Malware Analysis Report

2025-06-16 07:32

Sample ID 240601-yynpksee24
Target 8ba2a0d61dc190a5003b09bb46be8e13_JaffaCakes118
SHA256 13aa7d2b21fe2ee553645f4b97a9c933351ddd0188ea8c79bc95c2bdba6d9266
Tags
score
1/10

Table of Contents

Analysis Overview

MITRE ATT&CK

Enterprise Matrix V15

Analysis: static1

Detonation Overview

Signatures

Analysis: behavioral1

Detonation Overview

Command Line

Signatures

Processes

Network

Files

Analysis: behavioral2

Detonation Overview

Command Line

Signatures

Processes

Network

Files

Analysis Overview

score
1/10

SHA256

13aa7d2b21fe2ee553645f4b97a9c933351ddd0188ea8c79bc95c2bdba6d9266

Threat Level: No (potentially) malicious behavior was detected

The file 8ba2a0d61dc190a5003b09bb46be8e13_JaffaCakes118 was found to be: No (potentially) malicious behavior was detected.

Malicious Activity Summary


Suspicious use of SetWindowsHookEx

Enumerates system info in registry

Modifies registry class

Suspicious behavior: EnumeratesProcesses

Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary

Modifies Internet Explorer settings

Suspicious use of FindShellTrayWindow

Suspicious use of WriteProcessMemory

Suspicious use of SendNotifyMessage

MITRE ATT&CK

Analysis: static1

Detonation Overview

Reported

2024-06-01 20:11

Signatures

N/A

Analysis: behavioral1

Detonation Overview

Submitted

2024-06-01 20:11

Reported

2024-06-01 20:14

Platform

win7-20240220-en

Max time kernel

145s

Max time network

146s

Command Line

"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\8ba2a0d61dc190a5003b09bb46be8e13_JaffaCakes118.html

Signatures

Modifies Internet Explorer settings

adware spyware
Description Indicator Process Target
Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE N/A
Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage C:\Program Files\Internet Explorer\iexplore.exe N/A
Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\DomainSuggestion C:\Program Files\Internet Explorer\iexplore.exe N/A
Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\GPU C:\Program Files\Internet Explorer\iexplore.exe N/A
Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser C:\Program Files\Internet Explorer\iexplore.exe N/A
Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive C:\Program Files\Internet Explorer\iexplore.exe N/A
Set value (data) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 C:\Program Files\Internet Explorer\iexplore.exe N/A
Set value (int) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "423434577" C:\Program Files\Internet Explorer\iexplore.exe N/A
Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main C:\Program Files\Internet Explorer\iexplore.exe N/A
Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\PageSetup C:\Program Files\Internet Explorer\iexplore.exe N/A
Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\SearchScopes C:\Program Files\Internet Explorer\iexplore.exe N/A
Set value (int) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" C:\Program Files\Internet Explorer\iexplore.exe N/A
Set value (int) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" C:\Program Files\Internet Explorer\iexplore.exe N/A
Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Toolbar C:\Program Files\Internet Explorer\iexplore.exe N/A
Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch C:\Program Files\Internet Explorer\iexplore.exe N/A
Set value (data) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 C:\Program Files\Internet Explorer\iexplore.exe N/A
Set value (str) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" C:\Program Files\Internet Explorer\iexplore.exe N/A
Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\IntelliForms C:\Program Files\Internet Explorer\iexplore.exe N/A
Set value (int) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" C:\Program Files\Internet Explorer\iexplore.exe N/A
Set value (int) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{2DBF12B1-2053-11EF-8B56-EE69C2CE6029} = "0" C:\Program Files\Internet Explorer\iexplore.exe N/A
Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain C:\Program Files\Internet Explorer\iexplore.exe N/A
Set value (str) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" C:\Program Files\Internet Explorer\iexplore.exe N/A
Set value (data) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 70cc1d0560b4da01 C:\Program Files\Internet Explorer\iexplore.exe N/A
Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic C:\Program Files\Internet Explorer\iexplore.exe N/A
Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\IETld\LowMic C:\Program Files\Internet Explorer\iexplore.exe N/A
Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\InternetRegistry C:\Program Files\Internet Explorer\iexplore.exe N/A
Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage C:\Program Files\Internet Explorer\iexplore.exe N/A
Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Zoom C:\Program Files\Internet Explorer\iexplore.exe N/A
Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing C:\Program Files\Internet Explorer\iexplore.exe N/A
Set value (int) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" C:\Program Files\Internet Explorer\iexplore.exe N/A
Set value (data) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb010000000cf28b8653334048910bd6e744902a4e000000000200000000001066000000010000200000005d41ad74074f2acd4a0cb20ffed93a3ed4c6e101d5daefdc6ec77e4012edaebf000000000e8000000002000020000000ecc8f3529432a19ee7e9b9a9fe43c154689415d5071ca7fed93f7d0f3821041f2000000001354e84c78fe639000161b3197bad98d49ff2df447be9b7757e3af7bb2a0559400000008d745f528d9276437283ca3c3e0567e7c03595d991357427a84f6b96bc9bccfe3d67f633e771ddc2d3dc6963f40fa1e609feac79903f75820ae7c460e268c936 C:\Program Files\Internet Explorer\iexplore.exe N/A
Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\LowRegistry C:\Program Files\Internet Explorer\iexplore.exe N/A
Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery C:\Program Files\Internet Explorer\iexplore.exe N/A
Set value (int) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" C:\Program Files\Internet Explorer\iexplore.exe N/A

Suspicious use of FindShellTrayWindow

Description Indicator Process Target
N/A N/A C:\Program Files\Internet Explorer\iexplore.exe N/A

Processes

C:\Program Files\Internet Explorer\iexplore.exe

"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\8ba2a0d61dc190a5003b09bb46be8e13_JaffaCakes118.html

C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE

"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2240 CREDAT:275457 /prefetch:2

Network

Country Destination Domain Proto
US 8.8.8.8:53 www.blogger.com udp
GB 142.250.178.9:443 www.blogger.com tcp
GB 142.250.178.9:443 www.blogger.com tcp
US 8.8.8.8:53 ajax.googleapis.com udp
US 8.8.8.8:53 apis.google.com udp
US 8.8.8.8:53 4.bp.blogspot.com udp
US 8.8.8.8:53 resources.blogblog.com udp
GB 142.250.200.14:443 apis.google.com tcp
GB 142.250.180.1:80 4.bp.blogspot.com tcp
GB 142.250.200.14:443 apis.google.com tcp
GB 142.250.180.10:80 ajax.googleapis.com tcp
GB 142.250.180.1:80 4.bp.blogspot.com tcp
GB 142.250.178.9:443 resources.blogblog.com tcp
GB 142.250.178.9:443 resources.blogblog.com tcp
GB 142.250.180.10:80 ajax.googleapis.com tcp
US 8.8.8.8:53 www.facebook.com udp
US 8.8.8.8:53 www.dailymotion.com udp
GB 163.70.151.35:443 www.facebook.com tcp
GB 163.70.151.35:443 www.facebook.com tcp
FR 195.8.215.137:80 www.dailymotion.com tcp
FR 195.8.215.137:80 www.dailymotion.com tcp
US 8.8.8.8:53 dailymotion.com udp
FR 195.8.215.136:443 dailymotion.com tcp
FR 195.8.215.136:443 dailymotion.com tcp
FR 195.8.215.137:443 www.dailymotion.com tcp
US 8.8.8.8:53 static1.dmcdn.net udp
GB 18.245.143.129:443 static1.dmcdn.net tcp
GB 18.245.143.129:443 static1.dmcdn.net tcp
US 8.8.8.8:53 ocsp.rootca3.amazontrust.com udp
US 8.8.8.8:53 ocsp.rootca3.amazontrust.com udp
GB 108.138.216.113:80 ocsp.rootca3.amazontrust.com tcp
GB 108.138.216.113:80 ocsp.rootca3.amazontrust.com tcp
GB 18.245.143.129:443 static1.dmcdn.net tcp
GB 18.245.143.129:443 static1.dmcdn.net tcp
GB 18.245.143.129:443 static1.dmcdn.net tcp
GB 18.245.143.129:443 static1.dmcdn.net tcp
US 204.79.197.200:443 ieonline.microsoft.com tcp
US 204.79.197.200:443 ieonline.microsoft.com tcp
US 8.8.8.8:53 www.microsoft.com udp
US 8.8.8.8:53 www.microsoft.com udp
US 204.79.197.200:443 ieonline.microsoft.com tcp

