Analysis Overview
SHA256
2305105faf8b71d2512311635365781bcec808917ad692dcca3693c812ed92da
Threat Level: Shows suspicious behavior
The file a7249541f254417eaa8c8e4bb5e00d02_JaffaCakes118 was found to be: Shows suspicious behavior.
Malicious Activity Summary
Checks whether UAC is enabled
Unsigned PE
Enumerates physical storage devices
Suspicious behavior: EnumeratesProcesses
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
Suspicious use of SetWindowsHookEx
Suspicious use of WriteProcessMemory
Enumerates system info in registry
Suspicious use of SendNotifyMessage
Modifies Internet Explorer settings
Suspicious use of FindShellTrayWindow
MITRE ATT&CK Matrix V13
Analysis: static1
Detonation Overview
Reported
2024-06-13 23:39
Signatures
Unsigned PE
| Description | Indicator | Process | Target |
| N/A | N/A | N/A | N/A |
Analysis: behavioral1
Detonation Overview
Submitted
2024-06-13 23:39
Reported
2024-06-13 23:42
Platform
win7-20240220-en
Max time kernel
122s
Max time network
150s
Command Line
Signatures
Checks whether UAC is enabled
| Description | Indicator | Process | Target |
| Key value queried | \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA | C:\Users\Admin\AppData\Local\Temp\a7249541f254417eaa8c8e4bb5e00d02_JaffaCakes118.exe | N/A |
Enumerates physical storage devices
Modifies Internet Explorer settings
| Description | Indicator | Process | Target |
| Key created | \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic | C:\Program Files\Internet Explorer\iexplore.exe | N/A |
| Key created | \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain | C:\Program Files\Internet Explorer\iexplore.exe | N/A |
| Key created | \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage | C:\Program Files\Internet Explorer\iexplore.exe | N/A |
| Key created | \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser | C:\Program Files\Internet Explorer\iexplore.exe | N/A |
| Set value (int) | \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{4B00B1F1-29DE-11EF-92B8-52226696DE45} = "0" | C:\Program Files\Internet Explorer\iexplore.exe | N/A |
| Key created | \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery | C:\Program Files\Internet Explorer\iexplore.exe | N/A |
| Set value (int) | \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "424483886" | C:\Program Files\Internet Explorer\iexplore.exe | N/A |
| Key created | \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing | C:\Program Files\Internet Explorer\iexplore.exe | N/A |
| Key created | \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\DomainSuggestion | C:\Program Files\Internet Explorer\iexplore.exe | N/A |
| Key created | \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\GPU | C:\Program Files\Internet Explorer\iexplore.exe | N/A |
| Key created | \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\LowRegistry | C:\Program Files\Internet Explorer\iexplore.exe | N/A |
| Key created | \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Toolbar | C:\Program Files\Internet Explorer\iexplore.exe | N/A |
| Key created | \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main | C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE | N/A |
| Set value (int) | \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" | C:\Program Files\Internet Explorer\iexplore.exe | N/A |
| Set value (int) | \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" | C:\Program Files\Internet Explorer\iexplore.exe | N/A |
| Set value (data) | \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 | C:\Program Files\Internet Explorer\iexplore.exe | N/A |
