Analysis

  • max time kernel
    148s
  • max time network
    150s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240508-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system
  • submitted
    09/05/2024, 05:43

General

  • Target

    e85ddc9a9967c7f9520697cf989bbe8bb1ac50fa0f2392673cd72db000a9629c.exe

  • Size

    5.8MB

  • MD5

    26fb68f5c1b93def68f18de7a83b0ad5

  • SHA1

    0545e8c8a042c2953db92cd9ead14bbe1eb44316

  • SHA256

    e85ddc9a9967c7f9520697cf989bbe8bb1ac50fa0f2392673cd72db000a9629c

  • SHA512

    b4634955b927e08de726bf42baadf030815bfc72ea7ffda85fe7dc99912df610f3ce856f91607336636a03a590b91a793e5380c1a5eb22ead00c9e8a00cedf5c

  • SSDEEP

    98304:znsfMJBeiJ9aWN8rP4S18frP3wbzWFimaI7dloW:7LBeiJ9aC9gbzWFimaI7dlF

Malware Config

Signatures

  • Detects binaries (Windows and macOS) referencing many web browsers. Observed in information stealers. 4 IoCs
  • Detects executables containing SQL queries to confidential data stores. Observed in infostealers 4 IoCs
  • UPX dump on OEP (original entry point) 17 IoCs
  • Modifies AppInit DLL entries 2 TTPs
  • ACProtect 1.3x - 1.4x DLL software 1 IoCs

    Detects file using ACProtect software.

  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Loads dropped DLL 6 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • UPX packed file 17 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Adds Run key to start application 2 TTPs 1 IoCs
  • Enumerates connected drives 3 TTPs 1 IoCs

    Attempts to read the root path of hard drives other than the default C: drive.

  • Installs/modifies Browser Helper Object 2 TTPs 8 IoCs

    BHOs are DLL modules which act as plugins for Internet Explorer.

  • Drops file in Program Files directory 2 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Checks processor information in registry 2 TTPs 6 IoCs

    Processor information is often read in order to detect sandboxing environments.

  • Modifies Internet Explorer settings 1 TTPs 22 IoCs
  • Modifies registry class 16 IoCs
  • Suspicious behavior: EnumeratesProcesses 8 IoCs
  • Suspicious use of AdjustPrivilegeToken 12 IoCs
  • Suspicious use of FindShellTrayWindow 5 IoCs
  • Suspicious use of SendNotifyMessage 4 IoCs
  • Suspicious use of SetWindowsHookEx 12 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs
  • Uses Task Scheduler COM API 1 TTPs

    The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.

