Malware Analysis Report

2024-11-15 07:50

Sample ID 240605-296ajsbe81
Target spotdl-4.2.5-win32.exe
SHA256 f19794f059c93d7ca35eb4ead12f7c33c9cdfbc1bcbc77547cdb134e08b1b470
Tags
pyinstaller
score
7/10

Table of Contents

Analysis Overview

MITRE ATT&CK

Enterprise Matrix V15

Analysis: static1

Detonation Overview

Signatures

Analysis: behavioral1

Detonation Overview

Command Line

Signatures

Processes

Network

Files

Analysis Overview

score
7/10

SHA256

f19794f059c93d7ca35eb4ead12f7c33c9cdfbc1bcbc77547cdb134e08b1b470

Threat Level: Shows suspicious behavior

The file spotdl-4.2.5-win32.exe was found to be: Shows suspicious behavior.

Malicious Activity Summary

pyinstaller

Loads dropped DLL

Legitimate hosting services abused for malware hosting/C2

Enumerates physical storage devices

Detects Pyinstaller

Unsigned PE

Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary

Suspicious use of FindShellTrayWindow

Suspicious use of SendNotifyMessage

Suspicious use of WriteProcessMemory

Enumerates system info in registry

Suspicious behavior: EnumeratesProcesses

MITRE ATT&CK

Analysis: static1

Detonation Overview

Reported

2024-06-05 23:17

Signatures

Detects Pyinstaller

pyinstaller
Description Indicator Process Target
N/A N/A N/A N/A

Unsigned PE

Description Indicator Process Target
N/A N/A N/A N/A

Analysis: behavioral1

Detonation Overview

Submitted

2024-06-05 23:17

Reported

2024-06-05 23:21

Platform

win11-20240508-en

Max time kernel

56s

Max time network

28s

Command Line

"C:\Users\Admin\AppData\Local\Temp\spotdl-4.2.5-win32.exe"

Signatures

Loads dropped DLL

Description Indicator Process Target
N/A N/A C:\Users\Admin\AppData\Local\Temp\spotdl-4.2.5-win32.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\spotdl-4.2.5-win32.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\spotdl-4.2.5-win32.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\spotdl-4.2.5-win32.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\spotdl-4.2.5-win32.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\spotdl-4.2.5-win32.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\spotdl-4.2.5-win32.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\spotdl-4.2.5-win32.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\spotdl-4.2.5-win32.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\spotdl-4.2.5-win32.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\spotdl-4.2.5-win32.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\spotdl-4.2.5-win32.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\spotdl-4.2.5-win32.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\spotdl-4.2.5-win32.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\spotdl-4.2.5-win32.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\spotdl-4.2.5-win32.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\spotdl-4.2.5-win32.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\spotdl-4.2.5-win32.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\spotdl-4.2.5-win32.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\spotdl-4.2.5-win32.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\spotdl-4.2.5-win32.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\spotdl-4.2.5-win32.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\spotdl-4.2.5-win32.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\spotdl-4.2.5-win32.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\spotdl-4.2.5-win32.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\spotdl-4.2.5-win32.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\spotdl-4.2.5-win32.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\spotdl-4.2.5-win32.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\spotdl-4.2.5-win32.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\spotdl-4.2.5-win32.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\spotdl-4.2.5-win32.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\spotdl-4.2.5-win32.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\spotdl-4.2.5-win32.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\spotdl-4.2.5-win32.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\spotdl-4.2.5-win32.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\spotdl-4.2.5-win32.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\spotdl-4.2.5-win32.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\spotdl-4.2.5-win32.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\spotdl-4.2.5-win32.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\spotdl-4.2.5-win32.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\spotdl-4.2.5-win32.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\spotdl-4.2.5-win32.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\spotdl-4.2.5-win32.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\spotdl-4.2.5-win32.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\spotdl-4.2.5-win32.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\spotdl-4.2.5-win32.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\spotdl-4.2.5-win32.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\spotdl-4.2.5-win32.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\spotdl-4.2.5-win32.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\spotdl-4.2.5-win32.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\spotdl-4.2.5-win32.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\spotdl-4.2.5-win32.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\spotdl-4.2.5-win32.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\spotdl-4.2.5-win32.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\spotdl-4.2.5-win32.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\spotdl-4.2.5-win32.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\spotdl-4.2.5-win32.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\spotdl-4.2.5-win32.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\spotdl-4.2.5-win32.exe N/A

Legitimate hosting services abused for malware hosting/C2

Description Indicator Process Target
N/A raw.githubusercontent.com N/A N/A
N/A raw.githubusercontent.com N/A N/A
N/A raw.githubusercontent.com N/A N/A
N/A raw.githubusercontent.com N/A N/A
N/A raw.githubusercontent.com N/A N/A

Enumerates physical storage devices

Enumerates system info in registry

Description Indicator Process Target
Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe N/A
Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe N/A
Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe N/A

Suspicious use of FindShellTrayWindow

Description Indicator Process Target
N/A N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe N/A
N/A N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe N/A
N/A N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe N/A
N/A N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe N/A
N/A N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe N/A
N/A N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe N/A
N/A N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe N/A
N/A N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe N/A
N/A N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe N/A
N/A N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe N/A
N/A N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe N/A
N/A N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe N/A
N/A N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe N/A
N/A N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe N/A
N/A N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe N/A
N/A N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe N/A
N/A N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe N/A
N/A N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe N/A
N/A N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe N/A
N/A N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe N/A
N/A N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe N/A
N/A N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe N/A
N/A N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe N/A
N/A N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe N/A
N/A N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe N/A

