Overview
overview
10Static
static
7Ardamax_Ke...ch.exe
windows7-x64
10Ardamax_Ke...ch.exe
windows10-2004-x64
10Ardamax_Ke...kl.exe
windows7-x64
7Ardamax_Ke...kl.exe
windows10-2004-x64
7$PLUGINSDI...ol.dll
windows7-x64
5$PLUGINSDI...ol.dll
windows10-2004-x64
5$PLUGINSDI...ll.dll
windows7-x64
3$PLUGINSDI...ll.dll
windows10-2004-x64
3$PLUGINSDI...em.dll
windows7-x64
3$PLUGINSDI...em.dll
windows10-2004-x64
3$PLUGINSDIR/UAC.dll
windows7-x64
3$PLUGINSDIR/UAC.dll
windows10-2004-x64
3$PLUGINSDI...gs.dll
windows7-x64
3$PLUGINSDI...gs.dll
windows10-2004-x64
3$PLUGINSDI...ec.dll
windows7-x64
3$PLUGINSDI...ec.dll
windows10-2004-x64
3Uninstall.exe
windows7-x64
7Uninstall.exe
windows10-2004-x64
7$PLUGINSDIR/UAC.dll
windows7-x64
3$PLUGINSDIR/UAC.dll
windows10-2004-x64
3lzma.exe
windows7-x64
1lzma.exe
windows10-2004-x64
3使用帮助.url
windows7-x64
1使用帮助.url
windows10-2004-x64
1访问下�...��.url
windows7-x64
1访问下�...��.url
windows10-2004-x64
1Analysis
-
max time kernel
139s -
max time network
149s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
10-10-2024 21:07
Behavioral task
behavioral1
Sample
Ardamax_Keylogger/ardamax.keylogger.4.0.1-patch.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
Ardamax_Keylogger/ardamax.keylogger.4.0.1-patch.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral3
Sample
Ardamax_Keylogger/install_akl.exe
Resource
win7-20240903-en
Behavioral task
behavioral4
Sample
Ardamax_Keylogger/install_akl.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral5
Sample
$PLUGINSDIR/AccessControl.dll
Resource
win7-20240903-en
Behavioral task
behavioral6
Sample
$PLUGINSDIR/AccessControl.dll
Resource
win10v2004-20241007-en
Behavioral task
behavioral7
Sample
$PLUGINSDIR/DcryptDll.dll
Resource
win7-20241010-en
Behavioral task
behavioral8
Sample
$PLUGINSDIR/DcryptDll.dll
Resource
win10v2004-20241007-en
Behavioral task
behavioral9
Sample
$PLUGINSDIR/System.dll
Resource
win7-20241010-en
Behavioral task
behavioral10
Sample
$PLUGINSDIR/System.dll
Resource
win10v2004-20241007-en
Behavioral task
behavioral11
Sample
$PLUGINSDIR/UAC.dll
Resource
win7-20240708-en
Behavioral task
behavioral12
Sample
$PLUGINSDIR/UAC.dll
Resource
win10v2004-20241007-en
Behavioral task
behavioral13
Sample
$PLUGINSDIR/nsDialogs.dll
Resource
win7-20240903-en
Behavioral task
behavioral14
Sample
$PLUGINSDIR/nsDialogs.dll
Resource
win10v2004-20241007-en
Behavioral task
behavioral15
Sample
$PLUGINSDIR/nsExec.dll
Resource
win7-20240903-en
Behavioral task
behavioral16
Sample
$PLUGINSDIR/nsExec.dll
Resource
win10v2004-20241007-en
Behavioral task
behavioral17
Sample
Uninstall.exe
Resource
win7-20240903-en
Behavioral task
behavioral18
Sample
Uninstall.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral19
Sample
$PLUGINSDIR/UAC.dll
Resource
win7-20240903-en
Behavioral task
behavioral20
Sample
$PLUGINSDIR/UAC.dll
Resource
win10v2004-20241007-en
Behavioral task
behavioral21
Sample
lzma.exe
Resource
win7-20241010-en
Behavioral task
behavioral22
Sample
lzma.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral23
Sample
使用帮助.url
Resource
win7-20240708-en
Behavioral task
behavioral24
Sample
使用帮助.url
Resource
win10v2004-20241007-en
Behavioral task
behavioral25