| Key created | \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main | C:\Users\Admin\AppData\Local\Temp\a7249541f254417eaa8c8e4bb5e00d02_JaffaCakes118.exe | N/A |
| Key created | \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage | C:\Program Files\Internet Explorer\iexplore.exe | N/A |
| Key created | \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\PageSetup | C:\Program Files\Internet Explorer\iexplore.exe | N/A |
| Key created | \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\SearchScopes | C:\Program Files\Internet Explorer\iexplore.exe | N/A |
| Set value (int) | \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" | C:\Program Files\Internet Explorer\iexplore.exe | N/A |
| Set value (data) | \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 60be7d38ebbdda01 | C:\Program Files\Internet Explorer\iexplore.exe | N/A |
| Key created | \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\IntelliForms | C:\Program Files\Internet Explorer\iexplore.exe | N/A |
| Key created | \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Zoom | C:\Program Files\Internet Explorer\iexplore.exe | N/A |
| Set value (str) | \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" | C:\Program Files\Internet Explorer\iexplore.exe | N/A |
| Key created | \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\IETld\LowMic | C:\Program Files\Internet Explorer\iexplore.exe | N/A |
| Key created | \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\InternetRegistry | C:\Program Files\Internet Explorer\iexplore.exe | N/A |
| Set value (int) | \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" | C:\Program Files\Internet Explorer\iexplore.exe | N/A |
| Key created | \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive | C:\Program Files\Internet Explorer\iexplore.exe | N/A |
| Set value (str) | \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" | C:\Program Files\Internet Explorer\iexplore.exe | N/A |
| Set value (data) | \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 | C:\Program Files\Internet Explorer\iexplore.exe | N/A |
| Key created | \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main | C:\Program Files\Internet Explorer\iexplore.exe | N/A |
| Key created | \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch | C:\Program Files\Internet Explorer\iexplore.exe | N/A |
| Set value (int) | \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" | C:\Program Files\Internet Explorer\iexplore.exe | N/A |
| Set value (data) | \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb010000009541897aef86b94ea052217e7b6316e00000000002000000000010660000000100002000000096ba82501041338c97622be2a02b681e3a048ab3d8afe714a72bc1c7c71d8813000000000e80000000020000200000000ce41e7f821bb3713aa81512bf0556528ad92ae3f8f37db918209e60fed4a138200000005f9f850901207d056cbd8a23c7b3e7767bf449302f09c62b8113647adde6855340000000589e841ee32179c6f05b1e35d2fc37f864d57b3c90948e65a92ae0f2ab6ed5ff7adcaee5b34ef7661877fa2117db839f5e9edf6c8564416cb46f438350a76d12 | C:\Program Files\Internet Explorer\iexplore.exe | N/A |
Suspicious use of FindShellTrayWindow
| Description | Indicator | Process | Target |
| N/A | N/A | C:\Program Files\Internet Explorer\iexplore.exe | N/A |
Suspicious use of SetWindowsHookEx
| Description | Indicator | Process | Target |
| N/A | N/A | C:\Users\Admin\AppData\Local\Temp\a7249541f254417eaa8c8e4bb5e00d02_JaffaCakes118.exe | N/A |
| N/A | N/A | C:\Users\Admin\AppData\Local\Temp\a7249541f254417eaa8c8e4bb5e00d02_JaffaCakes118.exe | N/A |
| N/A | N/A | C:\Users\Admin\AppData\Local\Temp\a7249541f254417eaa8c8e4bb5e00d02_JaffaCakes118.exe | N/A |
