Malware Analysis Report

2024-12-06 03:27

Sample ID 241030-glt76aypgm
Target 7e1bda025440047feb687204a9534385_JaffaCakes118
SHA256 6178dc55ad9f052e7e8f0199050519941330a3e2037aa06ca0d1ef098fbf02f2
Tags
discovery socgholish downloader
score
10/10

Table of Contents

Analysis Overview

MITRE ATT&CK

Enterprise Matrix V15

Analysis: static1

Detonation Overview

Signatures

Analysis: behavioral2

Detonation Overview

Command Line

Signatures

Processes

Network

Files

Analysis: behavioral1

Detonation Overview

Command Line

Signatures

Processes

Network

Files

Analysis Overview

score
10/10

SHA256

6178dc55ad9f052e7e8f0199050519941330a3e2037aa06ca0d1ef098fbf02f2

Threat Level: Known bad

The file 7e1bda025440047feb687204a9534385_JaffaCakes118 was found to be: Known bad.

Malicious Activity Summary

discovery socgholish downloader

SocGholish

Socgholish family

System Location Discovery: System Language Discovery

Browser Information Discovery

Suspicious use of SetWindowsHookEx

Enumerates system info in registry

Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary

Suspicious use of WriteProcessMemory

Suspicious use of SendNotifyMessage

Modifies Internet Explorer settings

Suspicious behavior: EnumeratesProcesses

Suspicious use of FindShellTrayWindow

MITRE ATT&CK

Analysis: static1

Detonation Overview

Reported

2024-10-30 05:54

Signatures

N/A

Analysis: behavioral2

Detonation Overview

Submitted

2024-10-30 05:54

Reported

2024-10-30 05:56

Platform

win10v2004-20241007-en

Max time kernel

148s

Max time network

156s

Command Line

"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --start-maximized --single-argument C:\Users\Admin\AppData\Local\Temp\7e1bda025440047feb687204a9534385_JaffaCakes118.html

Signatures

Browser Information Discovery

discovery

Enumerates system info in registry

Description Indicator Process Target
Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe N/A
Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe N/A
Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe N/A

Suspicious use of FindShellTrayWindow

Description Indicator Process Target
N/A N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe N/A
N/A N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe N/A
N/A N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe N/A
N/A N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe N/A
N/A N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe N/A
N/A N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe N/A
N/A N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe N/A
N/A N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe N/A
N/A N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe N/A
N/A N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe N/A
N/A N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe N/A
N/A N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe N/A
N/A N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe N/A
N/A N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe N/A
N/A N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe N/A
N/A N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe N/A
N/A N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe N/A
N/A N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe N/A
N/A N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe N/A
N/A N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe N/A
N/A N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe N/A
N/A N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe N/A
N/A N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe N/A
N/A N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe N/A
N/A N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe N/A

Suspicious use of SendNotifyMessage

Description Indicator Process Target
N/A N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe N/A
N/A N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe N/A
N/A N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe N/A
N/A N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe N/A
N/A N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe N/A
N/A N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe N/A
N/A N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe N/A
N/A N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe N/A
N/A N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe N/A
N/A N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe N/A
N/A N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe N/A
N/A N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe N/A
N/A N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe N/A
N/A N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe N/A
N/A N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe N/A
N/A N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe N/A
N/A N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe N/A
N/A N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe N/A
N/A N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe N/A
N/A N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe N/A
N/A N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe N/A
N/A N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe N/A
N/A N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe N/A
N/A N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe N/A

Suspicious use of WriteProcessMemory

Description Indicator Process Target
PID 3812 wrote to memory of 5116 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 3812 wrote to memory of 5116 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 3812 wrote to memory of 4388 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 3812 wrote to memory of 4388 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 3812 wrote to memory of 4388 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 3812 wrote to memory of 4388 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 3812 wrote to memory of 4388 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 3812 wrote to memory of 4388 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 3812 wrote to memory of 4388 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 3812 wrote to memory of 4388 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 3812 wrote to memory of 4388 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 3812 wrote to memory of 4388 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 3812 wrote to memory of 4388 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 3812 wrote to memory of 4388 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 3812 wrote to memory of 4388 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 3812 wrote to memory of 4388 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 3812 wrote to memory of 4388 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 3812 wrote to memory of 4388 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 3812 wrote to memory of 4388 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 3812 wrote to memory of 4388 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 3812 wrote to memory of 4388 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 3812 wrote to memory of 4388 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 3812 wrote to memory of 4388 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 3812 wrote to memory of 4388 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 3812 wrote to memory of 4388 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 3812 wrote to memory of 4388 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 3812 wrote to memory of 4388 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 3812 wrote to memory of 4388 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 3812 wrote to memory of 4388 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 3812 wrote to memory of 4388 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 3812 wrote to memory of 4388 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 3812 wrote to memory of 4388 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 3812 wrote to memory of 4388 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 3812 wrote to memory of 4388 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 3812 wrote to memory of 4388 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 3812 wrote to memory of 4388 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 3812 wrote to memory of 4388 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 3812 wrote to memory of 4388 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 3812 wrote to memory of 4388 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 3812 wrote to memory of 4388 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 3812 wrote to memory of 4388 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 3812 wrote to memory of 4388 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 3812 wrote to memory of 1428 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 3812 wrote to memory of 1428 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 3812 wrote to memory of 5088 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 3812 wrote to memory of 5088 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 3812 wrote to memory of 5088 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 3812 wrote to memory of 5088 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 3812 wrote to memory of 5088 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 3812 wrote to memory of 5088 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 3812 wrote to memory of 5088 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 3812 wrote to memory of 5088 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 3812 wrote to memory of 5088 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 3812 wrote to memory of 5088 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 3812 wrote to memory of 5088 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 3812 wrote to memory of 5088 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 3812 wrote to memory of 5088 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 3812 wrote to memory of 5088 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 3812 wrote to memory of 5088 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 3812 wrote to memory of 5088 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 3812 wrote to memory of 5088 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 3812 wrote to memory of 5088 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 3812 wrote to memory of 5088 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 3812 wrote to memory of 5088 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe

Processes

C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe

"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --start-maximized --single-argument C:\Users\Admin\AppData\Local\Temp\7e1bda025440047feb687204a9534385_JaffaCakes118.html

C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe

"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0x100,0x104,0x108,0xfc,0x10c,0x7ff9108946f8,0x7ff910894708,0x7ff910894718

C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe

"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2024,13715236794304127339,3549307470012731524,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2056 /prefetch:2

C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe

"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2024,13715236794304127339,3549307470012731524,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2124 /prefetch:3

C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe

"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2024,13715236794304127339,3549307470012731524,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2720 /prefetch:8

C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe

"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2024,13715236794304127339,3549307470012731524,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3208 /prefetch:1

C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe

"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2024,13715236794304127339,3549307470012731524,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3276 /prefetch:1

C:\Windows\System32\CompPkgSrv.exe

C:\Windows\System32\CompPkgSrv.exe -Embedding

C:\Windows\System32\CompPkgSrv.exe

C:\Windows\System32\CompPkgSrv.exe -Embedding

C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe

"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2024,13715236794304127339,3549307470012731524,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6124 /prefetch:1

