Malware Analysis Report

2024-10-23 17:24

Sample ID 240510-tkvhrahc48
Target 2ff0cc7ca464a8b9fe2f47d20b4cc1aa_JaffaCakes118
SHA256 292e93045d1cb0fbb4b8742a55a08fda6b510944eda9012a7f74b469a1a404f0
Tags
socgholish downloader
score
10/10

Table of Contents

Analysis Overview

MITRE ATT&CK

Enterprise Matrix V15

Analysis: static1

Detonation Overview

Signatures

Analysis: behavioral1

Detonation Overview

Command Line

Signatures

Processes

Network

Files

Analysis: behavioral2

Detonation Overview

Command Line

Signatures

Processes

Network

Files

Analysis Overview

score
10/10

SHA256

292e93045d1cb0fbb4b8742a55a08fda6b510944eda9012a7f74b469a1a404f0

Threat Level: Known bad

The file 2ff0cc7ca464a8b9fe2f47d20b4cc1aa_JaffaCakes118 was found to be: Known bad.

Malicious Activity Summary

socgholish downloader

SocGholish

Suspicious use of SetWindowsHookEx

Enumerates system info in registry

Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary

Suspicious use of SendNotifyMessage

Modifies Internet Explorer settings

Suspicious use of FindShellTrayWindow

Suspicious use of WriteProcessMemory

Suspicious behavior: EnumeratesProcesses

MITRE ATT&CK

Analysis: static1

Detonation Overview

Reported

2024-05-10 16:07

Signatures

N/A

Analysis: behavioral1

Detonation Overview

Submitted

2024-05-10 16:07

Reported

2024-05-10 16:10

Platform

win7-20240221-en

Max time kernel

144s

Max time network

149s

Command Line

"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\2ff0cc7ca464a8b9fe2f47d20b4cc1aa_JaffaCakes118.html

Signatures

SocGholish

downloader socgholish

Modifies Internet Explorer settings

adware spyware
Description Indicator Process Target
Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\LowRegistry C:\Program Files\Internet Explorer\iexplore.exe N/A
Set value (int) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" C:\Program Files\Internet Explorer\iexplore.exe N/A
Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing C:\Program Files\Internet Explorer\iexplore.exe N/A
Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive C:\Program Files\Internet Explorer\iexplore.exe N/A
Set value (int) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{67C9D711-0EE7-11EF-AFF6-E61A8C993A67} = "0" C:\Program Files\Internet Explorer\iexplore.exe N/A
Set value (str) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" C:\Program Files\Internet Explorer\iexplore.exe N/A
Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery C:\Program Files\Internet Explorer\iexplore.exe N/A
Set value (str) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE N/A
Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\DomainSuggestion C:\Program Files\Internet Explorer\iexplore.exe N/A
Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\GPU C:\Program Files\Internet Explorer\iexplore.exe N/A
Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\IETld\LowMic C:\Program Files\Internet Explorer\iexplore.exe N/A
Set value (data) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 C:\Program Files\Internet Explorer\iexplore.exe N/A
Set value (int) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" C:\Program Files\Internet Explorer\iexplore.exe N/A
Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Main C:\Program Files\Internet Explorer\iexplore.exe N/A
Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\PageSetup C:\Program Files\Internet Explorer\iexplore.exe N/A
Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser C:\Program Files\Internet Explorer\iexplore.exe N/A
Set value (int) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" C:\Program Files\Internet Explorer\iexplore.exe N/A
Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Main C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE N/A
Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE N/A
Set value (int) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" C:\Program Files\Internet Explorer\iexplore.exe N/A
Set value (data) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000112dd71d930ff24b8b2b71a2c228122b000000000200000000001066000000010000200000007ccd41dca9e08f1831bb9464134f58915f90ff0dfe7f63c62e6381563aa37e5c000000000e80000000020000200000007a0e704cf5f92a5f2c2ca00cede947018ed0e31ff8986a4f2254447dd87fd4e6200000007ee178f853e735718fc107915292bcb04b00f7d54525455b065dcbc95ad88a83400000006a8a1ea2c284bd711be1d352a9ae76c448c1a04163e472c67890dbc387887000f284024d67f24221de1cdd67bcb3186132adcd3af97fbb75a8e030b09cbb5a0c C:\Program Files\Internet Explorer\iexplore.exe N/A
Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\InternetRegistry C:\Program Files\Internet Explorer\iexplore.exe N/A
Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain C:\Program Files\Internet Explorer\iexplore.exe N/A
Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\SearchScopes C:\Program Files\Internet Explorer\iexplore.exe N/A
Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\IntelliForms C:\Program Files\Internet Explorer\iexplore.exe N/A
Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch C:\Program Files\Internet Explorer\iexplore.exe N/A
Set value (int) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "421519120" C:\Program Files\Internet Explorer\iexplore.exe N/A
Set value (data) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 C:\Program Files\Internet Explorer\iexplore.exe N/A
Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic C:\Program Files\Internet Explorer\iexplore.exe N/A
Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage C:\Program Files\Internet Explorer\iexplore.exe N/A
Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Toolbar C:\Program Files\Internet Explorer\iexplore.exe N/A
Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage C:\Program Files\Internet Explorer\iexplore.exe N/A
Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Zoom C:\Program Files\Internet Explorer\iexplore.exe N/A
Set value (str) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" C:\Program Files\Internet Explorer\iexplore.exe N/A
Set value (int) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" C:\Program Files\Internet Explorer\iexplore.exe N/A
Set value (data) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 107ebe58f4a2da01 C:\Program Files\Internet Explorer\iexplore.exe N/A

Suspicious use of FindShellTrayWindow

Description Indicator Process Target
N/A N/A C:\Program Files\Internet Explorer\iexplore.exe N/A

Processes

C:\Program Files\Internet Explorer\iexplore.exe

"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\2ff0cc7ca464a8b9fe2f47d20b4cc1aa_JaffaCakes118.html

C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE

"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2292 CREDAT:275457 /prefetch:2