Processes

  • C:\Users\Admin\AppData\Local\Temp\e85ddc9a9967c7f9520697cf989bbe8bb1ac50fa0f2392673cd72db000a9629c.exe
    "C:\Users\Admin\AppData\Local\Temp\e85ddc9a9967c7f9520697cf989bbe8bb1ac50fa0f2392673cd72db000a9629c.exe"
    1⤵
    • Checks computer location settings
    • Loads dropped DLL
    • Adds Run key to start application
    • Enumerates connected drives
    • Installs/modifies Browser Helper Object
    • Drops file in Program Files directory
    • Modifies Internet Explorer settings
    • Modifies registry class
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SendNotifyMessage
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:2880
    • C:\Windows\SysWOW64\regsvr32.exe
      "C:\Windows\System32\regsvr32.exe" /s "C:\Users\Admin\AppData\Local\Temp\IDMShellExt64.dll"
      2⤵
      • Loads dropped DLL
      • Suspicious use of AdjustPrivilegeToken
      PID:5020
    • C:\Program Files\Mozilla Firefox\firefox.exe
      "C:\Program Files\Mozilla Firefox\firefox.exe" https://www.internetdownloadmanager.com/support/installffextfrommozillasite.html
      2⤵
      • Suspicious use of WriteProcessMemory
      PID:5044
      • C:\Program Files\Mozilla Firefox\firefox.exe
        "C:\Program Files\Mozilla Firefox\firefox.exe" https://www.internetdownloadmanager.com/support/installffextfrommozillasite.html
        3⤵
        • Checks processor information in registry
        • Modifies registry class
        • Suspicious use of AdjustPrivilegeToken
        • Suspicious use of FindShellTrayWindow
        • Suspicious use of SendNotifyMessage
        • Suspicious use of SetWindowsHookEx
        • Suspicious use of WriteProcessMemory
        PID:2596
        • C:\Program Files\Mozilla Firefox\firefox.exe
          "C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel="2596.0.1488670628\334744695" -parentBuildID 20230214051806 -prefsHandle 1804 -prefMapHandle 1796 -prefsLen 22076 -prefMapSize 235121 -appDir "C:\Program Files\Mozilla Firefox\browser" - {ad92abf7-e470-45bc-a615-20c5c25166bf} 2596 "\\.\pipe\gecko-crash-server-pipe.2596" 1884 1e95140dd58 gpu
          4⤵
            PID:4676
          • C:\Program Files\Mozilla Firefox\firefox.exe
            "C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel="2596.1.337350447\677887644" -parentBuildID 20230214051806 -prefsHandle 2448 -prefMapHandle 2436 -prefsLen 22927 -prefMapSize 235121 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {f99e59a3-4745-4460-a58b-fbd9a874ae36} 2596 "\\.\pipe\gecko-crash-server-pipe.2596" 2476 1e93cf86258 socket
            4⤵
              PID:2788
            • C:\Program Files\Mozilla Firefox\firefox.exe
              "C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel="2596.2.1512419337\1380124467" -childID 1 -isForBrowser -prefsHandle 3012 -prefMapHandle 3008 -prefsLen 22965 -prefMapSize 235121 -jsInitHandle 1296 -jsInitLen 246560 -a11yResourceId 64 -parentBuildID 20230214051806 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {8c1f1a73-a57a-4189-8880-ac5f9c60e306} 2596 "\\.\pipe\gecko-crash-server-pipe.2596" 3024 1e954143258 tab
              4⤵
                PID:1616
              • C:\Program Files\Mozilla Firefox\firefox.exe
                "C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel="2596.3.57623100\1943372442" -childID 2 -isForBrowser -prefsHandle 4008 -prefMapHandle 4004 -prefsLen 27616 -prefMapSize 235121 -jsInitHandle 1296 -jsInitLen 246560 -a11yResourceId 64 -parentBuildID 20230214051806 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {a70fff3a-3a7f-4b18-87a8-ad2a07b49711} 2596 "\\.\pipe\gecko-crash-server-pipe.2596" 3572 1e955f2a658 tab
                4⤵
                  PID:1960
                • C:\Program Files\Mozilla Firefox\firefox.exe
                  "C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel="2596.4.533552661\1606257603" -childID 3 -isForBrowser -prefsHandle 5092 -prefMapHandle 4544 -prefsLen 27616 -prefMapSize 235121 -jsInitHandle 1296 -jsInitLen 246560 -a11yResourceId 64 -parentBuildID 20230214051806 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {4876aa50-5c1a-4fe7-a6e3-dd1397128238} 2596 "\\.\pipe\gecko-crash-server-pipe.2596" 5036 1e957ef7458 tab
                  4⤵
                    PID:4500
                  • C:\Program Files\Mozilla Firefox\firefox.exe
                    "C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel="2596.5.2135228572\631739071" -childID 4 -isForBrowser -prefsHandle 5256 -prefMapHandle 5264 -prefsLen 27616 -prefMapSize 235121 -jsInitHandle 1296 -jsInitLen 246560 -a11yResourceId 64 -parentBuildID 20230214051806 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {cf4f9858-4d33-42ef-9b28-e6ab72ec1f1a} 2596 "\\.\pipe\gecko-crash-server-pipe.2596" 5208 1e957ef7a58 tab
                    4⤵
                      PID:4144
                    • C:\Program Files\Mozilla Firefox\firefox.exe
                      "C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel="2596.6.1879631218\670228643" -childID 5 -isForBrowser -prefsHandle 5516 -prefMapHandle 5512 -prefsLen 27616 -prefMapSize 235121 -jsInitHandle 1296 -jsInitLen 246560 -a11yResourceId 64 -parentBuildID 20230214051806 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {c63ee031-294f-4740-a7c0-66e037b63207} 2596 "\\.\pipe\gecko-crash-server-pipe.2596" 5528 1e957ef9558 tab
                      4⤵
                        PID:4200
                      • C:\Program Files\Mozilla Firefox\firefox.exe
                        "C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel="2596.7.270870219\1100306147" -childID 6 -isForBrowser -prefsHandle 3284 -prefMapHandle 4544 -prefsLen 27697 -prefMapSize 235121 -jsInitHandle 1296 -jsInitLen 246560 -a11yResourceId 64 -parentBuildID 20230214051806 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {37857a19-6df6-4e88-8e62-e220838d9858} 2596 "\\.\pipe\gecko-crash-server-pipe.2596" 5216 1e953b55c58 tab
                        4⤵
                          PID:4408
                    • C:\Windows\SysWOW64\regsvr32.exe
                      "C:\Windows\System32\regsvr32.exe" /s "C:\Users\Admin\AppData\Local\Temp\IDMShellExt64.dll"
                      2⤵
                      • Loads dropped DLL
                      • Suspicious use of AdjustPrivilegeToken
                      PID:4040
                    • C:\Windows\SysWOW64\regsvr32.exe
                      "C:\Windows\System32\regsvr32.exe" /s "C:\Users\Admin\AppData\Local\Temp\IDMIECC64.dll"
                      2⤵
                      • Loads dropped DLL
                      • Suspicious use of AdjustPrivilegeToken
                      PID:556
                    • C:\Windows\SysWOW64\regsvr32.exe
                      "C:\Windows\System32\regsvr32.exe" /s "C:\Users\Admin\AppData\Local\Temp\IDMGetAll64.dll"
                      2⤵
                      • Loads dropped DLL
                      • Suspicious use of AdjustPrivilegeToken
                      PID:1560
                    • C:\Windows\SysWOW64\regsvr32.exe
                      "C:\Windows\System32\regsvr32.exe" /s "C:\Users\Admin\AppData\Local\Temp\downlWithIDM64.dll"
                      2⤵
                      • Loads dropped DLL
                      • Suspicious use of AdjustPrivilegeToken
                      PID:2936

