Malware Analysis Report

2025-04-13 11:37

Sample ID 250101-gd742synhr
Target JaffaCakes118_49423663230338a37a453eaa7b678150
SHA256 441da42811494a323f7b0d241e3d08dd2358f3ccaef670f9d70d8b8976f692e4
Tags
socgholish discovery downloader
score
10/10

Table of Contents

Analysis Overview

MITRE ATT&CK

Enterprise Matrix V15

Analysis: static1

Detonation Overview

Signatures

Analysis: behavioral1

Detonation Overview

Command Line

Signatures

Processes

Network

Files

Analysis: behavioral2

Detonation Overview

Command Line

Signatures

Processes

Network

Files

Analysis Overview

score
10/10

SHA256

441da42811494a323f7b0d241e3d08dd2358f3ccaef670f9d70d8b8976f692e4

Threat Level: Known bad

The file JaffaCakes118_49423663230338a37a453eaa7b678150 was found to be: Known bad.

Malicious Activity Summary

socgholish discovery downloader

Socgholish family

SocGholish

System Location Discovery: System Language Discovery

Browser Information Discovery

Suspicious use of WriteProcessMemory

Enumerates system info in registry

Suspicious behavior: EnumeratesProcesses

Modifies Internet Explorer settings

Suspicious use of FindShellTrayWindow

Suspicious use of SetWindowsHookEx

Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary

Suspicious use of SendNotifyMessage

MITRE ATT&CK

Analysis: static1

Detonation Overview

Reported

2025-01-01 05:42

Signatures

N/A

Analysis: behavioral1

Detonation Overview

Submitted

2025-01-01 05:42

Reported

2025-01-01 05:44

Platform

win7-20240903-en

Max time kernel

129s

Max time network

143s

Command Line

"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_49423663230338a37a453eaa7b678150.html

Signatures

SocGholish

downloader socgholish

Socgholish family

socgholish

System Location Discovery: System Language Discovery

discovery
Description Indicator Process Target
Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE N/A

Modifies Internet Explorer settings

adware spyware
Description Indicator Process Target
Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\IETld\LowMic C:\Program Files\Internet Explorer\iexplore.exe N/A
Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain C:\Program Files\Internet Explorer\iexplore.exe N/A
Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing C:\Program Files\Internet Explorer\iexplore.exe N/A
Set value (int) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{2E831B81-C803-11EF-926E-C6DA928D33CD} = "0" C:\Program Files\Internet Explorer\iexplore.exe N/A
Set value (str) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" C:\Program Files\Internet Explorer\iexplore.exe N/A
Set value (data) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 C:\Program Files\Internet Explorer\iexplore.exe N/A
Set value (int) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" C:\Program Files\Internet Explorer\iexplore.exe N/A
Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE N/A
Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage C:\Program Files\Internet Explorer\iexplore.exe N/A
Set value (str) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" C:\Program Files\Internet Explorer\iexplore.exe N/A
Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\InternetRegistry C:\Program Files\Internet Explorer\iexplore.exe N/A
Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\LowRegistry C:\Program Files\Internet Explorer\iexplore.exe N/A
Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\PageSetup C:\Program Files\Internet Explorer\iexplore.exe N/A
Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Main C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE N/A
Set value (str) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE N/A
Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\GPU C:\Program Files\Internet Explorer\iexplore.exe N/A
Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive C:\Program Files\Internet Explorer\iexplore.exe N/A
Set value (int) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" C:\Program Files\Internet Explorer\iexplore.exe N/A
Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage C:\Program Files\Internet Explorer\iexplore.exe N/A
Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic C:\Program Files\Internet Explorer\iexplore.exe N/A
Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery C:\Program Files\Internet Explorer\iexplore.exe N/A
Set value (data) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 01000000d08c9ddf0115d1118c7a00c04fc297eb010000007798e7e0600ea04aa88b69a6923d1880000000000200000000001066000000010000200000005b622789e3ac373b5d14fe807382b28738fad9b3dbb9d79a43e4d1a2533095f8000000000e8000000002000020000000c311473696724fede55c8980963a7a6add1df1e2b3a6fc72664e208b5660e7fa900000003cb85aa6a40c8fd04e89b66e92529d54463f0ae9bae3a64a13a26899e38f7a632d605e6fb789b6633b7b2d934424327acca765e8e8469afd83621b80b8b93fe725f171ba91039c37beef7ddc5803963ad529c8453e74e332ffd474773b895a1c3582e33d768b81c78c97c0fade90f8fd9fb904c0d79e9290e6ccc4636cbcaf7749cf90bdc6e222d0a2cbaed023ecb33140000000dd4dcd64f4be2400e4d9ce624e7ae475a0591d0cd206566b3561c2e7ec053a8bb96bfcaffb31b002c4f7c62ae8a9f83705de34e9f8fb730cee441c04f423cb10 C:\Program Files\Internet Explorer\iexplore.exe N/A
Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\DomainSuggestion C:\Program Files\Internet Explorer\iexplore.exe N/A
Set value (int) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "441872014" C:\Program Files\Internet Explorer\iexplore.exe N/A
Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Toolbar C:\Program Files\Internet Explorer\iexplore.exe N/A
Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser C:\Program Files\Internet Explorer\iexplore.exe N/A
Set value (int) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" C:\Program Files\Internet Explorer\iexplore.exe N/A
Set value (int) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" C:\Program Files\Internet Explorer\iexplore.exe N/A
Set value (data) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = f0338206105cdb01 C:\Program Files\Internet Explorer\iexplore.exe N/A
Set value (int) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" C:\Program Files\Internet Explorer\iexplore.exe N/A
Set value (data) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb010000007798e7e0600ea04aa88b69a6923d18800000000002000000000010660000000100002000000028811ffb613e45751ba0debdfac0aef5b4aae94fb861fd6cb817c2b2d0fc3ea0000000000e80000000020000200000002cc614fb00d71c8bce8f7afce1015f9af910a00e9cac171a206d5e57bbb4ed8a20000000fddda250e05fe76f5f25f56c23645b7b141131de07f420f1992fde8b53547c3f400000002df29b3db0b9f7d66050709280f1daf05e58685a19f8f004ef8fb00be80d488ad71e5a38f707893f1b3ffd302ca6ddde848f0397716f8c3c171d8281a9c9d6f4 C:\Program Files\Internet Explorer\iexplore.exe N/A
Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Main C:\Program Files\Internet Explorer\iexplore.exe N/A
Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\IntelliForms C:\Program Files\Internet Explorer\iexplore.exe N/A
Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Zoom C:\Program Files\Internet Explorer\iexplore.exe N/A
Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch C:\Program Files\Internet Explorer\iexplore.exe N/A
Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\SearchScopes C:\Program Files\Internet Explorer\iexplore.exe N/A

Suspicious use of FindShellTrayWindow

Description Indicator Process Target
N/A N/A C:\Program Files\Internet Explorer\iexplore.exe N/A

Processes

C:\Program Files\Internet Explorer\iexplore.exe

"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_49423663230338a37a453eaa7b678150.html

C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE

"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1020 CREDAT:275457 /prefetch:2