C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe

"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2024,13715236794304127339,3549307470012731524,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5792 /prefetch:1

C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe

"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2024,13715236794304127339,3549307470012731524,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5540 /prefetch:1

C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe

"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2024,13715236794304127339,3549307470012731524,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=7040 /prefetch:1

C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe

"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2024,13715236794304127339,3549307470012731524,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=6492 /prefetch:8

C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe

"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2024,13715236794304127339,3549307470012731524,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=6492 /prefetch:8

C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe

"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2024,13715236794304127339,3549307470012731524,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5480 /prefetch:1

C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe

"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2024,13715236794304127339,3549307470012731524,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=13 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5412 /prefetch:1

C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe

"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2024,13715236794304127339,3549307470012731524,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=14 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6996 /prefetch:1

C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe

"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2024,13715236794304127339,3549307470012731524,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=15 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=7060 /prefetch:1

C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe

"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2024,13715236794304127339,3549307470012731524,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=4176 /prefetch:2

Network

Country Destination Domain Proto
US 8.8.8.8:53 8.8.8.8.in-addr.arpa udp
US 8.8.8.8:53 133.211.185.52.in-addr.arpa udp
US 8.8.8.8:53 75.209.201.84.in-addr.arpa udp
US 8.8.8.8:53 www.cine-world.in udp
US 8.8.8.8:53 www.google.co.in udp
GB 216.58.204.67:445 www.google.co.in tcp
GB 142.250.200.2:80 pagead2.googlesyndication.com tcp
US 8.8.8.8:53 www.linkwithin.com udp
US 8.8.8.8:53 connect.facebook.net udp
US 8.8.8.8:53 www.google.com udp
US 8.8.8.8:53 1.bp.blogspot.com udp
US 8.8.8.8:53 2.bp.blogspot.com udp
US 8.8.8.8:53 4.bp.blogspot.com udp
US 8.8.8.8:53 3.bp.blogspot.com udp
SG 118.139.179.30:80 www.linkwithin.com tcp
GB 172.217.169.36:80 www.google.com tcp
GB 163.70.151.21:80 connect.facebook.net tcp
GB 142.250.180.1:80 3.bp.blogspot.com tcp
GB 142.250.180.1:80 3.bp.blogspot.com tcp
GB 142.250.180.1:80 3.bp.blogspot.com tcp
GB 142.250.180.1:80 3.bp.blogspot.com tcp
GB 142.250.180.1:80 3.bp.blogspot.com tcp
GB 142.250.180.1:80 3.bp.blogspot.com tcp
GB 142.250.180.1:80 3.bp.blogspot.com tcp
GB 163.70.151.21:443 connect.facebook.net tcp
SG 118.139.179.30:80 www.linkwithin.com tcp
US 8.8.8.8:53 feeds.feedburner.com udp
US 8.8.8.8:53 www.blogtoplist.com udp
US 8.8.8.8:53 www.blogtopsites.com udp
US 8.8.8.8:53 www.topblogarea.com udp
US 8.8.8.8:53 www.blogrankings.com udp
US 8.8.8.8:53 www.blogflare.com udp
GB 142.250.200.46:80 feeds.feedburner.com tcp
US 54.87.82.0:80 www.blogtopsites.com tcp
US 8.8.8.8:53 www.ontoplist.com udp
US 8.8.8.8:53 www.bloggapedia.com udp
US 8.8.8.8:53 www.topblogging.com udp
US 8.8.8.8:53 www.photoblogdirectory.net udp
US 8.12.18.87:80 www.ontoplist.com tcp
US 172.67.210.120:80 www.topblogging.com tcp
US 104.21.40.170:80 www.bloggapedia.com tcp
US 3.33.130.190:80 www.photoblogdirectory.net tcp
SG 118.139.179.30:80 www.linkwithin.com tcp
US 8.8.8.8:53 bloggapedia.com udp
US 104.21.40.170:443 bloggapedia.com tcp
US 8.8.8.8:53 www.blogarama.com udp
US 172.66.43.66:80 www.blogarama.com tcp
US 8.8.8.8:53 a.nel.cloudflare.com udp
US 8.12.18.87:443 www.ontoplist.com tcp
US 8.8.8.8:53 www.blog-search.info udp
US 8.8.8.8:53 www.blogadda.com udp
US 172.66.43.66:443 www.blogarama.com tcp
US 35.190.80.1:443 a.nel.cloudflare.com tcp
US 8.8.8.8:53 0.159.190.20.in-addr.arpa udp
US 8.8.8.8:53 2.200.250.142.in-addr.arpa udp
US 8.8.8.8:53 95.221.229.192.in-addr.arpa udp
US 8.8.8.8:53 36.169.217.172.in-addr.arpa udp
US 8.8.8.8:53 1.180.250.142.in-addr.arpa udp
US 8.8.8.8:53 21.151.70.163.in-addr.arpa udp
US 8.8.8.8:53 46.200.250.142.in-addr.arpa udp
US 8.8.8.8:53 120.210.67.172.in-addr.arpa udp
US 8.8.8.8:53 170.40.21.104.in-addr.arpa udp
US 8.8.8.8:53 30.179.139.118.in-addr.arpa udp
US 8.8.8.8:53 190.130.33.3.in-addr.arpa udp
US 8.8.8.8:53 0.82.87.54.in-addr.arpa udp
US 8.8.8.8:53 87.18.12.8.in-addr.arpa udp
US 8.8.8.8:53 66.43.66.172.in-addr.arpa udp
IN 3.111.253.42:80 www.blogadda.com tcp
US 8.8.8.8:53 blogs.avivadirectory.com udp
US 199.188.204.184:80 blogs.avivadirectory.com tcp
US 199.59.243.227:80 www.blog-search.info tcp
US 8.8.8.8:53 www.blogs.com udp
US 8.8.8.8:53 www.blogadr.com udp
US 104.18.41.208:80 www.blogs.com tcp
US 172.67.167.144:80 www.blogadr.com tcp
US 35.190.80.1:443 a.nel.cloudflare.com udp
US 8.8.8.8:53 www.blogdigger.com udp
US 8.8.8.8:53 www.blogsitelist.com udp
US 104.18.41.208:443 www.blogs.com tcp
US 172.67.167.144:443 www.blogadr.com tcp
US 54.204.93.233:80 www.blogsitelist.com tcp
US 104.21.73.237:80 www.blogdigger.com tcp
US 8.8.8.8:53 www.zimbio.com udp
US 104.21.73.237:443 www.blogdigger.com tcp
US 8.8.8.8:53 www.blogrankers.com udp
US 8.8.8.8:53 www.blogratedirectory.com udp
IN 3.111.253.42:443 www.blogadda.com tcp
NL 185.182.56.134:80 www.blogratedirectory.com tcp
US 8.8.8.8:53 www.india-topsites.com udp
US 209.90.91.147:80 www.blogrankers.com tcp
US 199.188.204.184:443 blogs.avivadirectory.com tcp
US 8.8.8.8:53 blogdigger.com udp
US 8.8.8.8:53 www.mybloglog.com udp
US 8.8.8.8:53 revuwire.com udp
US 76.223.84.192:80 www.mybloglog.com tcp
NL 188.116.45.164:443 revuwire.com tcp
GB 142.250.180.14:80 www.google-analytics.com tcp
US 209.90.91.147:80 www.blogrankers.com tcp
US 8.8.8.8:53 www.yahoo.com udp
GB 87.248.114.12:443 www.yahoo.com tcp
US 8.8.8.8:53 1.80.190.35.in-addr.arpa udp
US 8.8.8.8:53 42.253.111.3.in-addr.arpa udp
US 8.8.8.8:53 227.243.59.199.in-addr.arpa udp
US 8.8.8.8:53 208.41.18.104.in-addr.arpa udp
US 8.8.8.8:53 144.167.67.172.in-addr.arpa udp
US 8.8.8.8:53 184.204.188.199.in-addr.arpa udp
US 8.8.8.8:53 237.73.21.104.in-addr.arpa udp
US 8.8.8.8:53 233.93.204.54.in-addr.arpa udp
US 8.8.8.8:53 134.56.182.185.in-addr.arpa udp
US 8.8.8.8:53 192.84.223.76.in-addr.arpa udp
US 8.8.8.8:53 164.45.116.188.in-addr.arpa udp
US 8.8.8.8:53 14.180.250.142.in-addr.arpa udp
US 8.8.8.8:53 12.114.248.87.in-addr.arpa udp
US 8.8.8.8:53 g.bing.com udp
US 150.171.28.10:443 g.bing.com tcp
US 8.8.8.8:53 www.google.co.in udp
US 8.8.8.8:53 10.28.171.150.in-addr.arpa udp
N/A 224.0.0.251:5353 udp
US 8.8.8.8:53 58.55.71.13.in-addr.arpa udp
US 8.8.8.8:53 209.205.72.20.in-addr.arpa udp
US 8.8.8.8:53 googleads.g.doubleclick.net udp
GB 172.217.169.36:80 www.google.com tcp
US 8.8.8.8:53 gelgit.tk udp
US 54.204.93.233:80 www.blogsitelist.com tcp
US 8.8.8.8:53 wd.thebestlinks.com udp
FR 79.137.112.106:80 wd.thebestlinks.com tcp
FR 79.137.112.106:443 wd.thebestlinks.com tcp
US 8.8.8.8:53 www.facebook.com udp
GB 163.70.151.35:443 www.facebook.com tcp
US 8.8.8.8:53 static.xx.fbcdn.net udp
US 8.8.8.8:53 35.151.70.163.in-addr.arpa udp
US 8.8.8.8:53 106.112.137.79.in-addr.arpa udp
US 8.8.8.8:53 206.23.85.13.in-addr.arpa udp
US 8.8.8.8:53 212.20.149.52.in-addr.arpa udp
US 8.8.8.8:53 69.190.18.2.in-addr.arpa udp
US 8.8.8.8:53 ep1.adtrafficquality.google udp
US 8.8.8.8:53 www.cine-world.in udp
GB 142.250.200.34:443 ep1.adtrafficquality.google tcp
US 8.8.8.8:53 ep2.adtrafficquality.google udp
GB 216.58.213.1:443 ep2.adtrafficquality.google tcp
GB 216.58.213.1:443 ep2.adtrafficquality.google udp
US 8.8.8.8:53 1.213.58.216.in-addr.arpa udp
US 8.8.8.8:53 34.200.250.142.in-addr.arpa udp
GB 142.250.200.34:443 ep1.adtrafficquality.google udp
US 35.190.80.1:443 a.nel.cloudflare.com udp
US 8.8.8.8:53 66.209.201.84.in-addr.arpa udp
US 8.8.8.8:53 88.156.103.20.in-addr.arpa udp
US 8.8.8.8:53 13.227.111.52.in-addr.arpa udp
US 8.8.8.8:53 tse1.mm.bing.net udp
US 150.171.27.10:443 tse1.mm.bing.net tcp
US 150.171.27.10:443 tse1.mm.bing.net tcp
US 150.171.27.10:443 tse1.mm.bing.net tcp
US 150.171.27.10:443 tse1.mm.bing.net tcp
US 150.171.27.10:443 tse1.mm.bing.net tcp
US 8.8.8.8:53 88.65.42.20.in-addr.arpa udp

