Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Resubmissions

21/09/2024, 22:06

240921-1z6b5awgnn 8

21/09/2024, 22:05

240921-1zty4awglr 3

21/09/2024, 22:05

240921-1zqxfawgjc 6

21/09/2024, 21:52

240921-1rgzkawcrl 8

21/09/2024, 21:52

240921-1rav9awcqm 6

21/09/2024, 21:43

240921-1lcgwsvhnc 3

21/09/2024, 21:43

240921-1k2emawakn 6

21/09/2024, 21:42

240921-1ks39avhkg 6

21/09/2024, 21:34

240921-1eswasvfrl 6

Analysis

  • max time kernel
    599s
  • max time network
    599s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240802-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system
  • submitted
    21/09/2024, 21:52

General

  • Target

    Xeno-v1.0.5-x64.zip

  • Size

    4.1MB

  • MD5

    2082fb4c91583ef7c09766de61cdd1f2

  • SHA1

    6bbc4f900c3df27731b00c9d57e3327d0e5c9199

  • SHA256

    a19dc47dbaad01da2e029f993f013e3abc77cab80813bbb65fb3348226a938d5

  • SHA512

    8ba3c313045933729ab6114aa5ce206d3f78c738bab78f7805a8123e954e32098a746559474cc7be587646d15fa223ad0c5aefd27dabec3a339f9cab65c78b06

  • SSDEEP

    98304:4/eSPHy20NL9Cteaqxt5JwlVLnwphakez+XnDHS9aIhcewTvZRirOFRXLNt+zst:4WSfy1l9UeaSt5J4uhJeSLSZhQBRiiF3

Malware Config

Signatures

  • Downloads MZ/PE file
  • Event Triggered Execution: Image File Execution Options Injection 1 TTPs 2 IoCs
  • Checks computer location settings 2 TTPs 2 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Event Triggered Execution: Component Object Model Hijacking 1 TTPs

    Adversaries may establish persistence by executing malicious content triggered by hijacked references to Component Object Model (COM) objects.

  • Executes dropped EXE 18 IoCs
  • Loads dropped DLL 41 IoCs
  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Checks whether UAC is enabled 1 TTPs 1 IoCs
  • Checks system information in the registry 2 TTPs 10 IoCs

    System information is often read in order to detect sandboxing environments.

  • Drops file in Program Files directory 64 IoCs
  • Browser Information Discovery 1 TTPs

    Enumerate browser information.

  • Embeds OpenSSL 1 IoCs

    Embeds OpenSSL, may be used to circumvent TLS interception.

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Location Discovery: System Language Discovery 1 TTPs 9 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • System Network Configuration Discovery: Internet Connection Discovery 1 TTPs 3 IoCs

    Adversaries may check for Internet connectivity on compromised systems.

  • Enumerates system info in registry 2 TTPs 3 IoCs
  • Modifies registry class 64 IoCs
  • NTFS ADS 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 39 IoCs
  • Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 18 IoCs
  • Suspicious use of AdjustPrivilegeToken 6 IoCs
  • Suspicious use of FindShellTrayWindow 64 IoCs
  • Suspicious use of SendNotifyMessage 24 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs

Processes

  • C:\Windows\Explorer.exe
    C:\Windows\Explorer.exe /idlist,,C:\Users\Admin\AppData\Local\Temp\Xeno-v1.0.5-x64.zip
    1⤵
      PID:712
    • C:\Windows\System32\rundll32.exe
      C:\Windows\System32\rundll32.exe C:\Windows\System32\shell32.dll,SHCreateLocalServerRunDll {9aa46009-3ce0-458a-a354-715610a075e6} -Embedding
      1⤵
        PID:3104
      • C:\Program Files\7-Zip\7zG.exe
        "C:\Program Files\7-Zip\7zG.exe" x -o"C:\Users\Admin\AppData\Local\Temp\Xeno-v1.0.5-x64\" -ad -an -ai#7zMap16031:110:7zEvent3786
        1⤵
        • Suspicious use of AdjustPrivilegeToken
        • Suspicious use of FindShellTrayWindow
        PID:1112
      • C:\Users\Admin\AppData\Local\Temp\Xeno-v1.0.5-x64\Xeno-v1.0.5-x64\Xeno.exe
        "C:\Users\Admin\AppData\Local\Temp\Xeno-v1.0.5-x64\Xeno-v1.0.5-x64\Xeno.exe"
        1⤵
        • Executes dropped EXE
        • Loads dropped DLL
        • Suspicious behavior: EnumeratesProcesses
        PID:1804
      • C:\Users\Admin\AppData\Local\Temp\Xeno-v1.0.5-x64\Xeno-v1.0.5-x64\Xeno.exe
        "C:\Users\Admin\AppData\Local\Temp\Xeno-v1.0.5-x64\Xeno-v1.0.5-x64\Xeno.exe"
        1⤵
        • Executes dropped EXE
        • Loads dropped DLL
        • Suspicious behavior: EnumeratesProcesses
        PID:4640
      • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
        "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --profile-directory=Default
        1⤵
        • Enumerates system info in registry
        • NTFS ADS
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
        • Suspicious use of FindShellTrayWindow
        • Suspicious use of SendNotifyMessage
        • Suspicious use of WriteProcessMemory
        PID:4708
        • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
          "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0x11c,0x120,0x124,0xf8,0x128,0x7ff82c1e46f8,0x7ff82c1e4708,0x7ff82c1e4718
          2⤵
            PID:4948
          • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
            "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2076,14734829349618055626,3790824716045760668,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1952 /prefetch:2
            2⤵
              PID:3672
            • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
              "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2076,14734829349618055626,3790824716045760668,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2168 /prefetch:3
              2⤵
              • Suspicious behavior: EnumeratesProcesses
              PID:2324
            • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
              "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2076,14734829349618055626,3790824716045760668,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2736 /prefetch:8
              2⤵
                PID:3748
              • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2076,14734829349618055626,3790824716045760668,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3416 /prefetch:1
                2⤵
                  PID:3168
                • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                  "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2076,14734829349618055626,3790824716045760668,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3440 /prefetch:1
                  2⤵
                    PID:3388
                  • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                    "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2076,14734829349618055626,3790824716045760668,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4128 /prefetch:1
                    2⤵
                      PID:228
                    • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                      "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2076,14734829349618055626,3790824716045760668,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5116 /prefetch:1
                      2⤵
                        PID:3808
                      • C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe
                        "C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2076,14734829349618055626,3790824716045760668,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5396 /prefetch:8
                        2⤵
                          PID:1068
                        • C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe
                          "C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2076,14734829349618055626,3790824716045760668,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5396 /prefetch:8
                          2⤵
                          • Suspicious behavior: EnumeratesProcesses
                          PID:4376
                        • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                          "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2076,14734829349618055626,3790824716045760668,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5524 /prefetch:1
                          2⤵
                            PID:3408
                          • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                            "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2076,14734829349618055626,3790824716045760668,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5628 /prefetch:1
                            2⤵
                              PID:888
                            • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                              "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2076,14734829349618055626,3790824716045760668,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5680 /prefetch:1
                              2⤵
                                PID:3956
                              • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2076,14734829349618055626,3790824716045760668,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=13 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5720 /prefetch:1
                                2⤵
                                  PID:4696
                                • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                  "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2076,14734829349618055626,3790824716045760668,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=14 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5552 /prefetch:1
                                  2⤵
                                    PID:3844
                                  • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                    "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2076,14734829349618055626,3790824716045760668,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=15 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3756 /prefetch:1
                                    2⤵
                                      PID:1228
                                    • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                      "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2076,14734829349618055626,3790824716045760668,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=16 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=2696 /prefetch:1
                                      2⤵
                                        PID:1512
                                      • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                        "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=edge_collections.mojom.CollectionsDataManager --field-trial-handle=2076,14734829349618055626,3790824716045760668,131072 --lang=en-US --service-sandbox-type=collections --mojo-platform-channel-handle=5652 /prefetch:8
                                        2⤵
                                          PID:2936
                                        • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                          "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2076,14734829349618055626,3790824716045760668,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=19 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6104 /prefetch:1
                                          2⤵
                                            PID:672
                                          • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                            "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2076,14734829349618055626,3790824716045760668,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=20 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5776 /prefetch:1
                                            2⤵
                                              PID:3864
                                            • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                              "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2076,14734829349618055626,3790824716045760668,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=21 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3096 /prefetch:1
                                              2⤵
                                                PID:4308
                                              • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                                "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2076,14734829349618055626,3790824716045760668,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=22 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5704 /prefetch:1
                                                2⤵
                                                  PID:1068
                                                • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                                  "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2076,14734829349618055626,3790824716045760668,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=23 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5792 /prefetch:1
                                                  2⤵
                                                    PID:3056
