Analysis

  • max time kernel
    150s
  • max time network
    155s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20241007-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system
  • submitted
    07-11-2024 18:31

General

  • Target

    5aa47e342483cbf1379164875c5131f896ce3ca562d37135e8baed56fc6486a0.exe

  • Size

    6.0MB

  • MD5

    179d69888de82761958fbbc4aa61bcd7

  • SHA1

    dd1ecaf102f49df1ae7f533b53b5e892cf694bfd

  • SHA256

    5aa47e342483cbf1379164875c5131f896ce3ca562d37135e8baed56fc6486a0

  • SHA512

    d8349c5993ef5f93dacf1e8d62021bb78387b99bb9514ffbbee5ff525f2f671fcdd172d9290ad2988fbb27584cfda86bbc38323235fba88020f052bfcf0427cd

  • SSDEEP

    98304:w+0ohNemtwkk4j/ia0pBCUX3Uc4BjTZE6nNWM4rowJxEpY4zuxwBhVFS6JtB6+:w+0o/Jtwh4mTcUXEc4BjTZE6d4ZQ+oRt

Malware Config

Extracted

Family

amadey

Version

4.42

Botnet

9c9aa5

C2

http://185.215.113.43

Attributes
  • install_dir

    abc3bc1985

  • install_file

    skotes.exe

  • strings_key

    8a35cf2ea38c2817dba29a4b5b25dcf0

  • url_paths

    /Zu7JuNko/index.php

rc4.plain

Extracted

Family

stealc

Botnet

tale

C2

http://185.215.113.206

Attributes
  • url_path

    /6c4adf523b719729.php

Extracted

Family

lumma

C2

https://founpiuer.store/api

Signatures

  • Amadey

    Amadey bot is a simple trojan bot primarily used for collecting reconnaissance information.

  • Amadey family
  • Lumma Stealer, LummaC

    Lumma or LummaC is an infostealer written in C++ first seen in August 2022.

  • Lumma family
  • Modifies Windows Defender Real-time Protection settings 3 TTPs 6 IoCs
  • Stealc

    Stealc is an infostealer written in C++.

  • Stealc family
  • Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs 10 IoCs
  • Downloads MZ/PE file
  • Checks BIOS information in registry 2 TTPs 20 IoCs

    BIOS information is often read in order to detect sandboxing environments.

  • Checks computer location settings 2 TTPs 2 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Executes dropped EXE 13 IoCs
  • Identifies Wine through registry keys 2 TTPs 10 IoCs

    Wine is a compatibility layer capable of running Windows applications, which can be used as sandboxing environment.

  • Windows security modification 2 TTPs 2 IoCs
  • Adds Run key to start application 2 TTPs 6 IoCs
  • AutoIT Executable 1 IoCs

    AutoIT scripts compiled to PE executables.

  • Suspicious use of NtSetInformationThreadHideFromDebugger 10 IoCs
  • Drops file in Windows directory 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Program crash 4 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 16 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Checks processor information in registry 2 TTPs 8 IoCs

    Processor information is often read in order to detect sandboxing environments.

  • Kills process with taskkill 5 IoCs
  • Modifies registry class 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 27 IoCs
  • Suspicious use of AdjustPrivilegeToken 11 IoCs
  • Suspicious use of FindShellTrayWindow 31 IoCs
  • Suspicious use of SendNotifyMessage 30 IoCs
  • Suspicious use of SetWindowsHookEx 1 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs
  • Uses Task Scheduler COM API 1 TTPs

    The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.

