Malware Analysis Report

2025-04-13 11:37

Sample ID 241231-ktmd3asqcx
Target JaffaCakes118_0f834d9acbd24061a8dfe9120344fe7b
SHA256 e4de650a43c843e0831493554a2d10c81b2063056bb667b09907c6286740700e
Tags
discovery socgholish downloader
score
10/10

Table of Contents

Analysis Overview

MITRE ATT&CK

Enterprise Matrix V15

Analysis: static1

Detonation Overview

Signatures

Analysis: behavioral2

Detonation Overview

Command Line

Signatures

Processes

Network

Files

Analysis: behavioral1

Detonation Overview

Command Line

Signatures

Processes

Network

Files

Analysis Overview

score
10/10

SHA256

e4de650a43c843e0831493554a2d10c81b2063056bb667b09907c6286740700e

Threat Level: Known bad

The file JaffaCakes118_0f834d9acbd24061a8dfe9120344fe7b was found to be: Known bad.

Malicious Activity Summary

discovery socgholish downloader

SocGholish

Socgholish family

Browser Information Discovery

System Location Discovery: System Language Discovery

Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary

Suspicious use of SendNotifyMessage

Suspicious use of WriteProcessMemory

Suspicious use of SetWindowsHookEx

Enumerates system info in registry

Suspicious behavior: EnumeratesProcesses

Suspicious use of FindShellTrayWindow

Modifies Internet Explorer settings

MITRE ATT&CK

Analysis: static1

Detonation Overview

Reported

2024-12-31 08:53

Signatures

N/A

Analysis: behavioral2

Detonation Overview

Submitted

2024-12-31 08:53

Reported

2024-12-31 08:56

Platform

win10v2004-20241007-en

Max time kernel

144s

Max time network

149s

Command Line

"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --start-maximized --single-argument C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_0f834d9acbd24061a8dfe9120344fe7b.html

Signatures

Browser Information Discovery

discovery

Enumerates system info in registry

Description Indicator Process Target
Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe N/A
Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe N/A
Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe N/A

Suspicious use of FindShellTrayWindow

Description Indicator Process Target
N/A N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe N/A
N/A N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe N/A
N/A N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe N/A
N/A N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe N/A
N/A N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe N/A
N/A N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe N/A
N/A N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe N/A
N/A N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe N/A
N/A N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe N/A
N/A N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe N/A
N/A N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe N/A
N/A N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe N/A
N/A N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe N/A
N/A N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe N/A
N/A N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe N/A
N/A N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe N/A
N/A N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe N/A
N/A N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe N/A
N/A N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe N/A
N/A N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe N/A
N/A N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe N/A
N/A N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe N/A
N/A N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe N/A
N/A N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe N/A
N/A N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe N/A

Suspicious use of SendNotifyMessage

Description Indicator Process Target
N/A N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe N/A
N/A N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe N/A
N/A N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe N/A
N/A N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe N/A
N/A N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe N/A
N/A N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe N/A
N/A N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe N/A
N/A N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe N/A
N/A N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe N/A
N/A N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe N/A
N/A N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe N/A
N/A N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe N/A
N/A N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe N/A
N/A N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe N/A
N/A N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe N/A
N/A N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe N/A
N/A N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe N/A
N/A N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe N/A
N/A N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe N/A
N/A N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe N/A
N/A N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe N/A
N/A N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe N/A
N/A N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe N/A
N/A N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe N/A

Suspicious use of WriteProcessMemory

Description Indicator Process Target
PID 1948 wrote to memory of 3416 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 1948 wrote to memory of 3416 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 1948 wrote to memory of 4452 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 1948 wrote to memory of 4452 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 1948 wrote to memory of 4452 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 1948 wrote to memory of 4452 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 1948 wrote to memory of 4452 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 1948 wrote to memory of 4452 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 1948 wrote to memory of 4452 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 1948 wrote to memory of 4452 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 1948 wrote to memory of 4452 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 1948 wrote to memory of 4452 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 1948 wrote to memory of 4452 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 1948 wrote to memory of 4452 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 1948 wrote to memory of 4452 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 1948 wrote to memory of 4452 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 1948 wrote to memory of 4452 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 1948 wrote to memory of 4452 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 1948 wrote to memory of 4452 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 1948 wrote to memory of 4452 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 1948 wrote to memory of 4452 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 1948 wrote to memory of 4452 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 1948 wrote to memory of 4452 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 1948 wrote to memory of 4452 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 1948 wrote to memory of 4452 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 1948 wrote to memory of 4452 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 1948 wrote to memory of 4452 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 1948 wrote to memory of 4452 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 1948 wrote to memory of 4452 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 1948 wrote to memory of 4452 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 1948 wrote to memory of 4452 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 1948 wrote to memory of 4452 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 1948 wrote to memory of 4452 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 1948 wrote to memory of 4452 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 1948 wrote to memory of 4452 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 1948 wrote to memory of 4452 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 1948 wrote to memory of 4452 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 1948 wrote to memory of 4452 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 1948 wrote to memory of 4452 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 1948 wrote to memory of 4452 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 1948 wrote to memory of 4452 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 1948 wrote to memory of 4452 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 1948 wrote to memory of 4772 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 1948 wrote to memory of 4772 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 1948 wrote to memory of 1312 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 1948 wrote to memory of 1312 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 1948 wrote to memory of 1312 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 1948 wrote to memory of 1312 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 1948 wrote to memory of 1312 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 1948 wrote to memory of 1312 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 1948 wrote to memory of 1312 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 1948 wrote to memory of 1312 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 1948 wrote to memory of 1312 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 1948 wrote to memory of 1312 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 1948 wrote to memory of 1312 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 1948 wrote to memory of 1312 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 1948 wrote to memory of 1312 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 1948 wrote to memory of 1312 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 1948 wrote to memory of 1312 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 1948 wrote to memory of 1312 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 1948 wrote to memory of 1312 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 1948 wrote to memory of 1312 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 1948 wrote to memory of 1312 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 1948 wrote to memory of 1312 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe

Processes

C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe

"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --start-maximized --single-argument C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_0f834d9acbd24061a8dfe9120344fe7b.html

C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe

"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ff9255346f8,0x7ff925534708,0x7ff925534718

C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe

"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2160,16671764195896248963,3489208072903328240,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2172 /prefetch:2

C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe

"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2160,16671764195896248963,3489208072903328240,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2216 /prefetch:3

C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe

"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2160,16671764195896248963,3489208072903328240,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2876 /prefetch:8

C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe

"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2160,16671764195896248963,3489208072903328240,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3248 /prefetch:1

C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe

"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2160,16671764195896248963,3489208072903328240,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3260 /prefetch:1

C:\Windows\System32\CompPkgSrv.exe

C:\Windows\System32\CompPkgSrv.exe -Embedding

C:\Windows\System32\CompPkgSrv.exe

C:\Windows\System32\CompPkgSrv.exe -Embedding

C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe

"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2160,16671764195896248963,3489208072903328240,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4752 /prefetch:1

C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe

"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2160,16671764195896248963,3489208072903328240,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4888 /prefetch:1

C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe

"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2160,16671764195896248963,3489208072903328240,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4208 /prefetch:1

