Resubmissions

02/04/2025, 22:36

250402-2h95esxpz5 3

30/03/2025, 19:46

250330-yg7q5avzew 6

29/03/2025, 19:55

250329-ynl31axwgv 6

29/03/2025, 19:55

250329-ym9gxaxvf1 6

29/03/2025, 18:18

250329-wxy3taznv5 6

29/03/2025, 10:24

250329-mfdwwa1xay 7

29/03/2025, 00:19

250329-amltvawpx2 6

Analysis

  • max time kernel
    150s
  • max time network
    151s
  • platform
    windows11-21h2_x64
  • resource
    win11-20250313-en
  • resource tags

    arch:x64arch:x86image:win11-20250313-enlocale:en-usos:windows11-21h2-x64system
  • submitted
    29/03/2025, 19:55

General

  • Target

    Xeno-v1.1.65/Xeno.exe

  • Size

    140KB

  • MD5

    70797e0760472325728ba786ca208976

  • SHA1

    8912f23afbe8b78a9582f2a458b89a7fd697e638

  • SHA256

    20744d38bc27d656a095e57bef62a44f5f6317de3672020e8a4a1e1057545764

  • SHA512

    787f172cbc18eeb4f8e88420377459f37918edc9aec0105566f9e79555a962d6e89d7d0d6b791475282b2c5fb093c9e85544794639ad2771d9ca4a0e5b456477

  • SSDEEP

    3072:h+f4nYTC3LwjBzaQhlG4a7qWdCXdXxuZjwxfBoy:h+f4nKvaQhcF7qI+xuZjwxB

Malware Config

Signatures

  • Checks whether UAC is enabled 1 TTPs 1 IoCs
  • Legitimate hosting services abused for malware hosting/C2 1 TTPs 4 IoCs
  • Network Share Discovery 1 TTPs

    Attempt to gather information on host network.

