Malware Analysis Report

2024-10-19 02:45

Sample ID 240825-wrcbvsxbjg
Target c149183688c4b9a2f4d180b0da85d505_JaffaCakes118
SHA256 60a78d553dafbcb136620c50b23f7f73f3a09a7fcab4d52623135666c71a8e80
Tags
socgholish discovery downloader
score
10/10

Table of Contents

Analysis Overview

MITRE ATT&CK

Enterprise Matrix V15

Analysis: static1

Detonation Overview

Signatures

Analysis: behavioral1

Detonation Overview

Command Line

Signatures

Processes

Network

Files

Analysis: behavioral2

Detonation Overview

Command Line

Signatures

Processes

Network

Files

Analysis Overview

score
10/10

SHA256

60a78d553dafbcb136620c50b23f7f73f3a09a7fcab4d52623135666c71a8e80

Threat Level: Known bad

The file c149183688c4b9a2f4d180b0da85d505_JaffaCakes118 was found to be: Known bad.

Malicious Activity Summary

socgholish discovery downloader

SocGholish

System Location Discovery: System Language Discovery

Browser Information Discovery

Modifies Internet Explorer settings

Suspicious use of FindShellTrayWindow

Suspicious use of WriteProcessMemory

Enumerates system info in registry

Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary

Suspicious use of SendNotifyMessage

Suspicious use of SetWindowsHookEx

Suspicious behavior: EnumeratesProcesses

MITRE ATT&CK

Analysis: static1

Detonation Overview

Reported

2024-08-25 18:08

Signatures

N/A

Analysis: behavioral1

Detonation Overview

Submitted

2024-08-25 18:08

Reported

2024-08-25 18:11

Platform

win7-20240704-en

Max time kernel

132s

Max time network

148s

Command Line

"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\c149183688c4b9a2f4d180b0da85d505_JaffaCakes118.html

Signatures

SocGholish

downloader socgholish

System Location Discovery: System Language Discovery

discovery
Description Indicator Process Target
Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE N/A

Modifies Internet Explorer settings

adware spyware
Description Indicator Process Target
Set value (str) \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" C:\Program Files\Internet Explorer\iexplore.exe N/A
Key created \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\Main C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE N/A
Key created \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\SearchScopes C:\Program Files\Internet Explorer\iexplore.exe N/A
Set value (int) \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" C:\Program Files\Internet Explorer\iexplore.exe N/A
Key created \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain C:\Program Files\Internet Explorer\iexplore.exe N/A
Key created \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser C:\Program Files\Internet Explorer\iexplore.exe N/A
Key created \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive C:\Program Files\Internet Explorer\iexplore.exe N/A
Set value (str) \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" C:\Program Files\Internet Explorer\iexplore.exe N/A
Key created \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing C:\Program Files\Internet Explorer\iexplore.exe N/A
Key created \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery C:\Program Files\Internet Explorer\iexplore.exe N/A
Set value (data) \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb010000002aec918cb9fa9248b7812ac80df2e74c00000000020000000000106600000001000020000000f777c367ed60c8802f7d3cb315f52da7881fac697c7f7bf31ad0f03b04e1313b000000000e80000000020000200000002b121dd3ed7b1600f51fcb355f0647c204c09bda1e0dc59c4343be40fcec13f420000000174fba0989ef85893ae7351ed4e04cb716842aa8b2340b6890806fa47bf423c440000000e62028b138a26745c3b7345ca31b69b793fdaf5183216ffcf288b92425aed52eb9f63ff3a22166eeaa41c4f8dbfa9b1a5c856ece25bba51b05cee672f3746702 C:\Program Files\Internet Explorer\iexplore.exe N/A
Set value (data) \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = d05a22011af7da01 C:\Program Files\Internet Explorer\iexplore.exe N/A
Key created \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\Toolbar C:\Program Files\Internet Explorer\iexplore.exe N/A
Key created \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage C:\Program Files\Internet Explorer\iexplore.exe N/A
Set value (int) \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "430771204" C:\Program Files\Internet Explorer\iexplore.exe N/A
Set value (data) \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 C:\Program Files\Internet Explorer\iexplore.exe N/A
Set value (data) \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 C:\Program Files\Internet Explorer\iexplore.exe N/A
Key created \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\DomainSuggestion C:\Program Files\Internet Explorer\iexplore.exe N/A
Key created \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\IETld\LowMic C:\Program Files\Internet Explorer\iexplore.exe N/A
Key created \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage C:\Program Files\Internet Explorer\iexplore.exe N/A
Key created \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\PageSetup C:\Program Files\Internet Explorer\iexplore.exe N/A
Set value (int) \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" C:\Program Files\Internet Explorer\iexplore.exe N/A
Set value (int) \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" C:\Program Files\Internet Explorer\iexplore.exe N/A
Set value (int) \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" C:\Program Files\Internet Explorer\iexplore.exe N/A
Key created \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\Main C:\Program Files\Internet Explorer\iexplore.exe N/A
Key created \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic C:\Program Files\Internet Explorer\iexplore.exe N/A
Key created \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\GPU C:\Program Files\Internet Explorer\iexplore.exe N/A
Key created \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\IntelliForms C:\Program Files\Internet Explorer\iexplore.exe N/A
Key created \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\InternetRegistry C:\Program Files\Internet Explorer\iexplore.exe N/A
Key created \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\LowRegistry C:\Program Files\Internet Explorer\iexplore.exe N/A
Key created \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\Zoom C:\Program Files\Internet Explorer\iexplore.exe N/A
Key created \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch C:\Program Files\Internet Explorer\iexplore.exe N/A
Set value (int) \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{16EE6E81-630D-11EF-BF89-E649859EC46C} = "0" C:\Program Files\Internet Explorer\iexplore.exe N/A
Set value (int) \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" C:\Program Files\Internet Explorer\iexplore.exe N/A

Suspicious use of FindShellTrayWindow

Description Indicator Process Target
N/A N/A C:\Program Files\Internet Explorer\iexplore.exe N/A

Processes

C:\Program Files\Internet Explorer\iexplore.exe

"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\c149183688c4b9a2f4d180b0da85d505_JaffaCakes118.html

C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE

"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1748 CREDAT:275457 /prefetch:2

