Malware Analysis Report

2024-10-19 02:45

Sample ID 240826-gq6rrazgjq
Target c26a690e629cf4b753de85b9647e7163_JaffaCakes118
SHA256 8f9fcb45db5e7599ca21a0ec9f5c7613027c6b663271c8527f951a9697e534ee
Tags
socgholish discovery downloader
score
10/10

Table of Contents

Analysis Overview

MITRE ATT&CK

Enterprise Matrix V15

Analysis: static1

Detonation Overview

Signatures

Analysis: behavioral1

Detonation Overview

Command Line

Signatures

Processes

Network

Files

Analysis: behavioral2

Detonation Overview

Command Line

Signatures

Processes

Network

Files

Analysis Overview

score
10/10

SHA256

8f9fcb45db5e7599ca21a0ec9f5c7613027c6b663271c8527f951a9697e534ee

Threat Level: Known bad

The file c26a690e629cf4b753de85b9647e7163_JaffaCakes118 was found to be: Known bad.

Malicious Activity Summary

socgholish discovery downloader

SocGholish

System Location Discovery: System Language Discovery

Browser Information Discovery

Suspicious use of FindShellTrayWindow

Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary

Enumerates system info in registry

Suspicious behavior: EnumeratesProcesses

Suspicious use of SendNotifyMessage

Modifies Internet Explorer settings

Suspicious use of SetWindowsHookEx

Suspicious use of WriteProcessMemory

MITRE ATT&CK

Analysis: static1

Detonation Overview

Reported

2024-08-26 06:01

Signatures

N/A

Analysis: behavioral1

Detonation Overview

Submitted

2024-08-26 06:01

Reported

2024-08-26 06:04

Platform

win7-20240708-en

Max time kernel

150s

Max time network

145s

Command Line

"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\c26a690e629cf4b753de85b9647e7163_JaffaCakes118.html

Signatures

SocGholish

downloader socgholish

System Location Discovery: System Language Discovery

discovery
Description Indicator Process Target
Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE N/A

Modifies Internet Explorer settings

adware spyware
Description Indicator Process Target
Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\GPU C:\Program Files\Internet Explorer\iexplore.exe N/A
Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\InternetRegistry C:\Program Files\Internet Explorer\iexplore.exe N/A
Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Zoom C:\Program Files\Internet Explorer\iexplore.exe N/A
Set value (str) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" C:\Program Files\Internet Explorer\iexplore.exe N/A
Set value (int) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" C:\Program Files\Internet Explorer\iexplore.exe N/A
Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\DomainSuggestion C:\Program Files\Internet Explorer\iexplore.exe N/A
Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Main C:\Program Files\Internet Explorer\iexplore.exe N/A
Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic C:\Program Files\Internet Explorer\iexplore.exe N/A
Set value (int) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "430813963" C:\Program Files\Internet Explorer\iexplore.exe N/A
Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive C:\Program Files\Internet Explorer\iexplore.exe N/A
Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch C:\Program Files\Internet Explorer\iexplore.exe N/A
Set value (str) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE N/A
Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing C:\Program Files\Internet Explorer\iexplore.exe N/A
Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain C:\Program Files\Internet Explorer\iexplore.exe N/A
Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\PageSetup C:\Program Files\Internet Explorer\iexplore.exe N/A
Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE N/A
Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage C:\Program Files\Internet Explorer\iexplore.exe N/A
Set value (data) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = c0ea797f7df7da01 C:\Program Files\Internet Explorer\iexplore.exe N/A
Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\IntelliForms C:\Program Files\Internet Explorer\iexplore.exe N/A
Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\LowRegistry C:\Program Files\Internet Explorer\iexplore.exe N/A
Set value (int) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" C:\Program Files\Internet Explorer\iexplore.exe N/A
Set value (data) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 C:\Program Files\Internet Explorer\iexplore.exe N/A
Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Toolbar C:\Program Files\Internet Explorer\iexplore.exe N/A
Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery C:\Program Files\Internet Explorer\iexplore.exe N/A
Set value (str) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" C:\Program Files\Internet Explorer\iexplore.exe N/A
Set value (data) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000a3d5a058b71c4645a1a6b8b9d2c7fb47000000000200000000001066000000010000200000006e6ab565d9259dd6366ff3bf0d14a3e6575cf6788a526af36d4c3c66ab6bc4e8000000000e800000000200002000000047e5b476a9ce5b3812bdaeb96ba6025b014bde562349392b594a10cb1913fcee2000000071adb93fdbc4d31099d2cc2d05cdca923c60daf24b38dc6e35adeb53a385902140000000ea7b0c20654af202f99b1439785394b64a767da030d0062222156c6de8881684d1bd94d2c75e905083b8db39db5ffbc252edb1e71696cb0518c3d55fa305e515 C:\Program Files\Internet Explorer\iexplore.exe N/A
Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\IETld\LowMic C:\Program Files\Internet Explorer\iexplore.exe N/A
Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Main C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE N/A
Set value (int) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" C:\Program Files\Internet Explorer\iexplore.exe N/A
Set value (int) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" C:\Program Files\Internet Explorer\iexplore.exe N/A
Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\SearchScopes C:\Program Files\Internet Explorer\iexplore.exe N/A
Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser C:\Program Files\Internet Explorer\iexplore.exe N/A
Set value (data) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 C:\Program Files\Internet Explorer\iexplore.exe N/A
Set value (int) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{A6851811-6370-11EF-B961-D22B03723C32} = "0" C:\Program Files\Internet Explorer\iexplore.exe N/A
Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage C:\Program Files\Internet Explorer\iexplore.exe N/A
Set value (int) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" C:\Program Files\Internet Explorer\iexplore.exe N/A

Suspicious use of FindShellTrayWindow

Description Indicator Process Target
N/A N/A C:\Program Files\Internet Explorer\iexplore.exe N/A

Processes

C:\Program Files\Internet Explorer\iexplore.exe

"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\c26a690e629cf4b753de85b9647e7163_JaffaCakes118.html

C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE

"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:388 CREDAT:275457 /prefetch:2

