Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
147s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20231023-en -
resource tags
arch:x64arch:x86image:win10v2004-20231023-enlocale:en-usos:windows10-2004-x64system -
submitted
30/10/2023, 19:34
Static task
static1
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
https://UxNpp.aumnlps.autos/DEVWZE7X
Resource
win10v2004-20231023-en
General
-
Target
https://UxNpp.aumnlps.autos/DEVWZE7X
Malware Config
Signatures
-
Checks processor information in registry 2 TTPs 5 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Update Revision firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~Mhz firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\VendorIdentifier firefox.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Update Signature firefox.exe -
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Modifies registry class 1 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3125601242-331447593-1512828465-1000_Classes\Local Settings firefox.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 1576 msedge.exe 1576 msedge.exe 3412 msedge.exe 3412 msedge.exe 1116 identity_helper.exe 1116 identity_helper.exe 6972 msedge.exe 6972 msedge.exe 6972 msedge.exe 6972 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 10 IoCs
pid Process 3412 msedge.exe 3412 msedge.exe 3412 msedge.exe 3412 msedge.exe 3412 msedge.exe 3412 msedge.exe 3412 msedge.exe 3412 msedge.exe 3412 msedge.exe 3412 msedge.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 5144 firefox.exe Token: SeDebugPrivilege 5144 firefox.exe -
Suspicious use of FindShellTrayWindow 29 IoCs
pid Process 3412 msedge.exe 3412 msedge.exe 3412 msedge.exe 3412 msedge.exe 3412 msedge.exe 3412 msedge.exe 3412 msedge.exe 3412 msedge.exe 3412 msedge.exe 3412 msedge.exe 3412 msedge.exe 3412 msedge.exe 3412 msedge.exe 3412 msedge.exe 3412 msedge.exe 3412 msedge.exe 3412 msedge.exe 3412 msedge.exe 3412 msedge.exe 3412 msedge.exe 3412 msedge.exe 3412 msedge.exe 3412 msedge.exe 3412 msedge.exe 3412 msedge.exe 5144 firefox.exe 5144 firefox.exe 5144 firefox.exe 5144 firefox.exe -
Suspicious use of SendNotifyMessage 27 IoCs
pid Process 3412 msedge.exe 3412 msedge.exe 3412 msedge.exe 3412 msedge.exe 3412 msedge.exe 3412 msedge.exe 3412 msedge.exe 3412 msedge.exe 3412 msedge.exe 3412 msedge.exe 3412 msedge.exe 3412 msedge.exe 3412 msedge.exe 3412 msedge.exe 3412 msedge.exe 3412 msedge.exe 3412 msedge.exe 3412 msedge.exe 3412 msedge.exe 3412 msedge.exe 3412 msedge.exe 3412 msedge.exe 3412 msedge.exe 3412 msedge.exe 5144 firefox.exe 5144 firefox.exe 5144 firefox.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 5144 firefox.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 3412 wrote to memory of 932 3412 msedge.exe 87 PID 3412 wrote to memory of 932 3412 msedge.exe 87 PID 3412 wrote to memory of 2288 3412 msedge.exe 89 PID 3412 wrote to memory of 2288 3412 msedge.exe 89 PID 3412 wrote to memory of 2288 3412 msedge.exe 89 PID 3412 wrote to memory of 2288 3412 msedge.exe 89 PID 3412 wrote to memory of 2288 3412 msedge.exe 89 PID 3412 wrote to memory of 2288 3412 msedge.exe 89 PID 3412 wrote to memory of 2288 3412 msedge.exe 89 PID 3412 wrote to memory of 2288 3412 msedge.exe 89 PID 3412 wrote to memory of 2288 3412 msedge.exe 89 PID 3412 wrote to memory of 2288 3412 