Report Overview

  1. Visited public
    2024-10-17 11:20:18
    Tags
  2. URL

    rizve.us.to/Xeno/Xeno-v1.0.8-x64.zip

  3. Finishing URL

    about:privatebrowsing

  4. IP / ASN
    34.132.146.171

    #396982 GOOGLE-CLOUD-PLATFORM

    Title
    about:privatebrowsing
Detections
urlquery
0
Network Intrusion Detection
0
Threat Detection Systems
10

Domain Summary

Domain / FQDNRankRegisteredFirst SeenLast Seen
rizve.us.tounknownunknown2024-10-132024-10-13

Related reports

Network Intrusion Detection Systems

Suricata /w Emerging Threats Pro

No alerts detected

Threat Detection Systems

Public InfoSec YARA rules

No alerts detected


OpenPhish

No alerts detected


PhishTank

No alerts detected


Mnemonic Secure DNS

No alerts detected


Quad9 DNS

No alerts detected


ThreatFox

No alerts detected


Files detected

  1. URL

    rizve.us.to/Xeno/Xeno-v1.0.8-x64.zip

  2. IP

    34.132.146.171

  3. ASN

    #396982 GOOGLE-CLOUD-PLATFORM

  1. File type

    Zip archive data, at least v2.0 to extract, compression method=store

    Size

    4.3 MB (4338454 bytes)

  2. Hash

    c232bea765c6edb442a8709a2a012279

    904cbb05a56948661a34a75f4d5484dce7cb6c03

  1. Archive (37)

  2. FilenameMd5File type
    editor.lua
    9ca04dc1eed106950481d417e354d0ad
    ASCII text, with CRLF line terminators
    index.html
    a9793319d1395e6f3564bba48465d42a
    HTML document, Unicode text, UTF-8 text, with very long lines (61271), with CRLF line terminators
    workerMain.js
    d0ac5294c58e523cddf25bc6d785fa48
    JavaScript source, ASCII text, with very long lines (1119), with CRLF line terminators
    lua.js
    eebda1fdd970433750c115eae2f03865
    JavaScript source, ASCII text, with CRLF line terminators
    editor.main.css
    23c7db6e12f6454ef6e7fb98d17924d8
    ASCII text, with very long lines (65249), with CRLF line terminators
    editor.main.js
    a7e3083cfe200263edfb4bf011b893a3
    JavaScript source, Unicode text, UTF-8 text, with very long lines (65245), with CRLF line terminators
    editor.main.nls.de.js
    d1fd2fb756c73970b9c5e0ba07bff708
    Unicode text, UTF-8 text, with very long lines (16089), with CRLF line terminators
    editor.main.nls.es.js
    36f546b28ca17ece9f8eb9bcf8344e13
    Unicode text, UTF-8 text, with very long lines (16082), with CRLF line terminators
    editor.main.nls.fr.js
    1a29080733878dd44e0c118e84cd0c39
    Unicode text, UTF-8 text, with very long lines (16773), with CRLF line terminators
    editor.main.nls.it.js
    18e88f58301ad5ae926204507ab99c6b
    Unicode text, UTF-8 text, with very long lines (17192), with CRLF line terminators
    editor.main.nls.ja.js
    3bf851cc70f515cbbe1d39da93e4f041
    Unicode text, UTF-8 text, with very long lines (7783), with CRLF line terminators
    editor.main.nls.js
    e871d4d9539c26d7d2bf32801ebdecf0
    Unicode text, UTF-8 text, with very long lines (13654), with CRLF line terminators
    editor.main.nls.ko.js
    60fcd422ac97a1b645ff48cb6928f7af
    Unicode text, UTF-8 text, with very long lines (8116), with CRLF line terminators
    editor.main.nls.ru.js
    6e7d5b984917b00f131c47473ce2b866
    Unicode text, UTF-8 text, with very long lines (16153), with CRLF line terminators
    editor.main.nls.zh-cn.js
    05e49314cf801f5d3992b55243690ea7
    Unicode text, UTF-8 text, with very long lines (5836), with CRLF line terminators
    editor.main.nls.zh-tw.js
    becbf441d95b0bc1565faf47ce9de373
