Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
146s -
max time network
151s -
platform
windows10-1703_x64 -
resource
win10-20240404-en -
resource tags
arch:x64arch:x86image:win10-20240404-enlocale:en-usos:windows10-1703-x64system -
submitted
24/04/2024, 23:55
Static task
static1
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
http://
Resource
win10-20240404-en
General
-
Target
http://
Malware Config
Signatures
-
Downloads MZ/PE file
-
Executes dropped EXE 2 IoCs
pid Process 5692 CheatEngine75.exe 5736 CheatEngine75.tmp -
Loads dropped DLL 1 IoCs
pid Process 5736 CheatEngine75.tmp -
Checks for any installed AV software in registry 1 TTPs 9 IoCs
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-3699363923-1875576828-3287151903-1000\SOFTWARE\AVAST Software\Avast CheatEngine75.tmp Key opened \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\AVG\AV\Dir CheatEngine75.tmp Key opened \REGISTRY\MACHINE\SOFTWARE\AVG\AV\Dir CheatEngine75.tmp Key opened \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Avira\Browser\Installed CheatEngine75.tmp Key opened \REGISTRY\USER\S-1-5-21-3699363923-1875576828-3287151903-1000\SOFTWARE\Avira\Browser\Installed CheatEngine75.tmp Key opened \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\AVAST Software\Avast CheatEngine75.tmp Key opened \REGISTRY\USER\S-1-5-21-3699363923-1875576828-3287151903-1000\SOFTWARE\AVG\AV\Dir CheatEngine75.tmp Key opened \REGISTRY\MACHINE\SOFTWARE\Avira\Browser\Installed CheatEngine75.tmp Key opened \REGISTRY\MACHINE\SOFTWARE\AVAST Software\Avast CheatEngine75.tmp -
Drops file in Windows directory 4 IoCs
description ioc Process File created C:\Windows\rescache\_merged\3720402701\1568373884.pri MicrosoftEdge.exe File opened for modification C:\Windows\Debug\ESE.TXT MicrosoftEdge.exe File created C:\Windows\rescache\_merged\3720402701\1568373884.pri MicrosoftEdgeCP.exe File created C:\Windows\rescache\_merged\3720402701\1568373884.pri MicrosoftEdgeCP.exe -
Checks processor information in registry 2 TTPs 7 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Update Revision firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~Mhz firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\VendorIdentifier firefox.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 CheatEngine75.tmp Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ CheatEngine75.tmp Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Update Signature firefox.exe -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3699363923-1875576828-3287151903-1000\Software\Microsoft\Internet Explorer\Main browser_broker.exe Key created \REGISTRY\USER\S-1-5-21-3699363923-1875576828-3287151903-1000\Software\Microsoft\Internet Explorer\Main MicrosoftEdgeCP.exe -
Modifies registry class 64 IoCs
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-3699363923-1875576828-3287151903-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\Children\006\ACGStatus\ACGPolicyState = "6" MicrosoftEdgeCP.exe Key created \REGISTRY\USER\S-1-5-21-3699363923-1875576828-3287151903-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\Children\004\Internet Explorer MicrosoftEdgeCP.exe Set value (int) \REGISTRY\USER\S-1-5-21-3699363923-1875576828-3287151903-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\Privacy\ClearBrowsingHistoryOnStart = "0" MicrosoftEdge.exe Key created \REGISTRY\USER\S-1-5-21-3699363923-1875576828-3287151903-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\ExtensionsStore\datastore MicrosoftEdge.exe Key created \REGISTRY\USER\S-1-5-21-3699363923-1875576828-3287151903-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\Internet Explorer\Main MicrosoftEdge.exe Key created \REGISTRY\USER\S-1-5-21-3699363923-1875576828-3287151903-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\ServiceUI MicrosoftEdge.exe Set value (int) \REGISTRY\USER\S-1-5-21-3699363923-1875576828-3287151903-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\Children\001\ACGStatus\ACGPolicyState = "8" MicrosoftEdgeCP.exe Set value (str) \REGISTRY\USER\S-1-5-21-3699363923-1875576828-3287151903-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\Internet Settings\Cache\Cookies\CachePrefix = "Cookie:" MicrosoftEdge.exe Key created \REGISTRY\USER\S-1-5-21-3699363923-1875576828-3287151903-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\GPU MicrosoftEdge.exe Key created \REGISTRY\USER\S-1-5-21-3699363923-1875576828-3287151903-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\GPU MicrosoftEdgeCP.exe Key created \REGISTRY\USER\S-1-5-21-3699363923-1875576828-3287151903-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\Protected - It is a violation of Windows Policy to modify. See aka.ms/browserpolicy\Extensions MicrosoftEdge.exe Key created \REGISTRY\USER\S-1-5-21-3699363923-1875576828-3287151903-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\Children\004\CIStatus MicrosoftEdgeCP.exe Key created \REGISTRY\USER\S-1-5-21-3699363923-1875576828-3287151903-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\DataStore MicrosoftEdge.exe Set value (int) \REGISTRY\USER\S-1-5-21-3699363923-1875576828-3287151903-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\Recovery\PendingRecovery\ReadingStorePending = "1" MicrosoftEdge.exe Set value (int) \REGISTRY\USER\S-1-5-21-3699363923-1875576828-3287151903-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\Children\004\Internet Explorer\Main\OperationalData = "1" MicrosoftEdgeCP.exe Set value (data) \REGISTRY\USER\S-1-5-21-3699363923-1875576828-3287151903-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\CIStatus\CIStatusTimestamp = 85ef88eca296da01 MicrosoftEdge.exe Set value (data) \REGISTRY\USER\S-1-5-21-3699363923-1875576828-3287151903-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\CIStatus\CIStatusTimestamp = 414fc9eca296da01 MicrosoftEdge.exe Set value (int) \REGISTRY\USER\S-1-5-21-3699363923-1875576828-3287151903-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\Recovery\PendingDelete\C:\Users\Admin\AppData\Local\Pack = "0" MicrosoftEdge.exe Key created \REGISTRY\USER\S-1-5-21-3699363923-1875576828-3287151903-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\Children\004\Internet Settings\Cache\Content MicrosoftEdgeCP.exe Set value (int) \REGISTRY\USER\S-1-5-21-3699363923-1875576828-3287151903-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\Children\001\CIStatus\CIPolicyState = "0" MicrosoftEdgeCP.exe Set value (int) \REGISTRY\USER\S-1-5-21-3699363923-1875576828-3287151903-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\DummyPath\dummySetting = "1" MicrosoftEdge.exe Key created \REGISTRY\USER\S-1-5-21-3699363923-1875576828-3287151903-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\GPU MicrosoftEdgeCP.exe Set value (data) \REGISTRY\USER\S-1-5-21-3699363923-1875576828-3287151903-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\Protected - It is a violation of Windows Policy to modif = 010000002d44e0b63dc6283a173c087996e62e7905c39bbdc199227082d1d5ad3ef6d4361524bdcf86c6c33a395b22a45c64fb103d7ac682df6197a51849 MicrosoftEdge.exe Key created \REGISTRY\USER\S-1-5-21-3699363923-1875576828-3287151903-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\Protected - It is a violation of Windows Policy to modif MicrosoftEdge.exe Set value (int) \REGISTRY\USER\S-1-5-21-3699363923-1875576828-3287151903-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\Recovery\PendingRecovery\ReadingStorePending = "0" MicrosoftEdge.exe Set value (int) \REGISTRY\USER\S-1-5-21-3699363923-1875576828-3287151903-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\GPU\Wow64-VendorId = "0" MicrosoftEdge.exe Set value (int) \REGISTRY\USER\S-1-5-21-3699363923-1875576828-3287151903-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\Children\006\CIStatus\CIPolicyState = "0" MicrosoftEdgeCP.exe Key created \REGISTRY\USER\S-1-5-21-3699363923-1875576828-3287151903-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\Children\004\Internet Settings MicrosoftEdgeCP.exe Key created \REGISTRY\USER\S-1-5-21-3699363923-1875576828-3287151903-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\ExtensionsStore MicrosoftEdge.exe Set value (data) \REGISTRY\USER\S-1-5-21-3699363923-1875576828-3287151903-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\Children\004\CIStatus\SignaturePolicy = 06000000 MicrosoftEdgeCP.exe Set value (data) \REGISTRY\USER\S-1-5-21-3699363923-1875576828-3287151903-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\Children\004\ACGStatus\DynamicCodePolicy = 05000000 MicrosoftEdgeCP.exe Set value (int) \REGISTRY\USER\S-1-5-21-3699363923-1875576828-3287151903-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\Children\004\Internet Settings\Cache\History\CacheLimit = "1" MicrosoftEdgeCP.exe Key created \REGISTRY\USER\S-1-5-21-3699363923-1875576828-3287151903-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\BrowserEmulation MicrosoftEdge.exe Set value (int) \REGISTRY\USER\S-1-5-21-3699363923-1875576828-3287151903-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\Children\004\CIStatus\CIPolicyState = "0" MicrosoftEdgeCP.exe Key created \REGISTRY\USER\S-1-5-21-3699363923-1875576828-3287151903-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\Children\004\ACGStatus