Analysis
-
max time kernel
42s -
max time network
45s -
platform
windows11-21h2_x64 -
resource
win11-20240730-en -
resource tags
arch:x64arch:x86image:win11-20240730-enlocale:en-usos:windows11-21h2-x64system -
submitted
01-08-2024 05:21
Static task
static1
Behavioral task
behavioral1
Sample
MindWork.AI.Studio_x64-setup.exe
Resource
win11-20240730-en
Behavioral task
behavioral2
Sample
MindWork AI Studio.exe
Resource
win11-20240730-en
Behavioral task
behavioral3
Sample
uninstall.exe
Resource
win11-20240730-en
General
-
Target
MindWork.AI.Studio_x64-setup.exe
-
Size
13.4MB
-
MD5
606c1c9df78ce39c0a05d3ec2a5aed63
-
SHA1
15e37834e6195ecc6976d0f647f66526b15d957e
-
SHA256
f655576465177916f3f010f439dbfd092ae31c0bbe851e6fa83b8bdb6716f16d
-
SHA512
97060a2ce59c67b51428d1c94bb432c3fe3a3408c8a808ef3db344641a07899b23722505fe62c0584d7aff1374964023e0999bb645276a9e90d3a2dfbbf7e931
-
SSDEEP
393216:hKc2/TitCdYNavGdtD7AsbnqoDrn/baFCr1xJ7HR:hWLikdUZdtDDz/Ggr1/HR
Malware Config
Signatures
-
Suspicious use of NtCreateUserProcessOtherParentProcess 1 IoCs
Processes:
MindWork.AI.Studio_x64-setup.exedescription pid process target process PID 2864 created 3304 2864 MindWork.AI.Studio_x64-setup.exe Explorer.EXE -
Executes dropped EXE 4 IoCs
Processes:
MindWork AI Studio.exemindworkAIStudioServer.exeMindWork AI Studio.exemindworkAIStudioServer.exepid process 1792 MindWork AI Studio.exe 4896 mindworkAIStudioServer.exe 3816 MindWork AI Studio.exe 224 mindworkAIStudioServer.exe -
Loads dropped DLL 5 IoCs
Processes:
MindWork.AI.Studio_x64-setup.exepid process 2864 MindWork.AI.Studio_x64-setup.exe 2864 MindWork.AI.Studio_x64-setup.exe 2864 MindWork.AI.Studio_x64-setup.exe 2864 MindWork.AI.Studio_x64-setup.exe 2864 MindWork.AI.Studio_x64-setup.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
Processes:
MindWork.AI.Studio_x64-setup.exedescription ioc process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language MindWork.AI.Studio_x64-setup.exe -
System Network Configuration Discovery: Internet Connection Discovery 1 TTPs 6 IoCs
Adversaries may check for Internet connectivity on compromised systems.
Processes:
msedgewebview2.exemsedgewebview2.exemsedgewebview2.exemsedgewebview2.exemsedgewebview2.exemsedgewebview2.exepid process 1448 msedgewebview2.exe 1092 msedgewebview2.exe 3092 msedgewebview2.exe 3344 msedgewebview2.exe 3608 msedgewebview2.exe 3120 msedgewebview2.exe -
Enumerates system info in registry 2 TTPs 6 IoCs
Processes:
msedgewebview2.exemsedgewebview2.exedescription ioc process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedgewebview2.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedgewebview2.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedgewebview2.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedgewebview2.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedgewebview2.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedgewebview2.exe -
Suspicious behavior: EnumeratesProcesses 6 IoCs
Processes:
MindWork.AI.Studio_x64-setup.exemsedgewebview2.exemsedgewebview2.exepid process 2864 MindWork.AI.Studio_x64-setup.exe 2864 MindWork.AI.Studio_x64-setup.exe 2196 msedgewebview2.exe 2196 msedgewebview2.exe 2340 msedgewebview2.exe 2340 msedgewebview2.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 2 IoCs
Processes:
msedgewebview2.exemsedgewebview2.exepid process 3428 msedgewebview2.exe 756 msedgewebview2.exe -
Suspicious use of FindShellTrayWindow 6 IoCs
Processes:
MindWork AI Studio.exemsedgewebview2.exeMindWork AI Studio.exemsedgewebview2.exepid process 1792 MindWork AI Studio.exe 3428 msedgewebview2.exe 3428 msedgewebview2.exe 3816 MindWork AI Studio.exe 756 msedgewebview2.exe 756 msedgewebview2.exe -
Suspicious use of WriteProcessMemory 64 IoCs
Processes:
MindWork.AI.Studio_x64-setup.exeMindWork AI Studio.exemsedgewebview2.exedescription pid process target process PID 2864 wrote to memory of 1792 2864 MindWork.AI.Studio_x64-setup.exe MindWork AI Studio.exe PID 2864 wrote to memory of 1792 2864 MindWork.AI.Studio_x64-setup.exe MindWork AI Studio.exe PID 1792 wrote to memory of 3428 1792 MindWork AI Studio.exe msedgewebview2.exe PID 1792 wrote to memory of 3428 1792 MindWork AI Studio.exe msedgewebview2.exe PID 3428 wrote to memory of 4456 3428 msedgewebview2.exe msedgewebview2.exe PID 3428 wrote to memory of 4456 3428 msedgewebview2.exe msedgewebview2.exe PID 1792 wrote to memory of 4896 1792 MindWork AI Studio.exe mindworkAIStudioServer.exe PID 1792 wrote to memory of 4896 1792 MindWork AI Studio.exe mindworkAIStudioServer.exe PID 3428 wrote to memory of 3092 3428 msedgewebview2.exe msedgewebview2.exe PID 3428 wrote to memory of 3092 3428 msedgewebview2.exe msedgewebview2.exe PID 3428 wrote to memory of 3092 3428 msedgewebview2.exe msedgewebview2.exe PID 3428 wrote to memory of 3092 3428 msedgewebview2.exe msedgewebview2.exe PID 3428 wrote to memory of 3092 3428 msedgewebview2.exe msedgewebview2.exe PID 3428 wrote to memory of 3092 3428 msedgewebview2.exe msedgewebview2.exe PID 3428 wrote to memory of 3092 3428 msedgewebview2.exe msedgewebview2.exe PID 3428 