Malware Analysis Report

2024-10-23 17:24

Sample ID 240510-e2zfpsba2w
Target 2d55721f4a8a11369b1bfd1a45b58863_JaffaCakes118
SHA256 a3e811d79034284524414cc0875ef65362b3b438a32d07747ed9bf00af610f09
Tags
socgholish downloader
score
10/10

Table of Contents

Analysis Overview

MITRE ATT&CK

Enterprise Matrix V15

Analysis: static1

Detonation Overview

Signatures

Analysis: behavioral1

Detonation Overview

Command Line

Signatures

Processes

Network

Files

Analysis: behavioral2

Detonation Overview

Command Line

Signatures

Processes

Network

Files

Analysis Overview

score
10/10

SHA256

a3e811d79034284524414cc0875ef65362b3b438a32d07747ed9bf00af610f09

Threat Level: Known bad

The file 2d55721f4a8a11369b1bfd1a45b58863_JaffaCakes118 was found to be: Known bad.

Malicious Activity Summary

socgholish downloader

SocGholish

Suspicious use of SetWindowsHookEx

Enumerates system info in registry

Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary

Suspicious behavior: EnumeratesProcesses

Suspicious use of SendNotifyMessage

Modifies Internet Explorer settings

Suspicious use of FindShellTrayWindow

Suspicious use of WriteProcessMemory

MITRE ATT&CK

Analysis: static1

Detonation Overview

Reported

2024-05-10 04:26

Signatures

N/A

Analysis: behavioral1

Detonation Overview

Submitted

2024-05-10 04:26

Reported

2024-05-10 04:29

Platform

win7-20240221-en

Max time kernel

145s

Max time network

149s

Command Line

"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\2d55721f4a8a11369b1bfd1a45b58863_JaffaCakes118.html

Signatures

SocGholish

downloader socgholish

Modifies Internet Explorer settings

adware spyware
Description Indicator Process Target
Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive C:\Program Files\Internet Explorer\iexplore.exe N/A
Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\InternetRegistry C:\Program Files\Internet Explorer\iexplore.exe N/A
Set value (data) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 C:\Program Files\Internet Explorer\iexplore.exe N/A
Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\DOMStorage\fashion.webhostinpakistan.com C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE N/A
Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\DomainSuggestion C:\Program Files\Internet Explorer\iexplore.exe N/A
Set value (int) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" C:\Program Files\Internet Explorer\iexplore.exe N/A
Set value (int) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\DOMStorage\webhostinpakistan.com\Total = "328" C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE N/A
Set value (int) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" C:\Program Files\Internet Explorer\iexplore.exe N/A
Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\DOMStorage\webhostinpakistan.com C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE N/A
Set value (int) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" C:\Program Files\Internet Explorer\iexplore.exe N/A
Set value (int) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{88609161-0E85-11EF-A7F1-FA5112F1BCBF} = "0" C:\Program Files\Internet Explorer\iexplore.exe N/A
Set value (int) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" C:\Program Files\Internet Explorer\iexplore.exe N/A
Set value (int) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\DOMStorage\webhostinpakistan.com\Total = "137" C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE N/A
Set value (int) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\DOMStorage\webhostinpakistan.com\Total = "301" C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE N/A
Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage C:\Program Files\Internet Explorer\iexplore.exe N/A
Set value (data) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 105afd6892a2da01 C:\Program Files\Internet Explorer\iexplore.exe N/A
Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\PageSetup C:\Program Files\Internet Explorer\iexplore.exe N/A
Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser C:\Program Files\Internet Explorer\iexplore.exe N/A
Set value (int) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\DOMStorage\forex.webhostinpakistan.com\ = "137" C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE N/A
Set value (int) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\DOMStorage\Total\ = "301" C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE N/A
Set value (int) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\DOMStorage\fashion.webhostinpakistan.com\ = "164" C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE N/A
Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\GPU C:\Program Files\Internet Explorer\iexplore.exe N/A
Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE N/A
Set value (int) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\DOMStorage\webhostinpakistan.com\NumberOfSubdomains = "1" C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE N/A
Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\IETld\LowMic C:\Program Files\Internet Explorer\iexplore.exe N/A
Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\IntelliForms C:\Program Files\Internet Explorer\iexplore.exe N/A
Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage C:\Program Files\Internet Explorer\iexplore.exe N/A
Set value (int) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\DOMStorage\Total\ = "137" C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE N/A
Set value (int) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\DOMStorage\Total\ = "164" C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE N/A
Set value (int) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\DOMStorage\fashion.webhostinpakistan.com\ = "137" C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE N/A
Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Main C:\Program Files\Internet Explorer\iexplore.exe N/A
Set value (int) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" C:\Program Files\Internet Explorer\iexplore.exe N/A
Set value (str) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" C:\Program Files\Internet Explorer\iexplore.exe N/A
Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery C:\Program Files\Internet Explorer\iexplore.exe N/A
Set value (int) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\DOMStorage\webhostinpakistan.com\NumberOfSubdomains = "2" C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE N/A
Set value (str) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE N/A
Set value (data) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb0100000071c834f68b8ed044a0afda50fbc58a7000000000020000000000106600000001000020000000c44e26a6b038aa4413cfb6cb9580da455e13d03535b7dbb1832f1e8fab8ad6d6000000000e8000000002000020000000ab3463b2efe9fd02267425d206a5e31771eebe83e31ef98446f936c824d51a5020000000ca569bdad98410cae66fa7dd0c2efbd1f27049de00a5c99c87c207368deceeaa400000006457703b0083c62075c58adfdca7266a93e54817cd649131d417840c49b80933a316241decd92340a9144534d3b41464f675329c6bbd316b412e97e540296379 C:\Program Files\Internet Explorer\iexplore.exe N/A
Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic C:\Program Files\Internet Explorer\iexplore.exe N/A
Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Toolbar C:\Program Files\Internet Explorer\iexplore.exe N/A
Set value (str) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" C:\Program Files\Internet Explorer\iexplore.exe N/A
Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\LowRegistry C:\Program Files\Internet Explorer\iexplore.exe N/A
Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Main C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE N/A
Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\DOMStorage\Total C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE N/A
Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain C:\Program Files\Internet Explorer\iexplore.exe N/A
Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch C:\Program Files\Internet Explorer\iexplore.exe N/A
Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\DOMStorage\forex.webhostinpakistan.com C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE N/A
Set value (int) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\DOMStorage\forex.webhostinpakistan.com\ = "164" C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE N/A
Set value (data) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 C:\Program Files\Internet Explorer\iexplore.exe N/A
Set value (int) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "421477084" C:\Program Files\Internet Explorer\iexplore.exe N/A
Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Zoom C:\Program Files\Internet Explorer\iexplore.exe N/A
Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\DOMStorage C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE N/A
Set value (int) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\DOMStorage\webhostinpakistan.com\Total = "164" C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE N/A
Set value (int) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\DOMStorage\Total\ = "328" C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE N/A
Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\SearchScopes C:\Program Files\Internet Explorer\iexplore.exe N/A
Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing C:\Program Files\Internet Explorer\iexplore.exe N/A

Suspicious use of FindShellTrayWindow

Description Indicator Process Target
N/A N/A C:\Program Files\Internet Explorer\iexplore.exe N/A

Processes

C:\Program Files\Internet Explorer\iexplore.exe

"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\2d55721f4a8a11369b1bfd1a45b58863_JaffaCakes118.html

C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE

"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2352 CREDAT:275457 /prefetch:2

