Analysis Overview
SHA256
a26cb28d04832584c0b4e991fabcbf45c1b65573790ab649fd47f7ce3b95aa73
Threat Level: No (potentially) malicious behavior was detected
The file a353023df513ca5878837b14e9b038bb_JaffaCakes118 was found to be: No (potentially) malicious behavior was detected.
Malicious Activity Summary
Modifies Internet Explorer settings
Suspicious use of FindShellTrayWindow
Suspicious use of SetWindowsHookEx
Suspicious use of WriteProcessMemory
Enumerates system info in registry
Suspicious behavior: EnumeratesProcesses
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
Suspicious use of SendNotifyMessage
MITRE ATT&CK
Enterprise Matrix V15
Analysis: static1
Detonation Overview
Reported
2024-06-13 01:16
Signatures
Analysis: behavioral1
Detonation Overview
Submitted
2024-06-13 01:16
Reported
2024-06-13 01:19
Platform
win7-20240221-en
Max time kernel
121s
Max time network
127s
Command Line
Signatures
Modifies Internet Explorer settings
| Description | Indicator | Process | Target |
| Key created | \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Main | C:\Program Files\Internet Explorer\iexplore.exe | N/A |
| Set value (int) | \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" | C:\Program Files\Internet Explorer\iexplore.exe | N/A |
| Set value (data) | \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 | C:\Program Files\Internet Explorer\iexplore.exe | N/A |
| Set value (int) | \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" | C:\Program Files\Internet Explorer\iexplore.exe | N/A |
| Set value (data) | \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb010000003ae2eda9b55ec448b7316d5e494e7cfa0000000002000000000010660000000100002000000066e3cdec5524ac53f405b15307f3ea7286aad5cc16a0c30bfead89e3952a5e3f000000000e8000000002000020000000a98396900634e8537a4b5d7c6b9f110c42ea911ab60d76a4e2266347addc5e1e2000000065bac62c0f8f31364e215312cd2c8f4a011ad2dff2e744c0a5fbd946bd4c4ba8400000009c6c95e4437fac45b8f79ff3888822ef1cd219e6c11609f7ec06554aea4b4496db031cae8c6515a802fc0de2b60edbfb0227d9d7225c3bd8dbcc4156c154db07 | C:\Program Files\Internet Explorer\iexplore.exe | N/A |
| Key created | \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain | C:\Program Files\Internet Explorer\iexplore.exe | N/A |
| Set value (int) | \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{94248171-2922-11EF-B991-7EEA931DE775} = "0" | C:\Program Files\Internet Explorer\iexplore.exe | N/A |
| Key created | \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage | C:\Program Files\Internet Explorer\iexplore.exe | N/A |
| Key created | \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\DomainSuggestion | C:\Program Files\Internet Explorer\iexplore.exe | N/A |
| Key created | \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\LowRegistry | C:\Program Files\Internet Explorer\iexplore.exe | N/A |
| Key created | \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Zoom | C:\Program Files\Internet Explorer\iexplore.exe | N/A |
| Key created | \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch | C:\Program Files\Internet Explorer\iexplore.exe | N/A |
| Key created | \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery | C:\Program Files\Internet Explorer\iexplore.exe | N/A |
| Key created | \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing | C:\Program Files\Internet Explorer\iexplore.exe | N/A |
| Set value (data) | \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 70fc626c2fbdda01 | C:\Program Files\Internet Explorer\iexplore.exe | N/A |
