Malware Analysis Report

2024-10-23 17:22

Sample ID 240827-emdwfssajb
Target c451ef2d82fbe2998af9c0c166cacfcb_JaffaCakes118
SHA256 5e9ba34688a74540ac9f9349ac20f14972f2e9e5046731871ba7d24c665a0732
Tags
socgholish discovery downloader
score
10/10

Table of Contents

Analysis Overview

MITRE ATT&CK

Enterprise Matrix V15

Analysis: static1

Detonation Overview

Signatures

Analysis: behavioral1

Detonation Overview

Command Line

Signatures

Processes

Network

Files

Analysis: behavioral2

Detonation Overview

Command Line

Signatures

Processes

Network

Files

Analysis Overview

score
10/10

SHA256

5e9ba34688a74540ac9f9349ac20f14972f2e9e5046731871ba7d24c665a0732

Threat Level: Known bad

The file c451ef2d82fbe2998af9c0c166cacfcb_JaffaCakes118 was found to be: Known bad.

Malicious Activity Summary

socgholish discovery downloader

SocGholish

Browser Information Discovery

System Location Discovery: System Language Discovery

Suspicious use of WriteProcessMemory

Enumerates system info in registry

Suspicious behavior: EnumeratesProcesses

Suspicious use of FindShellTrayWindow

Modifies Internet Explorer settings

Suspicious use of SetWindowsHookEx

Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary

Suspicious use of SendNotifyMessage

MITRE ATT&CK

Analysis: static1

Detonation Overview

Reported

2024-08-27 04:03

Signatures

N/A

Analysis: behavioral1

Detonation Overview

Submitted

2024-08-27 04:03

Reported

2024-08-27 04:05

Platform

win7-20240708-en

Max time kernel

143s

Max time network

145s

Command Line

"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\c451ef2d82fbe2998af9c0c166cacfcb_JaffaCakes118.html

Signatures

SocGholish

downloader socgholish

System Location Discovery: System Language Discovery

discovery
Description Indicator Process Target
Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE N/A

Modifies Internet Explorer settings

adware spyware
Description Indicator Process Target
Key created \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage C:\Program Files\Internet Explorer\iexplore.exe N/A
Key created \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\Toolbar C:\Program Files\Internet Explorer\iexplore.exe N/A
Set value (data) \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 C:\Program Files\Internet Explorer\iexplore.exe N/A
Set value (data) \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 C:\Program Files\Internet Explorer\iexplore.exe N/A
Set value (int) \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "430893257" C:\Program Files\Internet Explorer\iexplore.exe N/A
Key created \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\Main C:\Program Files\Internet Explorer\iexplore.exe N/A
Key created \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\InternetRegistry C:\Program Files\Internet Explorer\iexplore.exe N/A
Set value (str) \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE N/A
Set value (int) \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" C:\Program Files\Internet Explorer\iexplore.exe N/A
Set value (data) \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb0100000062974e5b5f804e45b98349be16bffb78000000000200000000001066000000010000200000000a5806a7af9f97322f42ae1c42e50c102794899eb2a5e3f39a5ba6724a84c039000000000e8000000002000020000000bde3c143e22789091c7fbba43a00a72b56daa50e7be617a288f3fcad5c86247d200000007acea52cf888256a74b2edfd45f652ba6367874080b92d9e020bf7ffc1758548400000004fdf943a0a675c4808c540a948bc5026e581c68d3c3bfcdf85d005614df0ce54c6ec726a12eae7470f71051ba788535af60aae5d4f6eaa53cc0c9b93a1d088f2 C:\Program Files\Internet Explorer\iexplore.exe N/A
Key created \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain C:\Program Files\Internet Explorer\iexplore.exe N/A
Key created \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive C:\Program Files\Internet Explorer\iexplore.exe N/A
Set value (str) \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" C:\Program Files\Internet Explorer\iexplore.exe N/A
Key created \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing C:\Program Files\Internet Explorer\iexplore.exe N/A
Key created \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser C:\Program Files\Internet Explorer\iexplore.exe N/A
Key created \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch C:\Program Files\Internet Explorer\iexplore.exe N/A
Key created \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\Main C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE N/A
Key created \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\SearchScopes C:\Program Files\Internet Explorer\iexplore.exe N/A
Key created \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\IntelliForms C:\Program Files\Internet Explorer\iexplore.exe N/A
Key created \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\LowRegistry C:\Program Files\Internet Explorer\iexplore.exe N/A
Set value (int) \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" C:\Program Files\Internet Explorer\iexplore.exe N/A
Set value (int) \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" C:\Program Files\Internet Explorer\iexplore.exe N/A
Key created \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage C:\Program Files\Internet Explorer\iexplore.exe N/A
Set value (data) \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 308dfa1e36f8da01 C:\Program Files\Internet Explorer\iexplore.exe N/A
Key created \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\IETld\LowMic C:\Program Files\Internet Explorer\iexplore.exe N/A
Key created \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\Zoom C:\Program Files\Internet Explorer\iexplore.exe N/A
Set value (int) \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" C:\Program Files\Internet Explorer\iexplore.exe N/A
Set value (int) \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{456C4941-6429-11EF-84F4-428107983482} = "0" C:\Program Files\Internet Explorer\iexplore.exe N/A
Key created \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\GPU C:\Program Files\Internet Explorer\iexplore.exe N/A
Key created \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\PageSetup C:\Program Files\Internet Explorer\iexplore.exe N/A
Set value (str) \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" C:\Program Files\Internet Explorer\iexplore.exe N/A
Set value (int) \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" C:\Program Files\Internet Explorer\iexplore.exe N/A
Key created \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE N/A
Key created \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\DomainSuggestion C:\Program Files\Internet Explorer\iexplore.exe N/A
Key created \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic C:\Program Files\Internet Explorer\iexplore.exe N/A
Key created \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery C:\Program Files\Internet Explorer\iexplore.exe N/A

Suspicious use of FindShellTrayWindow

Description Indicator Process Target
N/A N/A C:\Program Files\Internet Explorer\iexplore.exe N/A

Processes

C:\Program Files\Internet Explorer\iexplore.exe

"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\c451ef2d82fbe2998af9c0c166cacfcb_JaffaCakes118.html

C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE

"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2520 CREDAT:275457 /prefetch:2

