Malware Analysis Report

2025-04-13 11:37

Sample ID 250101-jt365s1rgp
Target JaffaCakes118_4d25e8c251c9d7e2903937992f003f5f
SHA256 0a79b8a17034b6e3b5a64ca8672ad9f557d5882b8a88b8035fd6a6bdf1b3b80b
Tags
socgholish discovery downloader
score
10/10

Table of Contents

Analysis Overview

MITRE ATT&CK

Enterprise Matrix V15

Analysis: static1

Detonation Overview

Signatures

Analysis: behavioral1

Detonation Overview

Command Line

Signatures

Processes

Network

Files

Analysis: behavioral2

Detonation Overview

Command Line

Signatures

Processes

Network

Files

Analysis Overview

score
10/10

SHA256

0a79b8a17034b6e3b5a64ca8672ad9f557d5882b8a88b8035fd6a6bdf1b3b80b

Threat Level: Known bad

The file JaffaCakes118_4d25e8c251c9d7e2903937992f003f5f was found to be: Known bad.

Malicious Activity Summary

socgholish discovery downloader

SocGholish

Socgholish family

System Location Discovery: System Language Discovery

Browser Information Discovery

Suspicious behavior: EnumeratesProcesses

Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary

Suspicious use of SendNotifyMessage

Suspicious use of FindShellTrayWindow

Modifies Internet Explorer settings

Suspicious use of SetWindowsHookEx

Suspicious use of WriteProcessMemory

Enumerates system info in registry

MITRE ATT&CK

Analysis: static1

Detonation Overview

Reported

2025-01-01 07:58

Signatures

N/A

Analysis: behavioral1

Detonation Overview

Submitted

2025-01-01 07:58

Reported

2025-01-01 08:01

Platform

win7-20241010-en

Max time kernel

150s

Max time network

154s

Command Line

"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_4d25e8c251c9d7e2903937992f003f5f.html

Signatures

SocGholish

downloader socgholish

Socgholish family

socgholish

System Location Discovery: System Language Discovery

discovery
Description Indicator Process Target
Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE N/A

Modifies Internet Explorer settings

adware spyware
Description Indicator Process Target
Key created \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery C:\Program Files\Internet Explorer\iexplore.exe N/A
Key created \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\GPU C:\Program Files\Internet Explorer\iexplore.exe N/A
Key created \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\LowRegistry C:\Program Files\Internet Explorer\iexplore.exe N/A
Key created \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser C:\Program Files\Internet Explorer\iexplore.exe N/A
Set value (int) \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" C:\Program Files\Internet Explorer\iexplore.exe N/A
Set value (str) \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" C:\Program Files\Internet Explorer\iexplore.exe N/A
Key created \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch C:\Program Files\Internet Explorer\iexplore.exe N/A
Set value (int) \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" C:\Program Files\Internet Explorer\iexplore.exe N/A
Set value (int) \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" C:\Program Files\Internet Explorer\iexplore.exe N/A
Key created \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\IETld\LowMic C:\Program Files\Internet Explorer\iexplore.exe N/A
Key created \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage C:\Program Files\Internet Explorer\iexplore.exe N/A
Key created \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\PageSetup C:\Program Files\Internet Explorer\iexplore.exe N/A
Key created \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\Zoom C:\Program Files\Internet Explorer\iexplore.exe N/A
Key created \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive C:\Program Files\Internet Explorer\iexplore.exe N/A
Set value (int) \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "441880184" C:\Program Files\Internet Explorer\iexplore.exe N/A
Key created \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic C:\Program Files\Internet Explorer\iexplore.exe N/A
Key created \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\InternetRegistry C:\Program Files\Internet Explorer\iexplore.exe N/A
Key created \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\Main C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE N/A
Set value (str) \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" C:\Program Files\Internet Explorer\iexplore.exe N/A
Set value (data) \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 C:\Program Files\Internet Explorer\iexplore.exe N/A
Key created \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\DomainSuggestion C:\Program Files\Internet Explorer\iexplore.exe N/A
Key created \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\Main C:\Program Files\Internet Explorer\iexplore.exe N/A
Key created \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\IntelliForms C:\Program Files\Internet Explorer\iexplore.exe N/A
Key created \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain C:\Program Files\Internet Explorer\iexplore.exe N/A
Key created \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\Toolbar C:\Program Files\Internet Explorer\iexplore.exe N/A
Set value (int) \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{32DF1861-C816-11EF-93C8-7227CCB080AF} = "0" C:\Program Files\Internet Explorer\iexplore.exe N/A

Suspicious use of FindShellTrayWindow

Description Indicator Process Target
N/A N/A C:\Program Files\Internet Explorer\iexplore.exe N/A

Processes

C:\Program Files\Internet Explorer\iexplore.exe

"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_4d25e8c251c9d7e2903937992f003f5f.html

C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE

"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2816 CREDAT:275457 /prefetch:2

