Analysis
-
max time kernel
144s -
max time network
144s -
platform
windows10-2004_x64 -
resource
win10v2004-20250314-en -
resource tags
arch:x64arch:x86image:win10v2004-20250314-enlocale:en-usos:windows10-2004-x64system -
submitted
28/03/2025, 16:21
Static task
static1
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
http://sleepwellmagazine.com/2mprext.zip?&track=608
Resource
win10v2004-20250314-en
General
-
Target
http://sleepwellmagazine.com/2mprext.zip?&track=608
Malware Config
Signatures
-
NetSupport
NetSupport is a remote access tool sold as a legitimate system administration software.
-
Netsupport family
-
Drops file in Program Files directory 64 IoCs
description ioc Process File created C:\Program Files\chrome_Unpacker_BeginUnzipping5216_1123795037\_locales\ms\messages.json msedge.exe File created C:\Program Files\chrome_Unpacker_BeginUnzipping5216_1123795037\_locales\hi\messages.json msedge.exe File created C:\Program Files\chrome_Unpacker_BeginUnzipping5216_1123795037\_locales\it\messages.json msedge.exe File created C:\Program Files\chrome_Unpacker_BeginUnzipping5216_1123795037\_locales\iw\messages.json msedge.exe File created C:\Program Files\chrome_Unpacker_BeginUnzipping5216_1973052733\manifest.json msedge.exe File created C:\Program Files\chrome_Unpacker_BeginUnzipping5216_1123795037\_locales\af\messages.json msedge.exe File created C:\Program Files\chrome_Unpacker_BeginUnzipping5216_1123795037\_locales\fr_CA\messages.json msedge.exe File created C:\Program Files\chrome_Unpacker_BeginUnzipping5216_1123795037\_locales\zh_TW\messages.json msedge.exe File created C:\Program Files\chrome_Unpacker_BeginUnzipping5216_1123795037\_locales\el\messages.json msedge.exe File created C:\Program Files\chrome_Unpacker_BeginUnzipping5216_1123795037\_locales\kn\messages.json msedge.exe File created C:\Program Files\chrome_Unpacker_BeginUnzipping5216_1516137827\deny_domains.list msedge.exe File created C:\Program Files\chrome_Unpacker_BeginUnzipping5216_1516137827\deny_etld1_domains.list msedge.exe File created C:\Program Files\chrome_Unpacker_BeginUnzipping5216_1516137827\manifest.fingerprint msedge.exe File created C:\Program Files\chrome_Unpacker_BeginUnzipping5216_1123795037\dasherSettingSchema.json msedge.exe File created C:\Program Files\chrome_Unpacker_BeginUnzipping5216_1123795037\_locales\bn\messages.json msedge.exe File created C:\Program Files\chrome_Unpacker_BeginUnzipping5216_1123795037\_locales\ne\messages.json msedge.exe File created C:\Program Files\chrome_Unpacker_BeginUnzipping5216_1123795037\_locales\sk\messages.json msedge.exe File created C:\Program Files\chrome_Unpacker_BeginUnzipping5216_1417717410\manifest.json msedge.exe File created C:\Program Files\chrome_Unpacker_BeginUnzipping5216_1973052733\manifest.fingerprint msedge.exe File created C:\Program Files\chrome_Unpacker_BeginUnzipping5216_1123795037\_locales\cs\messages.json msedge.exe File created C:\Program Files\chrome_Unpacker_BeginUnzipping5216_1123795037\_locales\am\messages.json msedge.exe File created C:\Program Files\chrome_Unpacker_BeginUnzipping5216_1123795037\_locales\sv\messages.json msedge.exe File created C:\Program Files\chrome_Unpacker_BeginUnzipping5216_1123795037\_locales\ru\messages.json msedge.exe File created C:\Program Files\chrome_Unpacker_BeginUnzipping5216_1123795037\_locales\gu\messages.json msedge.exe File created C:\Program Files\chrome_Unpacker_BeginUnzipping5216_1123795037\128.png msedge.exe File created C:\Program Files\chrome_Unpacker_BeginUnzipping5216_1332550686\_metadata\verified_contents.json msedge.exe File created C:\Program Files\chrome_Unpacker_BeginUnzipping5216_1123795037\_locales\fi\messages.json msedge.exe File created C:\Program Files\chrome_Unpacker_BeginUnzipping5216_1123795037\_locales\nl\messages.json msedge.exe File created C:\Program Files\chrome_Unpacker_BeginUnzipping5216_1123795037\_locales\ca\messages.json msedge.exe File created C:\Program Files\chrome_Unpacker_BeginUnzipping5216_1123795037\_locales\ar\messages.json msedge.exe File created C:\Program Files\chrome_Unpacker_BeginUnzipping5216_1123795037\_locales\fa\messages.json msedge.exe File created C:\Program Files\chrome_Unpacker_BeginUnzipping5216_1123795037\_locales\en\messages.json msedge.exe File created C:\Program Files\chrome_Unpacker_BeginUnzipping5216_1123795037\_locales\id\messages.json msedge.exe File created