                  Network

                        MITRE ATT&CK Enterprise v15

                        Replay Monitor

                        Loading Replay Monitor...

                        Downloads

                        • C:\Program Files\Common Files\System\symsrv.dll

                          Filesize

                          67KB

                          MD5

                          7574cf2c64f35161ab1292e2f532aabf

                          SHA1

                          14ba3fa927a06224dfe587014299e834def4644f

                          SHA256

                          de055a89de246e629a8694bde18af2b1605e4b9b493c7e4aef669dd67acf5085

                          SHA512

                          4db19f2d8d5bc1c7bbb812d3fa9c43b80fa22140b346d2760f090b73aed8a5177edb4bddc647a6ebd5a2db8565be5a1a36a602b0d759e38540d9a584ba5896ab

                        • C:\Program Files\Common Files\System\symsrv.dll.000

                          Filesize

                          175B

                          MD5

                          1130c911bf5db4b8f7cf9b6f4b457623

                          SHA1

                          48e734c4bc1a8b5399bff4954e54b268bde9d54c

                          SHA256

                          eba08cc8182f379392a97f542b350ea0dbbe5e4009472f35af20e3d857eafdf1

                          SHA512

                          94e2511ef2c53494c2aff0960266491ffc0e54e75185427d1ccedae27c286992c754ca94cbb0c9ea36e3f04cd4eb7f032c551cf2d4b309f292906303f1a75fa0

                        • C:\Users\Admin\AppData\Local\Mozilla\Firefox\Profiles\7jyxcjs8.default-release\activity-stream.discovery_stream.json.tmp

                          Filesize

                          23KB

                          MD5

                          7fc63df970162f6d539be7da61d47ec9

                          SHA1

                          4ac82e51d533520eac138d748142096edde2d1d1

                          SHA256

                          b0929aa1c2a6605d337ffbe6d8c2e95fcd41d96061b77adc8bd12e3075874a6a

                          SHA512

                          db65be8ad7b7c8fbd1e7cf07d9071ce9a7ad000c20be6c20a34b6da8145d94873bee6cb1dc85068acfdcd0285167ddac731c6981d7ec5687d613be476d933f28

                        • C:\Users\Admin\AppData\Local\Mozilla\Firefox\Profiles\7jyxcjs8.default-release\activity-stream.discovery_stream.json.tmp

