Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
299s -
max time network
298s -
platform
windows10-2004_x64 -
resource
win10v2004-20240221-en -
resource tags
arch:x64arch:x86image:win10v2004-20240221-enlocale:en-usos:windows10-2004-x64system -
submitted
25/02/2024, 00:12
Static task
static1
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
https://gamingbeasts.com/grand-theft-auto-6-download/
Resource
win10v2004-20240221-en
General
-
Target
https://gamingbeasts.com/grand-theft-auto-6-download/
Malware Config
Signatures
-
Checks processor information in registry 2 TTPs 5 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Update Signature firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Update Revision firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~Mhz firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\VendorIdentifier firefox.exe -
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer chrome.exe -
Modifies data under HKEY_USERS 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry chrome.exe Set value (int) \REGISTRY\USER\S-1-5-19\SOFTWARE\Microsoft\Cryptography\TPM\Telemetry\TraceTimeLast = "133532935621969618" chrome.exe -
Modifies registry class 1 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-1712835645-2080934712-2142796781-1000_Classes\Local Settings firefox.exe -
Suspicious behavior: EnumeratesProcesses 4 IoCs
pid Process 1932 chrome.exe 1932 chrome.exe 4092 chrome.exe 4092 chrome.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 5 IoCs
pid Process 1932 chrome.exe 1932 chrome.exe 1932 chrome.exe 1932 chrome.exe 1932 chrome.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeShutdownPrivilege 1932 chrome.exe Token: SeCreatePagefilePrivilege 1932 chrome.exe Token: SeShutdownPrivilege 1932 chrome.exe Token: SeCreatePagefilePrivilege 1932 chrome.exe Token: SeShutdownPrivilege 1932 chrome.exe Token: SeCreatePagefilePrivilege 1932 chrome.exe Token: SeShutdownPrivilege 1932 chrome.exe Token: SeCreatePagefilePrivilege 1932 chrome.exe Token: SeShutdownPrivilege 1932 chrome.exe Token: SeCreatePagefilePrivilege 1932 chrome.exe Token: SeShutdownPrivilege 1932 chrome.exe Token: SeCreatePagefilePrivilege 1932 chrome.exe Token: SeShutdownPrivilege 1932 chrome.exe Token: SeCreatePagefilePrivilege 1932 chrome.exe Token: SeShutdownPrivilege 1932 chrome.exe Token: SeCreatePagefilePrivilege 1932 chrome.exe Token: SeShutdownPrivilege 1932 chrome.exe Token: SeCreatePagefilePrivilege 1932 chrome.exe Token: SeShutdownPrivilege 1932 chrome.exe Token: SeCreatePagefilePrivilege 1932 chrome.exe Token: SeShutdownPrivilege 1932 chrome.exe Token: SeCreatePagefilePrivilege 1932 chrome.exe Token: SeShutdownPrivilege 1932 chrome.exe Token: SeCreatePagefilePrivilege 1932 chrome.exe Token: SeShutdownPrivilege 1932 chrome.exe Token: SeCreatePagefilePrivilege 1932 chrome.exe Token: SeShutdownPrivilege 1932 chrome.exe Token: SeCreatePagefilePrivilege 1932 chrome.exe Token: SeShutdownPrivilege 1932 chrome.exe Token: SeCreatePagefilePrivilege 1932 chrome.exe Token: SeShutdownPrivilege 1932 chrome.exe Token: SeCreatePagefilePrivilege 1932 chrome.exe Token: SeShutdownPrivilege 1932 chrome.exe Token: SeCreatePagefilePrivilege 1932 chrome.exe Token: SeShutdownPrivilege 1932 chrome.exe Token: SeCreatePagefilePrivilege 1932 chrome.exe Token: SeShutdownPrivilege 1932 chrome.exe Token: SeCreatePagefilePrivilege 1932 chrome.exe