Malware Analysis Report

2024-10-19 02:44

Sample ID 240826-qdp3xavfmb
Target c310026e49c5f232fe3674fdcf58be42_JaffaCakes118
SHA256 432af9bb18b829f2a008044521a462e6a016b5e746187d12a8bb49bba5b5ea16
Tags
socgholish discovery downloader
score
10/10

Table of Contents

Analysis Overview

MITRE ATT&CK

Enterprise Matrix V15

Analysis: static1

Detonation Overview

Signatures

Analysis: behavioral1

Detonation Overview

Command Line

Signatures

Processes

Network

Files

Analysis: behavioral2

Detonation Overview

Command Line

Signatures

Processes

Network

Files

Analysis Overview

score
10/10

SHA256

432af9bb18b829f2a008044521a462e6a016b5e746187d12a8bb49bba5b5ea16

Threat Level: Known bad

The file c310026e49c5f232fe3674fdcf58be42_JaffaCakes118 was found to be: Known bad.

Malicious Activity Summary

socgholish discovery downloader

SocGholish

Browser Information Discovery

System Location Discovery: System Language Discovery

Modifies Internet Explorer settings

Suspicious use of SetWindowsHookEx

Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary

Suspicious use of SendNotifyMessage

Suspicious use of FindShellTrayWindow

Suspicious use of WriteProcessMemory

Enumerates system info in registry

Suspicious behavior: EnumeratesProcesses

MITRE ATT&CK

Analysis: static1

Detonation Overview

Reported

2024-08-26 13:08

Signatures

N/A

Analysis: behavioral1

Detonation Overview

Submitted

2024-08-26 13:08

Reported

2024-08-26 13:11

Platform

win7-20240704-en

Max time kernel

149s

Max time network

142s

Command Line

"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\c310026e49c5f232fe3674fdcf58be42_JaffaCakes118.html

Signatures

SocGholish

downloader socgholish

System Location Discovery: System Language Discovery

discovery
Description Indicator Process Target
Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE N/A

Modifies Internet Explorer settings

adware spyware
Description Indicator Process Target
Set value (str) \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" C:\Program Files\Internet Explorer\iexplore.exe N/A
Key created \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery C:\Program Files\Internet Explorer\iexplore.exe N/A
Key created \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\IntelliForms C:\Program Files\Internet Explorer\iexplore.exe N/A
Set value (int) \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "430839607" C:\Program Files\Internet Explorer\iexplore.exe N/A
Key created \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\InternetRegistry C:\Program Files\Internet Explorer\iexplore.exe N/A
Key created \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain C:\Program Files\Internet Explorer\iexplore.exe N/A
Key created \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\Zoom C:\Program Files\Internet Explorer\iexplore.exe N/A
Key created \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\DomainSuggestion C:\Program Files\Internet Explorer\iexplore.exe N/A
Key created \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\GPU C:\Program Files\Internet Explorer\iexplore.exe N/A
Key created \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\PageSetup C:\Program Files\Internet Explorer\iexplore.exe N/A
Set value (int) \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{5AF13A51-63AC-11EF-BAAC-CEBD2182E735} = "0" C:\Program Files\Internet Explorer\iexplore.exe N/A
Key created \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\Main C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE N/A
Key created \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive C:\Program Files\Internet Explorer\iexplore.exe N/A
Key created \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch C:\Program Files\Internet Explorer\iexplore.exe N/A
Set value (int) \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" C:\Program Files\Internet Explorer\iexplore.exe N/A
Key created \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\Main C:\Program Files\Internet Explorer\iexplore.exe N/A
Key created \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\LowRegistry C:\Program Files\Internet Explorer\iexplore.exe N/A
Key created \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\Toolbar C:\Program Files\Internet Explorer\iexplore.exe N/A
Key created \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser C:\Program Files\Internet Explorer\iexplore.exe N/A
Set value (int) \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" C:\Program Files\Internet Explorer\iexplore.exe N/A
Key created \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic C:\Program Files\Internet Explorer\iexplore.exe N/A
Key created \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\IETld\LowMic C:\Program Files\Internet Explorer\iexplore.exe N/A
Key created \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage C:\Program Files\Internet Explorer\iexplore.exe N/A
Set value (int) \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" C:\Program Files\Internet Explorer\iexplore.exe N/A
Set value (str) \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" C:\Program Files\Internet Explorer\iexplore.exe N/A
Set value (data) \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 C:\Program Files\Internet Explorer\iexplore.exe N/A

Suspicious use of FindShellTrayWindow

Description Indicator Process Target
N/A N/A C:\Program Files\Internet Explorer\iexplore.exe N/A

Processes

C:\Program Files\Internet Explorer\iexplore.exe

"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\c310026e49c5f232fe3674fdcf58be42_JaffaCakes118.html

C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE

"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1944 CREDAT:275457 /prefetch:2

