Overview
overview
6Static
static
3Xeno-v1.1.65.zip
windows7-x64
1Xeno-v1.1.65.zip
windows10-2004-x64
1Xeno-v1.1....re.dll
windows7-x64
1Xeno-v1.1....re.dll
windows10-2004-x64
1Xeno-v1.1....ms.dll
windows7-x64
1Xeno-v1.1....ms.dll
windows10-2004-x64
1Xeno-v1.1....pf.dll
windows7-x64
1Xeno-v1.1....pf.dll
windows10-2004-x64
1Xeno-v1.1....on.dll
windows7-x64
1Xeno-v1.1....on.dll
windows10-2004-x64
1Xeno-v1.1.65/Xeno.dll
windows7-x64
1Xeno-v1.1.65/Xeno.dll
windows10-2004-x64
1Xeno-v1.1.65/Xeno.exe
windows7-x64
3Xeno-v1.1.65/Xeno.exe
windows10-2004-x64
6Xeno-v1.1....s.json
windows7-x64
3Xeno-v1.1....s.json
windows10-2004-x64
3Xeno-v1.1....UI.exe
windows7-x64
1Xeno-v1.1....UI.exe
windows10-2004-x64
1Xeno-v1.1....g.json
windows7-x64
3Xeno-v1.1....g.json
windows10-2004-x64
3Xeno-v1.1....-0.dll
windows10-2004-x64
1Xeno-v1.1....-0.dll
windows10-2004-x64
1Xeno-v1.1....-0.dll
windows10-2004-x64
1Xeno-v1.1....-0.dll
windows10-2004-x64
1Xeno-v1.1....-0.dll
windows10-2004-x64
1Xeno-v1.1....-0.dll
windows10-2004-x64
1Xeno-v1.1....-0.dll
windows10-2004-x64
1Xeno-v1.1....-0.dll
windows10-2004-x64
1Xeno-v1.1....x.html
windows7-x64
6Xeno-v1.1....x.html
windows10-2004-x64
6Xeno-v1.1....ain.js
windows7-x64
3Xeno-v1.1....ain.js
windows10-2004-x64
3Resubmissions
02/04/2025, 22:36
250402-2h95esxpz5 330/03/2025, 19:46
250330-yg7q5avzew 629/03/2025, 19:55
250329-ynl31axwgv 629/03/2025, 19:55
250329-ym9gxaxvf1 629/03/2025, 18:18
250329-wxy3taznv5 629/03/2025, 10:24
250329-mfdwwa1xay 729/03/2025, 00:19
250329-amltvawpx2 628/03/2025, 22:33
250328-2gj7lssxgv 6Analysis
-
max time kernel
144s -
max time network
149s -
platform
windows10-2004_x64 -
resource
win10v2004-20250314-en -
resource tags
arch:x64arch:x86image:win10v2004-20250314-enlocale:en-usos:windows10-2004-x64system -
submitted
29/03/2025, 18:18
Static task
static1
Behavioral task
behavioral1
Sample
Xeno-v1.1.65.zip
Resource
win7-20241010-en
Behavioral task
behavioral2
Sample
Xeno-v1.1.65.zip
Resource
win10v2004-20250314-en
Behavioral task
behavioral3
Sample
Xeno-v1.1.65/Microsoft.Web.WebView2.Core.dll
Resource
win7-20241023-en
Behavioral task
behavioral4
Sample
Xeno-v1.1.65/Microsoft.Web.WebView2.Core.dll
Resource
win10v2004-20250314-en
Behavioral task
behavioral5
Sample
Xeno-v1.1.65/Microsoft.Web.WebView2.WinForms.dll
Resource
win7-20240903-en
Behavioral task
behavioral6
Sample
Xeno-v1.1.65/Microsoft.Web.WebView2.WinForms.dll
Resource
win10v2004-20250314-en
Behavioral task
behavioral7
Sample
Xeno-v1.1.65/Microsoft.Web.WebView2.Wpf.dll
Resource
win7-20250207-en
Behavioral task
behavioral8
Sample
Xeno-v1.1.65/Microsoft.Web.WebView2.Wpf.dll
Resource
win10v2004-20250314-en
Behavioral task
behavioral9
Sample
Xeno-v1.1.65/Newtonsoft.Json.dll
Resource
win7-20240903-en
Behavioral task
behavioral10
Sample
Xeno-v1.1.65/Newtonsoft.Json.dll
Resource
win10v2004-20250314-en
Behavioral task
behavioral11
Sample
Xeno-v1.1.65/Xeno.dll
Resource
win7-20240903-en
Behavioral task
behavioral12
Sample
Xeno-v1.1.65/Xeno.dll
Resource
win10v2004-20250313-en
Behavioral task
behavioral13
Sample
Xeno-v1.1.65/Xeno.exe
Resource
win7-20240903-en
Behavioral task
behavioral14
Sample
Xeno-v1.1.65/Xeno.exe
Resource
win10v2004-20250314-en
Behavioral task
behavioral15
Sample
Xeno-v1.1.65/XenoUI.deps.json
Resource
win7-20240903-en
Behavioral task
behavioral16
Sample
Xeno-v1.1.65/XenoUI.deps.json
Resource
win10v2004-20250314-en
Behavioral task
behavioral17
Sample
Xeno-v1.1.65/XenoUI.exe
Resource
win7-20240903-en
Behavioral task
behavioral18
Sample
Xeno-v1.1.65/XenoUI.exe
Resource
win10v2004-20250314-en
Behavioral task
behavioral19
Sample
Xeno-v1.1.65/XenoUI.runtimeconfig.json
Resource
win7-20240903-en
Behavioral task
behavioral20
Sample
Xeno-v1.1.65/XenoUI.runtimeconfig.json
Resource
win10v2004-20250314-en
Behavioral task
behavioral21
Sample
Xeno-v1.1.65/api-ms-win-crt-convert-l1-1-0.dll
Resource
win10v2004-20250314-en
Behavioral task
behavioral22
Sample
Xeno-v1.1.65/api-ms-win-crt-filesystem-l1-1-0.dll
Resource
win10v2004-20250314-en
Behavioral task
behavioral23
Sample
Xeno-v1.1.65/api-ms-win-crt-heap-l1-1-0.dll
Resource
win10v2004-20250314-en
Behavioral task
behavioral24
Sample
Xeno-v1.1.65/api-ms-win-crt-locale-l1-1-0.dll
Resource
win10v2004-20250314-en
Behavioral task
behavioral25
Sample
Xeno-v1.1.65/api-ms-win-crt-math-l1-1-0.dll
Resource
win10v2004-20250314-en
Behavioral task
behavioral26
Sample
Xeno-v1.1.65/api-ms-win-crt-runtime-l1-1-0.dll
Resource
win10v2004-20250314-en
Behavioral task
behavioral27
Sample
Xeno-v1.1.65/api-ms-win-crt-stdio-l1-1-0.dll