Processes

  • C:\Users\Admin\AppData\Local\Temp\5aa47e342483cbf1379164875c5131f896ce3ca562d37135e8baed56fc6486a0.exe
    "C:\Users\Admin\AppData\Local\Temp\5aa47e342483cbf1379164875c5131f896ce3ca562d37135e8baed56fc6486a0.exe"
    1⤵
    • Adds Run key to start application
    • System Location Discovery: System Language Discovery
    • Suspicious use of WriteProcessMemory
    PID:3164
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\J3G30.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\J3G30.exe
      2⤵
      • Executes dropped EXE
      • Adds Run key to start application
      • System Location Discovery: System Language Discovery
      • Suspicious use of WriteProcessMemory
      PID:3740
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\s2Y89.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\s2Y89.exe
        3⤵
        • Executes dropped EXE
        • Adds Run key to start application
        • System Location Discovery: System Language Discovery
        • Suspicious use of WriteProcessMemory
        PID:3968
        • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\1B08t4.exe
          C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\1B08t4.exe
          4⤵
          • Identifies VirtualBox via ACPI registry values (likely anti-VM)
          • Checks BIOS information in registry
          • Checks computer location settings
          • Executes dropped EXE
          • Identifies Wine through registry keys
          • Suspicious use of NtSetInformationThreadHideFromDebugger
          • Drops file in Windows directory
          • System Location Discovery: System Language Discovery
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of WriteProcessMemory
          PID:3536
          • C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe
            "C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe"
            5⤵
            • Identifies VirtualBox via ACPI registry values (likely anti-VM)
            • Checks BIOS information in registry
            • Checks computer location settings
            • Executes dropped EXE
            • Identifies Wine through registry keys
            • Adds Run key to start application
            • Suspicious use of NtSetInformationThreadHideFromDebugger
            • System Location Discovery: System Language Discovery
            • Suspicious behavior: EnumeratesProcesses
            • Suspicious use of WriteProcessMemory
            PID:2700
            • C:\Users\Admin\AppData\Local\Temp\1004664001\5638a2f54b.exe
              "C:\Users\Admin\AppData\Local\Temp\1004664001\5638a2f54b.exe"
              6⤵
              • Identifies VirtualBox via ACPI registry values (likely anti-VM)
              • Checks BIOS information in registry
              • Executes dropped EXE
              • Identifies Wine through registry keys
              • Suspicious use of NtSetInformationThreadHideFromDebugger
              • System Location Discovery: System Language Discovery
              • Suspicious behavior: EnumeratesProcesses
              PID:4516
              • C:\Windows\SysWOW64\WerFault.exe
                C:\Windows\SysWOW64\WerFault.exe -u -p 4516 -s 1600
                7⤵
                • Program crash
                PID:2696
              • C:\Windows\SysWOW64\WerFault.exe
                C:\Windows\SysWOW64\WerFault.exe -u -p 4516 -s 1444
                7⤵
                • Program crash
                PID:2532
            • C:\Users\Admin\AppData\Local\Temp\1004665001\2f7e1ecfbb.exe
              "C:\Users\Admin\AppData\Local\Temp\1004665001\2f7e1ecfbb.exe"
              6⤵
              • Identifies VirtualBox via ACPI registry values (likely anti-VM)
              • Checks BIOS information in registry
              • Executes dropped EXE
              • Identifies Wine through registry keys
              • Suspicious use of NtSetInformationThreadHideFromDebugger
              • System Location Discovery: System Language Discovery
              • Suspicious behavior: EnumeratesProcesses
              PID:1064
            • C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe
              "C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe"
              6⤵
                PID:4500
              • C:\Users\Admin\AppData\Local\Temp\1004667001\9a90075344.exe
                "C:\Users\Admin\AppData\Local\Temp\1004667001\9a90075344.exe"
                6⤵
                • Modifies Windows Defender Real-time Protection settings
                • Identifies VirtualBox via ACPI registry values (likely anti-VM)
                • Checks BIOS information in registry
                • Executes dropped EXE
                • Identifies Wine through registry keys
                • Windows security modification
                • Suspicious use of NtSetInformationThreadHideFromDebugger
                • System Location Discovery: System Language Discovery
                • Suspicious behavior: EnumeratesProcesses
                • Suspicious use of AdjustPrivilegeToken
                PID:6436
          • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\2Z3635.exe
            C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\2Z3635.exe
            4⤵
            • Identifies VirtualBox via ACPI registry values (likely anti-VM)
            • Checks BIOS information in registry
            • Executes dropped EXE
            • Identifies Wine through registry keys
            • Suspicious use of NtSetInformationThreadHideFromDebugger
            • System Location Discovery: System Language Discovery
            • Suspicious behavior: EnumeratesProcesses
            PID:4724
            • C:\Windows\SysWOW64\WerFault.exe
              C:\Windows\SysWOW64\WerFault.exe -u -p 4724 -s 1648
              5⤵
              • Program crash
              PID:3776
            • C:\Windows\SysWOW64\WerFault.exe
              C:\Windows\SysWOW64\WerFault.exe -u -p 4724 -s 1628
              5⤵
              • Program crash
              PID:3688
        • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\3P84g.exe
          C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\3P84g.exe
          3⤵
          • Identifies VirtualBox via ACPI registry values (likely anti-VM)
          • Checks BIOS information in registry
          • Executes dropped EXE
          • Identifies Wine through registry keys
          • Suspicious use of NtSetInformationThreadHideFromDebugger
          • System Location Discovery: System Language Discovery
          • Suspicious behavior: EnumeratesProcesses
          PID:4996
      • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\4R117c.exe
        C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\4R117c.exe
        2⤵
        • Executes dropped EXE
        • System Location Discovery: System Language Discovery
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of FindShellTrayWindow
        • Suspicious use of SendNotifyMessage
        • Suspicious use of WriteProcessMemory
        PID:528
        • C:\Windows\SysWOW64\taskkill.exe
          taskkill /F /IM firefox.exe /T
          3⤵
          • System Location Discovery: System Language Discovery
          • Kills process with taskkill
          • Suspicious use of AdjustPrivilegeToken
          PID:1808
        • C:\Windows\SysWOW64\taskkill.exe
          taskkill /F /IM chrome.exe /T
          3⤵
          • System Location Discovery: System Language Discovery
          • Kills process with taskkill
          • Suspicious use of AdjustPrivilegeToken
          PID:1620
        • C:\Windows\SysWOW64\taskkill.exe
          taskkill /F /IM msedge.exe /T
          3⤵
          • System Location Discovery: System Language Discovery
          • Kills process with taskkill
          • Suspicious use of AdjustPrivilegeToken
          PID:3632
        • C:\Windows\SysWOW64\taskkill.exe
          taskkill /F /IM opera.exe /T
          3⤵
          • System Location Discovery: System Language Discovery
          • Kills process with taskkill
