Malware Analysis Report

2025-01-18 01:03

Sample ID 240613-rc586ssalf
Target a5ed8c829375e429227f03006512beec_JaffaCakes118
SHA256 c8c726a1b2ba3065943e50718778f092312dbf958419a15a6824fd94c607cdd6
Tags
score
1/10

Table of Contents

Analysis Overview

MITRE ATT&CK

Enterprise Matrix V15

Analysis: static1

Detonation Overview

Signatures

Analysis: behavioral1

Detonation Overview

Command Line

Signatures

Processes

Network

Files

Analysis: behavioral2

Detonation Overview

Command Line

Signatures

Processes

Network

Files

Analysis Overview

score
1/10

SHA256

c8c726a1b2ba3065943e50718778f092312dbf958419a15a6824fd94c607cdd6

Threat Level: No (potentially) malicious behavior was detected

The file a5ed8c829375e429227f03006512beec_JaffaCakes118 was found to be: No (potentially) malicious behavior was detected.

Malicious Activity Summary


Suspicious behavior: EnumeratesProcesses

Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary

Suspicious use of SendNotifyMessage

Modifies Internet Explorer settings

Suspicious use of FindShellTrayWindow

Suspicious use of SetWindowsHookEx

Suspicious use of WriteProcessMemory

Enumerates system info in registry

MITRE ATT&CK

Analysis: static1

Detonation Overview

Reported

2024-06-13 14:03

Signatures

N/A

Analysis: behavioral1

Detonation Overview

Submitted

2024-06-13 14:03

Reported

2024-06-13 14:06

Platform

win7-20231129-en

Max time kernel

117s

Max time network

127s

Command Line

"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\a5ed8c829375e429227f03006512beec_JaffaCakes118.html

Signatures

Modifies Internet Explorer settings

adware spyware
Description Indicator Process Target
Set value (int) \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" C:\Program Files\Internet Explorer\iexplore.exe N/A
Key created \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\SearchScopes\{0633EE93-D776-472f-A0FF-E1416B8B2E3A} C:\Program Files\Internet Explorer\iexplore.exe N/A
Key created \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\Zoom C:\Program Files\Internet Explorer\iexplore.exe N/A
Key created \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\IETld\LowMic C:\Program Files\Internet Explorer\iexplore.exe N/A
Key created \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\IntelliForms C:\Program Files\Internet Explorer\iexplore.exe N/A
Set value (str) \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" C:\Program Files\Internet Explorer\iexplore.exe N/A
Set value (int) \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" C:\Program Files\Internet Explorer\iexplore.exe N/A
Set value (str) \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE N/A
Set value (str) \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\SearchScopes\{0633EE93-D776-472f-A0FF-E1416B8B2E3A}\FaviconPath = "C:\\Users\\Admin\\AppData\\LocalLow\\Microsoft\\Internet Explorer\\Services\\search_{0633EE93-D776-472f-A0FF-E1416B8B2E3A}.ico" C:\Program Files\Internet Explorer\iexplore.exe N/A
Set value (data) \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 C:\Program Files\Internet Explorer\iexplore.exe N/A
Key created \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\GPU C:\Program Files\Internet Explorer\iexplore.exe N/A
Key created \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\InternetRegistry C:\Program Files\Internet Explorer\iexplore.exe N/A
Set value (int) \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{C4EFE3B1-298D-11EF-9066-F6F8CE09FCD4} = "0" C:\Program Files\Internet Explorer\iexplore.exe N/A
Set value (data) \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 C:\Program Files\Internet Explorer\iexplore.exe N/A
Key created \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE N/A
Set value (data) \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = b02e429b9abdda01 C:\Program Files\Internet Explorer\iexplore.exe N/A
Key created \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\DomainSuggestion C:\Program Files\Internet Explorer\iexplore.exe N/A
Set value (int) \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "424449301" C:\Program Files\Internet Explorer\iexplore.exe N/A
Key created \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic C:\Program Files\Internet Explorer\iexplore.exe N/A
Key created \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing C:\Program Files\Internet Explorer\iexplore.exe N/A
Set value (int) \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" C:\Program Files\Internet Explorer\iexplore.exe N/A
Set value (int) \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" C:\Program Files\Internet Explorer\iexplore.exe N/A
Key created \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage C:\Program Files\Internet Explorer\iexplore.exe N/A
Key created \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain C:\Program Files\Internet Explorer\iexplore.exe N/A
Key created \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\PageSetup C:\Program Files\Internet Explorer\iexplore.exe N/A
Key created \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\Toolbar C:\Program Files\Internet Explorer\iexplore.exe N/A
Key created \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser C:\Program Files\Internet Explorer\iexplore.exe N/A
Key created \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive C:\Program Files\Internet Explorer\iexplore.exe N/A
Key created \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\Main C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE N/A
Key created \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery C:\Program Files\Internet Explorer\iexplore.exe N/A
Key created \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\Main C:\Program Files\Internet Explorer\iexplore.exe N/A
Set value (data) \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000a2f28f0ea4e6294dabdde446cd5eb60900000000020000000000106600000001000020000000848148b47173ce205444102357e5354e7dc2642ed114b26a36f3f87dc78bf683000000000e80000000020000200000008e280cb0851413bc72bb562f474e3b8e2e5b194712e0a57325fe5feed3593a0a2000000053f47c66f945690f2cff2db31c6adfb47f72103246edce7bf3489c5929dc6c4940000000de1f6f38a604426b3cd217b0ed4239e8829b717f04c34158f52c68f8873b99dada2597f26934a4ea16ab64ec183b41d9b868518bf79359eb0e603c24b86b953c C:\Program Files\Internet Explorer\iexplore.exe N/A
Key created \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\SearchScopes C:\Program Files\Internet Explorer\iexplore.exe N/A
Set value (int) \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" C:\Program Files\Internet Explorer\iexplore.exe N/A
Key created \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch C:\Program Files\Internet Explorer\iexplore.exe N/A
Set value (str) \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" C:\Program Files\Internet Explorer\iexplore.exe N/A
Key created \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage C:\Program Files\Internet Explorer\iexplore.exe N/A
Key created \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\LowRegistry C:\Program Files\Internet Explorer\iexplore.exe N/A

