Malware Analysis Report

2024-12-06 03:19

Sample ID 241023-pyel8s1aka
Target 6efbfa06daf6b2b726c382c98f9e22ff_JaffaCakes118
SHA256 cf88df1179c0522c504a72dcb200501c92a0dd2110a0159ebc536b0577f211a8
Tags
socgholish discovery downloader
score
10/10

Table of Contents

Analysis Overview

MITRE ATT&CK

Enterprise Matrix V15

Analysis: static1

Detonation Overview

Signatures

Analysis: behavioral1

Detonation Overview

Command Line

Signatures

Processes

Network

Files

Analysis: behavioral2

Detonation Overview

Command Line

Signatures

Processes

Network

Files

Analysis Overview

score
10/10

SHA256

cf88df1179c0522c504a72dcb200501c92a0dd2110a0159ebc536b0577f211a8

Threat Level: Known bad

The file 6efbfa06daf6b2b726c382c98f9e22ff_JaffaCakes118 was found to be: Known bad.

Malicious Activity Summary

socgholish discovery downloader

SocGholish

Browser Information Discovery

System Location Discovery: System Language Discovery

Modifies Internet Explorer settings

Enumerates system info in registry

Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary

Suspicious use of SetWindowsHookEx

Suspicious use of WriteProcessMemory

Suspicious behavior: EnumeratesProcesses

Suspicious use of SendNotifyMessage

Suspicious use of FindShellTrayWindow

MITRE ATT&CK

Analysis: static1

Detonation Overview

Reported

2024-10-23 12:43

Signatures

N/A

Analysis: behavioral1

Detonation Overview

Submitted

2024-10-23 12:43

Reported

2024-10-23 12:46

Platform

win7-20240903-en

Max time kernel

129s

Max time network

143s

Command Line

"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\6efbfa06daf6b2b726c382c98f9e22ff_JaffaCakes118.html

Signatures

SocGholish

downloader socgholish

System Location Discovery: System Language Discovery

discovery
Description Indicator Process Target
Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE N/A

Modifies Internet Explorer settings

adware spyware
Description Indicator Process Target
Set value (str) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" C:\Program Files\Internet Explorer\iexplore.exe N/A
Set value (int) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" C:\Program Files\Internet Explorer\iexplore.exe N/A
Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive C:\Program Files\Internet Explorer\iexplore.exe N/A
Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\SearchScopes C:\Program Files\Internet Explorer\iexplore.exe N/A
Set value (int) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "435849311" C:\Program Files\Internet Explorer\iexplore.exe N/A
Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser C:\Program Files\Internet Explorer\iexplore.exe N/A
Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Zoom C:\Program Files\Internet Explorer\iexplore.exe N/A
Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Main C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE N/A
Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery C:\Program Files\Internet Explorer\iexplore.exe N/A
Set value (data) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000d793ad506ece624c80bd99362738d90700000000020000000000106600000001000020000000c0d7ccd8a2c77f61488c18535a104b81ce5af018e2b377a33748a171b4d1f8f6000000000e80000000020000200000004da642903afc63d540368d72329558c630ad3915c22613529a6e02a2bf8de02c200000005d8eae37eee719b9e0b9571884a215b1a8c57fb42862d45233977f3c36bfaf0b40000000b7964c52e45ebc137485f85e95898374d9fb9b701f83d8d650310f12f8218d7c8c8a7a32f9b3a04a1f4fbe0cbfc71684908cb7c38570f34bd191933b0b23cad4 C:\Program Files\Internet Explorer\iexplore.exe N/A
Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\DomainSuggestion C:\Program Files\Internet Explorer\iexplore.exe N/A
Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\IETld\LowMic C:\Program Files\Internet Explorer\iexplore.exe N/A
Set value (str) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" C:\Program Files\Internet Explorer\iexplore.exe N/A
Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage C:\Program Files\Internet Explorer\iexplore.exe N/A
Set value (data) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 60d29b544925db01 C:\Program Files\Internet Explorer\iexplore.exe N/A
Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\GPU C:\Program Files\Internet Explorer\iexplore.exe N/A
Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\IntelliForms C:\Program Files\Internet Explorer\iexplore.exe N/A
Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Toolbar C:\Program Files\Internet Explorer\iexplore.exe N/A
Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch C:\Program Files\Internet Explorer\iexplore.exe N/A
Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\InternetRegistry C:\Program Files\Internet Explorer\iexplore.exe N/A
Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\LowRegistry C:\Program Files\Internet Explorer\iexplore.exe N/A
Set value (int) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" C:\Program Files\Internet Explorer\iexplore.exe N/A
Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing C:\Program Files\Internet Explorer\iexplore.exe N/A
Set value (data) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 C:\Program Files\Internet Explorer\iexplore.exe N/A
Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Main C:\Program Files\Internet Explorer\iexplore.exe N/A
Set value (data) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 C:\Program Files\Internet Explorer\iexplore.exe N/A
Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain C:\Program Files\Internet Explorer\iexplore.exe N/A
Set value (int) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" C:\Program Files\Internet Explorer\iexplore.exe N/A
Set value (int) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{7BCFE471-913C-11EF-81BB-F2BBDB1F0DCB} = "0" C:\Program Files\Internet Explorer\iexplore.exe N/A
Set value (int) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" C:\Program Files\Internet Explorer\iexplore.exe N/A
Set value (int) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" C:\Program Files\Internet Explorer\iexplore.exe N/A
Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage C:\Program Files\Internet Explorer\iexplore.exe N/A
Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic C:\Program Files\Internet Explorer\iexplore.exe N/A
Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\PageSetup C:\Program Files\Internet Explorer\iexplore.exe N/A

Suspicious use of FindShellTrayWindow

Description Indicator Process Target
N/A N/A C:\Program Files\Internet Explorer\iexplore.exe N/A

Processes

C:\Program Files\Internet Explorer\iexplore.exe

"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\6efbfa06daf6b2b726c382c98f9e22ff_JaffaCakes118.html

C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE

"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2072 CREDAT:275457 /prefetch:2

