Analysis
-
max time kernel
199s -
max time network
202s -
platform
windows10-1703_x64 -
resource
win10-20240404-en -
resource tags
arch:x64arch:x86image:win10-20240404-enlocale:en-usos:windows10-1703-x64system -
submitted
23-08-2024 13:28
Static task
static1
Behavioral task
behavioral1
Sample
DenuvoNet_launcher.exe
Resource
win10-20240404-en
General
-
Target
DenuvoNet_launcher.exe
-
Size
9.1MB
-
MD5
86b145e14564bdc781205dd1b34d5a79
-
SHA1
dcd653932b0bfb0e0162f0234ee75cd4bf8a4325
-
SHA256
1b400fc918d22d21ef98c6666ebac071a49202d1c57c115a6ca70ce6360129f3
-
SHA512
848737336f79352a045040635db4b9b9f36efe93560ac07cae7e188170ddf3484f37a57164a862fc4652daeba37542e5cbbe8afd383933cbd130e478cb3ba2c0
-
SSDEEP
196608:GCNDej8yjY8MrZS+tfJhIpKwCg48oYubqLq0lG8clVVNNlPq:GCNDejTgr8+jhIpKz8KqLfG8clNm
Malware Config
Signatures
-
Drops file in Windows directory 16 IoCs
description ioc Process File created C:\Windows\rescache\_merged\3720402701\1568373884.pri MicrosoftEdge.exe File created C:\Windows\rescache\_merged\3720402701\1568373884.pri MicrosoftEdgeCP.exe File created C:\Windows\rescache\_merged\1601268389\715946058.pri taskmgr.exe File created C:\Windows\rescache\_merged\3720402701\1568373884.pri MicrosoftEdgeCP.exe File created C:\Windows\rescache\_merged\3720402701\1568373884.pri MicrosoftEdgeCP.exe File opened for modification C:\Windows\Debug\ESE.TXT MicrosoftEdge.exe File created C:\Windows\rescache\_merged\3720402701\1568373884.pri MicrosoftEdgeCP.exe File created C:\Windows\rescache\_merged\4183903823\2290032291.pri taskmgr.exe File created C:\Windows\rescache\_merged\3720402701\1568373884.pri MicrosoftEdge.exe File created C:\Windows\rescache\_merged\3720402701\1568373884.pri MicrosoftEdgeCP.exe File opened for modification C:\Windows\Debug\ESE.TXT MicrosoftEdge.exe File opened for modification C:\Windows\Debug\ESE.TXT MicrosoftEdge.exe File created C:\Windows\rescache\_merged\3720402701\1568373884.pri MicrosoftEdge.exe File created C:\Windows\rescache\_merged\3720402701\1568373884.pri MicrosoftEdgeCP.exe File created C:\Windows\rescache\_merged\3720402701\1568373884.pri MicrosoftEdge.exe File opened for modification C:\Windows\Debug\ESE.TXT MicrosoftEdge.exe -
Checks SCSI registry key(s) 3 TTPs 3 IoCs
SCSI information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_QEMU&Prod_HARDDISK\4&215468a5&0&000000 taskmgr.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_QEMU&Prod_HARDDISK\4&215468a5&0&000000\Properties\{b725f130-47ef-101a-a5f1-02608c9eebac}\000A taskmgr.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_QEMU&Prod_HARDDISK\4&215468a5&0&000000\FriendlyName taskmgr.exe -
Checks processor information in registry 2 TTPs 10 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Update Signature firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\VendorIdentifier firefox.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~Mhz firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString taskmgr.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~Mhz firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\VendorIdentifier firefox.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 taskmgr.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Update Revision firefox.exe -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3699363923-1875576828-3287151903-1000\Software\Microsoft\Internet Explorer\Main browser_broker.exe Key created \REGISTRY\USER\S-1-5-21-3699363923-1875576828-3287151903-1000\Software\Microsoft\Internet Explorer\Main browser_broker.exe Key created \REGISTRY\USER\S-1-5-21-3699363923-1875576828-3287151903-1000\Software\Microsoft\Internet Explorer\Main browser_broker.exe Key created \REGISTRY\USER\S-1-5-21-3699363923-1875576828-3287151903-1000\Software\Microsoft\Internet Explorer\Main browser_broker.exe Key created \REGISTRY\USER\S-1-5-21-3699363923-1875576828-3287151903-1000\Software\Microsoft\Internet Explorer\Main MicrosoftEdgeCP.exe -
Modifies registry class 64 IoCs
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-3699363923-1875576828-3287151903-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\BrowserEmulation\CVListXMLVersionLow = "0" MicrosoftEdge.exe Set value (int) \REGISTRY\USER\S-1-5-21-3699363923-1875576828-3287151903-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\Children\006\CIStatus\CIPolicyState = "0" MicrosoftEdgeCP.exe Key created \REGISTRY\USER\S-1-5-21-3699363923-1875576828-3287151903-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\Internet Settings\Zones\3 MicrosoftEdge.exe Set value (int) \REGISTRY\USER\S-1-5-21-3699363923-1875576828-3287151903-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\GPU\VersionHigh = "0" MicrosoftEdge.exe Set value (str) \REGISTRY\USER\S-1-5-21-3699363923-1875576828-3287151903-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\Children\001\Internet Settings\Cache\Cookies\CachePrefix = "Cookie:" MicrosoftEdgeCP.exe Key created \REGISTRY\USER\S-1-5-21-3699363923-1875576828-3287151903-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\ExtensionsStore MicrosoftEdge.exe Key created \REGISTRY\USER\S-1-5-21-3699363923-1875576828-3287151903-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\Internet Explorer\Main MicrosoftEdge.exe Set value (int) \REGISTRY\USER\S-1-5-21-3699363923-1875576828-3287151903-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\GPU\VendorId = "0" MicrosoftEdge.exe Set value (data) \REGISTRY\USER\S-1-5-21-3699363923-1875576828-3287151903-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\CIStatus\CIStatusTimestamp = 0734e9c160f5da01 MicrosoftEdge.exe Key created \REGISTRY\USER\S-1-5-21-3699363923-1875576828-3287151903-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\Recovery\PendingRecovery MicrosoftEdge.exe Set value (int) \REGISTRY\USER\S-1-5-21-3699363923-1875576828-3287151903-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\Children\001\Internet Explorer\EdpDomStorage\vk.com\ = "0" MicrosoftEdgeCP.exe Key created \REGISTRY\USER\S-1-5-21-3699363923-1875576828-3287151903-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\Children\001\Internet Explorer\Main MicrosoftEdgeCP.exe Set value (int) \REGISTRY\USER\S-1-5-21-3699363923-1875576828-3287151903-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\GPU\Wow64-VersionLow = "0" MicrosoftEdge.exe Set value (int) \REGISTRY\USER\S-1-5-21-3699363923-1875576828-3287151903-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\Children\001\Internet Explorer\DOMStorage\vk.com\NumberOfSubdomains = "1" MicrosoftEdgeCP.exe Key created \REGISTRY\USER\S-1-5-21-3699363923-1875576828-3287151903-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\Recovery\PendingRecovery MicrosoftEdge.exe Set value (int) \REGISTRY\USER\S-1-5-21-3699363923-1875576828-3287151903-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\Privacy\ClearBrowsingHistoryOnStart = "0" MicrosoftEdge.exe Set value (data) \REGISTRY\USER\S-1-5-21-3699363923-1875576828-3287151903-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\Children\001\CIStatus\SignaturePolicy = 06000000 MicrosoftEdgeCP.exe Set value (int) \REGISTRY\USER\S-1-5-21-3699363923-1875576828-3287151903-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\ServiceUI\IsSignedIn = "0" MicrosoftEdge.exe Set value (int) \REGISTRY\USER\S-1-5-21-3699363923-1875576828-3287151903-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\GPU\Revision = "0" MicrosoftEdge.exe Set value (str) \REGISTRY\USER\S-1-5-21-3699363923-1875576828-3287151903-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\Children\001\Internet Settings\Cache\Content\CachePrefix MicrosoftEdgeCP.exe Key created \REGISTRY\USER\S-1-5-21-3699363923-1875576828-3287151903-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\ServiceUI MicrosoftEdge.exe Set value (str) \REGISTRY\USER\S-1-5-21-3699363923-1875576828-3287151903-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\Internet Settings\Cache\Content\CachePrefix MicrosoftEdge.exe Key created \REGISTRY\USER\S-1-5-21-3699363923-1875576828-3287151903-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\DummyPath MicrosoftEdge.exe Key created \REGISTRY\USER\S-1-5-21-3699363923-1875576828-3287151903-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\Children\001\Internet Explorer\DOMStorage MicrosoftEdgeCP.exe Set value (int) \REGISTRY\USER\S-1-5-21-3699363923-1875576828-3287151903-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\GPU\Wow64-SubSysId = "0" MicrosoftEdge.exe Set value (data) \REGISTRY\USER\S-1-5-21-3699363923-1875576828-3287151903-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\CIStatus\CIStatusTimestamp = 4ab6f5aa60f5da01 MicrosoftEdge.exe Set value (str) \REGISTRY\USER\S-1-5-21-3699363923-1875576828-3287151903-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\Children\004\Internet Settings\Cache\Content\CachePrefix MicrosoftEdgeCP.exe Set value (str) \REGISTRY\USER\S-1-5-21-3699363923-1875576828-3287151903-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\Internet Settings\Cache\History\CachePrefix = "Visited:" MicrosoftEdge.exe Set value (int) \REGISTRY\USER\S-1-5-21-3699363923-1875576828-3287151903-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\Children\001\Internet Explorer\DOMStorage\Total\ = "0" MicrosoftEdgeCP.exe Set value (int) \REGISTRY\USER\S-1-5-21-3699363923-1875576828-3287151903-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\Privacy\InProgressFlags = "0" MicrosoftEdge.exe Key created \REGISTRY\USER\S-1-5-21-3699363923-1875576828-3287151903-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\BrowserEmulation\LowMic MicrosoftEdge.exe Key created \REGISTRY\USER\S-1-5-21-3699363923-1875576828-3287151903-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\CIStatus MicrosoftEdge.exe Set value (data) \REGISTRY\USER\S-1-5-21-3699363923-1875576828-3287151903-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\Children\001\CIStatus\SignaturePolicy = 06000000 MicrosoftEdgeCP.exe Set value (int) \REGISTRY\USER\S-1-5-21-3699363923-1875576828-3287151903-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\ServiceUI\IsSignedIn = "0" MicrosoftEdge.exe Key created \REGISTRY\USER\S-1-5-21-3699363923-1875576828-3287151903-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\Internet Settings\Zones\3 MicrosoftEdge.exe Set value (int) \REGISTRY\USER\S-1-5-21-3699363923-1875576828-3287151903-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\Children\004\Internet Explorer\Main\OperationalData = "1" MicrosoftEdgeCP.exe Set value (data) \REGISTRY\USER\S-1-5-21-3699363923-1875576828-3287151903-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\Children\001\ACGStatus\DynamicCodePolicy = 05000000 MicrosoftEdgeCP.exe Set value (data) \REGISTRY\USER\S-1-5-21-3699363923-1875576828-3287151903-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\Children\001\ACGStatus\DynamicCodePolicy = 05000000 MicrosoftEdgeCP.exe Set value (int) \REGISTRY\USER\S-1-5-21-3699363923-1875576828-3287151903-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\Recovery\PendingDelete\C:\Users\Admin\AppData\Local\Pack = "0" MicrosoftEdge.exe Set value (int) \REGISTRY\USER\S-1-5-21-3699363923-1875576828-3287151903-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\Privacy\InProgressFlags = "262144" MicrosoftEdge.exe Key created \REGISTRY\USER\S-1-5-21-3699363923-1875576828-3287151903-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\Protected - It is a violation of Windows Policy to modif MicrosoftEdge.exe Set value (int) \REGISTRY\USER\S-1-5-21-3699363923-1875576828-3287151903-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\GPU\Wow64-VendorId = "0" MicrosoftEdge.exe Set value (int) \REGISTRY\USER\S-1-5-21-3699363923-1875576828-3287151903-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\Children\001\ACGStatus\ACGPolicyState = "8" MicrosoftEdgeCP.exe Set value (int) \REGISTRY\USER\S-1-5-21-3699363923-1875576828-3287151903-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\GPU\VersionLow = "0" MicrosoftEdge.exe Set value (int) \REGISTRY\USER\S-1-5-21-3699363923-1875576828-3287151903-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\Children\006\CIStatus\CIPolicyState = "0" MicrosoftEdgeCP.exe Set value (str) \REGISTRY\USER\S-1-5-21-3699363923-1875576828-3287151903-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\Internet Settings\Cache\Cookies\CachePrefix = "Cookie:" MicrosoftEdge.exe Set value (int) \REGISTRY\USER\S-1-5-21-3699363923-1875576828-3287151903-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\BrowserEmulation\CVListDOSTime = "0" MicrosoftEdge.exe Key created \REGISTRY\USER\S-1-5-21-3699363923-1875576828-3287151903-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\Children\006\CIStatus MicrosoftEdgeCP.exe Set value (data) \REGISTRY\USER\S-1-5-21-3699363923-1875576828-3287151903-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\CIStatus\CIStatusTimestamp = 851936cf60f5da01 MicrosoftEdge.exe Key created \REGISTRY\USER\S-1-5-21-3699363923-1875576828-3287151903-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\Recovery\PendingDelete MicrosoftEdge.exe Set value (int) \REGISTRY\USER\S-1-5-21-3699363923-1875576828-3287151903-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\BrowserEmulation\CVListXMLVersionLow = "0" MicrosoftEdge.exe Key created \REGISTRY\USER\S-1-5-21-3699363923-1875576828-3287151903-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\DummyPath MicrosoftEdge.exe Key created \REGISTRY\USER\S-1-5-21-3699363923-1875576828-3287151903-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\Children\001\ACGStatus MicrosoftEdgeCP.exe Set value (str) \REGISTRY\USER\S-1-5-21-3699363923-1875576828-3287151903-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\GPU\AdapterInfo = "vendorId=\"0x1414\",deviceID=\"0x8c\",subSysID=\"0x0\",revision=\"0x0\",version=\"10.0.15063.0\"hypervisor=\"No Hypervisor (No SLAT)\"" MicrosoftEdgeCP.exe Key created \REGISTRY\USER\S-1-5-21-3699363923-1875576828-3287151903-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\Children\004\Internet Explorer MicrosoftEdgeCP.exe Key created \REGISTRY\USER\S-1-5-21-3699363923-1875576828-3287151903-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\Recovery\Active MicrosoftEdge.exe Set value (data) \REGISTRY\USER\S-1-5-21-3699363923-1875576828-3287151903-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\Children\001\CIStatus\SignaturePolicy = 06000000 MicrosoftEdgeCP.exe Set value (data) \REGISTRY\USER\S-1-5-21-3699363923-1875576828-3287151903-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\DataStore\LastCleanup = cf6428c660f5da01 MicrosoftEdge.exe Set value (str) \REGISTRY\USER\S-1-5-21-3699363923-1875576828-3287151903-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\Children\001\Internet Settings\Cache\Content\CachePrefix MicrosoftEdgeCP.exe Set value (int) \REGISTRY\USER\S-1-5-21-3699363923-1875576828-3287151903-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\Children\001\Internet Explorer\EdpDomStorage\vk.com\Total = "0" MicrosoftEdgeCP.exe Set value (int) \REGISTRY\USER\S-1-5-21-3699363923-1875576828-3287151903-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\Children\001\Internet Explorer\EdpDomStorage\Total\ = "0" MicrosoftEdgeCP.exe Key created \REGISTRY\USER\S-1-5-21-3699363923-1875576828-3287151903-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\Children\004\Internet Settings\Cache MicrosoftEdgeCP.exe Set value (int) \REGISTRY\USER\S-1-5-21-3699363923-1875576828-3287151903-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\Recovery\PendingRecovery\ReadingStorePending = "0" MicrosoftEdge.exe Key created \REGISTRY\USER\S-1-5-21-3699363923-1875576828-3287151903-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\GPU MicrosoftEdge.exe -
NTFS ADS 1 IoCs
description ioc Process File created C:\Users\Admin\Downloads\DenuvoNet_launcher.zip:Zone.Identifier firefox.exe -
Suspicious behavior: EnumeratesProcesses 12 IoCs
pid Process 3804 taskmgr.exe 3804 taskmgr.exe 3804 taskmgr.exe 3804 taskmgr.exe 3804 taskmgr.exe 3804 taskmgr.exe 3804 taskmgr.exe 3804 taskmgr.exe 3804 taskmgr.exe 3804 taskmgr.exe 3804 taskmgr.exe 508 DenuvoNet_launcher.exe -
Suspicious behavior: MapViewOfSection 7 IoCs
pid Process 3776 MicrosoftEdgeCP.exe 3776 MicrosoftEdgeCP.exe 1612 MicrosoftEdgeCP.exe 1612 MicrosoftEdgeCP.exe 2764 MicrosoftEdgeCP.exe 2764 MicrosoftEdgeCP.exe 2764 MicrosoftEdgeCP.exe -
Suspicious use of AdjustPrivilegeToken 16 IoCs
description pid Process Token: SeDebugPrivilege 1640 DenuvoNet_launcher.exe Token: SeDebugPrivilege 3804 taskmgr.exe Token: SeSystemProfilePrivilege 3804 taskmgr.exe Token: SeCreateGlobalPrivilege 3804 taskmgr.exe Token: 33 3804 taskmgr.exe Token: SeIncBasePriorityPrivilege 3804 taskmgr.exe Token: SeDebugPrivilege 4280 firefox.exe Token: SeDebugPrivilege 4280 firefox.exe Token: SeDebugPrivilege 4280 firefox.exe Token: SeDebugPrivilege 508 DenuvoNet_launcher.exe Token: SeDebugPrivilege 3936 MicrosoftEdgeCP.exe Token: SeDebugPrivilege 3936 MicrosoftEdgeCP.exe Token: SeDebugPrivilege 3936 MicrosoftEdgeCP.exe Token: SeDebugPrivilege 3936 MicrosoftEdgeCP.exe Token: SeDebugPrivilege 4608 MicrosoftEdge.exe Token: SeDebugPrivilege 4608 MicrosoftEdge.exe -
Suspicious use of FindShellTrayWindow 43 IoCs
pid Process 3804 taskmgr.exe 3804 taskmgr.exe 3804 taskmgr.exe 3804 taskmgr.exe 3804 taskmgr.exe 3804 taskmgr.exe 3804 taskmgr.exe 3804 taskmgr.exe 3804 taskmgr.exe 3804 taskmgr.exe 3804 taskmgr.exe 3804 taskmgr.exe 3804 taskmgr.exe 3804 taskmgr.exe 3804 taskmgr.exe 3804 taskmgr.exe 3804 taskmgr.exe 3804 taskmgr.exe 3804 taskmgr.exe 3804 taskmgr.exe 3804 taskmgr.exe 3804 taskmgr.exe 3804 taskmgr.exe 3804 taskmgr.exe 3804 taskmgr.exe 3804 taskmgr.exe 3804 taskmgr.exe 3804 taskmgr.exe 3804 taskmgr.exe 3804 taskmgr.exe 3804 taskmgr.exe 3804 taskmgr.exe 3804 taskmgr.exe 3804 taskmgr.exe 3804 taskmgr.exe 3804 taskmgr.exe 3804 taskmgr.exe 3804 taskmgr.exe 4280 firefox.exe 4280 firefox.exe 4280 firefox.exe 4280 firefox.exe 508 DenuvoNet_launcher.exe -
Suspicious use of SendNotifyMessage 40 IoCs
pid Process 3804 taskmgr.exe 3804 taskmgr.exe 3804 taskmgr.exe 3804 taskmgr.exe 3804 taskmgr.exe 3804 taskmgr.exe 3804 taskmgr.exe 3804 taskmgr.exe 3804 taskmgr.exe 3804 taskmgr.exe 3804 taskmgr.exe 3804 taskmgr.exe 3804 taskmgr.exe 3804 taskmgr.exe 3804 taskmgr.exe 3804 taskmgr.exe 3804 taskmgr.exe 3804 taskmgr.exe 3804 taskmgr.exe 3804 taskmgr.exe 3804 taskmgr.exe 3804 taskmgr.exe 3804 taskmgr.exe 3804 taskmgr.exe 3804 taskmgr.exe 3804 taskmgr.exe 3804 taskmgr.exe 3804 taskmgr.exe 3804 taskmgr.exe 3804 taskmgr.exe 3804 taskmgr.exe 3804 taskmgr.exe 3804 taskmgr.exe 3804 taskmgr.exe 3804 taskmgr.exe 3804 taskmgr.exe 3804 taskmgr.exe 4280 firefox.exe 4280 firefox.exe 4280 firefox.exe -
Suspicious use of SetWindowsHookEx 17 IoCs
pid Process 4280 firefox.exe 4280 firefox.exe 4280 firefox.exe 4280 firefox.exe 4608 MicrosoftEdge.exe 3776 MicrosoftEdgeCP.exe 3936 MicrosoftEdgeCP.exe 3776 MicrosoftEdgeCP.exe 2540 MicrosoftEdge.exe 4276 MicrosoftEdgeCP.exe 4276 MicrosoftEdgeCP.exe 1484 MicrosoftEdge.exe 1612 MicrosoftEdgeCP.exe 1612 MicrosoftEdgeCP.exe 3604 MicrosoftEdge.exe 2764 MicrosoftEdgeCP.exe 2764 MicrosoftEdgeCP.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 1168 wrote to memory of 4280 1168 firefox.exe 81 PID 1168 wrote to memory of 4280 1168 firefox.exe 81 PID 1168 wrote to memory of 4280 1168 firefox.exe 81 PID 1168 wrote to memory of 4280 1168 firefox.exe 81 PID 1168 wrote to memory of 4280 1168 firefox.exe 81 PID 1168 wrote to memory of 4280 1168 firefox.exe 81 PID 1168 wrote to memory of 4280 1168 firefox.exe 81 PID 1168 wrote to memory of 4280 1168 firefox.exe 81 PID 1168 wrote to memory of 4280 1168 firefox.exe 81 PID 1168 wrote to memory of 4280 1168 firefox.exe 81 PID 1168 wrote to memory of 4280 1168 firefox.exe 81 PID 4280 wrote to memory of 4380 4280 firefox.exe 82 PID 4280 wrote to memory of 4380 4280 firefox.exe 82 PID 4280 wrote to memory of 2644 4280 firefox.exe 83 PID 4280 wrote to memory of 2644 4280 firefox.exe 83 PID 4280 wrote to memory of 2644 4280 firefox.exe 83 PID 4280 wrote to memory of 2644 4280 firefox.exe 83 PID 4280 wrote to memory of 2644 4280 firefox.exe 83 PID 4280 wrote to memory of 2644 4280 firefox.exe 83 PID 