Analysis
-
max time kernel
148s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
20/11/2024, 04:58
Static task
static1
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
http://pioeg.admetricspro.workers.dev
Resource
win10v2004-20241007-en
General
-
Target
http://pioeg.admetricspro.workers.dev
Malware Config
Signatures
-
Checks processor information in registry 2 TTPs 8 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Update Signature firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Update Revision firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\VendorIdentifier firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~Mhz firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString firefox.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~Mhz firefox.exe -
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe -
Modifies registry class 3 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3350944739-639801879-157714471-1000_Classes\Local Settings msedge.exe Key created \REGISTRY\USER\S-1-5-21-3350944739-639801879-157714471-1000_Classes\Local Settings OpenWith.exe Key created \REGISTRY\USER\S-1-5-21-3350944739-639801879-157714471-1000_Classes\Local Settings firefox.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 2196 msedge.exe 2196 msedge.exe 820 msedge.exe 820 msedge.exe 396 identity_helper.exe 396 identity_helper.exe 3856 msedge.exe 3856 msedge.exe 3856 msedge.exe 3856 msedge.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 5176 OpenWith.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 7 IoCs
pid Process 820 msedge.exe 820 msedge.exe 820 msedge.exe 820 msedge.exe 820 msedge.exe 820 msedge.exe 820 msedge.exe -
Suspicious use of AdjustPrivilegeToken 5 IoCs
description pid Process Token: SeDebugPrivilege 5360 firefox.exe Token: SeDebugPrivilege 5360 firefox.exe Token: SeDebugPrivilege 5360 firefox.exe Token: SeDebugPrivilege 5360 firefox.exe Token: SeDebugPrivilege 5360 firefox.exe -
Suspicious use of FindShellTrayWindow 54 IoCs
pid Process 820 msedge.exe 820 msedge.exe 820 msedge.exe 820 msedge.exe 820 msedge.exe 820 msedge.exe 820 msedge.exe 820 msedge.exe 820 msedge.exe 820 msedge.exe 820 msedge.exe 820 msedge.exe 820 msedge.exe 820 msedge.exe 820 msedge.exe 820 msedge.exe 820 msedge.exe 820 msedge.exe 820 msedge.exe 820 msedge.exe 820 msedge.exe 820 msedge.exe 820 msedge.exe 820 msedge.exe 820 msedge.exe 820 msedge.exe 820 msedge.exe 820 msedge.exe 820 msedge.exe 820 msedge.exe 820 msedge.exe 820 msedge.exe 820 msedge.exe 5360 firefox.exe 5360 firefox.exe 5360 firefox.exe 5360 firefox.exe 5360 firefox.exe 5360 firefox.exe 5360 firefox.exe 5360 firefox.exe 5360 firefox.exe 5360 firefox.exe 5360 firefox.exe 5360 firefox.exe 5360 firefox.exe 5360 firefox.exe 5360 firefox.exe 5360 firefox.exe 5360 firefox.exe 5360 firefox.exe 5360 firefox.exe 5360 firefox.exe 5360 firefox.exe -
Suspicious use of SendNotifyMessage 44 IoCs
pid Process 820 msedge.exe 820 msedge.exe 820 msedge.exe 820 msedge.exe 820 msedge.exe 820 msedge.exe 820 msedge.exe 820 msedge.exe 820 msedge.exe 820 msedge.exe 820 msedge.exe 820 msedge.exe 820 msedge.exe 820 msedge.exe 820 msedge.exe 820 msedge.exe 820 msedge.exe 820 msedge.exe 820 msedge.exe 820 msedge.exe 820 msedge.exe 820 msedge.exe 820 msedge.exe 820 msedge.exe 5360 firefox.exe 5360 firefox.exe 5360 firefox.exe 5360 firefox.exe 5360 firefox.exe 5360 firefox.exe 5360 firefox.exe 5360 firefox.exe 5360 firefox.exe 5360 firefox.exe 5360 firefox.exe 5360 firefox.exe 5360 firefox.exe 5360 firefox.exe 5360 firefox.exe 5360 firefox.exe 5360 firefox.exe 5360 firefox.exe 5360 firefox.exe 5360 firefox.exe -
