Malware Analysis Report

2024-10-23 17:22

Sample ID 240827-y5b95azeqc
Target c5ac7e845a783df2bf7d6f81accde52c_JaffaCakes118
SHA256 d1e87ea227ea63309ac1d7775ad424cca90974176c8df5019160afccabfa3d8f
Tags
socgholish discovery downloader
score
10/10

Table of Contents

Analysis Overview

MITRE ATT&CK

Enterprise Matrix V15

Analysis: static1

Detonation Overview

Signatures

Analysis: behavioral1

Detonation Overview

Command Line

Signatures

Processes

Network

Files

Analysis: behavioral2

Detonation Overview

Command Line

Signatures

Processes

Network

Files

Analysis Overview

score
10/10

SHA256

d1e87ea227ea63309ac1d7775ad424cca90974176c8df5019160afccabfa3d8f

Threat Level: Known bad

The file c5ac7e845a783df2bf7d6f81accde52c_JaffaCakes118 was found to be: Known bad.

Malicious Activity Summary

socgholish discovery downloader

SocGholish

System Location Discovery: System Language Discovery

Browser Information Discovery

Suspicious use of SetWindowsHookEx

Suspicious use of WriteProcessMemory

Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary

Modifies Internet Explorer settings

Suspicious use of FindShellTrayWindow

Enumerates system info in registry

Suspicious behavior: EnumeratesProcesses

Suspicious use of SendNotifyMessage

MITRE ATT&CK

Analysis: static1

Detonation Overview

Reported

2024-08-27 20:21

Signatures

N/A

Analysis: behavioral1

Detonation Overview

Submitted

2024-08-27 20:21

Reported

2024-08-27 20:24

Platform

win7-20240704-en

Max time kernel

150s

Max time network

145s

Command Line

"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\c5ac7e845a783df2bf7d6f81accde52c_JaffaCakes118.html

Signatures

SocGholish

downloader socgholish

System Location Discovery: System Language Discovery

discovery
Description Indicator Process Target
Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE N/A

Modifies Internet Explorer settings

adware spyware
Description Indicator Process Target
Set value (data) \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 C:\Program Files\Internet Explorer\iexplore.exe N/A
Key created \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\SearchScopes C:\Program Files\Internet Explorer\iexplore.exe N/A
Set value (int) \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" C:\Program Files\Internet Explorer\iexplore.exe N/A
Key created \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\LowRegistry C:\Program Files\Internet Explorer\iexplore.exe N/A
Key created \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage C:\Program Files\Internet Explorer\iexplore.exe N/A
Key created \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain C:\Program Files\Internet Explorer\iexplore.exe N/A
Key created \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive C:\Program Files\Internet Explorer\iexplore.exe N/A
Set value (int) \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "430951973" C:\Program Files\Internet Explorer\iexplore.exe N/A
Set value (data) \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb0100000043174f1aa2314a47aa677ebd5ad1f6c7000000000200000000001066000000010000200000003b35233349a3f5802d68b238460e586583a6e5da36bab82023a2fac4b3a46273000000000e800000000200002000000006e9704a3ef30812e5b1a4276d9bdefa9e8a258df47c153aab0f9826dda29d95200000007767457c4b728f9be5124f4b420eecb3c68a3623872f16629c20efc1c01c00c540000000f7b19ec2ba02bc4f9ccd31c43377b63795bd8c6a82f15315f2a86c688e7dcdf564448f887b72da83a25ef697d893241a0dd6e42cd907fcbae2649524ed2f8340 C:\Program Files\Internet Explorer\iexplore.exe N/A
Key created \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\Main C:\Program Files\Internet Explorer\iexplore.exe N/A
Key created \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic C:\Program Files\Internet Explorer\iexplore.exe N/A
Key created \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\IntelliForms C:\Program Files\Internet Explorer\iexplore.exe N/A
Key created \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch C:\Program Files\Internet Explorer\iexplore.exe N/A
Set value (str) \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" C:\Program Files\Internet Explorer\iexplore.exe N/A
Key created \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE N/A
Key created \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage C:\Program Files\Internet Explorer\iexplore.exe N/A
Set value (int) \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" C:\Program Files\Internet Explorer\iexplore.exe N/A
Set value (str) \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" C:\Program Files\Internet Explorer\iexplore.exe N/A
Set value (str) \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE N/A
Set value (int) \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" C:\Program Files\Internet Explorer\iexplore.exe N/A
Key created \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\Toolbar C:\Program Files\Internet Explorer\iexplore.exe N/A
Key created \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser C:\Program Files\Internet Explorer\iexplore.exe N/A
Set value (int) \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{FAEA8061-64B1-11EF-8340-72D30ED4C808} = "0" C:\Program Files\Internet Explorer\iexplore.exe N/A
Key created \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery C:\Program Files\Internet Explorer\iexplore.exe N/A
Key created \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\Main C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE N/A
Set value (int) \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" C:\Program Files\Internet Explorer\iexplore.exe N/A
Key created \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\DomainSuggestion C:\Program Files\Internet Explorer\iexplore.exe N/A
Key created \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\GPU C:\Program Files\Internet Explorer\iexplore.exe N/A
Key created \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\IETld\LowMic C:\Program Files\Internet Explorer\iexplore.exe N/A
Key created \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\InternetRegistry C:\Program Files\Internet Explorer\iexplore.exe N/A
Key created \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\Zoom C:\Program Files\Internet Explorer\iexplore.exe N/A
Key created \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing C:\Program Files\Internet Explorer\iexplore.exe N/A
Set value (data) \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = b0d1aaf8bef8da01 C:\Program Files\Internet Explorer\iexplore.exe N/A
Set value (data) \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 C:\Program Files\Internet Explorer\iexplore.exe N/A
Key created \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\PageSetup C:\Program Files\Internet Explorer\iexplore.exe N/A
Set value (int) \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" C:\Program Files\Internet Explorer\iexplore.exe N/A

Suspicious use of FindShellTrayWindow

Description Indicator Process Target
N/A N/A C:\Program Files\Internet Explorer\iexplore.exe N/A

Processes

C:\Program Files\Internet Explorer\iexplore.exe

"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\c5ac7e845a783df2bf7d6f81accde52c_JaffaCakes118.html

C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE

"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2308 CREDAT:275457 /prefetch:2

