Analysis
-
max time kernel
147s -
max time network
136s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
09/10/2024, 10:02
Behavioral task
behavioral1
Sample
2f27e35cae67ae266e06fdf0059244fa_JaffaCakes118.exe
Resource
win7-20240903-en
General
-
Target
2f27e35cae67ae266e06fdf0059244fa_JaffaCakes118.exe
-
Size
36KB
-
MD5
2f27e35cae67ae266e06fdf0059244fa
-
SHA1
47942b32b04e33e4893ba00f46dfccc50b8fb904
-
SHA256
deb4ae105f7a6e9209f7c4e603a310801f1e1721d33c281c35df30932e95ae16
-
SHA512
f8eb6befcdb09406a359b8df465bccebf06ff93e16d0240a374257ae0eb91bfe8477ae2090aed88ebac1432d37f286cf83e2a1a94785db7619e5d7a1d2d96526
-
SSDEEP
768:HDDEJsLe5weDg8qItmBMtfwzmPeLNyj+5LDJpf3bUPe1rcxmy:vhLeO+gYtmBMWzmPb+5LDHf3YG1Ixmy
Malware Config
Signatures
-
ACProtect 1.3x - 1.4x DLL software 1 IoCs
Detects file using ACProtect software.
resource yara_rule behavioral2/files/0x000b000000023b78-42.dat acprotect -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-3350944739-639801879-157714471-1000\Control Panel\International\Geo\Nation 2f27e35cae67ae266e06fdf0059244fa_JaffaCakes118.exe -
Executes dropped EXE 2 IoCs
pid Process 2380 FireFly.exe 404 FireFly.exe -
Loads dropped DLL 4 IoCs
pid Process 404 FireFly.exe 404 FireFly.exe 116 IEXPLORE.EXE 116 IEXPLORE.EXE -
Drops file in System32 directory 64 IoCs
description ioc Process File created C:\Windows\system32\config\systemprofile\AppData\Local\Microsoft\Edge\User Data\Default\Visited Links msedge.exe File created C:\Windows\system32\config\systemprofile\AppData\Local\Microsoft\Edge\User Data\Default\Extension State\000003.log msedge.exe File created C:\Windows\system32\config\systemprofile\AppData\Local\Microsoft\Edge\User Data\Default\Session Storage\LOG msedge.exe File created C:\Windows\system32\config\systemprofile\AppData\Local\Microsoft\Edge\User Data\Default\d78b86bd-0c3e-4c87-b461-3ce5f892f9f6.tmp msedge.exe File created C:\Windows\system32\config\systemprofile\AppData\Local\Microsoft\Edge\User Data\Default\Download Service\EntryDB\LOG msedge.exe File opened for modification C:\Windows\system32\config\systemprofile\AppData\Local\Microsoft\Edge\User Data\Default\Storage\ext\ihmafllikibpmigkcoadcmckbfhibefp\def\Network Persistent State msedge.exe File opened for modification C:\Windows\system32\config\systemprofile\AppData\Local\Microsoft\Edge\User Data\Default\Storage\ext\ihmafllikibpmigkcoadcmckbfhibefp\def\Session Storage\LOCK msedge.exe File opened for modification C:\Windows\system32\config\systemprofile\Favorites\desktop.ini IExplore.exe File opened for modification C:\Windows\system32\config\systemprofile\AppData\Local\Microsoft\Edge\User Data\Default\Storage\ext\ihmafllikibpmigkcoadcmckbfhibefp\def\Local Storage\leveldb\CURRENT msedge.exe File opened for modification C:\Windows\system32\config\systemprofile\AppData\Local\Microsoft\Edge\User Data\Default\load_statistics.db-wal msedge.exe File opened for modification C:\Windows\system32\config\systemprofile\AppData\Local\Microsoft\Edge\User Data\Default\shared_proto_db\metadata\MANIFEST-000001 msedge.exe File opened for modification C:\Windows\system32\config\systemprofile\AppData\Local\Microsoft\Edge\User Data\Default\shared_proto_db\LOCK msedge.exe File created C:\Windows\system32\config\systemprofile\AppData\Local\Microsoft\Edge\User Data\Default\Storage\ext\ihmafllikibpmigkcoadcmckbfhibefp\def\Local Storage\leveldb\LOG msedge.exe File created C:\Windows\system32\config\systemprofile\AppData\Local\Microsoft\Edge\User Data\Default\Storage\ext\ihmafllikibpmigkcoadcmckbfhibefp\def\GPUCache\data_3 msedge.exe File opened for modification C:\Windows\system32\config\systemprofile\AppData\Local\Microsoft\Edge\User Data\Default\Extension State\MANIFEST-000001 msedge.exe File opened for modification C:\Windows\system32\config\systemprofile\AppData\Local\Microsoft\Edge\User Data\Default\Top Sites-journal msedge.exe File created C:\Windows\system32\config\systemprofile\AppData\Local\Microsoft\Edge\User Data\Default\GPUCache\data_2 msedge.exe File created C:\Windows\system32\config\systemprofile\AppData\Local\Microsoft\Edge\User Data\Default\fe4acfbf-8ac9-4572-a975-bfc4ddffdb11.tmp msedge.exe File created C:\Windows\system32\config\systemprofile\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index msedge.exe File opened for modification C:\Windows\system32\config\systemprofile\AppData\Local\Microsoft\Edge\User Data\Default\Web Data msedge.exe File created C:\Windows\system32\config\systemprofile\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\wasm\index-dir\temp-index msedge.exe File created C:\Windows\system32\config\systemprofile\AppData\Local\Microsoft\Edge\User Data\Default\Secure Preferences~RFe57c7a5.TMP msedge.exe File created C:\Windows\system32\config\systemprofile\AppData\Local\Microsoft\Edge\User Data\c82c788e-af9d-47bb-a6cb-f21526b54de3.tmp msedge.exe File created C:\Windows\system32\config\systemprofile\AppData\Local\Microsoft\Edge\User Data\Default\Preferences~RFe57d997.TMP msedge.exe File opened for modification C:\Windows\system32\config\systemprofile\AppData\Local\Microsoft\Windows\INetCookies\PrivacIE\Low IExplore.exe File opened for modification