wrote to memory of 3092 3428 msedgewebview2.exe msedgewebview2.exe PID 3428 wrote to memory of 3092 3428 msedgewebview2.exe msedgewebview2.exe PID 3428 wrote to memory of 3092 3428 msedgewebview2.exe msedgewebview2.exe PID 3428 wrote to memory of 3092 3428 msedgewebview2.exe msedgewebview2.exe PID 3428 wrote to memory of 3092 3428 msedgewebview2.exe msedgewebview2.exe PID 3428 wrote to memory of 3092 3428 msedgewebview2.exe msedgewebview2.exe PID 3428 wrote to memory of 3092 3428 msedgewebview2.exe msedgewebview2.exe PID 3428 wrote to memory of 3092 3428 msedgewebview2.exe msedgewebview2.exe PID 3428 wrote to memory of 3092 3428 msedgewebview2.exe msedgewebview2.exe PID 3428 wrote to memory of 3092 3428 msedgewebview2.exe msedgewebview2.exe PID 3428 wrote to memory of 3092 3428 msedgewebview2.exe msedgewebview2.exe PID 3428 wrote to memory of 3092 3428 msedgewebview2.exe msedgewebview2.exe PID 3428 wrote to memory of 3092 3428 msedgewebview2.exe msedgewebview2.exe PID 3428 wrote to memory of 3092 3428 msedgewebview2.exe msedgewebview2.exe PID 3428 wrote to memory of 3092 3428 msedgewebview2.exe msedgewebview2.exe PID 3428 wrote to memory of 3092 3428 msedgewebview2.exe msedgewebview2.exe PID 3428 wrote to memory of 3092 3428 msedgewebview2.exe msedgewebview2.exe PID 3428 wrote to memory of 3092 3428 msedgewebview2.exe msedgewebview2.exe PID 3428 wrote to memory of 3092 3428 msedgewebview2.exe msedgewebview2.exe PID 3428 wrote to memory of 3092 3428 msedgewebview2.exe msedgewebview2.exe PID 3428 wrote to memory of 3092 3428 msedgewebview2.exe msedgewebview2.exe PID 3428 wrote to memory of 3092 3428 msedgewebview2.exe msedgewebview2.exe PID 3428 wrote to memory of 3092 3428 msedgewebview2.exe msedgewebview2.exe PID 3428 wrote to memory of 3092 3428 msedgewebview2.exe msedgewebview2.exe PID 3428 wrote to memory of 3092 3428 msedgewebview2.exe msedgewebview2.exe PID 3428 wrote to memory of 3092 3428 msedgewebview2.exe msedgewebview2.exe PID 3428 wrote to memory of 3092 3428 msedgewebview2.exe msedgewebview2.exe PID 3428 wrote to memory of 3092 3428 msedgewebview2.exe msedgewebview2.exe PID 3428 wrote to memory of 3092 3428 msedgewebview2.exe msedgewebview2.exe PID 3428 wrote to memory of 3092 3428 msedgewebview2.exe msedgewebview2.exe PID 3428 wrote to memory of 3092 3428 msedgewebview2.exe msedgewebview2.exe PID 3428 wrote to memory of 3092 3428 msedgewebview2.exe msedgewebview2.exe PID 3428 wrote to memory of 3092 3428 msedgewebview2.exe msedgewebview2.exe PID 3428 wrote to memory of 2196 3428 msedgewebview2.exe msedgewebview2.exe PID 3428 wrote to memory of 2196 3428 msedgewebview2.exe msedgewebview2.exe PID 3428 wrote to memory of 3344 3428 msedgewebview2.exe msedgewebview2.exe PID 3428 wrote to memory of 3344 3428 msedgewebview2.exe msedgewebview2.exe PID 3428 wrote to memory of 3344 3428 msedgewebview2.exe msedgewebview2.exe PID 3428 wrote to memory of 3344 3428 msedgewebview2.exe msedgewebview2.exe PID 3428 wrote to memory of 3344 3428 msedgewebview2.exe msedgewebview2.exe PID 3428 wrote to memory of 3344 3428 msedgewebview2.exe msedgewebview2.exe PID 3428 wrote to memory of 3344 3428 msedgewebview2.exe msedgewebview2.exe PID 3428 wrote to memory of 3344 3428 msedgewebview2.exe msedgewebview2.exe PID 3428 wrote to memory of 3344 3428 msedgewebview2.exe msedgewebview2.exe PID 3428 wrote to memory of 3344 3428 msedgewebview2.exe msedgewebview2.exe PID 3428 wrote to memory of 3344 3428 msedgewebview2.exe msedgewebview2.exe PID 3428 wrote to memory of 3344 3428 msedgewebview2.exe msedgewebview2.exe PID 3428 wrote to memory of 3344 3428 msedgewebview2.exe msedgewebview2.exe PID 3428 wrote to memory of 3344 3428 msedgewebview2.exe msedgewebview2.exe
Processes
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵PID:3304
-
C:\Users\Admin\AppData\Local\Temp\MindWork.AI.Studio_x64-setup.exe"C:\Users\Admin\AppData\Local\Temp\MindWork.AI.Studio_x64-setup.exe"2⤵
- Suspicious use of NtCreateUserProcessOtherParentProcess
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2864
-
-
C:\Users\Admin\AppData\Local\MindWork AI Studio\MindWork AI Studio.exeC:\Users\Admin\AppData\Local\MindWork AI Studio\MindWork AI Studio.exe2⤵
- Executes dropped EXE
- Suspicious use of FindShellTrayWindow
- Suspicious use of WriteProcessMemory
PID:1792 -
C:\Users\Admin\AppData\Local\MindWork AI Studio\mindworkAIStudioServer.exe"\\?\C:\Users\Admin\AppData\Local\MindWork AI Studio\mindworkAIStudioServer.exe" 498283⤵
- Executes dropped EXE
PID:4896
-
-
C:\Program Files (x86)\Microsoft\EdgeWebView\Application\90.0.818.66\msedgewebview2.exe"C:\Program Files (x86)\Microsoft\EdgeWebView\Application\90.0.818.66\msedgewebview2.exe" --embedded-browser-webview=1 --webview-exe-name="MindWork AI Studio.exe" --webview-exe-version=0.8.5 --user-data-dir="C:\Users\Admin\AppData\Local\com.github.mindwork-ai.ai-studio\EBWebView" --no-default-browser-check --disable-component-extensions-with-background-pages --no-first-run --disable-default-apps --noerrdialogs --embedded-browser-webview-dpi-awareness=2 --disable-features=msWebOOUI,msPdfOOUI,msSmartScreenProtection --disable-popup-blocking --internet-explorer-integration=none --js-flags="--harmony-weak-refs-with-cleanup-some --expose-gc" --lang=en-US --mojo-named-platform-channel-pipe=1792.464.81758314800216648423⤵