4280 wrote to memory of 2644 4280 firefox.exe 83 PID 4280 wrote to memory of 2644 4280 firefox.exe 83 PID 4280 wrote to memory of 2644 4280 firefox.exe 83 PID 4280 wrote to memory of 2644 4280 firefox.exe 83 PID 4280 wrote to memory of 2644 4280 firefox.exe 83 PID 4280 wrote to memory of 2644 4280 firefox.exe 83 PID 4280 wrote to memory of 2644 4280 firefox.exe 83 PID 4280 wrote to memory of 2644 4280 firefox.exe 83 PID 4280 wrote to memory of 2644 4280 firefox.exe 83 PID 4280 wrote to memory of 2644 4280 firefox.exe 83 PID 4280 wrote to memory of 2644 4280 firefox.exe 83 PID 4280 wrote to memory of 2644 4280 firefox.exe 83 PID 4280 wrote to memory of 2644 4280 firefox.exe 83 PID 4280 wrote to memory of 2644 4280 firefox.exe 83 PID 4280 wrote to memory of 2644 4280 firefox.exe 83 PID 4280 wrote to memory of 2644 4280 firefox.exe 83 PID 4280 wrote to memory of 2644 4280 firefox.exe 83 PID 4280 wrote to memory of 2644 4280 firefox.exe 83 PID 4280 wrote to memory of 2644 4280 firefox.exe 83 PID 4280 wrote to memory of 2644 4280 firefox.exe 83 PID 4280 wrote to memory of 2644 4280 firefox.exe 83 PID 4280 wrote to memory of 2644 4280 firefox.exe 83 PID 4280 wrote to memory of 2644 4280 firefox.exe 83 PID 4280 wrote to memory of 2644 4280 firefox.exe 83 PID 4280 wrote to memory of 2644 4280 firefox.exe 83 PID 4280 wrote to memory of 2644 4280 firefox.exe 83 PID 4280 wrote to memory of 2644 4280 firefox.exe 83 PID 4280 wrote to memory of 2644 4280 firefox.exe 83 PID 4280 wrote to memory of 2644 4280 firefox.exe 83 PID 4280 wrote to memory of 2644 4280 firefox.exe 83 PID 4280 wrote to memory of 2644 4280 firefox.exe 83 PID 4280 wrote to memory of 2644 4280 firefox.exe 83 PID 4280 wrote to memory of 2644 4280 firefox.exe 83 PID 4280 wrote to memory of 2644 4280 firefox.exe 83 PID 4280 wrote to memory of 2644 4280 firefox.exe 83 PID 4280 wrote to memory of 2644 4280 firefox.exe 83 PID 4280 wrote to memory of 2644 4280 firefox.exe 83 PID 4280 wrote to memory of 2644 4280 firefox.exe 83 PID 4280 wrote to memory of 2644 4280 firefox.exe 83 PID 4280 wrote to memory of 2644 4280 firefox.exe 83 PID 4280 wrote to memory of 2644 4280 firefox.exe 83 PID 4280 wrote to memory of 2644 4280 firefox.exe 83 PID 4280 wrote to memory of 4828 4280 firefox.exe 84 PID 4280 wrote to memory of 4828 4280 firefox.exe 84 PID 4280 wrote to memory of 4828 4280 firefox.exe 84 -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
Processes
-
C:\Users\Admin\AppData\Local\Temp\DenuvoNet_launcher.exe"C:\Users\Admin\AppData\Local\Temp\DenuvoNet_launcher.exe"1⤵
- Suspicious use of AdjustPrivilegeToken
PID:1640
-
C:\Windows\System32\rundll32.exeC:\Windows\System32\rundll32.exe C:\Windows\System32\shell32.dll,SHCreateLocalServerRunDll {9aa46009-3ce0-458a-a354-715610a075e6} -Embedding1⤵PID:4956
-
C:\Windows\system32\taskmgr.exe"C:\Windows\system32\taskmgr.exe" /41⤵
- Drops file in Windows directory
- Checks SCSI registry key(s)
- Checks processor information in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
PID:3804
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:1168 -
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe"2⤵
- Checks processor information in registry
- NTFS ADS
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:4280 -
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel="4280.0.1076883070\1779288935" -parentBuildID 20221007134813 -prefsHandle 1712 -prefMapHandle 1676 -prefsLen 20747 -prefMapSize 233444 -appDir "C:\Program Files\Mozilla Firefox\browser" - {b90c62c4-3873-4c89-b81e-21b2d7161912} 4280 "\\.\pipe\gecko-crash-server-pipe.4280" 1792 23bcb6d9e58 gpu3⤵PID:4380
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel="4280.1.777121491\643627217" -parentBuildID 20221007134813 -prefsHandle 2120 -prefMapHandle 2116 -prefsLen 20828 -prefMapSize 233444 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {671c470c-a795-44f7-a7dc-35703f75522c} 4280 "\\.\pipe\gecko-crash-server-pipe.4280" 2144 23bcb5fb658 socket3⤵
- Checks processor information in registry
PID:2644
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel="4280.2.326733633\1818221545" -childID 1 -isForBrowser -prefsHandle 2788 -prefMapHandle 2908 -prefsLen 20866 -prefMapSize 233444 -jsInitHandle 1100 -jsInitLen 246848 -a11yResourceId 64 -parentBuildID 20221007134813 -appDir "C:\Program Files\Mozilla Firefox\browser" - {fed19f23-a22e-43a0-8a22-4d1ec12289be} 4280 "\\.\pipe\gecko-crash-server-pipe.4280" 2992 23bcfadb558 tab3⤵PID:4828
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel="4280.3.1490136351\1130324531" -childID 2 -isForBrowser -prefsHandle 1032 -prefMapHandle 996 -prefsLen 26109 -prefMapSize 233444 -jsInitHandle 1100 -jsInitLen 246848 -a11yResourceId 64 -parentBuildID 20221007134813 -appDir "C:\Program Files\Mozilla Firefox\browser" - {9dd94c83-235b-443f-b0d9-3002e63ade51} 4280 "\\.\pipe\gecko-crash-server-pipe.4280" 3364 23bb935b258 tab3⤵PID:4224
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel="4280.4.1765831953\910571085" -childID 3 -isForBrowser -prefsHandle 4396 -prefMapHandle 4392 -prefsLen 26168 -prefMapSize 233444 -jsInitHandle 1100 -jsInitLen 246848 -a11yResourceId 64 -parentBuildID 20221007134813 -appDir "C:\Program Files\Mozilla Firefox\browser" - {d40df41c-975a-48aa-8c77-cbac244e8945} 4280 "\\.\pipe\gecko-crash-server-pipe.4280" 4408 23bd1b1fe58 tab3⤵PID:3472
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel="4280.5.578033083\2001343107" -childID 4 -isForBrowser -prefsHandle 4224 -prefMapHandle 4884 -prefsLen 26168 -prefMapSize 233444 -jsInitHandle 1100 -jsInitLen 246848 -a11yResourceId 64 -parentBuildID 20221007134813 -appDir "C:\Program Files\Mozilla Firefox\browser" - {ede59d04-5606-46e7-974c-b79916a02935} 4280 "\\.\pipe\gecko-crash-server-pipe.4280" 4752 23bd1b1c558 tab3⤵PID:2388
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel="4280.6.679884824\1171910998" -childID 5 -isForBrowser -prefsHandle 5076 -prefMapHandle 5080 -prefsLen 26168 -prefMapSize 233444 -jsInitHandle 1100 -jsInitLen 246848 -a11yResourceId 64 -parentBuildID 20221007134813 -appDir "C:\Program Files\Mozilla Firefox\browser" - {5e489c50-91a3-4b3f-8759-b24aa5cf02b3} 4280 "\\.\pipe\gecko-crash-server-pipe.4280" 5064 23bd1d30a58 tab3⤵PID:796
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel="4280.7.1286786185\1295269751" -childID 6 -isForBrowser -prefsHandle 5264 -prefMapHandle 5268 -prefsLen 26168 -prefMapSize 233444 -jsInitHandle 1100 -jsInitLen 246848 -a11yResourceId 64 -parentBuildID 20221007134813 -appDir "C:\Program Files\Mozilla Firefox\browser" - {4746251d-dec8-4c52-bede-a22dc2a771e2} 4280 "\\.\pipe\gecko-crash-server-pipe.4280" 5256 23bd1d7e258 tab3⤵PID:624
-
-
-
