Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Resubmissions
28/04/2024, 17:57
240428-wjzr7ade6y 528/04/2024, 17:55
240428-whkxmsde4x 728/04/2024, 17:53
240428-wgpt7sdb65 128/04/2024, 17:49
240428-wd521sdd7w 628/04/2024, 17:43
240428-wawdeadc9s 1Analysis
-
max time kernel
173s -
max time network
189s -
platform
windows10-1703_x64 -
resource
win10-20240404-en -
resource tags
arch:x64arch:x86image:win10-20240404-enlocale:en-usos:windows10-1703-x64system -
submitted
28/04/2024, 17:49
Static task
static1
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
https://mega.nz/file/vbgCjYjC#eij-04fdXqkI-45KpR26ov5_b79ZV-jVEuAErQbnw_g
Resource
win10-20240404-en
General
-
Target
https://mega.nz/file/vbgCjYjC#eij-04fdXqkI-45KpR26ov5_b79ZV-jVEuAErQbnw_g
Malware Config
Signatures
-
Writes to the Master Boot Record (MBR) 1 TTPs 1 IoCs
Bootkits write to the MBR to gain persistence at a level below the operating system.
description ioc Process File opened for modification \??\PhysicalDrive0 MEMZ-Destructive.exe -
Drops file in Windows directory 9 IoCs
description ioc Process File created C:\Windows\rescache\_merged\3720402701\1568373884.pri MicrosoftEdgeCP.exe File opened for modification C:\Windows\Debug\ESE.TXT MicrosoftEdge.exe File created C:\Windows\rescache\_merged\3720402701\1568373884.pri MicrosoftEdge.exe File created C:\Windows\rescache\_merged\3720402701\1568373884.pri MicrosoftEdgeCP.exe File opened for modification C:\Windows\Debug\ESE.TXT MicrosoftEdge.exe File created C:\Windows\rescache\_merged\3720402701\1568373884.pri MicrosoftEdge.exe File created C:\Windows\rescache\_merged\3720402701\1568373884.pri MicrosoftEdgeCP.exe File created C:\Windows\rescache\_merged\3720402701\1568373884.pri MicrosoftEdgeCP.exe File created C:\Windows\rescache\_merged\3720402701\1568373884.pri MicrosoftEdgeCP.exe -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-1739856679-3467441365-73334005-1000\Software\Microsoft\Internet Explorer\Main MicrosoftEdgeCP.exe Key created \REGISTRY\USER\S-1-5-21-1739856679-3467441365-73334005-1000\Software\Microsoft\Internet Explorer\Main browser_broker.exe -
Modifies registry class 64 IoCs
description ioc Process Set value (data) \REGISTRY\USER\S-1-5-21-1739856679-3467441365-73334005-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\Internet Settings\Zones\3\{AEBA21FA-782A-4A90-978D-B72164C = 1a3761592352350c7a5f20172f1e1a190e2b017313371312141a152a MicrosoftEdge.exe Set value (data) \REGISTRY\USER\S-1-5-21-1739856679-3467441365-73334005-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\Children\006\ACGStatus\DynamicCodePolicy = 00000000 MicrosoftEdgeCP.exe Set value (str) \REGISTRY\USER\S-1-5-21-1739856679-3467441365-73334005-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\GPU\AdapterInfo = "vendorId=\"0x1414\",deviceID=\"0x8c\",subSysID=\"0x0\",revision=\"0x0\",version=\"10.0.15063.0\"hypervisor=\"No Hypervisor (No SLAT)\"" MicrosoftEdgeCP.exe Key created \REGISTRY\USER\S-1-5-21-1739856679-3467441365-73334005-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\Children\001\Internet Explorer\Main MicrosoftEdgeCP.exe Set value (int) \REGISTRY\USER\S-1-5-21-1739856679-3467441365-73334005-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\FavOrder\TreeView = "1" MicrosoftEdge.exe Set value (str) \REGISTRY\USER\S-1-5-21-1739856679-3467441365-73334005-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\Internet Settings\Cache\Content\CachePrefix MicrosoftEdge.exe Set value (data) \REGISTRY\USER\S-1-5-21-1739856679-3467441365-73334005-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\Children\002\CIStatus\SignaturePolicy = 06000000 MicrosoftEdgeCP.exe Key created \REGISTRY\USER\S-1-5-21-1739856679-3467441365-73334005-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\Children\002\Internet Explorer\EdpDomStorage\www.bing.com MicrosoftEdgeCP.exe Set value (int) \REGISTRY\USER\S-1-5-21-1739856679-3467441365-73334005-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\Children\002\Internet Explorer\DOMStorage\bing.com\Total = "651" MicrosoftEdgeCP.exe Key created \REGISTRY\USER\S-1-5-21-1739856679-3467441365-73334005-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\Children\121\ACGStatus MicrosoftEdgeCP.exe Set value (int) \REGISTRY\USER\S-1-5-21-1739856679-3467441365-73334005-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\Children\121\Internet Settings\Cache\History\CacheLimit = "1" MicrosoftEdgeCP.exe Key created \REGISTRY\USER\S-1-5-21-1739856679-3467441365-73334005-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\ExtensionsStore MicrosoftEdge.exe Set value (int) \REGISTRY\USER\S-1-5-21-1739856679-3467441365-73334005-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppModel\SystemAppData\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\PersistedStorageItemTable\System\{976608D7-C102-43FC-AA30-314738EAC258 = "0" browser_broker.exe Key created \REGISTRY\USER\S-1-5-21-1739856679-3467441365-73334005-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\FavOrder MicrosoftEdge.exe Set value (int) \REGISTRY\USER\S-1-5-21-1739856679-3467441365-73334005-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\Children\001\ACGStatus\ACGPolicyState = "8" MicrosoftEdgeCP.exe Set value (data) \REGISTRY\USER\S-1-5-21-1739856679-3467441365-73334005-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\CIStatus\CIStatusTimestamp = 035a1f7c9499da01 MicrosoftEdge.exe Set value (int) \REGISTRY\USER\S-1-5-21-1739856679-3467441365-73334005-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\FavOrder\SyncIEFirstTimeFullScan = "1" MicrosoftEdge.exe Key created \REGISTRY\USER\S-1-5-21-1739856679-3467441365-73334005-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\Children\001\ACGStatus MicrosoftEdgeCP.exe Set value (str) \REGISTRY\USER\S-1-5-21-1739856679-3467441365-73334005-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\GPU\AdapterInfo = "vendorId=\"0x1414\",deviceID=\"0x8c\",subSysID=\"0x0\",revision=\"0x0\",version=\"10.0.15063.0\"hypervisor=\"No Hypervisor (No SLAT)\"" MicrosoftEdgeCP.exe Key created \REGISTRY\USER\S-1-5-21-1739856679-3467441365-73334005-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\Children\004\Internet Settings MicrosoftEdgeCP.exe Key created \REGISTRY\USER\S-1-5-21-1739856679-3467441365-73334005-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\Children\002\ACGStatus MicrosoftEdgeCP.exe Set value (str) \REGISTRY\USER\S-1-5-21-1739856679-3467441365-73334005-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\Children\002\Internet Settings\Cache\Cookies\CachePrefix = "Cookie:" MicrosoftEdgeCP.exe Key created \REGISTRY\USER\S-1-5-21-1739856679-3467441365-73334005-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\Children\001\Internet Explorer\DomStorageState MicrosoftEdgeCP.exe Set value (int) \REGISTRY\USER\S-1-5-21-1739856679-3467441365-73334005-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\Children\002\Internet Explorer\DOMStorage\www.bing.com\ = "132" MicrosoftEdgeCP.exe Key created \REGISTRY\USER\S-1-5-21-1739856679-3467441365-73334005-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\Children\121\Internet Settings\Cache\History MicrosoftEdgeCP.exe Set value (int) \REGISTRY\USER\S-1-5-21-1739856679-3467441365-73334005-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\GPU\Revision = "0" MicrosoftEdge.exe Set value (int) \REGISTRY\USER\S-1-5-21-1739856679-3467441365-73334005-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\Children\001\Internet Explorer\DOMStorage\mega.nz\ = "65" MicrosoftEdgeCP.exe Key created \REGISTRY\USER\S-1-5-21-1739856679-3467441365-73334005-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\Children\002\Internet Explorer\EdpDomStorage\bing.com MicrosoftEdgeCP.exe Set value (int) \REGISTRY\USER\S-1-5-21-1739856679-3467441365-73334005-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\Children\002\Internet Explorer\DOMStorage\www.bing.com\ = "651" MicrosoftEdgeCP.exe Set value (str) \REGISTRY\USER\S-1-5-21-1739856679-3467441365-73334005-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\Children\121\Internet Settings\Cache\History\CachePrefix = "Visited:" MicrosoftEdgeCP.exe Key created \REGISTRY\USER\S-1-5-21-1739856679-3467441365-73334005-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\Children\001\Internet Explorer\EdpDomStorage\s28667145.weebly.com MicrosoftEdgeCP.exe Key created \REGISTRY\USER\S-1-5-21-1739856679-3467441365-73334005-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppModel\SystemAppData\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\PersistedStorageItemTable browser_broker.exe Key created \REGISTRY\USER\S-1-5-21-1739856679-3467441365-73334005-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\Internet Explorer\Main MicrosoftEdge.exe Set value (int) \REGISTRY\USER\S-1-5-21-1739856679-3467441365-73334005-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\Children\004\Internet Explorer\Main\OperationalData = "1" MicrosoftEdgeCP.exe Set value (data) \REGISTRY\USER\S-1-5-21-1739856679-3467441365-73334005-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\CIStatus\CIStatusTimestamp = 483a76779499da01 MicrosoftEdge.exe Set value (int) \REGISTRY\USER\S-1-5-21-1739856679-3467441365-73334005-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\Children\002\Internet Explorer\DOMStorage\bing.com\ = "0" MicrosoftEdgeCP.exe Set value (int) \REGISTRY\USER\S-1-5-21-1739856679-3467441365-73334005-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\Children\002\Internet Explorer\DOMStorage\Total\ = "643" MicrosoftEdgeCP.exe Set value (data) \REGISTRY\USER\S-1-5-21-1739856679-3467441365-73334005-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\Children\121\ACGStatus\DynamicCodePolicy = 05000000 MicrosoftEdgeCP.exe Key created \REGISTRY\USER\S-1-5-21-1739856679-3467441365-73334005-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\TabbedBrowsing\NewTabPage MicrosoftEdge.exe Set value (int) \REGISTRY\USER\S-1-5-21-1739856679-3467441365-73334005-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\Rating\Rating Prompt Shown = "0" MicrosoftEdge.exe Key created \REGISTRY\USER\S-1-5-21-1739856679-3467441365-73334005-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\Protected - It is a violation of Windows Policy to modify. MicrosoftEdge.exe Key created \REGISTRY\USER\S-1-5-21-1739856679-3467441365-73334005-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\Internet Settings MicrosoftEdge.exe Set value (int) \REGISTRY\USER\S-1-5-21-1739856679-3467441365-73334005-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\ServiceUI\IsSignedIn = "0" MicrosoftEdge.exe Set value (data) \REGISTRY\USER\S-1-5-21-1739856679-3467441365-73334005-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\Children\001\CIStatus\SignaturePolicy = 06000000 MicrosoftEdgeCP.exe Set value (data) \REGISTRY\USER\S-1-5-21-1739856679-3467441365-73334005-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\CIStatus\CIStatusTimestamp = 6bb42e779499da01 MicrosoftEdge.exe Set value (str) \REGISTRY\USER\S-1-5-21-1739856679-3467441365-73334005-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\Children\002\Internet Settings\Cache\History\CachePrefix = "Visited:" MicrosoftEdgeCP.exe Key created \REGISTRY\USER\S-1-5-21-1739856679-3467441365-73334005-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\Children\002\Internet Explorer\EdpDomStorage\Total MicrosoftEdgeCP.exe Set value (int) \REGISTRY\USER\S-1-5-21-1739856679-3467441365-73334005-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\DummyPath\dummySetting = "1" MicrosoftEdge.exe Set value (data) \REGISTRY\USER\S-1-5-21-1739856679-3467441365-73334005-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\DataStore\LastCleanup = 9c773c7e9499da01 MicrosoftEdge.exe Set value (int) \REGISTRY\USER\S-1-5-21-1739856679-3467441365-73334005-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\Children\001\Internet Explorer\DOMStorage\weebly.com\Total = "1906" MicrosoftEdgeCP.exe Key created \REGISTRY\USER\S-1-5-21-1739856679-3467441365-73334005-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\Children\006\ACGStatus MicrosoftEdgeCP.exe Set value (int) \REGISTRY\USER\S-1-5-21-1739856679-3467441365-73334005-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\Children\006\ACGStatus\ACGPolicyState = "6" MicrosoftEdgeCP.exe Key created \REGISTRY\USER\S-1-5-21-1739856679-3467441365-73334005-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\Children\004\Internet Explorer MicrosoftEdgeCP.exe Set value (int) \REGISTRY\USER\S-1-5-21-1739856679-3467441365-73334005-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\Children\002\Internet Explorer\DOMStorage\bing.com\Total = "0" MicrosoftEdgeCP.exe Key created \REGISTRY\USER\S-1-5-21-1739856679-3467441365-73334005-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\Children\001\CIStatus MicrosoftEdgeCP.exe Key created \REGISTRY\USER\S-1-5-21-1739856679-3467441365-73334005-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\HistoryJournalCertificate MicrosoftEdgeCP.exe Key created \REGISTRY\USER\S-1-5-21-1739856679-3467441365-73334005-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\ExtensionsStore MicrosoftEdge.exe Set value (int) \REGISTRY\USER\S-1-5-21-1739856679-3467441365-73334005-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\Main\JumpListFirstRun = "3" MicrosoftEdge.exe Set value (int) \REGISTRY\USER\S-1-5-21-1739856679-3467441365-73334005-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\BrowserEmulation\IECompatVersionLow = "395205405" MicrosoftEdge.exe Key created \REGISTRY\USER\S-1-5-21-1739856679-3467441365-73334005-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\Recovery\Active MicrosoftEdge.exe Set value (int) \REGISTRY\USER\S-1-5-21-1739856679-3467441365-73334005-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\Internet Settings\PrivacyAdvanced = "0" MicrosoftEdge.exe Set value (int) \REGISTRY\USER\S-1-5-21-1739856679-3467441365-73334005-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\GPU\VersionLow = "0" MicrosoftEdge.exe Set value (int) \REGISTRY\USER\S-1-5-21-1739856679-3467441365-73334005-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\Children\002\Internet Explorer\DOMStorage\bing.com\NumberOfSubdomains = "1" MicrosoftEdgeCP.exe Set value (int) \REGISTRY\USER\S-1-5-21-1739856679-3467441365-73334005-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\Children\001\CIStatus\CIPolicyState = "0" MicrosoftEdgeCP.exe -
NTFS ADS 1 IoCs
