Malware Analysis Report

2025-04-03 14:23

Sample ID 241214-kmltysymaj
Target edf21d944cfc07df30af3b018b1991d0_JaffaCakes118
SHA256 0fca5fedceba6f38063d13eb4b94c24f804fb90477010ec86d55419edd3161c4
Tags
socgholish discovery downloader
score
10/10

Table of Contents

Analysis Overview

MITRE ATT&CK

Enterprise Matrix V15

Analysis: static1

Detonation Overview

Signatures

Analysis: behavioral1

Detonation Overview

Command Line

Signatures

Processes

Network

Files

Analysis: behavioral2

Detonation Overview

Command Line

Signatures

Processes

Network

Files

Analysis Overview

score
10/10

SHA256

0fca5fedceba6f38063d13eb4b94c24f804fb90477010ec86d55419edd3161c4

Threat Level: Known bad

The file edf21d944cfc07df30af3b018b1991d0_JaffaCakes118 was found to be: Known bad.

Malicious Activity Summary

socgholish discovery downloader

SocGholish

Socgholish family

System Location Discovery: System Language Discovery

Browser Information Discovery

Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary

Modifies Internet Explorer settings

Suspicious use of WriteProcessMemory

Enumerates system info in registry

Suspicious use of SendNotifyMessage

Suspicious use of FindShellTrayWindow

Suspicious use of SetWindowsHookEx

Suspicious behavior: EnumeratesProcesses

MITRE ATT&CK

Analysis: static1

Detonation Overview

Reported

2024-12-14 08:43

Signatures

N/A

Analysis: behavioral1

Detonation Overview

Submitted

2024-12-14 08:43

Reported

2024-12-14 08:45

Platform

win7-20240708-en

Max time kernel

145s

Max time network

146s

Command Line

"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\edf21d944cfc07df30af3b018b1991d0_JaffaCakes118.html

Signatures

SocGholish

downloader socgholish

Socgholish family

socgholish

System Location Discovery: System Language Discovery

discovery
Description Indicator Process Target
Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE N/A

Modifies Internet Explorer settings

adware spyware
Description Indicator Process Target
Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Main C:\Program Files\Internet Explorer\iexplore.exe N/A
Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser C:\Program Files\Internet Explorer\iexplore.exe N/A
Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Zoom C:\Program Files\Internet Explorer\iexplore.exe N/A
Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\DomainSuggestion C:\Program Files\Internet Explorer\iexplore.exe N/A
Set value (int) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "440327655" C:\Program Files\Internet Explorer\iexplore.exe N/A
Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\InternetRegistry C:\Program Files\Internet Explorer\iexplore.exe N/A
Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\LowRegistry C:\Program Files\Internet Explorer\iexplore.exe N/A
Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Toolbar C:\Program Files\Internet Explorer\iexplore.exe N/A
Set value (int) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{70DC5011-B9F7-11EF-9CB4-D238DC34531D} = "0" C:\Program Files\Internet Explorer\iexplore.exe N/A
Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch C:\Program Files\Internet Explorer\iexplore.exe N/A
Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Main C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE N/A
Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage C:\Program Files\Internet Explorer\iexplore.exe N/A
Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\GPU C:\Program Files\Internet Explorer\iexplore.exe N/A
Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage C:\Program Files\Internet Explorer\iexplore.exe N/A
Set value (str) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" C:\Program Files\Internet Explorer\iexplore.exe N/A
Set value (data) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 C:\Program Files\Internet Explorer\iexplore.exe N/A
Set value (int) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" C:\Program Files\Internet Explorer\iexplore.exe N/A
Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain C:\Program Files\Internet Explorer\iexplore.exe N/A
Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\PageSetup C:\Program Files\Internet Explorer\iexplore.exe N/A
Set value (int) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" C:\Program Files\Internet Explorer\iexplore.exe N/A
Set value (int) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" C:\Program Files\Internet Explorer\iexplore.exe N/A
Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic C:\Program Files\Internet Explorer\iexplore.exe N/A
Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\IntelliForms C:\Program Files\Internet Explorer\iexplore.exe N/A
Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery C:\Program Files\Internet Explorer\iexplore.exe N/A
Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\SearchScopes C:\Program Files\Internet Explorer\iexplore.exe N/A
Set value (data) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 60af535e044edb01 C:\Program Files\Internet Explorer\iexplore.exe N/A
Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive C:\Program Files\Internet Explorer\iexplore.exe N/A
Set value (str) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" C:\Program Files\Internet Explorer\iexplore.exe N/A
Set value (int) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" C:\Program Files\Internet Explorer\iexplore.exe N/A
Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE N/A
Set value (str) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE N/A
Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing C:\Program Files\Internet Explorer\iexplore.exe N/A
Set value (int) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" C:\Program Files\Internet Explorer\iexplore.exe N/A
Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\IETld\LowMic C:\Program Files\Internet Explorer\iexplore.exe N/A
Set value (data) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb010000007a944a4ab9c74f4482cc3bfcfab164360000000002000000000010660000000100002000000093076aec633c92aca7f10b07247cc776aae8bdbde9feff6c80d2244e43b78e3d000000000e8000000002000020000000a8c8f834e1d22ee8c04c5fc9e4df637e128bf076e7bbdb0e29b8be6eef48a79b20000000965c293f4612584ffe83b99bd4eab138d359451e6fd6031afab334020e3e0ba240000000af191c29eb6f66eaa098df8d8969e145e4b0786b92474572157c44ce8d03e2dda409af304ce3fbc479ec3f2c6beef161f69eaefdcc7262056477384706ca495f C:\Program Files\Internet Explorer\iexplore.exe N/A
Set value (data) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 C:\Program Files\Internet Explorer\iexplore.exe N/A

Suspicious use of FindShellTrayWindow

Description Indicator Process Target
N/A N/A C:\Program Files\Internet Explorer\iexplore.exe N/A

Processes

C:\Program Files\Internet Explorer\iexplore.exe

"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\edf21d944cfc07df30af3b018b1991d0_JaffaCakes118.html

C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE

"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2360 CREDAT:275457 /prefetch:2

