Malware Analysis Report

2025-01-18 01:14

Sample ID 240613-g18dbsxbpa
Target a4297fddc0a434ba3ef0b2a6427de9e8_JaffaCakes118
SHA256 ae5459ba0c423ee7530dce03ac462fe5e9780a97a2b2062ad53a964450c2222e
Tags
score
1/10

Table of Contents

Analysis Overview

MITRE ATT&CK

Enterprise Matrix V15

Analysis: static1

Detonation Overview

Signatures

Analysis: behavioral1

Detonation Overview

Command Line

Signatures

Processes

Network

Files

Analysis: behavioral2

Detonation Overview

Command Line

Signatures

Processes

Network

Files

Analysis Overview

score
1/10

SHA256

ae5459ba0c423ee7530dce03ac462fe5e9780a97a2b2062ad53a964450c2222e

Threat Level: No (potentially) malicious behavior was detected

The file a4297fddc0a434ba3ef0b2a6427de9e8_JaffaCakes118 was found to be: No (potentially) malicious behavior was detected.

Malicious Activity Summary


Suspicious use of SendNotifyMessage

Modifies Internet Explorer settings

NTFS ADS

Suspicious use of FindShellTrayWindow

Suspicious use of WriteProcessMemory

Suspicious use of SetWindowsHookEx

Enumerates system info in registry

Suspicious behavior: EnumeratesProcesses

Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary

MITRE ATT&CK

Analysis: static1

Detonation Overview

Reported

2024-06-13 06:17

Signatures

N/A

Analysis: behavioral1

Detonation Overview

Submitted

2024-06-13 06:17

Reported

2024-06-13 06:19

Platform

win7-20240611-en

Max time kernel

118s

Max time network

145s

Command Line

"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\a4297fddc0a434ba3ef0b2a6427de9e8_JaffaCakes118.html

Signatures

Modifies Internet Explorer settings

adware spyware
Description Indicator Process Target
Set value (int) \REGISTRY\USER\S-1-5-21-39690363-730359138-1046745555-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" C:\Program Files\Internet Explorer\iexplore.exe N/A
Key created \REGISTRY\USER\S-1-5-21-39690363-730359138-1046745555-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain C:\Program Files\Internet Explorer\iexplore.exe N/A
Set value (int) \REGISTRY\USER\S-1-5-21-39690363-730359138-1046745555-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" C:\Program Files\Internet Explorer\iexplore.exe N/A
Set value (int) \REGISTRY\USER\S-1-5-21-39690363-730359138-1046745555-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "424421316" C:\Program Files\Internet Explorer\iexplore.exe N/A
Key created \REGISTRY\USER\S-1-5-21-39690363-730359138-1046745555-1000\Software\Microsoft\Internet Explorer\LowRegistry C:\Program Files\Internet Explorer\iexplore.exe N/A
Set value (int) \REGISTRY\USER\S-1-5-21-39690363-730359138-1046745555-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{9B48DE41-294C-11EF-AC4C-424EC277AA72} = "0" C:\Program Files\Internet Explorer\iexplore.exe N/A
Key created \REGISTRY\USER\S-1-5-21-39690363-730359138-1046745555-1000\Software\Microsoft\Internet Explorer\Main C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE N/A
Set value (int) \REGISTRY\USER\S-1-5-21-39690363-730359138-1046745555-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" C:\Program Files\Internet Explorer\iexplore.exe N/A
Key created \REGISTRY\USER\S-1-5-21-39690363-730359138-1046745555-1000\Software\Microsoft\Internet Explorer\DomainSuggestion C:\Program Files\Internet Explorer\iexplore.exe N/A
Key created \REGISTRY\USER\S-1-5-21-39690363-730359138-1046745555-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage C:\Program Files\Internet Explorer\iexplore.exe N/A
Key created \REGISTRY\USER\S-1-5-21-39690363-730359138-1046745555-1000\Software\Microsoft\Internet Explorer\PageSetup C:\Program Files\Internet Explorer\iexplore.exe N/A
Key created \REGISTRY\USER\S-1-5-21-39690363-730359138-1046745555-1000\Software\Microsoft\Internet Explorer\Toolbar C:\Program Files\Internet Explorer\iexplore.exe N/A
Key created \REGISTRY\USER\S-1-5-21-39690363-730359138-1046745555-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch C:\Program Files\Internet Explorer\iexplore.exe N/A
Key created \REGISTRY\USER\S-1-5-21-39690363-730359138-1046745555-1000\Software\Microsoft\Internet Explorer\Main C:\Program Files\Internet Explorer\iexplore.exe N/A
Key created \REGISTRY\USER\S-1-5-21-39690363-730359138-1046745555-1000\Software\Microsoft\Internet Explorer\IntelliForms C:\Program Files\Internet Explorer\iexplore.exe N/A
Key created \REGISTRY\USER\S-1-5-21-39690363-730359138-1046745555-1000\Software\Microsoft\Internet Explorer\InternetRegistry C:\Program Files\Internet Explorer\iexplore.exe N/A
Key created \REGISTRY\USER\S-1-5-21-39690363-730359138-1046745555-1000\Software\Microsoft\Internet Explorer\Zoom C:\Program Files\Internet Explorer\iexplore.exe N/A
Set value (str) \REGISTRY\USER\S-1-5-21-39690363-730359138-1046745555-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" C:\Program Files\Internet Explorer\iexplore.exe N/A
Key created \REGISTRY\USER\S-1-5-21-39690363-730359138-1046745555-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing C:\Program Files\Internet Explorer\iexplore.exe N/A
Set value (data) \REGISTRY\USER\S-1-5-21-39690363-730359138-1046745555-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 C:\Program Files\Internet Explorer\iexplore.exe N/A
Key created \REGISTRY\USER\S-1-5-21-39690363-730359138-1046745555-1000\Software\Microsoft\Internet Explorer\IETld\LowMic C:\Program Files\Internet Explorer\iexplore.exe N/A
Key created \REGISTRY\USER\S-1-5-21-39690363-730359138-1046745555-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser C:\Program Files\Internet Explorer\iexplore.exe N/A
Key created \REGISTRY\USER\S-1-5-21-39690363-730359138-1046745555-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery C:\Program Files\Internet Explorer\iexplore.exe N/A
Set value (int) \REGISTRY\USER\S-1-5-21-39690363-730359138-1046745555-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" C:\Program Files\Internet Explorer\iexplore.exe N/A
Set value (int) \REGISTRY\USER\S-1-5-21-39690363-730359138-1046745555-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" C:\Program Files\Internet Explorer\iexplore.exe N/A
Key created \REGISTRY\USER\S-1-5-21-39690363-730359138-1046745555-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic C:\Program Files\Internet Explorer\iexplore.exe N/A
Set value (data) \REGISTRY\USER\S-1-5-21-39690363-730359138-1046745555-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 C:\Program Files\Internet Explorer\iexplore.exe N/A
Key created \REGISTRY\USER\S-1-5-21-39690363-730359138-1046745555-1000\Software\Microsoft\Internet Explorer\SearchScopes C:\Program Files\Internet Explorer\iexplore.exe N/A
Key created \REGISTRY\USER\S-1-5-21-39690363-730359138-1046745555-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage C:\Program Files\Internet Explorer\iexplore.exe N/A
Set value (str) \REGISTRY\USER\S-1-5-21-39690363-730359138-1046745555-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" C:\Program Files\Internet Explorer\iexplore.exe N/A
Key created \REGISTRY\USER\S-1-5-21-39690363-730359138-1046745555-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive C:\Program Files\Internet Explorer\iexplore.exe N/A
Key created \REGISTRY\USER\S-1-5-21-39690363-730359138-1046745555-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE N/A
Set value (str) \REGISTRY\USER\S-1-5-21-39690363-730359138-1046745555-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE N/A
Set value (data) \REGISTRY\USER\S-1-5-21-39690363-730359138-1046745555-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb010000005ec80cf279b2564c91633e21940a8076000000000200000000001066000000010000200000002675fff10eddefd6c034463ae09fe4add45ee36ae673bdbb99c3ae4fd0f2d9b1000000000e800000000200002000000050e5abe189a53735fdbb02e75ee0ea09866d0bd37cd9e8b6876a96db10998e4620000000617ff8d69a4b58c28a8e9db5c16f764f5945a651374415b575acef913345181e40000000f5475a1bc539f9a927327379a389d5c8b9c4f52737505f149f754ef39f8cbabf9601ad2209e50da4a9d6938576c9ae636787be01e3517c96f90b53474e6bdfc6 C:\Program Files\Internet Explorer\iexplore.exe N/A
Set value (data) \REGISTRY\USER\S-1-5-21-39690363-730359138-1046745555-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = d02ff57659bdda01 C:\Program Files\Internet Explorer\iexplore.exe N/A
Key created \REGISTRY\USER\S-1-5-21-39690363-730359138-1046745555-1000\Software\Microsoft\Internet Explorer\GPU C:\Program Files\Internet Explorer\iexplore.exe N/A

NTFS ADS

Description Indicator Process Target
File opened for modification C:\Users\Admin\Desktop\http:\www.bing.com\search?q=music+listenlikeurblind&go=&qs=n&form=QBLH&pq=music+listenlikeurblind&sc=0-12&sp=-1&sk= C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE N/A

Suspicious use of FindShellTrayWindow

Description Indicator Process Target
N/A N/A C:\Program Files\Internet Explorer\iexplore.exe N/A

Processes

C:\Program Files\Internet Explorer\iexplore.exe

"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\a4297fddc0a434ba3ef0b2a6427de9e8_JaffaCakes118.html

C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE

"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2436 CREDAT:275457 /prefetch:2

Network

Country Destination Domain Proto
US 8.8.8.8:53 78.media.tumblr.com udp
US 8.8.8.8:53 scmplayer.net udp
US 8.8.8.8:53 ajax.googleapis.com udp
US 8.8.8.8:53 yourjavascript.com udp
US 8.8.8.8:53 static.tumblr.com udp
US 8.8.8.8:53 assets.tumblr.com udp
US 74.114.154.18:80 78.media.tumblr.com tcp
US 74.114.154.18:80 78.media.tumblr.com tcp
US 74.114.154.18:80 78.media.tumblr.com tcp
US 74.114.154.18:80 78.media.tumblr.com tcp
US 74.114.154.18:80 78.media.tumblr.com tcp
US 74.114.154.18:80 78.media.tumblr.com tcp
GB 142.250.187.202:80 fonts.googleapis.com tcp
GB 142.250.187.202:80 fonts.googleapis.com tcp
US 192.0.77.40:80 assets.tumblr.com tcp
US 192.0.77.40:80 assets.tumblr.com tcp
US 192.0.77.40:80 assets.tumblr.com tcp
GB 142.250.179.234:80 ajax.googleapis.com tcp
GB 142.250.179.234:80 ajax.googleapis.com tcp
US 192.0.77.40:80 assets.tumblr.com tcp
US 192.0.77.40:80 assets.tumblr.com tcp
US 192.0.77.40:80 assets.tumblr.com tcp
US 192.0.77.40:80 assets.tumblr.com tcp
US 104.21.234.157:80 scmplayer.net tcp
US 104.21.234.157:80 scmplayer.net tcp
US 13.248.169.48:80 yourjavascript.com tcp
US 13.248.169.48:80 yourjavascript.com tcp
US 192.0.77.40:443 assets.tumblr.com tcp
US 192.0.77.40:443 assets.tumblr.com tcp
US 192.0.77.40:443 assets.tumblr.com tcp
US 8.8.8.8:53 search.yahoo.com udp
IE 212.82.100.137:80 search.yahoo.com tcp
IE 212.82.100.137:80 search.yahoo.com tcp
NL 23.62.61.88:80 www.bing.com tcp
NL 23.62.61.88:80 www.bing.com tcp
US 8.8.8.8:53 64.media.tumblr.com udp
IE 212.82.100.137:443 search.yahoo.com tcp
US 192.0.77.3:443 64.media.tumblr.com tcp
US 192.0.77.3:443 64.media.tumblr.com tcp
US 192.0.77.3:443 64.media.tumblr.com tcp
US 192.0.77.3:443 64.media.tumblr.com tcp
US 192.0.77.3:443 64.media.tumblr.com tcp
US 192.0.77.3:443 64.media.tumblr.com tcp
US 8.8.8.8:53 r.bing.com udp
US 8.8.8.8:53 th.bing.com udp
US 8.8.8.8:53 r.bing.com udp
US 8.8.8.8:53 th.bing.com udp
NL 23.62.61.88:80 th.bing.com tcp
NL 23.62.61.88:80 th.bing.com tcp
US 8.8.8.8:53 r.bing.com udp
NL 23.62.61.88:80 th.bing.com tcp
NL 23.62.61.88:80 th.bing.com tcp
NL 23.62.61.162:443 r.bing.com tcp
NL 23.62.61.162:443 r.bing.com tcp
NL 23.62.61.162:443 r.bing.com tcp
NL 23.62.61.162:443 r.bing.com tcp
NL 23.62.61.162:443 r.bing.com tcp
NL 23.62.61.162:443 r.bing.com tcp
US 192.0.77.3:443 64.media.tumblr.com tcp
US 192.0.77.3:443 64.media.tumblr.com tcp
NL 23.62.61.162:443 r.bing.com tcp
US 192.0.77.3:443 64.media.tumblr.com tcp
IE 212.82.100.137:443 search.yahoo.com tcp
IE 212.82.100.137:443 search.yahoo.com tcp
US 192.0.77.40:443 assets.tumblr.com tcp
US 8.8.8.8:53 px.srvcs.tumblr.com udp
US 192.0.77.40:443 px.srvcs.tumblr.com tcp
US 192.0.77.40:443 px.srvcs.tumblr.com tcp
US 192.0.77.40:443 px.srvcs.tumblr.com tcp
US 8.8.8.8:53 pixel.wp.com udp
US 192.0.76.3:443 pixel.wp.com tcp
US 192.0.76.3:443 pixel.wp.com tcp
IE 212.82.100.137:80 search.yahoo.com tcp
US 8.8.8.8:53 www.tumblr.com udp
US 192.0.77.40:443 www.tumblr.com tcp
US 192.0.77.40:443 www.tumblr.com tcp
US 8.8.8.8:53 guce.yahoo.com udp
IE 34.251.70.36:443 guce.yahoo.com tcp
IE 34.251.70.36:443 guce.yahoo.com tcp
US 8.8.8.8:53 consent.yahoo.com udp
IE 34.251.70.36:443 consent.yahoo.com tcp
IE 34.251.70.36:443 consent.yahoo.com tcp
NL 23.62.61.162:443 r.bing.com tcp
NL 23.62.61.162:443 r.bing.com tcp
NL 23.62.61.162:443 r.bing.com tcp
NL 23.62.61.162:443 r.bing.com tcp
NL 23.62.61.162:443 r.bing.com tcp
NL 23.62.61.162:443 r.bing.com tcp
US 192.0.77.40:443 www.tumblr.com tcp
US 192.0.77.40:443 www.tumblr.com tcp
US 8.8.8.8:53 s.yimg.com udp
GB 87.248.114.11:443 s.yimg.com tcp
GB 87.248.114.11:443 s.yimg.com tcp
GB 87.248.114.11:443 s.yimg.com tcp
GB 87.248.114.11:443 s.yimg.com tcp
NL 23.62.61.162:443 r.bing.com tcp
NL 23.62.61.162:443 r.bing.com tcp
NL 23.62.61.162:443 r.bing.com tcp
NL 23.62.61.162:443 r.bing.com tcp
NL 23.62.61.162:443 r.bing.com tcp
NL 23.62.61.162:443 r.bing.com tcp
NL 23.62.61.162:443 r.bing.com tcp
NL 23.62.61.162:443 r.bing.com tcp
US 8.8.8.8:53 www.infinite-scroll.com udp
DE 3.70.101.28:80 www.infinite-scroll.com tcp
DE 3.70.101.28:80 www.infinite-scroll.com tcp
DE 3.70.101.28:443 www.infinite-scroll.com tcp
US 8.8.8.8:53 infinite-scroll.com udp
US 104.198.14.52:443 infinite-scroll.com tcp
US 104.198.14.52:443 infinite-scroll.com tcp
US 204.79.197.200:443 ieonline.microsoft.com tcp
US 204.79.197.200:443 ieonline.microsoft.com tcp
US 204.79.197.200:443 ieonline.microsoft.com tcp