                                                  • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                                    "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2076,14734829349618055626,3790824716045760668,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=6608 /prefetch:2
                                                    2⤵
                                                    • Suspicious behavior: EnumeratesProcesses
                                                    PID:1268
                                                  • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                                    "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=quarantine.mojom.Quarantine --field-trial-handle=2076,14734829349618055626,3790824716045760668,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4180 /prefetch:8
                                                    2⤵
                                                    • Suspicious behavior: EnumeratesProcesses
                                                    PID:2472
                                                  • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                                    "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2076,14734829349618055626,3790824716045760668,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=26 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3660 /prefetch:1
                                                    2⤵
                                                      PID:5084
                                                    • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                                      "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2076,14734829349618055626,3790824716045760668,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=28 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5700 /prefetch:1
                                                      2⤵
                                                        PID:2184
                                                      • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                                        "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=chrome.mojom.UtilReadIcon --field-trial-handle=2076,14734829349618055626,3790824716045760668,131072 --lang=en-US --service-sandbox-type=icon_reader --mojo-platform-channel-handle=5288 /prefetch:8
                                                        2⤵
                                                          PID:2564
                                                        • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                                          "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=quarantine.mojom.Quarantine --field-trial-handle=2076,14734829349618055626,3790824716045760668,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=6356 /prefetch:8
                                                          2⤵
                                                          • Suspicious behavior: EnumeratesProcesses
                                                          PID:3180
                                                        • C:\Users\Admin\Downloads\MicrosoftEdgeWebView2RuntimeInstallerX64.exe
                                                          "C:\Users\Admin\Downloads\MicrosoftEdgeWebView2RuntimeInstallerX64.exe"
                                                          2⤵
                                                          • Executes dropped EXE
                                                          • Drops file in Program Files directory
                                                          • System Location Discovery: System Language Discovery
                                                          PID:1076
                                                          • C:\Program Files (x86)\Microsoft\Temp\EU6D0B.tmp\MicrosoftEdgeUpdate.exe
                                                            "C:\Program Files (x86)\Microsoft\Temp\EU6D0B.tmp\MicrosoftEdgeUpdate.exe" /installsource taggedmi /install "appguid={F3017226-FE2A-4295-8BDF-00C3A9A7E4C5}&appname=Microsoft%20Edge%20WebView2%20Runtime&needsadmin=Prefers"
                                                            3⤵
                                                            • Event Triggered Execution: Image File Execution Options Injection
                                                            • Checks computer location settings
                                                            • Executes dropped EXE
                                                            • Loads dropped DLL
                                                            • Checks system information in the registry
                                                            • System Location Discovery: System Language Discovery
                                                            • Suspicious behavior: EnumeratesProcesses
                                                            • Suspicious use of AdjustPrivilegeToken
                                                            PID:4592
                                                            • C:\Program Files (x86)\Microsoft\EdgeUpdate\MicrosoftEdgeUpdate.exe
                                                              "C:\Program Files (x86)\Microsoft\EdgeUpdate\MicrosoftEdgeUpdate.exe" /regsvc
                                                              4⤵
                                                              • Executes dropped EXE
                                                              • Loads dropped DLL
                                                              • System Location Discovery: System Language Discovery
                                                              • Modifies registry class
                                                              PID:2136
                                                            • C:\Program Files (x86)\Microsoft\EdgeUpdate\MicrosoftEdgeUpdate.exe
                                                              "C:\Program Files (x86)\Microsoft\EdgeUpdate\MicrosoftEdgeUpdate.exe" /regserver
                                                              4⤵
                                                              • Executes dropped EXE
                                                              • Loads dropped DLL
                                                              • System Location Discovery: System Language Discovery
                                                              • Modifies registry class
                                                              PID:3492
                                                              • C:\Program Files (x86)\Microsoft\EdgeUpdate\1.3.195.19\MicrosoftEdgeUpdateComRegisterShell64.exe
                                                                "C:\Program Files (x86)\Microsoft\EdgeUpdate\1.3.195.19\MicrosoftEdgeUpdateComRegisterShell64.exe"
                                                                5⤵
                                                                • Executes dropped EXE
                                                                • Loads dropped DLL
                                                                • Modifies registry class
                                                                PID:3184
                                                              • C:\Program Files (x86)\Microsoft\EdgeUpdate\1.3.195.19\MicrosoftEdgeUpdateComRegisterShell64.exe
                                                                "C:\Program Files (x86)\Microsoft\EdgeUpdate\1.3.195.19\MicrosoftEdgeUpdateComRegisterShell64.exe"
                                                                5⤵
                                                                • Executes dropped EXE
                                                                • Loads dropped DLL
                                                                • Modifies registry class
                                                                PID:3808
                                                              • C:\Program Files (x86)\Microsoft\EdgeUpdate\1.3.195.19\MicrosoftEdgeUpdateComRegisterShell64.exe
                                                                "C:\Program Files (x86)\Microsoft\EdgeUpdate\1.3.195.19\MicrosoftEdgeUpdateComRegisterShell64.exe"
                                                                5⤵
                                                                • Executes dropped EXE
                                                                • Loads dropped DLL
                                                                • Modifies registry class
                                                                PID:3720
                                                            • C:\Program Files (x86)\Microsoft\EdgeUpdate\MicrosoftEdgeUpdate.exe
                                                              "C:\Program Files (x86)\Microsoft\EdgeUpdate\MicrosoftEdgeUpdate.exe" /ping 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-PG9zIHBsYXRmb3JtPSJ3aW4iIHZlcnNpb249IjEwLjAuMTkwNDEuMTI4OCIgc3A9IiIgYXJjaD0ieDY0IiBwcm9kdWN0X3R5cGU9IjQ4IiBpc193aXA9IjAiIGlzX2luX2xvY2tkb3duX21vZGU9IjAiLz48b2VtIHByb2R1Y3RfbWFudWZhY3R1cmVyPSIiIHByb2R1Y3RfbmFtZT0iIi8-PGV4cCBldGFnPSImcXVvdDtWUFFvUDFGK2ZxMTV3UnpoMWtQTDRQTXBXaDhPUk1CNWl6dnJPQy9jaGpRPSZxdW90OyIvPjxhcHAgYXBwaWQ9IntGM0M0RkUwMC1FRkQ1LTQwM0ItOTU2OS0zOThBMjBGMUJBNEF9IiB2ZXJzaW9uPSIxLjMuMTk1LjE1IiBuZXh0dmVyc2lvbj0iMS4zLjE5NS4xOSIgbGFuZz0iIiBicmFuZD0iIiBjbGllbnQ9IiI-PGV2ZW50IGV2ZW50dHlwZT0iMiIgZXZlbnRyZXN1bHQ9IjEiIGVycm9yY29kZT0iMCIgZXh0cmFjb2RlMT0iMCIgc3lzdGVtX3VwdGltZV90aWNrcz0iMTAwMDc4MjQ5NDQiIGluc3RhbGxfdGltZV9tcz0iNjM0Ii8-PC9hcHA-PC9yZXF1ZXN0Pg
                                                              4⤵
                                                              • Executes dropped EXE
                                                              • Loads dropped DLL
                                                              • Checks system information in the registry
                                                              • System Location Discovery: System Language Discovery
