Analysis

  • max time kernel
    148s
  • max time network
    150s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20250129-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20250129-enlocale:en-usos:windows10-2004-x64system
  • submitted
    04-02-2025 00:17

General

  • Target

    JaffaCakes118_8e00e54479d218e50a55e497c2600948.exe

  • Size

    2.4MB

  • MD5

    8e00e54479d218e50a55e497c2600948

  • SHA1

    01f2b7b68083770c037110ec4fd19dc84d03ef75

  • SHA256

    7bfb50d5f82d0f807e5e179d0cf44d65068451d95e217b8b68fc3c4372995236

  • SHA512

    e55ea16c60955ca20acef6da518fa428d2dd804f975c8bf3a63fc610cba5a37ac437135ce496e8889982d2584cfee38c6d705b9498cc9a80b3d13f4a0ab5459e

  • SSDEEP

    49152:BiwHJXlGV+KUipeLzAFSirQAQK828oy4/w7OdYVhh78MTMeHn:BiCJ6NFrFSiroK828o07cYRKin

Malware Config

Signatures

  • Ardamax

    A keylogger first seen in 2013.

  • Ardamax family
  • Ardamax main executable 1 IoCs
  • Drops file in Drivers directory 3 IoCs
  • Manipulates Digital Signatures 1 TTPs 1 IoCs

    Attackers can apply techniques such as changing the registry keys of authenticode & Cryptography to obtain their binary as valid.

  • Checks computer location settings 2 TTPs 2 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Executes dropped EXE 9 IoCs
  • Loads dropped DLL 36 IoCs
  • Adds Run key to start application 2 TTPs 2 IoCs
  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Drops file in System32 directory 22 IoCs
  • Drops file in Program Files directory 25 IoCs
  • Drops file in Windows directory 6 IoCs
  • Browser Information Discovery 1 TTPs

    Enumerate browser information.

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Location Discovery: System Language Discovery 1 TTPs 8 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • NSIS installer 2 IoCs
  • Checks SCSI registry key(s) 3 TTPs 64 IoCs

    SCSI information is often read in order to detect sandboxing environments.