- Enumerates system info in registry
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of WriteProcessMemory
PID:3428 -
C:\Program Files (x86)\Microsoft\EdgeWebView\Application\90.0.818.66\msedgewebview2.exe"C:\Program Files (x86)\Microsoft\EdgeWebView\Application\90.0.818.66\msedgewebview2.exe" --type=crashpad-handler --user-data-dir=C:\Users\Admin\AppData\Local\com.github.mindwork-ai.ai-studio\EBWebView /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler --database=C:\Users\Admin\AppData\Local\com.github.mindwork-ai.ai-studio\EBWebView\Crashpad --metrics-dir=C:\Users\Admin\AppData\Local\com.github.mindwork-ai.ai-studio\EBWebView --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=90.0.4430.212 "--annotation=exe=C:\Program Files (x86)\Microsoft\EdgeWebView\Application\90.0.818.66\msedgewebview2.exe" --annotation=plat=Win64 "--annotation=prod=Edge WebView2" --annotation=ver=90.0.818.66 --initial-client-data=0x104,0x108,0x10c,0xe0,0x1b4,0x7ff9ac5a3cb8,0x7ff9ac5a3cc8,0x7ff9ac5a3cd84⤵PID:4456
-
-
C:\Program Files (x86)\Microsoft\EdgeWebView\Application\90.0.818.66\msedgewebview2.exe"C:\Program Files (x86)\Microsoft\EdgeWebView\Application\90.0.818.66\msedgewebview2.exe" --type=gpu-process --field-trial-handle=1760,3307134432635880212,12955751701211883903,131072 --enable-features=ForwardMemoryPressureEventsToGpuProcess,UseSwapChainsInSoftware --disable-features=FilterAdsOnAbusiveSites,SpareRendererForSitePerProcess,WebPayments,msApplicationGuard,msAutomaticTabFreeze,msBrowserSettingsSupported,msEdgeFaviconService,msEdgeLinkDoctor,msEdgeMGPFrev1,msEdgeOnRampFRE,msEdgeOnRampImport,msEdgeReadingView,msEdgeSettingsImport,msEdgeSettingsImportV2,msEdgeShoppingUI,msEdgeTranslate,msEdgeUseCaptivePortalService,msImplicitSignin,msPasswordBreachDetection,msPdfOOUI,msReadAloud,msRevokeExtensions,msSendClientDataHeader,msSendClientDataHeaderToEdgeServices,msSmartScreenProtection,msSyncEdgeCollections,msUseLabelingService,msWebAssistHistorySearch,msWebOOUI --noerrdialogs --user-data-dir="C:\Users\Admin\AppData\Local\com.github.mindwork-ai.ai-studio\EBWebView" --webview-exe-name="MindWork AI Studio.exe" --webview-exe-version=0.8.5 --embedded-browser-webview=1 --embedded-browser-webview-dpi-awareness=2 --gpu-preferences=SAAAAAAAAADgAAAwAAAAAAAAAAAAAAAAAABgAAAAAAAoAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAB4AAAAAAAAAHgAAAAAAAAAKAAAAAQAAAAgAAAAAAAAACgAAAAAAAAAMAAAAAAAAAA4AAAAAAAAABAAAAAAAAAAAAAAAAUAAAAQAAAAAAAAAAAAAAAGAAAAEAAAAAAAAAABAAAABQAAABAAAAAAAAAAAQAAAAYAAAAIAAAAAAAAAAgAAAAAAAAA --mojo-platform-channel-handle=1808 /prefetch:24⤵
- System Network Configuration Discovery: Internet Connection Discovery
PID:3092
-
-
C:\Program Files (x86)\Microsoft\EdgeWebView\Application\90.0.818.66\msedgewebview2.exe"C:\Program Files (x86)\Microsoft\EdgeWebView\Application\90.0.818.66\msedgewebview2.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=1760,3307134432635880212,12955751701211883903,131072 --enable-features=ForwardMemoryPressureEventsToGpuProcess,UseSwapChainsInSoftware --disable-features=FilterAdsOnAbusiveSites,SpareRendererForSitePerProcess,WebPayments,msApplicationGuard,msAutomaticTabFreeze,msBrowserSettingsSupported,msEdgeFaviconService,msEdgeLinkDoctor,msEdgeMGPFrev1,msEdgeOnRampFRE,msEdgeOnRampImport,msEdgeReadingView,msEdgeSettingsImport,msEdgeSettingsImportV2,msEdgeShoppingUI,msEdgeTranslate,msEdgeUseCaptivePortalService,msImplicitSignin,msPasswordBreachDetection,msPdfOOUI,msReadAloud,msRevokeExtensions,msSendClientDataHeader,msSendClientDataHeaderToEdgeServices,msSmartScreenProtection,msSyncEdgeCollections,msUseLabelingService,msWebAssistHistorySearch,msWebOOUI --lang=en-US --service-sandbox-type=none --noerrdialogs --user-data-dir="C:\Users\Admin\AppData\Local\com.github.mindwork-ai.ai-studio\EBWebView" --webview-exe-name="MindWork AI Studio.exe" --webview-exe-version=0.8.5 --embedded-browser-webview=1 --embedded-browser-webview-dpi-awareness=2 --mojo-platform-channel-handle=2080 /prefetch:34⤵
- Suspicious behavior: EnumeratesProcesses
PID:2196
-
-
C:\Program Files (x86)\Microsoft\EdgeWebView\Application\90.0.818.66\msedgewebview2.exe"C:\Program Files (x86)\Microsoft\EdgeWebView\Application\90.0.818.66\msedgewebview2.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=1760,3307134432635880212,12955751701211883903,131072 --enable-features=ForwardMemoryPressureEventsToGpuProcess,UseSwapChainsInSoftware --disable-features=FilterAdsOnAbusiveSites,SpareRendererForSitePerProcess,WebPayments,msApplicationGuard,msAutomaticTabFreeze,msBrowserSettingsSupported,msEdgeFaviconService,msEdgeLinkDoctor,msEdgeMGPFrev1,msEdgeOnRampFRE,msEdgeOnRampImport,msEdgeReadingView,msEdgeSettingsImport,msEdgeSettingsImportV2,msEdgeShoppingUI,msEdgeTranslate,msEdgeUseCaptivePortalService,msImplicitSignin,msPasswordBreachDetection,msPdfOOUI,msReadAloud,msRevokeExtensions,msSendClientDataHeader,msSendClientDataHeaderToEdgeServices,msSmartScreenProtection,msSyncEdgeCollections,msUseLabelingService,msWebAssistHistorySearch,msWebOOUI --lang=en-US --service-sandbox-type=utility --noerrdialogs --user-data-dir="C:\Users\Admin\AppData\Local\com.github.mindwork-ai.ai-studio\EBWebView" --webview-exe-name="MindWork AI Studio.exe" --webview-exe-version=0.8.5 --embedded-browser-webview=1 --embedded-browser-webview-dpi-awareness=2 --mojo-platform-channel-handle=1732 /prefetch:84⤵