Network

Country Destination Domain Proto
US 8.8.8.8:53 ajax.googleapis.com udp
US 8.8.8.8:53 apis.google.com udp
US 8.8.8.8:53 3.bp.blogspot.com udp
US 8.8.8.8:53 w.sharethis.com udp
US 8.8.8.8:53 2.bp.blogspot.com udp
US 8.8.8.8:53 1.bp.blogspot.com udp
US 8.8.8.8:53 4.bp.blogspot.com udp
GB 216.58.212.234:80 fonts.googleapis.com tcp
GB 216.58.212.234:80 fonts.googleapis.com tcp
US 8.8.8.8:53 img1.blogblog.com udp
US 8.8.8.8:53 promo.com.ng udp
US 8.8.8.8:53 contextual.media.net udp
US 8.8.8.8:53 s1.smartaddon.com udp
GB 142.250.179.238:80 apis.google.com tcp
GB 142.250.179.238:80 apis.google.com tcp
GB 142.250.179.238:443 apis.google.com tcp
US 8.8.8.8:53 static.ak.fbcdn.net udp
US 8.8.8.8:53 www.arikair.com udp
US 8.8.8.8:53 s7.addthis.com udp
GB 216.58.201.106:80 ajax.googleapis.com tcp
GB 216.58.201.106:443 ajax.googleapis.com tcp
GB 216.58.201.106:80 ajax.googleapis.com tcp
GB 216.58.201.106:443 ajax.googleapis.com tcp
US 8.8.8.8:53 resources.infolinks.com udp
US 8.8.8.8:53 www.linkwithin.com udp
US 8.8.8.8:53 widgets.twimg.com udp
US 8.8.8.8:53 sidharth12.googlecode.com udp
US 8.8.8.8:53 icons.iconarchive.com udp
US 8.8.8.8:53 www.nairacareer.com udp
GB 18.172.88.108:80 w.sharethis.com tcp
GB 18.172.88.108:80 w.sharethis.com tcp
GB 18.172.88.108:80 w.sharethis.com tcp
US 8.8.8.8:53 static.networkedblogs.com udp
US 8.8.8.8:53 nwidget.networkedblogs.com udp
US 8.8.8.8:53 www.mapmyuser.com udp
US 8.8.8.8:53 www.zimbio.com udp
US 8.8.8.8:53 bloggers.com udp
GB 142.250.178.1:80 4.bp.blogspot.com tcp
GB 142.250.178.1:80 4.bp.blogspot.com tcp
GB 142.250.178.1:80 4.bp.blogspot.com tcp
GB 142.250.178.1:80 4.bp.blogspot.com tcp
GB 142.250.178.1:80 4.bp.blogspot.com tcp
GB 142.250.178.1:80 4.bp.blogspot.com tcp
GB 142.250.178.1:80 4.bp.blogspot.com tcp
GB 142.250.178.1:80 4.bp.blogspot.com tcp
GB 142.250.178.1:80 4.bp.blogspot.com tcp
GB 142.250.178.2:80 pagead2.googlesyndication.com tcp
GB 142.250.178.2:80 pagead2.googlesyndication.com tcp
GB 184.25.192.27:80 contextual.media.net tcp
GB 184.25.192.27:80 contextual.media.net tcp
GB 172.217.169.73:80 img1.blogblog.com tcp
GB 172.217.169.73:80 img1.blogblog.com tcp
US 172.66.41.9:80 resources.infolinks.com tcp
US 172.66.41.9:80 resources.infolinks.com tcp
BE 35.195.44.168:80 www.arikair.com tcp
US 76.223.54.146:80 bloggers.com tcp
BE 35.195.44.168:80 www.arikair.com tcp
US 76.223.54.146:80 bloggers.com tcp
SG 118.139.179.30:80 www.linkwithin.com tcp
SG 118.139.179.30:80 www.linkwithin.com tcp
GB 184.26.134.46:80 s7.addthis.com tcp
GB 184.26.134.46:80 s7.addthis.com tcp
US 104.21.235.214:80 icons.iconarchive.com tcp
US 104.21.235.214:80 icons.iconarchive.com tcp
BE 108.177.15.82:80 sidharth12.googlecode.com tcp
BE 108.177.15.82:80 sidharth12.googlecode.com tcp
GB 18.172.88.115:80 www.mapmyuser.com tcp
GB 18.172.88.115:80 www.mapmyuser.com tcp
US 76.223.54.146:80 bloggers.com tcp
US 76.223.54.146:80 bloggers.com tcp
US 76.223.54.146:80 bloggers.com tcp
US 76.223.54.146:80 bloggers.com tcp
US 76.223.54.146:80 bloggers.com tcp
GB 184.25.192.27:443 contextual.media.net tcp
GB 18.172.88.108:443 w.sharethis.com tcp
GB 18.172.88.108:443 w.sharethis.com tcp
GB 18.172.88.108:443 w.sharethis.com tcp
GB 18.172.88.115:443 www.mapmyuser.com tcp
BE 35.195.44.168:443 www.arikair.com tcp
GB 18.172.88.108:443 w.sharethis.com tcp
GB 18.172.88.108:443 w.sharethis.com tcp
GB 18.172.88.108:443 w.sharethis.com tcp
GB 18.172.88.115:443 www.mapmyuser.com tcp
GB 18.172.88.108:443 w.sharethis.com tcp
GB 18.172.88.108:443 w.sharethis.com tcp
GB 18.172.88.108:443 w.sharethis.com tcp
GB 18.172.88.115:443 www.mapmyuser.com tcp
GB 18.172.88.108:443 w.sharethis.com tcp
GB 18.172.88.108:443 w.sharethis.com tcp
GB 18.172.88.108:443 w.sharethis.com tcp
GB 18.172.88.115:443 www.mapmyuser.com tcp
US 8.8.8.8:53 c.pki.goog udp
US 8.8.8.8:53 c.pki.goog udp
GB 142.250.178.3:80 c.pki.goog tcp
GB 142.250.178.3:80 c.pki.goog tcp
GB 142.250.178.3:80 c.pki.goog tcp
US 8.8.8.8:53 r10.o.lencr.org udp
US 216.239.32.21:80 promo.com.ng tcp
US 216.239.32.21:80 promo.com.ng tcp
GB 2.18.190.80:80 r10.o.lencr.org tcp
US 8.8.8.8:53 o.pki.goog udp
US 8.8.8.8:53 o.pki.goog udp
US 8.8.8.8:53 o.pki.goog udp
GB 142.250.178.3:80 o.pki.goog tcp
GB 142.250.178.3:80 o.pki.goog tcp
US 8.8.8.8:53 www.promo.com.ng udp
GB 142.250.178.3:80 o.pki.goog tcp
GB 216.58.204.67:80 fonts.gstatic.com tcp
GB 216.58.204.67:80 fonts.gstatic.com tcp
GB 216.58.201.115:80 www.promo.com.ng tcp
GB 216.58.201.115:80 www.promo.com.ng tcp
GB 216.58.201.115:443 www.promo.com.ng tcp
US 8.8.8.8:53 lg3.media.net udp
GB 184.26.188.27:443 lg3.media.net tcp
GB 184.26.188.27:443 lg3.media.net tcp
US 8.8.8.8:53 lh3.ggpht.com udp
US 8.8.8.8:53 accounts.google.com udp
GB 142.250.178.1:80 lh3.ggpht.com tcp
GB 142.250.178.1:80 lh3.ggpht.com tcp
US 8.8.8.8:53 www.facebook.com udp
BE 64.233.184.84:443 accounts.google.com tcp
BE 64.233.184.84:443 accounts.google.com tcp
GB 163.70.151.35:80 www.facebook.com tcp
GB 163.70.151.35:80 www.facebook.com tcp
US 8.8.8.8:53 s1.smartaddon.com udp
GB 163.70.151.35:443 www.facebook.com tcp
US 8.8.8.8:53 ssl.gstatic.com udp
GB 216.58.204.67:443 ssl.gstatic.com tcp
GB 216.58.204.67:443 ssl.gstatic.com tcp
US 8.8.8.8:53 www.zimbio.com udp
US 8.8.8.8:53 ep1.adtrafficquality.google udp
GB 142.250.180.2:443 ep1.adtrafficquality.google tcp
GB 142.250.180.2:443 ep1.adtrafficquality.google tcp
US 8.8.8.8:53 ep2.adtrafficquality.google udp
GB 142.250.200.1:443 ep2.adtrafficquality.google tcp
GB 142.250.200.1:443 ep2.adtrafficquality.google tcp
US 8.8.8.8:53 crl.microsoft.com udp
GB 2.18.190.73:80 crl.microsoft.com tcp
US 204.79.197.200:443 ieonline.microsoft.com tcp
US 204.79.197.200:443 ieonline.microsoft.com tcp
US 8.8.8.8:53 www.microsoft.com udp
US 204.79.197.200:443 ieonline.microsoft.com tcp
BE 64.233.184.84:443 accounts.google.com tcp
BE 64.233.184.84:443 accounts.google.com tcp
BE 64.233.184.84:443 accounts.google.com tcp
BE 64.233.184.84:443 accounts.google.com tcp

