File name:

Xeno-v1.1.4-x64.zip

Full analysis: https://app.any.run/tasks/79cd1e28-f11e-4d65-83ac-e55e68a23928
Verdict: Malicious activity
Analysis date: February 16, 2025, 23:56:19
OS: Windows 10 Professional (build: 19045, 64 bit)
Tags:
arch-exec
arch-scr
arch-html
phishing
github
Indicators:
MIME: application/zip
File info: Zip archive data, at least v1.0 to extract, compression method=store
MD5:

B9CDB732B1E4EC5AFEBB7915616984DF

SHA1:

6DE685F29E3C665AA863A40A85C2742F4C748B23

SHA256:

BF58F9A6D18AB45DF57F517CEF3C338628122BE7663252F37C72ADD00DE0619F

SSDEEP:

98304:h4gAjwKKrJnoD8rVegN36AV9R8FczSzao1VXAXu69bKTwifqLb3z1/UJqmlA7OBN:1Bq+Xwz3SDc

ANY.RUN is an interactive service which provides full access to the guest system. Information in this report could be distorted by user actions and is provided for user acknowledgement as it is. ANY.RUN does not guarantee maliciousness or safety of the content.
  • MALICIOUS

    • Changes the autorun value in the registry

      • VC_redist.x64.exe (PID: 3288)
      • windowsdesktop-runtime-8.0.13-win-x64.exe (PID: 7832)
  • SUSPICIOUS

    • Process drops legitimate windows executable

      • msedge.exe (PID: 7000)
      • msedge.exe (PID: 6756)
      • VC_redist.x64.exe (PID: 7212)
      • VC_redist.x64.exe (PID: 3288)
      • msiexec.exe (PID: 7756)
      • VC_redist.x64.exe (PID: 7748)
      • VC_redist.x64.exe (PID: 1864)
      • WinRAR.exe (PID: 6200)
      • windowsdesktop-runtime-8.0.13-win-x64.exe (PID: 7736)
      • windowsdesktop-runtime-8.0.13-win-x64.exe (PID: 7712)
      • windowsdesktop-runtime-8.0.13-win-x64.exe (PID: 7832)
    • Starts a Microsoft application from unusual location

      • VC_redist.x64.exe (PID: 7212)
      • VC_redist.x64.exe (PID: 3288)
      • windowsdesktop-runtime-8.0.13-win-x64.exe (PID: 7736)
      • windowsdesktop-runtime-8.0.13-win-x64.exe (PID: 7832)
    • Searches for installed software

      • VC_redist.x64.exe (PID: 7212)
      • dllhost.exe (PID: 6028)
      • VC_redist.x64.exe (PID: 4164)
      • VC_redist.x64.exe (PID: 1864)
      • windowsdesktop-runtime-8.0.13-win-x64.exe (PID: 7736)
      • windowsdesktop-runtime-8.0.13-win-x64.exe (PID: 7832)
    • Executable content was dropped or overwritten

      • VC_redist.x64.exe (PID: 7212)
      • VC_redist.x64.exe (PID: 3288)
      • VC_redist.x64.exe (PID: 4164)
      • VC_redist.x64.exe (PID: 7748)
      • VC_redist.x64.exe (PID: 1864)
      • windowsdesktop-runtime-8.0.13-win-x64.exe (PID: 7712)
      • windowsdesktop-runtime-8.0.13-win-x64.exe (PID: 7736)
      • windowsdesktop-runtime-8.0.13-win-x64.exe (PID: 7832)
    • Starts itself from another location

      • VC_redist.x64.exe (PID: 7212)
      • windowsdesktop-runtime-8.0.13-win-x64.exe (PID: 7736)
    • Executes as Windows Service

      • VSSVC.exe (PID: 4244)
    • Reads security settings of Internet Explorer

      • VC_redist.x64.exe (PID: 7212)
      • VC_redist.x64.exe (PID: 4164)
      • Xeno.exe (PID: 6360)
      • windowsdesktop-runtime-8.0.13-win-x64.exe (PID: 7736)
      • Xeno.exe (PID: 6068)
      • Xeno.exe (PID: 7444)
      • Xeno.exe (PID: 1816)
      • Xeno.exe (PID: 6380)
    • Creates a software uninstall entry

      • VC_redist.x64.exe (PID: 3288)
      • windowsdesktop-runtime-8.0.13-win-x64.exe (PID: 7832)
    • The process drops C-runtime libraries