Suspicious use of FindShellTrayWindow

Description Indicator Process Target
N/A N/A C:\Program Files\Internet Explorer\iexplore.exe N/A

Processes

C:\Program Files\Internet Explorer\iexplore.exe

"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\a5ed8c829375e429227f03006512beec_JaffaCakes118.html

C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE

"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2196 CREDAT:275457 /prefetch:2

Network

Country Destination Domain Proto
US 8.8.8.8:53 s.yimg.com udp
US 8.8.8.8:53 consent.cmp.oath.com udp
US 152.195.53.200:443 consent.cmp.oath.com tcp
GB 87.248.114.12:443 s.yimg.com tcp
GB 87.248.114.12:443 s.yimg.com tcp
GB 87.248.114.12:443 s.yimg.com tcp
GB 87.248.114.12:443 s.yimg.com tcp
US 152.195.53.200:443 consent.cmp.oath.com tcp
GB 87.248.114.12:443 s.yimg.com tcp
GB 87.248.114.12:443 s.yimg.com tcp
GB 87.248.114.12:443 s.yimg.com tcp
GB 87.248.114.12:443 s.yimg.com tcp
US 8.8.8.8:53 www.microsoft.com udp
US 8.8.8.8:53 www.microsoft.com udp
US 8.8.8.8:53 www.microsoft.com udp
US 8.8.8.8:53 www.microsoft.com udp
US 8.8.8.8:53 www.microsoft.com udp
US 8.8.8.8:53 www.microsoft.com udp
GB 87.248.114.12:443 s.yimg.com tcp
GB 87.248.114.12:443 s.yimg.com tcp
US 152.195.53.200:443 consent.cmp.oath.com tcp
US 152.195.53.200:443 consent.cmp.oath.com tcp
GB 87.248.114.12:443 s.yimg.com tcp
US 8.8.8.8:53 mbp.yimg.com udp
GB 87.248.114.12:443 mbp.yimg.com tcp
GB 87.248.114.12:443 mbp.yimg.com tcp
GB 87.248.114.12:443 mbp.yimg.com tcp
GB 87.248.114.12:443 mbp.yimg.com tcp
GB 87.248.114.12:443 mbp.yimg.com tcp
GB 87.248.114.12:443 mbp.yimg.com tcp
GB 87.248.114.12:443 mbp.yimg.com tcp
GB 87.248.114.12:443 mbp.yimg.com tcp
NL 23.62.61.113:80 www.bing.com tcp
NL 23.62.61.113:80 www.bing.com tcp
US 204.79.197.200:443 ieonline.microsoft.com tcp
US 204.79.197.200:443 ieonline.microsoft.com tcp
US 204.79.197.200:443 ieonline.microsoft.com tcp

Files

C:\Users\Admin\AppData\Local\Temp\Cab1130.tmp

MD5 49aebf8cbd62d92ac215b2923fb1b9f5
SHA1 1723be06719828dda65ad804298d0431f6aff976
SHA256 b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512 bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b

C:\Users\Admin\AppData\Local\Temp\Tar1145.tmp

MD5 4ea6026cf93ec6338144661bf1202cd1
SHA1 a1dec9044f750ad887935a01430bf49322fbdcb7
SHA256 8efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA512 6c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b

C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

MD5 e25b21fc39486d87f8b068a767a1f470
SHA1 e2bcb142ded709be8beb330b432e59c9d372f51d
SHA256 d1d075252ddd6575c7c3009bfbdec1e5fa3d48da33127f2fb57dfe35a1b45cbb
SHA512 5aeeae62615e4cd161f9af7bba6b1d9bc5681bf12d5eb2ca72d668be2e8a1570c2973635105f3f440b1b51f2fd372d119c976b81f9fe5bd0a578e2b081319704

C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

MD5 80a37ffd226091f791c1b03b50e4178b
SHA1 f460e5ebedeb5c5e85c0f162fe56f635bb5d9482
SHA256 4fdda361755b6adc7b9d9ccd55f6022d437109fcea0576561a40d3f4a8cdd18b
SHA512 fda251eaddda0bbbde7ed4b885b03ae4341e6fbb491906b0f378f558bfb97ed168836de785c71e94903620711703f2c5bc125d1c57050e1c737e2864745bc844

C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\F0ACCF77CDCBFF39F6191887F6D2D357

MD5 a266bb7dcc38a562631361bbf61dd11b
SHA1 3b1efd3a66ea28b16697394703a72ca340a05bd5
SHA256 df545bf919a2439c36983b54cdfc903dfa4f37d3996d8d84b4c31eec6f3c163e
SHA512 0da8ef4f8f6ed3d16d2bc8eb816b9e6e1345dfe2d91160196c47e6149a1d6aedaafadcefd66acdea7f72dcf0832770192ceac15b0c559c4ccc2c0e5581d5aefc