  • Enumerates system info in registry 2 TTPs 3 IoCs
  • Modifies data under HKEY_USERS 42 IoCs
  • Modifies registry class 15 IoCs
  • Modifies system certificate store 2 TTPs 3 IoCs
  • Suspicious behavior: EnumeratesProcesses 13 IoCs
  • Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 7 IoCs
  • Suspicious use of AdjustPrivilegeToken 10 IoCs
  • Suspicious use of FindShellTrayWindow 26 IoCs
  • Suspicious use of SendNotifyMessage 25 IoCs
  • Suspicious use of SetWindowsHookEx 7 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_8e00e54479d218e50a55e497c2600948.exe
    "C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_8e00e54479d218e50a55e497c2600948.exe"
    1⤵
    • Checks computer location settings
    • Loads dropped DLL
    • Drops file in System32 directory
    • System Location Discovery: System Language Discovery
    • Suspicious use of WriteProcessMemory
    PID:3188
    • C:\Windows\SysWOW64\28463\FECN.exe
      "C:\Windows\system32\28463\FECN.exe"
      2⤵
      • Executes dropped EXE
      • Loads dropped DLL
      • Adds Run key to start application
      • Drops file in System32 directory
      • System Location Discovery: System Language Discovery
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of SetWindowsHookEx
      PID:372
    • C:\Users\Admin\AppData\Local\Temp\installproXPN.exe
      "C:\Users\Admin\AppData\Local\Temp\installproXPN.exe"
      2⤵
      • Checks computer location settings
      • Executes dropped EXE
      • Loads dropped DLL
      • Drops file in Program Files directory
      • System Location Discovery: System Language Discovery
      • Modifies registry class
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of WriteProcessMemory
      PID:2136
      • C:\Program Files (x86)\proXPN\bin\tapinstall.exe
        "C:\Program Files (x86)\proXPN\bin\tapinstall.exe" hwids tap0901
        3⤵
        • Executes dropped EXE
        • Checks SCSI registry key(s)
        PID:3092
      • C:\Program Files (x86)\proXPN\bin\tapinstall.exe
        "C:\Program Files (x86)\proXPN\bin\tapinstall.exe" remove TAP0801
        3⤵
        • Executes dropped EXE
        • Checks SCSI registry key(s)
        PID:3952
      • C:\Windows\SysWOW64\cmd.exe
        C:\Windows\system32\cmd.exe /C "C:\Program Files (x86)\proXPN\bin\btnClick.exe"
        3⤵
        • System Location Discovery: System Language Discovery
        • Suspicious use of WriteProcessMemory
        PID:3380
        • C:\Program Files (x86)\proXPN\bin\btnClick.exe
          "C:\Program Files (x86)\proXPN\bin\btnClick.exe"
          4⤵
          • Executes dropped EXE
          • System Location Discovery: System Language Discovery
          PID:4816
      • C:\Program Files (x86)\proXPN\bin\tapinstall.exe
        "C:\Program Files (x86)\proXPN\bin\tapinstall.exe" install "C:\Program Files (x86)\proXPN\driver\OemWin2k.inf" tap0901
        3⤵
        • Executes dropped EXE
        • Drops file in System32 directory
        • Drops file in Windows directory
        • Checks SCSI registry key(s)
        • Modifies system certificate store
        • Suspicious use of AdjustPrivilegeToken
        PID:2728
      • C:\Program Files (x86)\proXPN\bin\openvpnserv.exe
        "C:\Program Files (x86)\proXPN\bin\openvpnserv.exe" -install
        3⤵
        • Executes dropped EXE
        • System Location Discovery: System Language Discovery
        PID:2420
      • C:\Program Files (x86)\proXPN\bin\proxpn.exe
        "C:\Program Files (x86)\proXPN\bin\proxpn.exe"
        3⤵
        • Executes dropped EXE
        • Loads dropped DLL
        • Adds Run key to start application
        • System Location Discovery: System Language Discovery
        • Suspicious use of FindShellTrayWindow
        • Suspicious use of SendNotifyMessage
        • Suspicious use of SetWindowsHookEx
        • Suspicious use of WriteProcessMemory
        PID:3084
        • C:\Program Files (x86)\proXPN\bin\openvpn.exe
          openvpn --version
          4⤵
          • Executes dropped EXE
          • Loads dropped DLL
          • System Location Discovery: System Language Discovery
          PID:2576
      • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
        "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument http://www.proxpn.com/welcome.php
        3⤵
        • Enumerates system info in registry
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
        • Suspicious use of FindShellTrayWindow
        • Suspicious use of SendNotifyMessage
        • Suspicious use of WriteProcessMemory
        PID:4404
        • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
          "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffbd7e146f8,0x7ffbd7e14708,0x7ffbd7e14718
          4⤵
            PID:5028
          • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
            "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2008,12245907718354151992,12198797491090208724,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2104 /prefetch:2
            4⤵
              PID:3652
            • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
              "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2008,12245907718354151992,12198797491090208724,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2256 /prefetch:3
              4⤵
              • Suspicious behavior: EnumeratesProcesses
              PID:2480
            • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
              "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2008,12245907718354151992,12198797491090208724,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2800 /prefetch:8
              4⤵
                PID:3564
              • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2008,12245907718354151992,12198797491090208724,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3264 /prefetch:1
