Malware Analysis Report

2025-04-03 14:26

Sample ID 241219-gf6n1asjbm
Target feace28d598625877f2de65ff86ca172_JaffaCakes118
SHA256 bcc6521f923480bf0015347fae2c8f377b596effed1ae5bf85eb96374b6158a6
Tags
socgholish discovery downloader
score
10/10

Table of Contents

Analysis Overview

MITRE ATT&CK

Enterprise Matrix V15

Analysis: static1

Detonation Overview

Signatures

Analysis: behavioral1

Detonation Overview

Command Line

Signatures

Processes

Network

Files

Analysis: behavioral2

Detonation Overview

Command Line

Signatures

Processes

Network

Files

Analysis Overview

score
10/10

SHA256

bcc6521f923480bf0015347fae2c8f377b596effed1ae5bf85eb96374b6158a6

Threat Level: Known bad

The file feace28d598625877f2de65ff86ca172_JaffaCakes118 was found to be: Known bad.

Malicious Activity Summary

socgholish discovery downloader

SocGholish

Socgholish family

System Location Discovery: System Language Discovery

Browser Information Discovery

Suspicious use of WriteProcessMemory

Enumerates system info in registry

Modifies Internet Explorer settings

Suspicious use of FindShellTrayWindow

Suspicious behavior: EnumeratesProcesses

Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary

Suspicious use of SendNotifyMessage

Suspicious use of SetWindowsHookEx

MITRE ATT&CK

Analysis: static1

Detonation Overview

Reported

2024-12-19 05:45

Signatures

N/A

Analysis: behavioral1

Detonation Overview

Submitted

2024-12-19 05:45

Reported

2024-12-19 05:48

Platform

win7-20240903-en

Max time kernel

149s

Max time network

146s

Command Line

"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\feace28d598625877f2de65ff86ca172_JaffaCakes118.html

Signatures

SocGholish

downloader socgholish

Socgholish family

socgholish

System Location Discovery: System Language Discovery

discovery
Description Indicator Process Target
Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE N/A

Modifies Internet Explorer settings

adware spyware
Description Indicator Process Target
Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Toolbar C:\Program Files\Internet Explorer\iexplore.exe N/A
Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser C:\Program Files\Internet Explorer\iexplore.exe N/A
Set value (int) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" C:\Program Files\Internet Explorer\iexplore.exe N/A
Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive C:\Program Files\Internet Explorer\iexplore.exe N/A
Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch C:\Program Files\Internet Explorer\iexplore.exe N/A
Set value (str) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" C:\Program Files\Internet Explorer\iexplore.exe N/A
Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\IntelliForms C:\Program Files\Internet Explorer\iexplore.exe N/A
Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain C:\Program Files\Internet Explorer\iexplore.exe N/A
Set value (int) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" C:\Program Files\Internet Explorer\iexplore.exe N/A
Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\DomainSuggestion C:\Program Files\Internet Explorer\iexplore.exe N/A
Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic C:\Program Files\Internet Explorer\iexplore.exe N/A
Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\IETld\LowMic C:\Program Files\Internet Explorer\iexplore.exe N/A
Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage C:\Program Files\Internet Explorer\iexplore.exe N/A
Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Zoom C:\Program Files\Internet Explorer\iexplore.exe N/A
Set value (int) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{81F6A611-BDCC-11EF-B945-527E38F5B48B} = "0" C:\Program Files\Internet Explorer\iexplore.exe N/A
Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Main C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE N/A
Set value (data) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 C:\Program Files\Internet Explorer\iexplore.exe N/A
Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery C:\Program Files\Internet Explorer\iexplore.exe N/A
Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Main C:\Program Files\Internet Explorer\iexplore.exe N/A
Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\InternetRegistry C:\Program Files\Internet Explorer\iexplore.exe N/A
Set value (int) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" C:\Program Files\Internet Explorer\iexplore.exe N/A
Set value (int) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "440749019" C:\Program Files\Internet Explorer\iexplore.exe N/A
Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\PageSetup C:\Program Files\Internet Explorer\iexplore.exe N/A
Set value (str) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" C:\Program Files\Internet Explorer\iexplore.exe N/A
Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\GPU C:\Program Files\Internet Explorer\iexplore.exe N/A
Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\LowRegistry C:\Program Files\Internet Explorer\iexplore.exe N/A

Suspicious use of FindShellTrayWindow

Description Indicator Process Target
N/A N/A C:\Program Files\Internet Explorer\iexplore.exe N/A

Processes

C:\Program Files\Internet Explorer\iexplore.exe

"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\feace28d598625877f2de65ff86ca172_JaffaCakes118.html

C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE

"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2124 CREDAT:275457 /prefetch:2

