Malware Analysis Report

2025-03-14 21:46

Sample ID 250127-e8nmsa1naz
Target JaffaCakes118_3c08c4bbd20dc33117169176315a7728
SHA256 37a80ab139fb878b89ee86cc8bdedf90ee263cff442d00fc9edd8b9f5826744c
Tags
phishing google discovery
score
10/10

Table of Contents

Analysis Overview

MITRE ATT&CK

Enterprise Matrix V15

Analysis: static1

Detonation Overview

Signatures

Analysis: behavioral1

Detonation Overview

Command Line

Signatures

Processes

Network

Files

Analysis: behavioral2

Detonation Overview

Command Line

Signatures

Processes

Network

Files

Analysis Overview

score
10/10

SHA256

37a80ab139fb878b89ee86cc8bdedf90ee263cff442d00fc9edd8b9f5826744c

Threat Level: Known bad

The file JaffaCakes118_3c08c4bbd20dc33117169176315a7728 was found to be: Known bad.

Malicious Activity Summary

phishing google discovery

Detected google phishing page

A potential corporate email address has been identified in the URL: [email protected]

A potential corporate email address has been identified in the URL: [email protected]

Legitimate hosting services abused for malware hosting/C2

Detected phishing page

Browser Information Discovery

System Location Discovery: System Language Discovery

Modifies Internet Explorer settings

Suspicious use of SetWindowsHookEx

Suspicious use of SendNotifyMessage

Suspicious use of FindShellTrayWindow

Enumerates system info in registry

Suspicious behavior: EnumeratesProcesses

Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary

Suspicious use of WriteProcessMemory

MITRE ATT&CK

Analysis: static1

Detonation Overview

Reported

2025-01-27 04:36

Signatures

Detected phishing page

phishing

Analysis: behavioral1

Detonation Overview

Submitted

2025-01-27 04:36

Reported

2025-01-27 04:39

Platform

win7-20240903-en

Max time kernel

118s

Max time network

143s

Command Line

"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_3c08c4bbd20dc33117169176315a7728.html

Signatures

Detected google phishing page

phishing google
Description Indicator Process Target
N/A N/A C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE N/A

A potential corporate email address has been identified in the URL: [email protected]

phishing

Legitimate hosting services abused for malware hosting/C2

Description Indicator Process Target
N/A sites.google.com N/A N/A
N/A sites.google.com N/A N/A

System Location Discovery: System Language Discovery

discovery
Description Indicator Process Target
Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE N/A

Modifies Internet Explorer settings

adware spyware
Description Indicator Process Target
Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\InternetRegistry C:\Program Files\Internet Explorer\iexplore.exe N/A
Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\LowRegistry C:\Program Files\Internet Explorer\iexplore.exe N/A
Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage C:\Program Files\Internet Explorer\iexplore.exe N/A
Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\PageSetup C:\Program Files\Internet Explorer\iexplore.exe N/A
Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Toolbar C:\Program Files\Internet Explorer\iexplore.exe N/A
Set value (int) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" C:\Program Files\Internet Explorer\iexplore.exe N/A
Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch C:\Program Files\Internet Explorer\iexplore.exe N/A
Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\GPU C:\Program Files\Internet Explorer\iexplore.exe N/A
Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\DomainSuggestion C:\Program Files\Internet Explorer\iexplore.exe N/A
Set value (data) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 C:\Program Files\Internet Explorer\iexplore.exe N/A
Set value (int) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "444114479" C:\Program Files\Internet Explorer\iexplore.exe N/A
Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Main C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE N/A
Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic C:\Program Files\Internet Explorer\iexplore.exe N/A
Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\IETld\LowMic C:\Program Files\Internet Explorer\iexplore.exe N/A
Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\IntelliForms C:\Program Files\Internet Explorer\iexplore.exe N/A
Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain C:\Program Files\Internet Explorer\iexplore.exe N/A
Set value (int) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{53460D01-DC68-11EF-8587-EAF82BEC9AF0} = "0" C:\Program Files\Internet Explorer\iexplore.exe N/A
Set value (str) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" C:\Program Files\Internet Explorer\iexplore.exe N/A
Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery C:\Program Files\Internet Explorer\iexplore.exe N/A
Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Main C:\Program Files\Internet Explorer\iexplore.exe N/A
Set value (int) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" C:\Program Files\Internet Explorer\iexplore.exe N/A
Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Zoom C:\Program Files\Internet Explorer\iexplore.exe N/A
Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive C:\Program Files\Internet Explorer\iexplore.exe N/A
Set value (str) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" C:\Program Files\Internet Explorer\iexplore.exe N/A
Set value (int) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" C:\Program Files\Internet Explorer\iexplore.exe N/A
Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser C:\Program Files\Internet Explorer\iexplore.exe N/A

Suspicious use of FindShellTrayWindow

Description Indicator Process Target
N/A N/A C:\Program Files\Internet Explorer\iexplore.exe N/A

Processes

C:\Program Files\Internet Explorer\iexplore.exe

"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_3c08c4bbd20dc33117169176315a7728.html

C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE

"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2308 CREDAT:275457 /prefetch:2