Token: SeShutdownPrivilege 1932 chrome.exe Token: SeCreatePagefilePrivilege 1932 chrome.exe Token: SeShutdownPrivilege 1932 chrome.exe Token: SeCreatePagefilePrivilege 1932 chrome.exe Token: SeShutdownPrivilege 1932 chrome.exe Token: SeCreatePagefilePrivilege 1932 chrome.exe Token: SeShutdownPrivilege 1932 chrome.exe Token: SeCreatePagefilePrivilege 1932 chrome.exe Token: SeShutdownPrivilege 1932 chrome.exe Token: SeCreatePagefilePrivilege 1932 chrome.exe Token: SeShutdownPrivilege 1932 chrome.exe Token: SeCreatePagefilePrivilege 1932 chrome.exe Token: SeShutdownPrivilege 1932 chrome.exe Token: SeCreatePagefilePrivilege 1932 chrome.exe Token: SeShutdownPrivilege 1932 chrome.exe Token: SeCreatePagefilePrivilege 1932 chrome.exe Token: SeShutdownPrivilege 1932 chrome.exe Token: SeCreatePagefilePrivilege 1932 chrome.exe Token: SeShutdownPrivilege 1932 chrome.exe Token: SeCreatePagefilePrivilege 1932 chrome.exe Token: SeShutdownPrivilege 1932 chrome.exe Token: SeCreatePagefilePrivilege 1932 chrome.exe Token: SeShutdownPrivilege 1932 chrome.exe Token: SeCreatePagefilePrivilege 1932 chrome.exe Token: SeShutdownPrivilege 1932 chrome.exe Token: SeCreatePagefilePrivilege 1932 chrome.exe -
Suspicious use of FindShellTrayWindow 32 IoCs
pid Process 1932 chrome.exe 1932 chrome.exe 1932 chrome.exe 1932 chrome.exe 1932 chrome.exe 1932 chrome.exe 1932 chrome.exe 1932 chrome.exe 1932 chrome.exe 1932 chrome.exe 1932 chrome.exe 1932 chrome.exe 1932 chrome.exe 1932 chrome.exe 1932 chrome.exe 1932 chrome.exe 1932 chrome.exe 1932 chrome.exe 1932 chrome.exe 1932 chrome.exe 1932 chrome.exe 1932 chrome.exe 1932 chrome.exe 1932 chrome.exe 1932 chrome.exe 1932 chrome.exe 3124 firefox.exe 3124 firefox.exe 3124 firefox.exe 3124 firefox.exe 3124 firefox.exe 3124 firefox.exe -
Suspicious use of SendNotifyMessage 29 IoCs
pid Process 1932 chrome.exe 1932 chrome.exe 1932 chrome.exe 1932 chrome.exe 1932 chrome.exe 1932 chrome.exe 1932 chrome.exe 1932 chrome.exe 1932 chrome.exe 1932 chrome.exe 1932 chrome.exe 1932 chrome.exe 1932 chrome.exe 1932 chrome.exe 1932 chrome.exe 1932 chrome.exe 1932 chrome.exe 1932 chrome.exe 1932 chrome.exe 1932 chrome.exe 1932 chrome.exe 1932 chrome.exe 1932 chrome.exe 1932 chrome.exe 3124 firefox.exe 3124 firefox.exe 3124 firefox.exe 3124 firefox.exe 3124 firefox.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 3124 firefox.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 1932 wrote to memory of 1124 1932 chrome.exe 58 PID 1932 wrote to memory of 1124 1932 chrome.exe 58 PID 1932 wrote to memory of 3860 1932 chrome.exe 91 PID 1932 wrote to memory of 3860 1932 chrome.exe 91 PID 1932 wrote to memory of 3860 1932 chrome.exe 91 PID 1932 wrote to memory of 3860 1932 chrome.exe 91 PID 1932 wrote to memory of 3860 1932 chrome.exe 91 PID 1932 wrote to memory of 3860 1932 chrome.exe 91 PID 1932 wrote to memory of 3860 1932 chrome.exe 91 PID 1932 wrote to memory of 3860 1932 chrome.exe 91 PID 1932 wrote to memory of 3860 1932 chrome.exe 91 PID 1932 wrote to memory of 3860 1932 chrome.exe 91 PID 1932 wrote to memory of 3860 1932 chrome.exe 91 PID 1932 wrote to memory of 3860 1932 chrome.exe 91 PID 1932 wrote to memory of 3860 1932 chrome.exe 91 PID 1932 wrote to memory of 3860 1932 chrome.exe 91 PID 1932 wrote to memory of 3860 1932 chrome.exe 91 PID 1932 wrote to memory of 3860 1932 chrome.exe 91 PID 1932 wrote to memory of 3860 1932 chrome.exe 