Overview
overview
6Static
static
3Xeno-v1.1....re.dll
windows11-21h2-x64
1Xeno-v1.1....ms.dll
windows11-21h2-x64
1Xeno-v1.1....pf.dll
windows11-21h2-x64
1Xeno-v1.1....on.dll
windows11-21h2-x64
1Xeno-v1.1.65/Xeno.dll
windows11-21h2-x64
1Xeno-v1.1.65/Xeno.exe
windows11-21h2-x64
6Xeno-v1.1....s.json
windows11-21h2-x64
3Xeno-v1.1....UI.exe
windows11-21h2-x64
1Xeno-v1.1....g.json
windows11-21h2-x64
3Xeno-v1.1....-0.dll
windows11-21h2-x64
1Xeno-v1.1....-0.dll
windows11-21h2-x64
1Xeno-v1.1....-0.dll
windows11-21h2-x64
1Xeno-v1.1....-0.dll
windows11-21h2-x64
1Xeno-v1.1....-0.dll
windows11-21h2-x64
1Xeno-v1.1....-0.dll
windows11-21h2-x64
1Xeno-v1.1....-0.dll
windows11-21h2-x64
1Xeno-v1.1....-0.dll
windows11-21h2-x64
1Xeno-v1.1....in.css
windows11-21h2-x64
3Xeno-v1.1....der.js
windows11-21h2-x64
3Xeno-v1.1....64.dll
windows11-21h2-x64
1Xeno-v1.1....64.dll
windows11-21h2-x64
1Xeno-v1.1....40.dll
windows11-21h2-x64
1Xeno-v1.1....er.dll
windows11-21h2-x64
1Xeno-v1.1....er.dll
windows11-21h2-x64
1Xeno-v1.1....er.dll
windows11-21h2-x64
3Xeno-v1.1....se.dll
windows11-21h2-x64
1Xeno-v1.1....40.dll
windows11-21h2-x64
1Xeno-v1.1...._1.dll
windows11-21h2-x64
1Resubmissions
02/04/2025, 22:36
250402-2h95esxpz5 330/03/2025, 19:46
250330-yg7q5avzew 629/03/2025, 19:55
250329-ynl31axwgv 629/03/2025, 19:55
250329-ym9gxaxvf1 629/03/2025, 18:18
250329-wxy3taznv5 629/03/2025, 10:24
250329-mfdwwa1xay 729/03/2025, 00:19
250329-amltvawpx2 6Analysis
-
max time kernel
150s -
max time network
151s -
platform
windows11-21h2_x64 -
resource
win11-20250313-en -
resource tags
arch:x64arch:x86image:win11-20250313-enlocale:en-usos:windows11-21h2-x64system -
submitted
29/03/2025, 19:55
Static task
static1
Behavioral task
behavioral1
Sample
Xeno-v1.1.65/Microsoft.Web.WebView2.Core.dll
Resource
win11-20250313-en
Behavioral task
behavioral2
Sample
Xeno-v1.1.65/Microsoft.Web.WebView2.WinForms.dll
Resource
win11-20250313-en
Behavioral task
behavioral3
Sample
Xeno-v1.1.65/Microsoft.Web.WebView2.Wpf.dll
Resource
win11-20250313-en
Behavioral task
behavioral4
Sample
Xeno-v1.1.65/Newtonsoft.Json.dll
Resource
win11-20250313-en
Behavioral task
behavioral5
Sample
Xeno-v1.1.65/Xeno.dll
Resource
win11-20250313-en
Behavioral task
behavioral6
Sample
Xeno-v1.1.65/Xeno.exe
Resource
win11-20250313-en
Behavioral task
behavioral7
Sample
Xeno-v1.1.65/XenoUI.deps.json
Resource
win11-20250313-en
Behavioral task
behavioral8
Sample
Xeno-v1.1.65/XenoUI.exe
Resource
win11-20250313-en
Behavioral task
behavioral9
Sample
Xeno-v1.1.65/XenoUI.runtimeconfig.json
Resource
win11-20250313-en
Behavioral task
behavioral10
Sample
Xeno-v1.1.65/api-ms-win-crt-convert-l1-1-0.dll
Resource
win11-20250313-en
Behavioral task
behavioral11
Sample
Xeno-v1.1.65/api-ms-win-crt-filesystem-l1-1-0.dll
Resource
win11-20250313-en
Behavioral task
behavioral12
Sample
Xeno-v1.1.65/api-ms-win-crt-heap-l1-1-0.dll
Resource
win11-20250314-en
Behavioral task
behavioral13
Sample
Xeno-v1.1.65/api-ms-win-crt-locale-l1-1-0.dll
Resource
win11-20250313-en
Behavioral task
behavioral14
Sample
Xeno-v1.1.65/api-ms-win-crt-math-l1-1-0.dll
Resource
win11-20250313-en
Behavioral task
behavioral15
Sample
Xeno-v1.1.65/api-ms-win-crt-runtime-l1-1-0.dll
Resource
win11-20250313-en
Behavioral task
behavioral16
Sample
Xeno-v1.1.65/api-ms-win-crt-stdio-l1-1-0.dll
Resource
win11-20250313-en
Behavioral task
behavioral17
Sample
Xeno-v1.1.65/api-ms-win-crt-string-l1-1-0.dll
Resource
win11-20250313-en
Behavioral task
behavioral18
Sample
Xeno-v1.1.65/bin/Monaco/vs/editor/editor.main.css
Resource
win11-20250314-en
Behavioral task
behavioral19
Sample
Xeno-v1.1.65/bin/Monaco/vs/loader.js
Resource
win11-20250314-en
Behavioral task
behavioral20
Sample
Xeno-v1.1.65/libcrypto-3-x64.dll
Resource
win11-20250313-en
Behavioral task
behavioral21
Sample
Xeno-v1.1.65/libssl-3-x64.dll
Resource
win11-20250313-en
Behavioral task
behavioral22
Sample
Xeno-v1.1.65/msvcp140.dll
Resource
win11-20250313-en
Behavioral task
behavioral23
Sample
Xeno-v1.1.65/runtimes/win-arm64/native/WebView2Loader.dll
Resource
win11-20250314-en
Behavioral task
behavioral24
Sample
Xeno-v1.1.65/runtimes/win-x64/native/WebView2Loader.dll
Resource
win11-20250313-en
Behavioral task
behavioral25
Sample
Xeno-v1.1.65/runtimes/win-x86/native/WebView2Loader.dll
Resource
win11-20250313-en
Behavioral task
behavioral26
Sample
Xeno-v1.1.65/ucrtbase.dll
Resource
win11-20250314-en
Behavioral task
behavioral27
Sample
Xeno-v1.1.65/vcruntime140.dll
Resource
win11-20250313-en
Behavioral task
behavioral28
Sample
Xeno-v1.1.65/vcruntime140_1.dll
Resource
win11-20250313-en
General
-
Target
Xeno-v1.1.65/Xeno.exe
-
Size
140KB
-
MD5
70797e0760472325728ba786ca208976
-
SHA1
8912f23afbe8b78a9582f2a458b89a7fd697e638
-
SHA256
20744d38bc27d656a095e57bef62a44f5f6317de3672020e8a4a1e1057545764
-
SHA512
787f172cbc18eeb4f8e88420377459f37918edc9aec0105566f9e79555a962d6e89d7d0d6b791475282b2c5fb093c9e85544794639ad2771d9ca4a0e5b456477
