Malware Analysis Report

2025-03-14 21:52

Sample ID 250120-cyaxtswrfv
Target JaffaCakes118_d93a25c6d344569f76c14bc735a57999
SHA256 a610bb5410b570e96fea1adad35a4a75f05935e87b76995108437fdf4fdefd90
Tags
socgholish google discovery downloader phishing
score
10/10

Table of Contents

Analysis Overview

MITRE ATT&CK

Enterprise Matrix V15

Analysis: static1

Detonation Overview

Signatures

Analysis: behavioral1

Detonation Overview

Command Line

Signatures

Processes

Network

Files

Analysis: behavioral2

Detonation Overview

Command Line

Signatures

Processes

Network

Files

Analysis Overview

score
10/10

SHA256

a610bb5410b570e96fea1adad35a4a75f05935e87b76995108437fdf4fdefd90

Threat Level: Known bad

The file JaffaCakes118_d93a25c6d344569f76c14bc735a57999 was found to be: Known bad.

Malicious Activity Summary

socgholish google discovery downloader phishing

Detected google phishing page

SocGholish

Socgholish family

Legitimate hosting services abused for malware hosting/C2

System Location Discovery: System Language Discovery

Browser Information Discovery

Suspicious behavior: EnumeratesProcesses

Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary

Modifies Internet Explorer settings

Suspicious use of FindShellTrayWindow

Suspicious use of SetWindowsHookEx

Suspicious use of WriteProcessMemory

Enumerates system info in registry

Suspicious use of SendNotifyMessage

MITRE ATT&CK

Analysis: static1

Detonation Overview

Reported

2025-01-20 02:28

Signatures

N/A

Analysis: behavioral1

Detonation Overview

Submitted

2025-01-20 02:28

Reported

2025-01-20 02:31

Platform

win7-20241023-en

Max time kernel

132s

Max time network

134s

Command Line

"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_d93a25c6d344569f76c14bc735a57999.html

Signatures

Detected google phishing page

phishing google

SocGholish

downloader socgholish

Socgholish family

socgholish

Legitimate hosting services abused for malware hosting/C2

Description Indicator Process Target
N/A sites.google.com N/A N/A
N/A sites.google.com N/A N/A
N/A sites.google.com N/A N/A
N/A sites.google.com N/A N/A
N/A sites.google.com N/A N/A
N/A sites.google.com N/A N/A

System Location Discovery: System Language Discovery

discovery
Description Indicator Process Target
Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE N/A

Modifies Internet Explorer settings

adware spyware
Description Indicator Process Target
Key created \REGISTRY\USER\S-1-5-21-1163522206-1469769407-485553996-1000\Software\Microsoft\Internet Explorer\InternetRegistry C:\Program Files\Internet Explorer\iexplore.exe N/A
Key created \REGISTRY\USER\S-1-5-21-1163522206-1469769407-485553996-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch C:\Program Files\Internet Explorer\iexplore.exe N/A
Set value (data) \REGISTRY\USER\S-1-5-21-1163522206-1469769407-485553996-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 C:\Program Files\Internet Explorer\iexplore.exe N/A
Key created \REGISTRY\USER\S-1-5-21-1163522206-1469769407-485553996-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic C:\Program Files\Internet Explorer\iexplore.exe N/A
Key created \REGISTRY\USER\S-1-5-21-1163522206-1469769407-485553996-1000\Software\Microsoft\Internet Explorer\IETld\LowMic C:\Program Files\Internet Explorer\iexplore.exe N/A
Key created \REGISTRY\USER\S-1-5-21-1163522206-1469769407-485553996-1000\Software\Microsoft\Internet Explorer\IntelliForms C:\Program Files\Internet Explorer\iexplore.exe N/A
Key created \REGISTRY\USER\S-1-5-21-1163522206-1469769407-485553996-1000\Software\Microsoft\Internet Explorer\Toolbar C:\Program Files\Internet Explorer\iexplore.exe N/A
Set value (int) \REGISTRY\USER\S-1-5-21-1163522206-1469769407-485553996-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" C:\Program Files\Internet Explorer\iexplore.exe N/A
Set value (int) \REGISTRY\USER\S-1-5-21-1163522206-1469769407-485553996-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" C:\Program Files\Internet Explorer\iexplore.exe N/A
Set value (int) \REGISTRY\USER\S-1-5-21-1163522206-1469769407-485553996-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{4063EA51-D6D6-11EF-BD4E-7E1302FB0A39} = "0" C:\Program Files\Internet Explorer\iexplore.exe N/A
Set value (str) \REGISTRY\USER\S-1-5-21-1163522206-1469769407-485553996-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" C:\Program Files\Internet Explorer\iexplore.exe N/A
Key created \REGISTRY\USER\S-1-5-21-1163522206-1469769407-485553996-1000\Software\Microsoft\Internet Explorer\LowRegistry C:\Program Files\Internet Explorer\iexplore.exe N/A
Key created \REGISTRY\USER\S-1-5-21-1163522206-1469769407-485553996-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive C:\Program Files\Internet Explorer\iexplore.exe N/A
Set value (int) \REGISTRY\USER\S-1-5-21-1163522206-1469769407-485553996-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "443501985" C:\Program Files\Internet Explorer\iexplore.exe N/A
Key created \REGISTRY\USER\S-1-5-21-1163522206-1469769407-485553996-1000\Software\Microsoft\Internet Explorer\Main C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE N/A
Key created \REGISTRY\USER\S-1-5-21-1163522206-1469769407-485553996-1000\Software\Microsoft\Internet Explorer\SearchScopes C:\Program Files\Internet Explorer\iexplore.exe N/A
Key created \REGISTRY\USER\S-1-5-21-1163522206-1469769407-485553996-1000\Software\Microsoft\Internet Explorer\Main C:\Program Files\Internet Explorer\iexplore.exe N/A
Key created \REGISTRY\USER\S-1-5-21-1163522206-1469769407-485553996-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage C:\Program Files\Internet Explorer\iexplore.exe N/A
Key created \REGISTRY\USER\S-1-5-21-1163522206-1469769407-485553996-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain C:\Program Files\Internet Explorer\iexplore.exe N/A
Key created \REGISTRY\USER\S-1-5-21-1163522206-1469769407-485553996-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser C:\Program Files\Internet Explorer\iexplore.exe N/A
Set value (str) \REGISTRY\USER\S-1-5-21-1163522206-1469769407-485553996-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" C:\Program Files\Internet Explorer\iexplore.exe N/A
Key created \REGISTRY\USER\S-1-5-21-1163522206-1469769407-485553996-1000\Software\Microsoft\Internet Explorer\DomainSuggestion C:\Program Files\Internet Explorer\iexplore.exe N/A
Set value (int) \REGISTRY\USER\S-1-5-21-1163522206-1469769407-485553996-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" C:\Program Files\Internet Explorer\iexplore.exe N/A
Key created \REGISTRY\USER\S-1-5-21-1163522206-1469769407-485553996-1000\Software\Microsoft\Internet Explorer\GPU C:\Program Files\Internet Explorer\iexplore.exe N/A
Key created \REGISTRY\USER\S-1-5-21-1163522206-1469769407-485553996-1000\Software\Microsoft\Internet Explorer\PageSetup C:\Program Files\Internet Explorer\iexplore.exe N/A
Key created \REGISTRY\USER\S-1-5-21-1163522206-1469769407-485553996-1000\Software\Microsoft\Internet Explorer\Zoom C:\Program Files\Internet Explorer\iexplore.exe N/A
Key created \REGISTRY\USER\S-1-5-21-1163522206-1469769407-485553996-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery C:\Program Files\Internet Explorer\iexplore.exe N/A
Set value (int) \REGISTRY\USER\S-1-5-21-1163522206-1469769407-485553996-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" C:\Program Files\Internet Explorer\iexplore.exe N/A

