Report Overview
Visitedpublic
2025-05-15 17:43:01
Tags
Submit Tags
URL
raw.githubusercontent.com/Rizve07/xeno-versions/refs/heads/main/Xeno-v1.1.95%20(1).zip
Finishing URL
about:privatebrowsing
IP / ASN

185.199.111.133
Title
about:privatebrowsing
Detections
urlquery
0
Network Intrusion Detection
0
Threat Detection Systems
15
Host Summary
Host | Rank | Registered | First Seen | Last Seen | Sent | Received | IP | Fingerprints |
---|---|---|---|---|---|---|---|---|
raw.githubusercontent.com 1 alert(s) on this Domain | 35802 | 2014-02-06 | 2014-03-01 | 2025-05-14 | 554 B | 5.4 MB | ![]() 185.199.110.133 |
Related reports
Network Intrusion Detection Systems
Suricata /w Emerging Threats Pro
No alerts detected
Threat Detection Systems
Public InfoSec YARA rules
No alerts detected
OpenPhish
No alerts detected
PhishTank
No alerts detected
Quad9 DNS
No alerts detected
ThreatFox
No alerts detected
File detected
URL
raw.githubusercontent.com/Rizve07/xeno-versions/refs/heads/main/Xeno-v1.1.95%20(1).zip
IP / ASN

185.199.110.133
File Overview
File TypeZip archive data, at least v1.0 to extract, compression method=store
Size5.4 MB (5400324 bytes)
MD580c1fa6c43472af00763f67a1476fd6c
SHA1b4c2ecb2ab9fcb2bc88206090ff33457bfb3f25b
Archive (47)
Filename | MD5 | File type |
---|---|---|
api-ms-win-crt-convert-l1-1-0.dll | c8dbf0ca88facfe87899168a7f7db52c | PE32+ executable (DLL) (console) x86-64, for MS Windows, 2 sections |
api-ms-win-crt-filesystem-l1-1-0.dll | 42a2a95f1bb940d01f55eb1674a81fe2 | PE32+ executable (DLL) (console) x86-64, for MS Windows, 2 sections |
api-ms-win-crt-heap-l1-1-0.dll | 98da186fd7d7873c164a51c5d7b77f1a | PE32+ executable (DLL) (console) x86-64, for MS Windows, 2 sections |
api-ms-win-crt-locale-l1-1-0.dll | ff48b107b2449a647c64baabd49408a1 | PE32+ executable (DLL) (console) x86-64, for MS Windows, 2 sections |
api-ms-win-crt-math-l1-1-0.dll | e10e077bb06209aedd0d0d378c758f73 | PE32+ executable (DLL) (console) x86-64, for MS Windows, 2 sections |
api-ms-win-crt-runtime-l1-1-0.dll | f91e1ff896b5616919ac97c7095c513e | PE32+ executable (DLL) (console) x86-64, for MS Windows, 2 sections |
api-ms-win-crt-stdio-l1-1-0.dll | 429c26ed27a026442f89c95ff16ce8c2 | PE32+ executable (DLL) (console) x86-64, for MS Windows, 2 sections |
api-ms-win-crt-string-l1-1-0.dll | 0f593e50be4715aa8e1f6eb39434edd5 | PE32+ executable (DLL) (console) x86-64, for MS Windows, 2 sections |
index.html | 001dcbb8f41cdcbf9b4d1e3a0ed4b2d2 | HTML document, Unicode text, UTF-8 text, with very long lines (61271), with CRLF line terminators |
workerMain.js | d0ac5294c58e523cddf25bc6d785fa48 | JavaScript source, ASCII text, with very long lines (1119), with CRLF line terminators |
lua.js | eebda1fdd970433750c115eae2f03865 | JavaScript source, ASCII text, with CRLF line terminators |
editor.main.css | 23c7db6e12f6454ef6e7fb98d17924d8 | ASCII text, with very long lines (65249), with CRLF line terminators |
editor.main.js | 2dc0068cdbc03ce43a75ab0b2df664e2 | JavaScript source, Unicode text, UTF-8 text, with very long lines (65245), with CRLF line terminators |