Suspicious use of WriteProcessMemory

Description Indicator Process Target
PID 3896 wrote to memory of 4360 N/A C:\Users\Admin\AppData\Local\Temp\spotdl-4.2.5-win32.exe C:\Users\Admin\AppData\Local\Temp\spotdl-4.2.5-win32.exe
PID 3896 wrote to memory of 4360 N/A C:\Users\Admin\AppData\Local\Temp\spotdl-4.2.5-win32.exe C:\Users\Admin\AppData\Local\Temp\spotdl-4.2.5-win32.exe
PID 4360 wrote to memory of 3340 N/A C:\Users\Admin\AppData\Local\Temp\spotdl-4.2.5-win32.exe C:\Windows\system32\cmd.exe
PID 4360 wrote to memory of 3340 N/A C:\Users\Admin\AppData\Local\Temp\spotdl-4.2.5-win32.exe C:\Windows\system32\cmd.exe
PID 4360 wrote to memory of 656 N/A C:\Users\Admin\AppData\Local\Temp\spotdl-4.2.5-win32.exe C:\Windows\system32\cmd.exe
PID 4360 wrote to memory of 656 N/A C:\Users\Admin\AppData\Local\Temp\spotdl-4.2.5-win32.exe C:\Windows\system32\cmd.exe
PID 4360 wrote to memory of 1596 N/A C:\Users\Admin\AppData\Local\Temp\spotdl-4.2.5-win32.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 4360 wrote to memory of 1596 N/A C:\Users\Admin\AppData\Local\Temp\spotdl-4.2.5-win32.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 1596 wrote to memory of 3096 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 1596 wrote to memory of 3096 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 1596 wrote to memory of 3216 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 1596 wrote to memory of 3216 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 1596 wrote to memory of 3216 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 1596 wrote to memory of 3216 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 1596 wrote to memory of 3216 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 1596 wrote to memory of 3216 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 1596 wrote to memory of 3216 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 1596 wrote to memory of 3216 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 1596 wrote to memory of 3216 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 1596 wrote to memory of 3216 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 1596 wrote to memory of 3216 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 1596 wrote to memory of 3216 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 1596 wrote to memory of 3216 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 1596 wrote to memory of 3216 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 1596 wrote to memory of 3216 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 1596 wrote to memory of 3216 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 1596 wrote to memory of 3216 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 1596 wrote to memory of 3216 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 1596 wrote to memory of 3216 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 1596 wrote to memory of 3216 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 1596 wrote to memory of 3216 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 1596 wrote to memory of 3216 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 1596 wrote to memory of 3216 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 1596 wrote to memory of 3216 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 1596 wrote to memory of 3216 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 1596 wrote to memory of 3216 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 1596 wrote to memory of 3216 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 1596 wrote to memory of 3216 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 1596 wrote to memory of 3216 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 1596 wrote to memory of 3216 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 1596 wrote to memory of 3216 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 1596 wrote to memory of 3216 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 1596 wrote to memory of 3216 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 1596 wrote to memory of 3216 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 1596 wrote to memory of 3216 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 1596 wrote to memory of 3216 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 1596 wrote to memory of 3216 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 1596 wrote to memory of 3216 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 1596 wrote to memory of 3216 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 1596 wrote to memory of 3216 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 1596 wrote to memory of 4264 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 1596 wrote to memory of 4264 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 1596 wrote to memory of 868 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 1596 wrote to memory of 868 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 1596 wrote to memory of 868 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 1596 wrote to memory of 868 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 1596 wrote to memory of 868 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 1596 wrote to memory of 868 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 1596 wrote to memory of 868 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 1596 wrote to memory of 868 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 1596 wrote to memory of 868 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 1596 wrote to memory of 868 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 1596 wrote to memory of 868 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 1596 wrote to memory of 868 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe

Processes

C:\Users\Admin\AppData\Local\Temp\spotdl-4.2.5-win32.exe

"C:\Users\Admin\AppData\Local\Temp\spotdl-4.2.5-win32.exe"

C:\Users\Admin\AppData\Local\Temp\spotdl-4.2.5-win32.exe

"C:\Users\Admin\AppData\Local\Temp\spotdl-4.2.5-win32.exe"

C:\Windows\system32\cmd.exe

C:\Windows\system32\cmd.exe /c "ver"

C:\Windows\system32\cmd.exe

C:\Windows\system32\cmd.exe /c "ver"

C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe

"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument http://localhost:8800/

C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe

"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=90.0.4430.212 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=90.0.818.66 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffcb7d13cb8,0x7ffcb7d13cc8,0x7ffcb7d13cd8

C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe

"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=1896,2902680222592489000,13948632798062347944,131072 --gpu-preferences=SAAAAAAAAADgAAAwAAAAAAAAAAAAAAAAAABgAAAAAAAoAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAB4AAAAAAAAAHgAAAAAAAAAKAAAAAQAAAAgAAAAAAAAACgAAAAAAAAAMAAAAAAAAAA4AAAAAAAAABAAAAAAAAAAAAAAAAUAAAAQAAAAAAAAAAAAAAAGAAAAEAAAAAAAAAABAAAABQAAABAAAAAAAAAAAQAAAAYAAAAIAAAAAAAAAAgAAAAAAAAA --mojo-platform-channel-handle=1928 /prefetch:2

C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe

"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=1896,2902680222592489000,13948632798062347944,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2284 /prefetch:3

C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe

"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=1896,2902680222592489000,13948632798062347944,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2680 /prefetch:8

C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe

"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1896,2902680222592489000,13948632798062347944,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3252 /prefetch:1

C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe

"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1896,2902680222592489000,13948632798062347944,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3264 /prefetch:1

C:\Windows\System32\CompPkgSrv.exe

C:\Windows\System32\CompPkgSrv.exe -Embedding

C:\Windows\System32\CompPkgSrv.exe

C:\Windows\System32\CompPkgSrv.exe -Embedding

C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe

"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --field-trial-handle=1896,2902680222592489000,13948632798062347944,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5148 /prefetch:8

C:\Program Files (x86)\Microsoft\Edge\Application\90.0.818.66\identity_helper.exe

"C:\Program Files (x86)\Microsoft\Edge\Application\90.0.818.66\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=1896,2902680222592489000,13948632798062347944,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5432 /prefetch:8

C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe

"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1896,2902680222592489000,13948632798062347944,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4720 /prefetch:1

C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe

"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1896,2902680222592489000,13948632798062347944,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5028 /prefetch:1

C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe

"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1896,2902680222592489000,13948632798062347944,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3308 /prefetch:1

C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe

"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1896,2902680222592489000,13948632798062347944,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5644 /prefetch:1

C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe

"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1896,2902680222592489000,13948632798062347944,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=13 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3304 /prefetch:1

C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe

"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1896,2902680222592489000,13948632798062347944,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=14 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5648 /prefetch:1

C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe

"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1896,2902680222592489000,13948632798062347944,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=15 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5892 /prefetch:1

C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe

"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1896,2902680222592489000,13948632798062347944,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=16 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6104 /prefetch:1

Network

Country Destination Domain Proto
US 8.8.8.8:53 github.com udp
GB 20.26.156.215:443 github.com tcp
US 185.199.110.133:443 raw.githubusercontent.com tcp
US 8.8.8.8:53 215.156.26.20.in-addr.arpa udp
GB 142.250.200.14:443 music.youtube.com tcp
GB 20.26.156.210:443 api.github.com tcp
GB 20.26.156.210:443 api.github.com tcp
US 185.199.108.133:443 raw.githubusercontent.com tcp
US 185.199.108.133:443 raw.githubusercontent.com tcp
US 185.199.108.133:443 raw.githubusercontent.com tcp
US 185.199.108.133:443 raw.githubusercontent.com tcp
N/A 127.0.0.1:49972 tcp
NL 5.79.76.225:443 b.azlyrics.com tcp
US 8.8.8.8:53 172.210.232.199.in-addr.arpa udp
NL 5.79.76.225:443 b.azlyrics.com tcp
US 104.26.13.204:443 api.iconify.design tcp
NL 5.79.76.225:443 b.azlyrics.com tcp
NL 5.79.76.225:443 b.azlyrics.com tcp
N/A 224.0.0.251:5353 udp