Network

Country Destination Domain Proto
US 8.8.8.8:53 ajax.googleapis.com udp
US 8.8.8.8:53 www.blogger.com udp
US 8.8.8.8:53 resources.blogblog.com udp
US 8.8.8.8:53 ads.clicksor.com udp
US 8.8.8.8:53 2.bp.blogspot.com udp
US 8.8.8.8:53 4.bp.blogspot.com udp
US 8.8.8.8:53 3.bp.blogspot.com udp
US 8.8.8.8:53 img2.blogblog.com udp
US 8.8.8.8:53 lh4.googleusercontent.com udp
US 8.8.8.8:53 lh3.googleusercontent.com udp
US 8.8.8.8:53 lh5.googleusercontent.com udp
US 8.8.8.8:53 lh6.googleusercontent.com udp
US 8.8.8.8:53 apis.google.com udp
GB 142.250.200.9:443 img2.blogblog.com tcp
GB 142.250.200.10:443 ajax.googleapis.com tcp
GB 142.250.200.9:443 img2.blogblog.com tcp
GB 142.250.200.9:443 img2.blogblog.com tcp
GB 142.250.200.10:443 ajax.googleapis.com tcp
GB 142.250.200.9:443 img2.blogblog.com tcp
GB 142.250.200.9:443 img2.blogblog.com tcp
GB 216.58.204.74:80 fonts.googleapis.com tcp
GB 216.58.204.74:80 fonts.googleapis.com tcp
GB 142.250.200.9:443 img2.blogblog.com tcp
GB 142.250.178.1:80 3.bp.blogspot.com tcp
GB 142.250.178.1:80 3.bp.blogspot.com tcp
GB 142.250.178.1:80 3.bp.blogspot.com tcp
GB 142.250.178.1:80 3.bp.blogspot.com tcp
GB 216.58.204.74:80 fonts.googleapis.com tcp
GB 142.250.200.9:80 img2.blogblog.com tcp
GB 216.58.204.74:80 fonts.googleapis.com tcp
GB 216.58.204.74:80 fonts.googleapis.com tcp
GB 216.58.204.74:80 fonts.googleapis.com tcp
GB 142.250.200.9:80 img2.blogblog.com tcp
GB 142.250.178.1:80 3.bp.blogspot.com tcp
GB 142.250.178.1:80 3.bp.blogspot.com tcp
GB 172.217.16.226:80 pagead2.googlesyndication.com tcp
GB 172.217.16.226:80 pagead2.googlesyndication.com tcp
GB 142.250.200.33:443 lh6.googleusercontent.com tcp
GB 142.250.200.33:443 lh6.googleusercontent.com tcp
GB 142.250.200.33:443 lh6.googleusercontent.com tcp
GB 142.250.200.33:443 lh6.googleusercontent.com tcp
GB 142.250.200.33:443 lh6.googleusercontent.com tcp
GB 142.250.200.33:443 lh6.googleusercontent.com tcp
GB 216.58.201.110:443 apis.google.com tcp
GB 216.58.201.110:443 apis.google.com tcp
GB 142.250.200.33:443 lh6.googleusercontent.com tcp
GB 142.250.200.33:443 lh6.googleusercontent.com tcp
GB 142.250.200.33:443 lh6.googleusercontent.com tcp
GB 142.250.200.33:443 lh6.googleusercontent.com tcp
US 8.8.8.8:53 1.bp.blogspot.com udp
US 8.8.8.8:53 s10.histats.com udp
GB 142.250.178.1:80 1.bp.blogspot.com tcp
GB 142.250.178.1:80 1.bp.blogspot.com tcp
GB 142.250.178.1:80 1.bp.blogspot.com tcp
GB 142.250.178.1:80 1.bp.blogspot.com tcp
GB 142.250.178.1:80 1.bp.blogspot.com tcp
US 104.20.67.115:80 s10.histats.com tcp
US 104.20.67.115:80 s10.histats.com tcp
GB 216.58.212.195:80 fonts.gstatic.com tcp
GB 216.58.212.195:80 fonts.gstatic.com tcp
US 8.8.8.8:53 accounts.google.com udp
US 8.8.8.8:53 s4.histats.com udp
IE 209.85.203.84:443 accounts.google.com tcp
IE 209.85.203.84:443 accounts.google.com tcp
US 8.8.8.8:53 www.facebook.com udp
US 8.8.8.8:53 infoforextrading-advise.blogspot.com udp
CA 149.56.240.31:443 s4.histats.com tcp
CA 149.56.240.31:443 s4.histats.com tcp
GB 163.70.151.35:80 www.facebook.com tcp
GB 163.70.151.35:80 www.facebook.com tcp
GB 216.58.201.97:80 infoforextrading-advise.blogspot.com tcp
GB 216.58.201.97:80 infoforextrading-advise.blogspot.com tcp
GB 163.70.151.35:443 www.facebook.com tcp
US 8.8.8.8:53 forex.webhostinpakistan.com udp
GB 142.250.200.51:80 forex.webhostinpakistan.com tcp
GB 142.250.200.51:80 forex.webhostinpakistan.com tcp
US 8.8.8.8:53 www.google.com udp
GB 142.250.178.4:443 www.google.com tcp
GB 142.250.178.4:443 www.google.com tcp
GB 142.250.200.33:443 lh6.googleusercontent.com tcp
GB 142.250.200.33:443 lh6.googleusercontent.com tcp
GB 142.250.200.9:80 img2.blogblog.com tcp
US 8.8.8.8:53 translate.google.com udp
US 8.8.8.8:53 xslt.alexa.com udp
GB 172.217.16.238:80 translate.google.com tcp
GB 172.217.16.238:80 translate.google.com tcp
GB 172.217.16.238:443 translate.google.com tcp
US 8.8.8.8:53 translate.googleapis.com udp
GB 142.250.200.42:443 translate.googleapis.com tcp
GB 142.250.200.42:443 translate.googleapis.com tcp
US 8.8.8.8:53 ftsignals.blogspot.com udp
US 8.8.8.8:53 ras55.com udp
US 8.8.8.8:53 fashion.webhostinpakistan.com udp
GB 216.58.201.97:80 ftsignals.blogspot.com tcp
GB 216.58.201.97:80 ftsignals.blogspot.com tcp
GB 142.250.200.51:80 fashion.webhostinpakistan.com tcp
GB 142.250.200.51:80 fashion.webhostinpakistan.com tcp
US 8.8.8.8:53 e.dtscout.com udp
DE 141.101.120.10:80 e.dtscout.com tcp
DE 141.101.120.10:80 e.dtscout.com tcp
GB 142.250.200.10:80 ajax.googleapis.com tcp
US 8.8.8.8:53 blogger-related-posts.googlecode.com udp
US 8.8.8.8:53 www.linkwithin.com udp
US 8.8.8.8:53 blogger.googleusercontent.com udp
GB 142.250.200.33:443 blogger.googleusercontent.com tcp
IE 172.253.116.82:80 blogger-related-posts.googlecode.com tcp
IE 172.253.116.82:80 blogger-related-posts.googlecode.com tcp
SG 118.139.179.30:80 www.linkwithin.com tcp
SG 118.139.179.30:80 www.linkwithin.com tcp
US 8.8.8.8:53 t.dtscout.com udp
US 8.8.8.8:53 dtsedge.com udp
GB 142.250.200.33:443 blogger.googleusercontent.com tcp
GB 142.250.200.33:443 blogger.googleusercontent.com tcp
DE 141.101.120.10:443 t.dtscout.com tcp
DE 141.101.120.10:443 t.dtscout.com tcp
US 104.21.14.49:443 dtsedge.com tcp
US 104.21.14.49:443 dtsedge.com tcp
CA 149.56.240.31:443 s4.histats.com tcp
CA 149.56.240.31:443 s4.histats.com tcp
CA 149.56.240.31:443 s4.histats.com tcp
CA 149.56.240.31:443 s4.histats.com tcp
US 8.8.8.8:53 tpc.googlesyndication.com udp
GB 142.250.200.33:443 tpc.googlesyndication.com tcp
GB 142.250.200.33:443 tpc.googlesyndication.com tcp
US 8.8.8.8:53 fe0.google.com udp
CA 149.56.240.31:443 s4.histats.com tcp
CA 149.56.240.31:443 s4.histats.com tcp
CA 149.56.240.31:443 s4.histats.com tcp
CA 149.56.240.31:443 s4.histats.com tcp
US 204.79.197.200:443 ieonline.microsoft.com tcp
US 204.79.197.200:443 ieonline.microsoft.com tcp
US 8.8.8.8:53 www.microsoft.com udp
US 8.8.8.8:53 www.microsoft.com udp
US 204.79.197.200:443 ieonline.microsoft.com tcp

Files

C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\24BD96D5497F70B3F510A6B53CD43F3E_3A89246FB90C5EE6620004F1AE0EB0EA

MD5 9d112ddad6b7178d66d890f4c8c7e540
SHA1 93cce1a83b96bba94a0154bc4dca260ec78d980a
SHA256 c9e521cada1e3af040b7a6d8122fe64a9626c7423173b5503efa4e0bed1f64d1
SHA512 1aae746baed2ec96aa26358f5a9654f0ba71c2186197ec990bec342be54c1bd8a5d45572e4aaac2c205281426fa8cff6d3603aa1044ce9dc6348e9cabe1c0032

C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\24BD96D5497F70B3F510A6B53CD43F3E_3A89246FB90C5EE6620004F1AE0EB0EA

MD5 b6e71adf7324685d8f60c97bdb99f892
SHA1 ac45dd58c3dfb5d68ffdbc27817f1e5ad5720830
SHA256 40a181e9a8b85b862afc89a604eb290be3b5cd68937feb9ccfc467d3589e8e5c
SHA512 f864a712e300632059c0678ff5f54412fc7f7a1db02e469bcdc77be452886b55cd3d08ff51076278d1a21b091b2fc459e30c53b0d8e8855dbfefa59f0ee4cea9

C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\24BD96D5497F70B3F510A6B53CD43F3E_3A89246FB90C5EE6620004F1AE0EB0EA

MD5 3b3fd28ea0ae0732937c6d41dcc4efdf
SHA1 214c41eb7805f5325ca781626b34be860b7e2dfc
SHA256 820ce8c662a4e68e71ccbf884c7a0be1b07365eff666ff177735945ca1d13147
SHA512 0b9955a12def6b2dc1f0f719334f29b6bc0108080000839a6690587ad633247d0ae67cbd2be4af58554c65df7520397cf05f871e6b19d957853972a1156722f2

C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\24BD96D5497F70B3F510A6B53CD43F3E_3A89246FB90C5EE6620004F1AE0EB0EA

