Analysis
-
max time kernel
149s -
max time network
153s -
platform
windows10-2004_x64 -
resource
win10v2004-20240704-en -
resource tags
arch:x64arch:x86image:win10v2004-20240704-enlocale:en-usos:windows10-2004-x64system -
submitted
05/07/2024, 22:57
Static task
static1
Behavioral task
behavioral1
Sample
b11dd44bec07c34613666cae9264273d6b1f66bf37e8f21d8d18a4354aa729d2.exe
Resource
win10v2004-20240704-en
General
-
Target
b11dd44bec07c34613666cae9264273d6b1f66bf37e8f21d8d18a4354aa729d2.exe
-
Size
1.2MB
-
MD5
a1afcaad0b50c963ffe0a870cbe404be
-
SHA1
0f24f94384053b3f7036ce71421ec93bbfbbfd97
-
SHA256
b11dd44bec07c34613666cae9264273d6b1f66bf37e8f21d8d18a4354aa729d2
-
SHA512
17ca8eadfd11576c22a98fa3cb8f38dffc1c4d2f418cf283469febb2f7594a2d0279b99048c4f58753372fb2e4dcd1f199c65ce8d23504713a4f911d1a18310b
-
SSDEEP
24576:bqDEvCTbMWu7rQYlBQcBiT6rprG8aRq2Sbly7TWEPjg:bTvC/MTQYxsWR7aRq2dW
Malware Config
Signatures
-
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-2547232018-1419253926-3356748848-1000\Control Panel\International\Geo\Nation b11dd44bec07c34613666cae9264273d6b1f66bf37e8f21d8d18a4354aa729d2.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Checks processor information in registry 2 TTPs 6 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Update Signature firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Update Revision firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\VendorIdentifier firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~Mhz firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString firefox.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 firefox.exe -
Modifies registry class 1 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2547232018-1419253926-3356748848-1000_Classes\Local Settings firefox.exe -
Suspicious use of AdjustPrivilegeToken 5 IoCs
description pid Process Token: SeDebugPrivilege 400 firefox.exe Token: SeDebugPrivilege 400 firefox.exe Token: SeDebugPrivilege 400 firefox.exe Token: SeDebugPrivilege 400 firefox.exe Token: SeDebugPrivilege 400 firefox.exe -
Suspicious use of FindShellTrayWindow 64 IoCs
pid Process 2004 b11dd44bec07c34613666cae9264273d6b1f66bf37e8f21d8d18a4354aa729d2.exe 2004 b11dd44bec07c34613666cae9264273d6b1f66bf37e8f21d8d18a4354aa729d2.exe 2004 b11dd44bec07c34613666cae9264273d6b1f66bf37e8f21d8d18a4354aa729d2.exe 2004 b11dd44bec07c34613666cae9264273d6b1f66bf37e8f21d8d18a4354aa729d2.exe 2004 b11dd44bec07c34613666cae9264273d6b1f66bf37e8f21d8d18a4354aa729d2.exe 2004 b11dd44bec07c34613666cae9264273d6b1f66bf37e8f21d8d18a4354aa729d2.exe 2004 b11dd44bec07c34613666cae9264273d6b1f66bf37e8f21d8d18a4354aa729d2.exe 400 firefox.exe 400 firefox.exe 400 firefox.exe 400 firefox.exe 2004 b11dd44bec07c34613666cae9264273d6b1f66bf37e8f21d8d18a4354aa729d2.exe 2004 b11dd44bec07c34613666cae9264273d6b1f66bf37e8f21d8d18a4354aa729d2.exe 2004 b11dd44bec07c34613666cae9264273d6b1f66bf37e8f21d8d18a4354aa729d2.exe 2004 b11dd44bec07c34613666cae9264273d6b1f66bf37e8f21d8d18a4354aa729d2.exe 2004 b11dd44bec07c34613666cae9264273d6b1f66bf37e8f21d8d18a4354aa729d2.exe 2004 