- System Network Configuration Discovery: Internet Connection Discovery
PID:3344
-
-
C:\Program Files (x86)\Microsoft\EdgeWebView\Application\90.0.818.66\msedgewebview2.exe"C:\Program Files (x86)\Microsoft\EdgeWebView\Application\90.0.818.66\msedgewebview2.exe" --type=renderer --js-flags="--harmony-weak-refs-with-cleanup-some --expose-gc" --field-trial-handle=1760,3307134432635880212,12955751701211883903,131072 --enable-features=ForwardMemoryPressureEventsToGpuProcess,UseSwapChainsInSoftware --disable-features=FilterAdsOnAbusiveSites,SpareRendererForSitePerProcess,WebPayments,msApplicationGuard,msAutomaticTabFreeze,msBrowserSettingsSupported,msEdgeFaviconService,msEdgeLinkDoctor,msEdgeMGPFrev1,msEdgeOnRampFRE,msEdgeOnRampImport,msEdgeReadingView,msEdgeSettingsImport,msEdgeSettingsImportV2,msEdgeShoppingUI,msEdgeTranslate,msEdgeUseCaptivePortalService,msImplicitSignin,msPasswordBreachDetection,msPdfOOUI,msReadAloud,msRevokeExtensions,msSendClientDataHeader,msSendClientDataHeaderToEdgeServices,msSmartScreenProtection,msSyncEdgeCollections,msUseLabelingService,msWebAssistHistorySearch,msWebOOUI --lang=en-US --noerrdialogs --user-data-dir="C:\Users\Admin\AppData\Local\com.github.mindwork-ai.ai-studio\EBWebView" --webview-exe-name="MindWork AI Studio.exe" --webview-exe-version=0.8.5 --embedded-browser-webview=1 --embedded-browser-webview-dpi-awareness=2 --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=2948 /prefetch:14⤵
- System Network Configuration Discovery: Internet Connection Discovery
PID:3608
-
-
-
-
C:\Users\Admin\AppData\Local\MindWork AI Studio\MindWork AI Studio.exe"C:\Users\Admin\AppData\Local\MindWork AI Studio\MindWork AI Studio.exe"2⤵
- Executes dropped EXE
- Suspicious use of FindShellTrayWindow
PID:3816 -
C:\Users\Admin\AppData\Local\MindWork AI Studio\mindworkAIStudioServer.exe"\\?\C:\Users\Admin\AppData\Local\MindWork AI Studio\mindworkAIStudioServer.exe" 500213⤵
- Executes dropped EXE
PID:224
-
-
C:\Program Files (x86)\Microsoft\EdgeWebView\Application\90.0.818.66\msedgewebview2.exe"C:\Program Files (x86)\Microsoft\EdgeWebView\Application\90.0.818.66\msedgewebview2.exe" --embedded-browser-webview=1 --webview-exe-name="MindWork AI Studio.exe" --webview-exe-version=0.8.5 --user-data-dir="C:\Users\Admin\AppData\Local\com.github.mindwork-ai.ai-studio\EBWebView" --no-default-browser-check --disable-component-extensions-with-background-pages --no-first-run --disable-default-apps --noerrdialogs --embedded-browser-webview-dpi-awareness=2 --disable-features=msWebOOUI,msPdfOOUI,msSmartScreenProtection --disable-popup-blocking --internet-explorer-integration=none --js-flags="--harmony-weak-refs-with-cleanup-some --expose-gc" --lang=en-US --mojo-named-platform-channel-pipe=3816.3468.179026813806474523963⤵
- Enumerates system info in registry
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
PID:756 -
C:\Program Files (x86)\Microsoft\EdgeWebView\Application\90.0.818.66\msedgewebview2.exe"C:\Program Files (x86)\Microsoft\EdgeWebView\Application\90.0.818.66\msedgewebview2.exe" --type=crashpad-handler --user-data-dir=C:\Users\Admin\AppData\Local\com.github.mindwork-ai.ai-studio\EBWebView /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler --database=C:\Users\Admin\AppData\Local\com.github.mindwork-ai.ai-studio\EBWebView\Crashpad --metrics-dir=C:\Users\Admin\AppData\Local\com.github.mindwork-ai.ai-studio\EBWebView --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=90.0.4430.212 "--annotation=exe=C:\Program Files (x86)\Microsoft\EdgeWebView\Application\90.0.818.66\msedgewebview2.exe" --annotation=plat=Win64 "--annotation=prod=Edge WebView2" --annotation=ver=90.0.818.66 --initial-client-data=0x124,0x128,0x12c,0x100,0x1d4,0x7ff9ac5a3cb8,0x7ff9ac5a3cc8,0x7ff9ac5a3cd84⤵PID:4832
-
-
C:\Program Files (x86)\Microsoft\EdgeWebView\Application\90.0.818.66\msedgewebview2.exe"C:\Program Files (x86)\Microsoft\EdgeWebView\Application\90.0.818.66\msedgewebview2.exe" --type=gpu-process --field-trial-handle=1724,15746972746287684756,6360722194606182145,131072 --enable-features=ForwardMemoryPressureEventsToGpuProcess,UseSwapChainsInSoftware --disable-features=FilterAdsOnAbusiveSites,SpareRendererForSitePerProcess,WebPayments,msApplicationGuard,msAutomaticTabFreeze,msBrowserSettingsSupported,msEdgeFaviconService,msEdgeLinkDoctor,msEdgeMGPFrev1,msEdgeOnRampFRE,msEdgeOnRampImport,msEdgeReadingView,msEdgeSettingsImport,msEdgeSettingsImportV2,msEdgeShoppingUI,msEdgeTranslate,msEdgeUseCaptivePortalService,msImplicitSignin,msPasswordBreachDetection,msPdfOOUI,msReadAloud,msRevokeExtensions,msSendClientDataHeader,msSendClientDataHeaderToEdgeServices,msSmartScreenProtection,msSyncEdgeCollections,msUseLabelingService,msWebAssistHistorySearch,msWebOOUI --noerrdialogs --user-data-dir="C:\Users\Admin\AppData\Local\com.github.mindwork-ai.ai-studio\EBWebView" --webview-exe-name="MindWork AI Studio.exe" --webview-exe-version=0.8.5 --embedded-browser-webview=1 --embedded-browser-webview-dpi-awareness=2 --gpu-preferences=SAAAAAAAAADgAAAwAAAAAAAAAAAAAAAAAABgAAAAAAAoAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAB4AAAAAAAAAHgAAAAAAAAAKAAAAAQAAAAgAAAAAAAAACgAAAAAAAAAMAAAAAAAAAA4AAAAAAAAABAAAAAAAAAAAAAAAAUAAAAQAAAAAAAAAAAAAAAGAAAAEAAAAAAAAAABAAAABQAAABAAAAAAAAAAAQAAAAYAAAAIAAAAAAAAAAgAAAAAAAAA --mojo-platform-channel-handle=1748 /prefetch:24⤵
- System Network Configuration Discovery: Internet Connection Discovery
PID:3120
-
-
C:\Program Files (x86)\Microsoft\EdgeWebView\Application\90.0.818.66\msedgewebview2.exe"C:\Program Files (x86)\Microsoft\EdgeWebView\Application\90.0.818.66\msedgewebview2.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=1724,15746972746287684756,6360722194606182145,131072 --enable-features=ForwardMemoryPressureEventsToGpuProcess,UseSwapChainsInSoftware --disable-features=FilterAdsOnAbusiveSites,SpareRendererForSitePerProcess,WebPayments,msApplicationGuard,msAutomaticTabFreeze,msBrowserSettingsSupported,msEdgeFaviconService,msEdgeLinkDoctor,msEdgeMGPFrev1,msEdgeOnRampFRE,msEdgeOnRampImport,msEdgeReadingView,msEdgeSettingsImport,msEdgeSettingsImportV2,msEdgeShoppingUI,msEdgeTranslate,msEdgeUseCaptivePortalService,msImplicitSignin,msPasswordBreachDetection,msPdfOOUI,msReadAloud,msRevokeExtensions,msSendClientDataHeader,msSendClientDataHeaderToEdgeServices,msSmartScreenProtection,msSyncEdgeCollections,msUseLabelingService,msWebAssistHistorySearch,msWebOOUI --lang=en-US --service-sandbox-type=none --noerrdialogs --user-data-dir="C:\Users\Admin\AppData\Local\com.github.mindwork-ai.ai-studio\EBWebView" --webview-exe-name="MindWork AI Studio.exe" --webview-exe-version=0.8.5 --embedded-browser-webview=1 --embedded-browser-webview-dpi-awareness=2 --mojo-platform-channel-handle=2228 /prefetch:34⤵
- Suspicious behavior: EnumeratesProcesses
PID:2340
-
-
C:\Program Files (x86)\Microsoft\EdgeWebView\Application\90.0.818.66\msedgewebview2.exe"C:\Program Files (x86)\Microsoft\EdgeWebView\Application\90.0.818.66\msedgewebview2.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=1724,15746972746287684756,6360722194606182145,131072 --enable-features=ForwardMemoryPressureEventsToGpuProcess,UseSwapChainsInSoftware --disable-features=FilterAdsOnAbusiveSites,SpareRendererForSitePerProcess,WebPayments,msApplicationGuard,msAutomaticTabFreeze,msBrowserSettingsSupported,msEdgeFaviconService,msEdgeLinkDoctor,msEdgeMGPFrev1,msEdgeOnRampFRE,msEdgeOnRampImport,msEdgeReadingView,msEdgeSettingsImport,msEdgeSettingsImportV2,msEdgeShoppingUI,msEdgeTranslate,msEdgeUseCaptivePortalService,msImplicitSignin,msPasswordBreachDetection,msPdfOOUI,msReadAloud,msRevokeExtensions,msSendClientDataHeader,msSendClientDataHeaderToEdgeServices,msSmartScreenProtection,msSyncEdgeCollections,msUseLabelingService,msWebAssistHistorySearch,msWebOOUI --lang=en-US --service-sandbox-type=utility --noerrdialogs --user-data-dir="C:\Users\Admin\AppData\Local\com.github.mindwork-ai.ai-studio\EBWebView" --webview-exe-name="MindWork AI Studio.exe" --webview-exe-version=0.8.5 --embedded-browser-webview=1 --embedded-browser-webview-dpi-awareness=2 --mojo-platform-channel-handle=2300 /prefetch:84⤵
- System Network Configuration Discovery: Internet Connection Discovery
PID:1448
-
-
C:\Program Files (x86)\Microsoft\EdgeWebView\Application\90.0.818.66\msedgewebview2.exe"C:\Program Files (x86)\Microsoft\EdgeWebView\Application\90.0.818.66\msedgewebview2.exe" --type=renderer --js-flags="--harmony-weak-refs-with-cleanup-some --expose-gc" --field-trial-handle=1724,15746972746287684756,6360722194606182145,131072 --enable-features=ForwardMemoryPressureEventsToGpuProcess,UseSwapChainsInSoftware --disable-features=FilterAdsOnAbusiveSites,SpareRendererForSitePerProcess,WebPayments,msApplicationGuard,msAutomaticTabFreeze,msBrowserSettingsSupported,msEdgeFaviconService,msEdgeLinkDoctor,msEdgeMGPFrev1,msEdgeOnRampFRE,msEdgeOnRampImport,msEdgeReadingView,msEdgeSettingsImport,msEdgeSettingsImportV2,msEdgeShoppingUI,msEdgeTranslate,msEdgeUseCaptivePortalService,msImplicitSignin,msPasswordBreachDetection,msPdfOOUI,msReadAloud,msRevokeExtensions,msSendClientDataHeader,msSendClientDataHeaderToEdgeServices,msSmartScreenProtection,msSyncEdgeCollections,msUseLabelingService,msWebAssistHistorySearch,msWebOOUI --lang=en-US --noerrdialogs --user-data-dir="C:\Users\Admin\AppData\Local\com.github.mindwork-ai.ai-studio\EBWebView" --webview-exe-name="MindWork AI Studio.exe" --webview-exe-version=0.8.5 --embedded-browser-webview=1 --embedded-browser-webview-dpi-awareness=2 --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=2924 /prefetch:14⤵
- System Network Configuration Discovery: Internet Connection Discovery