Network

Country Destination Domain Proto
US 8.8.8.8:53 bloggerstyles.com udp
US 8.8.8.8:53 lh5.ggpht.com udp
US 8.8.8.8:53 apis.google.com udp
US 8.8.8.8:53 lh5.googleusercontent.com udp
US 8.8.8.8:53 lh3.ggpht.com udp
US 8.8.8.8:53 lh4.ggpht.com udp
US 8.8.8.8:53 c4.ac-images.myspacecdn.com udp
US 8.8.8.8:53 c3.ac-images.myspacecdn.com udp
US 8.8.8.8:53 c2.ac-images.myspacecdn.com udp
US 8.8.8.8:53 c1.ac-images.myspacecdn.com udp
US 8.8.8.8:53 img1.blogblog.com udp
US 8.8.8.8:53 bloggertipspro.googlepages.com udp
US 8.8.8.8:53 i298.photobucket.com udp
US 8.8.8.8:53 connect.facebook.net udp
US 8.8.8.8:53 pipes.yahoo.com udp
US 8.8.8.8:53 i149.photobucket.com udp
US 8.8.8.8:53 www.pustamiska.pl udp
US 8.8.8.8:53 www.pajacyk.pl udp
US 8.8.8.8:53 img357.imageshack.us udp
US 8.8.8.8:53 1.bp.blogspot.com udp
US 8.8.8.8:53 widgets.amung.us udp
US 8.8.8.8:53 tcr.tynt.com udp
US 8.8.8.8:53 pics7.inxhost.com udp
GB 142.250.187.193:80 lh4.ggpht.com tcp
GB 142.250.187.193:80 lh4.ggpht.com tcp
GB 142.250.187.193:80 lh4.ggpht.com tcp
GB 142.250.187.193:80 lh4.ggpht.com tcp
FR 216.58.215.33:80 1.bp.blogspot.com tcp
FR 216.58.215.33:80 1.bp.blogspot.com tcp
FR 142.250.179.78:443 apis.google.com tcp
GB 172.217.16.225:443 lh5.googleusercontent.com tcp
FR 142.250.179.78:443 apis.google.com tcp
GB 172.217.16.225:443 lh5.googleusercontent.com tcp
PL 195.149.198.194:80 www.pajacyk.pl tcp
PL 195.149.198.194:80 www.pajacyk.pl tcp
US 38.99.77.16:80 img357.imageshack.us tcp
US 38.99.77.16:80 img357.imageshack.us tcp
GB 142.250.187.193:80 lh4.ggpht.com tcp
GB 142.250.187.193:80 lh4.ggpht.com tcp
GB 216.137.44.112:80 i149.photobucket.com tcp
GB 216.137.44.112:80 i149.photobucket.com tcp
GB 216.137.44.112:80 i149.photobucket.com tcp
US 104.22.74.171:80 widgets.amung.us tcp
US 104.22.74.171:80 widgets.amung.us tcp
FR 216.58.214.169:80 img1.blogblog.com tcp
FR 216.58.214.169:80 img1.blogblog.com tcp
US 15.197.148.33:80 bloggerstyles.com tcp
US 15.197.148.33:80 bloggerstyles.com tcp
US 15.197.148.33:80 bloggerstyles.com tcp
US 15.197.148.33:80 bloggerstyles.com tcp
US 15.197.148.33:80 bloggerstyles.com tcp
US 15.197.148.33:80 bloggerstyles.com tcp
US 104.18.13.146:80 tcr.tynt.com tcp
GB 142.250.200.51:80 bloggertipspro.googlepages.com tcp
GB 142.250.200.51:80 bloggertipspro.googlepages.com tcp
US 104.18.13.146:80 tcr.tynt.com tcp
FR 216.58.215.33:80 1.bp.blogspot.com tcp
FR 216.58.215.33:80 1.bp.blogspot.com tcp
GB 216.58.212.194:80 pagead2.googlesyndication.com tcp
GB 216.58.212.194:80 pagead2.googlesyndication.com tcp
FR 163.70.128.23:80 connect.facebook.net tcp
FR 163.70.128.23:80 connect.facebook.net tcp
GB 3.166.49.84:80 c1.ac-images.myspacecdn.com tcp
GB 3.166.49.84:80 c1.ac-images.myspacecdn.com tcp
GB 3.166.49.101:80 c1.ac-images.myspacecdn.com tcp
GB 3.166.49.101:80 c1.ac-images.myspacecdn.com tcp
GB 3.166.49.101:80 c1.ac-images.myspacecdn.com tcp
GB 216.137.44.125:80 i149.photobucket.com tcp
GB 216.137.44.125:80 i149.photobucket.com tcp
GB 3.166.49.101:80 c1.ac-images.myspacecdn.com tcp
GB 3.166.49.101:80 c1.ac-images.myspacecdn.com tcp
PL 195.78.67.53:80 www.pustamiska.pl tcp
PL 195.78.67.53:80 www.pustamiska.pl tcp
GB 3.166.49.56:80 c1.ac-images.myspacecdn.com tcp
GB 3.166.49.56:80 c1.ac-images.myspacecdn.com tcp
GB 216.137.44.112:443 i149.photobucket.com tcp
GB 216.137.44.112:443 i149.photobucket.com tcp
GB 216.137.44.112:443 i149.photobucket.com tcp
RU 45.130.41.107:80 pics7.inxhost.com tcp
RU 45.130.41.107:80 pics7.inxhost.com tcp
US 8.8.8.8:53 sites.google.com udp
GB 216.137.44.125:443 i149.photobucket.com tcp
FR 163.70.128.23:443 connect.facebook.net tcp
GB 216.58.201.110:80 sites.google.com tcp
GB 216.58.201.110:80 sites.google.com tcp
PL 195.78.67.53:443 www.pustamiska.pl tcp
US 8.8.8.8:53 c.pki.goog udp
US 8.8.8.8:53 c.pki.goog udp
US 8.8.8.8:53 c.pki.goog udp
US 8.8.8.8:53 c.pki.goog udp
US 8.8.8.8:53 nethcdn.com udp
GB 172.217.16.227:80 c.pki.goog tcp
FR 216.58.213.67:80 c.pki.goog tcp
FR 216.58.213.67:80 c.pki.goog tcp
FR 216.58.213.67:80 c.pki.goog tcp
US 104.21.96.1:443 nethcdn.com tcp
US 104.21.96.1:443 nethcdn.com tcp
US 8.8.8.8:53 o.pki.goog udp
US 8.8.8.8:53 o.pki.goog udp
US 8.8.8.8:53 o.pki.goog udp
GB 172.217.16.227:80 o.pki.goog tcp
GB 172.217.16.227:80 o.pki.goog tcp
GB 172.217.16.227:80 o.pki.goog tcp
FR 216.58.213.67:80 o.pki.goog tcp
US 8.8.8.8:53 pustamiska.pl udp
PL 195.242.117.217:443 pustamiska.pl tcp
PL 195.242.117.217:443 pustamiska.pl tcp
GB 216.58.201.110:443 sites.google.com tcp
US 8.8.8.8:53 korfo.org udp
DE 142.132.202.70:443 korfo.org tcp
DE 142.132.202.70:443 korfo.org tcp
DE 142.132.202.70:443 korfo.org tcp
DE 142.132.202.70:443 korfo.org tcp
DE 142.132.202.70:443 korfo.org tcp
DE 142.132.202.70:443 korfo.org tcp
DE 142.132.202.70:443 korfo.org tcp
DE 142.132.202.70:443 korfo.org tcp
US 8.8.8.8:53 accounts.google.com udp
US 142.251.173.84:443 accounts.google.com tcp
US 142.251.173.84:443 accounts.google.com tcp
US 8.8.8.8:53 lh3.googleusercontent.com udp
US 8.8.8.8:53 fbcdn-sphotos-a.akamaihd.net udp
US 8.8.8.8:53 www.facebook.com udp
US 8.8.8.8:53 www6.cbox.ws udp
GB 172.217.16.225:443 lh3.googleusercontent.com tcp
GB 172.217.16.225:443 lh3.googleusercontent.com tcp
US 8.8.8.8:53 img103.imageshack.us udp
US 8.8.8.8:53 www.google.com udp
US 8.8.8.8:53 img.webme.com udp
US 8.8.8.8:53 www.kulturinsel.com udp
GB 163.70.151.35:80 www.facebook.com tcp
GB 163.70.151.35:80 www.facebook.com tcp
US 108.181.41.161:80 www6.cbox.ws tcp
US 108.181.41.161:80 www6.cbox.ws tcp
GB 142.250.179.228:80 www.google.com tcp
GB 142.250.179.228:80 www.google.com tcp
US 8.8.8.8:53 lads.myspacecdn.com udp
DE 178.162.223.114:80 img.webme.com tcp
DE 178.162.223.114:80 img.webme.com tcp
FI 95.216.245.87:80 www.kulturinsel.com tcp
FI 95.216.245.87:80 www.kulturinsel.com tcp
GB 163.70.151.35:443 www.facebook.com tcp
GB 3.166.65.12:80 lads.myspacecdn.com tcp
GB 3.166.65.12:80 lads.myspacecdn.com tcp
US 8.8.8.8:53 calendar.google.com udp
US 8.8.8.8:53 lh4.googleusercontent.com udp
GB 216.137.44.112:80 i149.photobucket.com tcp
GB 172.217.16.238:80 calendar.google.com tcp
GB 172.217.16.238:80 calendar.google.com tcp
GB 216.137.44.112:443 i149.photobucket.com tcp
GB 216.137.44.112:443 i149.photobucket.com tcp
US 8.8.8.8:53 sc.tynt.com udp
GB 216.58.213.65:443 lh4.googleusercontent.com tcp
US 8.8.8.8:53 ic.tynt.com udp
GB 216.58.213.65:443 lh4.googleusercontent.com tcp
US 8.8.8.8:53 maps.google.com udp
US 38.99.77.16:80 img103.imageshack.us tcp
US 38.99.77.16:80 img103.imageshack.us tcp
GB 216.137.44.112:443 i149.photobucket.com tcp
US 8.8.8.8:53 www.turisede.com udp
US 67.202.105.31:443 ic.tynt.com tcp
US 67.202.105.31:443 ic.tynt.com tcp
US 104.18.12.146:443 sc.tynt.com tcp
US 104.18.12.146:443 sc.tynt.com tcp
FR 142.250.178.142:80 maps.google.com tcp
FR 142.250.178.142:80 maps.google.com tcp
GB 216.137.44.112:443 i149.photobucket.com tcp
GB 172.217.16.238:443 calendar.google.com tcp
GB 163.70.151.35:443 www.facebook.com tcp
FI 95.216.245.87:443 www.turisede.com tcp
FI 95.216.245.87:443 www.turisede.com tcp
FR 142.250.178.142:443 maps.google.com tcp
US 8.8.8.8:53 support.google.com udp
GB 216.58.201.110:443 support.google.com tcp
GB 216.58.201.110:443 support.google.com tcp
GB 216.137.44.112:80 i149.photobucket.com tcp
GB 142.250.179.228:443 www.google.com tcp
US 8.8.8.8:53 crl.microsoft.com udp
FR 23.77.197.149:80 crl.microsoft.com tcp
US 8.8.8.8:53 www.microsoft.com udp
FR 104.80.22.51:80 www.microsoft.com tcp
US 204.79.197.200:443 ieonline.microsoft.com tcp
US 204.79.197.200:443 ieonline.microsoft.com tcp
US 8.8.8.8:53 www.microsoft.com udp
US 8.8.8.8:53 www.microsoft.com udp
US 204.79.197.200:443 ieonline.microsoft.com tcp