C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\F0ACCF77CDCBFF39F6191887F6D2D357

MD5 2c7eba5aec6fc723db728947003f0a36
SHA1 804c2ab197bbd8d8768766514bd1ef9a30ecb2de
SHA256 c0caa41c34172a533eb6fa663bc72e54cd34fe28e6c96bd57167a05270d57f4d
SHA512 53af0559c007dd4764528c0a614274b8cc03de7f19bcafb1f249e23e7a0eff64a493bddb88a097a8d65502e733f04a1a0e668532dc336e5c29013488fedc599b

C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

MD5 93342bbcda43edcd96eabfb360f9b7c8
SHA1 d7468de7539bc762428a82b91af0ebb554ac0ddd
SHA256 b0e7409d6d228bd6b03dfae7c57c098d83039e8858b3678d983d05ca5da53fd0
SHA512 29c8c0ba88322f3a5d25fccfe235cb9c65cb49e2f59a9ee10a7c1d55576c48df701672acb776f9096ab4d0989478df40ca265d4a6348a580f101791adbedad60

C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\F0ACCF77CDCBFF39F6191887F6D2D357

MD5 2c108498e3b72f2a1a515f02517d3d52
SHA1 05592756962f2ca1cacfffa9ff6b6f6ec78d61d4
SHA256 4e3946eaa25f592718733ba17cf1ca37d8a0f06d0fc9dfb787d3fd28b3393d11
SHA512 d0efe8297ad3f36ace9922607b6812f562df0e6c26066e8c4bf62d06e5238bac53799187d86e6ab099d37276a78e68259c59582887ff29fdae57bc90113c9d53

C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

MD5 1f48257d3f9b67969d1de52d97b40887
SHA1 7fd2c76206c32feeee0e9c110d06d3ac4bd2b2d0
SHA256 30ae86d1a6fc3d85588fd49d715fcf6fa524eb487124b7356d5ec2c02250d139
SHA512 b850c6eb3f60ab2416ba2e2f1ff999648b054a07e08159d5ad3d76c9c452b5325e621cc52391ddb091589ea26f4087d8e42d1f7ca27bfcee794183db53c5ab56

C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\3C428B1A3E5F57D887EC4B864FAC5DCC

MD5 930c8df8ffc4fc3807696a7554477742
SHA1 7f98e69d54288eb991dbf064c9270f99dfdbeaf1
SHA256 9df53af49747075ad202d51399ee21bdd8a2ab3fa3f7ac4421c006f6872a80fc
SHA512 d76912be8a9686771917cc59721fbe7cde3a8d73f634da34d005e247e5695fbdd34ff29dc0f8ea185cab5d2fd69590546c0f5cdfba997a645a5df8140c0ba203

C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\3C428B1A3E5F57D887EC4B864FAC5DCC

MD5 e4a68ac854ac5242460afd72481b2a44
SHA1 df3c24f9bfd666761b268073fe06d1cc8d4f82a4
SHA256 cb3ccbb76031e5e0138f8dd39a23f9de47ffc35e43c1144cea27d46a5ab1cb5f
SHA512 5622207e1ba285f172756f6019af92ac808ed63286e24dfecc1e79873fb5d140f1ceb7133f2476e89a5f75f711f9813a9fbb8fd5287f64adfdcc53b864f9bdc5

C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

MD5 a780cec30cb37852e0c484af905399c4
SHA1 c889bce3b4b1b275368298011a2dfa2db0b04093
SHA256 b7f5c126221db4cb5ef5095180066e0018a5c75ff7740b9a70be7c30998863e7
SHA512 8f51031f90ae4352a078dd372e7d47ac106b530a5ce6c207dce8b11087839a07fcd6ab0daf8aca9ab38424bb06a08492908427265df4376476502510711f4f2d

C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\EDC238BFF48A31D55A97E1E93892934B_C20E0DA2D0F89FE526E1490F4A2EE5AB

MD5 eb41470fdcbf738e843baa5d48899bde
SHA1 318b5185f8317e8bfe9667d441640d7b31eaf0de
SHA256 6ef7c26eba2f3bf56d3d9582ed38f0aec98bb785a6dc4f26f6c829b41c3719b8
SHA512 24ccb7b9f1ce377ac608c528434c57b09d78bf4a9c5abe3533d919c33139486d13f1cdf0a80fa943fb2cc92b4ca174f931c2dec0887546112866f26363ec66a3

C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\EDC238BFF48A31D55A97E1E93892934B_C20E0DA2D0F89FE526E1490F4A2EE5AB

MD5 043a97aec7fea629621b0bb6b5ae4fd3
SHA1 765e092824bcd5d792217c94cdcb10dd9eee0a9c
SHA256 356380e02248fb802824fc1b0768a7d03d6e73cb467432644e734c362ef84e36
SHA512 4ebd6e4c3baeeb15c41498e9f33774cf52145b9131770b9db6e14c5670a96dfba62ddf27ee0c0af77feb81b8e71c6d4ca3943eda23d3fcc1ae6b73e811c89345

C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

MD5 c2e08b7b961315cadf86b9fae3130316
SHA1 b9c59c7fa341a98a152faec6b348addc800dc06d
SHA256 1a53a8544a7397202d0f0dfe0916588915695cecc432243257464cec18afbbbf
SHA512 1d826ad40c3cebd3adb0d593265cea95b2a0e94b76fe72319c4206871d3e6ca7ce20145979f069c9d1b49b3b5e348918f86197dcb57f48d3385db5c06d0d9bec