Network

Country Destination Domain Proto
US 8.8.8.8:53 www.blogger.com udp
US 8.8.8.8:53 ajax.googleapis.com udp
US 8.8.8.8:53 i1128.photobucket.com udp
US 8.8.8.8:53 resources.blogblog.com udp
US 8.8.8.8:53 adsensecamp.com udp
US 8.8.8.8:53 apis.google.com udp
US 8.8.8.8:53 2.bp.blogspot.com udp
US 8.8.8.8:53 4.bp.blogspot.com udp
US 8.8.8.8:53 www.google.com udp
US 8.8.8.8:53 xslt.alexa.com udp
US 8.8.8.8:53 g2.gumgum.com udp
US 8.8.8.8:53 twitter-badges.s3.amazonaws.com udp
US 8.8.8.8:53 widgets.twimg.com udp
US 8.8.8.8:53 bloggerpeer.googlecode.com udp
US 8.8.8.8:53 www.linkwithin.com udp
GB 142.250.180.9:443 www.blogger.com tcp
GB 142.250.180.9:443 www.blogger.com tcp
FR 142.250.179.105:443 resources.blogblog.com tcp
FR 142.250.179.105:443 resources.blogblog.com tcp
GB 216.137.44.119:80 i1128.photobucket.com tcp
GB 216.137.44.119:80 i1128.photobucket.com tcp
GB 142.250.180.9:443 www.blogger.com tcp
IE 52.48.92.50:80 g2.gumgum.com tcp
IE 52.48.92.50:80 g2.gumgum.com tcp
GB 142.250.187.202:443 ajax.googleapis.com tcp
GB 142.250.187.202:443 ajax.googleapis.com tcp
FR 142.250.178.142:443 apis.google.com tcp
FR 142.250.178.142:443 apis.google.com tcp
FR 142.250.179.97:80 2.bp.blogspot.com tcp
FR 142.250.179.97:80 2.bp.blogspot.com tcp
GB 142.250.180.1:80 4.bp.blogspot.com tcp
GB 142.250.180.1:80 4.bp.blogspot.com tcp
FR 142.250.179.68:80 www.google.com tcp
FR 142.250.179.68:80 www.google.com tcp
US 54.231.164.89:80 twitter-badges.s3.amazonaws.com tcp
US 54.231.164.89:80 twitter-badges.s3.amazonaws.com tcp
IE 172.253.116.82:80 bloggerpeer.googlecode.com tcp
IE 172.253.116.82:80 bloggerpeer.googlecode.com tcp
SG 118.139.179.30:80 www.linkwithin.com tcp
SG 118.139.179.30:80 www.linkwithin.com tcp
GB 216.137.44.119:443 i1128.photobucket.com tcp
GB 216.137.44.119:443 i1128.photobucket.com tcp
US 8.8.8.8:53 js.gumgum.com udp
GB 18.165.242.120:443 js.gumgum.com tcp
GB 18.165.242.120:443 js.gumgum.com tcp
GB 18.165.242.120:443 js.gumgum.com tcp
GB 18.165.242.120:443 js.gumgum.com tcp
GB 18.165.242.120:443 js.gumgum.com tcp
GB 18.165.242.120:443 js.gumgum.com tcp
ID 103.30.145.12:80 adsensecamp.com tcp
ID 103.30.145.12:80 adsensecamp.com tcp
GB 18.165.242.120:443 js.gumgum.com tcp
GB 18.165.242.120:443 js.gumgum.com tcp
US 8.8.8.8:53 c.pki.goog udp
US 8.8.8.8:53 c.pki.goog udp
US 8.8.8.8:53 c.pki.goog udp
US 8.8.8.8:53 c.pki.goog udp
US 8.8.8.8:53 c.pki.goog udp
US 8.8.8.8:53 c.pki.goog udp
US 8.8.8.8:53 c.pki.goog udp
US 8.8.8.8:53 c.pki.goog udp
US 8.8.8.8:53 c.pki.goog udp
FR 216.58.214.163:80 c.pki.goog tcp
GB 142.250.178.3:80 c.pki.goog tcp
FR 216.58.214.163:80 c.pki.goog tcp
FR 216.58.214.163:80 c.pki.goog tcp
FR 216.58.214.163:80 c.pki.goog tcp
FR 216.58.214.163:80 c.pki.goog tcp
FR 216.58.214.163:80 c.pki.goog tcp
GB 142.250.178.3:80 c.pki.goog tcp
FR 216.58.214.163:80 c.pki.goog tcp
US 8.8.8.8:53 o.pki.goog udp
US 8.8.8.8:53 o.pki.goog udp
US 8.8.8.8:53 o.pki.goog udp
US 8.8.8.8:53 o.pki.goog udp
FR 216.58.214.163:80 o.pki.goog tcp
FR 216.58.214.163:80 o.pki.goog tcp
FR 216.58.214.163:80 o.pki.goog tcp
FR 216.58.214.163:80 o.pki.goog tcp
FR 216.58.214.163:80 o.pki.goog tcp
FR 216.58.214.163:80 o.pki.goog tcp
FR 216.58.214.163:80 o.pki.goog tcp
FR 216.58.214.163:80 o.pki.goog tcp
FR 216.58.214.163:80 o.pki.goog tcp
ID 103.30.145.12:443 adsensecamp.com tcp
ID 103.30.145.12:443 adsensecamp.com tcp
US 8.8.8.8:53 i825.photobucket.com udp
GB 216.137.44.119:80 i825.photobucket.com tcp
GB 216.137.44.119:80 i825.photobucket.com tcp
US 8.8.8.8:53 www.blogblog.com udp
GB 216.137.44.119:443 i825.photobucket.com tcp
FR 142.250.179.105:80 www.blogblog.com tcp
FR 142.250.179.105:80 www.blogblog.com tcp
US 8.8.8.8:53 r11.o.lencr.org udp
US 8.8.8.8:53 r11.o.lencr.org udp
GB 2.16.170.42:80 r11.o.lencr.org tcp
GB 2.16.170.42:80 r11.o.lencr.org tcp
US 8.8.8.8:53 www.linksalpha.com udp
US 8.8.8.8:53 widgets.amung.us udp
US 8.8.8.8:53 www.facebook.com udp
IE 31.13.73.35:80 www.facebook.com tcp
IE 31.13.73.35:80 www.facebook.com tcp
US 172.67.8.141:80 widgets.amung.us tcp
US 172.67.8.141:80 widgets.amung.us tcp
IE 31.13.73.35:443 www.facebook.com tcp
US 8.8.8.8:53 static.xx.fbcdn.net udp
IE 31.13.73.22:443 static.xx.fbcdn.net tcp
IE 31.13.73.22:443 static.xx.fbcdn.net tcp
US 8.8.8.8:53 crl.microsoft.com udp
GB 2.18.190.80:80 crl.microsoft.com tcp
US 204.79.197.200:443 ieonline.microsoft.com tcp
US 204.79.197.200:443 ieonline.microsoft.com tcp
US 8.8.8.8:53 www.microsoft.com udp
US 204.79.197.200:443 ieonline.microsoft.com tcp
US 172.67.8.141:80 widgets.amung.us tcp
US 172.67.8.141:80 widgets.amung.us tcp
IE 31.13.73.35:80 www.facebook.com tcp
IE 31.13.73.35:80 www.facebook.com tcp
IE 31.13.73.35:80 www.facebook.com tcp
US 8.8.8.8:53 3.bp.blogspot.com udp
FR 142.250.179.105:80 www.blogblog.com tcp
FR 142.250.179.105:80 www.blogblog.com tcp
FR 142.250.179.97:80 3.bp.blogspot.com tcp
FR 142.250.179.97:80 3.bp.blogspot.com tcp
IE 31.13.73.35:443 www.facebook.com tcp
IE 31.13.73.35:443 www.facebook.com tcp
IE 31.13.73.35:443 www.facebook.com tcp

Files

C:\Users\Admin\AppData\Local\Temp\CabE65B.tmp

MD5 49aebf8cbd62d92ac215b2923fb1b9f5
SHA1 1723be06719828dda65ad804298d0431f6aff976
SHA256 b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512 bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b

C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\24BD96D5497F70B3F510A6B53CD43F3E_3A89246FB90C5EE6620004F1AE0EB0EA

