Malware Analysis Report

2025-04-03 14:23

Sample ID 241215-ma8jas1lcz
Target f38952c2cf05ec8d5aabd3140775e379_JaffaCakes118
SHA256 0eb41cac7234c00fc125c548395da41159953b00780163a0ab4dc2e102aa21bf
Tags
socgholish discovery downloader
score
10/10

Table of Contents

Analysis Overview

MITRE ATT&CK

Enterprise Matrix V15

Analysis: static1

Detonation Overview

Signatures

Analysis: behavioral1

Detonation Overview

Command Line

Signatures

Processes

Network

Files

Analysis: behavioral2

Detonation Overview

Command Line

Signatures

Processes

Network

Files

Analysis Overview

score
10/10

SHA256

0eb41cac7234c00fc125c548395da41159953b00780163a0ab4dc2e102aa21bf

Threat Level: Known bad

The file f38952c2cf05ec8d5aabd3140775e379_JaffaCakes118 was found to be: Known bad.

Malicious Activity Summary

socgholish discovery downloader

SocGholish

Socgholish family

Browser Information Discovery

System Location Discovery: System Language Discovery

Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary

Suspicious use of SendNotifyMessage

Modifies Internet Explorer settings

Suspicious use of FindShellTrayWindow

Suspicious use of SetWindowsHookEx

Suspicious use of WriteProcessMemory

Enumerates system info in registry

Suspicious behavior: EnumeratesProcesses

MITRE ATT&CK

Analysis: static1

Detonation Overview

Reported

2024-12-15 10:16

Signatures

N/A

Analysis: behavioral1

Detonation Overview

Submitted

2024-12-15 10:16

Reported

2024-12-15 10:19

Platform

win7-20240903-en

Max time kernel

145s

Max time network

153s

Command Line

"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\f38952c2cf05ec8d5aabd3140775e379_JaffaCakes118.html

Signatures

SocGholish

downloader socgholish

Socgholish family

socgholish

System Location Discovery: System Language Discovery

discovery
Description Indicator Process Target
Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE N/A

Modifies Internet Explorer settings

adware spyware
Description Indicator Process Target
Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\IntelliForms C:\Program Files\Internet Explorer\iexplore.exe N/A
Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\LowRegistry C:\Program Files\Internet Explorer\iexplore.exe N/A
Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Zoom C:\Program Files\Internet Explorer\iexplore.exe N/A
Set value (int) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{B41CB141-BACD-11EF-A0FF-7ED3796B1EC0} = "0" C:\Program Files\Internet Explorer\iexplore.exe N/A
Set value (int) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "440419681" C:\Program Files\Internet Explorer\iexplore.exe N/A
Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive C:\Program Files\Internet Explorer\iexplore.exe N/A
Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Main C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE N/A
Set value (data) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 C:\Program Files\Internet Explorer\iexplore.exe N/A
Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic C:\Program Files\Internet Explorer\iexplore.exe N/A
Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\InternetRegistry C:\Program Files\Internet Explorer\iexplore.exe N/A
Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain C:\Program Files\Internet Explorer\iexplore.exe N/A
Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\PageSetup C:\Program Files\Internet Explorer\iexplore.exe N/A
Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser C:\Program Files\Internet Explorer\iexplore.exe N/A
Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\DomainSuggestion C:\Program Files\Internet Explorer\iexplore.exe N/A
Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Main C:\Program Files\Internet Explorer\iexplore.exe N/A
Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\IETld\LowMic C:\Program Files\Internet Explorer\iexplore.exe N/A
Set value (int) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" C:\Program Files\Internet Explorer\iexplore.exe N/A
Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch C:\Program Files\Internet Explorer\iexplore.exe N/A
Set value (str) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" C:\Program Files\Internet Explorer\iexplore.exe N/A
Set value (int) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" C:\Program Files\Internet Explorer\iexplore.exe N/A
Set value (int) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" C:\Program Files\Internet Explorer\iexplore.exe N/A
Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\GPU C:\Program Files\Internet Explorer\iexplore.exe N/A
Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage C:\Program Files\Internet Explorer\iexplore.exe N/A
Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Toolbar C:\Program Files\Internet Explorer\iexplore.exe N/A
Set value (str) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" C:\Program Files\Internet Explorer\iexplore.exe N/A
Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery C:\Program Files\Internet Explorer\iexplore.exe N/A

Suspicious use of FindShellTrayWindow

Description Indicator Process Target
N/A N/A C:\Program Files\Internet Explorer\iexplore.exe N/A

Processes

C:\Program Files\Internet Explorer\iexplore.exe

"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\f38952c2cf05ec8d5aabd3140775e379_JaffaCakes118.html

C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE

"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2168 CREDAT:275457 /prefetch:2