b11dd44bec07c34613666cae9264273d6b1f66bf37e8f21d8d18a4354aa729d2.exe 2004 b11dd44bec07c34613666cae9264273d6b1f66bf37e8f21d8d18a4354aa729d2.exe 2004 b11dd44bec07c34613666cae9264273d6b1f66bf37e8f21d8d18a4354aa729d2.exe 2004 b11dd44bec07c34613666cae9264273d6b1f66bf37e8f21d8d18a4354aa729d2.exe 2004 b11dd44bec07c34613666cae9264273d6b1f66bf37e8f21d8d18a4354aa729d2.exe 2004 b11dd44bec07c34613666cae9264273d6b1f66bf37e8f21d8d18a4354aa729d2.exe 2004 b11dd44bec07c34613666cae9264273d6b1f66bf37e8f21d8d18a4354aa729d2.exe 2004 b11dd44bec07c34613666cae9264273d6b1f66bf37e8f21d8d18a4354aa729d2.exe 2004 b11dd44bec07c34613666cae9264273d6b1f66bf37e8f21d8d18a4354aa729d2.exe 2004 b11dd44bec07c34613666cae9264273d6b1f66bf37e8f21d8d18a4354aa729d2.exe 2004 b11dd44bec07c34613666cae9264273d6b1f66bf37e8f21d8d18a4354aa729d2.exe 2004 b11dd44bec07c34613666cae9264273d6b1f66bf37e8f21d8d18a4354aa729d2.exe 2004 b11dd44bec07c34613666cae9264273d6b1f66bf37e8f21d8d18a4354aa729d2.exe 2004 b11dd44bec07c34613666cae9264273d6b1f66bf37e8f21d8d18a4354aa729d2.exe 2004 b11dd44bec07c34613666cae9264273d6b1f66bf37e8f21d8d18a4354aa729d2.exe 2004 b11dd44bec07c34613666cae9264273d6b1f66bf37e8f21d8d18a4354aa729d2.exe 2004 b11dd44bec07c34613666cae9264273d6b1f66bf37e8f21d8d18a4354aa729d2.exe 2004 b11dd44bec07c34613666cae9264273d6b1f66bf37e8f21d8d18a4354aa729d2.exe 2004 b11dd44bec07c34613666cae9264273d6b1f66bf37e8f21d8d18a4354aa729d2.exe 2004 b11dd44bec07c34613666cae9264273d6b1f66bf37e8f21d8d18a4354aa729d2.exe 2004 b11dd44bec07c34613666cae9264273d6b1f66bf37e8f21d8d18a4354aa729d2.exe 2004 b11dd44bec07c34613666cae9264273d6b1f66bf37e8f21d8d18a4354aa729d2.exe 2004 b11dd44bec07c34613666cae9264273d6b1f66bf37e8f21d8d18a4354aa729d2.exe 2004 b11dd44bec07c34613666cae9264273d6b1f66bf37e8f21d8d18a4354aa729d2.exe 2004 b11dd44bec07c34613666cae9264273d6b1f66bf37e8f21d8d18a4354aa729d2.exe 2004 b11dd44bec07c34613666cae9264273d6b1f66bf37e8f21d8d18a4354aa729d2.exe 2004 b11dd44bec07c34613666cae9264273d6b1f66bf37e8f21d8d18a4354aa729d2.exe 2004 b11dd44bec07c34613666cae9264273d6b1f66bf37e8f21d8d18a4354aa729d2.exe 2004 b11dd44bec07c34613666cae9264273d6b1f66bf37e8f21d8d18a4354aa729d2.exe 2004 b11dd44bec07c34613666cae9264273d6b1f66bf37e8f21d8d18a4354aa729d2.exe 2004 b11dd44bec07c34613666cae9264273d6b1f66bf37e8f21d8d18a4354aa729d2.exe 2004 b11dd44bec07c34613666cae9264273d6b1f66bf37e8f21d8d18a4354aa729d2.exe 2004 b11dd44bec07c34613666cae9264273d6b1f66bf37e8f21d8d18a4354aa729d2.exe 2004 b11dd44bec07c34613666cae9264273d6b1f66bf37e8f21d8d18a4354aa729d2.exe 2004 b11dd44bec07c34613666cae9264273d6b1f66bf37e8f21d8d18a4354aa729d2.exe 2004 b11dd44bec07c34613666cae9264273d6b1f66bf37e8f21d8d18a4354aa729d2.exe 2004 b11dd44bec07c34613666cae9264273d6b1f66bf37e8f21d8d18a4354aa729d2.exe 2004 b11dd44bec07c34613666cae9264273d6b1f66bf37e8f21d8d18a4354aa729d2.exe 2004 b11dd44bec07c34613666cae9264273d6b1f66bf37e8f21d8d18a4354aa729d2.exe 2004 b11dd44bec07c34613666cae9264273d6b1f66bf37e8f21d8d18a4354aa729d2.exe 2004 b11dd44bec07c34613666cae9264273d6b1f66bf37e8f21d8d18a4354aa729d2.exe 2004 b11dd44bec07c34613666cae9264273d6b1f66bf37e8f21d8d18a4354aa729d2.exe 2004 b11dd44bec07c34613666cae9264273d6b1f66bf37e8f21d8d18a4354aa729d2.exe 2004 b11dd44bec07c34613666cae9264273d6b1f66bf37e8f21d8d18a4354aa729d2.exe 2004 b11dd44bec07c34613666cae9264273d6b1f66bf37e8f21d8d18a4354aa729d2.exe 2004 b11dd44bec07c34613666cae9264273d6b1f66bf37e8f21d8d18a4354aa729d2.exe 2004 b11dd44bec07c34613666cae9264273d6b1f66bf37e8f21d8d18a4354aa729d2.exe 2004 b11dd44bec07c34613666cae9264273d6b1f66bf37e8f21d8d18a4354aa729d2.exe -