Files

C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\EB0KZ1Y4\slide[1].htm

MD5 e89f75f918dbdcee28604d4e09dd71d7
SHA1 f9d9055e9878723a12063b47d4a1a5f58c3eb1e9
SHA256 6dc9c7fc93bb488bb0520a6c780a8d3c0fb5486a4711aca49b4c53fac7393023
SHA512 8df0ab2e3679b64a6174deff4259ae5680f88e3ae307e0ea2dfff88ec4ba14f3477c9fe3a5aa5da3a8e857601170a5108ed75f6d6975958ac7a314e4a336aed0

C:\Users\Admin\AppData\Local\Temp\TarE8FD.tmp

MD5 4ea6026cf93ec6338144661bf1202cd1
SHA1 a1dec9044f750ad887935a01430bf49322fbdcb7
SHA256 8efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA512 6c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b

C:\Users\Admin\AppData\Local\Temp\CabE8FB.tmp

MD5 49aebf8cbd62d92ac215b2923fb1b9f5
SHA1 1723be06719828dda65ad804298d0431f6aff976
SHA256 b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512 bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b

C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\24BD96D5497F70B3F510A6B53CD43F3E_3A89246FB90C5EE6620004F1AE0EB0EA

MD5 09bdd7662104f94e5ab12e922eebe046
SHA1 fc41077668d363ed00354299a8c7fe0df2ac0091
SHA256 69948fe129ad93ad777ddf7789940a844e4b872131cb698357d802cae8000aeb
SHA512 de5c7fbebb455365b3784412b43dc3145caf9718146674a07ec61e7aba97d9af786d5be3ec795fba6c314992700765ece3d1b52701eec62323ffb3e2914f78b5

C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

MD5 347177b959118745e483aa51a4815206
SHA1 cf52f1e96e1a58827ddd9269cc1601308e954ffa
SHA256 32df6bbb4196d2bbfbe6938b0a690d72020dd42851974222233f87fe317bf614
SHA512 33a5a94c8a39fcedd9d22496eb87473ce003567d40d8dbfdb9c5558b9438f055bd7fd677437c57e2decc06806db008616031d2144947d48f08abf027833ad90a

C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\070E0202839D9D67350CD2613E78E416

MD5 55540a230bdab55187a841cfe1aa1545
SHA1 363e4734f757bdeb89868efe94907774a327695e
SHA256 d73494e3446b02167573b3cde3ae1c8584ac26e15e45ac3ec0326708425d90fb
SHA512 c899cb1d31d3214fd9dc8626a55e40580d3b2224bf34310c2abd85d0f63e2dedaeae57832f048c2f500cb2cbf83683fcb14139af3f0b5251606076cdb4689c54

C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

MD5 036ff68d6b9f29e66a541a63d8d7a9e9
SHA1 9eafbada572d66f8d498c9346318933d714996db
SHA256 892e5c3a4ee67feead59e34523f18fa761cf76f29c4489f226f013ce2fbd857a
SHA512 a4a7a6f32f58d300e3cae819b7656403eaa226454dcb74a09bfac9aeda6b6aa213934ef7e62bcedc81c12baa87cbb76b9c19984f846550f62ad6e3d3ab2c91a4

C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

MD5 d67dc56c49f703b7ed7d37736d170425
SHA1 d5e1e31c74bf89a3a3f5378f13c20054e8545f9b
SHA256 7cd774564e20d97e10bc3faafbdcdde1e8d2c4d02c7ed7858835a0d902af9fdf
SHA512 d9e13811e4056d750a01889d15e33c4854d22608cfc7882a8fe7d107d5d03167965664f3b562a7cba9faeb85df764fa64ef33368c8e173f7ae9d1bc3c41a4960

C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\070E0202839D9D67350CD2613E78E416

MD5 c07f94b6e12ba13ac2d02137b810b05c
SHA1 79b273315fc306e23c8f52ebb7380b3a99900ee1
SHA256 7e428af4705313b40c036d11c11cf30fabb9f82ad284e2d7db8a9db0758b12d3
SHA512 bee6cabbfc3efeb4d168241b5104ab0bfe7c6dffa2eb746d07621b9bfa003262be8c8467d04439adf3012b72f51ea5d4f209262e6982235b964b4eb63f085f40

C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\05DDC6AA91765AACACDB0A5F96DF8199

MD5 7fb0cc89defb2a539a9ad384175e71b7
SHA1 1ba4f7a70470ccd88e820ab20a81a4bf04e4915d
SHA256 a6c4a59e0535389405ac3c519ff65e66dee12ba9494e008623b11b5e40c7e7b1
SHA512 19571f2932261ab1f9388a52a0d03ed27c52fa530b31cb9b4d78e0669b832ee07db010ce5f18a0ad6ab7dcdd81b04dfdbf225eb088618941751ecfee650dc47e

C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

MD5 fa2382312374199f88668eec39d303ca
SHA1 a70e4602206a01a75e2b6fac2e40639aa54e5740
SHA256 9793ab8ec32abc2f76a52020f7af3bb31f5515dff7bfec0c73dc9e3ed4cfbdd8
SHA512 8b6460782c80b5974a16597f9f0b29ee8b3f69321ea66b5407fdec42ffed909f19fc2ac004f754bcf655ba93676852f4d850464aefcb87720883fd0300fa7346

C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

MD5 d501892ff013967bb517c89b54583930
SHA1 26a220c4f5043451a84c182d52b691ab903ad0c0
SHA256 0d3cfcffbac93b384209321ba46eb69f2551ded51475cdce65688b2eb4bc4c18
SHA512 230e18cef914f84f2d8b72295fb839f9668fdcda45b4fb224a152fbb457b6ccf4a9889884a7a9283a9e9b0a0c452499f427a140cb28aef581c2195dd0617ef4d

C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

MD5 49f908e5245439fd05aab493949ccd7c
SHA1 c24cf4aeeb57f0c0f23f8d79cbbf9f62cc448204
SHA256 8a1915c00572c3de3736828b7ec91a17671fe9886ef0767db612e0a72d39ca47
SHA512 220421c9a548f02d8606ce6f8dfebfd1b68c25d00ac7de2a0f6f114bd476a82c41fcd968042e78dac9eb034bd783082c55487c5ad324362921ef67e17623a661

C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

MD5 ec027dea15bbb3c23c1d45bb9ce2d459
SHA1 bce4a82041cf17ad618eaf27d3f0729b86745d73
SHA256 0bc0b8043f6d0d3d4ea48b16955d5118e22b921a65520988de92b14b89186018
SHA512 21a1fb23a56ae384924f0bf02d42c37854b30672cda0a7e81715c1770c2a913fd3e7d2a07a893abab168aa71cbf17adc8b074c454cb710a759d2c18c2d4f6458

C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

MD5 5a36ee0d41631301d8f630e1f5efed34
SHA1 b9c6827fa1c4de4dca28f3804d312119ff766ec4
SHA256 54e9795dc034b3d8a2eb8a7eb4c8378b39d10695a35920acfed6e19c5038a550
SHA512 0e469b1fcd0e477cbc850d39f85d91381e1ba5360691e9c51333723a48d990e555ee56e9fa53f05cd4907bc8806953bd0d61e36e7cd1c626407b242f7f9479ec

C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

MD5 3419a88e7792ef6f995fc4b93679ec02
SHA1 ef11795cadb48db0854fd7ad12ae46b49a8300d2
SHA256 646108ddfe60aa88201485d4094aa7c27cc3788d3391db6b0bf3a20fb5132b72
SHA512 0be0e0ccb9a4df16eeae11b4403ecdb290c1605e87acc7ad79988dad5bb2477142e902a829c221bfe6b04da1ce923e7cfc55d1781b90e0499de2d8030338cc68