description ioc Process File opened for modification C:\Users\Admin\Downloads\memz-master.zip.jwrtxtv.partial:Zone.Identifier browser_broker.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 4852 MEMZ-Destructive.exe 4852 MEMZ-Destructive.exe 1828 MEMZ-Destructive.exe 1828 MEMZ-Destructive.exe 1828 MEMZ-Destructive.exe 1828 MEMZ-Destructive.exe 2060 MEMZ-Destructive.exe 2060 MEMZ-Destructive.exe 4852 MEMZ-Destructive.exe 4852 MEMZ-Destructive.exe 2060 MEMZ-Destructive.exe 2060 MEMZ-Destructive.exe 1828 MEMZ-Destructive.exe 1828 MEMZ-Destructive.exe 1996 MEMZ-Destructive.exe 1996 MEMZ-Destructive.exe 5860 MEMZ-Destructive.exe 4852 MEMZ-Destructive.exe 5860 MEMZ-Destructive.exe 4852 MEMZ-Destructive.exe 4852 MEMZ-Destructive.exe 4852 MEMZ-Destructive.exe 1996 MEMZ-Destructive.exe 1996 MEMZ-Destructive.exe 1828 MEMZ-Destructive.exe 2060 MEMZ-Destructive.exe 1828 MEMZ-Destructive.exe 2060 MEMZ-Destructive.exe 4852 MEMZ-Destructive.exe 4852 MEMZ-Destructive.exe 4852 MEMZ-Destructive.exe 4852 MEMZ-Destructive.exe 1828 MEMZ-Destructive.exe 1828 MEMZ-Destructive.exe 2060 MEMZ-Destructive.exe 2060 MEMZ-Destructive.exe 1996 MEMZ-Destructive.exe 1996 MEMZ-Destructive.exe 5860 MEMZ-Destructive.exe 5860 MEMZ-Destructive.exe 5860 MEMZ-Destructive.exe 1996 MEMZ-Destructive.exe 1996 MEMZ-Destructive.exe 5860 MEMZ-Destructive.exe 2060 MEMZ-Destructive.exe 2060 MEMZ-Destructive.exe 1828 MEMZ-Destructive.exe 1828 MEMZ-Destructive.exe 4852 MEMZ-Destructive.exe 4852 MEMZ-Destructive.exe 1996 MEMZ-Destructive.exe 5860 MEMZ-Destructive.exe 5860 MEMZ-Destructive.exe 1996 MEMZ-Destructive.exe 4852 MEMZ-Destructive.exe 1828 MEMZ-Destructive.exe 4852 MEMZ-Destructive.exe 1828 MEMZ-Destructive.exe 2060 MEMZ-Destructive.exe 2060 MEMZ-Destructive.exe 1996 MEMZ-Destructive.exe 5860 MEMZ-Destructive.exe 5860 MEMZ-Destructive.exe 1996 MEMZ-Destructive.exe -
Suspicious behavior: MapViewOfSection 11 IoCs
pid Process 5068 MicrosoftEdgeCP.exe 5068 MicrosoftEdgeCP.exe 5068 MicrosoftEdgeCP.exe 5068 MicrosoftEdgeCP.exe 5068 MicrosoftEdgeCP.exe 5068 MicrosoftEdgeCP.exe 5068 MicrosoftEdgeCP.exe 5068 MicrosoftEdgeCP.exe 5068 MicrosoftEdgeCP.exe 5068 MicrosoftEdgeCP.exe 5068 MicrosoftEdgeCP.exe -
Suspicious use of AdjustPrivilegeToken 8 IoCs
description pid Process Token: SeDebugPrivilege 2880 MicrosoftEdgeCP.exe Token: SeDebugPrivilege 2880 MicrosoftEdgeCP.exe Token: SeDebugPrivilege 2880 MicrosoftEdgeCP.exe Token: SeDebugPrivilege 2880 MicrosoftEdgeCP.exe Token: SeDebugPrivilege 2380 MicrosoftEdgeCP.exe Token: SeDebugPrivilege 2380 MicrosoftEdgeCP.exe Token: SeDebugPrivilege 3432 MicrosoftEdge.exe Token: SeDebugPrivilege 3432 MicrosoftEdge.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 4688 notepad.exe -
Suspicious use of SetWindowsHookEx 27 IoCs
pid Process 3432 MicrosoftEdge.exe 5068 MicrosoftEdgeCP.exe 2880 MicrosoftEdgeCP.exe 5068 MicrosoftEdgeCP.exe 3284 MicrosoftEdgeCP.exe 5552 MEMZ-Destructive.exe 6060 MEMZ-Destructive.exe 4852 MEMZ-Destructive.exe 1828 MEMZ-Destructive.exe 2060 MEMZ-Destructive.exe 5860 MEMZ-Destructive.exe 1996 MEMZ-Destructive.exe 3492 MEMZ-Destructive.exe 2168 MEMZ-Destructive.exe 5172 MEMZ-Destructive.exe 6036 MEMZ-Destructive.exe 2644 MEMZ-Destructive.exe 6120 MEMZ-Destructive.exe 5828 MEMZ-Destructive.exe 4468 MEMZ-Destructive.exe 5816 MicrosoftEdge.exe 5364 MicrosoftEdgeCP.exe 5364 MicrosoftEdgeCP.exe 2392 OpenWith.exe 5620 MEMZ-Destructive.exe 3960 MEMZ-Destructive.exe 4664 OpenWith.exe -
Suspicious use of WriteProcessMemory 61 IoCs
description pid Process procid_target PID 5068 wrote to memory of 2772 5068 MicrosoftEdgeCP.exe 77 PID 5068 wrote to memory of 2772 5068 MicrosoftEdgeCP.exe 77 PID 5068 wrote to memory of 2772 5068 MicrosoftEdgeCP.exe 77 PID 5068 wrote to memory of 2772 5068 MicrosoftEdgeCP.exe 77 PID 5068 wrote to memory of 2772 5068 MicrosoftEdgeCP.exe 77 PID 5068 wrote to memory of 2772 5068 MicrosoftEdgeCP.exe 77 PID 5068 wrote to memory of 2772 5068 MicrosoftEdgeCP.exe 77 PID 5068 wrote to memory of 2772 5068 MicrosoftEdgeCP.exe 77 PID 5068 wrote to memory of 2772 5068 MicrosoftEdgeCP.exe 77 PID 5068 wrote to memory of 2772 5068 MicrosoftEdgeCP.exe 77 PID 5068 wrote to memory of 2772 5068 MicrosoftEdgeCP.exe 77 PID 5068 wrote to memory of 2772 5068 MicrosoftEdgeCP.exe 77 PID 5068 wrote to memory of 2772 5068 MicrosoftEdgeCP.exe 77 PID 5068 wrote to memory of 2772 5068 MicrosoftEdgeCP.exe 77 PID 5068 wrote to memory of 2772 5068 MicrosoftEdgeCP.exe 77 PID 5068 wrote to memory of 2772 5068 MicrosoftEdgeCP.exe 77 PID 5068 wrote to memory of 2772 5068 MicrosoftEdgeCP.exe 77 PID 5068 wrote to memory of 2772 5068 MicrosoftEdgeCP.exe 77 PID 5068 wrote to memory of 2772 5068 MicrosoftEdgeCP.exe 77 PID 5068 wrote to memory of 2772 5068 MicrosoftEdgeCP.exe 77 PID 5068 wrote to memory of 2772 5068 MicrosoftEdgeCP.exe 77 PID 5068 wrote to memory of 2772 5068 MicrosoftEdgeCP.exe 77 PID 5068 wrote to memory of 3760 5068 MicrosoftEdgeCP.exe 80 PID 5068 wrote to memory of 3760 5068 MicrosoftEdgeCP.exe 80 PID 5068 wrote to memory of 3760 5068 MicrosoftEdgeCP.exe 80 PID 5068 wrote to memory of 540 5068 MicrosoftEdgeCP.exe 82 PID 5068 wrote to memory of 540 5068 MicrosoftEdgeCP.exe 82 PID 5068 wrote to memory of 540 5068 MicrosoftEdgeCP.exe 82 PID 5068 wrote to memory of 540 5068 MicrosoftEdgeCP.exe 82 PID 5068 wrote to memory of 540 5068 MicrosoftEdgeCP.exe 82 PID 5068 wrote to memory of 540 5068 MicrosoftEdgeCP.exe 82 PID 5068 wrote to memory of 540 5068 MicrosoftEdgeCP.exe 82 PID 5068 wrote to memory of 540 5068 MicrosoftEdgeCP.exe 82 PID 5068 wrote to memory of 540 5068 MicrosoftEdgeCP.exe 82 PID 5068 wrote to memory of 540 5068 MicrosoftEdgeCP.exe 82 PID 5068 wrote to memory of 540 5068 MicrosoftEdgeCP.exe 82 PID 5068 wrote to memory of 540 5068 MicrosoftEdgeCP.exe 82 PID 5068 wrote to memory of 540 5068 MicrosoftEdgeCP.exe 82 PID 5068 wrote to memory of 540 5068 MicrosoftEdgeCP.exe 82 PID 5068 wrote to memory of 540 5068 MicrosoftEdgeCP.exe 82 PID 6060 wrote to memory of 4852 6060 MEMZ-Destructive.exe 90 PID 6060 wrote to memory of 4852 6060 MEMZ-Destructive.exe 90 PID 6060 wrote to memory of 4852 6060 MEMZ-Destructive.exe 90 PID 6060 wrote to memory of 1828 6060 MEMZ-Destructive.exe 91 PID 6060 wrote to memory of 1828 6060 MEMZ-Destructive.exe 91 PID 6060 wrote to memory of 1828 6060 MEMZ-Destructive.exe 91 PID 6060 wrote to memory of 2060 6060 MEMZ-Destructive.exe 92 PID 6060 wrote to memory of 2060 6060 MEMZ-Destructive.exe 92 PID 6060 wrote to memory of 2060 6060 MEMZ-Destructive.exe 92 PID 6060 wrote to memory of 5860 6060 MEMZ-Destructive.exe 93 PID 6060 wrote to memory of 5860 6060 MEMZ-Destructive.exe 93 PID 6060 wrote to memory of 5860 6060 MEMZ-Destructive.exe 93 PID 6060 wrote to memory of 1996 6060 MEMZ-Destructive.exe 94 PID 6060 wrote to memory of 1996 6060 MEMZ-Destructive.exe 94 PID 6060 wrote to memory of 1996 6060 MEMZ-Destructive.exe 94 PID 6060 wrote to memory of 3492 6060 MEMZ-Destructive.exe 95 PID 6060 wrote to memory of 3492 6060 MEMZ-Destructive.exe 95 PID 6060 wrote to memory of 3492 6060 MEMZ-Destructive.exe 95 PID 3492 wrote to memory of 4688 3492 MEMZ-Destructive.exe 96 PID 3492 wrote to memory of 4688 3492 MEMZ-Destructive.exe 96 PID 3492 wrote to memory of 4688 3492 MEMZ-Destructive.exe 96 -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
-
Uses Volume Shadow Copy WMI provider
The Volume Shadow Copy service is used to manage backups/snapshots.