Resource
win10v2004-20250314-en
Behavioral task
behavioral28
Sample
Xeno-v1.1.65/api-ms-win-crt-string-l1-1-0.dll
Resource
win10v2004-20250314-en
Behavioral task
behavioral29
Sample
Xeno-v1.1.65/bin/Monaco/index.html
Resource
win7-20240903-en
Behavioral task
behavioral30
Sample
Xeno-v1.1.65/bin/Monaco/index.html
Resource
win10v2004-20250314-en
Behavioral task
behavioral31
Sample
Xeno-v1.1.65/bin/Monaco/vs/base/worker/workerMain.js
Resource
win7-20240903-en
Behavioral task
behavioral32
Sample
Xeno-v1.1.65/bin/Monaco/vs/base/worker/workerMain.js
Resource
win10v2004-20250314-en
General
-
Target
Xeno-v1.1.65/bin/Monaco/index.html
-
Size
164KB
-
MD5
001dcbb8f41cdcbf9b4d1e3a0ed4b2d2
-
SHA1
982a05814546017c40771e59e7677b53d84787e9
-
SHA256
f1d2c52f2803c29585b81d2eff74c56242d27e9619ee6d38081d5604c5bb1951
-
SHA512
9a4eba2a9314b6f5851997e1db0ecfae8e40da3443d8a5f9df933ccf6a4d75fc330888c8d14818326e15b3dec9ae2f5f7e73cd08c3822dd7eb0b2d753c8cd8fa
-
SSDEEP
3072:Nk4J09UmmJv8kBpZaFD48VOAGUWYPjDZlLJbRBiPEP8yKUz2Ojmjr8zM3KP7pblM:64J09BA3pZaFD48VOAGUWYPjdlLJbRBS
Malware Config
Signatures
-
Legitimate hosting services abused for malware hosting/C2 1 TTPs 5 IoCs
flow ioc 11 raw.githubusercontent.com 26 raw.githubusercontent.com 27 raw.githubusercontent.com 31 raw.githubusercontent.com 10 raw.githubusercontent.com -
Drops file in Program Files directory 17 IoCs
description ioc Process File created C:\Program Files\chrome_Unpacker_BeginUnzipping3832_1927854279\manifest.json msedge.exe File created C:\Program Files\chrome_Unpacker_BeginUnzipping3832_959737655\protocols.json msedge.exe File created C:\Program Files\chrome_Unpacker_BeginUnzipping3832_959737655\manifest.fingerprint msedge.exe File created C:\Program Files\chrome_Unpacker_BeginUnzipping3832_825115042\manifest.fingerprint msedge.exe File created C:\Program Files\chrome_Unpacker_BeginUnzipping3832_1052918013\smart_switch_list.json msedge.exe File created C:\Program Files\chrome_Unpacker_BeginUnzipping3832_1052918013\manifest.fingerprint msedge.exe File created C:\Program Files\chrome_Unpacker_BeginUnzipping3832_403006243\_metadata\verified_contents.json msedge.exe File created C:\Program Files\chrome_Unpacker_BeginUnzipping3832_403006243\manifest.fingerprint msedge.exe File created C:\Program Files\chrome_Unpacker_BeginUnzipping3832_825115042\manifest.json msedge.exe File created C:\Program Files\chrome_Unpacker_BeginUnzipping3832_1927854279\manifest.fingerprint msedge.exe File created C:\Program Files\chrome_Unpacker_BeginUnzipping3832_959737655\manifest.json msedge.exe File created C:\Program Files\chrome_Unpacker_BeginUnzipping3832_1052918013\manifest.json msedge.exe File created C:\Program Files\chrome_Unpacker_BeginUnzipping3832_1052918013\office_endpoints_list.json msedge.exe File created C:\Program Files\chrome_Unpacker_BeginUnzipping3832_825115042\nav_config.json msedge.exe File created C:\Program Files\chrome_Unpacker_BeginUnzipping3832_403006243\LICENSE msedge.exe File created C:\Program Files\chrome_Unpacker_BeginUnzipping3832_403006243\manifest.json msedge.exe File created C:\Program Files\chrome_Unpacker_BeginUnzipping3832_403006243\sets.json msedge.exe -
Checks processor information in registry 2 TTPs 2 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\VendorIdentifier msedge.exe -
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe -
Modifies data under HKEY_USERS 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry msedge.exe Set value (int) \REGISTRY\USER\S-1-5-19\SOFTWARE\Microsoft\Cryptography\TPM\Telemetry\TraceTimeLast = "133877459952477325" msedge.exe -
Modifies registry class 2 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ msedge.exe Key created \REGISTRY\MACHINE\Software\Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppModel\Deployment\Package\*\S-1-5-21-869607583-2483572573-2297019986-1000\{60364C1E-1179-4800-AB8F-75962C89D46E} msedge.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 5492 msedge.exe 5492 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 5 IoCs
pid Process 3832 msedge.exe 3832 msedge.exe 3832 msedge.exe 3832 msedge.exe 3832 msedge.exe -
Suspicious use of FindShellTrayWindow 26 IoCs
