Analysis

  • max time kernel
    120s
  • max time network
    123s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20241007-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system
  • submitted
    29-11-2024 13:23

General

  • Target

    9f787805d8a387f7fe694d1161358ebb715e3453cc64da34eed84244af2ec456N.exe

  • Size

    5.5MB

  • MD5

    34a123cbd776b38a22d659f3fa1e0f00

  • SHA1

    6f7a476d7f4b09ac3468e841d8af52eba0bd2f8e

  • SHA256

    9f787805d8a387f7fe694d1161358ebb715e3453cc64da34eed84244af2ec456

  • SHA512

    90b4027f1fd0c8f9fd59ca66af030d7289074d331f9903e99de1a13d6c4fe6e1aac75d01f77380aafa7833d51f7203533c6f147c128045274254c9ef1336ed10

  • SSDEEP

    98304:QDJZ61g1+k0gKcIXB8TcBUW0Y7x4ZqxgG3f7uoU0DCk8Dqqq2GhbPW23:QtU1Lk0gKl2TaUW0Y7x77Srib33

Malware Config

Extracted

Family

amadey

Version

4.42

Botnet

9c9aa5

C2

http://185.215.113.43

Attributes
  • install_dir

    abc3bc1985

  • install_file

    skotes.exe

  • strings_key

    8a35cf2ea38c2817dba29a4b5b25dcf0

  • url_paths

    /Zu7JuNko/index.php

rc4.plain

Extracted

Family

lumma

C2

https://powerful-avoids.sbs

https://motion-treesz.sbs

https://disobey-curly.sbs

https://leg-sate-boat.sbs

https://story-tense-faz.sbs

https://blade-govern.sbs

https://occupy-blushi.sbs

https://frogs-severz.sbs

https://property-imper.sbs

Extracted

Family

stealc

Botnet

mars

C2

http://185.215.113.206

Attributes
  • url_path

    /c4becf79229cb002.php

Extracted

Family

stealc

Botnet

drum

C2

http://185.215.113.206

Attributes
  • url_path

    /c4becf79229cb002.php

Signatures

  • Amadey

    Amadey bot is a simple trojan bot primarily used for collecting reconnaissance information.

  • Amadey family
  • Lumma Stealer, LummaC

    Lumma or LummaC is an infostealer written in C++ first seen in August 2022.

  • Lumma family
  • Modifies Windows Defender Real-time Protection settings 3 TTPs 6 IoCs
  • Stealc

    Stealc is an infostealer written in C++.

  • Stealc family
  • Enumerates VirtualBox registry keys 2 TTPs 2 IoCs
  • Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs 12 IoCs
  • Downloads MZ/PE file
  • Checks BIOS information in registry 2 TTPs 24 IoCs

    BIOS information is often read in order to detect sandboxing environments.

  • Checks computer location settings 2 TTPs 4 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Executes dropped EXE 18 IoCs
  • Identifies Wine through registry keys 2 TTPs 12 IoCs

    Wine is a compatibility layer capable of running Windows applications, which can be used as sandboxing environment.

  • Loads dropped DLL 12 IoCs
  • Windows security modification 2 TTPs 2 IoCs
  • Adds Run key to start application 2 TTPs 6 IoCs
  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • AutoIT Executable 1 IoCs

    AutoIT scripts compiled to PE executables.

  • Suspicious use of NtSetInformationThreadHideFromDebugger 12 IoCs
  • Drops file in Windows directory 1 IoCs
  • Embeds OpenSSL 1 IoCs

    Embeds OpenSSL, may be used to circumvent TLS interception.

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Program crash 1 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 25 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Checks processor information in registry 2 TTPs 10 IoCs

    Processor information is often read in order to detect sandboxing environments.

  • Gathers network information 2 TTPs 1 IoCs

    Uses commandline utility to view network configuration.

  • Kills process with taskkill 5 IoCs
  • Modifies registry class 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 59 IoCs
  • Suspicious use of AdjustPrivilegeToken 9 IoCs
  • Suspicious use of FindShellTrayWindow 33 IoCs
  • Suspicious use of SendNotifyMessage 31 IoCs
  • Suspicious use of SetWindowsHookEx 4 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs
  • Uses Task Scheduler COM API 1 TTPs

    The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.