Network

Country Destination Domain Proto
US 8.8.8.8:53 code.jquery.com udp
US 8.8.8.8:53 www.blogger.com udp
US 8.8.8.8:53 ajax.googleapis.com udp
US 8.8.8.8:53 static.tumblr.com udp
US 8.8.8.8:53 apis.google.com udp
US 8.8.8.8:53 i1231.photobucket.com udp
US 8.8.8.8:53 heartbeat.my udp
US 8.8.8.8:53 resources.blogblog.com udp
US 8.8.8.8:53 3.bp.blogspot.com udp
US 8.8.8.8:53 2.bp.blogspot.com udp
US 8.8.8.8:53 img1.blogblog.com udp
US 8.8.8.8:53 1.bp.blogspot.com udp
US 8.8.8.8:53 www.linkwithin.com udp
US 8.8.8.8:53 i1117.photobucket.com udp
US 8.8.8.8:53 img.photobucket.com udp
US 8.8.8.8:53 i1135.photobucket.com udp
US 8.8.8.8:53 upic.me udp
US 8.8.8.8:53 i.imgur.com udp
US 8.8.8.8:53 s7.addthis.com udp
US 8.8.8.8:53 www.clocklink.com udp
US 8.8.8.8:53 busuk.org udp
US 8.8.8.8:53 www.guablog.com udp
US 8.8.8.8:53 dl9.glitter-graphics.net udp
US 8.8.8.8:53 exeideasinternational.googlecode.com udp
US 8.8.8.8:53 4.bp.blogspot.com udp
FR 142.250.179.97:80 4.bp.blogspot.com tcp
FR 142.250.179.105:443 img1.blogblog.com tcp
FR 142.250.179.97:80 4.bp.blogspot.com tcp
FR 142.250.179.105:443 img1.blogblog.com tcp
FR 142.250.179.105:443 img1.blogblog.com tcp
GB 216.137.44.17:80 i1135.photobucket.com tcp
FR 142.250.179.105:443 img1.blogblog.com tcp
GB 216.137.44.17:80 i1135.photobucket.com tcp
FR 142.250.179.97:80 4.bp.blogspot.com tcp
US 151.101.66.137:80 code.jquery.com tcp
FR 142.250.179.105:443 img1.blogblog.com tcp
GB 216.137.44.17:80 i1135.photobucket.com tcp
LT 93.115.28.104:80 www.guablog.com tcp
GB 216.137.44.17:80 i1135.photobucket.com tcp
LT 93.115.28.104:80 www.guablog.com tcp
FR 142.250.179.97:80 4.bp.blogspot.com tcp
FR 142.250.179.97:80 4.bp.blogspot.com tcp
US 151.101.66.137:80 code.jquery.com tcp
GB 216.137.44.125:80 i1135.photobucket.com tcp
GB 216.137.44.125:80 i1135.photobucket.com tcp
US 199.232.196.193:80 i.imgur.com tcp
US 199.232.196.193:80 i.imgur.com tcp
SG 118.139.179.30:80 www.linkwithin.com tcp
SG 118.139.179.30:80 www.linkwithin.com tcp
GB 216.137.44.125:80 i1135.photobucket.com tcp
GB 216.137.44.125:80 i1135.photobucket.com tcp
US 104.21.91.94:80 upic.me tcp
GB 216.137.44.119:80 i1135.photobucket.com tcp
US 104.21.91.94:80 upic.me tcp
GB 216.137.44.119:80 i1135.photobucket.com tcp
US 216.230.241.100:80 www.clocklink.com tcp
US 216.230.241.100:80 www.clocklink.com tcp
GB 216.137.44.125:80 i1135.photobucket.com tcp
GB 216.137.44.125:80 i1135.photobucket.com tcp
GB 104.96.173.184:80 s7.addthis.com tcp
GB 104.96.173.184:80 s7.addthis.com tcp
FR 142.250.179.97:80 4.bp.blogspot.com tcp
FR 142.250.179.97:80 4.bp.blogspot.com tcp
FR 142.250.179.97:80 4.bp.blogspot.com tcp
FR 142.250.179.105:443 img1.blogblog.com tcp
FR 142.250.179.105:443 img1.blogblog.com tcp
FR 142.250.179.105:443 img1.blogblog.com tcp
US 104.21.26.218:80 busuk.org tcp
FR 142.250.179.97:80 4.bp.blogspot.com tcp
US 104.21.26.218:80 busuk.org tcp
FR 142.250.179.97:80 4.bp.blogspot.com tcp
FR 142.250.178.142:443 apis.google.com tcp
IE 172.253.116.82:80 exeideasinternational.googlecode.com tcp
IE 172.253.116.82:80 exeideasinternational.googlecode.com tcp
FR 142.250.178.142:443 apis.google.com tcp
FR 142.250.74.234:443 ajax.googleapis.com tcp
FR 142.250.74.234:443 ajax.googleapis.com tcp
FR 142.250.74.234:80 ajax.googleapis.com tcp
FR 142.250.74.234:80 ajax.googleapis.com tcp
US 192.0.77.40:80 static.tumblr.com tcp
US 192.0.77.40:80 static.tumblr.com tcp
US 8.8.8.8:53 i1227.photobucket.com udp
DE 46.4.70.136:80 dl9.glitter-graphics.net tcp
DE 46.4.70.136:80 dl9.glitter-graphics.net tcp
MY 117.53.152.181:80 heartbeat.my tcp
MY 117.53.152.181:80 heartbeat.my tcp
GB 216.137.44.125:80 i1227.photobucket.com tcp
GB 216.137.44.125:80 i1227.photobucket.com tcp
GB 216.137.44.125:80 i1227.photobucket.com tcp
GB 216.137.44.125:80 i1227.photobucket.com tcp
GB 216.137.44.125:80 i1227.photobucket.com tcp
GB 216.137.44.125:80 i1227.photobucket.com tcp
GB 216.137.44.125:80 i1227.photobucket.com tcp
GB 216.137.44.125:80 i1227.photobucket.com tcp
GB 216.137.44.125:443 i1227.photobucket.com tcp
GB 216.137.44.125:443 i1227.photobucket.com tcp
GB 216.137.44.125:443 i1227.photobucket.com tcp
GB 216.137.44.125:443 i1227.photobucket.com tcp
GB 216.137.44.125:443 i1227.photobucket.com tcp
GB 216.137.44.125:443 i1227.photobucket.com tcp
GB 216.137.44.125:443 i1227.photobucket.com tcp
US 199.232.196.193:443 i.imgur.com tcp
GB 216.137.44.17:443 i1227.photobucket.com tcp
GB 216.137.44.119:443 i1227.photobucket.com tcp
GB 216.137.44.17:443 i1227.photobucket.com tcp
US 192.0.77.40:443 static.tumblr.com tcp
US 104.21.26.218:443 busuk.org tcp
US 104.21.26.218:443 busuk.org tcp
US 8.8.8.8:53 c.pki.goog udp
FR 216.58.214.163:80 c.pki.goog tcp
FR 216.58.214.163:80 c.pki.goog tcp
FR 216.58.214.163:80 c.pki.goog tcp
FR 216.58.214.163:80 c.pki.goog tcp
FR 216.58.214.163:80 c.pki.goog tcp
US 8.8.8.8:53 c.pki.goog udp
FR 216.58.214.163:80 c.pki.goog tcp
FR 216.58.214.163:80 c.pki.goog tcp
FR 216.58.214.163:80 c.pki.goog tcp
FR 216.58.214.163:80 c.pki.goog tcp
FR 216.58.214.163:80 c.pki.goog tcp
FR 216.58.214.163:80 c.pki.goog tcp
FR 216.58.214.163:80 c.pki.goog tcp
FR 216.58.214.163:80 c.pki.goog tcp
FR 216.58.214.163:80 c.pki.goog tcp
FR 216.58.214.163:80 c.pki.goog tcp
FR 216.58.214.163:80 c.pki.goog tcp
FR 216.58.214.163:80 c.pki.goog tcp
FR 216.58.214.163:80 c.pki.goog tcp
FR 216.58.214.163:80 c.pki.goog tcp
US 8.8.8.8:53 o.pki.goog udp
US 8.8.8.8:53 o.pki.goog udp
US 8.8.8.8:53 o.pki.goog udp
US 8.8.8.8:53 o.pki.goog udp
US 8.8.8.8:53 o.pki.goog udp
US 8.8.8.8:53 o.pki.goog udp
US 8.8.8.8:53 o.pki.goog udp
US 8.8.8.8:53 o.pki.goog udp
US 8.8.8.8:53 o.pki.goog udp
US 8.8.8.8:53 o.pki.goog udp
US 8.8.8.8:53 o.pki.goog udp
FR 216.58.214.163:80 o.pki.goog tcp
FR 216.58.214.163:80 o.pki.goog tcp
FR 216.58.214.163:80 o.pki.goog tcp
FR 216.58.214.163:80 o.pki.goog tcp
FR 216.58.214.163:80 o.pki.goog tcp
FR 216.58.214.163:80 o.pki.goog tcp
FR 216.58.214.163:80 o.pki.goog tcp
FR 216.58.214.163:80 o.pki.goog tcp
FR 216.58.214.163:80 o.pki.goog tcp
FR 216.58.214.163:80 o.pki.goog tcp
FR 216.58.214.163:80 o.pki.goog tcp
FR 216.58.214.163:80 o.pki.goog tcp
US 8.8.8.8:53 synad2.nuffnang.com.my udp
US 8.8.8.8:53 i1218.photobucket.com udp
US 8.8.8.8:53 t1.gstatic.com udp
US 8.8.8.8:53 farm4.staticflickr.com udp
US 8.8.8.8:53 dl.glitter-graphics.net udp
GB 216.137.44.112:80 i1218.photobucket.com tcp
GB 216.137.44.112:80 i1218.photobucket.com tcp
DE 46.4.70.136:80 dl.glitter-graphics.net tcp
DE 46.4.70.136:80 dl.glitter-graphics.net tcp
FR 172.217.20.196:80 t1.gstatic.com tcp
FR 172.217.20.196:80 t1.gstatic.com tcp
GB 18.245.160.68:80 farm4.staticflickr.com tcp
GB 18.245.160.68:80 farm4.staticflickr.com tcp
GB 216.137.44.112:443 i1218.photobucket.com tcp
GB 18.245.160.68:443 farm4.staticflickr.com tcp
US 216.230.241.100:80 www.clocklink.com tcp
US 8.8.8.8:53 crl.microsoft.com udp
GB 2.18.190.71:80 crl.microsoft.com tcp
US 8.8.8.8:53 www.facebook.com udp
US 8.8.8.8:53 data.whicdn.com udp
US 8.8.8.8:53 www6.cbox.ws udp
GB 216.137.44.125:80 i1218.photobucket.com tcp
US 8.8.8.8:53 img838.imageshack.us udp
US 8.8.8.8:53 developers.google.com udp
DE 157.240.27.35:80 www.facebook.com tcp
DE 157.240.27.35:80 www.facebook.com tcp
US 8.8.8.8:53 cur.cursors-4u.net udp
US 8.8.8.8:53 accounts.google.com udp
US 108.181.41.161:80 www6.cbox.ws tcp
US 108.181.41.161:80 www6.cbox.ws tcp
US 38.99.77.16:80 img838.imageshack.us tcp
US 38.99.77.16:80 img838.imageshack.us tcp
US 8.8.8.8:53 i1101.photobucket.com udp
FR 142.250.179.110:80 developers.google.com tcp
FR 142.250.179.110:80 developers.google.com tcp
US 96.43.128.66:80 cur.cursors-4u.net tcp
US 96.43.128.66:80 cur.cursors-4u.net tcp
IE 74.125.193.84:443 accounts.google.com tcp
IE 74.125.193.84:443 accounts.google.com tcp
DE 157.240.27.35:443 www.facebook.com tcp
DE 157.240.27.35:443 www.facebook.com tcp
GB 216.137.44.119:80 i1101.photobucket.com tcp
GB 216.137.44.119:80 i1101.photobucket.com tcp
GB 216.137.44.119:443 i1101.photobucket.com tcp
FR 142.250.179.110:443 developers.google.com tcp
US 8.8.8.8:53 www.microsoft.com udp
US 8.8.8.8:53 www.microsoft.com udp
US 96.43.128.66:443 cur.cursors-4u.net tcp
US 8.8.8.8:53 ssl.gstatic.com udp
FR 142.250.179.97:443 4.bp.blogspot.com tcp
US 8.8.8.8:53 lh3.googleusercontent.com udp
FR 142.250.179.97:443 4.bp.blogspot.com tcp
FR 142.250.179.97:443 4.bp.blogspot.com tcp
FR 142.250.179.97:443 4.bp.blogspot.com tcp
FR 142.250.179.97:443 4.bp.blogspot.com tcp
FR 142.250.179.97:443 4.bp.blogspot.com tcp
US 8.8.8.8:53 lh4.googleusercontent.com udp
FR 142.250.178.129:443 lh4.googleusercontent.com tcp
FR 142.250.178.129:443 lh4.googleusercontent.com tcp
FR 142.250.178.129:443 lh4.googleusercontent.com tcp
FR 142.250.178.129:443 lh4.googleusercontent.com tcp
FR 142.250.178.129:443 lh4.googleusercontent.com tcp
FR 142.250.178.129:443 lh4.googleusercontent.com tcp
FR 142.250.178.129:443 lh4.googleusercontent.com tcp
FR 142.250.178.129:443 lh4.googleusercontent.com tcp
FR 142.250.178.129:443 lh4.googleusercontent.com tcp
FR 142.250.178.129:443 lh4.googleusercontent.com tcp
FR 142.250.179.110:443 developers.google.com tcp
FR 142.250.179.110:443 developers.google.com tcp
FR 142.250.179.110:443 developers.google.com tcp
FR 142.250.179.110:443 developers.google.com tcp
FR 142.250.179.110:443 developers.google.com tcp
US 8.8.8.8:53 developer.android.com udp
US 8.8.8.8:53 gstatic.com udp
FR 142.250.178.129:443 lh4.googleusercontent.com tcp
FR 142.250.178.129:443 lh4.googleusercontent.com tcp
FR 216.58.214.67:443 gstatic.com tcp
FR 216.58.214.67:443 gstatic.com tcp
FR 216.58.214.67:443 gstatic.com tcp
FR 216.58.214.67:443 gstatic.com tcp
FR 216.58.215.46:443 developer.android.com tcp
FR 216.58.215.46:443 developer.android.com tcp
US 96.43.128.66:443 cur.cursors-4u.net tcp
US 96.43.128.66:443 cur.cursors-4u.net tcp
US 8.8.8.8:53 data.whicdn.com udp
US 96.43.128.66:443 cur.cursors-4u.net tcp
US 204.79.197.200:443 ieonline.microsoft.com tcp
US 204.79.197.200:443 ieonline.microsoft.com tcp
US 204.79.197.200:443 ieonline.microsoft.com tcp
IE 74.125.193.84:443 accounts.google.com tcp
IE 74.125.193.84:443 accounts.google.com tcp