msedge.exe 89 PID 3412 wrote to memory of 2288 3412 msedge.exe 89 PID 3412 wrote to memory of 2288 3412 msedge.exe 89 PID 3412 wrote to memory of 2288 3412 msedge.exe 89 PID 3412 wrote to memory of 2288 3412 msedge.exe 89 PID 3412 wrote to memory of 2288 3412 msedge.exe 89 PID 3412 wrote to memory of 2288 3412 msedge.exe 89 PID 3412 wrote to memory of 2288 3412 msedge.exe 89 PID 3412 wrote to memory of 2288 3412 msedge.exe 89 PID 3412 wrote to memory of 2288 3412 msedge.exe 89 PID 3412 wrote to memory of 2288 3412 msedge.exe 89 PID 3412 wrote to memory of 2288 3412 msedge.exe 89 PID 3412 wrote to memory of 2288 3412 msedge.exe 89 PID 3412 wrote to memory of 2288 3412 msedge.exe 89 PID 3412 wrote to memory of 2288 3412 msedge.exe 89 PID 3412 wrote to memory of 2288 3412 msedge.exe 89 PID 3412 wrote to memory of 2288 3412 msedge.exe 89 PID 3412 wrote to memory of 2288 3412 msedge.exe 89 PID 3412 wrote to memory of 2288 3412 msedge.exe 89 PID 3412 wrote to memory of 2288 3412 msedge.exe 89 PID 3412 wrote to memory of 2288 3412 msedge.exe 89 PID 3412 wrote to memory of 2288 3412 msedge.exe 89 PID 3412 wrote to memory of 2288 3412 msedge.exe 89 PID 3412 wrote to memory of 2288 3412 msedge.exe 89 PID 3412 wrote to memory of 2288 3412 msedge.exe 89 PID 3412 wrote to memory of 2288 3412 msedge.exe 89 PID 3412 wrote to memory of 2288 3412 msedge.exe 89 PID 3412 wrote to memory of 2288 3412 msedge.exe 89 PID 3412 wrote to memory of 2288 3412 msedge.exe 89 PID 3412 wrote to memory of 2288 3412 msedge.exe 89 PID 3412 wrote to memory of 2288 3412 msedge.exe 89 PID 3412 wrote to memory of 1576 3412 msedge.exe 90 PID 3412 wrote to memory of 1576 3412 msedge.exe 90 PID 3412 wrote to memory of 4984 3412 msedge.exe 91 PID 3412 wrote to memory of 4984 3412 msedge.exe 91 PID 3412 wrote to memory of 4984 3412 msedge.exe 91 PID 3412 wrote to memory of 4984 3412 msedge.exe 91 PID 3412 wrote to memory of 4984 3412 msedge.exe 91 PID 3412 wrote to memory of 4984 3412 msedge.exe 91 PID 3412 wrote to memory of 4984 3412 msedge.exe 91 PID 3412 wrote to memory of 4984 3412 msedge.exe 91 PID 3412 wrote to memory of 4984 3412 msedge.exe 91 PID 3412 wrote to memory of 4984 3412 msedge.exe 91 PID 3412 wrote to memory of 4984 3412 msedge.exe 91 PID 3412 wrote to memory of 4984 3412 msedge.exe 91 PID 3412 wrote to memory of 4984 3412 msedge.exe 91 PID 3412 wrote to memory of 4984 3412 msedge.exe 91 PID 3412 wrote to memory of 4984 3412 msedge.exe 91 PID 3412 wrote to memory of 4984 3412 msedge.exe 91 PID 3412 wrote to memory of 4984 3412 msedge.exe 91 PID 3412 wrote to memory of 4984 3412 msedge.exe 91 PID 3412 wrote to memory of 4984 3412 msedge.exe 91 PID 3412 wrote to memory of 4984 3412 msedge.exe 91 -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument https://UxNpp.aumnlps.autos/DEVWZE7X1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:3412 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ff8f31d46f8,0x7ff8f31d4708,0x7ff8f31d47182⤵PID:932
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2084,16591029031054203134,8208077178570978561,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2124 /prefetch:22⤵PID:2288
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2084,16591029031054203134,8208077178570978561,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2192 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:1576
