Malware Analysis Report

2024-10-19 02:45

Sample ID 240826-p1pj8athpc
Target c307479c08857ba00268cfd629df3d54_JaffaCakes118
SHA256 bb3d68e1ba2be38a63d37653b722bae6699ec370fd89e99e2c741b32e1eff41b
Tags
socgholish discovery downloader
score
10/10

Table of Contents

Analysis Overview

MITRE ATT&CK

Enterprise Matrix V15

Analysis: static1

Detonation Overview

Signatures

Analysis: behavioral1

Detonation Overview

Command Line

Signatures

Processes

Network

Files

Analysis: behavioral2

Detonation Overview

Command Line

Signatures

Processes

Network

Files

Analysis Overview

score
10/10

SHA256

bb3d68e1ba2be38a63d37653b722bae6699ec370fd89e99e2c741b32e1eff41b

Threat Level: Known bad

The file c307479c08857ba00268cfd629df3d54_JaffaCakes118 was found to be: Known bad.

Malicious Activity Summary

socgholish discovery downloader

SocGholish

Browser Information Discovery

System Location Discovery: System Language Discovery

Modifies Internet Explorer settings

Suspicious use of FindShellTrayWindow

Enumerates system info in registry

Suspicious behavior: EnumeratesProcesses

Suspicious use of SetWindowsHookEx

Suspicious use of WriteProcessMemory

Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary

Suspicious use of SendNotifyMessage

MITRE ATT&CK

Analysis: static1

Detonation Overview

Reported

2024-08-26 12:47

Signatures

N/A

Analysis: behavioral1

Detonation Overview

Submitted

2024-08-26 12:47

Reported

2024-08-26 12:50

Platform

win7-20240729-en

Max time kernel

143s

Max time network

147s

Command Line

"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\c307479c08857ba00268cfd629df3d54_JaffaCakes118.html

Signatures

SocGholish

downloader socgholish

System Location Discovery: System Language Discovery

discovery
Description Indicator Process Target
Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE N/A

Modifies Internet Explorer settings

adware spyware
Description Indicator Process Target
Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic C:\Program Files\Internet Explorer\iexplore.exe N/A
Set value (int) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" C:\Program Files\Internet Explorer\iexplore.exe N/A
Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\InternetRegistry C:\Program Files\Internet Explorer\iexplore.exe N/A
Set value (str) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" C:\Program Files\Internet Explorer\iexplore.exe N/A
Set value (int) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\DOMStorage\www.youtube.com\ = "0" C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE N/A
Set value (int) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\DOMStorage\Total\ = "197" C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE N/A
Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\DOMStorage\youtube.com C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE N/A
Set value (int) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\DOMStorage\Total\ = "282" C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE N/A
Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser C:\Program Files\Internet Explorer\iexplore.exe N/A
Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Zoom C:\Program Files\Internet Explorer\iexplore.exe N/A
Set value (data) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 C:\Program Files\Internet Explorer\iexplore.exe N/A
Set value (int) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" C:\Program Files\Internet Explorer\iexplore.exe N/A
Set value (int) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\DOMStorage\www.youtube.com\ = "121" C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE N/A
Set value (int) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\DOMStorage\youtube.com\Total = "121" C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE N/A
Set value (int) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\DOMStorage\youtube.com\Total = "9172" C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE N/A
Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing C:\Program Files\Internet Explorer\iexplore.exe N/A
Set value (int) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" C:\Program Files\Internet Explorer\iexplore.exe N/A
Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\DOMStorage C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE N/A
Set value (int) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\DOMStorage\www.youtube.com\ = "6" C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE N/A
Set value (int) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\DOMStorage\youtube.com\Total = "115" C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE N/A
Set value (int) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\DOMStorage\youtube.com\Total = "200" C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE N/A
Set value (int) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" C:\Program Files\Internet Explorer\iexplore.exe N/A
Set value (int) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\DOMStorage\youtube.com\NumberOfSubdomains = "1" C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE N/A
Set value (int) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\DOMStorage\www.youtube.com\ = "9172" C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE N/A
Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive C:\Program Files\Internet Explorer\iexplore.exe N/A
Set value (int) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\DOMStorage\youtube.com\Total = "1643" C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE N/A
Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Main C:\Program Files\Internet Explorer\iexplore.exe N/A
Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\GPU C:\Program Files\Internet Explorer\iexplore.exe N/A
Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\IETld\LowMic C:\Program Files\Internet Explorer\iexplore.exe N/A
Set value (int) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\DOMStorage\Total\ = "6" C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE N/A
Set value (int) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\DOMStorage\www.youtube.com\ = "1643" C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE N/A
Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage C:\Program Files\Internet Explorer\iexplore.exe N/A
Set value (data) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = a0f32a4db6f7da01 C:\Program Files\Internet Explorer\iexplore.exe N/A
Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\LowRegistry C:\Program Files\Internet Explorer\iexplore.exe N/A
Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain C:\Program Files\Internet Explorer\iexplore.exe N/A
Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\PageSetup C:\Program Files\Internet Explorer\iexplore.exe N/A
Set value (int) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\DOMStorage\www.youtube.com\ = "197" C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE N/A
Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage C:\Program Files\Internet Explorer\iexplore.exe N/A
Set value (int) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "430838346" C:\Program Files\Internet Explorer\iexplore.exe N/A
Set value (int) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\DOMStorage\Total\ = "115" C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE N/A
Set value (int) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\DOMStorage\youtube.com\Total = "197" C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE N/A
Set value (int) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\DOMStorage\Total\ = "9172" C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE N/A
Set value (int) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\DOMStorage\www.youtube.com\ = "200" C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE N/A
Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\IntelliForms C:\Program Files\Internet Explorer\iexplore.exe N/A
Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery C:\Program Files\Internet Explorer\iexplore.exe N/A
Set value (int) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" C:\Program Files\Internet Explorer\iexplore.exe N/A
Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\DOMStorage\www.youtube.com C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE N/A
Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\SearchScopes C:\Program Files\Internet Explorer\iexplore.exe N/A
Set value (str) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" C:\Program Files\Internet Explorer\iexplore.exe N/A
Set value (data) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 C:\Program Files\Internet Explorer\iexplore.exe N/A
Set value (int) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{6BE57F41-63A9-11EF-8BEB-4E219E925542} = "0" C:\Program Files\Internet Explorer\iexplore.exe N/A
Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch C:\Program Files\Internet Explorer\iexplore.exe N/A
Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Main C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE N/A
Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Toolbar C:\Program Files\Internet Explorer\iexplore.exe N/A
Set value (int) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\DOMStorage\youtube.com\Total = "0" C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE N/A
Set value (int) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\DOMStorage\Total\ = "200" C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE N/A
Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\DomainSuggestion C:\Program Files\Internet Explorer\iexplore.exe N/A
Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\DOMStorage\Total C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE N/A
Set value (int) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\DOMStorage\www.youtube.com\ = "115" C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE N/A
Set value (int) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\DOMStorage\youtube.com\Total = "282" C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE N/A
Set value (int) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\DOMStorage\Total\ = "1643" C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE N/A
Set value (data) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb010000004961a9603b5d8740891a04601e8b8fb900000000020000000000106600000001000020000000c65be5a9ba9ee9c52cf2b5b046d49f00426738af00ebc24e584dd715008fec1b000000000e80000000020000200000002b7cf506d710eb4f13bdffc31d8496b991f3b45200a5e8af731163794adc73ec200000008ffb7750878bf34afaeaea90fc15a122ce8de26389ce22b9b5debb6d9214a71640000000d930654769759ae07f85e46a0648f4c23e222f2fddad9ce0df4e1d549d56cc319c71832b1a17963a0910e72bddbfad3c51e9ab88413f54c8cadd566d9f854eba C:\Program Files\Internet Explorer\iexplore.exe N/A
Set value (int) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\DOMStorage\youtube.com\Total = "6" C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE N/A
Set value (int) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\DOMStorage\Total\ = "0" C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE N/A

Suspicious use of FindShellTrayWindow

Description Indicator Process Target
N/A N/A C:\Program Files\Internet Explorer\iexplore.exe N/A

Processes

C:\Program Files\Internet Explorer\iexplore.exe

"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\c307479c08857ba00268cfd629df3d54_JaffaCakes118.html

C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE

"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2368 CREDAT:275457 /prefetch:2