Network

Country Destination Domain Proto
US 8.8.8.8:53 www.blogger.com udp
US 8.8.8.8:53 webvn20.googlecode.com udp
US 8.8.8.8:53 ajax.googleapis.com udp
US 8.8.8.8:53 maps.googleapis.com udp
US 8.8.8.8:53 apis.google.com udp
US 8.8.8.8:53 w.sharethis.com udp
US 8.8.8.8:53 connect.facebook.net udp
US 8.8.8.8:53 s7.addthis.com udp
US 8.8.8.8:53 img1.blogblog.com udp
US 8.8.8.8:53 www.linkwithin.com udp
US 8.8.8.8:53 4.bp.blogspot.com udp
US 8.8.8.8:53 www.dmca.com udp
US 8.8.8.8:53 www.pulsimo.com udp
US 8.8.8.8:53 images-blogger-opensocial.googleusercontent.com udp
US 8.8.8.8:53 3.bp.blogspot.com udp
US 8.8.8.8:53 www.alexa.com udp
US 8.8.8.8:53 s05.flagcounter.com udp
US 8.8.8.8:53 mybloggertricks.googlecode.com udp
US 8.8.8.8:53 resources.infolinks.com udp
FR 142.250.201.170:80 maps.googleapis.com tcp
FR 142.250.201.170:80 maps.googleapis.com tcp
FR 142.250.201.170:80 maps.googleapis.com tcp
FR 142.250.201.170:80 maps.googleapis.com tcp
FR 142.250.201.170:80 maps.googleapis.com tcp
FR 142.250.201.170:80 maps.googleapis.com tcp
FR 216.58.214.169:443 img1.blogblog.com tcp
FR 216.58.214.169:443 img1.blogblog.com tcp
FR 216.58.214.169:443 img1.blogblog.com tcp
FR 172.217.20.170:443 maps.googleapis.com tcp
FR 172.217.20.170:443 maps.googleapis.com tcp
FR 172.217.20.170:80 maps.googleapis.com tcp
NL 142.250.102.82:80 mybloggertricks.googlecode.com tcp
NL 142.250.102.82:80 mybloggertricks.googlecode.com tcp
FR 142.250.179.78:443 apis.google.com tcp
FR 142.250.179.78:443 apis.google.com tcp
FR 216.58.213.74:80 maps.googleapis.com tcp
FR 216.58.213.74:80 maps.googleapis.com tcp
FR 18.164.52.84:80 w.sharethis.com tcp
FR 18.164.52.84:80 w.sharethis.com tcp
DE 185.60.217.28:80 connect.facebook.net tcp
SG 118.139.179.30:80 www.linkwithin.com tcp
DE 185.60.217.28:80 connect.facebook.net tcp
SG 118.139.179.30:80 www.linkwithin.com tcp
US 3.208.97.163:80 www.alexa.com tcp
US 3.208.97.163:80 www.alexa.com tcp
US 206.221.176.133:80 s05.flagcounter.com tcp
US 206.221.176.133:80 s05.flagcounter.com tcp
US 13.107.246.64:80 www.dmca.com tcp
FR 216.58.215.33:80 3.bp.blogspot.com tcp
US 13.107.246.64:80 www.dmca.com tcp
FR 216.58.215.33:80 3.bp.blogspot.com tcp
FR 142.250.179.97:443 images-blogger-opensocial.googleusercontent.com tcp
FR 216.58.215.33:443 3.bp.blogspot.com tcp
FR 142.250.179.97:443 images-blogger-opensocial.googleusercontent.com tcp
FR 216.58.215.33:443 3.bp.blogspot.com tcp
US 172.66.41.9:80 resources.infolinks.com tcp
US 172.66.41.9:80 resources.infolinks.com tcp
NL 142.250.102.82:80 mybloggertricks.googlecode.com tcp
NL 142.250.102.82:80 mybloggertricks.googlecode.com tcp
FR 216.58.214.169:80 img1.blogblog.com tcp
FR 216.58.214.169:80 img1.blogblog.com tcp
US 13.107.246.64:443 www.dmca.com tcp
FR 18.164.52.84:443 w.sharethis.com tcp
DE 185.60.217.28:443 connect.facebook.net tcp
FR 18.164.52.84:443 w.sharethis.com tcp
US 103.224.182.251:80 www.pulsimo.com tcp
US 103.224.182.251:80 www.pulsimo.com tcp
FR 18.164.52.84:443 w.sharethis.com tcp
US 3.208.97.163:443 www.alexa.com tcp
FR 18.164.52.84:443 w.sharethis.com tcp
US 8.8.8.8:53 c.pki.goog udp
US 8.8.8.8:53 c.pki.goog udp
US 8.8.8.8:53 c.pki.goog udp
US 8.8.8.8:53 c.pki.goog udp
US 8.8.8.8:53 c.pki.goog udp
US 8.8.8.8:53 c.pki.goog udp
US 8.8.8.8:53 c.pki.goog udp
US 8.8.8.8:53 c.pki.goog udp
US 8.8.8.8:53 c.pki.goog udp
US 8.8.8.8:53 c.pki.goog udp
US 8.8.8.8:53 c.pki.goog udp
FR 142.250.179.67:80 c.pki.goog tcp
FR 142.250.179.67:80 c.pki.goog tcp
FR 142.250.179.67:80 c.pki.goog tcp
FR 142.250.179.67:80 c.pki.goog tcp
FR 142.250.179.67:80 c.pki.goog tcp
FR 142.250.179.67:80 c.pki.goog tcp
FR 142.250.179.67:80 c.pki.goog tcp
FR 142.250.179.67:80 c.pki.goog tcp
FR 142.250.179.67:80 c.pki.goog tcp
FR 142.250.179.67:80 c.pki.goog tcp
FR 142.250.179.67:80 c.pki.goog tcp
US 8.8.8.8:53 o.pki.goog udp
US 8.8.8.8:53 o.pki.goog udp
US 8.8.8.8:53 o.pki.goog udp
US 8.8.8.8:53 o.pki.goog udp
FR 142.250.179.67:80 o.pki.goog tcp
FR 142.250.179.67:80 o.pki.goog tcp
FR 142.250.179.67:80 o.pki.goog tcp
FR 142.250.179.67:80 o.pki.goog tcp
FR 142.250.179.67:80 o.pki.goog tcp
FR 142.250.179.67:80 o.pki.goog tcp
FR 142.250.179.67:80 o.pki.goog tcp
FR 142.250.179.67:80 o.pki.goog tcp
US 8.8.8.8:53 crt.rootg2.amazontrust.com udp
FR 142.250.179.67:80 o.pki.goog tcp
FR 142.250.179.67:80 o.pki.goog tcp
FR 142.250.179.67:80 o.pki.goog tcp
FR 3.164.163.59:80 crt.rootg2.amazontrust.com tcp
US 8.8.8.8:53 cse.google.com udp
FR 172.217.20.174:80 cse.google.com tcp
FR 172.217.20.174:80 cse.google.com tcp
FR 216.58.215.33:80 3.bp.blogspot.com tcp
US 8.8.8.8:53 2.bp.blogspot.com udp
US 8.8.8.8:53 1.bp.blogspot.com udp
FR 216.58.215.33:80 1.bp.blogspot.com tcp
FR 216.58.215.33:80 1.bp.blogspot.com tcp
FR 216.58.215.33:80 1.bp.blogspot.com tcp
FR 216.58.215.33:80 1.bp.blogspot.com tcp
FR 216.58.215.33:80 1.bp.blogspot.com tcp
FR 216.58.215.33:80 1.bp.blogspot.com tcp
FR 216.58.215.33:80 1.bp.blogspot.com tcp
FR 216.58.215.33:80 1.bp.blogspot.com tcp
FR 216.58.215.33:80 1.bp.blogspot.com tcp
US 8.8.8.8:53 www.google.com udp
FR 172.217.20.164:80 www.google.com tcp
FR 172.217.20.164:80 www.google.com tcp
US 8.8.8.8:53 ocsp.r2m03.amazontrust.com udp
FR 13.249.8.192:80 ocsp.r2m03.amazontrust.com tcp
US 8.8.8.8:53 trends.google.com udp
FR 172.217.20.164:443 trends.google.com tcp
FR 172.217.20.164:443 trends.google.com tcp
FR 172.217.20.163:80 fonts.gstatic.com tcp
FR 172.217.20.163:80 fonts.gstatic.com tcp
US 8.8.8.8:53 web.facebook.com udp
DE 185.60.217.20:443 web.facebook.com tcp
DE 185.60.217.20:443 web.facebook.com tcp
DE 185.60.217.20:443 web.facebook.com tcp
DE 185.60.217.20:443 web.facebook.com tcp
US 8.8.8.8:53 accounts.google.com udp
NL 142.250.27.84:443 accounts.google.com tcp
NL 142.250.27.84:443 accounts.google.com tcp
US 8.8.8.8:53 ssl.gstatic.com udp
FR 142.250.179.99:443 ssl.gstatic.com tcp
FR 142.250.179.99:443 ssl.gstatic.com tcp
US 8.8.8.8:53 www.facebook.com udp
DE 185.60.217.35:443 www.facebook.com tcp
DE 185.60.217.35:443 www.facebook.com tcp
US 8.8.8.8:53 static.xx.fbcdn.net udp
DE 185.60.217.28:443 static.xx.fbcdn.net tcp
DE 185.60.217.28:443 static.xx.fbcdn.net tcp
FR 142.250.179.99:443 ssl.gstatic.com tcp
FR 172.217.20.164:443 trends.google.com tcp
US 8.8.8.8:53 ssl.google-analytics.com udp
FR 142.250.178.136:443 ssl.google-analytics.com tcp
FR 142.250.178.136:443 ssl.google-analytics.com tcp
US 8.8.8.8:53 crl.microsoft.com udp
GB 88.221.134.83:80 crl.microsoft.com tcp
US 8.8.8.8:53 www.microsoft.com udp
GB 95.100.245.144:80 www.microsoft.com tcp
US 204.79.197.200:443 ieonline.microsoft.com tcp
US 204.79.197.200:443 ieonline.microsoft.com tcp
US 8.8.8.8:53 www.microsoft.com udp
US 8.8.8.8:53 www.microsoft.com udp
US 204.79.197.200:443 ieonline.microsoft.com tcp
NL 142.250.27.84:443 accounts.google.com tcp
NL 142.250.27.84:443 accounts.google.com tcp
NL 142.250.27.84:443 accounts.google.com tcp
NL 142.250.27.84:443 accounts.google.com tcp