Network

Country Destination Domain Proto
US 8.8.8.8:53 www.blogger.com udp
US 8.8.8.8:53 ajax.googleapis.com udp
US 8.8.8.8:53 resources.blogblog.com udp
US 8.8.8.8:53 4.bp.blogspot.com udp
US 8.8.8.8:53 badge.facebook.com udp
US 8.8.8.8:53 i41.tinypic.com udp
US 8.8.8.8:53 www.linkwithin.com udp
US 8.8.8.8:53 apis.google.com udp
US 8.8.8.8:53 connect.facebook.net udp
US 8.8.8.8:53 www.indiblogger.in udp
US 8.8.8.8:53 www.getfreebl.com udp
US 8.8.8.8:53 www.morevisits.info udp
US 8.8.8.8:53 www.counters4u.com udp
US 8.8.8.8:53 www.blogtopsites.com udp
US 8.8.8.8:53 www.topblogging.com udp
US 8.8.8.8:53 www.india-blogger.com udp
FR 216.58.214.169:443 resources.blogblog.com tcp
FR 216.58.214.169:443 resources.blogblog.com tcp
NL 157.240.201.17:80 badge.facebook.com tcp
IN 139.59.34.152:80 www.indiblogger.in tcp
SG 118.139.179.30:80 www.linkwithin.com tcp
FR 216.58.214.169:443 resources.blogblog.com tcp
FR 142.250.179.78:443 apis.google.com tcp
FR 216.58.214.169:443 resources.blogblog.com tcp
FR 216.58.214.169:443 resources.blogblog.com tcp
IN 139.59.34.152:80 www.indiblogger.in tcp
FR 142.250.179.78:443 apis.google.com tcp
FR 142.250.201.170:80 ajax.googleapis.com tcp
NL 157.240.201.17:80 badge.facebook.com tcp
SG 118.139.179.30:80 www.linkwithin.com tcp
FR 142.250.201.170:80 ajax.googleapis.com tcp
FR 216.58.215.33:80 4.bp.blogspot.com tcp
FR 216.58.215.33:80 4.bp.blogspot.com tcp
US 44.219.174.59:80 www.blogtopsites.com tcp
US 44.219.174.59:80 www.blogtopsites.com tcp
US 104.21.95.245:80 www.getfreebl.com tcp
US 104.21.95.245:80 www.getfreebl.com tcp
US 104.21.50.72:80 www.morevisits.info tcp
US 104.21.50.72:80 www.morevisits.info tcp
US 172.67.214.163:80 www.counters4u.com tcp
US 172.67.214.163:80 www.counters4u.com tcp
US 15.197.204.56:80 www.india-blogger.com tcp
US 15.197.204.56:80 www.india-blogger.com tcp
US 172.67.210.120:80 www.topblogging.com tcp
US 172.67.210.120:80 www.topblogging.com tcp
NL 157.240.201.15:80 connect.facebook.net tcp
NL 157.240.201.15:80 connect.facebook.net tcp
NL 157.240.201.17:443 badge.facebook.com tcp
US 104.21.50.72:443 www.morevisits.info tcp
NL 157.240.201.15:443 connect.facebook.net tcp
US 8.8.8.8:53 c.pki.goog udp
FR 142.250.179.67:80 c.pki.goog tcp
FR 142.250.179.67:80 c.pki.goog tcp
FR 142.250.179.67:80 c.pki.goog tcp
FR 142.250.179.67:80 c.pki.goog tcp
FR 142.250.179.67:80 c.pki.goog tcp
FR 142.250.179.67:80 c.pki.goog tcp
FR 142.250.179.67:80 c.pki.goog tcp
FR 142.250.179.67:80 c.pki.goog tcp
FR 142.250.179.67:80 c.pki.goog tcp
FR 142.250.179.67:80 c.pki.goog tcp
FR 142.250.179.67:80 c.pki.goog tcp
FR 142.250.179.67:80 c.pki.goog tcp
FR 142.250.179.67:80 c.pki.goog tcp
FR 142.250.179.67:80 c.pki.goog tcp
FR 142.250.179.67:80 c.pki.goog tcp
IN 139.59.34.152:443 www.indiblogger.in tcp
US 8.8.8.8:53 o.pki.goog udp
FR 142.250.179.67:80 o.pki.goog tcp
FR 142.250.179.67:80 o.pki.goog tcp
FR 142.250.179.67:80 o.pki.goog tcp
FR 142.250.179.67:80 o.pki.goog tcp
FR 142.250.179.67:80 o.pki.goog tcp
FR 142.250.179.67:80 o.pki.goog tcp
FR 142.250.179.67:80 o.pki.goog tcp
US 8.8.8.8:53 m.facebook.com udp
FR 142.250.179.110:80 www.google-analytics.com tcp
FR 142.250.179.110:80 www.google-analytics.com tcp
NL 157.240.201.35:443 m.facebook.com tcp
NL 157.240.201.35:443 m.facebook.com tcp
US 8.8.8.8:53 cur.cursors-4u.net udp
US 96.43.128.66:80 cur.cursors-4u.net tcp
US 96.43.128.66:80 cur.cursors-4u.net tcp
US 8.8.8.8:53 1.bp.blogspot.com udp
US 8.8.8.8:53 i52.tinypic.com udp
US 8.8.8.8:53 3.bp.blogspot.com udp
US 8.8.8.8:53 r11.o.lencr.org udp
FR 216.58.215.33:80 3.bp.blogspot.com tcp
FR 216.58.215.33:80 3.bp.blogspot.com tcp
FR 216.58.215.33:80 3.bp.blogspot.com tcp
FR 216.58.215.33:80 3.bp.blogspot.com tcp
GB 88.221.134.81:80 r11.o.lencr.org tcp
US 96.43.128.66:443 cur.cursors-4u.net tcp
US 96.43.128.66:443 cur.cursors-4u.net tcp
US 96.43.128.66:443 cur.cursors-4u.net tcp
US 96.43.128.66:443 cur.cursors-4u.net tcp
US 8.8.8.8:53 crl.microsoft.com udp
GB 88.221.134.146:80 crl.microsoft.com tcp
US 8.8.8.8:53 www.microsoft.com udp
GB 95.100.245.144:80 www.microsoft.com tcp
US 8.8.8.8:53 www.facebook.com udp
GB 163.70.151.35:443 www.facebook.com tcp
GB 163.70.151.35:443 www.facebook.com tcp
US 8.8.8.8:53 static.xx.fbcdn.net udp
US 8.8.8.8:53 scontent.xx.fbcdn.net udp
NL 157.240.201.15:443 scontent.xx.fbcdn.net tcp
NL 157.240.201.15:443 scontent.xx.fbcdn.net tcp
NL 157.240.201.15:443 scontent.xx.fbcdn.net tcp
NL 157.240.201.15:443 scontent.xx.fbcdn.net tcp
NL 157.240.201.15:443 scontent.xx.fbcdn.net tcp
NL 157.240.201.15:443 scontent.xx.fbcdn.net tcp
US 8.8.8.8:53 external.xx.fbcdn.net udp
NL 157.240.201.15:443 external.xx.fbcdn.net tcp
NL 157.240.201.15:443 external.xx.fbcdn.net tcp
NL 157.240.201.15:443 external.xx.fbcdn.net tcp
NL 157.240.201.15:443 external.xx.fbcdn.net tcp
NL 157.240.201.15:443 external.xx.fbcdn.net tcp
NL 157.240.201.15:443 external.xx.fbcdn.net tcp
US 204.79.197.200:443 ieonline.microsoft.com tcp
US 204.79.197.200:443 ieonline.microsoft.com tcp
US 204.79.197.200:443 ieonline.microsoft.com tcp

