Malware Analysis Report

2024-12-06 03:20

Sample ID 241028-ger48asang
Target 77f9b56a2e6f264e978088a13229b8be_JaffaCakes118
SHA256 8aebb036a4fe45f5b031022bd11ab4fbfb86f7f8b970c70d5145a25cf4aae033
Tags
socgholish discovery downloader
score
10/10

Table of Contents

Analysis Overview

MITRE ATT&CK

Enterprise Matrix V15

Analysis: static1

Detonation Overview

Signatures

Analysis: behavioral1

Detonation Overview

Command Line

Signatures

Processes

Network

Files

Analysis: behavioral2

Detonation Overview

Command Line

Signatures

Processes

Network

Files

Analysis Overview

score
10/10

SHA256

8aebb036a4fe45f5b031022bd11ab4fbfb86f7f8b970c70d5145a25cf4aae033

Threat Level: Known bad

The file 77f9b56a2e6f264e978088a13229b8be_JaffaCakes118 was found to be: Known bad.

Malicious Activity Summary

socgholish discovery downloader

SocGholish

Socgholish family

Browser Information Discovery

System Location Discovery: System Language Discovery

Suspicious use of FindShellTrayWindow

Suspicious use of SetWindowsHookEx

Suspicious use of WriteProcessMemory

Suspicious use of SendNotifyMessage

Modifies Internet Explorer settings

Enumerates system info in registry

Suspicious behavior: EnumeratesProcesses

Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary

MITRE ATT&CK

Analysis: static1

Detonation Overview

Reported

2024-10-28 05:43

Signatures

N/A

Analysis: behavioral1

Detonation Overview

Submitted

2024-10-28 05:43

Reported

2024-10-28 05:45

Platform

win7-20240903-en

Max time kernel

129s

Max time network

141s

Command Line

"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\77f9b56a2e6f264e978088a13229b8be_JaffaCakes118.html

Signatures

SocGholish

downloader socgholish

Socgholish family

socgholish

System Location Discovery: System Language Discovery

discovery
Description Indicator Process Target
Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE N/A

Modifies Internet Explorer settings

adware spyware
Description Indicator Process Target
Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain C:\Program Files\Internet Explorer\iexplore.exe N/A
Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive C:\Program Files\Internet Explorer\iexplore.exe N/A
Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery C:\Program Files\Internet Explorer\iexplore.exe N/A
Set value (int) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" C:\Program Files\Internet Explorer\iexplore.exe N/A
Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\SearchScopes C:\Program Files\Internet Explorer\iexplore.exe N/A
Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\IntelliForms C:\Program Files\Internet Explorer\iexplore.exe N/A
Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Toolbar C:\Program Files\Internet Explorer\iexplore.exe N/A
Set value (str) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" C:\Program Files\Internet Explorer\iexplore.exe N/A
Set value (int) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" C:\Program Files\Internet Explorer\iexplore.exe N/A
Set value (int) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" C:\Program Files\Internet Explorer\iexplore.exe N/A
Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\GPU C:\Program Files\Internet Explorer\iexplore.exe N/A
Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic C:\Program Files\Internet Explorer\iexplore.exe N/A
Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\InternetRegistry C:\Program Files\Internet Explorer\iexplore.exe N/A
Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Zoom C:\Program Files\Internet Explorer\iexplore.exe N/A
Set value (data) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 C:\Program Files\Internet Explorer\iexplore.exe N/A
Set value (int) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" C:\Program Files\Internet Explorer\iexplore.exe N/A
Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Main C:\Program Files\Internet Explorer\iexplore.exe N/A
Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\PageSetup C:\Program Files\Internet Explorer\iexplore.exe N/A
Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser C:\Program Files\Internet Explorer\iexplore.exe N/A
Set value (int) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" C:\Program Files\Internet Explorer\iexplore.exe N/A
Set value (str) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" C:\Program Files\Internet Explorer\iexplore.exe N/A
Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\LowRegistry C:\Program Files\Internet Explorer\iexplore.exe N/A
Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch C:\Program Files\Internet Explorer\iexplore.exe N/A
Set value (data) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb0100000078a0cc6b0b830b4fbbc12dd3fac6f5420000000002000000000010660000000100002000000037149744454263632c7d00b80b6e14d6a6fc7363549997584fbd6064b3757083000000000e800000000200002000000069c97327328c75deea9429dd0800317118f83eb52e45e8b719df75f8d6279062200000006c39d8c94f70ef89d407e8732bc7350eea1a9fc776561dc983eabb8d39fcb8564000000062655925eea1fa865264cdee35f4abcef55946e42470452296e976561c5396d4900a8ec8f0925a5dfd94cec8ed48bf4255098597c0863e1494f0cca8db7cf190 C:\Program Files\Internet Explorer\iexplore.exe N/A
Set value (int) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "436256071" C:\Program Files\Internet Explorer\iexplore.exe N/A
Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage C:\Program Files\Internet Explorer\iexplore.exe N/A
Set value (int) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{8C42B7E1-94EF-11EF-8C6C-D686196AC2C0} = "0" C:\Program Files\Internet Explorer\iexplore.exe N/A
Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Main C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE N/A
Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\IETld\LowMic C:\Program Files\Internet Explorer\iexplore.exe N/A
Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage C:\Program Files\Internet Explorer\iexplore.exe N/A
Set value (data) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = b07f3764fc28db01 C:\Program Files\Internet Explorer\iexplore.exe N/A
Set value (data) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 C:\Program Files\Internet Explorer\iexplore.exe N/A
Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\DomainSuggestion C:\Program Files\Internet Explorer\iexplore.exe N/A
Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing C:\Program Files\Internet Explorer\iexplore.exe N/A

Suspicious use of FindShellTrayWindow

Description Indicator Process Target
N/A N/A C:\Program Files\Internet Explorer\iexplore.exe N/A

Processes

C:\Program Files\Internet Explorer\iexplore.exe

"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\77f9b56a2e6f264e978088a13229b8be_JaffaCakes118.html

C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE

"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2120 CREDAT:275457 /prefetch:2

