Malware Analysis Report

2024-10-19 02:45

Sample ID 240826-lq333sxbqd
Target c2be73a4f95f55f8a6f9fef206b3d64b_JaffaCakes118
SHA256 f3aa57e02f7cc007be102d7245d2f268a04ae186a579992a4e0cf311a984d55e
Tags
socgholish discovery downloader
score
10/10

Table of Contents

Analysis Overview

MITRE ATT&CK

Enterprise Matrix V15

Analysis: static1

Detonation Overview

Signatures

Analysis: behavioral1

Detonation Overview

Command Line

Signatures

Processes

Network

Files

Analysis: behavioral2

Detonation Overview

Command Line

Signatures

Processes

Network

Files

Analysis Overview

score
10/10

SHA256

f3aa57e02f7cc007be102d7245d2f268a04ae186a579992a4e0cf311a984d55e

Threat Level: Known bad

The file c2be73a4f95f55f8a6f9fef206b3d64b_JaffaCakes118 was found to be: Known bad.

Malicious Activity Summary

socgholish discovery downloader

SocGholish

System Location Discovery: System Language Discovery

Browser Information Discovery

Suspicious use of SetWindowsHookEx

Suspicious use of WriteProcessMemory

Enumerates system info in registry

Suspicious use of FindShellTrayWindow

Suspicious behavior: EnumeratesProcesses

Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary

Suspicious use of SendNotifyMessage

Modifies Internet Explorer settings

MITRE ATT&CK

Analysis: static1

Detonation Overview

Reported

2024-08-26 09:45

Signatures

N/A

Analysis: behavioral1

Detonation Overview

Submitted

2024-08-26 09:45

Reported

2024-08-26 09:47

Platform

win7-20240704-en

Max time kernel

137s

Max time network

150s

Command Line

"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\c2be73a4f95f55f8a6f9fef206b3d64b_JaffaCakes118.html

Signatures

SocGholish

downloader socgholish

System Location Discovery: System Language Discovery

discovery
Description Indicator Process Target
Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE N/A

Modifies Internet Explorer settings

adware spyware
Description Indicator Process Target
Set value (int) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" C:\Program Files\Internet Explorer\iexplore.exe N/A
Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage C:\Program Files\Internet Explorer\iexplore.exe N/A
Set value (data) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 403590bb9cf7da01 C:\Program Files\Internet Explorer\iexplore.exe N/A
Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\DomainSuggestion C:\Program Files\Internet Explorer\iexplore.exe N/A
Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\SearchScopes C:\Program Files\Internet Explorer\iexplore.exe N/A
Set value (int) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" C:\Program Files\Internet Explorer\iexplore.exe N/A
Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing C:\Program Files\Internet Explorer\iexplore.exe N/A
Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\InternetRegistry C:\Program Files\Internet Explorer\iexplore.exe N/A
Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch C:\Program Files\Internet Explorer\iexplore.exe N/A
Set value (str) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" C:\Program Files\Internet Explorer\iexplore.exe N/A
Set value (str) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE N/A
Set value (int) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "430827382" C:\Program Files\Internet Explorer\iexplore.exe N/A
Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\IETld\LowMic C:\Program Files\Internet Explorer\iexplore.exe N/A
Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\IntelliForms C:\Program Files\Internet Explorer\iexplore.exe N/A
Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\LowRegistry C:\Program Files\Internet Explorer\iexplore.exe N/A
Set value (int) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" C:\Program Files\Internet Explorer\iexplore.exe N/A
Set value (data) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 C:\Program Files\Internet Explorer\iexplore.exe N/A
Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\GPU C:\Program Files\Internet Explorer\iexplore.exe N/A
Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser C:\Program Files\Internet Explorer\iexplore.exe N/A
Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Main C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE N/A
Set value (data) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 C:\Program Files\Internet Explorer\iexplore.exe N/A
Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Main C:\Program Files\Internet Explorer\iexplore.exe N/A
Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain C:\Program Files\Internet Explorer\iexplore.exe N/A
Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Toolbar C:\Program Files\Internet Explorer\iexplore.exe N/A
Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery C:\Program Files\Internet Explorer\iexplore.exe N/A
Set value (data) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000bb7c5835718279428690b074aa627b700000000002000000000010660000000100002000000095adadd4b936be6723e5ae666675b10a9480296714a1641813f113137b8738e4000000000e800000000200002000000085eb669d7439c3c1dd2abd7e85f9421726ba452c1ebfbfa846668c3adc574dea200000006f0ca6c3d070f2dad957497168634bea7323c0396e21132e1e29ee0c5dba145440000000d7cdb190f864851925c633b7310790171223d3d1584a278652b04bdbb2876310b4307e1d835cfc71b31b3161be174e188331087e4444809404a5ca15e32b83f6 C:\Program Files\Internet Explorer\iexplore.exe N/A
Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic C:\Program Files\Internet Explorer\iexplore.exe N/A
Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage C:\Program Files\Internet Explorer\iexplore.exe N/A
Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\PageSetup C:\Program Files\Internet Explorer\iexplore.exe N/A
Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE N/A
Set value (int) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" C:\Program Files\Internet Explorer\iexplore.exe N/A
Set value (int) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" C:\Program Files\Internet Explorer\iexplore.exe N/A
Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Zoom C:\Program Files\Internet Explorer\iexplore.exe N/A
Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive C:\Program Files\Internet Explorer\iexplore.exe N/A
Set value (int) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{E39552F1-638F-11EF-BD32-F6C828CC4EA3} = "0" C:\Program Files\Internet Explorer\iexplore.exe N/A
Set value (str) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" C:\Program Files\Internet Explorer\iexplore.exe N/A

Suspicious use of FindShellTrayWindow

Description Indicator Process Target
N/A N/A C:\Program Files\Internet Explorer\iexplore.exe N/A

Processes

C:\Program Files\Internet Explorer\iexplore.exe

"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\c2be73a4f95f55f8a6f9fef206b3d64b_JaffaCakes118.html

C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE

"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2324 CREDAT:275457 /prefetch:2