                                                              • System Network Configuration Discovery: Internet Connection Discovery
                                                              PID:696
                                                            • C:\Program Files (x86)\Microsoft\EdgeUpdate\MicrosoftEdgeUpdate.exe
                                                              "C:\Program Files (x86)\Microsoft\EdgeUpdate\MicrosoftEdgeUpdate.exe" /handoff "appguid={F3017226-FE2A-4295-8BDF-00C3A9A7E4C5}&appname=Microsoft%20Edge%20WebView2%20Runtime&needsadmin=Prefers" /installsource offline /sessionid "{0BA7799D-24B5-472E-A8FE-AE6B6D4AA56F}" /offlinedir "{4B1E9932-FFF3-40AE-BAEF-65DD3A0F9203}"
                                                              4⤵
                                                              • Executes dropped EXE
                                                              • Loads dropped DLL
                                                              • System Location Discovery: System Language Discovery
                                                              PID:804
                                                      • C:\Windows\System32\CompPkgSrv.exe
                                                        C:\Windows\System32\CompPkgSrv.exe -Embedding
                                                        1⤵
                                                          PID:3508
                                                        • C:\Windows\System32\CompPkgSrv.exe
                                                          C:\Windows\System32\CompPkgSrv.exe -Embedding
                                                          1⤵
                                                            PID:1804
                                                          • C:\Program Files (x86)\Microsoft\EdgeUpdate\MicrosoftEdgeUpdate.exe
                                                            "C:\Program Files (x86)\Microsoft\EdgeUpdate\MicrosoftEdgeUpdate.exe" /svc
                                                            1⤵
                                                            • Executes dropped EXE
                                                            • Loads dropped DLL
                                                            • Checks system information in the registry
                                                            • System Location Discovery: System Language Discovery
                                                            PID:4516
                                                            • C:\Program Files (x86)\Microsoft\EdgeUpdate\MicrosoftEdgeUpdate.exe
                                                              "C:\Program Files (x86)\Microsoft\EdgeUpdate\MicrosoftEdgeUpdate.exe" /ping PD94bWwgdmVyc2lvbj0iMS4wIiBlbmNvZGluZz0iVVRGLTgiPz48cmVxdWVzdCBwcm90b2NvbD0iMy4wIiB1cGRhdGVyPSJPbWFoYSIgdXBkYXRlcnZlcnNpb249IjEuMy4xOTUuMTkiIHNoZWxsX3ZlcnNpb249IjEuMy4xOTUuMTkiIGlzbWFjaGluZT0iMSIgc2Vzc2lvbmlkPSJ7MEJBNzc5OUQtMjRCNS00NzJFLUE4RkUtQUU2QjZENEFBNTZGfSIgdXNlcmlkPSJ7MTUzNkQyNjYtMjZGNi00QzNFLTgyQkEtNTRGMDhCRDY5REU4fSIgaW5zdGFsbHNvdXJjZT0ibGltaXRlZCIgcmVxdWVzdGlkPSJ7MkI5MUQ4MzAtMDVBOC00M0IzLTk3RjUtRDU3Q0E2NjY1QzFEfSIgZGVkdXA9ImNyIiBkb21haW5qb2luZWQ9IjAiPjxodyBsb2dpY2FsX2NwdXM9IjgiIHBoeXNtZW1vcnk9IjgiIGRpc2tfdHlwZT0iMiIgc3NlPSIxIiBzc2UyPSIxIiBzc2UzPSIxIiBzc3NlMz0iMSIgc3NlNDE9IjEiIHNzZTQyPSIxIiBhdng9IjEiLz48b3MgcGxhdGZvcm09IndpbiIgdmVyc2lvbj0iMTAuMC4xOTA0MS4xMjg4IiBzcD0iIiBhcmNoPSJ4NjQiIHByb2R1Y3RfdHlwZT0iNDgiIGlzX3dpcD0iMCIgaXNfaW5fbG9ja2Rvd25fbW9kZT0iMCIvPjxvZW0gcHJvZHVjdF9tYW51ZmFjdHVyZXI9IiIgcHJvZHVjdF9uYW1lPSIiLz48ZXhwIGV0YWc9IiZxdW90Oy9yMjUycCs2Ylo0b2lURnM1WTF3dCt4c3BlWlgzWUNDNi9MNlo2UEl1ZWM9JnF1b3Q7Ii8-PGFwcCBhcHBpZD0iezhBNjlEMzQ1LUQ1NjQtNDYzYy1BRkYxLUE2OUQ5RTUzMEY5Nn0iIHZlcnNpb249IjEyMy4wLjYzMTIuMTIzIiBuZXh0dmVyc2lvbj0iIiBsYW5nPSJlbiIgYnJhbmQ9IkdHTFMiIGNsaWVudD0iIiBpbnN0YWxsYWdlPSI1MCIgaW5zdGFsbGRhdGV0aW1lPSIxNzIyNjAyNjk4IiBvb2JlX2luc3RhbGxfdGltZT0iMTMzNjcwNzUyNzEzNTI3MDQxIj48ZXZlbnQgZXZlbnR0eXBlPSIzMSIgZXZlbnRyZXN1bHQ9IjEiIGVycm9yY29kZT0iMCIgZXh0cmFjb2RlMT0iMjExNDMyNSIgc3lzdGVtX3VwdGltZV90aWNrcz0iMTAwMTI3MTU5MjYiLz48L2FwcD48L3JlcXVlc3Q-
                                                              2⤵
                                                              • Executes dropped EXE
                                                              • Loads dropped DLL
                                                              • Checks system information in the registry
                                                              • System Location Discovery: System Language Discovery
                                                              • System Network Configuration Discovery: Internet Connection Discovery
                                                              PID:3152
                                                            • C:\Program Files (x86)\Microsoft\EdgeUpdate\Install\{FCDE8A41-AEA5-47F3-A19B-778861D0A37A}\MicrosoftEdgeWebview_X64_129.0.2792.52.exe
                                                              "C:\Program Files (x86)\Microsoft\EdgeUpdate\Install\{FCDE8A41-AEA5-47F3-A19B-778861D0A37A}\MicrosoftEdgeWebview_X64_129.0.2792.52.exe" --msedgewebview --verbose-logging --do-not-launch-msedge --system-level
                                                              2⤵
                                                              • Executes dropped EXE
                                                              PID:4124
                                                              • C:\Program Files (x86)\Microsoft\EdgeUpdate\Install\{FCDE8A41-AEA5-47F3-A19B-778861D0A37A}\EDGEMITMP_50267.tmp\setup.exe
                                                                "C:\Program Files (x86)\Microsoft\EdgeUpdate\Install\{FCDE8A41-AEA5-47F3-A19B-778861D0A37A}\EDGEMITMP_50267.tmp\setup.exe" --install-archive="C:\Program Files (x86)\Microsoft\EdgeUpdate\Install\{FCDE8A41-AEA5-47F3-A19B-778861D0A37A}\MicrosoftEdgeWebview_X64_129.0.2792.52.exe" --msedgewebview --verbose-logging --do-not-launch-msedge --system-level
                                                                3⤵
                                                                • Checks computer location settings
                                                                • Executes dropped EXE
                                                                • Drops file in Program Files directory
                                                                PID:2400
                                                                • C:\Program Files (x86)\Microsoft\EdgeUpdate\Install\{FCDE8A41-AEA5-47F3-A19B-778861D0A37A}\EDGEMITMP_50267.tmp\setup.exe
                                                                  "C:\Program Files (x86)\Microsoft\EdgeUpdate\Install\{FCDE8A41-AEA5-47F3-A19B-778861D0A37A}\EDGEMITMP_50267.tmp\setup.exe" --type=crashpad-handler /prefetch:4 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Program Files\MsEdgeCrashpad" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=129.0.6668.59 "--annotation=exe=C:\Program Files (x86)\Microsoft\EdgeUpdate\Install\{FCDE8A41-AEA5-47F3-A19B-778861D0A37A}\EDGEMITMP_50267.tmp\setup.exe" --annotation=plat=Win64 --annotation=prod=Edge --annotation=ver=129.0.2792.52 --initial-client-data=0x22c,0x230,0x234,0x208,0x238,0x7ff6c70676f0,0x7ff6c70676fc,0x7ff6c7067708
                                                                  4⤵
                                                                  • Executes dropped EXE
                                                                  • Drops file in Program Files directory
                                                                  PID:996
                                                            • C:\Program Files (x86)\Microsoft\EdgeUpdate\MicrosoftEdgeUpdate.exe
                                                              "C:\Program Files (x86)\Microsoft\EdgeUpdate\MicrosoftEdgeUpdate.exe" /ping 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-PGFwcCBhcHBpZD0ie0YzMDE3MjI2LUZFMkEtNDI5NS04QkRGLTAwQzNBOUE3RTRDNX0iIHZlcnNpb249IiIgbmV4dHZlcnNpb249IjEyOS4wLjI3OTIuNTIiIGxhbmc9IiIgYnJhbmQ9IiIgY2xpZW50PSIiIGV4cGVyaW1lbnRzPSJjb25zZW50PWZhbHNlIiBpbnN0YWxsYWdlPSItMSIgaW5zdGFsbGRhdGU9Ii0xIj48dXBkYXRlY2hlY2svPjxldmVudCBldmVudHR5cGU9IjkiIGV2ZW50cmVzdWx0PSIxIiBlcnJvcmNvZGU9IjAiIGV4dHJhY29kZTE9IjAiIHN5c3RlbV91cHRpbWVfdGlja3M9IjEwMDE2NjIxODE5IiBkb25lX2JlZm9yZV9vb2JlX2NvbXBsZXRlPSIwIi8-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-PGV2ZW50IGV2ZW50dHlwZT0iMiIgZXZlbnRyZXN1bHQ9IjEiIGVycm9yY29kZT0iMCIgZXh0cmFjb2RlMT0iMTk2NzU3IiBzeXN0ZW1fdXB0aW1lX3RpY2tzPSIxMDYzODkxOTU3NCIgZG9uZV9iZWZvcmVfb29iZV9jb21wbGV0ZT0iMCIgZG93bmxvYWRlZD0iMTczOTAyMjgwIiB0b3RhbD0iMTczOTAyMjgwIiBwYWNrYWdlX2NhY2hlX3Jlc3VsdD0iMSIgaW5zdGFsbF90aW1lX21zPSI1OTgzMCIvPjwvYXBwPjwvcmVxdWVzdD4
                                                              2⤵
                                                              • Executes dropped EXE
                                                              • Loads dropped DLL
                                                              • Checks system information in the registry
                                                              • System Location Discovery: System Language Discovery
                                                              • System Network Configuration Discovery: Internet Connection Discovery
                                                              PID:4036
                                                          • C:\Users\Admin\AppData\Local\Temp\Xeno-v1.0.5-x64\Xeno-v1.0.5-x64\Xeno.exe
                                                            "C:\Users\Admin\AppData\Local\Temp\Xeno-v1.0.5-x64\Xeno-v1.0.5-x64\Xeno.exe"
                                                            1⤵
                                                            • Executes dropped EXE
                                                            • Loads dropped DLL
                                                            • Checks whether UAC is enabled
                                                            • Suspicious behavior: EnumeratesProcesses
                                                            PID:3292

