Overview
overview
6Static
static
3Xeno-v1.1....re.dll
windows11-21h2-x64
1Xeno-v1.1....ms.dll
windows11-21h2-x64
1Xeno-v1.1....pf.dll
windows11-21h2-x64
1Xeno-v1.1....on.dll
windows11-21h2-x64
1Xeno-v1.1.65/Xeno.dll
windows11-21h2-x64
1Xeno-v1.1.65/Xeno.exe
windows11-21h2-x64
6Xeno-v1.1....UI.exe
windows11-21h2-x64
1Xeno-v1.1....-0.dll
windows11-21h2-x64
1Xeno-v1.1....-0.dll
windows11-21h2-x64
1Xeno-v1.1....-0.dll
windows11-21h2-x64
1Xeno-v1.1....-0.dll
windows11-21h2-x64
1Xeno-v1.1....-0.dll
windows11-21h2-x64
1Xeno-v1.1....-0.dll
windows11-21h2-x64
1Xeno-v1.1....-0.dll
windows11-21h2-x64
1Xeno-v1.1....-0.dll
windows11-21h2-x64
1Xeno-v1.1....x.html
windows11-21h2-x64
6Xeno-v1.1....ain.js
windows11-21h2-x64
3Xeno-v1.1....lua.js
windows11-21h2-x64
3Xeno-v1.1....ain.js
windows11-21h2-x64
3Xeno-v1.1.....de.js
windows11-21h2-x64
3Xeno-v1.1.....es.js
windows11-21h2-x64
3Xeno-v1.1.....fr.js
windows11-21h2-x64
3Xeno-v1.1.....it.js
windows11-21h2-x64
3Xeno-v1.1.....ja.js
windows11-21h2-x64
3Xeno-v1.1....nls.js
windows11-21h2-x64
3Xeno-v1.1.....ko.js
windows11-21h2-x64
3Xeno-v1.1.....ru.js
windows11-21h2-x64
3Xeno-v1.1....-cn.js
windows11-21h2-x64
3Xeno-v1.1....-tw.js
windows11-21h2-x64
3Xeno-v1.1....der.js
windows11-21h2-x64
3Xeno-v1.1....64.dll
windows11-21h2-x64
1Xeno-v1.1....64.dll
windows11-21h2-x64
1Resubmissions
02/04/2025, 22:36
250402-2h95esxpz5 330/03/2025, 19:46
250330-yg7q5avzew 629/03/2025, 19:55
250329-ynl31axwgv 629/03/2025, 19:55
250329-ym9gxaxvf1 629/03/2025, 18:18
250329-wxy3taznv5 629/03/2025, 10:24
250329-mfdwwa1xay 729/03/2025, 00:19
250329-amltvawpx2 6Analysis
-
max time kernel
147s -
max time network
151s -
platform
windows11-21h2_x64 -
resource
win11-20250313-en -
resource tags
arch:x64arch:x86image:win11-20250313-enlocale:en-usos:windows11-21h2-x64system -
submitted
29/03/2025, 19:55
Static task
static1
Behavioral task
behavioral1
Sample
Xeno-v1.1.65/Microsoft.Web.WebView2.Core.dll
Resource
win11-20250313-en
Behavioral task
behavioral2
Sample
Xeno-v1.1.65/Microsoft.Web.WebView2.WinForms.dll
Resource
win11-20250313-en
Behavioral task
behavioral3
Sample
Xeno-v1.1.65/Microsoft.Web.WebView2.Wpf.dll
Resource
win11-20250314-en
Behavioral task
behavioral4
Sample
Xeno-v1.1.65/Newtonsoft.Json.dll
Resource
win11-20250313-en
Behavioral task
behavioral5
Sample
Xeno-v1.1.65/Xeno.dll
Resource
win11-20250313-en
Behavioral task
behavioral6
Sample
Xeno-v1.1.65/Xeno.exe
Resource
win11-20250314-en
Behavioral task
behavioral7
Sample
Xeno-v1.1.65/XenoUI.exe
Resource
win11-20250313-en
Behavioral task
behavioral8
Sample
Xeno-v1.1.65/api-ms-win-crt-convert-l1-1-0.dll
Resource
win11-20250313-en
Behavioral task
behavioral9
Sample
Xeno-v1.1.65/api-ms-win-crt-filesystem-l1-1-0.dll
Resource
win11-20250313-en
Behavioral task
behavioral10
Sample
Xeno-v1.1.65/api-ms-win-crt-heap-l1-1-0.dll
Resource
win11-20250314-en
Behavioral task
behavioral11
Sample
Xeno-v1.1.65/api-ms-win-crt-locale-l1-1-0.dll
Resource
win11-20250314-en
Behavioral task
behavioral12
Sample
Xeno-v1.1.65/api-ms-win-crt-math-l1-1-0.dll
Resource
win11-20250313-en
Behavioral task
behavioral13
Sample
Xeno-v1.1.65/api-ms-win-crt-runtime-l1-1-0.dll
Resource
win11-20250313-en
Behavioral task
behavioral14
Sample
Xeno-v1.1.65/api-ms-win-crt-stdio-l1-1-0.dll
Resource
win11-20250313-en
Behavioral task
behavioral15
Sample
Xeno-v1.1.65/api-ms-win-crt-string-l1-1-0.dll
Resource
win11-20250313-en
Behavioral task
behavioral16
Sample
Xeno-v1.1.65/bin/Monaco/index.html
Resource
win11-20250313-en
Behavioral task
behavioral17
Sample
Xeno-v1.1.65/bin/Monaco/vs/base/worker/workerMain.js
Resource
win11-20250313-en
Behavioral task
behavioral18
Sample
Xeno-v1.1.65/bin/Monaco/vs/basic-languages/lua/lua.js
Resource
win11-20250313-en
Behavioral task
behavioral19
Sample
Xeno-v1.1.65/bin/Monaco/vs/editor/editor.main.js
Resource
win11-20250313-en
Behavioral task
behavioral20
Sample
Xeno-v1.1.65/bin/Monaco/vs/editor/editor.main.nls.de.js
Resource
win11-20250313-en
Behavioral task
behavioral21
Sample
Xeno-v1.1.65/bin/Monaco/vs/editor/editor.main.nls.es.js
Resource
win11-20250313-en
Behavioral task
behavioral22
Sample
Xeno-v1.1.65/bin/Monaco/vs/editor/editor.main.nls.fr.js
Resource
win11-20250313-en
Behavioral task
behavioral23
Sample
Xeno-v1.1.65/bin/Monaco/vs/editor/editor.main.nls.it.js
Resource
win11-20250313-en
Behavioral task
behavioral24
Sample
Xeno-v1.1.65/bin/Monaco/vs/editor/editor.main.nls.ja.js
Resource
win11-20250313-en
Behavioral task
behavioral25
Sample
Xeno-v1.1.65/bin/Monaco/vs/editor/editor.main.nls.js
Resource
win11-20250313-en
Behavioral task
behavioral26
Sample
Xeno-v1.1.65/bin/Monaco/vs/editor/editor.main.nls.ko.js
Resource
win11-20250313-en
Behavioral task
behavioral27
Sample