Network

Country Destination Domain Proto
US 8.8.8.8:53 code.jquery.com udp
US 8.8.8.8:53 www.blogger.com udp
US 8.8.8.8:53 ajax.googleapis.com udp
US 8.8.8.8:53 static.tumblr.com udp
US 8.8.8.8:53 apis.google.com udp
US 8.8.8.8:53 i1231.photobucket.com udp
US 8.8.8.8:53 heartbeat.my udp
US 8.8.8.8:53 resources.blogblog.com udp
US 8.8.8.8:53 3.bp.blogspot.com udp
US 8.8.8.8:53 2.bp.blogspot.com udp
US 8.8.8.8:53 4.bp.blogspot.com udp
US 8.8.8.8:53 www.linkwithin.com udp
US 8.8.8.8:53 1.bp.blogspot.com udp
US 8.8.8.8:53 i1117.photobucket.com udp
US 8.8.8.8:53 img.photobucket.com udp
US 8.8.8.8:53 i1135.photobucket.com udp
US 8.8.8.8:53 upic.me udp
US 8.8.8.8:53 i.imgur.com udp
US 8.8.8.8:53 s7.addthis.com udp
US 8.8.8.8:53 busuk.org udp
US 8.8.8.8:53 www.clocklink.com udp
US 8.8.8.8:53 www.guablog.com udp
US 8.8.8.8:53 dl9.glitter-graphics.net udp
US 8.8.8.8:53 exeideasinternational.googlecode.com udp
FR 216.58.214.169:443 resources.blogblog.com tcp
FR 142.250.179.106:80 ajax.googleapis.com tcp
US 192.0.77.40:80 static.tumblr.com tcp
FR 142.250.179.78:443 apis.google.com tcp
FR 142.250.179.106:443 ajax.googleapis.com tcp
MY 117.53.152.181:80 heartbeat.my tcp
US 151.101.2.137:80 code.jquery.com tcp
FR 216.58.214.169:443 resources.blogblog.com tcp
FR 142.250.179.106:80 ajax.googleapis.com tcp
FR 142.250.179.106:443 ajax.googleapis.com tcp
US 151.101.2.137:80 code.jquery.com tcp
US 192.0.77.40:80 static.tumblr.com tcp
FR 216.58.214.169:443 resources.blogblog.com tcp
FR 142.250.179.78:443 apis.google.com tcp
MY 117.53.152.181:80 heartbeat.my tcp
FR 3.165.113.116:80 i1135.photobucket.com tcp
FR 3.165.113.116:80 i1135.photobucket.com tcp
FR 3.165.113.116:80 i1135.photobucket.com tcp
FR 3.165.113.116:80 i1135.photobucket.com tcp
FR 3.165.113.116:80 i1135.photobucket.com tcp
FR 3.165.113.116:80 i1135.photobucket.com tcp
FR 216.58.214.169:443 resources.blogblog.com tcp
FR 216.58.214.169:443 resources.blogblog.com tcp
US 52.33.207.7:80 busuk.org tcp
US 52.33.207.7:80 busuk.org tcp
NL 142.250.102.82:80 exeideasinternational.googlecode.com tcp
NL 142.250.102.82:80 exeideasinternational.googlecode.com tcp
US 8.8.8.8:53 i1227.photobucket.com udp
US 172.98.192.36:80 www.guablog.com tcp
US 172.98.192.36:80 www.guablog.com tcp
US 192.0.77.40:443 static.tumblr.com tcp
US 216.230.241.100:80 www.clocklink.com tcp
US 216.230.241.100:80 www.clocklink.com tcp
DE 46.4.70.136:80 dl9.glitter-graphics.net tcp
DE 46.4.70.136:80 dl9.glitter-graphics.net tcp
US 8.8.8.8:53 busuk.my udp
US 172.67.164.129:443 busuk.my tcp
US 172.67.164.129:443 busuk.my tcp
FR 3.165.113.116:443 i1227.photobucket.com tcp
FR 3.165.113.116:443 i1227.photobucket.com tcp
FR 3.165.113.116:443 i1227.photobucket.com tcp
FR 3.165.113.116:443 i1227.photobucket.com tcp
FR 3.165.113.116:443 i1227.photobucket.com tcp
FR 3.165.113.116:443 i1227.photobucket.com tcp
US 8.8.8.8:53 c.pki.goog udp
US 8.8.8.8:53 c.pki.goog udp
FR 142.250.179.67:80 c.pki.goog tcp
FR 142.250.179.67:80 c.pki.goog tcp
FR 142.250.179.67:80 c.pki.goog tcp
FR 142.250.179.67:80 c.pki.goog tcp
FR 142.250.179.67:80 c.pki.goog tcp
FR 142.250.179.67:80 c.pki.goog tcp
FR 142.250.179.67:80 c.pki.goog tcp
FR 142.250.179.67:80 c.pki.goog tcp
FR 142.250.179.67:80 c.pki.goog tcp
FR 142.250.179.67:80 c.pki.goog tcp
FR 142.250.179.67:80 c.pki.goog tcp
US 8.8.8.8:53 o.pki.goog udp
US 8.8.8.8:53 o.pki.goog udp
US 8.8.8.8:53 o.pki.goog udp
US 8.8.8.8:53 o.pki.goog udp
US 8.8.8.8:53 o.pki.goog udp
US 8.8.8.8:53 o.pki.goog udp
US 8.8.8.8:53 o.pki.goog udp
FR 142.250.179.67:80 o.pki.goog tcp
FR 142.250.179.67:80 o.pki.goog tcp
FR 142.250.179.67:80 o.pki.goog tcp
FR 142.250.179.67:80 o.pki.goog tcp
FR 142.250.179.67:80 o.pki.goog tcp
FR 142.250.179.67:80 o.pki.goog tcp
FR 142.250.179.67:80 o.pki.goog tcp
FR 142.250.179.67:80 o.pki.goog tcp
FR 3.165.113.116:443 i1227.photobucket.com tcp
FR 3.165.113.116:443 i1227.photobucket.com tcp
FR 216.58.215.33:80 1.bp.blogspot.com tcp
FR 216.58.215.33:80 1.bp.blogspot.com tcp
FR 216.58.215.33:80 1.bp.blogspot.com tcp
FR 216.58.215.33:80 1.bp.blogspot.com tcp
US 199.232.192.193:80 i.imgur.com tcp
US 199.232.192.193:80 i.imgur.com tcp
US 172.67.214.234:80 upic.me tcp
US 172.67.214.234:80 upic.me tcp
FR 216.58.215.33:80 1.bp.blogspot.com tcp
FR 216.58.215.33:80 1.bp.blogspot.com tcp
FR 216.58.215.33:80 1.bp.blogspot.com tcp
FR 216.58.215.33:80 1.bp.blogspot.com tcp
FR 216.58.215.33:80 1.bp.blogspot.com tcp
FR 216.58.215.33:80 1.bp.blogspot.com tcp
SG 118.139.179.30:80 www.linkwithin.com tcp
FR 3.165.113.116:80 i1227.photobucket.com tcp
SG 118.139.179.30:80 www.linkwithin.com tcp
FR 3.165.113.116:80 i1227.photobucket.com tcp
FR 3.165.113.31:80 i1227.photobucket.com tcp
FR 3.165.113.31:80 i1227.photobucket.com tcp
FR 3.165.113.31:80 i1227.photobucket.com tcp
FR 3.165.113.31:80 i1227.photobucket.com tcp
US 199.232.192.193:443 i.imgur.com tcp
FR 3.165.113.116:443 i1227.photobucket.com tcp
FR 3.165.113.31:443 i1227.photobucket.com tcp
FR 3.165.113.31:443 i1227.photobucket.com tcp
FR 3.165.113.12:80 i1227.photobucket.com tcp
FR 3.165.113.12:80 i1227.photobucket.com tcp
FR 3.165.113.12:443 i1227.photobucket.com tcp
FR 3.165.113.116:443 i1227.photobucket.com tcp
FR 3.165.113.116:443 i1227.photobucket.com tcp
FR 3.165.113.116:443 i1227.photobucket.com tcp
FR 3.165.113.116:443 i1227.photobucket.com tcp
US 8.8.8.8:53 synad2.nuffnang.com.my udp
US 8.8.8.8:53 i1218.photobucket.com udp
US 8.8.8.8:53 farm4.staticflickr.com udp
US 8.8.8.8:53 dl.glitter-graphics.net udp
US 8.8.8.8:53 t1.gstatic.com udp
FR 142.250.179.68:80 t1.gstatic.com tcp
FR 52.84.172.83:80 farm4.staticflickr.com tcp
FR 142.250.179.68:80 t1.gstatic.com tcp
FR 52.84.172.83:80 farm4.staticflickr.com tcp
DE 46.4.70.136:80 dl.glitter-graphics.net tcp
DE 46.4.70.136:80 dl.glitter-graphics.net tcp
FR 52.84.172.83:443 farm4.staticflickr.com tcp
FR 3.165.113.12:80 i1218.photobucket.com tcp
FR 3.165.113.12:80 i1218.photobucket.com tcp
FR 3.165.113.12:443 i1218.photobucket.com tcp
US 8.8.8.8:53 crt.rootg2.amazontrust.com udp
FR 3.164.163.87:80 crt.rootg2.amazontrust.com tcp
US 216.230.241.100:80 www.clocklink.com tcp
US 216.230.241.100:80 www.clocklink.com tcp
US 8.8.8.8:53 crl.microsoft.com udp
GB 104.77.160.198:80 crl.microsoft.com tcp
US 8.8.8.8:53 www.microsoft.com udp
US 23.192.22.93:80 www.microsoft.com tcp
US 8.8.8.8:53 www.facebook.com udp
US 8.8.8.8:53 data.whicdn.com udp
DK 157.240.200.35:80 www.facebook.com tcp
DK 157.240.200.35:80 www.facebook.com tcp
US 8.8.8.8:53 www6.cbox.ws udp
US 8.8.8.8:53 img838.imageshack.us udp
FR 3.165.113.116:80 i1218.photobucket.com tcp
US 8.8.8.8:53 cur.cursors-4u.net udp
US 108.181.41.161:80 www6.cbox.ws tcp
US 108.181.41.161:80 www6.cbox.ws tcp
US 8.8.8.8:53 i1101.photobucket.com udp
US 96.43.128.66:80 cur.cursors-4u.net tcp
US 96.43.128.66:80 cur.cursors-4u.net tcp
FR 3.165.113.35:80 i1101.photobucket.com tcp
FR 3.165.113.35:80 i1101.photobucket.com tcp
DK 157.240.200.35:443 www.facebook.com tcp
DK 157.240.200.35:443 www.facebook.com tcp
US 8.8.8.8:53 developers.google.com udp
FR 3.165.113.35:443 i1101.photobucket.com tcp
FR 142.250.178.142:80 developers.google.com tcp
FR 142.250.178.142:80 developers.google.com tcp
US 38.99.77.17:80 img838.imageshack.us tcp
US 38.99.77.17:80 img838.imageshack.us tcp
US 96.43.128.66:443 cur.cursors-4u.net tcp
FR 142.250.178.142:443 developers.google.com tcp
US 96.43.128.66:443 cur.cursors-4u.net tcp
US 96.43.128.66:443 cur.cursors-4u.net tcp
US 96.43.128.66:443 cur.cursors-4u.net tcp
US 8.8.8.8:53 data.whicdn.com udp
US 204.79.197.200:443 ieonline.microsoft.com tcp
US 204.79.197.200:443 ieonline.microsoft.com tcp
US 204.79.197.200:443 ieonline.microsoft.com tcp

