Malware Analysis Report

2024-10-23 17:23

Sample ID 240826-w2tznaydja
Target c3937a8a35dfcbd6bc84cbb2d3198fbb_JaffaCakes118
SHA256 9d574dc6fa08d167a0c6b76872072b616bd265afb82c111f939854beeeb81292
Tags
socgholish discovery downloader
score
10/10

Table of Contents

Analysis Overview

MITRE ATT&CK

Enterprise Matrix V15

Analysis: static1

Detonation Overview

Signatures

Analysis: behavioral1

Detonation Overview

Command Line

Signatures

Processes

Network

Files

Analysis: behavioral2

Detonation Overview

Command Line

Signatures

Processes

Network

Files

Analysis Overview

score
10/10

SHA256

9d574dc6fa08d167a0c6b76872072b616bd265afb82c111f939854beeeb81292

Threat Level: Known bad

The file c3937a8a35dfcbd6bc84cbb2d3198fbb_JaffaCakes118 was found to be: Known bad.

Malicious Activity Summary

socgholish discovery downloader

SocGholish

Legitimate hosting services abused for malware hosting/C2

Browser Information Discovery

System Location Discovery: System Language Discovery

Modifies Internet Explorer settings

Suspicious use of FindShellTrayWindow

Suspicious use of WriteProcessMemory

Enumerates system info in registry

Suspicious behavior: EnumeratesProcesses

Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary

Suspicious use of SetWindowsHookEx

Suspicious use of SendNotifyMessage

MITRE ATT&CK

Analysis: static1

Detonation Overview

Reported

2024-08-26 18:25

Signatures

N/A

Analysis: behavioral1

Detonation Overview

Submitted

2024-08-26 18:25

Reported

2024-08-26 18:28

Platform

win7-20240704-en

Max time kernel

138s

Max time network

155s

Command Line

"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\c3937a8a35dfcbd6bc84cbb2d3198fbb_JaffaCakes118.html

Signatures

SocGholish

downloader socgholish

Legitimate hosting services abused for malware hosting/C2

Description Indicator Process Target
N/A sites.google.com N/A N/A
N/A sites.google.com N/A N/A
N/A sites.google.com N/A N/A

System Location Discovery: System Language Discovery

discovery
Description Indicator Process Target
Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE N/A

Modifies Internet Explorer settings

adware spyware
Description Indicator Process Target
Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\GPU C:\Program Files\Internet Explorer\iexplore.exe N/A
Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\InternetRegistry C:\Program Files\Internet Explorer\iexplore.exe N/A
Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage C:\Program Files\Internet Explorer\iexplore.exe N/A
Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser C:\Program Files\Internet Explorer\iexplore.exe N/A
Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Zoom C:\Program Files\Internet Explorer\iexplore.exe N/A
Set value (int) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" C:\Program Files\Internet Explorer\iexplore.exe N/A
Set value (data) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = f07dc288e5f7da01 C:\Program Files\Internet Explorer\iexplore.exe N/A
Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\PageSetup C:\Program Files\Internet Explorer\iexplore.exe N/A
Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE N/A
Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing C:\Program Files\Internet Explorer\iexplore.exe N/A
Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage C:\Program Files\Internet Explorer\iexplore.exe N/A
Set value (data) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000bb7c5835718279428690b074aa627b7000000000020000000000106600000001000020000000e5a520f3bca53cf133963cda9c7aa441c12fc52d617a932fd668047d9f1fd2ff000000000e8000000002000020000000e084f32d759dfd87aa3153d58a9b40fde75bee630fc0a7f9d886a10ea127a51e20000000880ce508cc502426f666fe7a8a420fcd4f174b4f41bc5f0bc86863b851ad798140000000a479d37dc7c03372576d1936fa404d764c821350a3551a8551a297cbb1cb9ffeb2a0455cfe8812481c3a2768a43188e8bf61636a1d9f4c12e97a69717d1d404b C:\Program Files\Internet Explorer\iexplore.exe N/A
Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Toolbar C:\Program Files\Internet Explorer\iexplore.exe N/A
Set value (int) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" C:\Program Files\Internet Explorer\iexplore.exe N/A
Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive C:\Program Files\Internet Explorer\iexplore.exe N/A
Set value (int) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{97DE51B1-63D8-11EF-B062-D6EBA8958965} = "0" C:\Program Files\Internet Explorer\iexplore.exe N/A
Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch C:\Program Files\Internet Explorer\iexplore.exe N/A
Set value (str) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" C:\Program Files\Internet Explorer\iexplore.exe N/A
Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Main C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE N/A
Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery C:\Program Files\Internet Explorer\iexplore.exe N/A
Set value (int) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" C:\Program Files\Internet Explorer\iexplore.exe N/A
Set value (int) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" C:\Program Files\Internet Explorer\iexplore.exe N/A
Set value (data) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000bb7c5835718279428690b074aa627b7000000000020000000000106600000001000020000000c6389fd504bce75dd7990397efa1d38ed826981f18da835859f7a3b6c4deda47000000000e80000000020000200000005c83f812e60b60d8c0f594779520c6d14e8dd68f1c75c1955d9165c55b0f2085900000009e2cda107bd1b8e2fd52935f020587a0e97bdfb119e8fc6224d5bae25de57832314b9302a6b3a4991af79aebd424e19cd2094502eec1e5f35d64ca7728013cce569d2782f4b54074c7619fe23ce551dd1f7bb83b30d75bda46280c49cbd7705094d22bbde430b36a326f4280764b36d02b501de801c2ea18c8ac4f98fdfc25e8f6b37e6b35ea77062e91318b2cdc95ed400000009078f2c4bb5d7f3b8afc13527f8199f9b35a2e723c6d02464f8f913224843d0d773a37643d61c75251c1ef3850f5ffd8448d2e8df5df3eef1ddb08900f735588 C:\Program Files\Internet Explorer\iexplore.exe N/A
Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Main C:\Program Files\Internet Explorer\iexplore.exe N/A
Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\IntelliForms C:\Program Files\Internet Explorer\iexplore.exe N/A
Set value (int) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "430858608" C:\Program Files\Internet Explorer\iexplore.exe N/A
Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\SearchScopes C:\Program Files\Internet Explorer\iexplore.exe N/A
Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\LowRegistry C:\Program Files\Internet Explorer\iexplore.exe N/A
Set value (data) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 C:\Program Files\Internet Explorer\iexplore.exe N/A
Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic C:\Program Files\Internet Explorer\iexplore.exe N/A
Set value (int) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" C:\Program Files\Internet Explorer\iexplore.exe N/A
Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\IETld\LowMic C:\Program Files\Internet Explorer\iexplore.exe N/A
Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain C:\Program Files\Internet Explorer\iexplore.exe N/A
Set value (str) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" C:\Program Files\Internet Explorer\iexplore.exe N/A
Set value (str) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE N/A
Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\DomainSuggestion C:\Program Files\Internet Explorer\iexplore.exe N/A

Suspicious use of FindShellTrayWindow

Description Indicator Process Target
N/A N/A C:\Program Files\Internet Explorer\iexplore.exe N/A

Processes

C:\Program Files\Internet Explorer\iexplore.exe

"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\c3937a8a35dfcbd6bc84cbb2d3198fbb_JaffaCakes118.html

C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE

"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2960 CREDAT:275457 /prefetch:2