                          Filesize

                          23KB

                          MD5

                          9c3126dc69801b458ba2360cf849139c

                          SHA1

                          7f0314961b8eaee509cd625caa2d89ee613cd5b3

                          SHA256

                          732cc822343cb37a9635157866290c184a2f468d7e5b81879b8f4473faeb548e

                          SHA512

                          35b43dd25e81eecd7a4c30b82a6c15ad069b14ba9afbedac09ff2c24f775b9658f586bebc800db15afc63bbce39f88a49ecc777d54c23b7f2594d9d60340e9bc

                        • C:\Users\Admin\AppData\Local\Mozilla\Firefox\Profiles\7jyxcjs8.default-release\cache2\entries\CC9AFF3BE02AD27708D587AE49B3DC68644172BA

                          Filesize

                          13KB

                          MD5

                          27c6639fc7f2dedc1dbcea7919076a01

                          SHA1

                          560281beef44b77e81383a3f8e3eca8bf9ed4302

                          SHA256

                          afa420e9d52a230e684688679606caa804e128899bd44343751bd6a6a8ddfd17

                          SHA512

                          69dc8521e982114bee97357207c4290db2b4da6b9673515417d5cdd43a7bcb962d08c7abe8338c8362016eb3855355cb31eefa76ceb0e170c4950906ee86d95b

                        • C:\Users\Admin\AppData\Local\Temp\tmpaddon

                          Filesize

                          442KB

                          MD5

                          85430baed3398695717b0263807cf97c

                          SHA1

                          fffbee923cea216f50fce5d54219a188a5100f41

                          SHA256

                          a9f4281f82b3579581c389e8583dc9f477c7fd0e20c9dfc91a2e611e21e3407e

                          SHA512

                          06511f1f6c6d44d076b3c593528c26a602348d9c41689dbf5ff716b671c3ca5756b12cb2e5869f836dedce27b1a5cfe79b93c707fd01f8e84b620923bb61b5f1

                        • C:\Users\Admin\AppData\Local\Temp\tmpaddon-1

                          Filesize

                          8.0MB

                          MD5

                          a01c5ecd6108350ae23d2cddf0e77c17

                          SHA1

                          c6ac28a2cd979f1f9a75d56271821d5ff665e2b6

                          SHA256

                          345d44e3aa3e1967d186a43d732c8051235c43458169a5d7d371780a6475ee42

                          SHA512

                          b046dd1b26ec0b810ee441b7ad4dc135e3f1521a817b9f3db60a32976352e8f7e53920e1a77fc5b4130aac260d79deef7e823267b4414e9cc774d8bffca56a72

                        • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\7jyxcjs8.default-release\gmp-gmpopenh264\1.8.1.2\gmpopenh264.dll

                          Filesize

                          997KB

                          MD5

                          fe3355639648c417e8307c6d051e3e37

                          SHA1

                          f54602d4b4778da21bc97c7238fc66aa68c8ee34

                          SHA256

                          1ed7877024be63a049da98733fd282c16bd620530a4fb580dacec3a78ace914e

                          SHA512

                          8f4030bb2464b98eccbea6f06eb186d7216932702d94f6b84c56419e9cf65a18309711ab342d1513bf85aed402bc3535a70db4395874828f0d35c278dd2eac9c

                        • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\7jyxcjs8.default-release\gmp-gmpopenh264\1.8.1.2\gmpopenh264.info

                          Filesize

                          116B

                          MD5

                          3d33cdc0b3d281e67dd52e14435dd04f

                          SHA1

                          4db88689282fd4f9e9e6ab95fcbb23df6e6485db

                          SHA256

                          f526e9f98841d987606efeaff7f3e017ba9fd516c4be83890c7f9a093ea4c47b

                          SHA512

                          a4a96743332cc8ef0f86bc2e6122618bfc75ed46781dadbac9e580cd73df89e74738638a2cccb4caa4cbbf393d771d7f2c73f825737cdb247362450a0d4a4bc1

                        • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\7jyxcjs8.default-release\gmp-widevinecdm\4.10.2557.0\LICENSE.txt

                          Filesize

                          479B

                          MD5

                          49ddb419d96dceb9069018535fb2e2fc

                          SHA1

                          62aa6fea895a8b68d468a015f6e6ab400d7a7ca6

                          SHA256

                          2af127b4e00f7303de8271996c0c681063e4dc7abdc7b2a8c3fe5932b9352539

                          SHA512

                          48386217dabf7556e381ab3f5924b123a0a525969ff98f91efb03b65477c94e48a15d9abcec116b54616d36ad52b6f1d7b8b84c49c204e1b9b43f26f2af92da2