Network

Country Destination Domain Proto
US 8.8.8.8:53 apis.google.com udp
US 8.8.8.8:53 ajax.googleapis.com udp
US 8.8.8.8:53 4.bp.blogspot.com udp
US 8.8.8.8:53 www.blogger.com udp
US 8.8.8.8:53 1.bp.blogspot.com udp
US 8.8.8.8:53 img1.blogblog.com udp
US 8.8.8.8:53 www.linkwithin.com udp
US 8.8.8.8:53 resources.blogblog.com udp
US 8.8.8.8:53 badge.facebook.com udp
US 8.8.8.8:53 3.bp.blogspot.com udp
US 8.8.8.8:53 2.bp.blogspot.com udp
US 8.8.8.8:53 feedjit.com udp
US 8.8.8.8:53 www.123myip.co.uk udp
US 8.8.8.8:53 static.networkedblogs.com udp
US 8.8.8.8:53 nwidget.networkedblogs.com udp
US 8.8.8.8:53 plipeo.com udp
FR 216.58.215.33:80 2.bp.blogspot.com tcp
FR 216.58.215.33:80 2.bp.blogspot.com tcp
FR 216.58.215.33:80 2.bp.blogspot.com tcp
FR 216.58.214.169:443 resources.blogblog.com tcp
FR 216.58.215.33:80 2.bp.blogspot.com tcp
SG 118.139.179.30:80 www.linkwithin.com tcp
FR 142.250.179.78:443 apis.google.com tcp
FR 216.58.215.33:80 2.bp.blogspot.com tcp
DE 52.29.79.39:80 www.123myip.co.uk tcp
FR 172.217.20.202:80 ajax.googleapis.com tcp
FR 216.58.214.169:80 resources.blogblog.com tcp
FR 216.58.215.33:80 2.bp.blogspot.com tcp
FR 216.58.215.33:80 2.bp.blogspot.com tcp
DE 185.60.217.20:443 badge.facebook.com tcp
FR 216.58.214.169:443 resources.blogblog.com tcp
DE 52.29.79.39:80 www.123myip.co.uk tcp
FR 142.250.179.78:443 apis.google.com tcp
FR 172.217.20.202:80 ajax.googleapis.com tcp
FR 216.58.215.33:80 2.bp.blogspot.com tcp
FR 216.58.214.169:80 resources.blogblog.com tcp
FR 216.58.215.33:80 2.bp.blogspot.com tcp
FR 216.58.215.33:80 2.bp.blogspot.com tcp
DE 185.60.217.20:443 badge.facebook.com tcp
FR 216.58.214.169:443 resources.blogblog.com tcp
FR 216.58.214.169:443 resources.blogblog.com tcp
FR 172.217.20.202:443 ajax.googleapis.com tcp
FR 216.58.214.169:443 resources.blogblog.com tcp
FR 216.58.214.169:443 resources.blogblog.com tcp
SG 118.139.179.30:80 www.linkwithin.com tcp
SG 104.43.113.7:80 plipeo.com tcp
SG 104.43.113.7:80 plipeo.com tcp
US 8.8.8.8:53 www.wieistmeineip.de udp
DE 3.64.249.185:443 www.wieistmeineip.de tcp
DE 3.64.249.185:443 www.wieistmeineip.de tcp
SG 104.43.113.7:443 plipeo.com tcp
US 8.8.8.8:53 c.pki.goog udp
US 8.8.8.8:53 c.pki.goog udp
US 8.8.8.8:53 c.pki.goog udp
US 8.8.8.8:53 c.pki.goog udp
US 8.8.8.8:53 c.pki.goog udp
US 8.8.8.8:53 c.pki.goog udp
US 8.8.8.8:53 c.pki.goog udp
US 8.8.8.8:53 c.pki.goog udp
US 8.8.8.8:53 c.pki.goog udp
FR 142.250.179.67:80 c.pki.goog tcp
FR 142.250.179.67:80 c.pki.goog tcp
FR 142.250.179.67:80 c.pki.goog tcp
FR 142.250.179.67:80 c.pki.goog tcp
FR 142.250.179.67:80 c.pki.goog tcp
FR 142.250.179.67:80 c.pki.goog tcp
FR 142.250.179.67:80 c.pki.goog tcp
FR 142.250.179.67:80 c.pki.goog tcp
SG 104.43.113.7:443 plipeo.com tcp
FR 142.250.179.67:80 c.pki.goog tcp
US 8.8.8.8:53 o.pki.goog udp
US 8.8.8.8:53 o.pki.goog udp
US 8.8.8.8:53 o.pki.goog udp
US 8.8.8.8:53 o.pki.goog udp
US 8.8.8.8:53 o.pki.goog udp
FR 142.250.179.67:80 o.pki.goog tcp
FR 142.250.179.67:80 o.pki.goog tcp
FR 142.250.179.67:80 o.pki.goog tcp
FR 142.250.179.67:80 o.pki.goog tcp
FR 142.250.179.67:80 o.pki.goog tcp
FR 142.250.179.67:80 o.pki.goog tcp
FR 142.250.179.67:80 o.pki.goog tcp
FR 142.250.179.67:80 o.pki.goog tcp
FR 142.250.179.67:80 o.pki.goog tcp
US 8.8.8.8:53 static.xx.fbcdn.net udp
DE 185.60.217.28:443 static.xx.fbcdn.net tcp
DE 185.60.217.28:443 static.xx.fbcdn.net tcp
SG 104.43.113.7:443 plipeo.com tcp
US 8.8.8.8:53 www.facebook.com udp
SG 104.43.113.7:443 plipeo.com tcp
US 8.8.8.8:53 www.blogblog.com udp
GB 163.70.151.35:80 www.facebook.com tcp
GB 163.70.151.35:80 www.facebook.com tcp
FR 216.58.214.169:80 www.blogblog.com tcp
FR 216.58.214.169:80 www.blogblog.com tcp
GB 163.70.151.35:443 www.facebook.com tcp
US 8.8.8.8:53 accounts.google.com udp
NL 142.250.27.84:443 accounts.google.com tcp
NL 142.250.27.84:443 accounts.google.com tcp
US 8.8.8.8:53 mamasoyaku.blogspot.com udp
FR 216.58.213.65:80 mamasoyaku.blogspot.com tcp
FR 216.58.213.65:80 mamasoyaku.blogspot.com tcp
US 8.8.8.8:53 www.google.com udp
US 8.8.8.8:53 i43.tinypic.com udp
US 8.8.8.8:53 blogger.googleusercontent.com udp
US 8.8.8.8:53 www.purebaby.co.id udp
US 8.8.8.8:53 wgweb.msg.yahoo.com udp
US 8.8.8.8:53 www6.cbox.ws udp
FR 172.217.20.164:443 www.google.com tcp
FR 172.217.20.164:443 www.google.com tcp
US 8.8.8.8:53 i879.photobucket.com udp
US 108.181.41.161:80 www6.cbox.ws tcp
US 108.181.41.161:80 www6.cbox.ws tcp
FR 142.250.179.65:443 blogger.googleusercontent.com tcp
FR 142.250.179.65:443 blogger.googleusercontent.com tcp
FR 142.250.179.65:443 blogger.googleusercontent.com tcp
FR 142.250.179.65:443 blogger.googleusercontent.com tcp
FR 142.250.179.65:443 blogger.googleusercontent.com tcp
FR 142.250.179.65:443 blogger.googleusercontent.com tcp
US 8.8.8.8:53 ocsp.r2m02.amazontrust.com udp
DE 18.245.31.8:80 i879.photobucket.com tcp
DE 18.245.31.8:80 i879.photobucket.com tcp
US 8.8.8.8:53 ocsp.r2m02.amazontrust.com udp
DE 18.245.65.219:80 ocsp.r2m02.amazontrust.com tcp
DE 18.245.65.219:80 ocsp.r2m02.amazontrust.com tcp
DE 18.245.31.8:443 i879.photobucket.com tcp
ID 101.255.93.254:80 www.purebaby.co.id tcp
ID 101.255.93.254:80 www.purebaby.co.id tcp
US 8.8.8.8:53 female.store.co.id udp
US 8.8.8.8:53 adv.blogupp.com udp
ID 203.161.184.73:80 female.store.co.id tcp
ID 203.161.184.73:80 female.store.co.id tcp
US 13.248.169.48:80 adv.blogupp.com tcp
US 13.248.169.48:80 adv.blogupp.com tcp
US 8.8.8.8:53 www.godaddy.com udp
GB 95.100.244.9:443 www.godaddy.com tcp
GB 95.100.244.9:443 www.godaddy.com tcp
GB 95.100.244.9:443 www.godaddy.com tcp
US 8.8.8.8:53 www.microsoft.com udp
GB 95.100.245.144:80 www.microsoft.com tcp
US 8.8.8.8:53 crl.microsoft.com udp
GB 88.221.134.83:80 crl.microsoft.com tcp
US 204.79.197.200:443 ieonline.microsoft.com tcp
US 204.79.197.200:443 ieonline.microsoft.com tcp
US 8.8.8.8:53 www.microsoft.com udp
US 8.8.8.8:53 www.microsoft.com udp
US 204.79.197.200:443 ieonline.microsoft.com tcp

