Analysis

  • max time kernel
    300s
  • max time network
    284s
  • platform
    windows11-21h2_x64
  • resource
    win11-20240802-en
  • resource tags

    arch:x64arch:x86image:win11-20240802-enlocale:en-usos:windows11-21h2-x64system
  • submitted
    29/09/2024, 20:58

General

  • Target

    Xeno_64229349.exe

  • Size

    395KB

  • MD5

    11150ee70b821abeb9d7e02e8a313d94

  • SHA1

    026dc7aa50581c08bbe071a3e393d93c93aed7aa

  • SHA256

    8a9ad27d2e94af38fce5064f022d18d427a47e7c6763fe15b2aeec3266f7191b

  • SHA512

    7d66b2a53d42970054a45d6554aaa13461437be495f2b15b87acb54debb8c7922a8428c0558ce25c2eec0af4804b41678ac61e227c2c3d40af8f01b6417fb63b

  • SSDEEP

    12288:/v0w1yfdzYloZBTzVBspM2lOHxj+aopCBd:/vzkC4BTJBTXj+aNBd

Malware Config

Signatures

  • Checks for any installed AV software in registry 1 TTPs 8 IoCs
  • Enumerates connected drives 3 TTPs 4 IoCs

    Attempts to read the root path of hard drives other than the default C: drive.

  • Enumerates processes with tasklist 1 TTPs 1 IoCs
  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Drops file in Windows directory 5 IoCs
  • Executes dropped EXE 12 IoCs
  • Loads dropped DLL 64 IoCs
  • Browser Information Discovery 1 TTPs

    Enumerate browser information.