Network

Country Destination Domain Proto
US 8.8.8.8:53 www.blogger.com udp
US 8.8.8.8:53 ajax.googleapis.com udp
US 8.8.8.8:53 www.linkwithin.com udp
US 8.8.8.8:53 resources.blogblog.com udp
US 8.8.8.8:53 twittermarketingtips.co.uk udp
US 8.8.8.8:53 apis.google.com udp
US 8.8.8.8:53 2.bp.blogspot.com udp
US 8.8.8.8:53 1.bp.blogspot.com udp
US 8.8.8.8:53 farm4.staticflickr.com udp
US 8.8.8.8:53 www.photoshopsupport.com udp
US 8.8.8.8:53 www.topazlabs.com udp
US 8.8.8.8:53 farm7.static.flickr.com udp
US 8.8.8.8:53 lh3.googleusercontent.com udp
US 8.8.8.8:53 www.expressnightout.com udp
US 8.8.8.8:53 ghozaliq.files.wordpress.com udp
US 8.8.8.8:53 www.naturescapes.net udp
US 8.8.8.8:53 www.best-4-u.com udp
US 8.8.8.8:53 static.tabloidpulsa.co.id udp
US 8.8.8.8:53 3.bp.blogspot.com udp
US 8.8.8.8:53 blog.fastncheap.com udp
US 8.8.8.8:53 shirotholmustaqim.files.wordpress.com udp
US 8.8.8.8:53 img145.imageshack.us udp
US 8.8.8.8:53 alamindawa.com udp
US 8.8.8.8:53 lh6.googleusercontent.com udp
US 8.8.8.8:53 4.bp.blogspot.com udp
US 8.8.8.8:53 s7.addthis.com udp
FR 142.250.179.105:443 resources.blogblog.com tcp
FR 142.250.179.105:443 resources.blogblog.com tcp
FR 216.58.213.66:80 pagead2.googlesyndication.com tcp
FR 142.250.179.105:443 resources.blogblog.com tcp
FR 216.58.213.66:80 pagead2.googlesyndication.com tcp
FR 142.250.75.234:443 ajax.googleapis.com tcp
FR 142.250.179.105:443 resources.blogblog.com tcp
FR 142.250.179.105:443 resources.blogblog.com tcp
FR 142.250.75.234:443 ajax.googleapis.com tcp
SG 118.139.179.30:80 www.linkwithin.com tcp
SG 118.139.179.30:80 www.linkwithin.com tcp
FR 142.250.179.97:80 4.bp.blogspot.com tcp
FR 142.250.179.97:80 4.bp.blogspot.com tcp
FR 142.250.179.97:80 4.bp.blogspot.com tcp
FR 142.250.179.97:80 4.bp.blogspot.com tcp
FR 142.250.179.97:80 4.bp.blogspot.com tcp
FR 142.250.179.97:80 4.bp.blogspot.com tcp
FR 142.250.178.142:443 apis.google.com tcp
FR 142.250.178.142:443 apis.google.com tcp
GB 18.245.160.68:80 farm7.static.flickr.com tcp
GB 18.245.160.68:80 farm7.static.flickr.com tcp
GB 18.245.160.68:80 farm7.static.flickr.com tcp
GB 18.245.160.68:80 farm7.static.flickr.com tcp
FR 142.250.179.97:80 4.bp.blogspot.com tcp
FR 142.250.179.97:80 4.bp.blogspot.com tcp
FR 142.250.179.97:80 4.bp.blogspot.com tcp
FR 142.250.179.97:80 4.bp.blogspot.com tcp
FR 142.250.179.97:80 4.bp.blogspot.com tcp
FR 142.250.179.97:80 4.bp.blogspot.com tcp
IE 63.35.51.142:80 www.topazlabs.com tcp
IE 63.35.51.142:80 www.topazlabs.com tcp
US 38.99.77.16:80 img145.imageshack.us tcp
US 38.99.77.16:80 img145.imageshack.us tcp
FR 142.250.178.129:443 lh6.googleusercontent.com tcp
FR 142.250.178.129:443 lh6.googleusercontent.com tcp
US 192.0.72.18:80 ghozaliq.files.wordpress.com tcp
US 192.0.72.18:80 ghozaliq.files.wordpress.com tcp
US 192.0.72.29:80 shirotholmustaqim.files.wordpress.com tcp
US 192.0.72.29:80 shirotholmustaqim.files.wordpress.com tcp
US 138.197.75.216:80 www.naturescapes.net tcp
US 138.197.75.216:80 www.naturescapes.net tcp
FR 142.250.179.97:80 4.bp.blogspot.com tcp
FR 142.250.179.97:80 4.bp.blogspot.com tcp
FR 142.250.179.97:80 4.bp.blogspot.com tcp
FR 142.250.179.97:80 4.bp.blogspot.com tcp
FR 142.250.179.97:80 4.bp.blogspot.com tcp
FR 142.250.179.97:80 4.bp.blogspot.com tcp
GB 104.96.173.184:80 s7.addthis.com tcp
GB 104.96.173.184:80 s7.addthis.com tcp
FR 142.250.179.97:80 4.bp.blogspot.com tcp
FR 142.250.179.97:80 4.bp.blogspot.com tcp
DE 3.64.163.50:80 blog.fastncheap.com tcp
DE 3.64.163.50:80 blog.fastncheap.com tcp
FR 142.250.178.129:443 lh6.googleusercontent.com tcp
FR 142.250.178.129:443 lh6.googleusercontent.com tcp
NL 190.2.139.23:80 alamindawa.com tcp
NL 190.2.139.23:80 alamindawa.com tcp
GB 18.245.160.68:443 farm7.static.flickr.com tcp
GB 18.245.160.68:443 farm7.static.flickr.com tcp
US 192.0.72.18:443 ghozaliq.files.wordpress.com tcp
US 192.0.72.29:443 shirotholmustaqim.files.wordpress.com tcp
IE 63.35.51.142:443 www.topazlabs.com tcp
US 192.185.4.85:80 twittermarketingtips.co.uk tcp
US 192.185.4.85:80 twittermarketingtips.co.uk tcp
US 172.67.166.21:80 static.tabloidpulsa.co.id tcp
US 172.67.166.21:80 static.tabloidpulsa.co.id tcp
US 172.67.166.21:80 static.tabloidpulsa.co.id tcp
US 172.67.166.21:80 static.tabloidpulsa.co.id tcp
US 172.67.166.21:80 static.tabloidpulsa.co.id tcp
US 172.67.166.21:80 static.tabloidpulsa.co.id tcp
US 50.116.87.153:80 www.best-4-u.com tcp
US 50.116.87.153:80 www.best-4-u.com tcp
US 207.150.208.67:80 www.photoshopsupport.com tcp
US 207.150.208.67:80 www.photoshopsupport.com tcp
IE 63.35.51.142:443 www.topazlabs.com tcp
US 138.197.75.216:443 www.naturescapes.net tcp
IE 63.35.51.142:443 www.topazlabs.com tcp
IE 63.35.51.142:443 www.topazlabs.com tcp
US 8.8.8.8:53 c.pki.goog udp
US 8.8.8.8:53 c.pki.goog udp
US 8.8.8.8:53 c.pki.goog udp
US 8.8.8.8:53 c.pki.goog udp
US 138.197.75.216:443 www.naturescapes.net tcp
FR 216.58.214.163:80 c.pki.goog tcp
FR 216.58.214.163:80 c.pki.goog tcp
FR 216.58.214.163:80 c.pki.goog tcp
FR 216.58.214.163:80 c.pki.goog tcp
FR 216.58.214.163:80 c.pki.goog tcp
FR 216.58.214.163:80 c.pki.goog tcp
FR 216.58.214.163:80 c.pki.goog tcp
FR 216.58.214.163:80 c.pki.goog tcp
FR 216.58.214.163:80 c.pki.goog tcp
FR 216.58.214.163:80 c.pki.goog tcp
FR 216.58.214.163:80 c.pki.goog tcp
FR 216.58.214.163:80 c.pki.goog tcp
FR 216.58.214.163:80 c.pki.goog tcp
US 8.8.8.8:53 o.pki.goog udp
US 8.8.8.8:53 o.pki.goog udp
US 8.8.8.8:53 o.pki.goog udp
US 8.8.8.8:53 o.pki.goog udp
US 8.8.8.8:53 o.pki.goog udp
US 8.8.8.8:53 o.pki.goog udp
US 138.197.75.216:443 www.naturescapes.net tcp
US 8.8.8.8:53 o.pki.goog udp
US 8.8.8.8:53 o.pki.goog udp
US 8.8.8.8:53 o.pki.goog udp
US 8.8.8.8:53 o.pki.goog udp
US 8.8.8.8:53 o.pki.goog udp
US 8.8.8.8:53 o.pki.goog udp
US 8.8.8.8:53 o.pki.goog udp
FR 216.58.214.163:80 o.pki.goog tcp
FR 216.58.214.163:80 o.pki.goog tcp
FR 216.58.214.163:80 o.pki.goog tcp
FR 216.58.214.163:80 o.pki.goog tcp
FR 216.58.214.163:80 o.pki.goog tcp
FR 216.58.214.163:80 o.pki.goog tcp
FR 216.58.214.163:80 o.pki.goog tcp
FR 216.58.214.163:80 o.pki.goog tcp
FR 216.58.214.163:80 o.pki.goog tcp
FR 216.58.214.163:80 o.pki.goog tcp
FR 216.58.214.163:80 o.pki.goog tcp
FR 216.58.214.163:80 o.pki.goog tcp
FR 216.58.214.163:80 o.pki.goog tcp
US 138.197.75.216:443 www.naturescapes.net tcp
US 8.8.8.8:53 shirotholmustaqim.wordpress.com udp
US 192.0.78.12:443 shirotholmustaqim.wordpress.com tcp
US 192.0.78.12:443 shirotholmustaqim.wordpress.com tcp
US 8.8.8.8:53 ghozaliq.wordpress.com udp
US 192.0.78.12:443 ghozaliq.wordpress.com tcp
US 192.0.78.12:443 ghozaliq.wordpress.com tcp
FR 142.250.179.97:80 4.bp.blogspot.com tcp
US 8.8.8.8:53 ogjovpgrnv.in udp
US 8.8.8.8:53 crl.microsoft.com udp
GB 92.123.142.59:80 crl.microsoft.com tcp
US 204.79.197.200:443 ieonline.microsoft.com tcp
US 204.79.197.200:443 ieonline.microsoft.com tcp
US 8.8.8.8:53 www.microsoft.com udp
US 8.8.8.8:53 www.microsoft.com udp
US 204.79.197.200:443 ieonline.microsoft.com tcp