Suspicious use of SendNotifyMessage 64 IoCs
pid Process 2004 b11dd44bec07c34613666cae9264273d6b1f66bf37e8f21d8d18a4354aa729d2.exe 2004 b11dd44bec07c34613666cae9264273d6b1f66bf37e8f21d8d18a4354aa729d2.exe 2004 b11dd44bec07c34613666cae9264273d6b1f66bf37e8f21d8d18a4354aa729d2.exe 2004 b11dd44bec07c34613666cae9264273d6b1f66bf37e8f21d8d18a4354aa729d2.exe 2004 b11dd44bec07c34613666cae9264273d6b1f66bf37e8f21d8d18a4354aa729d2.exe 2004 b11dd44bec07c34613666cae9264273d6b1f66bf37e8f21d8d18a4354aa729d2.exe 2004 b11dd44bec07c34613666cae9264273d6b1f66bf37e8f21d8d18a4354aa729d2.exe 400 firefox.exe 400 firefox.exe 400 firefox.exe 2004 b11dd44bec07c34613666cae9264273d6b1f66bf37e8f21d8d18a4354aa729d2.exe 2004 b11dd44bec07c34613666cae9264273d6b1f66bf37e8f21d8d18a4354aa729d2.exe 2004 b11dd44bec07c34613666cae9264273d6b1f66bf37e8f21d8d18a4354aa729d2.exe 2004 b11dd44bec07c34613666cae9264273d6b1f66bf37e8f21d8d18a4354aa729d2.exe 2004 b11dd44bec07c34613666cae9264273d6b1f66bf37e8f21d8d18a4354aa729d2.exe 2004 b11dd44bec07c34613666cae9264273d6b1f66bf37e8f21d8d18a4354aa729d2.exe 2004 b11dd44bec07c34613666cae9264273d6b1f66bf37e8f21d8d18a4354aa729d2.exe 2004 b11dd44bec07c34613666cae9264273d6b1f66bf37e8f21d8d18a4354aa729d2.exe 2004 b11dd44bec07c34613666cae9264273d6b1f66bf37e8f21d8d18a4354aa729d2.exe 2004 b11dd44bec07c34613666cae9264273d6b1f66bf37e8f21d8d18a4354aa729d2.exe 2004 b11dd44bec07c34613666cae9264273d6b1f66bf37e8f21d8d18a4354aa729d2.exe 2004 b11dd44bec07c34613666cae9264273d6b1f66bf37e8f21d8d18a4354aa729d2.exe 2004 b11dd44bec07c34613666cae9264273d6b1f66bf37e8f21d8d18a4354aa729d2.exe 2004 b11dd44bec07c34613666cae9264273d6b1f66bf37e8f21d8d18a4354aa729d2.exe 2004 b11dd44bec07c34613666cae9264273d6b1f66bf37e8f21d8d18a4354aa729d2.exe 2004 b11dd44bec07c34613666cae9264273d6b1f66bf37e8f21d8d18a4354aa729d2.exe 2004 b11dd44bec07c34613666cae9264273d6b1f66bf37e8f21d8d18a4354aa729d2.exe 2004 b11dd44bec07c34613666cae9264273d6b1f66bf37e8f21d8d18a4354aa729d2.exe 2004 b11dd44bec07c34613666cae9264273d6b1f66bf37e8f21d8d18a4354aa729d2.exe 2004 b11dd44bec07c34613666cae9264273d6b1f66bf37e8f21d8d18a4354aa729d2.exe 2004 b11dd44bec07c34613666cae9264273d6b1f66bf37e8f21d8d18a4354aa729d2.exe 2004 b11dd44bec07c34613666cae9264273d6b1f66bf37e8f21d8d18a4354aa729d2.exe 2004 b11dd44bec07c34613666cae9264273d6b1f66bf37e8f21d8d18a4354aa729d2.exe 2004 b11dd44bec07c34613666cae9264273d6b1f66bf37e8f21d8d18a4354aa729d2.exe 2004 b11dd44bec07c34613666cae9264273d6b1f66bf37e8f21d8d18a4354aa729d2.exe 2004 b11dd44bec07c34613666cae9264273d6b1f66bf37e8f21d8d18a4354aa729d2.exe 2004 b11dd44bec07c34613666cae9264273d6b1f66bf37e8f21d8d18a4354aa729d2.exe 2004 