Malware Analysis Report

2025-04-03 14:22

Sample ID 241211-v2hqyssmcw
Target e2852925abb89de5ef4096cb769ef231_JaffaCakes118
SHA256 7e0c30e784be9528f27dfca252d879ff274985bbf0741232ff536b0fa3f67e0b
Tags
socgholish discovery downloader
score
10/10

Table of Contents

Analysis Overview

MITRE ATT&CK

Enterprise Matrix V15

Analysis: static1

Detonation Overview

Signatures

Analysis: behavioral1

Detonation Overview

Command Line

Signatures

Processes

Network

Files

Analysis: behavioral2

Detonation Overview

Command Line

Signatures

Processes

Network

Files

Analysis Overview

score
10/10

SHA256

7e0c30e784be9528f27dfca252d879ff274985bbf0741232ff536b0fa3f67e0b

Threat Level: Known bad

The file e2852925abb89de5ef4096cb769ef231_JaffaCakes118 was found to be: Known bad.

Malicious Activity Summary

socgholish discovery downloader

SocGholish

Socgholish family

Browser Information Discovery

System Location Discovery: System Language Discovery

Suspicious use of FindShellTrayWindow

Suspicious use of SetWindowsHookEx

Suspicious behavior: EnumeratesProcesses

Modifies Internet Explorer settings

Suspicious use of WriteProcessMemory

Enumerates system info in registry

Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary

Suspicious use of SendNotifyMessage

MITRE ATT&CK

Analysis: static1

Detonation Overview

Reported

2024-12-11 17:28

Signatures

N/A

Analysis: behavioral1

Detonation Overview

Submitted

2024-12-11 17:28

Reported

2024-12-12 10:25

Platform

win7-20240903-en

Max time kernel

145s

Max time network

149s

Command Line

"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\e2852925abb89de5ef4096cb769ef231_JaffaCakes118.html

Signatures

SocGholish

downloader socgholish

Socgholish family

socgholish

System Location Discovery: System Language Discovery

discovery
Description Indicator Process Target
Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE N/A

Modifies Internet Explorer settings

adware spyware
Description Indicator Process Target
Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery C:\Program Files\Internet Explorer\iexplore.exe N/A
Set value (int) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" C:\Program Files\Internet Explorer\iexplore.exe N/A
Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\GPU C:\Program Files\Internet Explorer\iexplore.exe N/A
Set value (str) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" C:\Program Files\Internet Explorer\iexplore.exe N/A
Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\InternetRegistry C:\Program Files\Internet Explorer\iexplore.exe N/A
Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Toolbar C:\Program Files\Internet Explorer\iexplore.exe N/A
Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive C:\Program Files\Internet Explorer\iexplore.exe N/A
Set value (int) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" C:\Program Files\Internet Explorer\iexplore.exe N/A
Set value (int) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "440160865" C:\Program Files\Internet Explorer\iexplore.exe N/A
Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Main C:\Program Files\Internet Explorer\iexplore.exe N/A
Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic C:\Program Files\Internet Explorer\iexplore.exe N/A
Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain C:\Program Files\Internet Explorer\iexplore.exe N/A
Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\PageSetup C:\Program Files\Internet Explorer\iexplore.exe N/A
Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Zoom C:\Program Files\Internet Explorer\iexplore.exe N/A
Set value (int) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" C:\Program Files\Internet Explorer\iexplore.exe N/A
Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch C:\Program Files\Internet Explorer\iexplore.exe N/A
Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Main C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE N/A
Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\IETld\LowMic C:\Program Files\Internet Explorer\iexplore.exe N/A
Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\IntelliForms C:\Program Files\Internet Explorer\iexplore.exe N/A
Set value (data) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 C:\Program Files\Internet Explorer\iexplore.exe N/A
Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser C:\Program Files\Internet Explorer\iexplore.exe N/A
Set value (int) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{19B682E1-B873-11EF-B20A-C60424AAF5E1} = "0" C:\Program Files\Internet Explorer\iexplore.exe N/A
Set value (str) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" C:\Program Files\Internet Explorer\iexplore.exe N/A
Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\DomainSuggestion C:\Program Files\Internet Explorer\iexplore.exe N/A
Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\LowRegistry C:\Program Files\Internet Explorer\iexplore.exe N/A
Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage C:\Program Files\Internet Explorer\iexplore.exe N/A

Suspicious use of FindShellTrayWindow

Description Indicator Process Target
N/A N/A C:\Program Files\Internet Explorer\iexplore.exe N/A

Processes

C:\Program Files\Internet Explorer\iexplore.exe

"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\e2852925abb89de5ef4096cb769ef231_JaffaCakes118.html

C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE

"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1724 CREDAT:275457 /prefetch:2