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2084,16591029031054203134,8208077178570978561,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2856 /prefetch:82⤵PID:4984
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2084,16591029031054203134,8208077178570978561,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3328 /prefetch:12⤵PID:4300
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2084,16591029031054203134,8208077178570978561,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3336 /prefetch:12⤵PID:1772
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2084,16591029031054203134,8208077178570978561,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4636 /prefetch:12⤵PID:4756
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2084,16591029031054203134,8208077178570978561,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4908 /prefetch:12⤵PID:2468
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2084,16591029031054203134,8208077178570978561,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4968 /prefetch:82⤵PID:3868
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2084,16591029031054203134,8208077178570978561,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4968 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:1116
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2084,16591029031054203134,8208077178570978561,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4940 /prefetch:12⤵PID:4236
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2084,16591029031054203134,8208077178570978561,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5764 /prefetch:12⤵PID:1364
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2084,16591029031054203134,8208077178570978561,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6136 /prefetch:12⤵PID:3684
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2084,16591029031054203134,8208077178570978561,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=13 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3588 /prefetch:12⤵PID:3104
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=edge_collections.mojom.CollectionsDataManager --field-trial-handle=2084,16591029031054203134,8208077178570978561,131072 --lang=en-US --service-sandbox-type=collections --mojo-platform-channel-handle=5432 /prefetch:82⤵PID:2584
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2084,16591029031054203134,8208077178570978561,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=15 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4552 /prefetch:12⤵PID:6736
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2084,16591029031054203134,8208077178570978561,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=16 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=1360 /prefetch:12⤵PID:6664
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2084,16591029031054203134,8208077178570978561,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=4952 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:6972
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:2528
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:5064
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe"1⤵PID:1188
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe"2⤵
