Overview
overview
10Static
static
10JaffaCakes...cc.exe
windows7-x64
7JaffaCakes...cc.exe
windows10-2004-x64
10setup_akl.exe
windows7-x64
10setup_akl.exe
windows10-2004-x64
10$PLUGINSDI...ns.dll
windows7-x64
3$PLUGINSDI...ns.dll
windows10-2004-x64
8AKV.exe
windows7-x64
3AKV.exe
windows10-2004-x64
8HTV.dll
windows7-x64
3HTV.dll
windows10-2004-x64
3HTV.exe
windows7-x64
6HTV.exe
windows10-2004-x64
6HTV.dll
windows7-x64
3HTV.dll
windows10-2004-x64
8HTV.dll
windows7-x64
3HTV.dll
windows10-2004-x64
8HTV.chm
windows7-x64
1HTV.chm
windows10-2004-x64
8HTV.exe
windows7-x64
6HTV.exe
windows10-2004-x64
6Uninstall.exe
windows7-x64
7Uninstall.exe
windows10-2004-x64
8qs.html
windows7-x64
3qs.html
windows10-2004-x64
8update.exe
windows7-x64
3update.exe
windows10-2004-x64
8Analysis
-
max time kernel
141s -
max time network
153s -
platform
windows10-2004_x64 -
resource
win10v2004-20250129-en -
resource tags
arch:x64arch:x86image:win10v2004-20250129-enlocale:en-usos:windows10-2004-x64system -
submitted
10-02-2025 10:04
Behavioral task
behavioral1
Sample
JaffaCakes118_da3966b99a53642d23b1767a56fe5bcc.exe
Resource
win7-20241010-en
Behavioral task
behavioral2
Sample
JaffaCakes118_da3966b99a53642d23b1767a56fe5bcc.exe
Resource
win10v2004-20250129-en
Behavioral task
behavioral3
Sample
setup_akl.exe
Resource
win7-20241010-en
Behavioral task
behavioral4
Sample
setup_akl.exe
Resource
win10v2004-20250207-en
Behavioral task
behavioral5
Sample
$PLUGINSDIR/InstallOptions.dll
Resource
win7-20241010-en
Behavioral task
behavioral6
Sample
$PLUGINSDIR/InstallOptions.dll
Resource
win10v2004-20250207-en
Behavioral task
behavioral7
Sample
AKV.exe
Resource
win7-20241010-en
Behavioral task
behavioral8
Sample
AKV.exe
Resource
win10v2004-20250207-en
Behavioral task
behavioral9
Sample
HTV.dll
Resource
win7-20241010-en
Behavioral task
behavioral10
Sample
HTV.dll
Resource
win10v2004-20250129-en
Behavioral task
behavioral11
Sample
HTV.exe
Resource
win7-20241010-en
Behavioral task
behavioral12
Sample
HTV.exe
Resource
win10v2004-20250129-en
Behavioral task
behavioral13
Sample
HTV.dll
Resource
win7-20241010-en
Behavioral task
behavioral14
Sample
HTV.dll
Resource
win10v2004-20250207-en
Behavioral task
behavioral15
Sample
HTV.dll
Resource
win7-20241010-en
Behavioral task
behavioral16
Sample
HTV.dll
Resource
win10v2004-20250207-en
Behavioral task
behavioral17
Sample
HTV.chm
Resource
win7-20241010-en
Behavioral task
behavioral18
Sample
HTV.chm
Resource
win10v2004-20250207-en
Behavioral task
behavioral19
Sample
HTV.exe
Resource
win7-20241010-en
Behavioral task
behavioral20
Sample
HTV.exe
Resource
win10v2004-20250129-en
Behavioral task
behavioral21
Sample
Uninstall.exe
Resource
win7-20241010-en
Behavioral task
behavioral22
Sample
Uninstall.exe
Resource
win10v2004-20250207-en
Behavioral task
behavioral23
Sample
qs.html
Resource
win7-20241010-en
Behavioral task
behavioral24
Sample
qs.html
Resource
win10v2004-20250207-en
Behavioral task
behavioral25
Sample
update.exe
Resource
win7-20241010-en
Behavioral task
behavioral26
Sample
update.exe
Resource
win10v2004-20250207-en
General
-
Target
JaffaCakes118_da3966b99a53642d23b1767a56fe5bcc.exe
-
Size
476KB
-
MD5
da3966b99a53642d23b1767a56fe5bcc
-
SHA1
0c978e2587789a11d32daa249725d81474975266
-