Suspicious use of SetWindowsHookEx 40 IoCs
pid Process 5176 OpenWith.exe 5176 OpenWith.exe 5176 OpenWith.exe 5176 OpenWith.exe 5176 OpenWith.exe 5176 OpenWith.exe 5176 OpenWith.exe 5176 OpenWith.exe 5176 OpenWith.exe 5176 OpenWith.exe 5176 OpenWith.exe 5176 OpenWith.exe 5176 OpenWith.exe 5176 OpenWith.exe 5176 OpenWith.exe 5176 OpenWith.exe 5176 OpenWith.exe 5176 OpenWith.exe 5176 OpenWith.exe 5176 OpenWith.exe 5176 OpenWith.exe 5176 OpenWith.exe 5176 OpenWith.exe 5176 OpenWith.exe 5176 OpenWith.exe 5176 OpenWith.exe 5176 OpenWith.exe 5176 OpenWith.exe 5176 OpenWith.exe 5176 OpenWith.exe 5176 OpenWith.exe 5176 OpenWith.exe 5176 OpenWith.exe 5176 OpenWith.exe 5176 OpenWith.exe 5176 OpenWith.exe 5176 OpenWith.exe 5176 OpenWith.exe 5176 OpenWith.exe 5360 firefox.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 820 wrote to memory of 2160 820 msedge.exe 83 PID 820 wrote to memory of 2160 820 msedge.exe 83 PID 820 wrote to memory of 3012 820 msedge.exe 84 PID 820 wrote to memory of 3012 820 msedge.exe 84 PID 820 wrote to memory of 3012 820 msedge.exe 84 PID 820 wrote to memory of 3012 820 msedge.exe 84 PID 820 wrote to memory of 3012 820 msedge.exe 84 PID 820 wrote to memory of 3012 820 msedge.exe 84 PID 820 wrote to memory of 3012 820 msedge.exe 84 PID 820 wrote to memory of 3012 820 msedge.exe 84 PID 820 wrote to memory of 3012 820 msedge.exe 84 PID 820 wrote to memory of 3012 820 msedge.exe 84 PID 820 wrote to memory of 3012 820 msedge.exe 84 PID 820 wrote to memory of 3012 820 msedge.exe 84 PID 820 wrote to memory of 3012 820 msedge.exe 84 PID 820 wrote to memory of 3012 820 msedge.exe 84 PID 820 wrote to memory of 3012 820 msedge.exe 84 PID 820 wrote to memory of 3012 820 msedge.exe 84 PID 820 wrote to memory of 3012 820 msedge.exe 84 PID 820 wrote to memory of 3012 820 msedge.exe 84 PID 820 wrote to memory of 3012 820 msedge.exe 84 PID 820 wrote to memory of 3012 820 msedge.exe 84 PID 820 wrote to memory of 3012 820 msedge.exe 84 PID 820 wrote to memory of 3012 820 msedge.exe 84 PID 820 wrote to memory of 3012 820 msedge.exe 84 PID 820 wrote to memory of 3012 820 msedge.exe 84 PID 820 wrote to memory of 3012 820 msedge.exe 84 PID 820 wrote to memory of 3012 820 msedge.exe 84 PID 820 wrote to memory of 3012 820 msedge.exe 84 PID 820 wrote to memory of 3012 820 msedge.exe 84 PID 820 wrote to memory of 3012 820 msedge.exe 84 PID 820 wrote to memory of 3012 820 msedge.exe 84 PID 820 wrote to memory of 3012 820 msedge.exe 84 PID 820 wrote to memory of 3012 820 msedge.exe 84 PID 820 wrote to memory of 3012 820 msedge.exe 84 PID 820 wrote to memory of 3012 820 msedge.exe 84 PID 820 wrote to memory of 3012 820 msedge.exe 84 PID 820 wrote to memory of 3012 820 msedge.exe 84 PID 820 wrote to memory of 3012 820 msedge.exe 84 PID 820 wrote to memory of 3012 820 msedge.exe 84 PID 820 wrote to memory of 3012 820 msedge.exe 84 PID 820 wrote to memory of 3012 820 msedge.exe 84 PID 820 wrote to memory of 2196 820 msedge.exe 85 PID 820 wrote to memory of 2196 820 msedge.exe 85 PID 820 wrote to memory of 532 820 msedge.exe 86 PID 820 