Network

Country Destination Domain Proto
US 8.8.8.8:53 www.blogger.com udp
US 8.8.8.8:53 ajax.googleapis.com udp
US 8.8.8.8:53 code.jquery.com udp
US 8.8.8.8:53 scmplayer.net udp
US 8.8.8.8:53 i.imgur.com udp
US 8.8.8.8:53 4.bp.blogspot.com udp
US 8.8.8.8:53 resources.blogblog.com udp
US 8.8.8.8:53 1.bp.blogspot.com udp
US 8.8.8.8:53 2.bp.blogspot.com udp
US 8.8.8.8:53 66.media.tumblr.com udp
US 8.8.8.8:53 40.media.tumblr.com udp
US 8.8.8.8:53 65.media.tumblr.com udp
US 8.8.8.8:53 3.bp.blogspot.com udp
US 8.8.8.8:53 image.prntscr.com udp
US 8.8.8.8:53 67.media.tumblr.com udp
US 8.8.8.8:53 41.media.tumblr.com udp
US 8.8.8.8:53 25.media.tumblr.com udp
US 8.8.8.8:53 photos.prnewswire.com udp
US 8.8.8.8:53 www.linkwithin.com udp
US 8.8.8.8:53 img.youtube.com udp
US 8.8.8.8:53 apis.google.com udp
US 8.8.8.8:53 mail.google.com udp
FR 142.250.75.234:80 fonts.googleapis.com tcp
FR 142.250.75.234:80 fonts.googleapis.com tcp
FR 142.250.75.234:80 fonts.googleapis.com tcp
FR 142.250.74.234:80 ajax.googleapis.com tcp
FR 142.250.74.234:80 ajax.googleapis.com tcp
FR 142.250.75.234:80 fonts.googleapis.com tcp
FR 142.250.179.105:443 www.blogger.com tcp
FR 142.250.75.234:80 fonts.googleapis.com tcp
FR 142.250.75.234:80 fonts.googleapis.com tcp
FR 142.250.179.105:443 www.blogger.com tcp
FR 142.250.179.105:443 www.blogger.com tcp
FR 142.250.178.142:443 apis.google.com tcp
FR 142.250.178.142:443 apis.google.com tcp
US 74.114.154.22:443 25.media.tumblr.com tcp
US 74.114.154.22:443 25.media.tumblr.com tcp
US 74.114.154.22:443 25.media.tumblr.com tcp
US 199.232.192.193:80 i.imgur.com tcp
US 74.114.154.22:443 25.media.tumblr.com tcp
US 199.232.192.193:80 i.imgur.com tcp
US 74.114.154.18:443 25.media.tumblr.com tcp
US 74.114.154.18:443 25.media.tumblr.com tcp
US 74.114.154.18:443 25.media.tumblr.com tcp
US 74.114.154.18:443 25.media.tumblr.com tcp
US 192.0.77.3:443 66.media.tumblr.com tcp
US 192.0.77.3:443 66.media.tumblr.com tcp
US 192.0.77.3:443 66.media.tumblr.com tcp
US 192.0.77.3:443 66.media.tumblr.com tcp
US 104.21.234.157:80 scmplayer.net tcp
US 104.21.234.157:80 scmplayer.net tcp
FR 142.250.179.97:443 3.bp.blogspot.com tcp
FR 142.250.179.97:443 3.bp.blogspot.com tcp
FR 142.250.179.97:443 3.bp.blogspot.com tcp
FR 142.250.179.97:443 3.bp.blogspot.com tcp
FR 142.250.179.97:443 3.bp.blogspot.com tcp
FR 142.250.179.97:443 3.bp.blogspot.com tcp
FR 142.250.179.97:443 3.bp.blogspot.com tcp
FR 142.250.179.97:443 3.bp.blogspot.com tcp
US 151.101.2.137:80 code.jquery.com tcp
US 151.101.2.137:80 code.jquery.com tcp
US 74.114.154.22:443 25.media.tumblr.com tcp
US 74.114.154.22:443 25.media.tumblr.com tcp
FR 142.250.178.133:443 mail.google.com tcp
FR 142.250.178.133:443 mail.google.com tcp
SG 118.139.179.30:80 www.linkwithin.com tcp
SG 118.139.179.30:80 www.linkwithin.com tcp
FR 142.250.179.97:80 3.bp.blogspot.com tcp
FR 142.250.179.97:80 3.bp.blogspot.com tcp
FR 142.250.179.97:443 3.bp.blogspot.com tcp
FR 142.250.179.97:443 3.bp.blogspot.com tcp
FR 142.250.179.97:443 3.bp.blogspot.com tcp
FR 142.250.179.97:443 3.bp.blogspot.com tcp
FR 142.250.179.97:443 3.bp.blogspot.com tcp
FR 142.250.179.97:443 3.bp.blogspot.com tcp
FR 142.250.179.97:443 3.bp.blogspot.com tcp
FR 142.250.179.97:443 3.bp.blogspot.com tcp
FR 142.250.179.97:443 3.bp.blogspot.com tcp
FR 142.250.179.97:443 3.bp.blogspot.com tcp
FR 142.250.179.97:443 3.bp.blogspot.com tcp
FR 142.250.179.97:443 3.bp.blogspot.com tcp
FR 142.250.179.97:443 3.bp.blogspot.com tcp
FR 142.250.179.97:443 3.bp.blogspot.com tcp
FR 142.250.75.234:80 fonts.googleapis.com tcp
US 199.232.192.193:443 i.imgur.com tcp
US 8.8.8.8:53 c.pki.goog udp
US 8.8.8.8:53 c.pki.goog udp
US 8.8.8.8:53 c.pki.goog udp
US 8.8.8.8:53 c.pki.goog udp
US 8.8.8.8:53 c.pki.goog udp
US 8.8.8.8:53 c.pki.goog udp
US 8.8.8.8:53 c.pki.goog udp
US 8.8.8.8:53 c.pki.goog udp
US 8.8.8.8:53 c.pki.goog udp
US 8.8.8.8:53 c.pki.goog udp
US 8.8.8.8:53 c.pki.goog udp
US 8.8.8.8:53 c.pki.goog udp
US 8.8.8.8:53 c.pki.goog udp
US 8.8.8.8:53 c.pki.goog udp
US 8.8.8.8:53 c.pki.goog udp
FR 142.250.179.97:443 3.bp.blogspot.com tcp
FR 142.250.179.97:443 3.bp.blogspot.com tcp
US 8.8.8.8:53 c.pki.goog udp
US 8.8.8.8:53 c.pki.goog udp
FR 142.250.179.97:443 3.bp.blogspot.com tcp
FR 216.58.214.163:80 c.pki.goog tcp
FR 216.58.214.163:80 c.pki.goog tcp
FR 216.58.214.163:80 c.pki.goog tcp
FR 216.58.214.163:80 c.pki.goog tcp
FR 216.58.214.163:80 c.pki.goog tcp
FR 216.58.214.163:80 c.pki.goog tcp
FR 216.58.214.163:80 c.pki.goog tcp
FR 216.58.214.163:80 c.pki.goog tcp
FR 216.58.214.163:80 c.pki.goog tcp
FR 216.58.214.163:80 c.pki.goog tcp
FR 216.58.214.163:80 c.pki.goog tcp
FR 216.58.214.163:80 c.pki.goog tcp
FR 216.58.214.163:80 c.pki.goog tcp
FR 216.58.214.163:80 c.pki.goog tcp
FR 216.58.214.163:80 c.pki.goog tcp
FR 216.58.214.163:80 c.pki.goog tcp
FR 216.58.214.163:80 c.pki.goog tcp
US 8.8.8.8:53 o.pki.goog udp
US 8.8.8.8:53 o.pki.goog udp
US 8.8.8.8:53 o.pki.goog udp
US 8.8.8.8:53 o.pki.goog udp
US 8.8.8.8:53 o.pki.goog udp
US 8.8.8.8:53 o.pki.goog udp
US 8.8.8.8:53 o.pki.goog udp
US 8.8.8.8:53 o.pki.goog udp
US 8.8.8.8:53 o.pki.goog udp
US 8.8.8.8:53 o.pki.goog udp
US 8.8.8.8:53 o.pki.goog udp
FR 216.58.214.163:80 o.pki.goog tcp
FR 216.58.214.163:80 o.pki.goog tcp
FR 216.58.214.163:80 o.pki.goog tcp
FR 216.58.214.163:80 o.pki.goog tcp
FR 216.58.214.163:80 o.pki.goog tcp
FR 216.58.214.163:80 o.pki.goog tcp
FR 216.58.214.163:80 o.pki.goog tcp
FR 216.58.214.163:80 o.pki.goog tcp
FR 216.58.214.163:80 o.pki.goog tcp
FR 216.58.214.163:80 o.pki.goog tcp
FR 216.58.214.163:80 o.pki.goog tcp
US 8.8.8.8:53 64.media.tumblr.com udp
US 192.0.77.3:443 64.media.tumblr.com tcp
US 192.0.77.3:443 64.media.tumblr.com tcp
US 192.0.77.3:443 64.media.tumblr.com tcp
US 192.0.77.3:443 64.media.tumblr.com tcp
US 192.0.77.3:443 64.media.tumblr.com tcp
US 192.0.77.3:443 64.media.tumblr.com tcp
US 8.8.8.8:53 accounts.google.com udp
FR 142.250.178.131:80 fonts.gstatic.com tcp
FR 142.250.178.131:80 fonts.gstatic.com tcp
US 199.232.192.193:443 i.imgur.com tcp
FR 142.250.179.97:443 3.bp.blogspot.com tcp
US 104.23.139.12:80 image.prntscr.com tcp
FR 142.250.179.97:443 3.bp.blogspot.com tcp
US 104.23.139.12:80 image.prntscr.com tcp
FR 142.250.179.97:443 3.bp.blogspot.com tcp
FR 142.250.179.97:443 3.bp.blogspot.com tcp
FR 142.250.179.97:443 3.bp.blogspot.com tcp
FR 142.250.179.97:443 3.bp.blogspot.com tcp
FR 142.250.179.97:443 3.bp.blogspot.com tcp
FR 142.250.179.97:443 3.bp.blogspot.com tcp
FR 142.250.179.97:443 3.bp.blogspot.com tcp
FR 142.250.179.97:443 3.bp.blogspot.com tcp
FR 142.250.179.97:443 3.bp.blogspot.com tcp
FR 142.250.179.97:443 3.bp.blogspot.com tcp
US 104.18.32.47:443 photos.prnewswire.com tcp
US 104.18.32.47:443 photos.prnewswire.com tcp
IE 74.125.193.84:443 accounts.google.com tcp
IE 74.125.193.84:443 accounts.google.com tcp
US 8.8.8.8:53 www.youtube.com udp
US 8.8.8.8:53 player.vimeo.com udp
FR 142.250.178.131:80 fonts.gstatic.com tcp
FR 142.250.178.131:80 fonts.gstatic.com tcp
FR 142.250.178.131:80 fonts.gstatic.com tcp
FR 142.250.178.131:80 fonts.gstatic.com tcp
FR 142.250.178.142:443 www.youtube.com tcp
US 8.8.8.8:53 widgets.amung.us udp
US 162.159.138.60:443 player.vimeo.com tcp
US 162.159.138.60:443 player.vimeo.com tcp
US 8.8.8.8:53 www.google.com udp
US 104.22.75.171:80 widgets.amung.us tcp
US 104.22.75.171:80 widgets.amung.us tcp
FR 142.250.75.238:443 www.youtube.com tcp
FR 142.250.75.238:443 www.youtube.com tcp
FR 172.217.20.174:80 www.google-analytics.com tcp
FR 172.217.20.174:80 www.google-analytics.com tcp
FR 142.250.75.238:443 www.youtube.com tcp
FR 142.250.179.68:443 www.google.com tcp
FR 142.250.179.68:443 www.google.com tcp
FR 142.250.75.238:443 www.youtube.com tcp
US 8.8.8.8:53 googleads.g.doubleclick.net udp
US 8.8.8.8:53 static.doubleclick.net udp
FR 142.250.178.130:443 googleads.g.doubleclick.net tcp
FR 142.250.178.130:443 googleads.g.doubleclick.net tcp
FR 216.58.214.166:443 static.doubleclick.net tcp
FR 216.58.214.166:443 static.doubleclick.net tcp
US 8.8.8.8:53 jnn-pa.googleapis.com udp
FR 142.250.178.138:443 jnn-pa.googleapis.com tcp
US 8.8.8.8:53 resources.blogblog.com udp
FR 142.250.179.105:443 resources.blogblog.com tcp
US 8.8.8.8:53 img.youtube.com udp
FR 142.250.179.110:443 img.youtube.com tcp
US 204.79.197.200:443 ieonline.microsoft.com tcp
US 204.79.197.200:443 ieonline.microsoft.com tcp
US 204.79.197.200:443 ieonline.microsoft.com tcp