Network

Country Destination Domain Proto
US 8.8.8.8:53 apis.google.com udp
US 8.8.8.8:53 resources.blogblog.com udp
US 8.8.8.8:53 1.bp.blogspot.com udp
US 8.8.8.8:53 www.blogger.com udp
US 8.8.8.8:53 3.bp.blogspot.com udp
US 8.8.8.8:53 4.bp.blogspot.com udp
US 8.8.8.8:53 2.bp.blogspot.com udp
US 8.8.8.8:53 www.linkwithin.com udp
US 8.8.8.8:53 blogbooster.pl udp
US 8.8.8.8:53 i60.tinypic.com udp
US 8.8.8.8:53 www.thebloggerprogramme.co.uk udp
US 8.8.8.8:53 images50.fotosik.pl udp
FR 142.250.179.105:443 www.blogger.com tcp
FR 142.250.179.97:443 2.bp.blogspot.com tcp
FR 142.250.179.97:443 2.bp.blogspot.com tcp
FR 142.250.179.105:443 www.blogger.com tcp
FR 142.250.179.97:443 2.bp.blogspot.com tcp
FR 142.250.179.105:443 www.blogger.com tcp
FR 142.250.179.97:443 2.bp.blogspot.com tcp
FR 142.250.179.105:443 www.blogger.com tcp
FR 142.250.179.97:443 2.bp.blogspot.com tcp
FR 142.250.179.105:443 www.blogger.com tcp
FR 142.250.179.97:443 2.bp.blogspot.com tcp
FR 142.250.179.97:80 2.bp.blogspot.com tcp
FR 142.250.179.97:443 2.bp.blogspot.com tcp
FR 142.250.179.97:80 2.bp.blogspot.com tcp
FR 142.250.179.97:443 2.bp.blogspot.com tcp
FR 142.250.179.97:80 2.bp.blogspot.com tcp
SG 118.139.179.30:80 www.linkwithin.com tcp
US 172.67.191.62:80 blogbooster.pl tcp
US 172.67.191.62:80 blogbooster.pl tcp
FR 142.250.178.142:443 apis.google.com tcp
SG 118.139.179.30:80 www.linkwithin.com tcp
FR 142.250.178.142:443 apis.google.com tcp
FR 142.250.179.97:80 2.bp.blogspot.com tcp
FR 142.250.179.97:443 2.bp.blogspot.com tcp
FR 142.250.179.97:80 2.bp.blogspot.com tcp
DE 23.88.16.121:80 images50.fotosik.pl tcp
DE 23.88.16.121:80 images50.fotosik.pl tcp
US 8.8.8.8:53 www.thebloggerprogramme.co.uk udp
US 172.67.191.62:443 blogbooster.pl tcp
DE 23.88.16.121:443 images50.fotosik.pl tcp
US 8.8.8.8:53 c.pki.goog udp
US 8.8.8.8:53 o.pki.goog udp
FR 216.58.214.163:80 o.pki.goog tcp
FR 216.58.214.163:80 o.pki.goog tcp
FR 216.58.214.163:80 o.pki.goog tcp
FR 216.58.214.163:80 o.pki.goog tcp
FR 216.58.214.163:80 o.pki.goog tcp
FR 216.58.214.163:80 o.pki.goog tcp
FR 216.58.214.163:80 o.pki.goog tcp
FR 216.58.214.163:80 o.pki.goog tcp
US 8.8.8.8:53 o.pki.goog udp
FR 216.58.214.163:80 o.pki.goog tcp
FR 216.58.214.163:80 o.pki.goog tcp
FR 216.58.214.163:80 o.pki.goog tcp
FR 216.58.214.163:80 o.pki.goog tcp
FR 216.58.214.163:80 o.pki.goog tcp
FR 216.58.214.163:80 o.pki.goog tcp
FR 216.58.214.163:80 o.pki.goog tcp
FR 172.217.20.174:80 www.google-analytics.com tcp
FR 172.217.20.174:80 www.google-analytics.com tcp
US 8.8.8.8:53 www.facebook.com udp
DE 157.240.27.35:443 www.facebook.com tcp
DE 157.240.27.35:443 www.facebook.com tcp
FR 142.250.178.142:443 apis.google.com tcp
FR 142.250.178.142:443 apis.google.com tcp
US 8.8.8.8:53 developers.google.com udp
FR 142.250.179.110:80 developers.google.com tcp
FR 142.250.179.110:80 developers.google.com tcp
US 8.8.8.8:53 accounts.google.com udp
IE 74.125.193.84:443 accounts.google.com tcp
IE 74.125.193.84:443 accounts.google.com tcp
FR 142.250.179.110:80 developers.google.com tcp
FR 142.250.179.110:443 developers.google.com tcp
FR 142.250.179.110:443 developers.google.com tcp
FR 142.250.179.110:443 developers.google.com tcp
US 8.8.8.8:53 ssl.gstatic.com udp
US 8.8.8.8:53 lh3.googleusercontent.com udp
FR 142.250.178.129:443 lh3.googleusercontent.com tcp
FR 142.250.178.129:443 lh3.googleusercontent.com tcp
FR 142.250.178.129:443 lh3.googleusercontent.com tcp
FR 142.250.178.129:443 lh3.googleusercontent.com tcp
FR 142.250.178.129:443 lh3.googleusercontent.com tcp
FR 142.250.178.129:443 lh3.googleusercontent.com tcp
US 8.8.8.8:53 static.xx.fbcdn.net udp
US 8.8.8.8:53 scontent.xx.fbcdn.net udp
DE 157.240.27.27:443 scontent.xx.fbcdn.net tcp
DE 157.240.27.27:443 scontent.xx.fbcdn.net tcp
DE 157.240.27.27:443 scontent.xx.fbcdn.net tcp
DE 157.240.27.27:443 scontent.xx.fbcdn.net tcp
DE 157.240.27.27:443 scontent.xx.fbcdn.net tcp
DE 157.240.27.27:443 scontent.xx.fbcdn.net tcp
DE 157.240.27.27:443 scontent.xx.fbcdn.net tcp
DE 157.240.27.27:443 scontent.xx.fbcdn.net tcp
FR 142.250.178.129:443 lh3.googleusercontent.com tcp
FR 142.250.178.129:443 lh3.googleusercontent.com tcp
FR 142.250.179.110:443 developers.google.com tcp
FR 142.250.179.110:443 developers.google.com tcp
FR 142.250.179.110:443 developers.google.com tcp
US 8.8.8.8:53 developer.android.com udp
US 8.8.8.8:53 gstatic.com udp
FR 172.217.20.206:443 developer.android.com tcp
FR 172.217.20.206:443 developer.android.com tcp
FR 216.58.214.67:443 gstatic.com tcp
FR 216.58.214.67:443 gstatic.com tcp
FR 216.58.214.67:443 gstatic.com tcp
FR 216.58.214.67:443 gstatic.com tcp
FR 172.217.20.206:443 developer.android.com tcp
FR 172.217.20.206:443 developer.android.com tcp
FR 142.250.179.110:443 developers.google.com tcp
FR 142.250.179.110:443 developers.google.com tcp
FR 216.58.214.67:443 gstatic.com tcp
FR 216.58.214.67:443 gstatic.com tcp
FR 142.250.179.110:443 developers.google.com tcp
FR 142.250.179.110:443 developers.google.com tcp
FR 142.250.179.110:443 developers.google.com tcp
FR 216.58.214.67:443 gstatic.com tcp
FR 216.58.214.67:443 gstatic.com tcp
US 8.8.8.8:53 crl.microsoft.com udp
GB 2.19.252.143:80 crl.microsoft.com tcp
IE 74.125.193.84:443 accounts.google.com tcp
IE 74.125.193.84:443 accounts.google.com tcp
US 204.79.197.200:443 ieonline.microsoft.com tcp
US 204.79.197.200:443 ieonline.microsoft.com tcp
US 8.8.8.8:53 www.microsoft.com udp
US 8.8.8.8:53 www.microsoft.com udp
US 204.79.197.200:443 ieonline.microsoft.com tcp
IE 74.125.193.84:443 accounts.google.com tcp
IE 74.125.193.84:443 accounts.google.com tcp

Files

C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\24BD96D5497F70B3F510A6B53CD43F3E_3A89246FB90C5EE6620004F1AE0EB0EA

MD5 11d0005e0b8794ab4aad0542756cbfe7
SHA1 7b8418bec44685422de5c662ac7a6d95d3c04a35
SHA256 721e5b826a6ca850601660da35945f26f901ac73bd9f707c93faa6b4274f9d08
SHA512 be28b411d7bdb72d96309bb44930be33db7898078cbcf10ef6fded144731748b7498b19c91cba5f4ac069fa6de0d250c495f4bceaf4f114f522c3947793ec249

C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\24BD96D5497F70B3F510A6B53CD43F3E_3A89246FB90C5EE6620004F1AE0EB0EA

