Malware Analysis Report

2024-12-06 03:17

Sample ID 241030-ha6bqazjfk
Target 7e35a7a1fd8f43c53a4c7e0e62432a8f_JaffaCakes118
SHA256 e16d52b06e547af2ea095c3a1b19f24dbc20b004b07152379b664938a91b7477
Tags
discovery socgholish downloader
score
10/10

Table of Contents

Analysis Overview

MITRE ATT&CK

Enterprise Matrix V15

Analysis: static1

Detonation Overview

Signatures

Analysis: behavioral2

Detonation Overview

Command Line

Signatures

Processes

Network

Files

Analysis: behavioral1

Detonation Overview

Command Line

Signatures

Processes

Network

Files

Analysis Overview

score
10/10

SHA256

e16d52b06e547af2ea095c3a1b19f24dbc20b004b07152379b664938a91b7477

Threat Level: Known bad

The file 7e35a7a1fd8f43c53a4c7e0e62432a8f_JaffaCakes118 was found to be: Known bad.

Malicious Activity Summary

discovery socgholish downloader

SocGholish

Socgholish family

System Location Discovery: System Language Discovery

Browser Information Discovery

Enumerates system info in registry

Suspicious behavior: EnumeratesProcesses

Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary

Suspicious use of FindShellTrayWindow

Suspicious use of SendNotifyMessage

Suspicious use of WriteProcessMemory

Modifies Internet Explorer settings

Suspicious use of SetWindowsHookEx

MITRE ATT&CK

Analysis: static1

Detonation Overview

Reported

2024-10-30 06:33

Signatures

N/A

Analysis: behavioral2

Detonation Overview

Submitted

2024-10-30 06:33

Reported

2024-10-30 06:35

Platform

win10v2004-20241007-en

Max time kernel

147s

Max time network

147s

Command Line

"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --start-maximized --single-argument C:\Users\Admin\AppData\Local\Temp\7e35a7a1fd8f43c53a4c7e0e62432a8f_JaffaCakes118.html

Signatures

Browser Information Discovery

discovery

Enumerates system info in registry

Description Indicator Process Target
Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe N/A
Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe N/A
Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe N/A

Suspicious use of FindShellTrayWindow

Description Indicator Process Target
N/A N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe N/A
N/A N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe N/A
N/A N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe N/A
N/A N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe N/A
N/A N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe N/A
N/A N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe N/A
N/A N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe N/A
N/A N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe N/A
N/A N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe N/A
N/A N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe N/A
N/A N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe N/A
N/A N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe N/A
N/A N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe N/A
N/A N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe N/A
N/A N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe N/A
N/A N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe N/A
N/A N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe N/A
N/A N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe N/A
N/A N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe N/A
N/A N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe N/A
N/A N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe N/A
N/A N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe N/A
N/A N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe N/A
N/A N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe N/A
N/A N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe N/A

Suspicious use of SendNotifyMessage

Description Indicator Process Target
N/A N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe N/A
N/A N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe N/A
N/A N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe N/A
N/A N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe N/A
N/A N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe N/A
N/A N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe N/A
N/A N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe N/A
N/A N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe N/A
N/A N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe N/A
N/A N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe N/A
N/A N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe N/A
N/A N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe N/A
N/A N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe N/A
N/A N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe N/A
N/A N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe N/A
N/A N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe N/A
N/A N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe N/A
N/A N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe N/A
N/A N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe N/A
N/A N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe N/A
N/A N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe N/A
N/A N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe N/A
N/A N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe N/A
N/A N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe N/A

Suspicious use of WriteProcessMemory

Description Indicator Process Target
PID 872 wrote to memory of 3612 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 872 wrote to memory of 3612 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 872 wrote to memory of 1936 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 872 wrote to memory of 1936 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 872 wrote to memory of 1936 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 872 wrote to memory of 1936 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 872 wrote to memory of 1936 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 872 wrote to memory of 1936 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 872 wrote to memory of 1936 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 872 wrote to memory of 1936 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 872 wrote to memory of 1936 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 872 wrote to memory of 1936 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 872 wrote to memory of 1936 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 872 wrote to memory of 1936 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 872 wrote to memory of 1936 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 872 wrote to memory of 1936 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 872 wrote to memory of 1936 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 872 wrote to memory of 1936 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 872 wrote to memory of 1936 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 872 wrote to memory of 1936 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 872 wrote to memory of 1936 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 872 wrote to memory of 1936 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 872 wrote to memory of 1936 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 872 wrote to memory of 1936 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 872 wrote to memory of 1936 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 872 wrote to memory of 1936 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 872 wrote to memory of 1936 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 872 wrote to memory of 1936 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 872 wrote to memory of 1936 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 872 wrote to memory of 1936 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 872 wrote to memory of 1936 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 872 wrote to memory of 1936 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 872 wrote to memory of 1936 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 872 wrote to memory of 1936 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 872 wrote to memory of 1936 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 872 wrote to memory of 1936 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 872 wrote to memory of 1936 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 872 wrote to memory of 1936 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 872 wrote to memory of 1936 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 872 wrote to memory of 1936 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 872 wrote to memory of 1936 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 872 wrote to memory of 1936 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 872 wrote to memory of 2292 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 872 wrote to memory of 2292 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 872 wrote to memory of 2460 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 872 wrote to memory of 2460 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 872 wrote to memory of 2460 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 872 wrote to memory of 2460 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 872 wrote to memory of 2460 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 872 wrote to memory of 2460 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 872 wrote to memory of 2460 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 872 wrote to memory of 2460 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 872 wrote to memory of 2460 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 872 wrote to memory of 2460 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 872 wrote to memory of 2460 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 872 wrote to memory of 2460 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 872 wrote to memory of 2460 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 872 wrote to memory of 2460 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 872 wrote to memory of 2460 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 872 wrote to memory of 2460 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 872 wrote to memory of 2460 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 872 wrote to memory of 2460 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 872 wrote to memory of 2460 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 872 wrote to memory of 2460 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe

Processes

C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe

"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --start-maximized --single-argument C:\Users\Admin\AppData\Local\Temp\7e35a7a1fd8f43c53a4c7e0e62432a8f_JaffaCakes118.html

C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe

"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffcad9f46f8,0x7ffcad9f4708,0x7ffcad9f4718

C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe

"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2124,6907699547303272739,6206548267497806959,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2132 /prefetch:2

C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe

"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2124,6907699547303272739,6206548267497806959,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2212 /prefetch:3

C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe

"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2124,6907699547303272739,6206548267497806959,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2872 /prefetch:8

C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe

"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2124,6907699547303272739,6206548267497806959,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3236 /prefetch:1

C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe

"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2124,6907699547303272739,6206548267497806959,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3252 /prefetch:1

