UCBrowser
Browsersv1
Author: Reece394
description
UCBrowser
paths
26 paths
› paths use Windows environment syntax
collection commands
# PowerShell Artifact Collection Script
# Target: UCBrowser
# Run as Administrator
#Requires -RunAsAdministrator
$ErrorActionPreference = "SilentlyContinue"
$DestBase = "D:\Evidence"
# Function to handle artifact collection with robocopy
function Collect-Artifact {
param (
[string]$SourceDir,
[string]$FolderName,
[string]$FileMask = "*"
)
$FullDest = Join-Path -Path $DestBase -ChildPath $FolderName
robocopy "$SourceDir" "$FullDest" "$FileMask" /E /COPY:DAT /R:0 /W:0 /NP /NFL /NDL /NJH /NJS | Out-Null
}
# 1. UCBrowser Bookmarks
$UserPath = Join-Path $env:USERPROFILE "AppData\Local\UCBrowser\User Data*\*\"
Collect-Artifact -SourceDir "$UserPath" -FileMask "Bookmarks*" -FolderName "UCBrowser_Bookmarks"
# 2. UCBrowser Cookies
$UserPath = Join-Path $env:USERPROFILE "AppData\Local\UCBrowser\User Data*\*\"
Collect-Artifact -SourceDir "$UserPath" -FileMask "Cookies*" -FolderName "UCBrowser_Cookies"
# 3. UCBrowser Current Session
$UserPath = Join-Path $env:USERPROFILE "AppData\Local\UCBrowser\User Data*\*\"
Collect-Artifact -SourceDir "$UserPath" -FileMask "Current Session" -FolderName "UCBrowser_Current_Session"
# 4. UCBrowser Current Tabs
$UserPath = Join-Path $env:USERPROFILE "AppData\Local\UCBrowser\User Data*\*\"
Collect-Artifact -SourceDir "$UserPath" -FileMask "Current Tabs" -FolderName "UCBrowser_Current_Tabs"
# 5. UCBrowser Download Metadata
$UserPath = Join-Path $env:USERPROFILE "AppData\Local\UCBrowser\User Data*\*\"
Collect-Artifact -SourceDir "$UserPath" -FileMask "DownloadMetadata" -FolderName "UCBrowser_Download_Metadata"
# 6. UCBrowser Extension Cookies
$UserPath = Join-Path $env:USERPROFILE "AppData\Local\UCBrowser\User Data*\*\"
Collect-Artifact -SourceDir "$UserPath" -FileMask "Extension Cookies" -FolderName "UCBrowser_Extension_Cookies"
# 7. UCBrowser Favicons
$UserPath = Join-Path $env:USERPROFILE "AppData\Local\UCBrowser\User Data*\*\"
Collect-Artifact -SourceDir "$UserPath" -FileMask "Favicons*" -FolderName "UCBrowser_Favicons"
# 8. UCBrowser History
$UserPath = Join-Path $env:USERPROFILE "AppData\Local\UCBrowser\User Data*\*\"
Collect-Artifact -SourceDir "$UserPath" -FileMask "History*" -FolderName "UCBrowser_History"
# 9. UCBrowser Last Session
$UserPath = Join-Path $env:USERPROFILE "AppData\Local\UCBrowser\User Data*\*\"
Collect-Artifact -SourceDir "$UserPath" -FileMask "Last Session" -FolderName "UCBrowser_Last_Session"
# 10. UCBrowser Last Tabs
$UserPath = Join-Path $env:USERPROFILE "AppData\Local\UCBrowser\User Data*\*\"
Collect-Artifact -SourceDir "$UserPath" -FileMask "Last Tabs" -FolderName "UCBrowser_Last_Tabs"
# 11. UCBrowser Sessions Folder
$UserPath = Join-Path $env:USERPROFILE "AppData\Local\UCBrowser\User Data*\*\Sessions\"
Collect-Artifact -SourceDir "$UserPath" -FolderName "UCBrowser_Sessions_Folder"
# 12. UCBrowser Login Data
$UserPath = Join-Path $env:USERPROFILE "AppData\Local\UCBrowser\User Data*\*\"
Collect-Artifact -SourceDir "$UserPath" -FileMask "Login Data*" -FolderName "UCBrowser_Login_Data"
