Overview
overview
8Static
static
3Xeno-v1.1....re.dll
windows7-x64
3Xeno-v1.1....re.dll
windows10-2004-x64
1Xeno-v1.1....ms.dll
windows7-x64
1Xeno-v1.1....ms.dll
windows10-2004-x64
1Xeno-v1.1....pf.dll
windows7-x64
1Xeno-v1.1....pf.dll
windows10-2004-x64
1Xeno-v1.1....on.dll
windows7-x64
1Xeno-v1.1....on.dll
windows10-2004-x64
1Xeno-v1.1.65/Xeno.dll
windows7-x64
1Xeno-v1.1.65/Xeno.dll
windows10-2004-x64
1Xeno-v1.1.65/Xeno.exe
windows7-x64
3Xeno-v1.1.65/Xeno.exe
windows10-2004-x64
6Xeno-v1.1....UI.exe
windows7-x64
1Xeno-v1.1....UI.exe
windows10-2004-x64
1Xeno-v1.1....-0.dll
windows10-2004-x64
Xeno-v1.1....-0.dll
windows10-2004-x64
1Xeno-v1.1....-0.dll
windows10-2004-x64
1Xeno-v1.1....-0.dll
windows10-2004-x64
1Xeno-v1.1....-0.dll
windows10-2004-x64
1Xeno-v1.1....-0.dll
windows10-2004-x64
1Xeno-v1.1....-0.dll
windows10-2004-x64
1Xeno-v1.1....-0.dll
windows10-2004-x64
1Xeno-v1.1....x.html
windows7-x64
6Xeno-v1.1....x.html
windows10-2004-x64
6Xeno-v1.1....ain.js
windows7-x64
3Xeno-v1.1....ain.js
windows10-2004-x64
3Xeno-v1.1....lua.js
windows7-x64
3Xeno-v1.1....lua.js
windows10-2004-x64
3Xeno-v1.1....ain.js
windows7-x64
3Xeno-v1.1....ain.js
windows10-2004-x64
3Xeno-v1.1.....de.js
windows7-x64
3Xeno-v1.1.....de.js
windows10-2004-x64
3Resubmissions
28/03/2025, 18:34
250328-w742ta1pz2 628/03/2025, 16:55
250328-ve97paywgx 828/03/2025, 16:52
250328-vdj9waywfs 8Analysis
-
max time kernel
146s -
max time network
148s -
platform
windows10-2004_x64 -
resource
win10v2004-20250314-en -
resource tags
arch:x64arch:x86image:win10v2004-20250314-enlocale:en-usos:windows10-2004-x64system -
submitted
28/03/2025, 16:55
Static task
static1
Behavioral task
behavioral1
Sample
Xeno-v1.1.65/Microsoft.Web.WebView2.Core.dll
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
Xeno-v1.1.65/Microsoft.Web.WebView2.Core.dll
Resource
win10v2004-20250314-en
Behavioral task
behavioral3
Sample
Xeno-v1.1.65/Microsoft.Web.WebView2.WinForms.dll
Resource
win7-20240903-en
Behavioral task
behavioral4
Sample
Xeno-v1.1.65/Microsoft.Web.WebView2.WinForms.dll
Resource
win10v2004-20250313-en
Behavioral task
behavioral5
Sample
Xeno-v1.1.65/Microsoft.Web.WebView2.Wpf.dll
Resource
win7-20241010-en
Behavioral task
behavioral6
Sample
Xeno-v1.1.65/Microsoft.Web.WebView2.Wpf.dll
Resource
win10v2004-20250313-en
Behavioral task
behavioral7
Sample
Xeno-v1.1.65/Newtonsoft.Json.dll
Resource
win7-20241010-en
Behavioral task
behavioral8
Sample
Xeno-v1.1.65/Newtonsoft.Json.dll
Resource
win10v2004-20250314-en
Behavioral task
behavioral9
Sample
Xeno-v1.1.65/Xeno.dll
Resource
win7-20241023-en
Behavioral task
behavioral10
Sample
Xeno-v1.1.65/Xeno.dll
Resource
win10v2004-20250314-en
Behavioral task
behavioral11
Sample
Xeno-v1.1.65/Xeno.exe
Resource
win7-20240903-en
Behavioral task
behavioral12
Sample
Xeno-v1.1.65/Xeno.exe
Resource
win10v2004-20250314-en
Behavioral task
behavioral13
Sample
Xeno-v1.1.65/XenoUI.exe
Resource
win7-20240729-en
Behavioral task
behavioral14
Sample
Xeno-v1.1.65/XenoUI.exe
Resource
win10v2004-20250313-en
Behavioral task
behavioral15
Sample
Xeno-v1.1.65/api-ms-win-crt-convert-l1-1-0.dll
Resource
win10v2004-20250314-en
Behavioral task
behavioral16
Sample
Xeno-v1.1.65/api-ms-win-crt-filesystem-l1-1-0.dll
Resource
win10v2004-20250314-en
Behavioral task
behavioral17
Sample
Xeno-v1.1.65/api-ms-win-crt-heap-l1-1-0.dll
Resource
win10v2004-20250314-en
Behavioral task
behavioral18
Sample
Xeno-v1.1.65/api-ms-win-crt-locale-l1-1-0.dll
Resource
win10v2004-20250314-en
Behavioral task
behavioral19
Sample
Xeno-v1.1.65/api-ms-win-crt-math-l1-1-0.dll
Resource
win10v2004-20250314-en
Behavioral task
behavioral20
Sample
Xeno-v1.1.65/api-ms-win-crt-runtime-l1-1-0.dll
Resource
win10v2004-20250314-en
Behavioral task
behavioral21
Sample
Xeno-v1.1.65/api-ms-win-crt-stdio-l1-1-0.dll
Resource
win10v2004-20250314-en
Behavioral task
behavioral22
Sample
Xeno-v1.1.65/api-ms-win-crt-string-l1-1-0.dll
Resource
win10v2004-20250314-en
Behavioral task
behavioral23
Sample
Xeno-v1.1.65/bin/Monaco/index.html
Resource
win7-20241010-en
Behavioral task
behavioral24
Sample
Xeno-v1.1.65/bin/Monaco/index.html
Resource
win10v2004-20250314-en
Behavioral task
behavioral25
Sample
Xeno-v1.1.65/bin/Monaco/vs/base/worker/workerMain.js
Resource
win7-20240903-en
Behavioral task
behavioral26
Sample
Xeno-v1.1.65/bin/Monaco/vs/base/worker/workerMain.js
Resource
win10v2004-20250313-en
Behavioral task
behavioral27
Sample
Xeno-v1.1.65/bin/Monaco/vs/basic-languages/lua/lua.js
Resource
win7-20240903-en
Behavioral task
behavioral28
Sample
Xeno-v1.1.65/bin/Monaco/vs/basic-languages/lua/lua.js
Resource
win10v2004-20250314-en
Behavioral task