Sample
访问下载之家.url
Resource
win7-20240708-en
Behavioral task
behavioral26
Sample
访问下载之家.url
Resource
win10v2004-20241007-en
General
-
Target
Ardamax_Keylogger/install_akl.exe
-
Size
1.5MB
-
MD5
a3dc14d015725f199bccbecf8bd73501
-
SHA1
41bab91889fe2455eed3626e3aa7a4e8c5cfa33b
-
SHA256
90827393d6025ff1d85877ac5bc662b524bcff7a700fd55d4da606fbb349b944
-
SHA512
5871b7490cf8a2db15c7b55766289d2df6081e4353e604e8dad9abac7f7eacff83344c7da25fd1e345f1e826f036f999b06279c286d97275d1c0c2b80ad8d805
-
SSDEEP
24576:sX+kKRjb2XRA9jSrfGlDnYtbGVKGhFRVAP1ZUw6kOS5dG4GKuQ0:4pKRH2oSrfIDn4yVKGbRu9ZU5kOS5cFz
Malware Config
Signatures
-
Loads dropped DLL 5 IoCs
pid Process 2780 install_akl.exe 2780 install_akl.exe 2780 install_akl.exe 2780 install_akl.exe 2780 install_akl.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language install_akl.exe -
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 3936 msedge.exe 3936 msedge.exe 4900 msedge.exe 4900 msedge.exe 4356 identity_helper.exe 4356 identity_helper.exe 400 msedge.exe 400 msedge.exe 400 msedge.exe 400 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 11 IoCs
pid Process 4900 msedge.exe 4900 msedge.exe 4900 msedge.exe 4900 msedge.exe 4900 msedge.exe 4900 msedge.exe 4900 msedge.exe 4900 msedge.exe 4900 msedge.exe 4900 msedge.exe 4900 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 4900 msedge.exe 4900 msedge.exe 4900 msedge.exe 4900 msedge.exe 4900 msedge.exe 4900 msedge.exe 4900 msedge.exe 4900 msedge.exe 4900 msedge.exe 4900 msedge.exe 4900 msedge.exe 4900 msedge.exe 4900 msedge.exe 4900 msedge.exe 4900 msedge.exe 4900 msedge.exe 4900 msedge.exe 4900 msedge.exe 4900 msedge.exe 4900 msedge.exe 4900 msedge.exe 4900 msedge.exe 4900 msedge.exe 4900 msedge.exe 4900 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 4900 msedge.exe 4900 msedge.exe 4900 msedge.exe 4900 msedge.exe 4900 msedge.exe 4900 msedge.exe 4900 msedge.exe 4900 msedge.exe 4900 msedge.exe 4900 msedge.exe 4900 msedge.exe 4900 msedge.exe 4900 msedge.exe 4900 msedge.exe 4900 msedge.exe 4900 msedge.exe 4900 msedge.exe 4900 msedge.exe 4900 msedge.exe 4900 msedge.exe 4900 msedge.exe 4900 msedge.exe 4900 msedge.exe 4900 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2780 wrote to memory of 4900 2780 install_akl.exe 86 PID 2780 wrote to memory of 4900 2780 install_akl.exe 86 PID 4900 wrote to memory of 372 4900 msedge.exe 87 PID 4900 wrote to memory of 372 4900 msedge.exe 87 PID 4900 wrote to memory of 4564 4900 msedge.exe 88 PID 4900 wrote to memory of 4564 4900 msedge.exe 88 PID 4900 wrote to memory of 4564 4900 msedge.exe 88 PID 4900 wrote to memory of 4564 4900 msedge.exe 88 PID 4900 wrote to memory of 4564 4900 msedge.exe 88 PID 4900 wrote to memory of 4564 4900 msedge.exe 88 PID 4900 wrote to memory of 4564 4900 msedge.exe 88 PID 4900 wrote to memory of 4564 4900 msedge.exe 88 PID 4900 wrote to memory of 4564 4900 msedge.exe 88 PID 4900 wrote to memory of 4564 4900 msedge.exe 88 PID 4900 wrote to memory of 4564 4900 msedge.exe 88 PID 4900 wrote to memory of 4564 4900 msedge.exe 88 PID 4900 wrote to memory of 4564 4900 msedge.exe 88 PID 4900 wrote to memory of 4564 4900 msedge.exe 88 PID 4900 wrote to memory of 