Analysis
-
max time kernel
429s -
max time network
430s -
platform
windows11-21h2_x64 -
resource
win11-20241007-en -
resource tags
arch:x64arch:x86image:win11-20241007-enlocale:en-usos:windows11-21h2-x64system -
submitted
03/12/2024, 16:21
Static task
static1
Behavioral task
behavioral1
Sample
Xeno-v1.0.9-x64-New.zip
Resource
win11-20241007-en
General
-
Target
Xeno-v1.0.9-x64-New.zip
-
Size
7.1MB
-
MD5
b32e1b06f1a530bdfd3c43abde00df1e
-
SHA1
5f25d1ce95c71963b67708e13739b8e3ebd65d9b
-
SHA256
d4494d6239ab355a31308234f5c4508c6b31cb2e89e0636101de41bd60d544fb
-
SHA512
5f249c82222bcf8ce8b3e65720c2aa362c8ab6ff53c4aa5e1193a9f48ad628a7edf18f4756f3091f8b0ba0498dd0ef82fe0fe787c5e31a404679b8bea1171e93
-
SSDEEP
196608:gCoNYe5eqB3aM//Cwj0lY8MT0iSi1WhLObay4VhF0:1oNY8TB3//CwIlY8MIiSi1WpvvhF0
Malware Config
Signatures
-
Downloads MZ/PE file
-
Event Triggered Execution: Image File Execution Options Injection 1 TTPs 2 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\MicrosoftEdgeUpdate.exe MicrosoftEdgeUpdate.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\MicrosoftEdgeUpdate.exe\DisableExceptionChainValidation = "0" MicrosoftEdgeUpdate.exe -
Event Triggered Execution: Component Object Model Hijacking 1 TTPs
Adversaries may establish persistence by executing malicious content triggered by hijacked references to Component Object Model (COM) objects.
-
Executes dropped EXE 29 IoCs
pid Process 1868 RobloxPlayerInstaller.exe 416 MicrosoftEdgeWebview2Setup.exe 3076 MicrosoftEdgeUpdate.exe 2280 MicrosoftEdgeUpdate.exe 1120 MicrosoftEdgeUpdate.exe 468 MicrosoftEdgeUpdateComRegisterShell64.exe 2208 MicrosoftEdgeUpdateComRegisterShell64.exe 2656 MicrosoftEdgeUpdateComRegisterShell64.exe 492 MicrosoftEdgeUpdate.exe 4280 MicrosoftEdgeUpdate.exe 4656 MicrosoftEdgeUpdate.exe 3444 MicrosoftEdgeUpdate.exe 3316 MicrosoftEdge_X64_131.0.2903.70.exe 3428 setup.exe 3208 setup.exe 4296 MicrosoftEdgeUpdate.exe 1008 RobloxPlayerBeta.exe 4036 VC_redist.x64.exe 1296 VC_redist.x64.exe 1440 VC_redist.x64.exe 4312 RobloxPlayerBeta.exe 1780 RobloxPlayerBeta.exe 2372 Xeno.exe 2808 msedgewebview2.exe 2796 msedgewebview2.exe 4904 msedgewebview2.exe 1120 msedgewebview2.exe 4296 msedgewebview2.exe 1844 msedgewebview2.exe -
Loads dropped DLL 53 IoCs
pid Process 3076 MicrosoftEdgeUpdate.exe 2280 MicrosoftEdgeUpdate.exe 1120 MicrosoftEdgeUpdate.exe 468 MicrosoftEdgeUpdateComRegisterShell64.exe 1120 MicrosoftEdgeUpdate.exe 2208 MicrosoftEdgeUpdateComRegisterShell64.exe 1120 MicrosoftEdgeUpdate.exe 2656 MicrosoftEdgeUpdateComRegisterShell64.exe 1120 MicrosoftEdgeUpdate.exe 492 MicrosoftEdgeUpdate.exe 4280 MicrosoftEdgeUpdate.exe 4656 MicrosoftEdgeUpdate.exe 4656 MicrosoftEdgeUpdate.exe 4280 MicrosoftEdgeUpdate.exe 3444 MicrosoftEdgeUpdate.exe 4296 MicrosoftEdgeUpdate.exe 1008 RobloxPlayerBeta.exe 1296 VC_redist.x64.exe 8 VC_redist.x64.exe 4312 RobloxPlayerBeta.exe 1780 RobloxPlayerBeta.exe 2372 Xeno.exe 2372 Xeno.exe 2372 Xeno.exe 2372 Xeno.exe 2372 Xeno.exe 2372 Xeno.exe 2372 Xeno.exe 2372 Xeno.exe 2372 Xeno.exe 2372 Xeno.exe 2372 Xeno.exe 2372 Xeno.exe 2372 Xeno.exe 2808 msedgewebview2.exe 2796 msedgewebview2.exe 2808 msedgewebview2.exe 2808 msedgewebview2.exe 2808 msedgewebview2.exe 4904 msedgewebview2.exe 4904 msedgewebview2.exe 1120 msedgewebview2.exe 4296 msedgewebview2.exe 1844 msedgewebview2.exe 1120 msedgewebview2.exe 1844 msedgewebview2.exe 4904 msedgewebview2.exe 4904 msedgewebview2.exe 4904 msedgewebview2.exe 1844 msedgewebview2.exe 4296 msedgewebview2.exe 4904 msedgewebview2.exe 2808 msedgewebview2.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\{804e7d66-ccc2-4c12-84ba-476da31d103d} = "\"C:\\ProgramData\\Package Cache\\{804e7d66-ccc2-4c12-84ba-476da31d103d}\\VC_redist.x64.exe\" /burn.runonce" VC_redist.x64.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
description ioc Process Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA RobloxPlayerInstaller.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA Xeno.exe -
Enumerates connected drives 3 TTPs 23 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
description ioc Process File opened (read-only) \??\A: msiexec.exe File opened (read-only) \??\E: msiexec.exe File opened (read-only) \??\H: msiexec.exe File opened (read-only) \??\I: msiexec.exe File opened (read-only) \??\N: msiexec.exe File opened (read-only) \??\Y: msiexec.exe File opened (read-only) \??\Z: msiexec.exe File opened (read-only) \??\X: msiexec.exe File opened (read-only) \??\L: msiexec.exe File opened (read-only) \??\P: msiexec.exe File opened (read-only) \??\Q: msiexec.exe File opened (read-only) \??\R: msiexec.exe File opened (read-only) \??\T: msiexec.exe File opened (read-only) \??\U: msiexec.exe File opened (read-only) \??\V: msiexec.exe File opened (read-only) \??\B: msiexec.exe File opened (read-only) \??\J: msiexec.exe File opened (read-only) \??\O: msiexec.exe File opened (read-only) \??\G: msiexec.exe File opened (read-only) \??\K: msiexec.exe File opened (read-only) \??\M: msiexec.exe File opened (read-only) \??\S: msiexec.exe File opened (read-only) \??\W: msiexec.exe -
Legitimate hosting services abused for malware hosting/C2 1 TTPs 5 IoCs
flow ioc 176 raw.githubusercontent.com 44 raw.githubusercontent.com 171 raw.githubusercontent.com 172 raw.githubusercontent.com 173 raw.githubusercontent.com -
Checks system information in the registry 2 TTPs 12 IoCs
System information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\SystemInformation\SystemProductName MicrosoftEdgeUpdate.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\SystemInformation\SystemManufacturer msedgewebview2.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\SystemInformation\SystemManufacturer MicrosoftEdgeUpdate.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\SystemInformation\SystemManufacturer MicrosoftEdgeUpdate.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\SystemInformation\SystemProductName MicrosoftEdgeUpdate.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\SystemInformation\SystemManufacturer MicrosoftEdgeUpdate.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\SystemInformation\SystemManufacturer MicrosoftEdgeUpdate.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\SystemInformation\SystemProductName MicrosoftEdgeUpdate.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\SystemInformation\SystemManufacturer MicrosoftEdgeUpdate.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\SystemInformation\SystemProductName MicrosoftEdgeUpdate.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\SystemInformation\SystemProductName MicrosoftEdgeUpdate.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\SystemInformation\SystemProductName msedgewebview2.exe -
Drops file in System32 directory 51 IoCs
description ioc Process File opened for modification C:\Windows\system32\msvcp140_atomic_wait.dll msiexec.exe File created C:\Windows\system32\msvcp140_atomic_wait.dll msiexec.exe File created C:\Windows\system32\vcomp140.dll msiexec.exe File created C:\Windows\system32\mfc140chs.dll msiexec.exe File opened for modification C:\Windows\system32\vccorlib140.dll msiexec.exe File opened for modification C:\Windows\system32\vcamp140.dll msiexec.exe File created C:\Windows\system32\msvcp140.dll msiexec.exe File created C:\Windows\system32\vcruntime140.dll msiexec.exe File opened for modification C:\Windows\system32\mfc140chs.dll msiexec.exe File opened for modification C:\Windows\system32\mfc140cht.dll msiexec.exe File created C:\Windows\system32\mfc140kor.dll msiexec.exe File created C:\Windows\system32\mfc140rus.dll msiexec.exe File opened for modification C:\Windows\system32\msvcp140_2.dll msiexec.exe File created C:\Windows\system32\concrt140.dll msiexec.exe File created C:\Windows\system32\vcamp140.dll msiexec.exe File created C:\Windows\system32\vcruntime140_1.dll msiexec.exe File created C:\Windows\system32\mfc140.dll msiexec.exe File created C:\Windows\system32\mfc140esn.dll msiexec.exe File opened for modification C:\Windows\system32\concrt140.dll msiexec.exe File opened for modification C:\Windows\system32\vcomp140.dll msiexec.exe File created C:\Windows\system32\msvcp140_codecvt_ids.dll msiexec.exe File opened for modification C:\Windows\system32\mfc140enu.dll msiexec.exe File opened for modification C:\Windows\system32\mfc140rus.dll msiexec.exe File created C:\Windows\system32\mfc140deu.dll msiexec.exe File created C:\Windows\system32\mfc140fra.dll msiexec.exe File opened for modification C:\Windows\system32\vcruntime140_1.dll msiexec.exe File created C:\Windows\system32\msvcp140_2.dll msiexec.exe File created C:\Windows\system32\vccorlib140.dll msiexec.exe File opened for modification C:\Windows\system32\mfc140deu.dll msiexec.exe File opened for modification C:\Windows\system32\mfc140fra.dll msiexec.exe File opened for modification C:\Windows\system32\mfc140kor.dll msiexec.exe File opened for modification C:\Windows\system32\msvcp140.dll msiexec.exe File opened for modification C:\Windows\system32\mfc140jpn.dll msiexec.exe File created C:\Windows\system32\mfc140enu.dll msiexec.exe File created C:\Windows\system32\mfcm140.dll msiexec.exe File opened for modification C:\Windows\system32\vcruntime140.dll msiexec.exe File opened for modification C:\Windows\system32\mfc140u.dll msiexec.exe File opened for modification C:\Windows\system32\mfcm140u.dll msiexec.exe File opened for modification C:\Windows\system32\mfc140esn.dll msiexec.exe File opened for modification C:\Windows\system32\mfc140ita.dll msiexec.exe File created C:\Windows\system32\mfc140cht.dll msiexec.exe File created C:\Windows\system32\mfcm140u.dll msiexec.exe File created C:\Windows\system32\mfc140ita.dll msiexec.exe File created C:\Windows\system32\mfc140jpn.dll msiexec.exe File opened for modification C:\Windows\system32\msvcp140_1.dll msiexec.exe File opened for modification C:\Windows\system32\msvcp140_codecvt_ids.dll msiexec.exe File created C:\Windows\system32\msvcp140_1.dll msiexec.exe File created C:\Windows\system32\vcruntime140_threads.dll msiexec.exe File opened for modification C:\Windows\system32\mfc140.dll msiexec.exe File opened for modification C:\Windows\system32\mfcm140.dll msiexec.exe File created C:\Windows\system32\mfc140u.dll msiexec.exe -
Suspicious use of NtCreateThreadExHideFromDebugger 3 IoCs
pid Process 1008 RobloxPlayerBeta.exe 4312 RobloxPlayerBeta.exe 1780 RobloxPlayerBeta.exe -
Suspicious use of NtSetInformationThreadHideFromDebugger 54 IoCs
pid Process 1008 RobloxPlayerBeta.exe 1008 RobloxPlayerBeta.exe 1008 RobloxPlayerBeta.exe 1008 RobloxPlayerBeta.exe 1008 RobloxPlayerBeta.exe 1008 RobloxPlayerBeta.exe 1008 RobloxPlayerBeta.exe 1008 RobloxPlayerBeta.exe 1008 RobloxPlayerBeta.exe 1008 RobloxPlayerBeta.exe 1008 RobloxPlayerBeta.exe 1008 RobloxPlayerBeta.exe 1008 RobloxPlayerBeta.exe 1008 RobloxPlayerBeta.exe 1008 RobloxPlayerBeta.exe 1008 RobloxPlayerBeta.exe 1008 RobloxPlayerBeta.exe 1008 RobloxPlayerBeta.exe 4312 RobloxPlayerBeta.exe 4312 RobloxPlayerBeta.exe 4312 RobloxPlayerBeta.exe 4312 RobloxPlayerBeta.exe 4312 RobloxPlayerBeta.exe 4312 RobloxPlayerBeta.exe 4312 RobloxPlayerBeta.exe 4312 RobloxPlayerBeta.exe 4312 RobloxPlayerBeta.exe 4312 RobloxPlayerBeta.exe 4312 RobloxPlayerBeta.exe 4312 RobloxPlayerBeta.exe 4312 RobloxPlayerBeta.exe 4312 RobloxPlayerBeta.exe 4312 RobloxPlayerBeta.exe 4312 RobloxPlayerBeta.exe 4312 RobloxPlayerBeta.exe 4312 RobloxPlayerBeta.exe 1780 RobloxPlayerBeta.exe 1780 RobloxPlayerBeta.exe 1780 RobloxPlayerBeta.exe 1780 RobloxPlayerBeta.exe 1780 RobloxPlayerBeta.exe 1780 RobloxPlayerBeta.exe 1780 RobloxPlayerBeta.exe 1780 RobloxPlayerBeta.exe 1780 RobloxPlayerBeta.exe 1780 RobloxPlayerBeta.exe 1780 RobloxPlayerBeta.exe 1780 RobloxPlayerBeta.exe 1780 RobloxPlayerBeta.exe 1780 RobloxPlayerBeta.exe 1780 RobloxPlayerBeta.exe 1780 RobloxPlayerBeta.exe 1780 RobloxPlayerBeta.exe 1780 RobloxPlayerBeta.exe -
Drops file in Program Files directory 64 IoCs
description ioc Process File created C:\Program Files (x86)\Roblox\Versions\version-8aa36bbf0eb1494a\content\textures\ui\Controls\xboxLT.png RobloxPlayerInstaller.exe File created C:\Program Files (x86)\Roblox\Versions\version-8aa36bbf0eb1494a\content\textures\ui\Controls\XboxController\[email protected] RobloxPlayerInstaller.exe File created C:\Program Files (x86)\Roblox\Versions\version-8aa36bbf0eb1494a\content\textures\ui\Controls\XboxController\[email protected] RobloxPlayerInstaller.exe File created C:\Program Files (x86)\Microsoft\EdgeCore\131.0.2903.70\Locales\cy.pak setup.exe File created C:\Program Files (x86)\Roblox\Versions\version-8aa36bbf0eb1494a\content\textures\DeveloperFramework\StudioTheme\clear.png RobloxPlayerInstaller.exe File created C:\Program Files (x86)\Roblox\Versions\version-8aa36bbf0eb1494a\content\textures\TerrainTools\mt_erode.png RobloxPlayerInstaller.exe File created C:\Program Files (x86)\Roblox\Versions\version-8aa36bbf0eb1494a\content\textures\ui\Controls\DefaultController\DPadUp.png RobloxPlayerInstaller.exe File created C:\Program Files (x86)\Roblox\Versions\version-8aa36bbf0eb1494a\content\textures\ui\VoiceChat\MicDark\[email protected] RobloxPlayerInstaller.exe File created C:\Program Files (x86)\Roblox\Versions\version-8aa36bbf0eb1494a\content\textures\DeveloperStorybook\Collapse.png RobloxPlayerInstaller.exe File created C:\Program Files (x86)\Roblox\Versions\version-8aa36bbf0eb1494a\content\textures\TerrainEditor\lake.png RobloxPlayerInstaller.exe File created C:\Program Files (x86)\Roblox\Versions\version-8aa36bbf0eb1494a\content\textures\ui\CloseButton.png RobloxPlayerInstaller.exe File created C:\Program Files (x86)\Roblox\Versions\version-8aa36bbf0eb1494a\content\textures\ui\LegacyRbxGui\brickSide.png RobloxPlayerInstaller.exe File created C:\Program Files (x86)\Roblox\Versions\version-8aa36bbf0eb1494a\content\textures\StudioSharedUI\alert_error_withbg.png RobloxPlayerInstaller.exe File created C:\Program Files (x86)\Roblox\Versions\version-8aa36bbf0eb1494a\content\textures\StudioToolbox\Gallery.png RobloxPlayerInstaller.exe File created C:\Program Files (x86)\Microsoft\Temp\EU9754.tmp\msedgeupdateres_bn-IN.dll MicrosoftEdgeWebview2Setup.exe File opened for modification C:\Program Files (x86)\Microsoft\EdgeCore\131.0.2903.70\AdSelectionAttestationsPreloaded\ad-selection-attestations.dat setup.exe File created C:\Program Files (x86)\Roblox\Versions\version-8aa36bbf0eb1494a\content\textures\AnimationEditor\Button_Curve_Darkmode.png RobloxPlayerInstaller.exe File created C:\Program Files (x86)\Roblox\Versions\version-8aa36bbf0eb1494a\ExtraContent\textures\ui\LuaChat\graphic\[email protected] RobloxPlayerInstaller.exe File created C:\Program Files (x86)\Microsoft\EdgeCore\131.0.2903.70\MEIPreload\preloaded_data.pb setup.exe File opened for modification C:\Program Files (x86)\Microsoft\EdgeCore\131.0.2903.70\msedgewebview2.exe setup.exe File created C:\Program Files (x86)\Roblox\Versions\version-8aa36bbf0eb1494a\content\textures\AssetManager\explorer.png RobloxPlayerInstaller.exe File created C:\Program Files (x86)\Roblox\Versions\version-8aa36bbf0eb1494a\content\textures\StudioSharedUI\scripts.png RobloxPlayerInstaller.exe File created C:\Program Files (x86)\Roblox\Versions\version-8aa36bbf0eb1494a\content\textures\ui\Settings\LeaveGame\[email protected] RobloxPlayerInstaller.exe File created C:\Program Files (x86)\Roblox\Versions\version-8aa36bbf0eb1494a\content\textures\ui\VoiceChat\SpeakerLight\[email protected] RobloxPlayerInstaller.exe File created C:\Program Files (x86)\Roblox\Versions\version-8aa36bbf0eb1494a\content\textures\ui\SelectionBox.png RobloxPlayerInstaller.exe File created C:\Program Files (x86)\Roblox\Versions\version-8aa36bbf0eb1494a\content\textures\ui\InGameMenu\[email protected] RobloxPlayerInstaller.exe File created C:\Program Files (x86)\Roblox\Versions\version-8aa36bbf0eb1494a\content\textures\GameSettings\Error.png RobloxPlayerInstaller.exe File created C:\Program Files (x86)\Roblox\Versions\version-8aa36bbf0eb1494a\content\textures\ui\ErrorPrompt\PrimaryButton.png RobloxPlayerInstaller.exe File created C:\Program Files (x86)\Roblox\Versions\version-8aa36bbf0eb1494a\content\textures\ui\VoiceChat\MicLight\Unmuted0.png RobloxPlayerInstaller.exe File created C:\Program Files (x86)\Roblox\Versions\version-8aa36bbf0eb1494a\content\textures\ui\Chat\[email protected] RobloxPlayerInstaller.exe File created C:\Program Files (x86)\Roblox\Versions\version-8aa36bbf0eb1494a\content\textures\ui\VoiceChat\New\[email protected] RobloxPlayerInstaller.exe File created C:\Program Files (x86)\Roblox\Versions\version-8aa36bbf0eb1494a\content\configs\DateTimeLocaleConfigs\de-de.json RobloxPlayerInstaller.exe File created C:\Program Files (x86)\Roblox\Versions\version-8aa36bbf0eb1494a\ExtraContent\textures\ui\LuaApp\graphic\CityBackground.png RobloxPlayerInstaller.exe File created C:\Program Files (x86)\Roblox\Versions\version-8aa36bbf0eb1494a\content\textures\AvatarToolsShared\RoundedBorderRight.png RobloxPlayerInstaller.exe File created C:\Program Files (x86)\Roblox\Versions\version-8aa36bbf0eb1494a\content\textures\StudioSharedUI\ScrollBarBottom.png RobloxPlayerInstaller.exe File created C:\Program Files (x86)\Roblox\Versions\version-8aa36bbf0eb1494a\content\avatar\scripts\CompositorAnimate\v1betaRC1\Animate.rbxm RobloxPlayerInstaller.exe File created C:\Program Files (x86)\Roblox\Versions\version-8aa36bbf0eb1494a\ExtraContent\textures\ui\LuaChat\icons\[email protected] RobloxPlayerInstaller.exe File created C:\Program Files (x86)\Microsoft\EdgeCore\131.0.2903.70\VisualElements\Logo.png setup.exe File opened for modification C:\Program Files (x86)\Microsoft\EdgeCore\131.0.2903.70\Locales\kok.pak setup.exe File created C:\Program