MD5 f149b18f43945f4cfce8978442367fa2
SHA1 f443c4b1da8ab682cd2f0ce4a913fec19b9e9c4f
SHA256 f955cd5ec1369c221f780be17fe700e150c87d6f25d65def15f21299bacec026
SHA512 71ae51b8cfd7dbe929d49d4f9c39f24140073441e81b2efc78662359817b39dd6a421434274d5ba8c610ffb4286ca600ee3ac869f3957df33e8bbebead74459c

C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\24BD96D5497F70B3F510A6B53CD43F3E_3A89246FB90C5EE6620004F1AE0EB0EA

MD5 8431ea577fb0bb559404f473ef2aea8c
SHA1 cbf54d054ef09381265ec32f903583aa6a152d94
SHA256 20e463222abce002476928b8c1a346230bd7ee550bdd15b9a2eeb28944ba1bda
SHA512 c85f1af6637802853f97d2862d1a26100dffbd497c3603d84aacb34df6a54b201b29445b905cd2c8e320cc513fec9e32f30c0f503e59b6222d362fc868e2bdc6

C:\Users\Admin\AppData\Local\Temp\CabA382.tmp

MD5 49aebf8cbd62d92ac215b2923fb1b9f5
SHA1 1723be06719828dda65ad804298d0431f6aff976
SHA256 b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512 bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b

C:\Users\Admin\AppData\Local\Temp\TarA3D3.tmp

MD5 4ea6026cf93ec6338144661bf1202cd1
SHA1 a1dec9044f750ad887935a01430bf49322fbdcb7
SHA256 8efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA512 6c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b

C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\24BD96D5497F70B3F510A6B53CD43F3E_3A89246FB90C5EE6620004F1AE0EB0EA

MD5 88dc470d47595e04e7f026b7b54f587a
SHA1 caa60645c9585eefeef8b848456fbf1f27d58c4b
SHA256 020ed9af260217dad51861d1238043e760f0c04b3c9552316b8adb12b0a92267
SHA512 2988d74f5bde6551f9ec68e02e9e5be9ccfa0be714e088c0eb61b632d12db8e659ae71faa7cde8f211a4c8fab022f6da21db1dbec6e97a1682cde76f89564f1d

C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\05DDC6AA91765AACACDB0A5F96DF8199

MD5 faf2d26a9c218a7fddc5dd0941cd797d
SHA1 66a317b2e5ac61ddf55479a9b70b6ba4719a1ee0
SHA256 e1bddb9cc9ded1cbb5b4a07ecd10063c77bddfdb963c8e26dd7079afed517a68
SHA512 62984423768f915b83f59fc099e6899a36f1b20cb80edde356747cc85f55e9a1c526c9d289ebfcd60dd5ca04e25fb8953280a4e29eb47df9e273aa42c0234a4c

C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\05DDC6AA91765AACACDB0A5F96DF8199

MD5 c7831d3e5d10ec28ff732fc7d2ef89de
SHA1 9cb9fad62126d6a9dc780a8e527aa1fbe7660955
SHA256 3d8d8256d3c8662432bda1999193baefb1e53e8001541c0d3818c309307dd5b5
SHA512 cdf030c8078308e071a85e3fbe607226d9576c348f6cedc17f8b99f8d473285099e3c16adfc3c7f9e07a56e085005af42bdda389b70770973dd75deb63b9ee27

C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\05DDC6AA91765AACACDB0A5F96DF8199

MD5 e935bc5762068caf3e24a2683b1b8a88
SHA1 82b70eb774c0756837fe8d7acbfeec05ecbf5463
SHA256 a8accfcfeb51bd73df23b91f4d89ff1a9eb7438ef5b12e8afda1a6ff1769e89d
SHA512 bed4f6f5357b37662623f1f8afed1a3ebf3810630b2206a0292052a2e754af9dcfe34ee15c289e3d797a8f33330e47c14cbefbc702f74028557ace29bf855f9e

C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\05DDC6AA91765AACACDB0A5F96DF8199

MD5 fbcfcb7954208b7c00196d78e79f1f48
SHA1 53892b5bce02c3ae21124f8513b03f7470b46e05
SHA256 1839a5c1835184d141e1d79a9d95f3c7fe4b69f79cfde06ce8f54f917914b15f
SHA512 293d2ad36b2baa2638c5287008a15e5c99e897432b5e3e507b5f5dcecee6bc30e26b506c7c7ff5786414193070e8dcaadcfd83aa0e55b435a6cda978e90d9af7

C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

MD5 58f7d08c19cb8196b228d60c5e80df38
SHA1 e814a0d79650f59de92120bff05e3df267d7b78e
SHA256 233d210606fe57bb815aed0ca2417f6b3c1a29976c78eb78d0f33c43a6325764
SHA512 7f5956851c68c94cf4b92235d41e5ebb41a68492e66efae7eb43e37c3c2b61960b5fabd83863aa56d96ef34b21729de792af48edbb22d97d10dc113059b03c45

C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\B3513D73A177A2707D910183759B389B_147AB4536A182B9FCE88E194D59F3B22

MD5 1c33733bba48dc1da9b3b72aa0d51872
SHA1 4cf2d3db81647006bb5f53aa30b9db7bcaf0d655
SHA256 88c15dbd932201db0eb1903827bcc264ed9abc80bcf323f4c49080ffcacc58b0
SHA512 3336ea7634bf22b2989549b621596496308446595d0e3b291902767883d901106aa5ed405789047b83c5ab97ffa05db2afe0d987593cae37c5a90c9e1b680988

C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\C02877841121CC45139CB51404116B25_D71A94740B0CED76EBD7AAE2374CBE8B

MD5 eec971bc753cc9e2e6b53f9a70b2ec46
SHA1 180800efd67b9f2d3904d26b0f023d091f96e364
SHA256 16d1ff1fe2e5e3897c08895cb20db9b4238e04a9df8c241fcab508d4833ae57e
SHA512 03c8d025850682fbc950f9cc25fb270a87bb585417454bb5ba6ae38dc8ac7687cc2de83e44b1fd24e3fb591ef27393f7bdf156f83d2fd707570b3dc62dbc019b

C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

MD5 5e04a1f07fbe7ef8fee238ed86e9352a
SHA1 5e66326c1d9ae6a7bf4407a638f62e71603092ad
SHA256 beb79f5d9b383155ea4d538ea5e991f17eda1b0884addb589b461a77d515d012
SHA512 b0a68d26c94f583a69ee01dbdfd67aad285a24a881e7feef0004f2effe402cf3a7e4828250fa9ad75bae64d9231e9e00be2dae2d0f164bebcbbc2948aee7c4b0

C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

MD5 b84a595d74c6773d9ff91b1deb7f92f6
SHA1 72dc9c5cf16accf5bf88ecf041ed8cfa5102eb4c
SHA256 ec1dfa1c43acf597db8d1121b8808e0bc11db67d1b5b2ef671731d84af2e7dce
SHA512 62c386eb798995d89eabf9ce04af97753faa5ac98e0ad3f2f032ec2950d3d58fbdd53d7adbdf4e973cd9e270c93b1105b4e8131beefd478865eb2abbdf6e8244

C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\XWMUP5AI\plusone[1].js

MD5 950e589a42fd435b2b6daacbdbbf877c
SHA1 78dc5743d4b541018adafe3a2b49b6be5f1c7944
SHA256 c5e3093bd5e8a58f04846013ead66d36ca25457a0475c9c72d8cde60e598fc0e
SHA512 cf2aa139ee4c2f79ad5dbca6239e4d5179a21f54cf2c3672c45915b3282bda5f5fa702c241d3b5c02805cdf1b48427d34e86b627904055a46ff6ef11be2b2104