Files

C:\Users\Admin\AppData\Local\Temp\CabBA7B.tmp

MD5 49aebf8cbd62d92ac215b2923fb1b9f5
SHA1 1723be06719828dda65ad804298d0431f6aff976
SHA256 b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512 bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b

C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\24BD96D5497F70B3F510A6B53CD43F3E_3A89246FB90C5EE6620004F1AE0EB0EA

MD5 486d645332017353d031bd04a5543425
SHA1 b415c67d32c44191ec95657a28ee3ca2833e2c09
SHA256 66c53c8c35c5e39a2b0aa1338c9f94db8758f8470baa7171a6b6915d1ef06766
SHA512 3d4317f2ab20c7fa468d99fd7dee03392c4f6ab6281981d3ecf6e8cf230d5394540c9167b2b1fa4da3ed6063ddf8bcda787f4c1aad7d0eacb101bd459eaf268e

C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

MD5 0a319a019ad988cb6cb0849a5c688dff
SHA1 76d9bc842048ebe072e540090956f585feedbe26
SHA256 c238b943238eca776676e2191715d907cc15767925dd209a6fb4ca032cdbf178
SHA512 19b045aa1dadbe91be65cc14ea77bfdb8498e5bf3873a3bb41436a4225972b4e458ea11f301a39ebad67e673ca36129a7daf67c199e03592b128a439188910ef

C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\24BD96D5497F70B3F510A6B53CD43F3E_3A89246FB90C5EE6620004F1AE0EB0EA

MD5 beb1570b0c6fe2d3e4dea9643da627d0
SHA1 fdf53e0af14db5a6708700642cca084a0a0cd2e4
SHA256 6ac4a00ae8a863096f85a2f28d11ea893e0ae962695c903b4d68bfbb1a33a38a
SHA512 ec48e7502aa62b792f2f6943bc6679fad9deeac6fdf0002d846e81fd5c41fca973801f61603f1820a3c9c539d83f6c365393f7722527176bb262f4b97e57e8f2

C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\24BD96D5497F70B3F510A6B53CD43F3E_3A89246FB90C5EE6620004F1AE0EB0EA

MD5 4103c21cede21cf344955d79f5f87220
SHA1 27a810c177f163fbf28668bee674c0e865057b0d
SHA256 d10ee069105b107056114cbd3c1a25feeb99c0cfb59f4e6a9d7105dc943a0f58
SHA512 d890a2aaf627e858959825e9c1c14435a8deeff7d1c2c84670067a4f086a5d4ee1f29e3ab8b72c32ec4234cb13fcb9eb0f4cc91a5af4cceb577d91e4ea9f1fed

C:\Users\Admin\AppData\Local\Temp\TarBAFB.tmp

MD5 4ea6026cf93ec6338144661bf1202cd1
SHA1 a1dec9044f750ad887935a01430bf49322fbdcb7
SHA256 8efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA512 6c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b

C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

MD5 128820b09b6f044defc3e309ef2f8462
SHA1 3e534d075f90342f1efa640025de6e3f949ccecc
SHA256 32a400bac569e0ff3e1c148193420487f4779430b7a4b08971f6aac6a04da4da
SHA512 0964fb5064d3f983e6948c172bf5d2fb6415511c5a5e9691ea66e768e618ed0488f8ca8caf25f60a8a9c354736712296f47ea4475153a8a8f1e9405a913e3a39

C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\05DDC6AA91765AACACDB0A5F96DF8199

MD5 e935bc5762068caf3e24a2683b1b8a88
SHA1 82b70eb774c0756837fe8d7acbfeec05ecbf5463
SHA256 a8accfcfeb51bd73df23b91f4d89ff1a9eb7438ef5b12e8afda1a6ff1769e89d
SHA512 bed4f6f5357b37662623f1f8afed1a3ebf3810630b2206a0292052a2e754af9dcfe34ee15c289e3d797a8f33330e47c14cbefbc702f74028557ace29bf855f9e

C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\05DDC6AA91765AACACDB0A5F96DF8199

MD5 ac90eddd5bb96d3463d6d5d7878b5610
SHA1 efb6914c97fd3622a3416cba76f6a11261c8b59a
SHA256 a2198b6941d3e9ef097ea2a7069fd22cddfe9e3c42256401baab6290553364a1
SHA512 02784085354296701e918d238c3a41e7b399fb740cd456eba6fcf44deb9b8dde745f08e591f3482120d86d272b99785645ea30cdb71cd93682bf517bd9aa3d30

C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\05DDC6AA91765AACACDB0A5F96DF8199

MD5 d9e20c12ee3082ad3380462f46e95dd7
SHA1 482e0a4f7e2e26647a2838ffb7fd0aa81dec0f28
SHA256 ee05835b336839b3e365f1c1b33bc5873afe472371ca49d26f7a8cfecd1aab38
SHA512 04fa8d6f0ac6aa48c432f147e6e759fc90e8047f71f803ff32cd74d3441515aceb332893b77a9a65f986e7a9ebf5047ffb323e31e8e8bdea8414411bfadfaa1a

C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\05DDC6AA91765AACACDB0A5F96DF8199

MD5 915a95cdb1e4779159d871a771bd3f4d
SHA1 2f32f918061b99a9766f478a388b0fa7e5bba907
SHA256 fdb42bdea30e78d1c69d38f0bf22a9e3050931b199b2e63cb594e524102e9d63
SHA512 2ff940168b590a02bf1029c5cee2515ca5ff8429204c051217c20aa92ace57d328d17f55dd7e5d216ed55d383b9001b8421fac86c704118c5ccef7cea31b180e

C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

MD5 d5d05b0f5b8d3947de852e76bb577ae0
SHA1 f273b8b16dd0a2addef439ba3b4f7556a9e86f08
SHA256 2e9fcc1d80d29c3a37b158f2890b85a9e157e657453bdbe7155eed6cfa0f1376
SHA512 6d7f8e23f6da77b5e7da9c96cbbe39926c5da9c064480df28b037541a4cf8e87046849a7148a32e82ee37d35a0f929d5363dbfb5a2bd407986fecd30ac734d39

C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

MD5 8ee923562ba2913ad058b3019fce942f
SHA1 127e7b67101be8db8db52bab9fd957df5968de71
SHA256 a417f1319d509b78a997a143a8f98fc6e200de674322c8c8052b758089118f5f
SHA512 4a0d5e8b8a0dabf0fc04436f9a42c9b8902d9d9cc204cbc2e8e1080044e262b4a5f6780500a00c2aeb8b535f302d66c8e7a43f1d24c0bfffbc1debe2a7be9606

C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\C02877841121CC45139CB51404116B25_9CE832D646FBAFC5C4ACFC523FDD84AD

MD5 aeb6a92f6765b598f2a2af43de1bca8c
SHA1 5d515e596a29b8b4198952861deb27d70ea89c4f
SHA256 e0121ae86af0b9ee8e734e6ee252d0db826c358e2d5c20b1f9e080cf00cf86ef
SHA512 e5e5c3550418fce283ec95b41d20f814823c33b7b6f120ae2fbf699ea3195ec5f83b99964eb2440263774d92dc253d47a27438feb5403fcaeed42b52e015c2a8

C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\B3513D73A177A2707D910183759B389B_147AB4536A182B9FCE88E194D59F3B22

