Malware Analysis Report

2024-10-23 17:23

Sample ID 240828-mh535svcrg
Target c6ac00e7e54bb6bc10de9e2d2d781dbc_JaffaCakes118
SHA256 878a6db2cdbe4aeedc2c8192787550ac32f2ad15502ce6c528565827a96eee50
Tags
socgholish discovery downloader
score
10/10

Table of Contents

Analysis Overview

MITRE ATT&CK

Enterprise Matrix V15

Analysis: static1

Detonation Overview

Signatures

Analysis: behavioral1

Detonation Overview

Command Line

Signatures

Processes

Network

Files

Analysis: behavioral2

Detonation Overview

Command Line

Signatures

Processes

Network

Files

Analysis Overview

score
10/10

SHA256

878a6db2cdbe4aeedc2c8192787550ac32f2ad15502ce6c528565827a96eee50

Threat Level: Known bad

The file c6ac00e7e54bb6bc10de9e2d2d781dbc_JaffaCakes118 was found to be: Known bad.

Malicious Activity Summary

socgholish discovery downloader

SocGholish

System Location Discovery: System Language Discovery

Browser Information Discovery

Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary

Modifies Internet Explorer settings

Suspicious use of FindShellTrayWindow

Suspicious behavior: EnumeratesProcesses

Suspicious use of SetWindowsHookEx

Suspicious use of WriteProcessMemory

Enumerates system info in registry

Suspicious use of SendNotifyMessage

MITRE ATT&CK

Analysis: static1

Detonation Overview

Reported

2024-08-28 10:28

Signatures

N/A

Analysis: behavioral1

Detonation Overview

Submitted

2024-08-28 10:28

Reported

2024-08-28 10:31

Platform

win7-20240729-en

Max time kernel

150s

Max time network

143s

Command Line

"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\c6ac00e7e54bb6bc10de9e2d2d781dbc_JaffaCakes118.html

Signatures

SocGholish

downloader socgholish

System Location Discovery: System Language Discovery

discovery
Description Indicator Process Target
Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE N/A

Modifies Internet Explorer settings

adware spyware
Description Indicator Process Target
Set value (int) \REGISTRY\USER\S-1-5-21-2257386474-3982792636-3902186748-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{55B4ACC1-6528-11EF-B88D-EAA2AC88CDB5} = "0" C:\Program Files\Internet Explorer\iexplore.exe N/A
Key created \REGISTRY\USER\S-1-5-21-2257386474-3982792636-3902186748-1000\Software\Microsoft\Internet Explorer\SearchScopes C:\Program Files\Internet Explorer\iexplore.exe N/A
Set value (int) \REGISTRY\USER\S-1-5-21-2257386474-3982792636-3902186748-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" C:\Program Files\Internet Explorer\iexplore.exe N/A
Set value (data) \REGISTRY\USER\S-1-5-21-2257386474-3982792636-3902186748-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb010000004ecca440099c424d92937bb9b1db2c9200000000020000000000106600000001000020000000c061ce7e22de88bf9337562db7e9ed19dc2496ec146290e5402caae2b7327eae000000000e800000000200002000000052d9c8bdb2683bd2ff9081d1fca3dd5c7839f8757c557fbc393d1739a1bb73ff2000000071953a671ae65d5fc227dbaecd5c6a4fb5a98b5505509930172588a75f2bb1bc400000006883923f03b3a82a915a77020d8e1e6e654c796f816e81c3b1c81bc2d4509fef4ea150be01a73ef292c570f89c76aecc016395d37b53760cc07310b84775624b C:\Program Files\Internet Explorer\iexplore.exe N/A
Set value (data) \REGISTRY\USER\S-1-5-21-2257386474-3982792636-3902186748-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = a06b4a5335f9da01 C:\Program Files\Internet Explorer\iexplore.exe N/A
Key created \REGISTRY\USER\S-1-5-21-2257386474-3982792636-3902186748-1000\Software\Microsoft\Internet Explorer\GPU C:\Program Files\Internet Explorer\iexplore.exe N/A
Key created \REGISTRY\USER\S-1-5-21-2257386474-3982792636-3902186748-1000\Software\Microsoft\Internet Explorer\IntelliForms C:\Program Files\Internet Explorer\iexplore.exe N/A
Set value (int) \REGISTRY\USER\S-1-5-21-2257386474-3982792636-3902186748-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" C:\Program Files\Internet Explorer\iexplore.exe N/A
Key created \REGISTRY\USER\S-1-5-21-2257386474-3982792636-3902186748-1000\Software\Microsoft\Internet Explorer\Zoom C:\Program Files\Internet Explorer\iexplore.exe N/A
Set value (str) \REGISTRY\USER\S-1-5-21-2257386474-3982792636-3902186748-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" C:\Program Files\Internet Explorer\iexplore.exe N/A
Key created \REGISTRY\USER\S-1-5-21-2257386474-3982792636-3902186748-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE N/A
Set value (data) \REGISTRY\USER\S-1-5-21-2257386474-3982792636-3902186748-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 C:\Program Files\Internet Explorer\iexplore.exe N/A
Key created \REGISTRY\USER\S-1-5-21-2257386474-3982792636-3902186748-1000\Software\Microsoft\Internet Explorer\LowRegistry C:\Program Files\Internet Explorer\iexplore.exe N/A
Set value (int) \REGISTRY\USER\S-1-5-21-2257386474-3982792636-3902186748-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" C:\Program Files\Internet Explorer\iexplore.exe N/A
Key created \REGISTRY\USER\S-1-5-21-2257386474-3982792636-3902186748-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing C:\Program Files\Internet Explorer\iexplore.exe N/A
Key created \REGISTRY\USER\S-1-5-21-2257386474-3982792636-3902186748-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic C:\Program Files\Internet Explorer\iexplore.exe N/A
Key created \REGISTRY\USER\S-1-5-21-2257386474-3982792636-3902186748-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive C:\Program Files\Internet Explorer\iexplore.exe N/A
Key created \REGISTRY\USER\S-1-5-21-2257386474-3982792636-3902186748-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch C:\Program Files\Internet Explorer\iexplore.exe N/A
Key created \REGISTRY\USER\S-1-5-21-2257386474-3982792636-3902186748-1000\Software\Microsoft\Internet Explorer\Main C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE N/A
Key created \REGISTRY\USER\S-1-5-21-2257386474-3982792636-3902186748-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage C:\Program Files\Internet Explorer\iexplore.exe N/A
Key created \REGISTRY\USER\S-1-5-21-2257386474-3982792636-3902186748-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage C:\Program Files\Internet Explorer\iexplore.exe N/A
Key created \REGISTRY\USER\S-1-5-21-2257386474-3982792636-3902186748-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser C:\Program Files\Internet Explorer\iexplore.exe N/A
Key created \REGISTRY\USER\S-1-5-21-2257386474-3982792636-3902186748-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain C:\Program Files\Internet Explorer\iexplore.exe N/A
Key created \REGISTRY\USER\S-1-5-21-2257386474-3982792636-3902186748-1000\Software\Microsoft\Internet Explorer\PageSetup C:\Program Files\Internet Explorer\iexplore.exe N/A
Set value (int) \REGISTRY\USER\S-1-5-21-2257386474-3982792636-3902186748-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" C:\Program Files\Internet Explorer\iexplore.exe N/A
Key created \REGISTRY\USER\S-1-5-21-2257386474-3982792636-3902186748-1000\Software\Microsoft\Internet Explorer\IETld\LowMic C:\Program Files\Internet Explorer\iexplore.exe N/A
Key created \REGISTRY\USER\S-1-5-21-2257386474-3982792636-3902186748-1000\Software\Microsoft\Internet Explorer\InternetRegistry C:\Program Files\Internet Explorer\iexplore.exe N/A
Set value (str) \REGISTRY\USER\S-1-5-21-2257386474-3982792636-3902186748-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE N/A
Key created \REGISTRY\USER\S-1-5-21-2257386474-3982792636-3902186748-1000\Software\Microsoft\Internet Explorer\Main C:\Program Files\Internet Explorer\iexplore.exe N/A
Set value (int) \REGISTRY\USER\S-1-5-21-2257386474-3982792636-3902186748-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" C:\Program Files\Internet Explorer\iexplore.exe N/A
Set value (data) \REGISTRY\USER\S-1-5-21-2257386474-3982792636-3902186748-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 C:\Program Files\Internet Explorer\iexplore.exe N/A
Key created \REGISTRY\USER\S-1-5-21-2257386474-3982792636-3902186748-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery C:\Program Files\Internet Explorer\iexplore.exe N/A
Key created \REGISTRY\USER\S-1-5-21-2257386474-3982792636-3902186748-1000\Software\Microsoft\Internet Explorer\DomainSuggestion C:\Program Files\Internet Explorer\iexplore.exe N/A
Set value (int) \REGISTRY\USER\S-1-5-21-2257386474-3982792636-3902186748-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "431002806" C:\Program Files\Internet Explorer\iexplore.exe N/A
Key created \REGISTRY\USER\S-1-5-21-2257386474-3982792636-3902186748-1000\Software\Microsoft\Internet Explorer\Toolbar C:\Program Files\Internet Explorer\iexplore.exe N/A
Set value (str) \REGISTRY\USER\S-1-5-21-2257386474-3982792636-3902186748-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" C:\Program Files\Internet Explorer\iexplore.exe N/A