Files

C:\Users\Admin\AppData\Local\Temp\CabFBBF.tmp

MD5 49aebf8cbd62d92ac215b2923fb1b9f5
SHA1 1723be06719828dda65ad804298d0431f6aff976
SHA256 b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512 bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b

C:\Users\Admin\AppData\Local\Temp\TarFBD1.tmp

MD5 4ea6026cf93ec6338144661bf1202cd1
SHA1 a1dec9044f750ad887935a01430bf49322fbdcb7
SHA256 8efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA512 6c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b

C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\24BD96D5497F70B3F510A6B53CD43F3E_3A89246FB90C5EE6620004F1AE0EB0EA

MD5 52853fd7658b314851211d6ef8b478e1
SHA1 12ce923ce6d3061e4a669fded6936bab7058da30
SHA256 5fc3dbbc98267c21ad19e433035fec410d3308001024dd19431de74cbc1a8c9f
SHA512 c3a080782adf33a70ca83e026165ca931b86da5dcde59c449d13bd0f47c67f104a27cecaee773802d16ca467c5b40b2effcb83a11e1d8b9a9b11b66ec2220459

C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\24BD96D5497F70B3F510A6B53CD43F3E_3A89246FB90C5EE6620004F1AE0EB0EA

MD5 c3703b6a022796570b39e9028f6fba59
SHA1 0ed6e21cf1766774efa63791dc713d1024d83367
SHA256 1f3603275cdf9da63dfe9fdcfae041507f1ba465511f50fd3c1a59078a4fef8a
SHA512 315b54422740738904dd15e3cd976cb2051cd6c90a8ed8c33d223b82b23707594a9e19201ad54f6fc4a1617338c2176e2a588c575c2b7d4105140ef6fc7dce92

C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\05DDC6AA91765AACACDB0A5F96DF8199

MD5 af811f10183fbfbbed990aac910beacc
SHA1 57b990c44670d07854ff2d184962bcb0ffc51305
SHA256 1ed24f8b625043d011d1de7cc3aefd1f0ab8d55f27f7b66a18045c13468962bd
SHA512 92b9dcb0401b003f64398a81d1e5dfeaee2ab2362989ec40ceaa1e6e37b3ebd24794e2bb972f5545350f04b6e4c9dc60b155cdd35606a01c0e6531d7e6a781e1

C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\05DDC6AA91765AACACDB0A5F96DF8199

MD5 e935bc5762068caf3e24a2683b1b8a88
SHA1 82b70eb774c0756837fe8d7acbfeec05ecbf5463
SHA256 a8accfcfeb51bd73df23b91f4d89ff1a9eb7438ef5b12e8afda1a6ff1769e89d
SHA512 bed4f6f5357b37662623f1f8afed1a3ebf3810630b2206a0292052a2e754af9dcfe34ee15c289e3d797a8f33330e47c14cbefbc702f74028557ace29bf855f9e

C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

MD5 fe398e5cdfa7839c3ded90b1cb23bcd0
SHA1 e77e5f16de8afaa061c003cfd025c1ee3ec9afb9
SHA256 5041ca3969157d1b5435862d00ea77638081b57521b2ffc45e422d9d656f6cd5
SHA512 e7f63c83688b6e7a898d593111547c8ade3793a978c762b389f68bbb2daa20600d6edd71ee358e9002f13b59065f759281fe91bffbd61dca6cc85bbcc7f6c4a9

C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\070E0202839D9D67350CD2613E78E416

MD5 00bae3a34792add5161648fa905438c6
SHA1 d452f9fcb5574b9e2dc721481056e8ab28943305
SHA256 964741e7e0bb4dd254deee9c9806c5f7447e159961ffe97dc1c9563728244a55
SHA512 1302d8dd6b1f76f2a66cc082f1bc6128d994f9472e140d2411c047e0543feea7828480a459336f234687faa61799e705f1ad85f906512644951e220cc19872cf

C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\070E0202839D9D67350CD2613E78E416

MD5 55540a230bdab55187a841cfe1aa1545
SHA1 363e4734f757bdeb89868efe94907774a327695e
SHA256 d73494e3446b02167573b3cde3ae1c8584ac26e15e45ac3ec0326708425d90fb
SHA512 c899cb1d31d3214fd9dc8626a55e40580d3b2224bf34310c2abd85d0f63e2dedaeae57832f048c2f500cb2cbf83683fcb14139af3f0b5251606076cdb4689c54

C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\070E0202839D9D67350CD2613E78E416

MD5 fda6367c8ba28b0c2833dd115703808d
SHA1 1c233ca780d02443cdafca673637d477d167e614
SHA256 89910f1aa669dd65753b6dea53fa2d434d7df43440d9cfbed9840313b1df80ec
SHA512 a370446917aed37187fb092cfd78091e070c4450786aa3b5a8fa64e60f192511acf0186c2d4c35df3cae4da002323eb0f3fcfa470ff1f6a6c8ee1bbb30073ab1

C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\DDE8B1B7E253A9758EC380BD648952AF_86F2A83F54EA52E2D59C5D2EE00149B8

MD5 72d6f7f443f4ccf6ba368fae162ec799
SHA1 61d63618b9c5d45248fab01b0b59464de3afbfb3
SHA256 3ae34b125a9d536c60a27c3f897018d0a872f25e308ad04096a3a2ba0b69543b
SHA512 8236771c9ea4f98e8395a3bde3c52036c2e2fcb38223cec1a3e240238a2b16cf61e983798627d83d5af4d500199528358238e81a495b1e5d4be0b686a4d736e8

C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

MD5 dccbb03254e393ca1fd5729abce13b46
SHA1 ed170773f69f85968b2f4a0493a7abfbf2a8086e
SHA256 46b3927f68415a52d4a506d965371cea7a98a3430c726ecce8d38cc82833b661
SHA512 fe7d5c867280a8c8340c96469bef73785b37e847bf8d903f7bc95f84a3abe244aca8fe2ad139cf789577f6b4429ad5d92a917dadbb08b6f4629a4ed085439bd0

C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

MD5 83057011432d2b7b3442f89dba0b00ab
SHA1 f1968166279692adbe24fe4a5ec81654648d8a88
SHA256 3b258acf58425cf7968bd333dffb72125d867bbd02096935bc8b11068912aeb8
SHA512 c4e2ec2483cebc3363b0ff27df2892978f153d4d66fbcd42233a89ffbfa2325f8111c39236d2afcf261ca62e92968617db04aae0b0aa2d7ec2b757b55241b10a

C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

MD5 a1d8fa32456f7c79a9d019031cc4e717
SHA1 190d2428430e3e4ec4b8830ea2924e78d930cf4f
SHA256 9640711aa9523e0f83b6fac5b38146f35d7368c492d869c61228333bb658e0a5
SHA512 84d0ca152f7e884351e6c6da3275abf2c6d6ce31feda2f1c0bf4b441217c84b2b99ddcb8fe5f9bcb7aadd2ad26888998bc2c331a8577ad245a14c81d4d71d5c6

C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

MD5 9f13a092d27c8bf48085e2edead5a908
SHA1 036b8a364d92cbef21f8b2463f0a49b337d114a9
SHA256 2988ee46a3096fa599d51683fc3e7c6b525a31b3bae79da273b183fe72af6f3b
SHA512 277cdfd094ebde8c61c7525250968fd254a715b62191b4e87803e16b854ea2ba622c7bb8ad26605c5310f964118de89b340a0a2693c811b8caedda96e945939c