C:\Windows\System32\CompPkgSrv.exe

C:\Windows\System32\CompPkgSrv.exe -Embedding

C:\Windows\System32\CompPkgSrv.exe

C:\Windows\System32\CompPkgSrv.exe -Embedding

C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe

"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2124,6907699547303272739,6206548267497806959,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6084 /prefetch:1

C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe

"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2124,6907699547303272739,6206548267497806959,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3172 /prefetch:1

C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe

"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2124,6907699547303272739,6206548267497806959,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3412 /prefetch:1

C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe

"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2124,6907699547303272739,6206548267497806959,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=6176 /prefetch:8

C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe

"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2124,6907699547303272739,6206548267497806959,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=6176 /prefetch:8

C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe

"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2124,6907699547303272739,6206548267497806959,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5344 /prefetch:1

C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe

"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2124,6907699547303272739,6206548267497806959,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4780 /prefetch:1

C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe

"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2124,6907699547303272739,6206548267497806959,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=13 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5492 /prefetch:1

C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe

"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2124,6907699547303272739,6206548267497806959,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=14 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5444 /prefetch:1

C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe

"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2124,6907699547303272739,6206548267497806959,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=5472 /prefetch:2

Network

Country Destination Domain Proto
US 8.8.8.8:53 97.17.167.52.in-addr.arpa udp
US 8.8.8.8:53 i911.photobucket.com udp
US 8.8.8.8:53 apis.google.com udp
US 8.8.8.8:53 www.blogger.com udp
GB 3.162.20.115:80 i911.photobucket.com tcp
GB 142.250.200.46:443 apis.google.com tcp
GB 142.250.178.9:445 www.blogger.com tcp
GB 3.162.20.115:443 i911.photobucket.com tcp
US 8.8.8.8:53 73.31.126.40.in-addr.arpa udp
US 8.8.8.8:53 115.20.162.3.in-addr.arpa udp
US 8.8.8.8:53 100.209.201.84.in-addr.arpa udp
US 8.8.8.8:53 www.linkwithin.com udp
SG 118.139.179.30:80 www.linkwithin.com tcp
US 8.8.8.8:53 www.statcounter.com udp
US 104.20.94.138:80 www.statcounter.com tcp
US 8.8.8.8:53 img1.blogblog.com udp
US 8.8.8.8:53 www.bloggerschoiceawards.com udp
GB 142.250.178.9:80 img1.blogblog.com tcp
SG 118.139.179.30:80 www.linkwithin.com tcp
US 209.17.116.165:80 www.bloggerschoiceawards.com tcp
US 209.17.116.165:80 www.bloggerschoiceawards.com tcp
US 8.8.8.8:53 95.221.229.192.in-addr.arpa udp
US 8.8.8.8:53 83.39.65.18.in-addr.arpa udp
US 8.8.8.8:53 138.94.20.104.in-addr.arpa udp
US 8.8.8.8:53 30.179.139.118.in-addr.arpa udp
US 8.8.8.8:53 9.178.250.142.in-addr.arpa udp
US 8.8.8.8:53 twitter-badges.s3.amazonaws.com udp
US 16.182.97.25:80 twitter-badges.s3.amazonaws.com tcp
US 8.8.8.8:53 i622.photobucket.com udp
GB 3.162.20.109:80 i622.photobucket.com tcp
US 8.8.8.8:53 images.circleofmoms.com udp
NL 18.239.94.51:80 images.circleofmoms.com tcp
US 8.8.8.8:53 www.topmommyblogs.com udp
US 15.197.148.33:80 www.topmommyblogs.com tcp
US 8.8.8.8:53 img2.blogblog.com udp
GB 142.250.178.9:80 img2.blogblog.com tcp
US 8.8.8.8:53 165.116.17.209.in-addr.arpa udp
US 8.8.8.8:53 25.97.182.16.in-addr.arpa udp
US 8.8.8.8:53 109.20.162.3.in-addr.arpa udp
US 8.8.8.8:53 51.94.239.18.in-addr.arpa udp
US 8.8.8.8:53 55.36.223.20.in-addr.arpa udp
US 8.8.8.8:53 33.148.197.15.in-addr.arpa udp
US 8.8.8.8:53 www.blogger.com udp
N/A 224.0.0.251:5353 udp
US 8.8.8.8:53 149.220.183.52.in-addr.arpa udp
GB 142.250.200.46:443 apis.google.com udp
SG 118.139.179.30:80 www.linkwithin.com tcp
GB 216.58.213.2:445 pagead2.googlesyndication.com tcp
US 8.8.8.8:53 img132.imageshack.us udp
US 38.99.77.16:80 img132.imageshack.us tcp
US 8.8.8.8:53 www.google.com udp
GB 172.217.169.36:80 www.google.com tcp
US 8.8.8.8:53 www.facebook.com udp
GB 157.240.214.35:80 www.facebook.com tcp
GB 172.217.169.36:80 www.google.com tcp
US 8.8.8.8:53 c.statcounter.com udp
US 104.20.94.138:443 c.statcounter.com tcp
GB 157.240.214.35:443 www.facebook.com tcp
US 8.8.8.8:53 16.77.99.38.in-addr.arpa udp
US 8.8.8.8:53 36.169.217.172.in-addr.arpa udp
SG 118.139.179.30:80 www.linkwithin.com tcp
US 8.8.8.8:53 a.nel.cloudflare.com udp
US 8.8.8.8:53 static.xx.fbcdn.net udp
US 35.190.80.1:443 a.nel.cloudflare.com tcp
GB 216.58.213.2:139 pagead2.googlesyndication.com tcp
GB 163.70.151.21:443 static.xx.fbcdn.net tcp
US 35.190.80.1:443 a.nel.cloudflare.com udp
SG 118.139.179.30:80 www.linkwithin.com tcp
US 8.8.8.8:53 developers.google.com udp
US 8.8.8.8:53 accounts.google.com udp
GB 74.125.71.84:443 accounts.google.com tcp
GB 216.58.212.238:80 developers.google.com tcp
GB 216.58.212.238:443 developers.google.com tcp
US 8.8.8.8:53 ssl.gstatic.com udp
GB 142.250.187.195:443 ssl.gstatic.com tcp
US 8.8.8.8:53 35.214.240.157.in-addr.arpa udp
US 8.8.8.8:53 1.80.190.35.in-addr.arpa udp
US 8.8.8.8:53 21.151.70.163.in-addr.arpa udp
US 8.8.8.8:53 238.212.58.216.in-addr.arpa udp
US 8.8.8.8:53 84.71.125.74.in-addr.arpa udp
US 8.8.8.8:53 195.187.250.142.in-addr.arpa udp
US 8.8.8.8:53 56.163.245.4.in-addr.arpa udp
US 8.8.8.8:53 206.23.85.13.in-addr.arpa udp
US 8.8.8.8:53 0.205.248.87.in-addr.arpa udp
US 8.8.8.8:53 www.avantgardeparenting.com udp
US 8.8.8.8:53 88.156.103.20.in-addr.arpa udp
GB 74.125.71.84:443 accounts.google.com udp
US 8.8.8.8:53 48.229.111.52.in-addr.arpa udp
US 8.8.8.8:53 tse1.mm.bing.net udp
US 150.171.28.10:443 tse1.mm.bing.net tcp
US 150.171.28.10:443 tse1.mm.bing.net tcp
US 150.171.28.10:443 tse1.mm.bing.net tcp
US 150.171.28.10:443 tse1.mm.bing.net tcp
US 150.171.28.10:443 tse1.mm.bing.net tcp
GB 74.125.71.84:443 accounts.google.com udp