C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

MD5 ae83bcaa6af71616c3474b121c4531f0
SHA1 ee300aac747335aee5b335ab9aab51359b847ec7
SHA256 aa1180c3e5816f1a6cc3875a2945509d44734fb6774223e98dd6bd747f620c15
SHA512 a8ae48479caa1234b67a71263c30818dbf22a13e9f601e1a9c98577b5c159fb7d12e5755a9b8dcbac664c5cd45078003e49f9046c92b8b19ff63437f94beaa43

C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

MD5 ea7ae00844d4d2bab0685645e318c1a2
SHA1 b49431066faad3b4acd1b600693027d5c164f685
SHA256 37f805a30829e7d09b6a52af1ea41a42cf1742a6eb60979910f8b1ba82417d1f
SHA512 e548e267cec72e743ee229578d8cda3e98e97acf9223cdb7d9d3bb7e14c02fa6b8bf324f482df1cdb71513c1caa7a341fe680e3d197a47a6ddb35804c6811832

C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

MD5 ac25612014a9a7fcd4725e3b64ab6693
SHA1 1026f305ca446b02bf6e6b4eb401e5a82fafcb70
SHA256 c0fab0e8221661b0907cc5306d4fd052b8707d60509d0324ab5a7b9b091f9332
SHA512 5fd8e7aeee9624ac36ebb667ff92bfa6d888c886d9a25f4b9acd7890778df93d272cd604408dd9b59181820af942df3cb425adb20523baa69c317f1087d83647

C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

MD5 8a415cca5f8fd6657deccc57fe048e8d
SHA1 eeda8a89030b9cda31b4870da432ae76fb07ef01
SHA256 efe32c961de1946dce800bc3e28912ba973ae6586517a5ab8e339e65243bd73b
SHA512 02e591472f636033368ae055dea48dd3609f67128e7a15b55489ddd120d36d8bfff9264a6f49c8fa7e9fd32884d96d8038808fdd83d86e5e0533e1399fbc7d70

C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

MD5 2e8e1e7bc9fb59d00b7909e07010d45b
SHA1 dfad7ee015bd1aeccded320231a6868a4f9a2c50
SHA256 d134e4b04d55fdb9b1a8ff4235ac2ed32fcdc952e5f6e598029f92568742f46e
SHA512 6786bc4cd0331bc01c0bbe05dddd7c7c7999cc631d75d42aad75bd1308e7a1a095bde257c53d6d77b66ccd326ec37cffef32bbbd69bf6f4002ae92193e37c1c3

C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

MD5 92fdb9f5001f06d9d55b7cb5d2b753af
SHA1 1333d6f4c26e1ca644f4199254029888b2b90608
SHA256 9f92b59ddd78ce7841d459610d2b92c50883ad211551afee83382ca8c858c349
SHA512 54658d7739ab41d9dcdf883bf17808764b64bef441c5218e659a75bf2b473ebd1af4c6290d1639db39903e62c3c5bfa9237a4c9ffd5f4763882d87601407b39b

C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

MD5 a693cc9664a1cdfaf0f3180db8f52f33
SHA1 f3b9c76a58e4e0a36891c2ce15c04ed42e79a139
SHA256 d173dc23fe901c38b98b08452d1f097d3965af7a9fbc3a70bbb064f997874a9f
SHA512 c573920482c485b9aa73e8a67dc327218f4454e0d1813b9cfe2ad293d18b9c7db1353e61f3add671e33ca1cb863381636dfce8ff7be854b1a6a1ea4441096b2d

C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

MD5 d33146db10e1a1361391a89d65912fb8
SHA1 e4dbdfdff6fbf2c6b1638c6f6a4c58d765d782ab
SHA256 2e15462ace3a7e78ad5692b9aa80b72c3590de10cacbae304066912d915e0ce2
SHA512 dea50233c2754036b26032e909782c2413bfa3766e1180c17aac5a40308b203e0b6bec33292466a33f956cffce31a8e320688ad64025d8299a500cac97a04979

C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

MD5 35383ed7526e566c04d3eb0a0820fbe3
SHA1 ba11ac2d72f4648013e2b980453b618d464be683
SHA256 dfb4d7774ae34796eb68722dde76547edd4f73c660d4e1247455bb8c674ddc26
SHA512 e51f9d24dca583f93e1e541bc17d3eccb60c88c8cca75a981296051c627fb9f2786300b9428fcba3b1c4c124acf7dc0e87fc60c02b15dac83d29fc519ef6e267

C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

MD5 c1c786e16063bd220ad0429339fc883c
SHA1 b0a915cb56a36a08be49ff5d6dccc66e1dbe5002
SHA256 caf7b1eb24111911202565a2d16d8196d9ae1f6293aa93af69915ef002c3efe9
SHA512 6a32436da670428788212ccceeab37a1cdcaff3ddfef63488b6ac7e218d5203e11bae6f28c1671ef342bc9ed8655cd7ef4be7961cfc7d3dccabfa761c423a326

C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

MD5 fe2724dba2d2dbef9ce6575b78989c9c
SHA1 aa68b43ea14e600fe72eff5c3377d42308abf7b1
SHA256 72312f38b493f856a069d3a14bd614bd713990e83ee13136b23e2a3a2fa1927a
SHA512 8341d5dece20de1b674f675e98ea5f849454964891135189597585867d36ac3aee3710dd734f3266420b012a04253ddd49d46487c0537108db03720a603b8e90