SHA256
e0f41333a5d401ca7ff4f07b5272abae0e96f181d0f7176ea62d0caccbef938c
-
SHA512
88f6fb33feaac85503ae9697061d87fdf8841f559138826c33cd9e304c534ab2967eb4d4f03de78e9180a3d83df98004393d459ff102011a91e661b75f836532
-
SSDEEP
6144:fsehzRFBKcKbRjt9v7Vc8etHx0bdhITezYv2QaCJBA5Xpot6VfcoOvncCFjoxkPx:frMTRz+RidaaKbBEoUVSvVDyz0dDrbx
Malware Config
Signatures
-
Ardamax family
-
Ardamax main executable 1 IoCs
resource yara_rule behavioral2/files/0x0010000000023b68-193.dat family_ardamax -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-3625106387-4207083342-115176794-1000\Control Panel\International\Geo\Nation update.exe -
Executes dropped EXE 3 IoCs
pid Process 2732 update.exe 552 setup_akl.exe 3260 HTV.exe -
Loads dropped DLL 4 IoCs
pid Process 552 setup_akl.exe 3260 HTV.exe 552 setup_akl.exe 552 setup_akl.exe -
Adds Run key to start application 2 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" JaffaCakes118_da3966b99a53642d23b1767a56fe5bcc.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\HTV Agent = "C:\\Program Files (x86)\\HTV\\HTV.exe" HTV.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Drops file in Program Files directory 13 IoCs
description ioc Process File created C:\Program Files (x86)\HTV\HTV.001 HTV.exe File opened for modification C:\Program Files (x86)\HTV HTV.exe File created C:\Program Files (x86)\HTV\HTV.007 setup_akl.exe File created C:\Program Files (x86)\HTV\menu.gif setup_akl.exe File created C:\Program Files (x86)\HTV\HTV.003 setup_akl.exe File created C:\Program Files (x86)\HTV\HTV.004 setup_akl.exe File created C:\Program Files (x86)\HTV\AKV.exe setup_akl.exe File created C:\Program Files (x86)\HTV\qs.html setup_akl.exe File created C:\Program Files (x86)\HTV\tray.gif setup_akl.exe File created C:\Program Files (x86)\HTV\HTV.chm setup_akl.exe File created C:\Program Files (x86)\HTV\HTV.exe setup_akl.exe File created C:\Program Files (x86)\HTV\HTV.006 setup_akl.exe File created C:\Program Files (x86)\HTV\Uninstall.exe setup_akl.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 4 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language JaffaCakes118_da3966b99a53642d23b1767a56fe5bcc.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language update.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language setup_akl.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language HTV.exe -
NSIS installer 2 IoCs
resource yara_rule behavioral2/files/0x0009000000023c9e-41.dat nsis_installer_1 behavioral2/files/0x0009000000023baf-203.dat nsis_installer_1 -
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe -
Suspicious behavior: EnumeratesProcesses 6 IoCs
pid Process 3900 msedge.exe 3900 msedge.exe 2924 msedge.exe 2924 msedge.exe 2100 identity_helper.exe 2100 identity_helper.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 6 IoCs
pid Process 2924 msedge.exe 2924 msedge.exe 2924 msedge.exe 2924 msedge.exe 2924 msedge.exe 2924 msedge.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: 33 3260 HTV.exe Token: SeIncBasePriorityPrivilege 3260 HTV.exe -
Suspicious use of FindShellTrayWindow 26 IoCs