                4⤵
                  PID:1808
                • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                  "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2008,12245907718354151992,12198797491090208724,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3288 /prefetch:1
                  4⤵
                    PID:3464
                  • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                    "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2008,12245907718354151992,12198797491090208724,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4176 /prefetch:1
                    4⤵
                      PID:3332
                    • C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe
                      "C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2008,12245907718354151992,12198797491090208724,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=3536 /prefetch:8
                      4⤵
                        PID:552
                      • C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe
                        "C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2008,12245907718354151992,12198797491090208724,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=3536 /prefetch:8
                        4⤵
                        • Suspicious behavior: EnumeratesProcesses
                        PID:2292
                      • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                        "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2008,12245907718354151992,12198797491090208724,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5340 /prefetch:1
                        4⤵
                          PID:3448
                        • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                          "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2008,12245907718354151992,12198797491090208724,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5376 /prefetch:1
                          4⤵
                            PID:3492
                          • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                            "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2008,12245907718354151992,12198797491090208724,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5612 /prefetch:1
                            4⤵
                              PID:3188
                            • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                              "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2008,12245907718354151992,12198797491090208724,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5564 /prefetch:1
                              4⤵
                                PID:3472
                              • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2008,12245907718354151992,12198797491090208724,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2240 /prefetch:2
                                4⤵
                                • Suspicious behavior: EnumeratesProcesses
                                PID:5196
                        • C:\Windows\system32\svchost.exe
                          C:\Windows\system32\svchost.exe -k DcomLaunch -p -s DeviceInstall
                          1⤵
                          • Drops file in Windows directory
                          • Checks SCSI registry key(s)
                          • Suspicious use of AdjustPrivilegeToken
                          • Suspicious use of WriteProcessMemory
                          PID:1252
                          • C:\Windows\system32\DrvInst.exe
                            DrvInst.exe "4" "0" "C:\Users\Admin\AppData\Local\Temp\{e1fbdd5c-f751-4c4f-a95c-2d16422d2f66}\oemwin2k.inf" "9" "4d14a44ff" "00000000000000E8" "WinSta0\Default" "0000000000000158" "208" "c:\program files (x86)\proxpn\driver"
                            2⤵
                            • Manipulates Digital Signatures
                            • Drops file in System32 directory
                            • Drops file in Windows directory
                            • Checks SCSI registry key(s)
                            • Modifies data under HKEY_USERS
                            • Suspicious use of WriteProcessMemory
                            PID:1276
                            • C:\Windows\system32\rundll32.exe
                              rundll32.exe C:\Windows\system32\pnpui.dll,InstallSecurityPromptRunDllW 20 Global\{81932737-2ac4-f940-a012-ae8d286570f3} Global\{91711536-bd22-1b40-a895-f96591482b39} C:\Windows\System32\DriverStore\Temp\{2799633f-2d4a-cd4d-bfcf-6cb65d0f0dbe}\oemwin2k.inf C:\Windows\System32\DriverStore\Temp\{2799633f-2d4a-cd4d-bfcf-6cb65d0f0dbe}\tap0901.cat
                              3⤵
                                PID:3376
                            • C:\Windows\system32\DrvInst.exe
                              DrvInst.exe "2" "211" "ROOT\NET\0000" "C:\Windows\INF\oem3.inf" "oem3.inf:3beb73aff103cc24:tap0901.ndi:9.0.0.6:tap0901," "4d14a44ff" "00000000000000E8"
                              2⤵
                              • Drops file in Drivers directory
                              • Drops file in Windows directory
                              • Checks SCSI registry key(s)
                              • Suspicious use of AdjustPrivilegeToken
                              PID:2432
                          • C:\Windows\System32\CompPkgSrv.exe
                            C:\Windows\System32\CompPkgSrv.exe -Embedding
                            1⤵
                              PID:2888
                            • C:\Windows\System32\CompPkgSrv.exe
                              C:\Windows\System32\CompPkgSrv.exe -Embedding
                              1⤵
                                PID:2852

