Analysis
-
max time kernel
144s -
max time network
140s -
platform
windows10-2004_x64 -
resource
win10v2004-20250314-en -
resource tags
arch:x64arch:x86image:win10v2004-20250314-enlocale:en-usos:windows10-2004-x64system -
submitted
07/04/2025, 16:53
Static task
static1
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
https://liddar.ca/wp-content/Wia64.zip
Resource
win10v2004-20250314-en
General
-
Target
https://liddar.ca/wp-content/Wia64.zip
Malware Config
Signatures
-
NetSupport
NetSupport is a remote access tool sold as a legitimate system administration software.
-
Netsupport family
-
Drops file in Program Files directory 64 IoCs
description ioc Process File created C:\Program Files\chrome_Unpacker_BeginUnzipping624_1446342213\manifest.json msedge.exe File created C:\Program Files\chrome_Unpacker_BeginUnzipping624_1882638948\_locales\ml\messages.json msedge.exe File created C:\Program Files\chrome_Unpacker_BeginUnzipping624_1882638948\_locales\af\messages.json msedge.exe File created C:\Program Files\chrome_Unpacker_BeginUnzipping624_1882638948\_locales\de\messages.json msedge.exe File created C:\Program Files\chrome_Unpacker_BeginUnzipping624_371028746\deny_full_domains.list msedge.exe File created C:\Program Files\chrome_Unpacker_BeginUnzipping624_1882638948\_locales\km\messages.json msedge.exe File created C:\Program Files\chrome_Unpacker_BeginUnzipping624_1882638948\_locales\uk\messages.json msedge.exe File created C:\Program Files\chrome_Unpacker_BeginUnzipping624_1882638948\_locales\cs\messages.json msedge.exe File created C:\Program Files\chrome_Unpacker_BeginUnzipping624_1882638948\_locales\zh_HK\messages.json msedge.exe File created C:\Program Files\chrome_Unpacker_BeginUnzipping624_1882638948\_locales\lt\messages.json msedge.exe File created C:\Program Files\chrome_Unpacker_BeginUnzipping624_1882638948\128.png msedge.exe File created C:\Program Files\chrome_Unpacker_BeginUnzipping624_1882638948\page_embed_script.js msedge.exe File created C:\Program Files\chrome_Unpacker_BeginUnzipping624_1882638948\offscreendocument.html msedge.exe File created C:\Program Files\chrome_Unpacker_BeginUnzipping624_1882638948\_locales\my\messages.json msedge.exe File created C:\Program Files\chrome_Unpacker_BeginUnzipping624_1882638948\_locales\ta\messages.json msedge.exe File created C:\Program Files\chrome_Unpacker_BeginUnzipping624_1882638948\_locales\kn\messages.json msedge.exe File created C:\Program Files\chrome_Unpacker_BeginUnzipping624_1085035767\manifest.json msedge.exe File created C:\Program Files\chrome_Unpacker_BeginUnzipping624_371028746\deny_domains.list msedge.exe File created C:\Program Files\chrome_Unpacker_BeginUnzipping624_371028746\manifest.fingerprint msedge.exe File created C:\Program Files\chrome_Unpacker_BeginUnzipping624_1882638948\_locales\fi\messages.json msedge.exe File created C:\Program Files\chrome_Unpacker_BeginUnzipping624_1882638948\_locales\fr_CA\messages.json msedge.exe File created C:\Program Files\chrome_Unpacker_BeginUnzipping624_1882638948\_locales\sr\messages.json msedge.exe File created C:\Program Files\chrome_Unpacker_BeginUnzipping624_1882638948\_locales\hu\messages.json msedge.exe File created C:\Program Files\chrome_Unpacker_BeginUnzipping624_1882638948\_locales\tr\messages.json msedge.exe File created C:\Program Files\chrome_Unpacker_BeginUnzipping624_1882638948\_locales\si\messages.json msedge.exe File created C:\Program Files\chrome_Unpacker_BeginUnzipping624_1882638948\_locales\fa\messages.json msedge.exe File created C:\Program Files\chrome_Unpacker_BeginUnzipping624_1882638948\_locales\sl\messages.json msedge.exe File created C:\Program Files\chrome_Unpacker_BeginUnzipping624_1882638948\service_worker_bin_prod.js msedge.exe File created C:\Program Files\chrome_Unpacker_BeginUnzipping624_1882638948\_locales\bn\messages.json msedge.exe File created C:\Program Files\chrome_Unpacker_BeginUnzipping624_1882638948\_locales\pl\messages.json msedge.exe File created C:\Program Files\chrome_Unpacker_BeginUnzipping624_1882638948\_locales\en_GB\messages.json msedge.exe File created C:\Program Files\chrome_Unpacker_BeginUnzipping624_1882638948\_locales\id\messages.json msedge.exe File created C:\Program Files\chrome_Unpacker_BeginUnzipping624_1882638948\_locales\fr\messages.json msedge.exe File created C:\Program Files\chrome_Unpacker_BeginUnzipping624_2094197187\LICENSE msedge.exe File created