Network

Country Destination Domain Proto
US 8.8.8.8:53 img1.blogblog.com udp
US 8.8.8.8:53 img2.blogblog.com udp
US 8.8.8.8:53 dl.dropbox.com udp
US 8.8.8.8:53 apis.google.com udp
US 8.8.8.8:53 s7.addthis.com udp
US 8.8.8.8:53 ajax.googleapis.com udp
US 8.8.8.8:53 www.blogger.com udp
US 8.8.8.8:53 lh3.ggpht.com udp
US 8.8.8.8:53 bloggercomment.com udp
US 8.8.8.8:53 www.linkwithin.com udp
US 8.8.8.8:53 1.bp.blogspot.com udp
US 8.8.8.8:53 4.bp.blogspot.com udp
US 8.8.8.8:53 3.bp.blogspot.com udp
US 8.8.8.8:53 2.bp.blogspot.com udp
US 8.8.8.8:53 lh4.ggpht.com udp
US 8.8.8.8:53 lh5.googleusercontent.com udp
US 8.8.8.8:53 translate.google.com udp
US 8.8.8.8:53 lh5.ggpht.com udp
US 8.8.8.8:53 lh6.ggpht.com udp
US 8.8.8.8:53 affiliates-cdn.mozilla.org udp
US 8.8.8.8:53 feeds.feedburner.com udp
US 8.8.8.8:53 www.opromo.com udp
US 8.8.8.8:53 hipercontador.gedan.com udp
GB 184.26.134.46:80 s7.addthis.com tcp
GB 184.26.134.46:80 s7.addthis.com tcp
GB 172.217.169.78:80 apis.google.com tcp
GB 142.250.187.226:80 pagead2.googlesyndication.com tcp
GB 142.250.187.226:80 pagead2.googlesyndication.com tcp
GB 172.217.169.78:80 apis.google.com tcp
GB 172.217.169.78:443 apis.google.com tcp
GB 162.125.64.15:80 dl.dropbox.com tcp
GB 162.125.64.15:80 dl.dropbox.com tcp
SG 118.139.179.30:80 www.linkwithin.com tcp
SG 118.139.179.30:80 www.linkwithin.com tcp
GB 142.250.178.9:80 www.blogger.com tcp
GB 142.250.178.9:80 www.blogger.com tcp
GB 142.250.178.9:80 www.blogger.com tcp
GB 142.250.178.9:80 www.blogger.com tcp
GB 142.250.178.9:80 www.blogger.com tcp
GB 142.250.200.1:443 lh5.googleusercontent.com tcp
GB 142.250.200.1:443 lh5.googleusercontent.com tcp
GB 142.250.178.9:80 www.blogger.com tcp
GB 142.250.178.9:80 www.blogger.com tcp
GB 142.250.187.234:443 ajax.googleapis.com tcp
GB 142.250.187.234:443 ajax.googleapis.com tcp
GB 142.250.180.1:80 lh5.ggpht.com tcp
GB 142.250.180.1:80 lh5.ggpht.com tcp
GB 142.250.180.1:80 lh5.ggpht.com tcp
GB 142.250.180.1:80 lh5.ggpht.com tcp
GB 142.250.180.1:80 lh5.ggpht.com tcp
GB 142.250.178.14:80 feeds.feedburner.com tcp
GB 142.250.178.14:80 feeds.feedburner.com tcp
GB 142.250.180.1:80 lh5.ggpht.com tcp
GB 142.250.180.1:80 lh5.ggpht.com tcp
GB 142.250.180.1:80 lh5.ggpht.com tcp
GB 142.250.180.1:80 lh5.ggpht.com tcp
GB 142.250.180.1:80 lh5.ggpht.com tcp
GB 142.250.180.1:80 lh5.ggpht.com tcp
GB 142.250.180.1:80 lh5.ggpht.com tcp
GB 142.250.180.1:80 lh5.ggpht.com tcp
GB 142.250.178.14:80 feeds.feedburner.com tcp
GB 142.250.178.14:80 feeds.feedburner.com tcp
GB 142.250.180.1:80 lh5.ggpht.com tcp
GB 142.250.180.1:80 lh5.ggpht.com tcp
GB 172.217.16.225:80 lh6.ggpht.com tcp
GB 172.217.16.225:80 lh6.ggpht.com tcp
GB 142.250.180.1:80 lh5.ggpht.com tcp
GB 142.250.180.1:80 lh5.ggpht.com tcp
US 13.248.252.114:80 hipercontador.gedan.com tcp
US 13.248.252.114:80 hipercontador.gedan.com tcp
GB 162.125.64.15:443 dl.dropbox.com tcp
GB 162.125.64.15:443 dl.dropbox.com tcp
GB 142.250.178.14:443 feeds.feedburner.com tcp
US 3.18.7.81:80 www.opromo.com tcp
US 3.18.7.81:80 www.opromo.com tcp
BR 45.152.44.151:80 bloggercomment.com tcp
BR 45.152.44.151:80 bloggercomment.com tcp
US 8.8.8.8:53 c.pki.goog udp
US 8.8.8.8:53 c.pki.goog udp
US 8.8.8.8:53 c.pki.goog udp
US 8.8.8.8:53 c.pki.goog udp
GB 142.250.180.3:80 c.pki.goog tcp
GB 142.250.180.3:80 c.pki.goog tcp
GB 142.250.180.3:80 c.pki.goog tcp
GB 142.250.180.3:80 c.pki.goog tcp
GB 142.250.180.3:80 c.pki.goog tcp
GB 142.250.180.3:80 c.pki.goog tcp
US 8.8.8.8:53 o.pki.goog udp
US 8.8.8.8:53 o.pki.goog udp
US 8.8.8.8:53 o.pki.goog udp
US 8.8.8.8:53 o.pki.goog udp
US 8.8.8.8:53 www.hugedomains.com udp
US 8.8.8.8:53 o.pki.goog udp
US 8.8.8.8:53 o.pki.goog udp
GB 142.250.180.3:80 o.pki.goog tcp
US 104.26.6.37:443 www.hugedomains.com tcp
US 104.26.6.37:443 www.hugedomains.com tcp
GB 142.250.180.3:80 o.pki.goog tcp
GB 142.250.180.3:80 o.pki.goog tcp
GB 142.250.180.3:80 o.pki.goog tcp
GB 142.250.180.3:80 o.pki.goog tcp
GB 142.250.180.3:80 o.pki.goog tcp
GB 216.58.204.78:80 www.google-analytics.com tcp
GB 216.58.204.78:80 www.google-analytics.com tcp
BR 45.152.44.151:443 bloggercomment.com tcp
US 8.8.8.8:53 usuarionovo.com udp
US 8.8.8.8:53 selos.climatempo.com.br udp
US 104.21.71.220:80 usuarionovo.com tcp
US 104.21.71.220:80 usuarionovo.com tcp
GB 142.250.180.1:80 lh5.ggpht.com tcp
US 35.185.88.154:80 selos.climatempo.com.br tcp
US 35.185.88.154:80 selos.climatempo.com.br tcp
US 8.8.8.8:53 b.scorecardresearch.com udp
NL 18.239.83.126:80 b.scorecardresearch.com tcp
NL 18.239.83.126:80 b.scorecardresearch.com tcp
US 8.8.8.8:53 sb.scorecardresearch.com udp
NL 18.239.83.98:443 sb.scorecardresearch.com tcp
NL 18.239.83.98:443 sb.scorecardresearch.com tcp
US 8.8.8.8:53 fontpis.blogspot.com udp
GB 172.217.16.225:443 fontpis.blogspot.com tcp
GB 172.217.16.225:443 fontpis.blogspot.com tcp
US 8.8.8.8:53 www.google.com udp
GB 172.217.169.36:80 www.google.com tcp
GB 172.217.169.36:80 www.google.com tcp
US 8.8.8.8:53 translate.googleapis.com udp
GB 142.250.180.10:443 translate.googleapis.com tcp
GB 142.250.180.10:443 translate.googleapis.com tcp
US 8.8.8.8:53 accounts.google.com udp
NL 173.194.69.84:443 accounts.google.com tcp
NL 173.194.69.84:443 accounts.google.com tcp
US 8.8.8.8:53 ssl.gstatic.com udp
GB 142.250.187.195:443 ssl.gstatic.com tcp
GB 142.250.187.195:443 ssl.gstatic.com tcp
US 8.8.8.8:53 ep1.adtrafficquality.google udp
GB 142.250.200.34:443 ep1.adtrafficquality.google tcp
GB 142.250.200.34:443 ep1.adtrafficquality.google tcp
US 8.8.8.8:53 ep2.adtrafficquality.google udp
GB 172.217.169.1:443 ep2.adtrafficquality.google tcp
GB 172.217.169.1:443 ep2.adtrafficquality.google tcp
US 8.8.8.8:53 crl.microsoft.com udp
GB 2.18.190.80:80 crl.microsoft.com tcp
US 204.79.197.200:443 ieonline.microsoft.com tcp
US 204.79.197.200:443 ieonline.microsoft.com tcp
US 8.8.8.8:53 www.microsoft.com udp
US 8.8.8.8:53 www.microsoft.com udp
US 204.79.197.200:443 ieonline.microsoft.com tcp
NL 173.194.69.84:443 accounts.google.com tcp
NL 173.194.69.84:443 accounts.google.com tcp
NL 173.194.69.84:443 accounts.google.com tcp
NL 173.194.69.84:443 accounts.google.com tcp