  • Drops file in Windows directory 64 IoCs
  • Enumerates system info in registry 2 TTPs 3 IoCs
  • Modifies data under HKEY_USERS 2 IoCs
  • Suspicious behavior: EnumeratesProcesses 4 IoCs
  • Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 1 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\Xeno-v1.1.65\Xeno.exe
    "C:\Users\Admin\AppData\Local\Temp\Xeno-v1.1.65\Xeno.exe"
    1⤵
    • Checks whether UAC is enabled
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of WriteProcessMemory
    PID:2816
    • C:\Program Files (x86)\Microsoft\EdgeWebView\Application\132.0.2957.140\msedgewebview2.exe
      "C:\Program Files (x86)\Microsoft\EdgeWebView\Application\132.0.2957.140\msedgewebview2.exe" --embedded-browser-webview=1 --webview-exe-name=Xeno.exe --webview-exe-version=1.1.0+87ae4f96f8a0927052c1120167982fb069afd1b4 --user-data-dir="C:\Users\Admin\AppData\Local\Temp\Xeno-v1.1.65\Xeno.exe.WebView2\EBWebView" --noerrdialogs --embedded-browser-webview-dpi-awareness=1 --mojo-named-platform-channel-pipe=2816.3408.9770154253270543474
      2⤵
      • Drops file in Windows directory
      • Enumerates system info in registry
      • Modifies data under HKEY_USERS
      • Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
      • Suspicious use of WriteProcessMemory
      PID:2712
      • C:\Program Files (x86)\Microsoft\EdgeWebView\Application\132.0.2957.140\msedgewebview2.exe
        "C:\Program Files (x86)\Microsoft\EdgeWebView\Application\132.0.2957.140\msedgewebview2.exe" --type=crashpad-handler --user-data-dir=C:\Users\Admin\AppData\Local\Temp\Xeno-v1.1.65\Xeno.exe.WebView2\EBWebView /prefetch:4 --monitor-self-annotation=ptype=crashpad-handler --database=C:\Users\Admin\AppData\Local\Temp\Xeno-v1.1.65\Xeno.exe.WebView2\EBWebView\Crashpad --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=132.0.6834.160 "--annotation=exe=C:\Program Files (x86)\Microsoft\EdgeWebView\Application\132.0.2957.140\msedgewebview2.exe" --annotation=plat=Win64 "--annotation=prod=Edge WebView2" --annotation=ver=132.0.2957.140 --initial-client-data=0x160,0x164,0x168,0x13c,0x170,0x7ffb5cf4b078,0x7ffb5cf4b084,0x7ffb5cf4b090
        3⤵
          PID:3452
        • C:\Program Files (x86)\Microsoft\EdgeWebView\Application\132.0.2957.140\msedgewebview2.exe
          "C:\Program Files (x86)\Microsoft\EdgeWebView\Application\132.0.2957.140\msedgewebview2.exe" --type=gpu-process --string-annotations --noerrdialogs --user-data-dir="C:\Users\Admin\AppData\Local\Temp\Xeno-v1.1.65\Xeno.exe.WebView2\EBWebView" --webview-exe-name=Xeno.exe --webview-exe-version=1.1.0+87ae4f96f8a0927052c1120167982fb069afd1b4 --embedded-browser-webview=1 --embedded-browser-webview-dpi-awareness=1 --gpu-preferences=UAAAAAAAAADgAAAEAAAAAAAAAAAAAAAAAABgAAEAAAAAAAAAAAAAAAAAAAACAAAAAAAAAAAAAAAAAAAAAAAAABAAAAAAAAAAEAAAAAAAAAAIAAAAAAAAAAgAAAAAAAAA --always-read-main-dll --field-trial-handle=1692,i,11140571899584436082,15998484186756580819,262144 --variations-seed-version --mojo-platform-channel-handle=1688 /prefetch:2
          3⤵
            PID:940
          • C:\Program Files (x86)\Microsoft\EdgeWebView\Application\132.0.2957.140\msedgewebview2.exe
            "C:\Program Files (x86)\Microsoft\EdgeWebView\Application\132.0.2957.140\msedgewebview2.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --string-annotations --noerrdialogs --user-data-dir="C:\Users\Admin\AppData\Local\Temp\Xeno-v1.1.65\Xeno.exe.WebView2\EBWebView" --webview-exe-name=Xeno.exe --webview-exe-version=1.1.0+87ae4f96f8a0927052c1120167982fb069afd1b4 --embedded-browser-webview=1 --embedded-browser-webview-dpi-awareness=1 --always-read-main-dll --field-trial-handle=1400,i,11140571899584436082,15998484186756580819,262144 --variations-seed-version --mojo-platform-channel-handle=2012 /prefetch:11
            3⤵
              PID:4492
            • C:\Program Files (x86)\Microsoft\EdgeWebView\Application\132.0.2957.140\msedgewebview2.exe
              "C:\Program Files (x86)\Microsoft\EdgeWebView\Application\132.0.2957.140\msedgewebview2.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=service --string-annotations --noerrdialogs --user-data-dir="C:\Users\Admin\AppData\Local\Temp\Xeno-v1.1.65\Xeno.exe.WebView2\EBWebView" --webview-exe-name=Xeno.exe --webview-exe-version=1.1.0+87ae4f96f8a0927052c1120167982fb069afd1b4 --embedded-browser-webview=1 --embedded-browser-webview-dpi-awareness=1 --always-read-main-dll --field-trial-handle=2280,i,11140571899584436082,15998484186756580819,262144 --variations-seed-version --mojo-platform-channel-handle=2284 /prefetch:13
              3⤵
                PID:1604
              • C:\Program Files (x86)\Microsoft\EdgeWebView\Application\132.0.2957.140\msedgewebview2.exe
                "C:\Program Files (x86)\Microsoft\EdgeWebView\Application\132.0.2957.140\msedgewebview2.exe" --type=renderer --string-annotations --noerrdialogs --user-data-dir="C:\Users\Admin\AppData\Local\Temp\Xeno-v1.1.65\Xeno.exe.WebView2\EBWebView" --webview-exe-name=Xeno.exe --webview-exe-version=1.1.0+87ae4f96f8a0927052c1120167982fb069afd1b4 --embedded-browser-webview=1 --embedded-browser-webview-dpi-awareness=1 --video-capture-use-gpu-memory-buffer --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --js-flags="--harmony-weak-refs-with-cleanup-some --expose-gc --ms-user-locale=" --always-read-main-dll --field-trial-handle=3552,i,11140571899584436082,15998484186756580819,262144 --variations-seed-version --mojo-platform-channel-handle=3560 /prefetch:1
                3⤵
                  PID:4020