-
Uses Volume Shadow Copy service COM API
The Volume Shadow Copy service is used to manage backups/snapshots.
Processes
-
C:\Windows\system32\LaunchWinApp.exe"C:\Windows\system32\LaunchWinApp.exe" "https://mega.nz/file/vbgCjYjC#eij-04fdXqkI-45KpR26ov5_b79ZV-jVEuAErQbnw_g"1⤵PID:2456
-
C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdge.exe"C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdge.exe" -ServerName:MicrosoftEdge.AppXdnhjhccw3zf0j06tkg3jtqr00qdm0khc.mca1⤵
- Drops file in Windows directory
- Modifies registry class
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
PID:3432
-
C:\Windows\system32\browser_broker.exeC:\Windows\system32\browser_broker.exe -Embedding1⤵
- Modifies Internet Explorer settings
- Modifies registry class
- NTFS ADS
PID:2088
-
C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe"C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe" -ServerName:ContentProcess.AppX6z3cwk4fvgady6zya12j1cw28d228a7k.mca1⤵
- Modifies registry class
- Suspicious behavior: MapViewOfSection
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:5068
-
C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe"C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe" -ServerName:ContentProcess.AppX6z3cwk4fvgady6zya12j1cw28d228a7k.mca1⤵
- Drops file in Windows directory
- Modifies Internet Explorer settings
- Modifies registry class
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
PID:2880
-
C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe"C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe" -ServerName:ContentProcess.AppX6z3cwk4fvgady6zya12j1cw28d228a7k.mca1⤵
- Drops file in Windows directory
- Modifies registry class
PID:2772
-
C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe"C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe" -ServerName:ContentProcess.AppX6z3cwk4fvgady6zya12j1cw28d228a7k.mca1⤵
- Modifies registry class
- Suspicious use of SetWindowsHookEx
PID:3284
-
C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe"C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe" -ServerName:ContentProcess.AppX6z3cwk4fvgady6zya12j1cw28d228a7k.mca1⤵
- Drops file in Windows directory
- Modifies registry class
PID:3760
-
C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe"C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe" -ServerName:ContentProcess.AppX6z3cwk4fvgady6zya12j1cw28d228a7k.mca1⤵
- Modifies registry class
- Suspicious use of AdjustPrivilegeToken
PID:2380
-
C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe"C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe" -ServerName:ContentProcess.AppX6z3cwk4fvgady6zya12j1cw28d228a7k.mca1⤵
- Drops file in Windows directory
- Modifies registry class
PID:540
-
C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe"C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe" -ServerName:ContentProcess.AppX6z3cwk4fvgady6zya12j1cw28d228a7k.mca1⤵PID:2948
-
C:\Windows\System32\rundll32.exeC:\Windows\System32\rundll32.exe C:\Windows\System32\shell32.dll,SHCreateLocalServerRunDll {9aa46009-3ce0-458a-a354-715610a075e6} -Embedding1⤵PID:5840
-
C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe"C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe" -ServerName:ContentProcess.AppX6z3cwk4fvgady6zya12j1cw28d228a7k.mca1⤵
- Modifies registry class
PID:5884
-
C:\Users\Admin\Downloads\memz-master\MEMZ-master\MEMZ-Destructive.exe"C:\Users\Admin\Downloads\memz-master\MEMZ-master\MEMZ-Destructive.exe"1⤵
- Suspicious use of SetWindowsHookEx
PID:5552
-
C:\Users\Admin\Downloads\memz-master\MEMZ-master\MEMZ-Clean.exe"C:\Users\Admin\Downloads\memz-master\MEMZ-master\MEMZ-Clean.exe"1⤵PID:5672
-
C:\Users\Admin\Downloads\memz-master\MEMZ-master\MEMZ-Destructive.exe"C:\Users\Admin\Downloads\memz-master\MEMZ-master\MEMZ-Destructive.exe"1⤵
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:6060 -
C:\Users\Admin\Downloads\memz-master\MEMZ-master\MEMZ-Destructive.exe"C:\Users\Admin\Downloads\memz-master\MEMZ-master\MEMZ-Destructive.exe" /watchdog2⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:4852
-
-
C:\Users\Admin\Downloads\memz-master\MEMZ-master\MEMZ-Destructive.exe"C:\Users\Admin\Downloads\memz-master\MEMZ-master\MEMZ-Destructive.exe" /watchdog2⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:1828
-
-
C:\Users\Admin\Downloads\memz-master\MEMZ-master\MEMZ-Destructive.exe"C:\Users\Admin\Downloads\memz-master\MEMZ-master\MEMZ-Destructive.exe" /watchdog2⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:2060
-
-
C:\Users\Admin\Downloads\memz-master\MEMZ-master\MEMZ-Destructive.exe"C:\Users\Admin\Downloads\memz-master\MEMZ-master\MEMZ-Destructive.exe" /watchdog2⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:5860
-
-
C:\Users\Admin\Downloads\memz-master\MEMZ-master\MEMZ-Destructive.exe"C:\Users\Admin\Downloads\memz-master\MEMZ-master\MEMZ-Destructive.exe" /watchdog2⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:1996
-
-
C:\Users\Admin\Downloads\memz-master\MEMZ-master\MEMZ-Destructive.exe"C:\Users\Admin\Downloads\memz-master\MEMZ-master\MEMZ-Destructive.exe" /main2⤵
- Writes to the Master Boot Record (MBR)
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:3492 -
C:\Windows\SysWOW64\notepad.exe"C:\Windows\System32\notepad.exe" \note.txt3⤵
- Suspicious use of FindShellTrayWindow
PID:4688
-
-
-
C:\Users\Admin\Downloads\memz-master\MEMZ-master\MEMZ-Destructive.exe"C:\Users\Admin\Downloads\memz-master\MEMZ-master\MEMZ-Destructive.exe"1⤵
