Analysis
-
max time kernel
149s -
max time network
153s -
platform
windows11-21h2_x64 -
resource
win11-20240704-en -
resource tags
arch:x64arch:x86image:win11-20240704-enlocale:en-usos:windows11-21h2-x64system -
submitted
05-07-2024 22:57
Static task
static1
Behavioral task
behavioral1
Sample
b11dd44bec07c34613666cae9264273d6b1f66bf37e8f21d8d18a4354aa729d2.exe
Resource
win10v2004-20240704-en
General
-
Target
b11dd44bec07c34613666cae9264273d6b1f66bf37e8f21d8d18a4354aa729d2.exe
-
Size
1.2MB
-
MD5
a1afcaad0b50c963ffe0a870cbe404be
-
SHA1
0f24f94384053b3f7036ce71421ec93bbfbbfd97
-
SHA256
b11dd44bec07c34613666cae9264273d6b1f66bf37e8f21d8d18a4354aa729d2
-
SHA512
17ca8eadfd11576c22a98fa3cb8f38dffc1c4d2f418cf283469febb2f7594a2d0279b99048c4f58753372fb2e4dcd1f199c65ce8d23504713a4f911d1a18310b
-
SSDEEP
24576:bqDEvCTbMWu7rQYlBQcBiT6rprG8aRq2Sbly7TWEPjg:bTvC/MTQYxsWR7aRq2dW
Malware Config
Signatures
-
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Checks processor information in registry 2 TTPs 6 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Update Revision firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\VendorIdentifier firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~Mhz firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString firefox.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Update Signature firefox.exe -
Modifies registry class 1 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2133704870-72480668-1360283475-1000_Classes\Local Settings firefox.exe -
Suspicious use of AdjustPrivilegeToken 5 IoCs
description pid Process Token: SeDebugPrivilege 3052 firefox.exe Token: SeDebugPrivilege 3052 firefox.exe Token: SeDebugPrivilege 3052 firefox.exe Token: SeDebugPrivilege 3052 firefox.exe Token: SeDebugPrivilege 3052 firefox.exe -
Suspicious use of FindShellTrayWindow 64 IoCs
pid Process 4764 b11dd44bec07c34613666cae9264273d6b1f66bf37e8f21d8d18a4354aa729d2.exe 4764 b11dd44bec07c34613666cae9264273d6b1f66bf37e8f21d8d18a4354aa729d2.exe 4764 b11dd44bec07c34613666cae9264273d6b1f66bf37e8f21d8d18a4354aa729d2.exe 4764 b11dd44bec07c34613666cae9264273d6b1f66bf37e8f21d8d18a4354aa729d2.exe 4764 b11dd44bec07c34613666cae9264273d6b1f66bf37e8f21d8d18a4354aa729d2.exe 4764 b11dd44bec07c34613666cae9264273d6b1f66bf37e8f21d8d18a4354aa729d2.exe 4764 b11dd44bec07c34613666cae9264273d6b1f66bf37e8f21d8d18a4354aa729d2.exe 3052 firefox.exe 3052 firefox.exe 3052 firefox.exe 3052 firefox.exe 4764 b11dd44bec07c34613666cae9264273d6b1f66bf37e8f21d8d18a4354aa729d2.exe 4764 b11dd44bec07c34613666cae9264273d6b1f66bf37e8f21d8d18a4354aa729d2.exe 4764 b11dd44bec07c34613666cae9264273d6b1f66bf37e8f21d8d18a4354aa729d2.exe 4764 b11dd44bec07c34613666cae9264273d6b1f66bf37e8f21d8d18a4354aa729d2.exe 4764 b11dd44bec07c34613666cae9264273d6b1f66bf37e8f21d8d18a4354aa729d2.exe 4764 b11dd44bec07c34613666cae9264273d6b1f66bf37e8f21d8d18a4354aa729d2.exe 4764 b11dd44bec07c34613666cae9264273d6b1f66bf37e8f21d8d18a4354aa729d2.exe 4764 b11dd44bec07c34613666cae9264273d6b1f66bf37e8f21d8d18a4354aa729d2.exe 4764 