- Checks processor information in registry
- Modifies registry class
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of SetWindowsHookEx
PID:5144 -
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel="5144.0.108296919\1829323712" -parentBuildID 20221007134813 -prefsHandle 1880 -prefMapHandle 1872 -prefsLen 20938 -prefMapSize 232675 -appDir "C:\Program Files\Mozilla Firefox\browser" - {19e74890-a8f6-41d6-a372-511812fee987} 5144 "\\.\pipe\gecko-crash-server-pipe.5144" 1960 1e27f1d6858 gpu3⤵PID:5304
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel="5144.1.1973316447\1204582671" -parentBuildID 20221007134813 -prefsHandle 2348 -prefMapHandle 2344 -prefsLen 20974 -prefMapSize 232675 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {0d4b00f6-827e-4dee-b708-4600afbdb8d3} 5144 "\\.\pipe\gecko-crash-server-pipe.5144" 2360 1e27ecf3558 socket3⤵PID:5376
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel="5144.2.1881765827\1137388367" -childID 1 -isForBrowser -prefsHandle 3088 -prefMapHandle 3084 -prefsLen 21077 -prefMapSize 232675 -jsInitHandle 1140 -jsInitLen 246848 -a11yResourceId 64 -parentBuildID 20221007134813 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {5dc195a0-4310-484f-823b-dbc49d8ab858} 5144 "\\.\pipe\gecko-crash-server-pipe.5144" 3100 1e20a8b8b58 tab3⤵PID:5632
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel="5144.3.1082637856\212112694" -childID 2 -isForBrowser -prefsHandle 3512 -prefMapHandle 3524 -prefsLen 26437 -prefMapSize 232675 -jsInitHandle 1140 -jsInitLen 246848 -a11yResourceId 64 -parentBuildID 20221007134813 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {915eab8b-7723-4cf2-8399-f954944463c1} 5144 "\\.\pipe\gecko-crash-server-pipe.5144" 3452 1e20acd2158 tab3⤵PID:5792
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel="5144.4.1304371706\377484373" -childID 3 -isForBrowser -prefsHandle 3788 -prefMapHandle 3784 -prefsLen 26437 -prefMapSize 232675 -jsInitHandle 1140 -jsInitLen 246848 -a11yResourceId 64 -parentBuildID 20221007134813 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {8bbd1e11-03c1-45b5-b23b-e2449c07031f} 5144 "\\.\pipe\gecko-crash-server-pipe.5144" 3800 1e20b842d58 tab3⤵PID:5812
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel="5144.6.1511412136\1781116683" -childID 5 -isForBrowser -prefsHandle 4952 -prefMapHandle 4948 -prefsLen 26496 -prefMapSize 232675 -jsInitHandle 1140 -jsInitLen 246848 -a11yResourceId 64 -parentBuildID 20221007134813 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {51ba81e8-8279-4ff0-88dd-5d51ff693cfc} 5144 "\\.\pipe\gecko-crash-server-pipe.5144" 4960 1e20cfae558 tab3⤵PID:5452
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel="5144.5.2049474192\2059265548" -childID 4 -isForBrowser -prefsHandle 4916 -prefMapHandle 4936 -prefsLen 26496 -prefMapSize 232675 -jsInitHandle 1140 -jsInitLen 246848 -a11yResourceId 64 -parentBuildID 20221007134813 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {73471fa8-b61b-4c68-9d47-5fa99f7a731b} 5144 "\\.\pipe\gecko-crash-server-pipe.5144" 4920 1e20a9d7658 tab3⤵PID:944
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel="5144.7.1306964239\281864147" -childID 6 -isForBrowser -prefsHandle 5264 -prefMapHandle 5268 -prefsLen 26577 -prefMapSize 232675 -jsInitHandle 1140 -jsInitLen 246848 -a11yResourceId 64 -parentBuildID 20221007134813 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {5d937548-c3e9-448a-a67e-29ec7ea0f7c6} 5144 "\\.\pipe\gecko-crash-server-pipe.5144" 5208 1e272b65658 tab3⤵PID:5944