C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

MD5 e1ad7faba2ce3014fbdf074c58880cf3
SHA1 d16b8f628ad1e1cfc2e4905b80ced7ab52f6a8c6
SHA256 c663e9e2dc83b8d37eaa8130e16f401ecbcfecf20fb0cef2295d244b149a3eb1
SHA512 e89cc0d9e2a87674c1722befd26df0c92e60dd0ac75eae986d0d047740cc42e24520f97b27452bd11d5e866da89312f9ecd684dde9fc369da8fb33513622fa98

C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\VOGNAB2O\cb=gapi[1].js

MD5 cb98a2420cd89f7b7b25807f75543061
SHA1 b9bc2a7430debbe52bce03aa3c7916bedfd12e44
SHA256 bea369fc5bdd5b9b473441583c46b9939232bf1f98c1cedf6bc2241c4f5068d4
SHA512 49ccede4596d1e5640a9c8e8be333f9c18812d58f02b2b15adb54172df1387439e9dc5afc4ccd9d8f0f75f092318bed68d3cd577338e88ef4f9373de8a07c44e

C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\C02877841121CC45139CB51404116B25_9CE832D646FBAFC5C4ACFC523FDD84AD

MD5 3565d3104fa920a897ae5ae49dfbc5bc
SHA1 4704720303efd716199f5a53390a13549fc054f8
SHA256 e59be9994e30908914b4579c7625d33ab7473e0625c7f1db2c31782cd65c2e09
SHA512 e37a07d3cc4f9f66973f3f0cd9c1e119cd7ca42746045b6a2f0cdde3615a711a47a2423378f1dcfa6d6f620037b86b56a07a73eddf5a6b4d2f064f24efeb52f8

C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\VOGNAB2O\IOY1ZWUU.htm

MD5 6ba78b251712dc3c84fbfaaef0ee8772
SHA1 bbfbb9b43af801adcab89b0e77a0f667c92b4fcc
SHA256 24ebf953da36592c4ce05467f97720407f80f5732197ded440598e35ae3cc754
SHA512 5858acadaf9fa38cc0dd4df4abe46918c98fdceb8b892e37cacb090ec3d3493485a32fe59267343c713b78cb32309daa4e94ac88e2540b80997f968b624a4408

C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

MD5 5b01421aa65e7a320bed71f12a1849e3
SHA1 712b45439f75e20aedb974ea73044a8efdd4a6ee
SHA256 0e9983fdceddcbf2f805ce00fdb79dbec9f1f9a8a236004fc90c2afb2ca84849
SHA512 e4daab29df344e604b97603d136bf7bde34fad35f4c881b7ab540e61bfa220345efe7ba04c32de89ded967855464c4d42ee37489514d8de61f4cf4c4cc08e93e

C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

MD5 e40c779828f22b991e7af1ccf29a007d
SHA1 3421375ab49d997c55da7fb44f1bd4257aa01cef
SHA256 c8d0d7be462dc1670942b211a7e6ce6e995a5c40c91b186b13ede4f7ea7fcdb1
SHA512 1b738dcab4c55232ed1ec7712e25fab341038ed3e3ca9b52b5571a9bd08eef294c473a14b63343a7606701216f8c1793d79ff4c4d404584365919c8043a373ae

C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

MD5 ac52cf4ba34218ed99d1a544dfb56828
SHA1 f5462ee9c5fbbeaccabc8bc6e305c801c4c7d524
SHA256 b1297ba963c7ee8f68f3a5666f39c40815107bf72f1015fb6fece9153121e3f5
SHA512 a80b9c508b7456099ff9eec76712009f9a2a7b0ab6b472debe9333e2073eaa77386127ed4754cc43e8ffbcf9d146b804c837a97f9607268d39ead1bdaa4140a4

C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

MD5 ac1b60740c84c82759e6f84f4ed483be
SHA1 6e776a76c2bff572f41e56387a4cbb0cb8d57e75
SHA256 faa40b4244e4307a5f7faae150d6044bf28263de81976fc3c19d7e03faf41849
SHA512 c24b82cfa25dc0092058fa3bb90b45c2cd5d8a20f2ca01152ec9dd6f5ab370223753f4d3b40fe34da5f746eeb16d5b9d629cebadc33460beb6216cacdfa4ae17

C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

MD5 a104faa551858931196123b388cdedee
SHA1 b257bace9dd4463705d7b593a93dd41ed92b89de
SHA256 99c113858d1e005f203f5fefb9e932fdb04a04eb89687fa8d7ba72349706b594
SHA512 9c225c6a08a5b8dc4b12d392aa7c14035a722147e7d84c40f8c9edf074168e62cb69d4bdffc6994696b81a38237bb54a01c0a0af034d700ec24e644bc3dd9a4d

C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

MD5 68df3affa1f036914de43328df1bf5df
SHA1 d991d5d75be8504f27664f16c2fa768d2f55ec01
SHA256 dca35e47502c2d09dc8f4c96f95a652a9c029e05ea604463ef45260265277f12
SHA512 075078d3bce1a7049b7d69423f1dbe35ef6b250b31cc75e8b333c126d61bcb5406c313d667bb67f4c7a77d3b8eb68ad75524775bde86d75033466574b5b112ee

C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

MD5 93cf60e2563a59138ac29ccee6487194
SHA1 43a499af8c97532099f1307c7119e0bade054190
SHA256 aff93557934acaadd47e24af4ea1d96c4d354ab14e1cdb0566d8911b6e93dc39
SHA512 9bdd243634bad6d1c1c8ff0aa2cf1940fa13c8f42fff58fe09df39d9a2a800c64a01971ab88a89c93a114595c1e3596edd37db395a1b561285fd3fe5f61a8875

C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

MD5 9cbce4831074299cf2bc6675e3d6a371
SHA1 07fd76985fe9e02beb7841a4ac2ac21668262431
SHA256 d906d5a6bf9e08b9cb12a2e691a1ef1d988941e82ffd94210141312a77d09499
SHA512 b56ae0319bc09ba6f63ed24a1df7885cefc73da304550de8b659be7f9486c4ab980cc4c0a317d946a7e96881d08d93560df8ebea02606e6cfb71e98571ef3ef3

C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

MD5 2752d6b336dc6d24270590268d600c52
SHA1 eb245e83e5218c6135631908a557c3417d97ab17
SHA256 7ccd58967d08c4ba11199b6374a1647d78eee3bf3a7354eb484d28d5ce0ec474
SHA512 7596d0890f4bbc731b2f066b687bee8db001307eed13027e75e710f93110d253720b543702ff8fc078748010bf6f9f927b27a1ae0147ea568587a824035ff2f2

C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

MD5 3427d06bc5835cb86bc095a139b634a7
SHA1 7e32511ffaf5cbaf640695d63236b27f628565b8
SHA256 b3bd92e53338cab6d3af7149a7cf893eb4cc893585404b157a6e173d4cda1911
SHA512 3d9ad91feeccba3df983e05c8812b0cabef536ea6898b1d8826bcb0b95291b18f0f74fa2b4dc69f5d8a14141aaa73bd276e6ee9e38bf5649a93e13cc6d1b0fef

C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\XWMUP5AI\1380534674-postmessagerelay[1].js

