Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
149s -
max time network
153s -
platform
windows10-2004_x64 -
resource
win10v2004-20240709-en -
resource tags
arch:x64arch:x86image:win10v2004-20240709-enlocale:en-usos:windows10-2004-x64system -
submitted
22/07/2024, 11:00
Static task
static1
Behavioral task
behavioral1
Sample
e1ba7d54c2c166835918d5e7388945f6490d047c5f838c9ec153bcab5944977a.exe
Resource
win10v2004-20240709-en
Behavioral task
behavioral2
Sample
e1ba7d54c2c166835918d5e7388945f6490d047c5f838c9ec153bcab5944977a.exe
Resource
win11-20240709-en
General
-
Target
e1ba7d54c2c166835918d5e7388945f6490d047c5f838c9ec153bcab5944977a.exe
-
Size
1.2MB
-
MD5
38e7523eb5ba752ebb7fda106bf072b9
-
SHA1
23555ae6b6cf3e3def07b31ee313895e48ffd2f0
-
SHA256
e1ba7d54c2c166835918d5e7388945f6490d047c5f838c9ec153bcab5944977a
-
SHA512
77112aa14c6f1b96f164a4ad94e568f1cf6dad0a27b8795740c83997039a899b4eac2adc442ec7e1ca75595eded3c4b1c82ca87bbe7a0748db768637aeebc178
-
SSDEEP
24576:bqDEvCTbMWu7rQYlBQcBiT6rprG8aLx2Sbly7TWEPje:bTvC/MTQYxsWR7aLx2dW
Malware Config
Signatures
-
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-1176886754-713327781-2233697964-1000\Control Panel\International\Geo\Nation e1ba7d54c2c166835918d5e7388945f6490d047c5f838c9ec153bcab5944977a.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Checks processor information in registry 2 TTPs 8 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Update Signature firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Update Revision firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\VendorIdentifier firefox.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~Mhz firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~Mhz firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString firefox.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 firefox.exe -
Modifies registry class 1 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-1176886754-713327781-2233697964-1000_Classes\Local Settings firefox.exe -
Suspicious use of AdjustPrivilegeToken 5 IoCs
description pid Process Token: SeDebugPrivilege 3116 firefox.exe Token: SeDebugPrivilege 3116 firefox.exe Token: SeDebugPrivilege 3116 firefox.exe Token: SeDebugPrivilege 3116 firefox.exe Token: SeDebugPrivilege 3116 firefox.exe -
Suspicious use of FindShellTrayWindow 64 IoCs
pid Process 32 e1ba7d54c2c166835918d5e7388945f6490d047c5f838c9ec153bcab5944977a.exe 32 e1ba7d54c2c166835918d5e7388945f6490d047c5f838c9ec153bcab5944977a.exe 32 e1ba7d54c2c166835918d5e7388945f6490d047c5f838c9ec153bcab5944977a.exe 32 e1ba7d54c2c166835918d5e7388945f6490d047c5f838c9ec153bcab5944977a.exe 32 e1ba7d54c2c166835918d5e7388945f6490d047c5f838c9ec153bcab5944977a.exe 32 e1ba7d54c2c166835918d5e7388945f6490d047c5f838c9ec153bcab5944977a.exe 32 e1ba7d54c2c166835918d5e7388945f6490d047c5f838c9ec153bcab5944977a.exe 3116 firefox.exe 3116 firefox.exe 3116 firefox.exe 3116 firefox.exe 3116 firefox.exe 3116 firefox.exe 3116 firefox.exe 3116 firefox.exe 3116 firefox.exe 3116 firefox.exe 3116 firefox.exe 3116 firefox.exe 3116 firefox.exe 3116 firefox.exe 