C:\Windows\system32\config\systemprofile\AppData\Local\Microsoft\Windows\INetCookies\DNTException\Low IExplore.exe File opened for modification C:\Windows\system32\config\systemprofile\AppData\Local\Microsoft\Edge\User Data\Default\Sync Data\LevelDB\MANIFEST-000001 msedge.exe File created C:\Windows\system32\config\systemprofile\AppData\Local\Microsoft\Edge\User Data\Default\bfeec18f-40cf-47ee-a701-bbab58b4710b.tmp msedge.exe File created C:\Windows\system32\config\systemprofile\AppData\Local\Microsoft\Edge\User Data\Default\Local Extension Settings\jdiccldimpdaibmpdkjnbmckianbfold\MANIFEST-000001 msedge.exe File opened for modification C:\Windows\system32\config\systemprofile\AppData\LocalLow\Microsoft\Internet Explorer\Services\search_{0633EE93-D776-472f-A0FF-E1416B8B2E3A}.ico IExplore.exe File created C:\Windows\system32\config\systemprofile\AppData\Local\Microsoft\Edge\User Data\Default\shared_proto_db\LOG msedge.exe File opened for modification C:\Windows\system32\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\26C212D9399727259664BDFCA073966E_F9F7D6A7ECE73106D2A8C63168CDA10D IExplore.exe File created C:\Windows\system32\config\systemprofile\AppData\Local\Microsoft\Edge\User Data\Default\Local Storage\leveldb\000003.log msedge.exe File opened for modification C:\Windows\system32\config\systemprofile\AppData\Local\Microsoft\Edge\User Data\Default\Sync Data\LevelDB\CURRENT msedge.exe File opened for modification C:\Windows\system32\config\systemprofile\AppData\Local\Microsoft\Edge\User Data\Functional Data-journal msedge.exe File opened for modification C:\Windows\system32\config\systemprofile\AppData\Local\Microsoft\Edge\User Data\Default\load_statistics.db msedge.exe File opened for modification C:\Windows\system32\config\systemprofile\AppData\Local\Microsoft\Edge\User Data\Default\Extension State\CURRENT msedge.exe File created C:\Windows\system32\config\systemprofile\AppData\Local\Microsoft\Edge\User Data\Local State~RFe57d958.TMP msedge.exe File created C:\Windows\system32\config\systemprofile\AppData\Local\Microsoft\Edge\User Data\ShaderCache\GPUCache\data_2 msedge.exe File opened for modification C:\Windows\system32\config\systemprofile\AppData\Local\Microsoft\Edge\User Data\Functional SAN Data-wal msedge.exe File created C:\Windows\system32\config\systemprofile\AppData\Local\Microsoft\Edge\User Data\Default\Preferences~RFe57c65d.TMP msedge.exe File opened for modification C:\Windows\system32\config\systemprofile\AppData\Local\Microsoft\Edge\User Data\Crashpad\throttle_store.dat msedge.exe File created C:\Windows\system32\config\systemprofile\AppData\Local\Microsoft\Edge\User Data\Crashpad\throttle_store.dat msedge.exe File opened for modification C:\Windows\system32\config\systemprofile\AppData\Local\Microsoft\Edge\User Data\SmartScreen\local\download_cache msedge.exe File created C:\Windows\system32\config\systemprofile\AppData\Local\Microsoft\Internet Explorer\Recovery\High\Active\{F79518AB-8690-11EF-A7EA-4E8E92B54298}.dat IExplore.exe File opened for modification C:\Windows\system32\config\systemprofile\AppData\Local\Microsoft\Edge\User Data\Crashpad\throttle_store.dat msedge.exe File opened for modification C:\Windows\system32\config\systemprofile\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js msedge.exe File created C:\Windows\system32\config\systemprofile\AppData\Local\Microsoft\Edge\User Data\Default\data_reduction_proxy_leveldb\LOG msedge.exe File created C:\Windows\system32\config\systemprofile\AppData\Local\Microsoft\Edge\User Data\Default\EdgePushStorageWithConnectTokens\LOG msedge.exe File opened for modification C:\Windows\system32\config\systemprofile\AppData\Local\Microsoft\Edge\User Data\Default\Storage\ext\ihmafllikibpmigkcoadcmckbfhibefp\def\Local Storage\leveldb\LOCK msedge.exe File opened for modification C:\Windows\system32\config\systemprofile\AppData\Local\Microsoft\Edge\User Data\Default\load_statistics.db-shm msedge.exe File opened for modification C:\Windows\system32\config\systemprofile\AppData\Local\Microsoft\Edge\User Data\Default\History msedge.exe File opened for modification C:\Windows\system32\config\systemprofile\AppData\Local\Microsoft\Edge\User Data\Default\Site Characteristics Database\CURRENT msedge.exe File created C:\Windows\system32\config\systemprofile\AppData\Local\Microsoft\Edge\User Data\Default\46b7398e-41d6-4564-bb64-a93dbfe2715b.tmp msedge.exe File created C:\Windows\system32\config\systemprofile\AppData\Local\Microsoft\Edge\User Data\Default\Local Extension Settings\jdiccldimpdaibmpdkjnbmckianbfold\LOG msedge.exe File opened for modification C:\Windows\system32\config\systemprofile\AppData\Local\Microsoft\Edge\User Data\GrShaderCache\GPUCache\data_0 msedge.exe File created C:\Windows\system32\config\systemprofile\AppData\Local\Microsoft\Edge\User Data\Default\Local Storage\leveldb\LOG msedge.exe File opened for modification C:\Windows\system32\config\systemprofile\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\wasm\index-dir\the-real-index msedge.exe File created C:\Windows\system32\config\systemprofile\AppData\Local\Microsoft\Edge\User Data\Default\GPUCache\data_3 msedge.exe File created C:\Windows\system32\config\systemprofile\AppData\Local\Microsoft\Edge\User Data\Default\Storage\ext\ihmafllikibpmigkcoadcmckbfhibefp\def\fb5fa427-afdc-4196-bfed-3de5067e1446.tmp msedge.exe File opened for modification C:\Windows\system32\config\systemprofile\AppData\Local\Microsoft\Edge\User Data\Default\GPUCache\data_1 msedge.exe File opened for modification C:\Windows\system32\config\systemprofile\AppData\Local\Microsoft\Edge\User Data\Default\Storage\ext\ihmafllikibpmigkcoadcmckbfhibefp\def\GPUCache msedge.exe File created C:\Windows\system32\config\systemprofile\AppData\Local\Microsoft\Edge\User Data\Default\7b4b9d23-7eaf-4399-9751-61c3ba6f3502.tmp msedge.exe File created C:\Windows\system32\config\systemprofile\AppData\Local\Microsoft\Edge\User Data\Default\GPUCache\data_0 msedge.exe -