                • C:\Program Files (x86)\Microsoft\EdgeWebView\Application\132.0.2957.140\msedgewebview2.exe
                  "C:\Program Files (x86)\Microsoft\EdgeWebView\Application\132.0.2957.140\msedgewebview2.exe" --type=utility --utility-sub-type=unzip.mojom.Unzipper --lang=en-US --service-sandbox-type=service --video-capture-use-gpu-memory-buffer --string-annotations --noerrdialogs --user-data-dir="C:\Users\Admin\AppData\Local\Temp\Xeno-v1.1.65\Xeno.exe.WebView2\EBWebView" --webview-exe-name=Xeno.exe --webview-exe-version=1.1.0+87ae4f96f8a0927052c1120167982fb069afd1b4 --embedded-browser-webview=1 --embedded-browser-webview-dpi-awareness=1 --always-read-main-dll --field-trial-handle=4252,i,11140571899584436082,15998484186756580819,262144 --variations-seed-version --mojo-platform-channel-handle=4632 /prefetch:14
                  3⤵
                    PID:1216
                  • C:\Program Files (x86)\Microsoft\EdgeWebView\Application\132.0.2957.140\msedgewebview2.exe
                    "C:\Program Files (x86)\Microsoft\EdgeWebView\Application\132.0.2957.140\msedgewebview2.exe" --type=utility --utility-sub-type=unzip.mojom.Unzipper --lang=en-US --service-sandbox-type=service --video-capture-use-gpu-memory-buffer --string-annotations --noerrdialogs --user-data-dir="C:\Users\Admin\AppData\Local\Temp\Xeno-v1.1.65\Xeno.exe.WebView2\EBWebView" --webview-exe-name=Xeno.exe --webview-exe-version=1.1.0+87ae4f96f8a0927052c1120167982fb069afd1b4 --embedded-browser-webview=1 --embedded-browser-webview-dpi-awareness=1 --always-read-main-dll --field-trial-handle=4664,i,11140571899584436082,15998484186756580819,262144 --variations-seed-version --mojo-platform-channel-handle=752 /prefetch:14
                    3⤵
                      PID:1048
                    • C:\Program Files (x86)\Microsoft\EdgeWebView\Application\132.0.2957.140\msedgewebview2.exe
                      "C:\Program Files (x86)\Microsoft\EdgeWebView\Application\132.0.2957.140\msedgewebview2.exe" --type=gpu-process --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.22000.1 --string-annotations --noerrdialogs --user-data-dir="C:\Users\Admin\AppData\Local\Temp\Xeno-v1.1.65\Xeno.exe.WebView2\EBWebView" --webview-exe-name=Xeno.exe --webview-exe-version=1.1.0+87ae4f96f8a0927052c1120167982fb069afd1b4 --embedded-browser-webview=1 --embedded-browser-webview-dpi-awareness=1 --gpu-preferences=UAAAAAAAAADoAAAEAAAAAAAAAAAAAAAAAABgAAEAAAAAAAAAAAAAAAAAAABCAAAAAAAAAAAAAAAAAAAAAAAAABAAAAAAAAAAEAAAAAAAAAAIAAAAAAAAAAgAAAAAAAAA --always-read-main-dll --field-trial-handle=4868,i,11140571899584436082,15998484186756580819,262144 --variations-seed-version --mojo-platform-channel-handle=4864 /prefetch:10
                      3⤵
                      • Suspicious behavior: EnumeratesProcesses
                      PID:2412
                    • C:\Program Files (x86)\Microsoft\EdgeWebView\Application\132.0.2957.140\msedgewebview2.exe
                      "C:\Program Files (x86)\Microsoft\EdgeWebView\Application\132.0.2957.140\msedgewebview2.exe" --type=utility --utility-sub-type=unzip.mojom.Unzipper --lang=en-US --service-sandbox-type=service --video-capture-use-gpu-memory-buffer --string-annotations --noerrdialogs --user-data-dir="C:\Users\Admin\AppData\Local\Temp\Xeno-v1.1.65\Xeno.exe.WebView2\EBWebView" --webview-exe-name=Xeno.exe --webview-exe-version=1.1.0+87ae4f96f8a0927052c1120167982fb069afd1b4 --embedded-browser-webview=1 --embedded-browser-webview-dpi-awareness=1 --always-read-main-dll --field-trial-handle=4864,i,11140571899584436082,15998484186756580819,262144 --variations-seed-version --mojo-platform-channel-handle=4512 /prefetch:14
                      3⤵
                        PID:2296
                      • C:\Program Files (x86)\Microsoft\EdgeWebView\Application\132.0.2957.140\msedgewebview2.exe
                        "C:\Program Files (x86)\Microsoft\EdgeWebView\Application\132.0.2957.140\msedgewebview2.exe" --type=utility --utility-sub-type=unzip.mojom.Unzipper --lang=en-US --service-sandbox-type=service --video-capture-use-gpu-memory-buffer --string-annotations --noerrdialogs --user-data-dir="C:\Users\Admin\AppData\Local\Temp\Xeno-v1.1.65\Xeno.exe.WebView2\EBWebView" --webview-exe-name=Xeno.exe --webview-exe-version=1.1.0+87ae4f96f8a0927052c1120167982fb069afd1b4 --embedded-browser-webview=1 --embedded-browser-webview-dpi-awareness=1 --always-read-main-dll --field-trial-handle=4136,i,11140571899584436082,15998484186756580819,262144 --variations-seed-version --mojo-platform-channel-handle=4128 /prefetch:14
                        3⤵
                          PID:2464
                        • C:\Program Files (x86)\Microsoft\EdgeWebView\Application\132.0.2957.140\msedgewebview2.exe
                          "C:\Program Files (x86)\Microsoft\EdgeWebView\Application\132.0.2957.140\msedgewebview2.exe" --type=utility --utility-sub-type=unzip.mojom.Unzipper --lang=en-US --service-sandbox-type=service --video-capture-use-gpu-memory-buffer --string-annotations --noerrdialogs --user-data-dir="C:\Users\Admin\AppData\Local\Temp\Xeno-v1.1.65\Xeno.exe.WebView2\EBWebView" --webview-exe-name=Xeno.exe --webview-exe-version=1.1.0+87ae4f96f8a0927052c1120167982fb069afd1b4 --embedded-browser-webview=1 --embedded-browser-webview-dpi-awareness=1 --always-read-main-dll --field-trial-handle=4760,i,11140571899584436082,15998484186756580819,262144 --variations-seed-version --mojo-platform-channel-handle=4132 /prefetch:14
                          3⤵
                            PID:2044

