Overview
overview
6Static
static
3Xeno-v1.1....re.dll
windows7-x64
1Xeno-v1.1....re.dll
windows10-2004-x64
1Xeno-v1.1....ms.dll
windows7-x64
1Xeno-v1.1....ms.dll
windows10-2004-x64
1Xeno-v1.1....pf.dll
windows7-x64
1Xeno-v1.1....pf.dll
windows10-2004-x64
1Xeno-v1.1....on.dll
windows7-x64
1Xeno-v1.1....on.dll
windows10-2004-x64
1Xeno-v1.1.65/Xeno.dll
windows7-x64
1Xeno-v1.1.65/Xeno.dll
windows10-2004-x64
1Xeno-v1.1.65/Xeno.exe
windows7-x64
3Xeno-v1.1.65/Xeno.exe
windows10-2004-x64
6Xeno-v1.1....UI.exe
windows7-x64
1Xeno-v1.1....UI.exe
windows10-2004-x64
1Xeno-v1.1....-0.dll
windows10-2004-x64
1Xeno-v1.1....-0.dll
windows10-2004-x64
1Xeno-v1.1....-0.dll
windows10-2004-x64
1Xeno-v1.1....-0.dll
windows10-2004-x64
1Xeno-v1.1....-0.dll
windows10-2004-x64
1Xeno-v1.1....-0.dll
windows10-2004-x64
1Xeno-v1.1....-0.dll
windows10-2004-x64
1Xeno-v1.1....-0.dll
windows10-2004-x64
1Xeno-v1.1....x.html
windows7-x64
6Xeno-v1.1....x.html
windows10-2004-x64
6Xeno-v1.1....ain.js
windows7-x64
3Xeno-v1.1....ain.js
windows10-2004-x64
3Xeno-v1.1....lua.js
windows7-x64
3Xeno-v1.1....lua.js
windows10-2004-x64
3Xeno-v1.1....ain.js
windows7-x64
3Xeno-v1.1....ain.js
windows10-2004-x64
3Xeno-v1.1.....de.js
windows7-x64
3Xeno-v1.1.....de.js
windows10-2004-x64
3Resubmissions
02/04/2025, 22:36
250402-2h95esxpz5 330/03/2025, 19:46
250330-yg7q5avzew 629/03/2025, 19:55
250329-ynl31axwgv 629/03/2025, 19:55
250329-ym9gxaxvf1 629/03/2025, 18:18
250329-wxy3taznv5 629/03/2025, 10:24
250329-mfdwwa1xay 729/03/2025, 00:19
250329-amltvawpx2 6Analysis
-
max time kernel
34s -
max time network
35s -
platform
windows10-2004_x64 -
resource
win10v2004-20250314-en -
resource tags
arch:x64arch:x86image:win10v2004-20250314-enlocale:en-usos:windows10-2004-x64system -
submitted
30/03/2025, 19:46
Static task
static1
Behavioral task
behavioral1
Sample
Xeno-v1.1.65/Microsoft.Web.WebView2.Core.dll
Resource
win7-20241010-en
Behavioral task
behavioral2
Sample
Xeno-v1.1.65/Microsoft.Web.WebView2.Core.dll
Resource
win10v2004-20250314-en
Behavioral task
behavioral3
Sample
Xeno-v1.1.65/Microsoft.Web.WebView2.WinForms.dll
Resource
win7-20241010-en
Behavioral task
behavioral4
Sample
Xeno-v1.1.65/Microsoft.Web.WebView2.WinForms.dll
Resource
win10v2004-20250314-en
Behavioral task
behavioral5
Sample
Xeno-v1.1.65/Microsoft.Web.WebView2.Wpf.dll
Resource
win7-20240903-en
Behavioral task
behavioral6
Sample
Xeno-v1.1.65/Microsoft.Web.WebView2.Wpf.dll
Resource
win10v2004-20250314-en
Behavioral task
behavioral7
Sample
Xeno-v1.1.65/Newtonsoft.Json.dll
Resource
win7-20240903-en
Behavioral task
behavioral8
Sample
Xeno-v1.1.65/Newtonsoft.Json.dll
Resource
win10v2004-20250313-en
Behavioral task
behavioral9
Sample
Xeno-v1.1.65/Xeno.dll
Resource
win7-20240903-en
Behavioral task
behavioral10
Sample
Xeno-v1.1.65/Xeno.dll
Resource
win10v2004-20250314-en
Behavioral task
behavioral11
Sample
Xeno-v1.1.65/Xeno.exe
Resource
win7-20240903-en
Behavioral task
behavioral12
Sample
Xeno-v1.1.65/Xeno.exe
Resource
win10v2004-20250314-en
Behavioral task
behavioral13
Sample