Files

C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\24BD96D5497F70B3F510A6B53CD43F3E_3A89246FB90C5EE6620004F1AE0EB0EA

MD5 c259994fd8f5e41780add111220d1622
SHA1 2c7c618c276ee3b8384b7f61c49aba8b31535797
SHA256 eee4990e08bb05da8348dfa0adae5cf2c0c986d1f992c9e5c2e939d30296ba03
SHA512 f4d70aeaa50b7df99e0a3b88150be25b5e8fee01bb2b0f14ae10e89672823f14bb530b302d23e5ae23ccf5a4136a280e0dd141aa85a4708e6e846e72b2260ef4

C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\24BD96D5497F70B3F510A6B53CD43F3E_3A89246FB90C5EE6620004F1AE0EB0EA

MD5 d3282ff61cf68b7575df2ae07ba37ee8
SHA1 445c849c34920dbdcdb5d5dcce2abf599a2e6b3f
SHA256 5011f372f598cfc07c83718fb7f526742250472f3e154edfff8f5aa736e362b6
SHA512 3db87bdc6e0afd032000c3352dbdc1e26598c8eecc9c88b07e066df0a9e7308544258ee5613a2a69748d5b411be355f5b4b77f4c99dca9705918b3a076f179b2

C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\05DDC6AA91765AACACDB0A5F96DF8199

MD5 4703851368401a468b4f92cf37f23bb4
SHA1 aa96ce7e9f4b63c432be8e8f59ee5aaa45b0e00b
SHA256 ac5b2202a9062410d0e6c0bd9fdc3da95b981e58b34bba4b58b349d492b7c983
SHA512 baa2463ee73fed6e37ef74d5bfe0e25abf2bd4c06302cf6555c3dc9e476f201b563b5b50dabf21b0ed581f6ed0b4ed63188de8299f2a28a66bdb64f46adcba85

C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\05DDC6AA91765AACACDB0A5F96DF8199

MD5 e935bc5762068caf3e24a2683b1b8a88
SHA1 82b70eb774c0756837fe8d7acbfeec05ecbf5463
SHA256 a8accfcfeb51bd73df23b91f4d89ff1a9eb7438ef5b12e8afda1a6ff1769e89d
SHA512 bed4f6f5357b37662623f1f8afed1a3ebf3810630b2206a0292052a2e754af9dcfe34ee15c289e3d797a8f33330e47c14cbefbc702f74028557ace29bf855f9e

C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\633SXO0D\plusone[1].js

MD5 1106da066ce809fb5afe9c6c1b4185b2
SHA1 3b64d3a7f52b4c07047fa8727db4207137733bf8
SHA256 d0f3af1e716ce7846e7c252ace160c12480d41eecd5a7e7917ee5b2ccde62b51
SHA512 3f0205b89d5293f14d863e344680a9d8518e5d4ee3b981dc5981106534bd597ed6b388eecab1385320f77c8d5a46a4ce5b64f03f4377b8ea13ecf9b569878fd9

C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\QS2MOPHD\f[1].txt

MD5 bbfcdad193382cddd9b56decc2695608
SHA1 b72eff0029618bb0458bf04e7806a14b5a836acd
SHA256 03e3ac5bf8c182885b83fa8a164f9a095c50e1c5662c273d640c8741cd12c6c0
SHA512 904303482902707a75d763499a1bac97ef766fbaac3163910f26b9e678c5a6673ff9de837fa3349c86189f87f5cb93160a8ec7044edab0c04f62045f7a3cfc8e

C:\Users\Admin\AppData\Local\Temp\TarCB6F.tmp

MD5 4ea6026cf93ec6338144661bf1202cd1
SHA1 a1dec9044f750ad887935a01430bf49322fbdcb7
SHA256 8efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA512 6c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b

C:\Users\Admin\AppData\Local\Temp\CabCB6E.tmp

MD5 49aebf8cbd62d92ac215b2923fb1b9f5
SHA1 1723be06719828dda65ad804298d0431f6aff976
SHA256 b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512 bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b

C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

MD5 7b4e62a3a4353f484ad5d91af8fa10fa
SHA1 0ca8e94ba9ffc025b9ca3d18274b02ed8fb540b0
SHA256 4577152185099092982d33c36b73cd99b8afeb7f98db187750243adeeff54251
SHA512 fc8c5b5f3cc3509845f4fc5a97a1b4c2dc5dae3ec328c7b42b025fa0d5c5664b835d9e7dc3d1d8e09cfae70294b08021967f5a2b9599432fcb925d98ee6599a9

C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\633SXO0D\cb=gapi[2].js

MD5 1d4cb29476060a1b3681fdb681200b11
SHA1 d541f88bf8d4fd98b9e0e723e050c47d4d32c18a
SHA256 5930e64b0cbf1dc5922f65060422fcf822870ac69439450ee3cb134365a51a82
SHA512 85575c3656c8e0d70cbcdf76194e37dbe3f7bd4535221a8f51fb6b51266fd682809fa86bc556c27d127f713a6ff75290ae1fbdcd8e589211e1685f82b99d93cd