Suspicious use of FindShellTrayWindow

Description Indicator Process Target
N/A N/A C:\Program Files\Internet Explorer\iexplore.exe N/A

Processes

C:\Program Files\Internet Explorer\iexplore.exe

"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_d93a25c6d344569f76c14bc735a57999.html

C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE

"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:308 CREDAT:275457 /prefetch:2

Network

Country Destination Domain Proto
US 8.8.8.8:53 www.blogger.com udp
US 8.8.8.8:53 www.google.com udp
GB 142.250.187.196:80 www.google.com tcp
GB 142.250.187.196:80 www.google.com tcp
GB 142.250.180.9:80 www.blogger.com tcp
GB 142.250.180.9:80 www.blogger.com tcp
GB 142.250.180.9:80 www.blogger.com tcp
US 8.8.8.8:53 img1.blogblog.com udp
US 8.8.8.8:53 ads.bumq.com udp
US 8.8.8.8:53 www.intensedebate.com udp
US 8.8.8.8:53 4.bp.blogspot.com udp
US 8.8.8.8:53 static.ak.fbcdn.net udp
US 8.8.8.8:53 1.bp.blogspot.com udp
US 8.8.8.8:53 3.bp.blogspot.com udp
US 8.8.8.8:53 img2.blogblog.com udp
US 8.8.8.8:53 tweetmeme.com udp
US 192.0.123.247:80 www.intensedebate.com tcp
US 192.0.123.247:80 www.intensedebate.com tcp
GB 142.250.180.9:80 img2.blogblog.com tcp
GB 142.250.180.9:80 img2.blogblog.com tcp
US 104.21.7.9:80 ads.bumq.com tcp
US 104.21.7.9:80 ads.bumq.com tcp
GB 172.217.16.225:80 3.bp.blogspot.com tcp
GB 172.217.16.225:80 3.bp.blogspot.com tcp
GB 142.250.180.9:80 img2.blogblog.com tcp
GB 172.217.16.225:80 3.bp.blogspot.com tcp
GB 142.250.180.9:80 img2.blogblog.com tcp
GB 172.217.16.225:80 3.bp.blogspot.com tcp
GB 172.217.16.225:80 3.bp.blogspot.com tcp
GB 172.217.16.225:80 3.bp.blogspot.com tcp
GB 142.250.180.9:443 img2.blogblog.com tcp
US 192.0.123.247:443 www.intensedebate.com tcp
US 8.8.8.8:53 c.pki.goog udp
GB 142.250.200.35:80 c.pki.goog tcp
US 8.8.8.8:53 o.pki.goog udp
GB 142.250.200.35:80 o.pki.goog tcp
US 8.8.8.8:53 www.blogblog.com udp
GB 142.250.180.9:80 www.blogblog.com tcp
GB 142.250.180.9:80 www.blogblog.com tcp
GB 142.250.180.9:80 www.blogblog.com tcp
GB 142.250.180.9:80 www.blogblog.com tcp
GB 142.250.187.196:80 www.google.com tcp
GB 142.250.187.196:80 www.google.com tcp
GB 142.250.180.9:443 www.blogblog.com tcp
GB 216.58.204.74:80 fonts.googleapis.com tcp
GB 216.58.204.74:80 fonts.googleapis.com tcp
GB 142.250.187.196:443 www.google.com tcp
US 8.8.8.8:53 ssl.gstatic.com udp
GB 142.250.200.3:443 ssl.gstatic.com tcp
GB 142.250.200.3:443 ssl.gstatic.com tcp
GB 142.250.200.35:80 o.pki.goog tcp
GB 172.217.16.225:80 3.bp.blogspot.com tcp
US 8.8.8.8:53 www.linkwithin.com udp
US 8.8.8.8:53 feeds.feedburner.com udp
US 8.8.8.8:53 2.bp.blogspot.com udp
US 8.8.8.8:53 rcm.amazon.com udp
SG 118.139.179.30:80 www.linkwithin.com tcp
SG 118.139.179.30:80 www.linkwithin.com tcp
GB 216.58.212.206:80 feeds.feedburner.com tcp
GB 216.58.212.206:80 feeds.feedburner.com tcp
GB 172.217.16.225:80 2.bp.blogspot.com tcp
GB 172.217.16.225:80 2.bp.blogspot.com tcp
GB 172.217.16.225:80 2.bp.blogspot.com tcp
GB 172.217.16.225:80 2.bp.blogspot.com tcp
US 104.21.7.9:80 ads.bumq.com tcp
US 104.21.7.9:80 ads.bumq.com tcp
US 8.8.8.8:53 www.gmodules.com udp
US 8.8.8.8:53 ws.amazon.com udp
US 8.8.8.8:53 twitter-badges.s3.amazonaws.com udp
US 8.8.8.8:53 www.facebook.com udp
US 3.5.27.222:80 twitter-badges.s3.amazonaws.com tcp
US 3.5.27.222:80 twitter-badges.s3.amazonaws.com tcp
GB 142.250.187.225:80 www.gmodules.com tcp
GB 142.250.187.225:80 www.gmodules.com tcp
DE 157.240.253.35:80 www.facebook.com tcp
DE 157.240.253.35:80 www.facebook.com tcp
US 192.0.123.247:443 www.intensedebate.com tcp
DE 157.240.253.35:443 www.facebook.com tcp
US 8.8.8.8:53 static.xx.fbcdn.net udp
DE 157.240.253.1:443 static.xx.fbcdn.net tcp
DE 157.240.253.1:443 static.xx.fbcdn.net tcp
US 8.8.8.8:53 rcm.amazon.com udp
US 8.8.8.8:53 ws.amazon.com udp
US 8.8.8.8:53 www.microsoft.com udp
GB 95.100.245.144:80 www.microsoft.com tcp
US 8.8.8.8:53 crl.microsoft.com udp
GB 2.19.252.157:80 crl.microsoft.com tcp
US 8.8.8.8:53 financialtools.stockgroup.com udp
US 23.21.52.60:80 financialtools.stockgroup.com tcp
US 23.21.52.60:80 financialtools.stockgroup.com tcp
US 8.8.8.8:53 sites.google.com udp
GB 142.250.180.9:80 www.blogblog.com tcp
GB 142.250.180.9:80 www.blogblog.com tcp
GB 142.250.180.9:80 www.blogblog.com tcp
GB 142.250.187.196:80 www.google.com tcp
GB 142.250.187.196:80 www.google.com tcp
US 8.8.8.8:53 www.blogrankings.com udp
US 8.8.8.8:53 www.blogrankers.com udp
US 8.8.8.8:53 jg.revolvermaps.com udp
US 8.8.8.8:53 gelgit.tk udp
GB 172.217.169.14:443 sites.google.com tcp
GB 172.217.169.14:443 sites.google.com tcp
GB 172.217.169.14:80 sites.google.com tcp
GB 172.217.169.14:80 sites.google.com tcp
US 8.8.8.8:53 www.bangkokbank.com udp
US 8.8.8.8:53 www.settrade.com udp
DE 23.67.174.131:80 www.bangkokbank.com tcp
DE 23.67.174.131:80 www.bangkokbank.com tcp
US 45.60.46.141:80 www.settrade.com tcp
US 45.60.46.141:80 www.settrade.com tcp
US 209.90.91.147:80 www.blogrankers.com tcp
US 209.90.91.147:80 www.blogrankers.com tcp
US 45.60.46.141:443 www.settrade.com tcp
GB 172.217.169.14:443 sites.google.com tcp
GB 172.217.169.14:443 sites.google.com tcp
GB 172.217.169.14:443 sites.google.com tcp
US 8.8.8.8:53 accounts.google.com udp
NL 173.194.69.84:443 accounts.google.com tcp
NL 173.194.69.84:443 accounts.google.com tcp
NL 173.194.69.84:443 accounts.google.com tcp
NL 173.194.69.84:443 accounts.google.com tcp
NL 173.194.69.84:443 accounts.google.com tcp
NL 173.194.69.84:443 accounts.google.com tcp
US 45.60.46.141:443 www.settrade.com tcp
US 8.8.8.8:53 websiteblogdd.blogspot.com udp
US 8.8.8.8:53 ajax.googleapis.com udp
GB 172.217.16.225:80 websiteblogdd.blogspot.com tcp
GB 172.217.16.225:80 websiteblogdd.blogspot.com tcp
GB 142.250.179.234:80 ajax.googleapis.com tcp
GB 142.250.179.234:80 ajax.googleapis.com tcp
US 8.8.8.8:53 www.blogrankings.com udp
US 107.22.223.179:80 financialtools.stockgroup.com tcp
US 107.22.223.179:80 financialtools.stockgroup.com tcp
US 209.90.91.147:80 www.blogrankers.com tcp
US 204.79.197.200:443 ieonline.microsoft.com tcp
US 204.79.197.200:443 ieonline.microsoft.com tcp
US 204.79.197.200:443 ieonline.microsoft.com tcp
US 23.21.52.60:80 financialtools.stockgroup.com tcp
US 23.21.52.60:80 financialtools.stockgroup.com tcp
US 107.22.223.179:80 financialtools.stockgroup.com tcp
US 107.22.223.179:80 financialtools.stockgroup.com tcp
US 192.0.123.247:443 www.intensedebate.com tcp
US 192.0.123.247:443 www.intensedebate.com tcp
US 192.0.123.247:443 www.intensedebate.com tcp
US 8.8.8.8:53 gravatar.com udp
US 8.8.8.8:53 websiteruengdd.blogspot.com udp
US 8.8.8.8:53 websitetraveldd.blogspot.com udp
US 192.0.123.247:443 www.intensedebate.com tcp
GB 172.217.16.225:80 websitetraveldd.blogspot.com tcp
GB 172.217.16.225:80 websitetraveldd.blogspot.com tcp
GB 172.217.16.225:80 websitetraveldd.blogspot.com tcp
GB 172.217.16.225:80 websitetraveldd.blogspot.com tcp
US 192.0.80.242:443 gravatar.com tcp
US 192.0.80.242:443 gravatar.com tcp
US 192.0.123.247:443 www.intensedebate.com tcp
US 192.0.123.247:443 www.intensedebate.com tcp