Xeno-v1.1.65/XenoUI.exe
Resource
win7-20241010-en
Behavioral task
behavioral14
Sample
Xeno-v1.1.65/XenoUI.exe
Resource
win10v2004-20250314-en
Behavioral task
behavioral15
Sample
Xeno-v1.1.65/api-ms-win-crt-convert-l1-1-0.dll
Resource
win10v2004-20250314-en
Behavioral task
behavioral16
Sample
Xeno-v1.1.65/api-ms-win-crt-filesystem-l1-1-0.dll
Resource
win10v2004-20250314-en
Behavioral task
behavioral17
Sample
Xeno-v1.1.65/api-ms-win-crt-heap-l1-1-0.dll
Resource
win10v2004-20250314-en
Behavioral task
behavioral18
Sample
Xeno-v1.1.65/api-ms-win-crt-locale-l1-1-0.dll
Resource
win10v2004-20250314-en
Behavioral task
behavioral19
Sample
Xeno-v1.1.65/api-ms-win-crt-math-l1-1-0.dll
Resource
win10v2004-20250314-en
Behavioral task
behavioral20
Sample
Xeno-v1.1.65/api-ms-win-crt-runtime-l1-1-0.dll
Resource
win10v2004-20250314-en
Behavioral task
behavioral21
Sample
Xeno-v1.1.65/api-ms-win-crt-stdio-l1-1-0.dll
Resource
win10v2004-20250313-en
Behavioral task
behavioral22
Sample
Xeno-v1.1.65/api-ms-win-crt-string-l1-1-0.dll
Resource
win10v2004-20250314-en
Behavioral task
behavioral23
Sample
Xeno-v1.1.65/bin/Monaco/index.html
Resource
win7-20241010-en
Behavioral task
behavioral24
Sample
Xeno-v1.1.65/bin/Monaco/index.html
Resource
win10v2004-20250313-en
Behavioral task
behavioral25
Sample
Xeno-v1.1.65/bin/Monaco/vs/base/worker/workerMain.js
Resource
win7-20240903-en
Behavioral task
behavioral26
Sample
Xeno-v1.1.65/bin/Monaco/vs/base/worker/workerMain.js
Resource
win10v2004-20250314-en
Behavioral task
behavioral27
Sample
Xeno-v1.1.65/bin/Monaco/vs/basic-languages/lua/lua.js
Resource
win7-20241010-en
Behavioral task
behavioral28
Sample
Xeno-v1.1.65/bin/Monaco/vs/basic-languages/lua/lua.js
Resource
win10v2004-20250314-en
Behavioral task
behavioral29
Sample
Xeno-v1.1.65/bin/Monaco/vs/editor/editor.main.js
Resource
win7-20240903-en
Behavioral task
behavioral30
Sample
Xeno-v1.1.65/bin/Monaco/vs/editor/editor.main.js
Resource
win10v2004-20250314-en
Behavioral task
behavioral31
Sample
Xeno-v1.1.65/bin/Monaco/vs/editor/editor.main.nls.de.js
Resource
win7-20240903-en
Behavioral task
behavioral32
Sample
Xeno-v1.1.65/bin/Monaco/vs/editor/editor.main.nls.de.js
Resource
win10v2004-20250314-en
General
-
Target
Xeno-v1.1.65/Xeno.exe
-
Size
140KB
-
MD5
70797e0760472325728ba786ca208976
-
SHA1
8912f23afbe8b78a9582f2a458b89a7fd697e638
-
SHA256
20744d38bc27d656a095e57bef62a44f5f6317de3672020e8a4a1e1057545764
-
SHA512
787f172cbc18eeb4f8e88420377459f37918edc9aec0105566f9e79555a962d6e89d7d0d6b791475282b2c5fb093c9e85544794639ad2771d9ca4a0e5b456477
-
SSDEEP
3072:h+f4nYTC3LwjBzaQhlG4a7qWdCXdXxuZjwxfBoy:h+f4nKvaQhcF7qI+xuZjwxB
Malware Config
Signatures
-
Checks whether UAC is enabled 1 TTPs 1 IoCs
description ioc Process Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA Xeno.exe -
Legitimate hosting services abused for malware hosting/C2 1 TTPs 3 IoCs
flow ioc 32 raw.githubusercontent.com 33 raw.githubusercontent.com 34 raw.githubusercontent.com -