Files

C:\Users\Admin\AppData\Local\Temp\TarD972.tmp

MD5 4ea6026cf93ec6338144661bf1202cd1
SHA1 a1dec9044f750ad887935a01430bf49322fbdcb7
SHA256 8efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA512 6c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b

C:\Users\Admin\AppData\Local\Temp\CabD96E.tmp

MD5 49aebf8cbd62d92ac215b2923fb1b9f5
SHA1 1723be06719828dda65ad804298d0431f6aff976
SHA256 b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512 bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b

C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\24BD96D5497F70B3F510A6B53CD43F3E_3A89246FB90C5EE6620004F1AE0EB0EA

MD5 eecdf0a7dcf35d061d4f6ef3a799307f
SHA1 9204d28a1720eb5f94c303ed96a0b9330cceb647
SHA256 37e52308a382dfa7a2233b3a708175fe7945ed6c90605ec50c7171971c06f923
SHA512 370a6a75c2328eb5c37ba8817c145b571108644edb28ea84e8fc6a759006161cffad3db4f21d6d00b492894d1ea7f07653aeaa325f6f7eb74ea48e96aee8ca65

C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\24BD96D5497F70B3F510A6B53CD43F3E_3A89246FB90C5EE6620004F1AE0EB0EA

MD5 bbc314edfe965732b1c078ac7ee1d5fb
SHA1 e6caae0f27741861bc3b5dff3ccb4fe12f02c65a
SHA256 4072aa72edcdd3ce13ba7059f69d3b1fa1c5a4234078c1e3b56cbb7e0761ab58
SHA512 465caff74eec8c1ae846a24ca4cb2a52ec1c76ff135a8ef8bfb02491d35d8ee69d69d428f2477a45523acbbc2d6734b9c6cf431c690868d7708f50051c7c4add

C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

MD5 ec2a0c5af7c070c6a70c7fd60ae727c7
SHA1 f494f8bfd0b280da47e6b4ac600f49a2775684a1
SHA256 1e5add285c83a93c05d89c9e3d635e4be26a3a75a8922b2405f44cdd7df62033
SHA512 74c8a514099fb85771fe442054f70b077c8bcac97a591909272442c6b3c0c84698df86edd4fe67d865dc488c0696973d550f4d8d700f27c367d5f6bdd483a4c5

C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\24BD96D5497F70B3F510A6B53CD43F3E_3A89246FB90C5EE6620004F1AE0EB0EA

MD5 8da29d9a6dcb6a538adf6f17bc706443
SHA1 b6666c527e6aa6042ab6cab49671f79859132ca0
SHA256 3f0848e1a7a413592411e11cca0cc1cf475311c72043f91f7a550460c14c68c3
SHA512 871287c670ae167bd95fbc487812b7100f4d8a06d4644febeb8525e0ce13c6da5f0126f98db0405040293489d54aed6a24cf87f2952c4e48073228c822bf0406

C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\24BD96D5497F70B3F510A6B53CD43F3E_3A89246FB90C5EE6620004F1AE0EB0EA

MD5 881a1c372e5b08ae67440967e352383b
SHA1 39f8138e2f34737ee177521ce5079386e6de4b7d
SHA256 7d9b8b402195d43bce6fc0a68cd1330c08af494403c04123b1c98a9657a7916d
SHA512 ce5650ea1e88b7bb82dba331c2bfd58a2b26d061210031724603dbea54f86c165b8ab37c458176eb28d6fc9e34f87f7d6c4f8343aebc1d4918506f3cff80dd53

C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\05DDC6AA91765AACACDB0A5F96DF8199

MD5 e935bc5762068caf3e24a2683b1b8a88
SHA1 82b70eb774c0756837fe8d7acbfeec05ecbf5463
SHA256 a8accfcfeb51bd73df23b91f4d89ff1a9eb7438ef5b12e8afda1a6ff1769e89d
SHA512 bed4f6f5357b37662623f1f8afed1a3ebf3810630b2206a0292052a2e754af9dcfe34ee15c289e3d797a8f33330e47c14cbefbc702f74028557ace29bf855f9e

C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\05DDC6AA91765AACACDB0A5F96DF8199

MD5 e8f982f3017c8e64c3fbd3177a0e66eb
SHA1 f6cdda214cbb26b834bfdaae99f60909b9265de4
SHA256 d11735ce2a942f73919a0d948328f503f8ab0d74e741d9dd4062af540030ea15
SHA512 15ca6593e5f76d339f65dd9914955df133ca01275e84af2a50709212ec9e0fb2656e2a8ad8c3daee563067564efef26ba34ef533e966e79ccffc4f5ea1e8013a

C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\05DDC6AA91765AACACDB0A5F96DF8199