Network

Country Destination Domain Proto
US 8.8.8.8:53 ajax.googleapis.com udp
US 8.8.8.8:53 www.blogger.com udp
US 8.8.8.8:53 resources.blogblog.com udp
US 8.8.8.8:53 widgets.twimg.com udp
US 8.8.8.8:53 images.detik.com udp
US 8.8.8.8:53 twitter-badges.s3.amazonaws.com udp
US 8.8.8.8:53 adsensecamp.com udp
US 8.8.8.8:53 g2.gumgum.com udp
US 8.8.8.8:53 www.google.com udp
US 8.8.8.8:53 bloggerpeer.googlecode.com udp
US 8.8.8.8:53 i1128.photobucket.com udp
US 8.8.8.8:53 www.linkwithin.com udp
US 8.8.8.8:53 xslt.alexa.com udp
US 8.8.8.8:53 1.bp.blogspot.com udp
US 8.8.8.8:53 apis.google.com udp
FR 142.250.179.97:80 1.bp.blogspot.com tcp
FR 142.250.179.105:443 resources.blogblog.com tcp
FR 142.250.179.105:443 resources.blogblog.com tcp
FR 142.250.179.105:443 resources.blogblog.com tcp
FR 142.250.179.97:80 1.bp.blogspot.com tcp
FR 142.250.179.105:443 resources.blogblog.com tcp
ID 103.49.221.102:80 images.detik.com tcp
ID 103.49.221.102:80 images.detik.com tcp
FR 142.250.179.105:443 resources.blogblog.com tcp
GB 216.137.44.112:80 i1128.photobucket.com tcp
GB 216.137.44.112:80 i1128.photobucket.com tcp
FR 142.250.178.142:443 apis.google.com tcp
FR 142.250.178.142:443 apis.google.com tcp
SG 118.139.179.30:80 www.linkwithin.com tcp
US 52.217.103.193:80 twitter-badges.s3.amazonaws.com tcp
US 52.217.103.193:80 twitter-badges.s3.amazonaws.com tcp
SG 118.139.179.30:80 www.linkwithin.com tcp
ID 103.30.145.12:80 adsensecamp.com tcp
ID 103.30.145.12:80 adsensecamp.com tcp
FR 142.250.179.68:80 www.google.com tcp
FR 142.250.179.68:80 www.google.com tcp
IE 52.50.78.192:80 g2.gumgum.com tcp
IE 52.50.78.192:80 g2.gumgum.com tcp
FR 172.217.20.202:443 ajax.googleapis.com tcp
FR 172.217.20.202:443 ajax.googleapis.com tcp
IE 172.253.116.82:80 bloggerpeer.googlecode.com tcp
IE 172.253.116.82:80 bloggerpeer.googlecode.com tcp
GB 216.137.44.112:443 i1128.photobucket.com tcp
GB 216.137.44.112:443 i1128.photobucket.com tcp
US 8.8.8.8:53 js.gumgum.com udp
GB 18.165.242.66:443 js.gumgum.com tcp
GB 18.165.242.66:443 js.gumgum.com tcp
GB 18.165.242.66:443 js.gumgum.com tcp
GB 18.165.242.66:443 js.gumgum.com tcp
GB 18.165.242.66:443 js.gumgum.com tcp
GB 18.165.242.66:443 js.gumgum.com tcp
US 8.8.8.8:53 c.pki.goog udp
US 8.8.8.8:53 c.pki.goog udp
ID 103.30.145.12:443 adsensecamp.com tcp
US 8.8.8.8:53 c.pki.goog udp
US 8.8.8.8:53 c.pki.goog udp
US 8.8.8.8:53 c.pki.goog udp
US 8.8.8.8:53 c.pki.goog udp
US 8.8.8.8:53 c.pki.goog udp
US 8.8.8.8:53 c.pki.goog udp
GB 18.165.242.66:443 js.gumgum.com tcp
GB 18.165.242.66:443 js.gumgum.com tcp
FR 216.58.214.163:80 c.pki.goog tcp
FR 216.58.214.163:80 c.pki.goog tcp
FR 216.58.214.163:80 c.pki.goog tcp
FR 216.58.214.163:80 c.pki.goog tcp
FR 216.58.214.163:80 c.pki.goog tcp
FR 216.58.214.163:80 c.pki.goog tcp
FR 216.58.214.163:80 c.pki.goog tcp
FR 216.58.214.163:80 c.pki.goog tcp
US 8.8.8.8:53 o.pki.goog udp
US 8.8.8.8:53 o.pki.goog udp
US 8.8.8.8:53 o.pki.goog udp
FR 216.58.214.163:80 o.pki.goog tcp
FR 216.58.214.163:80 o.pki.goog tcp
FR 216.58.214.163:80 o.pki.goog tcp
FR 216.58.214.163:80 o.pki.goog tcp
FR 216.58.214.163:80 o.pki.goog tcp
FR 216.58.214.163:80 o.pki.goog tcp
FR 216.58.214.163:80 o.pki.goog tcp
FR 216.58.214.163:80 o.pki.goog tcp
US 8.8.8.8:53 r11.o.lencr.org udp
GB 88.221.134.137:80 r11.o.lencr.org tcp
FR 216.58.214.163:80 o.pki.goog tcp
US 8.8.8.8:53 www.blogblog.com udp
FR 142.250.179.105:80 www.blogblog.com tcp
FR 142.250.179.105:80 www.blogblog.com tcp
US 8.8.8.8:53 www.linksalpha.com udp
US 8.8.8.8:53 www.facebook.com udp
GB 157.240.221.35:80 www.facebook.com tcp
GB 157.240.221.35:80 www.facebook.com tcp
GB 157.240.221.35:443 www.facebook.com tcp
US 8.8.8.8:53 static.xx.fbcdn.net udp
DE 157.240.27.27:443 static.xx.fbcdn.net tcp
DE 157.240.27.27:443 static.xx.fbcdn.net tcp
US 8.8.8.8:53 widgets.amung.us udp
GB 157.240.221.35:80 www.facebook.com tcp
US 8.8.8.8:53 3.bp.blogspot.com udp
US 172.67.8.141:80 widgets.amung.us tcp
US 172.67.8.141:80 widgets.amung.us tcp
GB 157.240.221.35:443 www.facebook.com tcp
FR 142.250.179.97:80 3.bp.blogspot.com tcp
FR 142.250.179.97:80 3.bp.blogspot.com tcp
GB 157.240.221.35:443 www.facebook.com tcp
US 8.8.8.8:53 crl.microsoft.com udp
GB 92.123.142.59:80 crl.microsoft.com tcp
US 204.79.197.200:443 ieonline.microsoft.com tcp
US 204.79.197.200:443 ieonline.microsoft.com tcp
US 8.8.8.8:53 www.microsoft.com udp
US 8.8.8.8:53 www.microsoft.com udp
US 204.79.197.200:443 ieonline.microsoft.com tcp

Files

C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\24BD96D5497F70B3F510A6B53CD43F3E_3A89246FB90C5EE6620004F1AE0EB0EA

