Analysis
-
max time kernel
509s -
max time network
515s -
platform
windows10-2004_x64 -
resource
win10v2004-20240412-en -
resource tags
arch:x64arch:x86image:win10v2004-20240412-enlocale:en-usos:windows10-2004-x64system -
submitted
17/04/2024, 19:21
Static task
static1
Behavioral task
behavioral1
Sample
FateInjector.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
FateInjector.exe
Resource
win10v2004-20240412-en
General
-
Target
FateInjector.exe
-
Size
3.7MB
-
MD5
9e6de7c7ebd1a00c2f7ddec78ba9403a
-
SHA1
65a9e65bf9b2b683ed93ac9848df8b5c9f3d4297
-
SHA256
77a84c4ed29551d8968a9bc5de796d6f8463fa54df8554b3cff91ca83d8ff70d
-
SHA512
f2dac6efaf4fa6c32b14a45bfa60813b67eb3a46e9a7342d13c1ba3bea3e0a188a5703d34c5fc65d20baae751c334474a9b51d7862d4c74fb60007dd8ce4adc9
-
SSDEEP
49152:PVE0okol7ESpUbVIwI2SovAJsXbkiokMTU+tbCn8GTs5QnSaTevSpoadQ4zXgpdP:dEcI71ibyJJkwC9JfdQ4zitt
Malware Config
Signatures
-
Checks processor information in registry 2 TTPs 6 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~Mhz firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString firefox.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Update Signature firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Update Revision firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\VendorIdentifier firefox.exe -
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer chrome.exe -
Modifies data under HKEY_USERS 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry chrome.exe Set value (int) \REGISTRY\USER\S-1-5-19\SOFTWARE\Microsoft\Cryptography\TPM\Telemetry\TraceTimeLast = "133578555090354049" chrome.exe -
Modifies registry class 1 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3198953144-1466794930-246379610-1000_Classes\Local Settings firefox.exe -
Suspicious behavior: EnumeratesProcesses 4 IoCs
pid Process 4352 chrome.exe 4352 chrome.exe 4856 chrome.exe 4856 chrome.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 3 IoCs
pid Process 4352 chrome.exe 4352 chrome.exe 4352 chrome.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeShutdownPrivilege 4352 chrome.exe Token: SeCreatePagefilePrivilege 4352 chrome.exe Token: SeShutdownPrivilege 4352 chrome.exe Token: SeCreatePagefilePrivilege 4352 chrome.exe Token: SeShutdownPrivilege 4352 chrome.exe Token: SeCreatePagefilePrivilege 4352 chrome.exe Token: SeShutdownPrivilege 4352 chrome.exe Token: SeCreatePagefilePrivilege 4352 chrome.exe Token: SeShutdownPrivilege 4352 chrome.exe Token: SeCreatePagefilePrivilege 4352 chrome.exe Token: SeShutdownPrivilege 4352 chrome.exe Token: SeCreatePagefilePrivilege 4352 chrome.exe Token: SeShutdownPrivilege 4352 chrome.exe Token: SeCreatePagefilePrivilege 4352 chrome.exe Token: SeShutdownPrivilege 4352 chrome.exe Token: SeCreatePagefilePrivilege 4352 chrome.exe Token: SeShutdownPrivilege 4352 chrome.exe Token: SeCreatePagefilePrivilege 4352 chrome.exe Token: SeShutdownPrivilege 4352 chrome.exe Token: SeCreatePagefilePrivilege 4352 chrome.exe Token: SeShutdownPrivilege 4352 chrome.exe Token: SeCreatePagefilePrivilege 4352 chrome.exe Token: SeShutdownPrivilege 4352 chrome.exe Token: SeCreatePagefilePrivilege 4352 chrome.exe Token: SeShutdownPrivilege 4352 chrome.exe Token: SeCreatePagefilePrivilege 4352 chrome.exe Token: SeShutdownPrivilege 4352 chrome.exe Token: SeCreatePagefilePrivilege 4352 chrome.exe Token: SeShutdownPrivilege 4352 chrome.exe Token: SeCreatePagefilePrivilege 4352 chrome.exe Token: SeShutdownPrivilege 4352 chrome.exe Token: SeCreatePagefilePrivilege 4352 chrome.exe Token: SeShutdownPrivilege 4352 chrome.exe Token: SeCreatePagefilePrivilege 4352 chrome.exe Token: SeShutdownPrivilege 4352 chrome.exe Token: SeCreatePagefilePrivilege 4352 chrome.exe Token: SeShutdownPrivilege 4352 chrome.exe Token: SeCreatePagefilePrivilege 4352 chrome.exe Token: SeShutdownPrivilege 4352 chrome.exe Token: SeCreatePagefilePrivilege 4352 chrome.exe Token: SeShutdownPrivilege 4352 chrome.exe Token: SeCreatePagefilePrivilege 4352 chrome.exe Token: SeShutdownPrivilege 4352 chrome.exe Token: SeCreatePagefilePrivilege 4352 chrome.exe Token: SeShutdownPrivilege 4352 chrome.exe Token: SeCreatePagefilePrivilege 4352 chrome.exe Token: SeShutdownPrivilege 4352 chrome.exe Token: SeCreatePagefilePrivilege 4352 chrome.exe Token: SeShutdownPrivilege 4352 chrome.exe Token: SeCreatePagefilePrivilege 4352 chrome.exe Token: SeShutdownPrivilege 4352 chrome.exe Token: SeCreatePagefilePrivilege 4352 chrome.exe Token: SeShutdownPrivilege 4352 chrome.exe Token: SeCreatePagefilePrivilege 4352 chrome.exe Token: SeShutdownPrivilege 4352 chrome.exe Token: SeCreatePagefilePrivilege 4352 chrome.exe Token: SeShutdownPrivilege 4352 chrome.exe Token: SeCreatePagefilePrivilege 4352 chrome.exe Token: SeShutdownPrivilege 4352 chrome.exe Token: SeCreatePagefilePrivilege 4352 chrome.exe Token: SeShutdownPrivilege 4352 chrome.exe Token: SeCreatePagefilePrivilege 4352 chrome.exe Token: SeShutdownPrivilege 4352 chrome.exe Token: SeCreatePagefilePrivilege 4352 chrome.exe -
Suspicious use of FindShellTrayWindow 64 IoCs
pid Process 1492 FateInjector.exe 4352 chrome.exe 4352 chrome.exe 4352 chrome.exe 4352 chrome.exe 4352 chrome.exe 4352 chrome.exe 4352 chrome.exe 4352 chrome.exe 4352 chrome.exe 4352 chrome.exe 4352 chrome.exe 4352 chrome.exe 4352 chrome.exe 4352 chrome.exe 4352 chrome.exe 4352 chrome.exe 4352 chrome.exe 4352 chrome.exe 4352 chrome.exe 4352 chrome.exe 4352 chrome.exe 4352 chrome.exe 4352 chrome.exe 4352 chrome.exe 4352 chrome.exe 4352 chrome.exe 4352 chrome.exe 4352 chrome.exe 4352 chrome.exe 4352 chrome.exe 4352 chrome.exe 4352 chrome.exe 4352 chrome.exe 4352 chrome.exe 4352 chrome.exe 4352 chrome.exe 4352 chrome.exe 4352 chrome.exe 4352 chrome.exe 4352 chrome.exe 4352 chrome.exe 4352 chrome.exe 4352 chrome.exe 4352 chrome.exe 4352 chrome.exe 4352 chrome.exe 4352 chrome.exe 4352 chrome.exe 4352 chrome.exe 4352 chrome.exe 4352 chrome.exe 4352 chrome.exe 4352 chrome.exe 4352 chrome.exe 4352 chrome.exe 4352 chrome.exe 4352 chrome.exe 4352 chrome.exe 4352 chrome.exe 4352 chrome.exe 4352 chrome.exe 4352 chrome.exe 4352 chrome.exe -
Suspicious use of SendNotifyMessage 64 IoCs
pid Process 1492 FateInjector.exe 4352 chrome.exe 4352 chrome.exe 4352 chrome.exe 4352 chrome.exe 4352 chrome.exe 4352 chrome.exe 4352 chrome.exe 4352 chrome.exe 4352 chrome.exe 4352 chrome.exe 4352 chrome.exe 4352 chrome.exe 4352 chrome.exe 4352 chrome.exe 4352 chrome.exe 4352 chrome.exe 4352 chrome.exe 4352 chrome.exe 4352 chrome.exe 4352 chrome.exe 4352 chrome.exe 4352 chrome.exe 4352 chrome.exe 4352 chrome.exe 4352 chrome.exe 4352 chrome.exe 4352 chrome.exe 4352 chrome.exe 4352 chrome.exe 4352 chrome.exe 4352 chrome.exe 4352 chrome.exe 4352 chrome.exe 4352 chrome.exe 4352 chrome.exe 4352 chrome.exe 4352 chrome.exe 4352 chrome.exe 4352 chrome.exe 4352 chrome.exe 4352 chrome.exe 4352 chrome.exe 4352 chrome.exe 4352 chrome.exe 4352 chrome.exe 4352 chrome.exe 4352 chrome.exe 4352 chrome.exe 4352 chrome.exe 4352 chrome.exe 4352 chrome.exe 4352 chrome.exe 4352 chrome.exe 4352 chrome.exe 4352 chrome.exe 4352 chrome.exe 4352 chrome.exe 4352 chrome.exe 4352 chrome.exe 4352 chrome.exe 4352 chrome.exe 4352 chrome.exe 4352 chrome.exe -