behavioral29
Sample
Xeno-v1.1.65/bin/Monaco/vs/editor/editor.main.js
Resource
win7-20240903-en
Behavioral task
behavioral30
Sample
Xeno-v1.1.65/bin/Monaco/vs/editor/editor.main.js
Resource
win10v2004-20250314-en
Behavioral task
behavioral31
Sample
Xeno-v1.1.65/bin/Monaco/vs/editor/editor.main.nls.de.js
Resource
win7-20241010-en
Behavioral task
behavioral32
Sample
Xeno-v1.1.65/bin/Monaco/vs/editor/editor.main.nls.de.js
Resource
win10v2004-20250314-en
General
-
Target
Xeno-v1.1.65/bin/Monaco/index.html
-
Size
164KB
-
MD5
001dcbb8f41cdcbf9b4d1e3a0ed4b2d2
-
SHA1
982a05814546017c40771e59e7677b53d84787e9
-
SHA256
f1d2c52f2803c29585b81d2eff74c56242d27e9619ee6d38081d5604c5bb1951
-
SHA512
9a4eba2a9314b6f5851997e1db0ecfae8e40da3443d8a5f9df933ccf6a4d75fc330888c8d14818326e15b3dec9ae2f5f7e73cd08c3822dd7eb0b2d753c8cd8fa
-
SSDEEP
3072:Nk4J09UmmJv8kBpZaFD48VOAGUWYPjDZlLJbRBiPEP8yKUz2Ojmjr8zM3KP7pblM:64J09BA3pZaFD48VOAGUWYPjdlLJbRBS
Malware Config
Signatures
-
Legitimate hosting services abused for malware hosting/C2 1 TTPs 4 IoCs
flow ioc 19 raw.githubusercontent.com 21 raw.githubusercontent.com 15 raw.githubusercontent.com 16 raw.githubusercontent.com -
Drops file in Program Files directory 64 IoCs
description ioc Process File created C:\Program Files\chrome_Unpacker_BeginUnzipping4152_1966882351\_locales\pl\messages.json msedge.exe File created C:\Program Files\chrome_Unpacker_BeginUnzipping4152_1966882351\_locales\af\messages.json msedge.exe File created C:\Program Files\chrome_Unpacker_BeginUnzipping4152_1966882351\_locales\et\messages.json msedge.exe File created C:\Program Files\chrome_Unpacker_BeginUnzipping4152_1966882351\_locales\de\messages.json msedge.exe File created C:\Program Files\chrome_Unpacker_BeginUnzipping4152_1966882351\_locales\pt_BR\messages.json msedge.exe File created C:\Program Files\chrome_Unpacker_BeginUnzipping4152_1966882351\_locales\el\messages.json msedge.exe File created C:\Program Files\chrome_Unpacker_BeginUnzipping4152_1966882351\_locales\pa\messages.json msedge.exe File created C:\Program Files\chrome_Unpacker_BeginUnzipping4152_1966882351\_locales\sw\messages.json msedge.exe File created C:\Program Files\chrome_Unpacker_BeginUnzipping4152_1966882351\_locales\bn\messages.json msedge.exe File created C:\Program Files\chrome_Unpacker_BeginUnzipping4152_1966882351\_locales\fr_CA\messages.json msedge.exe File created C:\Program Files\chrome_Unpacker_BeginUnzipping4152_1966882351\_locales\sr\messages.json msedge.exe File created C:\Program Files\chrome_Unpacker_BeginUnzipping4152_1966882351\_locales\nl\messages.json msedge.exe File created C:\Program Files\chrome_Unpacker_BeginUnzipping4152_1966882351\_locales\lo\messages.json msedge.exe File created C:\Program Files\chrome_Unpacker_BeginUnzipping4152_1966882351\_locales\cy\messages.json msedge.exe File created C:\Program Files\chrome_Unpacker_BeginUnzipping4152_1966882351\_locales\ru\messages.json msedge.exe File created C:\Program Files\chrome_Unpacker_BeginUnzipping4152_1966882351\_locales\sk\messages.json msedge.exe File created C:\Program Files\chrome_Unpacker_BeginUnzipping4152_1966882351\offscreendocument_main.js msedge.exe File created C:\Program Files\chrome_Unpacker_BeginUnzipping4152_1966882351\_locales\it\messages.json msedge.exe File created C:\Program Files\chrome_Unpacker_BeginUnzipping4152_1966882351\_locales\hy\messages.json msedge.exe File created C:\Program Files\chrome_Unpacker_BeginUnzipping4152_1617988230\sets.json msedge.exe File created C:\Program Files\chrome_Unpacker_BeginUnzipping4152_1617988230\manifest.fingerprint msedge.exe File created C:\Program Files\chrome_Unpacker_BeginUnzipping4152_302415988\LICENSE msedge.exe File created C:\Program Files\chrome_Unpacker_BeginUnzipping4152_2128638321\deny_etld1_domains.list msedge.exe File created C:\Program Files\chrome_Unpacker_BeginUnzipping4152_2128638321\deny_full_domains.list msedge.exe File created C:\Program Files\msedge_url_fetcher_4152_1147078817\GHBMNNJOOEKPMOECNNNILNNBDLOLHKHI_1_90_1_0.crx msedge.exe File created C:\Program Files\chrome_Unpacker_BeginUnzipping4152_1966882351\_locales\mr\messages.json msedge.exe File created C:\Program Files\chrome_Unpacker_BeginUnzipping4152_1966882351\_locales\en\messages.json msedge.exe File created C:\Program Files\chrome_Unpacker_BeginUnzipping4152_1966882351\_locales\zu\messages.json msedge.exe File created C:\Program Files\chrome_Unpacker_BeginUnzipping4152_1966882351\_locales\gu\messages.json msedge.exe File created C:\Program Files\chrome_Unpacker_BeginUnzipping4152_275925138\manifest.json msedge.exe File created C:\Program