pid Process 3832 msedge.exe 3832 msedge.exe 3832 msedge.exe 3832 msedge.exe 3832 msedge.exe 3832 msedge.exe 3832 msedge.exe 3832 msedge.exe 3832 msedge.exe 3832 msedge.exe 3832 msedge.exe 3832 msedge.exe 3832 msedge.exe 3832 msedge.exe 3832 msedge.exe 3832 msedge.exe 3832 msedge.exe 3832 msedge.exe 3832 msedge.exe 3832 msedge.exe 3832 msedge.exe 3832 msedge.exe 3832 msedge.exe 3832 msedge.exe 3832 msedge.exe 3832 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 3832 msedge.exe 3832 msedge.exe 3832 msedge.exe 3832 msedge.exe 3832 msedge.exe 3832 msedge.exe 3832 msedge.exe 3832 msedge.exe 3832 msedge.exe 3832 msedge.exe 3832 msedge.exe 3832 msedge.exe 3832 msedge.exe 3832 msedge.exe 3832 msedge.exe 3832 msedge.exe 3832 msedge.exe 3832 msedge.exe 3832 msedge.exe 3832 msedge.exe 3832 msedge.exe 3832 msedge.exe 3832 msedge.exe 3832 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 3832 wrote to memory of 1948 3832 msedge.exe 87 PID 3832 wrote to memory of 1948 3832 msedge.exe 87 PID 3832 wrote to memory of 4224 3832 msedge.exe 89 PID 3832 wrote to memory of 4224 3832 msedge.exe 89 PID 3832 wrote to memory of 2880 3832 msedge.exe 90 PID 3832 wrote to memory of 2880 3832 msedge.exe 90 PID 3832 wrote to memory of 4224 3832 msedge.exe 89 PID 3832 wrote to memory of 4224 3832 msedge.exe 89 PID 3832 wrote to memory of 4224 3832 msedge.exe 89 PID 3832 wrote to memory of 4224 3832 msedge.exe 89 PID 3832 wrote to memory of 4224 3832 msedge.exe 89 PID 3832 wrote to memory of 4224 3832 msedge.exe 89 PID 3832 wrote to memory of 4224 3832 msedge.exe 89 PID 3832 wrote to memory of 4224 3832 msedge.exe 89 PID 3832 wrote to memory of 4224 3832 msedge.exe 89 PID 3832 wrote to memory of 4224 3832 msedge.exe 89 PID 3832 wrote to memory of 4224 3832 msedge.exe 89 PID 3832 wrote to memory of 4224 3832 msedge.exe 89 PID 3832 wrote to memory of 4224 3832 msedge.exe 89 PID 3832 wrote to memory of 4224 3832 msedge.exe 89 PID 3832 wrote to memory of 4224 3832 msedge.exe 89 PID 3832 wrote to memory of 4224 3832 msedge.exe 89 PID 3832 wrote to memory of 4224 3832 msedge.exe 89 PID 3832 wrote to memory of 4224 3832 msedge.exe 89 PID 3832 wrote to memory of 4224 3832 msedge.exe 89 PID 3832 wrote to memory of 4224 3832 msedge.exe 89 PID 3832 wrote to memory of 4224 3832 msedge.exe 89 PID 3832 wrote to memory of 4224 3832 msedge.exe 89 PID 3832 wrote to memory of 4224 3832 msedge.exe 89 PID 3832 wrote to memory of 4224 3832 msedge.exe 89 PID 3832 wrote to memory of 4224 3832 msedge.exe 89 PID 3832 wrote to memory of 4224 3832 msedge.exe 89 PID 3832 wrote to memory of 4224 3832 msedge.exe 89 PID 3832 wrote to memory of 4224 3832 msedge.exe 89 PID 3832 wrote to memory of 4224 3832 msedge.exe 89 PID 3832 wrote to memory of 4224 3832 msedge.exe 89 PID 3832 wrote to memory of 4224 3832 msedge.exe 89 PID 3832 wrote to memory of 4224 3832 msedge.exe 89 PID 3832 wrote to memory of 4224 3832 msedge.exe 89 PID 3832 wrote to memory of 4224 3832 msedge.exe 89 PID 3832 wrote to memory of 4224 3832 msedge.exe 89 PID 3832 wrote to memory of 4224 3832 msedge.exe 89 PID 3832 wrote to memory of 4224 3832 msedge.exe 89 PID 3832 wrote to memory of 4224 3832 msedge.exe 89 PID 3832 wrote to memory of 4224 3832 msedge.exe 89 PID 3832 wrote to memory of 4224 3832 msedge.exe 89 PID 3832 wrote to memory of 4224 3832 msedge.exe 89 PID 3832 wrote to memory of 4224 3832 msedge.exe 89 PID 3832 wrote to memory of 4224 3832 msedge.exe 89 PID 3832 wrote to memory of 4224 3832 msedge.exe 89 PID 3832 wrote to memory of 4224 3832 msedge.exe 89 PID 3832 wrote to memory of 4224 3832 msedge.exe 89 PID 3832 wrote to memory of 4224 3832 msedge.exe 89 PID 3832 wrote to memory of 4224 3832 msedge.exe 89 PID 3832 wrote to memory of 4224 3832 msedge.exe 89 PID 3832 wrote to memory of 3932 3832 msedge.exe 92 PID 3832 wrote to memory of 3932 3832 msedge.exe 92 PID 3832 wrote to memory of 3932 3832 msedge.exe 92 PID 3832 wrote to memory of 3932 3832 msedge.exe 92 PID 3832 wrote to memory of 3932 3832 msedge.exe 92 PID 3832 wrote to memory of 3932 3832 msedge.exe 92 PID 3832 wrote to memory of 3932 3832 msedge.exe 92 PID 3832 wrote to memory of 3932 3832 msedge.exe 92 PID 3832 wrote to memory of 3932 3832 msedge.exe 92
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --start-maximized --single-argument C:\Users\Admin\AppData\Local\Temp\Xeno-v1.1.65\bin\Monaco\index.html1⤵
- Drops file in Program Files directory
- Checks processor information in registry
- Enumerates system info in registry
- Modifies data under HKEY_USERS
- Modifies registry class
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:3832 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:4 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=133.0.6943.99 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 --annotation=prod=Edge --annotation=ver=133.0.3065.69 --initial-client-data=0x23c,0x240,0x244,0x238,0x280,0x7ff9db27f208,0x7ff9db27f214,0x7ff9db27f2202⤵PID:1948