resource yara_rule behavioral2/memory/860-0-0x0000000000400000-0x0000000000412000-memory.dmp upx behavioral2/files/0x0011000000023a71-16.dat upx behavioral2/memory/860-30-0x0000000000400000-0x0000000000412000-memory.dmp upx behavioral2/files/0x000b000000023b78-42.dat upx behavioral2/memory/2380-45-0x0000000000400000-0x0000000000412000-memory.dmp upx behavioral2/memory/404-50-0x0000000000A30000-0x0000000000A41000-memory.dmp upx behavioral2/memory/404-251-0x0000000000400000-0x0000000000412000-memory.dmp upx behavioral2/memory/404-252-0x0000000000A30000-0x0000000000A41000-memory.dmp upx -
Drops file in Program Files directory 9 IoCs
description ioc Process File created C:\Program Files\Firefly-Remote\Install.DLL 2f27e35cae67ae266e06fdf0059244fa_JaffaCakes118.exe File created C:\Program Files (x86)\Microsoft\Edge\Application\SetupMetrics\a25f2554-ac43-4ba3-95b8-16e98c8fb93e.tmp setup.exe File created C:\Program Files\Firefly-Remote\FireFly.dat 2f27e35cae67ae266e06fdf0059244fa_JaffaCakes118.exe File opened for modification C:\Program Files\Firefly-Remote\FireFly.ini 2f27e35cae67ae266e06fdf0059244fa_JaffaCakes118.exe File created C:\Program Files\Firefly-Remote\FireFly.exe 2f27e35cae67ae266e06fdf0059244fa_JaffaCakes118.exe File opened for modification C:\Program Files\Firefly-Remote\FireFly.ini FireFly.exe File opened for modification C:\Program Files\Firefly-Remote\Install.DLL FireFly.exe File opened for modification C:\Program Files (x86)\Microsoft\Edge\Application\SetupMetrics\20241009225111.pma setup.exe File opened for modification C:\Program Files\Firefly-Remote\FireFly.dat 2f27e35cae67ae266e06fdf0059244fa_JaffaCakes118.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 5 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 2f27e35cae67ae266e06fdf0059244fa_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language FireFly.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language FireFly.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Modifies data under HKEY_USERS 64 IoCs
description ioc Process Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\TrustedPeople\CTLs msedge.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.svg setup.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.pdf\OpenWithList setup.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Internet Explorer\Main IExplore.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows NT\CurrentVersion\Network\Location Awareness msedge.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\trust\CRLs msedge.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Edge\SmartScreenEnabled\ = "1" msedge.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Internet Explorer\Zoom IExplore.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\IntranetName = "1" ie_to_edge_stub.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\EdgeUpdate\ClientState msedge.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Edge\IEToEdge msedge.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\CA\Certificates msedge.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.svg\OpenWithList setup.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\ApplicationAssociationToasts\MSEdgeMHT_.mhtml = "0" setup.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" IExplore.exe Key created \REGISTRY\USER\.DEFAULT\Software\AppDataLow\Software\Microsoft\Edge\IEToEdge IEXPLORE.EXE Set value (str) \REGISTRY\USER\.DEFAULT\Software\AppDataLow\Software\Microsoft\Edge\IEToEdge\LastStubPath = "C:\\Program Files (x86)\\Microsoft\\Edge\\Application\\92.0.902.67\\BHO\\ie_to_edge_stub.exe" IEXPLORE.EXE Set value (data) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\Component Categories\{00021493-0000-0000-C000-000000000046}\Enum\Implementing = 1c00000001000000e8070a0003000900160033000a00430201000000644ea2ef78b0d01189e400c04fc9e26e IEXPLORE.EXE Set value (str) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.mht\UserChoice\ProgId = "MSEdgeHTM" setup.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.mht\OpenWithProgids\mhtmlfile = "0" setup.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Run msedge.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain IExplore.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Passport\LowDAMap IExplore.exe Key created \REGISTRY\USER\.DEFAULT msedge.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\Component Categories64\{00021493-0000-0000-C000-000000000046}\Enum IExplore.