Files (x86)\Roblox\Versions\version-8aa36bbf0eb1494a\content\textures\ui\Controls\DefaultController\[email protected] RobloxPlayerInstaller.exe File created C:\Program Files (x86)\Roblox\Versions\version-8aa36bbf0eb1494a\ExtraContent\textures\ui\ImageSet\AE\img_set_2x_5.png RobloxPlayerInstaller.exe File created C:\Program Files (x86)\Roblox\Versions\version-8aa36bbf0eb1494a\ExtraContent\textures\ui\LuaChat\icons\ic-more.png RobloxPlayerInstaller.exe File opened for modification C:\Program Files (x86)\Microsoft\EdgeCore\131.0.2903.70\vk_swiftshader.dll setup.exe File opened for modification C:\Program Files (x86)\Microsoft\EdgeCore\131.0.2903.70\Trust Protection Lists\Sigma\LICENSE setup.exe File created C:\Program Files (x86)\Roblox\Versions\version-8aa36bbf0eb1494a\content\textures\AvatarEditorImages\Catalog_LightTheme.png RobloxPlayerInstaller.exe File created C:\Program Files (x86)\Roblox\Versions\version-8aa36bbf0eb1494a\content\textures\ui\Controls\DefaultController\[email protected] RobloxPlayerInstaller.exe File created C:\Program Files (x86)\Roblox\Versions\version-8aa36bbf0eb1494a\content\textures\ui\Controls\PlayStationController\PS5\[email protected] RobloxPlayerInstaller.exe File created C:\Program Files (x86)\Roblox\Versions\version-8aa36bbf0eb1494a\content\textures\ui\InspectMenu\[email protected] RobloxPlayerInstaller.exe File created C:\Program Files (x86)\Roblox\Versions\version-8aa36bbf0eb1494a\content\textures\ui\Settings\Players\[email protected] RobloxPlayerInstaller.exe File created C:\Program Files (x86)\Roblox\Versions\version-8aa36bbf0eb1494a\content\textures\ui\VoiceChat\Misc\[email protected] RobloxPlayerInstaller.exe File created C:\Program Files (x86)\Roblox\Versions\version-8aa36bbf0eb1494a\api-ms-win-crt-multibyte-l1-1-0.dll RobloxPlayerInstaller.exe File created C:\Program Files (x86)\Roblox\Versions\version-8aa36bbf0eb1494a\content\textures\AssetImport\btn_dark_filepicker_28x28.png RobloxPlayerInstaller.exe File created C:\Program Files (x86)\Roblox\Versions\version-8aa36bbf0eb1494a\content\textures\TextureViewer\replace.png RobloxPlayerInstaller.exe File created C:\Program Files (x86)\Roblox\Versions\version-8aa36bbf0eb1494a\content\textures\ui\scrollbuttonDown_ds.png RobloxPlayerInstaller.exe File created C:\Program Files (x86)\Roblox\Versions\version-8aa36bbf0eb1494a\content\textures\ui\PlayerList\NewFollowing.png RobloxPlayerInstaller.exe File created C:\Program Files (x86)\Roblox\Versions\version-8aa36bbf0eb1494a\content\textures\ui\Settings\Radial\[email protected] RobloxPlayerInstaller.exe File created C:\Program Files (x86)\Roblox\Versions\version-8aa36bbf0eb1494a\content\fonts\Montserrat-Black.ttf RobloxPlayerInstaller.exe File created C:\Program Files (x86)\Roblox\Versions\version-8aa36bbf0eb1494a\ExtraContent\LuaPackages\Packages\_Index\FoundationImages\FoundationImages\SpriteSheets\img_set_1x_6.png RobloxPlayerInstaller.exe File created C:\Program Files (x86)\Roblox\Versions\version-8aa36bbf0eb1494a\content\textures\AnimationEditor\image_keyframe_bounce_unselected.png RobloxPlayerInstaller.exe File created C:\Program Files (x86)\Roblox\Versions\version-8aa36bbf0eb1494a\ExtraContent\places\RhodiumUnitTest.rbxl RobloxPlayerInstaller.exe File opened for modification C:\Program Files (x86)\Microsoft\EdgeCore\131.0.2903.70\identity_proxy\stable.identity_helper.exe.manifest setup.exe File created C:\Program Files (x86)\Roblox\Versions\version-8aa36bbf0eb1494a\content\textures\ui\Controls\DesignSystem\DpadRight.png RobloxPlayerInstaller.exe File created C:\Program Files (x86)\Roblox\Versions\version-8aa36bbf0eb1494a\content\textures\ui\TopBar\chatOn.png RobloxPlayerInstaller.exe File created C:\Program Files (x86)\Roblox\Versions\version-8aa36bbf0eb1494a\content\textures\ui\VoiceChat\MicDark\Unmuted0.png RobloxPlayerInstaller.exe -
Drops file in Windows directory 35 IoCs
description ioc Process File opened for modification C:\Windows\Installer\MSICAD0.tmp msiexec.exe File created C:\Windows\Installer\SourceHash{E1902FC6-C423-4719-AB8A-AC7B2694B367} msiexec.exe File opened for modification C:\Windows\SystemTemp\msedge_installer.log setup.exe File opened for modification C:\Windows\Installer\e5bc408.msi msiexec.exe File created C:\Windows\Installer\e5bc41a.msi msiexec.exe File created C:\Windows\Installer\e5bc41b.msi msiexec.exe File opened for modification C:\Windows\Installer\e5bc41b.msi msiexec.exe File created C:\Windows\SystemTemp\~DF5E27E57BFEA97877.TMP msiexec.exe File created C:\Windows\Installer\e5bc430.msi msiexec.exe File created C:\Windows\SystemTemp\8b192016-97b0-4dc0-b69c-89637302daed.tmp setup.exe File opened for modification C:\Windows\Installer\ msiexec.exe File opened for modification C:\Windows\Installer\MSIC6F6.tmp msiexec.exe File opened for modification C:\Windows\Installer\MSIC7A3.tmp msiexec.exe File created C:\Windows\SystemTemp\~DFFAD1F398C48009F0.TMP msiexec.exe File opened for modification C:\Windows\SystemTemp chrome.exe File opened for modification C:\Windows\SystemTemp\MsEdgeCrashpad\settings.dat setup.exe File created C:\Windows\Installer\e5bc408.msi msiexec.exe File opened for modification C:\Windows\SystemTemp msedgewebview2.exe File opened for modification C:\Windows\SystemTemp\MsEdgeCrashpad\metadata setup.exe File opened for modification C:\Windows\SystemTemp\MsEdgeCrashpad\settings.dat setup.exe File created C:\Windows\Installer\inprogressinstallinfo.ipi msiexec.exe File opened for modification C:\Windows\SystemTemp\MsEdgeCrashpad\throttle_store.dat setup.exe File created C:\Windows\SystemTemp\MsEdgeCrashpad\settings.dat setup.exe File created C:\Windows\SystemTemp\~DFB2296D4419C5D925.TMP msiexec.exe File created C:\Windows\SystemTemp\~DF83DC889582A574C4.TMP msiexec.exe File opened for modification C:\Windows\SystemTemp\MsEdgeCrashpad\throttle_store.dat setup.exe File opened for modification C:\Windows\Microsoft.NET\Framework64\v4.0.30319\ngen.log msiexec.exe File created C:\Windows\SystemTemp\~DFE6D9382CFA40681B.TMP msiexec.exe File created C:\Windows\SystemTemp\~DFF611F8F7B60108CF.TMP msiexec.exe File opened for modification C:\Windows\Installer\MSICCD5.tmp msiexec.exe File created C:\Windows\SystemTemp\~DF6D0BDA8431E848DD.TMP msiexec.exe File created C:\Windows\Installer\SourceHash{382F1166-A409-4C5B-9B1E-85ED538B8291} msiexec.exe File opened for modification C:\Windows\SystemTemp setup.exe File created C:\Windows\SystemTemp\MsEdgeCrashpad\throttle_store.dat setup.exe File created C:\Windows\SystemTemp\~DF221F771B61FDE69B.TMP msiexec.exe -
Subvert Trust Controls: Mark-of-the-Web Bypass 1 TTPs 2 IoCs
When files are downloaded from the Internet, they are tagged with a hidden NTFS Alternate Data Stream (ADS) named Zone.Identifier with a specific value known as the MOTW.
description ioc Process File opened for modification C:\Users\Admin\Downloads\RobloxPlayerInstaller.exe:Zone.Identifier chrome.exe File opened for modification C:\Users\Admin\Downloads\VC_redist.x64.exe:Zone.Identifier chrome.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 16 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language MicrosoftEdgeUpdate.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language MicrosoftEdgeUpdate.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language MicrosoftEdgeUpdate.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language VC_redist.x64.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language MicrosoftEdgeUpdate.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language MicrosoftEdgeWebview2Setup.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language MicrosoftEdgeUpdate.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language VC_redist.x64.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language RobloxPlayerInstaller.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language MicrosoftEdgeUpdate.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language VC_redist.x64.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language VC_redist.x64.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language VC_redist.x64.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language MicrosoftEdgeUpdate.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language VC_redist.x64.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language MicrosoftEdgeUpdate.exe -
System Network Configuration Discovery: Internet Connection Discovery 1 TTPs 3 IoCs
Adversaries may check for Internet connectivity on compromised systems.
pid Process 4296 MicrosoftEdgeUpdate.exe 492 MicrosoftEdgeUpdate.exe 3444 MicrosoftEdgeUpdate.exe -
Checks SCSI registry key(s) 3 TTPs 5 IoCs
SCSI information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_WDC&Prod_WDS100T2B0A\4&215468a5&0&000000\Device Parameters vssvc.exe Key queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_WDC&Prod_WDS100T2B0A\4&215468a5&0&000000\Device Parameters vssvc.exe Key created \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_WDC&Prod_WDS100T2B0A\4&215468a5&0&000000\Device Parameters\Partmgr vssvc.exe Set value (data) \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_WDC&Prod_WDS100T2B0A\4&215468a5&0&000000\Device Parameters\Partmgr\PartitionTableCache = 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 vssvc.exe Set value (data) \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_WDC&Prod_WDS100T2B0A\4&215468a5&0&000000\Device Parameters\Partmgr\SnapshotDataCache = 534e41505041525401000000700000008ec7416a0000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000 vssvc.exe -
Enumerates system info in registry 2 TTPs 8 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer chrome.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS RobloxPlayerInstaller.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\BaseBoardManufacturer RobloxPlayerInstaller.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedgewebview2.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedgewebview2.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedgewebview2.exe -
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Internet Explorer\ProtocolExecute\roblox-player\WarnOnOpen = "0" RobloxPlayerInstaller.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Internet Explorer\ProtocolExecute\roblox RobloxPlayerInstaller.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Internet Explorer\ProtocolExecute\roblox\WarnOnOpen = "0" RobloxPlayerInstaller.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Internet Explorer\ProtocolExecute\roblox-studio RobloxPlayerInstaller.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Internet Explorer\ProtocolExecute\roblox-studio\WarnOnOpen = "0" RobloxPlayerInstaller.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Internet Explorer\ProtocolExecute\roblox-player RobloxPlayerInstaller.exe -
Modifies data under HKEY_USERS 53 IoCs
description ioc Process Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\Disallowed\Certificates MicrosoftEdgeUpdate.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\TrustedPeople\CTLs MicrosoftEdgeUpdate.exe Key created \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\28 msiexec.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\TrustedPeople MicrosoftEdgeUpdate.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\TrustedPeople\CTLs MicrosoftEdgeUpdate.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\trust MicrosoftEdgeUpdate.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\trust MicrosoftEdgeUpdate.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\CA\CTLs MicrosoftEdgeUpdate.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Root\CTLs MicrosoftEdgeUpdate.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\SmartCardRoot MicrosoftEdgeUpdate.exe Key created \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry msedgewebview2.exe Set value (int) \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry\TraceTimeLast = "133777166979916477" chrome.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\WinTrust\Trust Providers\Software Publishing MicrosoftEdgeUpdate.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\CA\Certificates MicrosoftEdgeUpdate.exe Key created \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\27 msiexec.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\CA\CRLs MicrosoftEdgeUpdate.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Disallowed\Certificates MicrosoftEdgeUpdate.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Root\Certificates MicrosoftEdgeUpdate.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Disallowed MicrosoftEdgeUpdate.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\trust\Certificates MicrosoftEdgeUpdate.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\trust\CTLs MicrosoftEdgeUpdate.exe Key deleted \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\26 msiexec.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\CA MicrosoftEdgeUpdate.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\trust\CRLs MicrosoftEdgeUpdate.exe Key deleted \REGISTRY\USER\.DEFAULT\SOFTWARE\CLASSES\LOCAL SETTINGS\MUICACHE\28 msiexec.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\TrustedPeople MicrosoftEdgeUpdate.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Root MicrosoftEdgeUpdate.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\SmartCardRoot\CTLs MicrosoftEdgeUpdate.exe Key created \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry chrome.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\CA\CTLs MicrosoftEdgeUpdate.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\TrustedPeople\CRLs MicrosoftEdgeUpdate.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\trust\CTLs MicrosoftEdgeUpdate.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\Disallowed\CTLs MicrosoftEdgeUpdate.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Root\CRLs MicrosoftEdgeUpdate.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\SmartCardRoot\CRLs MicrosoftEdgeUpdate.exe Key created \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a msiexec.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\CA MicrosoftEdgeUpdate.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\Disallowed\CRLs MicrosoftEdgeUpdate.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\trust\CRLs MicrosoftEdgeUpdate.exe Key created \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\29 msiexec.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Disallowed\CRLs MicrosoftEdgeUpdate.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\TrustedPeople\Certificates MicrosoftEdgeUpdate.exe Key deleted \REGISTRY\USER\.DEFAULT\SOFTWARE\CLASSES\LOCAL SETTINGS\MUICACHE\27 msiexec.exe Key deleted \REGISTRY\USER\.DEFAULT\SOFTWARE\CLASSES\LOCAL SETTINGS\MUICACHE\29 msiexec.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\CA\Certificates MicrosoftEdgeUpdate.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Disallowed\CTLs MicrosoftEdgeUpdate.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\SmartCardRoot\Certificates MicrosoftEdgeUpdate.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\TrustedPeople\CRLs MicrosoftEdgeUpdate.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\trust\Certificates MicrosoftEdgeUpdate.exe Key deleted \REGISTRY\USER\.DEFAULT\SOFTWARE\CLASSES\LOCAL SETTINGS\MUICACHE\26\52C64B7E msiexec.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\CA\CRLs MicrosoftEdgeUpdate.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\Disallowed MicrosoftEdgeUpdate.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\TrustedPeople\Certificates MicrosoftEdgeUpdate.exe -