Files\chrome_Unpacker_BeginUnzipping4152_275925138\protocols.json msedge.exe File created C:\Program Files\chrome_Unpacker_BeginUnzipping4152_2128638321\deny_domains.list msedge.exe File created C:\Program Files\chrome_Unpacker_BeginUnzipping4152_1966882351\offscreendocument.html msedge.exe File created C:\Program Files\chrome_Unpacker_BeginUnzipping4152_1966882351\_locales\fi\messages.json msedge.exe File created C:\Program Files\chrome_Unpacker_BeginUnzipping4152_1966882351\_locales\zh_TW\messages.json msedge.exe File created C:\Program Files\chrome_Unpacker_BeginUnzipping4152_1966882351\_locales\bg\messages.json msedge.exe File created C:\Program Files\chrome_Unpacker_BeginUnzipping4152_1966882351\_locales\my\messages.json msedge.exe File created C:\Program Files\chrome_Unpacker_BeginUnzipping4152_1966882351\_locales\da\messages.json msedge.exe File created C:\Program Files\chrome_Unpacker_BeginUnzipping4152_1966882351\_locales\ko\messages.json msedge.exe File created C:\Program Files\chrome_Unpacker_BeginUnzipping4152_1966882351\_locales\iw\messages.json msedge.exe File created C:\Program Files\chrome_Unpacker_BeginUnzipping4152_1966882351\_locales\hr\messages.json msedge.exe File created C:\Program Files\chrome_Unpacker_BeginUnzipping4152_1966882351\_locales\be\messages.json msedge.exe File created C:\Program Files\chrome_Unpacker_BeginUnzipping4152_1966882351\_locales\ca\messages.json msedge.exe File created C:\Program Files\chrome_Unpacker_BeginUnzipping4152_1617988230\manifest.json msedge.exe File created C:\Program Files\chrome_Unpacker_BeginUnzipping4152_302415988\manifest.fingerprint msedge.exe File created C:\Program Files\chrome_Unpacker_BeginUnzipping4152_2128638321\manifest.fingerprint msedge.exe File created C:\Program Files\chrome_Unpacker_BeginUnzipping4152_1966882351\_locales\ka\messages.json msedge.exe File created C:\Program Files\chrome_Unpacker_BeginUnzipping4152_1966882351\_locales\zh_CN\messages.json msedge.exe File created C:\Program Files\chrome_Unpacker_BeginUnzipping4152_1966882351\_locales\ms\messages.json msedge.exe File created C:\Program Files\chrome_Unpacker_BeginUnzipping4152_1966882351\_locales\sl\messages.json msedge.exe File created C:\Program Files\chrome_Unpacker_BeginUnzipping4152_302415988\keys.json msedge.exe File created C:\Program Files\chrome_Unpacker_BeginUnzipping4152_302415988\manifest.json msedge.exe File created C:\Program Files\chrome_Unpacker_BeginUnzipping4152_1540074474\manifest.fingerprint msedge.exe File created C:\Program Files\chrome_Unpacker_BeginUnzipping4152_1966882351\dasherSettingSchema.json msedge.exe File created C:\Program Files\chrome_Unpacker_BeginUnzipping4152_1966882351\_locales\te\messages.json msedge.exe File created C:\Program Files\chrome_Unpacker_BeginUnzipping4152_1966882351\_locales\ro\messages.json msedge.exe File created C:\Program Files\chrome_Unpacker_BeginUnzipping4152_1966882351\_locales\kk\messages.json msedge.exe File created C:\Program Files\chrome_Unpacker_BeginUnzipping4152_1966882351\_locales\eu\messages.json msedge.exe File created C:\Program Files\chrome_Unpacker_BeginUnzipping4152_1966882351\_locales\en_US\messages.json msedge.exe File created C:\Program Files\chrome_Unpacker_BeginUnzipping4152_2128638321\manifest.json msedge.exe File created C:\Program Files\chrome_Unpacker_BeginUnzipping4152_122814709\typosquatting_list.pb msedge.exe File created C:\Program Files\chrome_Unpacker_BeginUnzipping4152_1966882351\_locales\ml\messages.json msedge.exe File created C:\Program Files\chrome_Unpacker_BeginUnzipping4152_1966882351\_locales\gl\messages.json msedge.exe File created C:\Program Files\chrome_Unpacker_BeginUnzipping4152_1966882351\_locales\am\messages.json msedge.exe -
Checks processor information in registry 2 TTPs 2 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\VendorIdentifier msedge.exe -
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Modifies data under HKEY_USERS 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry msedge.exe Set value (int) \REGISTRY\USER\S-1-5-19\SOFTWARE\Microsoft\Cryptography\TPM\Telemetry\TraceTimeLast = "133876545401221885" msedge.exe -
Modifies registry class 2 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ msedge.exe Key created \REGISTRY\MACHINE\Software\Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppModel\Deployment\Package\*\S-1-5-21-3975168204-1612096350-4002976354-1000\{690C1375-DE2C-4ADD-9079-F3EEBEEA5155} msedge.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 2716 msedge.exe 2716 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 3 IoCs