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --string-annotations --gpu-preferences=UAAAAAAAAADgAAAEAAAAAAAAAAAAAAAAAABgAAEAAAAAAAAAAAAAAAAAAAACAAAAAAAAAAAAAAAAAAAAAAAAABAAAAAAAAAAEAAAAAAAAAAIAAAAAAAAAAgAAAAAAAAA --always-read-main-dll --field-trial-handle=2396,i,6036299819547519324,12062499252901829634,262144 --variations-seed-version --mojo-platform-channel-handle=2388 /prefetch:22⤵PID:4224
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --string-annotations --always-read-main-dll --field-trial-handle=1600,i,6036299819547519324,12062499252901829634,262144 --variations-seed-version --mojo-platform-channel-handle=2436 /prefetch:32⤵PID:2880
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=service --string-annotations --always-read-main-dll --field-trial-handle=2516,i,6036299819547519324,12062499252901829634,262144 --variations-seed-version --mojo-platform-channel-handle=2628 /prefetch:82⤵PID:3932
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --string-annotations --video-capture-use-gpu-memory-buffer --lang=en-US --js-flags=--ms-user-locale= --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --always-read-main-dll --field-trial-handle=3344,i,6036299819547519324,12062499252901829634,262144 --variations-seed-version --mojo-platform-channel-handle=3372 /prefetch:12⤵PID:316
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --string-annotations --video-capture-use-gpu-memory-buffer --lang=en-US --js-flags=--ms-user-locale= --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --always-read-main-dll --field-trial-handle=3352,i,6036299819547519324,12062499252901829634,262144 --variations-seed-version --mojo-platform-channel-handle=3408 /prefetch:12⤵PID:4904
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --string-annotations --video-capture-use-gpu-memory-buffer --lang=en-US --js-flags=--ms-user-locale= --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --always-read-main-dll --field-trial-handle=4224,i,6036299819547519324,12062499252901829634,262144 --variations-seed-version --mojo-platform-channel-handle=4236 /prefetch:12⤵PID:884
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --string-annotations --extension-process --renderer-sub-type=extension --video-capture-use-gpu-memory-buffer --lang=en-US --js-flags=--ms-user-locale= --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --always-read-main-dll --field-trial-handle=4356,i,6036299819547519324,12062499252901829634,262144 --variations-seed-version --mojo-platform-channel-handle=4352 /prefetch:22⤵PID:4592
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --video-capture-use-gpu-memory-buffer --string-annotations --always-read-main-dll --field-trial-handle=4736,i,6036299819547519324,12062499252901829634,262144 --variations-seed-version --mojo-platform-channel-handle=3844 /prefetch:82⤵PID:4724
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --video-capture-use-gpu-memory-buffer --string-annotations --always-read-main-dll --field-trial-handle=5052,i,6036299819547519324,12062499252901829634,262144 --variations-seed-version --mojo-platform-channel-handle=5344 /prefetch:82⤵PID:1816
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=asset_store.mojom.AssetStoreService --lang=en-US --service-sandbox-type=asset_store_service --video-capture-use-gpu-memory-buffer --string-annotations --always-read-main-dll --field-trial-handle=5332,i,6036299819547519324,12062499252901829634,262144 --variations-seed-version --mojo-platform-channel-handle=5412 /prefetch:82⤵PID:3636
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=entity_extraction_service.mojom.Extractor --lang=en-US --service-sandbox-type=entity_extraction --onnx-enabled-for-ee --video-capture-use-gpu-memory-buffer --string-annotations --always-read-main-dll --field-trial-handle=5348,i,6036299819547519324,12062499252901829634,262144 --variations-seed-version --mojo-platform-channel-handle=5312 /prefetch:82⤵PID:3276
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\133.0.3065.69\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\133.0.3065.69\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --lang=en-US --service-sandbox-type=none --video-capture-use-gpu-memory-buffer --string-annotations --always-read-main-dll --field-trial-handle=5960,i,6036299819547519324,12062499252901829634,262144 --variations-seed-version --mojo-platform-channel-handle=5268 /prefetch:82⤵PID:4800
