Analysis
-
max time kernel
571s -
max time network
600s -
platform
windows10_x64 -
resource
win10-20220414-en -
submitted
22-04-2022 11:08
Behavioral task
behavioral1
Sample
poster_2014_find_evil.pdf
Resource
win10-20220414-en
0 signatures
0 seconds
General
-
Target
poster_2014_find_evil.pdf
-
Size
1.8MB
-
MD5
a3ec44b6dde3cdac0442c88de3ef9ded
-
SHA1
66cf41a39d97444290a77ec5c16c10d4242e93fa
-
SHA256
b11d2987361be54247a1ab5eb76b8f632c459fdee32804e97e1547e3ce65433f
-
SHA512
a3849f66ffbd936676754ac09a19f63eda338ce84a909bcc8010b79d874680b38cfce6404880742670436789711d45d9b795b187ce04d1caad70c9e01b294b31
Score
1/10
Malware Config
Signatures
-
Checks processor information in registry 2 TTPs 7 IoCs
Processor information is often read in order to detect sandboxing environments.
Processes:
firefox.exeAcroRd32.exedescription ioc process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Update Signature firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Update Revision firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~Mhz firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\VendorIdentifier firefox.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 AcroRd32.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz AcroRd32.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 firefox.exe -
Processes:
AcroRd32.exedescription ioc process Key created \REGISTRY\USER\S-1-5-21-4236190499-842014725-259441995-1000\SOFTWARE\Microsoft\Internet Explorer\Main\FeatureControl\FEATURE_BROWSER_EMULATION AcroRd32.exe -
Modifies registry class 1 IoCs
Processes:
firefox.exedescription ioc process Key created \REGISTRY\USER\S-1-5-21-4236190499-842014725-259441995-1000_Classes\Local Settings firefox.exe -
Suspicious behavior: EnumeratesProcesses 20 IoCs
Processes:
AcroRd32.exepid process 4704 AcroRd32.exe 4704 AcroRd32.exe 4704 AcroRd32.exe 4704 AcroRd32.exe 4704 AcroRd32.exe 4704 AcroRd32.exe 4704 AcroRd32.exe 4704 AcroRd32.exe 4704 AcroRd32.exe 4704 AcroRd32.exe 4704 AcroRd32.exe 4704 AcroRd32.exe 4704 AcroRd32.exe 4704 AcroRd32.exe 4704 AcroRd32.exe 4704 AcroRd32.exe 4704 AcroRd32.exe 4704 AcroRd32.exe 4704 AcroRd32.exe 4704 AcroRd32.exe -
Suspicious use of AdjustPrivilegeToken 6 IoCs
Processes:
firefox.exedescription pid process Token: SeDebugPrivilege 3344 firefox.exe Token: SeDebugPrivilege 3344 firefox.exe Token: SeDebugPrivilege 3344 firefox.exe Token: SeDebugPrivilege 3344 firefox.exe Token: SeDebugPrivilege 3344 firefox.exe Token: SeDebugPrivilege 3344 firefox.exe -
Suspicious use of FindShellTrayWindow 5 IoCs
Processes:
AcroRd32.exefirefox.exepid process 4704 AcroRd32.exe 3344 firefox.exe 3344 firefox.exe 3344 firefox.exe 3344 firefox.exe -
Suspicious use of SendNotifyMessage 3 IoCs
Processes:
firefox.exepid process 3344 firefox.exe 3344 firefox.exe 3344 firefox.exe -
Suspicious use of SetWindowsHookEx 10 IoCs
Processes:
AcroRd32.exefirefox.exepid process 4704 AcroRd32.exe 4704 AcroRd32.exe 4704 AcroRd32.exe 4704 AcroRd32.exe 4704 AcroRd32.exe 3344 firefox.exe 4704 AcroRd32.exe 3344 firefox.exe 3344 firefox.exe 3344 firefox.exe -
Suspicious use of WriteProcessMemory 64 IoCs
Processes:
AcroRd32.exeRdrCEF.exedescription pid process target process PID 4704 wrote to memory of 4928 4704 AcroRd32.exe RdrCEF.exe PID 4704 wrote to memory of 4928 4704 AcroRd32.exe RdrCEF.exe PID 4704 wrote to memory of 4928 4704 AcroRd32.exe RdrCEF.exe PID 4928 wrote to memory of 60 4928 RdrCEF.exe RdrCEF.exe PID 4928 wrote to memory of 60 4928 RdrCEF.exe RdrCEF.exe PID 4928 wrote to memory of 60 4928 RdrCEF.exe RdrCEF.exe PID 4928 wrote to memory of 60 4928 RdrCEF.exe RdrCEF.exe PID 4928 wrote to memory of 60 4928 RdrCEF.exe RdrCEF.exe PID 4928 wrote to memory of 60 4928 RdrCEF.exe RdrCEF.exe PID 4928 wrote to memory of 60 4928 RdrCEF.exe RdrCEF.exe PID 4928 wrote to memory of 60 4928 RdrCEF.exe RdrCEF.exe PID 4928 wrote to memory of 60 4928 RdrCEF.exe RdrCEF.exe PID 4928 wrote to memory of 60 4928 RdrCEF.exe RdrCEF.exe PID 4928 wrote to memory of 60 4928 RdrCEF.exe RdrCEF.exe PID 4928 wrote to memory of 60 4928 RdrCEF.exe RdrCEF.exe PID 4928 wrote to memory of 60 4928 RdrCEF.exe RdrCEF.exe PID 4928 wrote to memory of 60 4928 RdrCEF.exe RdrCEF.exe PID 4928 wrote to memory of 60 4928 RdrCEF.exe RdrCEF.exe PID 4928 wrote to memory of 60 4928 RdrCEF.exe RdrCEF.exe PID 4928 wrote to memory of 60 4928 RdrCEF.exe RdrCEF.exe PID 4928 wrote to memory of 60 4928 RdrCEF.exe RdrCEF.exe PID 4928 wrote to memory of 60 4928 RdrCEF.exe RdrCEF.exe PID 4928 wrote to memory of 60 4928 RdrCEF.exe RdrCEF.exe PID 4928 wrote to memory of 60 4928 RdrCEF.exe RdrCEF.exe PID 4928 wrote to memory of 60 4928 RdrCEF.exe RdrCEF.exe PID 4928 wrote to memory of 60 4928 RdrCEF.exe RdrCEF.exe PID 4928 wrote to memory of 60 4928 RdrCEF.exe RdrCEF.exe PID 4928 wrote to memory of 60 4928 RdrCEF.exe RdrCEF.exe PID 4928 wrote to memory of 60 4928 RdrCEF.exe RdrCEF.exe PID 4928 wrote to memory of 60 4928 RdrCEF.exe RdrCEF.exe PID 4928 wrote to memory of 60 4928 RdrCEF.exe RdrCEF.exe PID 4928 wrote to memory of 60 4928 RdrCEF.exe RdrCEF.exe PID 4928 wrote to memory of 60 4928 RdrCEF.exe RdrCEF.exe PID 4928 wrote to memory of 60 4928 RdrCEF.exe RdrCEF.exe PID 4928 wrote to memory of 60 4928 RdrCEF.exe RdrCEF.exe PID 4928 wrote to memory of 60 4928 RdrCEF.exe RdrCEF.exe PID 4928 wrote to memory of 60 4928 RdrCEF.exe RdrCEF.exe PID 4928 wrote to memory of 60 4928 RdrCEF.exe RdrCEF.exe PID 4928 wrote to memory of 60 4928 RdrCEF.exe RdrCEF.exe PID 4928 wrote to memory of 60 4928 RdrCEF.exe RdrCEF.exe PID 4928 wrote to memory of 60 4928 RdrCEF.exe RdrCEF.exe PID 4928 wrote to memory of 60 4928 RdrCEF.exe RdrCEF.exe PID 4928 wrote to memory of 60 4928 RdrCEF.exe RdrCEF.exe PID 4928 wrote to memory of 60 4928 RdrCEF.exe RdrCEF.exe PID 4928 wrote to memory of 1956 4928 RdrCEF.exe RdrCEF.exe PID 4928 wrote to memory of 1956 4928 RdrCEF.exe RdrCEF.exe PID 4928 wrote to memory of 1956 4928 RdrCEF.exe RdrCEF.exe PID 4928 wrote to memory of 1956 4928 RdrCEF.exe RdrCEF.exe PID 4928 wrote to memory of 1956 4928 RdrCEF.exe RdrCEF.exe PID 4928 wrote to memory of 1956 4928 RdrCEF.exe RdrCEF.exe PID 4928 wrote to memory of 1956 4928 RdrCEF.exe RdrCEF.exe PID 4928 wrote to memory of 1956 4928 RdrCEF.exe RdrCEF.exe PID 4928 wrote to memory of 1956 4928 RdrCEF.exe RdrCEF.exe PID 4928 wrote to memory of 1956 4928 RdrCEF.exe RdrCEF.exe PID 4928 wrote to memory of 1956 4928 RdrCEF.exe RdrCEF.exe PID 4928 wrote to memory of 1956 4928 RdrCEF.exe RdrCEF.exe PID 4928 wrote to memory of 1956 4928 RdrCEF.exe RdrCEF.exe PID 4928 wrote to memory of 1956 4928 RdrCEF.exe RdrCEF.exe PID 4928 wrote to memory of 1956 4928 RdrCEF.exe RdrCEF.exe PID 4928 wrote to memory of 1956 4928 RdrCEF.exe RdrCEF.exe PID 4928 wrote to memory of 1956 4928 RdrCEF.exe RdrCEF.exe PID 4928 wrote to memory of 1956 4928 RdrCEF.exe RdrCEF.exe PID 4928 wrote to memory of 1956 4928 RdrCEF.exe RdrCEF.exe PID 4928 wrote to memory of 1956 4928 RdrCEF.exe RdrCEF.exe