Network

Country Destination Domain Proto
US 8.8.8.8:53 gccanada.com udp
US 8.8.8.8:53 www.stumbleupon.com udp
US 8.8.8.8:53 lesatoday.com udp
US 8.8.8.8:53 apis.google.com udp
US 8.8.8.8:53 ws.assoc-amazon.com udp
US 8.8.8.8:53 img.zemanta.com udp
US 8.8.8.8:53 www.linkwithin.com udp
US 8.8.8.8:53 teenbiztalk.com udp
US 8.8.8.8:53 platform.linkedin.com udp
US 8.8.8.8:53 1.gravatar.com udp
US 192.0.73.2:80 1.gravatar.com tcp
GB 173.222.211.50:80 platform.linkedin.com tcp
GB 173.222.211.50:80 platform.linkedin.com tcp
US 15.197.148.33:80 teenbiztalk.com tcp
US 15.197.148.33:80 teenbiztalk.com tcp
SG 118.139.179.30:80 www.linkwithin.com tcp
US 192.0.73.2:80 1.gravatar.com tcp
US 50.63.8.153:80 gccanada.com tcp
US 50.63.8.153:80 gccanada.com tcp
SG 118.139.179.30:80 www.linkwithin.com tcp
US 52.200.99.215:80 www.stumbleupon.com tcp
US 52.200.99.215:80 www.stumbleupon.com tcp
FR 142.250.178.142:80 apis.google.com tcp
FR 142.250.178.142:80 apis.google.com tcp
FR 142.250.201.162:80 pagead2.googlesyndication.com tcp
FR 142.250.201.162:80 pagead2.googlesyndication.com tcp
US 72.9.147.36:80 lesatoday.com tcp
US 72.9.147.36:80 lesatoday.com tcp
US 72.9.147.36:80 lesatoday.com tcp
US 72.9.147.36:80 lesatoday.com tcp
US 8.8.8.8:53 ws.assoc-amazon.com udp
US 72.9.147.36:80 lesatoday.com tcp
US 72.9.147.36:80 lesatoday.com tcp
US 192.0.73.2:443 1.gravatar.com tcp
US 52.200.99.215:443 www.stumbleupon.com tcp
US 72.9.147.36:80 lesatoday.com tcp
US 72.9.147.36:80 lesatoday.com tcp
US 72.9.147.36:80 lesatoday.com tcp
US 72.9.147.36:80 lesatoday.com tcp
US 72.9.147.36:80 lesatoday.com tcp
US 8.8.8.8:53 www.gccanada.com udp
US 50.63.8.153:80 www.gccanada.com tcp
US 50.63.8.153:80 www.gccanada.com tcp
US 72.9.147.36:80 lesatoday.com tcp
US 72.9.147.36:80 lesatoday.com tcp
US 72.9.147.36:80 lesatoday.com tcp
US 72.9.147.36:80 lesatoday.com tcp
US 72.9.147.36:80 lesatoday.com tcp
US 72.9.147.36:80 lesatoday.com tcp
US 72.9.147.36:80 lesatoday.com tcp
US 72.9.147.36:80 lesatoday.com tcp
US 72.9.147.36:80 lesatoday.com tcp
FR 142.250.178.142:443 apis.google.com tcp
US 8.8.8.8:53 c11n4.i.teaserguide.com udp
US 72.9.147.36:80 lesatoday.com tcp
US 8.8.8.8:53 alcardia.l.coredistribute.com udp
US 8.8.8.8:53 vn4.r.teaserguide.com udp
US 8.8.8.8:53 rm3a.r.mega-us-pills.ws udp
US 8.8.8.8:53 r.mega-us-pills.ws udp
US 64.70.19.203:80 r.mega-us-pills.ws tcp
US 64.70.19.203:80 r.mega-us-pills.ws tcp
US 64.70.19.203:80 r.mega-us-pills.ws tcp
US 64.70.19.203:80 r.mega-us-pills.ws tcp
US 64.70.19.203:80 r.mega-us-pills.ws tcp
US 64.70.19.203:80 r.mega-us-pills.ws tcp
US 64.70.19.203:80 r.mega-us-pills.ws tcp
US 64.70.19.203:80 r.mega-us-pills.ws tcp
US 8.8.8.8:53 www.facebook.com udp
GB 157.240.221.35:80 www.facebook.com tcp
GB 157.240.221.35:80 www.facebook.com tcp
US 72.9.147.36:80 lesatoday.com tcp
GB 157.240.221.35:443 www.facebook.com tcp
US 8.8.8.8:53 www.amazon.com udp
GB 13.224.242.232:80 www.amazon.com tcp
GB 13.224.242.232:80 www.amazon.com tcp
US 72.9.147.36:80 lesatoday.com tcp
US 72.9.147.36:80 lesatoday.com tcp
US 72.9.147.36:80 lesatoday.com tcp
US 8.8.8.8:53 www.website.ws udp
US 8.8.8.8:53 ocsp.r2m02.amazontrust.com udp
US 72.9.147.36:80 lesatoday.com tcp
US 64.70.19.170:443 www.website.ws tcp
US 64.70.19.170:443 www.website.ws tcp
US 64.70.19.170:443 www.website.ws tcp
US 64.70.19.170:443 www.website.ws tcp
CH 18.165.189.160:80 ocsp.r2m02.amazontrust.com tcp
US 64.70.19.170:443 www.website.ws tcp
US 72.9.147.36:80 lesatoday.com tcp
US 64.70.19.170:443 www.website.ws tcp
US 72.9.147.36:80 lesatoday.com tcp
US 72.9.147.36:80 lesatoday.com tcp
US 64.70.19.170:443 www.website.ws tcp
US 64.70.19.170:443 www.website.ws tcp
US 64.70.19.170:443 www.website.ws tcp
US 64.70.19.170:443 www.website.ws tcp
GB 157.240.221.35:443 www.facebook.com tcp
FR 172.217.20.174:80 www.google-analytics.com tcp
FR 172.217.20.174:80 www.google-analytics.com tcp
US 8.8.8.8:53 c.pki.goog udp
US 64.70.19.170:443 www.website.ws tcp
US 64.70.19.170:443 www.website.ws tcp
US 8.8.8.8:53 c.pki.goog udp
US 72.9.147.36:80 lesatoday.com tcp
FR 142.250.178.142:443 apis.google.com tcp
FR 142.250.178.142:443 apis.google.com tcp
US 64.70.19.170:443 www.website.ws tcp
US 64.70.19.170:443 www.website.ws tcp
US 8.8.8.8:53 c.pki.goog udp
US 8.8.8.8:53 c.pki.goog udp
FR 216.58.214.163:80 c.pki.goog tcp
US 64.70.19.170:443 www.website.ws tcp
FR 216.58.214.163:80 c.pki.goog tcp
US 64.70.19.170:443 www.website.ws tcp
US 64.70.19.170:443 www.website.ws tcp
US 64.70.19.170:443 www.website.ws tcp
US 8.8.8.8:53 o.pki.goog udp
US 8.8.8.8:53 o.pki.goog udp
FR 216.58.214.163:80 o.pki.goog tcp
FR 216.58.214.163:80 o.pki.goog tcp
US 64.70.19.170:443 www.website.ws tcp
US 64.70.19.170:443 www.website.ws tcp
US 8.8.8.8:53 developers.google.com udp
US 64.70.19.170:443 www.website.ws tcp
FR 142.250.179.110:80 developers.google.com tcp
FR 142.250.179.110:80 developers.google.com tcp
US 64.70.19.170:443 www.website.ws tcp
US 64.70.19.170:443 www.website.ws tcp
US 64.70.19.170:443 www.website.ws tcp
US 64.70.19.170:443 www.website.ws tcp
US 64.70.19.170:443 www.website.ws tcp
US 64.70.19.170:443 www.website.ws tcp
US 64.70.19.170:443 www.website.ws tcp
US 64.70.19.170:443 www.website.ws tcp
FR 216.58.214.163:80 o.pki.goog tcp
FR 216.58.214.163:80 o.pki.goog tcp
US 8.8.8.8:53 accounts.google.com udp
IE 74.125.193.84:443 accounts.google.com tcp
IE 74.125.193.84:443 accounts.google.com tcp
GB 13.224.242.232:443 www.amazon.com tcp
FR 216.58.214.163:80 o.pki.goog tcp
US 8.8.8.8:53 ssl.gstatic.com udp
FR 142.250.179.110:443 developers.google.com tcp
US 64.70.19.170:443 www.website.ws tcp
US 64.70.19.170:443 www.website.ws tcp
US 64.70.19.170:443 www.website.ws tcp
US 64.70.19.170:443 www.website.ws tcp
US 64.70.19.170:443 www.website.ws tcp
FR 142.250.179.110:443 developers.google.com tcp
FR 142.250.179.110:443 developers.google.com tcp
FR 142.250.179.110:443 developers.google.com tcp
FR 142.250.179.110:443 developers.google.com tcp
FR 142.250.179.110:443 developers.google.com tcp
US 8.8.8.8:53 developer.android.com udp
US 8.8.8.8:53 gstatic.com udp
US 64.70.19.170:443 www.website.ws tcp
US 64.70.19.170:443 www.website.ws tcp
FR 172.217.20.206:443 developer.android.com tcp
FR 216.58.214.67:443 gstatic.com tcp
FR 216.58.214.67:443 gstatic.com tcp
FR 216.58.214.67:443 gstatic.com tcp
FR 216.58.214.67:443 gstatic.com tcp
FR 172.217.20.206:443 developer.android.com tcp
US 64.70.19.170:443 www.website.ws tcp
FR 216.58.214.163:80 www.gstatic.com tcp
US 64.70.19.170:443 www.website.ws tcp
US 64.70.19.170:443 www.website.ws tcp
US 64.70.19.170:443 www.website.ws tcp
US 64.70.19.170:443 www.website.ws tcp
US 64.70.19.170:443 www.website.ws tcp
US 64.70.19.170:443 www.website.ws tcp
US 64.70.19.170:443 www.website.ws tcp
US 64.70.19.170:443 www.website.ws tcp
US 64.70.19.170:443 www.website.ws tcp
US 64.70.19.170:443 www.website.ws tcp
US 64.70.19.170:443 www.website.ws tcp
US 64.70.19.170:443 www.website.ws tcp
US 64.70.19.170:443 www.website.ws tcp
US 64.70.19.170:443 www.website.ws tcp
US 64.70.19.170:443 www.website.ws tcp
US 8.8.8.8:53 crl.microsoft.com udp
GB 92.123.143.234:80 crl.microsoft.com tcp
US 64.70.19.203:80 r.mega-us-pills.ws tcp
US 64.70.19.203:80 r.mega-us-pills.ws tcp
US 8.8.8.8:53 ep1.adtrafficquality.google udp
FR 142.250.75.226:443 ep1.adtrafficquality.google tcp
FR 142.250.75.226:443 ep1.adtrafficquality.google tcp
US 64.70.19.170:443 www.website.ws tcp
US 64.70.19.170:443 www.website.ws tcp
US 64.70.19.170:443 www.website.ws tcp
US 64.70.19.170:443 www.website.ws tcp
US 64.70.19.170:443 www.website.ws tcp
US 64.70.19.170:443 www.website.ws tcp
US 64.70.19.170:443 www.website.ws tcp
US 64.70.19.170:443 www.website.ws tcp
US 8.8.8.8:53 ep2.adtrafficquality.google udp
FR 142.250.179.97:443 ep2.adtrafficquality.google tcp
FR 142.250.179.97:443 ep2.adtrafficquality.google tcp
US 8.8.8.8:53 tpc.googlesyndication.com udp
FR 142.250.178.129:443 tpc.googlesyndication.com tcp
FR 142.250.178.129:443 tpc.googlesyndication.com tcp
US 8.8.8.8:53 www.microsoft.com udp
US 8.8.8.8:53 www.microsoft.com udp
US 204.79.197.200:443 ieonline.microsoft.com tcp
US 204.79.197.200:443 ieonline.microsoft.com tcp
US 204.79.197.200:443 ieonline.microsoft.com tcp
IE 74.125.193.84:443 accounts.google.com tcp
IE 74.125.193.84:443 accounts.google.com tcp