C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe

"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2160,16671764195896248963,3489208072903328240,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3296 /prefetch:1

C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe

"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2160,16671764195896248963,3489208072903328240,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5580 /prefetch:1

C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe

"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2160,16671764195896248963,3489208072903328240,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3332 /prefetch:1

C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe

"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2160,16671764195896248963,3489208072903328240,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=13 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5784 /prefetch:1

C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe

"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2160,16671764195896248963,3489208072903328240,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=14 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6664 /prefetch:1

C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe

"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2160,16671764195896248963,3489208072903328240,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2620 /prefetch:2

C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe

"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2160,16671764195896248963,3489208072903328240,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2612 /prefetch:8

C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe

"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2160,16671764195896248963,3489208072903328240,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2612 /prefetch:8

C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe

"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2160,16671764195896248963,3489208072903328240,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=17 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5300 /prefetch:1

C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe

"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2160,16671764195896248963,3489208072903328240,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=18 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6864 /prefetch:1

C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe

"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2160,16671764195896248963,3489208072903328240,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=19 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6740 /prefetch:1

C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe

"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2160,16671764195896248963,3489208072903328240,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=20 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6680 /prefetch:1

Network

Country Destination Domain Proto
US 8.8.8.8:53 apis.google.com udp
US 8.8.8.8:53 www.blogger.com udp
US 8.8.8.8:53 ajax.googleapis.com udp
US 8.8.8.8:53 2.bp.blogspot.com udp
FR 142.250.179.106:80 ajax.googleapis.com tcp
FR 142.250.179.106:443 ajax.googleapis.com tcp
FR 216.58.214.169:443 www.blogger.com tcp
FR 142.250.179.78:443 apis.google.com tcp
FR 216.58.215.33:445 2.bp.blogspot.com tcp
FR 216.58.214.169:443 www.blogger.com udp
FR 142.250.179.78:443 apis.google.com udp
US 8.8.8.8:53 www.facebook.com udp
GB 163.70.147.35:80 www.facebook.com tcp
US 8.8.8.8:53 www.linkwithin.com udp
SG 118.139.179.30:80 www.linkwithin.com tcp
US 8.8.8.8:53 feedjit.com udp
SG 118.139.179.30:80 www.linkwithin.com tcp
US 8.8.8.8:53 nwidget.networkedblogs.com udp
US 8.8.8.8:53 plipeo.com udp
US 8.8.8.8:53 resources.blogblog.com udp
US 8.8.8.8:53 1.bp.blogspot.com udp
US 8.8.8.8:53 2.bp.blogspot.com udp
US 8.8.8.8:53 img1.blogblog.com udp
US 8.8.8.8:53 badge.facebook.com udp
US 8.8.8.8:53 www.blogblog.com udp
US 8.8.8.8:53 3.bp.blogspot.com udp
GB 163.70.147.35:443 www.facebook.com tcp
US 8.8.8.8:53 209.205.72.20.in-addr.arpa udp
US 8.8.8.8:53 75.159.190.20.in-addr.arpa udp
US 8.8.8.8:53 106.179.250.142.in-addr.arpa udp
US 8.8.8.8:53 169.214.58.216.in-addr.arpa udp
US 8.8.8.8:53 78.179.250.142.in-addr.arpa udp
US 8.8.8.8:53 95.221.229.192.in-addr.arpa udp
US 8.8.8.8:53 172.210.232.199.in-addr.arpa udp
US 8.8.8.8:53 35.147.70.163.in-addr.arpa udp
US 8.8.8.8:53 4.bp.blogspot.com udp
SG 104.43.113.7:80 plipeo.com tcp
FR 216.58.214.169:443 www.blogblog.com tcp
FR 216.58.214.169:80 www.blogblog.com tcp
US 57.144.120.141:443 badge.facebook.com tcp
FR 216.58.215.33:80 4.bp.blogspot.com tcp
FR 216.58.215.33:80 4.bp.blogspot.com tcp
FR 216.58.215.33:80 4.bp.blogspot.com tcp
FR 216.58.215.33:80 4.bp.blogspot.com tcp
FR 216.58.215.33:80 4.bp.blogspot.com tcp
FR 216.58.214.169:80 www.blogblog.com tcp
FR 216.58.214.169:80 www.blogblog.com tcp
FR 216.58.214.169:80 www.blogblog.com tcp
FR 216.58.215.33:80 4.bp.blogspot.com tcp
FR 216.58.215.33:80 4.bp.blogspot.com tcp
SG 118.139.179.30:80 www.linkwithin.com tcp
FR 216.58.215.33:80 4.bp.blogspot.com tcp
US 8.8.8.8:53 www.123myip.co.uk udp
US 8.8.8.8:53 static.networkedblogs.com udp
SG 104.43.113.7:80 plipeo.com tcp
DE 52.29.79.39:80 www.123myip.co.uk tcp
US 8.8.8.8:53 static.xx.fbcdn.net udp
US 8.8.8.8:53 www.wieistmeineip.de udp
US 57.144.120.128:443 static.xx.fbcdn.net tcp
DE 35.156.173.53:443 www.wieistmeineip.de tcp
SG 104.43.113.7:443 plipeo.com tcp
FR 216.58.215.33:139 4.bp.blogspot.com tcp
US 8.8.8.8:53 accounts.google.com udp
FR 216.58.214.169:443 www.blogblog.com udp
NL 142.250.27.84:443 accounts.google.com tcp
US 8.8.8.8:53 www.facebook.com udp
US 8.8.8.8:53 mamasoyaku.blogspot.com udp
GB 163.70.147.35:445 www.facebook.com tcp
FR 216.58.213.65:80 mamasoyaku.blogspot.com tcp
US 8.8.8.8:53 33.215.58.216.in-addr.arpa udp
US 8.8.8.8:53 141.120.144.57.in-addr.arpa udp
US 8.8.8.8:53 7.113.43.104.in-addr.arpa udp
US 8.8.8.8:53 30.179.139.118.in-addr.arpa udp
US 8.8.8.8:53 128.120.144.57.in-addr.arpa udp
US 8.8.8.8:53 39.79.29.52.in-addr.arpa udp
US 8.8.8.8:53 53.173.156.35.in-addr.arpa udp
US 8.8.8.8:53 84.27.250.142.in-addr.arpa udp
US 8.8.8.8:53 38.201.222.52.in-addr.arpa udp
US 8.8.8.8:53 65.213.58.216.in-addr.arpa udp
US 8.8.8.8:53 www6.cbox.ws udp
US 8.8.8.8:53 i43.tinypic.com udp
US 8.8.8.8:53 www.google.com udp
US 8.8.8.8:53 blogger.googleusercontent.com udp
US 8.8.8.8:53 www.purebaby.co.id udp
US 8.8.8.8:53 adv.blogupp.com udp
US 8.8.8.8:53 female.store.co.id udp
US 108.181.41.161:80 www6.cbox.ws tcp
US 108.181.41.161:80 www6.cbox.ws tcp
FR 172.217.20.164:443 www.google.com tcp
US 8.8.8.8:53 i879.photobucket.com udp
FR 142.250.179.65:443 blogger.googleusercontent.com tcp
FR 142.250.179.65:443 blogger.googleusercontent.com tcp
FR 142.250.179.65:443 blogger.googleusercontent.com tcp
FR 142.250.179.65:443 blogger.googleusercontent.com tcp
FR 142.250.179.65:443 blogger.googleusercontent.com tcp
FR 142.250.179.65:443 blogger.googleusercontent.com tcp
ID 203.161.184.73:80 female.store.co.id tcp
US 13.248.169.48:80 adv.blogupp.com tcp
FR 3.165.113.35:80 i879.photobucket.com tcp
US 108.181.41.161:80 www6.cbox.ws tcp
FR 3.165.113.35:443 i879.photobucket.com tcp
ID 203.161.184.73:80 female.store.co.id tcp
US 8.8.8.8:53 www.cbox.ws udp
ID 101.255.93.254:80 www.purebaby.co.id tcp
ID 101.255.93.254:80 www.purebaby.co.id tcp
US 8.8.8.8:53 164.20.217.172.in-addr.arpa udp
US 8.8.8.8:53 65.179.250.142.in-addr.arpa udp
US 8.8.8.8:53 35.113.165.3.in-addr.arpa udp
US 8.8.8.8:53 161.41.181.108.in-addr.arpa udp
US 8.8.8.8:53 48.169.248.13.in-addr.arpa udp
US 8.8.8.8:53 73.184.161.203.in-addr.arpa udp
US 8.8.8.8:53 254.93.255.101.in-addr.arpa udp
US 8.8.8.8:53 www.godaddy.com udp
GB 95.100.244.9:443 www.godaddy.com tcp
N/A 224.0.0.251:5353 udp
US 8.8.8.8:53 9.244.100.95.in-addr.arpa udp
US 8.8.8.8:53 154.239.44.20.in-addr.arpa udp
US 8.8.8.8:53 i43.tinypic.com udp
US 8.8.8.8:53 149.220.183.52.in-addr.arpa udp
FR 142.250.201.162:445 pagead2.googlesyndication.com tcp
FR 216.58.215.34:139 pagead2.googlesyndication.com tcp
US 8.8.8.8:53 50.23.12.20.in-addr.arpa udp
US 8.8.8.8:53 18.31.95.13.in-addr.arpa udp
US 8.8.8.8:53 i43.tinypic.com udp
US 8.8.8.8:53 85.49.80.91.in-addr.arpa udp
US 8.8.8.8:53 i43.tinypic.com udp
US 8.8.8.8:53 themes.googleusercontent.com udp
FR 142.250.179.65:445 themes.googleusercontent.com tcp
US 8.8.8.8:53 themes.googleusercontent.com udp
FR 142.250.179.65:139 themes.googleusercontent.com tcp
US 8.8.8.8:53 88.210.23.2.in-addr.arpa udp
FR 172.217.20.163:445 fonts.gstatic.com tcp
FR 172.217.20.163:139 fonts.gstatic.com tcp
US 8.8.8.8:53 i43.tinypic.com udp
US 8.8.8.8:53 platform.twitter.com udp
GB 151.101.188.157:445 platform.twitter.com tcp
US 8.8.8.8:53 platform.twitter.com udp
GB 151.101.188.157:139 platform.twitter.com tcp
US 8.8.8.8:53 i43.tinypic.com udp
US 8.8.8.8:53 19.229.111.52.in-addr.arpa udp
US 8.8.8.8:53 i43.tinypic.com udp
ID 101.255.93.254:80 www.purebaby.co.id tcp
US 8.8.8.8:53 www.blogger.com udp
FR 216.58.214.169:445 www.blogger.com tcp
FR 216.58.214.169:443 www.blogger.com udp
US 8.8.8.8:53 lh4.googleusercontent.com udp
US 8.8.8.8:53 lh5.googleusercontent.com udp
US 8.8.8.8:53 lh3.googleusercontent.com udp
FR 142.250.179.65:443 lh3.googleusercontent.com udp
FR 142.250.179.65:443 lh3.googleusercontent.com udp
FR 142.250.179.65:443 lh3.googleusercontent.com udp
US 8.8.8.8:53 i43.tinypic.com udp