Files

C:\Users\Admin\AppData\Local\Temp\Cab78DA.tmp

MD5 49aebf8cbd62d92ac215b2923fb1b9f5
SHA1 1723be06719828dda65ad804298d0431f6aff976
SHA256 b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512 bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b

C:\Users\Admin\AppData\Local\Temp\Tar7998.tmp

MD5 4ea6026cf93ec6338144661bf1202cd1
SHA1 a1dec9044f750ad887935a01430bf49322fbdcb7
SHA256 8efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA512 6c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b

C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\9GP4P3HF\maia[1].css

MD5 9e914fd11c5238c50eba741a873f0896
SHA1 950316ffef900ceecca4cf847c9a8c14231271da
SHA256 8684a32d1a10d050a26fc33192edf427a5f0c6874c590a68d77ae6e0d186bd8a
SHA512 362b96b27d3286396f53ece74b1685fa915fc9a73e83f28e782b3f6a2b9f851ba9e37d79d93bd97ab7b3dc3c2d9b66b5e8f81151c8b65a17f4483e1484428e5f

C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\F0ACCF77CDCBFF39F6191887F6D2D357

MD5 b8c65879a6681f7fb1c67dee97f7de33
SHA1 5b0272990de04d707b46eec2914a5f6bf17492b1
SHA256 dbd15f926a9c7b4f8e6ce6eca98aeeff32919c3ed6d6953f8cceb0f9af98e3f9
SHA512 6677e9d58bb4348df87aed960359aae333551940d5ec7eb76126617e001a5e752d556a05468f458ea1594a1cc0fe5089f8bada311552df21368220c3b4b5efd6

C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\F0ACCF77CDCBFF39F6191887F6D2D357

MD5 a266bb7dcc38a562631361bbf61dd11b
SHA1 3b1efd3a66ea28b16697394703a72ca340a05bd5
SHA256 df545bf919a2439c36983b54cdfc903dfa4f37d3996d8d84b4c31eec6f3c163e
SHA512 0da8ef4f8f6ed3d16d2bc8eb816b9e6e1345dfe2d91160196c47e6149a1d6aedaafadcefd66acdea7f72dcf0832770192ceac15b0c559c4ccc2c0e5581d5aefc

C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

MD5 7c1295c1b12bc25bc6800535f009015c
SHA1 4114dd1b838d699aaf255f5465c7f1abbef8933e
SHA256 d0ab90138df994c470bc4240c8960da7e4ab36824270e51384c3d46dafd99ad4
SHA512 6d90d4889d3f55951994d7af359abd83f7ef5fd0b64a66cf26b8913f7d71239fb4f1789001504d745eb61d1f85f709fad41aa8feb8511ba14f44528431132627

C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

MD5 77475d80bb991052e2cbf2635cfff40e
SHA1 0bf5cf06726e52d6dcef786271147762069aab2c
SHA256 f3b07605b56c95a3ec5f196c9feae1634b3777527a6d11732e8070ba1099aba8
SHA512 a59ac076ac1c8aca63b1876a4f1dfd31740d8a82c1f5ba047f3df323284786255ea942dbaf24492df1777b2da792ce0b4abafbd9e7efc511192ffe033c94dc07