Network

Country Destination Domain Proto
US 8.8.8.8:53 apis.google.com udp
US 8.8.8.8:53 www.blogger.com udp
US 8.8.8.8:53 3.bp.blogspot.com udp
US 8.8.8.8:53 resources.blogblog.com udp
US 8.8.8.8:53 www.intensedebate.com udp
US 8.8.8.8:53 2.bp.blogspot.com udp
US 8.8.8.8:53 1.bp.blogspot.com udp
US 8.8.8.8:53 4.bp.blogspot.com udp
US 8.8.8.8:53 www.linkwithin.com udp
US 8.8.8.8:53 www.bloglovin.com udp
US 8.8.8.8:53 ambassador-api.s3.amazonaws.com udp
US 8.8.8.8:53 www.bhcosmetics.com udp
US 8.8.8.8:53 ad.linksynergy.com udp
US 8.8.8.8:53 images.julep.com udp
US 8.8.8.8:53 images.brandbacker.com udp
US 8.8.8.8:53 ajax.googleapis.com udp
US 8.8.8.8:53 greenlava-code.googlecode.com udp
FR 216.58.215.33:80 4.bp.blogspot.com tcp
FR 216.58.214.169:443 resources.blogblog.com tcp
FR 216.58.215.33:80 4.bp.blogspot.com tcp
FR 216.58.215.33:80 4.bp.blogspot.com tcp
FR 216.58.215.33:80 4.bp.blogspot.com tcp
FR 216.58.215.33:80 4.bp.blogspot.com tcp
FR 216.58.215.33:80 4.bp.blogspot.com tcp
FR 216.58.214.169:443 resources.blogblog.com tcp
US 192.0.123.246:80 www.intensedebate.com tcp
FR 216.58.215.33:80 4.bp.blogspot.com tcp
FR 216.58.215.33:80 4.bp.blogspot.com tcp
FR 216.58.214.169:443 resources.blogblog.com tcp
FR 216.58.215.33:80 4.bp.blogspot.com tcp
FR 216.58.215.33:80 4.bp.blogspot.com tcp
FR 216.58.215.33:80 4.bp.blogspot.com tcp
FR 216.58.215.33:80 4.bp.blogspot.com tcp
FR 216.58.215.33:80 4.bp.blogspot.com tcp
FR 216.58.215.33:80 4.bp.blogspot.com tcp
FR 142.250.179.78:443 apis.google.com tcp
FR 216.58.215.33:80 4.bp.blogspot.com tcp
FR 216.58.215.33:80 4.bp.blogspot.com tcp
FR 216.58.214.169:443 resources.blogblog.com tcp
US 192.0.123.246:80 www.intensedebate.com tcp
FR 216.58.214.169:443 resources.blogblog.com tcp
FR 216.58.215.33:80 4.bp.blogspot.com tcp
FR 216.58.215.33:80 4.bp.blogspot.com tcp
FR 142.250.179.78:443 apis.google.com tcp
US 52.216.52.9:443 ambassador-api.s3.amazonaws.com tcp
US 52.216.52.9:443 ambassador-api.s3.amazonaws.com tcp
SG 118.139.179.30:80 www.linkwithin.com tcp
SG 118.139.179.30:80 www.linkwithin.com tcp
FR 216.58.215.33:80 4.bp.blogspot.com tcp
FR 216.58.215.33:80 4.bp.blogspot.com tcp
FR 216.58.215.33:80 4.bp.blogspot.com tcp
FR 216.58.215.33:80 4.bp.blogspot.com tcp
FR 216.58.215.33:80 4.bp.blogspot.com tcp
FR 216.58.215.33:80 4.bp.blogspot.com tcp
FR 142.250.178.130:80 pagead2.googlesyndication.com tcp
FR 142.250.178.130:80 pagead2.googlesyndication.com tcp
US 172.67.74.169:80 www.bloglovin.com tcp
US 172.67.74.169:80 www.bloglovin.com tcp
US 35.212.79.71:80 ad.linksynergy.com tcp
US 35.212.79.71:80 ad.linksynergy.com tcp
US 35.212.79.71:80 ad.linksynergy.com tcp
FR 142.250.178.138:80 ajax.googleapis.com tcp
FR 142.250.178.138:80 ajax.googleapis.com tcp
US 104.26.12.230:80 images.brandbacker.com tcp
US 104.26.12.230:80 images.brandbacker.com tcp
BE 108.177.15.82:80 greenlava-code.googlecode.com tcp
BE 108.177.15.82:80 greenlava-code.googlecode.com tcp
US 172.67.199.136:80 www.bhcosmetics.com tcp
US 172.67.199.136:80 www.bhcosmetics.com tcp
US 172.67.74.169:443 www.bloglovin.com tcp
US 8.8.8.8:53 www.revolutionbeauty.com udp
US 104.19.148.50:443 www.revolutionbeauty.com tcp
US 104.19.148.50:443 www.revolutionbeauty.com tcp
US 35.212.79.71:443 ad.linksynergy.com tcp
US 35.212.79.71:443 ad.linksynergy.com tcp
US 35.212.79.71:443 ad.linksynergy.com tcp
FR 216.58.215.33:443 4.bp.blogspot.com tcp
US 8.8.8.8:53 c.pki.goog udp
FR 142.250.179.67:80 c.pki.goog tcp
FR 142.250.179.67:80 c.pki.goog tcp
FR 142.250.179.67:80 c.pki.goog tcp
FR 142.250.179.67:80 c.pki.goog tcp
FR 142.250.179.67:80 c.pki.goog tcp
FR 142.250.179.67:80 c.pki.goog tcp
FR 142.250.179.67:80 c.pki.goog tcp
FR 216.58.215.33:443 4.bp.blogspot.com tcp
FR 216.58.215.33:443 4.bp.blogspot.com tcp
FR 142.250.179.67:80 c.pki.goog tcp
FR 142.250.179.67:80 c.pki.goog tcp
FR 142.250.179.67:80 c.pki.goog tcp
FR 142.250.179.67:80 c.pki.goog tcp
US 8.8.8.8:53 o.pki.goog udp
US 8.8.8.8:53 o.pki.goog udp
US 8.8.8.8:53 o.pki.goog udp
FR 142.250.179.67:80 o.pki.goog tcp
FR 142.250.179.67:80 o.pki.goog tcp
FR 142.250.179.67:80 o.pki.goog tcp
FR 142.250.179.67:80 o.pki.goog tcp
FR 142.250.179.67:80 o.pki.goog tcp
FR 142.250.179.67:80 o.pki.goog tcp
FR 142.250.179.67:80 o.pki.goog tcp
US 192.0.123.246:443 www.intensedebate.com tcp
US 216.239.38.178:80 www.google-analytics.com tcp
US 216.239.38.178:80 www.google-analytics.com tcp
US 8.8.8.8:53 accounts.google.com udp
GB 74.125.71.84:443 accounts.google.com tcp
GB 74.125.71.84:443 accounts.google.com tcp
US 8.8.8.8:53 ocsp.r2m01.amazontrust.com udp
US 8.8.8.8:53 ocsp.r2m01.amazontrust.com udp
NL 18.238.246.206:80 ocsp.r2m01.amazontrust.com tcp
NL 18.238.246.206:80 ocsp.r2m01.amazontrust.com tcp
US 8.8.8.8:53 crl.microsoft.com udp
GB 88.221.134.146:80 crl.microsoft.com tcp
US 8.8.8.8:53 www.microsoft.com udp
US 23.192.22.93:80 www.microsoft.com tcp
US 204.79.197.200:443 ieonline.microsoft.com tcp
US 204.79.197.200:443 ieonline.microsoft.com tcp
US 8.8.8.8:53 www.microsoft.com udp
US 8.8.8.8:53 www.microsoft.com udp
US 204.79.197.200:443 ieonline.microsoft.com tcp

Files

C:\Users\Admin\AppData\Local\Temp\CabCF70.tmp

MD5 49aebf8cbd62d92ac215b2923fb1b9f5
SHA1 1723be06719828dda65ad804298d0431f6aff976
SHA256 b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512 bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b

C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\24BD96D5497F70B3F510A6B53CD43F3E_3A89246FB90C5EE6620004F1AE0EB0EA

MD5 84525ac2c52cedf67aa38131b3f41efb
SHA1 080afd23b33aabd0285594d580d21acde7229173
SHA256 ae524d9d757bed48d552b059f951ffd25a7d963ae44a554cb1f3a9641e524080
SHA512 d898b0913b4005bbbf22a5457ad1e86345860868bc2e53187ad8267c07824d592160a27d850978ebfe78392db784fffb80b73e27418d3a71708383d738ea1d57

C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\24BD96D5497F70B3F510A6B53CD43F3E_3A89246FB90C5EE6620004F1AE0EB0EA