MD5 c1d4d816ecb8889abf691542c9c69f6a
SHA1 27907b46be6f9fe5886a75ee3c97f020f8365e20
SHA256 01a956fa0b3ea8cb90d7032608512bc289c4170bf92759352e40062d5be2946f
SHA512 f534f057e46998bd1ff2c423ad2cf04a880c4a5259e95aee5c6ae34ce7121ccd07ad1bce5d4c3a51ad04f7411b0625da78808326b13d2aeefec502988e113113

C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\VOGNAB2O\rpc_shindig_random[1].js

MD5 9e5f0b21584389dc1c7b5da4a900879f
SHA1 191b84e0f5644398ba99e0aa141a6778c14b83bf
SHA256 3e21bdafa913fa25276358db1269238db3012ffd8748626cdad442f838e890e3
SHA512 c1720a420df680bcc46625355ed6d5c35ae280a813692a0fa293f3ba113a023808a781f1b8c9dfeb3ffba29606e1f4bb4be4233983089602e2d2c20786fb0427

C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

MD5 bc476e5b492dbf8a54bd4e85cbaa1d91
SHA1 c42cc2feacc40436fc685348680271c13f63531a
SHA256 69903c9dfbe6e75ce2a1693ab67a86e58748a317cedb8660bb129311bfcd80cb
SHA512 eaabb2c6ab83edb9f7d92847ab59058ff8acb91def5eadae86742acfc61db422b1ab248be7cb323a454b41500dee42d49483932f7375169edc9a317c5743f7db

C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

MD5 608b2e081f170d48629efb422c732891
SHA1 e452e950de85bac3c356719c8d13178ed4f5d98c
SHA256 e8e3b893022be8b8b9e80d270dcee304de95020d94cb968c8f8d101f5d039fae
SHA512 c393ccee691d00270d35345b75d49181649a78b433960daec87617f4e7d6ecc07e34f8ec5560f6c524434f78f90e4cc3fecc8c5e1382ff05e727f3385478c1d8

C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\F0ACCF77CDCBFF39F6191887F6D2D357

MD5 a266bb7dcc38a562631361bbf61dd11b
SHA1 3b1efd3a66ea28b16697394703a72ca340a05bd5
SHA256 df545bf919a2439c36983b54cdfc903dfa4f37d3996d8d84b4c31eec6f3c163e
SHA512 0da8ef4f8f6ed3d16d2bc8eb816b9e6e1345dfe2d91160196c47e6149a1d6aedaafadcefd66acdea7f72dcf0832770192ceac15b0c559c4ccc2c0e5581d5aefc

C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\F0ACCF77CDCBFF39F6191887F6D2D357

MD5 c2c5bf77dcfc394ff150323ba35f44d8
SHA1 5ff64bd8985ff19a603c35a9b7f19ff01533cd15
SHA256 fc07cced6f8561c9f8de7fdcf3583c2d5711ec3e42639bada3061f57739e25b3
SHA512 22c940ec9600dc2364c1bce4a5b255eb6fc0b50142c596b38fb82854e70c87b10d85e3aa64b8b716b5389ce94419ba78e7d5f6cb0e6fc07fe90d7ec7e8c0e3a0

C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

MD5 85b7badfb8ee8699f78ab078e1afc96a
SHA1 4c35565c6d89381b81a72444e67f99ed493c0837
SHA256 8c215f388263ce126385b6b36cab6366592d3466235d0bf3d16d9afff9c5cf15
SHA512 66f108299f7e6357be28f8e55cc34159e668b7b85bccac032002b54df3c74fceb64d0bba0259fbf46a834389ef1d2143769fa52e7300398d421fcb0cfcc859fe

C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

MD5 d85ca566050fc1b2d657bddd66847053
SHA1 06809937f8d8d638c6b9db5f9b7a354e1eeed7bb
SHA256 1293f35d52ef887342a3e3ccb36f2b74920b1f3d21b4072b98e8c65820f315f1
SHA512 6a37f2b182a9268ee52ad3d604780843753cba2c88249b8b5eb9f6acee5392a0e93c5e615489ab46ecf25fbaeca2ae98bff13b2f326a4db5e31dacd78847018e

C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

MD5 af376218706c23bc0554c862418922e8
SHA1 aeff6b0c61b99438ca37cb1c3181123e31951974
SHA256 a4fe2582631c9486c73d054aa621ccd83a3a3b3b37f509fe670a9c0f8f0a6bd8
SHA512 df1e74db689a3610fda2e8d58e05ece2e649881271069e27437993d5ef6d56e933f5a2a22fc528187ca6ef4da30ab69edaec87657601f77d728bc5e727fd2d87

C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

MD5 08316a51dbf09c98cfe2bf8699c76eda
SHA1 a62936ae7ec2893f87e1657195088de90f061ea6
SHA256 052413371d7acc0cc2a87222c5caed5267475f4a53188c16c6196719eadca9df
SHA512 842aa598142c9b9d9c94d9499f928f9dc0ff56f92ac0d46621166e89eeb49b449898a9944cea91861a357d5bac845792354e2f630967c79454ffbb5875df877f

C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

MD5 12d80d6efc893a463da177b4ed9c9ccd
SHA1 29d56985961a6969db81c139ff25ca730eec5000
SHA256 583585e3dcedfc72b2698b92d8a7c1bb689c681d34be8eacc137c8aa116eb216
SHA512 31b5be1730aa2b4528436535fbfff76fcf1a4b8d6c5b5df5c3d088649f33ac71854bd81a54844b9124a4af32feb50614426334ec4cfd31a8799db499824922bc

C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\3C428B1A3E5F57D887EC4B864FAC5DCC

MD5 e4a68ac854ac5242460afd72481b2a44
SHA1 df3c24f9bfd666761b268073fe06d1cc8d4f82a4
SHA256 cb3ccbb76031e5e0138f8dd39a23f9de47ffc35e43c1144cea27d46a5ab1cb5f
SHA512 5622207e1ba285f172756f6019af92ac808ed63286e24dfecc1e79873fb5d140f1ceb7133f2476e89a5f75f711f9813a9fbb8fd5287f64adfdcc53b864f9bdc5

C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

MD5 e2df887b408a332c85b00e7c04f164f4
SHA1 d3fe415b87e960f039a2d123d8236caddbd42317
SHA256 46d9abbe8abf6e6ed690fc9eae994ed8af5dead78827b18ddf04cf8c3b2c7dcc
SHA512 c47386249cfa950d367bb2acf4bb8172a3ec74936cbc6f9de34442e80a4bfc9d805de6801d20c4018bb73ce20e5072fb3dd5dd61ecb535749db180e17528184b

C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\3C428B1A3E5F57D887EC4B864FAC5DCC

MD5 5eaef3695695d35a5f1a8fbce6367f05
SHA1 eaf97b2273ddb6c1994aab55659f8ffe872cf099
SHA256 a0431792a5238366a88e16f4eb5423b57d1efa9502c0f6826da739c784d457c0
SHA512 39cd16593c2e926c5a8c8b90ef9a06ad13aa3050a50152337696cc26c0afc3b1c2eebb3cf7fa3a5ee6252e5e9b1030aef8018fc4c72bd537ea34091dd6602634

C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

MD5 e5df33bec1bb06d5b57e39204d32e95e
SHA1 3fe702f4cccbeb5ab39facfedf5a4a3f29cfcb19
SHA256 998aa44cb91765c47449c47851646e889aa6bf400daae16e071fe7aa1aeb58e3
SHA512 0741ce4caf428e74d9fbf65333e8b2a4b89c73068b7c734fe935c1032240530eb647088c2dd5f57c7f73b42282d29205722ed5308288792e7b6f8e169e1016a4