MD5 72bde6d1c35fedc47a854d0764f02719
SHA1 148144084bfda73a05c0dcdd7319188b2ccfe710
SHA256 c0992afdf2a1b91920cbc3f207bb5013437f8ecf8af00cdf22dcdd5dba916774
SHA512 71262c425eb8d1aab973778720fe489931d0abd2b3bf3de0169e0c90afb47ee522ad749c2472440f228e4a707887aba78a46a2245bc4b5a9339a0609de169570

C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

MD5 552043a955171afe0be0ae26abcef03e
SHA1 ede59e51db95cd9ddfb274b86f36dbd06b1fea76
SHA256 6e6d9e788a4bd7338a754b9f2361d1abf7b737e26a2902cb7662bbebe660d32f
SHA512 ce7db3d826d2f96b6bcd1124b72bd464a43407ce44b38c1a58eb2059998615189f1e0c35ed958f3d3f4194355a43a03914b72533431f9b535eaee240e97e7173

C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\070E0202839D9D67350CD2613E78E416

MD5 55540a230bdab55187a841cfe1aa1545
SHA1 363e4734f757bdeb89868efe94907774a327695e
SHA256 d73494e3446b02167573b3cde3ae1c8584ac26e15e45ac3ec0326708425d90fb
SHA512 c899cb1d31d3214fd9dc8626a55e40580d3b2224bf34310c2abd85d0f63e2dedaeae57832f048c2f500cb2cbf83683fcb14139af3f0b5251606076cdb4689c54

C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

MD5 c0355fd80eda0a04120c2665811b37c0
SHA1 bd5889902e8cfe59255ec4f3873ca80bbe6c2b6b
SHA256 6191a3c2eb9ac1e14c41a30ebf09bb33c650f879f9cc2f8c62f417d00764265e
SHA512 065d39ea1b49e7eda3c50d3ca23232fd6016de730ceca31ab66cd24abb8496afdc0679d71b6ffca0a5f590c6a241646dc0e32cc6c9bb1f9a5238dad30fd96f1e

C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\070E0202839D9D67350CD2613E78E416

MD5 3940b1dce94763aebeba8d2420934d71
SHA1 528368f9187a1e7a372855b17b7651cc594aadec
SHA256 ed8e7e110df8062d126137103ebdb4751a31b3cdb1a84b73f8055e2db9f21d52
SHA512 45dfb8c58a190f8393806331d0bf905ecf339df00109822026a4c8b331e9fc71523312c8e4679941f8fce0a982053276b8c7358edf6b49bbdb0bc1195179bd2d

C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

MD5 8788bef292b8f1ec571066ae779a88b0
SHA1 2c68050c85b9162e5c38e5a1ea2d4a631b30b67a
SHA256 b84e8452521a5adfea0c830407f62b8e29beb578ef910d00d8f470f4cfb536ed
SHA512 7a5f35f23db1724b10d40afad6cd5d4f39459d455a19a7f40a43160fd7ecc071d40c2dc09c9581d17e26e7ebf1e1f3568d2abcaa6dbb7a7798f652c757496959

C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

MD5 a190be53e4f7cf52e4627218813827df
SHA1 07ff791d0e19df1300158155d7d6603a22473dad
SHA256 d53fb5ef127c7cb6973397481f0c02aa61f2466a6da6df5ec887804c2a24d4df
SHA512 79f4176ec8d4f8dd2cc9341293f59436f5c72b5b359b3fcf2cc4f5c6911dea2148ae75a2769397c252c7c183f75ac4b9e6e9741e422f765cc4396157ff141f03

C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

MD5 85e6f3c0543fb52908a8f60235dd105e
SHA1 b43170a356d5439ee2dcb9b170082f7d4c1ce8b6
SHA256 164c04788b200f30e474ec383417c4049930eaad5901f4ea0511f7de5145378b
SHA512 54b15a7b838b936069590481bc7e6e8e3d57cae94f08f255c4bbda4e9854e2823c6616717f51e708eb2c847c5e615d6cab6efad109861167912f3f43a44d3f52

C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\3H1FOMV1\f[1].txt

MD5 11e43126754b46faec3233cf61646b70
SHA1 ca2edbaba7ebda4c31aea5b85368d0f7092edc41
SHA256 2d4c2bd4a118aec88608dd50c912907b89359ddba1badc8672c3554e4304efd4
SHA512 584ff5473f15dc7e512ba4ba53e34bc7321e6349554ce687d380b9e31772fa3c00052fcc81ef9bcdc7ba3b7c85b18cbcfabddbbfb7c1d7d8cc010c1686d2b95f

C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

MD5 f390c23d332e29ed79151fcfb4467f1c
SHA1 7b55b715b1ca6af4d6394f0d0359e1e9c1f1924b
SHA256 5577933d5719fcd140f531f4f00be26b5160ebf5273d01873cb3e3cec2e86fe7
SHA512 f5fcc5e2267806ed8061158a6cf5d636e079ad8d8259b8a8649b2c56e01c200f4101a5d9365c5e6ff18f8d996bb34f263643afd16ecc8010be0fccd9717a7f11

C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

MD5 ec98498bb685e172e1f9ff557ac9ec8d
SHA1 ae48ff778d264a2820ce75a0a494a626ed60395d
SHA256 2b9296551a67dcd442ae3726077216ce9c55cc909793e853173ff9527ca67949
SHA512 a8e34463b155b18984a8cf8db351cfb45e858543564ee199d7d435fb468366d19f3598769ae28086d6f7bbb44f0ed31eca63b5ab8931f33cfbd543278a3fd38d

C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

MD5 aacb375b7a6cc21fd71b8cdb976be446
SHA1 9301e3f7064cbb6c69c0044e220963955796c82f
SHA256 148fd097b76f140a92b180b540aed491bcd8710286dcbed73dadf5a3173dbe81
SHA512 0108b1a6dbe5ce1ef9c5a80e15b91e1fd6c34be690d35f1b5f4e0880beb1c41884d9db4411581e51ef7f91b7dcad8e6b853bf6b77439df8b4e01edd7ad287caf

C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

MD5 0e3abadfd2ce96903a4b916a06267e41
SHA1 733e6c194687c0307c531de4924a8aea642ba0ca
SHA256 8b3d98b8da43656f735130fedf0e374ecdbfdde9b84ccdf67f7735b5b287e998
SHA512 5c6bf588f7b5f611e17865cdd48b4856db80a9d2fe7eb952a400d48d3c0eef9a7c9d2f01be93f2159d3f18d886c6038ab38f95335052b7c72e67c4b2a99934d3

C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

MD5 165aaa343377ed3d021c4ad81ce1574d
SHA1 d93f520a1545d1acdf4f3c7035034a1825d0cf69
SHA256 7062577961d5195e008b5a71b0e4f5a5ae5c1e947159660fa8e0ebd2dbe3da6e
SHA512 baaf16dc9ed3b93a5596d56507c935bbd8a152fc225003095c7d5956616d89ba52df81126a1a5394627cce185f2fc2d2ecdc4e73f32d3e34415d281cad461a5b

C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

MD5 e3e796376890fe507e8dbbe28a8995ff
SHA1 570402cb9a031b3b6a5d94da92a06cd070c8b3c8
SHA256 c9abbdf6bc3c116b3abb440ada1a8f2c47898314219fb8fe4576de8091da6276
SHA512 3c85dfb5da86f262caa24a284ed8cb5d660eee5c5c90670797a5110417d88e5acd44672d61a873d515b109879228a6f8827cb1bf41a05b99cfbc289febf502ef

C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

MD5 a2c60d8bcd56d3740a4b721fb7b16c8d
SHA1 04e7b777c873e313a27f3a9d1181c144d4d76b8a
SHA256 2430864ffcb377436f6dd9530333be5b9a6447177cda9ed6f163a1017a759478
SHA512 bae18ca0e19bc740b73bb503d21f4a887209b3e5732d1adf8fe28f6717345ac611bf0f5496960ef696489e1d9f0e769533eeca669b7b2bff5e0a80af2d8c44f1