91 PID 1932 wrote to memory of 3860 1932 chrome.exe 91 PID 1932 wrote to memory of 3860 1932 chrome.exe 91 PID 1932 wrote to memory of 3860 1932 chrome.exe 91 PID 1932 wrote to memory of 3860 1932 chrome.exe 91 PID 1932 wrote to memory of 3860 1932 chrome.exe 91 PID 1932 wrote to memory of 3860 1932 chrome.exe 91 PID 1932 wrote to memory of 3860 1932 chrome.exe 91 PID 1932 wrote to memory of 3860 1932 chrome.exe 91 PID 1932 wrote to memory of 3860 1932 chrome.exe 91 PID 1932 wrote to memory of 3860 1932 chrome.exe 91 PID 1932 wrote to memory of 3860 1932 chrome.exe 91 PID 1932 wrote to memory of 3860 1932 chrome.exe 91 PID 1932 wrote to memory of 3860 1932 chrome.exe 91 PID 1932 wrote to memory of 3860 1932 chrome.exe 91 PID 1932 wrote to memory of 3860 1932 chrome.exe 91 PID 1932 wrote to memory of 3860 1932 chrome.exe 91 PID 1932 wrote to memory of 3860 1932 chrome.exe 91 PID 1932 wrote to memory of 3860 1932 chrome.exe 91 PID 1932 wrote to memory of 3860 1932 chrome.exe 91 PID 1932 wrote to memory of 3860 1932 chrome.exe 91 PID 1932 wrote to memory of 3860 1932 chrome.exe 91 PID 1932 wrote to memory of 3940 1932 chrome.exe 93 PID 1932 wrote to memory of 3940 1932 chrome.exe 93 PID 1932 wrote to memory of 2212 1932 chrome.exe 92 PID 1932 wrote to memory of 2212 1932 chrome.exe 92 PID 1932 wrote to memory of 2212 1932 chrome.exe 92 PID 1932 wrote to memory of 2212 1932 chrome.exe 92 PID 1932 wrote to memory of 2212 1932 chrome.exe 92 PID 1932 wrote to memory of 2212 1932 chrome.exe 92 PID 1932 wrote to memory of 2212 1932 chrome.exe 92 PID 1932 wrote to memory of 2212 1932 chrome.exe 92 PID 1932 wrote to memory of 2212 1932 chrome.exe 92 PID 1932 wrote to memory of 2212 1932 chrome.exe 92 PID 1932 wrote to memory of 2212 1932 chrome.exe 92 PID 1932 wrote to memory of 2212 1932 chrome.exe 92 PID 1932 wrote to memory of 2212 1932 chrome.exe 92 PID 1932 wrote to memory of 2212 1932 chrome.exe 92 PID 1932 wrote to memory of 2212 1932 chrome.exe 92 PID 1932 wrote to memory of 2212 1932 chrome.exe 92 PID 1932 wrote to memory of 2212 1932 chrome.exe 92 PID 1932 wrote to memory of 2212 1932 chrome.exe 92 PID 1932 wrote to memory of 2212 1932 chrome.exe 92 PID 1932 wrote to memory of 2212 1932 chrome.exe 92 PID 1932 wrote to memory of 2212 1932 chrome.exe 92 PID 1932 wrote to memory of 2212 1932 chrome.exe 92 -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
Processes
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --disable-background-networking --disable-component-update --simulate-outdated-no-au='Tue, 31 Dec 2099 23:59:59 GMT' --single-argument https://gamingbeasts.com/grand-theft-auto-6-download/1⤵
- Enumerates system info in registry
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:1932 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=106.0.5249.119 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ff8d3239758,0x7ff8d3239768,0x7ff8d32397782⤵PID:1124
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1724 --field-trial-handle=1692,i,6494695120377144288,16299428773780743670,131072 /prefetch:22⤵PID:3860
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2212 --field-trial-handle=1692,i,6494695120377144288,16299428773780743670,131072 /prefetch:82⤵PID:2212
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2132 --field-trial-handle=1692,i,6494695120377144288,16299428773780743670,131072 /prefetch:82⤵PID:3940