| N/A | N/A | C:\Program Files\Internet Explorer\iexplore.exe | N/A |
| N/A | N/A | C:\Program Files\Internet Explorer\iexplore.exe | N/A |
| N/A | N/A | C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE | N/A |
| N/A | N/A | C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE | N/A |
| N/A | N/A | C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE | N/A |
| N/A | N/A | C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE | N/A |
Suspicious use of WriteProcessMemory
Processes
C:\Users\Admin\AppData\Local\Temp\a7249541f254417eaa8c8e4bb5e00d02_JaffaCakes118.exe
"C:\Users\Admin\AppData\Local\Temp\a7249541f254417eaa8c8e4bb5e00d02_JaffaCakes118.exe"
C:\Program Files\Internet Explorer\iexplore.exe
"C:\Program Files\Internet Explorer\iexplore.exe" http://www.gamecentersolution.com/downloadgame.aspx?CID=21157&AID=875
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2564 CREDAT:275457 /prefetch:2
Network
| Country | Destination | Domain | Proto |
| US | 8.8.8.8:53 | www.gamecentersolution.com | udp |
| US | 8.8.8.8:53 | www.fenomen-games.com | udp |
| US | 184.72.55.36:80 | www.gamecentersolution.com | tcp |
| US | 159.65.253.100:80 | www.fenomen-games.com | tcp |
| US | 8.8.8.8:53 | www.gamecentersolution.com | udp |
| US | 8.8.8.8:53 | www.gamecentersolution.com | udp |
| US | 184.72.55.36:80 | www.gamecentersolution.com | tcp |
| US | 184.72.55.36:80 | www.gamecentersolution.com | tcp |
| US | 184.72.55.36:80 | www.gamecentersolution.com | tcp |
| US | 184.72.55.36:80 | www.gamecentersolution.com | tcp |
| US | 204.79.197.200:443 | ieonline.microsoft.com | tcp |
| US | 204.79.197.200:443 | ieonline.microsoft.com | tcp |
| US | 204.79.197.200:443 | ieonline.microsoft.com | tcp |
Files
memory/1740-0-0x0000000000400000-0x000000000055F000-memory.dmp
C:\Users\Admin\AppData\Local\Temp\FG.url
| MD5 | 0fcf82b5a915470e8a79d3516f582a36 |
| SHA1 | 75f81b41607905b231521243129aff3554a58db0 |
| SHA256 | 076264d4f165cef82f0cb07f6795f1d5ffa74741a943fca42cdeac65823bcae4 |
| SHA512 | adf69ec56756fe672677b039cb44bb13fc3adfac569f5ea4eda4e7b35de5ebe0229c5825ca8337aa2c623a773bdf775ddd3689e9fae03a7af1f694576d954293 |
C:\Users\Admin\AppData\Local\Temp\Cab2B28.tmp
| MD5 | ac05d27423a85adc1622c714f2cb6184 |
| SHA1 | b0fe2b1abddb97837ea0195be70ab2ff14d43198 |
| SHA256 | c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d |
| SHA512 | 6d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d |
C:\Users\Admin\AppData\Local\Temp\Cab2BF5.tmp
| MD5 | 49aebf8cbd62d92ac215b2923fb1b9f5 |
| SHA1 | 1723be06719828dda65ad804298d0431f6aff976 |
| SHA256 | b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f |
| SHA512 | bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b |
C:\Users\Admin\AppData\Local\Temp\Tar2C1A.tmp
| MD5 | 4ea6026cf93ec6338144661bf1202cd1 |
| SHA1 | a1dec9044f750ad887935a01430bf49322fbdcb7 |
| SHA256 | 8efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8 |
| SHA512 | 6c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b |
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
| MD5 | a7eb22474ed6c177b63285fb2677e53d |
| SHA1 | a7d0d357433ef51e7dca0032e895b5e5302ba099 |
| SHA256 | f0765e4bdbaf990c426d53c25ac876a7e575bf3fd685228a90b470b835bed57f |
| SHA512 | 8f67e3d21b6a73e71b80cd6d2c7c0ac309d4fa51838785216449c945bb412e3a42d9812be9109e4f29d806994fb21a994e7fcb22dd726c14567788c72d4b549e |
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
| MD5 | 85b851468df43aa7f3bdbc7b09fa3580 |
| SHA1 | 9456ff272d147f86459f575862ad60666230c54c |
| SHA256 | fe9ae3534ca83496b7df7a58037a377416cf1775dfad2bd51195dc2613fd111c |