Files

C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\CXRG2YQS\plusone[1].js

MD5 1106da066ce809fb5afe9c6c1b4185b2
SHA1 3b64d3a7f52b4c07047fa8727db4207137733bf8
SHA256 d0f3af1e716ce7846e7c252ace160c12480d41eecd5a7e7917ee5b2ccde62b51
SHA512 3f0205b89d5293f14d863e344680a9d8518e5d4ee3b981dc5981106534bd597ed6b388eecab1385320f77c8d5a46a4ce5b64f03f4377b8ea13ecf9b569878fd9

C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\Q0WBLVJY\jquery.min[1].js

MD5 e85aed5c30d734f1e30646e030d7a817
SHA1 b8dcaa1c866905c0bdb0b70c8e564ff1c3fe27ad
SHA256 8f0a19ee8c606b35a10904951e0a27da1896eafe33c6e88cb7bcbe455f05a24a
SHA512 a5b7c4911b530b4b550838f50ceda9d9382d86aad7cb4ff13c897c269bc7ff350ccf01487534882f294749bc19f3398f0b338e1d8b03af3dba1ef382168ecc9e

C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\CXRG2YQS\nmedianet[1].js

MD5 382f7ccb7a3b82aba9358a657986b847
SHA1 bafaa9a780675e9b365a3e35ac4ff5b35a81f57d
SHA256 0700cd3e2862cc914505ee07b17573dec7a0f3236b1f6b3c33cac61e97aaf0f6
SHA512 2dffffcff37ffc0346d005cd4fa21bc51861e3b662c9494cd7554b0339cb908bd22b9d58f7732a86be2c01a0df4663f1409236a3bcbf9eb38d1f8322ec25f981

C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\0I0VVMWQ\Hot%20Jobs[1].htm

MD5 deae2e103d77ce5c2c782bc8dfc99856
SHA1 8447995a7529224e6c14857bceadf7c89a37cd73
SHA256 573977b696d6669337103d7f0fc2c2736c08f67a29d4636d0389fe5288a8ae53
SHA512 bec7a19aa240e2e172de08b938333f24c2f43c2ed09ffbd49993844dafe3653714108ae90bbe6ffb877ccd486f78c5765e7a920cb2d66501d74535a2b046c040

C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\0I0VVMWQ\Admission%20list[1].htm

MD5 b8a428ecb54bca25ab33af7a9d312d3a
SHA1 fb4e2afa89375ecf27c66c01030bffc920bec7dd
SHA256 64459244445d02ab03944f03d2c7a0f5293a45098f4aa928436c4a0265d92b0a
SHA512 2231318f7b925cb614c90c4c7c1d2eeea9a8c85bfb38fba3d119114792a41021d7dcaed28649e72037e5f4237ddff8af11b478cd52695eeed031d1372fa86f48

C:\Users\Admin\AppData\Local\Temp\CabE938.tmp

MD5 49aebf8cbd62d92ac215b2923fb1b9f5
SHA1 1723be06719828dda65ad804298d0431f6aff976
SHA256 b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512 bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b

C:\Users\Admin\AppData\Local\Temp\TarE9C8.tmp

MD5 4ea6026cf93ec6338144661bf1202cd1
SHA1 a1dec9044f750ad887935a01430bf49322fbdcb7
SHA256 8efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA512 6c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b

C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\Q0WBLVJY\cb=gapi[1].js

MD5 1d4cb29476060a1b3681fdb681200b11
SHA1 d541f88bf8d4fd98b9e0e723e050c47d4d32c18a
SHA256 5930e64b0cbf1dc5922f65060422fcf822870ac69439450ee3cb134365a51a82
SHA512 85575c3656c8e0d70cbcdf76194e37dbe3f7bd4535221a8f51fb6b51266fd682809fa86bc556c27d127f713a6ff75290ae1fbdcd8e589211e1685f82b99d93cd

C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

MD5 d78b15aca11454633e24b71d23db71e2
SHA1 d9d7b1ff0b6ed9a051abf21464136ac007c6527a
SHA256 01e13b9cc05a69ce77e2d0006cdd9a21101b210f870dc247fea8b62770318ef1
SHA512 d3f4e0ccb48201f5c4e59a46ac1b3d053772e8a11b5a41a232f3e60fe5ad211459918e0bd70c81f241c3afbb9cce85ec3edfb6c55c4ef06d03bf4bef5685d39b

C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

MD5 6155c1c64818b28241d7a78b8024a897
SHA1 d08eafa3066c63d29c17f843e74c5472fccdd0e1
SHA256 fa3a4d70dbc3a3479682d1f0d118f6afb33bb133d3cb0a12b06d569f91236178
SHA512 cb1793d2e9b452f4f721f1b80bafcd53c23f98a528078252478540ec0aa06d83ec3b6d65ca757b33d98ab063f12aeb39cc903ed3672e075177a76c5cfa816261

C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

MD5 52151f95612b25854dfe6d321f8d1712
SHA1 7d3e3b3946986c41d051ffa3c5a36ec3950ec5b2
SHA256 526779cd625e745e9a79c37c2a8677883560984b45dc833fb154353557f8c884
SHA512 261a5303988fdc6a18da2f1be167162f3002a79bf216cd8669a8685359349131a800816c4b3b5df167cc90733693e02fe0f45a0713ebb792fdbe24fa07914acb

C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

MD5 fb87143b0015724624cd29ea3d864387
SHA1 490fe7fe0d76690ee9cf675f8a075b33cddb7fcc
SHA256 41c4e6638364cbc004bd4f331fea07d8b1629935ee047bb0bff98b0579c38fcf
SHA512 146e61c0e2d26b39a346d3d86830b6c95a05dd0a437f790fe398096ee5c69b22c4c64a9328418a0a9d64babf5a31b35c8d2468b0ae775a1eef5351458b7ad926

C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

MD5 a811a46d61ab91b1aa499c0e961e7964
SHA1 d61be2a41d9539594122f2657121d2c368867cf6
SHA256 201eff944856f7b0c3b09eadc34a36a932cfb84ea846b53f3a90ac50bb21df66
SHA512 ee1603d4c321af532eb8728d4268fac734b8da35e68632b3701b13adcfb621f6680cf99c8cc6db36499b15bd6840a98825fc858f396bf0e6eb02d126446de269

C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

MD5 5fd434f261458ed35933f18c86ede42c
SHA1 b9c1e77075798d4d9f7cc8a79dd4c5d8a9440e83
SHA256 2a2fcab8dab4fe277f8c3e82f5662d13b1d4cdc77705cc22fe3eaf83568f1124
SHA512 64559584df6e4a6c4bf3d39a7f39466778c504761527f871c356ea8ec69dae6c753606a8f917d3149a3446bd21c5b4f86bc995c5300d5e59d1bcd9cbef9302b6