b11dd44bec07c34613666cae9264273d6b1f66bf37e8f21d8d18a4354aa729d2.exe 4764 b11dd44bec07c34613666cae9264273d6b1f66bf37e8f21d8d18a4354aa729d2.exe 4764 b11dd44bec07c34613666cae9264273d6b1f66bf37e8f21d8d18a4354aa729d2.exe 4764 b11dd44bec07c34613666cae9264273d6b1f66bf37e8f21d8d18a4354aa729d2.exe 4764 b11dd44bec07c34613666cae9264273d6b1f66bf37e8f21d8d18a4354aa729d2.exe 4764 b11dd44bec07c34613666cae9264273d6b1f66bf37e8f21d8d18a4354aa729d2.exe 4764 b11dd44bec07c34613666cae9264273d6b1f66bf37e8f21d8d18a4354aa729d2.exe 4764 b11dd44bec07c34613666cae9264273d6b1f66bf37e8f21d8d18a4354aa729d2.exe 4764 b11dd44bec07c34613666cae9264273d6b1f66bf37e8f21d8d18a4354aa729d2.exe 4764 b11dd44bec07c34613666cae9264273d6b1f66bf37e8f21d8d18a4354aa729d2.exe 4764 b11dd44bec07c34613666cae9264273d6b1f66bf37e8f21d8d18a4354aa729d2.exe 4764 b11dd44bec07c34613666cae9264273d6b1f66bf37e8f21d8d18a4354aa729d2.exe 4764 b11dd44bec07c34613666cae9264273d6b1f66bf37e8f21d8d18a4354aa729d2.exe 4764 b11dd44bec07c34613666cae9264273d6b1f66bf37e8f21d8d18a4354aa729d2.exe 4764 b11dd44bec07c34613666cae9264273d6b1f66bf37e8f21d8d18a4354aa729d2.exe 4764 b11dd44bec07c34613666cae9264273d6b1f66bf37e8f21d8d18a4354aa729d2.exe 4764 b11dd44bec07c34613666cae9264273d6b1f66bf37e8f21d8d18a4354aa729d2.exe 4764 b11dd44bec07c34613666cae9264273d6b1f66bf37e8f21d8d18a4354aa729d2.exe 4764 b11dd44bec07c34613666cae9264273d6b1f66bf37e8f21d8d18a4354aa729d2.exe 4764 b11dd44bec07c34613666cae9264273d6b1f66bf37e8f21d8d18a4354aa729d2.exe 4764 b11dd44bec07c34613666cae9264273d6b1f66bf37e8f21d8d18a4354aa729d2.exe 4764 b11dd44bec07c34613666cae9264273d6b1f66bf37e8f21d8d18a4354aa729d2.exe 4764 b11dd44bec07c34613666cae9264273d6b1f66bf37e8f21d8d18a4354aa729d2.exe 4764 b11dd44bec07c34613666cae9264273d6b1f66bf37e8f21d8d18a4354aa729d2.exe 4764 b11dd44bec07c34613666cae9264273d6b1f66bf37e8f21d8d18a4354aa729d2.exe 4764 b11dd44bec07c34613666cae9264273d6b1f66bf37e8f21d8d18a4354aa729d2.exe 4764 b11dd44bec07c34613666cae9264273d6b1f66bf37e8f21d8d18a4354aa729d2.exe 4764 b11dd44bec07c34613666cae9264273d6b1f66bf37e8f21d8d18a4354aa729d2.exe 4764 b11dd44bec07c34613666cae9264273d6b1f66bf37e8f21d8d18a4354aa729d2.exe 4764 b11dd44bec07c34613666cae9264273d6b1f66bf37e8f21d8d18a4354aa729d2.exe 4764 b11dd44bec07c34613666cae9264273d6b1f66bf37e8f21d8d18a4354aa729d2.exe 4764 b11dd44bec07c34613666cae9264273d6b1f66bf37e8f21d8d18a4354aa729d2.exe 4764 b11dd44bec07c34613666cae9264273d6b1f66bf37e8f21d8d18a4354aa729d2.exe 4764 b11dd44bec07c34613666cae9264273d6b1f66bf37e8f21d8d18a4354aa729d2.exe 4764 b11dd44bec07c34613666cae9264273d6b1f66bf37e8f21d8d18a4354aa729d2.exe 4764 b11dd44bec07c34613666cae9264273d6b1f66bf37e8f21d8d18a4354aa729d2.exe 4764 b11dd44bec07c34613666cae9264273d6b1f66bf37e8f21d8d18a4354aa729d2.exe 4764 b11dd44bec07c34613666cae9264273d6b1f66bf37e8f21d8d18a4354aa729d2.exe 4764 b11dd44bec07c34613666cae9264273d6b1f66bf37e8f21d8d18a4354aa729d2.exe 4764 b11dd44bec07c34613666cae9264273d6b1f66bf37e8f21d8d18a4354aa729d2.exe 4764 b11dd44bec07c34613666cae9264273d6b1f66bf37e8f21d8d18a4354aa729d2.exe 4764 b11dd44bec07c34613666cae9264273d6b1f66bf37e8f21d8d18a4354aa729d2.exe 4764 b11dd44bec07c34613666cae9264273d6b1f66bf37e8f21d8d18a4354aa729d2.exe 4764 b11dd44bec07c34613666cae9264273d6b1f66bf37e8f21d8d18a4354aa729d2.exe 4764 b11dd44bec07c34613666cae9264273d6b1f66bf37e8f21d8d18a4354aa729d2.exe -