3116 firefox.exe 3116 firefox.exe 3116 firefox.exe 3116 firefox.exe 3116 firefox.exe 3116 firefox.exe 3116 firefox.exe 32 e1ba7d54c2c166835918d5e7388945f6490d047c5f838c9ec153bcab5944977a.exe 32 e1ba7d54c2c166835918d5e7388945f6490d047c5f838c9ec153bcab5944977a.exe 32 e1ba7d54c2c166835918d5e7388945f6490d047c5f838c9ec153bcab5944977a.exe 32 e1ba7d54c2c166835918d5e7388945f6490d047c5f838c9ec153bcab5944977a.exe 32 e1ba7d54c2c166835918d5e7388945f6490d047c5f838c9ec153bcab5944977a.exe 32 e1ba7d54c2c166835918d5e7388945f6490d047c5f838c9ec153bcab5944977a.exe 32 e1ba7d54c2c166835918d5e7388945f6490d047c5f838c9ec153bcab5944977a.exe 32 e1ba7d54c2c166835918d5e7388945f6490d047c5f838c9ec153bcab5944977a.exe 32 e1ba7d54c2c166835918d5e7388945f6490d047c5f838c9ec153bcab5944977a.exe 32 e1ba7d54c2c166835918d5e7388945f6490d047c5f838c9ec153bcab5944977a.exe 32 e1ba7d54c2c166835918d5e7388945f6490d047c5f838c9ec153bcab5944977a.exe 32 e1ba7d54c2c166835918d5e7388945f6490d047c5f838c9ec153bcab5944977a.exe 32 e1ba7d54c2c166835918d5e7388945f6490d047c5f838c9ec153bcab5944977a.exe 32 e1ba7d54c2c166835918d5e7388945f6490d047c5f838c9ec153bcab5944977a.exe 32 e1ba7d54c2c166835918d5e7388945f6490d047c5f838c9ec153bcab5944977a.exe 32 e1ba7d54c2c166835918d5e7388945f6490d047c5f838c9ec153bcab5944977a.exe 32 e1ba7d54c2c166835918d5e7388945f6490d047c5f838c9ec153bcab5944977a.exe 32 e1ba7d54c2c166835918d5e7388945f6490d047c5f838c9ec153bcab5944977a.exe 32 e1ba7d54c2c166835918d5e7388945f6490d047c5f838c9ec153bcab5944977a.exe 32 e1ba7d54c2c166835918d5e7388945f6490d047c5f838c9ec153bcab5944977a.exe 32 e1ba7d54c2c166835918d5e7388945f6490d047c5f838c9ec153bcab5944977a.exe 32 e1ba7d54c2c166835918d5e7388945f6490d047c5f838c9ec153bcab5944977a.exe 32 e1ba7d54c2c166835918d5e7388945f6490d047c5f838c9ec153bcab5944977a.exe 32 e1ba7d54c2c166835918d5e7388945f6490d047c5f838c9ec153bcab5944977a.exe 32 e1ba7d54c2c166835918d5e7388945f6490d047c5f838c9ec153bcab5944977a.exe 32 e1ba7d54c2c166835918d5e7388945f6490d047c5f838c9ec153bcab5944977a.exe 32 e1ba7d54c2c166835918d5e7388945f6490d047c5f838c9ec153bcab5944977a.exe 32 e1ba7d54c2c166835918d5e7388945f6490d047c5f838c9ec153bcab5944977a.exe 32 e1ba7d54c2c166835918d5e7388945f6490d047c5f838c9ec153bcab5944977a.exe 32 e1ba7d54c2c166835918d5e7388945f6490d047c5f838c9ec153bcab5944977a.exe 32 e1ba7d54c2c166835918d5e7388945f6490d047c5f838c9ec153bcab5944977a.exe 32 e1ba7d54c2c166835918d5e7388945f6490d047c5f838c9ec153bcab5944977a.exe 32 e1ba7d54c2c166835918d5e7388945f6490d047c5f838c9ec153bcab5944977a.exe 32 e1ba7d54c2c166835918d5e7388945f6490d047c5f838c9ec153bcab5944977a.exe 32 e1ba7d54c2c166835918d5e7388945f6490d047c5f838c9ec153bcab5944977a.exe 32 e1ba7d54c2c166835918d5e7388945f6490d047c5f838c9ec153bcab5944977a.exe -
Suspicious use of SendNotifyMessage 64 IoCs