C:\Program Files\chrome_Unpacker_BeginUnzipping624_2094197187\_metadata\verified_contents.json msedge.exe File created C:\Program Files\chrome_Unpacker_BeginUnzipping624_1882638948\_locales\no\messages.json msedge.exe File created C:\Program Files\chrome_Unpacker_BeginUnzipping624_1882638948\_locales\iw\messages.json msedge.exe File created C:\Program Files\chrome_Unpacker_BeginUnzipping624_1882638948\_locales\es\messages.json msedge.exe File created C:\Program Files\chrome_Unpacker_BeginUnzipping624_2094197187\manifest.json msedge.exe File created C:\Program Files\chrome_Unpacker_BeginUnzipping624_1882638948\_locales\pa\messages.json msedge.exe File created C:\Program Files\chrome_Unpacker_BeginUnzipping624_1882638948\_locales\en\messages.json msedge.exe File created C:\Program Files\chrome_Unpacker_BeginUnzipping624_1882638948\_locales\zu\messages.json msedge.exe File created C:\Program Files\chrome_Unpacker_BeginUnzipping624_1882638948\_locales\hy\messages.json msedge.exe File created C:\Program Files\chrome_Unpacker_BeginUnzipping624_371028746\deny_etld1_domains.list msedge.exe File created C:\Program Files\chrome_Unpacker_BeginUnzipping624_1882638948\_locales\zh_TW\messages.json msedge.exe File created C:\Program Files\chrome_Unpacker_BeginUnzipping624_1882638948\_locales\ro\messages.json msedge.exe File created C:\Program Files\chrome_Unpacker_BeginUnzipping624_1882638948\_locales\zh_CN\messages.json msedge.exe File created C:\Program Files\chrome_Unpacker_BeginUnzipping624_1882638948\_locales\mn\messages.json msedge.exe File created C:\Program Files\chrome_Unpacker_BeginUnzipping624_1882638948\_locales\ur\messages.json msedge.exe File created C:\Program Files\chrome_Unpacker_BeginUnzipping624_1882638948\_locales\en_CA\messages.json msedge.exe File created C:\Program Files\chrome_Unpacker_BeginUnzipping624_1882638948\_locales\is\messages.json msedge.exe File created C:\Program Files\chrome_Unpacker_BeginUnzipping624_2094197187\manifest.fingerprint msedge.exe File created C:\Program Files\chrome_Unpacker_BeginUnzipping624_1882638948\_locales\am\messages.json msedge.exe File created C:\Program Files\chrome_Unpacker_BeginUnzipping624_1882638948\_locales\en_US\messages.json msedge.exe File created C:\Program Files\chrome_Unpacker_BeginUnzipping624_1882638948\_locales\it\messages.json msedge.exe File created C:\Program Files\chrome_Unpacker_BeginUnzipping624_2094197187\keys.json msedge.exe File created C:\Program Files\chrome_Unpacker_BeginUnzipping624_371028746\manifest.json msedge.exe File created C:\Program Files\chrome_Unpacker_BeginUnzipping624_1882638948\_locales\sv\messages.json msedge.exe File created C:\Program Files\chrome_Unpacker_BeginUnzipping624_1882638948\_locales\ja\messages.json msedge.exe File created C:\Program Files\chrome_Unpacker_BeginUnzipping624_1882638948\_locales\lv\messages.json msedge.exe File created C:\Program Files\chrome_Unpacker_BeginUnzipping624_1882638948\_locales\gl\messages.json msedge.exe File created C:\Program Files\chrome_Unpacker_BeginUnzipping624_1882638948\_locales\lo\messages.json msedge.exe File created C:\Program Files\chrome_Unpacker_BeginUnzipping624_1882638948\_locales\ar\messages.json msedge.exe File created C:\Program Files\chrome_Unpacker_BeginUnzipping624_1882638948\_locales\hi\messages.json msedge.exe -
System Location Discovery: System Language Discovery 1 TTPs 4 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language remcmdstub.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language client32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language client32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language remcmdstub.exe -
Checks processor information in registry 2 TTPs 2 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\VendorIdentifier msedge.exe -
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe -
Modifies data under HKEY_USERS 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry msedge.exe Set value (int) \REGISTRY\USER\S-1-5-19\SOFTWARE\Microsoft\Cryptography\TPM\Telemetry\TraceTimeLast = "133885184350517953" msedge.exe -
Modifies registry class 5 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ msedge.exe Key created \REGISTRY\MACHINE\Software\Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppModel\Deployment\Package\*\S-1-5-21-446031748-3036493239-2009529691-1000\{8C0F4DB3-7D17-44C3-9AC3-AFA783A9F1DE} msedge.exe Key created \REGISTRY\USER\S-1-5-21-446031748-3036493239-2009529691-1000_Classes\Local Settings msedge.exe Key created \REGISTRY\USER\S-1-5-21-446031748-3036493239-2009529691-1000_Classes\Local Settings OpenWith.exe Key created \REGISTRY\USER\S-1-5-21-446031748-3036493239-2009529691-1000_Classes\Local Settings OpenWith.exe -