Suspicious use of SendNotifyMessage 64 IoCs
pid Process 4764 b11dd44bec07c34613666cae9264273d6b1f66bf37e8f21d8d18a4354aa729d2.exe 4764 b11dd44bec07c34613666cae9264273d6b1f66bf37e8f21d8d18a4354aa729d2.exe 4764 b11dd44bec07c34613666cae9264273d6b1f66bf37e8f21d8d18a4354aa729d2.exe 4764 b11dd44bec07c34613666cae9264273d6b1f66bf37e8f21d8d18a4354aa729d2.exe 4764 b11dd44bec07c34613666cae9264273d6b1f66bf37e8f21d8d18a4354aa729d2.exe 4764 b11dd44bec07c34613666cae9264273d6b1f66bf37e8f21d8d18a4354aa729d2.exe 4764 b11dd44bec07c34613666cae9264273d6b1f66bf37e8f21d8d18a4354aa729d2.exe 3052 firefox.exe 3052 firefox.exe 3052 firefox.exe 4764 b11dd44bec07c34613666cae9264273d6b1f66bf37e8f21d8d18a4354aa729d2.exe 4764 b11dd44bec07c34613666cae9264273d6b1f66bf37e8f21d8d18a4354aa729d2.exe 4764 b11dd44bec07c34613666cae9264273d6b1f66bf37e8f21d8d18a4354aa729d2.exe 4764 b11dd44bec07c34613666cae9264273d6b1f66bf37e8f21d8d18a4354aa729d2.exe 4764 b11dd44bec07c34613666cae9264273d6b1f66bf37e8f21d8d18a4354aa729d2.exe 4764 b11dd44bec07c34613666cae9264273d6b1f66bf37e8f21d8d18a4354aa729d2.exe 4764 b11dd44bec07c34613666cae9264273d6b1f66bf37e8f21d8d18a4354aa729d2.exe 4764 b11dd44bec07c34613666cae9264273d6b1f66bf37e8f21d8d18a4354aa729d2.exe 4764 b11dd44bec07c34613666cae9264273d6b1f66bf37e8f21d8d18a4354aa729d2.exe 4764 b11dd44bec07c34613666cae9264273d6b1f66bf37e8f21d8d18a4354aa729d2.exe 4764 b11dd44bec07c34613666cae9264273d6b1f66bf37e8f21d8d18a4354aa729d2.exe 4764 b11dd44bec07c34613666cae9264273d6b1f66bf37e8f21d8d18a4354aa729d2.exe 4764 b11dd44bec07c34613666cae9264273d6b1f66bf37e8f21d8d18a4354aa729d2.exe 4764 b11dd44bec07c34613666cae9264273d6b1f66bf37e8f21d8d18a4354aa729d2.exe 4764 b11dd44bec07c34613666cae9264273d6b1f66bf37e8f21d8d18a4354aa729d2.exe 4764 b11dd44bec07c34613666cae9264273d6b1f66bf37e8f21d8d18a4354aa729d2.exe 4764 b11dd44bec07c34613666cae9264273d6b1f66bf37e8f21d8d18a4354aa729d2.exe 4764 b11dd44bec07c34613666cae9264273d6b1f66bf37e8f21d8d18a4354aa729d2.exe 4764 b11dd44bec07c34613666cae9264273d6b1f66bf37e8f21d8d18a4354aa729d2.exe 4764 b11dd44bec07c34613666cae9264273d6b1f66bf37e8f21d8d18a4354aa729d2.exe 4764 b11dd44bec07c34613666cae9264273d6b1f66bf37e8f21d8d18a4354aa729d2.exe 4764 b11dd44bec07c34613666cae9264273d6b1f66bf37e8f21d8d18a4354aa729d2.exe 4764 b11dd44bec07c34613666cae9264273d6b1f66bf37e8f21d8d18a4354aa729d2.exe 4764 b11dd44bec07c34613666cae9264273d6b1f66bf37e8f21d8d18a4354aa729d2.exe 4764 b11dd44bec07c34613666cae9264273d6b1f66bf37e8f21d8d18a4354aa729d2.exe 4764 b11dd44bec07c34613666cae9264273d6b1f66bf37e8f21d8d18a4354aa729d2.exe 4764 b11dd44bec07c34613666cae9264273d6b1f66bf37e8f21d8d18a4354aa729d2.exe 4764 b11dd44bec07c34613666cae9264273d6b1f66bf37e8f21d8d18a4354aa729d2.exe 4764 b11dd44bec07c34613666cae9264273d6b1f66bf37e8f21d8d18a4354aa729d2.exe 4764 b11dd44bec07c34613666cae9264273d6b1f66bf37e8f21d8d18a4354aa729d2.exe 