C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

MD5 d5a249e74dc7ff536809b9d0be7bf4e5
SHA1 b19ce218817595f8203164b560c1dcf5f8a32d78
SHA256 3459de67963700b045514191b3bc87624bbff7cda12c28dea04d566ea59a125a
SHA512 3962583531b6e24dbe7781ee3b240a9c1779f5106a4a275989dbaa94a78c00ae2a4f801e8ce373440e570820bcfd4f3a20698f2ff8b744442116eb652ea21c0c

C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

MD5 70a87993e7b7682d7183f5f1ee6c09c5
SHA1 3b1ef3dfd912ba544ceef26e02d6cb7f2593891f
SHA256 3ec11ae1785373c9e96574b08239983be55a11b03fbf5325fdac64d3f4daea8b
SHA512 a76a1577e8770f87db8f72ef5440b4b7b396b091864d7ed0adf44295d3b1ac634d19e70d5e952b2134b9fb82bcec9bd343654a0cc264f2136e47c4d2031645ab

C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

MD5 3187b549839a32137fc2e524dcb8a756
SHA1 4d3104a4f97a9376b6da5a60600664d8d0d0e126
SHA256 2958c770a5ab2bbd50d7798962b72d69ff9eed5d70a86d2c5605c1c2f550a7d7
SHA512 5c2c30995c2d28cab2a33521786fdfaf2df2439121cddbeb5b07828a81545f056aeb4f9456f543557ee40d5acdf3d2b62420cccd3eb459f4abe0f40ed9c31083

C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

MD5 ce6a39f27f2c6941930d13122bd8f4fd
SHA1 411b85409f3644abe3d196952b3a2d18ddedbb74
SHA256 ee91a0fb47babf504e6d39cf48a8b1683353f566a2fa2681b807b093efe0ecd6
SHA512 3ba20133bc5aa056a2ae42c9e720c3d7a6e5d2d4e539f3c5650ec98a83fb89da540803bca4c3d781f947786a1db07e09183d6f31db9cf27a53f7ae2de621e4f3

C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\3C428B1A3E5F57D887EC4B864FAC5DCC

MD5 e4a68ac854ac5242460afd72481b2a44
SHA1 df3c24f9bfd666761b268073fe06d1cc8d4f82a4
SHA256 cb3ccbb76031e5e0138f8dd39a23f9de47ffc35e43c1144cea27d46a5ab1cb5f
SHA512 5622207e1ba285f172756f6019af92ac808ed63286e24dfecc1e79873fb5d140f1ceb7133f2476e89a5f75f711f9813a9fbb8fd5287f64adfdcc53b864f9bdc5

C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

MD5 e8bd3e5eb143be64eb04676b9f9c44e7
SHA1 747b130dcec1d2f004888feb3a749a023d3ef0e0
SHA256 cf8f93e6862af586f1f903c64e8e83c2a369095d312edd0ada9343da967dad5e
SHA512 49c5db545432cb19ad7790c04dc738426bb6da1a43b60b19bb3cd8ac2d246f062f847db440e9e64043c3e15776f793ec5a5d9eeab036948b1f12e6fda22ff4f7

C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

MD5 f1a3fe3a642263c28275b54d547a694a
SHA1 5ba0dcf1e9f3088b20b8e5e56dc9399ed074fca7
SHA256 5c2e02055670fa738790a95049a5932a73de4942df0a00db1f9600693e5adf23
SHA512 dac770ed4a8d7280ffb5a821833cca6294f724d4a068190bb65199b5bb1aad167142b24a99a743598a83f36bf170a61c294da1e20b37eef6cb35c04cdcf8ab70

C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

MD5 7d5cc3f6e2ce5943c051893d3f576e36
SHA1 0ee25d50023aeb6f703e700c053f6fedd1526d99
SHA256 2568d68f68280b0eba4857e86d780701aa8866ba50b8013483afa4dd1a888f96
SHA512 1c29633aeb386b5a0d5b1046932189c00b7ea4717f7ec5b0da7d64540582c5f6e79b1f5b47817c169da77106ac4eafc8745d2752a40fc945dbe652efe7ab3dea

C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\3C428B1A3E5F57D887EC4B864FAC5DCC

MD5 6bc1057248899575c2b602e0497706b4
SHA1 7b61ef298b17c558745734f0eec45984f923b58b
SHA256 7f7e07fe11747fe56e14e36c48c222477d51fa1b1f359c298f8d86b66c39c11f
SHA512 4e881caec0c622a02884f132ee282d6cdfa9b402c5f275785f5e19a2bd658083305ca08e1d140fac668642f973b7720c6f278fd949d162b63d9adfcfc0ff94bd

C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\L6J4GCMD\wCSS[1].css

MD5 d45a8ab0f958dda5cb5ff316f23c6b7f
SHA1 3ff08b3dc06ddfd9084dccececc1cfeea41a7cac
SHA256 db6982dc7fd31db0d9511d7782216eadf36bbb8c50c1bf7730c79e79f0ffdbb3
SHA512 794dea38d69f5160aa62a2b51c8cb5a297fb9988ed7c5b5848700714cb5a33c581d42d7100b59c5100116bcd99e1bb11bf0530cda96edef89d756eb356a5f774

C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

MD5 0aae9b373b6105f41722faaca1f8e5fb
SHA1 c3e8eec9d94e86a00c40a79e8fdddff14372b38e
SHA256 9eb08a2c3f4d399f540415789585af4b10e2bdee7dfe9edb9b521359967f5824
SHA512 e1349b09e8602234663af438df4b482594d8195cf5966b1441eff2d0e6aecafd47c2ec741993f7ba0e631d37db1d0b7421d3def299f4f50fb33d440d12e652d0

C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

MD5 69a27ad4d6746bd67b899d3f8f1fbb85
SHA1 cd586c60ceefb4853417367718c123a2004f6c45
SHA256 c8f2432476c4ebdea0fb634fa3a18c4cb9eab82dfc1d1915bfb072bf8e604c64
SHA512 0b62acf16dfa77e3f601f26d624ec1afe9329079029b7e8e31650fc65f465e3f9f7b97cf234977d2594e8069f3d902fbe91c86626803e03e9be0212ae377e1a3

C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

MD5 0667707f078ec75e475820ff45135835
SHA1 ed1610ea2a8401527dbd25a6dd1782e262ff9404
SHA256 3c4a2677eedc337a5dcc40c1e131944a7199d6dd65bb91fce539a8cd1f45ab99
SHA512 8ecec1c6af85a56c97cc976d6ad5c896d76f7a2d0cda75854e599675a64e595fe3cd26da0c4e5deea85323b27a47262a9f6a32e6b857c6baa79d728a1120809f