pid Process 3260 HTV.exe 2924 msedge.exe 2924 msedge.exe 2924 msedge.exe 2924 msedge.exe 2924 msedge.exe 2924 msedge.exe 2924 msedge.exe 2924 msedge.exe 2924 msedge.exe 2924 msedge.exe 2924 msedge.exe 2924 msedge.exe 2924 msedge.exe 2924 msedge.exe 2924 msedge.exe 2924 msedge.exe 2924 msedge.exe 2924 msedge.exe 2924 msedge.exe 2924 msedge.exe 2924 msedge.exe 2924 msedge.exe 2924 msedge.exe 2924 msedge.exe 2924 msedge.exe -
Suspicious use of SendNotifyMessage 25 IoCs
pid Process 3260 HTV.exe 2924 msedge.exe 2924 msedge.exe 2924 msedge.exe 2924 msedge.exe 2924 msedge.exe 2924 msedge.exe 2924 msedge.exe 2924 msedge.exe 2924 msedge.exe 2924 msedge.exe 2924 msedge.exe 2924 msedge.exe 2924 msedge.exe 2924 msedge.exe 2924 msedge.exe 2924 msedge.exe 2924 msedge.exe 2924 msedge.exe 2924 msedge.exe 2924 msedge.exe 2924 msedge.exe 2924 msedge.exe 2924 msedge.exe 2924 msedge.exe -
Suspicious use of SetWindowsHookEx 4 IoCs
pid Process 3260 HTV.exe 3260 HTV.exe 3260 HTV.exe 3260 HTV.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 3920 wrote to memory of 2732 3920 JaffaCakes118_da3966b99a53642d23b1767a56fe5bcc.exe 84 PID 3920 wrote to memory of 2732 3920 JaffaCakes118_da3966b99a53642d23b1767a56fe5bcc.exe 84 PID 3920 wrote to memory of 2732 3920 JaffaCakes118_da3966b99a53642d23b1767a56fe5bcc.exe 84 PID 3920 wrote to memory of 552 3920 JaffaCakes118_da3966b99a53642d23b1767a56fe5bcc.exe 93 PID 3920 wrote to memory of 552 3920 JaffaCakes118_da3966b99a53642d23b1767a56fe5bcc.exe 93 PID 3920 wrote to memory of 552 3920 JaffaCakes118_da3966b99a53642d23b1767a56fe5bcc.exe 93 PID 552 wrote to memory of 3260 552 setup_akl.exe 101 PID 552 wrote to memory of 3260 552 setup_akl.exe 101 PID 552 wrote to memory of 3260 552 setup_akl.exe 101 PID 552 wrote to memory of 2924 552 setup_akl.exe 102 PID 552 wrote to memory of 2924 552 setup_akl.exe 102 PID 2924 wrote to memory of 2564 2924 msedge.exe 103 PID 2924 wrote to memory of 2564 2924 msedge.exe 103 PID 2924 wrote to memory of 3016 2924 msedge.exe 104 PID 2924 wrote to memory of 3016 2924 msedge.exe 104 PID 2924 wrote to memory of 3016 2924 msedge.exe 104 PID 2924 wrote to memory of 3016 2924 msedge.exe 104 PID 2924 wrote to memory of 3016 2924 msedge.exe 104 PID 2924 wrote to memory of 3016 2924 msedge.exe 104 PID 2924 wrote to memory of 3016 2924 msedge.exe 104 PID 2924 wrote to memory of 3016 2924 msedge.exe 104 PID 2924 wrote to memory of 3016 2924 msedge.exe 104 PID 2924 wrote to memory of 3016 2924 msedge.exe 104 PID 2924 wrote to memory of 3016 2924 msedge.exe 104 PID 2924 wrote to memory of 3016 2924 msedge.exe 104 PID 2924 wrote to memory of 3016 2924 msedge.exe 104 PID 2924 wrote to memory of 3016 2924 msedge.exe 104 PID 2924 wrote to memory of 3016 2924 msedge.exe 104 PID 2924 wrote to memory of 3016 2924 msedge.exe 104 PID 2924 wrote to memory of 3016 2924 msedge.exe 104 PID 2924 wrote to memory of 3016 2924 msedge.exe 104 PID 2924 wrote to memory of 3016 2924 msedge.exe 104 PID 2924 wrote to memory of 3016 2924 msedge.exe 104 PID 2924 wrote to memory of 3016 2924 msedge.exe 104 PID 2924 wrote to memory of 3016 2924 msedge.exe 104 PID 2924 wrote to memory of 3016 2924 msedge.exe 104 PID 2924 wrote to memory of 3016 2924 msedge.exe 104 PID 2924 wrote to memory of 3016 2924 msedge.exe 104 PID 2924 wrote to memory of 3016 2924 msedge.exe 104 PID 2924 wrote to memory of 3016 2924 