Files

C:\Users\Admin\AppData\Local\Temp\Cab119E.tmp

MD5 ac05d27423a85adc1622c714f2cb6184
SHA1 b0fe2b1abddb97837ea0195be70ab2ff14d43198
SHA256 c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d
SHA512 6d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d

C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

MD5 287fcaae88fe0c9b1e84bab08ce82a31
SHA1 ec343072c43faa30fa5caacbb4d5f4dc3c98aa12
SHA256 1695e764f48a7dc0e8d0a68cb2eec3527a48248da82ef63baa3eeeb7908a45cc
SHA512 dc7ebe750fc1ca96d269867b1d7bd3cb5a55f8a6127b075a4eed4895973070e1c6f55762e28e0c0a89d3b9e42b2ac5f58c7bb72e81eade5a78f53f9c9ae4c842

C:\Users\Admin\AppData\Local\Temp\Tar1634.tmp

MD5 9c0c641c06238516f27941aa1166d427
SHA1 64cd549fb8cf014fcd9312aa7a5b023847b6c977
SHA256 4276af3669a141a59388bc56a87f6614d9a9bdddf560636c264219a7eb11256f
SHA512 936ed0c0b0a7ff8e606b1cc4175a1f9b3699748ccbba1c3aff96203033d2e9edabf090e5148370df42fbfc4e31d7229493706ff24f19ff42ff7bef74a6baad06

C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\94308059B57B3142E455B38A6EB92015

MD5 49aebf8cbd62d92ac215b2923fb1b9f5
SHA1 1723be06719828dda65ad804298d0431f6aff976
SHA256 b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512 bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b

C:\Users\Admin\AppData\Local\Temp\Tar1797.tmp

MD5 4ea6026cf93ec6338144661bf1202cd1
SHA1 a1dec9044f750ad887935a01430bf49322fbdcb7
SHA256 8efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA512 6c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b

C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

MD5 a934ebb0f1037758d3a8985c6750ffe7
SHA1 6ad324c63f1e4c011ebff1564cb82bf9bc0a687c
SHA256 4c8dcc4c50c986929e4714358284c7685b91a21a8609bad7d079c557548f58c5
SHA512 d47a846df031ad668e8d0c79a0d5d406d42912763e095132e08da930b558f6cc3d1df7436549dcf16e221dd0a9f65dbd62a1c37196d00e4a0cd234aa2a51f09b

C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

MD5 f9e3c9e910617e9ae9d100aa72c5782d
SHA1 3e9a83a3ddbd9a1389c3f0f5f33894f6999dc018
SHA256 aa88c9bcf26b1428f644280014ce4c65a1d4492c52d64fe023d03b6111d830e4
SHA512 27cf077a95b4ce28ae9c6419ef7b2d85086d68e120a07af4bedafa4f3d37d419845f25db6a9aabfb67cc04edafbed3275ee1e9e13002a950400e905e9daa0fff

C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

MD5 2c9bea9a37ec3c681496fea80c29686e
SHA1 6d1e56bbc573a38be2b4118ecf1fbbbad2bcbfa3
SHA256 0bb342a59175ed8875011d02d1f3fe27d239c564af4dd2d62b73741eb3d44012
SHA512 e89dbcecf5737c38bde10d2e737f9580d650651f1b63978d6bf73902f5796a7adc53840557afc2d74a32dded69d894ef4449d3a5038cb50671bd3ece919aba0d

C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

MD5 19f9227b031aa2e7f27cf27fd5530f8c
SHA1 c883fa2ceee16417eb9483a152d1b363cf6364b4
SHA256 4938966d142ca546b7b525597cef55835478724fc0c2ec1ee9c55ab228555f01
SHA512 7b72998022d9dfce6f88328c241d1a962607ad7913ff93bddb1bd8797cd478a0a224fb7e85d1c459fede91a2cb79236e080f7aa571db2c7ef181388684d0bbb1

C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

MD5 da4c6e04688ed5a0792db6e6c16afe46
SHA1 aca1e394f00409a20228125b460e3f239b059b10
SHA256 d5082d6a90cc2c42f86854508d342d36d538bd6859c5db7bafca8fe360c5ca25
SHA512 a28b2b618335ce49091912aa26b509da3f8952af54ca1342a5a13373b8b51652f9dd06c84dd27550d2ee81740bdcd7f967d4de450975adaccaa6a52d33ee4ed0

C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

MD5 394613dbadbc01cf5abd2b2b90be669e
SHA1 76adcf6c3d14880607f9ebddf0b676141e8ea963
SHA256 53aa3b271c47e3cda7388a0b538bbd2a5cf9ea7c8b3947e94762dce2112d276f
SHA512 19e0d09bbfccda85a782bb225165618a5647bfe5a603f78851003cfb0bebf2addac81ea0bfb9a696228d08cc5a23a8d09fb9d4787aa0a2d50af66ad4867a8c48

C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

MD5 4685334942c42eb00ef0493816de737a
SHA1 2e98c405ef641e810424f66013f7c57523aa5957
SHA256 7b8a255f8386065e5d950a51b05799dac8c32e40da9e9e0bf44020ece01ce81a
SHA512 1c4abbda65ae1c626f0df0b3403d4dc06d65cc60babb37f641cb22a6a939a594364169da90e790ef17bfcd50afd341e9ecdb3dbe5e689311a38c3f9d82e03148

C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\070E0202839D9D67350CD2613E78E416

MD5 55540a230bdab55187a841cfe1aa1545
SHA1 363e4734f757bdeb89868efe94907774a327695e
SHA256 d73494e3446b02167573b3cde3ae1c8584ac26e15e45ac3ec0326708425d90fb
SHA512 c899cb1d31d3214fd9dc8626a55e40580d3b2224bf34310c2abd85d0f63e2dedaeae57832f048c2f500cb2cbf83683fcb14139af3f0b5251606076cdb4689c54

C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

MD5 97d4a98922a580a239e40fd4a8f723a2
SHA1 25409204ef85cb4d02bfc2517c7f7a5f8d247664
SHA256 91bd6dbbc115ea7c800c1ee3477dec818c21226cba9f549f181d6edccbb4d48e
SHA512 2090bbd5c428bdc79a13d88f7cac60e478635c28e66eacedc7f57e851334ea9ec9201eac8443453be42a3a6a3b6acd3b37b59a7842c6daaeddd206921bed8ff3

C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

MD5 4e98919427a3325ca13b42f32f866c04
SHA1 d0add63ba24f272fa72d06390f8b10cbebfc6b44
SHA256 239a623e91d31b3afc2c1b6bed1d496ac199f28ac9d926238c579a786bfd813e
SHA512 df24d2c53c2e3dffe9a49b54378017cdf855c9b433e9ef5453ad6e96dbe208cd2c990d30131c28468a10f51dd17873d42fb46597e20b55508171851ae1b2e669

C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

MD5 f5f3baa420de692bb7e8fc29fdb873f1
SHA1 385adcb20c34f3cbbc5d84cb6245bf1356ddcf65
SHA256 888f7842e818f332edb291a5669e4f3072b49abe187564fbe7191c1f49b74a46
SHA512 dff5d1d23cfed3f101685ef76dc253b623f9d6289512dfff1cbb427b10ddb784fb8e0cb615ec9461f584228ddf3c7ed0bc185eac7a2ad7cd38b8606ff2ddcaed

