Report Overview

  1. Visited public
    2025-01-20 14:45:13
    Tags
  2. URL

    xeno-executor.org/Xeno-v1.1.3-x64.zip

  3. Finishing URL

    about:privatebrowsing

  4. IP / ASN
    172.67.200.90

    #13335 CLOUDFLARENET

    Title
    about:privatebrowsing
Detections
urlquery
0
Network Intrusion Detection
0
Threat Detection Systems
16

Domain Summary

Domain / FQDNRankRegisteredFirst SeenLast Seen
xeno-executor.orgunknown2025-01-162025-01-202025-01-20

Related reports

Network Intrusion Detection Systems

Suricata /w Emerging Threats Pro

No alerts detected

Threat Detection Systems

Public InfoSec YARA rules

No alerts detected


OpenPhish

No alerts detected


PhishTank

No alerts detected


Quad9 DNS

No alerts detected


ThreatFox

No alerts detected


Files detected

  1. URL

    xeno-executor.org/Xeno-v1.1.3-x64.zip

  2. IP

    104.21.21.211

  3. ASN

    #13335 CLOUDFLARENET

  1. File type

    Zip archive data, at least v1.0 to extract, compression method=store

    Size

    5.0 MB (5001066 bytes)

  2. Hash

    520cabdf6c80e269166844c43015a77b

    cf0f24a0d2f1c5ccbc3f7076363976809d72cf51

  1. Archive (51)

  2. FilenameMd5File type
    api-ms-win-crt-convert-l1-1-0.dll
    c8dbf0ca88facfe87899168a7f7db52c
    PE32+ executable (DLL) (console) x86-64, for MS Windows, 2 sections
    api-ms-win-crt-filesystem-l1-1-0.dll
    42a2a95f1bb940d01f55eb1674a81fe2
    PE32+ executable (DLL) (console) x86-64, for MS Windows, 2 sections
    api-ms-win-crt-heap-l1-1-0.dll
    98da186fd7d7873c164a51c5d7b77f1a
    PE32+ executable (DLL) (console) x86-64, for MS Windows, 2 sections
    api-ms-win-crt-locale-l1-1-0.dll
    ff48b107b2449a647c64baabd49408a1
    PE32+ executable (DLL) (console) x86-64, for MS Windows, 2 sections
    api-ms-win-crt-math-l1-1-0.dll
    e10e077bb06209aedd0d0d378c758f73
    PE32+ executable (DLL) (console) x86-64, for MS Windows, 2 sections
    api-ms-win-crt-runtime-l1-1-0.dll
    f91e1ff896b5616919ac97c7095c513e
    PE32+ executable (DLL) (console) x86-64, for MS Windows, 2 sections
    api-ms-win-crt-stdio-l1-1-0.dll
    429c26ed27a026442f89c95ff16ce8c2
    PE32+ executable (DLL) (console) x86-64, for MS Windows, 2 sections
    api-ms-win-crt-string-l1-1-0.dll
    0f593e50be4715aa8e1f6eb39434edd5
    PE32+ executable (DLL) (console) x86-64, for MS Windows, 2 sections
    test.txt
    649d2f9bbd50814244547e4e140a95e0
    ASCII text, with no line terminators
    index.html
    001dcbb8f41cdcbf9b4d1e3a0ed4b2d2
    HTML document, Unicode text, UTF-8 text, with very long lines (61271), with CRLF line terminators
    workerMain.js
    d0ac5294c58e523cddf25bc6d785fa48
    JavaScript source, ASCII text, with very long lines (1119), with CRLF line terminators
    lua.js
    eebda1fdd970433750c115eae2f03865
    JavaScript source, ASCII text, with CRLF line terminators
    editor.main.css
    23c7db6e12f6454ef6e7fb98d17924d8
    ASCII text, with very long lines (65249), with CRLF line terminators
    editor.main.js
    2dc0068cdbc03ce43a75ab0b2df664e2
    JavaScript source, Unicode text, UTF-8 text, with very long lines (65245), with CRLF line terminators
    editor.main.nls.de.js
    d1fd2fb756c73970b9c5e0ba07bff708
    Unicode text, UTF-8 text, with very long lines (16089), with CRLF line terminators
    editor.main.nls.es.js
    36f546b28ca17ece9f8eb9bcf8344e13
    Unicode text, UTF-8 text, with very long lines (16082), with CRLF line terminators
    editor.main.nls.fr.js
    1a29080733878dd44e0c118e84cd0c39
    Unicode text, UTF-8 text, with very long lines (16773), with CRLF line terminators
    editor.main.nls.it.js
    18e88f58301ad5ae926204507ab99c6b
    Unicode text, UTF-8 text, with very long lines (17192), with CRLF line terminators
    editor.main.nls.ja.js
    3bf851cc70f515cbbe1d39da93e4f041
    Unicode text, UTF-8 text, with very long lines (7783), with CRLF line terminators
    editor.main.nls.js
    e871d4d9539c26d7d2bf32801ebdecf0
    Unicode text, UTF-8 text, with very long lines (13654), with CRLF line terminators
    editor.main.nls.ko.js
    60fcd422ac97a1b645ff48cb6928f7af
    Unicode text, UTF-8 text, with very long lines (8116), with CRLF line terminators
    editor.main.nls.ru.js
    6e7d5b984917b00f131c47473ce2b866
    Unicode text, UTF-8 text, with very long lines (16153), with CRLF line terminators
    editor.main.nls.zh-cn.js
    05e49314cf801f5d3992b55243690ea7
    Unicode text, UTF-8 text, with very long lines (5836), with CRLF line terminators