Files

C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad\settings.dat

MD5 d22073dea53e79d9b824f27ac5e9813e
SHA1 6d8a7281241248431a1571e6ddc55798b01fa961
SHA256 86713962c3bb287964678b148ee08ea83fb83483dff8be91c8a6085ca560b2a6
SHA512 97152091ee24b6e713b8ec8123cb62511f8a7e8a6c6c3f2f6727d0a60497be28814613b476009b853575d4931e5df950e28a41afbf6707cb672206f1219c4413

\??\pipe\LOCAL\crashpad_872_TWXLGPQIVBCJWBXT

MD5 d41d8cd98f00b204e9800998ecf8427e
SHA1 da39a3ee5e6b4b0d3255bfef95601890afd80709
SHA256 e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855
SHA512 cf83e1357eefb8bdf1542850d66d8007d620e4050b5715dc83f4a921d36ce9ce47d0d13c5d85f2b0ff8318d2877eec2f63b931bd47417a81a538327af927da3e

C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad\settings.dat

MD5 bffcefacce25cd03f3d5c9446ddb903d
SHA1 8923f84aa86db316d2f5c122fe3874bbe26f3bab
SHA256 23e7cbbf64c81122c3cb30a0933c10a320e254447771737a326ce37a0694d405
SHA512 761dae5315b35ec0b2fe68019881397f5d2eadba3963aba79a89f8953a0cd705012d7faf3a204a5f36008926b9f614980e333351596b06ce7058d744345ce2e7

C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Preferences

MD5 c2cb98290308b4f87f7d073339b7a02e
SHA1 990217d72b15bac797a85889cb7e6ac6e110ded1
SHA256 c93cb6d18b4f77afec07ddf072db40c5f80e854a9f580b3cf8847574e0b57377
SHA512 96d1c04930c5b5075d4c39f10ca66463c1888793c9a26b1d3a49e675136473ec70eec7ce340828be29dffece654b30a0735a66dac86136a3a3026f90bce916f0

C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Local State

MD5 23aa14d0f8a07734f4e439c8ee035a38
SHA1 e5e882f11019650e884b9a72feb8adf6e9ec018f
SHA256 5a0b6205b7911fc52cd2c7ad777052e38c9421fd267f0a1c79a828eae0da3d3a
SHA512 392de64d229d3ee2f91a0ac5f6d69cf104bc951c0690d2275e6fe4c055b514e7cfc927b65a35a6ff443cee44baffc8bce320c7906792e832c6091cffb3517a52

C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Preferences

MD5 1c081dde3eebcea7d0af2c912ad3d7e0
SHA1 640c35c01c89425d07fc06baf0d631b470523846
SHA256 84710b7865f21f5e821a88e3a6a8e167b154f0bc6daaf863ee9daaf24509ffa2
SHA512 ab768871542cf0e9621050367eb3cc4c1a4cabb4f2be35698619f3c1f4d5b99e17d7c5aadafb70d0047dd2ee4498239ede677d1201ea211ab35372ec3f7b673b

C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Preferences

MD5 fdf0ada572b1e63ca77d2c1f48a1fc8c
SHA1 afd0cc1dce4f3011504d347efdd77ef8518a954e
SHA256 c77247291f68dab15e51e62bba0cd4eb5acbf55879f1a95237d408b7add5f7eb
SHA512 e66ee73b8227b4924b63167dbee7bab435c265d8addffba656ca8ac06dac48d828c11bc13f3e83cc121e463e2784582f7b6a6aa83f1945b08a5aa4a277e1ecfa

C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index

MD5 cca31033f3760ff0b54835bbb56906b4
SHA1 16d4f4d81ad2898839bb03a443586403d6c39098
SHA256 6dfb0c5e8942db06e61482bd20da63de2096f5fa0e97a280f0a1214b38c9dbdb
SHA512 7d7bcff332b1a5d87fc369d46622f7ab3d30117935dd36466e2c9fc2eeeaeb75cd0256e9fd69eb8ab9f1947ae22b7880842dd6bd8658a106f44b660f4f69ab7f

C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\data_reduction_proxy_leveldb\CURRENT

MD5 6752a1d65b201c13b62ea44016eb221f
SHA1 58ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA256 0861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA512 9cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389

C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Network Persistent State

MD5 ec9a9953524254ada15e64affe95eae2
SHA1 0004eda753d7245badf212ac00092d398b694149
SHA256 cbc08d1beaabc1608097c12ac4cf697be5456c9d9267483c064aa6dfa1c06043
SHA512 8c6903dd55a53ffd60b875788d4a5ea3fa524482739bd8e432d654267e4423aeb6faed2e6536ae0198180395cb4717807b906baf3fe0cc22490ce2ad12e58eb6

C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Cache\f_000005

MD5 05197e9427acea2ac4dc812f97a8f078
SHA1 3d2a38b79da52e57783360f195ac3e7c85edefd8
SHA256 7bdfd36b4f017340dbc84a310014381bfd3028416ff21c54f7ce0a35cfd38191
SHA512 084d4febc28358d3ba6b0bef400f637b7f350381b8b592b1e412dd860d5aaf034c03ecfa87a064cb19dd8a42faade23c260e35a8660791011b7e51b726418ead

C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Preferences

MD5 d288854ecbc6098ba25515fa68b62a7a
SHA1 0acef243f1a0657bf0c2580e47dea02edcc5c483
SHA256 0ce4c20b185f73a80502047ad2170a681eb7a234ab51b3aa012bce3fbab4b3bc
SHA512 eddd73d94c7403b80026b40db8617bd4f2c815cd106828a0445b939dc6af656201f6ef42dbf3ef0ea366dda3e8556021a8891b053f39e9293baebaf2b4fe3011

