Malware Analysis Report

2025-04-03 14:22

Sample ID 241211-3psdmaxkhl
Target e3b79636493c42f2667c3d48093ea162_JaffaCakes118
SHA256 b6418dd697a2f8f71243fe27cf684dee21aed24229ef5aa43d8b8c46b1b5ccd0
Tags
socgholish discovery downloader
score
10/10

Table of Contents

Analysis Overview

MITRE ATT&CK

Enterprise Matrix V15

Analysis: static1

Detonation Overview

Signatures

Analysis: behavioral1

Detonation Overview

Command Line

Signatures

Processes

Network

Files

Analysis: behavioral2

Detonation Overview

Command Line

Signatures

Processes

Network

Files

Analysis Overview

score
10/10

SHA256

b6418dd697a2f8f71243fe27cf684dee21aed24229ef5aa43d8b8c46b1b5ccd0

Threat Level: Known bad

The file e3b79636493c42f2667c3d48093ea162_JaffaCakes118 was found to be: Known bad.

Malicious Activity Summary

socgholish discovery downloader

SocGholish

Socgholish family

System Location Discovery: System Language Discovery

Browser Information Discovery

Modifies Internet Explorer settings

Suspicious use of FindShellTrayWindow

Suspicious use of WriteProcessMemory

Suspicious behavior: EnumeratesProcesses

Suspicious use of SendNotifyMessage

Suspicious use of SetWindowsHookEx

Enumerates system info in registry

Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary

MITRE ATT&CK

Analysis: static1

Detonation Overview

Reported

2024-12-11 23:41

Signatures

N/A

Analysis: behavioral1

Detonation Overview

Submitted

2024-12-11 23:41

Reported

2024-12-12 12:48

Platform

win7-20240903-en

Max time kernel

144s

Max time network

150s

Command Line

"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\e3b79636493c42f2667c3d48093ea162_JaffaCakes118.html

Signatures

SocGholish

downloader socgholish

Socgholish family

socgholish

System Location Discovery: System Language Discovery

discovery
Description Indicator Process Target
Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE N/A

Modifies Internet Explorer settings

adware spyware
Description Indicator Process Target
Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Main C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE N/A
Set value (data) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 C:\Program Files\Internet Explorer\iexplore.exe N/A
Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\IETld\LowMic C:\Program Files\Internet Explorer\iexplore.exe N/A
Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\InternetRegistry C:\Program Files\Internet Explorer\iexplore.exe N/A
Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain C:\Program Files\Internet Explorer\iexplore.exe N/A
Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser C:\Program Files\Internet Explorer\iexplore.exe N/A
Set value (int) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" C:\Program Files\Internet Explorer\iexplore.exe N/A
Set value (str) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" C:\Program Files\Internet Explorer\iexplore.exe N/A
Set value (int) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" C:\Program Files\Internet Explorer\iexplore.exe N/A
Set value (int) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "440169406" C:\Program Files\Internet Explorer\iexplore.exe N/A
Set value (int) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" C:\Program Files\Internet Explorer\iexplore.exe N/A
Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic C:\Program Files\Internet Explorer\iexplore.exe N/A
Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\IntelliForms C:\Program Files\Internet Explorer\iexplore.exe N/A
Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage C:\Program Files\Internet Explorer\iexplore.exe N/A
Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\PageSetup C:\Program Files\Internet Explorer\iexplore.exe N/A
Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Toolbar C:\Program Files\Internet Explorer\iexplore.exe N/A
Set value (str) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" C:\Program Files\Internet Explorer\iexplore.exe N/A
Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\GPU C:\Program Files\Internet Explorer\iexplore.exe N/A
Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\LowRegistry C:\Program Files\Internet Explorer\iexplore.exe N/A
Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch C:\Program Files\Internet Explorer\iexplore.exe N/A
Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\DomainSuggestion C:\Program Files\Internet Explorer\iexplore.exe N/A
Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Main C:\Program Files\Internet Explorer\iexplore.exe N/A
Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Zoom C:\Program Files\Internet Explorer\iexplore.exe N/A
Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive C:\Program Files\Internet Explorer\iexplore.exe N/A
Set value (int) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{FD117191-B886-11EF-B25F-FE6EB537C9A6} = "0" C:\Program Files\Internet Explorer\iexplore.exe N/A
Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery C:\Program Files\Internet Explorer\iexplore.exe N/A

Suspicious use of FindShellTrayWindow

Description Indicator Process Target
N/A N/A C:\Program Files\Internet Explorer\iexplore.exe N/A

Processes

C:\Program Files\Internet Explorer\iexplore.exe

"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\e3b79636493c42f2667c3d48093ea162_JaffaCakes118.html

C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE

"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2348 CREDAT:275457 /prefetch:2