Files

C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\R3JK00ZJ\tumblr_ogxovuhokk1shl98bo1_500[1].htm

MD5 3ea1c8d079b38532a6e01a96216ba5e2
SHA1 598d3ff91d3e252f1e13df8cf0348b270ff2da3f
SHA256 87a9323ac85ce28867d5d7ce590c8f29b8d1a999961fca71bb33adef48683691
SHA512 cb4f800a735d5ec435844ac114a81ee6c4a429138119b97f2266edb87cf729f1a64662190d04917ce955b0bd3681610d49be42cd6782989ecd4b0d87ddf8a03a

C:\Users\Admin\AppData\Local\Temp\Cab625C.tmp

MD5 49aebf8cbd62d92ac215b2923fb1b9f5
SHA1 1723be06719828dda65ad804298d0431f6aff976
SHA256 b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512 bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b

C:\Users\Admin\AppData\Local\Temp\Tar6262.tmp

MD5 4ea6026cf93ec6338144661bf1202cd1
SHA1 a1dec9044f750ad887935a01430bf49322fbdcb7
SHA256 8efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA512 6c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b

C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

MD5 ce75027701fa5f73785c0d8c674c09c5
SHA1 823d6ef2eb01923bca7e9ae436b2fd40f4529742
SHA256 67fd35fdd52a85cafa7ef54ff6bcb1f9d2307a42570ccb74d41b5c31c4d66013
SHA512 7af91fa02435f3bb42fcc890d64c57bdc6a80435cd8f1826414e9fb301c48e5fab197206081da601fc6072e167a642ab535d744466c475e5c53eff902031caf0

C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

MD5 745f8d7c3f713f69dbea8867d5f30c58
SHA1 987f63cc581569311d6356e5ae023f9694a7dd7f
SHA256 a8b1d8d1a1b8e7373f506b3abe689db1df4fb21045c59077a51f164cfac6afcb
SHA512 9d41e3fa59ff77ef3fa1f6e0d858df718e3e3062415773888d9b2ce6ed863f5f5abf58a362e9da12307d8cf69f87cdc134f61e7fc9bda7e1407d22e49c0f7eeb

C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

MD5 1353af966991324cc7ece928cb9344c1
SHA1 34a34f638366d3ec8f3209677aa453adda834aee
SHA256 3ee13a40ef5ee31cacf1d5333c114e75a65227707d9520c84c03295982a09386
SHA512 2667ebb32d964a9f8ffd8c7bdeb66cd52cd07a87881b853e29146356e2698805eed944c0040bb93c3e36538400a222099c7a100ea7a7507b1684129f4efbfb03

C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\6B2043001D270792DFFD725518EAFE2C

MD5 f55da450a5fb287e1e0f0dcc965756ca
SHA1 7e04de896a3e666d00e687d33ffad93be83d349e
SHA256 31ad6648f8104138c738f39ea4320133393e3a18cc02296ef97c2ac9ef6731d0
SHA512 19bd9a319dfdaad7c13a6b085e51c67c0f9cb1eb4babc4c2b5cdf921c13002ca324e62dfa05f344e340d0d100aa4d6fac0683552162ccc7c0321a8d146da0630

C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\6B2043001D270792DFFD725518EAFE2C

MD5 4631aff462fed35f533b809b18830d68
SHA1 d38f8d063eeba9c9c34cb8aee171449d950a72c1
SHA256 21248ee381383619c5f15d861783960f2d181602abc22116a33ac4e350eaafaa
SHA512 b0070384d5e24884de189733c364e704c39ae47c5569497be6c53e5c31621d87fabb79ff9b8f563c57460bf05379759939171c82773d56c720b20c41650c8f28

C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

MD5 07ffa401336ec7c20d3d4f6cc1348955
SHA1 5bfebdc309b34cafee06cbb700963211d17125d4
SHA256 2036bf0efd4d940f3121963c33ed3587b23bb23672c7c6ddbc1db5b370f45370
SHA512 37ee097a1e3c45691ed35e147a36723d1dc2c6bad9c38f980ebee0abdc9a76ae3a8ce88e04dc29ef06ce5a9854123a42538c8db67fff96f72156baa0d0784398

C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

MD5 feb756e0395deabb3eb0b06b0e6a1023
SHA1 e31589a35cfe1fcfc32247ad92fd7cc80f99d82f
SHA256 12ef6690b2392b09ed163e7252ce282b6e63e0f013613e6f9e6c4070e82154b9
SHA512 50d20d1666de9e45fcd6e7101919577bfc8f3984dd30a340a8609a25c79bce6b16e5d7bb0b61d99c51c23f4134633a7c4f910e254ac1be315a1eba8bd9dd6a15

C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\B2FAF7692FD9FFBD64EDE317E42334BA_89854CA6A0F0936A4D2ECA78845CEA25

MD5 2c7ecdbbb063ea5981f2aabe7fcf9ac2
SHA1 5c92e25fa96ac7eb2d432563ce62be6a11dbd232
SHA256 a6420b0e8db153c246988af7382bb94364fe491631d88ca68f800e83750489c4
SHA512 8d7258ae557ce5f5fb98fa4da2f55036df3ebe308392f656a1bc21cf09f0d335ada0b44503fb523b16e8067bc7803f7e20e5e05bdfcc9b4ef970e763975b8c93

C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\B2FAF7692FD9FFBD64EDE317E42334BA_89854CA6A0F0936A4D2ECA78845CEA25

MD5 5cfed714b4419dce568aa8d13f805197
SHA1 2a8040e242e3a3d1d9eeabd86e9bcb438b0ff03a
SHA256 ad675c2b0e3bf28d2c83bca396fb3587962fdc7fb7715edecc9d13dc92c91df6
SHA512 7101ab40fc72368d4bef4d2403eee713245407f68e09c7e01e0b5c19176c4238a3cfe7563163167ac38ef8f42353eb574d759bc5db365b88bd99da352a460f46

C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

MD5 195527c8c89e08d4f7b2e455539a5233
SHA1 e769f99ed0b0a1adc97432a4ff5304ea030b914d
SHA256 2213828412a6a9a0856d8f50453c9d66f3d8db75bcc0cdb5e08b8fb132a99f6b
SHA512 67330874fdea5db2ff5e0b3541c2c526e357cba2d2727a6e66f2351c2afd9b417c2fe26022b538daa1f9d700cef5d9652e434114f842ac87522d04301b66fe9e

C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

MD5 ab5277483773de4a3d79305345564055
SHA1 e6e3a5117f106da1f83c34dd8af1dd0b70630ed3
SHA256 93d1833e080e2dc48009e17aaa49db2b67ba3651be5ab878055e33daef1b988f
SHA512 a58367eafba6ad84c4c482f152c0712d6bc80991ffba7540f3d7b07536e02d21e662804cb3e3f0efd06316818526b73f50f8b88f77ac454d5bcdde8a5463f446

C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

MD5 029e4c1e3358d39d17b8a4a6c357d7c0
SHA1 8cce15fa96f83f129aae31059da4f9b046ed3ecc
SHA256 631db8c71761f61f3e832d25a5c9da7dcf7242d47d0e881711d88a632fc072f5
SHA512 f6cec0dbf4ea775de913af769b01bb067dfad4d0081a52cea140bfe7a02b3ea34ff6cc63e3404fa0eeb88575c8891135c60b02577d889652ab5fbbbd14e8816d

C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\D0E1C4B6144E7ECAB3F020E4A19EFC29_B5F77004C894173A10E3A199871D2D90

MD5 d84fbe547b34c01a66f39b5c75598502
SHA1 59f37660d28208abbf77384cf8429af90eba78bf
SHA256 5fdb32d2f9d71424c409676024857a8e83b73b78aa1855c13e315bb781932038
SHA512 6bb815f5172330193af472b208aa77ccfdef39d58b38139d1bc87aa45eedf5b148544a54d36af3d8b7e6a98647c7ed9ab77bd78ed4e0990261e1544e3fc518cf

C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\D0E1C4B6144E7ECAB3F020E4A19EFC29_B5F77004C894173A10E3A199871D2D90

MD5 5fbbd11da1447361d95430e07018c9c3
SHA1 23934454aa9c6076fe25696a8223c63ff258f496
SHA256 9018fa7df4d8c5ac5f77c69f1a33e696bbc91e2d44a64d3b81274c510242b2ff
SHA512 c3d1b0ed8493b07dbb496c8369c34011c9cd46c8020f9a693aa807baa5e375a09c0d633f14f05212d2e6ac7c4802e69bc13c186eb95086e0220a26a5523f4b7f

C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\D0E1C4B6144E7ECAB3F020E4A19EFC29_B5F77004C894173A10E3A199871D2D90

MD5 fa5c5b110c87954dfc311f94c948ff1c
SHA1 36c45631f336e898bb329e743f86f52d0efa5f1e
SHA256 7760232fce82fa7bf595f0aba3362a6e4a8223d11204f9bef47dfb33ada75707
SHA512 f786f522e4edb5f92c8373073ad0aca347576197fc5c985d841a5103419711ee4b950738d0b3737ad7159e79a02b3675e96dd8786bfb470ce209fa89f46e5e85

C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\D0E1C4B6144E7ECAB3F020E4A19EFC29_B5F77004C894173A10E3A199871D2D90

MD5 4f4dfda941fe6ac6bbecbe613a415ebc
SHA1 a6d35eb6cf23198fa2bf0aba06a3368439589d27
SHA256 36682376b4279ccd2ace197da602d7f7b3aac1c95d7ce7dc6752259e33c31c1b
SHA512 5395e7d2e9988a9c22289333c5c3aa22aaeb1c07ed7dcbe4ee6db42e57590c9bdb209198d6a1e5c3e78f7e84a96e2725762a01483589d7dfff870974d6d96dee

C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\R3JK00ZJ\like[1].htm

MD5 e89f75f918dbdcee28604d4e09dd71d7
SHA1 f9d9055e9878723a12063b47d4a1a5f58c3eb1e9
SHA256 6dc9c7fc93bb488bb0520a6c780a8d3c0fb5486a4711aca49b4c53fac7393023
SHA512 8df0ab2e3679b64a6174deff4259ae5680f88e3ae307e0ea2dfff88ec4ba14f3477c9fe3a5aa5da3a8e857601170a5108ed75f6d6975958ac7a314e4a336aed0

C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

MD5 586d1402b32538a783eea219b4250dcf
SHA1 d20c8607035475983020a353a90367d604b23e44
SHA256 880c55ad09d3cee2d07f1dc2d29ca11ba97b808e32869bf95387090d1ff5ccc9
SHA512 f2e3864df425b04a12b0ce98d006d1a58af9ca0407a2dc2c9fcf0b4451c2f137240e03eaf39942d8bf82a6f12e3bb1873d03b86fa967747274002676393c709e

C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\A8DU897P\reblogme[1].htm

MD5 4f8e702cc244ec5d4de32740c0ecbd97
SHA1 3adb1f02d5b6054de0046e367c1d687b6cdf7aff
SHA256 9e17cb15dd75bbbd5dbb984eda674863c3b10ab72613cf8a39a00c3e11a8492a
SHA512 21047fea5269fee75a2a187aa09316519e35068cb2f2f76cfaf371e5224445e9d5c98497bd76fb9608d2b73e9dac1a3f5bfadfdc4623c479d53ecf93d81d3c9f

