Malware Analysis Report

2025-01-18 00:51

Sample ID 240613-rgwwassbqh
Target a5f4579f029289f119636806354dfa53_JaffaCakes118
SHA256 545409e4182ea74e55987dcd8741cb3cec2402bcf6f84a7e19c2078cc293e1ad
Tags
score
1/10

Table of Contents

Analysis Overview

MITRE ATT&CK

Enterprise Matrix V15

Analysis: static1

Detonation Overview

Signatures

Analysis: behavioral1

Detonation Overview

Command Line

Signatures

Processes

Network

Files

Analysis: behavioral2

Detonation Overview

Command Line

Signatures

Processes

Network

Files

Analysis Overview

score
1/10

SHA256

545409e4182ea74e55987dcd8741cb3cec2402bcf6f84a7e19c2078cc293e1ad

Threat Level: No (potentially) malicious behavior was detected

The file a5f4579f029289f119636806354dfa53_JaffaCakes118 was found to be: No (potentially) malicious behavior was detected.

Malicious Activity Summary


Modifies Internet Explorer settings

Suspicious use of FindShellTrayWindow

Suspicious use of SetWindowsHookEx

Suspicious use of WriteProcessMemory

MITRE ATT&CK

Analysis: static1

Detonation Overview

Reported

2024-06-13 14:10

Signatures

N/A

Analysis: behavioral1

Detonation Overview

Submitted

2024-06-13 14:10

Reported

2024-06-13 14:12

Platform

win7-20240611-en

Max time kernel

133s

Max time network

127s

Command Line

"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\a5f4579f029289f119636806354dfa53_JaffaCakes118.html