Modifies registry class 64 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{D9AA3288-4EA7-4E67-AE60-D18EADCB923D}\ProxyStubClsid32\ = "{8B15189E-5465-4166-933D-1EABAD9648CB}" MicrosoftEdgeUpdate.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{DDD4B5D4-FD54-497C-8789-0830F29A60EE}\ = "IGoogleUpdate3" MicrosoftEdgeUpdateComRegisterShell64.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Installer\Dependencies\Microsoft.VS.VC_RuntimeAdditionalVSU_amd64,v14\DisplayName = "Microsoft Visual C++ 2022 X64 Additional Runtime - 14.42.34433" msiexec.exe Key created \REGISTRY\USER\S-1-5-21-3587106988-279496464-3440778474-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\1\0 Xeno.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Installer\Products\6CF2091E324C9174BAA8CAB762493B76\SourceList msiexec.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{C853632E-36CA-4999-B992-EC0D408CF5AB}\NumMethods MicrosoftEdgeUpdateComRegisterShell64.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{60355531-5BFD-45AB-942C-7912628752C7}\ProxyStubClsid32\ = "{8B15189E-5465-4166-933D-1EABAD9648CB}" MicrosoftEdgeUpdateComRegisterShell64.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{2EC826CB-5478-4533-9015-7580B3B5E03A}\ProxyStubClsid32 MicrosoftEdgeUpdateComRegisterShell64.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{2EC826CB-5478-4533-9015-7580B3B5E03A} MicrosoftEdgeUpdateComRegisterShell64.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{837E40DA-EB1B-440C-8623-0F14DF158DC0}\ProxyStubClsid32 MicrosoftEdgeUpdateComRegisterShell64.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{6DFFE7FE-3153-4AF1-95D8-F8FCCA97E56B}\ProxyStubClsid32 MicrosoftEdgeUpdateComRegisterShell64.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{5F6A18BB-6231-424B-8242-19E5BB94F8ED}\VersionIndependentProgID\ = "MicrosoftEdgeUpdate.CredentialDialogMachine" MicrosoftEdgeUpdate.exe Set value (data) \REGISTRY\USER\S-1-5-21-3587106988-279496464-3440778474-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\1\MRUListEx = 00000000ffffffff Xeno.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{FEA2518F-758F-4B95-A59F-97FCEEF1F5D0}\ = "IPolicyStatus" MicrosoftEdgeUpdate.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{C20433B3-0D4B-49F6-9B6C-6EE0FAE07837}\ProxyStubClsid32 MicrosoftEdgeUpdate.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{A6556DFF-AB15-4DC3-A890-AB54120BEAEC}\NumMethods MicrosoftEdgeUpdate.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Installer\UpgradeCodes\88AAB0B9F51EF1A3CA0C2B609EDD7FC1 msiexec.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{AB4F4A7E-977C-4E23-AD8F-626A491715DF}\NumMethods\ = "41" MicrosoftEdgeUpdateComRegisterShell64.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{7B3B7A69-7D88-4847-A6BC-90E246A41F69}\ProxyStubClsid32 MicrosoftEdgeUpdate.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{1B9063E4-3882-485E-8797-F28A0240782F}\NumMethods\ = "4" MicrosoftEdgeUpdateComRegisterShell64.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{A6556DFF-AB15-4DC3-A890-AB54120BEAEC}\ProxyStubClsid32\ = "{8B15189E-5465-4166-933D-1EABAD9648CB}" MicrosoftEdgeUpdateComRegisterShell64.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{2603C88B-F971-4167-9DE1-871EE4A3DC84}\NumMethods MicrosoftEdgeUpdateComRegisterShell64.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{60355531-5BFD-45AB-942C-7912628752C7}\NumMethods\ = "24" MicrosoftEdgeUpdateComRegisterShell64.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\MicrosoftEdgeUpdate.PolicyStatusMachineFallback.1.0\CLSID\ = "{77857D02-7A25-4B67-9266-3E122A8F39E4}" MicrosoftEdgeUpdate.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{195A2EB3-21EE-43CA-9F23-93C2C9934E2E}\NumMethods MicrosoftEdgeUpdateComRegisterShell64.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\MicrosoftEdgeUpdate.OnDemandCOMClassSvc\CurVer\ = "MicrosoftEdgeUpdate.OnDemandCOMClassSvc.1.0" MicrosoftEdgeUpdate.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{A2F5CB38-265F-4A02-9D1E-F25B664968AB}\InprocServer32\ = "C:\\Program Files (x86)\\Microsoft\\EdgeUpdate\\1.3.171.39\\psmachine.dll" MicrosoftEdgeUpdate.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{B5977F34-9264-4AC3-9B31-1224827FF6E8}\LocalServer32 MicrosoftEdgeUpdate.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{8B15189E-5465-4166-933D-1EABAD9648CB}\ = "PSFactoryBuffer" MicrosoftEdgeUpdateComRegisterShell64.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{60355531-5BFD-45AB-942C-7912628752C7}\ = "IPolicyStatus3" MicrosoftEdgeUpdateComRegisterShell64.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{177CAE89-4AD6-42F4-A458-00EC3389E3FE}\ProxyStubClsid32\ = "{8B15189E-5465-4166-933D-1EABAD9648CB}" MicrosoftEdgeUpdateComRegisterShell64.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{195A2EB3-21EE-43CA-9F23-93C2C9934E2E}\ProxyStubClsid32\ = "{8B15189E-5465-4166-933D-1EABAD9648CB}" MicrosoftEdgeUpdateComRegisterShell64.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\roblox\ = "URL: Roblox Protocol" RobloxPlayerInstaller.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\MicrosoftEdgeUpdate.PolicyStatusSvc\CLSID\ = "{9F3F5F5D-721A-4B19-9B5D-69F664C1A591}" MicrosoftEdgeUpdate.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{60355531-5BFD-45AB-942C-7912628752C7}\NumMethods MicrosoftEdgeUpdate.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{5F9C80B5-9E50-43C9-887C-7C6412E110DF} MicrosoftEdgeUpdateComRegisterShell64.exe Key deleted \REGISTRY\MACHINE\SOFTWARE\Classes\Installer\UpgradeCodes\88AAB0B9F51EF1A3CA0C2B609EDD7FC1 msiexec.exe Set value (int) \REGISTRY\USER\S-1-5-21-3587106988-279496464-3440778474-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\2\ComDlg\{7D49D726-3C21-4F05-99AA-FDC2C9474656}\Mode = "4" Xeno.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\MicrosoftEdgeUpdate.ProcessLauncher MicrosoftEdgeUpdate.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\roblox\shell\open RobloxPlayerInstaller.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{99F8E195-1042-4F89-A28C-89CDB74A14AE}\ProxyStubClsid32 MicrosoftEdgeUpdate.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{177CAE89-4AD6-42F4-A458-00EC3389E3FE}\NumMethods MicrosoftEdgeUpdateComRegisterShell64.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{08D832B9-D2FD-481F-98CF-904D00DF63CC} MicrosoftEdgeUpdate.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\MicrosoftEdgeUpdate.CoreClass.1\CLSID MicrosoftEdgeUpdate.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Installer\Products\6611F283904AB5C4B9E158DE35B82819\SourceList\LastUsedSource = "n;1;C:\\ProgramData\\Package Cache\\{382F1166-A409-4C5B-9B1E-85ED538B8291}v14.42.34433\\packages\\vcRuntimeMinimum_amd64\\" msiexec.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{A2F5CB38-265F-4A02-9D1E-F25B664968AB}\InprocServer32\ = "C:\\Program Files (x86)\\Microsoft\\EdgeUpdate\\1.3.171.39\\psmachine_64.dll" MicrosoftEdgeUpdateComRegisterShell64.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{AB4F4A7E-977C-4E23-AD8F-626A491715DF}\NumMethods MicrosoftEdgeUpdateComRegisterShell64.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{C06EE550-7248-488E-971E-B60C0AB3A6E4}\ProxyStubClsid32 MicrosoftEdgeUpdate.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{7E29BE61-5809-443F-9B5D-CF22156694EB}\ProxyStubClsid32\ = "{8B15189E-5465-4166-933D-1EABAD9648CB}" MicrosoftEdgeUpdateComRegisterShell64.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{AB4F4A7E-977C-4E23-AD8F-626A491715DF}\ = "IAppBundle" MicrosoftEdgeUpdateComRegisterShell64.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{C853632E-36CA-4999-B992-EC0D408CF5AB}\ProxyStubClsid32\ = "{8B15189E-5465-4166-933D-1EABAD9648CB}" MicrosoftEdgeUpdateComRegisterShell64.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Installer\Products\6611F283904AB5C4B9E158DE35B82819\SourceList\Media\1 = ";" msiexec.exe Key deleted \REGISTRY\MACHINE\SOFTWARE\CLASSES\INSTALLER\DEPENDENCIES\MICROSOFT.VS.VC_RUNTIMEMINIMUMVSU_AMD64,V14\DEPENDENTS\{57A73DF6-4BA9-4C1D-BBBB-517289FF6C13} VC_redist.x64.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{5F9C80B5-9E50-43C9-887C-7C6412E110DF} MicrosoftEdgeUpdateComRegisterShell64.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{1B9063E4-3882-485E-8797-F28A0240782F}\ProxyStubClsid32\ = "{8B15189E-5465-4166-933D-1EABAD9648CB}" MicrosoftEdgeUpdateComRegisterShell64.exe Key deleted \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{9E8F1B36-249F-4FC3-9994-974AFAA07B26} MicrosoftEdgeUpdate.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{AB4EE1FC-0A81-4F56-B0E2-248FB78051AF}\NumMethods MicrosoftEdgeUpdateComRegisterShell64.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{2E1DD7EF-C12D-4F8E-8AD8-CF8CC265BAD0}\LocalServer32 MicrosoftEdgeUpdate.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{F7B3738C-9BCA-4B14-90B7-89D0F3A3E497}\ProxyStubClsid32\ = "{8B15189E-5465-4166-933D-1EABAD9648CB}" MicrosoftEdgeUpdate.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{450CF5FF-95C4-4679-BECA-22680389ECB9}\ProxyStubClsid32\ = "{8B15189E-5465-4166-933D-1EABAD9648CB}" MicrosoftEdgeUpdateComRegisterShell64.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{450CF5FF-95C4-4679-BECA-22680389ECB9}\ = "IAppVersionWeb" MicrosoftEdgeUpdateComRegisterShell64.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\MicrosoftEdgeUpdate.OnDemandCOMClassMachineFallback\CLSID\ = "{FF419FF9-90BE-4D9F-B410-A789F90E5A7C}" MicrosoftEdgeUpdate.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\MicrosoftEdgeUpdate.Update3WebMachineFallback\CurVer MicrosoftEdgeUpdate.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{E421557C-0628-43FB-BF2B-7C9F8A4D067C}\Elevation\Enabled = "1" MicrosoftEdgeUpdate.exe -
NTFS ADS 2 IoCs
description ioc Process File opened for modification C:\Users\Admin\Downloads\RobloxPlayerInstaller.exe:Zone.Identifier chrome.exe File opened for modification C:\Users\Admin\Downloads\VC_redist.x64.exe:Zone.Identifier chrome.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 3736 chrome.exe 3736 chrome.exe 1868 RobloxPlayerInstaller.exe 1868 RobloxPlayerInstaller.exe 3076 MicrosoftEdgeUpdate.exe 3076 MicrosoftEdgeUpdate.exe 3968 chrome.exe 3968 chrome.exe 3968 chrome.exe 3968 chrome.exe 3076 MicrosoftEdgeUpdate.exe 3076 MicrosoftEdgeUpdate.exe 3076 MicrosoftEdgeUpdate.exe 3076 MicrosoftEdgeUpdate.exe 1008 RobloxPlayerBeta.exe 908 msiexec.exe 908 msiexec.exe 908 msiexec.exe 908 msiexec.exe 908 msiexec.exe 908 msiexec.exe 908 msiexec.exe 908 msiexec.exe 4312 RobloxPlayerBeta.exe 1780 RobloxPlayerBeta.exe 2372 Xeno.exe 2372 Xeno.exe 2372 Xeno.exe 2372 Xeno.exe 2372 Xeno.exe 2372 Xeno.exe 2372 Xeno.exe 2372 Xeno.exe 2372 Xeno.exe 2372 Xeno.exe 2372 Xeno.exe 2372 Xeno.exe 2372 Xeno.exe 2372 Xeno.exe 2372 Xeno.exe 2372 Xeno.exe 2372 Xeno.exe 2372 Xeno.exe 2372 Xeno.exe 2372 Xeno.exe 2372 Xeno.exe 2372 Xeno.exe 2372 Xeno.exe 2372 Xeno.exe 2372 Xeno.exe 2372 Xeno.exe 2372 Xeno.exe 2372 Xeno.exe 2372 Xeno.exe 2372 Xeno.exe 2372 Xeno.exe 2372 Xeno.exe 2372 Xeno.exe 2372 Xeno.exe 2372 Xeno.exe 2372 Xeno.exe 2372 Xeno.exe 2372 Xeno.exe 2372 Xeno.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 3756 7zFM.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 20 IoCs
pid Process 3736 chrome.exe 3736 chrome.exe 3736 chrome.exe 3736 chrome.exe 3736 chrome.exe 3736 chrome.exe 3736 chrome.exe 3736 chrome.exe 3736 chrome.exe 3736 chrome.exe 3736 chrome.exe 3736 chrome.exe 3736 chrome.exe 3736 chrome.exe 3736 chrome.exe 3736 chrome.exe 3736 chrome.exe 3736 chrome.exe 3736 chrome.exe 2808 msedgewebview2.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeRestorePrivilege 3756 7zFM.exe Token: 35 3756 7zFM.exe Token: SeSecurityPrivilege 3756 7zFM.exe Token: SeShutdownPrivilege 3736 chrome.exe Token: SeCreatePagefilePrivilege 3736 chrome.exe Token: SeShutdownPrivilege 3736 chrome.exe Token: SeCreatePagefilePrivilege 3736 chrome.exe Token: SeShutdownPrivilege 3736 chrome.exe Token: SeCreatePagefilePrivilege 3736 chrome.exe Token: SeShutdownPrivilege 3736 chrome.exe Token: SeCreatePagefilePrivilege 3736 chrome.exe Token: SeShutdownPrivilege 3736 chrome.exe Token: SeCreatePagefilePrivilege 3736 chrome.exe Token: SeShutdownPrivilege 3736 chrome.exe Token: SeCreatePagefilePrivilege 3736 chrome.exe Token: SeShutdownPrivilege 3736 chrome.exe Token: SeCreatePagefilePrivilege 3736 chrome.exe Token: SeShutdownPrivilege 3736 chrome.exe Token: SeCreatePagefilePrivilege 3736 chrome.exe Token: SeShutdownPrivilege 3736 chrome.exe Token: SeCreatePagefilePrivilege 3736 chrome.exe Token: SeShutdownPrivilege 3736 chrome.exe Token: SeCreatePagefilePrivilege 3736 chrome.exe Token: SeShutdownPrivilege 3736 chrome.exe Token: SeCreatePagefilePrivilege 3736 chrome.exe Token: SeShutdownPrivilege 3736 chrome.exe Token: SeCreatePagefilePrivilege 3736 chrome.exe Token: SeShutdownPrivilege 3736 chrome.exe Token: SeCreatePagefilePrivilege 3736 chrome.exe Token: SeShutdownPrivilege 3736 chrome.exe Token: SeCreatePagefilePrivilege 3736 chrome.exe Token: SeShutdownPrivilege 3736 chrome.exe Token: SeCreatePagefilePrivilege 3736 chrome.exe Token: SeShutdownPrivilege 3736 chrome.exe Token: SeCreatePagefilePrivilege 3736 chrome.exe Token: SeShutdownPrivilege 3736 chrome.exe Token: SeCreatePagefilePrivilege 3736 chrome.exe Token: SeShutdownPrivilege 3736 chrome.exe Token: SeCreatePagefilePrivilege 3736 chrome.exe Token: SeShutdownPrivilege 3736 chrome.exe Token: SeCreatePagefilePrivilege 3736 chrome.exe Token: SeShutdownPrivilege 3736 chrome.exe Token: SeCreatePagefilePrivilege 3736 chrome.exe Token: SeShutdownPrivilege 3736 chrome.exe Token: SeCreatePagefilePrivilege 3736 chrome.exe Token: SeShutdownPrivilege 3736 chrome.exe Token: SeCreatePagefilePrivilege 3736 chrome.exe Token: SeShutdownPrivilege 3736 chrome.exe Token: SeCreatePagefilePrivilege 3736 chrome.exe Token: SeShutdownPrivilege 3736 chrome.exe Token: SeCreatePagefilePrivilege 3736 chrome.exe Token: SeShutdownPrivilege 3736 chrome.exe Token: SeCreatePagefilePrivilege 3736 chrome.exe Token: SeShutdownPrivilege 3736 chrome.exe Token: SeCreatePagefilePrivilege 3736 chrome.exe Token: SeShutdownPrivilege 3736 chrome.exe Token: SeCreatePagefilePrivilege 3736 chrome.exe Token: SeShutdownPrivilege 3736 chrome.exe Token: SeCreatePagefilePrivilege 3736 chrome.exe Token: SeShutdownPrivilege 3736 chrome.exe Token: SeCreatePagefilePrivilege 3736 chrome.exe Token: SeShutdownPrivilege 3736 chrome.exe Token: SeCreatePagefilePrivilege 3736 chrome.exe Token: SeShutdownPrivilege 3736 chrome.exe -
Suspicious use of FindShellTrayWindow 64 IoCs
pid Process 3756 7zFM.exe 3756 7zFM.exe 3736 chrome.exe 3736 chrome.exe 3736 chrome.exe 3736 chrome.exe 3736 chrome.exe 3736 chrome.exe 3736 chrome.exe 3736 chrome.exe 3736 chrome.exe 3736 chrome.exe 3736 chrome.exe 3736 chrome.exe 3736 chrome.exe 3736 chrome.exe 3736 chrome.exe 3736 chrome.exe 3736 chrome.exe 3736 chrome.exe 3736 chrome.exe 3736 chrome.exe 3736 chrome.exe 3736 chrome.exe 3736 chrome.exe 3736 chrome.exe 3736 chrome.exe 3736 chrome.exe 3736 chrome.exe 3736 chrome.exe 3736 chrome.exe 3736 chrome.exe 3736 chrome.exe 3736 chrome.exe 3736 chrome.exe 3736 chrome.exe 3736 chrome.exe 3736 chrome.exe 3736 chrome.exe 3736 chrome.exe 3736 chrome.exe 3736 chrome.exe 3736 chrome.exe 3736 chrome.exe 3736 chrome.exe 3736 chrome.exe 3736 chrome.exe 3736 chrome.exe 3736 chrome.exe 3736 chrome.exe 3736 chrome.exe 3736 chrome.exe 3736 chrome.exe 3736 chrome.exe 3736 chrome.exe 3736 chrome.exe 3736 chrome.exe 3736 chrome.exe 3736 chrome.exe 3736 chrome.exe 3736 chrome.exe 3736 chrome.exe 3736 chrome.exe 3736 chrome.exe -
Suspicious use of SendNotifyMessage 12 IoCs
pid Process 3736 chrome.exe 3736 chrome.exe 3736 chrome.exe 3736 chrome.exe 3736 chrome.exe 3736 chrome.exe 3736 chrome.exe 3736 chrome.exe 3736 chrome.exe 3736 chrome.exe 3736 chrome.exe 3736 chrome.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 2372 Xeno.exe -
Suspicious use of UnmapMainImage 3 IoCs
pid Process 1008 RobloxPlayerBeta.exe 4312 RobloxPlayerBeta.exe 1780 RobloxPlayerBeta.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 3736 wrote to memory of 3144 3736 chrome.exe 82 PID 3736 wrote to memory of 3144 3736 chrome.exe 82 PID 3736 wrote to memory of 2012 3736 chrome.exe 83 PID 3736 wrote to memory of 2012 3736 chrome.exe 83 PID 3736 wrote to memory of 2012 3736 chrome.exe 83 PID 3736 wrote to memory of 2012 3736 chrome.exe 83 PID 3736 wrote to memory of 2012 3736 chrome.exe 83 PID 3736 wrote to memory of 2012 3736 chrome.exe 83 PID 3736 wrote to memory of 2012 3736 chrome.exe 83 PID 3736 wrote to memory of 2012 3736 chrome.exe 83 PID 3736 wrote to memory of 2012 3736 chrome.exe 83 PID 3736 wrote to memory of 2012 3736 chrome.exe 83 PID 3736 wrote to memory of 2012 3736 chrome.exe 83 PID 3736 wrote to memory of 2012 3736 chrome.exe 83 PID 3736 wrote to memory of 2012 3736 chrome.exe 83 PID 3736 wrote to memory of 2012 3736 chrome.exe 83 PID 3736 wrote to memory of 2012 3736 chrome.exe 83 PID 3736 wrote to memory of 2012 3736 chrome.exe 83 PID 3736 wrote to memory of 2012 3736 chrome.exe 83 PID 3736 wrote to memory of 2012 3736 chrome.exe 83 PID 3736 wrote to memory of 2012 3736 chrome.exe 83 PID 3736 wrote to memory of 2012 3736 chrome.exe 83 PID 3736 wrote to memory of 2012 3736 chrome.exe 83 PID 3736 wrote to memory of 2012 3736 chrome.exe 83 PID 3736 wrote to memory of 2012 3736 chrome.exe 83 PID 3736 wrote to memory of 2012 3736 chrome.exe 83 PID 3736 wrote to memory of 2012 3736 chrome.exe 83 PID 3736 wrote to memory of 2012 3736 chrome.exe 83 PID 3736 wrote to memory of 2012 3736 chrome.exe 83 PID 3736 wrote to memory of 2012 3736 chrome.exe 83 PID 3736 wrote to memory of 2012 3736 chrome.exe 83 PID 3736 wrote to memory of 2012 3736 chrome.exe 83 PID 3736 wrote to memory of 396 3736 chrome.exe 84 PID 3736 wrote to memory of 396 3736 chrome.exe 84 PID 3736 wrote to memory of 2616 3736 chrome.exe 85 PID 3736 wrote to memory of 2616 3736 chrome.exe 85 PID 3736 wrote to memory of 2616 3736 chrome.exe 85 PID 3736 wrote to memory of 2616 3736 chrome.exe 85 PID 3736 wrote to memory of 2616 3736 chrome.exe 85 PID 3736 wrote to memory of 2616 3736 chrome.exe 85 PID 3736 wrote to memory of 2616 3736 chrome.exe 85 PID 3736 wrote to memory of 2616 3736 chrome.exe 85 PID 3736 wrote to memory of 2616 3736 chrome.exe 85 PID 3736 wrote to memory of 2616 3736 chrome.exe 85 PID 3736 wrote to memory of 2616 3736 chrome.exe 85 PID 3736 wrote to memory of 2616 3736 chrome.exe 85 PID 3736 wrote to memory of 2616 3736 chrome.exe 85 PID 3736 wrote to memory of 2616 3736 chrome.exe 85 PID 3736 wrote to memory of 2616 3736 chrome.exe 85 PID 3736 wrote to memory of 2616 3736 chrome.exe 85 PID 3736 wrote to memory of 2616 3736 chrome.exe 85 PID 3736 wrote to memory of 2616 3736 chrome.exe 85 PID 3736 wrote to memory of 2616 3736 chrome.exe 85 PID 3736 wrote to memory of 2616 3736 chrome.exe 85 PID 3736 wrote to memory of 2616 3736 chrome.exe 85 PID 3736 wrote to memory of 2616 3736 chrome.exe 85 PID 3736 wrote to memory of 2616 3736 chrome.exe 85 PID 3736 wrote to memory of 2616 3736 chrome.exe 85 PID 3736 wrote to memory of 2616 3736 chrome.exe 85 PID 3736 wrote to memory of 2616 3736 chrome.exe 85 PID 3736 wrote to memory of 2616 3736 chrome.exe 85 PID 3736 wrote to memory of 2616 3736 chrome.exe 85 PID 3736 wrote to memory of 2616 3736 chrome.exe 85 PID 3736 wrote to memory of 2616 3736 chrome.exe 85 -
System policy modification 1 TTPs 1 IoCs
description ioc Process Key created \REGISTRY\MACHINE\Software\Microsoft\Windows\CurrentVersion\Policies\DataCollection msedgewebview2.exe -
Uses Volume Shadow Copy service COM API
The Volume Shadow Copy service is used to manage backups/snapshots.