Processes

  • C:\Users\Admin\AppData\Local\Temp\9f787805d8a387f7fe694d1161358ebb715e3453cc64da34eed84244af2ec456N.exe
    "C:\Users\Admin\AppData\Local\Temp\9f787805d8a387f7fe694d1161358ebb715e3453cc64da34eed84244af2ec456N.exe"
    1⤵
    • Adds Run key to start application
    • System Location Discovery: System Language Discovery
    • Suspicious use of WriteProcessMemory
    PID:2096
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\y7h57.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\y7h57.exe
      2⤵
      • Executes dropped EXE
      • Adds Run key to start application
      • System Location Discovery: System Language Discovery
      • Suspicious use of WriteProcessMemory
      PID:1628
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\1g67n2.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\1g67n2.exe
        3⤵
        • Identifies VirtualBox via ACPI registry values (likely anti-VM)
        • Checks BIOS information in registry
        • Checks computer location settings
        • Executes dropped EXE
        • Identifies Wine through registry keys
        • Suspicious use of NtSetInformationThreadHideFromDebugger
        • Drops file in Windows directory
        • System Location Discovery: System Language Discovery
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of FindShellTrayWindow
        • Suspicious use of WriteProcessMemory
        PID:3368
        • C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe
          "C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe"
          4⤵
          • Identifies VirtualBox via ACPI registry values (likely anti-VM)
          • Checks BIOS information in registry
          • Checks computer location settings
          • Executes dropped EXE
          • Identifies Wine through registry keys
          • Adds Run key to start application
          • Suspicious use of NtSetInformationThreadHideFromDebugger
          • System Location Discovery: System Language Discovery
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of WriteProcessMemory
          PID:2976
          • C:\Users\Admin\AppData\Local\Temp\1010230001\SKOblik.exe
            "C:\Users\Admin\AppData\Local\Temp\1010230001\SKOblik.exe"
            5⤵
            • Checks computer location settings
            • Executes dropped EXE
            • System Location Discovery: System Language Discovery
            PID:3712
            • C:\Users\Admin\AppData\Local\Programs\Advanced Sync Tools\PureSync.exe
              "C:\Users\Admin\AppData\Local\Programs\Advanced Sync Tools\PureSync.exe"
              6⤵
              • Executes dropped EXE
              • System Location Discovery: System Language Discovery
              • Suspicious use of SetWindowsHookEx
              PID:6996
              • C:\Users\Admin\AppData\Local\Programs\Advanced Sync Tools\PureSync.exe
                "C:\Users\Admin\AppData\Local\Programs\Advanced Sync Tools\PureSync.exe" restart
                7⤵
                • Executes dropped EXE
                • Loads dropped DLL
                • System Location Discovery: System Language Discovery
                • Checks processor information in registry
                • Suspicious behavior: EnumeratesProcesses
                • Suspicious use of SetWindowsHookEx
                PID:6288
                • C:\Windows\SysWOW64\cmd.exe
                  cmd.exe /c ver
                  8⤵
                  • System Location Discovery: System Language Discovery
                  PID:3572
          • C:\Users\Admin\AppData\Local\Temp\1010264001\xZNk1YZ.exe
            "C:\Users\Admin\AppData\Local\Temp\1010264001\xZNk1YZ.exe"
            5⤵
            • Checks computer location settings
            • Executes dropped EXE
            • System Location Discovery: System Language Discovery
            • Suspicious use of AdjustPrivilegeToken
            • Suspicious use of WriteProcessMemory
            PID:3968
            • C:\Windows\SysWOW64\cmd.exe
              "C:\Windows\System32\cmd.exe" /c ipconfig /release
              6⤵
              • System Location Discovery: System Language Discovery
              • Suspicious use of WriteProcessMemory
              PID:3672
              • C:\Windows\SysWOW64\ipconfig.exe
                ipconfig /release
                7⤵
                • System Location Discovery: System Language Discovery
                • Gathers network information
                PID:4944
          • C:\Users\Admin\AppData\Local\Temp\1010265001\92e696e3cf.exe
            "C:\Users\Admin\AppData\Local\Temp\1010265001\92e696e3cf.exe"
            5⤵
            • Identifies VirtualBox via ACPI registry values (likely anti-VM)
            • Checks BIOS information in registry
            • Executes dropped EXE
            • Identifies Wine through registry keys
            • Suspicious use of NtSetInformationThreadHideFromDebugger
            • System Location Discovery: System Language Discovery
            • Suspicious behavior: EnumeratesProcesses
            PID:2232
          • C:\Users\Admin\AppData\Local\Temp\1010266001\2bdfde63fd.exe
            "C:\Users\Admin\AppData\Local\Temp\1010266001\2bdfde63fd.exe"
            5⤵
            • Identifies VirtualBox via ACPI registry values (likely anti-VM)
            • Checks BIOS information in registry
            • Executes dropped EXE
            • Identifies Wine through registry keys
            • Suspicious use of NtSetInformationThreadHideFromDebugger
            • System Location Discovery: System Language Discovery
            • Suspicious behavior: EnumeratesProcesses
            PID:4368
          • C:\Users\Admin\AppData\Local\Temp\1010267001\8ddbc442c7.exe
            "C:\Users\Admin\AppData\Local\Temp\1010267001\8ddbc442c7.exe"
            5⤵
            • Executes dropped EXE
            • System Location Discovery: System Language Discovery
            • Suspicious behavior: EnumeratesProcesses
            • Suspicious use of FindShellTrayWindow
            • Suspicious use of SendNotifyMessage
            • Suspicious use of WriteProcessMemory
            PID:2676
            • C:\Windows\SysWOW64\taskkill.exe
              taskkill /F /IM firefox.exe /T
              6⤵
              • System Location Discovery: System Language Discovery
              • Kills process with taskkill
              • Suspicious use of AdjustPrivilegeToken
              PID:4844
            • C:\Windows\SysWOW64\taskkill.exe
              taskkill /F /IM chrome.exe /T
              6⤵
              • System Location Discovery: System Language Discovery
              • Kills process with taskkill
              • Suspicious use of AdjustPrivilegeToken
              PID:1572
            • C:\Windows\SysWOW64\taskkill.exe
              taskkill /F /IM msedge.exe /T
              6⤵
              • System Location Discovery: System Language Discovery
              • Kills process with taskkill
              • Suspicious use of AdjustPrivilegeToken
              PID:2516
            • C:\Windows\SysWOW64\taskkill.exe
              taskkill /F /IM opera.exe /T
              6⤵
              • System Location Discovery: System Language Discovery
              • Kills process with taskkill
              • Suspicious use of AdjustPrivilegeToken
              PID:4332
            • C:\Windows\SysWOW64\taskkill.exe
              taskkill /F /IM brave.exe /T
              6⤵
              • System Location Discovery: System Language Discovery
              • Kills process with taskkill
              • Suspicious use of AdjustPrivilegeToken
              PID:2032
            • C:\Program Files\Mozilla Firefox\firefox.exe
              "C:\Program Files\Mozilla Firefox\firefox.exe" --kiosk "https://youtube.com/account?=https://accounts.google.com/v3/signin/challenge/pwd" --no-default-browser-check --disable-popup-blocking
              6⤵
              • Suspicious use of WriteProcessMemory
              PID:3536
              • C:\Program Files\Mozilla Firefox\firefox.exe
                "C:\Program Files\Mozilla Firefox\firefox.exe" --kiosk https://youtube.com/account?=https://accounts.google.com/v3/signin/challenge/pwd --no-default-browser-check --disable-popup-blocking
                7⤵
                • Checks processor information in registry
                • Modifies registry class
                • Suspicious use of AdjustPrivilegeToken
                • Suspicious use of FindShellTrayWindow
                • Suspicious use of SendNotifyMessage
                • Suspicious use of SetWindowsHookEx
                PID:3612
                • C:\Program Files\Mozilla Firefox\firefox.exe
                  "C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=2020 -parentBuildID 20240401114208 -prefsHandle 1948 -prefMapHandle 1940 -prefsLen 23680 -prefMapSize 244658 -appDir "C:\Program Files\Mozilla Firefox\browser" - {5596d205-873c-492a-aad4-428e3e3020af} 3612 "\\.\pipe\gecko-crash-server-pipe.3612" gpu
                  8⤵
                    PID:4464
                  • C:\Program Files\Mozilla Firefox\firefox.exe
                    "C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=2456 -parentBuildID 20240401114208 -prefsHandle 2448 -prefMapHandle 2436 -prefsLen 24600 -prefMapSize 244658 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {eae766da-5baa-4574-a5d4-3aa81c685c2a} 3612 "\\.\pipe\gecko-crash-server-pipe.3612" socket
                    8⤵
                      PID:2200
                    • C:\Program Files\Mozilla Firefox\firefox.exe
                      "C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=3056 -childID 1 -isForBrowser -prefsHandle 3304 -prefMapHandle 3052 -prefsLen 22652 -prefMapSize 244658 -jsInitHandle 936 -jsInitLen 234952 -parentBuildID 20240401114208 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {836004cb-43c1-4ee8-b124-bae8c11c2d70} 3612 "\\.\pipe\gecko-crash-server-pipe.3612" tab
                      8⤵
                        PID:1556
                      • C:\Program Files\Mozilla Firefox\firefox.exe
                        "C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=3672 -childID 2 -isForBrowser -prefsHandle 2924 -prefMapHandle 3660 -prefsLen 29090 -prefMapSize 244658 -jsInitHandle 936 -jsInitLen 234952 -parentBuildID 20240401114208 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {7992a4fb-02c0-4244-9ff0-8933e9bb03e6} 3612 "\\.\pipe\gecko-crash-server-pipe.3612" tab
                        8⤵
                          PID:3868
                        • C:\Program Files\Mozilla Firefox\firefox.exe
                          "C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=4748 -parentBuildID 20240401114208 -sandboxingKind 0 -prefsHandle 4740 -prefMapHandle 4736 -prefsLen 29090 -prefMapSize 244658 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {06acdf15-ac28-418d-ac06-2a4bab9a6823} 3612 "\\.\pipe\gecko-crash-server-pipe.3612" utility
                          8⤵
                          • Checks processor information in registry
                          PID:6792
                        • C:\Program Files\Mozilla Firefox\firefox.exe
                          "C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=5356 -childID 3 -isForBrowser -prefsHandle 5268 -prefMapHandle 5276 -prefsLen 27051 -prefMapSize 244658 -jsInitHandle 936 -jsInitLen 234952 -parentBuildID 20240401114208 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {0dc942b4-b9b8-4408-b01e-82c0de33b8d5} 3612 "\\.\pipe\gecko-crash-server-pipe.3612" tab
                          8⤵
                            PID:4768
                          • C:\Program Files\Mozilla Firefox\firefox.exe
                            "C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=5372 -childID 4 -isForBrowser -prefsHandle 5532 -prefMapHandle 5528 -prefsLen 27051 -prefMapSize 244658 -jsInitHandle 936 -jsInitLen 234952 -parentBuildID 20240401114208 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {d807641d-154c-40f1-8757-59e7de5c68b4} 3612 "\\.\pipe\gecko-crash-server-pipe.3612" tab
                            8⤵
                              PID:1260
                            • C:\Program Files\Mozilla Firefox\firefox.exe
                              "C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=5648 -childID 5 -isForBrowser -prefsHandle 5656 -prefMapHandle 5660 -prefsLen 27051 -prefMapSize 244658 -jsInitHandle 936 -jsInitLen 234952 -parentBuildID 20240401114208 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {4547c687-db76-43b3-a0a2-03b1dcc368d4} 3612 "\\.\pipe\gecko-crash-server-pipe.3612" tab
                              8⤵
                                PID:3332
                        • C:\Users\Admin\AppData\Local\Temp\1010268001\991cf60452.exe
                          "C:\Users\Admin\AppData\Local\Temp\1010268001\991cf60452.exe"
                          5⤵
                          • Modifies Windows Defender Real-time Protection settings
                          • Identifies VirtualBox via ACPI registry values (likely anti-VM)
                          • Checks BIOS information in registry
                          • Executes dropped EXE
                          • Identifies Wine through registry keys
                          • Windows security modification
                          • Suspicious use of NtSetInformationThreadHideFromDebugger
                          • System Location Discovery: System Language Discovery
                          • Suspicious behavior: EnumeratesProcesses
                          • Suspicious use of AdjustPrivilegeToken
                          PID:5544
                        • C:\Users\Admin\AppData\Local\Temp\1010269001\9e0d47b2f1.exe
                          "C:\Users\Admin\AppData\Local\Temp\1010269001\9e0d47b2f1.exe"
                          5⤵
                          • Enumerates VirtualBox registry keys
                          • Identifies VirtualBox via ACPI registry values (likely anti-VM)
                          • Checks BIOS information in registry
                          • Executes dropped EXE
                          • Identifies Wine through registry keys
                          • Suspicious use of NtSetInformationThreadHideFromDebugger
                          • System Location Discovery: System Language Discovery
                          • Suspicious behavior: EnumeratesProcesses
                          PID:6104
                        • C:\Users\Admin\AppData\Local\Temp\1010270001\a914a1a9fa.exe
                          "C:\Users\Admin\AppData\Local\Temp\1010270001\a914a1a9fa.exe"
                          5⤵
                          • Identifies VirtualBox via ACPI registry values (likely anti-VM)
                          • Checks BIOS information in registry
                          • Executes dropped EXE
                          • Identifies Wine through registry keys
                          • Suspicious use of NtSetInformationThreadHideFromDebugger
                          • System Location Discovery: System Language Discovery
                          • Suspicious behavior: EnumeratesProcesses
                          PID:6276
                          • C:\Windows\SysWOW64\WerFault.exe
                            C:\Windows\SysWOW64\WerFault.exe -u -p 6276 -s 1544
                            6⤵
                            • Program crash
                            PID:6156
                        • C:\Users\Admin\AppData\Local\Temp\1010271001\06388ff5af.exe
                          "C:\Users\Admin\AppData\Local\Temp\1010271001\06388ff5af.exe"
                          5⤵
                          • Enumerates VirtualBox registry keys
                          • Identifies VirtualBox via ACPI registry values (likely anti-VM)
                          • Checks BIOS information in registry
                          • Executes dropped EXE
                          • Identifies Wine through registry keys
                          • Suspicious use of NtSetInformationThreadHideFromDebugger
                          • System Location Discovery: System Language Discovery
                          • Suspicious behavior: EnumeratesProcesses
                          PID:6440
                    • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\2M2766.exe
                      C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\2M2766.exe
                      3⤵
                      • Identifies VirtualBox via ACPI registry values (likely anti-VM)
                      • Checks BIOS information in registry
                      • Executes dropped EXE
                      • Identifies Wine through registry keys
                      • Suspicious use of NtSetInformationThreadHideFromDebugger
                      • System Location Discovery: System Language Discovery
                      • Suspicious behavior: EnumeratesProcesses
                      PID:4952
                  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\3O96k.exe
                    C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\3O96k.exe
                    2⤵
                    • Identifies VirtualBox via ACPI registry values (likely anti-VM)
                    • Checks BIOS information in registry
                    • Executes dropped EXE
                    • Identifies Wine through registry keys
                    • Suspicious use of NtSetInformationThreadHideFromDebugger
                    • System Location Discovery: System Language Discovery
                    • Suspicious behavior: EnumeratesProcesses
                    PID:1244
                • C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe
                  C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe
                  1⤵
                  • Identifies VirtualBox via ACPI registry values (likely anti-VM)
                  • Checks BIOS information in registry
                  • Executes dropped EXE
                  • Identifies Wine through registry keys
                  • Suspicious use of NtSetInformationThreadHideFromDebugger
                  • Suspicious behavior: EnumeratesProcesses
                  PID:2904
                • C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe
                  C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe
                  1⤵
                  • Identifies VirtualBox via ACPI registry values (likely anti-VM)
                  • Checks BIOS information in registry
                  • Executes dropped EXE
                  • Identifies Wine through registry keys
                  • Suspicious use of NtSetInformationThreadHideFromDebugger
                  • Suspicious behavior: EnumeratesProcesses
                  PID:3336
                • C:\Windows\SysWOW64\WerFault.exe
                  C:\Windows\SysWOW64\WerFault.exe -pss -s 432 -p 6276 -ip 6276
                  1⤵
                    PID:6132
                  • C:\Windows\system32\DllHost.exe
                    C:\Windows\system32\DllHost.exe /Processid:{AB8902B4-09CA-4BB6-B78D-A8F59079A8D5}
                    1⤵
                      PID:3572