Network

Country Destination Domain Proto
US 8.8.8.8:53 4.bp.blogspot.com udp
US 8.8.8.8:53 automotive.arae.us udp
US 8.8.8.8:53 www.jennyschlief.com udp
US 8.8.8.8:53 www1.vietnamcar.com udp
US 8.8.8.8:53 2.bp.blogspot.com udp
US 8.8.8.8:53 3.bp.blogspot.com udp
US 8.8.8.8:53 www.situsotomotif.com udp
US 8.8.8.8:53 mactrainingguide.com udp
US 8.8.8.8:53 www.linkwithin.com udp
US 8.8.8.8:53 www.designertechniques.com udp
US 8.8.8.8:53 fc03.deviantart.net udp
US 8.8.8.8:53 www.wallcoo.net udp
US 8.8.8.8:53 joshua.maruskadesign.com udp
US 8.8.8.8:53 www.carbodydesign.com udp
US 8.8.8.8:53 geoloc2.geovisite.com udp
US 8.8.8.8:53 www.mynewcounter.com udp
US 8.8.8.8:53 i155.photobucket.com udp
US 8.8.8.8:53 www.clayaim.com udp
US 8.8.8.8:53 img1.top.org udp
US 8.8.8.8:53 buttons.googlesyndication.com udp
US 8.8.8.8:53 www.podcastready.com udp
US 8.8.8.8:53 www.newsgator.com udp
US 8.8.8.8:53 botones.blogalaxia.com udp
US 8.8.8.8:53 www.blogrankers.com udp
US 8.8.8.8:53 stats.topofblogs.com udp
US 8.8.8.8:53 www.blogtopsites.com udp
US 8.8.8.8:53 www.bloggernity.com udp
US 8.8.8.8:53 www.bloggernow.com udp
US 8.8.8.8:53 us.i1.yimg.com udp
US 8.8.8.8:53 www.topblogarea.com udp
US 8.8.8.8:53 www.bloggapedia.com udp
US 8.8.8.8:53 www.blogflare.com udp
US 8.8.8.8:53 track4.mybloglog.com udp
US 8.8.8.8:53 www.scrubtheweb.com udp
US 8.8.8.8:53 www.blogarama.com udp
US 8.8.8.8:53 developers.diggstatic.com udp
US 8.8.8.8:53 xslt.alexa.com udp
US 8.8.8.8:53 img.blog.com.pt udp
US 8.8.8.8:53 blogs.blogesfera.com udp
US 8.8.8.8:53 www.zimbio.com udp
FR 216.58.215.33:80 3.bp.blogspot.com tcp
FR 216.58.215.33:80 3.bp.blogspot.com tcp
FR 216.58.215.33:80 3.bp.blogspot.com tcp
FR 216.58.215.33:80 3.bp.blogspot.com tcp
FR 216.58.214.162:80 pagead2.googlesyndication.com tcp
FR 216.58.214.162:80 pagead2.googlesyndication.com tcp
SG 118.139.179.30:80 www.linkwithin.com tcp
SG 118.139.179.30:80 www.linkwithin.com tcp
FR 216.58.215.33:80 3.bp.blogspot.com tcp
FR 216.58.215.33:80 3.bp.blogspot.com tcp
US 198.185.159.144:80 www.jennyschlief.com tcp
US 198.185.159.144:80 www.jennyschlief.com tcp
US 13.248.169.48:80 www1.vietnamcar.com tcp
US 13.248.169.48:80 www1.vietnamcar.com tcp
US 35.208.181.67:80 www.carbodydesign.com tcp
US 35.208.181.67:80 www.carbodydesign.com tcp
US 44.239.225.146:80 fc03.deviantart.net tcp
US 44.239.225.146:80 fc03.deviantart.net tcp
NL 18.239.18.21:80 i155.photobucket.com tcp
NL 18.239.18.21:80 i155.photobucket.com tcp
NL 212.8.249.233:80 www.bloggernow.com tcp
NL 212.8.249.233:80 www.bloggernow.com tcp
FR 54.36.176.112:80 geoloc2.geovisite.com tcp
FR 54.36.176.112:80 geoloc2.geovisite.com tcp
GB 87.248.114.12:80 us.i1.yimg.com tcp
GB 87.248.114.12:80 us.i1.yimg.com tcp
US 104.21.95.14:80 www.situsotomotif.com tcp
US 104.21.95.14:80 www.situsotomotif.com tcp
US 172.66.40.190:80 www.blogarama.com tcp
US 172.66.40.190:80 www.blogarama.com tcp
US 65.111.168.243:80 botones.blogalaxia.com tcp
US 65.111.168.243:80 botones.blogalaxia.com tcp
US 75.2.37.224:80 www.mynewcounter.com tcp
US 75.2.37.224:80 www.mynewcounter.com tcp
FR 172.217.20.164:80 buttons.googlesyndication.com tcp
FR 172.217.20.164:80 buttons.googlesyndication.com tcp
US 172.67.155.21:80 www.bloggapedia.com tcp
US 172.67.155.21:80 www.bloggapedia.com tcp