                                                          Network

                                                          MITRE ATT&CK Enterprise v15

                                                          Replay Monitor

                                                          Loading Replay Monitor...

                                                          Downloads

                                                          • C:\Program Files (x86)\Microsoft\EdgeCore\129.0.2792.52\Installer\setup.exe

                                                            Filesize

                                                            6.6MB

                                                            MD5

                                                            00bcd9d9dcf8c6376d677caa332c04e3

                                                            SHA1

                                                            0a86d25ce5d84a0371064ff3bb38a6ff6a3a27c0

                                                            SHA256

                                                            08003badaf082b1f7c535b98abaf9f9953004668c5192fba75786e2036d59c14

                                                            SHA512

                                                            fdfaee47cc7b434141a7b860d260d1cb9a130140e4838ba591256a9f93d04bb5ee839da9961fedc2c65d9557b9095a12bfd94573a2af7983c5856051007a835f

                                                          • C:\Program Files (x86)\Microsoft\Temp\EU6D0B.tmp\MicrosoftEdgeUpdate.exe

                                                            Filesize

                                                            201KB

                                                            MD5

                                                            b0d94ffd264b31a419e84a9b027d926b

                                                            SHA1

                                                            4c36217abe4aebe9844256bf6b0354bb2c1ba739

                                                            SHA256

                                                            f471d9ff608fe58da68a49af83a7fd9a3d6bf5a5757d340f7b8224b6cd8bddf6

                                                            SHA512

                                                            d68737f1d87b9aa410d13b494c1817d5391e8f098d1cdf7b672f57713b289268a2d1e532f2fc7fec44339444205affb996e32b23c3162e2a539984be05bb20c4

                                                          • C:\Program Files (x86)\Microsoft\Temp\EU6D0B.tmp\MicrosoftEdgeUpdateCore.exe

                                                            Filesize

                                                            262KB

                                                            MD5

                                                            e468fe744cbaebc00b08578f6c71fbc0

                                                            SHA1

                                                            2ae65aadb9ab82d190bdcb080e00ff9414e3c933

                                                            SHA256

                                                            7c75c35f4222e83088de98ba25595eb76013450fc959d7feefcab592d1c9839f

                                                            SHA512

                                                            184a6f2378463c3ccc0f491f4a12d6cac38b10a916c8525a27acd91f681eb8fb0be956fc4bdb99e5a6c7b76f871069f939c996e93a68ff0a6c305195a6049276

                                                          • C:\Program Files (x86)\Microsoft\Temp\EU6D0B.tmp\msedgeupdate.dll

                                                            Filesize

                                                            2.1MB

                                                            MD5

                                                            b0da0a3975239134c6454035e5c3ed79

                                                            SHA1

                                                            fbea5c89ef828564f3d3640d38b8a9662c5260e6

                                                            SHA256

                                                            c590d1af571d75d85cfe6cb3d1aa0808c702bcefd1b74b93ea423676859fb8ba

                                                            SHA512

                                                            5fbfa431a855d634bcbef4c54e5cc62b6435629305efee11559f66473c427ad0775c09364d37aaa7a4a8a963800886f6547a52ae680a1ff2c4dcc52c87d994bb

                                                          • C:\Program Files (x86)\Microsoft\Temp\EU6D0B.tmp\msedgeupdateres_en.dll

                                                            Filesize

                                                            27KB

                                                            MD5

                                                            be845ba29484bdc95909f5253192c774

                                                            SHA1

                                                            70e17729024ab1e13328ac9821d495de1ac7d752

                                                            SHA256

                                                            28414cd85efe921a07537f8c84c0a98a2a85fdbd5dfa3141e722ed7b433d0a96

                                                            SHA512

                                                            2800ec29ece429151c4cd463c5042492ac24e82b4999a323607d142a6e1a08cb69258190a6722afbbcfb3c9cdc6eebdedf89ee6549e0f420f6fbae3aa0501fd4

                                                          • C:\Program Files\MsEdgeCrashpad\settings.dat

                                                            Filesize

                                                            280B

                                                            MD5

                                                            b0f7dce32308e67ad7002cbbe465a10c

                                                            SHA1

                                                            2e269288b8de08a7c1b177c122886ad191cd9470

                                                            SHA256

                                                            e588c36c6cc2abdfe1092daed3f191c0db2b1c7d920c72a6e85efd6667270cfc

                                                            SHA512

                                                            22f1df5347b22ab79924fecc6789cf7c4d495efd33607bb19e0c3afb152d8f6847cf912370372b9441c357128e15be4590a2f22ce9248cafab43d0857b9a8ed5

                                                          • C:\ProgramData\Microsoft\EdgeUpdate\Log\MicrosoftEdgeUpdate.log

                                                            Filesize

                                                            181KB

                                                            MD5

                                                            a73867c63b7161b91280a338ef64d949

                                                            SHA1

                                                            3612e41596e4a26244c3390d8c8c8edd39b6da64

                                                            SHA256

                                                            8d7f4259fd61664ade1263fd0bc5206028467b457a1244922f4c40981c3fb3fa

                                                            SHA512

                                                            61baafb4eef827b3c10e8b5a1758763c81049c9abe824d10680ef69e68dfbd5d0025c647cbcac5189923e259489562819bf71eafd291c589cc90713292b6b533

                                                          • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\7667521f-cf19-4ebc-bf5f-8e80be88e29c.tmp