Opens file in notepad (likely ransom note) 1 IoCs
pid Process 2368 NOTEPAD.EXE -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 2004 msedge.exe 2004 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 5 IoCs
pid Process 624 msedge.exe 624 msedge.exe 624 msedge.exe 624 msedge.exe 624 msedge.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeSecurityPrivilege 4388 client32.exe -
Suspicious use of FindShellTrayWindow 64 IoCs
pid Process 624 msedge.exe 624 msedge.exe 624 msedge.exe 624 msedge.exe 624 msedge.exe 624 msedge.exe 624 msedge.exe 624 msedge.exe 624 msedge.exe 624 msedge.exe 624 msedge.exe 624 msedge.exe 624 msedge.exe 624 msedge.exe 624 msedge.exe 624 msedge.exe 624 msedge.exe 624 msedge.exe 624 msedge.exe 624 msedge.exe 624 msedge.exe 624 msedge.exe 624 msedge.exe 624 msedge.exe 624 msedge.exe 624 msedge.exe 624 msedge.exe 624 msedge.exe 624 msedge.exe 624 msedge.exe 624 msedge.exe 624 msedge.exe 624 msedge.exe 624 msedge.exe 624 msedge.exe 624 msedge.exe 624 msedge.exe 624 msedge.exe 624 msedge.exe 624 msedge.exe 624 msedge.exe 624 msedge.exe 624 msedge.exe 624 msedge.exe 624 msedge.exe 624 msedge.exe 624 msedge.exe 624 msedge.exe 624 msedge.exe 624 msedge.exe 624 msedge.exe 624 msedge.exe 624 msedge.exe 624 msedge.exe 624 msedge.exe 624 msedge.exe 624 msedge.exe 624 msedge.exe 624 msedge.exe 624 msedge.exe 624 msedge.exe 624 msedge.exe 624 msedge.exe 624 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 624 msedge.exe 624 msedge.exe 624 msedge.exe 624 msedge.exe 624 msedge.exe 624 msedge.exe 624 msedge.exe 624 msedge.exe 624 msedge.exe 624 msedge.exe 624 msedge.exe 624 msedge.exe 624 msedge.exe 624 msedge.exe 624 msedge.exe 624 msedge.exe 624 msedge.exe 624 msedge.exe 624 msedge.exe 624 msedge.exe 624 msedge.exe 624 msedge.exe 624 msedge.exe 624 msedge.exe -
Suspicious use of SetWindowsHookEx 14 IoCs
pid Process 4740 OpenWith.exe 5952 OpenWith.exe 5952 OpenWith.exe 5952 OpenWith.exe 5952 OpenWith.exe 5952 OpenWith.exe 5952 OpenWith.exe 5952 OpenWith.exe 5952 OpenWith.exe 5952 OpenWith.exe 5952 OpenWith.exe 5952 OpenWith.exe 5952 OpenWith.exe 5952 OpenWith.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 624 wrote to memory of 3712 624 msedge.exe 87 PID 624 wrote to memory of 3712 624 msedge.exe 87 PID 624 wrote to memory of 3380 624 msedge.exe 88 PID 624 wrote to memory of 3380 624 msedge.exe 88 PID 624 wrote to memory of 2896 624 msedge.exe 89 PID 624 wrote to memory of 2896 624 msedge.exe 89 PID 624 wrote to memory of 2896 624 msedge.exe 89 PID 624 wrote to memory of 2896 624 msedge.exe 89 PID 624 wrote to memory of 2896 624 msedge.exe 89 PID 624 wrote to memory of 2896 624 msedge.exe 89 PID 624 wrote to memory of 2896 624 msedge.exe 89 PID 624 wrote to memory of 2896 624 msedge.exe 89 PID 624 wrote to memory of 2896 624 msedge.exe 89 PID 624 wrote to memory of 2896 624 msedge.exe 89 PID 624 wrote to memory of 2896 624 msedge.exe 89 PID 624 wrote to memory of 2896 624 msedge.exe 89 PID 624 wrote to memory of 2896 624 msedge.exe 89 PID 624 wrote to memory of 2896 624 msedge.exe 89 PID 624 wrote to memory of 2896 624 msedge.exe 89 PID 624 wrote to memory of 2896 624 msedge.exe 89 PID 624 wrote to memory of 2896 624 msedge.exe 89 PID 624 wrote to memory of 2896 624 msedge.exe 89 PID 624 wrote to memory of 2896 624 msedge.exe 89 PID 624 wrote to memory of 2896 624 msedge.exe 89 PID 624 wrote to memory of 2896 624 msedge.exe 89 PID 624 wrote to memory of 2896 624 msedge.exe 89 PID 624 wrote to memory of 2896 624 msedge.exe 89 PID 624 wrote to memory of 2896 624 msedge.exe 89 PID 624 wrote to memory of 2896 624 msedge.exe 89 PID 624 wrote to memory of 2896 624 msedge.exe 89 PID 624 wrote to memory of 2896 624 msedge.exe 89 PID 624 wrote to memory of 2896 624 msedge.exe 89 PID 624 wrote to memory of 2896 624 msedge.exe 89 PID 624 wrote to memory of 2896 624 msedge.exe 89 PID 624 wrote to memory of 2896 624 msedge.exe 89 PID 624 wrote to memory of 2896 624 msedge.exe 89 PID 624 wrote to memory of 2896 624 msedge.exe 89 PID 624 wrote to memory of 2896 624 msedge.exe 89 PID 624 wrote to memory of 2896 624 