wrote to memory of 532 820 msedge.exe 86 PID 820 wrote to memory of 532 820 msedge.exe 86 PID 820 wrote to memory of 532 820 msedge.exe 86 PID 820 wrote to memory of 532 820 msedge.exe 86 PID 820 wrote to memory of 532 820 msedge.exe 86 PID 820 wrote to memory of 532 820 msedge.exe 86 PID 820 wrote to memory of 532 820 msedge.exe 86 PID 820 wrote to memory of 532 820 msedge.exe 86 PID 820 wrote to memory of 532 820 msedge.exe 86 PID 820 wrote to memory of 532 820 msedge.exe 86 PID 820 wrote to memory of 532 820 msedge.exe 86 PID 820 wrote to memory of 532 820 msedge.exe 86 PID 820 wrote to memory of 532 820 msedge.exe 86 PID 820 wrote to memory of 532 820 msedge.exe 86 PID 820 wrote to memory of 532 820 msedge.exe 86 PID 820 wrote to memory of 532 820 msedge.exe 86 PID 820 wrote to memory of 532 820 msedge.exe 86 PID 820 wrote to memory of 532 820 msedge.exe 86 PID 820 wrote to memory of 532 820 msedge.exe 86 -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --start-maximized --single-argument http://pioeg.admetricspro.workers.dev1⤵
- Enumerates system info in registry
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:820 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffa90c646f8,0x7ffa90c64708,0x7ffa90c647182⤵PID:2160
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2148,14653234818871142045,10755573161417604103,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2156 /prefetch:22⤵PID:3012
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2148,14653234818871142045,10755573161417604103,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2232 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:2196
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2148,14653234818871142045,10755573161417604103,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2812 /prefetch:82⤵PID:532
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2148,14653234818871142045,10755573161417604103,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3200 /prefetch:12⤵PID:3128
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2148,14653234818871142045,10755573161417604103,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3228 /prefetch:12⤵PID:5068
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2148,14653234818871142045,10755573161417604103,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5200 /prefetch:12⤵PID:1696
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2148,14653234818871142045,10755573161417604103,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5232 /prefetch:12⤵PID:3088
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2148,14653234818871142045,10755573161417604103,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5580 /prefetch:82⤵PID:3624
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2148,14653234818871142045,10755573161417604103,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5580 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:396
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=edge_collections.mojom.CollectionsDataManager --field-trial-handle=2148,14653234818871142045,10755573161417604103,131072 --lang=en-US --service-sandbox-type=collections --mojo-platform-channel-handle=4188 /prefetch:82⤵PID:3932
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2148,14653234818871142045,10755573161417604103,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4224 /prefetch:12⤵PID:4228