C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

MD5 3b5799e8d4050b12df7bb1635761954a
SHA1 f73f08489867bbf9138d75d0c76add642e88098d
SHA256 48491bcb47a4568d71a7b8185207716892d5d3ea42539fc65db0624c3f5c229f
SHA512 5a974f0ccb9324ce27552c57de1f7d6d8e9085aef13af5293f69467363eb64aa2c812ed1122227bf10d1b9ef24e5a33c8cde8499cdac67696e3391b5d7f71d99

C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

MD5 4398d3626891bd2d367178cce126a473
SHA1 d5a46f721b32fdb539c2be1fa4625b61cb00d42a
SHA256 5156791c6c41f28efea742a200570cb15818364b229b5f660a4cc2e6e811feb9
SHA512 3089996f771fc0ed7f21d574eb6ee807611ec8203e40374f19acfb13ccabd5a39c8780692df1b011118d2b7460bdf7bf7b2b50debb62a078d3b0950a9f03ed86

C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

MD5 5d511e287152a9cb23bc46e3145141d5
SHA1 383b721915b6516579e5e0361a42cc3e09256901
SHA256 94a0e50b78e713c575a32272afe77cda8c1f820b4074c0be51a03b6d5c4e4632
SHA512 143734e1bea3bee5b6d8d4d742fe77ff85e705e066724b1469075a36740abf43dcb22f3dae64dc66518b1cb4acaaed1e82a8d6a9dd2862dd7fca0f641c4cabf6

C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

MD5 0bc0a7d1b19a4a5a40baecba71636c55
SHA1 3faf9382a2d925140b0ab1c4b399df270576397d
SHA256 01c56450cae1479dc939fbb5d67a57b63f912e093e48fafad2c4adca56f51914
SHA512 41803159b3c506e42ba9cc6244f952ca71389587b7af08efeef7e104ac30624faf57d25aeda3548af75de0722c2386385cf74bfc675fe8b9465f7fdb1d0845fd

C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

MD5 38d30003bb41cb0f5603308795f9ed9d
SHA1 9cecbc5712c75b2bd7e3d6837647cee8271ae66e
SHA256 b7406a05ad1177e053713608418a9fd078e265add528fd8f38f6f1df4fad3222
SHA512 3bf6f0f5aadd69fd284bd6ea082c101bbb57dab9f210facadcd766345115d5ddf7830f6283fe624a8afee5bbce93bc3e61fcfcf7271b3674db10143eedfda8b6

C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

MD5 b9f6c64fc98ec2486e9dbf5db8c22d52
SHA1 03a1847e55c88d2c8e0bfe2fe10ed9e546dbb44f
SHA256 25494ef5c586e270f8b96ece2d516b72a49353ed8353ecb2cc5e402a0029a6bb
SHA512 fb80149e7070d493074a08e187d3d4ccc9909a2b99f17a660c8b029d54bc34ecfabcf8cc9d6a4b649b77cc6b4064d3feec7444dc6c1c83ebde506d7645636e97

C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

MD5 3a3a7d0c7777818454243668e855d414
SHA1 cd9fb7afbccd4c6f41c458bee3e0c7019d1a73ba
SHA256 62402c9d2e314c9e7ed33f6388909042ef16a17831d125a3f85c4675b234aa30
SHA512 b109a919797d0057c092c21cece6f83bbf831a9cd61c581867635740fe9588e627fb3a0b00cf099b22ddaf38f14260badecbabf8d967826a0d36e664f254f868

C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

MD5 2b4c67c1bae9f23ee6260ac78748a7e9
SHA1 c67dfc48ed03b2a7e1b2bbc599582222a80e7746
SHA256 d829db3d9f00dc3fbd705e51d752656be0676682a51ae1eeda41513a1c90d903
SHA512 f28853dd7e23a794df49c89c9844c66e3cd1b6e624ceb0e10e3f7ad24df886a44608af2abb9cd76388de614f5755b46bbfb1a64ab01e9bd5e479a3142fb1de42

C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

MD5 e690cac07270500cc2306161fc97a99f
SHA1 918d2374b7db432ea9063e1aa36b859f124399d0
SHA256 a7ffe76fbdeb9d8794d2b73b347d3ff415a1eb20ce7a4fe01e104204a822db32
SHA512 8c4ac4fd390ba39e61254576fcc860b8cf04e84756a52186983cece856453c5fb1a08cb1b60fbac87730cb9505d372ba4f1cd7ca45e608fbfac1cc8c440b4e61

C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

MD5 682e696a0a2279f61928e80dbd250b1a
SHA1 3eb069af82e8f708db4de66d3531a219aff3aeaa
SHA256 a415863851219847644594ab02d873157519469464139047ba1680e44e00c92c
SHA512 a8df8804156c99f372f8ec261d3e8d24a482a240ed55ed33bbbe26c9dc97a7352213d946f9146a7851552e38a41f56f15071c8f64ac33a08aceba52e4723b980

C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

MD5 408a80e64de80952bb81cb84f5ad261d
SHA1 bc615323de0e8a6244b85125b07a3d38fffb895e
SHA256 8fe683372c9cb2135d88a0632fff27324ee392ceb4c40357d9806afd97d0c6bf
SHA512 8f7588b25967303aeb2762c2b100a6840b691a51328f50d1638bd6a61c4ce89b1a16182856ed17201d31258590e78680de46a8c6a489f650144b26d7f9fd57e9

C:\Users\Admin\AppData\LocalLow\Microsoft\Internet Explorer\Services\search_{0633EE93-D776-472f-A0FF-E1416B8B2E3A}.ico

