Analysis Overview
SHA256
7d92ecc3e75c7651b816c2f96ee978e0a1cafae90362d8e5e0d90634d2db9bd3
Threat Level: Shows suspicious behavior
The file 7d92ecc3e75c7651b816c2f96ee978e0a1cafae90362d8e5e0d90634d2db9bd3N was found to be: Shows suspicious behavior.
Malicious Activity Summary
Reads user/profile data of web browsers
Browser Information Discovery
Enumerates physical storage devices
System Location Discovery: System Language Discovery
Enumerates system info in registry
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
Modifies Internet Explorer settings
Suspicious behavior: EnumeratesProcesses
Suspicious use of FindShellTrayWindow
Suspicious use of SendNotifyMessage
Suspicious use of SetWindowsHookEx
Suspicious use of WriteProcessMemory
MITRE ATT&CK
Enterprise Matrix V15
Analysis: static1
Detonation Overview
Reported
2024-11-09 22:59
Signatures
Analysis: behavioral1
Detonation Overview
Submitted
2024-11-09 22:59
Reported
2024-11-09 23:01
Platform
win7-20240729-en
Max time kernel
76s
Max time network
78s
Command Line
Signatures
Reads user/profile data of web browsers
Enumerates physical storage devices
System Location Discovery: System Language Discovery
| Description | Indicator | Process | Target |
| Key opened | \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language | C:\Users\Admin\AppData\Local\Temp\7d92ecc3e75c7651b816c2f96ee978e0a1cafae90362d8e5e0d90634d2db9bd3N.exe | N/A |
| Key opened | \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language | C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE | N/A |
Modifies Internet Explorer settings
| Description | Indicator | Process | Target |
| Key created | \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\InternetRegistry | C:\Program Files\Internet Explorer\iexplore.exe | N/A |
| Key created | \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage | C:\Program Files\Internet Explorer\iexplore.exe | N/A |
| Key created | \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain | C:\Program Files\Internet Explorer\iexplore.exe | N/A |
| Set value (str) | \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" | C:\Program Files\Internet Explorer\iexplore.exe | N/A |
| Key created | \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing | C:\Program Files\Internet Explorer\iexplore.exe | N/A |
| Key created | \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic | C:\Program Files\Internet Explorer\iexplore.exe | N/A |
| Key created | \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\IETld\LowMic | C:\Program Files\Internet Explorer\iexplore.exe | N/A |
| Set value (int) | \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" | C:\Program Files\Internet Explorer\iexplore.exe | N/A |
| Key created | \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\SearchScopes | C:\Program Files\Internet Explorer\iexplore.exe | N/A |
| Set value (int) | \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" | C:\Program Files\Internet Explorer\iexplore.exe | N/A |
| Set value (data) | \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = e009592afb32db01 | C:\Program Files\Internet Explorer\iexplore.exe | N/A |
| Key created | \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Main | C:\Program Files\Internet Explorer\iexplore.exe | N/A |
| Key created | \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\PageSetup | C:\Program Files\Internet Explorer\iexplore.exe | N/A |
| Set value (int) | \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" | C:\Program Files\Internet Explorer\iexplore.exe | N/A |
| Set value (data) | \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 | C:\Program Files\Internet Explorer\iexplore.exe | N/A |