C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

MD5 30dd73d91bcac37fbdbd787453e0b0e9
SHA1 9b38b53dfe0133abcf21ca25685290c36fe2b7a1
SHA256 ece7be8ea657999876d31be13f2687bc058715e8985d182cf9c3e2971950a585
SHA512 1c4fcb956ad52b1c5dffff6a50c229a262254276161f2e52d90c424d4137bd25c3dab6ba03954c4dd8d3056121ff56fd79c0ab63754d4e378538f82a1af575cd

C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

MD5 2759e2a7a3ed5d7424821167113b81ac
SHA1 452519c0327f4ee205cca3c675f6829e91d88562
SHA256 5cdf2e2f1ea156cf909f1107e3e852f65f052aab976ab1fa395060a58f903aed
SHA512 2e0bffc21d368778131334b7ab1e1df38edf08cda2b9f84aad06f2f07e8b0df73977307f11437fadae024fe613539f2863002c1c83971b1350be46e16078c77d

C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

MD5 497b72d26ba6a11b40125abfc18650e8
SHA1 bb0def36a07c98dc15f3317c68dce1bc755dc263
SHA256 718c59f8396b991b7f7386c70f12a2c72391fe7b3151d26215ae3a4392f0716c
SHA512 abd5466252a3d50af4544ae13b79221baa9524c4ad75a8cf3295c3db93a355e448ec9a7d265960f3286a0b7a50f9b39d10d9e0478eb68aad587c015f3c24b976

C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

MD5 b8093535fe213f5e9034bef8dec82614
SHA1 f06d7d44e61e0d2b6b6b6d8239e39797a308cde9
SHA256 5946ba3a2cb366bba02798ab9725655de4abe85a4c8e5f382132030ce81d60a6
SHA512 a286162308e1d24287b177b79a06c4b0199c86948047a42f78fc8cf3066efa9691c9afab4dd7d8a3562266f8f212f15d4c447c869df1371b68ae1f673740e624

C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

MD5 6d00bf7836e3e9b140b5eb9b01e09db3
SHA1 afa4e7f9f853cd8627f114cb594cbfe23c2e436d
SHA256 e9de6f393ac88f427de1c45740919adac3aafd3b5971fe500ebbd0336f93a7c8
SHA512 5809cebe90cd249ec8ab00ef8bda1fdddaa17cc23d329678a7ca9f6c1095a082e78298e047e5fa5a2a251bbb6aa6ba7ac7cebca3d67cb4244e967350eeb49a02

C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

MD5 09deb1e8b9cb3971c89c4f898d14329b
SHA1 eb891b75da0f6631d475eb6002d6b46374c4e06d
SHA256 a2380b75491362287e9f4596bb43be39e39161b90f6c8936ebc79975ed7557d8
SHA512 32e8e1286007cbe6d8a6a3826fc6fba84c83efbab73c0911c9bd471647b01a37b4f91422d288799e7b12497fd33f2dba03ed7bbcfdb585e36fc9686b90c32671

C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

MD5 4f3df0ab66a80defbbbd9f2266995d90
SHA1 c1dd59e8b6b63d87740550348498a504880bdc88
SHA256 1693a816382586bfcfaa836fad616fa321ff7c7b43294ec8a2de5288d44a9315
SHA512 b4eef1c020df28961b1d392cb20ce29715fcade428eb34e909a3be732675af63cb1ef937a784943ad087470d20c4bd71c54e0054b592126b40973d1bedd681ac

C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

MD5 46834c12af66baf840cdddb51dbd6e3c
SHA1 9bb796b5dbb104010ae95cb8f75abb3389a73ff0
SHA256 c345c9952043fe7f939b32fc0d253043e0e1fb0f2e25aa6d92fc8049f8a2f2b1
SHA512 02e22518bc142967c2690c2f7aaf850394bbbfa68d5b9b34b5a53e0a6ed4f6ed570b19a441a21bc6e531c2644b7bfb7d2970b8099862b8c80e435cee9be8de18

C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

MD5 a4ffdf254ac95cfdd2d017acff17a9b2
SHA1 b0e2b2e70f62310d2f4b2a29f29ac11be36e3b4d
SHA256 fd0983b1dcb0d40d100a1d5f4f0ebecbcfd2ef00cea304a47472a63f45d325f2
SHA512 983e1fd03522094f228237f4ea329d7259ca03a7761f4b147a753b7dbcdebeb34eb5bbf0db731b4a7c2ac950be364b1d7a4fefe97d556a1143ef16f6449221e1

C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\F0ACCF77CDCBFF39F6191887F6D2D357

MD5 676b640f317168d97dafe1630262f2d8
SHA1 7a2e8effc4a4d0fbdcd26ba7781b064e56a78102
SHA256 4b232808e3a3459be2faa423ecb5db7bfbbce6909b3010c938b70db5804e162a
SHA512 a6b98800a254342fb3b47f7a19a1e0192fbdde1df851c40735448029a85a7588542a7298216a1c4d902a36c08813f5b7d34fa244b28482b254e891caffdb01e7

C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\F0ACCF77CDCBFF39F6191887F6D2D357

MD5 a266bb7dcc38a562631361bbf61dd11b
SHA1 3b1efd3a66ea28b16697394703a72ca340a05bd5
SHA256 df545bf919a2439c36983b54cdfc903dfa4f37d3996d8d84b4c31eec6f3c163e
SHA512 0da8ef4f8f6ed3d16d2bc8eb816b9e6e1345dfe2d91160196c47e6149a1d6aedaafadcefd66acdea7f72dcf0832770192ceac15b0c559c4ccc2c0e5581d5aefc

C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

MD5 4143cdb38e26bd90fb5ffa15470b3f7e
SHA1 03f12171a6babab455406212d8c988ecf8e8a6f6
SHA256 3dd4aa77a5e2fe1a1c35c06058f2efaa6291b58a61b16913b0ad0b9d1390aea6
SHA512 6d0be4387bf67d3363f867e1305a29e92ed02ddaa3900ae34d9ce2a6c4b6953526bd6b397604f6546739dcae6e212cdc09a3d57c37f5d30630393dfc62abde50

C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

MD5 8aeedfda697db1da55dc0ecd527a0b60
SHA1 02bdcf6b90162748180d7fd29f3b2be52f61f7bf
SHA256 6b95f0754674b5db8b4399c4e15abf6f0f35eab87fa2c7480fb132fbbeff2ecd
SHA512 c593ad36b440a19de803bfe91af373ad24c7b25ab45af08fb891feb2da1618207bfa826062aa377ae4dd0361779ed90cae779e5caa023b1fd9bf064576e276b9

C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

MD5 75d6d3bfb335e4f0ac24a9266b3e028b
SHA1 be8e7a81099fd253f541be70c50260ab6fb8aa91
SHA256 fad7a1b7edd621ab433590cf3140a146bd1939c6041c39851080191927910dc6
SHA512 1e07928becd9e5e8a830dc421fbd4b5ca4cbe483b13cc145e7147f950856dd59d5c0bd07fff7f6f3c6d140e491def4008d261626ff3d85068bf02f7ba89dd60a

C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

MD5 c6e7bfbd5319a4e95a40cc3b147244d0
SHA1 e2250708087d1e21ff235876e0e6c974d0c552e3
SHA256 2d495115d3421d7e5c2299ba38e4036d83fef37cc90180e871b18816bf03b66b
SHA512 f9fe361887623d4fdcb7b003704d366ecc921743657913778161633091e1f0ebf127169331ed088081ed411317d105039eb0b447f4ec513639f919a3b68a5d6f

C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

MD5 2dfa6c10f171cd12021baac41acaac69
SHA1 6edc039d5910239c3e4233d1a5145872946bee54
SHA256 cff0584a802737c24cc046b97a6c0a9b889b8f50ae69940d755273a560114f81
SHA512 b1d5dd03ac81b9d4454d98d79f433324940853c3525dbab139d5ef9e151131ccbad5af8a096b93a43d78002f0d66af7d37784d43958f0b92b7a90e28bdddea84

C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\3C428B1A3E5F57D887EC4B864FAC5DCC