msedge.exe 104 PID 2924 wrote to memory of 3016 2924 msedge.exe 104 PID 2924 wrote to memory of 3016 2924 msedge.exe 104 PID 2924 wrote to memory of 3016 2924 msedge.exe 104 PID 2924 wrote to memory of 3016 2924 msedge.exe 104 PID 2924 wrote to memory of 3016 2924 msedge.exe 104 PID 2924 wrote to memory of 3016 2924 msedge.exe 104 PID 2924 wrote to memory of 3016 2924 msedge.exe 104 PID 2924 wrote to memory of 3016 2924 msedge.exe 104 PID 2924 wrote to memory of 3016 2924 msedge.exe 104 PID 2924 wrote to memory of 3016 2924 msedge.exe 104 PID 2924 wrote to memory of 3016 2924 msedge.exe 104 PID 2924 wrote to memory of 3016 2924 msedge.exe 104 PID 2924 wrote to memory of 3016 2924 msedge.exe 104 PID 2924 wrote to memory of 3900 2924 msedge.exe 105 PID 2924 wrote to memory of 3900 2924 msedge.exe 105 PID 2924 wrote to memory of 900 2924 msedge.exe 106 PID 2924 wrote to memory of 900 2924 msedge.exe 106 PID 2924 wrote to memory of 900 2924 msedge.exe 106 PID 2924 wrote to memory of 900 2924 msedge.exe 106 PID 2924 wrote to memory of 900 2924 msedge.exe 106 PID 2924 wrote to memory of 900 2924 msedge.exe 106 PID 2924 wrote to memory of 900 2924 msedge.exe 106 PID 2924 wrote to memory of 900 2924 msedge.exe 106 PID 2924 wrote to memory of 900 2924 msedge.exe 106
Processes
-
C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_da3966b99a53642d23b1767a56fe5bcc.exe"C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_da3966b99a53642d23b1767a56fe5bcc.exe"1⤵
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3920 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\update.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\update.exe2⤵
- Checks computer location settings
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:2732
-
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\setup_akl.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\setup_akl.exe2⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in Program Files directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:552 -
C:\Program Files (x86)\HTV\HTV.exe"C:\Program Files (x86)\HTV\HTV.exe"3⤵
- Executes dropped EXE
- Loads dropped DLL
- Adds Run key to start application
- Drops file in Program Files directory
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of SetWindowsHookEx
PID:3260
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Program Files (x86)\HTV\qs.html3⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:2924 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ff92eab46f8,0x7ff92eab4708,0x7ff92eab47184⤵PID:2564
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2100,17130382780484025174,3579102578199408004,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2104 /prefetch:24⤵PID:3016
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2100,17130382780484025174,3579102578199408004,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2232 /prefetch:34⤵
- Suspicious behavior: EnumeratesProcesses
PID:3900
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2100,17130382780484025174,3579102578199408004,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2824 /prefetch:84⤵PID:900
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2100,17130382780484025174,3579102578199408004,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3312 /prefetch:14⤵PID:4080