Files

C:\Users\Admin\AppData\Local\Temp\Cab9F.tmp

MD5 49aebf8cbd62d92ac215b2923fb1b9f5
SHA1 1723be06719828dda65ad804298d0431f6aff976
SHA256 b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512 bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b

C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\24BD96D5497F70B3F510A6B53CD43F3E_3A89246FB90C5EE6620004F1AE0EB0EA

MD5 3f628ea110f99d1748c186e125d75496
SHA1 5756a750a975de92e9b3897cf07030e36efc0b2a
SHA256 a8e0158346d210fe629e370d08df34970d0b5b381e9adce2f5633730290da569
SHA512 7ef696ba57de663ebe9d0d031f2d08f857091aa9891c3e1357bc001bd026db90e74bf9670841381d884298d21c9e64837f0d79c1448f5ffbc36496a38baaa966

C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\24BD96D5497F70B3F510A6B53CD43F3E_3A89246FB90C5EE6620004F1AE0EB0EA

MD5 3810dd33518fc2fbc6ff9269933e2ea2
SHA1 bf8ab88204f2ff70861b224a7789c9caf12a2ceb
SHA256 e8f358ce73574ce5c466434cfd4896ef9711a70d914480b4d877aea1ce333d5a
SHA512 be3135750c1eda9192f2faa8c096a8a354cdcdd3c1d818002896850f031e0b64385e1790103b24352367f3cc6b4d50599abbea4628ef6dc29182d96411a9a18e

C:\Users\Admin\AppData\Local\Temp\Tar14D.tmp

MD5 4ea6026cf93ec6338144661bf1202cd1
SHA1 a1dec9044f750ad887935a01430bf49322fbdcb7
SHA256 8efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA512 6c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b

C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

MD5 f8e8941272c7697507d0ac4621a2a8cc
SHA1 4b93f9cc891617ab3b5532660edae49afe3aee22
SHA256 23c8abe24dd158ac200499205b47f16538d8fbf8da63f048ddf27a5668eade29
SHA512 fd3fcd62b3071028b813d5917a43495f2931ed595194ec0205c045a3b6bc3eb4074cf6afd00b1f7325e5c03b10fbec47c8c734595882cc35edb06ef8ae40f0bb

C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\05DDC6AA91765AACACDB0A5F96DF8199

MD5 e935bc5762068caf3e24a2683b1b8a88
SHA1 82b70eb774c0756837fe8d7acbfeec05ecbf5463
SHA256 a8accfcfeb51bd73df23b91f4d89ff1a9eb7438ef5b12e8afda1a6ff1769e89d
SHA512 bed4f6f5357b37662623f1f8afed1a3ebf3810630b2206a0292052a2e754af9dcfe34ee15c289e3d797a8f33330e47c14cbefbc702f74028557ace29bf855f9e

C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\05DDC6AA91765AACACDB0A5F96DF8199

MD5 5273f1945aa75540fef455aca8b841af
SHA1 008fd3c8ab262530ae0a412469f656b29537f256
SHA256 14da358719dc8e07f67ef00ba185887843d2edf499848315c7d18f74ea2c62f9
SHA512 8a6cf71329ef0d98fcb2daf6eaf7d8b581d64efd4ba62c166da96b93c7574bc5d356fae61351b6273f43fd0f0e196fa64bd99180c19ad19d16c9fdacc4097bd1

C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

MD5 63d64099d7ff7461711a63cfc996d6d4
SHA1 fa983fc10f3b2e6c8cfb395618ce50372a22dd73
SHA256 7f568c8d0f14af941fb01b8671c41aba26ec39d1b8302802fbf091368a27b36c
SHA512 75dd4e7cf859b47d01c652dedb0e95ae75221c987cb2389b5e684a235df86a63997234a35f069c84712b295eb92808f03aafdcfde4c053d36c36bd070dc1617c

C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\DDE8B1B7E253A9758EC380BD648952AF_86F2A83F54EA52E2D59C5D2EE00149B8

MD5 19a62e275b7fe63f086f03a18bf176f8
SHA1 84795da14c5ec3b968666c3ad71c6889c914d4fe
SHA256 87cb70083778c376e19ea14e4625aef35481f5d421f9b37dc5797b5ba3d8cf10
SHA512 87a7bf079b7962ba25dd13d998db92e22c4aff83d78037c40f68c589e05ff35d3eaf17fb4eb85654d95865a9d622085fcd572fc9a9660dd17648446bf958324e

C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\DDE8B1B7E253A9758EC380BD648952AF_86F2A83F54EA52E2D59C5D2EE00149B8

MD5 9e8b40381ec852178cb50de55d344ab2
SHA1 595a2844594746cd98bc894158242434731fee4f
SHA256 56249d3daa7058f5deb832266726551c8173097161b7233cee27579088d7412d
SHA512 afcc1af245bea35522258d2e17b4eae05ba3de5685438fa12a051d459947ac9645fd969e18b8d5a9d7d69a0138e2e03d8fcede62f7735aa41c263a402caeaa00

C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\39GEHZPO\ga[1].js

MD5 e9372f0ebbcf71f851e3d321ef2a8e5a
SHA1 2c7d19d1af7d97085c977d1b69dcb8b84483d87c
SHA256 1259ea99bd76596239bfd3102c679eb0a5052578dc526b0452f4d42f8bcdd45f
SHA512 c3a1c74ac968fc2fa366d9c25442162773db9af1289adfb165fc71e7750a7e62bd22f424f241730f3c2427afff8a540c214b3b97219a360a231d4875e6ddee6f

C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

MD5 c6ad75a43ab82d237f4f66d7aff9e377
SHA1 5620e6f3abca3d5c6b666cd3fd190cb31005d658
SHA256 a55bf4ee011c5d4494892c1b8431e8a15e5055979a55cbe36601731da20bbacc
SHA512 1b1d641367c80737bb1650984d5a5f4aa6d4f1e72aade87a2f09c568fc0a4c0cdaef38320e45a0a965f51b25475fde3e267d5eac7356ad0eca26448c26e871a4

C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\F0ACCF77CDCBFF39F6191887F6D2D357

MD5 7cd92ed04a7c504df0dbfdf2aadd3cb6
SHA1 15eab24aef144570342cb353edcb7db25d398f24
SHA256 5ba773655ce17329d90f3488db4fae9c023cb7ea157d95419a558c2ee832298f
SHA512 0770e4d296f60e205b9256f888865ef1f9c476900aa9843f2129080e8a929d3a9c243e310ddc04f7d75afee78289d215f2357630df2393e0ee3266ae0ed3c82a

C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\F0ACCF77CDCBFF39F6191887F6D2D357