pid Process 32 e1ba7d54c2c166835918d5e7388945f6490d047c5f838c9ec153bcab5944977a.exe 32 e1ba7d54c2c166835918d5e7388945f6490d047c5f838c9ec153bcab5944977a.exe 32 e1ba7d54c2c166835918d5e7388945f6490d047c5f838c9ec153bcab5944977a.exe 32 e1ba7d54c2c166835918d5e7388945f6490d047c5f838c9ec153bcab5944977a.exe 32 e1ba7d54c2c166835918d5e7388945f6490d047c5f838c9ec153bcab5944977a.exe 32 e1ba7d54c2c166835918d5e7388945f6490d047c5f838c9ec153bcab5944977a.exe 32 e1ba7d54c2c166835918d5e7388945f6490d047c5f838c9ec153bcab5944977a.exe 3116 firefox.exe 3116 firefox.exe 3116 firefox.exe 3116 firefox.exe 3116 firefox.exe 3116 firefox.exe 3116 firefox.exe 3116 firefox.exe 3116 firefox.exe 3116 firefox.exe 3116 firefox.exe 3116 firefox.exe 3116 firefox.exe 3116 firefox.exe 3116 firefox.exe 3116 firefox.exe 3116 firefox.exe 3116 firefox.exe 3116 firefox.exe 3116 firefox.exe 32 e1ba7d54c2c166835918d5e7388945f6490d047c5f838c9ec153bcab5944977a.exe 32 e1ba7d54c2c166835918d5e7388945f6490d047c5f838c9ec153bcab5944977a.exe 32 e1ba7d54c2c166835918d5e7388945f6490d047c5f838c9ec153bcab5944977a.exe 32 e1ba7d54c2c166835918d5e7388945f6490d047c5f838c9ec153bcab5944977a.exe 32 e1ba7d54c2c166835918d5e7388945f6490d047c5f838c9ec153bcab5944977a.exe 32 e1ba7d54c2c166835918d5e7388945f6490d047c5f838c9ec153bcab5944977a.exe 32 e1ba7d54c2c166835918d5e7388945f6490d047c5f838c9ec153bcab5944977a.exe 32 e1ba7d54c2c166835918d5e7388945f6490d047c5f838c9ec153bcab5944977a.exe 32 e1ba7d54c2c166835918d5e7388945f6490d047c5f838c9ec153bcab5944977a.exe 32 e1ba7d54c2c166835918d5e7388945f6490d047c5f838c9ec153bcab5944977a.exe 32 e1ba7d54c2c166835918d5e7388945f6490d047c5f838c9ec153bcab5944977a.exe 32 e1ba7d54c2c166835918d5e7388945f6490d047c5f838c9ec153bcab5944977a.exe 32 e1ba7d54c2c166835918d5e7388945f6490d047c5f838c9ec153bcab5944977a.exe 32 e1ba7d54c2c166835918d5e7388945f6490d047c5f838c9ec153bcab5944977a.exe 32 e1ba7d54c2c166835918d5e7388945f6490d047c5f838c9ec153bcab5944977a.exe 32 e1ba7d54c2c166835918d5e7388945f6490d047c5f838c9ec153bcab5944977a.exe 32 e1ba7d54c2c166835918d5e7388945f6490d047c5f838c9ec153bcab5944977a.exe 32 e1ba7d54c2c166835918d5e7388945f6490d047c5f838c9ec153bcab5944977a.exe 32 e1ba7d54c2c166835918d5e7388945f6490d047c5f838c9ec153bcab5944977a.exe 32 e1ba7d54c2c166835918d5e7388945f6490d047c5f838c9ec153bcab5944977a.exe 32 e1ba7d54c2c166835918d5e7388945f6490d047c5f838c9ec153bcab5944977a.exe 32 e1ba7d54c2c166835918d5e7388945f6490d047c5f838c9ec153bcab5944977a.exe 32 e1ba7d54c2c166835918d5e7388945f6490d047c5f838c9ec153bcab5944977a.exe 32 e1ba7d54c2c166835918d5e7388945f6490d047c5f838c9ec153bcab5944977a.exe 32 e1ba7d54c2c166835918d5e7388945f6490d047c5f838c9ec153bcab5944977a.exe 32 e1ba7d54c2c166835918d5e7388945f6490d047c5f838c9ec153bcab5944977a.exe 32 e1ba7d54c2c166835918d5e7388945f6490d047c5f838c9ec153bcab5944977a.exe 32 e1ba7d54c2c166835918d5e7388945f6490d047c5f838c9ec153bcab5944977a.exe 32 e1ba7d54c2c166835918d5e7388945f6490d047c5f838c9ec153bcab5944977a.exe 32 e1ba7d54c2c166835918d5e7388945f6490d047c5f838c9ec153bcab5944977a.exe 32 e1ba7d54c2c166835918d5e7388945f6490d047c5f838c9ec153bcab5944977a.exe 32 e1ba7d54c2c166835918d5e7388945f6490d047c5f838c9ec153bcab5944977a.exe 32 e1ba7d54c2c166835918d5e7388945f6490d047c5f838c9ec153bcab5944977a.exe 32 e1ba7d54c2c166835918d5e7388945f6490d047c5f838c9ec153bcab5944977a.exe 32 e1ba7d54c2c166835918d5e7388945f6490d047c5f838c9ec153bcab5944977a.exe 32 e1ba7d54c2c166835918d5e7388945f6490d047c5f838c9ec153bcab5944977a.exe 32 e1ba7d54c2c166835918d5e7388945f6490d047c5f838c9ec153bcab5944977a.