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=quarantine.mojom.Quarantine --field-trial-handle=2148,14653234818871142045,10755573161417604103,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5880 /prefetch:82⤵PID:5008
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2148,14653234818871142045,10755573161417604103,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=14 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5964 /prefetch:12⤵PID:4344
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2148,14653234818871142045,10755573161417604103,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=15 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5976 /prefetch:12⤵PID:4388
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2148,14653234818871142045,10755573161417604103,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=3020 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:3856
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:1172
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:1536
-
C:\Windows\System32\rundll32.exeC:\Windows\System32\rundll32.exe C:\Windows\System32\shell32.dll,SHCreateLocalServerRunDll {9aa46009-3ce0-458a-a354-715610a075e6} -Embedding1⤵PID:1372
-
C:\Windows\system32\OpenWith.exeC:\Windows\system32\OpenWith.exe -Embedding1⤵
- Modifies registry class
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of SetWindowsHookEx
PID:5176 -
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -osint -url "C:\Users\Admin\Downloads\download"2⤵PID:5268
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -osint -url C:\Users\Admin\Downloads\download3⤵
- Checks processor information in registry
- Modifies registry class
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of SetWindowsHookEx
PID:5360 -
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=1972 -parentBuildID 20240401114208 -prefsHandle 1900 -prefMapHandle 1888 -prefsLen 23680 -prefMapSize 244658 -appDir "C:\Program Files\Mozilla Firefox\browser" - {9b113449-f42f-463b-a31f-4cb163cbc0aa} 5360 "\\.\pipe\gecko-crash-server-pipe.5360" gpu4⤵PID:5540
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=2420 -parentBuildID 20240401114208 -prefsHandle 2412 -prefMapHandle 2408 -prefsLen 24600 -prefMapSize 244658 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {c304ebac-9a53-4201-9d8b-d2645614812a} 5360 "\\.\pipe\gecko-crash-server-pipe.5360" socket4⤵PID:5600
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=2848 -childID 1 -isForBrowser -prefsHandle 3108 -prefMapHandle 2784 -prefsLen 24741 -prefMapSize 244658 -jsInitHandle 1256 -jsInitLen 234952 -parentBuildID 20240401114208 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {3f455175-a419-4bb7-85bf-5beaa85a3695} 5360 "\\.\pipe\gecko-crash-server-pipe.5360" tab4⤵PID:5936
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=3848 -childID 2 -isForBrowser -prefsHandle 3840 -prefMapHandle 3804 -prefsLen 29090 -prefMapSize 244658 -jsInitHandle 1256 -jsInitLen 234952 -parentBuildID 20240401114208 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {26cb9dc5-82a2-4335-a03d-8eeaf0d6e6b1} 5360 "\\.\pipe\gecko-crash-server-pipe.5360" tab4⤵PID:6080