MD5 a266bb7dcc38a562631361bbf61dd11b
SHA1 3b1efd3a66ea28b16697394703a72ca340a05bd5
SHA256 df545bf919a2439c36983b54cdfc903dfa4f37d3996d8d84b4c31eec6f3c163e
SHA512 0da8ef4f8f6ed3d16d2bc8eb816b9e6e1345dfe2d91160196c47e6149a1d6aedaafadcefd66acdea7f72dcf0832770192ceac15b0c559c4ccc2c0e5581d5aefc

C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

MD5 e06c0f5364bcdd5020c359bbd1899b26
SHA1 4a89726e07309eb6bccb0d12b0050dd21d8c9eab
SHA256 8566e63da276ee3aa0fb64254cde992d1bcbb00de3bc5343a5d388e8fb7c9a59
SHA512 47504b0bc87ccb7104cfe42d21f6044bf346f048454c59fe0658d03cfa1b5265cef65ba6a8882cb613b719a19fa46c12e28ae8f700817b4ee5a69e10d601fad9

C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

MD5 7a29b0b870de17611bcd37177bc92928
SHA1 0f2c6add026e44d7dcf38a065dca111ce1b3c8ef
SHA256 0ccb9d3dc0c0785737c9aa96abb796b0035ba534d302238f1ac5e8d6dfde4170
SHA512 0277b8d9d07fa518a65fdffec9d81ca712bcb6d01dfc59102f871a1afeb75da957034520ab898ff3652509201141872ae5b978328b6fd0fb9e8599fc51bec1b5

C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

MD5 ef29f8750239c96b63c1f96aaf7290a5
SHA1 667dc5f2206dac3e6dfbe5711a072e1d1894beb3
SHA256 b1444f83cf18723781723b2a8084b084e07f3d0a2d00ab22d230c36ef71e1b34
SHA512 8997c78bf34673469392add3f9c7796441ec4a2df2c4495f0e1101cd1af091f68a3708192468c49f2c9fe20c14fe1a84f36b0a983d8f2583318c18b292b2a7bb

C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

MD5 33574fb875c91517ba08bfa81571f2e4
SHA1 63c022bf6cb3e263fcf37d625f5ff6ca5a537703
SHA256 d3488d3ac1e13af0105a40a69e37d1430e90c9703ec898f646a89b0488764ee4
SHA512 db1c652e64cb87bed7b97e5cb9360bad85c495c0c40da27ab5a048d9ca6778252f243a4943742df02ecaae377111056e5aa953f19aae22c8cd0413b7f64d4a10

C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

MD5 03a64a62a6f18aff1c2573f861fa6b4c
SHA1 e435ecbf2041aa654efb9f15c152cef4d32b55b0
SHA256 f5bbd53efacd44be0cb9fbe809982a6dcf81452114d14dc97077afff76ee0082
SHA512 8e7817553ffad1712b467eb0169ae66486ce6cbf59ddcd150fa3759209607537b679b9bb251a2db00ade2dcf697d3585ce5afd794169cabec88dac062cd703ee

C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

MD5 a4c0feb5cac5f5902b46136bfc7a60be
SHA1 a335e7745221f17555193c953d7171059eba7252
SHA256 f31b6cef508126f1446a83b6c5839e9b669c61acba6560fd00371550385bee4b
SHA512 d3a3f576d69e6c424044826aff3d7bfecccd0029a4c780e0a0a371e9413bc758cf088d25bcd8d5c0ebb1244cb1d087fef58306e00bb37b06e033c28c2220791b

C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\3C428B1A3E5F57D887EC4B864FAC5DCC

MD5 f1989990e2a44687f675a5096c13946a
SHA1 479570bfe03881609d54414b327b93cc1f000ac5
SHA256 3b30ad3cd59d5970f7016652d38a55e618bf7496d5f1902937030b1e7cdf4405
SHA512 a05195c21a533b4bffaa0f40b5b9ddbfd87d72ade9bd3f63c90a3cd78471a5aca210e3092d9538b5893e3658d7b5870f2b5b8a8224dc5f4b76eddbf9d36d5c0f

C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\3C428B1A3E5F57D887EC4B864FAC5DCC

MD5 e4a68ac854ac5242460afd72481b2a44
SHA1 df3c24f9bfd666761b268073fe06d1cc8d4f82a4
SHA256 cb3ccbb76031e5e0138f8dd39a23f9de47ffc35e43c1144cea27d46a5ab1cb5f
SHA512 5622207e1ba285f172756f6019af92ac808ed63286e24dfecc1e79873fb5d140f1ceb7133f2476e89a5f75f711f9813a9fbb8fd5287f64adfdcc53b864f9bdc5

C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

MD5 23365f1716474f9b67e59e22cefe50e4
SHA1 334c85e4a553501972e66672eeac54c797e00875
SHA256 d4d148d6a7caad74bd0a74d94f2435567611a1f8e05c5658bf7f4d0c3e6f7f7f
SHA512 20070c7b323f0b194c7c2b81dc095334f3b43b335691416391a3c713fa5660741ec7a700d2b9c330bc8b3c409297e9ab6448c690d1d0af4c13addea807cc88ce

C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

MD5 24c40c7a0412e8c04bdf5950e556494b
SHA1 e9e39f3fb5fd73f7e74b4805ef3c67f42c3306df
SHA256 3e9e7d33f594d3265badd022be556c6670284cbc098c2a84710babb34ce2e3d7
SHA512 2917836ff7836bbe81d2d4f7fbe8a23f08d8098061a49f2ad5a0098abd0e40e613fda6eb5d1956336e17800e4dda327e3adc622db6fcf0405ce3984775247870

C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

MD5 77a87452b5f8b305a94102d2126dd929
SHA1 eeb93459e73f9670bc94934821ae2b89680ecced
SHA256 5f90aa3af3b6a8792da6c40c89e93768a199efd21ff6e8b8ac04181af5a5d8b0
SHA512 8c1ba2e0f6a53e8539dc3bc4b01a1930909ea60ceafbba233bb15a19cce23e065f4ccadd804fa5ba6c8d3f3f3abc802e7619ed01ba6e28e32313bab652fb7b54

C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

MD5 b550355aff3b68fbb756e578505ece3f
SHA1 83d429099eb6b77b36f40d72f799ab65828eebd8
SHA256 9d74b663cb91757a6769a7407aabfa58287e072687f5760b91618947a14194bb
SHA512 99fc58005ebd6e92deba2e5947545e6b7a74e8fe018d3ba9c1aef4b9502ed0a103531fd11a17f2b6e8e96ea2881961c514d24cdf142cb91009f78745a9368d69

C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

MD5 d988c5d57429da3c45bfb81fe5e17a46
SHA1 5e31e68f98552fe8518fc7846bbd9f74f865653a
SHA256 8587d71f8457eb533cd00bfb8f7992a4b07773c046e2267546cbc3631601ea9c
SHA512 1067118f529d09491107956137c3f792e80fc6031834dc088e3a698a963fbe85bad43530b62807369b01d40383ec76af595368f5586047ec5391b155dd12783a