Processes
-
C:\Program Files\7-Zip\7zFM.exe"C:\Program Files\7-Zip\7zFM.exe" "C:\Users\Admin\AppData\Local\Temp\Xeno-v1.0.9-x64-New.zip"1⤵
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
PID:3756
-
C:\Windows\System32\rundll32.exeC:\Windows\System32\rundll32.exe C:\Windows\System32\shell32.dll,SHCreateLocalServerRunDll {9aa46009-3ce0-458a-a354-715610a075e6} -Embedding1⤵PID:4308
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe"1⤵
- Drops file in Windows directory
- Enumerates system info in registry
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:3736 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:4 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=123.0.6312.123 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffe1c9bcc40,0x7ffe1c9bcc4c,0x7ffe1c9bcc582⤵PID:3144
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --no-appcompat-clear --gpu-preferences=WAAAAAAAAADgAAAMAAAAAAAAAAAAAAAAAABgAAEAAAA4AAAAAAAAAAAAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAGAAAAAAAAAAYAAAAAAAAAAgAAAAAAAAACAAAAAAAAAAIAAAAAAAAAA== --field-trial-handle=1824,i,3766546343156027022,7497762196171302741,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=1820 /prefetch:22⤵PID:2012
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --no-appcompat-clear --field-trial-handle=2088,i,3766546343156027022,7497762196171302741,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=2128 /prefetch:32⤵PID:396
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=service --no-appcompat-clear --field-trial-handle=2216,i,3766546343156027022,7497762196171302741,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=2176 /prefetch:82⤵PID:2616
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --field-trial-handle=3096,i,3766546343156027022,7497762196171302741,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=3188 /prefetch:12⤵PID:2016
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --field-trial-handle=3152,i,3766546343156027022,7497762196171302741,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=3296 /prefetch:12⤵PID:3036
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --field-trial-handle=3100,i,3766546343156027022,7497762196171302741,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=4468 /prefetch:12⤵PID:1880
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --field-trial-handle=4648,i,3766546343156027022,7497762196171302741,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=4680 /prefetch:12⤵PID:868
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.ProcessorMetrics --lang=en-US --service-sandbox-type=none --no-appcompat-clear --field-trial-handle=4480,i,3766546343156027022,7497762196171302741,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=4920 /prefetch:82⤵PID:1080
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --no-appcompat-clear --field-trial-handle=3424,i,3766546343156027022,7497762196171302741,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=3408 /prefetch:82⤵PID:4380
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=unzip.mojom.Unzipper --lang=en-US --service-sandbox-type=service --no-appcompat-clear --field-trial-handle=4924,i,3766546343156027022,7497762196171302741,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=4948 /prefetch:82⤵PID:2928
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --no-appcompat-clear --field-trial-handle=4988,i,3766546343156027022,7497762196171302741,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=5068 /prefetch:82⤵PID:928
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=unzip.mojom.Unzipper --lang=en-US --service-sandbox-type=service --no-appcompat-clear --field-trial-handle=4916,i,3766546343156027022,7497762196171302741,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=5040 /prefetch:82⤵PID:4320
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --no-appcompat-clear --field-trial-handle=5028,i,3766546343156027022,7497762196171302741,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=3196 /prefetch:82⤵PID:3848
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --extension-process --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=15 --field-trial-handle=5016,i,3766546343156027022,7497762196171302741,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=3336 /prefetch:22⤵PID:4500
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=audio.mojom.AudioService --lang=en-US --service-sandbox-type=audio --no-appcompat-clear --field-trial-handle=4604,i,3766546343156027022,7497762196171302741,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=4608 /prefetch:82⤵PID:4540
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=video_capture.mojom.VideoCaptureService --lang=en-US --service-sandbox-type=none --no-appcompat-clear --field-trial-handle=4488,i,3766546343156027022,7497762196171302741,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=5236 /prefetch:82⤵PID:4336
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=18 --field-trial-handle=5352,i,3766546343156027022,7497762196171302741,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=3528 /prefetch:12⤵PID:3032
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilReadIcon --lang=en-US --service-sandbox-type=icon_reader --no-appcompat-clear --field-trial-handle=5404,i,3766546343156027022,7497762196171302741,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=5448 /prefetch:82⤵PID:4516
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilReadIcon --lang=en-US --service-sandbox-type=icon_reader --no-appcompat-clear --field-trial-handle=5456,i,3766546343156027022,7497762196171302741,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=5596 /prefetch:82⤵PID:1840
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=quarantine.mojom.Quarantine --lang=en-US --service-sandbox-type=none --no-appcompat-clear --field-trial-handle=5264,i,3766546343156027022,7497762196171302741,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=5432 /prefetch:82⤵
- Subvert Trust Controls: Mark-of-the-Web Bypass
- NTFS ADS
PID:4588
-
-
C:\Users\Admin\Downloads\RobloxPlayerInstaller.exe"C:\Users\Admin\Downloads\RobloxPlayerInstaller.exe"2⤵
- Executes dropped EXE
- Checks whether UAC is enabled
- Drops file in Program Files directory
- System Location Discovery: System Language Discovery
- Enumerates system info in registry
- Modifies Internet Explorer settings
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
PID:1868 -
C:\Program Files (x86)\Roblox\Versions\version-8aa36bbf0eb1494a\WebView2RuntimeInstaller\MicrosoftEdgeWebview2Setup.exeMicrosoftEdgeWebview2Setup.exe /silent /install3⤵
- Executes dropped EXE
- Drops file in Program Files directory
- System Location Discovery: System Language Discovery
PID:416 -
C:\Program Files (x86)\Microsoft\Temp\EU9754.tmp\MicrosoftEdgeUpdate.exe"C:\Program Files (x86)\Microsoft\Temp\EU9754.tmp\MicrosoftEdgeUpdate.exe" /silent /install "appguid={F3017226-FE2A-4295-8BDF-00C3A9A7E4C5}&appname=Microsoft%20Edge%20Webview2%20Runtime&needsadmin=prefers"4⤵
- Event Triggered Execution: Image File Execution Options Injection
- Executes dropped EXE
- Loads dropped DLL
- Checks system information in the registry
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:3076 -
C:\Program Files (x86)\Microsoft\EdgeUpdate\MicrosoftEdgeUpdate.exe"C:\Program Files (x86)\Microsoft\EdgeUpdate\MicrosoftEdgeUpdate.exe" /regsvc5⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Modifies registry class
PID:2280
-
-
C:\Program Files (x86)\Microsoft\EdgeUpdate\MicrosoftEdgeUpdate.exe"C:\Program Files (x86)\Microsoft\EdgeUpdate\MicrosoftEdgeUpdate.exe" /regserver5⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Modifies registry class
PID:1120 -
C:\Program Files (x86)\Microsoft\EdgeUpdate\1.3.171.39\MicrosoftEdgeUpdateComRegisterShell64.exe"C:\Program Files (x86)\Microsoft\EdgeUpdate\1.3.171.39\MicrosoftEdgeUpdateComRegisterShell64.exe"6⤵
- Executes dropped EXE
- Loads dropped DLL
- Modifies registry class
PID:468
-
-
C:\Program Files (x86)\Microsoft\EdgeUpdate\1.3.171.39\MicrosoftEdgeUpdateComRegisterShell64.exe"C:\Program Files (x86)\Microsoft\EdgeUpdate\1.3.171.39\MicrosoftEdgeUpdateComRegisterShell64.exe"6⤵
- Executes dropped EXE
- Loads dropped DLL
- Modifies registry class
PID:2208
-
-
C:\Program Files (x86)\Microsoft\EdgeUpdate\1.3.171.39\MicrosoftEdgeUpdateComRegisterShell64.exe"C:\Program Files (x86)\Microsoft\EdgeUpdate\1.3.171.39\MicrosoftEdgeUpdateComRegisterShell64.exe"6⤵
- Executes dropped EXE
- Loads dropped DLL
- Modifies registry class
PID:2656
-
-
-
C:\Program Files (x86)\Microsoft\EdgeUpdate\MicrosoftEdgeUpdate.exe"C:\Program Files (x86)\Microsoft\EdgeUpdate\MicrosoftEdgeUpdate.exe" /ping PD94bWwgdmVyc2lvbj0iMS4wIiBlbmNvZGluZz0iVVRGLTgiPz48cmVxdWVzdCBwcm90b2NvbD0iMy4wIiB1cGRhdGVyPSJPbWFoYSIgdXBkYXRlcnZlcnNpb249IjEuMy4xNzEuMzkiIHNoZWxsX3ZlcnNpb249IjEuMy4xNzEuMzkiIGlzbWFjaGluZT0iMSIgc2Vzc2lvbmlkPSJ7OTQ0OURCMDUtNTNFRi00ODU1LUEyNkItNkQyMjNBNjYyMDBFfSIgdXNlcmlkPSJ7NjdFOTQ3MUEtNDhFMC00OUMwLTkxQTYtOTQ1NzNDOTc4REQ0fSIgaW5zdGFsbHNvdXJjZT0ib3RoZXJpbnN0YWxsY21kIiByZXF1ZXN0aWQ9IntDNkNERTY5MC02RjZFLTREQkUtODdFRi05QUMyN0I0MUYxNzN9IiBkZWR1cD0iY3IiIGRvbWFpbmpvaW5lZD0iMCI-PGh3IGxvZ2ljYWxfY3B1cz0iOCIgcGh5c21lbW9yeT0iOCIgZGlza190eXBlPSIyIiBzc2U9IjEiIHNzZTI9IjEiIHNzZTM9IjEiIHNzc2UzPSIxIiBzc2U0MT0iMSIgc3NlNDI9IjEiIGF2eD0iMSIvPjxvcyBwbGF0Zm9ybT0id2luIiB2ZXJzaW9uPSIxMC4wLjIyMDAwLjQ5MyIgc3A9IiIgYXJjaD0ieDY0IiBwcm9kdWN0X3R5cGU9IjQ4IiBpc193aXA9IjAiLz48b2VtIHByb2R1Y3RfbWFudWZhY3R1cmVyPSIiIHByb2R1Y3RfbmFtZT0iIi8-PGV4cCBldGFnPSIiLz48YXBwIGFwcGlkPSJ7RjNDNEZFMDAtRUZENS00MDNCLTk1NjktMzk4QTIwRjFCQTRBfSIgdmVyc2lvbj0iMS4zLjE0My41NyIgbmV4dHZlcnNpb249IjEuMy4xNzEuMzkiIGxhbmc9IiIgYnJhbmQ9IiIgY2xpZW50PSIiPjxldmVudCBldmVudHR5cGU9IjIiIGV2ZW50cmVzdWx0PSIxIiBlcnJvcmNvZGU9IjAiIGV4dHJhY29kZTE9IjAiIHN5c3RlbV91cHRpbWVfdGlja3M9IjYwOTIzMzUwMzEiIGluc3RhbGxfdGltZV9tcz0iNzU1Ii8-PC9hcHA-PC9yZXF1ZXN0Pg5⤵
- Executes dropped EXE
- Loads dropped DLL
- Checks system information in the registry
- System Location Discovery: System Language Discovery
- System Network Configuration Discovery: Internet Connection Discovery
PID:492
-
-
C:\Program Files (x86)\Microsoft\EdgeUpdate\MicrosoftEdgeUpdate.exe"C:\Program Files (x86)\Microsoft\EdgeUpdate\MicrosoftEdgeUpdate.exe" /handoff "appguid={F3017226-FE2A-4295-8BDF-00C3A9A7E4C5}&appname=Microsoft%20Edge%20Webview2%20Runtime&needsadmin=prefers" /installsource otherinstallcmd /sessionid "{9449DB05-53EF-4855-A26B-6D223A66200E}" /silent5⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
PID:4280
-
-
-
-
C:\Program Files (x86)\Roblox\Versions\version-8aa36bbf0eb1494a\RobloxPlayerBeta.exe"C:\Program Files (x86)\Roblox\Versions\version-8aa36bbf0eb1494a\RobloxPlayerBeta.exe" -app -clientLaunchTimeEpochMs 0 -isInstallerLaunch 18683⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of NtCreateThreadExHideFromDebugger
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of UnmapMainImage
PID:1008
-
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=22 --field-trial-handle=6332,i,3766546343156027022,7497762196171302741,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=6372 /prefetch:12⤵PID:2324
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=23 --field-trial-handle=6452,i,3766546343156027022,7497762196171302741,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=6428 /prefetch:12⤵PID:1192
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=24 --field-trial-handle=6604,i,3766546343156027022,7497762196171302741,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=6344 /prefetch:12⤵PID:1332
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.22000.1 --no-appcompat-clear --gpu-preferences=WAAAAAAAAADoAAAMAAAAAAAAAAAAAAAAAABgAAEAAAA4AAAAAAAAAAAAAACEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAGAAAAAAAAAAYAAAAAAAAAAgAAAAAAAAACAAAAAAAAAAIAAAAAAAAAA== --field-trial-handle=4764,i,3766546343156027022,7497762196171302741,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=1160 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:3968
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=26 --field-trial-handle=6608,i,3766546343156027022,7497762196171302741,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=4920 /prefetch:12⤵PID:3724
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=27 --field-trial-handle=6664,i,3766546343156027022,7497762196171302741,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=6416 /prefetch:12⤵PID:3368
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=28 --field-trial-handle=6216,i,3766546343156027022,7497762196171302741,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=5428 /prefetch:12⤵PID:3340
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilReadIcon --lang=en-US --service-sandbox-type=icon_reader --no-appcompat-clear --field-trial-handle=6180,i,3766546343156027022,7497762196171302741,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=6656 /prefetch:82⤵PID:2960
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilReadIcon --lang=en-US --service-sandbox-type=icon_reader --no-appcompat-clear --field-trial-handle=6560,i,3766546343156027022,7497762196171302741,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=6736 /prefetch:82⤵PID:4584
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=quarantine.mojom.Quarantine --lang=en-US --service-sandbox-type=none --no-appcompat-clear --field-trial-handle=6680,i,3766546343156027022,7497762196171302741,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=6068 /prefetch:82⤵
- Subvert Trust Controls: Mark-of-the-Web Bypass
- NTFS ADS
PID:4592
-
-
C:\Users\Admin\Downloads\VC_redist.x64.exe"C:\Users\Admin\Downloads\VC_redist.x64.exe"2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:4036 -
C:\Windows\Temp\{E6617925-1EB3-491D-A1CF-AB93DDCA1B4F}\.cr\VC_redist.x64.exe"C:\Windows\Temp\{E6617925-1EB3-491D-A1CF-AB93DDCA1B4F}\.cr\VC_redist.x64.exe" -burn.clean.room="C:\Users\Admin\Downloads\VC_redist.x64.exe" -burn.filehandle.attached=608 -burn.filehandle.self=7563⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
PID:1296 -
C:\Windows\Temp\{0FEA0FED-4EE6-49BC-AC63-97A5BFD59628}\.be\VC_redist.x64.exe"C:\Windows\Temp\{0FEA0FED-4EE6-49BC-AC63-97A5BFD59628}\.be\VC_redist.x64.exe" -q -burn.elevated BurnPipe.{37039179-D4C1-4745-90D2-AB47B23335B0} {162AD61E-C8D3-4C0D-AC81-E9B2D8268A4F} 12964⤵
- Executes dropped EXE
- Adds Run key to start application
- System Location Discovery: System Language Discovery
PID:1440 -
C:\ProgramData\Package Cache\{57a73df6-4ba9-4c1d-bbbb-517289ff6c13}\VC_redist.x64.exe"C:\ProgramData\Package Cache\{57a73df6-4ba9-4c1d-bbbb-517289ff6c13}\VC_redist.x64.exe" -uninstall -quiet -burn.related.upgrade -burn.ancestors={804e7d66-ccc2-4c12-84ba-476da31d103d} -burn.filehandle.self=968 -burn.embedded BurnPipe.{213C6C59-F50F-4DC1-8846-80FA22F55654} {BA05AC71-5DE2-42D3-8C3A-5A76F1644DBB} 14405⤵
- System Location Discovery: System Language Discovery
PID:1820 -
C:\ProgramData\Package Cache\{57a73df6-4ba9-4c1d-bbbb-517289ff6c13}\VC_redist.x64.exe"C:\ProgramData\Package Cache\{57a73df6-4ba9-4c1d-bbbb-517289ff6c13}\VC_redist.x64.exe" -burn.clean.room="C:\ProgramData\Package Cache\{57a73df6-4ba9-4c1d-bbbb-517289ff6c13}\VC_redist.x64.exe" -burn.filehandle.attached=584 -burn.filehandle.self=600 -uninstall -quiet -burn.related.upgrade -burn.ancestors={804e7d66-ccc2-4c12-84ba-476da31d103d} -burn.filehandle.self=968 -burn.embedded BurnPipe.{213C6C59-F50F-4DC1-8846-80FA22F55654} {BA05AC71-5DE2-42D3-8C3A-5A76F1644DBB} 14406⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