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --mojo-platform-channel-handle=3052 --field-trial-handle=1692,i,6494695120377144288,16299428773780743670,131072 /prefetch:12⤵PID:4568
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --first-renderer-process --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --mojo-platform-channel-handle=3044 --field-trial-handle=1692,i,6494695120377144288,16299428773780743670,131072 /prefetch:12⤵PID:3212
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.ProcessorMetrics --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5016 --field-trial-handle=1692,i,6494695120377144288,16299428773780743670,131072 /prefetch:82⤵PID:3256
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4628 --field-trial-handle=1692,i,6494695120377144288,16299428773780743670,131072 /prefetch:82⤵PID:4008
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --mojo-platform-channel-handle=5192 --field-trial-handle=1692,i,6494695120377144288,16299428773780743670,131072 /prefetch:12⤵PID:676
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --mojo-platform-channel-handle=2320 --field-trial-handle=1692,i,6494695120377144288,16299428773780743670,131072 /prefetch:12⤵PID:424
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAACQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=5124 --field-trial-handle=1692,i,6494695120377144288,16299428773780743670,131072 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:4092
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --mojo-platform-channel-handle=4056 --field-trial-handle=1692,i,6494695120377144288,16299428773780743670,131072 /prefetch:12⤵PID:2064
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=audio.mojom.AudioService --lang=en-US --service-sandbox-type=audio --mojo-platform-channel-handle=1584 --field-trial-handle=1692,i,6494695120377144288,16299428773780743670,131072 /prefetch:82⤵PID:2988
-
-
C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"1⤵PID:1528
-
C:\Windows\System32\rundll32.exeC:\Windows\System32\rundll32.exe C:\Windows\System32\shell32.dll,SHCreateLocalServerRunDll {9aa46009-3ce0-458a-a354-715610a075e6} -Embedding1⤵PID:1748
-
C:\Windows\system32\AUDIODG.EXEC:\Windows\system32\AUDIODG.EXE 0x4a0 0x4981⤵PID:488
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe"1⤵PID:740
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe"2⤵
- Checks processor information in registry
- Modifies registry class
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of SetWindowsHookEx
PID:3124 -
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel="3124.0.1045195675\1352909113" -parentBuildID 20221007134813 -prefsHandle 1952 -prefMapHandle 1944 -prefsLen 20749 -prefMapSize 233444 -appDir "C:\Program Files\Mozilla Firefox\browser" - {6246068f-5521-44e8-a88d-868a0897c7a3} 3124 "\\.\pipe\gecko-crash-server-pipe.3124" 1844 27d294f7b58 gpu3⤵PID:2376
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel="3124.1.114095110\781680226" -parentBuildID 20221007134813 -prefsHandle 2384 -prefMapHandle 2372 -prefsLen 20785 -prefMapSize 233444 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {5fa6f339-56e1-45d9-a3fe-e6f12fc2df17} 3124 "\\.\pipe\gecko-crash-server-pipe.3124" 2412 27d15772b58 socket3⤵PID:640