MD5 d4252a0c52d5ee395460b945c23d4ff3
SHA1 29aba21b7af37ff780bb4a178e45cf19b6c323af
SHA256 8b6d153b186edb126f323c9d114183d5536aa4d5b12d5808a12710aea3bc15c4
SHA512 ec9a5ea8a4c6a2aac2a4c701127885ad9a4d5cfd4b113f9a3825c06bf3932a7f0d7daddef7ebb561d340743ae1b9b87cb97ff37aa6976e742a2ea36ec4cfbb3d

C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\24BD96D5497F70B3F510A6B53CD43F3E_3A89246FB90C5EE6620004F1AE0EB0EA

MD5 c8acb4c74c7ee65cad3a465a4cec4a07
SHA1 b199e83d64077c1f9469ffaf2ef8ae1789ba490f
SHA256 a400d9d729b6f38209943414a337970a401f0dd1232fe91481336f267a18ca15
SHA512 87bea6a784080c4015ae32ba4d2316dcff7ac739143c9dd86df8f1fef6adc9a89fa3b141bbd707b0da5572a9f847eb64fa5d0f3888de983d7b67b80d7b959f86

C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\24BD96D5497F70B3F510A6B53CD43F3E_3A89246FB90C5EE6620004F1AE0EB0EA

MD5 11b24a065e2ca0a7b776936da285c9cd
SHA1 e18d1dc0c99266d680d67d65252f07d534cd651e
SHA256 0179d4e69233a5fb20a0dbf778a714a706232079e6eb7803abbcdc432795cb9b
SHA512 9f1285922ba5b175ebb3e8f9cf09f96b368102c471d1637ce1b1ff650f9e7e64143f13d41bf2ea90b53328d4985cc8a1b8fc19767b5ac07d4a49bc03ececf559

C:\Users\Admin\AppData\Local\Temp\TarE6DB.tmp

MD5 4ea6026cf93ec6338144661bf1202cd1
SHA1 a1dec9044f750ad887935a01430bf49322fbdcb7
SHA256 8efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA512 6c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b

C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\05DDC6AA91765AACACDB0A5F96DF8199

MD5 e935bc5762068caf3e24a2683b1b8a88
SHA1 82b70eb774c0756837fe8d7acbfeec05ecbf5463
SHA256 a8accfcfeb51bd73df23b91f4d89ff1a9eb7438ef5b12e8afda1a6ff1769e89d
SHA512 bed4f6f5357b37662623f1f8afed1a3ebf3810630b2206a0292052a2e754af9dcfe34ee15c289e3d797a8f33330e47c14cbefbc702f74028557ace29bf855f9e

C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\05DDC6AA91765AACACDB0A5F96DF8199

MD5 4337dfeaa45558fd2638f4a0729ee491
SHA1 e94a3d7afb2607dd26dc5e4deb8f2d18279740fa
SHA256 d8721ee1deb703296d9141e32262e807ea016d4befd8e234d4584083e25e0deb
SHA512 0d0cf92b6ffabef305faf3f2f770f2938944323ee4d93c6ff6ac36c48e5c60164efeae99bbc3701413d2669cc79f7147c2cc1b7b6f4ad0a8a2ebbf88f68e6bf9

C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

MD5 c9097434d47ec65e23b73793e034819a
SHA1 a6400a00e2f7c890b8b0e29379dde7de1c90fbe5
SHA256 2b615fb8e4afc4c1f17fa243d58bf919624ec51cbc30a0b510a8c299182827d8
SHA512 4e3cb75bd83660b0b8a257fba474b35460715d2f22704196c5c99cb1d7b1ec419caa4eca5b66768f7072f7b0b9b71cd35d560bf78c96329b9e6754bc8fb05c9f

C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\05DDC6AA91765AACACDB0A5F96DF8199

MD5 cc021c9588d3413b4d9a7c352a7ba4e4
SHA1 df45112a456b4ffb4afaadfcf19fef6b8db4dcfa
SHA256 abb1d5793f716635aa480fe571db88d526b85e758fe30c140fac9a91b6727ffb
SHA512 2933121d8327954e653304fe5ae9f494ae52660609a172a606214b72606fd9deb714305750ee8c3d8c6242f076adb386add5b367fdd54b5b93a4095242970c89

C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

MD5 03b1adf263f2c3c8099b6fe4aae89d6c
SHA1 cc908b6331784413d154070bb0c2d7b18def8429
SHA256 b0fff5f92a8a174e9f0f9b9f86a5f3a92760fdceeefb039379a39655bdccc672
SHA512 f37f2c9d69d50618bc86d860e2be49ce26992892c13e6e7137fb4b122d7dc734d2970eaeff01c5a09cf5d35a9a38d0ac2a78d8730612af570ffb435a627b9e49

C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\070E0202839D9D67350CD2613E78E416

MD5 55540a230bdab55187a841cfe1aa1545
SHA1 363e4734f757bdeb89868efe94907774a327695e
SHA256 d73494e3446b02167573b3cde3ae1c8584ac26e15e45ac3ec0326708425d90fb
SHA512 c899cb1d31d3214fd9dc8626a55e40580d3b2224bf34310c2abd85d0f63e2dedaeae57832f048c2f500cb2cbf83683fcb14139af3f0b5251606076cdb4689c54

C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\B3513D73A177A2707D910183759B389B_147AB4536A182B9FCE88E194D59F3B22

MD5 e77172de74aac77cd9128bfea29b0dbe
SHA1 ab456fa3ddc6469bbac36073c95425af52fefec9
SHA256 793938cf2a3172c7e538504a629ca5d948e1c3aaca6f0df4e126dfb43d85bcba
SHA512 42435ae990afeebbeba533bb9390fa2bad94b20cdb31b942f2ce9cd5ee69c9d0d3b70ff8b080d5a4fdff38fdee91072846d14d12d8ff96fec93b95387f503563

C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\070E0202839D9D67350CD2613E78E416

MD5 a38478b600b44b32b5d377efda1c4d3e
SHA1 4329ceccaa895244ec0b678639538e5635728588
SHA256 c497a559143075d8eb8b5a9146a3d0848a435646d341ac5d0f186612aa357b6a
SHA512 c87cdec625a7ae884079a52cb6e317b8cfa7fe256eadc340991111e1b5606e4999e38d5cd9ca5ad75f8815ca5df00d909abd058a90937c0e9172709c2e48a5b8

C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\B3513D73A177A2707D910183759B389B_147AB4536A182B9FCE88E194D59F3B22

MD5 72bde6d1c35fedc47a854d0764f02719
SHA1 148144084bfda73a05c0dcdd7319188b2ccfe710
SHA256 c0992afdf2a1b91920cbc3f207bb5013437f8ecf8af00cdf22dcdd5dba916774
SHA512 71262c425eb8d1aab973778720fe489931d0abd2b3bf3de0169e0c90afb47ee522ad749c2472440f228e4a707887aba78a46a2245bc4b5a9339a0609de169570

C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

MD5 f38b0da421677cf599809b7fbad89fb2
SHA1 fa8417a059394db636d31fd100b36a735c6f6516
SHA256 7898ca8fd5a6ae7e9544000ab6ffc0aaaf79e167dd6fa2f128159d006aa3615f
SHA512 a14207eba0107c2b60aaad7b6afbec5edf5d6b6da5bdf7cfff7a5aebc71dd9fd80f7d9ef20e50ea8cace690555671ed473bf07145bf29193549a69a46b4465c5