C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

MD5 be4a7b4badc7805eaa620f819a775295
SHA1 ee8c1870d5a4415abf48cd058bd36eb33d051359
SHA256 5dda9d65f64fa1d2f817ed8697918a2ba75e4e988176465940754714c04bfbd1
SHA512 678266724f39a598d1f2c0601d8ecbf637c5e477cc892fa72010c81bb685736af555a1b2b5a9f63be76e0a8e5d5cfc6446330867161b1ad00ba9b96cdbf93bc1

Analysis: behavioral2

Detonation Overview

Submitted

2024-08-26 09:45

Reported

2024-08-26 09:47

Platform

win10v2004-20240802-en

Max time kernel

145s

Max time network

148s

Command Line

"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\c2be73a4f95f55f8a6f9fef206b3d64b_JaffaCakes118.html

Signatures

Browser Information Discovery

discovery

Enumerates system info in registry

Description Indicator Process Target
Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe N/A
Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe N/A
Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe N/A

Suspicious use of FindShellTrayWindow

Description Indicator Process Target
N/A N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe N/A
N/A N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe N/A
N/A N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe N/A
N/A N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe N/A
N/A N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe N/A
N/A N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe N/A
N/A N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe N/A
N/A N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe N/A
N/A N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe N/A
N/A N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe N/A
N/A N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe N/A
N/A N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe N/A
N/A N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe N/A
N/A N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe N/A
N/A N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe N/A
N/A N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe N/A
N/A N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe N/A
N/A N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe N/A
N/A N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe N/A
N/A N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe N/A
N/A N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe N/A
N/A N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe N/A
N/A N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe N/A
N/A N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe N/A
N/A N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe N/A

Suspicious use of SendNotifyMessage

Description Indicator Process Target
N/A N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe N/A
N/A N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe N/A
N/A N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe N/A
N/A N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe N/A
N/A N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe N/A
N/A N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe N/A
N/A N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe N/A
N/A N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe N/A
N/A N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe N/A
N/A N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe N/A
N/A N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe N/A
N/A N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe N/A
N/A N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe N/A
N/A N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe N/A
N/A N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe N/A
N/A N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe N/A
N/A N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe N/A
N/A N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe N/A
N/A N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe N/A
N/A N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe N/A
N/A N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe N/A
N/A N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe N/A
N/A N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe N/A
N/A N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe N/A

Suspicious use of WriteProcessMemory

Description Indicator Process Target
PID 3064 wrote to memory of 2852 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 3064 wrote to memory of 2852 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 3064 wrote to memory of 4504 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 3064 wrote to memory of 4504 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 3064 wrote to memory of 4504 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 3064 wrote to memory of 4504 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 3064 wrote to memory of 4504 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 3064 wrote to memory of 4504 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 3064 wrote to memory of 4504 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 3064 wrote to memory of 4504 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 3064 wrote to memory of 4504 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 3064 wrote to memory of 4504 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 3064 wrote to memory of 4504 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 3064 wrote to memory of 4504 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 3064 wrote to memory of 4504 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 3064 wrote to memory of 4504 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 3064 wrote to memory of 4504 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 3064 wrote to memory of 4504 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 3064 wrote to memory of 4504 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 3064 wrote to memory of 4504 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 3064 wrote to memory of 4504 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 3064 wrote to memory of 4504 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 3064 wrote to memory of 4504 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 3064 wrote to memory of 4504 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 3064 wrote to memory of 4504 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 3064 wrote to memory of 4504 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 3064 wrote to memory of 4504 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 3064 wrote to memory of 4504 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 3064 wrote to memory of 4504 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 3064 wrote to memory of 4504 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 3064 wrote to memory of 4504 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 3064 wrote to memory of 4504 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 3064 wrote to memory of 4504 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 3064 wrote to memory of 4504 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 3064 wrote to memory of 4504 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 3064 wrote to memory of 4504 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 3064 wrote to memory of 4504 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 3064 wrote to memory of 4504 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 3064 wrote to memory of 4504 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 3064 wrote to memory of 4504 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 3064 wrote to memory of 4504 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 3064 wrote to memory of 4504 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 3064 wrote to memory of 1156 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 3064 wrote to memory of 1156 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 3064 wrote to memory of 1376 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 3064 wrote to memory of 1376 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 3064 wrote to memory of 1376 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 3064 wrote to memory of 1376 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 3064 wrote to memory of 1376 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 3064 wrote to memory of 1376 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 3064 wrote to memory of 1376 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 3064 wrote to memory of 1376 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 3064 wrote to memory of 1376 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 3064 wrote to memory of 1376 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 3064 wrote to memory of 1376 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 3064 wrote to memory of 1376 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 3064 wrote to memory of 1376 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 3064 wrote to memory of 1376 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 3064 wrote to memory of 1376 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 3064 wrote to memory of 1376 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 3064 wrote to memory of 1376 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 3064 wrote to memory of 1376 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 3064 wrote to memory of 1376 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 3064 wrote to memory of 1376 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe

Processes

C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe

"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\c2be73a4f95f55f8a6f9fef206b3d64b_JaffaCakes118.html

C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe

"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffd99e846f8,0x7ffd99e84708,0x7ffd99e84718

C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe

"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2100,323184810218184703,9453841702768853707,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2124 /prefetch:2

C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe

"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2100,323184810218184703,9453841702768853707,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2240 /prefetch:3

C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe

"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2100,323184810218184703,9453841702768853707,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2868 /prefetch:8

C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe

"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2100,323184810218184703,9453841702768853707,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3288 /prefetch:1

C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe

"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2100,323184810218184703,9453841702768853707,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3312 /prefetch:1

C:\Windows\System32\CompPkgSrv.exe

C:\Windows\System32\CompPkgSrv.exe -Embedding

C:\Windows\System32\CompPkgSrv.exe

C:\Windows\System32\CompPkgSrv.exe -Embedding

C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe

"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2100,323184810218184703,9453841702768853707,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4724 /prefetch:1

C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe

"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2100,323184810218184703,9453841702768853707,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5112 /prefetch:1

C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe

"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2100,323184810218184703,9453841702768853707,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5892 /prefetch:1

C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe

"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2100,323184810218184703,9453841702768853707,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=5068 /prefetch:2