C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index

MD5 34f4e1aab26eced6c6719b84f8bc8bce
SHA1 a69b713d8aeee78a72d0b355ba00ad897baecc31
SHA256 cd9f8c6ad7cf0425f0b757c1f422a751f0a0cc4f88294eef28e4ca4ee79486ec
SHA512 4b26ae628647a70bff5b82e408a5c978c9b351a9fc2d6c48915942a57295c7f6700c0891ea6c1b5163043f29f268c55bce9e6323212de871b0a64984e3f8d552

Analysis: behavioral1

Detonation Overview

Submitted

2024-10-30 06:33

Reported

2024-10-30 06:35

Platform

win7-20240903-en

Max time kernel

134s

Max time network

146s

Command Line

"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\7e35a7a1fd8f43c53a4c7e0e62432a8f_JaffaCakes118.html

Signatures

SocGholish

downloader socgholish

Socgholish family

socgholish

System Location Discovery: System Language Discovery

discovery
Description Indicator Process Target
Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE N/A

Modifies Internet Explorer settings

adware spyware
Description Indicator Process Target
Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Main C:\Program Files\Internet Explorer\iexplore.exe N/A
Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage C:\Program Files\Internet Explorer\iexplore.exe N/A
Set value (int) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" C:\Program Files\Internet Explorer\iexplore.exe N/A
Set value (int) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" C:\Program Files\Internet Explorer\iexplore.exe N/A
Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\SearchScopes C:\Program Files\Internet Explorer\iexplore.exe N/A
Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\DomainSuggestion C:\Program Files\Internet Explorer\iexplore.exe N/A
Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\IntelliForms C:\Program Files\Internet Explorer\iexplore.exe N/A
Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Toolbar C:\Program Files\Internet Explorer\iexplore.exe N/A
Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser C:\Program Files\Internet Explorer\iexplore.exe N/A
Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage C:\Program Files\Internet Explorer\iexplore.exe N/A
Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\GPU C:\Program Files\Internet Explorer\iexplore.exe N/A
Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain C:\Program Files\Internet Explorer\iexplore.exe N/A
Set value (int) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" C:\Program Files\Internet Explorer\iexplore.exe N/A
Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive C:\Program Files\Internet Explorer\iexplore.exe N/A
Set value (int) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{D88DFF71-9688-11EF-8252-C28ADB222BBA} = "0" C:\Program Files\Internet Explorer\iexplore.exe N/A
Set value (str) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" C:\Program Files\Internet Explorer\iexplore.exe N/A
Set value (int) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" C:\Program Files\Internet Explorer\iexplore.exe N/A
Set value (data) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 C:\Program Files\Internet Explorer\iexplore.exe N/A
Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\InternetRegistry C:\Program Files\Internet Explorer\iexplore.exe N/A
Set value (data) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 C:\Program Files\Internet Explorer\iexplore.exe N/A
Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery C:\Program Files\Internet Explorer\iexplore.exe N/A
Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing C:\Program Files\Internet Explorer\iexplore.exe N/A
Set value (data) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 104c83b0952adb01 C:\Program Files\Internet Explorer\iexplore.exe N/A
Set value (int) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "436431864" C:\Program Files\Internet Explorer\iexplore.exe N/A
Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\IETld\LowMic C:\Program Files\Internet Explorer\iexplore.exe N/A
Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\LowRegistry C:\Program Files\Internet Explorer\iexplore.exe N/A
Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Zoom C:\Program Files\Internet Explorer\iexplore.exe N/A
Set value (str) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" C:\Program Files\Internet Explorer\iexplore.exe N/A
Set value (data) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000b8d48fc8adfa6b4a805f1a4a681aaa6f00000000020000000000106600000001000020000000332344160ba827468d64bae048d4a6ae16aaf182e73d951131c92a9415fb24b0000000000e800000000200002000000055657e4f1598899b431d6b139e5353dd194085a3330bcc9d1d6f8cd4596d28b6200000008a9a2e5b8c9ff6b7e2e049482737e645f6b358360c31714dddde53551a905d41400000008144d5dd168e6a7167e612c827ec2235fba0a1702a5abffc89c0c08932a7acc218820c26e9d8742dca740011c4a133787386d14d7a0c88669a0f04fef2d3c887 C:\Program Files\Internet Explorer\iexplore.exe N/A
Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic C:\Program Files\Internet Explorer\iexplore.exe N/A
Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\PageSetup C:\Program Files\Internet Explorer\iexplore.exe N/A
Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch C:\Program Files\Internet Explorer\iexplore.exe N/A
Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Main C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE N/A
Set value (int) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" C:\Program Files\Internet Explorer\iexplore.exe N/A

Suspicious use of FindShellTrayWindow

Description Indicator Process Target
N/A N/A C:\Program Files\Internet Explorer\iexplore.exe N/A

Processes

C:\Program Files\Internet Explorer\iexplore.exe

"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\7e35a7a1fd8f43c53a4c7e0e62432a8f_JaffaCakes118.html

C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE

"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2492 CREDAT:275457 /prefetch:2