MD5 589f4a5ff184f051d21341a3f0429b2e
SHA1 73810c9d1f1f01e286ce042c8cde33a08c3bedc4
SHA256 1068db5b1a05268f752473e8d5baa2037ee297da919454aa63f2caf78815ab67
SHA512 142ed8a8a0ab0d4afa9dac6fa76571173df5ea6973ab44cc5b2ab24d0814fa92b07d467cbf4afc5dbe39d11258b974a69deef0b90a2fa568a08ea7478e355acc

C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\05DDC6AA91765AACACDB0A5F96DF8199

MD5 dae0f70c68e642fac47eb6ce9662b15f
SHA1 bd24e6679439820bfe66b0a58b7b53e8d0498ec5
SHA256 e8fd6805e985c6ca90ae0ddb5319e8570fdd7b2285189f0da04aae394e61f398
SHA512 191457656de76fc9e92808539e461c4e2f0fd31ba1f702fc8d85005c6ef1608c661f1d5a1bad1625b1e1673d284d541421cad72b95204ac4718b1bf36a3f744b

C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

MD5 fc706423b7265d36842b22493548c1a6
SHA1 e210698dd35cce549b37dcf912766c55f83a21ca
SHA256 eee42fd1b004919040b15efbb5d3b95527924c8bec1434d6e585a436d5e30d32
SHA512 5365cc2ae0f9233ef90795073321d78d63e90d55659406b6eca312e7f80c1ba42526d0b6d39dceec361e3ac8aef254a41822e89039a1a2b8a05d6d9d19d3b5fd

C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\LW44N8OS\tumblr_o8dxsviFMW1ui14f0o1_500[1].htm

MD5 4f8e702cc244ec5d4de32740c0ecbd97
SHA1 3adb1f02d5b6054de0046e367c1d687b6cdf7aff
SHA256 9e17cb15dd75bbbd5dbb984eda674863c3b10ab72613cf8a39a00c3e11a8492a
SHA512 21047fea5269fee75a2a187aa09316519e35068cb2f2f76cfaf371e5224445e9d5c98497bd76fb9608d2b73e9dac1a3f5bfadfdc4623c479d53ecf93d81d3c9f

C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\C02877841121CC45139CB51404116B25_D71A94740B0CED76EBD7AAE2374CBE8B

MD5 eec971bc753cc9e2e6b53f9a70b2ec46
SHA1 180800efd67b9f2d3904d26b0f023d091f96e364
SHA256 16d1ff1fe2e5e3897c08895cb20db9b4238e04a9df8c241fcab508d4833ae57e
SHA512 03c8d025850682fbc950f9cc25fb270a87bb585417454bb5ba6ae38dc8ac7687cc2de83e44b1fd24e3fb591ef27393f7bdf156f83d2fd707570b3dc62dbc019b

C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\C02877841121CC45139CB51404116B25_D71A94740B0CED76EBD7AAE2374CBE8B

MD5 472ace0a7441d452aa2b579bff94a197
SHA1 2ef03cc0fb3aeebaebf83a61c10e31640f176bf0
SHA256 6a9efe67f41cf0d496def8a7af96429048db3939c5f6c1e0ae79f4371a3104bd
SHA512 6e9c7c33dcaea25cd21ec58eb9c09233c68fe178fbace88f920e524a5e18be0cd0be3fbadc8689257a97835887e36800b84c09ae4975c6033316eaa053706deb

C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\24BD96D5497F70B3F510A6B53CD43F3E_3A89246FB90C5EE6620004F1AE0EB0EA

MD5 d033bad2eac6a426895758758dbcb4ea
SHA1 4ef1fd388a4da93ee1b59c36bd3fd6c9d7047f4c
SHA256 69d96759403b75cf149300c9ab03cdceb1752d3f4828612c486f33666adc137d
SHA512 0fc5cc7245e291223c25b8ee31cdd0583c1132fa0df7478284822ea42752e82118d33a436e92af1831cbe2bbbb40195681068c36dab837e60157d58791c9d61e

C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\4FA45AE1010E09657982D8D28B3BD38E_BE32D9F1882B93E37445F58E05C44495

MD5 563bea03011dc97c75a7169d2f2ab240
SHA1 d8251ca20c1f02e721609949460072a67be05430
SHA256 484c965ec88538714854105c5b47ccaf9c3709553be73564155492cbe9db6f9c
SHA512 d9794a400f1e654616691936b1397fde1f6b1ff5efc7492ff086ed633e041723181af10a2b510d8bc540789b41cdb0e1b968eb34e3394deb70c313acea95d65f

C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\4FA45AE1010E09657982D8D28B3BD38E_BE32D9F1882B93E37445F58E05C44495

MD5 453d37ad9fec7153fada1102d8e7e277
SHA1 685fc65060f0e41d2dad35e0e56d06055d5ea3b5
SHA256 07caf76583edee5ea04891f4e70cb6828942ed340b1aec74154e71921fca8cf4
SHA512 f0586a9913b65e4b619dbe296538261b6478f9db99b3000b010f8b5b549cad9efc9f540a870cbb910181f72c05707f2c0c01dcd004369a08e9f14f1bdad2812f

C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\LW44N8OS\cb=gapi[1].js

MD5 cb98a2420cd89f7b7b25807f75543061
SHA1 b9bc2a7430debbe52bce03aa3c7916bedfd12e44
SHA256 bea369fc5bdd5b9b473441583c46b9939232bf1f98c1cedf6bc2241c4f5068d4
SHA512 49ccede4596d1e5640a9c8e8be333f9c18812d58f02b2b15adb54172df1387439e9dc5afc4ccd9d8f0f75f092318bed68d3cd577338e88ef4f9373de8a07c44e

C:\Users\Admin\AppData\Local\Microsoft\Internet Explorer\DOMStore\8IDZ5QQF\www.youtube[1].xml

MD5 c1ddea3ef6bbef3e7060a1a9ad89e4c5
SHA1 35e3224fcbd3e1af306f2b6a2c6bbea9b0867966
SHA256 b71e4d17274636b97179ba2d97c742735b6510eb54f22893d3a2daff2ceb28db
SHA512 6be8cec7c862afae5b37aa32dc5bb45912881a3276606da41bf808a4ef92c318b355e616bf45a257b995520d72b7c08752c0be445dceade5cf79f73480910fed

C:\Users\Admin\AppData\Local\Microsoft\Internet Explorer\DOMStore\8IDZ5QQF\www.youtube[1].xml

MD5 265d9ddb748dd3572bcf02f150ec5072
SHA1 1efdb37aea5c9d726a8ac6b930f783ab3296c506
SHA256 ed5cd10320fbed3bad2a216ad826e3f6cebcbb03ba9e544cc7ecc376da9f9b6e
SHA512 efcbc0b2d14435d5ee0840464a45922b2b3b8926f79f61c6885a368de17ade6e42b45958f728f56f550bea6d5a7f80654dbdde7d636add2837680f2aaa39e417

C:\Users\Admin\AppData\Local\Microsoft\Internet Explorer\DOMStore\8IDZ5QQF\www.youtube[1].xml

MD5 b3bc59854a7e14fbbba467051ed4d135
SHA1 a31c8cd4b88f66722ab8711287486bd2da8901f4
SHA256 03066e76093417325d3a27d8935786f215919de1b1cd365d0436d7e062368e66
SHA512 c8f6838c12e1819c7973765f41d26382ef8140f8122316c370ac0bee7bfe88aff0757d98c81e93209702e2b7796db70bc06ecd3e730c8184268a87cd44e25dd1

C:\Users\Admin\AppData\Local\Microsoft\Internet Explorer\DOMStore\8IDZ5QQF\www.youtube[1].xml

MD5 e87e713a6282544a5bc45f4eb0209cc3
SHA1 6cd6081315f9de67a20b3e368efc497b3c8bd961
SHA256 83d4afc2bd9e086664dcd9bb48dff332de66ef8b5ada736f341d56282668bb46
SHA512 a319f87890e55b4c65423340f198de45c6b3a1c1fa24117eacf487a9ce2ff6636a52abf023510e2070b21104251f9888694009e7166bdc6e60d34d01ae6a6397

C:\Users\Admin\AppData\Local\Microsoft\Internet Explorer\DOMStore\8IDZ5QQF\www.youtube[1].xml

MD5 b28070f86a7b071dd29364bcd7ab598d
SHA1 e6b158554c07a2a2832c865dfa46a5a73e3d13e4
SHA256 53940f27de1eaed1c5db91af1c72a3dc0513887557d084c920aa908d942eeb1a
SHA512 7e26bbb94a16e1b274ef5ceffe6cb63967ecf60fe4353e694a188469b794b3cb269e63f015ba7477d6236901b2730b51cc033513f46330cfc6e18bc55f61cd8b