C:\Users\Admin\AppData\Local\Temp\Temp1_DenuvoNet_launcher.zip\DenuvoNet_launcher.exe"C:\Users\Admin\AppData\Local\Temp\Temp1_DenuvoNet_launcher.zip\DenuvoNet_launcher.exe"1⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
PID:508
-
C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdge.exe"C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdge.exe" -ServerName:MicrosoftEdge.AppXdnhjhccw3zf0j06tkg3jtqr00qdm0khc.mca1⤵
- Drops file in Windows directory
- Modifies registry class
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
PID:4608
-
C:\Windows\system32\browser_broker.exeC:\Windows\system32\browser_broker.exe -Embedding1⤵
- Modifies Internet Explorer settings
PID:4476
-
C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe"C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe" -ServerName:ContentProcess.AppX6z3cwk4fvgady6zya12j1cw28d228a7k.mca1⤵
- Modifies registry class
- Suspicious behavior: MapViewOfSection
- Suspicious use of SetWindowsHookEx
PID:3776
-
C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe"C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe" -ServerName:ContentProcess.AppX6z3cwk4fvgady6zya12j1cw28d228a7k.mca1⤵
- Drops file in Windows directory
- Modifies Internet Explorer settings
- Modifies registry class
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
PID:3936
-
C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe"C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe" -ServerName:ContentProcess.AppX6z3cwk4fvgady6zya12j1cw28d228a7k.mca1⤵
- Drops file in Windows directory
- Modifies registry class
PID:4332
-
C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdge.exe"C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdge.exe" -ServerName:MicrosoftEdge.AppXdnhjhccw3zf0j06tkg3jtqr00qdm0khc.mca1⤵
- Drops file in Windows directory
- Modifies registry class
- Suspicious use of SetWindowsHookEx
PID:2540
-
C:\Windows\system32\browser_broker.exeC:\Windows\system32\browser_broker.exe -Embedding1⤵
- Modifies Internet Explorer settings
PID:3064
-
C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe"C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe" -ServerName:ContentProcess.AppX6z3cwk4fvgady6zya12j1cw28d228a7k.mca1⤵
- Suspicious use of SetWindowsHookEx
PID:4276
-
C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe"C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe" -ServerName:ContentProcess.AppX6z3cwk4fvgady6zya12j1cw28d228a7k.mca1⤵
- Drops file in Windows directory
- Modifies registry class
PID:660
-
C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdge.exe"C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdge.exe" -ServerName:MicrosoftEdge.AppXdnhjhccw3zf0j06tkg3jtqr00qdm0khc.mca1⤵
- Drops file in Windows directory
- Modifies registry class
- Suspicious use of SetWindowsHookEx
PID:1484
-
C:\Windows\system32\browser_broker.exeC:\Windows\system32\browser_broker.exe -Embedding1⤵
- Modifies Internet Explorer settings
PID:2832
-
C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe"C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe" -ServerName:ContentProcess.AppX6z3cwk4fvgady6zya12j1cw28d228a7k.mca1⤵
- Modifies registry class
- Suspicious behavior: MapViewOfSection
- Suspicious use of SetWindowsHookEx
PID:1612
-
C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe"C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe" -ServerName:ContentProcess.AppX6z3cwk4fvgady6zya12j1cw28d228a7k.mca1⤵
- Drops file in Windows directory
- Modifies registry class
PID:4648
-
C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdge.exe"C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdge.exe" -ServerName:MicrosoftEdge.AppXdnhjhccw3zf0j06tkg3jtqr00qdm0khc.mca1⤵
- Drops file in Windows directory
- Modifies registry class
- Suspicious use of SetWindowsHookEx
PID:3604
-
C:\Windows\system32\browser_broker.exeC:\Windows\system32\browser_broker.exe -Embedding1⤵
- Modifies Internet Explorer settings
PID:4296
-
C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe"C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe" -ServerName:ContentProcess.AppX6z3cwk4fvgady6zya12j1cw28d228a7k.mca1⤵
- Modifies registry class
- Suspicious behavior: MapViewOfSection
- Suspicious use of SetWindowsHookEx
PID:2764
-
C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe"C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe" -ServerName:ContentProcess.AppX6z3cwk4fvgady6zya12j1cw28d228a7k.mca1⤵
- Drops file in Windows directory
- Modifies registry class
PID:4568
-
C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe"C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe" -ServerName:ContentProcess.AppX6z3cwk4fvgady6zya12j1cw28d228a7k.mca1⤵
- Drops file in Windows directory
- Modifies registry class
PID:2988
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Local\Packages\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\AC\#!001\MicrosoftEdge\Cache\3UW20J6H\c4960977d1caa546dc05050186f047f8[1].css
Filesize125KB
MD5c4960977d1caa546dc05050186f047f8
SHA1d67b5ae506795c559d317319c257bacebd3c4da6
SHA256ecc5b503fdd9dede54f724faa021fb5d1b7dfb7aa3532bd9527d5e4329b67b7e
SHA512ddd425413425ad634fd740ebcb54e92c6ba4f9a76ca8ac11b82d2607019ef24cc1c64bd4187772f133eba7a1d3de4c9426353c6eb265efad15b741be322e817b
-
C:\Users\Admin\AppData\Local\Packages\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\AC\#!001\MicrosoftEdge\Cache\3UW20J6H\error-428-what-to-do[1].htm
Filesize55KB
MD5a3d8f09caf8dc38cbc204551890285e5
SHA16759472ae63e56d288a8059dd444b5e8792963b9
SHA2561816ece6f2356eb8ea70d1b1b027fe817f93623c11a749b0e3f86988c999a8e3
SHA512896882648c8cb3c0e59bfbc3ac1019bd1a2349d4d245d2caccdd4ad4fd12628e2d8f04e308980a85c12dabcf13b85cc9980e0cb699b08e35aaca625681af9f6b
-
C:\Users\Admin\AppData\Local\Packages\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\AC\#!001\MicrosoftEdge\Cache\DL80LC2K\gb[1].svg
Filesize535B
MD5fcfef6780b36bef537381474df9d0be9
SHA168b2ead4370e7ab7b70eb6d35a09c31e73c44fd3
SHA25651a8613ac1b05eafb9486e6420336bd8b95dae7a9d11def6318776a61c701a08
SHA512ec21f7b6951f00f0da0acfdb21bbbe037dcaa2a14f2a1de02c991f91af689b1039720801ebb90ca900379766d5726752ed7fd85a349db508d3f94edecc4ec0a0
-
C:\Users\Admin\AppData\Local\Packages\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\AC\#!001\MicrosoftEdge\Cache\DL80LC2K\ru[1].svg
Filesize283B
MD5ab61f31edf4ad95b5ae00aff3be99197
SHA12224f01348b870c064900bce135bfd7888a5b745
SHA2566c62f886220c3bcb0725ac86a62da7d9a80c33b4525c9bfafe4f540649ff0090
SHA512404b1ebaf730083a2535ee61929a4a6f9a5b2c31707682f06a4936aac6f94dce772cc82217cb9e05bb8aae86b56e76040811db6fbdd573084a8e34abf2a66dd2
-
C:\Users\Admin\AppData\Local\Packages\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\AC\#!001\MicrosoftEdge\Cache\I9F7WYXN\tr[1].svg
Filesize550B
MD54dd4b60c8a5e3dad5e65fdfa9745c03f
SHA12f8e068b107feda4f9264f6996ac604991031257