# 13. UCBrowser Media History
$UserPath = Join-Path $env:USERPROFILE "AppData\Local\UCBrowser\User Data*\*\"
Collect-Artifact -SourceDir "$UserPath" -FileMask "Media History*" -FolderName "UCBrowser_Media_History"
# 14. UCBrowser Network Action Predictor
$UserPath = Join-Path $env:USERPROFILE "AppData\Local\UCBrowser\User Data*\*\"
Collect-Artifact -SourceDir "$UserPath" -FileMask "Network Action Predictor" -FolderName "UCBrowser_Network_Action_Predictor"
# 15. UCBrowser Network Persistent State
$UserPath = Join-Path $env:USERPROFILE "AppData\Local\UCBrowser\User Data*\*\"
Collect-Artifact -SourceDir "$UserPath" -FileMask "Network Persistent State" -FolderName "UCBrowser_Network_Persistent_State"
# 16. UCBrowser Preferences
$UserPath = Join-Path $env:USERPROFILE "AppData\Local\UCBrowser\User Data*\*\"
Collect-Artifact -SourceDir "$UserPath" -FileMask "Preferences" -FolderName "UCBrowser_Preferences"
# 17. UCBrowser Quota Manager
$UserPath = Join-Path $env:USERPROFILE "AppData\Local\UCBrowser\User Data*\*\"
Collect-Artifact -SourceDir "$UserPath" -FileMask "QuotaManager" -FolderName "UCBrowser_Quota_Manager"
# 18. UCBrowser Reporting and NEL
$UserPath = Join-Path $env:USERPROFILE "AppData\Local\UCBrowser\User Data*\*\"
Collect-Artifact -SourceDir "$UserPath" -FileMask "Reporting and NEL" -FolderName "UCBrowser_Reporting_and_NEL"
# 19. UCBrowser Shortcuts
$UserPath = Join-Path $env:USERPROFILE "AppData\Local\UCBrowser\User Data*\*\"
Collect-Artifact -SourceDir "$UserPath" -FileMask "Shortcuts*" -FolderName "UCBrowser_Shortcuts"
# 20. UCBrowser Top Sites
$UserPath = Join-Path $env:USERPROFILE "AppData\Local\UCBrowser\User Data*\*\"
Collect-Artifact -SourceDir "$UserPath" -FileMask "Top Sites*" -FolderName "UCBrowser_Top_Sites"
# 21. UCBrowser Trust Tokens
$UserPath = Join-Path $env:USERPROFILE "AppData\Local\UCBrowser\User Data*\*\"
Collect-Artifact -SourceDir "$UserPath" -FileMask "Trust Tokens*" -FolderName "UCBrowser_Trust_Tokens"
# 22. UCBrowser SyncData Database
$UserPath = Join-Path $env:USERPROFILE "AppData\Local\UCBrowser\User Data*\*\Sync Data"
Collect-Artifact -SourceDir "$UserPath" -FolderName "UCBrowser_SyncData_Database"
# 23. UCBrowser Visited Links
$UserPath = Join-Path $env:USERPROFILE "AppData\Local\UCBrowser\User Data*\*\"
Collect-Artifact -SourceDir "$UserPath" -FileMask "Visited Links" -FolderName "UCBrowser_Visited_Links"
# 24. UCBrowser Web Data
$UserPath = Join-Path $env:USERPROFILE "AppData\Local\UCBrowser\User Data*\*\"
Collect-Artifact -SourceDir "$UserPath" -FileMask "Web Data*" -FolderName "UCBrowser_Web_Data"
# 25. Windows Protect Folder
$UserPath = Join-Path $env:USERPROFILE "AppData\Roaming\Microsoft\Protect\*\"
Collect-Artifact -SourceDir "$UserPath" -FolderName "Windows_Protect_Folder"
# 26. UCBrowser Snapshots Folder
$UserPath = Join-Path $env:USERPROFILE "AppData\Local\UCBrowser\User Data*\Snapshots\*\"
Collect-Artifact -SourceDir "$UserPath" -FolderName "UCBrowser_Snapshots_Folder"
Write-Host "Collection complete!" -ForegroundColor Green› Save as .ps1 and run as Administrator. Use: powershell -ExecutionPolicy Bypass -File script.ps1
› cyberchef recipes
Open in CyberChef to decode values extracted from this artifact.