    editor.main.nls.zh-tw.js
    becbf441d95b0bc1565faf47ce9de373
    Unicode text, UTF-8 text, with very long lines (5745), with CRLF line terminators
    loader.js
    bc15bb48d4d5c60ce7f16819f4d988c4
    JavaScript source, ASCII text, with very long lines (1023), with CRLF line terminators
    libcrypto-3-x64.dll
    54ca3e6afcb3c57c7914c0856d779f2a
    PE32+ executable (DLL) (GUI) x86-64, for MS Windows, 8 sections
    libssl-3-x64.dll
    d66acb55a9f095a24865c9d883f96fd1
    PE32+ executable (DLL) (GUI) x86-64, for MS Windows, 8 sections
    Microsoft.Web.WebView2.Core.dll
    b037ca44fd19b8eedb6d5b9de3e48469
    PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows, 3 sections
    Microsoft.Web.WebView2.WinForms.dll
    8153423918c8cbf54b44acec01f1d6c2
    PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows, 3 sections
    Microsoft.Web.WebView2.Wpf.dll
    4a292c5c2abf1aab91dee8eecafe0ab6
    PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows, 3 sections
    msvcp140.dll
    4d157073a891d0832b9b05fb8aca73a8
    PE32 executable (DLL) (console) Intel 80386, for MS Windows, 5 sections
    Newtonsoft.Json.dll
    adf3e3eecde20b7c9661e9c47106a14a
    PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows, 3 sections
    WebView2Loader.dll
    8f2648cd543236ef1b4856715731e069
    PE32+ executable (DLL) (console) Aarch64, for MS Windows, 7 sections
    WebView2Loader.dll
    c5f0c46e91f354c58ecec864614157d7
    PE32+ executable (DLL) (console) x86-64, for MS Windows, 10 sections
    WebView2Loader.dll
    9d7744e15bb8e3d005079b18979c8544
    PE32 executable (DLL) (console) Intel 80386, for MS Windows, 6 sections
    Dex.lua
    e37374a8aa47cf8ac6d56901436e199f
    JavaScript source, ASCII text, with very long lines (467), with CRLF line terminators
    Infinite Yield.lua
    a8c69257b0db73b3e531d62cd872bc8b
    JavaScript source, Unicode text, UTF-8 text, with CRLF line terminators
    Sine Wave.lua
    0bbb2aebfadc119226992045dcaa30b4
    JavaScript source, ASCII text, with CRLF line terminators
    Spinning Donut.lua
    967403f0ecb43917e841a085851b732d
    JavaScript source, ASCII text, with CRLF line terminators
    UNCCheckEnv.lua
    b76726d10354343d9af5c268e40b47c4
    JavaScript source, Unicode text, UTF-8 text, with CRLF line terminators
    vcruntime140.dll
    943fc74c2e39fe803d828ccfa7e62409
    PE32+ executable (DLL) (console) x86-64, for MS Windows, 8 sections
    vcruntime140_1.dll
    05052be2c36166ff9646d7d00bb7413f
    PE32+ executable (DLL) (console) x86-64, for MS Windows, 6 sections
    deps_version.dat
    7ef3ab2f25955388d147b6797d04387c
    ASCII text
    rbx_api.dat
    c31c192974d091badb971fde16825795
    JSON text data
    rbx_rmd.dat
    b4839a4dd884609ab4a0100bc1bb74d6
    ASCII text, with CRLF line terminators
    IY_FE.iy
    291d5636a434c4f1ceb0f3f776c2a51f
    JSON text data
    Xeno.dll
    66e8a6978c77e6b2f390f33d25bf7f01
    PE32+ executable (DLL) (console) x86-64, for MS Windows, 6 sections
    Xeno.exe
    f0d6a8ef8299c5f15732a011d90b0be1
    PE32+ executable (GUI) x86-64, for MS Windows, 6 sections
    XenoUI.deps.json
    f264dff8b12b6341b6bb97f9cea46324
    JSON text data
    XenoUI.dll
    8a0f97c09c4a713e0b2679e90ced44d4
    PE32+ executable (GUI) x86-64 Mono/.Net assembly, for MS Windows, 2 sections
    XenoUI.runtimeconfig.json
    e0f6f18f9b152bc2d8c710b0214805d6
    JSON text data

    Detections

    AnalyzerVerdictAlert
    YARAhub by abuse.chmalware
    Detect pe file that no import table
    YARAhub by abuse.chmalware
    Detect pe file that no import table
    YARAhub by abuse.chmalware
    Detect pe file that no import table
    YARAhub by abuse.chmalware
    Detect pe file that no import table
    YARAhub by abuse.chmalware
    Detect pe file that no import table
    YARAhub by abuse.chmalware
    Detect pe file that no import table
    YARAhub by abuse.chmalware
    Detect pe file that no import table
    YARAhub by abuse.chmalware
    Detect pe file that no import table
    YARAhub by abuse.chmalware
    files - file ~tmp01925d3f.exe
    YARAhub by abuse.chmalware
    files - file ~tmp01925d3f.exe
    YARAhub by abuse.chmalware
    files - file ~tmp01925d3f.exe
    YARAhub by abuse.chmalware
    Detect pe file that no import table
    VirusTotalsuspicious

JavaScript (0)

HTTP Transactions (1)

URLIPResponseSize
xeno-executor.org/Xeno-v1.1.3-x64.zip
104.21.21.211200 OK5.0 MB