C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

MD5 865b75a591d8ee344d1a77a0c6f01b4d
SHA1 fcbeb5b4bafa9982ff9be11ecdadcaa27782d1ba
SHA256 f624abb566ef6ec051b9dccaa463dd423fa405317f3a01f4f00ba0aa6880e83e
SHA512 c131e722b6524b95bbee4d9bb5f124e100b5cc41da4f697d388c3c296361d0e46b722aa57af6b893bb8fb7a9364886ca645a2c072081f0f731c752d506f0318b

C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

MD5 15d52eb4bbc2385d965d22252b33adea
SHA1 74da5c5df3b7b5b5256891044fd9da452a319b8e
SHA256 0ba751cb2f45e5b10063c117ddd0aeee4e231a48db87911d6cee190b70e057bf
SHA512 9e1a93ca2c3578b20f07e04eddb6ab2c8ad3c675a9d8883854a932e2721c48937fb68fc3be3a3660b50170bc715a42f870553de60d1b8cb4bbd5b1d70cdadcb5

C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

MD5 55cbabf81f2b80d52cae3e4ab9c7c25b
SHA1 a01bf3e548e202c300767cd50d0873d1d3b4ce0c
SHA256 a850f9877e8c05e9f3ca78445129a4f7289832cab5e5f0790cd6eb9549ee2080
SHA512 3bb0c7e5d381b4cd26e7806f6c7bbaf56bfa52ae098710d924b4170bade85089643e3c95f6b235919337bff052df8c251b0f8646701aca58c7fe0d37890712b4

C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

MD5 b45e2c9fb91e156fca01d4c9aa5214f3
SHA1 fe7a80103af2480f451ad88ae2743443104975d7
SHA256 76b5fa553f691033a3eaa3d244eac8f7f443199980874f136dab23f6cde707e7
SHA512 5f3d98523253d6782db23b3b874e564265cab4c69c71f30bced28c48210aa42a9a1500d5063ec250919df62b890df391d72988ebd04e0278d8349e541c6e6867

C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

MD5 477cfab4b1078ede958ce5baf2d2011f
SHA1 c018abbb7ba17cf5aaba49ad863a86a800d25cd6
SHA256 aaed86d16609ab762452ec9686fbcc3a0b6fef57ecf43a60685e0a89b4dec9cb
SHA512 79f994850c7bd4b5553ee6729980a73d50a383269babd2406e3a3b71779fb6a82d117c4c7529bda807a745df7dc3da969d1be5e807cc7f5295f7d5318c125d56

C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

MD5 48002ff75256ec2b99fb131707066033
SHA1 059e9cb7335c9968b871c86cf62ce16dca508a04
SHA256 7a4b2f75c89c24ec728e42908ef42aa2ffb7053394790be228c37227de9c70f8
SHA512 ee7ab728c7f04724d4e9fb6239ec17cfdd1048d91d1363c9181b306b3d5749e995b368cc53c838bf98f8cffdb708ab28ae54b08bdb409187c2dfd1bea72fb901

C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

MD5 a4db53171d1f23e10ad2fc8808caacff
SHA1 78389641dc4ca8a61503c1e33bc7db94deb652d1
SHA256 112d8d335739cc9a1d464b1985ca441636aab05445d893a499ed51ed15641c26
SHA512 4633043874f489782d1a2d0fd08629b58df5a1a3f282c50546ce7fcfdf067faf33fdc4cf7b8fa153efcd3f70826cb8499496465acd7a2b718117dd34c0a366cd

C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

MD5 42c5ad07033295748d8e4122dbe525b4
SHA1 b1439b3aa217cbb8ea8b9922b9b9a3a104be7bbf
SHA256 a7c884b83791ab5a7bf22fe1d7ffa6bbc1d0fd84b420f98ff8ac3ef46782126b
SHA512 342d5f37648d4686242eb98d7dfc80de4473f64a622aa99d90219882a5f1fb6f7a7c545de50e6344951e908ebc2f5cecd53fdf10906325455dbf846911b84c71

C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

MD5 e7d69a8c2bafba4e8c56a95f2375fc99
SHA1 7dc0203040630bd1f0fafdc46c03c22c7e6a8f67
SHA256 5a64d608937f7283fb6aabe06d0934f2b4e54daeac075e7103d3a0188b0fe15b
SHA512 3c23968c500060191d7273c6aa63202b76e90139624e7e3f8aa10498458b16f87721bbe4032ee90d01f44550a863220a55af666d3e70b1099a82ee94bd4f27f3

C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\F0ACCF77CDCBFF39F6191887F6D2D357

MD5 112d4dbba540bc027261ae94771e1b04
SHA1 b423bdf6e4a5f4f8be1be9af9bc191524c1cb16b
SHA256 c62669b119b7783c04dc28fdeac4b5a05dbcb0cad5cd4adbd6eab76d2aa6e61f
SHA512 a0109632930a20a2f5a8a00299c1365aa39fceabcc53f0f1ad5f2e841174f9abab332b569ae86b938f0242e563ff4b1709a760c6874d07c57b8c8eabe3cabf67

C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\F0ACCF77CDCBFF39F6191887F6D2D357

MD5 a266bb7dcc38a562631361bbf61dd11b
SHA1 3b1efd3a66ea28b16697394703a72ca340a05bd5
SHA256 df545bf919a2439c36983b54cdfc903dfa4f37d3996d8d84b4c31eec6f3c163e
SHA512 0da8ef4f8f6ed3d16d2bc8eb816b9e6e1345dfe2d91160196c47e6149a1d6aedaafadcefd66acdea7f72dcf0832770192ceac15b0c559c4ccc2c0e5581d5aefc

C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

MD5 a867e831f36c5b7c0fc9bb83554b38ea
SHA1 269042c06ad07eebe109b7c96b712ac76b2c1e89
SHA256 10e1fe9672393b955919d6c7e84e30176f8fedebed86e8993ea1e3c124e1d43e
SHA512 b5017f4fda8c11707712b2dd7c883d9cecae11ed8aab9dba39eee4eb3ac48aee8b2067663097fe510ad66a8540e6c9891d2cca56f99fd7db425eacfc1b5829dc

C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\F0ACCF77CDCBFF39F6191887F6D2D357

MD5 ee3fe4f7aac66bcaed15f1e87ce80a6f
SHA1 3524db6134cbe17a9a73877aa3b9afa96b7ffec9
SHA256 6a9c3d1f56a6c9d75b5a2e9278a4c07eee1a92ca4f71b359f844c3019c5d7e5e
SHA512 c643ffb027b252886a9e37cfc0868d808288fbd2ef648b14617090239e2d195761c975cc710c82dc7a02435ab031e5d756ef50b26018e211744c48f42bc9b72e

C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

MD5 0d68aed9b84c5033c04d00862d1c0078
SHA1 5bb67987978bbe0e5da8481c82464c84cd618b66
SHA256 0934e844a537b715b0b6c32b0cb4579b46c4be8d8e49063766b86e9f1838b995
SHA512 222bd1737d0ba2c35c32561f0dc65f2995f86868b4b3590e55e11bc3262282421e6ee84f1864151468564ee9ea8695abef55b461c94ec9c92ccab47c6e4f2818

C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

MD5 aa35eed9622a5654449dcd1ebb2c0363
SHA1 de763a9664c4ce5a546d59d5f675cf521a5848ce
SHA256 e816ce64b46c8a6c3cd0f337dfec123049137692149cba3d285361ac1de1558e
SHA512 50ffffa4ab625bcec0c35ac3423b59278c0da5b6132b63e1b4f6c3c69906eecc642db976e125238ae1d5e327bd106769f110805bc682c98e094d775d73e9e451

