Report Overview
Visitedpublic
2025-01-20 14:45:13
Tags
Submit Tags
URL
xeno-executor.org/Xeno-v1.1.3-x64.zip
Finishing URL
about:privatebrowsing
IP / ASN

172.67.200.90
Title
about:privatebrowsing
Detections
urlquery
0
Network Intrusion Detection
0
Threat Detection Systems
0
Host Summary
Host | Rank | Registered | First Seen | Last Seen | Sent | Received | IP | Fingerprints |
---|---|---|---|---|---|---|---|---|
xeno-executor.org 1 alert(s) on this Domain | unknown | 2025-01-16 | 2025-01-20 | 2025-01-20 | 491 B | 5.0 MB | ![]() 104.21.21.211 |
Related reports
Network Intrusion Detection Systems
Suricata /w Emerging Threats Pro
No alerts detected
Threat Detection Systems
Public InfoSec YARA rules
No alerts detected
OpenPhish
No alerts detected
PhishTank
No alerts detected
Quad9 DNS
No alerts detected
ThreatFox
No alerts detected
File detected
URL
xeno-executor.org/Xeno-v1.1.3-x64.zip
IP / ASN

104.21.21.211
File Overview
File TypeZip archive data, at least v1.0 to extract, compression method=store
Size5.0 MB (5001066 bytes)
MD5520cabdf6c80e269166844c43015a77b
SHA1cf0f24a0d2f1c5ccbc3f7076363976809d72cf51
Archive (51)
Filename | MD5 | File type |
---|---|---|
api-ms-win-crt-convert-l1-1-0.dll | c8dbf0ca88facfe87899168a7f7db52c | PE32+ executable (DLL) (console) x86-64, for MS Windows, 2 sections |
api-ms-win-crt-filesystem-l1-1-0.dll | 42a2a95f1bb940d01f55eb1674a81fe2 | PE32+ executable (DLL) (console) x86-64, for MS Windows, 2 sections |
api-ms-win-crt-heap-l1-1-0.dll | 98da186fd7d7873c164a51c5d7b77f1a | PE32+ executable (DLL) (console) x86-64, for MS Windows, 2 sections |
api-ms-win-crt-locale-l1-1-0.dll | ff48b107b2449a647c64baabd49408a1 | PE32+ executable (DLL) (console) x86-64, for MS Windows, 2 sections |
api-ms-win-crt-math-l1-1-0.dll | e10e077bb06209aedd0d0d378c758f73 | PE32+ executable (DLL) (console) x86-64, for MS Windows, 2 sections |
api-ms-win-crt-runtime-l1-1-0.dll | f91e1ff896b5616919ac97c7095c513e | PE32+ executable (DLL) (console) x86-64, for MS Windows, 2 sections |
api-ms-win-crt-stdio-l1-1-0.dll | 429c26ed27a026442f89c95ff16ce8c2 | PE32+ executable (DLL) (console) x86-64, for MS Windows, 2 sections |
api-ms-win-crt-string-l1-1-0.dll | 0f593e50be4715aa8e1f6eb39434edd5 | PE32+ executable (DLL) (console) x86-64, for MS Windows, 2 sections |
test.txt | 649d2f9bbd50814244547e4e140a95e0 | ASCII text, with no line terminators |
index.html | 001dcbb8f41cdcbf9b4d1e3a0ed4b2d2 | HTML document, Unicode text, UTF-8 text, with very long lines (61271), with CRLF line terminators |
workerMain.js | d0ac5294c58e523cddf25bc6d785fa48 | JavaScript source, ASCII text, with very long lines (1119), with CRLF line terminators |
lua.js | eebda1fdd970433750c115eae2f03865 | JavaScript source, ASCII text, with CRLF line terminators |
editor.main.css | 23c7db6e12f6454ef6e7fb98d17924d8 | ASCII text, with very long lines (65249), with CRLF line terminators |
editor.main.js | 2dc0068cdbc03ce43a75ab0b2df664e2 | JavaScript source, Unicode text, UTF-8 text, with very long lines (65245), with CRLF line terminators |
editor.main.nls.de.js | d1fd2fb756c73970b9c5e0ba07bff708 | Unicode text, UTF-8 text, with very long lines (16089), with CRLF line terminators |
editor.main.nls.es.js | 36f546b28ca17ece9f8eb9bcf8344e13 | Unicode text, UTF-8 text, with very long lines (16082), with CRLF line terminators |
editor.main.nls.fr.js | 1a29080733878dd44e0c118e84cd0c39 | Unicode text, UTF-8 text, with very long lines (16773), with CRLF line terminators |
editor.main.nls.it.js | 18e88f58301ad5ae926204507ab99c6b | Unicode text, UTF-8 text, with very long lines (17192), with CRLF line terminators |
editor.main.nls.ja.js | 3bf851cc70f515cbbe1d39da93e4f041 | Unicode text, UTF-8 text, with very long lines (7783), with CRLF line terminators |
editor.main.nls.js | e871d4d9539c26d7d2bf32801ebdecf0 | Unicode text, UTF-8 text, with very long lines (13654), with CRLF line terminators |
editor.main.nls.ko.js | 60fcd422ac97a1b645ff48cb6928f7af | Unicode text, UTF-8 text, with very long lines (8116), with CRLF line terminators |
editor.main.nls.ru.js | 6e7d5b984917b00f131c47473ce2b866 | Unicode text, UTF-8 text, with very long lines (16153), with CRLF line terminators |
editor.main.nls.zh-cn.js | 05e49314cf801f5d3992b55243690ea7 | Unicode text, UTF-8 text, with very long lines (5836), with CRLF line terminators |