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2100,17130382780484025174,3579102578199408004,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3444 /prefetch:14⤵PID:2360
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2100,17130382780484025174,3579102578199408004,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5192 /prefetch:84⤵PID:2644
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2100,17130382780484025174,3579102578199408004,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5192 /prefetch:84⤵
- Suspicious behavior: EnumeratesProcesses
PID:2100
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2100,17130382780484025174,3579102578199408004,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=2636 /prefetch:14⤵PID:4832
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2100,17130382780484025174,3579102578199408004,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4376 /prefetch:14⤵PID:916
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2100,17130382780484025174,3579102578199408004,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3376 /prefetch:14⤵PID:3120
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2100,17130382780484025174,3579102578199408004,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5472 /prefetch:14⤵PID:3664
-
-
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:3364
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:4580
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
395KB
MD5b8fa30233794772b8b76b4b1d91c7321
SHA10cf9561be2528944285e536f41d502be24c3aa87
SHA25614116fa79ccc105fabd312b4dff74933f8684c6b27db37e5e3a79d159092d29a
SHA51210ce8b18e7afb8c7e30bb90b0a1f199ef0b77873fa7a9efc596606e151be6b516c0ec6222a9032bdcc527e80964f53d20a28fa1881a08b4df303b2e28204549d
-
Filesize
4KB
MD5c3679c3ff636d1a6b8c65323540da371
SHA1d184758721a426467b687bec2a4acc80fe44c6f8
SHA256d4eba51c616b439a8819218bddf9a6fa257d55c9f04cf81441cc99cc945ad3eb
SHA512494a0a32eef4392ecb54df6e1da7d93183473c4e45f4ac4bd6ec3b0ed8c85c58303a0d36edec41420d05ff624195f08791b6b7e018419a3251b7e71ec9b730e7
-
Filesize
14KB
MD5bda4860df26a5882b42b6b861376199d
SHA18437ec07c9bc3001756ae0cb214b99e1e8a53fdb
SHA2569ed69f6ee86a7fca1f3ef7801d08b38d9e82ab649e6169e894e48ce85b43dc30
SHA512484f45aaacdb4be03752df49c337c7596d539ee0442412083fcfeea78e1c485caf1fbb25cf8a749611358e3a895232f8d0c61c91545d98a3f2a3e1aa504859c6
-
Filesize
8KB
MD543f02e9974b1477c1e6388882f233db0
SHA1f3e27b231193f8d5b2e1b09d05ae3a62795cf339
SHA2563c9e56e51d5a7a1b9aefe853c12a98bf246039aa46db94227ea128f6331782ba
SHA512e22d14735606fe75ee5e55204807c3f5531d3e0c4f63aa4a3b2d4bb6abda6128c7e2816753f2e64400ac6dae8f8ef1e013a7a464dff2a79ad9937c48821a067f
-
Filesize
5KB
MD5b5a87d630436f958c6e1d82d15f98f96
SHA1d3ff5e92198d4df0f98a918071aca53550bf1cff
SHA256a895ad4d23e8b2c2dc552092f645ca309e62c36d4721ebfe7afd2eee7765d4b2
SHA512fd7bae85a86bdaa12fec826d1d38728a90e2037cb3182ad7652d8a9f54c4b322734c587b62221e6f907fce24fcf2e0ae4cce1f5e3d8861661064b4da24bd87ce
-
Filesize
33KB
MD50195038e7af8da97742eb0188204c3bf
SHA1b8c089c701ab283fa5aa921270b317c07cbee2c7
SHA256fc14326e0719e0a59ba8fbb6763f2cc41b47d59ef177c90dc3535cd3a38720b9