4564 4900 msedge.exe 88 PID 4900 wrote to memory of 4564 4900 msedge.exe 88 PID 4900 wrote to memory of 4564 4900 msedge.exe 88 PID 4900 wrote to memory of 4564 4900 msedge.exe 88 PID 4900 wrote to memory of 4564 4900 msedge.exe 88 PID 4900 wrote to memory of 4564 4900 msedge.exe 88 PID 4900 wrote to memory of 4564 4900 msedge.exe 88 PID 4900 wrote to memory of 4564 4900 msedge.exe 88 PID 4900 wrote to memory of 4564 4900 msedge.exe 88 PID 4900 wrote to memory of 4564 4900 msedge.exe 88 PID 4900 wrote to memory of 4564 4900 msedge.exe 88 PID 4900 wrote to memory of 4564 4900 msedge.exe 88 PID 4900 wrote to memory of 4564 4900 msedge.exe 88 PID 4900 wrote to memory of 4564 4900 msedge.exe 88 PID 4900 wrote to memory of 4564 4900 msedge.exe 88 PID 4900 wrote to memory of 4564 4900 msedge.exe 88 PID 4900 wrote to memory of 4564 4900 msedge.exe 88 PID 4900 wrote to memory of 4564 4900 msedge.exe 88 PID 4900 wrote to memory of 4564 4900 msedge.exe 88 PID 4900 wrote to memory of 4564 4900 msedge.exe 88 PID 4900 wrote to memory of 4564 4900 msedge.exe 88 PID 4900 wrote to memory of 4564 4900 msedge.exe 88 PID 4900 wrote to memory of 4564 4900 msedge.exe 88 PID 4900 wrote to memory of 4564 4900 msedge.exe 88 PID 4900 wrote to memory of 4564 4900 msedge.exe 88 PID 4900 wrote to memory of 4564 4900 msedge.exe 88 PID 4900 wrote to memory of 3936 4900 msedge.exe 89 PID 4900 wrote to memory of 3936 4900 msedge.exe 89 PID 4900 wrote to memory of 1980 4900 msedge.exe 90 PID 4900 wrote to memory of 1980 4900 msedge.exe 90 PID 4900 wrote to memory of 1980 4900 msedge.exe 90 PID 4900 wrote to memory of 1980 4900 msedge.exe 90 PID 4900 wrote to memory of 1980 4900 msedge.exe 90 PID 4900 wrote to memory of 1980 4900 msedge.exe 90 PID 4900 wrote to memory of 1980 4900 msedge.exe 90 PID 4900 wrote to memory of 1980 4900 msedge.exe 90 PID 4900 wrote to memory of 1980 4900 msedge.exe 90 PID 4900 wrote to memory of 1980 4900 msedge.exe 90 PID 4900 wrote to memory of 1980 4900 msedge.exe 90 PID 4900 wrote to memory of 1980 4900 msedge.exe 90 PID 4900 wrote to memory of 1980 4900 msedge.exe 90 PID 4900 wrote to memory of 1980 4900 msedge.exe 90 PID 4900 wrote to memory of 1980 4900 msedge.exe 90 PID 4900 wrote to memory of 1980 4900 msedge.exe 90 PID 4900 wrote to memory of 1980 4900 msedge.exe 90 PID 4900 wrote to memory of 1980 4900 msedge.exe 90
Processes
-
C:\Users\Admin\AppData\Local\Temp\Ardamax_Keylogger\install_akl.exe"C:\Users\Admin\AppData\Local\Temp\Ardamax_Keylogger\install_akl.exe"1⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2780 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument http://www.ardamax.com/keylogger/2⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:4900 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffd1fe546f8,0x7ffd1fe54708,0x7ffd1fe547183⤵PID:372
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2104,13666623226370386800,10762469044737509940,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2100 /prefetch:23⤵PID:4564
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2104,13666623226370386800,10762469044737509940,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2460 /prefetch:33⤵