MD5 f8117b4d7eb7ba1d8eb42702a5cfbf73
SHA1 19e25462e627c78901a427155b15cf007de35ffc
SHA256 7e3865cef4650e2d64a0093a677a0ebc0a7a19103b964968f5bfbd60236b75b7
SHA512 9490efa7458ab1dfaebe2ef89c1d84a2a2ada2200562a93ffbba7b3941b03f0f6fa79d8faaca653cabe509c63a69ef2ef54cc44a677e4b8d5e3ad2a6e12f5690

C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\24BD96D5497F70B3F510A6B53CD43F3E_3A89246FB90C5EE6620004F1AE0EB0EA

MD5 11d0005e0b8794ab4aad0542756cbfe7
SHA1 7b8418bec44685422de5c662ac7a6d95d3c04a35
SHA256 721e5b826a6ca850601660da35945f26f901ac73bd9f707c93faa6b4274f9d08
SHA512 be28b411d7bdb72d96309bb44930be33db7898078cbcf10ef6fded144731748b7498b19c91cba5f4ac069fa6de0d250c495f4bceaf4f114f522c3947793ec249

C:\Users\Admin\AppData\Local\Temp\CabE18B.tmp

MD5 49aebf8cbd62d92ac215b2923fb1b9f5
SHA1 1723be06719828dda65ad804298d0431f6aff976
SHA256 b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512 bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b

C:\Users\Admin\AppData\Local\Temp\TarE25A.tmp

MD5 4ea6026cf93ec6338144661bf1202cd1
SHA1 a1dec9044f750ad887935a01430bf49322fbdcb7
SHA256 8efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA512 6c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b

C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\05DDC6AA91765AACACDB0A5F96DF8199

MD5 e935bc5762068caf3e24a2683b1b8a88
SHA1 82b70eb774c0756837fe8d7acbfeec05ecbf5463
SHA256 a8accfcfeb51bd73df23b91f4d89ff1a9eb7438ef5b12e8afda1a6ff1769e89d
SHA512 bed4f6f5357b37662623f1f8afed1a3ebf3810630b2206a0292052a2e754af9dcfe34ee15c289e3d797a8f33330e47c14cbefbc702f74028557ace29bf855f9e

C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

MD5 f67dfc0db44eb592b4585a3fa45d8c2d
SHA1 3c1ba164afde77d2878225d22488d5b4ff7c0fb8
SHA256 9b0b087c13444c20739a172031facf08683a473e73d5a18f0dcbd9a21f6c888a
SHA512 dff0df4ac10e61892434d4316907f866c4d8333e9db1c9cbef05ef6635dc1f740c8c09c29f3821a20d2242156804708086f5954437701b2ec3910973a2db9405

C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\070E0202839D9D67350CD2613E78E416

MD5 019ea2ff8810e68f740a36c6503db62f
SHA1 42117fe4c4fbb9b9bd6177064221e92c0a5f9919
SHA256 e22b33576e45d17f8479c1102380675efea797bbad1cfc94e8b4e1ef86f80c39
SHA512 5047d436ad2567366c7d32c057a80820573327fdd02a54710b4d00b5e0010b207ce43ea56eb8438c3dae33bf2ca670ae04fd97c913af470b06fdd098f2b305fd

C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\070E0202839D9D67350CD2613E78E416

MD5 55540a230bdab55187a841cfe1aa1545
SHA1 363e4734f757bdeb89868efe94907774a327695e
SHA256 d73494e3446b02167573b3cde3ae1c8584ac26e15e45ac3ec0326708425d90fb
SHA512 c899cb1d31d3214fd9dc8626a55e40580d3b2224bf34310c2abd85d0f63e2dedaeae57832f048c2f500cb2cbf83683fcb14139af3f0b5251606076cdb4689c54

C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

MD5 32bb8e311a3d182103be319f3b745ba3
SHA1 59dcce2f8e906caf5df01ce6e6b99f653c653cc2
SHA256 b6a6df7dcd8600500c07a4bf8518e00195600839e404697b216190dc52b4404b
SHA512 b2eb90e849eef8be945f6f588ed196ce86c6bc01c43a1073a443f0c645a5a2757b635b5c8186b1430a12e8cffa92c5ba5d347d4c16b762f28786330cc1bf635e

C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

MD5 c56dd1d132c164c4eae6c736bfb7667b
SHA1 2492721716118dea826d84566bbfe2556e6b28cc
SHA256 aacbcc64dc42723229753afb70423c88b2345f7152a551bfc941dddc618518e0
SHA512 d0768e1e316ff33102a24d4312089c1cde35c6f1e8eca648a468715899e686c56d6832ef4f324d934fc4cb07fed2a86de3baf7b5c6a42adfb77cfbb1e4d4f509

C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

MD5 2c8199dc9b12e68a40ec913f7c16c964
SHA1 57d2ab29055b548e1b1bb05cc3882d81a713a5ca
SHA256 295454056c70d7b87038141914ee29c28526a7d054ef6fe2187b5ab20ce17f87
SHA512 94034310f4dcd80c156e395809c91effc67f6b7e81f0fe5fcca72667f12901ad8b60d578f4ef00bbdf4575111a52b9222e4c36f3b7c26b9e7aea1c19d58f71b0

C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

MD5 2d4762f6897088dc6b3d78a96d4c02a5
SHA1 eadf7efa2ba7f34dd99c0d63c00cf869dc3e1202
SHA256 3d06ce066df167e7faa9cc38bed681c8357b9bc3cad0dfc98c503f874a6a463f
SHA512 0459f4d970166c572e4212f7c745d5ce0c91cb1b5336542fec9ace85b47fe5a556f141d1a6dd279d32cbb89e4911c1e35a435015219aa1d67b596807bf7ab9f4

C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

MD5 a05048e3ba31101c0049ed454e5f2122
SHA1 790f41b4f0a0f5c2ebfd73331e0220543f0423d5
SHA256 e233626af70b65803c7f8aa1676b3fb22934df253dfc7eab1e840429e3e726db
SHA512 db6383d3e383d30e384751b1fb2f7e848a65dc58075e5256aefdfa346f192f48e80e71463f38e2bef881fa5fa395f76504a907a38922c6e0033650ae59b0fb69

C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\HHT5LGG0\cb=gapi[1].js

MD5 cb98a2420cd89f7b7b25807f75543061
SHA1 b9bc2a7430debbe52bce03aa3c7916bedfd12e44
SHA256 bea369fc5bdd5b9b473441583c46b9939232bf1f98c1cedf6bc2241c4f5068d4
SHA512 49ccede4596d1e5640a9c8e8be333f9c18812d58f02b2b15adb54172df1387439e9dc5afc4ccd9d8f0f75f092318bed68d3cd577338e88ef4f9373de8a07c44e