C:\Program Files\chrome_Unpacker_BeginUnzipping5216_1973052733\LICENSE msedge.exe File created C:\Program Files\chrome_Unpacker_BeginUnzipping5216_1123795037\_locales\en_US\messages.json msedge.exe File created C:\Program Files\chrome_Unpacker_BeginUnzipping5216_1123795037\_locales\ml\messages.json msedge.exe File created C:\Program Files\msedge_url_fetcher_5216_541710731\GHBMNNJOOEKPMOECNNNILNNBDLOLHKHI_1_90_1_0.crx msedge.exe File created C:\Program Files\chrome_Unpacker_BeginUnzipping5216_1123795037\_locales\my\messages.json msedge.exe File created C:\Program Files\chrome_Unpacker_BeginUnzipping5216_1123795037\_locales\da\messages.json msedge.exe File created C:\Program Files\chrome_Unpacker_BeginUnzipping5216_1123795037\_locales\ko\messages.json msedge.exe File created C:\Program Files\chrome_Unpacker_BeginUnzipping5216_1123795037\_locales\eu\messages.json msedge.exe File created C:\Program Files\chrome_Unpacker_BeginUnzipping5216_1123795037\_locales\es\messages.json msedge.exe File created C:\Program Files\chrome_Unpacker_BeginUnzipping5216_1123795037\_locales\hr\messages.json msedge.exe File created C:\Program Files\chrome_Unpacker_BeginUnzipping5216_1123795037\_locales\km\messages.json msedge.exe File created C:\Program Files\chrome_Unpacker_BeginUnzipping5216_1123795037\_locales\cy\messages.json msedge.exe File created C:\Program Files\chrome_Unpacker_BeginUnzipping5216_1123795037\_locales\sl\messages.json msedge.exe File created C:\Program Files\chrome_Unpacker_BeginUnzipping5216_1123795037\_locales\hy\messages.json msedge.exe File created C:\Program Files\chrome_Unpacker_BeginUnzipping5216_1123795037\_locales\az\messages.json msedge.exe File created C:\Program Files\chrome_Unpacker_BeginUnzipping5216_1417717410\manifest.fingerprint msedge.exe File created C:\Program Files\chrome_Unpacker_BeginUnzipping5216_1332550686\sets.json msedge.exe File created C:\Program Files\chrome_Unpacker_BeginUnzipping5216_1123795037\_locales\ro\messages.json msedge.exe File created C:\Program Files\chrome_Unpacker_BeginUnzipping5216_1123795037\_locales\fr\messages.json msedge.exe File created C:\Program Files\chrome_Unpacker_BeginUnzipping5216_1332550686\LICENSE msedge.exe File created C:\Program Files\chrome_Unpacker_BeginUnzipping5216_1516137827\manifest.json msedge.exe File created C:\Program Files\chrome_Unpacker_BeginUnzipping5216_1123795037\service_worker_bin_prod.js msedge.exe File created C:\Program Files\chrome_Unpacker_BeginUnzipping5216_1123795037\_locales\ka\messages.json msedge.exe File created C:\Program Files\chrome_Unpacker_BeginUnzipping5216_1123795037\_locales\de\messages.json msedge.exe File created C:\Program Files\chrome_Unpacker_BeginUnzipping5216_1123795037\_locales\pa\messages.json msedge.exe File created C:\Program Files\chrome_Unpacker_BeginUnzipping5216_1123795037\_locales\vi\messages.json msedge.exe File created C:\Program Files\chrome_Unpacker_BeginUnzipping5216_1123795037\_locales\en_GB\messages.json msedge.exe File created C:\Program Files\chrome_Unpacker_BeginUnzipping5216_1123795037\_locales\en_CA\messages.json msedge.exe File created C:\Program Files\chrome_Unpacker_BeginUnzipping5216_1123795037\_metadata\verified_contents.json msedge.exe File created C:\Program Files\chrome_Unpacker_BeginUnzipping5216_1123795037\_locales\te\messages.json msedge.exe File created C:\Program Files\chrome_Unpacker_BeginUnzipping5216_1123795037\_locales\sr\messages.json msedge.exe -
System Location Discovery: System Language Discovery 1 TTPs 3 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language client32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language remcmdstub.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language remcmdstub.exe -
Checks processor information in registry 2 TTPs 2 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\VendorIdentifier msedge.exe -
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe -
Modifies data under HKEY_USERS 2 IoCs
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-19\SOFTWARE\Microsoft\Cryptography\TPM\Telemetry\TraceTimeLast = "133876525230549937" msedge.exe Key created \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry msedge.exe -