SHA256479d84d09fade71411bb03882567962fb9712109844238f4ad8988688d71ea1b
SHA512a3b6fd990f71b41d94c2d0c0a7c6545c96802cda623018ca8186ea71a34c2dfa5dd17535fca0e3a387162d4da2de18d42577dbe544234c7e860d1ccac4848fb6
-
C:\Users\Admin\AppData\Local\Packages\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\AC\#!001\MicrosoftEdge\Cache\I9F7WYXN\ua[1].svg
Filesize232B
MD56d944bf795f95c09b2f78819af42db89
SHA1a957f8e2c5803d3f5f41ce7adc30aa3ddc628d1b
SHA2562d869c23ebfefb2ae0a633297c11dee06fcb666ce7b3ca75eba09b7a1a3a03ac
SHA512a93b3404ad947c12167aaed04fd00bd47c9818e07d266d6d36c64460bf572c2c65962c416c1c9421ab89dccd6ecde564d261ce519fddfa7287f5d98e9761a24f
-
C:\Users\Admin\AppData\Local\Packages\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\AC\#!001\MicrosoftEdge\Cache\Q3SNOP75\logo-x2[1].webp
Filesize1KB
MD56ce59a18965262657d8105033ac97a60
SHA1990f7943ef9c5a38d949b9458bc0c3948085b717
SHA256eaf02d1187eb22ae8831dd44253c6ea118638798efa1803b98a7b43d6d92ac89
SHA5122cd48f3640aa03ed0b7f1936edf256a913961d7079254b1f514e6f5014708af9136b7b9e4330a998cd2205ac8c18b7ccc1c9337c3a2249caf9c6d7c48e43d562
-
C:\Users\Admin\AppData\Local\Packages\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\AC\#!001\MicrosoftEdge\Cache\Q3SNOP75\logo-x2[2].webp
Filesize17KB
MD597028648b8ba35d3dade20a5eda5cef7
SHA160b2f90a81d5188806d6b7ffc3cc99da4885f318
SHA256b6e546a291790ef05176ef0a7a6d876e385167b244bb8b3507068ef48f3588b5
SHA5123c958bf9f5949722fcc2157c3f35ba089109aa4fa87a4187c78d57c81c01c2aa215a3ef0facc8c5a13ee6505f49191976b94b904d38b4ba08b1fc4d810d4edbf
-
C:\Users\Admin\AppData\Local\Packages\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\AC\#!001\MicrosoftEdge\Cache\Q3SNOP75\search-light[1].svg
Filesize285B
MD51002c7dde4eb1f670dad732ed0929421
SHA14bf175a901c4f8f88230c2ad857acd1cb14dfe15
SHA2560f2112172e367eb0c605dc713e094ac9b3ddcfd4395e43b4d28b5f92fd4d5cbc
SHA5120db6317fb49661b6a195b4fe74c34eb14185669ba9b83402d72e723276fca36d06e7ee99132cd98404ff240a27db16e7049621a2eff1bf646e81ea184a8f6633
-
C:\Users\Admin\AppData\Local\Packages\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\AC\#!001\MicrosoftEdge\Cache\Q3SNOP75\slick[2].css
Filesize1KB
MD5f38b2db10e01b1572732a3191d538707
SHA1a94a059b3178b4adec09e3281ace2819a30095a4
SHA256de1e399b07289f3b0a8d35142e363e128124a1185770e214e25e58030dad48e5
SHA512c11e283612c11dfeec9a3cb42b8a2acdd5ae99dfabe7ffba40efef0dd6bbe8c5b98ae8383d3eeff3a168124c922097eddd703401ee9ac6122f1ebab09bbf7737
-
C:\Users\Admin\AppData\Local\Packages\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\AC\MicrosoftEdge\Cache\ECRD2SXD\cropped-cropped-favicon2-32x32[1].png
Filesize471B
MD5a752e97ee1321a26cd064be6936fdac0
SHA1494f3bd855b919f20c054852e63cc8bfb4e6dce7
SHA25619663618efb379c9779dde93a6288f2e5c6c344d096ed27ff8699eda9563893c
SHA512e37fc8e4534ac1f09b7e7e994eb00ed33cd471384c4754035d9f26bf5be84e2fb9779b741e62325f3d6e2b229a2e115089464793d901ee125dace2581d49314d
-
C:\Users\Admin\AppData\Local\Packages\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\AC\MicrosoftEdge\Cache\FMIISBAH\favicon[1].png
Filesize4KB
MD5d41fa4f682279a0c77159080255b3b9e
SHA17cdf65f129f33ddf76146c9fc0bb30bb80d25065
SHA25625dfe61842345c39cb13beeee5b921cfe1c16b5f774067416728f8046c56f925
SHA51239539b6378a59af4bef107fdab92ab7ebbcc9c480a104c3b6389f10d427244be1d818bf4b2a06012c3d68082a91d33351ad81a4a3217423f7d142eecf44cf929
-
C:\Users\Admin\AppData\Local\Packages\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\AC\MicrosoftEdge\User\Default\DataStore\Data\nouser1\120712-0049\DBStore\LogFiles\edb.log
Filesize512KB
MD5995bb8c73a9d4a6dc77759fd6b410741
SHA17bdf28ffef627ebdc277ac11bca37fc819cfebf2
SHA256f867e87cfa883e84695d1a83036ed70693a9cff20224694261a552b3396a9378
SHA512d0477d8602d096d0fded2950545e196c5cdf11cb0c16fb34818e401e40306c384a746d65dbe228f8b59b5bc72b070d82855a4761c2f3a7b38e4e49365e965a65
-
C:\Users\Admin\AppData\Local\Packages\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\AC\Temp\~DF74E23FF23C5C9A90.TMP
Filesize24KB
MD5d3cdb7663712ddb6ef5056c72fe69e86
SHA1f08bf69934fb2b9ca0aba287c96abe145a69366c
SHA2563e8c2095986b262ac8fccfabda2d021fc0d3504275e83cffe1f0a333f9efbe15
SHA512c0acd65db7098a55dae0730eb1dcd8aa94e95a71f39dd40b087be0b06afc5d1bb310f555781853b5a78a8803dba0fb44df44bd2bb14baeca29c7c7410dffc812
-
C:\Users\Admin\AppData\Local\Packages\microsoft.microsoftedge_8wekyb3d8bbwe\AC\#!001\Microsoft\CryptnetUrlCache\Content\103621DE9CD5414CC2538780B4B75751
Filesize717B
MD5822467b728b7a66b081c91795373789a
SHA1d8f2f02e1eef62485a9feffd59ce837511749865
SHA256af2343382b88335eea72251ad84949e244ff54b6995063e24459a7216e9576b9
SHA512bacea07d92c32078ca6a0161549b4e18edab745dd44947e5f181d28cc24468e07769d6835816cdfb944fd3d0099bde5e21b48f4966824c5c16c1801712303eb6
-
C:\Users\Admin\AppData\Local\Packages\microsoft.microsoftedge_8wekyb3d8bbwe\AC\#!001\Microsoft\CryptnetUrlCache\Content\351809EA8413AE0AA50BAEE3C04D84F6
Filesize939B
MD5916b6f074bde75aef6a14c812ebf0055
SHA1e4dd13983ab99a2cd3fb50b50f1d33178b4bc042
SHA25660464780f6c7b88e4985984c7536f2960fd54c2cbe7893a065d9a470126f7d03
SHA5127b570744bb47892c78032bf748976131c495897816b4fa793dce7755d5788f57a5e70fa55a3b72f79151907db55bfc9a3cb4379aee0314aba7db53b9d3823010
-
C:\Users\Admin\AppData\Local\Packages\microsoft.microsoftedge_8wekyb3d8bbwe\AC\#!001\Microsoft\CryptnetUrlCache\Content\66F835E41EC6A985EB9271E4A70169D7_CF44E3C99F7F4AC558EEB35244F7E046
Filesize1KB
MD5531fe54ec9b00f3a78eb0d4a5192002f
SHA163977c59d795acacbe54486c1d1c9c319e9524f2
SHA256bc77e706182bb252c77208a241754777072efc59c2bdaa08c4c3640cbe3dfb87
SHA512f7dbc5aca6bf218d9d08077ef6fb402c57e592ecdf18027bc2fb193729c28f7450eb50171707f96005fd79d8ba795f33a4b4acc23f36245b8f06e63e2085a658
-
C:\Users\Admin\AppData\Local\Packages\microsoft.microsoftedge_8wekyb3d8bbwe\AC\#!001\Microsoft\CryptnetUrlCache\MetaData\103621DE9CD5414CC2538780B4B75751
Filesize192B
MD5da85231edc52fef62694c8d9666e316b
SHA149113eec2a484328f36b68858f9dc3d02bd7f701
SHA256cdc7f156cdfd9c3bbcd6b8c4f111105eebea2d81ba9980728c45c111de7e229c
SHA5128ae24f6569ca9e5b667118415a4ab7971c0db66629f4d7ba57518a02a4e83685e9cb91ed4f3e9f53cb729be5709307cb25843f4c62b4b5ff56e33dad5207d50d
-
C:\Users\Admin\AppData\Local\Packages\microsoft.microsoftedge_8wekyb3d8bbwe\AC\#!001\Microsoft\CryptnetUrlCache\MetaData\351809EA8413AE0AA50BAEE3C04D84F6
Filesize520B
MD5ad788fffcc114e0ff3cc7d191ef429d6
SHA17d6f8389444d3eb99bcd848c63be12f7534626c6
SHA2563e99cbacbbed127546a3c3c96160db7cba0faf129033b5cd40a3696dfce9480f
SHA51222f6e8ea454ecc79536d66de7ba6155cde65c448c3e45b425258dfd07db32adeed50d333678c2989b7c4b1a1c7fe6af2d88497533f771173e93edbbc5e1cbc5a
-
C:\Users\Admin\AppData\Local\Packages\microsoft.microsoftedge_8wekyb3d8bbwe\AC\#!001\Microsoft\CryptnetUrlCache\MetaData\66F835E41EC6A985EB9271E4A70169D7_CF44E3C99F7F4AC558EEB35244F7E046
