Analysis

  • max time kernel
    723s
  • max time network
    789s
  • platform
    windows10-1703_x64
  • resource
    win10-20240611-en
  • resource tags

    arch:x64arch:x86image:win10-20240611-enlocale:en-usos:windows10-1703-x64system
  • submitted
    29-06-2024 06:36

Errors

Reason
Machine shutdown

General

  • Target

    无害.exe

  • Size

    5.6MB

  • MD5

    eb08619ed85a31118a80ce0a2f73f25f

  • SHA1

    4289df26068458def91c876933e0483867625b2b

  • SHA256

    f775611b5d45d3c13217c30f3792963894ecf0726a554188e5e2ee72077e6939

  • SHA512

    b8f32587867025e11c6af73c8c3c7ba8f0ec2966cbd2a702240ab26c789ff791475d753ce53114d4c07dc0e2b2c79deba7ae1752d8ccca1ba6337d4a468e3fb0

  • SSDEEP

    98304:F3AszIKgNQbnhi1ZKUZWFCGFR62sn+s0eFyVJPJuyacAlKWjR9qw4H9U:F3jzIRi1S+LFR6DZwrPJuplKWvgW

Malware Config

Signatures

  • AgentTesla

    Agent Tesla is a remote access tool (RAT) written in visual basic.

  • AgentTesla payload 1 IoCs
  • Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs 1 IoCs
  • Checks BIOS information in registry 2 TTPs 2 IoCs

    BIOS information is often read in order to detect sandboxing environments.

  • Themida packer 3 IoCs

    Detects Themida, an advanced Windows software protection system.

  • Checks whether UAC is enabled 1 TTPs 1 IoCs
  • Drops file in System32 directory 1 IoCs
  • Sets desktop wallpaper using registry 2 TTPs 1 IoCs
  • Suspicious use of NtSetInformationThreadHideFromDebugger 1 IoCs
  • Checks processor information in registry 2 TTPs 10 IoCs

    Processor information is often read in order to detect sandboxing environments.

  • Enumerates system info in registry 2 TTPs 3 IoCs
  • Modifies Internet Explorer settings 1 TTPs 1 IoCs
  • Modifies data under HKEY_USERS 64 IoCs
  • Modifies registry class 1 IoCs
  • Suspicious behavior: AddClipboardFormatListener 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 2 IoCs
  • Suspicious use of AdjustPrivilegeToken 6 IoCs
  • Suspicious use of FindShellTrayWindow 48 IoCs
  • Suspicious use of SendNotifyMessage 44 IoCs
  • Suspicious use of SetWindowsHookEx 6 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs
  • Uses Task Scheduler COM API 1 TTPs

    The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.

