File name:

Xeno-v1.3.25b-93da83d6.zip

Full analysis: https://app.any.run/tasks/91883cd1-ab78-482a-a660-632ed713f537
Verdict: Malicious activity
Threats:

A loader is malicious software that infiltrates devices to deliver malicious payloads. This malware is capable of infecting victims’ computers, analyzing their system information, and installing other types of threats, such as trojans or stealers. Criminals usually deliver loaders through phishing emails and links by relying on social engineering to trick users into downloading and running their executables. Loaders employ advanced evasion and persistence tactics to avoid detection.

Analysis date: February 11, 2026, 19:50:23
OS: Windows 10 Professional (build: 19044, 64 bit)
Tags:
auto
generic
arch-exec
arch-scr
arch-doc
arch-html
discord
loader
Indicators:
MIME: application/zip
File info: Zip archive data, at least v1.0 to extract, compression method=store
MD5:

6F38DFF7BA42362F7C5C8BAF522CD442

SHA1:

EE366CB2DAD2338ED9B333134A58A5307D45FBFA

SHA256:

436B843383D8E450D101E3E7F0F9FD1FF98808CA42C624CABF3F6BCA46D91269

SSDEEP:

98304:LgDZee3iA5/liunX4eK0lJBSJc0uUL4Ua0LoJoTpCXhVi0njRG3vBXmnFMJYHrHV:gLUApj9n+Jzy5R

ANY.RUN is an interactive service which provides full access to the guest system. Information in this report could be distorted by user actions and is provided for user acknowledgement as it is. ANY.RUN does not guarantee maliciousness or safety of the content.
  • MALICIOUS

    • Generic archive extractor

      • WinRAR.exe (PID: 8744)
    • GENERIC has been found (auto)

      • WinRAR.exe (PID: 8744)
      • msiexec.exe (PID: 5472)
    • Executing a file with an untrusted certificate

      • Xeno.exe (PID: 3388)
      • Xeno.exe (PID: 6488)
      • Xeno.exe (PID: 6668)
      • Xeno.exe (PID: 5080)
    • Changes the autorun value in the registry

      • windowsdesktop-runtime-8.0.24-win-x64.exe (PID: 8732)
  • SUSPICIOUS

    • Process drops legitimate windows executable

      • WinRAR.exe (PID: 8744)
      • msedge.exe (PID: 1176)
      • windowsdesktop-runtime-8.0.24-win-x64.exe (PID: 6216)
      • windowsdesktop-runtime-8.0.24-win-x64.exe (PID: 6484)
      • windowsdesktop-runtime-8.0.24-win-x64.exe (PID: 8732)
      • msiexec.exe (PID: 5472)
    • Starts a Microsoft application from unusual location

      • windowsdesktop-runtime-8.0.24-win-x64.exe (PID: 6484)
      • windowsdesktop-runtime-8.0.24-win-x64.exe (PID: 8732)
    • Executable content was dropped or overwritten

      • windowsdesktop-runtime-8.0.24-win-x64.exe (PID: 6216)
      • windowsdesktop-runtime-8.0.24-win-x64.exe (PID: 6484)
      • windowsdesktop-runtime-8.0.24-win-x64.exe (PID: 8732)
    • Searches for installed software

      • windowsdesktop-runtime-8.0.24-win-x64.exe (PID: 6484)
    • Starts itself from another location

      • windowsdesktop-runtime-8.0.24-win-x64.exe (PID: 6484)
    • Reads the Windows owner or organization settings

      • msiexec.exe (PID: 5472)
    • The process creates files with name similar to system file names

      • msiexec.exe (PID: 5472)
    • The process drops C-runtime libraries

      • msiexec.exe (PID: 5472)
    • Executes application which crashes

      • Xeno.exe (PID: 6488)
      • Xeno.exe (PID: 6668)
      • Xeno.exe (PID: 5080)
  • INFO

    • The sample compiled with english language support

      • WinRAR.exe (PID: 8744)
      • msedge.exe (PID: 1176)
      • windowsdesktop-runtime-8.0.24-win-x64.exe (PID: 6216)
      • windowsdesktop-runtime-8.0.24-win-x64.exe (PID: 6484)
      • windowsdesktop-runtime-8.0.24-win-x64.exe (PID: 8732)
      • msiexec.exe (PID: 5472)
    • Drops script file

      • msedge.exe (PID: 1956)
      • WinRAR.exe (PID: 8744)
      • msedge.exe (PID: 8444)
    • Executable content was dropped or overwritten

      • WinRAR.exe (PID: 8744)
      • msedge.exe (PID: 1956)
      • msiexec.exe (PID: 5472)
    • Checks supported languages

