\glean\db\data.safe.tmp

                                Filesize

                                26KB

                                MD5

                                b7eabc0e72c4954e9d0305136c40df1f

                                SHA1

                                24ff75cc2294e1d3c94a3b0c68497c5dac5ade2d

                                SHA256

                                a66457834f1bc8e91ddc486108b3cf1390c4b0d6714016cc2d2e619c1ac62710

                                SHA512

                                0465329bdf1dfdbad20586b1c37587aef16a4101b9eb950220a015f482c505f00310b5f77db42b2a1898a2033510bd66b62056c60abb60bd62c0e483f1143079

                              • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\g9per00b.default-release\datareporting\glean\pending_pings\04076026-30cf-4a0d-a799-01a17fcdcb4c

                                Filesize

                                659B

                                MD5

                                2263e5ec3cc02792a7b8cd083536ea2b

                                SHA1

                                c6848ea6ecc59217f0e882ef18b187661ebe91b8

                                SHA256

                                19890b45c9ac9df8613d249f9faf8dfcd80549adbb22ff747181353b341569f5

                                SHA512

                                db247b4db02543dafbb8d1289007801a2e13a0f9acf69d9b3ae14c864bfe28198e73c94fad531edbbcd91e1cb73bb04b90480634a28312e30c009fbe9ae368c7

                              • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\g9per00b.default-release\datareporting\glean\pending_pings\1f4b82cc-933e-4d82-a2a7-9de29860a989

                                Filesize

                                982B

                                MD5

                                9c2efdf8a1795aed0a92d401b8ccf063

                                SHA1

                                1742e396c47e9e91f1c11cd88d9427e975b2497e

                                SHA256

                                6f650c8ea8c0cbdcad0df98b03cebc17755baa248f143e36d8b2944cdfb37564

                                SHA512

                                0fb0d93f9361e852e12ac42eae6bcc98c1da94f9ed4b7e1dfdd805b983a8219ed452531ac414dccfe5f2f3df2d11c2e4e1f18bde6a02bbed6362bfb1dd74ef24

                              • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\g9per00b.default-release\gmp-gmpopenh264\2.3.2\gmpopenh264.dll

                                Filesize

                                1.1MB

                                MD5

                                842039753bf41fa5e11b3a1383061a87

                                SHA1

                                3e8fe1d7b3ad866b06dca6c7ef1e3c50c406e153

                                SHA256

                                d88dd3bfc4a558bb943f3caa2e376da3942e48a7948763bf9a38f707c2cd0c1c

                                SHA512

                                d3320f7ac46327b7b974e74320c4d853e569061cb89ca849cd5d1706330aca629abeb4a16435c541900d839f46ff72dfde04128c450f3e1ee63c025470c19157

                              • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\g9per00b.default-release\gmp-gmpopenh264\2.3.2\gmpopenh264.info

                                Filesize

                                116B

                                MD5

                                2a461e9eb87fd1955cea740a3444ee7a

                                SHA1

                                b10755914c713f5a4677494dbe8a686ed458c3c5

                                SHA256

                                4107f76ba1d9424555f4e8ea0acef69357dfff89dfa5f0ec72aa4f2d489b17bc

                                SHA512

                                34f73f7bf69d7674907f190f257516e3956f825e35a2f03d58201a5a630310b45df393f2b39669f9369d1ac990505a4b6849a0d34e8c136e1402143b6cedf2d3

                              • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\g9per00b.default-release\gmp-widevinecdm\4.10.2710.0\manifest.json

                                Filesize

                                372B

                                MD5

                                bf957ad58b55f64219ab3f793e374316

                                SHA1

                                a11adc9d7f2c28e04d9b35e23b7616d0527118a1

                                SHA256

                                bbab6ca07edbed72a966835c7907b3e60c7aa3d48ddea847e5076bd05f4b1eda

                                SHA512

                                79c179b56e4893fb729b225818ab4b95a50b69666ac41d17aad0b37ab0ca8cd9f0848cbc3c5d9e69e4640a8b261d7ced592eae9bcb0e0b63c05a56e7c477f44e

                              • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\g9per00b.default-release\gmp-widevinecdm\4.10.2710.0\widevinecdm.dll