                    Network

                    MITRE ATT&CK Enterprise v15

                    Replay Monitor

                    Loading Replay Monitor...

                    Downloads

                    • C:\Users\Admin\AppData\Local\Microsoft\Windows\INetCache\IE\YY018DS9\download[1].htm

                      Filesize

                      1B

                      MD5

                      cfcd208495d565ef66e7dff9f98764da

                      SHA1

                      b6589fc6ab0dc82cf12099d1c2d40ab994e8410c

                      SHA256

                      5feceb66ffc86f38d952786c6d696c79c2dbc239dd4e91b46729d73a27fb57e9

                      SHA512

                      31bca02094eb78126a517b206a88c73cfa9ec6f704c7030d18212cace820f025f00bf0ea68dbf3f3a5436ca63b53bf7bf80ad8d5de7d8359d0b7fed9dbc3ab99

                    • C:\Users\Admin\AppData\Local\Mozilla\Firefox\Profiles\6ir3v68x.default-release\activity-stream.discovery_stream.json.tmp

                      Filesize

                      20KB

                      MD5

                      d75f15616670e724cf6313a8e70464ef

                      SHA1

                      14b5670afe603bd1e6b53fd0ad5f7c0ea83cd734

                      SHA256

                      27b4a99fa1c21c88c3c2c300affc73055d3d121853837de114e98f3005614e91

                      SHA512

                      7da0ab154ce41a3e3bd432275d746c04b6f5ee058c6059a76bf49b83f5a58fd3decaaf86fa185a86a79db27def0f9d4f500c1080562114418555ad7aa869935b

                    • C:\Users\Admin\AppData\Local\Mozilla\Firefox\Profiles\6ir3v68x.default-release\cache2\entries\39DB9E847E680B765D7B04FCCE6BF5BC0225F878

                      Filesize

                      13KB

                      MD5

                      ab3df936ef1dcb7f666fa3652c767837

                      SHA1

                      d4ecb725bbd7d1b230748afd4cd24081e20bbc0d

                      SHA256

                      626b44a235665c02b55bd114d5ff6f763f230906ba56018a652f9f739ff88a5f

                      SHA512

                      e428cb17cca6e7d330aaa9c2fac0aa331157539fadc4202918acc6febafae62540468d13046c76502f152af5b51486d3c86714fe33ec8f8f461f0b08191ab667

                    • C:\Users\Admin\AppData\Local\Programs\Advanced Sync Tools\COMDLG32.OCX

                      Filesize

                      149KB

                      MD5

                      ab412429f1e5fb9708a8cdea07479099

                      SHA1

                      eb49323be4384a0e7e36053f186b305636e82887

                      SHA256

                      e32d8bbe8e6985726742b496520fa47827f3b428648fa1bc34ecffdd9bdac240

                      SHA512

                      f3348dbc3b05d14482250d7c399c00533598973f8e9168b4082ee5cbb81089dfaefcfda5a6a3c9f05b4445d655051b7a5170c57ee32d7a783dc35a75fee41aa9

                    • C:\Users\Admin\AppData\Local\Programs\Advanced Sync Tools\MSCOMCT2.OCX

                      Filesize

                      643KB

                      MD5

                      27ec2b0aebea97aa3f343dea1501ec3a

                      SHA1

                      c44b40baa25f257d874fee1c7b4ef9137f2ced51

                      SHA256

                      589e26a16d9171ce22b9a5eb95064cc96c866b1f08ab634d714231b35c2812a8

                      SHA512

                      25ac2951cb890a7747fab37ac1997e842800e71325c510122599dade0cf5bbb2cc490d87596bf8f5e9a16adc40ce1f2e19ffb0a5671597af6cb9e07ec7df9b96

                    • C:\Users\Admin\AppData\Local\Programs\Advanced Sync Tools\MSCOMCTL.OCX

                      Filesize

                      1.0MB

                      MD5

                      273676426739b02a45a0fc9349500b65

                      SHA1

                      a23c709fae04feef87358abd59504940d0d0c806

                      SHA256

                      152121a5d1ac8f12002c18afc294bb1ebcecc1d61deec6211df586c11acde9b6

                      SHA512

                      8945d8a68c4ebb5845fb7f6abf3b4947eb6c37812c32d4ff2f30a0472489496c4506b3be358bb350df5c3d3be11c43c19ba6d3ca72449a7122bcec73cee181d2

                    • C:\Users\Admin\AppData\Local\Programs\Advanced Sync Tools\MSINET.OCX

                      Filesize

                      129KB

                      MD5

                      90a39346e9b67f132ef133725c487ff6

                      SHA1

                      9cd22933f628465c863bed7895d99395acaa5d2a

                      SHA256

                      e55627932120be87c7950383a75a5712b0ff2c00b8d18169195ad35bc2502fc2

                      SHA512

                      0337817b9194a10b946d7381a84a2aeefd21445986afef1b9ae5a52921e598cdb0d1a576bdf8391f1ebf8be74950883a6f50ad1f61ff08678782c6b05a18adbf

                    • C:\Users\Admin\AppData\Local\Programs\Advanced Sync Tools\Model++Xs.dll

                      Filesize

                      6.0MB

                      MD5

                      905a19d6f5e9856ebf1ebae8566f840e

                      SHA1

                      fe2fc3cf3af1a5b5de76793c64a32fdf95d7fb3a

                      SHA256

                      d8e8ec0f6c15c1165acefd3a2b88c9bafed45e777c71d24270d672111c2b822e

                      SHA512

                      bfbde612ce50082b66e23a080d436c7676c78200b4f5ecd61a68db9a56f6a3dbe8390789e2a45469e153fb449e09a17ea364dd19f8910e71634b7efa38928120