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedgewebview2.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedgewebview2.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedgewebview2.exe -
Modifies data under HKEY_USERS 2 IoCs
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-19\SOFTWARE\Microsoft\Cryptography\TPM\Telemetry\TraceTimeLast = "133878376130924351" msedgewebview2.exe Key created \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry msedgewebview2.exe -
Suspicious behavior: EnumeratesProcesses 4 IoCs
pid Process 4716 Xeno.exe 4716 Xeno.exe 4716 Xeno.exe 4716 Xeno.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 1 IoCs
pid Process 5440 msedgewebview2.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 4716 wrote to memory of 5440 4716 Xeno.exe 91 PID 4716 wrote to memory of 5440 4716 Xeno.exe 91 PID 5440 wrote to memory of 1672 5440 msedgewebview2.exe 92 PID 5440 wrote to memory of 1672 5440 msedgewebview2.exe 92 PID 5440 wrote to memory of 5332 5440 msedgewebview2.exe 93 PID 5440 wrote to memory of 5332 5440 msedgewebview2.exe 93 PID 5440 wrote to memory of 5332 5440 msedgewebview2.exe 93 PID 5440 wrote to memory of 5332 5440 msedgewebview2.exe 93 PID 5440 wrote to memory of 5332 5440 msedgewebview2.exe 93 PID 5440 wrote to memory of 5332 5440 msedgewebview2.exe 93 PID 5440 wrote to memory of 5332 5440 msedgewebview2.exe 93 PID 5440 wrote to memory of 5332 5440 msedgewebview2.exe 93 PID 5440 wrote to memory of 5332 5440 msedgewebview2.exe 93 PID 5440 wrote to memory of 5332 5440 msedgewebview2.exe 93 PID 5440 wrote to memory of 5332 5440 msedgewebview2.exe 93 PID 5440 wrote to memory of 5332 5440 msedgewebview2.exe 93 PID 5440 wrote to memory of 5332 5440 msedgewebview2.exe 93 PID 5440 wrote to memory of 5332 5440 msedgewebview2.exe 93 PID 5440 wrote to memory of 5332 5440 msedgewebview2.exe 93 PID 5440 wrote to memory of 5332 5440 msedgewebview2.exe 93 PID 5440 wrote to memory of 5332 5440 msedgewebview2.exe 93 PID 5440 wrote to memory of 5332 5440 msedgewebview2.exe 93 PID 5440 wrote to memory of 5332 5440 msedgewebview2.exe 93 PID 5440 wrote to memory of 5332 5440 msedgewebview2.exe 93 PID 5440 wrote to memory of 5332 5440 msedgewebview2.exe 93 PID 5440 wrote to memory of 5332 5440 msedgewebview2.exe 93 PID 5440 wrote to memory of 5332 5440 msedgewebview2.exe 93 PID 5440 wrote to memory of 5332 5440 msedgewebview2.exe 93 PID 5440 wrote to memory of 5332 5440 msedgewebview2.exe 93 PID 5440 wrote to memory of 5332 5440 msedgewebview2.exe 93 PID 5440 wrote to memory of 5332 5440 msedgewebview2.exe 93 PID 5440 wrote to memory of 5332 5440 msedgewebview2.exe 93 PID 5440 wrote to memory of 5332 5440 msedgewebview2.exe 93 PID 5440 wrote to memory of 5332 5440 msedgewebview2.exe 93 PID 5440 wrote to memory of 5332 5440 msedgewebview2.exe 93 PID 5440 wrote to memory of 5332 5440 msedgewebview2.exe 93 PID 5440 wrote to memory of 5332 5440 msedgewebview2.exe 93 PID 5440 wrote to memory of 5332 5440 msedgewebview2.exe 93 PID 5440 wrote to memory of 5332 5440 msedgewebview2.exe 93 PID 5440 wrote to memory of 5332 5440 msedgewebview2.exe 93 PID 