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Reads user/profile data of web browsers 3 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • System Location Discovery: System Language Discovery 1 TTPs 19 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Delays execution with timeout.exe 1 IoCs
  • Enumerates system info in registry 2 TTPs 3 IoCs
  • Modifies data under HKEY_USERS 2 IoCs
  • Modifies registry class 3 IoCs
  • Modifies system certificate store 2 TTPs 8 IoCs
  • NTFS ADS 1 IoCs
  • Opens file in notepad (likely ransom note) 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs
  • Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 4 IoCs
  • Suspicious use of AdjustPrivilegeToken 64 IoCs
  • Suspicious use of FindShellTrayWindow 44 IoCs
  • Suspicious use of SendNotifyMessage 16 IoCs
  • Suspicious use of SetWindowsHookEx 2 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\Xeno_64229349.exe
    "C:\Users\Admin\AppData\Local\Temp\Xeno_64229349.exe"
    1⤵
    • System Location Discovery: System Language Discovery
    • Modifies registry class
    • Suspicious use of WriteProcessMemory
    PID:2760
    • C:\Users\Admin\AppData\Local\setup64229349.exe
      C:\Users\Admin\AppData\Local\setup64229349.exe hhwnd=393430 hreturntoinstaller hextras=id:6799040925c8e05-FR-MpP4Q
      2⤵
      • Checks for any installed AV software in registry
      • Executes dropped EXE
      • Loads dropped DLL
      • System Location Discovery: System Language Discovery
      • Modifies system certificate store
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of SetWindowsHookEx
      • Suspicious use of WriteProcessMemory
      PID:4548
      • C:\Users\Admin\AppData\Local\Temp\ec05d89197b949eb6957b79472e8723d\OfferInstaller.exe
        "C:\Users\Admin\AppData\Local\Temp\ec05d89197b949eb6957b79472e8723d\OfferInstaller.exe"
        3⤵
        • Executes dropped EXE
        • System Location Discovery: System Language Discovery
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        • Suspicious use of WriteProcessMemory
        PID:1448
        • C:\Users\Admin\AppData\Local\Temp\3dpprnxr.umd.exe
          "C:\Users\Admin\AppData\Local\Temp\3dpprnxr.umd.exe" --silent --otd="utm.medium:apb,utm.source:lavasoft,utm.campaign:lavasoftOPTOUT:ES_NA_5cc218580d987a5cb28ead66"
          4⤵
          • Executes dropped EXE
          • System Location Discovery: System Language Discovery
          • Suspicious use of WriteProcessMemory
          PID:1980
          • C:\Users\Admin\AppData\Local\Temp\7zSCB722FC7\setup.exe
            C:\Users\Admin\AppData\Local\Temp\7zSCB722FC7\setup.exe --silent --otd="utm.medium:apb,utm.source:lavasoft,utm.campaign:lavasoftOPTOUT:ES_NA_5cc218580d987a5cb28ead66" --server-tracking-blob=NWMzYjI0YTVmYTVmM2U3ODBjNGRkNGYwMTYwMzI0OTgzMjBkMGM5YmY3Y2I1YzMyMzRlMzMxYjRmMWE5ZTMyZTp7ImNvdW50cnkiOiJHQiIsImluc3RhbGxlcl9uYW1lIjoiT3BlcmFTZXR1cC5leGUiLCJwcm9kdWN0Ijoib3BlcmEiLCJxdWVyeSI6Ii9vcGVyYS9zdGFibGUvd2luZG93cz91dG1fc291cmNlPUxBVkFTT0ZUJnV0bV9tZWRpdW09YXBiJnV0bV9jYW1wYWlnbj1sYXZhc29mdE9QVE9VVCIsInRpbWVzdGFtcCI6IjE3Mjc2NDM1ODcuMjg3NCIsInV0bSI6eyJjYW1wYWlnbiI6ImxhdmFzb2Z0T1BUT1VUIiwibWVkaXVtIjoiYXBiIiwic291cmNlIjoiTEFWQVNPRlQifSwidXVpZCI6IjdhMTMzNTMxLTkyMWMtNDIxMS1iMGFiLWZlZDM3MjllZTQwMiJ9
            5⤵
            • Enumerates connected drives
            • Executes dropped EXE
            • System Location Discovery: System Language Discovery
            • Modifies system certificate store
            • Suspicious use of WriteProcessMemory
            PID:2660
            • C:\Users\Admin\AppData\Local\Temp\7zSCB722FC7\setup.exe
              C:\Users\Admin\AppData\Local\Temp\7zSCB722FC7\setup.exe --type=crashpad-handler /prefetch:4 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Roaming\Opera Software\Opera Stable\Crash Reports" "--crash-count-file=C:\Users\Admin\AppData\Roaming\Opera Software\Opera Stable\crash_count.txt" --url=https://crashstats-collector-2.opera.com/ --annotation=channel=Stable --annotation=plat=Win32 --annotation=prod=OperaDesktop --annotation=ver=114.0.5282.21 --initial-client-data=0x334,0x338,0x33c,0x30c,0x340,0x6e7f69d4,0x6e7f69e0,0x6e7f69ec
              6⤵
              • Executes dropped EXE
              • System Location Discovery: System Language Discovery
              PID:4064
            • C:\Users\Admin\AppData\Local\Temp\.opera\Opera Installer Temp\setup.exe
              "C:\Users\Admin\AppData\Local\Temp\.opera\Opera Installer Temp\setup.exe" --version
              6⤵
              • Executes dropped EXE
              • System Location Discovery: System Language Discovery
              PID:4480
            • C:\Users\Admin\AppData\Local\Temp\7zSCB722FC7\setup.exe
              "C:\Users\Admin\AppData\Local\Temp\7zSCB722FC7\setup.exe" --backend --install --import-browser-data=0 --enable-stats=1 --enable-installer-stats=1 --consent-given=0 --general-interests=0 --general-location=0 --personalized-content=0 --personalized-ads=0 --launchopera=1 --installfolder="C:\Users\Admin\AppData\Local\Programs\Opera" --profile-folder --language=en --singleprofile=0 --copyonly=0 --allusers=0 --setdefaultbrowser=1 --pintotaskbar=1 --pintostartmenu=0 --run-at-startup=1 --show-intro-overlay --server-tracking-data=server_tracking_data --initial-pid=2660 --package-dir-prefix="C:\Users\Admin\AppData\Local\Temp\.opera\Opera Installer Temp\opera_package_20240929205948" --session-guid=000c3d86-868b-46cb-9dc8-cfe5e5441afa --server-tracking-blob=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 --silent --desktopshortcut=1 --wait-for-package --initial-proc-handle=1006000000000000
              6⤵
              • Enumerates connected drives
              • Executes dropped EXE
              • System Location Discovery: System Language Discovery
              • Suspicious use of WriteProcessMemory
              PID:952
              • C:\Users\Admin\AppData\Local\Temp\7zSCB722FC7\setup.exe
                C:\Users\Admin\AppData\Local\Temp\7zSCB722FC7\setup.exe --type=crashpad-handler /prefetch:4 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Roaming\Opera Software\Opera Stable\Crash Reports" "--crash-count-file=C:\Users\Admin\AppData\Roaming\Opera Software\Opera Stable\crash_count.txt" --url=https://crashstats-collector-2.opera.com/ --annotation=channel=Stable --annotation=plat=Win32 --annotation=prod=OperaDesktop --annotation=ver=114.0.5282.21 --initial-client-data=0x330,0x340,0x344,0x30c,0x348,0x6d6569d4,0x6d6569e0,0x6d6569ec
                7⤵
                • Executes dropped EXE
                • System Location Discovery: System Language Discovery
                PID:3048
            • C:\Users\Admin\AppData\Local\Temp\.opera\Opera Installer Temp\opera_package_202409292059481\assistant\Assistant_114.0.5282.21_Setup.exe_sfx.exe
              "C:\Users\Admin\AppData\Local\Temp\.opera\Opera Installer Temp\opera_package_202409292059481\assistant\Assistant_114.0.5282.21_Setup.exe_sfx.exe"
              6⤵
              • Executes dropped EXE
              • System Location Discovery: System Language Discovery
              PID:1864
            • C:\Users\Admin\AppData\Local\Temp\.opera\Opera Installer Temp\opera_package_202409292059481\assistant\assistant_installer.exe
              "C:\Users\Admin\AppData\Local\Temp\.opera\Opera Installer Temp\opera_package_202409292059481\assistant\assistant_installer.exe" --version
              6⤵
              • Executes dropped EXE
              • System Location Discovery: System Language Discovery
              PID:4440
              • C:\Users\Admin\AppData\Local\Temp\.opera\Opera Installer Temp\opera_package_202409292059481\assistant\assistant_installer.exe
                "C:\Users\Admin\AppData\Local\Temp\.opera\Opera Installer Temp\opera_package_202409292059481\assistant\assistant_installer.exe" --type=crashpad-handler /prefetch:4 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Roaming\Opera Software\Opera Stable\Crash Reports" "--crash-count-file=C:\Users\Admin\AppData\Roaming\Opera Software\Opera Stable\crash_count.txt" --url=https://crashstats-collector-2.opera.com/ --annotation=channel=Stable --annotation=plat=Win32 --annotation=prod=OperaDesktop --annotation=ver=114.0.5282.21 --initial-client-data=0x234,0x238,0x23c,0x214,0x240,0xfa17a0,0xfa17ac,0xfa17b8
                7⤵
                • Executes dropped EXE
                • System Location Discovery: System Language Discovery
                PID:4044
      • C:\Windows\SysWOW64\cmd.exe
        C:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\H2OCleanup.bat""
        3⤵
        • System Location Discovery: System Language Discovery
        • Suspicious use of WriteProcessMemory
        PID:3080
        • C:\Windows\SysWOW64\tasklist.exe
          tasklist /FI "PID eq 4548" /fo csv
          4⤵
          • Enumerates processes with tasklist
          • System Location Discovery: System Language Discovery
          PID:4820
        • C:\Windows\SysWOW64\find.exe
          find /I "4548"
          4⤵
          • System Location Discovery: System Language Discovery
          PID:4684
        • C:\Windows\SysWOW64\timeout.exe
          timeout 5
          4⤵
          • System Location Discovery: System Language Discovery
          • Delays execution with timeout.exe
          PID:4792
    • C:\Users\Admin\AppData\Local\setup64229349.exe
      C:\Users\Admin\AppData\Local\setup64229349.exe hready
      2⤵
      • Executes dropped EXE
      • Loads dropped DLL
      • System Location Discovery: System Language Discovery
      PID:672
    • C:\Windows\SysWOW64\NOTEPAD.EXE
      "C:\Windows\system32\NOTEPAD.EXE" C:\Users\Admin\AppData\Local\file.txt
      2⤵
      • System Location Discovery: System Language Discovery
      • Opens file in notepad (likely ransom note)
      PID:4868
  • C:\Program Files\Google\Chrome\Application\chrome.exe
    "C:\Program Files\Google\Chrome\Application\chrome.exe"
    1⤵
    • Drops file in Windows directory
    • Enumerates system info in registry
    • Modifies data under HKEY_USERS
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SendNotifyMessage
    • Suspicious use of WriteProcessMemory
    PID:1528
    • C:\Program Files\Google\Chrome\Application\chrome.exe
      "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:4 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=123.0.6312.123 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffbe58bcc40,0x7ffbe58bcc4c,0x7ffbe58bcc58
      2⤵
        PID:1124
      • C:\Program Files\Google\Chrome\Application\chrome.exe
        "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --no-appcompat-clear --gpu-preferences=WAAAAAAAAADgAAAMAAAAAAAAAAAAAAAAAABgAAEAAAA4AAAAAAAAAAAAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAGAAAAAAAAAAYAAAAAAAAAAgAAAAAAAAACAAAAAAAAAAIAAAAAAAAAA== --field-trial-handle=1672,i,13874107641744142581,17414578731955208522,262144 --variations-seed-version=20240802-050153.822000 --mojo-platform-channel-handle=1884 /prefetch:2
        2⤵
          PID:4268
        • C:\Program Files\Google\Chrome\Application\chrome.exe