PID:8 -
C:\ProgramData\Package Cache\{57a73df6-4ba9-4c1d-bbbb-517289ff6c13}\VC_redist.x64.exe"C:\ProgramData\Package Cache\{57a73df6-4ba9-4c1d-bbbb-517289ff6c13}\VC_redist.x64.exe" -q -burn.elevated BurnPipe.{4B7DB4C4-A457-4D4C-9141-5F7B9673036A} {D0082ADD-B099-4583-A18C-A1FA5D8D2AEF} 87⤵
- System Location Discovery: System Language Discovery
- Modifies registry class
PID:2100
-
-
-
-
-
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=32 --field-trial-handle=6068,i,3766546343156027022,7497762196171302741,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=5052 /prefetch:12⤵PID:1960
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=33 --field-trial-handle=6148,i,3766546343156027022,7497762196171302741,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=6140 /prefetch:12⤵PID:3536
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=34 --field-trial-handle=7052,i,3766546343156027022,7497762196171302741,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=7088 /prefetch:12⤵PID:1332
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=35 --field-trial-handle=7116,i,3766546343156027022,7497762196171302741,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=6436 /prefetch:12⤵PID:3412
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=36 --field-trial-handle=6924,i,3766546343156027022,7497762196171302741,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=7088 /prefetch:12⤵PID:2796
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=37 --field-trial-handle=5672,i,3766546343156027022,7497762196171302741,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=6360 /prefetch:12⤵PID:1688
-
-
C:\Program Files (x86)\Roblox\Versions\version-8aa36bbf0eb1494a\RobloxPlayerBeta.exe"C:\Program Files (x86)\Roblox\Versions\version-8aa36bbf0eb1494a\RobloxPlayerBeta.exe" roblox-player:1+launchmode:play+gameinfo:FChIsApa2deX7Wo3w8PXeDojH-dGPh93tw6gbi_lemDLE4d7SDIMbtaTHHpKszJzxTQnpyNrc2sKw3tI-n0YQaqkGp70sRGHLsFwcFU7PgvRDG5JFn8VSqrct-K9cjPRyB1UcFPjpXkkWecU6q-0AngFuZhcuTIYamLcy0B--L5FlSZ3zaGb4zThR9uuntv4qvIkdU2Xm048Z_afkxYCdw06wh9u9_IZ1IIitGxN660+launchtime:1733243137670+placelauncherurl:https%3A%2F%2Fwww.roblox.com%2FGame%2FPlaceLauncher.ashx%3Frequest%3DRequestGame%26browserTrackerId%3D1733243095246002%26placeId%3D4483381587%26isPlayTogetherGame%3Dfalse%26joinAttemptId%3D7b00a3c6-0961-4083-9e64-e96cda153588%26joinAttemptOrigin%3DPlayButton+browsertrackerid:1733243095246002+robloxLocale:en_us+gameLocale:en_us+channel:+LaunchExp:InApp2⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of NtCreateThreadExHideFromDebugger
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of UnmapMainImage
PID:4312
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=38 --field-trial-handle=4372,i,3766546343156027022,7497762196171302741,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=6260 /prefetch:12⤵PID:2820
-
-
C:\Program Files (x86)\Roblox\Versions\version-8aa36bbf0eb1494a\RobloxPlayerBeta.exe"C:\Program Files (x86)\Roblox\Versions\version-8aa36bbf0eb1494a\RobloxPlayerBeta.exe" roblox-player:1+launchmode:play+gameinfo:QMxg6qQZZny4gvufPNAX9b-Q0pKYr7kntf06ZcqaseZLzaSQTsMQR6WKxX-uNpXjbX-ETWUL2zPkRLBoZZlDT2PTL4LwsRwm2azSAvN6S-x33nPzdKYKkyu5oQeFydAvYdzB-4WPqApa46aXGF1dsITl2Nwwb37UUbT-yBsD1G0Aly0blaz1KUOjkzi2DVjxLHorufZd9c-p9u2Yoj4-SOy0mr9BJ_lbIwlKUjmCQrA+launchtime:1733243137670+placelauncherurl:https%3A%2F%2Fwww.roblox.com%2FGame%2FPlaceLauncher.ashx%3Frequest%3DRequestGame%26browserTrackerId%3D1733243095246002%26placeId%3D4483381587%26isPlayTogetherGame%3Dfalse%26joinAttemptId%3D7b00a3c6-0961-4083-9e64-e96cda153588%26joinAttemptOrigin%3DPlayButton+browsertrackerid:1733243095246002+robloxLocale:en_us+gameLocale:en_us+channel:+LaunchExp:InApp2⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of NtCreateThreadExHideFromDebugger
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of UnmapMainImage
PID:1780
-
-
C:\Program Files\Google\Chrome\Application\123.0.6312.123\elevation_service.exe"C:\Program Files\Google\Chrome\Application\123.0.6312.123\elevation_service.exe"1⤵PID:1352
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k LocalSystemNetworkRestricted -p -s NgcSvc1⤵PID:4332
-
C:\Program Files (x86)\Microsoft\EdgeUpdate\MicrosoftEdgeUpdate.exe"C:\Program Files (x86)\Microsoft\EdgeUpdate\MicrosoftEdgeUpdate.exe" /svc1⤵
- Executes dropped EXE
- Loads dropped DLL
- Checks system information in the registry
- System Location Discovery: System Language Discovery
- Modifies data under HKEY_USERS
PID:4656 -
C:\Program Files (x86)\Microsoft\EdgeUpdate\MicrosoftEdgeUpdate.exe"C:\Program Files (x86)\Microsoft\EdgeUpdate\MicrosoftEdgeUpdate.exe" /ping PD94bWwgdmVyc2lvbj0iMS4wIiBlbmNvZGluZz0iVVRGLTgiPz48cmVxdWVzdCBwcm90b2NvbD0iMy4wIiB1cGRhdGVyPSJPbWFoYSIgdXBkYXRlcnZlcnNpb249IjEuMy4xNzEuMzkiIHNoZWxsX3ZlcnNpb249IjEuMy4xNzEuMzkiIGlzbWFjaGluZT0iMSIgc2Vzc2lvbmlkPSJ7OTQ0OURCMDUtNTNFRi00ODU1LUEyNkItNkQyMjNBNjYyMDBFfSIgdXNlcmlkPSJ7NjdFOTQ3MUEtNDhFMC00OUMwLTkxQTYtOTQ1NzNDOTc4REQ0fSIgaW5zdGFsbHNvdXJjZT0ib3RoZXJpbnN0YWxsY21kIiByZXF1ZXN0aWQ9Ins0QTk0RDcwQS02RjQyLTRBQTEtQTM0QS1CQTg1QTU4MTZBRjB9IiBkZWR1cD0iY3IiIGRvbWFpbmpvaW5lZD0iMCI-PGh3IGxvZ2ljYWxfY3B1cz0iOCIgcGh5c21lbW9yeT0iOCIgZGlza190eXBlPSIyIiBzc2U9IjEiIHNzZTI9IjEiIHNzZTM9IjEiIHNzc2UzPSIxIiBzc2U0MT0iMSIgc3NlNDI9IjEiIGF2eD0iMSIvPjxvcyBwbGF0Zm9ybT0id2luIiB2ZXJzaW9uPSIxMC4wLjIyMDAwLjQ5MyIgc3A9IiIgYXJjaD0ieDY0IiBwcm9kdWN0X3R5cGU9IjQ4IiBpc193aXA9IjAiLz48b2VtIHByb2R1Y3RfbWFudWZhY3R1cmVyPSIiIHByb2R1Y3RfbmFtZT0iIi8-PGV4cCBldGFnPSImcXVvdDtyNDUydDErazJUZ3EvSFh6anZGTkJSaG9wQldSOXNialh4cWVVREg5dVgwPSZxdW90OyIvPjxhcHAgYXBwaWQ9Ins4QTY5RDM0NS1ENTY0LTQ2M2MtQUZGMS1BNjlEOUU1MzBGOTZ9IiB2ZXJzaW9uPSIxMjMuMC42MzEyLjEyMyIgbmV4dHZlcnNpb249IjEyMy4wLjYzMTIuMTIzIiBsYW5nPSJlbiIgYnJhbmQ9IkdHTFMiIGNsaWVudD0iIj48ZXZlbnQgZXZlbnR0eXBlPSIzMSIgZXZlbnRyZXN1bHQ9IjEiIGVycm9yY29kZT0iMCIgZXh0cmFjb2RlMT0iNSIgc3lzdGVtX3VwdGltZV90aWNrcz0iNjA5NzgzNDgyOSIvPjwvYXBwPjwvcmVxdWVzdD42⤵
- Executes dropped EXE
- Loads dropped DLL
- Checks system information in the registry
- System Location Discovery: System Language Discovery
- System Network Configuration Discovery: Internet Connection Discovery
PID:3444
-
-
C:\Program Files (x86)\Microsoft\EdgeUpdate\Install\{35C35840-938B-4DF6-A908-EFA0E86FEE40}\MicrosoftEdge_X64_131.0.2903.70.exe"C:\Program Files (x86)\Microsoft\EdgeUpdate\Install\{35C35840-938B-4DF6-A908-EFA0E86FEE40}\MicrosoftEdge_X64_131.0.2903.70.exe" --msedgewebview --verbose-logging --do-not-launch-msedge --system-level2⤵
- Executes dropped EXE
PID:3316 -
C:\Program Files (x86)\Microsoft\EdgeUpdate\Install\{35C35840-938B-4DF6-A908-EFA0E86FEE40}\EDGEMITMP_CE5CE.tmp\setup.exe"C:\Program Files (x86)\Microsoft\EdgeUpdate\Install\{35C35840-938B-4DF6-A908-EFA0E86FEE40}\EDGEMITMP_CE5CE.tmp\setup.exe" --install-archive="C:\Program Files (x86)\Microsoft\EdgeUpdate\Install\{35C35840-938B-4DF6-A908-EFA0E86FEE40}\MicrosoftEdge_X64_131.0.2903.70.exe" --msedgewebview --verbose-logging --do-not-launch-msedge --system-level3⤵
- Executes dropped EXE
- Drops file in Program Files directory
- Drops file in Windows directory
PID:3428 -
C:\Program Files (x86)\Microsoft\EdgeUpdate\Install\{35C35840-938B-4DF6-A908-EFA0E86FEE40}\EDGEMITMP_CE5CE.tmp\setup.exe"C:\Program Files (x86)\Microsoft\EdgeUpdate\Install\{35C35840-938B-4DF6-A908-EFA0E86FEE40}\EDGEMITMP_CE5CE.tmp\setup.exe" --type=crashpad-handler /prefetch:4 --monitor-self-annotation=ptype=crashpad-handler --database=C:\Windows\SystemTemp\MsEdgeCrashpad --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=131.0.6778.86 "--annotation=exe=C:\Program Files (x86)\Microsoft\EdgeUpdate\Install\{35C35840-938B-4DF6-A908-EFA0E86FEE40}\EDGEMITMP_CE5CE.tmp\setup.exe" --annotation=plat=Win64 --annotation=prod=Edge --annotation=ver=131.0.2903.70 --initial-client-data=0x234,0x238,0x23c,0x210,0x240,0x7ff7c1642918,0x7ff7c1642924,0x7ff7c16429304⤵
- Executes dropped EXE
- Drops file in Windows directory
PID:3208
-
-
-
-
C:\Program Files (x86)\Microsoft\EdgeUpdate\MicrosoftEdgeUpdate.exe"C:\Program Files (x86)\Microsoft\EdgeUpdate\MicrosoftEdgeUpdate.exe" /ping PD94bWwgdmVyc2lvbj0iMS4wIiBlbmNvZGluZz0iVVRGLTgiPz48cmVxdWVzdCBwcm90b2NvbD0iMy4wIiB1cGRhdGVyPSJPbWFoYSIgdXBkYXRlcnZlcnNpb249IjEuMy4xNzEuMzkiIHNoZWxsX3ZlcnNpb249IjEuMy4xNzEuMzkiIGlzbWFjaGluZT0iMSIgc2Vzc2lvbmlkPSJ7OTQ0OURCMDUtNTNFRi00ODU1LUEyNkItNkQyMjNBNjYyMDBFfSIgdXNlcmlkPSJ7NjdFOTQ3MUEtNDhFMC00OUMwLTkxQTYtOTQ1NzNDOTc4REQ0fSIgaW5zdGFsbHNvdXJjZT0ib3RoZXJpbnN0YWxsY21kIiByZXF1ZXN0aWQ9IntDMEM3MjUxQS1EN0RDLTQ2MDctOUM3Ni04QkJBQTY1QThGMDd9IiBkZWR1cD0iY3IiIGRvbWFpbmpvaW5lZD0iMCI-PGh3IGxvZ2ljYWxfY3B1cz0iOCIgcGh5c21lbW9yeT0iOCIgZGlza190eXBlPSIyIiBzc2U9IjEiIHNzZTI9IjEiIHNzZTM9IjEiIHNzc2UzPSIxIiBzc2U0MT0iMSIgc3NlNDI9IjEiIGF2eD0iMSIvPjxvcyBwbGF0Zm9ybT0id2luIiB2ZXJzaW9uPSIxMC4wLjIyMDAwLjQ5MyIgc3A9IiIgYXJjaD0ieDY0IiBwcm9kdWN0X3R5cGU9IjQ4IiBpc193aXA9IjAiLz48b2VtIHByb2R1Y3RfbWFudWZhY3R1cmVyPSIiIHByb2R1Y3RfbmFtZT0iIi8-PGV4cCBldGFnPSImcXVvdDtWUFFvUDFGK2ZxMTV3UnpoMWtQTDRQTXBXaDhPUk1CNWl6dnJPQy9jaGpRPSZxdW90OyIvPjxhcHAgYXBwaWQ9IntGMzAxNzIyNi1GRTJBLTQyOTUtOEJERi0wMEMzQTlBN0U0QzV9IiB2ZXJzaW9uPSIiIG5leHR2ZXJzaW9uPSIxMzEuMC4yOTAzLjcwIiBsYW5nPSIiIGJyYW5kPSIiIGNsaWVudD0iIiBleHBlcmltZW50cz0iY29uc2VudD1mYWxzZSI-PHVwZGF0ZWNoZWNrLz48ZXZlbnQgZXZlbnR0eXBlPSI5IiBldmVudHJlc3VsdD0iMSIgZXJyb3Jjb2RlPSIwIiBleHRyYWNvZGUxPSIwIiBzeXN0ZW1fdXB0aW1lX3RpY2tzPSI2MTEzMTQ0ODA3IiBkb25lX2JlZm9yZV9vb2JlX2NvbXBsZXRlPSIwIi8-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-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-PC9hcHA-PC9yZXF1ZXN0Pg2⤵
- Executes dropped EXE
- Loads dropped DLL
- Checks system information in the registry
- System Location Discovery: System Language Discovery
- System Network Configuration Discovery: Internet Connection Discovery
PID:4296
-
-
C:\Windows\system32\vssvc.exeC:\Windows\system32\vssvc.exe1⤵
- Checks SCSI registry key(s)
PID:3516
-
C:\Windows\system32\srtasks.exeC:\Windows\system32\srtasks.exe ExecuteScopeRestorePoint /WaitForRestorePoint:21⤵PID:3868
-
C:\Windows\system32\msiexec.exeC:\Windows\system32\msiexec.exe /V1⤵
- Enumerates connected drives
- Drops file in System32 directory
- Drops file in Windows directory
- Modifies data under HKEY_USERS
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
PID:908
-
C:\Users\Admin\Desktop\Xeno-v1.0.9-x64-New\Xeno.exe"C:\Users\Admin\Desktop\Xeno-v1.0.9-x64-New\Xeno.exe"1⤵
- Executes dropped EXE
- Loads dropped DLL
- Checks whether UAC is enabled
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:2372 -
C:\Program Files (x86)\Microsoft\EdgeWebView\Application\131.0.2903.70\msedgewebview2.exe"C:\Program Files (x86)\Microsoft\EdgeWebView\Application\131.0.2903.70\msedgewebview2.exe" --embedded-browser-webview=1 --webview-exe-name=Xeno.exe --webview-exe-version=1.0.9+87ae4f96f8a0927052c1120167982fb069afd1b4 --user-data-dir="C:\Users\Admin\Desktop\Xeno-v1.0.9-x64-New\Xeno.exe.WebView2\EBWebView" --noerrdialogs --embedded-browser-webview-dpi-awareness=1 --mojo-named-platform-channel-pipe=2372.1088.67001133462607185872⤵
- Executes dropped EXE
- Loads dropped DLL
- Checks system information in the registry
- Drops file in Windows directory
- Enumerates system info in registry
- Modifies data under HKEY_USERS
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- System policy modification
PID:2808 -
C:\Program Files (x86)\Microsoft\EdgeWebView\Application\131.0.2903.70\msedgewebview2.exe"C:\Program Files (x86)\Microsoft\EdgeWebView\Application\131.0.2903.70\msedgewebview2.exe" --type=crashpad-handler --user-data-dir=C:\Users\Admin\Desktop\Xeno-v1.0.9-x64-New\Xeno.exe.WebView2\EBWebView /prefetch:4 --monitor-self-annotation=ptype=crashpad-handler --database=C:\Users\Admin\Desktop\Xeno-v1.0.9-x64-New\Xeno.exe.WebView2\EBWebView\Crashpad --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=131.0.6778.86 "--annotation=exe=C:\Program Files (x86)\Microsoft\EdgeWebView\Application\131.0.2903.70\msedgewebview2.exe" --annotation=plat=Win64 "--annotation=prod=Edge WebView2" --annotation=ver=131.0.2903.70 --initial-client-data=0x180,0x184,0x188,0x15c,0x108,0x7ffe04336070,0x7ffe0433607c,0x7ffe043360883⤵
- Executes dropped EXE
- Loads dropped DLL
PID:2796
-
-
C:\Program Files (x86)\Microsoft\EdgeWebView\Application\131.0.2903.70\msedgewebview2.exe"C:\Program Files (x86)\Microsoft\EdgeWebView\Application\131.0.2903.70\msedgewebview2.exe" --type=gpu-process --string-annotations=is-enterprise-managed=no --noerrdialogs --user-data-dir="C:\Users\Admin\Desktop\Xeno-v1.0.9-x64-New\Xeno.exe.WebView2\EBWebView" --webview-exe-name=Xeno.exe --webview-exe-version=1.0.9+87ae4f96f8a0927052c1120167982fb069afd1b4 --embedded-browser-webview=1 --embedded-browser-webview-dpi-awareness=1 --gpu-preferences=UAAAAAAAAADgAAAEAAAAAAAAAAAAAAAAAABgAAEAAAAAAAAAAAAAAAAAAAACAAAAAAAAAAAAAAAAAAAAAAAAABAAAAAAAAAAEAAAAAAAAAAIAAAAAAAAAAgAAAAAAAAA --field-trial-handle=1824,i,4418680205344546883,8090037584042776547,262144 --variations-seed-version --mojo-platform-channel-handle=1820 /prefetch:23⤵
- Executes dropped EXE
- Loads dropped DLL
PID:4904
-
-
C:\Program Files (x86)\Microsoft\EdgeWebView\Application\131.0.2903.70\msedgewebview2.exe"C:\Program Files (x86)\Microsoft\EdgeWebView\Application\131.0.2903.70\msedgewebview2.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --string-annotations=is-enterprise-managed=no --noerrdialogs --user-data-dir="C:\Users\Admin\Desktop\Xeno-v1.0.9-x64-New\Xeno.exe.WebView2\EBWebView" --webview-exe-name=Xeno.exe --webview-exe-version=1.0.9+87ae4f96f8a0927052c1120167982fb069afd1b4 --embedded-browser-webview=1 --embedded-browser-webview-dpi-awareness=1 --field-trial-handle=2036,i,4418680205344546883,8090037584042776547,262144 --variations-seed-version --mojo-platform-channel-handle=2072 /prefetch:113⤵
- Executes dropped EXE
- Loads dropped DLL
PID:1120
-
-
C:\Program Files (x86)\Microsoft\EdgeWebView\Application\131.0.2903.70\msedgewebview2.exe"C:\Program Files (x86)\Microsoft\EdgeWebView\Application\131.0.2903.70\msedgewebview2.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=service --string-annotations=is-enterprise-managed=no --noerrdialogs --user-data-dir="C:\Users\Admin\Desktop\Xeno-v1.0.9-x64-New\Xeno.exe.WebView2\EBWebView" --webview-exe-name=Xeno.exe --webview-exe-version=1.0.9+87ae4f96f8a0927052c1120167982fb069afd1b4 --embedded-browser-webview=1 --embedded-browser-webview-dpi-awareness=1 --field-trial-handle=2352,i,4418680205344546883,8090037584042776547,262144 --variations-seed-version --mojo-platform-channel-handle=2364 /prefetch:133⤵
- Executes dropped EXE
- Loads dropped DLL
PID:4296
-
-
C:\Program Files (x86)\Microsoft\EdgeWebView\Application\131.0.2903.70\msedgewebview2.exe"C:\Program Files (x86)\Microsoft\EdgeWebView\Application\131.0.2903.70\msedgewebview2.exe" --type=renderer --string-annotations=is-enterprise-managed=no --noerrdialogs --user-data-dir="C:\Users\Admin\Desktop\Xeno-v1.0.9-x64-New\Xeno.exe.WebView2\EBWebView" --webview-exe-name=Xeno.exe --webview-exe-version=1.0.9+87ae4f96f8a0927052c1120167982fb069afd1b4 --embedded-browser-webview=1 --embedded-browser-webview-dpi-awareness=1 --video-capture-use-gpu-memory-buffer --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --js-flags="--harmony-weak-refs-with-cleanup-some --expose-gc --ms-user-locale=" --field-trial-handle=3488,i,4418680205344546883,8090037584042776547,262144 --variations-seed-version --mojo-platform-channel-handle=3500 /prefetch:13⤵