MD5 61c4648a4fa179b84b07ebe0de134334
SHA1 1c416766a698acbfc99b9f5bbef42393f93ad87d
SHA256 0883c19327374112f810b9abc3331c54e02c18f87dae3c3b7c4c9308dd145b68
SHA512 4e8010f58768d3e916e5f790c3f012266f8ff67ee8b82c2d74994c2861bda00d0e45d323193b05eade6931a649712c9b46a2cfe9e9803124e970caf0487bb038

C:\Users\Admin\AppData\Local\Temp\TarD020.tmp

MD5 4ea6026cf93ec6338144661bf1202cd1
SHA1 a1dec9044f750ad887935a01430bf49322fbdcb7
SHA256 8efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA512 6c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b

C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\05DDC6AA91765AACACDB0A5F96DF8199

MD5 b255e18797e5272a0758a67e92f90429
SHA1 819509c63206f00651b778e7299976cb0a5f5134
SHA256 4550be00f7d0a40461a85bc2385b019b729beab47c8fc6f9878a47d6f16100a3
SHA512 27074f2f0ad0ad8dd69115a7d924e37af4055ae36437a5d6b887f91882303602a475ea19dba5a28930554b8d1a1f366f467ceef3d8ebd1d2bf665e9c7832f204

C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\05DDC6AA91765AACACDB0A5F96DF8199

MD5 e935bc5762068caf3e24a2683b1b8a88
SHA1 82b70eb774c0756837fe8d7acbfeec05ecbf5463
SHA256 a8accfcfeb51bd73df23b91f4d89ff1a9eb7438ef5b12e8afda1a6ff1769e89d
SHA512 bed4f6f5357b37662623f1f8afed1a3ebf3810630b2206a0292052a2e754af9dcfe34ee15c289e3d797a8f33330e47c14cbefbc702f74028557ace29bf855f9e

C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

MD5 d6f879eddca8dbca7110f1918c12c024
SHA1 52019915c5044e7daf00dce53a02aa923a3bd90c
SHA256 a9c5f8be4027c68bfd763ea1486cd03acb523a382494c734278ad3a1190cafcb
SHA512 56e383cff92d88692410fe9e92c898d060ecb19fa981941a32d43a2f76f464c50443af74b9603bfa211be1404b7add9db9622c8ff3f1bf816f23f0ab56261657

C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\05DDC6AA91765AACACDB0A5F96DF8199

MD5 cca0f4e68332f6ca227a65a12c663b90
SHA1 5e118f7cf5ddc7f4c3930e76f3aecf2e6c9119cf
SHA256 76c0824926ed589b958ffc1e1eec233c5de1cf4e1f7512504a396de7787ee443
SHA512 7289ffd33660a8667f847e5f5724c2d375d6aa0cac57d195749697bd4ca38e4b0bc70569e7202f80a205d17f63f429ca0c1cbd6fd170433e825c5320dc789c43

C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

MD5 34a76ce8a69fd0323ee1e84b90f0b001
SHA1 616c747636ca8254680a649ff3197caa3980bf55
SHA256 715ebdf984951d26846d560a9ba36fcdca5d80449a7dd8e4f52b863e5c0760d6
SHA512 c2fa4c7044d28c2404a8ac1f148046375f46c01a74327ee0d26d633fbeb34f163323700f2d4cc185b0cc0f6da9eee5e99e85503cbf9cc851df24f440771a3a63

C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\DDE8B1B7E253A9758EC380BD648952AF_86F2A83F54EA52E2D59C5D2EE00149B8

MD5 1763fe61723e5639116ca04463342aaf
SHA1 0a6314ca2c0916ac8fc8f2ac9a4e78fda2fed29c
SHA256 71993fc51772114a21424128520a6cddf2480216663fe6d2276c26261769e614
SHA512 beb90dd3eac2db6002972a590026b43a7c51b5eddd21127bdd30008b9dba966729876f3897f338823e478972808cef272fb6734138dda085678e1ee6afe9f2ff

C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\DDE8B1B7E253A9758EC380BD648952AF_86F2A83F54EA52E2D59C5D2EE00149B8

MD5 6de2c4c3e13177b9ba7ebbdf6cb70f78
SHA1 7f7e4b09c380785d2a8232d1437ebd0a5902feb2
SHA256 e47982a989d10b7db6fc39bc47e02d0ee6a56ce82b07223246d0eb15ec5b8587
SHA512 c1b08e2a2f8d6a9625e3148f73aefe6b5bfbc35d968d57158b178607ab0267b733888ae9e559bfb0217ac10339f772bb9d2f193b075eb184fcc5385b0ed8785e

C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

MD5 1191c3998254f1f0426f3c5eaa0b483d
SHA1 b6bd2c9c9a8c102162409bf0787fe36a63cdb202
SHA256 c03911371e0291c5260b110408668f55ff014fab76acd8724fb2705d72fb539b
SHA512 df41ad3b12e862dce7a7e507628f85e7716585cb7685f36e517cf62df025a5cd2937aaf7ab2e04f10d7202eb728eed9ce3b68b609f280b1eabe67d13a7fee30b

C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

MD5 19592d9b79bc4606cdb3e89f2d14b646
SHA1 0a470daa7256c46a0b2c5f994c3a4de636df8d3d
SHA256 7dd3366a52d45b32a292b4e4af5a514f9ab23d7c3108869a3e14a48783103a5c
SHA512 c8c75ec2233c421a5ee2286eb0ece49dc3aa6c83ca01af8654e70a8f88d6e47092b4ffdcb11f8b0bfbb8705e6b0a8792263c275c878cc17b29d4e71c1e9c2c08

C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\E0968A1E3A40D2582E7FD463BAEB59CD

MD5 285ec909c4ab0d2d57f5086b225799aa
SHA1 d89e3bd43d5d909b47a18977aa9d5ce36cee184c
SHA256 68b9c761219a5b1f0131784474665db61bbdb109e00f05ca9f74244ee5f5f52b
SHA512 4cf305b95f94c7a9504c53c7f2dc8068e647a326d95976b7f4d80433b2284506fc5e3bb9a80a4e9a9889540bbf92908dd39ee4eb25f2566fe9ab37b4dc9a7c09

C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\E0968A1E3A40D2582E7FD463BAEB59CD

MD5 27f43bc99b48d66a113e54b06eca80f3
SHA1 d284e2abbdaf8bb22a283e0ea19ea96e61234e37
SHA256 55af9e354064a5172be727e124c8b35df678b343334200a4bf68b2eb16670be8
SHA512 6ad7d5bc834b974b2e24c5b7793ec8982a32e76120aaee77df2632bd0fa37498cf61751e03eb39bb4b84c15b70eec022feaf46397afb2d6c0aa024870af9f582

C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\070E0202839D9D67350CD2613E78E416

MD5 55540a230bdab55187a841cfe1aa1545
SHA1 363e4734f757bdeb89868efe94907774a327695e
SHA256 d73494e3446b02167573b3cde3ae1c8584ac26e15e45ac3ec0326708425d90fb
SHA512 c899cb1d31d3214fd9dc8626a55e40580d3b2224bf34310c2abd85d0f63e2dedaeae57832f048c2f500cb2cbf83683fcb14139af3f0b5251606076cdb4689c54