Signatures

Modifies Internet Explorer settings

adware spyware
Description Indicator Process Target
Key created \REGISTRY\USER\S-1-5-21-2812790648-3157963462-487717889-1000\Software\Microsoft\Internet Explorer\DomainSuggestion C:\Program Files\Internet Explorer\iexplore.exe N/A
Set value (int) \REGISTRY\USER\S-1-5-21-2812790648-3157963462-487717889-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "424449694" C:\Program Files\Internet Explorer\iexplore.exe N/A
Key created \REGISTRY\USER\S-1-5-21-2812790648-3157963462-487717889-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive C:\Program Files\Internet Explorer\iexplore.exe N/A
Set value (str) \REGISTRY\USER\S-1-5-21-2812790648-3157963462-487717889-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE N/A
Set value (str) \REGISTRY\USER\S-1-5-21-2812790648-3157963462-487717889-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" C:\Program Files\Internet Explorer\iexplore.exe N/A
Set value (int) \REGISTRY\USER\S-1-5-21-2812790648-3157963462-487717889-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" C:\Program Files\Internet Explorer\iexplore.exe N/A
Key created \REGISTRY\USER\S-1-5-21-2812790648-3157963462-487717889-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing C:\Program Files\Internet Explorer\iexplore.exe N/A
Key created \REGISTRY\USER\S-1-5-21-2812790648-3157963462-487717889-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic C:\Program Files\Internet Explorer\iexplore.exe N/A
Set value (int) \REGISTRY\USER\S-1-5-21-2812790648-3157963462-487717889-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" C:\Program Files\Internet Explorer\iexplore.exe N/A
Key created \REGISTRY\USER\S-1-5-21-2812790648-3157963462-487717889-1000\Software\Microsoft\Internet Explorer\PageSetup C:\Program Files\Internet Explorer\iexplore.exe N/A
Key created \REGISTRY\USER\S-1-5-21-2812790648-3157963462-487717889-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser C:\Program Files\Internet Explorer\iexplore.exe N/A
Key created \REGISTRY\USER\S-1-5-21-2812790648-3157963462-487717889-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE N/A
Key created \REGISTRY\USER\S-1-5-21-2812790648-3157963462-487717889-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage C:\Program Files\Internet Explorer\iexplore.exe N/A
Key created \REGISTRY\USER\S-1-5-21-2812790648-3157963462-487717889-1000\Software\Microsoft\Internet Explorer\IntelliForms C:\Program Files\Internet Explorer\iexplore.exe N/A
Key created \REGISTRY\USER\S-1-5-21-2812790648-3157963462-487717889-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage C:\Program Files\Internet Explorer\iexplore.exe N/A
Key created \REGISTRY\USER\S-1-5-21-2812790648-3157963462-487717889-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch C:\Program Files\Internet Explorer\iexplore.exe N/A
Key created \REGISTRY\USER\S-1-5-21-2812790648-3157963462-487717889-1000\Software\Microsoft\Internet Explorer\InternetRegistry C:\Program Files\Internet Explorer\iexplore.exe N/A
Key created \REGISTRY\USER\S-1-5-21-2812790648-3157963462-487717889-1000\Software\Microsoft\Internet Explorer\LowRegistry C:\Program Files\Internet Explorer\iexplore.exe N/A
Set value (data) \REGISTRY\USER\S-1-5-21-2812790648-3157963462-487717889-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 70f7b1839bbdda01 C:\Program Files\Internet Explorer\iexplore.exe N/A
Key created \REGISTRY\USER\S-1-5-21-2812790648-3157963462-487717889-1000\Software\Microsoft\Internet Explorer\Main C:\Program Files\Internet Explorer\iexplore.exe N/A
Set value (int) \REGISTRY\USER\S-1-5-21-2812790648-3157963462-487717889-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" C:\Program Files\Internet Explorer\iexplore.exe N/A
Key created \REGISTRY\USER\S-1-5-21-2812790648-3157963462-487717889-1000\Software\Microsoft\Internet Explorer\Toolbar C:\Program Files\Internet Explorer\iexplore.exe N/A
Key created \REGISTRY\USER\S-1-5-21-2812790648-3157963462-487717889-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery C:\Program Files\Internet Explorer\iexplore.exe N/A
Set value (int) \REGISTRY\USER\S-1-5-21-2812790648-3157963462-487717889-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" C:\Program Files\Internet Explorer\iexplore.exe N/A
Key created \REGISTRY\USER\S-1-5-21-2812790648-3157963462-487717889-1000\Software\Microsoft\Internet Explorer\IETld\LowMic C:\Program Files\Internet Explorer\iexplore.exe N/A
Key created \REGISTRY\USER\S-1-5-21-2812790648-3157963462-487717889-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain C:\Program Files\Internet Explorer\iexplore.exe N/A
Set value (str) \REGISTRY\USER\S-1-5-21-2812790648-3157963462-487717889-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" C:\Program Files\Internet Explorer\iexplore.exe N/A
Set value (data) \REGISTRY\USER\S-1-5-21-2812790648-3157963462-487717889-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 C:\Program Files\Internet Explorer\iexplore.exe N/A
Key created \REGISTRY\USER\S-1-5-21-2812790648-3157963462-487717889-1000\Software\Microsoft\Internet Explorer\SearchScopes C:\Program Files\Internet Explorer\iexplore.exe N/A
Set value (int) \REGISTRY\USER\S-1-5-21-2812790648-3157963462-487717889-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" C:\Program Files\Internet Explorer\iexplore.exe N/A
Set value (data) \REGISTRY\USER\S-1-5-21-2812790648-3157963462-487717889-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 C:\Program Files\Internet Explorer\iexplore.exe N/A
Key created \REGISTRY\USER\S-1-5-21-2812790648-3157963462-487717889-1000\Software\Microsoft\Internet Explorer\Zoom C:\Program Files\Internet Explorer\iexplore.exe N/A
Set value (int) \REGISTRY\USER\S-1-5-21-2812790648-3157963462-487717889-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{AF2E9071-298E-11EF-86AF-C63262D56B5F} = "0" C:\Program Files\Internet Explorer\iexplore.exe N/A
Set value (data) \REGISTRY\USER\S-1-5-21-2812790648-3157963462-487717889-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb010000000b2968c6cf60b74b94229c882944fb8100000000020000000000106600000001000020000000a36079ea42747678bfbd0c7992fa63f01882313666f32af375df816ca561932b000000000e80000000020000200000002e948844279c3c4784a727dc4849cca3679ede00d7b9dc7728e9eaedc40e65592000000066969b73398a15ef6643ab928f9be95d2a82b26f1ddd458ef5541fac5c52ef4140000000981b815e5f3f82e017f5ed5b1529ba851a51b674cc3c1449628cf553d5aee99735c1d9790821a878a79b4605e116d8e922810ac19196c32f9eaed018812f5f75 C:\Program Files\Internet Explorer\iexplore.exe N/A
Key created \REGISTRY\USER\S-1-5-21-2812790648-3157963462-487717889-1000\Software\Microsoft\Internet Explorer\GPU C:\Program Files\Internet Explorer\iexplore.exe N/A
Key created \REGISTRY\USER\S-1-5-21-2812790648-3157963462-487717889-1000\Software\Microsoft\Internet Explorer\Main C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE N/A