                              Network

                              MITRE ATT&CK Enterprise v15

                              Replay Monitor

                              Loading Replay Monitor...

                              Downloads

                              • C:\Program Files (x86)\proXPN\bin\btnClick.exe

                                Filesize

                                54KB

                                MD5

                                bdbce667e0e2c0fc6ee8527a8b9067f1

                                SHA1

                                53d7f8bb0f879a5a585f35286a1f704629187834

                                SHA256

                                92538581fefce7e7dd87b03ca5450838a80c4d4698f36d7a66005014a49dcd65

                                SHA512

                                d9367c3949c9bd390210d35b3b0e9a9a6d016233d27d9f41dcaf3373b1c9a0297a9158c6a36405d058363c833dc7880593e036c871ba17eb050c6f0ffcb1d3d4

                              • C:\Program Files (x86)\proXPN\bin\openvpn.exe

                                Filesize

                                549KB

                                MD5

                                0675e33d9f2cacb709c0a9af9e7e5bcc

                                SHA1

                                03e3095862e4939dda84ca3b50a2e74d7b8e423a

                                SHA256

                                362882c367059c5c661b939eb8e7966ae39c0308c47e9b4ac25cb62983a9f45e

                                SHA512

                                7a440e2fca560329e61a7e8f4d8a65a1876f90a8062e7801bf98b290292abe8f33cc8f96a2c87ab2e5034caa2fa19c6c27c1a11f284131b99331294364f3d0f5

                              • C:\Program Files (x86)\proXPN\bin\openvpnserv.exe

                                Filesize

                                37KB

                                MD5

                                2f5e931dd8a7b59489ff88728038fdf7

                                SHA1

                                d66bcf3fbc99223e0d5708494a4b53cb29391740

                                SHA256

                                743f8313c4d555eea132b1723293c6b13bb8334c73cc67332a0de10fbef3ea01

                                SHA512

                                bf783492e3f6fce106ea83ae521c4521e34d95eae51fb842502251a7ac97ee5620ed0870c173bd5a95b0e46ae5e8857e1b285045c20a558610261758741f1ce8

                              • C:\Program Files (x86)\proXPN\bin\proxpn.exe

                                Filesize

                                362KB

                                MD5

                                7a27f934d89e8bca8b7351ad5aeac2e4

                                SHA1

                                a8e8d5150ce6dc7feb8c34686aa8369d28eca249

                                SHA256

                                96e55bdd301179b41a45fe6daa3c4364efb30aaacaca34e72f6f3cf25492d29d

                                SHA512

                                b57c8227f86462ebb906afa256c312671721d38bbc946f6ab72509c54a8d8f77bfb9b2bcb356f087755211e2815df8ff2c628d89247d3c677fb2c786432ea553

                              • C:\Program Files (x86)\proXPN\bin\tapinstall.exe

                                Filesize

                                79KB

                                MD5

                                71b58b474574001931ad5d6544509c71

                                SHA1

                                972396bdd1d146ad2cf688c5c0970bcd66fbb3ae

                                SHA256

                                cfa31dd6804a494485a5c77b62165bc6f6449725ca33c1f7900aa7cbfcfabadd

                                SHA512

                                3decbf576eb39cd8ba891d3049a893ffb9ad516e3b7aafbaa592af87bb88854a136e9ec09bd7754b9f8e1f3401aeee2d4d40a018859eea1d8b3093c0c621a4a6

                              • C:\Program Files (x86)\proXPN\driver\OemWin2k.inf

                                Filesize

                                7KB

                                MD5

                                d953442fee4713903dc02555e1e7fb86

                                SHA1

                                999ab309c9e376cbb83c50742f055e6242faf917

                                SHA256

                                34ce83af313815de5a8cc2464d89ad214628a42bd20cfee3ce9bec4e3cef0f3e

                                SHA512

                                c234b886b2c4106916ba5247177f717c3b6cfaa8a3117700d424fd988801673d0e89ac5ff6ea034529112aa669d3dce5cc1cddfa266ead2d11436d8055ae93a6

                              • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad\settings.dat

                                Filesize

                                152B

                                MD5

                                8ea156392347ae1e43bf6f4c7b7bc6ec

                                SHA1

                                7e1230dd6103043d1c5d9984384f93dab02500a6

                                SHA256

                                40b28bf59b3e2026ad3ebe2fecf464a03d7094fd9b26292477ad264d4efc1c75

                                SHA512

                                2479b86a9a31aa2f260ff6a1c963691994242ced728a27ffa2ee4e224945446a191bdb49ce399ec5a7d5d362499716133072e97d4253b5b4f09582d58b25144f

                              • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad\settings.dat

                                Filesize

                                152B

                                MD5

                                a7b5a5433fe76697fec05973806a648c

                                SHA1

                                786027abe836d4d8ff674c463e5bb02c4a957b70

                                SHA256

                                c8d623536ebdf5ffbefb84013d1c8ff5f853b59f1b09c80364c32b8ed5e4a735

                                SHA512

                                27be4c82e26468bbb9ce698ef305320f6cac46c953f88c714a0372fa524d098b9af2a87a88b14a134ff0f5f4b3d671902908622d2c7ec48e2c7bc458d7f5cc16