PID:1092
-
-
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:4732
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:756
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:1268
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:132
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
9.7MB
MD59a6fcbbe06b4171f4a9a58d2c04d0d0e
SHA16b994999cf5b2051e9ae0125c47cdd38dbb304b9
SHA2566b4df7b9c3c0249e39cdb7a09f0942af2789f2a11e76d0e93b9f9935ba60b7ef
SHA5122d3c5e6d458e91dcee8ce4c3436cc0357731ce3eb91d5ff3135faf465fe64574f2eee84331c6987e85359e21d7506572e7d6d03ec5b217560316264032cb23b9
-
Filesize
38.7MB
MD5e77e5d2cf8ef2ced9983501a75911e68
SHA1b94737afdb23bb1cb448ffd899812f706e6ee1f4
SHA2564ebba8788e65c8ed113f7f457aa5c1f7b945f0854cbadfa58234087b1bfdcd05
SHA512439743b41ec9d8aca2b38c61d240beff775ddab09f80153bcbc6eecb2c417dc60300249bf59c4ee89b952ae44e6d8a97ce57f96dce726eccf49d3c5cbd3a5e4d
-
Filesize
7KB
MD5d070f3275df715bf3708beff2c6c307d
SHA193d3725801e07303e9727c4369e19fd139e69023
SHA25642dd4dda3249a94e32e20f76eaffae784a5475ed00c60ef0197c8a2c1ccd2fb7
SHA512fcaf625dac4684dad33d12e3a942b38489ecc90649eee885d823a932e70db63c1edb8614b9fa8904d1710e9b820e82c5a37aeb8403cf21cf1e3692f76438664d
-
Filesize
12KB
MD5cff85c549d536f651d4fb8387f1976f2
SHA1d41ce3a5ff609df9cf5c7e207d3b59bf8a48530e
SHA2568dc562cda7217a3a52db898243de3e2ed68b80e62ddcb8619545ed0b4e7f65a8
SHA512531d6328daf3b86d85556016d299798fa06fefc81604185108a342d000e203094c8c12226a12bd6e1f89b0db501fb66f827b610d460b933bd4ab936ac2fd8a88
-
Filesize
25KB
MD5cbe40fd2b1ec96daedc65da172d90022
SHA1366c216220aa4329dff6c485fd0e9b0f4f0a7944
SHA2563ad2dc318056d0a2024af1804ea741146cfc18cc404649a44610cbf8b2056cf2
SHA51262990cb16e37b6b4eff6ab03571c3a82dcaa21a1d393c3cb01d81f62287777fb0b4b27f8852b5fa71bc975feab5baa486d33f2c58660210e115de7e2bd34ea63
-
Filesize
9KB
MD56c3f8c94d0727894d706940a8a980543
SHA10d1bcad901be377f38d579aafc0c41c0ef8dcefd
SHA25656b96add1978b1abba286f7f8982b0efbe007d4a48b3ded6a4d408e01d753fe2
SHA5122094f0e4bb7c806a5ff27f83a1d572a5512d979eefda3345baff27d2c89e828f68466d08c3ca250da11b01fc0407a21743037c25e94fbe688566dd7deaebd355
-
Filesize
29KB
MD58def0196223484f8aed4106148dd3f08
SHA1e0fc0951deb0e5e741df10328f95c7d6678ad3aa
SHA256c0f2b928bc4c81cc5ca30a8932a6dc8cd617dd016679c057e23355fe732b2333
SHA5129ffa66181bce5aa5210da0fe5edc6c80aa9e46e2bd1fafd840f468965f4d06bc03f9a77e04b975ffc9f25c886c274196e3fedae6cfb57f366ef39f1e31e1ada7
-
Filesize
152B
MD52644d50c7599bc5c8eef80af03bdc5fe
SHA1f43e625ca82f07b84988a0bd33f3ba147c226c06
SHA256b08989bfe7f45cbce11a6347b994f7dbe78b87af935b7533fb13349667571dc4
SHA5126d508034860a48254d21da9ed501fb596057aacd172cf409b610334741830b1c235580a9375b2b0c388d500aa2c34d1695520dd622d0b3018caa8c803cbda064
-
Filesize
152B
MD5765288f62ffc0446bf968587a7127834
SHA17d41cfd232cfa8c8d646576640ed8a7b8add4fbf
SHA256bfbfbc7be08604b1ff2d49afd66e3f7dca53bdce09b7a7a382b69dda94d2dad1
SHA51233204f7a0f020bbdbe1130c2efd27b1ad794d6641028af45bb25af316e697f6c433aceb519574832edf062ca36de567d936a01bcdb02e0a68fce4d878e201fc6
-
Filesize
20B
MD59e4e94633b73f4a7680240a0ffd6cd2c
SHA1e68e02453ce22736169a56fdb59043d33668368f
SHA25641c91a9c93d76295746a149dce7ebb3b9ee2cb551d84365fff108e59a61cc304
SHA512193011a756b2368956c71a9a3ae8bc9537d99f52218f124b2e64545eeb5227861d372639052b74d0dd956cb33ca72a9107e069f1ef332b9645044849d14af337
-
Filesize
24B
MD554cb446f628b2ea4a5bce5769910512e
SHA1c27ca848427fe87f5cf4d0e0e3cd57151b0d820d
SHA256fbcfe23a2ecb82b7100c50811691dde0a33aa3da8d176be9882a9db485dc0f2d
SHA5128f6ed2e91aed9bd415789b1dbe591e7eab29f3f1b48fdfa5e864d7bf4ae554acc5d82b4097a770dabc228523253623e4296c5023cf48252e1b94382c43123cb0
-
C:\Users\Admin\AppData\Local\com.github.mindwork-ai.ai-studio\EBWebView\Default\Code Cache\wasm\index-dir\the-real-index
Filesize48B
MD58ae900163df4b03c3dee881165a1a6bb
SHA1d9bb06f82c50ca3e37c1c36560af573225e8fc72
SHA2565f99c80349cd3d8b24aea91239b73d146087677d2c07ceb62c6c53b36b42a407
SHA5124422cbe42c44ba4409d75a4b5f622639f635a92232fdd7d95f6d8bed5389a606e33ab70c24863792c926b14951fc2d1148631fdad60dad45f8c276cd6cfc7e1d
-
Filesize
20KB
MD522be08f683bcc01d7a9799bbd2c10041
SHA12efb6041cf3d6e67970135e592569c76fc4c41de
SHA256451c2c0cf3b7cb412a05347c6e75ed8680f0d2e5f2ab0f64cc2436db9309a457
SHA5120eef192b3d5abe5d2435acf54b42c729c3979e4ad0b73d36666521458043ee7df1e10386bef266d7df9c31db94fb2833152bb2798936cb2082715318ef05d936
-
Filesize
20KB
MD55688ce73407154729a65e71e4123ab21
SHA19a2bb4125d44f996af3ed51a71ee6f8ecd296bd7
SHA256be1b822e970dfe1a120d248db7000eaf799bd6531929a1308676c70fe1608d60
SHA512eb6452b23ea36c39d03ead154185616c13583f12f382cb2456beeb1ba6e5febdfd2a6f1064283cf115ad1c517dbf409777cdacb128e00c9d3f401335db355537
-
Filesize
8KB
MD5cf89d16bb9107c631daabf0c0ee58efb
SHA13ae5d3a7cf1f94a56e42f9a58d90a0b9616ae74b
SHA256d6a5fe39cd672781b256e0e3102f7022635f1d4bb7cfcc90a80fffe4d0f3877e
SHA5128cb5b059c8105eb91e74a7d5952437aaa1ada89763c5843e7b0f1b93d9ebe15ed40f287c652229291fac02d712cf7ff5ececef276ba0d7ddc35558a3ec3f77b0
-
Filesize
264KB
MD5f50f89a0a91564d0b8a211f8921aa7de
SHA1112403a17dd69d5b9018b8cede023cb3b54eab7d