Files

C:\Users\Admin\AppData\Local\Temp\_MEI38962\ucrtbase.dll

MD5 6b9880ec69f2988d1035fa11969fa894
SHA1 add955b1826c79aa43afb268682aad5614d5f1e6
SHA256 c446df8432ff2679961763de876432fcf13f272269c17417e7eccbda0b000448
SHA512 747d074dbc9bd020feb04c009ad8bd975a4c9a37e0ead8093908237ab00f08e46beb73bfc3a7b41bedb99130877343206a0a2568b611161d17ece5597e3416d9

C:\Users\Admin\AppData\Local\Temp\_MEI38962\python310.dll

MD5 63a1fa9259a35eaeac04174cecb90048
SHA1 0dc0c91bcd6f69b80dcdd7e4020365dd7853885a
SHA256 14b06796f288bc6599e458fb23a944ab0c843e9868058f02a91d4606533505ed
SHA512 896caa053f48b1e4102e0f41a7d13d932a746eea69a894ae564ef5a84ef50890514deca6496e915aae40a500955220dbc1b1016fe0b8bcdde0ad81b2917dea8b

C:\Users\Admin\AppData\Local\Temp\_MEI38962\VCRUNTIME140.dll

MD5 f34eb034aa4a9735218686590cba2e8b
SHA1 2bc20acdcb201676b77a66fa7ec6b53fa2644713
SHA256 9d2b40f0395cc5d1b4d5ea17b84970c29971d448c37104676db577586d4ad1b1
SHA512 d27d5e65e8206bd7923cf2a3c4384fec0fc59e8bc29e25f8c03d039f3741c01d1a8c82979d7b88c10b209db31fbbec23909e976b3ee593dc33481f0050a445af

C:\Users\Admin\AppData\Local\Temp\_MEI38962\base_library.zip

MD5 721e98ac1c901a0c6a3d867f663932b1
SHA1 f04347eeae764a541fbd6252c525301d43bc36b6
SHA256 b8e1b3eec714e90db1d22af241d1a0c0ca69e6e93cf07ab00a6eb17512ac5b92
SHA512 ad25e634ca420837dc6251a631213ef1237f4da2da4eb81485d37457437e2519cca4277f5ac6759cc2cb277fe6ad98d05fea390227f834f8a4572f94a0628e12

C:\Users\Admin\AppData\Local\Temp\_MEI38962\_ctypes.pyd

MD5 1635a0c5a72df5ae64072cbb0065aebe
SHA1 c975865208b3369e71e3464bbcc87b65718b2b1f
SHA256 1ea3dd3df393fa9b27bf6595be4ac859064cd8ef9908a12378a6021bba1cb177
SHA512 6e34346ea8a0aacc29ccd480035da66e280830a7f3d220fd2f12d4cfa3e1c03955d58c0b95c2674aea698a36a1b674325d3588483505874c2ce018135320ff99

C:\Users\Admin\AppData\Local\Temp\_MEI38962\libffi-7.dll

MD5 eef7981412be8ea459064d3090f4b3aa
SHA1 c60da4830ce27afc234b3c3014c583f7f0a5a925
SHA256 f60dd9f2fcbd495674dfc1555effb710eb081fc7d4cae5fa58c438ab50405081
SHA512 dc9ff4202f74a13ca9949a123dff4c0223da969f49e9348feaf93da4470f7be82cfa1d392566eaaa836d77dde7193fed15a8395509f72a0e9f97c66c0a096016

C:\Users\Admin\AppData\Local\Temp\_MEI38962\_bz2.pyd

MD5 86d1b2a9070cd7d52124126a357ff067
SHA1 18e30446fe51ced706f62c3544a8c8fdc08de503
SHA256 62173a8fadd4bf4dd71ab89ea718754aa31620244372f0c5bbbae102e641a60e
SHA512 7db4b7e0c518a02ae901f4b24e3860122acc67e38e73f98f993fe99eb20bb3aa539db1ed40e63d6021861b54f34a5f5a364907ffd7da182adea68bbdd5c2b535

C:\Users\Admin\AppData\Local\Temp\_MEI38962\_lzma.pyd

MD5 7447efd8d71e8a1929be0fac722b42dc
SHA1 6080c1b84c2dcbf03dcc2d95306615ff5fce49a6
SHA256 60793c8592193cfbd00fd3e5263be4315d650ba4f9e4fda9c45a10642fd998be
SHA512 c6295d45ed6c4f7534c1a38d47ddc55fea8b9f62bbdc0743e4d22e8ad0484984f8ab077b73e683d0a92d11bf6588a1ae395456cfa57da94bb2a6c4a1b07984de

C:\Users\Admin\AppData\Local\Temp\_MEI38962\api-ms-win-crt-math-l1-1-0.dll

MD5 db734d502665e4972717837aa2bf2223
SHA1 956b4ff9c59a3a4f4e447d16d0c898dd9bac6147
SHA256 fd7c108c8b26ef8bbb3eee7dbadfa6031dfb6c2c0c1a74953034e0d080219646
SHA512 04443719af07dd7ea50d009ddc3199ff2c9a66a3ce04c9559c82f3db7337113f65974ff104b250fec76bd5765f9e5f5805e381446ccbdd27274e4665de2e50e5

C:\Users\Admin\AppData\Local\Temp\_MEI38962\_decimal.pyd

MD5 20c77203ddf9ff2ff96d6d11dea2edcf
SHA1 0d660b8d1161e72c993c6e2ab0292a409f6379a5
SHA256 9aac010a424c757c434c460c3c0a6515d7720966ab64bad667539282a17b4133
SHA512 2b24346ece2cbd1e9472a0e70768a8b4a5d2c12b3d83934f22ebdc9392d9023dcb44d2322ada9edbe2eb0e2c01b5742d2a83fa57ca23054080909ec6eb7cf3ca

C:\Users\Admin\AppData\Local\Temp\_MEI38962\_brotli.cp310-win_amd64.pyd

MD5 ee3d454883556a68920caaedefbc1f83
SHA1 45b4d62a6e7db022e52c6159eef17e9d58bec858
SHA256 791e7195d7df47a21466868f3d7386cff13f16c51fcd0350bf4028e96278dff1
SHA512 e404adf831076d27680cc38d3879af660a96afc8b8e22ffd01647248c601f3c6c4585d7d7dc6bbd187660595f6a48f504792106869d329aa1a0f3707d7f777c6

C:\Users\Admin\AppData\Local\Temp\_MEI38962\_asyncio.pyd

MD5 33d0b6de555ddbbbd5ca229bfa91c329
SHA1 03034826675ac93267ce0bf0eaec9c8499e3fe17
SHA256 a9a99a2b847e46c0efce7fcfefd27f4bce58baf9207277c17bffd09ef4d274e5
SHA512 dbbd1ddfa445e22a0170a628387fcf3cb95e6f8b09465d76595555c4a67da4274974ba7b348c4c81fe71c68d735c13aacb8063d3a964a8a0556fb000d68686b7