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=1404 -parentBuildID 20240401114208 -sandboxingKind 0 -prefsHandle 2572 -prefMapHandle 4900 -prefsLen 29090 -prefMapSize 244658 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {3661d789-6952-49e1-bc3f-014bde19f970} 5360 "\\.\pipe\gecko-crash-server-pipe.5360" utility4⤵
- Checks processor information in registry
PID:6548
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=5128 -childID 3 -isForBrowser -prefsHandle 5328 -prefMapHandle 5324 -prefsLen 27132 -prefMapSize 244658 -jsInitHandle 1256 -jsInitLen 234952 -parentBuildID 20240401114208 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {9a461ece-5af0-46ff-99fd-283da4146f0e} 5360 "\\.\pipe\gecko-crash-server-pipe.5360" tab4⤵PID:5588
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=5472 -childID 4 -isForBrowser -prefsHandle 5548 -prefMapHandle 5544 -prefsLen 27132 -prefMapSize 244658 -jsInitHandle 1256 -jsInitLen 234952 -parentBuildID 20240401114208 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {a19acbfe-33c2-4a62-982a-9a9152d3b3d2} 5360 "\\.\pipe\gecko-crash-server-pipe.5360" tab4⤵PID:5428
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=5572 -childID 5 -isForBrowser -prefsHandle 5748 -prefMapHandle 5744 -prefsLen 27132 -prefMapSize 244658 -jsInitHandle 1256 -jsInitLen 234952 -parentBuildID 20240401114208 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {6e2adfe5-5b0a-407a-9a69-f72b4a52bf0f} 5360 "\\.\pipe\gecko-crash-server-pipe.5360" tab4⤵PID:5752
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=5868 -childID 6 -isForBrowser -prefsHandle 5972 -prefMapHandle 5964 -prefsLen 29278 -prefMapSize 244658 -jsInitHandle 1256 -jsInitLen 234952 -parentBuildID 20240401114208 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {4860df10-eeb8-49b4-bb91-fbf72432717b} 5360 "\\.\pipe\gecko-crash-server-pipe.5360" tab4⤵PID:6380
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=6340 -childID 7 -isForBrowser -prefsHandle 6060 -prefMapHandle 6064 -prefsLen 27211 -prefMapSize 244658 -jsInitHandle 1256 -jsInitLen 234952 -parentBuildID 20240401114208 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {894499dd-1d86-4d98-92f9-f4bba2ad7f69} 5360 "\\.\pipe\gecko-crash-server-pipe.5360" tab4⤵PID:7004
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD585ba073d7015b6ce7da19235a275f6da
SHA1a23c8c2125e45a0788bac14423ae1f3eab92cf00
SHA2565ad04b8c19bf43b550ad725202f79086168ecccabe791100fba203d9aa27e617
SHA512eb4fd72d7030ea1a25af2b59769b671a5760735fb95d18145f036a8d9e6f42c903b34a7e606046c740c644fab0bb9f5b7335c1869b098f121579e71f10f5a9c3
-
Filesize
152B
MD57de1bbdc1f9cf1a58ae1de4951ce8cb9
SHA1010da169e15457c25bd80ef02d76a940c1210301
SHA2566e390bbc0d03a652516705775e8e9a7b7936312a8a5bea407f9d7d9fa99d957e
SHA512e4a33f2128883e71ab41e803e8b55d0ac17cbc51be3bde42bed157df24f10f34ad264f74ef3254dbe30d253aca03158fde21518c2b78aaa05dae8308b1c5f30c
-
Filesize
5KB
MD53d31ddd70ee675640a43ea22dd0195ec
SHA10c4170ae244f76ebae459b746d0f19dc9c4e4824
SHA256bf2969591f9aeba97b0550dd5e24963361bc1ffd88ae3374e9c2777b0f3e7192
SHA512bd3bbb438e7f5a4ca368e19632de35d461c512c1140d2667358a510fc05e8307d0c10a35e036214561589020a544210a97917f89fd0488661ddffa4cb48bf915
-
Filesize
6KB
MD55b7259442947f887658b9636978e047e
SHA12389465d8b68e38f5711a6148df28904884d6dd6
SHA2569cfa6ecd2ba82c4960363a78171e66908a31768aa4142553f45ead3d6f198a8d
SHA5122a84a708be993a84364929ccbec65da959abe538c5595daa3fea20af5dd8e36b47f32a5817714e812b8e40dbc9cb5671eb38ef15e8b7003a8c590a13a842c754