pid Process 4152 msedge.exe 4152 msedge.exe 4152 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 4152 msedge.exe 4152 msedge.exe 4152 msedge.exe 4152 msedge.exe 4152 msedge.exe 4152 msedge.exe 4152 msedge.exe 4152 msedge.exe 4152 msedge.exe 4152 msedge.exe 4152 msedge.exe 4152 msedge.exe 4152 msedge.exe 4152 msedge.exe 4152 msedge.exe 4152 msedge.exe 4152 msedge.exe 4152 msedge.exe 4152 msedge.exe 4152 msedge.exe 4152 msedge.exe 4152 msedge.exe 4152 msedge.exe 4152 msedge.exe 4152 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 4152 msedge.exe 4152 msedge.exe 4152 msedge.exe 4152 msedge.exe 4152 msedge.exe 4152 msedge.exe 4152 msedge.exe 4152 msedge.exe 4152 msedge.exe 4152 msedge.exe 4152 msedge.exe 4152 msedge.exe 4152 msedge.exe 4152 msedge.exe 4152 msedge.exe 4152 msedge.exe 4152 msedge.exe 4152 msedge.exe 4152 msedge.exe 4152 msedge.exe 4152 msedge.exe 4152 msedge.exe 4152 msedge.exe 4152 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 4152 wrote to memory of 5740 4152 msedge.exe 87 PID 4152 wrote to memory of 5740 4152 msedge.exe 87 PID 4152 wrote to memory of 5560 4152 msedge.exe 88 PID 4152 wrote to memory of 5560 4152 msedge.exe 88 PID 4152 wrote to memory of 2852 4152 msedge.exe 89 PID 4152 wrote to memory of 2852 4152 msedge.exe 89 PID 4152 wrote to memory of 2852 4152 msedge.exe 89 PID 4152 wrote to memory of 2852 4152 msedge.exe 89 PID 4152 wrote to memory of 2852 4152 msedge.exe 89 PID 4152 wrote to memory of 2852 4152 msedge.exe 89 PID 4152 wrote to memory of 2852 4152 msedge.exe 89 PID 4152 wrote to memory of 2852 4152 msedge.exe 89 PID 4152 wrote to memory of 2852 4152 msedge.exe 89 PID 4152 wrote to memory of 2852 4152 msedge.exe 89 PID 4152 wrote to memory of 2852 4152 msedge.exe 89 PID 4152 wrote to memory of 2852 4152 msedge.exe 89 PID 4152 wrote to memory of 2852 4152 msedge.exe 89 PID 4152 wrote to memory of 2852 4152 msedge.exe 89 PID 4152 wrote to memory of 2852 4152 msedge.exe 89 PID 4152 wrote to memory of 2852 4152 msedge.exe 89 PID 4152 wrote to memory of 2852 4152 msedge.exe 89 PID 4152 wrote to memory of 2852 4152 msedge.exe 89 PID 4152 wrote to memory of 2852 4152 msedge.exe 89 PID 4152 wrote to memory of 2852 4152 msedge.exe 89 PID 4152 wrote to memory of 2852 4152 msedge.exe 89 PID 4152 wrote to memory of 2852 4152 msedge.exe 89 PID 4152 wrote to memory of 2852 4152 msedge.exe 89 PID 4152 wrote to memory of 2852 4152 msedge.exe 89 PID 4152 wrote to memory of 2852 4152 msedge.exe 89 PID 4152 wrote to memory of 2852 4152 msedge.exe 89 PID 4152 wrote to memory of 2852 4152 msedge.exe 89 PID 4152 wrote to memory of 2852 4152 msedge.exe 89 PID 4152 wrote to memory of 2852 4152 msedge.exe 89 PID 4152 wrote to memory of 2852 4152 msedge.exe 89 PID 4152 wrote to memory of 2852 4152 msedge.exe 89 PID 4152 wrote to memory of 2852 4152 msedge.exe 89 PID 4152 wrote to memory of 2852 4152 msedge.exe 89 PID 4152 wrote to memory of 2852 4152 msedge.exe 89 PID 4152 wrote to memory of 2852 4152 msedge.exe 89 PID 4152 wrote to memory of 2852 4152 msedge.exe 89 PID 4152 wrote to memory of 2852 4152 msedge.exe 89 PID 4152 wrote to memory of 2852 4152 msedge.exe 89 PID 4152 wrote to memory of 2852 4152 msedge.exe 89 PID 4152 wrote to memory of 2852 4152 msedge.exe 89 PID 4152 wrote to memory of 2852 4152 msedge.exe 89 PID 4152 wrote to memory of 2852 4152 msedge.exe 89 PID 4152 wrote to memory of 2852 4152 msedge.exe 89 PID 4152 wrote to memory of 2852 4152 msedge.exe 89 PID 4152 wrote to memory of 2852 4152 msedge.exe 89 PID 4152 wrote to memory of 2852 4152 msedge.exe 89 PID 4152 wrote to memory of 2852 4152 msedge.exe 89 PID 4152 wrote to memory of 2852 4152 msedge.exe 89 PID 4152 wrote to memory of 2852 4152 msedge.exe 89 PID 4152 wrote to memory of 2852 4152 msedge.exe 89 PID 4152 wrote to memory of 2852 4152 msedge.exe 89 PID 4152 wrote to memory of 3444 4152 msedge.exe 90 PID 4152 wrote to memory of 3444 4152 msedge.exe 90 PID 4152 wrote to memory of 3444 4152 msedge.exe 90 PID 4152 wrote to memory of 3444 4152 msedge.exe 90 PID 4152 wrote to memory of 3444 4152 msedge.exe 90 PID 4152 wrote to memory of 3444 4152 msedge.exe 90 PID 4152 wrote to memory of 3444 4152 msedge.exe 90 PID 4152 wrote to memory of 3444 4152 msedge.exe 90 PID 4152 wrote to memory of 3444 4152 msedge.exe 90
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --start-maximized --single-argument C:\Users\Admin\AppData\Local\Temp\Xeno-v1.1.65\bin\Monaco\index.html1⤵
- Drops file in Program Files directory
- Checks processor information in registry
- Enumerates system info in registry
- Modifies data under HKEY_USERS
- Modifies registry class