SHA512938c3a59895d861eb67a56f365fd387b122d42ff7bb52e5014faa738150d1eed2cd4a52b231ff70f1184fd7e3f0eb991096813b9933e574a7b4383f768384b04
-
Filesize
473KB
MD517535dddecf8cb1efdba1f1952126547
SHA1a862a9a3eb6c201751be1038537522a5281ea6cb
SHA2561a3d28ac6359e58aa656f4734f9f36b6c09badadcf9fb900b9b118d90c38a9dd
SHA512b4f31b552ab3bb3dafa365aa7a31f58674ae7ee82ce1d23457f2e7047431430b00abb3b5498491725639daf583b526b278a737168cfdc4e9ec796dfbc14a53d8
-
Filesize
43KB
MD5916ced19a86ac3006f26ea60719dd648
SHA168278a4c3d5202fff273844d8e4b488fc1daddcd
SHA2563dc70f9fc553517666be9008ebcfab2b044ff711036d49e40144e0dd97910734
SHA5129c08cbca52a17f810f3892d66a72ff37c3af5a60ebe34f56e3937c933e265ae0e4207410f7778434cb203a76e36dc62df09a08f3b3f4338d35b44d5c5bc8bb28
-
Filesize
22KB
MD520fe009bce33b78dd40b48bc5f8accc6
SHA1cd614d9b9e088eecb7e63722f61a39a0cf0ec196
SHA256979c4b395172a53794b18d996df95c75c68d70ec3573aba66cdfe28c8d1cf0eb
SHA512f6be54be78bfdf770c7c131c5d108b0b33376886b9b4a66598e2c92543a2e83ffafdaea36b9d749784a978d4327cdf52ce0ac6feb9a28d683162b0b3f2f40a37
-
Filesize
1KB
MD540d00fa24b9cc44fbf2d724842808473
SHA1c0852aa2fb916c051652a8b2142ffb9d8c7ac87a
SHA25635b0f1bb808e1623ad534fbc1e72cea25ac28f71340e9c543f01d1bfdd094035
SHA5129eb750e08ca9750988290626ae8ed32a2ecfa7c8ca021b3e26b3da0a94de952b991a9a6a0ad5729d7d5ccf7b3b36fb36fd24047f705d0468ad04908ba8a7154c
-
Filesize
7KB
MD50ac69330c3b9181b8a109fddb91fa128
SHA1ef9698ccce041ce8ba3f4af37d0c2b577f19b375
SHA256e675fecb791ed568aae7f1c24b159f7c0f7e23fe8a7ce76f72b3dd1a4ac00e9d
SHA5123a74c04baf3e1e842c0a2568a6480e4ece05baef31171397763de638c6e5b0d26255cf1d7802ea53c355563b8e4b600d24d04afb5168fbc54f66414445327749
-
Filesize
1019B
MD5c8614eedd852c7884ce3dccab8e3ef20
SHA140557cd22b965c2062e52e4689e386147c1151e2
SHA2569bf652ba967933a3bd9714e1c03a6963d5a89ce5c49290a0c43b61cae224a7f7
SHA5121569c70b5939ca393724c921ae60851a903b05dff0a2122ee51e6234cbd48d16f683f3934bf34af8f2143722b05baa63d83fd7fc388f06803d716037c665ac4c
-
Filesize
975B
MD508c14f8db10264be4e6a2ebcc0c47304
SHA1da04354767aa80dd3740eb3b416ec3fc2069c649
SHA2566d62e903c500ae1607a336bd2b4102a7fc4eae60f4fec4361be4c1b08a66da14
SHA512a239f4f627edbbd1bc8dec43d40dab23c4cb4c9d20d263308a93780d594c4b55cca76dbaa2c0ce89593b7689374b2d65d8b417f294d6ce1ccfde129328af9966
-
Filesize
1KB
MD510c128a503041900ef9cfc79986b358b
SHA1777484b163d9d484fff2440a1000eaa8096edec8
SHA25664cb83226a90cd6746c10d2715a2849d59bdceb0e66daea2efb9aa5b392ab806
SHA51267b25819a0d97cbf8826fc2a68bd75af82e172d876f59c7f5703888f7f83c6dd0e675a1919612571077122ee4530b86f72b038312f344c8d4f95f301e7b90dc1
-
Filesize
152B
MD5709e5bc1c62a5aa20abcf92d1a3ae51c
SHA171c8b6688cd83f8ba088d3d44d851c19ee9ccff6
SHA256aa718e97104d2a4c68a9dad4aae806a22060702177f836403094f7ca7f0f8d4e
SHA512b9fc809fbb95b29336e5102382295d71235b0e3a54828b40380958a7feaf27c6407461765680e1f61d88e2692e912f8ec677a66ff965854bea6afae69d99cf24
-
Filesize
152B
MD5bc29044ff79dd25458f32c381dc676af
SHA1f4657c0bee9b865607ec3686b8d4f5d4c2c61cd7
SHA256efe711204437661603d6e59765aba1654678f2093075c1eb2340dc5e80a1140f
SHA5123d484f755d88c0485195b247230edb79c07cc0941dedbf2f34738ae4f80ba90595f5094c449b213c0c871ade6aff0a14d4acfe843186e2421ccbad221d34bf54
-
Filesize
5KB
MD53f6943ab3839237cc5035ca05a8f824d
SHA1587c1bba9db259c88a80126bbd61d1672e8fbedb