MicrosoftEdgeCP.exe Set value (str) \REGISTRY\USER\S-1-5-21-3699363923-1875576828-3287151903-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\GPU\AdapterInfo = "vendorId=\"0x1414\",deviceID=\"0x8c\",subSysID=\"0x0\",revision=\"0x0\",version=\"10.0.15063.0\"hypervisor=\"No Hypervisor (No SLAT)\"" MicrosoftEdgeCP.exe Set value (int) \REGISTRY\USER\S-1-5-21-3699363923-1875576828-3287151903-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\GPU\DXFeatureLevel = "0" MicrosoftEdge.exe Key created \REGISTRY\USER\S-1-5-21-3699363923-1875576828-3287151903-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\Children\004\Internet Settings\Cache MicrosoftEdgeCP.exe Set value (int) \REGISTRY\USER\S-1-5-21-3699363923-1875576828-3287151903-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\ServiceUI\IsSignedIn = "0" MicrosoftEdge.exe Key created \REGISTRY\USER\S-1-5-21-3699363923-1875576828-3287151903-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\Children\006\ACGStatus MicrosoftEdgeCP.exe Set value (int) \REGISTRY\USER\S-1-5-21-3699363923-1875576828-3287151903-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\Recovery\PendingRecovery\Active = "0" MicrosoftEdge.exe Set value (int) \REGISTRY\USER\S-1-5-21-3699363923-1875576828-3287151903-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\Main\DisallowDefaultBrowserPrompt = "0" MicrosoftEdge.exe Set value (data) \REGISTRY\USER\S-1-5-21-3699363923-1875576828-3287151903-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\DataStore\LastCleanup = 4541c0f5a296da01 MicrosoftEdge.exe Key created \REGISTRY\USER\S-1-5-21-3699363923-1875576828-3287151903-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\Privacy MicrosoftEdge.exe Set value (int) \REGISTRY\USER\S-1-5-21-3699363923-1875576828-3287151903-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\Internet Settings\PrivacyAdvanced = "0" MicrosoftEdge.exe Set value (int) \REGISTRY\USER\S-1-5-21-3699363923-1875576828-3287151903-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\BrowserEmulation\CVListXMLVersionHigh = "0" MicrosoftEdge.exe Set value (data) \REGISTRY\USER\S-1-5-21-3699363923-1875576828-3287151903-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\Children\006\CIStatus\SignaturePolicy = 06000000 MicrosoftEdgeCP.exe Set value (data) \REGISTRY\USER\S-1-5-21-3699363923-1875576828-3287151903-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\Children\001\ACGStatus\DynamicCodePolicy = 05000000 MicrosoftEdgeCP.exe Set value (data) \REGISTRY\USER\S-1-5-21-3699363923-1875576828-3287151903-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\Internet Settings\Zones\3\{AEBA21FA-782A-4A90-978D-B7216 = 1a3761592352350c7a5f20172f1e1a190e2b017313371312141a152a MicrosoftEdge.exe Set value (int) \REGISTRY\USER\S-1-5-21-3699363923-1875576828-3287151903-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\GPU\VersionHigh = "0" MicrosoftEdge.exe Key created \REGISTRY\USER\S-1-5-21-3699363923-1875576828-3287151903-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\Children\004\Internet Settings\Cache\History MicrosoftEdgeCP.exe Key created \REGISTRY\USER\S-1-5-21-3699363923-1875576828-3287151903-1000_Classes\Local Settings firefox.exe Set value (int) \REGISTRY\USER\S-1-5-21-3699363923-1875576828-3287151903-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\Privacy\InProgressFlags = "262144" MicrosoftEdge.exe Key created \REGISTRY\USER\S-1-5-21-3699363923-1875576828-3287151903-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\Recovery\Active MicrosoftEdge.exe Set value (int) \REGISTRY\USER\S-1-5-21-3699363923-1875576828-3287151903-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\Recovery\PendingRecovery\Active = "1" MicrosoftEdge.exe Key created \REGISTRY\USER\S-1-5-21-3699363923-1875576828-3287151903-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\Internet Settings\Zones\3 MicrosoftEdge.exe Set value (int) \REGISTRY\USER\S-1-5-21-3699363923-1875576828-3287151903-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\BrowserEmulation\IECompatVersionHigh = "0" MicrosoftEdge.exe Set value (int) \REGISTRY\USER\S-1-5-21-3699363923-1875576828-3287151903-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\GPU\DeviceId = "0" MicrosoftEdge.exe Key created \REGISTRY\USER\S-1-5-21-3699363923-1875576828-3287151903-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\Main MicrosoftEdge.exe Set value (int) \REGISTRY\USER\S-1-5-21-3699363923-1875576828-3287151903-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\Main\LastClosedWidth = "1280" MicrosoftEdge.exe Key created \REGISTRY\USER\S-1-5-21-3699363923-1875576828-3287151903-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\IETld\LowMic MicrosoftEdge.exe Set value (int) \REGISTRY\USER\S-1-5-21-3699363923-1875576828-3287151903-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\BrowserEmulation\CVListXMLVersionLow = "0" MicrosoftEdge.exe Key created \REGISTRY\USER\S-1-5-21-3699363923-1875576828-3287151903-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\Children\006\CIStatus MicrosoftEdgeCP.exe Set value (str) \REGISTRY\USER\S-1-5-21-3699363923-1875576828-3287151903-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\Children\004\Internet Settings\Cache\Content\CachePrefix MicrosoftEdgeCP.exe -
NTFS ADS 1 IoCs
description ioc Process File created C:\Users\Admin\Downloads\CheatEngine75.exe:Zone.Identifier firefox.exe -
Script User-Agent 1 IoCs
Uses user-agent string associated with script host/environment.
description flow ioc HTTP User-Agent header 207 Mozilla/4.0 (compatible; Win32; WinHttp.WinHttpRequest.5) -
Suspicious behavior: EnumeratesProcesses 30 IoCs
pid Process 5736 CheatEngine75.tmp 5736 CheatEngine75.tmp 5736 CheatEngine75.tmp 5736 CheatEngine75.tmp 5736 CheatEngine75.tmp 5736 CheatEngine75.tmp 5736 CheatEngine75.tmp 5736 CheatEngine75.tmp 5736 CheatEngine75.tmp 5736 CheatEngine75.tmp 5736 CheatEngine75.tmp 5736 CheatEngine75.tmp 5736 CheatEngine75.tmp 5736 CheatEngine75.tmp 5736 CheatEngine75.tmp 5736 CheatEngine75.tmp 5736 CheatEngine75.tmp 5736 CheatEngine75.tmp 5736 CheatEngine75.tmp 5736 CheatEngine75.tmp 5736 CheatEngine75.tmp 5736 CheatEngine75.tmp 5736 CheatEngine75.tmp 5736 CheatEngine75.tmp 5736 CheatEngine75.tmp 5736 CheatEngine75.tmp 5736 CheatEngine75.tmp 5736 CheatEngine75.tmp 5736 CheatEngine75.tmp 5736 CheatEngine75.tmp -
Suspicious behavior: MapViewOfSection 2 IoCs
pid Process 4064 MicrosoftEdgeCP.exe 4064 MicrosoftEdgeCP.exe -
Suspicious use of AdjustPrivilegeToken 11 IoCs
description pid Process Token: SeDebugPrivilege 4812 MicrosoftEdgeCP.exe Token: SeDebugPrivilege 4812 MicrosoftEdgeCP.exe Token: SeDebugPrivilege 4812 MicrosoftEdgeCP.exe Token: SeDebugPrivilege 4812 MicrosoftEdgeCP.exe Token: SeDebugPrivilege 4692 MicrosoftEdge.exe Token: SeDebugPrivilege 4692 MicrosoftEdge.exe Token: SeDebugPrivilege 3736 firefox.exe Token: SeDebugPrivilege 3736 firefox.exe Token: SeDebugPrivilege 3736 firefox.exe Token: SeDebugPrivilege 3736 firefox.exe Token: SeDebugPrivilege 3736 firefox.exe -
Suspicious use of FindShellTrayWindow 18 IoCs
pid Process 3736 firefox.exe 3736 firefox.exe 3736 firefox.exe 3736 firefox.exe 3736 firefox.exe 3736 firefox.exe 3736 firefox.exe 3736 firefox.exe 3736 firefox.exe 3736 firefox.exe 3736 firefox.exe 3736 firefox.exe 3736 firefox.exe 3736 firefox.exe 3736 firefox.exe 3736 firefox.exe 3736 firefox.exe 3736 firefox.exe -
Suspicious use of SendNotifyMessage 17 IoCs
pid Process 3736 firefox.exe 3736 firefox.exe 3736 firefox.exe 3736 firefox.exe 3736 firefox.exe 3736 firefox.exe 3736 firefox.exe 3736 firefox.exe 3736 firefox.exe 3736 firefox.exe 3736 firefox.exe 3736 firefox.exe 3736 firefox.exe 3736 firefox.exe 3736 firefox.exe 3736 firefox.exe 3736 firefox.exe -
Suspicious use of SetWindowsHookEx 11 IoCs
pid Process 4692 MicrosoftEdge.exe 4064 MicrosoftEdgeCP.exe 4812 MicrosoftEdgeCP.exe 4064 MicrosoftEdgeCP.exe 3736 firefox.exe 3736 firefox.exe 3736 firefox.exe 3736 firefox.exe 3736 firefox.exe 3736 firefox.exe 3736 firefox.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 4064 wrote to memory of 2968 4064 MicrosoftEdgeCP.exe 77 PID 4064 wrote to memory of 2968 4064 MicrosoftEdgeCP.exe 77 PID 4064 wrote to memory of 2968 4064 MicrosoftEdgeCP.exe 77 PID 4212 wrote to memory of 3736 4212 firefox.exe 80 PID 4212 wrote to memory of 3736 4212 firefox.exe 80 PID 4212 wrote to memory of 3736 4212 firefox.exe 80 PID 4212 wrote to memory of 3736 4212 firefox.exe 80 PID 4212 wrote to memory of 3736 4212 firefox.exe 80 PID 4212 wrote to memory of 3736 4212 firefox.exe 80 PID 4212 wrote to memory of 3736 4212 firefox.exe 80 PID 4212 wrote to memory of 3736 4212 firefox.exe 80 PID 4212 wrote to memory of 3736 4212 firefox.exe 80 PID 4212 wrote to memory of 3736 4212 firefox.exe 80 PID 4212 wrote to memory of 3736 4212 firefox.exe 80 PID 3736 wrote to memory of 4740 3736 firefox.exe 81 PID 3736 wrote to memory of 4740 3736 firefox.exe 81 PID 3736 wrote to memory of 2752 3736 firefox.exe 82 PID 3736 wrote to memory of 2752 3736 firefox.exe 82 PID 3736 wrote to memory of 2752 3736 firefox.exe 82 PID 3736 wrote to memory of 2752 