b11dd44bec07c34613666cae9264273d6b1f66bf37e8f21d8d18a4354aa729d2.exe 2004 b11dd44bec07c34613666cae9264273d6b1f66bf37e8f21d8d18a4354aa729d2.exe 2004 b11dd44bec07c34613666cae9264273d6b1f66bf37e8f21d8d18a4354aa729d2.exe 2004 b11dd44bec07c34613666cae9264273d6b1f66bf37e8f21d8d18a4354aa729d2.exe 2004 b11dd44bec07c34613666cae9264273d6b1f66bf37e8f21d8d18a4354aa729d2.exe 2004 b11dd44bec07c34613666cae9264273d6b1f66bf37e8f21d8d18a4354aa729d2.exe 2004 b11dd44bec07c34613666cae9264273d6b1f66bf37e8f21d8d18a4354aa729d2.exe 2004 b11dd44bec07c34613666cae9264273d6b1f66bf37e8f21d8d18a4354aa729d2.exe 2004 b11dd44bec07c34613666cae9264273d6b1f66bf37e8f21d8d18a4354aa729d2.exe 2004 b11dd44bec07c34613666cae9264273d6b1f66bf37e8f21d8d18a4354aa729d2.exe 2004 b11dd44bec07c34613666cae9264273d6b1f66bf37e8f21d8d18a4354aa729d2.exe 2004 b11dd44bec07c34613666cae9264273d6b1f66bf37e8f21d8d18a4354aa729d2.exe 2004 b11dd44bec07c34613666cae9264273d6b1f66bf37e8f21d8d18a4354aa729d2.exe 2004 b11dd44bec07c34613666cae9264273d6b1f66bf37e8f21d8d18a4354aa729d2.exe 2004 b11dd44bec07c34613666cae9264273d6b1f66bf37e8f21d8d18a4354aa729d2.exe 2004 b11dd44bec07c34613666cae9264273d6b1f66bf37e8f21d8d18a4354aa729d2.exe 2004 b11dd44bec07c34613666cae9264273d6b1f66bf37e8f21d8d18a4354aa729d2.exe 2004 b11dd44bec07c34613666cae9264273d6b1f66bf37e8f21d8d18a4354aa729d2.exe 2004 b11dd44bec07c34613666cae9264273d6b1f66bf37e8f21d8d18a4354aa729d2.exe 2004 b11dd44bec07c34613666cae9264273d6b1f66bf37e8f21d8d18a4354aa729d2.exe 2004 b11dd44bec07c34613666cae9264273d6b1f66bf37e8f21d8d18a4354aa729d2.exe 2004 b11dd44bec07c34613666cae9264273d6b1f66bf37e8f21d8d18a4354aa729d2.exe 2004 b11dd44bec07c34613666cae9264273d6b1f66bf37e8f21d8d18a4354aa729d2.exe 2004 b11dd44bec07c34613666cae9264273d6b1f66bf37e8f21d8d18a4354aa729d2.exe 2004 b11dd44bec07c34613666cae9264273d6b1f66bf37e8f21d8d18a4354aa729d2.exe 2004 b11dd44bec07c34613666cae9264273d6b1f66bf37e8f21d8d18a4354aa729d2.exe 2004 b11dd44bec07c34613666cae9264273d6b1f66bf37e8f21d8d18a4354aa729d2.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 400 firefox.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2004 wrote to memory of 3360 2004 b11dd44bec07c34613666cae9264273d6b1f66bf37e8f21d8d18a4354aa729d2.exe 85 PID 2004 wrote to memory of 3360 2004 b11dd44bec07c34613666cae9264273d6b1f66bf37e8f21d8d18a4354aa729d2.exe 85 PID 3360 wrote to memory of 400 3360 firefox.exe 87 PID 3360 wrote to memory of 400 3360 firefox.exe 87 PID 3360 wrote to memory of 400 3360 firefox.exe 87 PID 3360 wrote to memory of 400 3360 firefox.exe 87 PID 3360 wrote to memory of 400 3360 firefox.exe 87 PID 3360 wrote to memory of 400 3360 firefox.exe 87 PID 3360 wrote to memory of 400 3360 firefox.exe 87 PID 3360 wrote to memory of 400 3360 firefox.exe 87 PID 3360 wrote to memory of 400 3360 firefox.exe 87 PID 3360 wrote to memory of 400 3360 firefox.exe 87 PID 3360 wrote to memory of 400 3360 firefox.exe 87 PID 400 wrote to memory of 1804 400 firefox.exe 88 PID 400 wrote to memory of 1804 400 firefox.exe 88 PID 400 wrote to memory of 1804 400 firefox.exe 88 PID 400 wrote to memory of 1804 400 firefox.exe 88 