Network

Country Destination Domain Proto
US 8.8.8.8:53 twitter-badges.s3.amazonaws.com udp
US 8.8.8.8:53 i911.photobucket.com udp
US 8.8.8.8:53 img1.blogblog.com udp
US 8.8.8.8:53 www.bloggerschoiceawards.com udp
US 8.8.8.8:53 i622.photobucket.com udp
US 8.8.8.8:53 www.linkwithin.com udp
US 8.8.8.8:53 apis.google.com udp
US 8.8.8.8:53 www.statcounter.com udp
US 8.8.8.8:53 images.circleofmoms.com udp
US 8.8.8.8:53 www.topmommyblogs.com udp
US 8.8.8.8:53 img2.blogblog.com udp
US 3.5.25.134:80 twitter-badges.s3.amazonaws.com tcp
US 3.5.25.134:80 twitter-badges.s3.amazonaws.com tcp
US 104.20.94.138:80 www.statcounter.com tcp
US 104.20.94.138:80 www.statcounter.com tcp
GB 142.250.200.46:443 apis.google.com tcp
GB 142.250.200.46:443 apis.google.com tcp
GB 3.162.20.23:80 i622.photobucket.com tcp
GB 3.162.20.23:80 i622.photobucket.com tcp
SG 118.139.179.30:80 www.linkwithin.com tcp
US 209.17.116.165:80 www.bloggerschoiceawards.com tcp
US 209.17.116.165:80 www.bloggerschoiceawards.com tcp
GB 142.250.178.9:80 img2.blogblog.com tcp
SG 118.139.179.30:80 www.linkwithin.com tcp
GB 142.250.178.9:80 img2.blogblog.com tcp
GB 142.250.178.9:80 img2.blogblog.com tcp
GB 142.250.178.9:80 img2.blogblog.com tcp
NL 18.239.94.59:80 images.circleofmoms.com tcp
NL 18.239.94.59:80 images.circleofmoms.com tcp
US 3.33.130.190:80 www.topmommyblogs.com tcp
US 3.33.130.190:80 www.topmommyblogs.com tcp
GB 3.162.20.109:80 i622.photobucket.com tcp
GB 3.162.20.109:80 i622.photobucket.com tcp
GB 3.162.20.23:443 i622.photobucket.com tcp
GB 3.162.20.109:443 i622.photobucket.com tcp
GB 3.162.20.109:443 i622.photobucket.com tcp
US 8.8.8.8:53 c.pki.goog udp
US 8.8.8.8:53 c.pki.goog udp
GB 142.250.180.3:80 c.pki.goog tcp
GB 142.250.180.3:80 c.pki.goog tcp
US 8.8.8.8:53 o.pki.goog udp
US 8.8.8.8:53 o.pki.goog udp
GB 142.250.180.3:80 o.pki.goog tcp
GB 142.250.180.3:80 o.pki.goog tcp
US 8.8.8.8:53 www.google.com udp
US 8.8.8.8:53 img132.imageshack.us udp
GB 172.217.169.36:80 www.google.com tcp
GB 172.217.169.36:80 www.google.com tcp
US 38.99.77.16:80 img132.imageshack.us tcp
US 38.99.77.16:80 img132.imageshack.us tcp
US 8.8.8.8:53 www.facebook.com udp
US 8.8.8.8:53 c.statcounter.com udp
GB 163.70.151.35:80 www.facebook.com tcp
GB 163.70.151.35:80 www.facebook.com tcp
US 104.20.95.138:443 c.statcounter.com tcp
US 104.20.95.138:443 c.statcounter.com tcp
GB 163.70.151.35:443 www.facebook.com tcp
US 8.8.8.8:53 accounts.google.com udp
GB 74.125.71.84:443 accounts.google.com tcp
GB 74.125.71.84:443 accounts.google.com tcp
US 8.8.8.8:53 ssl.gstatic.com udp
GB 142.250.200.3:443 ssl.gstatic.com tcp
GB 142.250.200.3:443 ssl.gstatic.com tcp
US 8.8.8.8:53 m.facebook.com udp
GB 163.70.151.35:443 m.facebook.com tcp
GB 163.70.151.35:443 m.facebook.com tcp
US 104.20.95.138:443 c.statcounter.com tcp
US 8.8.8.8:53 crl.microsoft.com udp
GB 2.18.190.80:80 crl.microsoft.com tcp
US 204.79.197.200:443 ieonline.microsoft.com tcp
US 204.79.197.200:443 ieonline.microsoft.com tcp
US 8.8.8.8:53 www.microsoft.com udp
GB 74.125.71.84:443 accounts.google.com tcp
GB 74.125.71.84:443 accounts.google.com tcp
US 204.79.197.200:443 ieonline.microsoft.com tcp
GB 74.125.71.84:443 accounts.google.com tcp
GB 74.125.71.84:443 accounts.google.com tcp

Files

C:\Users\Admin\AppData\Local\Temp\CabCA9F.tmp

MD5 49aebf8cbd62d92ac215b2923fb1b9f5
SHA1 1723be06719828dda65ad804298d0431f6aff976
SHA256 b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512 bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b

C:\Users\Admin\AppData\Local\Temp\TarCAB4.tmp

MD5 4ea6026cf93ec6338144661bf1202cd1
SHA1 a1dec9044f750ad887935a01430bf49322fbdcb7
SHA256 8efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA512 6c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b

C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

MD5 e253b8fa706b60d640260cb7722ead5b
SHA1 c7652f5e1c7dc7f21a464604c4e3125bcee92dca
SHA256 d3564d8827c32f21a44cead0f6500ccc1e97dc71b45b7bdf9a2425eefe3063cb
SHA512 bd895bfe255d114f76f3d4311cd6919810791d3ee4c6eec886acf07efa897b64712f0673852819cff42cc1788efd5b7a39d57c14601f31ad121356e86ccb8f6f

C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

MD5 7f89904bbd183c5632ace2e4c5cc5dce
SHA1 fa97039484ed0d8e90a374979a0c29a929d63f8e
SHA256 c99a2b5c66af02710f1d1c52320c1ad1477b727c209382b4c23337a871ef896b
SHA512 c760cba6e73ab9b234dabaac6cbdd06e55e97abea54a017b634f8f94f6ecf7abbd40623df617eaac42fcbbed507a44a40da347abd15350815fbfc34280394e59

C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\070E0202839D9D67350CD2613E78E416

MD5 55540a230bdab55187a841cfe1aa1545
SHA1 363e4734f757bdeb89868efe94907774a327695e
SHA256 d73494e3446b02167573b3cde3ae1c8584ac26e15e45ac3ec0326708425d90fb
SHA512 c899cb1d31d3214fd9dc8626a55e40580d3b2224bf34310c2abd85d0f63e2dedaeae57832f048c2f500cb2cbf83683fcb14139af3f0b5251606076cdb4689c54

C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\070E0202839D9D67350CD2613E78E416

MD5 08465ca1312bd9c31a3f7f6af94f70be
SHA1 4abab2c29379e2786ff508276bd725dc6fc655d5
SHA256 52a6860e5e789b74fd01e43063d4a7bff08c98d48a3b0203548d77c14a2bf9e9
SHA512 bb4ee95afb0b9bc6f29481b089e59b1603eb0b58824294314733cc234f9ab21349492e9ae23cfc1fe45cb2bfbb773cab8f03b01584c9822a3e3ff1d40548de2f

C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

MD5 55bb470c973ae0a17a2b2bd36788bced
SHA1 09db49010c9ca0b0af872e0a6f717d59f26ea0a0
SHA256 56f7a76414daf51622ac09a5dd50c17793dc0cdad508ecd03320ba867491e621
SHA512 87a97a80a0957b0d60009123c906d51f1f8705f96fbf27e7eb5c260a9dc8097a2a28f4870212cbf42fa8d096ecac66d39c534b8364d2192e4a8914facda1e0fb

C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

MD5 16faebed540dfefcb5393f2b6897f097
SHA1 abda09f74e9f72b28207270c8d9782555381971d
SHA256 ae378176708f2c000189232dbb0418d83493e89203dd1d46fab9698e9670ba15
SHA512 dbd3474ae3dc11459300facf1225d9f2e29d053fdeedb8e3c78e0b29535221b2f33758ce53b1e89a94938be535d1a79129ec8dc61f05ee792237ff7464ccdc9a