Network

Country Destination Domain Proto
US 8.8.8.8:53 www.blogger.com udp
GB 142.250.200.9:443 www.blogger.com tcp
GB 142.250.200.9:443 www.blogger.com tcp
US 8.8.8.8:53 ajax.googleapis.com udp
GB 142.250.180.10:80 ajax.googleapis.com tcp
GB 142.250.180.10:80 ajax.googleapis.com tcp
US 8.8.8.8:53 apis.google.com udp
US 8.8.8.8:53 resources.blogblog.com udp
US 8.8.8.8:53 2.bp.blogspot.com udp
US 8.8.8.8:53 1.bp.blogspot.com udp
US 8.8.8.8:53 3.bp.blogspot.com udp
US 8.8.8.8:53 4.bp.blogspot.com udp
GB 216.58.201.110:443 apis.google.com tcp
GB 216.58.201.110:443 apis.google.com tcp
GB 142.250.187.225:80 4.bp.blogspot.com tcp
GB 142.250.187.225:80 4.bp.blogspot.com tcp
GB 142.250.187.225:80 4.bp.blogspot.com tcp
GB 142.250.187.225:80 4.bp.blogspot.com tcp
GB 142.250.187.225:80 4.bp.blogspot.com tcp
GB 142.250.200.9:443 resources.blogblog.com tcp
GB 142.250.187.225:80 4.bp.blogspot.com tcp
GB 142.250.187.225:80 4.bp.blogspot.com tcp
GB 142.250.187.225:80 4.bp.blogspot.com tcp
GB 142.250.187.225:80 4.bp.blogspot.com tcp
GB 142.250.187.225:80 4.bp.blogspot.com tcp
GB 142.250.187.225:80 4.bp.blogspot.com tcp
GB 142.250.187.225:80 4.bp.blogspot.com tcp
GB 142.250.187.225:80 4.bp.blogspot.com tcp
GB 142.250.187.225:80 4.bp.blogspot.com tcp
GB 142.250.187.225:80 4.bp.blogspot.com tcp
GB 142.250.200.9:443 resources.blogblog.com tcp
GB 142.250.187.225:80 4.bp.blogspot.com tcp
GB 142.250.187.225:80 4.bp.blogspot.com tcp
US 8.8.8.8:53 synad2.nuffnang.com.my udp
US 8.8.8.8:53 themes.googleusercontent.com udp
GB 142.250.200.33:80 themes.googleusercontent.com tcp
GB 142.250.200.33:80 themes.googleusercontent.com tcp
GB 142.250.187.225:80 4.bp.blogspot.com tcp
GB 142.250.200.33:443 themes.googleusercontent.com tcp
GB 142.250.187.225:80 4.bp.blogspot.com tcp
GB 142.250.187.225:80 4.bp.blogspot.com tcp
GB 142.250.187.225:80 4.bp.blogspot.com tcp
GB 142.250.187.225:80 4.bp.blogspot.com tcp
GB 142.250.187.225:80 4.bp.blogspot.com tcp
GB 142.250.187.225:80 4.bp.blogspot.com tcp
GB 142.250.187.225:80 4.bp.blogspot.com tcp
US 8.8.8.8:53 www.blogblog.com udp
GB 142.250.200.9:80 www.blogblog.com tcp
GB 142.250.200.9:80 www.blogblog.com tcp
US 8.8.8.8:53 s7.addthis.com udp
US 8.8.8.8:53 www.linkwithin.com udp
US 8.8.8.8:53 adfoc.us udp
US 8.8.8.8:53 www.auto-ping.com udp
US 8.8.8.8:53 i1174.photobucket.com udp
US 8.8.8.8:53 gickr.com udp
SG 118.139.179.30:80 www.linkwithin.com tcp
SG 118.139.179.30:80 www.linkwithin.com tcp
BE 104.68.81.91:80 s7.addthis.com tcp
BE 104.68.81.91:80 s7.addthis.com tcp
US 104.26.6.10:80 adfoc.us tcp
US 104.26.6.10:80 adfoc.us tcp
US 18.239.208.33:80 i1174.photobucket.com tcp
US 18.239.208.33:80 i1174.photobucket.com tcp
US 18.239.208.33:80 i1174.photobucket.com tcp
US 18.239.208.33:80 i1174.photobucket.com tcp
US 104.21.9.233:80 gickr.com tcp
US 18.239.208.33:80 i1174.photobucket.com tcp
US 104.21.9.233:80 gickr.com tcp
US 104.21.9.233:80 gickr.com tcp
DE 94.130.218.80:80 www.auto-ping.com tcp
DE 94.130.218.80:80 www.auto-ping.com tcp
US 18.239.208.33:443 i1174.photobucket.com tcp
US 18.239.208.33:443 i1174.photobucket.com tcp
US 18.239.208.33:443 i1174.photobucket.com tcp
US 18.239.208.33:443 i1174.photobucket.com tcp
US 18.239.208.33:443 i1174.photobucket.com tcp
GB 142.250.187.225:80 4.bp.blogspot.com tcp
GB 142.250.187.225:80 4.bp.blogspot.com tcp
US 8.8.8.8:53 widgets.amung.us udp
US 8.8.8.8:53 img1.blogblog.com udp
US 8.8.8.8:53 www.newcounter.net udp
US 104.22.74.171:80 widgets.amung.us tcp
US 104.22.74.171:80 widgets.amung.us tcp
GB 142.250.200.9:80 img1.blogblog.com tcp
GB 142.250.200.9:80 img1.blogblog.com tcp
US 8.8.8.8:53 www.facebook.com udp
CA 66.70.175.195:80 www.newcounter.net tcp
CA 66.70.175.195:80 www.newcounter.net tcp
GB 163.70.151.35:80 www.facebook.com tcp
GB 163.70.151.35:80 www.facebook.com tcp
GB 163.70.151.35:443 www.facebook.com tcp
US 8.8.8.8:53 newcounter.net udp
CA 66.70.175.195:80 newcounter.net tcp
CA 66.70.175.195:80 newcounter.net tcp
US 8.8.8.8:53 ocsp.r2m02.amazontrust.com udp
US 18.239.210.27:80 ocsp.r2m02.amazontrust.com tcp
DE 94.130.218.80:80 www.auto-ping.com tcp
DE 94.130.218.80:80 www.auto-ping.com tcp
US 8.8.8.8:53 www.microsoft.com udp
US 8.8.8.8:53 www.microsoft.com udp
US 204.79.197.200:443 ieonline.microsoft.com tcp
US 204.79.197.200:443 ieonline.microsoft.com tcp
US 204.79.197.200:443 ieonline.microsoft.com tcp

Files

C:\Users\Admin\AppData\Local\Temp\Tar9ABE.tmp

MD5 9c0c641c06238516f27941aa1166d427
SHA1 64cd549fb8cf014fcd9312aa7a5b023847b6c977
SHA256 4276af3669a141a59388bc56a87f6614d9a9bdddf560636c264219a7eb11256f
SHA512 936ed0c0b0a7ff8e606b1cc4175a1f9b3699748ccbba1c3aff96203033d2e9edabf090e5148370df42fbfc4e31d7229493706ff24f19ff42ff7bef74a6baad06

C:\Users\Admin\AppData\Local\Temp\Cab9ABB.tmp

MD5 ac05d27423a85adc1622c714f2cb6184
SHA1 b0fe2b1abddb97837ea0195be70ab2ff14d43198
SHA256 c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d
SHA512 6d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d

C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

MD5 427059688816d6e25b1f5c7df13aa233
SHA1 c6b3fa1085124df211a8ed6f652e026b4d521af3
SHA256 fb1c25dc37b9b851b6e6c8310b249a6223766cc2e1e6da4e9908a70d25e16141
SHA512 1aada6ac4c17a9ef6e98e279424fdbd7ebfa6b86120fa66d0f9015c4205d7af2ce8459760efbb5cffaba660dabcd0e5c60fc6cb274f777b0c4389c554e41731f

