Analysis

  • max time kernel
    144s
  • max time network
    152s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20241007-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system
  • submitted
    18-11-2024 08:46

General

  • Target

    c863eb8546899a359928cd392840b340aa4b7789c3ee5823490e39cc12379107.exe

  • Size

    7.1MB

  • MD5

    a1dc552e3a17433628aad00910f3982a

  • SHA1

    764225d46df1203f174cf99e8d957b04149d7a7a

  • SHA256

    c863eb8546899a359928cd392840b340aa4b7789c3ee5823490e39cc12379107

  • SHA512

    194430870c1961af938a5effe9bfca7a8b17e9cd95ed126c179ea754f9a8bc550d7c6e8767faecd18bac9a1bd555b35f5d296f20b2e5bf2282a81512d4049e20

  • SSDEEP

    196608:u6NwiCM18fEEL8KprZLUZODc8sU1uAkL5pTapPw:xw3+QH5Xo83uAEm4

Malware Config

Extracted

Family

amadey

Version

4.42

Botnet

9c9aa5

C2

http://185.215.113.43

Attributes
  • install_dir

    abc3bc1985

  • install_file

    skotes.exe

  • strings_key

    8a35cf2ea38c2817dba29a4b5b25dcf0

  • url_paths

    /Zu7JuNko/index.php

rc4.plain

Extracted

Family

lumma

C2

https://processhol.sbs/api

https://p10tgrace.sbs/api

https://peepburry828.sbs/api

https://3xp3cts1aim.sbs/api

https://p3ar11fter.sbs/api

Signatures

  • Amadey

    Amadey bot is a simple trojan bot primarily used for collecting reconnaissance information.

  • Amadey family
  • Lumma Stealer, LummaC

    Lumma or LummaC is an infostealer written in C++ first seen in August 2022.

  • Lumma family
  • Modifies Windows Defender Real-time Protection settings 3 TTPs 11 IoCs
  • Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs 10 IoCs
  • Downloads MZ/PE file
  • Checks BIOS information in registry 2 TTPs 20 IoCs

    BIOS information is often read in order to detect sandboxing environments.

  • Checks computer location settings 2 TTPs 2 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Executes dropped EXE 13 IoCs
  • Identifies Wine through registry keys 2 TTPs 10 IoCs

    Wine is a compatibility layer capable of running Windows applications, which can be used as sandboxing environment.

  • Windows security modification 2 TTPs 3 IoCs
  • Adds Run key to start application 2 TTPs 7 IoCs
  • AutoIT Executable 1 IoCs

    AutoIT scripts compiled to PE executables.

  • Suspicious use of NtSetInformationThreadHideFromDebugger 10 IoCs
  • Drops file in Windows directory 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Location Discovery: System Language Discovery 1 TTPs 17 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Checks processor information in registry 2 TTPs 8 IoCs

    Processor information is often read in order to detect sandboxing environments.

  • Kills process with taskkill 5 IoCs
  • Modifies registry class 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 29 IoCs
  • Suspicious use of AdjustPrivilegeToken 9 IoCs
  • Suspicious use of FindShellTrayWindow 32 IoCs
  • Suspicious use of SendNotifyMessage 30 IoCs
  • Suspicious use of SetWindowsHookEx 1 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs
  • Uses Task Scheduler COM API 1 TTPs

    The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.