Suspicious use of SetWindowsHookEx 3 IoCs
pid Process 1492 FateInjector.exe 1492 FateInjector.exe 4640 firefox.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 4352 wrote to memory of 4252 4352 chrome.exe 98 PID 4352 wrote to memory of 4252 4352 chrome.exe 98 PID 4352 wrote to memory of 2688 4352 chrome.exe 99 PID 4352 wrote to memory of 2688 4352 chrome.exe 99 PID 4352 wrote to memory of 2688 4352 chrome.exe 99 PID 4352 wrote to memory of 2688 4352 chrome.exe 99 PID 4352 wrote to memory of 2688 4352 chrome.exe 99 PID 4352 wrote to memory of 2688 4352 chrome.exe 99 PID 4352 wrote to memory of 2688 4352 chrome.exe 99 PID 4352 wrote to memory of 2688 4352 chrome.exe 99 PID 4352 wrote to memory of 2688 4352 chrome.exe 99 PID 4352 wrote to memory of 2688 4352 chrome.exe 99 PID 4352 wrote to memory of 2688 4352 chrome.exe 99 PID 4352 wrote to memory of 2688 4352 chrome.exe 99 PID 4352 wrote to memory of 2688 4352 chrome.exe 99 PID 4352 wrote to memory of 2688 4352 chrome.exe 99 PID 4352 wrote to memory of 2688 4352 chrome.exe 99 PID 4352 wrote to memory of 2688 4352 chrome.exe 99 PID 4352 wrote to memory of 2688 4352 chrome.exe 99 PID 4352 wrote to memory of 2688 4352 chrome.exe 99 PID 4352 wrote to memory of 2688 4352 chrome.exe 99 PID 4352 wrote to memory of 2688 4352 chrome.exe 99 PID 4352 wrote to memory of 2688 4352 chrome.exe 99 PID 4352 wrote to memory of 2688 4352 chrome.exe 99 PID 4352 wrote to memory of 2688 4352 chrome.exe 99 PID 4352 wrote to memory of 2688 4352 chrome.exe 99 PID 4352 wrote to memory of 2688 4352 chrome.exe 99 PID 4352 wrote to memory of 2688 4352 chrome.exe 99 PID 4352 wrote to memory of 2688 4352 chrome.exe 99 PID 4352 wrote to memory of 2688 4352 chrome.exe 99 PID 4352 wrote to memory of 2688 4352 chrome.exe 99 PID 4352 wrote to memory of 2688 4352 chrome.exe 99 PID 4352 wrote to memory of 2688 4352 chrome.exe 99 PID 4352 wrote to memory of 3404 4352 chrome.exe 100 PID 4352 wrote to memory of 3404 4352 chrome.exe 100 PID 4352 wrote to memory of 3412 4352 chrome.exe 101 PID 4352 wrote to memory of 3412 4352 chrome.exe 101 PID 4352 wrote to memory of 3412 4352 chrome.exe 101 PID 4352 wrote to memory of 3412 4352 chrome.exe 101 PID 4352 wrote to memory of 3412 4352 chrome.exe 101 PID 4352 wrote to memory of 3412 4352 chrome.exe 101 PID 4352 wrote to memory of 3412 4352 chrome.exe 101 PID 4352 wrote to memory of 3412 4352 chrome.exe 101 PID 4352 wrote to memory of 3412 4352 chrome.exe 101 PID 4352 wrote to memory of 3412 4352 chrome.exe 101 PID 4352 wrote to memory of 3412 4352 chrome.exe 101 PID 4352 wrote to memory of 3412 4352 chrome.exe 101 PID 4352 wrote to memory of 3412 4352 chrome.exe 101 PID 4352 wrote to memory of 3412 4352 chrome.exe 101 PID 4352 wrote to memory of 3412 4352 chrome.exe 101 PID 4352 wrote to memory of 3412 4352 chrome.exe 101 PID 4352 wrote to memory of 3412 4352 chrome.exe 101 