US 208.98.35.225:80 www.scrubtheweb.com tcp
FI 95.216.161.60:80 stats.topofblogs.com tcp
US 208.98.35.225:80 www.scrubtheweb.com tcp
FI 95.216.161.60:80 stats.topofblogs.com tcp
US 3.33.130.190:80 www.newsgator.com tcp
US 3.33.130.190:80 www.newsgator.com tcp
NL 212.8.249.233:80 www.bloggernow.com tcp
NL 212.8.249.233:80 www.bloggernow.com tcp
US 52.4.126.156:80 www.blogtopsites.com tcp
US 52.4.126.156:80 www.blogtopsites.com tcp
DE 185.53.177.51:80 img.blog.com.pt tcp
DE 185.53.177.51:80 img.blog.com.pt tcp
US 8.8.8.8:53 developers.diggstatic.com udp
FR 141.95.187.173:80 www.wallcoo.net tcp
FR 141.95.187.173:80 www.wallcoo.net tcp
US 143.95.250.139:80 joshua.maruskadesign.com tcp
US 143.95.250.139:80 joshua.maruskadesign.com tcp
NL 18.239.18.21:443 i155.photobucket.com tcp
US 104.21.95.14:443 www.situsotomotif.com tcp
US 209.90.91.147:80 www.blogrankers.com tcp
US 209.90.91.147:80 www.blogrankers.com tcp
US 172.66.40.190:443 www.blogarama.com tcp
US 8.8.8.8:53 bloggapedia.com udp
HK 47.75.130.169:80 img1.top.org tcp
HK 47.75.130.169:80 img1.top.org tcp
US 104.21.40.170:443 bloggapedia.com tcp
US 104.21.40.170:443 bloggapedia.com tcp
US 8.8.8.8:53 c.pki.goog udp
US 8.8.8.8:53 c.pki.goog udp
US 8.8.8.8:53 c.pki.goog udp
US 8.8.8.8:53 orig12.deviantart.net udp
US 8.8.8.8:53 c.pki.goog udp
US 208.98.35.225:443 www.scrubtheweb.com tcp
US 52.27.203.168:80 orig12.deviantart.net tcp
US 52.27.203.168:80 orig12.deviantart.net tcp
JP 202.208.220.131:80 www.podcastready.com tcp
JP 202.208.220.131:80 www.podcastready.com tcp
US 8.8.8.8:53 www.designertechniques.com udp
FR 54.36.176.112:8080 geoloc2.geovisite.com tcp
US 8.8.8.8:53 o.pki.goog udp
US 208.98.35.225:443 www.scrubtheweb.com tcp
FR 142.250.179.67:80 o.pki.goog tcp
US 8.8.8.8:53 images-wixmp-ed30a86b8c4ca887773594c2.wixmp.com udp
NL 18.239.18.75:443 images-wixmp-ed30a86b8c4ca887773594c2.wixmp.com tcp
NL 18.239.18.75:443 images-wixmp-ed30a86b8c4ca887773594c2.wixmp.com tcp
FR 54.36.176.112:8080 geoloc2.geovisite.com tcp
FR 54.36.176.112:8080 geoloc2.geovisite.com tcp
FR 54.36.176.112:8080 geoloc2.geovisite.com tcp
NL 18.239.18.75:443 images-wixmp-ed30a86b8c4ca887773594c2.wixmp.com tcp
NL 18.239.18.75:443 images-wixmp-ed30a86b8c4ca887773594c2.wixmp.com tcp
NL 18.239.18.75:443 images-wixmp-ed30a86b8c4ca887773594c2.wixmp.com tcp
NL 18.239.18.75:443 images-wixmp-ed30a86b8c4ca887773594c2.wixmp.com tcp
US 208.98.35.225:443 www.scrubtheweb.com tcp
NL 18.239.18.75:443 images-wixmp-ed30a86b8c4ca887773594c2.wixmp.com tcp
NL 18.239.18.75:443 images-wixmp-ed30a86b8c4ca887773594c2.wixmp.com tcp
US 208.98.35.225:443 www.scrubtheweb.com tcp
US 8.8.8.8:53 www.zimbio.com udp
FR 141.95.187.173:80 www.wallcoo.net tcp
HK 47.75.130.169:80 img1.top.org tcp
US 209.90.91.147:80 www.blogrankers.com tcp
HK 47.75.130.169:80 img1.top.org tcp
JP 202.208.220.131:80 www.podcastready.com tcp
US 8.8.8.8:53 crl.microsoft.com udp
GB 88.221.134.83:80 crl.microsoft.com tcp
US 8.8.8.8:53 www.microsoft.com udp
US 23.192.22.93:80 www.microsoft.com tcp
US 204.79.197.200:443 ieonline.microsoft.com tcp
US 204.79.197.200:443 ieonline.microsoft.com tcp
US 8.8.8.8:53 www.microsoft.com udp
US 8.8.8.8:53 www.microsoft.com udp
US 204.79.197.200:443 ieonline.microsoft.com tcp