4764 b11dd44bec07c34613666cae9264273d6b1f66bf37e8f21d8d18a4354aa729d2.exe 4764 b11dd44bec07c34613666cae9264273d6b1f66bf37e8f21d8d18a4354aa729d2.exe 4764 b11dd44bec07c34613666cae9264273d6b1f66bf37e8f21d8d18a4354aa729d2.exe 4764 b11dd44bec07c34613666cae9264273d6b1f66bf37e8f21d8d18a4354aa729d2.exe 4764 b11dd44bec07c34613666cae9264273d6b1f66bf37e8f21d8d18a4354aa729d2.exe 4764 b11dd44bec07c34613666cae9264273d6b1f66bf37e8f21d8d18a4354aa729d2.exe 4764 b11dd44bec07c34613666cae9264273d6b1f66bf37e8f21d8d18a4354aa729d2.exe 4764 b11dd44bec07c34613666cae9264273d6b1f66bf37e8f21d8d18a4354aa729d2.exe 4764 b11dd44bec07c34613666cae9264273d6b1f66bf37e8f21d8d18a4354aa729d2.exe 4764 b11dd44bec07c34613666cae9264273d6b1f66bf37e8f21d8d18a4354aa729d2.exe 4764 b11dd44bec07c34613666cae9264273d6b1f66bf37e8f21d8d18a4354aa729d2.exe 4764 b11dd44bec07c34613666cae9264273d6b1f66bf37e8f21d8d18a4354aa729d2.exe 4764 b11dd44bec07c34613666cae9264273d6b1f66bf37e8f21d8d18a4354aa729d2.exe 4764 b11dd44bec07c34613666cae9264273d6b1f66bf37e8f21d8d18a4354aa729d2.exe 4764 b11dd44bec07c34613666cae9264273d6b1f66bf37e8f21d8d18a4354aa729d2.exe 4764 b11dd44bec07c34613666cae9264273d6b1f66bf37e8f21d8d18a4354aa729d2.exe 4764 b11dd44bec07c34613666cae9264273d6b1f66bf37e8f21d8d18a4354aa729d2.exe 4764 b11dd44bec07c34613666cae9264273d6b1f66bf37e8f21d8d18a4354aa729d2.exe 4764 b11dd44bec07c34613666cae9264273d6b1f66bf37e8f21d8d18a4354aa729d2.exe 4764 b11dd44bec07c34613666cae9264273d6b1f66bf37e8f21d8d18a4354aa729d2.exe 4764 b11dd44bec07c34613666cae9264273d6b1f66bf37e8f21d8d18a4354aa729d2.exe 4764 b11dd44bec07c34613666cae9264273d6b1f66bf37e8f21d8d18a4354aa729d2.exe 4764 b11dd44bec07c34613666cae9264273d6b1f66bf37e8f21d8d18a4354aa729d2.exe 4764 b11dd44bec07c34613666cae9264273d6b1f66bf37e8f21d8d18a4354aa729d2.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 3052 firefox.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 4764 wrote to memory of 2740 4764 b11dd44bec07c34613666cae9264273d6b1f66bf37e8f21d8d18a4354aa729d2.exe 82 PID 4764 wrote to memory of 2740 4764 b11dd44bec07c34613666cae9264273d6b1f66bf37e8f21d8d18a4354aa729d2.exe 82 PID 2740 wrote to memory of 3052 2740 firefox.exe 85 PID 2740 wrote to memory of 3052 2740 firefox.exe 85 PID 2740 wrote to memory of 3052 2740 firefox.exe 85 PID 2740 wrote to memory of 3052 2740 firefox.exe 85 PID 2740 wrote to memory of 3052 2740 firefox.exe 85 PID 2740 wrote to memory of 3052 2740 firefox.exe 85 PID 2740 wrote to memory of 3052 2740 firefox.exe 85 PID 2740 wrote to memory of 3052 2740 firefox.exe 85 PID 2740 wrote to memory of 3052 2740 firefox.exe 85 PID 2740 wrote to memory of 3052 2740 firefox.exe 85 PID 2740 wrote to memory of 3052 2740 firefox.exe 85 PID 3052 wrote to memory of 4580 3052 firefox.exe 86 PID 3052 wrote to memory of 4580 3052 firefox.exe 86 PID 3052 wrote to memory of 4580 3052 firefox.exe 86 PID 3052 wrote to memory of 4580 3052 firefox.exe 86 PID 3052 wrote to memory of 4580 3052 firefox.exe 86 PID 3052 wrote to memory of 4580 3052 firefox.exe 86 PID 3052 wrote to memory of 4580 3052 firefox.exe 86 