Processes

  • C:\Users\Admin\AppData\Local\Temp\c863eb8546899a359928cd392840b340aa4b7789c3ee5823490e39cc12379107.exe
    "C:\Users\Admin\AppData\Local\Temp\c863eb8546899a359928cd392840b340aa4b7789c3ee5823490e39cc12379107.exe"
    1⤵
    • Adds Run key to start application
    • System Location Discovery: System Language Discovery
    • Suspicious use of WriteProcessMemory
    PID:1792
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\S6M19.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\S6M19.exe
      2⤵
      • Executes dropped EXE
      • Adds Run key to start application
      • System Location Discovery: System Language Discovery
      • Suspicious use of WriteProcessMemory
      PID:1172
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\Y4Y93.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\Y4Y93.exe
        3⤵
        • Executes dropped EXE
        • Adds Run key to start application
        • System Location Discovery: System Language Discovery
        • Suspicious use of WriteProcessMemory
        PID:5008
        • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\1z99y4.exe
          C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\1z99y4.exe
          4⤵
          • Identifies VirtualBox via ACPI registry values (likely anti-VM)
          • Checks BIOS information in registry
          • Checks computer location settings
          • Executes dropped EXE
          • Identifies Wine through registry keys
          • Suspicious use of NtSetInformationThreadHideFromDebugger
          • Drops file in Windows directory
          • System Location Discovery: System Language Discovery
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of FindShellTrayWindow
          • Suspicious use of WriteProcessMemory
          PID:2976
          • C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe
            "C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe"
            5⤵
            • Identifies VirtualBox via ACPI registry values (likely anti-VM)
            • Checks BIOS information in registry
            • Checks computer location settings
            • Executes dropped EXE
            • Identifies Wine through registry keys
            • Adds Run key to start application
            • Suspicious use of NtSetInformationThreadHideFromDebugger
            • System Location Discovery: System Language Discovery
            • Suspicious behavior: EnumeratesProcesses
            • Suspicious use of WriteProcessMemory
            PID:4652
            • C:\Users\Admin\AppData\Local\Temp\1007113001\61e4f729f4.exe
              "C:\Users\Admin\AppData\Local\Temp\1007113001\61e4f729f4.exe"
              6⤵
              • Identifies VirtualBox via ACPI registry values (likely anti-VM)
              • Checks BIOS information in registry
              • Executes dropped EXE
              • Identifies Wine through registry keys
              • Suspicious use of NtSetInformationThreadHideFromDebugger
              • System Location Discovery: System Language Discovery
              • Suspicious behavior: EnumeratesProcesses
              PID:4672
            • C:\Users\Admin\AppData\Local\Temp\1007114001\19ac636a10.exe
              "C:\Users\Admin\AppData\Local\Temp\1007114001\19ac636a10.exe"
              6⤵
              • Identifies VirtualBox via ACPI registry values (likely anti-VM)
              • Checks BIOS information in registry
              • Executes dropped EXE
              • Identifies Wine through registry keys
              • Suspicious use of NtSetInformationThreadHideFromDebugger
              • System Location Discovery: System Language Discovery
              • Suspicious behavior: EnumeratesProcesses
              PID:3664
            • C:\Users\Admin\AppData\Local\Temp\1007115001\da661e59e2.exe
              "C:\Users\Admin\AppData\Local\Temp\1007115001\da661e59e2.exe"
              6⤵
              • Executes dropped EXE
              • System Location Discovery: System Language Discovery
              • Suspicious behavior: EnumeratesProcesses
              • Suspicious use of FindShellTrayWindow
              • Suspicious use of SendNotifyMessage
              • Suspicious use of WriteProcessMemory
              PID:1928
              • C:\Windows\SysWOW64\taskkill.exe
                taskkill /F /IM firefox.exe /T
                7⤵
                • System Location Discovery: System Language Discovery
                • Kills process with taskkill
                • Suspicious use of AdjustPrivilegeToken
                PID:3124
              • C:\Windows\SysWOW64\taskkill.exe
                taskkill /F /IM chrome.exe /T
                7⤵
                • System Location Discovery: System Language Discovery
                • Kills process with taskkill
                • Suspicious use of AdjustPrivilegeToken
                PID:4052
              • C:\Windows\SysWOW64\taskkill.exe
                taskkill /F /IM msedge.exe /T
                7⤵
                • System Location Discovery: System Language Discovery
                • Kills process with taskkill
                • Suspicious use of AdjustPrivilegeToken
                PID:2424
              • C:\Windows\SysWOW64\taskkill.exe
                taskkill /F /IM opera.exe /T
                7⤵
                • System Location Discovery: System Language Discovery
                • Kills process with taskkill
                • Suspicious use of AdjustPrivilegeToken
                PID:1556
              • C:\Windows\SysWOW64\taskkill.exe
                taskkill /F /IM brave.exe /T
                7⤵
                • System Location Discovery: System Language Discovery
                • Kills process with taskkill
                • Suspicious use of AdjustPrivilegeToken
                PID:840
              • C:\Program Files\Mozilla Firefox\firefox.exe
                "C:\Program Files\Mozilla Firefox\firefox.exe" --kiosk "https://youtube.com/account?=https://accounts.google.com/v3/signin/challenge/pwd" --no-default-browser-check --disable-popup-blocking
                7⤵
                • Suspicious use of WriteProcessMemory
                PID:2024
                • C:\Program Files\Mozilla Firefox\firefox.exe
                  "C:\Program Files\Mozilla Firefox\firefox.exe" --kiosk https://youtube.com/account?=https://accounts.google.com/v3/signin/challenge/pwd --no-default-browser-check --disable-popup-blocking
                  8⤵
                  • Checks processor information in registry
                  • Modifies registry class
                  • Suspicious use of AdjustPrivilegeToken
                  • Suspicious use of FindShellTrayWindow
                  • Suspicious use of SendNotifyMessage
                  • Suspicious use of SetWindowsHookEx
                  • Suspicious use of WriteProcessMemory
                  PID:4860
                  • C:\Program Files\Mozilla Firefox\firefox.exe
                    "C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=2076 -parentBuildID 20240401114208 -prefsHandle 2012 -prefMapHandle 1716 -prefsLen 23680 -prefMapSize 244658 -appDir "C:\Program Files\Mozilla Firefox\browser" - {f6bc90d4-7dfa-4414-868e-4f5ca5a80161} 4860 "\\.\pipe\gecko-crash-server-pipe.4860" gpu
                    9⤵
                      PID:4564
                    • C:\Program Files\Mozilla Firefox\firefox.exe
                      "C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=2512 -parentBuildID 20240401114208 -prefsHandle 2504 -prefMapHandle 2500 -prefsLen 24600 -prefMapSize 244658 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {67329d14-ab0d-4e7a-a11e-9fffbae1fc94} 4860 "\\.\pipe\gecko-crash-server-pipe.4860" socket