Files

C:\Users\Admin\AppData\Local\Temp\CabBF0D.tmp

MD5 49aebf8cbd62d92ac215b2923fb1b9f5
SHA1 1723be06719828dda65ad804298d0431f6aff976
SHA256 b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512 bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b

C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\M4TQDAHL\f[1].txt

MD5 0f3555fe9f5d97f993ceacf2e895bd09
SHA1 ad884fbc04093bbcbbb1d9f18c57adc321ddd9a6
SHA256 ac00d51854f0f94fed7ff8b5af99b5419e6c20e2ca589b14678fe79369b37cb3
SHA512 31b380ced9891ac1682833d96d11d8850b9900b5d720254b98eefc5e82322d818597db48f563302ff8802fc20acb1605c8c6948e42280d772ae18a0507d38b45

C:\Users\Admin\AppData\Local\Temp\TarBF5E.tmp

MD5 4ea6026cf93ec6338144661bf1202cd1
SHA1 a1dec9044f750ad887935a01430bf49322fbdcb7
SHA256 8efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA512 6c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b

C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

MD5 b6042e2b7651221f2dc702dcf3f6cd94
SHA1 19fd09a2e94fbb36d93e20f14c74796ac202e267
SHA256 467a5ec2ca291f0a4743bba61603d77074e302b344dbf357bc7acbd3ca72c543
SHA512 f568b5cbcdd547835b9bbfb6f652d2b8ecc4c9f93f94014aa6275cc842520505923e85d78d46e458c597427dde5cdc1bedc6b1a2b325865cf5fbe3aa8ed704ce

C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

MD5 0604c5ad7e16a2b4eb69a1d053857e62
SHA1 8ff51c38ddc4e80beeb353882138c195874bae3d
SHA256 e85d48a9a1485945b72f944206a2c1e5a207205e885d7e61dda81d78d7282691
SHA512 a09bbff98393f20a8b10278cdffe5e4e5f9b3519ce253e7002f162d9bd54c48301155377431f5a4c1be6326de928974d9a4eae0fd7a56a9d33220b5d72a54091

C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\F0ACCF77CDCBFF39F6191887F6D2D357

MD5 a266bb7dcc38a562631361bbf61dd11b
SHA1 3b1efd3a66ea28b16697394703a72ca340a05bd5
SHA256 df545bf919a2439c36983b54cdfc903dfa4f37d3996d8d84b4c31eec6f3c163e
SHA512 0da8ef4f8f6ed3d16d2bc8eb816b9e6e1345dfe2d91160196c47e6149a1d6aedaafadcefd66acdea7f72dcf0832770192ceac15b0c559c4ccc2c0e5581d5aefc

C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\3C428B1A3E5F57D887EC4B864FAC5DCC

MD5 e8fc38558bd79db3b241151e89130095
SHA1 0d3f17f50e10fa98d8ece5c8ef218c83184b32c7
SHA256 aece902f6bc937a3f156c2104ae63b2dbff7a7d04075d2c447dcc433fae35b2f
SHA512 c3fcae8a890835f611e403ca430f1f2dcabe47ecf7ffb020ff8f82755936f0178e0a6152aee27bfb9d588c3d1d3f7980073840daf1a2a17da9535e125144a38e

C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\3C428B1A3E5F57D887EC4B864FAC5DCC

MD5 e4a68ac854ac5242460afd72481b2a44
SHA1 df3c24f9bfd666761b268073fe06d1cc8d4f82a4
SHA256 cb3ccbb76031e5e0138f8dd39a23f9de47ffc35e43c1144cea27d46a5ab1cb5f
SHA512 5622207e1ba285f172756f6019af92ac808ed63286e24dfecc1e79873fb5d140f1ceb7133f2476e89a5f75f711f9813a9fbb8fd5287f64adfdcc53b864f9bdc5

C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\F0ACCF77CDCBFF39F6191887F6D2D357

MD5 415ad4bd6adb98a39e73c63d8004df7f
SHA1 d713d531f99918470ff66428fb663155a3d9344f
SHA256 ad7ad12862e7c427a50cf0462fd2ea146cf51cd7927bc6b70fd6d60c8f1667ed
SHA512 4c042d2ec691e2ba48b06db69ee5f8ad35aa88bd96fc6d685742cada396a10d3aa84f18c68ae76da9f462c670ad9a9731ba79b7ed6af45fe1b926de014d40f76

C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

MD5 798eec8a09e92a65b8eefeec7087aaa1
SHA1 f030a8e22d4695959ff5736b1fcf7052c06a4d26
SHA256 761337c8d18c1db17a91d71242ffe2269e8b5cd588b393ed62c38fdaaecfb3f6
SHA512 315501445c960c5a2f501265ff807e9ea7655f052ef3619f84776d5582dc829af87d130bd2c628a86898e6da4d2cc57ec932ef67b8dfbf09fe3cf76a33c19321

C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

MD5 218bf7e81c3f8cd8503f58825442e9d5
SHA1 56d0ebc01b36c7afa3c4a09c0c51a3952fb20a34
SHA256 4e93e97d18ae1f0597da236c88bf22a8ff6d52a0f5e96279f0014522ab4cccb6
SHA512 dee897346d777b4edb49ae93b9b919d1817adf3863569b2bc892a9803de8cf2dcd437efbbb0e79a34a7cfb27818bb37d8ec00d8fe52116eabbc52a24857aa9b3

C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

MD5 aa8e80a9e2246b54c88bab216ed8abaf
SHA1 da8545762a2fca27d0d4c20cb0fe6dec340a8589
SHA256 b8e95915c78739d7a6b73092572aec97281aa77f7e8d3f0add0eb22344b1d568
SHA512 38a1dc1497274a9b82b030851b5269610022abd2002303131546608998e4c897954d079ff7395bc410566ddb278a4616a9f3e78c88c9d636938cb05f9c67b465

C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

MD5 3db04aacc2565e62a0d27194399c214d
SHA1 dfa488355dec2945be1413cc1e5fe16d16e8a7ed
SHA256 7b6c1357a9108844d045e1f2700c427d0374ac7c14c2e534c5995ba60e8bc772
SHA512 a882ef4f4e6def69ec69344c5d78a9a0c9b2d4073514cd9f17dc2c32ca2abf350eb737ecfe4136a23a3adde80d146b2707a53d9687a0f082cbf61ef28aa4ab42

C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

MD5 44f1a813b4bc5accb7609a66f9b8379f
SHA1 026f4082d9dbdb8f393d9faa486fcc0515806a56
SHA256 72d8298500b97187f4e648276ddf1573aa95277814d4a7d383f6fea34500252a
SHA512 3511548f0692b682407942359fdb10208c9d4fea57f0f745eb7fed5c1dddbb34ea9abfb78ac5de25c5e87d82e34fe63db516df624ba7744408a2b6a167c912a6