C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\UQFHO95Z\MEtExguyptz[1].css

MD5 ed49e364f92076f052724bf274e62705
SHA1 23770b3f7401dba26a32c37187fe1ea7c0b69e87
SHA256 fcf70567eccf23a433ea35f45e89d9051c24439e7ecca2544f232195d1a8aa74
SHA512 cac8cb74314daff4e8290bc36270852face11eb8cf76f33bd970c7d093aac39a831f29a7a6d2445c96093b438ecc0b7918b5068c0aa16bbe9d6434e0c905b3c3

C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

MD5 a1a8819baf4c9f20638c47d77fe77764
SHA1 dfeda303d3700011fcc70ed9b497e36d7fb73655
SHA256 c61ae9032c6de4cc4f21a38927632a15de0c0fe5a92ac9b717c249298c895687
SHA512 d2d2e79e537c7d7003753d00408f0f34dc6d348cfdc98776ec5cbd5e08bc65c951b7ae1e44120d161c30443941bc6a385d2575367df9128d4040ffa729ff1d27

C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

MD5 e7003d33215d6e5b30815c993160c82d
SHA1 7301ad2348a768af0b9444667cf93726fd089708
SHA256 55563ad6f4546072b75d7040b7c684fa20b06ce63941c44b18ef57c85f5c4285
SHA512 7777e0b1aaf0e7176e47217739a3c2bbcda3fac35f6b04aecbcb32596b7d320037683d555094d26141e69d58ef2ef1c2995dcb55c9ea47cf405f0ada5d458cea

C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

MD5 140ac42313262f2f6ab4be03378b93c3
SHA1 de16ebf51b58a840b43ca899efa70aa752898c99
SHA256 9c9ee9c52e1638b431b3c0335374777dfeeec6fc5b16885aea98d7bfe70ed702
SHA512 d926332d619f8da4e6426dca01cc024807e8f84846fceda262fbc28309b6b87ddb0fab158be5c5bf84fb89146ec40986b7c2df0d9aaf7acb0745dc28d2bc1cdd

C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

MD5 3e6846fd0e9b6d2a19ba00383a16d4ca
SHA1 1d238523d8c83e0507f58d2a4cef19bb938245bb
SHA256 6a63f575f7da11d4791916b934faa5779511bc50c0b7700116b2c91bacf37e06
SHA512 d15c8fe4da1e103c355b390e390bc9bae30de9f87119031b4ee05310c79e288b22af9df3b4decea7fcc9d410003e8084131d79c4b566f12878e136332a69218e

C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

MD5 c899a34ae2144e0cde4179ce267683fc
SHA1 7cf54984ec1c8d2d694f2dbbec4bd3631cad8d44
SHA256 8637f796d3eddb3327ca2d8aa6018db192dba29b2a94a86de5281a77f9bb8431
SHA512 0b00e6b9ed45a1ffba49fa69fa5805e3b8a53a71688104d9ea3c36e930e76493818236a55237de5894dfc89c6a528a525469391256980871d2c0b97e8ab8e545

C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

MD5 dd2e663bec75809a54c9c0bc236c51ff
SHA1 7380329dfcab5c204566697bcc246c4cec72025c
SHA256 bc684a8a99710a12574533dfa5d61ad018e53202bd9458e4f1e607f719aac941
SHA512 e496f32d9b3e21c2781fe919b6fe8ad92406218543b6f2d8b23d973b16654a0d86f7734d9e22c8cc37862637437f16bfc4cca3611621d7818b3687860f695fd5

C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

MD5 8a91aed0edba39ff0d70bda8d763ef71
SHA1 08262bdb9d7aac129061ddb6d074306654baf9cd
SHA256 8c0f1d82da1fd486783e345a8afb02a526229244110b9553f4085107104d7376
SHA512 335f4a847f79e0ea682362fd48b6e507b050624e04f90672964310250e049b641335e461036a4475129fb13a709aee104c206bbd88d815a8a3003ccec123ed8e

C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

MD5 38d706d14fb1c5aca9d78e927d50a3de
SHA1 e2ca2685ec5a9a7877343116d9d04e81be27b91d
SHA256 4966361d4bf01d68f657dbd222bc049c82d7361c0371d232c276b8b5ddbcaf53
SHA512 0fa77b27da4d918e95e9fb455a5b1c2f5e62ad82532defaa8206d563be775da1a532db4779039cbb0b0eb25d92f02f61f91742c28751f0857737758763f5146a

C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

MD5 767ebafacaf9cfa6686f61551757d36a
SHA1 b1c9bc60bfb2039d7afbcd9d5ceef1d781def887
SHA256 940a692023c91d0875f65f172055ef5115a83eec07c17f35b0760aaffb610989
SHA512 391946546ad705227a49f344315f07f94b18cb009a7c44d51599db3d3ed8a007593b44d57db532a3e71792a5ac5d8933744ab6c3309bd0232bcc6dc63bc57080

C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

MD5 db8c1aed82180ddbd907c74455436f9d
SHA1 273203e7f69134d4eb38f85ed524206d32eb1f3b
SHA256 65cca7947d265d96ebf40033f21ffdb91ad0b054d967bc5159d3dd26e847e598
SHA512 5976cb8218eaa93bbe4f37d4f149e46e15a54196d2ea7b980c8d678ffc17c26c445f5b2925a584436ecedc7638cf7558c24c5a5214af0cb4334c0c3a11db29e2

C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

MD5 8466694acb64358ba589c46339387bc6
SHA1 478d3fb02888b3caa02e25601ab68c2ae8f3c39c
SHA256 2aa5f3260a869193940ab9bcf1d37c5a473ef0ea8303114123006e4e0e056d3c
SHA512 33be25949b5995be4132b80b4d945a01f63d99c450ef504a7b41a2a65aa2ba46053ef322247c01b599e99dc49c9e8aa255ad8e6f0f3c4b499ef5ed3a35ad6835

C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\F0ACCF77CDCBFF39F6191887F6D2D357

MD5 a266bb7dcc38a562631361bbf61dd11b
SHA1 3b1efd3a66ea28b16697394703a72ca340a05bd5
SHA256 df545bf919a2439c36983b54cdfc903dfa4f37d3996d8d84b4c31eec6f3c163e
SHA512 0da8ef4f8f6ed3d16d2bc8eb816b9e6e1345dfe2d91160196c47e6149a1d6aedaafadcefd66acdea7f72dcf0832770192ceac15b0c559c4ccc2c0e5581d5aefc