msedge.exe 89 PID 624 wrote to memory of 2896 624 msedge.exe 89 PID 624 wrote to memory of 2896 624 msedge.exe 89 PID 624 wrote to memory of 2896 624 msedge.exe 89 PID 624 wrote to memory of 2896 624 msedge.exe 89 PID 624 wrote to memory of 2896 624 msedge.exe 89 PID 624 wrote to memory of 2896 624 msedge.exe 89 PID 624 wrote to memory of 2896 624 msedge.exe 89 PID 624 wrote to memory of 2896 624 msedge.exe 89 PID 624 wrote to memory of 2896 624 msedge.exe 89 PID 624 wrote to memory of 2896 624 msedge.exe 89 PID 624 wrote to memory of 2896 624 msedge.exe 89 PID 624 wrote to memory of 2896 624 msedge.exe 89 PID 624 wrote to memory of 2896 624 msedge.exe 89 PID 624 wrote to memory of 2896 624 msedge.exe 89 PID 624 wrote to memory of 2896 624 msedge.exe 89 PID 624 wrote to memory of 2896 624 msedge.exe 89 PID 624 wrote to memory of 1552 624 msedge.exe 90 PID 624 wrote to memory of 1552 624 msedge.exe 90 PID 624 wrote to memory of 1552 624 msedge.exe 90 PID 624 wrote to memory of 1552 624 msedge.exe 90 PID 624 wrote to memory of 1552 624 msedge.exe 90 PID 624 wrote to memory of 1552 624 msedge.exe 90 PID 624 wrote to memory of 1552 624 msedge.exe 90 PID 624 wrote to memory of 1552 624 msedge.exe 90 PID 624 wrote to memory of 1552 624 msedge.exe 90
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --start-maximized --single-argument https://liddar.ca/wp-content/Wia64.zip1⤵
- Drops file in Program Files directory
- Checks processor information in registry
- Enumerates system info in registry
- Modifies data under HKEY_USERS
- Modifies registry class
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:624 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:4 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=133.0.6943.99 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 --annotation=prod=Edge --annotation=ver=133.0.3065.69 --initial-client-data=0x23c,0x240,0x244,0x238,0x260,0x7ff9e18bf208,0x7ff9e18bf214,0x7ff9e18bf2202⤵PID:3712
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --string-annotations --always-read-main-dll --field-trial-handle=1920,i,15310507057912149710,10902876308689367553,262144 --variations-seed-version --mojo-platform-channel-handle=2256 /prefetch:32⤵PID:3380
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --string-annotations --gpu-preferences=UAAAAAAAAADgAAAEAAAAAAAAAAAAAAAAAABgAAEAAAAAAAAAAAAAAAAAAAACAAAAAAAAAAAAAAAAAAAAAAAAABAAAAAAAAAAEAAAAAAAAAAIAAAAAAAAAAgAAAAAAAAA --always-read-main-dll --field-trial-handle=2216,i,15310507057912149710,10902876308689367553,262144 --variations-seed-version --mojo-platform-channel-handle=2212 /prefetch:22⤵PID:2896
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=service --string-annotations --always-read-main-dll --field-trial-handle=2460,i,15310507057912149710,10902876308689367553,262144 --variations-seed-version --mojo-platform-channel-handle=2616 /prefetch:82⤵PID:1552
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --string-annotations --pdf-upsell-enabled --video-capture-use-gpu-memory-buffer --lang=en-US --js-flags=--ms-user-locale= --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --always-read-main-dll --field-trial-handle=3524,i,15310507057912149710,10902876308689367553,262144 --variations-seed-version --mojo-platform-channel-handle=3596 /prefetch:12⤵PID:4628
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --string-annotations --pdf-upsell-enabled --video-capture-use-gpu-memory-buffer --lang=en-US --js-flags=--ms-user-locale= --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --always-read-main-dll --field-trial-handle=3544,i,15310507057912149710,10902876308689367553,262144 --variations-seed-version --mojo-platform-channel-handle=3652 /prefetch:12⤵PID:4644
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=asset_store.mojom.AssetStoreService --lang=en-US --service-sandbox-type=asset_store_service --video-capture-use-gpu-memory-buffer --string-annotations --always-read-main-dll --field-trial-handle=5060,i,15310507057912149710,10902876308689367553,262144 --variations-seed-version --mojo-platform-channel-handle=5096 /prefetch:82⤵PID:1320
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=entity_extraction_service.mojom.Extractor --lang=en-US --service-sandbox-type=entity_extraction --onnx-enabled-for-ee --video-capture-use-gpu-memory-buffer --string-annotations --always-read-main-dll --field-trial-handle=5080,i,15310507057912149710,10902876308689367553,262144 --variations-seed-version --mojo-platform-channel-handle=5168 /prefetch:82⤵PID:1028