C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

MD5 d7c3b265ef8f39db1f6c1b69db8ae85a
SHA1 3b09485080c70d4760916a4a4109fe7495f8445f
SHA256 ca156789400b674c5980d3c58d5801da5bd87f2af1aee8a283c5c8fcf7d534b7
SHA512 cffeb0724f1d87901c0e38a07348b3b85f9ee4ceecc496a59ae51f63fc1bf06e9a80ca0e381256894bed9cb01681b1197ed8f84545a2ef47cc7237ab173fc321

C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

MD5 2dbdc967dac377e91aa3f605acab6cfd
SHA1 7fdaf4002f45f9b50840fbff0c702ef8227d45b1
SHA256 97c435775578ade9cbc55dd73e3898e19cc897a7c0ac0d42b2dcc406d2d846d1
SHA512 8d0c4ade1955b092698dcf60b49c9dec6df9248be8b08a2d166a89cd628863e9a0374a4249c633d8e367187a6db2c3af006394dbe4c9ac2c1b77623369c290ed

C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

MD5 3724fb65ac8e882be7d4bcbbdf1d76b2
SHA1 94edad5b949faeaddfe8226c79bad67f02284602
SHA256 bd3b0e92a1be2a4610149520a63299b3e1f0218a1ff649b4a225ab86bf3acc20
SHA512 06c0c4e6c6e448f5af0f84a193e7f41caeab7af41acccb0912f0eb7288b3032e1dfef20374ec703cc46f9937628f68023ab11208b84061dbab40ad2c935c186b

C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

MD5 17ebb3f2a5be4c95089468e6e0113525
SHA1 ec52043d4370d356c978108af54381aee44efd0d
SHA256 030025e06d9e8cb5a80d1c2f5d0a0e2960db21424d70c853c9f0e4c9fb203473
SHA512 d6f8659fe750d73c2095409bd23f43b248cc28d713ab7996b69f5bf28438dadfee38d1faffa85eb3cbbf1054bc887e3922e3fe1f3fcd2ca818f8546631fe1f60

C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\F0ACCF77CDCBFF39F6191887F6D2D357

MD5 a266bb7dcc38a562631361bbf61dd11b
SHA1 3b1efd3a66ea28b16697394703a72ca340a05bd5
SHA256 df545bf919a2439c36983b54cdfc903dfa4f37d3996d8d84b4c31eec6f3c163e
SHA512 0da8ef4f8f6ed3d16d2bc8eb816b9e6e1345dfe2d91160196c47e6149a1d6aedaafadcefd66acdea7f72dcf0832770192ceac15b0c559c4ccc2c0e5581d5aefc

C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\F0ACCF77CDCBFF39F6191887F6D2D357

MD5 7f8f7316fbe1ee5ecdec6cc7090c1443
SHA1 114337f6578042f493cbac14102f7004a5c8fca5
SHA256 aa9b27d74a6384daf9fd5f8a640938a5fb9d1c61b74635e29d8ffe1d1c176d55
SHA512 1dc4c62f573d6bec08614822cc7cc56e61358f48c3b7eb8a7e546b7bb3a68620c4bff201d4ca433fbf4f33e20afc1a33f3dab07aa708e38edaf72b2e91284820

C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

MD5 49752c1f64fe93bf8ca76b460a65b1be
SHA1 f6ee951f91ae553bc8d7db8e4f2f8c4dbcfa8ce4
SHA256 f1713d2667b0e19c9c8f29bd6a41e8e122cc6df60d681703a87377abb197850b
SHA512 a33985278dda59224260b5c219dfd2dda9d6bcc30b62c6c9dbd4c403781a8b0a6e09261dd14a5009e0581afb94c470721dd7ae35aa41d246d3d1665e5c961b54

C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

MD5 51be96edee511a23029554215f762179
SHA1 0285a881d814919d26ca96cd5257ffe0b7ccbac2
SHA256 0c5e9c8ca2b6aba939c14c01c7147511805c2f9be01432c2181509839839fefd
SHA512 ff2bed17ac95af37d552b934fef2f4db0aa0bf50da27580ca3e54d5406a5cb0e8136b6c987b5e822fdf0152ba6988f1ab3fc53641e2401789de47bb281c4a011

C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

MD5 e56e5028fb22033bedeec9a37fcbfc18
SHA1 3b9046a636e216336d22b1d2d05fb0656c0b8830
SHA256 36cc33ec7867a55e03481b2839804932177b843ef81deda44c5c6a97d0390666
SHA512 5f39cdb2c95ea9cc596ab050c170486b6a56d2030ca39ed0e9a64dd5e86bb7004b2183f5341ece2210ba952a44a38997207b4794189cc6e7838f1ce0cc7c5fc5

C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

MD5 99045f88ec1bb2d8ab1497b0f80bb4df
SHA1 effb66fc19cf13e2cf7497dce39ece2a93b27def
SHA256 42adbec6a9f704501862e7508fc5a450e9bb424a0a0ec970fff8328fc3822a44
SHA512 9ee59a0cb7ef1a55c0cb81f0bce9a4ef746159af1ea85b7c1cb44e0918c502be8d452fe76ddb295db0cb31d66e13a3767a35088928929bb671174197062f5a84

C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\3C428B1A3E5F57D887EC4B864FAC5DCC

MD5 e4a68ac854ac5242460afd72481b2a44
SHA1 df3c24f9bfd666761b268073fe06d1cc8d4f82a4
SHA256 cb3ccbb76031e5e0138f8dd39a23f9de47ffc35e43c1144cea27d46a5ab1cb5f
SHA512 5622207e1ba285f172756f6019af92ac808ed63286e24dfecc1e79873fb5d140f1ceb7133f2476e89a5f75f711f9813a9fbb8fd5287f64adfdcc53b864f9bdc5

C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

MD5 ff8611290271ff58003cc2213c7db10a
SHA1 0a21585dcf388d37edaaf30f1da083e8a53f4f03
SHA256 f78dc281e298bf6c7859c8c71c4f293fea15582616dc0c6297772d5aa51971e7
SHA512 baf881d7cb71a9bd268e3e299fbc016d8d6e142c826b4bbc69237d682730531ccaed67c217382d542911a1adffc8ef04d98a3eb1234e89a8e771993305073ef6

C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

MD5 fd026939158908fc6bd9f949e1ea8f13
SHA1 3b4627d6b583ab0f64137d3fdde2ad4e3d78a68b
SHA256 1867ceab23826c710c021a841d893115ce61b51a6bd46130a342048afc9d06ef
SHA512 1592e82e5ab3f59dbad5a6b9a1439a39fe6112278309f3eca12988d1ee5ecf46ed02b353c1174a3dd954aa4c13928a4a9d0710b2a14ab35f8b5d5f4651f5c1a6

C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

MD5 8f04ca3d5eb04de3a4711e6dc8256b2c
SHA1 badbd529e183fa8964d41c95e6280348cf0300b4
SHA256 47a68b8efd8541cefffc8a6c177f910ebdab89154d0e5e3e4fcf4bb27aff7552
SHA512 b1e5e3d9b57aac8f2a4a2a1b67bb8d42c4aa7aebafd883d09be95967b1761e6872f34504a8c138ca0860bb203b0e8213800ffc9c154e97a8024051e46139d0c3