3736 firefox.exe 82 PID 3736 wrote to memory of 2752 3736 firefox.exe 82 PID 3736 wrote to memory of 2752 3736 firefox.exe 82 PID 3736 wrote to memory of 2752 3736 firefox.exe 82 PID 3736 wrote to memory of 2752 3736 firefox.exe 82 PID 3736 wrote to memory of 2752 3736 firefox.exe 82 PID 3736 wrote to memory of 2752 3736 firefox.exe 82 PID 3736 wrote to memory of 2752 3736 firefox.exe 82 PID 3736 wrote to memory of 2752 3736 firefox.exe 82 PID 3736 wrote to memory of 2752 3736 firefox.exe 82 PID 3736 wrote to memory of 2752 3736 firefox.exe 82 PID 3736 wrote to memory of 2752 3736 firefox.exe 82 PID 3736 wrote to memory of 2752 3736 firefox.exe 82 PID 3736 wrote to memory of 2752 3736 firefox.exe 82 PID 3736 wrote to memory of 2752 3736 firefox.exe 82 PID 3736 wrote to memory of 2752 3736 firefox.exe 82 PID 3736 wrote to memory of 2752 3736 firefox.exe 82 PID 3736 wrote to memory of 2752 3736 firefox.exe 82 PID 3736 wrote to memory of 2752 3736 firefox.exe 82 PID 3736 wrote to memory of 2752 3736 firefox.exe 82 PID 3736 wrote to memory of 2752 3736 firefox.exe 82 PID 3736 wrote to memory of 2752 3736 firefox.exe 82 PID 3736 wrote to memory of 2752 3736 firefox.exe 82 PID 3736 wrote to memory of 2752 3736 firefox.exe 82 PID 3736 wrote to memory of 2752 3736 firefox.exe 82 PID 3736 wrote to memory of 2752 3736 firefox.exe 82 PID 3736 wrote to memory of 2752 3736 firefox.exe 82 PID 3736 wrote to memory of 2752 3736 firefox.exe 82 PID 3736 wrote to memory of 2752 3736 firefox.exe 82 PID 3736 wrote to memory of 2752 3736 firefox.exe 82 PID 3736 wrote to memory of 2752 3736 firefox.exe 82 PID 3736 wrote to memory of 2752 3736 firefox.exe 82 PID 3736 wrote to memory of 2752 3736 firefox.exe 82 PID 3736 wrote to memory of 2752 3736 firefox.exe 82 PID 3736 wrote to memory of 2752 3736 firefox.exe 82 PID 3736 wrote to memory of 2752 3736 firefox.exe 82 PID 3736 wrote to memory of 2752 3736 firefox.exe 82 PID 3736 wrote to memory of 2752 3736 firefox.exe 82 PID 3736 wrote to memory of 2752 3736 firefox.exe 82 PID 3736 wrote to memory of 2752 3736 firefox.exe 82 PID 3736 wrote to memory of 2752 3736 firefox.exe 82 PID 3736 wrote to memory of 2752 3736 firefox.exe 82 PID 3736 wrote to memory of 2752 3736 firefox.exe 82 PID 3736 wrote to memory of 2752 3736 firefox.exe 82 PID 3736 wrote to memory of 2752 3736 firefox.exe 82 -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
Processes
-
C:\Windows\system32\LaunchWinApp.exe"C:\Windows\system32\LaunchWinApp.exe" "http://"1⤵PID:4664
-
C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdge.exe"C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdge.exe" -ServerName:MicrosoftEdge.AppXdnhjhccw3zf0j06tkg3jtqr00qdm0khc.mca1⤵
- Drops file in Windows directory
- Modifies registry class
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
PID:4692
-
C:\Windows\system32\browser_broker.exeC:\Windows\system32\browser_broker.exe -Embedding1⤵
- Modifies Internet Explorer settings
PID:204
-
C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe"C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe" -ServerName:ContentProcess.AppX6z3cwk4fvgady6zya12j1cw28d228a7k.mca1⤵
- Modifies registry class
- Suspicious behavior: MapViewOfSection
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:4064
-
C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe"C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe" -ServerName:ContentProcess.AppX6z3cwk4fvgady6zya12j1cw28d228a7k.mca1⤵
- Drops file in Windows directory
- Modifies Internet Explorer settings
- Modifies registry class
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
PID:4812
-
C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe"C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe" -ServerName:ContentProcess.AppX6z3cwk4fvgady6zya12j1cw28d228a7k.mca1⤵
- Drops file in Windows directory
- Modifies registry class
PID:2968
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:4212 -
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe"2⤵
- Checks processor information in registry
- Modifies registry class
- NTFS ADS
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:3736 -
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel="3736.0.294288021\657932738" -parentBuildID 20221007134813 -prefsHandle 1748 -prefMapHandle 1724 -prefsLen 20747 -prefMapSize 233444 -appDir "C:\Program Files\Mozilla Firefox\browser" - {36ab214a-e074-47bc-a362-98cf1e049f00} 3736 "\\.\pipe\gecko-crash-server-pipe.3736" 1828 242bfec2e58 gpu3⤵PID:4740