                    • C:\Users\Admin\AppData\Local\Programs\Advanced Sync Tools\PureSync.dll

                      Filesize

                      5.9MB

                      MD5

                      010908233328c294e5e5877e07285478

                      SHA1

                      18a560584c682b2dc21a1228228192c4baf47f6d

                      SHA256

                      a902df81dce5a9b84929c88a5d219df0a5a07206b0801a7a723c4548609b953c

                      SHA512

                      7d36f6c400271344ac91e33cac6045b3642ba59b730dd21b678bb1b9de42619766f9739bff51423f8fb4a8304fecf61f13a14987b59b098ff99062bdc795eda4

                    • C:\Users\Admin\AppData\Local\Programs\Advanced Sync Tools\PureSync.exe

                      Filesize

                      1.5MB

                      MD5

                      9a994d678fb05bf73d7b61c76788f7eb

                      SHA1

                      3eb3769906efb6ff161555ebf04c78cb10d60501

                      SHA256

                      84ca892ab2410acef28721d58067fcba71f0de54ede62ef2fca9aeb845b5227f

                      SHA512

                      c7c846d6d8d2e43871c1c4471d26c6cfcee29a5b563eca69fef2f4e394767ef3e61a231626a1ff64aaf6a907d66a0cbe9db1c965128e3bab373e406ea891e6ce

                    • C:\Users\Admin\AppData\Local\Programs\Advanced Sync Tools\RICHTX32.OCX

                      Filesize

                      207KB

                      MD5

                      045a16822822426c305ea7280270a3d6

                      SHA1

                      43075b6696bb2d2f298f263971d4d3e48aa4f561

                      SHA256

                      318cc48cbcfaba9592956e4298886823cc5f37626c770d6dadbcd224849680c5

                      SHA512

                      5a042ff0a05421fb01e0a95a8b62f3ce81f90330daed78f09c7d5d2abcb822a2fe99d00494c3ddd96226287fae51367e264b48b2831a8c080916ce18c0a675fa

                    • C:\Users\Admin\AppData\Local\Programs\Advanced Sync Tools\SE_CLSEditorX.dll

                      Filesize

                      424KB

                      MD5

                      c2a51f02511eff6edf77bc99e50ad427

                      SHA1

                      a72700705c3fa64b5717ee30a4485b5299c7ac19

                      SHA256

                      dcfea0126e1c02aad0ea2fb6ef93d308fa20e67d4aa812487b4a5dc57e0ff16a

                      SHA512

                      1c7a0201e7b074f2dceba7e764eec261ecefd92a34741b4e152018aca41129ceb26d3a3cbe19ee7fc268820b1ff3b66e5b7e2523b076f45ad85b1d3cb11b12f0

                    • C:\Users\Admin\AppData\Local\Programs\Advanced Sync Tools\Source.dat

                      Filesize

                      5.6MB

                      MD5

                      60147cda18bf6490afeeaa6635ea569c

                      SHA1

                      679d9c0923c71603c15a896d3485cbf26a289291

                      SHA256

                      7b668c5d6532b0e39afabc458426347c5e8f77566f608574e7d9c9a0dbccf290

                      SHA512

                      31465940d267af7e712372615837971903100702fa64a43edfe4a96a0988c685ccdaf8dee9e3a6bf5655ba5329040877da15fd4f3431dce34916d6fda9334a98

                    • C:\Users\Admin\AppData\Local\Programs\Advanced Sync Tools\VBCCR15.OCX

                      Filesize

                      4.9MB

                      MD5

                      a00469043467b0ed571938679ab2e796

                      SHA1

                      68ae694ee41f86ee9240ac8abd516c668d3b907e

                      SHA256

                      83e48fb3b98f83c89a79d3d77698ae565a3f8ea09450d5a9dc5c4815d079e0fa

                      SHA512

                      e8986c0c100ee8edbab67febe0a4f6fa36d716fc2397fddd0df1b86a1eafb6d85ccab8f2f48c059fd0cc9aec1119caa5e4f6c387eb23bbc9aa876bf10a3218f3

                    • C:\Users\Admin\AppData\Local\Programs\Advanced Sync Tools\ValueTransformers.dll

                      Filesize

                      2.9MB

                      MD5

                      473fe371f857c6bc57bcc6e879abdce0

                      SHA1

                      6c9bba7026bd56ff7e01213126e82b58b6b0ab04

                      SHA256

                      d13f8cafe9ae83284ff0bebaee9fa72515bf7bde2251f94879e3eac302483a5c

                      SHA512

                      7ea6c95c8d6ce86fe12d348d1ff2ce664d10f4e0288c430cf353de136de9df2ec40e0a7c6772d524be523110b86abf7cbb4ecbd719f06210104091d0448b51e7

                    • C:\Users\Admin\AppData\Local\Programs\Advanced Sync Tools\comctl32.ocx

                      Filesize

                      1.3MB

                      MD5

                      2640ad05ab39321e6c9d3c71236ca0df

                      SHA1

                      03d30b572f312c2b554e76b3a18fbbb4a38a9be4

                      SHA256

                      634d27df20591de4d9b44dfb7f1ef03284c1d120f61b0801d668c1076d72cb6d

                      SHA512

                      7ea1357dcb7c22870c4993df30b00a79e61731cbea87775d800b7ff7f435858167780b22fd5af6a2df59edc1c5d5fb0e184c5f7ed4436c70ea5f91b8be4a1e75

                    • C:\Users\Admin\AppData\Local\Programs\Advanced Sync Tools\jb2.ocx

                      Filesize

                      412KB

                      MD5

                      1396e7462eb8ce452b0f0e2540f2a0e6

                      SHA1

                      1a205c5a45e7fc0856db974605a1b01ad655b788

                      SHA256

                      83f5e5c8adc1ab0c701ec63a33e1ff3e114583116b04d31e3e6d6a37fb61defb

                      SHA512

                      2b00518d2e22d726aab3df67eaf468c49fca43d7ef2583092e04ad23b0f6085b4672fe9b1a6d80227461aafd97596e8fab176ef3f5ce2f94cda8bc3f9e6c5c04

                    • C:\Users\Admin\AppData\Local\Programs\Advanced Sync Tools\settings.ini

                      Filesize

                      806B

                      MD5

                      2d707a1b8f827b5a7f54d5cfaa8e81c4

                      SHA1

                      684f00ae0cf04506ae48132d9f5eb6b913df74ea

                      SHA256

                      fac3409a96f95fd417f8525eba7c26486b1cc219b2fb257a9501c990743dea51

                      SHA512

                      5eb6a57d6e040da3990d5e88c741df25730f5cb17cbd7c20df1ae58f7af6659891efbea93ecec499b761824ddf0d8d357fb2b3063a1d08be5f5c5dfab43dbc8b

                    • C:\Users\Admin\AppData\Local\Programs\Advanced Sync Tools\soundeffects\review.wav

                      Filesize

                      5.2MB

                      MD5

                      03f82642911d65bf9e055c1aef0468ef

                      SHA1

                      bfa726886ad082181b0bf8b8e99cfeb28c67c09b

                      SHA256

                      3c4e0d77225af8fe092d6d2ece9bfe916d99205999def1247fe4b6183224e5c8

                      SHA512

                      7fc17025892ec041ac90a728f07b7a922a5e24256e9f689afb5d799f1c8d65c3a45513dc695ade4727e409d61a687fc550bd9cdd5ecc0a485d6587e261f1f86c

                    • C:\Users\Admin\AppData\Local\Programs\Advanced Sync Tools\tssOfficeMenu1d.ocx

                      Filesize

                      936KB

                      MD5

                      8f25663fc3d70f649cecf90fec0d5b4c

                      SHA1

                      7f77efb66aaf465c5b4a8ecc2bfe97ac5ba74801

                      SHA256

                      9ea2226c11465ca91fcda1761f3a9c0863ed47d33fc4c21df8084e59d9094e43

                      SHA512

                      38551de8779871471e4d7658cd100e2b6ffe522581463cee09a7743556e5ec8737c02db01dec001d57ffe573b75dd706f92a8750633232bb7ae0d4d169424aed

                    • C:\Users\Admin\AppData\Local\Programs\Advanced Sync Tools\vcomp140.dll

                      Filesize

                      158KB

                      MD5

                      94950136ca0c9fde9d1dd02125420e42

                      SHA1

                      43ed4a5f1bf21202be48fae8244294824ea46815

                      SHA256

                      5474e4b5b012fa630adc969e049b35623ce8373e7d095ecfc8ba2f825350bab3

                      SHA512

                      6adbfe24b7e2c5596595ebf36843025b8305391154b8448cc738d358922f1d8175974120182b9fe9f3b6e190d2bc70569148466218f56e61ca8f3d49beded404

                    • C:\Users\Admin\AppData\Local\Temp\1010230001\SKOblik.exe

                      Filesize

                      21.2MB

                      MD5

                      c3968e6090d03e52679657e1715ea39a

                      SHA1

                      2332b4bfd13b271c250a6b71f3c2a502e24d0b76

                      SHA256

                      4ad1cc11410e486d132dce9716eebe6a2db0af0fcbf53ee87bc9c0af6a5aa1d4

                      SHA512

                      f4908cce3e77a19bcbdc54487e025868cbd2c470b796edbf4a28aebc56cb9212019496f32eb531787de2ca9e8af0aedab2fde3d7aecee9e6a3fe3f5e4ce7670a

