Analysis
-
max time kernel
62s -
max time network
69s -
platform
windows10-2004_x64 -
resource
win10v2004-20240709-en -
resource tags
arch:x64arch:x86image:win10v2004-20240709-enlocale:en-usos:windows10-2004-x64system -
submitted
29-07-2024 18:38
Behavioral task
behavioral1
Sample
NoFarmForMe3.exe
Resource
win10v2004-20240709-en
General
-
Target
NoFarmForMe3.exe
-
Size
5.2MB
-
MD5
16b5bd2e00f7a54d4a944644344e71e3
-
SHA1
37f1fd61cbbfcee1a7d1535b16d92e7a4dc35f79
-
SHA256
bb948ea7d778f68b7ff3b45f065c57e04542458066cc2689ea84af4a743737a2
-
SHA512
22f12383476a4f701af05122cd7892398525cf43e9cb059cdddf9bdfe79d90510a2164a2a43099058d7fdf6c3aa5f963fd0d1a19308bb4d1a1dc6626dbc997c1
-
SSDEEP
49152:pzFnJmue2EBTx7JrZjTBkFb1jtT9rbFQ5n8BrDLbzpToTRhGJRh5fZZsvRabieba:pzLiGeRu8STvv+lKwOKqk/SACMxn
Malware Config
Signatures
-
Legitimate hosting services abused for malware hosting/C2 1 TTPs 2 IoCs
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Enumerates system info in registry 2 TTPs 3 IoCs
Processes:
msedge.exedescription ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Modifies registry class 33 IoCs
Processes:
NoFarmForMe3.exedescription ioc Process Key created \REGISTRY\USER\S-1-5-21-1176886754-713327781-2233697964-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags NoFarmForMe3.exe Set value (int) \REGISTRY\USER\S-1-5-21-1176886754-713327781-2233697964-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\1\ComDlg\{7D49D726-3C21-4F05-99AA-FDC2C9474656}\LogicalViewMode = "1" NoFarmForMe3.exe Key created \REGISTRY\USER\S-1-5-21-1176886754-713327781-2233697964-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell NoFarmForMe3.exe Set value (data) \REGISTRY\USER\S-1-5-21-1176886754-713327781-2233697964-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\0\0\MRUListEx = ffffffff NoFarmForMe3.exe Key created \REGISTRY\USER\S-1-5-21-1176886754-713327781-2233697964-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\1 NoFarmForMe3.exe Set value (data) \REGISTRY\USER\S-1-5-21-1176886754-713327781-2233697964-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\1\ComDlg\{7D49D726-3C21-4F05-99AA-FDC2C9474656}\Sort = 000000000000000000000000000000000100000030f125b7ef471a10a5f102608c9eebac0a00000001000000 NoFarmForMe3.exe Set value (int) \REGISTRY\USER\S-1-5-21-1176886754-713327781-2233697964-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\1\ComDlg\{7D49D726-3C21-4F05-99AA-FDC2C9474656}\FFlags = "1" NoFarmForMe3.exe Key created \REGISTRY\USER\S-1-5-21-1176886754-713327781-2233697964-1000_Classes\Local Settings NoFarmForMe3.exe Set value (data) \REGISTRY\USER\S-1-5-21-1176886754-713327781-2233697964-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\MRUListEx = ffffffff NoFarmForMe3.exe Key created \REGISTRY\USER\S-1-5-21-1176886754-713327781-2233697964-1000_Classes\CLSID\{018D5C66-4533-4307-9B53-224DE2ED1FE6}\Instance\ NoFarmForMe3.exe Set value (int) \REGISTRY\USER\S-1-5-21-1176886754-713327781-2233697964-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\1\ComDlg\{7D49D726-3C21-4F05-99AA-FDC2C9474656}\Mode = "4" NoFarmForMe3.exe Set value (int) \REGISTRY\USER\S-1-5-21-1176886754-713327781-2233697964-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\1\ComDlg\{7D49D726-3C21-4F05-99AA-FDC2C9474656}\GroupByKey:PID = "0" NoFarmForMe3.exe Set value (int) \REGISTRY\USER\S-1-5-21-1176886754-713327781-2233697964-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\1\ComDlg\{7D49D726-3C21-4F05-99AA-FDC2C9474656}\GroupByDirection = "1" NoFarmForMe3.exe Set value (data) \REGISTRY\USER\S-1-5-21-1176886754-713327781-2233697964-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\NodeSlots = 02 NoFarmForMe3.