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\ IEXPLORE.EXE Key created \REGISTRY\USER\.DEFAULT msedge.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\IdentityCRL\Immersive\production\Token\{C89E2069-AF13-46DB-9E39-216131494B87}\ApplicationFlags = "1" msedge.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Disallowed msedge.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\Disallowed msedge.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Internet Explorer\SearchScopes\{0633EE93-D776-472f-A0FF-E1416B8B2E3A}\URL = "http://www.bing.com/search?q={searchTerms}&src=IE-SearchBox&FORM=IE11SR" IExplore.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Internet Explorer\SearchScopes\{0633EE93-D776-472f-A0FF-E1416B8B2E3A}\NTSuggestionsURL = "http://api.bing.com/qsml.aspx?query={searchTerms}&market={language}&maxwidth={ie:maxWidth}&rowheight={ie:rowHeight}§ionHeight={ie:sectionHeight}&FORM=IENTSS" IExplore.exe Set value (data) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Internet Explorer\User Preferences\3DB9590C4C4C26C4CCBDD94ECAD790359708C3267B = 01000000d08c9ddf0115d1118c7a00c04fc297eb010000004c4b263ce3325643a89d57a9b6291f6800000000020000000000106600000001000020000000f0550c2d57a90188d884ea82b4ed8b6984fa9582b30548f83b9132aeae13c80f000000000e8000000002000020000000f2c5807c3b82e7bc2a6c29bba8e1989b06c54e302625add6507c0b04b91c314650000000b19bb3334a1b9106637f1c265b1fa031123d1562d9df07eee2aaf590e8f87a9b97832365d0f1e8cedbf3270b7ee616a2a24e749f050cf9eb47257abbe97002c4c64f4a50540bc0c17ea2a2e3ba6d74d44000000074b993c102d5665a26135f19424469ed2fa780bba79db1d0ca77c9afa3f78f2de07db5550aa48ce4fb8fa498d07cbe31ab3a64c7d73b10ed71286b83532ffb00 IExplore.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Internet Explorer\IETld\LowMic IExplore.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Ext\Stats\{1FD49718-1D00-4B19-AF5F-070AF6D5D54C}\iexplore\Type = "3" IExplore.exe Key created \REGISTRY\USER\.DEFAULT msedge.exe Set value (data) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\Component Categories64\{00021493-0000-0000-C000-000000000046}\Enum\Implementing = 1c00000001000000e8070a0003000900160033000e009d0301000000644ea2ef78b0d01189e400c04fc9e26e IExplore.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Edge\IEMigration setup.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Internet Explorer\SearchScopes\{0633EE93-D776-472f-A0FF-E1416B8B2E3A}\FaviconURL = "http://www.bing.com/favicon.ico" IExplore.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\F12 IExplore.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\Disallowed\CTLs msedge.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup IEXPLORE.EXE Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Edge\SmartScreenEnabled msedge.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Feeds\MUID\ msedge.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Disallowed\CTLs msedge.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\ApplicationAssociationToasts\AppXe862j7twqs4aww05211jaakwxyfjx4da_read = "0" setup.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Explorer\Discardable IExplore.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{F79518A9-8690-11EF-A7EA-4E8E92B54298} = "0" IExplore.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Edge msedge.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Network\Location Awareness msedge.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\Disallowed\CRLs msedge.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.webp\OpenWithList setup.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\Component Categories64 IExplore.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Ext\Settings\{31D09BA0-12F5-4CCE-BE8A-2923E76605DA}\Flags = "1024" IExplore.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Edge\PreferenceMACs\Default\settings_reset_prompt.prompt_wave = "040272ACCA541F818F48499A5162F630D2645C37A274FB726238979DF6E44D96" msedge.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Edge\PreferenceMACs\Default\extensions.settings\ihmafllikibpmigkcoadcmckbfhibefp = "35280A6F9EF10D15EA83612A2518524D4B9F2ACD5D27B01099A29475E7BD9CC3" msedge.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\TrustedPeople\CTLs msedge.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Edge\IEMigration\MhtTakenFromIE = "1" setup.exe Set value (data) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Internet Explorer\User Preferences\3DB9590C4C4C26C4CCBDD94ECAD790359708C3267B = 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 IExplore.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Internet Explorer\PageSetup IExplore.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Internet Explorer\Recovery\AdminActive IExplore.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\26\52C64B7E\@%SystemRoot%\system32\shell32.dll,-50176 = "File Operation" IExplore.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\CA msedge.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows IEXPLORE.EXE -
Suspicious behavior: EnumeratesProcesses 6 IoCs
pid Process 404 FireFly.exe 404 FireFly.exe 4040 msedge.exe 4040 msedge.exe 4416 msedge.exe 4416 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 7 IoCs