          "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --no-appcompat-clear --field-trial-handle=1392,i,13874107641744142581,17414578731955208522,262144 --variations-seed-version=20240802-050153.822000 --mojo-platform-channel-handle=2096 /prefetch:3
          2⤵
            PID:3352
          • C:\Program Files\Google\Chrome\Application\chrome.exe
            "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=service --no-appcompat-clear --field-trial-handle=2184,i,13874107641744142581,17414578731955208522,262144 --variations-seed-version=20240802-050153.822000 --mojo-platform-channel-handle=2200 /prefetch:8
            2⤵
              PID:1944
            • C:\Program Files\Google\Chrome\Application\chrome.exe
              "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --field-trial-handle=3096,i,13874107641744142581,17414578731955208522,262144 --variations-seed-version=20240802-050153.822000 --mojo-platform-channel-handle=3184 /prefetch:1
              2⤵
                PID:4712
              • C:\Program Files\Google\Chrome\Application\chrome.exe
                "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --field-trial-handle=3144,i,13874107641744142581,17414578731955208522,262144 --variations-seed-version=20240802-050153.822000 --mojo-platform-channel-handle=3284 /prefetch:1
                2⤵
                  PID:2888
                • C:\Program Files\Google\Chrome\Application\chrome.exe
                  "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --no-appcompat-clear --field-trial-handle=4444,i,13874107641744142581,17414578731955208522,262144 --variations-seed-version=20240802-050153.822000 --mojo-platform-channel-handle=4432 /prefetch:8
                  2⤵
                    PID:3468
                  • C:\Program Files\Google\Chrome\Application\chrome.exe
                    "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --field-trial-handle=4416,i,13874107641744142581,17414578731955208522,262144 --variations-seed-version=20240802-050153.822000 --mojo-platform-channel-handle=4452 /prefetch:1
                    2⤵
                      PID:4932
                    • C:\Program Files\Google\Chrome\Application\chrome.exe
                      "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --no-appcompat-clear --field-trial-handle=4436,i,13874107641744142581,17414578731955208522,262144 --variations-seed-version=20240802-050153.822000 --mojo-platform-channel-handle=4776 /prefetch:8
                      2⤵
                        PID:3152
                      • C:\Program Files\Google\Chrome\Application\chrome.exe
                        "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --no-appcompat-clear --field-trial-handle=4888,i,13874107641744142581,17414578731955208522,262144 --variations-seed-version=20240802-050153.822000 --mojo-platform-channel-handle=4892 /prefetch:8
                        2⤵
                          PID:4748
                        • C:\Program Files\Google\Chrome\Application\chrome.exe
                          "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --field-trial-handle=3712,i,13874107641744142581,17414578731955208522,262144 --variations-seed-version=20240802-050153.822000 --mojo-platform-channel-handle=4292 /prefetch:1
                          2⤵
                            PID:2832
                          • C:\Program Files\Google\Chrome\Application\chrome.exe
                            "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.ProcessorMetrics --lang=en-US --service-sandbox-type=none --no-appcompat-clear --field-trial-handle=3380,i,13874107641744142581,17414578731955208522,262144 --variations-seed-version=20240802-050153.822000 --mojo-platform-channel-handle=3352 /prefetch:8
                            2⤵
                              PID:3884
                            • C:\Program Files\Google\Chrome\Application\chrome.exe
                              "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=quarantine.mojom.Quarantine --lang=en-US --service-sandbox-type=none --no-appcompat-clear --field-trial-handle=4736,i,13874107641744142581,17414578731955208522,262144 --variations-seed-version=20240802-050153.822000 --mojo-platform-channel-handle=4936 /prefetch:8
                              2⤵
                              • NTFS ADS
                              PID:4480
                            • C:\Program Files\Google\Chrome\Application\chrome.exe
                              "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --no-appcompat-clear --field-trial-handle=4920,i,13874107641744142581,17414578731955208522,262144 --variations-seed-version=20240802-050153.822000 --mojo-platform-channel-handle=3560 /prefetch:8
                              2⤵
                                PID:2428
                              • C:\Program Files\Google\Chrome\Application\chrome.exe
                                "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --no-appcompat-clear --field-trial-handle=4352,i,13874107641744142581,17414578731955208522,262144 --variations-seed-version=20240802-050153.822000 --mojo-platform-channel-handle=4912 /prefetch:8
                                2⤵
                                  PID:2416
                                • C:\Program Files\Google\Chrome\Application\chrome.exe
                                  "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.22000.1 --no-appcompat-clear --gpu-preferences=WAAAAAAAAADoAAAMAAAAAAAAAAAAAAAAAABgAAEAAAA4AAAAAAAAAAAAAACEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAGAAAAAAAAAAYAAAAAAAAAAgAAAAAAAAACAAAAAAAAAAIAAAAAAAAAA== --field-trial-handle=4944,i,13874107641744142581,17414578731955208522,262144 --variations-seed-version=20240802-050153.822000 --mojo-platform-channel-handle=5088 /prefetch:8
                                  2⤵
                                    PID:5920
                                • C:\Program Files\Google\Chrome\Application\123.0.6312.123\elevation_service.exe
                                  "C:\Program Files\Google\Chrome\Application\123.0.6312.123\elevation_service.exe"
                                  1⤵
                                    PID:2240
                                  • C:\Windows\system32\svchost.exe
                                    C:\Windows\system32\svchost.exe -k LocalSystemNetworkRestricted -p -s NgcSvc
                                    1⤵
                                      PID:1948
                                    • C:\Windows\System32\rundll32.exe
                                      C:\Windows\System32\rundll32.exe C:\Windows\System32\shell32.dll,SHCreateLocalServerRunDll {9aa46009-3ce0-458a-a354-715610a075e6} -Embedding
                                      1⤵
                                        PID:3164
                                      • C:\Users\Admin\Downloads\Xeno-v1.0.5-x64\Xeno-v1.0.5-x64\Xeno.exe
                                        "C:\Users\Admin\Downloads\Xeno-v1.0.5-x64\Xeno-v1.0.5-x64\Xeno.exe"
                                        1⤵
                                        • Suspicious behavior: EnumeratesProcesses
                                        PID:3272
                                      • C:\Users\Admin\Downloads\Xeno-v1.0.5-x64\Xeno-v1.0.5-x64\Xeno.exe
                                        "C:\Users\Admin\Downloads\Xeno-v1.0.5-x64\Xeno-v1.0.5-x64\Xeno.exe"
                                        1⤵
                                        • Suspicious behavior: EnumeratesProcesses
                                        PID:2176
                                      • C:\Windows\system32\svchost.exe
                                        C:\Windows\system32\svchost.exe -k LocalService -p -s NPSMSvc
                                        1⤵
                                          PID:2316
                                        • C:\Users\Admin\Downloads\Xeno-v1.0.5-x64\Xeno-v1.0.5-x64\Xeno.exe
                                          "C:\Users\Admin\Downloads\Xeno-v1.0.5-x64\Xeno-v1.0.5-x64\Xeno.exe"
                                          1⤵
                                          • Suspicious behavior: EnumeratesProcesses
                                          PID:1920
                                        • C:\Users\Admin\Downloads\Xeno-v1.0.5-x64\Xeno-v1.0.5-x64\Xeno.exe
                                          "C:\Users\Admin\Downloads\Xeno-v1.0.5-x64\Xeno-v1.0.5-x64\Xeno.exe"
                                          1⤵
                                          • Suspicious behavior: EnumeratesProcesses
                                          PID:1600
                                        • C:\Windows\System32\oobe\UserOOBEBroker.exe
                                          C:\Windows\System32\oobe\UserOOBEBroker.exe -Embedding
                                          1⤵
                                          • Drops file in Windows directory
                                          PID:3900
                                        • C:\Users\Admin\AppData\Local\Microsoft\OneDrive\18.151.0729.0013\FileCoAuth.exe
                                          C:\Users\Admin\AppData\Local\Microsoft\OneDrive\18.151.0729.0013\FileCoAuth.exe -Embedding
                                          1⤵
                                          • System Location Discovery: System Language Discovery
                                          PID:3168
                                        • C:\Windows\system32\OpenWith.exe
                                          C:\Windows\system32\OpenWith.exe -Embedding
                                          1⤵
                                          • Suspicious behavior: GetForegroundWindowSpam
                                          • Suspicious use of SetWindowsHookEx
                                          PID:5364
                                        • C:\Users\Admin\Downloads\Xeno-v1.0.5-x64\Xeno-v1.0.5-x64\Xeno.exe
                                          "C:\Users\Admin\Downloads\Xeno-v1.0.5-x64\Xeno-v1.0.5-x64\Xeno.exe"
                                          1⤵
                                          • Suspicious behavior: EnumeratesProcesses
                                          PID:5448
                                        • C:\Users\Admin\Downloads\Xeno-v1.0.5-x64\Xeno-v1.0.5-x64\Xeno.exe
                                          "C:\Users\Admin\Downloads\Xeno-v1.0.5-x64\Xeno-v1.0.5-x64\Xeno.exe"
                                          1⤵
                                          • Suspicious behavior: EnumeratesProcesses
                                          PID:5624
                                        • C:\Users\Admin\Downloads\Xeno-v1.0.5-x64\Xeno-v1.0.5-x64\Xeno.exe
                                          "C:\Users\Admin\Downloads\Xeno-v1.0.5-x64\Xeno-v1.0.5-x64\Xeno.exe"
                                          1⤵
                                          • Suspicious behavior: EnumeratesProcesses
                                          PID:5864