MD5 00e80e13e27f7d1f0e7b4c92b7198a87
SHA1 4f4447e5146c0eed3c3e325ec1af9855af1502d8
SHA256 4aeb00cc3d8d3df66ec72c60595274ba39ef76bb16d2210140f420b50d65f2a3
SHA512 a5b332f5668034439ac9cd16640f97f0bd94a3b9d5c55dbcf0cebbd279b2b7ccba5d92fe854ce8baddcbfd977c2bc51abeef1701a617413cb0e4a02261eebd3c

C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\24BD96D5497F70B3F510A6B53CD43F3E_3A89246FB90C5EE6620004F1AE0EB0EA

MD5 0052189a4ce2a1c6f08ad3457d43d947
SHA1 9f542f6ce4c87933c0913ae7845d37228cff7e7d
SHA256 ceaffc52e5261247df9a15c9fbd717cf6782d44e27d9061088ee6c7225bc2d29
SHA512 c4bdced282f7d57cf34081c77691762e203211c32bf85053f28241048828b148d71ffd202392b61720b43fa0e1ccb248cd94fcea395a9638398649ec8f5069d0

C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\CAF4703619713E3F18D8A9D5D88D6288_A7725538C46DE2D0088EE44974E2CEBA

MD5 8e23fb49b850d839d497db1d5efe85b5
SHA1 df3a001bc1df0f66d08b0d18314754aeb30a70ef
SHA256 7b5a5f643bd335865beec7125fc2dbfe3200d0b625d73b5c69bb4f19a360f58a
SHA512 9264ac6116673cd8e54b988211d549f2787387b2dcab7586ecc4ac7c9f00063d2fa20bf782c803b7f43cd05338163fb6cb84ae60c764427dfca933a8725437da

C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\CAF4703619713E3F18D8A9D5D88D6288_A7725538C46DE2D0088EE44974E2CEBA

MD5 ac89a852c2aaa3d389b2d2dd312ad367
SHA1 8f421dd6493c61dbda6b839e2debb7b50a20c930
SHA256 0b720e19270c672f9b6e0ec40b468ac49376807de08a814573fe038779534f45
SHA512 c6a88f33688cc0c287f04005e07d5b5e4a8721d204aa429f93ade2a56aeb86e05d89a8f7a44c1e93359a185a4c5f418240c6cdbc5a21314226681c744cf37f36

C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\CAF4703619713E3F18D8A9D5D88D6288_A7725538C46DE2D0088EE44974E2CEBA

MD5 ceaed987c431b1a7889f348c1eb3fac4
SHA1 0d3d14458808959b137001a4cc44c37a710b7993
SHA256 3ef9a7f37d831e3e126cad61c242190e1fb51f24d1ce1b679465f366577a69e4
SHA512 1f2068d8a64227830ddbe5563e537e6880e3f912d0b2e66e6724df2ff1f440b000e017a88d54713ea955f0d07a644f821b6145d54840f12a2420d88cda8b31da

C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\CAF4703619713E3F18D8A9D5D88D6288_A7725538C46DE2D0088EE44974E2CEBA

MD5 b018ffa52cb0fef94c1e153e3b0d1b46
SHA1 75a994e98d89d4ebf81ea97b7c1ea97bad1a7567
SHA256 9fafe570d27e536f7fb4e3a5f3f563159dc13e2819242d8e04796b3f9a71f0cc
SHA512 ca8149b50f8eea433c3685a1a6e24f6651dc166d5e61ebbc0925402c24d7b38ee8277ce844678387a468c0600293fa1a025adf3d844e82b9e9b1987400771266

C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\CAF4703619713E3F18D8A9D5D88D6288_A7725538C46DE2D0088EE44974E2CEBA

MD5 49fdea1e3196e06d1bc92a8e9e0a1a2b
SHA1 e38762aa0677b3ab0142683aadcc0492c9f1dbf7
SHA256 ecfbd677aba1bd43f74465a549f1cd5b3829496c46b5d39393cadabab0c14f3b
SHA512 a3d31d72855e5688d80d9f9eeb79d6017faa64271fc7079021f1ada9bce449b2f114bad61778606e0f487f4f78e1b00c4c5394957287ca117cede8c74fefb51d

C:\Users\Admin\AppData\Local\Temp\Cab119F.tmp

MD5 ac05d27423a85adc1622c714f2cb6184
SHA1 b0fe2b1abddb97837ea0195be70ab2ff14d43198
SHA256 c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d
SHA512 6d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d

C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\F07644E38ED7C9F37D11EEC6D4335E02_C66311BFC31F329FE5E6FBB46563B719

MD5 08b42de8e5fe706ca8f5159cf7f38b76
SHA1 33c2bbdbf57a54ebcc6a17da1419d661c46899f1
SHA256 c18980e956391123486c0cb4398901884bb4d3258b9b9b6b3f14c2c224bbd65c
SHA512 1f7e9fa94c503036b895a2ab9029af9c798c89826ea2e5d3e12c4a8c01c1c773c1237dcf6515249224a13fd71581e2ebbf69381f121e8b7dcfbbb61a7618d772

C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\F07644E38ED7C9F37D11EEC6D4335E02_C66311BFC31F329FE5E6FBB46563B719

MD5 86da992c8c73724981d48a54a0ea9fe1
SHA1 4f01c7c52cd70d5c1384946f607d61c45f978e73
SHA256 e3d4f9ebfa172bedee355b387b1183fb3f2fee283c95ae96779d0cdb9666b084
SHA512 79bbb42401911004108d888403de51cf129808d0b5212edb4428bd38625eb478c66e33c3668d3c8d42978278796bbb13d92f3402f957cb080c4e8e1e8b075467

C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\A16C6C16D94F76E0808C087DFC657D99_F82FCC341F124F6AC9D153F6ECE89FFA

MD5 172831834ea62b24f27ae09586544041
SHA1 1bb2f6eb9c319fe96051c9a7db6cc4b882912471
SHA256 c88fedc9c4ce58c474cbda40048f9c60ea139d81438401ca3f9f38de59e57319
SHA512 ab2e156cf49e575074aabec3dc76df497408755944acb34ea9a67f85eb75bfd1fc4eb898b445cab38d6cfb799288668ca6ca9338422de9d774264dffcda4de44

C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

MD5 9f37846e7f3449e78a4f6d70fc0ae089
SHA1 f2e91b69d4846932ff99e255d565d5a838bcb19a
SHA256 69115d6a72a1a17907db67ac9a0e742b5675277d5cdf798093152e55fd23c202
SHA512 521d2cc7968ad5c3d50824b1b2b3317d1cd28f6faa19913d348a7f6f4c4fb3db6a13b0974e943b5e053881c5d8932c936afa3a8daf9fcd5f602022af76cac6be

C:\Users\Admin\AppData\Local\Temp\Tar15F6.tmp

MD5 9c0c641c06238516f27941aa1166d427
SHA1 64cd549fb8cf014fcd9312aa7a5b023847b6c977
SHA256 4276af3669a141a59388bc56a87f6614d9a9bdddf560636c264219a7eb11256f
SHA512 936ed0c0b0a7ff8e606b1cc4175a1f9b3699748ccbba1c3aff96203033d2e9edabf090e5148370df42fbfc4e31d7229493706ff24f19ff42ff7bef74a6baad06

C:\Users\Admin\AppData\Local\Temp\Cab16F0.tmp

MD5 29f65ba8e88c063813cc50a4ea544e93
SHA1 05a7040d5c127e68c25d81cc51271ffb8bef3568
SHA256 1ed81fa8dfb6999a9fedc6e779138ffd99568992e22d300acd181a6d2c8de184
SHA512 e29b2e92c496245bed3372578074407e8ef8882906ce10c35b3c8deebfefe01b5fd7f3030acaa693e175f4b7aca6cd7d8d10ae1c731b09c5fa19035e005de3aa

C:\Users\Admin\AppData\Local\Temp\Tar1763.tmp

MD5 435a9ac180383f9fa094131b173a2f7b
SHA1 76944ea657a9db94f9a4bef38f88c46ed4166983
SHA256 67dc37ed50b8e63272b49a254a6039ee225974f1d767bb83eb1fd80e759a7c34
SHA512 1a6b277611959720a9c71114957620517ad94541302f164eb872bd322292a952409bafb8bc2ac793b16ad5f25d83f8594ccff2b7834e3c2b2b941e6fc84c009a

C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\UA1HZF3D\platform[1].js

MD5 e66acfdb2f1dfcff8c6dba736dd4ab6d
SHA1 36026360b6c8d750488ef2c739e04969f8c5bcd7
SHA256 742841b3cf614dd55ce486a7335018bd1992c4d05ef74b45a0781318075a99f3
SHA512 113b6e50ded2703cb7a484a66250a38d74833ab9a994dc54042abc95500fe7405f9e5f384186c15bf392c613420a19108482d279776f6e2fd00245b8bd892fbc

C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\MPR7YYBV\55013136-widget_css_bundle[1].css