Files

C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad\settings.dat

MD5 a0486d6f8406d852dd805b66ff467692
SHA1 77ba1f63142e86b21c951b808f4bc5d8ed89b571
SHA256 c0745fd195f3a51b27e4d35a626378a62935dccebefb94db404166befd68b2be
SHA512 065a62032eb799fade5fe75f390e7ab3c9442d74cb8b520d846662d144433f39b9186b3ef3db3480cd1d1d655d8f0630855ed5d6e85cf157a40c38a19375ed8a

\??\pipe\LOCAL\crashpad_1948_QPLAQGOZTMXWFDLA

MD5 d41d8cd98f00b204e9800998ecf8427e
SHA1 da39a3ee5e6b4b0d3255bfef95601890afd80709
SHA256 e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855
SHA512 cf83e1357eefb8bdf1542850d66d8007d620e4050b5715dc83f4a921d36ce9ce47d0d13c5d85f2b0ff8318d2877eec2f63b931bd47417a81a538327af927da3e

C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad\settings.dat

MD5 dc058ebc0f8181946a312f0be99ed79c
SHA1 0c6f376ed8f2d4c275336048c7c9ef9edf18bff0
SHA256 378701e87dcff90aa092702bc299859d6ae8f7e313f773bf594f81df6f40bf6a
SHA512 36e0de64a554762b28045baebf9f71930c59d608f8d05c5faf8906d62eaf83f6d856ef1d1b38110e512fbb1a85d3e2310be11a7f679c6b5b3c62313cc7af52aa

C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Preferences

MD5 bb956dc6c5e84a37e7e91fdf8baf1174
SHA1 59df8f7af173b1bb0c84b97057b75cdfc19bf5a8
SHA256 eed41daabb87796bc98ada75c3325d1cda90097bbba27806845c946c9352a35d
SHA512 c90c6c4ccc8ce66500306e9754fea9366e34e7194c81da60aa1adc68e0e50a37b3e83d46158fd857fed72c73fa49798e6e7e7ee430683e78e82496c234408173

C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Local State

MD5 c23e8e03d71b0cddb3e06b9cf1ef1b7b
SHA1 434748d4f9ade0b3aea85989997fcedb00c07c5e
SHA256 1aaba889a4429f1e7f9822296d0f84c5939b61f8485d4291bd2762b84782aaa2
SHA512 2717189f50393a22a7b488cf9960082c0efeb89835fb0e635fe46fd10a7e04a3afc7d987d22156da3723442dc2cedac79aad5ef216880c7d2cd089b48cee0716

C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Preferences

MD5 dd813fd857044b0374e20173c36957e9
SHA1 a45f775b22fb5a514d3dccef7b3bf16ff69696f6
SHA256 3f7d2814699bcb55abbd158ec59dec5f768826d5308d2334e157cd719ac74f2e
SHA512 51423098d553c08ce331d8e544a88a7e827c2c1a494ebd909063825d2ad3db039e93ab1c1c1379d66af2734817b6287bc98dcbd54c1a0e6e0a8abe4e4de0a783