- Executes dropped EXE
- Loads dropped DLL
PID:1844
-
-
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Event Triggered Execution
2Component Object Model Hijacking
1Image File Execution Options Injection
1Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Event Triggered Execution
2Component Object Model Hijacking
1Image File Execution Options Injection
1Defense Evasion
Modify Registry
3Subvert Trust Controls
1SIP and Trust Provider Hijacking
1Discovery
Browser Information Discovery
1Network Share Discovery
1Peripheral Device Discovery
2Query Registry
5System Information Discovery
6System Location Discovery
1System Language Discovery
1System Network Configuration Discovery
1Internet Connection Discovery
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
19KB
MD5332e20083bfbcf27f5042b9a78157da2
SHA164bed3c82dc485ae671ee053e4da6a1a1a61e857
SHA256307e4023b38caf93a9554a2643b6cc7d3fb8a711beee5b0a7315eaa2cee4886f
SHA5120f489527db195f491b1f0968163f61a66cdc4bb2606577fa857e02b9b5bed9e1afc649795d4d7b3baf845af1cee7b1df3040123413b0c8f3099dae888f8ea267
-
Filesize
19KB
MD566e063840a789af9b9d33e1ce07e0c50
SHA1b1c651165d2290bf98998f4474caca781036df41
SHA256b6712e9d7b595fc7a24987ccbaf5ece04615fafdef40e50778cb1c29a327003b
SHA512c451e9a2bc1fc7f67f53de476a7bd2d994831ddd0e4e1250f77e04bd8ef8e3d3dd633491cc747b0621bff0deeabe7268c436a52c4464f0151d76dc76a3860a89
-
Filesize
21KB
MD56ae2da939c0db59ac72f2b8ebc4a6933
SHA1062236b88961247fe0ed1458a71a4794143b03c6
SHA2565e7a8d9469c83c24c0f7fcf91ec6f306d6088e5a8b910120c4bf417a5cf9c436
SHA512b46e9cdc40adabdc40383f63dd9d9f6cfdc4cf4599568d1a5228f07e17de10cb6b03c46bfbb99437ccf563957b2c72acdb26e792652058c4f92f7cd92353305f
-
Filesize
21KB
MD5d6a7917ad1f728db2ab769ca1058ba02
SHA1ac6b7c584fb14e7470f68e668ada068b0e73f94b
SHA2566a5c7acbd4dc7d682697e63ae58c3601f55fb306c8ca90adec488cd945f21a6b
SHA5121edfc5ce73e24a242748078e560965d993a736b1a87b8cfcaa7cf6cc03965ca361e4dc90c18e528d6d7d5a789b82c337f519b53e27208d2902991f2bc182101b
-
Filesize
6.6MB
MD58ae106f9f32723071b7d89c0dd260569
SHA1c66b0f1b5f01b0a6a8eb0dc32842983f05c992c3
SHA256c4b55f6e4150ef16f731a7b10012eecb83b5557ae45ac2b3d37b7865d69d1b26
SHA512e96e3f14239b4fd1c2e6defa65e1eb9920efcf870ad98bee872b6248ab13032976d0340f99b490d6b7034f2ac099ff4d5e613d8f46a812483b1996569bc31dd1
-
Filesize
12KB
MD5369bbc37cff290adb8963dc5e518b9b8
SHA1de0ef569f7ef55032e4b18d3a03542cc2bbac191
SHA2563d7ec761bef1b1af418b909f1c81ce577c769722957713fdafbc8131b0a0c7d3
SHA5124f8ec1fd4de8d373a4973513aa95e646dfc5b1069549fafe0d125614116c902bfc04b0e6afd12554cc13ca6c53e1f258a3b14e54ac811f6b06ed50c9ac9890b1
-
Filesize
179KB
MD57a160c6016922713345454265807f08d
SHA1e36ee184edd449252eb2dfd3016d5b0d2edad3c6
SHA25635a14bd84e74dd6d8e2683470243fb1bb9071178d9283b12ebbfb405c8cd4aa9
SHA512c0f1d5c8455cf14f2088ede062967d6dfa7c39ca2ac9636b10ed46dfbea143f64106a4f03c285e89dd8cf4405612f1eef25a8ec4f15294ca3350053891fc3d7e
-
Filesize
201KB
MD54dc57ab56e37cd05e81f0d8aaafc5179
SHA1494a90728d7680f979b0ad87f09b5b58f16d1cd5
SHA25687c6f7d9b58f136aeb33c96dbfe3702083ec519aafca39be66778a9c27a68718
SHA512320eeed88d7facf8c1f45786951ef81708c82cb89c63a3c820ee631c52ea913e64c4e21f0039c1b277cfb710c4d81cd2191878320d00fd006dd777c727d9dc2b
-
Filesize
212KB
MD560dba9b06b56e58f5aea1a4149c743d2
SHA1a7e456acf64dd99ca30259cf45b88cf2515a69b3
SHA2564d01f5531f93ab2af9e92c4f998a145c94f36688c3793845d528c8675697e112
SHA512e98088a368d4c4468e325a1d62bee49661f597e5c1cd1fe2dabad3911b8ac07e1cc4909e7324cb4ab39f30fa32a34807685fcfba767f88884ef84ca69a0049e7
-
Filesize
257KB
MD5c044dcfa4d518df8fc9d4a161d49cece
SHA191bd4e933b22c010454fd6d3e3b042ab6e8b2149
SHA2569f79fe09f57002ca07ae0b2a196e8cc002d2be6d5540ee857217e99b33fa4bb2
SHA512f26b89085aa22ac62a28610689e81b4dfe3c38a9015ec56dfeaff02fdb6fa64e784b86a961509b52ad968400faa1ef0487f29f07a41e37239fe4c3262a11ac2c
-
Filesize
4KB
MD56dd5bf0743f2366a0bdd37e302783bcd
SHA1e5ff6e044c40c02b1fc78304804fe1f993fed2e6
SHA25691d3fc490565ded7621ff5198960e501b6db857d5dd45af2fe7c3ecd141145f5
SHA512f546c1dff8902a3353c0b7c10ca9f69bb77ebd276e4d5217da9e0823a0d8d506a5267773f789343d8c56b41a0ee6a97d4470a44bbd81ceaa8529e5e818f4951e
-
Filesize
2.0MB
MD5965b3af7886e7bf6584488658c050ca2
SHA172daabdde7cd500c483d0eeecb1bd19708f8e4a5
SHA256d80c512d99765586e02323a2e18694965eafb903e9bc13f0e0b4265f86b21a19
SHA5121c57dc7b89e7f13f21eaec7736b724cd864c443a2f09829308a4f23cb03e9a5f2a1e5bcdc441301e33119767e656a95d0f9ede0e5114bf67f5dce6e55de7b0a4
-
Filesize
28KB
MD5567aec2d42d02675eb515bbd852be7db
SHA166079ae8ac619ff34e3ddb5fb0823b1790ba7b37
SHA256a881788359b2a7d90ac70a76c45938fb337c2064487dcb8be00b9c311d10c24c
SHA5123a7414e95c2927d5496f29814556d731aef19efa531fb58988079287669dfc033f3e04c8740697571df76bfecfe3b75659511783ce34682d2a2ea704dfa115b3
-
Filesize
24KB
MD5f6c1324070b6c4e2a8f8921652bfbdfa
SHA1988e6190f26e4ca8f7ea3caabb366cf1edcdcbbf
SHA256986b0654a8b5f7b23478463ff051bffe1e9bbdeb48744e4aa1bd3d89a7520717
SHA51263092cf13e8a19966181df695eb021b0a9993afe8f98b1309973ea999fdf4cd9b6ffd609968d4aa0b2cde41e872688a283fd922d8b22cb5ad06339fe18221100
-
Filesize
26KB
MD5570efe7aa117a1f98c7a682f8112cb6d
SHA1536e7c49e24e9aa068a021a8f258e3e4e69fa64f
SHA256e2cc8017bc24e73048c7ee68d3787ed63c3898eec61299a9ca1bab8aeaa8da01
SHA5125e963dd55a5739a1da19cec7277dc3d07afdb682330998fd8c33a1b5949942019521967d8b5af0752a7a8e2cf536faa7e62982501170319558ceaa21ed657ae8
-
Filesize
28KB
MD5a8d3210e34bf6f63a35590245c16bc1b
SHA1f337f2cbec05b7e20ca676d7c2b1a8d5ae8bf693
SHA2563b82de846ad028544013383e3c9fb570d2a09abf2c854e8a4d641bd7fc3b3766
SHA5126e47ffe8f7c2532e7854dcae3cbd4e6533f0238815cb6af5ea85087c51017ea284542b988f07692d0297ebab1bad80d7613bf424ff532e10b01c8e528ab1043a
-
Filesize
29KB
MD57937c407ebe21170daf0975779f1aa49
SHA14c2a40e76209abd2492dfaaf65ef24de72291346
SHA2565ab96e4e6e065dbce3b643c6be2c668f5570984ead1a8b3578bbd2056fbad4e9
SHA5128670746941660e6573732077f5ed1b630f94a825cf4ac9dbe5018772eaac1c48216334757a2aeaa561034b4d907162a370b8f0bae83b34a09457fafe165fb5d7
-
Filesize
29KB
MD58375b1b756b2a74a12def575351e6bbd
SHA1802ec096425dc1cab723d4cf2fd1a868315d3727
SHA256a12df15afac4eb2695626d7a8a2888bdf54c8db671043b0677180f746d8ad105
SHA512aec4bb94fde884db79a629abcff27fd8afb7f229d055514f51fa570fb47a85f8dfc9a54a8f69607d2bcaf82fae1ec7ffab0b246795a77a589be11fad51b24d19
-
Filesize
29KB
MD5a94cf5e8b1708a43393263a33e739edd
SHA11068868bdc271a52aaae6f749028ed3170b09cce
SHA2565b01fe11016610d5606f815281c970c86025732fc597b99c031a018626cd9f3c
SHA512920f7fed1b720afdb569aec2961bd827a6fc54b4598c0704f65da781d142b1707e5106a459f0c289e0f476b054d93c0b733806af036b68f46377dde0541af2e7
-
Filesize
29KB
MD57dc58c4e27eaf84ae9984cff2cc16235
SHA13f53499ddc487658932a8c2bcf562ba32afd3bda
SHA256e32f77ed3067d7735d10f80e5a0aa0c50c993b59b82dc834f2583c314e28fa98
SHA512bdec1300cf83ea06dfd351fe1252b850fecea08f9ef9cb1207fce40ce30742348db953107ade6cdb0612af2e774345faf03a8a6476f2f26735eb89153b4256dc
-
Filesize
28KB
MD5e338dccaa43962697db9f67e0265a3fc
SHA14c6c327efc12d21c4299df7b97bf2c45840e0d83
SHA25699b1b7e25fbc2c64489c0607cef0ae5ff720ab529e11093ed9860d953adeba04
SHA512e0c15b166892433ef31ddf6b086680c55e1a515bed89d51edbdf526fcac71fb4e8cb2fadc739ac75ae5c2d9819fc985ca873b0e9e2a2925f82e0a456210898f9
-
Filesize
29KB
MD52929e8d496d95739f207b9f59b13f925
SHA17c1c574194d9e31ca91e2a21a5c671e5e95c734c
SHA2562726c48a468f8f6debc2d9a6a0706b640b2852c885e603e6b2dec638756160df
SHA512ea459305d3c3fa7a546194f649722b76072f31e75d59da149c57ff05f4af8f38a809066054df809303937bbca917e67441da2f0e1ea37b50007c25ae99429957
-
Filesize
30KB
MD539551d8d284c108a17dc5f74a7084bb5
SHA16e43fc5cec4b4b0d44f3b45253c5e0b032e8e884
SHA2568dbd55ed532073874f4fe006ef456e31642317145bd18ddc30f681ce9e0c8e07
SHA5126fa5013a9ce62deca9fa90a98849401b6e164bbad8bef00a8a8b228427520dd584e28cba19c71e2c658692390fe29be28f0398cb6c0f9324c56290bb245d06d2
-
Filesize
28KB
MD516c84ad1222284f40968a851f541d6bb
SHA1bc26d50e15ccaed6a5fbe801943117269b3b8e6b
SHA256e0f0026ddcbeafc6c991da6ba7c52927d050f928dba4a7153552efcea893a35b
SHA512d3018619469ed25d84713bd6b6515c9a27528810765ed41741ac92caf0a3f72345c465a5bda825041df69e1264aada322b62e10c7ed20b3d1bcde82c7e146b7e
-
Filesize
28KB
MD534d991980016595b803d212dc356d765
SHA1e3a35df6488c3463c2a7adf89029e1dd8308f816
SHA256252b6f9bf5a9cb59ad1c072e289cc9695c0040b363d4bfbcc9618a12df77d18e
SHA5128a6cbcf812af37e3ead789fbec6cba9c4e1829dbeea6200f0abbdae15efd1eda38c3a2576e819d95ed2df0aafd2370480daa24a3fe6aeb8081a936d5e1f8d8ed
-
Filesize
28KB
MD5d34380d302b16eab40d5b63cfb4ed0fe
SHA11d3047119e353a55dc215666f2b7b69f0ede775b
SHA256fd98159338d1f3b03814af31440d37d15ab183c1a230e6261fbb90e402f85d5f
SHA51245ce58f4343755e392037a9c6fc301ad9392e280a72b9d4b6d328866fe26877b2988c39e05c4e7f1d5b046c0864714b897d35285e222fd668f0d71b7b10e6538
-
Filesize
30KB
MD5aab01f0d7bdc51b190f27ce58701c1da
SHA11a21aabab0875651efd974100a81cda52c462997
SHA256061a7cdaff9867ddb0bd3de2c0760d6919d8d2ca7c7f889ec2d32265d7e7a75c
SHA5125edbda45205b61ac48ea6e874411bb1031989001539650de6e424528f72ec8071bd709c037c956450bb0558ee37d026c26fdb966efceb990ed1219f135b09e6e
-
Filesize
30KB
MD5ac275b6e825c3bd87d96b52eac36c0f6
SHA129e537d81f5d997285b62cd2efea088c3284d18f
SHA256223d2db0bc2cc82bda04a0a2cd2b7f6cb589e2fa5c0471a2d5eb04d2ffcfcfa0
SHA512bba581412c4297c4daf245550a2656cdc2923f77158b171e0eacf6e933c174eac84580864813cf6d75d73d1a58e0caf46170aee3cee9d84dc468379252b16679
-
Filesize
27KB
MD5d749e093f263244d276b6ffcf4ef4b42
SHA169f024c769632cdbb019943552bac5281d4cbe05
SHA256fd90699e7f29b6028a2e8e6f3ae82d26cdc6942bd39c4f07b221d87c5dbbfe1e
SHA51248d51b006ce0cd903154fa03d17e76591db739c4bfb64243725d21d4aa17db57a852077be00b9a51815d09664d18f9e6ad61d9bc41b3d013ed24aaec8f477ad9
-
Filesize
27KB
MD54a1e3cf488e998ef4d22ac25ccc520a5
SHA1dc568a6e3c9465474ef0d761581c733b3371b1cd
SHA2569afbbe2a591250b80499f0bf02715f02dbcd5a80088e129b1f670f1a3167a011
SHA512ce3bffb6568ff2ef83ef7c89fd668f6b5972f1484ce3fbd5597dcac0eaec851d5705ed17a5280dd08cd9812d6faec58a5561217b897c9209566545db2f3e1245
-
Filesize
29KB
MD528fefc59008ef0325682a0611f8dba70
SHA1f528803c731c11d8d92c5660cb4125c26bb75265
SHA25655a69ce2d6fc4109d16172ba6d9edb59dbadbc8af6746cc71dc4045aa549022d
SHA5122ec71244303beac7d5ce0905001fe5b0fb996ad1d1c35e63eecd4d9b87751f0633a281554b3f0aa02ee44b8ceaad85a671ef6c34589055797912324e48cc23ed
-
Filesize
28KB
MD59db7f66f9dc417ebba021bc45af5d34b
SHA16815318b05019f521d65f6046cf340ad88e40971
SHA256e652159a75cbab76217ecbb4340020f277175838b316b32cf71e18d83da4a819
SHA512943d8fc0d308c5ccd5ab068fc10e799b92465a22841ce700c636e7ae1c12995d99c0a93ab85c1ae27fefce869eabadbeafee0f2f5f010ad3b35fa4f748b54952
-
Filesize
28KB
MD5b78cba3088ecdc571412955742ea560b
SHA1bc04cf9014cec5b9f240235b5ff0f29dbdb22926
SHA256f0a4cfd96c85f2d98a3c9ecfadd41c0c139fdb20470c8004f4c112dd3d69e085
SHA51204c8ab8e62017df63e411a49fb6218c341672f348cb9950b1f0d2b2a48016036f395b4568da70989f038e8e28efea65ddd284dfd490e93b6731d9e3e0e0813cf
-
Filesize
28KB
MD5a7e1f4f482522a647311735699bec186
SHA13b4b4b6e6a5e0c1981c62b6b33a0ca78f82b7bbd
SHA256e5615c838a71b533b26d308509954907bcc0eb4032cdbaa3db621eede5e6bfa4
SHA51222131600bbac8d9c2dab358e244ec85315a1aaebfc0fb62aaa1493c418c8832c3a6fbf24a6f8cf4704fdc4bc10a66c88839a719116b4a3d85264b7ad93c54d57
-
Filesize
27KB
MD5cbe3454843ce2f36201460e316af1404
SHA10883394c28cb60be8276cb690496318fcabea424
SHA256c66c4024847d353e9985eb9b2f060b2d84f12cc77fb6479df5ffc55dbda97e59
SHA512f39e660f3bfab288871d3ec40135c16d31c6eb1a84136e065b54ff306f6f8016a788c713d4d8e46ad62e459f9073d2307a6ed650919b2dd00577bbfd04e5bd73
-
Filesize
28KB
MD5d45f2d476ed78fa3e30f16e11c1c61ea
SHA18c8c5d5f77cd8764c4ca0c389daee89e658dfd5e
SHA256acf42b90190110ccf30bcfb2626dd999a14e42a72a3983928cba98d44f0a72e2
SHA5122a876e0313a03e75b837d43e9c5bb10fcec385fbb0638faa984ee4bb68b485b04d14c59cd4ed561aaa7f746975e459954e276e73fc3f5f4605ae7f333ce85f1b
-
Filesize
29KB
MD57c66526dc65de144f3444556c3dba7b8
SHA16721a1f45ac779e82eecc9a584bcf4bcee365940
SHA256e622823096fc656f63d5a7bbdf3744745ef389c92ec1b804d3b874578e18c89d
SHA512dbc803c593ae0b18fd989fdc5e9e6aee8f16b893ae8d17e9d88436e2cd8cae23d06e32e4c8a8bf67fc5311b6f2a184c4e6795fed6d15b3d766ef5affc8923e2f
-
Filesize
30KB
MD5b534e068001e8729faf212ad3c0da16c
SHA1999fa33c5ea856d305cc359c18ea8e994a83f7a9
SHA256445051ef15c6c872bed6d904169793837e41029a8578eaf81d78a4641ef53511
SHA512e937d2e0f43ade3f4a5e9cdeb6dd8c8ad8b5b50a7b6b779bda727a4fe1ced93abd06720395cc69a274ce3b0f7c6b65e1eba1ecf069db64edb80d007fbb4eedbb
-
Filesize
30KB
MD564c47a66830992f0bdfd05036a290498
SHA188b1b8faa511ee9f4a0e944a0289db48a8680640
SHA256a9b72fcb3bdb5e021b8d23b2de0caeca80ddc50420088b988a5b7503f2d7c961
SHA512426546310c12aeb80d56e6b40973a5f4dffef72e14d1ac79e3f267e4df2a0022b89e08bba8ab2ffa24f90b0c035a009bed3066201e30fe961d84ed854e48f9c5
-
Filesize
28KB
MD53b8a5301c4cf21b439953c97bd3c441c
SHA18a7b48bb3d75279de5f5eb88b5a83437c9a2014a
SHA256abc9822ee193c9a98a21202648a48ecd69b0cb19ff31c9bbf0c79dab5f9609b0
SHA512068166cfdf879caf4e54fe43c5265a692fcaf6a9dcbf151335fd054bbec06260bc5ed489de6d46ca3fc0044bc61fa1468fea85373c6c66349620618ee869383a
-
Filesize
30KB
MD5c90f33303c5bd706776e90c12aefabee
SHA11965550fe34b68ea37a24c8708eef1a0d561fb11
SHA256e3acc61d06942408369c85365ac0d731c5f3c9bc26e3f1e3bb24226d0879ad9c
SHA512b0c1a9d7df57d68e5daf527703f0b6154a2ef72af1a3933bda2804408f6684b5b09b822522193243fd0756f80f13d3ab0647c90d2bed1a57b4a9fea933b0aa9a
-
Filesize
6.8MB
MD5ee40308e2ffbc9001db2324ff6420492
SHA147cabfe872311f65534cbd4b87d707ccdef559d1
SHA25638cd32dedb5c8c2af8ecd56827af5b4477a4b9ca3e518199d389a261baa999a5
SHA5125f5fd0db005d49d63eaa81b288d2d6d40ce9c84cafd1c75d33723e47f23341d5ff254c2ed6274790242ad53f5360467d121cf1196ec7a073d4506166248041c3
-
C:\Program Files (x86)\Roblox\Versions\version-8aa36bbf0eb1494a\WebView2RuntimeInstaller\MicrosoftEdgeWebview2Setup.exe
Filesize1.5MB
MD5610b1b60dc8729bad759c92f82ee2804
SHA19992b7ae7a9c4e17a0a6d58ffd91b14cbb576552
SHA256921d51979f3416ca19dca13a057f6fd3b09d8741f3576cad444eb95af87ebe08
SHA5120614c4e421ccd5f4475a690ba46aac5bbb7d15caea66e2961895724e07e1ec7ee09589ca9394f6b2bcfb2160b17ac53798d3cf40fb207b6e4c6381c8f81ab6b4
-
Filesize
14KB
MD5db7ee975f3a24d50309256ebbd65e3ec
SHA1c5ba6beb8b1658e6be68d7b70f9b8ac1e8822d11
SHA256b861b05d8c45b55248f46e10e9feec2d3a56885e990625ac7f09715d4480e81e
SHA512afcbbdf34a52fd4783889dc13d92800dab8f76919d7448c2e3edb394844ad1e7d755cffa60e3eb4bdf8c709493a775e4ae9a4410d5c51646aa3258bac1614f16
-
Filesize
64KB
MD5b5ad5caaaee00cb8cf445427975ae66c
SHA1dcde6527290a326e048f9c3a85280d3fa71e1e22
SHA256b6409b9d55ce242ff022f7a2d86ae8eff873daabf3a0506031712b8baa6197b8
SHA51292f7fbbcbbea769b1af6dd7e75577be3eb8bb4a4a6f8a9288d6da4014e1ea309ee649a7b089be09ba27866e175ab6f6a912413256d7e13eaf60f6f30e492ce7f
-
Filesize
4B
MD5f49655f856acb8884cc0ace29216f511
SHA1cb0f1f87ec0455ec349aaa950c600475ac7b7b6b
SHA2567852fce59c67ddf1d6b8b997eaa1adfac004a9f3a91c37295de9223674011fba
SHA512599e93d25b174524495ed29653052b3590133096404873318f05fd68f4c9a5c9a3b30574551141fbb73d7329d6be342699a17f3ae84554bab784776dfda2d5f8
-
Filesize
1008B
MD5d222b77a61527f2c177b0869e7babc24
SHA13f23acb984307a4aeba41ebbb70439c97ad1f268
SHA25680dc3ffa698e4ff2e916f97983b5eae79470203e91cb684c5ccd4ff1a465d747
SHA512d17d836ea77aeaff4cd01f9c7523345167a4a6bc62528aac74acde12679f48079d75d159e9cea2e614da50e83c2dcd92c374c899ea6c4fe8e5513d9bf06c01ff
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\5ba3d650-c964-4034-9302-338d526cee6c.tmp
Filesize11KB
MD5a8e12535a68eca967ae5c5bab33d4a81
SHA1b7d464687fcefa56ff5ee74738624342ebdade87
SHA256e5ba4fb953c26abc9ba3efdd943b72bd198e19d042ec3775f07ff33cf4a10c51