C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\A8DU897P\pre_tumblelog[1].js

MD5 b0a3d2a46c625c3c2ccc205c31034374
SHA1 82ee853f8a103d51659e51ebe3f363cc3eeed52a
SHA256 cb9f274aca2fcd18d0ab90868d9e1ff24ea00201b7d2695ce454fc53526cae31
SHA512 d5dc12af01925c4d63fe8e8534dfc87860e05215b0ad5ab7c9cfbb35bc45a531237215e5f86477bc042c2fb77b9dc976f7bd1b76e1dab44de1b21471da8e2723

C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\A8DU897P\stylesheet[1].css

MD5 9376412030d3bc47ba23362a51fb6c6f
SHA1 27e97ef594e956690616e4226ea33ba3e21673d1
SHA256 08478d68dd978bfaada39a6dbd5b90052ff9333ceb6521b195899f9c63ec557e
SHA512 628bd8a5ed3c2c77a1780194d3fa22c2b616cd1f899abd07195e0b5d64c11c5ae6a3d26f5c4ace9495c225c2a4cc911c12553425442568e055fe34f78f3a3ab0

C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\A8DU897P\tumblelog_post_message_queue[1].js

MD5 1b64d243e371c4c9c87df20bddafa684
SHA1 5e9aebd86dc207fe8e017fc8d82c86efcf2e6737
SHA256 ec4317b3c60e5c3f35d9a3662c416d84b0a62b6e11bee8aa70b49eb81937199b
SHA512 37cc27b0f7211e4a13a42d25a118d885559318080638da9649a97c2d96b8c97b8d78e71990389d2ad15dbbd2af145320ef100b996b75f49764d9d5d1f20edf24

C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\A8DU897P\css[2].css

MD5 830d681e200ebd8f1bbf06de69b027f9
SHA1 e00f105e3e87285c3f2d0939ec904cf1d7923e0d
SHA256 39a79dff25b00b68f0c28052a4bac75196ff9f2ee751361e7b81bcfb466a13d8
SHA512 48fdd629b6b33ce0a2363eb218b24bf7dbf39015b4b4facb7c1dd73568d9ebde5be58f681e5e9a32570e13ef8712eb96cfe31ecea9b352e041b5d83c936a29f5

C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\A8DU897P\css[1].css

MD5 69a5d5025d27a618ec9ecd248a94e7e2
SHA1 8b38fd7e9aa20388f2697defc88dae5b655d4862
SHA256 e5f6c03506abc63a9381803aa63a41957dd415cfd5c7ea795abd3d3153435be1
SHA512 f00e0965eeb6d7a143d98ca18c87d23c21e465f2b4f00ef22c4e8b6f92ae95fc982dadc2552088a48f7f93d661ea7c85c6d1d1f9e939f176715bc44dcf180e7c

C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\HWTP8BNA\quicksandfonts[1].css

MD5 06ed519146f8ede444818f391805c757
SHA1 f4e657c78971b4957f933aa7d50841d6e0c4478d
SHA256 2126a1d1f0da7e34d7b21679909a2831a41a4cdd25cde94a745f340ff55fb0ed
SHA512 611c6021f7b98a39f02f930a36154bb91d57ec0538fac2625d43f631cad7d0144b93f5e0a80af2e6919579aba3250d4cafd86a64b8d22bd86e95027a87fa0898

C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

MD5 9ae8eb5637c45155c0c26d4fbe9c3e87
SHA1 c1ad78bc84b500027b34b20be2a4fa0fa95657da
SHA256 f3734c5b2405a9638f21c2e6a369e65d132d55dd8285f1ca0af7a371154c3176
SHA512 9dcb28808da5a342486512828ec2eef94b685fbcddc2684953c307a902c755b66aef1e75810b209b9f8975b98f21d0e076677b609990bcbbf51f0f5a71d157e2

C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\Z5LT06Y3\dnserrordiagoff[1]

MD5 47f581b112d58eda23ea8b2e08cf0ff0
SHA1 6ec1df5eaec1439573aef0fb96dabfc953305e5b
SHA256 b1c947d00db5fce43314c56c663dbeae0ffa13407c9c16225c17ccefc3afa928
SHA512 187383eef3d646091e9f68eff680a11c7947b3d9b54a78cc6de4a04629d7037e9c97673ac054a6f1cf591235c110ca181a6b69ecba0e5032168f56f4486fff92

C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\A8DU897P\jquery.min[1].js

MD5 73a9c334c5ca71d70d092b42064f6476
SHA1 b75990598ee8d3895448ed9d08726af63109f842
SHA256 517364f2d45162fb5037437b5b6cb953d00d9b2b3b79ba87d9fe57ea6ee6070c
SHA512 b5c7b19a6d0f05cfa33a7f54c1b8075698d922578429789fd4c0a4ce035f563857283c7062e9ab08ec61679b486971f3d83a44135e217e3167e49fada5a1520a

C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\Z5LT06Y3\errorPageStrings[2]

MD5 e3e4a98353f119b80b323302f26b78fa
SHA1 20ee35a370cdd3a8a7d04b506410300fd0a6a864
SHA256 9466d620dc57835a2475f8f71e304f54aee7160e134ba160baae0f19e5e71e66
SHA512 d8e4d73c76804a5abebd5dbc3a86dcdb6e73107b873175a8de67332c113fb7c4899890bf7972e467866fa4cd100a7e2a10a770e5a9c41cbf23b54351b771dcee

C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

MD5 93d0a8166d676fa1d147e43ed729506a
SHA1 b25f11fc7ed7c50edd26ef355b777b725c660ee9
SHA256 f150617b3556302f62992f783ec17a269a6e1b5167a9f3b9f9337ca78598dff6
SHA512 f473562a9a99d2c30312de9b0dc1c98ed65f22779eeaa6c263f258c4a9d5bf3f367dadd06cc5478042b94b59d39a1b14eaeb15bc886b91d9aadd64bd64e2a133

C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

MD5 9b2b64d3e177761a7004209d459396fc
SHA1 fc519ad725407d3b29cda2ce72a841596c113435
SHA256 4ac4acf9d309c084cd4183be7ea8c1f0887c616fc2ba1a7acc2faf1a4edf0632
SHA512 d3a62b5872535c010c83c884611f5bc1d5b62a9022500a12a9173c5aec4c1cecb98b77fe9040bf0e0d7c2ec88f85dd82ce00c15aede82d11a66eff1395db892f

C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

MD5 e58bd37336dc290f02be9b8e8a26e2e5
SHA1 27c3b76030279c09fb15e8ad784e85cf07044807
SHA256 a90541bd7b8b1fee04de483ee9d3d32f15afb8e25971ccc39908b57c984a19b6
SHA512 21cd01510e4c5980ad23b94751201febc5a08e0b08624475e80ec66ffa70a45e20bbe2bbd1c8d5fe1e3f7ab15079513b0c4ddb89ba61243af7e2a968385c92c5

C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\Z5LT06Y3\httpErrorPagesScripts[1]

MD5 3f57b781cb3ef114dd0b665151571b7b
SHA1 ce6a63f996df3a1cccb81720e21204b825e0238c
SHA256 46e019fa34465f4ed096a9665d1827b54553931ad82e98be01edb1ddbc94d3ad
SHA512 8cbf4ef582332ae7ea605f910ad6f8a4bc28513482409fa84f08943a72cac2cf0fa32b6af4c20c697e1fac2c5ba16b5a64a23af0c11eefbf69625b8f9f90c8fa

C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\HWTP8BNA\jquerymsnryv2[1].js

MD5 d6eee320333279e776c445f490f0a866
SHA1 348277a1a3127f1d19444c875b5aac1530e29e5f
SHA256 8dfb70b34ea9ca68db2a5c89957e6ba8c23a07ea838d8349dcd7f602a8099132
SHA512 6bfcb06248a301a4f903b1ff2dcf68fcb375235adce67b9771d6bf28526e03e9466e35635fb154073cc17dcb3b99588fedede1547f28b3bcd0fcd5137fa45cde

C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\A8DU897P\index.build[1].js

MD5 f30443a1d46205f0c921d5d721281248
SHA1 ed7a6a78ed6c3aa429d13e4ca20180e6a1fa3fae
SHA256 ca8e7c3f0fb407bec7c09d700a4d50b9bad86a5a72dffa309cdded33911360ed
SHA512 7d6c27c5824ecade71ab87467157f4f042489fbd0394f7ecb9e298a6c03989988bcff0249092575d26b52ffe3339b55ba1c86caa9a33b4cb820d11140576ff00

C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

MD5 7dd00e60da3881816687bcc86ee70a7d
SHA1 2123d32d3b5cd064b849b1024d5bb062f3b4e365
SHA256 7313dc57f83b9190427f522b03140305bd5ab28cd2b52d6eab3926ac098e0f8c
SHA512 f09e3e6bd48212bed590e82f9009b21aa805b3d3f6456fb84c2cd16b2326b3c1944fa526c7d27e0b03ec71886c7107657b127b824d45d7219c2d3f3d8826141f

C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

MD5 a491bad756f822cef204ce772778847e
SHA1 5a650374f69c39d33eade15f136a3c97fa066967
SHA256 ef6d8913b8834cc2b69ea670897812dc4a4f4e5be11a55ed3d9aeae0f33f4112
SHA512 1a9ee6abc714ee03341380523a7e2ca19fd83a1549ceb458b1ff63946e2c36179587f540b357395878ee9a7b92c7b2cdfdd3acf03d9c50121ddf007754576882

C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\Z5LT06Y3\script[1].js

MD5 c2b4d5ae510c3b1690f5282632ef706d
SHA1 c32eb6f6f65dabb2fcaf1e8fafee68412395e2b9
SHA256 2d2d41d73b49bb943083674f6370e9c334fda32d2fcc25be7b345f44d15dd1fd
SHA512 8595139f9306a764632add00ff566713d59b3160e56438f79c0496ccf88733d99ce4dd468c9e2d5156b82de76912393b187c792ed2fd8b7e2e8932b454cc3692

C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

MD5 5b208ac553d521f8d49c7f88871c277a
SHA1 07714b51d59fdfebdab4ebc33a51a1cd6edc9dd5
SHA256 444dc33d6d0c719a0e5ae63f571f95fb6e163b40dcc38be87688fba37cee548a
SHA512 bcf7bfed395e4e79bdf4a19d31d9d4937c88ee66a9864c8cc0c91204cedba13c378af6cee9f6d108ba0f039b9c331fa7d88fb267a14a95bedfc6adea52987a79

C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

MD5 7896c9442df0c957d33e7bf19bc162a2
SHA1 13aac20642a5f5ebc2243b767a52c40c928d6afc
SHA256 c92261ca9791e0f83561d8a3af334901336036ab41b55ddea6e107142679cdd7
SHA512 f91f022b0293792fa02a7dd967cc38c1d5ebf2a38374421d871b4fb4a6b6750c3e08a71f470c5311d9de6cbc8d81a71501d8427fe17ab10b1df276a574dc0e6b

C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

MD5 191874554c4cf174b4cba9551fa4802f
SHA1 d6709135ae08e89596a56ca2dff5929c40377e51
SHA256 ddaa099a10f2a058f143168aa505970b9386d27e39e3418467bed144f512fa8b
SHA512 afd3a26fc285454db1c14c644530118d57ec9f4ceb3079d54080fde37372cc502f805290d2fefd8b5f1c5cee1a0dada4ce9a5dd20ce31b4857babf2fa9c26b9e

C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

MD5 38a92b57c0f120d28565338ee2352836
SHA1 bb6bee72b79e38ad6b8ce312a47137e52e167503
SHA256 9ebbf3005f761501506f397b3e21c9d926328f8bbd03da28eefb541570e1129d
SHA512 c0704db2a83bca2a77316a04e902d3dec4474d15da852888ed8f6187eafa577d32bc6445494606d1af6a5f10e1e7413cc2800f1af6313ce785a29e94d9c3f8b8

C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\HWTP8BNA\i-Xc7c0EwpSZA9iYbYz0HhXWW9U.gz[1].css

MD5 2eee47c5622d26407e89911cd891dd7e
SHA1 4c3fec3d5045555f3a16f87737361b9b0f4c838e
SHA256 6a62a1362ac786ce40a234316088c308226d5dbbb62849a8da10f273a3d6839b
SHA512 58c91c64ba88f6833bd7dd37862d15a06f9b462d2009aa9122e29ccc39c885d1c399f1d71f2ba031eb2e98ad90539aa7a72c36c77bdfd050deeb7ccf7a0cd9b7

C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

MD5 7f503048c48ea5dc9de64998b43ff850
SHA1 a30a6bbb616b592aaf6b4408f89457ec7c0e7336
SHA256 a68d8b22dc689f17b68911f880f9905838d7956e996b9ac4caec304af7625818
SHA512 dc8ff8b83c1165139289e2d3710f5717a0e15296128b8f61fd2ea67d38828fd75c72c9020ffbc0e32f1881c9f5911c239cdf445e2a7d70d91ad9f7952cc981ba

C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

MD5 5b76876072959850d0f2dbf7251e34d5
SHA1 b0e5184e4bfc5b2922d9d22257650a07bc6f29df
SHA256 b78e4992af97b93d9a5f2a9468ef0228c9689d823b4c64506d5dea83950738ca
SHA512 1d20fc5bdbc734e5da2235bf49cac5078e81cce94ab5eb36b551787d3833ad468a85d84cae07228213b9b1dc87084fccb0d0d2b43c59b69356a4cbdf93ee7126