C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\070E0202839D9D67350CD2613E78E416

MD5 55540a230bdab55187a841cfe1aa1545
SHA1 363e4734f757bdeb89868efe94907774a327695e
SHA256 d73494e3446b02167573b3cde3ae1c8584ac26e15e45ac3ec0326708425d90fb
SHA512 c899cb1d31d3214fd9dc8626a55e40580d3b2224bf34310c2abd85d0f63e2dedaeae57832f048c2f500cb2cbf83683fcb14139af3f0b5251606076cdb4689c54

C:\Users\Admin\AppData\Local\Temp\Cab9C4B.tmp

MD5 29f65ba8e88c063813cc50a4ea544e93
SHA1 05a7040d5c127e68c25d81cc51271ffb8bef3568
SHA256 1ed81fa8dfb6999a9fedc6e779138ffd99568992e22d300acd181a6d2c8de184
SHA512 e29b2e92c496245bed3372578074407e8ef8882906ce10c35b3c8deebfefe01b5fd7f3030acaa693e175f4b7aca6cd7d8d10ae1c731b09c5fa19035e005de3aa

C:\Users\Admin\AppData\Local\Temp\Tar9C70.tmp

MD5 435a9ac180383f9fa094131b173a2f7b
SHA1 76944ea657a9db94f9a4bef38f88c46ed4166983
SHA256 67dc37ed50b8e63272b49a254a6039ee225974f1d767bb83eb1fd80e759a7c34
SHA512 1a6b277611959720a9c71114957620517ad94541302f164eb872bd322292a952409bafb8bc2ac793b16ad5f25d83f8594ccff2b7834e3c2b2b941e6fc84c009a

C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

MD5 4e1c90604e719ee2febc983cb07fb989
SHA1 f8f2400cb51a3ee28d6fa19ad8a054dc681117ea
SHA256 88f0b640e8a37216999545cd138f0995ce248c85b9641cb1b967cb4845162569
SHA512 e0e0a7f1f980e042b5dce9858e2f4a890f5e10ef8ac519d2040a19756da0ed1a630e4d007425564df9340b8163dfed9c505ec1f1d2bf5d97c5fcd5f08af480b3

C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\070E0202839D9D67350CD2613E78E416

MD5 d1212690dabdec0e74b973c19f4af2b4
SHA1 fbc8d75387c6e618bf41f53adb6b3eafe9555dfc
SHA256 5df78f3da2433a00ae2f0debed3c1de6d5bbf1ed57106196f81eb470797fa524
SHA512 8dcaffb4f67e81f461bc74d86f52c6855e9c543e9029532596dac773b7695156f17f777a839e484610442c4497499d23b707dda3ef449e499f708e70c41b5b0c

C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

MD5 5c21c0fd94584d11ede24bbb3d807996
SHA1 4e20a16eaf216c3bf784c2ec7d1165e38cccd4ee
SHA256 bf408d45629dcea529332a2576a7e3ed9806b6f8b97aebb11efe029384f5b024
SHA512 aa37e34e803a03de2f8471d426c51d757d143dd1fbc920cfbf2b2d0585321bc89703a93580844be570110b57b288b5c19ed583a863949310ef494597f3c31d70

C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

MD5 67fad7bd7ee7c2b090a05423b3ca3da2
SHA1 41b93ef7e6144b87d76e60e30b08feebafa275dd
SHA256 de05d8e194e0b6ba1507846acf2ce02ea5aac5571cb6a95b2218b06ed59663c1
SHA512 229626bc58c211d3ffbaf1ea9cff2f23d611011a989bcbf7c0d6e4295bb94f63e628440a7ef349aa6022295ae90521d8adaf01584afcc57fbdf6f85cb12934ae

C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

MD5 7ea1e2479fb2d4856280e7ec49578331
SHA1 13126785c63d77e306ea6db9f64e9c59e2de7fc4
SHA256 2971d3bbbea9ba7ad5ffdc0695c8f00395d713160a86102f573cc35f11605753
SHA512 f7ff87d5a2ffdc33e6a85b55c774425282410ecfd5673eef21fddbcebfaca91c389bd09c7f7a3f8c629762838ed1c56ac398acd5e68780a1ccc067d69bb18aa6

C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

MD5 5bbcc721fa8067afa72d9803b7afadde
SHA1 2eda45e9d72b1523c9ec6677b8ef7639d4cd8bac
SHA256 30c0725ca90173cc7e99986696bc6514e36bb47b8233945b2a27a5cae9562075
SHA512 9c631ebe36cf01d409a570e3c8f20e1216542e9afbb48382d59116b7b6e9a2ab020c0f6447edc39a76dd2caf28779de411d7b5f424d43a21c4fa9456e7d767d1

C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\BAD725C80F9E10846F35D039A996E4A8_88B6AE015495C1ECC395D19C1DD02894

MD5 7850bddd19a144df1cd7e25627139833
SHA1 5e57e990efc533e2bb6ac4b547da44359c0de539
SHA256 074651f6be7e7f3018c0ab96ff4fa52f4ee89ee4cafe7e1c182b113c3eef4b32
SHA512 257322f9548450b07d71eca1755eda508dbc5780e571610ec3fd71dc25401b5db081fa363b6755fa27da91cb4dc750fcb421ea826eb633986333c0fea1075cf8

C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\75CA58072B9926F763A91F0CC2798706_056B48C93C4964C2E64C0A8958238656

MD5 494a049cdb60df25d0d4161220686925
SHA1 3b3fa09686b260fe852a99e7d2aeadb8c7de9156
SHA256 aeaa5709df9e6621095ac4db913a86aedf808dd6dc12443508548e21a7c3a6ee
SHA512 bd1433b353539fa194e5d31c5d4a6f20a7ea8cb85db1e31488be3d0552ffa347abe5dc79c47dc40206354fa0cc28bf81e51256411314ef2912dbd96b15581677

C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\75CA58072B9926F763A91F0CC2798706_056B48C93C4964C2E64C0A8958238656

MD5 b7dc32098a5209501891c967160dea03
SHA1 3850fc837f6b7e8007e5ba6b17f48762b28cf1a3
SHA256 2bd2ad54969365fb7f7b93b2f1d7ee0b2249de5a3e0ada6f61fe67d07bacb969
SHA512 c7e9e4fa619b2dcee1e1c70e0f2814be5a0892f3015aa11285ec2450cde12c94eeab8a150707a6e310df64d6dc11286ff949a2274de0b97894f3c43d743be6a7

C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

MD5 b51e74e20fd31c5ed39abc30ab833d99
SHA1 7b2626bd25a4775091ace2cab80ca08df72f1c60
SHA256 54fb0c59963ffa754e5b5cb9e45bd268bf208e2001ee8cf53529cc95c1f4967b
SHA512 6797cbe8cdda416d5d578421c2459393ce5ea34be40ff0be5c6876f16c1361da03dcab360ae2b0412d6347f30f4f09515003a3cef427d42c227567fb40ca5740