                                Filesize

                                17.8MB

                                MD5

                                daf7ef3acccab478aaa7d6dc1c60f865

                                SHA1

                                f8246162b97ce4a945feced27b6ea114366ff2ad

                                SHA256

                                bc40c7821dcd3fea9923c6912ab1183a942c11b7690cfd79ed148ded0228777e

                                SHA512

                                5840a45cfdb12c005e117608b1e5d946e1b2e76443ed39ba940d7f56de4babeab09bee7e64b903eb82bb37624c0a0ef19e9b59fbe2ce2f0e0b1c7a6015a63f75

                              • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\g9per00b.default-release\prefs-1.js

                                Filesize

                                10KB

                                MD5

                                b6b504cbe5d966fa7e95f5b1d0a3cf93

                                SHA1

                                0a7a84dd5a4dc195474da0a69d08d64369b07b86

                                SHA256

                                b6cd41c2a1cf353cafc960c2f1ee6ec0aa7eb1819f71d99a4c7eb1cbc8596d51

                                SHA512

                                3e497339d75be12756ad9694941b07bb0039252bdb5694c9fa67945f1705340402842a41500ab191fff068a271ecb5bdfb1f700cedade457f6dc64aaaba685b6

                              • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\g9per00b.default-release\prefs-1.js

                                Filesize

                                12KB

                                MD5

                                9395d82cea332a9213cd3f844c9efd4e

                                SHA1

                                7cd47b7f95912fb9f2483e829113b3df44fd15a2

                                SHA256

                                de0243285b315fa1b6ec9bdc27a93b2d1ec3037e357a69a34c0de23f3e5b411d

                                SHA512

                                1534c789ceca33f6c5179cf247466aeb2128325d3e609e0f390c2d0cfb65a82017108528a9bb911600f1b2e90ef5d31e8c62752773ff58fb9cc2adf101c69602

                              • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\g9per00b.default-release\prefs-1.js

                                Filesize

                                15KB

                                MD5

                                fab9d9faf9888a52d068af2ca9193398

                                SHA1

                                d0673dcfd5ec56260d6c1da530e84e4202b7cd34

                                SHA256

                                fe8f45bb5b5ddd003531619ec5e7b8e80fd7c67ec7cca0157d321edea7b1e2d1

                                SHA512

                                3b458d9576ca1d73dae074c6f9614247c538f67a434f2423fe45862dbcad644c02b738ec57bae1287344b5cbd79eb4aa4df655711fa39a7466ec0c86e696b35f

                              • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\g9per00b.default-release\prefs.js

                                Filesize

                                10KB

                                MD5

                                802e8343dc7b4aefb2f2a056c75b8dfd

                                SHA1

                                7cae60203fd9075f2d9a500aeed72e2207f0317c

                                SHA256

                                a641041802cd13a5f455f5f284f5ab84ab350ffa20aa5c2779441225234f750b

                                SHA512

                                a5c3567870a94f9777761cb14e63ff0e0a662dcd6394177944707fae84e15ff7a019268bb649d6dd3190ce50445b8094e64b610378e096acdf53ae0be3999ac1

                              • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\g9per00b.default-release\storage\permanent\chrome\idb\3870112724rsegmnoittet-es.sqlite

                                Filesize

                                1.1MB

                                MD5

                                faa16f9d60290277e4c685d509d93bab

                                SHA1

                                1246f6ca7877c8b05d2ddefeb3fad483ea0d6240

                                SHA256

                                76bac075ff7dc0601b6d95ca3a0c5d8b4e62c54a1d501b38ee3d862036a02421

                                SHA512

                                32ba1464d79f148d1c397a6f5d7af220be4a528bf1dca691e6f09e5a72b8cefdbb2eec77496081dbaf3029c6ac1cb67424102443ff5a123110328c64ec67498c