C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

MD5 5c38fd901c2e76ec056f5a604e22437b
SHA1 d086d35a8ca34df8b1f7a3ad892da4a089b6e691
SHA256 ea7ba2696e3f2be5f9d06dea8e7eee39a3f0c17a4359ae4e41c66ebfad9796c5
SHA512 1d4b9a6259a3ec0bdcdf921a575aca4ff9e1e9ba368dd0ea9526b9aa555485294a54645a1d8dc8bd1fe0b1c177ce9edc11b0d020598bc6e510e42aacc83fb5b3

C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

MD5 e5788ca0fe663a010cea31c6e1694d06
SHA1 9a079ba00314b3b39caa3ca18935957d95fe7199
SHA256 440245fdf975e4859dbcb3dc14a304f61f07a7f768df3b43ce613e6a00ef2224
SHA512 18b27fd53110d14fb404582e6647886cf9d06a86ca45ee0e8c43cb6052fdf69f93b54bfc1468cf8b56ced44af75eb6ca58094536f55e00a09e376748833fbbbc

C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

MD5 711cac4edb97d0a5216216b34f610404
SHA1 4926cab0c8127736a121ac2dad1dd81c4ff7ee53
SHA256 28a3e4db72ec8edc6f89f4e0e80c439bd0bf580b086457f34a978d0d60cd6d21
SHA512 e3aee5ed0f35f21c8a885a6e0de0505675adaa0c5213a72ec0c5aec2c7f073d2ce53f95065313a11652f021411b7b039707f76280dadd3c3b80f2ce476875404

C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\070E0202839D9D67350CD2613E78E416

MD5 f564afaad65f6b5859c014b33275dbab
SHA1 6b119b680d6fb58f2a4903de662816c34a3569ea
SHA256 7d88eacd9e3c0979160d53def71be7e7bd944561bdfe3ed85badcd97ca83b583
SHA512 d6fc47b4cb28f38b4cf4b3fab078bed31fe941ff3f37b6b43dff0a8b005d47db5e1d2a03ef7822c0639cd7b1f52022a84575763b9049f0efaccbd3956c81395e

C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

MD5 20e3cf06e8cd97b39dc5e10b022d8b88
SHA1 5431e3bf10b429959ca7a5e9b33e6b6db976728b
SHA256 98e962896ee0e91e5708f847dcbe135ac410741b03f20a33637b8e8e74b002c4
SHA512 221f18ab1f726cf8a2a971161a4e881ebf089978e1870b6846cecbfb3535ddf7df43282ce3bfaefa57a27db10721a67430e274d2fd0653e2c80231bb9c4cf564

C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

MD5 31e04f8e21a18166578f1388554d1b23
SHA1 ad2a676074908f0a6cb2c0a6493354378063e41e
SHA256 139a6d12b5796838f5df99a5c04c0ff5df070aadf8ea1a696db43629d9498d27
SHA512 d8f9abd08a8dee8bca78507ccdd30723a4a20070cb98f4bc543f7403e0db506d4f54a41f91cfd5a1529fa18b4b58131e4878e8ceee3bbc633d084b3e08a58907

C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

MD5 ba05fa7f729c74fec9aa44928cabad9b
SHA1 48cf611d75a65f2ef9ac703fc74485779f2b6ce8
SHA256 bd41cfb2524eecf8b50b868c87433669b70990eae64eab33c792a4d217b43d15
SHA512 befd295de576365eba2b8e65e77485de0ad2384ef913639b2d2a83968fb9bace740b25bb0dd625fcb58969276f0a4e109bc1d7069314d16ff02f3a8f35518caf

C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

MD5 b249e7e9b0595730e1c8f56c23abe36d
SHA1 dc86ac600ba294ce17907cf3e55bf978eef18aba
SHA256 5b981f9d55a813b4f42a3d5bf62bb115e4cc6ad6a33d059540fb278d5e749c82
SHA512 5645bee84334ba32c38133e0176cb9b5864ba17ea93fa74db53dcc105118b4108d416332f7bc0fe55b2e5a58b18051e0841c7265c6676c9ed6e6fd92f803cd33

C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

MD5 f8853aeb3ceb7d8bad594222b31aa95a
SHA1 0236f176811ebe97b50b7fed746366d8aa32939d
SHA256 3da818f24b4ca025c23502860457888de499e263a58327a10cc122c55baf1f48
SHA512 136e63f1b2155009998c237f87f693d1586514b19306e9554391507d308a44acaa1e1e23b24dd7de964e16788c8a6c90e999da82a30f2734d1cd2195c862ec0e

C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

MD5 bb2ae0b154abe534cec471b2e07e1cc1
SHA1 ee2ba9fd026c46cf5cbf419c8b0d069cd53903b5
SHA256 812517e136163229660c21b1182dfa3bf3a0de835dfcb6bbd41c25529d591c17
SHA512 55b20447d78dae6d4d13c8c2237ee51b65c2955d5979697bef24c34822f2ce29365b04ad3ed8ca52be2ad79d79ad1c1a81f4021fad1ce5bd7338689bc91cd5a1

C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

MD5 922fd5d7d7ae62d7ede777d26fd80de4
SHA1 a5d2a407db5d5af5830662ed5e23027793e805b1
SHA256 6ec5e5de4520b9244c82b8703e04f4b7ce726b7db8314e1a81039665441ede2f
SHA512 cfe2c52a6730ee88c4036dd2c20382b6ae44a1d43bc1886e3b405ffe44e4e448dc26f6523e2d78e58c651a5f0c5578abd43a482791e251c3cf6e66d795c0254c

C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

MD5 70d7715ae721648ae0a87b1dc171e022
SHA1 d904c10afccb6bf7b924fe546d37b17ac7bb4216
SHA256 a4170a546a4a241309b9dc22d8be1c755c174f3e02d2ab66895f30f3c3a785d6
SHA512 3e35641d3dadf5a8ab3fa7918f8ba1e61ada15c368871408e45d7094aa2be7f9e9f36ea67245b7e6955623375b412a8353043ce745b8be842fee2b2058ee708f

C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\AS91FDNI\plusone[1].js

MD5 3c91ec4a05ec32f698b60dc011298dd8
SHA1 f10f0516a67aaf4590d49159cf9d36312653a55e
SHA256 96b335b41362fd966c7e5e547db375ef0be7dcb2aec66bf3646782eeaed4b2cf
SHA512 05345e754b39e9f83514bc3e14b52f3cbf321738fd7d973da55db99035b11b4152fedce2c203eb34376cc9e18571db514ff9fbcb4174a2dd7cca7e439cd25944