C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\F0ACCF77CDCBFF39F6191887F6D2D357

MD5 177030f2b4670ef3aa86c76398f388cd
SHA1 9b12559116a3c4a35ffb598125224b09bc063345
SHA256 06a482bbde5f7e1f0736feb76c72c611c96c56137def5f74b4c775ff7c8a3c42
SHA512 6e13135a3451aa06e0c4356a73553b28c7b7e808132df1af1d00886c72fadbb637da09c8af0a92cf2490baf780040d7008186d60aa5dacc217bd71867695341d

C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\F0ACCF77CDCBFF39F6191887F6D2D357

MD5 a266bb7dcc38a562631361bbf61dd11b
SHA1 3b1efd3a66ea28b16697394703a72ca340a05bd5
SHA256 df545bf919a2439c36983b54cdfc903dfa4f37d3996d8d84b4c31eec6f3c163e
SHA512 0da8ef4f8f6ed3d16d2bc8eb816b9e6e1345dfe2d91160196c47e6149a1d6aedaafadcefd66acdea7f72dcf0832770192ceac15b0c559c4ccc2c0e5581d5aefc

C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\3C428B1A3E5F57D887EC4B864FAC5DCC

MD5 e4a68ac854ac5242460afd72481b2a44
SHA1 df3c24f9bfd666761b268073fe06d1cc8d4f82a4
SHA256 cb3ccbb76031e5e0138f8dd39a23f9de47ffc35e43c1144cea27d46a5ab1cb5f
SHA512 5622207e1ba285f172756f6019af92ac808ed63286e24dfecc1e79873fb5d140f1ceb7133f2476e89a5f75f711f9813a9fbb8fd5287f64adfdcc53b864f9bdc5

C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

MD5 6bdde94066daa63339c844ebeb6d77f6
SHA1 113c6b5f8b85ed58bda9565808a2cfed70e0bd1b
SHA256 bd2fbec001d4b56bed09b0748e8d7dde088e8f38ba001a272aed24d6b675c39c
SHA512 095ab6927b4ff142b83199e1ca93f955225f600aa5815fef5c5a69035f19be83af5e07d3be8820fd268af4020506c16ae9686642204a0d4516cc9c1b3a5d600a

C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

MD5 06ef2e1f35f06bd376e5240782099afa
SHA1 0fc861d347dee92e146ef6a2f3fc95373e991c1a
SHA256 073b414152d1a33f440dfdb5005b380a20b0320c95d40b3fdd2eee5c6bd8a9b2
SHA512 5f32576c712c9282526c00e7eeadcaa99010fff13b35d9fad93522e3602b505f9a39ac9856944defb608ecafdab83a74f7709f355abbda0d3d6116296555c95b

C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

MD5 145d1f33d861601f70455e59dd3a6058
SHA1 47544880fc803cf282abb89c52547f74fbd6fb07
SHA256 94bb891fffec503f49571bbc7c186d3de6d4cd99f005d9afa30f00dad6933212
SHA512 2db32a8926ef3968ebdc817967636d7e19731e562c49955fd3652f49d4e8517aa7688db14e68a86fd95ab2500084787796b04caab91f8d9bfff459bf272d0924

C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

MD5 1309344176c363e95661714bebabb34a
SHA1 5942b5881159672aedfa5a72dd18785873eb47ad
SHA256 cd880590edd08f62584ebceac14217f4ff26ddc5d900dd4eab7e4531a9933b14
SHA512 336dde275c5152a872bcbca8a7327e74b02500da8b60eb27ae02a6d5e8c6c190a882848dffe3afbdd071356100fec825f3c74412944e69b75fbc2518480c1163

C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\3C428B1A3E5F57D887EC4B864FAC5DCC

MD5 20165653110f693f8f9f410b8511370c
SHA1 d44f608592d1f5fb92ed1e71def6018823027b07
SHA256 9ff0523c1ad85d60a82850d7d8cc7715702f767afa806ed76a5d9cfaa1eede4d
SHA512 fd532c79eaa481007fca33cbfc14c25c69b05f31e89c10be0342a82a1bf36a4b00c73814153eceba3f454a8df881dd656455a754ffed46d93856fe0e2d7c2b1e

C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

MD5 4e4406a0f9ed280c5a8cc37edeeb4e0f
SHA1 d423a0e8461676418c69fbd06707d64d04d71227
SHA256 f9c37cb088d1daee850362b39180bf1d8e28955401bba690b524eb4e5492eca5
SHA512 3124b5636a4792ef526e96746dca2fac5ae2cf5bfc4c2addcf1b679df2a07fdb285e7542aeffcce53656c77283734614c976647cf37e86114cc3fe1567520dda

C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

MD5 7b38c66ca35efba211d09e5f01243e61
SHA1 2ebcb899dad7d364d692bcec7ed691dfe8fe5c79
SHA256 7c7c555e3b47f00b3187e188382d1144ef1af88cd94942ccc754405dca0e4753
SHA512 000b4a6b4764c48d455529ed89bd4421987f97541c553d28df06143649edca02f6e37d98b1bfbe89a19ba80925125a9281628dd5971ed66d850ea33e0db141f0

C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

MD5 79791042c20c009b45e86153f14ccc91
SHA1 b672c08742ad76b0a8e7b105ada4c843b56f8317
SHA256 b03d7d2835a9e80cbf074a2db46803cb746268b5cc8252465f1d425d6ec0564f
SHA512 98ebe04fa8ac9e64719ee19d6a50dc6ffe53d18a29e8d2f4ae5bfa1a64c1f1664ddd754a51fbbf18d866b4a98112c3ef1815fb0dc4c4a4498a0a3d532a2cf9e1

C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

MD5 a2215e2e5aabdebd408024f88bf8cbb1
SHA1 49db15e10139379407b7e590c8870e9e1bb9cd4f
SHA256 088cd118add13c3d9a9c3a96784d7b4d0734d2ca412d2f7c7399bfaab382f870
SHA512 b9a8cba5c00e65389b01257423f737ba9b14e36e21c454ebcad8a5a93a82814e9690a59526104af0f294a24d6ab56ed5576e4c8ced3f1d15364264f157781319

C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

MD5 a3abca0facc2b7960eb6ddea749f3d06
SHA1 80fff30d58e8c7d5b10e34606210f0ce50666676
SHA256 387575623e2196f11267997eea86c193cc7cd7c3d5c9220aa68d4d7fe2de50f4
SHA512 bf95affc428c59f2d582438f7159cefccca1ef22c31506637e635001f59688baac4a3a25f30347cc488a57ac779116846276a1c098595d21708a03991e823e0d