Files

C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad\settings.dat

MD5 36988ca14952e1848e81a959880ea217
SHA1 a0482ef725657760502c2d1a5abe0bb37aebaadb
SHA256 d7e96088b37cec1bde202ae8ec2d2f3c3aafc368b6ebd91b3e2985846facf2e6
SHA512 d04b2f5afec92eb3d9f9cdc148a3eddd1b615e0dfb270566a7969576f50881d1f8572bccb8b9fd7993724bdfe36fc7633a33381d43e0b96c4e9bbd53fc010173

\??\pipe\LOCAL\crashpad_3812_XLVPPXEPZPMVZSZQ

MD5 d41d8cd98f00b204e9800998ecf8427e
SHA1 da39a3ee5e6b4b0d3255bfef95601890afd80709
SHA256 e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855
SHA512 cf83e1357eefb8bdf1542850d66d8007d620e4050b5715dc83f4a921d36ce9ce47d0d13c5d85f2b0ff8318d2877eec2f63b931bd47417a81a538327af927da3e

C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad\settings.dat

MD5 fab8d8d865e33fe195732aa7dcb91c30
SHA1 2637e832f38acc70af3e511f5eba80fbd7461f2c
SHA256 1b034ffe38e534e2b7a21be7c1f207ff84a1d5f3893207d0b4bb1a509b4185ea
SHA512 39a3d43ef7e28fea2cb247a5d09576a4904a43680db8c32139f22a03d80f6ede98708a2452f3f82232b868501340f79c0b3f810f597bcaf5267c3ccfb1704b43

C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\d090f51b-58ed-4230-89c5-e57d180d7b87.tmp

MD5 95ca2d12b3a3b91ec673f7e92a9db9ce
SHA1 91ad574db0861bc23396cc1797b96c3502000de4
SHA256 55590c56cda13dae2f19c9435f5bbcd72edea325d8f8629e9eb9294fc33b0af2
SHA512 590d0053b2183520c94a14491d936be48adc07dbf6e027491868a6bc488e03545b439e22b6db5ce1d3a043f91141e81bcb9b43dde411eca9c0c4c58a38e559bd

C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Local State

MD5 c562f72fb540dbc830d9a2da25b1faa5
SHA1 2e46bac842c6469983edaa013c898a64a2a8c446
SHA256 148a7998c42c31cd22db7e30639973de62d4ca50b67534bd726e68ce97617744
SHA512 781f304e328757492b8d4668b35db8cdc1a824e9c561bb16a530d47b8ccc549a4a30a763db72eadfc967dbe45e440cc24964df79ac63a10e12cf7f21a5cc01e7

C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Preferences

MD5 5afb88df6cbd0e89e8c9cf8aff79a561
SHA1 795d77b4bc72712eb08d47ed2e94aea0c9d0ade3
SHA256 5ebf7a2431238ca406aa6e7529a083eadeb183205dd44b4e468ebe464e1f55f8
SHA512 23eff3d5a5be7f44264567b515cbf9298e95a109cd8341b96d8b54f192f66b8ff2738924c201f9b68f2f9a635b881ed74a2f009b2537e7ca235501e44278ffe6