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel="3124.2.1181176276\181661410" -childID 1 -isForBrowser -prefsHandle 3332 -prefMapHandle 3328 -prefsLen 20888 -prefMapSize 233444 -jsInitHandle 1412 -jsInitLen 246848 -a11yResourceId 64 -parentBuildID 20221007134813 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {c79261be-7812-4ddd-8edf-b1ac8c99dd18} 3124 "\\.\pipe\gecko-crash-server-pipe.3124" 3152 27d2d498d58 tab3⤵PID:4820
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel="3124.3.2120758641\994296810" -childID 2 -isForBrowser -prefsHandle 3616 -prefMapHandle 3604 -prefsLen 26066 -prefMapSize 233444 -jsInitHandle 1412 -jsInitLen 246848 -a11yResourceId 64 -parentBuildID 20221007134813 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {e7567526-64f1-4676-953f-58b0a8118401} 3124 "\\.\pipe\gecko-crash-server-pipe.3124" 3628 27d15760158 tab3⤵PID:5112
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel="3124.4.1644247237\355623400" -childID 3 -isForBrowser -prefsHandle 4420 -prefMapHandle 4364 -prefsLen 26125 -prefMapSize 233444 -jsInitHandle 1412 -jsInitLen 246848 -a11yResourceId 64 -parentBuildID 20221007134813 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {fc1b5f1c-9a92-4e21-90d2-a8afad2fadb0} 3124 "\\.\pipe\gecko-crash-server-pipe.3124" 4432 27d2eeca258 tab3⤵PID:1912
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel="3124.5.1015985818\1247862149" -childID 4 -isForBrowser -prefsHandle 5164 -prefMapHandle 5140 -prefsLen 26125 -prefMapSize 233444 -jsInitHandle 1412 -jsInitLen 246848 -a11yResourceId 64 -parentBuildID 20221007134813 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {2e64f5e4-9ba0-49c1-b266-3915a3931440} 3124 "\\.\pipe\gecko-crash-server-pipe.3124" 5176 27d1572e158 tab3⤵PID:4968
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel="3124.7.1841129291\1987033870" -childID 6 -isForBrowser -prefsHandle 5504 -prefMapHandle 5508 -prefsLen 26125 -prefMapSize 233444 -jsInitHandle 1412 -jsInitLen 246848 -a11yResourceId 64 -parentBuildID 20221007134813 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {7a8d96ff-de1d-45a8-8700-58e16922d4fb} 3124 "\\.\pipe\gecko-crash-server-pipe.3124" 5588 27d2f651858 tab3⤵PID:3816
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel="3124.6.406891017\29790137" -childID 5 -isForBrowser -prefsHandle 5316 -prefMapHandle 5320 -prefsLen 26125 -prefMapSize 233444 -jsInitHandle 1412 -jsInitLen 246848 -a11yResourceId 64 -parentBuildID 20221007134813 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {3f4be932-333f-4cbe-8cd2-3ed36da13626} 3124 "\\.\pipe\gecko-crash-server-pipe.3124" 5308 27d2f595058 tab3⤵PID:700
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel="3124.8.278529137\2001535610" -childID 7 -isForBrowser -prefsHandle 5968 -prefMapHandle 5872 -prefsLen 26381 -prefMapSize 233444 -jsInitHandle 1412 -jsInitLen 246848 -a11yResourceId 64 -parentBuildID 20221007134813 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {2c15b909-b877-48ca-92dd-a4f7db28ce70} 3124 "\\.\pipe\gecko-crash-server-pipe.3124" 5852 27d31ff3b58 tab3⤵PID:1236
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel="3124.9.901193688\882272233" -parentBuildID 20221007134813 -prefsHandle 4888 -prefMapHandle 4884 -prefsLen 26646 -prefMapSize 233444 -appDir "C:\Program Files\Mozilla Firefox\browser" - {51921e37-6342-4b02-9068-0f0dab0436d1} 3124 "\\.\pipe\gecko-crash-server-pipe.3124" 1664 27d2c4f9b58 rdd3⤵PID:4648
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
195KB
MD5873734b55d4c7d35a177c8318b0caec7
SHA1469b913b09ea5b55e60098c95120cc9b935ddb28