Network

Country Destination Domain Proto
US 8.8.8.8:53 resources.blogblog.com udp
US 8.8.8.8:53 www.blogger.com udp
US 8.8.8.8:53 googledrive.com udp
US 8.8.8.8:53 ajax.googleapis.com udp
US 8.8.8.8:53 1.bp.blogspot.com udp
US 8.8.8.8:53 4.bp.blogspot.com udp
US 8.8.8.8:53 www.linkwithin.com udp
US 8.8.8.8:53 www.thetouchofsound.com udp
US 8.8.8.8:53 www.imotiv.ly udp
US 8.8.8.8:53 dubdsb3u36ja6.cloudfront.net udp
US 8.8.8.8:53 sites.google.com udp
US 8.8.8.8:53 www.jomniaga.com udp
US 8.8.8.8:53 www.apesal.com udp
US 8.8.8.8:53 pingje.com udp
US 8.8.8.8:53 joiriah.jomniaga.com udp
FR 172.217.20.202:443 ajax.googleapis.com tcp
FR 142.250.201.161:80 googledrive.com tcp
FR 142.250.179.97:80 4.bp.blogspot.com tcp
FR 142.250.179.105:443 www.blogger.com tcp
FR 142.250.201.161:80 googledrive.com tcp
FR 142.250.179.97:80 4.bp.blogspot.com tcp
FR 142.250.201.161:443 googledrive.com tcp
FR 142.250.179.105:443 www.blogger.com tcp
FR 172.217.20.202:443 ajax.googleapis.com tcp
FR 142.250.179.97:80 4.bp.blogspot.com tcp
FR 172.217.20.202:80 ajax.googleapis.com tcp
FR 142.250.179.97:80 4.bp.blogspot.com tcp
FR 172.217.20.202:80 ajax.googleapis.com tcp
FR 142.250.179.105:443 www.blogger.com tcp
FR 142.250.179.105:443 www.blogger.com tcp
FR 142.250.179.78:443 sites.google.com tcp
FR 142.250.179.78:443 sites.google.com tcp
US 172.67.131.238:80 www.apesal.com tcp
FR 142.250.75.234:80 fonts.googleapis.com tcp
US 172.67.131.238:80 www.apesal.com tcp
FR 142.250.75.234:80 fonts.googleapis.com tcp
FR 142.250.75.234:80 fonts.googleapis.com tcp
US 8.8.8.8:53 ping.busuk.org udp
FR 142.250.179.97:80 4.bp.blogspot.com tcp
US 8.8.8.8:53 salma.jomniaga.com udp
FR 142.250.179.97:80 4.bp.blogspot.com tcp
US 8.8.8.8:53 busuk.org udp
US 8.8.8.8:53 www.clocklink.com udp
US 8.8.8.8:53 2.bp.blogspot.com udp
US 8.8.8.8:53 www.auto-ping.com udp
US 8.8.8.8:53 kartikel.com udp
US 8.8.8.8:53 pr.prchecker.info udp
US 8.8.8.8:53 www.carimember.com udp
US 8.8.8.8:53 i155.photobucket.com udp
US 8.8.8.8:53 i68.photobucket.com udp
FR 142.250.179.97:80 2.bp.blogspot.com tcp
US 8.8.8.8:53 www.activesearchresults.com udp
US 8.8.8.8:53 blogmalaysia.com udp
FR 142.250.179.97:80 2.bp.blogspot.com tcp
US 8.8.8.8:53 3.bp.blogspot.com udp
US 8.8.8.8:53 apis.google.com udp
FR 142.250.179.97:80 3.bp.blogspot.com tcp
FR 142.250.179.105:443 www.blogger.com tcp
FR 142.250.179.97:80 3.bp.blogspot.com tcp
US 173.49.115.115:80 www.activesearchresults.com tcp
US 173.49.115.115:80 www.activesearchresults.com tcp
FR 142.250.178.142:443 apis.google.com tcp
FR 142.250.178.142:443 apis.google.com tcp
FR 142.250.179.97:80 3.bp.blogspot.com tcp
FR 142.250.179.97:80 3.bp.blogspot.com tcp
FR 142.250.179.97:80 3.bp.blogspot.com tcp
FR 142.250.179.97:80 3.bp.blogspot.com tcp
FR 142.250.179.97:80 3.bp.blogspot.com tcp
FR 142.250.179.97:80 3.bp.blogspot.com tcp
US 67.227.215.171:80 pr.prchecker.info tcp
FR 142.250.179.97:80 3.bp.blogspot.com tcp
FR 142.250.179.97:80 3.bp.blogspot.com tcp
US 67.227.215.171:80 pr.prchecker.info tcp
GB 216.137.44.112:80 i68.photobucket.com tcp
GB 216.137.44.112:80 i68.photobucket.com tcp
FR 142.250.179.97:80 3.bp.blogspot.com tcp
FR 142.250.179.97:80 3.bp.blogspot.com tcp
GB 216.137.44.119:80 i68.photobucket.com tcp
US 104.21.26.218:80 busuk.org tcp
GB 216.137.44.119:80 i68.photobucket.com tcp
US 104.21.26.218:80 busuk.org tcp
US 104.21.5.166:80 blogmalaysia.com tcp
US 104.21.5.166:80 blogmalaysia.com tcp
US 35.168.175.109:80 pingje.com tcp
US 35.168.175.109:80 pingje.com tcp
US 173.236.138.253:80 www.thetouchofsound.com tcp
US 173.236.138.253:80 www.thetouchofsound.com tcp
US 172.98.192.37:80 kartikel.com tcp
US 172.98.192.37:80 kartikel.com tcp
US 104.21.26.218:443 busuk.org tcp
US 154.197.239.185:80 www.carimember.com tcp
US 154.197.239.185:80 www.carimember.com tcp
US 8.8.8.8:53 c.pki.goog udp
FR 142.250.179.97:80 3.bp.blogspot.com tcp
FR 216.58.214.163:80 c.pki.goog tcp
FR 142.250.179.97:80 3.bp.blogspot.com tcp
FR 216.58.214.163:80 c.pki.goog tcp
SG 118.139.179.30:80 www.linkwithin.com tcp
SG 118.139.179.30:80 www.linkwithin.com tcp
FR 216.58.214.163:80 c.pki.goog tcp
FR 216.58.214.163:80 c.pki.goog tcp
FR 216.58.214.163:80 c.pki.goog tcp
DE 94.130.218.80:80 www.auto-ping.com tcp
FR 216.58.214.163:80 c.pki.goog tcp
DE 94.130.218.80:80 www.auto-ping.com tcp
FR 216.58.214.163:80 c.pki.goog tcp
FR 216.58.214.163:80 c.pki.goog tcp
US 216.230.241.100:80 www.clocklink.com tcp
US 216.230.241.100:80 www.clocklink.com tcp
US 8.8.8.8:53 c.pki.goog udp
US 8.8.8.8:53 c.pki.goog udp
US 8.8.8.8:53 c.pki.goog udp
GB 216.137.44.119:443 i68.photobucket.com tcp
US 8.8.8.8:53 c.pki.goog udp
US 8.8.8.8:53 c.pki.goog udp
FR 216.58.214.163:80 c.pki.goog tcp
FR 216.58.214.163:80 c.pki.goog tcp
FR 216.58.214.163:80 c.pki.goog tcp
FR 216.58.214.163:80 c.pki.goog tcp
FR 216.58.214.163:80 c.pki.goog tcp
FR 216.58.214.163:80 c.pki.goog tcp
US 8.8.8.8:53 o.pki.goog udp
US 8.8.8.8:53 o.pki.goog udp
FR 216.58.214.163:80 o.pki.goog tcp
FR 216.58.214.163:80 o.pki.goog tcp
FR 216.58.214.163:80 o.pki.goog tcp
FR 216.58.214.163:80 o.pki.goog tcp
FR 216.58.214.163:80 o.pki.goog tcp
FR 216.58.214.163:80 o.pki.goog tcp
FR 216.58.214.163:80 o.pki.goog tcp
FR 216.58.214.163:80 o.pki.goog tcp
GB 216.137.44.112:443 i68.photobucket.com tcp
US 104.21.5.166:443 blogmalaysia.com tcp
US 67.227.215.171:443 pr.prchecker.info tcp
US 8.8.8.8:53 www.domainmarket.com udp
US 172.66.40.121:443 www.domainmarket.com tcp
US 172.66.40.121:443 www.domainmarket.com tcp
US 173.49.115.115:443 www.activesearchresults.com tcp
US 8.8.8.8:53 accounts.google.com udp
US 173.236.138.253:443 www.thetouchofsound.com tcp
US 8.8.8.8:53 www.jomniaga.com udp
US 8.8.8.8:53 joiriah.jomniaga.com udp
US 8.8.8.8:53 salma.jomniaga.com udp
IE 74.125.193.84:443 accounts.google.com tcp
IE 74.125.193.84:443 accounts.google.com tcp
FR 216.58.214.163:80 o.pki.goog tcp
FR 142.250.201.161:80 googledrive.com tcp
FR 142.250.201.161:80 googledrive.com tcp
FR 142.250.201.161:80 googledrive.com tcp
FR 142.250.201.161:80 googledrive.com tcp
FR 142.250.201.161:80 googledrive.com tcp
US 8.8.8.8:53 r11.o.lencr.org udp
GB 173.222.211.43:80 r11.o.lencr.org tcp
US 8.8.8.8:53 tr.nuffnangx.com udp
US 8.8.8.8:53 www.jomniaga.com udp
US 8.8.8.8:53 www.facebook.com udp
GB 157.240.221.35:80 www.facebook.com tcp
GB 157.240.221.35:80 www.facebook.com tcp
US 8.8.8.8:53 synad2.nuffnang.com.my udp
US 8.8.8.8:53 www.google.com udp
GB 157.240.221.35:443 www.facebook.com tcp
FR 142.250.179.68:443 www.google.com tcp
FR 142.250.179.68:443 www.google.com tcp
US 8.8.8.8:53 static.xx.fbcdn.net udp
DK 157.240.200.14:443 static.xx.fbcdn.net tcp
DK 157.240.200.14:443 static.xx.fbcdn.net tcp
DK 157.240.200.14:443 static.xx.fbcdn.net tcp
DK 157.240.200.14:443 static.xx.fbcdn.net tcp
DK 157.240.200.14:443 static.xx.fbcdn.net tcp
DK 157.240.200.14:443 static.xx.fbcdn.net tcp
US 8.8.8.8:53 scontent.xx.fbcdn.net udp
DK 157.240.200.14:443 scontent.xx.fbcdn.net tcp
DK 157.240.200.14:443 scontent.xx.fbcdn.net tcp
US 8.8.8.8:53 www.jomniaga.com udp
US 216.230.241.100:80 www.clocklink.com tcp
US 172.66.40.121:443 www.domainmarket.com tcp
US 8.8.8.8:53 crl.microsoft.com udp
GB 2.18.190.71:80 crl.microsoft.com tcp
US 8.8.8.8:53 widgets.amung.us udp
US 104.22.75.171:80 widgets.amung.us tcp
US 104.22.75.171:80 widgets.amung.us tcp
FR 142.250.179.97:443 3.bp.blogspot.com tcp
US 8.8.8.8:53 lh3.googleusercontent.com udp
US 8.8.8.8:53 lh6.googleusercontent.com udp
FR 142.250.179.97:443 3.bp.blogspot.com tcp
FR 142.250.179.97:443 3.bp.blogspot.com tcp
FR 142.250.178.129:443 lh6.googleusercontent.com tcp
FR 142.250.178.129:443 lh6.googleusercontent.com tcp
FR 142.250.178.129:443 lh6.googleusercontent.com tcp
FR 142.250.178.129:443 lh6.googleusercontent.com tcp
FR 142.250.178.129:443 lh6.googleusercontent.com tcp
FR 142.250.178.129:443 lh6.googleusercontent.com tcp
FR 142.250.178.129:443 lh6.googleusercontent.com tcp
FR 142.250.178.129:443 lh6.googleusercontent.com tcp
FR 142.250.178.129:443 lh6.googleusercontent.com tcp
FR 142.250.178.129:443 lh6.googleusercontent.com tcp
US 8.8.8.8:53 lh4.googleusercontent.com udp
FR 142.250.178.129:443 lh4.googleusercontent.com tcp
FR 142.250.178.129:443 lh4.googleusercontent.com tcp
FR 142.250.178.129:443 lh4.googleusercontent.com tcp
US 8.8.8.8:53 lh5.googleusercontent.com udp
FR 142.250.178.129:443 lh5.googleusercontent.com tcp
FR 142.250.178.129:443 lh5.googleusercontent.com tcp
FR 142.250.178.129:443 lh5.googleusercontent.com tcp
FR 142.250.178.129:443 lh5.googleusercontent.com tcp
FR 142.250.178.129:443 lh5.googleusercontent.com tcp
FR 142.250.178.129:443 lh5.googleusercontent.com tcp
FR 142.250.178.129:443 lh5.googleusercontent.com tcp
FR 142.250.178.129:443 lh5.googleusercontent.com tcp
FR 142.250.178.129:443 lh5.googleusercontent.com tcp
FR 142.250.178.129:443 lh5.googleusercontent.com tcp
FR 142.250.178.129:443 lh5.googleusercontent.com tcp
FR 142.250.178.129:443 lh5.googleusercontent.com tcp
FR 142.250.178.129:443 lh5.googleusercontent.com tcp
FR 142.250.178.129:443 lh5.googleusercontent.com tcp
FR 142.250.178.129:443 lh5.googleusercontent.com tcp
US 8.8.8.8:53 www.microsoft.com udp
US 8.8.8.8:53 www.microsoft.com udp
US 204.79.197.200:443 ieonline.microsoft.com tcp
US 204.79.197.200:443 ieonline.microsoft.com tcp
US 204.79.197.200:443 ieonline.microsoft.com tcp