Modifies registry class 4 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ msedge.exe Key created \REGISTRY\MACHINE\Software\Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppModel\Deployment\Package\*\S-1-5-21-3920955164-3782810283-1225622749-1000\{A0ECBBA2-A541-430C-9123-0CB0C7C2D97F} msedge.exe Key created \REGISTRY\USER\S-1-5-21-3920955164-3782810283-1225622749-1000_Classes\Local Settings msedge.exe Key created \REGISTRY\USER\S-1-5-21-3920955164-3782810283-1225622749-1000_Classes\Local Settings OpenWith.exe -
Opens file in notepad (likely ransom note) 1 IoCs
pid Process 4076 NOTEPAD.EXE -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 5140 msedge.exe 5140 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 5 IoCs
pid Process 5216 msedge.exe 5216 msedge.exe 5216 msedge.exe 5216 msedge.exe 5216 msedge.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeSecurityPrivilege 2608 client32.exe -
Suspicious use of FindShellTrayWindow 36 IoCs
pid Process 5216 msedge.exe 5216 msedge.exe 5216 msedge.exe 5216 msedge.exe 5216 msedge.exe 5216 msedge.exe 5216 msedge.exe 5216 msedge.exe 5216 msedge.exe 5216 msedge.exe 5216 msedge.exe 5216 msedge.exe 5216 msedge.exe 5216 msedge.exe 5216 msedge.exe 5216 msedge.exe 5216 msedge.exe 5216 msedge.exe 5216 msedge.exe 5216 msedge.exe 5216 msedge.exe 5216 msedge.exe 5216 msedge.exe 5216 msedge.exe 5216 msedge.exe 5216 msedge.exe 5216 msedge.exe 5216 msedge.exe 5216 msedge.exe 5216 msedge.exe 5216 msedge.exe 5216 msedge.exe 5216 msedge.exe 5216 msedge.exe 5216 msedge.exe 2608 client32.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 5216 msedge.exe 5216 msedge.exe 5216 msedge.exe 5216 msedge.exe 5216 msedge.exe 5216 msedge.exe 5216 msedge.exe 5216 msedge.exe 5216 msedge.exe 5216 msedge.exe 5216 msedge.exe 5216 msedge.exe 5216 msedge.exe 5216 msedge.exe 5216 msedge.exe 5216 msedge.exe 5216 msedge.exe 5216 msedge.exe 5216 msedge.exe 5216 msedge.exe 5216 msedge.exe 5216 msedge.exe 5216 msedge.exe 5216 msedge.exe -
Suspicious use of SetWindowsHookEx 17 IoCs
pid Process 1124 OpenWith.exe 1124 OpenWith.exe 1124 OpenWith.exe 1124 OpenWith.exe 1124 OpenWith.exe 1124 OpenWith.exe 1124 OpenWith.exe 1124 OpenWith.exe 1124 OpenWith.exe 1124 OpenWith.exe 1124 OpenWith.exe 1124 OpenWith.exe 1124 OpenWith.exe 1124 OpenWith.exe 1124 OpenWith.exe 1124 OpenWith.exe 1124 OpenWith.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 5216 wrote to memory of 2352 5216 msedge.exe 86 PID 5216 wrote to memory of 2352 5216 msedge.exe 86 PID 5216 wrote to memory of 3532 5216 msedge.exe 87 PID 5216 wrote to memory of 3532 5216 msedge.exe 87 PID 5216 wrote to memory of 2376 5216 msedge.exe 88 PID 5216 wrote to memory of 2376 5216 msedge.exe 88 PID 5216 wrote to memory of 2376 5216 msedge.exe 88 PID 5216 wrote to memory of 2376 5216 msedge.exe 88 PID 5216 wrote to memory of 2376 5216 msedge.exe 88 PID 5216 wrote to memory of 2376 5216 msedge.exe 88 PID 5216 wrote to memory of 2376 5216 msedge.exe 88 PID 5216 wrote to memory of 2376 5216 msedge.exe 88 PID 5216 wrote to memory of 2376 5216 msedge.exe 88 PID 5216 wrote to memory of 2376 5216 msedge.exe 88 PID 5216 wrote to memory of 2376 5216 msedge.exe 88 PID 5216 wrote to memory of 2376 5216 msedge.exe 88 PID 5216 wrote to memory of 2376 5216 msedge.exe 88 PID 5216 wrote to memory of 2376 5216 msedge.exe 88 PID 5216 wrote to memory of 2376 5216 msedge.exe 88 PID 5216 wrote to memory of 2376 5216 msedge.exe 88 PID 5216 wrote to memory of 2376 5216 msedge.exe 88 PID 5216 wrote to memory of 2376 5216 msedge.exe 88 PID 5216 wrote to memory of 2376 5216 msedge.exe 88 PID 5216 wrote to memory of 2376 5216 msedge.exe 88 PID 5216 wrote to memory of 2376 5216 msedge.exe 88 PID 5216 wrote to memory of 2376 5216 msedge.exe 88 PID 5216 wrote to memory of 2376 5216 msedge.exe 88 PID 5216 wrote to memory of 2376 5216 msedge.exe 88 PID 5216 wrote to memory of 2376 5216 msedge.exe 88 PID 5216 wrote to memory of 2376 5216 msedge.exe 88 PID 5216 wrote to memory of 2376 5216 msedge.exe 88 PID 5216 wrote to memory of 2376 5216 msedge.exe 88 PID 5216 wrote to memory of 2376 5216 msedge.exe 88 PID 5216 wrote to memory of 2376 5216 msedge.exe 88 PID 5216 wrote to memory of 2376 5216 msedge.exe 88 PID 5216 wrote to memory of 2376 5216 msedge.exe 88 PID 5216 wrote to memory of 2376 5216 msedge.exe 88 PID 5216 wrote to memory of 2376 5216 msedge.exe 88 PID 5216 wrote to memory of 2376 5216 msedge.exe 88 PID 5216 wrote to memory of 2376 5216 msedge.exe 88 PID 5216 wrote to memory of 2376 5216 msedge.exe 88 PID 5216 wrote to memory of 2376 5216 msedge.exe 88 PID 