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel="5144.8.715597498\61653196" -childID 7 -isForBrowser -prefsHandle 5812 -prefMapHandle 5808 -prefsLen 29783 -prefMapSize 232675 -jsInitHandle 1140 -jsInitLen 246848 -a11yResourceId 64 -parentBuildID 20221007134813 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {0bfaea08-b93d-4028-bc14-08caa23f20a8} 5144 "\\.\pipe\gecko-crash-server-pipe.5144" 2756 1e2093ecc58 tab3⤵PID:1692
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD5f4787679d96bf7263d9a34ce31dea7e4
SHA1ebbade52b0a07d888ae0221ad89081902e6e7f1b
SHA256bfcadaffd49f5351acf68b8249b32270424bc2459125818492cd3224662a9a87
SHA512de3f3d1cd602bddb664bd0d2aecb661204dd239b278b1f03d6b9dca6f3d03bd3041ac42f4382f5edf5b310b17ff9ecddff59f16729e8c095625040a364252307
-
Filesize
111B
MD5285252a2f6327d41eab203dc2f402c67
SHA1acedb7ba5fbc3ce914a8bf386a6f72ca7baa33c6
SHA2565dfc321417fc31359f23320ea68014ebfd793c5bbed55f77dab4180bbd4a2026
SHA51211ce7cb484fee66894e63c31db0d6b7ef66ad0327d4e7e2eb85f3bcc2e836a3a522c68d681e84542e471e54f765e091efe1ee4065641b0299b15613eb32dcc0d
-
Filesize
5KB
MD5ff542b6bf299db9ab01bdd2c4b24d0c9
SHA14a4c4d4c7cda8612aeeddac6d8bb2f69f87679ac
SHA2566c81f0acdbc508d75b4e85c0ba78602d2aa2a670625f8c816d831638f41b30a8
SHA512c893d2494b2e02932793a36a98f87a325bc6ecf96c62c1d76545ed95136ee484f58e57f203bd1f2943e05dd3c93f74b39cdf9b7bcea95ae24f9fa70d1f685bf3
-
Filesize
5KB
MD5e872b97f2cde0b80e9b57194c0ea0df0
SHA1e64bddf4895a13dde0aa28e7a8f741e2cab9df99
SHA256848ede414db3876b82475239fa9982927375103d80ecb7e96cf8aea5765530ed
SHA512f176f5196570f84e80145d05ef14ea6064285b624a64db99738a5a1fb41f14a9dfdd304d131a075ecce4b5e754383f250ef1e9f56e6d7a58bf823cacd91a558f
-
Filesize
5KB
MD526c4716f47b66a788c7a6203c0a51463
SHA19a16b2a60cf4e2a4940b1326c9d014c1df25f39e
SHA256d83cb8e716b82f076b9a09e5cccaf683cfd15d115288fe210d00736469b421c7
SHA5120e33c609dff0ad0ea61dd12c5e1ec23a4a3282bf712684c0f74df884f798a30dc010bedcd19baec20f703f62e3f3dec58856bec3345f2ffb1d2210cf989978d0
-
Filesize
24KB
MD53a748249c8b0e04e77ad0d6723e564ff
SHA15c4cc0e5453c13ffc91f259ccb36acfb3d3fa729
SHA256f98f5543c33c0b85b191bb85718ee7845982275130da1f09e904d220f1c6ceed
SHA51253254db3efd9c075e4f24a915e0963563ce4df26d4771925199a605cd111ae5025a65f778b4d4ed8a9b3e83b558066cd314f37b84115d4d24c58207760174af2
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
10KB
MD59a1eab799013f86cd45d4822611c7bb6
SHA108d87813c9508771791286f0e169ee26c5450fa1
SHA256e8adf2f339a24022651158e464f1045733c33e718f791819a4aed5b01211bd9a
SHA51276f28745939180057a39703b1931b1e98c2c48fdc489fdddc8cdcd9e49bc5142ff32a4b353f9286e4db86f1377cec0992fc3dbbbb714eff3d3df98f8d21e691f
-
Filesize
10KB
MD5303e8642daa9d37cbc88821ce02e8531
SHA1d55a8d89e112602a3cc76acabade969490cbf1e9
SHA256e610cbcea5019cfd82937e9841df98372620defab322d79e06bf4d9a8a3df921
SHA512993fcf84ca34689b6111d729ae6808f596318e3dfe29edac7c710080c6eb0f5cc8223650349a6503ce391db3c523ab667e77252f185598e94e159b1fe3b5061d
-
C:\Users\Admin\AppData\Local\Mozilla\Firefox\Profiles\gcdxm1e2.default-release\activity-stream.discovery_stream.json.tmp
Filesize22KB
MD57dcde204d68b5abbecf5310d29f85c17
SHA1d2b224a58ea708dcce3dc7f4a2ced765d5a5c115