C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

MD5 d0cc83f1694fc8f732f7a735511b220b
SHA1 77ad27445944ff4991c3b3eeb4b47361c00f02f0
SHA256 6b3024b1aafecb0195059eda31fe1c9ddb40e1a8f9dee87cf910fbbfaa60028d
SHA512 809d51229e5fbc9dc57ecb0e8b7194e6d69a62fb9a6ffbbe2115ef1826304435b47359ea269f4a5824529a952df0bf0888159da94476f33ef313caace10d0df2

C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

MD5 a50b48937235b0772763aebfdf1780f1
SHA1 cec7788c57688447908db5b511b0b06c2e6302dd
SHA256 471de6489cf6eab0aae4286fa2ae5f72019573c45726bd1b54545a08a0c62eed
SHA512 624bed7728760aefa33a45f9a2121aafd6de7023b8a09d7c6e72fcc8dbbdf523cd234aede64537411815505fb5fd851f1fc790f123df9d45c8a74fbd6ecc8995

C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

MD5 6b1bb0969716cc30ae7f73c3751275f5
SHA1 63c85d82f51856a8f422d14163944d202bb2dd22
SHA256 ab2d0231af9de4700efbbac1ec1449107332473a7d8118c98d685157ff2a6fcd
SHA512 445af8715c64018e6b3b31bb5a15ba0e0d5f6a8f2b0a8443bfa333ee0456ee05e1d5023210ab0685cfeac07fba358fd3ab81117235c0582eb3a7d068bb51087f

C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

MD5 84680bccc1c00698ddfdcd7632cbc529
SHA1 4626af2359b38dce55514c88e533a08dc593e871
SHA256 cc88796658d5fd888e282e0e46969be60d48be67f1bc790cb8e1fe969b761866
SHA512 556c83d6d3906f827f85d33d982451b94cdd5fce195969b6aab2aae3e6c74a37c39459d4b85446d1c5e9e5f23ae39292144c838a592c1b13ce19f8f06b041646

C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

MD5 1273335a4df33bd43fcf4b65449b08ec
SHA1 792e5a4acf69c5b9c52dcfc9c989c7bb7ac2e3d1
SHA256 9451408fcd7cbeaa7e4b1c18a72de4f18d90cf45eebf40268f1af26bbb691350
SHA512 bc86750d95b0d817f8dd713042ab0b88a72af11c8618f5b90be003dff2c47ad65495ef143ebea9bdece349b5a6032ea04b38fee689eb0f907cdf456c1565a52a

C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

MD5 73b880d449e691de89a113b37e8c5a44
SHA1 2d77c8fa458977d94ee6ea27ed1b6b6237832c4e
SHA256 e32df4a9584100d076fd2e8f2d69610bdbaceefeb542e4c3bf871b1cec944ce9
SHA512 780a4af24857e04fd19c68860cb537e2bcf93f11456c91a258974eb878baa4fde56c0f86639be3a97c755a7364c43a219c56e2d77fb430e9893b212a09cd2015

C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

MD5 9d38a082b0ae82e7aad66ffc3a3c2fc1
SHA1 2e2196bfc3be5dbabc62391e1d8f0039564e66c2
SHA256 17a735b9ca190fd20e8f1d787d86c9696c5e51764c969ec4f0b63dc7d5848abb
SHA512 cfd3c096cde2f9e9022f35daef7399c794e5bdc97c4171c9fc92ecb0b62ab70710095e51cce8871b495b5c459138b79780dcc9d8c70bb7bee7c705e6dc7e5d76

C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

MD5 81eafd7c376317456d9c110ed9f5acd1
SHA1 385a91aabd4d966acc034b509f0470513bf7fa7c
SHA256 e4decbbf4ca44b59776a4d8e7e25cc32a40122a23f122b69c7e0492dda1f5c29
SHA512 d8cbd70d8191c9668b5421896e3d390d4dc8fb24ad9a91b590c6d515c44e7a709d04b9a37ef4a5c0aa15e7bfa787ca48e03da19a2882ea32511b13223662a3fb

C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

MD5 c3fcf11b989c24e28671513503072bc4
SHA1 71fc2e9507159afd3121b6f665e3e5de8ea10340
SHA256 9aebdd20074e68ef792a78df69f7f33b493cab21a17b67e3c81d0cadc8bf2c87
SHA512 b24b0a78a3513016ddcb3575f831935781696d08657bae72b2d8021fa1a3a1c788e8fefc43809e7b1bbddbef7434a80ab121156fa16e95bcf9cf93bc61485c22

C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

MD5 b17a192b516e84c49c690221e572a916
SHA1 f3e03705a58a357d092936385027beeb710b12aa
SHA256 ff7c77a4d212586b9a7e4108c7955f6f7484f875e45bf4dddae1414ae28ffd9e
SHA512 1a5aca9207a74b4fc317db9c3b3be3de1cb20efb1b6475a44b650e9a1f2349b42a02f7ef3d3f647df4d7a150ad4e40309789348dd01d14c078a35e7fc8c3626b

C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\ROLMKJ86\cb=gapi[3].js

MD5 1d4cb29476060a1b3681fdb681200b11
SHA1 d541f88bf8d4fd98b9e0e723e050c47d4d32c18a
SHA256 5930e64b0cbf1dc5922f65060422fcf822870ac69439450ee3cb134365a51a82
SHA512 85575c3656c8e0d70cbcdf76194e37dbe3f7bd4535221a8f51fb6b51266fd682809fa86bc556c27d127f713a6ff75290ae1fbdcd8e589211e1685f82b99d93cd

C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

MD5 84c70e3dd189b020138fb934ad161371
SHA1 427f00d50b4dd16df9002ecd56b3e28be5ccdc08
SHA256 af1558ed7c3bf3bf698adbb6ddca5167add0617272b48a1f0f9167b9b4383355
SHA512 1a9a7f751f1be549e9be093e4a64194c64e2b9ba227af36b59f731080b043b1cdc12e830025654c654bf2caf9dd07b019688c89c7ee5ad85f1df851ff363193c

C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

MD5 eab4a250fbf524f77aa109f39e287c0d
SHA1 80ece51d7ed801ab2afed8a7e42ffc8ebb329e66
SHA256 5fb4c0b223d3a28baafc78288fba20790cf4172d5a77bf85c4cdee9244bcf7fb
SHA512 802297c30341745f3182a581619e517cc9769078791d18eb9a1172c9315c17a39ce4e69ed2a4bb0be7780f4c1f2134f86924e3730be5e66e7ef9560b2100c931

C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

MD5 ba2119444c57c29bbcd541981e955aef
SHA1 9b0f4db6b51fec8ce1988bac93cd69e97799ee2a
SHA256 e21a01073e4250581f758e8ee2d634f66e451c63e0826d2663bbf75d60e3fa4c
SHA512 0b7be1af0c7e120ff343580002776f7c07e25ef63618d9cd8b5ec39147f79d423e9453db47057e77521a882f779b69bb3bb517219971dd5fc7eb18af12dcd6df