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 3116 firefox.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 32 wrote to memory of 4380 32 e1ba7d54c2c166835918d5e7388945f6490d047c5f838c9ec153bcab5944977a.exe 89 PID 32 wrote to memory of 4380 32 e1ba7d54c2c166835918d5e7388945f6490d047c5f838c9ec153bcab5944977a.exe 89 PID 4380 wrote to memory of 3116 4380 firefox.exe 91 PID 4380 wrote to memory of 3116 4380 firefox.exe 91 PID 4380 wrote to memory of 3116 4380 firefox.exe 91 PID 4380 wrote to memory of 3116 4380 firefox.exe 91 PID 4380 wrote to memory of 3116 4380 firefox.exe 91 PID 4380 wrote to memory of 3116 4380 firefox.exe 91 PID 4380 wrote to memory of 3116 4380 firefox.exe 91 PID 4380 wrote to memory of 3116 4380 firefox.exe 91 PID 4380 wrote to memory of 3116 4380 firefox.exe 91 PID 4380 wrote to memory of 3116 4380 firefox.exe 91 PID 4380 wrote to memory of 3116 4380 firefox.exe 91 PID 3116 wrote to memory of 2124 3116 firefox.exe 92 PID 3116 wrote to memory of 2124 3116 firefox.exe 92 PID 3116 wrote to memory of 2124 3116 firefox.exe 92 PID 3116 wrote to memory of 2124 3116 firefox.exe 92 PID 3116 wrote to memory of 2124 3116 firefox.exe 92 PID 3116 wrote to memory of 2124 3116 firefox.exe 92 PID 3116 wrote to memory of 2124 3116 firefox.exe 92 PID 3116 wrote to memory of 2124 3116 firefox.exe 92 PID 3116 wrote to memory of 2124 3116 firefox.exe 92 PID 3116 wrote to memory of 2124 3116 firefox.exe 92 PID 3116 wrote to memory of 2124 3116 firefox.exe 92 PID 3116 wrote to memory of 2124 3116 firefox.exe 92 PID 3116 wrote to memory of 2124 3116 firefox.exe 92 PID 3116 wrote to memory of 2124 3116 firefox.exe 92 PID 3116 wrote to memory of 2124 3116 firefox.exe 92 PID 3116 wrote to memory of 2124 3116 firefox.exe 92 PID 3116 wrote to memory of 2124 3116 firefox.exe 92 PID 3116 wrote to memory of 2124 3116 firefox.exe 92 PID 3116 wrote to memory of 2124 3116 firefox.exe 92 PID 3116 wrote to memory of 2124 3116 firefox.exe 92 PID 3116 wrote to memory of 2124 3116 firefox.exe 92 PID 3116 wrote to memory of 2124 3116 firefox.exe 92 PID 3116 wrote to memory of 2124 3116 firefox.exe 92 PID 3116 wrote to memory of 2124 3116 firefox.exe 92 PID 3116 wrote to memory of 2124 3116 firefox.exe 92 PID 3116 wrote to memory of 2124 3116 firefox.exe 92 PID 3116 wrote to memory of 2124 3116 firefox.exe 92 PID 3116 wrote to memory of 2124 3116 firefox.exe 92 PID 3116 wrote to memory of 2124 3116 firefox.exe 92 PID 3116 wrote to memory of 2124 3116 firefox.exe 92 PID 3116 wrote to memory of 2124 3116 firefox.exe 92 PID 3116 wrote to memory of 2124 3116 firefox.exe 92 PID 3116 wrote to memory of 2124 3116 firefox.exe 92 PID 3116 wrote to memory of 2124 3116 firefox.exe 92 PID 3116 wrote to memory of 2124 3116 firefox.exe 92 PID 3116 wrote to memory of 2124 3116 firefox.exe 92 PID 3116 wrote to memory of 2124 3116 firefox.exe 92 PID 3116 wrote to memory of 2124 3116 firefox.exe 92 PID 3116 wrote to memory of 2124 3116 