MD5 469dc43c7827b08bf7dfdeb0abc2eea0
SHA1 827bd6f8de6c04e737711b9c84fc38e1a98f2267
SHA256 b77fcadbc548640b1c37842ebc13c5c7822e309b74ef1f66315aaf11b34acf23
SHA512 2976da0f7d002c2346d304e08db239ca051b4996fb2b09008f3b15eca6218fe53ce347f6e70a0a1a1115670c9927a4ed99dc1da79fec5014a6a3832073bcbb13

C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\3C428B1A3E5F57D887EC4B864FAC5DCC

MD5 e4a68ac854ac5242460afd72481b2a44
SHA1 df3c24f9bfd666761b268073fe06d1cc8d4f82a4
SHA256 cb3ccbb76031e5e0138f8dd39a23f9de47ffc35e43c1144cea27d46a5ab1cb5f
SHA512 5622207e1ba285f172756f6019af92ac808ed63286e24dfecc1e79873fb5d140f1ceb7133f2476e89a5f75f711f9813a9fbb8fd5287f64adfdcc53b864f9bdc5

Analysis: behavioral2

Detonation Overview

Submitted

2024-08-27 04:03

Reported

2024-08-27 04:05

Platform

win10v2004-20240802-en

Max time kernel

145s

Max time network

143s

Command Line

"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\c451ef2d82fbe2998af9c0c166cacfcb_JaffaCakes118.html

Signatures

Browser Information Discovery

discovery

Enumerates system info in registry

Description Indicator Process Target
Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe N/A
Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe N/A
Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe N/A

Suspicious use of FindShellTrayWindow

Description Indicator Process Target
N/A N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe N/A
N/A N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe N/A
N/A N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe N/A
N/A N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe N/A
N/A N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe N/A
N/A N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe N/A
N/A N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe N/A
N/A N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe N/A
N/A N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe N/A
N/A N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe N/A
N/A N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe N/A
N/A N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe N/A
N/A N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe N/A
N/A N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe N/A
N/A N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe N/A
N/A N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe N/A
N/A N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe N/A
N/A N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe N/A
N/A N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe N/A
N/A N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe N/A
N/A N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe N/A
N/A N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe N/A
N/A N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe N/A
N/A N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe N/A
N/A N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe N/A

Suspicious use of SendNotifyMessage

Description Indicator Process Target
N/A N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe N/A
N/A N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe N/A
N/A N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe N/A
N/A N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe N/A
N/A N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe N/A
N/A N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe N/A
N/A N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe N/A
N/A N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe N/A
N/A N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe N/A
N/A N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe N/A
N/A N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe N/A
N/A N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe N/A
N/A N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe N/A
N/A N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe N/A
N/A N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe N/A
N/A N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe N/A
N/A N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe N/A
N/A N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe N/A
N/A N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe N/A
N/A N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe N/A
N/A N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe N/A
N/A N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe N/A
N/A N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe N/A
N/A N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe N/A

Suspicious use of WriteProcessMemory

Description Indicator Process Target
PID 668 wrote to memory of 3212 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 668 wrote to memory of 3212 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 668 wrote to memory of 224 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 668 wrote to memory of 224 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 668 wrote to memory of 224 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 668 wrote to memory of 224 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 668 wrote to memory of 224 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 668 wrote to memory of 224 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 668 wrote to memory of 224 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 668 wrote to memory of 224 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 668 wrote to memory of 224 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 668 wrote to memory of 224 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 668 wrote to memory of 224 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 668 wrote to memory of 224 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 668 wrote to memory of 224 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 668 wrote to memory of 224 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 668 wrote to memory of 224 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 668 wrote to memory of 224 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 668 wrote to memory of 224 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 668 wrote to memory of 224 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 668 wrote to memory of 224 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 668 wrote to memory of 224 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 668 wrote to memory of 224 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 668 wrote to memory of 224 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 668 wrote to memory of 224 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 668 wrote to memory of 224 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 668 wrote to memory of 224 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 668 wrote to memory of 224 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 668 wrote to memory of 224 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 668 wrote to memory of 224 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 668 wrote to memory of 224 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 668 wrote to memory of 224 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 668 wrote to memory of 224 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 668 wrote to memory of 224 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 668 wrote to memory of 224 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 668 wrote to memory of 224 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 668 wrote to memory of 224 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 668 wrote to memory of 224 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 668 wrote to memory of 224 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 668 wrote to memory of 224 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 668 wrote to memory of 224 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 668 wrote to memory of 224 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 668 wrote to memory of 2124 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 668 wrote to memory of 2124 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 668 wrote to memory of 2456 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 668 wrote to memory of 2456 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 668 wrote to memory of 2456 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 668 wrote to memory of 2456 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 668 wrote to memory of 2456 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 668 wrote to memory of 2456 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 668 wrote to memory of 2456 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 668 wrote to memory of 2456 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 668 wrote to memory of 2456 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 668 wrote to memory of 2456 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 668 wrote to memory of 2456 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 668 wrote to memory of 2456 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 668 wrote to memory of 2456 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 668 wrote to memory of 2456 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 668 wrote to memory of 2456 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 668 wrote to memory of 2456 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 668 wrote to memory of 2456 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 668 wrote to memory of 2456 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 668 wrote to memory of 2456 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 668 wrote to memory of 2456 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe

Processes

C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe

"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\c451ef2d82fbe2998af9c0c166cacfcb_JaffaCakes118.html

C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe

"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffc603146f8,0x7ffc60314708,0x7ffc60314718

C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe

"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2268,7117986941298218789,6166615102500906804,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2280 /prefetch:2

C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe

"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2268,7117986941298218789,6166615102500906804,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2332 /prefetch:3

C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe

"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2268,7117986941298218789,6166615102500906804,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2604 /prefetch:8

C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe

"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2268,7117986941298218789,6166615102500906804,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3244 /prefetch:1

C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe

"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2268,7117986941298218789,6166615102500906804,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3252 /prefetch:1

C:\Windows\System32\CompPkgSrv.exe

C:\Windows\System32\CompPkgSrv.exe -Embedding

C:\Windows\System32\CompPkgSrv.exe

C:\Windows\System32\CompPkgSrv.exe -Embedding

C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe

"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2268,7117986941298218789,6166615102500906804,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4704 /prefetch:1

C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe

"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2268,7117986941298218789,6166615102500906804,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4804 /prefetch:1

C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe

"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2268,7117986941298218789,6166615102500906804,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5252 /prefetch:1

C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe

"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2268,7117986941298218789,6166615102500906804,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=6176 /prefetch:8

C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe

"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2268,7117986941298218789,6166615102500906804,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=6176 /prefetch:8

C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe

"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2268,7117986941298218789,6166615102500906804,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6168 /prefetch:1

C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe

"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2268,7117986941298218789,6166615102500906804,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5628 /prefetch:1

C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe

"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2268,7117986941298218789,6166615102500906804,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=13 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4136 /prefetch:1

C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe

"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2268,7117986941298218789,6166615102500906804,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=14 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5632 /prefetch:1

C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe

"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2268,7117986941298218789,6166615102500906804,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=6248 /prefetch:2