5440 wrote to memory of 5332 5440 msedgewebview2.exe 93 PID 5440 wrote to memory of 5332 5440 msedgewebview2.exe 93 PID 5440 wrote to memory of 5332 5440 msedgewebview2.exe 93 PID 5440 wrote to memory of 5332 5440 msedgewebview2.exe 93 PID 5440 wrote to memory of 5332 5440 msedgewebview2.exe 93 PID 5440 wrote to memory of 5332 5440 msedgewebview2.exe 93 PID 5440 wrote to memory of 5332 5440 msedgewebview2.exe 93 PID 5440 wrote to memory of 5332 5440 msedgewebview2.exe 93 PID 5440 wrote to memory of 5332 5440 msedgewebview2.exe 93 PID 5440 wrote to memory of 5332 5440 msedgewebview2.exe 93 PID 5440 wrote to memory of 5332 5440 msedgewebview2.exe 93 PID 5440 wrote to memory of 5332 5440 msedgewebview2.exe 93 PID 5440 wrote to memory of 5332 5440 msedgewebview2.exe 93 PID 5440 wrote to memory of 5332 5440 msedgewebview2.exe 93 PID 5440 wrote to memory of 5332 5440 msedgewebview2.exe 93 PID 5440 wrote to memory of 2704 5440 msedgewebview2.exe 94 PID 5440 wrote to memory of 2704 5440 msedgewebview2.exe 94 PID 5440 wrote to memory of 3308 5440 msedgewebview2.exe 95 PID 5440 wrote to memory of 3308 5440 msedgewebview2.exe 95 PID 5440 wrote to memory of 3308 5440 msedgewebview2.exe 95 PID 5440 wrote to memory of 3308 5440 msedgewebview2.exe 95 PID 5440 wrote to memory of 3308 5440 msedgewebview2.exe 95 PID 5440 wrote to memory of 3308 5440 msedgewebview2.exe 95 PID 5440 wrote to memory of 3308 5440 msedgewebview2.exe 95
Processes
-
C:\Users\Admin\AppData\Local\Temp\Xeno-v1.1.65\Xeno.exe"C:\Users\Admin\AppData\Local\Temp\Xeno-v1.1.65\Xeno.exe"1⤵
- Checks whether UAC is enabled
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:4716 -
C:\Program Files (x86)\Microsoft\EdgeWebView\Application\132.0.2957.140\msedgewebview2.exe"C:\Program Files (x86)\Microsoft\EdgeWebView\Application\132.0.2957.140\msedgewebview2.exe" --embedded-browser-webview=1 --webview-exe-name=Xeno.exe --webview-exe-version=1.1.0+87ae4f96f8a0927052c1120167982fb069afd1b4 --user-data-dir="C:\Users\Admin\AppData\Local\Temp\Xeno-v1.1.65\Xeno.exe.WebView2\EBWebView" --noerrdialogs --embedded-browser-webview-dpi-awareness=1 --mojo-named-platform-channel-pipe=4716.1520.129129303131220307482⤵
- Enumerates system info in registry
- Modifies data under HKEY_USERS
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of WriteProcessMemory
PID:5440 -
C:\Program Files (x86)\Microsoft\EdgeWebView\Application\132.0.2957.140\msedgewebview2.exe"C:\Program Files (x86)\Microsoft\EdgeWebView\Application\132.0.2957.140\msedgewebview2.exe" --type=crashpad-handler --user-data-dir=C:\Users\Admin\AppData\Local\Temp\Xeno-v1.1.65\Xeno.exe.WebView2\EBWebView /prefetch:4 --monitor-self-annotation=ptype=crashpad-handler --database=C:\Users\Admin\AppData\Local\Temp\Xeno-v1.1.65\Xeno.exe.WebView2\EBWebView\Crashpad --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=132.0.6834.160 "--annotation=exe=C:\Program Files (x86)\Microsoft\EdgeWebView\Application\132.0.2957.140\msedgewebview2.exe" --annotation=plat=Win64 "--annotation=prod=Edge WebView2" --annotation=ver=132.0.2957.140 --initial-client-data=0x164,0x168,0x16c,0x140,0xe0,0x7ffee06fb078,0x7ffee06fb084,0x7ffee06fb0903⤵PID:1672