Files

C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\24BD96D5497F70B3F510A6B53CD43F3E_3A89246FB90C5EE6620004F1AE0EB0EA

MD5 1036b1a6f784df9c8d81f40f01556aed
SHA1 d7da3b6d3d02ed6416016d650630a7dc3a571d01
SHA256 5b34ed18ca7f0bb51bd5aaeb196af6df7317fec3778aa3a452b7a21a61df108d
SHA512 cdc93fd42cc8dfd0218b4e668f91b8f5da9b5e51fb2adf132a996520ad86b6ab3ac1e34134776ddfe580c6e57e50661b7f28b0d85d49285513760788eb1c2883

C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\24BD96D5497F70B3F510A6B53CD43F3E_3A89246FB90C5EE6620004F1AE0EB0EA

MD5 16612e2a26f6c92fcecf94f15b5b256c
SHA1 df9164d39edf7f5c5250c40a26ffe5e867905c4f
SHA256 e955af5dbd813551849f4b8465b91387bd93eda6b1a51c7a9735da951b454294
SHA512 973779074ef0213a4e996e84adc7fd87cc2ee36c10023c47e6f56b287061fe23b0c09591ff0e0c27235c23b04eedbdf3cb7147c96f674b528e163d1f862065ab

C:\Users\Admin\AppData\Local\Temp\Cab8171.tmp

MD5 49aebf8cbd62d92ac215b2923fb1b9f5
SHA1 1723be06719828dda65ad804298d0431f6aff976
SHA256 b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512 bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b

C:\Users\Admin\AppData\Local\Temp\Tar8194.tmp

MD5 4ea6026cf93ec6338144661bf1202cd1
SHA1 a1dec9044f750ad887935a01430bf49322fbdcb7
SHA256 8efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA512 6c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b

C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\05DDC6AA91765AACACDB0A5F96DF8199

MD5 e935bc5762068caf3e24a2683b1b8a88
SHA1 82b70eb774c0756837fe8d7acbfeec05ecbf5463
SHA256 a8accfcfeb51bd73df23b91f4d89ff1a9eb7438ef5b12e8afda1a6ff1769e89d
SHA512 bed4f6f5357b37662623f1f8afed1a3ebf3810630b2206a0292052a2e754af9dcfe34ee15c289e3d797a8f33330e47c14cbefbc702f74028557ace29bf855f9e

C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\05DDC6AA91765AACACDB0A5F96DF8199

MD5 5766f3030ce98aaa90fc4c5eb95d6299
SHA1 ae71216fee86c01fd733f750554814134af27439
SHA256 259f200f5e27645b7c3e604704bad83b19ae9be09302403f3387a69d10e65e5f
SHA512 99ad9ce3cda1e3460d42da200305e38d6b23eb9adfb96a13476cb3ac89e149cfb9686229189b919645c0f7411ef447f10e152c15a47aa66f0a9daa5c0292ee08

C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

MD5 d6b6c2f471be85dc0177cd052d0ab2b6
SHA1 266b6afea0f521c746123f5a689ef5a219abae5c
SHA256 51a82a899d8e13d99277c0dbb7505b97cf70f1ac429401e8b3deb9fe15267c9c
SHA512 c738bc62a6fb8ec3c4171df2bbaf0c1b036ebe27d3302a0d7909874f23ed4102361248b77d27eb55ae61bdba8d61eb991adff2e5d7e48959e4a147f09a5b1c9e

C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

MD5 576bec894811985d4cc9082a01dee26f
SHA1 1724030f11c8dd9582663446add8a0a2a9d71a68
SHA256 605db60af2e4d3b43604bde12a41306632e5b68f17c2c660809411de062774de
SHA512 d8070c696838ddac3f9778b063de36e85d80cebb170d4790b9befff1562cf6e1ca02ac918f901c99a737c31fe37e2104539aa76b503dc5efc8d6916eef7c1f1d

C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\633SXO0D\cb=gapi[5].js

MD5 b103bb58d9e7cecaa60bdf377d328918
SHA1 0f094c307bceef833a64f408d2f749a10f79de44
SHA256 81dcd274347bd909cf132d3c8bcc9924e41921c33eca07fd6fe5e2a59ca4f5b7
SHA512 b1a4fa329b76df7c861771e1dc36749155895dff623cd916811f2af8c95f3bcf9fe75a3b9a56833f066a227444982ff4883459e24f7eead79b521c2ffdcaa844

C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\PLSLTMYI\lpXZFogWYmZ[1].css

MD5 51c6a905fc3f5dd4791f8ea9bf62471d
SHA1 675c1d41eabccdce9f26e434516481921f30ba30
SHA256 6bd807739c6ad31e17a420140e18994895c5c891e7cfae304bb82a06fdd1b750
SHA512 966365307b0a05a23458ecb4c68cf17133221a28d37dc24073f017ef7af149f8b4e1d295be2664f24acffb8d41ac5316fe6f571ecd553259e15571327ef3e7f6