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{4336a54d-038b-4685-ab02-99bb52d3fb8b}\Instance\ NoFarmForMe3.exe Key created \REGISTRY\USER\S-1-5-21-1176886754-713327781-2233697964-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\1\ComDlg\{7D49D726-3C21-4F05-99AA-FDC2C9474656} NoFarmForMe3.exe Key created \REGISTRY\USER\S-1-5-21-1176886754-713327781-2233697964-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\0\0 NoFarmForMe3.exe Set value (data) \REGISTRY\USER\S-1-5-21-1176886754-713327781-2233697964-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\0\MRUListEx = 00000000ffffffff NoFarmForMe3.exe Set value (int) \REGISTRY\USER\S-1-5-21-1176886754-713327781-2233697964-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\0\0\NodeSlot = "1" NoFarmForMe3.exe Set value (data) \REGISTRY\USER\S-1-5-21-1176886754-713327781-2233697964-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\1\ComDlg\{7D49D726-3C21-4F05-99AA-FDC2C9474656}\ColInfo = 00000000000000000000000000000000fddfdffd100000000000000000000000040000001800000030f125b7ef471a10a5f102608c9eebac0a0000001001000030f125b7ef471a10a5f102608c9eebac0e0000009000000030f125b7ef471a10a5f102608c9eebac040000007800000030f125b7ef471a10a5f102608c9eebac0c00000050000000 NoFarmForMe3.exe Set value (data) \REGISTRY\USER\S-1-5-21-1176886754-713327781-2233697964-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\0 = 14001f50e04fd020ea3a6910a2d808002b30309d0000 NoFarmForMe3.exe Set value (data) \REGISTRY\USER\S-1-5-21-1176886754-713327781-2233697964-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\0\0 = 14002e80922b16d365937a46956b92703aca08af0000 NoFarmForMe3.exe Set value (int) \REGISTRY\USER\S-1-5-21-1176886754-713327781-2233697964-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\1\ComDlg\{7D49D726-3C21-4F05-99AA-FDC2C9474656}\FFlags = "1092616257" NoFarmForMe3.exe Set value (int) \REGISTRY\USER\S-1-5-21-1176886754-713327781-2233697964-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\1\ComDlg\{7D49D726-3C21-4F05-99AA-FDC2C9474656}\IconSize = "16" NoFarmForMe3.exe Set value (int) \REGISTRY\USER\S-1-5-21-1176886754-713327781-2233697964-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\1\ComDlg\{7D49D726-3C21-4F05-99AA-FDC2C9474656}\GroupView = "0" NoFarmForMe3.exe Key created \REGISTRY\USER\S-1-5-21-1176886754-713327781-2233697964-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\0 NoFarmForMe3.exe Key created \REGISTRY\USER\S-1-5-21-1176886754-713327781-2233697964-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\1\Shell NoFarmForMe3.exe Set value (str) \REGISTRY\USER\S-1-5-21-1176886754-713327781-2233697964-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\1\ComDlg\{7D49D726-3C21-4F05-99AA-FDC2C9474656}\GroupByKey:FMTID = "{00000000-0000-0000-0000-000000000000}" NoFarmForMe3.exe Key created \REGISTRY\USER\S-1-5-21-1176886754-713327781-2233697964-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU NoFarmForMe3.exe Set value (data) \REGISTRY\USER\S-1-5-21-1176886754-713327781-2233697964-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\NodeSlots NoFarmForMe3.exe Set value (data) \REGISTRY\USER\S-1-5-21-1176886754-713327781-2233697964-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\MRUListEx = 00000000ffffffff NoFarmForMe3.exe Set value (str) \REGISTRY\USER\S-1-5-21-1176886754-713327781-2233697964-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\1\Shell\SniffedFolderType = "Documents" NoFarmForMe3.exe Key created \REGISTRY\USER\S-1-5-21-1176886754-713327781-2233697964-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\1\ComDlg NoFarmForMe3.exe -