C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

MD5 d51ea7017c0d83ec28908eb167b0ce5b
SHA1 8b6949af198109be8d722e4b00c15953e3f741b4
SHA256 8bb331c34aab942159a114b717fd611a679a01eb48d4e1c4a220986995c45b96
SHA512 def92b18bc80658d87c760d2aacaf558472647584371de0128e4b3202fa151b83322bf1aa44dcbae9c8040e5fd5ba4ee881d900c03369e7c97a8885eec14f8df

C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

MD5 25fa0ace8bdb721310bd229279ccbd41
SHA1 481d23c1a614cccdf0a55792871d05eb277ac0e7
SHA256 2c8128fbbc9b72704d2c5cfa37827a3188cf563fba973299052b455c3ae33753
SHA512 afbe29bd768a07eb1150d6dd108b5c706dda0bb6fe55d65c834a8d437a5f3b21404b97d84bef49594245ba03f4c4f8dfe9c6ed5288a5e889f6fc8dec4ff6bd57

C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

MD5 a29ca0b25b111915a6c2439b855239f4
SHA1 36a9da6967a77ee4f96eb9f32f0fb93251517eba
SHA256 fa12a2afb053e635dd1e2e2cce4151ad23e69aed688b0fd9c687a12b0bc40ca6
SHA512 624363c16d30a9593231737f839129a79b340467db54a98d516b1b015e666b891a39ef59ec440cc97bb39c08ef00e0d4f2dc76fbc3f469232e77fa9ec634cf85

C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

MD5 cea8d2f0ee227f6faa458f358a79ab4e
SHA1 c9806f08009bae3a0e1a77c0e1f6db6e3102ab7c
SHA256 f9a002c3697eab685bca79bbe0e62491f41ed8bae602b3edbe594085456676bb
SHA512 6dc485db2812e78fd3ea97fde540878f04930cdf710e6e34b8c5ce8edc688713ca49dfc8aefec730d5e17311e87262f797eac92d2f1d14cb8ff0438fbedf7685

C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

MD5 69cfad715f6e03a7c7200d1e61698e29
SHA1 08374e40098735cab545fc4d6644a9e9a4ccb302
SHA256 a5db10f6c9e6708d60b45a8d962df5354f605aa3b06c5437a10dec3ac4fce2e5
SHA512 90b93fbdb4b9974dae55347914f72c7bc79531bffa222d08922da76416b47d17b618a644b8115f5079d8b1fd4c30141de47a1c533a54d82c46fb422e83301dc9

C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

MD5 a0f7206cf9a286d4a60981cc0bb5d56f
SHA1 cb566dd09476be7add71d653b4d615678b5e95a0
SHA256 dd28056181e660d0501475d91e1e170777b3afc47acd6e0de605d70fa67d66a3
SHA512 49840c1ff3d80c2c1aceb99990b1ce5c8a1ec7d67989897ef060fe120e909da05e5ae4465ced7bdec4160778ced89680fb14cf2e0e405397172c3cff6e2dbe6f

C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

MD5 7d0b1577b5e266383cb9ff381ab3c0c4
SHA1 2ac6ddba1e949c84181d694af7372f3258e6c7b6
SHA256 b4d39d8a30f8d2a74cdbe535a677cc9e488a34eefc351cb805cc656162ec280e
SHA512 e716e28dad7a30c1df7b84906f4919a5da1ce870525aa1a1f76f7f41b42d03cc05f2953eb87c975cc8c75d359bd00d220d205cc9d55b3e4d5428b94afd5b8126

C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

MD5 5f88bd2381406f11a6942643d506b9f5
SHA1 5871bd245a11c850f8e0e5b1e48866e72236f451
SHA256 73e05c35f4cce389e7d3bffa166de5f9edbad5340d6a589e637d46174d165f87
SHA512 ceb2a94e680886aa2b6e0da0b9df3be6f6fb21afe22f819d4807b3d0f450e49762b8220eba4ab86c61b81b29b9ee0e543df599b5235c2b088f04bc74e54f34e2

C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

MD5 d241bf3f60a1b6fe62dca09898010f53
SHA1 cb3ac2c7dd6f537cb2a2973feb1e62d51250a46c
SHA256 c1beaa39aa9236deacd5f3d3937a0feff8bb95100f2e122d80f32322fbb060bc
SHA512 7544414d31114b85efee0265d68bf1f1eb5276a063433668145f539dd598e899beb38164c4965c25855667eec326cede1745c26087696616b92273ece85f72ae

C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

MD5 750eab78701dffc9d9052dbfaefa8b53
SHA1 8c0a7c2d1f9d062bb6ad32758d5bbc5d9ed695bc
SHA256 add75c974935b2e1bf01443af1e93a4986eba492042b1b4ed33afa68d766c9b0
SHA512 3a3dac40884f4e6ff8b05809714fec14f7de9fbd9f03635fcf8f55dff1d7192afd846f25b417cf4e4c4fb2fae22bc839476b0f0e80feb84511afe2399412492d

C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

MD5 c2e18e2ba8eac36dfb21cfef3603d97c
SHA1 925d7f15e5786eb42149fd7334273c0642dc41f2
SHA256 21fdc6da9a86870348eea2a040888f21adc1bf33b61138c5e649ff183dabe47e
SHA512 3fbab1032bd2f78669c4e6e91c3f42361e631ab2e8b2c8d9213c524c517bcfd1ab4257fdaa8a292f211cfcddfe4d1c5a6835b2f37f2d17be012a7fcb5346a21a

C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

MD5 b564bbfa2e8f4bc039ab315c6e95bb03
SHA1 1de30d9eb7167ba9bcd5e078433bff73caacc8f1
SHA256 6a648cee1cf8e63ac99205c9c1252379fd9e2e61233005747803d85a3210ddbb
SHA512 4e22877a242f995aeb359bdfee9109fea363bad0b38e1e98c03a2bbfa144a1e1474404bbfef87f4fca03ad25be15a1912d1a8bd22545cd2561512d0e4a00fe27

C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\F0ACCF77CDCBFF39F6191887F6D2D357

MD5 a266bb7dcc38a562631361bbf61dd11b
SHA1 3b1efd3a66ea28b16697394703a72ca340a05bd5
SHA256 df545bf919a2439c36983b54cdfc903dfa4f37d3996d8d84b4c31eec6f3c163e
SHA512 0da8ef4f8f6ed3d16d2bc8eb816b9e6e1345dfe2d91160196c47e6149a1d6aedaafadcefd66acdea7f72dcf0832770192ceac15b0c559c4ccc2c0e5581d5aefc

C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\F0ACCF77CDCBFF39F6191887F6D2D357