Processes
-
C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroRd32.exe"C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroRd32.exe" "C:\Users\Admin\AppData\Local\Temp\poster_2014_find_evil.pdf"1⤵
- Checks processor information in registry
- Modifies Internet Explorer settings
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
-
C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe"C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe" --backgroundcolor=165140432⤵
- Suspicious use of WriteProcessMemory
-
C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe"C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe" --type=gpu-process --disable-pack-loading --lang=en-US --log-file="C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\debug.log" --log-severity=disable --product-version="ReaderServices/19.10.20064 Chrome/64.0.3282.119" --gpu-preferences=GAAAAAAAAAAAB4AAAQAAAAAAAAAAAGAA --use-gl=swiftshader-webgl --gpu-vendor-id=0x1234 --gpu-device-id=0x1111 --gpu-driver-vendor="Google Inc." --gpu-driver-version=3.3.0.2 --gpu-driver-date=2017/04/07 --disable-pack-loading --lang=en-US --log-file="C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\debug.log" --log-severity=disable --product-version="ReaderServices/19.10.20064 Chrome/64.0.3282.119" --service-request-channel-token=73F15F296B8DB5EEC1ACB1E64CA36DB5 --mojo-platform-channel-handle=1636 --allow-no-sandbox-job --ignored=" --type=renderer " /prefetch:23⤵
-
C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe"C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe" --type=renderer --disable-browser-side-navigation --disable-gpu-compositing --service-pipe-token=5D7F124F2741CDAA6845592F1CC46E07 --lang=en-US --disable-pack-loading --lang=en-US --log-file="C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\debug.log" --log-severity=disable --product-version="ReaderServices/19.10.20064 Chrome/64.0.3282.119" --enable-pinch --device-scale-factor=1 --num-raster-threads=1 --enable-gpu-async-worker-context --content-image-texture-target=0,0,3553;0,1,3553;0,2,3553;0,3,3553;0,4,3553;0,5,3553;0,6,3553;0,7,3553;0,8,3553;0,9,3553;0,10,3553;0,11,3553;0,12,3553;0,13,3553;0,14,3553;0,15,3553;0,16,3553;0,17,3553;0,18,3553;1,0,3553;1,1,3553;1,2,3553;1,3,3553;1,4,3553;1,5,3553;1,6,3553;1,7,3553;1,8,3553;1,9,3553;1,10,3553;1,11,3553;1,12,3553;1,13,3553;1,14,3553;1,15,3553;1,16,3553;1,17,3553;1,18,3553;2,0,3553;2,1,3553;2,2,3553;2,3,3553;2,4,3553;2,5,3553;2,6,3553;2,7,3553;2,8,3553;2,9,3553;2,10,3553;2,11,3553;2,12,3553;2,13,3553;2,14,3553;2,15,3553;2,16,3553;2,17,3553;2,18,3553;3,0,3553;3,1,3553;3,2,3553;3,3,3553;3,4,3553;3,5,3553;3,6,3553;3,7,3553;3,8,3553;3,9,3553;3,10,3553;3,11,3553;3,12,3553;3,13,3553;3,14,3553;3,15,3553;3,16,3553;3,17,3553;3,18,3553;4,0,3553;4,1,3553;4,2,3553;4,3,3553;4,4,3553;4,5,3553;4,6,3553;4,7,3553;4,8,3553;4,9,3553;4,10,3553;4,11,3553;4,12,3553;4,13,3553;4,14,3553;4,15,3553;4,16,3553;4,17,3553;4,18,3553;5,0,3553;5,1,3553;5,2,3553;5,3,3553;5,4,3553;5,5,3553;5,6,3553;5,7,3553;5,8,3553;5,9,3553;5,10,3553;5,11,3553;5,12,3553;5,13,3553;5,14,3553;5,15,3553;5,16,3553;5,17,3553;5,18,3553;6,0,3553;6,1,3553;6,2,3553;6,3,3553;6,4,3553;6,5,3553;6,6,3553;6,7,3553;6,8,3553;6,9,3553;6,10,3553;6,11,3553;6,12,3553;6,13,3553;6,14,3553;6,15,3553;6,16,3553;6,17,3553;6,18,3553 --disable-accelerated-video-decode --service-request-channel-token=5D7F124F2741CDAA6845592F1CC46E07 --renderer-client-id=2 --mojo-platform-channel-handle=1592 --allow-no-sandbox-job /prefetch:13⤵