C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

MD5 6e07f6a941d9c5b98fa57c318ec6da11
SHA1 682a9ce325dea5809c4e778831b9e82ff620083c
SHA256 99e35b196430c1867b04be001bfdd72ca7cc23b9cda6eee301f474c0774703f1
SHA512 11d19b801b67c96128fe54c02c504e26ee59c8aa4cc30cb053ff2ef1d7f9afd8dd5b6ac572ca51f8d93357ef9b28e27a12687df0592af68e7f4d26a223a06559

C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

MD5 885ea2909011ec5cb3c53ca885ff9ae9
SHA1 76aaf3c6fef309db88c4d62f84fc32ee7cb7fd2e
SHA256 e2430764b9c0d5c57334b44dec9ee9b2ccc6e4f3e57ddb873ea0110c2667f9f9
SHA512 586171ed48371733aa2818179af4b8c70b82c42d871d935e7e216104958880fde143c6c25e81cacab88d00f2424747333e68d65aadcd216c8512d8d6513a9e26

C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

MD5 3cd5f52ef1604810438cb09157bb5798
SHA1 71d2045f8542c2646d86645aef4097ca57d1fb24
SHA256 799e48348daab5f66affeee96ecd2682ab56da787c4b091ef45a6626edc1a58c
SHA512 690edebb6c6b12afe5ce846bb38d0134e213336935f867b2eff7ac12abbd4fb7ed77c0b54d6a361f54268d5943bb6a70b80ea9d407cf288bb7e21540dce02078

C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\BAD725C80F9E10846F35D039A996E4A8_88B6AE015495C1ECC395D19C1DD02894

MD5 b73942a0139a66a7e56a9627982dd5ab
SHA1 78f2a8ac5111cfc27f4c6eef8d4bdbf2efc38a27
SHA256 983765a6e167f3885aa38a2ffc545592bf4b65829658aaea8d977f4c8b45e94e
SHA512 2c46647355843ead52092bd1795cb044d8425cd8104ab3b02e9fdabe37c488fa6508f1a67e14e61053e08ab55148347f00348ae01905f2a8c019eb6bb2f74cc0

C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\75CA58072B9926F763A91F0CC2798706_056B48C93C4964C2E64C0A8958238656

MD5 66cfe1a99a88036631cf336e6e609315
SHA1 a077e8222fefe171766e0c8d178c7f2c3d24959f
SHA256 f8175b4787bd34ddb44bbf2a2fbafda356906bf02a499327105c5ecbffa6ddec
SHA512 3e80d426a62bf27c25bda0afa050c6e6ef5baeae34c1f27328d91ed180bc07fe76c4588b882a8b97bc681bfcf32f1dcb0d753f397bba54a9356f4517ee1dde5c

C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

MD5 a7b16500174508033e826401085ff765
SHA1 f4c3bbbcebd959bcc1edd61e175b3d8fed9cd45c
SHA256 41f96e272c85a67eac2289f7f0241c01c69624c0fba95d66aec134875bd7d62e
SHA512 d5e5cd1351e0b9eb25bf67bbd7dfa8bff5da0dddfc92609c10dc50995a1b95b773fff53a171835ff2471c39ac3e89ca118d470ee8ccacca7791e2a9bee7545bf

C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

MD5 3be02172bc8ed8fb9e10404cb9a50628
SHA1 ad442889c6a615d45a653d0a381b8ecb19759e47
SHA256 a0da8f3827b09703898657f504f093558abd486a783b4474770ba6ac72a82c30
SHA512 50b5e944f5b8d549f0f796ef568e786bdcf908d50d5694d17b289c0911122c3758e6fe9930dcfee692ff98122d96bcf80dfdf8a1d7494a76753ad0873df523a4

C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

MD5 c38750b15e0fdb971c1d55fe3991cd31
SHA1 dff8d957484584f162ae4279ad5da70dba634d18
SHA256 d1bb237fd0f4b7c74aaf4ea943a7ebe467e7d6929be5a9e9e35a4f791a841471
SHA512 306468bc78f361e25bc38bd059595b76f02b98dc440a012fddcdb6105bfe097c02a47a5cf1b4d18b54f5146494091afd685144823f576c871ee41e6fbc65b86b

C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

MD5 9ced712ff35f0a99859f99b56f97d631
SHA1 87aeaa63aa572691b7f2b3bacd2671e8775589fb
SHA256 4972777fbb711e575dd798730e25afe9dfd56d7002c07877adaf34c4f02b451b
SHA512 3572184df83a1d0ad96d2c65fbb886ce70658644bec96da8c959760272574a7c7463ccf3de98abf49b6d86156af927f82b12e4ba31db0451997bcd60d91badc7

C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

MD5 7738fbc42d3a5d482d7ff5aafe505da5
SHA1 1c1d666db506d3d5b1fb19d56fb41a62f918f03e
SHA256 5556ae91c898e29f2a733b1e6bc8a245cc99002146babf487f4df80cbb42d0c5
SHA512 bcbb599d6ed5af78e84d5a842c3226840d71c32ed6a6e24dbffcfa53589e1ecaafde7231e74ea4c193d894ae56d9bca9501c55c6444cf78d29f05812877b30cb

C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

MD5 4e4b45ef44489bb006cdca9049fae58e
SHA1 b37c3d9220bdb29b1e04bff54c2ce582019c82a4
SHA256 cd49100b0c6c39cec3bfe0b774039477252a2a46c5b7084c5e1476a28a3c6d48
SHA512 32c21174a926ceab798d44443131dd39a39c11b733e931f52847964e32b008e00389ca0d53abd11e52ed1cdfe018d7e7f17e4c665182eaab97b20284f075c2d9

C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

MD5 8e139fd0775ef139bd1e98ed72abefe7
SHA1 4d339d5bf836a8f8d56291e98a57b3b556c1a4e1
SHA256 6c355c23b5f697efca0bb47da1f715bd2d85886fb464020e3c04f0cd68cf6395
SHA512 e9fdd75269127f898006f96576cfb4045f8c0a8a5d0a81a7b7c7f336265051b941afd70ae3234ed0b532c4df71041138c47278f59185d7335eb4f96135d9be0f

C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

MD5 8b93ad3ae3443eeb345d2159a5b9fc7a
SHA1 07db4c8f9bee7bcd93f82cdb94a6ef1eea203998
SHA256 024d7253ed764221332838e611a48f8615a7d8102017fd57dc28bf2167192a76
SHA512 d397d173eeaf8cdd8d1a242ccd0bb2a2d44e6f3fe36124d2b3de021d83e87f8f75c7611a6e5befc99ebbd1e5d43c07c749a0aa7ab74249bbdfdd997066a10315

C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

MD5 b5aee6ab5c434108c91e64390fc57619
SHA1 17687946f10f6d65dc2b9fdf03e3ba351a6e2ec7
SHA256 27a58bcaaebe8ea42f088eea4da739a3d9def6d4e6c7454e774f6dce82c90f4c
SHA512 2077e510aea3c30600a6ef28c14f482bd572e0a756a4184aab94a4e85b36bf7bdf15213dafba8b799957d219a6a4d903c5c4ef98b57838d26d0da26c4c5297a1

C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

MD5 409da97793a1140c099c8ba7dc65aabe
SHA1 e5c73b87d2cc160b4a84ede85dac4d01f1589d50
SHA256 28ff12f1f5926f9cc2650231624ea184bd831d2420266e426a70a4879b4e1c85
SHA512 9a6b5c89c85915f843672e42061eb4a690a29d4112a9f4b1bf2811f571d61a7c5e3ac1b2a7e16d541ee7984eaa287653e589115758546c519f824381b61d681c

C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

MD5 14a6dc9f64a6dcc6e628b0f5a6339301
SHA1 c82eef356e051fd3df6d694fc4e84490823626a3
SHA256 6b2a4ca2b8055b99b404f7cb5e4159fe7c24d9e5cd61c56e02deef8b61e0e8a5
SHA512 2747e26264f2bb0c396a6244b0f882f5e78d83af5900192141058d7f5d95cc19928a60b08eddcd0a0e6e41a25506abd676838813305feb8896e4389ca9292846

C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

MD5 8dabf0b7af1e760ad6acdd70bd8503c0
SHA1 80b7a660f3e73b0a374a0d4b826855f9142b16e7
SHA256 1c3f4c9a4e33e2dab82ff10811f2d18382bd4b18b853054341f73a710a6a569b
SHA512 2168165a68fb79ca08421f14b2bdb4bfcea72b482e69dae85d0119dec633894edce76cffe0e95040dbec393d590c08f8b4a25929bafeffdeafdbd863e58d18b7