pid Process 4416 msedge.exe 4416 msedge.exe 4416 msedge.exe 4416 msedge.exe 4416 msedge.exe 4416 msedge.exe 4416 msedge.exe -
Suspicious use of FindShellTrayWindow 8 IoCs
pid Process 3952 IExplore.exe 3952 IExplore.exe 3952 IExplore.exe 3952 IExplore.exe 3952 IExplore.exe 3952 IExplore.exe 3952 IExplore.exe 3952 IExplore.exe -
Suspicious use of SetWindowsHookEx 5 IoCs
pid Process 404 FireFly.exe 3952 IExplore.exe 3952 IExplore.exe 116 IEXPLORE.EXE 116 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 860 wrote to memory of 2380 860 2f27e35cae67ae266e06fdf0059244fa_JaffaCakes118.exe 86 PID 860 wrote to memory of 2380 860 2f27e35cae67ae266e06fdf0059244fa_JaffaCakes118.exe 86 PID 860 wrote to memory of 2380 860 2f27e35cae67ae266e06fdf0059244fa_JaffaCakes118.exe 86 PID 860 wrote to memory of 4588 860 2f27e35cae67ae266e06fdf0059244fa_JaffaCakes118.exe 87 PID 860 wrote to memory of 4588 860 2f27e35cae67ae266e06fdf0059244fa_JaffaCakes118.exe 87 PID 860 wrote to memory of 4588 860 2f27e35cae67ae266e06fdf0059244fa_JaffaCakes118.exe 87 PID 404 wrote to memory of 3952 404 FireFly.exe 90 PID 404 wrote to memory of 3952 404 FireFly.exe 90 PID 3952 wrote to memory of 116 3952 IExplore.exe 92 PID 3952 wrote to memory of 116 3952 IExplore.exe 92 PID 3952 wrote to memory of 116 3952 IExplore.exe 92 PID 116 wrote to memory of 3500 116 IEXPLORE.EXE 93 PID 116 wrote to memory of 3500 116 IEXPLORE.EXE 93 PID 3500 wrote to memory of 4416 3500 ie_to_edge_stub.exe 94 PID 3500 wrote to memory of 4416 3500 ie_to_edge_stub.exe 94 PID 4416 wrote to memory of 1996 4416 msedge.exe 95 PID 4416 wrote to memory of 1996 4416 msedge.exe 95 PID 4416 wrote to memory of 4240 4416 msedge.exe 96 PID 4416 wrote to memory of 4240 4416 msedge.exe 96 PID 4416 wrote to memory of 4240 4416 msedge.exe 96 PID 4416 wrote to memory of 4240 4416 msedge.exe 96 PID 4416 wrote to memory of 4240 4416 msedge.exe 96 PID 4416 wrote to memory of 4240 4416 msedge.exe 96 PID 4416 wrote to memory of 4240 4416 msedge.exe 96 PID 4416 wrote to memory of 4240 4416 msedge.exe 96 PID 4416 wrote to memory of 4240 4416 msedge.exe 96 PID 4416 wrote to memory of 4240 4416 msedge.exe 96 PID 4416 wrote to memory of 4240 4416 msedge.exe 96 PID 4416 wrote to memory of 4240 4416 msedge.exe 96 PID 4416 wrote to memory of 4240 4416 msedge.exe 96 PID 4416 wrote to memory of 4240 4416 msedge.exe 96 PID 4416 wrote to memory of 4240 4416 msedge.exe 96 PID 4416 wrote to memory of 4240 4416 msedge.exe 96 PID 4416 wrote to memory of 4240 4416 msedge.exe 96 PID 4416 wrote to memory of 4240 4416 msedge.exe 96 PID 4416 wrote to memory of 4240 4416 msedge.exe 96 PID 4416 wrote to memory of 4240 4416 msedge.exe 96 PID 4416 wrote to memory of 4240 4416 msedge.exe 96 PID 4416 wrote to memory of 4240 4416 msedge.exe 96 PID 4416 wrote to memory of 4240 4416 msedge.exe 96 PID 4416 wrote to memory of 4240 4416 msedge.exe 96 PID 4416 wrote to memory of 4240 4416 msedge.exe 96 PID 4416 wrote to memory of 4240 4416 msedge.exe 96 PID 4416 wrote to memory of 4240 4416 msedge.exe 96 PID 4416 wrote to memory of 4240 4416 msedge.exe 96 PID 4416 wrote to memory of 4240 4416 msedge.exe 96 PID 4416 wrote to memory of 4240 4416 msedge.exe 96 PID 4416 wrote to memory of 4240 4416 msedge.exe 96 PID 4416 wrote to memory of 4240 4416 msedge.exe 96 PID 4416 wrote to memory of 4240 4416 msedge.exe 96 PID 4416 wrote to memory of 4240 4416 msedge.exe 96 PID 4416 wrote to memory of 4240 4416 msedge.exe 96 PID 4416 wrote to memory of 4240 4416 msedge.exe 96 PID 4416 wrote to memory of 4240 4416 msedge.exe 96 PID 4416 wrote to memory of 4240 4416 msedge.exe 96 PID 4416 wrote to memory of 4240 4416 msedge.exe 96 PID 4416 wrote to memory of 4240 4416 msedge.exe 96 PID 4416 wrote to memory of 4040 4416 msedge.exe 97 PID 4416 wrote to memory of 4040 4416 msedge.exe 97 PID 4416 wrote to memory of 2540 4416 msedge.exe 98 PID 4416 wrote to memory of 2540 4416 msedge.exe 98 PID 4416 wrote to memory of 2540 4416 msedge.exe 98 PID 4416 wrote to memory of 2540 4416 msedge.exe 98 PID 4416 wrote to memory of 2540 4416 msedge.exe 98 -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
-
Uses Volume Shadow Copy WMI provider
The Volume Shadow Copy service is used to manage backups/snapshots.
-
Uses Volume Shadow Copy service COM API
The Volume Shadow Copy service is used to manage backups/snapshots.
Processes
-
C:\Users\Admin\AppData\Local\Temp\2f27e35cae67ae266e06fdf0059244fa_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\2f27e35cae67ae266e06fdf0059244fa_JaffaCakes118.exe"1⤵
- Checks computer location settings
- Drops file in Program Files directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:860 -
C:\Program Files\Firefly-Remote\FireFly.exe"C:\Program Files\Firefly-Remote\FireFly.exe" /i2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:2380
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c C:\Delme.bat2⤵
- System Location Discovery: System Language Discovery
PID:4588
-
-
C:\Program Files\Firefly-Remote\FireFly.exe"C:\Program Files\Firefly-Remote\FireFly.exe"1⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in Program Files directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:404 -