Files

C:\Users\Admin\AppData\Local\Temp\Cab60A9.tmp

MD5 49aebf8cbd62d92ac215b2923fb1b9f5
SHA1 1723be06719828dda65ad804298d0431f6aff976
SHA256 b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512 bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b

C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\24BD96D5497F70B3F510A6B53CD43F3E_3A89246FB90C5EE6620004F1AE0EB0EA

MD5 2770ced3aae4c7bc04ff84025141ca70
SHA1 29f20ad0cddb0822b52447c3ee9e1252965810d9
SHA256 81f092361e5ee8232689dfd94cee407d95bd2374937411ce0bc4760c2c8c4fee
SHA512 1ca3ad8e421c4ebc4655cc63187145b9c9e336cf5051ae2dd6f9939bb1aef1f3835b64a9e5b7c8c4e115b7b1a09ab8c32a7adedafde1510a2097085768f3c50d

C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\24BD96D5497F70B3F510A6B53CD43F3E_3A89246FB90C5EE6620004F1AE0EB0EA

MD5 94d336c62f5583c4162ed66625398a4e
SHA1 0386ca398573dc5d6db98633f2127eef65cc1cda
SHA256 644ca25b6be156cf6b8cea9194cf3facb83825f61f31692e4c9d158dc49d79a9
SHA512 5fb0a6d1cf810e3b3c5473a0dc0fce6c354483d99140d40173d6b3d5d24e7b0acd567aed5ceca385359ba6e3a79b16057d5ba3aafc19033ac81534646bf5740c

C:\Users\Admin\AppData\Local\Temp\Tar61C6.tmp

MD5 4ea6026cf93ec6338144661bf1202cd1
SHA1 a1dec9044f750ad887935a01430bf49322fbdcb7
SHA256 8efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA512 6c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b

C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

MD5 a54ecb90f18d484119edfe039f040e2f
SHA1 88f99017b87c36b5ea562c7d747d839671e2bc68
SHA256 4db7bcc5aa823d1b6a218f99e0dbc196ae7ed035935ae7405829fc69de9d57b9
SHA512 0a5312807dc9d968f5f21dc6ed4901857516b2e9931f1e3f66f0458ab1b63034af3ce1d73dbe88f9d2d3fa252ae0907a814ca916bcf24e460799799d5e6f2458

C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

MD5 dcb1498cb09fb814bab100ffb56e8c4b
SHA1 cb9415da249f6097cf76ffae2e2bec9a2af65e5f
SHA256 82d6527a0ca1f58fddfeeb1c30967a59ed30193e9d7026fe51038767fbef047f
SHA512 bd7a1d15fa689680443027094a0e44b600c2f56f6f17cf5cfcf11f605ba3ec84309654f0f17ad1e5bc57b8741288efdd147ea1d55402be392c9c7b20e906baf5

C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\05DDC6AA91765AACACDB0A5F96DF8199

MD5 80c23c54ec5ab9d1fab82db9a3815639
SHA1 7b93a183f7993ca0ed46f77d844565d3efb434a6
SHA256 a5b66877f0db7c38972462425d015a07b578dd954cac4d310d7a50d91715649a
SHA512 1778b4c63914db4a2e8f1e03f781c83130615a9e73ca19d60bec7a965232932f2b6e0a2af97da9774163624e4509c3691700e6c98c9517174ac755a97d552c57

C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\05DDC6AA91765AACACDB0A5F96DF8199

MD5 e935bc5762068caf3e24a2683b1b8a88
SHA1 82b70eb774c0756837fe8d7acbfeec05ecbf5463
SHA256 a8accfcfeb51bd73df23b91f4d89ff1a9eb7438ef5b12e8afda1a6ff1769e89d
SHA512 bed4f6f5357b37662623f1f8afed1a3ebf3810630b2206a0292052a2e754af9dcfe34ee15c289e3d797a8f33330e47c14cbefbc702f74028557ace29bf855f9e

C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\C02877841121CC45139CB51404116B25_2AC354D163B9A95ED11B23DFC6FCD931

MD5 9ba98f693cbc93605678584a2b7c3deb
SHA1 b40de001adbd6e1984586fe7c56cab285dadb099
SHA256 3175b4bf0e8a04ce9759ab3606e59c45b5b44c8bbb4e9cee6e677b15e24353f2
SHA512 94fcf8c40f917680a10c8b74874194addd3fc29b0f75cb8e6e263b819b63c3879de51db4e6143585264329cfcfa51d22c371e5a59a32e8ce6d98c320542ef769

C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\C02877841121CC45139CB51404116B25_2AC354D163B9A95ED11B23DFC6FCD931

MD5 d49e864ac34bef2d26b93dd89d552ed6
SHA1 a76c323ae47ce5c4be23241a3e94ffac146d20d7
SHA256 e9411abdf11189ff89db08aa03f1ac939b8f9d2b957cff2de95b555c97545cee
SHA512 f02f8db990fbd2a3894ab2b4cc99e267373af2b2f0b85df2c96502c7c1238d63e3a05adcae9500c2ffb6735e6e95daaeef3092c70fbe25b803c0a5047f6dc94e

C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

MD5 262e19c52494f906a1dfdd2ab09318d5
SHA1 398f70631b133e636e5aed6abec24b00430a210f
SHA256 612a30a1837b716b754ef2a623bbc99dedb9e7a7607c37a9f6792c35ea6bab6b
SHA512 a594f73edbf1f1a3b9b149ec459d5c4fb5e3177044ab8fd43a79af913af2f4331432b32ec38ddea2fbd1f01d6e3452c40fb7022994519ecdc3af8ba595f3bd33

C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

MD5 2e6594bd4a4808f03286d1b6fbaeb0b7
SHA1 689c485fe9db98471fbcc4e496ad287f8f97c544
SHA256 20416c8129eaef654090f290a87ec0e8259fc1f47048dba5bbeab1c2e6cc28b6
SHA512 43e8550ad0f8b49a1cde5287d294a6e16ef138e941dc78de6cc5b1dd02e204c4d8b1c39f2511b55345ffd61eb47038de5ea801e4d89a391131a6d520a6acac95

C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\070E0202839D9D67350CD2613E78E416

MD5 5ab1aa708ff65174ccdb5879161e15df
SHA1 7a423bf0d4344abd2a04d4f839c66bdc7f47ffbe
SHA256 4304c5cd971d92ddc937b59613a1a47c52a83f03cbaa06dac5e58d0d51dc3f41
SHA512 c51eb548ebb81243b618789ab96ebf3f0b4f3eb5d11f0817bad39379b4044bc56e9d4a055593a8f7861a158f1d1b3982441adc57b56225cf13f200ec8b35ede3

C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\070E0202839D9D67350CD2613E78E416

MD5 55540a230bdab55187a841cfe1aa1545
SHA1 363e4734f757bdeb89868efe94907774a327695e
SHA256 d73494e3446b02167573b3cde3ae1c8584ac26e15e45ac3ec0326708425d90fb
SHA512 c899cb1d31d3214fd9dc8626a55e40580d3b2224bf34310c2abd85d0f63e2dedaeae57832f048c2f500cb2cbf83683fcb14139af3f0b5251606076cdb4689c54