      • Xeno.exe (PID: 3388)
      • identity_helper.exe (PID: 5204)
      • windowsdesktop-runtime-8.0.24-win-x64.exe (PID: 6216)
      • windowsdesktop-runtime-8.0.24-win-x64.exe (PID: 6484)
      • windowsdesktop-runtime-8.0.24-win-x64.exe (PID: 8732)
      • msiexec.exe (PID: 5472)
      • msiexec.exe (PID: 6936)
      • msiexec.exe (PID: 8632)
      • msiexec.exe (PID: 8644)
      • Xeno.exe (PID: 6488)
      • msiexec.exe (PID: 476)
      • Xeno.exe (PID: 6668)
      • Xeno.exe (PID: 5080)
    • Reads the computer name

      • Xeno.exe (PID: 3388)
      • identity_helper.exe (PID: 5204)
      • windowsdesktop-runtime-8.0.24-win-x64.exe (PID: 6484)
      • windowsdesktop-runtime-8.0.24-win-x64.exe (PID: 8732)
      • msiexec.exe (PID: 5472)
      • msiexec.exe (PID: 6936)
      • msiexec.exe (PID: 476)
      • msiexec.exe (PID: 8644)
      • Xeno.exe (PID: 6488)
      • msiexec.exe (PID: 8632)
      • Xeno.exe (PID: 6668)
      • Xeno.exe (PID: 5080)
    • Reads security settings of Internet Explorer

      • Xeno.exe (PID: 3388)
      • windowsdesktop-runtime-8.0.24-win-x64.exe (PID: 6484)
      • Xeno.exe (PID: 6488)
      • Xeno.exe (PID: 6668)
      • Xeno.exe (PID: 5080)
      • notepad.exe (PID: 8640)
    • Manual execution by a user

      • Xeno.exe (PID: 3388)
      • Xeno.exe (PID: 6488)
      • Xeno.exe (PID: 6668)
      • Xeno.exe (PID: 5080)
      • notepad.exe (PID: 8640)
    • Application launched itself

      • msedge.exe (PID: 2912)
      • msedge.exe (PID: 1956)
    • Reads Environment values

      • identity_helper.exe (PID: 5204)
    • Create files in a temporary directory

      • windowsdesktop-runtime-8.0.24-win-x64.exe (PID: 6216)
      • windowsdesktop-runtime-8.0.24-win-x64.exe (PID: 6484)
      • windowsdesktop-runtime-8.0.24-win-x64.exe (PID: 8732)
    • Process checks computer location settings

      • windowsdesktop-runtime-8.0.24-win-x64.exe (PID: 6484)
    • Creates files in the program directory

      • windowsdesktop-runtime-8.0.24-win-x64.exe (PID: 8732)
      • Xeno.exe (PID: 6488)
    • Creates a software uninstall entry

      • windowsdesktop-runtime-8.0.24-win-x64.exe (PID: 8732)
      • msiexec.exe (PID: 5472)
    • Launching a file from a Registry key

      • windowsdesktop-runtime-8.0.24-win-x64.exe (PID: 8732)
    • Reads the machine GUID from the registry

      • windowsdesktop-runtime-8.0.24-win-x64.exe (PID: 8732)
      • msiexec.exe (PID: 5472)
    • Attempting to use instant messaging service

      • msedge.exe (PID: 1176)
    • Checks proxy server information

      • WerFault.exe (PID: 6468)
      • Xeno.exe (PID: 6488)
      • Xeno.exe (PID: 6668)
      • slui.exe (PID: 7288)
      • Xeno.exe (PID: 5080)
      • WerFault.exe (PID: 7088)
      • WerFault.exe (PID: 8388)
    • Creates files or folders in the user directory

      • Xeno.exe (PID: 6488)
      • WerFault.exe (PID: 7088)
      • WerFault.exe (PID: 8388)
      • WerFault.exe (PID: 6468)
Find more information about signature artifacts and mapping to MITRE ATT&CK™ MATRIX at the full report
No Malware configuration.