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\133.0.3065.69\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\133.0.3065.69\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --lang=en-US --service-sandbox-type=none --video-capture-use-gpu-memory-buffer --string-annotations --always-read-main-dll --field-trial-handle=5960,i,6036299819547519324,12062499252901829634,262144 --variations-seed-version --mojo-platform-channel-handle=5268 /prefetch:82⤵PID:4956
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=unzip.mojom.Unzipper --lang=en-US --service-sandbox-type=service --video-capture-use-gpu-memory-buffer --string-annotations --always-read-main-dll --field-trial-handle=6084,i,6036299819547519324,12062499252901829634,262144 --variations-seed-version --mojo-platform-channel-handle=6068 /prefetch:82⤵PID:3412
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=unzip.mojom.Unzipper --lang=en-US --service-sandbox-type=service --video-capture-use-gpu-memory-buffer --string-annotations --always-read-main-dll --field-trial-handle=4532,i,6036299819547519324,12062499252901829634,262144 --variations-seed-version --mojo-platform-channel-handle=6176 /prefetch:82⤵PID:4668
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --video-capture-use-gpu-memory-buffer --string-annotations --always-read-main-dll --field-trial-handle=6172,i,6036299819547519324,12062499252901829634,262144 --variations-seed-version --mojo-platform-channel-handle=6300 /prefetch:82⤵PID:4912
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --video-capture-use-gpu-memory-buffer --string-annotations --always-read-main-dll --field-trial-handle=6104,i,6036299819547519324,12062499252901829634,262144 --variations-seed-version --mojo-platform-channel-handle=6112 /prefetch:82⤵PID:4100
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=unzip.mojom.Unzipper --lang=en-US --service-sandbox-type=service --video-capture-use-gpu-memory-buffer --string-annotations --always-read-main-dll --field-trial-handle=6520,i,6036299819547519324,12062499252901829634,262144 --variations-seed-version --mojo-platform-channel-handle=6528 /prefetch:82⤵PID:1644
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=unzip.mojom.Unzipper --lang=en-US --service-sandbox-type=service --video-capture-use-gpu-memory-buffer --string-annotations --always-read-main-dll --field-trial-handle=6684,i,6036299819547519324,12062499252901829634,262144 --variations-seed-version --mojo-platform-channel-handle=6696 /prefetch:82⤵PID:4600
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --video-capture-use-gpu-memory-buffer --string-annotations --always-read-main-dll --field-trial-handle=6676,i,6036299819547519324,12062499252901829634,262144 --variations-seed-version --mojo-platform-channel-handle=6860 /prefetch:82⤵PID:3232
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --video-capture-use-gpu-memory-buffer --string-annotations --always-read-main-dll --field-trial-handle=6848,i,6036299819547519324,12062499252901829634,262144 --variations-seed-version --mojo-platform-channel-handle=6856 /prefetch:82⤵PID:4004
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --message-loop-type-ui --video-capture-use-gpu-memory-buffer --string-annotations --always-read-main-dll --field-trial-handle=4368,i,6036299819547519324,12062499252901829634,262144 --variations-seed-version --mojo-platform-channel-handle=4412 /prefetch:82⤵PID:1988
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --message-loop-type-ui --video-capture-use-gpu-memory-buffer --string-annotations --always-read-main-dll --field-trial-handle=3836,i,6036299819547519324,12062499252901829634,262144 --variations-seed-version --mojo-platform-channel-handle=4472 /prefetch:82⤵PID:5100
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --message-loop-type-ui --video-capture-use-gpu-memory-buffer --string-annotations --always-read-main-dll --field-trial-handle=5276,i,6036299819547519324,12062499252901829634,262144 --variations-seed-version --mojo-platform-channel-handle=4468 /prefetch:82⤵PID:3944
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=edge_search_indexer.mojom.SearchIndexerInterfaceBroker --lang=en-US --service-sandbox-type=search_indexer --message-loop-type-ui --video-capture-use-gpu-memory-buffer --string-annotations --always-read-main-dll --field-trial-handle=1088,i,6036299819547519324,12062499252901829634,262144 --variations-seed-version --mojo-platform-channel-handle=6808 /prefetch:82⤵PID:868