-
SSDEEP
3072:h+f4nYTC3LwjBzaQhlG4a7qWdCXdXxuZjwxfBoy:h+f4nKvaQhcF7qI+xuZjwxB
Malware Config
Signatures
-
Checks whether UAC is enabled 1 TTPs 1 IoCs
description ioc Process Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA Xeno.exe -
Legitimate hosting services abused for malware hosting/C2 1 TTPs 4 IoCs
flow ioc 9 raw.githubusercontent.com 10 raw.githubusercontent.com 11 raw.githubusercontent.com 12 raw.githubusercontent.com -
Drops file in Windows directory 64 IoCs
description ioc Process File created C:\Windows\SystemTemp\chrome_Unpacker_BeginUnzipping2712_932471846\hyph-cy.hyb msedgewebview2.exe File created C:\Windows\SystemTemp\chrome_Unpacker_BeginUnzipping2712_932471846\hyph-eu.hyb msedgewebview2.exe File created C:\Windows\SystemTemp\chrome_Unpacker_BeginUnzipping2712_932471846\hyph-lv.hyb msedgewebview2.exe File created C:\Windows\SystemTemp\chrome_Unpacker_BeginUnzipping2712_932471846\hyph-ta.hyb msedgewebview2.exe File created C:\Windows\SystemTemp\chrome_Unpacker_BeginUnzipping2712_932471846\hyph-und-ethi.hyb msedgewebview2.exe File created C:\Windows\SystemTemp\chrome_Unpacker_BeginUnzipping2712_337998716\crl-set msedgewebview2.exe File created C:\Windows\SystemTemp\chrome_Unpacker_BeginUnzipping2712_932471846\hyph-hu.hyb msedgewebview2.exe File created C:\Windows\SystemTemp\chrome_Unpacker_BeginUnzipping2712_932471846\hyph-lt.hyb msedgewebview2.exe File created C:\Windows\SystemTemp\chrome_Unpacker_BeginUnzipping2712_932471846\hyph-te.hyb msedgewebview2.exe File created C:\Windows\SystemTemp\chrome_Unpacker_BeginUnzipping2712_577810577\crs.pb msedgewebview2.exe File created C:\Windows\SystemTemp\chrome_Unpacker_BeginUnzipping2712_922697375\manifest.json msedgewebview2.exe File created C:\Windows\SystemTemp\chrome_Unpacker_BeginUnzipping2712_56790507\manifest.json msedgewebview2.exe File created C:\Windows\SystemTemp\chrome_Unpacker_BeginUnzipping2712_932471846\hyph-bg.hyb msedgewebview2.exe File created C:\Windows\SystemTemp\chrome_Unpacker_BeginUnzipping2712_932471846\hyph-hy.hyb msedgewebview2.exe File created C:\Windows\SystemTemp\chrome_Unpacker_BeginUnzipping2712_932471846\hyph-kn.hyb msedgewebview2.exe File created C:\Windows\SystemTemp\chrome_Unpacker_BeginUnzipping2712_932471846\hyph-pa.hyb msedgewebview2.exe File created C:\Windows\SystemTemp\chrome_Unpacker_BeginUnzipping2712_56790507\manifest.fingerprint msedgewebview2.exe File created C:\Windows\SystemTemp\chrome_Unpacker_BeginUnzipping2712_932471846\hyph-de-1901.hyb msedgewebview2.exe File created C:\Windows\SystemTemp\chrome_Unpacker_BeginUnzipping2712_932471846\hyph-nb.hyb msedgewebview2.exe File created C:\Windows\SystemTemp\chrome_Unpacker_BeginUnzipping2712_932471846\hyph-sk.hyb msedgewebview2.exe File created C:\Windows\SystemTemp\chrome_Unpacker_BeginUnzipping2712_932471846\hyph-sq.hyb msedgewebview2.exe File created C:\Windows\SystemTemp\chrome_Unpacker_BeginUnzipping2712_56790507\keys.json msedgewebview2.exe File created C:\Windows\SystemTemp\chrome_Unpacker_BeginUnzipping2712_932471846\hyph-ka.hyb msedgewebview2.exe File created C:\Windows\SystemTemp\chrome_Unpacker_BeginUnzipping2712_337998716\manifest.fingerprint msedgewebview2.exe File created C:\Windows\SystemTemp\chrome_Unpacker_BeginUnzipping2712_932471846\hyph-el.hyb msedgewebview2.exe File created C:\Windows\SystemTemp\chrome_Unpacker_BeginUnzipping2712_932471846\hyph-be.hyb msedgewebview2.exe File created C:\Windows\SystemTemp\chrome_Unpacker_BeginUnzipping2712_932471846\hyph-cs.hyb msedgewebview2.exe File created C:\Windows\SystemTemp\chrome_Unpacker_BeginUnzipping2712_932471846\hyph-gu.hyb msedgewebview2.exe File created C:\Windows\SystemTemp\chrome_Unpacker_BeginUnzipping2712_577810577\manifest.json msedgewebview2.exe File created C:\Windows\SystemTemp\chrome_Unpacker_BeginUnzipping2712_932471846\hyph-af.hyb msedgewebview2.exe File created C:\Windows\SystemTemp\chrome_Unpacker_BeginUnzipping2712_932471846\hyph-et.hyb msedgewebview2.exe File created C:\Windows\SystemTemp\chrome_Unpacker_BeginUnzipping2712_932471846\hyph-fr.hyb msedgewebview2.exe File created C:\Windows\SystemTemp\chrome_Unpacker_BeginUnzipping2712_932471846\hyph-ga.hyb msedgewebview2.exe File created C:\Windows\SystemTemp\chrome_Unpacker_BeginUnzipping2712_932471846\hyph-hi.hyb msedgewebview2.exe File created C:\Windows\SystemTemp\chrome_Unpacker_BeginUnzipping2712_932471846\hyph-ml.hyb msedgewebview2.exe File created C:\Windows\SystemTemp\chrome_Unpacker_BeginUnzipping2712_932471846\hyph-mn-cyrl.hyb msedgewebview2.exe File created C:\Windows\SystemTemp\chrome_Unpacker_BeginUnzipping2712_932471846\hyph-mr.hyb msedgewebview2.exe File created C:\Windows\SystemTemp\chrome_Unpacker_BeginUnzipping2712_932471846\hyph-da.hyb msedgewebview2.exe File created