Files

C:\Users\Admin\AppData\Local\Temp\Tar9301.tmp

MD5 4ea6026cf93ec6338144661bf1202cd1
SHA1 a1dec9044f750ad887935a01430bf49322fbdcb7
SHA256 8efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA512 6c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b

C:\Users\Admin\AppData\Local\Temp\Cab92FE.tmp

MD5 49aebf8cbd62d92ac215b2923fb1b9f5
SHA1 1723be06719828dda65ad804298d0431f6aff976
SHA256 b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512 bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b

C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

MD5 bf7a0aefa2f6ef8f38427c80da4c2c8e
SHA1 c72b776b353c2933023485d73e5556d2c720ac42
SHA256 5b91972771d17e42719e63ee799c801e1791d78f1a7c69e182422603702c91d7
SHA512 3c8a51a39b06de0ede6050559a4d9248cd5840d69343bba9366e499b61a80d2caeca7300314a4b915cff31add74985b3845d66834683e1c135df62783325df29

C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

MD5 125221da0eb45a7b449233ed3d0910e7
SHA1 e379f79f11399aed04a02b4c77c6746cfb269cad
SHA256 87a66cc66656a3d51f63b9cca4af253e0dc5360029a206e0a0d81cc512f90c8e
SHA512 eb3db90c43481d6f79ec8dfbb0ec6397e44dc8775ed5a7bc2369d8811f4a987f53176581765cab8e2c8bb039b0872a7c38161897bec05242a952767b003d4a61

C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\070E0202839D9D67350CD2613E78E416

MD5 2a0de00b6f6cfe40fd88ea5fe320b2fb
SHA1 760d8975609497cd950842d6a9a1e59aff6efce6
SHA256 bed864bdef4522982821d1d9edf2c04210b8dcdd786aec5b254a040084eee64e
SHA512 2ae16bffaa2359644002cab8f35c6a190d75b712e738ba58771975c8b212916b61863fb5b9ed929126a458c0496a645d5ef37dfbe234348a64cc090ef7072c3d

C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\070E0202839D9D67350CD2613E78E416

MD5 55540a230bdab55187a841cfe1aa1545
SHA1 363e4734f757bdeb89868efe94907774a327695e
SHA256 d73494e3446b02167573b3cde3ae1c8584ac26e15e45ac3ec0326708425d90fb
SHA512 c899cb1d31d3214fd9dc8626a55e40580d3b2224bf34310c2abd85d0f63e2dedaeae57832f048c2f500cb2cbf83683fcb14139af3f0b5251606076cdb4689c54

C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

MD5 9c79bef48b451c8a352582629e3112e6
SHA1 84bf418acb025a7752999a95bd2d95ce8c069948
SHA256 a5fecf12cdd24b423cf1eeaa26fd10b0ccc574ac3ea08e7383648bde050be9c2
SHA512 b3febbca26de928edff72572b7d00af3cf1d99af68c1bea724da1dcf23d22514958059b9f325a556cb37982052cc8a0cb1ddb7c2f0bc8859df25480e9edc2cc3

C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\B66240B0F6C84BD4857ABA60CF5CE4A0_5043E0F5DF723415C9EECC201C838A62

MD5 c65024ff786a34c76810761027ba9597
SHA1 134cf9d6a74fb5e323e4946b3c64d8587e9c851d
SHA256 da629e9d7a599ab9fa30483d00134753496ade0af60f92af58a9668fff2c663c
SHA512 d01dbe43725773fcfaf7104f9a4e21790999e9ea08bb69197a7a373eb147d2c3437bc6937bda565818995c7a6bfe8071f18c9c29cc0a7986468d4eebfd19c339

C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\24BD96D5497F70B3F510A6B53CD43F3E_3A89246FB90C5EE6620004F1AE0EB0EA

MD5 003e8f0837f743e97136602d4a75dd1e
SHA1 842f588b2ac71dfc5fcc36aef8e4ce7de593d038
SHA256 faff8d397a3ff971e6a9f2656448102d9842f4dbf03aa08b486009b7167111e6
SHA512 4e12d8321958adb25823747e74dd6456eaf18ddfd3a6517e247143af80ca09b32c6dd22cad209393e7b73086a332705c91bf15c806a9683fe00b4b5706b44d08

C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\24BD96D5497F70B3F510A6B53CD43F3E_3A89246FB90C5EE6620004F1AE0EB0EA

MD5 eecdf0a7dcf35d061d4f6ef3a799307f
SHA1 9204d28a1720eb5f94c303ed96a0b9330cceb647
SHA256 37e52308a382dfa7a2233b3a708175fe7945ed6c90605ec50c7171971c06f923
SHA512 370a6a75c2328eb5c37ba8817c145b571108644edb28ea84e8fc6a759006161cffad3db4f21d6d00b492894d1ea7f07653aeaa325f6f7eb74ea48e96aee8ca65

C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\24BD96D5497F70B3F510A6B53CD43F3E_3A89246FB90C5EE6620004F1AE0EB0EA

MD5 06d9b2232191a7dbd5132ef761c22c17
SHA1 0d3aa55f87821cc71aa7474a108e3ef85294e96b
SHA256 ea8b654de5c5247275cd750b021a62ff5a7398f427ea314bc4e4a50ce0961a3b
SHA512 f319832d381618ccc10ae03de3005fb3fc2acfc0045e7d03595323a47d79d3bdc0ae9e4b221dfc8c339c4ffb9e7aec4569c1a2588eb37cf5e34c69a9a6dc8fa9