| SHA512 | 986b399bb407a7ea3ad76fc2c48a2c31e6a01c805d65301017f34a792951113805514230c0062ad49e1b4b030e62c3e408112dd7adce64a89a9c9952962abf4b |
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
| MD5 | ac4776406915b874003d6ce9519b5adc |
| SHA1 | 9e713ae2ac11491995e3a4d4f304c7b2f9577fe1 |
| SHA256 | 4f66267060192a79fc8fa65e24d38f5bd2a63d16d6b540ed138587805e581476 |
| SHA512 | 539da4c8501b96c00af618829b6aae76014a56e7508ae2be41a18f9f2fb348558bc06498b1700412f382c2340cef16917bf19dc58a04dec47beb2cd27da52ba2 |
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
| MD5 | 8b375007d40a35e87bbd92efe501c15c |
| SHA1 | 38f9e4b3142e15f020a2d3d32eccf437f44d5100 |
| SHA256 | c063825b77e343f99d74612f0a6735cb28d386d6b7ccad43b680dd65700268bf |
| SHA512 | bbbdf8b55e41f8cd73aba88543dbe8026022713e5c8088ffa6b24c53a4a4448a886751802d49be05863b85af4839970fe1c8e9c5597e50605e20b27e983d8a5a |
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
| MD5 | cd6d4bf2000982c304d1e0b041e99aff |
| SHA1 | dd4831c9f4e85270913c6bc2a9f6443e67ee5664 |
| SHA256 | d7ea3863fa019457b37a7cfccf664aa6ab194a399cae95eedddd320ffea9b3ca |
| SHA512 | 871efd83d8205784589533eda6814a2a61eb077fe04217c6dcfb2fd4161ddb4c09e2cde492bd91bd1ebe1b6a1f72536fc892dd3b24fb9f2b557dd60699c1a1f6 |
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
| MD5 | 9499c67df3554ac74125b75adab8644b |
| SHA1 | f4d48266159998d2677498d960d6ab0ed6cc4308 |
| SHA256 | 823073264cdd257a58690def9840526af6650f4417cbfa2b8c04aafb914b8b60 |
| SHA512 | f6dac06ca363a31646fd37c13caa0f7261351bfb0880d3fe145e624bd997f5e2f6f55b0417e1015b752556367c062533172441eb4fe4f03d4cba65872465154e |
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
| MD5 | 24eb3f4d2867ffeb6025ea34c58d51ae |
| SHA1 | 9fe9ff4a59624afe09167c5ed53fcc857ab8d64a |
| SHA256 | 98a285eb45222aa4153c6e5357a7e79545c42970ca2ba222fe54a7bdf4e854c4 |
| SHA512 | 58121844e637f6ab47ded388b3a5da5caae9df674ca9c0ce8aa985c21bad58e9dcb9877bff3f0575d29f07ef539ba4f5f17e9522359fda588dfff17c89192da4 |
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
| MD5 | 132ea26a75972ac2c4f5ef6cc331742a |
| SHA1 | 71fef014613fd30af37dd21ef5b0c7498d77e512 |
| SHA256 | 92c8a93b5846c6ab41ba8b93e2f8077b4e1e440c21bed4cdd8156a57b17d3972 |
| SHA512 | 41b15a0ac5b51dd16d5cde9fa0a7932b8667e1c2cf1c9ab492c2c709572c1ee97c77851a91098fb5d5d1d974e719a7377f11e23bc792fa040238c7b6d191df5e |
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
| MD5 | 5b58d3cce444c5a32502976db3754802 |
| SHA1 | 741ffa1c5cb7d20fbbfdd85f1671ec48fc4e7b85 |
| SHA256 | 0a48120ccb99e5c90bb27bb35238da6f73d3532d07ddf7f07092e5ab10864370 |
| SHA512 | d9dcab13173bca38366be3130682bd16f117310beba7af938d66dd7d223056c4a30457bd02af3db1a6159013fcd3cc63d227fb82b71797853e028356dd744b05 |
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
| MD5 | dac87b92caea15f045b5211d3bcff1b9 |
| SHA1 | 1a461b58a5e768505efde9f51cd7e543bdfd1ba1 |
| SHA256 | b8981937b6957d92f415cc6104b89bf1043a202bec69bec4f23060eb2d6b8799 |
| SHA512 | a52dc12b3ed9990bb8f36454a7e165dfc633293618f08ef90211cebcb0cd08971eaa18cdbbdc529f7eca1f5b00c21addc2f62a4d18a63ad0aca496b94832dd2b |
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
| MD5 | 9dbc3289359f0e976a938d8e452250b5 |
| SHA1 | 17796a1a1cd695a7a92ce07ffc42df1afbdc22e1 |
| SHA256 | 4d79d8a0577c75383b544388cf900ed475778aa98b04e51eedfff8bed7816882 |
| SHA512 | 3870f8d08cd8094a03f2b0a36ac0df1c32a15745c9dd96eb2c1ebb696426643cae8d57fb9c32a77c7530f540cb62857c1139107f37efd5f25882bbaee4c0b762 |
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
| MD5 | c4b0e258a664571509f5c464adf93df1 |
| SHA1 | 6ea8e85397e6e6a955705d3d5d88bd836a7a9948 |