C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

MD5 37b0c44b769dee21f8b1102c1778fe74
SHA1 74b4ee8fff9bfaaf2ae3dc8a888c2fa5203c8fa9
SHA256 42c8a24407343fc801a66321fa280d97cb64590b6c61e9f23c2cb114585a2c3b
SHA512 1cb4c699548f88cbfd46b56e731b92deef67e50bdb72e1fb43678058c647a8785faa8580b54046b7c24e235465410598041ac2269b3e5c5ce613508385d5e177

C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

MD5 b5248e71c81f660c4d8a9e32d058312d
SHA1 a9576102cb63d6c2670396c062bd965f7a63592b
SHA256 10f53ec2d454b4b84d2e89f7074e20928674d74ddf5fb28a31fe33a91af2d0bc
SHA512 34cb8a64a2a9e68101b54f4c78e54b6ec022b554d41869ae6f3c72ccca89db5258e7eff219a54aea5b195e5e2a31e57fd8dcd6fbe66c1f9b7d7954c7e2dbc32b

C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

MD5 bea8339e0484d5a47f66d811a12581f6
SHA1 cdfcc34b662ae5b6e97cdccf27011372a4389da7
SHA256 03172c5309ce2d4677e66073f9bb81df25b76f58ce699899a35e64101b29192b
SHA512 808206184f317382a5d4b10195dbe940e06a33449e4e4b0357e45f5dbd11f1b8305840df3ca14d1cdcaccadc15fec6235edfc21608532528f6281857e635c426

C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

MD5 7e7a949d603a361329b4af4ad39cf9cf
SHA1 e3717defb9c386a115e36dc871b92d438e5c83da
SHA256 2feb187a7daf73eb6963bf0cf66ac884d039b89242d2601261ab4c8e182d2b48
SHA512 63af5a768f941bbe80aeb55c6badd4d61ca8baf7972bac87d744ec1af64974d152bdaf8bdd65e11a46ec7ff8f1b2387e9886280b0a7c18d305472d272e0e3493

C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

MD5 88adbd508f07fa68d39ab4566a66c440
SHA1 95efae8b9b827fbd1c28b6d02a32b48b238102bd
SHA256 e0652f9315bef062400a2a81beae96690a9d76ae7b54911c2c79f36acb54e1e2
SHA512 236e48ae09f5ceaf2be49475ff0c5b42e9b5230526d61fbdebf632ba0655281053afd4f4da0fa8709cca8abe45ded1bc5d1db76f84473f9b223f03b5c41d3b68

C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

MD5 7b9f36cd475cd20f8537114756af043e
SHA1 5ec5d775aec16a5bb78e2aee2375833accc10501
SHA256 63967c1eab176d669e6e2b79a94fb67a39bf4951aa51f1c097260e1d10aaf6ec
SHA512 0a0384659f0342b1e60607ea97647e6af541f8229462958cc09a4522c33cb0d9a7320a64b25b82d94b9ab66f0b28ead4b7298bda47b39b51bb67ec00d2c92b62

C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

MD5 1d352e2940c3baf692f0214026523c13
SHA1 a717b5e909ad4afd870e665788a15ac66ef7cee8
SHA256 7bbe6361b5d8e038f915ea46cfd8667347f88d06e17cd6060cc81ba72a4a3b24
SHA512 69b0e6e9d4be31377a3ddf17b11201733b87bf51066ccc01c04f03c84501e4746f8ec0ac53010ed658ac49c43ef171e8ddd20e06f3873cae8a9f7a5be1a30369

C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

MD5 aebfa31d5da728b2b4aa265eb3e57629
SHA1 b6c1e3c21ebd129b73183f3a51fbfb09eb9a3a51
SHA256 2df172c5888bd45936ad8ae48d5e86db94be5d051ee3ac057a6222ad67f6864e
SHA512 08e13731d2d995c2a789d0615a249b38b72af40b4ddc299ec5e70bb6d2d50e19c032da7a05841003a61fd68d9c6bb5edb3c74b754d33af713438c595950d8526

C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

MD5 ed2c0c4affb9b9b94fc0b0489a4b90d7
SHA1 26b38c3e2a774fb0d04f053031282473c0070b9e
SHA256 0dc6896d7f314bb97296dc7f602f89ed504d54dd943b3e0266b439adcfb74745
SHA512 712bb1d02bce8661471de3b669d8c92500bcf3197645f738897505160e2b4927480b205cf598b0b386367ed76336e41d7eecb64e4d58fa43cc3b6fba931852a6

Analysis: behavioral2

Detonation Overview

Submitted

2024-12-14 08:43

Reported

2024-12-14 08:45

Platform

win10v2004-20241007-en

Max time kernel

145s

Max time network

138s

Command Line

"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --start-maximized --single-argument C:\Users\Admin\AppData\Local\Temp\edf21d944cfc07df30af3b018b1991d0_JaffaCakes118.html

Signatures

Browser Information Discovery

discovery

Enumerates system info in registry

Description Indicator Process Target
Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe N/A
Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe N/A
Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe N/A

Suspicious use of FindShellTrayWindow

Description Indicator Process Target
N/A N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe N/A
N/A N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe N/A
N/A N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe N/A
N/A N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe N/A
N/A N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe N/A
N/A N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe N/A
N/A N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe N/A
N/A N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe N/A
N/A N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe N/A
N/A N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe N/A
N/A N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe N/A
N/A N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe N/A
N/A N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe N/A
N/A N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe N/A
N/A N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe N/A
N/A N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe N/A
N/A N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe N/A
N/A N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe N/A
N/A N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe N/A
N/A N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe N/A
N/A N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe N/A
N/A N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe N/A
N/A N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe N/A
N/A N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe N/A
N/A N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe N/A

Suspicious use of SendNotifyMessage

Description Indicator Process Target
N/A N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe N/A
N/A N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe N/A
N/A N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe N/A
N/A N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe N/A
N/A N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe N/A
N/A N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe N/A
N/A N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe N/A
N/A N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe N/A
N/A N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe N/A
N/A N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe N/A
N/A N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe N/A
N/A N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe N/A
N/A N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe N/A
N/A N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe N/A
N/A N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe N/A
N/A N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe N/A
N/A N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe N/A
N/A N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe N/A
N/A N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe N/A
N/A N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe N/A
N/A N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe N/A
N/A N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe N/A
N/A N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe N/A
N/A N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe N/A