Files

C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\24BD96D5497F70B3F510A6B53CD43F3E_3A89246FB90C5EE6620004F1AE0EB0EA

MD5 eecdf0a7dcf35d061d4f6ef3a799307f
SHA1 9204d28a1720eb5f94c303ed96a0b9330cceb647
SHA256 37e52308a382dfa7a2233b3a708175fe7945ed6c90605ec50c7171971c06f923
SHA512 370a6a75c2328eb5c37ba8817c145b571108644edb28ea84e8fc6a759006161cffad3db4f21d6d00b492894d1ea7f07653aeaa325f6f7eb74ea48e96aee8ca65

C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\05DDC6AA91765AACACDB0A5F96DF8199

MD5 e935bc5762068caf3e24a2683b1b8a88
SHA1 82b70eb774c0756837fe8d7acbfeec05ecbf5463
SHA256 a8accfcfeb51bd73df23b91f4d89ff1a9eb7438ef5b12e8afda1a6ff1769e89d
SHA512 bed4f6f5357b37662623f1f8afed1a3ebf3810630b2206a0292052a2e754af9dcfe34ee15c289e3d797a8f33330e47c14cbefbc702f74028557ace29bf855f9e

C:\Users\Admin\AppData\Local\Temp\CabFAF4.tmp

MD5 49aebf8cbd62d92ac215b2923fb1b9f5
SHA1 1723be06719828dda65ad804298d0431f6aff976
SHA256 b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512 bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b

C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

MD5 a59ed45a6c7308b88b537ec858a34f43
SHA1 14f90a48b188102e36c66ce60091dfdf1c853327
SHA256 40b6ccfd54c0e7f3a992b5c340236f1116f6cd47be0412a03bcfaa3e95137396
SHA512 22561faef083fc8a7bb4d6d0f1e7d02978bbe9f6ca587027e3fd69a4bb3a6ba211355363f6a7b7a2fa1d31ce438626ea3fb026cd0ba23ff64f880ffa7b64dc1d

C:\Users\Admin\AppData\Local\Temp\TarFC1F.tmp

MD5 4ea6026cf93ec6338144661bf1202cd1
SHA1 a1dec9044f750ad887935a01430bf49322fbdcb7
SHA256 8efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA512 6c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b

C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

MD5 56e7ef82ccd3ad74afaf4616bbbb7c09
SHA1 ae80a1489f2ed10323a9586b3eb261b432dd66f7
SHA256 7563276f3cbe16839349b6643009706a92f4c51714127277a8989215f9e94ba9
SHA512 9dcbd26e1c6625be25868b6f486eb202f91943b9b52dea991242899b6af1861d80e30e8c4c12dc23a852c1100fc2203ef284e4d1f6d78b06311e0fff59fa6213

C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

MD5 7674aade6b92072b478ce0edeb21a050
SHA1 2aab2ea43d6d66761227c2dbb101b2b3bd40bbc0
SHA256 4a7cf3d9e84e251a8a2fdf8dc61e3e3ced7f85b0a9093641a0ec719771cdac34
SHA512 b1f6ec28a7b64cbc79d8b134d8d6086b53d6b9883ec447675ad0ddc6dd3c101c8cc5f54932538a6d54f13e9f36e4645d754ebca5869cfbb9876396c54393b31c

C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

MD5 d5f927cad3a9b224533116953e98fc81
SHA1 391de551b40e84700e1bb766e73364e1c164a03b
SHA256 5287a2eda83671bdb74a645a042c0bad1a2d7a9a440e6d0e0888c895665f6e0e
SHA512 8ac0d8566fd0a5158a412729678c07d712c671ecd23069811ef67010ce1e6486198b3d302fd70b235985d4f9a5cec9185478feebc743d6d6092d72776afe432e

C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\070E0202839D9D67350CD2613E78E416

MD5 4021cae424f092bf1753b62fdabec7a7
SHA1 d0ccaa0140518ef9bacaf4fddd33f8cc1f929ed7
SHA256 3c4ce888807a1c6587a071bd509491e87002e1f21977140b800e738de7e85673
SHA512 9ebad3fa1cea6378e07279faa7db2c26dd457519235df91263cd43bb5ac01d7dd0ae5c7f86ab816c494852bb05d7bf3ed55bb3bc40e62c407224639a0820d194

C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\070E0202839D9D67350CD2613E78E416

MD5 55540a230bdab55187a841cfe1aa1545
SHA1 363e4734f757bdeb89868efe94907774a327695e
SHA256 d73494e3446b02167573b3cde3ae1c8584ac26e15e45ac3ec0326708425d90fb
SHA512 c899cb1d31d3214fd9dc8626a55e40580d3b2224bf34310c2abd85d0f63e2dedaeae57832f048c2f500cb2cbf83683fcb14139af3f0b5251606076cdb4689c54