C:\Windows\SystemTemp\chrome_Unpacker_BeginUnzipping2712_932471846\hyph-sv.hyb msedgewebview2.exe File created C:\Windows\SystemTemp\chrome_Unpacker_BeginUnzipping2712_577810577\ct_config.pb msedgewebview2.exe File created C:\Windows\SystemTemp\chrome_Unpacker_BeginUnzipping2712_56790507\LICENSE msedgewebview2.exe File created C:\Windows\SystemTemp\chrome_Unpacker_BeginUnzipping2712_932471846\hyph-de-1996.hyb msedgewebview2.exe File created C:\Windows\SystemTemp\chrome_Unpacker_BeginUnzipping2712_932471846\hyph-la.hyb msedgewebview2.exe File created C:\Windows\SystemTemp\chrome_Unpacker_BeginUnzipping2712_56790507\_metadata\verified_contents.json msedgewebview2.exe File created C:\Windows\SystemTemp\chrome_Unpacker_BeginUnzipping2712_932471846\hyph-gl.hyb msedgewebview2.exe File created C:\Windows\SystemTemp\chrome_Unpacker_BeginUnzipping2712_932471846\hyph-or.hyb msedgewebview2.exe File created C:\Windows\SystemTemp\chrome_Unpacker_BeginUnzipping2712_337998716\manifest.json msedgewebview2.exe File created C:\Windows\SystemTemp\chrome_Unpacker_BeginUnzipping2712_932471846\hyph-it.hyb msedgewebview2.exe File created C:\Windows\SystemTemp\chrome_Unpacker_BeginUnzipping2712_932471846\hyph-nn.hyb msedgewebview2.exe File created C:\Windows\SystemTemp\chrome_Unpacker_BeginUnzipping2712_932471846\hyph-pt.hyb msedgewebview2.exe File created C:\Windows\SystemTemp\chrome_Unpacker_BeginUnzipping2712_932471846\hyph-uk.hyb msedgewebview2.exe File created C:\Windows\SystemTemp\chrome_Unpacker_BeginUnzipping2712_932471846\_metadata\verified_contents.json msedgewebview2.exe File created C:\Windows\SystemTemp\chrome_Unpacker_BeginUnzipping2712_932471846\hyph-cu.hyb msedgewebview2.exe File created C:\Windows\SystemTemp\chrome_Unpacker_BeginUnzipping2712_932471846\hyph-de-ch-1901.hyb msedgewebview2.exe File created C:\Windows\SystemTemp\chrome_Unpacker_BeginUnzipping2712_932471846\hyph-en-us.hyb msedgewebview2.exe File created C:\Windows\SystemTemp\chrome_Unpacker_BeginUnzipping2712_932471846\hyph-es.hyb msedgewebview2.exe File created C:\Windows\SystemTemp\chrome_Unpacker_BeginUnzipping2712_932471846\hyph-mul-ethi.hyb msedgewebview2.exe File created C:\Windows\SystemTemp\chrome_Unpacker_BeginUnzipping2712_577810577\kp_pinslist.pb msedgewebview2.exe File created C:\Windows\SystemTemp\chrome_Unpacker_BeginUnzipping2712_577810577\manifest.fingerprint msedgewebview2.exe File created C:\Windows\SystemTemp\chrome_Unpacker_BeginUnzipping2712_922697375\manifest.fingerprint msedgewebview2.exe File created C:\Windows\SystemTemp\chrome_Unpacker_BeginUnzipping2712_932471846\hyph-nl.hyb msedgewebview2.exe File created C:\Windows\SystemTemp\chrome_Unpacker_BeginUnzipping2712_932471846\hyph-ru.hyb msedgewebview2.exe File created C:\Windows\SystemTemp\chrome_Unpacker_BeginUnzipping2712_932471846\hyph-tk.hyb msedgewebview2.exe File created C:\Windows\SystemTemp\chrome_Unpacker_BeginUnzipping2712_932471846\manifest.json msedgewebview2.exe -
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedgewebview2.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedgewebview2.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedgewebview2.exe -
Modifies data under HKEY_USERS 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry msedgewebview2.exe Set value (int) \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry\TraceTimeLast = "133877518688809622" msedgewebview2.exe -
Suspicious behavior: EnumeratesProcesses 4 IoCs
pid Process 2816 Xeno.exe 2816 Xeno.exe 2412 msedgewebview2.exe 2412 msedgewebview2.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 1 IoCs
pid Process 2712 msedgewebview2.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2816 wrote to memory of 2712 2816 Xeno.exe 82 PID 2816 wrote to memory of 2712 2816 Xeno.exe 82 PID 2712 wrote to memory of 3452 2712 msedgewebview2.exe 83 PID 2712 wrote to memory of 3452 2712 msedgewebview2.exe 83 PID 2712 wrote to memory of 940 2712 msedgewebview2.exe 84 PID 2712 wrote to memory of 940 2712 msedgewebview2.exe 84 PID 2712 wrote to memory of 940 2712 msedgewebview2.exe 84 PID 2712 wrote to memory of 940 2712 msedgewebview2.exe 84 PID 2712 wrote to memory of 940 2712 msedgewebview2.exe 84 PID 2712 wrote to memory of 940 2712 msedgewebview2.exe 84 PID 2712 wrote to memory of 940 2712 msedgewebview2.exe 84 PID 2712 wrote to memory of 940 2712 msedgewebview2.exe 84 PID 2712 wrote to memory of 940 2712 msedgewebview2.exe 84 PID 2712 wrote to memory of 940 2712 msedgewebview2.exe 84 PID 2712 wrote to memory of 940 2712 msedgewebview2.exe 84 PID 2712 wrote to memory of 940 2712 msedgewebview2.exe 84 PID 2712 wrote to memory of 940 2712 msedgewebview2.exe 84 PID 2712 wrote to memory of 940 2712 msedgewebview2.exe 84 PID 2712 wrote to memory of 940 2712 msedgewebview2.exe 84 PID 2712 wrote to memory of 940 2712 msedgewebview2.exe 84 PID 2712 wrote to memory of 940 2712 