C:\Program Files\Internet Explorer\IExplore.exe"C:\Program Files\Internet Explorer\IExplore.exe" About:Blank2⤵
- Drops file in System32 directory
- Modifies data under HKEY_USERS
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:3952 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:3952 CREDAT:17410 /prefetch:23⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Modifies data under HKEY_USERS
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:116 -
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\BHO\ie_to_edge_stub.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\BHO\ie_to_edge_stub.exe" --from-ie-to-edge=3 --ie-frame-hwnd=200364⤵
- Modifies data under HKEY_USERS
- Suspicious use of WriteProcessMemory
PID:3500 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --from-ie-to-edge=3 --ie-frame-hwnd=200365⤵
- Drops file in System32 directory
- Enumerates system info in registry
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of WriteProcessMemory
PID:4416 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Windows\system32\config\systemprofile\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Windows\system32\config\systemprofile\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Windows\system32\config\systemprofile\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0x100,0x104,0x108,0xdc,0x10c,0x7ffe01d646f8,0x7ffe01d64708,0x7ffe01d647186⤵
- Drops file in System32 directory
PID:1996
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2072,12928512354820075189,6576960025607120213,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2088 /prefetch:26⤵
- Modifies data under HKEY_USERS
PID:4240
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2072,12928512354820075189,6576960025607120213,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2424 /prefetch:36⤵
- Drops file in System32 directory
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
PID:4040
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2072,12928512354820075189,6576960025607120213,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2656 /prefetch:86⤵PID:2540
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2072,12928512354820075189,6576960025607120213,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3088 /prefetch:16⤵PID:2044
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2072,12928512354820075189,6576960025607120213,131072 --lang=en-US --extension-process --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3240 /prefetch:16⤵PID:2428
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2072,12928512354820075189,6576960025607120213,131072 --lang=en-US --extension-process --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3540 /prefetch:16⤵PID:3176
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2072,12928512354820075189,6576960025607120213,131072 --lang=en-US --extension-process --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3736 /prefetch:16⤵
- Modifies data under HKEY_USERS
PID:4624
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2072,12928512354820075189,6576960025607120213,131072 --lang=en-US --extension-process --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3868 /prefetch:16⤵PID:2232
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2072,12928512354820075189,6576960025607120213,131072 --lang=en-US --extension-process --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3996 /prefetch:16⤵PID:3100
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2072,12928512354820075189,6576960025607120213,131072 --lang=en-US --extension-process --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4136 /prefetch:16⤵PID:3152
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2072,12928512354820075189,6576960025607120213,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5480 /prefetch:86⤵PID:3240
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\Installer\setup.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\Installer\setup.exe" --configure-user-settings --verbose-logging --system-level --msedge --force-configure-user-settings6⤵
- Drops file in Program Files directory
- Modifies data under HKEY_USERS
PID:544 -
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\Installer\setup.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\Installer\setup.exe" --type=crashpad-handler /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler --database=C:\Windows\TEMP\MsEdgeCrashpad --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\Installer\setup.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0x228,0x22c,0x230,0x204,0x234,0x7ff75b405460,0x7ff75b405470,0x7ff75b4054807⤵PID:836
-
-
-
-
-
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:3324
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:2684
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
212B
MD5185016a6cb5c4a4e16d409f58082e70f
SHA19af5c6174658f30360105817855e703495e74bc5
SHA256c0b5380346d79b974bf4bf5cb3457c19d241bbf8190dd0473533b6d92e5bc2b2
SHA5121a154cfb49460cb7ba45403a85ce83373e2c5a0a25fc9508b0847f963c49dde51e47339fef0379fd6edc60617eee9ed1d8b59fb5e56eea4e1a49854d6c4cd2d1
-
Filesize
36KB