                              • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index

                                Filesize

                                672B

                                MD5

                                90ba35139dd68fa10de27221b81c4064

                                SHA1

                                677ec44dcb62bda90dd62fbaa12330a5223fa3e1

                                SHA256

                                65b887f47cd1b48b23014cfd4363c8275963e481f5aa03b63cafb081e41f94e5

                                SHA512

                                19dee2751daeaefd675b4618b7c4497472e57b21986295f580bb087c76f6f6e003bfe3ea8b54be5a5844b4ce5f4e2482e7a38de040861dbf91c681c639839034

                              • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Network Persistent State

                                Filesize

                                1KB

                                MD5

                                fa507aa43f7f9599218a63e2eedda735

                                SHA1

                                2dd9b877f5903222f0f0c640b257f9ef9c5e91f9

                                SHA256

                                3df48bef6c4e2723a126091434f68ddbc1de4aacdceb159bf9e8d4471a21bc16

                                SHA512

                                809e8a7d4457ca704c0fc8915996a79d639d7db7e3b677d421cea116b9d1b4a4d2bbc2ba88356217345c1024c446e5b77535b182acc2fdfa9436c577336f4a3c

                              • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Preferences

                                Filesize

                                6KB

                                MD5

                                86558afb5def577f48dd321e5fd6a83a

                                SHA1

                                108cc4d1f1287857f1e2d1be8950389981e137f9

                                SHA256

                                5a9cc43486895fb443c3dcefa726af8cc9409aa8de493f08088b74cc011b2096

                                SHA512

                                a96e3e1ef8465a887dabd34ecb831fd5ce79dcd71ba58135197e6fae4a0a583307183fdf5de76ac5a40870be2bdd16296a33bb3b71d51fe2cebfe3edfb95830b

                              • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Preferences

                                Filesize

                                7KB

                                MD5

                                e840656f9c4b3238379cfa8753dbbb96

                                SHA1

                                706a029dffe51c854462643f24303d5a23a6ae43

                                SHA256

                                a0aab170479cbaeb7fa037c5520f6ba7295ee6711ab00d23e32a8589d77e61df

                                SHA512

                                37ede6e8f8eb3c016cbaa410d9d63d2da7415ee19a4602922f5907a739a2d97e1325696111269de7d428c547a1a3d5e3efeee9546d0af74d34b0d6eea2928a41

                              • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\data_reduction_proxy_leveldb\CURRENT

                                Filesize

                                16B

                                MD5

                                6752a1d65b201c13b62ea44016eb221f

                                SHA1

                                58ecf154d01a62233ed7fb494ace3c3d4ffce08b

                                SHA256

                                0861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd

                                SHA512

                                9cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389

                              • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Local State

                                Filesize

                                11KB

                                MD5

                                355255563d32597724ff607b354448f7

                                SHA1

                                ec94409ecf755d179a24a410d96979d2ea48e1be

                                SHA256

                                9e5d180b7326d2a2b81659faadc0feccf23c09492b3ea2664a0e7b643c7d6d25

                                SHA512

                                80db4c109773f68c8d9398f00f80ea6a2a9439b275ea3f3ec8c0286912d148fc3c7d9dc66b0c6764ebfbc0c420c07c80c872ed30951febca61b4bb85baed9d01

                              • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Local State

                                Filesize

                                11KB

                                MD5

                                e33a7799a7f7a06115d29532f875d390

                                SHA1

                                85834d452683165c3215be0b9503a5ed809f0232

                                SHA256

                                230d284ef9552456db2c8f525e5ec204c9bcf5a94f0ccf5e70dd94b419a65be6

                                SHA512

                                4e04ec14007e6f9efbbdaf54ca99c700c058c9fa54b604df96fa4e774999c00246760714384b971ba70531917a4f5e6a42f2055657403ceac012136660e83e17