5216 wrote to memory of 2376 5216 msedge.exe 88 PID 5216 wrote to memory of 2376 5216 msedge.exe 88 PID 5216 wrote to memory of 2376 5216 msedge.exe 88 PID 5216 wrote to memory of 2376 5216 msedge.exe 88 PID 5216 wrote to memory of 2376 5216 msedge.exe 88 PID 5216 wrote to memory of 2376 5216 msedge.exe 88 PID 5216 wrote to memory of 2376 5216 msedge.exe 88 PID 5216 wrote to memory of 2376 5216 msedge.exe 88 PID 5216 wrote to memory of 2376 5216 msedge.exe 88 PID 5216 wrote to memory of 2376 5216 msedge.exe 88 PID 5216 wrote to memory of 2376 5216 msedge.exe 88 PID 5216 wrote to memory of 2376 5216 msedge.exe 88 PID 5216 wrote to memory of 2376 5216 msedge.exe 88 PID 5216 wrote to memory of 4724 5216 msedge.exe 89 PID 5216 wrote to memory of 4724 5216 msedge.exe 89 PID 5216 wrote to memory of 4724 5216 msedge.exe 89 PID 5216 wrote to memory of 4724 5216 msedge.exe 89 PID 5216 wrote to memory of 4724 5216 msedge.exe 89 PID 5216 wrote to memory of 4724 5216 msedge.exe 89 PID 5216 wrote to memory of 4724 5216 msedge.exe 89 PID 5216 wrote to memory of 4724 5216 msedge.exe 89 PID 5216 wrote to memory of 4724 5216 msedge.exe 89
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --start-maximized --single-argument http://sleepwellmagazine.com/2mprext.zip?&track=6081⤵
- Drops file in Program Files directory
- Checks processor information in registry
- Enumerates system info in registry
- Modifies data under HKEY_USERS
- Modifies registry class
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:5216 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:4 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=133.0.6943.99 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 --annotation=prod=Edge --annotation=ver=133.0.3065.69 --initial-client-data=0x23c,0x240,0x244,0x238,0x2b4,0x7ff9b0d7f208,0x7ff9b0d7f214,0x7ff9b0d7f2202⤵PID:2352
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --string-annotations --always-read-main-dll --field-trial-handle=1940,i,15019539632172600223,4312611653094296534,262144 --variations-seed-version --mojo-platform-channel-handle=2264 /prefetch:32⤵PID:3532
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --string-annotations --gpu-preferences=UAAAAAAAAADgAAAEAAAAAAAAAAAAAAAAAABgAAEAAAAAAAAAAAAAAAAAAAACAAAAAAAAAAAAAAAAAAAAAAAAABAAAAAAAAAAEAAAAAAAAAAIAAAAAAAAAAgAAAAAAAAA --always-read-main-dll --field-trial-handle=2228,i,15019539632172600223,4312611653094296534,262144 --variations-seed-version --mojo-platform-channel-handle=2224 /prefetch:22⤵PID:2376
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=service --string-annotations --always-read-main-dll --field-trial-handle=2500,i,15019539632172600223,4312611653094296534,262144 --variations-seed-version --mojo-platform-channel-handle=2508 /prefetch:82⤵PID:4724
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --string-annotations --pdf-upsell-enabled --video-capture-use-gpu-memory-buffer --lang=en-US --js-flags=--ms-user-locale= --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --always-read-main-dll --field-trial-handle=3452,i,15019539632172600223,4312611653094296534,262144 --variations-seed-version --mojo-platform-channel-handle=3496 /prefetch:12⤵PID:1684
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --string-annotations --pdf-upsell-enabled --video-capture-use-gpu-memory-buffer --lang=en-US --js-flags=--ms-user-locale= --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --always-read-main-dll --field-trial-handle=3484,i,15019539632172600223,4312611653094296534,262144 --variations-seed-version --mojo-platform-channel-handle=3500 /prefetch:12⤵PID:3488
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=asset_store.mojom.AssetStoreService --lang=en-US --service-sandbox-type=asset_store_service --video-capture-use-gpu-memory-buffer --string-annotations --always-read-main-dll --field-trial-handle=5000,i,15019539632172600223,4312611653094296534,262144 --variations-seed-version --mojo-platform-channel-handle=5064 /prefetch:82⤵PID:5296
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=entity_extraction_service.mojom.Extractor --lang=en-US --service-sandbox-type=entity_extraction --onnx-enabled-for-ee --video-capture-use-gpu-memory-buffer --string-annotations --always-read-main-dll --field-trial-handle=5012,i,15019539632172600223,4312611653094296534,262144 --variations-seed-version --mojo-platform-channel-handle=5088 /prefetch:82⤵PID:1280