Network

Country Destination Domain Proto
US 8.8.8.8:53 8.8.8.8.in-addr.arpa udp
US 8.8.8.8:53 ajax.googleapis.com udp
US 8.8.8.8:53 www.blogger.com udp
US 8.8.8.8:53 apis.google.com udp
FR 142.250.179.105:443 www.blogger.com tcp
FR 142.250.179.74:443 ajax.googleapis.com tcp
FR 142.250.178.142:443 apis.google.com tcp
US 8.8.8.8:53 www.linkwithin.com udp
SG 118.139.179.30:80 www.linkwithin.com tcp
FR 142.250.179.105:443 www.blogger.com udp
SG 118.139.179.30:80 www.linkwithin.com tcp
FR 142.250.178.142:443 apis.google.com udp
FR 142.250.179.66:445 pagead2.googlesyndication.com tcp
US 8.8.8.8:53 s7.addthis.com udp
US 8.8.8.8:53 resources.blogblog.com udp
US 8.8.8.8:53 twittermarketingtips.co.uk udp
US 8.8.8.8:53 2.bp.blogspot.com udp
US 8.8.8.8:53 www.expressnightout.com udp
US 8.8.8.8:53 1.bp.blogspot.com udp
US 8.8.8.8:53 farm4.staticflickr.com udp
US 8.8.8.8:53 3.bp.blogspot.com udp
FR 216.58.214.66:80 pagead2.googlesyndication.com tcp
GB 104.96.173.184:80 s7.addthis.com tcp
FR 142.250.179.105:443 resources.blogblog.com tcp
FR 142.250.179.97:80 3.bp.blogspot.com tcp
FR 142.250.179.97:80 3.bp.blogspot.com tcp
US 8.8.8.8:53 www.photoshopsupport.com udp
FR 142.250.179.97:80 3.bp.blogspot.com tcp
FR 142.250.179.97:80 3.bp.blogspot.com tcp
FR 142.250.179.97:80 3.bp.blogspot.com tcp
FR 142.250.179.97:80 3.bp.blogspot.com tcp
GB 18.245.160.68:80 farm4.staticflickr.com tcp
FR 142.250.179.97:80 3.bp.blogspot.com tcp
SG 118.139.179.30:80 www.linkwithin.com tcp
GB 104.96.173.184:443 s7.addthis.com tcp
US 8.8.8.8:53 www.topazlabs.com udp
GB 18.245.160.68:443 farm4.staticflickr.com tcp
US 8.8.8.8:53 farm7.static.flickr.com udp
US 192.185.4.85:80 twittermarketingtips.co.uk tcp
IE 34.249.200.254:80 www.topazlabs.com tcp
US 8.8.8.8:53 lh3.googleusercontent.com udp
GB 18.245.160.68:80 farm7.static.flickr.com tcp
US 8.8.8.8:53 www.naturescapes.net udp
US 138.197.75.216:80 www.naturescapes.net tcp
US 207.150.208.67:80 www.photoshopsupport.com tcp
FR 142.250.178.129:443 lh3.googleusercontent.com tcp
US 8.8.8.8:53 ghozaliq.files.wordpress.com udp
GB 18.245.160.68:443 farm7.static.flickr.com tcp
US 8.8.8.8:53 www.best-4-u.com udp
IE 34.249.200.254:443 www.topazlabs.com tcp
US 192.0.72.19:80 ghozaliq.files.wordpress.com tcp
US 50.116.87.153:80 www.best-4-u.com tcp
US 192.185.4.85:80 twittermarketingtips.co.uk tcp
US 8.8.8.8:53 217.106.137.52.in-addr.arpa udp
US 8.8.8.8:53 74.32.126.40.in-addr.arpa udp
US 8.8.8.8:53 105.179.250.142.in-addr.arpa udp
US 8.8.8.8:53 74.179.250.142.in-addr.arpa udp
US 8.8.8.8:53 142.178.250.142.in-addr.arpa udp
US 8.8.8.8:53 172.214.232.199.in-addr.arpa udp
US 8.8.8.8:53 66.214.58.216.in-addr.arpa udp
US 8.8.8.8:53 95.221.229.192.in-addr.arpa udp
US 8.8.8.8:53 184.173.96.104.in-addr.arpa udp
US 8.8.8.8:53 97.179.250.142.in-addr.arpa udp
US 8.8.8.8:53 68.160.245.18.in-addr.arpa udp
US 8.8.8.8:53 30.179.139.118.in-addr.arpa udp
US 8.8.8.8:53 254.200.249.34.in-addr.arpa udp
US 192.0.72.19:443 ghozaliq.files.wordpress.com tcp
US 207.150.208.67:80 www.photoshopsupport.com tcp
US 138.197.75.216:443 www.naturescapes.net tcp
US 8.8.8.8:53 static.tabloidpulsa.co.id udp
US 172.67.166.21:80 static.tabloidpulsa.co.id tcp
US 172.67.166.21:80 static.tabloidpulsa.co.id tcp
US 172.67.166.21:80 static.tabloidpulsa.co.id tcp
US 172.67.166.21:80 static.tabloidpulsa.co.id tcp
US 172.67.166.21:80 static.tabloidpulsa.co.id tcp
US 172.67.166.21:80 static.tabloidpulsa.co.id tcp
US 8.8.8.8:53 ghozaliq.wordpress.com udp
US 172.67.166.21:80 static.tabloidpulsa.co.id tcp
US 192.0.78.13:443 ghozaliq.wordpress.com tcp
US 172.67.166.21:80 static.tabloidpulsa.co.id tcp
US 172.67.166.21:80 static.tabloidpulsa.co.id tcp
US 172.67.166.21:80 static.tabloidpulsa.co.id tcp
US 172.67.166.21:80 static.tabloidpulsa.co.id tcp
US 172.67.166.21:80 static.tabloidpulsa.co.id tcp
US 8.8.8.8:53 shirotholmustaqim.files.wordpress.com udp
US 8.8.8.8:53 blog.fastncheap.com udp
US 8.8.8.8:53 img145.imageshack.us udp
US 8.8.8.8:53 alamindawa.com udp
US 8.8.8.8:53 lh6.googleusercontent.com udp
FR 142.250.179.97:80 3.bp.blogspot.com tcp
US 192.0.72.28:80 shirotholmustaqim.files.wordpress.com tcp
US 38.99.77.16:80 img145.imageshack.us tcp
DE 3.64.163.50:80 blog.fastncheap.com tcp
SG 118.139.179.30:80 www.linkwithin.com tcp
FR 142.250.179.97:80 3.bp.blogspot.com tcp
FR 142.250.179.97:80 3.bp.blogspot.com tcp
US 8.8.8.8:53 4.bp.blogspot.com udp
FR 142.250.178.129:443 lh6.googleusercontent.com udp
FR 142.250.179.97:80 4.bp.blogspot.com tcp
NL 190.2.139.23:80 alamindawa.com tcp
FR 216.58.214.66:139 pagead2.googlesyndication.com tcp
US 192.0.72.28:443 shirotholmustaqim.files.wordpress.com tcp
FR 142.250.179.97:80 4.bp.blogspot.com tcp
US 8.8.8.8:53 129.178.250.142.in-addr.arpa udp
US 8.8.8.8:53 19.72.0.192.in-addr.arpa udp
US 8.8.8.8:53 85.4.185.192.in-addr.arpa udp
US 8.8.8.8:53 shirotholmustaqim.wordpress.com udp
US 8.8.8.8:53 61.39.156.108.in-addr.arpa udp
US 8.8.8.8:53 216.75.197.138.in-addr.arpa udp
US 8.8.8.8:53 67.208.150.207.in-addr.arpa udp
US 8.8.8.8:53 153.87.116.50.in-addr.arpa udp
US 8.8.8.8:53 21.166.67.172.in-addr.arpa udp
US 8.8.8.8:53 13.78.0.192.in-addr.arpa udp
US 8.8.8.8:53 28.72.0.192.in-addr.arpa udp
US 8.8.8.8:53 23.139.2.190.in-addr.arpa udp
US 8.8.8.8:53 16.77.99.38.in-addr.arpa udp
US 8.8.8.8:53 50.163.64.3.in-addr.arpa udp
US 50.116.87.153:80 www.best-4-u.com tcp
DE 3.64.163.50:80 blog.fastncheap.com tcp
SG 118.139.179.30:80 www.linkwithin.com tcp
US 8.8.8.8:53 ogjovpgrnv.in udp
US 8.8.8.8:53 googleads.g.doubleclick.net udp
DE 3.64.163.50:80 blog.fastncheap.com tcp
FR 142.250.178.130:443 googleads.g.doubleclick.net tcp
US 8.8.8.8:53 g.bing.com udp
US 150.171.27.10:443 g.bing.com tcp
US 8.8.8.8:53 130.178.250.142.in-addr.arpa udp
US 8.8.8.8:53 10.27.171.150.in-addr.arpa udp
US 8.8.8.8:53 58.99.105.20.in-addr.arpa udp
GB 95.101.143.201:443 www.bing.com tcp
US 8.8.8.8:53 201.143.101.95.in-addr.arpa udp
N/A 224.0.0.251:5353 udp
US 8.8.8.8:53 104.219.191.52.in-addr.arpa udp
US 8.8.8.8:53 onpas.blogspot.com udp
FR 142.250.75.225:80 onpas.blogspot.com tcp
US 8.8.8.8:53 225.75.250.142.in-addr.arpa udp
US 8.8.8.8:53 26.165.165.52.in-addr.arpa udp
US 8.8.8.8:53 198.187.3.20.in-addr.arpa udp
US 8.8.8.8:53 73.144.22.2.in-addr.arpa udp
US 8.8.8.8:53 55.36.223.20.in-addr.arpa udp
US 8.8.8.8:53 43.229.111.52.in-addr.arpa udp
US 8.8.8.8:53 tse1.mm.bing.net udp
US 150.171.28.10:443 tse1.mm.bing.net tcp
US 150.171.28.10:443 tse1.mm.bing.net tcp
US 150.171.28.10:443 tse1.mm.bing.net tcp
US 150.171.28.10:443 tse1.mm.bing.net tcp
US 150.171.28.10:443 tse1.mm.bing.net tcp
US 8.8.8.8:53 43.58.199.20.in-addr.arpa udp