- Suspicious use of SetWindowsHookEx
PID:2168
-
C:\Users\Admin\Downloads\memz-master\MEMZ-master\MEMZ-Destructive.exe"C:\Users\Admin\Downloads\memz-master\MEMZ-master\MEMZ-Destructive.exe"1⤵
- Suspicious use of SetWindowsHookEx
PID:5172
-
C:\Users\Admin\Downloads\memz-master\MEMZ-master\MEMZ-Destructive.exe"C:\Users\Admin\Downloads\memz-master\MEMZ-master\MEMZ-Destructive.exe"1⤵
- Suspicious use of SetWindowsHookEx
PID:6036
-
C:\Users\Admin\Downloads\memz-master\MEMZ-master\MEMZ-Destructive.exe"C:\Users\Admin\Downloads\memz-master\MEMZ-master\MEMZ-Destructive.exe"1⤵
- Suspicious use of SetWindowsHookEx
PID:2644
-
C:\Users\Admin\Downloads\memz-master\MEMZ-master\MEMZ-Destructive.exe"C:\Users\Admin\Downloads\memz-master\MEMZ-master\MEMZ-Destructive.exe"1⤵
- Suspicious use of SetWindowsHookEx
PID:6120
-
C:\Users\Admin\Downloads\memz-master\MEMZ-master\MEMZ-Destructive.exe"C:\Users\Admin\Downloads\memz-master\MEMZ-master\MEMZ-Destructive.exe"1⤵
- Suspicious use of SetWindowsHookEx
PID:5828
-
C:\Users\Admin\Downloads\memz-master\MEMZ-master\MEMZ-Destructive.exe"C:\Users\Admin\Downloads\memz-master\MEMZ-master\MEMZ-Destructive.exe"1⤵
- Suspicious use of SetWindowsHookEx
PID:4468
-
C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdge.exe"C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdge.exe" -ServerName:MicrosoftEdge.AppXdnhjhccw3zf0j06tkg3jtqr00qdm0khc.mca1⤵
- Drops file in Windows directory
- Modifies registry class
- Suspicious use of SetWindowsHookEx
PID:5816
-
C:\Windows\system32\browser_broker.exeC:\Windows\system32\browser_broker.exe -Embedding1⤵PID:5196
-
C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe"C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe" -ServerName:ContentProcess.AppX6z3cwk4fvgady6zya12j1cw28d228a7k.mca1⤵
- Suspicious use of SetWindowsHookEx
PID:5364
-
C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe"C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe" -ServerName:ContentProcess.AppX6z3cwk4fvgady6zya12j1cw28d228a7k.mca1⤵
- Drops file in Windows directory
- Modifies registry class
PID:5368
-
C:\Windows\system32\OpenWith.exeC:\Windows\system32\OpenWith.exe -Embedding1⤵
- Suspicious use of SetWindowsHookEx
PID:2392
-
C:\Users\Admin\Downloads\memz-master\MEMZ-master\MEMZ-Destructive.exe"C:\Users\Admin\Downloads\memz-master\MEMZ-master\MEMZ-Destructive.exe"1⤵
- Suspicious use of SetWindowsHookEx
PID:5620
-
C:\Users\Admin\Downloads\memz-master\MEMZ-master\MEMZ-Destructive.exe"C:\Users\Admin\Downloads\memz-master\MEMZ-master\MEMZ-Destructive.exe"1⤵
- Suspicious use of SetWindowsHookEx
PID:3960
-
C:\Windows\system32\OpenWith.exeC:\Windows\system32\OpenWith.exe -Embedding1⤵
- Suspicious use of SetWindowsHookEx
PID:4664
-
C:\Users\Admin\Downloads\memz-master\MEMZ-master\MEMZ-Destructive.exe"C:\Users\Admin\Downloads\memz-master\MEMZ-master\MEMZ-Destructive.exe"1⤵PID:4832
-
C:\Users\Admin\Downloads\memz-master\MEMZ-master\MEMZ-Destructive.exe"C:\Users\Admin\Downloads\memz-master\MEMZ-master\MEMZ-Destructive.exe" /watchdog2⤵PID:4748
-
-
C:\Users\Admin\Downloads\memz-master\MEMZ-master\MEMZ-Destructive.exe"C:\Users\Admin\Downloads\memz-master\MEMZ-master\MEMZ-Destructive.exe" /watchdog2⤵PID:2140
-
-
C:\Users\Admin\Downloads\memz-master\MEMZ-master\MEMZ-Destructive.exe"C:\Users\Admin\Downloads\memz-master\MEMZ-master\MEMZ-Destructive.exe" /watchdog2⤵PID:3008
-
-
C:\Users\Admin\Downloads\memz-master\MEMZ-master\MEMZ-Destructive.exe"C:\Users\Admin\Downloads\memz-master\MEMZ-master\MEMZ-Destructive.exe" /watchdog2⤵PID:708
-
-
C:\Users\Admin\Downloads\memz-master\MEMZ-master\MEMZ-Destructive.exe"C:\Users\Admin\Downloads\memz-master\MEMZ-master\MEMZ-Destructive.exe" /watchdog2⤵PID:1328
-
-
C:\Users\Admin\Downloads\memz-master\MEMZ-master\MEMZ-Destructive.exe"C:\Users\Admin\Downloads\memz-master\MEMZ-master\MEMZ-Destructive.exe" /main2⤵PID:4048
-
C:\Windows\SysWOW64\notepad.exe"C:\Windows\System32\notepad.exe" \note.txt3⤵PID:2792
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
74KB
MD5d4fc49dc14f63895d997fa4940f24378
SHA13efb1437a7c5e46034147cbbc8db017c69d02c31
SHA256853d2f4eb81c9fdcea2ee079f6faf98214b111b77cdf68709b38989d123890f1
SHA512cc60d79b4afe5007634ac21dc4bc92081880be4c0d798a1735b63b27e936c02f399964f744dc73711987f01e8a1064b02a4867dd6cac27538e5fbe275cc61e0a
-
C:\Users\Admin\AppData\Local\Packages\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\AC\#!001\MicrosoftEdge\Cache\3PRK1H1O\fRSNKQanUHk53F1a1Bi8UA71Qt4.br[1].js
Filesize289B
MD59085e17b6172d9fc7b7373762c3d6e74
SHA1dab3ca26ec7a8426f034113afa2123edfaa32a76
SHA256586d8f94486a8116af00c80a255cba96c5d994c5864e47deac5a7f1ae1e24b0d
SHA512b27b776cb4947eef6d9e2a33b46e87796a6d4c427f4759c08cf5aa0ee410a5f12e89ca6ab9cddd86c8471037e3c505f43c8b7fc6d8417f97f9fe3c5c47216bc4
-
C:\Users\Admin\AppData\Local\Packages\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\AC\#!001\MicrosoftEdge\Cache\3PRK1H1O\stl[1].js
Filesize182KB
MD56029ea0d7e342d1f8ac4b3d21af18238
SHA1fdfa3448753dd83aeef9bfe49a6b0d7b776ad68c
SHA2562fa7eecab5db277fa2aaf6707b99648a42c60a323c2af6b7e0c2936fdc31eaa7
SHA5124b3e5740470c739916e64eb500042098acc16cca00ff6ac03f83d8867ebcb7b28479900f9ca8a22b0a448ee252fa2bf878d452751a50b3b6d30d517c41470071
-
C:\Users\Admin\AppData\Local\Packages\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\AC\#!001\MicrosoftEdge\Cache\J80QHTBB\4TQ6xhX_0XDFyLdFRS-kPhFXirA.br[1].js
Filesize7KB