      • WinRAR.exe (PID: 6200)
      • msiexec.exe (PID: 7756)
    • Reads the Windows owner or organization settings

      • msiexec.exe (PID: 7756)
    • Checks Windows Trust Settings

      • msiexec.exe (PID: 7756)
    • The process checks if it is being run in the virtual environment

      • msiexec.exe (PID: 7756)
    • Application launched itself

      • VC_redist.x64.exe (PID: 7588)
      • VC_redist.x64.exe (PID: 4164)
    • The process executes via Task Scheduler

      • PLUGScheduler.exe (PID: 3776)
    • Executes application which crashes

      • Xeno.exe (PID: 1816)
      • Xeno.exe (PID: 7444)
      • Xeno.exe (PID: 6068)
      • Xeno.exe (PID: 6380)
  • INFO

    • The sample compiled with english language support

      • WinRAR.exe (PID: 6200)
      • msedge.exe (PID: 7000)
      • VC_redist.x64.exe (PID: 7212)
      • VC_redist.x64.exe (PID: 3288)
      • msiexec.exe (PID: 7756)
      • msedge.exe (PID: 6756)
      • VC_redist.x64.exe (PID: 7748)
      • VC_redist.x64.exe (PID: 4164)
      • VC_redist.x64.exe (PID: 1864)
      • windowsdesktop-runtime-8.0.13-win-x64.exe (PID: 7736)
      • windowsdesktop-runtime-8.0.13-win-x64.exe (PID: 7712)
      • windowsdesktop-runtime-8.0.13-win-x64.exe (PID: 7832)
    • Reads Environment values

      • identity_helper.exe (PID: 2992)
    • Reads the computer name

      • identity_helper.exe (PID: 2992)
      • VC_redist.x64.exe (PID: 7212)
      • VC_redist.x64.exe (PID: 3288)
      • VC_redist.x64.exe (PID: 1864)
      • VC_redist.x64.exe (PID: 4164)
      • msiexec.exe (PID: 7756)
      • PLUGScheduler.exe (PID: 3776)
      • identity_helper.exe (PID: 7280)
      • windowsdesktop-runtime-8.0.13-win-x64.exe (PID: 7832)
      • Xeno.exe (PID: 6068)
      • Xeno.exe (PID: 6360)
      • windowsdesktop-runtime-8.0.13-win-x64.exe (PID: 7736)
      • Xeno.exe (PID: 1816)
      • Xeno.exe (PID: 7444)
      • Xeno.exe (PID: 6380)
    • Executable content was dropped or overwritten

      • WinRAR.exe (PID: 6200)
      • msedge.exe (PID: 6756)
      • msiexec.exe (PID: 7756)
      • msedge.exe (PID: 6480)
      • msedge.exe (PID: 7000)
    • Manual execution by a user

      • msedge.exe (PID: 6756)
      • Xeno.exe (PID: 6360)
      • Xeno.exe (PID: 6068)
      • Xeno.exe (PID: 7444)
      • Xeno.exe (PID: 1816)
      • Xeno.exe (PID: 6380)
    • Checks supported languages

      • VC_redist.x64.exe (PID: 7212)
      • VC_redist.x64.exe (PID: 3288)
      • msiexec.exe (PID: 7756)
      • VC_redist.x64.exe (PID: 7588)
      • identity_helper.exe (PID: 2992)
      • VC_redist.x64.exe (PID: 7748)
      • VC_redist.x64.exe (PID: 4164)
      • VC_redist.x64.exe (PID: 1864)
      • PLUGScheduler.exe (PID: 3776)
      • Xeno.exe (PID: 6360)
      • identity_helper.exe (PID: 7280)
      • windowsdesktop-runtime-8.0.13-win-x64.exe (PID: 7712)
      • windowsdesktop-runtime-8.0.13-win-x64.exe (PID: 7736)
      • windowsdesktop-runtime-8.0.13-win-x64.exe (PID: 7832)
      • Xeno.exe (PID: 1816)
      • Xeno.exe (PID: 7444)
      • Xeno.exe (PID: 6068)
      • Xeno.exe (PID: 6380)
    • Create files in a temporary directory

      • VC_redist.x64.exe (PID: 7212)
      • VC_redist.x64.exe (PID: 3288)
      • VC_redist.x64.exe (PID: 7748)
      • VC_redist.x64.exe (PID: 4164)
      • windowsdesktop-runtime-8.0.13-win-x64.exe (PID: 7712)
      • windowsdesktop-runtime-8.0.13-win-x64.exe (PID: 7736)
      • windowsdesktop-runtime-8.0.13-win-x64.exe (PID: 7832)
    • Process checks computer location settings