MD5 da597791be3b6e732f0bc8b20e38ee62
SHA1 1125c45d285c360542027d7554a5c442288974de
SHA256 5b2c34b3c4e8dd898b664dba6c3786e2ff9869eff55d673aa48361f11325ed07
SHA512 d8dc8358727590a1ed74dc70356aedc0499552c2dc0cd4f7a01853dd85ceb3aead5fbdc7c75d7da36db6af2448ce5abdff64cebdca3533ecad953c061a9b338e

C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

MD5 8b420b2590be1bcaa97fad6fbcf1557c
SHA1 d37200d78780882d2abfa408e0f88af43139d03a
SHA256 314243556cf04e55c3fbf03ce3a50ee48a20214bba933110574b99cf8dc89c18
SHA512 2426b4136f2074ff12d7d43b8c6439aaee9a154de10a73f24be71a581a76e88ab4b896314228c901dd025ee428a91d85a5d639a06feb3c5f482b57d2466e751a

C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

MD5 2eff002ae797f29391b9f650c25cb899
SHA1 938f18e9dd6fb3f45f6f0f4c5ca8f4c2413939de
SHA256 ac5704bb10ada9ccc3cdf4d634efc9c63d69945424fcd953a4bf74edffa47162
SHA512 949ed2f0babb4402b402669354a6cf31bc8e0df3cdcece018edf01586fcbf67ab29d2101c47b22ba4093831574d5a9c3c29e8daf010fb4a525df8e20005b656a

C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

MD5 c3eb2fd869805a26ed40edd8a22ce478
SHA1 cd608b0f7f7601068aef3879353f1716405e84b9
SHA256 79e0f0822082b15ce99ec8051b50960dd397123940225dd90c784e23d68e8bf1
SHA512 dc70d0b7a092209e633323b3123200062824866e260f8bf4ebae7d6f38e662590133e118d1234b410c397f3f0816e7cbf7a4324e3b501d53c35b51b2826ce9e1

C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

MD5 9cede06fa119aa6c7b0901101a6395e5
SHA1 f739c2420a75e086e1d970081a9a4349c2ecd4de
SHA256 72588147b36476770a51c966674efd030a87acf6a76366235e3d357b39e0ba81
SHA512 a5d62cf7bbf9d5cf2c618cf155bb8f483a46eb67633e6079a8a6caf1a64cae0f01e7c9a4396f6713c64f0193fa7e0c4dacf4ae039659332d0003d8c50d727c94

C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

MD5 40b5ba8c34f8f9a96e9311357d0b658c
SHA1 3c38fe308b449a9421666e5a61bc9bb2dbc19c10
SHA256 ec6b1dbb61bde93b1a2ea55fbb151b61f27f2808f8c4b0debbcbd012879e4f75
SHA512 731cc7aa3a6721440ff54b554e4160c7777cd63cbd410824cf786c48df6a8b6de7ea9e2cb645d5a2535c84677fdadf33fde217f00a0cc7184146a947d6b4c4d1

C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

MD5 22ef72b1f09ccfc6971b83f7650e7ffe
SHA1 b2e6f32b46bfcf196c8fe454ef236efe0b721996
SHA256 73201d341144d6df9f464081983b2395a08b7ce0837ead52de7921d397d62fde
SHA512 e98cdc2c9ac5fd7dfacabcc89784bd7718563cfc951b4c40cf345087956b760fd7953579dd7c2f3b43a0a04d0343f853753ed7f62c8f8c8e9232a5bfefe7e843

C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

MD5 9e6ea5ba09a5eca9d7616641cdcb6deb
SHA1 b554de0369cea96f545e4958144c7a32e76a861b
SHA256 45633181671c971de32c61eb3491a8cb1a04260a0006f3fded764ad7c9f4505e
SHA512 94d4557791cff3902bd3ab8b96282795684da6702fa2b20e2caa0de02339f5800154a705a67e4d8c4b42a1ecd0527fd0f6637b6ebffbe72edae7a211ee35c841

C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

MD5 7c8ba5cf0b510673ffbcc5de523ebc49
SHA1 2754428ce4184b5f4e0eb5373822071d26748460
SHA256 52b07d8f903564ae4fa3807b9fcb179169641c95fb29ab45ad45ba20f1c5f234
SHA512 475c59ad3cae0c5bc6dc12aba8fc0dab692ff383cb22f9742edfc5f3e59c95246a10c34e9a09a83892f1f32b2d5af23ca3e313123cae174e111447838779be4d

C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

MD5 fda88b8600da4bb89bd08d22018e1fbf
SHA1 1dae2cebae4a4dd4c0cc41ba2e14461370707eb9
SHA256 7e27ea05c94efb5b34c522bd0f8b696fa2119ff0b2f67873468d330878978604
SHA512 24478dacae09d537bfdc4fca4e6339c43c79f8a47470e8793e1cb848fd16d9f3d73a970c7de1957e68b03ad575fe6e61419063ffcffe81749313d250126cac47

C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

MD5 c5759f66907176f042f2844a6b1467f3
SHA1 2dd0f85b34dfbb8d029e03457d03cc78187ddc5b
SHA256 051befce524411d88e7da027593179cd9791e9fa6ca0b3756a4aec09910295c7
SHA512 2cb85642e56d5ac608b34fa0ed4224a6149d2a8c93f9e6fd6b0979a91fdd5e4adcbf8afa4ed0aa8893ad0d5208182a1296fa6bc72ccc38c4a1d975dcad8a826f