C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\3C428B1A3E5F57D887EC4B864FAC5DCC

MD5 f9e76f1d30855040e8dc34c527d32868
SHA1 76d8e0056006c8d629badc5e707392a34ded8765
SHA256 a4daf44be1ad47f0d4297c9ed5bd33e000298a950ead87357a6e18d8faebcd97
SHA512 c4bfdaf4ba24c6ea96d7ca26399a6611d5168bc5d496a099a223c9bdca0f4c060c0719cb9071b95d6a040c40c25aa2b80fcc31e14a0b0a1506476fe83ed54dbe

C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

MD5 5b13a5d4ad1fd2fab636a43b2a983b0c
SHA1 fa2dd7d8a78a91396f44cacad0324eca0c677119
SHA256 9160b1951cff258b6b9645fd7d57654939003f2515d60ce28124377880e37964
SHA512 dd6100c5aa7ef9438b75943b5c20008f19bd215db241de8c33a74ce6004c4bab716679fb6b8da8f40302428ddf0ec4b04a1c163c37be1c329ecae9cf68389211

C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\GA43GQEJ\MEtExguyptz[1].css

MD5 ed49e364f92076f052724bf274e62705
SHA1 23770b3f7401dba26a32c37187fe1ea7c0b69e87
SHA256 fcf70567eccf23a433ea35f45e89d9051c24439e7ecca2544f232195d1a8aa74
SHA512 cac8cb74314daff4e8290bc36270852face11eb8cf76f33bd970c7d093aac39a831f29a7a6d2445c96093b438ecc0b7918b5068c0aa16bbe9d6434e0c905b3c3

C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

MD5 6b230449570a3df859dda06499d85909
SHA1 5c5af32e791ef0b519e2c02223a37e5298a0fceb
SHA256 f786a5269ea0d90f35f7450c74b58393bb0144cadcfcc36a0779132c62b08e5a
SHA512 4c2f82b686e2f60a7aae66e6f875a3bec49789267bd7f5e2a76cac7688cb3eaf737c290345fff53f3377fd3fd86e1713178e8cddf080ed3b9be6f741464c9b9d

C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

MD5 8afefe76c3f1a7d1e16d06a28588f32e
SHA1 ed40ac1cb8400579cb888898f63f6062855aeda8
SHA256 887f0d942ab3cf29eaee468045df77d183d07ce3f04f2bf3547e38644dae3cef
SHA512 ff0e60cee58a44df3caa6973eb12cab24c48ce00ad4af62f7e4bab55af77e5e5e8e6b27344189f2d874ef9fc0c68e03cbccd5ef55fe60122870c0a04e85d1938

C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

MD5 2355d705561ee9091c0262790245ebdb
SHA1 8d76a2b614fde19d16f387718d2d51bfdf039d66
SHA256 98889d5beb6746520e938b2be5d6ad14c881c1dddb6d25a1f85ded1213a08950
SHA512 3f425a07ead3d3240966ac1798b8c465bd44dab23b001fc1901b037b2e00005d7c2b172467f00fbcf5d9d81839cf9a98f9c5e161a77aed5e20bedb25167da53a

C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

MD5 a9577b3f4ae25e3961453974f3befcca
SHA1 056f48b4e24f88f2b40773b2543f681985d7af73
SHA256 10cbe55a44a23138ce9d7988ca7b0718dabddabfd93e445b60939fcf43393cb6
SHA512 e593beed2cba9025e374e1f3301949f742ec7783cea277d4e5a36895f2379e28aa42ef8940564a1cbba0080851dd46bb2b1673c736bc4562810af7a8812a4aad

C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

MD5 44c0257472f4990bf3d1549e101b5b60
SHA1 d57138ef92a148025b6d0c8a323974da043b82bb
SHA256 faffd6bc2b1048484da9b54c34395637b393332f85957cd25148481bdd810044
SHA512 3140c44884592cac24710d9efcbafa278b98150ba6403b0cb9db272edbd46a71ebfc4c205a263b56193e50c17c756802faa41e63736f887a0b592d6478c7f94d

C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

MD5 e28f0f62dbb72a7a56a0a57e3b222620
SHA1 a9e77b8c85cb600b8103f557635f0b32f6b28aef
SHA256 ad8e8644122ec7ae0eb0f68076dc20a178dc58e1e032aae8a26c28f8640c2c0a
SHA512 9c9cf57a42b5b572cef54caca6727fc2d24200683e311827610936c5c00bc1d5963cfc913aa1d4cb80425d408dca7a257a48567e44e69ce42dc9c7bb2fc828e9

C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

MD5 43929f74ef389e0144d6f980d349d70d
SHA1 7b560e30c408308505111d3f9c25f0cfb9525387
SHA256 84403107c90c100866d2cce64f38db48e75bbdfd8562089b79b7e1abdf9344e9
SHA512 81c40896acfec4b5e88c9304e8d7dfae7908df02d94c7454e260db1b28da8f5a7315e1389e59e3ee1ff2e337c45dec6340b4db30eb4655f99ec02445660cccda

C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

MD5 1c079854e40eb4976e7fc630672ec1fd
SHA1 04e959265373cc222681bd5ce9ab90c5897e82c8
SHA256 1bd5762d9d90ce31262fde300a4672d6ae31c181406e0d56be1568e5934dfd7f
SHA512 45dc2631bca88bf24589a134d5d6e3aeadf437915ec5acd5711d4df8c1b6a747dc3126bbd75d7a896bc41055d095340a6b00f4daf7d23e6301f374b9367f5f31

C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

MD5 39332836b6c7b21fcdae87a025dd6e5b
SHA1 9863e2d7415af3cc3a66ad2a00a6a7b26e79e3a0
SHA256 ba9004058f910438a2e5e42a76b70da199aa186e56eefec25f9cffa5221661e9
SHA512 54c25f970a9bdb392ee2eeca12d205616155ee50e77e10696dfd95f7205c30eeac1e5bc2f799beb3bfd3f0dd7d5ef2ee87dca804d9049cb6bef83fe96b0e9c0d

C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

MD5 7bc83f4f81b71f5d9a41e8bb706ddfed
SHA1 4b2a4ee93bf1247d2dfcebef938ebf611108fe94
SHA256 c4f7f50aea897d20bbaac751e19cfb4862e3ff6c6e5b2a28a0882f1cfc2af0e2
SHA512 609f28adb81809fe931b5cce7415991da77fa6724022f7df0e23868b26625d7f61c1d2cb44f44e1d95eb071614ce5df73cad564baec93112406a2834f065c959

Analysis: behavioral2

Detonation Overview

Submitted

2024-08-27 20:21

Reported

2024-08-27 20:24

Platform

win10v2004-20240802-en

Max time kernel

145s

Max time network

139s

Command Line

"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\c5ac7e845a783df2bf7d6f81accde52c_JaffaCakes118.html

Signatures

Browser Information Discovery

discovery

Enumerates system info in registry

Description Indicator Process Target
Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe N/A
Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe N/A
Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe N/A