Suspicious use of FindShellTrayWindow

Description Indicator Process Target
N/A N/A C:\Program Files\Internet Explorer\iexplore.exe N/A

Processes

C:\Program Files\Internet Explorer\iexplore.exe

"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\c6ac00e7e54bb6bc10de9e2d2d781dbc_JaffaCakes118.html

C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE

"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1972 CREDAT:275457 /prefetch:2

Network

Country Destination Domain Proto
US 8.8.8.8:53 ajax.googleapis.com udp
US 8.8.8.8:53 adsensecamp.com udp
US 8.8.8.8:53 2.bp.blogspot.com udp
US 8.8.8.8:53 resources.blogblog.com udp
US 8.8.8.8:53 apis.google.com udp
US 8.8.8.8:53 www.blogger.com udp
US 8.8.8.8:53 i1128.photobucket.com udp
US 8.8.8.8:53 static.inilah.com udp
US 8.8.8.8:53 xslt.alexa.com udp
US 8.8.8.8:53 www.google.com udp
US 8.8.8.8:53 g2.gumgum.com udp
US 8.8.8.8:53 twitter-badges.s3.amazonaws.com udp
US 8.8.8.8:53 widgets.twimg.com udp
US 8.8.8.8:53 bloggerpeer.googlecode.com udp
US 8.8.8.8:53 www.linkwithin.com udp
GB 142.250.180.1:80 2.bp.blogspot.com tcp
GB 142.250.180.9:443 www.blogger.com tcp
GB 142.250.180.9:443 www.blogger.com tcp
GB 142.250.180.9:443 www.blogger.com tcp
US 52.217.204.225:80 twitter-badges.s3.amazonaws.com tcp
GB 142.250.180.9:443 www.blogger.com tcp
GB 142.250.187.206:443 apis.google.com tcp
GB 142.250.180.1:80 2.bp.blogspot.com tcp
GB 142.250.180.9:443 www.blogger.com tcp
GB 142.250.187.206:443 apis.google.com tcp
US 52.217.204.225:80 twitter-badges.s3.amazonaws.com tcp
GB 142.250.179.228:80 www.google.com tcp
GB 216.58.212.202:443 ajax.googleapis.com tcp
GB 142.250.179.228:80 www.google.com tcp
GB 216.58.212.202:443 ajax.googleapis.com tcp
GB 3.162.20.23:80 i1128.photobucket.com tcp
GB 3.162.20.23:80 i1128.photobucket.com tcp
IE 52.48.92.50:80 g2.gumgum.com tcp
IE 52.48.92.50:80 g2.gumgum.com tcp
IE 172.253.116.82:80 bloggerpeer.googlecode.com tcp
IE 172.253.116.82:80 bloggerpeer.googlecode.com tcp
SG 118.139.179.30:80 www.linkwithin.com tcp
SG 118.139.179.30:80 www.linkwithin.com tcp
GB 3.162.20.23:443 i1128.photobucket.com tcp
GB 3.162.20.23:443 i1128.photobucket.com tcp
US 8.8.8.8:53 js.gumgum.com udp
GB 18.165.242.120:443 js.gumgum.com tcp
GB 18.165.242.120:443 js.gumgum.com tcp
GB 18.165.242.120:443 js.gumgum.com tcp
GB 18.165.242.120:443 js.gumgum.com tcp
GB 18.165.242.120:443 js.gumgum.com tcp
GB 18.165.242.120:443 js.gumgum.com tcp
ID 103.30.145.12:80 adsensecamp.com tcp
ID 103.30.145.12:80 adsensecamp.com tcp
GB 18.165.242.120:443 js.gumgum.com tcp
GB 18.165.242.120:443 js.gumgum.com tcp
US 8.8.8.8:53 c.pki.goog udp
US 8.8.8.8:53 c.pki.goog udp
US 8.8.8.8:53 c.pki.goog udp
US 8.8.8.8:53 c.pki.goog udp
US 8.8.8.8:53 c.pki.goog udp
GB 142.250.178.3:80 c.pki.goog tcp
GB 142.250.178.3:80 c.pki.goog tcp
GB 142.250.178.3:80 c.pki.goog tcp
GB 142.250.178.3:80 c.pki.goog tcp
GB 142.250.178.3:80 c.pki.goog tcp
GB 142.250.178.3:80 c.pki.goog tcp
GB 142.250.178.3:80 c.pki.goog tcp
GB 142.250.178.3:80 c.pki.goog tcp
GB 142.250.178.3:80 c.pki.goog tcp
US 8.8.8.8:53 o.pki.goog udp
US 8.8.8.8:53 o.pki.goog udp
US 8.8.8.8:53 o.pki.goog udp
US 8.8.8.8:53 o.pki.goog udp
US 8.8.8.8:53 o.pki.goog udp
US 8.8.8.8:53 o.pki.goog udp
US 8.8.8.8:53 o.pki.goog udp
US 8.8.8.8:53 o.pki.goog udp
GB 142.250.178.3:80 o.pki.goog tcp
GB 142.250.178.3:80 o.pki.goog tcp
GB 142.250.178.3:80 o.pki.goog tcp
GB 142.250.178.3:80 o.pki.goog tcp
GB 142.250.178.3:80 o.pki.goog tcp
GB 142.250.178.3:80 o.pki.goog tcp
GB 142.250.178.3:80 o.pki.goog tcp
GB 142.250.178.3:80 o.pki.goog tcp
GB 142.250.178.3:80 o.pki.goog tcp
ID 103.30.145.12:443 adsensecamp.com tcp
ID 103.30.145.12:443 adsensecamp.com tcp
US 8.8.8.8:53 i825.photobucket.com udp
US 8.8.8.8:53 www.blogblog.com udp
GB 3.162.20.109:80 i825.photobucket.com tcp
GB 3.162.20.109:80 i825.photobucket.com tcp
GB 142.250.180.9:80 www.blogblog.com tcp
GB 142.250.180.9:80 www.blogblog.com tcp
GB 3.162.20.109:443 i825.photobucket.com tcp
US 8.8.8.8:53 r11.o.lencr.org udp
US 8.8.8.8:53 r11.o.lencr.org udp
GB 173.222.211.9:80 r11.o.lencr.org tcp
GB 173.222.211.43:80 r11.o.lencr.org tcp
US 8.8.8.8:53 www.linksalpha.com udp
US 8.8.8.8:53 widgets.amung.us udp
US 8.8.8.8:53 www.facebook.com udp
GB 157.240.221.35:80 www.facebook.com tcp
GB 157.240.221.35:80 www.facebook.com tcp
US 104.22.74.171:80 widgets.amung.us tcp
US 104.22.74.171:80 widgets.amung.us tcp
GB 157.240.221.35:443 www.facebook.com tcp
US 8.8.8.8:53 static.xx.fbcdn.net udp
IE 31.13.73.22:443 static.xx.fbcdn.net tcp
IE 31.13.73.22:443 static.xx.fbcdn.net tcp
US 204.79.197.200:443 ieonline.microsoft.com tcp
US 204.79.197.200:443 ieonline.microsoft.com tcp
US 8.8.8.8:53 www.microsoft.com udp
US 8.8.8.8:53 www.microsoft.com udp
US 204.79.197.200:443 ieonline.microsoft.com tcp
US 104.22.74.171:80 widgets.amung.us tcp
US 104.22.74.171:80 widgets.amung.us tcp
GB 157.240.221.35:80 www.facebook.com tcp
GB 157.240.221.35:80 www.facebook.com tcp
GB 157.240.221.35:80 www.facebook.com tcp
US 8.8.8.8:53 3.bp.blogspot.com udp
GB 142.250.180.9:80 www.blogblog.com tcp
GB 142.250.180.9:80 www.blogblog.com tcp
GB 142.250.180.1:80 3.bp.blogspot.com tcp
GB 142.250.180.1:80 3.bp.blogspot.com tcp
GB 157.240.221.35:443 www.facebook.com tcp
GB 157.240.221.35:443 www.facebook.com tcp
GB 157.240.221.35:443 www.facebook.com tcp
GB 142.250.180.9:443 www.blogblog.com tcp
GB 142.250.180.9:443 www.blogblog.com tcp