Files

C:\Users\Admin\AppData\Local\Temp\CabD5E7.tmp

MD5 49aebf8cbd62d92ac215b2923fb1b9f5
SHA1 1723be06719828dda65ad804298d0431f6aff976
SHA256 b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512 bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b

C:\Users\Admin\AppData\Local\Temp\TarD619.tmp

MD5 4ea6026cf93ec6338144661bf1202cd1
SHA1 a1dec9044f750ad887935a01430bf49322fbdcb7
SHA256 8efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA512 6c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b

C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

MD5 38dd479e2edc45dde9db825831db2d22
SHA1 cc2781d69eb9e0cacfc0cfc57012b98fcdc9d281
SHA256 9fcd849e3d6210a2aabb0094eb6293b49fd67ce794224ec9c255e3473f2502e3
SHA512 0162d96a147781bf5441a91339d7b994269757d51ebeaa59d4a28bab359a9ade49bf8db331595a2e6f8cc205d7591d8c004078ac84c4f6cbfd6ad1543774ec4b

C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

MD5 a9e49059de4d278f34aa8b1058486369
SHA1 0dae78ec728067c17f0dcd336265fc743653322c
SHA256 742180e3ead7b3384ca6139cb588daa2dbe323aae95dd5652b6b12ffc52eeddf
SHA512 2e004ad855cee04a6ff94f020dcafb018f5e53481cb61497c0252011186573e6b11db2be1b9151d2dd3106f76d8e4433ecb67cdd04416182923ba2893ecf55a2

C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\2LF9I1AK\dnserrordiagoff[1]

MD5 47f581b112d58eda23ea8b2e08cf0ff0
SHA1 6ec1df5eaec1439573aef0fb96dabfc953305e5b
SHA256 b1c947d00db5fce43314c56c663dbeae0ffa13407c9c16225c17ccefc3afa928
SHA512 187383eef3d646091e9f68eff680a11c7947b3d9b54a78cc6de4a04629d7037e9c97673ac054a6f1cf591235c110ca181a6b69ecba0e5032168f56f4486fff92

C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\4MP1SLKR\errorPageStrings[1]

MD5 e3e4a98353f119b80b323302f26b78fa
SHA1 20ee35a370cdd3a8a7d04b506410300fd0a6a864
SHA256 9466d620dc57835a2475f8f71e304f54aee7160e134ba160baae0f19e5e71e66
SHA512 d8e4d73c76804a5abebd5dbc3a86dcdb6e73107b873175a8de67332c113fb7c4899890bf7972e467866fa4cd100a7e2a10a770e5a9c41cbf23b54351b771dcee

C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\4UQ4J2DQ\httpErrorPagesScripts[1]