C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

MD5 4f587f869f60fd46440715779ffa5d6d
SHA1 f00d8bb76a4a4c239e29bcda4ae28f4ce97bba5a
SHA256 b6dd240c08f74a8a7f8ea5e7a2fa5454778f0b23ce31ff01ef3ec852920337d6
SHA512 bc130763abecdbd9255f471f9f79c093213cfe7f70db38c55fa8173e825a26b1dd2b913604a04c4bff3e0b362730622d5f60bcd55403db39b53a9a2a23c3d47d

C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

MD5 92a32261802b7523ec74dfe7de1302bb
SHA1 fa3cd2ef7543dd0cb24c7b8f4a575152e281817a
SHA256 5cabd904657f5ab93867ebcb4a354f55ef6be10bb3693cd073762226bb61e6ea
SHA512 28062209bcb861610ca232ca2df03fd390b74e44f31bb605b4cda340de52ed9ec36a7a22173df254d17bfbffd2f7d0b0d2cc2c49910a3432370a192186a0b3b6

C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

MD5 9587175b5c27ba4f9d4b2ef1efb1a17c
SHA1 0d6ff68505e8ccc9bf01f96213c8cde321b1dfe4
SHA256 bb07ce32ee81b711139fdc28a3d1712634fd9f3e9ff7958efa5dc607fa1b0bc7
SHA512 82f1402b3c828b46cb0e51c80652b16aa489e27d069d4a03eb8a73ac40fd0aa02d12903a5407644761c1387b4a84a371b4ef39dffa45fd041dbdb18052d14293

C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

MD5 19ece1c08bdaa86f72eb0fa7c4e6de27
SHA1 3e723e20fc87b8279de9c52eb43e698ac846a728
SHA256 2f4c9d901a5f93c449ae9fc4382f9fb76a7cf3adfc10c74e1b614d32e17c95fb
SHA512 37989ab0af947d4de218a7804ce9c557957062c3f4458556e91186457740124ca08d19364fab49231d17d62a3c50307a4fdb8766d4d612ec9ec3a183f4cda3f7

C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\F0ACCF77CDCBFF39F6191887F6D2D357

MD5 3464903734f8c953125522c6edd1ddd7
SHA1 baa34a36890a4eff17af753584586b6946245cd3
SHA256 87a4af1a47d4276331993971d94384a42591d1c3749670b4e892dc3901ad1597
SHA512 b00ac9baf93084b849a75a832ef2538d1b5e7137e27feefe6a35fe2b02b11f0974e9aca53fd52b5ceab173d16a9b5697ee1f944ab9321645d67a2c404701af72

C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\F0ACCF77CDCBFF39F6191887F6D2D357

MD5 a266bb7dcc38a562631361bbf61dd11b
SHA1 3b1efd3a66ea28b16697394703a72ca340a05bd5
SHA256 df545bf919a2439c36983b54cdfc903dfa4f37d3996d8d84b4c31eec6f3c163e
SHA512 0da8ef4f8f6ed3d16d2bc8eb816b9e6e1345dfe2d91160196c47e6149a1d6aedaafadcefd66acdea7f72dcf0832770192ceac15b0c559c4ccc2c0e5581d5aefc

C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

MD5 8d28f0e25ef9c1d54f563c6ab4b9f416
SHA1 f049c19861faeca9957d96cda7d10963e9bb0889
SHA256 0c921809a535e40331bc83e1517f810bb8b3be52de179d0c6c188028835428e1
SHA512 7a90032618354dc3d4f56c8db4d376b4140d51ed0e9ffc084e89f760a98643e25ead9849d9e4fe356edaa06a19868fb22255a61ed8105189436d293889230b1b

C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

MD5 699159fc4c2c52f631fc46a64e353bf3
SHA1 f347321faf3ecb6a7876dd659ffa887e1078942e
SHA256 05f2fd7c8f00fdf5879c79b3dee97f346deea53fd38216bf5077b2ef8be389d1
SHA512 39a370dba5eafe6be4226fa501e831f5c99d251635395b550a103d802cd0935b87c8a29d0db34fb053f31243c428c627da477881a2843cad001fe6fa50b336c0

C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

MD5 ff65f31f806cd780dc076460ac2dff6b
SHA1 64d1a022bd3ba86eada1368f608d9f120ebd8b4d
SHA256 df8b597e62802b2650298fe6be6a2c3c407e24e37d341b148a425421e2114e09
SHA512 e4415c433dc57d2db1c73478ae4fae74c6783e226e6401d7b947973793c3fda39af9f8b38ec4472bc21bf278085ebcd972f014dbc81ee18a49ce31557ac4898f

C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

MD5 efa5e43f7d56165b55970a737c3693a4
SHA1 5f016f13921aa6f1d80487552c5b78dfe809d2c6
SHA256 ad0b32eca27876056ef5f5f0204326f566e80bea988114ca92499a8e9dfbdfb6
SHA512 8547e85cda2d73fca33160f571de6cf93e83d870da6c7d8e98854fb709228ce8e9be6a673d95add6429256d84878427922e322ffa3061c66bc9f98c8c4c3e344

C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

MD5 ddf47633db328322c1a8d0f66c7e1d81
SHA1 7d7fe86d68c89186711556fa6f7bc295ceae30dd
SHA256 7d3c49344e8ff3a51d251610c8f3881bfc30770a127ab248af907725d70fa36e
SHA512 deb4ccb2f20dcee3820ca8a90813f10a9954e3e95b6dce1c2aead899c8b869928f6f3500a8399a84fb25b65f5a2ea56062a8e643a30162e8e57b076dd41870bb

C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\3C428B1A3E5F57D887EC4B864FAC5DCC

MD5 d9c9f135df0a4dcf3746962aa0983692
SHA1 85563f219caef7ee9073234c247eb3def389280f
SHA256 a529a9e01c88a2ba5c2c01d11f58c469b01dfeb62ea108d7258d59aea2124218
SHA512 098cd8810fef73b2d65d819c0d4cdca775484c6f3ac65d26ee476e0207e51cbf4a4c72c2e03903549afd9e668e3ae8349a4ac6e942cfc76c1c5a1a2b95ecd1d6

C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

MD5 7b6d40d35fc22cd5b24e32ac16deaa5f
SHA1 dc42d3c6ffee779cdecb0737162ffad78d83ec9e
SHA256 d4d09137d627626a0c13231663f0fde8cec2b0287d099b611d1ff6b0385a705a
SHA512 daabea08e18e218a7826f2fb07ac2f9a15e4c896db43d6e43a91c7b0e6a0466a563508382858749fe788b504d1708f2777fdeb7163f54677f19adb5333e56e8f

C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\3C428B1A3E5F57D887EC4B864FAC5DCC