Files

C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\24BD96D5497F70B3F510A6B53CD43F3E_3A89246FB90C5EE6620004F1AE0EB0EA

MD5 0d7a795d047dac4083cc29a2617fa199
SHA1 845fe41cdd2632f4c9f9907e4a316712303ca6aa
SHA256 84fcc72bcda285c50e30ccd3bce5280a021e88ec4649687224e93442ebcf25f1
SHA512 70d75bdd1990ae577390b1036e4a4ec89499020842d6a609ad8b161a70b94c854d705f48738518c206544919b9442fee6ffcc2849be0d9f1a607ec39494ad2b3

C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\24BD96D5497F70B3F510A6B53CD43F3E_3A89246FB90C5EE6620004F1AE0EB0EA

MD5 19505bb31c79cc1a7db2996333def5bd
SHA1 60430231312b7beb8dba1f58370a7af8d559fcfb
SHA256 583a644129508f37946dc725c9d5c11756b1b34787987bd3746477a0b5bcf4c2
SHA512 f7e2659a83eee5d4d4e843d83b86afd9f0d96c1e75f8014c129fc80d8459f5f19793e0029ff0fa86fb41fee090c522243c9639b2a8548331cfcd5c9c49bac5be

C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\05DDC6AA91765AACACDB0A5F96DF8199

MD5 e935bc5762068caf3e24a2683b1b8a88
SHA1 82b70eb774c0756837fe8d7acbfeec05ecbf5463
SHA256 a8accfcfeb51bd73df23b91f4d89ff1a9eb7438ef5b12e8afda1a6ff1769e89d
SHA512 bed4f6f5357b37662623f1f8afed1a3ebf3810630b2206a0292052a2e754af9dcfe34ee15c289e3d797a8f33330e47c14cbefbc702f74028557ace29bf855f9e

C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\05DDC6AA91765AACACDB0A5F96DF8199

MD5 ccaaa4e9731fc4cd88d016111f90fe64
SHA1 ab6b6809c826d071cb1cead6048222e4bac66d43
SHA256 51bc5e283f0871c25c79a22120c2909cf4335762c78a1e23625e541f89e8482f
SHA512 ee5552186eab49ce859084f2f4e9d81ac97e9e8c4613e969a79cc1dc797966143c6e8c6dcd51852f7f9141dd9a024508e84a46599768b9b44867a8bf74985a49

C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\05DDC6AA91765AACACDB0A5F96DF8199

MD5 67f0cee1932ca1719df1895ddd45fe6c
SHA1 20f0301a722171c379a1743697ec7a01829cfaa5
SHA256 e6967b4af5bb68964b9baedab6becc80a37b7a925400213a536a56cde4663b95
SHA512 c6ff5dcdd3d867111a5529e82aad726941e9a8931fc31cb15c4808c2c17a921ce4a78bfd618080aa3ae33b4fe6adafe3baed60463cb6469ab7c7c491c2d57cdf

C:\Users\Admin\AppData\Local\Temp\Cab7AFC.tmp

MD5 49aebf8cbd62d92ac215b2923fb1b9f5
SHA1 1723be06719828dda65ad804298d0431f6aff976
SHA256 b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512 bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b

C:\Users\Admin\AppData\Local\Temp\Tar7B0E.tmp

MD5 4ea6026cf93ec6338144661bf1202cd1
SHA1 a1dec9044f750ad887935a01430bf49322fbdcb7
SHA256 8efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA512 6c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b

C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

MD5 513706aad8b3e182df077adadb503b64
SHA1 133282f0a0ae8c44dc8afd3e8a51a13f0ec63e3f
SHA256 42409386991f9ebcdbf8b35f61e76d54dc6b974bda8036470c5fc6fd9377314a
SHA512 c6e035b2ef9d176f1102ba74ce569ee2cf87cb61a78e8469980385acf65b3d99d360d8f939cacd947af81c1b155cf80d2e8c274b5165a15843b044cffb4c3281

C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

MD5 a84891974abddf195948810faea3ef1d
SHA1 29c174cef365e3158e1273eacc1d66fb4569b2f1
SHA256 ee9f7dd21bff6cd16968eaff248fef04056f98b1fcdfbd50f5c12bbb0acd03f9
SHA512 3d551b43606e97b5e86895fe407be407f236205bd8a156818532048bea4f7fef36a0392d736356cb352a1bdc4bcf08bc655522213e14e0fa9efe6403d68dc747

C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\070E0202839D9D67350CD2613E78E416