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=edge_collections.mojom.CollectionsDataManager --lang=en-US --service-sandbox-type=collections --video-capture-use-gpu-memory-buffer --string-annotations --always-read-main-dll --field-trial-handle=5528,i,15019539632172600223,4312611653094296534,262144 --variations-seed-version --mojo-platform-channel-handle=5576 /prefetch:82⤵PID:5796
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --string-annotations --pdf-upsell-enabled --video-capture-use-gpu-memory-buffer --lang=en-US --js-flags=--ms-user-locale= --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --always-read-main-dll --field-trial-handle=5536,i,15019539632172600223,4312611653094296534,262144 --variations-seed-version --mojo-platform-channel-handle=5632 /prefetch:12⤵PID:620
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=PooledProcess2 --lang=en-US --service-sandbox-type=utility --video-capture-use-gpu-memory-buffer --string-annotations --always-read-main-dll --field-trial-handle=5944,i,15019539632172600223,4312611653094296534,262144 --variations-seed-version --mojo-platform-channel-handle=5928 /prefetch:82⤵PID:1592
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\133.0.3065.69\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\133.0.3065.69\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --lang=en-US --service-sandbox-type=none --video-capture-use-gpu-memory-buffer --string-annotations --always-read-main-dll --field-trial-handle=5940,i,15019539632172600223,4312611653094296534,262144 --variations-seed-version --mojo-platform-channel-handle=6508 /prefetch:82⤵PID:1836
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\133.0.3065.69\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\133.0.3065.69\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --lang=en-US --service-sandbox-type=none --video-capture-use-gpu-memory-buffer --string-annotations --always-read-main-dll --field-trial-handle=5940,i,15019539632172600223,4312611653094296534,262144 --variations-seed-version --mojo-platform-channel-handle=6508 /prefetch:82⤵PID:2296
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=quarantine.mojom.Quarantine --lang=en-US --service-sandbox-type=none --video-capture-use-gpu-memory-buffer --string-annotations --always-read-main-dll --field-trial-handle=4920,i,15019539632172600223,4312611653094296534,262144 --variations-seed-version --mojo-platform-channel-handle=6180 /prefetch:82⤵PID:2572
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=unzip.mojom.Unzipper --lang=en-US --service-sandbox-type=service --video-capture-use-gpu-memory-buffer --string-annotations --always-read-main-dll --field-trial-handle=3520,i,15019539632172600223,4312611653094296534,262144 --variations-seed-version --mojo-platform-channel-handle=5640 /prefetch:82⤵PID:5372
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=PooledProcess2 --lang=en-US --service-sandbox-type=utility --video-capture-use-gpu-memory-buffer --string-annotations --always-read-main-dll --field-trial-handle=5976,i,15019539632172600223,4312611653094296534,262144 --variations-seed-version --mojo-platform-channel-handle=3652 /prefetch:82⤵PID:848
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --string-annotations --pdf-upsell-enabled --video-capture-use-gpu-memory-buffer --lang=en-US --js-flags=--ms-user-locale= --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=18 --always-read-main-dll --field-trial-handle=6200,i,15019539632172600223,4312611653094296534,262144 --variations-seed-version --mojo-platform-channel-handle=3652 /prefetch:12⤵PID:1036
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --message-loop-type-ui --video-capture-use-gpu-memory-buffer --string-annotations --always-read-main-dll --field-trial-handle=6548,i,15019539632172600223,4312611653094296534,262144 --variations-seed-version --mojo-platform-channel-handle=3628 /prefetch:82⤵PID:4252
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --message-loop-type-ui --video-capture-use-gpu-memory-buffer --string-annotations --always-read-main-dll --field-trial-handle=6544,i,15019539632172600223,4312611653094296534,262144 --variations-seed-version --mojo-platform-channel-handle=6512 /prefetch:82⤵PID:5536
