Overview
overview
10Static
static
10JaffaCakes...cc.exe
windows7-x64
7JaffaCakes...cc.exe
windows10-2004-x64
10setup_akl.exe
windows7-x64
10setup_akl.exe
windows10-2004-x64
10$PLUGINSDI...ns.dll
windows7-x64
3$PLUGINSDI...ns.dll
windows10-2004-x64
8AKV.exe
windows7-x64
3AKV.exe
windows10-2004-x64
8HTV.dll
windows7-x64
3HTV.dll
windows10-2004-x64
3HTV.exe
windows7-x64
6HTV.exe
windows10-2004-x64
6HTV.dll
windows7-x64
3HTV.dll
windows10-2004-x64
8HTV.dll
windows7-x64
3HTV.dll
windows10-2004-x64
8HTV.chm
windows7-x64
1HTV.chm
windows10-2004-x64
8HTV.exe
windows7-x64
6HTV.exe
windows10-2004-x64
6Uninstall.exe
windows7-x64
7Uninstall.exe
windows10-2004-x64
8qs.html
windows7-x64
3qs.html
windows10-2004-x64
8update.exe
windows7-x64
3update.exe
windows10-2004-x64
8Analysis
-
max time kernel
147s -
max time network
153s -
platform
windows10-2004_x64 -
resource
win10v2004-20250207-en -
resource tags
arch:x64arch:x86image:win10v2004-20250207-enlocale:en-usos:windows10-2004-x64system -
submitted
10-02-2025 10:04
Behavioral task
behavioral1
Sample
JaffaCakes118_da3966b99a53642d23b1767a56fe5bcc.exe
Resource
win7-20241010-en
Behavioral task
behavioral2
Sample
JaffaCakes118_da3966b99a53642d23b1767a56fe5bcc.exe
Resource
win10v2004-20250129-en
Behavioral task
behavioral3
Sample
setup_akl.exe
Resource
win7-20241010-en
Behavioral task
behavioral4
Sample
setup_akl.exe
Resource
win10v2004-20250207-en
Behavioral task
behavioral5
Sample
$PLUGINSDIR/InstallOptions.dll
Resource
win7-20241010-en
Behavioral task
behavioral6
Sample
$PLUGINSDIR/InstallOptions.dll
Resource
win10v2004-20250207-en
Behavioral task
behavioral7
Sample
AKV.exe
Resource
win7-20241010-en
Behavioral task
behavioral8
Sample
AKV.exe
Resource
win10v2004-20250207-en
Behavioral task
behavioral9
Sample
HTV.dll
Resource
win7-20241010-en
Behavioral task
behavioral10
Sample
HTV.dll
Resource
win10v2004-20250129-en
Behavioral task
behavioral11
Sample
HTV.exe
Resource
win7-20241010-en
Behavioral task
behavioral12
Sample
HTV.exe
Resource
win10v2004-20250129-en
Behavioral task
behavioral13
Sample
HTV.dll
Resource
win7-20241010-en
Behavioral task
behavioral14
Sample
HTV.dll
Resource
win10v2004-20250207-en
Behavioral task
behavioral15
Sample
HTV.dll
Resource
win7-20241010-en
Behavioral task
behavioral16
Sample
HTV.dll
Resource
win10v2004-20250207-en
Behavioral task
behavioral17
Sample
HTV.chm
Resource
win7-20241010-en
Behavioral task
behavioral18
Sample
HTV.chm
Resource
win10v2004-20250207-en
Behavioral task
behavioral19
Sample
HTV.exe
Resource
win7-20241010-en
Behavioral task
behavioral20
Sample
HTV.exe
Resource
win10v2004-20250129-en
Behavioral task
behavioral21
Sample
Uninstall.exe
Resource
win7-20241010-en
Behavioral task
behavioral22
Sample
Uninstall.exe
Resource
win10v2004-20250207-en
Behavioral task
behavioral23
Sample
qs.html
Resource
win7-20241010-en
Behavioral task
behavioral24
Sample
qs.html
Resource
win10v2004-20250207-en
Behavioral task
behavioral25
Sample
update.exe
Resource
win7-20241010-en
Behavioral task
behavioral26
Sample
update.exe
Resource
win10v2004-20250207-en
General
-
Target
Uninstall.exe
-
Size
43KB
-
MD5
916ced19a86ac3006f26ea60719dd648
-
SHA1
68278a4c3d5202fff273844d8e4b488fc1daddcd
-
SHA256
3dc70f9fc553517666be9008ebcfab2b044ff711036d49e40144e0dd97910734
-
SHA512
9c08cbca52a17f810f3892d66a72ff37c3af5a60ebe34f56e3937c933e265ae0e4207410f7778434cb203a76e36dc62df09a08f3b3f4338d35b44d5c5bc8bb28
-
SSDEEP
768:dsXaaLGrI0+zMwduCWgNzkkRriqskbELjlF58e1mJDGlsCxKOeRTBAzXw3x7q:dxGGrf+wMRVrkxmJ9CxMAbcxe
Malware Config
Signatures
-
Downloads MZ/PE file 1 IoCs
flow pid Process 72 3948 Process not Found -
Deletes itself 1 IoCs
pid Process 4112 Au_.exe -
Executes dropped EXE 1 IoCs
pid Process 4112 Au_.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 3 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Uninstall.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Au_.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language MicrosoftEdgeUpdate.exe -
System Network Configuration Discovery: Internet Connection Discovery 1 TTPs 1 IoCs
Adversaries may check for Internet connectivity on compromised systems.