C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

MD5 882a56385a3821f37a36066124b27a5d
SHA1 d15b24cbd0a4046cc97fc4d07c6a87e600ea45b0
SHA256 7a0c74b96568b0a383af27fd15debfb6e31ac93232fc1d9922046939e48b5bd7
SHA512 7653553fe315d1c9c308d83275a70795ec79a0ff5f83550f78d16fac28c7cf2674a320e36ac615a76501b8eef3c10e98614c01aa537dbd279a7edfbab71e428a

C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

MD5 72d43a1ccb9f1985cde8d7384b895045
SHA1 efd8f4c7b9d0afd26bf140b6a0a7655ba41a2edc
SHA256 f4b7f8513eb9544e710fc731dc97f3bff2ad7eb160e04b11082d875c8e3eb14c
SHA512 886ace89ae128f995c66c44a9caaab3bb4733fe86ea8aaa628e9f4e2ec5a05480f85c9ddcfbf821f7f995cfde04f5b590dbe23449f324a2edaa412fa557d82f7

C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

MD5 7d02762171b2a2b6cd3862ff00e67e9c
SHA1 de36b825aa6a8dd66f729e07573563c2ed1646dd
SHA256 c7bb71a6ef1a2a93762b7d2c8fa7eac2bf01915006d83606b20e90a252ca2a2a
SHA512 b5ea7af17fc8be5adcf9842eb60efa4556fe54dba8ab1203ef3fdf47c28f807cccb5ab18a398e3cc4ba79e9ea16059ab986688cb67a76b5e517ce0ee25866e73

C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

MD5 ca0730a8f348f8d61398d048c5fbeabb
SHA1 2091b35b3a63c6beb867b5a1608aad1cfb5a1e7f
SHA256 3bd8ea791aad9717e4292ac2f2fb9712f226cfb2c7c6aae9f4545303cb5bda34
SHA512 c8c2efdcbae8fdea02e92680c3bae61de50bd1f252b35ba173c4d9dfc5629b2764c99ef740c3fee94eebc8d552d61a773c76cc3962ffeeb2e2d6454a8b198774

C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

MD5 887569895e889a9ce6958e3e07415cee
SHA1 094f3cb2416d383d8ae0577162d61a973b8eac94
SHA256 1dde659518145f9f787787d3a3ab4fc9050db55823f76b6a1d40081ae521c317
SHA512 d1dc1a10e6998603772f0134e617c99d4fcff695ec783ca58eaa5a67f66a76cadfdfbc43853828dee697b741859f0ef6724a30dd8b568419d4e8be025543b883

C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

MD5 4488be803485a1b7767696dee12bbdd7
SHA1 06c8454bcc5ce251d407994511cd64054857890e
SHA256 f6cc4518d39990b0bf2e52d83d5fd50b8b6190af69e4252b2c79eff52db8eaec
SHA512 54c5fcce70f7be1928b64f8e4269befe315c712961d193a9ba3b36d28969b3539c065cdd6f8b6b6b08d1afc3d5f8413f7afa43ee30698dcfd09b51b8ee756069

C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

MD5 7a740235eb6a561dbb768bc338736169
SHA1 586f198fe4b19a6f903c23841c863c3175f58479
SHA256 5386695e0e4781fe65f2b8a66c56ba0974ef3dbcfccef620198fa951e26e520b
SHA512 0811c69693e3fb4641107ceb7b8b1ae9bf25ec6ad22e5d8f60ec633fe91e11b78ad033ef3c874c6239928003473baec69db3cc874a7fe8c613cfeeec3d6cac72

C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

MD5 68bb2069934ce3b5359015471d8665f4
SHA1 b441c9391f72de51f9f723428d8b3bdf5edcd320
SHA256 436a699e844bd6affc97b5f494b5197f097ddd4139caebc2f6f09707965c63be
SHA512 c1a3aba37c2ed4e1ee8b9c195425c76753be7b228e432919b15df5ca44b9e6d0ad28153d71c50bbacd66397937f3dc161d0aa2308dfed908cdf5cbe335fe6b96

C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

MD5 eac640f2f8a98d26280dddbffb716f88
SHA1 2b4374fa2fdd9b4a36516cd6f29bed450a69f088
SHA256 bce73160108aeeda3d825022ae4731ce4e1174b88c8c00a1cff25df44d817b38
SHA512 4c666680956a19e896406ccbaa9362f357ad7273832c5faa06a9b91dc9fd37aac93396c5459387280533da12011298ad8bcaa421bbc7ea019fdcc962f5611858

C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

MD5 e657b81df52306a61dc04a3992f59d66
SHA1 83023ac71c2a693511dbd0aa25922b953bf54e26
SHA256 f76209c2eb2ef01a681fd296d40fc345e4a45568ff1b6c19e4945bbad11d84f6
SHA512 fba2079b6d851d2d985191c1ed7f6da26ae4c60cbf94d5e3b46ec0c14b043ef1e7fa5265b3fc4746667646c06bcc278c369bd663b9cb8f790530897cd13d825e

C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

MD5 9ea624bd86c7ea9d17b306fe45c78d2c
SHA1 43b5223ad155dfd8c878bb337ef17ff17a651fea
SHA256 1bf91e8f6a424d33660e171a74947f40524053671611d829d987d2979f801b81
SHA512 93b6f0321b4cbe48afc1bb08dd05cde6c746f2b12e85a94879d373746ee11ac58e3fc0eec19031a21df819cd31c39a4d339f6d6d0b933e2b6381e289e4beb99f

C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

MD5 3be38ce20d1c37fc517a5960518a4ab2
SHA1 81e31eec12217bbcee975f6c8904fb0e0a06490b
SHA256 5b2233a75e4fccc66ccfd6813f20f30f2b4de71c501539415b84af361d388b0e
SHA512 dafcbae5ff49ea04370104cd680c0ace4650a46b46073d22b123ac400f0905be97c0554d070f5942e26577a01a8127c37b7672c9ef287ce8dc4936fbc9542d93

C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

MD5 27921eaf92bca2a8f473aeaf9d88a228
SHA1 00e1a92b52f60c9d4dc023541fc4467052fa402b
SHA256 4f31532daaa1d0ebe5b0c1ae391241b98dc3394f2177c60b7b907543c7d0d435
SHA512 1add09e7b9daa3ab95992df7053bb78705b613b6c6a1a323e4c0caced634c01d42b134222743f560c15ad8ef4985868a266e7cb3745ea912e6ba6901b6c989dc

C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

MD5 7549a5a62eb3919646010b4c6920114f
SHA1 26bcd8856be79b8e29ba4b4f746c30e7de9714c4
SHA256 98d37d08e5ab008870c867b527ae3c09ec3a0c807f8de77d6121214d6d89354a
SHA512 3d2bfad4a3db3ea63cf19ef554f63110a66fe6a574c44c3d694e9ae3dbd61c8a31aea3646627baae6cf204070f76ce3ba7a08189cbb9f69f4c5f1f2df03de9e6

C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

MD5 328bc908bc8fc238fa2bfec89834182f
SHA1 1de95c7c6a0bf67101cda1c667ce4f573e26e98d
SHA256 09aa8dbfc65b3c32e196e79a13da071a90a5fa815dab31aa3cfece63ab7d8efd
SHA512 45f214f7e8faef42f533a60e88296b0dda0006cee3a5ea9b3c83f49b5f83a6da1adfacef4ad0e5e5fdfe97ad489e34d00fba61140d475f6ec2555139566ee3d5

C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

MD5 77aa39ed56205dc6406925e1c636cdb6
SHA1 f554c41636c7ab4a0995fd6e4b491f686236b415
SHA256 66be3aa4ad209ebc09dd50a30bd3b07a93c728a92d6b12f5319d427a50139109
SHA512 6edc3fac4790d2ac8d648ed3529ca9d0b2f5cb7d283635ab6a88b2fda8ca54335e7aa0027c96a1fae1b54270390c3899aa272074eb0254951d230026169e6c61

C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

MD5 3c20218349c3fac3654d70252bd60ba6
SHA1 092bedd8f2b6d3558fd6a58fde1f25b4fd49014b
SHA256 fca19a6445dfd2d36ef7f2c33d562196aa8d462b9d0ab91d5f78a9f032d8f7fb
SHA512 eae8d3685c7f074c79a9aad00d3a31cdeb16357c7d5a00c88da7d5f6960fd4c2947114e2f9b7b19c05662a4f885756a7992f83b3a0ef212cc740168a1d7f97bb

C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

MD5 e6d957c21c48d00223d60add32af722d
SHA1 b4bd035b48a88d5c4cb1464e310cb0eab6bda57f
SHA256 291e06fcb1af6f3d94eba1ba234c0e83c115e80c7611757ae0326c0faf6bc562
SHA512 6b96909ddde519d5e7b21aa31b3d92d5da66a1ad59e8600564f568ee5eac13ad1abbfd7f6dad189aa55ed92d1defb324110add86ad54f41c50a58cb9127f9de8

C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

MD5 30872f6625d0e776e3126ba3e093c70b
SHA1 6104a98e3696844e8804b5266403aa9fc1019d48
SHA256 11dd5e0dd546356849cb1777b35e9dccd4e58cada8f9b4f03cdf919264b29a48
SHA512 414661fbc758dd5f02aa728609df5d662d6358281853846bca10fcf7772cec95d974433433db2e37266c8e6fde8eb0bf86f5d9f37df3b1ad48a27a0096e4b359

C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\HWTP8BNA\3Vt5BmFmmdwpJ0H6U1G61ELNk-E.gz[1].css

MD5 20ddcb32221014088551c51d8e17894a
SHA1 a76227d0b08c1fcf061d9f3f05abae72b770e3cc
SHA256 8ebae08e690eb1c2cf6c5c7e8afc4a04e309cdbfa31d3e00100d87cfd13f04e6
SHA512 d3d1c9321fea8656bd4fea3e13aa31b8409638c9009751428271c81ca3dfa556db73923d1591674bc0ae68d531ed0753a154412f913d2103193ebc3d3778cc7f

C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\HWTP8BNA\lPBSlJDULkb1JZxIh7LFN51SMmI.gz[1].css

MD5 28a8f64e4905b546edd6dbeea93e00bc
SHA1 910214235e1f01f5688146404f7407e6a7da5272
SHA256 bbc6825dee137e4cfb54e382883bf3658c652abe76e866740cb25bee18deb24a
SHA512 7b1de8c6ca437c9648350b296eb66a51ff837157097d78b2e85ee89df99bddf88cfe33b5d59518951f10ac6f1cc0ef63f106cbe73b8f6919cceef80bf8666dbe

C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\Z5LT06Y3\FsIibVnr9IPUPM3VCnjDG3l_SMY.gz[1].css

MD5 9e10170528207b2a5373fa7374d3a0cd
SHA1 12babd7b2c6722aa9f0a4c363d845ea2fa8f9f8c
SHA256 2871332bb75fdc0fac6c84ea255d955757bb403a3643819e335f1aff13807794
SHA512 a501667c38d4be3cb4712f02c80e8eb4688b024664374bd070d68fda34708749fb3b7d4f5acc5b28c8c75c80dab07bd17994082ff848c83152ff075b79e23f19

C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\HWTP8BNA\ROmQIST_t1-DCT3R8Y8ukUXYzZs.gz[1].css

MD5 f654ec802f348da03d6819277ba55b59
SHA1 9ec2f6b099de70e8d4245631f67af20d6c33cf5c
SHA256 ed87e79a9530f88f0d0533c6b454695645388d20d17db1556ada0008aca9227b
SHA512 edec6d3a1f886130f18060e7dbd57ec762647dc45cb0750b22d570e0d00f47edd815634709e76051ab3984c62243962fb6f677a3d3fce1c896ad1faa4f59d4b3

C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\HWTP8BNA\-KA72UpoZPXAn1sSAuHG_UZ4kno.gz[1].css

MD5 bd836fe3637f869fc3a70d435fe9f238
SHA1 1e0adbee330315ae3b0e29f18a6c20a07c2be457
SHA256 b2cb5a49e2c72297e7d06d4069934a3abe936ed590a2f33e05cb7d17a0c45373
SHA512 7245b1ac3bd77b29be4e078b28ae60b0bcdc10242fda75102f9b791d89675154f94c9e559c09823cb9a5692a5254f12359b4b8863577c6eb5421792b33d88dc1

C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\HWTP8BNA\Pi7dI2YK5HhSnqDydANB7FJIbNM.gz[1].css

MD5 543ba21ecd2122b9e2722a8592f798fe
SHA1 af01924c68e4af8f0e4dfd714251c7ca13204bad
SHA256 a56d074f65ea1a2984273f50023e1e9f052c67c11993802477465864262e90c1
SHA512 75893745f25d01a8e8ace911588faef8a8d92ebee653052b8e38ebd64feef7de6594234e1a6ec8b80c7cdf4e9ef049159c0f0d69bec579b2293b29e077f6431a

C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\HWTP8BNA\IirAWF-tz7Baq9357JjfRuDuc2w.gz[1].css

MD5 5526e220e8361c2060d3b1aca4f15933
SHA1 8ef0d4a9007e246a5cae22fb5024efddaf777fc6
SHA256 32f3bae84748286a68d1829c21120d992decab2dfad30a12b4b25107f5012b27
SHA512 b7ee2f473abe1ffe59259008031057caad6a53445226b21ce8709506c76d27a1dacac310ca149b97639616547492e520eef6bd7b52554a64a9fa12e509e6f4f4

C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\Z5LT06Y3\EjjPVQw2BmqPSvEa84rhVH4o_xA.gz[1].css