PID 4352 wrote to memory of 3412 4352 chrome.exe 101 PID 4352 wrote to memory of 3412 4352 chrome.exe 101 PID 4352 wrote to memory of 3412 4352 chrome.exe 101 PID 4352 wrote to memory of 3412 4352 chrome.exe 101 PID 4352 wrote to memory of 3412 4352 chrome.exe 101 PID 4352 wrote to memory of 3412 4352 chrome.exe 101 PID 4352 wrote to memory of 3412 4352 chrome.exe 101 PID 4352 wrote to memory of 3412 4352 chrome.exe 101 PID 4352 wrote to memory of 3412 4352 chrome.exe 101 PID 4352 wrote to memory of 3412 4352 chrome.exe 101 PID 4352 wrote to memory of 3412 4352 chrome.exe 101 PID 4352 wrote to memory of 3412 4352 chrome.exe 101 -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
Processes
-
C:\Users\Admin\AppData\Local\Temp\FateInjector.exe"C:\Users\Admin\AppData\Local\Temp\FateInjector.exe"1⤵
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of SetWindowsHookEx
PID:1492
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe"1⤵
- Enumerates system info in registry
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:4352 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=110.0.5481.104 --initial-client-data=0x11c,0x120,0x124,0xf8,0x128,0x7ffeccb8ab58,0x7ffeccb8ab68,0x7ffeccb8ab782⤵PID:4252
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1752 --field-trial-handle=1956,i,10932268695967700537,5353058021490815473,131072 /prefetch:22⤵PID:2688
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2196 --field-trial-handle=1956,i,10932268695967700537,5353058021490815473,131072 /prefetch:82⤵PID:3404
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=service --mojo-platform-channel-handle=2272 --field-trial-handle=1956,i,10932268695967700537,5353058021490815473,131072 /prefetch:82⤵PID:3412
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --enable-chrome-cart --first-renderer-process --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --mojo-platform-channel-handle=3108 --field-trial-handle=1956,i,10932268695967700537,5353058021490815473,131072 /prefetch:12⤵PID:4004
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --enable-chrome-cart --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --mojo-platform-channel-handle=3140 --field-trial-handle=1956,i,10932268695967700537,5353058021490815473,131072 /prefetch:12⤵PID:3572
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --enable-chrome-cart --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --mojo-platform-channel-handle=4368 --field-trial-handle=1956,i,10932268695967700537,5353058021490815473,131072 /prefetch:12⤵PID:704
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --mojo-platform-channel-handle=4280 --field-trial-handle=1956,i,10932268695967700537,5353058021490815473,131072 /prefetch:82⤵PID:1260
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --mojo-platform-channel-handle=4336 --field-trial-handle=1956,i,10932268695967700537,5353058021490815473,131072 /prefetch:82⤵PID:3728
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --mojo-platform-channel-handle=4272 --field-trial-handle=1956,i,10932268695967700537,5353058021490815473,131072 /prefetch:82⤵PID:1512
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.ProcessorMetrics --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4816 --field-trial-handle=1956,i,10932268695967700537,5353058021490815473,131072 /prefetch:82⤵PID:2872