-
-
C:\Program Files (x86)\Microsoft\EdgeWebView\Application\132.0.2957.140\msedgewebview2.exe"C:\Program Files (x86)\Microsoft\EdgeWebView\Application\132.0.2957.140\msedgewebview2.exe" --type=gpu-process --string-annotations --noerrdialogs --user-data-dir="C:\Users\Admin\AppData\Local\Temp\Xeno-v1.1.65\Xeno.exe.WebView2\EBWebView" --webview-exe-name=Xeno.exe --webview-exe-version=1.1.0+87ae4f96f8a0927052c1120167982fb069afd1b4 --embedded-browser-webview=1 --embedded-browser-webview-dpi-awareness=1 --gpu-preferences=UAAAAAAAAADgAAAEAAAAAAAAAAAAAAAAAABgAAEAAAAAAAAAAAAAAAAAAAACAAAAAAAAAAAAAAAAAAAAAAAAABAAAAAAAAAAEAAAAAAAAAAIAAAAAAAAAAgAAAAAAAAA --always-read-main-dll --field-trial-handle=1700,i,10286352754568556044,13499924798660456330,262144 --variations-seed-version --mojo-platform-channel-handle=1720 /prefetch:23⤵PID:5332
-
-
C:\Program Files (x86)\Microsoft\EdgeWebView\Application\132.0.2957.140\msedgewebview2.exe"C:\Program Files (x86)\Microsoft\EdgeWebView\Application\132.0.2957.140\msedgewebview2.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --string-annotations --noerrdialogs --user-data-dir="C:\Users\Admin\AppData\Local\Temp\Xeno-v1.1.65\Xeno.exe.WebView2\EBWebView" --webview-exe-name=Xeno.exe --webview-exe-version=1.1.0+87ae4f96f8a0927052c1120167982fb069afd1b4 --embedded-browser-webview=1 --embedded-browser-webview-dpi-awareness=1 --always-read-main-dll --field-trial-handle=2036,i,10286352754568556044,13499924798660456330,262144 --variations-seed-version --mojo-platform-channel-handle=2040 /prefetch:33⤵PID:2704
-
-
C:\Program Files (x86)\Microsoft\EdgeWebView\Application\132.0.2957.140\msedgewebview2.exe"C:\Program Files (x86)\Microsoft\EdgeWebView\Application\132.0.2957.140\msedgewebview2.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=service --string-annotations --noerrdialogs --user-data-dir="C:\Users\Admin\AppData\Local\Temp\Xeno-v1.1.65\Xeno.exe.WebView2\EBWebView" --webview-exe-name=Xeno.exe --webview-exe-version=1.1.0+87ae4f96f8a0927052c1120167982fb069afd1b4 --embedded-browser-webview=1 --embedded-browser-webview-dpi-awareness=1 --always-read-main-dll --field-trial-handle=2352,i,10286352754568556044,13499924798660456330,262144 --variations-seed-version --mojo-platform-channel-handle=2388 /prefetch:83⤵PID:3308
-
-
C:\Program Files (x86)\Microsoft\EdgeWebView\Application\132.0.2957.140\msedgewebview2.exe"C:\Program Files (x86)\Microsoft\EdgeWebView\Application\132.0.2957.140\msedgewebview2.exe" --type=renderer --string-annotations --noerrdialogs --user-data-dir="C:\Users\Admin\AppData\Local\Temp\Xeno-v1.1.65\Xeno.exe.WebView2\EBWebView" --webview-exe-name=Xeno.exe --webview-exe-version=1.1.0+87ae4f96f8a0927052c1120167982fb069afd1b4 --embedded-browser-webview=1 --embedded-browser-webview-dpi-awareness=1 --video-capture-use-gpu-memory-buffer --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --js-flags="--harmony-weak-refs-with-cleanup-some --expose-gc --ms-user-locale=" --always-read-main-dll --field-trial-handle=3600,i,10286352754568556044,13499924798660456330,262144 --variations-seed-version --mojo-platform-channel-handle=3616 /prefetch:13⤵PID:5724