                                                            Filesize

                                                            10KB

                                                            MD5

                                                            e84948fe0037f28bd3bd21da93319262

                                                            SHA1

                                                            3a4670eff6b2db8b534d6e48944774bf075780a1

                                                            SHA256

                                                            188f94bded82f63a71d65f107f442cbce37fb1d432243a6f4ab987523cc7c06a

                                                            SHA512

                                                            ed07b8489888c06ace14d238343be5013ec6d3f2d949555a4afdbd2e43e2ce50b3c56b76fe677f1fdb548568a4f8e9bdf7bc91c465c7d7a053ff006f796d6553

                                                          • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad\settings.dat

                                                            Filesize

                                                            152B

                                                            MD5

                                                            847d47008dbea51cb1732d54861ba9c9

                                                            SHA1

                                                            f2099242027dccb88d6f05760b57f7c89d926c0d

                                                            SHA256

                                                            10292fa05d896a2952c1d602a72d761d34bc776b44d6a7df87e49b5b613a8ac1

                                                            SHA512

                                                            bd1526aa1cc1c016d95dfcc53a78b45b09dde4ce67357fc275ab835dbe1bb5b053ca386239f50cde95ad243a9c1bbb12f7505818577589beecc6084f7b94e83f

                                                          • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad\settings.dat

                                                            Filesize

                                                            152B

                                                            MD5

                                                            f9664c896e19205022c094d725f820b6

                                                            SHA1

                                                            f8f1baf648df755ba64b412d512446baf88c0184

                                                            SHA256

                                                            7121d84202a850791c2320385eb59eda4d697310dc51b1fcd4d51264aba2434e

                                                            SHA512

                                                            3fa5d2c68a9e70e4a25eaac2095171d87c741eec2624c314c6a56f4fa390d6319633bf4c48b1a4af7e9a0451f346beced9693da88cfc7bcba8dfe209cbd1b3ae

                                                          • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index

                                                            Filesize

                                                            1KB

                                                            MD5

                                                            ea65bf2c99d1677910def23cf463d833

                                                            SHA1

                                                            03fa6d575ea2f9cff3f6024a1df530ea4e701f71

                                                            SHA256

                                                            5c70ae2de85d498c569aac848cc4ada7f64c1e1db43588a468cc041471076a01

                                                            SHA512

                                                            4d0d097c25bdbdc41501094db807717ef55a2a2fdf330c7aee5acae92d321bbc576dd434a731ddebed27a5254f3fcfa5cc0b86ff3e83db2a48946174ce6c6a98

                                                          • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Network Persistent State

                                                            Filesize

                                                            1KB

                                                            MD5

                                                            3039ac83478651a2acba5a394d04c3bf

                                                            SHA1

                                                            de2dc95d1eb1186f141845bb2cbd8d594f04ba1b

                                                            SHA256

                                                            8e789c966a1e6fd0bdc63e90f5ef2b593d8011044b8fd81fc41ea87e8a91fdfc

                                                            SHA512

                                                            2edaa5946c489dd64ff1fdb200a52d64280096846574b7fe2020bffcaf06669ffacc5a338ca6c73f9e45ea7f834c1969efc4d91a3a0337b7b29981b0c2e297f8

                                                          • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Network Persistent State

                                                            Filesize

                                                            1KB

                                                            MD5

                                                            6132b6ca19c5e8cbb9456f7f4f1367e9

                                                            SHA1

                                                            31ac518190ddd393bdf5a758e818f333535ed0d1

                                                            SHA256

                                                            9acff72cd859a2c2bf32716f345338bbf4f1ecc90560595122c6c3ecf40d34d2

                                                            SHA512

                                                            e4fe3d671166228b3782a6995708110bf45cd3322f488546c04f05791b9341fece014b0f896ac79bda8ce79cbd5955633f90f034b009d6a28f7fb976ba74cd98

                                                          • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Network Persistent State

                                                            Filesize

                                                            1KB

                                                            MD5

                                                            afbd6e03654fa96c765808054513e2aa

                                                            SHA1

                                                            6582265d580b282c737f60dc1917165ab8e37369

                                                            SHA256

                                                            472533854bcf2035e3d2a0cbb0864ae0eabdb74c19029e99cb0df1054f1ab134

                                                            SHA512

                                                            a0ab0cb5125ec4dd366b590c3e0bf9c2b95d89504afad467bf6555c3cff707619c028e28c2b051043990d22bb999ec29f6b689b3a08c773ab3debc58b9ef17e3

                                                          • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Preferences

                                                            Filesize

                                                            5KB

                                                            MD5

                                                            b763c2c51ba48ac6a5d411823e8a55c9

                                                            SHA1

                                                            964b1a255c215d63e7a11fa0bc4fa9b463976375

                                                            SHA256

                                                            42910c0ee613336f31504787c53e32e06bab226c1f66bbe0d88750ca9eafd17a

                                                            SHA512

                                                            129c88248ae638a94081fa4022abe6177407aaf1e00aabdaf4c649e29f0b486f8d4f125b11f4ece27caac0527910d45646141da7161baf4d44fe7bf3adc2e530

                                                          • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Preferences

                                                            Filesize

                                                            6KB

                                                            MD5

                                                            045e7d3da0365a0f5a932e699ff01b90

                                                            SHA1

                                                            068c1e1fe8e33749330227d4b4325099b550f1c4

                                                            SHA256

                                                            c667974191daccb0d1de7ce754fe2c28c2540877ab467263aec43551d5515815

                                                            SHA512

                                                            556446f5e6986974a0b1f17f0e09998a2c8bfceaead52dffee1c830f3b66d164732ce34527596bc97b0e2589f8dcbd37e9d84fefda925cc4f78a9c19e22040a8

                                                          • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Preferences

                                                            Filesize

                                                            7KB

                                                            MD5

                                                            b6ce0eec1a9b2fd8b32a477d0730ed63

                                                            SHA1

                                                            71007941e4d01fce013f5930ca20230a89eddf94

                                                            SHA256

                                                            d3aa2d9531a6df49eb945d3a93d36ff3258823b2c6bd32b23bc5baba561beee5

                                                            SHA512

                                                            b365b49d4b5faca0bb2fa1043deb9ce73956c1c538c1d340c6e537e5321aa04c0c89ab6f8d4d18a43371b302e7fac4fdbf1b8ee469b8c0b5b7f21d467a148a2c

                                                          • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Preferences

                                                            Filesize

                                                            7KB

                                                            MD5

                                                            99b9e357c64799dff0b2c2a5c6a100ec

                                                            SHA1

                                                            194efcdcf13a5d2fcdb6ccd3639931aac39da422

                                                            SHA256

                                                            dfb22f5f2e7481d2418614c20c94ced64482232a2b945dd6402842e5392ef131

                                                            SHA512

                                                            01e72374a276370a388f19d4e53f73d0571685823839fb0af385ee6e88c73bc57962ad214e5d80c1ee68f218d292500770c94bed1db9a06ec83389956a087747