msedgewebview2.exe 84 PID 2712 wrote to memory of 940 2712 msedgewebview2.exe 84 PID 2712 wrote to memory of 940 2712 msedgewebview2.exe 84 PID 2712 wrote to memory of 940 2712 msedgewebview2.exe 84 PID 2712 wrote to memory of 940 2712 msedgewebview2.exe 84 PID 2712 wrote to memory of 940 2712 msedgewebview2.exe 84 PID 2712 wrote to memory of 940 2712 msedgewebview2.exe 84 PID 2712 wrote to memory of 940 2712 msedgewebview2.exe 84 PID 2712 wrote to memory of 940 2712 msedgewebview2.exe 84 PID 2712 wrote to memory of 940 2712 msedgewebview2.exe 84 PID 2712 wrote to memory of 940 2712 msedgewebview2.exe 84 PID 2712 wrote to memory of 940 2712 msedgewebview2.exe 84 PID 2712 wrote to memory of 940 2712 msedgewebview2.exe 84 PID 2712 wrote to memory of 940 2712 msedgewebview2.exe 84 PID 2712 wrote to memory of 940 2712 msedgewebview2.exe 84 PID 2712 wrote to memory of 940 2712 msedgewebview2.exe 84 PID 2712 wrote to memory of 940 2712 msedgewebview2.exe 84 PID 2712 wrote to memory of 940 2712 msedgewebview2.exe 84 PID 2712 wrote to memory of 940 2712 msedgewebview2.exe 84 PID 2712 wrote to memory of 940 2712 msedgewebview2.exe 84 PID 2712 wrote to memory of 940 2712 msedgewebview2.exe 84 PID 2712 wrote to memory of 940 2712 msedgewebview2.exe 84 PID 2712 wrote to memory of 940 2712 msedgewebview2.exe 84 PID 2712 wrote to memory of 940 2712 msedgewebview2.exe 84 PID 2712 wrote to memory of 940 2712 msedgewebview2.exe 84 PID 2712 wrote to memory of 940 2712 msedgewebview2.exe 84 PID 2712 wrote to memory of 940 2712 msedgewebview2.exe 84 PID 2712 wrote to memory of 940 2712 msedgewebview2.exe 84 PID 2712 wrote to memory of 940 2712 msedgewebview2.exe 84 PID 2712 wrote to memory of 940 2712 msedgewebview2.exe 84 PID 2712 wrote to memory of 940 2712 msedgewebview2.exe 84 PID 2712 wrote to memory of 940 2712 msedgewebview2.exe 84 PID 2712 wrote to memory of 940 2712 msedgewebview2.exe 84 PID 2712 wrote to memory of 940 2712 msedgewebview2.exe 84 PID 2712 wrote to memory of 940 2712 msedgewebview2.exe 84 PID 2712 wrote to memory of 4492 2712 msedgewebview2.exe 85 PID 2712 wrote to memory of 4492 2712 msedgewebview2.exe 85 PID 2712 wrote to memory of 1604 2712 msedgewebview2.exe 86 PID 2712 wrote to memory of 1604 2712 msedgewebview2.exe 86 PID 2712 wrote to memory of 1604 2712 msedgewebview2.exe 86 PID 2712 wrote to memory of 1604 2712 msedgewebview2.exe 86 PID 2712 wrote to memory of 1604 2712 msedgewebview2.exe 86 PID 2712 wrote to memory of 1604 2712 msedgewebview2.exe 86 PID 2712 wrote to memory of 1604 2712 msedgewebview2.exe 86
Processes
-
C:\Users\Admin\AppData\Local\Temp\Xeno-v1.1.65\Xeno.exe"C:\Users\Admin\AppData\Local\Temp\Xeno-v1.1.65\Xeno.exe"1⤵
- Checks whether UAC is enabled
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2816 -
C:\Program Files (x86)\Microsoft\EdgeWebView\Application\132.0.2957.140\msedgewebview2.exe"C:\Program Files (x86)\Microsoft\EdgeWebView\Application\132.0.2957.140\msedgewebview2.exe" --embedded-browser-webview=1 --webview-exe-name=Xeno.exe --webview-exe-version=1.1.0+87ae4f96f8a0927052c1120167982fb069afd1b4 --user-data-dir="C:\Users\Admin\AppData\Local\Temp\Xeno-v1.1.65\Xeno.exe.WebView2\EBWebView" --noerrdialogs --embedded-browser-webview-dpi-awareness=1 --mojo-named-platform-channel-pipe=2816.3408.97701542532705434742⤵
- Drops file in Windows directory
- Enumerates system info in registry
- Modifies data under HKEY_USERS
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of WriteProcessMemory
PID:2712 -
C:\Program Files (x86)\Microsoft\EdgeWebView\Application\132.0.2957.140\msedgewebview2.exe"C:\Program Files (x86)\Microsoft\EdgeWebView\Application\132.0.2957.140\msedgewebview2.exe" --type=crashpad-handler --user-data-dir=C:\Users\Admin\AppData\Local\Temp\Xeno-v1.1.65\Xeno.exe.WebView2\EBWebView /prefetch:4 --monitor-self-annotation=ptype=crashpad-handler --database=C:\Users\Admin\AppData\Local\Temp\Xeno-v1.1.65\Xeno.exe.WebView2\EBWebView\Crashpad --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=132.0.6834.160 "--annotation=exe=C:\Program Files (x86)\Microsoft\EdgeWebView\Application\132.0.2957.140\msedgewebview2.exe" --annotation=plat=Win64 "--annotation=prod=Edge WebView2" --annotation=ver=132.0.2957.140 --initial-client-data=0x160,0x164,0x168,0x13c,0x170,0x7ffb5cf4b078,0x7ffb5cf4b084,0x7ffb5cf4b0903⤵PID:3452
-
-
C:\Program Files (x86)\Microsoft\EdgeWebView\Application\132.0.2957.140\msedgewebview2.exe"C:\Program Files (x86)\Microsoft\EdgeWebView\Application\132.0.2957.140\msedgewebview2.exe" --type=gpu-process --string-annotations --noerrdialogs --user-data-dir="C:\Users\Admin\AppData\Local\Temp\Xeno-v1.1.65\Xeno.exe.WebView2\EBWebView" --webview-exe-name=Xeno.exe --webview-exe-version=1.1.0+87ae4f96f8a0927052c1120167982fb069afd1b4 --embedded-browser-webview=1 --embedded-browser-webview-dpi-awareness=1 --gpu-preferences=UAAAAAAAAADgAAAEAAAAAAAAAAAAAAAAAABgAAEAAAAAAAAAAAAAAAAAAAACAAAAAAAAAAAAAAAAAAAAAAAAABAAAAAAAAAAEAAAAAAAAAAIAAAAAAAAAAgAAAAAAAAA --always-read-main-dll --field-trial-handle=1692,i,11140571899584436082,15998484186756580819,262144 --variations-seed-version --mojo-platform-channel-handle=1688 /prefetch:23⤵PID:940