Network

Country Destination Domain Proto
US 8.8.8.8:53 www.blogger.com udp
US 8.8.8.8:53 ajax.googleapis.com udp
US 8.8.8.8:53 apis.google.com udp
US 8.8.8.8:53 ahlikompie.com udp
US 8.8.8.8:53 resources.blogblog.com udp
US 8.8.8.8:53 www.insidethemagic.net udp
US 8.8.8.8:53 www.thefloridahotelorlando.com udp
US 8.8.8.8:53 lpmpjateng.go.id udp
US 8.8.8.8:53 pewresearch.org udp
US 8.8.8.8:53 yourjavascript.com udp
US 8.8.8.8:53 www.myhotspots.co.uk udp
US 8.8.8.8:53 www.widgeo.net udp
US 8.8.8.8:53 img2.blogblog.com udp
US 8.8.8.8:53 1.bp.blogspot.com udp
US 8.8.8.8:53 2.bp.blogspot.com udp
US 104.16.150.108:80 www.insidethemagic.net tcp
FR 142.250.179.78:443 apis.google.com tcp
FR 142.250.179.78:80 apis.google.com tcp
US 192.0.66.2:80 pewresearch.org tcp
US 104.18.160.83:80 www.thefloridahotelorlando.com tcp
FR 142.250.179.106:443 ajax.googleapis.com tcp
US 104.18.160.83:80 www.thefloridahotelorlando.com tcp
US 192.0.66.2:80 pewresearch.org tcp
US 104.16.150.108:80 www.insidethemagic.net tcp
FR 142.250.179.78:80 apis.google.com tcp
US 13.248.169.48:80 yourjavascript.com tcp
US 13.248.169.48:80 yourjavascript.com tcp
FR 142.250.179.106:443 ajax.googleapis.com tcp
FR 216.58.214.169:443 img2.blogblog.com tcp
FR 216.58.214.169:443 img2.blogblog.com tcp
US 8.8.8.8:53 3.bp.blogspot.com udp
US 8.8.8.8:53 4.bp.blogspot.com udp
US 172.67.69.193:80 www.widgeo.net tcp
US 172.67.69.193:80 www.widgeo.net tcp
SG 172.96.191.56:80 ahlikompie.com tcp
FR 142.250.201.170:80 fonts.googleapis.com tcp
FR 142.250.201.170:80 fonts.googleapis.com tcp
SG 172.96.191.56:80 ahlikompie.com tcp
US 76.223.67.189:80 www.myhotspots.co.uk tcp
FR 216.58.214.169:443 img2.blogblog.com tcp
US 76.223.67.189:80 www.myhotspots.co.uk tcp
FR 216.58.214.169:443 img2.blogblog.com tcp
US 8.8.8.8:53 bloggercilacap.com udp
FR 216.58.214.169:443 img2.blogblog.com tcp
US 8.8.8.8:53 pub.mybloglog.com udp
US 8.8.8.8:53 cdn.wibiya.com udp
US 8.8.8.8:53 bloggergadgets.googlecode.com udp
US 8.8.8.8:53 www.linkwithin.com udp
FR 216.58.215.33:80 4.bp.blogspot.com tcp
FR 216.58.215.33:80 4.bp.blogspot.com tcp
FR 216.58.215.33:80 4.bp.blogspot.com tcp
FR 216.58.215.33:80 4.bp.blogspot.com tcp
FR 216.58.215.33:80 4.bp.blogspot.com tcp
FR 216.58.215.33:80 4.bp.blogspot.com tcp
FR 216.58.214.169:80 img2.blogblog.com tcp
FR 216.58.214.169:80 img2.blogblog.com tcp
NL 142.250.102.82:80 bloggergadgets.googlecode.com tcp
NL 142.250.102.82:80 bloggergadgets.googlecode.com tcp
SG 118.139.179.30:80 www.linkwithin.com tcp
SG 118.139.179.30:80 www.linkwithin.com tcp
FR 216.58.215.33:80 4.bp.blogspot.com tcp
FR 216.58.215.33:80 4.bp.blogspot.com tcp
FR 216.58.215.33:80 4.bp.blogspot.com tcp
FR 216.58.215.33:80 4.bp.blogspot.com tcp
US 104.21.32.1:80 cdn.wibiya.com tcp
US 104.21.32.1:80 cdn.wibiya.com tcp
US 192.0.66.2:443 pewresearch.org tcp
US 104.16.150.108:443 www.insidethemagic.net tcp
US 104.18.160.83:443 www.thefloridahotelorlando.com tcp
US 8.8.8.8:53 www.tealdit.com udp
US 172.67.174.110:80 www.tealdit.com tcp
US 172.67.174.110:80 www.tealdit.com tcp
US 172.67.174.110:443 www.tealdit.com tcp
SG 139.99.69.164:80 bloggercilacap.com tcp
SG 139.99.69.164:80 bloggercilacap.com tcp
US 8.8.8.8:53 c.pki.goog udp
SG 172.96.191.56:443 ahlikompie.com tcp
ID 103.30.180.77:80 lpmpjateng.go.id tcp
ID 103.30.180.77:80 lpmpjateng.go.id tcp
US 8.8.8.8:53 o.pki.goog udp
US 8.8.8.8:53 o.pki.goog udp
US 8.8.8.8:53 o.pki.goog udp
US 8.8.8.8:53 o.pki.goog udp
US 8.8.8.8:53 o.pki.goog udp
US 8.8.8.8:53 o.pki.goog udp
US 8.8.8.8:53 o.pki.goog udp
US 8.8.8.8:53 o.pki.goog udp
FR 142.250.179.67:80 o.pki.goog tcp
FR 142.250.179.67:80 o.pki.goog tcp
FR 142.250.179.67:80 o.pki.goog tcp
FR 142.250.179.67:80 o.pki.goog tcp
FR 142.250.179.67:80 o.pki.goog tcp
FR 142.250.179.67:80 o.pki.goog tcp
FR 142.250.179.67:80 o.pki.goog tcp
FR 142.250.179.67:80 o.pki.goog tcp
SG 139.99.69.164:443 bloggercilacap.com tcp
ID 103.30.180.77:443 lpmpjateng.go.id tcp
US 8.8.8.8:53 s1.rsspump.com udp
ID 103.30.180.77:443 lpmpjateng.go.id tcp
US 172.67.69.193:443 www.widgeo.net tcp
US 172.67.69.193:443 www.widgeo.net tcp
US 8.8.8.8:53 mc.yandex.ru udp
US 64.98.135.66:80 s1.rsspump.com tcp
US 64.98.135.66:80 s1.rsspump.com tcp
RU 87.250.251.119:443 mc.yandex.ru tcp
RU 87.250.251.119:443 mc.yandex.ru tcp
US 172.67.69.193:443 www.widgeo.net tcp
US 8.8.8.8:53 widgets.amung.us udp
US 104.22.74.171:80 widgets.amung.us tcp
US 104.22.74.171:80 widgets.amung.us tcp
US 8.8.8.8:53 applify.me udp
US 8.8.8.8:53 arvigorothan.com udp
DE 138.201.94.231:80 applify.me tcp
DE 138.201.94.231:80 applify.me tcp
US 104.21.30.34:443 arvigorothan.com tcp
US 104.21.30.34:443 arvigorothan.com tcp
ID 103.30.180.77:443 lpmpjateng.go.id tcp
US 8.8.8.8:53 maxcdn.bootstrapcdn.com udp
US 8.8.8.8:53 e6.o.lencr.org udp
US 104.18.11.207:443 maxcdn.bootstrapcdn.com tcp
US 104.18.11.207:443 maxcdn.bootstrapcdn.com tcp
GB 2.22.144.142:80 e6.o.lencr.org tcp
US 8.8.8.8:53 developers.google.com udp
FR 142.250.178.142:80 developers.google.com tcp
FR 142.250.178.142:80 developers.google.com tcp
US 8.8.8.8:53 www2.cbox.ws udp
US 8.8.8.8:53 i1045.photobucket.com udp
DE 195.201.153.71:80 www2.cbox.ws tcp
DE 195.201.153.71:80 www2.cbox.ws tcp
GB 13.224.81.93:80 i1045.photobucket.com tcp
GB 13.224.81.93:80 i1045.photobucket.com tcp
FR 142.250.178.142:443 developers.google.com tcp
GB 13.224.81.93:443 i1045.photobucket.com tcp
ID 103.30.180.77:443 lpmpjateng.go.id tcp
DE 138.201.94.231:80 applify.me tcp
DE 138.201.94.231:80 applify.me tcp
US 8.8.8.8:53 crl.microsoft.com udp
GB 2.19.252.157:80 crl.microsoft.com tcp
US 8.8.8.8:53 www.microsoft.com udp
GB 95.100.245.144:80 www.microsoft.com tcp
US 204.79.197.200:443 ieonline.microsoft.com tcp
US 204.79.197.200:443 ieonline.microsoft.com tcp
US 8.8.8.8:53 www.microsoft.com udp
US 8.8.8.8:53 www.microsoft.com udp
US 204.79.197.200:443 ieonline.microsoft.com tcp