| Key created | \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\DomainSuggestion | C:\Program Files\Internet Explorer\iexplore.exe | N/A |
| Key created | \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery | C:\Program Files\Internet Explorer\iexplore.exe | N/A |
| Set value (data) | \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb0100000058a24f256fb758488f82172bee4306f500000000020000000000106600000001000020000000e602c8392395f2b1e930d13f054a29332f2336b13e2d30c3748e1b77712882a8000000000e8000000002000020000000ab89b68e866b4f580e647ef98fbecb587a9f49378f4d76c5760f7182a0cd37712000000075cf2def8f5aec8238cb48e7ee1e6608669cefe62c99bc27cf5c45013bd955034000000076e2a37eb3a21257fec47e3fda173e4769cf903e85a17143eb20ce32f718d08212271c1f9d78a78e0f93647f4429a147e3b6f2bd6c17bbfe6082b15fa5fc6df6 | C:\Program Files\Internet Explorer\iexplore.exe | N/A |
| Set value (int) | \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "437355063" | C:\Program Files\Internet Explorer\iexplore.exe | N/A |
| Key created | \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Toolbar | C:\Program Files\Internet Explorer\iexplore.exe | N/A |
| Key created | \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Zoom | C:\Program Files\Internet Explorer\iexplore.exe | N/A |
| Set value (int) | \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{55CC2D01-9EEE-11EF-85F9-DEBA79BDEBEA} = "0" | C:\Program Files\Internet Explorer\iexplore.exe | N/A |
| Key created | \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch | C:\Program Files\Internet Explorer\iexplore.exe | N/A |
| Set value (str) | \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" | C:\Program Files\Internet Explorer\iexplore.exe | N/A |
| Set value (int) | \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" | C:\Program Files\Internet Explorer\iexplore.exe | N/A |
| Key created | \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive | C:\Program Files\Internet Explorer\iexplore.exe | N/A |
| Key created | \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Main | C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE | N/A |
| Key created | \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\IntelliForms | C:\Program Files\Internet Explorer\iexplore.exe | N/A |
| Key created | \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\LowRegistry | C:\Program Files\Internet Explorer\iexplore.exe | N/A |
| Key created | \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser | C:\Program Files\Internet Explorer\iexplore.exe | N/A |
| Key created | \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\GPU | C:\Program Files\Internet Explorer\iexplore.exe | N/A |
| Set value (data) | \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 | C:\Program Files\Internet Explorer\iexplore.exe | N/A |
| Set value (int) | \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" | C:\Program Files\Internet Explorer\iexplore.exe | N/A |
| Key created | \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage | C:\Program Files\Internet Explorer\iexplore.exe | N/A |
Suspicious behavior: EnumeratesProcesses
| Description | Indicator | Process | Target |
| N/A | N/A | C:\Users\Admin\AppData\Local\Temp\7d92ecc3e75c7651b816c2f96ee978e0a1cafae90362d8e5e0d90634d2db9bd3N.exe | N/A |
Suspicious use of FindShellTrayWindow
| Description | Indicator | Process | Target |
| N/A | N/A | C:\Users\Admin\AppData\Local\Temp\7d92ecc3e75c7651b816c2f96ee978e0a1cafae90362d8e5e0d90634d2db9bd3N.exe | N/A |
| N/A | N/A | C:\Program Files\Internet Explorer\iexplore.exe | N/A |
Suspicious use of SendNotifyMessage
| Description | Indicator | Process | Target |
| N/A | N/A | C:\Users\Admin\AppData\Local\Temp\7d92ecc3e75c7651b816c2f96ee978e0a1cafae90362d8e5e0d90634d2db9bd3N.exe | N/A |