C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\F0ACCF77CDCBFF39F6191887F6D2D357

MD5 737b799a7b8a2c0cc7e641887636be10
SHA1 30ffc71336d77cc9b9716b4faf7bccaaa2ad7ac0
SHA256 7bbe316990289e5259a4d5e4f34117fac60bd31dbb807c7b85375dd135b3642a
SHA512 ef30abfcf5e7e16e5b1dd787e1c244bed3905b218d7a1e2d536831878284ae0ad33cebdcc9d30799c391ea590fb3c76401064ade30f641f6e264adae79dca5e2

C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

MD5 3fea97dc241ebe40458a389471c67fb8
SHA1 5e301be6963a4c0ce719ff17608554b8ef3881f4
SHA256 9449034d6bf0ec456429386fbd036f30b73eb66aa64601f51c4321c9579e3edf
SHA512 611f4767baf7944f66ce276401033662a6a8aa7ac7dbdf509fbe0984b314a6a2e7edce251404e2658bbb1d9636628d1f0acf03e8d23f1f8f0afe790bfc945da0

C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

MD5 8c8768d450ee3c8b4d5f07edb21ab156
SHA1 e2c053caaf5e0ab91b3c9a06cee3c443b685794b
SHA256 23a1b43d941f6f89df1efe18bf85b7b713ae3279538b9cb65b2f43d0c8a26788
SHA512 1a95b29721f89e71b36830cdbd96517788bb54fb1c08ddad36397d4a23c06a5e3ab52be5c818d1e3f63ee4c5cb57a0f0608a0edb6f986695433dfece3e799d72

C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

MD5 ad93b8a6c382dce0f75f5af0fd566a3d
SHA1 e2db22d519bfe6f5f5fd011e42f1e87473a73224
SHA256 1261827823d86a7fbd9bbba4eea07d8ffea6f119fe46eb3cec5d146b404cfabf
SHA512 810449845ad3686d30ab0a8d796ed5ca0b71b8aa1549a427c1406e58098962be90f3dba4cd34f7acb6425493fc3467dd4f38611dfba661c871b329dd3ff8d176

C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

MD5 8ffbc56aad1a0faa2aac0100d2e81109
SHA1 10d079cf93116c862003b6defcaea9b51a8b47ac
SHA256 73814c1e316db5533516e21a15dd246a592bb41a4eaa448680ab25c18e21ec07
SHA512 1619d4551f72044c628e07ffa5eb29b43a0b4147f8b9a5c292fce2ddfd56a00c95360332fc8791f68b90cfa1fb7dc09141076f44a2f1def8da09e85f6ad1ff47

C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\3C428B1A3E5F57D887EC4B864FAC5DCC

MD5 e4a68ac854ac5242460afd72481b2a44
SHA1 df3c24f9bfd666761b268073fe06d1cc8d4f82a4
SHA256 cb3ccbb76031e5e0138f8dd39a23f9de47ffc35e43c1144cea27d46a5ab1cb5f
SHA512 5622207e1ba285f172756f6019af92ac808ed63286e24dfecc1e79873fb5d140f1ceb7133f2476e89a5f75f711f9813a9fbb8fd5287f64adfdcc53b864f9bdc5

C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

MD5 e23f18e975123ed0a5d4dc39342c6a00
SHA1 f689c40dfb5a927d6bb954dd19edf370c2a6a6e6
SHA256 6a7a2470ff2b94163ee0a7d5cfd502aad5e42d8aca9a6e3a1252ad0e43d83ff4
SHA512 01d4640317d584de9b5ccafc976be1ae220ce6a01c2d9d6cf9695c9776e23b39f4c0a0543488c0a1e5847b8c7e48a35dc2551450d3180c32bb6cb2d93e34f14c

C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

MD5 8f3d4f635240f54cbd768b6978633912
SHA1 b45959cfe0bd4c477f607f64c05d088e189eb743
SHA256 8430be326f851c6df4a8b0f4f184563ecd4fbe52d590ecb137f42003411f3989
SHA512 05ea6c8f1ee64256adbc7dce043fafbdda6d9472f454e6e44cdfb75ff10cde15b081b3dc3f00e66564f14f3f26e50138bd1b4e8fb1937531be4da8377c654dac

C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

MD5 34739392c42ecebaa8b14a9cf981fa98
SHA1 682df2ad32395eef548e2552df976d666b292273
SHA256 ba42e697f36156863e5c16e2ad205e46104f9f323c4b87a68e4f72e129a0a65c
SHA512 e275a662d961c87caeb6e184c93cf334824903182b5903f1f6b322ff91bcb023c209a37414f674e0c9e7ad5cf5a59bf409844bf4d2e94ba3c2b18d099c418010

C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\3C428B1A3E5F57D887EC4B864FAC5DCC

MD5 0fdbcaf2fc6f66b499260305654c976e
SHA1 1d29caf0fd0352f803caf33235db70317c55a56d
SHA256 7ea6a95429170534a3ed1fe7c0a35a45894ed069593103358fb5fdf1216ecb75
SHA512 b30f5c3d1197f8cea01235b80e8a08efc4719eabf451cc1fceb0dfc1ae2a56484773cf33dbd062bcbc83300abb533985e4a38f99c089c4fdc8634efd9a7d0f9c

C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

MD5 ad127ac6df71782190caf7182c24624e
SHA1 b8c64eb0fff337c7f116a2d4873e12d342e96929
SHA256 0de1700a7adddf35223edc2e4beb7d38d4206e4b52a3a54a5d82bd1b26484102
SHA512 425f417b7ca250508e7601b89d1587a410e37adc4d24738d89f4620f5b37bcb71da3e89ef915c022b2382f7574c6b0b704c9b6f93333efe49ba08051c2bbe42a

C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

MD5 780b3dafc6541a23d81e59cf93d04967
SHA1 402e3ded0e197d134c931f7d0fde0a0b7755e4d2
SHA256 a21afd7495faf3f6bf5500ae66b166bcf55445e97b1236eb2f35d35b7ac947e8
SHA512 d10bd57f9d3b9910f145909fafefde886e0ccce871f933515c7270cc28cb5c71666afb479c57d06ec24a30aeef173ed0efaf358cfaa2016b420a03272daea54c

Analysis: behavioral2

Detonation Overview

Submitted

2024-08-26 06:01

Reported

2024-08-26 06:04

Platform

win10v2004-20240802-en

Max time kernel

148s

Max time network

149s

Command Line

"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\c26a690e629cf4b753de85b9647e7163_JaffaCakes118.html