C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

MD5 b5b4361557c6b36af6f05fa6a0f1ff20
SHA1 98e0dc6c8dc556fbc8186b2f3bea227e61503c55
SHA256 5fafbed8446da7937ed01d9c6119251e54b0c990e4f328c3ced34bd74e900183
SHA512 fa60f4085d96ec8a3cc81fa9f45502414fc1c9e95b439e7cbc2d7a7e547d4a493ece5bb1eb25a0a791f0bcf4553659dfdd1f4dcf63dffc85135b5cbac24ab2b9

C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

MD5 49483fe89ac5a565bdf594fcd1874dc7
SHA1 c76da14519dd54e5ef69a5c6825678d4db7c8600
SHA256 25396a5b1c91c9bce962567313dd44f238ec265bfea4e371759a4b7fc67d5096
SHA512 cad4a9a0e937da3743614fad98c6c270edf3d8f0fa07465f1c3ed699b9638b8267cb143ed75bba34456e9191a027abf71cee11339cdb52611468d48c8779e2dc

C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

MD5 187b119757c8006a213d51aa1932e887
SHA1 5fec5a07aa50ddfb51816faafbfafa7e302547fe
SHA256 991d6aded5c38b056ae1b44d5474eb179a4231cf1a3c8fe74a4ea4ce3364e864
SHA512 c6670582c0e8a48a970e5e34d4f70974a00d6fb554e168a643535aebe7c0294b28059f274d7aa16381bbc566c8d62253fadac8d388b741ce563e37caa38942fe

C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\B66240B0F6C84BD4857ABA60CF5CE4A0_5043E0F5DF723415C9EECC201C838A62

MD5 2c0a988d3814ed880a1bde0bc8d457b0
SHA1 267d0961378255381e9bc05b74cc5023bbab4e0a
SHA256 b33c064328fd21ba0d2504b366291533810904918b87eb99290599d4ce9a1ffd
SHA512 e29af120a1d450f4e37545c9298b39b1e72c3aba6f364444e694237ab0d2fd537189e95f08a57aebb1f9f7d66c6e66b111394a9a48533ba2e5e2f787ccd5a535

C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\B66240B0F6C84BD4857ABA60CF5CE4A0_5043E0F5DF723415C9EECC201C838A62

MD5 133186ad9b93960d31d573e568ce966d
SHA1 149de637001f6125304fb2598e3bc535175d2fdb
SHA256 4ee3c25cbe6d4639ca8842144a29c1de0e4b8a80b29ccc2a2a5980c5ed320f7e
SHA512 836b485a0f528cc6ccd454efc15fba7959e5cf904ae8f8a9398bf550e07d990b1f80c1cbe35c5055a7408411eba9e3cd08bff5fa6de512befe539e823c339263

C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\B66240B0F6C84BD4857ABA60CF5CE4A0_5043E0F5DF723415C9EECC201C838A62

MD5 cfd91936e84bfb59d0b9365c375ebf87
SHA1 47f6bfd90982b8373c3d36fa6673643496766e03
SHA256 e311479496e4e8a1c0dc035f6d53157c8d777b89b10c895c21e38f8c2b8e866e
SHA512 40f957302ab8cedca46ebfa35e12f92b3d50677bfa3a3d05fc8f4ba9ca3b60ce1ebc2f23bbe0267dc26f3d9ff0575f743e1352184fa844e1c941ad8b71e3c529

C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\BAD725C80F9E10846F35D039A996E4A8_88B6AE015495C1ECC395D19C1DD02894

MD5 94824f3f3d4a44d8992169eb389732f5
SHA1 d7d4c5dbd0a32e1b0031204a982f032eb8958738
SHA256 75c92a55248a372fef1a67e6e31b4b6cc1e775ca19eb3917daf0260378126ef1
SHA512 38377bd6513441bf438d75792b1281dac5deeb584ea524edaecfedda1bfaeb9bf05c11bb2e1ec3cdc99764456d5f66700de272cb3def49dd5ccfb39ed9f1ccd5

C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\BAD725C80F9E10846F35D039A996E4A8_88B6AE015495C1ECC395D19C1DD02894

MD5 d9b5a1c7fac94448fdcb4ed307967fa6
SHA1 d9a3f22b22cdd31313bfe4ce8c775e2859d55109
SHA256 f6f3dffaf59ad83dff4ae1572010a89de6e8d450c8e23d5472f4e1af0774adef
SHA512 5d43302042bd8425f09b201ab62281e14600b619cac1fd82dcc42bc3515d5417b06ab74f3b3c36993f65531af8c1edfce4e7d9a5ca1617e52c0522d1fe792ac3

C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\75CA58072B9926F763A91F0CC2798706_056B48C93C4964C2E64C0A8958238656

MD5 4d6d1b027efb1cf49519ea7030b60cff
SHA1 b0179998ccdacda9329e436e75081c4ce14939f2
SHA256 fd0717d22d9ecd6fc1dfd49fc432f07d1e5c366aa6fd8e55023b4510d8c8d5a1
SHA512 7d9232e32566c66d9afe84df677793881ff516a3ff5cdff574c744bf1204c6a286d99c3b06b9e745b8035d9567a2f30510fb5d42974dddcf9ed1993a14540b29

C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\75CA58072B9926F763A91F0CC2798706_056B48C93C4964C2E64C0A8958238656

MD5 4de48ab221a50dcb70156febd5deba33
SHA1 138cf4df825e66948c6ae59bf61683f076f6ceed
SHA256 19614e4416c259817c1b7ad55baae03a7646bdff4a100f76a65bb7b716e8acf8
SHA512 cf1b01de2bf0f3f8bc4d45d417e4070a65d4693590b540b404866e98e527a65ef45aeced8169e43aef79fdf329e85799f1f694df9d716ec5ff9abebe459c612f

C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\75CA58072B9926F763A91F0CC2798706_056B48C93C4964C2E64C0A8958238656

MD5 175b20337791e862f3d996e1a93d9947
SHA1 2c01fe848918e4a8635eaed4b61467cd1da82f8f
SHA256 4a1c5a1fb16cce661f4f545c09e10b86687efa1e33dfa5aef1b6783b0b8dd895
SHA512 0c0f3e44990d16a4a8e0d769654474566b17efdc34ec31aa3395845b8493b17b9326841e6248123e11eda800ea0b120a425e1f6618bd179acbde1e357d899b7c

C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\F0ACCF77CDCBFF39F6191887F6D2D357

MD5 18e9e91fcb0c246619eda81806facf4d
SHA1 6785b1f2c18966e4120c409255185ad67efde492
SHA256 a2afda67cc179edbfc8a973dd9e14f6c7c0fdfcf6583752563db01dcce424d2b
SHA512 f56d59ab4163a3b88b8f3be0b8d1c35f41f815f2094890b12f48f2706845b5f66eb9ff13b35caf1e018f40d12210b13540597eee4a560536ffe16a6e22c4415f

C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\F0ACCF77CDCBFF39F6191887F6D2D357

MD5 a266bb7dcc38a562631361bbf61dd11b
SHA1 3b1efd3a66ea28b16697394703a72ca340a05bd5
SHA256 df545bf919a2439c36983b54cdfc903dfa4f37d3996d8d84b4c31eec6f3c163e
SHA512 0da8ef4f8f6ed3d16d2bc8eb816b9e6e1345dfe2d91160196c47e6149a1d6aedaafadcefd66acdea7f72dcf0832770192ceac15b0c559c4ccc2c0e5581d5aefc

C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

MD5 a2f0f8b79da28ec08ff967b726d0fb71
SHA1 7f0011cf25331fc13faf20ff73ba40f2319cd791
SHA256 1504e4886087a1cc1ee96850d9087ecd42336dc91904c5cf5d77388bdfc9eb88
SHA512 5585fb9e1e9f26f877add2b80ef23edc6f16111dc9a7e7cf055e96d1a74feed075e609a27895381756ca778dae07dc0ab19101dfae087d3e0d98f93d8042e16b