Suspicious use of SetWindowsHookEx
Suspicious use of WriteProcessMemory
Processes
C:\Users\Admin\AppData\Local\Temp\7d92ecc3e75c7651b816c2f96ee978e0a1cafae90362d8e5e0d90634d2db9bd3N.exe
"C:\Users\Admin\AppData\Local\Temp\7d92ecc3e75c7651b816c2f96ee978e0a1cafae90362d8e5e0d90634d2db9bd3N.exe"
C:\Program Files\Internet Explorer\iexplore.exe
"C:\Program Files\Internet Explorer\iexplore.exe" http://www.ultimate-downloads.com/Go/FreeTVOnline?source=thankyou_matomy_mplayer-US-direct&offer=mplayer&subid1=396791&userid=ec6470d3-6acf-4e85-ad02-3856ed11222a&et=0
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2784 CREDAT:275457 /prefetch:2
Network
| Country | Destination | Domain | Proto |
| US | 8.8.8.8:53 | imp.optimuminstaller.com | udp |
| US | 54.161.222.85:80 | imp.optimuminstaller.com | tcp |
| US | 8.8.8.8:53 | www.hugedomains.com | udp |
| US | 172.67.70.191:443 | www.hugedomains.com | tcp |
| US | 8.8.8.8:53 | c.pki.goog | udp |
| GB | 142.250.187.227:80 | c.pki.goog | tcp |
| US | 172.67.70.191:443 | www.hugedomains.com | tcp |
| US | 8.8.8.8:53 | install2.optimum-installer.com | udp |
| US | 172.67.70.191:443 | www.hugedomains.com | tcp |
| US | 172.67.70.191:443 | www.hugedomains.com | tcp |
| US | 54.161.222.85:80 | imp.optimuminstaller.com | tcp |
| US | 172.67.70.191:443 | www.hugedomains.com | tcp |
| US | 172.67.70.191:443 | www.hugedomains.com | tcp |
| US | 172.67.70.191:443 | www.hugedomains.com | tcp |
| US | 8.8.8.8:53 | www.ultimate-downloads.com | udp |
| US | 8.8.8.8:53 | www.microsoft.com | udp |
| US | 23.192.22.93:80 | www.microsoft.com | tcp |
| US | 8.8.8.8:53 | crl.microsoft.com | udp |
| GB | 2.19.117.18:80 | crl.microsoft.com | tcp |
| US | 204.79.197.200:443 | ieonline.microsoft.com | tcp |
| US | 204.79.197.200:443 | ieonline.microsoft.com | tcp |
| US | 8.8.8.8:53 | www.microsoft.com | udp |
| US | 8.8.8.8:53 | www.microsoft.com | udp |
| US | 204.79.197.200:443 | ieonline.microsoft.com | tcp |
Files
C:\Users\Admin\AppData\Local\Temp\Cab582F.tmp
| MD5 | 49aebf8cbd62d92ac215b2923fb1b9f5 |
| SHA1 | 1723be06719828dda65ad804298d0431f6aff976 |
| SHA256 | b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f |
| SHA512 | bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b |
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
| MD5 | d1e8f933c5d1fbb61cae2d02d9cb4d9b |
| SHA1 | 1008cce27e494298b15b64398bd2493fbdb55f82 |
| SHA256 | 98566534a783d0f792679ea20dae3ed9a68b882bf86f67781e8ee07f9f0afc2a |
| SHA512 | b1562c855c36a18eec374e72ccafb10803596cacebcc6896bff71813d40eac714d1b1299ec377cac280f91513cfeb7b09cf2dcc15d19b2071de47d7f8762eea3 |
C:\Users\Admin\AppData\Local\Temp\Tar5842.tmp
| MD5 | 4ea6026cf93ec6338144661bf1202cd1 |
| SHA1 | a1dec9044f750ad887935a01430bf49322fbdcb7 |
| SHA256 | 8efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8 |
| SHA512 | 6c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b |
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
| MD5 | 4989aab2e9c4f709e243a94f98d39b33 |
| SHA1 | 9253d13ee77f04306de1f1780fb9ca4827916963 |
| SHA256 | 50681645ffb6357149208c91f40a834344b45a0740eba17118579e4360c545c4 |
| SHA512 | 9c1c7584098644448e5125cdf2541bc94566cb90b32f01cbf32a8735eedc7a5d3f8008c5d4d46b54d026373710997ca30298004dbdbec93ed292748fc5ad5b10 |
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
| MD5 | 8f71cfb0d509ee1ec3dff83a66e8db4d |
| SHA1 | 74b00a26ecdc3095e5915a8ab55ae39c3c0a2f49 |
| SHA256 | d6c5d6c7c48cd6a9d048436b3820bd451fe0a3faefacaa7a05b6575d2b70b5f4 |
| SHA512 | f39e1351289c69e7c07bc7d936d9a072a2d764e62a379b4269e12fcd2a18d31329a74763dcc802255ef98d28325fa22d9d91c1263829640354e47cbd731bb159 |