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --message-loop-type-ui --video-capture-use-gpu-memory-buffer --string-annotations --always-read-main-dll --field-trial-handle=6520,i,15019539632172600223,4312611653094296534,262144 --variations-seed-version --mojo-platform-channel-handle=4788 /prefetch:82⤵PID:684
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=edge_search_indexer.mojom.SearchIndexerInterfaceBroker --lang=en-US --service-sandbox-type=search_indexer --message-loop-type-ui --video-capture-use-gpu-memory-buffer --string-annotations --always-read-main-dll --field-trial-handle=5216,i,15019539632172600223,4312611653094296534,262144 --variations-seed-version --mojo-platform-channel-handle=5848 /prefetch:82⤵PID:5068
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=unzip.mojom.Unzipper --lang=en-US --service-sandbox-type=service --video-capture-use-gpu-memory-buffer --string-annotations --always-read-main-dll --field-trial-handle=5912,i,15019539632172600223,4312611653094296534,262144 --variations-seed-version --mojo-platform-channel-handle=4788 /prefetch:82⤵PID:2272
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=unzip.mojom.Unzipper --lang=en-US --service-sandbox-type=service --video-capture-use-gpu-memory-buffer --string-annotations --always-read-main-dll --field-trial-handle=5660,i,15019539632172600223,4312611653094296534,262144 --variations-seed-version --mojo-platform-channel-handle=5684 /prefetch:82⤵PID:4892
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=unzip.mojom.Unzipper --lang=en-US --service-sandbox-type=service --video-capture-use-gpu-memory-buffer --string-annotations --always-read-main-dll --field-trial-handle=6616,i,15019539632172600223,4312611653094296534,262144 --variations-seed-version --mojo-platform-channel-handle=564 /prefetch:82⤵PID:4928
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --string-annotations --gpu-preferences=UAAAAAAAAADoAAAEAAAAAAAAAAAAAAAAAABgAAEAAAAAAAAAAAAAAAAAAABCAAAAAAAAAAAAAAAAAAAAAAAAABAAAAAAAAAAEAAAAAAAAAAIAAAAAAAAAAgAAAAAAAAA --always-read-main-dll --field-trial-handle=6604,i,15019539632172600223,4312611653094296534,262144 --variations-seed-version --mojo-platform-channel-handle=5724 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:5140
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=unzip.mojom.Unzipper --lang=en-US --service-sandbox-type=service --video-capture-use-gpu-memory-buffer --string-annotations --always-read-main-dll --field-trial-handle=5544,i,15019539632172600223,4312611653094296534,262144 --variations-seed-version --mojo-platform-channel-handle=5056 /prefetch:82⤵PID:3740
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\133.0.3065.69\elevation_service.exe"C:\Program Files (x86)\Microsoft\Edge\Application\133.0.3065.69\elevation_service.exe"1⤵PID:5072
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --no-startup-window --win-session-start1⤵PID:232
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --no-startup-window --win-session-start2⤵PID:3836
-
-
C:\Windows\System32\rundll32.exeC:\Windows\System32\rundll32.exe C:\Windows\System32\shell32.dll,SHCreateLocalServerRunDll {9aa46009-3ce0-458a-a354-715610a075e6} -Embedding1⤵PID:3632
-
C:\Users\Admin\Downloads\2mprext\client32.exe"C:\Users\Admin\Downloads\2mprext\client32.exe"1⤵
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
PID:2608
-
C:\Users\Admin\Downloads\2mprext\remcmdstub.exe"C:\Users\Admin\Downloads\2mprext\remcmdstub.exe"1⤵
- System Location Discovery: System Language Discovery
PID:3324
-
C:\Users\Admin\Downloads\2mprext\remcmdstub.exe"C:\Users\Admin\Downloads\2mprext\remcmdstub.exe"1⤵
- System Location Discovery: System Language Discovery
PID:636
-
C:\Windows\system32\OpenWith.exeC:\Windows\system32\OpenWith.exe -Embedding1⤵
- Modifies registry class
- Suspicious use of SetWindowsHookEx
PID:1124 -
C:\Windows\system32\NOTEPAD.EXE"C:\Windows\system32\NOTEPAD.EXE" C:\Users\Admin\Downloads\2mprext\setup\mp.dll2⤵
- Opens file in notepad (likely ransom note)
PID:4076
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
85B
MD5c3419069a1c30140b77045aba38f12cf
SHA111920f0c1e55cadc7d2893d1eebb268b3459762a
SHA256db9a702209807ba039871e542e8356219f342a8d9c9ca34bcd9a86727f4a3a0f
SHA512c5e95a4e9f5919cb14f4127539c4353a55c5f68062bf6f95e1843b6690cebed3c93170badb2412b7fb9f109a620385b0ae74783227d6813f26ff8c29074758a1
-
Filesize
66B
MD5496b05677135db1c74d82f948538c21c
SHA1e736e675ca5195b5fc16e59fb7de582437fb9f9a
SHA256df55a9464ee22a0f860c0f3b4a75ec62471d37b4d8cb7a0e460eef98cb83ebe7