-
C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe"C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe" --type=renderer --disable-browser-side-navigation --disable-gpu-compositing --service-pipe-token=FC3E6C7B9CC615953E68034AB6716BEF --lang=en-US --disable-pack-loading --lang=en-US --log-file="C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\debug.log" --log-severity=disable --product-version="ReaderServices/19.10.20064 Chrome/64.0.3282.119" --enable-pinch --device-scale-factor=1 --num-raster-threads=1 --enable-gpu-async-worker-context --content-image-texture-target=0,0,3553;0,1,3553;0,2,3553;0,3,3553;0,4,3553;0,5,3553;0,6,3553;0,7,3553;0,8,3553;0,9,3553;0,10,3553;0,11,3553;0,12,3553;0,13,3553;0,14,3553;0,15,3553;0,16,3553;0,17,3553;0,18,3553;1,0,3553;1,1,3553;1,2,3553;1,3,3553;1,4,3553;1,5,3553;1,6,3553;1,7,3553;1,8,3553;1,9,3553;1,10,3553;1,11,3553;1,12,3553;1,13,3553;1,14,3553;1,15,3553;1,16,3553;1,17,3553;1,18,3553;2,0,3553;2,1,3553;2,2,3553;2,3,3553;2,4,3553;2,5,3553;2,6,3553;2,7,3553;2,8,3553;2,9,3553;2,10,3553;2,11,3553;2,12,3553;2,13,3553;2,14,3553;2,15,3553;2,16,3553;2,17,3553;2,18,3553;3,0,3553;3,1,3553;3,2,3553;3,3,3553;3,4,3553;3,5,3553;3,6,3553;3,7,3553;3,8,3553;3,9,3553;3,10,3553;3,11,3553;3,12,3553;3,13,3553;3,14,3553;3,15,3553;3,16,3553;3,17,3553;3,18,3553;4,0,3553;4,1,3553;4,2,3553;4,3,3553;4,4,3553;4,5,3553;4,6,3553;4,7,3553;4,8,3553;4,9,3553;4,10,3553;4,11,3553;4,12,3553;4,13,3553;4,14,3553;4,15,3553;4,16,3553;4,17,3553;4,18,3553;5,0,3553;5,1,3553;5,2,3553;5,3,3553;5,4,3553;5,5,3553;5,6,3553;5,7,3553;5,8,3553;5,9,3553;5,10,3553;5,11,3553;5,12,3553;5,13,3553;5,14,3553;5,15,3553;5,16,3553;5,17,3553;5,18,3553;6,0,3553;6,1,3553;6,2,3553;6,3,3553;6,4,3553;6,5,3553;6,6,3553;6,7,3553;6,8,3553;6,9,3553;6,10,3553;6,11,3553;6,12,3553;6,13,3553;6,14,3553;6,15,3553;6,16,3553;6,17,3553;6,18,3553 --disable-accelerated-video-decode --service-request-channel-token=FC3E6C7B9CC615953E68034AB6716BEF --renderer-client-id=4 --mojo-platform-channel-handle=2228 --allow-no-sandbox-job /prefetch:13⤵
-
C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe"C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe" --type=gpu-process --disable-pack-loading --lang=en-US --log-file="C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\debug.log" --log-severity=disable --product-version="ReaderServices/19.10.20064 Chrome/64.0.3282.119" --gpu-preferences=GAAAAAAAAAAAB4AAAQAAAAAAAAAAAGAA --use-gl=swiftshader-webgl --gpu-vendor-id=0x1234 --gpu-device-id=0x1111 --gpu-driver-vendor="Google Inc." --gpu-driver-version=3.3.0.2 --gpu-driver-date=2017/04/07 --disable-pack-loading --lang=en-US --log-file="C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\debug.log" --log-severity=disable --product-version="ReaderServices/19.10.20064 Chrome/64.0.3282.119" --service-request-channel-token=99C748F1E285A706BFF774C0BB74C634 --mojo-platform-channel-handle=2568 --allow-no-sandbox-job --ignored=" --type=renderer " /prefetch:23⤵
-
C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe"C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe" --type=gpu-process --disable-pack-loading --lang=en-US --log-file="C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\debug.log" --log-severity=disable --product-version="ReaderServices/19.10.20064 Chrome/64.0.3282.119" --gpu-preferences=GAAAAAAAAAAAB4AAAQAAAAAAAAAAAGAA --use-gl=swiftshader-webgl --gpu-vendor-id=0x1234 --gpu-device-id=0x1111 --gpu-driver-vendor="Google Inc." --gpu-driver-version=3.3.0.2 --gpu-driver-date=2017/04/07 --disable-pack-loading --lang=en-US --log-file="C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\debug.log" --log-severity=disable --product-version="ReaderServices/19.10.20064 Chrome/64.0.3282.119" --service-request-channel-token=DD65E09571CC56F913AC983F64F05951 --mojo-platform-channel-handle=2708 --allow-no-sandbox-job --ignored=" --type=renderer " /prefetch:23⤵