C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

MD5 e3ebaffd1275cd938117447de35631c6
SHA1 c1eac8bc61950df7954826786cc8bca6ee2fbafb
SHA256 acb0c3018b64bfb4ee43c56ad7626c2cea54929f5554bc720c1e6d5611566b93
SHA512 0e6722686aaee26537f6652c724ddc5aec6a4585fb852557aec661142567c53d07b5e44d5ceb3cc3e02f12bbce65137e1c85e17401b2435e8625ee7904dae1a1

C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

MD5 23509149923862c51f5cc2de8d63393c
SHA1 f4e2eedd5ed488f18902714b235aaf30e238b577
SHA256 e033a8192fbbf5c1883c4cd62bac82fb757f5172166d04974c65c33fff7c9fa5
SHA512 89a6a8c2d677dd4c8459261d2eb4ef64f1e620107d800560dc997b3a1c5690ebcffb937aded97b738a32aa8e4bbcceec0636cf3a575348855992c7b31768639b

C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

MD5 a54ee55dbaf18232ab4780f86a82ac3b
SHA1 ca0db6d4b409ccdef8a79b0319cc669a5c713941
SHA256 a5c564080ce5528c782472883d1a6faec305864ba400a0ac252b3b9f4bcd9cbd
SHA512 47ec1783f1bde4b031b02c407af0565b3e2d9d78346e35729d499b689f3dacd8dabf005da1e8859179a01cb9afd52fbce0640cab9137478a1550fbf242aacca4

C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

MD5 d6b34e627802f60274421fe0ff80c76e
SHA1 7795d67c62c47bc84b83422f6131e2d6b72fb511
SHA256 315eecd809bed3cbfbfa60792e4f16c911b6a6ffcffcc7eb143b3a214eb78329
SHA512 3a519c3e7770aba11dbf1cdf134e725619e3b7e4c2a6c61e6a0bf0dfa8ba49c16c1d448ef69648a8867cfe004c71ecfba1c660959e79b69dc64cf5c5baf38585

C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

MD5 db5b50176c8aa0cad7750c389fddbbc1
SHA1 5503a6c5031f3eefa42e9c415732b9a5b212ee4b
SHA256 b5d0a793e6bd69931e4ce3b36b06ffca4bf806fc2425767df9a0cfd8a0df72b4
SHA512 14f313155119404cb09c80ee2d705eacfad994989368a313a490df1636d29657222499c598f4544e1d8aee545a47fd80276a0f1479331da575631d568f4f8773

C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

MD5 7385f748aa225bc8f132dfedb081965c
SHA1 ae8223a30621f86afc8f0e17b34d0a1e898b661c
SHA256 b94057e4059d479185d54c519c2dca4a75b8e203380e8e596f23e6f9837ff178
SHA512 4408a55b1ee9c182128309e4de3a2cf63f7871fba38006525d3f90d9d92dd9ecdb42bffd0b698410012ffa3e1d099a723d54627b700628b79e87eb3b0bbc2a24

C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

MD5 cd6ad50024889c613aa3eee7afc3f1d0
SHA1 4e21dc48257baaabcb8869d12700721a9ef8b544
SHA256 c289afadeb4d0335091eb3be2b6fde586a87c4e573810252bf016aafb1ebbecb
SHA512 1140646fa565815cf9701d7665fb0c090d78d8e79ad724f593b66301bfff3a352068811034eb6369af6753fd4b66708ec7f8103e8696ca5756b15d080e27a443

C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

MD5 2826f27764f3b66332da5d34828fc56b
SHA1 5a234bb338ab5d5f4a254f3c558c5a3b792b10cd
SHA256 b0c3b6f44f11f4a2f29b097c18b105baa9d527c9d41a4a8023b4b71cdd1f3b1b
SHA512 dda321325689336f26aeb09433cf7c5054914ab6f50df7e99c2f597154ea0031cc69704cb3e4d276834f5e4a71d5afb8eccfa4caf7e5c111f6cccb196d7b2198

C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

MD5 aadbda543ba27215874ce152d81f4c89
SHA1 69cbb8490eb156909c0eb225ab51a7841f9347cf
SHA256 06cc5e5c09cc4e4c64aa150fc9859d85fecde56c72df0aa78938c456d999c9bb
SHA512 93ac53084d0406bb540429c31a226613d5d5beb92fa05853fe133ad5e98b81f2ec03b1b0d8980b44294dff79c201e893743775a2093fe728d96ab6856d1b675d

C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

MD5 4f75117d27d44e5da64e21c0b747e033
SHA1 1066c5686ff218f781a5faa43a4c6b126f1681a9
SHA256 05b1d39a2f1bfdaa207f1b67562497ca4958c8d6bca94af7bea4e12ef6bd813a
SHA512 55b149eeb3cad79d013c2d10fa41a3e5413cfcf9cf46e427b030f450704ba1d8f1479d5d835c36f38cad2dff1ab99a9d8f25968aec3f09ba751a3908240ff309

C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

MD5 125de5c30031f34e5316568b5ee5c6f2
SHA1 6bfad2b781db0857d2dd5085d9e0e0f0a910bf60
SHA256 07d20aac3798f023e88402994b5d4bb1dea4d5e47a7131870b7d8115e9e6368c
SHA512 2de3d0e21e499b4b74bf85d82fa6eb2697750e212192afcf5b65eb68706c61e2c339e0efd8768b54df17423c76a38a2aaad4cdc0372cd95834e9279fc6bd355a

C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

MD5 113bf498e579270d6d6e24c470a9fe59
SHA1 4607041c4ec7dd08e3b4e36c254bbeaa70b4b8a2
SHA256 3f8c948c7a660e9de25c00efa746453d45ba8548dc0adac5a052bed13491da92
SHA512 1317973e16315a4cbb03b2d3d39b949b4df8e4c4085768e78d8c98c453390c48bd84fc5a2944a9c39690a319499437b3079e9df6ad54cc36ab5b47e8300f70af

C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

MD5 78784f14c539ce0038f55e98db2e022e
SHA1 f8c44e4ea0d7b1e331785041613d0d8ad59b93ec
SHA256 93dfec41a90601631c708ad40ba42b58ef6f08836e150ad77b14d072e507b02d
SHA512 4f5171e35b85e5f4402cc38ad765f9f1faf3adf2b7d5cd0ff569bead670ddb36aa6e6ef75ed9f3ec7f86b1ac24c54e6d59d4c872d66dfa3bab1db8bd11b0305a

C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

MD5 1cd3eae4ba2ffaf5d8ee637e2083d7a8
SHA1 67fbb9ef3f1e7bdd457031b94dd91d122d7f7427
SHA256 ef0f189cd3e163df4b0690e75a10c18849db878a2bce043d1f47c4ae12720ecc
SHA512 ac3fe907fa8d12db6d37a261c8614f0107fc2b112e4e70253bdf53ad9480001cbb376528dd54cccc22bb2acdd9e1db7f6d849d36627c76bd9ba43cdb1bfbf3e7

C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

MD5 632af26ee3b2136dcb859f58028a52b5
SHA1 6d71525f1fa4231b40c388fa160845ba64258a6c
SHA256 838d0f872e7c064d65b880b86bd79b1eb11421c01d80cbc527a3591489d3b06e
SHA512 f6772e08a564ab880b7486c2cd0a7cbcc42cef218a51200152a1aaaa48a63a2fd4443f8bb37a2897f3d21be75c14d14e7502c98732d0483264997b51216676af

C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

MD5 e4dd7c57fd5cd2f293dd7a64dfa6f49d
SHA1 a4019254c25ea430d864dd61beb0da253e368ec6
SHA256 2bbc0d0cca8149bd01b094e23b9240b22bb75c11da902e82146aa1324240ba74
SHA512 4e45ad9b2aab1021c73bcccc2583b2d36ab5640de71bc715a93334319d2a805e5fbf934dc7c7629e1166760bac0ef5da04220fe1aaea44a7ff124bb1a71dae34

C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

MD5 d72276a72809b1e6e050c2c5eb5b38f0
SHA1 5fb7e5012b03e31586b98aceeb1f4bea184f8cb0
SHA256 b80c6f050d176caca2937095bec002bbb871d205d959e0d5130ec6595a99c726
SHA512 ca5256b57106466ecbc148190e8e937bf846d2678c90ee3de790a0269219ad0355681172dccd64096b123c598f0bbfcf6012b8cca445fb2fdb623ed1349990a5

C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

MD5 3272512e336172f95840dbf00ee9e150
SHA1 82351fdf2022b6965fecee667bb73254290fa3af
SHA256 e8bcdc46c5fbac883503c1f17277fad0f3811de819051e68760a9ddf40033d20
SHA512 9bb9a9f4b332762761362f8027804c1db9545dc3a874a762a75e09ed79ddeb0404a2a540601de1c000a58df6b84c1dd8d8c2c52490158af9cb3233347ed941b0