                    • C:\Users\Admin\AppData\Local\Temp\1010264001\xZNk1YZ.exe

                      Filesize

                      4.9MB

                      MD5

                      f98fb3f06debf7144bee7c2ff7b4c456

                      SHA1

                      854b9f051af8fe2ebdd2878411e9fb9032594229

                      SHA256

                      8abb86b3dd80c4d37387eb28a3c96efc7c0ef1675337aeb8e5599e8e3140ee66

                      SHA512

                      d7fca0fc58d14066fbddb19f36d5b1ff17d51a5aa85f8829cba212d1aa3fd7f5551ff3c673bc6e5e64888951f9066e536f91d6671f7ef45765a815a677eedcb1

                    • C:\Users\Admin\AppData\Local\Temp\1010265001\92e696e3cf.exe

                      Filesize

                      1.8MB

                      MD5

                      3956fb8d6e7d4415e6db6e1017968553

                      SHA1

                      b5649a18471cae04b254300a6661b9d72de3a247

                      SHA256

                      bac60c389a78658476edda33546a0127bb58593cc584f0ef5866de6085e63c7c

                      SHA512

                      8464f26dc3b80519d6e6a985953831e22000799715b5a2747b44a7fe0683d85d7601f0407865940757afa80eb260c05c855861fb01168b168579635b2f6a0a10

                    • C:\Users\Admin\AppData\Local\Temp\1010266001\2bdfde63fd.exe

                      Filesize

                      1.7MB

                      MD5

                      b65136f4c830127bc5acf711ca4cc846

                      SHA1

                      8aaa79a4bd70c2d0b0cff1de9f907bd8c0e516d5

                      SHA256

                      cf3ed6778e5518ea1b8aed29de098cf5d9b919ed4e5de555f1c906f65677766b

                      SHA512

                      e0c46b912593e0e9c2501be21c70fa402a23c8f77e727089758804c19d1bc0f5bed18eb6e49170a44ad42b83254d524ed3766df9362579ef0ee8dacda20e7628

                    • C:\Users\Admin\AppData\Local\Temp\1010267001\8ddbc442c7.exe

                      Filesize

                      900KB

                      MD5

                      8d1cebab0f792541d9f5d520efa671b1

                      SHA1

                      24a8eea5c5b71b50386e4a8406561463835fcf42

                      SHA256

                      b78673d9b3e5ac6f7bb33d9f5d3386cb72e550df93feafbb99fd3ab9b8236c1a

                      SHA512

                      2cc7bf95c6616d39a52c74def88fd2a9b2f1e65a77556ed504e774e957f61f775eaec8075858a96b7afdbc8ea1ef98800f532bc96f5ff0b1f963a6c8cbff5cd0

                    • C:\Users\Admin\AppData\Local\Temp\1010268001\991cf60452.exe

                      Filesize

                      2.7MB

                      MD5

                      f63f6461c513303dbd4fdcedd1772a74

                      SHA1

                      1a9c084f9ba3ee4e039b65e02bbb0ddc574b4539

                      SHA256

                      2ddb9dc529f8bd218efd18048ea721e0e169ea34c1e4bd5a2dba9fe38a516f1f

                      SHA512

                      9721d9dd9874fee05ff16a774ceb2131ce144ff33c3717abe48a849b76f8a686122bb3f69bdd3217a4fbf80c1c079b3211284ba0c02457aaee6c9e65ad3cd5b5

                    • C:\Users\Admin\AppData\Local\Temp\1010269001\9e0d47b2f1.exe

                      Filesize

                      4.2MB

                      MD5

                      24733346a5bbfd60cd2afd7915b0ac44

                      SHA1

                      96b697c75295f2d5049c2d399d740c478c40c459

                      SHA256

                      f3b0734a5bf6ec2a77a02657e770842456f510980314765bef61ed367f4afc4d

                      SHA512

                      e0ad7c18eff4ee66c7857caea5091f6fefb5a7cd3c5bbaf6d47d54a73e4467700c232301e828f325ec76ed36fc1628d532fab9dceaae1704e444623a8bf69d35

                    • C:\Users\Admin\AppData\Local\Temp\1010270001\a914a1a9fa.exe

                      Filesize

                      1.9MB

                      MD5

                      52e5f6d44a86334dbb5c5c62036206e5

                      SHA1

                      b5a808378ac6433caea7197e879f58601050c8e8

                      SHA256

                      f60a518b29c845958c50ea1fb4d923362e8a6a8a8bcdb6e78610de9b6a8472b1

                      SHA512

                      f32e952db2f16f17fb3df4f413402a18bcf0f625c005d16ae8e4fa09bb5fc64ae4623ecb540cd1ac3acacd934e327091b5a480394e91d2444724099d1ae99c40

                    • C:\Users\Admin\AppData\Local\Temp\1010271001\06388ff5af.exe

                      Filesize

                      4.3MB

                      MD5

                      c00fb21ddc79c20f5c3b03aebdfcfee5

                      SHA1

                      352327cc87c1eb3c1fce7007892a7bfec519cd36

                      SHA256

                      1b112a298bb3c788d5400ea056c210281e03c8a936507b7642a34ec61b5cdcdd

                      SHA512

                      693064c47010edc5c8b44b81c784716de2203861aec76eeed0e0df9659fe4c74c2c19e91b5dee66e309f81ed0af97ec6458720c8d233b600b6fe96a9ebe7d966

                    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\3O96k.exe

                      Filesize

                      1.7MB

                      MD5

                      ec2b785f84c4c57983920f431a8f78ce

                      SHA1

                      cfc54b34762d4a0e5036a9ea5566865721cf6a9f

                      SHA256

                      8c03b7c9bc22de662f3340049dd7fc98a640b99c0e4b58c1bf3a0d334be53ba8

                      SHA512

                      c0dffb2c75fbee616fa11a3bf017e3478a913f9cfa535d259c48f2b8084eecae97b968374256066f51b77d00d0f4d0ce610fd798d8dc0b89ca314ff40f37c170

                    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\y7h57.exe

                      Filesize

                      3.7MB

                      MD5

                      9e4a6e65c9cc2bfbbac88a6df079fc95

                      SHA1

                      1f8ede9594a00bd083e78db370c76400eb4a832b

                      SHA256

                      d443c9aaec90ae11ef4f234ae23cc90f71069ad4f3fb2511093b945a3ddb51cd

                      SHA512

                      d0be83d47ae2ccbbb66a0226fb1b2eb4ec682970e16cbc1db17835972b6a03689ffaa9526bf16cf5f0b617cb98d988c765fb1c65c103b162f06ed69af2929afa

                    • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\1g67n2.exe

                      Filesize

                      1.8MB

                      MD5

                      d1db9f49809a809c02d7bd1db1ece2f6

                      SHA1

                      fe3cbd74d1a9d87ba74fec33ccfbf341466c859e

                      SHA256

                      063ed70b1aaabfb3d0b8d4408180ba1c5c507f259d5bc0bdcef4fe7528ed7b57

                      SHA512

                      a830217dae5bfe187b3c0e52ac7ef07922ec15db5e7b31aef1637d68f0df65b037de61edbc2e350a00f867b64ab54eadb0116b8177d4542bf95fc3b64118c8ff

                    • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\2M2766.exe

                      Filesize

                      1.8MB

                      MD5

                      f43da1849c2034e8b875d5b10b9e1964

                      SHA1

                      1792cdd8a7da60b5863d640edbac63b55aa6c461

                      SHA256

                      bef63829d8b8dc6800078f7dea23052ba5e21cd55f5ab3e9aae521b84a758000

                      SHA512

                      08ab4e8e96f8f8127c347436a03fee492a4f0a81f72274ed7392cc69d6d80e24d3fbcacc1004237fa7812768b24d0e3696150139cec97ff6702dda1e9ca150a6

                    • C:\Users\Admin\AppData\Local\Temp\tmpaddon

                      Filesize

                      479KB

                      MD5

                      09372174e83dbbf696ee732fd2e875bb

                      SHA1

                      ba360186ba650a769f9303f48b7200fb5eaccee1

                      SHA256

                      c32efac42faf4b9878fb8917c5e71d89ff40de580c4f52f62e11c6cfab55167f

                      SHA512

                      b667086ed49579592d435df2b486fe30ba1b62ddd169f19e700cd079239747dd3e20058c285fa9c10a533e34f22b5198ed9b1f92ae560a3067f3e3feacc724f1