MD5 e4a68ac854ac5242460afd72481b2a44
SHA1 df3c24f9bfd666761b268073fe06d1cc8d4f82a4
SHA256 cb3ccbb76031e5e0138f8dd39a23f9de47ffc35e43c1144cea27d46a5ab1cb5f
SHA512 5622207e1ba285f172756f6019af92ac808ed63286e24dfecc1e79873fb5d140f1ceb7133f2476e89a5f75f711f9813a9fbb8fd5287f64adfdcc53b864f9bdc5

C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

MD5 67d2cf65e1f8fc62e5a22572a0a50f28
SHA1 d2a0181007c1a6bb25f3c02ac84b3f0cae5ea8f2
SHA256 1097bfacaf875626451c4efe9fd6eb5355a12fd5444fbc89c54834e8da31a707
SHA512 da91df0a2a2cd02430ebdcefcfa15cc550f3664b679c4be03ff8432bda908ceb2fb00ae682b99b40c4b47c76727471b7ffef9c7fa06f758804caeb5d2c99c44f

C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

MD5 a27b0de52fa992291adf99afc6d59f82
SHA1 dab2faf03600016a9f1cc5977fadea32bace473d
SHA256 2ddcff310bada470f2216c18e730d9e39d693c9a74cc6898bb1c08ca930ac510
SHA512 348dae61cc3a2ed9c26fea77732c62cd748a19df6408edfcbf015b2ac70d6919bedb72f93432387a75455c3c64de24297d1efc150b01dc8479aa96c262c7689c

C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

MD5 97777240bdfe98b5328024d9e54a7de1
SHA1 80e36fe9760557fb4512dd1c2f1cc55c656460fe
SHA256 35626855c50c6f700ae49dc64a667908687071928ab114141f043eaaf5d9d920
SHA512 fa3570fc59246d142b8404462300c3fc00f33afc1243229bed560f6b051e54a89cec900e880326bba1940c83ad6fc006e664777b65fdcd58139917a84e9ab42b

Analysis: behavioral2

Detonation Overview

Submitted

2024-12-11 17:28

Reported

2024-12-12 10:25

Platform

win10v2004-20241007-en

Max time kernel

148s

Max time network

150s

Command Line

"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --start-maximized --single-argument C:\Users\Admin\AppData\Local\Temp\e2852925abb89de5ef4096cb769ef231_JaffaCakes118.html

Signatures

Browser Information Discovery

discovery

Enumerates system info in registry

Description Indicator Process Target
Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe N/A
Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe N/A
Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe N/A

Suspicious use of FindShellTrayWindow

Description Indicator Process Target
N/A N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe N/A
N/A N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe N/A
N/A N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe N/A
N/A N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe N/A
N/A N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe N/A
N/A N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe N/A
N/A N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe N/A
N/A N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe N/A
N/A N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe N/A
N/A N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe N/A
N/A N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe N/A
N/A N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe N/A
N/A N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe N/A
N/A N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe N/A
N/A N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe N/A
N/A N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe N/A
N/A N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe N/A
N/A N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe N/A
N/A N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe N/A
N/A N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe N/A
N/A N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe N/A
N/A N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe N/A
N/A N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe N/A
N/A N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe N/A
N/A N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe N/A

Suspicious use of SendNotifyMessage

Description Indicator Process Target
N/A N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe N/A
N/A N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe N/A
N/A N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe N/A
N/A N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe N/A
N/A N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe N/A
N/A N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe N/A
N/A N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe N/A
N/A N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe N/A
N/A N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe N/A
N/A N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe N/A
N/A N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe N/A
N/A N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe N/A
N/A N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe N/A
N/A N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe N/A
N/A N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe N/A
N/A N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe N/A
N/A N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe N/A
N/A N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe N/A
N/A N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe N/A
N/A N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe N/A
N/A N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe N/A
N/A N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe N/A
N/A N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe N/A
N/A N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe N/A

Suspicious use of WriteProcessMemory

Description Indicator Process Target
PID 4884 wrote to memory of 552 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 4884 wrote to memory of 552 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 4884 wrote to memory of 344 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 4884 wrote to memory of 344 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 4884 wrote to memory of 344 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 4884 wrote to memory of 344 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 4884 wrote to memory of 344 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 4884 wrote to memory of 344 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 4884 wrote to memory of 344 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 4884 wrote to memory of 344 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 4884 wrote to memory of 344 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 4884 wrote to memory of 344 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 4884 wrote to memory of 344 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 4884 wrote to memory of 344 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 4884 wrote to memory of 344 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 4884 wrote to memory of 344 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 4884 wrote to memory of 344 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 4884 wrote to memory of 344 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 4884 wrote to memory of 344 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 4884 wrote to memory of 344 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 4884 wrote to memory of 344 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 4884 wrote to memory of 344 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 4884 wrote to memory of 344 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 4884 wrote to memory of 344 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 4884 wrote to memory of 344 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 4884 wrote to memory of 344 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 4884 wrote to memory of 344 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 4884 wrote to memory of 344 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 4884 wrote to memory of 344 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 4884 wrote to memory of 344 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 4884 wrote to memory of 344 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 4884 wrote to memory of 344 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 4884 wrote to memory of 344 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 4884 wrote to memory of 344 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 4884 wrote to memory of 344 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 4884 wrote to memory of 344 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 4884 wrote to memory of 344 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 4884 wrote to memory of 344 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 4884 wrote to memory of 344 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 4884 wrote to memory of 344 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 4884 wrote to memory of 344 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 4884 wrote to memory of 344 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 4884 wrote to memory of 232 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 4884 wrote to memory of 232 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 4884 wrote to memory of 4480 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 4884 wrote to memory of 4480 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 4884 wrote to memory of 4480 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 4884 wrote to memory of 4480 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 4884 wrote to memory of 4480 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 4884 wrote to memory of 4480 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 4884 wrote to memory of 4480 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 4884 wrote to memory of 4480 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 4884 wrote to memory of 4480 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 4884 wrote to memory of 4480 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 4884 wrote to memory of 4480 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 4884 wrote to memory of 4480 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 4884 wrote to memory of 4480 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 4884 wrote to memory of 4480 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 4884 wrote to memory of 4480 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 4884 wrote to memory of 4480 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 4884 wrote to memory of 4480 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 4884 wrote to memory of 4480 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 4884 wrote to memory of 4480 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 4884 wrote to memory of 4480 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe

Processes

C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe

"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --start-maximized --single-argument C:\Users\Admin\AppData\Local\Temp\e2852925abb89de5ef4096cb769ef231_JaffaCakes118.html

C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe

"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffc5f3146f8,0x7ffc5f314708,0x7ffc5f314718

C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe

"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2060,7449650838277655306,15632144906059665178,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2072 /prefetch:2

C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe

"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2060,7449650838277655306,15632144906059665178,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2136 /prefetch:3

C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe

"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2060,7449650838277655306,15632144906059665178,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2648 /prefetch:8

C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe

"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2060,7449650838277655306,15632144906059665178,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3204 /prefetch:1