MD5 e3f09df1bc175f411d1ec3dfb5afb17b
SHA1 3994ec3efe3c2447e7bbfdd97bb7e190dd1658f9
SHA256 1a2eca9e492e3a21e02dd77ad44d7af45c4091d35ede79e948b7a3f23e5b3617
SHA512 16164d66d452d7d343b1902fe5b864ffdee42811ee90952cbfe9efa9847c58c0403f944c8e29db2bc2384ccd516b629cb8765e5e51de37da6efd75962cf82530

C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\VIF0OH2A\f[1].txt

MD5 b6795ce90a0b3a9a75bacb79ed468b7a
SHA1 0472c0e557eac99a75d6ceb80784e2f427a7a02f
SHA256 0a34ad7b8d9568eee59a5e065c988fc3933b4bbdef4e0d0f7d52594816becf6e
SHA512 e54f5f5eaffd8b3439ac7fdf3560c46551905c0ad6f08c708faf14d50c18b5060878371842c03155d37f92c05ab0f1b09e1b8e31d84e5f11c63af523f4167362

C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\JB8Q1DZR\cb=gapi[1].js

MD5 4d1bd282f5a3799d4e2880cf69af9269
SHA1 2ede61be138a7beaa7d6214aa278479dce258adb
SHA256 5e075152b65966c0c6fcd3ee7d9f62550981a7bb4ed47611f4286c16e0d79693
SHA512 615556b06959aae4229b228cd023f15526256311b5e06dc3c1b122dcbe1ff2f01863e09f5b86f600bcee885f180b5148e7813fde76d877b3e4a114a73169c349

C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\UA1HZF3D\js15[1].js

MD5 4beb0b1c8bbca69316e6eadcd83b1bf0
SHA1 602491c5f60960bf4ba7c3d2e600681a06ffcaa1
SHA256 429e7004f3f8fbe42cacb984c36a9cda33efdacc100a276b12e82c6ab78bf7ec
SHA512 3bc8560d56f39ba09da8a3582587b9ca727dd9fa60582892a2a8a2d7de42fa0fa057b28986a0975b84589d8e9ef320f976b3731a19ea17c83388c1309041b8f9

C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\JB8Q1DZR\cookienotice[1].js

MD5 a705132a2174f88e196ec3610d68faa8
SHA1 3bad57a48d973a678fec600d45933010f6edc659
SHA256 068ffe90977f2b5b2dc2ef18572166e85281bd0ecb31c4902464b23db54d2568
SHA512 e947d33e0e9c5e6516f05e0ea696406e4e09b458f85021bc3a217071ae14879b2251e65aec5d1935ca9af2433d023356298321564e1a41119d41be7c2b2d36d5

C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\MPR7YYBV\authorization[1].css

MD5 68b329da9893e34099c7d8ad5cb9c940
SHA1 adc83b19e793491b1c6ea0fd8b46cd9f32e592fc
SHA256 01ba4719c80b6fe911b091a7c05124b64eeece964e09c058ef8f9805daca546b
SHA512 be688838ca8686e5c90689bf2ab585cef1137c999b48c70b92f67a5c34dc15697b5d11c982ed6d71be1e1e7f7b4e0733884aa97c3f7a339a8ed03577cf74be09

C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\CAF4703619713E3F18D8A9D5D88D6288_F2DAF19C1F776537105D08FC8D978464

MD5 428c70176fff06b17e5d2d8ccf1051eb
SHA1 1d96fd012c01fb3d07a7b3fef85121189fa0232c
SHA256 857e28dfa70d0fb28359262a43042bc4ab9d3c1a752a15ac47c9461a5c17ba36
SHA512 5bb57101f793e98ac03cd66a3f5206c723787dddbc0084dfa13113d32f78b09bd19ae57508e107f0aff36ab29f3913f1e1772c9e29773889ae1f74015949f3cb

C:\Users\Admin\AppData\Local\Microsoft\Internet Explorer\DOMStore\17J0ARZP\forex.webhostinpakistan[1].xml

MD5 d17da19094cd1ca087155f468ab3add9
SHA1 f76b7f82fc139d5114915f54a5b222d724b925cc
SHA256 9ccef4beb27f6d374aae407fa3e9ec65e1f65cffec533100ff2749127ee76639
SHA512 057e7b12557d47c55a33ad416abe020d1692ff47893389bd067b4cc0dd64192d9507fbbec4eed487d082c2ab07b96b83f71be4b4441a9e171a884a560c22346b

C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\MPR7YYBV\element[2].js

MD5 46985cbcdd9e17ac869ef7d5ce1aea5e
SHA1 a44a3474581b6e4c8c91ac33fd6b3233827a124d
SHA256 acefb38e40416d61a7dfa2d4f907cb2857b4dbda65b151da4f82e755ce80c612
SHA512 904c0cb71075650fddaa03b3111d15b83c9ac7874fe7b22ef401abf7503ec785f96fb526d6fed1e1b9d7ee67b3c15d4efb7d0cdd0f92508960b825302d49be29

C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\MPR7YYBV\m=el_main[1].js

MD5 bf47475b5b52d458f577a3413e6643a5
SHA1 97bc58b845b8be59fb4914a52f22ab23e83e60f1
SHA256 3a4153a0531933048ae28d84e5426a3d725e89b6d41e6206c03cc5965280d8a4
SHA512 6d3a6fd6c7470eeb67bc3df3f5acfc1d5e962d49fc065380cdb8ff18000ad276d3930efeb97ee0da72d3eae00f30f51c72db0224dd648d16e21c22a3bead0891

C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\MPR7YYBV\4290687098-widgets[1].js

MD5 30490c5bf1c9a62c3f7aaf45de530b69
SHA1 89fdf91f40944a3babf7d9f485cbfbcc32454d50
SHA256 b7c68fe77654ca4d42928e0a0ea49c642de2887b1ef65e5123105f5359390d49
SHA512 ade075fce5921fc27c36b1c21efd5bbb8a1d08699329621015a18a75b69ab25f5bd3d3014cbe853109c304bdf5d5421b30ac3a3e8b4b0119f9509feda4c97229

C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\UA1HZF3D\0[2].htm

MD5 1862130a8871f0f4f73eaa85f96d7391
SHA1 0057d476cc5239923c983dc855d31d3caf8dc8b0
SHA256 ca7ca95ea00a41be1b9f00bcc54e9dcbbfa2d5f540d626e65644c9f9996868a6
SHA512 65df471613178155f7e4ce102d58d6f36023b9da51f6f73942c0252f2eb3d6c8e6125b179f5844d2b3e3640ca2e7d67e2ee6b03c3a5d5684c9f259b2b6eeded5

C:\Users\Admin\AppData\Local\Microsoft\Internet Explorer\DOMStore\17J0ARZP\forex.webhostinpakistan[1].xml

MD5 f2b8b884b0dfd476cc6d3f5505bb9878
SHA1 c21f29545aa752d4eb0aeba2504346925bce5db1
SHA256 4b8f826f73d58807fde00b9d98d26c93c523464f3653edc7f09e4da569767048
SHA512 b85f406d125f70aad6a515f70564ef616244852cfe3200f42a9ba7e3790fcb3e130173e02aa53a35112a956ea1a376c780bb18a5fa3cee22c9e819df304c0d77

C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\JB8Q1DZR\css[2].css

MD5 a8aa26addf3c87d9f58374f6ea73308c
SHA1 32e6214b33a369b8d766e6cac55f757e0f7776f9
SHA256 5f76b4459b4391e5a30677a87065c7775d9b085b6b3652e1146b03f1b6b8c306
SHA512 c358b2cb834a9f417357168683463a1ddbac13555cbffb4bb0255761c6e12632ac4ad95bccca24be20bbda2cc21593629d57ddde7cecd01b98c18511c31558df

C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\JB8Q1DZR\css[1].css

MD5 4169d4a8701b5c253cfb2178415997f1
SHA1 24cf6f697756068ab04519c74ca82ce0abb5f9a8
SHA256 e2ee45552145cf81c35e596d9b6cb6cf60d768675a1e4521ad265d41b9cc7cf5
SHA512 03c1aa85db284040fecfc9f40f5e04342b7d203e3a87d7c4f1c904d5a6e27bc095ab86c0d2ca286afdffd78294727d810f4763fe06e2e701342a61208c0044a2

C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\UA1HZF3D\e[1].js

MD5 20c4317df06918eb01577871257848eb
SHA1 4bab2a2fe08919be4bb1f231f56f3a9158792b24
SHA256 a9578b7b9a921eb03bdca64107746a4c4511797f86c3fa5a06f5c765fda9aee5
SHA512 1e761b9881f225ac067b0087a49a82b8245825c513cd18463e62bc964e5f53b51c4d7ebe210d83ea8ef7dc19722dc76d0154fed3f6df255d5b5408be1ccca5bb

C:\Users\Admin\AppData\Local\Microsoft\Internet Explorer\DOMStore\UUTXLUPG\fashion.webhostinpakistan[1].xml

MD5 bea28fd655f2290789535f3676cc4554
SHA1 c63d2cb6450fb1b4ac0bde0d807a1fefceb32088
SHA256 3c3b93123a2ac630ebf98807b24a8ef299476ef70028ef52b8a0bfb8ac380ef0
SHA512 cacc4e93885f816701c30a84f2facf0ada4530ebacc194f739a56b0bb8dc8026f0cd14d853cbe955521eaff9e1f4c8a406911178e75e0f7bce48cfebc4d4ae53