Suspicious use of FindShellTrayWindow

Description Indicator Process Target
N/A N/A C:\Program Files\Internet Explorer\iexplore.exe N/A

Processes

C:\Program Files\Internet Explorer\iexplore.exe

"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\a5f4579f029289f119636806354dfa53_JaffaCakes118.html

C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE

"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2372 CREDAT:275457 /prefetch:2

Network

Country Destination Domain Proto
US 204.79.197.200:443 ieonline.microsoft.com tcp
US 204.79.197.200:443 ieonline.microsoft.com tcp
US 204.79.197.200:443 ieonline.microsoft.com tcp

Files

C:\Users\Admin\AppData\Local\Temp\Cab2687.tmp

MD5 2d3dcf90f6c99f47e7593ea250c9e749
SHA1 51be82be4a272669983313565b4940d4b1385237
SHA256 8714e7be9f9b6de26673d9d09bd4c9f41b1b27ae10b1d56a7ad83abd7430ebd4
SHA512 9c11dd7d448ffebe2167acde37be77d42175edacf5aaf6fb31d3bdfe6bb1f63f5fdbc9a0a2125ed9d5ce0529b6b548818c8021532e1ea6b324717cc9bec0aaa5

C:\Users\Admin\AppData\Local\Temp\Tar2788.tmp

MD5 7186ad693b8ad9444401bd9bcd2217c2
SHA1 5c28ca10a650f6026b0df4737078fa4197f3bac1
SHA256 9a71fa0cb44aa51412b16a0bf83a275977ba4e807d022f78364338b99b3a3eed
SHA512 135be0e6370fd057762c56149526f46bf6a62fb65ef5b3b26ae01fa07b4c4e37188e203bd3812f31e260ec5cccff5924633dd55ab17e9fa106479783c2fb212b

C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

MD5 7b053b2f4b712ddcb7a8116fba45e8b8
SHA1 7fd06c8376ae32f2e991350c2fe7fe007c3a7fc0
SHA256 250940bc37051a3e152e1861f0af9cdf2092df99e994ab316a576bdaa41e9c91
SHA512 33cbf791f2fefd81de8f1099297d22e36bd7d883d8bd071bb7ee7a959ccaafc03cc3afc0c65aafcea1700e46167fcc58844a5cd914c51645839b597c2ae1c12c

C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

MD5 ce0e95e2941ceb228c82e89a0957a20b
SHA1 5bae5202231ad5483a0ebcb9e1d04e703adc7df4
SHA256 c8ccefd4e3317016b538c2665b945d632ade755987e2a6409f392cc3e16b0937
SHA512 27a885aafe438ce878ff4b72830a140efb12a970002a53e840426cd0c2dda386faa03f09e919636e054919633a80dc8b0f0c587683ea28c2201929cdee76badb

C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

MD5 433291c8d286e92d695129cffb30aebc
SHA1 12df0346bf3509106046951a08708d3b3e5aa021
SHA256 fe22356465f91c671c395c230b2b16b988b3690a77c6a487c2493a173de3ffa7
SHA512 5b35aba88994256f25a290c043228e081ef1a26191f7eef31308389f2d947e2f2a6ffd2ab7b42a562de47381407ad9182ee50d5e2d6f69096b84dd96500a5deb