MD5 d9835ef4f64bd2a74ea5b56a261d0ad3
SHA1 71c769095d46efef657255159b4a13699e1ada3c
SHA256 fda16e171f394b894e1f819e9495f7d3ad373c00d2eda3346d349d3528227c80
SHA512 5b6f734609038572c663d26c3862418b8a2f6203ad8eb79eb66187a95d786b97e67312a3b617f3db8cddc3cb2c519bc47ff223b866e909b91b777a270d65cd12

C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\Z5LT06Y3\kTsMJbdzcyQyrAhc0mqdyZuTna0.gz[1].css

MD5 cd24bf1b3a1f467c71249ad3edadcda8
SHA1 71967626c2624ad9e674e42dc4c554f54b2ccdfa
SHA256 0e660963740594a0c1cd5532321a9eca1e6570df95c63d06990954aee6c44649
SHA512 af641c475050ad91662ec253e1976677e0bea91c3fe718f88295035d6fbcf805d0c0e1d1e57bb747c61cdcd614596cc4e361ece2c80d4a36f92b0bedc2d969d9

C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\Z5LT06Y3\--7mch4O1szo6i5yf4stjs1Ve0s.gz[1].css

MD5 8082e4ff545d1ec2806dab73606073e1
SHA1 dec8fde9de97d3c63950bb0d0f06b6aa301b76ad
SHA256 75efa75f4d65997d8ba7c3bca7b589ad47f8fb3e8baeee1cf385ab4654ce18cd
SHA512 5fbb430eab3f1fdc2bd599349ecfcc7d21ce79973ac499472c118e3102d9cee2ec456614fdb42485d53c3ae32ec75d01d91d2bb6b6ab700f50860b209fe69717

C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\Z5LT06Y3\pEoUL393CGvpWAE2oam_a1WexK4.gz[1].css

MD5 edc542c94d01808fe099e72d6390361a
SHA1 2a1a63cdaa90bc0dc84cd1e5b1036582aab2078e
SHA256 a47f463d2af683de10fd19417124cc0fb77431ebcef0e7c298e35cabbb4a7a45
SHA512 e6dfc67441d5eb0a9df9b27b19b98f62b392b5706118adb1ec56ad1495fe6484774d4465de0a8af38b62144ae014791456da0a117635121f9728407ffc086ecc

C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\Z5LT06Y3\WzIm7KIJB1QuaIkeKTGhDGtZvj4.gz[1].css

MD5 b98f6b3fe0b14ef1f9405171a71bf518
SHA1 b26be4889733c762784905c5843d339d48671f3a
SHA256 35a685dc01d69c30bfb1072ec529949ad065d5e06dfca6c83f6ceffb7a67cf37
SHA512 4814de8fe1e387e04b9bc8cab25b33d156feba049deaf5a1c9680f9d81a6b6e683f90490bfb8146f571e00e4180324916d87b095d1d66838abe9fb09a81b1bb3

C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\Z5LT06Y3\FVkOQNJYihyHaU6y3LmVjE6YEZI.gz[1].css

MD5 d31eb5298097e5ecfa25aa29e33aafe3
SHA1 834507d64db3b912812ca808be8e516b913792a6
SHA256 a4ef9ee6f29c9dbb9151ef59e9120528034d264f333b9c2017210c9a03cd4d4b
SHA512 a84a6a3b5c8d17d94f6c2845498240ea53492017a67aad3a45b78da2aa4911583bebaae87eadd0dd41b2748dae67b5f5c84b1a2bce5720ab37b91001ad07fa2b

C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\Z5LT06Y3\LGIh8a97HvZFfz3GHFb-2_1ZQtY.gz[1].css

MD5 106fc8a3d4abaf183196304e32f55670
SHA1 96a373b97020d145e025506175da7d5005a0994a
SHA256 0b5d9cb00d4ee8068bb96772a09ab0275c477504f45a46ba53209deb4b12bda9
SHA512 7d45933b6180fcdeb4ae61a4b422449aa0ea06054a123cc73a86a262dbd2f391f07a49e0a8e3e27d1a02103cbf1f6eca9777378e68a25616cb7c016f1f0ca511

C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\Z5LT06Y3\X9aCi5-Tn11fT9z78TjH4SqUcIg.gz[1].css

MD5 1f6521be62933d297d0b2a07a02405d0
SHA1 30d252c170856420812ef8abdd3d50cf0e5b1f62
SHA256 daef5e5ddff21f5b0bd63a88f55ecbb2221705fc2e26142dcc73eef151208cfd
SHA512 520992151fcf7d0d70a7af2cf8d164fe6fe601602948e8de8491585d72ee4536686cdd802fabd66220a83216130ed8c77bd2b7710511a8b5d6be88997303fece

C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\Z5LT06Y3\MfhjHHYqbidxsr9bY4khuERJlSw.gz[1].css

MD5 78f6cc3dbb37a40e41a272b7fa338985
SHA1 45d5a80e35e782fb2faba68cb33b1dfcd9bb2f08
SHA256 9dca95742d5b4f71596ce1cc91ca8cf545011c573fb1cf52104a1db869d9a1cc
SHA512 083330a481e96d9f719332926fc93c3db65287aed3de4d89f43e53f48026f0ba3041b92f7bdbfe336deea2d44be0be89bf78e806b6197b32291c4c63c04915d8

C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\Z5LT06Y3\rwDiaXxUYKdb8PxM4nlSv7b54tg.gz[1].css

MD5 bd8c71fed561769598a3308fcfba9898
SHA1 a8a7f2aea0115ad2d5ee0b7a92f9ccff25a60c60
SHA256 14a575843dd5923be3d259f6b439d623ad12750975ccdcdec4089fbdc4314890
SHA512 5942811425861210c64bbfa963719e132aa0385559ba15877658b921d77576341e4f750752d0522d58d88fecf895a19948fa6933a9d7a396242f4a5b9c7cb269

C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\Z5LT06Y3\kb0OYlyDwOKxf5v502l3jtVAOXQ.gz[1].css

MD5 7de639b4fc93e9446fb7c2e25348f54a
SHA1 549289614e690a370ddc0b6c0a2a1b1677ededfc
SHA256 7474a8b3ff79ef4978d048750414478d0ea5b07b80ef115eff19a032b4d403ec
SHA512 83899675fee38aa22d8e7d72a8f80d4bf5a48b2bcf49f8078ff8c8d32686ba8e0c136606ca00e375bc5b64a96f588ff478bad780a2684907458760c8b1c35493

C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\Z5LT06Y3\E_Dz94dvXIUtXOWWOxmCQIiezN4.gz[1].css

MD5 998f2930c284aa38f8f4b84c303db2a1
SHA1 e841f739b35342a74057ed5653f0e35a6252e3c0
SHA256 8165ec9b41e7ca4e973d709642ec1055a48c8883aa9866c93bbb56b74a099191
SHA512 b6d65941eb64cc20d246ae342fef265f61a3d325b5e4e6bbafcab96fc3cf1077e75f39d2652a9ba8988ba5d5440d4afa9ab311dad49708a8546bf399757647ff

C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\Z5LT06Y3\0bibGpLQufyMfEPoWect7CRdLSg.gz[1].css

MD5 0f377e82bd7c7567a19a65f7a6895475
SHA1 46a2708bd8aa676e182ef538e17384f170668ff7
SHA256 81513bc42881612c4a530ce3abaaa528f4827ee756a91355961e0ff062d02a98
SHA512 e3d1fbc658e221cf14995af279d11de7e1b74df4196a9f0d2edb1730dc35331e176b4f451d194e6849f6283ecc1b79c82dd0eeee03982146d0bc47f281fee0fa

C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\A8DU897P\bol4d0RZ-wGyykyqNBrfS1dhWzI.gz[1].js

MD5 fd2295fca3c9875c924fc3376d33452e
SHA1 3f0ab871690d0baf60bc0554aa9248e0c3e98ae8
SHA256 7f8a01628be8b8df1ad9a4ffb8c732f3795993d4bdce5f2e34a4c3ca2837e505
SHA512 072238d1813ce12ea013335fe18c8d6588a15058ab2a63e8df2876fbbdfa941bf7af92168b5d27d42dab2d4d4a8da8d9276f5e3c39bd51ddadc65c2c95686672

C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\A8DU897P\3O23Zv8w4IgZseUyMm2cGrFDsfY.gz[1].js

MD5 929327c633489092bd7dc56dee17af7c
SHA1 c5a69a8193da39a6830727c2cd836cdb5809e727
SHA256 c986d0013802b8708b314dbb8c26d5ca3b1d27c7f6b0e96b8869e07db042244d
SHA512 948b7717640a87a35c2d339a0c1e557287e8c2aa2c4ebedcc4560cf4bf973a5d0a23ddfea33c1d386d9f72f0a7f291ad24856c39e1ba6b0acb3279e71b000aa4

C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\R3JK00ZJ\auys0in9sWzt3EQQItQgqNENg6Q.gz[1].css

MD5 4ecf37d508b1ce0e6072259785bfc7ae
SHA1 4f46a5cadc934678560ee3a05ff44f9621142f48
SHA256 f5697730d885048233c9d70c013bd53f5aff995843b34bbd1370b8d3ee7b596f
SHA512 9cf44ca831bea344f51820d1825054e8c6c1db3eb1a2a16a9013daf1d46ce38c0c07baf6122e91a45f072a3ca8235a972568d0716fccb9bf2e56211372bd5b9e

C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\Z5LT06Y3\IB0Y1wqeADWAJvJHgJl7h22AC6U.gz[1].css

MD5 0cf1046b1cf52de4178bb8fe60e9ce80
SHA1 18cc3e7a62ad048e2788111dd5061cb7655dc0c0
SHA256 7234ea9e27d099133ecd89d06a42a24c614512d6bd08084ea749109a729fb8c6
SHA512 abe1d35a51689d11357224a0f3ca7c5b53d7f913af69f88a8b77eb600da046a6c3ae280ae4dc214ee00092b95bd72c73036ac303574441d2649944f1a6250a5c

C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\R3JK00ZJ\twCKDC-TMSoc2D2IXZbW28nynvs.gz[1].css

MD5 b73d4577adab50ed74b65bb75d09b8ab
SHA1 f59fd51b099f1232602de13c2deefb921492f8eb
SHA256 5feb470fd80d1c500a4239d3f1ffbbfd592ac46d09c2462da2282c09cda2dfb6
SHA512 f2dbdcbd131e6761d506aaef787a31ae1c0d3468a08af369e150785201c1931dcd76c5714b4ea03fee57463f08574413e9b32e7c7b8731aacfd47fcc03dbb594

C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\A8DU897P\MAcMxC-tp4-Oyxmu05tNWpl-5Dk.gz[1].css

MD5 438151c6b9cc9a4bcfb72117ddbfdb1e
SHA1 74654ac85963565aab132014ab15ae905bcb1b5b
SHA256 7979f29b248f97779778208f25aca25cff5135292604314ab4e6bdd9a5b11198
SHA512 9cac3192cbd3ee6941441a1f378d030601f0f638b9239bb836889347c4b44dd21000ba27a676c5776c1644e38c9f871985715aa3665f1eb0c3908841fd87532e

C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\HWTP8BNA\tG4mYd_ER-Kjzy0OSJcYGs-clAY.gz[1].css

MD5 c1570501fb16fe960538d1f90f0d1e87
SHA1 a2970b6d6cf32835c0b7b38eb28e3f6afee70f55
SHA256 2cfec125a3c1b5ffb74a84e5e58057ea602fbfca3e6870e3c9822f5b6030d36e
SHA512 da13c00ca652b332ba4954a45dd462c07affc4fcf88799974393e1f584961d6be8d870e67143cdebb75617df227f74c75b337c793bf6edd0e9c1c08d21a862b2

C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\R3JK00ZJ\vp58XrHzBM_DzT7hRyFp0n9K38c.gz[1].css

MD5 53a64dfcb494ed16a6e2c29149e095cd
SHA1 3f89d59bd710efc15ac43d153bca7302e172a5b9
SHA256 faafad6c77ee74e48879aff39c97d4dc47744bfcbbbe0a72f20449875cc4b3d3
SHA512 1c6afd0b95716b9d87a3cb1b3fedb7eea347059234054a61fb699901a2fd1ae463ab352608d422c790ea26fbc6b8f7a7aff7b81d0d165e08b32f56a49ab86697

C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\A8DU897P\JwO8973_vO41dbX3--08T1KG73g.gz[1].css

MD5 8e1baf241dc507aab36ade9e65916eed
SHA1 6160fbdd88f78e2e1516d89bd1d345e639a54c10
SHA256 51ba13183ad6f6c1303f27c0fa617d6c24fe04820fdada0cc2a82bb1252cfb6c
SHA512 d81ef5d9bcd11dd3145fde2177b61da418abe7b0233ed035d7abeba10b8565d5ca4f8be53b18694f65dc6c8546d303a3dbaedfba5dfd0a8e52db621cc5e31654

C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\R3JK00ZJ\4vKjOq5qWOVqG8IWykwe3Fn6to8.gz[1].css

MD5 4bbda884a381cd01a1e942b37452e182
SHA1 ecaefb2818a19d26d2667a805e43ea6ec9228f83
SHA256 73d291107763220530d097676cb7d7b941c3b6c1c22275fc12561990af1c2175
SHA512 b9ec72c94c9e51785a5ea0a0fe2e73ca0fb50f53e006ef6ebb4993f22a1621d931c3c833f0184deb243c5433130b160283ecabaaf4ce4b31684ce1e308765a15

C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\R3JK00ZJ\uEiR40DMbj_G11sOodl_I58Ozoo.gz[1].css