      • VC_redist.x64.exe (PID: 7212)
      • VC_redist.x64.exe (PID: 4164)
      • windowsdesktop-runtime-8.0.13-win-x64.exe (PID: 7736)
    • Manages system restore points

      • SrTasks.exe (PID: 8108)
    • Reads the machine GUID from the registry

      • VC_redist.x64.exe (PID: 3288)
      • msiexec.exe (PID: 7756)
      • windowsdesktop-runtime-8.0.13-win-x64.exe (PID: 7832)
    • Reads the software policy settings

      • msiexec.exe (PID: 7756)
      • Xeno.exe (PID: 6068)
      • WerFault.exe (PID: 3080)
      • WerFault.exe (PID: 5788)
      • Xeno.exe (PID: 7444)
      • WerFault.exe (PID: 7456)
      • WerFault.exe (PID: 6396)
      • Xeno.exe (PID: 1816)
      • Xeno.exe (PID: 6380)
    • Application launched itself

      • msedge.exe (PID: 6756)
      • msedge.exe (PID: 6480)
    • Creates a software uninstall entry

      • msiexec.exe (PID: 7756)
    • Creates files in the program directory

      • VC_redist.x64.exe (PID: 3288)
      • PLUGScheduler.exe (PID: 3776)
      • windowsdesktop-runtime-8.0.13-win-x64.exe (PID: 7832)
      • Xeno.exe (PID: 6068)
    • Checks proxy server information

      • Xeno.exe (PID: 6068)
      • Xeno.exe (PID: 1816)
      • WerFault.exe (PID: 3080)
      • WerFault.exe (PID: 5788)
      • WerFault.exe (PID: 7456)
      • Xeno.exe (PID: 6380)
      • WerFault.exe (PID: 6396)
      • Xeno.exe (PID: 7444)
    • Creates files or folders in the user directory

      • WerFault.exe (PID: 3080)
      • WerFault.exe (PID: 5788)
      • WerFault.exe (PID: 7456)
Find more information about signature artifacts and mapping to MITRE ATT&CK™ MATRIX at the full report
No Malware configuration.

TRiD

.zip | ZIP compressed archive (36.3)

EXIF

ZIP

ZipRequiredVersion: 10
ZipBitFlag: -
ZipCompression: None
ZipModifyDate: 2025:01:21 23:42:36
ZipCRC: 0x00000000
ZipCompressedSize: -
ZipUncompressedSize: -
ZipFileName: Xeno-v1.1.4-x64/
No data.
screenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshot
All screenshots are available in the full report
All screenshots are available in the full report
Total processes
403
Monitored processes
107
Malicious processes
11
Suspicious processes
2

Behavior graph

Click at the process to see the details
start winrar.exe msedge.exe msedge.exe no specs msedge.exe no specs msedge.exe msedge.exe no specs msedge.exe no specs msedge.exe no specs msedge.exe no specs msedge.exe no specs msedge.exe no specs msedge.exe no specs msedge.exe no specs msedge.exe no specs identity_helper.exe no specs identity_helper.exe no specs msedge.exe no specs msedge.exe no specs msedge.exe no specs msedge.exe no specs msedge.exe no specs msedge.exe no specs msedge.exe no specs msedge.exe no specs msedge.exe no specs msedge.exe no specs msedge.exe no specs msedge.exe no specs msedge.exe no specs msedge.exe no specs msedge.exe no specs msedge.exe no specs msedge.exe no specs msedge.exe no specs msedge.exe no specs msedge.exe no specs msedge.exe no specs msedge.exe no specs msedge.exe no specs msedge.exe no specs msedge.exe no specs msedge.exe no specs msedge.exe no specs msedge.exe no specs msedge.exe no specs vc_redist.x64.exe vc_redist.x64.exe vc_redist.x64.exe SPPSurrogate no specs vssvc.exe no specs srtasks.exe no specs conhost.exe no specs msiexec.exe msedge.exe no specs msedge.exe no specs vc_redist.x64.exe no specs vc_redist.x64.exe vc_redist.x64.exe msedge.exe no specs plugscheduler.exe no specs xeno.exe no specs msedge.exe msedge.exe no specs msedge.exe no specs msedge.exe msedge.exe no specs msedge.exe no specs msedge.exe no specs msedge.exe no specs msedge.exe no specs msedge.exe no specs msedge.exe no specs msedge.exe no specs msedge.exe no specs msedge.exe no specs msedge.exe no specs msedge.exe no specs msedge.exe no specs msedge.exe no specs msedge.exe no specs msedge.exe no specs identity_helper.exe no specs identity_helper.exe no specs msedge.exe no specs msedge.exe no specs msedge.exe no specs msedge.exe no specs msedge.exe no specs msedge.exe no specs windowsdesktop-runtime-8.0.13-win-x64.exe windowsdesktop-runtime-8.0.13-win-x64.exe windowsdesktop-runtime-8.0.13-win-x64.exe msedge.exe no specs msedge.exe no specs msedge.exe no specs xeno.exe werfault.exe msedge.exe no specs msedge.exe no specs xeno.exe werfault.exe msedge.exe no specs xeno.exe werfault.exe xeno.exe werfault.exe msedge.exe no specs