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
10KB
MD51f573462d0a1d65a1d87d903e261ca71
SHA138e6f9ab9844ab2f6122757dbbd43c7e120b483e
SHA256b996cca278951f8b8d7d74e9c32e14efbe9a9e66bfab6139a16f334d66c5edc5
SHA512dd41e5b873d44f0a275cf3c51ed156d05d6ad1c852ccc4203301973d17b7b02accaa64fb4821bf5436f5d4a4a11fd56f656261d6a97f716fe7c3666e02fcc001
-
Filesize
10KB
MD5607929515d23920f8a9fcdff415d9699
SHA14d8fc35f2caea16f2a45f77015de5fafff3cf895
SHA256b98323ca72e9e02d320504f1b0e7255a8235f5a0befa87601a44fed753e89b6a
SHA512a0b6fab36d24d170f5aae3c9633aa992e491be902d1bf6fd8279dff1fc737047730ee81cd173120aedcb0d423da4c82269c0ab9940ac3d81030426a093b1ce8e
-
C:\Users\Admin\AppData\Local\Mozilla\Firefox\Profiles\42vejdix.default-release\activity-stream.discovery_stream.json.tmp
Filesize28KB
MD5802f44a54b720020faa291835c15381b
SHA11b62c8db7dda86a8990a4cf5661a0f188cf20ac7
SHA256f03d0b1f1edfc71f9cf5fb5a1a88a2f915cd7dea654752f3b7827ad22d7c5cdd
SHA5124871a36cbbca9b2d7cb1a06838f5e0101a85380e129406b6c94999d4c8d824f2e56cbc754e81c975f682a190f4728f6fbba2918a47633cc0ae52d427d439c5c9
-
Filesize
479KB
MD509372174e83dbbf696ee732fd2e875bb
SHA1ba360186ba650a769f9303f48b7200fb5eaccee1
SHA256c32efac42faf4b9878fb8917c5e71d89ff40de580c4f52f62e11c6cfab55167f
SHA512b667086ed49579592d435df2b486fe30ba1b62ddd169f19e700cd079239747dd3e20058c285fa9c10a533e34f22b5198ed9b1f92ae560a3067f3e3feacc724f1
-
Filesize
13.8MB
MD50a8747a2ac9ac08ae9508f36c6d75692
SHA1b287a96fd6cc12433adb42193dfe06111c38eaf0
SHA25632d544baf2facc893057a1d97db33207e642f0dacf235d8500a0b5eff934ce03
SHA51259521f8c61236641b3299ab460c58c8f5f26fa67e828de853c2cf372f9614d58b9f541aae325b1600ec4f3a47953caacb8122b0dfce7481acfec81045735947d
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\42vejdix.default-release\AlternateServices.bin
Filesize6KB
MD5a1fee8e95b797c7d4f275d6c73f78520
SHA1e6a091e7c9cacdde89cda9b126f07149ef472ca6
SHA2562e9c85485dc03333fc8a9835b87e192f13d9efcd370c41459cd02a889a930dc6
SHA512fbf4d98324ee97adb3f6307e8180d826dc600051b0ba284220eeb22e073f282642acb1ec835d97be3c0487a7a9f907a48f88bdfc6352bbcf5141772c8238392b
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\42vejdix.default-release\AlternateServices.bin
Filesize12KB
MD598d27fae87dd7037cef4646b509a9c6a
SHA10c2810e5577745820a8f185a1d9dc0f91593c0b0
SHA25687f0df813f032433d354b7efface80c16a188e11715ab0dc971b333b199a3131
SHA512b595a229655d7a611427894af9722869b952519b4e54a6757b6785405ad0bfe279255cc86708911306aae259dc4ad11ee1aa39fec20c63eae0563c45414d32a1
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\42vejdix.default-release\datareporting\glean\db\data.safe.tmp
Filesize5KB
MD5eab2b0bec665ac68771161d92cf3e566
SHA1b036e58fe4be9eff0e164eea1c795815f637658a
SHA256f746ce296ac9023f37ee39bfbfcb0c53300781e40155a23f0749ddcecdb8185e
SHA5129b1ab1571c5d29a71c0ee1b3a7bc916eab95669f12a4be174468e985b0f33b7cc4b6f020db2b8d79ba4efbc0b0840c9807606cf9f27ee28abc34ddd088f15af2
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\42vejdix.default-release\datareporting\glean\db\data.safe.tmp
Filesize6KB
MD54baff6929000973fcf9e11786cfdc052
SHA17b1e3be24016d544aed96b2454dcce8c3a258444
SHA256553ee39c81838fa7057654f22c61333f35c7cf0e957f0dea7fa08b55064ba15b
SHA5121908eaa0d46cec64d56da7a1744eae4b4270f150902065897e62b771b24026bb3daa39fe32b616f18ec8d5a3f628928bac07f62829eca68560f0b218e6d7e1d1