                      Network

                      MITRE ATT&CK Enterprise v15

                      Replay Monitor

                      Loading Replay Monitor...

                      Downloads

                      • C:\Users\Admin\AppData\Local\Temp\XENO_CACHE.bin

                        Filesize

                        28B

                        MD5

                        78d58a032761f1b9767ce9a961560a55

                        SHA1

                        16e75b82eb992b85361cfa782e2eac73f627717e

                        SHA256

                        895c607361d12436b3c82f8e233278f594d1de2ac032fd9534670a26f9bd5ce5

                        SHA512

                        4395ec8d0e057016daa654d94aeac4aea172814193ee9c3d5717093636db0972fea522a5e0596427b7c89cc2ab7f10c9be7c103b12b0c4151fc7b221d13e0f0e

                      • C:\Users\Admin\AppData\Local\Temp\Xeno-v1.1.65\Xeno.exe.WebView2\EBWebView\Crashpad\settings.dat

                        Filesize

                        280B

                        MD5

                        39cad1a4626a21e0afab0eee353c1736

                        SHA1

                        3e2b6fdb01b8d6fe200f54fdcfda4001a3171ee7

                        SHA256

                        8b4264ec7822250b99ad543cd40dc8c41dc78bfb6f1813b5c37b92076cb8d83e

                        SHA512

                        07389780a9c79b54b2cd81c07786d14d51466b35e8ad4b6d0ef5005665a5603e0672693e40903f57244cc2c9ca6a0112cd78abb633845be23692174534e6e137

                      • C:\Users\Admin\AppData\Local\Temp\Xeno-v1.1.65\Xeno.exe.WebView2\EBWebView\Crashpad\settings.dat

                        Filesize

                        280B

                        MD5

                        2360e13f4a1e93c2605ddfd60692b108

                        SHA1

                        4c804db6a603d76af7dd502afb7f4ea795b3bd3b

                        SHA256

                        14354695934d523c26ea4eaa743da7fd87e1ffeb60dc9c197b7a5c058478b139

                        SHA512

                        6c8ead930f345dc1e0d8541de4d9bb9fa734d52e508c947b2f138837e0505a94fe2276ec19dfd2c8777801814b7849ec9c1e6032635dbaccffc22729b5f9d8cc

                      • C:\Users\Admin\AppData\Local\Temp\Xeno-v1.1.65\Xeno.exe.WebView2\EBWebView\Crashpad\throttle_store.dat

                        Filesize

                        20B

                        MD5

                        9e4e94633b73f4a7680240a0ffd6cd2c

                        SHA1

                        e68e02453ce22736169a56fdb59043d33668368f

                        SHA256

                        41c91a9c93d76295746a149dce7ebb3b9ee2cb551d84365fff108e59a61cc304

                        SHA512

                        193011a756b2368956c71a9a3ae8bc9537d99f52218f124b2e64545eeb5227861d372639052b74d0dd956cb33ca72a9107e069f1ef332b9645044849d14af337

                      • C:\Users\Admin\AppData\Local\Temp\Xeno-v1.1.65\Xeno.exe.WebView2\EBWebView\Default\DawnWebGPUCache\data_0

                        Filesize

                        8KB

                        MD5

                        cf89d16bb9107c631daabf0c0ee58efb

                        SHA1

                        3ae5d3a7cf1f94a56e42f9a58d90a0b9616ae74b

                        SHA256

                        d6a5fe39cd672781b256e0e3102f7022635f1d4bb7cfcc90a80fffe4d0f3877e

                        SHA512

                        8cb5b059c8105eb91e74a7d5952437aaa1ada89763c5843e7b0f1b93d9ebe15ed40f287c652229291fac02d712cf7ff5ececef276ba0d7ddc35558a3ec3f77b0

                      • C:\Users\Admin\AppData\Local\Temp\Xeno-v1.1.65\Xeno.exe.WebView2\EBWebView\Default\DawnWebGPUCache\data_1

                        Filesize

                        264KB

                        MD5

                        d0d388f3865d0523e451d6ba0be34cc4

                        SHA1

                        8571c6a52aacc2747c048e3419e5657b74612995

                        SHA256

                        902f30c1fb0597d0734bc34b979ec5d131f8f39a4b71b338083821216ec8d61b

                        SHA512

                        376011d00de659eb6082a74e862cfac97a9bb508e0b740761505142e2d24ec1c30aa61efbc1c0dd08ff0f34734444de7f77dd90a6ca42b48a4c7fad5f0bddd17

                      • C:\Users\Admin\AppData\Local\Temp\Xeno-v1.1.65\Xeno.exe.WebView2\EBWebView\Default\DawnWebGPUCache\data_2

                        Filesize

                        8KB

                        MD5

                        0962291d6d367570bee5454721c17e11

                        SHA1

                        59d10a893ef321a706a9255176761366115bedcb

                        SHA256

                        ec1702806f4cc7c42a82fc2b38e89835fde7c64bb32060e0823c9077ca92efb7

                        SHA512

                        f555e961b69e09628eaf9c61f465871e6984cd4d31014f954bb747351dad9cea6d17c1db4bca2c1eb7f187cb5f3c0518748c339c8b43bbd1dbd94aeaa16f58ed