MD5fbf143b664d512d1fa7aeeeba787129c
SHA1f827b539ae2992d7667162dc619cc967985166d9
SHA256e162ccd10a34933d736008eb0bc6b880c4e783cf81f944bca7311bf5f3cd4aff
SHA512109ec6433329f001c9239c3298a10e414522f21be2a3d7b8a9eb0b0767322eaad1fdf8f5b11edb1f42882b4e75ae71bef7fe786716407c8efad4feacb3dcf348
-
C:\Users\Admin\AppData\Local\Packages\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\AC\#!001\MicrosoftEdge\Cache\J80QHTBB\nuFRD-vYSZviVYUb_rj3ij__anPXDTnCjmHKM4nYO7KN_k-UXt_A-Q[1].woff2
Filesize28KB
MD554dc8147f54996ca05201938a6aec3fd
SHA1a246379477d6f774059d088cc727b5753ae1c2b8
SHA2564d073fea9dc9da8e5a2626c14c419ec6be0ec8acfb2d5ef5a90e9d995fc141bf
SHA512025559c263757faa45c5e2d03882d770081ce72c647893fd9ea976b1f45ba57d25e0b4ef97f84a0353d3aabbe6dfbdd8e2abf0c86e5f78a6eb221bbf47e01943
-
C:\Users\Admin\AppData\Local\Packages\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\AC\#!001\MicrosoftEdge\Cache\J80QHTBB\nuFRD-vYSZviVYUb_rj3ij__anPXDTnCjmHKM4nYO7KN_qiTXt_A-Q[1].woff2
Filesize27KB
MD566f533f5ff80956354d1fb4aab3b8a2c
SHA14a1753616e5ab51c3f7b8e784de99d007b2cba68
SHA256b3ab1bcb5bd68010806f88134ad581b56fa75da2a2000753848c61bbac82f4e2
SHA512817241abd6ba172d19704e69aee99895898cb4ad02a9f6880e210099b0201742e77c530146f92a0c1266b4d3f1376775f311a7bd4726fe618003476b4589a2b5
-
C:\Users\Admin\AppData\Local\Packages\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\AC\#!001\MicrosoftEdge\Cache\J80QHTBB\nuFvD-vYSZviVYUb_rj3ij__anPXJzDwcbmjWBN2PKdFvXDZbtM[1].woff2
Filesize28KB
MD5e4d6c8c57079b70dd94236cb4dbcd5be
SHA1f8bb42bd8b6b3ddbf7d70d1cb2e9472bb5351e6e
SHA25612e285b031f40e3970e0368331f02807ee64cab3d25dec9bc34975c9b5cf6b4f
SHA512a21f5df08def6d84362d4231613aae319998c70ec783b7bbf1d2dad62b8ccad43a3e8612cb4bf4b5746cc3881b771319b7016e35fc89ddef973250ac178e0628
-
C:\Users\Admin\AppData\Local\Packages\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\AC\#!001\MicrosoftEdge\Cache\J80QHTBB\nuFvD-vYSZviVYUb_rj3ij__anPXJzDwcbmjWBN2PKeiunDZbtM[1].woff2
Filesize29KB
MD5f11f3e3360810e2035b9fdf79b261b72
SHA13b1b2f4ae87993aa400fc441142a24a8b42fff8a
SHA25668de36afaca4d3ec77779ec9ef705fde578be0b5419b9cd520515747e75716e8
SHA5122e1d376af2120ab4f1555bfdd4e3d1ccd1c18050c0c172c620b110b694dab7fa3188f5d8fb05b242b62706a6158a66a7f96fd903a274759cfa521e975911df5d
-
C:\Users\Admin\AppData\Local\Packages\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\AC\#!001\MicrosoftEdge\User\Default\DOMStore\LV3CRZHK\s28667145.weebly[1].xml
Filesize13B
MD5c1ddea3ef6bbef3e7060a1a9ad89e4c5
SHA135e3224fcbd3e1af306f2b6a2c6bbea9b0867966
SHA256b71e4d17274636b97179ba2d97c742735b6510eb54f22893d3a2daff2ceb28db
SHA5126be8cec7c862afae5b37aa32dc5bb45912881a3276606da41bf808a4ef92c318b355e616bf45a257b995520d72b7c08752c0be445dceade5cf79f73480910fed
-
C:\Users\Admin\AppData\Local\Packages\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\AC\#!001\MicrosoftEdge\User\Default\DOMStore\LV3CRZHK\s28667145.weebly[1].xml
Filesize2KB
MD5fe34e072c3ae287fa2f164b309028063
SHA1b5773ad8409ec9fcf8017622b4f94b74b287a054
SHA2561983c6a2e80b9495d82774a5152f269a63f07efc490574206423ee43449ee740
SHA51211a36a9fa88c1fc17c412bf5ed1f46fb14244209e4d2af13a5882f44527c9439ddce67bb37895222c9e2ec025684797b5c82a01724a16a61b45ad7c13d4ee44e
-
C:\Users\Admin\AppData\Local\Packages\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\AC\#!001\Microsoft\CryptnetUrlCache\Content\A16C6C16D94F76E0808C087DFC657D99_8BB34D7AC6ADCC019FE5325FE9DECAE8
Filesize471B
MD55ebc073a67a03f9df24b7e4fe24d98a0
SHA1b26f23a3b0c794a59febad444f479d4a80345387
SHA2562f43123249e00c564b4b4585a0537c7d16a85475c8f5bb1af035490c86f08ba2
SHA5123df82b5204bfbcb08d319dcae88e3db921edc5761bc738410f659a4adc88d2e01955bb6000cb48c71c58f8b33500ee66c8aa21c2b335a7fbdbeaccb7b33adec3
-
C:\Users\Admin\AppData\Local\Packages\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\AC\#!001\Microsoft\CryptnetUrlCache\MetaData\A16C6C16D94F76E0808C087DFC657D99_8BB34D7AC6ADCC019FE5325FE9DECAE8
Filesize422B
MD54de78e2ecf99fd731f911251841799ef
SHA1f868df422c31c440dfdc102c315d4cc73e1a4acd
SHA256934c6ccff0c9b1dae8279bd3959ca0629ce76ade6987520586246e215bf0f5f4
SHA5121216391b371fcb2daaa795cb65c136fa6326af8ef8f1da71a649bf9391566382e3a6ad0fc4a27c5b0e1fe383c400da6fe88f0f714716bb6aa4f335e1c4ab4ab2
-
C:\Users\Admin\AppData\Local\Packages\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\AC\#!002\Microsoft\CryptnetUrlCache\Content\57C8EDB95DF3F0AD4EE2DC2B8CFD4157
Filesize4KB
MD51bfe591a4fe3d91b03cdf26eaacd8f89
SHA1719c37c320f518ac168c86723724891950911cea
SHA2569cf94355051bf0f4a45724ca20d1cc02f76371b963ab7d1e38bd8997737b13d8
SHA51202f88da4b610678c31664609bcfa9d61db8d0b0617649981af948f670f41a6207b4ec19fecce7385a24e0c609cbbf3f2b79a8acaf09a03c2c432cc4dce75e9db
-
C:\Users\Admin\AppData\Local\Packages\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\AC\MicrosoftEdge\Cache\2AXSQ5VN\favicon[1].ico
Filesize6KB
MD572f13fa5f987ea923a68a818d38fb540
SHA1f014620d35787fcfdef193c20bb383f5655b9e1e
SHA25637127c1a29c164cdaa75ec72ae685094c2468fe0577f743cb1f307d23dd35ec1
SHA512b66af0b6b95560c20584ed033547235d5188981a092131a7c1749926ba1ac208266193bd7fa8a3403a39eee23fcdd53580e9533803d7f52df5fb01d508e292b3
-
C:\Users\Admin\AppData\Local\Packages\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\AC\MicrosoftEdge\Cache\5FF9316X\favicon[2].ico
Filesize4KB
MD5da597791be3b6e732f0bc8b20e38ee62
SHA11125c45d285c360542027d7554a5c442288974de
SHA2565b2c34b3c4e8dd898b664dba6c3786e2ff9869eff55d673aa48361f11325ed07