C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

MD5 8a5a6b4e89b914ee8660828573336724
SHA1 dc97a36d8eba5b5a18dbb7d701094c80a82dcf59
SHA256 a151f00acb46a2c96e96069a4aa76e738c1d0f14a31be4088364b67c7cde9b0b
SHA512 67cb3dea7a975f9357661a1410a56fc9726874dff74ab7c7c70dd8fab0e5561809917d7c02e38720918504e771050a5cdf940d22934c725eb29fa4b139e4ce39

C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

MD5 e803a17c027421b6f2a00125e1961917
SHA1 161871886f2a5d1ade74a6b9f6f86f09de73dab6
SHA256 cde80f08d54d438e6ce359cd4406d9180f87d25ad47e0de7399ae1e70cbdb315
SHA512 552e5964869ce8229505814a9086fa6f8b22ff570a5a10de0bab93e4bc938c17c278db8d825415ba29e4f0f2b927ec32a172b819a7e6c17d804413a74ceeca62

C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

MD5 89521d75ed1e9150aafc5ac24f84f39c
SHA1 174f16b782cfe196336affa956b9ba00a5e3b781
SHA256 df362b98f7a342b9cd965f8efd7817497c3c5ee45bb934bb954f1f6b3dc42374
SHA512 f426ee0a54d6fb8b33363426aa9331032703e49c399509d91cbde8cd5f474f9de9f318a451604b919666f0adde1c5ca80effad83038fdc43eca80f4e5abb8a10

C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

MD5 7addb71c7eb6f35ffed0b148bc7e1cb6
SHA1 5266aa675e71d4cef3156b23cfe225b36149d1ed
SHA256 e038609f77b25dab0de4e6a4328cb0292230fcb2917ca541fc6ded2385638567
SHA512 68b6b93718d544c71e8ca9e08b860e699cb5705357deb56f0b2745556458f1e6fe5d01b9640671923a3cb3818b4abe5a1503bc55cc9e1d2a412f0b8f423c83b7

C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

MD5 baaf9d714304a24adb2453e3d9fd4052
SHA1 02b88f708ef2fc65b42a11f927f5df0a27f46874
SHA256 10a3b78e73a911875b78bb8637127dbf46458cd54305230a597df6e88d1e59a1
SHA512 6e133b8d11d3334b582a6240d2db49fdc7ee7bbd1c16c420636bade1ace182d3c1df45e05f1063480fef9e62664859a08b6d9d6e7bd2299e4b8a019e91f2120d

C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

MD5 b723a69e0ec24696f330d569564c613c
SHA1 03b5bc4d2bb4a1217e6dc1c79b4388e20f58af13
SHA256 6093f286f21f35386f6dbc89a1649ab5b2945bab5c4ee0d03e0b9f4148b0e2bd
SHA512 91aced935ba6537bf1d7ade3b99715353b8bb628253e25a5641c0ef0b826a2830e6fda03b7d84a418543110fa61693d9eeb55a6345d13c12f41db3715f1ae694

C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

MD5 d098fe68222bdc0d79a5aa74ba053853
SHA1 4dbadebba6cab99bc60e2fbf2ef21d6f2de3c91b
SHA256 8c78d4f51ce38ba077330b904e2599596c978f1a1a122dc5b5efe5ee13448af6
SHA512 5c80351eb90ba5325ccff43727da322382eea4904cf1b9eae0dc5a91c0d4ebfe2714f2dc3588176097fd3f78be048e5cdbac874036351b6edc02e54c7a65f2e3

C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

MD5 cf305771d0680d73557fb9184291c5c1
SHA1 80a51e802fd6270862f27a4b5bd523ba164cef37
SHA256 aef64b8e78a34a250474bf68db7c725e0ea71ed1bbc6d58c1b799041f2b2f408
SHA512 fd97338c1de026bd234be3adee2a0750f2559ef596a1067288767c57c5dac9b350ce294d5b0f26bd35c6ff4c7b5270046556db2c2cded95eee5bc116f4b26fe5

Analysis: behavioral2

Detonation Overview

Submitted

2025-01-20 02:28

Reported

2025-01-20 02:32

Platform

win10v2004-20241007-en

Max time kernel

145s

Max time network

149s

Command Line

"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --start-maximized --single-argument C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_d93a25c6d344569f76c14bc735a57999.html

Signatures

Legitimate hosting services abused for malware hosting/C2

Description Indicator Process Target
N/A sites.google.com N/A N/A
N/A sites.google.com N/A N/A

Browser Information Discovery

discovery

Enumerates system info in registry

Description Indicator Process Target
Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe N/A
Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe N/A
Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe N/A

Suspicious use of FindShellTrayWindow

Description Indicator Process Target
N/A N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe N/A
N/A N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe N/A
N/A N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe N/A
N/A N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe N/A
N/A N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe N/A
N/A N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe N/A
N/A N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe N/A
N/A N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe N/A
N/A N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe N/A
N/A N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe N/A
N/A N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe N/A
N/A N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe N/A
N/A N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe N/A
N/A N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe N/A
N/A N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe N/A
N/A N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe N/A
N/A N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe N/A
N/A N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe N/A
N/A N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe N/A
N/A N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe N/A
N/A N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe N/A
N/A N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe N/A
N/A N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe N/A
N/A N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe N/A
N/A N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe N/A

Suspicious use of SendNotifyMessage

Description Indicator Process Target
N/A N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe N/A
N/A N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe N/A
N/A N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe N/A
N/A N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe N/A
N/A N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe N/A
N/A N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe N/A
N/A N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe N/A
N/A N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe N/A
N/A N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe N/A
N/A N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe N/A
N/A N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe N/A
N/A N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe N/A
N/A N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe N/A
N/A N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe N/A
N/A N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe N/A
N/A N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe N/A
N/A N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe N/A
N/A N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe N/A
N/A N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe N/A
N/A N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe N/A
N/A N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe N/A
N/A N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe N/A
N/A N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe N/A
N/A N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe N/A