C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

MD5 5d2b0f38215c4691b87128a9fb1758d3
SHA1 cd57f14d172e84b33862965c9c364851529b0ab0
SHA256 772da0859b542f6c5973a3ef6db765f1da348c449e2f3ca01f25e33aa31ff2f6
SHA512 9998c8d23b8577ca6708e5f215c6d986fcf767e490c0ad50b2432837740ab239d64755f2fe8c23c03b10ab597ac76520983ca341dfea553aeb692aa32a5567f5

C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

MD5 7d364cee57d1b6a4b2306d23f087f0c8
SHA1 4b24491a65a36463f7218a2c387944ceb3b38254
SHA256 da54f62ba3e0fc1d3e5840f7afc96fc2434ff18d161ac424c96e732e11749861
SHA512 b71c49cf07b8b7092be2028ff992861cf4011550fccdd1f1f87b7999bbb19bee6375d7cc8a542b3cb60bfbd9e162701c3afb668218a53bd41e4927e85fc6fadc

C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\F0ACCF77CDCBFF39F6191887F6D2D357

MD5 a266bb7dcc38a562631361bbf61dd11b
SHA1 3b1efd3a66ea28b16697394703a72ca340a05bd5
SHA256 df545bf919a2439c36983b54cdfc903dfa4f37d3996d8d84b4c31eec6f3c163e
SHA512 0da8ef4f8f6ed3d16d2bc8eb816b9e6e1345dfe2d91160196c47e6149a1d6aedaafadcefd66acdea7f72dcf0832770192ceac15b0c559c4ccc2c0e5581d5aefc

C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\F0ACCF77CDCBFF39F6191887F6D2D357

MD5 70cf5f78f89c75858e9888cb93fde273
SHA1 0ea4cc19c66b075f3edfbaabab30e8fbc7bc87ba
SHA256 b6c43f4bf13628cdd8040293b6845d166712910776f991ab322ae6034a4fe632
SHA512 c17eb5b442bb2dbf5757f38e9cd9512814d98b01d5f1d60e74cb922df1ec4511a7728a4c2cc86720a7d9df82ac9189539cb86e0d27d639114ed5f69b7383719e

C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

MD5 6e580a3869b6e4f50692587b9c8e8e7b
SHA1 988c25ef5c72e200b75be7e352a348486e37c5a4
SHA256 e0871ad36f173cb0a22f0ad4e2ad6587ced2dba4faee325441b4db522bd1e89a
SHA512 e2bf8ed906773dfff801390eb297e99c77ad6324a18bc3d432b8e5a281607008de34d1381160eb39dce01032ce7b5220845e230407ebeab05ee5d5d262a9375e

C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

MD5 81dc6cbd33b7cef92088ba5b235ea03b
SHA1 cc1119beb017196612174bf294f9142f5ed615f0
SHA256 b221db845c8969873bf52a9d9a3ab0719011a45b46533a4322ecb6783fe96830
SHA512 ebdb70b57d2dc5ffbccea8e6a038a36bcc7f6954a8c85c7aacff3d122339785bcf260853bf737d813dfb1a5abd1cc8e29b4798db121e477191e0c151fff17c82

C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

MD5 20455bfc713f33dc299bb557b1170cd7
SHA1 ae819d894062d2ef90bcc1b4bb6973d00c78b0da
SHA256 d25438a7c5c0d6ec70b5995090397af7a49957f7468313ef9ca5af161171ff68
SHA512 e35cf4145656ee4529aa28d08d4153923d2b9e81ffa0b0991ded20a1657b817bbdc824f53d6bf4e1f351660a61b3d2a67f77f1d0c2019738e804880dcd417420

C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

MD5 de3aa7a66beeaa6b3b6a532ad3b95ae3
SHA1 bb9a51fb25fc042eaeb7fbaff2a6c9b6dbc6ec5a
SHA256 524e88cda2b0e01d54abb4c74b64b10583e741b677caf57f63873b3c254b1560
SHA512 ccd0d7b42b966f588b4c2989861d0065718ef6ac4c52a1d1114a9bb511865e971bb74a312738d60719892a7ec5f3f2252f39408b0ca5e42cf8fb893e23ae2bfe

C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

MD5 87e426bd256cbf99500710da9ef22ae3
SHA1 7ef070d20b43c57f99d8b31a6eda3cb5e547c295
SHA256 38c3b81030dfa8b42a355a30c2d420d3afb4f7b87ef6dfdaa09e1c43f83227ba
SHA512 ec0eba7a293ca384aa85fa8ecb22f15ac479eb2d234cf5104a39c1aec5902f5aed6d3de42cc677114b67ddc806c093e5b8be591cbf5746692cdc645559184df3

C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\3C428B1A3E5F57D887EC4B864FAC5DCC

MD5 98b6b37c6a27cd822d63ed29796b11fb
SHA1 cf1c7e2a5f64ce51ee35ef1fcb7be37775c213ff
SHA256 17f67ff69cd4f09a0ce0dbc6d93ec214fcb3973ad51237c488ed273c65d2a8d6
SHA512 5f3b31a962cee7de79ef59586c7417b46e2d62e0df17fe58c9cfeb88b15b1de22926a00ba7763e790fe37966ff8d0927762811e381f6e85e3bd3030d1b710e4a

C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\3C428B1A3E5F57D887EC4B864FAC5DCC

MD5 e4a68ac854ac5242460afd72481b2a44
SHA1 df3c24f9bfd666761b268073fe06d1cc8d4f82a4
SHA256 cb3ccbb76031e5e0138f8dd39a23f9de47ffc35e43c1144cea27d46a5ab1cb5f
SHA512 5622207e1ba285f172756f6019af92ac808ed63286e24dfecc1e79873fb5d140f1ceb7133f2476e89a5f75f711f9813a9fbb8fd5287f64adfdcc53b864f9bdc5

C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

MD5 1bd7ec1b82fa3e289db48f676e53e080
SHA1 84ba295b84f53907b23cc2512aa185f02e01ca74
SHA256 19363b053c5888a8eec6e27187ccfb15d2fce303bfeb2157b3a36b925fcb3ff6
SHA512 043241381387e7c3057951d947ee0285c77ba02b58bf8f32768cd9227338cbc5e53bba7eb258d53d04a1fefcca481314d83e0d285cb7e78aee7c92d543d77da6

C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

MD5 ea306249000b48436a195869bf1475ff
SHA1 6305b944f1946bdef9660a1ee69fe0676d1e8969
SHA256 920a879b187b6bc83c9d317766fa6655b79177f58bc95dcd23aeaae52adf5a8b
SHA512 50e8f0edec84a0298832ee14e2a34f09a9ef47b8e8111191e716f0df140019e6e87c099a132c4467e7c829346525939f4cd97c9532ce74b52ae7872e3af579a6

C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

MD5 319fb2b734b66f3eb6b9ec091ce51853
SHA1 948c987a0baecd6fbfbcb944816b71caab1c8ae5
SHA256 8a1d2256ec95a45bf0717a5c535069c5bce1cbbbfb5d85d7da21adb0839a2ae9
SHA512 c9cfc2cf9d9c7e649d8d5b8d948dc28e82440a55bed43d331e5a6aeb24b62be9c1e80eaad730d5c3acae20c2c6052520b5f67bfc4b469b9b2a33edd89a40b376

Analysis: behavioral2

Detonation Overview

Submitted

2025-01-27 04:36

Reported

2025-01-27 04:39

Platform

win10v2004-20241007-en

Max time kernel

145s

Max time network

150s

Command Line

"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --start-maximized --single-argument C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_3c08c4bbd20dc33117169176315a7728.html

Signatures

A potential corporate email address has been identified in the URL: [email protected]

phishing

A potential corporate email address has been identified in the URL: [email protected]

phishing

Legitimate hosting services abused for malware hosting/C2

Description Indicator Process Target
N/A sites.google.com N/A N/A
N/A sites.google.com N/A N/A

Browser Information Discovery

discovery

Enumerates system info in registry

Description Indicator Process Target
Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe N/A
Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe N/A
Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe N/A