MD5 55540a230bdab55187a841cfe1aa1545
SHA1 363e4734f757bdeb89868efe94907774a327695e
SHA256 d73494e3446b02167573b3cde3ae1c8584ac26e15e45ac3ec0326708425d90fb
SHA512 c899cb1d31d3214fd9dc8626a55e40580d3b2224bf34310c2abd85d0f63e2dedaeae57832f048c2f500cb2cbf83683fcb14139af3f0b5251606076cdb4689c54

C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\B3513D73A177A2707D910183759B389B_147AB4536A182B9FCE88E194D59F3B22

MD5 57f889de11e5b950d315266ea8e796f7
SHA1 14e0858705df6fcd167ea79650989bdd26a2803a
SHA256 2425820bec4cce894589e1df244901fdfa305b92988ef976b0172f0c0fd0763e
SHA512 6e5a8de82ce218a9cd6f07c8a78088984ec22ad7f7c1cd6ee9add51083bbf42a5069a430476c0569b1e6a3c5fc0a1ecc8793fc4879bd819eff29c1885a3fc078

C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\B3513D73A177A2707D910183759B389B_147AB4536A182B9FCE88E194D59F3B22

MD5 9f265e06a118520f1445b1f3c87c2283
SHA1 b20f16c38bdf90f23e46b7f4a5c942fe48133e6c
SHA256 b2114c1ed72f0e2c406fd28dcb88ea23e13f37adcf58c5e550486b26bcdf494f
SHA512 322a5f5e6c46b362b7bb378b0be13e410c8dcad6f5c9179431e0bb014149567d10799adb569813bf9cc9cbc92ca66eefad6ba5221c1811c4dcd75da6a597e601

C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

MD5 d79ba6c719681c3cfc2ca1c7fb50c30b
SHA1 4a88fd6a121624af9d3976acbbd9b1b2681d572e
SHA256 fe82f04c034a21dfc7ccaea27d1c2469e3ae95c45817e7b30e2b91db00805822
SHA512 1e38ae9e4a63ebe21b81bcc7ff3eb9e129189d9db3ff132bc13ce555044d29752517743a42c10274343d2e2602a5ab113f57a144edd82fa799d29c648c50a4f9

C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

MD5 b2195bc610303fdc3f2757dbffb203d8
SHA1 9b461864909ab710863736913d2abdd9bcb2c7da
SHA256 49720bbb882f1815d2f6c9ad123e4cabd4b7cf40ed9349439eb23c6d2a05db1a
SHA512 0cc77377f1aac72afb0fa6c6e37046a1ff5436cb3323e985a910ec1163ee9934a3ce5270b9e497029553ce67c7aa86f790c0897ca9ddf8c8e5888d2607e06c60

C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

MD5 1bff8d3e0ee8f81c24e461a4e94612f4
SHA1 91bf52077071272ac3f2302e2f9d1d5af6195a32
SHA256 3d828b0d4475c23c763905c7bec3db827009e64e79daa93218889b9a49bda102
SHA512 860d716626e3065d624f26ee55e658a5cce2f8d40238378a7c3aa053c158f68f328e9d938bd716ca3e2a894f1372b589b471ead7f04ff27499ee280c0a3c1d62

C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

MD5 e94580b4db737fb87f148101abb1ae29
SHA1 d232023c175dedc14aada6778fad2a5bfb8c7440
SHA256 a7e4e6389839825503f88872094bef04904a9d75446426174773a8a480621ddc
SHA512 223d30ed5bc5809dbe488e54c04f94e161ff7f4bffb4dfd7265e3ea8e97bee910605787a1a7dbdabbb99f691b07225b23fc7332f8021740f28bc8b49757ba022

C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

MD5 27689033322c3e0f3e36e68ffb02ab20
SHA1 ce742bcb13b89f594b14ed1f107c120ba5618ea4
SHA256 f51709a7b8548e0776183620ed5841259e34de0bf3ff12edfd48305979ce66f4
SHA512 c6233646000c3e5c328ca25a07239b60a538566f4bf974846bffc529862eb1ec238a49c915aabb68d83115893180bba97fb3fe3f28d0e7180974127c6574c544

C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

MD5 fc9b6d84ce3a8b2e43f6c3ffc8d5f002
SHA1 833e9fbbe1869996b7337e962d9dec7e10e3fb55
SHA256 91ac99ad7b0922fe3e6dd7a1a1e62df54e64f425f27e7661782720355d615b8d
SHA512 e1cb952d99fa971ef3710189c093faabbe5422db72a03bedc4495f6a6e2e814c4dd39cb037ebd6eb5489bf029bc0b19f6560a8ca5ba4a50018945d84b586baa6

C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\F0ACCF77CDCBFF39F6191887F6D2D357

MD5 492e48c27fd7d438789aa148f2353ca8
SHA1 87c8fe9f0c55af04d0a2aed976519748222b160f
SHA256 2a529b159ece5b295e36f486b7f80d828be5ff658e2bb4f7dee2eaeb4d90494a
SHA512 f71ce375c24cee2ea77683a837709b5cf6b2371921c594108e18946de0b3f643ca68947dab3e01b82b3d73a585200a2a37d3804e58609726439890bfda2c32e0

C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\F0ACCF77CDCBFF39F6191887F6D2D357

MD5 a266bb7dcc38a562631361bbf61dd11b
SHA1 3b1efd3a66ea28b16697394703a72ca340a05bd5
SHA256 df545bf919a2439c36983b54cdfc903dfa4f37d3996d8d84b4c31eec6f3c163e
SHA512 0da8ef4f8f6ed3d16d2bc8eb816b9e6e1345dfe2d91160196c47e6149a1d6aedaafadcefd66acdea7f72dcf0832770192ceac15b0c559c4ccc2c0e5581d5aefc

C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

MD5 e98556df5118ef293f1a90409cb16fbb
SHA1 aaf4015d92df7e2a015853ba42fefcb757524d3b
SHA256 e378808a48730e23730d18bd1c6f236aac21d9cfe3e0e88fe04d107edf9fbe76
SHA512 1e16846a69588bce45a2d2e9d938938a8390418b2cf2fe2f2841ef2a891f8f815f381feb369a481f0a2318e310123b29dae0bd94cfd75ee1a56f8813b26f1afc

C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

MD5 5df8471467ac98f67aff137dfd25c3b6
SHA1 de90fa653def3ebff41647ecc8486c657c33b1b9
SHA256 4818ebbd1938198f1dc3492863c6945fc092e6e38b1764fdc7dc3aa04e254383
SHA512 6fc6e6516df50f8dcec2aed181825257311fd5f09950777a3f6d911f2f071b4b2c8208ac8af8d09b0bd9f8f8da311626011057a8a4e8f2cccfbfcd4f125c0392

C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

MD5 9c201fe2d0cbe5992c8b55dbbfd09456
SHA1 6a7bd809989692489017368643bafe74765d3c47
SHA256 8c300dbf9acb897ae4aaa87377fd0120a70ad290e969349e9e536db71933cf46
SHA512 4dba3db5c549da79bac78873cdef25a50f08a79a80c7a8edea3f0851cd03e0ddb67ad5d05e78cb7074e3e8844ca6e99af6e86722e57e1e81b0aedc383a049ad7