C:\Users\Admin\AppData\Local\Temp\_MEI38962\VCRUNTIME140_1.dll

MD5 135359d350f72ad4bf716b764d39e749
SHA1 2e59d9bbcce356f0fece56c9c4917a5cacec63d7
SHA256 34048abaa070ecc13b318cea31425f4ca3edd133d350318ac65259e6058c8b32
SHA512 cf23513d63ab2192c78cae98bd3fea67d933212b630be111fa7e03be3e92af38e247eb2d3804437fd0fda70fdc87916cd24cf1d3911e9f3bfb2cc4ab72b459ba

C:\Users\Admin\AppData\Local\Temp\_MEI38962\unicodedata.pyd

MD5 81d62ad36cbddb4e57a91018f3c0816e
SHA1 fe4a4fc35df240b50db22b35824e4826059a807b
SHA256 1fb2d66c056f69e8bbdd8c6c910e72697874dae680264f8fb4b4df19af98aa2e
SHA512 7d15d741378e671591356dfaad4e1e03d3f5456cbdf87579b61d02a4a52ab9b6ecbffad3274cede8c876ea19eaeb8ba4372ad5986744d430a29f50b9caffb75d

C:\Users\Admin\AppData\Local\Temp\_MEI38962\sqlite3.dll

MD5 914925249a488bd62d16455d156bd30d
SHA1 7e66ba53f3512f81c9014d322fcb7dd895f62c55
SHA256 fbd8832b5bc7e5c9adcf7320c051a67ee1c33fd198105283058533d132785ab4
SHA512 21a468929b15b76b313b32be65cfc50cad8f03c3b2e9bf11ca3b02c88a0482b7bc15646ce40df7fb42fbc96bd12362a54cffe0563c4ddc3fc78622622c699186

C:\Users\Admin\AppData\Local\Temp\_MEI38962\select.pyd

MD5 a653f35d05d2f6debc5d34daddd3dfa1
SHA1 1a2ceec28ea44388f412420425665c3781af2435
SHA256 db85f2f94d4994283e1055057372594538ae11020389d966e45607413851d9e9
SHA512 5aede99c3be25b1a962261b183ae7a7fb92cb0cb866065dc9cd7bb5ff6f41cc8813d2cc9de54670a27b3ad07a33b833eaa95a5b46dad7763ca97dfa0c1ce54c9

C:\Users\Admin\AppData\Local\Temp\_MEI38962\pyexpat.pyd

MD5 1118c1329f82ce9072d908cbd87e197c
SHA1 c59382178fe695c2c5576dca47c96b6de4bbcffd
SHA256 4a2d59993bce76790c6d923af81bf404f8e2cb73552e320113663b14cf78748c
SHA512 29f1b74e96a95b0b777ef00448da8bd0844e2f1d8248788a284ec868ae098c774a694d234a00bd991b2d22c2372c34f762cdbd9ec523234861e39c0ca752dcaa

C:\Users\Admin\AppData\Local\Temp\_MEI38962\MSVCP140.dll

MD5 011d260eab3b3dd865a60c93bf012dda
SHA1 c145a1874b4303492d904d4cf608f971b90f5c83
SHA256 8f59c5f5c949a6a6532ec1bba3fe085fa8c157354f66ec8166a09cc5b7ecaec8
SHA512 3d2437087c9174c83e0dcafc3b3e963094377fa8b5f980c30fcd2c2d399a5b0796241498f80a499483e94db6ed3924a70d0387b2c2ae9724c72816469f9bd551

C:\Users\Admin\AppData\Local\Temp\_MEI38962\libssl-1_1.dll

MD5 bec0f86f9da765e2a02c9237259a7898
SHA1 3caa604c3fff88e71f489977e4293a488fb5671c
SHA256 d74ce01319ae6f54483a19375524aa39d9f5fd91f06cf7df238ca25e043130fd
SHA512 ffbc4e5ffdb49704e7aa6d74533e5af76bbe5db297713d8e59bd296143fe5f145fbb616b343eed3c48eceaccccc2431630470d8975a4a17c37eafcc12edd19f4

C:\Users\Admin\AppData\Local\Temp\_MEI38962\libcrypto-1_1.dll

MD5 9d7a0c99256c50afd5b0560ba2548930
SHA1 76bd9f13597a46f5283aa35c30b53c21976d0824
SHA256 9b7b4a0ad212095a8c2e35c71694d8a1764cd72a829e8e17c8afe3a55f147939
SHA512 cb39aa99b9d98c735fdacf1c5ed68a4d09d11f30262b91f6aa48c3f8520eff95e499400d0ce7e280ca7a90ff6d7141d2d893ef0b33a8803a1cadb28ba9a9e3e2

C:\Users\Admin\AppData\Local\Temp\_MEI38962\api-ms-win-crt-utility-l1-1-0.dll

MD5 adf34cc419a27f0b58e7e4dff9d727b2
SHA1 15e74e9108aa3806d5d2ec1c57ac1ce0590d110a
SHA256 9ebe8f7e48f9989c878bed62126859677027b8f5f6cd7089c8bc846bdc8f79f9
SHA512 0f63dcabe5427efac31cdfc277a9e564d4d2422015fb0183aae05845a04ae64476eb7ff6e7a897af504f65836c1d2ccb9128638802d7bb92176119410830ffaf

C:\Users\Admin\AppData\Local\Temp\_MEI38962\api-ms-win-crt-time-l1-1-0.dll

MD5 f59baedde0a1bb608edc3fbec21e1956
SHA1 ee415e6cb3833945496df71ea427b6df2c32b2ab
SHA256 88e5cb9f5e3981e0792991583d2c5b4309787498f5a4a317d8bf3ef3658e9710
SHA512 4182db934fecc25eadc2a2dacd233ed219781ebf5a77cf1afd7f9257ad2105c01015c9fc6bbe646c44b81f0a516622d2e4aa907075da4a279bb79d79cd4fbe17

C:\Users\Admin\AppData\Local\Temp\_MEI38962\api-ms-win-crt-string-l1-1-0.dll

MD5 23438c3d8e1636fa97a61efd902e4527
SHA1 7c93b5e8c0a585a734689ad21356e00319290bb8
SHA256 91fb2c073fcd138b41c34e90b7fee8b852a1371da638aa5e34a365c2fe9e6c9f
SHA512 43cd7ae9ffc193cfc7207694446b834b67d7c35809cb05b5412a4047811437638886e3a0351e889e0787618998cd4eb780fe2770567d9e01c6726d21b79017a4

C:\Users\Admin\AppData\Local\Temp\_MEI38962\api-ms-win-crt-stdio-l1-1-0.dll

MD5 d6dbfe98e6a0c8eb8697c50c8994a2ae
SHA1 0393725acaa5515626ac391977e847f8ec8c2f8c
SHA256 c4fe765c675f30acf8b22040ba77ac0f06d1c334489f0e5da4f98f648a73f0f1
SHA512 a078bcff3e0be316b5fe7da0a7e4101dac0d762b698f6674d082f5c87ec03387872e585e14a73535bb472c7d2bd7afcf2847811485b412e334c80538aca9ceba