-
-
C:\Program Files (x86)\Microsoft\EdgeWebView\Application\132.0.2957.140\msedgewebview2.exe"C:\Program Files (x86)\Microsoft\EdgeWebView\Application\132.0.2957.140\msedgewebview2.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --string-annotations --noerrdialogs --user-data-dir="C:\Users\Admin\AppData\Local\Temp\Xeno-v1.1.65\Xeno.exe.WebView2\EBWebView" --webview-exe-name=Xeno.exe --webview-exe-version=1.1.0+87ae4f96f8a0927052c1120167982fb069afd1b4 --embedded-browser-webview=1 --embedded-browser-webview-dpi-awareness=1 --always-read-main-dll --field-trial-handle=1400,i,11140571899584436082,15998484186756580819,262144 --variations-seed-version --mojo-platform-channel-handle=2012 /prefetch:113⤵PID:4492
-
-
C:\Program Files (x86)\Microsoft\EdgeWebView\Application\132.0.2957.140\msedgewebview2.exe"C:\Program Files (x86)\Microsoft\EdgeWebView\Application\132.0.2957.140\msedgewebview2.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=service --string-annotations --noerrdialogs --user-data-dir="C:\Users\Admin\AppData\Local\Temp\Xeno-v1.1.65\Xeno.exe.WebView2\EBWebView" --webview-exe-name=Xeno.exe --webview-exe-version=1.1.0+87ae4f96f8a0927052c1120167982fb069afd1b4 --embedded-browser-webview=1 --embedded-browser-webview-dpi-awareness=1 --always-read-main-dll --field-trial-handle=2280,i,11140571899584436082,15998484186756580819,262144 --variations-seed-version --mojo-platform-channel-handle=2284 /prefetch:133⤵PID:1604
-
-
C:\Program Files (x86)\Microsoft\EdgeWebView\Application\132.0.2957.140\msedgewebview2.exe"C:\Program Files (x86)\Microsoft\EdgeWebView\Application\132.0.2957.140\msedgewebview2.exe" --type=renderer --string-annotations --noerrdialogs --user-data-dir="C:\Users\Admin\AppData\Local\Temp\Xeno-v1.1.65\Xeno.exe.WebView2\EBWebView" --webview-exe-name=Xeno.exe --webview-exe-version=1.1.0+87ae4f96f8a0927052c1120167982fb069afd1b4 --embedded-browser-webview=1 --embedded-browser-webview-dpi-awareness=1 --video-capture-use-gpu-memory-buffer --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --js-flags="--harmony-weak-refs-with-cleanup-some --expose-gc --ms-user-locale=" --always-read-main-dll --field-trial-handle=3552,i,11140571899584436082,15998484186756580819,262144 --variations-seed-version --mojo-platform-channel-handle=3560 /prefetch:13⤵PID:4020
-
-
C:\Program Files (x86)\Microsoft\EdgeWebView\Application\132.0.2957.140\msedgewebview2.exe"C:\Program Files (x86)\Microsoft\EdgeWebView\Application\132.0.2957.140\msedgewebview2.exe" --type=utility --utility-sub-type=unzip.mojom.Unzipper --lang=en-US --service-sandbox-type=service --video-capture-use-gpu-memory-buffer --string-annotations --noerrdialogs --user-data-dir="C:\Users\Admin\AppData\Local\Temp\Xeno-v1.1.65\Xeno.exe.WebView2\EBWebView" --webview-exe-name=Xeno.exe --webview-exe-version=1.1.0+87ae4f96f8a0927052c1120167982fb069afd1b4 --embedded-browser-webview=1 --embedded-browser-webview-dpi-awareness=1 --always-read-main-dll --field-trial-handle=4252,i,11140571899584436082,15998484186756580819,262144 --variations-seed-version --mojo-platform-channel-handle=4632 /prefetch:143⤵PID:1216
-
-
C:\Program Files (x86)\Microsoft\EdgeWebView\Application\132.0.2957.140\msedgewebview2.exe"C:\Program Files (x86)\Microsoft\EdgeWebView\Application\132.0.2957.140\msedgewebview2.exe" --type=utility --utility-sub-type=unzip.mojom.Unzipper --lang=en-US --service-sandbox-type=service --video-capture-use-gpu-memory-buffer --string-annotations --noerrdialogs --user-data-dir="C:\Users\Admin\AppData\Local\Temp\Xeno-v1.1.65\Xeno.exe.WebView2\EBWebView" --webview-exe-name=Xeno.exe --webview-exe-version=1.1.0+87ae4f96f8a0927052c1120167982fb069afd1b4 --embedded-browser-webview=1 --embedded-browser-webview-dpi-awareness=1 --always-read-main-dll --field-trial-handle=4664,i,11140571899584436082,15998484186756580819,262144 --variations-seed-version --mojo-platform-channel-handle=752 /prefetch:143⤵PID:1048
-
-
C:\Program Files (x86)\Microsoft\EdgeWebView\Application\132.0.2957.140\msedgewebview2.exe"C:\Program Files (x86)\Microsoft\EdgeWebView\Application\132.0.2957.140\msedgewebview2.exe" --type=gpu-process --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.22000.1 --string-annotations --noerrdialogs --user-data-dir="C:\Users\Admin\AppData\Local\Temp\Xeno-v1.1.65\Xeno.exe.WebView2\EBWebView" --webview-exe-name=Xeno.exe --webview-exe-version=1.1.0+87ae4f96f8a0927052c1120167982fb069afd1b4 --embedded-browser-webview=1 --embedded-browser-webview-dpi-awareness=1 --gpu-preferences=UAAAAAAAAADoAAAEAAAAAAAAAAAAAAAAAABgAAEAAAAAAAAAAAAAAAAAAABCAAAAAAAAAAAAAAAAAAAAAAAAABAAAAAAAAAAEAAAAAAAAAAIAAAAAAAAAAgAAAAAAAAA --always-read-main-dll --field-trial-handle=4868,i,11140571899584436082,15998484186756580819,262144 --variations-seed-version --mojo-platform-channel-handle=4864 /prefetch:103⤵