C:\Users\Admin\AppData\Local\Microsoft\Internet Explorer\DOMStore\UUTXLUPG\fashion.webhostinpakistan[1].xml

MD5 e2f2adeb88712710c2fd505a27fa99c8
SHA1 9fb589bff5155b5ed703bee403dfd6b62766768f
SHA256 3e3412d5a89f9acdb117fd81a4d7f0459c1c3709471194382bd157831434659c
SHA512 457c456bc75c2dc289a03aa5915a9c412ea6463490b123d54b7fae7637e72761972a96ac5c272f0e44ce4f7401e2df5cc13670efa7a4556eef3bc3a034263fa3

C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\MPR7YYBV\0[1].htm

MD5 9134127d1b93308a7a3ae403e3e90dd8
SHA1 992e123c62bb4e11b959aecad9fb2a8899a68608
SHA256 12a0b7e9500d651a37ca60972727b550437a12ec5f260820268f29f7ddc9eeed
SHA512 eb76765d2c4b0bebd1e4aa534faa34e6961da398b35961bd6da3a6b2e0b74744d15ee730ae5847567d8c5f79082515404a839e753050e06c6cfd4bcd060e990b

C:\Users\Admin\AppData\Local\Microsoft\Internet Explorer\DOMStore\UUTXLUPG\fashion.webhostinpakistan[1].xml

MD5 660725eabcd4ef45ab7c1f1e45f9fab2
SHA1 55c95a98e4185e118b3ba04f8541100dc80b4f43
SHA256 50c1cef95f5e617dce5337a4efaac578465830c2f08ca1e3abb8acae016223c9
SHA512 2be820149a11e22188b8206ed6077f257d9cae599aad9fc05beda2e17278f0679691e951bd76f36b3975e0919a2f83b9b392b11f4699512f2f0438106ac6c7b6

C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\VIF0OH2A\dnserrordiagoff[1]

MD5 47f581b112d58eda23ea8b2e08cf0ff0
SHA1 6ec1df5eaec1439573aef0fb96dabfc953305e5b
SHA256 b1c947d00db5fce43314c56c663dbeae0ffa13407c9c16225c17ccefc3afa928
SHA512 187383eef3d646091e9f68eff680a11c7947b3d9b54a78cc6de4a04629d7037e9c97673ac054a6f1cf591235c110ca181a6b69ecba0e5032168f56f4486fff92

C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\VIF0OH2A\errorPageStrings[1]

MD5 e3e4a98353f119b80b323302f26b78fa
SHA1 20ee35a370cdd3a8a7d04b506410300fd0a6a864
SHA256 9466d620dc57835a2475f8f71e304f54aee7160e134ba160baae0f19e5e71e66
SHA512 d8e4d73c76804a5abebd5dbc3a86dcdb6e73107b873175a8de67332c113fb7c4899890bf7972e467866fa4cd100a7e2a10a770e5a9c41cbf23b54351b771dcee

C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\VIF0OH2A\httpErrorPagesScripts[1]

MD5 3f57b781cb3ef114dd0b665151571b7b
SHA1 ce6a63f996df3a1cccb81720e21204b825e0238c
SHA256 46e019fa34465f4ed096a9665d1827b54553931ad82e98be01edb1ddbc94d3ad
SHA512 8cbf4ef582332ae7ea605f910ad6f8a4bc28513482409fa84f08943a72cac2cf0fa32b6af4c20c697e1fac2c5ba16b5a64a23af0c11eefbf69625b8f9f90c8fa

C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

MD5 337343c3add032107e0f086e58cade95
SHA1 9765b6f39469ff266a9e9409c1d95b6865d67515
SHA256 f06dad597d8f9fab94166bd6e5c1ff7c5ae7f4aa0ccd68bb3fef81bc8a9bf2ec
SHA512 c96721622b7e8009520f27b4e2e4f5186474a019e06d93d8e8e223f50d2008a87606561ea3aa10c8e7125871349788c57cd124ab4467f2bd10b8ab98a2f56e41

C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

MD5 3dd7fb052efc26dc247a34e4a6c27a81
SHA1 dfd7bda5e473eaa15c99e564023310b0c9804a9d
SHA256 ae15303ec713e70dcea5e1bfc042d03e17f1ca3ee139839b402056f3792f40c1
SHA512 4fb4385a948651c05adfb2167ed5cfe86eb14f3c6c9d4252a904a7a8c5eb69b887ff22b2b3eda4766cd13dd5609b0e53a977dcf3eeb2ddf14cb8d368cc59c868

C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

MD5 2f7f9b4df0cbd20fa901ceb159111131
SHA1 7b3a4b976e5f531e01ffb05b4e017d9c84fc2fb6
SHA256 53deb3e8aa78377db7c599cd7a641c4f13791f60daa58b78fc8fbdbf622101a0
SHA512 4ccd807bcca63c7d4c46d01000f420f8a2c51ec2a647c09c0ee044509fadc2b501221a357d479bc78de937a65434582eda09bca74622f274ed3da2f4307783ed

C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

MD5 49efd4149a0f4be0f14d8e4c616ce3a2
SHA1 2ac47fdd569eb3532b27cbd47ec94f28c4cbf513
SHA256 543902f466d82cfb151d4c16a9250de24dfc07adc2929928866dfba2972bdb82
SHA512 bb7d6d6a596013ba46f4ac5f59900bff5132ab551c93efe8027d389a9003af1146b620af96c90274c886e74e08520f48ecd7cafdb6ecddad377af95a15a1a913

C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

MD5 c5f33a181a1e80c75611d3e02048d653
SHA1 dfad0ab65354b674f356c1559258621d7496e11d
SHA256 0c1650b90aa8b829204499763a4bee584caca216a01a3c5e51c7dd8234de1d4e
SHA512 5532e70fa292b3bfb94cfa2de1c3c5e9a575e759258f48ad9833984fb189b6cf055a0b9732df8f062aef60935b706ee5167b6b59a8b184980022b3bca14166d9

C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

MD5 643763b56c0ef020f5e34cfdf9b54704
SHA1 115d2d751dc87ceb83a9b68a9b0819c7787d99e4
SHA256 aec9b0d7c36966116d58a378dded3a308cf5063285e6c268752fbaaac8fe06fd
SHA512 0ac5d6fb850dc2d36cdddb6cbd6b481d78578395ae5b6c7f1ec1c0a37a4013e7044d9d488c54b91a2f4f180c06f4f7f6d7f96951995881410aa9524e141b9102

C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

MD5 900bacafc59df323498125d451c3f2c5
SHA1 964ad2b82d145e596c6ee487c7aab4717fe19832
SHA256 4a270a35c6178f697ad7e12b2ce31627fef7e9dcd83966fbbe3e9390c48d2964
SHA512 6cc3700de4682cf8930a88569fd7e3ae30691e86ab5a0cdb022d3b98283be503b28ce5e9a303cb54a524be9737db0d3d72e02907d0f5a2048b3fadd259b29c85

C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

MD5 a551e119835c19c527dc50d8371c049a
SHA1 bd89fc56d5f73cf475b3deb567332dc9e7cc1669
SHA256 ccf7b31c1bf81c119ff50b9276fd4b86013367ff57513388a8c84c2253bf539c
SHA512 02ecb4e4c07129dd6631bd81d09c1c215d6c457286f0626c6b48ec1d6ada1a85dd45c484f173af9f416bd8c7a8d86cea61b6121ffdb20d6c825df6ed6a9dcb92

C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

MD5 0779ad4ab9bc2e61752e74799b2b66cb
SHA1 c79ec96bd321cd490fab5b33ad41bc22f1ee057f
SHA256 85fee1d96527676a68c3b57bd7cfbd6585b485a8b445c64576f12a3922461a36
SHA512 f6416d6041f8f173935e43b8e2c831e96948d0384b4e270d9ad014c39e90d53107aae6bb078a430f771100ffe16e2731483b8078044315863adbea628d91c9e8

C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

MD5 baaf1b6b2867bb59d407e150f1b0f57a
SHA1 b44737d9ddae425e868085392746da56b58af452
SHA256 3207f9f6df7b5be79acda722e244f65e1488a3f72d1fcb06843eecd99cab1ce9
SHA512 c3aca482794ce76b5875e9db9787188cfc0f79a2a86b6832739dadb2ae17fbab20ebbcd42b636b79e302b6efe821b1d57c10d14a99f9ec21f03de4fee76e2b76

C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\MPR7YYBV\e[1].htm

MD5 f93fa7630bface4705850f053d4ea2c3
SHA1 33144fefed5e19fa52ea596d0015a6a10874e833
SHA256 eaf8f72983b1193360cc85b87fc4dcab6994ae514749138f33a70df21c5f16da
SHA512 240f5e4ca158934d0b2788c561a2684cc071ae85f302d8ca409cc0c66cbe5ac0f7d4ad2f3fbc8eebe701daf4957e241efa34741c07d960afba6bcea28cc5bc3d