C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

MD5 3d011ec2b23f1357262d63bc15b97038
SHA1 e96fd43388493a53c0af059c384afb6771ba629d
SHA256 22369349b4f143a412bb416c330891a1a3cf5416fa353e855729ca01b14f625b
SHA512 07a6dbe9f4da0268784013c279be9706509022fa71972a8876e8a7454e77a3987215555052a30b492da5565ca5e208e36a5a31a4041d89f07a8803cc73e81f6c

C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

MD5 e9220a4b246b1cd38ec3cc2302916c44
SHA1 d6309d7b86ef96b9020ce625b194e15d8f56a9d4
SHA256 7027c2f35b92c66d42b71ac9ba4e1e0f4bc8a403f6290c702ff119bf388ce8de
SHA512 49b0db74978982462a9879910095c4fba8df4fb71ab789baae35f199fa3ef70335aec342bc8406d954cc08ab9d6997504a91b85b5ca3b1fb320d8a4e0b22b025

C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

MD5 58ebe77dbab96d999bee045ac0d2b761
SHA1 29c6c7c253602d27b46c21c2ac612c998aabfb4f
SHA256 26875a97ac4ec782528ca5ebc90776ece863e3750bc83480d9c2fd1c7ec2eec3
SHA512 d52fd5045561acccab1e41882346ceea167da36262e620de16d86c5c576dc0940ed7178f21557c22ea50b586c9f10397c8fd11459d8fd20d9371ef79534f9b96

C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

MD5 301656e3bf741fd646ea3d531e720abd
SHA1 994431f3a9627ea35e1b4862e95f016464a35083
SHA256 883b1832997f5ff742765853f38158b6d54f53c17182314b307acf50c3d3440f
SHA512 52b215cade0040b8979dd47c9b3d4ec85328bcedff2186d29ef923072531b2385c94e45091b4f0951eb4edf5739f74cacd58da79aaa20f9f626601aa929e5778

C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\XWMUP5AI\banner[2].htm

MD5 13d4e6ef14c144a5732c8a16f07d3ce5
SHA1 2ff71998fe3f628f0e23ee13accaa7d4da661d05
SHA256 d82245c9619e575516401968aebeb93342e781e1a36fdd034a5359ef74e0de25
SHA512 dd4c4a8e9b52c5a01535a02ec174b18e19dc35ef90012ae8a87307480e3c1f192c533b2615e7ce2b86e1cf2bc82907ec18789252961952410948923b70b8fc8f

C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

MD5 d09bd89d1e9169387da7749b9be12196
SHA1 bf533a14b9a2d12db86abf77a9b0f50f05f48c96
SHA256 060f925fdf0f16b7fb64e9b54012124ecdc274662ba76f589c37a1efddbcfe16
SHA512 26f7a99493dbd5574e87867f91a5ea2a7ec91ca5224374589edb8e604230797883a1a4ac1a916eb45a8e907c1da969e213f6f0089b33ff8abbfc04e73dcfdad6

C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

MD5 4a0e5e05e6bd7a7bbe8d54c0b2ec1ac2
SHA1 62ebeea82ea367692016657f2b3ed0bc9036bd20
SHA256 6dea52c70496fda26ea14a3967e9619700bbae2d5a832c596985994440ded011
SHA512 0a647caa9b2b53431dd56485aee8d03138b9a466e701813653f85202162f28f9d12b1d85c77f470fa357f5b454fcbd13156988fd09160334b118e42b8ffe90c4

C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

MD5 61cbb188ef62a4b4ea8ccc719aba11e0
SHA1 5c1ac6533471b2838ac1e4ddd26d4ea2a70e94eb
SHA256 141de83feb6a2aa12e48512ecce15df651817b16d15385da2187ec9b07fd4d64
SHA512 19a3e95889a5e63bfc2caeea4ab38f648b37ec02818383b821f5d03550485c142d598e5c4e2456649ef164652494101cf7f04e7755e1990877ca1d7affc9820c

C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\Z7V06J7Q\platform[1].js

MD5 45e854a35529759d934c731304a43d38
SHA1 a8df66d8d97fdaf183b3b8b806233b4ac0659eb2
SHA256 a545c66e7db300836d0f8e0c5c407c6b44baa277e32d744e08d331c7c3d6ffb9
SHA512 5efdd24697fc8247f9a1f8ac3e80df23efdfee54a25f8b63565276338177b36b90fb3a5f80c8654f91922e3f668798d37b4379bb41bb4059965f915287729e48

C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\XWMUP5AI\cb=gapi[1].js

MD5 cb98a2420cd89f7b7b25807f75543061
SHA1 b9bc2a7430debbe52bce03aa3c7916bedfd12e44
SHA256 bea369fc5bdd5b9b473441583c46b9939232bf1f98c1cedf6bc2241c4f5068d4
SHA512 49ccede4596d1e5640a9c8e8be333f9c18812d58f02b2b15adb54172df1387439e9dc5afc4ccd9d8f0f75f092318bed68d3cd577338e88ef4f9373de8a07c44e

C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

MD5 2d862ae05b2bd19c50469a916994368f
SHA1 ff391984f082c1ea1fe3e4f1a4f76bc66bdb4761
SHA256 b2b5eda9bd8df8c2401eda3cf2df0f7ecef82a78d982143eb0524e8052376e25
SHA512 ee82103c38cfa94dc6bea671c4990bf80b9cf7cc2dede34d583b3456b21a6ab9a74a87f0009d2faff9cb63a573d11c05f225aaac44cb6f6ec337bded6d2e66c3

C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\F0ACCF77CDCBFF39F6191887F6D2D357

MD5 593e0b255a4699cc013a927005af76e0
SHA1 f6dc263bbe4752c0877f9bb5833b267c4e6ea8f0
SHA256 9ee802ef65bdffd42aa72be1db4036ae4f57478512ca3aeb4343bee14fbbeca8
SHA512 b875db97a037189ac5f23ec0e2f19e8d31b4d1235daa6e20825e61973e9f50356851b85b4646cbe70ef61d3123118a111171042ddc648cf14d03cdaef78799fe

C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\F0ACCF77CDCBFF39F6191887F6D2D357

MD5 a266bb7dcc38a562631361bbf61dd11b
SHA1 3b1efd3a66ea28b16697394703a72ca340a05bd5
SHA256 df545bf919a2439c36983b54cdfc903dfa4f37d3996d8d84b4c31eec6f3c163e
SHA512 0da8ef4f8f6ed3d16d2bc8eb816b9e6e1345dfe2d91160196c47e6149a1d6aedaafadcefd66acdea7f72dcf0832770192ceac15b0c559c4ccc2c0e5581d5aefc

C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

MD5 df2c31bda3f025137511e139999cbd64
SHA1 0ca0d3e9a5dd62621cad7a7a1c06aa76c80fe2d7
SHA256 884cdc38fda88f538b34d65f83550336272b540305df2f2c63594af2d9fd9062
SHA512 dc90c0f8ffb7e3fcf1e92efa1fc98abebc7bb103f8d9befa2c4ecb6b2e799290a95be923d0c66f7f01c273ea7a3738d1add3f5d0f8c915d0d106f0f36e2a019a

C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\3C428B1A3E5F57D887EC4B864FAC5DCC

MD5 e4a68ac854ac5242460afd72481b2a44
SHA1 df3c24f9bfd666761b268073fe06d1cc8d4f82a4
SHA256 cb3ccbb76031e5e0138f8dd39a23f9de47ffc35e43c1144cea27d46a5ab1cb5f
SHA512 5622207e1ba285f172756f6019af92ac808ed63286e24dfecc1e79873fb5d140f1ceb7133f2476e89a5f75f711f9813a9fbb8fd5287f64adfdcc53b864f9bdc5

C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

MD5 b3eb764615f52496555f1f2c1b29c002
SHA1 f011db6ba74d97f9ad0b2bd27feedd123d513308
SHA256 c4017f798d9b23dad18f6d5957c6fb348a8a66e473d4942f3b81fe285342f6ab
SHA512 9c9667fb8fb1f9a93b22a3fa501e13cf7123246aabef1608f0e8fdfc49f1532de9c9a0792740204fa870f87cc8ca1b141b987f79edf00a85ebe872605d4c9070

C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

MD5 56a7048aaeba24584022e041025e8789
SHA1 4c9499417dd8869154b546cd6db7b7f06a6aded6
SHA256 d849ade73a6ee6644eb06945b2c11c575db9c5fcfa90b57ea84bf53ac62dc716
SHA512 528908d21728da23268cb61a753def8db42abc4b85126fbbee1dd4ece049e8b47d8098840e6aa212831ab03241490623bfe60c44bcdee795bac099c4fbfed5ef