C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

MD5 bf4e094d9b9541fb69c17316c40587bb
SHA1 2d23d96b0a06613e81b7306e2f09bba372197af3
SHA256 2d8c9fb88c5998f84fc54f8973b4d8ca692a3d4175ef7325c7b093f61dceb81f
SHA512 df0573c2081486b8a6edfb4d73f831eef1e2b89f7ec9a1365501ce5f288c3fae508587de7dc842c9acbd581db9d5ea4768fb41a729bba7bac00ae8dc7093af81

C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

MD5 73dee5bd406dcb7a49767b760838a1ee
SHA1 36ccddced5450127fbc0230801fd5580c782d9a3
SHA256 d4eb4a03d975a3ad8e3c2ec5e4897309a60213ac4f5144f2fd395dbd540f262d
SHA512 bcdd262bc7fecb8b7e732693a2fa8071d5616e3c832153ef9e847977709177f36465c454de19429f06de50e23e836dfb6e2a966ee369b1db38fceccd663c4f62

C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

MD5 b1414e92145b2ff6f2425687e206575a
SHA1 4903084de398b3f8f5dd0a3b92e664ec8421e0d3
SHA256 4bd7e0d75dcb31ba57ea3b28a46158495966254b192cde92d2fdb8869f54e49a
SHA512 eb78eb60b39f778ba6c14b8fdccdd060c98fb6e9dbd77d69c86a31847ef8c392dec2b4a9114216d3522ddd4ea43d1fa00722066b1337a8811db3d07d3d4944ad

C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

MD5 cdc308ec16b9deb595633b49c96cabfd
SHA1 bb4ffa53606b10a9e4f75735ad7f07191e57985a
SHA256 734acf6095e9804c96f2e5a3e53d1d96fd4de297e11f9e8da175e903372effcf
SHA512 1237e931c28ac42613fa4c4ea448cf2399f11c8c14a6a7deb55ec1ca4e1161bfee07ad7e2fe9ea2d99f2a8f6c4623e67b7a04b1f8554f8565b7fdef2d76b8725

C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

MD5 3130a54156dcdb7a71aed532d0b3b4df
SHA1 50e5220df8d964be6cf63518e71e6b080700106b
SHA256 526242cda41ffe224d45fddd053a2a9986c3e59fecb927906fe731248de564a6
SHA512 8c3ac9a9acf4eb2333e5b8511ec27c504c1d95aebe74c9a5bfe50843dfc33cfc2527016fd5b1999128165f082057f8e3fd8f537ae6d176a9706a80180911ae38

C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\F0ACCF77CDCBFF39F6191887F6D2D357

MD5 a266bb7dcc38a562631361bbf61dd11b
SHA1 3b1efd3a66ea28b16697394703a72ca340a05bd5
SHA256 df545bf919a2439c36983b54cdfc903dfa4f37d3996d8d84b4c31eec6f3c163e
SHA512 0da8ef4f8f6ed3d16d2bc8eb816b9e6e1345dfe2d91160196c47e6149a1d6aedaafadcefd66acdea7f72dcf0832770192ceac15b0c559c4ccc2c0e5581d5aefc

C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

MD5 a760a99fe8f7f2e00be004eedf66272b
SHA1 6592956ffef846ab9f1adb50add6d0af2d30e4f0
SHA256 87dd1365ec4a127e14cb180cf04c02f2d62198a93f96b921216b4a506243a9c9
SHA512 0e5f4ddfe3150a9e95454969ce68e7544961f83189480b2c03c6a24e4c198bf45edf429c5d9d1c54492294092fe445bc9ff4388cfd990620cfd8c03c81755e8e

C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\F0ACCF77CDCBFF39F6191887F6D2D357

MD5 f2ff2ded01ea51fd83474d71e2bcf9f0
SHA1 952f06bb4f16eb9b368dcf67269507ac7200a367
SHA256 287affce7d501c558c0c8497d03a7238c1bb7194427a7f5f645d636eea426e67
SHA512 ea34e5d07bd778bd394e18d29f301633ebfe939076d9e48e189053b779362a6752697ff5f334884113566514bd467aa671d8ac41732625d2345f497a7063584a

C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

MD5 f7f0c3e91f6924570e03461c08553b4b
SHA1 547f99b7b69cb4b2c323f9b6615a42005a3c24cf
SHA256 1b3003b583d5d1eb726703d7d5668da8b6e2cf945ac8044d2a443f20a92eb3a8
SHA512 8f3a50ed6f13bb48430829918bff5f996d2ae0afcd0de10e66e5742c3c76da7c72dce36b372cc4718d303e51a9f102c3d384e939a48ad2cfec1e2b95c9697753

C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

MD5 3c102ac220a7e3781869af553798d4c3
SHA1 0fe612acdfcf8bd6badf30b7c1ac4ebb9fcb9a84
SHA256 c0425167869bafd1043991adf35bc3911f828d823f10d99b6a176569a1a82142
SHA512 4ed2ace5a78fd27fae91fb71994ce48fc2d9dce0dbc4856b25b0623250e5f6995648a18e8a8287bc9722c5ee6a1493e710078209afda636b08f3b16b4e0e54f9

C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

MD5 1875448cad428a5a69fdbcb42da428db
SHA1 6ec90e892698b851707e591cae4d98d6803bc3c8
SHA256 eb1837c68c40462276af7942632d08cf53fbd8fef2aa954b43a20baffdb28c3a
SHA512 9188936f991a58c542faf42fdc24361ed91be9cf15c409bb41c8be7c31c1a95652f6f8bb1566dd1f792d166ac213bcebe552ea29538c4582e1a872ad68d41032

C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

MD5 4ba31e8321aedccf104560da4a9e90ba
SHA1 f528ecab632e14ebc0809bf4e406a26098ee4ce5
SHA256 850cc98c449f5aa75a13a3c94b03940dd9dafd15eb118846d480dafd8d0a4688
SHA512 3f0e3fecf292669f1f9ee9e661f1c5077c32d11933eec0bb19a68ba0f71c0ae38b68054f541470241177e0aedc90e53d175ef696a1255499f43b09233b5f63b0

C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

MD5 717f67b2a82ec108306070103a794f93
SHA1 0af2be0ce59cd2ae70f07730a17e6919a84dad97
SHA256 448b5a4638a972ea883201ccdef8fb379ecd4f562598321cd3d8c950fc26e8b1
SHA512 ce708f5d5de42921f16171843513ccc0eda4ff34c3b3f03b2da9bb714b4dcf3da30f5d520259f3efc8844b0ec75d81f384253432a3649a17a3ed37954e683675

C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\3C428B1A3E5F57D887EC4B864FAC5DCC

MD5 3e89755b90ffecd932f88df9e0f54c82
SHA1 bddf82e7395b99e0b36b58cad819466f539ad586
SHA256 7568c22750c645f802d1a431258b4a5185cc14019d28fb5c1fcf982ee5a79863
SHA512 2bc35f8544956f45cd096df76d608cd8c686ad663ff033925a1c011d0f0d50bf8777d38ac03259672b254bc9559cdab1658becc192ea51599a686017deecdd7e

C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\3C428B1A3E5F57D887EC4B864FAC5DCC

MD5 e4a68ac854ac5242460afd72481b2a44
SHA1 df3c24f9bfd666761b268073fe06d1cc8d4f82a4
SHA256 cb3ccbb76031e5e0138f8dd39a23f9de47ffc35e43c1144cea27d46a5ab1cb5f
SHA512 5622207e1ba285f172756f6019af92ac808ed63286e24dfecc1e79873fb5d140f1ceb7133f2476e89a5f75f711f9813a9fbb8fd5287f64adfdcc53b864f9bdc5