MD5 0f8924e80283d85d7042895e589d1302
SHA1 2fe211a6b2495f49a515cb9e4d1f58fd62389d05
SHA256 3fdc5cfbbf1dc51eb5fb4e5508bfbbece1a79f7be800a236bb098dfc88a60c2e
SHA512 30457849b72104bbe5ee388cf617a8e150b4260b51931ef78e1160f2334d038b307a58a8fffb49cde9a8b1a0f4c2701549c52d0de2c4d25a82feeb8a16aea893

C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

MD5 329b69a5bdca17179694a525c15d6809
SHA1 6b0bf2e97fdc75baf0de2e2b21ba561fa732c3ae
SHA256 f5bf0d03e33b9394ff575cca64794feeeb4fe80f1dec28801a5ed0739d5eef68
SHA512 31cbb605b8ed5702b3a9293bc21a855fe3e67cb130d758058be03bdc26e632a9640d5545d2911c4cb06ad8613adf0405dae45009682bf1ecafa496ad622658ec

C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

MD5 6b6ca98ad591ab23672d9db27d4981e0
SHA1 7b90b244e926aa2a4187f4abf6639b0c310b4fb7
SHA256 93ac0bbe93fbd687e5c3532b3aaf384391bc7b50bdfe07985d72ba811de3834b
SHA512 a265bc64d75aa2099b8fb68a08d7169e759aa56ebdcc9dd400fad34f0053a36c3503b772810fa905e2ca568f4f60a2f99dbf138ef8387ef4c6a49865421a17f3

C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

MD5 c4d29ba2b8ee366eba0e70a55ef63ca8
SHA1 0f65293734624f95170fbe97edfa817995a7e0f8
SHA256 ce610bbd6ffe8bcd77eb9c328568bf3347985bffa7e1698dc46ade86d87d1757
SHA512 6a43bc39f68f5091fc2c00e6b186aaf88c56efb4a4a57a37fe3c3a993b350f75650f3516dafd2cfafd52253a1cb7df154397f4dc8ba14ae24847166219f21edc

C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

MD5 626b95dd479e8c87edfdebadf9ffed69
SHA1 907e2b70e09dee9d588f48937bf4d9de2e7f1d13
SHA256 ef1affeffa6b685e99f53b4832729bc4276235a5b2df00ad5c8b802a6699a497
SHA512 aebcdcfea438dcfa5f25faeb0a1c08d05d6d9b6524a399b9c66ff172c1782c88979429e39ceef87e716ae85e0f2e57e61ec0be57632f452de94fa994677d8e78

C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

MD5 d712ef2cc64092fbc509f22cbd315215
SHA1 ce733eb1c407684e3fc691779bce77cd71a020e2
SHA256 a105fc92b993b00db2771fb1cbf85a6c0a23fd89070a2e0b9ecc3f16118fdd7a
SHA512 82d191856991e4cf2030bec395914fdc69728cac9d03881c360230fdf9de6b5b2ddabf93c761ee5117aa0baf5d221a5785ac9aeb77d1b302c4342251caae8517

C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\3C428B1A3E5F57D887EC4B864FAC5DCC

MD5 e4a68ac854ac5242460afd72481b2a44
SHA1 df3c24f9bfd666761b268073fe06d1cc8d4f82a4
SHA256 cb3ccbb76031e5e0138f8dd39a23f9de47ffc35e43c1144cea27d46a5ab1cb5f
SHA512 5622207e1ba285f172756f6019af92ac808ed63286e24dfecc1e79873fb5d140f1ceb7133f2476e89a5f75f711f9813a9fbb8fd5287f64adfdcc53b864f9bdc5

C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\3C428B1A3E5F57D887EC4B864FAC5DCC

MD5 2cacf166b04215bf871dc07156269218
SHA1 0c5beea7a902e36043dfdec4f7f53c28a83ad15f
SHA256 9aecdd77a8e5ccbde8b1610c8e68e09c919355270de7e4b0d3e22446d77b7f69
SHA512 53b834a3d2c4919d330646254c7ce87540c39cd1dacddc748389fb3f2e94452a5e594df8944c09ba4beb92cadfccf7b1b4f58d8b880edac743c1611debf4f588

C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

MD5 943705a76619b88f536591470b838298
SHA1 5bcbc73e8a1ede89ffe677b10c695f2611542c30
SHA256 7d795c976cad95ecff0a48aaa69edce6c836f0c2a4c5daf5063e3eab17077630
SHA512 abfcc1e608491f4450fd5309edbc0835b9fdf1dacc6f387950d0b3a4df6d381ddddd9bc1916b93bcdd0f9e7bafc8466d0a583c4940b6a3a653aadaa4a09f661a

C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

MD5 454547e1fb72dbe47f632874133af4f0
SHA1 0e15e4972c53f5571d2dc03fbb13768bfef9e073
SHA256 0352d1980d705a72238ceffbfdad4b7b293bf8d8dbb3af95c6b7b20dcac87e5b
SHA512 11f969ad0063d974fe87cc0ccf0ee622cd51ac57a03248c7778e14cb297cb8e9706b41d8535f3cda5c28788a2786d5d1a66d238a254eb9227bff1d84af43023c

C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

MD5 05c7df96d160ffad190862efa4f9961d
SHA1 f7e7fca8edcc93097212019d5930adbe90f6e9ce
SHA256 65fb43ace181c7ee8f7b59f0f06a19e67267e7f8e86c5c37e78316767717429f
SHA512 3d865aeb131f1ac83060270e371718a78fc6c5eeec312020c3cf443d4493f418a97ee9a30ee9527e04ba1456de113e7e60474d59ad7fc38b27a49b531e4a2126

C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\QS2MOPHD\2254111616-postmessagerelay[1].js

MD5 c264799bac4a96a4cd63eb09f0476a74
SHA1 d8a1077bf625dac9611a37bfb4e6c0cd07978f4c
SHA256 17dce4003e6a3d958bb8307bffa9c195694881f549943a7bdb2769b082f9326d
SHA512 6acd83dfd3db93f1f999d524b8828b64c8c0731567c3c0b8a77c6ddcf03d0e74ee20d23171e6ceac0c9f099dce03f8e5d68e78c374da2c055973f6ac2db4e4f9

C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\Y1738IZL\rpc_shindig_random[1].js

MD5 70116351ebc507731f11cfb8653f69bf
SHA1 667d48cd3c244c41a84302056e5b14140045acd3
SHA256 e3fff060584ca9c8eb12a6925252c8c6333622f4e6aeae8417449bf0ae355020
SHA512 a69875a52b635e7a561cfe2c7f4639bc122be434989dd39b37ab8dda08b49aa4bfd681c572628e9dc056c69808d0a03e2c6b4fef88db20a59ca73f097870aee9

Analysis: behavioral2

Detonation Overview

Submitted

2024-10-28 05:43

Reported

2024-10-28 05:45

Platform

win10v2004-20241007-en

Max time kernel

145s

Max time network

145s

Command Line

"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --start-maximized --single-argument C:\Users\Admin\AppData\Local\Temp\77f9b56a2e6f264e978088a13229b8be_JaffaCakes118.html