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
28B
MD578d58a032761f1b9767ce9a961560a55
SHA116e75b82eb992b85361cfa782e2eac73f627717e
SHA256895c607361d12436b3c82f8e233278f594d1de2ac032fd9534670a26f9bd5ce5
SHA5124395ec8d0e057016daa654d94aeac4aea172814193ee9c3d5717093636db0972fea522a5e0596427b7c89cc2ab7f10c9be7c103b12b0c4151fc7b221d13e0f0e
-
Filesize
280B
MD5c4af7a89231dbb735cae033585bf5713
SHA10a95d307c6b4a7f24d691c33934912c1300d0e1c
SHA256efb5e921f3bc457d31983239e5c70de140da5dc8b5e59aab819f77a057617d50
SHA51201e177432c6c08ce4314e75d241889f9789af10488c6e21972e1b7aab375ada0649cf8f6ced062c3ada9a41642f608e98717614efd0e3b197553963986b00a15
-
Filesize
280B
MD52ffe21aebbc4831061a71b611e698a98
SHA1581025bc970df0327b7b3fdb917634253f0fe944
SHA2568a81a818da27b879ed49bd9de43ba8cd2cffc792f4ee754220a84932a32c463a
SHA512637ca100768cf9b586a8a7a362310c5f9cb137ebbdabdaae9afb6c971275d101800e599c1d1475ee08b39089480efdec940b1bb7a3a35c05b0e522219c105552
-
C:\Users\Admin\AppData\Local\Temp\Xeno-v1.1.65\Xeno.exe.WebView2\EBWebView\Crashpad\throttle_store.dat
Filesize20B
MD59e4e94633b73f4a7680240a0ffd6cd2c
SHA1e68e02453ce22736169a56fdb59043d33668368f
SHA25641c91a9c93d76295746a149dce7ebb3b9ee2cb551d84365fff108e59a61cc304
SHA512193011a756b2368956c71a9a3ae8bc9537d99f52218f124b2e64545eeb5227861d372639052b74d0dd956cb33ca72a9107e069f1ef332b9645044849d14af337
-
C:\Users\Admin\AppData\Local\Temp\Xeno-v1.1.65\Xeno.exe.WebView2\EBWebView\Default\DawnWebGPUCache\data_0
Filesize8KB
MD5cf89d16bb9107c631daabf0c0ee58efb
SHA13ae5d3a7cf1f94a56e42f9a58d90a0b9616ae74b
SHA256d6a5fe39cd672781b256e0e3102f7022635f1d4bb7cfcc90a80fffe4d0f3877e
SHA5128cb5b059c8105eb91e74a7d5952437aaa1ada89763c5843e7b0f1b93d9ebe15ed40f287c652229291fac02d712cf7ff5ececef276ba0d7ddc35558a3ec3f77b0
-
C:\Users\Admin\AppData\Local\Temp\Xeno-v1.1.65\Xeno.exe.WebView2\EBWebView\Default\DawnWebGPUCache\data_1
Filesize264KB
MD5d0d388f3865d0523e451d6ba0be34cc4
SHA18571c6a52aacc2747c048e3419e5657b74612995
SHA256902f30c1fb0597d0734bc34b979ec5d131f8f39a4b71b338083821216ec8d61b
SHA512376011d00de659eb6082a74e862cfac97a9bb508e0b740761505142e2d24ec1c30aa61efbc1c0dd08ff0f34734444de7f77dd90a6ca42b48a4c7fad5f0bddd17
-
C:\Users\Admin\AppData\Local\Temp\Xeno-v1.1.65\Xeno.exe.WebView2\EBWebView\Default\DawnWebGPUCache\data_2
Filesize8KB
MD50962291d6d367570bee5454721c17e11
SHA159d10a893ef321a706a9255176761366115bedcb
SHA256ec1702806f4cc7c42a82fc2b38e89835fde7c64bb32060e0823c9077ca92efb7
SHA512f555e961b69e09628eaf9c61f465871e6984cd4d31014f954bb747351dad9cea6d17c1db4bca2c1eb7f187cb5f3c0518748c339c8b43bbd1dbd94aeaa16f58ed
-
C:\Users\Admin\AppData\Local\Temp\Xeno-v1.1.65\Xeno.exe.WebView2\EBWebView\Default\DawnWebGPUCache\data_3
Filesize8KB
MD541876349cb12d6db992f1309f22df3f0
SHA15cf26b3420fc0302cd0a71e8d029739b8765be27