SHA512d8dc8358727590a1ed74dc70356aedc0499552c2dc0cd4f7a01853dd85ceb3aead5fbdc7c75d7da36db6af2448ce5abdff64cebdca3533ecad953c061a9b338e
-
C:\Users\Admin\AppData\Local\Packages\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\AC\MicrosoftEdge\Cache\FAEBWE5U\favicon[1].ico
Filesize4KB
MD54d27526198ac873ccec96935198e0fb9
SHA1b98d8b73ad6a0f7477c3397561b4aab37bf262aa
SHA25640a2146151863bcf46c786d596e81a308d1b0d26d74635be441e92656f29b1b4
SHA5121ee4b73f4da9c2b237cd0b820ffad8e192d9125ce7d75d8a45a8b9642ce5fe85736646caf12d246a77364c576751c47919997d066587f17575442a9b9f7cc97f
-
C:\Users\Admin\AppData\Local\Packages\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\AC\MicrosoftEdge\Cache\LNKB6S0T\favicon-trans-bg-blue-mg[1].ico
Filesize4KB
MD530967b1b52cb6df18a8af8fcc04f83c9
SHA1aaf67cd84fcd64fb2d8974d7135d6f1e4fc03588
SHA256439b6089e45ef1e0c37ef88764d5c99a3b2752609c4e2af3376480d7ffcfaf2e
SHA5127cb3c09a81fbd301741e7cf5296c406baf1c76685d354c54457c87f6471867390a1aeed9f95701eb9361d7dfacce31afd1d240841037fc1de4a120c66c1b088c
-
C:\Users\Admin\AppData\Local\Packages\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\AC\MicrosoftEdge\User\Default\ImageStore\r4g84b5\imagestore.dat
Filesize28KB
MD5839e0f228ad494eef52dd028961658c8
SHA1db13afcff56fda67b882cbd8b0ebb025c52f1300
SHA256591ddaf37133bfcdbb243c948f6715f1a9133a641c095339479c65fde3edee1a
SHA51278808f63cab64e29ae42e862cae146ba9dba9f7815c42c7795d04d818e88134cd6d16d772890dbec5a039347f1d207399f4fd5e06d08f22e508d7593e5e2944b
-
C:\Users\Admin\AppData\Local\Packages\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\AC\Temp\~DF688BAC4DB946C116.TMP
Filesize24KB
MD5d3cdb7663712ddb6ef5056c72fe69e86
SHA1f08bf69934fb2b9ca0aba287c96abe145a69366c
SHA2563e8c2095986b262ac8fccfabda2d021fc0d3504275e83cffe1f0a333f9efbe15
SHA512c0acd65db7098a55dae0730eb1dcd8aa94e95a71f39dd40b087be0b06afc5d1bb310f555781853b5a78a8803dba0fb44df44bd2bb14baeca29c7c7410dffc812
-
C:\Users\Admin\AppData\Local\Packages\microsoft.microsoftedge_8wekyb3d8bbwe\AC\#!001\MicrosoftEdge\Cache\6WOQCUH1\memz-master[1].zip
Filesize15KB
MD5c83bed29066c2b16dc67b9099dd1c6ff
SHA11c7b4959ee2031c9e14301e8fcb6d0664f2b4f86
SHA256b2e1e267b6cab98d5c73baa537616c809d89b85218d5bdc15c4d6424dd8dbe12
SHA5125288326c692902f8d880c8b07f382d6ed273ce130db8906f2a1e0b1c3b1a4f03dafcd00856e89b1ae557ace66f4fc58224b262fa643de88d7550905b43d85f81
-
C:\Users\Admin\AppData\Local\Packages\microsoft.microsoftedge_8wekyb3d8bbwe\AC\#!001\MicrosoftEdge\Cache\6WOQCUH1\memz-master[1].zip
Filesize17KB
MD54790677e05d72ef7429dddf35562bf4a
SHA14243d6ea53db7e8cc0c355e70d6cffb54787b90b
SHA256319bf6087040d17b87f46cd05f5ee064c291ba9ca46e1910f28d1f4c57cb3d96
SHA512a93c5f691938bc1bdd9ef20b975f0b22cf494543e7df82ec31838bf811552ead5cd855959be4e47186ee7de944be005030f52f58b9dc85e7cde719cb97b794e3
-
C:\Users\Admin\AppData\Local\Packages\microsoft.microsoftedge_8wekyb3d8bbwe\AC\#!001\MicrosoftEdge\Cookies\6XF5IM80.cookie
Filesize101B
MD5a748c59711ab7a32a4f1f42d2b3e23d7
SHA16ca2c0790dc12d06e213e61d12c05b086f9e8161
SHA2565a28fc0abbda0352c0b51c18cbdea70557b0103ee44b3a0622a4f0b53f2c1a2a
SHA5126c57bc8593c0d2167b84e9c99651c8ce4f7df50ad08565fb6fba2f85cbde114800548cbe24867d197efc59d6b7fb7b4b9059340204a9f609c8170ba69a1862d1
-
C:\Users\Admin\AppData\Local\Packages\microsoft.microsoftedge_8wekyb3d8bbwe\AC\#!001\MicrosoftEdge\Cookies\JA5OFELK.cookie
Filesize1016B
MD5b68a7644d39d41716ec0703a142d9df2
SHA18a30e262b339accb1f5e81c97d8355a8072a5f16
SHA256501cc355f2a8c557d16794e739d323a4426a94d66c3c914fabaeb023882b2f3b
SHA5129e3f0b3fad776995fb1b1a2603dd78160b7b54ebc8f74b834358684852ba7035573988383c5b7e2c8c30d0abada00f2deea39741274871c8d4ce8497fd145490
-
C:\Users\Admin\AppData\Local\Packages\microsoft.microsoftedge_8wekyb3d8bbwe\AC\#!001\MicrosoftEdge\Cookies\POK1TKYQ.cookie
Filesize1KB
MD585119e51b3e6a075ab96defd42cbee99
SHA1e6a4fcbbb888ec25701dbbf116f3331fb53a4f07
SHA256b2202e161b7dec370fb80e92a0acc070126f98954780217107edea2cd9212bd7
SHA5126612a91021f2362942296fa8bbbd66eb2eb0744e477c41f8aad1ba6be3f5c10c8fc87cde22c686a39df091df1cccb02d92608b4362ce008ae49d96165cc2f991
-
C:\Users\Admin\AppData\Local\Packages\microsoft.microsoftedge_8wekyb3d8bbwe\AC\#!001\MicrosoftEdge\Cookies\Y3DKTZO1.cookie
Filesize908B
MD5b7a942031e1c2dd5cba3d05402ff5ac3
SHA1f9424a057758f176216925098a1e734959298d57
SHA25683250078ec0e31ba835f38d3379c4f08958185c423c0299e48fa26a20375ad12
SHA5121533d6a0884a461a77f91ab7d1ba99e9d0e7b60dd09577d857da1bd57015f9d1c066dd32a64de44676b0a7be1c6edf37198716254aa45eaaf3e0c7ffb3d71ec0
-
C:\Users\Admin\AppData\Local\Packages\microsoft.microsoftedge_8wekyb3d8bbwe\AC\#!001\MicrosoftEdge\Cookies\Y7VQPWQI.cookie
Filesize411B
MD560399731ec238bf22942d1965392d81b
SHA15f0f720959b3779eacf32c5007b4d7632c02bb0d
SHA256279b95f4074bad4a1db72403d89a582eec109d1deaa6913ea2be5319f1d36ec0
SHA512ccade13e9d93789f0dd6bfc812bb16b39367a64f4073556ee12caeda5fc22e7ec78f9c59193410795757fc593f1bb333ffa0648e773660b70b9ae1ce103a98a1
-
C:\Users\Admin\AppData\Local\Packages\microsoft.microsoftedge_8wekyb3d8bbwe\AC\#!001\Microsoft\CryptnetUrlCache\Content\103621DE9CD5414CC2538780B4B75751
Filesize717B
MD5822467b728b7a66b081c91795373789a
SHA1d8f2f02e1eef62485a9feffd59ce837511749865
SHA256af2343382b88335eea72251ad84949e244ff54b6995063e24459a7216e9576b9
SHA512bacea07d92c32078ca6a0161549b4e18edab745dd44947e5f181d28cc24468e07769d6835816cdfb944fd3d0099bde5e21b48f4966824c5c16c1801712303eb6
-