C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

MD5 ed2de291b4c4cd3a978ae70ce2c4a464
SHA1 4f9e94748f44a121fb45b22e548b608d22d3e466
SHA256 1c91b1ef05f0d03cce721f5f4d28b92e88444b85030b5edb729e3a4d42a12935
SHA512 034e8d0076847ccd65a10570a08c90f535ee8c04c9da4f8f989827c2ada557f5bb717a26eb19519d8d4f48de90971ec9c57ecda37b8ab1b0346804dafd4fdfe7

C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\3C428B1A3E5F57D887EC4B864FAC5DCC

MD5 e4a68ac854ac5242460afd72481b2a44
SHA1 df3c24f9bfd666761b268073fe06d1cc8d4f82a4
SHA256 cb3ccbb76031e5e0138f8dd39a23f9de47ffc35e43c1144cea27d46a5ab1cb5f
SHA512 5622207e1ba285f172756f6019af92ac808ed63286e24dfecc1e79873fb5d140f1ceb7133f2476e89a5f75f711f9813a9fbb8fd5287f64adfdcc53b864f9bdc5

C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

MD5 c018b5b402fd5f9b765b9fc29481b365
SHA1 e6e17d3dc3fdf65a34bbb892c4c52539439a6a16
SHA256 af023d65af4ff6f1c68c7a5525cae0258a80c484a304752fcbcb0c3b082dbc6a
SHA512 9da780ad15ffe37c23552bd7f7d2453c16ca85379a483eb4e955ed278926e520e1b5333994b236576609dd200f5c9ebf2a200573fc9c1120a74c0c7f7f97a2c3

C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

MD5 96c682f212133c470207fe0713f76469
SHA1 261c9cb2a412787b9a860377891d4bca18aa819a
SHA256 48b56588d6c3a39de5e2b6e2f88081a1846485c685b9a1e71aa5a49007178a43
SHA512 f6d2819ed4708f605234f7a9f67a858780ec10ada798cfc2033c72e638944c65f80cb0ca69b1100c797400f57ff55809df0af04e4061997b57188ec2300e166c

C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

MD5 d1936100c9edb0f9931b564100983aa3
SHA1 4b7e6503aee619e970b5e0aa62463ac35469ecde
SHA256 002c308e92918e4dad69ee420d2ddc8f404dbf1f137f69715bfa051c53f2d1b7
SHA512 95960a63ef856ffc7880e2c632e9d040deaf579b157c8be57255219ea24a3944852b9682bce63b0d8a8a7e7bdcc0e1d513ac2e43e4408b20eff3c204e92acd2a

C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\3C428B1A3E5F57D887EC4B864FAC5DCC

MD5 3ec0b27a3cb370e92ce77bf72a449cb7
SHA1 1f333a72eabd2a65675d0667972465d3ec3c4fb7
SHA256 9ed1686e76dbba5fb626dd0c086ca3d0ccfdffa4b7547b0274debe40552e9620
SHA512 00f2f56e872910fcd8585bbde2b529160ae58bae3bf997d3b4f4b4d025e8734d24add7170b66928901718ca3069647fb543dd076d332f86a2722cffd247627f5

Analysis: behavioral2

Detonation Overview

Submitted

2024-06-01 20:11

Reported

2024-06-01 20:14

Platform

win10v2004-20240508-en

Max time kernel

145s

Max time network

150s

Command Line

"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\8ba2a0d61dc190a5003b09bb46be8e13_JaffaCakes118.html

Signatures

Enumerates system info in registry

Description Indicator Process Target
Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe N/A
Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe N/A
Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe N/A

Modifies registry class

Description Indicator Process Target
Key created \REGISTRY\MACHINE\Software\Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppModel\Deployment\Package\*\S-1-5-21-4124900551-4068476067-3491212533-1000\{4AA44347-D341-4759-96DE-BE4FC17671F0} C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe N/A

Suspicious use of FindShellTrayWindow

Description Indicator Process Target
N/A N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe N/A
N/A N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe N/A
N/A N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe N/A
N/A N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe N/A
N/A N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe N/A
N/A N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe N/A
N/A N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe N/A
N/A N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe N/A
N/A N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe N/A
N/A N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe N/A
N/A N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe N/A
N/A N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe N/A
N/A N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe N/A
N/A N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe N/A
N/A N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe N/A
N/A N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe N/A
N/A N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe N/A
N/A N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe N/A
N/A N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe N/A
N/A N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe N/A
N/A N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe N/A
N/A N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe N/A
N/A N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe N/A
N/A N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe N/A
N/A N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe N/A

Suspicious use of SendNotifyMessage

Description Indicator Process Target
N/A N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe N/A
N/A N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe N/A
N/A N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe N/A
N/A N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe N/A
N/A N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe N/A
N/A N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe N/A
N/A N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe N/A
N/A N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe N/A
N/A N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe N/A
N/A N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe N/A
N/A N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe N/A
N/A N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe N/A
N/A N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe N/A
N/A N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe N/A
N/A N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe N/A
N/A N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe N/A
N/A N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe N/A
N/A N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe N/A
N/A N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe N/A
N/A N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe N/A
N/A N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe N/A
N/A N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe N/A
N/A N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe N/A
N/A N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe N/A

Suspicious use of WriteProcessMemory

Description Indicator Process Target
PID 444 wrote to memory of 1848 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 444 wrote to memory of 1848 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 444 wrote to memory of 4952 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 444 wrote to memory of 4952 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 444 wrote to memory of 4952 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 444 wrote to memory of 4952 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 444 wrote to memory of 4952 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 444 wrote to memory of 4952 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 444 wrote to memory of 4952 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 444 wrote to memory of 4952 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 444 wrote to memory of 4952 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 444 wrote to memory of 4952 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 444 wrote to memory of 4952 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 444 wrote to memory of 4952 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 444 wrote to memory of 4952 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 444 wrote to memory of 4952 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 444 wrote to memory of 4952 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 444 wrote to memory of 4952 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 444 wrote to memory of 4952 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 444 wrote to memory of 4952 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 444 wrote to memory of 4952 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 444 wrote to memory of 4952 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 444 wrote to memory of 4952 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 444 wrote to memory of 4952 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 444 wrote to memory of 4952 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 444 wrote to memory of 4952 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 444 wrote to memory of 4952 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 444 wrote to memory of 4952 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 444 wrote to memory of 4952 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 444 wrote to memory of 4952 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 444 wrote to memory of 4952 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 444 wrote to memory of 4952 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 444 wrote to memory of 4952 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 444 wrote to memory of 4952 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 444 wrote to memory of 4952 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 444 wrote to memory of 4952 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 444 wrote to memory of 4952 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 444 wrote to memory of 4952 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 444 wrote to memory of 4952 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 444 wrote to memory of 4952 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 444 wrote to memory of 4952 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 444 wrote to memory of 4952 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 444 wrote to memory of 2388 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 444 wrote to memory of 2388 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 444 wrote to memory of 4828 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 444 wrote to memory of 4828 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 444 wrote to memory of 4828 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 444 wrote to memory of 4828 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 444 wrote to memory of 4828 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 444 wrote to memory of 4828 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 444 wrote to memory of 4828 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 444 wrote to memory of 4828 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 444 wrote to memory of 4828 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 444 wrote to memory of 4828 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 444 wrote to memory of 4828 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 444 wrote to memory of 4828 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 444 wrote to memory of 4828 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 444 wrote to memory of 4828 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 444 wrote to memory of 4828 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 444 wrote to memory of 4828 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 444 wrote to memory of 4828 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 444 wrote to memory of 4828 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 444 wrote to memory of 4828 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 444 wrote to memory of 4828 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe

Processes

C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe

"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\8ba2a0d61dc190a5003b09bb46be8e13_JaffaCakes118.html