PID 400 wrote to memory of 1804 400 firefox.exe 88 PID 400 wrote to memory of 1804 400 firefox.exe 88 PID 400 wrote to memory of 1804 400 firefox.exe 88 PID 400 wrote to memory of 1804 400 firefox.exe 88 PID 400 wrote to memory of 1804 400 firefox.exe 88 PID 400 wrote to memory of 1804 400 firefox.exe 88 PID 400 wrote to memory of 1804 400 firefox.exe 88 PID 400 wrote to memory of 1804 400 firefox.exe 88 PID 400 wrote to memory of 1804 400 firefox.exe 88 PID 400 wrote to memory of 1804 400 firefox.exe 88 PID 400 wrote to memory of 1804 400 firefox.exe 88 PID 400 wrote to memory of 1804 400 firefox.exe 88 PID 400 wrote to memory of 1804 400 firefox.exe 88 PID 400 wrote to memory of 1804 400 firefox.exe 88 PID 400 wrote to memory of 1804 400 firefox.exe 88 PID 400 wrote to memory of 1804 400 firefox.exe 88 PID 400 wrote to memory of 1804 400 firefox.exe 88 PID 400 wrote to memory of 1804 400 firefox.exe 88 PID 400 wrote to memory of 1804 400 firefox.exe 88 PID 400 wrote to memory of 1804 400 firefox.exe 88 PID 400 wrote to memory of 1804 400 firefox.exe 88 PID 400 wrote to memory of 1804 400 firefox.exe 88 PID 400 wrote to memory of 1804 400 firefox.exe 88 PID 400 wrote to memory of 1804 400 firefox.exe 88 PID 400 wrote to memory of 1804 400 firefox.exe 88 PID 400 wrote to memory of 1804 400 firefox.exe 88 PID 400 wrote to memory of 1804 400 firefox.exe 88 PID 400 wrote to memory of 1804 400 firefox.exe 88 PID 400 wrote to memory of 1804 400 firefox.exe 88 PID 400 wrote to memory of 1804 400 firefox.exe 88 PID 400 wrote to memory of 1804 400 firefox.exe 88 PID 400 wrote to memory of 1804 400 firefox.exe 88 PID 400 wrote to memory of 1804 400 firefox.exe 88 PID 400 wrote to memory of 1804 400 firefox.exe 88 PID 400 wrote to memory of 1804 400 firefox.exe 88 PID 400 wrote to memory of 1804 400 firefox.exe 88 PID 400 wrote to memory of 1804 400 firefox.exe 88 PID 400 wrote to memory of 1804 400 firefox.exe 88 PID 400 wrote to memory of 1804 400 firefox.exe 88 PID 400 wrote to memory of 220 400 firefox.exe 89 PID 400 wrote to memory of 220 400 firefox.exe 89 PID 400 wrote to memory of 220 400 firefox.exe 89 PID 400 wrote to memory of 220 400 firefox.exe 89 PID 400 wrote to memory of 220 400 firefox.exe 89 PID 400 wrote to memory of 220 400 firefox.exe 89 PID 400 wrote to memory of 220 400 firefox.exe 89 PID 400 wrote to memory of 220 400 firefox.exe 89 -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
Processes
-
C:\Users\Admin\AppData\Local\Temp\b11dd44bec07c34613666cae9264273d6b1f66bf37e8f21d8d18a4354aa729d2.exe"C:\Users\Admin\AppData\Local\Temp\b11dd44bec07c34613666cae9264273d6b1f66bf37e8f21d8d18a4354aa729d2.exe"1⤵
- Checks computer location settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:2004 -
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" https://www.youtube.com/account2⤵
- Suspicious use of WriteProcessMemory
PID:3360 -
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" https://www.youtube.com/account3⤵
- Checks processor information in registry
- Modifies registry class
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:400 -