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
| MD5 | ca0d7c45c8f26ed5a0fa7e9a25439a1a |
| SHA1 | fc334d8836aa6452d5fd7556f296cd4c49678ef9 |
| SHA256 | bf8513c3bd1189c507924001498411502af851e7057ce5b4f3d897b628dff1f7 |
| SHA512 | 0c89a4a843df57efc1795a69b0efd939e24b16309f1d21c2dc6381337a20b56593247d2fa6ae88828029d24bcb472ca46adac67755cf0c01f9d39b2629e5bbca |
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
| MD5 | fd09026c0011110afb27b8183eaf81e8 |
| SHA1 | 358b987e8dc454b1d676be9510b269c81359fad8 |
| SHA256 | ed6da44edd5e5d6b3c59e16f32380bb5404c95cd85da42f8ee35dfe8d3894775 |
| SHA512 | 4b5110ed123aa3a56eb095d27387ee2edd3c038a2d449f3493690e0a711ffbbe9650e2e4df3c2b645626860e146b8fc8484226f3a179a519da74505ce51d4461 |
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
| MD5 | c54c0704addcf9de6e7f588810fa77b4 |
| SHA1 | 979054545e71b1d47847b8fd88bae100f10f6436 |
| SHA256 | 729b31a804f15367b3e94d1dd79b02a95a4e2d601028093a5b2b6c96995d55ff |
| SHA512 | 97f8c2abb00ef389dd004f88a6a3f60a8dd3a6b28052cbba43917769af744033d72c3ead61330abed09b88b653c083df1f807fc5fceb2130a256eb6af3c1042d |
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
| MD5 | 67a53356803a7f9135b20eed96755a7b |
| SHA1 | e51a0aac9afb8e565cb251d8100836b57a0d8dd2 |
| SHA256 | 5bdbc06f0a0392ecfe7d4ba55866f45e56238f3abf94f3fe2cfae3a7fcd5e4a1 |
| SHA512 | 3d8fb6fc251f1278f16b24284b07a88c1b2b256d8a429751b61bdfa32e85c5967e30237fccf9360283390cb1d4c35441f3aa9b3c2671559a4364754e04bcb13e |
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
| MD5 | befbdf3c1ff471106f54101d4bf25b33 |
| SHA1 | 6b1e2f294ed2944c8b6f01962d3c7e0487c5e8a7 |
| SHA256 | 78fd19789240c7f7521ab4e59875a0c78d7e1173976631859d7d957ff1676e95 |
| SHA512 | 5a1463702115d18fcbccc5fcd04faf892d50e3c6574b26bced3b96dc122535a5f321a9a7246d72b81bd29c809498b49cde613c604d1e5651fbe93b8f69a77d3d |
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
| MD5 | 963fa0427063a3dbda4b9cdffc543b84 |
| SHA1 | 6cd343828dba118bad34aacecf2cf73f52f833fc |
| SHA256 | ff7fe2e07a644df225031658e2fb9b29eab9f7a460d5dbcacb0c4eacf377d635 |
| SHA512 | fc69fdf0eb83f74b8a5b32b7dfd9a0e6df30a1315bff4a1f55b8699b5d5167ccf36fda9845c98cb11b4235223201726723ca49566a6b9c51b3a87bc98a3bfdf1 |
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
| MD5 | 966a7f538c631222dfc5d109ee665842 |
| SHA1 | d717198dbba175871cdca08fbe79abce36a8420a |
| SHA256 | 5c7db120e20b3d623f2bad4402113a50cec5d526dfd01c7db676f8e34edda250 |
| SHA512 | f4e1d32092e29270d04afb72261956b4fa129d3a6c103703fc816f24358463e4e98c5eb332ed0c66c2bc56e50832e2a29e677147164b89edec211793440eefef |
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
| MD5 | c7c30220cfecdfccfbba08cbfdb49749 |
| SHA1 | b2247e79eeb89c43f54965a2b1e41af80db78554 |
| SHA256 | 5c66917e1472c553730833dc6f485b2cfb0cdf87f9c22a9be80e07475f1c51a4 |
| SHA512 | f2422599e8f87c0499801d9124c7974236d2e69a32c5d8dfb2f9dc5f690edaf7e4428df2f98775f9ee88f96eb6d5d1c41545b1747f6c57aa0ece35ab89862ac7 |
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
| MD5 | 5c2aeeda17456bc05a1eb144ed28f767 |
| SHA1 | 30fdb1172031fd4eef6c6b4783afb25d616cda27 |
| SHA256 | 01d0e521d1dd8782a8d4f16200cc2588a4a1cf20fe4cbdd00159ee0d7071f878 |
| SHA512 | a89dcb0fd62cef9a5457a56bf21c6dbc79d11b0054e11dfed081d284051eec38cab51f5575982c96154db03fea6a05519a0afdb4408250c4ac07375ae6a256b2 |
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\F0ACCF77CDCBFF39F6191887F6D2D357
| MD5 | a266bb7dcc38a562631361bbf61dd11b |
| SHA1 | 3b1efd3a66ea28b16697394703a72ca340a05bd5 |
| SHA256 | df545bf919a2439c36983b54cdfc903dfa4f37d3996d8d84b4c31eec6f3c163e |
| SHA512 | 0da8ef4f8f6ed3d16d2bc8eb816b9e6e1345dfe2d91160196c47e6149a1d6aedaafadcefd66acdea7f72dcf0832770192ceac15b0c559c4ccc2c0e5581d5aefc |