Suspicious use of WriteProcessMemory

Description Indicator Process Target
PID 3292 wrote to memory of 2712 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 3292 wrote to memory of 2712 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 3292 wrote to memory of 4640 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 3292 wrote to memory of 4640 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 3292 wrote to memory of 4640 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 3292 wrote to memory of 4640 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 3292 wrote to memory of 4640 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 3292 wrote to memory of 4640 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 3292 wrote to memory of 4640 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 3292 wrote to memory of 4640 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 3292 wrote to memory of 4640 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 3292 wrote to memory of 4640 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 3292 wrote to memory of 4640 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 3292 wrote to memory of 4640 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 3292 wrote to memory of 4640 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 3292 wrote to memory of 4640 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 3292 wrote to memory of 4640 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 3292 wrote to memory of 4640 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 3292 wrote to memory of 4640 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 3292 wrote to memory of 4640 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 3292 wrote to memory of 4640 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 3292 wrote to memory of 4640 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 3292 wrote to memory of 4640 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 3292 wrote to memory of 4640 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 3292 wrote to memory of 4640 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 3292 wrote to memory of 4640 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 3292 wrote to memory of 4640 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 3292 wrote to memory of 4640 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 3292 wrote to memory of 4640 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 3292 wrote to memory of 4640 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 3292 wrote to memory of 4640 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 3292 wrote to memory of 4640 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 3292 wrote to memory of 4640 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 3292 wrote to memory of 4640 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 3292 wrote to memory of 4640 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 3292 wrote to memory of 4640 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 3292 wrote to memory of 4640 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 3292 wrote to memory of 4640 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 3292 wrote to memory of 4640 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 3292 wrote to memory of 4640 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 3292 wrote to memory of 4640 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 3292 wrote to memory of 4640 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 3292 wrote to memory of 3008 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 3292 wrote to memory of 3008 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 3292 wrote to memory of 3560 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 3292 wrote to memory of 3560 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 3292 wrote to memory of 3560 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 3292 wrote to memory of 3560 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 3292 wrote to memory of 3560 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 3292 wrote to memory of 3560 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 3292 wrote to memory of 3560 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 3292 wrote to memory of 3560 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 3292 wrote to memory of 3560 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 3292 wrote to memory of 3560 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 3292 wrote to memory of 3560 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 3292 wrote to memory of 3560 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 3292 wrote to memory of 3560 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 3292 wrote to memory of 3560 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 3292 wrote to memory of 3560 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 3292 wrote to memory of 3560 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 3292 wrote to memory of 3560 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 3292 wrote to memory of 3560 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 3292 wrote to memory of 3560 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 3292 wrote to memory of 3560 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe

Processes

C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe

"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --start-maximized --single-argument C:\Users\Admin\AppData\Local\Temp\edf21d944cfc07df30af3b018b1991d0_JaffaCakes118.html

C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe

"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xb4,0x108,0x7fffe16a46f8,0x7fffe16a4708,0x7fffe16a4718

C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe

"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2240,2889097042442594805,7758849063780976219,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2244 /prefetch:2

C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe

"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2240,2889097042442594805,7758849063780976219,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2296 /prefetch:3

C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe

"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2240,2889097042442594805,7758849063780976219,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2752 /prefetch:8

C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe

"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2240,2889097042442594805,7758849063780976219,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3236 /prefetch:1

C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe

"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2240,2889097042442594805,7758849063780976219,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3256 /prefetch:1

C:\Windows\System32\CompPkgSrv.exe

C:\Windows\System32\CompPkgSrv.exe -Embedding

C:\Windows\System32\CompPkgSrv.exe

C:\Windows\System32\CompPkgSrv.exe -Embedding

C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe

"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2240,2889097042442594805,7758849063780976219,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4728 /prefetch:1

C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe

"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2240,2889097042442594805,7758849063780976219,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4896 /prefetch:1

C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe

"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2240,2889097042442594805,7758849063780976219,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4956 /prefetch:1

C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe

"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2240,2889097042442594805,7758849063780976219,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5940 /prefetch:8

C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe

"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2240,2889097042442594805,7758849063780976219,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5940 /prefetch:8

C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe

"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2240,2889097042442594805,7758849063780976219,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5452 /prefetch:1

C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe

"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2240,2889097042442594805,7758849063780976219,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5384 /prefetch:1

C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe

"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2240,2889097042442594805,7758849063780976219,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=13 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5648 /prefetch:1

C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe

"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2240,2889097042442594805,7758849063780976219,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=14 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=2452 /prefetch:1

C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe

"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2240,2889097042442594805,7758849063780976219,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=5860 /prefetch:2