TRiD

.zip | ZIP compressed archive (36.3)

EXIF

ZIP

ZipRequiredVersion: 10
ZipBitFlag: -
ZipCompression: None
ZipModifyDate: 2026:02:10 17:18:04
ZipCRC: 0x00000000
ZipCompressedSize: -
ZipUncompressedSize: -
ZipFileName: Xeno-v1.3.25b/
No data.
screenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshot
All screenshots are available in the full report
All screenshots are available in the full report
Total processes
206
Monitored processes
47
Malicious processes
3
Suspicious processes
6

Behavior graph

Click at the process to see the details
start #GENERIC winrar.exe xeno.exe msedge.exe no specs msedge.exe msedge.exe no specs msedge.exe no specs msedge.exe msedge.exe no specs msedge.exe no specs msedge.exe no specs msedge.exe no specs msedge.exe no specs msedge.exe no specs msedge.exe no specs msedge.exe no specs msedge.exe no specs msedge.exe no specs identity_helper.exe no specs identity_helper.exe no specs msedge.exe no specs msedge.exe no specs msedge.exe no specs msedge.exe no specs windowsdesktop-runtime-8.0.24-win-x64.exe windowsdesktop-runtime-8.0.24-win-x64.exe windowsdesktop-runtime-8.0.24-win-x64.exe #GENERIC msiexec.exe msiexec.exe no specs msiexec.exe no specs msiexec.exe no specs msiexec.exe no specs slui.exe msedge.exe no specs msedge.exe no specs msedge.exe no specs xeno.exe msedge.exe no specs msedge.exe no specs werfault.exe msedge.exe no specs msedge.exe no specs msedge.exe no specs xeno.exe werfault.exe xeno.exe werfault.exe notepad.exe no specs