                      9⤵
                        PID:1752
                      • C:\Program Files\Mozilla Firefox\firefox.exe
                        "C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=3376 -childID 1 -isForBrowser -prefsHandle 3156 -prefMapHandle 3396 -prefsLen 22652 -prefMapSize 244658 -jsInitHandle 936 -jsInitLen 234952 -parentBuildID 20240401114208 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {cc37177b-92f1-415a-8e7c-3090e28ef44b} 4860 "\\.\pipe\gecko-crash-server-pipe.4860" tab
                        9⤵
                          PID:1936
                        • C:\Program Files\Mozilla Firefox\firefox.exe
                          "C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=3920 -childID 2 -isForBrowser -prefsHandle 3912 -prefMapHandle 3400 -prefsLen 29090 -prefMapSize 244658 -jsInitHandle 936 -jsInitLen 234952 -parentBuildID 20240401114208 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {af84712b-faca-4211-a393-672407e4e16d} 4860 "\\.\pipe\gecko-crash-server-pipe.4860" tab
                          9⤵
                            PID:2308
                          • C:\Program Files\Mozilla Firefox\firefox.exe
                            "C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=4888 -parentBuildID 20240401114208 -sandboxingKind 0 -prefsHandle 4880 -prefMapHandle 4876 -prefsLen 29090 -prefMapSize 244658 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {d13f2c7b-13f5-4b4f-98bf-bc6ca7a4a4ea} 4860 "\\.\pipe\gecko-crash-server-pipe.4860" utility
                            9⤵
                            • Checks processor information in registry
                            PID:6656
                          • C:\Program Files\Mozilla Firefox\firefox.exe
                            "C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=5328 -childID 3 -isForBrowser -prefsHandle 5448 -prefMapHandle 5444 -prefsLen 27132 -prefMapSize 244658 -jsInitHandle 936 -jsInitLen 234952 -parentBuildID 20240401114208 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {19a64cbb-18bd-424c-82ea-1d5630137591} 4860 "\\.\pipe\gecko-crash-server-pipe.4860" tab
                            9⤵
                              PID:5012
                            • C:\Program Files\Mozilla Firefox\firefox.exe
                              "C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=5664 -childID 4 -isForBrowser -prefsHandle 5584 -prefMapHandle 5588 -prefsLen 27132 -prefMapSize 244658 -jsInitHandle 936 -jsInitLen 234952 -parentBuildID 20240401114208 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {72949539-0713-4e9c-bc03-32456f55b632} 4860 "\\.\pipe\gecko-crash-server-pipe.4860" tab
                              9⤵
                                PID:3336
                              • C:\Program Files\Mozilla Firefox\firefox.exe
                                "C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=5856 -childID 5 -isForBrowser -prefsHandle 5780 -prefMapHandle 5784 -prefsLen 27132 -prefMapSize 244658 -jsInitHandle 936 -jsInitLen 234952 -parentBuildID 20240401114208 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {46af5a8f-c23a-464c-ba48-99375da286d6} 4860 "\\.\pipe\gecko-crash-server-pipe.4860" tab
                                9⤵
                                  PID:3452
                          • C:\Users\Admin\AppData\Local\Temp\1007116001\cc1a3ee714.exe
                            "C:\Users\Admin\AppData\Local\Temp\1007116001\cc1a3ee714.exe"
                            6⤵
                            • Modifies Windows Defender Real-time Protection settings
                            • Identifies VirtualBox via ACPI registry values (likely anti-VM)
                            • Checks BIOS information in registry
                            • Executes dropped EXE
                            • Identifies Wine through registry keys
                            • Windows security modification
                            • Suspicious use of NtSetInformationThreadHideFromDebugger
                            • System Location Discovery: System Language Discovery
                            • Suspicious behavior: EnumeratesProcesses
                            • Suspicious use of AdjustPrivilegeToken
                            PID:4140
                      • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\2Y7734.exe
                        C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\2Y7734.exe
                        4⤵
                        • Identifies VirtualBox via ACPI registry values (likely anti-VM)
                        • Checks BIOS information in registry
                        • Executes dropped EXE
                        • Identifies Wine through registry keys
                        • Suspicious use of NtSetInformationThreadHideFromDebugger
                        • System Location Discovery: System Language Discovery
                        • Suspicious behavior: EnumeratesProcesses
                        PID:4020
                    • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\3k44m.exe
                      C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\3k44m.exe
                      3⤵
                      • Identifies VirtualBox via ACPI registry values (likely anti-VM)
                      • Checks BIOS information in registry
                      • Executes dropped EXE
                      • Identifies Wine through registry keys
                      • Suspicious use of NtSetInformationThreadHideFromDebugger
                      • System Location Discovery: System Language Discovery
                      • Suspicious behavior: EnumeratesProcesses
                      PID:1240
                  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\4T324V.exe
                    C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\4T324V.exe
                    2⤵
                    • Modifies Windows Defender Real-time Protection settings
                    • Identifies VirtualBox via ACPI registry values (likely anti-VM)
                    • Checks BIOS information in registry
                    • Executes dropped EXE
                    • Identifies Wine through registry keys
                    • Windows security modification
                    • Suspicious use of NtSetInformationThreadHideFromDebugger
                    • System Location Discovery: System Language Discovery
                    • Suspicious behavior: EnumeratesProcesses
                    • Suspicious use of AdjustPrivilegeToken
                    PID:3696
                • C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe
                  C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe
                  1⤵
                  • Identifies VirtualBox via ACPI registry values (likely anti-VM)
                  • Checks BIOS information in registry
                  • Executes dropped EXE
                  • Identifies Wine through registry keys
                  • Suspicious use of NtSetInformationThreadHideFromDebugger
                  • Suspicious behavior: EnumeratesProcesses
                  PID:4468
                • C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe
                  C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe
                  1⤵
                  • Identifies VirtualBox via ACPI registry values (likely anti-VM)
                  • Checks BIOS information in registry
                  • Executes dropped EXE
                  • Identifies Wine through registry keys
                  • Suspicious use of NtSetInformationThreadHideFromDebugger
                  • Suspicious behavior: EnumeratesProcesses
                  PID:7124