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=unzip.mojom.Unzipper --lang=en-US --service-sandbox-type=service --video-capture-use-gpu-memory-buffer --string-annotations --always-read-main-dll --field-trial-handle=5948,i,6036299819547519324,12062499252901829634,262144 --variations-seed-version --mojo-platform-channel-handle=6908 /prefetch:82⤵PID:3272
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=unzip.mojom.Unzipper --lang=en-US --service-sandbox-type=service --video-capture-use-gpu-memory-buffer --string-annotations --always-read-main-dll --field-trial-handle=6692,i,6036299819547519324,12062499252901829634,262144 --variations-seed-version --mojo-platform-channel-handle=5580 /prefetch:82⤵PID:776
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=unzip.mojom.Unzipper --lang=en-US --service-sandbox-type=service --video-capture-use-gpu-memory-buffer --string-annotations --always-read-main-dll --field-trial-handle=760,i,6036299819547519324,12062499252901829634,262144 --variations-seed-version --mojo-platform-channel-handle=6268 /prefetch:82⤵PID:4388
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=unzip.mojom.Unzipper --lang=en-US --service-sandbox-type=service --video-capture-use-gpu-memory-buffer --string-annotations --always-read-main-dll --field-trial-handle=6100,i,6036299819547519324,12062499252901829634,262144 --variations-seed-version --mojo-platform-channel-handle=6112 /prefetch:82⤵PID:3232
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --string-annotations --gpu-preferences=UAAAAAAAAADoAAAEAAAAAAAAAAAAAAAAAABgAAEAAAAAAAAAAAAAAAAAAABCAAAAAAAAAAAAAAAAAAAAAAAAABAAAAAAAAAAEAAAAAAAAAAIAAAAAAAAAAgAAAAAAAAA --always-read-main-dll --field-trial-handle=6744,i,6036299819547519324,12062499252901829634,262144 --variations-seed-version --mojo-platform-channel-handle=6176 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:5492
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=unzip.mojom.Unzipper --lang=en-US --service-sandbox-type=service --video-capture-use-gpu-memory-buffer --string-annotations --always-read-main-dll --field-trial-handle=5616,i,6036299819547519324,12062499252901829634,262144 --variations-seed-version --mojo-platform-channel-handle=6004 /prefetch:82⤵PID:5796
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\133.0.3065.69\elevation_service.exe"C:\Program Files (x86)\Microsoft\Edge\Application\133.0.3065.69\elevation_service.exe"1⤵PID:1580
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
160B
MD5a24a1941bbb8d90784f5ef76712002f5
SHA15c2b6323c7ed8913b5d0d65a4d21062c96df24eb
SHA2562a7fe18a087d8e8be847d9569420b6e8907917ff6ca0fa42be15d4e3653c8747
SHA512fd7dfec3d46b2af0bddb5aaeae79467507e0c29bab814007a39ea61231e76123659f18a453ed3feb25f16652a0c63c33545e2a0d419fafea89f563fca6a07ce2
-
Filesize
43B
MD5af3a9104ca46f35bb5f6123d89c25966
SHA11ffb1b0aa9f44bdbc57bdf4b98d26d3be0207ee8
SHA25681bd82ac27612a58be30a72dd8956b13f883e32ffb54a58076bd6a42b8afaeea
SHA5126a7a543fa2d1ead3574b4897d2fc714bb218c60a04a70a7e92ecfd2ea59d67028f91b6a2094313f606560087336c619093f1d38d66a3c63a1d1d235ca03d36d1
-
Filesize
85B
MD5c3419069a1c30140b77045aba38f12cf
SHA111920f0c1e55cadc7d2893d1eebb268b3459762a
SHA256db9a702209807ba039871e542e8356219f342a8d9c9ca34bcd9a86727f4a3a0f
SHA512c5e95a4e9f5919cb14f4127539c4353a55c5f68062bf6f95e1843b6690cebed3c93170badb2412b7fb9f109a620385b0ae74783227d6813f26ff8c29074758a1
-
Filesize
134B
MD5049c307f30407da557545d34db8ced16
SHA1f10b86ebfe8d30d0dc36210939ca7fa7a819d494
SHA256c36944790c4a1fa2f2acec5f7809a4d6689ecb7fb3b2f19c831c9adb4e17fc54
SHA51214f04e768956bdd9634f6a172104f2b630e2eeada2f73b9a249be2ec707f4a47ff60f2f700005ca95addd838db9438ad560e5136a10ed32df1d304d65f445780
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\AutoLaunchProtocolsComponent\1.0.0.9\protocols.json
Filesize3KB
MD5f9fd82b572ef4ce41a3d1075acc52d22
SHA1fdded5eef95391be440cc15f84ded0480c0141e3
SHA2565f21978e992a53ebd9c138cb5391c481def7769e3525c586a8a94f276b3cd8d6
SHA51217084cc74462310a608355fbeafa8b51f295fb5fd067dfc641e752e69b1ee4ffba0e9eafa263aab67daab780b9b6be370dd3b54dd4ba8426ab499e50ff5c7339
-
Filesize
280B
MD54facd0ff10154cde70c99baa7df81001
SHA165267ea75bcb63edd2905e288d7b96b543708205
SHA256a13534df0cd0a79a3a1b91085a6d575b47d5a9aad7fc6d712fd2616c0e95a23b
SHA512ad8d2b965851c0ddc23e92ae151b3b0b2bcda850c446f4278bdb0754d6b42ead8fc034b394749578a27b33ad7e4ab0633f974dfd4773fbe4d93ae477f00b73f2
-
Filesize
280B
MD5049e5a246ed025dee243db0ba8e2984c
SHA115ec2d2b28dcfc17c1cfb5d0c13482d0706f942d
SHA25633071ca42c472861a2fabd0f82f8b03ef0daaa6796b24b83f3df02587e4c3d12