          • Suspicious use of AdjustPrivilegeToken
          PID:4092
        • C:\Windows\SysWOW64\taskkill.exe
          taskkill /F /IM brave.exe /T
          3⤵
          • System Location Discovery: System Language Discovery
          • Kills process with taskkill
          • Suspicious use of AdjustPrivilegeToken
          PID:232
        • C:\Program Files\Mozilla Firefox\firefox.exe
          "C:\Program Files\Mozilla Firefox\firefox.exe" --kiosk "https://youtube.com/account?=https://accounts.google.com/v3/signin/challenge/pwd" --no-default-browser-check --disable-popup-blocking
          3⤵
          • Suspicious use of WriteProcessMemory
          PID:1448
          • C:\Program Files\Mozilla Firefox\firefox.exe
            "C:\Program Files\Mozilla Firefox\firefox.exe" --kiosk https://youtube.com/account?=https://accounts.google.com/v3/signin/challenge/pwd --no-default-browser-check --disable-popup-blocking
            4⤵
            • Checks processor information in registry
            • Modifies registry class
            • Suspicious use of AdjustPrivilegeToken
            • Suspicious use of FindShellTrayWindow
            • Suspicious use of SendNotifyMessage
            • Suspicious use of SetWindowsHookEx
            • Suspicious use of WriteProcessMemory
            PID:2400
            • C:\Program Files\Mozilla Firefox\firefox.exe
              "C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=2076 -parentBuildID 20240401114208 -prefsHandle 2000 -prefMapHandle 1992 -prefsLen 23680 -prefMapSize 244658 -appDir "C:\Program Files\Mozilla Firefox\browser" - {5b83f5eb-8529-4918-9a6d-43083073feaa} 2400 "\\.\pipe\gecko-crash-server-pipe.2400" gpu
              5⤵
                PID:4292
              • C:\Program Files\Mozilla Firefox\firefox.exe
                "C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=2508 -parentBuildID 20240401114208 -prefsHandle 2500 -prefMapHandle 2496 -prefsLen 24600 -prefMapSize 244658 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {2dac45c9-1f4b-4023-9de5-e0007b0e73c6} 2400 "\\.\pipe\gecko-crash-server-pipe.2400" socket
                5⤵
                  PID:3740
                • C:\Program Files\Mozilla Firefox\firefox.exe
                  "C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=3012 -childID 1 -isForBrowser -prefsHandle 1492 -prefMapHandle 3116 -prefsLen 22652 -prefMapSize 244658 -jsInitHandle 1288 -jsInitLen 234952 -parentBuildID 20240401114208 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {77d2caf0-9f3d-473f-8473-e9281ed7eac0} 2400 "\\.\pipe\gecko-crash-server-pipe.2400" tab
                  5⤵
                    PID:3552
                  • C:\Program Files\Mozilla Firefox\firefox.exe
                    "C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=2728 -childID 2 -isForBrowser -prefsHandle 3856 -prefMapHandle 3872 -prefsLen 29090 -prefMapSize 244658 -jsInitHandle 1288 -jsInitLen 234952 -parentBuildID 20240401114208 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {af8726d7-b368-426c-8dc8-6953de27fb0f} 2400 "\\.\pipe\gecko-crash-server-pipe.2400" tab
                    5⤵
                      PID:1828
                    • C:\Program Files\Mozilla Firefox\firefox.exe
                      "C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=4552 -parentBuildID 20240401114208 -sandboxingKind 0 -prefsHandle 4544 -prefMapHandle 4532 -prefsLen 29090 -prefMapSize 244658 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {0dce6ea7-133f-4400-ac04-a040e8441e26} 2400 "\\.\pipe\gecko-crash-server-pipe.2400" utility
                      5⤵
                      • Checks processor information in registry
                      PID:6292
                    • C:\Program Files\Mozilla Firefox\firefox.exe
                      "C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=5256 -childID 3 -isForBrowser -prefsHandle 5244 -prefMapHandle 5248 -prefsLen 26944 -prefMapSize 244658 -jsInitHandle 1288 -jsInitLen 234952 -parentBuildID 20240401114208 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {53128908-c5f2-4452-9c31-76bea808724a} 2400 "\\.\pipe\gecko-crash-server-pipe.2400" tab
                      5⤵
                        PID:5416
                      • C:\Program Files\Mozilla Firefox\firefox.exe
                        "C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=5328 -childID 4 -isForBrowser -prefsHandle 5372 -prefMapHandle 5380 -prefsLen 26944 -prefMapSize 244658 -jsInitHandle 1288 -jsInitLen 234952 -parentBuildID 20240401114208 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {a3979c61-772c-4c37-bb01-6336c36212bb} 2400 "\\.\pipe\gecko-crash-server-pipe.2400" tab
                        5⤵
                          PID:5428
                        • C:\Program Files\Mozilla Firefox\firefox.exe
                          "C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=5628 -childID 5 -isForBrowser -prefsHandle 5540 -prefMapHandle 5544 -prefsLen 26944 -prefMapSize 244658 -jsInitHandle 1288 -jsInitLen 234952 -parentBuildID 20240401114208 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {9c32b4cc-d8aa-447f-93ba-1e4360c4007b} 2400 "\\.\pipe\gecko-crash-server-pipe.2400" tab
                          5⤵
                            PID:5440
                  • C:\Windows\SysWOW64\WerFault.exe
                    C:\Windows\SysWOW64\WerFault.exe -pss -s 436 -p 4724 -ip 4724
                    1⤵
                      PID:4592
                    • C:\Windows\SysWOW64\WerFault.exe
                      C:\Windows\SysWOW64\WerFault.exe -pss -s 184 -p 4724 -ip 4724
                      1⤵
                        PID:3136
                      • C:\Windows\SysWOW64\WerFault.exe
                        C:\Windows\SysWOW64\WerFault.exe -pss -s 552 -p 4516 -ip 4516
                        1⤵
                          PID:5036
                        • C:\Windows\SysWOW64\WerFault.exe
                          C:\Windows\SysWOW64\WerFault.exe -pss -s 552 -p 4516 -ip 4516
                          1⤵
                            PID:3288
                          • C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe
                            C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe
                            1⤵
                            • Identifies VirtualBox via ACPI registry values (likely anti-VM)
                            • Checks BIOS information in registry
                            • Executes dropped EXE
                            • Identifies Wine through registry keys
                            • Suspicious use of NtSetInformationThreadHideFromDebugger
                            • Suspicious behavior: EnumeratesProcesses
                            PID:6616
                          • C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe
                            C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe
                            1⤵
                            • Identifies VirtualBox via ACPI registry values (likely anti-VM)
                            • Checks BIOS information in registry
                            • Executes dropped EXE
                            • Identifies Wine through registry keys
                            • Suspicious use of NtSetInformationThreadHideFromDebugger
                            • Suspicious behavior: EnumeratesProcesses
                            PID:4880
                          • C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe
                            C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe
                            1⤵
                            • Identifies VirtualBox via ACPI registry values (likely anti-VM)
                            • Checks BIOS information in registry
                            • Executes dropped EXE
                            • Identifies Wine through registry keys
                            • Suspicious use of NtSetInformationThreadHideFromDebugger
                            • Suspicious behavior: EnumeratesProcesses
                            PID:6820