Suspicious use of FindShellTrayWindow

Description Indicator Process Target
N/A N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe N/A
N/A N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe N/A
N/A N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe N/A
N/A N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe N/A
N/A N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe N/A
N/A N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe N/A
N/A N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe N/A
N/A N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe N/A
N/A N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe N/A
N/A N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe N/A
N/A N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe N/A
N/A N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe N/A
N/A N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe N/A
N/A N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe N/A
N/A N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe N/A
N/A N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe N/A
N/A N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe N/A
N/A N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe N/A
N/A N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe N/A
N/A N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe N/A
N/A N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe N/A
N/A N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe N/A
N/A N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe N/A
N/A N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe N/A
N/A N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe N/A

Suspicious use of SendNotifyMessage

Description Indicator Process Target
N/A N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe N/A
N/A N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe N/A
N/A N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe N/A
N/A N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe N/A
N/A N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe N/A
N/A N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe N/A
N/A N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe N/A
N/A N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe N/A
N/A N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe N/A
N/A N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe N/A
N/A N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe N/A
N/A N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe N/A
N/A N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe N/A
N/A N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe N/A
N/A N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe N/A
N/A N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe N/A
N/A N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe N/A
N/A N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe N/A
N/A N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe N/A
N/A N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe N/A
N/A N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe N/A
N/A N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe N/A
N/A N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe N/A
N/A N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe N/A

Suspicious use of WriteProcessMemory

Description Indicator Process Target
PID 2296 wrote to memory of 2112 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 2296 wrote to memory of 2112 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 2296 wrote to memory of 1140 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 2296 wrote to memory of 1140 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 2296 wrote to memory of 1140 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 2296 wrote to memory of 1140 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 2296 wrote to memory of 1140 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 2296 wrote to memory of 1140 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 2296 wrote to memory of 1140 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 2296 wrote to memory of 1140 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 2296 wrote to memory of 1140 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 2296 wrote to memory of 1140 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 2296 wrote to memory of 1140 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 2296 wrote to memory of 1140 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 2296 wrote to memory of 1140 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 2296 wrote to memory of 1140 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 2296 wrote to memory of 1140 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 2296 wrote to memory of 1140 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 2296 wrote to memory of 1140 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 2296 wrote to memory of 1140 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 2296 wrote to memory of 1140 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 2296 wrote to memory of 1140 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 2296 wrote to memory of 1140 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 2296 wrote to memory of 1140 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 2296 wrote to memory of 1140 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 2296 wrote to memory of 1140 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 2296 wrote to memory of 1140 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 2296 wrote to memory of 1140 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 2296 wrote to memory of 1140 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 2296 wrote to memory of 1140 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 2296 wrote to memory of 1140 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 2296 wrote to memory of 1140 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 2296 wrote to memory of 1140 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 2296 wrote to memory of 1140 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 2296 wrote to memory of 1140 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 2296 wrote to memory of 1140 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 2296 wrote to memory of 1140 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 2296 wrote to memory of 1140 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 2296 wrote to memory of 1140 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 2296 wrote to memory of 1140 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 2296 wrote to memory of 1140 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 2296 wrote to memory of 1140 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 2296 wrote to memory of 5032 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 2296 wrote to memory of 5032 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 2296 wrote to memory of 620 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 2296 wrote to memory of 620 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 2296 wrote to memory of 620 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 2296 wrote to memory of 620 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 2296 wrote to memory of 620 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 2296 wrote to memory of 620 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 2296 wrote to memory of 620 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 2296 wrote to memory of 620 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 2296 wrote to memory of 620 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 2296 wrote to memory of 620 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 2296 wrote to memory of 620 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 2296 wrote to memory of 620 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 2296 wrote to memory of 620 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 2296 wrote to memory of 620 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 2296 wrote to memory of 620 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 2296 wrote to memory of 620 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 2296 wrote to memory of 620 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 2296 wrote to memory of 620 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 2296 wrote to memory of 620 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 2296 wrote to memory of 620 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe

Processes

C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe

"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\c5ac7e845a783df2bf7d6f81accde52c_JaffaCakes118.html

C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe

"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffd09e646f8,0x7ffd09e64708,0x7ffd09e64718

C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe

"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2216,6048461813689059816,1820709661382672023,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2228 /prefetch:2

C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe

"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2216,6048461813689059816,1820709661382672023,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2316 /prefetch:3

C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe

"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2216,6048461813689059816,1820709661382672023,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2928 /prefetch:8

C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe

"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2216,6048461813689059816,1820709661382672023,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3276 /prefetch:1

C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe

"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2216,6048461813689059816,1820709661382672023,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3304 /prefetch:1

C:\Windows\System32\CompPkgSrv.exe

C:\Windows\System32\CompPkgSrv.exe -Embedding

C:\Windows\System32\CompPkgSrv.exe

C:\Windows\System32\CompPkgSrv.exe -Embedding

C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe

"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2216,6048461813689059816,1820709661382672023,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4748 /prefetch:1

C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe

"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2216,6048461813689059816,1820709661382672023,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5176 /prefetch:1

C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe

"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2216,6048461813689059816,1820709661382672023,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5380 /prefetch:1

C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe

"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2216,6048461813689059816,1820709661382672023,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5368 /prefetch:1

C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe

"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2216,6048461813689059816,1820709661382672023,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5236 /prefetch:1

C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe

"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2216,6048461813689059816,1820709661382672023,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=6340 /prefetch:8

C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe

"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2216,6048461813689059816,1820709661382672023,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=6340 /prefetch:8

C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe

"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2216,6048461813689059816,1820709661382672023,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=13 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=2636 /prefetch:1

C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe

"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2216,6048461813689059816,1820709661382672023,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=14 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6120 /prefetch:1

C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe

"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2216,6048461813689059816,1820709661382672023,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=15 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=1324 /prefetch:1

C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe

"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2216,6048461813689059816,1820709661382672023,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=16 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4960 /prefetch:1

C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe

"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2216,6048461813689059816,1820709661382672023,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=6444 /prefetch:2