SHA256b1e963d702392fb7224786e7d56d43973e9b9efd1b89c17814d7c558ffc0cdec
SHA512bf8cda48cf1ec4e73f0dd1d4fa5562af1836120214edb74957430cd3e4a2783e801fa3f4ed2afb375257caeed4abe958265237d6e0aacf35a9ede7a2e8898d58
-
Filesize
8KB
MD50962291d6d367570bee5454721c17e11
SHA159d10a893ef321a706a9255176761366115bedcb
SHA256ec1702806f4cc7c42a82fc2b38e89835fde7c64bb32060e0823c9077ca92efb7
SHA512f555e961b69e09628eaf9c61f465871e6984cd4d31014f954bb747351dad9cea6d17c1db4bca2c1eb7f187cb5f3c0518748c339c8b43bbd1dbd94aeaa16f58ed
-
Filesize
8KB
MD541876349cb12d6db992f1309f22df3f0
SHA15cf26b3420fc0302cd0a71e8d029739b8765be27
SHA256e09f42c398d688dce168570291f1f92d079987deda3099a34adb9e8c0522b30c
SHA512e9a4fc1f7cb6ae2901f8e02354a92c4aaa7a53c640dcf692db42a27a5acc2a3bfb25a0de0eb08ab53983132016e7d43132ea4292e439bb636aafd53fb6ef907e
-
Filesize
256KB
MD5eaed248fb4b051743fb0a56aa5039179
SHA1dc57a027ce57e552679be3ebfb3d4c0c50f1c746
SHA256ec2c60761fcebd2838b33bf4a0d53f0799b90255904bca81cad7d43859edace3
SHA512beec75a51e19945f7582d92e1516ed0039a90c74dbf5df71f57dbc9054e08cce5b5103a6a1ff93e39e403b8a1d72af2f57859185665d7296d58f223262f4ae6a
-
Filesize
116KB
MD54e2922249bf476fb3067795f2fa5e794
SHA1d2db6b2759d9e650ae031eb62247d457ccaa57d2
SHA256c2c17166e7468877d1e80822f8a5f35a7700ac0b68f3b369a1f4154ae4f811e1
SHA5128e5e12daf11f9f6e73fb30f563c8f2a64bbc7bb9deffe4969e23081ec1c4073cdf6c74e8dbcc65a271142083ad8312ec7d59505c90e718a5228d369f4240e1da
-
C:\Users\Admin\AppData\Local\com.github.mindwork-ai.ai-studio\EBWebView\Default\History Provider Cache
Filesize6B
MD5a9851aa4c3c8af2d1bd8834201b2ba51
SHA1fa95986f7ebfac4aab3b261d3ed0a21b142e91fc
SHA256e708be5e34097c8b4b6ecb50ead7705843d0dc4b0779b95ef57073d80f36c191
SHA51241a1b4d650ff55b164f3db02c8440f044c4ec31d8ddbbbf56195d4e27473c6b1379dfad3581e16429650e2364791f5c19aae723efc11986bb986ef262538b818
-
C:\Users\Admin\AppData\Local\com.github.mindwork-ai.ai-studio\EBWebView\Default\Local Storage\leveldb\LOG
Filesize329B
MD5999bd3984245c22403259a193407e09a
SHA1283b22efa7ec0b01cd91cb434f1664135238c7ab
SHA25614554c8391f1d541f0cf95c43d99c0eb10d0fa08d761bf5cf1d13a726e5077cd
SHA512f807c66b08dd2e34b4365a12a42e127b72f48be876bcaadad0e07f5aaabac5541d41532379e5741215aa3a56bed9b4ee78e2a6b5bad15481064555fe66b9c654
-
C:\Users\Admin\AppData\Local\com.github.mindwork-ai.ai-studio\EBWebView\Default\Local Storage\leveldb\MANIFEST-000001
Filesize41B
MD55af87dfd673ba2115e2fcf5cfdb727ab
SHA1d5b5bbf396dc291274584ef71f444f420b6056f1
SHA256f9d31b278e215eb0d0e9cd709edfa037e828f36214ab7906f612160fead4b2b4
SHA512de34583a7dbafe4dd0dc0601e8f6906b9bc6a00c56c9323561204f77abbc0dc9007c480ffe4092ff2f194d54616caf50aecbd4a1e9583cae0c76ad6dd7c2375b
-
Filesize
40KB
MD5b608d407fc15adea97c26936bc6f03f6
SHA1953e7420801c76393902c0d6bb56148947e41571
SHA256b281ce54125d4250a80f48fcc02a8eea53f2c35c3b726e2512c3d493da0013bf
SHA512cc96ddf4bf90d6aaa9d86803cb2aa30cd8e9b295aee1bd5544b88aeab63dc60bb1d4641e846c9771bab51aabbfbcd984c6d3ee83b96f5b65d09c0841d464b9e4
-
Filesize
76KB
MD5cf7ac318453f6b64b6dc186489ff4593
SHA1b405c8e0737be8e16a08556757dc817bd02af025
SHA256634434e865f1ba1b90039bd5afd8f01bad6d278377106022ea2a9c2d8778d31a
SHA512b64e484d16222d8de31f53cd60b719b7d855bbc552a7d052e202382bc3013e0edaceb31e3a287f2ea6b7117ccfdb8a56ea9d7da78535d2c606183072ecd084e4
-
C:\Users\Admin\AppData\Local\com.github.mindwork-ai.ai-studio\EBWebView\Default\Network Persistent State
Filesize61B
MD54df4574bfbb7e0b0bc56c2c9b12b6c47
SHA181efcbd3e3da8221444a21f45305af6fa4b71907
SHA256e1b77550222c2451772c958e44026abe518a2c8766862f331765788ddd196377
SHA51278b14f60f2d80400fe50360cf303a961685396b7697775d078825a29b717081442d357c2039ad0984d4b622976b0314ede8f478cde320daec118da546cb0682a
-
Filesize
3KB
MD50d4a55154329449611de1a7acbd7dafe
SHA164bb9ffc655652091774a1fb176de52d477f2e8d
SHA256950de5b9f61da9ccbf5d49e670e1b931b891b04a26e8e1e3ced1666dd9b062f3
SHA512161a929ab68457be8df88da64506973e6c6b99625497c0106abd55bb543555a75987927eb3b89d54e33547e10ec018adf2478da95cb0571a1af1b2c2809b1bdc
-
Filesize
3KB
MD5869c7d71688710cbfbb199fc97856c9e
SHA1e09e1ee32b75b49a9bc12f1dbb731e5c63bfe635
SHA2567b0a31acd07f05eca617b2d755bc8e4e971ef067924a933e1fd72baca9b52806
SHA512052ba1351d895285f1d9e34a4a204c6a1c6bf36b94cedb2f779622b4f2cc8a0d7dcf73ade1d48cf71bd8449c41df9bc49475f9b8039760447777060923a5b1c9
-
Filesize
8KB
MD5c5f9cd60976eb25e5a0fa43f1973ce16
SHA104bec059d5b42ccea604991f14eba3fc575fa2d1
SHA25679b34c9772fa6320929008e530f65c236c77a3fd863bfadea72249db1747bcb6
SHA51249e3a39071a6103fc1b9e500a010809af76286cc340ac28c96cbed74cad7a95ed35db5e8b92746fe15181a6f1ea0e848f17d01584893e9065fb14cfcf9598d92
-
C:\Users\Admin\AppData\Local\com.github.mindwork-ai.ai-studio\EBWebView\Default\Session Storage\000003.log
Filesize80B
MD569449520fd9c139c534e2970342c6bd8
SHA1230fe369a09def748f8cc23ad70fd19ed8d1b885
SHA2563f2e9648dfdb2ddb8e9d607e8802fef05afa447e17733dd3fd6d933e7ca49277
SHA512ea34c39aea13b281a6067de20ad0cda84135e70c97db3cdd59e25e6536b19f7781e5fc0ca4a11c3618d43fc3bd3fbc120dd5c1c47821a248b8ad351f9f4e6367
-
Filesize
317B
MD574962aefb16f5aa7e72eac28de415df2
SHA141f70611b2d754535ffaabbf22129d5998cda5a5