C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\3C428B1A3E5F57D887EC4B864FAC5DCC

MD5 d4f5d4d8043e4ccc715ffeecbfb0b1e4
SHA1 60f33f3ede8295fb497563cc43663d0e9299c419
SHA256 d9d4477ec41353be6d2667de894204b8dbe04d0ed5db5bd239517331538c1719
SHA512 2197ca4d5e1d2d7d263cabb91a64ff7b7708a2ce55631ef2cf25cf4d074c39fc7486ed162f5e1c8c75eaefadb7b7ff508803da533205eb745edb666a8cee3942

C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

MD5 b69ec43a8abcf0e7159958d69039bdff
SHA1 d67a989f65aef138f8f0e664df0ff9bdba5a46ec
SHA256 13205d41938fb60417065bec7ef62dd3fb0307d9e65f9a65c78042c882144045
SHA512 fc4da8b0f1f4df5ef48d3b6d2eb2da26c5b88f73c13576e128b3e8aa6b995e0fdad8a2b8c8e14c79592f748bba18af57476e52c35d807ff5ad6816ecd5aae30a

C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

MD5 b3e82864b21023d577db06589a119ee2
SHA1 7241063b1c0b4d7d44932aecd99232ea71ddaa49
SHA256 0ae72b9c8ee85ff0c8144fed11c1bb7b01dada86b1e41c9c16d23f1e5ff3de51
SHA512 a625c47204f978d7834019c7ba8cf96ed28607a1fa3b6dbb02222e920a36e46eb1a9bf4d6e3413abc24d465166d07d575adb18f360fa51391ea3c9aec9e824cc

C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

MD5 26b69618c5154156ff157b4e27f399fa
SHA1 45b40035458f4e972f37139bb1c6d291a89e53e8
SHA256 5222dbd9450e0581efeded5da837ab03e9576e7847cd39a9507f74b0bdbe1fe7
SHA512 a317d2ccdfffafef964b025f3dc843cc4746c85c43d9c382fb6fddde171724d1dd69cd11169c00a91ac0f3e2d65f7d7fa1d21fa4894b02320197605dc5349a09

C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

MD5 c9052b99411708b2fa86ec9688b8042e
SHA1 e76b6ed0cac85be551f66ecd4dc67e4319b1787f
SHA256 1d6369193c9a57efecd8a69f18b58498a86047bb66edbc3a2e8777c5cab08c8f
SHA512 88290bf5e01cb26a693266c7815386f4526c153217e0044673c6f330f28d3cf2fffab3bf23f6726e2c1163840d188b109070265a23c3a2894d972e0762c59a55

C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

MD5 0a4d3227190b4a3723d64f233b1d6c1e
SHA1 03af24d046a6eabb775fa19c806bf1ed52e3d763
SHA256 a392dfdf09f6631022a21bc3dbe34f6c552265755e2e0558c434f18fce97820f
SHA512 23e45bccb68b292dba07310e49dae843de408f76c4e265d4795be3f93b7cf871455b9af8bdf478853f61a668c49d8cafa5c625b57c1cdc0d4e725ba4fb44e79f

C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

MD5 2ed12de3006499362fdd206979d3b812
SHA1 fac3751d1d5004ea32f8c0626794680d1c999a2d
SHA256 6c0a495f057114332915ff5bcc3c400999259d592e4b3d3febf4b9ddf80164f5
SHA512 a691e5bd8245919c4cadff0166e8a2ec3a1c986ee9b37e4f635efe0edde58320400ec303de00c713f1ff7fe156d6fbe387dbb176fa834477983b37ce6d4ca2cb

C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

MD5 18784b6a2474557d8551903774aa82db
SHA1 d67992e7e3e7682c6d7e1e49414560b2b1ab9f0c
SHA256 61da8a5fb98246c5da7af816b77488f2326940742c17faf060e48027e9d73b5b
SHA512 4c8720ed03c4e8f6b753c1baa780ae647edba0a194a551aae832fe94645f0bde175946a3437dad1d5411b507f355554407d07daf10531869f2c47acff57dd490

C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

MD5 173b013ed9402a1bb662187e8ae1a805
SHA1 4830fa094e9c2e7149a20a19a8444309e3bd2c5c
SHA256 3f2d22a6f4557eb50d6159d721148aff7e786cde0e47b4a7d8a274f22bfc24a8
SHA512 06ae69436c3b8246e7e8d92dd9ec9850d3a751c44101daa994709abe222a31682edd33c8cade8b2a8c39aebd4af061e4f8d3df43965b065e5c79dcc978a29ff3

C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

MD5 ebb77775608d8ec16a994cb1ac5a906d
SHA1 255224d27e8a7d79d8473cc55cc2cd6d80545526
SHA256 c2ed1c9af99d1f7c9127b7a4fa241e585a02620091789bfa9f767e32f9f56f8b
SHA512 f00db5e83384360521f82eaaa163a521317b3aeee654d72bca0e38a79f64089e971d48e8bdac8ec1efcbd48d1924d1d4005850679e69df2f8c0b2feeda817d7c

C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

MD5 77db46f1fcfaf33fce61363d02727cfe
SHA1 480d841eff5eca157f378de4b34518af5d38eaa5
SHA256 6bd3ca780a938af8a38c88cb21f68a181fba0752a3728cb5eb8e0eeb05e549ce
SHA512 b0447534c7522b0599d35be762f6e3fe162f676775f5083eaccd9ebe0f7a78b8e2f744d103b5de7f974c0a48c0a512cbfc5f084c9728c00bd2b149ec0810f38a

C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

MD5 38c509edef030f160d28ec362041c19d
SHA1 112d514bf8c49ac7ea633759d96a0ee8c741e79e
SHA256 de7c4e57bb56769cd9d117be5ad2e1bae39727dd68e6370597fd7d6a42f0f84e
SHA512 bde668dc8b6352dd0c61560f86e7cb9ba51f6e77be00605ae9f47a41db3701d28f3192c671ea866d578e7f549c30673d4596bcf819eac9968f99dce0cc7b6d97

C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

MD5 201fa8c09c21097b34767a3b62265ee7
SHA1 77ab1d21927b98a197c42393bf2d2290d73d8f81
SHA256 acf14083ae3b3135039999e30b511ea1a4b1e82b14b7b1449a6f2c0d73b2a4c7
SHA512 d6ef4c117250102978bcb8329d824067f5897e4c3a980a84ceb4ae90ad79922820de1dba4ba1fe30af3c26efe3ce4121de34014dbc0b8723bf954fde4d8a91eb

Analysis: behavioral2

Detonation Overview

Submitted

2024-08-26 18:25

Reported

2024-08-26 18:28

Platform

win10v2004-20240802-en

Max time kernel

148s

Max time network

152s

Command Line

"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\c3937a8a35dfcbd6bc84cbb2d3198fbb_JaffaCakes118.html

Signatures

Legitimate hosting services abused for malware hosting/C2

Description Indicator Process Target
N/A sites.google.com N/A N/A
N/A sites.google.com N/A N/A
N/A sites.google.com N/A N/A

Browser Information Discovery

discovery

Enumerates system info in registry

Description Indicator Process Target
Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe N/A
Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe N/A
Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe N/A

Suspicious use of FindShellTrayWindow

Description Indicator Process Target
N/A N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe N/A
N/A N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe N/A
N/A N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe N/A
N/A N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe N/A
N/A N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe N/A
N/A N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe N/A
N/A N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe N/A
N/A N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe N/A
N/A N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe N/A
N/A N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe N/A
N/A N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe N/A
N/A N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe N/A
N/A N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe N/A
N/A N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe N/A
N/A N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe N/A
N/A N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe N/A
N/A N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe N/A
N/A N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe N/A
N/A N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe N/A
N/A N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe N/A
N/A N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe N/A
N/A N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe N/A
N/A N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe N/A
N/A N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe N/A
N/A N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe N/A

Suspicious use of SendNotifyMessage

Description Indicator Process Target
N/A N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe N/A
N/A N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe N/A
N/A N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe N/A
N/A N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe N/A
N/A N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe N/A
N/A N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe N/A
N/A N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe N/A
N/A N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe N/A
N/A N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe N/A
N/A N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe N/A
N/A N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe N/A
N/A N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe N/A
N/A N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe N/A
N/A N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe N/A
N/A N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe N/A
N/A N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe N/A
N/A N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe N/A
N/A N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe N/A
N/A N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe N/A
N/A N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe N/A
N/A N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe N/A
N/A N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe N/A
N/A N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe N/A
N/A N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe N/A