Process information

PID
CMD
Path
Indicators
Parent process
416"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=edge_collections.mojom.CollectionsDataManager --lang=en-US --service-sandbox-type=collections --disable-quic --string-annotations --always-read-main-dll --field-trial-handle=5840,i,15695562121686854799,15481607545016644410,262144 --variations-seed-version --mojo-platform-channel-handle=5468 /prefetch:8C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exemsedge.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
LOW
Description:
Microsoft Edge
Exit code:
0
Version:
133.0.3065.92
Modules
Images
c:\program files (x86)\microsoft\edge\application\msedge.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\program files (x86)\microsoft\edge\application\133.0.3065.92\msedge_elf.dll
c:\windows\system32\oleaut32.dll
c:\windows\system32\msvcp_win.dll
c:\windows\system32\ucrtbase.dll
c:\windows\system32\combase.dll
c:\windows\system32\rpcrt4.dll
476C:\Windows\syswow64\MsiExec.exe -Embedding 678099F7F78D1FB191C7F335E813C54DC:\Windows\SysWOW64\msiexec.exemsiexec.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
HIGH
Description:
Windows® installer
Exit code:
0
Version:
5.0.19041.3636 (WinBuild.160101.0800)
Modules
Images
c:\windows\syswow64\msiexec.exe
c:\windows\system32\ntdll.dll
c:\windows\syswow64\ntdll.dll
c:\windows\system32\wow64.dll
c:\windows\system32\wow64win.dll
c:\windows\system32\wow64cpu.dll
c:\windows\syswow64\kernel32.dll
c:\windows\syswow64\kernelbase.dll
c:\windows\syswow64\apphelp.dll
c:\windows\syswow64\aclayers.dll
848"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --string-annotations --pdf-upsell-enabled --disable-gpu-compositing --video-capture-use-gpu-memory-buffer --lang=en-US --js-flags=--ms-user-locale= --device-scale-factor=1 --num-raster-threads=3 --enable-main-frame-before-activation --renderer-client-id=11 --always-read-main-dll --field-trial-handle=5848,i,15695562121686854799,15481607545016644410,262144 --variations-seed-version --mojo-platform-channel-handle=5816 /prefetch:1C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exemsedge.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
LOW
Description:
Microsoft Edge
Exit code:
0
Version:
133.0.3065.92
Modules
Images
c:\program files (x86)\microsoft\edge\application\msedge.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\program files (x86)\microsoft\edge\application\133.0.3065.92\msedge_elf.dll
c:\windows\system32\oleaut32.dll
c:\windows\system32\msvcp_win.dll
c:\windows\system32\ucrtbase.dll
c:\windows\system32\combase.dll
c:\windows\system32\rpcrt4.dll
1136"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --string-annotations --gpu-preferences=UAAAAAAAAADgAAAEAAAAAAAAAAAAAAAAAABgAAEAAAAAAAAAAAAAAAAAAAACAAAAAAAAAAAAAAAAAAAAAAAAABAAAAAAAAAAEAAAAAAAAAAIAAAAAAAAAAgAAAAAAAAA --always-read-main-dll --field-trial-handle=2228,i,15695562121686854799,15481607545016644410,262144 --variations-seed-version --mojo-platform-channel-handle=2272 /prefetch:2C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exemsedge.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
LOW
Description:
Microsoft Edge
Exit code:
0
Version:
133.0.3065.92
Modules
Images
c:\program files (x86)\microsoft\edge\application\msedge.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\program files (x86)\microsoft\edge\application\133.0.3065.92\msedge_elf.dll
c:\windows\system32\oleaut32.dll
c:\windows\system32\msvcp_win.dll
c:\windows\system32\ucrtbase.dll
c:\windows\system32\combase.dll
c:\windows\system32\rpcrt4.dll
1176"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --disable-quic --string-annotations --always-read-main-dll --field-trial-handle=2248,i,15695562121686854799,15481607545016644410,262144 --variations-seed-version --mojo-platform-channel-handle=2456 /prefetch:3C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
msedge.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Microsoft Edge
Exit code:
0
Version:
133.0.3065.92
Modules
Images
c:\program files (x86)\microsoft\edge\application\msedge.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\program files (x86)\microsoft\edge\application\133.0.3065.92\msedge_elf.dll
c:\windows\system32\oleaut32.dll
c:\windows\system32\msvcp_win.dll
c:\windows\system32\ucrtbase.dll
c:\windows\system32\combase.dll
c:\windows\system32\rpcrt4.dll
1588"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --disable-quic --message-loop-type-ui --string-annotations --always-read-main-dll --field-trial-handle=3864,i,15695562121686854799,15481607545016644410,262144 --variations-seed-version --mojo-platform-channel-handle=6996 /prefetch:8C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exemsedge.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Microsoft Edge
Exit code:
0
Version:
133.0.3065.92
Modules
Images
c:\program files (x86)\microsoft\edge\application\msedge.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\program files (x86)\microsoft\edge\application\133.0.3065.92\msedge_elf.dll
c:\windows\system32\oleaut32.dll
c:\windows\system32\msvcp_win.dll
c:\windows\system32\ucrtbase.dll
c:\windows\system32\combase.dll
c:\windows\system32\rpcrt4.dll
1760"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=asset_store.mojom.AssetStoreService --lang=en-US --service-sandbox-type=asset_store_service --disable-quic --string-annotations --always-read-main-dll --field-trial-handle=6228,i,15695562121686854799,15481607545016644410,262144 --variations-seed-version --mojo-platform-channel-handle=6264 /prefetch:8C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exemsedge.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
LOW
Description:
Microsoft Edge
Exit code:
0
Version:
133.0.3065.92
Modules
Images
c:\program files (x86)\microsoft\edge\application\msedge.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\program files (x86)\microsoft\edge\application\133.0.3065.92\msedge_elf.dll
c:\windows\system32\oleaut32.dll
c:\windows\system32\msvcp_win.dll
c:\windows\system32\ucrtbase.dll
c:\windows\system32\combase.dll
c:\windows\system32\rpcrt4.dll
1956"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --edge-skip-compat-layer-relaunch --single-argument https://aka.ms/dotnet-core-applaunch?missing_runtime=true&arch=x64&rid=win-x64&os=win10&apphost_version=8.0.23&gui=trueC:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
msedge.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Microsoft Edge
Exit code:
0
Version:
133.0.3065.92
Modules
Images
c:\program files (x86)\microsoft\edge\application\msedge.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\program files (x86)\microsoft\edge\application\133.0.3065.92\msedge_elf.dll
c:\windows\system32\oleaut32.dll
c:\windows\system32\msvcp_win.dll
c:\windows\system32\ucrtbase.dll
c:\windows\system32\combase.dll
c:\windows\system32\rpcrt4.dll
2092"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --string-annotations --extension-process --renderer-sub-type=extension --pdf-upsell-enabled --video-capture-use-gpu-memory-buffer --lang=en-US --js-flags=--ms-user-locale= --device-scale-factor=1 --num-raster-threads=3 --enable-main-frame-before-activation --renderer-client-id=7 --always-read-main-dll --field-trial-handle=4236,i,15695562121686854799,15481607545016644410,262144 --variations-seed-version --mojo-platform-channel-handle=4276 /prefetch:2C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exemsedge.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
LOW
Description:
Microsoft Edge
Exit code:
0
Version:
133.0.3065.92
Modules
Images
c:\program files (x86)\microsoft\edge\application\msedge.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\program files (x86)\microsoft\edge\application\133.0.3065.92\msedge_elf.dll
c:\windows\system32\oleaut32.dll
c:\windows\system32\msvcp_win.dll
c:\windows\system32\ucrtbase.dll
c:\windows\system32\combase.dll
c:\windows\system32\rpcrt4.dll
2212"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --disable-quic --message-loop-type-ui --string-annotations --always-read-main-dll --field-trial-handle=6232,i,15695562121686854799,15481607545016644410,262144 --variations-seed-version --mojo-platform-channel-handle=7940 /prefetch:8C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exemsedge.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Microsoft Edge
Exit code:
0
Version:
133.0.3065.92
Modules
Images
c:\program files (x86)\microsoft\edge\application\msedge.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\program files (x86)\microsoft\edge\application\133.0.3065.92\msedge_elf.dll
c:\windows\system32\oleaut32.dll
c:\windows\system32\msvcp_win.dll
c:\windows\system32\ucrtbase.dll
c:\windows\system32\combase.dll
c:\windows\system32\rpcrt4.dll
Total events
31 114
Read events
30 179
Write events
889
Delete events
46