C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index

MD5 f0e28ee19633a29d95467eaa43dc2486
SHA1 33b42a5fc377d9bf525da8bf7f25e52d163d3c5e
SHA256 e45090bfe510c508572694b2145cdac3e0ca6e83fb54f403e890723e19d7cb0d
SHA512 c29332d641ecdaa27e91b49f4987ec6804d6e6fd89fad3ae0d60d4c27b6a4b7d632d79aab66092277dd3ced1b188009adc83ebdb866d7bfebe57367dfcda8396

C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Network Persistent State

MD5 68960d6c215a45c58ef0274b0ebd1fc3
SHA1 58482dd9a3f82720d8a42136277c68d3d1977e80
SHA256 54b66d9dc642325884d73798d93fc85845093c81de696b7e7bef851312c37856
SHA512 6b7a52d898c3fe05b2c9be29307dae190a18f65504007939bdbed87aaef526064d224d757e82f1790bc8d021cb112752f64477fcd03a92efdb9877aa99fc3fb1

C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\data_reduction_proxy_leveldb\CURRENT

MD5 6752a1d65b201c13b62ea44016eb221f
SHA1 58ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA256 0861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA512 9cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389

C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Preferences

MD5 5ef09ed1b65d17e66ecccbb6b536fe9c
SHA1 ec92160e280c77db321c4d2a631a34fb64587c05
SHA256 b6dcb71c8dba79fcc6475626f086a604c79daf86bbfe381874054b88b1211290
SHA512 046945670399abde366ffa9b9a239db0e78f414defebed85c5e1474fc42f3cf37d7ab043f3009a7ea0a54703fb895b9890271c81f43898c9546f715dc48461d9

Analysis: behavioral1

Detonation Overview

Submitted

2024-12-31 08:53

Reported

2024-12-31 08:56

Platform

win7-20240903-en

Max time kernel

149s

Max time network

151s

Command Line

"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_0f834d9acbd24061a8dfe9120344fe7b.html

Signatures

SocGholish

downloader socgholish

Socgholish family

socgholish

System Location Discovery: System Language Discovery

discovery
Description Indicator Process Target
Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE N/A

Modifies Internet Explorer settings

adware spyware
Description Indicator Process Target
Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Toolbar C:\Program Files\Internet Explorer\iexplore.exe N/A
Set value (str) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" C:\Program Files\Internet Explorer\iexplore.exe N/A
Set value (int) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" C:\Program Files\Internet Explorer\iexplore.exe N/A
Set value (int) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "441797089" C:\Program Files\Internet Explorer\iexplore.exe N/A
Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Main C:\Program Files\Internet Explorer\iexplore.exe N/A
Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\LowRegistry C:\Program Files\Internet Explorer\iexplore.exe N/A
Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain C:\Program Files\Internet Explorer\iexplore.exe N/A
Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Zoom C:\Program Files\Internet Explorer\iexplore.exe N/A
Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive C:\Program Files\Internet Explorer\iexplore.exe N/A
Set value (int) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{BBC4A631-C754-11EF-8DAE-C28ADB222BBA} = "0" C:\Program Files\Internet Explorer\iexplore.exe N/A
Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery C:\Program Files\Internet Explorer\iexplore.exe N/A
Set value (int) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" C:\Program Files\Internet Explorer\iexplore.exe N/A
Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\IntelliForms C:\Program Files\Internet Explorer\iexplore.exe N/A
Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Main C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE N/A
Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\IETld\LowMic C:\Program Files\Internet Explorer\iexplore.exe N/A
Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\PageSetup C:\Program Files\Internet Explorer\iexplore.exe N/A
Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser C:\Program Files\Internet Explorer\iexplore.exe N/A
Set value (int) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" C:\Program Files\Internet Explorer\iexplore.exe N/A
Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch C:\Program Files\Internet Explorer\iexplore.exe N/A
Set value (str) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" C:\Program Files\Internet Explorer\iexplore.exe N/A
Set value (data) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 C:\Program Files\Internet Explorer\iexplore.exe N/A
Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\GPU C:\Program Files\Internet Explorer\iexplore.exe N/A
Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\DomainSuggestion C:\Program Files\Internet Explorer\iexplore.exe N/A
Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\InternetRegistry C:\Program Files\Internet Explorer\iexplore.exe N/A
Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage C:\Program Files\Internet Explorer\iexplore.exe N/A
Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic C:\Program Files\Internet Explorer\iexplore.exe N/A

Suspicious use of FindShellTrayWindow

Description Indicator Process Target
N/A N/A C:\Program Files\Internet Explorer\iexplore.exe N/A

Processes

C:\Program Files\Internet Explorer\iexplore.exe

"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_0f834d9acbd24061a8dfe9120344fe7b.html

C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE

"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2760 CREDAT:275457 /prefetch:2