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:4152 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:4 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=133.0.6943.99 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 --annotation=prod=Edge --annotation=ver=133.0.3065.69 --initial-client-data=0x23c,0x240,0x244,0x238,0x24c,0x7ffe4f02f208,0x7ffe4f02f214,0x7ffe4f02f2202⤵PID:5740
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --string-annotations --always-read-main-dll --field-trial-handle=1792,i,720310650488306718,16272159029540301735,262144 --variations-seed-version --mojo-platform-channel-handle=2956 /prefetch:32⤵PID:5560
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --string-annotations --gpu-preferences=UAAAAAAAAADgAAAEAAAAAAAAAAAAAAAAAABgAAEAAAAAAAAAAAAAAAAAAAACAAAAAAAAAAAAAAAAAAAAAAAAABAAAAAAAAAAEAAAAAAAAAAIAAAAAAAAAAgAAAAAAAAA --always-read-main-dll --field-trial-handle=2412,i,720310650488306718,16272159029540301735,262144 --variations-seed-version --mojo-platform-channel-handle=2380 /prefetch:22⤵PID:2852
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=service --string-annotations --always-read-main-dll --field-trial-handle=2300,i,720310650488306718,16272159029540301735,262144 --variations-seed-version --mojo-platform-channel-handle=2904 /prefetch:82⤵PID:3444
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --string-annotations --pdf-upsell-enabled --video-capture-use-gpu-memory-buffer --lang=en-US --js-flags=--ms-user-locale= --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --always-read-main-dll --field-trial-handle=3488,i,720310650488306718,16272159029540301735,262144 --variations-seed-version --mojo-platform-channel-handle=3500 /prefetch:12⤵PID:4724
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --string-annotations --pdf-upsell-enabled --video-capture-use-gpu-memory-buffer --lang=en-US --js-flags=--ms-user-locale= --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --always-read-main-dll --field-trial-handle=3504,i,720310650488306718,16272159029540301735,262144 --variations-seed-version --mojo-platform-channel-handle=3656 /prefetch:12⤵PID:4764
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=asset_store.mojom.AssetStoreService --lang=en-US --service-sandbox-type=asset_store_service --video-capture-use-gpu-memory-buffer --string-annotations --always-read-main-dll --field-trial-handle=4324,i,720310650488306718,16272159029540301735,262144 --variations-seed-version --mojo-platform-channel-handle=4308 /prefetch:82⤵PID:4312
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=entity_extraction_service.mojom.Extractor --lang=en-US --service-sandbox-type=entity_extraction --onnx-enabled-for-ee --video-capture-use-gpu-memory-buffer --string-annotations --always-read-main-dll --field-trial-handle=4820,i,720310650488306718,16272159029540301735,262144 --variations-seed-version --mojo-platform-channel-handle=5068 /prefetch:82⤵PID:1332
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=PooledProcess2 --lang=en-US --service-sandbox-type=utility --video-capture-use-gpu-memory-buffer --string-annotations --always-read-main-dll --field-trial-handle=5556,i,720310650488306718,16272159029540301735,262144 --variations-seed-version --mojo-platform-channel-handle=5584 /prefetch:82⤵PID:3752
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\133.0.3065.69\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\133.0.3065.69\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --lang=en-US --service-sandbox-type=none --video-capture-use-gpu-memory-buffer --string-annotations --always-read-main-dll --field-trial-handle=5584,i,720310650488306718,16272159029540301735,262144 --variations-seed-version --mojo-platform-channel-handle=5640 /prefetch:82⤵PID:4200
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\133.0.3065.69\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\133.0.3065.69\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --lang=en-US --service-sandbox-type=none --video-capture-use-gpu-memory-buffer --string-annotations --always-read-main-dll --field-trial-handle=5584,i,720310650488306718,16272159029540301735,262144 --variations-seed-version --mojo-platform-channel-handle=5640 /prefetch:82⤵PID:3548
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=unzip.mojom.Unzipper --lang=en-US --service-sandbox-type=service --video-capture-use-gpu-memory-buffer --string-annotations --always-read-main-dll --field-trial-handle=5976,i,720310650488306718,16272159029540301735,262144 --variations-seed-version --mojo-platform-channel-handle=6040 /prefetch:82⤵PID:2240