| SHA256 | 57c306c32d2bfa2e4d3e45e6829417a5c9fc2297792263dd20b4d9ee3971ad77 |
| SHA512 | c3ee3aa789966dc6cb8f3dbb172c28ab16f7cd28e27f888929c9454d0d875d11d4f1163d32203a1db9f4a4c6785eb3b488e9412f0aa97b0ad229be394c53a002 |
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
| MD5 | 582aca5807d828a83d2fdc1c06236785 |
| SHA1 | 5be3b2f6e6569f0e664b44b66912431b22f08062 |
| SHA256 | fff325ee80e799797e4d750502ada10bf10389e8f8997120b997f69b1c870195 |
| SHA512 | c2a11887bb060dd5d4cae9dbaee2401a55b41549086438899a5b84bca50010c208cc7d948d0dab8bc79a738ccd99f9d72939a60e161d8eae72096b935930e77b |
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
| MD5 | 04a367dddd0ff3b4ab71d44fbd21c791 |
| SHA1 | ff0646f8490e72ad0254035f45196ad01fbbde88 |
| SHA256 | 5dffa7e46307d0f1130e3d342117c1add6fb8c1e9d48f310a11df5499f1ed357 |
| SHA512 | d53644ea94bacffbb680dd6efff7111760428594638c5c285f2f03ea3b09db047dd101d77bebd1104c24de90728920524a19337dec7d367fe3a785e34c864c39 |
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
| MD5 | ef43a4fbaa7378ea03fdef3d72e33c7b |
| SHA1 | 9dd53f24d0e342dad0f901bfc7cf16339400c635 |
| SHA256 | 77dffb68518736ef0f2cc10ff40de33d935f0d3f477bff3079508b65e6361714 |
| SHA512 | 31290de653586235653a81eb6c5d3e00f36ef46e763d580347010e94c8cf347048eda9e44b21f8530048994859c86648097cfd4756bb6bdb85a1337ea66d57e6 |
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
| MD5 | fd02e99dff50f9c5a3f8f5427dba1b1a |
| SHA1 | ef9bc67ae354f93f0cadda9c9629aae5aeaf6068 |
| SHA256 | 92bd3b0be36140938acb88d23a1144113d13704cfbcea9c08e7b781014456dc8 |
| SHA512 | ab5d379cd330a93703752ecfcf92f9ba7b7b65b7d964a9f8eaaa2cc849eec17ebf6177b6aec4cf40ae1f6b8c32d628df5045b5d45465734f24bc75db9bb21253 |
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
| MD5 | d96544e7b5f3aaf4b9c39923b062ce39 |
| SHA1 | c13c265d61aa311750408a7e4a01170d413d466d |
| SHA256 | f217114ddd38d0c97ae67038c0e1d33d8cfdfe91d75947fcd67557ca55eee98c |
| SHA512 | c6861d5299f39f06619461e65913f38bbd806783eab9a02e89a4a0a0db238356ad61b4f218c378e6403ed24c253bba4b14bb6490ca5515d31621c4adb94791d2 |
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
| MD5 | d2073623ac287454457ff4a816079839 |
| SHA1 | c582033a0a73eb4cc8c255215d104d34c49ca213 |
| SHA256 | fede717cae99b82354d2af4a9f9b8f8d3ac8f53309ae865aa912019112bfc0d9 |
| SHA512 | 68f733d86bb9a3519974428284495428e1c775e2831e5991d2ac34ad7768c890d5cc02cdc5d2e0484597e3f9bf5377ebd9dff19ceb6aeb00b040256c8f1944ae |
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
| MD5 | 45b5502285711aad3affa04d512f4b9d |
| SHA1 | a641fc5fc35f9747aa6dbc060a758911698fbdb4 |
| SHA256 | c7bcb23bfaaba030cbc7ed8c99b3852b6f1270f2163481c3beb22eab1483556a |
| SHA512 | f901aea2d7656cbe35092312ee107579939d06b739d3884161d18d2c043c21c90fb663eef7dbdabc22cfca9810c6a1832c2823b48a012e064e02914586b3e58e |
Analysis: behavioral2
Detonation Overview
Submitted
2024-06-13 23:39
Reported
2024-06-13 23:42
Platform
win10v2004-20240508-en
Max time kernel
149s
Max time network
149s
Command Line
Signatures
Checks whether UAC is enabled
| Description | Indicator | Process | Target |
| Key value queried | \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA | C:\Users\Admin\AppData\Local\Temp\a7249541f254417eaa8c8e4bb5e00d02_JaffaCakes118.exe | N/A |
Enumerates physical storage devices
Enumerates system info in registry
| Description | Indicator | Process | Target |
| Key opened | \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS | C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe | N/A |
| Key value queried | \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer | C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe | N/A |