MD5 3f57b781cb3ef114dd0b665151571b7b
SHA1 ce6a63f996df3a1cccb81720e21204b825e0238c
SHA256 46e019fa34465f4ed096a9665d1827b54553931ad82e98be01edb1ddbc94d3ad
SHA512 8cbf4ef582332ae7ea605f910ad6f8a4bc28513482409fa84f08943a72cac2cf0fa32b6af4c20c697e1fac2c5ba16b5a64a23af0c11eefbf69625b8f9f90c8fa

C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\4UQ4J2DQ\TMFTPX3A.htm

MD5 32544a2a9f9ef23b1a3bebb86809789d
SHA1 a3b8fba39d6aa35e6b8048225dd8792387417b34
SHA256 5110837d60248dfddb6855ab865c8a8ad1276fe34637e1590e98c98dcb6df288
SHA512 02f046aead0448f04049795d838891e3c271adb1c8929041e8b23f46898942bfc79ceedf7ea8f749b577b176000dd0d06a9e0be3db1885906cf2533701c0f53a

C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

MD5 3d2a76e2d00ffcebe777e347ddd0f858
SHA1 1e75cc93f1b1791bf7c449020c665739a038d58e
SHA256 3f49df2ee4fe2b3351c4c91dfedecb7e167e7554a93d93a8f7dc5369e14fa5f5
SHA512 7da883b0f35b6989c6972bf80693ecffe8a242e320ebd3ed49265ff4eae5f7a4255a100970b54631596c3d44cd9fc4a92ee809abbdaa35affa297e34c29a028a

C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

MD5 fe115c0636aa02892051b4c7a3a15817
SHA1 8c528013b81bff3896a35d54c7c2940bba7ead56
SHA256 0753adab3cfb554a665d060ffbf77f0ed4c2c9f97fe6e01d02abe1c6b3f215fc
SHA512 6e49372f3734ca0a3308061b5fd92ca8e823a77db1e5da384f4887a498dbaa6747f61a7651360e4257e33e64c0a84b0d4776fd148588f73f8d3e4899ee9e57d1

C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\4UQ4J2DQ\cb=gapi[2].js

MD5 b4b711f3e747704ffe02b49791ce8cac
SHA1 ac7ce4cbd3c8ee66e3c8d9d209c1352c160c3b89
SHA256 f65bf40e2f0ce993b54772f703f72d53f0fa925457346fa8ec2031879ffa91d1
SHA512 b738deba57337a9147927f7dd35eab7c999dea6d2ff11f57fdc2e5b6f64326028a54778886548ba128a3f03ee333cc9e43de5162d8b578b85c290626577042db

C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

MD5 c287b40f52192661191836cf3dc2c152
SHA1 5b7a4c6fc49570bdcd4009662b5ca4da2c0c29ac
SHA256 fea75144b2cf043e8b0f786b844f79d894505c5f7e47152b5a5ef3908aa8c8ea
SHA512 e19f1ac312aa178dc5023b905851b64e6f8719b073011ed78f1d58727d4d55515dc7987c6bd08275772d9affc6d2de700e9ce687693b411fcbd6b5bec89c0f9e

C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\F0ACCF77CDCBFF39F6191887F6D2D357

MD5 3132b84fb2d439987a053d37e07a7414
SHA1 37005da7605f37728cdbe54106951a5cf1692ef4
SHA256 1193c7b0b3447cd93a1475a93c0066412caeb2ba848ecede82263b3824a84670
SHA512 0dcf4ad4e1abb39b4ed57d62726755e7c41f98860e919a437c881922db3beec70609fd993850ccfaf6c9aab772c697a6840708b995648a3aa4cc427c998a8703

C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\F0ACCF77CDCBFF39F6191887F6D2D357

MD5 a266bb7dcc38a562631361bbf61dd11b
SHA1 3b1efd3a66ea28b16697394703a72ca340a05bd5
SHA256 df545bf919a2439c36983b54cdfc903dfa4f37d3996d8d84b4c31eec6f3c163e
SHA512 0da8ef4f8f6ed3d16d2bc8eb816b9e6e1345dfe2d91160196c47e6149a1d6aedaafadcefd66acdea7f72dcf0832770192ceac15b0c559c4ccc2c0e5581d5aefc

C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\F0ACCF77CDCBFF39F6191887F6D2D357

MD5 2d3af420d87545b720ef376d725c6860
SHA1 12a3a761abbc88afa0ad20f890238a975d109519
SHA256 5c3c532e499344218b0ded7cb5806e1b2bf7006eeb2dca192ad2465453e2d9bf
SHA512 ac69e444cfcb39ae064aa5f7ef0bc3716defcbb8208bd59711c06960ddec8ee20db12d2531b5219656c24700ed517ecc2b9d668f70c5e12b05cc5c3ebe9c8858

C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\3C428B1A3E5F57D887EC4B864FAC5DCC

MD5 e4a68ac854ac5242460afd72481b2a44
SHA1 df3c24f9bfd666761b268073fe06d1cc8d4f82a4
SHA256 cb3ccbb76031e5e0138f8dd39a23f9de47ffc35e43c1144cea27d46a5ab1cb5f
SHA512 5622207e1ba285f172756f6019af92ac808ed63286e24dfecc1e79873fb5d140f1ceb7133f2476e89a5f75f711f9813a9fbb8fd5287f64adfdcc53b864f9bdc5

C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\3C428B1A3E5F57D887EC4B864FAC5DCC

MD5 2dba5e44d08483df263ca3a74f0bb229
SHA1 7fa4dbd60451e79833ad313b1f1232b52e1c63d9
SHA256 36eb20325490b4d8e100d368f1c6b285d20230a2b42a2ed35d5f9bac83ae2fcb
SHA512 96d10f4888a65e5dfca08b150b7b32eb7d8422adaf6be6a0d426ba1e70c9f67e4000093635b67efdfe101a365fb802a8f1288f2b1d4f97661d050e7924395514

C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

MD5 4678a65ddd9a0bb6825732162a62b090
SHA1 58b090b645feaf07a56d90123290c9fc4addf61f
SHA256 d8cc6df80f794b6798222e6f3f12a1d405a3a549c538285eb9f134c0f3c1ad77
SHA512 ddcc947696c8d6385d44aedbd148aff26780c4df6743fba8a320d81d926009291a89b2786b3d14fb4884508e35b31016d85adc2fb596cd8a330ad3a6b29eab66

C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

MD5 8f2c5c384cd9567c04425daf72750be7
SHA1 1d1cb32fbb7a8596fcb34c2651d5d7f59ef1f8c9
SHA256 4b0a8d43256382918337b7c81f6dbb9e3a4194de3f09e56427a13b41fa2d9068
SHA512 7b8376a4e4d7ae46ff8166be5f848e6acb238bf3e0ca57f82967a84e3797579a9e92ecd21376fa28aeadc3bf5e4308899ae360af2adf0134a89508b750351997

C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

MD5 b49ba8d71cb40a3be7fdffdcd0bad2cf
SHA1 d05d837f128e638c2ebcce3e2fae47be3624eca1
SHA256 ef2c9172ac2592901a7415c75954847f79d23d3645e91a8f9dae61480b37f70b
SHA512 9a6fd6480d49d69631b4c68d132e2f04c042afb5e7d577d1b9dbc34b77ac292463f23538da6d77aff1ae80a21f7f9f4a97aa4ebe254470a75b3999ea65b05da9