MD52f27e35cae67ae266e06fdf0059244fa
SHA147942b32b04e33e4893ba00f46dfccc50b8fb904
SHA256deb4ae105f7a6e9209f7c4e603a310801f1e1721d33c281c35df30932e95ae16
SHA512f8eb6befcdb09406a359b8df465bccebf06ff93e16d0240a374257ae0eb91bfe8477ae2090aed88ebac1432d37f286cf83e2a1a94785db7619e5d7a1d2d96526
-
Filesize
169B
MD5b4766e5cc68a93b31713ded32924cb92
SHA1557533119e173e3334faef557519cc058a8dfdbe
SHA256800269feb1865e807e17c982e525ab12c35a2e18f862dc3fa7d12965390dfcdc
SHA5129c29270cd5c85c7d03168332812856bc976f9875bd4f50173c7502b557d7e34427a3fef700f424b83e6569a5b51e60066d59de917a200bbe08e4aa4a522960a2
-
Filesize
19KB
MD519b7dbc7d554618c94f8a7a4c7f7f6c4
SHA1981d8c1e05855967e09320b29d3e9c6965b9cbd5
SHA2565d5c44808bc9758d31cec948465e6711a89a6e2cb02ab5adad2364c79c9fd944
SHA5121e8a057dac46a9d2e92fc86bed082dcdc2b2231fd88ded0e43fcfbd897331d70a764c813cefdba23b33f7c71e7da076380a9cd885004fe14c3c98bdd30c5e576
-
C:\Windows\System32\config\systemprofile\AppData\LocalLow\Microsoft\Internet Explorer\Services\search_{0633EE93-D776-472f-A0FF-E1416B8B2E3A}.ico
Filesize4KB
MD5da597791be3b6e732f0bc8b20e38ee62
SHA11125c45d285c360542027d7554a5c442288974de
SHA2565b2c34b3c4e8dd898b664dba6c3786e2ff9869eff55d673aa48361f11325ed07
SHA512d8dc8358727590a1ed74dc70356aedc0499552c2dc0cd4f7a01853dd85ceb3aead5fbdc7c75d7da36db6af2448ce5abdff64cebdca3533ecad953c061a9b338e
-
C:\Windows\System32\config\systemprofile\AppData\Local\Microsoft\Edge\User Data\Crashpad\settings.dat
Filesize152B
MD53fda7bfd117207f5ea7eff7b95915686
SHA149f7cc9ba5584cdea0c900bb2068155292eaadde
SHA25622d68accb48350ae10fe291724bf5e45202a514ec98141e7e421bb9cff638aad
SHA5127722a921943777ae486709617fe382060dec588b3f3fa721331986c09f24001634790116d3166463a809b59f9d68c5eac76e77009f0bf9b88e88ae5c8991adb5
-
C:\Windows\System32\config\systemprofile\AppData\Local\Microsoft\Edge\User Data\Default\60211fa5-ef09-4ab8-a32c-88d68e73d2fc.tmp
Filesize70KB
MD5e5e3377341056643b0494b6842c0b544
SHA1d53fd8e256ec9d5cef8ef5387872e544a2df9108
SHA256e23040951e464b53b84b11c3466bbd4707a009018819f9ad2a79d1b0b309bc25
SHA51283f09e48d009a5cf83fa9aa8f28187f7f4202c84e2d0d6e5806c468f4a24b2478b73077381d2a21c89aa64884df3c56e8dc94eb4ad2d6a8085ac2feb1e26c2ef
-
C:\Windows\System32\config\systemprofile\AppData\Local\Microsoft\Edge\User Data\Default\Local Storage\leveldb\CURRENT
Filesize16B
MD546295cac801e5d4857d09837238a6394
SHA144e0fa1b517dbf802b18faf0785eeea6ac51594b
SHA2560f1bad70c7bd1e0a69562853ec529355462fcd0423263a3d39d6d0d70b780443
SHA5128969402593f927350e2ceb4b5bc2a277f3754697c1961e3d6237da322257fbab42909e1a742e22223447f3a4805f8d8ef525432a7c3515a549e984d3eff72b23
-
C:\Windows\System32\config\systemprofile\AppData\Local\Microsoft\Edge\User Data\Default\Network Persistent State
Filesize59B
MD52800881c775077e1c4b6e06bf4676de4
SHA12873631068c8b3b9495638c865915be822442c8b
SHA256226eec4486509917aa336afebd6ff65777b75b65f1fb06891d2a857a9421a974
SHA512e342407ab65cc68f1b3fd706cd0a37680a0864ffd30a6539730180ede2cdcd732cc97ae0b9ef7db12da5c0f83e429df0840dbf7596aca859a0301665e517377b
-
C:\Windows\System32\config\systemprofile\AppData\Local\Microsoft\Edge\User Data\Default\Network Persistent State
Filesize111B
MD5285252a2f6327d41eab203dc2f402c67
SHA1acedb7ba5fbc3ce914a8bf386a6f72ca7baa33c6
SHA2565dfc321417fc31359f23320ea68014ebfd793c5bbed55f77dab4180bbd4a2026
SHA51211ce7cb484fee66894e63c31db0d6b7ef66ad0327d4e7e2eb85f3bcc2e836a3a522c68d681e84542e471e54f765e091efe1ee4065641b0299b15613eb32dcc0d
-
Filesize
4KB
MD502e1c2a61825d8f0775ba10309cad1f6
SHA16793704e14f2408b8f1cd24606fd5e76d7702383
SHA2567bae66a84387eac958edfcf08909035e1e20f8024889709794cc75e4bbd8945e
SHA512f9fc7891699a1239941b82afcfb80f51f564e2fa7df685d66258612643422f40bea237094b96d8beba3557e963beab3f47077211255d28a35207b4ecb2149c52
-
Filesize
4KB
MD58401d949111a5c67b60ff98cafc543bf
SHA1158eee7a8e48ff308cdc0698586086232ee3569e
SHA2568ffeb1fd1be632e584214f12deddb75344038e32695001f709ec9f8b00afd4f3
SHA51278eabf05e9829021d53e442c69d393f9b1eae9b2bf4a78d488348485b0b4ee9b5194b940d10656f7587c20b046931fefcd7d62a9f955ce9443bab68cf4673a05
-
Filesize
5KB
MD55eb67a02ba8535c425fbeb63f2726f85
SHA1e6815e3ca015a3ea982ecd72ca0f8c00dcd49855
SHA256bfc21511bee36ad3c87a54995622aea4e837b599d0f0ff4170096df5838cabc3
SHA512bfdf71c2d4a650b925c7b54bc8a310519daf4a38f5a0b60583848876c3a1ab4562672def80ff7149110d2122b17a6f934aaa55308a7e61b13b3b24f89feef28c
-
C:\Windows\System32\config\systemprofile\AppData\Local\Microsoft\Edge\User Data\Default\Preferences~RFe579f4d.TMP
Filesize4KB
MD5fdfcc23852efed4052858062c7a078c4
SHA16791dad1c295f984433b8a0822814a375bb8ef6f
SHA256d5e432c42ef4ab1a662acb3019dbbf9641e1ff9f394a3c09dc881fe1ff961835
SHA512b0c47f749f3eea0fc7fc679d9e673404d1bbd1b17143672ae8412022d69105af4b04912f96919a2e430a36871557245754b12e76de69b8ed656a57b438d6fd99
-
C:\Windows\System32\config\systemprofile\AppData\Local\Microsoft\Edge\User Data\Default\Secure Preferences
Filesize24KB
MD56d3a8ea88018d79eca7bd5e91d2910ab
SHA1e2630fb41ba0e82a3daed22ad420bbab15af440e
SHA25653028de50ee87d3b70a3adf028a01fc334ee01c8396d8c9c8213bae579debd09
SHA512c7c5fc4d97dbb96ea6d6523608c7e37108d8787c3a3d543a20e4a21e6be8355cd63c9d45f9373bac00ef201d3cc619fdb6419d050d3eb5a92157ede075962962
-