C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

MD5 4e2b80161062ce947a9baa5b68320637
SHA1 c47f79384557e8659dd76f2e1b7ffbe95e3e7363
SHA256 c409cb45e8d8b90e7a5bb3684a2b5dd6358942ecf7b8436e5b0a4c5ce08793b0
SHA512 50d0c9ba4642bf57764a5a5aa3fa209f02620be1e7cd69eb2fcfaf1959f40b8708c49fe4e602b1d4fa2cfcc510dfbd8d80974cdb3473c2dcca8f1c113fb0e0ac

C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

MD5 7d338a788b26e647fce478e80588b3b5
SHA1 812619ac24c193a4a605ef1f11676a5c62638663
SHA256 fa54c8170e6f9199f38286e8d1a0a07021d017d58f60e888a81adfd7e373967b
SHA512 67b5b28220fb820569c51751000bcc2eac04ef80b3d987b7891bd168abe811f4b080527f5f17111bd4096c39008cb6466cb44b3109e10d11c4312394679f2e8b

Analysis: behavioral2

Detonation Overview

Submitted

2024-06-13 14:03

Reported

2024-06-13 14:06

Platform

win10v2004-20240508-en

Max time kernel

145s

Max time network

125s

Command Line

"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\a5ed8c829375e429227f03006512beec_JaffaCakes118.html

Signatures

Enumerates system info in registry

Description Indicator Process Target
Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe N/A
Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe N/A
Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe N/A

Suspicious use of FindShellTrayWindow

Description Indicator Process Target
N/A N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe N/A
N/A N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe N/A
N/A N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe N/A
N/A N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe N/A
N/A N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe N/A
N/A N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe N/A
N/A N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe N/A
N/A N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe N/A
N/A N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe N/A
N/A N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe N/A
N/A N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe N/A
N/A N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe N/A
N/A N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe N/A
N/A N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe N/A
N/A N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe N/A
N/A N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe N/A
N/A N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe N/A
N/A N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe N/A
N/A N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe N/A
N/A N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe N/A
N/A N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe N/A
N/A N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe N/A
N/A N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe N/A
N/A N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe N/A
N/A N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe N/A

Suspicious use of SendNotifyMessage

Description Indicator Process Target
N/A N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe N/A
N/A N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe N/A
N/A N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe N/A
N/A N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe N/A
N/A N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe N/A
N/A N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe N/A
N/A N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe N/A
N/A N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe N/A
N/A N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe N/A
N/A N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe N/A
N/A N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe N/A
N/A N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe N/A
N/A N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe N/A
N/A N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe N/A
N/A N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe N/A
N/A N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe N/A
N/A N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe N/A
N/A N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe N/A
N/A N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe N/A
N/A N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe N/A
N/A N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe N/A
N/A N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe N/A
N/A N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe N/A
N/A N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe N/A

Suspicious use of WriteProcessMemory

Description Indicator Process Target
PID 4836 wrote to memory of 2264 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 4836 wrote to memory of 2264 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 4836 wrote to memory of 4916 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 4836 wrote to memory of 4916 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 4836 wrote to memory of 4916 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 4836 wrote to memory of 4916 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 4836 wrote to memory of 4916 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 4836 wrote to memory of 4916 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 4836 wrote to memory of 4916 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 4836 wrote to memory of 4916 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 4836 wrote to memory of 4916 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 4836 wrote to memory of 4916 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 4836 wrote to memory of 4916 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 4836 wrote to memory of 4916 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 4836 wrote to memory of 4916 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 4836 wrote to memory of 4916 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 4836 wrote to memory of 4916 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 4836 wrote to memory of 4916 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 4836 wrote to memory of 4916 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 4836 wrote to memory of 4916 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 4836 wrote to memory of 4916 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 4836 wrote to memory of 4916 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 4836 wrote to memory of 4916 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 4836 wrote to memory of 4916 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 4836 wrote to memory of 4916 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 4836 wrote to memory of 4916 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 4836 wrote to memory of 4916 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 4836 wrote to memory of 4916 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 4836 wrote to memory of 4916 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 4836 wrote to memory of 4916 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 4836 wrote to memory of 4916 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 4836 wrote to memory of 4916 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 4836 wrote to memory of 4916 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 4836 wrote to memory of 4916 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 4836 wrote to memory of 4916 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 4836 wrote to memory of 4916 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 4836 wrote to memory of 4916 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 4836 wrote to memory of 4916 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 4836 wrote to memory of 4916 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 4836 wrote to memory of 4916 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 4836 wrote to memory of 4916 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 4836 wrote to memory of 4916 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 4836 wrote to memory of 3952 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 4836 wrote to memory of 3952 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 4836 wrote to memory of 4860 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 4836 wrote to memory of 4860 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 4836 wrote to memory of 4860 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 4836 wrote to memory of 4860 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 4836 wrote to memory of 4860 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 4836 wrote to memory of 4860 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 4836 wrote to memory of 4860 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 4836 wrote to memory of 4860 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 4836 wrote to memory of 4860 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 4836 wrote to memory of 4860 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 4836 wrote to memory of 4860 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 4836 wrote to memory of 4860 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 4836 wrote to memory of 4860 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 4836 wrote to memory of 4860 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 4836 wrote to memory of 4860 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 4836 wrote to memory of 4860 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 4836 wrote to memory of 4860 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 4836 wrote to memory of 4860 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 4836 wrote to memory of 4860 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 4836 wrote to memory of 4860 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe

Processes

C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe

"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\a5ed8c829375e429227f03006512beec_JaffaCakes118.html