Files

C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\24BD96D5497F70B3F510A6B53CD43F3E_3A89246FB90C5EE6620004F1AE0EB0EA

MD5 d90416d78a12dbb8fbc4655cda803ec9
SHA1 258f11463c6d3c593d52a354c964015f4d29d4bd
SHA256 bc017e406b2db2484873417ae81a295aca47d909566f78d8bb0ce1299e466cdb
SHA512 99bfcf665fe7314eafff3198e58655a09c5a8d1f270e70d42ba010891759861174e60e09cc0c524548a11b6e93fb13a2a7ac29374fcd1a614ee8941678ce3299

C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\24BD96D5497F70B3F510A6B53CD43F3E_3A89246FB90C5EE6620004F1AE0EB0EA

MD5 afcd8688bb37fc25347b8aa48620c0b6
SHA1 2097b577fe8c9541ed77efc7e0ae163a6255ac83
SHA256 61ffb6d05c3e783305f6db6d7c5b3d852cfc05139143456bccea9d768b8dc23b
SHA512 d12259c78113a9450f791ad21e89debdcf81d20f0385a6a899b2d79b2306784d3b5af5892a5bb29829f80950cdb57f8deaddf09358ae5731cd9e8252b82dcdad

C:\Users\Admin\AppData\Local\Temp\Cab8816.tmp

MD5 49aebf8cbd62d92ac215b2923fb1b9f5
SHA1 1723be06719828dda65ad804298d0431f6aff976
SHA256 b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512 bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b

C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\05DDC6AA91765AACACDB0A5F96DF8199

MD5 01528f4ea5b0ae0d0153dfc06e291ecf
SHA1 5ee5b6307e849104c83312effa9e392679a1eaf9
SHA256 e0745c9aea1fd8444e5d658b068ade31e981996569e7d93a15d3ca58264544f2
SHA512 4944c4a50b35bad050a7efc2b0aa559ea2eb543c5aa6295b014019213c1188b9d7ac2b79d10d16b249dcadd7afada75cac623db08864e53dec47738bf5625bb5

C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\05DDC6AA91765AACACDB0A5F96DF8199

MD5 e935bc5762068caf3e24a2683b1b8a88
SHA1 82b70eb774c0756837fe8d7acbfeec05ecbf5463
SHA256 a8accfcfeb51bd73df23b91f4d89ff1a9eb7438ef5b12e8afda1a6ff1769e89d
SHA512 bed4f6f5357b37662623f1f8afed1a3ebf3810630b2206a0292052a2e754af9dcfe34ee15c289e3d797a8f33330e47c14cbefbc702f74028557ace29bf855f9e

C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\DDE8B1B7E253A9758EC380BD648952AF_86F2A83F54EA52E2D59C5D2EE00149B8

MD5 da659c19383e4d6343be0972d8fc6a14
SHA1 a282ea5d228bf7d3cac62700db2bed02fe3f0ead
SHA256 bf39b33a20e4b9694241823f7c5bccf1fa8cfb09abf36ce8e3376e55e69262cb
SHA512 74b2b20db3a791e932ccc3bc2ea915dc07a8f412864286891aeb1ee10571e83ebcdf82e073d852298248e167131e3520dadd436cb9045cf999e13c8835a9fce8

C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\DDE8B1B7E253A9758EC380BD648952AF_86F2A83F54EA52E2D59C5D2EE00149B8

MD5 55cd3c4eea5ba01c7012e345c743f6b6
SHA1 23c1dc9e1691e8755bc2f8a25622d94fe8a0dfb0
SHA256 b80ba8627414b71449f9aa43ee5e355e30ee6ec443481dbc503d941886e7b5ae
SHA512 9f1743d0789775c9d106f83cd3a51daa9469184dfaf6591f4f46657dfeda3c3c7d9d2450f422645b8023935dbd4616bbcb93b10fd09df72407c8bf27081d76f7

C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\K3VL8XEP\plusone[1].js

MD5 3c91ec4a05ec32f698b60dc011298dd8
SHA1 f10f0516a67aaf4590d49159cf9d36312653a55e
SHA256 96b335b41362fd966c7e5e547db375ef0be7dcb2aec66bf3646782eeaed4b2cf
SHA512 05345e754b39e9f83514bc3e14b52f3cbf321738fd7d973da55db99035b11b4152fedce2c203eb34376cc9e18571db514ff9fbcb4174a2dd7cca7e439cd25944

C:\Users\Admin\AppData\Local\Temp\Tar90D0.tmp

MD5 4ea6026cf93ec6338144661bf1202cd1
SHA1 a1dec9044f750ad887935a01430bf49322fbdcb7
SHA256 8efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA512 6c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b

C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

MD5 ad312bc03d72c65feb2ee8127c09a02f
SHA1 fbe00a06094a4e05b22d021a865e23f181d3c382
SHA256 d380ade91c97c46a9d9a41e7419261fc88d11a8feff89d0ff46bfb0889903e21
SHA512 8eca4f8728e99f6a36a898b0ec7e1e9f325d3bd7b040540b151a4302f888d41b5ac4e66b75021d8aa0d97b01f0fb3a24d5c6e918991a72052a2d7453e87d87c8

C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\F0ACCF77CDCBFF39F6191887F6D2D357

MD5 c7f3037f2b6cb680b9b3d57b77777cf5
SHA1 18b4dfa54b2cc3eb3bddf7e8d7dc44493ac72b95
SHA256 821bc47fd31aa7a9983f538e49af27f80c592ddb6e3c3413f94b6464484209e6
SHA512 29497ae43ca6d60fab12ab9f59692503539b5da5bbb2ef12c636787562710fa06d1a14e399554843f68f51de04338772dc77efecb5afe428f0076d25c6314b1f

C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\F0ACCF77CDCBFF39F6191887F6D2D357

MD5 a266bb7dcc38a562631361bbf61dd11b
SHA1 3b1efd3a66ea28b16697394703a72ca340a05bd5
SHA256 df545bf919a2439c36983b54cdfc903dfa4f37d3996d8d84b4c31eec6f3c163e
SHA512 0da8ef4f8f6ed3d16d2bc8eb816b9e6e1345dfe2d91160196c47e6149a1d6aedaafadcefd66acdea7f72dcf0832770192ceac15b0c559c4ccc2c0e5581d5aefc

C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\3C428B1A3E5F57D887EC4B864FAC5DCC

MD5 e4a68ac854ac5242460afd72481b2a44
SHA1 df3c24f9bfd666761b268073fe06d1cc8d4f82a4
SHA256 cb3ccbb76031e5e0138f8dd39a23f9de47ffc35e43c1144cea27d46a5ab1cb5f
SHA512 5622207e1ba285f172756f6019af92ac808ed63286e24dfecc1e79873fb5d140f1ceb7133f2476e89a5f75f711f9813a9fbb8fd5287f64adfdcc53b864f9bdc5