pid Process 1856 MicrosoftEdgeUpdate.exe -
NSIS installer 1 IoCs
resource yara_rule behavioral22/files/0x0007000000023e3a-4.dat nsis_installer_1 -
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 2208 msedge.exe 2208 msedge.exe 220 msedge.exe 220 msedge.exe 3204 identity_helper.exe 3204 identity_helper.exe 2572 msedge.exe 2572 msedge.exe 2572 msedge.exe 2572 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 7 IoCs
pid Process 220 msedge.exe 220 msedge.exe 220 msedge.exe 220 msedge.exe 220 msedge.exe 220 msedge.exe 220 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 220 msedge.exe 220 msedge.exe 220 msedge.exe 220 msedge.exe 220 msedge.exe 220 msedge.exe 220 msedge.exe 220 msedge.exe 220 msedge.exe 220 msedge.exe 220 msedge.exe 220 msedge.exe 220 msedge.exe 220 msedge.exe 220 msedge.exe 220 msedge.exe 220 msedge.exe 220 msedge.exe 220 msedge.exe 220 msedge.exe 220 msedge.exe 220 msedge.exe 220 msedge.exe 220 msedge.exe 220 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 220 msedge.exe 220 msedge.exe 220 msedge.exe 220 msedge.exe 220 msedge.exe 220 msedge.exe 220 msedge.exe 220 msedge.exe 220 msedge.exe 220 msedge.exe 220 msedge.exe 220 msedge.exe 220 msedge.exe 220 msedge.exe 220 msedge.exe 220 msedge.exe 220 msedge.exe 220 msedge.exe 220 msedge.exe 220 msedge.exe 220 msedge.exe 220 msedge.exe 220 msedge.exe 220 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2628 wrote to memory of 4112 2628 Uninstall.exe 86 PID 2628 wrote to memory of 4112 2628 Uninstall.exe 86 PID 2628 wrote to memory of 4112 2628 Uninstall.exe 86 PID 4112 wrote to memory of 220 4112 Au_.exe 92 PID 4112 wrote to memory of 220 4112 Au_.exe 92 PID 220 wrote to memory of 4884 220 msedge.exe 93 PID 220 wrote to memory of 4884 220 msedge.exe 93 PID 220 wrote to memory of 404 220 msedge.exe 94 PID 220 wrote to memory of 404 220 msedge.exe 94 PID 220 wrote to memory of 404 220 msedge.exe 94 PID 220 wrote to memory of 404 220 msedge.exe 94 PID 220 wrote to memory of 404 220 msedge.exe 94 PID 220 wrote to memory of 404 220 msedge.exe 94 PID 220 wrote to memory of 404 220 msedge.exe 94 PID 220 wrote to memory of 404 220 msedge.exe 94 PID 220 wrote to memory of 404 220 msedge.exe 94 PID 220 wrote to memory of 404 220 msedge.exe 94 PID 220 wrote to memory of 404 220 msedge.exe 94 PID 220 wrote to memory of 404 220 msedge.exe 94 PID 220 wrote to memory of 404 220 msedge.exe 94 PID 220 wrote to memory of 404 220 msedge.exe 94 PID 220 wrote to memory of 404 220 msedge.exe 94 PID 220 wrote to memory of 404 220 msedge.exe 94 PID 220 wrote to memory of 404 220 msedge.exe 94 PID 220 wrote to memory of 404 220 msedge.exe 94 PID 220 wrote to memory of 404 220 msedge.exe 94 PID 220 wrote to memory of 404 220 msedge.exe 94 PID 220 wrote to memory of 404 220 msedge.exe 94 PID 220 wrote to memory of 404 220 msedge.exe 94 PID 220 wrote to memory of 404 220 msedge.exe 94 PID 220 wrote to memory of 404 220 msedge.exe 94 PID 220 wrote to memory of 404 220 msedge.exe 94 PID 220 wrote to memory of 404 220 msedge.exe 94 PID 220 wrote to memory of 404 220 msedge.exe 94 PID 220 wrote to memory of 404 220 msedge.exe 94 PID 220 wrote to memory of 404 220 msedge.exe 94 PID 220 wrote to memory of 404 220 