| Key value queried | \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName | C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe | N/A |
Suspicious behavior: EnumeratesProcesses
| Description | Indicator | Process | Target |
| N/A | N/A | C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe | N/A |
| N/A | N/A | C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe | N/A |
| N/A | N/A | C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe | N/A |
| N/A | N/A | C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe | N/A |
| N/A | N/A | C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe | N/A |
| N/A | N/A | C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe | N/A |
| N/A | N/A | C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe | N/A |
| N/A | N/A | C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe | N/A |
| N/A | N/A | C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe | N/A |
| N/A | N/A | C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe | N/A |
| N/A | N/A | C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe | N/A |
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
| Description | Indicator | Process | Target |
| N/A | N/A | C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe | N/A |
| N/A | N/A | C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe | N/A |
| N/A | N/A | C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe | N/A |
| N/A | N/A | C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe | N/A |
| N/A | N/A | C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe | N/A |
| N/A | N/A | C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe | N/A |
| N/A | N/A | C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe | N/A |
| N/A | N/A | C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe | N/A |
| N/A | N/A | C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe | N/A |
| N/A | N/A | C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe | N/A |
| N/A | N/A | C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe | N/A |
Suspicious use of FindShellTrayWindow
Suspicious use of SendNotifyMessage
Suspicious use of SetWindowsHookEx
| Description | Indicator | Process | Target |
| N/A | N/A | C:\Users\Admin\AppData\Local\Temp\a7249541f254417eaa8c8e4bb5e00d02_JaffaCakes118.exe | N/A |
| N/A | N/A | C:\Users\Admin\AppData\Local\Temp\a7249541f254417eaa8c8e4bb5e00d02_JaffaCakes118.exe | N/A |
| N/A | N/A | C:\Users\Admin\AppData\Local\Temp\a7249541f254417eaa8c8e4bb5e00d02_JaffaCakes118.exe | N/A |
Suspicious use of WriteProcessMemory
Processes
C:\Users\Admin\AppData\Local\Temp\a7249541f254417eaa8c8e4bb5e00d02_JaffaCakes118.exe
"C:\Users\Admin\AppData\Local\Temp\a7249541f254417eaa8c8e4bb5e00d02_JaffaCakes118.exe"
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument http://www.gamecentersolution.com/downloadgame.aspx?CID=21157&AID=875
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffcc9e246f8,0x7ffcc9e24708,0x7ffcc9e24718
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2056,5675103761899486179,10655840050424983010,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2072 /prefetch:2
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2056,5675103761899486179,10655840050424983010,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2396 /prefetch:3
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2056,5675103761899486179,10655840050424983010,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2892 /prefetch:8
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2056,5675103761899486179,10655840050424983010,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3300 /prefetch:1