SHA5128bd1b683e24a8c8c03b0bc041288296448f799a6f431bacbd62cb33e621672991141c7151d9424ad60ab65a7a6a30298243b8b71d281f9e99b8abb79fe16bd3c
-
Filesize
134B
MD5049c307f30407da557545d34db8ced16
SHA1f10b86ebfe8d30d0dc36210939ca7fa7a819d494
SHA256c36944790c4a1fa2f2acec5f7809a4d6689ecb7fb3b2f19c831c9adb4e17fc54
SHA51214f04e768956bdd9634f6a172104f2b630e2eeada2f73b9a249be2ec707f4a47ff60f2f700005ca95addd838db9438ad560e5136a10ed32df1d304d65f445780
-
Filesize
176B
MD56607494855f7b5c0348eecd49ef7ce46
SHA12c844dd9ea648efec08776757bc376b5a6f9eb71
SHA25637c30639ea04878b9407aecbcea4848b033e4548d5023ce5105ea79cab2c68dd
SHA5128cb60725d958291b9a78c293992768cb03ff53ab942637e62eb6f17d80e0864c56a9c8ccafbc28246e9ce1fdb248e8d071d76764bcaf0243397d0f0a62b4d09a
-
Filesize
1KB
MD5ee002cb9e51bb8dfa89640a406a1090a
SHA149ee3ad535947d8821ffdeb67ffc9bc37d1ebbb2
SHA2563dbd2c90050b652d63656481c3e5871c52261575292db77d4ea63419f187a55b
SHA512d1fdcc436b8ca8c68d4dc7077f84f803a535bf2ce31d9eb5d0c466b62d6567b2c59974995060403ed757e92245db07e70c6bddbf1c3519fed300cc5b9bf9177c
-
Filesize
79B
MD57f4b594a35d631af0e37fea02df71e72
SHA1f7bc71621ea0c176ca1ab0a3c9fe52dbca116f57
SHA256530882d7f535ae57a4906ca735b119c9e36480cbb780c7e8ad37c9c8fdf3d9b1
SHA512bf3f92f5023f0fbad88526d919252a98db6d167e9ca3e15b94f7d71ded38a2cfb0409f57ef24708284ddd965bda2d3207cd99c008b1c9c8c93705fd66ac86360
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\AutoLaunchProtocolsComponent\1.0.0.9\protocols.json
Filesize3KB
MD5f9fd82b572ef4ce41a3d1075acc52d22
SHA1fdded5eef95391be440cc15f84ded0480c0141e3
SHA2565f21978e992a53ebd9c138cb5391c481def7769e3525c586a8a94f276b3cd8d6
SHA51217084cc74462310a608355fbeafa8b51f295fb5fd067dfc641e752e69b1ee4ffba0e9eafa263aab67daab780b9b6be370dd3b54dd4ba8426ab499e50ff5c7339
-
Filesize
280B
MD5c37f9d2c357647fca20f2eaa89c18edd
SHA1cfd1035ed2d057c317b48546f467209cbbe15f2e
SHA2562ea3a0b7e6145fd110653b1a77cb827ad7e4a145c29378344bd3d28f595b2072
SHA5123563f4aca9e47f35de8cb38e42a3c0448bb3ec4c9183fa392abc28fee4ca08bf16da028ffbf31cf0c0f8301ed810238961e745590e5c71621bc5a2a889dd12f7
-
Filesize
2B
MD599914b932bd37a50b983c5e7c90ae93b
SHA1bf21a9e8fbc5a3846fb05b4fa0859e0917b2202f
SHA25644136fa355b3678a1146ad16f7e8649e94fb4fc21fe77e8310c060f61caaff8a
SHA51227c74670adb75075fad058d5ceaf7b20c4e7786c83bae8a32f626f9782af34c9a33c2046ef60fd2a7878d378e29fec851806bbd9a67878f3a9f1cda4830763fd
-
Filesize
107KB
MD540e2018187b61af5be8caf035fb72882
SHA172a0b7bcb454b6b727bf90da35879b3e9a70621e
SHA256b3efd9d75856016510dd0bdb5e22359925cee7f2056b3cde6411c55ae8ae8ee5
SHA512a21b8f3f7d646909d6aed605ad5823269f52fda1255aa9bb4d4643e165a7b11935572bf9e0a6a324874f99c20a6f3b6d1e457c7ccd30adcac83c15febc063d12
-
Filesize
2KB
MD5374cbcce9043b2c7f6da1ad800c05184
SHA12ab74334bb5e26cebec86cf62aeab51a3e8b561f
SHA2562d6f970771bef781ea51d91a898044bd9a4a79c37f091a4401ede6d78a2d4052
SHA512cea88966768af21178c188687a78afaeedc74bddb4917597e137a438cb038d41e75befb7cb9fdf11aced4d4221912478aa969c456737b535afca69d8e46796bf
-
Filesize
2B
MD5d751713988987e9331980363e24189ce
SHA197d170e1550eee4afc0af065b78cda302a97674c
SHA2564f53cda18c2baa0c0354bb5f9a3ecbe5ed12ab4d8e11ba873c2f11161202b945
SHA512b25b294cb4deb69ea00a4c3cf3113904801b6015e5956bd019a8570b1fe1d6040e944ef3cdee16d0a46503ca6e659a25f21cf9ceddc13f352a3c98138c15d6af
-
Filesize
40B
MD520d4b8fa017a12a108c87f540836e250
SHA11ac617fac131262b6d3ce1f52f5907e31d5f6f00
SHA2566028bd681dbf11a0a58dde8a0cd884115c04caa59d080ba51bde1b086ce0079d
SHA512507b2b8a8a168ff8f2bdafa5d9d341c44501a5f17d9f63f3d43bd586bc9e8ae33221887869fa86f845b7d067cb7d2a7009efd71dda36e03a40a74fee04b86856
-
Filesize
16KB
MD5d52502841da443a065d0651eae08b795
SHA1b1aed1439e8204d1dc4100c8b206b2fdd153a204
SHA2560ba667dfd7a8799c5acec55affacfd9ec8c8e8e9ea9e694a758fd069eb37c5e9
SHA51252eff3f0d8235c2e2b12ded1973ed1ee90462d27ee601ad2e1b1bae84563a91f126c4593c44d48cbaa794b2838ad583928b54cc45550fa86a2ef670358b962f6
-
Filesize
16KB
MD551811436db3297a0a54f13b55a3ca56a
SHA1f4911f8f4e7f5d8b2df69e8e9bc3905691e6c44e
SHA2562b2b762d42d8e35e22c1022cb74e7f878ac4e5c035e6906b0a3f93063520440a
SHA5124cd12affda5d9fa094f1fa1b8ba3492238935af0b7ef039d65c79329688acd6be6cf754026686033b2e5e914d677ab3f640202b14093d4bd768e9506a7f3f06a
-
Filesize
36KB
MD58e4cd235b86d7f1811d8fce68f0f352a
SHA18466ceed29e4b2abbdc258fe6d5b28132712f595
SHA2566aae1afa22f00d750199883b6495f85b04a1e62164987f4e207bd53946971de1