C:\Users\Admin\AppData\Local\Temp\_MEI38962\api-ms-win-crt-runtime-l1-1-0.dll

MD5 c0a2e9713ee6e7b04dd1e66915ec32b6
SHA1 12539c6b3f2770f34fc45c61817bd8b9675c1d25
SHA256 973e8a72432bd3169aec3967ce18146938608a335329a9b2d764b43aeeddddbb
SHA512 8c1d313833eb3dae895495ffe313e09cde399ec3409c71c405dd4212b66a9ea8894d8339ad5ecc40c2378755a4d22b1eee1d64f771728474dc28e1ed9818bc1b

C:\Users\Admin\AppData\Local\Temp\_MEI38962\api-ms-win-crt-locale-l1-1-0.dll

MD5 58f54ccdc55f6d6c8d62dc72d75ee063
SHA1 2e25bdb7de5e9d320cf3439c8b6073b1952784dc
SHA256 556af10c9c9cee5ce7dab89a66693f41b50051bb39abb8365374829004cfe20e
SHA512 f79bcf4098868f82577f3b985551198506359eff50681da925ef951a368b4d48470dae8d887d02985a84fb791036831b7b2bebf6c5b9a7c0701eaaf331609819

C:\Users\Admin\AppData\Local\Temp\_MEI38962\api-ms-win-crt-heap-l1-1-0.dll

MD5 6b32d1060aade3b0d8b15b171f14d20e
SHA1 7cf40ea05eabf369f4889d5109e4c79df0322912
SHA256 5847f24760d9b392264e02b00933e4e8cbed704238f24075ccdd0e2bef3fd86a
SHA512 93c37c39c2c46fba8a78f8019d123e6d908f5971d91af23ff9704c9bee6c8de1bffeae61dc7c4fae9398ea01764b53a19b9e7d8a47c7a032c3ae5392c0006563

C:\Users\Admin\AppData\Local\Temp\_MEI38962\api-ms-win-crt-filesystem-l1-1-0.dll

MD5 14e1bafb694fb7c8671649eeac71ae1e
SHA1 5f0bfd72e0a60e01458ac522a79e6afc46bc1a47
SHA256 1817be3001c47078676cc8e43e472efc95bc8a56f73dbcdb303036f6758be398
SHA512 670ef8520b2c3d643deee2cbe3eea5697f575ebe132e5fcb1daf33423a4c9c74e721d10a24873dde238161a3228df7893179d37d957f904ea15e6d274512628f

C:\Users\Admin\AppData\Local\Temp\_MEI38962\api-ms-win-crt-environment-l1-1-0.dll

MD5 39150685e6ac8cfaf8cd6abc56a2be37
SHA1 50dd3633db29ded2ea70056dbb96b42d4d7c542b
SHA256 a6522d4ec322ba2d55704e5990d465620ab33dbcbf2716bbb1a5c0a997a4c800
SHA512 c082e7611e767f7650cd843b1c03ac10d5585698b68090a3a9d91cbf946699a797aab90fcfa750847b662502a5e407754fe7337d126b71734469c8ee617480c1

C:\Users\Admin\AppData\Local\Temp\_MEI38962\api-ms-win-crt-convert-l1-1-0.dll

MD5 ad107dadc3298da8e5b8b5979a429b60
SHA1 cd1e31d3b31f8a07c20addfe6063f8dffd8bb201
SHA256 a3330afde4c96d0bfd58a328d32cec7f47013a737a33fe074678ef5537e9f34e
SHA512 f5032e717a3566c86c9f1a5f0b5fd5f6797a9d298f8bc07d8c955bc156da6ecea66c08a3b8f88fe1007de4c214ade98391f0b3b22252aa67b051b3cea2ae802c

C:\Users\Admin\AppData\Local\Temp\_MEI38962\api-ms-win-crt-conio-l1-1-0.dll

MD5 9e348cb5f8d93c9adafa0907564ba487
SHA1 fac47a2127756581de8a1e49cd86239b2fe90de5
SHA256 a0c144a76b80909a25b202114c07a06927f33ec237131d27c409cb4411bd6f1b
SHA512 1611284adb4491ead21a9088f8890df2d7e9eb6401228104aa4df20f6e8d8e2f59e80378563883722c18be5d31a2da78db43978375f5b8e1b36a723696b06bcf

C:\Users\Admin\AppData\Local\Temp\_MEI38962\api-ms-win-core-util-l1-1-0.dll

MD5 53bf180be1d6b795b6163770af75cb20
SHA1 1817e20b2020be1e3e1cb0ffd8e243ad8f9f80ac
SHA256 96d0b3666651b0ad01fd7877ea19f35c78fd3b87e0da0007889212022edbba8d
SHA512 8c32ccf1c1b20e9cd9160318d2b8c8eaf97c1198ba78efcbc271ca0292189f04d68d38e8948a49e4585039689d671fab84d86128919418d207c167fdd3f99a64

C:\Users\Admin\AppData\Local\Temp\_MEI38962\api-ms-win-core-timezone-l1-1-0.dll

MD5 8a7fbe2425592dd419f6cf665613b967
SHA1 af2170a7e5f27111e32fa27ecfdddaa41edc8156
SHA256 a6cbce99976a8fdd8d9cc278c7d8aebbc4a6ae6404684021d73c8f4e520b98dc
SHA512 57d41d57721f9e37c6ea8a55ac156f9275d2373beead9f5c836ff7379c49c6676b9168bf278206fe2e60b576e066d8706ec1ed0a96b3db82b197d724f4a2279f

C:\Users\Admin\AppData\Local\Temp\_MEI38962\api-ms-win-core-sysinfo-l1-1-0.dll

MD5 a992a0e59e2530e67281f8db9bd28c80
SHA1 96a0b9780a53384d2dc65b9a5305312a1ecc7ddc
SHA256 71ba7dd22ffa833b924778c5d0421819cf01625b4d7462c463c2cf75cf596806
SHA512 5633e37239bd3678b4d6d1e2a74c3f59394b30da2cbd0797c882f418250894049b85684b12e0fb367e762ce7f205c0715532266d6cfd0580b7b58adfe07def7f

C:\Users\Admin\AppData\Local\Temp\_MEI38962\api-ms-win-core-synch-l1-2-0.dll

MD5 b8a4e7ce46930e538eec8290332fe6dc
SHA1 ea6938f141edc0ba3f32aef3bea90597e9a58707
SHA256 8ec827f3a991a313137d3c378bddc7022640c0b1ba79ebcd847ed3ecedc425b3
SHA512 1707324e08dc74de23c98ae62ccb4373e2dcd7c2a1aced7b2c5a98436efefc9baecf80dde07fca5c775ab14a79816ff9034d46a97640e1a0d2a82a561a7c698f