Network

Country Destination Domain Proto
US 8.8.8.8:53 ajax.googleapis.com udp
US 8.8.8.8:53 www.blogger.com udp
US 8.8.8.8:53 apis.google.com udp
US 8.8.8.8:53 1.bp.blogspot.com udp
US 8.8.8.8:53 2.bp.blogspot.com udp
US 8.8.8.8:53 img1.blogblog.com udp
US 8.8.8.8:53 resources.blogblog.com udp
US 8.8.8.8:53 www.linkwithin.com udp
US 8.8.8.8:53 badge.facebook.com udp
US 8.8.8.8:53 3.bp.blogspot.com udp
US 8.8.8.8:53 4.bp.blogspot.com udp
US 8.8.8.8:53 feedjit.com udp
US 8.8.8.8:53 www.123myip.co.uk udp
US 8.8.8.8:53 static.networkedblogs.com udp
US 8.8.8.8:53 nwidget.networkedblogs.com udp
US 8.8.8.8:53 plipeo.com udp
FR 142.250.179.106:80 ajax.googleapis.com tcp
FR 216.58.215.33:80 4.bp.blogspot.com tcp
FR 142.250.179.106:443 ajax.googleapis.com tcp
FR 142.250.179.78:443 apis.google.com tcp
FR 216.58.215.33:80 4.bp.blogspot.com tcp
FR 216.58.215.33:80 4.bp.blogspot.com tcp
FR 142.250.179.106:80 ajax.googleapis.com tcp
FR 142.250.179.78:443 apis.google.com tcp
FR 216.58.214.169:443 resources.blogblog.com tcp
FR 216.58.214.169:443 resources.blogblog.com tcp
FR 216.58.214.169:443 resources.blogblog.com tcp
FR 216.58.215.33:80 4.bp.blogspot.com tcp
FR 216.58.215.33:80 4.bp.blogspot.com tcp
FR 216.58.214.169:443 resources.blogblog.com tcp
FR 216.58.215.33:80 4.bp.blogspot.com tcp
FR 216.58.215.33:80 4.bp.blogspot.com tcp
SG 118.139.179.30:80 www.linkwithin.com tcp
SG 118.139.179.30:80 www.linkwithin.com tcp
FR 216.58.214.169:443 resources.blogblog.com tcp
FR 216.58.214.169:443 resources.blogblog.com tcp
DE 52.29.79.39:80 www.123myip.co.uk tcp
DE 52.29.79.39:80 www.123myip.co.uk tcp
US 57.144.120.141:443 badge.facebook.com tcp
US 57.144.120.141:443 badge.facebook.com tcp
FR 216.58.214.169:80 resources.blogblog.com tcp
FR 216.58.214.169:80 resources.blogblog.com tcp
FR 216.58.215.33:80 4.bp.blogspot.com tcp
FR 216.58.215.33:80 4.bp.blogspot.com tcp
FR 216.58.215.33:80 4.bp.blogspot.com tcp
FR 216.58.215.33:80 4.bp.blogspot.com tcp
SG 104.43.113.7:80 plipeo.com tcp
SG 104.43.113.7:80 plipeo.com tcp
US 8.8.8.8:53 www.wieistmeineip.de udp
DE 3.123.209.133:443 www.wieistmeineip.de tcp
DE 3.123.209.133:443 www.wieistmeineip.de tcp
US 8.8.8.8:53 c.pki.goog udp
US 8.8.8.8:53 c.pki.goog udp
US 8.8.8.8:53 c.pki.goog udp
US 8.8.8.8:53 c.pki.goog udp
US 8.8.8.8:53 c.pki.goog udp
US 8.8.8.8:53 c.pki.goog udp
US 8.8.8.8:53 c.pki.goog udp
US 8.8.8.8:53 c.pki.goog udp
US 8.8.8.8:53 c.pki.goog udp
FR 142.250.179.67:80 c.pki.goog tcp
FR 142.250.179.67:80 c.pki.goog tcp
FR 142.250.179.67:80 c.pki.goog tcp
FR 142.250.179.67:80 c.pki.goog tcp
FR 142.250.179.67:80 c.pki.goog tcp
FR 142.250.179.67:80 c.pki.goog tcp
FR 142.250.179.67:80 c.pki.goog tcp
FR 142.250.179.67:80 c.pki.goog tcp
FR 142.250.179.67:80 c.pki.goog tcp
SG 104.43.113.7:443 plipeo.com tcp
US 8.8.8.8:53 o.pki.goog udp
US 8.8.8.8:53 o.pki.goog udp
US 8.8.8.8:53 o.pki.goog udp
US 8.8.8.8:53 o.pki.goog udp
US 8.8.8.8:53 o.pki.goog udp
US 8.8.8.8:53 o.pki.goog udp
US 8.8.8.8:53 o.pki.goog udp
US 8.8.8.8:53 o.pki.goog udp
US 8.8.8.8:53 o.pki.goog udp
FR 142.250.179.67:80 o.pki.goog tcp
FR 142.250.179.67:80 o.pki.goog tcp
FR 142.250.179.67:80 o.pki.goog tcp
FR 142.250.179.67:80 o.pki.goog tcp
FR 142.250.179.67:80 o.pki.goog tcp
FR 142.250.179.67:80 o.pki.goog tcp
FR 142.250.179.67:80 o.pki.goog tcp
FR 142.250.179.67:80 o.pki.goog tcp
FR 142.250.179.67:80 o.pki.goog tcp
US 8.8.8.8:53 static.xx.fbcdn.net udp
SG 104.43.113.7:443 plipeo.com tcp
US 57.144.120.128:443 static.xx.fbcdn.net tcp
US 57.144.120.128:443 static.xx.fbcdn.net tcp
SG 104.43.113.7:443 plipeo.com tcp
US 8.8.8.8:53 www.blogblog.com udp
US 8.8.8.8:53 www.facebook.com udp
US 57.144.120.1:80 www.facebook.com tcp
US 57.144.120.1:80 www.facebook.com tcp
FR 216.58.214.169:80 www.blogblog.com tcp
FR 216.58.214.169:80 www.blogblog.com tcp
US 8.8.8.8:53 ocsp.r2m02.amazontrust.com udp
US 8.8.8.8:53 ocsp.r2m02.amazontrust.com udp
FR 13.249.8.192:80 ocsp.r2m02.amazontrust.com tcp
US 8.8.8.8:53 mamasoyaku.blogspot.com udp
FR 13.249.8.192:80 ocsp.r2m02.amazontrust.com tcp
FR 216.58.213.65:80 mamasoyaku.blogspot.com tcp
FR 216.58.213.65:80 mamasoyaku.blogspot.com tcp
US 8.8.8.8:53 accounts.google.com udp
US 57.144.120.1:443 www.facebook.com tcp
NL 142.250.27.84:443 accounts.google.com tcp
NL 142.250.27.84:443 accounts.google.com tcp
SG 104.43.113.7:443 plipeo.com tcp
US 8.8.8.8:53 blogger.googleusercontent.com udp
US 8.8.8.8:53 i43.tinypic.com udp
US 8.8.8.8:53 www.purebaby.co.id udp
US 8.8.8.8:53 wgweb.msg.yahoo.com udp
US 8.8.8.8:53 www6.cbox.ws udp
US 8.8.8.8:53 i879.photobucket.com udp
FR 142.250.179.65:443 blogger.googleusercontent.com tcp
FR 142.250.179.65:443 blogger.googleusercontent.com tcp
FR 142.250.179.65:443 blogger.googleusercontent.com tcp
FR 142.250.179.65:443 blogger.googleusercontent.com tcp
FR 142.250.179.65:443 blogger.googleusercontent.com tcp
FR 142.250.179.65:443 blogger.googleusercontent.com tcp
FR 3.165.113.35:80 i879.photobucket.com tcp
FR 3.165.113.35:80 i879.photobucket.com tcp
US 108.181.41.161:80 www6.cbox.ws tcp
US 108.181.41.161:80 www6.cbox.ws tcp
FR 3.165.113.35:443 i879.photobucket.com tcp
US 8.8.8.8:53 www.google.com udp
FR 172.217.20.164:443 www.google.com tcp
FR 172.217.20.164:443 www.google.com tcp
ID 101.255.93.254:80 www.purebaby.co.id tcp
ID 101.255.93.254:80 www.purebaby.co.id tcp
US 8.8.8.8:53 adv.blogupp.com udp
US 8.8.8.8:53 female.store.co.id udp
ID 203.161.184.73:80 female.store.co.id tcp
ID 203.161.184.73:80 female.store.co.id tcp
US 76.223.54.146:80 adv.blogupp.com tcp
US 76.223.54.146:80 adv.blogupp.com tcp
US 8.8.8.8:53 www.godaddy.com udp
GB 95.100.244.9:443 www.godaddy.com tcp
GB 95.100.244.9:443 www.godaddy.com tcp
GB 95.100.244.9:443 www.godaddy.com tcp
US 8.8.8.8:53 crl.microsoft.com udp
GB 88.221.134.146:80 crl.microsoft.com tcp
US 8.8.8.8:53 www.microsoft.com udp
GB 95.100.245.144:80 www.microsoft.com tcp
US 204.79.197.200:443 ieonline.microsoft.com tcp
US 204.79.197.200:443 ieonline.microsoft.com tcp
US 8.8.8.8:53 www.microsoft.com udp
US 8.8.8.8:53 www.microsoft.com udp
US 204.79.197.200:443 ieonline.microsoft.com tcp