C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

MD5 b51f82fee2d0c525d637ef2ea2fa2b3e
SHA1 1a3e577842d9d3cd6b7cbab3dc3e893e8063255c
SHA256 00b9bc13be182117ae1955060545dde137e534ba9d8de06b0146732f3431d9de
SHA512 8e8bc6624ac2bbe11ee88af6f38396b37a16c1a3f1bb4bdb8112cf2aa65019e9881e0b5814045d4ec9106b784d03f8ef56dc9d60a3b4f25c2179fdbde86f5f7e

C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\F0ACCF77CDCBFF39F6191887F6D2D357

MD5 a266bb7dcc38a562631361bbf61dd11b
SHA1 3b1efd3a66ea28b16697394703a72ca340a05bd5
SHA256 df545bf919a2439c36983b54cdfc903dfa4f37d3996d8d84b4c31eec6f3c163e
SHA512 0da8ef4f8f6ed3d16d2bc8eb816b9e6e1345dfe2d91160196c47e6149a1d6aedaafadcefd66acdea7f72dcf0832770192ceac15b0c559c4ccc2c0e5581d5aefc

C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\F0ACCF77CDCBFF39F6191887F6D2D357

MD5 4ff3e3b48c3182d5d2f3a43a10931cbd
SHA1 458e6312d268de107e6894944a7d7d7e09415f44
SHA256 1a2eda8712448b2b5d724c92a74f13ea2ef6a4a8e6b6565908fdb504ba33946b
SHA512 95fc80079f55dae75700817a9ec80125f8010b22eecd25bd501fe9d00623f6fd6bf9911c897e1af56392bb2bac2dfa3326767a64056365dd54f6617e90fc9caa

C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\F0ACCF77CDCBFF39F6191887F6D2D357

MD5 0ddea38a58ecec36c3c21aa41bb20305
SHA1 2f22dcf9e4d1db534d7df225352a52e5dac5eb97
SHA256 e30663646c47b9b93d9d560d99012525546489f9b5f7289a5f7c30111d81e7c1
SHA512 bb540cb0bd96ddfd09f17c25ae210a56396f9bd5e16bac3c3148f28320b80db13a2f4ff0e7d0b59c4874c93b634d3658c7770f57455d355591e02073aecac88c

C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\3C428B1A3E5F57D887EC4B864FAC5DCC

MD5 ab0d6af67f87121bc472185235cabab1
SHA1 24427a0146b427468b8fb019c224a2373e83d37d
SHA256 90de70efc200d426a4894e1c9d65a7d5337ee0ff4d4cf587a86dec714246b6ed
SHA512 141f352f8bcb1ed363a39f150c6c04f45424409ffbe20a47601274f03a92c162d99afb5c79578532f4fbcb4d25e0e2bf3c61713da68bbf061e6178581a791548

C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\3C428B1A3E5F57D887EC4B864FAC5DCC

MD5 e4a68ac854ac5242460afd72481b2a44
SHA1 df3c24f9bfd666761b268073fe06d1cc8d4f82a4
SHA256 cb3ccbb76031e5e0138f8dd39a23f9de47ffc35e43c1144cea27d46a5ab1cb5f
SHA512 5622207e1ba285f172756f6019af92ac808ed63286e24dfecc1e79873fb5d140f1ceb7133f2476e89a5f75f711f9813a9fbb8fd5287f64adfdcc53b864f9bdc5

Analysis: behavioral2

Detonation Overview

Submitted

2024-05-10 04:26

Reported

2024-05-10 04:29

Platform

win10v2004-20240426-en

Max time kernel

145s

Max time network

143s

Command Line

"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\2d55721f4a8a11369b1bfd1a45b58863_JaffaCakes118.html

Signatures

Enumerates system info in registry

Description Indicator Process Target
Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe N/A
Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe N/A
Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe N/A

Suspicious use of FindShellTrayWindow

Description Indicator Process Target
N/A N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe N/A
N/A N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe N/A
N/A N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe N/A
N/A N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe N/A
N/A N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe N/A
N/A N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe N/A
N/A N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe N/A
N/A N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe N/A
N/A N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe N/A
N/A N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe N/A
N/A N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe N/A
N/A N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe N/A
N/A N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe N/A
N/A N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe N/A
N/A N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe N/A
N/A N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe N/A
N/A N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe N/A
N/A N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe N/A
N/A N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe N/A
N/A N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe N/A
N/A N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe N/A
N/A N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe N/A
N/A N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe N/A
N/A N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe N/A
N/A N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe N/A

Suspicious use of SendNotifyMessage

Description Indicator Process Target
N/A N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe N/A
N/A N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe N/A
N/A N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe N/A
N/A N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe N/A
N/A N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe N/A
N/A N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe N/A
N/A N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe N/A
N/A N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe N/A
N/A N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe N/A
N/A N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe N/A
N/A N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe N/A
N/A N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe N/A
N/A N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe N/A
N/A N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe N/A
N/A N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe N/A
N/A N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe N/A
N/A N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe N/A
N/A N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe N/A
N/A N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe N/A
N/A N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe N/A
N/A N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe N/A
N/A N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe N/A
N/A N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe N/A
N/A N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe N/A

Suspicious use of WriteProcessMemory

Description Indicator Process Target
PID 3356 wrote to memory of 716 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 3356 wrote to memory of 716 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 3356 wrote to memory of 4020 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 3356 wrote to memory of 4020 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 3356 wrote to memory of 4020 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 3356 wrote to memory of 4020 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 3356 wrote to memory of 4020 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 3356 wrote to memory of 4020 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 3356 wrote to memory of 4020 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 3356 wrote to memory of 4020 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 3356 wrote to memory of 4020 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 3356 wrote to memory of 4020 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 3356 wrote to memory of 4020 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 3356 wrote to memory of 4020 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 3356 wrote to memory of 4020 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 3356 wrote to memory of 4020 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 3356 wrote to memory of 4020 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 3356 wrote to memory of 4020 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 3356 wrote to memory of 4020 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 3356 wrote to memory of 4020 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 3356 wrote to memory of 4020 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 3356 wrote to memory of 4020 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 3356 wrote to memory of 4020 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 3356 wrote to memory of 4020 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 3356 wrote to memory of 4020 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 3356 wrote to memory of 4020 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 3356 wrote to memory of 4020 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 3356 wrote to memory of 4020 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 3356 wrote to memory of 4020 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 3356 wrote to memory of 4020 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 3356 wrote to memory of 4020 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 3356 wrote to memory of 4020 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 3356 wrote to memory of 4020 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 3356 wrote to memory of 4020 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 3356 wrote to memory of 4020 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 3356 wrote to memory of 4020 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 3356 wrote to memory of 4020 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 3356 wrote to memory of 4020 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 3356 wrote to memory of 4020 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 3356 wrote to memory of 4020 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 3356 wrote to memory of 4020 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 3356 wrote to memory of 4020 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 3356 wrote to memory of 3952 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 3356 wrote to memory of 3952 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 3356 wrote to memory of 3856 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 3356 wrote to memory of 3856 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 3356 wrote to memory of 3856 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 3356 wrote to memory of 3856 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 3356 wrote to memory of 3856 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 3356 wrote to memory of 3856 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 3356 wrote to memory of 3856 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 3356 wrote to memory of 3856 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 3356 wrote to memory of 3856 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 3356 wrote to memory of 3856 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 3356 wrote to memory of 3856 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 3356 wrote to memory of 3856 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 3356 wrote to memory of 3856 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 3356 wrote to memory of 3856 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 3356 wrote to memory of 3856 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 3356 wrote to memory of 3856 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 3356 wrote to memory of 3856 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 3356 wrote to memory of 3856 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 3356 wrote to memory of 3856 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 3356 wrote to memory of 3856 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe

Processes

C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe

"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\2d55721f4a8a11369b1bfd1a45b58863_JaffaCakes118.html

C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe

"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffbe6c446f8,0x7ffbe6c44708,0x7ffbe6c44718

C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe

"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2120,1577595446238465761,14762028483546046433,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2132 /prefetch:2

C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe

"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2120,1577595446238465761,14762028483546046433,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2184 /prefetch:3

C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe

"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2120,1577595446238465761,14762028483546046433,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=1964 /prefetch:8

C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe

"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2120,1577595446238465761,14762028483546046433,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3116 /prefetch:1

C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe

"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2120,1577595446238465761,14762028483546046433,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3224 /prefetch:1

C:\Windows\System32\CompPkgSrv.exe

C:\Windows\System32\CompPkgSrv.exe -Embedding

C:\Windows\System32\CompPkgSrv.exe

C:\Windows\System32\CompPkgSrv.exe -Embedding

C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe

"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2120,1577595446238465761,14762028483546046433,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4752 /prefetch:1

C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe

"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2120,1577595446238465761,14762028483546046433,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5160 /prefetch:1

C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe

"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2120,1577595446238465761,14762028483546046433,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5300 /prefetch:1

C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe

"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2120,1577595446238465761,14762028483546046433,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5336 /prefetch:1

C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe

"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2120,1577595446238465761,14762028483546046433,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5628 /prefetch:1

C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe

"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2120,1577595446238465761,14762028483546046433,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5464 /prefetch:1