C:\Users\Admin\AppData\Local\Temp\_MEI38962\api-ms-win-core-synch-l1-1-0.dll

MD5 e58cc2297847d947b50d7d81f8d6c518
SHA1 1580d3d4b1093549ebb6d95cb5d0d32b8d6b5f45
SHA256 da79a38d4799a9e4f3aaaaeea05a2f47d323d3472f5361478e20e5075b63af9e
SHA512 258d6c1d37884a7ab313dd2e98fb88b94cdeb908f31dd296745c1fa5f2ae105cfbb225909e2dc9b178531183bb98195cb689ce14ff2570bc168e46e69c544e84

C:\Users\Admin\AppData\Local\Temp\_MEI38962\api-ms-win-core-string-l1-1-0.dll

MD5 a871b3bbadd412d4634648688a881a5e
SHA1 6d4dff475b8d2f270f4ca3393186e3ae20ef2273
SHA256 e7f1d2398de4a7242b79a21f85d3ab9bdaac3e70e50ef1eac5da1cba09dda192
SHA512 c05a8965858cca999334cd085aac771c71597b4b35a0c309ca8bb4d23cc9ec636ac4be7c1ac5ae36f6813bf92761a7584151eb9bc4583772e8f7c39bcc862cc7

C:\Users\Admin\AppData\Local\Temp\_MEI38962\api-ms-win-core-rtlsupport-l1-1-0.dll

MD5 8afde80df750f5ab010bc08a85c52776
SHA1 3696bfc329ced5a61819fa785fca0f955d3a309f
SHA256 f205e9c1ad5f029555d56a24fb7a3309a6ddd554eb19989fc3a1d309c990a6bd
SHA512 2ddb753c58ba6108d3bb09b4f5aca47dbd0dc5449ed75851c05f0f1db5a8bf9a59572b416260df6338cf3838ded2541d832755d9e82972bc191d1d1453454599

C:\Users\Admin\AppData\Local\Temp\_MEI38962\api-ms-win-core-profile-l1-1-0.dll

MD5 37851625d48c3c435e64566387b8fba9
SHA1 6d0ba0836270984c91a0cfd410eeb50edf6b62d6
SHA256 516d34cafdfbdf5e89804fe2b9c995f23fac93672ab1de9cffa55f6bdb0d1e24
SHA512 0da8d12e42aacd4d447434a5a83952da2230fd1970e213a23eeddc25606e55cb9fdcda06787eae403c14279591974cfa5dad3bfaf598fd875a5ccea2122924b8

C:\Users\Admin\AppData\Local\Temp\_MEI38962\api-ms-win-core-processthreads-l1-1-1.dll

MD5 8ce9f911908bc20529ce03b7836397f5
SHA1 b8554a420c1372474e15d931f2f50e433d3b634e
SHA256 257d25b17680639ef9175e272c2cec4239a395651a69115441ba234c4b30ec0b
SHA512 980af4b0b3749d5e5842be388734b6385f0181eb5319b3e7802fcb33aada78b6bcf753a4eed29584e988b2708798e3da2ebd286c09fc5c518f8a1e2c5754fb11

C:\Users\Admin\AppData\Local\Temp\_MEI38962\api-ms-win-core-processthreads-l1-1-0.dll

MD5 20bdf0aa438ddfbf65952d202d5cda25
SHA1 eaf1c6b6400cda52637dd68fc17d20c2b7f09dd8
SHA256 70a96238fe9b62eb195d1f1553624fbc45b52cc12dc7193913e6e65c71e09321
SHA512 188a22db1df1c417fcffc83b4e51925012dd551900746b000582dcfdb5994e23d9ddb278ba96a0697560a1680534c6d78e31b1749f062dbefa3f0c0a8ef7bc4b

C:\Users\Admin\AppData\Local\Temp\_MEI38962\api-ms-win-core-processenvironment-l1-1-0.dll

MD5 bc19bc9c45a169cc62f9e7975da0cc35
SHA1 55fe4e9733ed24c00d58702e6740c4f078d0a7b1
SHA256 b3b48223093c2b210f76fd38d3d70b9c0bd17834c2762d1172bee7f12411512f
SHA512 5140df1cdf68260b698bc59ed9ca0a4315bd96987c974a800e8077f73b0887fccc2ab3aedb7ad6c772c70c98ed281211d8cff9306eea8e0e8d83f257453de8d9

C:\Users\Admin\AppData\Local\Temp\_MEI38962\api-ms-win-core-namedpipe-l1-1-0.dll

MD5 163050861c7d8809d06d5ed6228bef54
SHA1 8fab242e91454e7e293c9a26e468cafadf0d7ce4
SHA256 a322178a86629cce8ecfe5c88518f874afa7903a30bc26edc6f1989d087ae726
SHA512 6b04702ccefdef6640cbaf8d187e5beafa01186943259e319eae4ac60e09511cb0e04d7f86d0ebade00773220e0ab8bdf9e60460f354d3fe670fbc1f592e92ab

C:\Users\Admin\AppData\Local\Temp\_MEI38962\api-ms-win-core-memory-l1-1-0.dll

MD5 f897d6715951a70e80daa9fa3dc9b913
SHA1 7eaa2b5adcbe016508cc63c25bf4b60a3a2f94d2
SHA256 bac0e15f62d2aad8af2d9564d15c987d707ee4c5021fdb308287e1a63a6116fc
SHA512 0ff9ce545f7cd44a01a30ea9fa0821c8e564d509da6085331c766d1ce6d7a4c22910968eb142a888e2314a218fb882841678de18cca46472ace0a09bce6f19fe

C:\Users\Admin\AppData\Local\Temp\_MEI38962\api-ms-win-core-localization-l1-2-0.dll

MD5 e142049a08327db53b0289cd25bbb70f
SHA1 3289a7c010a613b07b235d13ec96af31b683834a
SHA256 dd36f8e544be435ffd7c96ddb077dc76b4cebd6fbef14319f7d21f47fe794a87
SHA512 f6fd8865f9df1bd382b246041ad90a3e87e42a99b7dc8167d0d4513e7bec6901b80120ff98e1283ca754dcc726b4ddc000f41c428f4f45dfd4489e94075352cf

C:\Users\Admin\AppData\Local\Temp\_MEI38962\api-ms-win-core-libraryloader-l1-1-0.dll

MD5 0102c27a0a9973942ab7974258b127e5
SHA1 ab6279b7e802b3b229322f07442be5b59df944d1
SHA256 1eacc48d19f44e5dd54e4ea0a2f77a3130ecaacf22605595f3c6b6e398b9d2d8
SHA512 9ab4e772cd649296f12b37cc4ae165d7bd7f4830c934d9540cd76cc42480c2b484cdd35d39082f861b74441d137656d2d1b6f73b27ea09ed7c42c55f3122384c

C:\Users\Admin\AppData\Local\Temp\_MEI38962\api-ms-win-core-interlocked-l1-1-0.dll