SHA2564ee3aa3dc43cb3ef3f6bfb91ed8214659e9c2600a45bee9728ebbcb6f33b088d
SHA51224f05ed981e994475879ca2221b6948418c4412063b9c07f46b8de581047ddd5d73401562fa9ee54d4ce5f97a6288c54eac5de0ca29b1bb5797bdac5a1b30308
-
Filesize
24KB
MD5b82ca47ee5d42100e589bdd94e57936e
SHA10dad0cd7d0472248b9b409b02122d13bab513b4c
SHA256d3c59060e591b3839ec59cad150c0a38a2a2a6ba4cc4dc5530f68be54f14ef1d
SHA51258840a773a3a6cb0913e6a542934daecaef9c0eeab626446a29a70cd6d063fdb012229ff2ccfa283e3c05bc2a91a7cac331293965264715bdb9020f162dc7383
-
Filesize
18KB
MD5c50785f06fa308cc7d9f8bec54b10e69
SHA147e1946aa174d114f36d9382eff807f2064ffb4d
SHA2568771c5f56aa254f362779fb7b3fa03c443fbdd4250da94e889ac24d152b608f8
SHA512a03403caa4c0b8f2b71f764d79ce7fad87c8fcdaab5afa4fefeb214fdf8164465cc78658ed3fc854c4504aa7e026665acb79eb8b6523853aab1455735c9f42c7
-
Filesize
289B
MD5426a96a62e1a1ea8821483318c71cbfe
SHA19446f29a6bcbbdce62e97cda44ce63b42195b429
SHA2566b791bb5980d784502e0ca9f2b6cceebd1715e6c79f60c465e5f1d72fc2085b1
SHA512e0334dcc1f1c88d0fedfba79392ad3f221624fbb9cef52975e6e99b904e8f93f94490e8c3963102616c73c96005f152cb43f52543e80be49f238c31c8072f26a
-
Filesize
280B
MD56e2bee077800729da4eaf27bece1600f
SHA17c6ff6959b2f97ec3867313e887556bbfc20b853
SHA256d7e50171228a27e4b112a91d302e7b232b9e21964b267b25a69b492cf2164ba8
SHA512663bd7b4d308136709fd34658acb482781b79b763117eebde0e2afe8e677df9a68ef9e5404cfb734daab308038d72b0a9d52b8f14ba7e525343619e5a16921f6
-
Filesize
320KB
MD5d9ebba3fe226fd07ced3b8afa36a5ae2
SHA1f81356a4db428ea52482b26af7778595fcad9545
SHA2564a51126875d0823eed8fcd40ef7d894dc9abe5edfebd2487f12fabf233b6a5bc
SHA51296452f179a01556b3c75e16d2ac9f2b06a66d9e903fcd3868f0348e01daa5476d6a3542197c2696b7e78aa7c7d1ae4cd4f6dafd182ec9c3ad1ab928f42ff04f7
-
Filesize
480B
MD53f9e32f342f9bec886d64518926ae3f3
SHA17a61c9536ac8fcf621698549f6719c3bc3235688
SHA256b88fd1ab34e7a075ab55298cd3f9fae6ab3b2f283fc7754c88c525db8363c7bd
SHA512a55b966fb0a4024940e47b7007ec3c7f7899f516738dbe1693a556515281afebf188781eaea2f2103557287ef02bfbdeb71edd8fd7ee77acf889a52c04289df1
-
Filesize
504B
MD51d1a2d5243fd812b32e7d75c046c50e5
SHA10f6388dfcc010399e9ecd6bf4d06d23a8201cc69
SHA2565e746593f0ea3a728df5be9391d79af07e5a6d54a782bfdbc777d6454aa95374
SHA51202f3ba2252fb9611c7d517bb81c2dde8f6a9733a23e37be2adda5d3ffd3883a6d11e38274f108dd627bc0b8962569ec12bbb38fd129d6bbe463a23b8395643e0
-
Filesize
360B
MD5d463e46bf1888f8731e61271b6bca4a5
SHA1b3b03ebb3c240870e91623a1a867088a12efd2f3
SHA2567743d5589e637e76df5b07188d0a504e7af6c3edc9a3c0e06f96201ea382e915
SHA512baa1cc6686725717c5e9fe51d0064463d73a06290fe5ca3cfb4b39ef28dd5168aac0b732f9c1287b72058461f64555fff3d1aa68ea0b3839eb7fc49d50aa3f18
-
Filesize
3KB
MD521975a230d772961199545310797beff
SHA16c186ede6b75f8548f25acfdab0bb81304a62fc3
SHA256e1ff8724ff3f2191f86e8b7999520e7fb4db9c375f5be189445fd8e809768413
SHA51226f731240f4437787360d27dcce557c52444271204f753bedc99f5f41073662d2bf368d5409fa110ee6686ca67fa7ef24c1abfa89ce5ede878c27dc5bb4051bb
-
Filesize
3KB
MD537dba95a3459f0048a259fbd62f03ef8
SHA1f2cfc2074553787281f3436c1d728b5decd5a848
SHA2563e311c7ce24eabeb0090e91f8c8257c8ca385fa7c9ec92c01f4cb8345cc86be6
SHA5126389e5979198787dccd03edc8af131f4aa57d392b0eb53711558688e34fac1e68b14bfbfbeafd3fed9aec6b2a70fba063aad71e097030ceeff76253457193a00
-
Filesize
2KB
MD5d8fab60ad6287793dcdd09f7ec496c68
SHA18a69eeb038eb7db318fbb2c80fb92bc1685a5b7a
SHA256603a3d977a36bfb0af0d8136bc721a74f16a70ccbff511ad2ee08a2de825ff92