Suspicious behavior: EnumeratesProcesses 6 IoCs
Processes:
msedge.exemsedge.exeidentity_helper.exepid Process 2296 msedge.exe 2296 msedge.exe 3192 msedge.exe 3192 msedge.exe 3108 identity_helper.exe 3108 identity_helper.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 6 IoCs
Processes:
msedge.exepid Process 3192 msedge.exe 3192 msedge.exe 3192 msedge.exe 3192 msedge.exe 3192 msedge.exe 3192 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
Processes:
msedge.exepid Process 3192 msedge.exe 3192 msedge.exe 3192 msedge.exe 3192 msedge.exe 3192 msedge.exe 3192 msedge.exe 3192 msedge.exe 3192 msedge.exe 3192 msedge.exe 3192 msedge.exe 3192 msedge.exe 3192 msedge.exe 3192 msedge.exe 3192 msedge.exe 3192 msedge.exe 3192 msedge.exe 3192 msedge.exe 3192 msedge.exe 3192 msedge.exe 3192 msedge.exe 3192 msedge.exe 3192 msedge.exe 3192 msedge.exe 3192 msedge.exe 3192 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
Processes:
msedge.exepid Process 3192 msedge.exe 3192 msedge.exe 3192 msedge.exe 3192 msedge.exe 3192 msedge.exe 3192 msedge.exe 3192 msedge.exe 3192 msedge.exe 3192 msedge.exe 3192 msedge.exe 3192 msedge.exe 3192 msedge.exe 3192 msedge.exe 3192 msedge.exe 3192 msedge.exe 3192 msedge.exe 3192 msedge.exe 3192 msedge.exe 3192 msedge.exe 3192 msedge.exe 3192 msedge.exe 3192 msedge.exe 3192 msedge.exe 3192 msedge.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
Processes:
NoFarmForMe3.exepid Process 1640 NoFarmForMe3.exe -
Suspicious use of WriteProcessMemory 64 IoCs
Processes:
NoFarmForMe3.exemsedge.exedescription pid Process procid_target PID 1640 wrote to memory of 3192 1640 NoFarmForMe3.exe 95 PID 1640 wrote to memory of 3192 1640 NoFarmForMe3.exe 95 PID 3192 wrote to memory of 1700 3192 msedge.exe 96 PID 3192 wrote to memory of 1700 3192 msedge.exe 96 PID 3192 wrote to memory of 2044 3192 msedge.exe 97 PID 3192 wrote to memory of 2044 3192 msedge.exe 97 PID 3192 wrote to memory of 2044 3192 msedge.exe 97 PID 3192 wrote to memory of 2044 3192 msedge.exe 97 PID 3192 wrote to memory of 2044 3192 msedge.exe 97 PID 3192 wrote to memory of 2044 3192 msedge.exe 97 PID 3192 wrote to memory of 2044 3192 msedge.exe 97 PID 3192 wrote to memory of 2044 3192 msedge.exe 97 PID 3192 wrote to memory of 2044 3192 msedge.exe 97 PID 3192 wrote to memory of 2044 3192 msedge.exe 97 PID 3192 wrote to memory of 2044 3192 msedge.exe 97 PID 3192 wrote to memory of 2044 3192 msedge.exe 97 PID 3192 wrote to memory of 2044 3192 msedge.exe 97 PID 3192 wrote to memory of 2044 3192 msedge.exe 97 PID 3192 wrote to memory of 2044 3192 msedge.exe 97 PID 3192 wrote to memory of 2044 3192 msedge.exe 97 PID 3192 wrote to memory of 2044 3192 msedge.exe 97 PID 3192 wrote to memory of 2044 3192 msedge.exe 97 PID 3192 wrote to memory of 2044 3192 msedge.exe 97 PID 3192 wrote to memory of 2044 3192 msedge.exe 97 PID 3192 wrote to memory of 2044 3192 msedge.exe 97 PID 3192 wrote to memory of 2044 3192 msedge.exe 97 PID 3192 wrote to memory of 2044 3192 msedge.exe 97 PID 3192 wrote to memory of 2044 3192 msedge.exe 97 PID 3192 wrote to memory of 2044 3192 msedge.exe 97 PID 3192 wrote to memory of 2044 3192 msedge.exe 97 PID 3192 wrote to memory of 2044 3192 msedge.exe 97 PID 3192 wrote to memory of 2044 3192 msedge.exe 97 PID 3192 wrote to memory of 2044 3192 msedge.exe 97 PID 3192 wrote to memory of 2044 3192 msedge.exe 97 PID 3192 wrote to memory of 2044 3192 msedge.exe 97 PID 3192 wrote to memory of 2044 3192 msedge.exe 97 PID 3192 wrote to memory of 2044 3192 msedge.exe 97 PID 3192 wrote to memory of 2044 3192 msedge.exe 97 PID 3192 wrote to memory of 2044 3192 msedge.exe 97 PID 3192 wrote to memory of 2044 3192 msedge.exe 