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=edge_collections.mojom.CollectionsDataManager --lang=en-US --service-sandbox-type=collections --video-capture-use-gpu-memory-buffer --string-annotations --always-read-main-dll --field-trial-handle=5520,i,15310507057912149710,10902876308689367553,262144 --variations-seed-version --mojo-platform-channel-handle=5596 /prefetch:82⤵PID:5900
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --string-annotations --pdf-upsell-enabled --video-capture-use-gpu-memory-buffer --lang=en-US --js-flags=--ms-user-locale= --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --always-read-main-dll --field-trial-handle=5608,i,15310507057912149710,10902876308689367553,262144 --variations-seed-version --mojo-platform-channel-handle=5648 /prefetch:12⤵PID:3732
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=PooledProcess2 --lang=en-US --service-sandbox-type=utility --video-capture-use-gpu-memory-buffer --string-annotations --always-read-main-dll --field-trial-handle=5920,i,15310507057912149710,10902876308689367553,262144 --variations-seed-version --mojo-platform-channel-handle=5940 /prefetch:82⤵PID:3804
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\133.0.3065.69\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\133.0.3065.69\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --lang=en-US --service-sandbox-type=none --video-capture-use-gpu-memory-buffer --string-annotations --always-read-main-dll --field-trial-handle=6000,i,15310507057912149710,10902876308689367553,262144 --variations-seed-version --mojo-platform-channel-handle=6044 /prefetch:82⤵PID:2788
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\133.0.3065.69\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\133.0.3065.69\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --lang=en-US --service-sandbox-type=none --video-capture-use-gpu-memory-buffer --string-annotations --always-read-main-dll --field-trial-handle=6000,i,15310507057912149710,10902876308689367553,262144 --variations-seed-version --mojo-platform-channel-handle=6044 /prefetch:82⤵PID:1936
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=unzip.mojom.Unzipper --lang=en-US --service-sandbox-type=service --video-capture-use-gpu-memory-buffer --string-annotations --always-read-main-dll --field-trial-handle=6756,i,15310507057912149710,10902876308689367553,262144 --variations-seed-version --mojo-platform-channel-handle=3628 /prefetch:82⤵PID:2856
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=PooledProcess2 --lang=en-US --service-sandbox-type=utility --video-capture-use-gpu-memory-buffer --string-annotations --always-read-main-dll --field-trial-handle=6740,i,15310507057912149710,10902876308689367553,262144 --variations-seed-version --mojo-platform-channel-handle=6636 /prefetch:82⤵PID:4288
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --string-annotations --pdf-upsell-enabled --video-capture-use-gpu-memory-buffer --lang=en-US --js-flags=--ms-user-locale= --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=17 --always-read-main-dll --field-trial-handle=4368,i,15310507057912149710,10902876308689367553,262144 --variations-seed-version --mojo-platform-channel-handle=5764 /prefetch:12⤵PID:5812
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --message-loop-type-ui --video-capture-use-gpu-memory-buffer --string-annotations --always-read-main-dll --field-trial-handle=564,i,15310507057912149710,10902876308689367553,262144 --variations-seed-version --mojo-platform-channel-handle=3724 /prefetch:82⤵PID:4760
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --message-loop-type-ui --video-capture-use-gpu-memory-buffer --string-annotations --always-read-main-dll --field-trial-handle=4860,i,15310507057912149710,10902876308689367553,262144 --variations-seed-version --mojo-platform-channel-handle=5996 /prefetch:82⤵PID:5168
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --message-loop-type-ui --video-capture-use-gpu-memory-buffer --string-annotations --always-read-main-dll --field-trial-handle=5932,i,15310507057912149710,10902876308689367553,262144 --variations-seed-version --mojo-platform-channel-handle=6008 /prefetch:82⤵PID:4720