C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

MD5 d641a803ed95cedfc45f8771dbbdce7a
SHA1 ef76fd3a5efc1c3a54f707b4bdc71f434fb26bbc
SHA256 20155024f7b776add488e13d511be2322cc4fb05fd96c80951bb2a9dedc06dac
SHA512 ef45379d6e848fde4814f3b044137f3a3c171b8c0519aa7ce2476a5266e4d86e30306fcbcd588f5e6034a7bb62bcc4b84c46d9906ce23679e0ce3e462c750ab5

Analysis: behavioral2

Detonation Overview

Submitted

2024-08-26 12:47

Reported

2024-08-26 12:50

Platform

win10v2004-20240802-en

Max time kernel

149s

Max time network

150s

Command Line

"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\c307479c08857ba00268cfd629df3d54_JaffaCakes118.html

Signatures

Browser Information Discovery

discovery

Enumerates system info in registry

Description Indicator Process Target
Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe N/A
Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe N/A
Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe N/A

Suspicious use of FindShellTrayWindow

Description Indicator Process Target
N/A N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe N/A
N/A N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe N/A
N/A N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe N/A
N/A N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe N/A
N/A N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe N/A
N/A N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe N/A
N/A N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe N/A
N/A N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe N/A
N/A N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe N/A
N/A N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe N/A
N/A N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe N/A
N/A N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe N/A
N/A N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe N/A
N/A N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe N/A
N/A N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe N/A
N/A N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe N/A
N/A N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe N/A
N/A N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe N/A
N/A N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe N/A
N/A N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe N/A
N/A N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe N/A
N/A N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe N/A
N/A N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe N/A
N/A N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe N/A
N/A N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe N/A

Suspicious use of SendNotifyMessage

Description Indicator Process Target
N/A N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe N/A
N/A N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe N/A
N/A N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe N/A
N/A N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe N/A
N/A N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe N/A
N/A N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe N/A
N/A N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe N/A
N/A N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe N/A
N/A N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe N/A
N/A N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe N/A
N/A N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe N/A
N/A N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe N/A
N/A N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe N/A
N/A N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe N/A
N/A N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe N/A
N/A N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe N/A
N/A N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe N/A
N/A N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe N/A
N/A N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe N/A
N/A N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe N/A
N/A N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe N/A
N/A N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe N/A
N/A N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe N/A
N/A N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe N/A

Suspicious use of WriteProcessMemory

Description Indicator Process Target
PID 2448 wrote to memory of 2288 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 2448 wrote to memory of 2288 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 2448 wrote to memory of 3576 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 2448 wrote to memory of 3576 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 2448 wrote to memory of 3576 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 2448 wrote to memory of 3576 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 2448 wrote to memory of 3576 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 2448 wrote to memory of 3576 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 2448 wrote to memory of 3576 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 2448 wrote to memory of 3576 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 2448 wrote to memory of 3576 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 2448 wrote to memory of 3576 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 2448 wrote to memory of 3576 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 2448 wrote to memory of 3576 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 2448 wrote to memory of 3576 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 2448 wrote to memory of 3576 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 2448 wrote to memory of 3576 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 2448 wrote to memory of 3576 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 2448 wrote to memory of 3576 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 2448 wrote to memory of 3576 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 2448 wrote to memory of 3576 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 2448 wrote to memory of 3576 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 2448 wrote to memory of 3576 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 2448 wrote to memory of 3576 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 2448 wrote to memory of 3576 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 2448 wrote to memory of 3576 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 2448 wrote to memory of 3576 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 2448 wrote to memory of 3576 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 2448 wrote to memory of 3576 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 2448 wrote to memory of 3576 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 2448 wrote to memory of 3576 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 2448 wrote to memory of 3576 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 2448 wrote to memory of 3576 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 2448 wrote to memory of 3576 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 2448 wrote to memory of 3576 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 2448 wrote to memory of 3576 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 2448 wrote to memory of 3576 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 2448 wrote to memory of 3576 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 2448 wrote to memory of 3576 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 2448 wrote to memory of 3576 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 2448 wrote to memory of 3576 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 2448 wrote to memory of 3576 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 2448 wrote to memory of 3012 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 2448 wrote to memory of 3012 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 2448 wrote to memory of 1728 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 2448 wrote to memory of 1728 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 2448 wrote to memory of 1728 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 2448 wrote to memory of 1728 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 2448 wrote to memory of 1728 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 2448 wrote to memory of 1728 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 2448 wrote to memory of 1728 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 2448 wrote to memory of 1728 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 2448 wrote to memory of 1728 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 2448 wrote to memory of 1728 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 2448 wrote to memory of 1728 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 2448 wrote to memory of 1728 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 2448 wrote to memory of 1728 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 2448 wrote to memory of 1728 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 2448 wrote to memory of 1728 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 2448 wrote to memory of 1728 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 2448 wrote to memory of 1728 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 2448 wrote to memory of 1728 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 2448 wrote to memory of 1728 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 2448 wrote to memory of 1728 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe

Processes

C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe

"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\c307479c08857ba00268cfd629df3d54_JaffaCakes118.html

C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe

"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0x108,0x10c,0x110,0xd8,0x114,0x7ff9023646f8,0x7ff902364708,0x7ff902364718

C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe

"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=1992,9716655243642859602,10710339835839924580,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2040 /prefetch:2

C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe

"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=1992,9716655243642859602,10710339835839924580,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2164 /prefetch:3

C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe

"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=1992,9716655243642859602,10710339835839924580,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2648 /prefetch:8

C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe

"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1992,9716655243642859602,10710339835839924580,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3216 /prefetch:1

C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe

"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1992,9716655243642859602,10710339835839924580,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3224 /prefetch:1

C:\Windows\System32\CompPkgSrv.exe

C:\Windows\System32\CompPkgSrv.exe -Embedding

C:\Windows\System32\CompPkgSrv.exe

C:\Windows\System32\CompPkgSrv.exe -Embedding

C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe

"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1992,9716655243642859602,10710339835839924580,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4688 /prefetch:1

C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe

"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1992,9716655243642859602,10710339835839924580,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5180 /prefetch:1

C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe

"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1992,9716655243642859602,10710339835839924580,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5168 /prefetch:1

C:\Windows\System32\CompPkgSrv.exe

C:\Windows\System32\CompPkgSrv.exe -Embedding

C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe

"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1992,9716655243642859602,10710339835839924580,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3044 /prefetch:1

C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe

"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1992,9716655243642859602,10710339835839924580,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5596 /prefetch:1

C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe

"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=1992,9716655243642859602,10710339835839924580,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4872 /prefetch:8

C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe

"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=1992,9716655243642859602,10710339835839924580,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4872 /prefetch:8

C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe

"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1992,9716655243642859602,10710339835839924580,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=13 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5944 /prefetch:1

C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe

"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1992,9716655243642859602,10710339835839924580,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=14 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5964 /prefetch:1

C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe

"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1992,9716655243642859602,10710339835839924580,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=15 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4072 /prefetch:1

C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe

"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1992,9716655243642859602,10710339835839924580,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=16 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5484 /prefetch:1

C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe

"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=1992,9716655243642859602,10710339835839924580,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=5964 /prefetch:2

