Analysis

  • max time kernel
    149s
  • max time network
    150s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240802-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system
  • submitted
    06/09/2024, 07:04

General

  • Target

    cef3cbb01fb04c389cddafeccb7c0158_JaffaCakes118.exe

  • Size

    137KB

  • MD5

    cef3cbb01fb04c389cddafeccb7c0158

  • SHA1

    57f6544dae29a3a96b95014509e0534a2ece2dca

  • SHA256

    dbea5e842b67c3e0f57330d44867d56bca910ed7382185cfcb325df20124fc8b

  • SHA512

    37d318df342a99804f661c76bb354f3979cc9dc123a4417f089376ba21b3addd84968be8f224dc6254f92c0fd7c1ec5c3091ca10325ca92899c9bf8ffa9feca2

  • SSDEEP

    3072:rrXoMFXFfiVdubWibOQNi3MWL4FksNYFfPK:rLosfwAbpi3MDEK

Malware Config

Signatures

  • UAC bypass 3 TTPs 2 IoCs
  • Executes dropped EXE 2 IoCs
  • Adds Run key to start application 2 TTPs 1 IoCs
  • Checks whether UAC is enabled 1 TTPs 4 IoCs
  • Subvert Trust Controls: Mark-of-the-Web Bypass 1 TTPs 2 IoCs

    When files are downloaded from the Internet, they are tagged with a hidden NTFS Alternate Data Stream (ADS) named Zone.Identifier with a specific value known as the MOTW.

  • Browser Information Discovery 1 TTPs

    Enumerate browser information.

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Location Discovery: System Language Discovery 1 TTPs 5 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Enumerates system info in registry 2 TTPs 3 IoCs
  • NTFS ADS 2 IoCs
  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 9 IoCs
  • Suspicious use of FindShellTrayWindow 25 IoCs
  • Suspicious use of SendNotifyMessage 24 IoCs
  • Suspicious use of SetWindowsHookEx 1 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs
  • System policy modification 1 TTPs 4 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\cef3cbb01fb04c389cddafeccb7c0158_JaffaCakes118.exe
    "C:\Users\Admin\AppData\Local\Temp\cef3cbb01fb04c389cddafeccb7c0158_JaffaCakes118.exe"
    1⤵
    • Adds Run key to start application
    • System Location Discovery: System Language Discovery
    • Suspicious use of WriteProcessMemory
    PID:4468
    • C:\Windows\SysWOW64\cmd.exe
      /c start http://youporn.ru
      2⤵
      • System Location Discovery: System Language Discovery
      • Suspicious use of WriteProcessMemory
      PID:4712
      • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
        "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument http://youporn.ru/
        3⤵
        • Enumerates system info in registry
        • Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
        • Suspicious use of FindShellTrayWindow
        • Suspicious use of SendNotifyMessage
        • Suspicious use of WriteProcessMemory
        PID:1416
        • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
          "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0x120,0x124,0x128,0xfc,0x12c,0x7ffa4af446f8,0x7ffa4af44708,0x7ffa4af44718
          4⤵
            PID:1432
          • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
            "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2252,16372262396367182668,5577543595408587102,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2264 /prefetch:2
            4⤵
              PID:3408
            • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
              "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2252,16372262396367182668,5577543595408587102,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2316 /prefetch:3
              4⤵
                PID:5100
              • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2252,16372262396367182668,5577543595408587102,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2916 /prefetch:8
                4⤵
                  PID:3080
                • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                  "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2252,16372262396367182668,5577543595408587102,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3296 /prefetch:1
                  4⤵
                    PID:636
                  • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                    "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2252,16372262396367182668,5577543595408587102,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3320 /prefetch:1
                    4⤵
                      PID:4976
                    • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                      "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2252,16372262396367182668,5577543595408587102,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4648 /prefetch:1
                      4⤵
                        PID:4588
                      • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                        "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2252,16372262396367182668,5577543595408587102,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4844 /prefetch:1
                        4⤵
                          PID:1952
                        • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                          "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2252,16372262396367182668,5577543595408587102,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5028 /prefetch:1
                          4⤵
                            PID:3156
                          • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                            "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2252,16372262396367182668,5577543595408587102,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3632 /prefetch:1
                            4⤵
                              PID:4368
                            • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                              "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2252,16372262396367182668,5577543595408587102,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3596 /prefetch:1
                              4⤵
                                PID:516
                              • C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe
                                "C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2252,16372262396367182668,5577543595408587102,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5920 /prefetch:8
                                4⤵
                                  PID:1620
                                • C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe
                                  "C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2252,16372262396367182668,5577543595408587102,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5920 /prefetch:8
                                  4⤵
                                    PID:4552
                                  • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                    "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2252,16372262396367182668,5577543595408587102,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=13 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5520 /prefetch:1
                                    4⤵
                                      PID:4420
                                    • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                      "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2252,16372262396367182668,5577543595408587102,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=14 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5968 /prefetch:1
                                      4⤵
                                        PID:3868
                                      • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                        "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2252,16372262396367182668,5577543595408587102,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=5216 /prefetch:2
                                        4⤵
                                          PID:1448
                                    • C:\Windows\SysWOW64\cmd.exe
                                      C:\Windows\system32\cmd.exe /c C:\ProgramData\Media\rdb.bat
                                      2⤵
                                      • Subvert Trust Controls: Mark-of-the-Web Bypass
                                      • System Location Discovery: System Language Discovery
                                      • NTFS ADS
                                      PID:3488
                                    • C:\ProgramData\Media\plugin.exe
                                      -wait
                                      2⤵
                                      • UAC bypass
                                      • Executes dropped EXE
                                      • Checks whether UAC is enabled
                                      • System Location Discovery: System Language Discovery
                                      • Suspicious behavior: EnumeratesProcesses
                                      • Suspicious use of SetWindowsHookEx
                                      • Suspicious use of WriteProcessMemory
                                      • System policy modification
                                      PID:3840
                                      • C:\ProgramData\Media\watcher.exe
                                        C:\ProgramData\Media\watcher.exe
                                        3⤵
                                        • UAC bypass
                                        • Executes dropped EXE
                                        • Checks whether UAC is enabled
                                        • System Location Discovery: System Language Discovery
                                        • Suspicious behavior: EnumeratesProcesses
                                        • System policy modification
                                        PID:3764
                                  • C:\Windows\System32\CompPkgSrv.exe
                                    C:\Windows\System32\CompPkgSrv.exe -Embedding
                                    1⤵
                                      PID:3816
                                    • C:\Windows\System32\CompPkgSrv.exe
                                      C:\Windows\System32\CompPkgSrv.exe -Embedding
                                      1⤵
                                        PID:2084