Signatures

Browser Information Discovery

discovery

Enumerates system info in registry

Description Indicator Process Target
Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe N/A
Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe N/A
Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe N/A

Suspicious use of FindShellTrayWindow

Description Indicator Process Target
N/A N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe N/A
N/A N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe N/A
N/A N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe N/A
N/A N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe N/A
N/A N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe N/A
N/A N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe N/A
N/A N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe N/A
N/A N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe N/A
N/A N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe N/A
N/A N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe N/A
N/A N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe N/A
N/A N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe N/A
N/A N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe N/A
N/A N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe N/A
N/A N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe N/A
N/A N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe N/A
N/A N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe N/A
N/A N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe N/A
N/A N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe N/A
N/A N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe N/A
N/A N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe N/A
N/A N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe N/A
N/A N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe N/A
N/A N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe N/A
N/A N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe N/A

Suspicious use of SendNotifyMessage

Description Indicator Process Target
N/A N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe N/A
N/A N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe N/A
N/A N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe N/A
N/A N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe N/A
N/A N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe N/A
N/A N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe N/A
N/A N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe N/A
N/A N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe N/A
N/A N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe N/A
N/A N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe N/A
N/A N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe N/A
N/A N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe N/A
N/A N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe N/A
N/A N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe N/A
N/A N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe N/A
N/A N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe N/A
N/A N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe N/A
N/A N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe N/A
N/A N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe N/A
N/A N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe N/A
N/A N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe N/A
N/A N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe N/A
N/A N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe N/A
N/A N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe N/A

Suspicious use of WriteProcessMemory

Description Indicator Process Target
PID 2760 wrote to memory of 752 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 2760 wrote to memory of 752 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 2760 wrote to memory of 1084 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 2760 wrote to memory of 1084 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 2760 wrote to memory of 1084 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 2760 wrote to memory of 1084 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 2760 wrote to memory of 1084 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 2760 wrote to memory of 1084 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 2760 wrote to memory of 1084 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 2760 wrote to memory of 1084 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 2760 wrote to memory of 1084 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 2760 wrote to memory of 1084 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 2760 wrote to memory of 1084 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 2760 wrote to memory of 1084 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 2760 wrote to memory of 1084 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 2760 wrote to memory of 1084 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 2760 wrote to memory of 1084 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 2760 wrote to memory of 1084 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 2760 wrote to memory of 1084 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 2760 wrote to memory of 1084 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 2760 wrote to memory of 1084 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 2760 wrote to memory of 1084 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 2760 wrote to memory of 1084 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 2760 wrote to memory of 1084 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 2760 wrote to memory of 1084 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 2760 wrote to memory of 1084 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 2760 wrote to memory of 1084 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 2760 wrote to memory of 1084 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 2760 wrote to memory of 1084 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 2760 wrote to memory of 1084 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 2760 wrote to memory of 1084 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 2760 wrote to memory of 1084 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 2760 wrote to memory of 1084 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 2760 wrote to memory of 1084 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 2760 wrote to memory of 1084 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 2760 wrote to memory of 1084 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 2760 wrote to memory of 1084 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 2760 wrote to memory of 1084 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 2760 wrote to memory of 1084 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 2760 wrote to memory of 1084 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 2760 wrote to memory of 1084 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 2760 wrote to memory of 1084 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 2760 wrote to memory of 1412 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 2760 wrote to memory of 1412 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 2760 wrote to memory of 4572 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 2760 wrote to memory of 4572 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 2760 wrote to memory of 4572 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 2760 wrote to memory of 4572 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 2760 wrote to memory of 4572 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 2760 wrote to memory of 4572 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 2760 wrote to memory of 4572 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 2760 wrote to memory of 4572 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 2760 wrote to memory of 4572 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 2760 wrote to memory of 4572 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 2760 wrote to memory of 4572 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 2760 wrote to memory of 4572 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 2760 wrote to memory of 4572 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 2760 wrote to memory of 4572 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 2760 wrote to memory of 4572 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 2760 wrote to memory of 4572 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 2760 wrote to memory of 4572 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 2760 wrote to memory of 4572 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 2760 wrote to memory of 4572 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 2760 wrote to memory of 4572 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe

Processes

C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe

"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --start-maximized --single-argument C:\Users\Admin\AppData\Local\Temp\77f9b56a2e6f264e978088a13229b8be_JaffaCakes118.html

C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe

"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ff8885846f8,0x7ff888584708,0x7ff888584718

C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe

"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2052,4292851110176091408,2694908186854632013,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2068 /prefetch:2

C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe

"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2052,4292851110176091408,2694908186854632013,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2296 /prefetch:3

C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe

"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2052,4292851110176091408,2694908186854632013,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2716 /prefetch:8

C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe

"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2052,4292851110176091408,2694908186854632013,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3268 /prefetch:1

C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe

"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2052,4292851110176091408,2694908186854632013,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3364 /prefetch:1

C:\Windows\System32\CompPkgSrv.exe

C:\Windows\System32\CompPkgSrv.exe -Embedding

C:\Windows\System32\CompPkgSrv.exe

C:\Windows\System32\CompPkgSrv.exe -Embedding

C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe

"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2052,4292851110176091408,2694908186854632013,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=2164 /prefetch:1

C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe

"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2052,4292851110176091408,2694908186854632013,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5236 /prefetch:1

C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe

"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2052,4292851110176091408,2694908186854632013,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5364 /prefetch:1

C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe

"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2052,4292851110176091408,2694908186854632013,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5720 /prefetch:1

C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe

"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2052,4292851110176091408,2694908186854632013,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1816 /prefetch:2