SHA512bc5f6fa6a8cae20ab40eae4552650d75f38ebb158c95288a79d9f332623bb507946513c39d19c00a5aee323df01f0f1a51c54594ef1c293289baf45f4ae2145b
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index
Filesize3KB
MD58bbd02942478f6510b63dbde067cc5db
SHA1c4c4b1a01218f4e675d2cefcd974a33e8b01a01b
SHA2561cb1102f35825a74eee7ac1270bf37da1232404da6c6fcf9a8d2596bcc1afc2f
SHA512c2c916fa21b94e0aa9e200d8b5f9c11bc905f73784d539b7915da146e196c1906669421c885cc67ec8c13dce51aa4f28a09e30c7f43d382fbd572585803bc19b
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index~RFe5804be.TMP
Filesize3KB
MD5ad2eb6ecd3fd11e1b4d07ce5e0df3a4d
SHA16c974b2ef4b8778fc09b57ccd76393ab8d00fdce
SHA2568470816a0d14a0bff7a97f50a3fd9556add46e1d7a04b22c6ae8a11605329217
SHA5120cb1a73b3ec565936aca877d82a6b2f7a0a9b3a899f832c555146f46aa9bcf6092b964c12c89e7e475ace94d121e7a2c8368e5aa1926a0a46170e5f0ecfd26a5
-
Filesize
69KB
MD5164a788f50529fc93a6077e50675c617
SHA1c53f6cd0531fd98d6abbd2a9e5fbb4319b221f48
SHA256b305e470fb9f8b69a8cd53b5a8ffb88538c9f6a9c7c2c194a226e8f6c9b53c17
SHA512ec7d173b55283f3e59a468a0037921dc4e1bf3fab1c693330b9d8e5826273c917b374c4b802f3234bbb5e5e210d55e52351426867e0eb8c9f6fba1a053cb05d4
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Extensions\jmjflgjpcpepeafmmgdpfkogkghcpiha\1.2.1_0\content.js
Filesize9KB
MD53d20584f7f6c8eac79e17cca4207fb79
SHA13c16dcc27ae52431c8cdd92fbaab0341524d3092
SHA2560d40a5153cb66b5bde64906ca3ae750494098f68ad0b4d091256939eea243643
SHA512315d1b4cc2e70c72d7eb7d51e0f304f6e64ac13ae301fd2e46d585243a6c936b2ad35a0964745d291ae9b317c316a29760b9b9782c88cc6a68599db531f87d59
-
Filesize
107KB
MD540e2018187b61af5be8caf035fb72882
SHA172a0b7bcb454b6b727bf90da35879b3e9a70621e
SHA256b3efd9d75856016510dd0bdb5e22359925cee7f2056b3cde6411c55ae8ae8ee5
SHA512a21b8f3f7d646909d6aed605ad5823269f52fda1255aa9bb4d4643e165a7b11935572bf9e0a6a324874f99c20a6f3b6d1e457c7ccd30adcac83c15febc063d12
-
Filesize
2KB
MD5469cf041d689709b9505f07e0118a9e8
SHA19413577cc80e1a229ce5d7a82d7e3783a6958e51
SHA2566b8f876dcc54b54ae220dd0ca31c623ff288fcbcfab52a24ba4fb58642cd2023
SHA5123a98e834b3992a76476cb9dbd2be24bbb9323d6064a1096f90c389ece7a568581ba43cda7c31e4a83c9b7212143b0703c119450ce46fd1cc838980afea16314a
-
Filesize
111B
MD5285252a2f6327d41eab203dc2f402c67
SHA1acedb7ba5fbc3ce914a8bf386a6f72ca7baa33c6
SHA2565dfc321417fc31359f23320ea68014ebfd793c5bbed55f77dab4180bbd4a2026
SHA51211ce7cb484fee66894e63c31db0d6b7ef66ad0327d4e7e2eb85f3bcc2e836a3a522c68d681e84542e471e54f765e091efe1ee4065641b0299b15613eb32dcc0d
-
Filesize
2B
MD5d751713988987e9331980363e24189ce
SHA197d170e1550eee4afc0af065b78cda302a97674c
SHA2564f53cda18c2baa0c0354bb5f9a3ecbe5ed12ab4d8e11ba873c2f11161202b945
SHA512b25b294cb4deb69ea00a4c3cf3113904801b6015e5956bd019a8570b1fe1d6040e944ef3cdee16d0a46503ca6e659a25f21cf9ceddc13f352a3c98138c15d6af
-
Filesize
14KB
MD55b5ce564f67941fbaa045889bcaa1e1f
SHA12b7d47b90eb4a3444259036234c150bec3147d3a
SHA2562c9178f3611d7d09e911ae7bdbed99433ea5e9fdd8ecb4783c9a35f80edabdcc
SHA51245439a10a26f245498bda53286fbede915ee633629db8eee3dacff559a2bc648a246266390560eb84532c46af40de486c91584aedb7ec633ac97b45400d3db21
-
Filesize
13KB
MD5f352ff0eadaef6a2656f00384026cc7e
SHA1f6a2e597870fb33a215d465459094eca410f2a6a
SHA25610ba19932a1190b300259ba241e31e36d711e5f0d92640417c6b04bafd6b11ab
SHA51297fbca1d5055739ede5c588d77662bb316adf384138f7ab887afdb0a80e064a1b4ad09bfa7ba4dd692c485ab1cf3289fc3c56dd08f28c263b68a6b572955470e
-
Filesize
36KB
MD557730ad60f42f0e6fa38b889821a5c07
SHA107a92bc20cfbdb3d82ffc596c8a2384fb53f05e6
SHA25606162fcc69095f59dcc08e032fc9d2039c121bd404d1a180689f557c7b494e47
SHA51215cf05ea64dc8a80718afb677403bd86dea94814a6d3449802057ec6485d6ebd24ab6a939506e72fb84f4adf4b57a8c880ec023428b2e7de7f10f8d488f427e6
-
Filesize
4KB
MD57474eca3236a91e28710520cf869bffa
SHA1a4537c04719910a7e902d79b37776182e22bf162
SHA256498c075c7828549a09607156342b0482641ca411ee62b59d4bece86470006184
SHA5123aba55fc38cd3d2aedb23e757ee78bb6cf4fb752b43ed895733ac5b9bc8a5c80be8ea2a50a39a502c1f3ab9dee9049c5d133f06937a9855aabd7d710154be93b
-
Filesize
669B
MD5512476509d19671767444365a336580e
SHA18c150033f09f77c8ca96a364feea942e3de0da2d
SHA2560b9a3d7cfcc130d6ea9e70498cb9689e8bc0cb5790812ca64ae72d52c73ad375
SHA51274b3260fd6a60b895eff783447b64e09d6e53e61ab19d35fcf6a849d07d8bf438ae5e74f647cb210b41b5ad87c8eec8fc36fc3fd8f93fce801c26c18544c4bd7
-
Filesize
880B
MD5eebc30d210f991bf1adea64480a2c63a
SHA16f05c1eef51b11f1d17c3fe67c8df3713ba7b14e
SHA25623ed397e7692da5e00a814ebd76f93034fd6a3026cf08a9c08b489b4e957ca53