MD5 ab4dcd690cd8ef8469d7aa468c57ba50
SHA1 5c3d43f4b22d31697e24025d41a775974b2e7f27
SHA256 ef6c3d9be3e998ac0638f3028cfdde7110432ffa681ee6140b4cf85b88cadb9c
SHA512 8b4f8b35c74dbc3a960413a7b135f8f085b6a0904ae4bad3dc13552c278f75e8a3e0ddf6e1d81739550d5e69f63becb69ca8b2d338ca05f16a4c871a0199e108

C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\R3JK00ZJ\6vQT9MiFX1iAIvS3qdZw_cFeH9g.gz[1].css

MD5 d9e4abf9bcfe28e8d176cd52a824c1e1
SHA1 8368f1ec6ae479179d271de461b639ebca21828e
SHA256 22075a5434ed770af6bfe08c0dc17743f8815966b27522dc5df09d86eb212fd8
SHA512 5a8cc16e47da9730d209e3bd7e949f00c2286bda21faab8e901fde93f46c3f760bb98fb86b6e28dfe7e23ad3dd2bc0a140a85dc9e872d685db73e1c11d733cd9

C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\HWTP8BNA\vnPDoLGUredJWpfAx9zW1Olm4II.gz[1].css

MD5 66ca868af893c63cf58ae76c7af2b37b
SHA1 a365c4e771267e4fab2dce17a81a46cf7bb2499e
SHA256 3975f834cf37437f079bf45d137ff1fd3e29136addbc08074b7bc6030a210aa7
SHA512 2b42f981bbfd8cd03787ddd483345f799c4558c3551459fd4dad7a7496675271483dd5e57a535c439428d3fa869583d01c9208b617210481229cae461be14ec5

C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\HWTP8BNA\sxg9W89sQS7IDs1q9R4S4Dac0Fo.gz[1].css

MD5 00c85972dd87b684baf16ed6254b4388
SHA1 39584c1c0864abb6c26adc5d916a649c6392a69c
SHA256 3da94de34236843c7d594b1697a09c4f079f3d9e866e620e7c0e2ac9eb6f3c29
SHA512 317323c2a11208407747754d02c3d0fafd69a916f4a2c84cf6f213e3362666d1144b1708074b571cb29ccf2df249462bab12b2ad3756d82375cc6cfbbb4e1471

C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\A8DU897P\D_TlUuoXi6TBx56AFo0O6oAN064.gz[1].css

MD5 9ba89c1bb0943881f49b3f287cb8aa5c
SHA1 17e205e3081e85f4465fe048a5ef65af17b0f84a
SHA256 1a4410685e3bfae0b8914d4eeae1a09434ca6215e1626e84f774535039ce5f3f
SHA512 3bc2765d818b6effdc8498af9d26deb62fa186f390e037a1841346b8c235adea61a34e0dc2ac0175779ccc99e90089fd7b5505b5d5d456302e7e74105f0666a1

C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\R3JK00ZJ\KHlB1rok4zvZvMchMo2CBBMejpE.gz[1].css

MD5 3499e20d55d3fca3972494bea985b6c2
SHA1 8ddfca8a4b42dec016609b0e9f8b383e84afbb5f
SHA256 abc2b8744af2f143432a5e6b194391acce013e9943e5d3d6bb802cb31c255ea2
SHA512 cd9de32cda8ff23f2bc19137c89ab1b6fbf2bb9564db22d0839507ef502bf53787fbded51ede69f1541bd5ab19222bf7dd18e868a5adf943151fc763b25f79a0

C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\R3JK00ZJ\XDFYXIqMDzFKCvOGL0cs9belLz0.gz[1].css

MD5 77373397a17bd1987dfca2e68d022ecf
SHA1 1294758879506eff3a54aac8d2b59df17b831978
SHA256 a319af2e953e7afda681b85a62f629a5c37344af47d2fcd23ab45e1d99497f13
SHA512 a177f5c25182c62211891786a8f78b2a1caec078c512fc39600809c22b41477c1e8b7a3cf90c88bbbe6869ea5411dd1343cad9a23c6ce1502c439a6d1779ea1b

C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\A8DU897P\tOlbS9qmj0ZjJoU8Zr6L3FUbbZI.gz[1].css

MD5 af1e56249db33e95d4f82b62fbac4e64
SHA1 bc91ba42447dbf2526334e64b037d3b657646c92
SHA256 b7befb4f876530cb3d04230756aa17ab4a1569012038999bbd5416c94e6cb8a2
SHA512 86f1e710d5749de8dac67e0836922c677ce663b4609330702b8c7d532e275668a4eb6bd68f7dc5ba13bc05afb6fc63bebf3ec49ebb61cf8beafc50403f28ece4

C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\A8DU897P\Q5jxF3safe97Q4W6l7ti3nJsnoc.gz[1].css

MD5 2069ca5d5b1b66ce06048f4cbd8ed115
SHA1 8a1614236195a4f8ebfd276cc17b89fe64f1c702
SHA256 185d87cc9e57abc27b7741ffb677c5f2286d2d977c46674697272e515e2a608d
SHA512 b10af11e95573555f7fc8d3c8a41544101aa1b53b286d850c3030a2fc022067e3f96698967206c219fb2f7884381e8f331521ce1153b6b299648926f9acd74fc

C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\A8DU897P\CXAbhS0pFWsbDCqXSoWE0JqY8LY.gz[1].css

MD5 2896eff82cdbb3889f39dfe58df72065
SHA1 f542fbf5464156a1cf95fb73fd7357bc4ea5ad47
SHA256 76919287d3dcfd792535cb0dc751650eda8a942322bbb231173d56f6d66a2ea3
SHA512 066dd5adb9bcbdd36d34da2b0bdfe868a6355a143aad4d3a8cc63c1543405780230124ec097667a39637e320e358f512eb6b4de1338de04f722fcf3a015f239d

C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\A8DU897P\ePBWyYcXwJBx94QrnEnDhZdqR0Q.gz[1].css

MD5 0f173fd089a6a4cc106846e9bf828d12
SHA1 c877e48014fdeb32c2b08e43a2911418f9229888
SHA256 9d4943ea22a508b3c443a39dc356c15a8423972241cdb47f13347fd2a9308628
SHA512 01479e89a1c813506922f91c7cd0f43fb3bf077a4cd8f3e180284e3fa37bd976fb8e02972c68b19dc559d44255197e7d31d50433e157c8858fb4316b4d963f74

C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\A8DU897P\GR0nIow4lqBXe77pz56IthfGxKg.gz[1].css

MD5 42cbf85358006a5971ffe991c294d88a
SHA1 f59ed365c16e0294e76e39f859e8251af99f4c2e
SHA256 49a2088ebcdb70a68209591ad5db74d3a0628765d0ab6c50693d0eb0e9a04649
SHA512 5203f8c627bf3987670730ffe9ca10638e855fa32b35e9fc9b81de13f3a1aac6b99bf41ccd93b6c5925ccc3f40ffe51e57090812257b29a475f8b783b4f9b3ec

C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\A8DU897P\JwsTUzo9E--FYQXHW7dRxMnO-4g.gz[1].css

MD5 27fc8e51fbd187d440b795b9a695a308
SHA1 c1f2bfd4481bed7ab75982d7f18b351c7cbe1674
SHA256 b4afc444b9f2d4b06fde7ca0ff83f3acb3db8678e3953cc97a3b159dc8a404bc
SHA512 d12ddf5234eeaa1c09a41b79177866840341444f572e58b7a36b7e89a0962dfa27d77c47665a50dc623486bd9e24b6435d8643cf0ee718007eb7860d3f085e59

C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\A8DU897P\nQ8mJuHk1T6W5tnJiJWOBl8QzPU.gz[1].css

MD5 e940f03812097cf7522447c3bf9bae06
SHA1 7d85417cf8ea8638a688082773e3135a3195ee7d
SHA256 9e68e61c6f3827225836353502b53530c462b1f884d5b8e6edc1ec661b42ee18
SHA512 b994bd1a17cafac214869c603e3be51c5241a2b5d503138515e5fdc1fab5348abca0519ea30979d54dce3c7be6e67963e77fe408e42c76ae8b02facd0752e172

C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

MD5 eca323ca58000020ec52a6cc88f90fbd
SHA1 6e94dc9e5f891871cbbb04f7fc473f95edc77a5b
SHA256 4c61a81a973ca19ed8ee15cead04a05cfeaf06475a6669544096cf189a8d08d4
SHA512 823753f81142f5e9f9ccfaeaff4f959e660a77686e69dcef11e162f5551e6d627c6aa945b4671c6aee3dbacb289dab62305b3b0bbd8e6bdf6f65c1702e62ad71

C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\A8DU897P\3JT-GypYRRiYsGxeaoyj3SQssno.gz[1].css

MD5 8d8b62b173b93037bb3a53aeeff12611
SHA1 c16dd0ef80deb06599ce69f249e10ea8b5806d3f
SHA256 c58b7b4387b2e8d16d09c314829ba0aa10afc9bbc560625331140f897603020c
SHA512 05269f1ada684e2bdbbd328abae353d9aa1a741638bf8021a96519c2e52b95f7fac98cdb4b27aa7a7b6ff8f734423a344e556bef49108069ce9bdf28d3beb4c5

C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\A8DU897P\VLXl5YeE75lSyBZ_ELxhRk6FKJc.gz[1].js

MD5 12ac279f95a95aeba6f27f4c8210f143
SHA1 caa7e2d699af8a391e1a85a4a0f34c44efddb862
SHA256 ab39161605904ce7d62927838697134274070941b331ed99ea6d0bba39876bda
SHA512 da1f07b1d9ba878576cdad2a03351c4513bab18b8614b52be69daa60dbadca1769d36f087580176feef980975ff905bc5ce624106f3275523ff5744561db05d7

C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\A8DU897P\AT5pDU1dYEfNvwgqUeyhxh-3Ouk.gz[1].js

MD5 08f7c1dc1aaf048802adc436d9d542bf
SHA1 c92d616f5da1e5c3cc42c5ed4c74e57592779ffb
SHA256 4b2bfe5490e08692e57a12ada60c818b163c800e17c7c2b91f79ff6d530f5f60
SHA512 ce968bfa7ada540f2a49123830e55197caddcae083ca2363581508b815ddb3b5594f642d455d0002e29a2bc4017f496d8d174a142692cf18e0f6d20b1a836b25

C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\A8DU897P\iuYNUHE3kZrz6Jrb0_Mf0yBFZN0.gz[1].js

MD5 bd33d48372e231bb5d17d474eb72c3e9
SHA1 b7a6d7235c9c16bbe2afff80479781999a1e0c54
SHA256 0902692225cf325455e896941a7def89a27e00efe6f30bea60f1ecf9d9651483
SHA512 9d1ea258b0f56b120c433b96ba56963d7512f081c9dd2cda57cc6e8da75a99f1d9a9b34fb7bbfbcb7d19d4e9580126f183d719736354e53ea4101f884fe86902

C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

MD5 ebee74b797a359591e4cdeecff157750
SHA1 9db84c1cf112cee27a269c6bcc083b472753f8d4
SHA256 26a1dbe8dfe3b658bbf67a3620b7c912a88b220d2acb7de0c40f7edfbf176260
SHA512 3b7ba252db7e062e54a8b3c37a1f8ec9c3526d340bcd3c85ae0a07a0e5bba9bf490d56f65ebb488788a9f8fd8245175acd8423711a284aeb536a092db6c5fe59

C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

MD5 e938b1e1a1238362c2bcbe2dafa534f6
SHA1 0725a4653b8dfac6c2e0c07bfd93114dfcdf16a8
SHA256 3437287770c611fa91abbe5283a1eed2f82380d3849272612d155a956744cbdf
SHA512 53a32da1fb09e405491a3d5cb1eb1c91e068eedd5a224d9802cd2906ceda35723b7aaae169181831c602a3389c7b96da4b46af8545a79b5deb6d2e10b4084fc7

C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

MD5 565ffbf98c1d559f24922aad8336a7db
SHA1 03d074c4b1f58d0ad7a2ef9bc32303175c2daf25
SHA256 a757254c9c8883d7d01dfe5ee4039a59338ba224f51e72da8eb0225359de373d
SHA512 e1414b2efc69f234f1b8b5fafd9ed72e71b950027439104f6f0a09418f14d8d14dbf36fbc4d389e0a627b9289a8764081ddc7882b42f9c34da9e613c1febf09d

C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

MD5 bdd61446cc5ad79fb889c47bb1214824
SHA1 89ea9f56a1dde8101bdb949823b6af16ad3e87f8
SHA256 669b4c1e6cf06a600a1661aed8e6c182c0d0a0457b8de7c79076dce887b2dfe6
SHA512 0d5e788ab72d7b6422b75e67ed7e097dc6b4ed2240f2bc4ac68d16b0955f648fbf8c863693ec802e32aec15d135fbc498101f983dc4ce9c58fc73b511e04a94a

C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

MD5 f847ae6d0a809d931e202c7813282e7d
SHA1 01c11c3840cd16e091d58410ba54b07f1ce261e7
SHA256 4cc734cdf8b04c8ada43c9d6325a4a3811ec393e22125fc1955146fa40b277c8
SHA512 01b862e1060fed9462418389e0a05c97c9d5a7b07d569e903d137ee6e67fa6d063aacdc8a2cc3b41a39357bde6c0924700340cbd0b263fe3436170053c0ff87a

C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

MD5 d6968c1e1b08ceb2eeffd4c69071dbc1
SHA1 d806135444114eb3e28157fd6ad25d029ea2e24c
SHA256 8dba31a1399abe57f6b6116c1db68045e2085ecd2783a9b9781fea0ad78ea49f
SHA512 c6095ae3dd37b5ef36d6c4c4735e73a258b772a3c2080c9be52d4cd7bcc4fd7282449cd0399c27a9a5f580fe6ced8acdf496d4dacc491d79e149f333689f2fc2