PID 3052 wrote to memory of 4580 3052 firefox.exe 86 PID 3052 wrote to memory of 4580 3052 firefox.exe 86 PID 3052 wrote to memory of 4580 3052 firefox.exe 86 PID 3052 wrote to memory of 4580 3052 firefox.exe 86 PID 3052 wrote to memory of 4580 3052 firefox.exe 86 PID 3052 wrote to memory of 4580 3052 firefox.exe 86 PID 3052 wrote to memory of 4580 3052 firefox.exe 86 PID 3052 wrote to memory of 4580 3052 firefox.exe 86 PID 3052 wrote to memory of 4580 3052 firefox.exe 86 PID 3052 wrote to memory of 4580 3052 firefox.exe 86 PID 3052 wrote to memory of 4580 3052 firefox.exe 86 PID 3052 wrote to memory of 4580 3052 firefox.exe 86 PID 3052 wrote to memory of 4580 3052 firefox.exe 86 PID 3052 wrote to memory of 4580 3052 firefox.exe 86 PID 3052 wrote to memory of 4580 3052 firefox.exe 86 PID 3052 wrote to memory of 4580 3052 firefox.exe 86 PID 3052 wrote to memory of 4580 3052 firefox.exe 86 PID 3052 wrote to memory of 4580 3052 firefox.exe 86 PID 3052 wrote to memory of 4580 3052 firefox.exe 86 PID 3052 wrote to memory of 4580 3052 firefox.exe 86 PID 3052 wrote to memory of 4580 3052 firefox.exe 86 PID 3052 wrote to memory of 4580 3052 firefox.exe 86 PID 3052 wrote to memory of 4580 3052 firefox.exe 86 PID 3052 wrote to memory of 4580 3052 firefox.exe 86 PID 3052 wrote to memory of 4580 3052 firefox.exe 86 PID 3052 wrote to memory of 4580 3052 firefox.exe 86 PID 3052 wrote to memory of 4580 3052 firefox.exe 86 PID 3052 wrote to memory of 4580 3052 firefox.exe 86 PID 3052 wrote to memory of 4580 3052 firefox.exe 86 PID 3052 wrote to memory of 4580 3052 firefox.exe 86 PID 3052 wrote to memory of 4580 3052 firefox.exe 86 PID 3052 wrote to memory of 4580 3052 firefox.exe 86 PID 3052 wrote to memory of 4580 3052 firefox.exe 86 PID 3052 wrote to memory of 4580 3052 firefox.exe 86 PID 3052 wrote to memory of 4580 3052 firefox.exe 86 PID 3052 wrote to memory of 4580 3052 firefox.exe 86 PID 3052 wrote to memory of 2896 3052 firefox.exe 87 PID 3052 wrote to memory of 2896 3052 firefox.exe 87 PID 3052 wrote to memory of 2896 3052 firefox.exe 87 PID 3052 wrote to memory of 2896 3052 firefox.exe 87 PID 3052 wrote to memory of 2896 3052 firefox.exe 87 PID 3052 wrote to memory of 2896 3052 firefox.exe 87 PID 3052 wrote to memory of 2896 3052 firefox.exe 87 PID 3052 wrote to memory of 2896 3052 firefox.exe 87 -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
Processes
-
C:\Users\Admin\AppData\Local\Temp\b11dd44bec07c34613666cae9264273d6b1f66bf37e8f21d8d18a4354aa729d2.exe"C:\Users\Admin\AppData\Local\Temp\b11dd44bec07c34613666cae9264273d6b1f66bf37e8f21d8d18a4354aa729d2.exe"1⤵
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:4764 -
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" https://www.youtube.com/account2⤵
- Suspicious use of WriteProcessMemory
PID:2740 -
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" https://www.youtube.com/account3⤵
- Checks processor information in registry
- Modifies registry class
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:3052 -