C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

MD5 7fdab5c73bc909e38e8bce37baae03e0
SHA1 fe70225e8d5e66f10b16b5ab7e24cc1da6d896aa
SHA256 bba8d8fea03a8063d6b253ab129e67cd3568d67d7d6c5ff86bfbe26ecb33b10d
SHA512 bf3ac7eec2ae6792c8c9816784cc2b37916acafe74f1e4b650b70c67927041ddc5ebbb1408abdae5ebbce9668a20d5897643ecfe61f4ba561463da9b4933efc3

C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

MD5 3e1726c9a83bafcb5dbcd3d96ae05877
SHA1 a2a25ec6ce89fe9d88afefe223056f11eedba703
SHA256 ad1dc825c15635133601cce856d24afb012a8c8c93112461aeb43a3d1327af40
SHA512 1a1611f794a60636699b8fc78b04edff621e296385268d61b989cf12e6f4e1ef14354a49ea75c625b29e46fffb49605e0d65bfdf3f40dc74e9ccf28bbea97ef8

C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

MD5 bbaa5ecbd02d1d35a2677c01e0f4f1aa
SHA1 5b522d0f6de0f25eb7cbc09939c5f949392d41f3
SHA256 b0f7f78006b5356042f09e6053002fbddee94c2a885f47350fe4eb6b0dc93143
SHA512 d2f5dac1b4914061a2e8f4856c0186fb8d28b0604204ad8e260fd64627367be6b6f3cb6ae77b89b7fe504fba3488e0d65971cfe6fc65b7ffec282995f070ad4d

C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

MD5 6c6c48871ed22b432a367f75d3c0dbeb
SHA1 7ea7309ae3d163d605b69611d553e51415fb1ba7
SHA256 01c619c21c76c81431c76194a7e56e5d912b08cc0056d071e2cfcee252bb8f9f
SHA512 9c88052340c2ba53a27f59632fdd1ba1c184dc7c0f8849a896d1519e60adb200017a699df4c91793a156de0ecb74a80148957f184c1979cbaca138eb1a291f70

C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

MD5 4687cbd5459955732c7788aa0854afa1
SHA1 24951ac384fb70c5793abeb65ff9d7799a17b074
SHA256 2aadd065b0724befbeab360daf2f3ee052bbfa8219ea1b3aceb85ebcee1db3b2
SHA512 b376d71f7585890f3efb724ddf6bec5746fbb12e02c6e30707a3a02fe215961ff41a5dfcd3bdf923e3b8a32325178822bd68b8e54c18715967ee4dbaa988c9be

C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

MD5 1ac73ae9ff086ad0bb458f2cce53ce0a
SHA1 a5a5d8bcc08ce1b9b9df0c65c76e8ce9b75b69ec
SHA256 96aa2f9516c925ea49aeb2868028d624dd72c35772497a1487985484c893d7ac
SHA512 42b017d8a0094091f92f2a43d984c6f90778aa9cf56ccc46cda219c7fff6e844ac8f6098b9319874da204c8d60bc46495de6734867256dda2b3600a012f9b7b0

C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

MD5 b7cb7472cabd36167cddeea792618653
SHA1 b1d8b9671512ede45eda8c8131908f15cd4139f0
SHA256 5f23b78c35941eaff149fc13dcaafba491a5ba4fc3b6c09443c4edd2a6504f1c
SHA512 fc9804972094f727e42be9789587665230bf5db50df8cdf35898a10f67695bc92f62dbb3263a3bdc11d21d0c4df1e463c144f9151dac6b61435ff2d54dc44e0d

C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

MD5 7d321bab9c01df690cc502dfc6402a9e
SHA1 315a49192b91dc9038d24362a09a42670a37a279
SHA256 3507a2d8599e4dc77d9515685da8554342abb6d712ae8efa92dd5399a26b90e1
SHA512 b0b65b6466b5f61e71c273bc9f9d8d79fb17a19178829315c58883d85c7575bf57b0a2a168a5ba528474c6f7c459b484bee4a66c6c4c74669c7f379e8b0c7d99

C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

MD5 76b13e8ea2f2cdb3339b8a541b7be9e5
SHA1 03fe1c3344afe09a2a45bf7378450887033ef190
SHA256 f66b19894a9c884fd2eec924dc27dbbba3ae9bf8e39476805e62e0f3cefac7c8
SHA512 daf34e0ca90f1234bfef2d788103c68634122523c0ea9a2defee3ed5680318b1c8fd717fd05a28d8f4f3aad0b3a9df8792880fa0bf8712c5c7cf45c435d66c59

C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

MD5 1f95946e7faca3349ee001d3f90f66df
SHA1 167ff4ad650752945726ceb027236903abf56b46
SHA256 d5754f547e295878511883137c4f68166be2f9985e5468822ee7322b3fa0aa59
SHA512 fdd6d68a2af4943d29322d27ae769c74f7c3b65699348eb1d0a0a2ad708d20a5c593165aac2f7be22f4a586178b33cf3a335b6d6c928a20aa01a51ce0f75125f

C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

MD5 67a041b169c757c961340dea2837e36d
SHA1 ac2df728444981dc2dadb3f4a59064869a2194a6
SHA256 1759f851626ed96ddff7970c87ed67e6272bab2cc1d558ce7912a0f6239f573a
SHA512 25df41935055146d8c4fe7d5e2db6755f6d60c695ab1046996a2dffecb25d4ec48b84ab5bb7361c9dfe2510a50681a28f7a9052681d1db43a10d90ff14857c97

C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

MD5 8360505bb6ec73f1cc794c606bc00d50
SHA1 665478cd2067b7ffb727a5a047de509f0f23d677
SHA256 943d2d236cc680e9b675cfb8d5294e44978b03e2112e8e8e4698b3189f14dc24
SHA512 82e0d4f03cf44fa5375651903cf21bd2a03f85c1272bb0b78a69d1f99f3d4abdfc203f3cc23cf7a899cb4b5f84bc9092b6f78040d56bb0217f64061284ee3ad2

C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

MD5 c55f19319dfc01aefe008e9615a2d5ab
SHA1 fe0b5170112c1314ed9852abd5364be9f192730d
SHA256 eb424b2569d5027b783553a7a266459cab88b901d034c6fd19651a38ad7a90bc
SHA512 0b4565e74b829bee9d66abe95c0a64da14c335575aba82b3260e238eff4e8046ad95a3ea6550a574fc446b5d108eb48859a7326c960603598faa340cdbe18a61

Analysis: behavioral2

Detonation Overview

Submitted

2024-05-10 16:07

Reported

2024-05-10 16:10

Platform

win10v2004-20240508-en

Max time kernel

149s

Max time network

150s

Command Line

"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\2ff0cc7ca464a8b9fe2f47d20b4cc1aa_JaffaCakes118.html

Signatures

Enumerates system info in registry

Description Indicator Process Target
Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe N/A
Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe N/A
Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe N/A