C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\TransportSecurity

MD5 b5fc5a435c38ae9eeb457b26d66bd234
SHA1 cf11158d6acc8d14b88769add1e264f403aec6ef
SHA256 6a252a658691db5515249c1ad98006c991caf53933e9c9f12c9cc1e4bb3525ad
SHA512 53db90af1c05712b3d17964e8d4bbec7d7c3dbfd12d8984bf3c9f8b3d412e738e2db7968017be4273a8f124d0034a1af9d880431a1a7480d1e7299577a15ced1

C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\TransportSecurity~RFe581018.TMP

MD5 ee0189615b9883792910af216ab51424
SHA1 6053d2aee2b3f719358055ac44f945f468f09ba6
SHA256 fc3b88e3316218a15be2671fab4efe832d353c6a33494c9740d2f4be5e426674
SHA512 c95e3353d2e3c298c964b6369188b42a95f2fcbeea46642d284d897494554e0532ab54d7a079c0175b0d6e79d257a8863ac30a85f9b780fcef973e40cb0deac5

C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\data_reduction_proxy_leveldb\CURRENT

MD5 46295cac801e5d4857d09837238a6394
SHA1 44e0fa1b517dbf802b18faf0785eeea6ac51594b
SHA256 0f1bad70c7bd1e0a69562853ec529355462fcd0423263a3d39d6d0d70b780443
SHA512 8969402593f927350e2ceb4b5bc2a277f3754697c1961e3d6237da322257fbab42909e1a742e22223447f3a4805f8d8ef525432a7c3515a549e984d3eff72b23

C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\data_reduction_proxy_leveldb\CURRENT

MD5 206702161f94c5cd39fadd03f4014d98
SHA1 bd8bfc144fb5326d21bd1531523d9fb50e1b600a
SHA256 1005a525006f148c86efcbfb36c6eac091b311532448010f70f7de9a68007167
SHA512 0af09f26941b11991c750d1a2b525c39a8970900e98cba96fd1b55dbf93fee79e18b8aab258f48b4f7bda40d059629bc7770d84371235cdb1352a4f17f80e145

C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index

MD5 cb47a91491706701f73b7f8df4972cfb
SHA1 23644021501bcf019d25d362b9e8fce78b0043b9
SHA256 389fbe9015e11d1a637b045adc2aadf2ef2ecc7003f387173c6ee2d9ecaebfac
SHA512 fca05b1fa0072b9bdb9622e86cf3d27770d127f1788ac17f4f26dd3e380a1ce69c7a6ef3d92e4d5bbc1c6b7462dc23822785c561fac031a07d2c372bf3aadfcb

C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Network Persistent State

MD5 8d341e6f739f5173a05561c0a71d610f
SHA1 2fc929433dc0a95ee2e980a525f12730e634fbfb
SHA256 921f0755d9899aa78e0b43df6578a1193a32b30f2e65a4d8a1bade689ed96974
SHA512 519e2f1fc3c952b592a32856b8c87d0c5ccf9e9bb15c62fb06ffbcc3ad9955a914374cc8cb0aabde95fa115cb9efddc2d9a2da062064e126dbbaf388d5db75e1

C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Network Persistent State

MD5 517f015a82c839943ed61e7f90547fda
SHA1 9a33bf820ebb499a8f4428a2c910fe57be02e8ce
SHA256 4a6133db8a286b6ce837a266fe09f725261f34e2952c258384602ea7bcb4283c
SHA512 b32117b3a6b8c0b01f0d60a612480c2b040efdb1d65310e6f161576a7424688854677dafb532361b9e237d1db156bc6bfbed52fd49183e618a821c9d4653febb

Analysis: behavioral1

Detonation Overview

Submitted

2024-10-30 05:54

Reported

2024-10-30 05:56

Platform

win7-20241023-en

Max time kernel

145s

Max time network

150s

Command Line

"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\7e1bda025440047feb687204a9534385_JaffaCakes118.html

Signatures

SocGholish

downloader socgholish

Socgholish family

socgholish

System Location Discovery: System Language Discovery

discovery
Description Indicator Process Target
Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE N/A