C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

MD5 b15c2bd48de2353dcf65243b2aa8d461
SHA1 c357b9f042048ffaed33bd62c8e5a255b1da2e57
SHA256 74aaa857ebee41e104f15e20bb9e7bb2d54e2610447f00fd6ad9773292a1982f
SHA512 da1672cbf6bba2b34ceaf0320815b661748ba48927b90d37ebd73894e246418c2cab28f59752d7205383def3aee711356d0b8f6b5d12ba04c3d9d17150a1671c

C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

MD5 6f2837c90386c82fede8bc68817d4f55
SHA1 1efd8ce2a9dbd246b57766f8bfe27d259dac84eb
SHA256 83b18c4625501a72a32142f977368d8109f4ccefd0c191cc38469ece22204b9c
SHA512 b9bc94880ba5d140901e7a8247db5ed3f809365f0e3304f237d5000e974fd9383f9677dd4838a787ae35b22c492629a7ca1620988770dbfeb763ce6587f1b35a

C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

MD5 61fac321ea04a1c76ff8c47fe26579b6
SHA1 558ba275a3248345397416ac808f3e0963016ca7
SHA256 b768dad902650a05d9177840c1b7db7ac61924df6f7c6994a3374ddfbce7576e
SHA512 0b6f89d3dab1536e68db7616518d17d7555d903ec8dc1aedf12ea09a2632581858651cf7a7a31fb5713421c808adf4d2e3239619abbec54350aa534a195f2388

C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

MD5 d803cd9812625cc9805881d67c468a9b
SHA1 442b39d8ffddc2ba25bb5a3ac9de214ac92146f7
SHA256 f1303634fa05d20f5d3ead13cfc50f80983106d4dd0215c867cc70e86bb94f17
SHA512 ffa58fafce5a128670aef2663cc6b9fd8c95057c5b710840dd0387e128a963c648af59ecc8d4b54735c00d94e5395b75cb260c7fe125ea88a0dc40d50c12bf07

C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

MD5 2887d42c70ee89f53f6eb1981b284e7c
SHA1 27a376be5a87ef5ddc2d9ae71066d5b5d79b4447
SHA256 1eea2abe0ce908c59ba0cf741ae731560b2af76e8f68f4027b28c794d890e4af
SHA512 d3812829cb76fbc43696410b9dd7d86b29675af0e0b78ed1a4bad477b3dea64d52fb451ded15567efaba81577e668b59754da569bf1873b06b29ead8197f7cef

C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

MD5 2b587a3493df77eb1ea98d68856acad3
SHA1 1e132e2e61ee14119565eca79018ec704de0d81b
SHA256 05d232b98bf7e91354ccb2a68c43b4af339153875696b82e162eda056393efc9
SHA512 3b704e01b1bb6e0326fdf2f28ea3284aa726e3ad963794832a9a764964ef7f0831abf4df1d640a3d4a7871e80fa49f964fa15a7a8198698c4e6d02d71dd72c63

C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

MD5 ccd06cc97d0a990cb70e14ca09640b46
SHA1 fc45128b6bc5fc102283de30ce0b76a2ad579d78
SHA256 2bda89c1f2ab23a18c79fdad2130795e15effbd8afad60db23d6594ff75ca09d
SHA512 1749389bbd5b9f7cb167a3cb287fe54760125c1575742a6031b6458f93bc948a4bd26b78694e1a463d1c74077631ae962dd031a039837634e0c2d7624f8b53a1

C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

MD5 385b9912a22d0d5e6fa085259b529e1d
SHA1 e87d01bc37205bb88a1b47499cbd0383d6ac46c9
SHA256 ef318d5154e55594c9f7d53167eb6f8972e69e87956f9442051c82a67da0fd24
SHA512 7946b983915c8dfa36632cbd3ec2496b4e3f5049002ab5dbef2a561f87a71c5347dc021303697616b1de02e134754727f17bf551116e2729c8bc066f14b159c3

C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

MD5 5646d2140e90b363fb525136f56c43e0
SHA1 e6986f5f640c7d75bc9fbea20ea6b826066a8d6c
SHA256 16373bf8fd1de67ef8078d8c6b73ef6c16396f1f395a14f16df0d1f2a704283f
SHA512 14389e219977120cbb60110e03331f1e6647d6814e755ea2b50049324cc424333e9175e2ca5cb390a20a81387c885f868326b802f99c7f73779a98f6dc15a0a4

C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

MD5 d40f6253fdddfaad06c5671edcf2ffcf
SHA1 85d6c710f635aa58ffde00bb83a07cd3a55eebd4
SHA256 db1653eb6f7a70436c31872bdf4ba69b4dbee64a4c065f28bef97f3f1a681158
SHA512 09362ab0394703a9fd857d6cda3c2141aabcaec5d79b4c819629ccbf2a738b189577f0f996c4a1d556f413a7c2ec87a354c91c4b540e63932e9b36bec5f2e115

C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

MD5 a9ca52c298a5727c1a7194a00896464e
SHA1 2e97177f320dba9218a173acad57e644ff5e0ecf
SHA256 b6ada6c4af1d32ce67eeaa850fd9ff8a29c9c09df8b92b1471e116cf9064f689
SHA512 4a887ce9fd7f1b8b1af96a430d354ca16ebefd8178c5a6d2c7de67a7c8269feeba2a35c5b30bc161cd13fde1592f8562a07e14cd318c8e69a895683379de2b6e

C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

MD5 845f6cd5396d5b1af59ac2134a8785e1
SHA1 f5e5a05048f157d5cf80608b475004053fc185c4
SHA256 d3434d96ef9205ba5cd9a01e5ce9b111e1d0b6360f46fa6111099175311ae5a8
SHA512 78dc9ae00b57b589a2cecff349a016ed7b730102f2fac1db7d14911dd20b38eec8af7fc11b2688b9dea92d23b549a861447acb5b9ca518e7772702e2d5d4feef

C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\F0ACCF77CDCBFF39F6191887F6D2D357

MD5 a266bb7dcc38a562631361bbf61dd11b
SHA1 3b1efd3a66ea28b16697394703a72ca340a05bd5
SHA256 df545bf919a2439c36983b54cdfc903dfa4f37d3996d8d84b4c31eec6f3c163e
SHA512 0da8ef4f8f6ed3d16d2bc8eb816b9e6e1345dfe2d91160196c47e6149a1d6aedaafadcefd66acdea7f72dcf0832770192ceac15b0c559c4ccc2c0e5581d5aefc

C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\F0ACCF77CDCBFF39F6191887F6D2D357

MD5 f801e9307171b2275628232fb518bee0
SHA1 04cce087def7c83df2bc4801bc5143b97954cac7
SHA256 c961795b3b4569b4f17e65f6b003ac90d9cab695adeaa7adcfee9b9e66e28f0d
SHA512 ae51f207ef196c5ee2a6417ee38aad9b83a94c6fb7024d7504d47a6f92179f63af817b228fe8d27c9f4b5cf18b03d69c992170bf22584f8bb49a68b2484e7de5

C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

MD5 aabfa7db818d558562df1a55c82625cd
SHA1 cfa163f887274397ee01cbf4562aba0108dc8549
SHA256 b76140da876d29217fa159139755683b9e16c2e06e3c9d2f3f22e6532bcbc826
SHA512 7004077b291718b9b39cb107c10c7c3f7a02f1215eb0ea757877254d82655f4227155cc5f3c4e36b7b4e873190faf94419762072c5a0e0f5e19c2c809cdd6edf