Suspicious use of WriteProcessMemory

Description Indicator Process Target
PID 1608 wrote to memory of 3000 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 1608 wrote to memory of 3000 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 1608 wrote to memory of 3560 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 1608 wrote to memory of 3560 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 1608 wrote to memory of 3560 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 1608 wrote to memory of 3560 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 1608 wrote to memory of 3560 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 1608 wrote to memory of 3560 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 1608 wrote to memory of 3560 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 1608 wrote to memory of 3560 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 1608 wrote to memory of 3560 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 1608 wrote to memory of 3560 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 1608 wrote to memory of 3560 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 1608 wrote to memory of 3560 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 1608 wrote to memory of 3560 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 1608 wrote to memory of 3560 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 1608 wrote to memory of 3560 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 1608 wrote to memory of 3560 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 1608 wrote to memory of 3560 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 1608 wrote to memory of 3560 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 1608 wrote to memory of 3560 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 1608 wrote to memory of 3560 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 1608 wrote to memory of 3560 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 1608 wrote to memory of 3560 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 1608 wrote to memory of 3560 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 1608 wrote to memory of 3560 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 1608 wrote to memory of 3560 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 1608 wrote to memory of 3560 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 1608 wrote to memory of 3560 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 1608 wrote to memory of 3560 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 1608 wrote to memory of 3560 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 1608 wrote to memory of 3560 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 1608 wrote to memory of 3560 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 1608 wrote to memory of 3560 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 1608 wrote to memory of 3560 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 1608 wrote to memory of 3560 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 1608 wrote to memory of 3560 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 1608 wrote to memory of 3560 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 1608 wrote to memory of 3560 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 1608 wrote to memory of 3560 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 1608 wrote to memory of 3560 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 1608 wrote to memory of 3560 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 1608 wrote to memory of 4044 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 1608 wrote to memory of 4044 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 1608 wrote to memory of 4072 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 1608 wrote to memory of 4072 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 1608 wrote to memory of 4072 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 1608 wrote to memory of 4072 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 1608 wrote to memory of 4072 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 1608 wrote to memory of 4072 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 1608 wrote to memory of 4072 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 1608 wrote to memory of 4072 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 1608 wrote to memory of 4072 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 1608 wrote to memory of 4072 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 1608 wrote to memory of 4072 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 1608 wrote to memory of 4072 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 1608 wrote to memory of 4072 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 1608 wrote to memory of 4072 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 1608 wrote to memory of 4072 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 1608 wrote to memory of 4072 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 1608 wrote to memory of 4072 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 1608 wrote to memory of 4072 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 1608 wrote to memory of 4072 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 1608 wrote to memory of 4072 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe

Processes

C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe

"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\c3937a8a35dfcbd6bc84cbb2d3198fbb_JaffaCakes118.html

C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe

"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ff956bc46f8,0x7ff956bc4708,0x7ff956bc4718

C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe

"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2012,5728959045570314993,6748823503142968552,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2044 /prefetch:2

C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe

"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2012,5728959045570314993,6748823503142968552,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2556 /prefetch:3

C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe

"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2012,5728959045570314993,6748823503142968552,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2728 /prefetch:8

C:\Windows\System32\CompPkgSrv.exe

C:\Windows\System32\CompPkgSrv.exe -Embedding

C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe

"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2012,5728959045570314993,6748823503142968552,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3264 /prefetch:1

C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe

"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2012,5728959045570314993,6748823503142968552,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3296 /prefetch:1

C:\Windows\System32\CompPkgSrv.exe

C:\Windows\System32\CompPkgSrv.exe -Embedding

C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe

"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2012,5728959045570314993,6748823503142968552,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5080 /prefetch:1

C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe

"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2012,5728959045570314993,6748823503142968552,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5572 /prefetch:1

C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe

"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2012,5728959045570314993,6748823503142968552,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5564 /prefetch:1

C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe

"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2012,5728959045570314993,6748823503142968552,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5900 /prefetch:1

C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe

"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2012,5728959045570314993,6748823503142968552,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=6368 /prefetch:8

C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe

"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2012,5728959045570314993,6748823503142968552,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=6368 /prefetch:8

C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe

"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2012,5728959045570314993,6748823503142968552,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5584 /prefetch:1

C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe

"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2012,5728959045570314993,6748823503142968552,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=13 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6184 /prefetch:1

C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe

"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2012,5728959045570314993,6748823503142968552,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=14 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6028 /prefetch:1

C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe

"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2012,5728959045570314993,6748823503142968552,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=15 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6420 /prefetch:1

C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe

"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2012,5728959045570314993,6748823503142968552,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=6188 /prefetch:2