C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

MD5 71b4399050ee6bf007788a5f64f0a61d
SHA1 82e4d1dc4aeedf44309442a390d997efe00764e0
SHA256 0a4ec3ca5829c31e2557a375697e61047ad0cea43f8c6ddcdbe73ddbc786b6a6
SHA512 7273943ac6a77e0683a67e07cad88dcc46d4d5133272dfa21c17422668796344362684c555b497c9bd3043a1048002d88e45ec923abe866c4705e524a6d16a7d

C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

MD5 a5dd6734430e4247a01e6285e1c1f6f1
SHA1 9c7d8ad5f7d4f8b38a5901f96d63cdebf8dffae0
SHA256 1f203110c324a767a1555e4e5e9414b5c6b9559eeeb4732d56809811f2ecaa11
SHA512 38ee3729858c2ac26d987c7d15778a76f3d5a24b0cf20c779ba9d7ad06c7022fb3fdc3477153adbf8d0bf51d0ed0b2a6c74fc051742d70a9f1bc25d19ca18f77

C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

MD5 b8b7c559f26c5d23f8460b273061a702
SHA1 5cf2e66fbd7c0b1182da93049e3386aa48719373
SHA256 f0b871363fe1644a2d4ebfcc8d9a3f51ba2c2a2d03fbbe0665d819a5f652fe36
SHA512 b9844da9a43235566b8570f6af74db76f758fc083ee0a39605894143f3a2d5e74a29283f614694d87e4fd5ca07b544d237489278f414ad6ed823e833e82fb021

C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\01LB6K3J\2254111616-postmessagerelay[1].js

MD5 c264799bac4a96a4cd63eb09f0476a74
SHA1 d8a1077bf625dac9611a37bfb4e6c0cd07978f4c
SHA256 17dce4003e6a3d958bb8307bffa9c195694881f549943a7bdb2769b082f9326d
SHA512 6acd83dfd3db93f1f999d524b8828b64c8c0731567c3c0b8a77c6ddcf03d0e74ee20d23171e6ceac0c9f099dce03f8e5d68e78c374da2c055973f6ac2db4e4f9

C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\0I0VVMWQ\rpc_shindig_random[1].js

MD5 70116351ebc507731f11cfb8653f69bf
SHA1 667d48cd3c244c41a84302056e5b14140045acd3
SHA256 e3fff060584ca9c8eb12a6925252c8c6333622f4e6aeae8417449bf0ae355020
SHA512 a69875a52b635e7a561cfe2c7f4639bc122be434989dd39b37ab8dda08b49aa4bfd681c572628e9dc056c69808d0a03e2c6b4fef88db20a59ca73f097870aee9

Analysis: behavioral2

Detonation Overview

Submitted

2024-10-23 12:43

Reported

2024-10-23 12:46

Platform

win10v2004-20241007-en

Max time kernel

145s

Max time network

145s

Command Line

"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\6efbfa06daf6b2b726c382c98f9e22ff_JaffaCakes118.html

Signatures

Browser Information Discovery

discovery

Enumerates system info in registry

Description Indicator Process Target
Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe N/A
Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe N/A
Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe N/A

Suspicious use of FindShellTrayWindow

Description Indicator Process Target
N/A N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe N/A
N/A N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe N/A
N/A N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe N/A
N/A N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe N/A
N/A N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe N/A
N/A N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe N/A
N/A N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe N/A
N/A N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe N/A
N/A N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe N/A
N/A N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe N/A
N/A N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe N/A
N/A N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe N/A
N/A N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe N/A
N/A N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe N/A
N/A N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe N/A
N/A N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe N/A
N/A N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe N/A
N/A N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe N/A
N/A N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe N/A
N/A N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe N/A
N/A N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe N/A
N/A N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe N/A
N/A N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe N/A
N/A N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe N/A
N/A N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe N/A

Suspicious use of SendNotifyMessage

Description Indicator Process Target
N/A N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe N/A
N/A N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe N/A
N/A N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe N/A
N/A N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe N/A
N/A N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe N/A
N/A N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe N/A
N/A N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe N/A
N/A N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe N/A
N/A N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe N/A
N/A N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe N/A
N/A N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe N/A
N/A N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe N/A
N/A N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe N/A
N/A N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe N/A
N/A N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe N/A
N/A N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe N/A
N/A N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe N/A
N/A N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe N/A
N/A N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe N/A
N/A N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe N/A
N/A N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe N/A
N/A N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe N/A
N/A N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe N/A
N/A N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe N/A

Suspicious use of WriteProcessMemory

Description Indicator Process Target
PID 3260 wrote to memory of 1968 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 3260 wrote to memory of 1968 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 3260 wrote to memory of 4456 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 3260 wrote to memory of 4456 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 3260 wrote to memory of 4456 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 3260 wrote to memory of 4456 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 3260 wrote to memory of 4456 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 3260 wrote to memory of 4456 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 3260 wrote to memory of 4456 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 3260 wrote to memory of 4456 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 3260 wrote to memory of 4456 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 3260 wrote to memory of 4456 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 3260 wrote to memory of 4456 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 3260 wrote to memory of 4456 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 3260 wrote to memory of 4456 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 3260 wrote to memory of 4456 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 3260 wrote to memory of 4456 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 3260 wrote to memory of 4456 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 3260 wrote to memory of 4456 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 3260 wrote to memory of 4456 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 3260 wrote to memory of 4456 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 3260 wrote to memory of 4456 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 3260 wrote to memory of 4456 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 3260 wrote to memory of 4456 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 3260 wrote to memory of 4456 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 3260 wrote to memory of 4456 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 3260 wrote to memory of 4456 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 3260 wrote to memory of 4456 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 3260 wrote to memory of 4456 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 3260 wrote to memory of 4456 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 3260 wrote to memory of 4456 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 3260 wrote to memory of 4456 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 3260 wrote to memory of 4456 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 3260 wrote to memory of 4456 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 3260 wrote to memory of 4456 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 3260 wrote to memory of 4456 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 3260 wrote to memory of 4456 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 3260 wrote to memory of 4456 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 3260 wrote to memory of 4456 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 3260 wrote to memory of 4456 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 3260 wrote to memory of 4456 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 3260 wrote to memory of 4456 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 3260 wrote to memory of 2528 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 3260 wrote to memory of 2528 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 3260 wrote to memory of 4976 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 3260 wrote to memory of 4976 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 3260 wrote to memory of 4976 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 3260 wrote to memory of 4976 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 3260 wrote to memory of 4976 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 3260 wrote to memory of 4976 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 3260 wrote to memory of 4976 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 3260 wrote to memory of 4976 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 3260 wrote to memory of 4976 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 3260 wrote to memory of 4976 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 3260 wrote to memory of 4976 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 3260 wrote to memory of 4976 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 3260 wrote to memory of 4976 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 3260 wrote to memory of 4976 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 3260 wrote to memory of 4976 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 3260 wrote to memory of 4976 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 3260 wrote to memory of 4976 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 3260 wrote to memory of 4976 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 3260 wrote to memory of 4976 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 3260 wrote to memory of 4976 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe

Processes

C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe

"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\6efbfa06daf6b2b726c382c98f9e22ff_JaffaCakes118.html

C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe

"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffb6b9246f8,0x7ffb6b924708,0x7ffb6b924718