C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

MD5 83d1339bb45e264f7abab5ded0f02ca3
SHA1 dc4ab4ff4196e11627b49106fb4069f3007918ff
SHA256 3181d6790a16005c28303ae9b8130374cea40c0704249bd8f7e6bed9db26ec4e
SHA512 173f9dc88c3d89baada9c31461cb3178b6779013809ee591cb257aa127949114654ed17a028e8adb0b9ff168e13fea23c4e1ee08d4960f0431e82236ba4abd87

C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

MD5 93e5beab264020de4ee618c702162fae
SHA1 0f45248f8de9ce3990d663765f0b3ccd32b0ceee
SHA256 670f015a49613ee784ceecfbb759a4bd427bedf7484af1d2be5e21e84009f122
SHA512 56347a985cd1ce172f8de9e7bc4cfa9eabe94d016aba7c1c4ab8a9fa411530b89ef3e672d5e2ed5c89862566d13ccc39b09bc644c6decd7bf4044288af645a5a

C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

MD5 7fda9256dc0d78366b80cbe97ffd163b
SHA1 36940d352ae26f1537ec23239ca42cd160c467f7
SHA256 7950af7a393b9e659fe73bba612ebf4823ed309e4aacf3eadd606c6005049ea8
SHA512 628e9e77d45aea23b6e1aba3ea92fc0f4e0036f1e02b9287525fb61e1e924122ac8600902dc100c35e90a813ebc08456225668767b29d44353c110592936bc14

C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

MD5 2d1c233c15a5ed4abc9d58b0fc26f498
SHA1 3fe911b09558eb21230940e28dd485b861783ca4
SHA256 bb2fd70958169d5ccc554c83b2e6eea4ca64075ac593bb110e2eb90f8525bce1
SHA512 0d1eeba507acca445d9f067604fa35b8a26a922d43d55987b677112f1ad986067e7d947185af04614d3da6ccf430c29fc91a613476d8a4932644adf14aa86570

C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

MD5 76b2e7ba8589a23e188e1663caea488b
SHA1 b387a6348413004eeb24669790dc6f422fdfd1f6
SHA256 ea35285618978d9fe22f77823047dbef149a38f435e024999de792cfda1aec2e
SHA512 2ff91e0b2a98093064156c0bee3958052fbf65d5f07c35da85810822f62542d434323bcf96d898c01b788f69dce68673cc04288c286b28d68b049add90461d3b

C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

MD5 3dadbb44c911e3228c404696297c9a40
SHA1 33fa13a3a20a1ff5f0f8ee3a258430c6ca7d8b0c
SHA256 b1ecfc1cd6ee5c44439c261737df6f733fef5ea9c106e0756f2c2d90f706d998
SHA512 b68cdea935810ffc6a7c80a111b5c4bc1e8351f452874acf50a90a7595889b612895dcf246387e3ee5e248fd9fdb3733e1b7f0688d24b91a09492d9256a58f48

C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

MD5 4f4c5bfca9df4056bdeedf3769a0ebc3
SHA1 a31bb81efb50240fee040d9897979ded21600382
SHA256 726d5c5b1fc85ac36a8d99e34b6ddc76b0a9983704790607eeedcbd97a92aa5d
SHA512 a59dc83ebb2b579aa4f94cc409805dc32c782427d359af50ac18a976761ba552a9b1f00a5d9d8426cbd27fe908d7274cad81683ebfac5dcef1cf1c8f28e34af3

C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\3C428B1A3E5F57D887EC4B864FAC5DCC

MD5 e4a68ac854ac5242460afd72481b2a44
SHA1 df3c24f9bfd666761b268073fe06d1cc8d4f82a4
SHA256 cb3ccbb76031e5e0138f8dd39a23f9de47ffc35e43c1144cea27d46a5ab1cb5f
SHA512 5622207e1ba285f172756f6019af92ac808ed63286e24dfecc1e79873fb5d140f1ceb7133f2476e89a5f75f711f9813a9fbb8fd5287f64adfdcc53b864f9bdc5

C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

MD5 09efffdd15e29a758b9c4da9819c8a0e
SHA1 abfdaf78dd2f28b7dc7b7b1646e94f62e6a68274
SHA256 037586909e2cc1c23e5ba06628acd70792d8f78203a49cfdbd47c1cfbae52d92
SHA512 32b489a098efaf00e9486766987d13ee18b048b3985cdf68b81e36941da7c81430dfab41478dab718f4846ff82beee5c4e0b287848bb66fcf9090933941c40ae

C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

MD5 94e4354becc18755fe39f4c568062b75
SHA1 e20e67a7365d652073a5d93516731b9bb60fbb0c
SHA256 696a1fd74dc02f46b427920c0ad3b26768f6fdec2314193980b56b06d1d85fcc
SHA512 d40dce6382e68ce84b035c8b7e5c70fa8826df5a8b7f77fd8eafa01acca5e4cf1d18600910d610e55d9d4114edf728aa97f19e3c9d4b7abd4a6fc654508c2d2b

C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\3C428B1A3E5F57D887EC4B864FAC5DCC

MD5 6d7f341c4bd8cc015f38879674d32f90
SHA1 c4da2d9c2927655c4eacdcadd253379d0718efc1
SHA256 fd805fd286235488ec20fe93247c0621798ee101145a7774ebca7fb00f648d47
SHA512 a65ff0b546699e34a7b32176941f4bf3b953014c707c24efb854b3e76611abfcc61141c303cd19aae64f54e94aeaccbb21ee812cee5ef5eaf878049054c9dd72

C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

MD5 cdc7c75a09e40a596d82e43e7a23a558
SHA1 6621c7a4726387f161720f48b691184ae761a374
SHA256 b77bc0fb73872235a7cf416a137255d2cf6418d2d0f2563b882c353b7b72cbe9
SHA512 6d5bc1450112d6f17f479c275c28c6c367a40cfa1db3d6756d6f43e2e258ab88f7b85c8bc600b7898cdb7e227118ea6f495da93184c2dd80356cd0db43a7e4d2

C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

MD5 b4b59af1105503aa7ae83d667f21ae95
SHA1 16a3f6fb1781b2c289c1d4fa1bfac7ee4fe0537a
SHA256 39fc525b428f14145ec7742a1502b8a67aa19576f7db439db9811008ffbd2ba0
SHA512 5699ffa1845270ed327a0f990ebda0b2329e12cc37d0bbff0be154d461bf7e88a4e09a6d04b4ce9b9d45a4ad38798e12c3173a1265e0cd30f17b78b15f427b64

Analysis: behavioral2

Detonation Overview

Submitted

2024-12-19 05:45

Reported

2024-12-19 05:48

Platform

win10v2004-20241007-en

Max time kernel

145s

Max time network

149s

Command Line

"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --start-maximized --single-argument C:\Users\Admin\AppData\Local\Temp\feace28d598625877f2de65ff86ca172_JaffaCakes118.html

Signatures

Browser Information Discovery

discovery

Enumerates system info in registry

Description Indicator Process Target
Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe N/A
Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe N/A
Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe N/A

Suspicious use of FindShellTrayWindow

Description Indicator Process Target
N/A N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe N/A
N/A N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe N/A
N/A N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe N/A
N/A N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe N/A
N/A N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe N/A
N/A N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe N/A
N/A N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe N/A
N/A N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe N/A
N/A N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe N/A
N/A N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe N/A
N/A N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe N/A
N/A N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe N/A
N/A N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe N/A
N/A N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe N/A
N/A N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe N/A
N/A N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe N/A
N/A N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe N/A
N/A N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe N/A
N/A N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe N/A
N/A N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe N/A
N/A N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe N/A
N/A N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe N/A
N/A N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe N/A
N/A N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe N/A
N/A N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe N/A