                        • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\7jyxcjs8.default-release\gmp-widevinecdm\4.10.2557.0\manifest.json

                          Filesize

                          372B

                          MD5

                          8be33af717bb1b67fbd61c3f4b807e9e

                          SHA1

                          7cf17656d174d951957ff36810e874a134dd49e0

                          SHA256

                          e92d3394635edfb987a7528e0ccd24360e07a299078df2a6967ca3aae22fa2dd

                          SHA512

                          6125f60418e25fee896bf59f5672945cd8f36f03665c721837bb50adf5b4dfef2dddbfcfc817555027dcfa90e1ef2a1e80af1219e8063629ea70263d2fc936a7

                        • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\7jyxcjs8.default-release\gmp-widevinecdm\4.10.2557.0\widevinecdm.dll

                          Filesize

                          11.8MB

                          MD5

                          33bf7b0439480effb9fb212efce87b13

                          SHA1

                          cee50f2745edc6dc291887b6075ca64d716f495a

                          SHA256

                          8ee42d9258e20bbc5bfdfae61605429beb5421ffeaaa0d02b86d4978f4b4ac4e

                          SHA512

                          d329a1a1d98e302142f2776de8cc2cd45a465d77cb21c461bdf5ee58c68073a715519f449cb673977288fe18401a0abcce636c85abaec61a4a7a08a16c924275

                        • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\7jyxcjs8.default-release\gmp-widevinecdm\4.10.2557.0\widevinecdm.dll.lib

                          Filesize

                          1KB

                          MD5

                          688bed3676d2104e7f17ae1cd2c59404

                          SHA1

                          952b2cdf783ac72fcb98338723e9afd38d47ad8e

                          SHA256

                          33899a3ebc22cb8ed8de7bd48c1c29486c0279b06d7ef98241c92aef4e3b9237

                          SHA512

                          7a0e3791f75c229af79dd302f7d0594279f664886fea228cfe78e24ef185ae63aba809aa1036feb3130066deadc8e78909c277f0a7ed1e3485df3cf2cd329776

                        • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\7jyxcjs8.default-release\gmp-widevinecdm\4.10.2557.0\widevinecdm.dll.sig

                          Filesize

                          1KB

                          MD5

                          937326fead5fd401f6cca9118bd9ade9

                          SHA1

                          4526a57d4ae14ed29b37632c72aef3c408189d91

                          SHA256

                          68a03f075db104f84afdd8fca45a7e4bff7b55dc1a2a24272b3abe16d8759c81

                          SHA512

                          b232f6cf3f88adb346281167ac714c4c4c7aac15175087c336911946d12d63d3a3a458e06b298b41a7ec582ef09fe238da3a3166ff89c450117228f7485c22d2

                        • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\7jyxcjs8.default-release\prefs-1.js

                          Filesize

                          8KB

                          MD5

                          5d02b337f8de65e958bbe646addf0c6a

                          SHA1

                          d87e672607d99b574a404d784c4f318bcbdf3651

                          SHA256

                          8fe7723e517c1979d894ea0902701f7639a5a5d966e379f14e443e31c03a3930

                          SHA512

                          72a2c99e0848df9e7d084a55c74756ea57945d5653ad398e1b08d0a94fd8ea5be8879fce827257531960ee88ee0849e208846934ef2325c013e5dfc7a692ad3e

                        • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\7jyxcjs8.default-release\prefs-1.js

                          Filesize

                          7KB

                          MD5

                          6d071ce50fd31bce0345c94cf059145c

                          SHA1

                          4cfe42be066ea8febb01b35c1f250bf2720242b8

                          SHA256

                          c2ca27788306108545f6d16fd7c693a6717d2cd5bfce694a94fffb99fc37244b

                          SHA512

                          c4ed068dab0cbcb1e60588c1a7adcff1cc7cbaec6cee5717180457769761cd500ec227a6b6a49838b97c06ac8f4030aeb477dbe207143b3277d5a3fc9905f623

                        • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\7jyxcjs8.default-release\prefs.js