                      • C:\Users\Admin\AppData\Local\Temp\Xeno-v1.1.65\Xeno.exe.WebView2\EBWebView\Default\DawnWebGPUCache\data_3

                        Filesize

                        8KB

                        MD5

                        41876349cb12d6db992f1309f22df3f0

                        SHA1

                        5cf26b3420fc0302cd0a71e8d029739b8765be27

                        SHA256

                        e09f42c398d688dce168570291f1f92d079987deda3099a34adb9e8c0522b30c

                        SHA512

                        e9a4fc1f7cb6ae2901f8e02354a92c4aaa7a53c640dcf692db42a27a5acc2a3bfb25a0de0eb08ab53983132016e7d43132ea4292e439bb636aafd53fb6ef907e

                      • C:\Users\Admin\AppData\Local\Temp\Xeno-v1.1.65\Xeno.exe.WebView2\EBWebView\Default\Extension Rules\MANIFEST-000001

                        Filesize

                        41B

                        MD5

                        5af87dfd673ba2115e2fcf5cfdb727ab

                        SHA1

                        d5b5bbf396dc291274584ef71f444f420b6056f1

                        SHA256

                        f9d31b278e215eb0d0e9cd709edfa037e828f36214ab7906f612160fead4b2b4

                        SHA512

                        de34583a7dbafe4dd0dc0601e8f6906b9bc6a00c56c9323561204f77abbc0dc9007c480ffe4092ff2f194d54616caf50aecbd4a1e9583cae0c76ad6dd7c2375b

                      • C:\Users\Admin\AppData\Local\Temp\Xeno-v1.1.65\Xeno.exe.WebView2\EBWebView\Default\Network\Network Persistent State

                        Filesize

                        229B

                        MD5

                        5c9f79435fd36dd2a8914a542651f839

                        SHA1

                        81f4f5faf2f14d448626b3f49618d11fd4295cad

                        SHA256

                        153938ecc186cd98a2f1ebd1f53ae88cfe9d9884bd470e9166a53348a071fb2b

                        SHA512

                        0e7cf3372f919b11b0c6341bc4df2bb8ba5106463b06c74f0736b14755fa23a78db7e9b3111938570225435169bd01f7198b6124007defa77e90bbe21fd14588

                      • C:\Users\Admin\AppData\Local\Temp\Xeno-v1.1.65\Xeno.exe.WebView2\EBWebView\Default\Network\Network Persistent State~RFe58a236.TMP

                        Filesize

                        59B

                        MD5

                        2800881c775077e1c4b6e06bf4676de4

                        SHA1

                        2873631068c8b3b9495638c865915be822442c8b

                        SHA256

                        226eec4486509917aa336afebd6ff65777b75b65f1fb06891d2a857a9421a974

                        SHA512

                        e342407ab65cc68f1b3fd706cd0a37680a0864ffd30a6539730180ede2cdcd732cc97ae0b9ef7db12da5c0f83e429df0840dbf7596aca859a0301665e517377b

                      • C:\Users\Admin\AppData\Local\Temp\Xeno-v1.1.65\Xeno.exe.WebView2\EBWebView\Default\Network\SCT Auditing Pending Reports

                        Filesize

                        2B

                        MD5

                        d751713988987e9331980363e24189ce

                        SHA1

                        97d170e1550eee4afc0af065b78cda302a97674c

                        SHA256

                        4f53cda18c2baa0c0354bb5f9a3ecbe5ed12ab4d8e11ba873c2f11161202b945

                        SHA512

                        b25b294cb4deb69ea00a4c3cf3113904801b6015e5956bd019a8570b1fe1d6040e944ef3cdee16d0a46503ca6e659a25f21cf9ceddc13f352a3c98138c15d6af

                      • C:\Users\Admin\AppData\Local\Temp\Xeno-v1.1.65\Xeno.exe.WebView2\EBWebView\Default\Preferences

                        Filesize

                        6KB

                        MD5

                        6825f6f3eb337e6479e1d71e77f3f034

                        SHA1

                        8fcdfcd39c19a439cf5bac4e0a822e9874e8295f

                        SHA256

                        0afe058d43d9994cf1463693c71d37bb03a2a16dc2e5844908837b94cdbb5fe7

                        SHA512

                        d65be1ce4074c0c6df64a62dc0c56d623fb8fb0996361715d4c773a9b9581658a90ab0ec69ec2514d9452e3089099aaef369ad3a5d692b6a30967ec534b9fc21

                      • C:\Users\Admin\AppData\Local\Temp\Xeno-v1.1.65\Xeno.exe.WebView2\EBWebView\Default\Preferences~RFe58295d.TMP

                        Filesize

                        6KB

                        MD5

                        7d3fc10c9adf829e91b55f1075dd41c9

                        SHA1

                        f836a875cc658f4cd2ee3fd9d60071b2b13279ef

                        SHA256

                        e760ccd6065514d068ba65f116d6c1c1729338eb13271ddbe091545152a67bf5

                        SHA512

                        855a2bef1268039b8d550c1a3e40c4c58f8245f2aa3c4cacd355dc91ea00bf7ba24e7c8281184b5289749789b8864000ee0064539965abc7de34c0dc8075917a