SHA512b4f59b8734f80035541d2588d8cc6cc619225b5c0fb5eb6a70807785a54734b43ba15d6952824393e882b83491661ff3a1c280eb1d379429d6e274bfeffab793
-
Filesize
706B
MD5709adf61c2218adabed35030e4173e0d
SHA1a4cab11b6ac9fac0ce4d54f5f5dd3cef6e8c589a
SHA256de6af7b66ccdda992e7a7bd7330e002cea00624ea1e150f77aefee7b84c0d244
SHA512a0afff65f2aca72ba1d15ec38c71d5454f0d5d137c9b84e93f45770214f1a220abfb1090f75b2d57b12a65f8e9b8cc54eea71054cac4ea393a2ca2656b5311cc
-
Filesize
706B
MD5284123a5049c9f94533fba71be3e13f0
SHA13a9019aa62093603d98564e6ae355fffa6ddaf1e
SHA2561d3d15e0d9a719f560a158adca1d42252441d028ed96e01b07bfc2efc24ff21d
SHA5129acfec87ae2232599ffffcaaac2c791e122d402b6208383f6e477b8cc5098d45f69ee43592baffa2966619edb43f35fa8b86e70b88af97018fd029384eb40800
-
Filesize
706B
MD540e3f105489076445ef59452e58a90d1
SHA101b567e05ecfed5043ddbefbf1b7291745154172
SHA256329a83c6dcb9fd999b40297a60c5a79ca6856587e1cc8449b2110dcb6041f8e5
SHA512a59ff01892a528889a5a154aa3b76506fe4201797466f55ef9c877e9ae932466e34c69f5a93d1df0ae968a52295b5c9a3c8a2fcd216bd887c698f792a1e5e10a
-
Filesize
6KB
MD510fe8fcb88d32812f063191d7f259c77
SHA14b20e33ddb0360cb234e9dc5da99c3fc5cf85d61
SHA256e8f8e1e30aa47b400c8c712e730496f22e2cfccec83044edcb17488650fcd69a
SHA512ae3fc13be7ed1c9ef14525a55fed3ab2594d8f97e1447f35289817414b5271c244df40bed21dc124553f31f62e08a5fd4c7e754e86d3f03437ff4b944649d051
-
Filesize
6KB
MD5d3fc8084bbccd61c7ebcc751abb440ce
SHA1c0f4f02d38341cf4711cb07bb92488250c005048
SHA2565384a41c98be9cf1409c2ae85224439b8006e7d05a1d426431259fa9c69b5631
SHA512b5e534ecc7daa1dffaa3fe5d32969de727a1ad59135dbaea2c8b488c5e6a412840cf9fe46f10afdca7cf7c38e3ea7f827266e2972b7b84dc28270477c4454bd2
-
Filesize
6KB
MD5d1f2779fbd6f5f06acef799306ed4414
SHA174f93aa0ec240a5031e827d5da4aac59c0bd6e2f
SHA256acb07735f5c0f39634507672039d1938e9a6c18b45186b2520cb90b7cc015633
SHA51255a384e2a89e38b4b3ed4809c4fb91e78c0244b59a2de7025c9f64b78106ec9b9ac840025f246b7518048ef5203ed217acf4d8992a5c782c905c4e087461bc45
-
Filesize
6KB
MD5a950ceb39131bbb93e05a9a755e5b840
SHA12d3999fc9d515d98f37a1ad26f4e66d5a27c07e5
SHA2566161358e902c2486bd72a3162cf20c146af6b2fdfbc7ca5a37fc927fe9d1fca3
SHA512f8dfc07ff8d6ec3400b12ee4c886395bb31904c78966a1ab5f6cec4ba810275175fce1fe8709ffb22c9478dcceac768c0f945021e1cf46354c9f6999597a16b5
-
Filesize
7KB
MD55cdde3a8ede0c3fd3f354310800619f5
SHA16236e4d6a4fef03af0a5d0905568fa1fc9158ec8
SHA2567deae7ed077695a0c909b30b7c3270a582235f7c93544263d23f7557fec39202
SHA5123cee3c6f4a9a18121b01a3c8d1e1926aed21a514dcc770032c23727951c611abd6060111d0ee500806bb5e25930d79d6ca46fc6e65c34a221f739bc4f5db024d
-
Filesize
130KB
MD514d6f22b6361f0b91d13c0dd9aeeb71c
SHA1bfcd7a850d4d38350a8156a53d52824b230e7fc8
SHA2563be9de15e1268d23f67b79f323710d353c57f4830cff1527ccf4c478f93bbfbb
SHA512c9c3a1b8d4417332507f276be5764fda6422b341dd63c19350c5802e1078d2ed52d599c1c9346b7891a2a8f9d61c86aa4caae3b5b2641ac6a06787ecf15d713d
-
Filesize
130KB
MD55935af635c00bc709951d0a3472e002e
SHA1ddf1c06e314d8bd3c19dc2f10d8e1c11ab7d4ee2
SHA256a41faa47ff0e2cc1b4f6c4c60b056f5fab7c93b7dcae6363f2af028ffefa0266
SHA512b4b29c9f580b8d36a885ab0b0acf765cda8e8a507578da7b18d17430587a702c8c9b0ee8e90aaac2e5aa00fe2435da74c83bb6241b6d23e7887a404c6530ef9a
-
Filesize
130KB
MD5d1695ea812112a2d23f562d70d967983
SHA1d80d09ff2724cd80f2e588119eff92b987fc08bc
SHA256116eecdf623a4a118ec44c89b66e5b5e8b18d74e4b3f22a46533da451556c7b2