Suspicious use of FindShellTrayWindow

Description Indicator Process Target
N/A N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe N/A
N/A N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe N/A
N/A N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe N/A
N/A N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe N/A
N/A N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe N/A
N/A N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe N/A
N/A N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe N/A
N/A N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe N/A
N/A N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe N/A
N/A N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe N/A
N/A N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe N/A
N/A N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe N/A
N/A N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe N/A
N/A N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe N/A
N/A N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe N/A
N/A N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe N/A
N/A N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe N/A
N/A N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe N/A
N/A N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe N/A
N/A N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe N/A
N/A N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe N/A
N/A N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe N/A
N/A N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe N/A
N/A N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe N/A
N/A N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe N/A

Suspicious use of SendNotifyMessage

Description Indicator Process Target
N/A N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe N/A
N/A N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe N/A
N/A N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe N/A
N/A N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe N/A
N/A N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe N/A
N/A N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe N/A
N/A N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe N/A
N/A N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe N/A
N/A N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe N/A
N/A N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe N/A
N/A N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe N/A
N/A N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe N/A
N/A N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe N/A
N/A N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe N/A
N/A N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe N/A
N/A N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe N/A
N/A N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe N/A
N/A N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe N/A
N/A N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe N/A
N/A N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe N/A
N/A N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe N/A
N/A N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe N/A
N/A N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe N/A
N/A N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe N/A

Suspicious use of WriteProcessMemory

Description Indicator Process Target
PID 764 wrote to memory of 544 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 764 wrote to memory of 544 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 764 wrote to memory of 3508 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 764 wrote to memory of 3508 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 764 wrote to memory of 3508 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 764 wrote to memory of 3508 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 764 wrote to memory of 3508 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 764 wrote to memory of 3508 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 764 wrote to memory of 3508 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 764 wrote to memory of 3508 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 764 wrote to memory of 3508 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 764 wrote to memory of 3508 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 764 wrote to memory of 3508 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 764 wrote to memory of 3508 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 764 wrote to memory of 3508 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 764 wrote to memory of 3508 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 764 wrote to memory of 3508 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 764 wrote to memory of 3508 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 764 wrote to memory of 3508 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 764 wrote to memory of 3508 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 764 wrote to memory of 3508 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 764 wrote to memory of 3508 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 764 wrote to memory of 3508 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 764 wrote to memory of 3508 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 764 wrote to memory of 3508 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 764 wrote to memory of 3508 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 764 wrote to memory of 3508 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 764 wrote to memory of 3508 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 764 wrote to memory of 3508 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 764 wrote to memory of 3508 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 764 wrote to memory of 3508 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 764 wrote to memory of 3508 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 764 wrote to memory of 3508 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 764 wrote to memory of 3508 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 764 wrote to memory of 3508 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 764 wrote to memory of 3508 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 764 wrote to memory of 3508 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 764 wrote to memory of 3508 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 764 wrote to memory of 3508 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 764 wrote to memory of 3508 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 764 wrote to memory of 3508 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 764 wrote to memory of 3508 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 764 wrote to memory of 1800 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 764 wrote to memory of 1800 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 764 wrote to memory of 4012 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 764 wrote to memory of 4012 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 764 wrote to memory of 4012 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 764 wrote to memory of 4012 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 764 wrote to memory of 4012 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 764 wrote to memory of 4012 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 764 wrote to memory of 4012 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 764 wrote to memory of 4012 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 764 wrote to memory of 4012 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 764 wrote to memory of 4012 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 764 wrote to memory of 4012 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 764 wrote to memory of 4012 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 764 wrote to memory of 4012 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 764 wrote to memory of 4012 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 764 wrote to memory of 4012 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 764 wrote to memory of 4012 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 764 wrote to memory of 4012 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 764 wrote to memory of 4012 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 764 wrote to memory of 4012 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 764 wrote to memory of 4012 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe

Processes

C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe

"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --start-maximized --single-argument C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_3c08c4bbd20dc33117169176315a7728.html

C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe

"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7fff7fd646f8,0x7fff7fd64708,0x7fff7fd64718

C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe

"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2152,8329465230430416154,10817718416892423258,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2164 /prefetch:2

C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe

"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2152,8329465230430416154,10817718416892423258,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2216 /prefetch:3

C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe

"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2152,8329465230430416154,10817718416892423258,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2760 /prefetch:8

C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe

"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2152,8329465230430416154,10817718416892423258,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3236 /prefetch:1

C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe

"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2152,8329465230430416154,10817718416892423258,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3256 /prefetch:1

C:\Windows\System32\CompPkgSrv.exe

C:\Windows\System32\CompPkgSrv.exe -Embedding

C:\Windows\System32\CompPkgSrv.exe

C:\Windows\System32\CompPkgSrv.exe -Embedding

C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe

"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2152,8329465230430416154,10817718416892423258,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=1200 /prefetch:1

C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe

"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2152,8329465230430416154,10817718416892423258,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=1196 /prefetch:1

C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe

"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2152,8329465230430416154,10817718416892423258,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5988 /prefetch:1

C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe

"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2152,8329465230430416154,10817718416892423258,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5784 /prefetch:1

C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe

"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2152,8329465230430416154,10817718416892423258,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5856 /prefetch:1

C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe

"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2152,8329465230430416154,10817718416892423258,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5420 /prefetch:1

C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe

"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2152,8329465230430416154,10817718416892423258,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=3088 /prefetch:2