C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe

"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2120,1577595446238465761,14762028483546046433,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=13 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4712 /prefetch:1

C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe

"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2120,1577595446238465761,14762028483546046433,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=14 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6032 /prefetch:1

C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe

"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2120,1577595446238465761,14762028483546046433,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=15 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5460 /prefetch:1

C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe

"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2120,1577595446238465761,14762028483546046433,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=16 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6552 /prefetch:1

C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe

"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2120,1577595446238465761,14762028483546046433,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=7476 /prefetch:8

C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe

"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2120,1577595446238465761,14762028483546046433,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=7476 /prefetch:8

C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe

"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2120,1577595446238465761,14762028483546046433,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=18 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=7048 /prefetch:1

C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe

"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2120,1577595446238465761,14762028483546046433,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=19 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4928 /prefetch:1

C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe

"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2120,1577595446238465761,14762028483546046433,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=20 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5300 /prefetch:1

C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe

"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2120,1577595446238465761,14762028483546046433,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=21 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5816 /prefetch:1

C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe

"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2120,1577595446238465761,14762028483546046433,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=5052 /prefetch:2

Network

Country Destination Domain Proto
US 8.8.8.8:53 www.blogger.com udp
US 8.8.8.8:53 ajax.googleapis.com udp
GB 216.58.204.74:80 fonts.googleapis.com tcp
GB 216.58.204.74:80 fonts.googleapis.com tcp
GB 216.58.204.74:80 fonts.googleapis.com tcp
GB 216.58.204.74:80 fonts.googleapis.com tcp
GB 216.58.204.74:80 fonts.googleapis.com tcp
GB 216.58.204.74:80 fonts.googleapis.com tcp
GB 142.250.187.202:443 ajax.googleapis.com tcp
GB 142.250.200.9:443 www.blogger.com tcp
GB 216.58.212.195:80 fonts.gstatic.com tcp
US 8.8.8.8:53 ads.clicksor.com udp
GB 142.250.200.9:443 www.blogger.com udp
GB 142.250.200.2:80 pagead2.googlesyndication.com tcp
US 8.8.8.8:53 apis.google.com udp
US 8.8.8.8:53 resources.blogblog.com udp
US 8.8.8.8:53 2.bp.blogspot.com udp
US 8.8.8.8:53 4.bp.blogspot.com udp
US 8.8.8.8:53 img2.blogblog.com udp
US 8.8.8.8:53 3.bp.blogspot.com udp
US 8.8.8.8:53 lh4.googleusercontent.com udp
US 8.8.8.8:53 lh3.googleusercontent.com udp
US 8.8.8.8:53 lh5.googleusercontent.com udp
US 8.8.8.8:53 1.bp.blogspot.com udp
GB 216.58.201.110:443 apis.google.com tcp
GB 216.58.212.195:80 fonts.gstatic.com tcp
GB 142.250.200.33:443 lh5.googleusercontent.com tcp
GB 142.250.200.33:443 lh5.googleusercontent.com tcp
GB 142.250.200.9:80 img2.blogblog.com tcp
GB 142.250.178.1:80 1.bp.blogspot.com tcp
GB 142.250.178.1:80 1.bp.blogspot.com tcp
GB 142.250.178.1:80 1.bp.blogspot.com tcp
GB 142.250.178.1:80 1.bp.blogspot.com tcp
GB 142.250.200.33:443 lh5.googleusercontent.com tcp
GB 142.250.178.1:80 1.bp.blogspot.com tcp
GB 142.250.200.9:443 img2.blogblog.com tcp
GB 142.250.178.1:80 1.bp.blogspot.com tcp
GB 142.250.178.1:80 1.bp.blogspot.com tcp
GB 142.250.178.1:80 1.bp.blogspot.com tcp
GB 142.250.178.1:80 1.bp.blogspot.com tcp
GB 142.250.178.1:80 1.bp.blogspot.com tcp
US 8.8.8.8:53 s10.histats.com udp
US 104.20.66.115:80 s10.histats.com tcp
US 8.8.8.8:53 lh6.googleusercontent.com udp
US 8.8.8.8:53 accounts.google.com udp
GB 142.250.178.1:80 1.bp.blogspot.com tcp
IE 209.85.203.84:443 accounts.google.com tcp
GB 142.250.178.1:80 1.bp.blogspot.com tcp
US 8.8.8.8:53 www.facebook.com udp
US 8.8.8.8:53 s4.histats.com udp
GB 157.240.221.35:80 www.facebook.com tcp
GB 216.58.201.110:443 apis.google.com udp
US 8.8.8.8:53 infoforextrading-advise.blogspot.com udp
GB 142.250.178.1:80 1.bp.blogspot.com tcp
CA 149.56.240.132:443 s4.histats.com tcp
GB 216.58.201.97:80 infoforextrading-advise.blogspot.com tcp
GB 157.240.221.35:443 www.facebook.com tcp
US 8.8.8.8:53 68.159.190.20.in-addr.arpa udp
US 8.8.8.8:53 74.204.58.216.in-addr.arpa udp
US 8.8.8.8:53 202.187.250.142.in-addr.arpa udp
US 8.8.8.8:53 9.200.250.142.in-addr.arpa udp
US 8.8.8.8:53 95.221.229.192.in-addr.arpa udp
US 8.8.8.8:53 googleads.g.doubleclick.net udp
US 8.8.8.8:53 195.212.58.216.in-addr.arpa udp
US 8.8.8.8:53 217.106.137.52.in-addr.arpa udp
US 8.8.8.8:53 2.200.250.142.in-addr.arpa udp
US 8.8.8.8:53 1.178.250.142.in-addr.arpa udp
US 8.8.8.8:53 115.66.20.104.in-addr.arpa udp
US 8.8.8.8:53 84.203.85.209.in-addr.arpa udp
US 8.8.8.8:53 35.221.240.157.in-addr.arpa udp
US 8.8.8.8:53 33.200.250.142.in-addr.arpa udp
US 8.8.8.8:53 forex.webhostinpakistan.com udp
US 8.8.8.8:53 www.google.com udp
IE 209.85.203.84:443 accounts.google.com udp
US 8.8.8.8:53 e.dtscout.com udp
GB 142.250.200.9:443 img2.blogblog.com udp
GB 142.250.178.4:443 www.google.com tcp
DE 141.101.120.11:445 e.dtscout.com tcp
GB 142.250.200.51:80 forex.webhostinpakistan.com tcp
US 8.8.8.8:53 79.190.18.2.in-addr.arpa udp
US 8.8.8.8:53 97.201.58.216.in-addr.arpa udp
US 8.8.8.8:53 132.240.56.149.in-addr.arpa udp
US 8.8.8.8:53 4.178.250.142.in-addr.arpa udp
US 8.8.8.8:53 51.200.250.142.in-addr.arpa udp
US 8.8.8.8:53 translate.google.com udp
GB 172.217.16.238:80 translate.google.com tcp
GB 142.250.200.9:80 img2.blogblog.com tcp
US 8.8.8.8:53 xslt.alexa.com udp
GB 142.250.200.33:443 lh6.googleusercontent.com udp
GB 172.217.16.238:443 translate.google.com tcp
US 8.8.8.8:53 translate.googleapis.com udp
US 8.8.8.8:53 fashion.webhostinpakistan.com udp
US 8.8.8.8:53 webhostinpakistan.com udp
US 8.8.8.8:53 hit007.webhostinpakistan.com udp
DE 141.101.120.10:445 e.dtscout.com tcp
GB 142.250.200.42:443 translate.googleapis.com tcp
US 8.8.8.8:53 www.alexa.com udp
US 8.8.8.8:53 ftsignals.blogspot.com udp
GB 142.250.200.51:80 hit007.webhostinpakistan.com tcp
US 8.8.8.8:53 ras55.com udp
GB 216.58.201.97:80 ftsignals.blogspot.com tcp
CA 149.56.240.132:443 s4.histats.com tcp
US 8.8.8.8:53 www.histats.com udp
US 8.8.8.8:53 blogger-related-posts.googlecode.com udp
GB 142.250.187.202:80 ajax.googleapis.com tcp
US 8.8.8.8:53 www.linkwithin.com udp
US 8.8.8.8:53 238.16.217.172.in-addr.arpa udp
US 8.8.8.8:53 3.180.250.142.in-addr.arpa udp
US 8.8.8.8:53 42.200.250.142.in-addr.arpa udp
GB 142.250.178.4:443 www.google.com udp
IE 172.253.116.82:80 blogger-related-posts.googlecode.com tcp
IE 172.253.116.82:80 blogger-related-posts.googlecode.com tcp
SG 118.139.179.30:80 www.linkwithin.com tcp
SG 118.139.179.30:80 www.linkwithin.com tcp
US 8.8.8.8:53 translate-pa.googleapis.com udp
US 8.8.8.8:53 e.dtscout.com udp
US 8.8.8.8:53 blogger.googleusercontent.com udp
DE 141.101.120.10:80 e.dtscout.com tcp
GB 172.217.16.238:443 translate.google.com udp
SG 118.139.179.30:80 www.linkwithin.com tcp
IE 172.253.116.82:80 blogger-related-posts.googlecode.com tcp
US 8.8.8.8:53 t.dtscout.com udp
DE 141.101.120.10:443 t.dtscout.com tcp
CA 149.56.240.132:443 s4.histats.com tcp
GB 216.58.212.234:443 translate-pa.googleapis.com udp
US 8.8.8.8:53 10.120.101.141.in-addr.arpa udp
US 8.8.8.8:53 82.116.253.172.in-addr.arpa udp
US 8.8.8.8:53 30.179.139.118.in-addr.arpa udp
US 8.8.8.8:53 234.212.58.216.in-addr.arpa udp
CA 149.56.240.132:443 s4.histats.com tcp
CA 149.56.240.132:443 s4.histats.com tcp
US 8.8.8.8:53 g.bing.com udp
US 204.79.197.237:443 g.bing.com tcp
IE 172.253.116.82:80 blogger-related-posts.googlecode.com tcp
IE 172.253.116.82:80 blogger-related-posts.googlecode.com tcp
SG 118.139.179.30:80 www.linkwithin.com tcp
IE 172.253.116.82:80 blogger-related-posts.googlecode.com tcp
CA 149.56.240.132:443 s4.histats.com tcp
US 8.8.8.8:53 237.197.79.204.in-addr.arpa udp
SG 118.139.179.30:80 www.linkwithin.com tcp
BE 88.221.83.234:443 www.bing.com tcp
US 8.8.8.8:53 dtsedge.com udp
US 172.67.157.200:443 dtsedge.com tcp
US 8.8.8.8:53 234.83.221.88.in-addr.arpa udp
US 8.8.8.8:53 200.157.67.172.in-addr.arpa udp
CA 149.56.240.132:443 s4.histats.com tcp
BE 88.221.83.234:443 www.bing.com tcp
N/A 224.0.0.251:5353 udp
US 8.8.8.8:53 26.35.223.20.in-addr.arpa udp
GB 142.250.200.42:443 translate-pa.googleapis.com udp
US 8.8.8.8:53 97.17.167.52.in-addr.arpa udp
US 8.8.8.8:53 top-sexy-girls-models.blogspot.com udp
GB 216.58.201.97:80 top-sexy-girls-models.blogspot.com tcp
US 8.8.8.8:53 tpc.googlesyndication.com udp
US 8.8.8.8:53 www.webhostinpakistan.com udp
US 209.159.148.130:80 www.webhostinpakistan.com tcp
US 209.159.148.130:80 www.webhostinpakistan.com tcp
US 8.8.8.8:53 56.126.166.20.in-addr.arpa udp
US 8.8.8.8:53 183.59.114.20.in-addr.arpa udp
US 8.8.8.8:53 57.15.31.184.in-addr.arpa udp
US 8.8.8.8:53 240.221.184.93.in-addr.arpa udp
US 8.8.8.8:53 43.229.111.52.in-addr.arpa udp
US 8.8.8.8:53 tse1.mm.bing.net udp
US 204.79.197.200:443 tse1.mm.bing.net tcp
US 204.79.197.200:443 tse1.mm.bing.net tcp
US 204.79.197.200:443 tse1.mm.bing.net tcp
US 204.79.197.200:443 tse1.mm.bing.net tcp
US 8.8.8.8:53 200.197.79.204.in-addr.arpa udp