                Network

                MITRE ATT&CK Enterprise v15

                Replay Monitor

                Loading Replay Monitor...

                Downloads

                • C:\Users\Admin\AppData\Local\Mozilla\Firefox\Profiles\yuzka873.default-release\activity-stream.discovery_stream.json

                  Filesize

                  19KB

                  MD5

                  493b30149f7ee97d8e9b31fe4c032471

                  SHA1

                  c16f8c9547eb6410255c870fc802c06292608797

                  SHA256

                  71332a9338f4e7bde28b1a3ce70309be70c2f154e90d73ad2f96ae55cca12d8f

                  SHA512

                  65725c7501e92618ff223713b495b8de7bbf9b9669a0c2f62048f5cb53b81d546bf885765a5dc5ba8751aea89e54a0b230c66ff1895c6325be872dd5daff2e28

                • C:\Users\Admin\AppData\Local\Mozilla\Firefox\Profiles\yuzka873.default-release\cache2\entries\39DB9E847E680B765D7B04FCCE6BF5BC0225F878

                  Filesize

                  13KB

                  MD5

                  6a9e09668f6779198a636946252859a6

                  SHA1

                  9c647077b1d9a5c10a788c50811fd6f21cc28b77

                  SHA256

                  55187432d060e20b8d4308b41924cfc254f6a7a3cd3e78c52640cb677e555809

                  SHA512

                  fa49e983fd38f33e88892a1714593059f13d346c10ddc100238b0df0c6fa59243106076de5fbe315bebdb29d6addb5038142fb79e4e641bbf7b4b6078420eaf0

                • C:\Users\Admin\AppData\Local\Temp\1007113001\61e4f729f4.exe

                  Filesize

                  1.7MB

                  MD5

                  2fe2ab5b511de6ef48e3eba0378f3e12

                  SHA1

                  c350d71c99c8c079714e71c219c706c6716a22aa

                  SHA256

                  ab2e92bf1d70567a32aef956b7d64cbe4d49dadf779fc6d455674fab35509b14

                  SHA512

                  4beb110952f7f3d6f351149448344f0e5918694bfa3fa958e08690999e16f270abd32100e2d844c5a13564e4c8fd664d17882979e6ca567111983ef62ee4768e

                • C:\Users\Admin\AppData\Local\Temp\1007114001\19ac636a10.exe

                  Filesize

                  1.7MB

                  MD5

                  13a85c121414fb45d5693a9ab8910086

                  SHA1

                  040b4aa8746c65929784f80116bb13c7f125ddb2

                  SHA256

                  de0db7603189d02c7051013fe43244a3e86fbd2a884a733a64fed84836912e0c

                  SHA512

                  9c9d7a5e6cf4d76a79870b62a37984783c0ec174b7f2e4557154cd0632d6e2ee7943d9ecc6149eb09277ee1dff4d8eb2692ce60934d69eae97f80451344dc5d6

                • C:\Users\Admin\AppData\Local\Temp\1007115001\da661e59e2.exe

                  Filesize

                  900KB

                  MD5

                  5ce51bebf5df5616c0afad430b705cda

                  SHA1

                  97b05e3b842ea60a341e600c12110092a27240cc

                  SHA256

                  65177fb5a41a621039697bb1c2559cfb544bead0f3a91722008f425fbe89e261

                  SHA512

                  c141267589f896649c97dae327c98e2abfc5de85c06917a00062acc7bb4e42da94085ea1f6b70f6c8dba4ef1725ae9bf0b64747792f80c824d99eef1f23e7ee8

                • C:\Users\Admin\AppData\Local\Temp\1007116001\cc1a3ee714.exe

                  Filesize

                  2.6MB

                  MD5

                  bea1589178b4eda7c5b15d47b076f6bd

                  SHA1

                  81a654fe6ca77c26d0c87d9f8fe1786c4ee4582d

                  SHA256

                  336b2204ee1f34c545ac54145a9db9f548ee478708fe1bc22c679fb037063068

                  SHA512

                  d8ed0c2b19b94aeb4aed0d2e7525cb3eb8289b9da0d4df8c1b24340060976233af90861fca9ecf259c7cbe40775d1f8fa6ff814bdc542abd9381497ee60d9d98

                • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\4T324V.exe

                  Filesize

                  2.7MB

                  MD5

                  9051af3633c66487d63cb8530601e571

                  SHA1

                  3dc1589d11228fe095a1fe609019f0f6260f3727

                  SHA256

                  ffe17c4f7d5290ce0aa4336bb5d01e0ec61e26dadf1ea63cab06ed1d45d3a40d

                  SHA512

                  44f9e436cc0a7f6ca71f7d3aba6e4c656f97869aa5aaa17827c9401fc3b4dd7e6b7ab710eb3b4dc8c4f0685673840314d5b1b2c35daaab1f922dcb27a80bd096

                • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\S6M19.exe

                  Filesize

                  5.5MB

                  MD5

                  cfc4bbca45c2bb5ccd797dc01f2330d6

                  SHA1

                  78e256cd150e3a48cfa1397f300451b776561216

                  SHA256

                  6c208f987efbfb3d729c5bc272adae27ea3415ec2da20dce6009b6d0f96f3ada

                  SHA512

                  1e551f4a2e88d0afc5763860b28c95767541cecbc748a4ba612c21a6081825b04aee752983ed69fe7d40c0b7f261960cc024172c385fa31c8d1530506895302b

                • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\3k44m.exe

                  Filesize

                  1.7MB

                  MD5

                  933db1979eee125501d5041ff0a81100

                  SHA1

                  8c4e616530fc14b0b93070987dfffc519ec46fc2

                  SHA256

                  cb2359039ddc3d53fdc47eaef40afeb7e4bc7895b90d15586a4ce5a9aa00452c

                  SHA512

                  f5f4c5bb33265ba8f0faa5940f8f48443d9f08fbc5cfc365131428ac6f625ec190f8bcaf6c6ffb941ea90bcb117a0424685919b9b6d04326e2028a572fc374a3

                • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\Y4Y93.exe

                  Filesize

                  3.7MB

                  MD5

                  c53c74a232e89b943fa38cf482473ca6

                  SHA1

                  18ebb4dcf8c9fcf6c0a58a413a47a105ba12f82c

                  SHA256

                  ce1682428fe3d33ac0e6abd335f878cb62aa98c32fa4bba9ded1e94671606785

                  SHA512

                  76703bba7639b014f320f2ddb984822756631a4a7ab1b36886dfd89ea89dc43b6be4b779cc3a750b4fbe6d2eac34b81f5ff3a356c2113e42dc14c87631f1a1be

                • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\1z99y4.exe

                  Filesize

                  1.9MB

                  MD5

                  9992a20add6571ce7c2b357b425e5445

                  SHA1

                  a454d9baa02de82903caeb14be6f1b74f47feb3d

                  SHA256

                  4fd36ad0a4b7187d3996709416a9e59558f8855248a54abe6316d7c004c17aeb

                  SHA512

                  d7448c82fa25850aecca0299638c03618443e14d91a2cd113936a54d85b30cbd95e47ae17ab65ac18055d65e95ca12e08c246de28a7362bbf1e39783d7fcc38a

                • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\2Y7734.exe

                  Filesize

                  1.8MB

                  MD5

                  0a8eeec9b77d4d4ea4e987ef55ff8295

                  SHA1

                  d570b90b86f0d64efdd577a7140c9a54407fbd6b

                  SHA256

                  e3bddf483a9abcd5df07b13cb6007c030a0467c85876d58aa9ab52dd2e2583c3

                  SHA512

                  3c078b58865d17a9090771c05cb186537eb8ee694de386c6b39079bf13482ead794944759ef42ba428dc60f4625eb7497509966ff10a9768a67829d9ee045aab

                • C:\Users\Admin\AppData\Local\Temp\tmpaddon

                  Filesize

                  479KB

                  MD5

                  09372174e83dbbf696ee732fd2e875bb

                  SHA1

                  ba360186ba650a769f9303f48b7200fb5eaccee1

                  SHA256

                  c32efac42faf4b9878fb8917c5e71d89ff40de580c4f52f62e11c6cfab55167f

                  SHA512

                  b667086ed49579592d435df2b486fe30ba1b62ddd169f19e700cd079239747dd3e20058c285fa9c10a533e34f22b5198ed9b1f92ae560a3067f3e3feacc724f1

                • C:\Users\Admin\AppData\Local\Temp\tmpaddon-1

                  Filesize

                  13.8MB

                  MD5

                  0a8747a2ac9ac08ae9508f36c6d75692

                  SHA1

                  b287a96fd6cc12433adb42193dfe06111c38eaf0

                  SHA256

                  32d544baf2facc893057a1d97db33207e642f0dacf235d8500a0b5eff934ce03

                  SHA512

                  59521f8c61236641b3299ab460c58c8f5f26fa67e828de853c2cf372f9614d58b9f541aae325b1600ec4f3a47953caacb8122b0dfce7481acfec81045735947d

                • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\yuzka873.default-release\AlternateServices.bin

                  Filesize

                  6KB

                  MD5

                  521a2b823a2456715733face923fb41f

                  SHA1

                  1c5acce0370a2fa5fbb91b39a49a148e43d79603

                  SHA256

                  ad6e37bfd6b469afa00734768ff4bf118256f235fc0c1a3f03befd2ed50fb8ea

                  SHA512

                  2643638631acaeac625534b2b7cf9c5a0494ef2e8860ffad3f20b59615d7196dd75009ab7b42dc835248be49b0baec61c4413297314ecc56b80c4a95ec57602e

                • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\yuzka873.default-release\AlternateServices.bin

                  Filesize

                  8KB

                  MD5

                  e6000eac394022532a65a69cb57872bf

                  SHA1

                  6c309842beb386421998ba2c5e05649f146e557e

                  SHA256

                  2633f69f1336d8854822bc6cf48ae80fe4153867819d70666c127d41b55418c5

                  SHA512

                  70b77308c92018bb87f943e3c2e0308cdede4289c5934a5603c66136b5bebf631cc17b69685e14ec989fcad3c8ffa0a3c3644eb3dc399a0a5cd2617497a0c5c4

                • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\yuzka873.default-release\datareporting\glean\db\data.safe.bin

                  Filesize

                  23KB

                  MD5

                  1ab6ed9368c9777411ff7113fc01162a

                  SHA1

                  9cc3b3a3477d2932a9465ea969d149766c3b0fcc

                  SHA256

                  89bfaff2b38676c60438901ff6aed1c47f9c2b41e4682c4acc4e47e5ded8bf28

                  SHA512

                  203f9e180bf2609e7b0d29093ef180356c538c37606044d2028aa908d67201181b8dcda9e1f30544aba3b79dd613a6a02a86cd3993e188200d651363c6b38950

                • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\yuzka873.default-release\datareporting\glean\db\data.safe.bin

                  Filesize

                  5KB

                  MD5

                  e7f2a1aab4ed3fd63e14b1da2a5cf87e

                  SHA1

                  9085c24f5c92be7cfd3e4e7d0619e2c2bdcfc46a

                  SHA256

                  f8cd9c57e45005ca437fd070657d37ad932f26442609b00c1b35ebe172425dee

                  SHA512

                  5bc2dfb7efb6c6669ac190e620c8b39091136c1c7de7454da7b9dfc9abb77566cd71f8725db871dc237328847ea6a8f610eed812f47405bb9b6c0961dd118bae

                • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\yuzka873.default-release\datareporting\glean\db\data.safe.bin

                  Filesize

                  15KB

                  MD5

                  295bdea0995ab93bd30baab018bf29d5

                  SHA1

                  8e1fd756fad90fb29b1418f8601edcab3b6a6fa1

                  SHA256

                  2e669ebe9b03a8333c90b20ed9c42daac6f91ae798bc789f78c829e6feecd866

                  SHA512

                  256b9697fa81b6f3a3b81e8e5c0f9e9825f1ac0eabab4c87db470ce2066f86891a5e834180cbbe04382c14df5067c5ad6e711df3c08e2fe923c4ab10e6446459

                • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\yuzka873.default-release\datareporting\glean\db\data.safe.bin