C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

MD5 0208b8a4500164026e9010ed575aad75
SHA1 f4bb7a8a2e5226a40d0c733c4b6e5402964c92c1
SHA256 3246e6dc39e3d915e2aff5f0a3f529157a9e1fb1a8ff3f642694521a6d6511d6
SHA512 a06a9dba431e3006a483e03684a5ceaff53ad805f5164e074d95dba18703de03279c02ac63d45cd214497f419bb2f1abe5d4370b34eb127d586005991afcce77

C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

MD5 15f2c7e2d0458a845d37feac8bc22c30
SHA1 e4996fd3015c3b38bd56b613972319e40f7735bf
SHA256 d8a966888c93d0be9b2d446ccef823c6c4a543a25829e30ada6c458dc5ce7665
SHA512 d6a83d3f8f8a309a727f4d48ae1757f0949ea12533b813c4c02907ac274fbb17488964f906cf01605097bd84078c4e918156f6174f19bb78e9fb2ac1e3fcf928

C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

MD5 97deaae4a192d3115a267d21c1d27e1d
SHA1 428d3f96b54db3761883b9e125368b345cb679ef
SHA256 ed62e746cdfbadf5621b0a62713665dc1f8998164b6b8c9db95fdee71976baf0
SHA512 e305f09a0a679925dab134e07ebccdec77358ac1122594157f6ad5556aa73d3d11134d91b6027db1390c1240bf92cfa17323d50c586d2ed4e55398ddb5427e4a

C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\3C428B1A3E5F57D887EC4B864FAC5DCC

MD5 e4a68ac854ac5242460afd72481b2a44
SHA1 df3c24f9bfd666761b268073fe06d1cc8d4f82a4
SHA256 cb3ccbb76031e5e0138f8dd39a23f9de47ffc35e43c1144cea27d46a5ab1cb5f
SHA512 5622207e1ba285f172756f6019af92ac808ed63286e24dfecc1e79873fb5d140f1ceb7133f2476e89a5f75f711f9813a9fbb8fd5287f64adfdcc53b864f9bdc5

C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

MD5 c99af97a287b13736e0536b8a621a466
SHA1 36c4c688736d100e46124021e75ad223eb3d1299
SHA256 4d151e4c0f64794e452800d879ca4527564f8bf0f5f9c5e466b590c9297381a7
SHA512 98085132326269859681580cd90ae207b878c7bc90dd86527fd413133f84601bfa36bc7589f56bc92d0693b0ab5f8085e1dc9e01a66a91fd40c02f055c3c5a5c

C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\3C428B1A3E5F57D887EC4B864FAC5DCC

MD5 39ee119a7dccf6566c70b9a6457e96f0
SHA1 99147fa93a3358697e5deeb88850c6a71ed0a623
SHA256 2495b9998de4abe3bb17e6c8881261e4dd56fb10b0d5dcedc63333d9eb4c5976
SHA512 4972e8ffd0c9a98b96022099188fcf7c73ad2878c88c50886e10104b400513a922be025bcce2816e2ca56829406ab5c434427b7da7ec798490ea12dc231bef6f

C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

MD5 4cda7dbe8783a5e055971998dda99c24
SHA1 d3aec2ed51a5eded792bba1325d2ff2c7e45b822
SHA256 7ab20f35d13a5e3fe5833908d81503015550f1861105c3d06059da77a3b9fb11
SHA512 5b242bf64ed5fd22838ac859159053e06df59c9284ffdc2a357fe2b1978ad267e81d05142f4dca07f178f1a3277922454d24a4458f00b5671e3bdbb84eb0d0c0

C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

MD5 67a74c560ebae436946f5d0cc413b075
SHA1 26504f55ed17488e605231766237da7a72ee6f93
SHA256 7098fdbf003a76aa616ca4ea3e91b08e1687c2d76d449dd5efd32843a355041a
SHA512 aef581c909c9362561373dd9d3265dfac7a599bc9e4c488825f46af7ba5a60ecf04512f23d406cc8986d02bc9a713ee8961ae8032ec56f6552d69490e3f88023

C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

MD5 abfa5559af9e59a88353ce47dd184342
SHA1 4b9c6ae4cdcdba3a938c7de5c182d57ea18f957b
SHA256 c72d32c1752c02377a59dd11f3dd3dccfa73c417d2c4c2a0df29455aabc8b448
SHA512 c8a3a3349ac77245de918ac3591f73e187d694eafd3ffa24b14666b6a83a17882df611238f766b54aeb83312557206fb208bce42afa1e29f921f68916e3141ef

C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\QS2MOPHD\2254111616-postmessagerelay[1].js

MD5 c264799bac4a96a4cd63eb09f0476a74
SHA1 d8a1077bf625dac9611a37bfb4e6c0cd07978f4c
SHA256 17dce4003e6a3d958bb8307bffa9c195694881f549943a7bdb2769b082f9326d
SHA512 6acd83dfd3db93f1f999d524b8828b64c8c0731567c3c0b8a77c6ddcf03d0e74ee20d23171e6ceac0c9f099dce03f8e5d68e78c374da2c055973f6ac2db4e4f9

C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\PLSLTMYI\rpc_shindig_random[1].js

MD5 25879c1792060210aabb2cc664498542
SHA1 349848a5e88088b22fb4762ca2a619d1a7f40d97
SHA256 1c0dff80b0111b04f387f0c39fe8d199e909c285f5471da80d6da78c79f9fc79
SHA512 845cb435d102d39b001e7f00d7528dbc3f8505809f5fbca039587ed82d9790b16c9179de8877fd48f2fdab11e7308ad003303821217213a2b99e60d9915a9c88

Analysis: behavioral2

Detonation Overview

Submitted

2025-01-01 05:42

Reported

2025-01-01 05:44

Platform

win10v2004-20241007-en

Max time kernel

149s

Max time network

151s

Command Line

"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --start-maximized --single-argument C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_49423663230338a37a453eaa7b678150.html

Signatures

Browser Information Discovery

discovery

Enumerates system info in registry

Description Indicator Process Target
Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe N/A
Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe N/A
Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe N/A

Suspicious use of FindShellTrayWindow

Description Indicator Process Target
N/A N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe N/A
N/A N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe N/A
N/A N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe N/A
N/A N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe N/A
N/A N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe N/A
N/A N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe N/A
N/A N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe N/A
N/A N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe N/A
N/A N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe N/A
N/A N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe N/A
N/A N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe N/A
N/A N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe N/A
N/A N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe N/A
N/A N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe N/A
N/A N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe N/A
N/A N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe N/A
N/A N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe N/A
N/A N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe N/A
N/A N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe N/A
N/A N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe N/A
N/A N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe N/A
N/A N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe N/A
N/A N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe N/A
N/A N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe N/A
N/A N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe N/A

Suspicious use of SendNotifyMessage

Description Indicator Process Target
N/A N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe N/A
N/A N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe N/A
N/A N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe N/A
N/A N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe N/A
N/A N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe N/A
N/A N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe N/A
N/A N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe N/A
N/A N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe N/A
N/A N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe N/A
N/A N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe N/A
N/A N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe N/A
N/A N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe N/A
N/A N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe N/A
N/A N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe N/A
N/A N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe N/A
N/A N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe N/A
N/A N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe N/A
N/A N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe N/A
N/A N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe N/A
N/A N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe N/A
N/A N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe N/A
N/A N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe N/A
N/A N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe N/A
N/A N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe N/A