editor.main.nls.zh-tw.js | becbf441d95b0bc1565faf47ce9de373 | Unicode text, UTF-8 text, with very long lines (5745), with CRLF line terminators |
loader.js | bc15bb48d4d5c60ce7f16819f4d988c4 | JavaScript source, ASCII text, with very long lines (1023), with CRLF line terminators |
libcrypto-3-x64.dll | 54ca3e6afcb3c57c7914c0856d779f2a | PE32+ executable (DLL) (GUI) x86-64, for MS Windows, 8 sections |
libssl-3-x64.dll | d66acb55a9f095a24865c9d883f96fd1 | PE32+ executable (DLL) (GUI) x86-64, for MS Windows, 8 sections |
Microsoft.Web.WebView2.Core.dll | b037ca44fd19b8eedb6d5b9de3e48469 | PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows, 3 sections |
Microsoft.Web.WebView2.WinForms.dll | 8153423918c8cbf54b44acec01f1d6c2 | PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows, 3 sections |
Microsoft.Web.WebView2.Wpf.dll | 4a292c5c2abf1aab91dee8eecafe0ab6 | PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows, 3 sections |
msvcp140.dll | 4d157073a891d0832b9b05fb8aca73a8 | PE32 executable (DLL) (console) Intel 80386, for MS Windows, 5 sections |
Newtonsoft.Json.dll | adf3e3eecde20b7c9661e9c47106a14a | PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows, 3 sections |
WebView2Loader.dll | 8f2648cd543236ef1b4856715731e069 | PE32+ executable (DLL) (console) Aarch64, for MS Windows, 7 sections |
WebView2Loader.dll | c5f0c46e91f354c58ecec864614157d7 | PE32+ executable (DLL) (console) x86-64, for MS Windows, 10 sections |
WebView2Loader.dll | 9d7744e15bb8e3d005079b18979c8544 | PE32 executable (DLL) (console) Intel 80386, for MS Windows, 6 sections |
Dex.lua | e37374a8aa47cf8ac6d56901436e199f | JavaScript source, ASCII text, with very long lines (467), with CRLF line terminators |
Infinite Yield.lua | a8c69257b0db73b3e531d62cd872bc8b | JavaScript source, Unicode text, UTF-8 text, with CRLF line terminators |
Sine Wave.lua | 0bbb2aebfadc119226992045dcaa30b4 | JavaScript source, ASCII text, with CRLF line terminators |
Spinning Donut.lua | 967403f0ecb43917e841a085851b732d | JavaScript source, ASCII text, with CRLF line terminators |
UNCCheckEnv.lua | b76726d10354343d9af5c268e40b47c4 | JavaScript source, Unicode text, UTF-8 text, with CRLF line terminators |
vcruntime140.dll | 943fc74c2e39fe803d828ccfa7e62409 | PE32+ executable (DLL) (console) x86-64, for MS Windows, 8 sections |
vcruntime140_1.dll | 05052be2c36166ff9646d7d00bb7413f | PE32+ executable (DLL) (console) x86-64, for MS Windows, 6 sections |
deps_version.dat | 7ef3ab2f25955388d147b6797d04387c | ASCII text |
rbx_api.dat | c31c192974d091badb971fde16825795 | JSON text data |
rbx_rmd.dat | b4839a4dd884609ab4a0100bc1bb74d6 | ASCII text, with CRLF line terminators |
IY_FE.iy | 291d5636a434c4f1ceb0f3f776c2a51f | JSON text data |
Xeno.dll | 66e8a6978c77e6b2f390f33d25bf7f01 | PE32+ executable (DLL) (console) x86-64, for MS Windows, 6 sections |
Xeno.exe | f0d6a8ef8299c5f15732a011d90b0be1 | PE32+ executable (GUI) x86-64, for MS Windows, 6 sections |
XenoUI.deps.json | f264dff8b12b6341b6bb97f9cea46324 | JSON text data |
XenoUI.dll | 8a0f97c09c4a713e0b2679e90ced44d4 | PE32+ executable (GUI) x86-64 Mono/.Net assembly, for MS Windows, 2 sections |
XenoUI.runtimeconfig.json | e0f6f18f9b152bc2d8c710b0214805d6 | JSON text data |
Detections
Analyzer | Verdict | Alert |
---|---|---|
YARAhub by abuse.ch | malware | Detect pe file that no import table |
YARAhub by abuse.ch | malware | Detect pe file that no import table |
YARAhub by abuse.ch | malware | Detect pe file that no import table |
YARAhub by abuse.ch | malware | Detect pe file that no import table |
YARAhub by abuse.ch | malware | Detect pe file that no import table |
YARAhub by abuse.ch | malware | Detect pe file that no import table |
YARAhub by abuse.ch | malware | Detect pe file that no import table |
YARAhub by abuse.ch | malware | Detect pe file that no import table |
YARAhub by abuse.ch | malware | files - file ~tmp01925d3f.exe |
YARAhub by abuse.ch | malware | files - file ~tmp01925d3f.exe |
YARAhub by abuse.ch | malware | files - file ~tmp01925d3f.exe |
YARAhub by abuse.ch | malware | Detect pe file that no import table |
VirusTotal | suspicious |
JavaScript (0)
No JavaScripts
HTTP Transactions (1)
URL | IP | Response | Size |
---|