- Suspicious behavior: EnumeratesProcesses
PID:2412
-
-
C:\Program Files (x86)\Microsoft\EdgeWebView\Application\132.0.2957.140\msedgewebview2.exe"C:\Program Files (x86)\Microsoft\EdgeWebView\Application\132.0.2957.140\msedgewebview2.exe" --type=utility --utility-sub-type=unzip.mojom.Unzipper --lang=en-US --service-sandbox-type=service --video-capture-use-gpu-memory-buffer --string-annotations --noerrdialogs --user-data-dir="C:\Users\Admin\AppData\Local\Temp\Xeno-v1.1.65\Xeno.exe.WebView2\EBWebView" --webview-exe-name=Xeno.exe --webview-exe-version=1.1.0+87ae4f96f8a0927052c1120167982fb069afd1b4 --embedded-browser-webview=1 --embedded-browser-webview-dpi-awareness=1 --always-read-main-dll --field-trial-handle=4864,i,11140571899584436082,15998484186756580819,262144 --variations-seed-version --mojo-platform-channel-handle=4512 /prefetch:143⤵PID:2296
-
-
C:\Program Files (x86)\Microsoft\EdgeWebView\Application\132.0.2957.140\msedgewebview2.exe"C:\Program Files (x86)\Microsoft\EdgeWebView\Application\132.0.2957.140\msedgewebview2.exe" --type=utility --utility-sub-type=unzip.mojom.Unzipper --lang=en-US --service-sandbox-type=service --video-capture-use-gpu-memory-buffer --string-annotations --noerrdialogs --user-data-dir="C:\Users\Admin\AppData\Local\Temp\Xeno-v1.1.65\Xeno.exe.WebView2\EBWebView" --webview-exe-name=Xeno.exe --webview-exe-version=1.1.0+87ae4f96f8a0927052c1120167982fb069afd1b4 --embedded-browser-webview=1 --embedded-browser-webview-dpi-awareness=1 --always-read-main-dll --field-trial-handle=4136,i,11140571899584436082,15998484186756580819,262144 --variations-seed-version --mojo-platform-channel-handle=4128 /prefetch:143⤵PID:2464
-
-
C:\Program Files (x86)\Microsoft\EdgeWebView\Application\132.0.2957.140\msedgewebview2.exe"C:\Program Files (x86)\Microsoft\EdgeWebView\Application\132.0.2957.140\msedgewebview2.exe" --type=utility --utility-sub-type=unzip.mojom.Unzipper --lang=en-US --service-sandbox-type=service --video-capture-use-gpu-memory-buffer --string-annotations --noerrdialogs --user-data-dir="C:\Users\Admin\AppData\Local\Temp\Xeno-v1.1.65\Xeno.exe.WebView2\EBWebView" --webview-exe-name=Xeno.exe --webview-exe-version=1.1.0+87ae4f96f8a0927052c1120167982fb069afd1b4 --embedded-browser-webview=1 --embedded-browser-webview-dpi-awareness=1 --always-read-main-dll --field-trial-handle=4760,i,11140571899584436082,15998484186756580819,262144 --variations-seed-version --mojo-platform-channel-handle=4132 /prefetch:143⤵PID:2044
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
28B
MD578d58a032761f1b9767ce9a961560a55
SHA116e75b82eb992b85361cfa782e2eac73f627717e
SHA256895c607361d12436b3c82f8e233278f594d1de2ac032fd9534670a26f9bd5ce5
SHA5124395ec8d0e057016daa654d94aeac4aea172814193ee9c3d5717093636db0972fea522a5e0596427b7c89cc2ab7f10c9be7c103b12b0c4151fc7b221d13e0f0e
-
Filesize
280B
MD539cad1a4626a21e0afab0eee353c1736
SHA13e2b6fdb01b8d6fe200f54fdcfda4001a3171ee7
SHA2568b4264ec7822250b99ad543cd40dc8c41dc78bfb6f1813b5c37b92076cb8d83e
SHA51207389780a9c79b54b2cd81c07786d14d51466b35e8ad4b6d0ef5005665a5603e0672693e40903f57244cc2c9ca6a0112cd78abb633845be23692174534e6e137
-
Filesize
280B
MD52360e13f4a1e93c2605ddfd60692b108
SHA14c804db6a603d76af7dd502afb7f4ea795b3bd3b
SHA25614354695934d523c26ea4eaa743da7fd87e1ffeb60dc9c197b7a5c058478b139
SHA5126c8ead930f345dc1e0d8541de4d9bb9fa734d52e508c947b2f138837e0505a94fe2276ec19dfd2c8777801814b7849ec9c1e6032635dbaccffc22729b5f9d8cc
-
C:\Users\Admin\AppData\Local\Temp\Xeno-v1.1.65\Xeno.exe.WebView2\EBWebView\Crashpad\throttle_store.dat
Filesize20B
MD59e4e94633b73f4a7680240a0ffd6cd2c
SHA1e68e02453ce22736169a56fdb59043d33668368f
SHA25641c91a9c93d76295746a149dce7ebb3b9ee2cb551d84365fff108e59a61cc304
SHA512193011a756b2368956c71a9a3ae8bc9537d99f52218f124b2e64545eeb5227861d372639052b74d0dd956cb33ca72a9107e069f1ef332b9645044849d14af337
-
C:\Users\Admin\AppData\Local\Temp\Xeno-v1.1.65\Xeno.exe.WebView2\EBWebView\Default\DawnWebGPUCache\data_0
Filesize8KB
MD5cf89d16bb9107c631daabf0c0ee58efb
SHA13ae5d3a7cf1f94a56e42f9a58d90a0b9616ae74b
SHA256d6a5fe39cd672781b256e0e3102f7022635f1d4bb7cfcc90a80fffe4d0f3877e
SHA5128cb5b059c8105eb91e74a7d5952437aaa1ada89763c5843e7b0f1b93d9ebe15ed40f287c652229291fac02d712cf7ff5ececef276ba0d7ddc35558a3ec3f77b0
-
C:\Users\Admin\AppData\Local\Temp\Xeno-v1.1.65\Xeno.exe.WebView2\EBWebView\Default\DawnWebGPUCache\data_1
Filesize264KB
MD5d0d388f3865d0523e451d6ba0be34cc4
SHA18571c6a52aacc2747c048e3419e5657b74612995
SHA256902f30c1fb0597d0734bc34b979ec5d131f8f39a4b71b338083821216ec8d61b