C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe

"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ff8fd0746f8,0x7ff8fd074708,0x7ff8fd074718

C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe

"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2004,70247653807162126,8377606386200426232,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2036 /prefetch:2

C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe

"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2004,70247653807162126,8377606386200426232,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2300 /prefetch:3

C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe

"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2004,70247653807162126,8377606386200426232,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2632 /prefetch:8

C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe

"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2004,70247653807162126,8377606386200426232,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3244 /prefetch:1

C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe

"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2004,70247653807162126,8377606386200426232,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3268 /prefetch:1

C:\Windows\System32\CompPkgSrv.exe

C:\Windows\System32\CompPkgSrv.exe -Embedding

C:\Windows\System32\CompPkgSrv.exe

C:\Windows\System32\CompPkgSrv.exe -Embedding

C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe

"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2004,70247653807162126,8377606386200426232,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4576 /prefetch:1

C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe

"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2004,70247653807162126,8377606386200426232,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4752 /prefetch:1

C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe

"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2004,70247653807162126,8377606386200426232,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4600 /prefetch:1

C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe

"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2004,70247653807162126,8377606386200426232,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5488 /prefetch:1

C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe

"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2004,70247653807162126,8377606386200426232,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5492 /prefetch:1

C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe

"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2004,70247653807162126,8377606386200426232,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3932 /prefetch:1

C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe

"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2004,70247653807162126,8377606386200426232,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=13 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3860 /prefetch:1

C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe

"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2004,70247653807162126,8377606386200426232,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=14 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6556 /prefetch:1

C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe

"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2004,70247653807162126,8377606386200426232,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=15 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5240 /prefetch:1

C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe

"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=audio.mojom.AudioService --field-trial-handle=2004,70247653807162126,8377606386200426232,131072 --lang=en-US --service-sandbox-type=audio --mojo-platform-channel-handle=5732 /prefetch:8

C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe

"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=video_capture.mojom.VideoCaptureService --field-trial-handle=2004,70247653807162126,8377606386200426232,131072 --lang=en-US --service-sandbox-type=video_capture --mojo-platform-channel-handle=5764 /prefetch:8

C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe

"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2004,70247653807162126,8377606386200426232,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=7484 /prefetch:8

C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe

"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2004,70247653807162126,8377606386200426232,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=7484 /prefetch:8

C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe

"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2004,70247653807162126,8377606386200426232,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=19 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=7296 /prefetch:1

C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe

"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2004,70247653807162126,8377606386200426232,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=20 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=7300 /prefetch:1

C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe

"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2004,70247653807162126,8377606386200426232,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=21 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4100 /prefetch:1

C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe

"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2004,70247653807162126,8377606386200426232,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=22 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=7172 /prefetch:1

C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe

"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2004,70247653807162126,8377606386200426232,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2152 /prefetch:2