C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

MD5 010c118205e3a9e8ee76e58a28cff9f5
SHA1 0a1d340eee11bbab170b462b6aa1672e32f9275c
SHA256 e9444f394238bb3d3e5b2352e099e8619aa3d93110e1dcab86f70f7574d2d37b
SHA512 b231f984a27654749ff2b1a2ca6b80696a0aa7cf5a644072a00be5e863445d06d6e27a68f263930337f7abc38649298460147794de8dabb7d780759fb50ef6b4

C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\3C428B1A3E5F57D887EC4B864FAC5DCC

MD5 e4a68ac854ac5242460afd72481b2a44
SHA1 df3c24f9bfd666761b268073fe06d1cc8d4f82a4
SHA256 cb3ccbb76031e5e0138f8dd39a23f9de47ffc35e43c1144cea27d46a5ab1cb5f
SHA512 5622207e1ba285f172756f6019af92ac808ed63286e24dfecc1e79873fb5d140f1ceb7133f2476e89a5f75f711f9813a9fbb8fd5287f64adfdcc53b864f9bdc5

C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

MD5 fad522fc37dfc9053249b9b39ee48abe
SHA1 7192c835d3da84961bf8808577d6ef87acaf3434
SHA256 91d13838ef0a569f1d5ea168b45a70aef0e393c82121a0ea82f5bacc7901cc2f
SHA512 e3960a96d328fc3c81ff24104f34be29fa485fb916b34ffd47cdbc4d5245402fb4887798aacdc0a64738ae664135778fc67ef0d3de9dce64d32d8515884e3679

C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\3C428B1A3E5F57D887EC4B864FAC5DCC

MD5 f66d991caf2eee4831eaff4e3979afe0
SHA1 33fdd1eb0b3919135c0928cbdfc2a8c114f8c0e7
SHA256 2fd96a8ad59e8154ba9103a5efff9cb91d710e55b94a41a5da404001035a657c
SHA512 46c4ac13c0f0c7372fc67704c0bd4559a0f799d89e581536970d76c05d66a75d48c13742cf832fa6334960659cc601cb94c28559809cf60c245ea6b80a08c0b2

C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

MD5 c6a62d0a5e75e75b9d71159dd0d452c7
SHA1 88bc7c0b441af7b0e9768c459e57d7e3b80e82ea
SHA256 028d4745368a2bb4320e088a03de380df96ac7678abb051d57ab394603002906
SHA512 982c2c49ddb8711dfaa68fb78459f8a02741841a31f39cde078e59ff9da2c45384082f6495bafce4e2588598cfceef1372a44b3bd822bf79520f708304b72621

C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

MD5 13bc7747411d73261040e895edbe2661
SHA1 55a98a5c15857896f6a129f31aa5545cc3187f86
SHA256 bdbecbb09b3b9eba7359e426bc7e37f27ece5618feab9055beea2f937440e091
SHA512 6cc32bedeee9a90ce32a5f087ed90664bed388b4a880540073c186dd5187ed4b4902444ca4c0cf771734f31b1a8f90101c0b3524a73fee6015ff61222d07097f

C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\6GL24G53\MEtExguyptz[1].css

MD5 ed49e364f92076f052724bf274e62705
SHA1 23770b3f7401dba26a32c37187fe1ea7c0b69e87
SHA256 fcf70567eccf23a433ea35f45e89d9051c24439e7ecca2544f232195d1a8aa74
SHA512 cac8cb74314daff4e8290bc36270852face11eb8cf76f33bd970c7d093aac39a831f29a7a6d2445c96093b438ecc0b7918b5068c0aa16bbe9d6434e0c905b3c3

C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

MD5 9dc1937451c8520579955d557f0aed3c
SHA1 753116630868685d75dc916a3546c2f08aed78d3
SHA256 0da0e0f17f64e57ee52db7c742d72921c699a9c50c98d886caae3ee061634d7b
SHA512 91f405a14a216b41c1ca712039a703d5bb1e1b0a52a23ce414b053fa6dd4386ad00285aca2cd5abfb8116efa58a6150f3b275f8c2e74d8637dbf2a5093ef86be

C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

MD5 ef44164c3a3e1ebe4da065c6cc4a7fca
SHA1 af6fb49e29d8d09765ece5a661a7261000e0b242
SHA256 096147e433f31f56cdb58b8daaf310119abc02b045989ebd9b862de0663260f5
SHA512 0d4945c12edec8bb207f4e1864e16dee5cd543d7dec6700f34592dbbd61e8201dc18ddd3341811b91325fa32ddd85db1a8a48e72df86b1aea9b3e30b183bd485

C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

MD5 91c11be75cbe0e3ddc5df3c091b1ebd4
SHA1 392b24dd3eae8908595ffb6b4d53f1e8624ba7e7
SHA256 3036ecbe4b7f7bcd59089cb76c1cefd8433dfd43c601d4342664ddb76b0550de
SHA512 724beac926870b22fc3794c07ffeddfc2750f3f15ab6b2574ebb3847bccc9a80296c5162e8c26ce5cb2ed42e1eaac81ffb5778ddb91259f96e7bd8d9228569ff

C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

MD5 f7f9afb06f75d6ffe448bd85e08cff79
SHA1 cd84d4a3ecc564bfed1f1ef1674d743d05b845a6
SHA256 4d426d50d2c7ba14cb4ff62c2a6ef73055e515cba34ed7bfe820969c3ebff4e7
SHA512 ac2a93a2af07d9c10fe1869e8a409e8dae798529c737f584b92580778ff3ccedc50c835eaef85976223e68e94e7eaed4331f85c31120325cf54afe9b64314a85

C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

MD5 f7dbcb3c89bf2d0a7e4bafe498971288
SHA1 a695bf8fe7024523c9f5b21f666c07b94eb62185
SHA256 bd8abb66c12c3366a950c33f58644e451119338b6d59391f7383948b3ba8bfa9
SHA512 3a185d83fe31c0d1430ee04c59198a6ddad96368fe4bdf7c7949bd04de8bcc6820e3a98d776aebd307a3d7c4aa1e02fffc80a49d4b06185e553aa2fd2e75b06d

C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

MD5 07e2c94cbc9cd293e6857be1289809d0
SHA1 0c67974d66ae1a9ba6bb7203bcfd18a9b1c169d3
SHA256 ed15e69a1ad462c2a33bcd0d4465774508691833ac1d24702aef0d94f63d4c46
SHA512 ca6f79fae91290c4778f6cc639af30f83d078f3b4ee0f63829df07bad89f216025479d9f357f75f35c9afd5bf40d714e999ef556bba7a0be46a7bf8bf2ee1c33

C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

MD5 8dacff4eb1f77a6e561da43a60a3eb61
SHA1 9a74bc9e4e860359c0d4c45b9050c570749f3022
SHA256 8b69a47d7b954f5a1169f599f673bad6e88784c5aa5d28196a98fe259ddc80a5
SHA512 1d626c2bad70afddfb6041fa3613d48fe4dd3d638f78c46b092cc9925ed8d9161a02191599928d076c30d4abd004c80a3d67f6c7fd8534e92c399f8cbc061e2c

C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

MD5 2860533a328d6593bf2afc8d37f40d95
SHA1 936ca928723eb0e1f5d2395b6473acaeb968d8f6
SHA256 d3721e578af1e8b8732c9102ac68ee6187dc2216731034aba41e9590f3ff1abd
SHA512 a2529b57e4ad17f648309a0e512fc6226e139b444d74e5858da95b60b94d7cb7a5abaeed2cd5b590d948514fc2a1c555f7afd4314368775cc802fd8a2b9c730f