Network

Country Destination Domain Proto
US 8.8.8.8:53 228.249.119.40.in-addr.arpa udp
US 8.8.8.8:53 www.blogger.com udp
US 8.8.8.8:53 apis.google.com udp
US 8.8.8.8:53 translate.google.com udp
FR 142.250.178.142:443 apis.google.com tcp
FR 142.250.179.105:443 www.blogger.com tcp
FR 142.250.179.105:443 www.blogger.com tcp
FR 172.217.20.206:445 translate.google.com tcp
US 8.8.8.8:53 www.linkwithin.com udp
SG 118.139.179.30:80 www.linkwithin.com tcp
FR 142.250.179.105:443 www.blogger.com udp
SG 118.139.179.30:80 www.linkwithin.com tcp
FR 142.250.178.142:443 apis.google.com udp
US 8.8.8.8:53 www.facebook.com udp
DE 157.240.27.35:443 www.facebook.com tcp
SG 118.139.179.30:80 www.linkwithin.com tcp
US 8.8.8.8:53 4.bp.blogspot.com udp
US 8.8.8.8:53 resources.blogblog.com udp
US 8.8.8.8:53 2.bp.blogspot.com udp
US 8.8.8.8:53 1.bp.blogspot.com udp
US 8.8.8.8:53 3.bp.blogspot.com udp
FR 142.250.179.97:443 3.bp.blogspot.com tcp
FR 142.250.179.97:443 3.bp.blogspot.com tcp
FR 142.250.179.97:443 3.bp.blogspot.com tcp
FR 142.250.179.97:443 3.bp.blogspot.com tcp
FR 142.250.179.97:80 3.bp.blogspot.com tcp
FR 142.250.179.97:443 3.bp.blogspot.com tcp
FR 142.250.179.105:443 resources.blogblog.com tcp
FR 142.250.179.97:443 3.bp.blogspot.com tcp
FR 142.250.179.97:443 3.bp.blogspot.com tcp
FR 142.250.179.97:443 3.bp.blogspot.com tcp
US 8.8.8.8:53 static.xx.fbcdn.net udp
FR 142.250.179.105:443 resources.blogblog.com udp
US 8.8.8.8:53 blogbooster.pl udp
US 8.8.8.8:53 136.32.126.40.in-addr.arpa udp
US 8.8.8.8:53 142.178.250.142.in-addr.arpa udp
US 8.8.8.8:53 105.179.250.142.in-addr.arpa udp
US 8.8.8.8:53 102.144.22.2.in-addr.arpa udp
US 8.8.8.8:53 35.27.240.157.in-addr.arpa udp
US 8.8.8.8:53 97.179.250.142.in-addr.arpa udp
US 8.8.8.8:53 30.179.139.118.in-addr.arpa udp
DE 157.240.27.27:443 static.xx.fbcdn.net tcp
DE 157.240.27.27:443 static.xx.fbcdn.net tcp
DE 157.240.27.27:443 static.xx.fbcdn.net tcp
DE 157.240.27.27:443 static.xx.fbcdn.net tcp
DE 157.240.27.27:443 static.xx.fbcdn.net tcp
DE 157.240.27.27:443 static.xx.fbcdn.net tcp
US 104.21.33.183:80 blogbooster.pl tcp
US 104.21.33.183:443 blogbooster.pl tcp
US 8.8.8.8:53 scontent.xx.fbcdn.net udp
FR 142.250.179.97:80 3.bp.blogspot.com tcp
US 8.8.8.8:53 i60.tinypic.com udp
FR 142.250.179.97:80 3.bp.blogspot.com tcp
FR 142.250.179.97:80 3.bp.blogspot.com tcp
US 8.8.8.8:53 www.thebloggerprogramme.co.uk udp
US 8.8.8.8:53 translate.google.com udp
US 8.8.8.8:53 images50.fotosik.pl udp
DE 23.88.16.121:80 images50.fotosik.pl tcp
FR 172.217.20.174:80 www.google-analytics.com tcp
FR 172.217.20.206:139 translate.google.com tcp
DE 23.88.16.121:443 images50.fotosik.pl tcp
US 8.8.8.8:53 a.nel.cloudflare.com udp
US 35.190.80.1:443 a.nel.cloudflare.com tcp
US 35.190.80.1:443 a.nel.cloudflare.com udp
US 8.8.8.8:53 27.27.240.157.in-addr.arpa udp
US 8.8.8.8:53 183.33.21.104.in-addr.arpa udp
US 8.8.8.8:53 121.16.88.23.in-addr.arpa udp
US 8.8.8.8:53 174.20.217.172.in-addr.arpa udp
US 8.8.8.8:53 1.80.190.35.in-addr.arpa udp
US 8.8.8.8:53 g.bing.com udp
US 150.171.27.10:443 g.bing.com tcp
N/A 224.0.0.251:5353 udp
US 8.8.8.8:53 241.150.49.20.in-addr.arpa udp
US 8.8.8.8:53 lh4.googleusercontent.com udp
US 8.8.8.8:53 developers.google.com udp
FR 142.250.179.110:80 developers.google.com tcp
FR 142.250.178.129:445 lh4.googleusercontent.com tcp
US 8.8.8.8:53 accounts.google.com udp
IE 74.125.193.84:443 accounts.google.com tcp
IE 74.125.193.84:443 accounts.google.com tcp
FR 142.250.179.110:443 developers.google.com tcp
US 8.8.8.8:53 ssl.gstatic.com udp
FR 216.58.214.163:443 ssl.gstatic.com tcp
US 8.8.8.8:53 lh3.googleusercontent.com udp
FR 142.250.178.129:443 lh3.googleusercontent.com tcp
FR 142.250.178.129:443 lh3.googleusercontent.com tcp
FR 142.250.178.129:443 lh3.googleusercontent.com tcp
FR 142.250.178.129:443 lh3.googleusercontent.com tcp
FR 142.250.178.129:443 lh3.googleusercontent.com tcp
FR 142.250.178.129:443 lh3.googleusercontent.com tcp
FR 142.250.178.129:443 lh3.googleusercontent.com udp
US 8.8.8.8:53 110.179.250.142.in-addr.arpa udp
US 8.8.8.8:53 84.193.125.74.in-addr.arpa udp
US 8.8.8.8:53 163.214.58.216.in-addr.arpa udp
US 8.8.8.8:53 129.178.250.142.in-addr.arpa udp
US 8.8.8.8:53 lh4.googleusercontent.com udp
FR 142.250.178.129:139 lh4.googleusercontent.com tcp
FR 142.250.179.110:443 developers.google.com udp
US 8.8.8.8:53 183.59.114.20.in-addr.arpa udp
US 8.8.8.8:53 206.23.85.13.in-addr.arpa udp
US 8.8.8.8:53 172.210.232.199.in-addr.arpa udp
US 8.8.8.8:53 zblogowani.pl udp
DE 168.119.119.221:445 zblogowani.pl tcp
US 8.8.8.8:53 zblogowani.pl udp
US 8.8.8.8:53 68.144.22.2.in-addr.arpa udp
FR 142.250.179.98:445 pagead2.googlesyndication.com tcp
FR 172.217.18.194:139 pagead2.googlesyndication.com tcp
US 8.8.8.8:53 88.156.103.20.in-addr.arpa udp
IE 74.125.193.84:443 accounts.google.com udp
US 8.8.8.8:53 themes.googleusercontent.com udp
FR 142.250.178.129:445 themes.googleusercontent.com tcp
US 8.8.8.8:53 themes.googleusercontent.com udp
FR 142.250.178.129:139 themes.googleusercontent.com tcp
US 8.8.8.8:53 11.227.111.52.in-addr.arpa udp
US 8.8.8.8:53 tse1.mm.bing.net udp
US 150.171.27.10:443 tse1.mm.bing.net tcp
US 150.171.27.10:443 tse1.mm.bing.net tcp
US 150.171.27.10:443 tse1.mm.bing.net tcp
US 150.171.27.10:443 tse1.mm.bing.net tcp
US 150.171.27.10:443 tse1.mm.bing.net tcp
US 8.8.8.8:53 205.47.74.20.in-addr.arpa udp
US 8.8.8.8:53 www.blogblog.com udp
FR 142.250.179.105:445 www.blogblog.com tcp
US 8.8.8.8:53 www.blogblog.com udp
US 8.8.8.8:53 www.google.com udp
FR 142.250.179.68:445 www.google.com tcp
US 8.8.8.8:53 www.google.com udp
IE 74.125.193.84:443 accounts.google.com udp