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4272 --field-trial-handle=1956,i,10932268695967700537,5353058021490815473,131072 /prefetch:82⤵PID:2184
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAACQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1644 --field-trial-handle=1956,i,10932268695967700537,5353058021490815473,131072 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:4856
-
-
C:\Program Files\Google\Chrome\Application\110.0.5481.104\elevation_service.exe"C:\Program Files\Google\Chrome\Application\110.0.5481.104\elevation_service.exe"1⤵PID:4472
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe"1⤵PID:836
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe"2⤵
- Checks processor information in registry
- Modifies registry class
- Suspicious use of SetWindowsHookEx
PID:4640 -
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel="4640.0.1057944247\194447643" -parentBuildID 20230214051806 -prefsHandle 1772 -prefMapHandle 1764 -prefsLen 22076 -prefMapSize 235121 -appDir "C:\Program Files\Mozilla Firefox\browser" - {a71bc8fd-1be3-4563-9a21-999e63758d8d} 4640 "\\.\pipe\gecko-crash-server-pipe.4640" 1852 20e13a0b758 gpu3⤵PID:2500
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel="4640.1.932069402\1294016470" -parentBuildID 20230214051806 -prefsHandle 2408 -prefMapHandle 2396 -prefsLen 22112 -prefMapSize 235121 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {15715eff-c235-434e-9290-74bc13d1e254} 4640 "\\.\pipe\gecko-crash-server-pipe.4640" 2420 20e13f77658 socket3⤵PID:4440
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel="4640.2.791737042\2138511751" -childID 1 -isForBrowser -prefsHandle 2940 -prefMapHandle 2936 -prefsLen 22150 -prefMapSize 235121 -jsInitHandle 1308 -jsInitLen 246560 -a11yResourceId 64 -parentBuildID 20230214051806 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {64f1e764-17d9-4896-b018-112c40eea3b9} 4640 "\\.\pipe\gecko-crash-server-pipe.4640" 3056 20e16917e58 tab3⤵PID:2876
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel="4640.3.80942739\1716949141" -childID 2 -isForBrowser -prefsHandle 3700 -prefMapHandle 3696 -prefsLen 27616 -prefMapSize 235121 -jsInitHandle 1308 -jsInitLen 246560 -a11yResourceId 64 -parentBuildID 20230214051806 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {e067aa32-cf6b-4a51-b440-d85ce1f63b97} 4640 "\\.\pipe\gecko-crash-server-pipe.4640" 3712 20e187a0d58 tab3⤵PID:4788
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel="4640.4.257066954\735137915" -childID 3 -isForBrowser -prefsHandle 5252 -prefMapHandle 5248 -prefsLen 27697 -prefMapSize 235121 -jsInitHandle 1308 -jsInitLen 246560 -a11yResourceId 64 -parentBuildID 20230214051806 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {da1fd1bc-f219-4c6f-adf7-5ae735e3c215} 4640 "\\.\pipe\gecko-crash-server-pipe.4640" 5264 20e17204158 tab3⤵PID:1172
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel="4640.5.1593040277\1281515252" -childID 4 -isForBrowser -prefsHandle 5200 -prefMapHandle 5284 -prefsLen 27697 -prefMapSize 235121 -jsInitHandle 1308 -jsInitLen 246560 -a11yResourceId 64 -parentBuildID 20230214051806 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {5b679b12-ad49-403f-a7e9-6c1d847334dc} 4640 "\\.\pipe\gecko-crash-server-pipe.4640" 5396 20e17204458 tab3⤵PID:2576