C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

MD5 6037fcdafa123a3ae5b1e5604bd8bc59
SHA1 d76d6669f68ba84af7fd6896fdaeb090fe0f8682
SHA256 5f60d06ee5a36ec5d7f61a3d6acf8573afc919f5ffc4ea4a7b3f0d0a3026bdc6
SHA512 479f512ef68665c752b05826a78fab9d20b31e264b08015f54dfc04508cc8fa1e7776e7f0339ccc5b6b5c07795f6d271330eb64c98976300cf9ab4d1b969d143

C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

MD5 eab2dc994b3b58a6ea5ad7e0ed2454e3
SHA1 ef0f281aad0d2cae83e3a680aff3886e4302e731
SHA256 888706760b4fc333fb37e0b07260802c7b6468ed48ea4f3361d9f0ac9577ae6f
SHA512 1cb93e3369162bba007f77ef0e99e5b458d5c79981f5e57b532cd39ae81b44fcfb91b82563ad9aacf8f5734aad0493617f093c9218bf9043c9cc94e1bca7d3db

C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

MD5 012376ce52e2c4da710354fdc3321ccc
SHA1 2d781e4c26d2db3fd769d8e551f61f5503bfeeb6
SHA256 ea748f21b35ee550cdd3f5b2832a237c311eda6403fbeedf0ea04ae2623d7406
SHA512 8dabe884c9dafd157fbd9e294472b934c792d24c9086c505c95664e1a7520c2253bc63374896efdae6bbad8ce28c2ea7a824139bff0eb2d0708c9f496b22fea8

C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

MD5 d5840c3afac1f91b44b39e943f2bfbc3
SHA1 77c14a0eb4952f7699ac928790d3b9b48e4d05eb
SHA256 9b231a991efbada0450bfeccd200035eaa9ee155aa2ac33e6096470a9257082a
SHA512 56a580d0129972bb72bc138d2f622933db6c7c2bea66bd8c25d818379c3fece0a2066b04ff9e5e68eb867aab49233e1afa1b706dd049a742d4c868ccf9e18c9c

C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

MD5 c020bb6ed8b4633dc52b54ec845d6924
SHA1 0f281c61bf48c9228e0316a42e8c65257111bfe3
SHA256 f59887c27a243c815e19fb6f55faf8308d751dc31235a9b33a04494fa68f7d39
SHA512 a1c2e266f65a1986d97f7789fea959e115b075b155c4c70b41fb467b0f07dc9d7c80a3adc01168ea2649b79c86f60358fa1ba810c2bf3595126d76b98a84763d

C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\3C428B1A3E5F57D887EC4B864FAC5DCC

MD5 eb21e89b7712b4379570868a29b0f8bf
SHA1 6f8b81533667ce0fd32d2fa9a338fe6f7538da6f
SHA256 f7f1440fc2e21eebe68277aeabe984cfff0e02f377af7233bceb3d144425dcfd
SHA512 39788f580fb2df913f10261429785ee34c07adc0b6f8cc04231f04f8b2c7a46147f73022a4d11ec5b147bbddb74af82dde437e59f44de6d280dcfe237cb12854

C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

MD5 e3019db53ea3b83c3ef9fe1f9ff65e77
SHA1 60db74de161dac0b72cf5af194b46d586aaca087
SHA256 65f06f2b1886ab6a1c034c0ed0c404aed758d5ffd4481013dc8646a288e903bf
SHA512 f4520b37bc2ff0097c2cc1545769f3b2417b2c91f5405fc1508845617963bef9668e795c0ddd2b32b0905a8e203caa23f5abff71ae554b97ccaa0a7cde05e8ba

C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

MD5 6899be9bf3ce6eda4456621b0ead607c
SHA1 d8945fa95a63061d5006bd04f624b06dada21a5d
SHA256 b1ebba03382800bde8b09dd8b82188fbe77b6ace1dd4d27629f2d5124241aeb5
SHA512 d464fd58a243abf56bc2b6d67f40a5f5e2e9d89d87e6be4dbec0546df632e06759a76911896cf209e78ff9b626d3168acf3759af30c20f651a1d7b4cc4815d4c

C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

MD5 3ad527277adf11b4b7228be5ce477ca3
SHA1 9d461792e520f52fb40a3f4dbac9d8365eddb691
SHA256 584179ae448f342f0dbf8a6efa5478e1cb690036ff38d5038baae4e4c3f75f97
SHA512 834d9589d0378c98a66cf33c09a0037304ce7429d8d0631fd4c28bedb18f6332e4b5185c9fc57476660f2d6e77421587676b9486e9ecc55aab230946d314f90c

C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

MD5 f74ece13d4d9e01a63bcd38ac5e9e8d5
SHA1 e75a7548228c780e66fb8ec66e264ed9cab6e21c
SHA256 03a36bd9720fe30021f5edfec518d93083de654755c6af20d3ae3f2c01d07f55
SHA512 d9276c303898eaa870e0967a37158ed3ad9e22166dbdec0a1c0744502caf2751bae4c97ec1b38d9655bd5df782af31043ab0a8b3cc84bf8333fc259e6bc0e8f3

C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

MD5 68fd9a5b8a966c2cdf54bce84baa5d33
SHA1 f72f5ef8f8739aeaacb21f8b7554bbfa02d18c30
SHA256 775871997b999ef3362c1198ee64000f27151899c5711044a9444ce869318913
SHA512 ddc4efc4ceb8c42dc3b03c55f4cd93b226a2bdd132df71a7c5084e4988fcd74e3343b2354a51773a113f0058925ca4d8982ae48a6e666d6787f54bc691715aff

Analysis: behavioral2

Detonation Overview

Submitted

2024-12-15 10:16

Reported

2024-12-15 10:19

Platform

win10v2004-20241007-en

Max time kernel

150s

Max time network

150s

Command Line

"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --start-maximized --single-argument C:\Users\Admin\AppData\Local\Temp\f38952c2cf05ec8d5aabd3140775e379_JaffaCakes118.html

Signatures

Browser Information Discovery

discovery

Enumerates system info in registry

Description Indicator Process Target
Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe N/A
Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe N/A
Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe N/A

Suspicious use of FindShellTrayWindow

Description Indicator Process Target
N/A N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe N/A
N/A N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe N/A
N/A N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe N/A
N/A N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe N/A
N/A N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe N/A
N/A N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe N/A
N/A N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe N/A
N/A N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe N/A
N/A N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe N/A
N/A N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe N/A
N/A N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe N/A
N/A N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe N/A
N/A N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe N/A
N/A N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe N/A
N/A N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe N/A
N/A N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe N/A
N/A N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe N/A
N/A N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe N/A
N/A N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe N/A
N/A N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe N/A
N/A N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe N/A
N/A N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe N/A
N/A N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe N/A
N/A N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe N/A
N/A N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe N/A