C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe

"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2060,7449650838277655306,15632144906059665178,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3212 /prefetch:1

C:\Windows\System32\CompPkgSrv.exe

C:\Windows\System32\CompPkgSrv.exe -Embedding

C:\Windows\System32\CompPkgSrv.exe

C:\Windows\System32\CompPkgSrv.exe -Embedding

C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe

"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2060,7449650838277655306,15632144906059665178,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4692 /prefetch:1

C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe

"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2060,7449650838277655306,15632144906059665178,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4976 /prefetch:1

C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe

"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2060,7449650838277655306,15632144906059665178,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=5092 /prefetch:2

Network

Country Destination Domain Proto
US 8.8.8.8:53 232.168.11.51.in-addr.arpa udp
US 8.8.8.8:53 static.ebates.ca udp
US 8.8.8.8:53 www.blogger.com udp
US 8.8.8.8:53 apis.google.com udp
US 8.8.8.8:53 www.intensedebate.com udp
US 8.8.8.8:53 www.linkwithin.com udp
US 8.8.8.8:53 2.bp.blogspot.com udp
US 8.8.8.8:53 resources.blogblog.com udp
US 8.8.8.8:53 3.bp.blogspot.com udp
US 8.8.8.8:53 1.bp.blogspot.com udp
FR 216.58.214.169:443 resources.blogblog.com tcp
SG 118.139.179.30:80 www.linkwithin.com tcp
FR 142.250.179.78:443 apis.google.com tcp
GB 23.208.247.247:445 static.ebates.ca tcp
US 192.0.123.246:80 www.intensedebate.com tcp
FR 216.58.215.33:80 1.bp.blogspot.com tcp
FR 216.58.215.33:80 1.bp.blogspot.com tcp
FR 216.58.215.33:80 1.bp.blogspot.com tcp
FR 216.58.215.33:80 1.bp.blogspot.com tcp
FR 216.58.215.33:80 1.bp.blogspot.com tcp
FR 216.58.214.169:443 resources.blogblog.com tcp
FR 216.58.215.33:80 1.bp.blogspot.com tcp
FR 216.58.215.33:80 1.bp.blogspot.com tcp
FR 142.250.179.98:80 pagead2.googlesyndication.com tcp
FR 142.250.179.78:443 apis.google.com udp
SG 118.139.179.30:80 www.linkwithin.com tcp
FR 216.58.215.33:443 1.bp.blogspot.com tcp
US 8.8.8.8:53 4.bp.blogspot.com udp
FR 216.58.215.33:80 4.bp.blogspot.com tcp
FR 216.58.215.33:80 4.bp.blogspot.com tcp
US 8.8.8.8:53 74.32.126.40.in-addr.arpa udp
US 8.8.8.8:53 78.179.250.142.in-addr.arpa udp
US 8.8.8.8:53 95.221.229.192.in-addr.arpa udp
US 8.8.8.8:53 169.214.58.216.in-addr.arpa udp
US 8.8.8.8:53 246.123.0.192.in-addr.arpa udp
US 8.8.8.8:53 33.215.58.216.in-addr.arpa udp
US 8.8.8.8:53 98.179.250.142.in-addr.arpa udp
US 8.8.8.8:53 30.179.139.118.in-addr.arpa udp
FR 216.58.214.169:443 resources.blogblog.com udp
US 192.0.123.246:443 www.intensedebate.com tcp
FR 216.58.215.33:80 4.bp.blogspot.com tcp
FR 216.58.214.169:443 resources.blogblog.com udp
FR 216.58.215.33:80 4.bp.blogspot.com tcp
FR 216.58.215.33:80 4.bp.blogspot.com tcp
FR 216.58.215.33:80 4.bp.blogspot.com tcp
US 8.8.8.8:53 ajax.googleapis.com udp
FR 172.217.20.170:80 ajax.googleapis.com tcp
US 8.8.8.8:53 greenlava-code.googlecode.com udp
FR 216.58.215.33:80 4.bp.blogspot.com tcp
BE 108.177.15.82:80 greenlava-code.googlecode.com tcp
FR 216.58.215.33:80 4.bp.blogspot.com tcp
FR 216.58.215.33:80 4.bp.blogspot.com tcp
US 8.8.8.8:53 developers.google.com udp
FR 142.250.178.142:80 developers.google.com tcp
US 8.8.8.8:53 accounts.google.com udp
GB 74.125.71.84:443 accounts.google.com tcp
SG 118.139.179.30:80 www.linkwithin.com tcp
BE 108.177.15.82:80 greenlava-code.googlecode.com tcp
US 8.8.8.8:53 www.bloglovin.com udp
US 172.67.74.169:80 www.bloglovin.com tcp
FR 142.250.178.142:80 developers.google.com tcp
US 8.8.8.8:53 ssl.gstatic.com udp
US 8.8.8.8:53 ambassador-api.s3.amazonaws.com udp
US 172.67.74.169:443 www.bloglovin.com tcp
FR 142.250.179.99:443 ssl.gstatic.com tcp
US 8.8.8.8:53 www.bhcosmetics.com udp
US 52.216.60.241:443 ambassador-api.s3.amazonaws.com tcp
US 172.67.199.136:80 www.bhcosmetics.com tcp
SG 118.139.179.30:80 www.linkwithin.com tcp
US 8.8.8.8:53 ad.linksynergy.com udp
FR 142.250.178.142:443 developers.google.com tcp
US 35.212.66.39:80 ad.linksynergy.com tcp
US 35.212.66.39:80 ad.linksynergy.com tcp
US 35.212.66.39:80 ad.linksynergy.com tcp
US 8.8.8.8:53 www.revolutionbeauty.com udp
FR 216.58.215.33:443 4.bp.blogspot.com udp
US 104.19.147.50:443 www.revolutionbeauty.com tcp
US 8.8.8.8:53 lh3.googleusercontent.com udp
FR 142.250.179.78:443 apis.google.com udp
FR 142.250.179.99:443 ssl.gstatic.com udp
FR 142.250.179.97:443 lh3.googleusercontent.com tcp
US 35.212.66.39:443 ad.linksynergy.com tcp
US 8.8.8.8:53 images.julep.com udp
US 35.212.66.39:443 ad.linksynergy.com tcp
US 35.212.66.39:443 ad.linksynergy.com tcp
US 8.8.8.8:53 images.brandbacker.com udp
US 8.8.8.8:53 170.20.217.172.in-addr.arpa udp
US 8.8.8.8:53 82.15.177.108.in-addr.arpa udp
US 8.8.8.8:53 169.74.67.172.in-addr.arpa udp
US 8.8.8.8:53 84.71.125.74.in-addr.arpa udp
US 8.8.8.8:53 142.178.250.142.in-addr.arpa udp
US 8.8.8.8:53 99.179.250.142.in-addr.arpa udp
US 8.8.8.8:53 136.199.67.172.in-addr.arpa udp
US 8.8.8.8:53 241.60.216.52.in-addr.arpa udp
US 8.8.8.8:53 39.66.212.35.in-addr.arpa udp
US 8.8.8.8:53 50.147.19.104.in-addr.arpa udp
US 8.8.8.8:53 195.20.217.172.in-addr.arpa udp
US 8.8.8.8:53 15.39.65.18.in-addr.arpa udp
US 104.26.12.230:80 images.brandbacker.com tcp
US 216.239.38.178:80 www.google-analytics.com tcp
US 8.8.8.8:53 googleads.g.doubleclick.net udp
FR 142.250.75.226:443 googleads.g.doubleclick.net tcp
US 8.8.8.8:53 97.179.250.142.in-addr.arpa udp
US 8.8.8.8:53 230.12.26.104.in-addr.arpa udp
US 8.8.8.8:53 23.149.64.172.in-addr.arpa udp
US 8.8.8.8:53 178.38.239.216.in-addr.arpa udp
US 8.8.8.8:53 226.75.250.142.in-addr.arpa udp
US 8.8.8.8:53 static.ebates.ca udp
US 8.8.8.8:53 149.220.183.52.in-addr.arpa udp
N/A 224.0.0.251:5353 udp
US 8.8.8.8:53 13.86.106.20.in-addr.arpa udp
FR 142.250.179.98:445 pagead2.googlesyndication.com tcp
FR 142.250.179.98:139 pagead2.googlesyndication.com tcp
US 8.8.8.8:53 50.23.12.20.in-addr.arpa udp
US 8.8.8.8:53 206.23.85.13.in-addr.arpa udp
US 8.8.8.8:53 107.12.20.2.in-addr.arpa udp
US 8.8.8.8:53 play.google.com udp
FR 216.58.214.174:443 play.google.com tcp
US 8.8.8.8:53 174.214.58.216.in-addr.arpa udp
FR 172.217.20.163:445 fonts.gstatic.com tcp
FR 172.217.20.163:139 fonts.gstatic.com tcp
US 8.8.8.8:53 134.130.81.91.in-addr.arpa udp
FR 216.58.214.169:443 resources.blogblog.com udp
US 8.8.8.8:53 www.blogblog.com udp
FR 216.58.214.169:445 www.blogblog.com tcp
US 8.8.8.8:53 www.blogblog.com udp
US 8.8.8.8:53 www.blogger.com udp
FR 216.58.214.169:445 www.blogger.com tcp
US 8.8.8.8:53 www.blogger.com udp
US 8.8.8.8:53 11.227.111.52.in-addr.arpa udp
US 8.8.8.8:53 www.google.com udp
FR 172.217.20.164:445 www.google.com tcp
US 8.8.8.8:53 www.google.com udp
US 8.8.8.8:53 84.65.42.20.in-addr.arpa udp