SHA512620f436829d1e61737dd1320e68b8e1a2f07c6dc2996bfafcb69bb1f5224dcc519212fcd39b0ea42698b397108afdf79030d4d45d489208f233f0079cdeed134
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\6a278432-ab42-48a3-a40f-3b0be04665d9.tmp
Filesize9KB
MD58fbe1b3ab1088ffebb2261043582c43b
SHA11970083686efe0b0b7fffa423046c24b3b9d0713
SHA256526afcae746bef126ed913d7b03310b614e241f9fcb6f54da068193c083ecfe1
SHA5127252862f33e17083c7ede8d16334b53e36f070684e74afa42ff2106a89f6d5a2bffa97f963c12713aabf071408d8832249c28540c999aa90e624c43c244ed243
-
Filesize
649B
MD54a7ffe0596786d4d9c189869ccbeb571
SHA18903031657582e15c17966b4043840314bc94b53
SHA256cd7bd4c93e6f7776d3cbef22566bab72fbcdef473f369c4f966952e46dcb73fc
SHA51287a05da654a1610137746c5865a7ac4e5b60a2d85b5429e619532e9882c3c16e6a6d8802a2768aaa243036c3573704dc1500511265105d7fe797eeb10788ca43
-
Filesize
51KB
MD5588ee33c26fe83cb97ca65e3c66b2e87
SHA1842429b803132c3e7827af42fe4dc7a66e736b37
SHA256bbc4044fe46acd7ab69d8a4e3db46e7e3ca713b05fa8ecb096ebe9e133bba760
SHA5126f7500b12fc7a9f57c00711af2bc8a7c62973f9a8e37012b88a0726d06063add02077420bc280e7163302d5f3a005ac8796aee97042c40954144d84c26adbd04
-
Filesize
215KB
MD52be38925751dc3580e84c3af3a87f98d
SHA18a390d24e6588bef5da1d3db713784c11ca58921
SHA2561412046f2516b688d644ff26b6c7ef2275b6c8f132eb809bd32e118208a4ec1b
SHA5121341ffc84f16c1247eb0e9baacd26a70c6b9ee904bc2861e55b092263613c0f09072efd174b3e649a347ef3192ae92d7807cc4f5782f8fd07389703d75c4c4e2
-
Filesize
4KB
MD56cc3ac99eb71c8657e3ea46b37858b10
SHA1aa6c1b58651f58732984ce0d193a04c5c60ad1c6
SHA2560b9983b76e9aceb43fd1971243c00f34960ddf6db711b6ae110557e1037aa26c
SHA5127e789e90bac1274d3f5ac0887a72852c3fb985a4aadf641051a925e734ee435bf23bdca619e3d1f4fdc97f14e1247ed29d7eceac5f9579e70a034c815a303fb2
-
Filesize
4KB
MD5a5f1d1acab87b86f9945cdbd5f3919b0
SHA1bab3ebee2e25d99098482178d2207309ef38e3c7
SHA256ba97af569cc9863530f9b7f3b5c2353e827675a7c04f3c3dafd5d994db790c77
SHA51280e003d5b2280f38ef8bdd0f6bd4bdf120337cbd435acba20652faff767c97c53af6999d80d281db4421e7d3904444e7ecdaed7888fa2c627cd2ff87fdc75e03
-
Filesize
1KB
MD5a6c5a5bb3e0e125ccbdfa95798ce1d18
SHA108d15faf8447f598f9ef7e003bcce61f472be9fb
SHA25696a526105475889f192c0d0b766f15a464049bfa027a8e2e4ce047fedd8aaf4a
SHA51252770752ad8cf3e3359038dba1cd926706eec6718be82437299398059770a89a98e5f2edd7a32932e3d0e7360460896cda941a378a2c382900458f35cf8c28ce
-
Filesize
5KB
MD59dc0ec0083bfd7c5cd116e29b4b43296
SHA1d72d8d208e8d900fc4f9ec3982257bf3effc9ed9
SHA2560ad7d6b62e907c4e902597f7aa1daa0ebcd2426265f3308ed6544ac1657e39cd
SHA5122dfa5c7da6e396a4b609dfe72a547463abd0c787f9284d7ddb51546527edca6ee2d062057fadb500dae0763d08801ac09e23b6cf729efb5b3381ae6c0e054905
-
Filesize
4KB
MD5005f00cb95dfdeec9216240783cdb9d9
SHA1e219fd7e36fb92c019ae4167d6f0efe1a20cde4f
SHA2569f90c63b689c5deee1b24415d76beaa6e4cd29e0f9fbc5d000c51be79d583174
SHA512cf984a2b30d27de3982f5757266b9fa5ca2b00c100c70b8f0885b5ddea53d65c6f9c9a51c49e21fe8aa8a12f4a3f3e46126e7b96c87c7396b17ff9e68d811a15
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Extensions\ghbmnnjooekpmoecnnnilnnbdlolhkhi\1.84.1_0\_locales\en_CA\messages.json
Filesize851B
MD507ffbe5f24ca348723ff8c6c488abfb8
SHA16dc2851e39b2ee38f88cf5c35a90171dbea5b690
SHA2566895648577286002f1dc9c3366f558484eb7020d52bbf64a296406e61d09599c
SHA5127ed2c8db851a84f614d5daf1d5fe633bd70301fd7ff8a6723430f05f642ceb3b1ad0a40de65b224661c782ffcec69d996ebe3e5bb6b2f478181e9a07d8cd41f6
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Extensions\ghbmnnjooekpmoecnnnilnnbdlolhkhi\1.84.1_0\dasherSettingSchema.json
Filesize854B
MD54ec1df2da46182103d2ffc3b92d20ca5
SHA1fb9d1ba3710cf31a87165317c6edc110e98994ce
SHA2566c69ce0fe6fab14f1990a320d704fee362c175c00eb6c9224aa6f41108918ca6
SHA512939d81e6a82b10ff73a35c931052d8d53d42d915e526665079eeb4820df4d70f1c6aebab70b59519a0014a48514833fefd687d5a3ed1b06482223a168292105d
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\IndexedDB\https_www.roblox.com_0.indexeddb.leveldb\CURRENT
Filesize16B
MD546295cac801e5d4857d09837238a6394
SHA144e0fa1b517dbf802b18faf0785eeea6ac51594b
SHA2560f1bad70c7bd1e0a69562853ec529355462fcd0423263a3d39d6d0d70b780443
SHA5128969402593f927350e2ceb4b5bc2a277f3754697c1961e3d6237da322257fbab42909e1a742e22223447f3a4805f8d8ef525432a7c3515a549e984d3eff72b23
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\IndexedDB\https_www.roblox.com_0.indexeddb.leveldb\LOG.old
Filesize387B
MD5eae5d89dd29821f67447bd22ec291119
SHA1dbc5e9fad48dafcadb39b399b85fa45b7170ba8b
SHA25626640099a5854facd39138fbb1d12713d4899ea4c520210dee3a1a6ec7cf5f21
SHA512e7ae28ca72ba7b13b9c4b7fb7b98bf1bbfc541fa5f1c8e5114fe28146610bdd01b80c27929d81f7bd2b83aade1ab14284ce01504e7c8e9c032ef802580c3d88c
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\IndexedDB\https_www.roblox.com_0.indexeddb.leveldb\LOG.old
Filesize387B
MD5826e2bb429a4f56c9c7bd84d61ce2b65
SHA14860c7917ea03fbce2636c49a90215e895e5345f
SHA256ed4ab5722f8b540a0f6eaecd4294b1a80df5eaff5cb1b834bc503a98b81b11f4
SHA51219bb68edf73769519ed4f9b11c3ff692794443f5d2f6678dd4c7aab7caacdcf5217cf92b6821afe81fd3aba4a890253062c5a9722d95f627616518e60c05bf2c
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\IndexedDB\https_www.roblox.com_0.indexeddb.leveldb\LOG.old~RFe58e3c4.TMP
Filesize510B
MD5a05911b51cf47ed82f746eb4fe1712d8
SHA1c9dc39b1625b6c0722210272e77b7a1b65707553
SHA256244d9fed44b58e9f90816d9ef2715c5088f67dbac67c27ad51a3613961035be6
SHA512cb847c5abc4b5d46cad6ebc1e304e7d099e239fc0544d2182b69eb30240b77d869b612068cb45449c4947ce451e348b9688427b43de96d7c51f06987589f07e8
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\IndexedDB\https_www.roblox.com_0.indexeddb.leveldb\MANIFEST-000001
Filesize23B
MD53fd11ff447c1ee23538dc4d9724427a3
SHA11335e6f71cc4e3cf7025233523b4760f8893e9c9
SHA256720a78803b84cbcc8eb204d5cf8ea6ee2f693be0ab2124ddf2b81455de02a3ed
SHA51210a3bd3813014eb6f8c2993182e1fa382d745372f8921519e1d25f70d76f08640e84cb8d0b554ccd329a6b4e6de6872328650fefa91f98c3c0cfc204899ee824
-
Filesize
6KB
MD5dbbd157b6a6695136273421a4df2fea8
SHA16db9292902527d3b9de9b9c8dfb68a6695d0c8c9
SHA25657b18ceb3a5656ccf4b09aba46b91188d97c5dbe3ffcc1eed063272ff602bfe5
SHA512eed46657b45dc164c902ed1b150ccf68023203ce5b25a586d0e1aa2f939ef34137cd7295230dc4310e1fd83548673320e6fb60aba7e701d6aaf0940dbb826b37
-
Filesize
5KB
MD588f56afeea2e925a58204f80c41d4770
SHA1099246aeb452e7199c41cec1aebfb2c784894610
SHA25640c3830bd2fbe387d44d2ea39e48b2023fa9accd5bdd0b2a4b4f891df9901520
SHA5127c41dc51de95e6a860bdbd0837f250f3e62299e5b328ee85ffe42791b1926845734bdfea9b1779c827f4feb7c7a0e5158c25353d1a1828392617499fa6be0da6
-
Filesize
2B
MD5d751713988987e9331980363e24189ce
SHA197d170e1550eee4afc0af065b78cda302a97674c
SHA2564f53cda18c2baa0c0354bb5f9a3ecbe5ed12ab4d8e11ba873c2f11161202b945
SHA512b25b294cb4deb69ea00a4c3cf3113904801b6015e5956bd019a8570b1fe1d6040e944ef3cdee16d0a46503ca6e659a25f21cf9ceddc13f352a3c98138c15d6af
-
Filesize
3KB
MD5895520e0708c8db35679ad9425550efc
SHA14d7965902b0405fd2b3d74d953a1e6795ad58aca
SHA2566346bc022631d42e5d8932eba3383c027a806ce0ba24130ccfea0132e4b92f7e
SHA512e54e00cfa3a057398d47516a3194a2dc56fb85867dd2bcafce66d58c4732bba7db9dc5950524c21b3b35d4c37834ccc9a35a3548d6bb8a5144fd18cbfb83bcd2
-
Filesize
4KB
MD53f7650ec99b85759763260a09d8a03e7
SHA1c4f76316f0b57ebbe02a87c744f715fbf4edefeb
SHA256f02c82b5712e1ba97b3f0fca9f4dc9b63cca024e6eccc1948235598d6a650a66
SHA51276f4bb4a3d1e71221f9b5f9a7c2353f5ea4e944251a2e3f4d552b6ac1b1f7e6b895d3892df7ce2183b9ddc93fe4cd89a8cf582e9490ed59ba6081bba717ea6fe
-
Filesize
4KB
MD55d09feb8c8726fb8a890081748dbb272
SHA16d803bba048e6c3034e669aaec0adcee673bfab2
SHA2567b25a61efdeae063d62499199f79bd19dfd4d663b40acd18001c92c21561d3d5
SHA51276d037edb94a8855ae41c72b1cea77b6aa413b0c6f2d3927fb7ec3b3e0748ed2091ba98e930e7b3d240c4aa4b44a02eb2686f7d813844794e29b0223cf986510
-
Filesize
4KB
MD5cdf83cfd178e60ac48ed963b51e10b12
SHA14a220b235da6bafc09e0e33b5871dc2f31fdc94c
SHA256c84d6f0596b51503c43b112fb0b95e444af8e8f1f250d4456dd2bd2a20272332
SHA512894ea87ac8412a8691af9fef4ae5f97415230dd1d0c21ebf1d31d421f2e5747ec5319c01792f3c17f42addb50ed0b615a15f8f50c5b0c8e3a160937596b9b2c1
-
Filesize
4KB
MD5f49b75a0687eaf736d5d9f7cfd819951
SHA114303d3eb568f60ee65860d266b249eedb6e2582
SHA2562c29f98743c0895cbb3a51a5340a22a5794492bfafab583acdedbab5b8476ee2
SHA512ff5ecee4208e3fbf801a32660704f79e24f9bb9afef883b4b85d660338fc0b19d89483748292df04aec4857fd9abb884a72cea51da06fadd3dce4dbd7d628a18
-
Filesize
4KB
MD5e9c06ae6542d2f19bdcca86f10437ddf
SHA11fdaf1d8f2c64fa1cdbe07faa563548763f0f67b
SHA2562572ddd071eeb28c8424dab105f02368f8893398db6ba033e1ae66a29dec62e9
SHA51281f9dc747f7dbcb4663b44a4ca130ed2087ef4c52f4a71ca9352f98f846dfcb0a3571d7cd8dea2d63d47f64f7e0a01dca40c14473347783f2adb93a2ffe75a2f
-
Filesize
4KB
MD50f2175a526129c664cd7d78c6f1bc7cc
SHA1b0b3db0ffdb1d6b59dbf2148cb0906b5326a6183
SHA256b5b542f85c27caa1c4e3d18fc9a9e59e9c9717b55d838b858180580615398171
SHA512869c84959bf5048a6124d6c4260f4f04ab69e94c3db70d2d83d04047b2ab95faff25ccaa60f9e44859a7dd3368bc3784ed06a68976c0fd7b23f8d793d7f98dd1
-
Filesize
1KB
MD5a8642ce7348f31387a2a0babad01416d
SHA1f5ca6d78df9e60fc132af597582cb8cabbde2b5d
SHA25668a940678ef7c5b2f72b8837ad6474cc8e8edc6751b941f58242927ae18181da
SHA512219b30c97fa538e75289bdea9c51aa7219fcbc766480911e3dc7c42d9b3599025e16f5b971e8c0e2bdfbc333bab424f881d4996bc3821a157a95d44a2a430f96
-
Filesize
4KB
MD5bdebc01d16ebc276057c4d31ca26c451
SHA1a66116e3de42c1beaa2a34ded1e01b4c5bd5f1c9
SHA25638f065842e7e16a07f243551965bd338e821b0c01a6b1f8560c9d58ad4e35401
SHA512066f7e1fd72e19305749a9b183185b7e8cfbcb1c93afaa765d2cd9026e2c6e1b61daa05c61e81dd22b241d9ed802ac3088bd7d3d1074cbf6090f18d7d0e745eb
-
Filesize
1KB
MD5cfdbf2805473c1239b3c43b9ef5f7fd1
SHA1fe6851c4d933c7e430feddc874d98543ffbb8220
SHA256e03aec53a5350eb1f27a29024135b2cea2c8eacfe73f37b9f5e9c65a6879e217
SHA5129fe1d3b9651fdbfb862640986277bac9ffc681e59f9bb2a1b2ba460f001cb9606c9b63fa36d79883cbb9e7750f67742561fbcf41e02f9c2425513bf9f10983e3
-
Filesize
4KB
MD5832ad293e38a5fd31d5361dea996854d
SHA1056bd51101224c713d7723505b5f5bb3d1dbca49
SHA256220ac7ef30d7ead4e26a3629c21fd06db4ebd7ec33089a0669dc83fc425d84ab
SHA51225d4c8c66a543c0253c45500dbc6c30b679b12fcb934924e5bdbf4e5a3fd274475117f829c970ef8e690b46ee2f058de38d2fb75f0ef0a2c3fee25d87346d427
-
Filesize
4KB
MD5ce4f88f4c678a7ae32d835dbaf834083
SHA187272d7f43bc8e2f1c90999f4072350fc39aae57
SHA256a69b990a527950a0baabd781bd4d346a950318551738019b904a81e641a482de
SHA51263e278e4fd12a1886587d2d8a537db55258b6d1325e246c76d21d1507270d840f3090224533d4b34dae398457e3567a1896c422abf4f54953a08e998ba6e42ab
-
Filesize
4KB
MD58344d0b2592986df7720d123d2704bbc
SHA1844f07a89de48cc0956373f56949b8395b367f6d
SHA2567213c76ed669e008d60793bfa556b9189ebdc870128cb33000c99068d1d021e2
SHA5124c964aae26d5bf2f29b30f52958fa2e0d6b6e27d9ad3149aa55b5745d711a89098e9f15e4616c6507d09c4ac9fac41b3ef4000a74b6d08e33e1e576d06c5970a
-
Filesize
4KB
MD531da321b6ca43f7de65028c0de4fde03
SHA157c23fc3fe6194ddd6929ebe7dd3bb503e7015e0
SHA256b331478b00615599740d6405b9d29f3a18b9e76839edb266aaa765587701caaf
SHA512096f1f6e1c9be58926fdebbb95d9bb708b82224eb00fe0b6832a7c4f44dfd7bc1447e3c2f8a02b1ccc7b553a5ddbec7f9f12bb390d7c50d337a46778cb2f8fa0
-
Filesize
4KB
MD525826315916015dc7c7f547aa7560978
SHA10414f93d92d4f2189960fae4c62874dc5fc061ab
SHA2560f217ba393918c7bdf7d6be6ffb9a8bb75ca23d90dc6a06fc247f58571f746ba
SHA512c08164598dea520cd719d54f3cca5dda5f8b637256f9b10d63e66146baf2ca1c2b61b519f477536effc5dffe2ec984e54b957f4f2d7207eb24d2c4b5a2323d91
-
Filesize
4KB
MD518bc234558cd29ada2889787ee2f124d
SHA140a309eee7ea6ce690be81624910ac9b3896e644
SHA256d56b9b3e56d90b45215274b03dae03a84db70ba9e0b2c551f05072000de77dfd
SHA51224d30ec06c38ab20565a13549c0edca682071bbd07e9acc2838888aeb72f59a8cf4ef46a33578b6a38727b3a90c1f40e396a58b6a331fb1a6af6a2ec3858cbc7
-
Filesize
4KB
MD5ebb7535c726e717b31822431d3e4e550
SHA159559b700dde77ab3f3dd2bffb3f74f35c3cc6c6
SHA256520604340d779b74a4844792a5fb97857f4a619cc4ebb9a25739b14c4c2e55b5
SHA512da7293b4802b550109e58cf0de529c044b1e1d3b528a2fe8e4b6842e774822c2b19c50dc10425b3474107f8aaf8270a0af9e75b9df8fb1760e0f00c9bbdee03f
-
Filesize
4KB
MD561a9d471a484480fd735aa9d75c5ccc3
SHA1414a502fbe08642cca5ca250fa5d59cf828ea558
SHA25692e4f3d7283378ec8dc30b007e6c32eef903532a95c30a088a36a53f57c999d7
SHA5128e539627a1bf60283740cc0850d1b73ca7d9b4e5e3a2c486c268e70cebef310b845a3bd4db1d21518a9dabb86ef2e50e90710a5d0143c66846c89e3a544f9c2e
-
Filesize
4KB
MD55901d572a402bc43e7bd2d6ab04414c8
SHA1166ea3bba8a4e7b312807c6090e1fab21e422668
SHA256f797271bc28aece31c031f2000d582ced44d516e950b5f9a8e19ca679421e5f5
SHA512d21606bad02133917e81f54eb2808ec3dde76941b6b26ccd6ea9acea3a3fcc2ea8f3d2297845c17b8a03a586245b4b391c44d8328503bf02b2e4e7aa7feeddbe
-
Filesize
4KB
MD5f9569d04e434c11596208ae41ac7ab62
SHA1ca306b1c39a2eb23f71432b104ee1af2d5af1a66
SHA2569ab58a8484627fd85bea0dce5236ab7e389095226bd236319c5ebc5f2a997f11
SHA5129ffd4f2c4445becfc49187d28320983e4c600880a7dc733f583fcf1d708ad5fb7d1bba96135524202364101fad531aaa499c4fab6f9afef3d6a78e85424a9da5
-
Filesize
4KB
MD5497ba8f749da500d32d135c4071b5787
SHA1003a447cecca2c17fe29dbfbc2bb15a770c32407
SHA256e257869b0dd290afcc284332528f4c42ab058b0331420de481e309aa08a8bdb2
SHA5124484b0fa173df04d656a6b129a2bf3fe271ba098e6286e0a622756154df8a548c5752abadef2fa071d8328ab03cbda336e9d721d780bfb302e8b5f72ffbc31b9
-
Filesize
4KB
MD57ba04c50e6dd66730ffb405b8de7b03d
SHA186848e1c847df47b2d8063b94c0ae2b7e7821afc
SHA256bb42449b1f7aa27693e800c9c56c3900f9c6bcd0f51b889c4b8ecb4eae6cb5bd
SHA512db5329e5d47b1294e91c599b636d620ff69879e3f7264060e382871210b6dc1fb2a7c35bafbb320b42c0a528497d295d083ee7908098873daf01caa20e79f04f
-
Filesize
4KB
MD5bcc0a6f5f42ee86abb08009ead15ebd3
SHA16e9e467451b6f10c065d1379abf2962d2fd07ee5
SHA256d0ac490e43b8556ca87a34081d4831c9671e582cc31c73381f0311e9610912a3
SHA51259efe2294e294cbcd8a5b98f8c6f2a8c508c9d6e0912939abead267475b746cf694cd884594fe586fe6a30a9f78bc94f0e57ecc67a9a7764dde2f1bb1f3bb1c7
-
Filesize
4KB
MD51a6cce8a57546cb65cc5bd87e258a154
SHA1f9bfe180ba471c4da721d48e821bd9129a86a27e
SHA2569ca64b41078acfc7f7363ada17bec686dac5e1709da2e29cc985d4aa70d3b95f
SHA512c551493a7b9b02e61a3e7afb6a3bf8713acf280f984f76072d40a1f38f5f19aec48daf879f0cafd6636d8104fc5157b00f7a1df1224ba98b67a7f64537164570
-
Filesize
4KB
MD56b1a35c819a940a173250f890fb3e9cd
SHA15b7f1bea86a19ce7dc94b27c1a09e0fc5ed3fa12
SHA2561975be73d4dd24260801602d81823575c7d739cd55b98666983045ef2dd16d88
SHA512d9e43002b1cc0501c1252561022dd5bd92021dd402897135f79e5d7ef7e345de72006828a70f10454221f764716260c8e0318861d260a15ce764f3c85bdba306
-
Filesize
4KB
MD55dc39c2367a50b4fcd466f6937a35b6a
SHA1670cd6a5684957f725a8846dbaa29a3d3c0f9bce
SHA25616696fbbc47017e92b3631515c70d735a61151068a374d950614cc0c45491a34
SHA512e32dc4efd0d41ba4b9c6ebe33e1875f69a12200217871f125d53f8678611bcf51ae7d46721d6df736a774d73b92a745dfa18bc5bbb89605be2c95280b29016b5
-
Filesize
4KB
MD5d1ed462a218cf5582c4a4a26879824fd
SHA1089026f2550906bb1572c2d3f513e2bc5256bee0
SHA25626d59e7c7bcd9d3e6a07137347c6ad2a74cbd42c52f243d6e74215a3920d0a47
SHA512960a512d65f861add28e48c4b0a70f66226d9189fc6a770cb9f4956cb6daf137f6cb1dd024be27e5deb7563e7a77801f7221aca96283259c11fac6cd13721e3d
-
Filesize
4KB
MD56f018e5a001563ed73177c393a4bddf9
SHA12bb9d8ab935f68338c289e8d4bb64bf7b6ad95c7
SHA2568bb602426289c47ee3c25ec426cb51fc8f84a35a6d5a8bb4e068cbbf122def32
SHA512fb9fb4e044ea12148bff5c5913360be0bcd54e9deff19f9f9f1cbaa6cb6a3ba3028c8c20c54a726e7a23be533c7b5d4947bae4c0d2738ed0b4eb0896b61e95a7
-
Filesize
10KB
MD55299c315435884a6af79688bb1a56235
SHA195fb8e223826f583931960e869377bc25b8ce60c