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel="3736.1.54621836\2101535661" -parentBuildID 20221007134813 -prefsHandle 2172 -prefMapHandle 2168 -prefsLen 20828 -prefMapSize 233444 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {201b2764-fe5d-496a-8e62-9997245db343} 3736 "\\.\pipe\gecko-crash-server-pipe.3736" 2184 242bfdfc558 socket3⤵PID:2752
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel="3736.2.1417033191\616195391" -childID 1 -isForBrowser -prefsHandle 2936 -prefMapHandle 2724 -prefsLen 20931 -prefMapSize 233444 -jsInitHandle 1280 -jsInitLen 246848 -a11yResourceId 64 -parentBuildID 20221007134813 -appDir "C:\Program Files\Mozilla Firefox\browser" - {5671af52-d723-431a-bf5f-6acd24794c02} 3736 "\\.\pipe\gecko-crash-server-pipe.3736" 2908 242c41cb858 tab3⤵PID:2316
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel="3736.3.1673889094\1433953760" -childID 2 -isForBrowser -prefsHandle 3400 -prefMapHandle 3396 -prefsLen 26109 -prefMapSize 233444 -jsInitHandle 1280 -jsInitLen 246848 -a11yResourceId 64 -parentBuildID 20221007134813 -appDir "C:\Program Files\Mozilla Firefox\browser" - {8c8b161b-3269-41ca-9ea1-da28d275cb14} 3736 "\\.\pipe\gecko-crash-server-pipe.3736" 3408 242adb69358 tab3⤵PID:3320
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel="3736.4.1409255149\957408179" -childID 3 -isForBrowser -prefsHandle 4320 -prefMapHandle 4304 -prefsLen 26168 -prefMapSize 233444 -jsInitHandle 1280 -jsInitLen 246848 -a11yResourceId 64 -parentBuildID 20221007134813 -appDir "C:\Program Files\Mozilla Firefox\browser" - {9a288ecd-700f-40d7-ae7e-b5e8e72516d0} 3736 "\\.\pipe\gecko-crash-server-pipe.3736" 4332 242c5caa858 tab3⤵PID:2268
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel="3736.5.571616281\1604648234" -childID 4 -isForBrowser -prefsHandle 4904 -prefMapHandle 4900 -prefsLen 26168 -prefMapSize 233444 -jsInitHandle 1280 -jsInitLen 246848 -a11yResourceId 64 -parentBuildID 20221007134813 -appDir "C:\Program Files\Mozilla Firefox\browser" - {f1d9c325-9778-4472-b858-8c28006f9177} 3736 "\\.\pipe\gecko-crash-server-pipe.3736" 4912 242c618a258 tab3⤵PID:1968
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel="3736.6.1258108020\743284378" -childID 5 -isForBrowser -prefsHandle 5048 -prefMapHandle 5052 -prefsLen 26168 -prefMapSize 233444 -jsInitHandle 1280 -jsInitLen 246848 -a11yResourceId 64 -parentBuildID 20221007134813 -appDir "C:\Program Files\Mozilla Firefox\browser" - {5f38e316-43b8-4c61-a6c2-c6f316a9ba94} 3736 "\\.\pipe\gecko-crash-server-pipe.3736" 5040 242c678f558 tab3⤵PID:1604
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel="3736.7.1343754103\74214877" -childID 6 -isForBrowser -prefsHandle 5192 -prefMapHandle 5196 -prefsLen 26168 -prefMapSize 233444 -jsInitHandle 1280 -jsInitLen 246848 -a11yResourceId 64 -parentBuildID 20221007134813 -appDir "C:\Program Files\Mozilla Firefox\browser" - {06f82393-7904-4e34-a1d7-25a23f7e3e7c} 3736 "\\.\pipe\gecko-crash-server-pipe.3736" 5184 242c678fb58 tab3⤵PID:3716
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel="3736.8.927407507\1729719350" -childID 7 -isForBrowser -prefsHandle 5420 -prefMapHandle 5596 -prefsLen 26249 -prefMapSize 233444 -jsInitHandle 1280 -jsInitLen 246848 -a11yResourceId 64 -parentBuildID 20221007134813 -appDir "C:\Program Files\Mozilla Firefox\browser" - {9621fe5a-ad27-4e9d-882a-2c698d9d5ec5} 3736 "\\.\pipe\gecko-crash-server-pipe.3736" 5628 242c672d558 tab3⤵PID:4892
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel="3736.9.180957152\382600649" -childID 8 -isForBrowser -prefsHandle 5804 -prefMapHandle 4288 -prefsLen 26689 -prefMapSize 233444 -jsInitHandle 1280 -jsInitLen 246848 -a11yResourceId 64 -parentBuildID 20221007134813 -appDir "C:\Program Files\Mozilla Firefox\browser" - {06107778-8891-41c2-af23-cca99c65987b} 3736 "\\.\pipe\gecko-crash-server-pipe.3736" 5800 242c8345658 tab3⤵PID:3932
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel="3736.10.309766100\1277270721" -childID 9 -isForBrowser -prefsHandle 5464 -prefMapHandle 5476 -prefsLen 26689 -prefMapSize 233444 -jsInitHandle 1280 -jsInitLen 246848 -a11yResourceId 64 -parentBuildID 20221007134813 -appDir "C:\Program Files\Mozilla Firefox\browser" - {e88af1b2-ad09-4143-9577-b07891a1ace0} 3736 "\\.\pipe\gecko-crash-server-pipe.3736" 5472 242c8346858 tab3⤵PID:1092
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel="3736.11.1029933241\517288687" -childID 10 -isForBrowser -prefsHandle 5736 -prefMapHandle 5732 -prefsLen 26689 -prefMapSize 233444 -jsInitHandle 1280 -jsInitLen 246848 -a11yResourceId 64 -parentBuildID 20221007134813 -appDir "C:\Program Files\Mozilla Firefox\browser" - {e835fd47-23f6-4f1b-b7b0-76f00873ebed} 3736 "\\.\pipe\gecko-crash-server-pipe.3736" 5724 242c8b1aa58 tab3⤵PID:4644