Network

Country Destination Domain Proto
US 8.8.8.8:53 8.8.8.8.in-addr.arpa udp
US 8.8.8.8:53 196.249.167.52.in-addr.arpa udp
US 8.8.8.8:53 www.blogger.com udp
US 8.8.8.8:53 ajax.googleapis.com udp
US 8.8.8.8:53 apis.google.com udp
FR 142.250.201.170:80 ajax.googleapis.com tcp
FR 142.250.179.78:443 apis.google.com tcp
US 8.8.8.8:53 s7.addthis.com udp
FR 216.58.214.169:443 www.blogger.com tcp
FR 142.250.179.66:445 pagead2.googlesyndication.com tcp
US 8.8.8.8:53 www.linkwithin.com udp
FR 216.58.214.169:443 www.blogger.com udp
SG 118.139.179.30:80 www.linkwithin.com tcp
SG 118.139.179.30:80 www.linkwithin.com tcp
US 8.8.8.8:53 connect.facebook.net udp
US 8.8.8.8:53 4.bp.blogspot.com udp
US 8.8.8.8:53 resources.blogblog.com udp
US 8.8.8.8:53 badge.facebook.com udp
US 8.8.8.8:53 i41.tinypic.com udp
US 8.8.8.8:53 www.indiblogger.in udp
US 8.8.8.8:53 www.getfreebl.com udp
FR 216.58.215.33:80 4.bp.blogspot.com tcp
FR 216.58.215.33:80 4.bp.blogspot.com tcp
FR 216.58.215.33:80 4.bp.blogspot.com tcp
FR 142.250.179.78:443 apis.google.com udp
NL 157.240.201.17:80 badge.facebook.com tcp
FR 216.58.214.169:443 resources.blogblog.com tcp
US 8.8.8.8:53 www.morevisits.info udp
US 104.21.95.245:80 www.getfreebl.com tcp
IN 139.59.34.152:80 www.indiblogger.in tcp
NL 157.240.201.15:80 connect.facebook.net tcp
FR 216.58.215.33:80 4.bp.blogspot.com tcp
US 8.8.8.8:53 www.counters4u.com udp
US 8.8.8.8:53 cur.cursors-4u.net udp
US 104.21.50.72:80 www.morevisits.info tcp
US 8.8.8.8:53 172.210.232.199.in-addr.arpa udp
US 8.8.8.8:53 67.31.126.40.in-addr.arpa udp
US 8.8.8.8:53 170.201.250.142.in-addr.arpa udp
US 8.8.8.8:53 78.179.250.142.in-addr.arpa udp
US 8.8.8.8:53 169.214.58.216.in-addr.arpa udp
US 8.8.8.8:53 95.221.229.192.in-addr.arpa udp
US 104.21.45.131:80 www.counters4u.com tcp
NL 157.240.201.17:443 badge.facebook.com tcp
US 104.21.45.131:80 www.counters4u.com tcp
US 8.8.8.8:53 i52.tinypic.com udp
US 8.8.8.8:53 1.bp.blogspot.com udp
US 8.8.8.8:53 www.blogtopsites.com udp
SG 118.139.179.30:80 www.linkwithin.com tcp
NL 157.240.201.15:443 connect.facebook.net tcp
US 8.8.8.8:53 3.bp.blogspot.com udp
US 104.21.50.72:443 www.morevisits.info tcp
US 8.8.8.8:53 www.topblogging.com udp
FR 216.58.215.33:80 3.bp.blogspot.com tcp
US 44.219.174.59:80 www.blogtopsites.com tcp
IN 139.59.34.152:80 www.indiblogger.in tcp
FR 216.58.215.33:80 3.bp.blogspot.com tcp
US 104.21.23.102:80 www.topblogging.com tcp
US 8.8.8.8:53 static.xx.fbcdn.net udp
US 8.8.8.8:53 www.india-blogger.com udp
US 15.197.204.56:80 www.india-blogger.com tcp
FR 142.250.179.110:80 www.google-analytics.com tcp
US 96.43.128.66:80 cur.cursors-4u.net tcp
US 8.8.8.8:53 accounts.google.com udp
NL 142.250.27.84:443 accounts.google.com tcp
US 8.8.8.8:53 a.nel.cloudflare.com udp
US 35.190.80.1:443 a.nel.cloudflare.com tcp
FR 216.58.215.33:80 3.bp.blogspot.com tcp
US 96.43.128.66:443 cur.cursors-4u.net tcp
IN 139.59.34.152:443 www.indiblogger.in tcp
US 35.190.80.1:443 a.nel.cloudflare.com udp
US 8.8.8.8:53 lh3.googleusercontent.com udp
IN 139.59.34.152:443 www.indiblogger.in tcp
FR 142.250.179.78:443 apis.google.com udp
US 8.8.8.8:53 ssl.gstatic.com udp
FR 142.250.179.65:443 lh3.googleusercontent.com tcp
FR 142.250.179.99:443 ssl.gstatic.com tcp
FR 142.250.75.226:139 pagead2.googlesyndication.com tcp
US 8.8.8.8:53 33.215.58.216.in-addr.arpa udp
US 8.8.8.8:53 17.201.240.157.in-addr.arpa udp
US 8.8.8.8:53 245.95.21.104.in-addr.arpa udp
US 8.8.8.8:53 15.201.240.157.in-addr.arpa udp
US 8.8.8.8:53 72.50.21.104.in-addr.arpa udp
US 8.8.8.8:53 131.45.21.104.in-addr.arpa udp
US 8.8.8.8:53 30.179.139.118.in-addr.arpa udp
US 8.8.8.8:53 59.174.219.44.in-addr.arpa udp
US 8.8.8.8:53 102.23.21.104.in-addr.arpa udp
US 8.8.8.8:53 152.34.59.139.in-addr.arpa udp
US 8.8.8.8:53 56.204.197.15.in-addr.arpa udp
US 8.8.8.8:53 110.179.250.142.in-addr.arpa udp
US 8.8.8.8:53 66.128.43.96.in-addr.arpa udp
US 8.8.8.8:53 1.80.190.35.in-addr.arpa udp
US 8.8.8.8:53 195.20.217.172.in-addr.arpa udp
US 8.8.8.8:53 65.179.250.142.in-addr.arpa udp
US 8.8.8.8:53 84.27.250.142.in-addr.arpa udp
US 8.8.8.8:53 99.179.250.142.in-addr.arpa udp
N/A 224.0.0.251:5353 udp
US 8.8.8.8:53 241.150.49.20.in-addr.arpa udp
US 8.8.8.8:53 resources.infolinks.com udp
US 172.66.42.247:445 resources.infolinks.com tcp
US 172.66.41.9:445 resources.infolinks.com tcp
US 8.8.8.8:53 resources.infolinks.com udp
US 172.66.42.247:139 resources.infolinks.com tcp
US 8.8.8.8:53 53.210.109.20.in-addr.arpa udp
US 8.8.8.8:53 206.23.85.13.in-addr.arpa udp
US 8.8.8.8:53 play.google.com udp
FR 216.58.214.174:443 play.google.com tcp
US 8.8.8.8:53 133.130.81.91.in-addr.arpa udp
US 8.8.8.8:53 174.214.58.216.in-addr.arpa udp
FR 142.250.179.110:445 www.google-analytics.com tcp
FR 142.250.179.110:139 www.google-analytics.com tcp
US 8.8.8.8:53 172.214.232.199.in-addr.arpa udp
FR 142.250.179.66:445 pagead2.googlesyndication.com tcp
FR 142.250.75.226:139 pagead2.googlesyndication.com tcp
US 8.8.8.8:53 s7.addthis.com udp
US 8.8.8.8:53 www.facebook.com udp
GB 163.70.151.35:443 www.facebook.com tcp
US 8.8.8.8:53 static.xx.fbcdn.net udp
NL 157.240.201.15:443 static.xx.fbcdn.net tcp
NL 157.240.201.15:443 static.xx.fbcdn.net tcp
NL 157.240.201.15:443 static.xx.fbcdn.net tcp
NL 157.240.201.15:443 static.xx.fbcdn.net tcp
NL 157.240.201.15:443 static.xx.fbcdn.net tcp
NL 157.240.201.15:443 static.xx.fbcdn.net tcp
US 8.8.8.8:53 scontent.xx.fbcdn.net udp
US 8.8.8.8:53 external.xx.fbcdn.net udp
US 8.8.8.8:53 35.151.70.163.in-addr.arpa udp
US 8.8.8.8:53 www.iconj.com udp
US 74.48.172.146:80 www.iconj.com tcp
US 8.8.8.8:53 hackhacker-mohdsalim.blogspot.com udp
FR 216.58.213.65:80 hackhacker-mohdsalim.blogspot.com tcp
US 8.8.8.8:53 146.172.48.74.in-addr.arpa udp
US 8.8.8.8:53 65.213.58.216.in-addr.arpa udp
US 8.8.8.8:53 11.227.111.52.in-addr.arpa udp

Files

C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad\settings.dat

MD5 ba6ef346187b40694d493da98d5da979
SHA1 643c15bec043f8673943885199bb06cd1652ee37
SHA256 d86eec91f295dfda8ed1c5fa99de426f2fe359282c7ebf67e3a40be739475d73
SHA512 2e6cc97330be8868d4b9c53be7e12c558f6eb1ac2c4080a611ba6c43561d0c5bb4791b8a11a8c2371599f0ba73ed1d9a7a2ea6dee2ae6a080f1912e0cb1f656c