Files

C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad\settings.dat

MD5 847d47008dbea51cb1732d54861ba9c9
SHA1 f2099242027dccb88d6f05760b57f7c89d926c0d
SHA256 10292fa05d896a2952c1d602a72d761d34bc776b44d6a7df87e49b5b613a8ac1
SHA512 bd1526aa1cc1c016d95dfcc53a78b45b09dde4ce67357fc275ab835dbe1bb5b053ca386239f50cde95ad243a9c1bbb12f7505818577589beecc6084f7b94e83f

\??\pipe\LOCAL\crashpad_3064_XEQPVFQQCGWKSGVY

MD5 d41d8cd98f00b204e9800998ecf8427e
SHA1 da39a3ee5e6b4b0d3255bfef95601890afd80709
SHA256 e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855
SHA512 cf83e1357eefb8bdf1542850d66d8007d620e4050b5715dc83f4a921d36ce9ce47d0d13c5d85f2b0ff8318d2877eec2f63b931bd47417a81a538327af927da3e

C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad\settings.dat

MD5 f9664c896e19205022c094d725f820b6
SHA1 f8f1baf648df755ba64b412d512446baf88c0184
SHA256 7121d84202a850791c2320385eb59eda4d697310dc51b1fcd4d51264aba2434e
SHA512 3fa5d2c68a9e70e4a25eaac2095171d87c741eec2624c314c6a56f4fa390d6319633bf4c48b1a4af7e9a0451f346beced9693da88cfc7bcba8dfe209cbd1b3ae

C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\ac56d401-6be1-4aef-bcf0-ad14e67bbb6b.tmp

MD5 2ebaf8f991045e4654a0bd10a626bbcb
SHA1 6173815ca25a59cf216bc00a8edd44a914f858de
SHA256 a8c3cf1545e27807e7c4583b315e0fbbfe292d183b69005590cd33fa85de046f
SHA512 4f6e124414f0e4f014b9d1648160b7c8c17fb4ff2abc777f00c03ce8d22e12a84fd5d3c5aef81ff1a1444f5a5ea1d09d6e495362a4fad68f043c1c8d2e0efb85

C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Local State

MD5 e3e031b53a6f50a0738233e06b147129
SHA1 5720b114775d725e0a09adf707208d37109e4160
SHA256 df35a2628f0bef4f4389cd2b24b2d48f6b9175825c88db082c8ef8d241a7626b
SHA512 243c03df2aa2434cd575236dd5f3fc9fd28fa465cc5ab5592fe5f7c1508c9310432e68ff56de14a959a9e95badbc42d328d141af10787189c194661652a5546e

C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Preferences

MD5 1378638a44cd82d525e1ebd9250524da
SHA1 cc357a63bf38c57a691b3faf6bfd760930f3185d
SHA256 c32e7dcb2d65eccc427cfcac9c11dc0dd219d8211ed0c2a53971f37d00fc684e
SHA512 c95d9a424a2241b757fed9bc8531c91c19a7682248de9f277a6c555a8cd182948144cfd58cc96b900c9b1d63d5ed0f2849cb9278097afcb1dd32f9a62554de04

C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index

MD5 1887a40af4f0bcdc50d0e1d2d9599001
SHA1 0e81ea0e1f3c549270bce74837646b7f233042bd
SHA256 8b1177a5bd70e3cbb9f0d28dd52022c3f96570c4c5e626283742d15b369bc217
SHA512 55b6b8140335e05b2854d426e3e8c3dd8f00fdd1d5bf7e4797ca8b731c0bce48211a265902d01c28aa24abaaa6e2fee864a2817567badc93714ddddbf01b9f5d

C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Cache\f_00001a

MD5 c3a1bf5fbff5530f55ad9f9fa464f25c
SHA1 449a621b775cbe1d3ab69c54a0e18c0ccf6d6caa
SHA256 4ea6b3a39d794db93d1084770cc340272f8e5ffd5cd8d0c05c1f5841e5dc13e0
SHA512 75aa617b33be2eabe9f67166d14939d58abdb2396b9911dc7ba612130d2ba9adfc90a3cc9b6de4dd6cf8731c90f2ca74b7f9cfaf4a9d0bcbf90d03c907e45a54

C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Preferences

MD5 bc32aed5dff256be76dd3945f996c693
SHA1 f2aec75b5199db50abcedf1569d7213361bf9d2e
SHA256 3298f5a302722df3677d811c74206878af30b56dc31a2ce0cf80b4cfbf8b0564
SHA512 00c56b495ca862e7be9beeb6616b2aaef4e50345f6c28a9eba5e28c6948cc30b8b05bcc01dce94e9fdb60a5220c43045ee31d3346b2d0ce51c7809d6dc55b500

C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\TransportSecurity

MD5 36381f28abfef1c10b708c80f586030c
SHA1 697d2bd1b9a0fa65adf5b64a25c23de53d5959cf
SHA256 d2188da648cbf665ab3094edabb12dd43db35518a8465f93fef1d675b7ecef03
SHA512 ad8c0be0214f39e7cab00a56035521594558c094e06f2a80aa9b0931191b6d8edaf4aa435c50320b5709120aed5699a2c5bf87a3feedfaf3163173d91dd238cf

C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\TransportSecurity~RFe582d16.TMP

MD5 0581e76c61111bb2e95ca89be7e7163b
SHA1 e6af8027a46f39f77bf2afd9a8943ff22fdce5ee
SHA256 5aeda19c86cb79521196bbad073822afe18b276a89f55587d644f6d12bd302c7
SHA512 6efef5f010afb932c5af9163d2d76816a402dfb43206541f228eff7a59d8f9400be68af2471a4a040aee65a195ab802b7e218208c8b3d98af06536cc0c2abaca

C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index

MD5 7045d9a9779408b0863d0c8262880266
SHA1 fde80fc60b6d77345891e9a8e1a6071417ce6efc
SHA256 250ca9672f6d7c73f15f8577462449c6fc1cf3b7d727aacdebe7da4f49a5875a
SHA512 7829bcccbbbae81d5f9960326b3bdd87859dcbfacbdd18e3b14a46813c3844e12f278dbf7981c16f40ad2632407e5287fa7f83ef9dc6754d996d4b86249f1ff0

C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Network Persistent State

MD5 21bde408fcd6f7f8179184d7f9532027
SHA1 3d8957e0a53d17ce9e463c7718270fbabc8f6dfa
SHA256 61f039e97fe2b413664dd857f2484c4f67d9589277361c0b453a69eddd4b4884
SHA512 9bf7745b9a737ed622e1bcfd67fb2262e30d638da94277fcabd3b18d0dff1fa4c5213f76fa79a2c79fdcc710f3485c3fdb53c5150aa5e59ec37d7c4790fa90b8

C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Cache\f_000019

MD5 b4b711f3e747704ffe02b49791ce8cac
SHA1 ac7ce4cbd3c8ee66e3c8d9d209c1352c160c3b89
SHA256 f65bf40e2f0ce993b54772f703f72d53f0fa925457346fa8ec2031879ffa91d1
SHA512 b738deba57337a9147927f7dd35eab7c999dea6d2ff11f57fdc2e5b6f64326028a54778886548ba128a3f03ee333cc9e43de5162d8b578b85c290626577042db

C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index

MD5 1622528d24358772983faea01246d090
SHA1 4d6b3966eb21dde7994b4e5062692f171c3efe7b
SHA256 9365c97e79cb143f205bc509be7410643be7097eefe29d5e905f4f52c357bff4
SHA512 a9cd0d49440794757826f9113ac7f1fd98d986548292134f5b0ec76f59144a55de71a6cbf741a4c609035957cfa411c6e3eab4bc7e8e02b9876e3a35f581101c