Network

Country Destination Domain Proto
US 8.8.8.8:53 www.blogger.com udp
US 8.8.8.8:53 ajax.googleapis.com udp
US 8.8.8.8:53 googledrive.com udp
FR 216.58.214.162:445 pagead2.googlesyndication.com tcp
FR 142.250.179.105:443 www.blogger.com tcp
FR 142.250.179.74:443 ajax.googleapis.com tcp
FR 142.250.179.74:443 ajax.googleapis.com tcp
FR 142.250.179.74:80 ajax.googleapis.com tcp
FR 142.250.75.234:80 fonts.googleapis.com tcp
FR 142.250.75.234:80 fonts.googleapis.com tcp
FR 142.250.75.234:80 fonts.googleapis.com tcp
FR 142.250.201.161:80 googledrive.com tcp
FR 142.250.201.161:443 googledrive.com tcp
FR 142.250.179.105:443 www.blogger.com tcp
FR 142.250.179.74:443 ajax.googleapis.com tcp
FR 142.250.75.234:80 fonts.googleapis.com tcp
FR 142.250.201.161:80 googledrive.com tcp
FR 142.250.201.161:443 googledrive.com tcp
FR 142.250.179.74:80 ajax.googleapis.com tcp
US 8.8.8.8:53 149.177.190.20.in-addr.arpa udp
US 8.8.8.8:53 105.179.250.142.in-addr.arpa udp
US 8.8.8.8:53 234.75.250.142.in-addr.arpa udp
US 8.8.8.8:53 161.201.250.142.in-addr.arpa udp
US 8.8.8.8:53 74.179.250.142.in-addr.arpa udp
US 8.8.8.8:53 196.249.167.52.in-addr.arpa udp
US 8.8.8.8:53 95.221.229.192.in-addr.arpa udp
US 8.8.8.8:53 240.143.123.92.in-addr.arpa udp
FR 142.250.178.131:80 fonts.gstatic.com tcp
FR 216.58.214.162:139 pagead2.googlesyndication.com tcp
US 8.8.8.8:53 www.linkwithin.com udp
US 8.8.8.8:53 131.178.250.142.in-addr.arpa udp
FR 142.250.201.161:443 googledrive.com udp
FR 142.250.201.161:80 googledrive.com tcp
FR 142.250.201.161:80 googledrive.com tcp
FR 142.250.201.161:80 googledrive.com tcp
FR 142.250.201.161:80 googledrive.com tcp
FR 142.250.201.161:80 googledrive.com tcp
US 8.8.8.8:53 163.214.58.216.in-addr.arpa udp
FR 142.250.201.161:80 googledrive.com tcp
US 8.8.8.8:53 www.imotiv.ly udp
N/A 224.0.0.251:5353 udp
FR 142.250.201.161:80 googledrive.com tcp
FR 142.250.179.105:443 www.blogger.com udp
US 8.8.8.8:53 sites.google.com udp
US 8.8.8.8:53 www.apesal.com udp
US 8.8.8.8:53 pingje.com udp
US 8.8.8.8:53 apis.google.com udp
US 8.8.8.8:53 ping.busuk.org udp
US 8.8.8.8:53 www.clocklink.com udp
US 8.8.8.8:53 4.bp.blogspot.com udp
US 8.8.8.8:53 1.bp.blogspot.com udp
US 8.8.8.8:53 resources.blogblog.com udp
FR 142.250.179.78:443 sites.google.com tcp
US 104.21.12.42:80 www.apesal.com tcp
US 216.230.241.100:80 www.clocklink.com tcp
FR 142.250.179.105:443 resources.blogblog.com tcp
FR 142.250.179.97:80 1.bp.blogspot.com tcp
FR 142.250.179.97:80 1.bp.blogspot.com tcp
FR 142.250.179.97:80 1.bp.blogspot.com tcp
FR 142.250.178.142:443 apis.google.com tcp
FR 142.250.179.97:80 1.bp.blogspot.com tcp
US 8.8.8.8:53 www.thetouchofsound.com udp
US 35.168.175.109:80 pingje.com tcp
FR 142.250.179.78:443 sites.google.com tcp
US 173.236.138.253:80 www.thetouchofsound.com tcp
US 8.8.8.8:53 dubdsb3u36ja6.cloudfront.net udp
US 8.8.8.8:53 www.jomniaga.com udp
US 216.230.241.100:80 www.clocklink.com tcp
US 8.8.8.8:53 joiriah.jomniaga.com udp
US 8.8.8.8:53 salma.jomniaga.com udp
US 8.8.8.8:53 www.domainmarket.com udp
US 8.8.8.8:53 42.12.21.104.in-addr.arpa udp
US 8.8.8.8:53 97.179.250.142.in-addr.arpa udp
US 8.8.8.8:53 142.178.250.142.in-addr.arpa udp
US 8.8.8.8:53 109.175.168.35.in-addr.arpa udp
US 8.8.8.8:53 78.179.250.142.in-addr.arpa udp
US 8.8.8.8:53 253.138.236.173.in-addr.arpa udp
US 172.66.43.135:443 www.domainmarket.com tcp
US 173.236.138.253:443 www.thetouchofsound.com tcp
US 8.8.8.8:53 a.nel.cloudflare.com udp
US 8.8.8.8:53 2.bp.blogspot.com udp
US 8.8.8.8:53 busuk.org udp
US 35.190.80.1:443 a.nel.cloudflare.com tcp
US 172.67.139.115:80 busuk.org tcp
US 8.8.8.8:53 accounts.google.com udp
FR 142.250.179.97:80 2.bp.blogspot.com tcp
IE 74.125.193.84:443 accounts.google.com tcp
US 8.8.8.8:53 www.auto-ping.com udp
FR 142.250.179.78:443 sites.google.com udp
DE 94.130.218.80:80 www.auto-ping.com tcp
IE 74.125.193.84:443 accounts.google.com tcp
IE 74.125.193.84:443 accounts.google.com tcp
US 8.8.8.8:53 135.43.66.172.in-addr.arpa udp
US 8.8.8.8:53 1.80.190.35.in-addr.arpa udp
US 8.8.8.8:53 115.139.67.172.in-addr.arpa udp
US 8.8.8.8:53 80.218.130.94.in-addr.arpa udp
US 8.8.8.8:53 kartikel.com udp
IE 74.125.193.84:443 accounts.google.com udp
LT 93.115.28.104:80 kartikel.com tcp
US 172.67.139.115:443 busuk.org tcp
US 8.8.8.8:53 www.google.com udp
FR 142.250.179.105:443 resources.blogblog.com udp
FR 142.250.179.68:443 www.google.com tcp
US 8.8.8.8:53 pr.prchecker.info udp
US 67.227.215.171:80 pr.prchecker.info tcp
FR 142.250.179.68:443 www.google.com tcp
US 8.8.8.8:53 i155.photobucket.com udp
GB 216.137.44.125:80 i155.photobucket.com tcp
US 67.227.215.171:80 pr.prchecker.info tcp
GB 216.137.44.125:443 i155.photobucket.com tcp
US 67.227.215.171:443 pr.prchecker.info tcp
US 8.8.8.8:53 84.193.125.74.in-addr.arpa udp
US 8.8.8.8:53 104.28.115.93.in-addr.arpa udp
US 8.8.8.8:53 68.179.250.142.in-addr.arpa udp
US 8.8.8.8:53 125.44.137.216.in-addr.arpa udp
US 8.8.8.8:53 171.215.227.67.in-addr.arpa udp
US 8.8.8.8:53 13.86.106.20.in-addr.arpa udp
US 35.190.80.1:443 a.nel.cloudflare.com udp
SG 118.139.179.30:80 www.linkwithin.com tcp
SG 118.139.179.30:80 www.linkwithin.com tcp
SG 118.139.179.30:80 www.linkwithin.com tcp
US 8.8.8.8:53 www.carimember.com udp
US 154.197.239.185:80 www.carimember.com tcp
US 154.197.239.185:80 www.carimember.com tcp
US 8.8.8.8:53 43.39.156.108.in-addr.arpa udp
US 8.8.8.8:53 i68.photobucket.com udp
GB 216.137.44.112:80 i68.photobucket.com tcp
US 8.8.8.8:53 www.activesearchresults.com udp
US 8.8.8.8:53 blogmalaysia.com udp
US 173.49.115.115:80 www.activesearchresults.com tcp
US 8.8.8.8:53 3.bp.blogspot.com udp
US 172.67.133.163:80 blogmalaysia.com tcp
FR 142.250.179.97:80 3.bp.blogspot.com tcp
FR 142.250.179.97:80 3.bp.blogspot.com tcp
US 172.67.133.163:443 blogmalaysia.com tcp
US 173.49.115.115:443 www.activesearchresults.com tcp
FR 142.250.179.97:80 3.bp.blogspot.com tcp
US 8.8.8.8:53 30.179.139.118.in-addr.arpa udp
US 8.8.8.8:53 185.239.197.154.in-addr.arpa udp
US 8.8.8.8:53 112.44.137.216.in-addr.arpa udp
US 8.8.8.8:53 115.115.49.173.in-addr.arpa udp
US 8.8.8.8:53 163.133.67.172.in-addr.arpa udp
US 8.8.8.8:53 233.38.18.104.in-addr.arpa udp
US 8.8.8.8:53 translate.google.com udp
US 8.8.8.8:53 tr.nuffnangx.com udp
FR 172.217.20.206:445 translate.google.com tcp
US 8.8.8.8:53 www.jomniaga.com udp
US 8.8.8.8:53 www.facebook.com udp
DK 157.240.200.35:80 www.facebook.com tcp
US 8.8.8.8:53 translate.google.com udp
FR 172.217.20.206:139 translate.google.com tcp
DK 157.240.200.35:443 www.facebook.com tcp
US 8.8.8.8:53 35.200.240.157.in-addr.arpa udp
US 8.8.8.8:53 synad2.nuffnang.com.my udp
US 8.8.8.8:53 static.xx.fbcdn.net udp
DK 157.240.200.14:443 static.xx.fbcdn.net tcp
DK 157.240.200.14:443 static.xx.fbcdn.net tcp
DK 157.240.200.14:443 static.xx.fbcdn.net tcp
DK 157.240.200.14:443 static.xx.fbcdn.net tcp
DK 157.240.200.14:443 static.xx.fbcdn.net tcp
DK 157.240.200.14:443 static.xx.fbcdn.net tcp
US 8.8.8.8:53 scontent.xx.fbcdn.net udp
US 8.8.8.8:53 14.200.240.157.in-addr.arpa udp
US 8.8.8.8:53 widgets.amung.us udp
US 172.67.8.141:80 widgets.amung.us tcp
US 8.8.8.8:53 t.dtscout.com udp
US 141.101.120.11:443 t.dtscout.com tcp
US 141.101.120.11:443 t.dtscout.com tcp
US 8.8.8.8:53 141.8.67.172.in-addr.arpa udp
US 8.8.8.8:53 11.120.101.141.in-addr.arpa udp
US 8.8.8.8:53 198.187.3.20.in-addr.arpa udp
US 8.8.8.8:53 192.142.123.92.in-addr.arpa udp
FR 142.250.178.142:443 apis.google.com udp
FR 142.250.201.161:80 googledrive.com tcp
FR 142.250.201.161:80 googledrive.com tcp
FR 142.250.179.105:443 resources.blogblog.com udp
US 8.8.8.8:53 whos.amung.us udp
US 172.67.8.141:445 whos.amung.us tcp
FR 142.250.179.97:443 3.bp.blogspot.com tcp
US 8.8.8.8:53 lh3.googleusercontent.com udp
FR 142.250.179.97:443 3.bp.blogspot.com tcp
US 8.8.8.8:53 lh6.googleusercontent.com udp
FR 142.250.179.97:443 3.bp.blogspot.com tcp
FR 142.250.178.129:443 lh6.googleusercontent.com tcp
FR 142.250.178.129:443 lh6.googleusercontent.com tcp
FR 142.250.178.129:443 lh6.googleusercontent.com tcp
FR 142.250.178.129:443 lh6.googleusercontent.com tcp
FR 142.250.178.129:443 lh6.googleusercontent.com tcp
FR 142.250.178.129:443 lh6.googleusercontent.com tcp
FR 142.250.178.129:443 lh6.googleusercontent.com tcp
FR 142.250.179.97:443 3.bp.blogspot.com tcp
US 8.8.8.8:53 129.178.250.142.in-addr.arpa udp
US 8.8.8.8:53 whos.amung.us udp
US 104.22.74.171:445 whos.amung.us tcp
US 104.22.75.171:445 whos.amung.us tcp
US 8.8.8.8:53 172.210.232.199.in-addr.arpa udp
FR 142.250.178.129:443 lh6.googleusercontent.com udp
US 8.8.8.8:53 lh4.googleusercontent.com udp
US 8.8.8.8:53 lh5.googleusercontent.com udp
FR 142.250.178.129:443 lh5.googleusercontent.com udp
US 8.8.8.8:53 cerciterpanas.blogspot.com udp
FR 142.250.178.129:443 lh5.googleusercontent.com udp
FR 142.250.178.129:443 lh5.googleusercontent.com udp
FR 142.250.75.225:80 cerciterpanas.blogspot.com tcp
US 8.8.8.8:53 225.75.250.142.in-addr.arpa udp
US 8.8.8.8:53 57.169.31.20.in-addr.arpa udp
US 8.8.8.8:53 30.243.111.52.in-addr.arpa udp
US 8.8.8.8:53 tse1.mm.bing.net udp
US 150.171.28.10:443 tse1.mm.bing.net tcp
US 150.171.28.10:443 tse1.mm.bing.net tcp
US 150.171.28.10:443 tse1.mm.bing.net tcp
US 150.171.28.10:443 tse1.mm.bing.net tcp
US 150.171.28.10:443 tse1.mm.bing.net tcp
US 8.8.8.8:53 55.36.223.20.in-addr.arpa udp