C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

MD5 24e02b9d9cd19ba019ae35315001ab0d
SHA1 4a94af8754ad66f3a19efe7da15abd4718efe54c
SHA256 8b1507d95c62ae8e15ae4a43a8ef2d01e613015bc190683a11bd97ec500c56cc
SHA512 9242afac45ad728b3dd2ef86b02be06c5abe5be11a302744c14b27d9d4ec9caa0c712cd0690714678842f7dece060f6fe598f11ac862d6dd916aef598b60a740

C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

MD5 0d2a8ab1c0c8a44fcc23fd51b47a3da8
SHA1 fcbd3cd3c612288a76de032f1ef4197c3adb58c5
SHA256 a9a98075904952ac16dbcc9acbf2de42c156538a952419c56fc8ef468de8dcaa
SHA512 49ef704ce5a490f45ba88abb7da23db54543201071bd9c56f3f4962048ebc5b378a0306bbe7ca43caefffd512a363a31b904dd18d67353437669138bf6085cf6

C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

MD5 4f09c3119245464f187fc9a8ad0b456e
SHA1 9fe81e01aa6a7844f2b0045d303c63f785eba242
SHA256 137ec56b78daa3d6e32d9abc224ea3aba8ef194dc1b5e152c06d8d49cff5b422
SHA512 fc0139235bfd4726e72a70f2299f72e495171fab3d2823c87134d47eefa3f0a1e52cccdb667e9444b6ff61fbe484ee1119042ee14bdb74b5f6bbc60d38c9ab97

C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

MD5 645166c3c443e0ea945be433e87c6af7
SHA1 a56a2eac2294182128096878d1df555a5b493630
SHA256 5cafe3857ee7ed57bdd525ff622ff3606d4790426849b2c455d857f3c04e008f
SHA512 d5d4b84c9ea7d67cddb3f44cc71af0871874b3e9cc4229ec5b6d8a9fdf0938018ba1d70d3eec6fdb1fd2c8428c1e77882a9d1c190cfecfb956f6051d8355cf08

C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

MD5 4ff4338f7338d7af1c64e6547e2e6503
SHA1 7a8269fc8ace5f2382764c2b4aa5d41ffc14dbe2
SHA256 3f43c064aa46a59be5bd3520b3e166c2279087312b9196486e253a9e4459b1d4
SHA512 a521df383206a39a202b0cdda8675706767b0849011b378bf8d846111b90a5956209cdfd9e681cdec192b0a22c5d991aee43ed0d55528e5c3e52fa313eb57310

C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

MD5 f25cd0d3541d3c200f0aac213f0b6960
SHA1 db9adf39cb5cb44b0b81f0d05cc2abb85adfb4a8
SHA256 d43f17accb2a0831f8836ae81c2bc21855cb33540609476edf2ba5c9171210d4
SHA512 cc9e8d646c5963ae29a616b3dcff721f226382f89eca0209eb91641bacdfa5865f4e89cd2a5073a02ae54ddb7a131b521ae4e9a88553e1eeb9bcd2215a21a7ea

C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

MD5 ae0be48dd4df12a5d57cef6eab837c88
SHA1 6e35358c0dbfa81b13daecb0fa32393cba7fa894
SHA256 7a054a6c8bd9fa57000cdba671063e890a9c6bfbf0f79dd0e92328534f3e6afc
SHA512 e6f5557118b92125a580a91e513f424150ad85ea8cbebd4a382d2bdb41f924379d3c40c6c64be7fb292d2ab9a2cfbbe6f060b6f1726392199c63de838582ae59

C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

MD5 fdfc3dd25a0d866c0dee46246690c173
SHA1 2b0717b62a90d60b5119b2b761c3774cabe6d46a
SHA256 51621bb4115961d7672b21e042755ece4f01543cacb9f3dfb4803fb84213d930
SHA512 c9208dc5286aab4d21b83036c0102159090376dffb5f84777dce975bef080db656385b3ca7ff578e9b98bcb7d230e1178272c6e15e577cf8962d3f849010ac18

C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

MD5 25ab4ddcf58eda138607b810d05c9637
SHA1 9ca670a08afdc8d2bdf550b9e46b9e5eb74433ac
SHA256 bb098d2fd9dfc6eeebc263df20f4db110568a3e8c616c482f4db1c8601712af1
SHA512 d1d26b9ffb2476cfafd48c543235a90d620caeba9a560c4b3eeae20ce9b14d72da03296878a813250f15e4142994dcf051f34823d177ccd35d81cec5ccf9a1a9

C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

MD5 0d1c03011daa9f2f5a8b577e75e828f5
SHA1 aeba8ed8cf604b4b31ce5f45bc04508e92719812
SHA256 29d3b9f454739cb129a22646c0265de6eceddc4f75fc5eecc18051a61c700929
SHA512 dc1fc3a0f11aafd98d3b314b7902730bb5d0def52a716359220b5ea850d616a2bc3dee5eacc255b3a8a3ce4e024ae69edd33c7c57bdd252225c84af7b2c935b6

C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

MD5 a4ae503f8c4a93f7fda7957733730f70
SHA1 44d28bb4c8f4fb23524ae128c4da29670d8ee374
SHA256 74f22fc872754de65d7f575a3fe776edcc7260838ca5a16130e59cb5b3ac37ea
SHA512 c5a75acb74e9edaf903fb2fd9ec5450b8d1664877f12daabfce9e42bc91da5817399363e7049a1bcddb013cbdd69fc7eb59ee638faa6eb4b9d13bc7a111dab77

C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

MD5 e959c834cccdf947f15309f42c473bdd
SHA1 978db9a9435566fe838c76b11963e6da733db6bf
SHA256 3eb1e0abfddf385c32966c22c996558f6311b505b717eece4c2c76470cc92980
SHA512 be46a83232658dd6a965f32f27af42ec451ce15a39120cc8b47bbd062c222c92c4dd6e0adb9174643b2b08327a8badcdee57114b3b3a2c47004d9706aafdacd3

C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

MD5 eb8f89065296b8392b34f2125c3ec204
SHA1 d9c580d19c895a862a8c6c937caa746bae16a669
SHA256 9d6d3429a2a6725c975f849439935349188f0ac6ec1e96602829a27440f4247b
SHA512 d1582c7e38774e06ec8256077b85b7f956d175deb75571ab10fa1aabb7eee097d6a9741fe07e07cca601b2face8886bf266fa9b58342c8de0e353ee8da982811

C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

MD5 9b2168ca64f1dc381a9a4ec0ab848e41
SHA1 8fc3ffcc446107fa8bb947ecab2c3e6f49003fe5
SHA256 5089882fea27d6b4e634c9985b327c7091e90dbd60c8be0424221739182bee44
SHA512 e0bba1e10287d04ebaa2ce5a1ed08063a8b7b2d0f81d10ad222059649390a2ed5a0ebce9787d18247ce5f046365f807f933b7f6ed3587a380ac22c1e25f84b55

C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

MD5 150a153086faf06abfb92128141caf48
SHA1 046e0918a0edcca5413941f9feac6e09164fa299
SHA256 ff6489a2229acaec69b777b142313d06d9e2f993f2c7872a5b4fb0847ef527fa
SHA512 b8ef281888e928aaaf8901eabe9b0cc98980a064cca3ab96755eb483cd712c1f90dfbc3d1f748172c126668e7392dc23910d381506b045bff165b1ea9f9a39e7

C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

MD5 6dcfa233c34d53fc4d8cc1675a5225d7
SHA1 ff8f20f1d7f79520b83f893e64098ee0262f979c
SHA256 fb22f5fc1ea36d9360202e2968cd1880efd4b767a816c61de02405a9eb447fd3
SHA512 d9f2d658e0abc2beec604ca14ff4935292f632b13f5cdb87cd66634a0f6be236414c0d393bd4e9b20f2680964eb7980d57583bdff6ff1f90704d9b67614979c6

C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

MD5 6c5f79b5c77739b8f25d402c29e8ea0a
SHA1 a2f0493871726b947da349c150dd4bfa4fd2da4e
SHA256 f480c18c593b979dfc17d1c2b3b3dbaf7fb2ca7336a5cc105655119ecc88dfa8
SHA512 6a10b4c7de27296a09663062801004d7cf3c6c907932f709988ae50bdf670f05e6cc848fef0b160b7e9f3ae634aec4dd62734837f9da4fcb93897f7220fd96ce

C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

MD5 6549dcb01ea9dae9a6634178576d15d4
SHA1 d3322e580fb5e77f1b53d1a824681ba042c543bf
SHA256 170f76089f1dfa60337904423d1eab8c52b6d53a325a83af3a66b5315be232fc
SHA512 8031299a1a98df995bc02c77089a0fefa5d46faa7a3ad1b99e8755d5cdebbe22807d5358aa15f6094f70ae3841e2702ff892b12c60d22c96ff4d0c62a40953c0

Analysis: behavioral2

Detonation Overview

Submitted

2024-06-13 06:17

Reported

2024-06-13 06:19

Platform

win10v2004-20240611-en

Max time kernel

145s

Max time network

145s

Command Line

"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\a4297fddc0a434ba3ef0b2a6427de9e8_JaffaCakes118.html

Signatures

Enumerates system info in registry

Description Indicator Process Target
Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe N/A
Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe N/A
Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe N/A

Suspicious use of FindShellTrayWindow

Description Indicator Process Target
N/A N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe N/A
N/A N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe N/A
N/A N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe N/A
N/A N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe N/A
N/A N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe N/A
N/A N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe N/A
N/A N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe N/A
N/A N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe N/A
N/A N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe N/A
N/A N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe N/A
N/A N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe N/A
N/A N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe N/A
N/A N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe N/A
N/A N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe N/A
N/A N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe N/A
N/A N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe N/A
N/A N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe N/A
N/A N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe N/A
N/A N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe N/A
N/A N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe N/A
N/A N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe N/A
N/A N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe N/A
N/A N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe N/A
N/A N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe N/A
N/A N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe N/A

Suspicious use of SendNotifyMessage

Description Indicator Process Target
N/A N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe N/A
N/A N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe N/A
N/A N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe N/A
N/A N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe N/A
N/A N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe N/A
N/A N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe N/A
N/A N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe N/A
N/A N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe N/A
N/A N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe N/A
N/A N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe N/A
N/A N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe N/A
N/A N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe N/A
N/A N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe N/A
N/A N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe N/A
N/A N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe N/A
N/A N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe N/A
N/A N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe N/A
N/A N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe N/A
N/A N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe N/A
N/A N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe N/A
N/A N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe N/A
N/A N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe N/A
N/A N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe N/A
N/A N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe N/A

Suspicious use of WriteProcessMemory

Description Indicator Process Target
PID 4608 wrote to memory of 1008 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 4608 wrote to memory of 1008 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 4608 wrote to memory of 1916 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 4608 wrote to memory of 1916 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 4608 wrote to memory of 1916 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 4608 wrote to memory of 1916 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 4608 wrote to memory of 1916 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 4608 wrote to memory of 1916 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 4608 wrote to memory of 1916 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 4608 wrote to memory of 1916 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 4608 wrote to memory of 1916 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 4608 wrote to memory of 1916 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 4608 wrote to memory of 1916 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 4608 wrote to memory of 1916 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 4608 wrote to memory of 1916 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 4608 wrote to memory of 1916 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 4608 wrote to memory of 1916 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 4608 wrote to memory of 1916 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 4608 wrote to memory of 1916 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 4608 wrote to memory of 1916 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 4608 wrote to memory of 1916 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 4608 wrote to memory of 1916 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 4608 wrote to memory of 1916 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 4608 wrote to memory of 1916 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 4608 wrote to memory of 1916 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 4608 wrote to memory of 1916 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 4608 wrote to memory of 1916 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 4608 wrote to memory of 1916 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 4608 wrote to memory of 1916 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 4608 wrote to memory of 1916 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 4608 wrote to memory of 1916 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 4608 wrote to memory of 1916 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 4608 wrote to memory of 1916 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 4608 wrote to memory of 1916 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 4608 wrote to memory of 1916 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 4608 wrote to memory of 1916 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 4608 wrote to memory of 1916 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 4608 wrote to memory of 1916 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 4608 wrote to memory of 1916 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 4608 wrote to memory of 1916 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 4608 wrote to memory of 1916 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 4608 wrote to memory of 1916 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 4608 wrote to memory of 4236 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 4608 wrote to memory of 4236 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 4608 wrote to memory of 4576 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 4608 wrote to memory of 4576 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 4608 wrote to memory of 4576 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 4608 wrote to memory of 4576 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 4608 wrote to memory of 4576 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 4608 wrote to memory of 4576 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 4608 wrote to memory of 4576 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 4608 wrote to memory of 4576 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 4608 wrote to memory of 4576 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 4608 wrote to memory of 4576 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 4608 wrote to memory of 4576 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 4608 wrote to memory of 4576 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 4608 wrote to memory of 4576 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 4608 wrote to memory of 4576 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 4608 wrote to memory of 4576 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 4608 wrote to memory of 4576 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 4608 wrote to memory of 4576 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 4608 wrote to memory of 4576 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 4608 wrote to memory of 4576 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 4608 wrote to memory of 4576 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe

Processes

C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe

"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\a4297fddc0a434ba3ef0b2a6427de9e8_JaffaCakes118.html

C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe

"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffa7e3f46f8,0x7ffa7e3f4708,0x7ffa7e3f4718

C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe

"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2128,2499476073360081269,12383754746018161032,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2144 /prefetch:2

C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe

"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2128,2499476073360081269,12383754746018161032,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2220 /prefetch:3

C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe

"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2128,2499476073360081269,12383754746018161032,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2684 /prefetch:8

C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe

"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2128,2499476073360081269,12383754746018161032,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3196 /prefetch:1