SHA25611de247f3f948a1f941168f5a1298fcba27597e3797651ece12fdfbe06ee1fe5
SHA512f0e4c9c1d68e05fa5d3d71de9dd6037868a6ccf58fc8cabe92fd2ae63a203a51eb3ec6031e7117239d13de036b53262742cf1f695df2eae9f923778ce3e790c6
-
C:\Users\Admin\AppData\Local\com.github.mindwork-ai.ai-studio\EBWebView\Default\Site Characteristics Database\000003.log
Filesize40B
MD5148079685e25097536785f4536af014b
SHA1c5ff5b1b69487a9dd4d244d11bbafa91708c1a41
SHA256f096bc366a931fba656bdcd77b24af15a5f29fc53281a727c79f82c608ecfab8
SHA512c2556034ea51abfbc172eb62ff11f5ac45c317f84f39d4b9e3ddbd0190da6ef7fa03fe63631b97ab806430442974a07f8e81b5f7dc52d9f2fcdc669adca8d91f
-
C:\Users\Admin\AppData\Local\com.github.mindwork-ai.ai-studio\EBWebView\Default\Site Characteristics Database\LOG
Filesize343B
MD5b38f1ac1bb1ce9798c4bf1e3374ba1c6
SHA1afee357ab019e8476ab5abb1caac0507485e474f
SHA25664a37675a1051b3c82bbbe73ad8ed41a1273444ac68cbac71dba3c0eaf0d29f0
SHA512c3d50440cfc08a25f859dd7c9b4d08238ab847739ae61be22611996b2789ea628b32befb808a569bd302f6528eb65cdba50f4a313312f6ffc49dd3344f204f2e
-
C:\Users\Admin\AppData\Local\com.github.mindwork-ai.ai-studio\EBWebView\Default\Sync Data\LevelDB\000003.log
Filesize46B
MD590881c9c26f29fca29815a08ba858544
SHA106fee974987b91d82c2839a4bb12991fa99e1bdd
SHA256a2ca52e34b6138624ac2dd20349cde28482143b837db40a7f0fbda023077c26a
SHA51215f7f8197b4fc46c4c5c2570fb1f6dd73cb125f9ee53dfa67f5a0d944543c5347bdab5cce95e91dd6c948c9023e23c7f9d76cff990e623178c92f8d49150a625
-
C:\Users\Admin\AppData\Local\com.github.mindwork-ai.ai-studio\EBWebView\Default\Sync Data\LevelDB\CURRENT
Filesize16B
MD546295cac801e5d4857d09837238a6394
SHA144e0fa1b517dbf802b18faf0785eeea6ac51594b
SHA2560f1bad70c7bd1e0a69562853ec529355462fcd0423263a3d39d6d0d70b780443
SHA5128969402593f927350e2ceb4b5bc2a277f3754697c1961e3d6237da322257fbab42909e1a742e22223447f3a4805f8d8ef525432a7c3515a549e984d3eff72b23
-
C:\Users\Admin\AppData\Local\com.github.mindwork-ai.ai-studio\EBWebView\Default\Sync Data\LevelDB\LOG
Filesize319B
MD5f2d7b3c0bcfbba45d8b6e3a9c5506c60
SHA10cd757c4af50e52113d7dbd5bb61a969508fffbe
SHA256dd3c1a5513e2fc3e84c6a41730cbc16c9f7dbc3783639c32718673bfc6982fe5
SHA5124982be32e86316dcbc86ef730caf35ee2ca7ad8ae7d86478aa74827893eabeae0bd618b4c2dab1132c1b03fac6568518039d2deba3a80ea5ebedcaeeb6d01f3b
-
Filesize
20KB
MD5325ddf165383376a8e530a8288a9fb73
SHA1f451204bb6f3de9de42f27bd887576b083026e87
SHA25653eb4fcb3cbcaacd4d94036c9379715990f86185b8ef7fd18cb27665193da6c8
SHA512edb9c49956741560f40df102b81c3b558b1ae9ce902040f89cecb2fbbf60277dcb73f68d8b7c60340a92c46915828b7a204420292d0a4906ac0e9082943ad528
-
Filesize
128KB
MD5c964ce118d9c224a30de479c3c9c0a6b
SHA179dff874aca73fe23e301ff256fc938d0370eeea
SHA256d5a471fde82911836cd25566411bff18d79f2ac687ec8a6dda2365afcf3d5ca3
SHA51233e3d9b2ddfd5538614484d001cd0935fa78e45b5dfcc7a95775d6de127c5f2cc3e382be5f37fa52df8cdec62c51c9594ff97985dade8eecc06af836afca33b5
-
Filesize
110KB
MD512aff5c24b1e165da94cc9ddef6d752a
SHA1345a57b067d6c7561b149b6a7de1d0cf53e42cc9
SHA256b49ee954c97289b707fcaed55266f7c49720d1c24f4a8872038384155081aabf
SHA512fd584f3d7e3a5603ff2699e1b4930d6594b0ea09c0a194b7329f44d3d4d2e1e985a42ab512afc1b6a0f35412ef839d35f27fab1f6506e871d74c648c3adb0ae6
-
Filesize
44KB
MD5144dfaaa82df72858197f4ef7ddd34f2
SHA1e6bbbc5593c1d782e2d23c6ba6a5f5468e7548fa
SHA256fe2844d9713e3f49ff6e5c6d5e9f3b7af671fe9165cafe01ebbaf61bb1ae84b9
SHA5125a53b1dfd4729dd2cf7c5fb45b4b15e3b1729c7c7dca1a029b39964a6e0f9435bde61ba5c8e7b859254798fa135264c9814533409e5980159e52cdca2b1a5793
-
Filesize
11B
MD5b29bcf9cd0e55f93000b4bb265a9810b
SHA1e662b8c98bd5eced29495dbe2a8f1930e3f714b8
SHA256f53ab2877a33ef4dbde62f23f0cbfb572924a80a3921f47fc080d680107064b4
SHA512e15f515e4177d38d6bb83a939a0a8f901ce64dffe45e635063161497d527fbddaf2b1261195fde90b72b4c3e64ac0a0500003faceffcc749471733c9e83eb011
-
Filesize
2KB
MD506450413e74bcc0557764de48d0365ed
SHA1cb43c1ab1c025be0db07d2aab30d89da2ce2f73c
SHA2569a37e07eb3f89f865c5e0a5420aeaf229a04cfdf591fc0cbaafe79272e21a44b
SHA5127ad3fb6e2858efdfa7cf3bf8f2904d4baaabba103f838d77b059491d3ae32b2af0dd3a6b6175cfa6aa0553724bd068348f7ba272a3e8c2ad45ab7b5fe7eee912
-
Filesize
256KB
MD5e438f34bfd226f19fb2122c7d64336f9
SHA158ce0f64cd3c4f81ea1ba64cb751de9fddb0f56f
SHA2563dbb1ba353eb7d1d729d633aa4dd050f2b82cc8c37a617699f062cb171a52fe7
SHA5121497cba0bf76e38045b96d622a36f2d846e8bfd19b5500730ee0ea513e57258252c5f0cef8c0bf48d54b290ef806dd6b64737a03c28502b12331356b73f7ce88
-
C:\Users\Admin\AppData\Local\com.github.mindwork-ai.ai-studio\EBWebView\ec2009d9-f7df-44ce-bbea-aff6da52d98d.tmp
Filesize2KB
MD540366ec2b6b83afc14a812a5138c3b5f
SHA1bfa3fa18bd7932669d49064b645a9b082c655f29
SHA2566d4f880f2f9c18ae8a9c10373f7438aeb56aaf55db3596a1eb5cf747c5867397
SHA512e3581590bcdb87a98556e2a05a7ec087826e06d7b6e8538b155d75eed074781a08ac09dacd99d28aaa930c3f4a87461aa88a55dfa12a67bef953c17f276ee7b9
-
MD5
d41d8cd98f00b204e9800998ecf8427e
SHA1da39a3ee5e6b4b0d3255bfef95601890afd80709
SHA256e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855
SHA512cf83e1357eefb8bdf1542850d66d8007d620e4050b5715dc83f4a921d36ce9ce47d0d13c5d85f2b0ff8318d2877eec2f63b931bd47417a81a538327af927da3e