Modification events

(PID) Process:(8744) WinRAR.exeKey:HKEY_CURRENT_USER\SOFTWARE\WinRAR\FileList\FileColumnWidths
Operation:writeName:name
Value:
120
(PID) Process:(8744) WinRAR.exeKey:HKEY_CURRENT_USER\SOFTWARE\WinRAR\ArcHistory
Operation:writeName:3
Value:
C:\Users\admin\Desktop\chromium_ext.zip
(PID) Process:(8744) WinRAR.exeKey:HKEY_CURRENT_USER\SOFTWARE\WinRAR\ArcHistory
Operation:writeName:2
Value:
C:\Users\admin\Desktop\omni_23_10_2024_.zip
(PID) Process:(8744) WinRAR.exeKey:HKEY_CURRENT_USER\SOFTWARE\WinRAR\ArcHistory
Operation:writeName:1
Value:
C:\Users\admin\Downloads\chromium_build 1.zip
(PID) Process:(8744) WinRAR.exeKey:HKEY_CURRENT_USER\SOFTWARE\WinRAR\ArcHistory
Operation:writeName:0
Value:
C:\Users\admin\AppData\Local\Temp\Xeno-v1.3.25b-93da83d6.zip
(PID) Process:(8744) WinRAR.exeKey:HKEY_CURRENT_USER\SOFTWARE\WinRAR\FileList\FileColumnWidths
Operation:writeName:size
Value:
80
(PID) Process:(8744) WinRAR.exeKey:HKEY_CURRENT_USER\SOFTWARE\WinRAR\FileList\FileColumnWidths
Operation:writeName:type
Value:
120
(PID) Process:(8744) WinRAR.exeKey:HKEY_CURRENT_USER\SOFTWARE\WinRAR\FileList\FileColumnWidths
Operation:writeName:mtime
Value:
100
(PID) Process:(3388) Xeno.exeKey:HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\5.0\Cache\Content
Operation:writeName:CachePrefix
Value:
(PID) Process:(3388) Xeno.exeKey:HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\5.0\Cache\Cookies
Operation:writeName:CachePrefix
Value:
Cookie:
Executable files
517
Suspicious files
262
Text files
338
Unknown types
0