firefox.exe 92 PID 3116 wrote to memory of 2124 3116 firefox.exe 92 PID 3116 wrote to memory of 2124 3116 firefox.exe 92 PID 3116 wrote to memory of 2124 3116 firefox.exe 92 PID 3116 wrote to memory of 2124 3116 firefox.exe 92 PID 3116 wrote to memory of 2124 3116 firefox.exe 92 PID 3116 wrote to memory of 2124 3116 firefox.exe 92 PID 3116 wrote to memory of 1932 3116 firefox.exe 93 PID 3116 wrote to memory of 1932 3116 firefox.exe 93 PID 3116 wrote to memory of 1932 3116 firefox.exe 93 PID 3116 wrote to memory of 1932 3116 firefox.exe 93 PID 3116 wrote to memory of 1932 3116 firefox.exe 93 PID 3116 wrote to memory of 1932 3116 firefox.exe 93 -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
Processes
-
C:\Users\Admin\AppData\Local\Temp\e1ba7d54c2c166835918d5e7388945f6490d047c5f838c9ec153bcab5944977a.exe"C:\Users\Admin\AppData\Local\Temp\e1ba7d54c2c166835918d5e7388945f6490d047c5f838c9ec153bcab5944977a.exe"1⤵
- Checks computer location settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:32 -
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" https://www.youtube.com/account2⤵
- Suspicious use of WriteProcessMemory
PID:4380 -
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" https://www.youtube.com/account3⤵
- Checks processor information in registry
- Modifies registry class
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:3116 -
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=1980 -parentBuildID 20240401114208 -prefsHandle 1896 -prefMapHandle 1888 -prefsLen 25751 -prefMapSize 244658 -appDir "C:\Program Files\Mozilla Firefox\browser" - {7e263dea-5d1f-495b-af4e-bdc43fb4a5c1} 3116 "\\.\pipe\gecko-crash-server-pipe.3116" gpu4⤵PID:2124
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=2420 -parentBuildID 20240401114208 -prefsHandle 2412 -prefMapHandle 2400 -prefsLen 26671 -prefMapSize 244658 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {cda45779-fb93-4388-827a-6b44e456d918} 3116 "\\.\pipe\gecko-crash-server-pipe.3116" socket4⤵PID:1932
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=1464 -childID 1 -isForBrowser -prefsHandle 2916 -prefMapHandle 3104 -prefsLen 22698 -prefMapSize 244658 -jsInitHandle 1220 -jsInitLen 234952 -parentBuildID 20240401114208 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {11510462-36ea-4cd2-9dbe-1e9f8302b680} 3116 "\\.\pipe\gecko-crash-server-pipe.3116" tab4⤵PID:4472
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=3836 -childID 2 -isForBrowser -prefsHandle 3840 -prefMapHandle 3804 -prefsLen 31161 -prefMapSize 244658 -jsInitHandle 1220 -jsInitLen 234952 -parentBuildID 20240401114208 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {d6ba9f7e-9607-4d90-bdc8-d3e9e496f6f9} 3116 "\\.\pipe\gecko-crash-server-pipe.3116" tab4⤵PID:3148
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=3856 -parentBuildID 20240401114208 -sandboxingKind 0 -prefsHandle 4336 -prefMapHandle 4616 -prefsLen 31161 -prefMapSize 244658 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {5f0dc9dd-815c-4da7-91c3-f2a7ac4a5511} 3116 "\\.\pipe\gecko-crash-server-pipe.3116" utility4⤵