Xeno-v1.1.65/bin/Monaco/vs/editor/editor.main.nls.ru.js
Resource
win11-20250313-en
Behavioral task
behavioral28
Sample
Xeno-v1.1.65/bin/Monaco/vs/editor/editor.main.nls.zh-cn.js
Resource
win11-20250314-en
Behavioral task
behavioral29
Sample
Xeno-v1.1.65/bin/Monaco/vs/editor/editor.main.nls.zh-tw.js
Resource
win11-20250313-en
Behavioral task
behavioral30
Sample
Xeno-v1.1.65/bin/Monaco/vs/loader.js
Resource
win11-20250314-en
Behavioral task
behavioral31
Sample
Xeno-v1.1.65/libcrypto-3-x64.dll
Resource
win11-20250313-en
Behavioral task
behavioral32
Sample
Xeno-v1.1.65/libssl-3-x64.dll
Resource
win11-20250313-en
General
-
Target
Xeno-v1.1.65/bin/Monaco/index.html
-
Size
164KB
-
MD5
001dcbb8f41cdcbf9b4d1e3a0ed4b2d2
-
SHA1
982a05814546017c40771e59e7677b53d84787e9
-
SHA256
f1d2c52f2803c29585b81d2eff74c56242d27e9619ee6d38081d5604c5bb1951
-
SHA512
9a4eba2a9314b6f5851997e1db0ecfae8e40da3443d8a5f9df933ccf6a4d75fc330888c8d14818326e15b3dec9ae2f5f7e73cd08c3822dd7eb0b2d753c8cd8fa
-
SSDEEP
3072:Nk4J09UmmJv8kBpZaFD48VOAGUWYPjDZlLJbRBiPEP8yKUz2Ojmjr8zM3KP7pblM:64J09BA3pZaFD48VOAGUWYPjdlLJbRBS
Malware Config
Signatures
-
Legitimate hosting services abused for malware hosting/C2 1 TTPs 5 IoCs
flow ioc 24 raw.githubusercontent.com 27 raw.githubusercontent.com 11 raw.githubusercontent.com 12 raw.githubusercontent.com 23 raw.githubusercontent.com -
Drops file in Windows directory 64 IoCs
description ioc Process File created C:\Windows\SystemTemp\chrome_Unpacker_BeginUnzipping3040_1761068649\_locales\zu\messages.json msedge.exe File created C:\Windows\SystemTemp\chrome_Unpacker_BeginUnzipping3040_1761068649\_locales\ms\messages.json msedge.exe File created C:\Windows\SystemTemp\chrome_Unpacker_BeginUnzipping3040_1761068649\_locales\te\messages.json msedge.exe File created C:\Windows\SystemTemp\chrome_Unpacker_BeginUnzipping3040_1761068649\_locales\fr_CA\messages.json msedge.exe File created C:\Windows\SystemTemp\chrome_Unpacker_BeginUnzipping3040_1761068649\_locales\uk\messages.json msedge.exe File created C:\Windows\SystemTemp\chrome_Unpacker_BeginUnzipping3040_1761068649\_locales\ml\messages.json msedge.exe File created C:\Windows\SystemTemp\chrome_Unpacker_BeginUnzipping3040_1761068649\_locales\gl\messages.json msedge.exe File created C:\Windows\SystemTemp\chrome_Unpacker_BeginUnzipping3040_1761068649\_locales\lt\messages.json msedge.exe File created C:\Windows\SystemTemp\chrome_Unpacker_BeginUnzipping3040_1761068649\_locales\fa\messages.json msedge.exe File created C:\Windows\SystemTemp\chrome_Unpacker_BeginUnzipping3040_1761068649\_locales\pl\messages.json msedge.exe File created C:\Windows\SystemTemp\chrome_Unpacker_BeginUnzipping3040_1761068649\_locales\my\messages.json msedge.exe File created C:\Windows\SystemTemp\chrome_Unpacker_BeginUnzipping3040_1761068649\_locales\ta\messages.json msedge.exe File created C:\Windows\SystemTemp\chrome_Unpacker_BeginUnzipping3040_1761068649\_locales\zh_CN\messages.json msedge.exe File created C:\Windows\SystemTemp\chrome_Unpacker_BeginUnzipping3040_1761068649\_locales\en_CA\messages.json msedge.exe File created C:\Windows\SystemTemp\chrome_Unpacker_BeginUnzipping3040_785171858\manifest.json msedge.exe File created C:\Windows\SystemTemp\chrome_Unpacker_BeginUnzipping3040_1470323458\manifest.json msedge.exe File created C:\Windows\SystemTemp\chrome_Unpacker_BeginUnzipping3040_1470323458\manifest.fingerprint msedge.exe File created C:\Windows\SystemTemp\chrome_Unpacker_BeginUnzipping3040_1761068649\service_worker_bin_prod.js msedge.exe File created C:\Windows\SystemTemp\chrome_Unpacker_BeginUnzipping3040_1761068649\_locales\pa\messages.json msedge.exe File created C:\Windows\SystemTemp\chrome_Unpacker_BeginUnzipping3040_1761068649\_locales\da\messages.json msedge.exe File created C:\Windows\SystemTemp\chrome_Unpacker_BeginUnzipping3040_1761068649\_locales\ca\messages.json msedge.exe File created C:\Windows\SystemTemp\chrome_Unpacker_BeginUnzipping3040_1761068649\_locales\hi\messages.json msedge.exe File created C:\Windows\SystemTemp\chrome_Unpacker_BeginUnzipping3040_1761068649\_locales\it\messages.json msedge.exe File created C:\Windows\SystemTemp\chrome_Unpacker_BeginUnzipping3040_1761068649\_locales\id\messages.json msedge.exe File created C:\Windows\SystemTemp\chrome_Unpacker_BeginUnzipping3040_433367179\manifest.fingerprint msedge.exe File created C:\Windows\SystemTemp\chrome_Unpacker_BeginUnzipping3040_1761068649\_locales\fi\messages.json msedge.exe File created C:\Windows\SystemTemp\chrome_Unpacker_BeginUnzipping3040_1761068649\_locales\es_419\messages.json msedge.exe File created C:\Windows\SystemTemp\chrome_Unpacker_BeginUnzipping3040_761172811\deny_etld1_domains.list msedge.exe File created C:\Windows\SystemTemp\chrome_Unpacker_BeginUnzipping3040_1761068649\offscreendocument_main.js