Dropped files

PID
Process
Filename
Type
8744WinRAR.exeC:\Users\admin\AppData\Local\Temp\Rar$DRa8744.7604\Xeno-v1.3.25b\api-ms-win-crt-heap-l1-1-0.dllexecutable
MD5:98DA186FD7D7873C164A51C5D7B77F1A
SHA256:80139E4CAA379D87B1D1DAFC23ACE71D2B330368115F6314140D4AE59C2A78E8
8744WinRAR.exeC:\Users\admin\AppData\Local\Temp\Rar$DRa8744.7604\Xeno-v1.3.25b\api-ms-win-crt-time-l1-1-0.dllexecutable
MD5:1D48A3189A55B632798F0E859628B0FB
SHA256:B56BC94E8539603DD2F0FEA2F25EFD17966315067442507DB4BFFAFCBC2955B0
8744WinRAR.exeC:\Users\admin\AppData\Local\Temp\Rar$DRa8744.7604\Xeno-v1.3.25b\api-ms-win-crt-environment-l1-1-0.dllexecutable
MD5:C712515D052A385991D30B9C6AFC767F
SHA256:F7C6C7EA22EDD2F8BD07AA5B33CBCE862EF1DCDC2226EB130E0018E02FF91DC1
8744WinRAR.exeC:\Users\admin\AppData\Local\Temp\Rar$DRa8744.7604\Xeno-v1.3.25b\api-ms-win-crt-convert-l1-1-0.dllexecutable
MD5:C8DBF0CA88FACFE87899168A7F7DB52C
SHA256:94B6E91B93C2202DABD659BFF294BEE87C22897A30A6B4930B49051C2FB502DC
8744WinRAR.exeC:\Users\admin\AppData\Local\Temp\Rar$DRa8744.7604\Xeno-v1.3.25b\api-ms-win-crt-filesystem-l1-1-0.dllexecutable
MD5:42A2A95F1BB940D01F55EB1674A81FE2
SHA256:51541EC6684B43157A85EA46A42EBED4555BE06BED0D0D07FF3EA6377301318D
8744WinRAR.exeC:\Users\admin\AppData\Local\Temp\Rar$DRa8744.7604\Xeno-v1.3.25b\api-ms-win-crt-runtime-l1-1-0.dllexecutable
MD5:F91E1FF896B5616919AC97C7095C513E
SHA256:07382C0D91DAD2BB6BA8BD06EA02F12C57ABF7C4E5A70672E9F2954D09A4FFD4
8744WinRAR.exeC:\Users\admin\AppData\Local\Temp\Rar$DRa8744.7604\Xeno-v1.3.25b\api-ms-win-crt-math-l1-1-0.dllexecutable
MD5:E10E077BB06209AEDD0D0D378C758F73
SHA256:8A7BFF1C918539A75C25568DB25933D653C003E016FD7791A37186B42BBB7C20
8744WinRAR.exeC:\Users\admin\AppData\Local\Temp\Rar$DRa8744.7604\Xeno-v1.3.25b\api-ms-win-crt-stdio-l1-1-0.dllexecutable
MD5:429C26ED27A026442F89C95FF16CE8C2
SHA256:2A466648AFFD3D51B944F563BB65046A3DA91006A0D90FB2C0B123487A1FC1B3
8744WinRAR.exeC:\Users\admin\AppData\Local\Temp\Rar$DRa8744.7604\Xeno-v1.3.25b\api-ms-win-crt-string-l1-1-0.dllexecutable
MD5:0F593E50BE4715AA8E1F6EB39434EDD5
SHA256:BF4EA10BE1B64C442AC0CCF4BDF69F6703467176A27E9E14A488D26448A6E179
8744WinRAR.exeC:\Users\admin\AppData\Local\Temp\Rar$DRa8744.7604\Xeno-v1.3.25b\api-ms-win-crt-locale-l1-1-0.dllexecutable
MD5:FF48B107B2449A647C64BAABD49408A1
SHA256:7BB8644E565AD4BCFD890F9044BCCB4D99953A740E9A500B1F820B2FDC3FC240
Download PCAP, analyze network streams, HTTP content and a lot more at the full report
HTTP(S) requests
277
TCP/UDP connections
102
DNS requests
103
Threats
29