                              • C:\Users\Admin\AppData\Local\Temp\@A4DB.tmp

                                Filesize

                                4KB

                                MD5

                                c3679c3ff636d1a6b8c65323540da371

                                SHA1

                                d184758721a426467b687bec2a4acc80fe44c6f8

                                SHA256

                                d4eba51c616b439a8819218bddf9a6fa257d55c9f04cf81441cc99cc945ad3eb

                                SHA512

                                494a0a32eef4392ecb54df6e1da7d93183473c4e45f4ac4bd6ec3b0ed8c85c58303a0d36edec41420d05ff624195f08791b6b7e018419a3251b7e71ec9b730e7

                              • C:\Users\Admin\AppData\Local\Temp\installproXPN.exe

                                Filesize

                                1.9MB

                                MD5

                                127d0e5d0b52e29ada64dc643e2777a4

                                SHA1

                                0390594cb90184d481fc40aa1dfb4918d400d3ad

                                SHA256

                                ce18741a4a107f19e060bf1a3bf3b3e76af98e021d9ed7181e39dd1a6989118a

                                SHA512

                                2699ce34ced284604c577d145c76da357d1c9e665d8e932921b1f75677ad11981a84cd546465dcd0a368d44fbd2b71d4bae3834d840159ee43853460afa84b33

                              • C:\Users\Admin\AppData\Local\Temp\nsiA79B.tmp\ExecCmd.dll

                                Filesize

                                4KB

                                MD5

                                b9380b0bea8854fd9f93cc1fda0dfeac

                                SHA1

                                edb8d58074e098f7b5f0d158abedc7fc53638618

                                SHA256

                                1f4bd9c9376fe1b6913baeca7fb6df6467126f27c9c2fe038206567232a0e244

                                SHA512

                                45c3ab0f2bce53b75e72e43bac747dc0618342a3f498be8e2eb62a6db0b137fcdb1735da83051b14824996b5287109aa831e5859d6f21f0ed21b76b3d335418c

                              • C:\Users\Admin\AppData\Local\Temp\nsiA79B.tmp\InstallOptions.dll

                                Filesize

                                14KB

                                MD5

                                325b008aec81e5aaa57096f05d4212b5

                                SHA1

                                27a2d89747a20305b6518438eff5b9f57f7df5c3

                                SHA256

                                c9cd5c9609e70005926ae5171726a4142ffbcccc771d307efcd195dafc1e6b4b

                                SHA512

                                18362b3aee529a27e85cc087627ecf6e2d21196d725f499c4a185cb3a380999f43ff1833a8ebec3f5ba1d3a113ef83185770e663854121f2d8b885790115afdf

                              • C:\Users\Admin\AppData\Local\Temp\nsiA79B.tmp\System.dll

                                Filesize

                                11KB

                                MD5

                                c17103ae9072a06da581dec998343fc1

                                SHA1

                                b72148c6bdfaada8b8c3f950e610ee7cf1da1f8d

                                SHA256

                                dc58d8ad81cacb0c1ed72e33bff8f23ea40b5252b5bb55d393a0903e6819ae2f

                                SHA512

                                d32a71aaef18e993f28096d536e41c4d016850721b31171513ce28bbd805a54fd290b7c3e9d935f72e676a1acfb4f0dcc89d95040a0dd29f2b6975855c18986f

                              • C:\Users\Admin\AppData\Local\Temp\nsiA79B.tmp\UserInfo.dll

                                Filesize

                                4KB

                                MD5

                                7579ade7ae1747a31960a228ce02e666

                                SHA1

                                8ec8571a296737e819dcf86353a43fcf8ec63351

                                SHA256

                                564c80dec62d76c53497c40094db360ff8a36e0dc1bda8383d0f9583138997f5

                                SHA512

                                a88bc56e938374c333b0e33cb72951635b5d5a98b9cb2d6785073cbcad23bf4c0f9f69d3b7e87b46c76eb03ced9bb786844ce87656a9e3df4ca24acf43d7a05b

                              • C:\Users\Admin\AppData\Local\Temp\nsiA79B.tmp\ioSpecial.ini

                                Filesize

                                756B

                                MD5

                                1f1f5a67ae9b2c37f57c69ccc770ef65

                                SHA1

                                fde1d534854719ca89bcc1a084e88882c7e6af6b

                                SHA256

                                afc284d4e2aa858eac4515a9bda74b5a8b4897260b36fb8d0486e920db3ec9a2

                                SHA512

                                0b0a9e48d6bfdb8987d74555e7663f610f7d5578aa69fc0165c29452f91326fd36bd329ccfb08792a71fbc84160814d6e165494b97e47839a0e93573f929d449