msedge.exe File created C:\Windows\SystemTemp\chrome_Unpacker_BeginUnzipping3040_1761068649\_locales\et\messages.json msedge.exe File created C:\Windows\SystemTemp\chrome_Unpacker_BeginUnzipping3040_1761068649\_locales\mn\messages.json msedge.exe File created C:\Windows\SystemTemp\chrome_Unpacker_BeginUnzipping3040_1761068649\_locales\cy\messages.json msedge.exe File created C:\Windows\SystemTemp\chrome_Unpacker_BeginUnzipping3040_1761068649\_locales\iw\messages.json msedge.exe File created C:\Windows\SystemTemp\chrome_Unpacker_BeginUnzipping3040_1761068649\_locales\gu\messages.json msedge.exe File created C:\Windows\SystemTemp\chrome_Unpacker_BeginUnzipping3040_761172811\deny_full_domains.list msedge.exe File created C:\Windows\SystemTemp\chrome_Unpacker_BeginUnzipping3040_1761068649\_locales\km\messages.json msedge.exe File created C:\Windows\SystemTemp\chrome_Unpacker_BeginUnzipping3040_1761068649\manifest.json msedge.exe File created C:\Windows\SystemTemp\chrome_Unpacker_BeginUnzipping3040_1761068649\_locales\pt_PT\messages.json msedge.exe File created C:\Windows\SystemTemp\chrome_Unpacker_BeginUnzipping3040_1761068649\_locales\ka\messages.json msedge.exe File created C:\Windows\SystemTemp\chrome_Unpacker_BeginUnzipping3040_1761068649\_locales\bg\messages.json msedge.exe File created C:\Windows\SystemTemp\chrome_Unpacker_BeginUnzipping3040_1761068649\_locales\ko\messages.json msedge.exe File created C:\Windows\SystemTemp\chrome_Unpacker_BeginUnzipping3040_1761068649\_locales\pt_BR\messages.json msedge.exe File created C:\Windows\SystemTemp\chrome_Unpacker_BeginUnzipping3040_1761068649\_locales\fil\messages.json msedge.exe File created C:\Windows\SystemTemp\chrome_Unpacker_BeginUnzipping3040_1761068649\_locales\mr\messages.json msedge.exe File created C:\Windows\SystemTemp\chrome_Unpacker_BeginUnzipping3040_1761068649\_locales\de\messages.json msedge.exe File created C:\Windows\SystemTemp\chrome_Unpacker_BeginUnzipping3040_1761068649\_locales\en_US\messages.json msedge.exe File created C:\Windows\SystemTemp\chrome_Unpacker_BeginUnzipping3040_1761068649\_locales\lo\messages.json msedge.exe File created C:\Windows\SystemTemp\chrome_Unpacker_BeginUnzipping3040_1761068649\_locales\sw\messages.json msedge.exe File created C:\Windows\SystemTemp\chrome_Unpacker_BeginUnzipping3040_1761068649\_locales\hy\messages.json msedge.exe File created C:\Windows\SystemTemp\chrome_Unpacker_BeginUnzipping3040_1761068649\_locales\az\messages.json msedge.exe File created C:\Windows\SystemTemp\chrome_Unpacker_BeginUnzipping3040_1761068649\_locales\sk\messages.json msedge.exe File created C:\Windows\SystemTemp\chrome_Unpacker_BeginUnzipping3040_1761068649\_locales\sr\messages.json msedge.exe File created C:\Windows\SystemTemp\chrome_Unpacker_BeginUnzipping3040_1761068649\_locales\th\messages.json msedge.exe File created C:\Windows\SystemTemp\chrome_Unpacker_BeginUnzipping3040_1761068649\_locales\am\messages.json msedge.exe File created C:\Windows\SystemTemp\chrome_Unpacker_BeginUnzipping3040_1761068649\_locales\nl\messages.json msedge.exe File created C:\Windows\SystemTemp\chrome_Unpacker_BeginUnzipping3040_1761068649\_locales\sl\messages.json msedge.exe File created C:\Windows\SystemTemp\chrome_Unpacker_BeginUnzipping3040_1761068649\_locales\is\messages.json msedge.exe File created C:\Windows\SystemTemp\chrome_Unpacker_BeginUnzipping3040_2093485580\manifest.json msedge.exe File created C:\Windows\SystemTemp\chrome_Unpacker_BeginUnzipping3040_2093485580\_metadata\verified_contents.json msedge.exe File created C:\Windows\SystemTemp\chrome_Unpacker_BeginUnzipping3040_1761068649\_locales\ro\messages.json msedge.exe File created C:\Windows\SystemTemp\chrome_Unpacker_BeginUnzipping3040_1761068649\_locales\hu\messages.json msedge.exe File created C:\Windows\SystemTemp\chrome_Unpacker_BeginUnzipping3040_1761068649\_locales\si\messages.json msedge.exe File created C:\Windows\SystemTemp\chrome_Unpacker_BeginUnzipping3040_1761068649\_locales\sv\messages.json msedge.exe File created C:\Windows\SystemTemp\chrome_Unpacker_BeginUnzipping3040_1761068649\_locales\en_GB\messages.json msedge.exe -
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe -
Modifies data under HKEY_USERS 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry msedge.exe Set value (int) \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry\TraceTimeLast = "133877517700718495" msedge.exe -
Modifies registry class 2 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ msedge.exe Key created \REGISTRY\MACHINE\Software\Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppModel\Deployment\Package\*\S-1-5-21-3712238951-2226310826-298817577-1000\{997D9F6C-1BC7-44CE-935A-0BB16E4FFA10} msedge.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 4568 msedge.exe 4568 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 3 IoCs