C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\05DDC6AA91765AACACDB0A5F96DF8199

MD5 e935bc5762068caf3e24a2683b1b8a88
SHA1 82b70eb774c0756837fe8d7acbfeec05ecbf5463
SHA256 a8accfcfeb51bd73df23b91f4d89ff1a9eb7438ef5b12e8afda1a6ff1769e89d
SHA512 bed4f6f5357b37662623f1f8afed1a3ebf3810630b2206a0292052a2e754af9dcfe34ee15c289e3d797a8f33330e47c14cbefbc702f74028557ace29bf855f9e

C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\05DDC6AA91765AACACDB0A5F96DF8199

MD5 3a82d364eb36b9d9b36ed79dc866d57c
SHA1 5ecfe975686b98933b1c25df64c6598734658ac7
SHA256 f52ab0f81dd36b1561c8d8682576723ea2663cddf68bccd9f375a7b400d329be
SHA512 daae00f89bdb7a504cec23532a85c2bbc75bf1d472a80b0ad28bd12370b7f4ab3abc3ce913cbffc2c18f8dda6508779975210a43bf8c2327461b82b60520bda3

C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\05DDC6AA91765AACACDB0A5F96DF8199

MD5 a7e9661e0f61789775774bbbe85cd174
SHA1 2f7af068c490842c7189e18b50caef867f9e64af
SHA256 98f27b3a6dd76e2acdc6ea97e2a3db2d2b39753b0409018fedf61eeb52eeefe0
SHA512 95bdea2fd94b1ec139958b2eaae975ecaee9af25dc7d2bd2e9505ec335f96660f713e0708b9313a2e2ca24da78fa971f5d36ac27c4945f9113b7e36a8f4d8e62

C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\4MP1SLKR\banner[1].htm

MD5 13d4e6ef14c144a5732c8a16f07d3ce5
SHA1 2ff71998fe3f628f0e23ee13accaa7d4da661d05
SHA256 d82245c9619e575516401968aebeb93342e781e1a36fdd034a5359ef74e0de25
SHA512 dd4c4a8e9b52c5a01535a02ec174b18e19dc35ef90012ae8a87307480e3c1f192c533b2615e7ce2b86e1cf2bc82907ec18789252961952410948923b70b8fc8f

C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\B3513D73A177A2707D910183759B389B_147AB4536A182B9FCE88E194D59F3B22

MD5 1c33733bba48dc1da9b3b72aa0d51872
SHA1 4cf2d3db81647006bb5f53aa30b9db7bcaf0d655
SHA256 88c15dbd932201db0eb1903827bcc264ed9abc80bcf323f4c49080ffcacc58b0
SHA512 3336ea7634bf22b2989549b621596496308446595d0e3b291902767883d901106aa5ed405789047b83c5ab97ffa05db2afe0d987593cae37c5a90c9e1b680988

C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\B3513D73A177A2707D910183759B389B_147AB4536A182B9FCE88E194D59F3B22

MD5 ae195044f68e868cdca7f19bd1f00f17
SHA1 aaf8a87a0fafc83c5f5b2dbfb454b06e0683dc89
SHA256 58a23b0a4f04dbe116f6d6259734d0146df22672ac6e72cea70216e529849142
SHA512 b228e5ad4980091c8c857c35fb3d17f409af61c3b1f08c4de219a8e0dea43c7e21ab0a455d61f11d4a975e30e631d41ce8561d94423dd527bd1916af69e4f2ae

C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\2LF9I1AK\2[1].htm

MD5 d91e3db45cf52449605e8b30f901c428
SHA1 6601a9b3105d78a01fa9a44cc80ac34d2b3deee3
SHA256 b785d19b6ff4d9a846411ad4d368b10fe39f04a0095287246bdcd1b0a58664c4
SHA512 6f43a03a206efeb1ddb84e38c09204d71a3c5b889ac5f869c879df2566a63b6080b965b740fa3f0887358d427d94c905dea0e4bd57fc03136c7c65a15a6920e6

C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\69P6875H\cb=gapi[1].js

MD5 cb98a2420cd89f7b7b25807f75543061
SHA1 b9bc2a7430debbe52bce03aa3c7916bedfd12e44
SHA256 bea369fc5bdd5b9b473441583c46b9939232bf1f98c1cedf6bc2241c4f5068d4
SHA512 49ccede4596d1e5640a9c8e8be333f9c18812d58f02b2b15adb54172df1387439e9dc5afc4ccd9d8f0f75f092318bed68d3cd577338e88ef4f9373de8a07c44e

C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

MD5 b550b44fe450fb9fe351d1ae57d6c6f1
SHA1 06584fafdb42fa8603f53030551d608667daf357
SHA256 c975e07745e31ed64bb5a9da5ba46f5eb90583a07e542a777b200953a7dedbf7
SHA512 436721defc02d2b9350ebe2ee46a1574f6e63af0a8854a4e4771b2b7dbf7eebd93dbb4367c6af60f3ea75724a4b259b969cb2e2ac277814690bf497423af56e1

C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\F0ACCF77CDCBFF39F6191887F6D2D357

MD5 906ab1acf5193b02ef774947091215da
SHA1 2c2e40ab75c926f99a3e76e233a87a797c88c019
SHA256 66f81e9ccc20d6128d9afb161bbd5439e2b8d057a3de741cc1f4c5e4a7d7c6cb
SHA512 64c488357774fe7470dbc3af49352a41dbda4889b27d4f0eaa94d9422aa00b57d239bcf968300edc14104f202dec655a7e3c60e27171ca49e43b06fcafe69b2b

C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\F0ACCF77CDCBFF39F6191887F6D2D357

MD5 a266bb7dcc38a562631361bbf61dd11b
SHA1 3b1efd3a66ea28b16697394703a72ca340a05bd5
SHA256 df545bf919a2439c36983b54cdfc903dfa4f37d3996d8d84b4c31eec6f3c163e
SHA512 0da8ef4f8f6ed3d16d2bc8eb816b9e6e1345dfe2d91160196c47e6149a1d6aedaafadcefd66acdea7f72dcf0832770192ceac15b0c559c4ccc2c0e5581d5aefc

C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\69P6875H\platform[1].js

MD5 45e854a35529759d934c731304a43d38
SHA1 a8df66d8d97fdaf183b3b8b806233b4ac0659eb2
SHA256 a545c66e7db300836d0f8e0c5c407c6b44baa277e32d744e08d331c7c3d6ffb9
SHA512 5efdd24697fc8247f9a1f8ac3e80df23efdfee54a25f8b63565276338177b36b90fb3a5f80c8654f91922e3f668798d37b4379bb41bb4059965f915287729e48

C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\C02877841121CC45139CB51404116B25_D71A94740B0CED76EBD7AAE2374CBE8B

MD5 eec971bc753cc9e2e6b53f9a70b2ec46
SHA1 180800efd67b9f2d3904d26b0f023d091f96e364
SHA256 16d1ff1fe2e5e3897c08895cb20db9b4238e04a9df8c241fcab508d4833ae57e
SHA512 03c8d025850682fbc950f9cc25fb270a87bb585417454bb5ba6ae38dc8ac7687cc2de83e44b1fd24e3fb591ef27393f7bdf156f83d2fd707570b3dc62dbc019b

C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\C02877841121CC45139CB51404116B25_D71A94740B0CED76EBD7AAE2374CBE8B

MD5 25336b209c8ecf5aea0f9f2620ba3362
SHA1 ec17d296fe5ed082f03049a67bed6780895037cb
SHA256 f8fa074c6716ecbb6f7cb0146c2f78d86bec9093e65d88519f3e3da7a6cfb6de
SHA512 ad8041cf898697dac0019a9c59072789bdddaef2096c7d9cbde4a7289b1eada87ac21cb958c76dd417cf9062ca83f6efb6e147df2c457bb1f1a4dd99e33c6426

C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\C02877841121CC45139CB51404116B25_9CE832D646FBAFC5C4ACFC523FDD84AD

MD5 3565d3104fa920a897ae5ae49dfbc5bc
SHA1 4704720303efd716199f5a53390a13549fc054f8
SHA256 e59be9994e30908914b4579c7625d33ab7473e0625c7f1db2c31782cd65c2e09
SHA512 e37a07d3cc4f9f66973f3f0cd9c1e119cd7ca42746045b6a2f0cdde3615a711a47a2423378f1dcfa6d6f620037b86b56a07a73eddf5a6b4d2f064f24efeb52f8