    Unicode text, UTF-8 text, with very long lines (5745), with CRLF line terminators
    loader.js
    bc15bb48d4d5c60ce7f16819f4d988c4
    JavaScript source, ASCII text, with very long lines (1023), with CRLF line terminators
    libcrypto-3-x64.dll
    e3e4236c4483dbe1bc5954fd63c965b8
    PE32+ executable (DLL) (GUI) x86-64, for MS Windows, 6 sections
    libssl-3-x64.dll
    4e2a30eba5388b0fe1838137a61ac255
    PE32+ executable (DLL) (GUI) x86-64, for MS Windows, 6 sections
    Microsoft.Web.WebView2.Core.dll
    b037ca44fd19b8eedb6d5b9de3e48469
    PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows, 3 sections
    Microsoft.Web.WebView2.WinForms.dll
    8153423918c8cbf54b44acec01f1d6c2
    PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows, 3 sections
    Microsoft.Web.WebView2.Wpf.dll
    4a292c5c2abf1aab91dee8eecafe0ab6
    PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows, 3 sections
    WebView2Loader.dll
    8f2648cd543236ef1b4856715731e069
    PE32+ executable (DLL) (console) Aarch64, for MS Windows, 7 sections
    WebView2Loader.dll
    c5f0c46e91f354c58ecec864614157d7
    PE32+ executable (DLL) (console) x86-64, for MS Windows, 10 sections
    WebView2Loader.dll
    9d7744e15bb8e3d005079b18979c8544
    PE32 executable (DLL) (console) Intel 80386, for MS Windows, 6 sections
    Dex.lua
    e37374a8aa47cf8ac6d56901436e199f
    JavaScript source, ASCII text, with very long lines (467), with CRLF line terminators
    Infinite Yield.lua
    b7fd97a54c618754ceab75e8a5c2de10
    JavaScript source, Unicode text, UTF-8 text, with CRLF line terminators
    Sine Wave.lua
    0bbb2aebfadc119226992045dcaa30b4
    JavaScript source, ASCII text, with CRLF line terminators
    Spinning Donut.lua
    967403f0ecb43917e841a085851b732d
    JavaScript source, ASCII text, with CRLF line terminators
    UNCCheckEnv.lua
    b76726d10354343d9af5c268e40b47c4
    JavaScript source, Unicode text, UTF-8 text, with CRLF line terminators
    Xeno.dll
    dd4e31ef1fe1a2a31fbf8f58439cf092
    PE32+ executable (DLL) (console) x86-64, for MS Windows, 6 sections
    Xeno.exe
    02e28cf07a1ee59734afeb354d1086ab
    PE32+ executable (GUI) x86-64, for MS Windows, 6 sections
    XenoUI.deps.json
    1d9878fc41040177b8d42d7e2d16b139
    JSON text data
    XenoUI.dll
    561811077e02f3f89cf6746859d13628
    PE32+ executable (GUI) x86-64 Mono/.Net assembly, for MS Windows, 2 sections
    XenoUI.runtimeconfig.json
    07b9a30265ca4e69c7016a1b6e3ffc27
    JSON text data
    xxhash.dll
    0e9fecea29b2b3d5ef064e112436e9d1
    PE32+ executable (DLL) (GUI) x86-64, for MS Windows, 6 sections
    zstd.dll
    567198a0119e3e2ec94208f1cda7aa28
    PE32+ executable (DLL) (GUI) x86-64, for MS Windows, 6 sections

    Detections

    AnalyzerVerdictAlert
    YARAhub by abuse.chmalware
    files - file ~tmp01925d3f.exe
    YARAhub by abuse.chmalware
    pe_detect_tls_callbacks
    YARAhub by abuse.chmalware
    files - file ~tmp01925d3f.exe
    YARAhub by abuse.chmalware
    pe_detect_tls_callbacks
    YARAhub by abuse.chmalware
    files - file ~tmp01925d3f.exe
    YARAhub by abuse.chmalware
    pe_detect_tls_callbacks
    YARAhub by abuse.chmalware
    pe_detect_tls_callbacks
    YARAhub by abuse.chmalware
    pe_detect_tls_callbacks
    YARAhub by abuse.chmalware
    Detect pe file that no import table

JavaScript (0)

HTTP Transactions (1)

URLIPResponseSize
rizve.us.to/Xeno/Xeno-v1.0.8-x64.zip
34.132.146.171200 OK4.3 MB