Files

C:\Users\Admin\AppData\Local\Temp\Cab45B9.tmp

MD5 49aebf8cbd62d92ac215b2923fb1b9f5
SHA1 1723be06719828dda65ad804298d0431f6aff976
SHA256 b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512 bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b

C:\Users\Admin\AppData\Local\Temp\Tar4668.tmp

MD5 4ea6026cf93ec6338144661bf1202cd1
SHA1 a1dec9044f750ad887935a01430bf49322fbdcb7
SHA256 8efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA512 6c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b

C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\24BD96D5497F70B3F510A6B53CD43F3E_3A89246FB90C5EE6620004F1AE0EB0EA

MD5 e7c450eec27f0118f5fe865e7ccf6924
SHA1 87eb5002f95146fddb51709a045f033ce4b4740a
SHA256 d96826315bebc0e54e62cc4414588b7b2bc79644bc4c174937ea022d84f08fc6
SHA512 c8f25554624e56e05c816b0486c555907f181089dcacb01b53190b61da01b1ecd493979cfe7a87b2167fbb7b5644c5e89161aa3bed2a30a9e977bf11ef00c3b0

C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\24BD96D5497F70B3F510A6B53CD43F3E_3A89246FB90C5EE6620004F1AE0EB0EA

MD5 2c6a716322b1217cff8ad50238ddeb43
SHA1 6930e2b29b24f81ec2918d96957fd61b9ff019b7
SHA256 48d7a039e88ef29e87ee97cf866f3daa3f06f5bfc5f033defe2eb42bdf56b136
SHA512 3fb1fad7421452e8a7049ef69118f656f39e30d86807ad5d499c2d49e0916c3de8cca237cb2575cfe1c5a9b2507748e5311eb94a7e205341dd62ff2428cb97b8

C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

MD5 dda58ef92b6207fe022af77b6a1f78a7
SHA1 f2437b98b7aaaca8caa20b0f7adecdcfbf684b12
SHA256 62c387418014fa33ab9d403e320cb72d57f5440edd858511642f4d1ce2aeb135
SHA512 85d0ed20315fdf964c043d453831a6ebb2d60e2e1586c5eb06260be0c2cf018bd8acde3f007e79ea6bd4cbee0eb86da22d59b1a2d54b87e088a461b26feb0315

C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

MD5 621e70dcf012a6586734e95fc17ee25d
SHA1 a4a729444eef51f3e9401663fcace29777f9f0d1
SHA256 b74edc571aaab668ad1df56b0a25799e2ad40f1db3453e4c98fe0eccd8b5da6d
SHA512 6eccfca2ac96cfa0bee7062bf701341cedc20bba09b62157fe8163fea05e715791aa8cb3a845963a14bc1aae4bde5147e2864b83d1fb6204f66ea90745264747

C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\05DDC6AA91765AACACDB0A5F96DF8199

MD5 cbefd53661b9c1eb61bb22708878075e
SHA1 30e27e59e3c4d7eae8856c8741694ee2ff1649fe
SHA256 b693acfcfe4c023becd56017bbcb4ba4496ae8342434e27979b982308396fc46
SHA512 df88d042157c7fe2b58328b9afdb56b76ee1801f00cba2600fc1a4f2f56e3926194f17e3e1dab18bacc165a2ebd9a4b18f0cffa068bba8e7aae397570888dd3b

C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\05DDC6AA91765AACACDB0A5F96DF8199

MD5 e935bc5762068caf3e24a2683b1b8a88
SHA1 82b70eb774c0756837fe8d7acbfeec05ecbf5463
SHA256 a8accfcfeb51bd73df23b91f4d89ff1a9eb7438ef5b12e8afda1a6ff1769e89d
SHA512 bed4f6f5357b37662623f1f8afed1a3ebf3810630b2206a0292052a2e754af9dcfe34ee15c289e3d797a8f33330e47c14cbefbc702f74028557ace29bf855f9e

C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\05DDC6AA91765AACACDB0A5F96DF8199

MD5 28d175cd280a7b82a0706f2754aac25e
SHA1 6758cb1fe8d509baaf4551eb7b70250a16dfb308
SHA256 4a50c4c8623a9ce1802d29e6919642b2891e19d3024da7959ed972e1bc8f31bd
SHA512 dbba160e7f8e5ac9f7a9ee71c4c14211e0a447b9303a698c4abfd2b98e08c4340ccf357b493dea37845bf43991fe83996710ef31c6128c1f855a23a38230357d

C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

MD5 2f43cf7387991f9a502fb8e785f9fd50
SHA1 0100a24c96e90d079eed58dd09d4ff46dd7a1473
SHA256 702d402f09abcf470cc278e8fd31bc78e1d13dfe5394d84a1db9c0751a0bebe4
SHA512 a88d8c30434a3ca82288b82394717893cca188c21278658984a6850898b7592ef8aeabab50b874f9372f84d038fb6d94688f4862535aa39bfd568b3bf7e9b8a8

C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

MD5 4162f43815ab0c0559d5ebac17ef2b9e
SHA1 3ed42c7019548d022103ba39df7ff03a901cd027
SHA256 c46b7007b18e82156881adf622d2228de5f6e8b8a20381ee83a631b21e02815f
SHA512 bdb6eb5c512acd3bea0e571ef38d8b3310f06b304e4dbf23cc9b6db106ef5d000ad2295dfc8fd5455efc2fa1ec0737eda618642620ad62c7e153785691086a1f

C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\070E0202839D9D67350CD2613E78E416

MD5 8245218c839c56c6fa9c32ec4cfdf4bc
SHA1 d09b0c34076326bf75a3eadb1bba41734728a377
SHA256 56951a66ab96118ef4bc216e8a1e21c3b02e6932a1d62b15f539d135a7924be0
SHA512 5633ba658cf857e772bdb89defdb49ff35c5f70deaaa27f2eaeb09d355e4fc434d7e32a78fd0ad9430c412deb00fcd70ec0dc45e693bb96a53829991445cf112

C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\070E0202839D9D67350CD2613E78E416

MD5 55540a230bdab55187a841cfe1aa1545
SHA1 363e4734f757bdeb89868efe94907774a327695e
SHA256 d73494e3446b02167573b3cde3ae1c8584ac26e15e45ac3ec0326708425d90fb
SHA512 c899cb1d31d3214fd9dc8626a55e40580d3b2224bf34310c2abd85d0f63e2dedaeae57832f048c2f500cb2cbf83683fcb14139af3f0b5251606076cdb4689c54

C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

MD5 3b2f14c60abcf033eb1a1224c156cbcd
SHA1 4c2e42cf41d6a00ba1bbcfba207d2828808b7072
SHA256 2a109d83314d0544d12b5bfab7d6d61b1b16f57792fb66e93d427209e4bc4631
SHA512 c5f9957d78fd6e3fc0c73590ab335f8410f0494b1dc8a06ad54f7e178d28eba692de9305d4b0b1576832317fee61e14e28b06b541a22dc97bab6ccdee7ad2ff3

C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\C02877841121CC45139CB51404116B25_2AC354D163B9A95ED11B23DFC6FCD931