C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

MD5 ca07dcb432eed6e7c9eeb266d39edb14
SHA1 0d520f3ec1abef3c9178796899f4fe31abccd443
SHA256 5e6a1d9338ef0bb7def49b7bce56ef670138dd129699d03371c9aad1ab1e1b94
SHA512 11a76daed9f291d3cde73cc282bf8915be1a90b66855ee3bcd08fe6a84e718eac3228260bf18c75168b2ce0922339daea0a31c0ac0ec0822b47231ce59651812

C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

MD5 502da57f02975d873c3472a21e0f3b56
SHA1 c2d280bc14cfe55683a046cf00316aa10ea83284
SHA256 7fdd2597b0f958a86067184508dc29cd1e57967d8ec430c95e44197f18c92333
SHA512 ba0003f0e4a9342761d9bc83f87df01ec2ad0bfff99583f9c9ef107fea9824ea6083f097c791691eea155a2d6cf92b30161af5aa02c322b79c2e6c5c5033af3b

C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

MD5 4a470cda7f006d03c628382cedf855e2
SHA1 0b14b456d36f49f6f6f4e76c2899519711e5af55
SHA256 d86f901f1f322d9724dc676d1edc4f83468809f3a7a3b396441aa5c72b570294
SHA512 368a373330e0123c2c0257f3c75176f1ae985c970f5b224ef5306330ce244cfeddfcbc58c82a48593808694e782036232f070facb7ee35c882fd1ebef4fab86f

C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

MD5 7037eb787e1665cf9a7ccfebbecc2e89
SHA1 1415b714337e454bafc7612a6ec4429725f04b25
SHA256 32449badbf220938574a261d773db767a521e99758f13317ca080ee27b90cd25
SHA512 c1fd451d3e19fee69e7fc097d76314bce112f78051fe3f4719668bf46c2f5a35650e699e2c09aba6ce336b49a369fd6db55f396ecf1c3960ba94e8e6aebef14b

C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

MD5 3d872382b5eb27b3588d61bb7173e273
SHA1 70f170dc97edb2b44913984b5b893deafb68b853
SHA256 ec0dcf7519cfaf305e385abc55abbbf19e2e4918fc0741b2601819a75646068a
SHA512 1e1292b93a70aeca310d82d0b591e08ac799690bfb1c83edc16fe6e35f9e164bebe61ec4aa92f3ffc3ac7da0148339a33f411625afbb7e12d142710a74ad70be

C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

MD5 1d8480f5b513d34ca0d92ce080806636
SHA1 5240f55ddcdeb52d0405f9797ba7cc10126e0806
SHA256 6d8b5a86efe4e22f63e551aafaf40ecfc66156d8440d2b1e584f943368962f29
SHA512 a9e4fcc270b9807044a95b3fbcf5e1262b925dd85a06cfdfa304a0c5d0a31156902e9b439f1cdc1a1c35ca93f312d0f87a9ca86468782dbd220b52d4d0ec4929

C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

MD5 2ffb92be7b56535bf9b38c82bc3c926f
SHA1 7cb161c2bb53fe09af6ddf67ac1f93572e274ccd
SHA256 65116f67267197b88f1f4a5dadf207a3b40e576e772497d5149e4ea7ea4e586e
SHA512 63c49915806ebf805d88b3b16ffb1ec91d4a0205c213bdfb4b09650b25e0682b8fc99ab28314ddcd5bf19075b32d1794a57e24d9c704560ba5d52c07eb2e4ef4

C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

MD5 06b2958bce29bd911c074c1983ea895b
SHA1 883eae84ecc8d7e5f1641b7c4d124ee02191fe1f
SHA256 6f479c9d06fcbd9e592f40463ca1bad24544a37fc1002e931d134f3ee41f24e5
SHA512 f935d68a43112d252656cab7cbdfb3611f291893b7b65e2d59d77111756a2e18986c1adbbe8ec24289dde3e76b5828ab566f9a5e2c9d5784a07eb8118cbd92cf

C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

MD5 98464f20c552b133c67a0292d2e24b11
SHA1 46eb84628f912a8061f02b3388e61956ecd59141
SHA256 9acc60346478f6dbb5801a83ba38246d5a6b6670d7f0ac29b95ea5755a7896c1
SHA512 fc097b9be7bad9d20ccf21be7d346cac1bfd192af05510d196ba3e3800b334bf858680277f587ce578d249de9b198958b8ea942fc8b6cbdce0db690f3ca3c86a

C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

MD5 d128f035b59d23a2e23d14e4c8520bb5
SHA1 44c6a228fb37dd3f7aaf9ab68fb0657e4da5ecce
SHA256 96663766dad1c6048fe3dfc14e36933b86dc732df70bbb84ffa6f88adafea524
SHA512 3dbffb3df7ac4f7b45cbcc8f025f2dc762b3bccf2ab6f35743a0ccde4e4c3451f82fb4214d3ae4cf876ab64178bd5d9d5697bca473aa27193097d5c441b96af7

C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

MD5 68e89f02b3efbc2ac7d256e2e2a76e5f
SHA1 d2ed03f7d346f005cd69c1ea3a8342ef0ef9d88d
SHA256 3aff949f91f4547760b860386d1a31f2056e4594b9be95ac4e0f742b73bbed68
SHA512 022e0076c06e46ae17be0534a51cb31aa9df2eb04dff0d75d4859e5e64ae63b2287e44931a3100e149109e6f2b9e81befc37cc59f65d76aa7ca584dc796238fe

C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

MD5 3bd0a6533bdad2ae5c152880c40490d1
SHA1 bca9600992eae62aa587b87421d4867e4dc07392
SHA256 916551278a66fceb02b5f33ca59bb962191fe6542bede57db7e9700b2c48d049
SHA512 cfac15bff479e953e80fd4b8d824837b3aed7003b6aa6dfc016c0d3e33ab1d34a337de87efc4ac985e03f53ef57306b09bc3b958e5b79438dbaaceefa4c0f4b2

C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

MD5 8589eb0b1733acd47c18d3c7fe853dbe
SHA1 e0d0477aa73ec59755a50247b2b5ac6b98a620c7
SHA256 3b2f7d3669b8c79feb28a5f08c0fa8c4f53552f90bc91153b415eb82452f6230
SHA512 00fddd4c001e0d846e78befc31adaaed1fe030c24a09f09aca786d382d70c4c0510d06b6f0805545f303fe694968edbded5326ed5735076af6c9df725a02bc6d