C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

MD5 c862e397066fe423b4e998350ac3669d
SHA1 2d15d33fb611ea5e1df8e21e92ce3ef987a83f4f
SHA256 7789083a2346a6a0f2c509ff0b0f7dbedc49eb830d6ef26c4b3e0a95b589087f
SHA512 0187932b5d309b7c5997d0751f18948e52587c4d438e5110f0e36dcec330e970cc4c7ff201ff37c10a33ba6c40039795b47edaba697c12485b760122f56f41b0

C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

MD5 70dd7059a247e6399f600e764dbdb449
SHA1 5fa90676bbbdc6c24ba8aebd9e7f0e55bdf29d56
SHA256 fea73d664944a418e07750409655032ec03379ebe90df473fe01556a192b23ff
SHA512 1a382ab27f4731d6511516bfef811bccfebdf51b6e32a6d5cf54de17738261658d722bf82c5ec2723855b614d9e6a4e66cce90915b9dfa1745c6e99b2e8d7d72

C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

MD5 9bded99c11a8a9acf14736f469628139
SHA1 3c1714201ba1d572e85400cb283bb8b953d842aa
SHA256 d51a61e7da300db8798d598a6dcc1f6f4d1ebbaeb8d573087920280499ba8669
SHA512 d7de8756f3a5d9ca70e1bf2a99db428eb25449da2cded6119624784f86c14665b2cbc1718c01aaa81cc7e406ab8c381fcf824397742eee6db5ddf905b9fd9c98

C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\B3513D73A177A2707D910183759B389B_DFB78462C65FAC2750B89E1A8A1F9A53

MD5 fae37225ac5cd2e437c09fc9a72c84bc
SHA1 24e654742e1397ecc3038e7c287e6696c477f083
SHA256 9fe4aef03b8a6062749e6c8556642df46e4e899b38184ed7ce6b046dfc58a08b
SHA512 e0c48f395a52ceff64b3f4789ad492d7eb63b06cb2aa1664062df13093a38864f5017c75c851a57333b9a3cb0f8810a1c5d62bcf4247cf9affc7f8ce86177f88

C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\B3513D73A177A2707D910183759B389B_DFB78462C65FAC2750B89E1A8A1F9A53

MD5 93f98ceb7c3c310f78b404015ca41257
SHA1 b5c2aded8e4c3f82193a3d23a26c8868a85e89a0
SHA256 54519e9cd58fd22c448e83de8ac4fa4afec4d48714f7521764b0542d977d3128
SHA512 d1d5e79ab8f181c63efd291b970be82a958901d28757520598b0f6e924b7b2b2391773350f66c7a2c7da80bb111b8811b049697dd8de630ebc14c19ac08367e3

C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

MD5 bcd5b5367f15aa153498d5a18ddc658b
SHA1 c177b20cd860a832cd72acb97f511afd768360bf
SHA256 592bdcde5acb7f99ebf40cba4a57be83940195cb2198bd2afe922f41a61dcea8
SHA512 e0fa3e170c219ab703328f9f10432b44b501132b4631d341783628ad4d311c5d8f3509ef6deb3e76dd3d5a608dff315b2ff13bcafd71e6aa144c34594cab2d4a

C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

MD5 2add6a3b49f54965c300ae1f3e09a95d
SHA1 4bd79a16d1db25207276c104f8e86d53839fd310
SHA256 98901ea68ae31230e17ceee0925f58fc13f1f415fa1bd0fdf1565c1f9efe0315
SHA512 0039ad4a7a324b2598b32209f41a7ee87ca4084923ec1356ee05a83fcfb0ecd6f48686f1f140a3ebcd8cf5d77bbc9053eb3fae70b782d8a2a5f9b86561a7ef91

C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

MD5 14e0787cb1545ea9023de7149e55a52a
SHA1 c0899f9f225695f13e7466a1046d4d6c2d1022f9
SHA256 188c0ea9299b66872719a0d8a2b03e969f0d5aa56be64942e1dc2fc7b9393946
SHA512 bd77a216a1993ea85bc0da90042d57a4d4d73aa2c20c838cca40c3ef620c94ed23757ef74b33efc9b4d105d4f4b614af7b73708df8e9aeea4085854150711d13

C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

MD5 ada3efc3349154be0da5fb8fdce5a0bd
SHA1 1509a8fd7d89975851d682e930cd79f47c3e1769
SHA256 0a840ba6bdd183743b0d56e187c50869e8f2db9e9b2d4911a8f9245b9785acdc
SHA512 98e9fed272d238871ad816ab652d923999cd060d005cdd48ad809f2f16b37525ef6489369c2dd6f973cb02b7f7e6abc51523a954042143f1f55dc4ed9f5eb0ac

C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

MD5 69e32bf79d7515b2bd2dd20427b3cbf0
SHA1 216f3f42c09115e1d610f290fdcf8daa19f2a123
SHA256 c1e2c46bffd0e46e5bcf2cbcf21b2da24e4daae764238383eb2baefd4cef617f
SHA512 adf22892348afbc7ac7beb9253aec876c37ed98eb848a9f1b20f3e329e74fe9816f6270eae76701ad9ad3ade0d87f04bab8f6c0bd13925572adf9f8a57106b60

C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

MD5 a33da49d215c15821cd7148d44b93893
SHA1 11005b70e40756493d9140612e31526c4212764b
SHA256 41b7539ee823e1bab1b84dc4446d29197a1019906d81267f133fec5f69c57455
SHA512 a6a6dcf14901ba1505147625e401b0bdf028612c7aa9a8e79223fcfcae98baf71c253a98dffcacf9ab79a8cdf1fc6828c27c29bc4abc2cf17b8d7339bad0e2d7

C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

MD5 9e9d9f43da4b73a56a80418b3d8f8cc7
SHA1 f87c80b693a7e8f4387376b04ddc9e970e435f62
SHA256 e864c6534a858028957adeaeaf6b3c144e275ae8012ac53d4385fb7f98c1bc7f
SHA512 4c4818d5805ff0adf4f31b43ec59c0ac0b51838cc4f6829bf2c5c77155c00d7d357de8e02a715d41ebda26fe554dd3938381075449e6b32b49e7ca139c65172d

C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\F0ACCF77CDCBFF39F6191887F6D2D357

MD5 d10c4a0578aa84d4990b96d4762c13a7
SHA1 bdbce360f7ffb4c499b8bd31c2862a17a612d943
SHA256 912a695e9f22abc02535e9971cec4cd4f6d9f72e8d0c97fb0d6d0d76042dd664
SHA512 e5ffc6826b51a73d6ad065965fd63674002a04f5dffff7e735f8c0faba5b677a61d32fa0bdcaeb9b9023ffcf94cdf97cdd515f8f81cce6cc50d0cfaa9821cd20

C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\F0ACCF77CDCBFF39F6191887F6D2D357