C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

MD5 bbfeb7f53c99246afac3f2fef1039c62
SHA1 8c639531ee39eaa7d1ab571b0de841ac38ca0ff8
SHA256 e5a1509b65ea135fcbfe9101d042afb5b4f39367348bf5efb9ccdf560d6bb44e
SHA512 f5137d399d28abf4a2fec1f62175dd54e9d6e0e2a739ca2dadaae863e59bb08d4705244c13c7dbb83fe39cf9c0c5f74883f96074158a733070a76dabd348de1e

C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

MD5 81a63c33c6e80afb148d90f7a42964a7
SHA1 6ef8d49565ce4420e36aa0859debc3ecf28cd941
SHA256 17c9e40c24192390f69aedf888c0446c99cbb8bc1c8fa6a780a552f0518a7d9c
SHA512 9bfb8351857d36bc022c89ff82bc5edf975c08c017872a613220b3e30c0ea37480714698e42156e65e51a3d8b5c0f06e5b96ee16dcdcef4e366e23cd1875310a

C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

MD5 95faa89727563242377c122a3f7914a2
SHA1 9f5ef6379fd57598680ac98e6594afc7b1782fc3
SHA256 cd9781e5e932a0f88ba8f31d15b4aeab3b76819709de117d15be1f58e987993c
SHA512 fb01960c28a90253a1c514dd56e58bd6d6344054dd7d76a43bafc3c0023db4bb9d14603f60eef0d7fe3e0cdfc0bc1520df5e1760aaf85823c8ad1774a9c028bf

C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

MD5 442929af702ce80040d7ca0e033f4cd0
SHA1 801e902047fb7706ea4db993d191847da438517c
SHA256 8945ffa226cf4cdf12e347f8a30a59270b9025612af6b8432b2a7749eb9f3bbe
SHA512 9dbcc55b183ddf56793a164e8522659d711c1e0a7f088510cee62bbb5fabd82f1ddb0d8e3736ea9b64cb68f8ebfee03fe808c3c2030ba1054a18d6cc095dc3d9

C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

MD5 1b7f6f0b645bf1c2e694e36e7f44533d
SHA1 71451a4c6ca954b6739066427daefd5c6d04e9e3
SHA256 2de9749d0fc0c1a1d4627bb7f7581aeec65eac0c1af2720b631adb22fe4ebf14
SHA512 7b6c62a7802845c6bf1135c22c50b701e18d10caca4ffbc31b2b4de51d29e51b7e90356ee72e42a021791827229afae27ae094956626f1ef98a7604338c728a1

C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

MD5 f6ebaabf69cd17f711c169da1f5727bb
SHA1 339bd69baa19e73bfb2cd31222aeb4b7f41bfd7b
SHA256 265790dbfe92b9505fc81ea65287875a2d0812b82510fa9a0efee89e9c37bbc7
SHA512 fb53e56d15f79a15f96ae1790d8035d082da4b84672a4f10489c9977676e2ed5a84901c402288464a467d19e4bf2376d4b990c7a060d5b588aa7f95d540ad00d

C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

MD5 56ffb77b17bf86af5ac5e8cffeba8f78
SHA1 c72d9cac03e39c74ba7f08f62c731150241763ca
SHA256 b7798a781637aee4968ac7f5301e27426c689ec6e6273aae5f1a01f47c83d284
SHA512 2cc19cad5c9f05edabd6529af6d7a3a2557eb07dfbacb0dcb6768f34b0d19a51b93ed28b3e0bcf2a506cbf8149f2bd51fb6183581f2279d8c3a715b7d6cf4df4

C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

MD5 0398b6648cb14be884f26be9724e5dbe
SHA1 29f88a7b8709fff4f11c62754d79c9cb1b781a97
SHA256 27a572d19c8218f798bf1dbb3f9ee9b5add3611a889032d7880ddd36ac9dc328
SHA512 9ed2300c994e17dda5c35eeac36cc44b15020050ca1c381c2e0f43e960607fa8e5e792af9c471587d209f3ac1c02110306057099a352fa99959096518d80aaa8

C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

MD5 88fcbb713b95fdf2042726af34388790
SHA1 2cc8d07a71b7a78fc2cb3a6dbaa06af3053be58d
SHA256 3541236ebbc3b911985654c85daddd6c8f5b772c2cdf6ce81753c02e327ba4db
SHA512 3f223abe0e625073f517456484ff2d122bf1619740ea59560ffae5d206ecf8f7e7686fcb97671821379e3b9cd739b01c572b3b27a74fdfdebb46e4e43aac4d7e