Files

C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad\settings.dat

MD5 983cbc1f706a155d63496ebc4d66515e
SHA1 223d0071718b80cad9239e58c5e8e64df6e2a2fe
SHA256 cc34b8f8e3f4bfe4c9a227d88f56ea2dd276ca3ac81df622ff5e9a8ec46b951c
SHA512 d9cf2ca46d9379902730c81e615a3eb694873ffd535c6bb3ded2dc97cdbbfb71051ab11a07754ed6f610f04285605b702b5a48a6cfda3ee3287230c41c9c45cd

\??\pipe\LOCAL\crashpad_668_CQQPTLYSJQZCJUOZ

MD5 d41d8cd98f00b204e9800998ecf8427e
SHA1 da39a3ee5e6b4b0d3255bfef95601890afd80709
SHA256 e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855
SHA512 cf83e1357eefb8bdf1542850d66d8007d620e4050b5715dc83f4a921d36ce9ce47d0d13c5d85f2b0ff8318d2877eec2f63b931bd47417a81a538327af927da3e

C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad\settings.dat

MD5 111c361619c017b5d09a13a56938bd54
SHA1 e02b363a8ceb95751623f25025a9299a2c931e07
SHA256 d7be4042a1e3511b0dbf0ab5c493245e4ac314440a4ae0732813db01a21ef8bc
SHA512 fc16a4ad0b56899b82d05114d7b0ca8ee610cdba6ff0b6a67dea44faf17b3105109335359b78c0a59c9011a13152744a7f5d4f6a5b66ea519df750ef03f622b2

C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Preferences

MD5 a550bc876ab32b92af479f73c11ba87c
SHA1 13b81a365823d3d1b98a5297f9cbf5f64bbba0ba
SHA256 4352867329ab1102b93f3b57197ed64eb2e4b11326f38626a376240900ca1cc3
SHA512 9c3160470d2b3b12e3db230f5882e53c6996531b728f47ae2a9c0131afec43ccefee9dc15fcd12e64a274bd3a476250206a6aa5334e9a216b46442ec82f91cb5

C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\77EC63BDA74BD0D0E0426DC8F8008506

MD5 4875361c2024a0af6b603d333111a35f
SHA1 e114e1dad288885b6944d96081a7112c87f62f55
SHA256 f17f21c11ff49aa654995dc47beed1ad75d9d65d8403efb671f01c28ead5d3cf
SHA512 c96d1ab9af6600fcaa704b2463a2d6ed4798b66e3a9c740a23fbe60f29c8bb83ba790e1685068787eee75d79928d2f259372698ca646a141cd46e3b5726bfc87

C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\070E0202839D9D67350CD2613E78E416

MD5 55540a230bdab55187a841cfe1aa1545
SHA1 363e4734f757bdeb89868efe94907774a327695e
SHA256 d73494e3446b02167573b3cde3ae1c8584ac26e15e45ac3ec0326708425d90fb
SHA512 c899cb1d31d3214fd9dc8626a55e40580d3b2224bf34310c2abd85d0f63e2dedaeae57832f048c2f500cb2cbf83683fcb14139af3f0b5251606076cdb4689c54

C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\77EC63BDA74BD0D0E0426DC8F8008506

MD5 57fa97821d960db6c13e5b4d15f94707
SHA1 28cafdfcf024add5e694b794fc559e322bf2f581
SHA256 9039553c69908f61c473d7f3e10af6b8d296e57441be0826ee5add4d1fa9df06
SHA512 8e238b012fb37e13c1875e8992659245d4511d5c72a5ae3f6f9aa22f2b543de19ed9b60f62d9d381d2a2f94d2ba91ce635ef7addc67fd8286225d5756840bab4

C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Cache\f_00000c

MD5 aa6a698d1c7fc6d35265b10af5570e9c
SHA1 00da372ad4964a5d5b8afff7fe1b207ff284f232
SHA256 02f6ae7bda59fb1a20d3386021fb972ced348bf724fea42157225d416f9f049a
SHA512 f5b2f732e899cc0fed577e1ef1c51c154ede5d206543e8ac7c1fabb182901f8e93e137b63f12cbb87b3f570a283a368bfb1b9d637cc5b1c4f1669ff5cfbf306b

C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Local State

MD5 3c5bd0fa9c4da2997a31fceeb825a703
SHA1 ae3350075fa19777bb9d72140896f383e34a381d
SHA256 f8d16caf1c6a431409c2899ba956eef8fc198c8a5571480a1c42631be6daf05b
SHA512 d9c7905caf518663259e8bdb338ebe151594ffd129fe6b33902c37f22b952cb8245f5cd1afdb881632974d85a452f2e43746487965d58e9c21947a38ca8822f5

C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Preferences

MD5 99d5837ddbdc7d7ab31ae7744a2bbca0
SHA1 d8f5491ff250955d387d0d48cb7467ad91122a9d
SHA256 7d7ef335f4b6356022306a4c2e7e0f444166738596102da2ff842c6c5c44da97
SHA512 214acedca11c62f2a3db79e0f96272f009782e27019838788639f581ceaf33293df99d5a7d01da5513aef4791cdf04b79694c84c97ea2c1aa9d8ed73f9585874

C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index

MD5 6680e4d18c4daac71ad2c0b26232bac1
SHA1 77aca33bb7ec5f0ba59d243586d3aaa9c00e72ce
SHA256 9b9ac885caab6dd767967d42b1702f8d8e0f546be945bd5a479e9069f2402a8f
SHA512 ed96e0f1da0ad6ff435c95d41a5b1d78a34018cc4583e40e072c7d37de3718281be5867a3c2fa0d9f70eae55c0cadb963f87aeb39479fc2e136866e720844d8f

C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\data_reduction_proxy_leveldb\CURRENT

MD5 6752a1d65b201c13b62ea44016eb221f
SHA1 58ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA256 0861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA512 9cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389

C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Preferences

MD5 6f8173f9945517ef4fadd8c604c2cd03
SHA1 b213b9ab3ea7181f5e7c48959f057182ee3dbac3
SHA256 d1b6f1af13560c678a772476c0b48623256c530451b7e6bb2c534ee7fab9138a
SHA512 fb52631cc761140fe05bdd565117dad1e66e10b0c513ec1051060987a7617b3ec587b61bc0639a704838eccb91c79a500260ecdea1517c4bfe9bb6bdff248a09

C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Network Persistent State

MD5 72d8a8264e202ddf3235f2bf995d9eea
SHA1 ef609d4e784100644d4a5492fcf2241107058ba1
SHA256 950ec36b0af077bfe5c6877a7275e6a1bdca43e99c133746ca2260a5770964a4
SHA512 59125f7524aae2c484f278f15454d37f21898561472f5f441d77483441a358e3caf9816ce61a21f192eec97fb156ed7f4f5364f071be03097b24b5e6e665f661