Filesize502B
MD534446886b6dd0168c0f4a5afe7eb7ea4
SHA1d717f049f4a54ac8bf33fed93523fb1003387462
SHA25647def9861a490ffd51917e2a0010a2df7c1295c66118c4de514dea721fa47112
SHA512fc6fb8410cfccf4f1b4623697c2411faf9f7ce299991d8b6cd97378fd098e68118bfe5a3d20f3b10c6ef1e6c19638a680ae18b0b61640b59d696e0c8608347fb
-
C:\Users\Admin\AppData\Local\Packages\microsoft.microsoftedge_8wekyb3d8bbwe\AC\MicrosoftEdge\User\Default\DataStore\Data\nouser1\120712-0049\DBStore\LogFiles\edb.log
Filesize512KB
MD58b3cc6d889ef4d3ef9f4860ef89364e4
SHA1ce0d3107f11aedc9d338393e059ea3f20563dd60
SHA256bcb25008dc6daabfe8b4c0bcb4743048181220f4c31357e17c9fb5255a680738
SHA512115f1a4b634b209608c970668ab4464c57cdfeb892695a449846e45b891615c0123b40f825e03f7122885cbcaf0aa24964121f59f1e4e1bc97190c06e96ba43c
-
C:\Users\Admin\AppData\Local\Packages\microsoft.microsoftedge_8wekyb3d8bbwe\AC\MicrosoftEdge\User\Default\DataStore\Data\nouser1\120712-0049\DBStore\LogFiles\edb.log
Filesize512KB
MD57d4778ec8e2dfb8d1ce22a2600e425f9
SHA1899cb399fe4a2629367e3a737b936abe2115baf1
SHA25613c17856ca55d862c8cb0c1a09ded282ba19b1946219430a5873cf8271c4c987
SHA5121b586612f827ad6d62b32bf66f9cd3ab1aaf27f084163481864c3364f9e2a5fd7d2d3c848d0b482ac4563e83e66deea0067288fb47c23ebf23d708ff269d94ae
-
C:\Users\Admin\AppData\Local\Packages\microsoft.microsoftedge_8wekyb3d8bbwe\AC\MicrosoftEdge\User\Default\DataStore\Data\nouser1\120712-0049\DBStore\LogFiles\edb.log
Filesize512KB
MD53bd8a031c97253faf0ac57b4d3e4c27e
SHA1890c26c957392fd8824a3911a361b9dafdca92d2
SHA256176e152dab22fca361e624c6588851ffdcccd2516e08917e47faead3c034be56
SHA512375f7b083b58850a9b3c1828418118123796ce410d322a0ebd4255ebcab415a4ee7ad67d634f7fa22b38f44497e710de97c9be49c99369e113c7334a52bb5f53
-
C:\Users\Admin\AppData\Local\Packages\microsoft.microsoftedge_8wekyb3d8bbwe\AC\MicrosoftEdge\User\Default\DataStore\Data\nouser1\120712-0049\DBStore\edb.chk
Filesize8KB
MD5e83b19431a7d950f646455bc1b7baafa
SHA180b779f92737512ae568c14e47a75af1ee445f37
SHA25609d2a567c591ca88ce03f164ed6f44012b9dc2db6b4f4c44d5f709cf97ecfd78
SHA5129ec0efe1b1a0f3a841f8c16babe1afff1b0c4ddf3aecaf4695a397eac6cb22ada77becfbd49ce9fed3598ee3d79635e0c88c8408c4bd0db6f57f5fa9568de008
-
C:\Users\Admin\AppData\Local\Packages\microsoft.microsoftedge_8wekyb3d8bbwe\AC\MicrosoftEdge\User\Default\DataStore\Data\nouser1\120712-0049\DBStore\edb.chk
Filesize8KB
MD51e67a45045786da8ac4031b2a27bdf4f
SHA175b9386cc723aeff8353fb73859f70523d8e02b2
SHA256eac679d4d1c38cca59194442b867cae1bdd40fdae9296865b723603a31b39ea5
SHA5128f93309c3f7dd29a2b00c3776895c0b84d091205e9162b1c2016a55d4c4eff0f2a6834ffdf03b98ccdab1267eb3e645e41622f656b8149193e3a9210326b839d
-
C:\Users\Admin\AppData\Local\Packages\microsoft.microsoftedge_8wekyb3d8bbwe\AC\MicrosoftEdge\User\Default\DataStore\Data\nouser1\120712-0049\DBStore\edb.chk
Filesize8KB
MD5e53742999d176c119178042951ccea23
SHA198bb0c0ff73e5bc1666699cc8e5f121b2ae73b7f
SHA256e4533fbf813b1b994159658e890a3c2a1b78f0a674988b97d8626653a70401e4
SHA5122da629d6a31e56aff27cb2b39c9c67b4da44f0cb79e6ee01b90f61339fe573095d1162c70f0624be172a0df22927eb6e0852ecfbb0b1a7e49791712f2563c737
-
C:\Users\Admin\AppData\Local\Packages\microsoft.microsoftedge_8wekyb3d8bbwe\AC\MicrosoftEdge\User\Default\DataStore\Data\nouser1\120712-0049\DBStore\spartan.edb
Filesize2.0MB
MD5b353fa6f4fc4127fd23224345a38df6e
SHA1d21f96124f202dabd26610295767e5c58fe580ce
SHA2561c0884abf0cca04b0e318a7aaf131beaefbe7dc51a73d0ba211c9c93f76cbd22
SHA5126d038ea66b00d99f8d376098513c0e8d1773b3b30a3b68b655bf42e239f04675c12b906004386bb05965f523cbc4289732a7a96715de34c5dab11e9639fe101a
-
C:\Users\Admin\AppData\Local\Packages\microsoft.microsoftedge_8wekyb3d8bbwe\AC\MicrosoftEdge\User\Default\DataStore\Data\nouser1\120712-0049\DBStore\spartan.edb
Filesize2.0MB
MD51f34278c240ea061d75245f50284a618
SHA10f4a9930bf380a3a4c357c07cfa9701d3753a6e9
SHA256053b7e9a6c784cc8bc23ccbbab824f27ba56f8342fac5b21187a06c8e6953e18
SHA512c28640f43be70d08d07cb0e09428dd977d78590167532262db62b727c31f29b394c8f8d2f1975b076b3926dff14ff26c6b349be8d688899de2432e02ce63e4a8
-
C:\Users\Admin\AppData\Local\Packages\microsoft.microsoftedge_8wekyb3d8bbwe\AC\MicrosoftEdge\User\Default\DataStore\Data\nouser1\120712-0049\DBStore\spartan.edb
Filesize2.0MB
MD53a7b35357167ef9127752456cf3f570d
SHA1a65a5fcf1a56c76e15754dcc25357869210fae72
SHA2565690425bacf0db406307b3104903a2fc1016f0a3434a62fa5307791010ea7ae8
SHA512650c5969a0ec878455fc9b4b7a8425ba04e3b7179cb13c4e3ef46117cb991b57dba246df94f3d0f592c40f09660fe4bea1d4fe644f3d91ca7bf7e7c4f2ee318e
-
C:\Users\Admin\AppData\Local\Packages\microsoft.microsoftedge_8wekyb3d8bbwe\AC\MicrosoftEdge\User\Default\DataStore\Data\nouser1\120712-0049\DBStore\spartan.jfm
Filesize16KB
MD5348c98b4bde1b04eddd7cb8576e754cb
SHA196e9fb5f64c12a207463049b3765fc20cfab4eb7
SHA2567a2f0e160b72271ce9f6ca498d58d16befda1e60af0231a4ea308a3edf447fc2
SHA512005c2d9a1d3fa3873b3cf7d8a7c5b6866110105158a70e21d8e2f7c1f08eb3bfe28a62cb1a9cd9912b6a36de39bd77da30be5b95874709e2754dbd25bc60a648
-
C:\Users\Admin\AppData\Local\Packages\microsoft.microsoftedge_8wekyb3d8bbwe\AC\MicrosoftEdge\User\Default\DataStore\Data\nouser1\120712-0049\DBStore\spartan.jfm
Filesize16KB
MD540f73ea38fa3d7130d8e54e9ca1013f4
SHA176a436f57a437f2b0d37f532d1c9c48b3caecf87
SHA256dca8c0b2d0a9e6ade1e434f567b5d9f436cdbebd9ff80f0e011aa4b24cd397e0
SHA512204ffebb3de48cd06b788c23e2dba300e8b281f07783b8fca576f755bd10d3b55beeb6c9413bbcbbc011fc7a1405b00d5763a2fdeec41532f8ae0c4c4fac9c2b
-
C:\Users\Admin\AppData\Local\Packages\microsoft.microsoftedge_8wekyb3d8bbwe\AC\MicrosoftEdge\User\Default\DataStore\Data\nouser1\120712-0049\DBStore\spartan.jfm
Filesize16KB
MD5842c402d61985937b1e9f8a492ebcbc6
SHA18d2d2457ac4b152a4d094f2d784d9c41f3f17977
SHA25656d793536df02e58b5e1d521d4be60773a1e2cba1c97d8ce8a7954b6aa2adb17
SHA512aa2491e02e00b1f1ee12294b9c528b77f61c5ca699e3e5d897fc7e3efa4734c1f487be7442baa59869d3ef51e3457c9a0d3bcf96e91c3b11eb7234ecb8013195
-
C:\Users\Admin\AppData\Local\Packages\microsoft.microsoftedge_8wekyb3d8bbwe\AC\MicrosoftEdge\User\Default\ImageStore\qw15bsy\imagestore.dat
Filesize1KB
MD547d847ba3fa24684284549782c29db8b
SHA1ab370bf8e01834456e09db00b8bff6aff45c7e70
SHA2568a0f345910e5524b229532b67366eb29f09fe67d47b38c4e905794211e6a4f27
SHA512329e3d6781ff5f598f60f3171826b23b6f7bb5c9d162018a79168cee569bced10fef602abb83a8afd7f1c144383c038a2a4e444cf9ce066ed9094efb64c1af66
-
C:\Users\Admin\AppData\Local\Packages\microsoft.microsoftedge_8wekyb3d8bbwe\AC\MicrosoftEdge\User\Default\Recovery\Active\RecoveryStore.{C8669E89-FB0E-4362-9D95-BED7EB5BC910}.dat
Filesize5KB
MD5f11da0406110236c33aa0aa69c286b74
SHA18654b6c48a1e0e3c6424e19fb637b57dd18c60da
SHA256c5a98f660044858c13c9281edfc4b8bea03c2efe30339c3d2f61efd2bf27bb76
SHA51268f083edc5bde0bd066132cff97cc92645dff20769d2bfb3ab60f042fe0ff7b982cc9b30baf856d81a83f49cf8e5012404b93400f05558bd3e637cb55eba021a