                          Network

                          MITRE ATT&CK Enterprise v15

                          Replay Monitor

                          Loading Replay Monitor...

                          Downloads

                          • C:\Users\Admin\AppData\Local\Mozilla\Firefox\Profiles\7fmsgkth.default-release\activity-stream.discovery_stream.json

                            Filesize

                            20KB

                            MD5

                            0a54f9011ed1cf446fdfc1aec4ff805a

                            SHA1

                            b5df397e028226dd6c04de044a47cf64c31b4a06

                            SHA256

                            79736d306fa086ed28f86066d7a643702a16d8ce9cb19650058751f61a85be0b

                            SHA512

                            a38ae3f31fd51520b8003cce67a299e5d43add78e847a7c099ce3c3ee362cce8e98a08562f0f14e2bd223277211d627b9fc011d36caeee8fb32f835e287d73bc

                          • C:\Users\Admin\AppData\Local\Mozilla\Firefox\Profiles\7fmsgkth.default-release\cache2\entries\D500AD994A7515157BB2A6ADD5B18B754E4D2F99

                            Filesize

                            13KB

                            MD5

                            8daeef7feaf93b58f85d5911370bbf9d

                            SHA1

                            0e1cb27435e0b7c61340c2e9f6a32b885011bcea

                            SHA256

                            4960cf6ab80b489fa95f5acd78aac39a50178b12ecfef8c5e9ef3733d5de1df0

                            SHA512

                            d4e056617088d3894bc91584bcb4b8cc2ad75f90a817e556cfa43a67b322d629dad3bc4d97128a7391249d51b856de8823367d89c50adfe01ba8d4048c6b7568

                          • C:\Users\Admin\AppData\Local\Temp\1004664001\5638a2f54b.exe

                            Filesize

                            3.0MB

                            MD5

                            427a063388d79b8cfec7e922feb81c07

                            SHA1

                            9638f797e91ea60bd424b3b2ddef9d0d53a2e030

                            SHA256

                            0836b74c5507b060778ad90bab2ebd7bc230ffe3004d67ced991fa47ecbd566e

                            SHA512

                            a775039b50cfbd24a87d10474653c1bbfc4afe85d0093dbbdad3d29c76466e9f156318a2fada8797e3b821a31e0e960fbd577d243c2b06ce1dfff601d288d7fa

                          • C:\Users\Admin\AppData\Local\Temp\1004665001\2f7e1ecfbb.exe

                            Filesize

                            2.0MB

                            MD5

                            fdd09e1d35cbc3837a26255801aacb53

                            SHA1

                            c6a5b12ae933c9cb222b3d8a5ebb4bd432e22b95

                            SHA256

                            26711a4c32193e82db0ecc58bfc95d9482f111d1389314029432f228fbdb75e0

                            SHA512

                            7f52301a06f6f0fb4d6eaf07a784e45a9cd9bb275754aae59bf1a2139af1304d296da21777e2c0e52f2b8c876a4cea5ef35a6bd574135b1256714d6304087750

                          • C:\Users\Admin\AppData\Local\Temp\1004667001\9a90075344.exe

                            Filesize

                            2.7MB

                            MD5

                            67943707204f342d03b0d888d91dfcb7

                            SHA1

                            63adff12f8b484c2df92fc1d90e9b8651c885e74

                            SHA256

                            c34b445ec31ca803d440aa62ccd026dd4a16f3d91faad0389cbcc4e63dd2b2f2

                            SHA512

                            f322865b051f58f6024866b81150a13a9697ea970e2c14577a15cd62162cd685b6af70bd310532011dc725ebbe377efa9431550194af1d76d6ea68a967886464

                          • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\4R117c.exe

                            Filesize

                            898KB

                            MD5

                            c2f642b51ce5dd471ea60f6670788937

                            SHA1

                            80d535b22689a7eaba487bea737f948163b84530

                            SHA256

                            e4b0df56bcdfaf576ee33b4e88cb33a5b56b615b49989ddb0f967d204ce6cb4d

                            SHA512

                            310c14ff21f8a9e6c9697cfef7cb7636a75de5711e6455fc35304c75a7a940a4b51c0ed6fa3196e8dbac8854d472dc4e10e0138e4363a11975240eb6b84f3d5e

                          • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\J3G30.exe

                            Filesize

                            5.5MB

                            MD5

                            1eec1a5651e83163806b846fd7751bd2

                            SHA1

                            40694d5d0676b311878dd0fb8eb2ac6aaee0d5bc

                            SHA256

                            d5fdee1e26f80bd7fbcac1618d2578a705bf39f3a4d6244a6fae8dde7cc2d0fc

                            SHA512

                            ef869fd180d08b2e78454871b9ef530af2775ba372a3de2c027e925f85ea3f00867a792e2f311e7a24b8c7dbd0c455b7ff5ac6ad086560777bcba938348c0d5b