| Set value (data) | \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 | C:\Program Files\Internet Explorer\iexplore.exe | N/A |
| Key created | \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\IntelliForms | C:\Program Files\Internet Explorer\iexplore.exe | N/A |
| Key created | \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage | C:\Program Files\Internet Explorer\iexplore.exe | N/A |
| Key created | \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\PageSetup | C:\Program Files\Internet Explorer\iexplore.exe | N/A |
| Key created | \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Toolbar | C:\Program Files\Internet Explorer\iexplore.exe | N/A |
| Key created | \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\SearchScopes | C:\Program Files\Internet Explorer\iexplore.exe | N/A |
| Set value (int) | \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" | C:\Program Files\Internet Explorer\iexplore.exe | N/A |
| Key created | \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\InternetRegistry | C:\Program Files\Internet Explorer\iexplore.exe | N/A |
| Set value (str) | \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" | C:\Program Files\Internet Explorer\iexplore.exe | N/A |
| Set value (str) | \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" | C:\Program Files\Internet Explorer\iexplore.exe | N/A |
| Set value (int) | \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" | C:\Program Files\Internet Explorer\iexplore.exe | N/A |
| Set value (int) | \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "424403263" | C:\Program Files\Internet Explorer\iexplore.exe | N/A |
| Key created | \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\IETld\LowMic | C:\Program Files\Internet Explorer\iexplore.exe | N/A |
| Key created | \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser | C:\Program Files\Internet Explorer\iexplore.exe | N/A |
| Key created | \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive | C:\Program Files\Internet Explorer\iexplore.exe | N/A |
| Key created | \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic | C:\Program Files\Internet Explorer\iexplore.exe | N/A |
| Key created | \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\GPU | C:\Program Files\Internet Explorer\iexplore.exe | N/A |
| Key created | \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Main | C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE | N/A |
| Key created | \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch | C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE | N/A |
| Set value (str) | \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" | C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE | N/A |
| Set value (int) | \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" | C:\Program Files\Internet Explorer\iexplore.exe | N/A |
Suspicious use of FindShellTrayWindow
| Description | Indicator | Process | Target |
| N/A | N/A | C:\Program Files\Internet Explorer\iexplore.exe | N/A |
Suspicious use of SetWindowsHookEx
| Description | Indicator | Process | Target |
| N/A | N/A | C:\Program Files\Internet Explorer\iexplore.exe | N/A |
| N/A | N/A | C:\Program Files\Internet Explorer\iexplore.exe | N/A |
| N/A | N/A | C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE | N/A |
| N/A | N/A | C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE | N/A |
| N/A | N/A | C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE | N/A |
| N/A | N/A | C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE | N/A |
Suspicious use of WriteProcessMemory
| Description | Indicator | Process | Target |