HTTP requests

PID
Process
Method
HTTP Code
IP
URL
CN
Type
Size
Reputation
3344
svchost.exe
GET
304
51.104.136.2:443
https://settings-win.data.microsoft.com/settings/v3.0/WSD/UpdateHealthTools?os=Windows&osVer=10.0.19041.1.amd64fre.vb_release.191206-&sku=48&deviceClass=Windows.Desktop&locale=en-US&deviceId=s:BAD99146-31D3-4EC6-A1A4-BE76F32BA5D4&sampleId=s:95271487&appVer=10.0.19041.3626&FlightRing=Retail&TelemetryLevel=1&HidOverGattReg=C%3A%5CWINDOWS%5CSystem32%5CDriverStore%5CFileRepository%5Chidbthle.inf_amd64_9610b4821fdf82a5%5CMicrosoft.Bluetooth.Profiles.HidOverGatt.dll&AppVer=&ProcessorIdentifier=AMD64%20Family%2023%20Model%201%20Stepping%202&OEMModel=DELL&UpdateOfferedDays=4294967295&ProcessorManufacturer=AuthenticAMD&InstallDate=1661339444&OEMModelBaseBoard=&BranchReadinessLevel=CB&OEMSubModel=J5CR&IsCloudDomainJoined=0&DeferFeatureUpdatePeriodInDays=30&IsDeviceRetailDemo=0&FlightingBranchName=&OSUILocale=en-US&DeviceFamily=Windows.Desktop&WuClientVer=10.0.19041.3996&UninstallActive=1&IsFlightingEnabled=0&OSSkuId=48&ProcessorClockSpeed=3094&TotalPhysicalRAM=6144&SecureBootCapable=0&App=SedimentPack&ProcessorCores=6&CurrentBranch=vb_release&InstallLanguage=en-US&DeferQualityUpdatePeriodInDays=0&OEMName_Uncleaned=DELL&TPMVersion=0&PrimaryDiskTotalCapacity=262144&InstallationType=Client&AttrDataVer=186&ProcessorModel=AMD%20Ryzen%205%203500%206-Core%20Processor&IsEdgeWithChromiumInstalled=1&OSVersion=10.0.19045.4046&IsMDMEnrolled=0&ActivationChannel=Retail&FirmwareVersion=A.40&TrendInstalledKey=1&OSArchitecture=AMD64&DefaultUserRegion=244&UpdateManagementGroup=2
US
whitelisted
6768
MoUsoCoreWorker.exe
GET
304
40.127.240.158:443
https://settings-win.data.microsoft.com/settings/v3.0/OneSettings/Client?OSVersionFull=10.0.19045.4046.amd64fre.vb_release.191206-1406&LocalDeviceID=s%3ABAD99146-31D3-4EC6-A1A4-BE76F32BA5D4&FlightRing=Retail&AttrDataVer=186&OSUILocale=en-US&OSSkuId=48&App=WOSC&AppVer=&IsFlightingEnabled=0&TelemetryLevel=1&DeviceFamily=Windows.Desktop
US
whitelisted
1176
msedge.exe
GET
301
84.53.189.169:443
https://aka.ms/dotnet-core-applaunch?missing_runtime=true&arch=x64&rid=win-x64&os=win10&apphost_version=8.0.23&gui=true
US
unknown
1176
msedge.exe
GET
302
13.107.246.45:443
https://dotnet.microsoft.com/get-dotnet/dotnet-core?missing_runtime=true&arch=x64&rid=win-x64&os=win10&apphost_version=8.0.23&gui=true
US
whitelisted
1176
msedge.exe
GET
302
13.107.246.45:443
https://dotnet.microsoft.com/download/dotnet/8.0/runtime?cid=getdotnetcore&runtime=desktop&os=windows&arch=x64
US
whitelisted
1176
msedge.exe
GET
302
13.107.246.45:443
https://dotnet.microsoft.com/download/dotnet/thank-you/runtime-desktop-8.0.24-windows-x64-installer?cid=getdotnetcore
US
whitelisted
GET
200
204.79.197.203:80
http://oneocsp.microsoft.com/ocsp/MFQwUjBQME4wTDAJBgUrDgMCGgUABBQ3L3%2F%2Fa6ADK8NraY2GXzVaYrHG4AQUb6t%2B2v%2BXQ3LsO2d33oJhNYhHQoUCEzMAAAAGb6JMMcOVb6sAAAAAAAY%3D
US
binary
959 b
whitelisted
GET
200
104.82.114.5:80
http://ocsp.digicert.com/MFEwTzBNMEswSTAJBgUrDgMCGgUABBTrjrydRyt%2BApF3GSPypfHBxR5XtQQUs9tIpPmhxdiuNkHMEWNpYim8S8YCEAjTxtAB8my1oj8MfWpz%2F7Y%3D
US
binary
314 b
whitelisted
356
svchost.exe
POST
200
40.126.32.133:443
https://login.live.com/RST2.srf
US
xml
10.3 Kb
whitelisted
356
svchost.exe
GET
200
104.82.114.5:80
http://ocsp.digicert.com/MFEwTzBNMEswSTAJBgUrDgMCGgUABBSAUQYBMq2awn1Rh6Doh%2FsBYgFV7gQUA95QNVbRTLtm8KPiGxvDl7I90VUCEAJ0LqoXyo4hxxe7H%2Fz9DKA%3D
US
binary
471 b
whitelisted
Download PCAP, analyze network streams, HTTP content and a lot more at the full report

Connections

PID
Process
IP
Domain
ASN
CN
Reputation
4
System
192.168.100.255:137
Not routed
whitelisted
3344
svchost.exe
51.124.78.146:443
settings-win.data.microsoft.com
MICROSOFT-CORP-MSN-AS-BLOCK
US
whitelisted
1856
RUXIMICS.exe
51.124.78.146:443
settings-win.data.microsoft.com
MICROSOFT-CORP-MSN-AS-BLOCK
US
whitelisted
6768
MoUsoCoreWorker.exe
51.124.78.146:443
settings-win.data.microsoft.com
MICROSOFT-CORP-MSN-AS-BLOCK
US
whitelisted
5568
SearchApp.exe
2.16.204.142:443
www.bing.com
AKAMAI-ASN1
NL
whitelisted
104.82.114.5:80
ocsp.digicert.com
AKAMAI-AS
US
whitelisted
204.79.197.203:80
oneocsp.microsoft.com
MICROSOFT-CORP-MSN-AS-BLOCK
US
whitelisted
4
System
192.168.100.255:138
Not routed
whitelisted
3344
svchost.exe
51.104.136.2:443
settings-win.data.microsoft.com
MICROSOFT-CORP-MSN-AS-BLOCK
US
whitelisted
3344
svchost.exe
184.24.77.28:80
crl.microsoft.com
AKAMAI-ASN1
NL
whitelisted