MD5 36def261994383fe9bb5e79cd4ffca0a
SHA1 0ae7027debcbd815443d079a9140cba9df677751
SHA256 6ce63a5da9fd7f361747009a2bfd1abf0d97ed008569cc8bd3218792f26e3e8d
SHA512 c6015e67276257e7e29084af83810127ece5fbac74767c42a50db28ec51024bde3c375217ef0a6e0e1ff04ecda40bb63dde4c589cca9225baf65dbbac8ace00b

C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\C02877841121CC45139CB51404116B25_2AC354D163B9A95ED11B23DFC6FCD931

MD5 a7bbcd82890fdf8700d42c4c1cd5548e
SHA1 f79633a1cef381ebae67014d54c4ab7df11bbee6
SHA256 0bcc3a076dbecf18e60c634dbfec9b057ee258eae4449a7fd430b19012167ad7
SHA512 acf2a928770c3676413375b3b96122288a19b5a27ac32dfbe101783727d75ba1b4720c85cd3e7c75ec96196c972e883c39001804ddb992e25ffc60746dc9083b

C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

MD5 69bba4bff5d24cb4cb1cf43feec002e2
SHA1 155cacc6f9eb9c2b685327bbe8f99dd3627bf0a7
SHA256 a7a7298002ed5e0fabc3e20a5b0f621e6faffb27b211e06bc6a57f3d97606a29
SHA512 c7f457a557f7d15fbc150b3d6be952d012c62f8e223ef4cdbe30aaf6767b015aa94ee21f0f11d4d2438f7b2f55eebc6695f9391676d114a496ba77833fb82bd1

C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

MD5 914bcaae3c9b49ff50b281f1ce665185
SHA1 48d4e72cfc76b09189876656799366854b89845b
SHA256 2290ff597a2792575f86b99edd995d1fcefbddb7766042ac9b58df790fbf5fe0
SHA512 2c0a5b6efa4c26466cecdec783e04616c362f203881c36a4bbf07f405da5a6667aa40f0d8b7548d6be6923eed83548eb2a99351678460d88c277e44ab91d9068

C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\B3513D73A177A2707D910183759B389B_DFB78462C65FAC2750B89E1A8A1F9A53

MD5 4ee1c7c44112afc02d0b8a0ad9f76901
SHA1 72612ed3051a8b73cfb4f2eaaba1cc27e3b9b045
SHA256 93fa6eaaf820ee5428cbecfc67e3c8077af88aae78f785f978911dfb1935ce34
SHA512 81914fb828bb61234b2b93489f3d2531cf04b195dd5995ef62e86101f6cab396d1b8f7825b8704e2d4ee6d472f896e968710bcf463984135208e98963ed49ea9

C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\B3513D73A177A2707D910183759B389B_DFB78462C65FAC2750B89E1A8A1F9A53

MD5 97cfb7ac32a586dd1f0828c0faa9ad77
SHA1 ee7ae16daf8f582b16d89f11970f50a68dd258f5
SHA256 c61b03c58c37d72080b213b4bf601fa85b6cb2026a9189566fd7d7905f76fe08
SHA512 894bfc411fd94b1d7133099d760707a85fc931ea487b62a452c91cb731c3bf87791693e6d4d9c989c40927533a82c3489158d9343b27f5fd293b624eb715bc60

C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

MD5 8cf570e0b662f1869d986ba4f04e2623
SHA1 c437996b8fc8ce6f59954578f897d22b42d88ab4
SHA256 c22b4b88869576e25713682470fdcc7e5833167a01e047c43138b7edae39f4bc
SHA512 b05d64bcd081f5d05ba60def9465842ba3520c2978530e928bd5dd3cd7a742140a0f773031880781e50d1131932a779d021ed4125fee5bf24e8751cddd9f11fa

C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

MD5 812e5ce6fdc04102f98197db497eab66
SHA1 e4f29b70c6f7e1ede5a8d7d20320c5dde26b2dfb
SHA256 6a79428a34bfbd8c282b330a706c6c86f94de87aae2ab086f36759e248e8e6ba
SHA512 dba6720e9a7c774d585cd22b80b3e553d99d5602d64ae4965753a6136c4b34928cb84eab644782971d0124ac2a565f80eb2750d0ca8c597cfcbc6dd8290a073a

C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

MD5 2f61bc66566b9fba2ba1935fe37989ba
SHA1 3e89da0c80d98e9c7c38addca4fe75caed1fae97
SHA256 a3172913595ee5e5f4b91b974237e2e9ed5e4c999a6c808f30b264383e93c9b8
SHA512 7fcb1e88842f38a6fc21ac93098481231ee604845381d4e23664b5a0061e72de9c8f7d50ccd6126da5e02ea891568fc762f0db67b5915de1b49ba0168a23bf7f

C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

MD5 dbf760e2505619ac25ad2a888599103c
SHA1 b302be9b178084589287f383906a09a91eacd7d4
SHA256 56e4e6a2cdef03b549c0870e3c6a4fa4b2ea68fafe63b7fa1255fb484c5d91ee
SHA512 bd6225d3f6ae5cbd49a5c2cc39dd2961c74d78afe811c8106bb24396c1282af3d98869646eb553ba8bf4d6ef41ad467d1345ccf9cf225a22cada595d38bde8dd

C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

MD5 7eec7ab8657f5de9d6424ea471ddb0d3
SHA1 38c97f0807a7baefd557dbb59208dde318fb60f9
SHA256 bbdb18148f7e7b9eeb1a73c0246e3f3130706230ffc693e2d4b8676c72086b70
SHA512 a174c34f1730749ac887dab127bc10bee108303dcd165f359503b4b4f4e2689b69d493646e7ad81c06f8066f47ae229e31dd2472390ca6783bbdafa317193433

C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

MD5 997cfbbd9991ec4d75a805a64f7c1827
SHA1 621ef1cb3b19f1b223dd0727af12d2143f5f54bc
SHA256 d518771937694ea66eeb99d0ad8a0cfb4254ed8e92eeaff898792f54438a6496
SHA512 950c36a93df62717fbe583618718666a7cf20461dd19efeac8caca46987b54de773857dc046c9c3aaf017c45cdaea8651f42b981d23a4af23bcda188fa2e9b66

C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

MD5 6b4fd505ba91156d5e6de25b972713b4
SHA1 c840bd6c82d4c830302593ab3157ce4208e5e5f7
SHA256 724d7b2f84481ebddfab6cf54001a19e1f1e54af5dfc2e4a1c4b516ee1d307cb
SHA512 b08761fcc435f4d9071bfe32a5f469b2566f0dc1b01baac142b8ba01baf3340825a657ebeed686d829f0c922ba67ea2360f5f31c3f28b652c1ff7bb78295bfdc

C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

MD5 cf5b3a22a0694d34a50225bb858cf692
SHA1 5cff3047201e62a6d3d67192145017870f7987c7
SHA256 e54baeed16cf19982c7caaf5e920c88d0fa4c317e55c44088834ebd3cb2d16de
SHA512 20b659c1d4e35e609858747d983ab9689fef320bf027568cff581f2eae38730fbfd6ab2ea3e776fdae819e462b0002d4e4c937231f530a187a98963a64f73daf