| PID 2164 wrote to memory of 2892 | N/A | C:\Program Files\Internet Explorer\iexplore.exe | C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE |
| PID 2164 wrote to memory of 2892 | N/A | C:\Program Files\Internet Explorer\iexplore.exe | C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE |
| PID 2164 wrote to memory of 2892 | N/A | C:\Program Files\Internet Explorer\iexplore.exe | C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE |
| PID 2164 wrote to memory of 2892 | N/A | C:\Program Files\Internet Explorer\iexplore.exe | C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE |
Processes
C:\Program Files\Internet Explorer\iexplore.exe
"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\a353023df513ca5878837b14e9b038bb_JaffaCakes118.html
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2164 CREDAT:275457 /prefetch:2
Network
| Country | Destination | Domain | Proto |
| US | 8.8.8.8:53 | stylesource.github.io | udp |
| US | 8.8.8.8:53 | cs.uwc.ac.za | udp |
| US | 185.199.108.153:80 | stylesource.github.io | tcp |
| US | 185.199.108.153:80 | stylesource.github.io | tcp |
| ZA | 196.21.45.103:80 | cs.uwc.ac.za | tcp |
| ZA | 196.21.45.103:80 | cs.uwc.ac.za | tcp |
| ZA | 196.21.45.103:80 | cs.uwc.ac.za | tcp |
| ZA | 196.21.45.103:80 | cs.uwc.ac.za | tcp |
| ZA | 196.21.45.103:80 | cs.uwc.ac.za | tcp |
| ZA | 196.21.45.103:80 | cs.uwc.ac.za | tcp |
| ZA | 196.21.45.103:80 | cs.uwc.ac.za | tcp |
| ZA | 196.21.45.103:80 | cs.uwc.ac.za | tcp |
| ZA | 196.21.45.103:443 | cs.uwc.ac.za | tcp |
| ZA | 196.21.45.103:443 | cs.uwc.ac.za | tcp |
| ZA | 196.21.45.103:443 | cs.uwc.ac.za | tcp |
| ZA | 196.21.45.103:443 | cs.uwc.ac.za | tcp |
| ZA | 196.21.45.103:443 | cs.uwc.ac.za | tcp |
| ZA | 196.21.45.103:443 | cs.uwc.ac.za | tcp |
| ZA | 196.21.45.103:443 | cs.uwc.ac.za | tcp |
| ZA | 196.21.45.103:443 | cs.uwc.ac.za | tcp |
| ZA | 196.21.45.103:443 | cs.uwc.ac.za | tcp |
| ZA | 196.21.45.103:443 | cs.uwc.ac.za | tcp |
| ZA | 196.21.45.103:443 | cs.uwc.ac.za | tcp |
| ZA | 196.21.45.103:443 | cs.uwc.ac.za | tcp |
| ZA | 196.21.45.103:443 | cs.uwc.ac.za | tcp |
| ZA | 196.21.45.103:443 | cs.uwc.ac.za | tcp |
| ZA | 196.21.45.103:443 | cs.uwc.ac.za | tcp |
| ZA | 196.21.45.103:443 | cs.uwc.ac.za | tcp |
| ZA | 196.21.45.103:443 | cs.uwc.ac.za | tcp |
| ZA | 196.21.45.103:443 | cs.uwc.ac.za | tcp |
| ZA | 196.21.45.103:443 | cs.uwc.ac.za | tcp |
| ZA | 196.21.45.103:443 | cs.uwc.ac.za | tcp |
| ZA | 196.21.45.103:443 | cs.uwc.ac.za | tcp |
| ZA | 196.21.45.103:443 | cs.uwc.ac.za | tcp |
| ZA | 196.21.45.103:443 | cs.uwc.ac.za | tcp |
| ZA | 196.21.45.103:443 | cs.uwc.ac.za | tcp |
| ZA | 196.21.45.103:443 | cs.uwc.ac.za | tcp |
| ZA | 196.21.45.103:443 | cs.uwc.ac.za | tcp |
| ZA | 196.21.45.103:443 | cs.uwc.ac.za | tcp |
| ZA | 196.21.45.103:443 | cs.uwc.ac.za | tcp |
| ZA | 196.21.45.103:443 | cs.uwc.ac.za | tcp |
| ZA | 196.21.45.103:443 | cs.uwc.ac.za | tcp |
| ZA | 196.21.45.103:443 | cs.uwc.ac.za | tcp |
| ZA | 196.21.45.103:443 | cs.uwc.ac.za | tcp |
| ZA | 196.21.45.103:443 | cs.uwc.ac.za | tcp |
| ZA | 196.21.45.103:443 | cs.uwc.ac.za | tcp |
| ZA | 196.21.45.103:443 | cs.uwc.ac.za | tcp |
| ZA | 196.21.45.103:443 | cs.uwc.ac.za | tcp |
| ZA | 196.21.45.103:443 | cs.uwc.ac.za | tcp |
| ZA | 196.21.45.103:443 | cs.uwc.ac.za | tcp |
| ZA | 196.21.45.103:443 | cs.uwc.ac.za | tcp |
| ZA | 196.21.45.103:443 | cs.uwc.ac.za | tcp |
| ZA | 196.21.45.103:443 | cs.uwc.ac.za | tcp |
| ZA | 196.21.45.103:443 | cs.uwc.ac.za | tcp |
| ZA | 196.21.45.103:443 | cs.uwc.ac.za | tcp |
| ZA | 196.21.45.103:443 | cs.uwc.ac.za | tcp |