                    • C:\Users\Admin\AppData\Local\Temp\tmpaddon-1

                      Filesize

                      13.8MB

                      MD5

                      0a8747a2ac9ac08ae9508f36c6d75692

                      SHA1

                      b287a96fd6cc12433adb42193dfe06111c38eaf0

                      SHA256

                      32d544baf2facc893057a1d97db33207e642f0dacf235d8500a0b5eff934ce03

                      SHA512

                      59521f8c61236641b3299ab460c58c8f5f26fa67e828de853c2cf372f9614d58b9f541aae325b1600ec4f3a47953caacb8122b0dfce7481acfec81045735947d

                    • C:\Users\Admin\AppData\Roaming\Jumping Bytes\PureSync\settings.psy

                      Filesize

                      228B

                      MD5

                      719c2d69f90c30d6b39366c42153b8a6

                      SHA1

                      cfb51de58a60a339e87c81a7a70e051d7120c990

                      SHA256

                      b8f4c5654f7dacb031df816e4c42f5a9d3194bf892e82fd695939faeb856f4de

                      SHA512

                      535a6bce469d6fb633389c0bba1e50351328eae9122c3b9b09c98ddd8608d6fd15f3a66a5d192bf3fd5580acf26c17d198350b1b21dabeb4dd77afee40685708

                    • C:\Users\Admin\AppData\Roaming\Jumping Bytes\PureSync\settings.psy

                      Filesize

                      346B

                      MD5

                      b14f1dc20713e52839142fffd56f21b7

                      SHA1

                      efe7e76e6a835b46d7034d143c4fea5bfaf90d6d

                      SHA256

                      de160943cff9979e82bc2875627e5bb2647696f30f08fef878a7d778561134e8

                      SHA512

                      f51e2492cbe0150163670777a5d0ecbe755e17b8d4d05c55db288b68e19b8a5146483aa4a9ebf4922a9897599c261cf0c5c9e896bcede78f3e8bcec2bcbef2c0

                    • C:\Users\Admin\AppData\Roaming\Jumping Bytes\PureSync\settings.psy

                      Filesize

                      364B

                      MD5

                      c88e8818dde0a85db3df98d3809fd615

                      SHA1

                      d13dd2ade4666b20b20f557e8849c5367d40b455

                      SHA256

                      78cf40f38c501bec247cae219f76cbc458ef966040fafe42940bab4d27e6869b

                      SHA512

                      5d6f855bc1a32592b68cab680b8855be51efebb8712c9e73ceaba794e39f59166ab8826f8f44ce7e1fea20a1525f93c8491a959166254796883a5b6a54482104

                    • C:\Users\Admin\AppData\Roaming\Jumping Bytes\PureSync\settings.psy

                      Filesize

                      614B

                      MD5

                      3fef05b0430e7f739aac8b9665fe6f3a

                      SHA1

                      b26d35530fb163fc54a917fc80d442a2f929cad2

                      SHA256

                      78e9ffd50d01ee2f6809ec1b281ce39ca3d6becb4f086380a09c4cf6f985d070

                      SHA512

                      4849c5d8b70ad21ef5e1b79c436e073361c59a3f2f5d129d7515b11d9f2f8001ca4e1d239889fc3ba34a54e8d165703f6c32fb99ab4da5132908a022c7ff32a8

                    • C:\Users\Admin\AppData\Roaming\Jumping Bytes\PureSync\settings.psy

                      Filesize

                      638B

                      MD5

                      50d243d0f2b09ef83eeac8a4b09a4e4f

                      SHA1

                      80ce176211fcbe9599a27f3a3317ef9f768c5e06

                      SHA256

                      d6920349ab84e72f75eea992efd42f5699d438b1e398edec815db1d16fced18c

                      SHA512

                      07db422e76839e5fcc48d04675baccd8b1c3ad2f1fd0c008ec8c46c0b4c466a81995e78ae55e64b0459bfc78c0b83d24e2674774d4cc912569653b19e7e544d0

                    • C:\Users\Admin\AppData\Roaming\Jumping Bytes\PureSync\settings.psy

                      Filesize

                      932B

                      MD5

                      ec655eec7a5fa90d21cbe70cd0cade48

                      SHA1

                      bb115a6c50345838704376bcac6d4a7015e991a0

                      SHA256

                      66abd2c549234d5bbc4491bb857352ca97a689b6ddf8316757781c5cf97de94f

                      SHA512

                      d1296f881736008c1a5a0c874f2ced5066b4aa75e44c31e0bfa6dccd36f466e56a4d12d232eb30cbc747efcf97862a231f7509b131d2869ba71501f05fa8bd8a

                    • C:\Users\Admin\AppData\Roaming\Jumping Bytes\PureSync\settings.psy

                      Filesize

                      1020B

                      MD5

                      05b7690b41339af463233795a4be98db

                      SHA1

                      6d74a3ccbf15f93f3c70a6c410b42ad47dd5ba39

                      SHA256

                      d309eb18ed9e6b3632984e2e0efceeab12a59f01aa2d4b6598798397d5895cab

                      SHA512

                      4e5859efa61520d9181b21205116a25a1209a5a94582f88ca0aa4558a998211ca700b9deca9b22e2de1e356c60497c286026a6cf4af242a7aa4c90781d9df2d6

                    • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\6ir3v68x.default-release\AlternateServices.bin

                      Filesize

                      6KB

                      MD5

                      092f7525ecec6b69e62b7fb03eb0cf82

                      SHA1

                      08d60fd03d22380d28fd1ff4ed7a065488023004

                      SHA256

                      ffb7b698cecc2aff5fad397034ee5d81aa150beb01aff7ca26534a056c521715

                      SHA512

                      97a7e73fed9306c44e93f0caee67326a572e8af0c8339ecc4175add8565a23b5cb0b14a91ca354416af9d6f96d2cb352c1f0816af2513e948034a8b9b3c5f2d5

                    • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\6ir3v68x.default-release\AlternateServices.bin

                      Filesize

                      8KB

                      MD5

                      26acf9b802a4559f205035c4b10331e9

                      SHA1

                      61af2ec9b571d00b11d99777c5f3db8f22fafa72

                      SHA256

                      299d7cee88476f968cf91f6dc11fc40ffe73d9f7e4ac0d0cdac89707c041b642

                      SHA512

                      aab3261c434290206ddababbb13ae70e7a3cb086e1f8e2b11839ee2ab749e98c5c45c8e3bebfac283cefbc86cce838874a214d1f90c13ac712721d9bb75bd081

                    • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\6ir3v68x.default-release\datareporting\glean\db\data.safe.bin

                      Filesize

                      23KB

                      MD5

                      23296700bb5f0c56d0190ed7324d76a3

                      SHA1

                      a44e57e7dbd274efa701138d6a2c53aae450c4c7

                      SHA256

                      c902dfdddf0b449b946cdd8f26b39b1dcdfc1d0ad8ee5f9874017b6243f920f3

                      SHA512

                      4ffcedac2b208fdb6119e5705b6791b551bdc65037c31f1a12412f86f2e0ee21cb664aea4af427884ce439523a86676df32aad71a681fffd0f1e8aaf9db000e7

                    • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\6ir3v68x.default-release\datareporting\glean\db\data.safe.bin

                      Filesize

                      15KB

                      MD5

                      771753bb66356761deef75324c320944

                      SHA1

                      66b6928695344ee8b001d51e3d20b336ebe52fe8

                      SHA256

                      d2e48daf10f03a05379ff93c4a274d3b9b9d95ff83169922face28581a203804

                      SHA512

                      3c483045f4824b15cb86d0df02e0933536e02f421b24c76cfb704d67d17fc50eec360feab8880a6c80da21e15f6038de68a73cf30f52c418989eb6f7b694f828

                    • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\6ir3v68x.default-release\datareporting\glean\db\data.safe.tmp

                      Filesize

                      5KB

                      MD5

                      36f46e0d43e26202d6272cb061ea7291

                      SHA1

                      58077ece26d50152e55e63d3342b7ab07c1a53c1

                      SHA256

                      e359aa1d12b22893b3aa77f22799c49fb85e0867e2aa5db7e845950658ca6a79

                      SHA512

                      d58f27218fc2353021b56162c18af4d2e16b1a0e86853614d7bb10828531b26df4d3d20fddc4c1dfa31ac6ac80ab98308d72d953c3fbf78afacc851b7c698147

                    • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\6ir3v68x.default-release\datareporting\glean\db\data.safe.tmp

                      Filesize

                      5KB

                      MD5

                      e2c748835342e1c5cfe5f492111ccc5c

                      SHA1

                      8efa4e429f2c6883a42fb6a280606e3936003378

                      SHA256

                      1be4615a15c28a5861166923cd88d5b39cb279a2f37b6f5a888a3dbd1ba3b97b

                      SHA512

                      5fc36700b99803784a8fab0a5433f9400ed8c50f7920a5d389ffb781d616e7babd369c050530c60a730879da1d20dd6c420a80e20aaf60b6fb6f951ddb71ea71

                    • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\6ir3v68x.default-release\datareporting\glean\db\data.safe.tmp