-
C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe"C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe" --type=gpu-process --disable-pack-loading --lang=en-US --log-file="C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\debug.log" --log-severity=disable --product-version="ReaderServices/19.10.20064 Chrome/64.0.3282.119" --gpu-preferences=GAAAAAAAAAAAB4AAAQAAAAAAAAAAAGAA --use-gl=swiftshader-webgl --gpu-vendor-id=0x1234 --gpu-device-id=0x1111 --gpu-driver-vendor="Google Inc." --gpu-driver-version=3.3.0.2 --gpu-driver-date=2017/04/07 --disable-pack-loading --lang=en-US --log-file="C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\debug.log" --log-severity=disable --product-version="ReaderServices/19.10.20064 Chrome/64.0.3282.119" --service-request-channel-token=6922D6E261FE03E498CE37E40ACB734E --mojo-platform-channel-handle=2828 --allow-no-sandbox-job --ignored=" --type=renderer " /prefetch:23⤵
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe"1⤵
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe"2⤵
- Checks processor information in registry
- Modifies registry class
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of SetWindowsHookEx
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel="3344.0.1639868819\852350663" -parentBuildID 20200403170909 -prefsHandle 1512 -prefMapHandle 1504 -prefsLen 1 -prefMapSize 219876 -appdir "C:\Program Files\Mozilla Firefox\browser" - 3344 "\\.\pipe\gecko-crash-server-pipe.3344" 1632 gpu3⤵
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel="3344.3.109268898\1071748551" -childID 1 -isForBrowser -prefsHandle 2252 -prefMapHandle 2180 -prefsLen 122 -prefMapSize 219876 -parentBuildID 20200403170909 -appdir "C:\Program Files\Mozilla Firefox\browser" - 3344 "\\.\pipe\gecko-crash-server-pipe.3344" 2264 tab3⤵
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel="3344.13.1952413054\1248378308" -childID 2 -isForBrowser -prefsHandle 3448 -prefMapHandle 3440 -prefsLen 6898 -prefMapSize 219876 -parentBuildID 20200403170909 -appdir "C:\Program Files\Mozilla Firefox\browser" - 3344 "\\.\pipe\gecko-crash-server-pipe.3344" 3460 tab3⤵
Network
MITRE ATT&CK Matrix ATT&CK v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
memory/60-118-0x0000000077962000-0x0000000077963000-memory.dmpFilesize
4KB
-
memory/60-120-0x0000000000000000-mapping.dmp
-
memory/1956-124-0x0000000000000000-mapping.dmp
-
memory/1956-121-0x0000000077962000-0x0000000077963000-memory.dmpFilesize
4KB
-
memory/3180-138-0x0000000077962000-0x0000000077963000-memory.dmpFilesize
4KB
-
memory/3180-140-0x0000000000000000-mapping.dmp
-
memory/4292-134-0x0000000077962000-0x0000000077963000-memory.dmpFilesize
4KB
-
memory/4292-136-0x0000000000000000-mapping.dmp
-
memory/4612-128-0x0000000077962000-0x0000000077963000-memory.dmpFilesize
4KB
-
memory/4612-130-0x0000000000000000-mapping.dmp
-
memory/4736-142-0x0000000077962000-0x0000000077963000-memory.dmpFilesize
4KB
-
memory/4736-144-0x0000000000000000-mapping.dmp
-
memory/4928-117-0x0000000000000000-mapping.dmp