pid Process 3040 msedge.exe 3040 msedge.exe 3040 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 3040 msedge.exe 3040 msedge.exe 3040 msedge.exe 3040 msedge.exe 3040 msedge.exe 3040 msedge.exe 3040 msedge.exe 3040 msedge.exe 3040 msedge.exe 3040 msedge.exe 3040 msedge.exe 3040 msedge.exe 3040 msedge.exe 3040 msedge.exe 3040 msedge.exe 3040 msedge.exe 3040 msedge.exe 3040 msedge.exe 3040 msedge.exe 3040 msedge.exe 3040 msedge.exe 3040 msedge.exe 3040 msedge.exe 3040 msedge.exe 3040 msedge.exe -
Suspicious use of SendNotifyMessage 12 IoCs
pid Process 3040 msedge.exe 3040 msedge.exe 3040 msedge.exe 3040 msedge.exe 3040 msedge.exe 3040 msedge.exe 3040 msedge.exe 3040 msedge.exe 3040 msedge.exe 3040 msedge.exe 3040 msedge.exe 3040 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 3040 wrote to memory of 4740 3040 msedge.exe 83 PID 3040 wrote to memory of 4740 3040 msedge.exe 83 PID 3040 wrote to memory of 4924 3040 msedge.exe 84 PID 3040 wrote to memory of 4924 3040 msedge.exe 84 PID 3040 wrote to memory of 4708 3040 msedge.exe 85 PID 3040 wrote to memory of 4708 3040 msedge.exe 85 PID 3040 wrote to memory of 4924 3040 msedge.exe 84 PID 3040 wrote to memory of 4924 3040 msedge.exe 84 PID 3040 wrote to memory of 4924 3040 msedge.exe 84 PID 3040 wrote to memory of 4924 3040 msedge.exe 84 PID 3040 wrote to memory of 4924 3040 msedge.exe 84 PID 3040 wrote to memory of 4924 3040 msedge.exe 84 PID 3040 wrote to memory of 4924 3040 msedge.exe 84 PID 3040 wrote to memory of 4924 3040 msedge.exe 84 PID 3040 wrote to memory of 4924 3040 msedge.exe 84 PID 3040 wrote to memory of 4924 3040 msedge.exe 84 PID 3040 wrote to memory of 4924 3040 msedge.exe 84 PID 3040 wrote to memory of 4924 3040 msedge.exe 84 PID 3040 wrote to memory of 4924 3040 msedge.exe 84 PID 3040 wrote to memory of 4924 3040 msedge.exe 84 PID 3040 wrote to memory of 4924 3040 msedge.exe 84 PID 3040 wrote to memory of 4924 3040 msedge.exe 84 PID 3040 wrote to memory of 4924 3040 msedge.exe 84 PID 3040 wrote to memory of 4924 3040 msedge.exe 84 PID 3040 wrote to memory of 4924 3040 msedge.exe 84 PID 3040 wrote to memory of 4924 3040 msedge.exe 84 PID 3040 wrote to memory of 4924 3040 msedge.exe 84 PID 3040 wrote to memory of 4924 3040 msedge.exe 84 PID 3040 wrote to memory of 4924 3040 msedge.exe 84 PID 3040 wrote to memory of 4924 3040 msedge.exe 84 PID 3040 wrote to memory of 4924 3040 msedge.exe 84 PID 3040 wrote to memory of 4924 3040 msedge.exe 84 PID 3040 wrote to memory of 4924 3040 msedge.exe 84 PID 3040 wrote to memory of 4924 3040 msedge.exe 84 PID 3040 wrote to memory of 4924 3040 msedge.exe 84 PID 3040 wrote to memory of 4924 3040 msedge.exe 84 PID 3040 wrote to memory of 4924 3040 msedge.exe 84 PID 3040 wrote to memory of 4924 3040 msedge.exe 84 PID 3040 wrote to memory of 4924 3040 msedge.exe 84 PID 3040 wrote to memory of 4924 3040 msedge.exe 84 PID 3040 wrote to memory of 4924 3040 msedge.exe 84 PID 3040 wrote to memory of 4924 3040 msedge.exe 84 PID 3040 wrote to memory of 4924 3040 msedge.exe 84 PID 3040 wrote to memory of 4924 3040 msedge.exe 84 PID 3040 wrote to memory of 4924 3040 msedge.exe 84 PID 3040 wrote to memory of 4924 3040 msedge.exe 84 PID 3040 wrote to memory of 4924 3040 msedge.exe 84 PID 3040 wrote to memory of 4924 3040 msedge.exe 84 PID 3040 wrote to memory of 4924 3040 msedge.exe 84 PID 3040 wrote to memory of 4924 3040 msedge.exe 84 PID 3040 wrote to memory of 4924 3040 msedge.exe 84 PID 3040 wrote to memory of 4924 3040 msedge.exe 84 PID 3040 wrote to memory of 4924 3040 msedge.exe 84 PID 3040 wrote to memory of 4924 3040 msedge.exe 84 PID 3040 wrote to memory of 4924 3040 msedge.exe 84 PID 3040 wrote to memory of 3668 3040 msedge.exe 87 PID 3040 wrote to memory of 3668 3040 msedge.exe 87 PID 3040 wrote to memory of 3668 3040 msedge.exe 87 PID 3040 wrote to memory of 3668 3040 msedge.exe 87 PID 3040 wrote to memory of 3668 3040 msedge.exe 87 PID 3040 wrote to memory of 3668 3040 msedge.exe 87 PID 3040 wrote to memory of 3668 3040 msedge.exe 87 PID 3040 wrote to memory of 3668 3040 msedge.exe 87 PID 3040 wrote to memory of 3668 3040 msedge.exe 87
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --start-maximized --single-argument C:\Users\Admin\AppData\Local\Temp\Xeno-v1.1.65\bin\Monaco\index.html1⤵
- Drops file in Windows directory
- Enumerates system info in registry
- Modifies data under HKEY_USERS
- Modifies registry class