C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe

"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2072,17182257660328372917,4320579727668542809,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2084 /prefetch:2

C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe

"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2072,17182257660328372917,4320579727668542809,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2428 /prefetch:3

C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe

"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2072,17182257660328372917,4320579727668542809,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2724 /prefetch:8

C:\Windows\System32\CompPkgSrv.exe

C:\Windows\System32\CompPkgSrv.exe -Embedding

C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe

"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2072,17182257660328372917,4320579727668542809,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3212 /prefetch:1

C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe

"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2072,17182257660328372917,4320579727668542809,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3236 /prefetch:1

C:\Windows\System32\CompPkgSrv.exe

C:\Windows\System32\CompPkgSrv.exe -Embedding

C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe

"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2072,17182257660328372917,4320579727668542809,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5180 /prefetch:1

C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe

"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2072,17182257660328372917,4320579727668542809,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5496 /prefetch:1

C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe

"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2072,17182257660328372917,4320579727668542809,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=1896 /prefetch:1

C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe

"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2072,17182257660328372917,4320579727668542809,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6024 /prefetch:1

C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe

"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2072,17182257660328372917,4320579727668542809,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6200 /prefetch:1

C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe

"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2072,17182257660328372917,4320579727668542809,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=2216 /prefetch:1

C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe

"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2072,17182257660328372917,4320579727668542809,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=7148 /prefetch:8

C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe

"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2072,17182257660328372917,4320579727668542809,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=7148 /prefetch:8

C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe

"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2072,17182257660328372917,4320579727668542809,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=14 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6176 /prefetch:1

C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe

"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2072,17182257660328372917,4320579727668542809,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=15 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6284 /prefetch:1

C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe

"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2072,17182257660328372917,4320579727668542809,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=16 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5948 /prefetch:1

C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe

"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2072,17182257660328372917,4320579727668542809,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=17 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5952 /prefetch:1

C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe

"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2072,17182257660328372917,4320579727668542809,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=6400 /prefetch:2