C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

MD5 a92ac4c4e3efd326cd5e4168b7e551de
SHA1 c85a4f01e9bff802c311c67a1e0ae21460cb7ce7
SHA256 5dc99b03cfe46a81e78124f5ac3976f8d89dd16a570a0e8e0f62b5f8d55778f7
SHA512 9588478b2560dc36b8a53c4c1b2d59e21994d17a57f0d0e0c2fde668c588ea2a640d0ae5be8f96328f1cad8d8a718e73d5276535e4daef077aceb0ff408ae096

C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

MD5 7162039cdea647b58c7ad38c8072e2c4
SHA1 e73013d578fb995bc65d30a0ae5765164eadee07
SHA256 f882fd86f801b3801788b4c133eb180413e3d2e6f7fe7ed8852e93128f50d193
SHA512 1cd0df7aeefc141ada2a9f0f4c288cfbd6d60cecb75991375c790603bdfa17f69fdb9bae905b50ad523513b45feabdd4e8a28c18b85d2dd1a0eab9e8e4a2f2c1

C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

MD5 8abbf1a284e13a77704453416b658947
SHA1 93cafc3fa82bed2cdd1f8388e438c42a31ecf664
SHA256 d8022a0d1c6ffcf224c75b429a2e1974b6a6170c21107b43b9fc609ce06b697d
SHA512 3f1f886f10b3d5aa36e7dd043eafd06df74a98293c7928a80469e17e45e6f98483a501f3b4956025171b094616f3d5c7792208aa6a53ce6adfba4d455eaebcf5

C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

MD5 f6826cdb016071c970dc9023424c78ad
SHA1 ba78f2560600047790bea9366a42d1197907aea3
SHA256 48b0011dbc92a78ee8814f57e2294c130448acff7dca86a17dd8a3971fb4ccb3
SHA512 6aef8ca5ad46da88f31b9c2b0031dd005787fb01a62b1f1d1379a5359c9088c1ac8e74f3780c59f99a7430d3778569d6059671553107f2d3579d9fce3bd2cc77

C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

MD5 8303d30c9e70907ce1e55468fa4784c3
SHA1 fa098fcd42030d2835132a61a6d9277d7b4e2363
SHA256 fdb03b0dbe675000ddeb6f7a58fe66aa4d002b48e5fdb2d94e5f858c90ecbcdd
SHA512 2ca2e5785de84fe4c5ca81ca7805ed0b524e23e80db8136a4a1e601fc9455d283d1f25a5499ddd7a391c1308108cdecf7a6c9d4114473951c9ae7ff3b9249fa6

C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

MD5 fe820c8674c5c2e5fbe843c47e2061bb
SHA1 2baebc1e729effa955a5d56c2296cd86ce6f749e
SHA256 2a7118f3625bd89193db4ac523df2f5051cbcd409c576ca5b1260d5ff80b722d
SHA512 90cb288e842233d1335b200bb840c31c11fa04de4a00f9d18a063e4d79a60b51e740fd84aec4adacaf99b056a7697f51633e95127d2536052abe0385d825f6b9

C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\69P6875H\1380534674-postmessagerelay[1].js

MD5 c1d4d816ecb8889abf691542c9c69f6a
SHA1 27907b46be6f9fe5886a75ee3c97f020f8365e20
SHA256 01a956fa0b3ea8cb90d7032608512bc289c4170bf92759352e40062d5be2946f
SHA512 f534f057e46998bd1ff2c423ad2cf04a880c4a5259e95aee5c6ae34ce7121ccd07ad1bce5d4c3a51ad04f7411b0625da78808326b13d2aeefec502988e113113

C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\69P6875H\rpc_shindig_random[1].js

MD5 45a63d2d3cfdd75f83979bb6a46a0194
SHA1 d8e35a59be139958da4c891b1ef53c2316462583
SHA256 f7067f1d01d9c60618becbe4df3d61778244108459226e2e8a818cfbc2c18ae6
SHA512 cea9c9eb8ff0c43048ff371f135148438fc1a2614bf8bbc3518cf430c37778edba3452ce92b4236679cd1a4123af0ca320f530b1c20cedd0883b545209c048cc

Analysis: behavioral2

Detonation Overview

Submitted

2024-08-25 18:08

Reported

2024-08-25 18:11

Platform

win10v2004-20240802-en

Max time kernel

145s

Max time network

150s

Command Line

"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\c149183688c4b9a2f4d180b0da85d505_JaffaCakes118.html

Signatures

Browser Information Discovery

discovery

Enumerates system info in registry

Description Indicator Process Target
Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe N/A
Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe N/A
Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe N/A

Suspicious use of FindShellTrayWindow

Description Indicator Process Target
N/A N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe N/A
N/A N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe N/A
N/A N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe N/A
N/A N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe N/A
N/A N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe N/A
N/A N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe N/A
N/A N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe N/A
N/A N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe N/A
N/A N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe N/A
N/A N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe N/A
N/A N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe N/A
N/A N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe N/A
N/A N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe N/A
N/A N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe N/A
N/A N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe N/A
N/A N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe N/A
N/A N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe N/A
N/A N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe N/A
N/A N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe N/A
N/A N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe N/A
N/A N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe N/A
N/A N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe N/A
N/A N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe N/A
N/A N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe N/A
N/A N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe N/A

Suspicious use of SendNotifyMessage

Description Indicator Process Target
N/A N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe N/A
N/A N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe N/A
N/A N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe N/A
N/A N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe N/A
N/A N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe N/A
N/A N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe N/A
N/A N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe N/A
N/A N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe N/A
N/A N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe N/A
N/A N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe N/A
N/A N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe N/A
N/A N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe N/A
N/A N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe N/A
N/A N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe N/A
N/A N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe N/A
N/A N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe N/A
N/A N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe N/A
N/A N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe N/A
N/A N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe N/A
N/A N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe N/A
N/A N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe N/A
N/A N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe N/A
N/A N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe N/A
N/A N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe N/A