Suspicious use of SendNotifyMessage

Description Indicator Process Target
N/A N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe N/A
N/A N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe N/A
N/A N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe N/A
N/A N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe N/A
N/A N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe N/A
N/A N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe N/A
N/A N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe N/A
N/A N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe N/A
N/A N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe N/A
N/A N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe N/A
N/A N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe N/A
N/A N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe N/A
N/A N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe N/A
N/A N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe N/A
N/A N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe N/A
N/A N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe N/A
N/A N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe N/A
N/A N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe N/A
N/A N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe N/A
N/A N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe N/A
N/A N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe N/A
N/A N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe N/A
N/A N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe N/A
N/A N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe N/A

Suspicious use of WriteProcessMemory

Description Indicator Process Target
PID 3492 wrote to memory of 1532 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 3492 wrote to memory of 1532 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 3492 wrote to memory of 636 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 3492 wrote to memory of 636 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 3492 wrote to memory of 636 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 3492 wrote to memory of 636 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 3492 wrote to memory of 636 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 3492 wrote to memory of 636 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 3492 wrote to memory of 636 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 3492 wrote to memory of 636 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 3492 wrote to memory of 636 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 3492 wrote to memory of 636 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 3492 wrote to memory of 636 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 3492 wrote to memory of 636 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 3492 wrote to memory of 636 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 3492 wrote to memory of 636 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 3492 wrote to memory of 636 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 3492 wrote to memory of 636 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 3492 wrote to memory of 636 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 3492 wrote to memory of 636 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 3492 wrote to memory of 636 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 3492 wrote to memory of 636 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 3492 wrote to memory of 636 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 3492 wrote to memory of 636 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 3492 wrote to memory of 636 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 3492 wrote to memory of 636 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 3492 wrote to memory of 636 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 3492 wrote to memory of 636 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 3492 wrote to memory of 636 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 3492 wrote to memory of 636 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 3492 wrote to memory of 636 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 3492 wrote to memory of 636 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 3492 wrote to memory of 636 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 3492 wrote to memory of 636 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 3492 wrote to memory of 636 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 3492 wrote to memory of 636 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 3492 wrote to memory of 636 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 3492 wrote to memory of 636 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 3492 wrote to memory of 636 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 3492 wrote to memory of 636 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 3492 wrote to memory of 636 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 3492 wrote to memory of 636 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 3492 wrote to memory of 2172 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 3492 wrote to memory of 2172 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 3492 wrote to memory of 4188 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 3492 wrote to memory of 4188 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 3492 wrote to memory of 4188 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 3492 wrote to memory of 4188 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 3492 wrote to memory of 4188 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 3492 wrote to memory of 4188 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 3492 wrote to memory of 4188 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 3492 wrote to memory of 4188 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 3492 wrote to memory of 4188 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 3492 wrote to memory of 4188 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 3492 wrote to memory of 4188 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 3492 wrote to memory of 4188 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 3492 wrote to memory of 4188 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 3492 wrote to memory of 4188 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 3492 wrote to memory of 4188 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 3492 wrote to memory of 4188 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 3492 wrote to memory of 4188 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 3492 wrote to memory of 4188 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 3492 wrote to memory of 4188 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 3492 wrote to memory of 4188 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe

Processes

C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe

"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --start-maximized --single-argument C:\Users\Admin\AppData\Local\Temp\feace28d598625877f2de65ff86ca172_JaffaCakes118.html

C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe

"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffcbdc846f8,0x7ffcbdc84708,0x7ffcbdc84718

C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe

"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2152,12270279806223086549,9153614898615388083,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2160 /prefetch:2

C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe

"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2152,12270279806223086549,9153614898615388083,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2244 /prefetch:3

C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe

"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2152,12270279806223086549,9153614898615388083,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2724 /prefetch:8

C:\Windows\System32\CompPkgSrv.exe

C:\Windows\System32\CompPkgSrv.exe -Embedding

C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe

"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2152,12270279806223086549,9153614898615388083,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3312 /prefetch:1

C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe

"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2152,12270279806223086549,9153614898615388083,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3436 /prefetch:1

C:\Windows\System32\CompPkgSrv.exe

C:\Windows\System32\CompPkgSrv.exe -Embedding

C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe

"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2152,12270279806223086549,9153614898615388083,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5116 /prefetch:1

C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe

"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2152,12270279806223086549,9153614898615388083,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5596 /prefetch:1

C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe

"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2152,12270279806223086549,9153614898615388083,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5056 /prefetch:1

C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe

"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2152,12270279806223086549,9153614898615388083,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5884 /prefetch:1

C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe

"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2152,12270279806223086549,9153614898615388083,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6184 /prefetch:1

C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe

"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2152,12270279806223086549,9153614898615388083,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2868 /prefetch:8

C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe

"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2152,12270279806223086549,9153614898615388083,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2868 /prefetch:8

C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe

"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2152,12270279806223086549,9153614898615388083,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=13 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6844 /prefetch:1

C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe

"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2152,12270279806223086549,9153614898615388083,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=14 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6784 /prefetch:1

C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe

"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2152,12270279806223086549,9153614898615388083,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=15 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=7112 /prefetch:1

C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe

"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2152,12270279806223086549,9153614898615388083,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=16 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6588 /prefetch:1

C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe

"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2152,12270279806223086549,9153614898615388083,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=4968 /prefetch:2