                          • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\3P84g.exe

                            Filesize

                            2.0MB

                            MD5

                            2bd1643c51ab40c4b17e6f15b1eaeb0c

                            SHA1

                            0ed83b36c8cc314690e7353a2a3631deee098331

                            SHA256

                            f7536ef71a6a1df24263e5bf3b58be00674f303eff4787d70de246e481f8330e

                            SHA512

                            4e5d5416d72b5d254b32b98feed4009eb321d21f520d607fdce174b3a7bfd9cab01cfa43981c0dc6f989c936c411e274e924244d31223d6ad2dcee5e7d6b5246

                          • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\s2Y89.exe

                            Filesize

                            3.4MB

                            MD5

                            bf1fc5049728f09c3c879e81691af7c9

                            SHA1

                            12246ddbfc7cf649cdf77a0d8acff64524336914

                            SHA256

                            e82602b0d52e3ae1d6e67e68892d0e0bccec0414271499cb4cb87f1b244d88b3

                            SHA512

                            962d2487b4b3cb5f2b01c1c8c652f596b6864fe9773b3fe643db726fe93bd135086535ac71f1045a7810775aa5c32bebbd45f5e0c53bd78d2e081c770af031d8

                          • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\1B08t4.exe

                            Filesize

                            3.1MB

                            MD5

                            065366de9cd0ccac6b7e2dc0f2c5c8bd

                            SHA1

                            40a61570203bf51aa2cc995b184cc117b619ab44

                            SHA256

                            295373e8416d0e053b5745f47073e17fc342de0246a930469e9cb9de6f740dd5

                            SHA512

                            3f895156884dc9f9b2d1ef4a4d2162fc82fa58452b5f6cd6ac8db0d88d444854149c532793dce33c7af58f6f5eec24cce67cdb3e26e4dc2b8b59684013072a99

                          • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\2Z3635.exe

                            Filesize

                            3.0MB

                            MD5

                            c641b3ee57b10edb933e1f5eddabce24

                            SHA1

                            028a2826c6726e0facaf6902a4499a7697ff3e6c

                            SHA256

                            845b66567bfde5a0d1959f6d6ade4cbaa063b0f13c0fde2626950a67bfb05a6f

                            SHA512

                            bfd9652fc052ccc08e0856bd1e56ae8664d249c3a764a47140d42fc933532558ca135b0203bb512d2cda5a584493240c49cdebb4000c667abd13a730c7583e3e

                          • C:\Users\Admin\AppData\Local\Temp\tmpaddon

                            Filesize

                            479KB

                            MD5

                            09372174e83dbbf696ee732fd2e875bb

                            SHA1

                            ba360186ba650a769f9303f48b7200fb5eaccee1

                            SHA256

                            c32efac42faf4b9878fb8917c5e71d89ff40de580c4f52f62e11c6cfab55167f

                            SHA512

                            b667086ed49579592d435df2b486fe30ba1b62ddd169f19e700cd079239747dd3e20058c285fa9c10a533e34f22b5198ed9b1f92ae560a3067f3e3feacc724f1

                          • C:\Users\Admin\AppData\Local\Temp\tmpaddon-1

                            Filesize

                            13.8MB

                            MD5

                            0a8747a2ac9ac08ae9508f36c6d75692

                            SHA1

                            b287a96fd6cc12433adb42193dfe06111c38eaf0

                            SHA256

                            32d544baf2facc893057a1d97db33207e642f0dacf235d8500a0b5eff934ce03

                            SHA512

                            59521f8c61236641b3299ab460c58c8f5f26fa67e828de853c2cf372f9614d58b9f541aae325b1600ec4f3a47953caacb8122b0dfce7481acfec81045735947d

                          • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\7fmsgkth.default-release\AlternateServices.bin

                            Filesize

                            6KB

                            MD5

                            bace92f1feadffbb4b77d8b656fa4eb1

                            SHA1

                            3307fa747ae3c1fca3732c94dda524c14a3b1110

                            SHA256

                            8f68d9e790c824e1feaeb6c4fcc1613eae400f27fd7a5f9fb5790a8d5d008ba0

                            SHA512

                            be5b57db86c7180eec40edb52c4a7b38c82926ced2da45d76d6da23db6ba3007901aa8cf6002a82fdc7ad99ccd2aeb848e0d9511a845f9d7a03a352195cc50b2

                          • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\7fmsgkth.default-release\AlternateServices.bin

                            Filesize

                            10KB

                            MD5

                            ffd22fe6b2ff26890d362984d475d256

                            SHA1

                            e6a4adf585b0e72fb5a1e98e01ac1af195fd305e

                            SHA256

                            48a322090af3a47da0d73d0b21a3b5dfe2b985c96d564e58f41c123361d24e0e

                            SHA512

                            d2ca8767beb649ee6329ea19c6fc0368994aa44d7ee0ccbf115b1f17724daa4cc3fde510f4b2fdbb2972f9825e23e2af72576d5a044e98d3e9e3ca31d6321168

                          • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\7fmsgkth.default-release\datareporting\glean\db\data.safe.bin

                            Filesize

                            23KB

                            MD5

                            ae0ed5b8bbd66e493a1f855de62879c4

                            SHA1

                            c0d06a60a79b55bba12135b29aa5b0be1827dc88

                            SHA256

                            b948929649fe74eea90911beadae448e8ddc7e36b5864ccac7a3c42b14f21b0e

                            SHA512

                            c625babe010df62f9c2009eacf77ca197edd745f70af71cb8916e25a5de8195e2e33cee6dc77300a65d45e83a8783de2398ab4e4ed5478a2d5b499ec94b623f7

                          • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\7fmsgkth.default-release\datareporting\glean\db\data.safe.bin