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\42vejdix.default-release\datareporting\glean\db\data.safe.tmp
Filesize6KB
MD50f38ee479df0be6bf983b4ff5c0ae778
SHA19f739925f594d37fe033257a3b886b459b746834
SHA256e506e17816a36197eb8e5c732e9a18417a4262b3d721f7438d437592d7736872
SHA5125cd306338200ef4510f6f75a7008be3cf1506ea516d491735d63d097e4d462a3708c7455d94daa20a245d6523711d5d78c1db619c483f97f782841fe367ed37d
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\42vejdix.default-release\datareporting\glean\db\data.safe.tmp
Filesize6KB
MD535680b5f31deb3e688a4237b5bb0564e
SHA185c8d0aa21845e6024f4ecc00ec9062691956a0a
SHA25690f7ebaf2402a5ccf8aff0bdb8785459f161f50055e474adcb604e1a932fdf06
SHA512ddd059fb2101a27567be80bdb38e5b836859bdaa69cfecd5bb141abefe9404ac8f7749779b9115cd065ec9e0ffda197b25437881d451e593a2eb9b280260b05c
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\42vejdix.default-release\datareporting\glean\pending_pings\23697166-1723-43e9-b29a-2f8e3cb8f5e4
Filesize26KB
MD540d0017b7ac134a1f732cf5248eef691
SHA1b90702602ddf4edb80f0dc5684df68b3d2051fed
SHA25627beeb8cf39a92e4817c30dc78322833364dc9934fd5a1e13f3d95b971e8a39e
SHA512ddfa41dea29072ac44f19741cd4da959e51ad75ef9ac823a18eb36a47f446a3edc0ea54b513b4ff62e19dc74848ec10fc2e90e4e67fdd0de88542937c3ad5b55
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\42vejdix.default-release\datareporting\glean\pending_pings\41ca8de1-622a-4ce6-bb03-f6d6bf7cd150
Filesize982B
MD58aa263e8f2bd012f60313716c6e40872
SHA172ec330d8a967810539358b37182c66c65d1726d
SHA256f51e50f2b392f232605cc7fc6d63795c40e8fcea31fcdb954ef07c8bd039b256
SHA5120de5c7633f3d5b6fb15e76bdc22b3a7d86d52029b9f026edcd08e0a71595c9dcaa1fc59847d40f4088c179943951cc46a23174cac3e9eb2c9a6fa8e64d22ee24
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\42vejdix.default-release\datareporting\glean\pending_pings\a2824aae-adcf-4156-8670-258b6ed038b0
Filesize671B
MD574f27a07aa02cbf7739eccfa747e5972
SHA1b81adee9d62198f1c6c16b485878b29acca23333
SHA25669484a904baae60499121286ddf78b1ef60544eb1b73f39754b4cce3b3fc3b77
SHA512e9410d45e13a25821139e385d33d00990d5506d2e3cfe19e08d2aecddc1fef86f92634d655347d2cecfbf6bae142d99813a3c6bfe3340a2b1cf833232b1d8a6d
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\42vejdix.default-release\gmp-gmpopenh264\2.3.2\gmpopenh264.dll
Filesize1.1MB
MD5842039753bf41fa5e11b3a1383061a87
SHA13e8fe1d7b3ad866b06dca6c7ef1e3c50c406e153
SHA256d88dd3bfc4a558bb943f3caa2e376da3942e48a7948763bf9a38f707c2cd0c1c
SHA512d3320f7ac46327b7b974e74320c4d853e569061cb89ca849cd5d1706330aca629abeb4a16435c541900d839f46ff72dfde04128c450f3e1ee63c025470c19157
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\42vejdix.default-release\gmp-gmpopenh264\2.3.2\gmpopenh264.info
Filesize116B
MD52a461e9eb87fd1955cea740a3444ee7a
SHA1b10755914c713f5a4677494dbe8a686ed458c3c5
SHA2564107f76ba1d9424555f4e8ea0acef69357dfff89dfa5f0ec72aa4f2d489b17bc
SHA51234f73f7bf69d7674907f190f257516e3956f825e35a2f03d58201a5a630310b45df393f2b39669f9369d1ac990505a4b6849a0d34e8c136e1402143b6cedf2d3
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\42vejdix.default-release\gmp-widevinecdm\4.10.2710.0\manifest.json
Filesize372B
MD5bf957ad58b55f64219ab3f793e374316
SHA1a11adc9d7f2c28e04d9b35e23b7616d0527118a1
SHA256bbab6ca07edbed72a966835c7907b3e60c7aa3d48ddea847e5076bd05f4b1eda
SHA51279c179b56e4893fb729b225818ab4b95a50b69666ac41d17aad0b37ab0ca8cd9f0848cbc3c5d9e69e4640a8b261d7ced592eae9bcb0e0b63c05a56e7c477f44e