                                      Network

                                      MITRE ATT&CK Enterprise v15

                                      Replay Monitor

                                      Loading Replay Monitor...

                                      Downloads

                                      • C:\ProgramData\Media\plugin.exe

                                        Filesize

                                        137KB

                                        MD5

                                        cef3cbb01fb04c389cddafeccb7c0158

                                        SHA1

                                        57f6544dae29a3a96b95014509e0534a2ece2dca

                                        SHA256

                                        dbea5e842b67c3e0f57330d44867d56bca910ed7382185cfcb325df20124fc8b

                                        SHA512

                                        37d318df342a99804f661c76bb354f3979cc9dc123a4417f089376ba21b3addd84968be8f224dc6254f92c0fd7c1ec5c3091ca10325ca92899c9bf8ffa9feca2

                                      • C:\ProgramData\Media\plugin.exe:Zone.Identifier

                                        Filesize

                                        13B

                                        MD5

                                        38de427224a5082a04fe82e2bd4ea9ec

                                        SHA1

                                        7e4a53de1f83762dd2febd39b818e2258bc83bc1

                                        SHA256

                                        12f99f53144294750fe8713d580eda286f4bd95cd9c840db8ab957def8040028

                                        SHA512

                                        ec3f3c324eeaad91ab0efd47b3084493d863f969344fa1ba87ace1974908053d396673b44c33b4dceeef792a74ad9278e06acc27c83459af1153de52f83afcbf