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2056,5675103761899486179,10655840050424983010,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3308 /prefetch:1
C:\Windows\System32\CompPkgSrv.exe
C:\Windows\System32\CompPkgSrv.exe -Embedding
C:\Windows\System32\CompPkgSrv.exe
C:\Windows\System32\CompPkgSrv.exe -Embedding
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe
"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2056,5675103761899486179,10655840050424983010,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4964 /prefetch:8
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe
"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2056,5675103761899486179,10655840050424983010,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4964 /prefetch:8
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2056,5675103761899486179,10655840050424983010,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5252 /prefetch:1
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2056,5675103761899486179,10655840050424983010,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5204 /prefetch:1
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2056,5675103761899486179,10655840050424983010,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4348 /prefetch:1
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2056,5675103761899486179,10655840050424983010,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3432 /prefetch:1
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2056,5675103761899486179,10655840050424983010,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5052 /prefetch:1
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2056,5675103761899486179,10655840050424983010,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=13 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5176 /prefetch:1
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2056,5675103761899486179,10655840050424983010,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=14 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4100 /prefetch:1
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2056,5675103761899486179,10655840050424983010,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=15 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=2240 /prefetch:1
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2056,5675103761899486179,10655840050424983010,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=3412 /prefetch:2
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2056,5675103761899486179,10655840050424983010,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=17 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4200 /prefetch:1
Network
| Country | Destination | Domain | Proto |
| US | 8.8.8.8:53 | www.fenomen-games.com | udp |
| US | 8.8.8.8:53 | www.gamecentersolution.com | udp |
| US | 8.8.8.8:53 | www.gamecentersolution.com | udp |
| N/A | 224.0.0.251:5353 | udp | |
| US | 8.8.8.8:53 | google.com | udp |
| US | 8.8.8.8:53 | google.com | udp |
| US | 8.8.4.4:53 | google.com | udp |
| US | 8.8.8.8:53 | www.gamecentersolution.com | udp |
| US | 8.8.8.8:53 | 4.4.8.8.in-addr.arpa | udp |
| US | 8.8.8.8:53 | 240.197.17.2.in-addr.arpa | udp |
| US | 8.8.8.8:53 | www.gamecentersolution.com | udp |
| US | 8.8.8.8:53 | www.gamecentersolution.com | udp |
Files
memory/1836-0-0x0000000000400000-0x000000000055F000-memory.dmp
C:\Users\Admin\AppData\Local\Temp\FG.url
| MD5 | b32e479bd009ed83990c9673269a8679 |
| SHA1 | c90602796792d73b8e14df593d28c88639957537 |