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel="3052.0.1256512671\221126012" -parentBuildID 20230214051806 -prefsHandle 1756 -prefMapHandle 1748 -prefsLen 22074 -prefMapSize 235121 -appDir "C:\Program Files\Mozilla Firefox\browser" - {0c3f5907-59e4-487a-bcac-91538cc8dae1} 3052 "\\.\pipe\gecko-crash-server-pipe.3052" 1848 17f3250e658 gpu4⤵PID:4580
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel="3052.1.293506302\628864248" -parentBuildID 20230214051806 -prefsHandle 2428 -prefMapHandle 2424 -prefsLen 22925 -prefMapSize 235121 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {9597dcd4-e537-49e3-8b77-c21a75f7a859} 3052 "\\.\pipe\gecko-crash-server-pipe.3052" 2440 17f25785958 socket4⤵PID:2896
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel="3052.2.860447717\1992746345" -childID 1 -isForBrowser -prefsHandle 2924 -prefMapHandle 2920 -prefsLen 22963 -prefMapSize 235121 -jsInitHandle 936 -jsInitLen 246560 -a11yResourceId 64 -parentBuildID 20230214051806 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {8c5eb199-4fe3-4083-a770-d082874491f7} 3052 "\\.\pipe\gecko-crash-server-pipe.3052" 2948 17f34f4f258 tab4⤵PID:4948
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel="3052.3.2011085812\607815504" -childID 2 -isForBrowser -prefsHandle 3636 -prefMapHandle 3632 -prefsLen 27614 -prefMapSize 235121 -jsInitHandle 936 -jsInitLen 246560 -a11yResourceId 64 -parentBuildID 20230214051806 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {93e3335e-59f4-4305-b969-f6eb7c713d4b} 3052 "\\.\pipe\gecko-crash-server-pipe.3052" 3648 17f37ee1b58 tab4⤵PID:2704
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel="3052.4.1540784826\1672680671" -childID 3 -isForBrowser -prefsHandle 5320 -prefMapHandle 5168 -prefsLen 27695 -prefMapSize 235121 -jsInitHandle 936 -jsInitLen 246560 -a11yResourceId 64 -parentBuildID 20230214051806 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {f5dcb019-e840-4a40-983c-ca5b69a923d9} 3052 "\\.\pipe\gecko-crash-server-pipe.3052" 5324 17f36c79b58 tab4⤵PID:4880
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel="3052.5.94481025\1718910084" -childID 4 -isForBrowser -prefsHandle 5508 -prefMapHandle 5512 -prefsLen 27695 -prefMapSize 235121 -jsInitHandle 936 -jsInitLen 246560 -a11yResourceId 64 -parentBuildID 20230214051806 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {ded09dd5-fd9c-4061-9c20-aac44e16ddfa} 3052 "\\.\pipe\gecko-crash-server-pipe.3052" 5500 17f36e78d58 tab4⤵PID:2844
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel="3052.6.886823314\661819047" -childID 5 -isForBrowser -prefsHandle 5700 -prefMapHandle 5704 -prefsLen 27695 -prefMapSize 235121 -jsInitHandle 936 -jsInitLen 246560 -a11yResourceId 64 -parentBuildID 20230214051806 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {c36491f8-cff4-4208-9adc-ef91885f0869} 3052 "\\.\pipe\gecko-crash-server-pipe.3052" 5688 17f36e7a858 tab4⤵PID:1256
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Local\Mozilla\Firefox\Profiles\b5ssbkd8.default-release\activity-stream.discovery_stream.json.tmp
Filesize22KB
MD5fab909a30c2484fe6d5913ec3ebe3eac