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel="400.0.1296582547\222892157" -parentBuildID 20230214051806 -prefsHandle 1792 -prefMapHandle 1784 -prefsLen 22076 -prefMapSize 235121 -appDir "C:\Program Files\Mozilla Firefox\browser" - {b22633ed-58bd-4658-a94f-0a2688333f07} 400 "\\.\pipe\gecko-crash-server-pipe.400" 1884 1a7aa4b5e58 gpu4⤵PID:1804
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel="400.1.2054640430\1946799592" -parentBuildID 20230214051806 -prefsHandle 2456 -prefMapHandle 2452 -prefsLen 22927 -prefMapSize 235121 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {55395104-8bbc-4c34-b245-bbfb2578ae6b} 400 "\\.\pipe\gecko-crash-server-pipe.400" 2476 1a79d689f58 socket4⤵PID:220
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel="400.2.1189683224\309770226" -childID 1 -isForBrowser -prefsHandle 3048 -prefMapHandle 3044 -prefsLen 23030 -prefMapSize 235121 -jsInitHandle 1308 -jsInitLen 246560 -a11yResourceId 64 -parentBuildID 20230214051806 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {7724114f-462a-4bfd-ab0e-9cae3652e00a} 400 "\\.\pipe\gecko-crash-server-pipe.400" 3060 1a7ad23c758 tab4⤵PID:4392
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel="400.3.1267320079\991310408" -childID 2 -isForBrowser -prefsHandle 3848 -prefMapHandle 1212 -prefsLen 27616 -prefMapSize 235121 -jsInitHandle 1308 -jsInitLen 246560 -a11yResourceId 64 -parentBuildID 20230214051806 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {342c739e-c387-4337-a60d-0a763648730a} 400 "\\.\pipe\gecko-crash-server-pipe.400" 3868 1a79d67ae58 tab4⤵PID:2052
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel="400.4.1117477396\1501562154" -childID 3 -isForBrowser -prefsHandle 5196 -prefMapHandle 5220 -prefsLen 27697 -prefMapSize 235121 -jsInitHandle 1308 -jsInitLen 246560 -a11yResourceId 64 -parentBuildID 20230214051806 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {1980897b-2928-405b-bc1a-7fedce919fa6} 400 "\\.\pipe\gecko-crash-server-pipe.400" 5248 1a7b114f358 tab4⤵PID:1840
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel="400.5.43842451\1722901513" -childID 4 -isForBrowser -prefsHandle 5468 -prefMapHandle 5464 -prefsLen 27697 -prefMapSize 235121 -jsInitHandle 1308 -jsInitLen 246560 -a11yResourceId 64 -parentBuildID 20230214051806 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {2ef1ff71-f895-45d7-88d4-014929b5bcd4} 400 "\\.\pipe\gecko-crash-server-pipe.400" 5384 1a7b114e158 tab4⤵PID:3148
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel="400.6.1145628822\1924659109" -childID 5 -isForBrowser -prefsHandle 5672 -prefMapHandle 5668 -prefsLen 27697 -prefMapSize 235121 -jsInitHandle 1308 -jsInitLen 246560 -a11yResourceId 64 -parentBuildID 20230214051806 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {4da0f12a-b8c9-45c5-a3ee-bec612928c1e} 400 "\\.\pipe\gecko-crash-server-pipe.400" 5596 1a7b1150258 tab4⤵PID:2756
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Local\Mozilla\Firefox\Profiles\vg8iw5f0.default-release\activity-stream.discovery_stream.json.tmp
Filesize25KB