Signatures

Browser Information Discovery

discovery

Enumerates system info in registry

Description Indicator Process Target
Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe N/A
Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe N/A
Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe N/A

Suspicious use of FindShellTrayWindow

Description Indicator Process Target
N/A N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe N/A
N/A N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe N/A
N/A N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe N/A
N/A N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe N/A
N/A N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe N/A
N/A N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe N/A
N/A N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe N/A
N/A N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe N/A
N/A N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe N/A
N/A N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe N/A
N/A N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe N/A
N/A N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe N/A
N/A N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe N/A
N/A N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe N/A
N/A N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe N/A
N/A N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe N/A
N/A N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe N/A
N/A N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe N/A
N/A N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe N/A
N/A N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe N/A
N/A N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe N/A
N/A N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe N/A
N/A N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe N/A
N/A N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe N/A
N/A N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe N/A

Suspicious use of SendNotifyMessage

Description Indicator Process Target
N/A N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe N/A
N/A N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe N/A
N/A N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe N/A
N/A N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe N/A
N/A N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe N/A
N/A N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe N/A
N/A N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe N/A
N/A N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe N/A
N/A N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe N/A
N/A N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe N/A
N/A N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe N/A
N/A N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe N/A
N/A N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe N/A
N/A N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe N/A
N/A N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe N/A
N/A N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe N/A
N/A N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe N/A
N/A N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe N/A
N/A N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe N/A
N/A N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe N/A
N/A N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe N/A
N/A N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe N/A
N/A N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe N/A
N/A N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe N/A

Suspicious use of WriteProcessMemory

Description Indicator Process Target
PID 3456 wrote to memory of 1976 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 3456 wrote to memory of 1976 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 3456 wrote to memory of 2204 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 3456 wrote to memory of 2204 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 3456 wrote to memory of 2204 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 3456 wrote to memory of 2204 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 3456 wrote to memory of 2204 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 3456 wrote to memory of 2204 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 3456 wrote to memory of 2204 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 3456 wrote to memory of 2204 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 3456 wrote to memory of 2204 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 3456 wrote to memory of 2204 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 3456 wrote to memory of 2204 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 3456 wrote to memory of 2204 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 3456 wrote to memory of 2204 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 3456 wrote to memory of 2204 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 3456 wrote to memory of 2204 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 3456 wrote to memory of 2204 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 3456 wrote to memory of 2204 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 3456 wrote to memory of 2204 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 3456 wrote to memory of 2204 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 3456 wrote to memory of 2204 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 3456 wrote to memory of 2204 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 3456 wrote to memory of 2204 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 3456 wrote to memory of 2204 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 3456 wrote to memory of 2204 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 3456 wrote to memory of 2204 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 3456 wrote to memory of 2204 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 3456 wrote to memory of 2204 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 3456 wrote to memory of 2204 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 3456 wrote to memory of 2204 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 3456 wrote to memory of 2204 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 3456 wrote to memory of 2204 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 3456 wrote to memory of 2204 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 3456 wrote to memory of 2204 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 3456 wrote to memory of 2204 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 3456 wrote to memory of 2204 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 3456 wrote to memory of 2204 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 3456 wrote to memory of 2204 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 3456 wrote to memory of 2204 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 3456 wrote to memory of 2204 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 3456 wrote to memory of 2204 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 3456 wrote to memory of 4208 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 3456 wrote to memory of 4208 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 3456 wrote to memory of 3712 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 3456 wrote to memory of 3712 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 3456 wrote to memory of 3712 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 3456 wrote to memory of 3712 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 3456 wrote to memory of 3712 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 3456 wrote to memory of 3712 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 3456 wrote to memory of 3712 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 3456 wrote to memory of 3712 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 3456 wrote to memory of 3712 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 3456 wrote to memory of 3712 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 3456 wrote to memory of 3712 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 3456 wrote to memory of 3712 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 3456 wrote to memory of 3712 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 3456 wrote to memory of 3712 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 3456 wrote to memory of 3712 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 3456 wrote to memory of 3712 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 3456 wrote to memory of 3712 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 3456 wrote to memory of 3712 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 3456 wrote to memory of 3712 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 3456 wrote to memory of 3712 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe

Processes

C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe

"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\c26a690e629cf4b753de85b9647e7163_JaffaCakes118.html

C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe

"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffba9d046f8,0x7ffba9d04708,0x7ffba9d04718

C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe

"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2044,14696298115977512806,10594567615051698159,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2080 /prefetch:2

C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe

"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2044,14696298115977512806,10594567615051698159,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2660 /prefetch:3

C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe

"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2044,14696298115977512806,10594567615051698159,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2796 /prefetch:8

C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe

"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2044,14696298115977512806,10594567615051698159,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3224 /prefetch:1

C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe

"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2044,14696298115977512806,10594567615051698159,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3312 /prefetch:1

C:\Windows\System32\CompPkgSrv.exe

C:\Windows\System32\CompPkgSrv.exe -Embedding

C:\Windows\System32\CompPkgSrv.exe

C:\Windows\System32\CompPkgSrv.exe -Embedding

C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe

"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2044,14696298115977512806,10594567615051698159,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5004 /prefetch:1

C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe

"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2044,14696298115977512806,10594567615051698159,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5236 /prefetch:1

C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe

"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2044,14696298115977512806,10594567615051698159,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5440 /prefetch:1

C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe

"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2044,14696298115977512806,10594567615051698159,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5392 /prefetch:1

C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe

"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2044,14696298115977512806,10594567615051698159,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5300 /prefetch:1

C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe

"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2044,14696298115977512806,10594567615051698159,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=1792 /prefetch:8

C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe

"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2044,14696298115977512806,10594567615051698159,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=1792 /prefetch:8

C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe

"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2044,14696298115977512806,10594567615051698159,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=13 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6048 /prefetch:1

C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe

"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2044,14696298115977512806,10594567615051698159,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=14 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5976 /prefetch:1

C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe

"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2044,14696298115977512806,10594567615051698159,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=15 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5388 /prefetch:1

C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe

"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2044,14696298115977512806,10594567615051698159,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=16 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5344 /prefetch:1

C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe

"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2044,14696298115977512806,10594567615051698159,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2176 /prefetch:2