                            Filesize

                            15KB

                            MD5

                            90e18cb05feb4dd9ca41105f00171d15

                            SHA1

                            95fdcfe0ba9eb7976ea61ac7a9d7e2b99185bdaf

                            SHA256

                            c53e4a9fe06a2cc8004a64412b8de251d2faf6af1fd7969eab1dd505e75b5592

                            SHA512

                            bc9a56e36e691994517fa7709cfc03d71962fc487a46ee476e10c27d6798f038359790c6372e6119fb23f3b233bd1207d5d2b5554b3cf25680d13f7cd436ee6a

                          • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\7fmsgkth.default-release\datareporting\glean\db\data.safe.bin

                            Filesize

                            14KB

                            MD5

                            48c1608fd3c3c2a83ea27aa92e5446fb

                            SHA1

                            5c29373003c8703cd59df1e52294a5495f83116f

                            SHA256

                            de8cdb0b03b373247ab3cfb3657a861169cc246f3fe38699550d3ab145940370

                            SHA512

                            8237a31b3c87dcb680d2c2c22eee31f32d5b51329712096cc51b0a9513feb393b4d73a96576607cca19e8f9217826aff79580a53e79f16b496541419882793dd

                          • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\7fmsgkth.default-release\datareporting\glean\db\data.safe.bin

                            Filesize

                            5KB

                            MD5

                            7e37a2cac3c86e128ba8d0bc7672bc03

                            SHA1

                            5d083cd9b213482dddbc0fb70dc5996f1f8d499c

                            SHA256

                            ae4390d51236f62b3c5c194e14df5e0ddc3221402dab5efcbcd492e47de4b967

                            SHA512

                            f1ae6b39ccc1c5ece6617a394496d7e2468ffdb21ae5f12ddd1ad9d10e96c54fc180fdc9b8a27c03b59a807c6b01913182fbf33d07f8e7ba1162884e7d1f9bec

                          • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\7fmsgkth.default-release\datareporting\glean\db\data.safe.bin

                            Filesize

                            5KB

                            MD5

                            10c25c50c1dcb2a9237fb798c7945b8b

                            SHA1

                            50e9d1e5320568293221bf916d851382e09ec103

                            SHA256

                            f71921b96b03c9afea70cbe34c58091b6349cf039fefa4278d6374225935363c

                            SHA512

                            a551c2cfa1f580ec163dfc4615252dc9e7c9e1ce922c628f38b89d8866ffe9bb75daf4cc6fb3afbefccf15ca13a4c5394e9e4b0c98dd7341a788da89cdb7a9c7

                          • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\7fmsgkth.default-release\datareporting\glean\db\data.safe.tmp

                            Filesize

                            5KB

                            MD5

                            49fc72e1999ecc714911b2be4561f0d6

                            SHA1

                            562708581edfeae2fed779094975c4f966cc2bed

                            SHA256

                            64dda2f62f1eebdf4acb1c03a9aa3315d19a48d058570459d3537514c9d0c445

                            SHA512

                            6d30f9fa64948449b87ec86c1f413b611bcb9d3a024a1eaafabcad619317ecf0b6c88644af571be5dfe977a04b4f74a41c7ac3a9f29281d239767d692c1e10d1

                          • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\7fmsgkth.default-release\datareporting\glean\db\data.safe.tmp

                            Filesize

                            15KB

                            MD5

                            dd43c3e61c1f8284deebe19a98280b9c

                            SHA1

                            751a521d1badee58540cce5fa7f5082e2fe69278

                            SHA256

                            b0804f71b0c1a6e56acfa1f400ee0b8ab16d1d63c40e1870a58180c6a4a4af97

                            SHA512

                            5265283621caa93bf134e8752fd6bb25b3b181bd8b8e0c2abd5580fd41852c5a3e532f6f41009bcace1f1058b5d573d8d656f5d7edee86409f792fab44c5b9a8

                          • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\7fmsgkth.default-release\datareporting\glean\db\data.safe.tmp

                            Filesize

                            5KB

                            MD5

                            be12586ed0ee749d5b060610a41d4ff4

                            SHA1

                            81dee0f09d5c3620ceeec93d703cb973fedff061

                            SHA256

                            703178e595c31c41de20c01fd0377093985a42f1d9ef48272bb2b256e73d39e2

                            SHA512

                            baf85a2b4a2c0e4bd78441bcb0921813196b548389f543b2d6eac3dc424e1d79da356018690524b4b5a060693431ddda1f1b39d64d5e7ca1b71229537c2e0db5

                          • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\7fmsgkth.default-release\datareporting\glean\db\data.safe.tmp

                            Filesize

                            6KB

                            MD5

                            c21a70ea268c02697648a4b31d18231f

                            SHA1

                            fb7518ad7a47ade81f99b3983719d0e83c406d1e

                            SHA256

                            009cb78d087da4fa3145d29bc9df5e610ff502552cedea261d654b515cf73751

                            SHA512

                            b3d6cba0791534ec47b8c5687129a76c6af95b991f7a7498c1b7d890eca848fb5a3876a6f95e33be5d4e7635f1009de3941d72bf6e404a6297c5874e531472f3

                          • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\7fmsgkth.default-release\datareporting\glean\db\data.safe.tmp

                            Filesize

                            15KB

                            MD5

                            94f861ecc2a1cc9d2f508ba7ac5f3e39

                            SHA1

                            dac764b2f6cff09e3aa053d3af1fa2915f5ee082

                            SHA256

                            f230dfbafeb62b9ff270c8ecb01bef1e671aa9bf790ceb17a7d224e917deee28

                            SHA512

                            58f56dff5094ba0e8a0c266bd303cc2924a32b55ca04f19d9f5c09ee5b7e9ccbe9e692b76c04f05fc74e8ea520ebc3e84158e408f8c6147554ee0cb72df3759c