Suspicious use of SendNotifyMessage

Description Indicator Process Target
N/A N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe N/A
N/A N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe N/A
N/A N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe N/A
N/A N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe N/A
N/A N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe N/A
N/A N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe N/A
N/A N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe N/A
N/A N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe N/A
N/A N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe N/A
N/A N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe N/A
N/A N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe N/A
N/A N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe N/A
N/A N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe N/A
N/A N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe N/A
N/A N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe N/A
N/A N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe N/A
N/A N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe N/A
N/A N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe N/A
N/A N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe N/A
N/A N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe N/A
N/A N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe N/A
N/A N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe N/A
N/A N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe N/A
N/A N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe N/A

Suspicious use of WriteProcessMemory

Description Indicator Process Target
PID 2932 wrote to memory of 4424 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 2932 wrote to memory of 4424 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 2932 wrote to memory of 3228 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 2932 wrote to memory of 3228 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 2932 wrote to memory of 3228 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 2932 wrote to memory of 3228 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 2932 wrote to memory of 3228 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 2932 wrote to memory of 3228 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 2932 wrote to memory of 3228 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 2932 wrote to memory of 3228 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 2932 wrote to memory of 3228 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 2932 wrote to memory of 3228 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 2932 wrote to memory of 3228 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 2932 wrote to memory of 3228 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 2932 wrote to memory of 3228 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 2932 wrote to memory of 3228 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 2932 wrote to memory of 3228 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 2932 wrote to memory of 3228 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 2932 wrote to memory of 3228 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 2932 wrote to memory of 3228 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 2932 wrote to memory of 3228 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 2932 wrote to memory of 3228 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 2932 wrote to memory of 3228 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 2932 wrote to memory of 3228 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 2932 wrote to memory of 3228 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 2932 wrote to memory of 3228 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 2932 wrote to memory of 3228 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 2932 wrote to memory of 3228 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 2932 wrote to memory of 3228 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 2932 wrote to memory of 3228 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 2932 wrote to memory of 3228 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 2932 wrote to memory of 3228 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 2932 wrote to memory of 3228 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 2932 wrote to memory of 3228 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 2932 wrote to memory of 3228 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 2932 wrote to memory of 3228 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 2932 wrote to memory of 3228 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 2932 wrote to memory of 3228 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 2932 wrote to memory of 3228 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 2932 wrote to memory of 3228 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 2932 wrote to memory of 3228 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 2932 wrote to memory of 3228 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 2932 wrote to memory of 3524 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 2932 wrote to memory of 3524 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 2932 wrote to memory of 2188 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 2932 wrote to memory of 2188 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 2932 wrote to memory of 2188 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 2932 wrote to memory of 2188 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 2932 wrote to memory of 2188 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 2932 wrote to memory of 2188 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 2932 wrote to memory of 2188 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 2932 wrote to memory of 2188 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 2932 wrote to memory of 2188 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 2932 wrote to memory of 2188 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 2932 wrote to memory of 2188 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 2932 wrote to memory of 2188 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 2932 wrote to memory of 2188 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 2932 wrote to memory of 2188 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 2932 wrote to memory of 2188 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 2932 wrote to memory of 2188 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 2932 wrote to memory of 2188 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 2932 wrote to memory of 2188 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 2932 wrote to memory of 2188 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 2932 wrote to memory of 2188 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe

Processes

C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe

"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --start-maximized --single-argument C:\Users\Admin\AppData\Local\Temp\f38952c2cf05ec8d5aabd3140775e379_JaffaCakes118.html

C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe

"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffd7eb846f8,0x7ffd7eb84708,0x7ffd7eb84718

C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe

"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2096,11438327187158369348,18405096706737788613,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2116 /prefetch:2

C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe

"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2096,11438327187158369348,18405096706737788613,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2196 /prefetch:3

C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe

"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2096,11438327187158369348,18405096706737788613,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2924 /prefetch:8

C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe

"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2096,11438327187158369348,18405096706737788613,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3228 /prefetch:1

C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe

"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2096,11438327187158369348,18405096706737788613,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3260 /prefetch:1

C:\Windows\System32\CompPkgSrv.exe

C:\Windows\System32\CompPkgSrv.exe -Embedding

C:\Windows\System32\CompPkgSrv.exe

C:\Windows\System32\CompPkgSrv.exe -Embedding

C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe

"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2096,11438327187158369348,18405096706737788613,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4000 /prefetch:1

C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe

"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2096,11438327187158369348,18405096706737788613,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4848 /prefetch:1

C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe

"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2096,11438327187158369348,18405096706737788613,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4108 /prefetch:1

C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe

"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2096,11438327187158369348,18405096706737788613,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5164 /prefetch:1

C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe

"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2096,11438327187158369348,18405096706737788613,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5772 /prefetch:1

C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe

"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2096,11438327187158369348,18405096706737788613,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5884 /prefetch:1

C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe

"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2096,11438327187158369348,18405096706737788613,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=13 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=8064 /prefetch:1

C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe

"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2096,11438327187158369348,18405096706737788613,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2612 /prefetch:8

C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe

"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2096,11438327187158369348,18405096706737788613,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2612 /prefetch:8

C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe

"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2096,11438327187158369348,18405096706737788613,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=15 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3268 /prefetch:1

C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe

"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2096,11438327187158369348,18405096706737788613,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=16 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=8172 /prefetch:1

C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe

"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2096,11438327187158369348,18405096706737788613,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=17 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4088 /prefetch:1

C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe

"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2096,11438327187158369348,18405096706737788613,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=18 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6140 /prefetch:1

C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe

"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2096,11438327187158369348,18405096706737788613,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=4684 /prefetch:2