97 PID 3192 wrote to memory of 2044 3192 msedge.exe 97 PID 3192 wrote to memory of 2044 3192 msedge.exe 97 PID 3192 wrote to memory of 2044 3192 msedge.exe 97 PID 3192 wrote to memory of 2044 3192 msedge.exe 97 PID 3192 wrote to memory of 2296 3192 msedge.exe 98 PID 3192 wrote to memory of 2296 3192 msedge.exe 98 PID 3192 wrote to memory of 3092 3192 msedge.exe 99 PID 3192 wrote to memory of 3092 3192 msedge.exe 99 PID 3192 wrote to memory of 3092 3192 msedge.exe 99 PID 3192 wrote to memory of 3092 3192 msedge.exe 99 PID 3192 wrote to memory of 3092 3192 msedge.exe 99 PID 3192 wrote to memory of 3092 3192 msedge.exe 99 PID 3192 wrote to memory of 3092 3192 msedge.exe 99 PID 3192 wrote to memory of 3092 3192 msedge.exe 99 PID 3192 wrote to memory of 3092 3192 msedge.exe 99 PID 3192 wrote to memory of 3092 3192 msedge.exe 99 PID 3192 wrote to memory of 3092 3192 msedge.exe 99 PID 3192 wrote to memory of 3092 3192 msedge.exe 99 PID 3192 wrote to memory of 3092 3192 msedge.exe 99 PID 3192 wrote to memory of 3092 3192 msedge.exe 99 PID 3192 wrote to memory of 3092 3192 msedge.exe 99 PID 3192 wrote to memory of 3092 3192 msedge.exe 99 PID 3192 wrote to memory of 3092 3192 msedge.exe 99 PID 3192 wrote to memory of 3092 3192 msedge.exe 99
Processes
-
C:\Users\Admin\AppData\Local\Temp\NoFarmForMe3.exe"C:\Users\Admin\AppData\Local\Temp\NoFarmForMe3.exe"1⤵
- Modifies registry class
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1640 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument https://github.com/Tiniifan/NoFarmForMe2⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:3192 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xe0,0x108,0x7ffda00d46f8,0x7ffda00d4708,0x7ffda00d47183⤵PID:1700
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2160,14173857270225884662,9312558149171032920,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2168 /prefetch:23⤵PID:2044
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2160,14173857270225884662,9312558149171032920,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2224 /prefetch:33⤵
- Suspicious behavior: EnumeratesProcesses
PID:2296
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2160,14173857270225884662,9312558149171032920,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2880 /prefetch:83⤵PID:3092
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2160,14173857270225884662,9312558149171032920,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3432 /prefetch:13⤵PID:4780
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2160,14173857270225884662,9312558149171032920,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3440 /prefetch:13⤵PID:1620
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2160,14173857270225884662,9312558149171032920,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5568 /prefetch:83⤵PID:2136
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2160,14173857270225884662,9312558149171032920,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5568 /prefetch:83⤵
- Suspicious behavior: EnumeratesProcesses
PID:3108
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2160,14173857270225884662,9312558149171032920,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5584 /prefetch:13⤵PID:2776
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2160,14173857270225884662,9312558149171032920,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5600 /prefetch:13⤵PID:4460
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2160,14173857270225884662,9312558149171032920,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5700 /prefetch:13⤵PID:2136