editor.main.nls.de.js | d1fd2fb756c73970b9c5e0ba07bff708 | Unicode text, UTF-8 text, with very long lines (16089), with CRLF line terminators |
editor.main.nls.es.js | 36f546b28ca17ece9f8eb9bcf8344e13 | Unicode text, UTF-8 text, with very long lines (16082), with CRLF line terminators |
editor.main.nls.fr.js | 1a29080733878dd44e0c118e84cd0c39 | Unicode text, UTF-8 text, with very long lines (16773), with CRLF line terminators |
editor.main.nls.it.js | 18e88f58301ad5ae926204507ab99c6b | Unicode text, UTF-8 text, with very long lines (17192), with CRLF line terminators |
editor.main.nls.ja.js | 3bf851cc70f515cbbe1d39da93e4f041 | Unicode text, UTF-8 text, with very long lines (7783), with CRLF line terminators |
editor.main.nls.js | e871d4d9539c26d7d2bf32801ebdecf0 | Unicode text, UTF-8 text, with very long lines (13654), with CRLF line terminators |
editor.main.nls.ko.js | 60fcd422ac97a1b645ff48cb6928f7af | Unicode text, UTF-8 text, with very long lines (8116), with CRLF line terminators |
editor.main.nls.ru.js | 6e7d5b984917b00f131c47473ce2b866 | Unicode text, UTF-8 text, with very long lines (16153), with CRLF line terminators |
editor.main.nls.zh-cn.js | 05e49314cf801f5d3992b55243690ea7 | Unicode text, UTF-8 text, with very long lines (5836), with CRLF line terminators |
editor.main.nls.zh-tw.js | becbf441d95b0bc1565faf47ce9de373 | Unicode text, UTF-8 text, with very long lines (5745), with CRLF line terminators |
loader.js | bc15bb48d4d5c60ce7f16819f4d988c4 | JavaScript source, ASCII text, with very long lines (1023), with CRLF line terminators |
libcrypto-3-x64.dll | 688dfc4c76490bc82858d623e5e136bf | PE32+ executable (DLL) (GUI) x86-64, for MS Windows, 8 sections |
libssl-3-x64.dll | 6839df3d3d6276093f69ffdcd474e54b | PE32+ executable (DLL) (GUI) x86-64, for MS Windows, 8 sections |
Microsoft.Web.WebView2.Core.dll | b037ca44fd19b8eedb6d5b9de3e48469 | PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows, 3 sections |
Microsoft.Web.WebView2.WinForms.dll | 8153423918c8cbf54b44acec01f1d6c2 | PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows, 3 sections |
Microsoft.Web.WebView2.Wpf.dll | 4a292c5c2abf1aab91dee8eecafe0ab6 | PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows, 3 sections |
msvcp140.dll | 7acbc57d268a691247b4a94fecfa42b4 | PE32+ executable (DLL) (console) x86-64, for MS Windows, 6 sections |
Newtonsoft.Json.dll | adf3e3eecde20b7c9661e9c47106a14a | PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows, 3 sections |
WebView2Loader.dll | 8f2648cd543236ef1b4856715731e069 | PE32+ executable (DLL) (console) Aarch64, for MS Windows, 7 sections |
WebView2Loader.dll | c5f0c46e91f354c58ecec864614157d7 | PE32+ executable (DLL) (console) x86-64, for MS Windows, 10 sections |
WebView2Loader.dll | 9d7744e15bb8e3d005079b18979c8544 | PE32 executable (DLL) (console) Intel 80386, for MS Windows, 6 sections |
Dex.lua | c4ffc39f489bbe800f3b38616573c2e9 | ASCII text, with no line terminators |
Infinite Yield.lua | e0246b17ddf86c45719e881d09987d64 | ASCII text, with no line terminators |