Network

Country Destination Domain Proto
US 8.8.8.8:53 8.8.8.8.in-addr.arpa udp
US 8.8.8.8:53 apis.google.com udp
US 8.8.8.8:53 ajax.googleapis.com udp
US 8.8.8.8:53 www.blogger.com udp
FR 142.250.201.170:80 fonts.googleapis.com tcp
FR 216.58.214.169:443 www.blogger.com tcp
FR 142.250.75.234:443 ajax.googleapis.com tcp
FR 142.250.179.78:80 apis.google.com tcp
FR 142.250.179.78:443 apis.google.com tcp
FR 172.217.20.163:80 fonts.gstatic.com tcp
US 8.8.8.8:53 217.106.137.52.in-addr.arpa udp
US 8.8.8.8:53 83.210.23.2.in-addr.arpa udp
US 8.8.8.8:53 134.32.126.40.in-addr.arpa udp
US 8.8.8.8:53 79.242.123.52.in-addr.arpa udp
US 8.8.8.8:53 170.201.250.142.in-addr.arpa udp
US 8.8.8.8:53 169.214.58.216.in-addr.arpa udp
US 8.8.8.8:53 234.75.250.142.in-addr.arpa udp
US 8.8.8.8:53 78.179.250.142.in-addr.arpa udp
US 8.8.8.8:53 95.221.229.192.in-addr.arpa udp
FR 216.58.214.169:443 www.blogger.com udp
FR 142.250.179.78:443 apis.google.com udp
US 8.8.8.8:53 yourjavascript.com udp
US 8.8.8.8:53 s1.rsspump.com udp
US 8.8.8.8:53 www.widgeo.net udp
US 8.8.8.8:53 pub.mybloglog.com udp
US 8.8.8.8:53 cdn.wibiya.com udp
US 8.8.8.8:53 bloggergadgets.googlecode.com udp
US 8.8.8.8:53 resources.blogblog.com udp
US 8.8.8.8:53 www.linkwithin.com udp
US 8.8.8.8:53 ahlikompie.com udp
US 8.8.8.8:53 www.thefloridahotelorlando.com udp
US 76.223.54.146:80 yourjavascript.com tcp
US 8.8.8.8:53 www.insidethemagic.net udp
US 172.67.69.193:80 www.widgeo.net tcp
US 104.21.64.1:80 cdn.wibiya.com tcp
US 8.8.8.8:53 lpmpjateng.go.id udp
SG 118.139.179.30:80 www.linkwithin.com tcp
NL 142.250.102.82:80 bloggergadgets.googlecode.com tcp
FR 216.58.214.169:443 resources.blogblog.com tcp
US 8.8.8.8:53 3.bp.blogspot.com udp
US 8.8.8.8:53 4.bp.blogspot.com udp
US 104.16.151.108:80 www.insidethemagic.net tcp
FR 216.58.215.33:80 4.bp.blogspot.com tcp
FR 216.58.215.33:80 4.bp.blogspot.com tcp
US 64.98.135.66:80 s1.rsspump.com tcp
US 8.8.8.8:53 pewresearch.org udp
US 104.18.161.83:80 www.thefloridahotelorlando.com tcp
FR 172.217.20.194:445 pagead2.googlesyndication.com tcp
SG 172.96.191.56:80 ahlikompie.com tcp
US 192.0.66.2:80 pewresearch.org tcp
US 104.16.151.108:443 www.insidethemagic.net tcp
US 64.98.135.66:80 s1.rsspump.com tcp
SG 118.139.179.30:80 www.linkwithin.com tcp
SG 172.96.191.56:80 ahlikompie.com tcp
US 8.8.8.8:53 www.tealdit.com udp
US 8.8.8.8:53 www.myhotspots.co.uk udp
US 8.8.8.8:53 img2.blogblog.com udp
US 104.18.161.83:443 www.thefloridahotelorlando.com tcp
US 192.0.66.2:443 pewresearch.org tcp
US 8.8.8.8:53 1.bp.blogspot.com udp
US 172.67.174.110:80 www.tealdit.com tcp
FR 216.58.214.169:80 img2.blogblog.com tcp
US 13.248.213.45:80 www.myhotspots.co.uk tcp
FR 216.58.215.33:80 1.bp.blogspot.com tcp
US 8.8.8.8:53 applify.me udp
US 172.67.174.110:443 www.tealdit.com tcp
US 8.8.8.8:53 2.bp.blogspot.com udp
DE 138.201.94.231:80 applify.me tcp
FR 216.58.215.33:80 2.bp.blogspot.com tcp
FR 216.58.215.33:80 2.bp.blogspot.com tcp
SG 172.96.191.56:443 ahlikompie.com tcp
FR 216.58.215.33:80 2.bp.blogspot.com tcp
FR 216.58.215.33:80 2.bp.blogspot.com tcp
FR 216.58.215.33:80 2.bp.blogspot.com tcp
FR 216.58.215.33:80 2.bp.blogspot.com tcp
US 8.8.8.8:53 bloggercilacap.com udp
DE 138.201.94.231:80 applify.me tcp
US 8.8.8.8:53 163.20.217.172.in-addr.arpa udp
US 8.8.8.8:53 193.69.67.172.in-addr.arpa udp
US 8.8.8.8:53 1.64.21.104.in-addr.arpa udp
US 8.8.8.8:53 82.102.250.142.in-addr.arpa udp
US 8.8.8.8:53 108.151.16.104.in-addr.arpa udp
US 8.8.8.8:53 146.54.223.76.in-addr.arpa udp
US 8.8.8.8:53 83.161.18.104.in-addr.arpa udp
US 8.8.8.8:53 33.215.58.216.in-addr.arpa udp
US 8.8.8.8:53 66.135.98.64.in-addr.arpa udp
US 8.8.8.8:53 56.191.96.172.in-addr.arpa udp
US 8.8.8.8:53 30.179.139.118.in-addr.arpa udp
US 8.8.8.8:53 110.174.67.172.in-addr.arpa udp
US 8.8.8.8:53 2.66.0.192.in-addr.arpa udp
US 8.8.8.8:53 45.213.248.13.in-addr.arpa udp
SG 139.99.69.164:80 bloggercilacap.com tcp
SG 139.99.69.164:80 bloggercilacap.com tcp
US 172.67.69.193:443 www.widgeo.net tcp
US 172.67.69.193:443 www.widgeo.net tcp
US 172.67.69.193:443 www.widgeo.net tcp
US 8.8.8.8:53 www.widgeo.net udp
US 8.8.8.8:53 mc.yandex.ru udp
US 8.8.8.8:53 widgets.amung.us udp
NL 142.250.102.82:80 bloggergadgets.googlecode.com tcp
US 8.8.8.8:53 maxcdn.bootstrapcdn.com udp
RU 93.158.134.119:443 mc.yandex.ru tcp
US 104.26.10.22:445 www.widgeo.net tcp