Files

C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad\settings.dat

MD5 0446fcdd21b016db1f468971fb82a488
SHA1 726b91562bb75f80981f381e3c69d7d832c87c9d
SHA256 62c5dc18b25e758f3508582a7c58bb46b734a774d97fc0e8a20614235caa8222
SHA512 1df7c085042266959f1fe0aedc5f6d40ceba485b54159f51f0c38f17bb250b79ea941b735e1b6faf219f23fe8ab65ac4557f545519d52d5416b89ad0f9047a31

\??\pipe\LOCAL\crashpad_1608_WVTFPZIEVSWDJHGF

MD5 d41d8cd98f00b204e9800998ecf8427e
SHA1 da39a3ee5e6b4b0d3255bfef95601890afd80709
SHA256 e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855
SHA512 cf83e1357eefb8bdf1542850d66d8007d620e4050b5715dc83f4a921d36ce9ce47d0d13c5d85f2b0ff8318d2877eec2f63b931bd47417a81a538327af927da3e

C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad\settings.dat

MD5 9b008261dda31857d68792b46af6dd6d
SHA1 e82dc88e2d1da2df7cb19d79a0346b9bb90d52b3
SHA256 9ac598d4f8170f7e475d84103aead9e3c23d5f2d292741a7f56a17bde8b6f7da
SHA512 78853091403a06beeec4998e2e3a4342111895ffd485f7f7cd367741a4883f7a25864cba00a6c86f27dc0c9ce9d04f08011ecc40c8ae9383d33274739ac39f10

C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Preferences

MD5 6da9499e6d9cd976605c7c1260e973dc
SHA1 ceba0fc177e30601e955de2eaad1b82c6aedf48f
SHA256 d35046c4434985c3324fe0d656685ca7f44447af809a7c0a1749cb9f14605385
SHA512 f9988c1a0674d4324c5a61dc23c3f0e4fe3ea7954347406f1d966cb73f5169517b20f02f194f87cf8c22f0f84d13432819da08bf9e892224e6641c2f533d6bed

C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Local State

MD5 a75b259bd8e5251ff72abb2cf1b19d21
SHA1 0f7ce26807906636c0504bd928b033004030d962
SHA256 a374b7c3327675dcd28d62d4ec2fdd7bf48974436ffe5f61eb5809fe0056b04e
SHA512 5858805aab7c68ae6ba2376f6d14002dc8273f05fb9b7fe532627c102ac8fbbaefdb33f2fe505b9f6c21579117942b95d05e84eacf8cbed0334acd7726555dea

C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Preferences

MD5 4a02002956f410116dd33163e1b26880
SHA1 9ca9cbc75f153b2a204a430f71d5f5738c49ea4c
SHA256 f259aa438e33d67cf26f9f2b4efbd31c8451d334625c5027644e43f1048138e2
SHA512 911fc71906f94d3e7c94ac78ca55aa23c2039bc9ffeab55b94ffe04d612c7700b1a1adb10d48ad59b6fdd62649f74ed0f7fc5855d7d2f5c0f6a8f8ad70dea0d9

C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\TransportSecurity

MD5 456c8ca0182e6bac705fab92628b31cd
SHA1 3a07764ff95483f0aadde3e2a0eddaf97bd434ad
SHA256 394574fec0780f94e6d16f28e8d215465ed5a775f487e4df54b356fae777c4e1
SHA512 9738022c1ad623b7dd368cf21c602760a5e05b61a8dc1ae3615dc3249a360629db3e8efdf892d740c2a498713f7f47a905b4d7311258fd332f681b2bcd47039b

C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\TransportSecurity~RFe581aa7.TMP

MD5 3d268b961292c7ba2070fb8c7081c953
SHA1 be3341b5af1e444a998acd4d69d6db65d0134ff6
SHA256 04eedab6dec47f6082e8f7b5f6ff8b29f9056cc6a3eb5ea160e998957973ed61
SHA512 bc76e12b55344c94de7e2e803b6edec61a810f1c09bdd084591b0db14700f8c977846f207bc630d445d96deb57f29471a136925c5fdc9ffed8ff6ed946bb13c0

C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index

MD5 2d0816f1e010b1013d1ff971b8913428
SHA1 95b0c659f5af288b56a10db4c5d148744c4f0b18
SHA256 40b23653e85222da1bc33f2e48fe961ca23b293737262380d631fbad54993ca4
SHA512 e23cc7b40b939fe693bc4304e7625d94ae11a299b5cfe209c4c5db315e1799b9ff908c8117d7735b715074388f52b1621f4f1446d2411a4313aa0b818f7ad9a6

C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\TransportSecurity

MD5 0789332db1639b33f92ff2c247d89634
SHA1 89a5942a55a5c1b4dc355bdd58ad25c99a1b5a6d
SHA256 18dc159ecc7f7a6d7722b7c97b06428c1ae6cb478133af42d8935027c11a6dfe
SHA512 5bc567460277e805f78552940b1379c396029d3095905f15f9155e4927ea49214979fbfaeb9da384d900c8cea9633132855228c18e6158ab6ada7b11467bf1f2

C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index

MD5 d27c8f61ee531bc97901b1a241f4d650
SHA1 2b0b70a944618219a02d88af85c3e2687720dc0d
SHA256 f5b39786a540538dfc6b3ad9717d75e05193a73e755469874e9c2a528591c72b
SHA512 8d04da2d3171d918fcdd834e9f5140fe64270d9a87cf37bf3f1fd459a325e23f87f73cee934c64bcc5f07058140d91d361a1215111899d9d8ac15b6bd6a4c426

C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Preferences

MD5 f986ccbafc07ae1e3eef77e4103be6cd
SHA1 3e2f0f8f1f663bf31a61bddd418a18a205311e62
SHA256 b2cd247398c7469e3c6d3776baffc7c1924719b023dae48f67498eb9d17f22f4
SHA512 af04786407d1780a06b7b652cd256afb2fd9eaebd0af86b834522982db0649cada9f854b829cf5eed4a30dcf150e569bd89122e2627da19cf400ef3de711682a

C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\data_reduction_proxy_leveldb\CURRENT

MD5 6752a1d65b201c13b62ea44016eb221f
SHA1 58ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA256 0861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA512 9cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389

C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Network Persistent State

MD5 b5e20a590f47a72487553cc5b9b8a12e
SHA1 620ef0c7153df7fead5de4d998f872dd207b782d
SHA256 7d4a8a7ef3c1b1891c303ff1a3597efc1b9eb1fb5d5f797711f8231867fe1af4
SHA512 68b9ff2f57ba464255ea80f16135cc7c6f762967388d0778ab1c6284d2d3f679509954a0bbc19c3e27a60b9270ce1ade530127ab7497936f9fb035630dbee6e6

C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Network Persistent State

MD5 66b05c228c1a9f7b2f59313f39eb6378
SHA1 bfb4a3f063ee8ab341e25a9e81ce04edcd950d1b
SHA256 79368a49c4e9eb148f0a1943fdfd5447effb3a9cba617b2630eb354b21767963
SHA512 f2c56bac75f4ce14be30096e7c6221a8f4df13186d34f608b5f6e58eb4cf3e31b407fa448bae5af6f2d197f9a6ebec0725a13844c54f3e6ace9f9c0a63257b99