Processes

  • C:\Users\Admin\AppData\Local\Temp\无害.exe
    "C:\Users\Admin\AppData\Local\Temp\无害.exe"
    1⤵
    • Identifies VirtualBox via ACPI registry values (likely anti-VM)
    • Checks BIOS information in registry
    • Checks whether UAC is enabled
    • Sets desktop wallpaper using registry
    • Suspicious use of NtSetInformationThreadHideFromDebugger
    • Enumerates system info in registry
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    PID:2356
  • C:\Windows\system32\LogonUI.exe
    "LogonUI.exe" /flags:0x0 /state0:0xa3ae8855 /state1:0x41c64e6d
    1⤵
    • Modifies data under HKEY_USERS
    PID:4824
  • C:\Program Files\Mozilla Firefox\firefox.exe
    "C:\Program Files\Mozilla Firefox\firefox.exe"
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:4712
    • C:\Program Files\Mozilla Firefox\firefox.exe
      "C:\Program Files\Mozilla Firefox\firefox.exe"
      2⤵
      • Drops file in System32 directory
      • Checks processor information in registry
      • Modifies registry class
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of FindShellTrayWindow
      • Suspicious use of SendNotifyMessage
      • Suspicious use of SetWindowsHookEx
      • Suspicious use of WriteProcessMemory
      PID:4068
      • C:\Program Files\Mozilla Firefox\firefox.exe
        "C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel="4068.0.69365711\883118109" -parentBuildID 20221007134813 -prefsHandle 1572 -prefMapHandle 1564 -prefsLen 20845 -prefMapSize 233444 -appDir "C:\Program Files\Mozilla Firefox\browser" - {af300eaf-e04e-4bb1-af94-d40b1cb9bc98} 4068 "\\.\pipe\gecko-crash-server-pipe.4068" 1652 1ae7faed558 gpu
        3⤵
          PID:5068
        • C:\Program Files\Mozilla Firefox\firefox.exe
          "C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel="4068.1.1702318259\1397290179" -parentBuildID 20221007134813 -prefsHandle 1984 -prefMapHandle 1980 -prefsLen 20926 -prefMapSize 233444 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {135a5b57-6b03-4518-81e0-8aed6ceb9a27} 4068 "\\.\pipe\gecko-crash-server-pipe.4068" 1996 1ae7f632f58 socket
          3⤵
          • Checks processor information in registry
          PID:1344
        • C:\Program Files\Mozilla Firefox\firefox.exe
          "C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel="4068.2.1351364638\276159456" -childID 1 -isForBrowser -prefsHandle 2552 -prefMapHandle 2548 -prefsLen 21029 -prefMapSize 233444 -jsInitHandle 1172 -jsInitLen 246848 -a11yResourceId 64 -parentBuildID 20221007134813 -appDir "C:\Program Files\Mozilla Firefox\browser" - {d310183d-f44e-427e-a309-3b3ca93a7dff} 4068 "\\.\pipe\gecko-crash-server-pipe.4068" 2888 1ae067d4758 tab
          3⤵
            PID:1668
          • C:\Program Files\Mozilla Firefox\firefox.exe
            "C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel="4068.3.1469555923\367750658" -childID 2 -isForBrowser -prefsHandle 3176 -prefMapHandle 3172 -prefsLen 26214 -prefMapSize 233444 -jsInitHandle 1172 -jsInitLen 246848 -a11yResourceId 64 -parentBuildID 20221007134813 -appDir "C:\Program Files\Mozilla Firefox\browser" - {b027ac89-32d4-4973-a51a-fcecc44a464e} 4068 "\\.\pipe\gecko-crash-server-pipe.4068" 3188 1ae05146f58 tab
            3⤵
              PID:1884
            • C:\Program Files\Mozilla Firefox\firefox.exe
              "C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel="4068.4.1635809839\1554943041" -childID 3 -isForBrowser -prefsHandle 3472 -prefMapHandle 3468 -prefsLen 26214 -prefMapSize 233444 -jsInitHandle 1172 -jsInitLen 246848 -a11yResourceId 64 -parentBuildID 20221007134813 -appDir "C:\Program Files\Mozilla Firefox\browser" - {3d4670d8-b6a2-4aea-ac21-ecbfe8ba7159} 4068 "\\.\pipe\gecko-crash-server-pipe.4068" 3496 1ae77464158 tab
              3⤵
                PID:4404
              • C:\Program Files\Mozilla Firefox\firefox.exe
                "C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel="4068.5.327793836\590333762" -childID 4 -isForBrowser -prefsHandle 4148 -prefMapHandle 4132 -prefsLen 26349 -prefMapSize 233444 -jsInitHandle 1172 -jsInitLen 246848 -a11yResourceId 64 -parentBuildID 20221007134813 -appDir "C:\Program Files\Mozilla Firefox\browser" - {21339795-e969-43a3-b81f-198cc8f61b72} 4068 "\\.\pipe\gecko-crash-server-pipe.4068" 4156 1ae08a0f658 tab
                3⤵
                  PID:4948
                • C:\Program Files\Mozilla Firefox\firefox.exe
                  "C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel="4068.6.402636126\496461988" -childID 5 -isForBrowser -prefsHandle 4332 -prefMapHandle 4336 -prefsLen 26349 -prefMapSize 233444 -jsInitHandle 1172 -jsInitLen 246848 -a11yResourceId 64 -parentBuildID 20221007134813 -appDir "C:\Program Files\Mozilla Firefox\browser" - {bb73b8e5-158c-48c0-a1e0-9e8fba66923f} 4068 "\\.\pipe\gecko-crash-server-pipe.4068" 3032 1ae08a0ea58 tab