Network

Country Destination Domain Proto
US 8.8.8.8:53 www.blogger.com udp
US 8.8.8.8:53 228.249.119.40.in-addr.arpa udp
US 8.8.8.8:53 79.190.18.2.in-addr.arpa udp
US 8.8.8.8:53 75.159.190.20.in-addr.arpa udp
US 8.8.8.8:53 ajax.googleapis.com udp
US 8.8.8.8:53 apis.google.com udp
US 8.8.8.8:53 w.sharethis.com udp
GB 172.217.169.73:445 www.blogger.com tcp
GB 216.58.212.234:80 fonts.googleapis.com tcp
GB 216.58.212.234:80 fonts.googleapis.com tcp
GB 18.172.88.108:80 w.sharethis.com tcp
GB 18.172.88.108:80 w.sharethis.com tcp
GB 18.172.88.108:80 w.sharethis.com tcp
GB 216.58.201.106:443 ajax.googleapis.com tcp
GB 216.58.201.106:80 ajax.googleapis.com tcp
GB 142.250.179.238:80 apis.google.com tcp
GB 142.250.179.238:443 apis.google.com tcp
GB 18.172.88.108:443 w.sharethis.com tcp
GB 18.172.88.108:443 w.sharethis.com tcp
GB 18.172.88.108:443 w.sharethis.com tcp
GB 142.250.178.3:80 fonts.gstatic.com tcp
US 8.8.8.8:53 promo.com.ng udp
GB 216.58.212.194:80 pagead2.googlesyndication.com tcp
US 8.8.8.8:53 contextual.media.net udp
GB 184.25.192.27:80 contextual.media.net tcp
GB 184.25.192.27:443 contextual.media.net tcp
US 8.8.8.8:53 static.ak.fbcdn.net udp
US 8.8.8.8:53 s7.addthis.com udp
GB 184.26.134.46:80 s7.addthis.com tcp
US 216.239.32.21:80 promo.com.ng tcp
US 8.8.8.8:53 resources.infolinks.com udp
US 8.8.8.8:53 234.212.58.216.in-addr.arpa udp
US 8.8.8.8:53 www.promo.com.ng udp
US 8.8.8.8:53 108.88.172.18.in-addr.arpa udp
US 8.8.8.8:53 106.201.58.216.in-addr.arpa udp
US 8.8.8.8:53 238.179.250.142.in-addr.arpa udp
US 8.8.8.8:53 95.221.229.192.in-addr.arpa udp
US 8.8.8.8:53 3.178.250.142.in-addr.arpa udp
US 8.8.8.8:53 36.10.230.54.in-addr.arpa udp
US 8.8.8.8:53 194.212.58.216.in-addr.arpa udp
US 8.8.8.8:53 27.192.25.184.in-addr.arpa udp
US 172.66.41.9:80 resources.infolinks.com tcp
US 8.8.8.8:53 sidharth12.googlecode.com udp
BE 108.177.15.82:80 sidharth12.googlecode.com tcp
GB 216.58.201.115:80 www.promo.com.ng tcp
US 8.8.8.8:53 www.linkwithin.com udp
SG 118.139.179.30:80 www.linkwithin.com tcp
GB 216.58.201.115:443 www.promo.com.ng tcp
US 8.8.8.8:53 widgets.twimg.com udp
US 8.8.8.8:53 www.nairacareer.com udp
US 13.248.169.48:80 www.nairacareer.com tcp
US 8.8.8.8:53 g.bing.com udp
US 150.171.27.10:443 g.bing.com tcp
US 13.248.169.48:80 www.nairacareer.com tcp
US 8.8.8.8:53 46.134.26.184.in-addr.arpa udp
US 8.8.8.8:53 21.32.239.216.in-addr.arpa udp
US 8.8.8.8:53 9.41.66.172.in-addr.arpa udp
US 8.8.8.8:53 82.15.177.108.in-addr.arpa udp
US 8.8.8.8:53 115.201.58.216.in-addr.arpa udp
US 8.8.8.8:53 30.179.139.118.in-addr.arpa udp
US 13.248.169.48:80 www.nairacareer.com tcp
US 13.248.169.48:80 www.nairacareer.com tcp
US 13.248.169.48:80 www.nairacareer.com tcp
US 13.248.169.48:80 www.nairacareer.com tcp
US 8.8.8.8:53 nwidget.networkedblogs.com udp
US 8.8.8.8:53 www.mapmyuser.com udp
GB 18.172.88.115:80 www.mapmyuser.com tcp
US 8.8.8.8:53 3.bp.blogspot.com udp
GB 18.172.88.115:443 www.mapmyuser.com tcp
GB 142.250.178.1:80 3.bp.blogspot.com tcp
US 8.8.8.8:53 2.bp.blogspot.com udp
US 8.8.8.8:53 1.bp.blogspot.com udp
GB 142.250.178.1:80 1.bp.blogspot.com tcp
GB 142.250.178.1:80 1.bp.blogspot.com tcp
US 8.8.8.8:53 4.bp.blogspot.com udp
GB 142.250.178.1:80 4.bp.blogspot.com tcp
US 8.8.8.8:53 img1.blogblog.com udp
US 8.8.8.8:53 s1.smartaddon.com udp
GB 172.217.169.73:80 img1.blogblog.com tcp
US 8.8.8.8:53 10.27.171.150.in-addr.arpa udp
US 8.8.8.8:53 48.169.248.13.in-addr.arpa udp
US 8.8.8.8:53 115.88.172.18.in-addr.arpa udp
US 8.8.8.8:53 1.178.250.142.in-addr.arpa udp
US 8.8.8.8:53 www.arikair.com udp
BE 35.195.44.168:80 www.arikair.com tcp
BE 35.195.44.168:443 www.arikair.com tcp
SG 118.139.179.30:80 www.linkwithin.com tcp
US 8.8.8.8:53 www.blogger.com udp
US 8.8.8.8:53 icons.iconarchive.com udp
US 104.21.235.213:80 icons.iconarchive.com tcp
US 8.8.8.8:53 static.networkedblogs.com udp
US 8.8.8.8:53 www.zimbio.com udp
US 8.8.8.8:53 bloggers.com udp
US 13.248.169.48:80 bloggers.com tcp
US 8.8.8.8:53 73.169.217.172.in-addr.arpa udp
US 8.8.8.8:53 168.44.195.35.in-addr.arpa udp
US 8.8.8.8:53 213.235.21.104.in-addr.arpa udp
N/A 224.0.0.251:5353 udp
US 8.8.8.8:53 28.118.140.52.in-addr.arpa udp
US 8.8.8.8:53 133.211.185.52.in-addr.arpa udp
US 8.8.8.8:53 149.220.183.52.in-addr.arpa udp
GB 142.250.179.238:443 apis.google.com udp
GB 216.58.204.66:445 pagead2.googlesyndication.com tcp
US 8.8.8.8:53 ws.sharethis.com udp
US 8.8.8.8:53 googleads.g.doubleclick.net udp
GB 216.58.201.98:443 googleads.g.doubleclick.net tcp
US 8.8.8.8:53 98.201.58.216.in-addr.arpa udp
US 8.8.8.8:53 lg3.media.net udp
US 8.8.8.8:53 s1.smartaddon.com udp
GB 142.250.178.1:80 4.bp.blogspot.com tcp
GB 142.250.178.1:80 4.bp.blogspot.com tcp
GB 184.26.188.27:443 lg3.media.net tcp
GB 216.58.212.194:139 pagead2.googlesyndication.com tcp
BE 108.177.15.82:80 sidharth12.googlecode.com tcp
US 8.8.8.8:53 router.infolinks.com udp
US 172.66.42.247:443 router.infolinks.com tcp
SG 118.139.179.30:80 www.linkwithin.com tcp
US 8.8.8.8:53 www.facebook.com udp
US 8.8.8.8:53 lh3.ggpht.com udp
GB 142.250.178.1:80 lh3.ggpht.com tcp
GB 163.70.151.35:445 www.facebook.com tcp
US 8.8.8.8:53 27.188.26.184.in-addr.arpa udp
US 8.8.8.8:53 247.42.66.172.in-addr.arpa udp
US 8.8.8.8:53 www.facebook.com udp
US 8.8.8.8:53 56.163.245.4.in-addr.arpa udp
US 8.8.8.8:53 198.187.3.20.in-addr.arpa udp
US 8.8.8.8:53 69.190.18.2.in-addr.arpa udp
US 8.8.8.8:53 platform.twitter.com udp
GB 146.75.72.157:445 platform.twitter.com tcp
US 8.8.8.8:53 developers.google.com udp
US 8.8.8.8:53 accounts.google.com udp
GB 142.250.200.46:80 developers.google.com tcp
BE 64.233.184.84:443 accounts.google.com tcp
US 8.8.8.8:53 ssl.gstatic.com udp
GB 142.250.200.46:443 developers.google.com tcp
GB 216.58.201.99:443 ssl.gstatic.com tcp
GB 163.70.147.35:80 www.facebook.com tcp
US 8.8.8.8:53 46.200.250.142.in-addr.arpa udp
US 8.8.8.8:53 84.184.233.64.in-addr.arpa udp
US 8.8.8.8:53 99.201.58.216.in-addr.arpa udp
GB 163.70.147.35:443 www.facebook.com tcp
US 8.8.8.8:53 platform.twitter.com udp
GB 151.101.188.157:139 platform.twitter.com tcp
GB 142.250.200.46:443 developers.google.com udp
US 8.8.8.8:53 35.147.70.163.in-addr.arpa udp
GB 142.250.178.14:445 www.google-analytics.com tcp
GB 142.250.187.238:139 www.google-analytics.com tcp
US 8.8.8.8:53 88.156.103.20.in-addr.arpa udp
US 8.8.8.8:53 www.mapmyuser.com udp
US 8.8.8.8:53 ep1.adtrafficquality.google udp
US 13.248.169.48:80 bloggers.com tcp
GB 18.172.88.59:80 www.mapmyuser.com tcp
GB 142.250.200.34:443 ep1.adtrafficquality.google tcp
US 8.8.8.8:53 ep2.adtrafficquality.google udp
GB 142.250.200.1:443 ep2.adtrafficquality.google tcp
GB 142.250.200.1:443 ep2.adtrafficquality.google udp
US 8.8.8.8:53 59.88.172.18.in-addr.arpa udp
US 8.8.8.8:53 34.200.250.142.in-addr.arpa udp
US 8.8.8.8:53 1.200.250.142.in-addr.arpa udp
GB 142.250.200.34:443 ep1.adtrafficquality.google udp
US 8.8.8.8:53 14.227.111.52.in-addr.arpa udp
US 8.8.8.8:53 57.169.31.20.in-addr.arpa udp
US 8.8.8.8:53 tse1.mm.bing.net udp
US 150.171.27.10:443 tse1.mm.bing.net tcp
US 150.171.27.10:443 tse1.mm.bing.net tcp
US 150.171.27.10:443 tse1.mm.bing.net tcp
US 150.171.27.10:443 tse1.mm.bing.net tcp
US 150.171.27.10:443 tse1.mm.bing.net tcp
BE 64.233.184.84:443 accounts.google.com udp

Files

C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad\settings.dat

MD5 61cef8e38cd95bf003f5fdd1dc37dae1
SHA1 11f2f79ecb349344c143eea9a0fed41891a3467f
SHA256 ae671613623b4477fbd5daf1fd2d148ae2a09ddcc3804b2b6d4ffcb60b317e3e
SHA512 6fb9b333fe0e8fde19fdd0bd01a1990a4e60a87c0a02bc8297da1206e42f8690d06b030308e58c862e9e77714a585eed7cc1627590d99a10aeb77fc0dd3d864d

\??\pipe\LOCAL\crashpad_3260_TIXVXUGQUAVYYEPX

MD5 d41d8cd98f00b204e9800998ecf8427e
SHA1 da39a3ee5e6b4b0d3255bfef95601890afd80709
SHA256 e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855
SHA512 cf83e1357eefb8bdf1542850d66d8007d620e4050b5715dc83f4a921d36ce9ce47d0d13c5d85f2b0ff8318d2877eec2f63b931bd47417a81a538327af927da3e

C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad\settings.dat

MD5 0a9dc42e4013fc47438e96d24beb8eff
SHA1 806ab26d7eae031a58484188a7eb1adab06457fc
SHA256 58d66151799526b3fa372552cd99b385415d9e9a119302b99aadc34dd51dd151
SHA512 868d6b421ae2501a519595d0c34ddef25b2a98b082c5203da8349035f1f6764ddf183197f1054e7e86a752c71eccbc0649e515b63c55bc18cf5f0592397e258f