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel="3736.12.1404371329\559424738" -childID 11 -isForBrowser -prefsHandle 5840 -prefMapHandle 5856 -prefsLen 26689 -prefMapSize 233444 -jsInitHandle 1280 -jsInitLen 246848 -a11yResourceId 64 -parentBuildID 20221007134813 -appDir "C:\Program Files\Mozilla Firefox\browser" - {47481b8f-9088-4505-8a9d-4588fec729fd} 3736 "\\.\pipe\gecko-crash-server-pipe.3736" 5844 242c277ee58 tab3⤵PID:1532
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel="3736.13.1754562624\1323939890" -childID 12 -isForBrowser -prefsHandle 9832 -prefMapHandle 9828 -prefsLen 26689 -prefMapSize 233444 -jsInitHandle 1280 -jsInitLen 246848 -a11yResourceId 64 -parentBuildID 20221007134813 -appDir "C:\Program Files\Mozilla Firefox\browser" - {8e256ee1-678a-44f0-8202-5a2c28df5448} 3736 "\\.\pipe\gecko-crash-server-pipe.3736" 9932 242c277e258 tab3⤵PID:3596
-
-
-
C:\Windows\System32\rundll32.exeC:\Windows\System32\rundll32.exe C:\Windows\System32\shell32.dll,SHCreateLocalServerRunDll {9aa46009-3ce0-458a-a354-715610a075e6} -Embedding1⤵PID:5620
-
C:\Users\Admin\Downloads\CheatEngine75.exe"C:\Users\Admin\Downloads\CheatEngine75.exe"1⤵
- Executes dropped EXE
PID:5692 -
C:\Users\Admin\AppData\Local\Temp\is-BLP8G.tmp\CheatEngine75.tmp"C:\Users\Admin\AppData\Local\Temp\is-BLP8G.tmp\CheatEngine75.tmp" /SL5="$402B4,29019964,780800,C:\Users\Admin\Downloads\CheatEngine75.exe"2⤵
- Executes dropped EXE
- Loads dropped DLL
- Checks for any installed AV software in registry
- Checks processor information in registry
- Suspicious behavior: EnumeratesProcesses
PID:5736
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
9KB
MD5eb31c6117e4bfd50be2824041055ca06
SHA10aa49eea4dcc53c6245aa0efc32eb5e98429c24c
SHA256231620e4127ff771c51a594c5862d18e0296374ae4a52771648d2a7d2bd1ff4f
SHA512484c55accda47ef49ec8322d7eed2d6ee535d6866d5dc3f6795d6437f8461d7f49a08b2ca9cb4379ee81d13c8707a773df5dd0fffb11318aa622436a28f40e85
-
C:\Users\Admin\AppData\Local\Mozilla\Firefox\Profiles\je1358xf.default-release\cache2\entries\E81C30F1E1133DCF9B4DCFFC191D3CFD30711B45
Filesize60KB
MD5359eff43f9c228a1a6a262b0c299bf88
SHA1c5aa9cea848f045bafe90cab9aa431ac398570b7
SHA256bc752820a33726b387e1627b3a4ff5aa3309dfde0a58f0cae051630ed9435d75
SHA512f0d91993d64efb1c61bdde5813f213b89da671e12f4ed18b6c37ec85dab6a4acf8f4ac99b05dc3dd7877a1dba75ed74e8c505653de71e98023356dcd5914e114
-
C:\Users\Admin\AppData\Local\Packages\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\AC\Temp\~DFD24C031C6C5B77C7.TMP
Filesize16KB
MD5c545ad8292b081236f6e89bce4b18e3b
SHA1955f05ec2ceed31cd6dfc25dcfb5dc71472e57bd
SHA256321ae39efd7f54013e935b69297c161b60355098aa9812a8001281f8d8349a70
SHA5122e0f213e9186a39f6bd1e6b2cdb1e1642077dd2ecb4d77d371e4ccc3842a2f6942a1f2ff32ee7711e793547aab2e4593036e664785c60d93bea987949926f7e9
-
Filesize
2.9MB
MD58d2602899890d3a9d9dbabf8f5361c3c
SHA15313c9b602af1858214f70ae2ed1f31ae17c2929
SHA25662014799dc68f92bea98dd83bbda38b8c1eaa661b23518afb4eb617d02a9ab67
SHA512912d8cf3d0d6d15578077406db503dd469c966d70953cc38d7465b818a6a34760d649f7239f6e45ebed8efb913699d38c1517da5389c837e00b9b021aa37fead
-
Filesize
74KB
MD5cd09f361286d1ad2622ba8a57b7613bd
SHA14cd3e5d4063b3517a950b9d030841f51f3c5f1b1
SHA256b92a31d4853d1b2c4e5b9d9624f40b439856d0c6a517e100978cbde8d3c47dc8
SHA512f73d60c92644e0478107e0402d1c7b4dfa1674f69b41856f74f937a7b57ceaa2b3be9242f2b59f1fcf71063aac6cbe16c594618d1a8cdd181510de3240f31dff
-
Filesize
246KB
MD5f3d1b8cd125a67bafe54b8f31dda1ccd
SHA11c6b6bf1e785ad80fc7e9131a1d7acbba88e8303
SHA25621dfa1ff331794fcb921695134a3ba1174d03ee7f1e3d69f4b1a3581fccd2cdf
SHA512c57d36daa20b1827b2f8f9f98c9fd4696579de0de43f9bbeef63a544561a5f50648cc69220d9e8049164df97cb4b2176963089e14d58a6369d490d8c04354401
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\je1358xf.default-release\datareporting\glean\db\data.safe.bin
Filesize2KB
MD5a760db5b531d2cb6bce1d771f6a3c7f6
SHA1952af7268a44370e49f1e6820add8c84f535711d
SHA256dd4fbf39573db9ab6681e4b6ef29f1db3e0739894d3ddea2dadbabee11cb853f
SHA51219b27196969b1b43d5e94aa0745981d88211ad7f1d040ec645c55b75b66b00efa34703fa7c06d4ccff0f2a0fd7cfc925d5eee48b6ddd76eb2d27d9ac841e519c
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\je1358xf.default-release\datareporting\glean\pending_pings\5ee61b90-69d5-4ab8-8f2b-4a59a274ac7f
Filesize11KB
MD5105bfdaa8c1755457e06792032a4cd8b
SHA1e602efdac146f4dbe1855a4e07453cf1642d2650
SHA2563d1eac3c03001cf6058519ac01aed15ecad3c27e09b717bd4c6384a49f9b8bf9
SHA51275374d977ccd9bdff16b8dbf143d8923ed0f8f2c82e4c10d676aaec19c2a7f460f75cd220d724dc2b019f0f399c094fe79197378e573ddf363112f6e8ac9188f