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2160,14173857270225884662,9312558149171032920,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5668 /prefetch:13⤵PID:3112
-
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:4584
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:876
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD510fa19df148444a77ceec60cabd2ce21
SHA1685b599c497668166ede4945d8885d204fd8d70f
SHA256c3b5deb970d0f06a05c8111da90330ffe25da195aafa4e182211669484d1964b
SHA5123518ce16fef66c59e0bdb772db51aeaa9042c44ca399be61ca3d9979351f93655393236711cf2b1988d5f90a5b9318a7569a8cef3374fc745a8f9aa8323691ef
-
Filesize
152B
MD575c9f57baeefeecd6c184627de951c1e
SHA152e0468e13cbfc9f15fc62cc27ce14367a996cff
SHA256648ba270261690bb792f95d017e134d81a612ef4fc76dc41921c9e5b8f46d98f
SHA512c4570cc4bb4894de3ecc8eee6cd8bfa5809ea401ceef683557fb170175ff4294cc21cdc6834db4e79e5e82d3bf16105894fff83290d26343423324bc486d4a15
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index
Filesize2KB
MD5352d8bcda744de0abc58949b68c77089
SHA1f3143396fa110f1a9f92ef59cedd9f0cb3ad1acf
SHA2565e7e2d318bf2772b74bf051797769c78649754828cfd55186146e38e441a55f6
SHA5128018c4140264d7bf31774f2e90f443133c05d3208df9d3eb8cb3deb4d50614e025e3dfedc6da2eb0a2df07e96526a284da1398d043ad5d329e56a182eee91307
-
Filesize
111B
MD5807419ca9a4734feaf8d8563a003b048
SHA1a723c7d60a65886ffa068711f1e900ccc85922a6
SHA256aa10bf07b0d265bed28f2a475f3564d8ddb5e4d4ffee0ab6f3a0cc564907b631
SHA512f10d496ae75db5ba412bd9f17bf0c7da7632db92a3fabf7f24071e40f5759c6a875ad8f3a72bad149da58b3da3b816077df125d0d9f3544adba68c66353d206c
-
Filesize
6KB
MD57e1b16c72e4fd2334b793911f81929db
SHA14d715227f8c72f4307df1cfd6bc7439dc4e91ec8
SHA2563c87aba52724537b0e2c8c4ae159970a008ff23dd5f398c876e2e129584a216a
SHA512a3be73de3d1048b9c03526bad4fd649e4422835c074524c937821d81052a9f1be0177a46202facf2831e44b556a9aecf2936d6390b85b3510a054907b0262a87
-
Filesize
5KB
MD59040c84641e8c37ffd97c37528ba0711
SHA13898d6e5fe2ea411cc4db36f9ea4d65e0a3c08d6
SHA256834d6bfb120e23af1915115eeda26c7db54ee0b20f3c1ca8dbcc98c073207542
SHA512aec5f4633488104426c22179fa83e58f6180645e44da80b6aa984b5c6c23bf33ea04ac8e5b9750d48fd817acf62c51a5780eda477f5e0ee39664739907af73ad
-
Filesize
16B
MD5206702161f94c5cd39fadd03f4014d98
SHA1bd8bfc144fb5326d21bd1531523d9fb50e1b600a
SHA2561005a525006f148c86efcbfb36c6eac091b311532448010f70f7de9a68007167
SHA5120af09f26941b11991c750d1a2b525c39a8970900e98cba96fd1b55dbf93fee79e18b8aab258f48b4f7bda40d059629bc7770d84371235cdb1352a4f17f80e145
-
Filesize
16B
MD546295cac801e5d4857d09837238a6394
SHA144e0fa1b517dbf802b18faf0785eeea6ac51594b
SHA2560f1bad70c7bd1e0a69562853ec529355462fcd0423263a3d39d6d0d70b780443
SHA5128969402593f927350e2ceb4b5bc2a277f3754697c1961e3d6237da322257fbab42909e1a742e22223447f3a4805f8d8ef525432a7c3515a549e984d3eff72b23
-
Filesize
11KB
MD5a4fd8e4e4f9c06718efd639b7675853a
SHA1584d842671944b3fbe7a6d046ee0df79770b03c3
SHA25666236a5b91691c8373aab0b8f6ddb7de761d8dc15ac08eeb97f78bef85bf4c05
SHA512b22c3176b979d8b309e80e70560450fece44cc9ff260a0fefb6c119e7dd57bce6e03be8c03f7c62dbfc62deb01539cd39519bb389a1ae38a1898cce665f3fb32
-
Filesize
11KB
MD53402ac4a478d38ea00d6422c9b63e492
SHA1133ffe0e1af5401eafdcb9db9043335b34d75e28
SHA2563298caa2c5692d9d59d860cc97a7600635d4fd15af43e60f88a517c0b9ea771c
SHA51265f55c3e857b3a9ded67aaa6205a9f196d09a3c7e224d92cd7d3892f5cf54ec3ea537f2fe8d59add6246456bf9f91abcbf11efd1d66e02ce85d9170a0d93d23e
-
MD5
d41d8cd98f00b204e9800998ecf8427e
SHA1da39a3ee5e6b4b0d3255bfef95601890afd80709
SHA256e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855
SHA512cf83e1357eefb8bdf1542850d66d8007d620e4050b5715dc83f4a921d36ce9ce47d0d13c5d85f2b0ff8318d2877eec2f63b931bd47417a81a538327af927da3e