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:3040 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:4 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=133.0.6943.99 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 --annotation=prod=Edge --annotation=ver=133.0.3065.69 --initial-client-data=0x240,0x244,0x248,0x23c,0x2bc,0x7ffe2d17f208,0x7ffe2d17f214,0x7ffe2d17f2202⤵PID:4740
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --string-annotations --gpu-preferences=UAAAAAAAAADgAAAEAAAAAAAAAAAAAAAAAABgAAEAAAAAAAAAAAAAAAAAAAACAAAAAAAAAAAAAAAAAAAAAAAAABAAAAAAAAAAEAAAAAAAAAAIAAAAAAAAAAgAAAAAAAAA --always-read-main-dll --field-trial-handle=2120,i,9204668038538116671,17731974131889647751,262144 --variations-seed-version --mojo-platform-channel-handle=2116 /prefetch:22⤵PID:4924
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --string-annotations --always-read-main-dll --field-trial-handle=1792,i,9204668038538116671,17731974131889647751,262144 --variations-seed-version --mojo-platform-channel-handle=1420 /prefetch:112⤵PID:4708
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=service --string-annotations --always-read-main-dll --field-trial-handle=2416,i,9204668038538116671,17731974131889647751,262144 --variations-seed-version --mojo-platform-channel-handle=3148 /prefetch:132⤵PID:3668
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --string-annotations --pdf-upsell-enabled --video-capture-use-gpu-memory-buffer --lang=en-US --js-flags=--ms-user-locale= --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --always-read-main-dll --field-trial-handle=3460,i,9204668038538116671,17731974131889647751,262144 --variations-seed-version --mojo-platform-channel-handle=3492 /prefetch:12⤵PID:1960
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --string-annotations --pdf-upsell-enabled --video-capture-use-gpu-memory-buffer --lang=en-US --js-flags=--ms-user-locale= --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --always-read-main-dll --field-trial-handle=3472,i,9204668038538116671,17731974131889647751,262144 --variations-seed-version --mojo-platform-channel-handle=3552 /prefetch:12⤵PID:5376
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=asset_store.mojom.AssetStoreService --lang=en-US --service-sandbox-type=asset_store_service --video-capture-use-gpu-memory-buffer --string-annotations --always-read-main-dll --field-trial-handle=4784,i,9204668038538116671,17731974131889647751,262144 --variations-seed-version --mojo-platform-channel-handle=4908 /prefetch:142⤵PID:2020
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=entity_extraction_service.mojom.Extractor --lang=en-US --service-sandbox-type=entity_extraction --onnx-enabled-for-ee --video-capture-use-gpu-memory-buffer --string-annotations --always-read-main-dll --field-trial-handle=4888,i,9204668038538116671,17731974131889647751,262144 --variations-seed-version --mojo-platform-channel-handle=4952 /prefetch:142⤵PID:1664
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=PooledProcess2 --lang=en-US --service-sandbox-type=utility --video-capture-use-gpu-memory-buffer --string-annotations --always-read-main-dll --field-trial-handle=5384,i,9204668038538116671,17731974131889647751,262144 --variations-seed-version --mojo-platform-channel-handle=5388 /prefetch:142⤵PID:5548
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\133.0.3065.69\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\133.0.3065.69\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --lang=en-US --service-sandbox-type=none --video-capture-use-gpu-memory-buffer --string-annotations --always-read-main-dll --field-trial-handle=5628,i,9204668038538116671,17731974131889647751,262144 --variations-seed-version --mojo-platform-channel-handle=5660 /prefetch:142⤵PID:5308
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\133.0.3065.69\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\133.0.3065.69\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --lang=en-US --service-sandbox-type=none --video-capture-use-gpu-memory-buffer --string-annotations --always-read-main-dll --field-trial-handle=5628,i,9204668038538116671,17731974131889647751,262144 --variations-seed-version --mojo-platform-channel-handle=5660 /prefetch:142⤵PID:5852
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=chrome.mojom.ProfileImport --lang=en-US --service-sandbox-type=none --video-capture-use-gpu-memory-buffer --string-annotations --always-read-main-dll --field-trial-handle=5788,i,9204668038538116671,17731974131889647751,262144 --variations-seed-version --mojo-platform-channel-handle=5800 /prefetch:142⤵PID:2040
-
C:\Program Files (x86)\Microsoft\Edge\Application\133.0.3065.69\cookie_exporter.execookie_exporter.exe --cookie-json=11323⤵PID:2916
-