SHA256d4b53b158b1d53b70dbc8c58c2371934f82e707eee3285a80896be160229ccb7
SHA512458bf40cb8152cab52c3eb7fa8a0abc92efea0df7775c5e09619e3fc754cf68e15ac3d10ee9979ed8f7587ff9d83fa07f12e79414ff85e50c660d2291d24bc42
-
C:\Users\Admin\AppData\Local\Mozilla\Firefox\Profiles\gcdxm1e2.default-release\cache2\entries\51D52D298316CD3F9A90A40E946BB34EFA1BFB72
Filesize13KB
MD55c4d1eb7132fe72316a2064f02c4c62d
SHA18cdb7a12047893ad9cdf452def2f992049555097
SHA256aafff58d5b090f9c2b0eadc4db21f550799707a70f3da738cc0bdb81419a8ab2
SHA512fca87ad940312937177d2cf7a722cdbc891eee4159a179653561ad2284f4172067a2c239d4d70cf5f24bc899df8ef5e7feba00c230ac98fd097f1b64e3a2a2f3
-
Filesize
442KB
MD585430baed3398695717b0263807cf97c
SHA1fffbee923cea216f50fce5d54219a188a5100f41
SHA256a9f4281f82b3579581c389e8583dc9f477c7fd0e20c9dfc91a2e611e21e3407e
SHA51206511f1f6c6d44d076b3c593528c26a602348d9c41689dbf5ff716b671c3ca5756b12cb2e5869f836dedce27b1a5cfe79b93c707fd01f8e84b620923bb61b5f1
-
Filesize
8.0MB
MD5a01c5ecd6108350ae23d2cddf0e77c17
SHA1c6ac28a2cd979f1f9a75d56271821d5ff665e2b6
SHA256345d44e3aa3e1967d186a43d732c8051235c43458169a5d7d371780a6475ee42
SHA512b046dd1b26ec0b810ee441b7ad4dc135e3f1521a817b9f3db60a32976352e8f7e53920e1a77fc5b4130aac260d79deef7e823267b4414e9cc774d8bffca56a72
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\gcdxm1e2.default-release\gmp-gmpopenh264\1.8.1.2\gmpopenh264.dll
Filesize997KB
MD5fe3355639648c417e8307c6d051e3e37
SHA1f54602d4b4778da21bc97c7238fc66aa68c8ee34
SHA2561ed7877024be63a049da98733fd282c16bd620530a4fb580dacec3a78ace914e
SHA5128f4030bb2464b98eccbea6f06eb186d7216932702d94f6b84c56419e9cf65a18309711ab342d1513bf85aed402bc3535a70db4395874828f0d35c278dd2eac9c
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\gcdxm1e2.default-release\gmp-gmpopenh264\1.8.1.2\gmpopenh264.info
Filesize116B
MD53d33cdc0b3d281e67dd52e14435dd04f
SHA14db88689282fd4f9e9e6ab95fcbb23df6e6485db
SHA256f526e9f98841d987606efeaff7f3e017ba9fd516c4be83890c7f9a093ea4c47b
SHA512a4a96743332cc8ef0f86bc2e6122618bfc75ed46781dadbac9e580cd73df89e74738638a2cccb4caa4cbbf393d771d7f2c73f825737cdb247362450a0d4a4bc1
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\gcdxm1e2.default-release\gmp-widevinecdm\4.10.2557.0\LICENSE.txt
Filesize479B
MD549ddb419d96dceb9069018535fb2e2fc
SHA162aa6fea895a8b68d468a015f6e6ab400d7a7ca6
SHA2562af127b4e00f7303de8271996c0c681063e4dc7abdc7b2a8c3fe5932b9352539
SHA51248386217dabf7556e381ab3f5924b123a0a525969ff98f91efb03b65477c94e48a15d9abcec116b54616d36ad52b6f1d7b8b84c49c204e1b9b43f26f2af92da2
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\gcdxm1e2.default-release\gmp-widevinecdm\4.10.2557.0\manifest.json
Filesize372B
MD58be33af717bb1b67fbd61c3f4b807e9e
SHA17cf17656d174d951957ff36810e874a134dd49e0
SHA256e92d3394635edfb987a7528e0ccd24360e07a299078df2a6967ca3aae22fa2dd
SHA5126125f60418e25fee896bf59f5672945cd8f36f03665c721837bb50adf5b4dfef2dddbfcfc817555027dcfa90e1ef2a1e80af1219e8063629ea70263d2fc936a7
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\gcdxm1e2.default-release\gmp-widevinecdm\4.10.2557.0\widevinecdm.dll
Filesize11.8MB
MD533bf7b0439480effb9fb212efce87b13
SHA1cee50f2745edc6dc291887b6075ca64d716f495a
SHA2568ee42d9258e20bbc5bfdfae61605429beb5421ffeaaa0d02b86d4978f4b4ac4e
SHA512d329a1a1d98e302142f2776de8cc2cd45a465d77cb21c461bdf5ee58c68073a715519f449cb673977288fe18401a0abcce636c85abaec61a4a7a08a16c924275