- Suspicious behavior: EnumeratesProcesses
PID:3936
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2104,13666623226370386800,10762469044737509940,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2764 /prefetch:83⤵PID:1980
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2104,13666623226370386800,10762469044737509940,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3264 /prefetch:13⤵PID:3768
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2104,13666623226370386800,10762469044737509940,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3284 /prefetch:13⤵PID:5024
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2104,13666623226370386800,10762469044737509940,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4912 /prefetch:83⤵PID:4228
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2104,13666623226370386800,10762469044737509940,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4912 /prefetch:83⤵
- Suspicious behavior: EnumeratesProcesses
PID:4356
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2104,13666623226370386800,10762469044737509940,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4848 /prefetch:13⤵PID:2136
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2104,13666623226370386800,10762469044737509940,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5152 /prefetch:13⤵PID:4596
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2104,13666623226370386800,10762469044737509940,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5488 /prefetch:13⤵PID:3428
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2104,13666623226370386800,10762469044737509940,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5516 /prefetch:13⤵PID:3956
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2104,13666623226370386800,10762469044737509940,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4568 /prefetch:13⤵PID:4192
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2104,13666623226370386800,10762469044737509940,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=13 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3856 /prefetch:13⤵PID:1576
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2104,13666623226370386800,10762469044737509940,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=14 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3996 /prefetch:13⤵PID:1548
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2104,13666623226370386800,10762469044737509940,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=15 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=1260 /prefetch:13⤵PID:4652
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2104,13666623226370386800,10762469044737509940,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=16 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5428 /prefetch:13⤵PID:4904
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2104,13666623226370386800,10762469044737509940,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=5800 /prefetch:23⤵
- Suspicious behavior: EnumeratesProcesses
PID:400
-
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:3584
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:1768