Network

Country Destination Domain Proto
US 8.8.8.8:53 196.249.167.52.in-addr.arpa udp
US 8.8.8.8:53 bloggerstyles.com udp
US 8.8.8.8:53 apis.google.com udp
US 8.8.8.8:53 www.blogger.com udp
FR 142.250.179.78:443 apis.google.com tcp
US 3.33.130.190:80 bloggerstyles.com tcp
US 3.33.130.190:80 bloggerstyles.com tcp
US 3.33.130.190:80 bloggerstyles.com tcp
US 3.33.130.190:80 bloggerstyles.com tcp
US 3.33.130.190:80 bloggerstyles.com tcp
US 3.33.130.190:80 bloggerstyles.com tcp
US 3.33.130.190:80 bloggerstyles.com tcp
US 8.8.8.8:53 172.214.232.199.in-addr.arpa udp
US 8.8.8.8:53 190.130.33.3.in-addr.arpa udp
US 8.8.8.8:53 78.179.250.142.in-addr.arpa udp
US 8.8.8.8:53 5.114.82.104.in-addr.arpa udp
GB 216.58.212.233:445 www.blogger.com tcp
US 8.8.8.8:53 www.blogger.com udp
N/A 224.0.0.251:5353 udp
US 8.8.8.8:53 bloggertipspro.googlepages.com udp
GB 142.250.200.51:80 bloggertipspro.googlepages.com tcp
US 8.8.8.8:53 sites.google.com udp
FR 216.58.214.78:80 sites.google.com tcp
FR 216.58.214.78:443 sites.google.com tcp
US 8.8.8.8:53 51.200.250.142.in-addr.arpa udp
US 8.8.8.8:53 connect.facebook.net udp
FR 163.70.128.23:80 connect.facebook.net tcp
FR 163.70.128.23:443 connect.facebook.net tcp
US 8.8.8.8:53 pipes.yahoo.com udp
FR 172.217.20.194:80 pagead2.googlesyndication.com tcp
US 8.8.8.8:53 widgets.amung.us udp
US 104.22.75.171:80 widgets.amung.us tcp
US 8.8.8.8:53 tcr.tynt.com udp
US 104.18.13.146:80 tcr.tynt.com tcp
US 8.8.8.8:53 lh5.googleusercontent.com udp
GB 216.58.213.65:443 lh5.googleusercontent.com tcp
US 8.8.8.8:53 lh5.ggpht.com udp
GB 142.250.187.193:80 lh5.ggpht.com tcp
US 8.8.8.8:53 lh3.ggpht.com udp
FR 216.58.215.33:80 lh3.ggpht.com tcp
US 8.8.8.8:53 78.214.58.216.in-addr.arpa udp
US 8.8.8.8:53 23.128.70.163.in-addr.arpa udp
US 8.8.8.8:53 194.20.217.172.in-addr.arpa udp
US 8.8.8.8:53 171.75.22.104.in-addr.arpa udp
US 8.8.8.8:53 146.13.18.104.in-addr.arpa udp
US 8.8.8.8:53 65.213.58.216.in-addr.arpa udp
US 8.8.8.8:53 193.187.250.142.in-addr.arpa udp
US 8.8.8.8:53 lh4.ggpht.com udp
GB 142.250.187.193:80 lh4.ggpht.com tcp
US 8.8.8.8:53 c4.ac-images.myspacecdn.com udp
GB 3.166.49.73:80 c4.ac-images.myspacecdn.com tcp
US 8.8.8.8:53 c3.ac-images.myspacecdn.com udp
GB 3.166.49.56:80 c3.ac-images.myspacecdn.com tcp
GB 3.166.49.56:80 c3.ac-images.myspacecdn.com tcp
US 8.8.8.8:53 c2.ac-images.myspacecdn.com udp
GB 3.166.49.84:80 c2.ac-images.myspacecdn.com tcp
GB 3.166.49.84:80 c2.ac-images.myspacecdn.com tcp
GB 3.166.49.56:80 c2.ac-images.myspacecdn.com tcp
US 8.8.8.8:53 c1.ac-images.myspacecdn.com udp
GB 3.166.49.84:80 c1.ac-images.myspacecdn.com tcp
GB 216.58.213.65:443 lh5.googleusercontent.com udp
US 8.8.8.8:53 img1.blogblog.com udp
FR 216.58.214.169:80 img1.blogblog.com tcp
US 8.8.8.8:53 i298.photobucket.com udp
US 8.8.8.8:53 33.215.58.216.in-addr.arpa udp
US 8.8.8.8:53 73.49.166.3.in-addr.arpa udp
US 8.8.8.8:53 56.49.166.3.in-addr.arpa udp
US 8.8.8.8:53 84.49.166.3.in-addr.arpa udp
GB 216.137.44.112:80 i298.photobucket.com tcp
GB 216.137.44.112:443 i298.photobucket.com tcp
US 8.8.8.8:53 i149.photobucket.com udp
US 8.8.8.8:53 169.214.58.216.in-addr.arpa udp
US 8.8.8.8:53 112.44.137.216.in-addr.arpa udp
US 8.8.8.8:53 43.39.156.108.in-addr.arpa udp
GB 216.137.44.112:80 i149.photobucket.com tcp
US 8.8.8.8:53 www.pustamiska.pl udp
PL 195.78.67.53:80 www.pustamiska.pl tcp
PL 195.78.67.53:443 www.pustamiska.pl tcp
US 8.8.8.8:53 pustamiska.pl udp
US 8.8.8.8:53 www.pajacyk.pl udp
US 8.8.8.8:53 53.67.78.195.in-addr.arpa udp
PL 195.149.198.194:80 www.pajacyk.pl tcp
US 8.8.8.8:53 img357.imageshack.us udp
US 38.99.77.16:80 img357.imageshack.us tcp
US 8.8.8.8:53 1.bp.blogspot.com udp
GB 142.250.187.193:80 1.bp.blogspot.com tcp
US 8.8.8.8:53 pics7.inxhost.com udp
RU 45.130.41.107:80 pics7.inxhost.com tcp
RU 45.130.41.107:80 pics7.inxhost.com tcp
US 8.8.8.8:53 194.198.149.195.in-addr.arpa udp
US 8.8.8.8:53 16.77.99.38.in-addr.arpa udp
US 8.8.8.8:53 www.google.com udp
GB 142.250.179.228:445 www.google.com tcp
US 8.8.8.8:53 97.17.167.52.in-addr.arpa udp
US 8.8.8.8:53 www.google.com udp
US 8.8.8.8:53 56.163.245.4.in-addr.arpa udp
US 8.8.8.8:53 206.23.85.13.in-addr.arpa udp
US 8.8.8.8:53 61.122.16.96.in-addr.arpa udp
US 3.33.130.190:80 bloggerstyles.com tcp
FR 142.250.179.78:443 apis.google.com udp
GB 216.58.212.194:445 pagead2.googlesyndication.com tcp
US 8.8.8.8:53 www6.cbox.ws udp
US 8.8.8.8:53 www.facebook.com udp
GB 163.70.147.35:80 www.facebook.com tcp
US 108.181.41.161:80 www6.cbox.ws tcp
US 108.181.41.161:80 www6.cbox.ws tcp
US 8.8.8.8:53 lh3.googleusercontent.com udp
GB 3.166.49.73:80 c1.ac-images.myspacecdn.com tcp
GB 142.250.179.228:80 www.google.com tcp
US 8.8.8.8:53 lh4.googleusercontent.com udp
US 8.8.8.8:53 fbcdn-sphotos-a.akamaihd.net udp
GB 216.137.44.112:80 i149.photobucket.com tcp
GB 216.137.44.112:80 i149.photobucket.com tcp
GB 163.70.147.35:443 www.facebook.com tcp
GB 216.58.213.65:443 lh4.googleusercontent.com udp
US 8.8.8.8:53 calendar.google.com udp
GB 172.217.16.225:443 lh4.googleusercontent.com udp
GB 3.166.49.84:80 c1.ac-images.myspacecdn.com tcp
GB 3.166.49.73:80 c1.ac-images.myspacecdn.com tcp
US 8.8.8.8:53 img685.imageshack.us udp
GB 216.137.44.112:80 i149.photobucket.com tcp
GB 172.217.16.238:80 calendar.google.com tcp
US 38.99.77.16:80 img685.imageshack.us tcp
GB 172.217.16.238:443 calendar.google.com tcp
US 8.8.8.8:53 www.myspace.com udp
US 8.8.8.8:53 grzegorz.namielski.pl udp
US 8.8.8.8:53 www.cbox.ws udp
US 8.8.8.8:53 static.cbox.ws udp
US 8.8.8.8:53 profile.ak.fbcdn.net udp
FR 216.58.214.78:443 sites.google.com udp
US 104.21.48.1:80 static.cbox.ws tcp
US 104.21.48.1:80 static.cbox.ws tcp
US 8.8.8.8:53 35.147.70.163.in-addr.arpa udp
US 8.8.8.8:53 161.41.181.108.in-addr.arpa udp
US 8.8.8.8:53 228.179.250.142.in-addr.arpa udp
US 8.8.8.8:53 238.16.217.172.in-addr.arpa udp
US 8.8.8.8:53 225.16.217.172.in-addr.arpa udp
US 8.8.8.8:53 static.xx.fbcdn.net udp
GB 172.217.16.238:443 calendar.google.com udp
FR 172.217.20.194:139 pagead2.googlesyndication.com tcp
US 8.8.8.8:53 maps.google.com udp
GB 142.250.200.14:80 maps.google.com tcp
US 8.8.8.8:53 scontent.xx.fbcdn.net udp
FR 142.250.179.78:443 apis.google.com udp
US 8.8.8.8:53 clients6.google.com udp
GB 142.250.200.14:443 maps.google.com tcp
US 8.8.8.8:53 t.dtscout.com udp
FR 172.217.20.206:443 clients6.google.com tcp
US 8.8.8.8:53 googleads.g.doubleclick.net udp
US 104.26.10.2:443 t.dtscout.com tcp
GB 216.58.204.66:443 googleads.g.doubleclick.net tcp
US 8.8.8.8:53 developers.google.com udp
GB 142.250.179.228:443 www.google.com tcp
US 8.8.8.8:53 sc.tynt.com udp
US 8.8.8.8:53 ic.tynt.com udp
GB 142.250.200.46:80 developers.google.com tcp
US 67.202.105.31:443 ic.tynt.com tcp
US 8.8.8.8:53 1.48.21.104.in-addr.arpa udp
US 8.8.8.8:53 14.200.250.142.in-addr.arpa udp
US 8.8.8.8:53 206.20.217.172.in-addr.arpa udp
US 8.8.8.8:53 2.10.26.104.in-addr.arpa udp
US 8.8.8.8:53 66.204.58.216.in-addr.arpa udp
US 104.18.13.146:443 sc.tynt.com tcp
GB 142.250.200.46:443 developers.google.com tcp
FR 172.217.20.206:443 clients6.google.com tcp
FR 172.217.20.206:443 clients6.google.com tcp
US 8.8.8.8:53 maps.googleapis.com udp
GB 142.250.187.234:443 maps.googleapis.com tcp
FR 172.217.20.206:443 clients6.google.com udp
GB 142.250.187.234:443 maps.googleapis.com udp
GB 142.250.187.234:443 maps.googleapis.com udp
US 8.8.8.8:53 46.200.250.142.in-addr.arpa udp
US 8.8.8.8:53 31.105.202.67.in-addr.arpa udp
US 8.8.8.8:53 195.20.217.172.in-addr.arpa udp
US 8.8.8.8:53 42.200.250.142.in-addr.arpa udp
US 8.8.8.8:53 234.187.250.142.in-addr.arpa udp
US 8.8.8.8:53 227.179.250.142.in-addr.arpa udp
GB 142.250.179.228:443 www.google.com udp
US 8.8.8.8:53 mt.googleapis.com udp
FR 216.58.213.78:443 mt.googleapis.com tcp
FR 216.58.213.78:443 mt.googleapis.com tcp
FR 216.58.213.78:443 mt.googleapis.com tcp
FR 216.58.213.78:443 mt.googleapis.com tcp
FR 216.58.213.78:443 mt.googleapis.com tcp
FR 216.58.213.78:443 mt.googleapis.com tcp
US 8.8.8.8:53 78.213.58.216.in-addr.arpa udp
FR 216.58.213.78:443 mt.googleapis.com udp
US 8.8.8.8:53 ssl.gstatic.com udp
FR 142.250.201.163:443 ssl.gstatic.com tcp
US 8.8.8.8:53 163.201.250.142.in-addr.arpa udp
US 8.8.8.8:53 play.google.com udp
GB 216.58.212.206:443 play.google.com tcp
US 8.8.8.8:53 206.212.58.216.in-addr.arpa udp
US 8.8.8.8:53 172.210.232.199.in-addr.arpa udp
US 8.8.8.8:53 whos.amung.us udp
US 172.67.8.141:445 whos.amung.us tcp
US 104.22.75.171:445 whos.amung.us tcp
US 104.22.74.171:445 whos.amung.us tcp
US 8.8.8.8:53 whos.amung.us udp