Process information

PID
CMD
Path
Indicators
Parent process
640"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --no-appcompat-clear --mojo-platform-channel-handle=4320 --field-trial-handle=2316,i,5709633114617041228,7789892039397896319,262144 --variations-seed-version /prefetch:8C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exemsedge.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
LOW
Description:
Microsoft Edge
Exit code:
0
Version:
122.0.2365.59
Modules
Images
c:\program files (x86)\microsoft\edge\application\msedge.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\program files (x86)\microsoft\edge\application\122.0.2365.59\msedge_elf.dll
c:\windows\system32\oleaut32.dll
c:\windows\system32\msvcp_win.dll
c:\windows\system32\ucrtbase.dll
c:\windows\system32\combase.dll
c:\windows\system32\rpcrt4.dll
1348"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --no-appcompat-clear --mojo-platform-channel-handle=3788 --field-trial-handle=2480,i,7774042096389621073,414983898758595871,262144 --variations-seed-version /prefetch:8C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exemsedge.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
LOW
Description:
Microsoft Edge
Exit code:
0
Version:
122.0.2365.59
Modules
Images
c:\program files (x86)\microsoft\edge\application\msedge.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\program files (x86)\microsoft\edge\application\122.0.2365.59\msedge_elf.dll
c:\windows\system32\oleaut32.dll
c:\windows\system32\msvcp_win.dll
c:\windows\system32\ucrtbase.dll
c:\windows\system32\combase.dll
c:\windows\system32\rpcrt4.dll
1380"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=chrome.mojom.UtilReadIcon --lang=en-US --service-sandbox-type=icon_reader --no-appcompat-clear --mojo-platform-channel-handle=7560 --field-trial-handle=2480,i,7774042096389621073,414983898758595871,262144 --variations-seed-version /prefetch:8C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exemsedge.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
LOW
Description:
Microsoft Edge
Exit code:
0
Version:
122.0.2365.59
Modules
Images
c:\program files (x86)\microsoft\edge\application\msedge.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\program files (x86)\microsoft\edge\application\122.0.2365.59\msedge_elf.dll
c:\windows\system32\oleaut32.dll
c:\windows\system32\msvcp_win.dll
c:\windows\system32\ucrtbase.dll
c:\windows\system32\combase.dll
c:\windows\system32\rpcrt4.dll
1816"C:\Users\admin\Desktop\Xeno-v1.1.4-x64\Xeno.exe" C:\Users\admin\Desktop\Xeno-v1.1.4-x64\Xeno.exe
explorer.exe
User:
admin
Company:
XenoUI
Integrity Level:
MEDIUM
Description:
XenoUI
Exit code:
3762504530
Version:
1.1.0
Modules
Images
c:\users\admin\desktop\xeno-v1.1.4-x64\xeno.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\user32.dll
c:\windows\system32\win32u.dll
c:\windows\system32\gdi32.dll
c:\windows\system32\gdi32full.dll
c:\windows\system32\msvcp_win.dll
c:\windows\system32\ucrtbase.dll
1864"C:\ProgramData\Package Cache\{8bdfe669-9705-4184-9368-db9ce581e0e7}\VC_redist.x64.exe" -q -burn.elevated BurnPipe.{90C8E9F2-B3F1-4246-93C8-EA3A0D01DAAB} {FFBEF311-3E1C-4D37-9E5A-DBBF1820CDFE} 4164C:\ProgramData\Package Cache\{8bdfe669-9705-4184-9368-db9ce581e0e7}\VC_redist.x64.exe
VC_redist.x64.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
HIGH
Description:
Microsoft Visual C++ 2015-2022 Redistributable (x64) - 14.36.32532
Exit code:
0
Version:
14.36.32532.0
Modules
Images
c:\programdata\package cache\{8bdfe669-9705-4184-9368-db9ce581e0e7}\vc_redist.x64.exe
c:\windows\system32\ntdll.dll
c:\windows\syswow64\ntdll.dll
c:\windows\system32\wow64.dll
c:\windows\system32\wow64win.dll
c:\windows\system32\wow64cpu.dll
c:\windows\syswow64\kernel32.dll
c:\windows\syswow64\kernelbase.dll
c:\windows\syswow64\apphelp.dll
c:\windows\syswow64\advapi32.dll
2116"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=edge_collections.mojom.CollectionsDataManager --lang=en-US --service-sandbox-type=collections --no-appcompat-clear --mojo-platform-channel-handle=5524 --field-trial-handle=2316,i,5709633114617041228,7789892039397896319,262144 --variations-seed-version /prefetch:8C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exemsedge.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