                  Filesize

                  15KB

                  MD5

                  ebc21e10b740d78441fc96c6bc63834b

                  SHA1

                  1baa278d6035695c2368ce7cee4d945be45ba29f

                  SHA256

                  8923c94bb9c7f98dd4ccee423daa3f74e73573a87b7a1ca1cbf99bbfa077d0b3

                  SHA512

                  d1b27ad6a8758bb40ee6e6b29f7379d840da7b3bab20118a215cb84c34d5f12266a3d135e6a48402fa4f0e589987e2413614b80381c74834d9e04113b4e07f32

                • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\yuzka873.default-release\datareporting\glean\db\data.safe.tmp

                  Filesize

                  5KB

                  MD5

                  b5cba7b21e3d3d8df6f98e1fe823659d

                  SHA1

                  15d1b49fcf2565f1fb26ef9875f7c57c6af883b3

                  SHA256

                  85394a7dd08a68fcfec86a9200543f67c0c02b1598ee8276d10c7a11965a7fa3

                  SHA512

                  0dfb3c816a5ffcdcbbad68361056bb1d5a168a4db447ed88d95d2b73e0cd6be062978e4f6f51c89bdf07256a38bb9cedbb02746a10cb833c221502074475d077

                • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\yuzka873.default-release\datareporting\glean\db\data.safe.tmp

                  Filesize

                  15KB

                  MD5

                  28c504f22db13a9fbea209bb8a41e02a

                  SHA1

                  59009fe800618a5c26e055c61160508d411a05df

                  SHA256

                  71e06e0efd0f75bba84e62dd065ba167190c740b0eaa970bca01821e95e21a54

                  SHA512

                  87fc43509429fc88771e6b0c7fb011d1937f20a91552676ff78b228e8b8cdd80d7ee225837d195de9aa99172d9b054c061678d5dfe1ef3010f59057db3adebbc

                • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\yuzka873.default-release\datareporting\glean\db\data.safe.tmp

                  Filesize

                  6KB

                  MD5

                  bd52384135f8dfb1bf0c64ea8c586445

                  SHA1

                  5c9d4493bf60ba5f1b494306157d113e2b2f596e

                  SHA256

                  c15d4dc172a700471db09a03df095a0a1b7a7792494ddf93756b5e98dc339fa9

                  SHA512

                  b986260ac3a95a6eb080a4d46ea13218042367e304681d0f23762ce79f1cd4b2fb748b141a0521f2d3266d8f26d50865783b7659d3d355f96fb8fef6eddd614e

                • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\yuzka873.default-release\datareporting\glean\db\data.safe.tmp

                  Filesize

                  15KB

                  MD5

                  be0af2345d072d5657dbc194f8eede20

                  SHA1

                  22f1c7f523a6a21f2d46eaefe412f8be3e357be1

                  SHA256

                  b050f0430c3553916a526bb829963ebefae49842b7985d45a2ff088f5a16bc1b

                  SHA512

                  9b4f44cda5a7cad6405380054eec58e375192dc3c0abcdb909bb320a76a6c5693750b931dbef36953d62ff79d42d5b749d67a4162656592727e6a61870f0f1b7

                • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\yuzka873.default-release\datareporting\glean\pending_pings\5689aff3-a08b-4ee2-a84e-6dc1e71c32f0

                  Filesize

                  982B

                  MD5

                  f85540d1663b85f1b3716508e7ab0a15

                  SHA1

                  14c033295b49c05ee1c4428c0c01383d9498194d

                  SHA256

                  5ea0429320510eadd8984a5e6010d2e2f8fadc5759a44ae49640c91c03c05198

                  SHA512

                  1cd35d63b1ef056aa7aaca4c56ccef128f4b3f8bac724568cbd417881ca24694f05de6a554b4cfc96210b2dbea4c43966a0f38eb93d6af0825f3a6e141c86a8a

                • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\yuzka873.default-release\datareporting\glean\pending_pings\6530a683-6a7f-494b-aadd-c2bc2d9608a8

                  Filesize

                  27KB

                  MD5

                  c9464758c9ea823191c013ab36b291c1

                  SHA1

                  1da362e12ab7dd5dba98a1bfa11e95c01d628f6d

                  SHA256

                  6174e5884fe8597d6a54910343692b11f5a28f2529c6084d159c286d3cbf2120

                  SHA512

                  a32d688e6a1228254c0cd61105bd885a39e0e6de615b36443c0156116cbe650d07c752777a2fa36965daaca882f22bddd021be08f9e4b97b78eb05bc374c5af2

                • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\yuzka873.default-release\datareporting\glean\pending_pings\d89e791f-dd28-424c-9178-6f1cd88d6701

                  Filesize

                  671B

                  MD5

                  ee71f351cce0e0fe5f6000a20d2894d5

                  SHA1

                  68618fca0c74105e86722ee5ce1dcdd553ba0272

                  SHA256

                  c5dca9007851b4296fac91662828dca03e9010e5414fb1d634f292d7641ee64f

                  SHA512

                  e01f0b47a7f78bbc0e98587e96c21b7eeefa3901b39469d1f1972861cfcb50204c61133934970ea3dffacd96b46a93acc0f3772283b6f5cab5d79e5440bc9a71

                • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\yuzka873.default-release\gmp-gmpopenh264\2.3.2\gmpopenh264.dll

                  Filesize

                  1.1MB

                  MD5

                  842039753bf41fa5e11b3a1383061a87

                  SHA1

                  3e8fe1d7b3ad866b06dca6c7ef1e3c50c406e153

                  SHA256

                  d88dd3bfc4a558bb943f3caa2e376da3942e48a7948763bf9a38f707c2cd0c1c

                  SHA512

                  d3320f7ac46327b7b974e74320c4d853e569061cb89ca849cd5d1706330aca629abeb4a16435c541900d839f46ff72dfde04128c450f3e1ee63c025470c19157

                • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\yuzka873.default-release\gmp-gmpopenh264\2.3.2\gmpopenh264.info