Network

Country Destination Domain Proto
US 8.8.8.8:53 8.8.8.8.in-addr.arpa udp
US 8.8.8.8:53 apis.google.com udp
US 8.8.8.8:53 www.blogger.com udp
US 8.8.8.8:53 ajax.googleapis.com udp
FR 142.250.178.142:443 apis.google.com tcp
FR 142.250.179.105:443 www.blogger.com tcp
FR 142.250.179.105:443 www.blogger.com tcp
FR 172.217.20.170:443 ajax.googleapis.com tcp
US 8.8.8.8:53 adsensecamp.com udp
ID 103.30.145.12:80 adsensecamp.com tcp
US 8.8.8.8:53 13.86.106.20.in-addr.arpa udp
US 8.8.8.8:53 81.144.22.2.in-addr.arpa udp
US 8.8.8.8:53 138.32.126.40.in-addr.arpa udp
US 8.8.8.8:53 142.178.250.142.in-addr.arpa udp
US 8.8.8.8:53 105.179.250.142.in-addr.arpa udp
US 8.8.8.8:53 170.20.217.172.in-addr.arpa udp
US 8.8.8.8:53 95.221.229.192.in-addr.arpa udp
ID 103.30.145.12:80 adsensecamp.com tcp
US 8.8.8.8:53 www.linkwithin.com udp
FR 142.250.179.105:443 www.blogger.com udp
FR 142.250.178.142:443 apis.google.com udp
US 8.8.8.8:53 g2.gumgum.com udp
US 8.8.8.8:53 xslt.alexa.com udp
US 8.8.8.8:53 widgets.twimg.com udp
US 8.8.8.8:53 www.google.com udp
SG 118.139.179.30:80 www.linkwithin.com tcp
SG 118.139.179.30:80 www.linkwithin.com tcp
IE 18.203.167.224:80 g2.gumgum.com tcp
US 8.8.8.8:53 bloggerpeer.googlecode.com udp
US 8.8.8.8:53 1.bp.blogspot.com udp
US 8.8.8.8:53 i1128.photobucket.com udp
ID 103.30.145.12:443 adsensecamp.com tcp
US 8.8.8.8:53 resources.blogblog.com udp
US 8.8.8.8:53 images.detik.com udp
FR 142.250.179.68:80 www.google.com tcp
FR 142.250.179.68:80 www.google.com tcp
US 8.8.8.8:53 www.blogblog.com udp
US 8.8.8.8:53 twitter-badges.s3.amazonaws.com udp
FR 142.250.179.66:445 pagead2.googlesyndication.com tcp
IE 172.253.116.82:80 bloggerpeer.googlecode.com tcp
FR 142.250.179.97:80 1.bp.blogspot.com tcp
ID 103.49.221.102:80 images.detik.com tcp
FR 142.250.179.105:80 www.blogblog.com tcp
FR 142.250.179.105:443 www.blogblog.com tcp
US 3.5.29.185:80 twitter-badges.s3.amazonaws.com tcp
GB 216.137.44.112:80 i1128.photobucket.com tcp
GB 216.137.44.112:80 i1128.photobucket.com tcp
GB 216.137.44.112:80 i1128.photobucket.com tcp
US 8.8.8.8:53 js.gumgum.com udp
GB 216.137.44.112:443 i1128.photobucket.com tcp
GB 216.137.44.112:443 i1128.photobucket.com tcp
GB 216.137.44.112:443 i1128.photobucket.com tcp
GB 18.165.242.66:443 js.gumgum.com tcp
SG 118.139.179.30:80 www.linkwithin.com tcp
ID 103.49.221.102:80 images.detik.com tcp
FR 142.250.179.105:443 www.blogblog.com udp
US 8.8.8.8:53 www.linksalpha.com udp
US 8.8.8.8:53 12.145.30.103.in-addr.arpa udp
US 8.8.8.8:53 224.167.203.18.in-addr.arpa udp
US 8.8.8.8:53 68.179.250.142.in-addr.arpa udp
US 8.8.8.8:53 97.179.250.142.in-addr.arpa udp
US 8.8.8.8:53 82.116.253.172.in-addr.arpa udp
US 8.8.8.8:53 112.44.137.216.in-addr.arpa udp
US 8.8.8.8:53 66.242.165.18.in-addr.arpa udp
US 8.8.8.8:53 185.29.5.3.in-addr.arpa udp
US 8.8.8.8:53 30.179.139.118.in-addr.arpa udp
US 8.8.8.8:53 102.221.49.103.in-addr.arpa udp
US 8.8.8.8:53 107.39.156.108.in-addr.arpa udp
US 8.8.8.8:53 aba.gumgum.com udp
US 8.8.8.8:53 c.gumgum.com udp
US 8.8.8.8:53 www.facebook.com udp
IE 18.203.167.224:443 g2.gumgum.com tcp
US 8.8.8.8:53 gumgum.com udp
FR 142.250.179.68:80 www.google.com tcp
GB 13.224.222.93:443 c.gumgum.com tcp
GB 18.245.218.127:443 aba.gumgum.com tcp
US 8.8.8.8:53 widgets.amung.us udp
GB 157.240.221.35:80 www.facebook.com tcp
GB 18.154.84.22:443 gumgum.com tcp
GB 18.165.242.66:443 js.gumgum.com tcp
US 104.22.74.171:80 widgets.amung.us tcp
GB 157.240.221.35:443 www.facebook.com tcp
US 8.8.8.8:53 t.dtscout.com udp
FR 142.250.179.66:139 pagead2.googlesyndication.com tcp
US 141.101.120.11:443 t.dtscout.com tcp
US 8.8.8.8:53 static.xx.fbcdn.net udp
IE 172.253.116.82:80 bloggerpeer.googlecode.com tcp
DE 157.240.27.27:443 static.xx.fbcdn.net tcp
US 8.8.8.8:53 93.222.224.13.in-addr.arpa udp
US 8.8.8.8:53 35.221.240.157.in-addr.arpa udp
US 8.8.8.8:53 127.218.245.18.in-addr.arpa udp
US 8.8.8.8:53 171.74.22.104.in-addr.arpa udp
US 8.8.8.8:53 22.84.154.18.in-addr.arpa udp
US 8.8.8.8:53 11.120.101.141.in-addr.arpa udp
US 8.8.8.8:53 27.27.240.157.in-addr.arpa udp
US 8.8.8.8:53 3.bp.blogspot.com udp
FR 142.250.179.97:80 3.bp.blogspot.com tcp
US 8.8.8.8:53 g.bing.com udp
US 150.171.27.10:443 g.bing.com tcp
US 8.8.8.8:53 10.27.171.150.in-addr.arpa udp
IE 18.203.167.224:443 g2.gumgum.com tcp
N/A 224.0.0.251:5353 udp
US 8.8.8.8:53 connect.facebook.net udp
DE 157.240.27.27:445 connect.facebook.net tcp
US 8.8.8.8:53 connect.facebook.net udp
DE 157.240.27.27:139 connect.facebook.net tcp
US 8.8.8.8:53 18.31.95.13.in-addr.arpa udp
US 8.8.8.8:53 157.123.68.40.in-addr.arpa udp
US 8.8.8.8:53 172.210.232.199.in-addr.arpa udp
US 8.8.8.8:53 whos.amung.us udp
US 172.67.8.141:445 whos.amung.us tcp
US 104.22.74.171:445 whos.amung.us tcp
US 104.22.75.171:445 whos.amung.us tcp
US 8.8.8.8:53 whos.amung.us udp
US 8.8.8.8:53 172.214.232.199.in-addr.arpa udp
FR 142.250.179.105:443 www.blogblog.com udp
US 8.8.8.8:53 kencew-unix.blogspot.se udp
FR 142.250.75.225:80 kencew-unix.blogspot.se tcp
US 8.8.8.8:53 kencew-unix.blogspot.com udp
FR 142.250.75.225:80 kencew-unix.blogspot.com tcp
US 8.8.8.8:53 225.75.250.142.in-addr.arpa udp
US 8.8.8.8:53 23.236.111.52.in-addr.arpa udp
US 8.8.8.8:53 tse1.mm.bing.net udp
US 150.171.28.10:443 tse1.mm.bing.net tcp
US 150.171.28.10:443 tse1.mm.bing.net tcp
US 150.171.28.10:443 tse1.mm.bing.net tcp
US 150.171.28.10:443 tse1.mm.bing.net tcp
US 150.171.28.10:443 tse1.mm.bing.net tcp