-
C:\Users\Admin\AppData\Local\Packages\microsoft.microsoftedge_8wekyb3d8bbwe\AC\MicrosoftEdge\User\Default\Recovery\Active\RecoveryStore.{D75FF9EB-CA55-40D3-B59F-8A82C5DBC563}.dat
Filesize4KB
MD5fad189db756703fcfe3d152389ce2411
SHA178f4dd8f6ed9e35c611d99930214ef77c9ac83ed
SHA256efcaf1b385b0f06b5cfda0377fe8c79decb650bba0bc276f59a6ed2dcf2b27de
SHA51264c8ecc705af149f7a9fcb5a4e6dd1794ea68ca75692938af2c76a97af0620e7823b795651fd963818308348abf634f19bd82492b33a8704d2f5b94886968a14
-
C:\Users\Admin\AppData\Local\Packages\microsoft.microsoftedge_8wekyb3d8bbwe\AC\MicrosoftEdge\User\Default\Recovery\Active\RecoveryStore.{DEDBE4A4-2C12-46BF-8364-38BB9358562C}.dat
Filesize5KB
MD5470b7f86dc1c39f61dc7f19f7b036996
SHA103ef7766fc477fbb0f7e6c1cc857ee1eb947103a
SHA256d4ce1ac70aa0cfa2db6b8e465bc799123df6ff353848fb6110e56d92ec8838b5
SHA5120da4a1c01597b3949d5c32e562e8357b3475b2db67498d6773714053a6632fb6d9524641d2a82f48e3ad3066dfe467f2a391faaa2c037556877b3fd53780d2f6
-
C:\Users\Admin\AppData\Local\Packages\microsoft.microsoftedge_8wekyb3d8bbwe\AC\MicrosoftEdge\User\Default\Recovery\Active\{0A3F8E3D-C6BE-4D38-AD1C-CBAF86F39887}.dat
Filesize6KB
MD59ebed3bdf8c054f1eb163359f0f5e213
SHA194cf611b306dce261c3bdd6faca9e4b30bf77b65
SHA2561ef9ce21f5cb2a19105aa875dc05a5ffb8d0a5898c022891c8f2c3067c25cb9d
SHA512a2165b457ce28fc713799f0460da722282f623a06900ea0a1b46132e2046cff9bca2bd27320b2fd57e8eeb6499582c6b5f7e2d6d39cf3e891b1474003ca946b7
-
C:\Users\Admin\AppData\Local\Packages\microsoft.microsoftedge_8wekyb3d8bbwe\AC\MicrosoftEdge\User\Default\Recovery\Active\{184165FA-FB92-4866-9A48-2F94AB317131}.dat
Filesize4KB
MD5d7aab95615ac8c438094f5dbc51899a2
SHA1e3faa969e9425bdc5cf52a079960b5be27c2787e
SHA2564baa7c5a88b1b9b9a5d8e41dabfe3710b0cf53ff86660c1b3ab01737cdae1c51
SHA512b37a84387f8551c7dcf4adf05fa7816b363bee629e0625c1db0eee925353d0ccc3d2b1b51e8e06939079e5c9b1369ccff63ece4f2354ce8f4e80b1f45646be8a
-
C:\Users\Admin\AppData\Local\Packages\microsoft.microsoftedge_8wekyb3d8bbwe\AC\MicrosoftEdge\User\Default\Recovery\Active\{E9A3B485-89E4-4A9B-B19A-2CC18584C08D}.dat
Filesize4KB
MD503c17130c47dcdf91832e1490f8f7b71
SHA1ec0ebf2c8f3408b421db606019435b408178c02b
SHA25670b2cd01d7060085ad2ffd991dff5695a0b467b32dce8dd5e0a89d7b3e96ef1c
SHA512c41fe8281a7baefbc47ac8e4bcdee69e64a43b6a8da2f95f9a9dcf78b9e0d5f18318f6a9e889157b7541a71a2c94498316620db88a2c2250b744210dfdcfedb6
-
C:\Users\Admin\AppData\Local\Packages\microsoft.microsoftedge_8wekyb3d8bbwe\AC\MicrosoftEdge\User\Default\Recovery\Active\{EA6802F1-8D18-4876-82BA-807B76A15E59}.dat
Filesize15KB
MD5ac8218a5cac9b2b5772ac94d33f2fec3
SHA11da30e29c2711730739e10ce195b67bd8433a82e
SHA256d7693d6fc182fccee6dc9894361bf36ac27aa89a56d0a04223293cb226791204
SHA51204bb9b0e4e53a414d6f2ee07444320dd069d89e348c4c77866dadd05956c8b1cd58b3937356bd2b5e832d449bd2581a046d93ba1d3c48a58e64aeda8b7133abc
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\je1358xf.default-release\datareporting\glean\db\data.safe.bin
Filesize2KB
MD5bfcc96bc37883cc79fe1824fceb23e2e
SHA1a3333d232735b540eadae3f70d4e0806ba2819fc
SHA2563d31c12d386a43fb4a673933108e5a40903429b74773dd35aa8ab406540347b6
SHA512a0345e268a7a4be919e5f561d7bdc54292e522f96635f4f37f9cc3907a57fb889e64c34e739aa9215959349a7bd3c71387da8dae7852bfb0d0d2a2da8cdb7481
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\je1358xf.default-release\datareporting\glean\pending_pings\ab88d32e-4667-4f61-a52c-a83247f9336e
Filesize746B
MD514d4ad27303717aab3b77944b47584d5
SHA16c7b92840587ddffdeae40a1eb8533def51a762a
SHA256073987a185a21b08c929e37513c89063da6d0137bc89be4d63f6280e1bf309e7
SHA512c698c7c3a3b2e0cac86a86f55ff9655a88d8e2e0e72c60af9fac6e119f574f87c65137517e00a8bd5b4a79f273797b4bda63511ba2b0e0859a27bd165a8c2079
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\je1358xf.default-release\datareporting\glean\pending_pings\e600857f-8417-47e7-8995-c57ff7cd4cbd
Filesize10KB
MD59432c8368ea13221a7d21c4298806248
SHA1f4c1b68df2a3d7e79cf69fcac69153e70639e8dc
SHA25674a23864b16e998599c98fe53c4d0023b23dd07fb720bed6467247d87d054adc
SHA512a2d040cd31480ab6533a4bfc2ec92422fcb49a9d044791cc98cf8f9b9dde63b21654f308c4d39a944c5ec968c89a1a7da160d1fe2ec457d6b07e7a9bd5a47ac4
-
Filesize
6KB
MD5feab1747eb8d6cc5549051f7b13492de
SHA1cf5fc89bfec50b8059c04c6172524dfbec80c178
SHA256ce0ad1e235cd3904f3aa28c3a74dd50fd2b43bf196acf23d5809e7e886176472
SHA51265cb143295131ba875c56fbedf977444213ba3279ce084ba511e84319ffb7821eb84c5ca097f9b40f71209369ac12cf657db3ead4c8c92d2f63a8ee6f6b745a4
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\je1358xf.default-release\sessionstore-backups\recovery.jsonlz4
Filesize1KB
MD5134a488d6a151c91df3058939778955b
SHA14520bbf4d6bd40ad6541d5daa12a459671d1310f
SHA25633452ccdce365c26dc43341c318718d488443977a37c539182ec16a72a50b414
SHA512548af99cb8d8c112608deacc92151e339d33bb1ffb1b4d4a37b9ec2ec84e341c798073e3941c1e6a00cc1297a499d64cd212df383ad1a54d083744859faea197
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\je1358xf.default-release\sessionstore-backups\recovery.jsonlz4
Filesize1KB
MD51d8ba309be5aacdbc5ae44b5d0438002
SHA1afa179f4796c371958abd929a17e68780847c4e6
SHA256c91a07da5fdb20a8a5eb52894e32c5341abb57eafc2ace78cc449bdd49cc1fa4
SHA51229ec2d9a401dc23ac37b9545c60f67b7a9113394252f74c2a376da320fdac421b5479791296af6815852d1119d323b28fe9d854626b66c1c567b402b307d8cb5
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\je1358xf.default-release\sessionstore.jsonlz4
Filesize974B
MD595d58b851e1cda9793c60ddfb2528fa1
SHA1f06fb76f274dee208ac1f15c7646d6a6c2d4b20d
SHA2566a5110d7efc7e13cc568efeca660057de9fd321e1713174c00d0b84cc8ac6a3f
SHA5125f94b5773028e999736f7b6c972a268621c618c4c81a3fe2b0814ff256b2c18859c0f53db0df50cb789bd649d6bccc184b808fcb95efa647af49107195e5bf0a
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\je1358xf.default-release\storage\permanent\chrome\idb\3870112724rsegmnoittet-es.sqlite
Filesize184KB
MD5731c0e733fe1e3123d366af7c8e578ae
SHA19756304ea773dd9cd96e5996dc79de2ed6a9ae9c
SHA2568f426b4be5e3440fa14d37480f018b7dc3d1a547b0e91c2fbfc6e31d9054a359
SHA512d29e0f2356a3226f64692b390c122d4d70f09f677d9f5d086f2babaeba6574d670171edb24ff52f928871ec489680f57910e21fac1ca8ec08783a07d21b1f427
-
Filesize
1KB
MD58d54367514e378d4d5fa94dabc83cde5
SHA11de28d53c2a9a2a7828ffecd473b93a3fd3183f5
SHA256867a2e734fa062de365b190ce93ea885da76aadae5f8877f0ef07de0bab637a6
SHA5127dcfed032ef77f16ace8f415faed99aad93b672cbf0db7f4d5a90209d43a61868215a67ee5de5f97be781d667cbaa102270903d8c31f6697dbb100d39e2a6896
-
Filesize
9.0MB
MD5e86613b3dce09c8f2dc5782e0e03be08
SHA14e47a5344fa2fa28fa44580ad209bc6cde649512
SHA256242e2392ffcbdd0e2935f27113740d15ec456933478780b34b4470a22bb64609
SHA512e33f98e0c7f20b47c8b0a8465922893f841328bb8d165b379877a9b9b64d8769ac8341adc4e69c467650da7bbe685c2c9f0e864277fc056a0a84ebae99b4e461