Suspicious use of FindShellTrayWindow

Description Indicator Process Target
N/A N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe N/A
N/A N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe N/A
N/A N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe N/A
N/A N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe N/A
N/A N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe N/A
N/A N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe N/A
N/A N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe N/A
N/A N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe N/A
N/A N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe N/A
N/A N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe N/A
N/A N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe N/A
N/A N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe N/A
N/A N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe N/A
N/A N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe N/A
N/A N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe N/A
N/A N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe N/A
N/A N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe N/A
N/A N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe N/A
N/A N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe N/A
N/A N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe N/A
N/A N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe N/A
N/A N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe N/A
N/A N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe N/A
N/A N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe N/A
N/A N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe N/A

Suspicious use of SendNotifyMessage

Description Indicator Process Target
N/A N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe N/A
N/A N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe N/A
N/A N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe N/A
N/A N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe N/A
N/A N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe N/A
N/A N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe N/A
N/A N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe N/A
N/A N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe N/A
N/A N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe N/A
N/A N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe N/A
N/A N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe N/A
N/A N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe N/A
N/A N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe N/A
N/A N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe N/A
N/A N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe N/A
N/A N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe N/A
N/A N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe N/A
N/A N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe N/A
N/A N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe N/A
N/A N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe N/A
N/A N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe N/A
N/A N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe N/A
N/A N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe N/A
N/A N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe N/A

Suspicious use of WriteProcessMemory

Description Indicator Process Target
PID 1896 wrote to memory of 2552 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 1896 wrote to memory of 2552 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 1896 wrote to memory of 4724 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 1896 wrote to memory of 4724 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 1896 wrote to memory of 4724 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 1896 wrote to memory of 4724 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 1896 wrote to memory of 4724 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 1896 wrote to memory of 4724 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 1896 wrote to memory of 4724 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 1896 wrote to memory of 4724 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 1896 wrote to memory of 4724 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 1896 wrote to memory of 4724 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 1896 wrote to memory of 4724 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 1896 wrote to memory of 4724 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 1896 wrote to memory of 4724 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 1896 wrote to memory of 4724 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 1896 wrote to memory of 4724 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 1896 wrote to memory of 4724 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 1896 wrote to memory of 4724 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 1896 wrote to memory of 4724 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 1896 wrote to memory of 4724 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 1896 wrote to memory of 4724 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 1896 wrote to memory of 4724 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 1896 wrote to memory of 4724 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 1896 wrote to memory of 4724 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 1896 wrote to memory of 4724 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 1896 wrote to memory of 4724 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 1896 wrote to memory of 4724 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 1896 wrote to memory of 4724 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 1896 wrote to memory of 4724 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 1896 wrote to memory of 4724 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 1896 wrote to memory of 4724 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 1896 wrote to memory of 4724 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 1896 wrote to memory of 4724 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 1896 wrote to memory of 4724 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 1896 wrote to memory of 4724 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 1896 wrote to memory of 4724 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 1896 wrote to memory of 4724 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 1896 wrote to memory of 4724 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 1896 wrote to memory of 4724 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 1896 wrote to memory of 4724 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 1896 wrote to memory of 4724 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 1896 wrote to memory of 4668 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 1896 wrote to memory of 4668 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 1896 wrote to memory of 2516 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 1896 wrote to memory of 2516 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 1896 wrote to memory of 2516 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 1896 wrote to memory of 2516 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 1896 wrote to memory of 2516 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 1896 wrote to memory of 2516 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 1896 wrote to memory of 2516 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 1896 wrote to memory of 2516 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 1896 wrote to memory of 2516 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 1896 wrote to memory of 2516 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 1896 wrote to memory of 2516 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 1896 wrote to memory of 2516 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 1896 wrote to memory of 2516 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 1896 wrote to memory of 2516 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 1896 wrote to memory of 2516 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 1896 wrote to memory of 2516 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 1896 wrote to memory of 2516 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 1896 wrote to memory of 2516 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 1896 wrote to memory of 2516 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 1896 wrote to memory of 2516 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe

Processes

C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe

"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\2ff0cc7ca464a8b9fe2f47d20b4cc1aa_JaffaCakes118.html

C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe

"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffef86946f8,0x7ffef8694708,0x7ffef8694718

C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe

"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2084,14164211652586682811,9559507552249538685,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2100 /prefetch:2

C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe

"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2084,14164211652586682811,9559507552249538685,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2188 /prefetch:3

C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe

"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2084,14164211652586682811,9559507552249538685,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2952 /prefetch:8

C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe

"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2084,14164211652586682811,9559507552249538685,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3272 /prefetch:1

C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe

"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2084,14164211652586682811,9559507552249538685,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3304 /prefetch:1

C:\Windows\System32\CompPkgSrv.exe

C:\Windows\System32\CompPkgSrv.exe -Embedding

C:\Windows\System32\CompPkgSrv.exe

C:\Windows\System32\CompPkgSrv.exe -Embedding

C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe

"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2084,14164211652586682811,9559507552249538685,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4732 /prefetch:1

C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe

"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2084,14164211652586682811,9559507552249538685,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5136 /prefetch:1

C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe

"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2084,14164211652586682811,9559507552249538685,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4928 /prefetch:1

C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe

"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2084,14164211652586682811,9559507552249538685,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=5972 /prefetch:2