                  3⤵
                    PID:3652
                  • C:\Program Files\Mozilla Firefox\firefox.exe
                    "C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel="4068.7.657773897\2064873551" -childID 6 -isForBrowser -prefsHandle 4540 -prefMapHandle 4484 -prefsLen 26349 -prefMapSize 233444 -jsInitHandle 1172 -jsInitLen 246848 -a11yResourceId 64 -parentBuildID 20221007134813 -appDir "C:\Program Files\Mozilla Firefox\browser" - {89589002-e4fc-42af-83de-d4da57b5553a} 4068 "\\.\pipe\gecko-crash-server-pipe.4068" 4320 1ae08a0e458 tab
                    3⤵
                      PID:4764
                    • C:\Program Files\Mozilla Firefox\firefox.exe
                      "C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel="4068.8.360232692\1438696593" -childID 7 -isForBrowser -prefsHandle 4916 -prefMapHandle 3968 -prefsLen 26524 -prefMapSize 233444 -jsInitHandle 1172 -jsInitLen 246848 -a11yResourceId 64 -parentBuildID 20221007134813 -appDir "C:\Program Files\Mozilla Firefox\browser" - {1b6e33d3-2a4b-4d22-84cb-0e3def701b55} 4068 "\\.\pipe\gecko-crash-server-pipe.4068" 4924 1ae09cd0f58 tab
                      3⤵
                        PID:2184
                  • C:\Windows\system32\LogonUI.exe
                    "LogonUI.exe" /flags:0x0 /state0:0xa3af0055 /state1:0x41c64e6d
                    1⤵
                    • Modifies data under HKEY_USERS
                    PID:4448
                  • C:\Windows\system32\taskmgr.exe
                    "C:\Windows\system32\taskmgr.exe" /4
                    1⤵
                    • Suspicious behavior: EnumeratesProcesses
                    • Suspicious behavior: GetForegroundWindowSpam
                    • Suspicious use of AdjustPrivilegeToken
                    • Suspicious use of FindShellTrayWindow
                    • Suspicious use of SendNotifyMessage
                    PID:2664
                  • C:\Windows\system32\LogonUI.exe
                    "LogonUI.exe" /flags:0x0 /state0:0xa3af2855 /state1:0x41c64e6d
                    1⤵
                    • Modifies data under HKEY_USERS
                    PID:2876
                  • C:\Windows\SysWOW64\mshta.exe
                    "C:\Windows\SysWOW64\mshta.exe" "C:\Users\Admin\Desktop\SuspendRestore.hta" {1E460BD7-F1C3-4B2E-88BF-4E770A288AF5}{1E460BD7-F1C3-4B2E-88BF-4E770A288AF5}
                    1⤵
                      PID:416
                    • C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroRd32.exe
                      "C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroRd32.exe"
                      1⤵
                      • Checks processor information in registry
                      • Modifies Internet Explorer settings
                      • Suspicious use of SetWindowsHookEx
                      PID:1276
                      • C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe
                        "C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe" --backgroundcolor=16514043
                        2⤵
                          PID:3672
                          • C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe
                            "C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe" --type=gpu-process --disable-pack-loading --lang=en-US --log-file="C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\debug.log" --log-severity=disable --product-version="ReaderServices/19.10.20064 Chrome/64.0.3282.119" --gpu-preferences=GAAAAAAAAAAAB4AAAQAAAAAAAAAAAGAA --use-gl=swiftshader-webgl --gpu-vendor-id=0x1234 --gpu-device-id=0x1111 --gpu-driver-vendor="Google Inc." --gpu-driver-version=3.3.0.2 --gpu-driver-date=2017/04/07 --disable-pack-loading --lang=en-US --log-file="C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\debug.log" --log-severity=disable --product-version="ReaderServices/19.10.20064 Chrome/64.0.3282.119" --service-request-channel-token=D5AC85208398E4B2B099EF3AEF5F028C --mojo-platform-channel-handle=1536 --allow-no-sandbox-job --ignored=" --type=renderer " /prefetch:2
                            3⤵
                              PID:5036
                            • C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe
                              "C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe" --type=renderer --disable-browser-side-navigation --disable-gpu-compositing --service-pipe-token=A6C0E430C5D18413EB90FCFE138C2F38 --lang=en-US --disable-pack-loading --lang=en-US --log-file="C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\debug.log" --log-severity=disable --product-version="ReaderServices/19.10.20064 Chrome/64.0.3282.119" --enable-pinch --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --enable-gpu-async-worker-context --content-image-texture-target=0,0,3553;0,1,3553;0,2,3553;0,3,3553;0,4,3553;0,5,3553;0,6,3553;0,7,3553;0,8,3553;0,9,3553;0,10,3553;0,11,3553;0,12,3553;0,13,3553;0,14,3553;0,15,3553;0,16,3553;0,17,3553;0,18,3553;1,0,3553;1,1,3553;1,2,3553;1,3,3553;1,4,3553;1,5,3553;1,6,3553;1,7,3553;1,8,3553;1,9,3553;1,10,3553;1,11,3553;1,12,3553;1,13,3553;1,14,3553;1,15,3553;1,16,3553;1,17,3553;1,18,3553;2,0,3553;2,1,3553;2,2,3553;2,3,3553;2,4,3553;2,5,3553;2,6,3553;2,7,3553;2,8,3553;2,9,3553;2,10,3553;2,11,3553;2,12,3553;2,13,3553;2,14,3553;2,15,3553;2,16,3553;2,17,3553;2,18,3553;3,0,3553;3,1,3553;3,2,3553;3,3,3553;3,4,3553;3,5,3553;3,6,3553;3,7,3553;3,8,3553;3,9,3553;3,10,3553;3,11,3553;3,12,3553;3,13,3553;3,14,3553;3,15,3553;3,16,3553;3,17,3553;3,18,3553;4,0,3553;4,1,3553;4,2,3553;4,3,3553;4,4,3553;4,5,3553;4,6,3553;4,7,3553;4,8,3553;4,9,3553;4,10,3553;4,11,3553;4,12,3553;4,13,3553;4,14,3553;4,15,3553;4,16,3553;4,17,3553;4,18,3553;5,0,3553;5,1,3553;5,2,3553;5,3,3553;5,4,3553;5,5,3553;5,6,3553;5,7,3553;5,8,3553;5,9,3553;5,10,3553;5,11,3553;5,12,3553;5,13,3553;5,14,3553;5,15,3553;5,16,3553;5,17,3553;5,18,3553;6,0,3553;6,1,3553;6,2,3553;6,3,3553;6,4,3553;6,5,3553;6,6,3553;6,7,3553;6,8,3553;6,9,3553;6,10,3553;6,11,3553;6,12,3553;6,13,3553;6,14,3553;6,15,3553;6,16,3553;6,17,3553;6,18,3553 --disable-accelerated-video-decode --service-request-channel-token=A6C0E430C5D18413EB90FCFE138C2F38 --renderer-client-id=2 --mojo-platform-channel-handle=1548 --allow-no-sandbox-job /prefetch:1
                              3⤵
                                PID:444
                              • C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe
                                "C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe" --type=gpu-process --disable-pack-loading --lang=en-US --log-file="C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\debug.log" --log-severity=disable --product-version="ReaderServices/19.10.20064 Chrome/64.0.3282.119" --gpu-preferences=GAAAAAAAAAAAB4AAAQAAAAAAAAAAAGAA --use-gl=swiftshader-webgl --gpu-vendor-id=0x1234 --gpu-device-id=0x1111 --gpu-driver-vendor="Google Inc." --gpu-driver-version=3.3.0.2 --gpu-driver-date=2017/04/07 --disable-pack-loading --lang=en-US --log-file="C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\debug.log" --log-severity=disable --product-version="ReaderServices/19.10.20064 Chrome/64.0.3282.119" --service-request-channel-token=681761A68B6207C0E20B31CB58B1B0E3 --mojo-platform-channel-handle=2132 --allow-no-sandbox-job --ignored=" --type=renderer " /prefetch:2
                                3⤵
                                  PID:3520
                            • C:\Program Files\VideoLAN\VLC\vlc.exe
                              "C:\Program Files\VideoLAN\VLC\vlc.exe" --started-from-file "C:\Users\Admin\Desktop\GrantReceive.mp4"
                              1⤵
                              • Suspicious behavior: AddClipboardFormatListener
                              • Suspicious behavior: GetForegroundWindowSpam
                              • Suspicious use of FindShellTrayWindow
                              • Suspicious use of SendNotifyMessage
                              • Suspicious use of SetWindowsHookEx
                              PID:4924
                            • C:\Windows\System32\rundll32.exe
                              C:\Windows\System32\rundll32.exe shell32.dll,SHCreateLocalServerRunDll {9BA05972-F6A8-11CF-A442-00A0C90A8F39} -Embedding
                              1⤵
                                PID:5100
                              • C:\Windows\system32\LogonUI.exe
                                "LogonUI.exe" /flags:0x0 /state0:0xa3afc855 /state1:0x41c64e6d
                                1⤵
                                • Modifies data under HKEY_USERS
                                PID:240
                              • C:\Windows\system32\LogonUI.exe
                                "LogonUI.exe" /flags:0x0 /state0:0xa3afd055 /state1:0x41c64e6d
                                1⤵
                                • Modifies data under HKEY_USERS
                                PID:1108
                              • C:\Windows\system32\LogonUI.exe
                                "LogonUI.exe" /flags:0x0 /state0:0xa3aff855 /state1:0x41c64e6d
                                1⤵
                                • Modifies data under HKEY_USERS
                                PID:4416