C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\C02877841121CC45139CB51404116B25_9CE832D646FBAFC5C4ACFC523FDD84AD

MD5 8141698a13cdd9a8cef596216b88f39f
SHA1 f79a3d6c0c8da72beaecf4e6632c9b9683b4621e
SHA256 f6eb3ad7b8f46d8dddb866a93d2c0d24dae7aa423ee9afd7a3604a217b126652
SHA512 98d04a65203a13f6cb5f12b2d2ecf75626ec01cac1887de22945c96015710787ad33b917921d09efc54c5ee092c742be00b3fbcda5edd00ef563349e7b89d5c1

C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

MD5 c9810293a5fd9aa4524e87cf87034831
SHA1 4595b7c59b98bd745bba619457539a170f244b63
SHA256 42a042ad9bf4172947545b73b1d29c84bbca10e529aee33794008796081e1c77
SHA512 bb3bfb1801e6012d165e1f974e0f74c813538a35bfa390b2e0b3ed03adc78dfc4d090b42f1bd0989da29e7f2dd3f55b68e784c7a456d370da3f527609fcf47bd

C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

MD5 68c1118da2c9e4a5beffbd633227b783
SHA1 e408693b87c53f6695a7273e0163a558e26679d5
SHA256 4a1a58bf1d10b94a7d7269925f474ffece5ac978b3fb3396baf0daad54c087b1
SHA512 3f06ec7adc5ec175a5987485b7d90380ea6c24555b5a61d377faf1d0a6eb7ae1ef394c29cf4037751dd797edfc8f8736625fcafddf5c7edcfa15a09ddec6f1b9

C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

MD5 fc3dd131e971ff3e4b0f73b90f4b019b
SHA1 5aa563ff71c97364d7ea6ee91d0dcf849c6888c9
SHA256 df0db953757440464faefc98b028a32a340eeedd22e6dae8f003b3de502d078c
SHA512 7da564619caa253643ef10de5c4d0580d9397c126c89f20aaea0522ffa1e69eb942bfda3cc4130b7221550fb80ba63fc27eac3ec0f5891b9a5534cef2da4f844

C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

MD5 3e5e5dbccd2c2f79f8009c9a5361267f
SHA1 9a417b37a87621eec18cd9195e3e50a972c4046a
SHA256 99461100bc49a006e1c7e1487ebd1efc5ee5446071d26dc1f064ea8be59a6ba7
SHA512 dfd0b0f19476163efab278553fde568f4bf21e409d48f4cbc2599c313fb53c7597f519400c71d798c22e60168ea6debd54c6ade933d4300a7b391f4e9b865cd7

C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\3C428B1A3E5F57D887EC4B864FAC5DCC

MD5 e4a68ac854ac5242460afd72481b2a44
SHA1 df3c24f9bfd666761b268073fe06d1cc8d4f82a4
SHA256 cb3ccbb76031e5e0138f8dd39a23f9de47ffc35e43c1144cea27d46a5ab1cb5f
SHA512 5622207e1ba285f172756f6019af92ac808ed63286e24dfecc1e79873fb5d140f1ceb7133f2476e89a5f75f711f9813a9fbb8fd5287f64adfdcc53b864f9bdc5

C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

MD5 1cbcacc6db4a90bbae75f8f28d3203b4
SHA1 30fd10bd24eb31fb1222dbaccf6d991531475b0d
SHA256 3fb98fc9b17c27499c34f7296b2299994b2bb92352a0d65ee7f38d3190c85477
SHA512 9c70126c65a3ad4c141de3b4e283d2d0c7d5c4f30683a5a06a715fef9a8da9989c0851dcc9bef73a8104baef6d6fff1a898e308fe66a0cea087e6997bf96ea15

C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

MD5 17dc91771611ecd3f4a93f6871885e3c
SHA1 938c5610b1b60e6cc9f038e01df3c09c8df2257f
SHA256 b567f9a094e62f687b294b4109351565196eb14f3d0a674bc471223a8458e098
SHA512 933745ed951756ac3013717d4c13aee6297223f2651bd0d9b313e5eb1dcf01268964a45699c657a5fb56350179bfb448170e91607f1fbff859486600bec9ef8d

C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

MD5 9c910cd45485063dc247e12bf3db5cd9
SHA1 64624a476bf62f735ecb70f0cba99057af5e6d66
SHA256 f787ccb1388511cf5aa49b635e89faff0e59ebb86e2f315d750938a9d38ac166
SHA512 f7ffaa0f544a1ff3b51604e18b292708f05bc828574a7dc4a559a80d95ed2ec4de724c8d4bfc514e92f07f0d89f4439ef09b5df20f05b0f9dba80e48880611df

C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\3C428B1A3E5F57D887EC4B864FAC5DCC

MD5 3e43da47def2622aba318fed9bb87fcf
SHA1 d08bf2c4f0cc7b4883646451538e5a3684870027
SHA256 787e8972b7bc45e518eeb396a85135a374d1a47526977d8e6f63c3df468a8fd2
SHA512 4ddbb9e124accb782530e39bcdaeb91e82025c444e99708d12a6a236d6135eb51f04c448a8d441e557f6c701cfd7292a81a966cbf780b1ce3b3c2ff446bd1b09

C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

MD5 2e8012f19f4eef333793aa266c25b888
SHA1 7cb80ab1a7da5de3a953a756c2a21bd1016046f1
SHA256 f33b6ac6740ae3acd7a38fa08f38869500d49406312dceb287888c2765830c2d
SHA512 e4baaa516099bf662497efab61820d87d783e9e9705ceadac2dfbc436010526c799da53b2ad79f8e38242b73aff34ac9ff2d3ccf3e833abb5717cc06efa68bf1

C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\4UQ4J2DQ\1380534674-postmessagerelay[1].js

MD5 c1d4d816ecb8889abf691542c9c69f6a
SHA1 27907b46be6f9fe5886a75ee3c97f020f8365e20
SHA256 01a956fa0b3ea8cb90d7032608512bc289c4170bf92759352e40062d5be2946f
SHA512 f534f057e46998bd1ff2c423ad2cf04a880c4a5259e95aee5c6ae34ce7121ccd07ad1bce5d4c3a51ad04f7411b0625da78808326b13d2aeefec502988e113113

C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\4MP1SLKR\rpc_shindig_random[1].js

MD5 9e5f0b21584389dc1c7b5da4a900879f
SHA1 191b84e0f5644398ba99e0aa141a6778c14b83bf
SHA256 3e21bdafa913fa25276358db1269238db3012ffd8748626cdad442f838e890e3
SHA512 c1720a420df680bcc46625355ed6d5c35ae280a813692a0fa293f3ba113a023808a781f1b8c9dfeb3ffba29606e1f4bb4be4233983089602e2d2c20786fb0427

Analysis: behavioral2

Detonation Overview

Submitted

2024-08-26 13:08

Reported

2024-08-26 13:11

Platform

win10v2004-20240802-en

Max time kernel

149s

Max time network

146s

Command Line

"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\c310026e49c5f232fe3674fdcf58be42_JaffaCakes118.html

Signatures

Browser Information Discovery

discovery

Enumerates system info in registry

Description Indicator Process Target
Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe N/A
Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe N/A
Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe N/A

Suspicious use of FindShellTrayWindow

Description Indicator Process Target
N/A N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe N/A
N/A N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe N/A
N/A N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe N/A
N/A N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe N/A
N/A N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe N/A
N/A N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe N/A
N/A N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe N/A
N/A N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe N/A
N/A N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe N/A
N/A N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe N/A
N/A N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe N/A
N/A N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe N/A
N/A N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe N/A
N/A N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe N/A
N/A N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe N/A
N/A N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe N/A
N/A N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe N/A
N/A N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe N/A
N/A N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe N/A
N/A N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe N/A
N/A N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe N/A
N/A N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe N/A
N/A N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe N/A
N/A N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe N/A
N/A N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe N/A

Suspicious use of SendNotifyMessage

Description Indicator Process Target
N/A N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe N/A
N/A N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe N/A
N/A N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe N/A
N/A N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe N/A
N/A N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe N/A
N/A N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe N/A
N/A N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe N/A
N/A N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe N/A
N/A N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe N/A
N/A N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe N/A
N/A N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe N/A
N/A N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe N/A
N/A N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe N/A
N/A N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe N/A
N/A N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe N/A
N/A N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe N/A
N/A N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe N/A
N/A N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe N/A
N/A N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe N/A
N/A N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe N/A
N/A N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe N/A
N/A N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe N/A
N/A N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe N/A
N/A N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe N/A