C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

MD5 b7492e66d00b250a5d1868c83852ced6
SHA1 443723140412c19cda77cd57d72cc0ed81c43a4e
SHA256 73d17e3205be7e85f240dfd6e917d97c3b9530deb7882c1c0f9d574f0c3bf61b
SHA512 6023977a72525b1aac686cf548314813a134182e44e5146519b83d32a013ac499bbb59e8af6f4403ac2cefa37790e2253d312672e2d5b33e4cec5a81478761d5

C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

MD5 80a60c09bf967c6f0faf2e30c8a017f6
SHA1 36ae0d2d611a5814ae14ea7bffe8aba6422a0d9b
SHA256 93b5b712f42a48fce6ff6c55b2233791351c16c3d0c80d2812b6cbd0b7a1b07d
SHA512 967ea7ad45cf0595698222bcd0596886c6be5a49176155fa34c93ffe15aeda2d7103388c85c13034cb78a8bd801ca89e3963c18c47672b22509fdc91f7b2a657

Analysis: behavioral2

Detonation Overview

Submitted

2024-08-28 10:28

Reported

2024-08-28 10:31

Platform

win10v2004-20240802-en

Max time kernel

148s

Max time network

150s

Command Line

"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\c6ac00e7e54bb6bc10de9e2d2d781dbc_JaffaCakes118.html

Signatures

Browser Information Discovery

discovery

Enumerates system info in registry

Description Indicator Process Target
Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe N/A
Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe N/A
Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe N/A

Suspicious use of FindShellTrayWindow

Description Indicator Process Target
N/A N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe N/A
N/A N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe N/A
N/A N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe N/A
N/A N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe N/A
N/A N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe N/A
N/A N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe N/A
N/A N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe N/A
N/A N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe N/A
N/A N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe N/A
N/A N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe N/A
N/A N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe N/A
N/A N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe N/A
N/A N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe N/A
N/A N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe N/A
N/A N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe N/A
N/A N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe N/A
N/A N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe N/A
N/A N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe N/A
N/A N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe N/A
N/A N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe N/A
N/A N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe N/A
N/A N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe N/A
N/A N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe N/A
N/A N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe N/A
N/A N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe N/A

Suspicious use of SendNotifyMessage

Description Indicator Process Target
N/A N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe N/A
N/A N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe N/A
N/A N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe N/A
N/A N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe N/A
N/A N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe N/A
N/A N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe N/A
N/A N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe N/A
N/A N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe N/A
N/A N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe N/A
N/A N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe N/A
N/A N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe N/A
N/A N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe N/A
N/A N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe N/A
N/A N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe N/A
N/A N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe N/A
N/A N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe N/A
N/A N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe N/A
N/A N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe N/A
N/A N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe N/A
N/A N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe N/A
N/A N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe N/A
N/A N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe N/A
N/A N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe N/A
N/A N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe N/A

Suspicious use of WriteProcessMemory

Description Indicator Process Target
PID 4160 wrote to memory of 3060 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 4160 wrote to memory of 3060 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 4160 wrote to memory of 3696 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 4160 wrote to memory of 3696 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 4160 wrote to memory of 3696 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 4160 wrote to memory of 3696 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 4160 wrote to memory of 3696 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 4160 wrote to memory of 3696 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 4160 wrote to memory of 3696 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 4160 wrote to memory of 3696 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 4160 wrote to memory of 3696 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 4160 wrote to memory of 3696 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 4160 wrote to memory of 3696 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 4160 wrote to memory of 3696 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 4160 wrote to memory of 3696 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 4160 wrote to memory of 3696 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 4160 wrote to memory of 3696 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 4160 wrote to memory of 3696 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 4160 wrote to memory of 3696 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 4160 wrote to memory of 3696 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 4160 wrote to memory of 3696 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 4160 wrote to memory of 3696 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 4160 wrote to memory of 3696 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 4160 wrote to memory of 3696 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 4160 wrote to memory of 3696 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 4160 wrote to memory of 3696 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 4160 wrote to memory of 3696 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 4160 wrote to memory of 3696 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 4160 wrote to memory of 3696 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 4160 wrote to memory of 3696 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 4160 wrote to memory of 3696 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 4160 wrote to memory of 3696 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 4160 wrote to memory of 3696 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 4160 wrote to memory of 3696 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 4160 wrote to memory of 3696 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 4160 wrote to memory of 3696 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 4160 wrote to memory of 3696 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 4160 wrote to memory of 3696 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 4160 wrote to memory of 3696 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 4160 wrote to memory of 3696 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 4160 wrote to memory of 3696 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 4160 wrote to memory of 3696 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 4160 wrote to memory of 4984 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 4160 wrote to memory of 4984 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 4160 wrote to memory of 1148 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 4160 wrote to memory of 1148 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 4160 wrote to memory of 1148 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 4160 wrote to memory of 1148 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 4160 wrote to memory of 1148 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 4160 wrote to memory of 1148 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 4160 wrote to memory of 1148 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 4160 wrote to memory of 1148 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 4160 wrote to memory of 1148 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 4160 wrote to memory of 1148 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 4160 wrote to memory of 1148 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 4160 wrote to memory of 1148 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 4160 wrote to memory of 1148 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 4160 wrote to memory of 1148 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 4160 wrote to memory of 1148 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 4160 wrote to memory of 1148 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 4160 wrote to memory of 1148 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 4160 wrote to memory of 1148 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 4160 wrote to memory of 1148 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 4160 wrote to memory of 1148 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe

Processes

C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe

"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\c6ac00e7e54bb6bc10de9e2d2d781dbc_JaffaCakes118.html

C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe

"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0x108,0x10c,0x110,0xd8,0x114,0x7ff8af5e46f8,0x7ff8af5e4708,0x7ff8af5e4718

C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe

"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2024,10905340174730803937,913546524740449336,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2040 /prefetch:2

C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe

"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2024,10905340174730803937,913546524740449336,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2348 /prefetch:3

C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe

"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2024,10905340174730803937,913546524740449336,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2712 /prefetch:8

C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe

"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2024,10905340174730803937,913546524740449336,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=2708 /prefetch:1

C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe

"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2024,10905340174730803937,913546524740449336,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3252 /prefetch:1

C:\Windows\System32\CompPkgSrv.exe

C:\Windows\System32\CompPkgSrv.exe -Embedding

C:\Windows\System32\CompPkgSrv.exe

C:\Windows\System32\CompPkgSrv.exe -Embedding

C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe

"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2024,10905340174730803937,913546524740449336,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4720 /prefetch:1

C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe

"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2024,10905340174730803937,913546524740449336,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4180 /prefetch:1

C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe

"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2024,10905340174730803937,913546524740449336,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5476 /prefetch:1

C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe

"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2024,10905340174730803937,913546524740449336,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5464 /prefetch:1

C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe

"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2024,10905340174730803937,913546524740449336,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=7092 /prefetch:1

C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe

"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2024,10905340174730803937,913546524740449336,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2572 /prefetch:8

C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe

"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2024,10905340174730803937,913546524740449336,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2572 /prefetch:8

C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe

"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2024,10905340174730803937,913546524740449336,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=13 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5592 /prefetch:1

C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe

"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2024,10905340174730803937,913546524740449336,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=14 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5584 /prefetch:1