Network

Country Destination Domain Proto
US 8.8.8.8:53 133.211.185.52.in-addr.arpa udp
US 8.8.8.8:53 apis.google.com udp
US 8.8.8.8:53 www.blogger.com udp
US 8.8.8.8:53 ajax.googleapis.com udp
GB 142.250.178.9:443 www.blogger.com tcp
GB 172.217.169.42:80 ajax.googleapis.com tcp
GB 142.250.200.14:443 apis.google.com tcp
GB 142.250.178.9:443 www.blogger.com udp
US 8.8.8.8:53 4.bp.blogspot.com udp
US 8.8.8.8:53 resources.blogblog.com udp
GB 142.250.200.14:443 apis.google.com udp
US 8.8.8.8:53 www.facebook.com udp
US 8.8.8.8:53 www.dailymotion.com udp
GB 163.70.151.35:443 www.facebook.com tcp
GB 142.250.179.226:445 pagead2.googlesyndication.com tcp
US 8.8.8.8:53 82.90.14.23.in-addr.arpa udp
US 8.8.8.8:53 133.32.126.40.in-addr.arpa udp
US 8.8.8.8:53 9.178.250.142.in-addr.arpa udp
US 8.8.8.8:53 42.169.217.172.in-addr.arpa udp
US 8.8.8.8:53 14.200.250.142.in-addr.arpa udp
US 8.8.8.8:53 35.151.70.163.in-addr.arpa udp
GB 142.250.180.1:80 4.bp.blogspot.com tcp
GB 142.250.178.9:443 resources.blogblog.com tcp
GB 142.250.178.9:443 resources.blogblog.com tcp
GB 142.250.178.9:443 resources.blogblog.com tcp
GB 142.250.178.9:443 resources.blogblog.com tcp
FR 195.8.215.137:80 www.dailymotion.com tcp
US 8.8.8.8:53 dailymotion.com udp
FR 195.8.215.136:443 dailymotion.com tcp
FR 195.8.215.137:443 www.dailymotion.com tcp
GB 172.217.169.2:139 pagead2.googlesyndication.com tcp
US 8.8.8.8:53 1.180.250.142.in-addr.arpa udp
US 8.8.8.8:53 137.215.8.195.in-addr.arpa udp
US 8.8.8.8:53 136.215.8.195.in-addr.arpa udp
US 8.8.8.8:53 static1.dmcdn.net udp
GB 18.245.143.129:443 static1.dmcdn.net tcp
GB 18.245.143.129:443 static1.dmcdn.net tcp
GB 18.245.143.129:443 static1.dmcdn.net tcp
GB 18.245.143.129:443 static1.dmcdn.net tcp
GB 18.245.143.129:443 static1.dmcdn.net tcp
GB 18.245.143.129:443 static1.dmcdn.net tcp
US 8.8.8.8:53 api.dailymotion.com udp
FR 188.65.124.92:443 api.dailymotion.com tcp
US 8.8.8.8:53 129.143.245.18.in-addr.arpa udp
US 8.8.8.8:53 43.39.156.108.in-addr.arpa udp
US 8.8.8.8:53 92.124.65.188.in-addr.arpa udp
US 8.8.8.8:53 195.212.58.216.in-addr.arpa udp
US 8.8.8.8:53 s2.dmcdn.net udp
US 8.8.8.8:53 c.s-microsoft.com udp
US 8.8.8.8:53 s1.dmcdn.net udp
GB 18.239.236.5:443 s1.dmcdn.net tcp
GB 18.239.236.5:443 s1.dmcdn.net tcp
GB 18.239.236.5:443 s1.dmcdn.net tcp
GB 2.21.189.233:443 c.s-microsoft.com tcp
GB 18.239.236.123:443 s1.dmcdn.net tcp
GB 18.239.236.123:443 s1.dmcdn.net tcp
GB 18.239.236.123:443 s1.dmcdn.net tcp
GB 18.239.236.123:443 s1.dmcdn.net tcp
GB 18.239.236.123:443 s1.dmcdn.net tcp
US 8.8.8.8:53 5.236.239.18.in-addr.arpa udp
US 8.8.8.8:53 123.236.239.18.in-addr.arpa udp
US 8.8.8.8:53 233.189.21.2.in-addr.arpa udp
US 8.8.8.8:53 pq-direct.revsci.net udp
DE 142.132.202.70:443 pq-direct.revsci.net tcp
US 8.8.8.8:53 js.revsci.net udp
DE 142.132.202.70:443 js.revsci.net tcp
US 8.8.8.8:53 a11ybar.com udp
US 104.21.56.218:443 a11ybar.com tcp
US 8.8.8.8:53 70.202.132.142.in-addr.arpa udp
US 8.8.8.8:53 nethcdn.com udp
US 8.8.8.8:53 powered-by-revidy.com udp
US 8.8.8.8:53 connect.facebook.net udp
US 104.21.73.233:443 nethcdn.com tcp
DE 142.132.202.70:443 powered-by-revidy.com tcp
GB 163.70.151.21:443 connect.facebook.net tcp
US 8.8.8.8:53 apps.identrust.com udp
NL 23.63.101.153:80 apps.identrust.com tcp
US 8.8.8.8:53 korfo.org udp
DE 142.132.202.70:443 korfo.org tcp
DE 142.132.202.70:443 korfo.org tcp
US 8.8.8.8:53 s.click.aliexpress.com udp
US 8.8.8.8:53 stripchat.com udp
US 8.8.8.8:53 hlmiq.com udp
US 8.8.8.8:53 www.wotif.com udp
US 8.8.8.8:53 refer.cashrewards.com.au udp
US 8.8.8.8:53 try.fender.com udp
US 8.8.8.8:53 www.rosewe.com udp
US 8.8.8.8:53 www.vrbo.com udp
US 8.8.8.8:53 www.tomtop.com udp
DE 142.132.202.70:443 hlmiq.com tcp
DE 142.132.202.70:443 hlmiq.com tcp
DE 142.132.202.70:443 hlmiq.com tcp
US 104.17.118.12:443 stripchat.com tcp
BE 23.55.96.126:443 www.wotif.com tcp
US 104.18.34.21:443 try.fender.com tcp
US 3.211.66.19:443 refer.cashrewards.com.au tcp
US 44.240.106.194:443 www.tomtop.com tcp
NL 23.62.61.178:443 www.vrbo.com tcp
GB 18.244.155.97:443 www.rosewe.com tcp
US 8.8.8.8:53 www.net-a-porter.com udp
US 8.8.8.8:53 www.futurelearn.com udp
BE 104.68.85.7:443 s.click.aliexpress.com tcp
US 104.18.29.94:443 www.futurelearn.com tcp
BE 23.55.96.169:443 www.net-a-porter.com tcp
BE 23.55.96.169:443 www.net-a-porter.com tcp
US 8.8.8.8:53 www.nike.com udp
US 8.8.8.8:53 my.trip.com udp
NL 23.62.61.170:443 my.trip.com tcp
BE 23.55.98.85:443 www.nike.com tcp
US 8.8.8.8:53 218.56.21.104.in-addr.arpa udp
US 8.8.8.8:53 233.73.21.104.in-addr.arpa udp
US 8.8.8.8:53 153.101.63.23.in-addr.arpa udp
US 8.8.8.8:53 21.151.70.163.in-addr.arpa udp
US 8.8.8.8:53 12.118.17.104.in-addr.arpa udp
US 8.8.8.8:53 126.96.55.23.in-addr.arpa udp
US 8.8.8.8:53 21.34.18.104.in-addr.arpa udp
US 8.8.8.8:53 178.61.62.23.in-addr.arpa udp
US 8.8.8.8:53 19.66.211.3.in-addr.arpa udp
US 8.8.8.8:53 194.106.240.44.in-addr.arpa udp
US 8.8.8.8:53 97.155.244.18.in-addr.arpa udp
US 8.8.8.8:53 94.29.18.104.in-addr.arpa udp
US 8.8.8.8:53 169.96.55.23.in-addr.arpa udp
US 8.8.8.8:53 7.85.68.104.in-addr.arpa udp
US 8.8.8.8:53 best.aliexpress.com udp
US 8.8.8.8:53 www.thelotter.net udp
US 8.8.8.8:53 www.fiverr.com udp
US 104.26.11.157:443 www.thelotter.net tcp
US 104.18.114.47:443 www.fiverr.com tcp
US 8.8.8.8:53 lastpass.com udp
BE 104.68.81.31:443 lastpass.com tcp
US 8.8.8.8:53 www.coinspot.com.au udp
US 104.20.10.243:443 www.coinspot.com.au tcp
US 8.8.8.8:53 a.nel.cloudflare.com udp
US 35.190.80.1:443 a.nel.cloudflare.com tcp
US 8.8.8.8:53 www.boohoo.com udp
US 8.8.8.8:53 www.cashrewards.com.au udp
US 172.64.150.208:443 www.boohoo.com tcp
GB 13.224.245.105:443 www.cashrewards.com.au tcp
US 8.8.8.8:53 monday.com udp
GB 108.156.39.82:443 monday.com tcp
US 35.190.80.1:443 a.nel.cloudflare.com udp
US 8.8.8.8:53 www.economybookings.com udp
US 8.8.8.8:53 www.hp.com udp
US 104.22.13.26:443 www.economybookings.com tcp
US 8.8.8.8:53 www.aweber.com udp
NL 23.62.61.187:443 www.hp.com tcp
US 172.64.151.51:443 www.aweber.com tcp
US 8.8.8.8:53 www.modlily.com udp
US 8.8.8.8:53 www.udemy.com udp
GB 23.214.143.103:443 www.modlily.com tcp
US 104.16.143.237:443 www.udemy.com tcp
US 8.8.8.8:53 www.ancestry.com.au udp
US 8.8.8.8:53 ae01.alicdn.com udp
US 8.8.8.8:53 assets.alicdn.com udp
US 8.8.8.8:53 g.alicdn.com udp
US 104.18.41.253:443 www.ancestry.com.au tcp
BE 104.68.85.7:443 assets.alicdn.com tcp
BE 104.68.85.7:443 assets.alicdn.com tcp
BE 104.68.85.7:443 assets.alicdn.com tcp
US 8.8.8.8:53 acs.aliexpress.com udp
US 8.8.8.8:53 www.expedia.com.au udp
BE 23.55.96.205:443 www.expedia.com.au tcp