                                      • C:\ProgramData\Media\rdb.bat

                                        Filesize

                                        97B

                                        MD5

                                        5303b5018a6cd19200b98d31ab04f25d

                                        SHA1

                                        8285eb92f131111e40d2dc864d3b386dad6b9129

                                        SHA256

                                        464648d492af6bb50cf65ddcbdca3e90d4b224ccc6f4ce3944d439b6c32da524

                                        SHA512

                                        654aed00850f6b7e424a5ec5acad086a51fb54f5f944238979f43fa1aac430661250210fe5f38dcd78e46311adc7e6b282cb5c41bebfe5a7d297afd6db6de21b

                                      • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\070E0202839D9D67350CD2613E78E416

                                        Filesize

                                        1KB

                                        MD5

                                        55540a230bdab55187a841cfe1aa1545

                                        SHA1

                                        363e4734f757bdeb89868efe94907774a327695e

                                        SHA256

                                        d73494e3446b02167573b3cde3ae1c8584ac26e15e45ac3ec0326708425d90fb

                                        SHA512

                                        c899cb1d31d3214fd9dc8626a55e40580d3b2224bf34310c2abd85d0f63e2dedaeae57832f048c2f500cb2cbf83683fcb14139af3f0b5251606076cdb4689c54

                                      • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\070E0202839D9D67350CD2613E78E416

                                        Filesize

                                        230B

                                        MD5

                                        90ddbcc6ae21f4a1aad0632da854a93c

                                        SHA1

                                        3283be6b86995ea963e87d2c0ba2905620846b52

                                        SHA256

                                        1e8a4598c9fc2a7812586a48bf2e6fa9d289c9652eeedda7059d04c708b42e5c

                                        SHA512

                                        9990e1a203987a3a7536f01d05652f19d3034c9b6fa626e104ce2f0df2f5b71b248d4ee4a986a12fc7904d6ec7c0ed6d4a3dfe4def80bb5ceb9c48f5d6a93ce3

                                      • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\77EC63BDA74BD0D0E0426DC8F8008506

                                        Filesize

                                        328B

                                        MD5

                                        911997fa5f4f843cbcf99ac726cbc594

                                        SHA1

                                        3e4f8289e8433701c454fa5dceba5c11973ed1de

                                        SHA256

                                        2a179659431b8583ecfb617015f67782a1feba88d009beafe658b823b72d7aee

                                        SHA512

                                        53abc0a8e837642ebbac15d8bd8cd482ca052f3f2de57efa4f9f912e795e9604295608d711fc32f16cdc724671bbab5dee525bcf71f1fa969b5c62e9299a7959

                                      • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad\settings.dat

                                        Filesize

                                        152B

                                        MD5

                                        4dd2754d1bea40445984d65abee82b21

                                        SHA1

                                        4b6a5658bae9a784a370a115fbb4a12e92bd3390

                                        SHA256

                                        183b8e82a0deaa83d04736553671cedb738adc909f483b3c5f822a0e6be7477d

                                        SHA512

                                        92d44ee372ad33f892b921efa6cabc78e91025e89f05a22830763217826fa98d51d55711f85c8970ac58abf9adc6c85cc40878032cd6d2589ab226cd099f99e1

                                      • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad\settings.dat

                                        Filesize

                                        152B

                                        MD5

                                        ecf7ca53c80b5245e35839009d12f866

                                        SHA1

                                        a7af77cf31d410708ebd35a232a80bddfb0615bb

                                        SHA256

                                        882a513b71b26210ff251769b82b2c5d59a932f96d9ce606ca2fab6530a13687

                                        SHA512

                                        706722bd22ce27d854036b1b16e6a3cdb36284b66edc76238a79c2e11cee7d1307b121c898ad832eb1af73e4f08d991d64dc0bff529896ffb4ebe9b3dc381696

                                      • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index

                                        Filesize

                                        3KB

                                        MD5

                                        166ec39ac838dcba1bfe33fd29830132

                                        SHA1

                                        5a25cc1241bfbb607d24dad39adb22b97a0c6df0

                                        SHA256

                                        e3bb8236ab6483dbb34819527bf13fd6c10386e61f2455a0eb4fc139d2340f6a

                                        SHA512

                                        a42579c283809e03bf091558d7e5e8093b265fb96930e102a66e1cbf250abd9f37beb54c4ba75f558832a96d20cfb70634320cf6cdbb0582175ee821bbc4ab97