                              Network

                              MITRE ATT&CK Enterprise v15

                              Replay Monitor

                              Loading Replay Monitor...

                              Downloads

                              • C:\Users\Admin\AppData\Local\Mozilla\Firefox\Profiles\2b7acdhd.default-release\activity-stream.discovery_stream.json.tmp

                                Filesize

                                23KB

                                MD5

                                73b7996b0b1e4e13e4089d008af2962b

                                SHA1

                                1c52d62d23c28395336d72a5c51666daf13e4488

                                SHA256

                                20ada5c7919ec44ec4e4a818bbe471f5e26ac9e14527c643f31e5a1b4d9f678c

                                SHA512

                                7242bbc20df3ed45b0186c07f869eba3e005976acf9280cc9721ea0746af5805e704be241be2cac5d62adb0ecd7aa76f912004b10b934738ef3f038a14abd24b

                              • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\2b7acdhd.default-release\datareporting\glean\db\data.safe.bin

                                Filesize

                                2KB

                                MD5

                                88f8e2c751a2acd1358551ba0655c2dd

                                SHA1

                                11983c612040cea6f14fca1b7287fe15b039ca68

                                SHA256

                                337289d5f4e4505224749e7db0c327494a708c3eb061d6ce254564fd5e8d82fe

                                SHA512

                                7782f2e68690adbe5046c90757d12ab2d0326121ddb779fc307de332aa2bab92d3a911c707622436cad4ab4c7186b3d6db4fe6bfc9120206133c3a1f70ab7c67

                              • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\2b7acdhd.default-release\datareporting\glean\pending_pings\506d84e3-fbfe-494f-a88f-f9511a1cbaa4

                                Filesize

                                746B

                                MD5

                                e092db89a0d1573fdfba850b94177559

                                SHA1

                                40721a6b922715fee7abfd1b62d35d019f1d3a4e

                                SHA256

                                365d24405014b00745d1722da2dbbf359681c3e07d49362bf2fa34608ece7dfb

                                SHA512

                                73e3570bbd44e3f83f3b40b7e344a78602149128f288e50a5758c039c2e9b1167a8c2f7c65363ced14747e4bfaffa9e9717be495de5d7c724231446caf2c742c

                              • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\2b7acdhd.default-release\datareporting\glean\pending_pings\84579792-b92c-44ec-8f38-e67ae6ad3379

                                Filesize

                                10KB

                                MD5

                                4306ba9a85d67ac2db0f4cbec143167a

                                SHA1

                                eddb8f3657afa4705ba091ef8e62bbe4dcd33a71

                                SHA256

                                d1beaa2aa69cbc1dbf501dbc0a3a88e0185a9ecc3cdd1f39178f054f52695d93

                                SHA512

                                72caa63e6878349fe0db1462b6620d7ff69be0192c6fd2a0b1e7e74a08df5378f03e0bf10300e4ed9200adb8d370150defcb862ee75a9a4050080cb3f7260e22

                              • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\2b7acdhd.default-release\prefs-1.js

                                Filesize

                                6KB

                                MD5

                                61738015e7ee527b5eab8a050f734d06

                                SHA1

                                c123679c43f2b543661dedea39d6f0a93288f86f

                                SHA256

                                07d85e2d6f3e17b396b52107a901bf87e4a9f67ab61ef7e452ac29d7526acac4

                                SHA512

                                ef8ec2d6c209a29528c111f64814688283d54b85521d82071583a75993ab8c04dd1e257b4c1de7e01ac270a5d7bcb5af6cb9eb90f81975a9b705cf23fd1115fa

                              • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\2b7acdhd.default-release\prefs.js

                                Filesize

                                6KB

                                MD5

                                cc74f12ba0cff93d552b1f8fb67e062f

                                SHA1

                                25816f451608ba42091862dc52d1f1ccfee70c73

                                SHA256

                                8815be080dd8505d5a00345b6d79e430902d8f8584c09697b728628a396df349

                                SHA512

                                206de922088034e1647fd1c336e189e862ed2f6e689935be29efef5c069545bfd888b62b5dd42b6085d4e8db9c5e4e6f8fe04e911b9a61bd2a233045847658ab