                      • C:\Users\Admin\AppData\Local\Temp\Xeno-v1.1.65\Xeno.exe.WebView2\EBWebView\Default\Sync Data\LevelDB\CURRENT

                        Filesize

                        16B

                        MD5

                        46295cac801e5d4857d09837238a6394

                        SHA1

                        44e0fa1b517dbf802b18faf0785eeea6ac51594b

                        SHA256

                        0f1bad70c7bd1e0a69562853ec529355462fcd0423263a3d39d6d0d70b780443

                        SHA512

                        8969402593f927350e2ceb4b5bc2a277f3754697c1961e3d6237da322257fbab42909e1a742e22223447f3a4805f8d8ef525432a7c3515a549e984d3eff72b23

                      • C:\Users\Admin\AppData\Local\Temp\Xeno-v1.1.65\Xeno.exe.WebView2\EBWebView\Local State

                        Filesize

                        1KB

                        MD5

                        a8bb662074992a84bfb0b601c20a2655

                        SHA1

                        859c5ee2e994cf672246bd47195b234ad9ab8cbb

                        SHA256

                        b2d8e07bc993645b25d085b553b04103b9e80e565793f3a17684c32ef83b151f

                        SHA512

                        78dee26d97a6b706ad26a976c39a9a5d384f190e4e0bd6db24fe7417d1c99609405011f5589f8428eaaa78f25ad3292d5746fc0e79c48032bc166a6dfbd2e0aa

                      • C:\Users\Admin\AppData\Local\Temp\Xeno-v1.1.65\Xeno.exe.WebView2\EBWebView\Local State

                        Filesize

                        2KB

                        MD5

                        4decb03a22c20c82989400931bdbd420

                        SHA1

                        b07662d7b8059d5659e8a8295ae1bfb8fbba644f

                        SHA256

                        1b8edfa4dc9a3909cda5a7a671cd3cca0d8a6745888fbe10413858fcad36e623

                        SHA512

                        941650ec437776f3aab413edee779f3c332c40ac614bfbbe423016f3ccc353923374bb5eae4bb655d73ebba962beb6d766bf10c62ae40b5f7f8042610f2a2c19

                      • C:\Users\Admin\AppData\Local\Temp\Xeno-v1.1.65\Xeno.exe.WebView2\EBWebView\Local State

                        Filesize

                        3KB

                        MD5

                        4b1cc71d172845e0b9facaee83cb3747

                        SHA1

                        4e0fa58943ea5f4d084ad2131509a997c8755dba

                        SHA256

                        1a816da266788bcf5b484b3aa6942b86a7a707b018e16aeb491d02d9d8414043

                        SHA512

                        bbbfd63148a7a829b06940137938d5d109cdd5e96c57b49281ede5ac5472d53182040dffdfa8368307b45f7cf3d05523407d70897fe7a28a2d226f26e6aea863

                      • C:\Users\Admin\AppData\Local\Temp\Xeno-v1.1.65\Xeno.exe.WebView2\EBWebView\Local State

                        Filesize

                        16KB

                        MD5

                        94f757e5a71e46cc5e487154280c9a85

                        SHA1

                        be1fcd66eeac3ed245986d4d456c6b30f1af7c36

                        SHA256

                        a4b5ef8d0cf9b6b3baae251c901e9cb1fe059961c38f9c4c804f70a301aa61aa

                        SHA512

                        4e12ab27188ca0c8ba6b2329d952299794e76a545e34a0209d3f978fde6d05e5a5f07dfef75f527acd9d49ef54a22854ebcaac37b2e9cb475dc6399281737972

                      • C:\Users\Admin\AppData\Local\Temp\Xeno-v1.1.65\Xeno.exe.WebView2\EBWebView\Local State~RFe5789d1.TMP

                        Filesize

                        1KB

                        MD5

                        65651c9c23ce6f7b60515ceae84803b6

                        SHA1

                        67c93a2b96c66c6144c9d676b137f00f79b6db51

                        SHA256

                        624711707aabb69334ba2bb091c96e503e6a8a9b104e5aa29ee33170802f05c7

                        SHA512

                        91818aec14b77b889cc92c771afd06b69dd04512b1484fbd11dcdaf99b1fd4d771e8ef48cb6cc834838de9e4d7859d042e06b4e7f93f5a96f78a67240c21a4d2

                      • C:\Users\Admin\AppData\Local\Temp\Xeno-v1.1.65\Xeno.exe.WebView2\EBWebView\PKIMetadata\22.0.0.0\crs.pb

                        Filesize

                        289KB

                        MD5

                        2b59269e7efdd95ba14eeb780dfb98c2

                        SHA1

                        b3f84cbc37a79eeecb8f1f39b615577d78600096

                        SHA256

                        ff2ced650772249abb57f6f19c5d0322d6df22c85c7cf2be193b6134e1b95172

                        SHA512

                        e4b454db2248021e0d198805ea54f1c0cfd84b9716a9348b1d0e0acb7c6fb5dd0839e532a5eb6d4410ab759d6688dd6cce8375ad55a150d738d280993142e9d7