| SHA256 | 4da0710275fe2edc624ceae921dfed794450221c88daaac73467fc885cff1a3b |
| SHA512 | d29415020d7ddc493ac36ad2351414523f9804f3031a50c6bfded58d8b9a83f13877ae73571e9dcc50eedd7014230196313dfab8618e587e118ae6ba4d94db12 |
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad\settings.dat
| MD5 | eaa3db555ab5bc0cb364826204aad3f0 |
| SHA1 | a4cdfaac8de49e6e6e88b335cfeaa7c9e3c563ca |
| SHA256 | ef7baeb1b2ab05ff3c5fbb76c2759db49294654548706c7c8e87f0cde855b86b |
| SHA512 | e13981da51b52c15261ecabb98af32f9b920651b46b10ce0cc823c5878b22eb1420258c80deef204070d1e0bdd3a64d875ac2522e3713a3cf11657aa55aeccd4 |
\??\pipe\LOCAL\crashpad_4308_ALYPXDSGCNBNMLNW
| MD5 | d41d8cd98f00b204e9800998ecf8427e |
| SHA1 | da39a3ee5e6b4b0d3255bfef95601890afd80709 |
| SHA256 | e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855 |
| SHA512 | cf83e1357eefb8bdf1542850d66d8007d620e4050b5715dc83f4a921d36ce9ce47d0d13c5d85f2b0ff8318d2877eec2f63b931bd47417a81a538327af927da3e |
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad\settings.dat
| MD5 | 4b4f91fa1b362ba5341ecb2836438dea |
| SHA1 | 9561f5aabed742404d455da735259a2c6781fa07 |
| SHA256 | d824b742eace197ddc8b6ed5d918f390fde4b0fbf0e371b8e1f2ed40a3b6455c |
| SHA512 | fef22217dcdd8000bc193e25129699d4b8f7a103ca4fe1613baf73ccf67090d9fbae27eb93e4bb8747455853a0a4326f2d0c38df41c8d42351cdcd4132418dac |
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Preferences
| MD5 | 4ad02a59837a86b1e4e96290594c1bf7 |
| SHA1 | 7eba595e4d0bc5804e239889935468eecb3411c0 |
| SHA256 | b548275399b4043d2afc02164138312b201eeb1fc7590ed04548e5163f73961f |
| SHA512 | 0cc79c397e88775d2563ba5d92c48b3c4c524615df004c64431c6ed189c3e5d170bf148a3cf7ec8e3deeceb107baf6c8f5372179425231718039571967e481a8 |
C:\Users\Admin\Desktop\Fenomen Games.lnk
| MD5 | bad7bc05a1f42bf968e09c939bbe9efd |
| SHA1 | 10069f170b3bd66c86ed9b07f5897c5bc38cfd1e |
| SHA256 | f96c0f8c636b404ac0e9f2791f60b81102e04ee8d0ace17a19f970c79be7cfd4 |
| SHA512 | 118ed68c271aba77dd07b0d6ec233521e6602b07b9a75db61fab47e1ea9ef335b3c9468fd3be4034d5957455645e8ed4f9f807efefcf42b23523054f264923e5 |
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\data_reduction_proxy_leveldb\CURRENT
| MD5 | 46295cac801e5d4857d09837238a6394 |
| SHA1 | 44e0fa1b517dbf802b18faf0785eeea6ac51594b |
| SHA256 | 0f1bad70c7bd1e0a69562853ec529355462fcd0423263a3d39d6d0d70b780443 |
| SHA512 | 8969402593f927350e2ceb4b5bc2a277f3754697c1961e3d6237da322257fbab42909e1a742e22223447f3a4805f8d8ef525432a7c3515a549e984d3eff72b23 |
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\data_reduction_proxy_leveldb\CURRENT
| MD5 | 206702161f94c5cd39fadd03f4014d98 |
| SHA1 | bd8bfc144fb5326d21bd1531523d9fb50e1b600a |
| SHA256 | 1005a525006f148c86efcbfb36c6eac091b311532448010f70f7de9a68007167 |
| SHA512 | 0af09f26941b11991c750d1a2b525c39a8970900e98cba96fd1b55dbf93fee79e18b8aab258f48b4f7bda40d059629bc7770d84371235cdb1352a4f17f80e145 |
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Local State
| MD5 | 88a30446f055678fdc7784565a443ece |
| SHA1 | 1acd3a163f100b6ebb3510c9dd87325c2e9ccadf |
| SHA256 | 95f4585c0ceb7829f06cad76534f3d0c3445f2b7eff6f155d08d6a4b8715b648 |
| SHA512 | 5e86ced6f8d13c8409a890a8962915f81bcf9f6fbd18bb991733eacfc013d325fe8dbba26a816b47c4cc7d17700a491e21ab0e409ca3a1de77492b48a6dcd8e2 |
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Preferences
| MD5 | e1d99ea5faa24148065fb8d889971737 |
| SHA1 | 423ef4a26bcae17e05de9f99309af2a2f9c011ed |
| SHA256 | 5c3acc982c88ef2172fc98593159d71db762d441a8c0eb0772be9f806ec34d8f |
| SHA512 | 8b9ae21e6a549aa73e144e1684e28b56790d4d20f670476e477d29f59befe7e0c11b0a2203d59f1e8ffa9c56bcfeb99f35ce79c31300da8127a92dd978f2bfee |