                      Filesize

                      6KB

                      MD5

                      4b2dbd48479877b9f7484c3d084857ba

                      SHA1

                      8b544a84d1d95b890052593ea6e88d08673b427b

                      SHA256

                      973a22e59a13a4124cd912c0222cce66dfa22d22ab6e3195b55f56a865e36b71

                      SHA512

                      c487f3c2e5797d1851019384d307b795d018cfe4e693aac58216821a7d97ea399f61279194e75662a22f94a6e7b5172d7db554e18b5b7f5931797042106e74d0

                    • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\6ir3v68x.default-release\datareporting\glean\db\data.safe.tmp

                      Filesize

                      15KB

                      MD5

                      e5dfa052d47b3d62be2f3d9a890f734d

                      SHA1

                      2a6565944fd97ce4b9eac4d7c64a46715f66f2ee

                      SHA256

                      f8fa250b38341cbd367d7ede30e8744152e23d8a0c435e6ec9b5f97d779ff7dc

                      SHA512

                      a5fd847f5da1bd10b25795d0ac34f863463bbf51f925af8bd34ae256bb6da14eda489c24280300b51dc23d2d8f341d68714e1da00dc6e1c4ca16d60561ce7e36

                    • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\6ir3v68x.default-release\datareporting\glean\pending_pings\57f6e26e-0354-45e5-ae4d-c1dc753e9fa2

                      Filesize

                      671B

                      MD5

                      ae0172afdc1ccb735de4779ecdb27b0f

                      SHA1

                      5425ff1601b5d5ca7b6e2d365d2a3043102d5023

                      SHA256

                      d0d890e1a617690558fc8ec1d0105459b269f3900f449aafa8f856dc977dba16

                      SHA512

                      dc8b85bb61be857b4a4f32b1497a31c09792060472011bdd46f6535d30fc7bce7872f60b47c66418be5eed32af4079ea717248b2347c3facc57eee52d629bf87

                    • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\6ir3v68x.default-release\datareporting\glean\pending_pings\58ad5c59-08b0-49bf-ac63-8a610bf33af2

                      Filesize

                      27KB

                      MD5

                      e51a4a55cd8ee2188b1e8304884d7a39

                      SHA1

                      beeda5fe37a6801ebfc3c7aaaf84ba07485bf271

                      SHA256

                      0e0606c0b3f3b6b32faaff977d5c392825909752c98dc0425893716ee1b1567e

                      SHA512

                      8f86043fa7fdc0445b5dae5b3da69acd70dcb97908293d092322147cb31e12e84af37f48d73e40e38dac3a7d5160a06a913e6e13df2efe7f7e4685e12cf5a512

                    • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\6ir3v68x.default-release\datareporting\glean\pending_pings\8b6e0086-34dd-4e40-81cf-b3978f2ae17f

                      Filesize

                      982B

                      MD5

                      6c89fec2f38ba01a298e88091516e84a

                      SHA1

                      c49abca6398c355b6f2952d59d55bd878e535398

                      SHA256

                      8e239cb1a6b37b31160c672fc6203c06828129637271664b1548f22a3046a747

                      SHA512

                      863ad1917aa4ec25ded650b703ff5adc5771019202019255565f01eb3739cfd9fb02d9e7fd83ce70e2cd2d656e7fc266503d8720fa2fc847d7748c5e5ada830d

                    • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\6ir3v68x.default-release\gmp-gmpopenh264\2.3.2\gmpopenh264.dll

                      Filesize

                      1.1MB

                      MD5

                      842039753bf41fa5e11b3a1383061a87

                      SHA1

                      3e8fe1d7b3ad866b06dca6c7ef1e3c50c406e153

                      SHA256

                      d88dd3bfc4a558bb943f3caa2e376da3942e48a7948763bf9a38f707c2cd0c1c

                      SHA512

                      d3320f7ac46327b7b974e74320c4d853e569061cb89ca849cd5d1706330aca629abeb4a16435c541900d839f46ff72dfde04128c450f3e1ee63c025470c19157

                    • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\6ir3v68x.default-release\gmp-gmpopenh264\2.3.2\gmpopenh264.info

                      Filesize

                      116B

                      MD5

                      2a461e9eb87fd1955cea740a3444ee7a

                      SHA1

                      b10755914c713f5a4677494dbe8a686ed458c3c5

                      SHA256

                      4107f76ba1d9424555f4e8ea0acef69357dfff89dfa5f0ec72aa4f2d489b17bc

                      SHA512

                      34f73f7bf69d7674907f190f257516e3956f825e35a2f03d58201a5a630310b45df393f2b39669f9369d1ac990505a4b6849a0d34e8c136e1402143b6cedf2d3

                    • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\6ir3v68x.default-release\gmp-widevinecdm\4.10.2710.0\manifest.json

                      Filesize

                      372B

                      MD5

                      bf957ad58b55f64219ab3f793e374316

                      SHA1

                      a11adc9d7f2c28e04d9b35e23b7616d0527118a1

                      SHA256

                      bbab6ca07edbed72a966835c7907b3e60c7aa3d48ddea847e5076bd05f4b1eda

                      SHA512

                      79c179b56e4893fb729b225818ab4b95a50b69666ac41d17aad0b37ab0ca8cd9f0848cbc3c5d9e69e4640a8b261d7ced592eae9bcb0e0b63c05a56e7c477f44e

                    • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\6ir3v68x.default-release\gmp-widevinecdm\4.10.2710.0\widevinecdm.dll

                      Filesize

                      17.8MB

                      MD5

                      daf7ef3acccab478aaa7d6dc1c60f865

                      SHA1

                      f8246162b97ce4a945feced27b6ea114366ff2ad

                      SHA256

                      bc40c7821dcd3fea9923c6912ab1183a942c11b7690cfd79ed148ded0228777e

                      SHA512

                      5840a45cfdb12c005e117608b1e5d946e1b2e76443ed39ba940d7f56de4babeab09bee7e64b903eb82bb37624c0a0ef19e9b59fbe2ce2f0e0b1c7a6015a63f75

                    • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\6ir3v68x.default-release\prefs-1.js

                      Filesize

                      10KB

                      MD5

                      40ffd85f82c0593be4c3771bcc327fb8

                      SHA1

                      e2f6eb2a5267417ea3bb2756265f0ba77c0a319b

                      SHA256

                      ceeb82bf229a428459a9a174253cefc581ccd17db17dfad4a5b211065734dcc1

                      SHA512

                      26a9552487bd74902bab4dd85502a39939c6f413abe97e59dc56490f13f7f3eb304a6a13e94c9d901646d924668cac26bc62f5291dca1839d1d110a75f71eadb

                    • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\6ir3v68x.default-release\prefs-1.js

                      Filesize

                      12KB

                      MD5

                      2f17d5bcd1fe22eaa8d40a8e50a40e98

                      SHA1

                      2c3f4387f8924bc6a3cfb6a49b41b5f5249730ae

                      SHA256

                      8c0eaf67c68d031ea05c1516de842b5a6e4adf3b87d86e46605618ec9cb7434e

                      SHA512

                      fa75d808f94c2d192bc24018fbc6d615bcf1a6a1c7e2678ad545a2c325d716a06e5192bbd6b13f5e122f411dd7e42ac40f820b92d4bc2add1a207b6f3dec6112

                    • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\6ir3v68x.default-release\prefs-1.js

                      Filesize

                      15KB

                      MD5

                      8868ab317dfea49e99924ff4a86352b6

                      SHA1

                      8be1be18ba5a9b9d1d5e8efc5dc05582f04126c8

                      SHA256

                      b59af38911a8d307a5be3eded3ebdd7914fe527901391e6e7f18d7a5f517e5a3

                      SHA512

                      64d8abefd862a8890f09d7cbed501a3b157006c5d168b82bac0cb77ee70e6c14c3f6778cdf37171b89d6a87835191c285c993b82b8f1d14df019f406a6c3e641

                    • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\6ir3v68x.default-release\prefs.js

                      Filesize

                      10KB

                      MD5

                      ecf0c1427a629fdea178dbb7cb1cafc9

                      SHA1

                      245730e22b24d3572db76a173e04bbd58fcbdd2d

                      SHA256

                      598074d37e7a462a94f5fc4f4d0bd8209ef87691458f8f67ef936716f23a312b

                      SHA512

                      d2e291103f4ef1a840d79a2e8e5a184ba0c92ba86b07eaf55401c6e406b876e02806ce86958b7b7a6a3090aaeb3861b7ad230a76fc7d469fa3793201778e9051