| ZA | 196.21.45.103:443 | cs.uwc.ac.za | tcp |
| ZA | 196.21.45.103:443 | cs.uwc.ac.za | tcp |
| ZA | 196.21.45.103:443 | cs.uwc.ac.za | tcp |
| ZA | 196.21.45.103:443 | cs.uwc.ac.za | tcp |
| ZA | 196.21.45.103:443 | cs.uwc.ac.za | tcp |
| ZA | 196.21.45.103:443 | cs.uwc.ac.za | tcp |
| ZA | 196.21.45.103:443 | cs.uwc.ac.za | tcp |
| ZA | 196.21.45.103:443 | cs.uwc.ac.za | tcp |
| ZA | 196.21.45.103:443 | cs.uwc.ac.za | tcp |
| ZA | 196.21.45.103:443 | cs.uwc.ac.za | tcp |
| ZA | 196.21.45.103:443 | cs.uwc.ac.za | tcp |
| ZA | 196.21.45.103:80 | cs.uwc.ac.za | tcp |
| ZA | 196.21.45.103:80 | cs.uwc.ac.za | tcp |
| ZA | 196.21.45.103:80 | cs.uwc.ac.za | tcp |
| ZA | 196.21.45.103:443 | cs.uwc.ac.za | tcp |
| ZA | 196.21.45.103:443 | cs.uwc.ac.za | tcp |
| ZA | 196.21.45.103:443 | cs.uwc.ac.za | tcp |
| ZA | 196.21.45.103:443 | cs.uwc.ac.za | tcp |
| ZA | 196.21.45.103:443 | cs.uwc.ac.za | tcp |
| ZA | 196.21.45.103:443 | cs.uwc.ac.za | tcp |
| ZA | 196.21.45.103:443 | cs.uwc.ac.za | tcp |
| ZA | 196.21.45.103:443 | cs.uwc.ac.za | tcp |
| ZA | 196.21.45.103:443 | cs.uwc.ac.za | tcp |
| ZA | 196.21.45.103:443 | cs.uwc.ac.za | tcp |
| ZA | 196.21.45.103:443 | cs.uwc.ac.za | tcp |
| ZA | 196.21.45.103:443 | cs.uwc.ac.za | tcp |
| ZA | 196.21.45.103:443 | cs.uwc.ac.za | tcp |
| ZA | 196.21.45.103:443 | cs.uwc.ac.za | tcp |
| ZA | 196.21.45.103:443 | cs.uwc.ac.za | tcp |
| ZA | 196.21.45.103:443 | cs.uwc.ac.za | tcp |
| ZA | 196.21.45.103:443 | cs.uwc.ac.za | tcp |
| ZA | 196.21.45.103:443 | cs.uwc.ac.za | tcp |
| US | 8.8.8.8:53 | margarethelasinger.com | udp |
| ZA | 196.21.45.103:443 | cs.uwc.ac.za | tcp |
| ZA | 196.21.45.103:443 | cs.uwc.ac.za | tcp |
| ZA | 196.21.45.103:443 | cs.uwc.ac.za | tcp |
| ZA | 196.21.45.103:443 | cs.uwc.ac.za | tcp |
| ZA | 196.21.45.103:443 | cs.uwc.ac.za | tcp |
| ZA | 196.21.45.103:443 | cs.uwc.ac.za | tcp |
| ZA | 196.21.45.103:443 | cs.uwc.ac.za | tcp |
| ZA | 196.21.45.103:443 | cs.uwc.ac.za | tcp |
| ZA | 196.21.45.103:443 | cs.uwc.ac.za | tcp |
| ZA | 196.21.45.103:443 | cs.uwc.ac.za | tcp |
| ZA | 196.21.45.103:443 | cs.uwc.ac.za | tcp |
| ZA | 196.21.45.103:443 | cs.uwc.ac.za | tcp |
| ZA | 196.21.45.103:443 | cs.uwc.ac.za | tcp |
| US | 204.79.197.200:443 | ieonline.microsoft.com | tcp |
| US | 204.79.197.200:443 | ieonline.microsoft.com | tcp |
| US | 204.79.197.200:443 | ieonline.microsoft.com | tcp |
Files
C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\3NPBB818\jquery.min[1].htm
| MD5 | 4f8e702cc244ec5d4de32740c0ecbd97 |
| SHA1 | 3adb1f02d5b6054de0046e367c1d687b6cdf7aff |
| SHA256 | 9e17cb15dd75bbbd5dbb984eda674863c3b10ab72613cf8a39a00c3e11a8492a |
| SHA512 | 21047fea5269fee75a2a187aa09316519e35068cb2f2f76cfaf371e5224445e9d5c98497bd76fb9608d2b73e9dac1a3f5bfadfdc4623c479d53ecf93d81d3c9f |
C:\Users\Admin\AppData\Local\Temp\Cab3DBE.tmp
| MD5 | ac05d27423a85adc1622c714f2cb6184 |
| SHA1 | b0fe2b1abddb97837ea0195be70ab2ff14d43198 |
| SHA256 | c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d |
| SHA512 | 6d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d |
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\94308059B57B3142E455B38A6EB92015
| MD5 | 49aebf8cbd62d92ac215b2923fb1b9f5 |
| SHA1 | 1723be06719828dda65ad804298d0431f6aff976 |
| SHA256 | b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f |
| SHA512 | bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b |
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
| MD5 | 06ed874a2fa8e3561f3f68c18ae8ac58 |
| SHA1 | 51ebda2602cdf34800c55ee47d769e5cc100f319 |
| SHA256 | 27b52762a9a1ee0ee9415623e065d8c5cefa2e29bf0f03b7c1901cfea5ff0f60 |