MD590f2336c3471e22af9afff07c51e8b04
SHA1b583f4d509842318aaca8bc632981bd9075a0d5f
SHA2561114985770a2f94058a2ae3c4ce5fffbfa859c7a45bac9fbc2041fba0f39833c
SHA5126b4768b0f87195d0f97df508349df0ebaad73358e7276a7995b09f736b1210ae666ca11677553714de2d94e7e5f6e31d2540245ca060aa232b8c85fa9b32d64a
-
C:\Users\Admin\AppData\Local\Mozilla\Firefox\Profiles\vg8iw5f0.default-release\activity-stream.discovery_stream.json.tmp
Filesize27KB
MD5a389a5c0a4e22ff8365d0c9fe1da5cf4
SHA1598682134db7db094940dcd08a7249dd367f63d1
SHA256a29c4d9f4f8278af1b73ef6e554cbd251bbdfb38a10e43cf33641c25737b7681
SHA512c195ada40be0379d98f555fe81bcd0d8a69b08fea4e8ba0d0e51b800271d8fea638af4f1c0c4e836bb5eb60966de48a54c1b8f3971aa4891912bc4aad93cb3c2
-
C:\Users\Admin\AppData\Local\Mozilla\Firefox\Profiles\vg8iw5f0.default-release\cache2\entries\5CD1EBDF6B57F13C7E783CE5E6D8E9C44014FE1A
Filesize13KB
MD507fedfb5a227e7c94c66e9eaac751b6f
SHA1263bc001fa073ce58c81e235a3ddaf6a28abb291
SHA256b3343565a0af09c3aeb265640f8923341751363ac9e83acc4271eccfa1320569
SHA5125ef4f22af352c0226c0b2b1ad04442ab13ffad16c8b99107f710ffe47cb66104f675b38cd26c43e0657932b824275e52795c67976d5be60272e72a822cb5066f
-
Filesize
442KB
MD585430baed3398695717b0263807cf97c
SHA1fffbee923cea216f50fce5d54219a188a5100f41
SHA256a9f4281f82b3579581c389e8583dc9f477c7fd0e20c9dfc91a2e611e21e3407e
SHA51206511f1f6c6d44d076b3c593528c26a602348d9c41689dbf5ff716b671c3ca5756b12cb2e5869f836dedce27b1a5cfe79b93c707fd01f8e84b620923bb61b5f1
-
Filesize
8.0MB
MD5a01c5ecd6108350ae23d2cddf0e77c17
SHA1c6ac28a2cd979f1f9a75d56271821d5ff665e2b6
SHA256345d44e3aa3e1967d186a43d732c8051235c43458169a5d7d371780a6475ee42
SHA512b046dd1b26ec0b810ee441b7ad4dc135e3f1521a817b9f3db60a32976352e8f7e53920e1a77fc5b4130aac260d79deef7e823267b4414e9cc774d8bffca56a72
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\vg8iw5f0.default-release\gmp-gmpopenh264\1.8.1.2\gmpopenh264.dll
Filesize997KB
MD5fe3355639648c417e8307c6d051e3e37
SHA1f54602d4b4778da21bc97c7238fc66aa68c8ee34
SHA2561ed7877024be63a049da98733fd282c16bd620530a4fb580dacec3a78ace914e
SHA5128f4030bb2464b98eccbea6f06eb186d7216932702d94f6b84c56419e9cf65a18309711ab342d1513bf85aed402bc3535a70db4395874828f0d35c278dd2eac9c
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\vg8iw5f0.default-release\gmp-gmpopenh264\1.8.1.2\gmpopenh264.info
Filesize116B
MD53d33cdc0b3d281e67dd52e14435dd04f
SHA14db88689282fd4f9e9e6ab95fcbb23df6e6485db
SHA256f526e9f98841d987606efeaff7f3e017ba9fd516c4be83890c7f9a093ea4c47b
SHA512a4a96743332cc8ef0f86bc2e6122618bfc75ed46781dadbac9e580cd73df89e74738638a2cccb4caa4cbbf393d771d7f2c73f825737cdb247362450a0d4a4bc1
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\vg8iw5f0.default-release\gmp-widevinecdm\4.10.2557.0\LICENSE.txt
Filesize479B
MD549ddb419d96dceb9069018535fb2e2fc
SHA162aa6fea895a8b68d468a015f6e6ab400d7a7ca6
SHA2562af127b4e00f7303de8271996c0c681063e4dc7abdc7b2a8c3fe5932b9352539
SHA51248386217dabf7556e381ab3f5924b123a0a525969ff98f91efb03b65477c94e48a15d9abcec116b54616d36ad52b6f1d7b8b84c49c204e1b9b43f26f2af92da2
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\vg8iw5f0.default-release\gmp-widevinecdm\4.10.2557.0\manifest.json