SHA512376011d00de659eb6082a74e862cfac97a9bb508e0b740761505142e2d24ec1c30aa61efbc1c0dd08ff0f34734444de7f77dd90a6ca42b48a4c7fad5f0bddd17
-
C:\Users\Admin\AppData\Local\Temp\Xeno-v1.1.65\Xeno.exe.WebView2\EBWebView\Default\DawnWebGPUCache\data_2
Filesize8KB
MD50962291d6d367570bee5454721c17e11
SHA159d10a893ef321a706a9255176761366115bedcb
SHA256ec1702806f4cc7c42a82fc2b38e89835fde7c64bb32060e0823c9077ca92efb7
SHA512f555e961b69e09628eaf9c61f465871e6984cd4d31014f954bb747351dad9cea6d17c1db4bca2c1eb7f187cb5f3c0518748c339c8b43bbd1dbd94aeaa16f58ed
-
C:\Users\Admin\AppData\Local\Temp\Xeno-v1.1.65\Xeno.exe.WebView2\EBWebView\Default\DawnWebGPUCache\data_3
Filesize8KB
MD541876349cb12d6db992f1309f22df3f0
SHA15cf26b3420fc0302cd0a71e8d029739b8765be27
SHA256e09f42c398d688dce168570291f1f92d079987deda3099a34adb9e8c0522b30c
SHA512e9a4fc1f7cb6ae2901f8e02354a92c4aaa7a53c640dcf692db42a27a5acc2a3bfb25a0de0eb08ab53983132016e7d43132ea4292e439bb636aafd53fb6ef907e
-
C:\Users\Admin\AppData\Local\Temp\Xeno-v1.1.65\Xeno.exe.WebView2\EBWebView\Default\Extension Rules\MANIFEST-000001
Filesize41B
MD55af87dfd673ba2115e2fcf5cfdb727ab
SHA1d5b5bbf396dc291274584ef71f444f420b6056f1
SHA256f9d31b278e215eb0d0e9cd709edfa037e828f36214ab7906f612160fead4b2b4
SHA512de34583a7dbafe4dd0dc0601e8f6906b9bc6a00c56c9323561204f77abbc0dc9007c480ffe4092ff2f194d54616caf50aecbd4a1e9583cae0c76ad6dd7c2375b
-
C:\Users\Admin\AppData\Local\Temp\Xeno-v1.1.65\Xeno.exe.WebView2\EBWebView\Default\Network\Network Persistent State
Filesize229B
MD55c9f79435fd36dd2a8914a542651f839
SHA181f4f5faf2f14d448626b3f49618d11fd4295cad
SHA256153938ecc186cd98a2f1ebd1f53ae88cfe9d9884bd470e9166a53348a071fb2b
SHA5120e7cf3372f919b11b0c6341bc4df2bb8ba5106463b06c74f0736b14755fa23a78db7e9b3111938570225435169bd01f7198b6124007defa77e90bbe21fd14588
-
C:\Users\Admin\AppData\Local\Temp\Xeno-v1.1.65\Xeno.exe.WebView2\EBWebView\Default\Network\Network Persistent State~RFe58a236.TMP
Filesize59B
MD52800881c775077e1c4b6e06bf4676de4
SHA12873631068c8b3b9495638c865915be822442c8b
SHA256226eec4486509917aa336afebd6ff65777b75b65f1fb06891d2a857a9421a974
SHA512e342407ab65cc68f1b3fd706cd0a37680a0864ffd30a6539730180ede2cdcd732cc97ae0b9ef7db12da5c0f83e429df0840dbf7596aca859a0301665e517377b
-
C:\Users\Admin\AppData\Local\Temp\Xeno-v1.1.65\Xeno.exe.WebView2\EBWebView\Default\Network\SCT Auditing Pending Reports
Filesize2B
MD5d751713988987e9331980363e24189ce
SHA197d170e1550eee4afc0af065b78cda302a97674c
SHA2564f53cda18c2baa0c0354bb5f9a3ecbe5ed12ab4d8e11ba873c2f11161202b945
SHA512b25b294cb4deb69ea00a4c3cf3113904801b6015e5956bd019a8570b1fe1d6040e944ef3cdee16d0a46503ca6e659a25f21cf9ceddc13f352a3c98138c15d6af
-
Filesize
6KB
MD56825f6f3eb337e6479e1d71e77f3f034
SHA18fcdfcd39c19a439cf5bac4e0a822e9874e8295f
SHA2560afe058d43d9994cf1463693c71d37bb03a2a16dc2e5844908837b94cdbb5fe7
SHA512d65be1ce4074c0c6df64a62dc0c56d623fb8fb0996361715d4c773a9b9581658a90ab0ec69ec2514d9452e3089099aaef369ad3a5d692b6a30967ec534b9fc21
-
C:\Users\Admin\AppData\Local\Temp\Xeno-v1.1.65\Xeno.exe.WebView2\EBWebView\Default\Preferences~RFe58295d.TMP
Filesize6KB
MD57d3fc10c9adf829e91b55f1075dd41c9
SHA1f836a875cc658f4cd2ee3fd9d60071b2b13279ef
SHA256e760ccd6065514d068ba65f116d6c1c1729338eb13271ddbe091545152a67bf5
SHA512855a2bef1268039b8d550c1a3e40c4c58f8245f2aa3c4cacd355dc91ea00bf7ba24e7c8281184b5289749789b8864000ee0064539965abc7de34c0dc8075917a
-
C:\Users\Admin\AppData\Local\Temp\Xeno-v1.1.65\Xeno.exe.WebView2\EBWebView\Default\Sync Data\LevelDB\CURRENT
Filesize16B
MD546295cac801e5d4857d09837238a6394
SHA144e0fa1b517dbf802b18faf0785eeea6ac51594b
SHA2560f1bad70c7bd1e0a69562853ec529355462fcd0423263a3d39d6d0d70b780443
SHA5128969402593f927350e2ceb4b5bc2a277f3754697c1961e3d6237da322257fbab42909e1a742e22223447f3a4805f8d8ef525432a7c3515a549e984d3eff72b23
-
Filesize
1KB
MD5a8bb662074992a84bfb0b601c20a2655
SHA1859c5ee2e994cf672246bd47195b234ad9ab8cbb
SHA256b2d8e07bc993645b25d085b553b04103b9e80e565793f3a17684c32ef83b151f
SHA51278dee26d97a6b706ad26a976c39a9a5d384f190e4e0bd6db24fe7417d1c99609405011f5589f8428eaaa78f25ad3292d5746fc0e79c48032bc166a6dfbd2e0aa
-
Filesize
2KB
MD54decb03a22c20c82989400931bdbd420
SHA1b07662d7b8059d5659e8a8295ae1bfb8fbba644f
SHA2561b8edfa4dc9a3909cda5a7a671cd3cca0d8a6745888fbe10413858fcad36e623
SHA512941650ec437776f3aab413edee779f3c332c40ac614bfbbe423016f3ccc353923374bb5eae4bb655d73ebba962beb6d766bf10c62ae40b5f7f8042610f2a2c19
-
Filesize
3KB
MD54b1cc71d172845e0b9facaee83cb3747
SHA14e0fa58943ea5f4d084ad2131509a997c8755dba
SHA2561a816da266788bcf5b484b3aa6942b86a7a707b018e16aeb491d02d9d8414043
SHA512bbbfd63148a7a829b06940137938d5d109cdd5e96c57b49281ede5ac5472d53182040dffdfa8368307b45f7cf3d05523407d70897fe7a28a2d226f26e6aea863
-
Filesize
16KB
MD594f757e5a71e46cc5e487154280c9a85
SHA1be1fcd66eeac3ed245986d4d456c6b30f1af7c36
SHA256a4b5ef8d0cf9b6b3baae251c901e9cb1fe059961c38f9c4c804f70a301aa61aa