C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe

"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffe40aa46f8,0x7ffe40aa4708,0x7ffe40aa4718

C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe

"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2184,16670754410604416744,2287706767066838043,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2208 /prefetch:2

C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe

"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2184,16670754410604416744,2287706767066838043,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2268 /prefetch:3

C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe

"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2184,16670754410604416744,2287706767066838043,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2700 /prefetch:8

C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe

"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2184,16670754410604416744,2287706767066838043,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3264 /prefetch:1

C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe

"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2184,16670754410604416744,2287706767066838043,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3292 /prefetch:1

C:\Windows\System32\CompPkgSrv.exe

C:\Windows\System32\CompPkgSrv.exe -Embedding

C:\Windows\System32\CompPkgSrv.exe

C:\Windows\System32\CompPkgSrv.exe -Embedding

C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe

"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2184,16670754410604416744,2287706767066838043,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4412 /prefetch:8

C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe

"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2184,16670754410604416744,2287706767066838043,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4412 /prefetch:8

C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe

"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2184,16670754410604416744,2287706767066838043,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4320 /prefetch:1

C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe

"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2184,16670754410604416744,2287706767066838043,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4300 /prefetch:1

C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe

"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2184,16670754410604416744,2287706767066838043,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3296 /prefetch:1

C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe

"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2184,16670754410604416744,2287706767066838043,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3392 /prefetch:1

C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe

"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2184,16670754410604416744,2287706767066838043,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=3080 /prefetch:2

Network

Country Destination Domain Proto
US 8.8.8.8:53 geo.query.yahoo.com udp
US 8.8.8.8:53 csc.beap.bc.yahoo.com udp
US 8.8.8.8:53 comet.yahoo.com udp
US 8.8.8.8:53 s.yimg.com udp
US 8.8.8.8:53 consent.cmp.oath.com udp
US 8.8.8.8:53 8.8.8.8.in-addr.arpa udp
N/A 224.0.0.251:5353 udp
US 8.8.8.8:53 geo.yahoo.com udp
US 8.8.8.8:53 search.yahoo.com udp
US 8.8.8.8:53 s.yimg.com udp
US 8.8.8.8:53 shim.btrll.com udp
US 8.8.8.8:53 video-api.yql.yahoo.com udp

Files

C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad\settings.dat

MD5 439b5e04ca18c7fb02cf406e6eb24167
SHA1 e0c5bb6216903934726e3570b7d63295b9d28987
SHA256 247d0658695a1eb44924a32363906e37e9864ba742fe35362a71f3a520ad2654
SHA512 d0241e397060eebd4535197de4f1ae925aa88ae413a3a9ded6e856b356c4324dfd45dddfef9a536f04e4a258e8fe5dc1586d92d1d56b649f75ded8eddeb1f3e2

\??\pipe\LOCAL\crashpad_4836_TQZTWDAOBYZXIMSW

MD5 d41d8cd98f00b204e9800998ecf8427e
SHA1 da39a3ee5e6b4b0d3255bfef95601890afd80709
SHA256 e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855
SHA512 cf83e1357eefb8bdf1542850d66d8007d620e4050b5715dc83f4a921d36ce9ce47d0d13c5d85f2b0ff8318d2877eec2f63b931bd47417a81a538327af927da3e

C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad\settings.dat

MD5 a8e767fd33edd97d306efb6905f93252
SHA1 a6f80ace2b57599f64b0ae3c7381f34e9456f9d3
SHA256 c8077a9fc79e2691ef321d556c4ce9933ca0570f2bbaa32fa32999dfd5f908bb
SHA512 07b748582fe222795bce74919aa06e9a09025c14493edb6f3b1f112d9a97ac2225fe0904cac9adf2a62c98c42f7877076e409803014f0afd395f4cc8be207241

C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Preferences

MD5 54501c91bf0e6c84d9ac6f7d97930677
SHA1 a8f40ebfdedbcf67682cab5e4afedd5618874045
SHA256 67300c6e6fe53b5d27ed4cde83fdc940ddd7fd754e7e700f1dda3090779d3edc
SHA512 da39b518e9212c4e98ba4b9f8f4c7732cb3dbb22ee289c14dd027c3a6113919b4dc934b2ccd402b3ae6bbd327d0c1b1718393e22a1229b8eaa02241da0205463

C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Local State

MD5 4e5017d5ddeb72b4059bb674ecfcbb98
SHA1 24ad10f16d162296f770e52893f30ebcf1d3a670
SHA256 6a46fc5f958572b9ca20337b556424841f79d38a6d3564dc759921ff063e2471
SHA512 6272e37c5f50155e388480efb1662454669122a8d755e95e70963450bacfd8e9ba40ceb2bba397cf68bdde280ceb73b156a40d22cb7e6ff416664e9288a68a99

C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\data_reduction_proxy_leveldb\CURRENT

MD5 6752a1d65b201c13b62ea44016eb221f
SHA1 58ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA256 0861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA512 9cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389

C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Preferences

MD5 3040bd0f95dd66c5d0dab62fb01a0d09
SHA1 ef38139343d37993647a73f3c8ff33614e659c8b
SHA256 f2c36cfcf9529f3ce95c19b53781570fc1e19152f5cf7e12b0f063534eba01d9
SHA512 3f3fccf723b61c315120f52a87dadd5999d21eee06b397a4ba54bce3d94ef240d2f35cb6d9e32a035de99e11318bcb0dcee1ade3497dcaf3b9573cb821f05838