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel="4640.6.687494977\1143448856" -childID 5 -isForBrowser -prefsHandle 5600 -prefMapHandle 5604 -prefsLen 27697 -prefMapSize 235121 -jsInitHandle 1308 -jsInitLen 246560 -a11yResourceId 64 -parentBuildID 20230214051806 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {4bccee45-8269-4a5c-82db-7fac80462804} 4640 "\\.\pipe\gecko-crash-server-pipe.4640" 5384 20e17206858 tab3⤵PID:3292
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel="4640.7.91697884\1164934436" -childID 6 -isForBrowser -prefsHandle 5428 -prefMapHandle 6020 -prefsLen 28177 -prefMapSize 235121 -jsInitHandle 1308 -jsInitLen 246560 -a11yResourceId 64 -parentBuildID 20230214051806 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {e63436f0-2894-4e5c-8d2e-a9bf75023965} 4640 "\\.\pipe\gecko-crash-server-pipe.4640" 6024 20e194f7b58 tab3⤵PID:4300
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1KB
MD5e08495865b5bb54b18b2413ba63414a5
SHA114e07713c69cbe72c108cf871b05f1903344bbaa
SHA256f05d67e87996910c65b21236a71e0e4fbf3a8939ddff60fca432d3be07136832
SHA512685d9b83ef7b3003a9378aebef702c58be3a36db953a35348259e1087f34ee3dd42c62e71f18d1869d7e7029c7af43e85f31da8cbc796ad34109cee17b9cdbca
-
Filesize
2B
MD5d751713988987e9331980363e24189ce
SHA197d170e1550eee4afc0af065b78cda302a97674c
SHA2564f53cda18c2baa0c0354bb5f9a3ecbe5ed12ab4d8e11ba873c2f11161202b945
SHA512b25b294cb4deb69ea00a4c3cf3113904801b6015e5956bd019a8570b1fe1d6040e944ef3cdee16d0a46503ca6e659a25f21cf9ceddc13f352a3c98138c15d6af
-
Filesize
356B
MD5ebb9a155c0c8c5465f332f5abbd32ff7
SHA154182de0aca4bdf0b503de3be928cd6a4f229fe4
SHA25612891b179192204ef61315b15ecc80c8538c1c6e9199feda177627fefc131d2e
SHA51267ed5eec36cad9db106d8f94f9d02c914bb950490ee1f9c996e10254a13577c76392dabcc19396ba982473fd0c9c078d3dc28e2b4b3e403599f444b379979042
-
Filesize
6KB
MD5e99da7c473029e10a932108ef5c39e8c
SHA15c6434e4ff812b9a6b07fb5538be6c4c2935d344
SHA25637a76b1e23c32a86887ce7cecf771cbfe4992023e1c81cc50b9a2bf3907da74b
SHA5129c5d0353c0b8a8222875736fad36b5fdcff33feb24c284cfe170239d0b0b9b839c3b79ce4c5ae7ca4247377164d960247f466d3077081617afdbcf4023b7f733
-
Filesize
6KB
MD58de6a44700e51cac184beaaf09678752
SHA166e35d8b40b3950ca88fa7b8abb3c991fda6ca70
SHA2562d27d2c2f032e76b22122120394a9658342bacaf25398f7b004e256f747e05ed
SHA51250be9718780e0ce6d22ab9a262a1098407add13366dd518860a42e024b5a198e740a1f0984228210e35aa1ac5d5d860916b428d4452d47b3572744bb39e30e90
-
Filesize
16KB
MD5b9715390f6b2660956e828064d85a86f
SHA1b512f0c2e193211b16025ea8b4593a862541a78c
SHA256d3c6c58ee5aa431de30f5d0bda4e2d6ffa0748608cdfdd6ffb7dab41b9c5a498
SHA512ba87a922454afc933b91192d340df4186e09ef9b3d180cb7de4b845376c21710ac6884485f57031d2600b99b6bba1a8e18e1f4b86136ec0d0202039147059f2e
-
Filesize
251KB
MD5fb8bd1055e5cb90205d5aef5a328ec44
SHA19b13e80705ba4796b933029d6044d7d4d79b218e
SHA256ac906d0d4793bfdd3d4514a6493da94c37fb3f1f52e00e614ff67716fa740d79
SHA512f5431fc18a50d9418c778ae1af2389fbff39aa4a4d22bf87adb51af1660171e6ee9c9e160febf0137b610a25d3d5678f4f9858b3dbc2788308a8482e4645ef0d
-
C:\Users\Admin\AppData\Local\Mozilla\Firefox\Profiles\hwldqhqu.default-release\activity-stream.discovery_stream.json.tmp
Filesize24KB
MD5fd4822bfa52b0b4ae20d2f09e1ad4c80
SHA170774f5aac02e5c34c6a4c84d3076fb2b11ec43b
SHA2568bd02c32a760052960c8468e62e487bbbfbd9a9193d0a0eec22507d431b00908
SHA512af19ebff9e6d0fad51b2ea117469a4dabfc1db1269555e18b02c05e3ee5124a245c5e6000ac27d805c1b2f12fd2bb76a38131a1145cc7d2ee2392d733055d3a9