C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe

"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2128,2499476073360081269,12383754746018161032,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3216 /prefetch:1

C:\Windows\System32\CompPkgSrv.exe

C:\Windows\System32\CompPkgSrv.exe -Embedding

C:\Windows\System32\CompPkgSrv.exe

C:\Windows\System32\CompPkgSrv.exe -Embedding

C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe

"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2128,2499476073360081269,12383754746018161032,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4704 /prefetch:1

C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe

"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2128,2499476073360081269,12383754746018161032,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4840 /prefetch:1

C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe

"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2128,2499476073360081269,12383754746018161032,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5380 /prefetch:1

C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe

"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2128,2499476073360081269,12383754746018161032,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4628 /prefetch:1

C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe

"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2128,2499476073360081269,12383754746018161032,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5608 /prefetch:1

C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe

"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2128,2499476073360081269,12383754746018161032,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5492 /prefetch:1

C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe

"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2128,2499476073360081269,12383754746018161032,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=13 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4736 /prefetch:1

C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe

"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2128,2499476073360081269,12383754746018161032,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=14 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5796 /prefetch:1

C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe

"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2128,2499476073360081269,12383754746018161032,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5460 /prefetch:8

C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe

"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2128,2499476073360081269,12383754746018161032,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5460 /prefetch:8

C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe

"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2128,2499476073360081269,12383754746018161032,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=16 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6064 /prefetch:1

C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe

"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2128,2499476073360081269,12383754746018161032,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=17 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6068 /prefetch:1

C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe

"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2128,2499476073360081269,12383754746018161032,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=18 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4132 /prefetch:1

C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe

"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2128,2499476073360081269,12383754746018161032,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=19 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3588 /prefetch:1

C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe

"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2128,2499476073360081269,12383754746018161032,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2068 /prefetch:2

Network

Country Destination Domain Proto
US 8.8.8.8:53 yourjavascript.com udp
US 8.8.8.8:53 assets.tumblr.com udp
US 8.8.8.8:53 static.tumblr.com udp
US 13.248.169.48:80 yourjavascript.com tcp
US 13.248.169.48:80 yourjavascript.com tcp
US 192.0.77.40:80 static.tumblr.com tcp
US 192.0.77.40:80 static.tumblr.com tcp
US 192.0.77.40:80 static.tumblr.com tcp
US 192.0.77.40:80 static.tumblr.com tcp
GB 142.250.187.202:80 fonts.googleapis.com tcp
GB 142.250.187.202:80 fonts.googleapis.com tcp
US 192.0.77.40:443 static.tumblr.com tcp
US 192.0.77.40:80 static.tumblr.com tcp
US 8.8.8.8:53 ajax.googleapis.com udp
US 8.8.8.8:53 search.yahoo.com udp
US 8.8.8.8:53 scmplayer.net udp
US 192.0.77.40:443 static.tumblr.com tcp
US 8.8.8.8:53 78.media.tumblr.com udp
GB 172.217.169.10:80 ajax.googleapis.com tcp
IE 212.82.100.137:80 search.yahoo.com tcp
GB 216.58.201.99:80 fonts.gstatic.com tcp
US 192.0.77.40:443 static.tumblr.com tcp
NL 23.62.61.88:80 www.bing.com tcp
US 104.21.234.156:80 scmplayer.net tcp
US 74.114.154.18:80 78.media.tumblr.com tcp
US 74.114.154.18:80 78.media.tumblr.com tcp
US 74.114.154.18:80 78.media.tumblr.com tcp
US 74.114.154.18:80 78.media.tumblr.com tcp
US 74.114.154.18:80 78.media.tumblr.com tcp
IE 212.82.100.137:443 search.yahoo.com tcp
US 74.114.154.18:80 78.media.tumblr.com tcp
NL 23.62.61.88:443 www.bing.com tcp
US 8.8.8.8:53 guce.yahoo.com udp
IE 54.73.219.191:443 guce.yahoo.com tcp
US 8.8.8.8:53 th.bing.com udp
US 8.8.8.8:53 r.bing.com udp
NL 23.62.61.136:443 th.bing.com tcp
NL 23.62.61.187:443 r.bing.com tcp
NL 23.62.61.187:443 r.bing.com tcp
NL 23.62.61.136:443 th.bing.com tcp
US 8.8.8.8:53 8.8.8.8.in-addr.arpa udp
US 8.8.8.8:53 17.160.190.20.in-addr.arpa udp
US 8.8.8.8:53 40.77.0.192.in-addr.arpa udp
US 8.8.8.8:53 202.187.250.142.in-addr.arpa udp
US 8.8.8.8:53 48.169.248.13.in-addr.arpa udp
US 8.8.8.8:53 172.210.232.199.in-addr.arpa udp
US 8.8.8.8:53 10.169.217.172.in-addr.arpa udp
US 8.8.8.8:53 99.201.58.216.in-addr.arpa udp
US 8.8.8.8:53 137.100.82.212.in-addr.arpa udp
US 8.8.8.8:53 156.234.21.104.in-addr.arpa udp
US 8.8.8.8:53 88.61.62.23.in-addr.arpa udp
US 8.8.8.8:53 18.154.114.74.in-addr.arpa udp
US 8.8.8.8:53 64.media.tumblr.com udp
US 8.8.8.8:53 px.srvcs.tumblr.com udp
US 8.8.8.8:53 consent.yahoo.com udp
US 8.8.8.8:53 scmplayer.net udp
US 8.8.8.8:53 pixel.wp.com udp
US 192.0.77.3:443 64.media.tumblr.com tcp
US 192.0.77.3:443 64.media.tumblr.com tcp
US 192.0.77.3:443 64.media.tumblr.com tcp
US 192.0.77.3:443 64.media.tumblr.com tcp
US 192.0.77.3:443 64.media.tumblr.com tcp
US 192.0.77.3:443 64.media.tumblr.com tcp
US 192.0.77.40:443 px.srvcs.tumblr.com tcp
US 192.0.77.40:443 px.srvcs.tumblr.com tcp
US 192.0.77.40:443 px.srvcs.tumblr.com tcp
US 8.8.8.8:53 www.tumblr.com udp
US 104.21.234.156:445 scmplayer.net tcp
IE 34.249.207.156:443 consent.yahoo.com tcp
US 192.0.76.3:443 pixel.wp.com tcp
US 8.8.8.8:53 csp.yahoo.com udp
US 8.8.8.8:53 vimeo.com udp
IE 188.125.72.139:443 csp.yahoo.com tcp
US 8.8.8.8:53 191.219.73.54.in-addr.arpa udp
US 8.8.8.8:53 136.61.62.23.in-addr.arpa udp
US 8.8.8.8:53 187.61.62.23.in-addr.arpa udp
US 8.8.8.8:53 3.77.0.192.in-addr.arpa udp
US 8.8.8.8:53 3.76.0.192.in-addr.arpa udp
US 8.8.8.8:53 156.207.249.34.in-addr.arpa udp
US 8.8.8.8:53 139.72.125.188.in-addr.arpa udp
US 104.21.234.157:445 scmplayer.net tcp
US 8.8.8.8:53 rewards.bing.com udp
US 204.79.197.237:443 rewards.bing.com tcp
US 8.8.8.8:53 login.microsoftonline.com udp
US 8.8.8.8:53 64.159.190.20.in-addr.arpa udp
US 8.8.8.8:53 g.bing.com udp
US 204.79.197.237:443 g.bing.com tcp
NL 23.62.61.107:443 www.bing.com tcp
US 8.8.8.8:53 205.47.74.20.in-addr.arpa udp
US 8.8.8.8:53 89.33.18.104.in-addr.arpa udp
N/A 224.0.0.251:5353 udp
US 8.8.8.8:53 www.infinite-scroll.com udp
DE 52.58.254.253:80 www.infinite-scroll.com tcp
DE 52.58.254.253:443 www.infinite-scroll.com tcp
US 8.8.8.8:53 infinite-scroll.com udp
US 104.198.14.52:443 infinite-scroll.com tcp
US 104.198.14.52:443 infinite-scroll.com tcp
US 8.8.8.8:53 253.254.58.52.in-addr.arpa udp
US 8.8.8.8:53 52.14.198.104.in-addr.arpa udp
US 8.8.8.8:53 183.59.114.20.in-addr.arpa udp
US 8.8.8.8:53 171.39.242.20.in-addr.arpa udp
US 8.8.8.8:53 144.107.17.2.in-addr.arpa udp
US 8.8.8.8:53 13.227.111.52.in-addr.arpa udp

Files

C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad\settings.dat

MD5 56067634f68231081c4bd5bdbfcc202f
SHA1 5582776da6ffc75bb0973840fc3d15598bc09eb1
SHA256 8c08b0cbceb301c8f960aa674c6e7f6dbf40b4a1c2684e6fb0456ec5ff0e56b4
SHA512 c4657393e0b9ec682570d7e251644a858d33e056ccd0f3eebffd0fde25244b3a699b8d9244bcdac00d6f74b49833629b270e099c2b557f729a9066922583f784

C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad\settings.dat

MD5 81e892ca5c5683efdf9135fe0f2adb15
SHA1 39159b30226d98a465ece1da28dc87088b20ecad
SHA256 830f394548cff6eed3608476190a7ee7d65fe651adc638c5b27ce58639a91e17
SHA512 c943f4cfe8615ac159cfac13c10b67e6c0c9093851dd3ac6dda3b82e195d3554e3c37962010a2d0ae5074828d376402624f0dda5499c9997e962e4cfd26444c0

\??\pipe\LOCAL\crashpad_4608_PLDHKQGMTNWVXCTW

MD5 d41d8cd98f00b204e9800998ecf8427e
SHA1 da39a3ee5e6b4b0d3255bfef95601890afd80709
SHA256 e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855
SHA512 cf83e1357eefb8bdf1542850d66d8007d620e4050b5715dc83f4a921d36ce9ce47d0d13c5d85f2b0ff8318d2877eec2f63b931bd47417a81a538327af927da3e

C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\58eee4ba-1938-4aa0-8428-ed718ef560a3.tmp

MD5 03952724a05ae87fc24dcedeeb65925d
SHA1 b50ff5d7d34092deb3a7535c235c9abd3646bab5
SHA256 4675b6aeae4de719f5a3959f4a09f571e6d9fdfad8e37749f7b19ab12b0aa2ef
SHA512 a50cfba362e93d31d4624b1a9938873f16d25b3d32b6f5037cedf00835d4596dc2978f99b16ee77b8efb38ad63cfc69047f3a55de0d9f6a9887654c19bd26c74

C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Local State

MD5 04bf91e43ee6330af10511f782c0cd97
SHA1 ec4c38a2bd7992803e3b451ccfcd3a133513ff62
SHA256 bc79bc5bcd5ee39f7a74c516ae1542f1200789a546b58ec5435e4a0c95acf7de
SHA512 2df943bc35a07d58b75ffd5c4deb5018b0bf1ebd9a48e6c3b66fbc1e6788883f6cce3e444f07ba5b621665118685f6a2a0556991a9320361c2942223bf34fc85

C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Preferences

MD5 c070d64b3b349c01ddb0d523dc9269c5
SHA1 4cd04d247d83e02e7cec722c7c0d25ba6e724de8
SHA256 13368df9e1a68fc2094b5a81322ee41336a9e768c167eb94bf81bbd53e3b4dda
SHA512 39754bd2a4c36cfb483930f676a5a290c09c9d90f1f5037a2a1ff7ae579f93637474fcc951340b6a3780cc1b451f96b1591b6aaebac69064b1e3dc0621451673

C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\data_reduction_proxy_leveldb\CURRENT

MD5 6752a1d65b201c13b62ea44016eb221f
SHA1 58ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA256 0861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA512 9cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389

C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index

MD5 a7cc7730265795318409aa6966e8724f
SHA1 ca85d6bc8d94fb5e276ed2dee240468c7cdc75b8
SHA256 a2cea6a7ac5c1dffe0731ed5fd0def256449b89dab9ef14a334c88d4bffad82e
SHA512 7a17ee0f3b8c5b61a458d530db58de724f4e24a5a9b4a9cc42cbaf0e1f7f44ba92af96cd4b9691946b65a51e6302660d63a167434746a91ad84d969ba56002be

C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\TransportSecurity

MD5 085863ca22935df5b0ca7f8bf91083d8
SHA1 ee90314cac40d409748d952b75ac98cfd1daf411
SHA256 609929f0f339cba021836535c99994353cb805c507986573e2ebc0961b7aa009
SHA512 3e37b41d13303e6e71584a370893ebb2c48bf51befcd733640985083bb500184e6427a2469e4d4d04d6d1092d4c98a39b60bceed7221dc09cab277d088a8220e

C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\TransportSecurity~RFe57b9bb.TMP

MD5 04db796ee0c45d9c706e504958790a5e
SHA1 c32794942a5da3f33de0d7962ce2f6e3eebd4751
SHA256 fb7ef9eddcecd7aeb0480f49b2a01c13a21e1f6addd07f24cea0c1daccf1cf0d
SHA512 ffc77b1b029aef8162c4be4218fb89a02b41303854b2649bc6f41bb5e17ad6edbc6e651c85c65d4f77600af6b430106ea06dd7a671d190381cb2a84207d9b8ea

C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Network Persistent State

MD5 0286635261812ff3f72f14124a385ab0
SHA1 9151904ea15618227f7a6d91e18b2c0a76cd2cf3
SHA256 97f5ed71e36634bc967bc37fb0fb10dc3223979331589290e6c5e5daee1f21bd
SHA512 8fa1e57a1e9690b6396f5266c9cc3c3f38a3141bf2cd8251e86cae8e1dc9cd18bb1d06b94194ef3f7957a3734e4d7fc35db6f8a2380be7b651ae3bc29fcf0895