                  Filesize

                  116B

                  MD5

                  2a461e9eb87fd1955cea740a3444ee7a

                  SHA1

                  b10755914c713f5a4677494dbe8a686ed458c3c5

                  SHA256

                  4107f76ba1d9424555f4e8ea0acef69357dfff89dfa5f0ec72aa4f2d489b17bc

                  SHA512

                  34f73f7bf69d7674907f190f257516e3956f825e35a2f03d58201a5a630310b45df393f2b39669f9369d1ac990505a4b6849a0d34e8c136e1402143b6cedf2d3

                • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\yuzka873.default-release\gmp-widevinecdm\4.10.2710.0\manifest.json

                  Filesize

                  372B

                  MD5

                  bf957ad58b55f64219ab3f793e374316

                  SHA1

                  a11adc9d7f2c28e04d9b35e23b7616d0527118a1

                  SHA256

                  bbab6ca07edbed72a966835c7907b3e60c7aa3d48ddea847e5076bd05f4b1eda

                  SHA512

                  79c179b56e4893fb729b225818ab4b95a50b69666ac41d17aad0b37ab0ca8cd9f0848cbc3c5d9e69e4640a8b261d7ced592eae9bcb0e0b63c05a56e7c477f44e

                • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\yuzka873.default-release\gmp-widevinecdm\4.10.2710.0\widevinecdm.dll

                  Filesize

                  17.8MB

                  MD5

                  daf7ef3acccab478aaa7d6dc1c60f865

                  SHA1

                  f8246162b97ce4a945feced27b6ea114366ff2ad

                  SHA256

                  bc40c7821dcd3fea9923c6912ab1183a942c11b7690cfd79ed148ded0228777e

                  SHA512

                  5840a45cfdb12c005e117608b1e5d946e1b2e76443ed39ba940d7f56de4babeab09bee7e64b903eb82bb37624c0a0ef19e9b59fbe2ce2f0e0b1c7a6015a63f75

                • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\yuzka873.default-release\prefs-1.js

                  Filesize

                  12KB

                  MD5

                  4c1fc0932c56394110f7fb8dddf241d2

                  SHA1

                  2e494283e1e91924bf4789ec454dc66a18c459a3

                  SHA256

                  fe7a8dbc2c5db9cac706acda0e5c526b937b06cd4240ad4b93f5d3cbab72ffe8

                  SHA512

                  41be95b5ffd360330752528a85d585b8253243e91dda0574cc99f6f8d18b9d4b035eb721b9a2817b5fa3201b1028867e645c61712119c5a1a1cd203ed713df67

                • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\yuzka873.default-release\prefs-1.js

                  Filesize

                  11KB

                  MD5

                  d8b220493b737aa1581c8d8daea34da3

                  SHA1

                  6c6e1639cc6e77ab1db4efef5d0c1a92b8f498ef

                  SHA256

                  83929421cf75e40e83cf2feeb4bab362c65984207a8fc2637b733e06450ef96b

                  SHA512

                  d5578577d7219eea7962caa40f0bd6fbda3ba7b62afef185192a4653e87b8093d9e4858cd337ca72fe3a41d2dba581b051f615a4ed60c6eb9adcb0d803978041

                • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\yuzka873.default-release\prefs-1.js

                  Filesize

                  16KB

                  MD5

                  332cfcd93cf6b22b92753c3e3753f3d5

                  SHA1

                  98ace9d4c0b4ae5a2fb8e4ff2c21bad82cd12717

                  SHA256

                  26839d197d2416d25648fbe2b620626ee9ab82516b55af20070b9a499bd20111

                  SHA512

                  0c00b69dc45fd8354abff08c11eab81ba444234408ba331b304f89c08e91443c95599c6b9b604f2546759258d218b563b412790281d9f7fd181adeebca404956

                • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\yuzka873.default-release\prefs.js

                  Filesize

                  10KB

                  MD5

                  7365da68cd6493caf9f5fc2f52f7d90f

                  SHA1

                  2e8fb693c61ef019e31133801930aa7464e1e7b7

                  SHA256

                  245a575151822ac66230e3b3cd412a49f99b2820223b17787c42a0a568dd46e9

                  SHA512

                  6c0d5a8a044ffd9c6063bcb3d280a407adf734443076d2790a61ff15f41fc8093bfc592e2ebb47d2049666564462a30947a9073d3920e3cf09d66820c9bd7789

                • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\yuzka873.default-release\prefs.js

                  Filesize

                  11KB

                  MD5

                  79fcebadd774d039c02f9a494f54886d

                  SHA1

                  f1f23c308cb1d49ce8edee1730ba1279ad140f52

                  SHA256

                  851ba9a11de3392ae362a338fbda7203722e8ce5cf04b66e165fe7a324a6f0f8

                  SHA512

                  05c8d550e4278ec05796c9631961118c976f35662d98000d9d7f90553d5db0721239e171f73d9e904225ae3d244c46686eb91c2d46c6d676c711b93567954dce