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=unzip.mojom.Unzipper --lang=en-US --service-sandbox-type=service --video-capture-use-gpu-memory-buffer --string-annotations --always-read-main-dll --field-trial-handle=5860,i,9204668038538116671,17731974131889647751,262144 --variations-seed-version --mojo-platform-channel-handle=6072 /prefetch:142⤵PID:2308
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=PooledProcess2 --lang=en-US --service-sandbox-type=utility --video-capture-use-gpu-memory-buffer --string-annotations --always-read-main-dll --field-trial-handle=6092,i,9204668038538116671,17731974131889647751,262144 --variations-seed-version --mojo-platform-channel-handle=6200 /prefetch:142⤵PID:5764
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --message-loop-type-ui --video-capture-use-gpu-memory-buffer --string-annotations --always-read-main-dll --field-trial-handle=568,i,9204668038538116671,17731974131889647751,262144 --variations-seed-version --mojo-platform-channel-handle=5488 /prefetch:142⤵PID:228
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --message-loop-type-ui --video-capture-use-gpu-memory-buffer --string-annotations --always-read-main-dll --field-trial-handle=6344,i,9204668038538116671,17731974131889647751,262144 --variations-seed-version --mojo-platform-channel-handle=6368 /prefetch:142⤵PID:2092
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --message-loop-type-ui --video-capture-use-gpu-memory-buffer --string-annotations --always-read-main-dll --field-trial-handle=5764,i,9204668038538116671,17731974131889647751,262144 --variations-seed-version --mojo-platform-channel-handle=6340 /prefetch:142⤵PID:1896
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=edge_search_indexer.mojom.SearchIndexerInterfaceBroker --lang=en-US --service-sandbox-type=search_indexer --message-loop-type-ui --video-capture-use-gpu-memory-buffer --string-annotations --always-read-main-dll --field-trial-handle=6340,i,9204668038538116671,17731974131889647751,262144 --variations-seed-version --mojo-platform-channel-handle=6368 /prefetch:142⤵PID:964
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=unzip.mojom.Unzipper --lang=en-US --service-sandbox-type=service --video-capture-use-gpu-memory-buffer --string-annotations --always-read-main-dll --field-trial-handle=5368,i,9204668038538116671,17731974131889647751,262144 --variations-seed-version --mojo-platform-channel-handle=5204 /prefetch:142⤵PID:4028
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=unzip.mojom.Unzipper --lang=en-US --service-sandbox-type=service --video-capture-use-gpu-memory-buffer --string-annotations --always-read-main-dll --field-trial-handle=6380,i,9204668038538116671,17731974131889647751,262144 --variations-seed-version --mojo-platform-channel-handle=6220 /prefetch:142⤵PID:5924
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=unzip.mojom.Unzipper --lang=en-US --service-sandbox-type=service --video-capture-use-gpu-memory-buffer --string-annotations --always-read-main-dll --field-trial-handle=6116,i,9204668038538116671,17731974131889647751,262144 --variations-seed-version --mojo-platform-channel-handle=6164 /prefetch:142⤵PID:6060
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=unzip.mojom.Unzipper --lang=en-US --service-sandbox-type=service --video-capture-use-gpu-memory-buffer --string-annotations --always-read-main-dll --field-trial-handle=6096,i,9204668038538116671,17731974131889647751,262144 --variations-seed-version --mojo-platform-channel-handle=6244 /prefetch:142⤵PID:4908
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.22000.1 --string-annotations --gpu-preferences=UAAAAAAAAADoAAAEAAAAAAAAAAAAAAAAAABgAAEAAAAAAAAAAAAAAAAAAABCAAAAAAAAAAAAAAAAAAAAAAAAABAAAAAAAAAAEAAAAAAAAAAIAAAAAAAAAAgAAAAAAAAA --always-read-main-dll --field-trial-handle=5496,i,9204668038538116671,17731974131889647751,262144 --variations-seed-version --mojo-platform-channel-handle=5216 /prefetch:102⤵
- Suspicious behavior: EnumeratesProcesses
PID:4568
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=unzip.mojom.Unzipper --lang=en-US --service-sandbox-type=service --video-capture-use-gpu-memory-buffer --string-annotations --always-read-main-dll --field-trial-handle=5504,i,9204668038538116671,17731974131889647751,262144 --variations-seed-version --mojo-platform-channel-handle=6420 /prefetch:142⤵PID:4792
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=unzip.mojom.Unzipper --lang=en-US --service-sandbox-type=service --video-capture-use-gpu-memory-buffer --string-annotations --always-read-main-dll --field-trial-handle=5896,i,9204668038538116671,17731974131889647751,262144 --variations-seed-version --mojo-platform-channel-handle=3428 /prefetch:142⤵PID:3480
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\133.0.3065.69\elevation_service.exe"C:\Program Files (x86)\Microsoft\Edge\Application\133.0.3065.69\elevation_service.exe"1⤵PID:2484