C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

MD5 1cb400bc250cb291a0cbe4e151a666e4
SHA1 59f9a431a92d0ffdee9c398985dd225f107b4ebc
SHA256 be865a3146f103096a471968bb0c61afa8d96b0ccb0cfb712507bccd018c4a8c
SHA512 02a9e5f7c595d9767c579257e42d35cde7c43dc13d5477ab7a2d85bd940fabf7603311608835a8508bcf853bfd6f969725bc455d27b62a66cf4252992ae5ded3

C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

MD5 a69e1dab4adb184a700e2446822a508c
SHA1 5ae06b3ad346b5a5fd228a820c0f499c56665a98
SHA256 3fcee3b821e2fb8a1783e9edbcb2aa32b507aea3c6d7777247ec483292dd7ed0
SHA512 b78b790da11ccc0246accf8eb49f971877e784f6fba632a6edb7226a7afc186f3dbd6af35c9cccd79235aed7b880fda5c16ebb6c18d90db10a49b89c50ddf489

C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

MD5 7c1850d5e6ad22f4152c964b9a64f4ff
SHA1 cfed71a44273cfd3199dc47456fc0a903e3ffd8c
SHA256 6ba2581dd4f9feef22d100d78e99cf12f8c04083e7a7b2c5b455a9b2e21b5fc2
SHA512 8d70461c218c08862e0da399aaa41f09847110dca8a40cf9cc57f7f6d79a0a96db03cba4d8f86cc4e0f8e6241bd5bebf05b169fdff9db2fba9e473db3e9e2824

C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

MD5 3b3389fc2068dac9f80edf2644c06ce5
SHA1 6b0280dbf3b20e6717107703698399c34f42e56e
SHA256 b33c19b245ae5f5a70061d4248d852cf08eff829735c4b1db97eac2e475b8a6c
SHA512 ab11eca5900308dc8b9d890a80805a1da764eb5075284f55d93a3d9b8384cae81a2a83468911f143adc1e70f1dd563f88ea16bc1b1a1ed8e33d57afea608b4c0

Analysis: behavioral2

Detonation Overview

Submitted

2024-12-11 23:41

Reported

2024-12-12 12:48

Platform

win10v2004-20241007-en

Max time kernel

145s

Max time network

146s

Command Line

"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --start-maximized --single-argument C:\Users\Admin\AppData\Local\Temp\e3b79636493c42f2667c3d48093ea162_JaffaCakes118.html

Signatures

Browser Information Discovery

discovery

Enumerates system info in registry

Description Indicator Process Target
Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe N/A
Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe N/A
Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe N/A

Suspicious use of FindShellTrayWindow

Description Indicator Process Target
N/A N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe N/A
N/A N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe N/A
N/A N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe N/A
N/A N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe N/A
N/A N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe N/A
N/A N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe N/A
N/A N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe N/A
N/A N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe N/A
N/A N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe N/A
N/A N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe N/A
N/A N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe N/A
N/A N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe N/A
N/A N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe N/A
N/A N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe N/A
N/A N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe N/A
N/A N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe N/A
N/A N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe N/A
N/A N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe N/A
N/A N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe N/A
N/A N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe N/A
N/A N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe N/A
N/A N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe N/A
N/A N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe N/A
N/A N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe N/A
N/A N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe N/A

Suspicious use of SendNotifyMessage

Description Indicator Process Target
N/A N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe N/A
N/A N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe N/A
N/A N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe N/A
N/A N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe N/A
N/A N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe N/A
N/A N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe N/A
N/A N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe N/A
N/A N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe N/A
N/A N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe N/A
N/A N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe N/A
N/A N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe N/A
N/A N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe N/A
N/A N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe N/A
N/A N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe N/A
N/A N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe N/A
N/A N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe N/A
N/A N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe N/A
N/A N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe N/A
N/A N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe N/A
N/A N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe N/A
N/A N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe N/A
N/A N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe N/A
N/A N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe N/A
N/A N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe N/A