                                                          • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\TransportSecurity

                                                            Filesize

                                                            1KB

                                                            MD5

                                                            553a9772d1c8e4d48923f85216ad258a

                                                            SHA1

                                                            d032dfc753b8df291e1a21170ee352be814ce2a4

                                                            SHA256

                                                            f3fd0e2158872cc180c5f98fe29ee7042605074a4d35a37a66551f0746178db7

                                                            SHA512

                                                            db0afeba106c18b7b215cdc427948fb5cb8a7afab2ca0c30d75daf53a4421fcd6422412304d6d803cbe9974bfa33458c20af4f7eac94862a1f41075debb1826c

                                                          • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\TransportSecurity

                                                            Filesize

                                                            1KB

                                                            MD5

                                                            907f7cee4fc5830365fecf616416c8b7

                                                            SHA1

                                                            63eade358e5be49b7d10b73240d646573cda6674

                                                            SHA256

                                                            82feb84c23ddab1839e175faa5c23887149989359485577b43c754c5e8329f1f

                                                            SHA512

                                                            ad0a6933fbd8fcca1ac4087256fa4efdecb251c65a9fe8ce1c2c298a451d188d68f327aecddeb36042cfa34c9ab377d4534cc42435e7870498f96e96268bf4ea

                                                          • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\TransportSecurity~RFe58be98.TMP

                                                            Filesize

                                                            1KB

                                                            MD5

                                                            b4d775eda63837b58b9aa7d5b1f221d2

                                                            SHA1

                                                            8a00e98103aa59328eef453ef7af6b1508102d46

                                                            SHA256

                                                            bf1c9c9bbdbde5a01a426c1637e41dd9101bfd88254a614848426d0e7f447701

                                                            SHA512

                                                            03cc75756379248e32a5ea6bf8545e5ee6e936659b258377c1a58efe1556784fcd8df0611f486713ccda4d1e01340184a2baa0b0226fa07f3967f41a94de23cb

                                                          • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\data_reduction_proxy_leveldb\CURRENT

                                                            Filesize

                                                            16B

                                                            MD5

                                                            6752a1d65b201c13b62ea44016eb221f

                                                            SHA1

                                                            58ecf154d01a62233ed7fb494ace3c3d4ffce08b

                                                            SHA256

                                                            0861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd

                                                            SHA512

                                                            9cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389

                                                          • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Local State

                                                            Filesize

                                                            11KB

                                                            MD5

                                                            d35b7a882d7894ca57978368bd4c5d16

                                                            SHA1

                                                            69316b41fa9eeb1fc60930866b66860398af0b2d

                                                            SHA256

                                                            ee336276323ecef67f09e05b61c3061ac14f4c38b083249bfc009b26700c9951

                                                            SHA512

                                                            53482cd1072dbd22592c87fcfdd13f5d4de26c7825279a47980dd02b0d8092343f12eb2de78b543ad712daa175cc4e6eee02d6bb64bc3a932c9be0c35de1cde4

                                                          • C:\Users\Admin\AppData\Local\Temp\Xeno-v1.0.5-x64\Xeno-v1.0.5-x64\Microsoft.Web.WebView2.Core.dll

                                                            Filesize

                                                            557KB

                                                            MD5

                                                            b037ca44fd19b8eedb6d5b9de3e48469

                                                            SHA1

                                                            1f328389c62cf673b3de97e1869c139d2543494e

                                                            SHA256

                                                            11e88b2ca921e5c88f64567f11bd83cbc396c10365d40972f3359fcc7965d197

                                                            SHA512

                                                            fa89ab3347fd57486cf3064ad164574f70e2c2b77c382785479bfd5ab50caa0881de3c2763a0932feac2faaf09479ef699a04ba202866dc7e92640246ba9598b

                                                          • C:\Users\Admin\AppData\Local\Temp\Xeno-v1.0.5-x64\Xeno-v1.0.5-x64\Microsoft.Web.WebView2.Wpf.dll

                                                            Filesize

                                                            50KB

                                                            MD5

                                                            4a292c5c2abf1aab91dee8eecafe0ab6

                                                            SHA1

                                                            369e788108e5fb0608a803fa2e5a06690b4464b5

                                                            SHA256

                                                            b628d6133bf57b7482a49aa158e45b078df73ee7d33137ac1336d24ac67ed1b4

                                                            SHA512

                                                            ca22adfff9789730e4c02343e320d80b8466cfc5a15f662cefe376b7ee29dea571004c1c26cd3f50c0d24e646f2b36b53fa86835678f46f335d65eec52431cde

                                                          • C:\Users\Admin\AppData\Local\Temp\Xeno-v1.0.5-x64\Xeno-v1.0.5-x64\Xeno.dll

                                                            Filesize

                                                            920KB

                                                            MD5

                                                            e9fa337f288f9d94abc3be48095c0e5e

                                                            SHA1

                                                            58e1da0f6d65c1964717ac59c61e992a0f8983c4

                                                            SHA256

                                                            a4aca0310fec7f751043230a779d63e055c3fd9b7cde98cac1d5bf127de4cd4b

                                                            SHA512

                                                            aaf70f519480762079856d70590cfce3110a12d8c889fe359b687fb829692ba61c5b22105ab4e51ce42fffe5f7f6aff3ce2aeec192b98133a7076671a1fbaf9d

                                                          • C:\Users\Admin\AppData\Local\Temp\Xeno-v1.0.5-x64\Xeno-v1.0.5-x64\Xeno.exe

                                                            Filesize

                                                            140KB

                                                            MD5

                                                            c46b7e54e4b1e74eb907ed460c632350

                                                            SHA1

                                                            2a45cbb31a1c8808f3cc5e2606b9fe07a6ec0e57

                                                            SHA256

                                                            c79b8c1edf139d35dff7a26fd1ea4ba940133634fdc2e9bc7e5d571a707561e1

                                                            SHA512

                                                            8675f593d0f18e35df70bb8ec82915ca8713a513dda1c3a71ec94735d61e4d0fa770bfa42904ca9533aa89ede95bff4a3ce926efa74ddec91292aa812a5771fb

                                                          • C:\Users\Admin\AppData\Local\Temp\Xeno-v1.0.5-x64\Xeno-v1.0.5-x64\XenoUI.deps.json