Network

Country Destination Domain Proto
US 8.8.8.8:53 8.8.8.8.in-addr.arpa udp
US 8.8.8.8:53 228.249.119.40.in-addr.arpa udp
US 8.8.8.8:53 maxcdn.bootstrapcdn.com udp
US 8.8.8.8:53 www.blogger.com udp
US 8.8.8.8:53 ajax.googleapis.com udp
US 8.8.8.8:53 code.jquery.com udp
US 8.8.8.8:53 scmplayer.net udp
FR 142.250.75.234:80 fonts.googleapis.com tcp
FR 142.250.75.234:80 fonts.googleapis.com tcp
FR 142.250.75.234:80 fonts.googleapis.com tcp
FR 142.250.75.234:80 fonts.googleapis.com tcp
FR 142.250.75.234:80 fonts.googleapis.com tcp
FR 142.250.75.234:80 fonts.googleapis.com tcp
FR 216.58.215.42:80 ajax.googleapis.com tcp
US 104.18.11.207:445 maxcdn.bootstrapcdn.com tcp
FR 142.250.179.105:443 www.blogger.com tcp
FR 142.250.179.105:443 www.blogger.com tcp
US 151.101.194.137:80 code.jquery.com tcp
US 104.21.234.157:80 scmplayer.net tcp
FR 142.250.178.131:80 fonts.gstatic.com tcp
US 8.8.8.8:53 www.linkwithin.com udp
SG 118.139.179.30:80 www.linkwithin.com tcp
US 8.8.8.8:53 apis.google.com udp
FR 142.250.178.142:443 apis.google.com tcp
SG 118.139.179.30:80 www.linkwithin.com tcp
US 8.8.8.8:53 74.32.126.40.in-addr.arpa udp
US 8.8.8.8:53 172.210.232.199.in-addr.arpa udp
FR 142.250.179.105:443 www.blogger.com udp
US 8.8.8.8:53 137.194.101.151.in-addr.arpa udp
US 8.8.8.8:53 234.75.250.142.in-addr.arpa udp
US 8.8.8.8:53 42.215.58.216.in-addr.arpa udp
US 8.8.8.8:53 105.179.250.142.in-addr.arpa udp
US 8.8.8.8:53 157.234.21.104.in-addr.arpa udp
US 8.8.8.8:53 131.178.250.142.in-addr.arpa udp
US 8.8.8.8:53 95.221.229.192.in-addr.arpa udp
US 8.8.8.8:53 tse1.mm.bing.net udp
US 8.8.8.8:53 i.imgur.com udp
US 104.18.10.207:445 maxcdn.bootstrapcdn.com tcp
US 8.8.8.8:53 maxcdn.bootstrapcdn.com udp
US 199.232.192.193:80 i.imgur.com tcp
US 104.18.11.207:139 maxcdn.bootstrapcdn.com tcp
US 199.232.192.193:443 i.imgur.com tcp
US 8.8.8.8:53 142.178.250.142.in-addr.arpa udp
US 8.8.8.8:53 193.192.232.199.in-addr.arpa udp
US 8.8.8.8:53 g.bing.com udp
US 8.8.8.8:53 4.bp.blogspot.com udp
FR 142.250.179.97:80 4.bp.blogspot.com tcp
US 8.8.8.8:53 resources.blogblog.com udp
US 150.171.28.10:443 g.bing.com tcp
FR 142.250.179.105:443 resources.blogblog.com tcp
US 8.8.8.8:53 1.bp.blogspot.com udp
FR 142.250.179.97:443 1.bp.blogspot.com tcp
US 150.171.27.10:443 g.bing.com tcp
US 8.8.8.8:53 30.179.139.118.in-addr.arpa udp
US 8.8.8.8:53 97.179.250.142.in-addr.arpa udp
US 8.8.8.8:53 10.27.171.150.in-addr.arpa udp
US 8.8.8.8:53 55.36.223.20.in-addr.arpa udp
US 8.8.8.8:53 2.bp.blogspot.com udp
FR 142.250.179.97:443 2.bp.blogspot.com tcp
N/A 224.0.0.251:5353 udp
US 8.8.8.8:53 13.86.106.20.in-addr.arpa udp
FR 142.250.179.97:443 2.bp.blogspot.com udp
US 8.8.8.8:53 66.media.tumblr.com udp
US 192.0.77.3:443 66.media.tumblr.com tcp
US 8.8.8.8:53 40.media.tumblr.com udp
US 74.114.154.18:443 40.media.tumblr.com tcp
US 8.8.8.8:53 65.media.tumblr.com udp
US 74.114.154.22:443 65.media.tumblr.com tcp
US 8.8.8.8:53 64.media.tumblr.com udp
US 8.8.8.8:53 3.bp.blogspot.com udp
US 8.8.8.8:53 241.150.49.20.in-addr.arpa udp
US 8.8.8.8:53 3.77.0.192.in-addr.arpa udp
US 8.8.8.8:53 18.154.114.74.in-addr.arpa udp
US 8.8.8.8:53 22.154.114.74.in-addr.arpa udp
US 8.8.8.8:53 image.prntscr.com udp
US 104.23.140.12:80 image.prntscr.com tcp
US 8.8.8.8:53 67.media.tumblr.com udp
US 8.8.8.8:53 12.140.23.104.in-addr.arpa udp
US 104.23.140.12:80 image.prntscr.com tcp
US 8.8.8.8:53 41.media.tumblr.com udp
US 8.8.8.8:53 25.media.tumblr.com udp
US 8.8.8.8:53 translate.google.com udp
US 8.8.8.8:53 scmplayer.net udp
US 8.8.8.8:53 photos.prnewswire.com udp
US 8.8.8.8:53 img.youtube.com udp
US 8.8.8.8:53 mail.google.com udp
FR 142.250.178.133:443 mail.google.com tcp
FR 216.58.214.174:443 img.youtube.com tcp
FR 216.58.214.174:443 img.youtube.com tcp
US 172.64.155.209:443 photos.prnewswire.com tcp
US 104.21.234.156:445 scmplayer.net tcp
US 8.8.8.8:53 accounts.google.com udp
IE 74.125.193.84:443 accounts.google.com tcp
US 8.8.8.8:53 209.155.64.172.in-addr.arpa udp
US 8.8.8.8:53 133.178.250.142.in-addr.arpa udp
US 8.8.8.8:53 174.214.58.216.in-addr.arpa udp
US 8.8.8.8:53 84.193.125.74.in-addr.arpa udp
IE 74.125.193.84:443 accounts.google.com udp
US 8.8.8.8:53 prnewswire2-a.akamaihd.net udp
GB 92.123.142.203:443 prnewswire2-a.akamaihd.net tcp
FR 172.217.20.206:445 img.youtube.com tcp
US 104.21.234.157:445 scmplayer.net tcp
US 8.8.8.8:53 203.142.123.92.in-addr.arpa udp
US 8.8.8.8:53 translate.google.com udp
FR 172.217.20.206:139 translate.google.com tcp
US 8.8.8.8:53 103.169.127.40.in-addr.arpa udp
US 8.8.8.8:53 171.39.242.20.in-addr.arpa udp
US 8.8.8.8:53 147.142.123.92.in-addr.arpa udp
US 104.23.140.12:80 image.prntscr.com tcp
US 104.23.140.12:80 image.prntscr.com tcp
US 8.8.8.8:53 www.youtube.com udp
US 8.8.8.8:53 player.vimeo.com udp
SG 118.139.179.30:80 www.linkwithin.com tcp
US 104.23.140.12:80 image.prntscr.com tcp
SG 118.139.179.30:80 www.linkwithin.com tcp
US 8.8.8.8:53 www.google.com udp
FR 142.250.179.68:445 www.google.com tcp
US 8.8.8.8:53 i.ytimg.com udp
FR 142.250.179.78:443 www.youtube.com udp
FR 142.250.179.86:443 i.ytimg.com tcp
US 8.8.8.8:53 86.179.250.142.in-addr.arpa udp
US 8.8.8.8:53 78.179.250.142.in-addr.arpa udp
US 8.8.8.8:53 googleads.g.doubleclick.net udp
US 8.8.8.8:53 static.doubleclick.net udp
US 8.8.8.8:53 jnn-pa.googleapis.com udp
FR 216.58.214.166:443 static.doubleclick.net tcp
FR 142.250.74.234:443 jnn-pa.googleapis.com tcp
FR 142.250.74.234:443 jnn-pa.googleapis.com udp
US 8.8.8.8:53 play.google.com udp
US 8.8.8.8:53 166.214.58.216.in-addr.arpa udp
US 8.8.8.8:53 234.74.250.142.in-addr.arpa udp
FR 142.250.75.238:443 play.google.com tcp
FR 142.250.75.238:443 play.google.com tcp
FR 142.250.75.238:443 play.google.com udp
US 8.8.8.8:53 238.75.250.142.in-addr.arpa udp
FR 142.250.179.98:443 googleads.g.doubleclick.net tcp
FR 142.250.179.98:443 googleads.g.doubleclick.net tcp
US 8.8.8.8:53 www.google.com udp
FR 142.250.179.98:443 googleads.g.doubleclick.net udp
US 8.8.8.8:53 98.179.250.142.in-addr.arpa udp
US 8.8.8.8:53 102.144.22.2.in-addr.arpa udp
FR 142.250.178.142:443 www.youtube.com udp
US 8.8.8.8:53 widgets.amung.us udp
FR 142.250.179.68:443 www.google.com tcp
FR 216.58.215.34:445 pagead2.googlesyndication.com tcp
US 104.22.74.171:80 widgets.amung.us tcp
FR 172.217.20.174:80 www.google-analytics.com tcp
US 8.8.8.8:53 t.dtscout.com udp
US 141.101.120.11:443 t.dtscout.com tcp
FR 142.250.179.105:443 resources.blogblog.com udp
US 8.8.8.8:53 68.179.250.142.in-addr.arpa udp
US 8.8.8.8:53 171.74.22.104.in-addr.arpa udp
US 8.8.8.8:53 174.20.217.172.in-addr.arpa udp
US 8.8.8.8:53 11.120.101.141.in-addr.arpa udp
FR 142.250.179.98:139 pagead2.googlesyndication.com tcp
US 8.8.8.8:53 whos.amung.us udp
US 104.22.74.171:445 whos.amung.us tcp
US 172.67.8.141:445 whos.amung.us tcp
US 104.22.75.171:445 whos.amung.us tcp
US 8.8.8.8:53 43.229.111.52.in-addr.arpa udp
US 8.8.8.8:53 whos.amung.us udp
US 8.8.8.8:53 tse1.mm.bing.net udp
US 150.171.27.10:443 tse1.mm.bing.net tcp
US 150.171.27.10:443 tse1.mm.bing.net tcp
US 150.171.27.10:443 tse1.mm.bing.net tcp
US 150.171.27.10:443 tse1.mm.bing.net tcp
US 150.171.27.10:443 tse1.mm.bing.net tcp
US 8.8.8.8:53 57.169.31.20.in-addr.arpa udp
FR 142.250.75.238:443 play.google.com udp
US 8.8.8.8:53 miraculousladybugbr.blogspot.com.co udp
FR 142.250.75.225:80 miraculousladybugbr.blogspot.com.co tcp
US 8.8.8.8:53 miraculousladybugbr.blogspot.com udp
FR 142.250.75.225:80 miraculousladybugbr.blogspot.com tcp
US 8.8.8.8:53 225.75.250.142.in-addr.arpa udp
US 8.8.8.8:53 udp