                • memory/1240-96-0x0000000000040000-0x00000000006C2000-memory.dmp

                  Filesize

                  6.5MB

                • memory/1240-98-0x0000000000040000-0x00000000006C2000-memory.dmp

                  Filesize

                  6.5MB

                • memory/2976-33-0x0000000000660000-0x0000000000B34000-memory.dmp

                  Filesize

                  4.8MB

                • memory/2976-21-0x0000000000660000-0x0000000000B34000-memory.dmp

                  Filesize

                  4.8MB

                • memory/3664-74-0x0000000000A60000-0x00000000010E8000-memory.dmp

                  Filesize

                  6.5MB

                • memory/3664-76-0x0000000000A60000-0x00000000010E8000-memory.dmp

                  Filesize

                  6.5MB

                • memory/3696-103-0x0000000000870000-0x0000000000B22000-memory.dmp

                  Filesize

                  2.7MB

                • memory/3696-127-0x0000000000870000-0x0000000000B22000-memory.dmp

                  Filesize

                  2.7MB

                • memory/3696-130-0x0000000000870000-0x0000000000B22000-memory.dmp

                  Filesize

                  2.7MB

                • memory/3696-104-0x0000000000870000-0x0000000000B22000-memory.dmp

                  Filesize

                  2.7MB

                • memory/3696-102-0x0000000000870000-0x0000000000B22000-memory.dmp

                  Filesize

                  2.7MB

                • memory/4020-42-0x00000000006F0000-0x0000000000B94000-memory.dmp

                  Filesize

                  4.6MB

                • memory/4020-41-0x00000000006F0000-0x0000000000B94000-memory.dmp

                  Filesize

                  4.6MB

                • memory/4020-82-0x00000000006F0000-0x0000000000B94000-memory.dmp

                  Filesize

                  4.6MB

                • memory/4020-38-0x00000000006F0000-0x0000000000B94000-memory.dmp

                  Filesize

                  4.6MB

                • memory/4020-93-0x00000000006F0000-0x0000000000B94000-memory.dmp

                  Filesize

                  4.6MB

                • memory/4020-78-0x00000000006F0000-0x0000000000B94000-memory.dmp

                  Filesize

                  4.6MB

                • memory/4020-88-0x00000000006F0000-0x0000000000B94000-memory.dmp

                  Filesize

                  4.6MB

                • memory/4020-85-0x00000000006F0000-0x0000000000B94000-memory.dmp

                  Filesize

                  4.6MB

                • memory/4140-903-0x00000000003E0000-0x000000000068C000-memory.dmp

                  Filesize

                  2.7MB

                • memory/4140-894-0x00000000003E0000-0x000000000068C000-memory.dmp

                  Filesize

                  2.7MB

                • memory/4140-683-0x00000000003E0000-0x000000000068C000-memory.dmp

                  Filesize

                  2.7MB

                • memory/4140-157-0x00000000003E0000-0x000000000068C000-memory.dmp

                  Filesize

                  2.7MB

                • memory/4140-684-0x00000000003E0000-0x000000000068C000-memory.dmp

                  Filesize

                  2.7MB

                • memory/4468-90-0x0000000000670000-0x0000000000B44000-memory.dmp

                  Filesize

                  4.8MB

                • memory/4468-91-0x0000000000670000-0x0000000000B44000-memory.dmp

                  Filesize

                  4.8MB

                • memory/4652-40-0x0000000000670000-0x0000000000B44000-memory.dmp

                  Filesize

                  4.8MB

                • memory/4652-77-0x0000000000670000-0x0000000000B44000-memory.dmp

                  Filesize

                  4.8MB

                • memory/4652-3729-0x0000000000670000-0x0000000000B44000-memory.dmp

                  Filesize

                  4.8MB

                • memory/4652-904-0x0000000000670000-0x0000000000B44000-memory.dmp

                  Filesize

                  4.8MB

                • memory/4652-3727-0x0000000000670000-0x0000000000B44000-memory.dmp

                  Filesize

                  4.8MB

                • memory/4652-87-0x0000000000670000-0x0000000000B44000-memory.dmp

                  Filesize

                  4.8MB

                • memory/4652-3721-0x0000000000670000-0x0000000000B44000-memory.dmp

                  Filesize

                  4.8MB

                • memory/4652-84-0x0000000000670000-0x0000000000B44000-memory.dmp

                  Filesize

                  4.8MB

                • memory/4652-3717-0x0000000000670000-0x0000000000B44000-memory.dmp

                  Filesize

                  4.8MB

                • memory/4652-81-0x0000000000670000-0x0000000000B44000-memory.dmp

                  Filesize

                  4.8MB

                • memory/4652-2592-0x0000000000670000-0x0000000000B44000-memory.dmp

                  Filesize

                  4.8MB

                • memory/4652-34-0x0000000000670000-0x0000000000B44000-memory.dmp

                  Filesize

                  4.8MB

                • memory/4652-1064-0x0000000000670000-0x0000000000B44000-memory.dmp

                  Filesize

                  4.8MB

                • memory/4652-868-0x0000000000670000-0x0000000000B44000-memory.dmp

                  Filesize

                  4.8MB

                • memory/4652-39-0x0000000000670000-0x0000000000B44000-memory.dmp

                  Filesize

                  4.8MB

                • memory/4652-107-0x0000000000670000-0x0000000000B44000-memory.dmp

                  Filesize

                  4.8MB

                • memory/4672-58-0x0000000000870000-0x0000000000CFE000-memory.dmp

                  Filesize

                  4.6MB

                • memory/4672-79-0x0000000000870000-0x0000000000CFE000-memory.dmp

                  Filesize

                  4.6MB

                • memory/4672-80-0x0000000000870000-0x0000000000CFE000-memory.dmp

                  Filesize

                  4.6MB

                • memory/4672-83-0x0000000000870000-0x0000000000CFE000-memory.dmp

                  Filesize

                  4.6MB

                • memory/4672-86-0x0000000000870000-0x0000000000CFE000-memory.dmp

                  Filesize

                  4.6MB

                • memory/4672-106-0x0000000000870000-0x0000000000CFE000-memory.dmp

                  Filesize

                  4.6MB

                • memory/4672-92-0x0000000000870000-0x0000000000CFE000-memory.dmp

                  Filesize

                  4.6MB

                • memory/7124-3719-0x0000000000670000-0x0000000000B44000-memory.dmp

                  Filesize

                  4.8MB

                • memory/7124-3720-0x0000000000670000-0x0000000000B44000-memory.dmp

                  Filesize

                  4.8MB