Suspicious use of WriteProcessMemory

Description Indicator Process Target
PID 4768 wrote to memory of 444 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 4768 wrote to memory of 444 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 4768 wrote to memory of 1228 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 4768 wrote to memory of 1228 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 4768 wrote to memory of 1228 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 4768 wrote to memory of 1228 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 4768 wrote to memory of 1228 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 4768 wrote to memory of 1228 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 4768 wrote to memory of 1228 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 4768 wrote to memory of 1228 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 4768 wrote to memory of 1228 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 4768 wrote to memory of 1228 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 4768 wrote to memory of 1228 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 4768 wrote to memory of 1228 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 4768 wrote to memory of 1228 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 4768 wrote to memory of 1228 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 4768 wrote to memory of 1228 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 4768 wrote to memory of 1228 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 4768 wrote to memory of 1228 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 4768 wrote to memory of 1228 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 4768 wrote to memory of 1228 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 4768 wrote to memory of 1228 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 4768 wrote to memory of 1228 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 4768 wrote to memory of 1228 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 4768 wrote to memory of 1228 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 4768 wrote to memory of 1228 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 4768 wrote to memory of 1228 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 4768 wrote to memory of 1228 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 4768 wrote to memory of 1228 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 4768 wrote to memory of 1228 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 4768 wrote to memory of 1228 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 4768 wrote to memory of 1228 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 4768 wrote to memory of 1228 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 4768 wrote to memory of 1228 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 4768 wrote to memory of 1228 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 4768 wrote to memory of 1228 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 4768 wrote to memory of 1228 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 4768 wrote to memory of 1228 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 4768 wrote to memory of 1228 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 4768 wrote to memory of 1228 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 4768 wrote to memory of 1228 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 4768 wrote to memory of 1228 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 4768 wrote to memory of 2524 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 4768 wrote to memory of 2524 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 4768 wrote to memory of 2104 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 4768 wrote to memory of 2104 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 4768 wrote to memory of 2104 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 4768 wrote to memory of 2104 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 4768 wrote to memory of 2104 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 4768 wrote to memory of 2104 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 4768 wrote to memory of 2104 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 4768 wrote to memory of 2104 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 4768 wrote to memory of 2104 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 4768 wrote to memory of 2104 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 4768 wrote to memory of 2104 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 4768 wrote to memory of 2104 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 4768 wrote to memory of 2104 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 4768 wrote to memory of 2104 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 4768 wrote to memory of 2104 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 4768 wrote to memory of 2104 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 4768 wrote to memory of 2104 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 4768 wrote to memory of 2104 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 4768 wrote to memory of 2104 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 4768 wrote to memory of 2104 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe

Processes

C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe

"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --start-maximized --single-argument C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_49423663230338a37a453eaa7b678150.html

C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe

"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ff8df6046f8,0x7ff8df604708,0x7ff8df604718

C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe

"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2140,10561863959944574128,17660963032844947102,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2156 /prefetch:2

C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe

"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2140,10561863959944574128,17660963032844947102,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2208 /prefetch:3

C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe

"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2140,10561863959944574128,17660963032844947102,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2908 /prefetch:8

C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe

"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2140,10561863959944574128,17660963032844947102,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3236 /prefetch:1

C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe

"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2140,10561863959944574128,17660963032844947102,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3248 /prefetch:1

C:\Windows\System32\CompPkgSrv.exe

C:\Windows\System32\CompPkgSrv.exe -Embedding

C:\Windows\System32\CompPkgSrv.exe

C:\Windows\System32\CompPkgSrv.exe -Embedding

C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe

"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2140,10561863959944574128,17660963032844947102,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5072 /prefetch:1

C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe

"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2140,10561863959944574128,17660963032844947102,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5188 /prefetch:1

C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe

"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2140,10561863959944574128,17660963032844947102,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5336 /prefetch:1

C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe

"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2140,10561863959944574128,17660963032844947102,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5360 /prefetch:1

C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe

"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2140,10561863959944574128,17660963032844947102,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5520 /prefetch:1

C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe

"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2140,10561863959944574128,17660963032844947102,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5692 /prefetch:1

C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe

"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2140,10561863959944574128,17660963032844947102,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=13 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5964 /prefetch:1

C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe

"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2140,10561863959944574128,17660963032844947102,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1692 /prefetch:2

C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe

"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2140,10561863959944574128,17660963032844947102,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=1696 /prefetch:8

C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe

"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2140,10561863959944574128,17660963032844947102,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=1696 /prefetch:8

C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe

"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2140,10561863959944574128,17660963032844947102,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=16 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6440 /prefetch:1

C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe

"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2140,10561863959944574128,17660963032844947102,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=17 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=1904 /prefetch:1

C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe

"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2140,10561863959944574128,17660963032844947102,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=18 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=7956 /prefetch:1

C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe

"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2140,10561863959944574128,17660963032844947102,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=19 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=7988 /prefetch:1