MD5 a266bb7dcc38a562631361bbf61dd11b
SHA1 3b1efd3a66ea28b16697394703a72ca340a05bd5
SHA256 df545bf919a2439c36983b54cdfc903dfa4f37d3996d8d84b4c31eec6f3c163e
SHA512 0da8ef4f8f6ed3d16d2bc8eb816b9e6e1345dfe2d91160196c47e6149a1d6aedaafadcefd66acdea7f72dcf0832770192ceac15b0c559c4ccc2c0e5581d5aefc

C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

MD5 c5822d123a40f6b21e7e4657a05f24fb
SHA1 ea6074fd2f56fe7fbce3f03ad57b129321ce8af7
SHA256 7b76feb110d2500b6fe8cb11a654c309cfa33964d36557c76bcb5ad0d8d2a1f4
SHA512 77d7e36ea3af18dd54e5c2756ab37fdfc6bae8a7d39d9d7ae451382fc7bd9569e28cf76723b2f39ae6b0dee66da101c348d3f2cd460e83cc810c08b16241c19d

C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

MD5 44398536b9c9bf6d8400966d8cdf2905
SHA1 ecbe5969f7c012468eb8c7eaa784959f661314ca
SHA256 be73c58085d9a115ba74c8f608e65a738c829420388ba7b87b8bd194107aa81d
SHA512 887269f498dea3ce48856310d63b6e98db1c2bd4ac76d63d5d0a571898c1ef330d0c33d67c4050c54d319d52a87d70875b8f88752fff49e7891ab5f4a3674f4d

C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

MD5 b57ebf477a85645af40765714e4cfd87
SHA1 42c3a281b6b5f1aab92f29eaf4c3d393af1cb4a8
SHA256 7fd291830328190e62a82083ee41b1764e282864201b4e80511e1fd0c58b77ce
SHA512 c37ea61c18262a2175d4b099bddc5b4852106b610c46439bdb44851202517b79d797f913deab6df94095b3778061e6b2bf1adb799fdaa1e50bfeed7100e32ef0

C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

MD5 c3032aa60b9cac3e88a957d35f75075d
SHA1 42fd43780f71bbf4da6cbd7026efef9d641940b3
SHA256 e488e2800b183676601015f5c4e913bc3475fb4434476c168f3589edd6ecffc1
SHA512 31adcad7d13118ef1f2f13c7dcbc5ab4a1c6fb160cba21ec85c3c6ec68632c17f86cbd5b12e2026c491d4b0779d63aa7dca12fc40d44da0f3d7c8fc84328ca5d

C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

MD5 8a8cdfc1ce61e18617d2cc60771f360d
SHA1 eda8c08f65cf902a6dfa46c200cccefe8b948f63
SHA256 eb4494c44469d627010d6b14b7efc80c2d22a70c5af26f609ecd05fabbd54d80
SHA512 55af3b12f429e9caa7ad28e67164e001634516ffa95acf5fc4d6f22d74ee393cc17bc05c3b203e5676042c1b35691a5b99a93a6bf4cb36380b2f91dbb90e8cc8

C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

MD5 6a9ffbc8e6cb4af9b135ad946d7757af
SHA1 bddf2ce2956f7c6e71262e9cf93c9382ed3b21d9
SHA256 f57be9f06a96498edff2e130d1ad43a9eb0a2c7cce89220dd43ce4e91ceccecd
SHA512 452ee129a8023171a6cda4eddfdd830a44945fce61b620f865df8ef37056f4d1e62abce5fb6eed53e4463b720458f008bcfec377c46b9af3961a50b840dd7f26

C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\3C428B1A3E5F57D887EC4B864FAC5DCC

MD5 f9489b00d25ed9397fb5e128b20ff1f3
SHA1 53984b18750b7f2a81ed2249479d260a4ead1b65
SHA256 7c6ee8f0bf25f159550148fe57b90b3315dd78fc00a2a2727b9f2988a5cc68cb
SHA512 a856bce25863d1b380f9cc8e95a089d187971ce675dbfa8cbbe5612d7e41162cc8b942dab1a948fd78500e69fef82194e22e12710ae0d33b43166729085da0c3

C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\3C428B1A3E5F57D887EC4B864FAC5DCC

MD5 e4a68ac854ac5242460afd72481b2a44
SHA1 df3c24f9bfd666761b268073fe06d1cc8d4f82a4
SHA256 cb3ccbb76031e5e0138f8dd39a23f9de47ffc35e43c1144cea27d46a5ab1cb5f
SHA512 5622207e1ba285f172756f6019af92ac808ed63286e24dfecc1e79873fb5d140f1ceb7133f2476e89a5f75f711f9813a9fbb8fd5287f64adfdcc53b864f9bdc5

C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

MD5 62d2aa86c3a1e25619bf439c4ab4c5f6
SHA1 cee82c64544552f943d2b334c3ec1b8b51d49b96
SHA256 b9086a2c32fcaa98419c84209ceafb58b2ea57f8e390cee42442a053bab272a3
SHA512 32ec54bcebf8b1b6c0af75e0feb51c13cc997a421780a4d122920402031a6a7d05547121ed2cdb11fe4c9cfeae42802ac2dfad2a381b57b669ba24840a44bf96

C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

MD5 2d315b6a0d58e43f221e936db0ff812e
SHA1 4283715936d54f9c1efce9e8357a77cc518b88ab
SHA256 40faee5603dbbc3dc6527169fb02133b8642b569c8ec25601ea6e8c9be3101b0
SHA512 01bfec3aea0ad7a299a1aa235a20709de40375b0a38b83cfab2ea7fb47e2a14d28c415c476278f979b8704eadbee568854b901999718cc0829ab55140488f1cc

C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

MD5 0148612147fe672720aee618ee85e4fc
SHA1 87bd63f2987f2804c8e132b65fc7f447217ca56d
SHA256 c56db813a90daff7ec919e41a80f7a95699a1c741e622bece87b84ac08f5a28b
SHA512 1639637e9f552a9fe1d0023bcf6a496d2e70d600c12fcd77e19a7143fa52c70f7cde835847f7a59885e75a1b6e289554873640f14902452543821216365d9d78

C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

MD5 cab77449821ed657822eb44fac8c9a42
SHA1 c9b26427ec75588bff92337b3484384f65ae71ba
SHA256 8cc07577956f0799120ddfae10ece88c6df336d067cf3b4968dd89455f3a1390
SHA512 3992fb53b195d0f56da98e2198bcac1088e64e0e922e3e425733efa880286b38fb1480758b4e2d870664ce705695dcaef492bee2b71c1830c7e6c7a7dd676dc0

Analysis: behavioral2

Detonation Overview

Submitted

2025-01-01 07:58

Reported

2025-01-01 08:01

Platform

win10v2004-20241007-en

Max time kernel

144s

Max time network

150s

Command Line

"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --start-maximized --single-argument C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_4d25e8c251c9d7e2903937992f003f5f.html

Signatures

Browser Information Discovery

discovery

Enumerates system info in registry

Description Indicator Process Target
Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe N/A
Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe N/A
Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe N/A