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=PooledProcess2 --lang=en-US --service-sandbox-type=utility --video-capture-use-gpu-memory-buffer --string-annotations --always-read-main-dll --field-trial-handle=6076,i,720310650488306718,16272159029540301735,262144 --variations-seed-version --mojo-platform-channel-handle=6184 /prefetch:82⤵PID:4872
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --message-loop-type-ui --video-capture-use-gpu-memory-buffer --string-annotations --always-read-main-dll --field-trial-handle=6100,i,720310650488306718,16272159029540301735,262144 --variations-seed-version --mojo-platform-channel-handle=5820 /prefetch:82⤵PID:5420
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --message-loop-type-ui --video-capture-use-gpu-memory-buffer --string-annotations --always-read-main-dll --field-trial-handle=6268,i,720310650488306718,16272159029540301735,262144 --variations-seed-version --mojo-platform-channel-handle=5816 /prefetch:82⤵PID:4380
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --message-loop-type-ui --video-capture-use-gpu-memory-buffer --string-annotations --always-read-main-dll --field-trial-handle=6244,i,720310650488306718,16272159029540301735,262144 --variations-seed-version --mojo-platform-channel-handle=5648 /prefetch:82⤵PID:5588
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=edge_search_indexer.mojom.SearchIndexerInterfaceBroker --lang=en-US --service-sandbox-type=search_indexer --message-loop-type-ui --video-capture-use-gpu-memory-buffer --string-annotations --always-read-main-dll --field-trial-handle=5172,i,720310650488306718,16272159029540301735,262144 --variations-seed-version --mojo-platform-channel-handle=5088 /prefetch:82⤵PID:1396
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=unzip.mojom.Unzipper --lang=en-US --service-sandbox-type=service --video-capture-use-gpu-memory-buffer --string-annotations --always-read-main-dll --field-trial-handle=5752,i,720310650488306718,16272159029540301735,262144 --variations-seed-version --mojo-platform-channel-handle=5320 /prefetch:82⤵PID:4104
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=unzip.mojom.Unzipper --lang=en-US --service-sandbox-type=service --video-capture-use-gpu-memory-buffer --string-annotations --always-read-main-dll --field-trial-handle=5320,i,720310650488306718,16272159029540301735,262144 --variations-seed-version --mojo-platform-channel-handle=5116 /prefetch:82⤵PID:2252
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=unzip.mojom.Unzipper --lang=en-US --service-sandbox-type=service --video-capture-use-gpu-memory-buffer --string-annotations --always-read-main-dll --field-trial-handle=5312,i,720310650488306718,16272159029540301735,262144 --variations-seed-version --mojo-platform-channel-handle=5800 /prefetch:82⤵PID:5876
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=unzip.mojom.Unzipper --lang=en-US --service-sandbox-type=service --video-capture-use-gpu-memory-buffer --string-annotations --always-read-main-dll --field-trial-handle=776,i,720310650488306718,16272159029540301735,262144 --variations-seed-version --mojo-platform-channel-handle=5308 /prefetch:82⤵PID:4200
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --string-annotations --gpu-preferences=UAAAAAAAAADoAAAEAAAAAAAAAAAAAAAAAABgAAEAAAAAAAAAAAAAAAAAAABCAAAAAAAAAAAAAAAAAAAAAAAAABAAAAAAAAAAEAAAAAAAAAAIAAAAAAAAAAgAAAAAAAAA --always-read-main-dll --field-trial-handle=6140,i,720310650488306718,16272159029540301735,262144 --variations-seed-version --mojo-platform-channel-handle=5304 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:2716
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=unzip.mojom.Unzipper --lang=en-US --service-sandbox-type=service --video-capture-use-gpu-memory-buffer --string-annotations --always-read-main-dll --field-trial-handle=5304,i,720310650488306718,16272159029540301735,262144 --variations-seed-version --mojo-platform-channel-handle=5852 /prefetch:82⤵PID:2796
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=unzip.mojom.Unzipper --lang=en-US --service-sandbox-type=service --video-capture-use-gpu-memory-buffer --string-annotations --always-read-main-dll --field-trial-handle=5364,i,720310650488306718,16272159029540301735,262144 --variations-seed-version --mojo-platform-channel-handle=5356 /prefetch:82⤵PID:4316
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\133.0.3065.69\elevation_service.exe"C:\Program Files (x86)\Microsoft\Edge\Application\133.0.3065.69\elevation_service.exe"1⤵PID:5228
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --no-startup-window --win-session-start1⤵PID:632
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --no-startup-window --win-session-start2⤵PID:3148