C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

MD5 7abd86b8f6c7f4108afe7d65df1196f7
SHA1 db183fa67c20a17c20d310d8b51662100db373f8
SHA256 be15b17dbc6d574fc2002e295b4a54ced0af881aa1a2e116b20c6ae52dfb64e7
SHA512 7541467cc153fa98dc3145a95919fcbd5ded82d59aade3fc248dbe4831b5ad4335a71ae685f940631394aba97c1d33ce53e88f6151fefb615b40eb6f4aa6195b

C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

MD5 d63177fe9f2b70a0ff7b285fb8614f0b
SHA1 af3a24f847e625d82618c9f78a007a053216339c
SHA256 c7f1ac93f95aec62a8d413b46c361b44af20d505062c28475a7f151e69859de9
SHA512 4af2068dd6317838b97ec3b9b15a95c32a9342d8b4020c2ac38c9c6cad833d8c4a6c14064e72b290c451c9a99166715586ce2edcc01bdc78270e5188b35246c8

C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

MD5 58db206cc9b3df6ba4a153e742c1d932
SHA1 9272cfd5ba268267f32e53f3a90dfae2a394cc8e
SHA256 f0aacd3a8a8c83002ba2a54d51789b9a5f5d0ebb13c626393d07734f578c68ac
SHA512 af73795d7ae7cbd77aacf0a9fbf534db1ae557e65c46ad32955d6b3da3672a036aa7a4fe787ed91581bc958210051f068a9c4370b8ea22837507c68b26858bd6

Analysis: behavioral2

Detonation Overview

Submitted

2024-06-13 14:10

Reported

2024-06-13 14:13

Platform

win10v2004-20240226-en

Max time kernel

143s

Max time network

150s

Command Line

"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\a5f4579f029289f119636806354dfa53_JaffaCakes118.html

Signatures

N/A

Processes

C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe

"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\a5f4579f029289f119636806354dfa53_JaffaCakes118.html

C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe

"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --no-appcompat-clear --lang=en-US --js-flags=--ms-user-locale= --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=17 --mojo-platform-channel-handle=4944 --field-trial-handle=2280,i,11703952675008463361,17436195144517971517,262144 --variations-seed-version /prefetch:1

C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe

"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --no-appcompat-clear --lang=en-US --js-flags=--ms-user-locale= --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=18 --mojo-platform-channel-handle=4488 --field-trial-handle=2280,i,11703952675008463361,17436195144517971517,262144 --variations-seed-version /prefetch:1

C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe

"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=asset_store.mojom.AssetStoreService --lang=en-US --service-sandbox-type=asset_store_service --no-appcompat-clear --mojo-platform-channel-handle=5748 --field-trial-handle=2280,i,11703952675008463361,17436195144517971517,262144 --variations-seed-version /prefetch:8

C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe

"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --no-appcompat-clear --disable-gpu-compositing --lang=en-US --js-flags=--ms-user-locale= --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=20 --mojo-platform-channel-handle=4092 --field-trial-handle=2280,i,11703952675008463361,17436195144517971517,262144 --variations-seed-version /prefetch:1

C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe

"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=asset_store.mojom.AssetStoreService --lang=en-US --service-sandbox-type=asset_store_service --no-appcompat-clear --mojo-platform-channel-handle=4924 --field-trial-handle=2280,i,11703952675008463361,17436195144517971517,262144 --variations-seed-version /prefetch:8

C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe

"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=edge_search_indexer.mojom.SearchIndexerInterfaceBroker --lang=en-US --service-sandbox-type=search_indexer --message-loop-type-ui --no-appcompat-clear --mojo-platform-channel-handle=5864 --field-trial-handle=2280,i,11703952675008463361,17436195144517971517,262144 --variations-seed-version /prefetch:8