Files

C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad\settings.dat

MD5 847d47008dbea51cb1732d54861ba9c9
SHA1 f2099242027dccb88d6f05760b57f7c89d926c0d
SHA256 10292fa05d896a2952c1d602a72d761d34bc776b44d6a7df87e49b5b613a8ac1
SHA512 bd1526aa1cc1c016d95dfcc53a78b45b09dde4ce67357fc275ab835dbe1bb5b053ca386239f50cde95ad243a9c1bbb12f7505818577589beecc6084f7b94e83f

\??\pipe\LOCAL\crashpad_2448_RICVCLZJQIEAYXKE

MD5 d41d8cd98f00b204e9800998ecf8427e
SHA1 da39a3ee5e6b4b0d3255bfef95601890afd80709
SHA256 e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855
SHA512 cf83e1357eefb8bdf1542850d66d8007d620e4050b5715dc83f4a921d36ce9ce47d0d13c5d85f2b0ff8318d2877eec2f63b931bd47417a81a538327af927da3e

C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad\settings.dat

MD5 f9664c896e19205022c094d725f820b6
SHA1 f8f1baf648df755ba64b412d512446baf88c0184
SHA256 7121d84202a850791c2320385eb59eda4d697310dc51b1fcd4d51264aba2434e
SHA512 3fa5d2c68a9e70e4a25eaac2095171d87c741eec2624c314c6a56f4fa390d6319633bf4c48b1a4af7e9a0451f346beced9693da88cfc7bcba8dfe209cbd1b3ae

C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Preferences

MD5 a958aacd72daa7f4717c168be4fed764
SHA1 caae8f6e52bc3fbce9de22e2557d728c6a9eb5ee
SHA256 385ed09bc87ab41eb2f0e6d9060899176b7fe1e47ba757bd83ac915a40c7b9ad
SHA512 72bdc791ee044633dc8cce90d592e46737867121a625cd42ba19501dd44356294d1af4b4b42cf99972c2853c06f5573359ac5efed789376bc4b0ff71f9fedb9c

C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Local State

MD5 8ab4cfc6e88ddf038f432327c2f12eb0
SHA1 60e02ab51c0ffe75f9d4751a332441c1e1599d33
SHA256 c61f3aecf9006f9cc307facd359b2223adbfc23d13ad7196c47bd4494a56d076
SHA512 18900870303c9d581a0f89782d409f7dee64428d52b35d2182d33d97aea9b5e8bfab24d71927a14bb88b19b7411146a82d72bf6b21df77514afb969278240a20

C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Preferences

MD5 f56ab1449be5531522145dd7a5dacbc3
SHA1 99b64f0bb274d99844c7ed8c2c8c7a5d6d7ef604
SHA256 e044d1e1f7cdadc69e8a98389e4379949e6548cc0862fab44559c445659b5254
SHA512 770612749844adf50049a1c56f23d0ca95fe0aa5d432303c95f32ea80be846a4e35444f147a4ad5ce7c44a77a052e22ebfa4b573baa7780b432d5052e4e0cce1

C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\TransportSecurity

MD5 748c373424d0defca8b925fac4560303
SHA1 5c4c4e685cc731db927d15b9b6f0d5edfebe03f6
SHA256 f4358083eb176fb3a257b06ada6b3b0fc01cf5edd45627ecc97d87974487b38b
SHA512 60aea10568900383629abf9b29bc91ae0477fee74235152a6c6d9f99d79b05a0e4322b5509c086c7ab39ac630cfeec749781d24d0a5d9950c79b8ad368afa3cc

C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\TransportSecurity~RFe57fef1.TMP

MD5 b82b9cd2d50f6681683a8c5c724ab9c9
SHA1 8f36e5b792d9cff376c507763a18c4eadffcbd9b
SHA256 4738c16624d5d7274a8c713172c91b593dbbfa77ec13bdba059155f17b0a9f87
SHA512 7cbd1432cd3fe806c36cd5535a25c83ba2e4ee657789ed25f99d1c7d134ecfec18b52435952f5db2fb47729dc9eff0b8a5e7a81fd62ca8c2b0a37ed51c871e0f

C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\TransportSecurity

MD5 2aa3d4ee981c17938c487d80c83ae6f4
SHA1 e111f27089329d27d023aa0e5bcd085c2735442f
SHA256 48d419950f2f29f9a94067ce59a71e85b74b16e38968c38b8d32af0e99c62d2f
SHA512 d69808164c02e031fb30410c0a4e17d0e351f1825605ac971f6840e2a6ed583ef254914b4271ed19d9fa5bdd8a7c841e85b79da6dc2096a9724b4d8547afe20a

C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Network Persistent State

MD5 615c0eb0c24ba6d3b1c0c301292375bb
SHA1 a13cc9e56987bcfcc37f576f467176d669587e1f
SHA256 d6fca91e6905804d30b48a1ed719f251324160ad7d069be4ab4522b5e1e5a8a3
SHA512 3ef41bb9140ebdeced464a74ba47f99abe6d234944b53d657ee6d63a136f7ce1830be395e871b76fe651bb36ad99d0a98738673a431032c22dc5c700bea201eb

C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\36e94b1a-b8e6-4dfe-840f-5b994ed8dd0c.tmp

MD5 bd2c7738f7f21a92c08ae47683bca287
SHA1 7f0cebf6dada6d3cf31fdbd2811c9b6157c6b64d
SHA256 b3c2122f110b65efc852afac8aabc8b08bcccef2092e32f7d9a6a20f63afbb6d
SHA512 d0c5bed08a4ea733189d585c328ccc051b888ba6e8bcb308983d477d9c3e2809d02acd6175016d6840e3eb6db5320f875bd58b5b03d70d68a2c8b624ae3b4ac8

C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index

MD5 f4ca26b38efda087b17c7960f593c56a
SHA1 c7bcc1c09afadcd098f14d48324a5e9896b382da
SHA256 27002dc37c746b854438ee5b19d0e46c55f67f0f9a4fecf79d168f621f5752aa
SHA512 442b8a6e25db248ba6c6806dceb893f51931882e15cef0ff9b0df58ce1cce7deebc450ba49eb0d56ec1cbd5a6286fefe55141eb4836c222bcafce0fecd4e228d

C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\data_reduction_proxy_leveldb\CURRENT

MD5 6752a1d65b201c13b62ea44016eb221f
SHA1 58ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA256 0861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA512 9cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389

C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Preferences

MD5 5fe8eead46688fac62d21f7918eddcbf
SHA1 df6f057389ac224d2a11478e80b36d0e143e749f
SHA256 cceda94d1d7a8c55a86749c7b784bdc8f1aa59d057821b700367cd820fab413b
SHA512 26105e3b16f860940d6ceaddafdd12009e4faceaf850c4ca419ecf9293b09161a59a39142cdf7e34e4613a3ff3ac190a8b697beaef801922520e857664dd205e

C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Network Persistent State

MD5 1cdfe1d938da24967964ad36360fdd17
SHA1 2cee9491bb89e0acbdca0d57156d0905ae67ff02
SHA256 1b540f6e512a5b02ce136a31c784a16003efc0f73005d4c513f7c59e17b5babe
SHA512 44e39c782456b69d1ff425919c633adb3365683dbbb57699e021f5a1ea700ffd861e499863d282e8a872bcb39c80930f56cace9a16312c3be88c8a3dac11ed8c