DNS requests

Domain
IP
Reputation
settings-win.data.microsoft.com
  • 51.124.78.146
  • 51.104.136.2
  • 40.127.240.158
whitelisted
self.events.data.microsoft.com
  • 51.11.192.48
  • 20.189.173.11
whitelisted
google.com
  • 142.251.127.101
  • 142.251.127.139
  • 142.251.127.113
  • 142.251.127.100
  • 142.251.127.138
  • 142.251.127.102
whitelisted
www.bing.com
  • 2.16.204.142
  • 2.16.204.139
  • 2.16.204.153
  • 2.16.204.156
  • 2.16.204.158
  • 2.16.204.160
  • 2.16.204.145
  • 2.16.204.135
  • 2.16.204.134
  • 2.16.241.218
  • 2.16.241.205
  • 2.16.241.222
  • 2.16.241.207
  • 23.11.206.96
  • 23.3.89.91
  • 23.3.89.105
  • 23.11.206.107
  • 23.3.89.120
  • 23.3.89.104
  • 23.3.89.121
  • 23.3.89.89
  • 23.3.89.113
whitelisted
ocsp.digicert.com
  • 104.82.114.5
whitelisted
oneocsp.microsoft.com
  • 204.79.197.203
whitelisted
crl.microsoft.com
  • 184.24.77.28
  • 184.24.77.17
  • 184.24.77.38
  • 184.24.77.23
  • 184.24.77.10
  • 184.24.77.19
  • 184.24.77.21
  • 184.24.77.18
  • 184.24.77.36
  • 184.24.77.27
  • 184.24.77.4
  • 184.24.77.37
  • 184.24.77.40
  • 184.24.77.31
  • 184.24.77.29
  • 184.24.77.33
  • 184.24.77.41
  • 184.24.77.16
  • 184.24.77.15
  • 184.24.77.22
  • 184.24.77.7
  • 184.24.77.11
whitelisted
client.wns.windows.com
  • 172.211.123.250
  • 172.211.123.248
whitelisted
login.live.com
  • 40.126.32.133
  • 20.190.160.131
  • 40.126.32.68
  • 40.126.32.134
  • 20.190.160.17
  • 20.190.160.67
  • 20.190.160.20
  • 20.190.160.4
whitelisted
edge.microsoft.com
  • 150.171.28.11
  • 150.171.27.11
whitelisted

Threats

PID
Process
Class
Message
3344
svchost.exe
Unknown Traffic
ET USER_AGENTS Microsoft Dr Watson User-Agent (MSDW)
2292
svchost.exe
Not Suspicious Traffic
INFO [ANY.RUN] Cloudflare Pages platform for frontend developers to collaborate and deploy websites (pages .dev)
2292
svchost.exe
Misc activity
ET INFO DNS Query to Cloudflare Page Developer Domain (pages .dev)
6488
Xeno.exe
Misc activity
ET INFO Observed Cloudflare Page Developer Domain (pages .dev in TLS SNI)
1176
msedge.exe
Misc activity
ET INFO Observed Discord Domain in DNS Lookup (discord .com)
1176
msedge.exe
Misc activity
ET INFO Discord Chat Service Domain in DNS Lookup (discord .com)
1176
msedge.exe
Misc activity
ET INFO Observed Discord Domain in DNS Lookup (discord .com)
1176
msedge.exe
Misc activity
ET INFO Observed Discord Service Domain (discord .com) in TLS SNI
1176
msedge.exe
Misc activity
ET INFO Discord Chat Service Domain in DNS Lookup (discord .com)
1176
msedge.exe
Misc activity
ET INFO Observed Discord Domain (discord .com in TLS SNI)
Process
Message
Xeno.exe
Failed to resolve hostfxr.dll [not found]. Error code: 0x80008083
Xeno.exe
You must install .NET to run this application. App: C:\Users\admin\Desktop\Xeno-v1.3.25b\Xeno.exe Architecture: x64 App host version: 8.0.23 .NET location: Not found Learn more: https://aka.ms/dotnet/app-launch-failed Download the .NET runtime: https://aka.ms/dotnet-core-applaunch?missing_runtime=true&arch=x64&rid=win-x64&os=win10&apphost_version=8.0.23
Xeno.exe
WebView2: Failed to find an installed WebView2 runtime or non-stable Microsoft Edge installation.
Xeno.exe
WebView2: Failed to find an installed WebView2 runtime or non-stable Microsoft Edge installation.
Xeno.exe
WebView2: Failed to find an installed WebView2 runtime or non-stable Microsoft Edge installation.
Xeno.exe
WebView2: Failed to find an installed WebView2 runtime or non-stable Microsoft Edge installation.
Xeno.exe
WebView2: Failed to find an installed WebView2 runtime or non-stable Microsoft Edge installation.
Xeno.exe
WebView2: Failed to find an installed WebView2 runtime or non-stable Microsoft Edge installation.