SHA1852c36206662c34c8db043724cb76f2dc9577ade
SHA25660a5fca37f075dc731ac318c315c9662643ba9adb5fb610bd206324cf3507390
SHA512f570707cbefbd1147fcbfa14b50acf553036efd2ef36b0642ab1446ef88f1ee844a3ac2baecd80e37a96e0d0a0eb118c0abf333f6d0f7e6c31d587be25dcd8d3
-
C:\Users\Admin\AppData\Local\Mozilla\Firefox\Profiles\b5ssbkd8.default-release\activity-stream.discovery_stream.json.tmp
Filesize24KB
MD56771c29460aced4e4b5998b93eacc68e
SHA1456868218e54f9609bd67314057688bc85bba51f
SHA2566eca5124f8e93cb041c20c21356c568bc33eec4d80c4ff01b8416beabe1d6c2d
SHA51289cd338be5866e4a76950c32d50fbd1c7820a7d99a0ca04a7bb4ee6dec113519eaa9199d3b603d21d1fcec1c521d853be4b4b5eca36286b30d7cd3e1aa10157e
-
C:\Users\Admin\AppData\Local\Mozilla\Firefox\Profiles\b5ssbkd8.default-release\cache2\entries\5CD1EBDF6B57F13C7E783CE5E6D8E9C44014FE1A
Filesize13KB
MD5f2db0bb7becf4e3dcc0015c3562c12bf
SHA1cf50d9871ebe9bbc0ee49db650ca9c8df9e81395
SHA256d1c34f892c46a9407a349f743361a928f9e7b1dae5bf6c8a5b24690687b01b01
SHA512f8e3741b46bfe56c75aef647f835c78ce6d00a40e65725e23a40f5be9883c535ee047c6cc29282a9c266b94a931df7da2971eedbe1f069e0612bd1ecf721ae7b
-
Filesize
442KB
MD585430baed3398695717b0263807cf97c
SHA1fffbee923cea216f50fce5d54219a188a5100f41
SHA256a9f4281f82b3579581c389e8583dc9f477c7fd0e20c9dfc91a2e611e21e3407e
SHA51206511f1f6c6d44d076b3c593528c26a602348d9c41689dbf5ff716b671c3ca5756b12cb2e5869f836dedce27b1a5cfe79b93c707fd01f8e84b620923bb61b5f1
-
Filesize
8.0MB
MD5a01c5ecd6108350ae23d2cddf0e77c17
SHA1c6ac28a2cd979f1f9a75d56271821d5ff665e2b6
SHA256345d44e3aa3e1967d186a43d732c8051235c43458169a5d7d371780a6475ee42
SHA512b046dd1b26ec0b810ee441b7ad4dc135e3f1521a817b9f3db60a32976352e8f7e53920e1a77fc5b4130aac260d79deef7e823267b4414e9cc774d8bffca56a72
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\b5ssbkd8.default-release\gmp-gmpopenh264\1.8.1.2\gmpopenh264.dll
Filesize997KB
MD5fe3355639648c417e8307c6d051e3e37
SHA1f54602d4b4778da21bc97c7238fc66aa68c8ee34
SHA2561ed7877024be63a049da98733fd282c16bd620530a4fb580dacec3a78ace914e
SHA5128f4030bb2464b98eccbea6f06eb186d7216932702d94f6b84c56419e9cf65a18309711ab342d1513bf85aed402bc3535a70db4395874828f0d35c278dd2eac9c
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\b5ssbkd8.default-release\gmp-gmpopenh264\1.8.1.2\gmpopenh264.info
Filesize116B
MD53d33cdc0b3d281e67dd52e14435dd04f
SHA14db88689282fd4f9e9e6ab95fcbb23df6e6485db
SHA256f526e9f98841d987606efeaff7f3e017ba9fd516c4be83890c7f9a093ea4c47b
SHA512a4a96743332cc8ef0f86bc2e6122618bfc75ed46781dadbac9e580cd73df89e74738638a2cccb4caa4cbbf393d771d7f2c73f825737cdb247362450a0d4a4bc1
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\b5ssbkd8.default-release\gmp-widevinecdm\4.10.2557.0\LICENSE.txt
Filesize479B
MD549ddb419d96dceb9069018535fb2e2fc
SHA162aa6fea895a8b68d468a015f6e6ab400d7a7ca6
SHA2562af127b4e00f7303de8271996c0c681063e4dc7abdc7b2a8c3fe5932b9352539
SHA51248386217dabf7556e381ab3f5924b123a0a525969ff98f91efb03b65477c94e48a15d9abcec116b54616d36ad52b6f1d7b8b84c49c204e1b9b43f26f2af92da2
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\b5ssbkd8.default-release\gmp-widevinecdm\4.10.2557.0\manifest.json