                      • C:\Users\Admin\AppData\Local\Temp\Xeno-v1.1.65\Xeno.exe.WebView2\EBWebView\PKIMetadata\22.0.0.0\ct_config.pb

                        Filesize

                        8KB

                        MD5

                        811b65320a82ebd6686fabf4bb1cb81a

                        SHA1

                        c660d448114043babec5d1c9c2584df6fab7f69b

                        SHA256

                        52687dd0c06f86a2298a4442ab8afa9b608271ec01a67217d7b58dab7e507bdf

                        SHA512

                        33350cce447508269b7714d9e551560553e020d6acf37a6a6021dc497d4008ce9e532dd615ad68872d75da22ac2039ef0b4fa70c23ec4b58043c468d5d75fd81

                      • C:\Users\Admin\AppData\Local\Temp\Xeno-v1.1.65\Xeno.exe.WebView2\EBWebView\PKIMetadata\22.0.0.0\kp_pinslist.pb

                        Filesize

                        11KB

                        MD5

                        0779206f78d8b0d540445a10cb51670c

                        SHA1

                        67f0f916be73bf5cffd3f4c4aa8d122c7d73ad54

                        SHA256

                        bf0945921058b9e67db61e6a559531af2f9b78d5fbedb0b411384225bdd366ec

                        SHA512

                        4140b2debe9c0b04e1e59be1387dca0e8e2f3cbc1f67830cbc723864acc2276cde9529295dcb4138fa0e2e116416658753fe46901dfa572bdfe6c7fb67bd8478

                      • C:\Users\Admin\AppData\Local\Temp\Xeno-v1.1.65\Xeno.exe.WebView2\EBWebView\TrustTokenKeyCommitments\2025.1.17.1\keys.json

                        Filesize

                        6KB

                        MD5

                        bef4f9f856321c6dccb47a61f605e823

                        SHA1

                        8e60af5b17ed70db0505d7e1647a8bc9f7612939

                        SHA256

                        fd1847df25032c4eef34e045ba0333f9bd3cb38c14344f1c01b48f61f0cfd5c5

                        SHA512

                        bdec3e243a6f39bfea4130c85b162ea00a4974c6057cd06a05348ac54517201bbf595fcc7c22a4ab2c16212c6009f58df7445c40c82722ab4fa1c8d49d39755c

                      • C:\Windows\SystemTemp\chrome_Unpacker_BeginUnzipping2712_337998716\crl-set

                        Filesize

                        21KB

                        MD5

                        846feb52bd6829102a780ec0da74ab04

                        SHA1

                        dd98409b49f0cd1f9d0028962d7276860579fb54

                        SHA256

                        124b7eeba31f0e3d9b842a62f3441204beb13fade81da38b854aecba0e03a5b4

                        SHA512

                        c8759e675506ccc6aa9807798252c7e7c48a0ab31674609738617dc105cee38bce69d4d41d6b95e16731466880b386d35483cbeea6275773f7041ba6e305fae9

                      • C:\Windows\SystemTemp\chrome_Unpacker_BeginUnzipping2712_337998716\manifest.json

                        Filesize

                        114B

                        MD5

                        e6cd92ad3b3ab9cb3d325f3c4b7559aa

                        SHA1

                        0704d57b52cf55674524a5278ed4f7ba1e19ca0c

                        SHA256

                        63dfb8d99ce83b3ca282eb697dc76b17b4a48e4065fc7efafb77724739074a9d

                        SHA512

                        172d5dc107757bb591b9a8ed7f2b48f22b5184d6537572d375801113e294febfbe39077c408e3a04c44e6072427cbe443c6614d205a5a4aa290101722e18f5e8

                      • C:\Windows\SystemTemp\chrome_Unpacker_BeginUnzipping2712_56790507\manifest.json

                        Filesize

                        79B

                        MD5

                        7f4b594a35d631af0e37fea02df71e72

                        SHA1

                        f7bc71621ea0c176ca1ab0a3c9fe52dbca116f57

                        SHA256

                        530882d7f535ae57a4906ca735b119c9e36480cbb780c7e8ad37c9c8fdf3d9b1

                        SHA512

                        bf3f92f5023f0fbad88526d919252a98db6d167e9ca3e15b94f7d71ded38a2cfb0409f57ef24708284ddd965bda2d3207cd99c008b1c9c8c93705fd66ac86360

                      • C:\Windows\SystemTemp\chrome_Unpacker_BeginUnzipping2712_577810577\manifest.json

                        Filesize

                        102B

                        MD5

                        a64e2a4236e705215a3fd5cb2697a71f

                        SHA1

                        1c73e6aad8f44ade36df31a23eaaf8cd0cae826d

                        SHA256

                        014e9fc1219beefc428ec749633125c9bff7febc3be73a14a8f18a6691cd2846

                        SHA512

                        75b30c0c8cef490aaf923afbdb5385d4770de82e698f71f8f126a6af5ef16f3a90d0c27687f405274177b1a5250436efddd228a6d2949651f43bd926e8a1cc99

                      • C:\Windows\SystemTemp\chrome_Unpacker_BeginUnzipping2712_922697375\manifest.json