SHA2562722c1b0348a0e4fe3d11c3394c9c0d39d74795c37fc49502afce1323564c5cb
SHA512f60b90a46392d3c3d9da333219ef2b76c4573a1fde798a92aa4354e7d338ee9c0e29e38755fc8cee13099a1bf06ef0514b72ac4da44d2932c8078e4770d0242b
-
Filesize
6KB
MD53988c2cbbcb70cc6586813c1c56cff0c
SHA1ef843a79104681139813a21257ab64805a3a0ef8
SHA2560fd4c5a1e83c776b4032f87260f905f25658e306e3065e5173659f1d3ca721fe
SHA5121f367fd90d6edd7caad599868542efaed7f855240fb11bd7dda7481125b98d5f1234591c5fc686fdaed8fd13dba3bb6b17d66c866a334aff2e6feb2b3d17095a
-
Filesize
16B
MD5206702161f94c5cd39fadd03f4014d98
SHA1bd8bfc144fb5326d21bd1531523d9fb50e1b600a
SHA2561005a525006f148c86efcbfb36c6eac091b311532448010f70f7de9a68007167
SHA5120af09f26941b11991c750d1a2b525c39a8970900e98cba96fd1b55dbf93fee79e18b8aab258f48b4f7bda40d059629bc7770d84371235cdb1352a4f17f80e145
-
Filesize
16B
MD546295cac801e5d4857d09837238a6394
SHA144e0fa1b517dbf802b18faf0785eeea6ac51594b
SHA2560f1bad70c7bd1e0a69562853ec529355462fcd0423263a3d39d6d0d70b780443
SHA5128969402593f927350e2ceb4b5bc2a277f3754697c1961e3d6237da322257fbab42909e1a742e22223447f3a4805f8d8ef525432a7c3515a549e984d3eff72b23
-
Filesize
11KB
MD5af2a7f6092045adc7628271b04ffbddf
SHA19f8c5a6e6e5fb610438ece8256c76c3cb0131ed5
SHA256cd5abb06265564baf0b5ec5fcae1c430e07f544872b7bb0f703bd96c3201ae6a
SHA5126afb4201a6a400ba3bd9a0736b5e9e113bfb7a4345a6a8e211abb1856bd727c95980045d1b801d132511610ad3f880928df5e6744a46f9e7dc389bbf89e74d10
-
Filesize
1KB
MD58150f458ed6fb9b1db4e5cfa57a1a281
SHA16e5726854d28687b560d7fdcb5c782c425c7dfb9
SHA2564c13d452dd5d49671bd93ca32f2b4f85c78e39b6ab0ad1f38d98ed267f8fd896
SHA5124cc6a112673aef8bb8bb8a385c26791b805d43bb707b509880e894f1c83bab4e16f13de187036c5f660c3bec1d286258396b7bde65c5d7945c5019665196818c
-
Filesize
418KB
MD5f6699e0d27e915996f33ddf617c9bf6c
SHA174d69a9449331b90e46ae01577b4714b1a35391a
SHA256e2dc1886ca386f8717079b28cd52c1843de737ee24f2e521972730b9a6503c1f
SHA512104451a409acf12db353259e86b00e40b079e657f2c456a9f339977cd0a972dc23af16d2f85da12b6728294560b3cf13afe380dafe1a87ba62c81ff72b127c54
-
Filesize
21KB
MD5aa8a3b7e4d6ad2c666f848ff74a18f3b
SHA1f0555675ab5af32a8c4c177afcb0b1e54ffd871c
SHA25611d8aaac704cfaf1cd8cb4120afc4dd05738e9cccf65fd3be726ca9cfc4ec5c7
SHA512ca6893513548aed5bdf7c73a89c7aa4473e34e70ad15fc4988010e557884f05e02eba2314f5bc95520b225c878a1f794aa5f60c24b28c15ceabfde5f20d60fb2
-
Filesize
14KB
MD5296a5f3179fa8d7a7a855eaf696ede44
SHA157aa5b71553ed282dd22c768e039a187f5c13f63
SHA256ee0ad77e681c4d0fdf1d67df5f4ca03e6bdd8e3b05dfb47a83ad5c733ed62960
SHA512bc527d1485f468e8d098057e0e38e8cb7aa6eb64d4ca30927b99b1552a3177b132b989015ff95bdf2ca046bf11a54b4b456f51e024fbc734fbb548c3499e53f6
-
Filesize
794B
MD58111cdb0ea77a54c9235a4a5f4d34a0d
SHA1a33f1118538dc8dbf626ac5e3ed38f2eedd70313
SHA25633f1c2e957e6ab83b41af5d398e757e795c49415a1c1c6b72a6630b02b22a801
SHA5120f8c2dfc3790517f1bdb1eaf78ef94a470a6486e0d8da6f3497c797946f2eb82f883dfa8be283e25c662f4e043fa93d2b25ab61e0f9647d764623afd72dd0445
-
Filesize
719B
MD57c4bc9a6f09cfab0f0f0f974d3d5393e
SHA17a8d6e53af0385659a13d22d6fed08a2afb2f77f
SHA2569f592fd47960aac33c3c6dc83116abd39e6451a87de477d105d26ec39a807d47
SHA5125e5903cca43dc0c82781e4324395752907f90c24587c6475bf94fc5987ba9008041f72fab0474097d17b91189a5923cb76c8013dd3bad19f4e63ceb2d974bcb6