SHA512e7c9710a62b42d70d3bd31504658477f83552f24aa12dfcd00de659111ce8ee042bd26af5bfa9114e05505c51076852ead6501a2db03b5605c9cf8002713c400
-
Filesize
2B
MD599914b932bd37a50b983c5e7c90ae93b
SHA1bf21a9e8fbc5a3846fb05b4fa0859e0917b2202f
SHA25644136fa355b3678a1146ad16f7e8649e94fb4fc21fe77e8310c060f61caaff8a
SHA51227c74670adb75075fad058d5ceaf7b20c4e7786c83bae8a32f626f9782af34c9a33c2046ef60fd2a7878d378e29fec851806bbd9a67878f3a9f1cda4830763fd
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\kvnvyogb.default-release\datareporting\glean\db\data.safe.bin
Filesize9KB
MD520219992a06fe26ef7424e5147a06ddc
SHA1afceb1cf9b0bbfff166720cc73c11f8fa29a6adc
SHA256239adfae8dbb2b60822fb1c9533d90fdd50459c5b2e664879e9d1ce48bdff431
SHA512d02679425d0b9d893e6537016d6065906f889435decc404755e11f08d4bbd82a2a4a5811256b415eb3d4d04bcdf5e34666d221651097e32e76badf4ee4fbab42
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\kvnvyogb.default-release\datareporting\glean\pending_pings\b88df950-a677-4b67-a645-9c5ec297f525
Filesize734B
MD56b980961c4713e7f4bd929af6fa8a050
SHA15e147b3395b57afe7e9ca12e65238773ce1f0b63
SHA256682853b173aadad0f7041872fa057ed18a375fcc7e50c36244532fa904ce8f3c
SHA512a3f7ac3d06c28241d709f21afe6d793641482ba48dbc99d245d01d2237436beb368b49b9a315e69af753caab4a3443759973ffc71082a3ce2aec2b4f7e158893
-
Filesize
6KB
MD51376da04e8eadde67b2882901660bca4
SHA16c4930a879ed21485b97ae62d4e4d6924a861330
SHA2569b3dfb0df92d0f30eea49a9268849da58b622f34503d3ffeca5f211014c0586a
SHA512fae04acd4a8422f9b37f0faac48adf409f875eb4ebde5dde3da8a991c520f9fb78ae4f2c9a4ccd00b3d38deebcc6626dee10224cb7c85f317e011a4bbb23f39b
-
Filesize
6KB
MD5825367ca12892ffb589f729c00081352
SHA12707e0f765c5d34592a73e31a0fa8a304f42f3a2
SHA256cbff38b14a81575c3ce711dbdca52696a2b4ef5fefd11872b9391ee368d031dc
SHA512c9537e00a42fd9287f3a351587f91c047a575e55d1edd202962eefe2783a247c47b9e7f16e1a0b234222db80508816e4646be59cc32ab0744b98d32cf07dfbf3
-
Filesize
6KB
MD597d388ab1ae3ad3093f943a59dd23160
SHA1f3d253cbb28be575a42ea6cf97d5577f15c3fc40
SHA2564ada4007a852ccc5f80c9b0281590af9829ad4efbfe95ba04e604607b1cf794a
SHA512a95d335dd3a1e317802343b1af9baebd7bbce38b93b675948d2f64c77dc3c8fe433e92e98daeeb13f68b810d5fdcc9ddd28851cdba9741d7c224958780709c4f
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\kvnvyogb.default-release\sessionstore-backups\recovery.jsonlz4
Filesize3KB
MD5f6013fc1cf31b7e4c8fb7a8eb0aaba77
SHA138623b5c106edf924a859a8976c4538683c0336b
SHA2569222651d09cb2bae4d8669d6581c971f09977f7447b6003479783e536bcd4e31
SHA512a6b925fc4abe7f86c44f2f804c1c3ddc28c77b6388be9e8788d92306220afc2afbbdd1f1f9bd998401edbf401f3fe158dbcbf19e1b6434d90b7c615e183cd674
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\kvnvyogb.default-release\sessionstore-backups\recovery.jsonlz4
Filesize6KB
MD5ef5ffd24888ba5002f386f99844be61d
SHA1caf57bf5c927da528172fb33b22de2456fb1a510
SHA25639c80bc48fd8013d0f3c2e36650068612a72a935b616ffbfd04012c0749ee9f3
SHA51207259760d3a4debc4ca8c3e14ce63be976f65e1a93e911f1bf2225398ea7cf919f204af4718fb7c6165852cf76e299a106031d5eb8d5f59b76c3ab08577712f8
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\kvnvyogb.default-release\sessionstore-backups\recovery.jsonlz4
Filesize4KB
MD58f62262db161a0b8cbeec4d855fb7645
SHA12a301a6dfe745d7d67da9c07187607856f6d5fc0
SHA25676de5ed9f909772c18ce538c9597712318f5eb7d55c6ee9f7a26cbd7a86b0b5a
SHA512d3b4fc318fe3ec0dd8dfad280f6eeba873239927c836c34385c27636f28259d7751c99ec04e479ac9fdf777f4ddcc74200fe8ea71bbee82fbb0787935eb702cd