Suspicious use of FindShellTrayWindow

Description Indicator Process Target
N/A N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe N/A
N/A N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe N/A
N/A N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe N/A
N/A N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe N/A
N/A N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe N/A
N/A N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe N/A
N/A N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe N/A
N/A N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe N/A
N/A N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe N/A
N/A N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe N/A
N/A N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe N/A
N/A N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe N/A
N/A N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe N/A
N/A N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe N/A
N/A N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe N/A
N/A N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe N/A
N/A N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe N/A
N/A N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe N/A
N/A N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe N/A
N/A N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe N/A
N/A N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe N/A
N/A N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe N/A
N/A N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe N/A
N/A N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe N/A
N/A N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe N/A

Suspicious use of SendNotifyMessage

Description Indicator Process Target
N/A N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe N/A
N/A N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe N/A
N/A N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe N/A
N/A N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe N/A
N/A N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe N/A
N/A N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe N/A
N/A N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe N/A
N/A N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe N/A
N/A N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe N/A
N/A N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe N/A
N/A N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe N/A
N/A N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe N/A
N/A N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe N/A
N/A N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe N/A
N/A N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe N/A
N/A N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe N/A
N/A N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe N/A
N/A N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe N/A
N/A N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe N/A
N/A N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe N/A
N/A N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe N/A
N/A N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe N/A
N/A N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe N/A
N/A N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe N/A

Suspicious use of WriteProcessMemory

Description Indicator Process Target
PID 2432 wrote to memory of 2896 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 2432 wrote to memory of 2896 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 2432 wrote to memory of 3956 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 2432 wrote to memory of 3956 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 2432 wrote to memory of 3956 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 2432 wrote to memory of 3956 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 2432 wrote to memory of 3956 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 2432 wrote to memory of 3956 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 2432 wrote to memory of 3956 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 2432 wrote to memory of 3956 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 2432 wrote to memory of 3956 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 2432 wrote to memory of 3956 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 2432 wrote to memory of 3956 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 2432 wrote to memory of 3956 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 2432 wrote to memory of 3956 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 2432 wrote to memory of 3956 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 2432 wrote to memory of 3956 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 2432 wrote to memory of 3956 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 2432 wrote to memory of 3956 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 2432 wrote to memory of 3956 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 2432 wrote to memory of 3956 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 2432 wrote to memory of 3956 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 2432 wrote to memory of 3956 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 2432 wrote to memory of 3956 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 2432 wrote to memory of 3956 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 2432 wrote to memory of 3956 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 2432 wrote to memory of 3956 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 2432 wrote to memory of 3956 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 2432 wrote to memory of 3956 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 2432 wrote to memory of 3956 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 2432 wrote to memory of 3956 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 2432 wrote to memory of 3956 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 2432 wrote to memory of 3956 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 2432 wrote to memory of 3956 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 2432 wrote to memory of 3956 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 2432 wrote to memory of 3956 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 2432 wrote to memory of 3956 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 2432 wrote to memory of 3956 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 2432 wrote to memory of 3956 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 2432 wrote to memory of 3956 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 2432 wrote to memory of 3956 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 2432 wrote to memory of 3956 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 2432 wrote to memory of 1740 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 2432 wrote to memory of 1740 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 2432 wrote to memory of 1992 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 2432 wrote to memory of 1992 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 2432 wrote to memory of 1992 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 2432 wrote to memory of 1992 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 2432 wrote to memory of 1992 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 2432 wrote to memory of 1992 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 2432 wrote to memory of 1992 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 2432 wrote to memory of 1992 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 2432 wrote to memory of 1992 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 2432 wrote to memory of 1992 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 2432 wrote to memory of 1992 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 2432 wrote to memory of 1992 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 2432 wrote to memory of 1992 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 2432 wrote to memory of 1992 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 2432 wrote to memory of 1992 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 2432 wrote to memory of 1992 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 2432 wrote to memory of 1992 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 2432 wrote to memory of 1992 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 2432 wrote to memory of 1992 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 2432 wrote to memory of 1992 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe

Processes

C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe

"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --start-maximized --single-argument C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_4d25e8c251c9d7e2903937992f003f5f.html

C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe

"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffefdc546f8,0x7ffefdc54708,0x7ffefdc54718

C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe

"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2052,18001026702433177948,5169136737067439490,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2148 /prefetch:2

C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe

"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2052,18001026702433177948,5169136737067439490,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2208 /prefetch:3

C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe

"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2052,18001026702433177948,5169136737067439490,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2632 /prefetch:8

C:\Windows\System32\CompPkgSrv.exe

C:\Windows\System32\CompPkgSrv.exe -Embedding

C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe

"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2052,18001026702433177948,5169136737067439490,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3248 /prefetch:1

C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe

"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2052,18001026702433177948,5169136737067439490,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3288 /prefetch:1

C:\Windows\System32\CompPkgSrv.exe

C:\Windows\System32\CompPkgSrv.exe -Embedding

C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe

"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2052,18001026702433177948,5169136737067439490,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4692 /prefetch:1

C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe

"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2052,18001026702433177948,5169136737067439490,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4852 /prefetch:1

C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe

"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2052,18001026702433177948,5169136737067439490,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5028 /prefetch:1

C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe

"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2052,18001026702433177948,5169136737067439490,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3348 /prefetch:1

C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe

"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2052,18001026702433177948,5169136737067439490,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5392 /prefetch:1

C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe

"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2052,18001026702433177948,5169136737067439490,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3364 /prefetch:1

C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe

"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2052,18001026702433177948,5169136737067439490,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=13 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5716 /prefetch:1

C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe

"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2052,18001026702433177948,5169136737067439490,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=14 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5968 /prefetch:1

C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe

"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2052,18001026702433177948,5169136737067439490,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=3360 /prefetch:2

C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe

"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2052,18001026702433177948,5169136737067439490,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2620 /prefetch:8

C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe

"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2052,18001026702433177948,5169136737067439490,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2620 /prefetch:8

C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe

"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2052,18001026702433177948,5169136737067439490,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=17 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6752 /prefetch:1

C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe

"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2052,18001026702433177948,5169136737067439490,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=18 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5908 /prefetch:1

C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe

"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2052,18001026702433177948,5169136737067439490,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=19 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6516 /prefetch:1

C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe

"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2052,18001026702433177948,5169136737067439490,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=20 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6424 /prefetch:1