Files

C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad\settings.dat

MD5 61cef8e38cd95bf003f5fdd1dc37dae1
SHA1 11f2f79ecb349344c143eea9a0fed41891a3467f
SHA256 ae671613623b4477fbd5daf1fd2d148ae2a09ddcc3804b2b6d4ffcb60b317e3e
SHA512 6fb9b333fe0e8fde19fdd0bd01a1990a4e60a87c0a02bc8297da1206e42f8690d06b030308e58c862e9e77714a585eed7cc1627590d99a10aeb77fc0dd3d864d

\??\pipe\LOCAL\crashpad_4884_CZKSKUYTQGIKRFSR

MD5 d41d8cd98f00b204e9800998ecf8427e
SHA1 da39a3ee5e6b4b0d3255bfef95601890afd80709
SHA256 e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855
SHA512 cf83e1357eefb8bdf1542850d66d8007d620e4050b5715dc83f4a921d36ce9ce47d0d13c5d85f2b0ff8318d2877eec2f63b931bd47417a81a538327af927da3e

C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad\settings.dat

MD5 0a9dc42e4013fc47438e96d24beb8eff
SHA1 806ab26d7eae031a58484188a7eb1adab06457fc
SHA256 58d66151799526b3fa372552cd99b385415d9e9a119302b99aadc34dd51dd151
SHA512 868d6b421ae2501a519595d0c34ddef25b2a98b082c5203da8349035f1f6764ddf183197f1054e7e86a752c71eccbc0649e515b63c55bc18cf5f0592397e258f

C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Preferences

MD5 dfa718a1d58f9891c000ff8f91ed4b1d
SHA1 1cb3486ca906a4c0b34e9d89e71286730dcabd29
SHA256 4f2bbe6c4fd9d599b8d07e080951ad7f4a992879dd313df8fcfbbb676341f748
SHA512 9ab82c8e7cd94e2d0060e07d89b560cda70731713dbea871b53f94218035c20adf677be53b5a464f43ca2cc8e0059b127f01b474eac078a40d84ae74ea3b4ce9

C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Local State

MD5 af9b0e6db15ce6b925eab5ac2b5fb095
SHA1 0521bc074bd25aa62fe7d2a78833ce44062276cb
SHA256 fd545fb3ef1f78b86bbbc8b57f175c06470dc0019df3a0d7b6fe8c7c51cbcf48
SHA512 34b5df8ae99f3b907fa5067925dee8b958559a7e0706c8ce65c1bf98a5081f7c796093ac2cfd33efc36474e7c6178ae96be33ecbe1519f2162ac3f0620d5afd9

C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Preferences

MD5 b3fdee9db80de55dbdefca5d662c02a5
SHA1 b37e3b91e17d3d0c863475c0e66ef6f904d180b0
SHA256 6d47a0e48ead3a00ac924051481a214d4b216af6ce715fc61ecb308aeddaba91
SHA512 a5af37e25d2622e3f99603ffe9be36d9376db3c1cf82bbfba28961e8df34712c3e95e119833b69bb0b018b328d8c543760555df5832d7b50776ba73d4c9b4e0f

C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index

MD5 950cca886a5aed96e77f20afb36ec1c3
SHA1 fe663872579186388a1e8f1c5a198977e1039550
SHA256 9ce00087959b04e05ec8022c04de10686856f07bca34ce899ec28aedb9efc06c
SHA512 2fbb919a2ac10c47183535f993f448b23b499a9715ac08bd6fea53bbf946faaa4796fbafdf8a7033df6cb7153acbfae4fa11869f5ee0cdb5e3866cb83175826b

C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Network Persistent State

MD5 c03c6b7060bf569e9a2cb397813be313
SHA1 5bd92438d9f8962d2a58e6dffac6bd35cca444bb
SHA256 42761499ae6ba1a0bb2308417ad9b2c4ca1255b3fcda46b903c018ea78328e19
SHA512 85bd68c5e58d2c310457a6312a0a9d7e8ec29dbfbd918f520b259020222091111f11d84afa62a32ac36664357f20dd70621974549b323e823246e2849a60f871