                              • memory/1112-95-0x0000000000230000-0x00000000004DE000-memory.dmp

                                Filesize

                                2.7MB

                              • memory/1112-97-0x0000000000230000-0x00000000004DE000-memory.dmp

                                Filesize

                                2.7MB

                              • memory/1112-98-0x0000000000230000-0x00000000004DE000-memory.dmp

                                Filesize

                                2.7MB

                              • memory/1112-102-0x0000000000230000-0x00000000004DE000-memory.dmp

                                Filesize

                                2.7MB

                              • memory/1112-105-0x0000000000230000-0x00000000004DE000-memory.dmp

                                Filesize

                                2.7MB

                              • memory/1616-120-0x0000000000B60000-0x0000000001289000-memory.dmp

                                Filesize

                                7.2MB

                              • memory/1616-123-0x0000000000B60000-0x0000000001289000-memory.dmp

                                Filesize

                                7.2MB

                              • memory/2404-54-0x00000000009A0000-0x0000000000CA6000-memory.dmp

                                Filesize

                                3.0MB

                              • memory/2404-77-0x00000000009A0000-0x0000000000CA6000-memory.dmp

                                Filesize

                                3.0MB

                              • memory/2444-110-0x0000000000380000-0x00000000006AD000-memory.dmp

                                Filesize

                                3.2MB

                              • memory/3744-100-0x0000000000230000-0x0000000000534000-memory.dmp

                                Filesize

                                3.0MB

                              • memory/3744-112-0x0000000000230000-0x0000000000534000-memory.dmp

                                Filesize

                                3.0MB

                              • memory/3744-107-0x0000000000230000-0x0000000000534000-memory.dmp

                                Filesize

                                3.0MB

                              • memory/3744-38-0x0000000000230000-0x0000000000534000-memory.dmp

                                Filesize

                                3.0MB

                              • memory/3744-114-0x0000000000230000-0x0000000000534000-memory.dmp

                                Filesize

                                3.0MB

                              • memory/3744-71-0x0000000000230000-0x0000000000534000-memory.dmp

                                Filesize

                                3.0MB

                              • memory/3744-74-0x0000000000230000-0x0000000000534000-memory.dmp

                                Filesize

                                3.0MB

                              • memory/3744-117-0x0000000000230000-0x0000000000534000-memory.dmp

                                Filesize

                                3.0MB

                              • memory/3744-116-0x0000000000230000-0x0000000000534000-memory.dmp

                                Filesize

                                3.0MB

                              • memory/4476-32-0x0000000000D40000-0x000000000106D000-memory.dmp

                                Filesize

                                3.2MB

                              • memory/4476-21-0x0000000000D40000-0x000000000106D000-memory.dmp

                                Filesize

                                3.2MB

                              • memory/4940-72-0x0000000000880000-0x0000000000FBB000-memory.dmp

                                Filesize

                                7.2MB

                              • memory/4940-75-0x0000000000880000-0x0000000000FBB000-memory.dmp

                                Filesize

                                7.2MB

                              • memory/5108-851-0x0000000000380000-0x00000000006AD000-memory.dmp

                                Filesize

                                3.2MB

                              • memory/5108-34-0x0000000000380000-0x00000000006AD000-memory.dmp

                                Filesize

                                3.2MB

                              • memory/5108-99-0x0000000000380000-0x00000000006AD000-memory.dmp

                                Filesize

                                3.2MB

                              • memory/5108-73-0x0000000000380000-0x00000000006AD000-memory.dmp

                                Filesize

                                3.2MB

                              • memory/5108-106-0x0000000000380000-0x00000000006AD000-memory.dmp

                                Filesize

                                3.2MB

                              • memory/5108-55-0x0000000000380000-0x00000000006AD000-memory.dmp

                                Filesize

                                3.2MB

                              • memory/5108-111-0x0000000000380000-0x00000000006AD000-memory.dmp

                                Filesize

                                3.2MB

                              • memory/5108-113-0x0000000000380000-0x00000000006AD000-memory.dmp

                                Filesize

                                3.2MB

                              • memory/5108-137-0x0000000000380000-0x00000000006AD000-memory.dmp

                                Filesize

                                3.2MB

                              • memory/5108-840-0x0000000000380000-0x00000000006AD000-memory.dmp

                                Filesize

                                3.2MB

                              • memory/5108-3393-0x0000000000380000-0x00000000006AD000-memory.dmp

                                Filesize

                                3.2MB

                              • memory/5108-1746-0x0000000000380000-0x00000000006AD000-memory.dmp

                                Filesize

                                3.2MB

                              • memory/5108-115-0x0000000000380000-0x00000000006AD000-memory.dmp

                                Filesize

                                3.2MB

                              • memory/5108-3169-0x0000000000380000-0x00000000006AD000-memory.dmp

                                Filesize

                                3.2MB

                              • memory/5108-3385-0x0000000000380000-0x00000000006AD000-memory.dmp

                                Filesize

                                3.2MB

                              • memory/5108-3388-0x0000000000380000-0x00000000006AD000-memory.dmp

                                Filesize

                                3.2MB

                              • memory/7148-1348-0x0000000000380000-0x00000000006AD000-memory.dmp

                                Filesize

                                3.2MB