SHA5128c920914fc6e97d82af509e3cd5564afbc9361268d0847c9c83f948886dc74a5469aae8d469d22e8fe625b6505b67940419772dde78f289b831f0f22310ef92f
-
Filesize
23KB
MD57a1dce29a992d5b1f4a4e68a02d400b2
SHA1e3d37a8caaa0a6d58df4c8ef959e5326accdf4be
SHA2567ea0d3a64bf1a75e8618140097740ddcb79b94192b522deb2410c218f9f37349
SHA51217d6f72d1b28f60dfdb6c174f338f24353088880fcfd8b5e36a7b2758a33835d19a97a21eebd4d2e13fa09f7af1523e3f313e308c6279541226d5cc87793ad9f
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Edge Cloud Config\CloudConfigLog~RFe589fe5.TMP
Filesize469B
MD55d431925acdc507a88d0c55395d16ae1
SHA1e64cd5668fd4d7a8c1339cadc0318d154ca87c19
SHA256ba51a4f7c470362e3cd29549421c70400c9ed38464128cd40e7cf81549d0ca20
SHA512a63e4c31f539ad90576c782422ad65948b3cec12c2b4fa0f93c514a43ccd323c51dceac42b0d031903f40e76f50a6a7058698bd79f2c10337730ae8a08723505
-
Filesize
22KB
MD556a63f182b2938fbe3e59fbf9681dc08
SHA1b76578ca24fb20b8bd5dafad4296e5a46735a5e1
SHA25636edc2510fb072092e4c6b95efe4521857d9dcb7f0b45afdf5e8ef02e5d19593
SHA512b17246b7c61e26fce1f211311b578d6b3d22c03a042137bb2bb5b23018ce5290a8fbf7a34b2f66fa30b2027296b8a570478f66a144385c320d63c1cef64434f8
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Edge Cloud Config\OperationConfig~RFe58a13c.TMP
Filesize3KB
MD5c7569efb2fa9fe93c0ea2f0896f54036
SHA1e231c700b778b624f6065b035e5803fdd8b4db4b
SHA2562422f055fd21adce7a027c3eaab1bbc474345a26cb1b9762b3d7572ebde67d3f
SHA512c394da9a75cca87f6e20cb2abbc2e087d3e374b613bbc960f255ebfc8f01d4349fc8a487ec56ff8141f47566cf021dc33196e42b6295ce5399ff78e5ce4b066f
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Edge Data Protection Lists\2.0.0.0\office_endpoints_list.json
Filesize3KB
MD594406cdd51b55c0f006cfea05745effb
SHA1a15dc50ca0fd54d6f54fbc6e0788f6dcfc876cc9
SHA2568480f3d58faa017896ba8239f3395e3551325d7a6466497a9a69bf182647b25e
SHA512d4e621f57454fea7049cffc9cc3adfb0d8016360912e6a580f6fe16677e7dd7aa2ee0671cb3c5092a9435708a817f497c3b2cc7aba237d32dbdaae82f10591c3
-
Filesize
30KB
MD5decd79a868317f4015fe8de897c087a0
SHA1082efd2ae68cafcd7349eb630e1265e1e4532e98
SHA256b978ea599dec1c03157d8f439ae06e05d5d3d625ec99cecfa925c7d849b0ab68
SHA5127b9c7856d3aba54da7c63973f5a888dfb3326416a9d25877b2e60702d8eca3a4b10a700690d0fab4acfb1e36f87c86ef86400dfa64bbd36360914c950166d5e5
-
Filesize
6KB
MD597a34f2e20310ea2234fcf8a8d13a762
SHA1ba8e62092c60d40d0734f78c9d115514dcddb57e
SHA2562b7f16d7646c04bc082df3806245e794f7ea22739e02828c9bf16bd41d3ae950
SHA5121a7bc7b3eb80167231c1fa939b3e85c8077472590603a07b7380c145a049fbf159122f947c2ebdd1b3ba29034c3be48ec27a51c8e5143fb564d4d09e5e7b9dce
-
Filesize
34KB
MD5a32f23a6a1f1bcc1ca19636040ba5cca
SHA1f1596d02e9604bafbb06804d0c8a3f9e0a2d00f2
SHA256af4de1a559fb06436ea847ca490fb7fb3bd71c405b057201d21709d4c6f3f614
SHA5124b20f17e68077cf03c58bd07cf9e358714866cabe39f1a7836d3334ed1d7f292fb9e501aa64af4c8f13bccb729991de47aee8f56b092d285ff832db200576d2b
-
Filesize
7KB
MD595a493fb9c065e0fe4e7f7e072b8fca6
SHA17c62e5368e81b88f0d8b2f3cf243beea65ab001c
SHA256ebc8b7d928dfabf4b5f9b10f7d54ad9caad720387db72efa33460ea71fbc78fd
SHA512d17134d2cfd987b0def4bbd189cd9274b51d4532ba4e792806068828c933c4a0b7fae33f3be9c7abd3021dc6d9fa99bef8122ba6323c350025b8c365035acf1a
-
C:\Users\Admin\AppData\Local\Microsoft\TokenBroker\Cache\5a2a7058cf8d1e56c20e6b19a7c48eb2386d141b.tbres
Filesize2KB
MD5cf78137d010b0e6a48932600ab17d126
SHA156c0cf25716d419e2520baeb2966471fe5a678da
SHA2564711ef37fcfe6de8931f33706e54cb3f9a6324817e84398e35ce69c7b95d987e
SHA512c3262a252cd100db14016d379a89b7057f7a0ef0a75154a4ec5683ca8441103015efa840129bf16c3367eda3f1bba92d3b318697f0790684d66764f26fec352a
-
Filesize
1B
MD55058f1af8388633f609cadb75a75dc9d
SHA13a52ce780950d4d969792a2559cd519d7ee8c727
SHA256cdb4ee2aea69cc6a83331bbe96dc2caa9a299d21329efb0336fc02a82e1839a8
SHA5120b61241d7c17bcbb1baee7094d14b7c451efecc7ffcbd92598a0f13d313cc9ebc2a07e61f007baf58fbf94ff9a8695bdd5cae7ce03bbf1e94e93613a00f25f21
-
Filesize
10KB
MD578e47dda17341bed7be45dccfd89ac87
SHA11afde30e46997452d11e4a2adbbf35cce7a1404f
SHA25667d161098be68cd24febc0c7b48f515f199dda72f20ae3bbb97fcf2542bb0550
SHA5129574a66d3756540479dc955c4057144283e09cae11ce11ebce801053bb48e536e67dc823b91895a9e3ee8d3cb27c065d5e9030c39a26cbf3f201348385b418a5
-
C:\Users\Admin\AppData\Local\Temp\scoped_dir3832_1789216719\2b705075-da41-41b3-a889-31d9465f9fcd.tmp
Filesize152KB
MD5dd9bf8448d3ddcfd067967f01e8bf6d7
SHA1d7829475b2bd6a3baa8fabfaf39af57c6439b35e
SHA256fa2232917a5656ea4f811936561ea6b7c92b3c0004c5e08ecb97636d3afc6f72
SHA51265347df34378c2bbb34417e2cccfb3251a0b2412422cc190eed9df525b6e0a9948e0295ea3c33b3ad873ce81e369e89a138ac41d6eb7229546c3269107e661de