Suspicious use of WriteProcessMemory

Description Indicator Process Target
PID 640 wrote to memory of 5080 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 640 wrote to memory of 5080 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 640 wrote to memory of 3148 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 640 wrote to memory of 3148 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 640 wrote to memory of 3148 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 640 wrote to memory of 3148 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 640 wrote to memory of 3148 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 640 wrote to memory of 3148 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 640 wrote to memory of 3148 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 640 wrote to memory of 3148 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 640 wrote to memory of 3148 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 640 wrote to memory of 3148 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 640 wrote to memory of 3148 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 640 wrote to memory of 3148 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 640 wrote to memory of 3148 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 640 wrote to memory of 3148 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 640 wrote to memory of 3148 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 640 wrote to memory of 3148 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 640 wrote to memory of 3148 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 640 wrote to memory of 3148 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 640 wrote to memory of 3148 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 640 wrote to memory of 3148 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 640 wrote to memory of 3148 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 640 wrote to memory of 3148 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 640 wrote to memory of 3148 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 640 wrote to memory of 3148 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 640 wrote to memory of 3148 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 640 wrote to memory of 3148 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 640 wrote to memory of 3148 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 640 wrote to memory of 3148 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 640 wrote to memory of 3148 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 640 wrote to memory of 3148 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 640 wrote to memory of 3148 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 640 wrote to memory of 3148 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 640 wrote to memory of 3148 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 640 wrote to memory of 3148 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 640 wrote to memory of 3148 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 640 wrote to memory of 3148 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 640 wrote to memory of 3148 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 640 wrote to memory of 3148 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 640 wrote to memory of 3148 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 640 wrote to memory of 3148 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 640 wrote to memory of 4812 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 640 wrote to memory of 4812 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 640 wrote to memory of 4876 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 640 wrote to memory of 4876 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 640 wrote to memory of 4876 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 640 wrote to memory of 4876 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 640 wrote to memory of 4876 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 640 wrote to memory of 4876 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 640 wrote to memory of 4876 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 640 wrote to memory of 4876 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 640 wrote to memory of 4876 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 640 wrote to memory of 4876 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 640 wrote to memory of 4876 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 640 wrote to memory of 4876 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 640 wrote to memory of 4876 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 640 wrote to memory of 4876 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 640 wrote to memory of 4876 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 640 wrote to memory of 4876 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 640 wrote to memory of 4876 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 640 wrote to memory of 4876 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 640 wrote to memory of 4876 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 640 wrote to memory of 4876 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe

Processes

C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe

"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --start-maximized --single-argument C:\Users\Admin\AppData\Local\Temp\e3b79636493c42f2667c3d48093ea162_JaffaCakes118.html

C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe

"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7fff003946f8,0x7fff00394708,0x7fff00394718

C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe

"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2108,9108689889189972823,7413029156405610997,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2124 /prefetch:2

C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe

"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2108,9108689889189972823,7413029156405610997,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2172 /prefetch:3

C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe

"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2108,9108689889189972823,7413029156405610997,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2872 /prefetch:8

C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe

"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2108,9108689889189972823,7413029156405610997,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3064 /prefetch:1

C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe

"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2108,9108689889189972823,7413029156405610997,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3280 /prefetch:1

C:\Windows\System32\CompPkgSrv.exe

C:\Windows\System32\CompPkgSrv.exe -Embedding

C:\Windows\System32\CompPkgSrv.exe

C:\Windows\System32\CompPkgSrv.exe -Embedding

C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe

"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2108,9108689889189972823,7413029156405610997,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5080 /prefetch:1

C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe

"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2108,9108689889189972823,7413029156405610997,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5212 /prefetch:1

C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe

"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2108,9108689889189972823,7413029156405610997,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=5552 /prefetch:2