                              • C:\Users\Admin\AppData\Local\Temp\nsiA79B.tmp\ioSpecial.ini

                                Filesize

                                782B

                                MD5

                                462cad5432cc551b5d4eb9d4a1c30aa0

                                SHA1

                                9c5d6cee13f604908df0abfda1e01ec36485271a

                                SHA256

                                df66bdfe228aef31fcaec098754d1798ef010b05a2d5758fd4574390e5d1893a

                                SHA512

                                0b3cdadfc945079c61074e59b15eddb1fc781b69b5a358017028159424a5646377ea36e9150d4d08ca0b33c8e735ffa5ac7cba2fa20869f5ce960ffca75bbf87

                              • C:\Users\Admin\AppData\Local\Temp\nsiA79B.tmp\ioSpecial.ini

                                Filesize

                                596B

                                MD5

                                bfab1017aea36e1b732e3e6d2335ff9e

                                SHA1

                                b16375d9e7b3dd124bfe693e072152006708e92c

                                SHA256

                                aacead04217cf470e232d7211fc8c177aaf044135a2da1e81db0188fbcc5fa83

                                SHA512

                                530fe2d798720b3f6c9b16ce7b0b8a3371cd65f293793cd267e1e1892f0c4d895447f5185e4b2f21d34c6cdde72189cd70e79008a65cf65faafb5ecad233b893

                              • C:\Users\Admin\AppData\Local\Temp\nsiA79B.tmp\nsExec.dll

                                Filesize

                                6KB

                                MD5

                                acc2b699edfea5bf5aae45aba3a41e96

                                SHA1

                                d2accf4d494e43ceb2cff69abe4dd17147d29cc2

                                SHA256

                                168a974eaa3f588d759db3f47c1a9fdc3494ba1fa1a73a84e5e3b2a4d58abd7e

                                SHA512

                                e29ea10ada98c71a18273b04f44f385b120d4e8473e441ce5748cfa44a23648814f2656f429b85440157988c88de776c6ac008dc38bf09cbb746c230a46c69fe

                              • C:\Users\Admin\AppData\Local\Temp\nsiA79B.tmp\processwork.dll

                                Filesize

                                231KB

                                MD5

                                0a4fa7a9ba969a805eb0603c7cfe3378

                                SHA1

                                0f018a8d5b42c6ce8bf34b4a6422861c327af88c

                                SHA256

                                27329ea7002d9ce81c8e28e97a5c761922097b33cedeada4db30d2b9d505007c

                                SHA512

                                e13e29712457d5e6351bfd69cba6320795d8b2fd1a047923814f8699f7188ec730ec7f0d946fdff66c8b430fef011415ed045b6ea56e4cc0b1d010171ab88178

                              • C:\Windows\SysWOW64\28463\AKV.exe

                                Filesize

                                395KB

                                MD5

                                b8fa30233794772b8b76b4b1d91c7321

                                SHA1

                                0cf9561be2528944285e536f41d502be24c3aa87

                                SHA256

                                14116fa79ccc105fabd312b4dff74933f8684c6b27db37e5e3a79d159092d29a

                                SHA512

                                10ce8b18e7afb8c7e30bb90b0a1f199ef0b77873fa7a9efc596606e151be6b516c0ec6222a9032bdcc527e80964f53d20a28fa1881a08b4df303b2e28204549d

                              • C:\Windows\SysWOW64\28463\FECN.001

                                Filesize

                                608B

                                MD5

                                7a2259671d52f20636e5e256e102ad25

                                SHA1

                                a58bf4d2e2af1cb9ddae72872a112121afbf7956

                                SHA256

                                9fe90b4d93ebda05b769bdbb1b42d33c69e6c7539660a3da55ad0f8b630cb144

                                SHA512

                                e521f1c157afe0302ae47538afe6e7fa3cc53fd5cace36e64fb55f4fe5cc7cb12afee14c43611e5eae32785a9ede7b0eb9ee3e6a376758c4efaff04eaba52920