SHA256e09f42c398d688dce168570291f1f92d079987deda3099a34adb9e8c0522b30c
SHA512e9a4fc1f7cb6ae2901f8e02354a92c4aaa7a53c640dcf692db42a27a5acc2a3bfb25a0de0eb08ab53983132016e7d43132ea4292e439bb636aafd53fb6ef907e
-
C:\Users\Admin\AppData\Local\Temp\Xeno-v1.1.65\Xeno.exe.WebView2\EBWebView\Default\Extension Rules\MANIFEST-000001
Filesize41B
MD55af87dfd673ba2115e2fcf5cfdb727ab
SHA1d5b5bbf396dc291274584ef71f444f420b6056f1
SHA256f9d31b278e215eb0d0e9cd709edfa037e828f36214ab7906f612160fead4b2b4
SHA512de34583a7dbafe4dd0dc0601e8f6906b9bc6a00c56c9323561204f77abbc0dc9007c480ffe4092ff2f194d54616caf50aecbd4a1e9583cae0c76ad6dd7c2375b
-
C:\Users\Admin\AppData\Local\Temp\Xeno-v1.1.65\Xeno.exe.WebView2\EBWebView\Default\Network\SCT Auditing Pending Reports
Filesize2B
MD5d751713988987e9331980363e24189ce
SHA197d170e1550eee4afc0af065b78cda302a97674c
SHA2564f53cda18c2baa0c0354bb5f9a3ecbe5ed12ab4d8e11ba873c2f11161202b945
SHA512b25b294cb4deb69ea00a4c3cf3113904801b6015e5956bd019a8570b1fe1d6040e944ef3cdee16d0a46503ca6e659a25f21cf9ceddc13f352a3c98138c15d6af
-
C:\Users\Admin\AppData\Local\Temp\Xeno-v1.1.65\Xeno.exe.WebView2\EBWebView\Default\Site Characteristics Database\CURRENT
Filesize16B
MD546295cac801e5d4857d09837238a6394
SHA144e0fa1b517dbf802b18faf0785eeea6ac51594b
SHA2560f1bad70c7bd1e0a69562853ec529355462fcd0423263a3d39d6d0d70b780443
SHA5128969402593f927350e2ceb4b5bc2a277f3754697c1961e3d6237da322257fbab42909e1a742e22223447f3a4805f8d8ef525432a7c3515a549e984d3eff72b23
-
Filesize
1KB
MD5d63a53b3e05ab1f6cc9429fe533a4c18
SHA1a97be1531d5be703a09b59013536774153090c82
SHA256c88b62dbfa6fab224d3279b8cfce41e4a97e364024bf9cbbc8bb9477f3e71d6e
SHA512c882f739cf4385d3f4c6f1d15dc7c8e2b7d55a31fff455f646a5d9a927b776c656bf93d090b4829b1fb8d636d23580023e875f5a0d329aae55ba0c7ff395ca6f
-
Filesize
2KB
MD5f233d9b0e4d0b9e0fb66bd5dae31c73f
SHA153d3a9c5807ea21b74de9bbd7b0ec319aea01723
SHA256db6300332b94b9cd479908715f30e16cee538c384db3d100c19448f63ebd73bf
SHA51264bfa194c72de1aa92000b34860027b1c3f53ba0997c82fb710e1a5ef987c9ecdedc165f557a1f069f11f0719751dac6e9808b813d47acdf47b43c42ea8a3602
-
Filesize
3KB
MD5fab75bec74f51e99f9de9a5fc648cf64
SHA13a51cd576682e054b675703899f194eede6987ee
SHA256272fe99f4cc87ca41ee24dcedb0cdbc41bfc843bf8171130d406425e640c66ab
SHA512f0b0e1c234141d840e4b0a069821ebf36d072c30a4529006a71b90384ea1cca27b47e6f954cd059583c381942b173262a4b89457e2522b73717f347755446780
-
Filesize
16KB
MD5b4f7385c6e21396c0e4b7466067b0d4e
SHA1ea14117a23ec9d73709932646cc589cf5c75b1b1
SHA256e03c551739145317d7579d1998441248ccbaaadd086972ad1cb9373874daeceb
SHA512ba8642e4f7346a1e3d0bd063513e694e06c24913ce7e21a994126785fd255becb8eae537bf8c1159fa901609d79a9ba75aca12e999168a515a439ad6a5e469a7
-
C:\Users\Admin\AppData\Local\Temp\Xeno-v1.1.65\Xeno.exe.WebView2\EBWebView\Local State~RFe578a9c.TMP
Filesize1KB
MD51e9b6bfce58ff71844838ef6b77db8a6
SHA16debdf8d634f47cb4346beb2c6f0fa12be45b9b9
SHA2562eb5ac1b995ed76e99ccac783aca062fc5f6e8640f27d1a5360a6fa19f9c5e1c
SHA512c1ba5c413612e943cab039a1c35547e163d450515dede790368bc6edc6bfdba77d39ec0be466c85201a2836acd0458c6810725ad5d73cf0fbadc96201fd4ac14