                                        Network

                                              MITRE ATT&CK Enterprise v15

                                              Replay Monitor

                                              Loading Replay Monitor...

                                              Downloads

                                              • C:\Users\Admin\AppData\Local\Adaware\OfferInstaller.exe_Url_1hem3jux35iv1vzfopbi55gu03hcnxpl\7.14.2.0\user.config

                                                Filesize

                                                798B

                                                MD5

                                                f3da41e2f01ec12a28efa662df2fa963

                                                SHA1

                                                9760227f497132829ec34fffec6184969043bba1

                                                SHA256

                                                a4544f806b5637e45e2e702c7997d0b6a52b805670a72aac518d189c3004d1c2

                                                SHA512

                                                ae4f56f93a2386abe8891ba5ba1cc7de166a28c6a2f3913870bed2926ac43469bbbf0b4b18acf2fce7c7f120056e36b3777aabbdf9715cc12d2159403e392e59

                                              • C:\Users\Admin\AppData\Local\D3DSCache\cb00da9ba77862e\F4EB2D6C-ED2B-4BDD-AD9D-F913287E6768.idx

                                                Filesize

                                                64KB

                                                MD5

                                                b5ad5caaaee00cb8cf445427975ae66c

                                                SHA1

                                                dcde6527290a326e048f9c3a85280d3fa71e1e22

                                                SHA256

                                                b6409b9d55ce242ff022f7a2d86ae8eff873daabf3a0506031712b8baa6197b8

                                                SHA512

                                                92f7fbbcbbea769b1af6dd7e75577be3eb8bb4a4a6f8a9288d6da4014e1ea309ee649a7b089be09ba27866e175ab6f6a912413256d7e13eaf60f6f30e492ce7f

                                              • C:\Users\Admin\AppData\Local\D3DSCache\cb00da9ba77862e\F4EB2D6C-ED2B-4BDD-AD9D-F913287E6768.lock

                                                Filesize

                                                4B

                                                MD5

                                                f49655f856acb8884cc0ace29216f511

                                                SHA1

                                                cb0f1f87ec0455ec349aaa950c600475ac7b7b6b

                                                SHA256

                                                7852fce59c67ddf1d6b8b997eaa1adfac004a9f3a91c37295de9223674011fba

                                                SHA512

                                                599e93d25b174524495ed29653052b3590133096404873318f05fd68f4c9a5c9a3b30574551141fbb73d7329d6be342699a17f3ae84554bab784776dfda2d5f8

                                              • C:\Users\Admin\AppData\Local\D3DSCache\cb00da9ba77862e\F4EB2D6C-ED2B-4BDD-AD9D-F913287E6768.val

                                                Filesize

                                                1008B

                                                MD5

                                                d222b77a61527f2c177b0869e7babc24

                                                SHA1

                                                3f23acb984307a4aeba41ebbb70439c97ad1f268

                                                SHA256

                                                80dc3ffa698e4ff2e916f97983b5eae79470203e91cb684c5ccd4ff1a465d747

                                                SHA512

                                                d17d836ea77aeaff4cd01f9c7523345167a4a6bc62528aac74acde12679f48079d75d159e9cea2e614da50e83c2dcd92c374c899ea6c4fe8e5513d9bf06c01ff

                                              • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\BrowsingTopicsState

                                                Filesize

                                                649B

                                                MD5

                                                610280c3b1cc1bb5c951eb95941389ad

                                                SHA1

                                                0a8f29ceb4e6ea41b96b85a85bebb675fb0c9cb3

                                                SHA256

                                                738548b0811394347a669be6380c61c28f20e3641319f6e8f571e2cf92fa2040

                                                SHA512

                                                679165d37d0155a99e53eef047fcb8e3d98a7376803acea672fae9a06ad963922cdc9462a0264223f9348dbec1c59d95af86dfe13f21ceb2562766022cc61a50

                                              • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Network\Network Persistent State

                                                Filesize

                                                2KB

                                                MD5

                                                66985703532dea672228813fa192e90a

                                                SHA1

                                                7cb213d5e3010bca1f00a8a1c0d5fd00bbb1110a

                                                SHA256

                                                c03b7db887e799204961e91f7e18d28c0f7825b470cf0203cc1f76bd79393fc2

                                                SHA512

                                                d37c9fd768168875e6e9726f9fbe48a5186a7f91e33fd1a61adb7062d92e0b5d1b188504e2841a9d1ea115bc051490c447104764756540f8295d5a31335449fd

                                              • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Network\SCT Auditing Pending Reports

                                                Filesize

                                                2B

                                                MD5

                                                d751713988987e9331980363e24189ce

                                                SHA1

                                                97d170e1550eee4afc0af065b78cda302a97674c

                                                SHA256

                                                4f53cda18c2baa0c0354bb5f9a3ecbe5ed12ab4d8e11ba873c2f11161202b945

                                                SHA512

                                                b25b294cb4deb69ea00a4c3cf3113904801b6015e5956bd019a8570b1fe1d6040e944ef3cdee16d0a46503ca6e659a25f21cf9ceddc13f352a3c98138c15d6af

                                              • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Network\TransportSecurity

                                                Filesize

                                                356B

                                                MD5

                                                b0beccfce77d87c69be783c4d8ad6a8b

                                                SHA1

                                                f9576867f44f2e6552f722e81052aa0a8f909717

                                                SHA256

                                                be9dd40ee9e4a4801e3c35e4e6e0a351bafc969cb704e74ae4e996393b394dbd

                                                SHA512

                                                31a832954cfbd2060f789d66ad6bf4277989b2e8dea4d09f43161512b93c0d0f184c842f448aecbec8cfc8da2a9a98bec6fc259744e81ec0a5c6184d42638907

                                              • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Preferences

                                                Filesize

                                                9KB

                                                MD5

                                                5d7607e0fdcf122faa0f193a5cbc4963

                                                SHA1

                                                59ad4fbc54e1c655de0488c0dd19fe074b538230

                                                SHA256

                                                e00ccae26f89c787342835fb18dce3713f05bb3380c06f9407f864b6bbef62a3

                                                SHA512

                                                aceb8ddf7ee0848751b168b874febf4b252471e1b41ddd00da3e79b3363a62c374e732be3f059d6d551edc980c58e685c7b61eeb220af0444081f04ebd25dae3

                                              • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Preferences

                                                Filesize

                                                9KB

                                                MD5

                                                5d777bc8923c1c7ee4c1d420f25a4a84

                                                SHA1

                                                1464cf9e7233204b54bace293629c4e3f04972fc

                                                SHA256

                                                efdb379791dc8ad08994369fd57625b3483c988e79b978860cad221982e60635

                                                SHA512

                                                54718d4d245f0498ab10878c6d1d03e31a2848233fe69ff37ef2ddad66b6846c753d08ce4b05a633565717462eae6b3a73f0fce2320940f2fd6232940e1e6272

                                              • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Preferences

                                                Filesize

                                                9KB

                                                MD5

                                                11b84e52374a95958cd5c1a953e0c6aa

                                                SHA1

                                                02a8194673afe8f694a1a423c75a8ae967c03110

                                                SHA256

                                                e8b452b02b614292d45dcf22ff9fef8c35eadada18580637d9ece56a1fb89b75

                                                SHA512

                                                8e990bf7d7246d8446b3b20ea31c8d1c656ab71a762970102e6da93d9d9cad1139170474f67cef82113c03ad11f199b2f0161a8498663946a0628b1683a1bf3d

                                              • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Preferences

                                                Filesize

                                                9KB

                                                MD5

                                                1bdf4b9bf3e15c452b76cc5178b407ba

                                                SHA1

                                                7497391d3ec9d61b92049f28d1dad553b356316b

                                                SHA256

                                                d004f099c78cfd24cddeacdb879cf5c84f626d1c95f49e2abf9b18f8e9a7a4ba

                                                SHA512

                                                bc6906de77e3484257bc9436d1f023ab2aef8245134b37cf92c33045c192ca579c810500451966577506f1470a053784d79d8574b12b3dc9e5cf58a454199f4b

                                              • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Preferences

                                                Filesize

                                                9KB

                                                MD5

                                                b008861db219f753c284462531979b77

                                                SHA1

                                                a38ec6cb22e2d57c2ec30bd95a2ab34f9e0509f4

                                                SHA256

                                                1b02000bcefca6a85ca8c1bc161760105ff5bf633c079259d132861f5a4a4b44

                                                SHA512

                                                70e70552286b5ec5ae366cd68e81c0db29b982715fabd9d67bf77a930e07d6865344e6b172ef303d579b7a07111a53bb18f9e7021f77cb1b8e1d73ebbd2758db