                              • C:\Windows\SysWOW64\28463\FECN.006

                                Filesize

                                8KB

                                MD5

                                43f02e9974b1477c1e6388882f233db0

                                SHA1

                                f3e27b231193f8d5b2e1b09d05ae3a62795cf339

                                SHA256

                                3c9e56e51d5a7a1b9aefe853c12a98bf246039aa46db94227ea128f6331782ba

                                SHA512

                                e22d14735606fe75ee5e55204807c3f5531d3e0c4f63aa4a3b2d4bb6abda6128c7e2816753f2e64400ac6dae8f8ef1e013a7a464dff2a79ad9937c48821a067f

                              • C:\Windows\SysWOW64\28463\FECN.007

                                Filesize

                                5KB

                                MD5

                                b5a87d630436f958c6e1d82d15f98f96

                                SHA1

                                d3ff5e92198d4df0f98a918071aca53550bf1cff

                                SHA256

                                a895ad4d23e8b2c2dc552092f645ca309e62c36d4721ebfe7afd2eee7765d4b2

                                SHA512

                                fd7bae85a86bdaa12fec826d1d38728a90e2037cb3182ad7652d8a9f54c4b322734c587b62221e6f907fce24fcf2e0ae4cce1f5e3d8861661064b4da24bd87ce

                              • C:\Windows\SysWOW64\28463\FECN.exe

                                Filesize

                                473KB

                                MD5

                                17535dddecf8cb1efdba1f1952126547

                                SHA1

                                a862a9a3eb6c201751be1038537522a5281ea6cb

                                SHA256

                                1a3d28ac6359e58aa656f4734f9f36b6c09badadcf9fb900b9b118d90c38a9dd

                                SHA512

                                b4f31b552ab3bb3dafa365aa7a31f58674ae7ee82ce1d23457f2e7047431430b00abb3b5498491725639daf583b526b278a737168cfdc4e9ec796dfbc14a53d8

                              • \??\c:\PROGRA~2\proxpn\driver\tap0901.sys

                                Filesize

                                30KB

                                MD5

                                bcd6a90d6fd757ce9c29ddc850f7f231

                                SHA1

                                cc9efa6bf9a2771171adf811cc2baebe840f5f30

                                SHA256

                                8e736a42b28be11ec524c40dfa1c7a88bbe10cbc97320f128bcbe44051bbcc81

                                SHA512

                                31de1268442df3fb4f989493b2ffc0353a90365ed60518fabd09015535233b657602030688859a8c7e686930e6e72be6dda02df9f94a5b7618803d92873485dc

                              • \??\c:\program files (x86)\proxpn\driver\tap0901.cat

                                Filesize

                                8KB

                                MD5

                                b412ed92dec74dc0d024b7b5890b1511

                                SHA1

                                6320565f77672cf60681fe470dd3893c0679827f

                                SHA256

                                969bcc92ab18061648735d3202ccfc68cba240547abdf41c834a0ab1d12e79d3

                                SHA512

                                4ddcc6973f1fba1258d5c85a6517d2f3122307a5a2613bda22a1c2791cc1f686773034905a0bacbacc00e49e9c11a2d3fd6868f721879edb4d88ea3e575e4cc9

                              • memory/372-135-0x0000000000A70000-0x0000000000A71000-memory.dmp

                                Filesize

                                4KB

                              • memory/372-26-0x0000000000A70000-0x0000000000A71000-memory.dmp

                                Filesize

                                4KB

                              • memory/2136-283-0x00000000031D0000-0x0000000003211000-memory.dmp

                                Filesize

                                260KB

                              • memory/2420-270-0x0000000000400000-0x000000000040D000-memory.dmp

                                Filesize

                                52KB

                              • memory/2576-444-0x0000000000400000-0x000000000048E000-memory.dmp

                                Filesize

                                568KB

                              • memory/2576-446-0x000000006B080000-0x000000006B0BD000-memory.dmp

                                Filesize

                                244KB

                              • memory/2576-445-0x0000000061D80000-0x0000000061EAD000-memory.dmp

                                Filesize

                                1.2MB