Network

Country Destination Domain Proto
US 8.8.8.8:53 automotive.arae.us udp
US 8.8.8.8:53 154.239.44.20.in-addr.arpa udp
US 8.8.8.8:53 www.linkwithin.com udp
US 8.8.8.8:53 geoloc2.geovisite.com udp
US 8.8.8.8:53 www.clayaim.com udp
FR 142.250.178.130:80 pagead2.googlesyndication.com tcp
US 8.8.8.8:53 4.bp.blogspot.com udp
US 8.8.8.8:53 track4.mybloglog.com udp
US 8.8.8.8:53 2.bp.blogspot.com udp
US 8.8.8.8:53 www.jennyschlief.com udp
US 8.8.8.8:53 xslt.alexa.com udp
US 8.8.8.8:53 www.situsotomotif.com udp
US 8.8.8.8:53 3.bp.blogspot.com udp
US 8.8.8.8:53 mactrainingguide.com udp
US 8.8.8.8:53 www1.vietnamcar.com udp
SG 118.139.179.30:80 www.linkwithin.com tcp
SG 118.139.179.30:80 www.linkwithin.com tcp
US 8.8.8.8:53 www.designertechniques.com udp
US 8.8.8.8:53 fc03.deviantart.net udp
FR 216.58.215.33:80 3.bp.blogspot.com tcp
FR 216.58.215.33:80 3.bp.blogspot.com tcp
FR 216.58.215.33:80 3.bp.blogspot.com tcp
FR 216.58.215.33:80 3.bp.blogspot.com tcp
FR 54.36.176.112:80 geoloc2.geovisite.com tcp
US 198.185.159.145:80 www.jennyschlief.com tcp
US 172.67.169.38:80 www.situsotomotif.com tcp
US 8.8.8.8:53 www.wallcoo.net udp
US 13.248.169.48:80 www1.vietnamcar.com tcp
US 8.8.8.8:53 joshua.maruskadesign.com udp
US 35.167.113.241:80 fc03.deviantart.net tcp
US 172.67.169.38:443 www.situsotomotif.com tcp
US 8.8.8.8:53 i155.photobucket.com udp
US 8.8.8.8:53 www.blogtopsites.com udp
US 8.8.8.8:53 www.carbodydesign.com udp
US 8.8.8.8:53 www.mynewcounter.com udp
US 8.8.8.8:53 img1.top.org udp
US 143.95.250.139:80 joshua.maruskadesign.com tcp
SG 118.139.179.30:80 www.linkwithin.com tcp
US 35.208.181.67:80 www.carbodydesign.com tcp
NL 18.239.18.64:80 i155.photobucket.com tcp
US 52.4.126.156:80 www.blogtopsites.com tcp
US 75.2.37.224:80 www.mynewcounter.com tcp
US 35.167.113.241:80 fc03.deviantart.net tcp
US 143.95.250.139:80 joshua.maruskadesign.com tcp
NL 18.239.18.64:443 i155.photobucket.com tcp
FR 141.95.187.173:80 www.wallcoo.net tcp
HK 47.75.130.169:80 img1.top.org tcp
HK 47.75.130.169:80 img1.top.org tcp
US 8.8.8.8:53 us.i1.yimg.com udp
US 8.8.8.8:53 orig12.deviantart.net udp
US 8.8.8.8:53 buttons.googlesyndication.com udp
FR 141.95.187.173:80 www.wallcoo.net tcp
US 52.27.203.168:80 orig12.deviantart.net tcp
GB 87.248.114.12:80 us.i1.yimg.com tcp
FR 172.217.20.164:80 buttons.googlesyndication.com tcp
US 8.8.8.8:53 www.podcastready.com udp
US 8.8.8.8:53 www.newsgator.com udp
US 8.8.8.8:53 botones.blogalaxia.com udp
FR 54.36.176.112:80 geoloc2.geovisite.com tcp
US 8.8.8.8:53 gelgit.tk udp
US 8.8.8.8:53 www.blogrankers.com udp
US 15.197.148.33:80 www.newsgator.com tcp
JP 202.208.220.131:80 www.podcastready.com tcp
US 8.8.8.8:53 stats.topofblogs.com udp
US 8.8.8.8:53 76.32.126.40.in-addr.arpa udp
US 8.8.8.8:53 83.210.23.2.in-addr.arpa udp
US 8.8.8.8:53 130.178.250.142.in-addr.arpa udp
US 8.8.8.8:53 38.169.67.172.in-addr.arpa udp
US 8.8.8.8:53 33.215.58.216.in-addr.arpa udp
US 8.8.8.8:53 112.176.36.54.in-addr.arpa udp
US 8.8.8.8:53 145.159.185.198.in-addr.arpa udp
US 8.8.8.8:53 64.18.239.18.in-addr.arpa udp
US 8.8.8.8:53 241.113.167.35.in-addr.arpa udp
US 8.8.8.8:53 224.37.2.75.in-addr.arpa udp
US 8.8.8.8:53 30.179.139.118.in-addr.arpa udp
US 8.8.8.8:53 156.126.4.52.in-addr.arpa udp
US 8.8.8.8:53 67.181.208.35.in-addr.arpa udp
US 8.8.8.8:53 139.250.95.143.in-addr.arpa udp
US 8.8.8.8:53 12.114.248.87.in-addr.arpa udp
US 8.8.8.8:53 164.20.217.172.in-addr.arpa udp
US 8.8.8.8:53 8.39.65.18.in-addr.arpa udp
DE 159.69.83.207:80 stats.topofblogs.com tcp
US 8.8.8.8:53 95.221.229.192.in-addr.arpa udp
US 65.111.168.243:80 botones.blogalaxia.com tcp
JP 202.208.220.131:80 www.podcastready.com tcp
US 65.111.168.243:80 botones.blogalaxia.com tcp
US 8.8.8.8:53 48.169.248.13.in-addr.arpa udp
US 209.90.91.147:80 www.blogrankers.com tcp
US 8.8.8.8:53 a.nel.cloudflare.com udp
FR 54.36.176.112:8080 geoloc2.geovisite.com tcp
FR 54.36.176.112:8080 geoloc2.geovisite.com tcp
FR 54.36.176.112:8080 geoloc2.geovisite.com tcp
FR 54.36.176.112:8080 geoloc2.geovisite.com tcp
US 8.8.8.8:53 www.bloggernity.com udp
US 8.8.8.8:53 images-wixmp-ed30a86b8c4ca887773594c2.wixmp.com udp
US 8.8.8.8:53 www.bloggernow.com udp
US 35.190.80.1:443 a.nel.cloudflare.com tcp
NL 18.239.18.126:443 images-wixmp-ed30a86b8c4ca887773594c2.wixmp.com tcp
NL 212.8.249.233:80 www.bloggernow.com tcp
NL 212.8.249.233:80 www.bloggernow.com tcp
US 8.8.8.8:53 www.topblogarea.com udp
US 209.90.91.147:80 www.blogrankers.com tcp
US 8.8.8.8:53 www.blogflare.com udp
US 8.8.8.8:53 www.bloggapedia.com udp
US 8.8.8.8:53 www.scrubtheweb.com udp
US 35.190.80.1:443 a.nel.cloudflare.com udp
US 104.21.40.170:80 www.bloggapedia.com tcp
US 8.8.8.8:53 www.blogarama.com udp
US 208.98.35.225:80 www.scrubtheweb.com tcp
US 172.66.40.190:80 www.blogarama.com tcp
US 8.8.8.8:53 bloggapedia.com udp
US 8.8.8.8:53 developers.diggstatic.com udp
US 172.66.40.190:443 www.blogarama.com tcp
US 172.67.155.21:443 bloggapedia.com tcp
US 8.8.8.8:53 img.blog.com.pt udp
US 8.8.8.8:53 blogs.blogesfera.com udp
DE 185.53.177.51:80 img.blog.com.pt tcp
US 8.8.8.8:53 www.zimbio.com udp
US 208.98.35.225:443 www.scrubtheweb.com tcp
US 8.8.8.8:53 168.203.27.52.in-addr.arpa udp
US 8.8.8.8:53 207.83.69.159.in-addr.arpa udp
US 8.8.8.8:53 33.148.197.15.in-addr.arpa udp
US 8.8.8.8:53 1.80.190.35.in-addr.arpa udp
US 8.8.8.8:53 126.18.239.18.in-addr.arpa udp
US 8.8.8.8:53 233.249.8.212.in-addr.arpa udp
US 8.8.8.8:53 170.40.21.104.in-addr.arpa udp
US 8.8.8.8:53 243.168.111.65.in-addr.arpa udp
US 8.8.8.8:53 190.40.66.172.in-addr.arpa udp
US 8.8.8.8:53 21.155.67.172.in-addr.arpa udp
US 8.8.8.8:53 225.35.98.208.in-addr.arpa udp
US 8.8.8.8:53 51.177.53.185.in-addr.arpa udp
US 8.8.8.8:53 googleads.g.doubleclick.net udp
FR 142.250.179.98:443 googleads.g.doubleclick.net tcp
US 8.8.8.8:53 98.179.250.142.in-addr.arpa udp
US 8.8.8.8:53 196.249.167.52.in-addr.arpa udp
N/A 224.0.0.251:5353 udp
US 8.8.8.8:53 217.106.137.52.in-addr.arpa udp
US 8.8.8.8:53 200.163.202.172.in-addr.arpa udp
US 8.8.8.8:53 18.31.95.13.in-addr.arpa udp
US 8.8.8.8:53 22.49.80.91.in-addr.arpa udp
US 35.190.80.1:443 a.nel.cloudflare.com udp
US 8.8.8.8:53 172.210.232.199.in-addr.arpa udp
US 8.8.8.8:53 19.229.111.52.in-addr.arpa udp