                                              • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Preferences

                                                Filesize

                                                9KB

                                                MD5

                                                40ed467e13fb426e394f02848418a121

                                                SHA1

                                                dca7d60f05a536eb0545e5968f673872beadf429

                                                SHA256

                                                48f0830406447acb8d78bd3858235a90761361eccb663e138e08a175a4b39e41

                                                SHA512

                                                c54c4bdaf8fd6eae74dbe8aaa7db7898c8a64fd19e14742d8daaa0d40e256f4adb928f73cdce70f99d8a66980e1f1e4c800e536e2263cf32af5ca2c431738c34

                                              • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Preferences

                                                Filesize

                                                9KB

                                                MD5

                                                69ad600fe0720986a7a7145f0dec2ca3

                                                SHA1

                                                7adefa901b4434398b39e847def46b309545dc41

                                                SHA256

                                                295e0d50bf6074ff46601e06e0229fdc90ec5318aadd769c14752ed04b3e03e0

                                                SHA512

                                                095d778b04dbaa60292138348603ad5b48a08ede5cdd271f52be853f44426132885c5feac40ac15fedb93bad11769185ebd99295864527c542e2eba2cdf7cc82

                                              • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Preferences

                                                Filesize

                                                9KB

                                                MD5

                                                74d3b0fdcbe6e05f6378c23c5eb23e57

                                                SHA1

                                                59348dfbfee9a285704809c7530577eb2b806013

                                                SHA256

                                                ab276599ba4f3f991a7e039b10d3b62d977d2390c4de1f818921efff1b8d8f70

                                                SHA512

                                                4f57eb75f8ddec8d562b916fd90c92e79a8ad0e0ba1bf3e374f929f700f0f4d12b4fc6c261e5325dd107f7da57761bf0ded181f4daa64becadeb31a9b9fd4810

                                              • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Preferences

                                                Filesize

                                                9KB

                                                MD5

                                                db892a1fcc82f80b2066ae86947680d6

                                                SHA1

                                                e21de7164d18471d44e6f1fe787348b02d7706ec

                                                SHA256

                                                fa83db43ee5049eb01010a7c3b43abeca74c210ee2fd211f62facbdb15b68056

                                                SHA512

                                                9a9c383b94c25abe55e34c44a01367340e220343332eca260c8974481a9ba7b4a78f9e112c65297deb24c065af6c439d4774c06915358f046f185258f0c1f8ab

                                              • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Preferences

                                                Filesize

                                                9KB

                                                MD5

                                                e9f244213570e97f3bc8408933abe69b

                                                SHA1

                                                fdd0333b0cf6c45a4768b2e7c029e27c54c5a4e5

                                                SHA256

                                                021d62fe96916e2d25117f09630704c6c8b6353db1beb9e9e3260355e648f338

                                                SHA512

                                                1d312eebc857a13a783c1445506878fea876bb9455736f622f2fbd1a71c1842c538af20abf9cdfc66bb53f7403835f5d5ba1b73948c1d62ef1afc06be8dd8efd

                                              • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Preferences

                                                Filesize

                                                9KB

                                                MD5

                                                d0de5577b4097164df210af073b9b99b

                                                SHA1

                                                cde9055cf92cd1f90b3f711acf57a7106432000d

                                                SHA256

                                                f536b256570be4282e229587ae494add8f85b76be8bbbf1b318ec6f23fbc63ef

                                                SHA512

                                                bbf526d63d0861d8480f1618968b0f23fbbe5d39007eb6ce7531b5265a279a098346a8365dff96d2d49e1ec0a373b89f095a8b1c63210b1dcfd9dbe5f6941567

                                              • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Secure Preferences

                                                Filesize

                                                13KB

                                                MD5

                                                eb82e76c25ddbda0459711b0168c6a4c

                                                SHA1

                                                f30f8227fb2df0ae7b7f2d3fecbd62a101e317a8

                                                SHA256

                                                51a4385b37a3d72965e73f9f71e5e7941159fb0bbf2ffe399d581394f4b65988

                                                SHA512

                                                8d9b9981375f77ca819a1fd720959a0ac511a6be49d38a229933aa079d1205958489783528768385c1f012e4cae25da7015e66aee6777ef92fb6b192eaea170d

                                              • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Local State

                                                Filesize

                                                253KB

                                                MD5

                                                92740801e58b67e73c3f69f3dda10df4

                                                SHA1

                                                ad586ebb01e6cebac4fa55c580222db322e5510d

                                                SHA256

                                                7a8eb771811da9f78f8cee86f7c9ec7db6e86f989b0344552b923d11cdea64aa

                                                SHA512

                                                0dc40f5c5f2a57f523544e8add6950a78f8be21bad242ee8bae8eb982cfc47eb081d9b936adccb282089b332af0110b4203ee4e7ca1830ffde64562fb49884ff

                                              • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Local State

                                                Filesize

                                                214KB

                                                MD5

                                                d17358e579c2e29f104472101026a8ba

                                                SHA1

                                                0e0387cc3fbd45bc61215a367ced326e7a003bcb

                                                SHA256

                                                90651fad678e479e6f937166e6e357f2233dd4036b5fafcaca1bd133111a09da

                                                SHA512

                                                4b00f58bc5822b95db0f0da6a69a03c69a01093605a9f2a68e8fb882b784c1e9bc74308feae977f97a2349199a0ff284eb158da34d0f004e2da71817e5861b84

                                              • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Local State

                                                Filesize

                                                214KB

                                                MD5

                                                8129245dea2f8f32ba0d4d5a8f416844

                                                SHA1

                                                517ec41593940c5108252247697ff1ea72338ef8

                                                SHA256

                                                2acdb37fe769c52de8834d04774a8f66fd0dbcaf6b056aebf99ee8f49f6c8b73

                                                SHA512

                                                b44a44b6f338faa987e98bcb45c506d088b09d745cf140bd00b98d5c6718ac24f65379b3e8adbeb0cd5c87af9e6785f956f278dbb996c7f0f4ef84a8537ab084

                                              • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Local State

                                                Filesize

                                                214KB

                                                MD5

                                                4cb90750a1722f4d2a07c0c2a798b4e2

                                                SHA1

                                                f6ae87931ed43840fde443139ad936639a7ecb6b

                                                SHA256

                                                4fa41d065af90ce7e9eb7f421b731cfa507b107fba4268bcc5057243b033a9df

                                                SHA512

                                                bde93b993f1f3d916122098d775032feac06a2f706b10846b5f4ff856af826f2c7b9fa062f3c643fb7c440ea561986f3a0127b474526b7cf4e30519848ffa985

                                              • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Local State

                                                Filesize

                                                101KB

                                                MD5

                                                01edcce0cea96e2e8f3fa8e8f13d5c58

                                                SHA1

                                                620897ddf75c27186f65bf02b9859e800e027508

                                                SHA256

                                                7230cdf2e5534c1aa5a21815440209e86d5d6d94c092d4637caafc4348fbe647

                                                SHA512

                                                38ee25f3fcae747e9655c53c503fcbf788091d7aa3e06af12313479d8f219abdcbcb08356262f7596ab906a4b6c0c7d891de2d77bfc66f8bc7dc4aaf565366a5

                                              • C:\Users\Admin\AppData\Local\Temp\.opera\Opera Installer Temp\opera_package_202409292059481\additional_file0.tmp

                                                Filesize

                                                2.7MB

                                                MD5

                                                be22df47dd4205f088dc18c1f4a308d3

                                                SHA1

                                                72acfd7d2461817450aabf2cf42874ab6019a1f7

                                                SHA256

                                                0eef85bccb5965037a5708216b3550792e46efdfdb99ac2396967d3de7a5e0c8

                                                SHA512

                                                833fc291aacecd3b2187a8cbd8e5be5b4d8884d86bd869d5e5019d727b94035a46bb56d7e7734403e088c2617506553a71a7184010447d1300d81667b99310c7