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --no-startup-window --win-session-start1⤵PID:1568
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --no-startup-window --win-session-start2⤵PID:5180
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
280B
MD5682ff716e69471147f7a0e231efe86ac
SHA1937de827ecedfb18ed3f399ac647f88f2579c6bb
SHA25611e566a5d7934e7f13ddb561000aafff386430a3df22a36424f2101e9ba76662
SHA5124fffcccf9a78aed772e46ff48f817d586934c8d46434535d25b080c4fa264e018e6c2fe389d8d42b1f3b911e402abbf00affd9b890b77ae68d7074a31ee3e93e
-
Filesize
2B
MD599914b932bd37a50b983c5e7c90ae93b
SHA1bf21a9e8fbc5a3846fb05b4fa0859e0917b2202f
SHA25644136fa355b3678a1146ad16f7e8649e94fb4fc21fe77e8310c060f61caaff8a
SHA51227c74670adb75075fad058d5ceaf7b20c4e7786c83bae8a32f626f9782af34c9a33c2046ef60fd2a7878d378e29fec851806bbd9a67878f3a9f1cda4830763fd
-
Filesize
107KB
MD540e2018187b61af5be8caf035fb72882
SHA172a0b7bcb454b6b727bf90da35879b3e9a70621e
SHA256b3efd9d75856016510dd0bdb5e22359925cee7f2056b3cde6411c55ae8ae8ee5
SHA512a21b8f3f7d646909d6aed605ad5823269f52fda1255aa9bb4d4643e165a7b11935572bf9e0a6a324874f99c20a6f3b6d1e457c7ccd30adcac83c15febc063d12
-
Filesize
2KB
MD5f5cabae145ebff6debbfebf0a6cb633e
SHA122d3d1711fb72f911f5bf1f2969eb104a4713f80
SHA2563d66aba1df40f9f8420bc5836cae3beb90eb31020a247e4cabd57285cb39fee2
SHA51240578422dba05d8c3c983bc65838b32a8a65df2cb29633528f950403b87bf2d68142df74c8787613360d030632ed49c169d90a19f6c3df8652d452290e00580c
-
Filesize
2B
MD5d751713988987e9331980363e24189ce
SHA197d170e1550eee4afc0af065b78cda302a97674c
SHA2564f53cda18c2baa0c0354bb5f9a3ecbe5ed12ab4d8e11ba873c2f11161202b945
SHA512b25b294cb4deb69ea00a4c3cf3113904801b6015e5956bd019a8570b1fe1d6040e944ef3cdee16d0a46503ca6e659a25f21cf9ceddc13f352a3c98138c15d6af
-
Filesize
40B
MD520d4b8fa017a12a108c87f540836e250
SHA11ac617fac131262b6d3ce1f52f5907e31d5f6f00
SHA2566028bd681dbf11a0a58dde8a0cd884115c04caa59d080ba51bde1b086ce0079d
SHA512507b2b8a8a168ff8f2bdafa5d9d341c44501a5f17d9f63f3d43bd586bc9e8ae33221887869fa86f845b7d067cb7d2a7009efd71dda36e03a40a74fee04b86856
-
Filesize
17KB
MD5a2ff7a03d4a6e77bdd3dfb208c0558dc
SHA1e7ad01cc6b84b7783f5098a28c5d6dcafebdb885
SHA25650f11a3a23829e6cdbed9ddc2a2234ecfbb5a87096462ad355f153cd0f9cf2d1
SHA512bd5fd62d76743ddd6c54c3fb1835fd276f968a021978fbe9ac48aae3259898c018ae17fdf3da998049ec856f913b44b6b5bc3c872f67f10beb792d6d3bf43300
-
Filesize
17KB
MD57338faf7fecad2850fae5953717e4e34
SHA1c418f5dd7805bc4e1139a649c58009907abc01ed
SHA256f442cb234501197834a504c222f02eb6fb48a730e6e1d61ee53d5e28431e51b2
SHA512e5f6d5ca1fece92610acf684e6c4619071ff497c6f106e568a74ea3525dd6914ba6064faa975364b89e93ca38ab70e5a4e89439ac0b23659a29b1506a8ce4bb7
-
Filesize
37KB
MD5990a081e20b32b8843ac5309a14338f0
SHA156a82c56792f062b95521bd2971522bcb884860e
SHA256fe02c26486489c1fbd0d3e1b97af6fd06af232eed6c9139fc798c7eaa3b92d0c
SHA5124334064ba3a66346f2e21802a85660c131c267ae954492e03b754cbd405251715706af98f83d8449636e0d1b368ccf8cdef661a6f34f269f45b3f81fe31332dc
-
Filesize
22KB
MD5842fb35f18b68cdb98cfb89cb6841bac
SHA1b0db04d99bcec56ac389063b43be9c0c5b68f92a
SHA2564cac9d01852d5586107241ff229ae802c39c0e3b89b06c7234dbc0cd511bae9c
SHA5127f87679332de8972d42a75fe2fdf1946f7ed4aeed7f7cafd4e3ee3ad118f2d6cf0b197abf88781a0771ff198a0b58118f160098f442aa38914fc984b2909ce83
-
Filesize
23KB
MD5062d96cc97e937e2dc7f5e04c543e8cd
SHA1ee9e6657825adb7fc800c32c365d8e9a68489cc5
SHA256f231b3ecc7eff90e9c46256dac2f8a00ffcd2e01cbc91cf195e2e4a36019c3a2
SHA51252f6d2055e68d175b068e00b375b7f66b80236262b115210e388540c1497179a0155903824efd79e0d2be92c1f66b60b4e5914db86ae4dca5675992fb7b61f68
-
Filesize
896B
MD5aa9d7fda9407a9062c7804519ee0bfda
SHA10258dee48e43428bef6150fee02dfff278038d52
SHA2563bc886cff5c3d233d4fbcf8e5e285892968bfd28262d80d5ec056642b9b2fa0c
SHA512ce4c1d531fa9cc561182135d5b94d0452ed41bfb3e107808016b96f560594bc8bc4c02be13cd4b2a18204c81bad0507f91df72ffa5d065edc93440b298f5d037
-
Filesize
465B
MD5de7da9f7e1e81df6d8d715af4d5afe67
SHA12ecb9a41aea4bf39e98e9a09cbf00ea0ba79f842
SHA2568fadc5c757a127015907881b6a8dd93c9db3846ab0ccbb1195f566099adf8a1f
SHA5128315cddc97322ba9dea735cf4fd9b454686e18be0d0a6f292fdf83d678ce985fd271484d2f13b8e9e72b47c029740ccc9c46dc238dee8209df4e04aa41d19ea2
-
Filesize
19KB
MD541c1930548d8b99ff1dbb64ba7fecb3d
SHA1d8acfeaf7c74e2b289be37687f886f50c01d4f2f
SHA25616cee17a989167242dd7ee2755721e357dd23bcfcb61f5789cc19deafe7ca502
SHA512a684d61324c71ac15f3a907788ab2150f61e7e2b2bf13ca08c14e9822b22336d0d45d9ff2a2a145aa7321d28d6b71408f9515131f8a1bd9f4927b105e6471b75
-
Filesize
50KB
MD5c962c9351bef7b12705e580e8624a0af
SHA13506fde9a7a2e5bba2326f234c5e40cd70c8b5c6
SHA256b60e27582dfed1d8ba3e2dcff4839a6d0e3ea48046832d489350bd8c202496a8