- Checks processor information in registry
PID:4376
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=5212 -childID 3 -isForBrowser -prefsHandle 5204 -prefMapHandle 5092 -prefsLen 27051 -prefMapSize 244658 -jsInitHandle 1220 -jsInitLen 234952 -parentBuildID 20240401114208 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {dce95be9-7a33-44ad-92e4-2272eb905af8} 3116 "\\.\pipe\gecko-crash-server-pipe.3116" tab4⤵PID:5556
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=5224 -childID 4 -isForBrowser -prefsHandle 5480 -prefMapHandle 5476 -prefsLen 27051 -prefMapSize 244658 -jsInitHandle 1220 -jsInitLen 234952 -parentBuildID 20240401114208 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {e6a1c0ba-f8a9-43d1-9f9a-7fd0aff61a0e} 3116 "\\.\pipe\gecko-crash-server-pipe.3116" tab4⤵PID:5592
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=3632 -childID 5 -isForBrowser -prefsHandle 5260 -prefMapHandle 5368 -prefsLen 27051 -prefMapSize 244658 -jsInitHandle 1220 -jsInitLen 234952 -parentBuildID 20240401114208 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {1c784a5f-055c-4767-818a-3b3102a0f050} 3116 "\\.\pipe\gecko-crash-server-pipe.3116" tab4⤵PID:5604
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Local\Mozilla\Firefox\Profiles\yol9faaa.default-release\activity-stream.discovery_stream.json
Filesize21KB
MD5605c08714c4bbbce7fcdb152d15002ab
SHA1869c6186841d38327ef20e75a615cd63458edc0d
SHA25638379e1a67b3330ea89cc1f1ae326fd3d95696778f5cc816f619e3424a254c4a
SHA512a910dafd26b0d1925fc19323cd4ecaf482c5d93df5d38076a2fb36bca70aa3b389f138cfc6403373869efab4c5d700634ad314b17ff0dff2efeefdcfd77d424a
-
C:\Users\Admin\AppData\Local\Mozilla\Firefox\Profiles\yol9faaa.default-release\cache2\entries\8A2034D325DC0B5C9E11EDDA3FC70A54C8DC1C0D
Filesize13KB
MD56cde114cd2bed9ab1b821790fa4ab12c
SHA179b683b8aa5dcdc0c2c07977077bb32fea2840a6
SHA25685e7d1ebda870e09952c13989af4addb96a370bd2cff4980c225d18490c9820f
SHA512a5c82df24f2d84748b37cbfc7dd4d126da930c947519026a0c96e98441a8c7d78ab8efe071b740884ad32f16df1b77970460f260a666fb5ccc17db00964c1675
-
Filesize
479KB
MD509372174e83dbbf696ee732fd2e875bb
SHA1ba360186ba650a769f9303f48b7200fb5eaccee1
SHA256c32efac42faf4b9878fb8917c5e71d89ff40de580c4f52f62e11c6cfab55167f
SHA512b667086ed49579592d435df2b486fe30ba1b62ddd169f19e700cd079239747dd3e20058c285fa9c10a533e34f22b5198ed9b1f92ae560a3067f3e3feacc724f1
-
Filesize
13.8MB
MD50a8747a2ac9ac08ae9508f36c6d75692
SHA1b287a96fd6cc12433adb42193dfe06111c38eaf0
SHA25632d544baf2facc893057a1d97db33207e642f0dacf235d8500a0b5eff934ce03
SHA51259521f8c61236641b3299ab460c58c8f5f26fa67e828de853c2cf372f9614d58b9f541aae325b1600ec4f3a47953caacb8122b0dfce7481acfec81045735947d
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\yol9faaa.default-release\AlternateServices.bin
Filesize8KB
MD5a2af93a2a16c0cb7677fa9ebe8f7cf51
SHA1aa2748c92dfc0bef91def030b6a6af3b15a84637
SHA256c29695ab773d0898de2d0849884804e5410406c678dccff627d9ee53ad7808a8
SHA512b590702499ba383fed1c5e032ac9c8a50fd694fd371aad32a84002047081840bb8e6fdb60555acca25ce10b3fe1b604297890137107ec9318a814e0bbaf2676c