msedge.exe 94 PID 220 wrote to memory of 404 220 msedge.exe 94 PID 220 wrote to memory of 404 220 msedge.exe 94 PID 220 wrote to memory of 404 220 msedge.exe 94 PID 220 wrote to memory of 404 220 msedge.exe 94 PID 220 wrote to memory of 404 220 msedge.exe 94 PID 220 wrote to memory of 404 220 msedge.exe 94 PID 220 wrote to memory of 404 220 msedge.exe 94 PID 220 wrote to memory of 404 220 msedge.exe 94 PID 220 wrote to memory of 404 220 msedge.exe 94 PID 220 wrote to memory of 404 220 msedge.exe 94 PID 220 wrote to memory of 2208 220 msedge.exe 95 PID 220 wrote to memory of 2208 220 msedge.exe 95 PID 220 wrote to memory of 3400 220 msedge.exe 96 PID 220 wrote to memory of 3400 220 msedge.exe 96 PID 220 wrote to memory of 3400 220 msedge.exe 96 PID 220 wrote to memory of 3400 220 msedge.exe 96 PID 220 wrote to memory of 3400 220 msedge.exe 96 PID 220 wrote to memory of 3400 220 msedge.exe 96 PID 220 wrote to memory of 3400 220 msedge.exe 96 PID 220 wrote to memory of 3400 220 msedge.exe 96 PID 220 wrote to memory of 3400 220 msedge.exe 96 PID 220 wrote to memory of 3400 220 msedge.exe 96 PID 220 wrote to memory of 3400 220 msedge.exe 96 PID 220 wrote to memory of 3400 220 msedge.exe 96 PID 220 wrote to memory of 3400 220 msedge.exe 96 PID 220 wrote to memory of 3400 220 msedge.exe 96 PID 220 wrote to memory of 3400 220 msedge.exe 96
Processes
-
C:\Users\Admin\AppData\Local\Temp\Uninstall.exe"C:\Users\Admin\AppData\Local\Temp\Uninstall.exe"1⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2628 -
C:\Users\Admin\AppData\Local\Temp\~nsu.tmp\Au_.exe"C:\Users\Admin\AppData\Local\Temp\~nsu.tmp\Au_.exe" _?=C:\Users\Admin\AppData\Local\Temp\2⤵
- Deletes itself
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4112 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument http://www.ardamax.com/keylogger/uninstall.html3⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:220 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffc7f7046f8,0x7ffc7f704708,0x7ffc7f7047184⤵PID:4884
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2072,2564115457819053676,14304699871899738729,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2084 /prefetch:24⤵PID:404
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2072,2564115457819053676,14304699871899738729,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2172 /prefetch:34⤵
- Suspicious behavior: EnumeratesProcesses
PID:2208
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2072,2564115457819053676,14304699871899738729,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2884 /prefetch:84⤵PID:3400
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2072,2564115457819053676,14304699871899738729,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3296 /prefetch:14⤵PID:3624
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2072,2564115457819053676,14304699871899738729,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3312 /prefetch:14⤵PID:3292
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2072,2564115457819053676,14304699871899738729,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4280 /prefetch:14⤵PID:1860
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2072,2564115457819053676,14304699871899738729,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5528 /prefetch:14⤵PID:1516