Network

Country Destination Domain Proto
US 8.8.8.8:53 8.8.8.8.in-addr.arpa udp
US 8.8.8.8:53 232.168.11.51.in-addr.arpa udp
US 8.8.8.8:53 81.144.22.2.in-addr.arpa udp
US 8.8.8.8:53 apis.google.com udp
US 8.8.8.8:53 www.blogger.com udp
US 8.8.8.8:53 ajax.googleapis.com udp
GB 142.250.187.206:443 apis.google.com tcp
GB 142.250.180.9:443 www.blogger.com tcp
FR 142.250.178.138:443 ajax.googleapis.com tcp
US 8.8.8.8:53 adsensecamp.com udp
ID 103.30.145.12:80 adsensecamp.com tcp
ID 103.30.145.12:80 adsensecamp.com tcp
GB 142.250.180.9:443 www.blogger.com udp
GB 142.250.187.206:443 apis.google.com udp
US 8.8.8.8:53 xslt.alexa.com udp
US 8.8.8.8:53 g2.gumgum.com udp
US 8.8.8.8:53 www.google.com udp
US 8.8.8.8:53 widgets.twimg.com udp
GB 142.250.180.2:445 pagead2.googlesyndication.com tcp
US 8.8.8.8:53 bloggerpeer.googlecode.com udp
US 8.8.8.8:53 2.bp.blogspot.com udp
US 8.8.8.8:53 i1128.photobucket.com udp
US 8.8.8.8:53 www.linkwithin.com udp
US 8.8.8.8:53 resources.blogblog.com udp
US 8.8.8.8:53 www.blogblog.com udp
US 8.8.8.8:53 4.bp.blogspot.com udp
US 8.8.8.8:53 i825.photobucket.com udp
ID 103.30.145.12:80 adsensecamp.com tcp
SG 118.139.179.30:80 www.linkwithin.com tcp
GB 216.137.44.125:80 i825.photobucket.com tcp
FR 142.250.179.105:443 resources.blogblog.com tcp
FR 142.250.179.105:443 resources.blogblog.com tcp
GB 142.250.180.9:80 www.blogblog.com tcp
IE 172.253.116.82:80 bloggerpeer.googlecode.com tcp
GB 216.137.44.125:80 i825.photobucket.com tcp
FR 142.250.179.97:80 4.bp.blogspot.com tcp
FR 142.250.179.97:80 4.bp.blogspot.com tcp
FR 142.250.179.97:80 4.bp.blogspot.com tcp
GB 142.250.179.228:80 www.google.com tcp
GB 142.250.179.228:80 www.google.com tcp
IE 52.210.146.124:80 g2.gumgum.com tcp
GB 216.137.44.125:443 i825.photobucket.com tcp
GB 216.137.44.125:443 i825.photobucket.com tcp
US 8.8.8.8:53 js.gumgum.com udp
GB 18.165.242.91:443 js.gumgum.com tcp
US 8.8.8.8:53 twitter-badges.s3.amazonaws.com udp
ID 103.30.145.12:443 adsensecamp.com tcp
SG 118.139.179.30:80 www.linkwithin.com tcp
FR 142.250.179.105:443 resources.blogblog.com udp
GB 216.137.44.125:443 i825.photobucket.com tcp
US 16.15.192.30:80 twitter-badges.s3.amazonaws.com tcp
SG 118.139.179.30:80 www.linkwithin.com tcp
ID 103.30.145.12:443 adsensecamp.com tcp
US 8.8.8.8:53 20.160.190.20.in-addr.arpa udp
US 8.8.8.8:53 9.180.250.142.in-addr.arpa udp
US 8.8.8.8:53 206.187.250.142.in-addr.arpa udp
US 8.8.8.8:53 138.178.250.142.in-addr.arpa udp
US 8.8.8.8:53 12.145.30.103.in-addr.arpa udp
US 8.8.8.8:53 125.44.137.216.in-addr.arpa udp
US 8.8.8.8:53 228.179.250.142.in-addr.arpa udp
US 8.8.8.8:53 105.179.250.142.in-addr.arpa udp
US 8.8.8.8:53 97.179.250.142.in-addr.arpa udp
US 8.8.8.8:53 82.116.253.172.in-addr.arpa udp
US 8.8.8.8:53 124.146.210.52.in-addr.arpa udp
US 8.8.8.8:53 91.242.165.18.in-addr.arpa udp
US 8.8.8.8:53 107.39.156.108.in-addr.arpa udp
US 8.8.8.8:53 30.179.139.118.in-addr.arpa udp
US 8.8.8.8:53 30.192.15.16.in-addr.arpa udp
SG 118.139.179.30:80 www.linkwithin.com tcp
US 8.8.8.8:53 www.linksalpha.com udp
IE 52.210.146.124:443 g2.gumgum.com tcp
US 8.8.8.8:53 c.gumgum.com udp
US 8.8.8.8:53 aba.gumgum.com udp
US 8.8.8.8:53 gumgum.com udp
US 8.8.8.8:53 www.facebook.com udp
US 8.8.8.8:53 widgets.amung.us udp
GB 142.250.179.228:80 www.google.com tcp
GB 18.154.84.40:443 gumgum.com tcp
GB 18.165.242.91:443 js.gumgum.com tcp
IE 31.13.73.35:80 www.facebook.com tcp
GB 13.224.222.12:443 c.gumgum.com tcp
SG 118.139.179.30:80 www.linkwithin.com tcp
GB 13.224.132.64:443 aba.gumgum.com tcp
US 104.22.75.171:80 widgets.amung.us tcp
IE 31.13.73.35:443 www.facebook.com tcp
FR 216.58.213.66:139 pagead2.googlesyndication.com tcp
IE 172.253.116.82:80 bloggerpeer.googlecode.com tcp
US 8.8.8.8:53 t.dtscout.com udp
US 141.101.120.11:443 t.dtscout.com tcp
US 8.8.8.8:53 40.84.154.18.in-addr.arpa udp
US 8.8.8.8:53 12.222.224.13.in-addr.arpa udp
US 8.8.8.8:53 171.75.22.104.in-addr.arpa udp
US 8.8.8.8:53 64.132.224.13.in-addr.arpa udp
US 8.8.8.8:53 35.73.13.31.in-addr.arpa udp
US 8.8.8.8:53 static.xx.fbcdn.net udp
IE 31.13.73.22:443 static.xx.fbcdn.net tcp
US 8.8.8.8:53 g.bing.com udp
US 150.171.28.10:443 g.bing.com tcp
US 8.8.8.8:53 11.120.101.141.in-addr.arpa udp
US 8.8.8.8:53 22.73.13.31.in-addr.arpa udp
US 8.8.8.8:53 43.58.199.20.in-addr.arpa udp
N/A 224.0.0.251:5353 udp
US 8.8.8.8:53 217.106.137.52.in-addr.arpa udp
US 8.8.8.8:53 connect.facebook.net udp
IE 31.13.73.22:445 connect.facebook.net tcp
US 8.8.8.8:53 connect.facebook.net udp
IE 31.13.73.22:139 connect.facebook.net tcp
US 8.8.8.8:53 50.23.12.20.in-addr.arpa udp
US 8.8.8.8:53 18.31.95.13.in-addr.arpa udp
US 8.8.8.8:53 172.214.232.199.in-addr.arpa udp
US 8.8.8.8:53 www.facebook.com udp
US 8.8.8.8:53 3.bp.blogspot.com udp
US 8.8.8.8:53 aba.gumgum.com udp
US 8.8.8.8:53 g2.gumgum.com udp
US 8.8.8.8:53 c.gumgum.com udp
FR 142.250.179.97:80 3.bp.blogspot.com tcp
US 8.8.8.8:53 whos.amung.us udp
IE 63.32.228.210:443 g2.gumgum.com tcp
GB 13.224.132.54:443 aba.gumgum.com tcp
US 8.8.8.8:53 js.gumgum.com udp
US 8.8.8.8:53 gumgum.com udp
GB 13.224.222.93:443 c.gumgum.com tcp
US 104.22.75.171:445 whos.amung.us tcp
GB 18.154.84.22:443 gumgum.com tcp
GB 18.165.242.53:443 js.gumgum.com tcp
US 8.8.8.8:53 210.228.32.63.in-addr.arpa udp
US 8.8.8.8:53 93.222.224.13.in-addr.arpa udp
US 8.8.8.8:53 22.84.154.18.in-addr.arpa udp
US 8.8.8.8:53 54.132.224.13.in-addr.arpa udp
US 8.8.8.8:53 53.242.165.18.in-addr.arpa udp
US 104.22.74.171:445 whos.amung.us tcp
US 172.67.8.141:445 whos.amung.us tcp
US 8.8.8.8:53 whos.amung.us udp
US 8.8.8.8:53 kencew.blogspot.com udp
GB 142.250.200.33:80 kencew.blogspot.com tcp
US 8.8.8.8:53 33.200.250.142.in-addr.arpa udp
US 8.8.8.8:53 tse1.mm.bing.net udp
US 150.171.27.10:443 tse1.mm.bing.net tcp
US 150.171.27.10:443 tse1.mm.bing.net tcp
US 150.171.27.10:443 tse1.mm.bing.net tcp
US 150.171.27.10:443 tse1.mm.bing.net tcp
US 150.171.27.10:443 tse1.mm.bing.net tcp
US 8.8.8.8:53 55.36.223.20.in-addr.arpa udp
US 8.8.8.8:53 10.27.171.150.in-addr.arpa udp