| SHA512 | abce1fc9719b8b18d56dd0067b49827dde6d2320772feb08e21d612c5db97c8df546fbf0bbfd280384c5ca9fb626dc65ddfed086e5015ec15ef1dfd7b5280913 |
C:\Users\Admin\AppData\Local\Temp\Tar3EB0.tmp
| MD5 | 4ea6026cf93ec6338144661bf1202cd1 |
| SHA1 | a1dec9044f750ad887935a01430bf49322fbdcb7 |
| SHA256 | 8efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8 |
| SHA512 | 6c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b |
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
| MD5 | 3bd285b06e3fbdcf3b2f8751d5af8a50 |
| SHA1 | d0db6a6d0043a104841d3db9f5e66225aa7e5980 |
| SHA256 | db5a06f874485e19392670c0b35b66f0b30d7e39166e317423373d3a821f304f |
| SHA512 | 8275ec3d3a66fbadc288f241fbaae79b2a852e04b0c52fd1c31c2ff42b7832b70001b1d72bc65c7d084ea46e934c7646e34590b6c1a93c456bde5fb3daeb7f85 |
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
| MD5 | 75c35b696d745bd548251248335985ed |
| SHA1 | 22f5899fd2f0e2d451310fbad3396e40a0813eba |
| SHA256 | 9351dd15ce35bc8d6e883a85a3387359252c9975497611dfe32a7805164b43ec |
| SHA512 | 991be47c0eb9f9e7794d0f3ef028a00d8373c3693373cdbb54f144dcad200afce4eb3e2ecfdddfb2d5cb7b993f78ff4c1478eb25892e6f45a31eb7e16a64d3fd |
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
| MD5 | 08aad6c3c17c6546cc3d2a20607ef341 |
| SHA1 | 161c0549171c3fb6e24c1c378701bc9e93649112 |
| SHA256 | 8232796db2ebde0e0dfdee310466b8c8addcdc6ead8b8ab212d8f3e9016bd41e |
| SHA512 | 4922b8d1d712cafdf4c7bef5237fbd7a753f6b7710d5ffc3f2487b0ce928d37d4a2f78b6ad7bc88980dde861922646ee7e11bfd2adf360267b6c4806a0f8f149 |
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
| MD5 | 17a70090c9ceb29822cad0fae2d5fd16 |
| SHA1 | 39f1d98c3bfe65c250bcb58dc90565f9d45c0d3f |
| SHA256 | ece188f87c14b103fc48345716035d2aff8c63c66ee1024f1f6e013b5e5944cf |
| SHA512 | 3a15ec9637a17d4233e84846cea35f23edd0149af9057603c212f88d3e61ce2d9c8e73f47b9e9e0089a360b0af289cfc5ed3c6014a68012990b5149cda5c6793 |
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
| MD5 | e36a6e69563921f9f8f0d593ce8a79e6 |
| SHA1 | 2f28a2963c3889d3132d35ada62125640d4a208f |
| SHA256 | 7c8dbcb579b2742508515ab7acf2fc316c89457e2abb4a1895059da613db5d9d |
| SHA512 | 4ca9081189cf122258fcc4256e1d035edd124ea0522e717c5ad5caf488afec366dcbb1abff728813c8284f1f53a46c894803f82e00123f73160c74250b3504f2 |
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
| MD5 | 87cb8e948bf6d58b8647b71053a71c29 |
| SHA1 | 9a29d9bf3fea0178f4ac297b24da514b3ae01e7d |
| SHA256 | 4aa80a51e1e1c146be68ce6ac857c4cd6590f638143d196000ef1864a4f8d0c7 |
| SHA512 | 3bbbb1d1585d574c3a682a76c132f4ac034af3070dfcd00bf271feb6674d5fa32867dfa13fdc294c019be97bd1e91989c789090cb91799ad2dd19a403f728a0e |
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
| MD5 | ad16454124c428c5854355810917fe21 |
| SHA1 | 9df97ecedb8ee8bb47957b79fb423adf08dedcf7 |
| SHA256 | d01f6e7aed55222cfa5b8e9c84ab1d802efac7e35b7bdc6df94cb2dc7a5aecb3 |
| SHA512 | a74e899713acde436e5813ee4bf2d169fa418caca73c48762d442fada01fe8c915b7060b5bb8ed8bbd4bc684dbf81080ee9f85ab82b02861bbe09dd963fafa3a |
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
| MD5 | 943d4c4f388c703a34d2fbd0b64b61c5 |
| SHA1 | 75f6a755cb4aeb8b3a85b7b9dfa624d3a3a17903 |
| SHA256 | eee4e8b6f2c935a96365026fd82e160fe850934bee9d4b94ac2c417c403c508a |
| SHA512 | b6e953ecae80554b5b238b780ca2fa120fc4703e4a95fef1be9a0dc988443a35551801de5dd173539ad361566c2b396569307373be8cb619ca7d1e680d08c210 |
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
| MD5 | 3306cf038cbee3cfad0ed8cb5482816f |
| SHA1 | 84033f3be327e77aff0bc1984279ff1c2effd920 |
| SHA256 | 8f0ce03e53389a759285204e517a417514e3341e2468be1a9586189a4453f83b |