                          • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\7fmsgkth.default-release\datareporting\glean\pending_pings\87af6604-5981-4adc-9250-bc6f40ff7ca4

                            Filesize

                            982B

                            MD5

                            d03aa72f3b714f0e90c551d61ff285cd

                            SHA1

                            ed40ab426c0a88e0ee1eb5d067b62b712b3314a9

                            SHA256

                            5cc3404325a890643ef57571b022f4e4699c1566b992cebb2c49ad8e46d6917a

                            SHA512

                            e8401d16f8f742853ef633f892487113281d1bbd62185d6705fbdafc2da1b77da862153511b14483aa5753c7e32960ff2d134fae435b63c71a51357c6c23d2f0

                          • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\7fmsgkth.default-release\datareporting\glean\pending_pings\b91f73ec-bc6d-4aa9-be94-9bcfd6d4a0f3

                            Filesize

                            671B

                            MD5

                            72536e8c64fae0e7730b46610fbb44a5

                            SHA1

                            5b29d5c907c32350dbaeb230a00bee6c376fd494

                            SHA256

                            2ba2c9deb14a9bd6cda3495a860d957467d60e144a38f4fb3e633dd99f16d9a8

                            SHA512

                            1b4ea075fc0a5d15041d4ca03b2524d83fb6e8f96925829ccc27f962b857ec24efc0d4207161a442e86deae64974bbc355679cc9ea50f26688043602db1cc1fe

                          • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\7fmsgkth.default-release\datareporting\glean\pending_pings\d90748cc-00e5-4219-9d21-2e333026b74d

                            Filesize

                            27KB

                            MD5

                            de2dd9fb58b4cbdf81caa040dfd814d8

                            SHA1

                            63f6ec488bfa6a115a1eca52bef3e2707975d7f5

                            SHA256

                            169f88e1ac7b7f6b09e78fa2c0889da4dd40336fe24c9cc3d35239152302e9b8

                            SHA512

                            98ff6006c3134b8131260367a6c8b5a3b6d9168cd1632eee8d5c01196aca9673620483465becb5c3c34e3c96a54069636f3aa89aa11968300e008df430c515dc

                          • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\7fmsgkth.default-release\gmp-gmpopenh264\2.3.2\gmpopenh264.dll

                            Filesize

                            1.1MB

                            MD5

                            842039753bf41fa5e11b3a1383061a87

                            SHA1

                            3e8fe1d7b3ad866b06dca6c7ef1e3c50c406e153

                            SHA256

                            d88dd3bfc4a558bb943f3caa2e376da3942e48a7948763bf9a38f707c2cd0c1c

                            SHA512

                            d3320f7ac46327b7b974e74320c4d853e569061cb89ca849cd5d1706330aca629abeb4a16435c541900d839f46ff72dfde04128c450f3e1ee63c025470c19157

                          • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\7fmsgkth.default-release\gmp-gmpopenh264\2.3.2\gmpopenh264.info

                            Filesize

                            116B

                            MD5

                            2a461e9eb87fd1955cea740a3444ee7a

                            SHA1

                            b10755914c713f5a4677494dbe8a686ed458c3c5

                            SHA256

                            4107f76ba1d9424555f4e8ea0acef69357dfff89dfa5f0ec72aa4f2d489b17bc

                            SHA512

                            34f73f7bf69d7674907f190f257516e3956f825e35a2f03d58201a5a630310b45df393f2b39669f9369d1ac990505a4b6849a0d34e8c136e1402143b6cedf2d3

                          • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\7fmsgkth.default-release\gmp-widevinecdm\4.10.2710.0\manifest.json

                            Filesize

                            372B

                            MD5

                            bf957ad58b55f64219ab3f793e374316

                            SHA1

                            a11adc9d7f2c28e04d9b35e23b7616d0527118a1

                            SHA256

                            bbab6ca07edbed72a966835c7907b3e60c7aa3d48ddea847e5076bd05f4b1eda

                            SHA512

                            79c179b56e4893fb729b225818ab4b95a50b69666ac41d17aad0b37ab0ca8cd9f0848cbc3c5d9e69e4640a8b261d7ced592eae9bcb0e0b63c05a56e7c477f44e

                          • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\7fmsgkth.default-release\gmp-widevinecdm\4.10.2710.0\widevinecdm.dll

                            Filesize

                            17.8MB

                            MD5

                            daf7ef3acccab478aaa7d6dc1c60f865

                            SHA1

                            f8246162b97ce4a945feced27b6ea114366ff2ad

                            SHA256

                            bc40c7821dcd3fea9923c6912ab1183a942c11b7690cfd79ed148ded0228777e

                            SHA512

                            5840a45cfdb12c005e117608b1e5d946e1b2e76443ed39ba940d7f56de4babeab09bee7e64b903eb82bb37624c0a0ef19e9b59fbe2ce2f0e0b1c7a6015a63f75

                          • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\7fmsgkth.default-release\prefs-1.js

                            Filesize

                            11KB

                            MD5

                            1afd424771c005c12119f8d68d9a2311

                            SHA1

                            e3b8da937870c7f18c3388c7b0f8ecb50d44e9d8

                            SHA256

                            93b349e0ecc48a53b86bc3298fb1b420255f1cf67b48af2bea12cd87dce84f4b

                            SHA512

                            dbd3961dc4b257d5aed9b14cc682f7816155a1f8808edc53aec7d6ed97f14d1b3a3f7fc10ee01086c887006cb66037a532d2e6d78f09a0814938bd8c4d95fab7

                          • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\7fmsgkth.default-release\prefs-1.js