Suspicious use of WriteProcessMemory

Description Indicator Process Target
PID 2864 wrote to memory of 4468 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 2864 wrote to memory of 4468 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 2864 wrote to memory of 3452 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 2864 wrote to memory of 3452 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 2864 wrote to memory of 3452 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 2864 wrote to memory of 3452 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 2864 wrote to memory of 3452 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 2864 wrote to memory of 3452 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 2864 wrote to memory of 3452 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 2864 wrote to memory of 3452 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 2864 wrote to memory of 3452 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 2864 wrote to memory of 3452 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 2864 wrote to memory of 3452 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 2864 wrote to memory of 3452 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 2864 wrote to memory of 3452 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 2864 wrote to memory of 3452 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 2864 wrote to memory of 3452 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 2864 wrote to memory of 3452 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 2864 wrote to memory of 3452 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 2864 wrote to memory of 3452 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 2864 wrote to memory of 3452 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 2864 wrote to memory of 3452 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 2864 wrote to memory of 3452 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 2864 wrote to memory of 3452 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 2864 wrote to memory of 3452 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 2864 wrote to memory of 3452 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 2864 wrote to memory of 3452 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 2864 wrote to memory of 3452 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 2864 wrote to memory of 3452 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 2864 wrote to memory of 3452 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 2864 wrote to memory of 3452 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 2864 wrote to memory of 3452 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 2864 wrote to memory of 3452 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 2864 wrote to memory of 3452 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 2864 wrote to memory of 3452 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 2864 wrote to memory of 3452 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 2864 wrote to memory of 3452 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 2864 wrote to memory of 3452 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 2864 wrote to memory of 3452 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 2864 wrote to memory of 3452 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 2864 wrote to memory of 3452 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 2864 wrote to memory of 3452 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 2864 wrote to memory of 1856 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 2864 wrote to memory of 1856 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 2864 wrote to memory of 4964 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 2864 wrote to memory of 4964 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 2864 wrote to memory of 4964 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 2864 wrote to memory of 4964 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 2864 wrote to memory of 4964 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 2864 wrote to memory of 4964 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 2864 wrote to memory of 4964 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 2864 wrote to memory of 4964 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 2864 wrote to memory of 4964 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 2864 wrote to memory of 4964 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 2864 wrote to memory of 4964 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 2864 wrote to memory of 4964 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 2864 wrote to memory of 4964 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 2864 wrote to memory of 4964 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 2864 wrote to memory of 4964 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 2864 wrote to memory of 4964 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 2864 wrote to memory of 4964 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 2864 wrote to memory of 4964 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 2864 wrote to memory of 4964 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 2864 wrote to memory of 4964 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe

Processes

C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe

"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --start-maximized --single-argument C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_d93a25c6d344569f76c14bc735a57999.html

C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe

"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffdc45246f8,0x7ffdc4524708,0x7ffdc4524718

C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe

"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2072,5667347581752998830,14653236923865931166,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2084 /prefetch:2

C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe

"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2072,5667347581752998830,14653236923865931166,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2248 /prefetch:3

C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe

"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2072,5667347581752998830,14653236923865931166,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2764 /prefetch:8

C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe

"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2072,5667347581752998830,14653236923865931166,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3208 /prefetch:1

C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe

"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2072,5667347581752998830,14653236923865931166,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3220 /prefetch:1

C:\Windows\System32\CompPkgSrv.exe

C:\Windows\System32\CompPkgSrv.exe -Embedding

C:\Windows\System32\CompPkgSrv.exe

C:\Windows\System32\CompPkgSrv.exe -Embedding

C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe

"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2072,5667347581752998830,14653236923865931166,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4644 /prefetch:1

C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe

"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2072,5667347581752998830,14653236923865931166,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4556 /prefetch:1

C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe

"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2072,5667347581752998830,14653236923865931166,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6120 /prefetch:1

C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe

"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2072,5667347581752998830,14653236923865931166,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5912 /prefetch:1

C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe

"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2072,5667347581752998830,14653236923865931166,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=2152 /prefetch:1

C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe

"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2072,5667347581752998830,14653236923865931166,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6176 /prefetch:1

C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe

"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2072,5667347581752998830,14653236923865931166,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=13 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=7140 /prefetch:1

C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe

"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2072,5667347581752998830,14653236923865931166,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=14 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6524 /prefetch:1

C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe

"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2072,5667347581752998830,14653236923865931166,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=15 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5416 /prefetch:1

C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe

"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2072,5667347581752998830,14653236923865931166,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=16 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6412 /prefetch:1

C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe

"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2072,5667347581752998830,14653236923865931166,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=17 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=7472 /prefetch:1

C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe

"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2072,5667347581752998830,14653236923865931166,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=6304 /prefetch:8

C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe

"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2072,5667347581752998830,14653236923865931166,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=6304 /prefetch:8

C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe

"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2072,5667347581752998830,14653236923865931166,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=19 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=7872 /prefetch:1

C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe

"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2072,5667347581752998830,14653236923865931166,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=20 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=7880 /prefetch:1

C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe

"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2072,5667347581752998830,14653236923865931166,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=21 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4504 /prefetch:1

C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe

"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2072,5667347581752998830,14653236923865931166,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=22 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=7616 /prefetch:1

C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe

"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2072,5667347581752998830,14653236923865931166,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=7268 /prefetch:2