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2072,2564115457819053676,14304699871899738729,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5556 /prefetch:14⤵PID:1780
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2072,2564115457819053676,14304699871899738729,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5848 /prefetch:84⤵PID:1760
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2072,2564115457819053676,14304699871899738729,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5848 /prefetch:84⤵
- Suspicious behavior: EnumeratesProcesses
PID:3204
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2072,2564115457819053676,14304699871899738729,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5132 /prefetch:14⤵PID:1872
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2072,2564115457819053676,14304699871899738729,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4568 /prefetch:14⤵PID:2412
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2072,2564115457819053676,14304699871899738729,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1808 /prefetch:24⤵
- Suspicious behavior: EnumeratesProcesses
PID:2572
-
-
-
-
C:\Program Files (x86)\Microsoft\EdgeUpdate\MicrosoftEdgeUpdate.exe"C:\Program Files (x86)\Microsoft\EdgeUpdate\MicrosoftEdgeUpdate.exe" /ping PD94bWwgdmVyc2lvbj0iMS4wIiBlbmNvZGluZz0iVVRGLTgiPz48cmVxdWVzdCBwcm90b2NvbD0iMy4wIiB1cGRhdGVyPSJPbWFoYSIgdXBkYXRlcnZlcnNpb249IjEuMy4xOTUuNDMiIHNoZWxsX3ZlcnNpb249IjEuMy4xOTUuNDMiIGlzbWFjaGluZT0iMSIgc2Vzc2lvbmlkPSJ7MkE0Qzg3NkEtREYyNC00NUVELUE3M0YtNUZFQ0QwOTQxNEMxfSIgdXNlcmlkPSJ7OERBNkRCQkEtMjBFRC00N0NELTlBMzItOTFCQzhDQTJBQjM5fSIgaW5zdGFsbHNvdXJjZT0ibGltaXRlZCIgcmVxdWVzdGlkPSJ7QjEwOUZBNTQtNUMwRS00ODEzLTg3NjMtMTgwMzc4MzRGRTBCfSIgZGVkdXA9ImNyIiBkb21haW5qb2luZWQ9IjAiPjxodyBsb2dpY2FsX2NwdXM9IjIiIHBoeXNtZW1vcnk9IjQiIGRpc2tfdHlwZT0iMiIgc3NlPSIxIiBzc2UyPSIxIiBzc2UzPSIxIiBzc3NlMz0iMSIgc3NlNDE9IjEiIHNzZTQyPSIxIiBhdng9IjEiLz48b3MgcGxhdGZvcm09IndpbiIgdmVyc2lvbj0iMTAuMC4xOTA0MS4xMjg4IiBzcD0iIiBhcmNoPSJ4NjQiIHByb2R1Y3RfdHlwZT0iNDgiIGlzX3dpcD0iMCIgaXNfaW5fbG9ja2Rvd25fbW9kZT0iMCIvPjxvZW0gcHJvZHVjdF9tYW51ZmFjdHVyZXI9IiIgcHJvZHVjdF9uYW1lPSIiLz48ZXhwIGV0YWc9IiZxdW90O0UreGJBejZZNnNVMTI4OWJTNnFsNFZSTGJramZCVUdUTUpzanJIcjQ0aUk9JnF1b3Q7Ii8-PGFwcCBhcHBpZD0iezhBNjlEMzQ1LUQ1NjQtNDYzYy1BRkYxLUE2OUQ5RTUzMEY5Nn0iIHZlcnNpb249IjEyMy4wLjYzMTIuMTIzIiBuZXh0dmVyc2lvbj0iIiBsYW5nPSJlbiIgYnJhbmQ9IkdHTFMiIGNsaWVudD0iIiBpbnN0YWxsYWdlPSIyIiBpbnN0YWxsZGF0ZXRpbWU9IjE3Mzg5NDQ0OTciIG9vYmVfaW5zdGFsbF90aW1lPSIxMzM4MzQxNjkzODEzMjAwMDAiPjxldmVudCBldmVudHR5cGU9IjMxIiBldmVudHJlc3VsdD0iMSIgZXJyb3Jjb2RlPSIwIiBleHRyYWNvZGUxPSIyMTc5ODYyIiBzeXN0ZW1fdXB0aW1lX3RpY2tzPSI0OTYxMTgwNDQyIi8-PC9hcHA-PC9yZXF1ZXN0Pg1⤵
- System Location Discovery: System Language Discovery
- System Network Configuration Discovery: Internet Connection Discovery
PID:1856
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:1748
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:5048
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD5fc7e2abfae997eac3dd58ba7132b3a2a
SHA1ed7e80b26252b600acc6d89b985f4235b0fb03fb
SHA256be084d16cf52949ceb38b98ebc8761cd5bf1a6ac9e8c247efc12bb669f5f023a