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
118B
MD53e4993f878e658507d78f52011519527
SHA12fce50683531c5c985967a71f90d62ab141707df
SHA256a2fb35b03e24f5ba14cbe0e3c3d8cb43588e93f048878b066fd1d640ef8e59cb
SHA5129d24ef876ac989e50e9d4d06732a4c4f61e12df366b3d4e5ff93d6a60badac36c3e55e7f13c2539ecb525017490a887fc56580ef8e83483019041ad9b13358d5
-
Filesize
85B
MD5c3419069a1c30140b77045aba38f12cf
SHA111920f0c1e55cadc7d2893d1eebb268b3459762a
SHA256db9a702209807ba039871e542e8356219f342a8d9c9ca34bcd9a86727f4a3a0f
SHA512c5e95a4e9f5919cb14f4127539c4353a55c5f68062bf6f95e1843b6690cebed3c93170badb2412b7fb9f109a620385b0ae74783227d6813f26ff8c29074758a1
-
Filesize
66B
MD5496b05677135db1c74d82f948538c21c
SHA1e736e675ca5195b5fc16e59fb7de582437fb9f9a
SHA256df55a9464ee22a0f860c0f3b4a75ec62471d37b4d8cb7a0e460eef98cb83ebe7
SHA5128bd1b683e24a8c8c03b0bc041288296448f799a6f431bacbd62cb33e621672991141c7151d9424ad60ab65a7a6a30298243b8b71d281f9e99b8abb79fe16bd3c
-
Filesize
134B
MD5049c307f30407da557545d34db8ced16
SHA1f10b86ebfe8d30d0dc36210939ca7fa7a819d494
SHA256c36944790c4a1fa2f2acec5f7809a4d6689ecb7fb3b2f19c831c9adb4e17fc54
SHA51214f04e768956bdd9634f6a172104f2b630e2eeada2f73b9a249be2ec707f4a47ff60f2f700005ca95addd838db9438ad560e5136a10ed32df1d304d65f445780
-
Filesize
1KB
MD5ee002cb9e51bb8dfa89640a406a1090a
SHA149ee3ad535947d8821ffdeb67ffc9bc37d1ebbb2
SHA2563dbd2c90050b652d63656481c3e5871c52261575292db77d4ea63419f187a55b
SHA512d1fdcc436b8ca8c68d4dc7077f84f803a535bf2ce31d9eb5d0c466b62d6567b2c59974995060403ed757e92245db07e70c6bddbf1c3519fed300cc5b9bf9177c
-
Filesize
79B
MD57f4b594a35d631af0e37fea02df71e72
SHA1f7bc71621ea0c176ca1ab0a3c9fe52dbca116f57
SHA256530882d7f535ae57a4906ca735b119c9e36480cbb780c7e8ad37c9c8fdf3d9b1
SHA512bf3f92f5023f0fbad88526d919252a98db6d167e9ca3e15b94f7d71ded38a2cfb0409f57ef24708284ddd965bda2d3207cd99c008b1c9c8c93705fd66ac86360
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\AutoLaunchProtocolsComponent\1.0.0.9\protocols.json
Filesize3KB
MD5f9fd82b572ef4ce41a3d1075acc52d22
SHA1fdded5eef95391be440cc15f84ded0480c0141e3
SHA2565f21978e992a53ebd9c138cb5391c481def7769e3525c586a8a94f276b3cd8d6
SHA51217084cc74462310a608355fbeafa8b51f295fb5fd067dfc641e752e69b1ee4ffba0e9eafa263aab67daab780b9b6be370dd3b54dd4ba8426ab499e50ff5c7339
-
Filesize
280B
MD565044109d1beb8ed8d59560642cbc519
SHA10084485b0aa26069232fab51ee603682e8edfd17
SHA256a1e0b448218678b30356cbbe4092ea091435e7450822a9748361b6e8b198962d
SHA51296dcc68fe92f98c4329a8335cfffdb0849a52562431045ccc42076bda0abf3842491303fb669246bfd04e64113688d3f90000a09571dd76ff84b52e34e45f9b6
-
Filesize
2B
MD599914b932bd37a50b983c5e7c90ae93b
SHA1bf21a9e8fbc5a3846fb05b4fa0859e0917b2202f
SHA25644136fa355b3678a1146ad16f7e8649e94fb4fc21fe77e8310c060f61caaff8a
SHA51227c74670adb75075fad058d5ceaf7b20c4e7786c83bae8a32f626f9782af34c9a33c2046ef60fd2a7878d378e29fec851806bbd9a67878f3a9f1cda4830763fd
-
Filesize
107KB
MD540e2018187b61af5be8caf035fb72882
SHA172a0b7bcb454b6b727bf90da35879b3e9a70621e
SHA256b3efd9d75856016510dd0bdb5e22359925cee7f2056b3cde6411c55ae8ae8ee5
SHA512a21b8f3f7d646909d6aed605ad5823269f52fda1255aa9bb4d4643e165a7b11935572bf9e0a6a324874f99c20a6f3b6d1e457c7ccd30adcac83c15febc063d12
-
Filesize
2KB
MD54b340de5c33c8d7caedd2bdc6b76a8d7
SHA1257584f88421120abcbe4b9f6ade4e456108358c
SHA2565740ff9ace3e226341f5c0cbf03e9911a2fcccc97e5d2674d154e8d12d7d6cb3
SHA512b14e0f04b061064b66b67ef1048e736ec3d304b1a26b94adc93fa11bb4cc254403be8da190e17c29efbab0694425215432c3b8b48faf9e650ce8c3e8407089f7
-
Filesize
2B
MD5d751713988987e9331980363e24189ce
SHA197d170e1550eee4afc0af065b78cda302a97674c
SHA2564f53cda18c2baa0c0354bb5f9a3ecbe5ed12ab4d8e11ba873c2f11161202b945
SHA512b25b294cb4deb69ea00a4c3cf3113904801b6015e5956bd019a8570b1fe1d6040e944ef3cdee16d0a46503ca6e659a25f21cf9ceddc13f352a3c98138c15d6af
-
Filesize
40B
MD520d4b8fa017a12a108c87f540836e250
SHA11ac617fac131262b6d3ce1f52f5907e31d5f6f00
SHA2566028bd681dbf11a0a58dde8a0cd884115c04caa59d080ba51bde1b086ce0079d
SHA512507b2b8a8a168ff8f2bdafa5d9d341c44501a5f17d9f63f3d43bd586bc9e8ae33221887869fa86f845b7d067cb7d2a7009efd71dda36e03a40a74fee04b86856
-
Filesize
16KB
MD5fde72d1273f9f5f5d99efd3ecdd6ab03
SHA1b2147c01a3e21d431ed1e21510f936e1052255b2
SHA2560bebf67d7fb2d1c30d2d871a2bb2967e81ff97610b02ae7b790cafcb0670f20c
SHA5126cd714677b33dae94cced004c4f521b3d9523c2bc1f1a469e6f6dc3ef6ed0220bbe49b4409e641067d4e344b5436d90742ba30c9301ab030d68d7df81fa4096b
-
Filesize
16KB
MD581400442c2e769351b87f3b40d328c7a
SHA1d33a276368a678c99435f8598ce308bcebe48ffe
SHA256fd244d1a502377b1e01357f681e346712abecb2f4eaf3b09ed764187de5294e2