Network

Country Destination Domain Proto
US 8.8.8.8:53 apis.google.com udp
US 8.8.8.8:53 www.blogger.com udp
US 8.8.8.8:53 ajax.googleapis.com udp
GB 216.58.201.110:443 apis.google.com tcp
GB 142.250.200.9:443 www.blogger.com tcp
GB 142.250.200.9:443 www.blogger.com tcp
US 8.8.8.8:53 8.8.8.8.in-addr.arpa udp
US 8.8.8.8:53 110.201.58.216.in-addr.arpa udp
GB 142.250.200.10:80 ajax.googleapis.com tcp
GB 142.250.200.10:80 ajax.googleapis.com tcp
GB 142.250.200.9:443 www.blogger.com udp
GB 216.58.201.110:443 apis.google.com udp
GB 172.217.16.226:445 pagead2.googlesyndication.com tcp
US 8.8.8.8:53 s7.addthis.com udp
US 8.8.8.8:53 adfoc.us udp
US 8.8.8.8:53 www.linkwithin.com udp
US 8.8.8.8:53 resources.blogblog.com udp
US 8.8.8.8:53 2.bp.blogspot.com udp
US 8.8.8.8:53 1.bp.blogspot.com udp
BE 104.68.81.91:80 s7.addthis.com tcp
US 8.8.8.8:53 3.bp.blogspot.com udp
GB 142.250.187.225:80 3.bp.blogspot.com tcp
GB 142.250.187.225:80 3.bp.blogspot.com tcp
GB 142.250.200.9:443 resources.blogblog.com tcp
US 8.8.8.8:53 synad2.nuffnang.com.my udp
GB 142.250.187.225:80 3.bp.blogspot.com tcp
GB 142.250.187.225:80 3.bp.blogspot.com tcp
US 8.8.8.8:53 themes.googleusercontent.com udp
GB 142.250.187.225:80 3.bp.blogspot.com tcp
US 8.8.8.8:53 www.blogblog.com udp
GB 142.250.187.225:80 3.bp.blogspot.com tcp
GB 142.250.200.33:80 themes.googleusercontent.com tcp
GB 142.250.200.9:80 www.blogblog.com tcp
US 8.8.8.8:53 accounts.google.com udp
GB 142.250.187.225:80 3.bp.blogspot.com tcp
GB 142.250.187.225:80 3.bp.blogspot.com tcp
IE 209.85.203.84:443 accounts.google.com tcp
BE 104.68.81.91:443 s7.addthis.com tcp
US 8.8.8.8:53 9.200.250.142.in-addr.arpa udp
US 8.8.8.8:53 10.200.250.142.in-addr.arpa udp
US 8.8.8.8:53 3.180.250.142.in-addr.arpa udp
US 8.8.8.8:53 91.81.68.104.in-addr.arpa udp
US 8.8.8.8:53 225.187.250.142.in-addr.arpa udp
US 8.8.8.8:53 33.200.250.142.in-addr.arpa udp
GB 142.250.187.225:80 3.bp.blogspot.com tcp
GB 142.250.187.225:80 3.bp.blogspot.com tcp
US 8.8.8.8:53 g.bing.com udp
GB 142.250.200.33:443 themes.googleusercontent.com tcp
GB 142.250.187.225:80 3.bp.blogspot.com tcp
GB 142.250.200.33:443 themes.googleusercontent.com tcp
US 8.8.8.8:53 4.bp.blogspot.com udp
GB 142.250.187.225:80 4.bp.blogspot.com tcp
GB 142.250.200.9:443 www.blogblog.com udp
US 8.8.8.8:53 www.google.com udp
GB 142.250.178.4:443 www.google.com tcp
GB 142.250.187.225:443 4.bp.blogspot.com tcp
GB 142.250.178.4:443 www.google.com tcp
GB 142.250.187.225:80 4.bp.blogspot.com tcp
US 8.8.8.8:53 84.203.85.209.in-addr.arpa udp
US 8.8.8.8:53 73.159.190.20.in-addr.arpa udp
US 8.8.8.8:53 172.210.232.199.in-addr.arpa udp
US 8.8.8.8:53 26.35.223.20.in-addr.arpa udp
GB 142.250.187.225:443 4.bp.blogspot.com tcp
US 204.79.197.237:443 g.bing.com tcp
GB 142.250.187.225:80 4.bp.blogspot.com tcp
GB 142.250.187.225:80 4.bp.blogspot.com tcp
US 8.8.8.8:53 237.197.79.204.in-addr.arpa udp
BE 88.221.83.192:443 www.bing.com tcp
GB 142.250.200.2:139 pagead2.googlesyndication.com tcp
SG 118.139.179.30:80 www.linkwithin.com tcp
US 104.26.7.10:80 adfoc.us tcp
GB 142.250.187.225:80 4.bp.blogspot.com tcp
GB 142.250.187.225:80 4.bp.blogspot.com tcp
GB 142.250.187.225:80 4.bp.blogspot.com tcp
GB 142.250.187.225:80 4.bp.blogspot.com tcp
GB 142.250.187.225:80 4.bp.blogspot.com tcp
GB 142.250.187.225:80 4.bp.blogspot.com tcp
US 8.8.8.8:53 10.7.26.104.in-addr.arpa udp
US 8.8.8.8:53 192.83.221.88.in-addr.arpa udp
SG 118.139.179.30:80 www.linkwithin.com tcp
N/A 224.0.0.251:5353 udp
US 8.8.8.8:53 30.179.139.118.in-addr.arpa udp
US 8.8.8.8:53 www.auto-ping.com udp
DE 94.130.218.80:80 www.auto-ping.com tcp
US 8.8.8.8:53 i1174.photobucket.com udp
US 18.239.208.107:80 i1174.photobucket.com tcp
US 18.239.208.107:80 i1174.photobucket.com tcp
US 8.8.8.8:53 gickr.com udp
US 18.239.208.107:443 i1174.photobucket.com tcp
DE 94.130.218.80:80 www.auto-ping.com tcp
US 8.8.8.8:53 107.208.239.18.in-addr.arpa udp
US 18.239.208.107:443 i1174.photobucket.com tcp
US 18.239.208.107:443 i1174.photobucket.com tcp
US 18.239.208.107:443 i1174.photobucket.com tcp
US 104.21.9.233:80 gickr.com tcp
US 104.21.9.233:80 gickr.com tcp
US 104.21.9.233:80 gickr.com tcp
US 104.21.9.233:80 gickr.com tcp
US 104.21.9.233:80 gickr.com tcp
US 8.8.8.8:53 img1.blogblog.com udp
US 8.8.8.8:53 www.newcounter.net udp
US 8.8.8.8:53 96.208.239.18.in-addr.arpa udp
US 8.8.8.8:53 233.9.21.104.in-addr.arpa udp
GB 142.250.200.9:80 img1.blogblog.com tcp
CA 66.70.175.195:80 www.newcounter.net tcp
US 8.8.8.8:53 synad2.nuffnang.com.my udp
BE 88.221.83.192:443 www.bing.com tcp
US 8.8.8.8:53 newcounter.net udp
GB 142.250.200.9:80 img1.blogblog.com tcp
CA 66.70.175.195:80 newcounter.net tcp
US 8.8.8.8:53 195.175.70.66.in-addr.arpa udp
GB 216.58.212.195:445 fonts.gstatic.com tcp
GB 216.58.212.195:139 fonts.gstatic.com tcp
US 8.8.8.8:53 86.23.85.13.in-addr.arpa udp
US 8.8.8.8:53 56.126.166.20.in-addr.arpa udp
US 8.8.8.8:53 240.221.184.93.in-addr.arpa udp
US 8.8.8.8:53 cdn.adfoc.us udp
US 172.67.74.85:445 cdn.adfoc.us tcp
US 104.26.7.10:445 cdn.adfoc.us tcp
US 104.26.6.10:445 cdn.adfoc.us tcp
US 8.8.8.8:53 cdn.adfoc.us udp
US 8.8.8.8:53 adfoc.us udp
SG 118.139.179.30:80 www.linkwithin.com tcp
SG 118.139.179.30:80 www.linkwithin.com tcp
US 104.26.6.10:445 adfoc.us tcp
US 104.26.7.10:445 adfoc.us tcp
US 172.67.74.85:445 adfoc.us tcp
US 8.8.8.8:53 79.190.18.2.in-addr.arpa udp
US 8.8.8.8:53 widgets.amung.us udp
US 8.8.8.8:53 connect.facebook.net udp
US 8.8.8.8:53 www.facebook.com udp
US 104.22.74.171:80 widgets.amung.us tcp
GB 163.70.151.21:445 connect.facebook.net tcp
GB 163.70.151.35:80 www.facebook.com tcp
GB 163.70.151.35:443 www.facebook.com tcp
US 8.8.8.8:53 t.dtscout.com udp
DE 141.101.120.10:443 t.dtscout.com tcp
US 8.8.8.8:53 43.229.111.52.in-addr.arpa udp
US 8.8.8.8:53 171.74.22.104.in-addr.arpa udp
US 8.8.8.8:53 35.151.70.163.in-addr.arpa udp
US 8.8.8.8:53 connect.facebook.net udp
US 8.8.8.8:53 10.120.101.141.in-addr.arpa udp
GB 163.70.151.21:139 connect.facebook.net tcp
US 8.8.8.8:53 whos.amung.us udp
US 172.67.8.141:445 whos.amung.us tcp
US 104.22.74.171:445 whos.amung.us tcp
US 104.22.75.171:445 whos.amung.us tcp
US 8.8.8.8:53 whos.amung.us udp
US 8.8.8.8:53 9.173.189.20.in-addr.arpa udp