Files

C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad\settings.dat

MD5 ba6ef346187b40694d493da98d5da979
SHA1 643c15bec043f8673943885199bb06cd1652ee37
SHA256 d86eec91f295dfda8ed1c5fa99de426f2fe359282c7ebf67e3a40be739475d73
SHA512 2e6cc97330be8868d4b9c53be7e12c558f6eb1ac2c4080a611ba6c43561d0c5bb4791b8a11a8c2371599f0ba73ed1d9a7a2ea6dee2ae6a080f1912e0cb1f656c

\??\pipe\LOCAL\crashpad_764_PVEFELKMTQKSYMOH

MD5 d41d8cd98f00b204e9800998ecf8427e
SHA1 da39a3ee5e6b4b0d3255bfef95601890afd80709
SHA256 e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855
SHA512 cf83e1357eefb8bdf1542850d66d8007d620e4050b5715dc83f4a921d36ce9ce47d0d13c5d85f2b0ff8318d2877eec2f63b931bd47417a81a538327af927da3e

C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad\settings.dat

MD5 b8880802fc2bb880a7a869faa01315b0
SHA1 51d1a3fa2c272f094515675d82150bfce08ee8d3
SHA256 467b8cd4aacac66557712f9843023dcedefcc26efc746f3e44157bc8dac73812
SHA512 e1c6dba2579357ba70de58968b167d2c529534d24bff70568144270c48ac18a48ee2af2d58d78ae741e5a36958fa78a57955bd2456f1df00b781fc1002e123d2

C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Preferences

MD5 d3c2e4033bce91af2f06dc0097862289
SHA1 9e73eec338bb5727b3da4f30a38b77adb9c765c5
SHA256 f9ebf1dcfe645c3d15847f216cf3b58b0173c7fad85d51522d8202364ddf59ec
SHA512 dd681c204c2d35b5878a60d6d874bbde1a4f75cd3bcaa4aa94de92cf919f7504ba371423856281b04ab57f3b37742646911e33df3228535c3948afdaa3240750

C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Local State

MD5 c79fa7062bb74994c4966011511c4600
SHA1 e04375baa8e5ca4638b0f72e76dad2b36f8fb30f
SHA256 c3a0bb32d77fb40aaf723f362b8870d7337fef5d706ca8eb9acdcb1cf4ff35ea
SHA512 9b43056f78f6c632c1609a898f86b58cd5567d8f71a4f5da16d14bde092d2cce4c2dac558efeccf9edd9ea94b5292aaf49d23db4afabbcbe711ee2c9283294e8

C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Preferences

MD5 daf6c353c66ebf6f29b632d72259b7a6
SHA1 1bed0a0ee1a59d958bdd251af413fe34b55bcac7
SHA256 6ff498c334806e5edd4cc1dcc36f9ad42fe7f91b3c15e8d44b67c2ea5edee116
SHA512 8453de77e85dd1876a916d16373a775c1047e8becbd58eb878914cc06717b49e957a39fc14531826cf3a418614bb69a41a8617703f8d47e262c7a1f6aecf52ca

C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Preferences

MD5 9820d1b677a71c055a7265ca1c0d41e1
SHA1 90fa4b0b340044e5ef2b805a88ac262dc686e8bb
SHA256 1b36a9db3e1aafd5108586d93372cb08d296210848dd566fdc8fac59413f523f
SHA512 cf69e0e306dfb620c7b6792912db167a17482e50c5621fe38e2893c085860d650564dadefa0a392c0209aaa14e5ada5e9c88420e10ed19956e46d54dfb606d0c

C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\TransportSecurity

MD5 b2f18847acdbac230b0eded7eb00eedf
SHA1 48f323d14a5bfa6049036a5b3ec50901267a9e43
SHA256 26cbc44b3dc74ab691fda85e849aaf26b36f1f2d5628ca2ddd7e5bd51ab381ed
SHA512 7e9c1bbc6e7ba81cf6671ce792f0fb805343592e99c4d89882d042c033c1457401ab1553f69b703a69d00b98d388705c415c52856f2712bd32eee780bfd52921

C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\TransportSecurity~RFe584e3a.TMP

MD5 2e9105f869257b9d5ce5d3b56754711c
SHA1 0d1fe32a00999607d572079d0e53f2abcddab806
SHA256 c1a1d7756e6764594a15091dbc9ab526dea5201beef266160edbd25b96852a58
SHA512 d074ca7f57f37b6e7bb80d5474e22e3e2ab6af22f358394b8794f0694f05a73cf1ada2e8f596f82e1d6cb1224ce9e9d85aaaea0628074fa4c30bead597d78e76

C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index

MD5 5cd65ae9a1452b5a3c7af214de242496
SHA1 671854233139f381405218191aef17999686259a
SHA256 6006f99c681f32476ef43ee5102d2d2aabd0e37b425e02deabe6d0bcd303fa34
SHA512 89491e952f4ad350d47c4fda5fbbd517098b16fff005b161b4cec0e48d073fd8c9f397225e387baa9dbc3d38ac35bbdc758d91da62225e0788b97ff221cbc771

C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Network Persistent State

MD5 4b53e1883b1e2941ed30db2997cb5dc7
SHA1 3561c22a05aa37edda13e40c95ff655f10296776
SHA256 c1de469453c4c4cdd0f1a3e453fb8f54b19921f495b3cd1c685919e7a48692af
SHA512 7ac1f44a857b7d1bc12ac0b1b201bc936b36a16af393639a16a05ddd18b38616d469e765e1781898c71eae54c4b6f1883ab6b9e29f8a2915979a1aa8783413f4

C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Network Persistent State

MD5 a8956efe82c250674fb3901150eca67a
SHA1 35f4d44c01ef884fbbc02712c08efd51efcab882
SHA256 ffec074f713b9dc090a266da81158be3bc7aa25ea9d485c71518dfe6f063d4b1
SHA512 7d992675696a163e9a74833e805377199077eff3988631082a2b3444e0b95f1030b853c532e2138c98db17a55387a3fe08f60b09c6d93fc19a7106ab138ba051