Network

Country Destination Domain Proto
US 8.8.8.8:53 232.168.11.51.in-addr.arpa udp
US 8.8.8.8:53 www.blogger.com udp
US 8.8.8.8:53 ajax.googleapis.com udp
US 8.8.8.8:53 webvn20.googlecode.com udp
US 8.8.8.8:53 maps.googleapis.com udp
US 8.8.8.8:53 img1.blogblog.com udp
FR 142.250.201.170:80 maps.googleapis.com tcp
FR 142.250.201.170:80 maps.googleapis.com tcp
FR 142.250.201.170:80 maps.googleapis.com tcp
FR 142.250.201.170:80 maps.googleapis.com tcp
FR 142.250.201.170:80 maps.googleapis.com tcp
FR 142.250.201.170:80 maps.googleapis.com tcp
NL 142.250.102.82:80 webvn20.googlecode.com tcp
FR 216.58.214.169:443 img1.blogblog.com tcp
FR 216.58.214.169:443 img1.blogblog.com tcp
FR 216.58.214.170:443 maps.googleapis.com tcp
FR 216.58.214.170:80 maps.googleapis.com tcp
FR 216.58.214.74:80 maps.googleapis.com tcp
FR 216.58.214.169:445 img1.blogblog.com tcp
FR 172.217.20.163:80 fonts.gstatic.com tcp
US 8.8.8.8:53 apis.google.com udp
FR 142.250.179.78:443 apis.google.com tcp
US 8.8.8.8:53 74.32.126.40.in-addr.arpa udp
US 8.8.8.8:53 20.49.80.91.in-addr.arpa udp
US 8.8.8.8:53 170.201.250.142.in-addr.arpa udp
US 8.8.8.8:53 82.102.250.142.in-addr.arpa udp
US 8.8.8.8:53 170.214.58.216.in-addr.arpa udp
US 8.8.8.8:53 169.214.58.216.in-addr.arpa udp
US 8.8.8.8:53 74.214.58.216.in-addr.arpa udp
US 8.8.8.8:53 95.221.229.192.in-addr.arpa udp
US 8.8.8.8:53 163.20.217.172.in-addr.arpa udp
US 8.8.8.8:53 w.sharethis.com udp
NL 142.250.102.82:80 webvn20.googlecode.com tcp
FR 18.164.52.90:80 w.sharethis.com tcp
FR 18.164.52.90:443 w.sharethis.com tcp
FR 216.58.214.74:80 maps.googleapis.com tcp
FR 216.58.214.169:443 img1.blogblog.com udp
US 8.8.8.8:53 connect.facebook.net udp
US 8.8.8.8:53 img1.blogblog.com udp
FR 142.250.179.78:443 apis.google.com udp
US 8.8.8.8:53 2.bp.blogspot.com udp
US 8.8.8.8:53 4.bp.blogspot.com udp
US 8.8.8.8:53 www.linkwithin.com udp
US 8.8.8.8:53 mybloggertricks.googlecode.com udp
US 8.8.8.8:53 s7.addthis.com udp
US 8.8.8.8:53 resources.infolinks.com udp
US 8.8.8.8:53 1.bp.blogspot.com udp
DE 185.60.217.28:80 connect.facebook.net tcp
FR 216.58.214.169:80 img1.blogblog.com tcp
FR 216.58.215.33:443 1.bp.blogspot.com tcp
FR 216.58.215.33:80 1.bp.blogspot.com tcp
FR 216.58.215.33:80 1.bp.blogspot.com tcp
FR 216.58.215.33:80 1.bp.blogspot.com tcp
NL 142.250.102.82:80 mybloggertricks.googlecode.com tcp
NL 142.250.102.82:80 mybloggertricks.googlecode.com tcp
FR 216.58.215.33:80 1.bp.blogspot.com tcp
FR 216.58.215.33:80 1.bp.blogspot.com tcp
FR 216.58.215.33:80 1.bp.blogspot.com tcp
FR 216.58.215.33:80 1.bp.blogspot.com tcp
US 8.8.8.8:53 www.dmca.com udp
DE 185.60.217.28:80 connect.facebook.net tcp
FR 216.58.214.169:80 img1.blogblog.com tcp
US 13.107.246.64:80 www.dmca.com tcp
US 8.8.8.8:53 www.pulsimo.com udp
US 8.8.8.8:53 images-blogger-opensocial.googleusercontent.com udp
US 8.8.8.8:53 3.bp.blogspot.com udp
DE 185.60.217.28:443 connect.facebook.net tcp
US 13.107.246.64:443 www.dmca.com tcp
US 8.8.8.8:53 www.alexa.com udp
FR 216.58.215.33:80 3.bp.blogspot.com tcp
FR 142.250.179.97:443 images-blogger-opensocial.googleusercontent.com tcp
US 8.8.8.8:53 78.179.250.142.in-addr.arpa udp
US 8.8.8.8:53 90.52.164.18.in-addr.arpa udp
US 8.8.8.8:53 28.217.60.185.in-addr.arpa udp
US 8.8.8.8:53 33.215.58.216.in-addr.arpa udp
US 8.8.8.8:53 64.246.107.13.in-addr.arpa udp
US 54.165.160.165:80 www.alexa.com tcp
US 103.224.182.251:80 www.pulsimo.com tcp
US 103.224.182.251:80 www.pulsimo.com tcp
US 8.8.8.8:53 s05.flagcounter.com udp
US 8.8.8.8:53 cse.google.com udp
US 206.221.176.133:80 s05.flagcounter.com tcp
FR 172.217.20.174:80 cse.google.com tcp
US 54.165.160.165:443 www.alexa.com tcp
US 8.8.8.8:53 crt.rootg2.amazontrust.com udp
FR 3.164.163.90:80 crt.rootg2.amazontrust.com tcp
SG 118.139.179.30:80 www.linkwithin.com tcp
SG 118.139.179.30:80 www.linkwithin.com tcp
US 172.66.41.9:80 resources.infolinks.com tcp
FR 216.58.215.33:80 3.bp.blogspot.com tcp
US 8.8.8.8:53 www.google.com udp
FR 172.217.20.164:80 www.google.com tcp
SG 118.139.179.30:80 www.linkwithin.com tcp
US 8.8.8.8:53 ws.sharethis.com udp
US 8.8.8.8:53 97.179.250.142.in-addr.arpa udp
US 8.8.8.8:53 165.160.165.54.in-addr.arpa udp
US 8.8.8.8:53 251.182.224.103.in-addr.arpa udp
US 8.8.8.8:53 174.20.217.172.in-addr.arpa udp
US 8.8.8.8:53 133.176.221.206.in-addr.arpa udp
US 8.8.8.8:53 51.201.222.52.in-addr.arpa udp
US 8.8.8.8:53 90.163.164.3.in-addr.arpa udp
US 8.8.8.8:53 9.41.66.172.in-addr.arpa udp
US 8.8.8.8:53 164.20.217.172.in-addr.arpa udp
US 8.8.8.8:53 30.179.139.118.in-addr.arpa udp
US 8.8.8.8:53 l.sharethis.com udp
IE 52.213.94.99:443 l.sharethis.com tcp
FR 216.58.215.33:80 3.bp.blogspot.com tcp
US 8.8.8.8:53 count-server.sharethis.com udp
FR 13.249.9.11:443 count-server.sharethis.com tcp
US 8.8.8.8:53 developers.google.com udp
FR 142.250.178.142:80 developers.google.com tcp
FR 172.217.20.164:80 www.google.com tcp
US 8.8.8.8:53 accounts.google.com udp
NL 142.250.102.82:80 mybloggertricks.googlecode.com tcp
NL 142.250.27.84:443 accounts.google.com tcp
US 8.8.8.8:53 trends.google.com udp
FR 172.217.20.164:443 trends.google.com tcp
FR 142.250.178.142:443 developers.google.com tcp
NL 142.250.102.82:80 mybloggertricks.googlecode.com tcp
US 8.8.8.8:53 ssl.gstatic.com udp
FR 142.250.179.99:443 ssl.gstatic.com tcp
FR 142.250.179.99:443 ssl.gstatic.com tcp
FR 216.58.214.169:139 img1.blogblog.com tcp
US 8.8.8.8:53 web.facebook.com udp
DE 185.60.217.20:443 web.facebook.com tcp
DE 185.60.217.20:443 web.facebook.com tcp
DE 185.60.217.20:443 web.facebook.com tcp
DE 185.60.217.20:443 web.facebook.com tcp
FR 172.217.20.164:443 trends.google.com udp
US 8.8.8.8:53 99.94.213.52.in-addr.arpa udp
US 8.8.8.8:53 11.9.249.13.in-addr.arpa udp
US 8.8.8.8:53 142.178.250.142.in-addr.arpa udp
US 8.8.8.8:53 84.27.250.142.in-addr.arpa udp
US 8.8.8.8:53 99.179.250.142.in-addr.arpa udp
US 8.8.8.8:53 router.infolinks.com udp
US 172.66.42.247:443 router.infolinks.com tcp
US 8.8.8.8:53 www.facebook.com udp
DE 185.60.217.35:443 www.facebook.com tcp
DE 185.60.217.35:443 www.facebook.com tcp
FR 142.250.179.99:443 ssl.gstatic.com udp
FR 216.58.214.170:443 maps.googleapis.com udp
FR 142.250.178.142:443 developers.google.com udp
US 8.8.8.8:53 static.xx.fbcdn.net udp
US 8.8.8.8:53 20.217.60.185.in-addr.arpa udp
US 8.8.8.8:53 247.42.66.172.in-addr.arpa udp
US 8.8.8.8:53 35.217.60.185.in-addr.arpa udp
US 8.8.8.8:53 195.20.217.172.in-addr.arpa udp
FR 216.58.214.168:443 ssl.google-analytics.com tcp
US 8.8.8.8:53 168.214.58.216.in-addr.arpa udp
FR 216.58.214.74:80 maps.googleapis.com tcp
N/A 224.0.0.251:5353 udp
US 8.8.8.8:53 28.118.140.52.in-addr.arpa udp
US 8.8.8.8:53 217.106.137.52.in-addr.arpa udp
US 8.8.8.8:53 img2.blogblog.com udp
FR 216.58.214.169:445 img2.blogblog.com tcp
US 8.8.8.8:53 img2.blogblog.com udp
FR 216.58.214.169:139 img2.blogblog.com tcp
US 8.8.8.8:53 212.20.149.52.in-addr.arpa udp
US 8.8.8.8:53 198.187.3.20.in-addr.arpa udp
US 8.8.8.8:53 140.71.91.104.in-addr.arpa udp
FR 142.250.179.110:445 www.google-analytics.com tcp
FR 142.250.179.110:139 www.google-analytics.com tcp
US 8.8.8.8:53 172.210.232.199.in-addr.arpa udp
NL 142.250.27.84:443 accounts.google.com udp
US 8.8.8.8:53 connect.facebook.net udp
DE 185.60.217.28:445 connect.facebook.net tcp
US 8.8.8.8:53 connect.facebook.net udp
DE 185.60.217.28:139 connect.facebook.net tcp
FR 142.250.75.226:445 pagead2.googlesyndication.com tcp
FR 216.58.214.66:139 pagead2.googlesyndication.com tcp
US 8.8.8.8:53 14.227.111.52.in-addr.arpa udp
US 8.8.8.8:53 ajax.googleapis.com udp
FR 216.58.213.74:445 ajax.googleapis.com tcp
FR 216.58.214.170:139 maps.googleapis.com tcp
NL 142.250.27.84:443 accounts.google.com udp
FR 216.58.214.74:80 maps.googleapis.com tcp
US 8.8.8.8:53 encrypted-tbn2.gstatic.com udp
FR 216.58.214.174:443 encrypted-tbn2.gstatic.com tcp
US 8.8.8.8:53 maps.gstatic.com udp
US 8.8.8.8:53 174.214.58.216.in-addr.arpa udp
FR 142.250.74.227:80 maps.gstatic.com tcp
US 8.8.8.8:53 227.74.250.142.in-addr.arpa udp
SE 192.229.221.95:80 tcp