SHA512798986b89ec86748a60ba2fafc32abe7d56bac22424f0f5fcbbb61719158fafa37d8b89abade20fd29028063116ef26b5cd2a82154c8bde754d542f09f3da156
-
Filesize
36KB
MD5052099e8abf3c88cdbc21e7eb68ffce4
SHA19a1ba25a1c50db26e52ed5262c3a5a230dc148b0
SHA256cf00885a95d6fd45ab6bd36e5e77241b63b65f9d3e819331aa308988fafcc7ac
SHA512f56ec9c90ff331d4721158fbb8e3176e0b6557be028a247d4ce2ad852abf0f8d22c1718cb853544dca8ccc78650fe16df47f2fa42421dc329b9ff28cb3298843
-
Filesize
22KB
MD5eb9f8592768ee27f307cc48bb41a3c69
SHA126ea90a5e518f0ca9daa366f234e9960c5e866f4
SHA256cce4eda8e88cdca581246c66ab402d9a3dafae4561c2370d81b45a985cfaedfd
SHA5127ee8719c2d3f7b0b31f53638a09be32a60e1f0e2d2f71445ea7b7c0946c8bd2c4b36a99333b1ef53ca3081114f7223b6095f2dada2209948f5aaa117c58d37c8
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Edge Cloud Config\54573987-d38c-4348-bb7b-e6b16c0c83af.tmp
Filesize19KB
MD541c1930548d8b99ff1dbb64ba7fecb3d
SHA1d8acfeaf7c74e2b289be37687f886f50c01d4f2f
SHA25616cee17a989167242dd7ee2755721e357dd23bcfcb61f5789cc19deafe7ca502
SHA512a684d61324c71ac15f3a907788ab2150f61e7e2b2bf13ca08c14e9822b22336d0d45d9ff2a2a145aa7321d28d6b71408f9515131f8a1bd9f4927b105e6471b75
-
Filesize
469B
MD53bd2ec9c3dd5033e5442469262157023
SHA15ed4d0a14b0e24a125848a8bf54cffbcb9320a5d
SHA2560fc67cb5d1385d8986df727eeb3f124b1dd4b05f60acd664b4caced0b08fc850
SHA5127c99f5970ba02c89f81c2c33ab4b6caaba4633ea86bf1fcaf18fc88741e342ab6d5d8163470e31376c5d87d16e26ec148d157865f815c981d15153a027cd34e9
-
Filesize
23KB
MD5a420ed30338daf8b58cf1b083342f49e
SHA1d479b350f6fc09b80d20eeb0d02e52b98c65a8f1
SHA256e5d745088384411f0a6610b751ff93baf23c549183899a11e8472c064c9a18b8
SHA51229472bd08bb6b1793e30fdc8d6790ef9cf633200f9818d2025f9af21255c47e750f428740e75ddc67d48e22041527c3c2e904c37f020ff51a70564f62a60fbbb
-
Filesize
900B
MD5a1facbf1d23285ea756c329186487d76
SHA13fb40163494db34a496052854380bfb76239bcb1
SHA2568dea3c7e225d9cf481ffdca3dfcb177f21e0c7da73711b815b6d7645cbacdda4
SHA5128e3bf39a6d4950c6967cd100f34cdbc52dbc76936864c4b140e4f2803ef6f5fd6a0af3dc199f01288c8d2935781b982032bd8e7ef6bb843446ff9a7f49bd2631
-
Filesize
40KB
MD55174985a77bc3593d3e75273a636a4e1
SHA105b20d0e0e501b9aba7afcc252c301a30fc21e16
SHA256a333426b20a503b369578a721d9ef96ba0fbf9aa0a70cc04ecb4ae1155efe091
SHA5124ae3f5361cd36264e6ddd8ce0f30f9e49d236ab32ab0bd9cb8260e0fcc183d666257162838318d984ad7e823dd8ad66d81658969b6efbd1c21741755ca6c62b0
-
Filesize
41KB
MD582e462e1a3f07544494bbc022d8e3753
SHA1bb942fc7dc7a1ad2258e2cd36faadf47f0cbce5c
SHA256d7ba739433f6a1a2425fa977866877d7d964552956b7ffba8709573c75bc12e7
SHA512df84d93d3321c29492b3010eb960794216e3132f725e8697846082420fcb0c287bb9f93e0608b3cc211f0365146f0405fb07cb7dc1bf0f3867661acdab067e1b
-
Filesize
50KB
MD56726887b315031692768e084ea0c88fa
SHA1a5f49d3f078a465260cec4c99438f294c0d85ea3
SHA2562625108dc842acc6cc90c88d7c89fc5a51b5abeaf966310cacfa0afe235c62a0
SHA512fa9da6808fba48e331dfe50efce833096a0e7e3efbdcfb186b0a28510ddf229b0e2cee9319193a6a12d834324ada1da4440b76a6cf0dd532426ad21714f0f9c5
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\TrustTokenKeyCommitments\2025.1.17.1\keys.json
Filesize6KB
MD5bef4f9f856321c6dccb47a61f605e823
SHA18e60af5b17ed70db0505d7e1647a8bc9f7612939
SHA256fd1847df25032c4eef34e045ba0333f9bd3cb38c14344f1c01b48f61f0cfd5c5
SHA512bdec3e243a6f39bfea4130c85b162ea00a4974c6057cd06a05348ac54517201bbf595fcc7c22a4ab2c16212c6009f58df7445c40c82722ab4fa1c8d49d39755c
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Typosquatting\2025.3.28.1\typosquatting_list.pb
Filesize628KB
MD5bd5eeb9c4b00955e5a0f6a332d78cdef
SHA1cf9e85ae41cf1ef2385a73ef36ebeb3c3378ea3a
SHA256dbbea874b4b73aeb3ad17355c90f692767a947516481f158b7319f7c43f0e657
SHA5122cfa521120dd1ab9c2cc90b74cd8d3f6f8991a086bd2dc1b9d225b08aeca8420f565e047f551ddf6d2149cfb02e4ce69b641e328a774dde7017ad374fd58eb96
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\extensions_crx_cache\ghbmnnjooekpmoecnnnilnnbdlolhkhi_1.fa2232917a5656ea4f811936561ea6b7c92b3c0004c5e08ecb97636d3afc6f72
Filesize152KB
MD5dd9bf8448d3ddcfd067967f01e8bf6d7
SHA1d7829475b2bd6a3baa8fabfaf39af57c6439b35e
SHA256fa2232917a5656ea4f811936561ea6b7c92b3c0004c5e08ecb97636d3afc6f72
SHA51265347df34378c2bbb34417e2cccfb3251a0b2412422cc190eed9df525b6e0a9948e0295ea3c33b3ad873ce81e369e89a138ac41d6eb7229546c3269107e661de
-
C:\Users\Admin\AppData\Local\Microsoft\TokenBroker\Cache\5a2a7058cf8d1e56c20e6b19a7c48eb2386d141b.tbres
Filesize2KB
MD51a179bef9b083e19ba9b16883061fb10
SHA1f5d9e7080e722423f460b1f44be630afdb5b7b62
SHA25641319536f31804649be04e3d88eb936c3a65ab0002ecee0a00638c2415d6d639
SHA5124128cb7d40fb5a3b59c2bd9a6b251b6db3e3aa50a657e7102a58d7d1aaa602701d2df49387d15bcd41fabb90bb9339d68f640cb3e7742db77e4ecfb220b7a38e