Modifies Internet Explorer settings

adware spyware
Description Indicator Process Target
Key created \REGISTRY\USER\S-1-5-21-1163522206-1469769407-485553996-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing C:\Program Files\Internet Explorer\iexplore.exe N/A
Key created \REGISTRY\USER\S-1-5-21-1163522206-1469769407-485553996-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic C:\Program Files\Internet Explorer\iexplore.exe N/A
Key created \REGISTRY\USER\S-1-5-21-1163522206-1469769407-485553996-1000\Software\Microsoft\Internet Explorer\IntelliForms C:\Program Files\Internet Explorer\iexplore.exe N/A
Set value (int) \REGISTRY\USER\S-1-5-21-1163522206-1469769407-485553996-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{5D656901-9683-11EF-B387-F234DE72CD42} = "0" C:\Program Files\Internet Explorer\iexplore.exe N/A
Key created \REGISTRY\USER\S-1-5-21-1163522206-1469769407-485553996-1000\Software\Microsoft\Internet Explorer\Main C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE N/A
Set value (int) \REGISTRY\USER\S-1-5-21-1163522206-1469769407-485553996-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "436429510" C:\Program Files\Internet Explorer\iexplore.exe N/A
Key created \REGISTRY\USER\S-1-5-21-1163522206-1469769407-485553996-1000\Software\Microsoft\Internet Explorer\Main C:\Program Files\Internet Explorer\iexplore.exe N/A
Key created \REGISTRY\USER\S-1-5-21-1163522206-1469769407-485553996-1000\Software\Microsoft\Internet Explorer\LowRegistry C:\Program Files\Internet Explorer\iexplore.exe N/A
Set value (str) \REGISTRY\USER\S-1-5-21-1163522206-1469769407-485553996-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" C:\Program Files\Internet Explorer\iexplore.exe N/A
Key created \REGISTRY\USER\S-1-5-21-1163522206-1469769407-485553996-1000\Software\Microsoft\Internet Explorer\Zoom C:\Program Files\Internet Explorer\iexplore.exe N/A
Key created \REGISTRY\USER\S-1-5-21-1163522206-1469769407-485553996-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive C:\Program Files\Internet Explorer\iexplore.exe N/A
Set value (int) \REGISTRY\USER\S-1-5-21-1163522206-1469769407-485553996-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" C:\Program Files\Internet Explorer\iexplore.exe N/A
Set value (int) \REGISTRY\USER\S-1-5-21-1163522206-1469769407-485553996-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" C:\Program Files\Internet Explorer\iexplore.exe N/A
Key created \REGISTRY\USER\S-1-5-21-1163522206-1469769407-485553996-1000\Software\Microsoft\Internet Explorer\DomainSuggestion C:\Program Files\Internet Explorer\iexplore.exe N/A
Key created \REGISTRY\USER\S-1-5-21-1163522206-1469769407-485553996-1000\Software\Microsoft\Internet Explorer\GPU C:\Program Files\Internet Explorer\iexplore.exe N/A
Key created \REGISTRY\USER\S-1-5-21-1163522206-1469769407-485553996-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery C:\Program Files\Internet Explorer\iexplore.exe N/A
Set value (int) \REGISTRY\USER\S-1-5-21-1163522206-1469769407-485553996-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" C:\Program Files\Internet Explorer\iexplore.exe N/A
Set value (int) \REGISTRY\USER\S-1-5-21-1163522206-1469769407-485553996-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" C:\Program Files\Internet Explorer\iexplore.exe N/A
Set value (data) \REGISTRY\USER\S-1-5-21-1163522206-1469769407-485553996-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 C:\Program Files\Internet Explorer\iexplore.exe N/A
Key created \REGISTRY\USER\S-1-5-21-1163522206-1469769407-485553996-1000\Software\Microsoft\Internet Explorer\PageSetup C:\Program Files\Internet Explorer\iexplore.exe N/A
Key created \REGISTRY\USER\S-1-5-21-1163522206-1469769407-485553996-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser C:\Program Files\Internet Explorer\iexplore.exe N/A
Set value (data) \REGISTRY\USER\S-1-5-21-1163522206-1469769407-485553996-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 C:\Program Files\Internet Explorer\iexplore.exe N/A
Key created \REGISTRY\USER\S-1-5-21-1163522206-1469769407-485553996-1000\Software\Microsoft\Internet Explorer\SearchScopes C:\Program Files\Internet Explorer\iexplore.exe N/A
Key created \REGISTRY\USER\S-1-5-21-1163522206-1469769407-485553996-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain C:\Program Files\Internet Explorer\iexplore.exe N/A
Key created \REGISTRY\USER\S-1-5-21-1163522206-1469769407-485553996-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch C:\Program Files\Internet Explorer\iexplore.exe N/A
Set value (int) \REGISTRY\USER\S-1-5-21-1163522206-1469769407-485553996-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" C:\Program Files\Internet Explorer\iexplore.exe N/A
Key created \REGISTRY\USER\S-1-5-21-1163522206-1469769407-485553996-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage C:\Program Files\Internet Explorer\iexplore.exe N/A
Key created \REGISTRY\USER\S-1-5-21-1163522206-1469769407-485553996-1000\Software\Microsoft\Internet Explorer\IETld\LowMic C:\Program Files\Internet Explorer\iexplore.exe N/A
Set value (str) \REGISTRY\USER\S-1-5-21-1163522206-1469769407-485553996-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" C:\Program Files\Internet Explorer\iexplore.exe N/A
Key created \REGISTRY\USER\S-1-5-21-1163522206-1469769407-485553996-1000\Software\Microsoft\Internet Explorer\Toolbar C:\Program Files\Internet Explorer\iexplore.exe N/A
Set value (data) \REGISTRY\USER\S-1-5-21-1163522206-1469769407-485553996-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000a907cc1344750743988d8bab481dbfbf000000000200000000001066000000010000200000006884c18eb1142b81674aab0ac9f2fe6a59e80cfebc686894c95c7dbfba9f74e4000000000e8000000002000020000000b4c5d92ac072852b992e39af207ce2960feec7991b8d654e58def8342b10531a200000008297e63eba22596143b0da7c402d7c7ecb0e8f6045637495bf4e68d717cebc4c400000002b49f1e7c79eb544bf11ad8623be183bf4b234564a52f390b6b3d2ff154c89f6469cfab1d95aae14a8850cdfd60f1fba0f0ede630559f9e9bcac13e4c2bba739 C:\Program Files\Internet Explorer\iexplore.exe N/A
Set value (data) \REGISTRY\USER\S-1-5-21-1163522206-1469769407-485553996-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 00a2a14c902adb01 C:\Program Files\Internet Explorer\iexplore.exe N/A
Key created \REGISTRY\USER\S-1-5-21-1163522206-1469769407-485553996-1000\Software\Microsoft\Internet Explorer\InternetRegistry C:\Program Files\Internet Explorer\iexplore.exe N/A
Key created \REGISTRY\USER\S-1-5-21-1163522206-1469769407-485553996-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage C:\Program Files\Internet Explorer\iexplore.exe N/A

Suspicious use of FindShellTrayWindow

Description Indicator Process Target
N/A N/A C:\Program Files\Internet Explorer\iexplore.exe N/A

Processes

C:\Program Files\Internet Explorer\iexplore.exe

"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\7e1bda025440047feb687204a9534385_JaffaCakes118.html

C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE

"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2116 CREDAT:275457 /prefetch:2