Files

C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad\settings.dat

MD5 d22073dea53e79d9b824f27ac5e9813e
SHA1 6d8a7281241248431a1571e6ddc55798b01fa961
SHA256 86713962c3bb287964678b148ee08ea83fb83483dff8be91c8a6085ca560b2a6
SHA512 97152091ee24b6e713b8ec8123cb62511f8a7e8a6c6c3f2f6727d0a60497be28814613b476009b853575d4931e5df950e28a41afbf6707cb672206f1219c4413

C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad\settings.dat

MD5 bffcefacce25cd03f3d5c9446ddb903d
SHA1 8923f84aa86db316d2f5c122fe3874bbe26f3bab
SHA256 23e7cbbf64c81122c3cb30a0933c10a320e254447771737a326ce37a0694d405
SHA512 761dae5315b35ec0b2fe68019881397f5d2eadba3963aba79a89f8953a0cd705012d7faf3a204a5f36008926b9f614980e333351596b06ce7058d744345ce2e7

\??\pipe\LOCAL\crashpad_4768_CKYRLQEWPOKCSJMV

MD5 d41d8cd98f00b204e9800998ecf8427e
SHA1 da39a3ee5e6b4b0d3255bfef95601890afd80709
SHA256 e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855
SHA512 cf83e1357eefb8bdf1542850d66d8007d620e4050b5715dc83f4a921d36ce9ce47d0d13c5d85f2b0ff8318d2877eec2f63b931bd47417a81a538327af927da3e

C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Preferences

MD5 c7275a145184f5fa2c548a21d4bacd81
SHA1 3d01191a01d354c39109aad0259f51a3519a9386
SHA256 87e5095aea847b1bbc377aa8c92fd4fedfb4ea4a20286da1fadb87dd9432b872
SHA512 ffc925d9007f5a0197056f781ae3822b86e41207f98d7f0e5d79a9b0218952f32ff457d1493f83963b2d1c8f7305621caf63370a2b2e89db4bc03d1a56f4d2fe

C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Cache\f_000011

MD5 2ebfdbd309ee762211b4a2ac39708c4d
SHA1 b002922c672dbe1dd4caa02af24d0b1e7da616af
SHA256 54ae97d445b166859fe3ba6241b97abbac0aa0d158c72352b774d60ba3e81797
SHA512 d1687b7a6da07a72963c96a1e85661046d3d3c96f88445302afa09721fbe211a5fb8881ff14b346b0ebe8a20f5ced21979e9f58e256427e57b85d565bef17720

C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Local State

MD5 7a80d602fd4c4acd1df952c19da211a4
SHA1 911573f4b4ef296c02801dc9528e36f3d5ff0d0c
SHA256 a1992c26da85f27e967018325363ee44379a35d611b12e0d5e7cb1b9a27e1abd
SHA512 20b60d630bdaf21c5759433b19bf2d06ec9028ac771048b6e03b8a19144aca84a786b5d34c121c39bbfd2857961f7c846363064d409ffaaa01834100b9eead9c

C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Preferences

MD5 4267f44049d8a8efa18d2dd08d0f9b0f
SHA1 b5fba5452685f3817872c26ae0259ecbdfea7af2
SHA256 b08f2087fc2c11e40d198f5fd4f32189f5ed3f09e32d3826a2106b1a3e1673c2
SHA512 ed46003d1a5da07dc3b675182bb31f4c0fc6669cd598a60f61bc1b074c7e0ace5dacb7e6e808296516e0544aa01274176f49526fb211d5e8b870ba9a2a219f1c

C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index

MD5 546e7847994701b79184e57207768b07
SHA1 622db01dcdfbd2781ac5903b9b47c74acfe7381b
SHA256 f37f2b502235670b7e3b131093db52e36aa40d915d30d1d1c675d14fb0fbfc97
SHA512 b1b1f6830791fc48fd930e98c7254c07808c0d14d292fc6f8515d667078c2d86085ceea8331a30a6024b41af113440121a6da931ad3528397b3dd3bb57d89e56

C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Network Persistent State

MD5 68f4d593b6ffc4831f4ae4692cb08723
SHA1 e002d341439535e3f1ab164b42d2dfcdd32fc8bf
SHA256 f55a2c182be8bd96d1b597da7849db8817b058700e1bd5f492fde9ec083456cb
SHA512 519d7420f319adabdb4bcdc8cfa115482a7a1fd7fe7269f28c14d868548f0696ad030bf0ef9cfe46384c8a557f01ff60b038d05778fbf6d43d78e4bd00bcc752

C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index

MD5 f5f03dd24245b9bd1e7d92c7168b5dd4
SHA1 befaf72b2d4cf7c5a82d7416549813da5bce332a
SHA256 ebfc8218b846470a3cc720e633a470477002e6e7a2c7ae30076172edacd16930
SHA512 54c3b054f1013af1c3b028fa3bb6f43684cdde50aee512d908eb5b0cc9f085ed93a701f7ff53377e816f9792a96032fcdb321e5d6b4ac0e303a5b0a20bd010b4

C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\data_reduction_proxy_leveldb\CURRENT

MD5 6752a1d65b201c13b62ea44016eb221f
SHA1 58ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA256 0861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA512 9cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389

C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Preferences

MD5 2ec7b309f0c51b148ff6569f231901e8
SHA1 6d67c3489c112c974b6939006b3b49c132c606ce
SHA256 b85464ce0fa08a7efb57d5e24ab11c61c0ae73bf3b631ef4ca8a8b02c0bcd761
SHA512 a3f6fed058675c612bf91401e202ad9ecd17da7c1c8d1cee8b3c77b529f781e643054d79dee693af3fe96ab5a22e0320a0c8204e5957b8cf67c15e24161628f7