                        Filesize

                        43B

                        MD5

                        af3a9104ca46f35bb5f6123d89c25966

                        SHA1

                        1ffb1b0aa9f44bdbc57bdf4b98d26d3be0207ee8

                        SHA256

                        81bd82ac27612a58be30a72dd8956b13f883e32ffb54a58076bd6a42b8afaeea

                        SHA512

                        6a7a543fa2d1ead3574b4897d2fc714bb218c60a04a70a7e92ecfd2ea59d67028f91b6a2094313f606560087336c619093f1d38d66a3c63a1d1d235ca03d36d1

                      • C:\Windows\SystemTemp\chrome_Unpacker_BeginUnzipping2712_932471846\hyph-as.hyb

                        Filesize

                        703B

                        MD5

                        8961fdd3db036dd43002659a4e4a7365

                        SHA1

                        7b2fa321d50d5417e6c8d48145e86d15b7ff8321

                        SHA256

                        c2784e33158a807135850f7125a7eaabe472b3cfc7afb82c74f02da69ea250fe

                        SHA512

                        531ecec11d296a1ab3faeb2c7ac619da9d80c1054a2ccee8a5a0cd996346fea2a2fee159ac5a8d79b46a764a2aa8e542d6a79d86b3d7dda461e41b19c9bebe92

                      • C:\Windows\SystemTemp\chrome_Unpacker_BeginUnzipping2712_932471846\hyph-hi.hyb

                        Filesize

                        687B

                        MD5

                        0807cf29fc4c5d7d87c1689eb2e0baaa

                        SHA1

                        d0914fb069469d47a36d339ca70164253fccf022

                        SHA256

                        f4df224d459fd111698dd5a13613c5bbf0ed11f04278d60230d028010eac0c42

                        SHA512

                        5324fd47c94f5804bfa1aa6df952949915896a3fc77dccaed0eeffeafe995ce087faef035aecea6b4c864a16ad32de00055f55260af974f2c41afff14dce00f3

                      • C:\Windows\SystemTemp\chrome_Unpacker_BeginUnzipping2712_932471846\hyph-nb.hyb

                        Filesize

                        141KB

                        MD5

                        677edd1a17d50f0bd11783f58725d0e7

                        SHA1

                        98fedc5862c78f3b03daed1ff9efbe5e31c205ee

                        SHA256

                        c2771fbb1bfff7db5e267dc7a4505a9675c6b98cfe7a8f7ae5686d7a5a2b3dd0

                        SHA512

                        c368f6687fa8a2ef110fcb2b65df13f6a67feac7106014bd9ea9315f16e4d7f5cbc8b4a67ba2169c6909d49642d88ae2a0a9cd3f1eb889af326f29b379cfd3ff

                      • C:\Windows\SystemTemp\chrome_Unpacker_BeginUnzipping2712_932471846\manifest.json

                        Filesize

                        82B

                        MD5

                        2617c38bed67a4190fc499142b6f2867

                        SHA1

                        a37f0251cd6be0a6983d9a04193b773f86d31da1

                        SHA256

                        d571ef33b0e707571f10bb37b99a607d6f43afe33f53d15b4395b16ef3fda665

                        SHA512

                        b08053050692765f172142bad7afbcd038235275c923f3cd089d556251482b1081e53c4ad7367a1fb11ca927f2ad183dc63d31ccfbf85b0160cf76a31343a6d0

                      • memory/940-211-0x0000023D39E00000-0x0000023D39F1E000-memory.dmp

                        Filesize

                        1.1MB

                      • memory/940-36-0x00007FFB81DE0000-0x00007FFB81DE1000-memory.dmp

                        Filesize

                        4KB

                      • memory/2412-708-0x000001E6A4960000-0x000001E6A4961000-memory.dmp

                        Filesize

                        4KB

                      • memory/2412-707-0x000001E6A4960000-0x000001E6A4961000-memory.dmp

                        Filesize

                        4KB

                      • memory/2412-706-0x000001E6A4960000-0x000001E6A4961000-memory.dmp

                        Filesize

                        4KB

                      • memory/2412-705-0x000001E6A4960000-0x000001E6A4961000-memory.dmp

                        Filesize

                        4KB

                      • memory/2412-703-0x000001E6A4960000-0x000001E6A4961000-memory.dmp

                        Filesize

                        4KB

                      • memory/2412-704-0x000001E6A4960000-0x000001E6A4961000-memory.dmp

                        Filesize

                        4KB

                      • memory/2412-702-0x000001E6A4960000-0x000001E6A4961000-memory.dmp

                        Filesize

                        4KB

                      • memory/2412-697-0x000001E6A4960000-0x000001E6A4961000-memory.dmp

                        Filesize

                        4KB

                      • memory/2412-698-0x000001E6A4960000-0x000001E6A4961000-memory.dmp

                        Filesize

                        4KB

                      • memory/2412-696-0x000001E6A4960000-0x000001E6A4961000-memory.dmp

                        Filesize

                        4KB

                      • memory/4020-140-0x00007FFB81DE0000-0x00007FFB81DE1000-memory.dmp

                        Filesize

                        4KB