Network

Country Destination Domain Proto
US 8.8.8.8:53 www.cine-world.in udp
US 8.8.8.8:53 4.bp.blogspot.com udp
US 8.8.8.8:53 1.bp.blogspot.com udp
US 8.8.8.8:53 2.bp.blogspot.com udp
US 8.8.8.8:53 3.bp.blogspot.com udp
US 8.8.8.8:53 www.linkwithin.com udp
US 8.8.8.8:53 feeds.feedburner.com udp
US 8.8.8.8:53 www.google.com udp
US 8.8.8.8:53 connect.facebook.net udp
US 8.8.8.8:53 www.blogtoplist.com udp
US 8.8.8.8:53 www.blogtopsites.com udp
US 8.8.8.8:53 www.topblogarea.com udp
US 8.8.8.8:53 www.blogrankings.com udp
US 8.8.8.8:53 www.blogflare.com udp
US 8.8.8.8:53 www.ontoplist.com udp
US 8.8.8.8:53 www.bloggapedia.com udp
US 8.8.8.8:53 www.topblogging.com udp
US 8.8.8.8:53 www.photoblogdirectory.net udp
US 8.8.8.8:53 www.blogarama.com udp
US 8.8.8.8:53 www.blog-search.info udp
US 8.8.8.8:53 blogs.avivadirectory.com udp
US 8.8.8.8:53 www.blogs.com udp
US 8.8.8.8:53 www.blogadr.com udp
US 8.8.8.8:53 www.blogdigger.com udp
US 8.8.8.8:53 www.blogsitelist.com udp
US 8.8.8.8:53 www.zimbio.com udp
US 8.8.8.8:53 www.blogrankers.com udp
US 8.8.8.8:53 www.blogratedirectory.com udp
US 8.8.8.8:53 www.india-topsites.com udp
US 8.8.8.8:53 www.mybloglog.com udp
US 8.8.8.8:53 www.blogadda.com udp
GB 142.250.180.1:80 3.bp.blogspot.com tcp
GB 142.250.180.1:80 3.bp.blogspot.com tcp
GB 142.250.180.1:80 3.bp.blogspot.com tcp
GB 142.250.180.1:80 3.bp.blogspot.com tcp
GB 142.250.180.1:80 3.bp.blogspot.com tcp
GB 172.217.169.36:80 www.google.com tcp
GB 172.217.169.36:80 www.google.com tcp
GB 142.250.180.1:80 3.bp.blogspot.com tcp
GB 142.250.180.1:80 3.bp.blogspot.com tcp
SG 118.139.179.30:80 www.linkwithin.com tcp
SG 118.139.179.30:80 www.linkwithin.com tcp
US 3.220.195.79:80 www.blogtopsites.com tcp
US 3.220.195.79:80 www.blogtopsites.com tcp
GB 142.250.200.46:80 feeds.feedburner.com tcp
GB 142.250.200.46:80 feeds.feedburner.com tcp
US 172.67.210.120:80 www.topblogging.com tcp
US 172.67.210.120:80 www.topblogging.com tcp
US 104.21.40.170:80 www.bloggapedia.com tcp
GB 142.250.180.1:80 3.bp.blogspot.com tcp
US 199.188.204.184:80 blogs.avivadirectory.com tcp
US 104.21.40.170:80 www.bloggapedia.com tcp
GB 142.250.180.1:80 3.bp.blogspot.com tcp
US 199.188.204.184:80 blogs.avivadirectory.com tcp
US 172.66.40.190:80 www.blogarama.com tcp
GB 142.250.180.1:80 3.bp.blogspot.com tcp
US 172.66.40.190:80 www.blogarama.com tcp
GB 172.217.16.226:80 pagead2.googlesyndication.com tcp
GB 172.217.16.226:80 pagead2.googlesyndication.com tcp
IN 3.111.253.42:80 www.blogadda.com tcp
IN 3.111.253.42:80 www.blogadda.com tcp
US 172.67.193.92:80 www.blogdigger.com tcp
US 172.67.193.92:80 www.blogdigger.com tcp
US 172.64.146.48:80 www.blogs.com tcp
US 172.64.146.48:80 www.blogs.com tcp
US 3.33.130.190:80 www.photoblogdirectory.net tcp
US 3.33.130.190:80 www.photoblogdirectory.net tcp
GB 163.70.151.21:80 connect.facebook.net tcp
GB 163.70.151.21:80 connect.facebook.net tcp
US 172.67.167.144:80 www.blogadr.com tcp
US 172.67.167.144:80 www.blogadr.com tcp
US 8.12.18.87:80 www.ontoplist.com tcp
US 8.12.18.87:80 www.ontoplist.com tcp
US 199.59.243.227:80 www.blog-search.info tcp
US 199.59.243.227:80 www.blog-search.info tcp
US 13.248.158.7:80 www.mybloglog.com tcp
NL 185.182.56.134:80 www.blogratedirectory.com tcp
NL 185.182.56.134:80 www.blogratedirectory.com tcp
US 13.248.158.7:80 www.mybloglog.com tcp
GB 142.250.180.14:80 www.google-analytics.com tcp
GB 142.250.180.14:80 www.google-analytics.com tcp
US 3.220.3.111:80 www.blogsitelist.com tcp
US 3.220.3.111:80 www.blogsitelist.com tcp
GB 163.70.151.21:443 connect.facebook.net tcp
US 172.66.40.190:443 www.blogarama.com tcp
US 8.8.8.8:53 revuwire.com udp
US 172.64.146.48:443 www.blogs.com tcp
US 8.8.8.8:53 bloggapedia.com udp
US 172.67.193.92:443 www.blogdigger.com tcp
US 172.67.155.21:443 bloggapedia.com tcp
US 172.67.155.21:443 bloggapedia.com tcp
US 209.90.91.147:80 www.blogrankers.com tcp
US 209.90.91.147:80 www.blogrankers.com tcp
US 8.8.8.8:53 www.yahoo.com udp
NL 188.116.45.164:443 revuwire.com tcp
NL 188.116.45.164:443 revuwire.com tcp
US 8.12.18.87:443 www.ontoplist.com tcp
GB 87.248.114.11:443 www.yahoo.com tcp
GB 87.248.114.11:443 www.yahoo.com tcp
IN 3.111.253.42:443 www.blogadda.com tcp
US 199.188.204.184:443 blogs.avivadirectory.com tcp
US 172.67.167.144:443 www.blogadr.com tcp
US 8.8.8.8:53 c.pki.goog udp
US 8.8.8.8:53 c.pki.goog udp
US 8.8.8.8:53 c.pki.goog udp
US 8.8.8.8:53 c.pki.goog udp
US 8.8.8.8:53 c.pki.goog udp
GB 216.58.204.67:80 c.pki.goog tcp
GB 216.58.204.67:80 c.pki.goog tcp
IN 3.111.253.42:443 www.blogadda.com tcp
US 8.8.8.8:53 e5.o.lencr.org udp
US 8.8.8.8:53 e5.o.lencr.org udp
US 8.8.8.8:53 r10.o.lencr.org udp
GB 2.18.190.73:80 r10.o.lencr.org tcp
GB 2.18.190.73:80 r10.o.lencr.org tcp
GB 2.18.190.73:80 r10.o.lencr.org tcp
US 8.8.8.8:53 o.pki.goog udp
GB 142.250.180.3:80 o.pki.goog tcp
US 8.8.8.8:53 blogdigger.com udp
IN 3.111.253.42:443 www.blogadda.com tcp
US 104.21.73.237:443 blogdigger.com tcp
US 104.21.73.237:443 blogdigger.com tcp
IN 3.111.253.42:443 www.blogadda.com tcp
US 8.8.8.8:53 gelgit.tk udp
US 8.8.8.8:53 wd.thebestlinks.com udp
FR 79.137.112.106:80 wd.thebestlinks.com tcp
FR 79.137.112.106:80 wd.thebestlinks.com tcp
FR 79.137.112.106:443 wd.thebestlinks.com tcp
FR 79.137.112.106:443 wd.thebestlinks.com tcp
FR 79.137.112.106:443 wd.thebestlinks.com tcp
FR 79.137.112.106:443 wd.thebestlinks.com tcp
US 8.8.8.8:53 www.facebook.com udp
GB 163.70.151.35:443 www.facebook.com tcp
GB 163.70.151.35:443 www.facebook.com tcp
US 8.8.8.8:53 www.zimbio.com udp
US 8.8.8.8:53 m.facebook.com udp
GB 163.70.151.35:443 m.facebook.com tcp
GB 163.70.151.35:443 m.facebook.com tcp
US 8.8.8.8:53 static.xx.fbcdn.net udp
US 8.8.8.8:53 facebook.com udp
GB 163.70.151.21:443 static.xx.fbcdn.net tcp
GB 163.70.151.21:443 static.xx.fbcdn.net tcp
GB 163.70.151.21:443 static.xx.fbcdn.net tcp
GB 163.70.151.21:443 static.xx.fbcdn.net tcp
GB 163.70.151.21:443 static.xx.fbcdn.net tcp
GB 163.70.151.35:443 facebook.com tcp
GB 163.70.151.35:443 facebook.com tcp
US 8.8.8.8:53 www.blogrankings.com udp
US 8.8.8.8:53 www.blogtoplist.com udp
US 209.90.91.147:80 www.blogrankers.com tcp
US 204.79.197.200:443 ieonline.microsoft.com tcp
US 204.79.197.200:443 ieonline.microsoft.com tcp
US 204.79.197.200:443 ieonline.microsoft.com tcp

Files

C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\L6J4GCMD\f[1].txt

MD5 11cbf7ab83f8525401d1e8570dc6a0e1
SHA1 e33ad5135ca52f4d4562eebe12d35e3cc38dd2ee
SHA256 07d1653840168b58c69abc888a1c655c61e945026f411bf7573fe8781da95ba8
SHA512 afa233867caad11a64f2fd37463b5e3bfeb50cd0a80197f8aa78d953b3e9a9d0c1f7eabe9862267ac2660abfbd7f68d1d7cb3f95de6028bda3e48b8b538dcc35