Network

Country Destination Domain Proto
US 8.8.8.8:53 code.jquery.com udp
US 8.8.8.8:53 www.blogger.com udp
US 8.8.8.8:53 ajax.googleapis.com udp
US 8.8.8.8:53 static.tumblr.com udp
US 8.8.8.8:53 busuk.org udp
US 8.8.8.8:53 www.clocklink.com udp
US 8.8.8.8:53 www.linkwithin.com udp
US 8.8.8.8:53 s7.addthis.com udp
US 8.8.8.8:53 apis.google.com udp
US 8.8.8.8:53 www.guablog.com udp
US 8.8.8.8:53 i1231.photobucket.com udp
US 8.8.8.8:53 heartbeat.my udp
US 8.8.8.8:53 resources.blogblog.com udp
US 8.8.8.8:53 i1227.photobucket.com udp
US 192.0.77.40:80 static.tumblr.com tcp
US 151.101.2.137:80 code.jquery.com tcp
FR 216.58.214.169:443 resources.blogblog.com tcp
FR 142.250.75.234:443 ajax.googleapis.com tcp
FR 142.250.75.234:80 ajax.googleapis.com tcp
US 192.0.77.40:443 static.tumblr.com tcp
FR 216.58.214.169:443 resources.blogblog.com tcp
FR 142.250.75.234:443 ajax.googleapis.com tcp
FR 142.250.75.234:80 ajax.googleapis.com tcp
US 8.8.8.8:53 2.bp.blogspot.com udp
FR 216.58.215.33:80 2.bp.blogspot.com tcp
US 8.8.8.8:53 40.77.0.192.in-addr.arpa udp
US 8.8.8.8:53 137.2.101.151.in-addr.arpa udp
US 8.8.8.8:53 169.214.58.216.in-addr.arpa udp
US 8.8.8.8:53 234.75.250.142.in-addr.arpa udp
US 8.8.8.8:53 58.55.71.13.in-addr.arpa udp
FR 216.58.214.169:443 resources.blogblog.com udp
SG 118.139.179.30:80 www.linkwithin.com tcp
FR 142.250.179.78:443 apis.google.com tcp
US 216.230.241.100:80 www.clocklink.com tcp
FR 3.165.113.35:80 i1227.photobucket.com tcp
FR 3.165.113.35:80 i1227.photobucket.com tcp
FR 3.165.113.35:80 i1227.photobucket.com tcp
US 44.230.85.241:80 busuk.org tcp
FR 3.165.113.12:80 i1227.photobucket.com tcp
FR 216.58.214.169:443 resources.blogblog.com tcp
LT 93.115.28.104:80 www.guablog.com tcp
NL 142.250.102.82:80 exeideasinternational.googlecode.com tcp
FR 142.250.179.78:443 apis.google.com udp
FR 3.165.113.35:80 i1227.photobucket.com tcp
FR 3.165.113.35:80 i1227.photobucket.com tcp
FR 216.58.214.169:443 resources.blogblog.com tcp
US 8.8.8.8:53 3.bp.blogspot.com udp
US 8.8.8.8:53 1.bp.blogspot.com udp
US 8.8.8.8:53 4.bp.blogspot.com udp
SG 118.139.179.30:80 www.linkwithin.com tcp
US 216.230.241.100:80 www.clocklink.com tcp
US 44.230.85.241:80 busuk.org tcp
FR 3.165.113.35:80 i1227.photobucket.com tcp
FR 216.58.214.169:443 resources.blogblog.com tcp
FR 3.165.113.12:80 i1227.photobucket.com tcp
SG 118.139.179.30:80 www.linkwithin.com tcp
MY 117.53.152.181:80 heartbeat.my tcp
FR 3.165.113.35:443 i1227.photobucket.com tcp
FR 3.165.113.35:443 i1227.photobucket.com tcp
US 8.8.8.8:53 i1218.photobucket.com udp
FR 216.58.215.33:80 4.bp.blogspot.com tcp
FR 216.58.215.33:80 4.bp.blogspot.com tcp
FR 216.58.215.33:80 4.bp.blogspot.com tcp
US 8.8.8.8:53 t1.gstatic.com udp
FR 3.165.113.12:443 i1218.photobucket.com tcp
FR 3.165.113.35:443 i1218.photobucket.com tcp
FR 3.165.113.35:443 i1218.photobucket.com tcp
FR 3.165.113.35:443 i1218.photobucket.com tcp
FR 216.58.215.33:80 4.bp.blogspot.com tcp
FR 216.58.215.33:80 4.bp.blogspot.com tcp
US 8.8.8.8:53 i1117.photobucket.com udp
FR 142.250.74.226:445 pagead2.googlesyndication.com tcp
US 8.8.8.8:53 img.photobucket.com udp
US 8.8.8.8:53 33.215.58.216.in-addr.arpa udp
US 8.8.8.8:53 78.179.250.142.in-addr.arpa udp
US 8.8.8.8:53 104.28.115.93.in-addr.arpa udp
US 8.8.8.8:53 35.113.165.3.in-addr.arpa udp
US 8.8.8.8:53 12.113.165.3.in-addr.arpa udp
US 8.8.8.8:53 30.179.139.118.in-addr.arpa udp
US 8.8.8.8:53 82.102.250.142.in-addr.arpa udp
FR 216.58.215.33:80 4.bp.blogspot.com tcp
FR 3.165.113.35:80 img.photobucket.com tcp
FR 142.250.179.68:80 t1.gstatic.com tcp
FR 3.165.113.35:443 img.photobucket.com tcp
FR 3.165.113.31:80 img.photobucket.com tcp
FR 3.165.113.12:80 img.photobucket.com tcp
MY 117.53.152.181:80 heartbeat.my tcp
US 8.8.8.8:53 i1135.photobucket.com udp
FR 3.165.113.35:443 i1135.photobucket.com tcp
FR 3.165.113.31:443 i1135.photobucket.com tcp
FR 3.165.113.12:443 i1135.photobucket.com tcp
FR 3.165.113.12:80 i1135.photobucket.com tcp
US 8.8.8.8:53 upic.me udp
US 172.67.214.234:80 upic.me tcp
US 172.67.214.234:80 upic.me tcp
US 8.8.8.8:53 dl.glitter-graphics.net udp
US 8.8.8.8:53 farm4.staticflickr.com udp
US 8.8.8.8:53 busuk.my udp
FR 52.84.172.83:80 farm4.staticflickr.com tcp
US 172.67.164.129:443 busuk.my tcp
DE 46.4.70.136:80 dl.glitter-graphics.net tcp
FR 52.84.172.83:443 farm4.staticflickr.com tcp
US 8.8.8.8:53 i.imgur.com udp
US 8.8.8.8:53 dl9.glitter-graphics.net udp
US 199.232.192.193:80 i.imgur.com tcp
US 8.8.8.8:53 crt.rootg2.amazontrust.com udp
US 199.232.192.193:443 i.imgur.com tcp
FR 3.164.163.59:80 crt.rootg2.amazontrust.com tcp
DE 46.4.70.136:80 dl9.glitter-graphics.net tcp
US 8.8.8.8:53 synad2.nuffnang.com.my udp
US 8.8.8.8:53 241.85.230.44.in-addr.arpa udp
US 8.8.8.8:53 68.179.250.142.in-addr.arpa udp
US 8.8.8.8:53 31.113.165.3.in-addr.arpa udp
US 8.8.8.8:53 38.201.222.52.in-addr.arpa udp
US 8.8.8.8:53 181.152.53.117.in-addr.arpa udp
US 8.8.8.8:53 234.214.67.172.in-addr.arpa udp
US 8.8.8.8:53 83.172.84.52.in-addr.arpa udp
US 8.8.8.8:53 129.164.67.172.in-addr.arpa udp
US 8.8.8.8:53 136.70.4.46.in-addr.arpa udp
US 8.8.8.8:53 193.192.232.199.in-addr.arpa udp
US 8.8.8.8:53 59.163.164.3.in-addr.arpa udp
FR 142.250.74.226:139 pagead2.googlesyndication.com tcp
US 8.8.8.8:53 a.nel.cloudflare.com udp
US 35.190.80.1:443 a.nel.cloudflare.com tcp
US 35.190.80.1:443 a.nel.cloudflare.com udp
US 8.8.8.8:53 64.159.190.20.in-addr.arpa udp
US 8.8.8.8:53 1.80.190.35.in-addr.arpa udp
N/A 224.0.0.251:5353 udp
US 8.8.8.8:53 95.221.229.192.in-addr.arpa udp
US 8.8.8.8:53 154.239.44.20.in-addr.arpa udp
US 8.8.8.8:53 s7.addthis.com udp
US 8.8.8.8:53 www.facebook.com udp
GB 157.240.221.35:445 www.facebook.com tcp
LT 93.115.28.104:80 www.guablog.com tcp
US 8.8.8.8:53 synad2.nuffnang.com.my udp
NL 142.250.102.82:80 exeideasinternational.googlecode.com tcp
US 8.8.8.8:53 accounts.google.com udp
US 8.8.8.8:53 www.facebook.com udp
NL 142.250.27.84:443 accounts.google.com tcp
US 8.8.8.8:53 www6.cbox.ws udp
US 8.8.8.8:53 data.whicdn.com udp
DK 157.240.200.35:80 www.facebook.com tcp
US 8.8.8.8:53 img838.imageshack.us udp
US 108.181.41.161:80 www6.cbox.ws tcp
US 108.181.41.161:80 www6.cbox.ws tcp
US 38.99.77.17:80 img838.imageshack.us tcp
US 8.8.8.8:53 cur.cursors-4u.net udp
US 8.8.8.8:53 i1101.photobucket.com udp
DK 157.240.200.35:443 www.facebook.com tcp
US 96.43.128.66:80 cur.cursors-4u.net tcp
FR 3.165.113.31:80 i1101.photobucket.com tcp
US 8.8.8.8:53 84.27.250.142.in-addr.arpa udp
US 8.8.8.8:53 35.200.240.157.in-addr.arpa udp
US 96.43.128.66:443 cur.cursors-4u.net tcp
US 8.8.8.8:53 lh3.googleusercontent.com udp
FR 142.250.179.78:443 apis.google.com udp
US 8.8.8.8:53 www.cbox.ws udp
US 8.8.8.8:53 ssl.gstatic.com udp
FR 142.250.179.65:443 lh3.googleusercontent.com tcp
FR 142.250.179.99:443 ssl.gstatic.com tcp
US 8.8.8.8:53 161.41.181.108.in-addr.arpa udp
US 8.8.8.8:53 17.77.99.38.in-addr.arpa udp
US 8.8.8.8:53 66.128.43.96.in-addr.arpa udp
US 8.8.8.8:53 195.20.217.172.in-addr.arpa udp
US 8.8.8.8:53 65.179.250.142.in-addr.arpa udp
US 8.8.8.8:53 99.179.250.142.in-addr.arpa udp
US 8.8.8.8:53 200.163.202.172.in-addr.arpa udp
US 8.8.8.8:53 206.23.85.13.in-addr.arpa udp
US 8.8.8.8:53 140.71.91.104.in-addr.arpa udp
US 8.8.8.8:53 play.google.com udp
FR 216.58.214.174:443 play.google.com tcp
US 8.8.8.8:53 174.214.58.216.in-addr.arpa udp
US 8.8.8.8:53 88.210.23.2.in-addr.arpa udp
US 35.190.80.1:443 a.nel.cloudflare.com udp
FR 216.58.214.169:443 resources.blogblog.com udp
US 8.8.8.8:53 19.229.111.52.in-addr.arpa udp
FR 216.58.214.169:443 resources.blogblog.com udp