Network

Country Destination Domain Proto
US 8.8.8.8:53 8.8.8.8.in-addr.arpa udp
US 8.8.8.8:53 www.google.com udp
US 8.8.8.8:53 www.blogger.com udp
GB 142.250.187.196:80 www.google.com tcp
GB 142.250.187.196:80 www.google.com tcp
GB 142.250.180.9:80 www.blogger.com tcp
GB 142.250.180.9:80 www.blogger.com tcp
GB 142.250.180.9:443 www.blogger.com tcp
US 8.8.8.8:53 ads.bumq.com udp
US 104.21.7.9:80 ads.bumq.com tcp
US 8.8.8.8:53 133.211.185.52.in-addr.arpa udp
US 8.8.8.8:53 76.32.126.40.in-addr.arpa udp
US 8.8.8.8:53 196.187.250.142.in-addr.arpa udp
US 8.8.8.8:53 9.180.250.142.in-addr.arpa udp
US 8.8.8.8:53 167.173.78.104.in-addr.arpa udp
US 8.8.8.8:53 9.7.21.104.in-addr.arpa udp
US 8.8.8.8:53 www.intensedebate.com udp
GB 142.250.187.196:80 www.google.com tcp
GB 142.250.187.196:80 www.google.com tcp
GB 142.250.187.196:80 www.google.com tcp
US 192.0.123.247:80 www.intensedebate.com tcp
US 192.0.123.247:80 www.intensedebate.com tcp
US 192.0.123.247:80 www.intensedebate.com tcp
US 8.8.8.8:53 static.ak.fbcdn.net udp
US 8.8.8.8:53 tweetmeme.com udp
US 8.8.8.8:53 www.linkwithin.com udp
US 8.8.8.8:53 www.blogblog.com udp
US 8.8.8.8:53 ws.amazon.com udp
US 8.8.8.8:53 www.gmodules.com udp
SG 118.139.179.30:80 www.linkwithin.com tcp
US 8.8.8.8:53 jg.revolvermaps.com udp
GB 142.250.180.9:80 www.blogblog.com tcp
GB 142.250.180.9:80 www.blogblog.com tcp
GB 142.250.180.9:80 www.blogblog.com tcp
GB 142.250.180.9:80 www.blogblog.com tcp
US 8.8.8.8:53 sites.google.com udp
GB 142.250.187.225:80 www.gmodules.com tcp
GB 172.217.169.14:443 sites.google.com tcp
GB 172.217.169.14:80 sites.google.com tcp
GB 172.217.169.14:80 sites.google.com tcp
US 8.8.8.8:53 img1.blogblog.com udp
US 8.8.8.8:53 3.bp.blogspot.com udp
GB 142.250.180.9:80 img1.blogblog.com tcp
GB 172.217.16.225:80 3.bp.blogspot.com tcp
SG 118.139.179.30:80 www.linkwithin.com tcp
US 8.8.8.8:53 4.bp.blogspot.com udp
GB 172.217.16.225:80 4.bp.blogspot.com tcp
US 8.8.8.8:53 1.bp.blogspot.com udp
US 192.0.123.247:443 www.intensedebate.com tcp
US 192.0.123.247:443 www.intensedebate.com tcp
US 192.0.123.247:443 www.intensedebate.com tcp
GB 172.217.16.225:80 1.bp.blogspot.com tcp
US 8.8.8.8:53 img2.blogblog.com udp
SG 118.139.179.30:80 www.linkwithin.com tcp
US 8.8.8.8:53 feeds.feedburner.com udp
US 8.8.8.8:53 2.bp.blogspot.com udp
GB 142.250.180.9:80 img2.blogblog.com tcp
GB 216.58.212.206:80 feeds.feedburner.com tcp
GB 172.217.16.225:80 2.bp.blogspot.com tcp
GB 172.217.16.225:80 2.bp.blogspot.com tcp
GB 142.250.180.9:443 img2.blogblog.com udp
GB 172.217.16.225:80 2.bp.blogspot.com tcp
GB 172.217.16.225:80 2.bp.blogspot.com tcp
GB 172.217.16.225:80 2.bp.blogspot.com tcp
US 8.8.8.8:53 twitter-badges.s3.amazonaws.com udp
GB 216.58.212.206:80 feeds.feedburner.com tcp
US 8.8.8.8:53 227.187.250.142.in-addr.arpa udp
US 8.8.8.8:53 225.187.250.142.in-addr.arpa udp
US 8.8.8.8:53 14.169.217.172.in-addr.arpa udp
US 8.8.8.8:53 247.123.0.192.in-addr.arpa udp
US 8.8.8.8:53 225.16.217.172.in-addr.arpa udp
US 8.8.8.8:53 206.212.58.216.in-addr.arpa udp
US 8.8.8.8:53 30.179.139.118.in-addr.arpa udp
US 52.217.110.244:80 twitter-badges.s3.amazonaws.com tcp
GB 142.250.180.9:80 img2.blogblog.com tcp
GB 142.250.180.9:80 img2.blogblog.com tcp
GB 142.250.187.196:443 www.google.com tcp
US 8.8.8.8:53 www.blogrankings.com udp
US 8.8.8.8:53 www.blogrankers.com udp
US 209.90.91.147:80 www.blogrankers.com tcp
US 209.90.91.147:80 www.blogrankers.com tcp
US 8.8.8.8:53 ogads-pa.googleapis.com udp
US 8.8.8.8:53 apis.google.com udp
GB 142.250.178.10:443 ogads-pa.googleapis.com tcp
GB 142.250.178.14:443 apis.google.com tcp
GB 142.250.178.10:443 ogads-pa.googleapis.com udp
US 8.8.8.8:53 74.204.58.216.in-addr.arpa udp
US 8.8.8.8:53 244.110.217.52.in-addr.arpa udp
US 8.8.8.8:53 10.178.250.142.in-addr.arpa udp
US 8.8.8.8:53 195.187.250.142.in-addr.arpa udp
US 8.8.8.8:53 14.178.250.142.in-addr.arpa udp
US 8.8.8.8:53 play.google.com udp
GB 142.250.179.238:443 play.google.com tcp
GB 142.250.179.238:443 play.google.com udp
US 8.8.8.8:53 238.179.250.142.in-addr.arpa udp
N/A 224.0.0.251:5353 udp
US 8.8.8.8:53 228.249.119.40.in-addr.arpa udp
US 8.8.8.8:53 rcm.amazon.com udp
US 104.21.7.9:80 ads.bumq.com tcp
US 8.8.8.8:53 connect.facebook.net udp
DE 157.240.253.1:445 connect.facebook.net tcp
US 8.8.8.8:53 r-login.wordpress.com udp
US 192.0.78.19:443 r-login.wordpress.com tcp
US 8.8.8.8:53 connect.facebook.net udp
DE 157.240.253.1:139 connect.facebook.net tcp
US 8.8.8.8:53 19.78.0.192.in-addr.arpa udp
US 8.8.8.8:53 56.163.245.4.in-addr.arpa udp
US 8.8.8.8:53 171.39.242.20.in-addr.arpa udp
US 8.8.8.8:53 172.214.232.199.in-addr.arpa udp
US 8.8.8.8:53 www.facebook.com udp
US 104.21.7.9:80 ads.bumq.com tcp
GB 157.240.214.35:80 www.facebook.com tcp
GB 157.240.214.35:443 www.facebook.com tcp
US 8.8.8.8:53 static.xx.fbcdn.net udp
DE 157.240.253.1:443 static.xx.fbcdn.net tcp
US 8.8.8.8:53 35.214.240.157.in-addr.arpa udp
US 8.8.8.8:53 1.253.240.157.in-addr.arpa udp
US 8.8.8.8:53 financialtools.stockgroup.com udp
GB 142.250.187.225:80 www.gmodules.com tcp
US 23.21.52.60:80 financialtools.stockgroup.com tcp
US 23.21.52.60:80 financialtools.stockgroup.com tcp
US 104.21.7.9:80 ads.bumq.com tcp
US 8.8.8.8:53 gelgit.tk udp
US 8.8.8.8:53 www.bangkokbank.com udp
US 8.8.8.8:53 www.settrade.com udp
US 104.21.7.9:80 ads.bumq.com tcp
US 45.60.46.141:80 www.settrade.com tcp
US 45.60.46.141:443 www.settrade.com tcp
GB 23.214.158.184:80 www.bangkokbank.com tcp
US 8.8.8.8:53 141.46.60.45.in-addr.arpa udp
US 8.8.8.8:53 184.158.214.23.in-addr.arpa udp
US 107.22.223.179:80 financialtools.stockgroup.com tcp
US 107.22.223.179:80 financialtools.stockgroup.com tcp
US 8.8.8.8:53 43.229.111.52.in-addr.arpa udp
GB 142.250.187.196:443 www.google.com udp
GB 172.217.169.14:443 sites.google.com udp
US 8.8.8.8:53 websiteblogdd.blogspot.com udp
US 8.8.8.8:53 ajax.googleapis.com udp
GB 172.217.16.225:80 websiteblogdd.blogspot.com tcp
GB 172.217.16.225:80 websiteblogdd.blogspot.com tcp
GB 142.250.200.42:80 ajax.googleapis.com tcp
GB 172.217.16.225:80 websiteblogdd.blogspot.com tcp
US 8.8.8.8:53 42.200.250.142.in-addr.arpa udp
US 192.0.123.247:443 www.intensedebate.com tcp
US 8.8.8.8:53 websiteruengdd.blogspot.com udp
US 8.8.8.8:53 websitetraveldd.blogspot.com udp
US 8.8.8.8:53 gravatar.com udp
GB 172.217.16.225:80 websitetraveldd.blogspot.com tcp
GB 172.217.16.225:80 websitetraveldd.blogspot.com tcp
US 192.0.80.241:443 gravatar.com tcp
GB 172.217.16.225:80 websitetraveldd.blogspot.com tcp
US 8.8.8.8:53 241.80.0.192.in-addr.arpa udp
US 192.0.123.247:443 www.intensedebate.com tcp
US 192.0.123.247:443 www.intensedebate.com tcp