Network

Country Destination Domain Proto
US 8.8.8.8:53 232.168.11.51.in-addr.arpa udp
US 8.8.8.8:53 ajax.googleapis.com udp
US 8.8.8.8:53 dl.dropbox.com udp
US 8.8.8.8:53 apis.google.com udp
US 8.8.8.8:53 www.blogger.com udp
GB 142.250.187.226:80 pagead2.googlesyndication.com tcp
GB 162.125.64.15:80 dl.dropbox.com tcp
GB 162.125.64.15:80 dl.dropbox.com tcp
GB 142.250.200.46:80 apis.google.com tcp
GB 142.250.200.46:443 apis.google.com tcp
GB 142.250.200.42:443 ajax.googleapis.com tcp
GB 142.250.200.42:443 ajax.googleapis.com tcp
GB 142.250.178.9:445 www.blogger.com tcp
GB 162.125.64.15:443 dl.dropbox.com tcp
GB 162.125.64.15:443 dl.dropbox.com tcp
US 8.8.8.8:53 s7.addthis.com udp
GB 184.26.134.46:80 s7.addthis.com tcp
US 8.8.8.8:53 bloggercomment.com udp
US 8.8.8.8:53 www.linkwithin.com udp
SG 118.139.179.30:80 www.linkwithin.com tcp
BR 45.152.44.151:80 bloggercomment.com tcp
BR 45.152.44.151:80 bloggercomment.com tcp
US 8.8.8.8:53 71.159.190.20.in-addr.arpa udp
US 8.8.8.8:53 226.187.250.142.in-addr.arpa udp
US 8.8.8.8:53 15.64.125.162.in-addr.arpa udp
US 8.8.8.8:53 46.200.250.142.in-addr.arpa udp
US 8.8.8.8:53 42.200.250.142.in-addr.arpa udp
US 8.8.8.8:53 95.221.229.192.in-addr.arpa udp
US 8.8.8.8:53 translate.google.com udp
GB 142.250.178.14:80 translate.google.com tcp
GB 142.250.178.14:443 translate.google.com tcp
BR 45.152.44.151:443 bloggercomment.com tcp
US 8.8.8.8:53 www.opromo.com udp
US 52.71.57.184:80 www.opromo.com tcp
US 8.8.8.8:53 www.hugedomains.com udp
US 104.26.6.37:443 www.hugedomains.com tcp
US 8.8.8.8:53 fontpis.blogspot.com udp
US 8.8.8.8:53 a.nel.cloudflare.com udp
US 8.8.8.8:53 hipercontador.gedan.com udp
GB 172.217.16.225:443 fontpis.blogspot.com tcp
US 35.190.80.1:443 a.nel.cloudflare.com tcp
US 13.248.252.114:80 hipercontador.gedan.com tcp
US 8.8.8.8:53 img1.blogblog.com udp
US 8.8.8.8:53 46.134.26.184.in-addr.arpa udp
US 8.8.8.8:53 30.179.139.118.in-addr.arpa udp
US 8.8.8.8:53 151.44.152.45.in-addr.arpa udp
US 8.8.8.8:53 14.178.250.142.in-addr.arpa udp
US 8.8.8.8:53 184.57.71.52.in-addr.arpa udp
US 8.8.8.8:53 37.6.26.104.in-addr.arpa udp
GB 142.250.178.9:80 img1.blogblog.com tcp
US 8.8.8.8:53 lh3.ggpht.com udp
US 35.190.80.1:443 a.nel.cloudflare.com udp
US 8.8.8.8:53 img2.blogblog.com udp
GB 142.250.180.1:80 lh3.ggpht.com tcp
GB 142.250.178.9:80 img2.blogblog.com tcp
US 8.8.8.8:53 www.blogger.com udp
GB 142.250.178.9:80 www.blogger.com tcp
SG 118.139.179.30:80 www.linkwithin.com tcp
US 8.8.8.8:53 1.bp.blogspot.com udp
GB 142.250.180.1:80 1.bp.blogspot.com tcp
US 8.8.8.8:53 4.bp.blogspot.com udp
GB 142.250.180.1:80 4.bp.blogspot.com tcp
US 8.8.8.8:53 3.bp.blogspot.com udp
GB 142.250.180.1:80 3.bp.blogspot.com tcp
US 8.8.8.8:53 2.bp.blogspot.com udp
GB 142.250.180.1:80 2.bp.blogspot.com tcp
US 8.8.8.8:53 lh4.ggpht.com udp
US 8.8.8.8:53 lh5.googleusercontent.com udp
GB 142.250.180.1:80 lh4.ggpht.com tcp
GB 142.250.200.1:443 lh5.googleusercontent.com tcp
US 8.8.8.8:53 lh5.ggpht.com udp
GB 142.250.180.1:80 lh5.ggpht.com tcp
US 8.8.8.8:53 lh6.ggpht.com udp
GB 172.217.16.225:80 lh6.ggpht.com tcp
US 8.8.8.8:53 affiliates-cdn.mozilla.org udp
US 8.8.8.8:53 feeds.feedburner.com udp
GB 142.250.178.14:80 feeds.feedburner.com tcp
GB 142.250.178.14:80 feeds.feedburner.com tcp
US 8.8.8.8:53 225.16.217.172.in-addr.arpa udp
US 8.8.8.8:53 1.80.190.35.in-addr.arpa udp
US 8.8.8.8:53 114.252.248.13.in-addr.arpa udp
US 8.8.8.8:53 9.178.250.142.in-addr.arpa udp
US 8.8.8.8:53 1.180.250.142.in-addr.arpa udp
US 8.8.8.8:53 1.200.250.142.in-addr.arpa udp
N/A 224.0.0.251:5353 udp
US 8.8.8.8:53 104.219.191.52.in-addr.arpa udp
US 8.8.8.8:53 www.google.com udp
GB 172.217.169.36:445 www.google.com tcp
US 8.8.8.8:53 www.google.com udp
US 8.8.8.8:53 56.163.245.4.in-addr.arpa udp
US 8.8.8.8:53 241.42.69.40.in-addr.arpa udp
US 8.8.8.8:53 www.blogblog.com udp
GB 142.250.178.9:445 www.blogblog.com tcp
GB 142.250.200.46:443 apis.google.com udp
US 8.8.8.8:53 www.facebook.com udp
US 8.8.8.8:53 usuarionovo.com udp
GB 163.70.147.35:445 www.facebook.com tcp
GB 142.250.200.1:443 lh5.googleusercontent.com udp
US 104.21.71.220:80 usuarionovo.com tcp
GB 142.250.180.14:80 www.google-analytics.com tcp
US 8.8.8.8:53 selos.climatempo.com.br udp
US 8.8.8.8:53 googleads.g.doubleclick.net udp
GB 216.58.201.98:443 googleads.g.doubleclick.net tcp
US 35.185.88.154:80 selos.climatempo.com.br tcp
US 8.8.8.8:53 220.71.21.104.in-addr.arpa udp
US 8.8.8.8:53 14.180.250.142.in-addr.arpa udp
US 8.8.8.8:53 98.201.58.216.in-addr.arpa udp
GB 142.250.180.1:80 lh5.ggpht.com tcp
SG 118.139.179.30:80 www.linkwithin.com tcp
US 8.8.8.8:53 b.scorecardresearch.com udp
NL 18.239.83.126:80 b.scorecardresearch.com tcp
SG 118.139.179.30:80 www.linkwithin.com tcp
US 8.8.8.8:53 sb.scorecardresearch.com udp
NL 18.239.83.91:443 sb.scorecardresearch.com tcp
US 8.8.8.8:53 154.88.185.35.in-addr.arpa udp
US 8.8.8.8:53 126.83.239.18.in-addr.arpa udp
US 8.8.8.8:53 91.83.239.18.in-addr.arpa udp
US 8.8.8.8:53 www.blogblog.com udp
US 8.8.8.8:53 www.facebook.com udp
US 8.8.8.8:53 lh5.googleusercontent.com udp
GB 142.250.200.1:445 lh5.googleusercontent.com tcp
GB 142.250.200.1:139 lh5.googleusercontent.com tcp
US 8.8.8.8:53 205.47.74.20.in-addr.arpa udp
US 8.8.8.8:53 platform.twitter.com udp
GB 151.101.188.157:445 platform.twitter.com tcp
US 8.8.8.8:53 platform.twitter.com udp
GB 146.75.72.157:139 platform.twitter.com tcp
US 8.8.8.8:53 43.229.111.52.in-addr.arpa udp
US 8.8.8.8:53 88.156.103.20.in-addr.arpa udp
US 8.8.8.8:53 tse1.mm.bing.net udp
US 150.171.27.10:443 tse1.mm.bing.net tcp
US 150.171.27.10:443 tse1.mm.bing.net tcp
US 150.171.27.10:443 tse1.mm.bing.net tcp
US 150.171.27.10:443 tse1.mm.bing.net tcp
US 150.171.27.10:443 tse1.mm.bing.net tcp
GB 142.250.178.9:445 www.blogblog.com tcp
GB 172.217.169.36:445 www.google.com tcp