SHA5124e12ab27188ca0c8ba6b2329d952299794e76a545e34a0209d3f978fde6d05e5a5f07dfef75f527acd9d49ef54a22854ebcaac37b2e9cb475dc6399281737972
-
C:\Users\Admin\AppData\Local\Temp\Xeno-v1.1.65\Xeno.exe.WebView2\EBWebView\Local State~RFe5789d1.TMP
Filesize1KB
MD565651c9c23ce6f7b60515ceae84803b6
SHA167c93a2b96c66c6144c9d676b137f00f79b6db51
SHA256624711707aabb69334ba2bb091c96e503e6a8a9b104e5aa29ee33170802f05c7
SHA51291818aec14b77b889cc92c771afd06b69dd04512b1484fbd11dcdaf99b1fd4d771e8ef48cb6cc834838de9e4d7859d042e06b4e7f93f5a96f78a67240c21a4d2
-
C:\Users\Admin\AppData\Local\Temp\Xeno-v1.1.65\Xeno.exe.WebView2\EBWebView\PKIMetadata\22.0.0.0\crs.pb
Filesize289KB
MD52b59269e7efdd95ba14eeb780dfb98c2
SHA1b3f84cbc37a79eeecb8f1f39b615577d78600096
SHA256ff2ced650772249abb57f6f19c5d0322d6df22c85c7cf2be193b6134e1b95172
SHA512e4b454db2248021e0d198805ea54f1c0cfd84b9716a9348b1d0e0acb7c6fb5dd0839e532a5eb6d4410ab759d6688dd6cce8375ad55a150d738d280993142e9d7
-
C:\Users\Admin\AppData\Local\Temp\Xeno-v1.1.65\Xeno.exe.WebView2\EBWebView\PKIMetadata\22.0.0.0\ct_config.pb
Filesize8KB
MD5811b65320a82ebd6686fabf4bb1cb81a
SHA1c660d448114043babec5d1c9c2584df6fab7f69b
SHA25652687dd0c06f86a2298a4442ab8afa9b608271ec01a67217d7b58dab7e507bdf
SHA51233350cce447508269b7714d9e551560553e020d6acf37a6a6021dc497d4008ce9e532dd615ad68872d75da22ac2039ef0b4fa70c23ec4b58043c468d5d75fd81
-
C:\Users\Admin\AppData\Local\Temp\Xeno-v1.1.65\Xeno.exe.WebView2\EBWebView\PKIMetadata\22.0.0.0\kp_pinslist.pb
Filesize11KB
MD50779206f78d8b0d540445a10cb51670c
SHA167f0f916be73bf5cffd3f4c4aa8d122c7d73ad54
SHA256bf0945921058b9e67db61e6a559531af2f9b78d5fbedb0b411384225bdd366ec
SHA5124140b2debe9c0b04e1e59be1387dca0e8e2f3cbc1f67830cbc723864acc2276cde9529295dcb4138fa0e2e116416658753fe46901dfa572bdfe6c7fb67bd8478
-
C:\Users\Admin\AppData\Local\Temp\Xeno-v1.1.65\Xeno.exe.WebView2\EBWebView\TrustTokenKeyCommitments\2025.1.17.1\keys.json
Filesize6KB
MD5bef4f9f856321c6dccb47a61f605e823
SHA18e60af5b17ed70db0505d7e1647a8bc9f7612939
SHA256fd1847df25032c4eef34e045ba0333f9bd3cb38c14344f1c01b48f61f0cfd5c5
SHA512bdec3e243a6f39bfea4130c85b162ea00a4974c6057cd06a05348ac54517201bbf595fcc7c22a4ab2c16212c6009f58df7445c40c82722ab4fa1c8d49d39755c
-
Filesize
21KB
MD5846feb52bd6829102a780ec0da74ab04
SHA1dd98409b49f0cd1f9d0028962d7276860579fb54
SHA256124b7eeba31f0e3d9b842a62f3441204beb13fade81da38b854aecba0e03a5b4
SHA512c8759e675506ccc6aa9807798252c7e7c48a0ab31674609738617dc105cee38bce69d4d41d6b95e16731466880b386d35483cbeea6275773f7041ba6e305fae9
-
Filesize
114B
MD5e6cd92ad3b3ab9cb3d325f3c4b7559aa
SHA10704d57b52cf55674524a5278ed4f7ba1e19ca0c
SHA25663dfb8d99ce83b3ca282eb697dc76b17b4a48e4065fc7efafb77724739074a9d
SHA512172d5dc107757bb591b9a8ed7f2b48f22b5184d6537572d375801113e294febfbe39077c408e3a04c44e6072427cbe443c6614d205a5a4aa290101722e18f5e8
-
Filesize
79B
MD57f4b594a35d631af0e37fea02df71e72
SHA1f7bc71621ea0c176ca1ab0a3c9fe52dbca116f57
SHA256530882d7f535ae57a4906ca735b119c9e36480cbb780c7e8ad37c9c8fdf3d9b1
SHA512bf3f92f5023f0fbad88526d919252a98db6d167e9ca3e15b94f7d71ded38a2cfb0409f57ef24708284ddd965bda2d3207cd99c008b1c9c8c93705fd66ac86360
-
Filesize
102B
MD5a64e2a4236e705215a3fd5cb2697a71f
SHA11c73e6aad8f44ade36df31a23eaaf8cd0cae826d
SHA256014e9fc1219beefc428ec749633125c9bff7febc3be73a14a8f18a6691cd2846
SHA51275b30c0c8cef490aaf923afbdb5385d4770de82e698f71f8f126a6af5ef16f3a90d0c27687f405274177b1a5250436efddd228a6d2949651f43bd926e8a1cc99
-
Filesize
43B
MD5af3a9104ca46f35bb5f6123d89c25966
SHA11ffb1b0aa9f44bdbc57bdf4b98d26d3be0207ee8
SHA25681bd82ac27612a58be30a72dd8956b13f883e32ffb54a58076bd6a42b8afaeea
SHA5126a7a543fa2d1ead3574b4897d2fc714bb218c60a04a70a7e92ecfd2ea59d67028f91b6a2094313f606560087336c619093f1d38d66a3c63a1d1d235ca03d36d1
-
Filesize
703B
MD58961fdd3db036dd43002659a4e4a7365
SHA17b2fa321d50d5417e6c8d48145e86d15b7ff8321
SHA256c2784e33158a807135850f7125a7eaabe472b3cfc7afb82c74f02da69ea250fe
SHA512531ecec11d296a1ab3faeb2c7ac619da9d80c1054a2ccee8a5a0cd996346fea2a2fee159ac5a8d79b46a764a2aa8e542d6a79d86b3d7dda461e41b19c9bebe92
-
Filesize
687B
MD50807cf29fc4c5d7d87c1689eb2e0baaa
SHA1d0914fb069469d47a36d339ca70164253fccf022
SHA256f4df224d459fd111698dd5a13613c5bbf0ed11f04278d60230d028010eac0c42
SHA5125324fd47c94f5804bfa1aa6df952949915896a3fc77dccaed0eeffeafe995ce087faef035aecea6b4c864a16ad32de00055f55260af974f2c41afff14dce00f3
-
Filesize
141KB
MD5677edd1a17d50f0bd11783f58725d0e7
SHA198fedc5862c78f3b03daed1ff9efbe5e31c205ee
SHA256c2771fbb1bfff7db5e267dc7a4505a9675c6b98cfe7a8f7ae5686d7a5a2b3dd0
SHA512c368f6687fa8a2ef110fcb2b65df13f6a67feac7106014bd9ea9315f16e4d7f5cbc8b4a67ba2169c6909d49642d88ae2a0a9cd3f1eb889af326f29b379cfd3ff
-
Filesize
82B
MD52617c38bed67a4190fc499142b6f2867
SHA1a37f0251cd6be0a6983d9a04193b773f86d31da1
SHA256d571ef33b0e707571f10bb37b99a607d6f43afe33f53d15b4395b16ef3fda665
SHA512b08053050692765f172142bad7afbcd038235275c923f3cd089d556251482b1081e53c4ad7367a1fb11ca927f2ad183dc63d31ccfbf85b0160cf76a31343a6d0