Files

C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad\settings.dat

MD5 87f7abeb82600e1e640b843ad50fe0a1
SHA1 045bbada3f23fc59941bf7d0210fb160cb78ae87
SHA256 b35d6906050d90a81d23646f86c20a8f5d42f058ffc6436fb0a2b8bd71ee1262
SHA512 ea8e7f24ab823ad710ce079c86c40aa957353a00d2775732c23e31be88a10d212e974c4691279aa86016c4660f5795febf739a15207833df6ed964a9ed99d618

\??\pipe\LOCAL\crashpad_1896_POGBAIOXQRXXJEOF

MD5 d41d8cd98f00b204e9800998ecf8427e
SHA1 da39a3ee5e6b4b0d3255bfef95601890afd80709
SHA256 e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855
SHA512 cf83e1357eefb8bdf1542850d66d8007d620e4050b5715dc83f4a921d36ce9ce47d0d13c5d85f2b0ff8318d2877eec2f63b931bd47417a81a538327af927da3e

C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad\settings.dat

MD5 f61fa5143fe872d1d8f1e9f8dc6544f9
SHA1 df44bab94d7388fb38c63085ec4db80cfc5eb009
SHA256 284a24b5b40860240db00ef3ae6a33c9fa8349ab5490a634e27b2c6e9a191c64
SHA512 971000784a6518bb39c5cf043292c7ab659162275470f5f6b632ea91a6bcae83bc80517ceb983dd5abfe8fb4e157344cb65c27e609a879eec00b33c5fad563a6

C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Preferences

MD5 ea70d617c0ce50e4c8bac7c8578335e4
SHA1 0de4eaa9b4f623939c57f87ec0d35280eac4bdb6
SHA256 108f578aacd5670852eca1a1f7387538312d2c54a5d1742dcc2daf59d42f1e5b
SHA512 7b2ff25e7b216ac3c031e02aa6421895ba77ab283240bf7688befeac7f120fc3b2adb2b61812a853b995b44be5c1bfd53848162dbc4fa02ea5a67fc547a0d327

C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Cache\f_00000e

MD5 b6c8122025aff891940d1d5e1ab95fce
SHA1 a0c7ca41d0922d085c358f5dde81ae3e85a8c9c4
SHA256 9954c64c68000f615e5066bc255eced1195d1f8b7dbc715f9062ddf9f147e87e
SHA512 e62a37b55b6b8d95c24fb624105ff6ff72f118e31760d0da1e8df8e8acf627ec6327c26dfa26df8535585877604c7948d2f621ccabc39beec49787e22c302c10

C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Cache\f_000010

MD5 88477d32f888c2b8a3f3d98deb460b3d
SHA1 1fae9ac6c1082fc0426aebe4e683eea9b4ba898c
SHA256 1b1f0b5ef5f21d5742d84f331def7116323365c3dd4aec096a55763e310879d8
SHA512 e0c0588ff27a989cac47797e5a8044983d0b3c75c44416c5f977e0e93e9d3a9321b9283ea077e6dcad0619ac960ee45fe8570f1d5cc7d5d4117fee4f2f0c96b3

C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Local State

MD5 15ae1cd9aebf6050f609c5fe7c67e153
SHA1 cd4e518a825d6f7a5f53ef2352bdface7d24d54f
SHA256 fe8b9ffa0d2241bcf1095e3fe303118c38bdfb92a1452ebd2f3f0b9374c88cbd
SHA512 7281e4c6f723be8791bac7ca969dffcdadc831b0a3e7d3ee4ae7cbeae3af9ccee246ed2144e6f62fe1f7a6549aac61fd0a54caef578c1d47889938c90731c90c

C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Preferences

MD5 0a648a770e7ac7036a1b5143e546edc5
SHA1 395a5804212ec461cf30e6cc3fb37e60985c2fb6
SHA256 96bcfb17c00059596c2e5818f309a2fdb1c7675b20f042f91c24ec8a278419ca
SHA512 aa49229b101c821b547ce5c6736e826a21a9858295c4e9bbc051a4ad3c4bac66e5a895f1d751f3349a1b2128f5f7bb56f63fd282fa55aa947ebafd461136194e

C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index

MD5 dced13a716869e57a4c4553c345a15a2
SHA1 433449bfb76ef3970b751b0196b667718c79912d
SHA256 21f615affd104c151887626974ee7fa2c80676c9693728906ecf225dbed68e60
SHA512 e095a7996c7db9b0d504677a4ea005c96e65845767587af69bccc6a5c0493d47313e2c261cf63a4b9027f9bac3046b6bae7ae45f4ea48cd316ad5e36ffcc7f11

C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Network Persistent State

MD5 61a803ce5b376a59c68e786f6844c0c7
SHA1 55347361a9617d31a086f35cb7043d7c4b66a298
SHA256 bb32adb341552c9c7aedcfec816c89554c37f88fcf3e778519bc775d4dc3abbf
SHA512 b5c96cedf90d681c417227ce7f618b72d5ac2c8cc561d42adf89fb48969fad95b011adde2f15850509ba2838b2b28523fdc45d93a6daff37f3f4742efa417be8

C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Preferences

MD5 b9f7825104ff7811d4f283f68dd3f6c4
SHA1 ca1a08ff1ed8050b6c45816d462d45725e46cdc2
SHA256 f7bcfb9018ab576eeb788563fc92798b08e01c10f7aec34e786e4945883d8f66
SHA512 bbb78c0e9678c785f7d43efd2d61bce7b33fa825ed3e81eb3cbb0ff0e5fcff2c6eae2e62cff2ed52556ac45e2a011dc02bdb3d6bb3f3426dca0b0a3b1b59540f