                                                            Filesize

                                                            1KB

                                                            MD5

                                                            adf01c1c0a81176297965e424685eec8

                                                            SHA1

                                                            644054c065a3d91a1aaa5a270c34014f0ebc66b3

                                                            SHA256

                                                            a454fb2baacc65f63636ed252ecca0c52f9bf59c561a2646598bb4b0a9cdd1fc

                                                            SHA512

                                                            12f2e2108bec64a03f22b5642a1b5b58ab78ccf47508bd967113e3fd4b44a88bf585c47f152a1aae48fc89725c75f68e7fa01e12a8a82c6b3607326550e7373c

                                                          • C:\Users\Admin\AppData\Local\Temp\Xeno-v1.0.5-x64\Xeno-v1.0.5-x64\XenoUI.dll

                                                            Filesize

                                                            63KB

                                                            MD5

                                                            b6a319a989207745fa7f5337f941893a

                                                            SHA1

                                                            688b121b73605bc37d03a193f8226fba74aa8582

                                                            SHA256

                                                            fa8ceec373f352d960321f2eead2266eb7fe0c79ed6f4f2ca0944e6c5d506641

                                                            SHA512

                                                            79068fa9f8b23a97416a50fa3d26f0bb938ddead3424a99bed442b15e445d64126869a2ea2dfa7bfe7d3c4949c01947b8cc362b434bcffc00e36ac56fe00b483

                                                          • C:\Users\Admin\AppData\Local\Temp\Xeno-v1.0.5-x64\Xeno-v1.0.5-x64\XenoUI.runtimeconfig.json

                                                            Filesize

                                                            458B

                                                            MD5

                                                            07b9a30265ca4e69c7016a1b6e3ffc27

                                                            SHA1

                                                            3a4af82a2695b1423aedd8b60a5c86793c011b02

                                                            SHA256

                                                            c71152bf25e40d647b2440c5b39be157a3d356106be9d5b678ab97bb87b4e782

                                                            SHA512

                                                            efd582f8edcdba5ef48d02eee5f73d83ff35071af99b49e08e0213928568d728d0856e3b903bfcccb9237f786846cf94da83139f99e9bee86287aff2071c3f1c

                                                          • C:\Users\Admin\AppData\Local\Temp\Xeno-v1.0.5-x64\Xeno-v1.0.5-x64\libcrypto-3-x64.dll

                                                            Filesize

                                                            4.5MB

                                                            MD5

                                                            e3e4236c4483dbe1bc5954fd63c965b8

                                                            SHA1

                                                            ae8b364d2e43221466f2aa3f3c9412a713214c53

                                                            SHA256

                                                            923d7641e3655c627b80dfd63bd5e701a26e9b8b6186d56b901a60cb57494901

                                                            SHA512

                                                            7130ee5db3c7570f68b454df138926ac710e9095f1e4ff7d74ef0e329e793d20fe95eb6409730203cc706410c3efd2cf6b1c1eab26a655d29a1f74673cc8abc8

                                                          • C:\Users\Admin\AppData\Local\Temp\Xeno-v1.0.5-x64\Xeno-v1.0.5-x64\libssl-3-x64.dll

                                                            Filesize

                                                            802KB

                                                            MD5

                                                            4e2a30eba5388b0fe1838137a61ac255

                                                            SHA1

                                                            b6563a03f357478632d38f0f5ed28feb2af2ccf8

                                                            SHA256

                                                            ce0c322e48b95a719cd51728471e04197448d9f2ae1d0be0c99a745833dfd3a2

                                                            SHA512

                                                            4480c658eb4e3563f2622ba2a7f1f80a73e1f5aa27753030e1a7a8ca3abf07656067604e8042ca943d9cefc2524c830250dacf08ea7fc45d3bd7fa963b579917

                                                          • C:\Users\Admin\AppData\Local\Temp\Xeno-v1.0.5-x64\Xeno-v1.0.5-x64\runtimes\win-x64\native\WebView2Loader.dll

                                                            Filesize

                                                            161KB

                                                            MD5

                                                            c5f0c46e91f354c58ecec864614157d7

                                                            SHA1

                                                            cb6f85c0b716b4fc3810deb3eb9053beb07e803c

                                                            SHA256

                                                            465a7ddfb3a0da4c3965daf2ad6ac7548513f42329b58aebc337311c10ea0a6f

                                                            SHA512

                                                            287756078aa08130907bd8601b957e9e006cef9f5c6765df25cfaa64ddd0fff7d92ffa11f10a00a4028687f3220efda8c64008dbcf205bedae5da296e3896e91

                                                          • C:\Users\Admin\AppData\Local\Temp\Xeno-v1.0.5-x64\Xeno-v1.0.5-x64\xxhash.dll

                                                            Filesize

                                                            46KB

                                                            MD5

                                                            0e9fecea29b2b3d5ef064e112436e9d1

                                                            SHA1

                                                            69423218652f7837766ce03fe9edeaf751266cc5

                                                            SHA256

                                                            73c84884a2ccde1d10bec0820a6661920e70e4b53fa99ad510acf5ed1b36af97

                                                            SHA512

                                                            bd57bc9b8298faffc091b928537794a50c81d985d60edba7863e2976846cb08fd469c6054ff7ec574df6f0a2aea1fb72ed9cff44fa219e834129876293cd2e93

                                                          • C:\Users\Admin\AppData\Local\Temp\Xeno-v1.0.5-x64\Xeno-v1.0.5-x64\zstd.dll

                                                            Filesize

                                                            638KB

                                                            MD5

                                                            567198a0119e3e2ec94208f1cda7aa28

                                                            SHA1

                                                            350224b13d1cc2f944a4a2bdd951e9ef80be5784

                                                            SHA256

                                                            6c63d08182dede465c95e48a235894e598a61cc24e0ba4556637cc9c1a1e0951

                                                            SHA512

                                                            ed01636af37932dca7aa7709389dba184e16f93aa3be4fe622850df0f791c85111367a10434edf0c986079069a3574e0acdbbac4d9cae9c58fc01f9f034f40ec

                                                          • memory/4592-740-0x0000000074820000-0x0000000074A45000-memory.dmp

                                                            Filesize

                                                            2.1MB

                                                          • memory/4592-739-0x00000000005F0000-0x0000000000625000-memory.dmp

                                                            Filesize

                                                            212KB

                                                          • memory/4592-769-0x0000000074820000-0x0000000074A45000-memory.dmp

                                                            Filesize

                                                            2.1MB

                                                          • memory/4592-779-0x00000000005F0000-0x0000000000625000-memory.dmp

                                                            Filesize

                                                            212KB