C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

MD5 0d286750fedbaacfa1a6f17249d5f52f
SHA1 95fe5980e21d5ac56a143277d3dfc54714eb2c3c
SHA256 d53e760410f05bd20705eddeb577235765ca2ba6bc11bf621cc05531effe6b80
SHA512 57a951897fa7fc18b1f2b6b211b842540675d665e098599632ae1a772d24c2d2c06e6cd8a0723f76c5ac938c135758a29c6233fa77181b81c1241a771cddd2c5

C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\F0ACCF77CDCBFF39F6191887F6D2D357

MD5 20c8966de2b21d46812f1e35a2266c8b
SHA1 459ab00efee5b058ed77fb62fc21947422f2101b
SHA256 36f49c1c2d553fefed6fff6e35407d92f73de144e18075069492a28c8a4f368e
SHA512 a89a7697e3d62fb2f99cc51d9755687ece64f47f896d7159614a24c1e2401f891b9eee366864ee833c36614f1c693d71532f766a67a8f04e9c797e5d70272ab4

C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\F0ACCF77CDCBFF39F6191887F6D2D357

MD5 a266bb7dcc38a562631361bbf61dd11b
SHA1 3b1efd3a66ea28b16697394703a72ca340a05bd5
SHA256 df545bf919a2439c36983b54cdfc903dfa4f37d3996d8d84b4c31eec6f3c163e
SHA512 0da8ef4f8f6ed3d16d2bc8eb816b9e6e1345dfe2d91160196c47e6149a1d6aedaafadcefd66acdea7f72dcf0832770192ceac15b0c559c4ccc2c0e5581d5aefc

C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\3C428B1A3E5F57D887EC4B864FAC5DCC

MD5 e4a68ac854ac5242460afd72481b2a44
SHA1 df3c24f9bfd666761b268073fe06d1cc8d4f82a4
SHA256 cb3ccbb76031e5e0138f8dd39a23f9de47ffc35e43c1144cea27d46a5ab1cb5f
SHA512 5622207e1ba285f172756f6019af92ac808ed63286e24dfecc1e79873fb5d140f1ceb7133f2476e89a5f75f711f9813a9fbb8fd5287f64adfdcc53b864f9bdc5

C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\BQQODH7V\2254111616-postmessagerelay[1].js

MD5 c264799bac4a96a4cd63eb09f0476a74
SHA1 d8a1077bf625dac9611a37bfb4e6c0cd07978f4c
SHA256 17dce4003e6a3d958bb8307bffa9c195694881f549943a7bdb2769b082f9326d
SHA512 6acd83dfd3db93f1f999d524b8828b64c8c0731567c3c0b8a77c6ddcf03d0e74ee20d23171e6ceac0c9f099dce03f8e5d68e78c374da2c055973f6ac2db4e4f9

C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

MD5 f1aaf169ba8cad95ca6ea867d5965dd7
SHA1 72918c7d0e003d7b6783d2b94d65fc69b139e87a
SHA256 56dfa7297c620cb3aaf5fd4556d54bd1bf1f87d61b5fe1c522c67c1ea47ea827
SHA512 3c3945cabf586c7875afd13a6cfcca617b4ce8f480b74008633819c0f9d7dfc903b84bd45b4bf04aec4fabafabcb27b0e405e40131f2a77ad32b8195128947da

C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\Q4648X1K\rpc_shindig_random[1].js

MD5 70116351ebc507731f11cfb8653f69bf
SHA1 667d48cd3c244c41a84302056e5b14140045acd3
SHA256 e3fff060584ca9c8eb12a6925252c8c6333622f4e6aeae8417449bf0ae355020
SHA512 a69875a52b635e7a561cfe2c7f4639bc122be434989dd39b37ab8dda08b49aa4bfd681c572628e9dc056c69808d0a03e2c6b4fef88db20a59ca73f097870aee9

C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

MD5 4ff8eecc67c0c4f870cc2ecfd6d6d1f0
SHA1 e5a93b6c2b65248ddf8dbd5bf6bb504f216da9ad
SHA256 161199ad75e31ecfb0381d51273468f297051b8f9d667143719c7834f177547d
SHA512 24f12aabd73f8c13f2fe17ed888342615de95071e9ac5a9a5d42f0e1921b84d4d1bc14d85ff2bdaac81150158b78bd31cb674d854d1f963c96c5cfaaf0d95798

C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

MD5 916fec0b972ab38eb3f1ab057b10271b
SHA1 7cacd0c3d70d8b62f0ddb98dc92516eb6f971a3e
SHA256 a30f50d9dbf842fa30c979a162d0335a64158e7c613465f05647ff4308961f32
SHA512 ba2b401dcbfb9ff09a5f3e9adf04516eb5ab95001266b7828ed4282f717b650843b8ca5f23ea40f760b0dc00a4e389944a18088c7af749466fa6122e1efc5813

C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

MD5 f467eadf03789a6f4bb6dcfa5035b9b5
SHA1 c812394e924dc269369d05603f8e6301a6b2060d
SHA256 5e6b0060251b179d3989ca1ba22f1453c78eb232f0401fddb9c9ec3daa732580
SHA512 0ac88a2469ec0ffc3b28796fb3e5077fd550e85c98576543fe4d3c6fd6b9980cb0ffeccf05b84dc4bfaf02cea156b5d5a940f1edc7fb75c0dd70c4a6f3f3b5a2

C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

MD5 a769f130a16af18b7cf5f441dd18790b
SHA1 be5c616dbdada0281c78ea2a38a1bb3ee6c3a989
SHA256 251d4fc44f140da833a429cfe537e773cafea1040ceb17f35152f9ebf2f2c8bc
SHA512 b4cd9da3366f1979cd68db73bc12dc20b5b46480253d69eb48857cab0e9e685b46c6b4ba27bbcdf58d9cfcf198340f831c5a4ae5b857bad7aaab9883546d6cca

C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

MD5 e93fff29ea7e742205e14df13e5e496a
SHA1 ae6bfdb7f9ce91cb980e6ca4589fcc599b504987
SHA256 3801bd070777fd993c4e4768a138bbec668512c6cbaa31418ca0d3c68f622604
SHA512 6ae6cc6648e9ff7e4dd3e1c5d659609f6fccf76b6d3ffdb455a67b7be7f1d8c14eb2ae425b7fd1373c5d724cab550d38534673663716aa38bbfe930b18058205

C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

MD5 1896e3645eaca51f8b0b99c5dcec3aaf
SHA1 f854c87aa53652a8e062828b03ec1e2295774c55
SHA256 fa5278475ebb0f282dea5e3f0311992f3ea199941fa6b611e8e3b71d9f1b0807
SHA512 7ab432d5f3be8d30b13361ce64c750f16258bebf6427f57be4a02f61e902b9497c4ce2d2d83617ab180a4146285427400a4749c7e1a3db254bd86cf377a2ba3c