Suspicious use of WriteProcessMemory

Description Indicator Process Target
PID 904 wrote to memory of 2640 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 904 wrote to memory of 2640 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 904 wrote to memory of 3240 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 904 wrote to memory of 3240 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 904 wrote to memory of 3240 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 904 wrote to memory of 3240 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 904 wrote to memory of 3240 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 904 wrote to memory of 3240 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 904 wrote to memory of 3240 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 904 wrote to memory of 3240 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 904 wrote to memory of 3240 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 904 wrote to memory of 3240 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 904 wrote to memory of 3240 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 904 wrote to memory of 3240 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 904 wrote to memory of 3240 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 904 wrote to memory of 3240 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 904 wrote to memory of 3240 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 904 wrote to memory of 3240 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 904 wrote to memory of 3240 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 904 wrote to memory of 3240 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 904 wrote to memory of 3240 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 904 wrote to memory of 3240 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 904 wrote to memory of 3240 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 904 wrote to memory of 3240 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 904 wrote to memory of 3240 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 904 wrote to memory of 3240 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 904 wrote to memory of 3240 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 904 wrote to memory of 3240 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 904 wrote to memory of 3240 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 904 wrote to memory of 3240 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 904 wrote to memory of 3240 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 904 wrote to memory of 3240 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 904 wrote to memory of 3240 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 904 wrote to memory of 3240 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 904 wrote to memory of 3240 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 904 wrote to memory of 3240 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 904 wrote to memory of 3240 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 904 wrote to memory of 3240 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 904 wrote to memory of 3240 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 904 wrote to memory of 3240 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 904 wrote to memory of 3240 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 904 wrote to memory of 3240 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 904 wrote to memory of 4492 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 904 wrote to memory of 4492 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 904 wrote to memory of 2552 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 904 wrote to memory of 2552 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 904 wrote to memory of 2552 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 904 wrote to memory of 2552 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 904 wrote to memory of 2552 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 904 wrote to memory of 2552 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 904 wrote to memory of 2552 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 904 wrote to memory of 2552 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 904 wrote to memory of 2552 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 904 wrote to memory of 2552 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 904 wrote to memory of 2552 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 904 wrote to memory of 2552 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 904 wrote to memory of 2552 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 904 wrote to memory of 2552 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 904 wrote to memory of 2552 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 904 wrote to memory of 2552 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 904 wrote to memory of 2552 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 904 wrote to memory of 2552 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 904 wrote to memory of 2552 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 904 wrote to memory of 2552 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe

Processes

C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe

"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\c149183688c4b9a2f4d180b0da85d505_JaffaCakes118.html

C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe

"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ff83d7446f8,0x7ff83d744708,0x7ff83d744718

C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe

"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=1956,2036232142609607934,16385981418626961959,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1992 /prefetch:2

C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe

"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=1956,2036232142609607934,16385981418626961959,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2464 /prefetch:3

C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe

"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=1956,2036232142609607934,16385981418626961959,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2828 /prefetch:8

C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe

"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1956,2036232142609607934,16385981418626961959,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3212 /prefetch:1

C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe

"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1956,2036232142609607934,16385981418626961959,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3268 /prefetch:1

C:\Windows\System32\CompPkgSrv.exe

C:\Windows\System32\CompPkgSrv.exe -Embedding

C:\Windows\System32\CompPkgSrv.exe

C:\Windows\System32\CompPkgSrv.exe -Embedding

C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe

"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1956,2036232142609607934,16385981418626961959,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4804 /prefetch:1

C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe

"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1956,2036232142609607934,16385981418626961959,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4884 /prefetch:1

C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe

"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1956,2036232142609607934,16385981418626961959,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5812 /prefetch:1

C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe

"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1956,2036232142609607934,16385981418626961959,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=1380 /prefetch:1

C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe

"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1956,2036232142609607934,16385981418626961959,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4848 /prefetch:1

C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe

"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1956,2036232142609607934,16385981418626961959,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=7152 /prefetch:1

C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe

"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1956,2036232142609607934,16385981418626961959,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=13 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6060 /prefetch:1

C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe

"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1956,2036232142609607934,16385981418626961959,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=14 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6644 /prefetch:1

C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe

"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=1956,2036232142609607934,16385981418626961959,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=8036 /prefetch:8

C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe

"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=1956,2036232142609607934,16385981418626961959,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=8036 /prefetch:8

C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe

"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1956,2036232142609607934,16385981418626961959,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=16 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=7792 /prefetch:1

C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe

"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1956,2036232142609607934,16385981418626961959,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=17 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=7668 /prefetch:1

C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe

"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1956,2036232142609607934,16385981418626961959,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=18 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=7236 /prefetch:1

C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe

"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1956,2036232142609607934,16385981418626961959,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=19 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=7204 /prefetch:1

C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe

"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=1956,2036232142609607934,16385981418626961959,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=7892 /prefetch:2