LOW
Description:
Microsoft Edge
Exit code:
0
Version:
122.0.2365.59
Modules
Images
c:\program files (x86)\microsoft\edge\application\msedge.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\program files (x86)\microsoft\edge\application\122.0.2365.59\msedge_elf.dll
c:\windows\system32\oleaut32.dll
c:\windows\system32\msvcp_win.dll
c:\windows\system32\ucrtbase.dll
c:\windows\system32\combase.dll
c:\windows\system32\rpcrt4.dll
2324"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=asset_store.mojom.AssetStoreService --lang=en-US --service-sandbox-type=asset_store_service --no-appcompat-clear --mojo-platform-channel-handle=5908 --field-trial-handle=2480,i,7774042096389621073,414983898758595871,262144 --variations-seed-version /prefetch:8C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exemsedge.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
LOW
Description:
Microsoft Edge
Exit code:
0
Version:
122.0.2365.59
Modules
Images
c:\program files (x86)\microsoft\edge\application\msedge.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\program files (x86)\microsoft\edge\application\122.0.2365.59\msedge_elf.dll
c:\windows\system32\oleaut32.dll
c:\windows\system32\msvcp_win.dll
c:\windows\system32\ucrtbase.dll
c:\windows\system32\combase.dll
c:\windows\system32\rpcrt4.dll
2384"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=chrome.mojom.UtilReadIcon --lang=en-US --service-sandbox-type=icon_reader --no-appcompat-clear --mojo-platform-channel-handle=5600 --field-trial-handle=2316,i,5709633114617041228,7789892039397896319,262144 --variations-seed-version /prefetch:8C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exemsedge.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
LOW
Description:
Microsoft Edge
Exit code:
0
Version:
122.0.2365.59
Modules
Images
c:\program files (x86)\microsoft\edge\application\msedge.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\program files (x86)\microsoft\edge\application\122.0.2365.59\msedge_elf.dll
c:\windows\system32\oleaut32.dll
c:\windows\system32\msvcp_win.dll
c:\windows\system32\ucrtbase.dll
c:\windows\system32\combase.dll
c:\windows\system32\rpcrt4.dll
2404"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --no-appcompat-clear --disable-gpu-compositing --lang=en-US --js-flags=--ms-user-locale= --device-scale-factor=1 --num-raster-threads=2 --enable-main-frame-before-activation --renderer-client-id=15 --mojo-platform-channel-handle=5648 --field-trial-handle=2316,i,5709633114617041228,7789892039397896319,262144 --variations-seed-version /prefetch:1C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exemsedge.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
LOW
Description:
Microsoft Edge
Version:
122.0.2365.59
Modules
Images
c:\program files (x86)\microsoft\edge\application\msedge.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\program files (x86)\microsoft\edge\application\122.0.2365.59\msedge_elf.dll
c:\windows\system32\oleaut32.dll
c:\windows\system32\msvcp_win.dll
c:\windows\system32\ucrtbase.dll
c:\windows\system32\combase.dll
c:\windows\system32\rpcrt4.dll
2680"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=edge_search_indexer.mojom.SearchIndexerInterfaceBroker --lang=en-US --service-sandbox-type=search_indexer --message-loop-type-ui --no-appcompat-clear --mojo-platform-channel-handle=4136 --field-trial-handle=2480,i,7774042096389621073,414983898758595871,262144 --variations-seed-version /prefetch:8C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exemsedge.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
LOW
Description:
Microsoft Edge
Exit code:
1073807364
Version:
122.0.2365.59
Modules
Images
c:\program files (x86)\microsoft\edge\application\msedge.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\program files (x86)\microsoft\edge\application\122.0.2365.59\msedge_elf.dll
c:\windows\system32\oleaut32.dll
c:\windows\system32\msvcp_win.dll
c:\windows\system32\ucrtbase.dll
c:\windows\system32\combase.dll
c:\windows\system32\rpcrt4.dll
Total events
49 984
Read events
48 857
Write events
722
Delete events
405