Suspicious use of WriteProcessMemory

Description Indicator Process Target
PID 3076 wrote to memory of 2064 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 3076 wrote to memory of 2064 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 3076 wrote to memory of 1028 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 3076 wrote to memory of 1028 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 3076 wrote to memory of 1028 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 3076 wrote to memory of 1028 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 3076 wrote to memory of 1028 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 3076 wrote to memory of 1028 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 3076 wrote to memory of 1028 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 3076 wrote to memory of 1028 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 3076 wrote to memory of 1028 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 3076 wrote to memory of 1028 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 3076 wrote to memory of 1028 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 3076 wrote to memory of 1028 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 3076 wrote to memory of 1028 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 3076 wrote to memory of 1028 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 3076 wrote to memory of 1028 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 3076 wrote to memory of 1028 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 3076 wrote to memory of 1028 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 3076 wrote to memory of 1028 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 3076 wrote to memory of 1028 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 3076 wrote to memory of 1028 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 3076 wrote to memory of 1028 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 3076 wrote to memory of 1028 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 3076 wrote to memory of 1028 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 3076 wrote to memory of 1028 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 3076 wrote to memory of 1028 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 3076 wrote to memory of 1028 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 3076 wrote to memory of 1028 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 3076 wrote to memory of 1028 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 3076 wrote to memory of 1028 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 3076 wrote to memory of 1028 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 3076 wrote to memory of 1028 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 3076 wrote to memory of 1028 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 3076 wrote to memory of 1028 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 3076 wrote to memory of 1028 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 3076 wrote to memory of 1028 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 3076 wrote to memory of 1028 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 3076 wrote to memory of 1028 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 3076 wrote to memory of 1028 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 3076 wrote to memory of 1028 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 3076 wrote to memory of 1028 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 3076 wrote to memory of 5088 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 3076 wrote to memory of 5088 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 3076 wrote to memory of 2348 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 3076 wrote to memory of 2348 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 3076 wrote to memory of 2348 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 3076 wrote to memory of 2348 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 3076 wrote to memory of 2348 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 3076 wrote to memory of 2348 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 3076 wrote to memory of 2348 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 3076 wrote to memory of 2348 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 3076 wrote to memory of 2348 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 3076 wrote to memory of 2348 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 3076 wrote to memory of 2348 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 3076 wrote to memory of 2348 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 3076 wrote to memory of 2348 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 3076 wrote to memory of 2348 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 3076 wrote to memory of 2348 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 3076 wrote to memory of 2348 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 3076 wrote to memory of 2348 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 3076 wrote to memory of 2348 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 3076 wrote to memory of 2348 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 3076 wrote to memory of 2348 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe

Processes

C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe

"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\c310026e49c5f232fe3674fdcf58be42_JaffaCakes118.html

C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe

"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7fff5a8746f8,0x7fff5a874708,0x7fff5a874718

C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe

"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2032,12655198933041593064,18286523175305411856,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2040 /prefetch:2

C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe

"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2032,12655198933041593064,18286523175305411856,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2108 /prefetch:3

C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe

"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2032,12655198933041593064,18286523175305411856,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2784 /prefetch:8

C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe

"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2032,12655198933041593064,18286523175305411856,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3236 /prefetch:1

C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe

"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2032,12655198933041593064,18286523175305411856,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3252 /prefetch:1

C:\Windows\System32\CompPkgSrv.exe

C:\Windows\System32\CompPkgSrv.exe -Embedding

C:\Windows\System32\CompPkgSrv.exe

C:\Windows\System32\CompPkgSrv.exe -Embedding

C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe

"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2032,12655198933041593064,18286523175305411856,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4796 /prefetch:1

C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe

"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2032,12655198933041593064,18286523175305411856,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6132 /prefetch:1

C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe

"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2032,12655198933041593064,18286523175305411856,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5968 /prefetch:1

C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe

"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2032,12655198933041593064,18286523175305411856,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5904 /prefetch:1

C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe

"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2032,12655198933041593064,18286523175305411856,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5708 /prefetch:1

C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe

"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2032,12655198933041593064,18286523175305411856,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5516 /prefetch:1

C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe

"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2032,12655198933041593064,18286523175305411856,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=6536 /prefetch:8

C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe

"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2032,12655198933041593064,18286523175305411856,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=6536 /prefetch:8

C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe

"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2032,12655198933041593064,18286523175305411856,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=14 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6512 /prefetch:1

C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe

"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2032,12655198933041593064,18286523175305411856,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=15 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=1364 /prefetch:1

C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe

"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2032,12655198933041593064,18286523175305411856,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=16 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5616 /prefetch:1

C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe

"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2032,12655198933041593064,18286523175305411856,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=17 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5580 /prefetch:1

C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe

"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2032,12655198933041593064,18286523175305411856,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=4884 /prefetch:2