US 8.8.8.8:53 iqbroker.com udp
BE 104.68.85.7:443 assets.alicdn.com tcp
BE 104.68.85.7:443 assets.alicdn.com tcp
BE 104.68.85.7:443 assets.alicdn.com tcp
US 163.181.154.230:443 g.alicdn.com tcp
US 8.8.8.8:53 ae.mmstat.com udp
CY 185.117.134.138:443 iqbroker.com tcp
US 8.8.8.8:53 www.woolworths.com.au udp
BE 23.55.96.49:443 ae01.alicdn.com tcp
BE 23.55.96.49:443 ae01.alicdn.com tcp
BE 23.55.96.49:443 ae01.alicdn.com tcp
BE 23.55.96.49:443 ae01.alicdn.com tcp
US 8.8.8.8:53 ae04.alicdn.com udp
US 8.8.8.8:53 offer.alibaba.com udp
BE 23.55.97.80:443 www.woolworths.com.au tcp
N/A 224.0.0.251:5353 udp
US 8.8.8.8:53 www.selfridges.com udp
US 172.64.151.64:443 www.selfridges.com tcp
US 8.8.8.8:53 www.getyourguide.com udp
US 8.8.8.8:53 is.alicdn.com udp
US 8.8.8.8:53 time-ae.akamaized.net udp
US 104.18.228.43:443 www.getyourguide.com tcp
US 8.8.8.8:53 170.61.62.23.in-addr.arpa udp
US 8.8.8.8:53 85.98.55.23.in-addr.arpa udp
US 8.8.8.8:53 157.11.26.104.in-addr.arpa udp
US 8.8.8.8:53 47.114.18.104.in-addr.arpa udp
US 8.8.8.8:53 31.81.68.104.in-addr.arpa udp
US 8.8.8.8:53 243.10.20.104.in-addr.arpa udp
US 8.8.8.8:53 1.80.190.35.in-addr.arpa udp
US 8.8.8.8:53 208.150.64.172.in-addr.arpa udp
US 8.8.8.8:53 226.20.18.104.in-addr.arpa udp
US 8.8.8.8:53 105.245.224.13.in-addr.arpa udp
US 8.8.8.8:53 82.39.156.108.in-addr.arpa udp
US 8.8.8.8:53 26.13.22.104.in-addr.arpa udp
US 8.8.8.8:53 aeis.alicdn.com udp
BE 23.14.90.72:443 time-ae.akamaized.net tcp
SG 47.246.110.42:443 ae.mmstat.com tcp
US 8.8.8.8:53 187.61.62.23.in-addr.arpa udp
US 8.8.8.8:53 51.151.64.172.in-addr.arpa udp
US 8.8.8.8:53 237.143.16.104.in-addr.arpa udp
US 8.8.8.8:53 103.143.214.23.in-addr.arpa udp
US 8.8.8.8:53 253.41.18.104.in-addr.arpa udp
US 8.8.8.8:53 205.96.55.23.in-addr.arpa udp
US 8.8.8.8:53 230.154.181.163.in-addr.arpa udp
US 163.181.154.231:443 offer.alibaba.com tcp
US 8.8.8.8:53 138.134.117.185.in-addr.arpa udp
US 8.8.8.8:53 49.96.55.23.in-addr.arpa udp
US 8.8.8.8:53 80.97.55.23.in-addr.arpa udp
DE 47.246.146.202:443 acs.aliexpress.com tcp
US 8.8.8.8:53 www.lego.com udp
US 8.8.8.8:53 www.myheritage.com udp
NL 23.62.61.73:443 www.lego.com tcp
NL 23.62.61.58:443 ae04.alicdn.com tcp
US 45.60.13.42:443 www.myheritage.com tcp
US 8.8.8.8:53 www2.hm.com udp
BE 23.55.96.85:443 www2.hm.com tcp
US 8.8.8.8:53 www.stayz.com.au udp
US 8.8.8.8:53 www.iherb.com udp
US 8.8.8.8:53 www.rotita.com udp
US 8.8.8.8:53 www.agoda.com udp
US 172.64.149.245:443 www.iherb.com tcp
BE 23.55.96.113:443 www.agoda.com tcp
GB 23.214.149.95:443 www.rotita.com tcp
US 8.8.8.8:53 www.generalpants.com udp
US 104.18.35.56:443 www.generalpants.com tcp
BE 23.55.96.113:443 www.agoda.com tcp
US 8.8.8.8:53 uk.iherb.com udp
US 8.8.8.8:53 link.jotform.com udp
US 104.19.129.105:443 link.jotform.com tcp
US 8.8.8.8:53 64.151.64.172.in-addr.arpa udp
US 8.8.8.8:53 43.228.18.104.in-addr.arpa udp
US 8.8.8.8:53 72.90.14.23.in-addr.arpa udp
US 8.8.8.8:53 231.154.181.163.in-addr.arpa udp
US 8.8.8.8:53 202.146.246.47.in-addr.arpa udp
US 8.8.8.8:53 73.61.62.23.in-addr.arpa udp
US 8.8.8.8:53 42.110.246.47.in-addr.arpa udp
US 8.8.8.8:53 58.61.62.23.in-addr.arpa udp
US 8.8.8.8:53 42.13.60.45.in-addr.arpa udp
US 8.8.8.8:53 85.96.55.23.in-addr.arpa udp
US 163.181.154.230:443 g.alicdn.com tcp
US 163.181.154.230:443 g.alicdn.com tcp
US 8.8.8.8:53 245.149.64.172.in-addr.arpa udp
US 8.8.8.8:53 113.96.55.23.in-addr.arpa udp
US 8.8.8.8:53 56.35.18.104.in-addr.arpa udp
US 8.8.8.8:53 95.149.214.23.in-addr.arpa udp
US 8.8.8.8:53 fourier.taobao.com udp
US 8.8.8.8:53 www.viagogo.com udp
US 8.8.8.8:53 crl.comodoca.com udp
US 8.8.8.8:53 au.hotels.com udp
US 8.8.8.8:53 www.ssense.com udp
US 172.64.149.23:80 crl.comodoca.com tcp
NL 23.62.61.194:443 www.viagogo.com tcp
BE 23.55.98.239:443 au.hotels.com tcp
US 104.17.96.159:443 www.ssense.com tcp
US 8.8.8.8:53 www.cdkeys.com udp
US 104.18.5.40:443 www.cdkeys.com tcp
US 8.8.8.8:53 login.aliexpress.ru udp
US 8.8.8.8:53 login.aliexpress.us udp
US 8.8.8.8:53 www.jotform.com udp
US 8.8.8.8:53 www.kobo.com udp
US 8.8.8.8:53 www.lastminute.com.au udp
US 104.18.37.155:443 www.kobo.com tcp
CN 124.239.14.250:443 fourier.taobao.com tcp
US 8.8.8.8:53 www.fragrancenet.com udp
US 104.18.176.199:443 www.fragrancenet.com tcp
CN 124.239.14.250:443 fourier.taobao.com tcp
RU 47.246.133.208:443 login.aliexpress.ru tcp
US 8.8.8.8:53 105.129.19.104.in-addr.arpa udp
US 8.8.8.8:53 23.149.64.172.in-addr.arpa udp
US 8.8.8.8:53 194.61.62.23.in-addr.arpa udp
US 8.8.8.8:53 239.98.55.23.in-addr.arpa udp
US 8.8.8.8:53 159.96.17.104.in-addr.arpa udp
US 8.8.8.8:53 40.5.18.104.in-addr.arpa udp
US 8.8.8.8:53 155.37.18.104.in-addr.arpa udp
US 8.8.8.8:53 199.176.18.104.in-addr.arpa udp
US 8.8.8.8:53 fourier.aliexpress.com udp
US 8.8.8.8:53 208.133.246.47.in-addr.arpa udp
US 8.8.8.8:53 wp.aliexpress.com udp
DE 47.246.146.67:443 fourier.aliexpress.com tcp
US 8.8.8.8:53 login.aliexpress.com udp
US 8.8.8.8:53 us.ynuf.aliapp.org udp
DE 47.246.146.94:443 wp.aliexpress.com tcp
NL 23.62.61.73:443 www.lego.com tcp
DE 47.246.146.94:443 wp.aliexpress.com tcp
US 8.8.8.8:53 de-wum.aliexpress.com udp
US 8.8.8.8:53 lego.com udp
GB 92.123.26.147:443 lego.com tcp
DE 47.246.146.201:443 de-wum.aliexpress.com tcp
US 8.8.8.8:53 67.146.246.47.in-addr.arpa udp
US 8.8.8.8:53 94.146.246.47.in-addr.arpa udp
DE 47.246.146.193:443 us.ynuf.aliapp.org tcp
CN 124.239.14.250:443 fourier.taobao.com tcp
US 8.8.8.8:53 147.26.123.92.in-addr.arpa udp
US 8.8.8.8:53 201.146.246.47.in-addr.arpa udp
US 8.8.8.8:53 183.142.211.20.in-addr.arpa udp
US 8.8.8.8:53 193.146.246.47.in-addr.arpa udp
US 8.8.8.8:53 4chalw.tdum.alibaba.com udp
US 8.8.8.8:53 ynuf.aliapp.org udp
DE 47.254.175.252:443 4chalw.tdum.alibaba.com tcp
CN 124.239.14.253:443 ynuf.aliapp.org tcp
CN 124.239.14.253:443 ynuf.aliapp.org tcp
US 8.8.8.8:53 196.249.167.52.in-addr.arpa udp
US 8.8.8.8:53 252.175.254.47.in-addr.arpa udp
US 8.8.8.8:53 www.blogblog.com udp
GB 142.250.178.9:445 www.blogblog.com tcp
US 8.8.8.8:53 www.blogblog.com udp
US 8.8.8.8:53 157.123.68.40.in-addr.arpa udp
US 8.8.8.8:53 15.164.165.52.in-addr.arpa udp
CN 124.239.14.252:443 ynuf.aliapp.org tcp
CN 124.239.14.252:443 ynuf.aliapp.org tcp
US 8.8.8.8:53 myinfo-2u.blogspot.com udp
GB 142.250.200.1:80 myinfo-2u.blogspot.com tcp
US 8.8.8.8:53 1.200.250.142.in-addr.arpa udp
US 8.8.8.8:53 81.90.14.23.in-addr.arpa udp
US 35.190.80.1:443 a.nel.cloudflare.com udp
US 8.8.8.8:53 43.58.199.20.in-addr.arpa udp
US 8.8.8.8:53 23.236.111.52.in-addr.arpa udp
US 8.8.8.8:53 tse1.mm.bing.net udp
US 204.79.197.200:443 tse1.mm.bing.net tcp
US 204.79.197.200:443 tse1.mm.bing.net tcp