SHA2564dc9b04dc554974bb34cb9fb62f127f1b2685f5a72e7063c8a486129b20a726b
SHA512d03bcff166ab1b78cd63fa85b8276ce7416d1023c162613c803f567e907041769636d8540b164f7cc8a5c4b55fa4248ee2f5f1411db96e2f1ad97dc54be96cc2
-
Filesize
10KB
MD52f26b861ee4f7714d965398a2983de16
SHA1e5676f3263ddf7f139fb8323ef1f477870f44e0c
SHA2563aaee194e3f938ef711eff4520d3117b197b67b9aa9a73f1794532d61e19b128
SHA5129b26945236e647a94ec5a4dbd9d3270ef3707e305f42baca876bcd972b8405841b8872426247a3d39d47c2582547d7d816cc3d2f929a469505be035e2e58cad4
-
Filesize
10KB
MD5ebdc2887be0fb10188f6cb66350477d0
SHA114199c84cd7529732c204a5d85297dab6a94b68b
SHA25623487fdc14fb3249923e6f5f6a3644ecb83779b6f73807186f8da435d0b7ad9c
SHA5120ebf1de59a6159b7f8cffb95605fcd9c65cc66f29795cfb55cee5421602ef77973b0d368f44d317a116ca5a52f67e7cab12b6656c1b7b4afa214219c917664b5
-
Filesize
10KB
MD55a5a9f1c80cf57878bff51265568363a
SHA10f197a5d588ab254b7a27b14cc9b0c5d6dc2cba0
SHA2561005893aaf37ad3f26ce6bb56aab98c8c46f690b6221c348b7035788bf1bab0e
SHA512598c5df23914b1b5e6fef947bd94bd3fed3fdb8a593362039304696111f8f6d198674f982cb1e754122e9803b02ea0e3e63b10dcccb88e23da3772eb01f9b3d3
-
Filesize
11KB
MD5bfa35553f565db3ea1c1b1fab8ff4c39
SHA1f0c78c7f5ae3242e3a7450a0116e88a6299678eb
SHA256e416b61e5bacf7befb77eab77c3e3226fd3e9eacd26903b2b6b0a80c7056d191
SHA51231ec3548c5631551250af2af66d4676a8e1eaabb504968efdd39dc2c944861c0e8781552ffb034100a6a1a764e964fc6e3baec449b4e9f183f0e214ebbf6669a
-
Filesize
10KB
MD504ec6e1a6b6a04d917c3b05b0b04bec8
SHA1408a1ea1d786f23c36b51f21265ace3e22fe2103
SHA2565a27142fe5b278dcf8549b868c76f157fc7620e2a860bfa6e402ae4dc9decbf0
SHA512ff4391cf27869ebcc11800dd70f2a6fe2c21c7257d1f23b31de41d67d218ddd3e8a580080fb96d5ddd84c8abfdb054aa9688d3541f6377dad4a13a360aaf22d1
-
Filesize
9KB
MD5820d4284a932b164619318e9202d92fc
SHA13a97528a346f31aa3594c752b5db0688398d2724
SHA25699d9e0d4011ce410d376350f321eb9305bd349229c52462ecf05c0c13cc4bf24
SHA512b456c474daf9fd9b426f4bdb3f0164f9f52b13bd46bb61edfdc84a54e1fd9cf9c16a034cdb1fe26216cf985052630b105229675fe98a6083dbe5d6205c1725d9
-
Filesize
11KB
MD5c6eec78d8bd2a37c62a8434012005ed8
SHA183a7ca8cb87f5a1eeb6ede526537bcc86cb81107
SHA256c60a1fda4caf145c0083e186ebb660f85b512398901826f4057e236d3e1d52c1
SHA512a9fae6c50e4f66984ad9598eac1ec3eeddac863a37be47c0593bf7ca52bf65de7a74889479b50b5cd2a678beb5da548dd90b22a7152fb8f28d658c32393997b5
-
Filesize
9KB
MD5981ac02db7e246adf10eeb89f540938b
SHA149197b8c3e4843cfc8aa9189b781906a537e3f24
SHA2564476f95cbc9acefe2818efafbca55645c3a428d5e0cf68180b176b34f1fd5e79
SHA512687afbb7fd78236ae5858ba75ed586d81611c04a6510a62d8b69e09c0d7a4c1f40946719593c0f3714e96277dc7871839de120c865d61a8c904c029b4cbf0fff
-
Filesize
10KB
MD5f916defa21a83d621e1b2168e8ddbf23
SHA15646704a9d985042200f2dbbe5a17d87237fd043
SHA25677943df1ed9034aacb1317da3ab5fb908dc27f5c0ca1c74a8ca1e160f0acca88
SHA51221579663c20b90ce2f0437d555093c3c03350bd5378c3844d531920b05adab9654333fc591364e1f608fdce203ad8ee8a5a3005c21a514acb1c7d46de58ce63c
-
Filesize
11KB
MD583582a9cdb5b606d3bffb1daff132876
SHA1b85b317a2039e257919d874df0cd525c9ae71a32
SHA25688f415676787047c289b6d6bd7e9191b8e05d19f749033827d0bf401761cd75c
SHA51281312fb5dc8c9c41d592e9754346a794020441373893843f7e922efb0d633db9fe65d4c9e06b2f0e1016cd917d28ad11b5326d35457d2aabc151bb694c567ed7
-
Filesize
11KB
MD51e0587d52df49d4bb778f88a9c676272
SHA11ec62762a3335e28223f6c74adeb58857aebed97
SHA2562127ce5317e4c64cf05ab9ff8bfb2932d4fda3e39ba6d5aa1f95ccf72371d809
SHA5121c8309dd97d77e2e34f1c77f44fa5761772d754a3e1591e7e2c9ae236104db813edfa93e0dcd185b8cdb20fff89659c0f421ea726869744cc28b7b98476dea38
-
Filesize
11KB
MD58ca175a3fc570c3f002a83aa1faac43e
SHA1b2fdcecbc906e5fc6b622956339c8c6c367e284e
SHA25647a910af1e2836667f19f6cbdb10b9c2104a055b30f3c4892abcb34a950fddd6
SHA512d2fca06cc4a18971766924169d27ad42b6216649e4f5bbcb565e1a4226bb4f91b505ebc167e4c184ebc8d361bb4f7b760a5a7fc6079e4cf76bbafbd6f9808e50
-
Filesize
9KB
MD5737a60dd72a13bfd84a8d9ec36547ef8
SHA135f77dd162a6dfe7ac9b09fd0ca27eaa90cf9bf1
SHA25634295c88a8effae5f8a6a459c08a7d9d8a22670fa31b7b27f5191308f9fed118
SHA51242762bd1c02d84954136e29f88cbc9e5242bcf41177390d99e6de907dfa67c958a62f95ec1465716f51bf50e78769b6e00567e2bad432da256299d3fb5ddd245
-
Filesize
9KB
MD58788d8645df11073357e257918509dd3
SHA17a6d05b372fdd9001fa69d860886672188f82ac7
SHA2569478e747634c44d96ce18f41be0643115b8383968fa3bca263be5ab8069ff3da
SHA512351c00288d598cc3af230f91805662e3922a9a639380d0437573e37c633ab330ae52d1da9609a4802c11198c6acac1e9d0afabe0e4639e0fc63f0e8b7360f51d
-
Filesize
9KB
MD574733b53dae88b1a57bdcf895b05c7f1
SHA13f13266c07f9b9d4f5a1bd134e17af4203045436
SHA2561acd82f62c5096bff6130bd290b8ed0c5be623633a9204e717ec83fe9345bda2
SHA512187bc143368a71f0f690c1df92a7486b295054efe5c83be42924a95ce0e50c0ee5a81587ec328d25f0b47158a92bd0f078096a32c5235e3fccfd6b660445f411
-
Filesize
9KB
MD512fc1df7dd5d687b52308c6a39c3726e
SHA1fd149332014893e1b7a66bbfad02601cabb2dae4
SHA256a16f69a566504dae4fa88e807b6f55de8aa3bb1131fa46a6398eeb08ecf2fefa
SHA512f4e2f13ce9fc62c71c0ec94b6be773dfc56aa59590c0e1915a4a3f3dfb975f941d4bcc91a2e9523d1a1abbe8e42adb67e186aad4fdd44b1f9b26c6f463b79011
-
Filesize
15KB
MD549cb0a63b568646dfae173a13d64209a
SHA1002a858ddfe51a6d8c894968602adb47779b6f2b
SHA256c21b02fc74a11e08b424df4bd4700a135a6e87d1c72e06d069c081039b10dea5
SHA51255d785710db12ee978181b4a7d295512c2c69d7fd7f56975ec5736c1fe99e54dff7ff9f6d236c27f0688e7cf2d12c077ca3584f2c8e6347ce5c481074cd4e262
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Service Worker\ScriptCache\index-dir\the-real-index
Filesize72B
MD568fb8133eaea6103869cab3df52133d9
SHA19f41987debeb0f43b8cafa1d6a35e3982bccca54
SHA25668e8f9ac4aacc8c372c542143d965f24756e7ae56987c7a5eac5da9f3dba7c76
SHA512ac17812bafe36d405eb45cfc2ae36cdae0911bfe8cd042bdca47d95c940e8643e2b3119a6c435aa0fba9c39e86f4f6e0f0fd18c4817699c7a5f72581f4efb850
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\d627b654-ce6f-47df-827a-ff2c9a433fd8.tmp
Filesize10KB
MD5219da84b99bf10f30b5add5fb7c08ce4
SHA1a7cd358eacf4039e804ae49bafb0e243c380b03b
SHA256583f967f4a1b89f7af022a0a43e3805acc0e55ea05a7b7f5e6075df7b5090882
SHA512723b2e891ddc7bc009598b94a613100a5408a83a30358979be1a52c6ab0260c74645dfba635638756fe347903feb61b04d52a681c1563c6acf4635d01bded825
-
Filesize
234KB
MD568cf43d32038aa333f77d63adb1bac1d
SHA10abf61c95ddd1cc20d9a94e39ac013ee8e84ac63
SHA2566e2c1e088ab385b70e3601585ad6f4a4ac471f2ffb8335671228f736d9aea577
SHA5125597986d906fffd0017cc02252f2e8002e58c032d2ed56ffa962ba89f4caecb2b564ad3ff7f9d6555029034a1fd42981d262e10a16afec235e7de466bd814cbb
-
Filesize
234KB
MD58c288795e09e21e6daabb85f4cc409b3
SHA180977101110cbe0a8a3b5f46f4381cfb34cecaaa
SHA256eb7a1259f5a5edbe9d42b1af7ff6e622727108dbfe0a9e69f52c1b9b1b813303
SHA512017b658db30383a268d174c88e9aa13145a5fb1c8508abd0ceae3bb8862b40aa8aa88122c87209ce8afb3741d6b4a9852fc8f9c2658581313429711dc2e6ec00
-
Filesize
234KB
MD5b58da2936f6cc28cf128ddd8068d7aa0
SHA1d5120b6cd69c0db7cc83ca004ded62e0d156fadf
SHA256a1dce2698b2ca25fbf9d5f3d7ed3eaf21cbec70d731cd997c04a62ee60ab7806
SHA512076bede9c8caddd0b07b27fba811371332eedca5ba47ebb68ef97d2deb30ffef5ebb4ba091540835f0f0b97e12d34f49a289d961461641208ba1665b90dd0a89
-
Filesize
234KB
MD5b78333d2db75719138660ad70afa22ef
SHA198185591d49111063785fa937132cde78cfd58d5
SHA2563966a2fbbbe1b3474581a232cb81482a1ab414b1ecdad8c6811aac1509677f11
SHA5126035a5eec7066ec41b0dc49f04cfe46e18abd6b7a555060b38685d83b9652fe0c0522e6778c87a48b2505a0c268e4800c7f4d201f4e975ef6c09d5f7bc4ac08b
-
Filesize
234KB
MD58b8d1dea034284b25ae8c1c7445591be
SHA1c9e159cd66254106e4af1f2b64db7132e1536476
SHA256f6d646d9888553b7bb8a7ac2d50f42e47bfc4577cf9793b2d5fd073ae791bab7
SHA5126b2bc522bd3c15616020d2825a02aa36ea3b400d4206886331fbe91e48b2f88c588a1114c0ca8b9339ee3b6dae07c651a2ed7940bcf205a1bfe18662b9b8d1e7
-
Filesize
234KB
MD57b698c71936447b348e121e4d37a1c79
SHA151304631e176c1ac4d3395304f8f262a4cd9aa1d
SHA256f4b0a484727f41c863c96bd5ac1cbb4f50ea4f041b5b51b804a8aa99a52c6001
SHA51206d11c73170e2c6aeddc6b3fb396d7abe1431feccf48d2accf66d23224cb675527016202b51dc8e52266df7eaa616d39c0bae86ff3d98b86bdb51991901bae7a
-
Filesize
264KB
MD50fb84f4dff86d7b0dcdc005c3cdd6535
SHA189cc7c83befeac463c28752cb99b225ba911b1e9
SHA256ebf976ea711f8f206a236e300b3336f804ec137cfe150b8c0d78a4ea991ea555
SHA512f82ec022947de0d621117acd6ad9af5f87c5d316514296eafb824afc676a351c051be4c4ff7322e43f361d3369b0ecf5d7ffe6a54b673d888bd3413af714f2bc
-
Filesize
14KB
MD5c0f5567fa7235f7957450a4cbdd5b333
SHA123f3914870e6bd2d3472c279287ecfe777abaf2f
SHA2569dfda973c1b491e3ab80f3ccc50d7146286d80b56415cfda30514cacddb375ce
SHA512e97a66863187c157c4626574e01ed7818d14bad0dab6db0a38155e0467f62e8bd54e1d2014610bc86c92376036774dc36eafd181fa690f9566d460c985a5cec3
-
Filesize
7.0MB
MD50e4df74cce0423376e6a782e4b3deb64
SHA18db193e73416f1da44ad98f344d3ff207ace44ac
SHA2568b9263763da2c73054426eb6a8de5c4e7f42ecd11e9c95a426b0c66aedd727ab
SHA512ca3136acde16e33c80a0f50c5f73a2eda795ebf9a90f7bcd4803b5cf2c51135b2ec2ae40d06015ab6fe4b2b18bfc0a95712bc98dcf5f2cc85192bb715a021642
-
C:\Users\Admin\AppData\Local\Temp\scoped_dir3736_1856054165\917c714c-c199-4951-ac06-c7527e3b9519.tmp
Filesize135KB
MD53f6f93c3dccd4a91c4eb25c7f6feb1c1
SHA19b73f46adfa1f4464929b408407e73d4535c6827
SHA25619f05352cb4c6e231c1c000b6c8b7e9edcc1e8082caf46fff16b239d32aa7c9e
SHA512d488fa67e3a29d0147e9eaf2eabc74d9a255f8470cf79a4aea60e3b3b5e48a3fcbc4fc3e9ce58dff8d7d0caa8ae749295f221e1fe1ba5d20deb2d97544a12ba4
-
C:\Users\Admin\AppData\Local\Temp\scoped_dir3736_1856054165\CRX_INSTALL\_locales\en_CA\messages.json
Filesize711B
MD5558659936250e03cc14b60ebf648aa09
SHA132f1ce0361bbfdff11e2ffd53d3ae88a8b81a825
SHA2562445cad863be47bb1c15b57a4960b7b0d01864e63cdfde6395f3b2689dc1444b
SHA5121632f5a3cd71887774bf3cb8a4d8b787ea6278271657b0f1d113dbe1a7fd42c4daa717cc449f157ce8972037572b882dc946a7dc2c0e549d71982dcdee89f727
-
Filesize
280B
MD52a8d7e688c37e2ae37db62b4e4c20aea
SHA1f3ded67f8f6b3efa41006afe4af5a5ad85e52da4
SHA256dd36e2d76a09946b1211f70ca6f4eca60dc09e721a041c3a7b29d7f6dcc6f816
SHA51277354d6e68597a8a348e120bc5744fa675eb7d3d1659e9d644b5cc27495acb789c03fde2a3fa2a7742b5545ff8b0e7af79a7f03ef1879d5f263cd655a5ce899a
-
C:\Users\Admin\Desktop\Xeno-v1.0.9-x64-New\Xeno.exe.WebView2\EBWebView\Default\9543d5ac-c146-47ec-b19b-3b9935c4ce40.tmp
Filesize6KB
MD5342170405c4058fd28871e5f29cd9074
SHA1ca0853adb559d80bf4b8c5563e39b40b5524c117
SHA2565c187e705f106295fc6f5c75bed70ff9c7f14bbe71fe453d5ff73955f06ccc2b
SHA5126feae6ab5e18f52c36c41fb48f8f7dd1a5bece25773fb745061aa7f621d84ad7a0896726bf19b7260ad660e0dfab26314881cc9acf87d74ef925066a9d9c6ba4
-
C:\Users\Admin\Desktop\Xeno-v1.0.9-x64-New\Xeno.exe.WebView2\EBWebView\Default\Extension Rules\MANIFEST-000001
Filesize41B
MD55af87dfd673ba2115e2fcf5cfdb727ab
SHA1d5b5bbf396dc291274584ef71f444f420b6056f1
SHA256f9d31b278e215eb0d0e9cd709edfa037e828f36214ab7906f612160fead4b2b4
SHA512de34583a7dbafe4dd0dc0601e8f6906b9bc6a00c56c9323561204f77abbc0dc9007c480ffe4092ff2f194d54616caf50aecbd4a1e9583cae0c76ad6dd7c2375b
-
Filesize
8KB
MD5cf89d16bb9107c631daabf0c0ee58efb
SHA13ae5d3a7cf1f94a56e42f9a58d90a0b9616ae74b
SHA256d6a5fe39cd672781b256e0e3102f7022635f1d4bb7cfcc90a80fffe4d0f3877e
SHA5128cb5b059c8105eb91e74a7d5952437aaa1ada89763c5843e7b0f1b93d9ebe15ed40f287c652229291fac02d712cf7ff5ececef276ba0d7ddc35558a3ec3f77b0
-
Filesize
8KB
MD50962291d6d367570bee5454721c17e11
SHA159d10a893ef321a706a9255176761366115bedcb
SHA256ec1702806f4cc7c42a82fc2b38e89835fde7c64bb32060e0823c9077ca92efb7
SHA512f555e961b69e09628eaf9c61f465871e6984cd4d31014f954bb747351dad9cea6d17c1db4bca2c1eb7f187cb5f3c0518748c339c8b43bbd1dbd94aeaa16f58ed
-
Filesize
8KB
MD541876349cb12d6db992f1309f22df3f0
SHA15cf26b3420fc0302cd0a71e8d029739b8765be27
SHA256e09f42c398d688dce168570291f1f92d079987deda3099a34adb9e8c0522b30c
SHA512e9a4fc1f7cb6ae2901f8e02354a92c4aaa7a53c640dcf692db42a27a5acc2a3bfb25a0de0eb08ab53983132016e7d43132ea4292e439bb636aafd53fb6ef907e
-
Filesize
1KB
MD51c5766d244dc26aed644058803cb6e2a
SHA1240ce3cef05da2218c9a64c748058140a13267cf
SHA2567230b55b714cce17a724531fed32ba69417094cb940b45867114222fbefec0b1
SHA512f78e17171e42c9bade78d4ef0edceeecc80aed73029f41917ebb3c95e631548dec1658e0aff59d379b38546f6a86e3f331bf01eac724febbeca00540d6b5098c
-
Filesize
16KB
MD5e1d82faeaf30158039da93f5f1876acf
SHA1d7d0e90a32a38d4e7aef87410d7aa043da75c3e2
SHA2568733593f2637b2eb7f271278d36602c74b9919f57573ce1cc4048b40c52dc985
SHA512a52f521122f1b3cd74154705779264c431e328bb1777c98bd45d52e5358027740e93bc2b415e47734cd3e7dddc8a889e1109f650288f86ec3f188ebe15933fd6
-
Filesize
3KB
MD5b19648c6c9e823fb74765581f73af5d8
SHA10e8171b3e2b3eabd914d037d99bceb0d4411b11d
SHA2563d6917f83a982210b31051c9c49d9b44f0d8faf3b2d87b1b24e58672f48109df
SHA5121b76ffcbc69307b7ad943a8fd9d109d6b41bb316949f8eea7782b5801d0667b9b0cb813daebbd6eebae44f5d16dc1164d149dea6fc6f72c1745af252303c100c
-
Filesize
2KB
MD5b77f65f5ed697e6d8c043232f94e098b
SHA158e3dd7a29cffa3fffe312b0c988a972c8c196f7
SHA256f64710d2e20b83cd951db3bc09d81a1708c56838815fd8d9b3e9e344b0ad03ec
SHA512ebbe12b2d50b6a5da8e7b6b38860f4d6db52ad2e54170e1bfcfa35a6630c2dfb60ac9b9013dd25d62f5ea45f44895931f2d0976d6f30bbec22c777f829581660
-
Filesize
1KB
MD59ba843abc7e1a43bc83f684cb87d932b
SHA1b4a26a4906f897cfa9d7449bb471e21634515cb0
SHA256b92aa3dc8bade362f17e8005cd9cc09b39a3e768bfbeed9d61ec3d3a18eca771
SHA5127893196ca5396d4f524627445cb85cf7b2dee568cbc5f24e1af5c23dbbc98bdd273e278c339ad23d3cff0a1e9360f3e46d029e25030126c43c029138d223d050
-
Filesize
6.9MB
MD51c4187f0b612a9a473010dcc37c37a82
SHA134d46733452812d481adeedad5eaea2cf4342540
SHA256c8d55b0f4f25caf135dabc7f21b9548263022107e9740dfe692b402469cd47bd
SHA512075678e24a867d5630da324e934837d81a3fa1d848a15feeb2a7be268d38b81ca4210cd44a22e9869173edebecd1947968327ddce16a85b71c03e6307e365def
-
Filesize
26B
MD5fbccf14d504b7b2dbcb5a5bda75bd93b
SHA1d59fc84cdd5217c6cf74785703655f78da6b582b
SHA256eacd09517ce90d34ba562171d15ac40d302f0e691b439f91be1b6406e25f5913
SHA512aa1d2b1ea3c9de3ccadb319d4e3e3276a2f27dd1a5244fe72de2b6f94083dddc762480482c5c2e53f803cd9e3973ddefc68966f974e124307b5043e654443b98
-
Filesize
24.5MB
MD5223a76cd5ab9e42a5c55731154b85627
SHA138b647d37b42378222856972a1e22fbd8cf4b404
SHA2561821577409c35b2b9505ac833e246376cc68a8262972100444010b57226f0940
SHA51220e2d7437367cb262ce45184eb4d809249fe654aa450d226e376d4057c00b58ecfd8834a8b5153eb148960ffc845bed1f0943d5ff9a6fc1355b1503138562d8d
-
Filesize
208KB
MD509042ba0af85f4873a68326ab0e704af
SHA1f08c8f9cb63f89a88f5915e6a889b170ce98f515
SHA25647cceb26dd7b78f0d3d09fddc419290907fe818979884b2192c834034180e83b
SHA5121c9552a8bf478f9edde8ed67a8f40584a757c66aaf297609b4f577283469287992c1f84ebe15df4df05b0135e4d67c958a912738f4814440f6fd77804a2cfa7d
-
Filesize
280B
MD5ba8847581df3f90d837062e27f48c390
SHA17ac199d5bf04dd064ca8bb58ffb39f3c5df364b0
SHA256416bfd8821cdff328833704122293544e885846cd6dfbc2eae90ee5a67ac75fd
SHA5123856c68ee1d3121df4b3808d2bbed22f6d634c61facf41be187f04b046ed21b0258bce7c48cfeed283dde8d4f9ef582e92e845fdb7324452170c0ac566908d77
-
Filesize
1KB
MD5d6bd210f227442b3362493d046cea233
SHA1ff286ac8370fc655aea0ef35e9cf0bfcb6d698de
SHA256335a256d4779ec5dcf283d007fb56fd8211bbcaf47dcd70fe60ded6a112744ef
SHA512464aaab9e08de610ad34b97d4076e92dc04c2cdc6669f60bfc50f0f9ce5d71c31b8943bd84cee1a04fb9ab5bbed3442bd41d9cb21a0dd170ea97c463e1ce2b5b
-
Filesize
670KB
MD53f32f1a9bd60ae065b89c2223676592e
SHA19d386d394db87f1ee41252cac863c80f1c8d6b8b
SHA256270fa05033b8b9455bd0d38924b1f1f3e4d3e32565da263209d1f9698effbc05
SHA512bddfeab33a03b0f37cff9008815e2900cc96bddaf763007e5f7fdffd80e56719b81341029431bd9d25c8e74123c1d9cda0f2aefafdc4937095d595093db823df