Network

Country Destination Domain Proto
US 8.8.8.8:53 code.jquery.com udp
US 8.8.8.8:53 www.blogger.com udp
US 8.8.8.8:53 ajax.googleapis.com udp
US 8.8.8.8:53 static.tumblr.com udp
US 8.8.8.8:53 www.linkwithin.com udp
US 8.8.8.8:53 apis.google.com udp
US 8.8.8.8:53 s7.addthis.com udp
US 8.8.8.8:53 busuk.org udp
US 8.8.8.8:53 www.clocklink.com udp
US 8.8.8.8:53 heartbeat.my udp
US 8.8.8.8:53 i1231.photobucket.com udp
US 8.8.8.8:53 www.guablog.com udp
US 8.8.8.8:53 resources.blogblog.com udp
US 8.8.8.8:53 i1227.photobucket.com udp
US 151.101.194.137:80 code.jquery.com tcp
FR 142.250.179.105:443 resources.blogblog.com tcp
US 104.21.26.218:80 busuk.org tcp
GB 216.137.44.17:80 i1227.photobucket.com tcp
GB 216.137.44.17:80 i1227.photobucket.com tcp
GB 216.137.44.17:80 i1227.photobucket.com tcp
FR 142.250.179.105:443 resources.blogblog.com tcp
US 216.230.241.100:80 www.clocklink.com tcp
GB 104.96.173.184:80 s7.addthis.com tcp
GB 216.137.44.125:80 i1227.photobucket.com tcp
US 151.101.194.137:80 code.jquery.com tcp
FR 142.250.179.105:443 resources.blogblog.com tcp
US 216.230.241.100:80 www.clocklink.com tcp
US 104.21.26.218:80 busuk.org tcp
GB 216.137.44.17:80 i1227.photobucket.com tcp
FR 142.250.179.105:443 resources.blogblog.com tcp
MY 117.53.152.181:80 heartbeat.my tcp
GB 216.137.44.17:443 i1227.photobucket.com tcp
GB 216.137.44.125:443 i1227.photobucket.com tcp
GB 104.96.173.184:443 s7.addthis.com tcp
MY 117.53.152.181:80 heartbeat.my tcp
US 8.8.8.8:53 17.44.137.216.in-addr.arpa udp
US 8.8.8.8:53 184.173.96.104.in-addr.arpa udp
US 8.8.8.8:53 125.44.137.216.in-addr.arpa udp
GB 216.137.44.17:443 i1227.photobucket.com tcp
GB 216.137.44.125:443 i1227.photobucket.com tcp
GB 104.96.173.184:443 s7.addthis.com tcp
US 192.0.77.40:80 static.tumblr.com tcp
LT 93.115.28.104:80 www.guablog.com tcp
FR 142.250.179.74:443 ajax.googleapis.com tcp
FR 142.250.179.74:80 ajax.googleapis.com tcp
SG 118.139.179.30:80 www.linkwithin.com tcp
FR 142.250.178.142:443 apis.google.com tcp
FR 142.250.179.74:443 ajax.googleapis.com tcp
FR 142.250.179.74:80 ajax.googleapis.com tcp
US 192.0.77.40:80 static.tumblr.com tcp
FR 142.250.178.142:443 apis.google.com tcp
SG 118.139.179.30:80 www.linkwithin.com tcp
LT 93.115.28.104:80 www.guablog.com tcp
GB 216.137.44.17:443 i1227.photobucket.com tcp
US 8.8.8.8:53 137.194.101.151.in-addr.arpa udp
US 8.8.8.8:53 105.179.250.142.in-addr.arpa udp
US 8.8.8.8:53 28.118.140.52.in-addr.arpa udp
US 8.8.8.8:53 218.26.21.104.in-addr.arpa udp
US 8.8.8.8:53 142.178.250.142.in-addr.arpa udp
US 8.8.8.8:53 74.179.250.142.in-addr.arpa udp
US 8.8.8.8:53 104.28.115.93.in-addr.arpa udp
US 8.8.8.8:53 95.221.229.192.in-addr.arpa udp
US 8.8.8.8:53 172.214.232.199.in-addr.arpa udp
US 192.0.77.40:443 static.tumblr.com tcp
US 8.8.8.8:53 ww1.guablog.com udp
US 8.8.8.8:53 40.77.0.192.in-addr.arpa udp
US 8.8.8.8:53 2.bp.blogspot.com udp
FR 142.250.179.105:443 resources.blogblog.com udp
FR 142.250.179.97:80 2.bp.blogspot.com tcp
DE 64.190.63.136:80 ww1.guablog.com tcp
US 8.8.8.8:53 exeideasinternational.googlecode.com udp
IE 172.253.116.82:80 exeideasinternational.googlecode.com tcp
US 8.8.8.8:53 97.179.250.142.in-addr.arpa udp
US 8.8.8.8:53 107.39.156.108.in-addr.arpa udp
US 8.8.8.8:53 136.63.190.64.in-addr.arpa udp
FR 142.250.178.142:443 apis.google.com udp
US 8.8.8.8:53 i1218.photobucket.com udp
US 8.8.8.8:53 synad2.nuffnang.com.my udp
US 8.8.8.8:53 3.bp.blogspot.com udp
FR 142.250.179.97:80 3.bp.blogspot.com tcp
FR 142.250.179.105:443 resources.blogblog.com udp
US 8.8.8.8:53 t1.gstatic.com udp
US 8.8.8.8:53 img1.blogblog.com udp
US 8.8.8.8:53 1.bp.blogspot.com udp
FR 142.250.179.97:80 1.bp.blogspot.com tcp
FR 142.250.179.97:80 1.bp.blogspot.com tcp
FR 142.250.179.97:80 1.bp.blogspot.com tcp
FR 172.217.20.194:445 pagead2.googlesyndication.com tcp
GB 216.137.44.119:80 i1218.photobucket.com tcp
FR 172.217.20.196:80 t1.gstatic.com tcp
FR 142.250.179.97:80 1.bp.blogspot.com tcp
FR 142.250.179.97:80 1.bp.blogspot.com tcp
US 8.8.8.8:53 4.bp.blogspot.com udp
US 8.8.8.8:53 dl.glitter-graphics.net udp
US 8.8.8.8:53 farm4.staticflickr.com udp
FR 142.250.179.97:80 4.bp.blogspot.com tcp
GB 18.245.160.68:80 farm4.staticflickr.com tcp
US 8.8.8.8:53 i1117.photobucket.com udp
US 8.8.8.8:53 img.photobucket.com udp
US 104.21.26.218:443 busuk.org tcp
DE 46.4.70.136:80 dl.glitter-graphics.net tcp
US 8.8.8.8:53 i1135.photobucket.com udp
GB 216.137.44.17:80 i1135.photobucket.com tcp
DE 46.4.70.136:80 dl.glitter-graphics.net tcp
GB 216.137.44.112:80 i1135.photobucket.com tcp
GB 216.137.44.119:80 i1135.photobucket.com tcp
GB 18.245.160.68:443 farm4.staticflickr.com tcp
US 104.21.26.218:443 busuk.org tcp
US 8.8.8.8:53 30.179.139.118.in-addr.arpa udp
US 8.8.8.8:53 82.116.253.172.in-addr.arpa udp
US 8.8.8.8:53 181.152.53.117.in-addr.arpa udp
US 8.8.8.8:53 119.44.137.216.in-addr.arpa udp
US 8.8.8.8:53 196.20.217.172.in-addr.arpa udp
US 8.8.8.8:53 68.160.245.18.in-addr.arpa udp
US 8.8.8.8:53 136.70.4.46.in-addr.arpa udp
US 8.8.8.8:53 112.44.137.216.in-addr.arpa udp
US 8.8.8.8:53 upic.me udp
US 104.21.91.94:80 upic.me tcp
US 104.21.91.94:80 upic.me tcp
US 8.8.8.8:53 i.imgur.com udp
US 8.8.8.8:53 dl9.glitter-graphics.net udp
US 199.232.196.193:80 i.imgur.com tcp
US 199.232.196.193:443 i.imgur.com tcp
DE 46.4.70.136:80 dl9.glitter-graphics.net tcp
US 8.8.8.8:53 94.91.21.104.in-addr.arpa udp
US 8.8.8.8:53 193.196.232.199.in-addr.arpa udp
N/A 224.0.0.251:5353 udp
FR 216.58.213.66:139 pagead2.googlesyndication.com tcp
US 8.8.8.8:53 13.86.106.20.in-addr.arpa udp
US 8.8.8.8:53 www.facebook.com udp
US 8.8.8.8:53 synad2.nuffnang.com.my udp
IE 172.253.116.82:80 exeideasinternational.googlecode.com tcp
US 8.8.8.8:53 developers.google.com udp
FR 142.250.179.110:80 developers.google.com tcp
US 8.8.8.8:53 accounts.google.com udp
IE 74.125.193.84:443 accounts.google.com tcp
US 8.8.8.8:53 www6.cbox.ws udp
US 8.8.8.8:53 img838.imageshack.us udp
US 8.8.8.8:53 data.whicdn.com udp
US 108.181.41.161:80 www6.cbox.ws tcp
US 108.181.41.161:80 www6.cbox.ws tcp
FR 142.250.179.110:443 developers.google.com tcp
US 8.8.8.8:53 cur.cursors-4u.net udp
US 8.8.8.8:53 i1101.photobucket.com udp
US 38.99.77.17:80 img838.imageshack.us tcp
US 96.43.128.66:80 cur.cursors-4u.net tcp
GB 216.137.44.119:80 i1101.photobucket.com tcp
US 38.99.77.17:80 img838.imageshack.us tcp
US 8.8.8.8:53 110.179.250.142.in-addr.arpa udp
US 8.8.8.8:53 84.193.125.74.in-addr.arpa udp
IE 74.125.193.84:443 accounts.google.com udp
US 8.8.8.8:53 www.cbox.ws udp
FR 142.250.179.97:443 4.bp.blogspot.com tcp
US 8.8.8.8:53 lh3.googleusercontent.com udp
FR 142.250.179.97:443 4.bp.blogspot.com tcp
FR 142.250.179.97:443 4.bp.blogspot.com tcp
FR 142.250.179.97:443 4.bp.blogspot.com tcp
FR 142.250.179.97:443 4.bp.blogspot.com tcp
FR 142.250.179.97:443 4.bp.blogspot.com tcp
US 8.8.8.8:53 lh4.googleusercontent.com udp
FR 142.250.178.129:443 lh4.googleusercontent.com tcp
FR 142.250.178.129:443 lh4.googleusercontent.com tcp
FR 142.250.178.129:443 lh4.googleusercontent.com tcp
FR 142.250.178.129:443 lh4.googleusercontent.com tcp
FR 142.250.178.129:443 lh4.googleusercontent.com tcp
FR 142.250.178.129:443 lh4.googleusercontent.com tcp
US 96.43.128.66:443 cur.cursors-4u.net tcp
FR 142.250.178.129:443 lh4.googleusercontent.com tcp
DE 157.240.27.35:80 www.facebook.com tcp
DE 157.240.27.35:445 www.facebook.com tcp
DE 157.240.27.35:80 www.facebook.com tcp
US 8.8.8.8:53 ssl.gstatic.com udp
FR 216.58.214.163:443 ssl.gstatic.com tcp
DE 157.240.27.35:443 www.facebook.com tcp
US 8.8.8.8:53 161.41.181.108.in-addr.arpa udp
US 8.8.8.8:53 66.128.43.96.in-addr.arpa udp
US 8.8.8.8:53 17.77.99.38.in-addr.arpa udp
US 8.8.8.8:53 35.27.240.157.in-addr.arpa udp
US 8.8.8.8:53 163.214.58.216.in-addr.arpa udp
US 8.8.8.8:53 129.178.250.142.in-addr.arpa udp
US 8.8.8.8:53 lh3.googleusercontent.com udp
FR 142.250.178.129:445 lh3.googleusercontent.com tcp
FR 142.250.178.129:139 lh3.googleusercontent.com tcp
US 8.8.8.8:53 26.165.165.52.in-addr.arpa udp
US 8.8.8.8:53 18.31.95.13.in-addr.arpa udp
US 8.8.8.8:53 192.142.123.92.in-addr.arpa udp
US 8.8.8.8:53 81.144.22.2.in-addr.arpa udp
US 8.8.8.8:53 23.236.111.52.in-addr.arpa udp
IE 74.125.193.84:443 accounts.google.com udp
US 8.8.8.8:53 tse1.mm.bing.net udp
US 150.171.28.10:443 tse1.mm.bing.net tcp
US 150.171.28.10:443 tse1.mm.bing.net tcp
US 150.171.28.10:443 tse1.mm.bing.net tcp
US 150.171.28.10:443 tse1.mm.bing.net tcp
US 150.171.28.10:443 tse1.mm.bing.net tcp
IE 74.125.193.84:443 accounts.google.com udp