Files

C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad\settings.dat

MD5 61cef8e38cd95bf003f5fdd1dc37dae1
SHA1 11f2f79ecb349344c143eea9a0fed41891a3467f
SHA256 ae671613623b4477fbd5daf1fd2d148ae2a09ddcc3804b2b6d4ffcb60b317e3e
SHA512 6fb9b333fe0e8fde19fdd0bd01a1990a4e60a87c0a02bc8297da1206e42f8690d06b030308e58c862e9e77714a585eed7cc1627590d99a10aeb77fc0dd3d864d

\??\pipe\LOCAL\crashpad_3492_MVWRVLLGKEKFGZRW

MD5 d41d8cd98f00b204e9800998ecf8427e
SHA1 da39a3ee5e6b4b0d3255bfef95601890afd80709
SHA256 e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855
SHA512 cf83e1357eefb8bdf1542850d66d8007d620e4050b5715dc83f4a921d36ce9ce47d0d13c5d85f2b0ff8318d2877eec2f63b931bd47417a81a538327af927da3e

C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad\settings.dat

MD5 0a9dc42e4013fc47438e96d24beb8eff
SHA1 806ab26d7eae031a58484188a7eb1adab06457fc
SHA256 58d66151799526b3fa372552cd99b385415d9e9a119302b99aadc34dd51dd151
SHA512 868d6b421ae2501a519595d0c34ddef25b2a98b082c5203da8349035f1f6764ddf183197f1054e7e86a752c71eccbc0649e515b63c55bc18cf5f0592397e258f

C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Preferences

MD5 512309e06d0ac710e393eb485919a4ba
SHA1 b870b4307556c78c97b4d7ed241966adde6b7ead
SHA256 27bac5db2feed1a3486753f0a491cf5e286b99f0aeb700968592ca23e0d380a2
SHA512 abb9844ae3e2309d8aecd8d1a4a73d2a1fcdfe9368678fe7419333b66cbdc19ab3adac099d9ece815cdad54b4122039cb0c6206c080cea957f84943f0bb2a722

C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Local State

MD5 9ebca3b5b1c534bc375b938d07245b44
SHA1 61c7b42701b5fa13a2e5dc52467fe5f44a6b81fe
SHA256 cb3ff364988a877a390916c103b98f190bc72a5d2df80e6700b5519a5f51399c
SHA512 905ac01f3a23a2dda26b4bcb4d299a5c6d94188011b0382f928c18062efc26c033195ee12f23f50fd3fcd64dacf4872d99223f9fdafba1e21b94547a0ec73ba6

C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Preferences

MD5 f6c5e9deed165c814f2834c3324b5c88
SHA1 ab620bedda7c461ea70929e220e6db44717b8ef5
SHA256 e605af78ff1834ac206d01cb66c3b5d1f4cc4c8067982b84d4daa3089fee7ed7
SHA512 73acaef9e6927613029b55ce6e4cabc039a8be5c46c9f94b06e5f36100effc0a0652739bbd1cc1b0486a77f7b8c962a05d1bfa9ba657745755a0e913763502a5

C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index

MD5 e5bcc9420a76504c14a06028820f1055
SHA1 868c0bc707b3b76d744f0c65694f0ed3cdaa8c30
SHA256 8e1f43acfdf8da5202c11b4af47dbf66841fea1072a1263eb7c11494206a4b9c
SHA512 d405cc095a3a03337d73f5f38c970684160a211ec27544f644cbb2de7bd3bd37bf83c16a05f117dcf3ced895530c8f4df5dc6d06805d6f92958409ff21ec6b02

C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Preferences

MD5 fc835780d89910f1141d25f2ab486481
SHA1 146c8061bd9b1531507ab26c04c7ac3410d8c9db
SHA256 9e57040b3ccde539cd3d8230584e5a42c7843a6a5193f3cbce78b16eabd519b5
SHA512 f2695c4a0b06e95a59643186063415ec8f5b33cc0554e2e4bed9c69d307688223277a99705e6d9f71acbdad2e71431fa034f5bbc0cf3ded99db429eb177a0502

C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\TransportSecurity

MD5 60d091c0c72367fc15fef13ae69b3315
SHA1 91ba25dc0581ac7bdf5ab3dc6b7fa12a177bf0f5
SHA256 11f4e70eb87ff0bc4d8ad43813f6d7ec118279a533ba101e47c230d1cc3762f1
SHA512 4ce193269a3463772c2be11251ea97ad3431202bb6e984abaf920036a36728194be6a0d8d391400e8ee11d18fae6165d532bbfca2b1a43624d5c6bfa69ea0238

C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\TransportSecurity~RFe57ef23.TMP

MD5 d8ea2f068db291999842b2d362a2866b
SHA1 523e54b28180ab56132898e0b037c6fce323c397
SHA256 8cc92bf9ce6f3d51054415f703d179098f17b4dea7b0ced29a2e85b6c86a7a0b
SHA512 12c3a272de1005271c82be024888f00cb4cf779cf353a086be72593b0ace3c184dda5587486bcd5575ba9073c1edc934eb2a8fb800bfc3ca3ab484deff66369a

C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index

MD5 eef9f67b9af72694f56d2f77c131cf26
SHA1 26b919c44623e0f59bdebe5beb96c60327cf22cf
SHA256 ce069fc51e52220f68ec1a65430d6a0019701207a254f2b304d09142039cb5ca
SHA512 fea85805ca994deb7441195f05f3179885ba256e6c0b4c8418606c4d19e91e244d786e73e8dbf5cbbb51a40dca8cfab700eda14ede553cfd6f75534cc6748a15

C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\data_reduction_proxy_leveldb\CURRENT

MD5 6752a1d65b201c13b62ea44016eb221f
SHA1 58ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA256 0861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA512 9cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389

C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Network Persistent State

MD5 747a680c44c5d90cadf7428327f08667
SHA1 54d9ebdf79377dcc1ae377d04129f9ac20d37889
SHA256 2cea8a53bfaf7b77ef5523cbec67542aefca5b48a8d767501c8de088d0b5a7d9
SHA512 cad9f6b8189d59ba510db07008ac672cca246ecc07c43f61668f63add3cb6eec6525597f91b9e2a5813f01881d42632c586228e3e043623bcc74826258869844

C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Network Persistent State

MD5 68d2920a88e9cddd4060af82f664b637
SHA1 fc5ad9593cfec6e4cda17306be1d9dacbea0209f
SHA256 e9207382ae0efc6fc7dc5b53052a7a3b4472d8cc01418a4411088e35f303c5f5
SHA512 ca4127c36f9ad2a99bf53438a7df644520adc8c5d5833d87c5bde8e09f24c13a87dfb1a4e73ea41ce61eb8f8c4eef8f4c5dd2d74c057ae48fc2f1ea4fed6ed74