C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

MD5 d8aa39243d77266409ca9106f53a75d0
SHA1 2d7091753431169261e7b3bd0c5b3c545cce6687
SHA256 0643118af2dda8c6c90a31c384d4e05a12b9bea4eba21dd48d10675a351b7d70
SHA512 875d50f7f268a9e26ebe38c6fe5022b747f1cb9d353f9004641ea496de00f520e87fdb4ecd4f737cb8f2099d7d8c667cce40d7d2a30328c86cc24bc38632585d

C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

MD5 c6f1bba8fcb2f3564ec3cf35ca9e8195
SHA1 e095c9a9aaeacea6cf6206bc32a5e4bc24969562
SHA256 1bc9c4d1abeec79cc5b11314506424ed53d1356c8720ecda9ffd31cc462de97e
SHA512 addecc1e32bda4be967ca3739c6a55e45b02aedc6e2e862ae52c982c7854da11b04cbb47d776bd26de4b88d32b8371fd9e7ace6d10d2d089de4942d63db4fc54

C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

MD5 c2589623ba88034dd30bd6f4f0e530df
SHA1 8254857f6a785936b68f34cf759dd98d1a3fc427
SHA256 90d092892c538ae73297654e535368fb0e45fcc0cddf488c5c1e82558dcfc985
SHA512 4c2f056ff0e9c6fb8697e00c854b1935e08a15cecfc4b6e6f6c0b1f2eea04f43aa778679ae8954f383472d9df0c970202e0e47e1373cc3f76136feca626e0214

C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

MD5 1d69a02d9f657796cf165f1ff48081a6
SHA1 4c1ac8a17bfd135a98e94609360d41b507c63e89
SHA256 d7bc11df03b86865b0eea5fe672abbc9594f90dacf259a209d5d07ea91a5bd92
SHA512 6f6850d217c0b91b7286e72818bace75b0969d79d8f031d696d5b2b0dabbca81aecc1959040a5fbe3c10fa68dce3531fb7e3a66c0282e5c9932bf010ef4bbc8e

C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\F0ACCF77CDCBFF39F6191887F6D2D357

MD5 a266bb7dcc38a562631361bbf61dd11b
SHA1 3b1efd3a66ea28b16697394703a72ca340a05bd5
SHA256 df545bf919a2439c36983b54cdfc903dfa4f37d3996d8d84b4c31eec6f3c163e
SHA512 0da8ef4f8f6ed3d16d2bc8eb816b9e6e1345dfe2d91160196c47e6149a1d6aedaafadcefd66acdea7f72dcf0832770192ceac15b0c559c4ccc2c0e5581d5aefc

C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\F0ACCF77CDCBFF39F6191887F6D2D357

MD5 bea97caad109baee3fea084c528be25d
SHA1 b95aa0610c01baaee2a10f1595778e2d0a07f36b
SHA256 135fc9733bde7e2ac57bd0f6182f6dc94bf5004239cb19bce866e641195352a6
SHA512 3ae8cb929a3213124925a15b5000959dcac0f06b092f274853257fd910e523ef87f9dc8d09bd075b82bbd0333ecc28a414536e4146c7ea9f1b58ed5edd986086

C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

MD5 8a7718e08dd42fccd6c0203d59e299d3
SHA1 62b713a857b012b0508c707b90ad5ff2069c1eda
SHA256 532771c6a0fa4468fdef00fcaaea69f223200a56f195ca3eceb9b5aaab6164a4
SHA512 69742a9df05432d5c11dc6674e2b2628d8baa9dade1c57c55f8fc73c05e50c97621076e2d8ba6d2388b008f478ace51c8a65d3bfa90b7c6298ab7c907edbbf51

C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

MD5 00f97604794415285e9d726b684222f7
SHA1 da4f33d87ffa48b635be9882e7a4527aa06fa89c
SHA256 553efbcba843886c8c43d7164f0319c82a31891f4f8b041c80d10905bfecdb00
SHA512 68ff023c9511ea41c7e4b3a328806d5f5ac9c048c21289b405b2c02708236cc3bc6f8dbf312792e6a87433efe062f4aad168f2cf1cdbcc597788680b4020225b

C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

MD5 675a2e5a498cfc8d5cba5817810aabb9
SHA1 6f6510e3f1a1899ff0d895e527c422e8aaa072f4
SHA256 da6f235dbeffcaf3b4ce7850fb65ad4a6825fae3786028218cd7a19da0dd984c
SHA512 afe28b5166db1910bf14556761b5a8a91cae512840dc507bdae71c5d32b538b2b704798a486c904291f04afe6768ba61e09ff210344b08fc4d6cf3ae145dad08

C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

MD5 84dacd3387d9fcc3c3890164e3754264
SHA1 3446373a03db34bd8cbf0047e91b73198a81c9f9
SHA256 550b53d838cfb06e307d1b1ef538f59a030d7247a5931f5cf52cb98e5c25f0b6
SHA512 a0d7260474c31be11b3f8f3c6addd1f1231cf29128d6e8ea76dd11e36ca839051fd0315b745cbe7641f3d8ac12ef6e6dc4c83fb8f8a4708d33b8ad58417e72aa

C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

MD5 b072b40bd2d6fe24c3300e269a3acb5d
SHA1 fc038a81fe4c6bfd59c882821faea09475720835
SHA256 685824e8337080e753bb1107ae29a6926ff341526a52f9644f4ab49b298009c1
SHA512 8e99e53fed3e84f514120e256883665ac3258fe86220627cb3c767f646b3fda62fad4d05d30d6ba36e7ff7d49d487c66786025d5ce7648f5fef433d09c9c095b

C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\3C428B1A3E5F57D887EC4B864FAC5DCC

MD5 e4a68ac854ac5242460afd72481b2a44
SHA1 df3c24f9bfd666761b268073fe06d1cc8d4f82a4
SHA256 cb3ccbb76031e5e0138f8dd39a23f9de47ffc35e43c1144cea27d46a5ab1cb5f
SHA512 5622207e1ba285f172756f6019af92ac808ed63286e24dfecc1e79873fb5d140f1ceb7133f2476e89a5f75f711f9813a9fbb8fd5287f64adfdcc53b864f9bdc5

C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\3C428B1A3E5F57D887EC4B864FAC5DCC

MD5 21ad5b15595e3c7bd1c097006634d5d2
SHA1 1a2fb362a3a107827da435c36145b2d91ac988cf
SHA256 57fc9db388ae0295b68bc0b9528185bbe8045f9934986946cb73eee3995b44ee
SHA512 c4a2f42dcd515b2635eae08bcef76d3dd473b16ce5b28f9e04c4b1b41a285af58f3782143929c12c697541f661874f713f413898e83348ed1b5441ff4c19c5d7

C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

MD5 e8059b7abff2f9666cdac72edc1dff12
SHA1 697f54b613dc7db7470762cb1685305fd6b74d02
SHA256 954ec003d694e99e62569070d354300654aaecb1b239a02dbc986297dd5cb5b7
SHA512 fb85cbc448daaed146af0acf6ee6d2158765a5e3abd92bd7c89d8037cb146f028a9d02175ac2189902059a82e1b4077ec2a8d01d5c6421aa784afac943441bac