Modification events

(PID) Process:(6200) WinRAR.exeKey:HKEY_CURRENT_USER\SOFTWARE\WinRAR\ArcHistory
Operation:writeName:3
Value:
C:\Users\admin\Desktop\preferences.zip
(PID) Process:(6200) WinRAR.exeKey:HKEY_CURRENT_USER\SOFTWARE\WinRAR\ArcHistory
Operation:writeName:2
Value:
C:\Users\admin\Desktop\chromium_ext.zip
(PID) Process:(6200) WinRAR.exeKey:HKEY_CURRENT_USER\SOFTWARE\WinRAR\ArcHistory
Operation:writeName:1
Value:
C:\Users\admin\Desktop\omni_23_10_2024_.zip
(PID) Process:(6200) WinRAR.exeKey:HKEY_CURRENT_USER\SOFTWARE\WinRAR\ArcHistory
Operation:writeName:0
Value:
C:\Users\admin\AppData\Local\Temp\Xeno-v1.1.4-x64.zip
(PID) Process:(6200) WinRAR.exeKey:HKEY_CURRENT_USER\SOFTWARE\WinRAR\FileList\FileColumnWidths
Operation:writeName:name
Value:
120
(PID) Process:(6200) WinRAR.exeKey:HKEY_CURRENT_USER\SOFTWARE\WinRAR\FileList\FileColumnWidths
Operation:writeName:size
Value:
80
(PID) Process:(6200) WinRAR.exeKey:HKEY_CURRENT_USER\SOFTWARE\WinRAR\FileList\FileColumnWidths
Operation:writeName:type
Value:
120
(PID) Process:(6200) WinRAR.exeKey:HKEY_CURRENT_USER\SOFTWARE\WinRAR\FileList\FileColumnWidths
Operation:writeName:mtime
Value:
100
(PID) Process:(6200) WinRAR.exeKey:HKEY_CURRENT_USER\SOFTWARE\WinRAR\DialogEditHistory\ExtrPath
Operation:delete valueName:15
Value:
(PID) Process:(6200) WinRAR.exeKey:HKEY_CURRENT_USER\SOFTWARE\WinRAR\DialogEditHistory\ExtrPath
Operation:delete valueName:14
Value:
Executable files
152
Suspicious files
935
Text files
253
Unknown types
1