Files

C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad\settings.dat

MD5 37f660dd4b6ddf23bc37f5c823d1c33a
SHA1 1c35538aa307a3e09d15519df6ace99674ae428b
SHA256 4e2510a1d5a50a94fe4ce0f74932ab780758a8cbdc6d176a9ce8ab92309f26f8
SHA512 807b8b8dc9109b6f78fc63655450bf12b9a006ff63e8f29ade8899d45fdf4a6c068c5c46a3efbc4232b9e1e35d6494f00ded5cdb3e235c8a25023bfbd823992d

\??\pipe\LOCAL\crashpad_640_TRPDKMAWVVBYXQLY

MD5 d41d8cd98f00b204e9800998ecf8427e
SHA1 da39a3ee5e6b4b0d3255bfef95601890afd80709
SHA256 e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855
SHA512 cf83e1357eefb8bdf1542850d66d8007d620e4050b5715dc83f4a921d36ce9ce47d0d13c5d85f2b0ff8318d2877eec2f63b931bd47417a81a538327af927da3e

C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad\settings.dat

MD5 d7cb450b1315c63b1d5d89d98ba22da5
SHA1 694005cd9e1a4c54e0b83d0598a8a0c089df1556
SHA256 38355fd694faf1223518e40bac1996bdceaf44191214b0a23c4334d5fb07d031
SHA512 df04d4f4b77bae447a940b28aeac345b21b299d8d26e28ecbb3c1c9e9a0e07c551e412d545c7dbb147a92c12bad7ae49ac35af021c34b88e2c6c5f7a0b65f6a8

C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Preferences

MD5 610b13e38f1b0e19a69c43017b888cf0
SHA1 c75d294384343d63f79f6fcdd8aea6ea1e7711ff
SHA256 b7d9c02e90e354e51672b3477afd48c4e3ae596317aed422d6363a9bce9afbc5
SHA512 f2aab8c463b4618d397c9becee8d45e2122870fbcc1716c1f1ace6ad37b4f85269dbdf3c90ee531b2d6b6325813ad66c41f02a2cd124a18b8e2a0e5b3a7a78c3

C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Local State

MD5 7734615cb6990e40abea26deb433f900
SHA1 5fd8999452611e8771dc8943bcbe62ced15ae037
SHA256 c619fd3dcb8ac7e540484084d2b132b94c14ec5f453ae74b938cd0491d56c0ae
SHA512 b0fd4a94cd548a9cc0403b0c61f86cb47a514eb4716ad168881dd60a5ff3e1e1db26ee3718e0f1e14193a57f1f80aea2f6feb255f1cd2ccdc7dc9d84fa7af029

C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Preferences

MD5 acfbfe2a7f24a08c2e3b9cb4eb4e7662
SHA1 b895fcc19771b5c52e5617a989784092341f1650
SHA256 75aad206dd0fbc952105fb77892edf82f033405fd1a3fe0a846e1c7c6d1b83de
SHA512 851317a74e3eaf88f390c26111197700788c9552f7c14b3991892d94680f56932a8ef5c231ad2906ed0c170043d5f81102fee77198bdc702e197be4aacb08f97

C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Network Persistent State

MD5 f3a45064d4b6812634e47fc3e346bc81
SHA1 fcb00d351bb1bc92751388690412263d6226aa76
SHA256 999c5e0b4cbcaa1bb38a6fddc4b4da64673157628dfc8facf71846e14e95c363
SHA512 9470e2e7647985f10fb34ff8123945704056536838e0006c1b3890d2ed7e0e1575bc45a86589d961cd9dbfcb7547577a045eb1557f64e77a50e1eb6150b46bed