                            Filesize

                            10KB

                            MD5

                            2f78bd2904a845cf5550ff30fe0e5a9c

                            SHA1

                            b142ee9165e1a53734bb4594de3da79d03b80eef

                            SHA256

                            286de80f324ebcbdd5b460b12c97645f9fb7519f5fa876801b4fe3bcfb49dfbd

                            SHA512

                            8aadb9b6e02114186e328fb65693d2a2b10a4acd3f46d18d85ddd22fc004f3cc6af2eee4ef0780404623b9a2f5ce223ede4414c1f98b449f31d366185558b1c4

                          • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\7fmsgkth.default-release\prefs.js

                            Filesize

                            10KB

                            MD5

                            d731f63ff24d134d964401f974e14caf

                            SHA1

                            2c85066c15416ff1d251547171f732671af4e302

                            SHA256

                            dee56ff9afc0d08e941888d5bf0bc1c8bcd5e04a33b32bf9da7489d0936e1fdf

                            SHA512

                            3328792388e4065eaa6e7df95017869c68f0aed15fef14921b008b5a5dc94d2967ba4e0a6dce54f50dc887e17deff43f6932de67df4aab85c9e71915a3d1f751

                          • memory/1064-613-0x0000000000010000-0x0000000000732000-memory.dmp

                            Filesize

                            7.1MB

                          • memory/1064-85-0x0000000000010000-0x0000000000732000-memory.dmp

                            Filesize

                            7.1MB

                          • memory/2700-2363-0x00000000005E0000-0x00000000008FB000-memory.dmp

                            Filesize

                            3.1MB

                          • memory/2700-3263-0x00000000005E0000-0x00000000008FB000-memory.dmp

                            Filesize

                            3.1MB

                          • memory/2700-3264-0x00000000005E0000-0x00000000008FB000-memory.dmp

                            Filesize

                            3.1MB

                          • memory/2700-3262-0x00000000005E0000-0x00000000008FB000-memory.dmp

                            Filesize

                            3.1MB

                          • memory/2700-3261-0x00000000005E0000-0x00000000008FB000-memory.dmp

                            Filesize

                            3.1MB

                          • memory/2700-836-0x00000000005E0000-0x00000000008FB000-memory.dmp

                            Filesize

                            3.1MB

                          • memory/2700-3260-0x00000000005E0000-0x00000000008FB000-memory.dmp

                            Filesize

                            3.1MB

                          • memory/2700-3254-0x00000000005E0000-0x00000000008FB000-memory.dmp

                            Filesize

                            3.1MB

                          • memory/2700-698-0x00000000005E0000-0x00000000008FB000-memory.dmp

                            Filesize

                            3.1MB

                          • memory/2700-3237-0x00000000005E0000-0x00000000008FB000-memory.dmp

                            Filesize

                            3.1MB

                          • memory/2700-869-0x00000000005E0000-0x00000000008FB000-memory.dmp

                            Filesize

                            3.1MB

                          • memory/2700-34-0x00000000005E0000-0x00000000008FB000-memory.dmp

                            Filesize

                            3.1MB

                          • memory/2700-40-0x00000000005E0000-0x00000000008FB000-memory.dmp

                            Filesize

                            3.1MB

                          • memory/2700-41-0x00000000005E0000-0x00000000008FB000-memory.dmp

                            Filesize

                            3.1MB

                          • memory/2700-3265-0x00000000005E0000-0x00000000008FB000-memory.dmp

                            Filesize

                            3.1MB

                          • memory/2700-1688-0x00000000005E0000-0x00000000008FB000-memory.dmp

                            Filesize

                            3.1MB

                          • memory/3536-21-0x00000000005A0000-0x00000000008BB000-memory.dmp

                            Filesize

                            3.1MB

                          • memory/3536-33-0x00000000005A0000-0x00000000008BB000-memory.dmp

                            Filesize

                            3.1MB

                          • memory/4516-59-0x0000000000F20000-0x000000000121F000-memory.dmp

                            Filesize

                            3.0MB

                          • memory/4516-656-0x0000000000F20000-0x000000000121F000-memory.dmp

                            Filesize

                            3.0MB

                          • memory/4724-38-0x0000000000E30000-0x0000000001130000-memory.dmp

                            Filesize

                            3.0MB

                          • memory/4724-42-0x0000000000E30000-0x0000000001130000-memory.dmp

                            Filesize

                            3.0MB

                          • memory/4724-43-0x0000000000E30000-0x0000000001130000-memory.dmp

                            Filesize

                            3.0MB

                          • memory/4880-3259-0x00000000005E0000-0x00000000008FB000-memory.dmp

                            Filesize

                            3.1MB

                          • memory/4996-66-0x0000000000760000-0x0000000000E8D000-memory.dmp

                            Filesize

                            7.2MB

                          • memory/4996-63-0x0000000000760000-0x0000000000E8D000-memory.dmp

                            Filesize

                            7.2MB

                          • memory/6436-820-0x00000000005D0000-0x000000000088E000-memory.dmp

                            Filesize

                            2.7MB

                          • memory/6436-822-0x00000000005D0000-0x000000000088E000-memory.dmp

                            Filesize

                            2.7MB

                          • memory/6436-837-0x00000000005D0000-0x000000000088E000-memory.dmp

                            Filesize

                            2.7MB

                          • memory/6436-821-0x00000000005D0000-0x000000000088E000-memory.dmp

                            Filesize

                            2.7MB

                          • memory/6436-841-0x00000000005D0000-0x000000000088E000-memory.dmp

                            Filesize

                            2.7MB

                          • memory/6616-829-0x00000000005E0000-0x00000000008FB000-memory.dmp

                            Filesize

                            3.1MB