Network

Country Destination Domain Proto
US 8.8.8.8:53 apps.shareaholic.com udp
CH 18.165.183.8:445 apps.shareaholic.com tcp
US 8.8.8.8:53 s.w.org udp
US 8.8.8.8:53 lesatoday.com udp
US 8.8.8.8:53 apis.google.com udp
US 8.8.8.8:53 gccanada.com udp
FR 142.250.178.142:80 apis.google.com tcp
US 50.63.8.153:80 gccanada.com tcp
US 8.8.8.8:53 www.gccanada.com udp
US 50.63.8.153:80 www.gccanada.com tcp
US 8.8.8.8:53 142.178.250.142.in-addr.arpa udp
US 8.8.8.8:53 153.8.63.50.in-addr.arpa udp
US 8.8.8.8:53 58.55.71.13.in-addr.arpa udp
CH 18.165.183.14:445 apps.shareaholic.com tcp
CH 18.165.183.46:445 apps.shareaholic.com tcp
CH 18.165.183.114:445 apps.shareaholic.com tcp
US 8.8.8.8:53 apps.shareaholic.com udp
US 72.9.147.36:80 lesatoday.com tcp
US 72.9.147.36:80 lesatoday.com tcp
US 72.9.147.36:80 lesatoday.com tcp
US 72.9.147.36:80 lesatoday.com tcp
US 72.9.147.36:80 lesatoday.com tcp
US 72.9.147.36:80 lesatoday.com tcp
GB 18.165.242.113:139 apps.shareaholic.com tcp
US 72.9.147.36:80 lesatoday.com tcp
US 72.9.147.36:80 lesatoday.com tcp
US 72.9.147.36:80 lesatoday.com tcp
US 72.9.147.36:80 lesatoday.com tcp
US 72.9.147.36:80 lesatoday.com tcp
US 72.9.147.36:80 lesatoday.com tcp
US 8.8.8.8:53 36.147.9.72.in-addr.arpa udp
US 8.8.8.8:53 64.159.190.20.in-addr.arpa udp
US 72.9.147.36:80 lesatoday.com tcp
US 72.9.147.36:80 lesatoday.com tcp
US 72.9.147.36:80 lesatoday.com tcp
US 8.8.8.8:53 95.221.229.192.in-addr.arpa udp
US 8.8.8.8:53 25.140.123.92.in-addr.arpa udp
US 72.9.147.36:80 lesatoday.com tcp
US 8.8.8.8:53 www.linkwithin.com udp
SG 118.139.179.30:80 www.linkwithin.com tcp
SG 118.139.179.30:80 www.linkwithin.com tcp
US 8.8.8.8:53 platform.linkedin.com udp
GB 173.222.211.56:80 platform.linkedin.com tcp
US 8.8.8.8:53 30.179.139.118.in-addr.arpa udp
US 8.8.8.8:53 56.211.222.173.in-addr.arpa udp
US 72.9.147.36:80 lesatoday.com tcp
US 8.8.8.8:53 www.stumbleupon.com udp
US 3.221.43.243:80 www.stumbleupon.com tcp
US 8.8.8.8:53 149.220.183.52.in-addr.arpa udp
US 3.221.43.243:443 www.stumbleupon.com tcp
US 72.9.147.36:80 lesatoday.com tcp
US 72.9.147.36:80 lesatoday.com tcp
FR 216.58.213.66:80 pagead2.googlesyndication.com tcp
FR 216.58.213.66:80 pagead2.googlesyndication.com tcp
N/A 224.0.0.251:5353 udp
US 8.8.8.8:53 243.43.221.3.in-addr.arpa udp
US 8.8.8.8:53 61.39.156.108.in-addr.arpa udp
US 8.8.8.8:53 66.213.58.216.in-addr.arpa udp
US 72.9.147.36:80 lesatoday.com tcp
US 72.9.147.36:80 lesatoday.com tcp
US 72.9.147.36:80 lesatoday.com tcp
US 72.9.147.36:80 lesatoday.com tcp
US 72.9.147.36:80 lesatoday.com tcp
US 72.9.147.36:80 lesatoday.com tcp
US 72.9.147.36:80 lesatoday.com tcp
US 72.9.147.36:80 lesatoday.com tcp
US 72.9.147.36:80 lesatoday.com tcp
US 8.8.8.8:53 c11n4.i.teaserguide.com udp
US 8.8.8.8:53 alcardia.l.coredistribute.com udp
US 8.8.8.8:53 vn4.r.teaserguide.com udp
FR 142.250.178.142:443 apis.google.com tcp
US 8.8.8.8:53 rm3a.r.mega-us-pills.ws udp
US 72.9.147.36:80 lesatoday.com tcp
US 64.70.19.203:80 rm3a.r.mega-us-pills.ws tcp
US 8.8.8.8:53 r.mega-us-pills.ws udp
US 72.9.147.36:80 lesatoday.com tcp
US 64.70.19.203:80 r.mega-us-pills.ws tcp
US 64.70.19.203:80 r.mega-us-pills.ws tcp
US 64.70.19.203:80 r.mega-us-pills.ws tcp
US 64.70.19.203:80 r.mega-us-pills.ws tcp
US 72.9.147.36:80 lesatoday.com tcp
US 72.9.147.36:80 lesatoday.com tcp
US 64.70.19.203:80 r.mega-us-pills.ws tcp
US 64.70.19.203:80 r.mega-us-pills.ws tcp
US 72.9.147.36:80 lesatoday.com tcp
US 8.8.8.8:53 ws.assoc-amazon.com udp
US 8.8.8.8:53 img.zemanta.com udp
US 8.8.8.8:53 1.gravatar.com udp
US 72.9.147.36:80 lesatoday.com tcp
US 72.9.147.36:80 lesatoday.com tcp
US 192.0.73.2:80 1.gravatar.com tcp
US 8.8.8.8:53 teenbiztalk.com udp
US 50.63.8.153:80 www.gccanada.com tcp
US 3.33.130.190:80 teenbiztalk.com tcp
US 72.9.147.36:80 lesatoday.com tcp
US 72.9.147.36:80 lesatoday.com tcp
US 8.8.8.8:53 2.73.0.192.in-addr.arpa udp
US 8.8.8.8:53 190.130.33.3.in-addr.arpa udp
US 50.63.8.153:80 www.gccanada.com tcp
US 50.63.8.153:80 www.gccanada.com tcp
US 192.0.73.2:443 1.gravatar.com tcp
US 50.63.8.153:80 www.gccanada.com tcp
SG 118.139.179.30:80 www.linkwithin.com tcp
SG 118.139.179.30:80 www.linkwithin.com tcp
US 8.8.8.8:53 228.249.119.40.in-addr.arpa udp
US 8.8.8.8:53 platform.twitter.com udp
NL 192.229.233.25:445 platform.twitter.com tcp
US 8.8.8.8:53 platform.twitter.com udp
PL 93.184.220.66:139 platform.twitter.com tcp
US 8.8.8.8:53 133.211.185.52.in-addr.arpa udp
US 64.70.19.203:80 r.mega-us-pills.ws tcp
US 8.8.8.8:53 183.59.114.20.in-addr.arpa udp
US 8.8.8.8:53 198.187.3.20.in-addr.arpa udp
US 8.8.8.8:53 www.facebook.com udp
DE 157.240.27.35:80 www.facebook.com tcp
DE 157.240.27.35:80 www.facebook.com tcp
FR 172.217.20.174:80 www.google-analytics.com tcp
DE 157.240.27.35:443 www.facebook.com tcp
DE 157.240.27.35:443 www.facebook.com tcp
US 8.8.8.8:53 googleads.g.doubleclick.net udp
US 72.9.147.36:80 lesatoday.com tcp
FR 142.250.74.226:443 googleads.g.doubleclick.net tcp
US 72.9.147.36:80 lesatoday.com tcp
US 8.8.8.8:53 35.27.240.157.in-addr.arpa udp
US 8.8.8.8:53 174.20.217.172.in-addr.arpa udp
US 8.8.8.8:53 226.74.250.142.in-addr.arpa udp
US 72.9.147.36:80 lesatoday.com tcp
US 72.9.147.36:80 lesatoday.com tcp
US 72.9.147.36:80 lesatoday.com tcp
US 72.9.147.36:80 lesatoday.com tcp
FR 142.250.178.142:443 apis.google.com udp
US 8.8.8.8:53 developers.google.com udp
US 8.8.8.8:53 accounts.google.com udp
FR 142.250.179.110:80 developers.google.com tcp
FR 142.250.179.110:443 developers.google.com tcp
IE 74.125.193.84:443 accounts.google.com tcp
FR 142.250.179.110:443 developers.google.com tcp
US 8.8.8.8:53 ssl.gstatic.com udp
US 8.8.8.8:53 110.179.250.142.in-addr.arpa udp
FR 216.58.214.163:443 ssl.gstatic.com tcp
US 8.8.8.8:53 84.193.125.74.in-addr.arpa udp
US 8.8.8.8:53 163.214.58.216.in-addr.arpa udp
US 64.70.19.203:80 r.mega-us-pills.ws tcp
US 8.8.8.8:53 ep1.adtrafficquality.google udp
FR 142.250.75.226:443 ep1.adtrafficquality.google tcp
US 8.8.8.8:53 www.website.ws udp
US 64.70.19.170:443 www.website.ws tcp
US 8.8.8.8:53 226.75.250.142.in-addr.arpa udp
US 8.8.8.8:53 ep2.adtrafficquality.google udp
FR 142.250.179.97:443 ep2.adtrafficquality.google tcp
US 8.8.8.8:53 tpc.googlesyndication.com udp
FR 142.250.178.129:443 tpc.googlesyndication.com tcp
US 64.70.19.170:443 www.website.ws tcp
US 64.70.19.170:443 www.website.ws tcp
US 64.70.19.170:443 www.website.ws tcp
US 64.70.19.170:443 www.website.ws tcp
US 64.70.19.170:443 www.website.ws tcp
FR 142.250.178.129:443 tpc.googlesyndication.com udp
US 8.8.8.8:53 97.179.250.142.in-addr.arpa udp
US 8.8.8.8:53 170.19.70.64.in-addr.arpa udp
US 8.8.8.8:53 129.178.250.142.in-addr.arpa udp
US 8.8.8.8:53 www.google.com udp
FR 142.250.179.68:443 www.google.com tcp
US 8.8.8.8:53 68.179.250.142.in-addr.arpa udp
FR 142.250.179.68:443 www.google.com udp
FR 142.250.179.68:443 www.google.com udp
US 8.8.8.8:53 200.20.217.172.in-addr.arpa udp
US 8.8.8.8:53 131.178.250.142.in-addr.arpa udp
US 8.8.8.8:53 88.156.103.20.in-addr.arpa udp
US 8.8.8.8:53 48.229.111.52.in-addr.arpa udp
US 8.8.8.8:53 55.36.223.20.in-addr.arpa udp
US 8.8.8.8:53 tse1.mm.bing.net udp
US 150.171.28.10:443 tse1.mm.bing.net tcp
US 150.171.28.10:443 tse1.mm.bing.net tcp
US 150.171.28.10:443 tse1.mm.bing.net tcp
US 150.171.28.10:443 tse1.mm.bing.net tcp
US 150.171.28.10:443 tse1.mm.bing.net tcp
IE 74.125.193.84:443 accounts.google.com udp