SHA512dd65e3a1e1b54f7599093cf88df8388a99068e74f4d7b30d57e186b7f7b30caec26bc09a227af1c15dfe258d4c80fbe55b5b28dff51ddabfcbf825a1f6ec4fb3
-
Filesize
22KB
MD5c6ecff5fa4e7ac3b34092859ee05d4be
SHA105e6cb33892b331dbb5a1b123e1552b32588cd4a
SHA256c32cfeded5cd9556052c5175f731ac8b23904b3fa9b8055d643f11ceb282e0db
SHA512427d60ef8ac9aa151030153e77efdcf79d7a236a9e6fb77af5215ac38e8c089263033e142036c8e9962c5daa6df07a078e93ca01ed11b6f5e0aef78f8850ca61
-
Filesize
23KB
MD5bd47fe4cf52f73db0273d8bf97f72db6
SHA1370471137352a4b456c7a30cad050c28614e9f2d
SHA256cce5e27c3b7f0aea91b32ce1d950e3546949ff5e905cc8ca76fd8bad5bc2ef01
SHA5124bf2e40944621e5d1f6415c01f2631675a527e5084804cb4a3f74550710b9c5c15925454a279150b9c3455027f981dd71b6c7cb5fa24fd4762fc801b56fb4492
-
Filesize
467B
MD5a196692cc81e325d171ba6c9a5fcaeda
SHA1c52a62e1fa3e3faf0001d268809afc93d3bd171c
SHA25682db54fe63f5befde6a019f1588769c34e6fa5a7f065e9c10add4034dd26c319
SHA5126dd313ea5ebe4a6a92473af7fe1b1a06538a34ec087a997cd9008dc25c465cc80df05a0c28cb5d3fab2a4b499548fc2c614df56e68c9cb0793d883ec49e78dfc
-
Filesize
900B
MD59f687cd8cbcea81089a4675e5e5b6947
SHA130ed01c92e10b540a873c547e11bd1f71b668cbf
SHA256b8f1b3fbd2360fa4cf6e687c2696d8f7bbb770fb2d8191bb26e7e8b2c838f2cf
SHA5125b68d4fb19b4a96eb87736fdec2828b0d30198e604dd2343b070cde9ec1aa4237414e60667a3533e736f22db318ff5107fc868a3c666f2ce5917400e5f97b498
-
Filesize
19KB
MD541c1930548d8b99ff1dbb64ba7fecb3d
SHA1d8acfeaf7c74e2b289be37687f886f50c01d4f2f
SHA25616cee17a989167242dd7ee2755721e357dd23bcfcb61f5789cc19deafe7ca502
SHA512a684d61324c71ac15f3a907788ab2150f61e7e2b2bf13ca08c14e9822b22336d0d45d9ff2a2a145aa7321d28d6b71408f9515131f8a1bd9f4927b105e6471b75
-
Filesize
49KB
MD532e34a4728b0c54e22f8481499c4a2f9
SHA108225f4572703cb86727114d424e784b06996de8
SHA256c7946b9d002a0f9deb1e91cc68a0650b9367e12bd4dd223dc087581a01011a73
SHA512145f7d83c9b7a49e7b06a1a25eba110b5eb6cbbccf140ef88e19d61cbb2e1d0ab38695afa3b690726cb1d942f34db0066b97ee08a88294f4bd6b4adde7bd4148
-
Filesize
40KB
MD54c08309e9ed1437ebf780a237be8f299
SHA1189bdd941881b1ad029e6cf2ecc935a48ead69d0
SHA2563c08235e6bc73777b4d276a7cebbbb4c1cacdf0f68d3cbcf870270721acbac39
SHA512a334f770d4e392d1e6f00d15808d9e90747e9b216598dff30942dd2a738ed4f086c3947bb74b57adee3ea7b935e2f7ee2036c5dfafb47a752f9d86ca48723b6a
-
Filesize
40KB
MD51101b7722c06cfa21df98c99c8986a5c
SHA1b46037a4ec8d6490ee142843e4835aa5468ff700
SHA256e42b7c26168657d6bd728128b50c3a76a9fe0b45e7c86573ba7a2c45ad4f20b5
SHA5123670e982266f7fb6676c0a547ea3c4c86f36feb2ce1712d6953db3cdde1ac25e2251c71d003941402e23636e289d0ade982af8d80ed6e750153fcf6a2b2539c9
-
Filesize
49KB
MD5044a5cc37efd962ce1f77b7cc0333409
SHA164c6bd0e87d5e81d0d2ba8b17cca916d8648e22f
SHA256a53a9b87f318a60da4061a68ad10b324888e2bf8a83cceed1bffba81552be579
SHA51231e2715dedf61c68306a3308dc2cf3dafc6038fe355cc5704beb0737920f175bcba3f8d040e97cef4056b2c5b1ab6081f010ba1ed4fc5a6270c1c5e7c0400888
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\TrustTokenKeyCommitments\2025.1.17.1\keys.json
Filesize6KB
MD5bef4f9f856321c6dccb47a61f605e823
SHA18e60af5b17ed70db0505d7e1647a8bc9f7612939
SHA256fd1847df25032c4eef34e045ba0333f9bd3cb38c14344f1c01b48f61f0cfd5c5
SHA512bdec3e243a6f39bfea4130c85b162ea00a4974c6057cd06a05348ac54517201bbf595fcc7c22a4ab2c16212c6009f58df7445c40c82722ab4fa1c8d49d39755c
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\extensions_crx_cache\ghbmnnjooekpmoecnnnilnnbdlolhkhi_1.fa2232917a5656ea4f811936561ea6b7c92b3c0004c5e08ecb97636d3afc6f72
Filesize152KB
MD5dd9bf8448d3ddcfd067967f01e8bf6d7
SHA1d7829475b2bd6a3baa8fabfaf39af57c6439b35e
SHA256fa2232917a5656ea4f811936561ea6b7c92b3c0004c5e08ecb97636d3afc6f72
SHA51265347df34378c2bbb34417e2cccfb3251a0b2412422cc190eed9df525b6e0a9948e0295ea3c33b3ad873ce81e369e89a138ac41d6eb7229546c3269107e661de
-
C:\Users\Admin\AppData\Local\Microsoft\TokenBroker\Cache\5a2a7058cf8d1e56c20e6b19a7c48eb2386d141b.tbres
Filesize2KB
MD500c8ea3fc885b25395e36087122b113e
SHA1addf94a2e2bd82e2d1091c17dfe43ea981436922
SHA25697981dbbaa2b36952d594a24e896bdce0e8fcc0f6db7fce887ecbfa545c797ce
SHA5127c232fadb130433a9a2c6ee18e317d42e8d0ac3a9f1453bffe31efae4e882da03f67e9db740f75b6c741d31bd56a11b99b98efb3a806379f24662f762ce7fc34
-
Filesize
3.9MB
MD5a164b787f105d100deddd4565fb03a91
SHA1fef861817ef59ebb6728016114cbe084fd6d54b7
SHA2564c048169e303dc3438e53e5abdec31b45b5184f05dc6d1bc39e18caa0e4a3f3e
SHA512ceb1542d11f0936c3331d3f9348fced60ca004d0277f6bfdc9d2db5a26067173603e694890800e836063d959a8f3f9f410e29cd8ed80232b692955a5aa32280b