-
C:\Users\Admin\AppData\Local\Mozilla\Firefox\Profiles\hwldqhqu.default-release\activity-stream.discovery_stream.json.tmp
Filesize23KB
MD5a813da0087f2b0fb59038d0209379f54
SHA1996f61799706c28c0960947fb609890809de038d
SHA256a351cecd486fe6070fe08246fcd736f102461a0f7c80576b00581003c2815dd6
SHA51259ae99dcac1a2dbaca280aedde39b0f29b823ab2a0a0aa119202056183a0e8e2a936652a6c1fa2098eab628af621598728790054cb98aa7f89c6f238693b3aef
-
C:\Users\Admin\AppData\Local\Mozilla\Firefox\Profiles\hwldqhqu.default-release\cache2\entries\C72D4296C2EBC6FD41A9F780CD0C8F30F0FF937C
Filesize13KB
MD53b668b309eea1d5c1ecf985717be4003
SHA19797d81a4a338d73913697ce0fd1f6942cf49414
SHA2561aca860c00d5ce6e0f129270b7bd6edc009cf92801ecca4b3fa7a3fbc51cb4d1
SHA5121294bcc566a88e08d29170753153d7c18d86955bb30763ee079b9f6899ee93aa9fe3bac1c082c98718103b41f7b97770b013cb46fad9059ac23eea78426541d2
-
Filesize
442KB
MD585430baed3398695717b0263807cf97c
SHA1fffbee923cea216f50fce5d54219a188a5100f41
SHA256a9f4281f82b3579581c389e8583dc9f477c7fd0e20c9dfc91a2e611e21e3407e
SHA51206511f1f6c6d44d076b3c593528c26a602348d9c41689dbf5ff716b671c3ca5756b12cb2e5869f836dedce27b1a5cfe79b93c707fd01f8e84b620923bb61b5f1
-
Filesize
8.0MB
MD5a01c5ecd6108350ae23d2cddf0e77c17
SHA1c6ac28a2cd979f1f9a75d56271821d5ff665e2b6
SHA256345d44e3aa3e1967d186a43d732c8051235c43458169a5d7d371780a6475ee42
SHA512b046dd1b26ec0b810ee441b7ad4dc135e3f1521a817b9f3db60a32976352e8f7e53920e1a77fc5b4130aac260d79deef7e823267b4414e9cc774d8bffca56a72
-
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\6824f4a902c78fbd.customDestinations-ms
Filesize7KB
MD566a792fca109349a56f3958ebf015849
SHA1cbb065feacbf36dabd277f454c4a7830baf37e12
SHA2563007ec82c2963a27aa8d9eef1207b0f0108f40be3d7dc98559728e1274ab5888
SHA512c9187a68798ecbb6f7789b1917c758cbc4a5d44b192020fed3c3fc43c4df6470dc4f56b113da0b85dd4ef91887411b8078e6e938527424c720360aae8e13f695
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\hwldqhqu.default-release\gmp-gmpopenh264\1.8.1.2\gmpopenh264.dll
Filesize997KB
MD5fe3355639648c417e8307c6d051e3e37
SHA1f54602d4b4778da21bc97c7238fc66aa68c8ee34
SHA2561ed7877024be63a049da98733fd282c16bd620530a4fb580dacec3a78ace914e
SHA5128f4030bb2464b98eccbea6f06eb186d7216932702d94f6b84c56419e9cf65a18309711ab342d1513bf85aed402bc3535a70db4395874828f0d35c278dd2eac9c
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\hwldqhqu.default-release\gmp-gmpopenh264\1.8.1.2\gmpopenh264.info
Filesize116B
MD53d33cdc0b3d281e67dd52e14435dd04f
SHA14db88689282fd4f9e9e6ab95fcbb23df6e6485db
SHA256f526e9f98841d987606efeaff7f3e017ba9fd516c4be83890c7f9a093ea4c47b
SHA512a4a96743332cc8ef0f86bc2e6122618bfc75ed46781dadbac9e580cd73df89e74738638a2cccb4caa4cbbf393d771d7f2c73f825737cdb247362450a0d4a4bc1
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\hwldqhqu.default-release\gmp-widevinecdm\4.10.2557.0\LICENSE.txt
Filesize479B
MD549ddb419d96dceb9069018535fb2e2fc
SHA162aa6fea895a8b68d468a015f6e6ab400d7a7ca6
SHA2562af127b4e00f7303de8271996c0c681063e4dc7abdc7b2a8c3fe5932b9352539
SHA51248386217dabf7556e381ab3f5924b123a0a525969ff98f91efb03b65477c94e48a15d9abcec116b54616d36ad52b6f1d7b8b84c49c204e1b9b43f26f2af92da2
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\hwldqhqu.default-release\gmp-widevinecdm\4.10.2557.0\manifest.json
Filesize372B
MD58be33af717bb1b67fbd61c3f4b807e9e
SHA17cf17656d174d951957ff36810e874a134dd49e0