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
| MD5 | 6d00eae3bd99f53fdcb6d1e0337662bb |
| SHA1 | 538922b9ea6506601b5f76a609fab0d020173183 |
| SHA256 | 8560412b943a7f429f7459166ee94b2576912b196c4cbfac266b30c99c017293 |
| SHA512 | 5aba06eb68f29f0ddc3f2e7111c4995820acb340ebfcc8b1e4f4a485de4fabe44caf2144e17655232d65704aff89bf168e2c98ae51ab429640ffa6ba35158b66 |
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\F0ACCF77CDCBFF39F6191887F6D2D357
| MD5 | 295f0dcf394d6ce9ffae09506985245e |
| SHA1 | 952d0bdc5952f2bf3ddc76c96f55d3347a32988f |
| SHA256 | 06ad72211c8166eb779a825a6f69efd77629c9d4242e19dbbf2f159480e71d3f |
| SHA512 | 1b01330bd1cc83a782201ef752a3d7ab15be507f1d3b99d544ef479abaec791bc92b943cf380fa0c6101c1d1b338465fe61ab308d4b6dc3eb9447bc471034b5c |
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
| MD5 | 9c236aef6445add345cec6326086526c |
| SHA1 | 5bdee354e06c6303c0d6a203046e6448f1ffb67f |
| SHA256 | 2cf2e51896b0206029e56e01c20c3339873921d3bd807cfc8731c5d74a556dbc |
| SHA512 | 84425d6524b509224fe9d418981a476f63577baf7f7de2452d69c4cc628b04aae4a1c093458ad75cbb2dbf392f58aa5d1269a66ba3c20692fb561d9335988222 |
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
| MD5 | a697c648203ede29aec279ad6d503087 |
| SHA1 | 0b587793f0b00fa0f75e61e688203fbe087d57aa |
| SHA256 | b0c150dc9eea2c7c44d613ee283e98ae26869a2361a667f3ddb04dd90d8a8fc4 |
| SHA512 | 6ff6223c36cb14e2a86f31bbcb15280bc565631f42631f1bcf1cff809d0445ce60e636ef537981674f8e3292fd7808a9101a5a6a5b1c95b2801f3ecf46bf9132 |
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
| MD5 | e17de56b938a1d69da4f988a2a65c66a |
| SHA1 | 68607f6a15bd47fea1e7f51c8e3f8f7bebc3719b |
| SHA256 | 59c47ae401fb15cd73dae1c482a310d388123a9062fb8db4be1f13930cf3a104 |
| SHA512 | 25937c98181c0114c7054fa2057e796f945cc0555ac13510d34fd854737472fb32c18f83a7f9669c29a6919fc4794f9492be8ec4355e9af9a3db485bc8d03880 |
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
| MD5 | c1881e923b65bb996b299442e1b92c2c |
| SHA1 | b2411964b58461574b2ebc30321b859acc33066c |
| SHA256 | 58bea0f5c2117c26869fc7b38e3396181530aca1f3f3824be846984f176d622b |
| SHA512 | e4c7e626a35113a99e8d4af35fffbe5f41a25fb3ab1b96298798c3891fc82175ad2dacc67d00124be3faf0de55db948d9e3e15ce01ed3534cf87835cacf50d25 |
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
| MD5 | 15c9a2aa232b48975bb84b0af79b356f |
| SHA1 | ad64253e2bee4ce1a2e10aff6bec097433a2f439 |
| SHA256 | 77f5287e3608aa9cbea4d03d2bd3b1211c3da9b50f01cf2ea6537320788a8cb5 |
| SHA512 | 114e7a33634247b166363fbc5eb2be528574e14202c7375033f9a4366aa450046a71594c3ddaf9d2d7102e98cd861fdd0cd994d0db470b2433af0128d8ea5e7f |
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\3C428B1A3E5F57D887EC4B864FAC5DCC
| MD5 | e4a68ac854ac5242460afd72481b2a44 |
| SHA1 | df3c24f9bfd666761b268073fe06d1cc8d4f82a4 |
| SHA256 | cb3ccbb76031e5e0138f8dd39a23f9de47ffc35e43c1144cea27d46a5ab1cb5f |
| SHA512 | 5622207e1ba285f172756f6019af92ac808ed63286e24dfecc1e79873fb5d140f1ceb7133f2476e89a5f75f711f9813a9fbb8fd5287f64adfdcc53b864f9bdc5 |
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
| MD5 | 73f9cfaef5843f878f8854c31f75f4f2 |
| SHA1 | 22adc7a51c8f166f7b3880933a4a1b5a40bec38c |
| SHA256 | 8edbe9758bd8018d70bdb4d6ebdf3ac31758481e9a9dd82fa56aea85b4026a12 |
| SHA512 | 75bc22bba0a6817cc51cb8c368034254c41ff300b84378ff2a0705efdc66ba7b9901ed0170195543de79332819e3b4a07dc3cb6148c3e1d76432c3c848545dc8 |
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\3C428B1A3E5F57D887EC4B864FAC5DCC
| MD5 | bcebc3feac132e97ed70e798b40e9a8d |
| SHA1 | 6d922148fb348847d72fca58957c6b5ed4aa7532 |
| SHA256 | 34bd5338d77a837b341be9e6716c895c54221fea7b13d47ce0fb62069bcc6aa9 |