Files

C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad\settings.dat

MD5 0446fcdd21b016db1f468971fb82a488
SHA1 726b91562bb75f80981f381e3c69d7d832c87c9d
SHA256 62c5dc18b25e758f3508582a7c58bb46b734a774d97fc0e8a20614235caa8222
SHA512 1df7c085042266959f1fe0aedc5f6d40ceba485b54159f51f0c38f17bb250b79ea941b735e1b6faf219f23fe8ab65ac4557f545519d52d5416b89ad0f9047a31

\??\pipe\LOCAL\crashpad_3456_ADUROKPJCLNXTFTW

MD5 d41d8cd98f00b204e9800998ecf8427e
SHA1 da39a3ee5e6b4b0d3255bfef95601890afd80709
SHA256 e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855
SHA512 cf83e1357eefb8bdf1542850d66d8007d620e4050b5715dc83f4a921d36ce9ce47d0d13c5d85f2b0ff8318d2877eec2f63b931bd47417a81a538327af927da3e

C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad\settings.dat

MD5 9b008261dda31857d68792b46af6dd6d
SHA1 e82dc88e2d1da2df7cb19d79a0346b9bb90d52b3
SHA256 9ac598d4f8170f7e475d84103aead9e3c23d5f2d292741a7f56a17bde8b6f7da
SHA512 78853091403a06beeec4998e2e3a4342111895ffd485f7f7cd367741a4883f7a25864cba00a6c86f27dc0c9ce9d04f08011ecc40c8ae9383d33274739ac39f10

C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Preferences

MD5 6a95d7c980d6e178acc644270e6320ba
SHA1 5b5a65efe80281fec26bc53256b4dfbae03647e2
SHA256 e3c9e215609d82ecab564eede66bc3c159480ff7a8e8fc3e5b18dab55712111e
SHA512 767f55d2fb3b86bd9a5ccc54d3339bfd903350a2924c63e93c3e8db489c8e2c50f3f4c9d1e70efde568dc115d4595281d913f4c8a6e35117981880f27f743647

C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Local State

MD5 f5d4e128988507ae8dcf3a4ef5c046fb
SHA1 ffff10b3d5d78e3215253a829f6dae3afe13a59d
SHA256 f575f83efb14b07a69f6146bfcb71a64523d3cf745dfacc9a24198f9900024a3
SHA512 5fc4a82b8a50f406eacc78c2debf0e709dd9b55ba51cef9717ee7bccb19fee27560b213b2ac191de7a15f7ffb294fb3049045a6afa413f350b0fe9865e3cba57

C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Preferences

MD5 7533cabfc118301058663ee3a24367ee
SHA1 075b01fbf085301f5dc790ca1dc1581b70377f7a
SHA256 5eac39e0f37ed053f6d00045396851084cfa1cc29a24add9b86464ec12016ae3
SHA512 4928c0f208d307fa29832de1bdb112be80bf1aeb74fc1cc036ee52d82e1ef086565c9b0caa618f86060c46aee5603846a19b060cd25d1f0acde665bcfc083086

C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index

MD5 06e6293f6ba74bae426ed17cadccb7a5
SHA1 ca3d2ea50785d0916a7e39d70c3e1a196723966d
SHA256 485ae8664a2402db4c4e12e6cee0656dabe0c3ca4001f098cc4e69d8d7fd9a86
SHA512 ff77f9e9b9cd89f1b444ccd5a3dbc2a5fb60d6b7f9b950d1a93ebf1b15f718412f82f4036974d7c65aa248cfa22f4b4abd9484ed60e3c6a69eefef5379228171

C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\data_reduction_proxy_leveldb\CURRENT

MD5 6752a1d65b201c13b62ea44016eb221f
SHA1 58ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA256 0861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA512 9cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389

C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Preferences

MD5 f904b121e4b7e5c31c914439a97a9020
SHA1 28b825ea73b4dac383aed7353d1fdc2e61414e21
SHA256 404c09ae012ff8ae5a242f167c248118e087b969150221c923ee3688ef53190a
SHA512 a5385da89f4f43dd6386616cdbe78ef8bc4ffacd63e49af6f3b5413347be05222ca6fd910fb4704328d52d50dbaf9b2a13cf6660bc3ed53bbab6205fe6c70a84

C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Network Persistent State

MD5 20f4202ed872e170b07ff1f8fe5fd736
SHA1 e69b5f04dccb9ff3e985384f518ece01b477b220
SHA256 b9e7f65b61d311d7b6eef0b3afced44ce26ebc8a2af253a087988ac89f64ad60
SHA512 94cf401cde861f3959b40a6f8f3c89f08cc5524eee40ae2aae18714248bdc9676f71b73d65b27b12d8124f89c6b8b5a80414d8def34c6bd0e92887baa44fccc1