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=quarantine.mojom.Quarantine --lang=en-US --service-sandbox-type=none --video-capture-use-gpu-memory-buffer --string-annotations --always-read-main-dll --field-trial-handle=5048,i,15310507057912149710,10902876308689367553,262144 --variations-seed-version --mojo-platform-channel-handle=6340 /prefetch:82⤵PID:3824
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=edge_search_indexer.mojom.SearchIndexerInterfaceBroker --lang=en-US --service-sandbox-type=search_indexer --message-loop-type-ui --video-capture-use-gpu-memory-buffer --string-annotations --always-read-main-dll --field-trial-handle=5456,i,15310507057912149710,10902876308689367553,262144 --variations-seed-version --mojo-platform-channel-handle=6032 /prefetch:82⤵PID:5048
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=unzip.mojom.Unzipper --lang=en-US --service-sandbox-type=service --video-capture-use-gpu-memory-buffer --string-annotations --always-read-main-dll --field-trial-handle=4036,i,15310507057912149710,10902876308689367553,262144 --variations-seed-version --mojo-platform-channel-handle=6052 /prefetch:82⤵PID:2852
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=unzip.mojom.Unzipper --lang=en-US --service-sandbox-type=service --video-capture-use-gpu-memory-buffer --string-annotations --always-read-main-dll --field-trial-handle=6024,i,15310507057912149710,10902876308689367553,262144 --variations-seed-version --mojo-platform-channel-handle=4032 /prefetch:82⤵PID:2300
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=unzip.mojom.Unzipper --lang=en-US --service-sandbox-type=service --video-capture-use-gpu-memory-buffer --string-annotations --always-read-main-dll --field-trial-handle=6220,i,15310507057912149710,10902876308689367553,262144 --variations-seed-version --mojo-platform-channel-handle=5588 /prefetch:82⤵PID:5404
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --string-annotations --gpu-preferences=UAAAAAAAAADoAAAEAAAAAAAAAAAAAAAAAABgAAEAAAAAAAAAAAAAAAAAAABCAAAAAAAAAAAAAAAAAAAAAAAAABAAAAAAAAAAEAAAAAAAAAAIAAAAAAAAAAgAAAAAAAAA --always-read-main-dll --field-trial-handle=5944,i,15310507057912149710,10902876308689367553,262144 --variations-seed-version --mojo-platform-channel-handle=5628 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:2004
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=unzip.mojom.Unzipper --lang=en-US --service-sandbox-type=service --video-capture-use-gpu-memory-buffer --string-annotations --always-read-main-dll --field-trial-handle=5076,i,15310507057912149710,10902876308689367553,262144 --variations-seed-version --mojo-platform-channel-handle=6324 /prefetch:82⤵PID:1940
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\133.0.3065.69\elevation_service.exe"C:\Program Files (x86)\Microsoft\Edge\Application\133.0.3065.69\elevation_service.exe"1⤵PID:4484
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --no-startup-window --win-session-start1⤵PID:2632
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --no-startup-window --win-session-start2⤵PID:1336
-
-
C:\Windows\System32\rundll32.exeC:\Windows\System32\rundll32.exe C:\Windows\System32\shell32.dll,SHCreateLocalServerRunDll {9aa46009-3ce0-458a-a354-715610a075e6} -Embedding1⤵PID:1220
-
C:\Users\Admin\Downloads\Wia64\client32.exe"C:\Users\Admin\Downloads\Wia64\client32.exe"1⤵
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:4388
-
C:\Users\Admin\Downloads\Wia64\remcmdstub.exe"C:\Users\Admin\Downloads\Wia64\remcmdstub.exe"1⤵
- System Location Discovery: System Language Discovery
PID:4236
-
C:\Users\Admin\Downloads\Wia64\remcmdstub.exe"C:\Users\Admin\Downloads\Wia64\remcmdstub.exe"1⤵
- System Location Discovery: System Language Discovery
PID:2024
-
C:\Users\Admin\Downloads\Wia64\client32.exe"C:\Users\Admin\Downloads\Wia64\client32.exe"1⤵
- System Location Discovery: System Language Discovery
PID:2384
-
C:\Windows\system32\OpenWith.exeC:\Windows\system32\OpenWith.exe -Embedding1⤵
- Modifies registry class
- Suspicious use of SetWindowsHookEx
PID:4740
-
C:\Windows\system32\OpenWith.exeC:\Windows\system32\OpenWith.exe -Embedding1⤵
- Modifies registry class
- Suspicious use of SetWindowsHookEx
PID:5952 -
C:\Windows\system32\NOTEPAD.EXE"C:\Windows\system32\NOTEPAD.EXE" C:\Users\Admin\Downloads\Wia64\pcicapi.dll2⤵
- Opens file in notepad (likely ransom note)
PID:2368
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
66B
MD5496b05677135db1c74d82f948538c21c
SHA1e736e675ca5195b5fc16e59fb7de582437fb9f9a