Filesize372B
MD58be33af717bb1b67fbd61c3f4b807e9e
SHA17cf17656d174d951957ff36810e874a134dd49e0
SHA256e92d3394635edfb987a7528e0ccd24360e07a299078df2a6967ca3aae22fa2dd
SHA5126125f60418e25fee896bf59f5672945cd8f36f03665c721837bb50adf5b4dfef2dddbfcfc817555027dcfa90e1ef2a1e80af1219e8063629ea70263d2fc936a7
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\b5ssbkd8.default-release\gmp-widevinecdm\4.10.2557.0\widevinecdm.dll
Filesize11.8MB
MD533bf7b0439480effb9fb212efce87b13
SHA1cee50f2745edc6dc291887b6075ca64d716f495a
SHA2568ee42d9258e20bbc5bfdfae61605429beb5421ffeaaa0d02b86d4978f4b4ac4e
SHA512d329a1a1d98e302142f2776de8cc2cd45a465d77cb21c461bdf5ee58c68073a715519f449cb673977288fe18401a0abcce636c85abaec61a4a7a08a16c924275
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\b5ssbkd8.default-release\gmp-widevinecdm\4.10.2557.0\widevinecdm.dll.lib
Filesize1KB
MD5688bed3676d2104e7f17ae1cd2c59404
SHA1952b2cdf783ac72fcb98338723e9afd38d47ad8e
SHA25633899a3ebc22cb8ed8de7bd48c1c29486c0279b06d7ef98241c92aef4e3b9237
SHA5127a0e3791f75c229af79dd302f7d0594279f664886fea228cfe78e24ef185ae63aba809aa1036feb3130066deadc8e78909c277f0a7ed1e3485df3cf2cd329776
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\b5ssbkd8.default-release\gmp-widevinecdm\4.10.2557.0\widevinecdm.dll.sig
Filesize1KB
MD5937326fead5fd401f6cca9118bd9ade9
SHA14526a57d4ae14ed29b37632c72aef3c408189d91
SHA25668a03f075db104f84afdd8fca45a7e4bff7b55dc1a2a24272b3abe16d8759c81
SHA512b232f6cf3f88adb346281167ac714c4c4c7aac15175087c336911946d12d63d3a3a458e06b298b41a7ec582ef09fe238da3a3166ff89c450117228f7485c22d2
-
Filesize
10KB
MD5900da02e80d27e623c00fae9769b1899
SHA10ae0d8435d88a18f081b6833183cee776f0a3a52
SHA256eccbd54e90332a1bf806e719c7a8fd675489a1e2497a5eabaa0675cdfbfa2887
SHA51262647cf4408686ece25d3e29292116892727623bc418f0c14064c76d9db836c58c8b713918a9f8c1da5fc18330c4946d2daa5fcf495694d4fc773e11a2030571
-
Filesize
8KB
MD58bc97e5c60b1d7443d16f77bfd87e0ee
SHA1dfe41a5e995d31297d216ad48438ab000373b447
SHA256d017669c1c4e92f3b2c7d1b4251a58c7382b9ddc81589cd8dec8c8d470c1052b
SHA51256b4be0ca12d18867f21f33ee2e4db342c7f68efc5afd70182d39d4915beb4f352a0414be9c719021c2e36c0af8a7153daf4bbe4c799f40e1182b3082ba6041f
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\b5ssbkd8.default-release\sessionstore-backups\recovery.jsonlz4
Filesize4KB
MD53c877a12272139786fc24919b9ff60e5
SHA1b68c20b536bbdf6c5aba34fbf0688830c2e2106a
SHA2564e48f259d875ef5654c42372fec4e13aa251afbbfbdfbb696de50993691977da
SHA512b036d20d00125b295debab731a42d95c86788311e94e0827187544d3f0f8b6f62d4df81c51923d825559e7f8f0c453c367a89c06756a24abd95de74c7e575a95
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\b5ssbkd8.default-release\storage\permanent\chrome\idb\3870112724rsegmnoittet-es.sqlite
Filesize200KB
MD504a07ec644e9f67f7a4afc78f790f48e
SHA1e4ac698353bb7d18baa603dda4f984fcf651c2bc
SHA256881c08cd565e58a9efb5d23312a636ce9b09fcfba9ab743fd61ca51d1fdde8e3
SHA5123b2a430206aa5f48f5a56eba6e2c8d750fdbcd858f905dba75c9bd3100e5f84cf5c1b1a9cd46cc0ede8d0f5d756b8af1f8f1bc1ca885d3afb5468fcb6434c168