SHA256e92d3394635edfb987a7528e0ccd24360e07a299078df2a6967ca3aae22fa2dd
SHA5126125f60418e25fee896bf59f5672945cd8f36f03665c721837bb50adf5b4dfef2dddbfcfc817555027dcfa90e1ef2a1e80af1219e8063629ea70263d2fc936a7
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\hwldqhqu.default-release\gmp-widevinecdm\4.10.2557.0\widevinecdm.dll
Filesize11.8MB
MD533bf7b0439480effb9fb212efce87b13
SHA1cee50f2745edc6dc291887b6075ca64d716f495a
SHA2568ee42d9258e20bbc5bfdfae61605429beb5421ffeaaa0d02b86d4978f4b4ac4e
SHA512d329a1a1d98e302142f2776de8cc2cd45a465d77cb21c461bdf5ee58c68073a715519f449cb673977288fe18401a0abcce636c85abaec61a4a7a08a16c924275
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\hwldqhqu.default-release\gmp-widevinecdm\4.10.2557.0\widevinecdm.dll.lib
Filesize1KB
MD5688bed3676d2104e7f17ae1cd2c59404
SHA1952b2cdf783ac72fcb98338723e9afd38d47ad8e
SHA25633899a3ebc22cb8ed8de7bd48c1c29486c0279b06d7ef98241c92aef4e3b9237
SHA5127a0e3791f75c229af79dd302f7d0594279f664886fea228cfe78e24ef185ae63aba809aa1036feb3130066deadc8e78909c277f0a7ed1e3485df3cf2cd329776
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\hwldqhqu.default-release\gmp-widevinecdm\4.10.2557.0\widevinecdm.dll.sig
Filesize1KB
MD5937326fead5fd401f6cca9118bd9ade9
SHA14526a57d4ae14ed29b37632c72aef3c408189d91
SHA25668a03f075db104f84afdd8fca45a7e4bff7b55dc1a2a24272b3abe16d8759c81
SHA512b232f6cf3f88adb346281167ac714c4c4c7aac15175087c336911946d12d63d3a3a458e06b298b41a7ec582ef09fe238da3a3166ff89c450117228f7485c22d2
-
Filesize
7KB
MD5667ca1e0c46ab2a0945eee40cdc6594e
SHA1fa312d97c07767db587e1e86028fdd8c844f6986
SHA2564d58525c800e9faac74fb9458ad03297bdb474812bcad7090b90afa51d2dc25e
SHA5129d58469e031c158aa446f9e9c77fbbf8d24bed9ee36407d36dcf345868fc8452f136e1086416b9a70ec30eb84e1f4ea019413df7973f054320228e2bfc33485f
-
Filesize
8KB
MD55c035beac801bd50396e6b79301b4835
SHA10545cc713af9d56f690b0ce29a11fa5f47be57e8
SHA2560e82743063dc1fc4feb1e54b43cdc829713e1be1aef907c1d7c147d500040fdf
SHA512bc3444ba1390d595e4b119b9b52872f07c33016b7c9ac3ea9cf4aa83230b825b7fa136dc870da3e18e9c1c4debf25367f500b497ce62aec5be2a636692ac045d
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\hwldqhqu.default-release\sessionstore-backups\recovery.jsonlz4
Filesize1KB
MD5948ba30f1505edaa77d52cd8d54938e4
SHA1589eebadb03d810c08882ab56786c60f495667e2
SHA2561391c904224cdfb19595c9e729ea6435891805ba11616271ce757b8d91dc1ec9
SHA51242b66c48bcab6808d4b7a60112da6b76b07d5704ad0b00f1182744c83e4d41ab541edb92a74ffcfccf448e2ac6cce004465b3eb91ebe63150bebad54c534b148
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\hwldqhqu.default-release\sessionstore-backups\recovery.jsonlz4
Filesize10KB
MD596d038dcbdcb22d9eab6f8fc0f468e18
SHA16fd0cb5b3adeb35046277787e72e523b3f0e2f9d
SHA256739b29413b897f26327e8c7613ac31b44f682a5602cd0b7ad5b957eb295ee758
SHA512a51dea04fa618be982e77de94188d12731be265686d8d1466f4e0603ad59b4a1c89e1d0363fcdfa28f7dd3fcf6857f230f7aa5411b09483fdc37cc737903c57d
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\hwldqhqu.default-release\sessionstore-backups\recovery.jsonlz4
Filesize10KB
MD5c4c9da54d9df0e6c32303dc2ce94a4a4
SHA17e48e59f9f43662631140847b263b9810033b4c6
SHA256f6fb72ec6f74ff25e1af5e7bc3d363a7d3839005e44d09a1da4f64287fe759f9
SHA51260b8865b55f71f2577574410d649fc97f44a37cbc31e246e88c84a43b1fcb25332030e09fb17071c8a5ddfda5fe204687e11a61c3bb03b910420aeddf13e141a