| SHA512 | 594695a7bba56ed9cd2c6ae5a8fd5e8e05a499f64f4573bd2e21157dcc6fdc62cca4eaed130eabacaef3dfd6621ea3bf75623e210bf1ab36b1856f39b2b7d8dd |
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
| MD5 | d3c7d2452bf5f2b3c314b8457213484f |
| SHA1 | 5c5b4a707edb064ca0f3444164e2e9965a9a0e7a |
| SHA256 | 49882dce20f8de3961136586a7b42088c15dcfffa604c0646ffd363315d4c4d0 |
| SHA512 | 1c9c11eff493606011bf4a0dc0c7b23a2f40e590a5cd8aefc6970d636425be89555840783f51145e85e6c3e4d3a1ced502a31724ea7a078625f004225b0e27b4 |
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
| MD5 | 0ada32d54c7f1d16ba163d32c53b4a4a |
| SHA1 | 103d67c7b973a85790e015893904379307a22a02 |
| SHA256 | f8638b9053fe82eb9245700c43347372b4652413c9c82e4067d4940674e01b5f |
| SHA512 | 8fdd5f73f285932257d17e7ce3bdc2a0156f972c37ac9e83a2ea91b8852b67f821319d0fe6ad33392c2f2b0f5d7d01bfcdbeda9e13b7d838d92aecdb95720441 |
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
| MD5 | 59df7f0734589f706ea4078dfe433b06 |
| SHA1 | 31a662af36e5a15fc25a4589c662f8a00985c209 |
| SHA256 | 758c0ede4f5a3f59ab548c69f79c3211674375abe0625d9cda7a1773cf03e7bc |
| SHA512 | 4de76d4290354c85026d69644f1903528fa9af22e961234e114a7faf24b6e8f52fe5bd36c7c8ef1ad4f7bf14e4cda9d8cf848baa6b9f7c00016a7364bd9e471c |
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
| MD5 | b9992d26e6845eb834b3b2f5cdb281b2 |
| SHA1 | a4969376d333ca5037b895dbcb9485ba9d8f8d7a |
| SHA256 | f0ce075821880f455e696663128a7b03bec44b8e08729e6d787ce9ffbd63c05f |
| SHA512 | ab86546214f964dae478646ced822e0a7811418376a8511d40554f2f3778f10ce2cb0d24d037ec91d19a49cb4305d45b8d02e05bdfa156f59d5edcfbd6423dbf |
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
| MD5 | 346813736f9e16e9d407a4fd63bf904c |
| SHA1 | 6160c10d833958232b6c718a5c2e5c4853ea4f26 |
| SHA256 | 425885d5d1316a43d00dab7a23bc7ce080c7177065434adc6112f3a85b8153bb |
| SHA512 | 849cdedb79455be34f0285f74d1a88246853c93575a918bdcd5887cc5df97d0c474f094d9dfdbec4ef6c4e0c5985923e09eec0e2aebbde12d210a00c8acb4a7d |
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
| MD5 | 1015554eb9a8452579b06103bd1a0a94 |
| SHA1 | 55b638ff8d00e1389237671c942ff97e21df2368 |
| SHA256 | 825c3893c55f0d4d1f2e5e7eba0a744bffc34ea67e5842ded3f743dcf4dcd96b |
| SHA512 | a4918bf828d63944ab04e1c78a0a61725fbdb274c60cc3da4c3b38ca0647999539d5f18c2ffb7cb8392861bd206b7722c0f44ff364f8695dd3584d0be930abb3 |
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
| MD5 | bce1150d1b6fda48ab6f02773b1ad6a7 |
| SHA1 | f85b32ff04c944cd55ac91b8631a02181cd509ff |
| SHA256 | 8c058af694ffd9df9068e91332cd2d7be10d0f7b5029912186a483c59081236e |
| SHA512 | 5a842646e1416dadf99891d6e5420df8a79b7a1294078ac009714a18a6e4e9c9b9c380172371e18a9a1032856a565318a86efe762a98c52ec24ef62a0eda9852 |
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
| MD5 | b123dc4c7ccd80fdbb775d51a86d4295 |
| SHA1 | fe2d3288237977f96d8ebf51ad6981b0d6d8cedd |
| SHA256 | 3b813e7103fe81a500551dc37dbedd189435334fd78418e864fa195871f2159c |
| SHA512 | ec7d238188a6264bb61fc0acb03714739e819473adce923e7402744b5e7b3214d37602272768f5cc93e69174172e1bd8f619de3702b8074e3f41596a2b5c5680 |
Analysis: behavioral2
Detonation Overview
Submitted
2024-06-13 01:16
Reported
2024-06-13 01:19
Platform
win10v2004-20240508-en
Max time kernel
147s
Max time network
149s
Command Line
Signatures
Enumerates system info in registry
| Description | Indicator | Process | Target |
| Key opened | \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS | C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe | N/A |