                                      • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\File System\000\t\Paths\CURRENT

                                        Filesize

                                        16B

                                        MD5

                                        46295cac801e5d4857d09837238a6394

                                        SHA1

                                        44e0fa1b517dbf802b18faf0785eeea6ac51594b

                                        SHA256

                                        0f1bad70c7bd1e0a69562853ec529355462fcd0423263a3d39d6d0d70b780443

                                        SHA512

                                        8969402593f927350e2ceb4b5bc2a277f3754697c1961e3d6237da322257fbab42909e1a742e22223447f3a4805f8d8ef525432a7c3515a549e984d3eff72b23

                                      • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Network Persistent State

                                        Filesize

                                        1KB

                                        MD5

                                        c4a31b7d07639aa506ab0fcf188b7aa0

                                        SHA1

                                        c24d7e6b7190b39628db7a6c6c254beb06658226

                                        SHA256

                                        277ab0988fb8731900eadb57104d35d160516f67587811442d0a5e7b9f160fbe

                                        SHA512

                                        8faa8488b6bd8c0af373becef73edf132ab0e35219f437e5445ed3ff781dde9b4c318929776613c6e8c99d576898ca138e63127a14384323eb9d649f2e15449a

                                      • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Preferences

                                        Filesize

                                        5KB

                                        MD5

                                        5adc9fff2bdf8f44e6b1c1474fbe99e1

                                        SHA1

                                        020a21e447cbc6bd64f6d8a4ec979f293402451e

                                        SHA256

                                        cc1d8985930a05a8bb15f8962e29e8fcea2549a4eb24adeee23f65a2e5c4974f

                                        SHA512

                                        5c462c21c65f2afb2bbd4ddd146b35a25ea01cc98acf43190cb3f0432c36be71a816994dc74303c7e2b45bf356b4eb5a4ff83dff5d58ab5defc2fc0e8f40d01f

                                      • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Preferences

                                        Filesize

                                        7KB

                                        MD5

                                        d93a3e4c31e06c8e0aedc9faccff178e

                                        SHA1

                                        0fa1d7a0be149c5e6a2f18dbee29d3664db6a0d1

                                        SHA256

                                        03fa39cac6d16bdd1c4a4a2c691cc2161a8c480a71666bf9c2cf469e8e4d013a

                                        SHA512

                                        9fa9674d3dde04da231f219da4fb598ba6f6b805146e27b86f618fa8b9cbb5cec9854ed8a821c9edb90a0e459ad6c951e030e08e0af7836933fe18b636e90695

                                      • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\data_reduction_proxy_leveldb\CURRENT

                                        Filesize

                                        16B

                                        MD5

                                        6752a1d65b201c13b62ea44016eb221f

                                        SHA1

                                        58ecf154d01a62233ed7fb494ace3c3d4ffce08b

                                        SHA256

                                        0861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd

                                        SHA512

                                        9cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389

                                      • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Local State

                                        Filesize

                                        11KB

                                        MD5

                                        0cc88e87aedbb87920220d953b8e3910

                                        SHA1

                                        01172a7d03a450741e516c5565f653adce7b0495

                                        SHA256

                                        d4d2d82777ccbbfb19f71b83b52a5c1b3af8142b3df3bb0ad66aa3e1c23da897

                                        SHA512

                                        50ca01a2d776299de0cb7b77d7aafd5c6ec9dcaa2ee3e298e531b028175d7f88bda381b0911868ac314fd7cd411b8a44852e4e84a439710d78e5e556cc5e1b97

                                      • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Local State

                                        Filesize

                                        10KB

                                        MD5

                                        7f589e70560e554d495329ac0b87857f

                                        SHA1

                                        daa0a02459ab9da14c3716d935a80be0de770acf

                                        SHA256

                                        d05188da58415ce3fcc7b6cf1f4cda80ca9db999b9d6b2bf30f22123ccfc3afd

                                        SHA512

                                        e1ee4b8e311d64f84d694047300ab12141b3d21e56735a08d123834836e5ef29640a471133f8ebca4f6e77e167f638eaf650419b0f4fa2b815827238a4ddaf52