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\yol9faaa.default-release\AlternateServices.bin
Filesize17KB
MD53c213abf1ae0fa7f128d83a9700d29ba
SHA1add03ec556cf8f88d934b6fd309795660a937d2b
SHA256f4aca4a7813dbe94c143b807748bd8f2a3690347b72507425a23f1b3f103e04b
SHA512cdf3c8c376d05326f09ee45bcb5b2dcac87d8fdcbedac8ade85b6117dd6662152240fff2f6b5443f9948d3e6c4e1050113ff0d212c026bca57f2c1d8846c2238
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\yol9faaa.default-release\datareporting\glean\db\data.safe.tmp
Filesize5KB
MD57406a9c572189a655a8c45932d814a64
SHA12e19db82fd819be1514a4435be028d1b1bb5e9ba
SHA256c8aaece2478bd63d36dfb780680ca6f0cc1f7d86094bd896ebafe5bc7a3d3099
SHA5121b3eabb8aaf641df83fdc385262104746d8ad6ffe659f4d664e1b9560a329cd497e2e55e1ca236585f7da2d757f37bb11cc9d344d592357388a7111929af049e
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\yol9faaa.default-release\datareporting\glean\db\data.safe.tmp
Filesize6KB
MD5da24541b176cbb0cf5fbe42f8eee8346
SHA1fdb677388899e39aa0fae7cc5a12addbddad9cf6
SHA25684e16642bf8e47401b2e07433b903fa438fa98f531c343fc997952673954de29
SHA512ba5a0cf1a70d5273bfa8617d5d46851cd4f96c6b1716cf970c36151210abff4d2e40a4bfde496a291396c3c4a24853440ab1beab4042bc414569ccad855825a9
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\yol9faaa.default-release\datareporting\glean\db\data.safe.tmp
Filesize30KB
MD539608322bfeb3f4a8fe6616cb296e77f
SHA144b83c57fbf28cb56dc612e09645afd22337a349
SHA256ca340e4acaeb055749b7a8e7b023efab2ebc65f4906312fd1290083cfa5d1bba
SHA5127a795c4f8917df0f5815e29919656a746b372cd74be7ec8bc9bf6a446804a6dad216b6e717bc3acda67882a72241dd458acddec7f503c52f2f4a01b99dd6406a
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\yol9faaa.default-release\datareporting\glean\pending_pings\067855e1-e747-4ec8-88d7-d8d94c69f2f5
Filesize26KB
MD520fbd2e622c9f690dd4630bb00b0656e
SHA175ff3a967f366cdf70ee16a41d057693288babfb
SHA2563247e22eb18d6792eacda76e61713519eeaaee313a46fab3b54449b63119eb66
SHA512c22af8e64191efea73423db4e51784d447564398d488f94c8519f03b333ec5c9dd0d55b4ae7428adabc8295a2f71f60197403e15e6135b9134094d1fdbf028fb
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\yol9faaa.default-release\datareporting\glean\pending_pings\0eeed2ef-f1c0-48ef-b8f1-a7c86062a521
Filesize982B
MD5b27eac00f921c34d1b95173f25b18801
SHA168c0048d31b37642df9891c228875b768d329ec6
SHA256a8d5ae69bf8e3fc86d689f3aac0bd7bfe9e308fba651285e6887bc69ece74aa8
SHA512b3a0ec13270d362cffc04db9d8e408b5d230d41a7dfb64e1b5358824e0b3d152f16af9aa1c73c9aaafa03e039535e1159f5aa57bfed36c6044a81b878838b8ac
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\yol9faaa.default-release\datareporting\glean\pending_pings\83b7bec7-9d29-4cc1-8dfc-606844b4b169
Filesize671B
MD55a64fc492c540eee73e90b9b9738e18c
SHA18c31d12e43f06d3affae13efc798858ca120e7ea
SHA25697863548850413c7b5b15cd6b7f9b6c03b28d3bfd448aced7a21e0311a65c7c7
SHA512a0b239489415aae60881760d03f1da8f0c65e9b0f20a68d031551882a90129e99bf2895271ab493db0e61f2b3423c6a9dd9e7127ffdcf34b83d9447ab5e8d7d9
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\yol9faaa.default-release\gmp-gmpopenh264\2.3.2\gmpopenh264.dll