Sine Wave.lua | 0bbb2aebfadc119226992045dcaa30b4 | JavaScript source, ASCII text, with CRLF line terminators |
Spinning Donut.lua | 967403f0ecb43917e841a085851b732d | JavaScript source, ASCII text, with CRLF line terminators |
UNCCheckEnv.lua | b76726d10354343d9af5c268e40b47c4 | JavaScript source, Unicode text, UTF-8 text, with CRLF line terminators |
ucrtbase.dll | 849959a003fa63c5a42ae87929fcd18b | PE32+ executable (DLL) (console) x86-64, for MS Windows, 6 sections |
vcruntime140.dll | 943fc74c2e39fe803d828ccfa7e62409 | PE32+ executable (DLL) (console) x86-64, for MS Windows, 8 sections |
vcruntime140_1.dll | 05052be2c36166ff9646d7d00bb7413f | PE32+ executable (DLL) (console) x86-64, for MS Windows, 6 sections |
Xeno.dll | 79145db5c60100461e327626b8ff879b | PE32+ executable (DLL) (console) x86-64, for MS Windows, 6 sections |
Xeno.exe | c41f903645119ae792d59b00bd81e13e | PE32+ executable (GUI) x86-64, for MS Windows, 6 sections |
XenoUI.deps.json | b042def0a3e02b69a60ed9105406a28a | JSON text data |
XenoUI.dll | dbac5f93a59dc2dbf0d5bedd14cc9414 | PE32+ executable (GUI) x86-64 Mono/.Net assembly, for MS Windows, 2 sections |
XenoUI.runtimeconfig.json | e0f6f18f9b152bc2d8c710b0214805d6 | JSON text data |
Detections
Analyzer | Verdict | Alert |
---|---|---|
YARAhub by abuse.ch | malware | Detect pe file that no import table |
YARAhub by abuse.ch | malware | Detect pe file that no import table |
YARAhub by abuse.ch | malware | Detect pe file that no import table |
YARAhub by abuse.ch | malware | Detect pe file that no import table |
YARAhub by abuse.ch | malware | Detect pe file that no import table |
YARAhub by abuse.ch | malware | Detect pe file that no import table |
YARAhub by abuse.ch | malware | Detect pe file that no import table |
YARAhub by abuse.ch | malware | Detect pe file that no import table |
YARAhub by abuse.ch | malware | files - file ~tmp01925d3f.exe |
YARAhub by abuse.ch | malware | files - file ~tmp01925d3f.exe |
YARAhub by abuse.ch | malware | files - file ~tmp01925d3f.exe |
YARAhub by abuse.ch | malware | Detect pe file that no import table |
VirusTotal | suspicious |
JavaScript (0)
No Javascripts found
No JavaScripts
HTTP Transactions (1)
URL | IP | Response | Size | |||||||
---|---|---|---|---|---|---|---|---|---|---|
GET raw.githubusercontent.com/Rizve07/xeno-versions/refs/heads/main/Xeno-v1.1.95%20(1).zip | ![]() | 200 OK | 5.4 MB | |||||||
URL raw.githubusercontent.com/Rizve07/xeno-versions/refs/heads/main/Xeno-v1.1.95%20(1).zip IP / ASN ![]() 185.199.110.133 Requested byN/A Resource Info File typeZip archive data, at least v1.0 to extract, compression method=store First Seen2025-05-09 Last Seen2025-05-29 Times Seen30 Size5.4 MB (5400324 bytes) MD580c1fa6c43472af00763f67a1476fd6c SHA1b4c2ecb2ab9fcb2bc88206090ff33457bfb3f25b SHA25614ef0e1602c97030ac84d3ec70da1c6f41c2cc6300d1becd7b5b19fa4c5cc20c Certificate Info IssuerSectigo Limited Subject*.github.io Fingerprint8C:FF:59:E5:8E:C4:FA:76:FE:AF:2D:C5:C0:D4:13:6A:77:2D:F9:91 ValidityFri, 07 Mar 2025 00:00:00 GMT - Sat, 07 Mar 2026 23:59:59 GMT Detections
HTTP Headers
| ||||||||||