Files

C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad\settings.dat

MD5 4dd2754d1bea40445984d65abee82b21
SHA1 4b6a5658bae9a784a370a115fbb4a12e92bd3390
SHA256 183b8e82a0deaa83d04736553671cedb738adc909f483b3c5f822a0e6be7477d
SHA512 92d44ee372ad33f892b921efa6cabc78e91025e89f05a22830763217826fa98d51d55711f85c8970ac58abf9adc6c85cc40878032cd6d2589ab226cd099f99e1

\??\pipe\LOCAL\crashpad_904_FLPOMJSPODMCVZFR

MD5 d41d8cd98f00b204e9800998ecf8427e
SHA1 da39a3ee5e6b4b0d3255bfef95601890afd80709
SHA256 e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855
SHA512 cf83e1357eefb8bdf1542850d66d8007d620e4050b5715dc83f4a921d36ce9ce47d0d13c5d85f2b0ff8318d2877eec2f63b931bd47417a81a538327af927da3e

C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad\settings.dat

MD5 ecf7ca53c80b5245e35839009d12f866
SHA1 a7af77cf31d410708ebd35a232a80bddfb0615bb
SHA256 882a513b71b26210ff251769b82b2c5d59a932f96d9ce606ca2fab6530a13687
SHA512 706722bd22ce27d854036b1b16e6a3cdb36284b66edc76238a79c2e11cee7d1307b121c898ad832eb1af73e4f08d991d64dc0bff529896ffb4ebe9b3dc381696

C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Preferences

MD5 ed017ab8a173359bbf01b5cdc3624381
SHA1 58b3d9abd8737e1b133cb282a02d24b428ba53dc
SHA256 d7a06340d9789189008a8a9865f0f377d415406894510c695124a89f025bc0dc
SHA512 fad57ead0811e1d0a421474dd2c8f78cbf4c514cfba64a0b82bf71ffb3d4fc87185b1116deb817715fab513575f7ff51313a6acc2863945d6348717cfafbf8cf

C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Local State

MD5 6eed62c089ba76f00d9ac83ffe6b598c
SHA1 f9289d8418f4019efb881cbabd1431eec408a9fb
SHA256 9da2c88f782dabdf562e3143692a90b4c236c52691387317d702cd5347a7fde3
SHA512 705d9a73a75439574504dfaa7317b55cd883a0966c4e03b38d771820f6f662b1cc3d754ab8092a6f9463786d8e45a09c9d046d3b7f094b9f8abac22b42267cab

C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Preferences

MD5 39fd1a9e70322c9f4993c26c11195d1f
SHA1 4b120f359e317c1bff695f8f9a3184d0387477bc
SHA256 5f1675beb80f178b9212f015a552aaa347c1622383cc74a7394257603bffa3df
SHA512 3f36d9a9aabc137459dddd262bd2d83ec9c479d1dfcd5a167ad21daa85c243f44c6e467cd5cfa3c9abf0dda86b1a13b79d3219033484c6150415aa52402d614b

C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Preferences

MD5 e3f38190c69f4436143708158729a92b
SHA1 7b7269800fe7a8407aa814c4bae9112ceb7db6f6
SHA256 1bb28a1e616ec06975c9e5da47b1ed8805c366cf09dda344fdb0cbc23e26bcea
SHA512 2c2034511112a608fbffb5cd3a846d74853972a0d9340f4bb68cf2f7ced7f3a0b9a511d56c2439af3f4de4d44e15b6eb26c60cc39c218fd1e27228cb692dc83c

C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Cache\f_000014

MD5 2257803a7e34c3abd90ec6d41fd76a5a
SHA1 f7a32e6635d8513f74bd225f55d867ea56ae4803
SHA256 af23860fb3a448f2cc6107680078402555a345eb45bc5efb750f541fe5d7c174
SHA512 e9f4dc90d0829885f08879e868aa62041150b500f62682fc108da258eee26ad9509dcbf6e8a55f2d0bdba7aa9118dd149a70a7d851820d4ea683db7808c48540

C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\data_reduction_proxy_leveldb\CURRENT

MD5 6752a1d65b201c13b62ea44016eb221f
SHA1 58ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA256 0861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA512 9cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389

C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Network Persistent State

MD5 d13f155b79d47777f2bcdb826a77c8f3
SHA1 b0f9b0d4c600f0564f875998ff737dbd96b4cc2d
SHA256 b2cdf509cf0cd54b5ada33cc2b37b989e2393a3be027099f075cb7e6c6e00de1
SHA512 c2681545b24a68d93a2d79e3e4e23dd9a5957e02ee5703cee2e9a027849d366bb7f6c41e2778a4174c113ef11ec822e0f989db34b021c5474f8c71c21fbbf7ad

C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index

MD5 1d5f63b4931be4ffb39a706085a9dc06
SHA1 a7e655511beff63b3e6e7f37c7157fc5c46e2b87
SHA256 04d380705382763ae57c759be464c851682d9880ba8e18ca764d8fdf7bc61fb3
SHA512 27dd3e3a00892b40861201f70aa98abbcf7518527fc59eea4ad89472a41acd9f3ab028419552b05d87ae77f7c3eb0ab189538dc6ad19e02b0cd7fa223a79fe35

C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Preferences

MD5 80355b7dea0bc31d6b181af38b75d1e6
SHA1 d49390986a658b2d20683647c5ae87668153e668
SHA256 f18421a69f2c99f4d1ded2ecb2fc0bbd69c9bd3cba7fb9191c0d1fb8eb6bbf33
SHA512 d713d56afb6c4c52258ff44556a5315afa8d408d0d054c17f5588efee3c339d98b09ed0cd9ea7dae7a18032a44e8b502f4ec3712361f907fbe31441e0ea2d83f

C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index

MD5 81dc11ce1847a8fb8385decff73f36e7
SHA1 f09768e84d923828ea1be5dd13778f49529494a6
SHA256 58f1ace7119cb3ecf8c82108bb0874fec9b06910f94b5e20bf1b56a9ea22d05f
SHA512 471e7b667d8dc792b7c555d69ba44cd95e0c322841db0981e0e226d775a4dbeaf87591ab36b7b93dd671c66532a3fd7d9044ec002a7e604006ddd5a8f5b75018