C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\629de6a7-2d84-4600-896f-a11bca1226ca.tmp

MD5 fc7a0b3cd7bcf1e74790cf190301a85f
SHA1 ff502591833ca41e05c2dcd09ec8b918a4b64aca
SHA256 ef516645aa4d20b92b87cbd13f780c6ae72d90ad063570a8ac16a523e1b3aff8
SHA512 bcdfb33ba86d2efc30bf7eeb94b2b09feb7fc5d74a13a129d7165d45905a28876873e4323410c7fb6006739708da3635055717a914de40199a627e06838174f1

C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Local State

MD5 2373bb9fba8fb127a208c7329d381e20
SHA1 d5e3062088a7067bfc6eb42e0fc9eed307113e1f
SHA256 003c3f83230cf9ed7a9d6574ee5b6e1f29760d775dc7cd027bff7a0582332cd3
SHA512 b766d000395ba091dc782faddc73f494f20f6a88b3de8f855de4dd26451c7b4e3fb2b20ae475ff72032310c29c448f5b917d1cd5ccfdda5a1ed6abe344eccff2

C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Preferences

MD5 5fa0d0c7d12b3fc38727344761a17dc0
SHA1 e93bb78e0f309b55b1a31d5c0c1ad82fd71fb0c2
SHA256 6d25cdc0c04c559e106b07e1273af10b480b947aed2e2e78257a785f5f705da8
SHA512 88ca157ff709167c4157d4a0980d10eb90e77c44d2329b37dbbef8794563db43e2439598a832008c0f07bdf0218528878059a68b65afab41f7a3a0264f69e6d2

C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\TransportSecurity~RFe580347.TMP

MD5 a0bfd1ad1e28c38b7829fb11cf25c07a
SHA1 6c2defde6ec7b394432fd411afba75e07c8f350b
SHA256 c937302d3c2eaa00f76894bce961d71cfdad6f9dbe05a2464d7e45b442ce0e39
SHA512 55773bfec6721f043c5f51437561757b033149cd3421f4662073dd941b209d6d5141fb8d3a7b832e0ee024ad0604f9333acd58adab86598e58a20196ae9aaf8b

C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\TransportSecurity

MD5 375f30b9a9a721a4ddb15f9f3895f726
SHA1 20b75e449ad7ef435090457cc9e12f4b71355602
SHA256 fbf37085ca3965a2e8bfbb282804af7cb793a1fce3e61c6a3338a0382592b3e3
SHA512 f207cc7364ff49544f199c1aa5038cf7cd723584c4e64525f1982d27d835d98ac5976b151016d2eb69739ce3991b1de6197c0d416e358736987c9c07ac8d61e1

C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\TransportSecurity

MD5 81a32fa18f5c9f92995e322fbeab8ea5
SHA1 8e56d2ce3f2ef01248aba768f515b626b2aedd3e
SHA256 967d869752f41d9c1cee736ffec377705e866e63ee6a7cc3e742e40b83bf1eaf
SHA512 327bbde5c3e7e23186ce6a9a9cf7d9c159b921b32b51c7d55ec8100a78bd78261a19408964bac62fa4ab65c5c787e343c4f117ef2b9ffd2d084dfd96fce02977

C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Preferences

MD5 ecd692d564f7e09cbb9a8fed0f4e60da
SHA1 572c5d1947bf0fc84d1cc74d45b4ac53e103d81d
SHA256 00e84684327f3fb270cd32191e2d9f052be6850e949ebec89100fdb3bd0fe62f
SHA512 6c4a1166822c09b24b748c6804fb6c7984e0bcddae23534010365e13876c4c89c27c640000016b6b7b5e2c204fb3d5d4fee99ac51f9c444696b73dd08164ba11

C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index

MD5 add1b950cccaafe00de552a60c0a19b7
SHA1 430a3fe7a5ac824c8064b843c18439f10fad4879
SHA256 f52a85206ad316d0102cf966c0b3c0b723b50cac79c9a6acb0aade17f8f810be
SHA512 7e6558d019dc85d221fbf23e12cc7f31aa5957911a3c890d2f2026f2b31223fd6a75f415a9654177c945d460caeeacf78adfa7aff3704eb332afc18a4810bb3e

C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Network Persistent State

MD5 2530c41483839fba3a0cc8bd2a1f15d1
SHA1 e215a729b9a701e111a8f274bc5cd1a465f80bf2
SHA256 b024c49d0eeb28a5946b9fa8b160b7640a3965b72a843ab284e4305207a3dc44
SHA512 3ad2c9b8605445aa707cedcdd94889a686b266c7ea01989531c93c7407fc90e9f9ee5c8ab355c61fcbf269aeae0e1290cad2016b2fbac178e9c7dc876409bfd2

C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\data_reduction_proxy_leveldb\CURRENT

MD5 6752a1d65b201c13b62ea44016eb221f
SHA1 58ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA256 0861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA512 9cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389

C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Preferences

MD5 73497f9a7f71e768c11748e0c63f404a
SHA1 f42904db402030c4c60bbd6c5c03c1ae8860f1c4
SHA256 5306d86ce9084ec625fbb7d393334e23e3ab8b44669d9062ddc0951416238a81
SHA512 d789b638a7d30c55ee4c667e2350b9b7aaf3ee0e6f307b54665332a86e0f91f0c2863db40d610b41f7469c576223c6843238f07d248fb38d53c613150ebeff64

C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Cache\f_00000d

MD5 05197e9427acea2ac4dc812f97a8f078
SHA1 3d2a38b79da52e57783360f195ac3e7c85edefd8
SHA256 7bdfd36b4f017340dbc84a310014381bfd3028416ff21c54f7ce0a35cfd38191
SHA512 084d4febc28358d3ba6b0bef400f637b7f350381b8b592b1e412dd860d5aaf034c03ecfa87a064cb19dd8a42faade23c260e35a8660791011b7e51b726418ead

C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Preferences

MD5 8f5f22dc7e78b87de8c389056a38a7e0
SHA1 f7017f8f92d3ba3ccaa41f05a965b6f97355770c
SHA256 63871b986bd3e7a61cea575813cba8b8cad9d0d1e99be0acf37cd4bae890520d
SHA512 68c8d85a3561cb051c3d8e145073c89800dd0740440694ece0f6fd9de658bd46b20bea6044e93c010aa4cdef64827ed0197342f8e8b364dede8b67d7412d9146

C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index

MD5 bcc41f77a502f2230e7c77a91e5612d4
SHA1 5b98434528acbdb4e7ab102ea1ff7b28048bd9c3
SHA256 ed13574588cf6ebdf46abd4bbb65a580a8a5ffefce6ab255b0b4eede313973b7
SHA512 b8d42df1ff005851b4ef4fb41854b8af54f7360f4eab891ccc7f24a33894fe3329f85a5f20011e69c4320bdcf9d52c9a977240675ad95d72a651fae99efb3d46

C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Network Persistent State

MD5 211f963082172e1d7fdf6d1a9cee7513
SHA1 3e1aa014e7394110a73b8783633312aec8860626
SHA256 03d19a78c7961ed537d14ef298a63141a1526a6db11f0f6236d69c34c108b3ab
SHA512 fd4ed828906a0ee4d3daf90d1a49a583c870acefa8a0fa39f28b1181562c1f02222e064e2cc66431c662b458d4d61d1b3b588dd1e8a8362168c3064b3f6f6862