Files

C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad\settings.dat

MD5 27304926d60324abe74d7a4b571c35ea
SHA1 78b8f92fcaf4a09eaa786bbe33fd1b0222ef29c1
SHA256 7039ad5c2b40f4d97c8c2269f4942be13436d739b2e1f8feb7a0c9f9fdb931de
SHA512 f5b6181d3f432238c7365f64fc8a373299e23ba8178bcc419471916ef8b23e909787c7c0617ab22e4eb90909c02bd7b84f1386fbc61e2bdb5a0eb474175da4bd

\??\pipe\LOCAL\crashpad_3076_NEDXWRQZXAMSNYHB

MD5 d41d8cd98f00b204e9800998ecf8427e
SHA1 da39a3ee5e6b4b0d3255bfef95601890afd80709
SHA256 e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855
SHA512 cf83e1357eefb8bdf1542850d66d8007d620e4050b5715dc83f4a921d36ce9ce47d0d13c5d85f2b0ff8318d2877eec2f63b931bd47417a81a538327af927da3e

C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad\settings.dat

MD5 9e3fc58a8fb86c93d19e1500b873ef6f
SHA1 c6aae5f4e26f5570db5e14bba8d5061867a33b56
SHA256 828f4eacac1c40b790fd70dbb6fa6ba03dcc681171d9b2a6579626d27837b1c4
SHA512 e5e245b56fa82075e060f468a3224cf2ef43f1b6d87f0351a2102d85c7c897e559be4caeaecfdc4059af29fdc674681b61229319dda95cb2ee649b2eb98d313e

C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Preferences

MD5 1388d09e422a13b3b485f75548305ea4
SHA1 ca446d69be69f6710541eb0f494a9bcf179734ca
SHA256 e6a104eda7a8391a3637c4f506d661185c614b8d9fb2987db7c10e79377a78be
SHA512 35b50ff36185d57d4f9bec079ad76d11e3415449de969f1edf53ce893edb896eb792738f9725afe0925ba40004b8106a40cb2c2fcd2f17421f6448927b0b9837

C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Local State

MD5 67982a4c1189720209307be6a64eb603
SHA1 8dbdc2e718e9b46bb1ea9367be5973bdbdd62a87
SHA256 bb94fdd746d6b94d4f5c70e64d804829ef1bf1b3b13ab1633d5742500eacb1a3
SHA512 5ea60799a72afc0d50241ddc1cf484c9bd54def03c31e85fb181ed55bb11d552c128c2ca7f7dca46d8a79fb6069282f00794ccb6d4fed74a5616dec9267240e5

C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Preferences

MD5 1fcf74bce02da04beb0a8bdb435fe085
SHA1 939bf6938d746bcf5ea470bc849f93d5a5eef891
SHA256 7884e8f6f191e75e4ab7280c696433c9ae09b01c1c4bc4174d54accf8ef79eb4
SHA512 ae61703a07790a9c7b41971f6e9c416b42aac8b6f5985441a9c70612569b570d1a3bfb9df214b6d19735c16358787f4bbe6a6bbb2b28a538d61b8fc4180ab03c

C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\TransportSecurity~RFe584735.TMP

MD5 a5a679bb67a30decdba966407b59d808
SHA1 d2fbd28727d863465be6e2a9ad880fedac01503f
SHA256 fcdc0a81448d19c5a6ea65169eff0383e221cca49603450dbbfba9ce293dfa1f
SHA512 096dcf55305b1ddb414dd1bae4fb2ef76ffc0e2d4bd7576b4ccf746a336f5ddea24c149563ea6e21d2f166bcaa17e238a275bcaf07fbfe33a3c537b60955f55d

C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\TransportSecurity

MD5 ce7c9bf8e5f0aa4e50acd0ad107893a8
SHA1 49ebe0fc3f4ab18597505ec8494891099f2ecf4d
SHA256 04da7ac5f2bb74ababc461da820f934365b0290a6144ed146d4e1bdb0905edee
SHA512 1050e674abb90dd4b22af4c6b454f3f9028bb6336550f9c3eba7aa5c9b9ce5108557057c112ab5a76b28cd0edd6f5d3a9f6b3c01389241bf5ed7178ef5315ba0

C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index

MD5 b192fafc141e48e30259cffd1fde40ec
SHA1 8075495aaf841bcab7af94b2a36eac68400a9d56
SHA256 a7c991e85b51c31e5ba862cc85067c763c2e2be9f3fe8382367f524c24c47bce
SHA512 a785a4352572b1badfd4fad2b010a383c92b4d4ffbe7e2be719c933f2a8aab029264005396012652e804c208af694973f368d1f0444e7e0d6bdd3a855731d6b4

C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\data_reduction_proxy_leveldb\CURRENT

MD5 6752a1d65b201c13b62ea44016eb221f
SHA1 58ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA256 0861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA512 9cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389

C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Network Persistent State

MD5 cb77f6a6689f453cc2ab1b63a8e861cd
SHA1 79fd2f7075d056d9db57f532e51787cae64928b6
SHA256 8135654dcc150abca97e1104ac3d0750ad066584594c1dca541811a11865c961
SHA512 af04607e298a241789aba59f6670253ad22b8e722d2025a25c1cf862883f1d580ef77109bf2abe77fe34ade652134cebdeae801d09850ed5be8b0cc23057e1a8

C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Cache\f_000019

MD5 b4b711f3e747704ffe02b49791ce8cac
SHA1 ac7ce4cbd3c8ee66e3c8d9d209c1352c160c3b89
SHA256 f65bf40e2f0ce993b54772f703f72d53f0fa925457346fa8ec2031879ffa91d1
SHA512 b738deba57337a9147927f7dd35eab7c999dea6d2ff11f57fdc2e5b6f64326028a54778886548ba128a3f03ee333cc9e43de5162d8b578b85c290626577042db

C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Preferences

MD5 8c21c31ec9f8c6ee3d8ead966edfe11f
SHA1 db8e1d8e893c0ed9ee6ef9f466f888eab3a37461
SHA256 5db634bc77bb945905a11b94dd90a0b2202c803d292ea1ef8ac26dce0ecfc423
SHA512 0d0226d0a5d278aa234e92ee13c47b8aa272f1df143e0b40408148565e8f1fdb2b823d02b6e9971df7270dcdefb044a66688693a3d98e9ac8050e64ace4c0198

C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index

MD5 ba57145d7ff347e92eb5017e105ebe28
SHA1 2b578846ebe689679c08a7f6c8746888dd01fe3b
SHA256 57c53f5d1974e90bb442b100bc360b200b013b94264b5fa65a86580ae2c1e95c
SHA512 dbba8a3f33284bca601721b5756ab602245c2d46e8773bd6fdb94952c5deafe0c2b1e88420b543c9a7bc5452f63f62c66978c2735937ea79772e17f27b95a35c

C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Network Persistent State

MD5 cd54dfbd8e71790dba9807e5b86a3eee
SHA1 b57581417c4bd33e59745cabc6743fbdeb029483
SHA256 555c1da6ab0e70f9347322e64c7536544bade2a57aeed9ac1bf353a8f84f4845
SHA512 c665cc5d91c4efa78961ca8513d1bb6b67c1ed6912af9ea74c7f7a9ddc66bcfff131523bf78e4912f120135e3a2c72ea6af92c936ae3a4075a0927d1b608bef8