Dropped files

PID
Process
Filename
Type
6200WinRAR.exeC:\Users\admin\Desktop\Xeno-v1.1.4-x64\api-ms-win-crt-filesystem-l1-1-0.dllexecutable
MD5:42A2A95F1BB940D01F55EB1674A81FE2
SHA256:51541EC6684B43157A85EA46A42EBED4555BE06BED0D0D07FF3EA6377301318D
6200WinRAR.exeC:\Users\admin\Desktop\Xeno-v1.1.4-x64\api-ms-win-crt-convert-l1-1-0.dllexecutable
MD5:C8DBF0CA88FACFE87899168A7F7DB52C
SHA256:94B6E91B93C2202DABD659BFF294BEE87C22897A30A6B4930B49051C2FB502DC
6200WinRAR.exeC:\Users\admin\Desktop\Xeno-v1.1.4-x64\api-ms-win-crt-heap-l1-1-0.dllexecutable
MD5:98DA186FD7D7873C164A51C5D7B77F1A
SHA256:80139E4CAA379D87B1D1DAFC23ACE71D2B330368115F6314140D4AE59C2A78E8
6200WinRAR.exeC:\Users\admin\Desktop\Xeno-v1.1.4-x64\api-ms-win-crt-stdio-l1-1-0.dllexecutable
MD5:429C26ED27A026442F89C95FF16CE8C2
SHA256:2A466648AFFD3D51B944F563BB65046A3DA91006A0D90FB2C0B123487A1FC1B3
6200WinRAR.exeC:\Users\admin\Desktop\Xeno-v1.1.4-x64\api-ms-win-crt-runtime-l1-1-0.dllexecutable
MD5:F91E1FF896B5616919AC97C7095C513E
SHA256:07382C0D91DAD2BB6BA8BD06EA02F12C57ABF7C4E5A70672E9F2954D09A4FFD4
6200WinRAR.exeC:\Users\admin\Desktop\Xeno-v1.1.4-x64\bin\Monaco\vs\editor\editor.main.jsbinary
MD5:2DC0068CDBC03CE43A75AB0B2DF664E2
SHA256:B604B6148F70FE9DB882CCE2A7D327B2422AD2F203A805491002A8C564E3C3FF
6200WinRAR.exeC:\Users\admin\Desktop\Xeno-v1.1.4-x64\bin\Monaco\vs\editor\editor.main.nls.fr.jstext
MD5:1A29080733878DD44E0C118E84CD0C39
SHA256:6ED837DC1905C06A20D102921FF06A0BDA003C5368ED0576BF7E69494E889AE8
6200WinRAR.exeC:\Users\admin\Desktop\Xeno-v1.1.4-x64\bin\Monaco\vs\editor\editor.main.nls.ja.jstext
MD5:3BF851CC70F515CBBE1D39DA93E4F041
SHA256:1F3556EA7233843B9E08B3C97B6727C533D702563E195C2090A438070DC85F0F
6200WinRAR.exeC:\Users\admin\Desktop\Xeno-v1.1.4-x64\bin\Monaco\vs\editor\editor.main.nls.jstext
MD5:E871D4D9539C26D7D2BF32801EBDECF0
SHA256:5FF0084E6A7EEE82A735616239AAF2190EA9D90E89E19340831F3D590828016A
6200WinRAR.exeC:\Users\admin\Desktop\Xeno-v1.1.4-x64\bin\Monaco\vs\base\worker\workerMain.jsbinary
MD5:D0AC5294C58E523CDDF25BC6D785FA48
SHA256:E90D1A8F116FA74431117A3AD78DDE16DDE060A4BF7528DFE3D5A3AD6156504B
Download PCAP, analyze network streams, HTTP content and a lot more at the full report
HTTP(S) requests
40
TCP/UDP connections
236
DNS requests
214
Threats
1

HTTP requests

PID
Process
Method
HTTP Code
IP
URL
CN
Type
Size
Reputation
5064
SearchApp.exe
GET
200
184.30.131.245:80
http://ocsp.digicert.com/MFEwTzBNMEswSTAJBgUrDgMCGgUABBTrjrydRyt%2BApF3GSPypfHBxR5XtQQUs9tIpPmhxdiuNkHMEWNpYim8S8YCEAI5PUjXAkJafLQcAAsO18o%3D
unknown
whitelisted
7000
msedge.exe
GET
304
184.30.131.245:80
http://cacerts.digicert.com/DigiCertGlobalRootG2.crt
unknown
whitelisted
7476
SIHClient.exe
GET
200
184.30.21.171:80
http://www.microsoft.com/pkiops/crl/Microsoft%20ECC%20Update%20Secure%20Server%20CA%202.1.crl
unknown
whitelisted
7476
SIHClient.exe
GET
200
184.30.21.171:80
http://www.microsoft.com/pkiops/crl/Microsoft%20ECC%20Product%20Root%20Certificate%20Authority%202018.crl
unknown
whitelisted
6756
msedge.exe
GET
200
184.30.21.171:80
http://www.microsoft.com/pkiops/crl/MicCodSigPCA2011_2011-07-08.crl
unknown
whitelisted
4972
svchost.exe
GET
206
217.20.57.19:80
http://msedge.b.tlu.dl.delivery.mp.microsoft.com/filestreamingservice/files/9b9f8fb4-8a65-41e4-bda3-5416858f0aeb?P1=1740134637&P2=404&P3=2&P4=Z5elYLSDflw5caSu3GvnanhsOmU47knhoowD1nBdH8nK1nUd11LrwLcb55JA8L%2fkW0Uw5c3Bu8aaL0Mhfeq4Jw%3d%3d
unknown
whitelisted
4972
svchost.exe
GET
206
217.20.57.19:80
http://msedge.b.tlu.dl.delivery.mp.microsoft.com/filestreamingservice/files/9b9f8fb4-8a65-41e4-bda3-5416858f0aeb?P1=1740134637&P2=404&P3=2&P4=Z5elYLSDflw5caSu3GvnanhsOmU47knhoowD1nBdH8nK1nUd11LrwLcb55JA8L%2fkW0Uw5c3Bu8aaL0Mhfeq4Jw%3d%3d
unknown
whitelisted
4972
svchost.exe
GET
206
217.20.57.19:80
http://msedge.b.tlu.dl.delivery.mp.microsoft.com/filestreamingservice/files/5cbc98ff-b69b-4fda-ad94-17ec2f9cf48b?P1=1740134639&P2=404&P3=2&P4=AeSlZ6tItQq9n8UvUnsAUmcLS56NOd7giMYE2iTqZZm%2fc0vtuVr4hdvBC%2fINT7AYp35fl0XA8esm5GlgNodQbA%3d%3d
unknown
whitelisted
GET
200
23.32.238.112:80
http://crl.microsoft.com/pki/crl/products/MicRooCerAut2011_2011_03_22.crl
unknown
whitelisted
1176
svchost.exe
GET
200
184.30.131.245:80
http://ocsp.digicert.com/MFEwTzBNMEswSTAJBgUrDgMCGgUABBSAUQYBMq2awn1Rh6Doh%2FsBYgFV7gQUA95QNVbRTLtm8KPiGxvDl7I90VUCEAJ0LqoXyo4hxxe7H%2Fz9DKA%3D
unknown
whitelisted
Download PCAP, analyze network streams, HTTP content and a lot more at the full report