FR 142.250.201.162:139 pagead2.googlesyndication.com tcp
US 104.22.75.171:80 widgets.amung.us tcp
ID 103.30.180.77:80 lpmpjateng.go.id tcp
US 104.18.11.207:443 maxcdn.bootstrapcdn.com tcp
US 8.8.8.8:53 platform.twitter.com udp
GB 146.75.72.157:443 platform.twitter.com tcp
US 8.8.8.8:53 accounts.google.com udp
US 8.8.8.8:53 arvigorothan.com udp
NL 142.250.27.84:443 accounts.google.com tcp
ID 103.30.180.77:80 lpmpjateng.go.id tcp
US 8.8.8.8:53 www2.cbox.ws udp
US 172.67.150.119:443 arvigorothan.com tcp
DE 195.201.153.71:80 www2.cbox.ws tcp
DE 195.201.153.71:80 www2.cbox.ws tcp
SG 118.139.179.30:80 www.linkwithin.com tcp
SG 139.99.69.164:443 bloggercilacap.com tcp
US 8.8.8.8:53 t.dtscout.com udp
US 8.8.8.8:53 i1045.photobucket.com udp
US 141.101.120.10:443 t.dtscout.com tcp
US 8.8.8.8:53 119.134.158.93.in-addr.arpa udp
US 8.8.8.8:53 207.11.18.104.in-addr.arpa udp
US 8.8.8.8:53 119.150.67.172.in-addr.arpa udp
US 8.8.8.8:53 157.72.75.146.in-addr.arpa udp
US 8.8.8.8:53 77.180.30.103.in-addr.arpa udp
US 8.8.8.8:53 84.27.250.142.in-addr.arpa udp
US 8.8.8.8:53 171.75.22.104.in-addr.arpa udp
US 8.8.8.8:53 164.69.99.139.in-addr.arpa udp
US 8.8.8.8:53 71.153.201.195.in-addr.arpa udp
GB 13.224.81.90:80 i1045.photobucket.com tcp
ID 103.30.180.77:443 lpmpjateng.go.id tcp
US 8.8.8.8:53 choakenumt.net udp
US 8.8.8.8:53 www.cbox.ws udp
GB 13.224.81.90:443 i1045.photobucket.com tcp
NL 139.45.197.243:443 choakenumt.net tcp
SG 118.139.179.30:80 www.linkwithin.com tcp
SG 139.99.69.164:443 bloggercilacap.com tcp
US 8.8.8.8:53 lh3.googleusercontent.com udp
FR 142.250.179.78:443 apis.google.com udp
US 8.8.8.8:53 ssl.gstatic.com udp
FR 142.250.179.65:443 lh3.googleusercontent.com tcp
US 8.8.8.8:53 my.rtmark.net udp
FR 142.250.179.99:443 ssl.gstatic.com tcp
US 8.8.8.8:53 yonmewon.com udp
US 8.8.8.8:53 sr7pv7n5x.com udp
US 104.21.27.183:443 my.rtmark.net tcp
NL 212.117.190.201:443 sr7pv7n5x.com tcp
NL 139.45.197.236:443 yonmewon.com tcp
US 172.67.69.193:445 www.widgeo.net tcp
US 104.26.11.22:445 www.widgeo.net tcp
US 8.8.8.8:53 developers.google.com udp
FR 142.250.178.142:80 developers.google.com tcp
NL 142.250.27.84:443 accounts.google.com udp
US 8.8.8.8:53 syndication.twitter.com udp
US 104.244.42.200:443 syndication.twitter.com tcp
US 8.8.8.8:53 10.120.101.141.in-addr.arpa udp
US 8.8.8.8:53 90.81.224.13.in-addr.arpa udp
US 8.8.8.8:53 243.197.45.139.in-addr.arpa udp
US 8.8.8.8:53 65.179.250.142.in-addr.arpa udp
US 8.8.8.8:53 195.20.217.172.in-addr.arpa udp
US 8.8.8.8:53 183.27.21.104.in-addr.arpa udp
US 8.8.8.8:53 236.197.45.139.in-addr.arpa udp
US 8.8.8.8:53 201.190.117.212.in-addr.arpa udp
US 8.8.8.8:53 119.110.32.13.in-addr.arpa udp
US 8.8.8.8:53 200.42.244.104.in-addr.arpa udp
US 8.8.8.8:53 142.178.250.142.in-addr.arpa udp
US 8.8.8.8:53 99.179.250.142.in-addr.arpa udp
FR 142.250.179.99:443 ssl.gstatic.com tcp
FR 142.250.178.142:443 developers.google.com tcp
US 8.8.8.8:53 twitter.com udp
N/A 224.0.0.251:5353 udp
US 8.8.8.8:53 228.249.119.40.in-addr.arpa udp
US 8.8.8.8:53 connect.facebook.net udp
IT 157.240.203.2:445 connect.facebook.net tcp
US 8.8.8.8:53 connect.facebook.net udp
IT 157.240.203.2:139 connect.facebook.net tcp
US 8.8.8.8:53 200.163.202.172.in-addr.arpa udp
US 8.8.8.8:53 206.23.85.13.in-addr.arpa udp
US 8.8.8.8:53 play.google.com udp
FR 216.58.214.174:443 play.google.com tcp
US 8.8.8.8:53 180.129.81.91.in-addr.arpa udp
US 8.8.8.8:53 174.214.58.216.in-addr.arpa udp
US 8.8.8.8:53 static.addtoany.com udp
US 104.22.71.197:445 static.addtoany.com tcp
US 8.8.8.8:53 static.addtoany.com udp
US 172.67.39.148:445 static.addtoany.com tcp
US 104.22.70.197:445 static.addtoany.com tcp
US 104.22.71.197:139 static.addtoany.com tcp
US 8.8.8.8:53 172.214.232.199.in-addr.arpa udp
NL 142.250.27.84:443 accounts.google.com udp
US 8.8.8.8:53 cdn.viglink.com udp
AT 3.161.119.57:445 cdn.viglink.com tcp
AT 3.161.119.63:445 cdn.viglink.com tcp
AT 3.161.119.123:445 cdn.viglink.com tcp
AT 3.161.119.110:445 cdn.viglink.com tcp
US 8.8.8.8:53 cdn.viglink.com udp
US 8.8.8.8:53 whos.amung.us udp
US 104.22.74.171:445 whos.amung.us tcp
US 104.22.75.171:445 whos.amung.us tcp
US 172.67.8.141:445 whos.amung.us tcp
US 8.8.8.8:53 whos.amung.us udp
US 8.8.8.8:53 kepingan-hati.blogspot.com udp
FR 216.58.213.65:80 kepingan-hati.blogspot.com tcp
US 8.8.8.8:53 65.213.58.216.in-addr.arpa udp
NL 142.250.27.84:443 accounts.google.com udp
US 8.8.8.8:53 udp