                              • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\2b7acdhd.default-release\sessionstore-backups\recovery.jsonlz4

                                Filesize

                                1KB

                                MD5

                                ba7f575b85465cdc03939165622e1984

                                SHA1

                                ef3f5262c6e7c36d4a6c0e051a00d16d55f68a8a

                                SHA256

                                b16257db2e43a61de5d6500483f70f134230d2a95dd79c9bee02e8751f611b48

                                SHA512

                                2286f589a8f4c1d7174c7d9dbb8f2ec322a757b68ebbd3385e67e9295e17880caf3138d26cfa78014674a36c4995e5d655dff0ad91f584fc2f0aaa94fbb38a15

                              • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\2b7acdhd.default-release\sessionstore-backups\recovery.jsonlz4

                                Filesize

                                1KB

                                MD5

                                e3919f5219135a43070f9e3350053791

                                SHA1

                                c847059d21501d0016c567852e6f655f1f865bd1

                                SHA256

                                f296d448714d5158fd0bbb3bf5d50c915e26f83a3f5f1a57d7d89eb0703501da

                                SHA512

                                9980797e02e6d014da42edc49079b71b3ba5cd8b906f82690bb3df7b970f7fddf0674752538b18f4e96fb9acc101eb96018068af784c62f90f39565236a3e035

                              • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\2b7acdhd.default-release\sessionstore.jsonlz4

                                Filesize

                                861B

                                MD5

                                2ed938a7e2789067f9d0a14e91c2c39a

                                SHA1

                                9cedec0cbec166d450946b9178e8c703491822b9

                                SHA256

                                6df3f03f243d1d7d3e5f509a8d25ca71a84c332f971b6b8d338bd1d3909895ba

                                SHA512

                                a7dc42193d2bf227ccbe711737681149f150186c878e51072c8154bf97ad729de61ce5fb483c39e600e282eca4b6f80a96913a7085bed66a78c33613ee4a145a

                              • C:\Windows\System32\catroot2\dberr.txt

                                Filesize

                                99KB

                                MD5

                                c3eeb7cb0b0cda60f3c9e9d75000e36e

                                SHA1

                                8a15e876ac149d8afb9bd16da7de2d1be86972ba

                                SHA256

                                363683d9591c47a03e85cb09e1633e6dc973e066d7044fd26278cd5dc56ca320

                                SHA512

                                e3cbd1ed25797274329316fca3e162d17d89d8022527f055113b4cf372b12e64b10a99ea19e1adea46f9d44fcc170926959710baa17135267cf89d6a3785622c

                              • memory/2356-8-0x0000000000400000-0x00000000013D0000-memory.dmp

                                Filesize

                                15.8MB

                              • memory/2356-1-0x00007FF87EFD0000-0x00007FF87F1AB000-memory.dmp

                                Filesize

                                1.9MB

                              • memory/2356-10-0x0000000005CC0000-0x00000000061BE000-memory.dmp

                                Filesize

                                5.0MB

                              • memory/2356-9-0x0000000000400000-0x00000000013D0000-memory.dmp

                                Filesize

                                15.8MB

                              • memory/2356-12-0x0000000006310000-0x000000000631A000-memory.dmp

                                Filesize

                                40KB

                              • memory/2356-13-0x0000000010000000-0x0000000010214000-memory.dmp

                                Filesize

                                2.1MB

                              • memory/2356-7-0x0000000000400000-0x00000000013D0000-memory.dmp

                                Filesize

                                15.8MB

                              • memory/2356-11-0x0000000005BE0000-0x0000000005C72000-memory.dmp

                                Filesize

                                584KB

                              • memory/2356-0-0x0000000000400000-0x00000000013D0000-memory.dmp

                                Filesize

                                15.8MB

                              • memory/2356-295-0x0000000000400000-0x00000000013D0000-memory.dmp

                                Filesize

                                15.8MB

                              • memory/4924-340-0x00007FF872790000-0x00007FF8727C4000-memory.dmp

                                Filesize

                                208KB

                              • memory/4924-339-0x00007FF6616C0000-0x00007FF6617B8000-memory.dmp

                                Filesize

                                992KB

                              • memory/4924-341-0x00007FF8670D0000-0x00007FF867386000-memory.dmp

                                Filesize

                                2.7MB

                              • memory/4924-342-0x00007FF861850000-0x00007FF862900000-memory.dmp

                                Filesize

                                16.7MB