Network

Country Destination Domain Proto
US 8.8.8.8:53 97.17.167.52.in-addr.arpa udp
US 8.8.8.8:53 apis.google.com udp
US 8.8.8.8:53 www.blogger.com udp
US 8.8.8.8:53 ajax.googleapis.com udp
US 8.8.8.8:53 2.bp.blogspot.com udp
FR 216.58.214.169:443 www.blogger.com tcp
FR 142.250.201.170:80 ajax.googleapis.com tcp
FR 142.250.201.170:443 ajax.googleapis.com tcp
FR 142.250.179.78:443 apis.google.com tcp
FR 216.58.215.33:445 2.bp.blogspot.com tcp
FR 216.58.214.169:443 www.blogger.com udp
FR 142.250.179.78:443 apis.google.com udp
US 8.8.8.8:53 www.facebook.com udp
DE 185.60.217.35:80 www.facebook.com tcp
US 8.8.8.8:53 www.linkwithin.com udp
US 8.8.8.8:53 feedjit.com udp
US 8.8.8.8:53 nwidget.networkedblogs.com udp
US 8.8.8.8:53 plipeo.com udp
US 8.8.8.8:53 img1.blogblog.com udp
SG 118.139.179.30:80 www.linkwithin.com tcp
SG 118.139.179.30:80 www.linkwithin.com tcp
US 8.8.8.8:53 1.bp.blogspot.com udp
US 8.8.8.8:53 badge.facebook.com udp
US 8.8.8.8:53 4.bp.blogspot.com udp
US 8.8.8.8:53 resources.blogblog.com udp
US 8.8.8.8:53 3.bp.blogspot.com udp
US 8.8.8.8:53 www.blogblog.com udp
US 8.8.8.8:53 2.bp.blogspot.com udp
DE 185.60.217.35:443 www.facebook.com tcp
SG 104.43.113.7:80 plipeo.com tcp
FR 216.58.215.33:80 2.bp.blogspot.com tcp
FR 216.58.215.33:80 2.bp.blogspot.com tcp
FR 216.58.214.169:80 www.blogblog.com tcp
DE 185.60.217.20:443 badge.facebook.com tcp
FR 216.58.214.169:80 www.blogblog.com tcp
FR 216.58.214.169:80 www.blogblog.com tcp
FR 216.58.214.169:80 www.blogblog.com tcp
FR 216.58.215.33:80 2.bp.blogspot.com tcp
FR 216.58.215.33:80 2.bp.blogspot.com tcp
FR 216.58.214.169:443 www.blogblog.com tcp
FR 216.58.215.33:80 2.bp.blogspot.com tcp
FR 216.58.215.33:80 2.bp.blogspot.com tcp
FR 216.58.215.33:80 2.bp.blogspot.com tcp
US 8.8.8.8:53 accounts.google.com udp
FR 216.58.215.33:80 2.bp.blogspot.com tcp
US 8.8.8.8:53 73.31.126.40.in-addr.arpa udp
US 8.8.8.8:53 169.214.58.216.in-addr.arpa udp
US 8.8.8.8:53 170.201.250.142.in-addr.arpa udp
US 8.8.8.8:53 78.179.250.142.in-addr.arpa udp
US 8.8.8.8:53 95.221.229.192.in-addr.arpa udp
US 8.8.8.8:53 35.217.60.185.in-addr.arpa udp
US 8.8.8.8:53 33.215.58.216.in-addr.arpa udp
US 8.8.8.8:53 20.217.60.185.in-addr.arpa udp
NL 142.250.27.84:443 accounts.google.com tcp
FR 216.58.215.33:80 2.bp.blogspot.com tcp
SG 118.139.179.30:80 www.linkwithin.com tcp
SG 104.43.113.7:80 plipeo.com tcp
US 8.8.8.8:53 static.xx.fbcdn.net udp
DE 185.60.217.28:443 static.xx.fbcdn.net tcp
US 8.8.8.8:53 www.123myip.co.uk udp
DE 52.29.79.39:80 www.123myip.co.uk tcp
US 8.8.8.8:53 static.networkedblogs.com udp
SG 104.43.113.7:443 plipeo.com tcp
US 8.8.8.8:53 www.wieistmeineip.de udp
FR 216.58.214.169:443 www.blogblog.com udp
DE 35.156.173.53:443 www.wieistmeineip.de tcp
US 8.8.8.8:53 www.facebook.com udp
DE 185.60.217.35:445 www.facebook.com tcp
US 8.8.8.8:53 mamasoyaku.blogspot.com udp
US 8.8.8.8:53 www.google.com udp
FR 216.58.213.65:80 mamasoyaku.blogspot.com tcp
FR 172.217.20.164:443 www.google.com tcp
FR 216.58.215.33:139 2.bp.blogspot.com tcp
SG 104.43.113.7:443 plipeo.com tcp
US 8.8.8.8:53 www6.cbox.ws udp
US 8.8.8.8:53 i43.tinypic.com udp
US 108.181.41.161:80 www6.cbox.ws tcp
US 8.8.8.8:53 www.purebaby.co.id udp
US 108.181.41.161:80 www6.cbox.ws tcp
US 8.8.8.8:53 blogger.googleusercontent.com udp
US 8.8.8.8:53 adv.blogupp.com udp
US 8.8.8.8:53 female.store.co.id udp
FR 142.250.179.65:443 blogger.googleusercontent.com tcp
FR 142.250.179.65:443 blogger.googleusercontent.com tcp
FR 142.250.179.65:443 blogger.googleusercontent.com tcp
FR 142.250.179.65:443 blogger.googleusercontent.com tcp
FR 142.250.179.65:443 blogger.googleusercontent.com tcp
FR 142.250.179.65:443 blogger.googleusercontent.com tcp
US 8.8.8.8:53 i879.photobucket.com udp
ID 203.161.184.73:80 female.store.co.id tcp
US 13.248.169.48:80 adv.blogupp.com tcp
DE 18.245.31.18:80 i879.photobucket.com tcp
US 8.8.8.8:53 84.27.250.142.in-addr.arpa udp
US 8.8.8.8:53 7.113.43.104.in-addr.arpa udp
US 8.8.8.8:53 30.179.139.118.in-addr.arpa udp
US 8.8.8.8:53 28.217.60.185.in-addr.arpa udp
US 8.8.8.8:53 39.79.29.52.in-addr.arpa udp
US 8.8.8.8:53 53.173.156.35.in-addr.arpa udp
US 8.8.8.8:53 65.213.58.216.in-addr.arpa udp
US 8.8.8.8:53 164.20.217.172.in-addr.arpa udp
US 8.8.8.8:53 119.82.161.3.in-addr.arpa udp
DE 18.245.31.18:443 i879.photobucket.com tcp
US 13.248.169.48:80 adv.blogupp.com tcp
ID 203.161.184.73:80 female.store.co.id tcp
US 8.8.8.8:53 www.cbox.ws udp
ID 101.255.93.254:80 www.purebaby.co.id tcp
US 8.8.8.8:53 www.godaddy.com udp
GB 95.100.244.9:443 www.godaddy.com tcp
ID 101.255.93.254:80 www.purebaby.co.id tcp
US 8.8.8.8:53 65.179.250.142.in-addr.arpa udp
US 8.8.8.8:53 161.41.181.108.in-addr.arpa udp
US 8.8.8.8:53 73.184.161.203.in-addr.arpa udp
US 8.8.8.8:53 18.31.245.18.in-addr.arpa udp
US 8.8.8.8:53 48.169.248.13.in-addr.arpa udp
US 8.8.8.8:53 9.244.100.95.in-addr.arpa udp
US 8.8.8.8:53 254.93.255.101.in-addr.arpa udp
N/A 224.0.0.251:5353 udp
US 8.8.8.8:53 28.118.140.52.in-addr.arpa udp
US 8.8.8.8:53 i43.tinypic.com udp
US 8.8.8.8:53 228.249.119.40.in-addr.arpa udp
FR 142.250.179.98:445 pagead2.googlesyndication.com tcp
FR 142.250.179.98:139 pagead2.googlesyndication.com tcp
US 8.8.8.8:53 50.23.12.20.in-addr.arpa udp
US 8.8.8.8:53 241.42.69.40.in-addr.arpa udp
US 8.8.8.8:53 i43.tinypic.com udp
US 8.8.8.8:53 172.210.232.199.in-addr.arpa udp
US 8.8.8.8:53 i43.tinypic.com udp
US 8.8.8.8:53 themes.googleusercontent.com udp
FR 142.250.179.65:445 themes.googleusercontent.com tcp
US 8.8.8.8:53 themes.googleusercontent.com udp
FR 142.250.179.65:139 themes.googleusercontent.com tcp
FR 172.217.20.163:445 fonts.gstatic.com tcp
FR 172.217.20.163:139 fonts.gstatic.com tcp
US 8.8.8.8:53 i43.tinypic.com udp
US 8.8.8.8:53 www.blogger.com udp
FR 216.58.214.169:445 www.blogger.com tcp
US 8.8.8.8:53 i43.tinypic.com udp
US 8.8.8.8:53 14.227.111.52.in-addr.arpa udp
US 8.8.8.8:53 i43.tinypic.com udp
ID 101.255.93.254:80 www.purebaby.co.id tcp
US 8.8.8.8:53 platform.twitter.com udp
GB 146.75.72.157:445 platform.twitter.com tcp
US 8.8.8.8:53 platform.twitter.com udp
GB 146.75.72.157:139 platform.twitter.com tcp
US 8.8.8.8:53 www.blogger.com udp
US 8.8.8.8:53 lh4.googleusercontent.com udp
US 8.8.8.8:53 lh3.googleusercontent.com udp
US 8.8.8.8:53 lh5.googleusercontent.com udp
FR 216.58.214.169:443 www.blogger.com udp
FR 142.250.179.65:443 lh5.googleusercontent.com udp
FR 142.250.179.65:443 lh5.googleusercontent.com udp
FR 142.250.179.65:443 lh5.googleusercontent.com udp
US 8.8.8.8:53 i43.tinypic.com udp