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\je1358xf.default-release\datareporting\glean\pending_pings\d9543bdf-a79f-47e6-baa3-8b33e344e2e7
Filesize746B
MD5028a6c81b676c46174af64763ea41e0a
SHA121301c3690bdf481779983255f62978a41339705
SHA256b797cb8dd53193402e36f77cde7e8f8f8f96d0caa8ac3c891c76065e29127728
SHA5129a4c7a282052a2a23f47828e610824bef866c484f404a1f77a1a6f89e531548e396537cffd9df90198227985e632d2cdc112dfe9487b9c76fa9d341c876b8273
-
Filesize
6KB
MD526892d5a5ea0a6477fdd52d327085c6a
SHA135ee3b921e900215b2e1f2d1b2c5d41fe0a31127
SHA25636a7f00a8e4e6219d98c6217b344d048305e4bea839b19f0c51e0b3a44a7761a
SHA5121a7bcefd21203140a843005811564125854857f2a81a96886efb85663b901938cdc077282cded2085db1d081f436df758cab6bd9416ca3156c1f76616a94c0e0
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\je1358xf.default-release\sessionstore-backups\recovery.jsonlz4
Filesize3KB
MD556d996569173bded7649e220121868df
SHA11fab954703eb2cbfeecf94b23aadfa799d3af007
SHA256d109656c2c1202325cc383536f5ebade7565f06996d72670250deadd54ed44fe
SHA512e8e9e5dac105a5856dda5e002877d9d709e682f94946fb957864206f3cf56fe5b33222305e4e9bc89aa5f61982dc89a905c8c677ce95565ae60b0d21c27f0c2c
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\je1358xf.default-release\sessionstore-backups\recovery.jsonlz4
Filesize4KB
MD5ef394aeca737a1dbf960b43d3452c482
SHA145a97903c3340e8de6907a4701a67d9fc82f4613
SHA256c980a97ac965f53aeb6e88a690d9ae9a46fbc9a4960a1333068789f15d49dce8
SHA51288d9b2b99a18e15584751cbe5c7ddb3a44dc0d10debaf2761836440b8fd54b7cbfce8216236ff6a74680385e8293fd8e4672cdf5443210e3cd432eace3b96076
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\je1358xf.default-release\sessionstore-backups\recovery.jsonlz4
Filesize6KB
MD55e8ba594f49dfb1b994437b11f250e12
SHA10ad509109f2efcfe944ef1056a9a10a7c787a434
SHA25677bc6ac18705e24f336c187f26a62ce6fceff2008b49d915371038dc99e16187
SHA51205e4060e6e8430ca8bdb5af94cbe88f677e7505e83bf01ab7937e46b26b58e4ea6b9b4607525adb8e18b6e778bc5959d8d4fdebd1193764591c09c4bcdc07e1c
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\je1358xf.default-release\sessionstore-backups\recovery.jsonlz4
Filesize38KB
MD5aa06a6befe6dd5e15bb8c8f8f7b69961
SHA1f24f9f629123b907c8ca44f8f7fc0f9769bdaa89
SHA256704b70fe2a4e3129b927e3d3cc1ff354fdb9ce3af12389bcbe584b4259bf11ed
SHA51213b6babeb9f47f7dafe5f58f0c022c69b4a924b88f004cef837a3b872619ba767a6023d356ecbebd5b5a982bda8daf3fd81ddabd8a1cc5e51278c9d9c4a1f114
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\je1358xf.default-release\sessionstore-backups\recovery.jsonlz4
Filesize4KB
MD5362f619130e8021006d6e637e745af8a
SHA1e782634a3907d3d094b4a600425e61fb0d3cd0c1
SHA25649851266870c0f7ce4a670501c76d430deafa06596e78368cc1120db2185c535
SHA512ef383ae2aec94a051f0e283700bdfd96feadce1fdd4deab33e60fc88e7bbe43153e8a3d231b2fe55952c45ee72db5b02f5988ddb0978900a98654d6df85e84b0
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\je1358xf.default-release\sessionstore-backups\recovery.jsonlz4
Filesize4KB
MD52a80cb4fc918040a018d633ec0b80308
SHA1c28bbb4e18f03ce295370dc2c874cf4efd321a47
SHA2561761c12c6fc5d128efdcc99d90eb43a3fd87169cba93ff4549ec8cf1096a8eaa
SHA5120e04e5f3f01900a7da82a8b1ed5930b6157d5f6d96c298b11a0edce4495c5e0019f2124117c676e8f98656ae837465270e872a94674b15f1b79fe256c24e80f2
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\je1358xf.default-release\sessionstore-backups\recovery.jsonlz4
Filesize37KB
MD585c2dc49d1bae5cc1f264cb7d029526d
SHA136ee267ae2a15fee0bdacdb87a7293b64722a0d2
SHA2568136c9d04fb4c600d2580679544e184ff29a3a015892de0af3acfee5604c2ebe
SHA512b680987a1f543572563765ca753204d08d4e297b235b84dd9e3e99cbf7b94c0f3cb534dc14d4e5da36825eb23494e5cea46b77201356d7a41a2d75c44015f792
-
Filesize
13KB
MD5715191051f8d091649c1bcdeb3bff1b6
SHA1ec735cd0087d1b450e4927c10d8f7ea3570a0627
SHA256f1cc8ed41be71ab70612b270e0f78bacdf60ad456e9992fa7b8af0ee120da817
SHA512e82b11f18008ffdaa56670dba691eaed9be4f087e55008741ab732d139feeb23dde4f047c99a112046b50e37abfe037f8012b28f3f60628cadccb961ff937a49
-
Filesize
28.5MB
MD51e2b14c4f25f109717f8cab97a050bf6
SHA1188cabf0640e0203fd9c2612586b78ce173f4fd7
SHA2562cd9a8ef0b8cb972210c0ff94c510034435771420cf404d8db55ab2d1083299f
SHA5122783e9c4254b04ba35114b673a62d48b720dab2cbd1e2419bc69581d40112a0a7c20531aa47e78d56f1886eb337f9151d1fb969ab26999b186be33254a3c717b
-
Filesize
2.0MB
MD5b83f5833e96c2eb13f14dcca805d51a1
SHA19976b0a6ef3dabeab064b188d77d870dcdaf086d
SHA25600e667b838a4125c8cf847936168bb77bb54580bc05669330cb32c0377c4a401
SHA5128641b351e28b3c61ed6762adbca165f4a5f2ee26a023fd74dd2102a6258c0f22e91b78f4a3e9fba6094b68096001de21f10d6495f497580847103c428d30f7bb