                                              • C:\Users\Admin\AppData\Local\Temp\.opera\Opera Installer Temp\setup.exe

                                                Filesize

                                                5.4MB

                                                MD5

                                                c9eaa2458c4d06ec258c79360b418430

                                                SHA1

                                                1452c54b8653f7f8b770a1b0c3a1b1aac045bdc5

                                                SHA256

                                                281460bcc97d91be23ba1e136e26e0a65f6adb759fca1d7ffdee98931aa6b21c

                                                SHA512

                                                bd96d07e1c434859a5242b532fe68fb24f64cd344d87af8a5e386fa3435c3e3ceffe54f79bebb73b178781fcbdf34e374d9b96872d31339a5e0fc4ca95f127e9

                                              • C:\Users\Admin\AppData\Local\Temp\Opera_installer_2409292059477844064.dll

                                                Filesize

                                                4.8MB

                                                MD5

                                                f0cde99844b3289d1eb241f0324a4ac4

                                                SHA1

                                                66f2d0bfb4f9048d35b5b93e9e89e7a03bb3a7f7

                                                SHA256

                                                01e6841403ff084cc38ca19ac3db55954a0c8bc4cfeb55bb1c9c70a4a373c3c2

                                                SHA512

                                                68dfb6fede9fdcecb5296a38a4d11280255db75bde5f5adf8dd68c95d8fd66dbad143d13ad97aebd5511f63656a14edc8b7de01d77902faa68a7fe2af136b97a

                                              • C:\Users\Admin\AppData\Local\Temp\ec05d89197b949eb6957b79472e8723d\GenericSetup.LastScreen.dll

                                                Filesize

                                                57KB

                                                MD5

                                                6e001f8d0ee4f09a6673a9e8168836b6

                                                SHA1

                                                334ad3cf0e4e3c03415a4907b2d6cf7ba4cbcd38

                                                SHA256

                                                6a30f9c604c4012d1d2e1ba075213c378afb1bfcb94276de7995ed7bbf492859

                                                SHA512

                                                0eff2e6d3ad75abf801c2ab48b62bc93ebc5a128d2e03e507e6e5665ff9a2ab58a9d82ca71195073b971f8c473f339baffdd23694084eaaff321331b5faaecf6

                                              • C:\Users\Admin\AppData\Local\Temp\ec05d89197b949eb6957b79472e8723d\GenericSetup.dll

                                                Filesize

                                                117KB

                                                MD5

                                                08112f27dcd8f1d779231a7a3e944cb1

                                                SHA1

                                                39a98a95feb1b6295ad762e22aa47854f57c226f

                                                SHA256

                                                11c6a8470a3f2b2be9b8cafe5f9a0afce7303bfd02ab783a0f0ee09a184649fa

                                                SHA512

                                                afd0c7df58b63c7cfdbedea7169a1617f2ac4bad07347f8ed7757a25ab0719489d93272109b73a1b53e9c5997dedad8da89da7b339d30fc2573ca2f76c630ddb

                                              • C:\Users\Admin\AppData\Local\Temp\ec05d89197b949eb6957b79472e8723d\H2OCommonResources.dll

                                                Filesize

                                                5.7MB

                                                MD5

                                                38cc1b5c2a4c510b8d4930a3821d7e0b

                                                SHA1

                                                f06d1d695012ace0aef7a45e340b70981ca023ba

                                                SHA256

                                                c2ba8645c5c9507d422961ceaeaf422adf6d378c2a7c02199ed760fb37a727f2

                                                SHA512

                                                99170f8094f61109d08a6e7cf25e7fba49160b0009277d10e9f0b9dac6f022e7a52e3d822e9aee3f736c2d285c4c3f62a2e6eb3e70f827ac6e8b867eea77f298

                                              • C:\Users\Admin\AppData\Local\Temp\ec05d89197b949eb6957b79472e8723d\H2ODAL.dll

                                                Filesize

                                                15KB

                                                MD5

                                                422be1a0c08185b107050fcf32f8fa40

                                                SHA1

                                                c8746a8dad7b4bf18380207b0c7c848362567a92

                                                SHA256

                                                723aea78755292d2f4f87ad100a99b37bef951b6b40b62e2e2bbd4df3346d528

                                                SHA512

                                                dff51c890cb395665839070d37170d321dc0800981a42f173c6ea570684460146b4936af9d8567a6089bef3a7802ac4931c14031827689ef345ea384ceb47599

                                              • C:\Users\Admin\AppData\Local\Temp\ec05d89197b949eb6957b79472e8723d\H2OModels.dll

                                                Filesize

                                                75KB

                                                MD5

                                                c06ac6dcfa7780cd781fc9af269e33c0

                                                SHA1

                                                f6b69337b369df50427f6d5968eb75b6283c199d

                                                SHA256

                                                b23b8310265c14d7e530b80defc6d39cdc638c07d07cd2668e387863c463741d

                                                SHA512

                                                ad167ad62913243e97efaeaa7bad38714aba7fc11f48001974d4f9c68615e9bdfb83bf623388008e77d61cee0eaba55ce47ebbb1f378d89067e74a05a11d9fe3

                                              • C:\Users\Admin\AppData\Local\Temp\ec05d89197b949eb6957b79472e8723d\H2OResources.dll

                                                Filesize

                                                19KB

                                                MD5

                                                554c3e1d68c8b5d04ca7a2264ca44e71

                                                SHA1

                                                ef749e325f52179e6875e9b2dd397bee2ca41bb4

                                                SHA256

                                                1eb0795b1928f6b0459199dace5affdc0842b6fba87be53ca108661275df2f3e

                                                SHA512

                                                58ce13c47e0daf99d66af1ea35984344c0bb11ba70fe92bc4ffa4cd6799d6f13bcad652b6883c0e32c6e155e9c1b020319c90da87cb0830f963639d53a51f9c6

                                              • C:\Users\Admin\AppData\Local\Temp\ec05d89197b949eb6957b79472e8723d\H2OServices.dll

                                                Filesize

                                                160KB

                                                MD5

                                                6df226bda27d26ce4523b80dbf57a9ea

                                                SHA1

                                                615f9aba84856026460dc54b581711dad63da469

                                                SHA256

                                                17d737175d50eee97ac1c77db415fe25cc3c7a3871b65b93cc3fad63808a9abc

                                                SHA512

                                                988961d7a95c9883a9a1732d0b5d4443c790c38e342a9e996b072b41d2e8686389f36a249f2232cb58d72f8396c849e9cc52285f35071942bec5c3754b213dd5

                                              • C:\Users\Admin\AppData\Local\Temp\ec05d89197b949eb6957b79472e8723d\H2OUtilities.dll

                                                Filesize

                                                119KB

                                                MD5

                                                9d2c520bfa294a6aa0c5cbc6d87caeec

                                                SHA1

                                                20b390db533153e4bf84f3d17225384b924b391f

                                                SHA256

                                                669c812cb8f09799083014a199b0deee10237c95fb49ee107376b952fee5bd89

                                                SHA512

                                                7e2e569549edb6ddd2b0cb0012386aed1f069e35d1f3045bb57704ef17b97129deb7cde8e23bc49980e908e1a5a90b739f68f36a1d231b1302a5d29b722e7c15

                                              • C:\Users\Admin\AppData\Local\Temp\ec05d89197b949eb6957b79472e8723d\H2OViewModels.dll

                                                Filesize

                                                8KB

                                                MD5

                                                be4c2b0862d2fc399c393fca163094df

                                                SHA1

                                                7c03c84b2871c27fa0f1914825e504a090c2a550

                                                SHA256

                                                c202e4f92b792d34cb6859361aebdbfc8c61cf9e735edfd95e825839920fb88a

                                                SHA512

                                                d9c531687a5051bbfe5050c5088623b3fd5f20b1e53dd4d3ed281c8769c15f45da36620231f6d0d76f8e2aa7de00c2324a4bf35a815cefc70ca97bc4ab253799

                                              • C:\Users\Admin\AppData\Local\Temp\ec05d89197b949eb6957b79472e8723d\HtmlAgilityPack.dll