Files

C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad\settings.dat

MD5 61cef8e38cd95bf003f5fdd1dc37dae1
SHA1 11f2f79ecb349344c143eea9a0fed41891a3467f
SHA256 ae671613623b4477fbd5daf1fd2d148ae2a09ddcc3804b2b6d4ffcb60b317e3e
SHA512 6fb9b333fe0e8fde19fdd0bd01a1990a4e60a87c0a02bc8297da1206e42f8690d06b030308e58c862e9e77714a585eed7cc1627590d99a10aeb77fc0dd3d864d

\??\pipe\LOCAL\crashpad_2432_VMUSURYFOVKAOCLB

MD5 d41d8cd98f00b204e9800998ecf8427e
SHA1 da39a3ee5e6b4b0d3255bfef95601890afd80709
SHA256 e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855
SHA512 cf83e1357eefb8bdf1542850d66d8007d620e4050b5715dc83f4a921d36ce9ce47d0d13c5d85f2b0ff8318d2877eec2f63b931bd47417a81a538327af927da3e

C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad\settings.dat

MD5 0a9dc42e4013fc47438e96d24beb8eff
SHA1 806ab26d7eae031a58484188a7eb1adab06457fc
SHA256 58d66151799526b3fa372552cd99b385415d9e9a119302b99aadc34dd51dd151
SHA512 868d6b421ae2501a519595d0c34ddef25b2a98b082c5203da8349035f1f6764ddf183197f1054e7e86a752c71eccbc0649e515b63c55bc18cf5f0592397e258f

C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Preferences

MD5 9afb0746af4b85e89d6acba1ee4d3df1
SHA1 6b118b66a4c15cfdbabd26df5fda98e109ad55c0
SHA256 8211397fd8ca35a0dc097bbf52fb9b7a37a2ca8c17215e450b6760323cd0c389
SHA512 0ffe18f8f211909330bbcc73b0f7b3b37d799351078ba7af2a6eb8c4dfe052bd07caa1bb8deb149350174ac06b4d27facd320de809d17592ceb0d1507c510916

C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Local State

MD5 a42de4f74dc1286d6195bf4ec5e5a189
SHA1 c3fe1e793ccc682ff4ea461d71228b4cd9aa0b79
SHA256 71daeb4eacb29d05bddad824fc1ab21ed0ee3eb3580bcc25e593dd4dedd87abd
SHA512 6549da4b6fa530f1dbed81a7eb9b43bec38fa790fd7819ad45ca35d9f9055526d896cfec5bf73f28e9d5bb1d39856f2130575ab63127d8c6a3c2bdab1a6a114e

C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Preferences

MD5 18553c297230af829b3eb10cde518944
SHA1 958e2e40bff41fe7ac34373846603f1e840c9946
SHA256 df750171bbc6205689e8aa79bcb980912d6b952162f32c9a07fa7618089c066f
SHA512 7cdf0bf124d885150c1415635e8d38606c0d4d4473d7c083a42564ed22000d9becbd48e76948d6349d32adf420775dc76c49884399674120c3c44a9be65aa152

C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index

MD5 e2b4fde38ab78e9312a520f65968e839
SHA1 011d9c1853a68a3036b1801ba649c6561ae921d5
SHA256 676fdc44adbf6cfebb6b012ab4e7249721c1d23e5b4c403c181d480a61e21681
SHA512 d18539a2fc49475052c58d28d45237eb1f23a7677a18d152585be9492ffd573be329ecd207c708d9b3ab8b4cccf6ff3093aa3c7b759ed37952f0b6f3e17e3908

C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Network Persistent State

MD5 7374c623910bee10d21f8c48611c2324
SHA1 fa6dc165e8cfb7abea66e530c32b5092b51c4119
SHA256 85caf0bb73ffbb89e8585d800fe13c6d5e2b00ae1c8fff4740f85e93cbe7d389
SHA512 63ac79729ae691dc403ecb9e00249470b81d1016f06cff3ce6edcda6ee1ed0cafa7029963c2a0a498cb588425c45c79750af992a506683e8f78f00813e288781

C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\data_reduction_proxy_leveldb\CURRENT

MD5 6752a1d65b201c13b62ea44016eb221f
SHA1 58ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA256 0861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA512 9cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389

C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Preferences

MD5 ab9f5f3817b3616255c929c999c9d2e9
SHA1 1434dcb0ca8c01fd5cbd0a66d1bfe14ad1aeae2a
SHA256 50450ab33b44725c4db36b0ec9ab243bd0a08ae52a5a8aa6d6bb9f9890cf9c86
SHA512 bb8feb8952ebd542947279a2549dfd54f1be0723c04879ca1d88337b7e78a9ff8649eae758ab3cf4d2d1b731d5653921f353865bb537e463810ae0225d418e19