| Key value queried | \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer | C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe | N/A |
| Key value queried | \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName | C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe | N/A |
Suspicious behavior: EnumeratesProcesses
| Description | Indicator | Process | Target |
| N/A | N/A | C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe | N/A |
| N/A | N/A | C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe | N/A |
| N/A | N/A | C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe | N/A |
| N/A | N/A | C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe | N/A |
| N/A | N/A | C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe | N/A |
| N/A | N/A | C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe | N/A |
| N/A | N/A | C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe | N/A |
| N/A | N/A | C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe | N/A |
| N/A | N/A | C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe | N/A |
| N/A | N/A | C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe | N/A |
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
| Description | Indicator | Process | Target |
| N/A | N/A | C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe | N/A |
| N/A | N/A | C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe | N/A |
| N/A | N/A | C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe | N/A |
| N/A | N/A | C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe | N/A |
| N/A | N/A | C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe | N/A |
| N/A | N/A | C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe | N/A |
Suspicious use of FindShellTrayWindow
Suspicious use of SendNotifyMessage
Suspicious use of WriteProcessMemory
Processes
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\a353023df513ca5878837b14e9b038bb_JaffaCakes118.html
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffba87a46f8,0x7ffba87a4708,0x7ffba87a4718
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2176,2902587870727583437,7813699181838383589,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2180 /prefetch:2
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2176,2902587870727583437,7813699181838383589,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2264 /prefetch:3
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2176,2902587870727583437,7813699181838383589,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2852 /prefetch:8
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2176,2902587870727583437,7813699181838383589,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3228 /prefetch:1
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2176,2902587870727583437,7813699181838383589,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3252 /prefetch:1
C:\Windows\System32\CompPkgSrv.exe
C:\Windows\System32\CompPkgSrv.exe -Embedding
C:\Windows\System32\CompPkgSrv.exe
C:\Windows\System32\CompPkgSrv.exe -Embedding
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe
"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2176,2902587870727583437,7813699181838383589,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4964 /prefetch:8
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe
"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2176,2902587870727583437,7813699181838383589,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4964 /prefetch:8
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2176,2902587870727583437,7813699181838383589,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4672 /prefetch:1