Filesize1.1MB
MD5842039753bf41fa5e11b3a1383061a87
SHA13e8fe1d7b3ad866b06dca6c7ef1e3c50c406e153
SHA256d88dd3bfc4a558bb943f3caa2e376da3942e48a7948763bf9a38f707c2cd0c1c
SHA512d3320f7ac46327b7b974e74320c4d853e569061cb89ca849cd5d1706330aca629abeb4a16435c541900d839f46ff72dfde04128c450f3e1ee63c025470c19157
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\yol9faaa.default-release\gmp-gmpopenh264\2.3.2\gmpopenh264.info
Filesize116B
MD52a461e9eb87fd1955cea740a3444ee7a
SHA1b10755914c713f5a4677494dbe8a686ed458c3c5
SHA2564107f76ba1d9424555f4e8ea0acef69357dfff89dfa5f0ec72aa4f2d489b17bc
SHA51234f73f7bf69d7674907f190f257516e3956f825e35a2f03d58201a5a630310b45df393f2b39669f9369d1ac990505a4b6849a0d34e8c136e1402143b6cedf2d3
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\yol9faaa.default-release\gmp-widevinecdm\4.10.2710.0\manifest.json
Filesize372B
MD5bf957ad58b55f64219ab3f793e374316
SHA1a11adc9d7f2c28e04d9b35e23b7616d0527118a1
SHA256bbab6ca07edbed72a966835c7907b3e60c7aa3d48ddea847e5076bd05f4b1eda
SHA51279c179b56e4893fb729b225818ab4b95a50b69666ac41d17aad0b37ab0ca8cd9f0848cbc3c5d9e69e4640a8b261d7ced592eae9bcb0e0b63c05a56e7c477f44e
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\yol9faaa.default-release\gmp-widevinecdm\4.10.2710.0\widevinecdm.dll
Filesize17.8MB
MD5daf7ef3acccab478aaa7d6dc1c60f865
SHA1f8246162b97ce4a945feced27b6ea114366ff2ad
SHA256bc40c7821dcd3fea9923c6912ab1183a942c11b7690cfd79ed148ded0228777e
SHA5125840a45cfdb12c005e117608b1e5d946e1b2e76443ed39ba940d7f56de4babeab09bee7e64b903eb82bb37624c0a0ef19e9b59fbe2ce2f0e0b1c7a6015a63f75
-
Filesize
12KB
MD53bbac16168645bb9ee7bfe45668a0283
SHA16f98efe7437ad76a8be90f3a7d8a670b7c2c2670
SHA2561a1391e7d5531681fab05d15c286c96c0a7a3d3f454b34c45acba902f0e168a1
SHA512b38287f9dee970e373ddb9d355becaa01f921bf813df91b535d9f734c3854f701654ae5e7f371c7ffeb5310aaed0187067d6187263119cbaefaff2004864b370
-
Filesize
16KB
MD50ecb31813c745931b847ac7e15621687
SHA195472b163efa310958f4b2167f60c1aa8cf3d164
SHA256203dab0974f9b7047d4f75259eb0843346a8a15e8e7cb9aa0df008a0aa6f4883
SHA5127078b3121fec8a4e5015248733ad0921c32389f46e1834c40c1ed803c15e2f2a93dbeadc6d7929ac7c7aefb89a7687fe86b8420207c9133d8577664958142862
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\yol9faaa.default-release\storage\permanent\chrome\idb\3870112724rsegmnoittet-es.sqlite
Filesize968KB
MD5e08b684c5f94f6952b1ac1474d802c5f
SHA1aba223a056bd64639c3e771c441b9f9f91ce8639
SHA256c84308da5b334b0730c21c742dedb29a9e337c9939de1f5b65d22d98cddad704
SHA51275dfc6fa90bb5e019d853a4722f412aadc2d14219aad07165db55a834b2d0e5f410d7a51598f205669244bbc94a372ef3523d24ba3cd83b00dd371efc7f84cf6
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\yol9faaa.default-release\storage\permanent\chrome\idb\3870112724rsegmnoittet-es.sqlite
Filesize9.3MB
MD57d3a64bd35041fae2c9d98cb19794c5d
SHA17ea1b89e9c0765cea5010087f5331dde7e5aa266
SHA256012259215a6e920ddb036c05b1ffae63fcb6ae8a881d49bdd1b9a95f9c0d7b89
SHA512d5ec9c2cd19928fd128231c954baaad063826c875a3e3f7b342e36a61fd2dd1666e64949320a437a7da3acc325a4b17ab0a5e5b9b8e16179f2bfb696a5e103b4