C:\Users\Admin\AppData\Local\Temp\CabB8E5.tmp

MD5 49aebf8cbd62d92ac215b2923fb1b9f5
SHA1 1723be06719828dda65ad804298d0431f6aff976
SHA256 b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512 bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b

C:\Users\Admin\AppData\Local\Temp\TarB8F8.tmp

MD5 4ea6026cf93ec6338144661bf1202cd1
SHA1 a1dec9044f750ad887935a01430bf49322fbdcb7
SHA256 8efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA512 6c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b

C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\8B2B9A00839EED1DFDCCC3BFC2F5DF12

MD5 7d092456c6ccc9fe1194cd85613779a7
SHA1 92c2af0c013bd741dc030e937ed6e13b6ebed9d6
SHA256 265f885ad09f3769d53d14465bf074dfc6194ae2cbe8f1c080395700854f071e
SHA512 5d1248e56540dbabe57170b4c7b917a189b0a8ca7ac5ebe78eba8d950bd8d5b11e30d1f7403bbd41f3c28b641f80ae41cb05deb32c107e90ec05d63768b1a5ae

C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\8B2B9A00839EED1DFDCCC3BFC2F5DF12

MD5 67e486b2f148a3fca863728242b6273e
SHA1 452a84c183d7ea5b7c015b597e94af8eef66d44a
SHA256 facaf1c3a4bf232abce19a2d534e495b0d3adc7dbe3797d336249aa6f70adcfb
SHA512 d3a37da3bb10a9736dc03e8b2b49baceef5d73c026e2077b8ebc1b786f2c9b2f807e0aa13a5866cf3b3cafd2bc506242ef139c423eaffb050bbb87773e53881e

C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

MD5 04178d2b1ecd526b5ce76430be88d4b4
SHA1 7a3ecfd9b18df1376e29d63ac4c0de62a21c3f7f
SHA256 15e28cd7ef1d263e43fba54aba4d89b8d88a2230b44bacb68a67cafb95128c11
SHA512 a5baf3b9c9b66bf0d7a89484121be5fd10b7215abbf13031315a89aa070266de0aa5eeb9729470b8e518e7d630c21c43fd00ad46197411624065ff20b997fa0c

C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

MD5 e6ae3e16e8702c2b8ac13981a7c6df38
SHA1 c0a3a9e005f3c2ef2aaee196a0862153a0cb7c70
SHA256 7b8677981320e4666ddbec195e6b9cc90cb2c8147820fbd710a140d1f16e47a5
SHA512 d1560ba8c8a95c73535241371dc98f853603ffd3320c7aad11aa8555ad2a84040b5e4a10ba8704dea134f5bdc2851e672889811ac28596cfb1cbf745d53a2c72

C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\B46811C17859FFB409CF0E904A4AA8F8

MD5 44440d7d95e1c9a76e0df4375c584339
SHA1 242e55b88527cfd1a80a88d378082e6529068477
SHA256 58cd65a166cd3b87b3f063c4437b5e320ea590c41ad3d9e9c8760b6df3bf6ba0
SHA512 916e704d7d2b3cf4f9ead20e816bec1c17843629e61f6016a3d90668c415ff6d41352eb312f4c10d68ed8173135b6060a40eb7f07aea573fa2d29d67273e7dbf

C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\B46811C17859FFB409CF0E904A4AA8F8

MD5 971c514f84bba0785f80aa1c23edfd79
SHA1 732acea710a87530c6b08ecdf32a110d254a54c8
SHA256 f157ed17fcaf8837fa82f8b69973848c9b10a02636848f995698212a08f31895
SHA512 43dc1425d80e170c645a3e3bb56da8c3acd31bd637329e9e37094ac346ac85434df4edcdbefc05ae00aea33a80a88e2af695997a495611217fe6706075a63c58

C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\EDC238BFF48A31D55A97E1E93892934B_C20E0DA2D0F89FE526E1490F4A2EE5AB

MD5 038d9a05e1bce731489e590b5b12ff44
SHA1 f8890e59ad71718b2f919f05f8a723305b1cd247
SHA256 43e81a6b31c97c8d9a2b80f84adb58b9b9d6f8a4b55f5800a6036f627bee7f24
SHA512 b069d0da1f06f3cd06606ae4183305fe503c972598b72a79bf6f7fa54b58df6cfa230f8398728b69468c163d57a9fccc2123c8c90fcdb93b92d19706287c16c8

C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

MD5 d831d56705e4658e9f69f5286b90f6a6
SHA1 bd990e4f0b2484aa47c799fe00e7a5db45e105ed
SHA256 e0e4791ab80e64179ff7829215e2bddf58c73ff30e1d3f1862bb9f76f9e96dd8
SHA512 6b275f86d4399379acf7f05c41d77f2b828a08ab02b36bdfdaff6305c2622d2c0f91fd9c90461cab5b01782dda22cad1ddcbc6cd60c338781aa3cd1407d08885

C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

MD5 07d1a3e0562e230178414fe15a55f220
SHA1 70c028dc83c02ba52e9821ad44e92414fa587926
SHA256 428c82424e8c3f0fb89af751280c200e68f8cc5b151ae27607cf0930ca2d6ac9
SHA512 72e8b9847bb6430deceb0a4c17ef801970c559a2d7ebad80a28ee9e0e594d1eee5d46ede2df2a5ef4a10d64d2b478459362ea31d0e761455cf1f07ea0ab8597d

C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

MD5 4b6009fa8a03fdcda807496641fec548
SHA1 bad6fe3c7092f046c68b41b0ffb248fe886fe184
SHA256 e0f5976c94636c06d741397e8d2a1434753d9ac7f6d7b0c4a650725a2eaea21a
SHA512 822a67c91125065b10c61e789f7039bd22e64457097b7b4735947bd5fb79eabdc51fa5f0afc44aed18857d2462d9c5d32cdc355e83ce5968972595b5ad30b2f5

C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

MD5 b67526e4664f72d1f2c66459bc9d8b41
SHA1 1d4848881c0ba48d5316fb015af4fe25aec52049
SHA256 52cb6e9956029da1a18484970abeecdf1f33f1adcef8308d72aaa56e002e2d11
SHA512 fd608483e3cb38ac77740ae6d3e87c4b72d4b97534f9eb6f072bd70c600ee1a096bf0ecaf1b7f13be2fd1638838b4f85e79c9154c9fa6697cd71d0b22a2ad097

C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

MD5 099a28c1950e1a5509d7b2d89cf3b27f
SHA1 51f3eabbb602bea23b0b09120552d04fca4998be
SHA256 e0a9274cd3558c285e537320bc7f054c43ab1775dd7c31c16fbe6465cc55c040
SHA512 b6560c87fa485b1fa046c069453c2fe3423a6f304a7df100f46f9ff885f5a517e365fe8467db053915a28939c3416382729f35acdcfb79d140a1cb35eda274a6

C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

MD5 cfaad019d0b549c4356438d4624d599d
SHA1 d6e0522c7741f5ca6cf5167aee7fa9f4d02c27fd
SHA256 62eae698d93d999bb1b19a5a584608be4ba6a3bb9859cf2c783957755c359228
SHA512 442f639cd7f2400ec830f22b00dd325ea2c6abb4852b66f14ffe9b8a180ba57852ebb918c45dcdaf7d332c671b6a2bccf83309f8bb4411d7297de42a7d90c88b