SHA256df55a9464ee22a0f860c0f3b4a75ec62471d37b4d8cb7a0e460eef98cb83ebe7
SHA5128bd1b683e24a8c8c03b0bc041288296448f799a6f431bacbd62cb33e621672991141c7151d9424ad60ab65a7a6a30298243b8b71d281f9e99b8abb79fe16bd3c
-
Filesize
134B
MD5049c307f30407da557545d34db8ced16
SHA1f10b86ebfe8d30d0dc36210939ca7fa7a819d494
SHA256c36944790c4a1fa2f2acec5f7809a4d6689ecb7fb3b2f19c831c9adb4e17fc54
SHA51214f04e768956bdd9634f6a172104f2b630e2eeada2f73b9a249be2ec707f4a47ff60f2f700005ca95addd838db9438ad560e5136a10ed32df1d304d65f445780
-
Filesize
1KB
MD5ee002cb9e51bb8dfa89640a406a1090a
SHA149ee3ad535947d8821ffdeb67ffc9bc37d1ebbb2
SHA2563dbd2c90050b652d63656481c3e5871c52261575292db77d4ea63419f187a55b
SHA512d1fdcc436b8ca8c68d4dc7077f84f803a535bf2ce31d9eb5d0c466b62d6567b2c59974995060403ed757e92245db07e70c6bddbf1c3519fed300cc5b9bf9177c
-
Filesize
79B
MD57f4b594a35d631af0e37fea02df71e72
SHA1f7bc71621ea0c176ca1ab0a3c9fe52dbca116f57
SHA256530882d7f535ae57a4906ca735b119c9e36480cbb780c7e8ad37c9c8fdf3d9b1
SHA512bf3f92f5023f0fbad88526d919252a98db6d167e9ca3e15b94f7d71ded38a2cfb0409f57ef24708284ddd965bda2d3207cd99c008b1c9c8c93705fd66ac86360
-
Filesize
176B
MD56607494855f7b5c0348eecd49ef7ce46
SHA12c844dd9ea648efec08776757bc376b5a6f9eb71
SHA25637c30639ea04878b9407aecbcea4848b033e4548d5023ce5105ea79cab2c68dd
SHA5128cb60725d958291b9a78c293992768cb03ff53ab942637e62eb6f17d80e0864c56a9c8ccafbc28246e9ce1fdb248e8d071d76764bcaf0243397d0f0a62b4d09a
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\AutoLaunchProtocolsComponent\1.0.0.9\protocols.json
Filesize3KB
MD5f9fd82b572ef4ce41a3d1075acc52d22
SHA1fdded5eef95391be440cc15f84ded0480c0141e3
SHA2565f21978e992a53ebd9c138cb5391c481def7769e3525c586a8a94f276b3cd8d6
SHA51217084cc74462310a608355fbeafa8b51f295fb5fd067dfc641e752e69b1ee4ffba0e9eafa263aab67daab780b9b6be370dd3b54dd4ba8426ab499e50ff5c7339
-
Filesize
280B
MD58625e8ce164e1039c0d19156210674ce
SHA19eb5ae97638791b0310807d725ac8815202737d2
SHA2562f65f9c3c54fe018e0b1f46e3c593d100a87758346d3b00a72cb93042daf60a2
SHA5123c52b8876982fe41d816f9dfb05cd888c551cf7efd266a448050c87c3fc52cc2172f53c83869b87d7643ce0188004c978570f35b0fcc1cb50c9fffea3dec76a6
-
Filesize
2B
MD599914b932bd37a50b983c5e7c90ae93b
SHA1bf21a9e8fbc5a3846fb05b4fa0859e0917b2202f
SHA25644136fa355b3678a1146ad16f7e8649e94fb4fc21fe77e8310c060f61caaff8a
SHA51227c74670adb75075fad058d5ceaf7b20c4e7786c83bae8a32f626f9782af34c9a33c2046ef60fd2a7878d378e29fec851806bbd9a67878f3a9f1cda4830763fd
-
Filesize
107KB
MD52b66d93c82a06797cdfd9df96a09e74a
SHA15f7eb526ee8a0c519b5d86c845fea8afd15b0c28
SHA256d4c064db769b3c109da2ed80a53fbab00987c17421a47921e41e213781d67954
SHA51295e45c0aea0e704be5f512dffaae377d4abef78da99b3bca769264d69be20f2570daf2f47905645217e1b2696e42b101f26149219f148b4d6dd97a6c2868b6f5
-
Filesize
2KB
MD539b62524844a4f10a63f0da53d61b964
SHA1c6903bd6635f7d3f898d328da5f3db365f535f0d
SHA256836140e7229778234ffc9124f8b453add16d9412dc1209b240f28c23f3d4faa2
SHA51281cf707dbd47c8bea0d0bef9534896b951b58bb718eb4b02649bde54fa68f241bd42690814435c6ae03e9b06ac4f062764e9b691fcbcdf7e425495341641a844
-
Filesize
2B
MD5d751713988987e9331980363e24189ce
SHA197d170e1550eee4afc0af065b78cda302a97674c
SHA2564f53cda18c2baa0c0354bb5f9a3ecbe5ed12ab4d8e11ba873c2f11161202b945
SHA512b25b294cb4deb69ea00a4c3cf3113904801b6015e5956bd019a8570b1fe1d6040e944ef3cdee16d0a46503ca6e659a25f21cf9ceddc13f352a3c98138c15d6af
-
Filesize
40B
MD520d4b8fa017a12a108c87f540836e250
SHA11ac617fac131262b6d3ce1f52f5907e31d5f6f00
SHA2566028bd681dbf11a0a58dde8a0cd884115c04caa59d080ba51bde1b086ce0079d
SHA512507b2b8a8a168ff8f2bdafa5d9d341c44501a5f17d9f63f3d43bd586bc9e8ae33221887869fa86f845b7d067cb7d2a7009efd71dda36e03a40a74fee04b86856
-
Filesize
16KB
MD52e60ae064260fab5ef41d79409df008e
SHA1a22a7ea74283bd4ce1876510c54413c4c7756a77
SHA2560bae1cb8106293df66715c695b8a8af910433928f0ef6b5b16180f56277c2a4d
SHA512602ba6eac8663bb6dbfc081485e3ea54997bc58e4db387d85e2b318d6cce1a64f528b445510b1dc5d79a2cb51b45d48c628492eb3dfaf43769beebdd101bd7ff
-
Filesize
15KB
MD5fda8c84aeaa7493bbf0ea3384e8c0e1e
SHA14b4e852191240fe38a0ba016d8ced1217ec789c3
SHA2562c7347f189518a51143bf67ab39ba12a8edb9896628d36bdf7e37205a4de0068
SHA512c0dec3ddbb46486645693efd592d25f9e657aa3451d59031116b550e607357aa125703312c3ca842d6ef08481529666a203086185ce3d0750bea1459e5e951a4
-
Filesize
36KB
MD59119557c8bd79a48383487d41b27781b
SHA1b70aba34d4420c4bfb6cc79b800a66b644987318
SHA2565fbd7f733b4720cd9b986869c6bf3a8b4b8eb6ab0f6da303f6c5cd9438ffa623