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\gcdxm1e2.default-release\gmp-widevinecdm\4.10.2557.0\widevinecdm.dll.lib
Filesize1KB
MD5688bed3676d2104e7f17ae1cd2c59404
SHA1952b2cdf783ac72fcb98338723e9afd38d47ad8e
SHA25633899a3ebc22cb8ed8de7bd48c1c29486c0279b06d7ef98241c92aef4e3b9237
SHA5127a0e3791f75c229af79dd302f7d0594279f664886fea228cfe78e24ef185ae63aba809aa1036feb3130066deadc8e78909c277f0a7ed1e3485df3cf2cd329776
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\gcdxm1e2.default-release\gmp-widevinecdm\4.10.2557.0\widevinecdm.dll.sig
Filesize1KB
MD5937326fead5fd401f6cca9118bd9ade9
SHA14526a57d4ae14ed29b37632c72aef3c408189d91
SHA25668a03f075db104f84afdd8fca45a7e4bff7b55dc1a2a24272b3abe16d8759c81
SHA512b232f6cf3f88adb346281167ac714c4c4c7aac15175087c336911946d12d63d3a3a458e06b298b41a7ec582ef09fe238da3a3166ff89c450117228f7485c22d2
-
Filesize
6KB
MD5062dc81049b3e27106a6fc71b8a05b17
SHA158d3d98aa828a9483bd42fa4d858e9b21fa05cce
SHA256ef65e23dc20cfa6a14fca1dc6bf6ae52b1aa8e2a47851f741e7d40281c3067c2
SHA512088d3f0e57543b162db06a88137d401806b8384802760e6a7cab320f23a0137fef49827d0fd175b50e73016d32c36581e9f361ec7735d92c928708dae898fa48
-
Filesize
7KB
MD595baf01f79be457c9bdb6d23e6dbaee0
SHA1cb2c088042630adab0ed008f65ea461d230eae4b
SHA256dcb377ad66b554089e19259d8b6d676068035962fd2563c05278882651f246b8
SHA512d9cf3ed5c4a68552c8e06671f839ed13073e7116acd8cc106f332a653ab3794d0a767e6b9124deccff7b8a081e37cd1044e0816c95470a99e22ece523ffda3b0
-
Filesize
6KB
MD57ee323432bac61227b44b884500fc475
SHA17701e4b3794978c42494aaebd184f94f226c4ef2
SHA256e4673f97f2e8164ae575c6a2220bbab4d083ffb6d9ae1506cb16eff51d6937e5
SHA512ed87c952194439c8bdf1a27cf3757b7c44b836088f44dd6a76b4ea64c983a6f7412da673dc6dce8aea42212b47ac92875914a4d8aa4091dcf5e50c2985d96cd6
-
Filesize
6KB
MD52152d2d1573893974744df4f7377d5e2
SHA1e0e906130a44e85b3d73f120201dc3526bd8f32d
SHA2561a79fdfbde4d56834b236adc2df49c7bcec8202489b57d31066dffa0985f8d3c
SHA512912d5f19656fb92a303571d67dc1750f75d3fec7aeba6ba1828b2e4c55a180e1b855dbcd96d0f612dcae8bfbaedc299d1d92bb311dde2fb31e47fa4bf57aac0d
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\gcdxm1e2.default-release\sessionstore-backups\recovery.jsonlz4
Filesize1KB
MD5bf3081f7e1ecf12f73c166588201c161
SHA1c90545f38c3faf4dd3e359ce02e1a361c399832d
SHA256ee17bbfa4155d11e3c68e866371676d80e268589a6aa8858d6e05e9eeeae3073
SHA5128ce857fd35afc9887d652a03e9ee11aa486a112c3503b5c0d1201f096ee8a774edd8acab84e09580ea2ebfb4606e6ea1e85045a2fa96c63f0a7ec31a2abb50a1
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\gcdxm1e2.default-release\sessionstore-backups\recovery.jsonlz4
Filesize1KB
MD53b8e8155186e33ffc40e48fb0af1bae5
SHA1207b267dd9b6ed1514a6e6249375316c61979fd4
SHA2565dcfdaaab0852e67f6fc74cca046589e5021c62b835da5f572b99eeb34eb96f9
SHA512d4a8293b7a2e8dcafee709bbef564b415bb81ff786cec28131e1c4ec8888850fe8abab3348623800e41aeb226d07f4061fbe25edb6c20c1c2f1bacb2b29a3383
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\gcdxm1e2.default-release\sessionstore-backups\recovery.jsonlz4
Filesize1KB
MD56d4073ff00e00e96fcff72fbc4d60ec4
SHA13d805190f0ae80deedd08bc019452e97a4aec9da
SHA25675783be5a754ec2468ae15d9e9624db840ad7f80df74158a3b602411c0ccf35d
SHA5127ab0a896fe284295bb9bee3102f76f49229f1bff2ec77bc8eb66b0ceb24d0a09d2dfc4a3efe72f7277389c9998164c60857f977b79107fa432bb2ba4e7b42f72