Files

C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad\settings.dat

MD5 e443ee4336fcf13c698b8ab5f3c173d0
SHA1 9bf70b16f03820cbe3158e1f1396b07b8ac9d75a
SHA256 79e277da2074f9467e0518f0f26ca2ba74914bee82553f935a0ccf64a0119e8b
SHA512 cbf6f6aa0ea69b47f51592296da2b7be1180e7b483c61b4d17ba9ee1a2d3345cbe0987b96f4e25de1438b553db358f330aad8a26e8522601f055c3d5a8313cdd

\??\pipe\LOCAL\crashpad_2760_SUFNXXEXBILWOHSH

MD5 d41d8cd98f00b204e9800998ecf8427e
SHA1 da39a3ee5e6b4b0d3255bfef95601890afd80709
SHA256 e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855
SHA512 cf83e1357eefb8bdf1542850d66d8007d620e4050b5715dc83f4a921d36ce9ce47d0d13c5d85f2b0ff8318d2877eec2f63b931bd47417a81a538327af927da3e

C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad\settings.dat

MD5 56a4f78e21616a6e19da57228569489b
SHA1 21bfabbfc294d5f2aa1da825c5590d760483bc76
SHA256 d036661e765ee8fd18978a2b5501e8df6b220e4bca531d9860407555294c96fb
SHA512 c2c3cd1152bb486028fe75ab3ce0d0bc9d64c4ca7eb8860ddd934b2f6e0140d2c913af4fa082b88e92a6a6d20fd483a1cb9813209f371a0f56374bc97d7f863b

C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Preferences

MD5 10d44096fe7b8a0c342e5b78a5a8d513
SHA1 c1218b0bbb6c48b6e6d0c330ceba3c23b2f7c0b9
SHA256 a5070361efa43d91cd07d49f2cd4269f096b38672036ac5d5b583f129f2e9c5e
SHA512 b0d72aa67bd9ecdfe2b948c6ae26d5fa8c473e2a7b270b3224699aa5b93d730e5c4c89c8c86d3fbb726817abc861efcb8e50f10a5155ad199d26baa81618ad60

C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Local State

MD5 1ebde473e916b95217881c0bd43d7cd8
SHA1 9655429794c5aa4c93c0e5a9e363130b41f94577
SHA256 a72c13b157f5a7f01a5f883cf4c777f0bafb7e43d0f89d59fa6774f34e688ba1
SHA512 86e17a82171004236ccf7508c18351e037c89f7426baa8e47219bc1b8fcb252ed4cc2743dc11afa82e1e24d484bca3989a5941c8ef26c5c4bfcd23ac0b7fdf9f

C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Preferences

MD5 175a983ebf790ef1f7699e99189a0c17
SHA1 ef4e895e8facbbd5719e56d8f10bd0375148610d
SHA256 f8f1da650327cde304af88f44cc476326c88c40e11b551e4c7b0e6030ad485e6
SHA512 f707a9d735fd72c8853489e6b1204cdbeeac1606235b964de2be4a716ff8f450cb47210e310e1f21c3f00fd376d329caefc6633dd01ca72230f6bb4c37a37fcb

C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\TransportSecurity~RFe586bc5.TMP

MD5 81bfef224b4eb4977ed3f8c97ff01b1d
SHA1 f6eaa6d2db34872e3d9c970bb736b625b467a6f1
SHA256 af6fdd44cccc0d85b3cdae0cc1eca9ea0645f39894389505b031c574eedb9942
SHA512 70ee95feea0c920d768a3a1bac1d7a68ed6351779c9fabb0b56f18ef4f656c7fb6002be5d37da5f698e5b5280460a8deb4f88d20a799b36390b81b705d0e3f88

C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\TransportSecurity

MD5 760843361aa097226a84e769a2c286fb
SHA1 93e5248c602c3dbf2520ae33a385e4622ec4cf2e
SHA256 72f8d36031243bfdb138acf7a84a964c998f190ed53e6e06dc647c1998c3aa80
SHA512 3729cd946acbb4da849d72ec00666c8e762d66ad0663fe65ae2103dc00ba4a2f1bd8413f84b8318206b03f9bb7789bb6788e9d91b0439789a4d62a7718df1b8e

C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index

MD5 23785d53e9d969026c02d00af4d2cfad
SHA1 3eac5d6fb03acf8303caa07475176067445060e8
SHA256 286f85b0339bdf7f31476453802848230cf757992b85fdcb4c051abfd99dd5a2
SHA512 2316503e82b7988ae91eedc966181c2cc3154dbf1c8c77386fa93f8780a0e806912e4c3fbb9890f2c5737cc2736be0bb3c37ba32ac63bffd1b3d3f77d2d5f7b7

C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Network Persistent State

MD5 c9dd35307c41be40536541a7077d5acb
SHA1 1d5c28baa87bc64549ff792e6fed5b0d7865e647
SHA256 f1ace1c7ac67f39a2b46f23270a7cba0c34eb7b8dcf889d463441e6f8134248b
SHA512 ab3cab2d132b52f33a4a2ec36d582ff34bff647aefc7c7f51bd46c629bc4f2b42f47fdc15086933974fb0baf15f9e18bc865b25e5ba0649cbff1360262216bb4

C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Network Persistent State

MD5 ae2cbfdb4588678878e937016d48d73c
SHA1 1638dbe1b83997082ab8200711d246e0773c295b
SHA256 244e161f7b21a689f611a21c814ffb5dd1ccf6295235f7feee0af9e15eee1404
SHA512 dad4213a7f79368c7a4a0fb5b539b05d14b296c86e2c5847313614280e09f4d077a74cc83e15572700db6c716f6f23987ffdd9c893ce1d94fc5514d79e378c08