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2176,2902587870727583437,7813699181838383589,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4668 /prefetch:1
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2176,2902587870727583437,7813699181838383589,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4504 /prefetch:1
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2176,2902587870727583437,7813699181838383589,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4684 /prefetch:1
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2176,2902587870727583437,7813699181838383589,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1836 /prefetch:2
Network
| Country | Destination | Domain | Proto |
| US | 8.8.8.8:53 | cs.uwc.ac.za | udp |
| US | 8.8.8.8:53 | stylesource.github.io | udp |
| N/A | 224.0.0.251:5353 | udp | |
| US | 8.8.8.8:53 | cs.uwc.ac.za | udp |
| US | 8.8.8.8:53 | cs.uwc.ac.za | udp |
Files
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad\settings.dat
| MD5 | 87f7abeb82600e1e640b843ad50fe0a1 |
| SHA1 | 045bbada3f23fc59941bf7d0210fb160cb78ae87 |
| SHA256 | b35d6906050d90a81d23646f86c20a8f5d42f058ffc6436fb0a2b8bd71ee1262 |
| SHA512 | ea8e7f24ab823ad710ce079c86c40aa957353a00d2775732c23e31be88a10d212e974c4691279aa86016c4660f5795febf739a15207833df6ed964a9ed99d618 |
\??\pipe\LOCAL\crashpad_3196_GBLHLWYWOVLVRMZH
| MD5 | d41d8cd98f00b204e9800998ecf8427e |
| SHA1 | da39a3ee5e6b4b0d3255bfef95601890afd80709 |
| SHA256 | e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855 |
| SHA512 | cf83e1357eefb8bdf1542850d66d8007d620e4050b5715dc83f4a921d36ce9ce47d0d13c5d85f2b0ff8318d2877eec2f63b931bd47417a81a538327af927da3e |
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad\settings.dat
| MD5 | f61fa5143fe872d1d8f1e9f8dc6544f9 |
| SHA1 | df44bab94d7388fb38c63085ec4db80cfc5eb009 |
| SHA256 | 284a24b5b40860240db00ef3ae6a33c9fa8349ab5490a634e27b2c6e9a191c64 |
| SHA512 | 971000784a6518bb39c5cf043292c7ab659162275470f5f6b632ea91a6bcae83bc80517ceb983dd5abfe8fb4e157344cb65c27e609a879eec00b33c5fad563a6 |
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\2f80611b-52e0-4ddd-aa10-d8c42153d7ca.tmp
| MD5 | 22b7a5ad85ad5f7cf8c482f6f6acf514 |
| SHA1 | a92d1bff1be947916de1dd2add21905e3f1f59b7 |
| SHA256 | 96f00848b4cee31369444891c274aabbbc77c71657ba5a8acd0a3710362bff19 |
| SHA512 | 9e9609a7c5ae0459550c6879abdc4aec447779128f0b3cca140e76cd228c385908445bf0e7a35bf12827b2625954075468c25543a9569f66e07404cce0d4f157 |
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Local State
| MD5 | 92158514622fa696c377f976eb6d5513 |
| SHA1 | db48149ff1f714d61a984a398701d5bf5e71e031 |
| SHA256 | cc2c7ef1237c5a5a3fd7c4b2f09a4752e70f427860bcbc49c271f1ec3f74f45c |
| SHA512 | 2f480ea3719985292f4c38fd7ab82746f098c1677e52494e8a16ddc17c0bc01edb4d9d45f3c8754e11a0a6e8dc423e99266669bafc99950ad81c3fe8155571de |
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\data_reduction_proxy_leveldb\CURRENT
| MD5 | 6752a1d65b201c13b62ea44016eb221f |
| SHA1 | 58ecf154d01a62233ed7fb494ace3c3d4ffce08b |
| SHA256 | 0861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd |
| SHA512 | 9cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389 |
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Preferences
| MD5 | 3238b2fd7c25f9c9941fe8950dd402f0 |
| SHA1 | f0da53c98509f07d6ae68131ea37691e9ff798a4 |
| SHA256 | f79e00402694c3493f70852cbffeb20ba6c58bbc1253aa0adc556a0552a3613e |
| SHA512 | bc2c2b8acd6816144704f45c778d44aaee41118f5c26c9fe9894b987e68a48c9ad808a3b8f779cc1b7c86f0ccd4a02e99d448fbaed23095b3e26ea3be6da7176 |