Files

C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad\settings.dat

MD5 b2a1398f937474c51a48b347387ee36a
SHA1 922a8567f09e68a04233e84e5919043034635949
SHA256 2dc0bf08246ddd5a32288c895d676017578d792349ca437b1b36e7b2f0ade6d6
SHA512 4a660c0549f7a850e07d8d36dab33121af02a7bd7e9b2f0137930b4c8cd89b6c5630e408f882684e6935dcb0d5cb5e01a854950eeda252a4881458cafcc7ef7c

\??\pipe\LOCAL\crashpad_3356_WXMTCBTTEAUFGRMY

MD5 d41d8cd98f00b204e9800998ecf8427e
SHA1 da39a3ee5e6b4b0d3255bfef95601890afd80709
SHA256 e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855
SHA512 cf83e1357eefb8bdf1542850d66d8007d620e4050b5715dc83f4a921d36ce9ce47d0d13c5d85f2b0ff8318d2877eec2f63b931bd47417a81a538327af927da3e

C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad\settings.dat

MD5 1ac52e2503cc26baee4322f02f5b8d9c
SHA1 38e0cee911f5f2a24888a64780ffdf6fa72207c8
SHA256 f65058c6f1a745b37a64d4c97a8e8ee940210273130cec97a67f568088b5d4d4
SHA512 7670d606bc5197ecb7db3ddaecd6f74a80e6decae92b94e0e8145a7f463fa099058e89f9dfa1c45b9197c36e5e21994698186a2ec970bbdb0937fe28ca46a834

C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\78bc8e26-0182-488f-aef9-65a8d5cacd88.tmp

MD5 fef97df9284c4979b24c936a2d0d3eac
SHA1 aabe5581a08be5ee1011518a86863a0993f235c0
SHA256 7974f4de11ab6bc480a123d8d72a8acc4a549d15825aaebf9e6a6b5b4ce7ecaa
SHA512 47542d93be153ad26524234dd01d13c8716d4c6f09ce05b29a7acc807b1a94ae9d63c2208d94fab2bfad94663ca4800005f404a065823c3a28e70d936593f52c

C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Cache\f_000012

MD5 3e53e00b0232c8e80264d871bc48e037
SHA1 d2d19bef488368a328156b18bcc6537703234327
SHA256 c563d9d869a9c258dfab25962680664a2bb757d2dcbfb9960328845bddf87583
SHA512 b2b66a3265cd76f1de6483bd505fd696cf66a5ab4632f6423a5ff6c00420ce4ce7100b5d0fe11ea663cd475aa217d3bcbefb72e546383caf4ab05368ac8a2cd9

C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Cache\f_000013

MD5 b566b7134ae6318c78de4d5baf1b865b
SHA1 7ad5b5c9c24b388c0c4bbd98deddde132c9d3740
SHA256 08530fb352d2d2a2ae6c253ac21506b5fc6aa7866d817603575d3282af7440f0
SHA512 853de4811e11243489054378f942be355e53e3380e7ac5c623688f053fdd31ae435823542b6f7ad9e94afefa3fee6a59df6ffc267f39680089d89940cff7fd02

C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Local State

MD5 8d7966927e17cdae623f63ae20f5eb68
SHA1 67c3783522571bab9a96e4e290d8fd8a82d5cb49
SHA256 36013c45713f5a33d0fba8b769cea973332f61d7e45aa93ecbc300c3edc2f0c2
SHA512 69d7ca9993f7337a3ddd0074a13ff3b781fa5020a3f04ea1d6f989c2081275e05645569f17a04df75bb43c1b02533f9dc88460e7caa136b9a2720723fbe9b2a6

C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Preferences

MD5 2d79ef2bce2eeecca82eb4e1476c98b8
SHA1 3f1f65c2851e1b9802e11bf6517feab6f922ff68
SHA256 ecb09e19b4c729d5df999838f991b606358e781994d4e792c9f20099e32cd7ba
SHA512 1f245af3c347e349c86fd07f3f6c954867f1c7187b36406319abd060396b07fcc0a9b1816ce8d1f0814a0673ac73c33ddde62d0d008e0c20ac69e8d566ce1f54

C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\data_reduction_proxy_leveldb\CURRENT

MD5 6752a1d65b201c13b62ea44016eb221f
SHA1 58ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA256 0861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA512 9cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389

C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Preferences

MD5 b831b2f522307880ee4593a0a2b3db5e
SHA1 c9c4e4bf082fc07a4d2443cae8a71e79b6ec15ef
SHA256 4c48a5c285022f5531df73f521a8bd2c0e4999437c397b017127fae72640e2eb
SHA512 b728a84f634fd1ad976ebea09b630838d60936ce2218d7a327909b401a8783e2a2cdcc19eb8a547b869630b1741e575bca1e5e0ed71a440074206d3f47e17775

C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index

MD5 fa5278f9388e1dd6145b5d2cb1dd200b
SHA1 82a41ae9e9f7d9d5aaa27835928d587a02399710
SHA256 2d5d0fdb4d6fc2e1fb591b234f30dcfb55c11ffb7c333558a80098aa00138ab6
SHA512 df542e8120dd388be7962baf23e1464bf515781b0a5b3cdeb37aba17ea6fae77d32a9bfec7855c174df8726bd19a39b389fd1f3376c4fdfe4b8aedf33e613919

C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Network Persistent State

MD5 ec20231121280a1df39aa808dd3bbb56
SHA1 d9da01ec1c06bf825c3a6549fdd1bcdb06ea6cd1
SHA256 c519190326fc23c5d3506e71d57a2934c0730b414d830a10e05d80c1c648a881
SHA512 0ebf6b52f6d8e9e33aecbc36bc1684304f052f70ef4daa8b72eca479d1d07516d0fcd4952f2f97e20e842883940fbd97271556944ddeae6f404a4ec480834b8b