| SHA512 | 23cffda8c855b67524bb1a1715c5eb7e4de80d199d2d5e2a0c443a8358f4b318db398253fc5aba7d87d7563e796ae207b5183d9be3351f4eeddb06a2d6a979f1 |
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
| MD5 | 3cdd896e83b888901dd1c1fb73203335 |
| SHA1 | ce1514c99d2921b7608fa9fd894f2646bea292ac |
| SHA256 | 6993f81f66f3345a67caa78286bdf02a085303286c42440b482a6c361c794a8c |
| SHA512 | 9fd670cc7927d6c61b1c76a9baa0fc9aab471873464b8f6828b85ba8498b524a18b4bd784574ee6759790c08936feb3a857c40be5a01348444fe4435320a65e9 |
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
| MD5 | 900a2039a14756c5d096894b8f2d26fa |
| SHA1 | ae51ff7530b967c93dffdfed0080008cb38366c8 |
| SHA256 | 14703838fdb13de15990f54292b68dfd6a5d7b2258b6fd08951f49bb1d8f1c3f |
| SHA512 | a7b53933b3b6c48871e591c84858a062d10a45f91cc7526ec159c3eb19b8c50d43bb4b8cb48399b06a33265bce7ade70b8f2cf903d3efb542c2bce23fc81b374 |
Analysis: behavioral2
Detonation Overview
Submitted
2024-11-09 22:59
Reported
2024-11-09 23:01
Platform
win10v2004-20241007-en
Max time kernel
117s
Max time network
116s
Command Line
Signatures
Reads user/profile data of web browsers
Browser Information Discovery
Enumerates physical storage devices
System Location Discovery: System Language Discovery
| Description | Indicator | Process | Target |
| Key opened | \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language | C:\Users\Admin\AppData\Local\Temp\7d92ecc3e75c7651b816c2f96ee978e0a1cafae90362d8e5e0d90634d2db9bd3N.exe | N/A |
Enumerates system info in registry
| Description | Indicator | Process | Target |
| Key value queried | \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName | C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe | N/A |
| Key opened | \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS | C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe | N/A |
| Key value queried | \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer | C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe | N/A |
Suspicious behavior: EnumeratesProcesses
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
| Description | Indicator | Process | Target |
| N/A | N/A | C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe | N/A |
| N/A | N/A | C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe | N/A |
| N/A | N/A | C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe | N/A |
| N/A | N/A | C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe | N/A |
| N/A | N/A | C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe | N/A |
| N/A | N/A | C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe | N/A |
| N/A | N/A | C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe | N/A |
| N/A | N/A | C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe | N/A |
| N/A | N/A | C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe | N/A |
| N/A | N/A | C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe | N/A |
Suspicious use of FindShellTrayWindow
Suspicious use of SendNotifyMessage
Suspicious use of SetWindowsHookEx
Suspicious use of WriteProcessMemory
Processes
C:\Users\Admin\AppData\Local\Temp\7d92ecc3e75c7651b816c2f96ee978e0a1cafae90362d8e5e0d90634d2db9bd3N.exe
"C:\Users\Admin\AppData\Local\Temp\7d92ecc3e75c7651b816c2f96ee978e0a1cafae90362d8e5e0d90634d2db9bd3N.exe"
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument http://www.ultimate-downloads.com/Go/FreeTVOnline?source=thankyou_matomy_mplayer-US-direct&offer=mplayer&subid1=396791&userid=ec6470d3-6acf-4e85-ad02-3856ed11222a&et=0
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0x100,0x104,0x108,0xdc,0x10c,0x7ffe39c246f8,0x7ffe39c24708,0x7ffe39c24718
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2244,6931778849638486752,6748304739832405448,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2256 /prefetch:2