                          Filesize

                          6KB

                          MD5

                          fa5f500e40884cedc34533c5199d32d4

                          SHA1

                          452ebb31424969be4ae4a8f709faf16a4ac10f5b

                          SHA256

                          428751e4212c2fa58c35712f92003b610c39387905eaf5fe92e925bee6129258

                          SHA512

                          19f60f554be83f257e09217fa7fb943b2d96c8620ad7fa6bc43333fd8583896fd36697f3bb999b389981bd4a562ef3d2d81e6e5646e8da86c93a8ca0072e63ff

                        • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\7jyxcjs8.default-release\prefs.js

                          Filesize

                          6KB

                          MD5

                          8293af1d12a692c3804d57e97e56c652

                          SHA1

                          c9dd0dbbff5bbfc350e893fa39bde72184974000

                          SHA256

                          ea2235d6e7dd83c90b63e753a8208984d5b163c31f089f0c463eec703d76859d

                          SHA512

                          8ceaf683d80aa920d725a808cb731b55d133548068357971c676908169f5c9b6b314aaaeb3290e4e7b2349768edd59a5aa1a9b20069b977c68766d90da2f2a68

                        • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\7jyxcjs8.default-release\sessionstore-backups\recovery.jsonlz4

                          Filesize

                          3KB

                          MD5

                          d7c25aa4126cb3621dc59060de8f62f4

                          SHA1

                          8a1dfffa0b2bfe64610329167da47968deda43c1

                          SHA256

                          15c34d7867b47136d0c7e9bbdb7bf8bddd96632717f630c1d82df769e4ac4df0

                          SHA512

                          3fda26e37d7cd739c824de27b1218051e8249c9e8a3e9c3689bbd35d175f19154fa8875f5eda6387577523d12f0561a85ede62f4d565e48c20d72062cee645df

                        • memory/556-159-0x0000000010000000-0x0000000010030000-memory.dmp

                          Filesize

                          192KB

                        • memory/556-157-0x0000000010000000-0x0000000010030000-memory.dmp

                          Filesize

                          192KB

                        • memory/1560-164-0x0000000010000000-0x0000000010030000-memory.dmp

                          Filesize

                          192KB

                        • memory/1560-161-0x0000000010000000-0x0000000010030000-memory.dmp

                          Filesize

                          192KB

                        • memory/2880-176-0x00000000007D0000-0x0000000000D98000-memory.dmp

                          Filesize

                          5.8MB

                        • memory/2880-141-0x0000000010000000-0x0000000010030000-memory.dmp

                          Filesize

                          192KB

                        • memory/2880-19-0x00000000007D0000-0x0000000000D98000-memory.dmp

                          Filesize

                          5.8MB

                        • memory/2880-2182-0x00000000007D0000-0x0000000000D98000-memory.dmp

                          Filesize

                          5.8MB

                        • memory/2880-4-0x0000000010000000-0x0000000010030000-memory.dmp

                          Filesize

                          192KB

                        • memory/2880-177-0x0000000010000000-0x0000000010030000-memory.dmp

                          Filesize

                          192KB

                        • memory/2880-2183-0x0000000010000000-0x0000000010030000-memory.dmp

                          Filesize

                          192KB

                        • memory/2880-20-0x0000000010000000-0x0000000010030000-memory.dmp

                          Filesize

                          192KB

                        • memory/2880-142-0x0000000010000000-0x0000000010030000-memory.dmp

                          Filesize

                          192KB

                        • memory/2880-178-0x00000000007D0000-0x0000000000D98000-memory.dmp

                          Filesize

                          5.8MB

                        • memory/2936-166-0x0000000010000000-0x0000000010030000-memory.dmp

                          Filesize

                          192KB

                        • memory/2936-165-0x0000000010000000-0x0000000010030000-memory.dmp

                          Filesize

                          192KB

                        • memory/4040-156-0x0000000010000000-0x0000000010030000-memory.dmp

                          Filesize

                          192KB

                        • memory/4040-153-0x0000000010000000-0x0000000010030000-memory.dmp

                          Filesize

                          192KB

                        • memory/5020-16-0x0000000010000000-0x0000000010030000-memory.dmp

                          Filesize

                          192KB

                        • memory/5020-14-0x0000000010000000-0x0000000010030000-memory.dmp

                          Filesize

                          192KB