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\42vejdix.default-release\gmp-widevinecdm\4.10.2710.0\widevinecdm.dll
Filesize17.8MB
MD5daf7ef3acccab478aaa7d6dc1c60f865
SHA1f8246162b97ce4a945feced27b6ea114366ff2ad
SHA256bc40c7821dcd3fea9923c6912ab1183a942c11b7690cfd79ed148ded0228777e
SHA5125840a45cfdb12c005e117608b1e5d946e1b2e76443ed39ba940d7f56de4babeab09bee7e64b903eb82bb37624c0a0ef19e9b59fbe2ce2f0e0b1c7a6015a63f75
-
Filesize
10KB
MD50d61d8147555e3b2198d425a95126e9a
SHA15310251b480a34b5b9557837eaee07d4def0700f
SHA256807a5261630f85c6b7c4f54c51589562a2cec2cda85313a04cf6812d6ce91fe0
SHA512b2d551f9dd9e4139e269c7154fcdbb3b1867a839d94004135fa464a59ad3af43362145e094cea3fee05c03a6ad1861bfb8eca33a0ecad8681cbe904f137c2e5e
-
Filesize
10KB
MD5274c46b0ce854c18b8459aef608b3558
SHA10c1f45786c7281e3404e4353e003ed2e7804dd27
SHA2565613662701fa99edf56df8720191dcc7af918bf2736611ffab4fa4de54b85f4b
SHA512340131294ed2cdd4db96513f7c210a8b1b154c98ebfbd3038182f3e9bcd8544e6bba7742066d936220abebb6417579aada3c80253336732acf8c3e7a340b8b42
-
Filesize
11KB
MD52032ce76df9bcaba9c5472b4da3aa581
SHA15a1ac89be864dbd50b75e8723060a6a32a953a8d
SHA256e91a26f1762b1427efc2b8e9211bca229402b2ccf577921d5bdd0636a392d937
SHA5125047cdbcc9c2b0b9bb1395d91a8d0701365eb3992aa01846b207607de560190aa8949dfaec0d5d73cd061541d0471f280b598f748893202f1c56c459ac2cb19a
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\42vejdix.default-release\sessionstore-backups\recovery.baklz4
Filesize4KB
MD5f50365970da97ae7aed51b872f61b2e6
SHA1be79638bc177b017f49438a24f6d79ae981f645c
SHA256ebb17e59f3c77984374842ee64504cfad5d0bab020cfdb0add84d4f3197a68fe
SHA512ec80c48939d7c108b5f05487dc3d5919a69fb93dc3c92bd2536a38eaf18346198a048709afa06debf4b12eeb607a6cab73f1a098168d9e4224b91b610fdcf246
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\42vejdix.default-release\sessionstore-backups\recovery.baklz4
Filesize1KB
MD57ff8df78993f8d69d6dc5efa7df78690
SHA1af3d8fcfbe040f0b8755e30423c877e3d5a65379
SHA2564f24a85f7d11fad83f88c08a3ff74beebacaeed1636ddab3f5b9605d7603b616
SHA512d8c17268d756f019c1792ef745bb084a857f71d9b4e3074486a094fb2c727fc392b5dc872b68a07cb3c1c25f80033013bb512f8fff807b4c34929f70b4f2fbb5
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\42vejdix.default-release\sessionstore-backups\recovery.baklz4
Filesize4KB
MD5a6ec0470db0eedf68777a266c3434ec0
SHA1ebe90336de315305dcaeb458c18d09fd3f7a0843
SHA256e88c10ccd457916f22c2d92a9de6fbab4d86133939455dd3c8c34b3bf430d2a1
SHA512ca9ff08544c39b4f8f7b9768d5f4df8f3a6c92efc80466e21e620758ac07928c34550d499d29c40f9e1fdf53d350185c5b0743abe667d22fda3cafe7ff9c1be8
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\42vejdix.default-release\storage\permanent\chrome\idb\3870112724rsegmnoittet-es.sqlite
Filesize560KB
MD5a8ecf20c88f70cb5af7e7487d82a202a
SHA1237cb6cdda7dfb0d13a46e8bbead310bcc53e906
SHA256f760ff77fe37a80d2cc9d26af784f1e64c8c6af731223dc7706b0a2670f9d34a
SHA5125ce6642c1c64349052bcd03eebaacdeffa7a898c21449f025eb51d016b7cc0f145f0ce2c903dbd210c543d3cfe2d5126a83e1c5a79b091c20c4e58d0c14b145f
-
Filesize
232B
MD513ebad1e8c79d34a9398ed9febef716a
SHA18966d39da6fb88a08fa5089408f8648395152b98
SHA256ae17e1e595edea574162456e25e59d561d2b935eb5197c4de792e0f0e8eb4fa2
SHA512b87879739901c4c52b7539e7c2bf4c0ab613a0168495104562e0d50614455fd3b9c645ed4df7e0016934688fb5cf2d7f27b8337ed10f681a4798728b7eb52ad2