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2244,6931778849638486752,6748304739832405448,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2324 /prefetch:3
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2244,6931778849638486752,6748304739832405448,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2820 /prefetch:8
C:\Windows\System32\CompPkgSrv.exe
C:\Windows\System32\CompPkgSrv.exe -Embedding
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2244,6931778849638486752,6748304739832405448,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3252 /prefetch:1
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2244,6931778849638486752,6748304739832405448,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3268 /prefetch:1
C:\Windows\System32\CompPkgSrv.exe
C:\Windows\System32\CompPkgSrv.exe -Embedding
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2244,6931778849638486752,6748304739832405448,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4072 /prefetch:1
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2244,6931778849638486752,6748304739832405448,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3396 /prefetch:1
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe
"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2244,6931778849638486752,6748304739832405448,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5320 /prefetch:8
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe
"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2244,6931778849638486752,6748304739832405448,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5320 /prefetch:8
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2244,6931778849638486752,6748304739832405448,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5396 /prefetch:1
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2244,6931778849638486752,6748304739832405448,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5412 /prefetch:1
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2244,6931778849638486752,6748304739832405448,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4212 /prefetch:1
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2244,6931778849638486752,6748304739832405448,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=13 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4016 /prefetch:1
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2244,6931778849638486752,6748304739832405448,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=14 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=2000 /prefetch:1
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2244,6931778849638486752,6748304739832405448,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=15 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5296 /prefetch:1
Network
| Country | Destination | Domain | Proto |
| US | 8.8.8.8:53 | 8.8.8.8.in-addr.arpa | udp |
| US | 8.8.8.8:53 | 13.86.106.20.in-addr.arpa | udp |
| US | 8.8.8.8:53 | imp.optimuminstaller.com | udp |
| US | 34.205.242.146:80 | imp.optimuminstaller.com | tcp |
| US | 8.8.8.8:53 | www.hugedomains.com | udp |
| US | 104.26.7.37:443 | www.hugedomains.com | tcp |
| US | 8.8.8.8:53 | c.pki.goog | udp |
| GB | 172.217.16.227:80 | c.pki.goog | tcp |
| US | 8.8.8.8:53 | 146.242.205.34.in-addr.arpa | udp |
| US | 8.8.8.8:53 | 37.7.26.104.in-addr.arpa | udp |
| US | 8.8.8.8:53 | 227.16.217.172.in-addr.arpa | udp |
| US | 8.8.8.8:53 | 88.210.23.2.in-addr.arpa | udp |
| US | 8.8.8.8:53 | 67.31.126.40.in-addr.arpa | udp |
| US | 104.26.7.37:443 | www.hugedomains.com | tcp |
| US | 8.8.8.8:53 | 232.168.11.51.in-addr.arpa | udp |
| US | 8.8.8.8:53 | 95.221.229.192.in-addr.arpa | udp |