C:\Windows\System32\config\systemprofile\AppData\Local\Microsoft\Edge\User Data\Default\Secure Preferences~RFe57c7a5.TMP
Filesize24KB
MD580faa639066f9018e4570947609a5366
SHA1caa088be78aee774114657307a8d177236659fd7
SHA2560b15e5283004fd620ba821d10eaecf7f792a35a261ba57b90712467308966c82
SHA5123847d668dc070ed7215aa47b352da775a19513f13e5a74889fae1087d78da7731f5a6cbb99aa9b2ca20aa134f35bf17b70d82a39ca28ca6500abf8872a66601f
-
C:\Windows\System32\config\systemprofile\AppData\Local\Microsoft\Edge\User Data\Default\Storage\ext\ihmafllikibpmigkcoadcmckbfhibefp\def\Local Storage\leveldb\MANIFEST-000001
Filesize41B
MD55af87dfd673ba2115e2fcf5cfdb727ab
SHA1d5b5bbf396dc291274584ef71f444f420b6056f1
SHA256f9d31b278e215eb0d0e9cd709edfa037e828f36214ab7906f612160fead4b2b4
SHA512de34583a7dbafe4dd0dc0601e8f6906b9bc6a00c56c9323561204f77abbc0dc9007c480ffe4092ff2f194d54616caf50aecbd4a1e9583cae0c76ad6dd7c2375b
-
C:\Windows\System32\config\systemprofile\AppData\Local\Microsoft\Edge\User Data\Default\data_reduction_proxy_leveldb\CURRENT
Filesize16B
MD5206702161f94c5cd39fadd03f4014d98
SHA1bd8bfc144fb5326d21bd1531523d9fb50e1b600a
SHA2561005a525006f148c86efcbfb36c6eac091b311532448010f70f7de9a68007167
SHA5120af09f26941b11991c750d1a2b525c39a8970900e98cba96fd1b55dbf93fee79e18b8aab258f48b4f7bda40d059629bc7770d84371235cdb1352a4f17f80e145
-
C:\Windows\System32\config\systemprofile\AppData\Local\Microsoft\Edge\User Data\GrShaderCache\GPUCache\data_0
Filesize8KB
MD5cf89d16bb9107c631daabf0c0ee58efb
SHA13ae5d3a7cf1f94a56e42f9a58d90a0b9616ae74b
SHA256d6a5fe39cd672781b256e0e3102f7022635f1d4bb7cfcc90a80fffe4d0f3877e
SHA5128cb5b059c8105eb91e74a7d5952437aaa1ada89763c5843e7b0f1b93d9ebe15ed40f287c652229291fac02d712cf7ff5ececef276ba0d7ddc35558a3ec3f77b0
-
C:\Windows\System32\config\systemprofile\AppData\Local\Microsoft\Edge\User Data\GrShaderCache\GPUCache\data_1
Filesize264KB
MD5f50f89a0a91564d0b8a211f8921aa7de
SHA1112403a17dd69d5b9018b8cede023cb3b54eab7d
SHA256b1e963d702392fb7224786e7d56d43973e9b9efd1b89c17814d7c558ffc0cdec
SHA512bf8cda48cf1ec4e73f0dd1d4fa5562af1836120214edb74957430cd3e4a2783e801fa3f4ed2afb375257caeed4abe958265237d6e0aacf35a9ede7a2e8898d58
-
C:\Windows\System32\config\systemprofile\AppData\Local\Microsoft\Edge\User Data\GrShaderCache\GPUCache\data_2
Filesize8KB
MD50962291d6d367570bee5454721c17e11
SHA159d10a893ef321a706a9255176761366115bedcb
SHA256ec1702806f4cc7c42a82fc2b38e89835fde7c64bb32060e0823c9077ca92efb7
SHA512f555e961b69e09628eaf9c61f465871e6984cd4d31014f954bb747351dad9cea6d17c1db4bca2c1eb7f187cb5f3c0518748c339c8b43bbd1dbd94aeaa16f58ed
-
C:\Windows\System32\config\systemprofile\AppData\Local\Microsoft\Edge\User Data\GrShaderCache\GPUCache\data_3
Filesize8KB
MD541876349cb12d6db992f1309f22df3f0
SHA15cf26b3420fc0302cd0a71e8d029739b8765be27
SHA256e09f42c398d688dce168570291f1f92d079987deda3099a34adb9e8c0522b30c
SHA512e9a4fc1f7cb6ae2901f8e02354a92c4aaa7a53c640dcf692db42a27a5acc2a3bfb25a0de0eb08ab53983132016e7d43132ea4292e439bb636aafd53fb6ef907e
-
C:\Windows\System32\config\systemprofile\AppData\Local\Microsoft\Edge\User Data\c82c788e-af9d-47bb-a6cb-f21526b54de3.tmp
Filesize9KB
MD5692b5818589e46df9992006fd4187602
SHA1be710bcbdc2cb88a39eaebf23d6f0a7a11e58ed3
SHA256942297022c981eb412f32561c8d1ae677a18becee0424f36e8ec681cf349fb2e
SHA51274f93cd58277dcbde36be57551b1808faf0978176d59de64afcf84fd657ef914c6731311c35e1f13d6524a7a12258654178a86dbd386810885e22c598193c9e5
-
C:\Windows\System32\config\systemprofile\AppData\Local\Microsoft\Windows\INetCache\IE\suggestions[1].en-US
Filesize17KB
MD55a34cb996293fde2cb7a4ac89587393a
SHA13c96c993500690d1a77873cd62bc639b3a10653f
SHA256c6a5377cbc07eece33790cfc70572e12c7a48ad8296be25c0cc805a1f384dbad
SHA512e1b7d0107733f81937415104e70f68b1be6fd0ca65dccf4ff72637943d44278d3a77f704aedff59d2dbc0d56a609b2590c8ec0dd6bc48ab30f1dad0c07a0a3ee
-
Filesize
402B
MD5881dfac93652edb0a8228029ba92d0f5
SHA15b317253a63fecb167bf07befa05c5ed09c4ccea
SHA256a45e345556901cd98b9bf8700b2a263f1da2b2e53dbdf69b9e6cfab6e0bd3464
SHA512592b24deb837d6b82c692da781b8a69d9fa20bbaa3041d6c651839e72f45ac075a86cb967ea2df08fa0635ae28d6064a900f5d15180b9037bb8ba02f9e8e1810
-
Filesize
88KB
MD5002d5646771d31d1e7c57990cc020150
SHA1a28ec731f9106c252f313cca349a68ef94ee3de9
SHA2561e2e25bf730ff20c89d57aa38f7f34be7690820e8279b20127d0014dd27b743f
SHA512689e90e7d83eef054a168b98ba2b8d05ab6ff8564e199d4089215ad3fe33440908e687aa9ad7d94468f9f57a4cc19842d53a9cd2f17758bdadf0503df63629c6
-
C:\Windows\system32\config\systemprofile\AppData\Local\Microsoft\Edge\User Data\Crashpad\settings.dat
Filesize152B
MD58278b32e950ada46b42f78143decea26
SHA1250cca8a7ccb302ad8fecf7cc83c4bd0ac149d06
SHA25610dbb55c70f56d03740f8674f903d106cdc71e2ab62b455f6a9906b5329be79d
SHA512c55f11882796dc73d841339af83d9f4de52edb3ae323f9d420a7d7fedd6d2d904ebb16f00a1e1055d011717f4f530b700dffebf3f3ccbe2d057096b43481d106
-
C:\Windows\system32\config\systemprofile\AppData\Local\Microsoft\Edge\User Data\Crashpad\throttle_store.dat
Filesize20B
MD59e4e94633b73f4a7680240a0ffd6cd2c
SHA1e68e02453ce22736169a56fdb59043d33668368f
SHA25641c91a9c93d76295746a149dce7ebb3b9ee2cb551d84365fff108e59a61cc304
SHA512193011a756b2368956c71a9a3ae8bc9537d99f52218f124b2e64545eeb5227861d372639052b74d0dd956cb33ca72a9107e069f1ef332b9645044849d14af337