C:\Users\Admin\AppData\Local\Packages\microsoft.microsoftedge_8wekyb3d8bbwe\AC\#!001\Microsoft\CryptnetUrlCache\Content\EAF8AA29A62AB29E614331747385D816_F9E4DC0B9D5C777357D7DB8DEF51118A
Filesize312B
MD51c83e4cd5207f3b0cca54027e23fda4e
SHA1669546dea73c32bc7e07f99c93803b64cdf007c7
SHA256b87319bd59f5b3ee411fdcfea59cf879f4a34311ad56de7e80970e826dcb31c5
SHA512e72bb44555d9932f3333ad0923c92fc92d7c9c59b35680f06f36d11ec3c11088ac0e65c51a9dc3d907f8467cbb7c42471513b43bc360616fa4fd58b59670a5c8
-
C:\Users\Admin\AppData\Local\Packages\microsoft.microsoftedge_8wekyb3d8bbwe\AC\#!001\Microsoft\CryptnetUrlCache\MetaData\103621DE9CD5414CC2538780B4B75751
Filesize192B
MD5f07a91e7ae5952607f6f2ba71b12f66b
SHA1ce77c00e86048f8313bd66610e7993b4ef6e7fa2
SHA256a316435e79f1e0ee69361faefed678e87dc50eac8406606a2daa5b30b02d108d
SHA5123d645e7ebab6bc29270d73c86ed1cef96596331fa76ed368e1786420d4c7814a28fca0a3ac776badbb2246b0cbe579aa437b17b351a6d6ee85bbcbe2fc7f028d
-
C:\Users\Admin\AppData\Local\Packages\microsoft.microsoftedge_8wekyb3d8bbwe\AC\#!001\Microsoft\CryptnetUrlCache\MetaData\EAF8AA29A62AB29E614331747385D816_F9E4DC0B9D5C777357D7DB8DEF51118A
Filesize404B
MD593ac2a7ad3fcc0cd1216f98cc22ffdf9
SHA101c8db3c54b8816514b75cd3c2d8516674712cf9
SHA256d082c3580353b889c3d22810d483299837d363746ee6a1db085ea294a474d6ee
SHA512e63ceb567ffb1177f057efceb0a32753d5b71a8568afdedab072019ee6a9e57847f4d1eec4e3152b73835e8bc0526857ddfea70598d8c0741457488f89477e9b
-
C:\Users\Admin\AppData\Local\Packages\microsoft.microsoftedge_8wekyb3d8bbwe\AC\MicrosoftEdge\User\Default\DataStore\Data\nouser1\120712-0049\DBStore\LogFiles\edb.log
Filesize512KB
MD51f5a820524b3a21aa5ef052b2d6d85b7
SHA1e72e7ab0fb11598927f5d5dd50d82fdae5501461
SHA2564ca64cdb72df6eded33a6a620944a32464f140b7e8552b3795a6b7fb8e81e7fc
SHA512e406a0c9439f55b63197f1dfac9270125cc8800f5e45767f94705142ecf4b9fe2e9166ff055c63a8fdbff3345c9f4f2f24c866b6538d7de7bd1ac0678b7913e0
-
C:\Users\Admin\AppData\Local\Packages\microsoft.microsoftedge_8wekyb3d8bbwe\AC\MicrosoftEdge\User\Default\DataStore\Data\nouser1\120712-0049\DBStore\edb.chk
Filesize8KB
MD571c50abe699fa1d19e8eb919be6f6c19
SHA13e368eb7c4bad29f2b05225cf5474050768bda17
SHA2567f392b930dc9ca771e1639be079dd18de78783b3d03fa81321e66ba4e362340d
SHA512243db0ebd08f3871955f0bed5f726c5e41b03a89583934b141e62ed8bb9fe899e36d9c87a5bb7dd133142cbab8c9cbb0005716ab98eed703da36e6dfb1990d6f
-
C:\Users\Admin\AppData\Local\Packages\microsoft.microsoftedge_8wekyb3d8bbwe\AC\MicrosoftEdge\User\Default\DataStore\Data\nouser1\120712-0049\DBStore\spartan.edb
Filesize2.0MB
MD548a29ce3f2c3e9c5d91356ca2a7c7cc0
SHA1de42be08b2e8b0410dec162fdbfe19031b141dd8
SHA256585ec2d0dc89ec455df77f37d86a57f0ddae5546a345e3919dc395ca3894c0d4
SHA51204033c897eaa7832356456be4d2145a4a7a00b5062b83e98a5bfc186f856ac3483a2dc951c3b5b24fe5d6c173b942707cba70f73058aa4c206dea546bfeaf7ba
-
C:\Users\Admin\AppData\Local\Packages\microsoft.microsoftedge_8wekyb3d8bbwe\AC\MicrosoftEdge\User\Default\DataStore\Data\nouser1\120712-0049\DBStore\spartan.jfm
Filesize16KB
MD595edee7d6d43d6df80f8617448c32021
SHA1fd25d73cca55c03b47d1b70480fde42e6f3edb7f
SHA256eadf3d7a6616506e75fa6c9bd2b388689a5db21181b2f0fc62498969d2e6b941
SHA5124d11133b267f49cb0ea7450f95a2a0d3cda614bd87fdc663609c10b8d5d94d2421936f62a425e7d1e75c36a559518824bfde230c6c9cfe884d62eebf00a79306
-
C:\Users\Admin\AppData\Local\Packages\microsoft.microsoftedge_8wekyb3d8bbwe\AC\MicrosoftEdge\User\Default\ImageStore\r4g84b5\imagestore.dat
Filesize20KB
MD58c07cfc05160706f7ca6368ae9e1b056
SHA168b9552527e275dd4482d9e133c1325d269a488a
SHA256fabcd40307864edff7e19a4c45580d6a87c81339d0bcc7e9ed80cb1b82218967
SHA5126510b364e48a0b22a7a3ec49c6a5e1501e055d335b9efbe8d8ddfcf6e303c7d195547e7a81c1c0fecacf4017a8f6a92a4a4bed739aa28ee3f8fb9d828c7fafb9
-
C:\Users\Admin\AppData\Local\Packages\microsoft.microsoftedge_8wekyb3d8bbwe\AC\MicrosoftEdge\User\Default\Recovery\Active\RecoveryStore.{A44797BF-3DEB-404E-B074-8FA65FB1EBBD}.dat
Filesize5KB
MD55288e18bda31daf66b6d5c731ee9b2da
SHA12b0bc00753953aad647e8cc5a0088ab7eaa927db
SHA256f701c0e40efb74c96d8712ba42502043eba96f552514277a782e8872f73fffab
SHA5129375b66eea84058952a26ede638f0c5b769bd87a93ce50389587b6178378c435857103fcabc56d655bbf49c8848e4373f49c871b1a223a5f59b834e27797c8b1
-
C:\Users\Admin\AppData\Local\Packages\microsoft.microsoftedge_8wekyb3d8bbwe\AC\MicrosoftEdge\User\Default\Recovery\Active\{0EFCAAC7-3F09-44AF-BBCD-FA453DCF0D96}.dat
Filesize8KB
MD593924aa0d4cfd68bc45163bfcee2dd36
SHA1b50c74e51704e4687177ecdd9c8987735bafa3a0
SHA256c74988243f9a5aa4044bf064e768775c2a6814e654e93b832ed296d8f6d34a0a
SHA5121868c876475f5d109740e6d193b144a57e3c0023f8cb9a71953c02649b2868dffa4201fe666f30bd38bcae57fb5b74fd7cd914aff4249b40a0dfb824f1205acb
-
C:\Users\Admin\AppData\Local\Packages\microsoft.microsoftedge_8wekyb3d8bbwe\AC\MicrosoftEdge\User\Default\Recovery\Active\{3757F727-7EAA-4C2A-A6F9-F56085C2FB7F}.dat
Filesize5KB
MD58e245f44fb153099344a0675c0f7c247
SHA178974eaa5a2ee576e6180671cb83f53050affe58
SHA256769207604319e0def3c4e00a819151c581ca6c4037100517501649080d525ea8
SHA5122c239ffc0a1c8761f08526efb7e9074a2896ab9a0fa75e9a1de05a1fc800d750f56bfb4f25543a7f1a49b5a5fd58a602b1bbbfe0f07f0feef8c8106f7e917c8d
-
Filesize
218B
MD5afa6955439b8d516721231029fb9ca1b
SHA1087a043cc123c0c0df2ffadcf8e71e3ac86bbae9
SHA2568e9f20f6864c66576536c0b866c6ffdcf11397db67fe120e972e244c3c022270
SHA5125da21a31fbc4e8250dffed30f66b896bdf007ac91948140334fe36a3f010e1bac3e70a07e9f3eb9da8633189091fd5cadcabbaacd3e01da0fe7ae28a11b3dddf