SHA512001d64c63fe82449e6fe2cefe5a8d926f31c1c208dbdeed5c40cf5031af9ba84a22434e9f109393b3025289cda3739a082b1a25f9e2b2c6d4962d8b276195442
-
Filesize
41KB
MD54e4152530162cda5ca9e81bccce5591a
SHA1037d43f2be2baa15690e441fa17a521336e467e3
SHA2560fca0179be3f342fddfb74f966812211463ada7d481dbbe96ff36ba79060ee9f
SHA51276d2159fe0d85709ecdfd763414663d0a48634a046f1951ff854d1c34ad5674ae161ba1e114d193e46d8be026d4ec56f9f09586b7f5592bdd0a80138a650d3e1
-
Filesize
41KB
MD52e297c51afd1e9aaaf023a8e5752059a
SHA1072716ce65f15b47d0c4764cfa0a5c47eb1bee72
SHA256214f8d57bddf47457cd43f9247805f60882ef50ef6352149444c38beccd054aa
SHA5126c6db64cd7f5ef089d65cbf1c49055447b95fe68da2db8721bdb2e0d23b8e874e1264084dd67053b3c98a380b699662872fa9dbbbe431353d09eeffef4daa038
-
Filesize
50KB
MD56dd33eb7cd5a97b2e70c0aa0ba78e071
SHA12ef018e21e1027b341775524c803fe9266554e9c
SHA25600bb790690ef8758fca27050e472bfeb858c882e00ac94c755cd1578980622c4
SHA512cf74b08bb0bc0730529fa4a454b00bbe6076bf5d1c09c74e4d7ebc72ad3b313a8d607aa5fa8488cec0f5bf3b923a41cae227febfd8d59199801628d87c18cb7f
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\TrustTokenKeyCommitments\2025.1.17.1\keys.json
Filesize6KB
MD5bef4f9f856321c6dccb47a61f605e823
SHA18e60af5b17ed70db0505d7e1647a8bc9f7612939
SHA256fd1847df25032c4eef34e045ba0333f9bd3cb38c14344f1c01b48f61f0cfd5c5
SHA512bdec3e243a6f39bfea4130c85b162ea00a4974c6057cd06a05348ac54517201bbf595fcc7c22a4ab2c16212c6009f58df7445c40c82722ab4fa1c8d49d39755c
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Typosquatting\2025.3.28.1\typosquatting_list.pb
Filesize628KB
MD5bd5eeb9c4b00955e5a0f6a332d78cdef
SHA1cf9e85ae41cf1ef2385a73ef36ebeb3c3378ea3a
SHA256dbbea874b4b73aeb3ad17355c90f692767a947516481f158b7319f7c43f0e657
SHA5122cfa521120dd1ab9c2cc90b74cd8d3f6f8991a086bd2dc1b9d225b08aeca8420f565e047f551ddf6d2149cfb02e4ce69b641e328a774dde7017ad374fd58eb96
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\extensions_crx_cache\ghbmnnjooekpmoecnnnilnnbdlolhkhi_1.fa2232917a5656ea4f811936561ea6b7c92b3c0004c5e08ecb97636d3afc6f72
Filesize152KB
MD5dd9bf8448d3ddcfd067967f01e8bf6d7
SHA1d7829475b2bd6a3baa8fabfaf39af57c6439b35e
SHA256fa2232917a5656ea4f811936561ea6b7c92b3c0004c5e08ecb97636d3afc6f72
SHA51265347df34378c2bbb34417e2cccfb3251a0b2412422cc190eed9df525b6e0a9948e0295ea3c33b3ad873ce81e369e89a138ac41d6eb7229546c3269107e661de
-
Filesize
1KB
MD5ee002cb9e51bb8dfa89640a406a1090a
SHA149ee3ad535947d8821ffdeb67ffc9bc37d1ebbb2
SHA2563dbd2c90050b652d63656481c3e5871c52261575292db77d4ea63419f187a55b
SHA512d1fdcc436b8ca8c68d4dc7077f84f803a535bf2ce31d9eb5d0c466b62d6567b2c59974995060403ed757e92245db07e70c6bddbf1c3519fed300cc5b9bf9177c
-
Filesize
79B
MD57f4b594a35d631af0e37fea02df71e72
SHA1f7bc71621ea0c176ca1ab0a3c9fe52dbca116f57
SHA256530882d7f535ae57a4906ca735b119c9e36480cbb780c7e8ad37c9c8fdf3d9b1
SHA512bf3f92f5023f0fbad88526d919252a98db6d167e9ca3e15b94f7d71ded38a2cfb0409f57ef24708284ddd965bda2d3207cd99c008b1c9c8c93705fd66ac86360
-
Filesize
118B
MD53e4993f878e658507d78f52011519527
SHA12fce50683531c5c985967a71f90d62ab141707df
SHA256a2fb35b03e24f5ba14cbe0e3c3d8cb43588e93f048878b066fd1d640ef8e59cb
SHA5129d24ef876ac989e50e9d4d06732a4c4f61e12df366b3d4e5ff93d6a60badac36c3e55e7f13c2539ecb525017490a887fc56580ef8e83483019041ad9b13358d5
-
Filesize
85B
MD5c3419069a1c30140b77045aba38f12cf
SHA111920f0c1e55cadc7d2893d1eebb268b3459762a
SHA256db9a702209807ba039871e542e8356219f342a8d9c9ca34bcd9a86727f4a3a0f
SHA512c5e95a4e9f5919cb14f4127539c4353a55c5f68062bf6f95e1843b6690cebed3c93170badb2412b7fb9f109a620385b0ae74783227d6813f26ff8c29074758a1
-
Filesize
176B
MD56607494855f7b5c0348eecd49ef7ce46
SHA12c844dd9ea648efec08776757bc376b5a6f9eb71
SHA25637c30639ea04878b9407aecbcea4848b033e4548d5023ce5105ea79cab2c68dd
SHA5128cb60725d958291b9a78c293992768cb03ff53ab942637e62eb6f17d80e0864c56a9c8ccafbc28246e9ce1fdb248e8d071d76764bcaf0243397d0f0a62b4d09a
-
Filesize
66B
MD5496b05677135db1c74d82f948538c21c
SHA1e736e675ca5195b5fc16e59fb7de582437fb9f9a
SHA256df55a9464ee22a0f860c0f3b4a75ec62471d37b4d8cb7a0e460eef98cb83ebe7
SHA5128bd1b683e24a8c8c03b0bc041288296448f799a6f431bacbd62cb33e621672991141c7151d9424ad60ab65a7a6a30298243b8b71d281f9e99b8abb79fe16bd3c
-
Filesize
134B
MD5049c307f30407da557545d34db8ced16
SHA1f10b86ebfe8d30d0dc36210939ca7fa7a819d494
SHA256c36944790c4a1fa2f2acec5f7809a4d6689ecb7fb3b2f19c831c9adb4e17fc54
SHA51214f04e768956bdd9634f6a172104f2b630e2eeada2f73b9a249be2ec707f4a47ff60f2f700005ca95addd838db9438ad560e5136a10ed32df1d304d65f445780
-
Filesize
3KB
MD5f9fd82b572ef4ce41a3d1075acc52d22
SHA1fdded5eef95391be440cc15f84ded0480c0141e3
SHA2565f21978e992a53ebd9c138cb5391c481def7769e3525c586a8a94f276b3cd8d6
SHA51217084cc74462310a608355fbeafa8b51f295fb5fd067dfc641e752e69b1ee4ffba0e9eafa263aab67daab780b9b6be370dd3b54dd4ba8426ab499e50ff5c7339