                                                Filesize

                                                154KB

                                                MD5

                                                17220f65bd242b6a491423d5bb7940c1

                                                SHA1

                                                a33fabf2b788e80f0f7f84524fe3ed9b797be7ad

                                                SHA256

                                                23056f14edb6e0afc70224d65de272a710b5d26e6c3b9fe2dfd022073050c59f

                                                SHA512

                                                bfbe284a2ee7361ada9a9cb192580fd64476e70bc78d14e80ad1266f7722a244d890600cf24bfb83d4914e2434272679ba177ee5f98c709950e43192f05e215e

                                              • C:\Users\Admin\AppData\Local\Temp\ec05d89197b949eb6957b79472e8723d\MyDownloader.Core.dll

                                                Filesize

                                                56KB

                                                MD5

                                                f931e960cc4ed0d2f392376525ff44db

                                                SHA1

                                                1895aaa8f5b8314d8a4c5938d1405775d3837109

                                                SHA256

                                                1c1c5330ea35f518bf85fad69dc2da1a98a4dfeadbf6ac0ba0ac7cc51bbcc870

                                                SHA512

                                                7fa5e582ad1bb094cbbb68b1db301dcf360e180eb58f8d726a112133277ceaa39660c6d4b3248c19a8b5767a4ae09f4597535711d789ca4f9f334a204d87ffe0

                                              • C:\Users\Admin\AppData\Local\Temp\ec05d89197b949eb6957b79472e8723d\MyDownloader.Extension.dll

                                                Filesize

                                                168KB

                                                MD5

                                                28f1996059e79df241388bd9f89cf0b1

                                                SHA1

                                                6ad6f7cde374686a42d9c0fcebadaf00adf21c76

                                                SHA256

                                                c3f8a46e81f16bbfc75de44dc95f0d145213c8af0006bb097950ac4d1562f5ce

                                                SHA512

                                                9654d451cb2f184548649aa04b902f5f6aff300c6f03b9261ee3be5405527b4f23862d8988f9811987da22e386813e844e7c5068fd6421c91551f5b33c625f29

                                              • C:\Users\Admin\AppData\Local\Temp\ec05d89197b949eb6957b79472e8723d\Newtonsoft.Json.dll

                                                Filesize

                                                541KB

                                                MD5

                                                9de86cdf74a30602d6baa7affc8c4a0f

                                                SHA1

                                                9c79b6fbf85b8b87dd781b20fc38ba2ac0664143

                                                SHA256

                                                56032ade45ccf8f4c259a2e57487124cf448a90bca2eeb430da2722d9e109583

                                                SHA512

                                                dca0f6078df789bb8c61ffb095d78f564bfc3223c6795ec88aeb5f132c014c5e3cb1bd8268f1e5dc96d7302c7f3de97e73807f3583cb4a320d7adbe93f432641

                                              • C:\Users\Admin\AppData\Local\Temp\ec05d89197b949eb6957b79472e8723d\Ninject.dll

                                                Filesize

                                                133KB

                                                MD5

                                                8db691813a26e7d0f1db5e2f4d0d05e3

                                                SHA1

                                                7c7a33553dd0b50b78bf0ca6974c77088da253eb

                                                SHA256

                                                3043a65f11ac204e65bca142ff4166d85f1b22078b126b806f1fecb2a315c701

                                                SHA512

                                                d02458180ec6e6eda89b5b0e387510ab2fad80f9ce57b8da548aaf85c34a59c39afaeacd1947bd5eb81bee1f6d612ca57d0b2b756d64098dfc96ca0bf2d9f62f

                                              • C:\Users\Admin\AppData\Local\Temp\ec05d89197b949eb6957b79472e8723d\OfferInstaller.exe

                                                Filesize

                                                26KB

                                                MD5

                                                cef027c3341afbcdb83c72080df7f002

                                                SHA1

                                                e538f1dd4aee8544d888a616a6ebe4aeecaf1661

                                                SHA256

                                                e87db511aa5b8144905cd24d9b425f0d9a7037fface3ca7824b7e23cfddbbbb7

                                                SHA512

                                                71ba423c761064937569922f1d1381bd11d23d1d2ed207fc0fead19e9111c1970f2a69b66e0d8a74497277ffc36e0fc119db146b5fd068f4a6b794dc54c5d4bf

                                              • C:\Users\Admin\AppData\Local\Temp\ec05d89197b949eb6957b79472e8723d\OfferSDK.dll

                                                Filesize

                                                172KB

                                                MD5

                                                b199dcd6824a02522a4d29a69ab65058

                                                SHA1

                                                f9c7f8c5c6543b80fa6f1940402430b37fa8dce4

                                                SHA256

                                                9310a58f26be8bd453cde5ca6aa05042942832711fbdeb5430a2840232bfa5e4

                                                SHA512

                                                1d3e85e13ff24640c76848981ca84bafb32f819a082e390cb06fe13445814f50f8e3fc3a8a8e962aae8867e199c1517d570c07f28d5f7e5f007b2bb6e664ddb1

                                              • C:\Users\Admin\AppData\Local\Temp\ec05d89197b949eb6957b79472e8723d\Resources\OfferPage.html

                                                Filesize

                                                1KB

                                                MD5

                                                9ba0a91b564e22c876e58a8a5921b528

                                                SHA1

                                                8eb23cab5effc0d0df63120a4dbad3cffcac6f1e

                                                SHA256

                                                2ad742b544e72c245f4e9c2e69f989486222477c7eb06e85d28492bd93040941

                                                SHA512

                                                38b5fb0f12887a619facce82779cb66e2592e5922d883b9dc4d5f9d2cb12e0f84324422cd881c948f430575febd510e948a22cd291595e3a0ba0307fce73bec9

                                              • C:\Users\Admin\AppData\Local\Temp\ec05d89197b949eb6957b79472e8723d\Resources\tis\Config.tis

                                                Filesize

                                                291B

                                                MD5

                                                bf5328e51e8ab1211c509b5a65ab9972

                                                SHA1

                                                480dfb920e926d81bce67113576781815fbd1ea4

                                                SHA256

                                                98f22fb45530506548ae320c32ee4939d27017481d2ad0d784aa5516f939545b

                                                SHA512

                                                92bd7895c5ff8c40eecfdc2325ee5d1fb7ed86ce0ef04e8e4a65714fcf5603ea0c87b71afadb473433abb24f040ccabd960fa847b885322ad9771e304b661928

                                              • C:\Users\Admin\AppData\Local\Temp\ec05d89197b949eb6957b79472e8723d\SciterWrapper.dll

                                                Filesize

                                                134KB

                                                MD5

                                                105a9e404f7ac841c46380063cc27f50

                                                SHA1

                                                ec27d9e1c3b546848324096283797a8644516ee3

                                                SHA256

                                                69fe749457218ec9a765f9aac74caf6d4f73084cf5175d3fd1e4f345af8b3b8b

                                                SHA512

                                                6990cbfc90c63962abde4fdaae321386f768be9fcf4d08bccd760d55aba85199f7a3e18bd7abe23c3a8d20ea9807cecaffb4e83237633663a8bb63dd9292d940

                                              • C:\Users\Admin\AppData\Local\Temp\ec05d89197b949eb6957b79472e8723d\ServiceHide.Net.dll

                                                Filesize

                                                101KB

                                                MD5

                                                83d37fb4f754c7f4e41605ec3c8608ea

                                                SHA1

                                                70401de8ce89f809c6e601834d48768c0d65159f

                                                SHA256

                                                56db33c0962b3c34cba5279d2441bc4c12f28b569eadc1b3885dd0951b2c4020

                                                SHA512

                                                f5f3479f485b1829bbfb7eb8087353aee569184f9c506af15c4e28bfe4f73bf2cc220d817f6dfc34b2a7a6f69453f0b71e64b79c4d500ff9a243799f68e88b9f

                                              • C:\Users\Admin\AppData\Local\Temp\ec05d89197b949eb6957b79472e8723d\ServiceHide.dll