                    • memory/1244-40-0x00000000004F0000-0x0000000000B70000-memory.dmp

                      Filesize

                      6.5MB

                    • memory/1244-42-0x00000000004F0000-0x0000000000B70000-memory.dmp

                      Filesize

                      6.5MB

                    • memory/2232-1285-0x0000000000130000-0x00000000005D7000-memory.dmp

                      Filesize

                      4.7MB

                    • memory/2232-1324-0x0000000000130000-0x00000000005D7000-memory.dmp

                      Filesize

                      4.7MB

                    • memory/2232-2097-0x0000000000130000-0x00000000005D7000-memory.dmp

                      Filesize

                      4.7MB

                    • memory/2904-47-0x0000000000670000-0x0000000000B30000-memory.dmp

                      Filesize

                      4.8MB

                    • memory/2904-48-0x0000000000670000-0x0000000000B30000-memory.dmp

                      Filesize

                      4.8MB

                    • memory/2976-31-0x0000000000670000-0x0000000000B30000-memory.dmp

                      Filesize

                      4.8MB

                    • memory/2976-45-0x0000000000670000-0x0000000000B30000-memory.dmp

                      Filesize

                      4.8MB

                    • memory/2976-44-0x0000000000670000-0x0000000000B30000-memory.dmp

                      Filesize

                      4.8MB

                    • memory/2976-67-0x0000000000670000-0x0000000000B30000-memory.dmp

                      Filesize

                      4.8MB

                    • memory/2976-43-0x0000000000670000-0x0000000000B30000-memory.dmp

                      Filesize

                      4.8MB

                    • memory/3336-3488-0x0000000000670000-0x0000000000B30000-memory.dmp

                      Filesize

                      4.8MB

                    • memory/3368-32-0x0000000000410000-0x00000000008D0000-memory.dmp

                      Filesize

                      4.8MB

                    • memory/3368-18-0x0000000000410000-0x00000000008D0000-memory.dmp

                      Filesize

                      4.8MB

                    • memory/3368-17-0x0000000000410000-0x00000000008D0000-memory.dmp

                      Filesize

                      4.8MB

                    • memory/3368-16-0x0000000000411000-0x000000000043F000-memory.dmp

                      Filesize

                      184KB

                    • memory/3368-15-0x00000000777E4000-0x00000000777E6000-memory.dmp

                      Filesize

                      8KB

                    • memory/3368-14-0x0000000000410000-0x00000000008D0000-memory.dmp

                      Filesize

                      4.8MB

                    • memory/3968-136-0x00000000053A0000-0x0000000005480000-memory.dmp

                      Filesize

                      896KB

                    • memory/3968-112-0x00000000053A0000-0x0000000005480000-memory.dmp

                      Filesize

                      896KB

                    • memory/3968-91-0x00000000053A0000-0x0000000005480000-memory.dmp

                      Filesize

                      896KB

                    • memory/3968-128-0x00000000053A0000-0x0000000005480000-memory.dmp

                      Filesize

                      896KB

                    • memory/3968-1267-0x00000000055C0000-0x0000000005616000-memory.dmp

                      Filesize

                      344KB

                    • memory/3968-1268-0x0000000005510000-0x000000000555C000-memory.dmp

                      Filesize

                      304KB

                    • memory/3968-93-0x00000000053A0000-0x0000000005480000-memory.dmp

                      Filesize

                      896KB

                    • memory/3968-94-0x00000000053A0000-0x0000000005480000-memory.dmp

                      Filesize

                      896KB

                    • memory/3968-96-0x00000000053A0000-0x0000000005480000-memory.dmp

                      Filesize

                      896KB

                    • memory/3968-130-0x00000000053A0000-0x0000000005480000-memory.dmp

                      Filesize

                      896KB

                    • memory/3968-98-0x00000000053A0000-0x0000000005480000-memory.dmp

                      Filesize

                      896KB

                    • memory/3968-100-0x00000000053A0000-0x0000000005480000-memory.dmp

                      Filesize

                      896KB

                    • memory/3968-132-0x00000000053A0000-0x0000000005480000-memory.dmp

                      Filesize

                      896KB

                    • memory/3968-135-0x00000000053A0000-0x0000000005480000-memory.dmp

                      Filesize

                      896KB

                    • memory/3968-122-0x00000000053A0000-0x0000000005480000-memory.dmp

                      Filesize

                      896KB

                    • memory/3968-138-0x00000000053A0000-0x0000000005480000-memory.dmp

                      Filesize

                      896KB

                    • memory/3968-104-0x00000000053A0000-0x0000000005480000-memory.dmp

                      Filesize

                      896KB

                    • memory/3968-142-0x00000000053A0000-0x0000000005480000-memory.dmp

                      Filesize

                      896KB

                    • memory/3968-106-0x00000000053A0000-0x0000000005480000-memory.dmp

                      Filesize

                      896KB

                    • memory/3968-144-0x00000000053A0000-0x0000000005480000-memory.dmp

                      Filesize

                      896KB

                    • memory/3968-147-0x00000000053A0000-0x0000000005480000-memory.dmp

                      Filesize

                      896KB

                    • memory/3968-124-0x00000000053A0000-0x0000000005480000-memory.dmp

                      Filesize

                      896KB

                    • memory/3968-120-0x00000000053A0000-0x0000000005480000-memory.dmp

                      Filesize

                      896KB

                    • memory/3968-108-0x00000000053A0000-0x0000000005480000-memory.dmp

                      Filesize

                      896KB

                    • memory/3968-118-0x00000000053A0000-0x0000000005480000-memory.dmp

                      Filesize

                      896KB

                    • memory/3968-116-0x00000000053A0000-0x0000000005480000-memory.dmp

                      Filesize

                      896KB

                    • memory/3968-140-0x00000000053A0000-0x0000000005480000-memory.dmp

                      Filesize

                      896KB

                    • memory/3968-126-0x00000000053A0000-0x0000000005480000-memory.dmp

                      Filesize

                      896KB

                    • memory/3968-102-0x00000000053A0000-0x0000000005480000-memory.dmp

                      Filesize

                      896KB

                    • memory/3968-110-0x00000000053A0000-0x0000000005480000-memory.dmp

                      Filesize

                      896KB

                    • memory/3968-90-0x00000000053A0000-0x0000000005486000-memory.dmp

                      Filesize

                      920KB

                    • memory/3968-89-0x0000000005160000-0x000000000516A000-memory.dmp

                      Filesize

                      40KB

                    • memory/3968-114-0x00000000053A0000-0x0000000005480000-memory.dmp

                      Filesize

                      896KB

                    • memory/3968-88-0x0000000005170000-0x0000000005202000-memory.dmp

                      Filesize

                      584KB

                    • memory/3968-87-0x0000000005680000-0x0000000005C24000-memory.dmp

                      Filesize

                      5.6MB

                    • memory/3968-86-0x00000000003B0000-0x00000000008A0000-memory.dmp

                      Filesize

                      4.9MB

                    • memory/4368-1301-0x0000000000E40000-0x00000000014E0000-memory.dmp

                      Filesize

                      6.6MB

                    • memory/4368-1303-0x0000000000E40000-0x00000000014E0000-memory.dmp

                      Filesize

                      6.6MB

                    • memory/4952-37-0x0000000000BD0000-0x0000000001081000-memory.dmp

                      Filesize

                      4.7MB

                    • memory/4952-36-0x0000000000BD0000-0x0000000001081000-memory.dmp

                      Filesize

                      4.7MB

                    • memory/5544-2057-0x0000000000E90000-0x0000000001148000-memory.dmp

                      Filesize

                      2.7MB

                    • memory/5544-2119-0x0000000000E90000-0x0000000001148000-memory.dmp

                      Filesize

                      2.7MB

                    • memory/5544-2045-0x0000000000E90000-0x0000000001148000-memory.dmp

                      Filesize

                      2.7MB

                    • memory/5544-2058-0x0000000000E90000-0x0000000001148000-memory.dmp

                      Filesize

                      2.7MB

                    • memory/5544-2112-0x0000000000E90000-0x0000000001148000-memory.dmp

                      Filesize

                      2.7MB

                    • memory/6104-2085-0x0000000000210000-0x0000000000DF6000-memory.dmp

                      Filesize

                      11.9MB

                    • memory/6104-2114-0x0000000000210000-0x0000000000DF6000-memory.dmp

                      Filesize

                      11.9MB

                    • memory/6276-2105-0x0000000000400000-0x00000000008A3000-memory.dmp

                      Filesize

                      4.6MB

                    • memory/6276-6343-0x0000000000400000-0x00000000008A3000-memory.dmp

                      Filesize

                      4.6MB

                    • memory/6276-2149-0x0000000000400000-0x00000000008A3000-memory.dmp

                      Filesize

                      4.6MB

                    • memory/6288-4868-0x000000006E850000-0x000000006E8BE000-memory.dmp

                      Filesize

                      440KB

                    • memory/6288-4847-0x00000000035C0000-0x000000000362D000-memory.dmp

                      Filesize

                      436KB

                    • memory/6440-2427-0x0000000000390000-0x000000000101C000-memory.dmp

                      Filesize

                      12.5MB

                    • memory/6440-2142-0x0000000000390000-0x000000000101C000-memory.dmp

                      Filesize

                      12.5MB