Files

C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad\settings.dat

MD5 34d2c4f40f47672ecdf6f66fea242f4a
SHA1 4bcad62542aeb44cae38a907d8b5a8604115ada2
SHA256 b214e3affb02a2ea4469a8bbdfa8a179e7cc57cababd83b4bafae9cdbe23fa33
SHA512 50fba54ec95d694211a005d0e3e6cf5b5677efa16989cbf854207a1a67e3a139f32b757c6f2ce824a48f621440b93fde60ad1dc790fcec4b76edddd0d92a75d6

\??\pipe\LOCAL\crashpad_2932_KDBHKIWDGQTQYAYI

MD5 d41d8cd98f00b204e9800998ecf8427e
SHA1 da39a3ee5e6b4b0d3255bfef95601890afd80709
SHA256 e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855
SHA512 cf83e1357eefb8bdf1542850d66d8007d620e4050b5715dc83f4a921d36ce9ce47d0d13c5d85f2b0ff8318d2877eec2f63b931bd47417a81a538327af927da3e

C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad\settings.dat

MD5 8749e21d9d0a17dac32d5aa2027f7a75
SHA1 a5d555f8b035c7938a4a864e89218c0402ab7cde
SHA256 915193bd331ee9ea7c750398a37fbb552b8c5a1d90edec6293688296bda6f304
SHA512 c645a41180ed01e854f197868283f9b40620dbbc813a1c122f6870db574ebc1c4917da4d320bdfd1cc67f23303a2c6d74e4f36dd9d3ffcfa92d3dfca3b7ca31a

C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Preferences

MD5 a1163dd85701fb88c492b1c2553724e7
SHA1 744fc2cc24036ba9305c77decd4198dfbf695c9c
SHA256 07351c37da638585dab4a3d6ffe7ea912259f7da7e0920fe1e226ba58d3cef84
SHA512 330d2caab446b4d1b591a69daaaf436513e7cf8708f5958f79a87fa275fb34e6bd2c52f0ad4cef2259efd46275ab4ebdef967f277a33dde0e8742b29d29c0906

C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Cache\f_000009

MD5 1ed76811af8c6ed01b3d356f3bad9a3c
SHA1 8eb6ec720c89345a37f37c519a7e60453ff256d9
SHA256 52775526647d60d401b7d0ac7ad728e621edc59c4b9f6bda497ba5fef48239b4
SHA512 24cb443881a4a4fca319827e28b6aaaa5f0402867c49adeeb2c81dfa469dc448c2397e1e488d23ad2af0ffe0cbb63b8d866efdc2a8ed5dca6b4cbc4f9084499a

C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Local State

MD5 604addb02c649f8348ddb7f811ac7b16
SHA1 685118b7820478df3af2a5a0a3f783ca8c870a8a
SHA256 7b690bcf550e4cf64733066104f9f763b14a72a023f8e27ab9fc39e63ebc16c8
SHA512 61937ec60d315d822313bd1bb349abc867f7967606127f88831250161df90fcac3ccbd181d142b2d68dc0bbd4239bc65ca27d854a5dc78406872eedab2751c26

C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\1e8aeec3-928c-48f1-a114-710fca7f5905.tmp

MD5 5d56d68e0cba38dfd7ae1ca1661c1931
SHA1 e54e3e4e816a282b2172021aae74e02c0524ca85
SHA256 8ca0e858eb57195d8bc174dd418ca4f0fdcbe9687a71672455e66eb7fb85c12a
SHA512 ffcf9557f092bd21489bf765c9b956ec86adcc6f28af062d1c15c1f5aae95587d12018bbeb3bfb5fa3131cb05097e96b651ca6157b067f7967e22fed2cadae00

C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index

MD5 689aa906a408bef5b715e4a8eecf2cf5
SHA1 2ad2e029f564bd17094cb1a9c6458a0ddb77420e
SHA256 881091cbc8e9c578a4dc4c45ec0a2fd3dbf4ac2bb8875078033785bb2565717c
SHA512 608aacb08e97cce96f839cb387074973c7429058956cd04b26875bc563729cfd7cf0738e63686aa9041ff70b6b1abd6a22e72c7a33de792d1d8954f937b138b8

C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Cache\f_000010

MD5 84e3d54be3ffd25a24bf3a514490b86c
SHA1 490f4a059114c7704703a7c67d193083f551ea1a
SHA256 dbae2441d55a51b1d10c5591a2ab27141b3aebff8e75816a3a4b107fcde4b6f5
SHA512 718ddb866adab289ea6ed942b18ee9d74c185d5739c642340b6ee827265e3fce63b768021aa182a8fd540b4a1f82f555dc9e668c4cd187566fe19336bc3464e5

C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Network Persistent State

MD5 18af6ccfc02521b43cca0a9224254695
SHA1 af8610ec307bb6c93aef003be47678a63917667a
SHA256 9b5857ec408c8172a50416efd2b841e7040a2f04af44c8508afd4ff11b3f1848
SHA512 d6b2def148997b1d0db15681df422047c38794acd10f423aaa196fc88158f44d31ce2f26f77e069c7cde6adaee43538ab4c7e855f16e302dbb95b3a95718b8d2

C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index

MD5 62b21160e6ebcfcf6f6003e4f155434e
SHA1 82303dd9fee17a68df8d94f19cfa010fae34d2f3
SHA256 02417a220333dca642cfa92029997be413b7fcc97309e39392bdb07f032c5755
SHA512 54e460d9132eb029784a9c0894246717a9dd8f5ee9ff048b2ae861efedd5db207bd459ac6ef973ffd078b15f81c086f5a3f7ebb7e829bfca40e6f37ea8935efe

C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\data_reduction_proxy_leveldb\CURRENT

MD5 46295cac801e5d4857d09837238a6394
SHA1 44e0fa1b517dbf802b18faf0785eeea6ac51594b
SHA256 0f1bad70c7bd1e0a69562853ec529355462fcd0423263a3d39d6d0d70b780443
SHA512 8969402593f927350e2ceb4b5bc2a277f3754697c1961e3d6237da322257fbab42909e1a742e22223447f3a4805f8d8ef525432a7c3515a549e984d3eff72b23

C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\data_reduction_proxy_leveldb\CURRENT

MD5 206702161f94c5cd39fadd03f4014d98
SHA1 bd8bfc144fb5326d21bd1531523d9fb50e1b600a
SHA256 1005a525006f148c86efcbfb36c6eac091b311532448010f70f7de9a68007167
SHA512 0af09f26941b11991c750d1a2b525c39a8970900e98cba96fd1b55dbf93fee79e18b8aab258f48b4f7bda40d059629bc7770d84371235cdb1352a4f17f80e145

C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Preferences

MD5 e316bef330aaa987e67364f3d265db86
SHA1 b9c05d3af3638c88b5ce1b8b08cf118714b584fa
SHA256 6fcb282b8f86e102fba16452a8570f4e9c634cfb68d779f2f126c590d6e0adca
SHA512 bdb9b379474d27b97742b0425a976b7722f1be380005200d309c02b331aab37d17f39750dd543ac6241175080db1e8c181e28af3fbf89f939cd1dfff8f9055d0

C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Preferences

MD5 d42cc8840ac9d464f97d4a6345fb6701
SHA1 6491d7a678b9bee80707e83eac9d9d884abb9104
SHA256 2993d44aa1665338296bd2009991fbc017cdb513de4f12d4ace4126cc8974647
SHA512 b3ad261146d52225245f9aa519e6b24516820dc9f17d7698fc2c9890d73500e63b997fd4f6989b29c0d02dc72b3f1f36b5d7cfde6313fef9deb52bf4eaada497