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD561cef8e38cd95bf003f5fdd1dc37dae1
SHA111f2f79ecb349344c143eea9a0fed41891a3467f
SHA256ae671613623b4477fbd5daf1fd2d148ae2a09ddcc3804b2b6d4ffcb60b317e3e
SHA5126fb9b333fe0e8fde19fdd0bd01a1990a4e60a87c0a02bc8297da1206e42f8690d06b030308e58c862e9e77714a585eed7cc1627590d99a10aeb77fc0dd3d864d
-
Filesize
152B
MD50a9dc42e4013fc47438e96d24beb8eff
SHA1806ab26d7eae031a58484188a7eb1adab06457fc
SHA25658d66151799526b3fa372552cd99b385415d9e9a119302b99aadc34dd51dd151
SHA512868d6b421ae2501a519595d0c34ddef25b2a98b082c5203da8349035f1f6764ddf183197f1054e7e86a752c71eccbc0649e515b63c55bc18cf5f0592397e258f
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index
Filesize120B
MD5483be4101debd870d0b481f8c0735b05
SHA1fe771a71e773d47c2dfc2784b7e81ee649727f5f
SHA256c193d74fe694bd5463a811ade0d3b465212a6fd46a8524062993781c56ced656
SHA512ef52f6d918995569d0325690b322b8504da59d34ea13912034447e75e805df3952d283fd4d1a620bc5848fda7f078578e6e0c82021caefaff8e6ed3aff5b2510
-
Filesize
812B
MD5fbb8c8e6c620614f38860f95b3c62b5c
SHA1c62b28ec38aaf7c4549c951eda5836f86962ad63
SHA2561fae76ecb7ded6f39825fa1fbbe9a58115dffb02ddd8a29a203021d4e480c2a2
SHA51267991121b52840915fdab948446c79716643258bc005e1704cf2a57b680188702a7d1c3ac48b74c87e6fec92ffaca9d97ed9b9ed15794273aca667dda6643cb6
-
Filesize
7KB
MD5c16ad0fa167ca49916f5b565289957cd
SHA13a1a33b5a0ec67fa45b882c604240a0552c87402
SHA256cefd6ac68d140923008cbc6ae5d955a5dbe447aac49b16e65cd11a3a6887b989
SHA5121901917b68873247b5a82b047186a921c2d3bc02d0a9c61444159103a041341c2603ccac67bb644160044c2c62dfc95e6e1710e656da1f64d914ff10c570c65b
-
Filesize
6KB
MD55ecb3e9fa43a048c81b32115a65a6cd9
SHA100d4934201d4eb292af5442b96e53a1b86e38de1
SHA25640692d2e09f17448f0152bab7a2a79cce93128ca61aec0cb7e138f48b579deff
SHA512ff7400c4c5d8a9628e82d50b699f1d333f9c0a41d3c9b191a284e1a70e8d3078566098d9b7008219e71e99ec7eecc35098710346ee0b9ce56ee85afcc285b464
-
Filesize
6KB
MD5c059255ae47f2f8c76411e8b52510d46
SHA1cba404386e691aee8936e7df914a66fc7264546b
SHA256c1db8e9ce7466dbbe559fd5ca3828ef19c02ddb1b123918855c871c00ab45c13
SHA512c65dae0a342a9643bae56829f1032048ab6915aaa9a3cdab420de812fb437d3c03b1649ce0138186bb35b33f8177dba6c25df7bec2745aa0947fa95b6a8cdfdb
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
10KB
MD5c52fdddcc7a7b4f065565a9fde98eced
SHA14994ffeee4ac79e34519f76a16d9aefe9ed1d42b
SHA25613db97a448b19d36809040c66d1c8b9f8ba414c63cbcd382f1bb5c37e9c5638d
SHA51298a497c69c78999518e3f2169f204c53c98ee2c4be83dbab7734f2efaa8d7a5f7fd33f91ac5b0c7b089710c4c3fe5b082746949246f44b4f51e7ea9f29d91aaa
-
Filesize
11KB
MD5c17103ae9072a06da581dec998343fc1
SHA1b72148c6bdfaada8b8c3f950e610ee7cf1da1f8d
SHA256dc58d8ad81cacb0c1ed72e33bff8f23ea40b5252b5bb55d393a0903e6819ae2f
SHA512d32a71aaef18e993f28096d536e41c4d016850721b31171513ce28bbd805a54fd290b7c3e9d935f72e676a1acfb4f0dcc89d95040a0dd29f2b6975855c18986f
-
Filesize
13KB
MD5431e5b960aa15af5d153bae6ba6b7e87
SHA1e090c90be02e0bafe5f3d884c0525d8f87b3db40
SHA256a6d956f28c32e8aa2ab2df13ef52637e23113fab41225031e7a3d47390a6cf13
SHA512f1526c7e4d0fce8ab378e43e89aafb1d7e9d57ef5324501e804091e99331dd2544912181d6d4a07d30416fe17c892867c593aee623834935e11c7bb385c6a0a8