C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

MD5 1c7aa77fbf7ab017a58521df027f7fcb
SHA1 25daae4a369f508b1df2db837fec888d90892b96
SHA256 97c63869741af45e6233015123576c66450c49bc78eec4a77a6467aa5ab358d4
SHA512 2848084e969003907e85d26152ab5225e73b489243b84f091bd8750f7fd0bc7c3b052f8a7fa9cbe4268d091f2f7b6db122b62fb0af3338f47147065414aa2cf6

C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

MD5 af7601b19c0e6f1494cc65c1ce6adccd
SHA1 f1fbff78acc0a7881c99799163a48141785d7552
SHA256 49f350c2d7d1205a419840517bbef5adcaf41ca471a8b4c034710d33ff7599ed
SHA512 0ede851a4c83c64c4b13bb917b9ee48989e217c7f2b9804884e90e312ec2f9660f62d8a0083a546f4ef2a517fc85e5b9c26b938bece5ecb7ae02fc616f1c28bf

C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

MD5 c13cabc8029de28608f511ee3b7e638d
SHA1 d3c1209a42f7ddea50fd1a3e2909d8d4112bedbc
SHA256 64be4788084b6e95f371da55b17d8f860b66a8e80035b9f3d9e5cbb5c36eed4a
SHA512 42d926190ce256c1f7ce2037959fd71529dc7104e488ad78f7def647c060aca3baf61a10ba0d673c4f9b90df5bd961d010fbed48cc0a95b31e1ec8973a4b5e5d

C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

MD5 390b7b0eb5c53a20cd05f26c2c2eb7f2
SHA1 0bfd7eaea28f3574ad8f9e2eab3bacf5084f6b4e
SHA256 d58720865fa71c0dea2a5f8f20a91437b04f420d9c5cab9d3258ea476c0881c4
SHA512 2b3821b77874aa47b4170ca348b8d1fde070a3016faed6f64b06ca8c18ba4740662110c2d2d4a6e70d1823194b4c881569edc4522c49ed91a0a8a696ec24106b

C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

MD5 24b6a468beb14f00d26dfc8db26b2128
SHA1 df01786395ed2c4797c871ecf9b51e9fb4dcb138
SHA256 2fea10fdd1c47701b6696ff08c00d54c4b780bc483d802eb615e251c52c875c7
SHA512 ea6a62330217ff37cdef77f088375e75b4f9bc97c2b440c92fe34d5fd0d7a58b3541c6e2f4241e1079c02756615d1f6cd44b6e19cf1fc524d09d1cef97abd9f7

C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

MD5 d68d05f013c789a39b799c7fdd6eb922
SHA1 53833c219812a4817fa28a63303c3aa3c90aa76d
SHA256 e962c8dd54140084c2b1414d9efbfbe1e6ecdfe2aa8155bb35a37d6cffaa8807
SHA512 86ace76dcaf8670d78f42ba797ea38037f57fb92b8e29a341cad7006d210be7bc48836eb5af4253e27ad139e14f4ae83602dc529a9b01876e59e6bc06cade3e4

C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

MD5 9bd178d1bcc58794bad1fe74225c1d03
SHA1 eb6f5d6a2d1c9a752badd385ab3f92261c7bf8ef
SHA256 99f67a2ca7dbbef14c92eacc101b9202b296571d2844efb674a02ce760463e7a
SHA512 bd479aadb9b351b78b408846e0e4d3f7c6a6d9eafd3fbfddea7d4bb604165c5be77ce5c65d4bd6d630a43be07a240b851226728b92eaef64aa578f9edffca8cb

C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

MD5 beb79ddb12fbfe328399fcdd9a8e6d95
SHA1 9157450a98094236f6e3e5a7cd8b459d0ed6282f
SHA256 66bafa31522f9583adbfd8f6f37814d18c2deba45c0f104b0536c2d2d4bcf562
SHA512 00951b337f96a9998d09a386b03f185de63bea0d38f34aec4e9f92d9137b3f9d839c5e7a35135407a1b60ce5d232bead8bbc23e3cf7a7a234daacdaf7681719d

C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

MD5 33736f28f684b8ad0db576648627302f
SHA1 7a323e061fd42510ee5cda11f18e152a043b4baf
SHA256 d2ed776519a3a145421e12a4e33ba9f437925eff36023650e38a7f86ef18ce37
SHA512 0235210af8af79d05e799b79500eabcaa31ddbab9555b4a3d431e95e0ed2e9ea74998d244d1815a98eaf9815066f19af149bb54795d95df1fe5e2f78a22eb0a6

C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

MD5 ac84343e52915aef4d792b51f0c6a355
SHA1 43acc2b60bf2ed10583c8d8a74417c553e2fe645
SHA256 45799c906b8fd370f9ef50d804a2c203d208dcf8883e84eec5eace6463484a16
SHA512 7f40093d982b610393f89f32035a2b1e467c8d82517cc0ac8af3995c607a44a4fe4b035af42f125743365b05956770e5590f53d4d5bd2a279466281617ad421a

C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

MD5 bee26ad49182d7c1d615e2b38ecc1943
SHA1 039515433ffabe3638b50240edf307735bff41bc
SHA256 6b648c6d1813fcb1009aad3d3265e8e2e0f9bcd07d28d9f0ae821d3038bdfff3
SHA512 15cb9df7a3949a15dc571e610351afa7f1c88d0a12fc0db0b2f6cb68af66d5af9121949505b361ea60212ef91871d46fec9f0325fa9e88d5b137f329eb2a4b77

C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

MD5 67e4c03e6d93e6271afe3f2b6de6bd35
SHA1 e4b0a2238b13714dc406fb8bcad1c0071f449ccd
SHA256 3aa01d63bdca5fc26b27aaa291ed8ba14506333571bb3eec7a983875bf2057e6
SHA512 a2e1ad2ef0a341480bb3316123408effa8889812f4dafa33a88a4226cfbcd8a9f0a839325fba5be4c869ff3b32806b0954eb915fb3872c929296e9759461ed90

C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

MD5 7c33820cc96e040a86b79465cb630f8e
SHA1 c8f5263d5f67c9d81b84a4e0f246f2ec991b390c
SHA256 87903a36be4cfd0ce9b41ff7afdeced7afb96eec655a5edbf332fc92f5c8f0d4
SHA512 d412749a7d3a686a9f9acffc80e08f7b8314341dca16a5fc21c843e96836f5e0f5b94527468e2a27b20e5d8544b61257ad73250a8efab68c95eebf12f4c3854b

C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

MD5 bb4ae16c58cf159e8c7b2ec1b1f4a57c
SHA1 5c38087974573488a2c2680e58f48580661b49bd
SHA256 656435c76c97b8d09a5120fc41d9d235ea3b8fcba1ef052eceece7275850b310
SHA512 b47f104c5d2c63981909799a7089ce70b4d9a3ba40e5c6126beb74c4b46528617cb2b5871e3df3c2710e182756b93af17c57b9cb30023d3f229257a4386539a2