Connections

PID
Process
IP
Domain
ASN
CN
Reputation
4
System
192.168.100.255:137
whitelisted
4712
MoUsoCoreWorker.exe
20.73.194.208:443
settings-win.data.microsoft.com
MICROSOFT-CORP-MSN-AS-BLOCK
NL
whitelisted
1460
svchost.exe
20.73.194.208:443
settings-win.data.microsoft.com
MICROSOFT-CORP-MSN-AS-BLOCK
NL
whitelisted
104.126.37.139:443
www.bing.com
Akamai International B.V.
DE
whitelisted
20.73.194.208:443
settings-win.data.microsoft.com
MICROSOFT-CORP-MSN-AS-BLOCK
NL
whitelisted
5064
SearchApp.exe
184.30.131.245:80
ocsp.digicert.com
AKAMAI-AS
US
whitelisted
23.32.238.112:80
crl.microsoft.com
Akamai International B.V.
DE
whitelisted
184.30.21.171:80
www.microsoft.com
AKAMAI-AS
DE
whitelisted
4
System
192.168.100.255:138
whitelisted
1076
svchost.exe
184.30.18.9:443
go.microsoft.com
AKAMAI-AS
DE
whitelisted

DNS requests

Domain
IP
Reputation
settings-win.data.microsoft.com
  • 20.73.194.208
  • 51.104.136.2
whitelisted
www.bing.com
  • 104.126.37.139
  • 104.126.37.163
  • 104.126.37.145
  • 104.126.37.123
  • 104.126.37.155
  • 104.126.37.153
  • 104.126.37.170
  • 104.126.37.131
  • 104.126.37.128
  • 104.126.37.162
  • 104.126.37.144
  • 104.126.37.178
  • 104.126.37.171
  • 104.126.37.136
  • 184.86.251.22
  • 184.86.251.27
  • 104.126.37.161
  • 104.126.37.177
  • 104.126.37.185
  • 104.126.37.176
  • 104.126.37.179
whitelisted
ocsp.digicert.com
  • 184.30.131.245
whitelisted
crl.microsoft.com
  • 23.32.238.112
  • 23.32.238.107
whitelisted
www.microsoft.com
  • 184.30.21.171
  • 23.219.150.101
whitelisted
google.com
  • 172.217.16.206
whitelisted
go.microsoft.com
  • 184.30.18.9
  • 2.19.106.8
whitelisted
login.live.com
  • 20.190.160.20
  • 40.126.32.140
  • 40.126.32.136
  • 20.190.160.67
  • 40.126.32.72
  • 20.190.160.130
  • 40.126.32.74
  • 40.126.32.76
whitelisted
config.edge.skype.com
  • 13.107.42.16
whitelisted
ntp.msn.com
  • 204.79.197.203
whitelisted

Threats

PID
Process
Class
Message
2156
svchost.exe
Not Suspicious Traffic
INFO [ANY.RUN] Attempting to access raw user content on GitHub
Process
Message
msiexec.exe
Failed to release Service