Files

C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad\settings.dat

MD5 439b5e04ca18c7fb02cf406e6eb24167
SHA1 e0c5bb6216903934726e3570b7d63295b9d28987
SHA256 247d0658695a1eb44924a32363906e37e9864ba742fe35362a71f3a520ad2654
SHA512 d0241e397060eebd4535197de4f1ae925aa88ae413a3a9ded6e856b356c4324dfd45dddfef9a536f04e4a258e8fe5dc1586d92d1d56b649f75ded8eddeb1f3e2

\??\pipe\LOCAL\crashpad_444_RWSTERLKJFNCKNHI

MD5 d41d8cd98f00b204e9800998ecf8427e
SHA1 da39a3ee5e6b4b0d3255bfef95601890afd80709
SHA256 e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855
SHA512 cf83e1357eefb8bdf1542850d66d8007d620e4050b5715dc83f4a921d36ce9ce47d0d13c5d85f2b0ff8318d2877eec2f63b931bd47417a81a538327af927da3e

C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad\settings.dat

MD5 a8e767fd33edd97d306efb6905f93252
SHA1 a6f80ace2b57599f64b0ae3c7381f34e9456f9d3
SHA256 c8077a9fc79e2691ef321d556c4ce9933ca0570f2bbaa32fa32999dfd5f908bb
SHA512 07b748582fe222795bce74919aa06e9a09025c14493edb6f3b1f112d9a97ac2225fe0904cac9adf2a62c98c42f7877076e409803014f0afd395f4cc8be207241

C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Preferences

MD5 e662cd71f9bcb1b0836dd69605f968dc
SHA1 d7eb90bdfe7434019623671237e52138398a7407
SHA256 a876da9478429bbbbe0e7cd4dbbff788f30dfb2f71031f6548f26739f2fcf611
SHA512 3c5dda25f51cc79fcf7ba2329cdb5a4689a1ebe1d48c8fdefa33257b939e56bf7d49655ae26c1bb4dd8e5126c848e2df510435774afff41c9f661291d5c56b7e

C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Local State

MD5 46e70dc85bc7daef9a4ad63e3543c12c
SHA1 635abb8b06234cab139fcde3f3e18054f641999b
SHA256 12bd0e2fa0312ca6a4516c79d61ed4786ac4ca2b646abbdcf9dcdc4700afec3f
SHA512 f3d58280058db31e7e9071402767a0632f62e9ac27c51dd37b22a846ba5eede36cd77dafc5a636c678d4d0cb6da2968048d0594a64e0f97046278098711a12a8

C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Preferences

MD5 c753243ffe130992606c4a70b34b3222
SHA1 aa1698b8176f7c82f9bd2cdc0e368855fbc91428
SHA256 e478c6d0c132fe152bfe42c068ae75faf7de79f4cd865db47a94da37fba14f34
SHA512 59610134ca7b87087e16402734ec84f0d17fc7db5b07beca0b528d1e498bfe8f52ae0323806553567fa6cdde83d8df85c30735c2f3d163c502ee73e991d697b0

C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\IndexedDB\https_best.aliexpress.com_0.indexeddb.leveldb\CURRENT

MD5 46295cac801e5d4857d09837238a6394
SHA1 44e0fa1b517dbf802b18faf0785eeea6ac51594b
SHA256 0f1bad70c7bd1e0a69562853ec529355462fcd0423263a3d39d6d0d70b780443
SHA512 8969402593f927350e2ceb4b5bc2a277f3754697c1961e3d6237da322257fbab42909e1a742e22223447f3a4805f8d8ef525432a7c3515a549e984d3eff72b23

C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\10bbed9f-a067-4ffe-a519-768564a68a14.tmp

MD5 a9094baeb189fd427a36684431b10669
SHA1 45aeae6fd8edc9341e51f1bc3fc36123110604c5
SHA256 0e101465e0879be8355f2c76120434edc1110e6760c3563c671770e58e505bfa
SHA512 87b3ede7d1702eba6ce6df0a68405e4545aec0fce6f50730cddfd1539e0f81bb9ba25e54d826ea15fc76ac041e41dfca8ed70af63d106bee3afbaaa40bca1df0

C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Service Worker\ScriptCache\index-dir\the-real-index

MD5 9dcd42d317f343d4e09199354d96b1bb
SHA1 89499bbeaa26bc224a0bebc7e0be77b9a696cc91
SHA256 9d043e05c627e23614ea2da2dcd3dd98924b334fb92257aeaab2153f2e54f969
SHA512 8f2d65b3c27a8f17b3169609f31e1310c5fac19c408e50c218ae4809efbcd20fb756fcdc577c9f948e88836f1d5bc8e1069bb29e7209f50aeca21f5d7a28cfce

C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Service Worker\ScriptCache\index-dir\the-real-index~RFe57c9e7.TMP

MD5 acf22b56902223b8cde3ca23efe61c41
SHA1 e2bf685e8cb2eb82cdddefebfceeb07f01b779c3
SHA256 2b1f3da4e4688d3e7219eb4e9404eaf51ff0b471cac8d5ea36d8f519a471bb59
SHA512 54a54748bfffae07be488ccf873bd9b969d9c034e9511ee864d3971ccf38cdf8067efcd80c41e2e6290394abd46c0c0f32017af0590ef00ef7c4d0c719325fb2

C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index

MD5 8736702961099556584ef19bd901f7fe
SHA1 6120d4a75de4e8451c5e4bfaaf35bb816e539f7a
SHA256 420cfdee5ebaa6f57cad40be51ed3fc3e8595aa5c6e1ed45aca90a099e2f22db
SHA512 ed2252118403783abfe2fe6b2a985c7dc3207e309cf27c2c8f3aabe176fe5a9674dc3aa9be9328a58d093f79c3d257407fedd30afabdc867d51ab83870535366

C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\data_reduction_proxy_leveldb\CURRENT

MD5 206702161f94c5cd39fadd03f4014d98
SHA1 bd8bfc144fb5326d21bd1531523d9fb50e1b600a
SHA256 1005a525006f148c86efcbfb36c6eac091b311532448010f70f7de9a68007167
SHA512 0af09f26941b11991c750d1a2b525c39a8970900e98cba96fd1b55dbf93fee79e18b8aab258f48b4f7bda40d059629bc7770d84371235cdb1352a4f17f80e145

C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Preferences

MD5 17b1872bdc64f7c24ef7b5b213dd28fd
SHA1 79beaddeacfce0cfecb3a1bfca64787bcdc3d1f2
SHA256 8f07c24c9cfb23df09b9250dda0e2254d08a986434327eba05bc702dca4de743
SHA512 9f42a7c47715b1ddb51b2dd14522b6b26dc5d5cd7bff0b8350e0f23abb6e1ffd592102dc02d6e802e7b3e7bca7e3117ad4f53aa20f763072f8cf4ea12011ef31

C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Network Persistent State

MD5 a1f45ebd517b49c564c482459aff772d
SHA1 b419e47ac15693b075e8fce4fba905e7a6ed8761
SHA256 0427498a0d585749f957cf4b54b8bd1535f5742de68606eafaaf0e9121cb3201
SHA512 abbefc7de7344c15db6e6e4204d5ab9c1ef9c5ca32ee369eec1f30c6f94ac973f2d0989876b78a2561311001e3618958bfa6c2639f320cb749972b2138167e47