SHA512e8e5befc9b194aaff6dccc5e987f9a7b16f3269bd0b3f5df97ccee4334e1b968eb2c32baf1f66312f0b469a15f202d2d36aace04b9de722e427bc49bf4ef1ea5
-
Filesize
22KB
MD57003260c1c5b194a3d844f081cbdcee7
SHA158fd44c6f295a65df2964633fac45e66ecc7d8e3
SHA25651ba580fda1fee0ccb5523ebb786fb6c4282ee6d22881e45de9b08ba7f466e6d
SHA512c1f8efaa3e3d4ca01e9e425806aad0890c52d33a85514039fd59e6ad76be197286c15b765bfd4f4ce18c01f7fc23fcaa022c5fcb068b0424e57cfcdfb6c48828
-
Filesize
23KB
MD5ea034574cba13c131184565c9edb1f58
SHA15563f3165e7b982ac7b3ddf880a12f34cba5c4b1
SHA25620b6e8615043ac612a57c54cbc2afee35447396fc41a60a0b28f59be44204e30
SHA5120d80018919034348e7771c4728906440e09141da5071791bd9d21f695fb44cd0818d92ad180af12f1fe42ff15834d0011c46dce10c314bd1e86655e2496594eb
-
Filesize
900B
MD5ee71fd32bda961b3b56fbf0a100c25c1
SHA102dd66b6b49a3086bc99ddc5118a107f35da705f
SHA256e60cf35750b1618ce4948cb96a2dee12bb7543c05f928885588e15863b2bdde5
SHA5129a4fb38fb0e18033c55dd9013b65ca0c3974baed956cc00fbf1db1a684f86ae911de12acc4c808426cb406e1227604b0a9011ad82882755388a191bd262f8579
-
Filesize
467B
MD5d887db5c3d74558139c10f23b6118b5d
SHA1c9b58c0657627a3bf8d4bbabee006c71d3655d60
SHA25637feed8275f51f1c92143e9d0d0fee63b9400eb9216c44386625789128153c48
SHA512fd927d1d66edd889bb808a38b316865c81cc0b61a25eeff720e7f616338f4b4ba2e0ca1ff1c41b6aa0f1d6fc5499e9bc8c615cb89c728d776e9dd2e5cf43c93f
-
Filesize
19KB
MD541c1930548d8b99ff1dbb64ba7fecb3d
SHA1d8acfeaf7c74e2b289be37687f886f50c01d4f2f
SHA25616cee17a989167242dd7ee2755721e357dd23bcfcb61f5789cc19deafe7ca502
SHA512a684d61324c71ac15f3a907788ab2150f61e7e2b2bf13ca08c14e9822b22336d0d45d9ff2a2a145aa7321d28d6b71408f9515131f8a1bd9f4927b105e6471b75
-
Filesize
50KB
MD5481540b269edd76ad689a122871ef250
SHA146a4acf01ca470fbcd3f76e6baacf559baa341e8
SHA2568416bde02f9a2644ceeb64ee3d1b4f9344f7f593aeedef1a168aea369788d750
SHA512cb6fc2226875b7f44027e141c016d4af0270fd7800f93ea77a9d3619acec77525cea2de2ec84688d68f541fff457d6d353314e9d0e80ecc70462b8781b3166ff
-
Filesize
40KB
MD5ebfe45f1a3fdb328e03b1dd2dd75bbb6
SHA1a2ebf4acbfda320dcdab47ed2ac6a21d6af1ecee
SHA25623672ae0958e4997ca1de7710ee8560000a8e1c99a5c44fbb6df6f7c8c5177ab
SHA51265340390689351b7386be4600cb2bd5cd26f333e145c554456772b5137cdd5257059a58bec0f146ecd491cb403c41c53af75edb99b2f83148b01ebdd53d7d47b
-
Filesize
41KB
MD5afe076ebad31b5d94f3c253298118cb8
SHA1cd87e07cab2cdd731b8db57e3ff43575f2515de9
SHA256d07dd59819e55e5f87831df3dceb462a0c7b22eab250de14872ba688056d4c6c
SHA51257280245a6f25037b7894bf43e0afa0167be10d85d3f51c23ef82cb539a2b6e79f2a0112683a668ecd857462422570713d8086026533245240550ba7c54b580c
-
Filesize
50KB
MD5b3242d706aaea9cd66da43c603dcfc13
SHA133bad6fd699c3c99dfd1d9e7db67cdf2a6a25fe6
SHA2563ebd60de7c85d223a85e7e53a1342f4148ee0a581c865c5bbd2c369625454126
SHA512e89d752ee2d4f00202fcbaf3bd212d929cb3090ca975da56563db547570ca4e4a447544e33d52537241d5a2b34e39b106ca59394cbc73a41e92a4f22ca705270
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\TrustTokenKeyCommitments\2025.1.17.1\keys.json
Filesize6KB
MD5bef4f9f856321c6dccb47a61f605e823
SHA18e60af5b17ed70db0505d7e1647a8bc9f7612939
SHA256fd1847df25032c4eef34e045ba0333f9bd3cb38c14344f1c01b48f61f0cfd5c5
SHA512bdec3e243a6f39bfea4130c85b162ea00a4974c6057cd06a05348ac54517201bbf595fcc7c22a4ab2c16212c6009f58df7445c40c82722ab4fa1c8d49d39755c
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\extensions_crx_cache\ghbmnnjooekpmoecnnnilnnbdlolhkhi_1.fa2232917a5656ea4f811936561ea6b7c92b3c0004c5e08ecb97636d3afc6f72
Filesize152KB
MD5dd9bf8448d3ddcfd067967f01e8bf6d7
SHA1d7829475b2bd6a3baa8fabfaf39af57c6439b35e
SHA256fa2232917a5656ea4f811936561ea6b7c92b3c0004c5e08ecb97636d3afc6f72
SHA51265347df34378c2bbb34417e2cccfb3251a0b2412422cc190eed9df525b6e0a9948e0295ea3c33b3ad873ce81e369e89a138ac41d6eb7229546c3269107e661de
-
C:\Users\Admin\AppData\Local\Microsoft\TokenBroker\Cache\5a2a7058cf8d1e56c20e6b19a7c48eb2386d141b.tbres
Filesize2KB
MD55e7d3497fceadac183fc7d792c46a496
SHA1385cbaef359242c6ac129288bae507429b4e9c1f
SHA25699a1dc2eb436dc9c319b32221f1dcfb378406e38d2f9ab5ebf8f26a7858cfecf
SHA512b683292a9f1d2da9f3e953f9c72647310e772a232d0f33de5716a954898907e762bc7f4d2197a101932c8a36c7d95f1c32b05094e7b31abe35a1052939a36a6c
-
Filesize
3.6MB
MD5108b891e5a2447554f4347adada2fb79
SHA1735e6c7206d7e5b74b28fa759d09ce83ccd4d969
SHA256d97a186d7a7d86fd4266226ce416dd67d6dc618662fc300715156d88c8c6c1ea
SHA512a01e30a49c3a0fc69b3d08a0c5baecdcc4e3a8b85aba6fc142f2f6c24b8eed0aab4bbddf913c84d130aca090d6a7aae571550b657294f9058fc24f8272dff0f1