                                                Filesize

                                                151KB

                                                MD5

                                                72990c7e32ee6c811ea3d2ea64523234

                                                SHA1

                                                a7fcbf83ec6eefb2235d40f51d0d6172d364b822

                                                SHA256

                                                e77e0b4f2762f76a3eaaadf5a3138a35ec06ece80edc4b3396de7a601f8da1b3

                                                SHA512

                                                2908b8c387d46b6329f027bc1e21a230e5b5c32460f8667db32746bc5f12f86927faa10866961cb2c45f6d594941f6828f9078ae7209a27053f6d11586fd2682

                                              • C:\Users\Admin\AppData\Local\Temp\ec05d89197b949eb6957b79472e8723d\app.ico

                                                Filesize

                                                766B

                                                MD5

                                                4003efa6e7d44e2cbd3d7486e2e0451a

                                                SHA1

                                                a2a9ab4a88cd4732647faa37bbdf726fd885ea1e

                                                SHA256

                                                effd42c5e471ea3792f12538bf7c982a5cda4d25bfbffaf51eed7e09035f4508

                                                SHA512

                                                86e71ca8ca3e62949b44cfbc7ffa61d97b6d709fc38216f937a026fb668fbb1f515bac2f25629181a82e3521dafa576cac959d2b527d9cc9eb395e50d64c1198

                                              • C:\Users\Admin\AppData\Local\Temp\ec05d89197b949eb6957b79472e8723d\msvcp140.dll

                                                Filesize

                                                426KB

                                                MD5

                                                8ff1898897f3f4391803c7253366a87b

                                                SHA1

                                                9bdbeed8f75a892b6b630ef9e634667f4c620fa0

                                                SHA256

                                                51398691feef7ae0a876b523aec47c4a06d9a1ee62f1a0aee27de6d6191c68ad

                                                SHA512

                                                cb071ad55beaa541b5baf1f7d5e145f2c26fbee53e535e8c31b8f2b8df4bf7723f7bef214b670b2c3de57a4a75711dd204a940a2158939ad72f551e32da7ab03

                                              • C:\Users\Admin\AppData\Local\Temp\ec05d89197b949eb6957b79472e8723d\sciter32.dll

                                                Filesize

                                                5.6MB

                                                MD5

                                                b431083586e39d018e19880ad1a5ce8f

                                                SHA1

                                                3bbf957ab534d845d485a8698accc0a40b63cedd

                                                SHA256

                                                b525fdcc32c5a359a7f5738a30eff0c6390734d8a2c987c62e14c619f99d406b

                                                SHA512

                                                7805a3464fcc3ac4ea1258e2412180c52f2af40a79b540348486c830a20c2bbed337bbf5f4a8926b3ef98c63c87747014f5b43c35f7ec4e7a3693b9dbd0ae67b

                                              • C:\Users\Admin\AppData\Local\Temp\ec05d89197b949eb6957b79472e8723d\vcruntime140.dll

                                                Filesize

                                                74KB

                                                MD5

                                                1a84957b6e681fca057160cd04e26b27

                                                SHA1

                                                8d7e4c98d1ec858db26a3540baaaa9bbf96b5bfe

                                                SHA256

                                                9faeaa45e8cc986af56f28350b38238b03c01c355e9564b849604b8d690919c5

                                                SHA512

                                                5f54c9e87f2510c56f3cf2ceeb5b5ad7711abd9f85a1ff84e74dd82d15181505e7e5428eae6ff823f1190964eb0a82a569273a4562ec4131cecfa00a9d0d02aa

                                              • C:\Users\Admin\AppData\Local\setup64229349.exe

                                                Filesize

                                                3.8MB

                                                MD5

                                                29d3a70cec060614e1691e64162a6c1e

                                                SHA1

                                                ce4daf2b1d39a1a881635b393450e435bfb7f7d1

                                                SHA256

                                                cc70b093a19610e9752794d757aec9ef07ca862ea9267ec6f9cc92b2aa882c72

                                                SHA512

                                                69d07437714259536373872e8b086fc4548f586e389f67e50f56d343e980546f92b8a13f28c853fc1daf187261087a9dceb33769ba2031c42382742d86c60e4b

                                              • memory/1448-304-0x00000000064B0000-0x00000000064BA000-memory.dmp

                                                Filesize

                                                40KB

                                              • memory/1448-295-0x00000000000E0000-0x00000000000EC000-memory.dmp

                                                Filesize

                                                48KB

                                              • memory/4548-65-0x0000000005C20000-0x0000000005C48000-memory.dmp

                                                Filesize

                                                160KB

                                              • memory/4548-199-0x00000000085D0000-0x0000000008B84000-memory.dmp

                                                Filesize

                                                5.7MB

                                              • memory/4548-183-0x0000000006F90000-0x0000000006FB2000-memory.dmp

                                                Filesize

                                                136KB

                                              • memory/4548-156-0x00000000064B0000-0x00000000064C2000-memory.dmp

                                                Filesize

                                                72KB

                                              • memory/4548-193-0x0000000007A60000-0x0000000008006000-memory.dmp

                                                Filesize

                                                5.6MB

                                              • memory/4548-140-0x0000000005DD0000-0x0000000005DED000-memory.dmp

                                                Filesize

                                                116KB

                                              • memory/4548-182-0x0000000006B30000-0x0000000006B3A000-memory.dmp

                                                Filesize

                                                40KB

                                              • memory/4548-57-0x0000000005BF0000-0x0000000005C14000-memory.dmp

                                                Filesize

                                                144KB

                                              • memory/4548-298-0x00000000729D0000-0x0000000073181000-memory.dmp

                                                Filesize

                                                7.7MB

                                              • memory/4548-98-0x0000000005CF0000-0x0000000005D0A000-memory.dmp

                                                Filesize

                                                104KB

                                              • memory/4548-106-0x0000000005DA0000-0x0000000005DC4000-memory.dmp

                                                Filesize

                                                144KB

                                              • memory/4548-122-0x0000000005DF0000-0x0000000005DF8000-memory.dmp

                                                Filesize

                                                32KB

                                              • memory/4548-130-0x0000000005E40000-0x0000000005E6C000-memory.dmp

                                                Filesize

                                                176KB

                                              • memory/4548-177-0x0000000006BB0000-0x0000000006C3C000-memory.dmp

                                                Filesize

                                                560KB

                                              • memory/4548-114-0x0000000005D20000-0x0000000005D2A000-memory.dmp

                                                Filesize

                                                40KB

                                              • memory/4548-184-0x0000000006FC0000-0x0000000007317000-memory.dmp

                                                Filesize

                                                3.3MB

                                              • memory/4548-90-0x0000000005D30000-0x0000000005D62000-memory.dmp

                                                Filesize

                                                200KB

                                              • memory/4548-74-0x0000000005C50000-0x0000000005C7E000-memory.dmp

                                                Filesize

                                                184KB

                                              • memory/4548-190-0x0000000007480000-0x000000000748C000-memory.dmp

                                                Filesize

                                                48KB

                                              • memory/4548-82-0x0000000005CC0000-0x0000000005CE8000-memory.dmp

                                                Filesize

                                                160KB

                                              • memory/4548-278-0x00000000729D0000-0x0000000073181000-memory.dmp

                                                Filesize

                                                7.7MB

                                              • memory/4548-70-0x00000000729D0000-0x0000000073181000-memory.dmp

                                                Filesize

                                                7.7MB

                                              • memory/4548-49-0x0000000005BA0000-0x0000000005BB4000-memory.dmp

                                                Filesize

                                                80KB

                                              • memory/4548-267-0x00000000729DE000-0x00000000729DF000-memory.dmp

                                                Filesize

                                                4KB

                                              • memory/4548-227-0x0000000008CC0000-0x0000000008CEE000-memory.dmp

                                                Filesize

                                                184KB

                                              • memory/4548-210-0x00000000076D0000-0x0000000007762000-memory.dmp

                                                Filesize

                                                584KB

                                              • memory/4548-30-0x0000000000D60000-0x0000000001138000-memory.dmp

                                                Filesize

                                                3.8MB

                                              • memory/4548-29-0x00000000729DE000-0x00000000729DF000-memory.dmp

                                                Filesize

                                                4KB