C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe

"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2024,10905340174730803937,913546524740449336,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=15 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6176 /prefetch:1

C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe

"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2024,10905340174730803937,913546524740449336,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=16 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5752 /prefetch:1

C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe

"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2024,10905340174730803937,913546524740449336,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=5664 /prefetch:2

Network

Country Destination Domain Proto
US 8.8.8.8:53 58.55.71.13.in-addr.arpa udp
US 8.8.8.8:53 apis.google.com udp
US 8.8.8.8:53 www.blogger.com udp
US 8.8.8.8:53 ajax.googleapis.com udp
GB 142.250.187.206:443 apis.google.com tcp
GB 142.250.180.9:443 www.blogger.com tcp
GB 142.250.187.234:443 ajax.googleapis.com tcp
GB 142.250.180.9:443 www.blogger.com udp
US 8.8.8.8:53 adsensecamp.com udp
GB 142.250.187.206:443 apis.google.com udp
US 8.8.8.8:53 g2.gumgum.com udp
US 8.8.8.8:53 2.bp.blogspot.com udp
US 8.8.8.8:53 widgets.twimg.com udp
US 8.8.8.8:53 i1128.photobucket.com udp
US 8.8.8.8:53 bloggerpeer.googlecode.com udp
US 8.8.8.8:53 www.google.com udp
US 8.8.8.8:53 xslt.alexa.com udp
US 8.8.8.8:53 www.linkwithin.com udp
US 8.8.8.8:53 i825.photobucket.com udp
US 8.8.8.8:53 www.blogblog.com udp
IE 18.203.167.224:80 g2.gumgum.com tcp
GB 142.250.180.1:80 2.bp.blogspot.com tcp
SG 118.139.179.30:80 www.linkwithin.com tcp
ID 103.30.145.12:80 adsensecamp.com tcp
ID 103.30.145.12:80 adsensecamp.com tcp
GB 142.250.179.228:80 www.google.com tcp
US 8.8.8.8:53 resources.blogblog.com udp
US 8.8.8.8:53 static.inilah.com udp
GB 3.162.20.115:80 i825.photobucket.com tcp
GB 142.250.187.194:445 pagead2.googlesyndication.com tcp
GB 3.162.20.23:80 i825.photobucket.com tcp
IE 172.253.116.82:80 bloggerpeer.googlecode.com tcp
GB 142.250.180.9:80 resources.blogblog.com tcp
GB 142.250.180.9:443 resources.blogblog.com tcp
GB 142.250.180.9:443 resources.blogblog.com tcp
GB 142.250.179.228:80 www.google.com tcp
GB 3.162.20.115:80 i825.photobucket.com tcp
US 8.8.8.8:53 twitter-badges.s3.amazonaws.com udp
GB 3.162.20.115:443 i825.photobucket.com tcp
US 8.8.8.8:53 js.gumgum.com udp
GB 3.162.20.23:443 i825.photobucket.com tcp
US 52.217.193.25:80 twitter-badges.s3.amazonaws.com tcp
ID 103.30.145.12:80 adsensecamp.com tcp
GB 3.162.20.115:443 i825.photobucket.com tcp
US 3.165.148.39:443 js.gumgum.com tcp
SG 118.139.179.30:80 www.linkwithin.com tcp
SG 118.139.179.30:80 www.linkwithin.com tcp
US 8.8.8.8:53 81.144.22.2.in-addr.arpa udp
US 8.8.8.8:53 22.160.190.20.in-addr.arpa udp
US 8.8.8.8:53 206.187.250.142.in-addr.arpa udp
US 8.8.8.8:53 9.180.250.142.in-addr.arpa udp
US 8.8.8.8:53 234.187.250.142.in-addr.arpa udp
US 8.8.8.8:53 1.180.250.142.in-addr.arpa udp
US 8.8.8.8:53 228.179.250.142.in-addr.arpa udp
US 8.8.8.8:53 224.167.203.18.in-addr.arpa udp
US 8.8.8.8:53 115.20.162.3.in-addr.arpa udp
US 8.8.8.8:53 23.20.162.3.in-addr.arpa udp
US 8.8.8.8:53 82.116.253.172.in-addr.arpa udp
US 8.8.8.8:53 12.145.30.103.in-addr.arpa udp
US 8.8.8.8:53 39.148.165.3.in-addr.arpa udp
ID 103.30.145.12:443 adsensecamp.com tcp
ID 103.30.145.12:443 adsensecamp.com tcp
GB 142.250.180.9:443 resources.blogblog.com udp
US 8.8.8.8:53 www.linksalpha.com udp
GB 216.58.212.194:139 pagead2.googlesyndication.com tcp
IE 18.203.167.224:443 g2.gumgum.com tcp
US 3.165.148.39:443 js.gumgum.com tcp
US 8.8.8.8:53 c.gumgum.com udp
US 8.8.8.8:53 aba.gumgum.com udp
US 8.8.8.8:53 widgets.amung.us udp
US 8.8.8.8:53 gumgum.com udp
US 8.8.8.8:53 www.facebook.com udp
GB 142.250.179.228:80 www.google.com tcp
US 3.165.148.68:443 c.gumgum.com tcp
US 3.165.148.93:443 aba.gumgum.com tcp
FR 157.240.196.35:80 www.facebook.com tcp
US 172.67.8.141:80 widgets.amung.us tcp
GB 3.162.20.54:443 gumgum.com tcp
US 8.8.8.8:53 25.193.217.52.in-addr.arpa udp
US 8.8.8.8:53 81.81.224.13.in-addr.arpa udp
US 8.8.8.8:53 133.211.185.52.in-addr.arpa udp
FR 157.240.196.35:443 www.facebook.com tcp
IE 172.253.116.82:80 bloggerpeer.googlecode.com tcp
US 8.8.8.8:53 t.dtscout.com udp
US 141.101.120.11:443 t.dtscout.com tcp
US 8.8.8.8:53 static.xx.fbcdn.net udp
IE 31.13.73.22:443 static.xx.fbcdn.net tcp
US 8.8.8.8:53 68.148.165.3.in-addr.arpa udp
US 8.8.8.8:53 93.148.165.3.in-addr.arpa udp
US 8.8.8.8:53 141.8.67.172.in-addr.arpa udp
US 8.8.8.8:53 54.20.162.3.in-addr.arpa udp
US 8.8.8.8:53 35.196.240.157.in-addr.arpa udp
US 8.8.8.8:53 11.120.101.141.in-addr.arpa udp
US 8.8.8.8:53 22.73.13.31.in-addr.arpa udp
US 8.8.8.8:53 26.35.223.20.in-addr.arpa udp
N/A 224.0.0.251:5353 udp
US 8.8.8.8:53 97.17.167.52.in-addr.arpa udp
US 8.8.8.8:53 3.bp.blogspot.com udp
GB 142.250.180.1:80 3.bp.blogspot.com tcp
US 8.8.8.8:53 connect.facebook.net udp
IE 31.13.73.22:445 connect.facebook.net tcp
US 8.8.8.8:53 connect.facebook.net udp
FR 157.240.196.15:139 connect.facebook.net tcp
US 8.8.8.8:53 103.169.127.40.in-addr.arpa udp
US 8.8.8.8:53 56.126.166.20.in-addr.arpa udp
US 8.8.8.8:53 172.214.232.199.in-addr.arpa udp
US 8.8.8.8:53 tse1.mm.bing.net udp
US 150.171.27.10:443 tse1.mm.bing.net tcp
US 150.171.27.10:443 tse1.mm.bing.net tcp
US 150.171.27.10:443 tse1.mm.bing.net tcp
US 150.171.27.10:443 tse1.mm.bing.net tcp
US 150.171.27.10:443 tse1.mm.bing.net tcp
US 8.8.8.8:53 10.27.171.150.in-addr.arpa udp
US 8.8.8.8:53 whos.amung.us udp
US 104.22.74.171:445 whos.amung.us tcp
US 172.67.8.141:445 whos.amung.us tcp
US 104.22.75.171:445 whos.amung.us tcp
US 8.8.8.8:53 whos.amung.us udp
GB 142.250.180.9:443 resources.blogblog.com udp
US 8.8.8.8:53 kencew.blogspot.ru udp
GB 142.250.200.33:80 kencew.blogspot.ru tcp
US 8.8.8.8:53 kencew.blogspot.com udp
GB 142.250.200.33:80 kencew.blogspot.com tcp
US 8.8.8.8:53 33.200.250.142.in-addr.arpa udp
US 8.8.8.8:53 48.229.111.52.in-addr.arpa udp