| US | 8.8.8.8:53 | install2.optimum-installer.com | udp |
| US | 104.26.7.37:443 | www.hugedomains.com | tcp |
| US | 104.26.7.37:443 | www.hugedomains.com | tcp |
| US | 104.26.7.37:443 | www.hugedomains.com | tcp |
| US | 104.26.7.37:443 | www.hugedomains.com | tcp |
| US | 8.8.8.8:53 | install2.optimum-installer.com | udp |
| US | 104.26.7.37:443 | www.hugedomains.com | tcp |
| US | 8.8.8.8:53 | www.ultimate-downloads.com | udp |
| US | 8.8.8.8:53 | 209.205.72.20.in-addr.arpa | udp |
| US | 8.8.8.8:53 | www.ultimate-downloads.com | udp |
| US | 8.8.8.8:53 | google.com | udp |
| US | 8.8.8.8:53 | google.com | udp |
| N/A | 224.0.0.251:5353 | udp | |
| US | 8.8.8.8:53 | www.ultimate-downloads.com | udp |
| US | 8.8.8.8:53 | 200.163.202.172.in-addr.arpa | udp |
| US | 8.8.8.8:53 | 206.23.85.13.in-addr.arpa | udp |
| US | 8.8.8.8:53 | 172.214.232.199.in-addr.arpa | udp |
| US | 8.8.8.8:53 | www.ultimate-downloads.com | udp |
| US | 8.8.8.8:53 | 83.210.23.2.in-addr.arpa | udp |
| US | 8.8.8.8:53 | 23.236.111.52.in-addr.arpa | udp |
| US | 8.8.8.8:53 | www.ultimate-downloads.com | udp |
Files
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad\settings.dat
| MD5 | 61cef8e38cd95bf003f5fdd1dc37dae1 |
| SHA1 | 11f2f79ecb349344c143eea9a0fed41891a3467f |
| SHA256 | ae671613623b4477fbd5daf1fd2d148ae2a09ddcc3804b2b6d4ffcb60b317e3e |
| SHA512 | 6fb9b333fe0e8fde19fdd0bd01a1990a4e60a87c0a02bc8297da1206e42f8690d06b030308e58c862e9e77714a585eed7cc1627590d99a10aeb77fc0dd3d864d |
\??\pipe\LOCAL\crashpad_2116_MOJRFBSDIDOIPAOJ
| MD5 | d41d8cd98f00b204e9800998ecf8427e |
| SHA1 | da39a3ee5e6b4b0d3255bfef95601890afd80709 |
| SHA256 | e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855 |
| SHA512 | cf83e1357eefb8bdf1542850d66d8007d620e4050b5715dc83f4a921d36ce9ce47d0d13c5d85f2b0ff8318d2877eec2f63b931bd47417a81a538327af927da3e |
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad\settings.dat
| MD5 | 0a9dc42e4013fc47438e96d24beb8eff |
| SHA1 | 806ab26d7eae031a58484188a7eb1adab06457fc |
| SHA256 | 58d66151799526b3fa372552cd99b385415d9e9a119302b99aadc34dd51dd151 |
| SHA512 | 868d6b421ae2501a519595d0c34ddef25b2a98b082c5203da8349035f1f6764ddf183197f1054e7e86a752c71eccbc0649e515b63c55bc18cf5f0592397e258f |
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Preferences
| MD5 | 0dd4b7b20957df38543b9c50b5f1c1b0 |
| SHA1 | 2f41947f03f545c054c6d7c880be7a20b1dd6031 |
| SHA256 | 5bc35a4e4b6b90f1a3fdd96b0b654412d9fd7c6cf9f0a7bd4944c3818e43d48f |
| SHA512 | 97504cb15a8ebbd57e2009c0135356ac7edc2a402439c37f49e7482d14d6941612546e295c74617aa9d7af43a61591d7f490d66d34d83dbf00924295ca82df14 |
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\data_reduction_proxy_leveldb\CURRENT
| MD5 | 6752a1d65b201c13b62ea44016eb221f |
| SHA1 | 58ecf154d01a62233ed7fb494ace3c3d4ffce08b |
| SHA256 | 0861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd |
| SHA512 | 9cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389 |
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Local State
| MD5 | 018d1b4c74ea1b4d736e2d1a91a83bd6 |
| SHA1 | 20b551582ad0bf515fbc49023540eda1125ba92f |
| SHA256 | 3178a370e49bb6e52a6cbab5c6648e4d98cb63112a0d4371bc528341c28816de |
| SHA512 | de29da55df0b84a2cb1083089941335c9150d08eb12b16222614f27ee31b98f75f96f8d2db297ba07f610201e270777fc1279393f08060debc46158148ec78b4 |
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Preferences
| MD5 | 6399d2dbbdb5d350d2f7a4c4f8bf9d7b |
| SHA1 | b0fb7835f891989ce11a6cc677023e4534bb0470 |
| SHA256 | c913d11150961183903f31c4ffe4057509f18f53942ea70fa3dd6981fb807d70 |
| SHA512 | d2d71a42b3b67991ac5ec47a7352859f28cf7cf0822d69498c8be2936710afd7283264b03ab0039e207d349350946ebbac582c60c9fb0c3eb03c0dd88ac5d5d9 |