Network

Country Destination Domain Proto
US 8.8.8.8:53 nav-edge.smartscreen.microsoft.com udp
US 8.8.8.8:53 nav-edge.smartscreen.microsoft.com udp
GB 51.140.242.104:443 nav-edge.smartscreen.microsoft.com tcp
US 8.8.8.8:53 business.bing.com udp
US 8.8.8.8:53 business.bing.com udp
US 13.107.6.158:443 business.bing.com tcp
US 8.8.8.8:53 graph.instagram.com udp
US 8.8.8.8:53 graph.instagram.com udp
US 8.8.8.8:53 connect.facebook.net udp
GB 163.70.151.21:445 connect.facebook.net tcp
US 8.8.8.8:53 76.234.34.23.in-addr.arpa udp
US 8.8.8.8:53 www.microsoft.com udp
US 8.8.8.8:53 www.microsoft.com udp
US 8.8.8.8:53 www.microsoft.com udp
US 8.8.8.8:53 bzib.nelreports.net udp
US 8.8.8.8:53 bzib.nelreports.net udp
SE 23.34.233.128:443 www.microsoft.com tcp
SE 184.31.15.40:443 bzib.nelreports.net tcp
US 8.8.8.8:53 graph.instagram.com udp
US 8.8.8.8:53 graph.instagram.com udp
GB 163.70.151.63:443 graph.instagram.com tcp
US 8.8.8.8:53 connect.facebook.net udp
US 8.8.8.8:53 www.microsoft.com udp
US 8.8.8.8:53 128.233.34.23.in-addr.arpa udp
US 8.8.8.8:53 40.15.31.184.in-addr.arpa udp
US 8.8.8.8:53 241.150.49.20.in-addr.arpa udp
US 8.8.8.8:53 63.151.70.163.in-addr.arpa udp
US 8.8.8.8:53 105.83.221.88.in-addr.arpa udp
GB 163.70.151.21:139 connect.facebook.net tcp
US 8.8.8.8:53 edgestatic.azureedge.net udp
US 8.8.8.8:53 edgestatic.azureedge.net udp
US 8.8.8.8:53 c.s-microsoft.com udp
US 8.8.8.8:53 c.s-microsoft.com udp
US 13.107.246.64:443 edgestatic.azureedge.net tcp
US 13.107.246.64:443 edgestatic.azureedge.net tcp
US 13.107.246.64:443 edgestatic.azureedge.net tcp
US 8.8.8.8:53 64.246.107.13.in-addr.arpa udp
US 8.8.8.8:53 wcpstatic.microsoft.com udp
US 8.8.8.8:53 wcpstatic.microsoft.com udp
US 13.107.246.64:443 edgestatic.azureedge.net tcp
US 13.107.253.64:443 wcpstatic.microsoft.com tcp
US 13.107.246.64:443 edgestatic.azureedge.net tcp
US 8.8.8.8:53 68.32.126.40.in-addr.arpa udp
US 8.8.8.8:53 95.221.229.192.in-addr.arpa udp
US 8.8.8.8:53 28.118.140.52.in-addr.arpa udp
US 8.8.8.8:53 nw-umwatson.events.data.microsoft.com udp
US 8.8.8.8:53 154.239.44.20.in-addr.arpa udp
US 20.42.73.29:443 nw-umwatson.events.data.microsoft.com tcp
GB 23.44.234.16:80 tcp
US 8.8.8.8:53 29.73.42.20.in-addr.arpa udp
US 8.8.8.8:53 58.55.71.13.in-addr.arpa udp
N/A 224.0.0.251:5353 udp
US 13.107.246.64:443 edgestatic.azureedge.net tcp
US 8.8.8.8:53 50.23.12.20.in-addr.arpa udp
US 13.107.253.64:443 wcpstatic.microsoft.com tcp
US 8.8.8.8:53 171.39.242.20.in-addr.arpa udp
BE 2.17.107.104:443 www.bing.com tcp
US 8.8.8.8:53 104.107.17.2.in-addr.arpa udp
US 8.8.8.8:53 172.210.232.199.in-addr.arpa udp
NL 52.142.223.178:80 tcp
US 8.8.8.8:53 31.243.111.52.in-addr.arpa udp
BE 88.221.83.209:443 www.bing.com tcp
US 8.8.8.8:53 209.83.221.88.in-addr.arpa udp
US 8.8.8.8:53 90.16.208.104.in-addr.arpa udp

Files

N/A