Filesize372B
MD58be33af717bb1b67fbd61c3f4b807e9e
SHA17cf17656d174d951957ff36810e874a134dd49e0
SHA256e92d3394635edfb987a7528e0ccd24360e07a299078df2a6967ca3aae22fa2dd
SHA5126125f60418e25fee896bf59f5672945cd8f36f03665c721837bb50adf5b4dfef2dddbfcfc817555027dcfa90e1ef2a1e80af1219e8063629ea70263d2fc936a7
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\vg8iw5f0.default-release\gmp-widevinecdm\4.10.2557.0\widevinecdm.dll
Filesize11.8MB
MD533bf7b0439480effb9fb212efce87b13
SHA1cee50f2745edc6dc291887b6075ca64d716f495a
SHA2568ee42d9258e20bbc5bfdfae61605429beb5421ffeaaa0d02b86d4978f4b4ac4e
SHA512d329a1a1d98e302142f2776de8cc2cd45a465d77cb21c461bdf5ee58c68073a715519f449cb673977288fe18401a0abcce636c85abaec61a4a7a08a16c924275
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\vg8iw5f0.default-release\gmp-widevinecdm\4.10.2557.0\widevinecdm.dll.lib
Filesize1KB
MD5688bed3676d2104e7f17ae1cd2c59404
SHA1952b2cdf783ac72fcb98338723e9afd38d47ad8e
SHA25633899a3ebc22cb8ed8de7bd48c1c29486c0279b06d7ef98241c92aef4e3b9237
SHA5127a0e3791f75c229af79dd302f7d0594279f664886fea228cfe78e24ef185ae63aba809aa1036feb3130066deadc8e78909c277f0a7ed1e3485df3cf2cd329776
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\vg8iw5f0.default-release\gmp-widevinecdm\4.10.2557.0\widevinecdm.dll.sig
Filesize1KB
MD5937326fead5fd401f6cca9118bd9ade9
SHA14526a57d4ae14ed29b37632c72aef3c408189d91
SHA25668a03f075db104f84afdd8fca45a7e4bff7b55dc1a2a24272b3abe16d8759c81
SHA512b232f6cf3f88adb346281167ac714c4c4c7aac15175087c336911946d12d63d3a3a458e06b298b41a7ec582ef09fe238da3a3166ff89c450117228f7485c22d2
-
Filesize
8KB
MD500009503129c23c10c77d1d8fb8af7d1
SHA1649247670c54434c1488cf9e1bed27ffd1bdb106
SHA256b72300e90c87df3f295a9caaba4f21bab928df0e7147e77aca980b4f617adce3
SHA5122f16cc29ffb47315467afd01fceaf107176411aacc10556e1b9e469128b408b9507f6cf75dd6f7b28c6a3787b138f4970844513b55ea806745a6c94d97e4ceca
-
Filesize
10KB
MD58b26d4b2308567db17ba4ed7d17aaa35
SHA1eae5e1d185f334dd9b6c71889f4e859e7321d082
SHA2563794ccd1e7be37358961c7280fd0a57f7dd9788d05f883d3f69deb070eb06f7a
SHA5123029e73b4ef20b6f7e72fdfd7706fb04f0de6ef867847185448f60a2a9f7358721cc9b5cfd267438e260f2d4fc56279966db18fd0ce75f828ab63aad7c75128e
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\vg8iw5f0.default-release\sessionstore-backups\recovery.jsonlz4
Filesize4KB
MD558f3f16715784e11b4abcf92c0e751e4
SHA158bc4fceb656eaf9a503fe8330cccf0f7be5bdc2
SHA256ff7c2e19e73d9d36363690fb7d73e2761d23c095a0f3cde7d37faf97187bdeb9
SHA512011ff8c270e838ac1aad68b2129db1dd5e95adf92e665b57147541eb2e4f0970c5bd1cfbb578b6c6d8dd663a30baa24e54478e861296784324dde74b862a17c8
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\vg8iw5f0.default-release\storage\permanent\chrome\idb\3870112724rsegmnoittet-es.sqlite
Filesize200KB
MD53b85bc9f9a55bbe01969e11127148dd7
SHA1db051a8aa09fb1debdbf205129844a51f8ff551f
SHA2569ed9924e243cb1abd8a3fc5c4e50f5ac7e7daa0c5189eb4522f3ecc611d9b856
SHA5123749fa19af267de8ea01a846b03e2ad747bc57ec5545a0b1009ba70745319afd41baeeb706e9ec0bceacca23711c28ceb329a78bd41ad032b01d82520674e9e8