MD5 4a6bb2456b03efd381762294048d4e1f
SHA1 7f7cd1541a89c937654dfd772314061c1d5c4b8a
SHA256 1e72f74bdc5edc4ef93bced9065fd1ce3d20d891a6933c068d8a8bb97f813870
SHA512 f9da432af0643fa80fc7688f35c35ab2c73e9687c6a5b69a3cbc655af499296a59e6107b0faa01c0f48a79a510032b95bc5acc31f28a32ba53c2a46385af6c2c

C:\Users\Admin\AppData\Local\Temp\_MEI38962\api-ms-win-core-heap-l1-1-0.dll

MD5 55c47ec3351addab989634c5a4142698
SHA1 1985aa2decdb3b0718b288a798e67abcff5fbfb0
SHA256 5e3a6502b929df2cbfd6c9e0bfc2016b082e72246dc033655957aeaf812f5119
SHA512 72d2be88661bad13e3e2828d9ae870d5fdc1679fe0079e206dc787fbf33396b58c19efa5e4b98146ecb5244d46c03dc60f51f01de2eada2bef4b8d9b151db21a

C:\Users\Admin\AppData\Local\Temp\_MEI38962\api-ms-win-core-handle-l1-1-0.dll

MD5 53ad62eadd80fb7be326b2ac21cd51c4
SHA1 520316ecaf0262df0d5970ed6160c1a58d34fdcc
SHA256 0d520c708ea21b4120660e3b2db833f473c193508649c57d759452f19d6e633a
SHA512 2a59e6677d0f48a8588999d0f8f3d28c811ee66a98f25d0da727959975b7f1b51e2e252133173c564cd71a18fb1507c18cb376034ada3a92eec95cbef2a6974d

C:\Users\Admin\AppData\Local\Temp\_MEI38962\api-ms-win-core-file-l2-1-0.dll

MD5 da0e628d704f10be357148f2131108b1
SHA1 a9a8c5e002a65d1b43fb990a86c59d290d480464
SHA256 5747de24ef2014b50f49d541621a328a02a4ef5f20eeb94423a3d7f7954e49f6
SHA512 30b2b3fd92b73dc387b6beff63c4d9e16123f9abbde0cc3f33b1b00c013885f980d12d793e32aaf7c430121df3d337dd09a9a8a5ea874696d3cf37ee51a50a81

C:\Users\Admin\AppData\Local\Temp\_MEI38962\api-ms-win-core-file-l1-2-0.dll

MD5 b5233e03bde877536db16308f3664cda
SHA1 15ff9d07de90f4a13943b36c30ce2cfaccc67451
SHA256 fb9b51ab73cb5fecc491a3a2624d54cc327370c6ac5efc9dfada2411acf766ed
SHA512 ad005e39dcd889e8a6c127038b7c25eb2e100c889b16a6b12063bf76087b3d245df2768d3f032963dcbb33d320be56ec3a2822a718d17b34503ee0ddccef7486

C:\Users\Admin\AppData\Local\Temp\_MEI38962\api-ms-win-core-file-l1-1-0.dll

MD5 770b1f0533e25a199144bd95e1e4a366
SHA1 2a7f04c61fd91b5dfb1b592e20186a4f1675fcb0
SHA256 22967506ae7e13fd6afc9cbe6aa7d14f497c37a40684fbfd7a5146b9f1569646
SHA512 c817dc7d51b0a3b05e9546793fd2b6eb8ad783dc933dd619024177bebe6aeb0c551ab0add7029fa0b0754aee139adfe1d04b5c0ace638c11da02de27bb225a94

C:\Users\Admin\AppData\Local\Temp\_MEI38962\api-ms-win-core-errorhandling-l1-1-0.dll

MD5 e02239f4c0948021443bab405791e401
SHA1 cd5300b8a2cc2aff15d5b45122b9567cb9c68bb5
SHA256 0857f0669237f4c8f85dca01acc7af0f654029832752c54d518cb741fd709878
SHA512 1f61c23fb4487a80921b5e25ddb942d83bf3a0f1e11df7dc849f2bc6e6dd72c8c7aa2808414821520d998b9123c040bedef392be39c5616a4bba8b8cfb9a7295

C:\Users\Admin\AppData\Local\Temp\_MEI38962\api-ms-win-core-debug-l1-1-0.dll

MD5 193ddd6964272a4522613a7dce90ff86
SHA1 7a15245c775793ba464cae4826424cdf69655c7f
SHA256 326e33a52024cf4f16d717c74875b45f9d72ce5036e563ddc71163d092819e55
SHA512 1e6366d2171d6a6c50647527105ebe6e6af8408f8c3542cc74e2984e847674289d3b7c6e541de51e989f09e3949e0f43a1c5cb239e308133294f597dae591df0

C:\Users\Admin\AppData\Local\Temp\_MEI38962\api-ms-win-core-datetime-l1-1-0.dll

MD5 c1a0ac40b2cd7ca942c3d658e2c74d3c
SHA1 9a7411922824464c33f6d76ae9613a1a3801ea1b
SHA256 88d783199b25d350968b6ccd0c8240991587b7ae810c744dfa2ec62d8e9cb072
SHA512 6ac0091c7e742145b159f8f3ff7da429a26fc2fa8049823469a1e8c27e962613f4112d5a3208f09db5c8cf25f4ef0105ce43b88e0a9796d5a663015df116035f

C:\Users\Admin\AppData\Local\Temp\_MEI38962\api-ms-win-core-console-l1-1-0.dll

MD5 a3236d23bce79fbc8984ff59f0bd350d
SHA1 376cf6356c8183de1b8dbc3611aa688d34552320
SHA256 0086c2409ca8fca1b7fe42972b60f937f846e60a938a5989129f68b8b41c77f2
SHA512 fdd4c5589d91abfd61c198fa6485f40db04a9eeef41af4930e92de55632b4e6cd2ad7e412beb6b5c5b751079a6cac529f246fdbca73051d7dcfe85165f897de7

C:\Users\Admin\AppData\Local\Temp\_MEI38962\api-ms-win-crt-process-l1-1-0.dll

MD5 c0f3aaed30b614b32a6002cd6e5cf088
SHA1 a61ba3605a61b7076978e91705d7f3d22f9aa2c8
SHA256 369422b6ba609abad09208c9618a57030a0b5e77d6e7b171b6f2cb6c32567103
SHA512 3e7495d74ed0d1b5e438ec60aceaf9c52043ee9e13d98202b5013d2cc9bdb506337ed895b523287c1791732cb89c46763e60434ce890e49b4a68b9f9ceb94db4

C:\Users\Admin\.spotdl\config.json

MD5 28c66aac7cd4dd5ed2a117e2027b91fd
SHA1 46d2d05d60234dbbe93a26a0a1d5abeda6720e81
SHA256 f394c65845442dbad228e79d1dde29813f058b06a55ca7566ce61211c4054fe3
SHA512 19160e8f0cc3c59bd06b0980c3e4db268c2c58fb39434f5693fcbc37d130313c9a09adffdc0221657c35f5f5a709dccc0b75ccc55e6e794063feac27eaab2d8e