SHA512a504e52646c4be5ee0f0d979b0d7a539228ab638394c658d1a88eff86f6db4091146b176484388afa6967a296af7ea97b4d2678577ea85f83d721ef2fe63f928
-
Filesize
152B
MD5aa50e46aef7f210bf65d44c570031714
SHA141993bb24a2c4cffdb5ea9bd4eeb825bf6b6fa79
SHA256857a7702a47be49f185619891e5c74e34b4bb2515279033f3b5a0a9be2da839d
SHA512dd5a1e88b2000957e3ddf057329a24dbbfc5408857cd1432799f20c21b967b627627bf1a3caa23e9698bb8133b7033d925487bcf46d864186a707176f8969029
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index
Filesize144B
MD565853e421947d3ed141f1ae7c0940130
SHA108b8e92453f2708fa32094f50316541eb65f03d9
SHA25641b3975382b2cf495d6e3579dd90df507a45fbacf25f9c40f2ff9733b60f27b0
SHA51265ade547180958f52dcb47c064b0e6820bec6f827901535931a4beaee3110fd73e694ff3bf09cab26594415f9d6077df3936d581a91a982814020d4d5cbbf235
-
Filesize
1KB
MD563da977e49acd399bd6ffde4ab423c80
SHA1deb6f9a0d6be3e5c3170566f22aee4ca65804061
SHA2561ba78671132c9a32c563a5e6097d86d78285fda8ed06de2e29e6971fc3b8692d
SHA51255ece6b723538a4f2c370e1c21a6302f908a76e2088b42be8339b711b3bc1d36dbe78f7b208c4de86a01ea21ae09387130c6350a95b336d5879e9148d0785101
-
Filesize
6KB
MD5d46c52d5d2c1809cb0e1c9050ee1a58d
SHA155748a7458e849187e5e5b6fcba7b5c10fdcb009
SHA256258ccd8bdd0b6390038cc0921efe4885080bd30e48bf44afa0c5eeca0fc7231c
SHA5123df5f887029d89aa1a934a4389f27d402cdd5d80ed05af38760aa6d3065c8d2e45c9171919027d158c667de1a0817edd4900ba9588076e155fe668c28a487644
-
Filesize
6KB
MD5567b5443cf07e50fc44335549df569ce
SHA1b94a604a7a53ffc3a70d565f3a783454c63348d8
SHA256ba74f257058a2423659cee5004cebda9f3ec12381bd5ef459de725ca9efbee43
SHA512185753b27f9838d3cde70327eda45bb975cb60248c27c4b74a908503fa8de52157d0544d91004e57d8cc7802393d1612f5d6c66301562dab5733599bf68eaff6
-
Filesize
6KB
MD524670572ff4f465f09b452da08133f74
SHA1cdff9fa40fa274e5d67162ca47c61fa94b0c6aa0
SHA25637a0db43416c68df5f88e1eee0a0cdbccc2e20c0ce1cd2ede4e50657ad6b379a
SHA512e6b5f9d0b57aa088a71e7173120bb859f668575f898eba9c0c81130b38abc31f44942bf1c1f91917e6509e2d1a3d3199a59694876eaa4fcee650b01c981b0e33
-
Filesize
16B
MD546295cac801e5d4857d09837238a6394
SHA144e0fa1b517dbf802b18faf0785eeea6ac51594b
SHA2560f1bad70c7bd1e0a69562853ec529355462fcd0423263a3d39d6d0d70b780443
SHA5128969402593f927350e2ceb4b5bc2a277f3754697c1961e3d6237da322257fbab42909e1a742e22223447f3a4805f8d8ef525432a7c3515a549e984d3eff72b23
-
Filesize
16B
MD5206702161f94c5cd39fadd03f4014d98
SHA1bd8bfc144fb5326d21bd1531523d9fb50e1b600a
SHA2561005a525006f148c86efcbfb36c6eac091b311532448010f70f7de9a68007167
SHA5120af09f26941b11991c750d1a2b525c39a8970900e98cba96fd1b55dbf93fee79e18b8aab258f48b4f7bda40d059629bc7770d84371235cdb1352a4f17f80e145
-
Filesize
8KB
MD5967f7815aca583b1d6112c3e0032a9d1
SHA1a734e4cfd9d05543e4185e9ff01824c462efedf5
SHA256c82a04b778a37eec1fa3c77015547a2c4504acd44c3950bf7b4e1182f4db3e6b
SHA5124f1ce23d3ca331b402c7a0486126f59758ace98930c4a9a60560c6ee30bc62f3076bb6aa96eb2ce0aff848f86c617c99f653163fcfd75f9ca43fceb12046f010
-
Filesize
43KB
MD5916ced19a86ac3006f26ea60719dd648
SHA168278a4c3d5202fff273844d8e4b488fc1daddcd
SHA2563dc70f9fc553517666be9008ebcfab2b044ff711036d49e40144e0dd97910734
SHA5129c08cbca52a17f810f3892d66a72ff37c3af5a60ebe34f56e3937c933e265ae0e4207410f7778434cb203a76e36dc62df09a08f3b3f4338d35b44d5c5bc8bb28