Files

C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad\settings.dat

MD5 38f59a47b777f2fc52088e96ffb2baaf
SHA1 267224482588b41a96d813f6d9e9d924867062db
SHA256 13569c5681c71dc42ab57d34879f5a567d7b94afe0e8f6d7c6f6c1314fb0087b
SHA512 4657d13e1bb7cdd7e83f5f2562f5598cca12edf839626ae96da43e943b5550fab46a14b9018f1bec90de88cc714f637605531ccda99deb9e537908ddb826113b

\??\pipe\LOCAL\crashpad_4160_FLYKZBGWAIBZJIPQ

MD5 d41d8cd98f00b204e9800998ecf8427e
SHA1 da39a3ee5e6b4b0d3255bfef95601890afd80709
SHA256 e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855
SHA512 cf83e1357eefb8bdf1542850d66d8007d620e4050b5715dc83f4a921d36ce9ce47d0d13c5d85f2b0ff8318d2877eec2f63b931bd47417a81a538327af927da3e

C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad\settings.dat

MD5 ab8ce148cb7d44f709fb1c460d03e1b0
SHA1 44d15744015155f3e74580c93317e12d2cc0f859
SHA256 014006a90e43ea9a1903b08b843a5aab8ad3823d22e26e5b113fad5f9fa620ff
SHA512 f685423b1eaee18a2a06030b4b2977335f62499c0041c142a92f6e6f846c2b9ce54324b6ae94efbbb303282dcda70e2b1597c748fddc251c0b3122a412c2d7c4

C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Preferences

MD5 856983b4bc45a1d42f1a1de40a73ed52
SHA1 239bf8e9fb0acdbff880f7c6701f3c9f7b68cc56
SHA256 d238b9e5ae3bb113c96c458adb9ad97556200aeb623588c56569a345b12d7fd2
SHA512 746f943af67e1cc29bd12244d55fc04ccab776035ff8c9b88131206bc1326b8c6f10c88b918eb663abb55a4f90a9a6a27a51e8d24fc1cab045333f43f54da998

C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Local State

MD5 c0cd901434ad6a8016b0875f8ecb6b46
SHA1 a11e62433f8d8991910fa6547c03babf8ad69547
SHA256 9005bb4c243ef0677c771fa6e316834d73c29b85b40a71cf586011cddb16058e
SHA512 339c984f797852ab5e4ff770437d97dfee75ab268b9c33e3d9bef4e8e9d52ce3d787bbaa048396a41685b1620f8ee0e760622f152e28d89c06148d2f5fc8e60a

C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Preferences

MD5 b55ed0e1e95fb76bf7040bfbdb9f763e
SHA1 95baec6f2bf9e6b49b58adf940b581ea31f8e27e
SHA256 f42ebfb666866b0b549ec74682df3ba8f0005d81c85cc9ecae7d13b40a330b38
SHA512 c4b34726beb5ec831fc26c42f63ae2c54bc1022cfd5d2653c6bb1fa6a5433d794dec687f0854f79e78cefdf44a9ea44a0a9405fb93b92e860f96634755639b02

C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index

MD5 a421ae905b3fd43135911248ae19412d
SHA1 815abb5d372c76f89d4aca141fcc27846a24625a
SHA256 912f08db747be78d8d919e836dfc082f48d9ad5a9cef56acdca7ff1050deb239
SHA512 6d19512124abeeb4cb25439d507e234fa2f5b25317876de969cc7ce88f44fceb136087a07e0d34ac6f8a2a0d8c98cec73e3f4414851292a585ce836743d16d55

C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Preferences

MD5 fceeb8b10fe14196b8fdd52ae383bd8e
SHA1 edc10a02bcb76635827851faabbd287e3309b399
SHA256 224a32c31f8ff93abb46fe52d236e46cdc73eefa17231bbfe0c00406171b7caa
SHA512 77928bcf196dc566a6a5c55f8126d36603a1c95c9dba1a819d7327fb056d2708a84c506d274194e24c264bb053570c4a88b6342fa945dce69f3f69cdeb421aaa

C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\TransportSecurity~RFe5802ca.TMP

MD5 dfa913e0928d3229211ba8e2d3344057
SHA1 9c6c5422722b0ec36b6d4015530874359aa80445
SHA256 945a92e597f4f56ad37c32990e3bba2e0d20bd7a00bbee650798eacf1d3750d0
SHA512 34633465be227bc821ace06017b818c6733875a736ce1c1ef62405ff4f6176cbec412921a6e9c010f949c9d5a7004c991670dfcea5ba81fb420ab58781056d95

C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\TransportSecurity

MD5 e596da518f109f3836389f637fc44898
SHA1 8069067c1f1d26ccf2e5c87d89895d04227c545a
SHA256 ed0bd74dc1da2cf0dc8652322055fea4623c75606edeed857b6195e44819cbc7
SHA512 3879245381b8a51682d6ef2fc1fcbffc39793d4f75c09c28cb8c36d9dfcdfaa1d209458142cbee220db95d999ce3a6fa603df3f4642f73a47d32689bbc601326

C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\data_reduction_proxy_leveldb\CURRENT

MD5 6752a1d65b201c13b62ea44016eb221f
SHA1 58ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA256 0861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA512 9cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389

C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Preferences

MD5 a4ae9762ae929919bc798e2a416f25cf
SHA1 7cfebcb2d5fb1d6e85123f9145ce786e78caf59d
SHA256 d3bca0ac164dbe6b9877c7e7065f03d94414bae2f4b70f1840b4b0e0d0bba84a
SHA512 3be29585dbc39dd46d7672d02f68f2bc2e2c88364c2770558b1903680044b9be2605282b902f4a2b0592636a834fbfe7db97c7fe80b8eb91ccef2f0479c66887

C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Network Persistent State

MD5 c610d24e23e52230adef6f19da5885ec
SHA1 8116965032a76ebb1492780f5db1e35a8a491406
SHA256 d6927e92c9739afbe8af7de4f1828e202bedd02ecedc8625d9dc91ba9b998c01
SHA512 f3aea07e08108981faac998ee7c78cf1af7b05b26e61d61fbc2700ae7878ac70352ce819bc50c8941c21b3159419f7ebe821266bbd24081ff46dc5ec535fce92