C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad\settings.dat

MD5 8f2eb94e31cadfb6eb07e6bbe61ef7ae
SHA1 3f42b0d5a90408689e7f7941f8db72a67d5a2eab
SHA256 d222c8e3b19cda2657629a486faf32962e016fc66561ce0d17010afdb283c9de
SHA512 9f7f84149885b851e0bf7173c540e466a2b2eb9907d8b608f60360933328cc75d9d1b63640ea4ecc1e64ecc5dd7ee74d82903f96a8b4418ca56296641a8c0703

C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad\settings.dat

MD5 d56e8f308a28ac4183257a7950ab5c89
SHA1 044969c58cef041a073c2d132fa66ccc1ee553fe
SHA256 0bc24451c65457abc1e4e340be2f8faceae6b6ec7768a21d44bcd14636543bae
SHA512 fd5798559f4025ec3408f5550b8671d394b1ec83b85fdac8c005b0cc3e183272bdd07db15a156a572c9c5e5798badf235dc10aae62a052efa8dd9dfdbdca8189

C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Preferences

MD5 28a3cacd5d34b3c6a8b525409aa92a2e
SHA1 8a4a2cc0e3cd3ee94082a8bad36006775ff8311c
SHA256 f1e00c1163215723b081ea371751113ae4413a8c95389444052e7bf2210257ba
SHA512 6051359131b07b6dad25e6e90377ce3456b2e78a352dd239747c42b3fe9c247580b303eb195f1fcad4b789c66b4f8025ac771f377216e06fc830b3b50433b3b2

C:\Users\Admin\.spotdl\dist\index.html

MD5 78330d0bb29439a6c14a74c8f7780a30
SHA1 8f65d4aa93ef08fe5f4fc4589d332844c1b97c80
SHA256 87ddb87059d7649650dd390eef2d4cde508972ef632181dff868b86393cee2ee
SHA512 d4d689746855e777c5bf8a777c9aa36563d15f52165cb07b9faede731863ef508bdc743cc22fc8357664d9fa7a3531d0e746a4eb2fce1a37fb45543b0009e831

C:\Users\Admin\.spotdl\dist\assets\index-BDDgGyM9.css

MD5 79b6b1d673fee0c723c7b10e7315839a
SHA1 5b17a64674fb9b7fc2af65ca6cc581e9911e0743
SHA256 ebc092205ba6f574aa31dc59868e53b3430f612c6e47a642fbd6418811ae1fe4
SHA512 0175b674c3dccfbcf6eb5270436438f7bdf1d153323ed7d06c4c7010270c5325fafe4f3cf6e4ec3c2818e12dd23f32c2be4f45d3ffc11150223d43763d0bc5ac

C:\Users\Admin\.spotdl\dist\assets\index-CGxZV3ZT.js

MD5 408151a77922aceb7765116803e4bf4f
SHA1 c986c794dd30403581dd62c571e75bc6610ee3bd
SHA256 1cc7d6111cbcbaf9276bb339dea6d40a5248d31496524e7b5cd36e57ed012c83
SHA512 82f14109eecdd63df23379528b6ec9b6adb1305d0e552aa8a9f88bce4939f3d6609bc2f038a392aec2fa6e29bcda509afd0c0dfeb2063337316fa6853a8dc96c

C:\Users\Admin\.spotdl\dist\favicon.ico

MD5 e115ccf71887568d66709308d0d9afcf
SHA1 c660ba60395612692852bb49ef2c5558f6890abd
SHA256 f0b70b22aa2020bd6d07657e526c15e1850e4cc3a1f904e0e7f6e03d475be925
SHA512 7a994f023f4b30831f7cab25259eb9e409388cb6f6eb8adc9214ee7ba7c60e9c8f0f033619d71941c600b00a8310dac3719feabaf096ef19ae0e9596f850ff79

C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\data_reduction_proxy_leveldb\CURRENT

MD5 46295cac801e5d4857d09837238a6394
SHA1 44e0fa1b517dbf802b18faf0785eeea6ac51594b
SHA256 0f1bad70c7bd1e0a69562853ec529355462fcd0423263a3d39d6d0d70b780443
SHA512 8969402593f927350e2ceb4b5bc2a277f3754697c1961e3d6237da322257fbab42909e1a742e22223447f3a4805f8d8ef525432a7c3515a549e984d3eff72b23

C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\data_reduction_proxy_leveldb\CURRENT

MD5 206702161f94c5cd39fadd03f4014d98
SHA1 bd8bfc144fb5326d21bd1531523d9fb50e1b600a
SHA256 1005a525006f148c86efcbfb36c6eac091b311532448010f70f7de9a68007167
SHA512 0af09f26941b11991c750d1a2b525c39a8970900e98cba96fd1b55dbf93fee79e18b8aab258f48b4f7bda40d059629bc7770d84371235cdb1352a4f17f80e145

C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Local State

MD5 fd0e11cd27960aad84c0592c58527bed
SHA1 acc5b40fc8346ff70367655c6aabfe5e3f9fc7b5
SHA256 c6ff902073f3b10dc4eb258aadfa75ad5e3933477d5ac1e246f48f28f808716c
SHA512 18096bb28d1da04ac936da27ab2c49d009456abd8acc3bd67815b1bdf28e1e2da11f9ee0a4ccde65d03cddd8e323b1d2b8375d934fea3ae1316a929f091e5757

C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Preferences

MD5 c159c22d72cd1ad56e4679efa885ecc4
SHA1 147da99f7ff6257131d64585c7f2075dd0955ffb
SHA256 8848d679b32210774371a6f40625d177e7bf84380609f761a9e3a83ddcc33e02
SHA512 ae0e3f07d2f8c53f184a26bf61bb79af38df3355204cbbf0b532642ef93dcc392215cdfbaa259d3381fb6c78e5134461db350c25af3a07548f9734053c4fd3c5

C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index

MD5 ef2c4b3645eaa858508805af964d0984
SHA1 a4abab67d241c46f9e68745c2b5975457161d5d4
SHA256 7c856775b2166419d4bd63535056652587972065fc0f27cb44c1eea833a7f4f5
SHA512 5c6dc4e347a01d8b924f39f3effc014361b694e112a75bfd37260ab4edc9c42bda7191d354056dccb49bbcfcf065a8bd17e781510193ea65f829a5f16ed1d85a

C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Preferences

MD5 2522c6993106ce0f4002a09bf526526c
SHA1 2004429591e478461abafc66270d697b3a2f4beb
SHA256 5bb23143204e4c6bea0969b63456888ba9d7d839fccb5bd7609814076bfb3043
SHA512 e20be721b7abc859fd75d896bfa2fd07d6941cdb2f25acd6d8ed6812dfa9f4d5a32400589809dc8802157001fad0c37005cfc27c949ed29818fd28654e4e8e8d