\??\pipe\LOCAL\crashpad_3292_JBEWIHGRIUXOLBGR

MD5 d41d8cd98f00b204e9800998ecf8427e
SHA1 da39a3ee5e6b4b0d3255bfef95601890afd80709
SHA256 e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855
SHA512 cf83e1357eefb8bdf1542850d66d8007d620e4050b5715dc83f4a921d36ce9ce47d0d13c5d85f2b0ff8318d2877eec2f63b931bd47417a81a538327af927da3e

C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad\settings.dat

MD5 b8880802fc2bb880a7a869faa01315b0
SHA1 51d1a3fa2c272f094515675d82150bfce08ee8d3
SHA256 467b8cd4aacac66557712f9843023dcedefcc26efc746f3e44157bc8dac73812
SHA512 e1c6dba2579357ba70de58968b167d2c529534d24bff70568144270c48ac18a48ee2af2d58d78ae741e5a36958fa78a57955bd2456f1df00b781fc1002e123d2

C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Preferences

MD5 04118fe4bfb25b0dbd4d0e7bcfb78c15
SHA1 2fb9d30ed30348d465c2e4c668999ea235346171
SHA256 ff4db2847198a48c2f2d48a9f9b7b8907704a3638d1bbf8a3a320d216fa22528
SHA512 dca44f0301e6df514b4ade1ddc39c136f8b51fac451421600431b95dfd064490c40d0fb67506d901cae3eb3e7b173816427a68048489a7ed50755a4edd660829

C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Local State

MD5 4dde9f94cf1412f589f6ba36d2150084
SHA1 94968c1179c5cdca04373e929e9aee9984bf8cbc
SHA256 d1807287184aff4d74b2f880058434ff2f6893b69a3d07e9f4668af6f8250d66
SHA512 91ce3695acddb695678b92bb3aa1dfcd39795a8d97f2e632cc46e8b81c37fb20c6c789f74950cc50930039371ca5542ef4a19d8add66fa01774f447c71297784

C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Preferences

MD5 110c3bce950ec49cdd066e496a84593c
SHA1 75359b7ab18e0ab110aa7b871ee74593cf55405b
SHA256 3fdd999f3e4bf19b2d95f25273fa6a6a291bb4c808e89b6206a10a4fe1d46e45
SHA512 86bee28110f1b9ba8f4ed05115834f0fd50c9311a65272016fdb07969cf838d6942e6cfbc3d186c1f199b775c7bcb33b49a66dbed778139182686b65879ea24d

C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index

MD5 a41fc61f13c7419b814d55082da2a9d8
SHA1 6c0f9d500f76cd80e67ea075a1525f3d977c6eac
SHA256 c422721121d61bdc64f47c203c2d35608a18484d4590b687b14c0245a1cff813
SHA512 451d513711e55b27606f3dbb2e8ac566c0670d8f6562fcfb013b31cb0f2fef4843da887dba26835aa5ad4fcb1effc57d95dc5a3af55169a8a20001f15b17a03f

C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Network Persistent State

MD5 89f19e93f6fa17e69b79d868c7406861
SHA1 427db6a99a29cdb8b4c96d1010be0bc7e6df9d51
SHA256 be5671d546b1b39844c00de3d74100f0c3698fb09acdcf5a28fb68f7ff82498b
SHA512 c8d3963881ac44448d93296c083c50624355626e1be3aea0d25e101307b496b72562ad18d9642f65e6193d002be4d759872a75a54a6f592b8a2728a76dbe2a92

C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\data_reduction_proxy_leveldb\CURRENT

MD5 206702161f94c5cd39fadd03f4014d98
SHA1 bd8bfc144fb5326d21bd1531523d9fb50e1b600a
SHA256 1005a525006f148c86efcbfb36c6eac091b311532448010f70f7de9a68007167
SHA512 0af09f26941b11991c750d1a2b525c39a8970900e98cba96fd1b55dbf93fee79e18b8aab258f48b4f7bda40d059629bc7770d84371235cdb1352a4f17f80e145

C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\data_reduction_proxy_leveldb\CURRENT

MD5 46295cac801e5d4857d09837238a6394
SHA1 44e0fa1b517dbf802b18faf0785eeea6ac51594b
SHA256 0f1bad70c7bd1e0a69562853ec529355462fcd0423263a3d39d6d0d70b780443
SHA512 8969402593f927350e2ceb4b5bc2a277f3754697c1961e3d6237da322257fbab42909e1a742e22223447f3a4805f8d8ef525432a7c3515a549e984d3eff72b23

C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Preferences

MD5 caa1eba37a8d1d97d32d190167fcc7c3
SHA1 e89152f0e5fad46654b52edfb8facdc6e85dafd0
SHA256 7c6133f7b31382740ba5dc3034cb91c90589c1e900ce8e4979d471d725bed45b
SHA512 28f1b2eb092e66db8ada9486897a5cd03fafb87f5dd0d170c8116e167bc6bd788066e21b46cd5dbf2b5f116d3f4fee694d24d8ab730b3c45e7666784c6aefa25

C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\TransportSecurity~RFe594193.TMP

MD5 532287411d1fce86fd7179bb34d801dc
SHA1 5d3489510c204f582560f23cf6c7616e7da11a14
SHA256 d8a37428292090d84d8140f13da5706d87d87ebb83f10ba569d07d246dd8ba2e
SHA512 3213776b23272b1874281ff387e287a8d19e0fa164d2a1b33a7cfe46193b637db904286d1dbe956f928c353ba35818be2197bb33231d50b9ca1b2c6b5785344c

C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\c30fdb55-5026-45cd-97d7-a557c933ac61.tmp

MD5 a80ae3bab43ac1d4bc97c1c5e27078f3
SHA1 e3899bf75bc63db48eb8c88b56280acbe6359cf4
SHA256 e2cb0d4a11003963200358597e51194aaef007cccc4375ad865c038e7f400bab
SHA512 3e35febb6d202e46d0d3824cafc9e0aa2d8511b8dc37707974fc1699edf301316dd2ac2b467ce575577c8c33901ae61b7ec4e1504e2d8b93824f4d2e9bf2336c

C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index

MD5 56cb1793e920fc6c5062a570a6999566
SHA1 f74a99707954f5e7b283706313c59ca929454f4c
SHA256 9e25d28056de334001ca840fe796ad88ace3651ef94c49810511f0b4cedfb144
SHA512 856c249e64004a8803cfcef9c0af70418c54d563266b640da11ffecdee532fb053e72febe37815514b5b0ffb7d847b17340dd8d95a6f886b4175a3586abbe7e3