Files

C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad\settings.dat

MD5 847d47008dbea51cb1732d54861ba9c9
SHA1 f2099242027dccb88d6f05760b57f7c89d926c0d
SHA256 10292fa05d896a2952c1d602a72d761d34bc776b44d6a7df87e49b5b613a8ac1
SHA512 bd1526aa1cc1c016d95dfcc53a78b45b09dde4ce67357fc275ab835dbe1bb5b053ca386239f50cde95ad243a9c1bbb12f7505818577589beecc6084f7b94e83f

\??\pipe\LOCAL\crashpad_2296_KMKEAQUGBUGZWAQW

MD5 d41d8cd98f00b204e9800998ecf8427e
SHA1 da39a3ee5e6b4b0d3255bfef95601890afd80709
SHA256 e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855
SHA512 cf83e1357eefb8bdf1542850d66d8007d620e4050b5715dc83f4a921d36ce9ce47d0d13c5d85f2b0ff8318d2877eec2f63b931bd47417a81a538327af927da3e

C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad\settings.dat

MD5 f9664c896e19205022c094d725f820b6
SHA1 f8f1baf648df755ba64b412d512446baf88c0184
SHA256 7121d84202a850791c2320385eb59eda4d697310dc51b1fcd4d51264aba2434e
SHA512 3fa5d2c68a9e70e4a25eaac2095171d87c741eec2624c314c6a56f4fa390d6319633bf4c48b1a4af7e9a0451f346beced9693da88cfc7bcba8dfe209cbd1b3ae

C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Preferences

MD5 9f4a0f30633fe43eb54b21b4c0f0069f
SHA1 6befa233bb3fb6356a3cbe2bb26f3cf34f9269df
SHA256 ceaa7d66b59bd03457cf495c39f8ba7bf8b527aa420598255aba3dbfe291e963
SHA512 0e762d63f2acea89945d6c44626c19e3babb1fdf7d1a3f5aadac9d8ec17221278063254ddfa9c0f3058ebad189a915c4f4f1587c192a604a6a53560f98b55d39

C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\77EC63BDA74BD0D0E0426DC8F8008506

MD5 0be75b0fdad4b536330a66eb400a3910
SHA1 8f8e879de5cc7a283b6de7a3cd8e40a023a893cd
SHA256 a3f3b9fc3411c38cdf78957c9e11a40528fa134464c20eec087ca3d8563f1a8d
SHA512 99a52feb6ea178ed41f7a4f3f2810e1633c4ad5b76f34b9a03b7b7c42794313b674777d8b9f3e1551b57d8e62bba55cb4bb976cc22a35c73a3bec5d83dfdf08c

C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Local State

MD5 cbe33e7b65410b41dbe4a95d62410978
SHA1 5673f8caf13635fbbccfec799003d36da9113211
SHA256 1d06319bbc476cf5fc25c310dcf91867c3d32c24d23dd04d462cf48efa4b374c
SHA512 3ef921eb1b388f8aba1d798a6aa53ffaedf9cb8c707cf9df1e6544a2f410e8fc63bc95ca828e9752c69735d2d6ddf275af544d1a6f9ed034f3f352984e9f5e81

C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Preferences

MD5 cc1404ddde79d15e48a521d64c7dd4ef
SHA1 0714968fbecb3bb631947456be6c9937c1c40edb
SHA256 f4c2c1fd29b878b2373f529842c6843eb9f33b1b88559ab58fc5126b9045aa3c
SHA512 2417c57a8e9586f778dc10f92bcdf4c55165c8ad646d02d256b0c533e8499bea56ac0b6dccdc48341a4717dbd6d6c0af7e971c9eae21af98d03922be02062436

C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index

MD5 a8046f47ebece77bda5ff31e5c7d3c2f
SHA1 585a9f9e83edea03a83fa1c597b450dd35af411d
SHA256 0a4b81e58737f4f5c22a7750b2a7b0c1ff3ea0a88b93878ab308f498e2645970
SHA512 588cbc32ae78ec2970cdafaca6ddae78095e0214936b4b1f4047e97f377a0a9fce7f2d5e547d443d67b07942fe910b97da14487c8f2092bffd9b7b4e04ac83fd

C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Network Persistent State

MD5 50266b86f5a9c1860557ad937d5319a1
SHA1 0ef55be530da5ccf41d49f50a7c715f88db7e7d9
SHA256 a427e1847711ae4077e5e3163dc39a155a1b4316d87fb2271205120482340cdb
SHA512 2385c541e72d7e35a067aa9605a4c2495cd45af99cb4d05ef2766e70cdedf7d64c80e6bb347fbf34996686c16ed2acaed285a811776b37f67df64f4583a7c762

C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\TransportSecurity

MD5 e3bb091b5cb34c87c10f72cc49fa52a0
SHA1 b21b3fc461148345a07bce6e37e61fd6f2f3a8c9
SHA256 edd37c3e417f97c69c80eba0d65412cb0c072cfabeaefada4423aa2623ee0611
SHA512 f918f22800fd4f1cf7dc79a711d067c64abe560b7a9280738c1fd215a489f706193651a91b740bf5b2c7b312b765cb226efe1734d7b512a0a9b2ad927081df05

C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\TransportSecurity~RFe58d116.TMP

MD5 984b04a04d6f3cf140c12488cdc3412a
SHA1 57fdde024475efbe9aa8801cfd07a4c84753763f
SHA256 87779c4c9da263f37f42b6baec217f929e34738b6c1fcb15377d0c2b1ecc6df3
SHA512 6b44134b6279411d41eb09b5b093f3620dc8ddf4a1cefbf20a2a3ba7bd16cccbe76f03a1da4b1430af0f502b338e810ac8dcd74d9e6eb64281906ff13a948811

C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\data_reduction_proxy_leveldb\CURRENT

MD5 6752a1d65b201c13b62ea44016eb221f
SHA1 58ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA256 0861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA512 9cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389

C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Preferences

MD5 589d98ec628ddba973fd8789bdeba528
SHA1 30e45fc7e9cbc6c8ef21c9fd7a6146331caec904
SHA256 d65edb84863a5034bebf3b79c81d68cdffafaa00febc7994049c6f7eb59123b5
SHA512 0788ae2cc5f5f72e48d40a97acd2f87960f899a7f8ae3a713d3b1c4b09a9acbed6c920bf6170539d6fc51428c7e171430526449ecab5ffcc144534b647d2be37