Files

C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad\settings.dat

MD5 36988ca14952e1848e81a959880ea217
SHA1 a0482ef725657760502c2d1a5abe0bb37aebaadb
SHA256 d7e96088b37cec1bde202ae8ec2d2f3c3aafc368b6ebd91b3e2985846facf2e6
SHA512 d04b2f5afec92eb3d9f9cdc148a3eddd1b615e0dfb270566a7969576f50881d1f8572bccb8b9fd7993724bdfe36fc7633a33381d43e0b96c4e9bbd53fc010173

\??\pipe\LOCAL\crashpad_2864_XGLPZQLRLCOCDUXV

MD5 d41d8cd98f00b204e9800998ecf8427e
SHA1 da39a3ee5e6b4b0d3255bfef95601890afd80709
SHA256 e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855
SHA512 cf83e1357eefb8bdf1542850d66d8007d620e4050b5715dc83f4a921d36ce9ce47d0d13c5d85f2b0ff8318d2877eec2f63b931bd47417a81a538327af927da3e

C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad\settings.dat

MD5 fab8d8d865e33fe195732aa7dcb91c30
SHA1 2637e832f38acc70af3e511f5eba80fbd7461f2c
SHA256 1b034ffe38e534e2b7a21be7c1f207ff84a1d5f3893207d0b4bb1a509b4185ea
SHA512 39a3d43ef7e28fea2cb247a5d09576a4904a43680db8c32139f22a03d80f6ede98708a2452f3f82232b868501340f79c0b3f810f597bcaf5267c3ccfb1704b43

C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Preferences

MD5 4c713b16bd4acf6e4bd283599661081b
SHA1 3cddfc91be9a694159ac5f0b4daca3921aa5bd40
SHA256 2e53ed63a0bb10a23a3c3f4e28350c2affffa319789e462969d00431941f2c1a
SHA512 83feb7271d663e3a243a065e0283a6f94fcd4b0f187356b04417f0af8f2dfcce31f9f5d81bd7e1bab421808863b55b5e5311fb111ae9b87063fc9eedf17c2590

C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Local State

MD5 8b5b54f78a1cf0486522bb2fe9bae6bd
SHA1 6c66c848466385faaad725f9c7791994faa86e0b
SHA256 76ab079cd85e4dc5da7cc2f058119b3b315e84656c6adf6ce23a3c37d36c91f7
SHA512 b0778d6406fc45cef7e3b23d546d8a2c1f05e21bdb7aab5e71597c759bccae98a7b334dc7821fb1ac3502fb415f4496ff254f10ad17f8e3b947a406105dcef25

C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Preferences

MD5 98f7d8ce281120a9004fc3279e5047ac
SHA1 c50be15ce7869a3d58af16abc64ce14f92edfc11
SHA256 96da03a740081fecb75699f37a64e52bce87dcf7c0d3dc9e5d9e7e7d8f403699
SHA512 84d0d9d21d4dea2fdfc9352066fef3443a312623f259b1b940e42daf7d6cff816a4ff1cc8ce7614e0de02c570ddeed41aa1dea62bbb39fa68536292dac43b16f

C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index

MD5 600c93e3db884a214e832ba84042b436
SHA1 09bc31a3b588ed6fd367d822b70084f8cd6e41e7
SHA256 682c34a133b4232faaf81b997ea52b9b3ba796c1d634043a322f5b20a330a9f7
SHA512 a0b5fd6a9129bf80842e71248e9f0fbfebd2fc7702dd86eb2f466b71bdd20243eba5c88ebc2a41be37953a7f9d8f9e5c52cd5de93f86d89a8c8a9b7a8d89fbb0

C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\TransportSecurity

MD5 59d9cd2c848cd8759580241f03c97fc4
SHA1 8403796ca95a45cf10c44a7c8d6afecea732d981
SHA256 9737476b16106327120cba69cce24fc06ed5c0bf204c178a421db02ec5b732d5
SHA512 f1d40774477309ef087ed201d23d6b70a5bd17b179b60809321115ae64bdfafc95e88a961a2ac10c650d8b40b8b30b82680ef57e984126799cb35499f7b761f7

C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\TransportSecurity~RFe57e58d.TMP

MD5 0cf18781f6806c43933cdedc1234656e
SHA1 a51c8971c8e28e4d64a537ce44cbc2bb02fcd41e
SHA256 f7aedeccbc3083cdb5696138843f1b8552bc25ad954005a783f0c64162cd8441
SHA512 bc14be29532db9111c1b18726dd1d5297dd624089f2e996f0ed6ffbfdf139b84e3c6e11d1e4f8c410ed3ef473fa36032ffbd6ce1618bb78088fe27eaf79b3cf6

C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\TransportSecurity

MD5 aa9a6586e988a40803a948e55bf1a09c
SHA1 c828649c7fde4deb37256f418fc26881cfd84308
SHA256 cb40504d22d66ac41f9f4586b49a7c43351d74ca79d3b707c534b13c019ad5c5
SHA512 b727c42647ce8f0466fbfab0f53023c249809871beb77279f2cb2c455d6297ae97263e4fe06c40b92b28851d4bf15047411d9c913b3be07119531e02facbba07

C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Network Persistent State

MD5 dda0c4d54cd96af64d2629c3f64f2a07
SHA1 97b5f6834452b930fb9dcd880d4d0b5e8c0c13aa
SHA256 e0fc1fb02092ae89ba26ae61f29e99e819ca1987376f5ba113b00804ce58c64a
SHA512 340ccb42ab3186f9ae493b1a9fe939719c7666ece165c97e2327c1eca1b9857bb090885cddb2882ba917bca414eab3ffe42dbe3d65f5ccde002aa20e8ce0d711

C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\TransportSecurity

MD5 3a2a1f269e80cee985be79681e4f99f6
SHA1 940748bde0fdfb8a7055d5428fd27742d3adb104
SHA256 43d6d86a6cc86b6b0ebf89c2f4adb77c37a35c4a417faaf663c41e3013d1e94a
SHA512 22eff458cbee369cdce371c02b584f1bbc0662407a131efad319e109fb616319e166add2d4f9e3c19a7560a46b42bb281294adc88b88908052fd4f9bd5a3c62b

C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\data_reduction_proxy_leveldb\CURRENT

MD5 6752a1d65b201c13b62ea44016eb221f
SHA1 58ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA256 0861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA512 9cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389

C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Preferences

MD5 fb96805a6d3ab9e758ede6563a6385cb
SHA1 cf8ace0fb2115fe7586054de3734950753471e3a
SHA256 c49e5098bf85ab64dd40746c8f095474b70be798f276d79b2e31ab902177fc84
SHA512 95de28e4fe45dc8ffacd310bb5fa2e36125a13de9f60093e280d179ec3f72326ee4636a9ff5dadd116afbf4b485954c340dfcda8e1ed769d909aee40b81442d9