Report Overview
Visitedpublic
2025-05-04 04:55:16
Tags
Submit Tags
URL
cdnwrd2.com/r/2/1743728892442/Xeno-v1.1.7.zip
Finishing URL
about:privatebrowsing
IP / ASN

104.21.75.26
Title
about:privatebrowsing
Detections
urlquery
0
Network Intrusion Detection
0
Threat Detection Systems
16
Host Summary
Host | Rank | Registered | First Seen | Last Seen | Sent | Received | IP | Fingerprints |
---|---|---|---|---|---|---|---|---|
cdnwrd2.com 1 alert(s) on this Domain | unknown | 2020-04-30 | 2020-05-03 | 2025-04-25 | 513 B | 5.4 MB | ![]() 172.67.166.253 |
Related reports
Network Intrusion Detection Systems
Suricata /w Emerging Threats Pro
No alerts detected
Threat Detection Systems
Public InfoSec YARA rules
No alerts detected
OpenPhish
No alerts detected
PhishTank
No alerts detected
Quad9 DNS
No alerts detected
ThreatFox
No alerts detected
File detected
URL
cdnwrd2.com/r/2/1743728892442/Xeno-v1.1.7.zip
IP / ASN

172.67.166.253
File Overview
File TypeZip archive data, at least v1.0 to extract, compression method=store
Size5.4 MB (5393577 bytes)
MD5cfb2735bb2a8cdfeeb1fdf022e2a1951
SHA13db0b33255067dc12379a9e06a01290b85de6b87
Archive (47)
Filename | MD5 | File type |
---|---|---|
api-ms-win-crt-convert-l1-1-0.dll | c8dbf0ca88facfe87899168a7f7db52c | PE32+ executable (DLL) (console) x86-64, for MS Windows, 2 sections |
api-ms-win-crt-filesystem-l1-1-0.dll | 42a2a95f1bb940d01f55eb1674a81fe2 | PE32+ executable (DLL) (console) x86-64, for MS Windows, 2 sections |
api-ms-win-crt-heap-l1-1-0.dll | 98da186fd7d7873c164a51c5d7b77f1a | PE32+ executable (DLL) (console) x86-64, for MS Windows, 2 sections |
api-ms-win-crt-locale-l1-1-0.dll | ff48b107b2449a647c64baabd49408a1 | PE32+ executable (DLL) (console) x86-64, for MS Windows, 2 sections |
api-ms-win-crt-math-l1-1-0.dll | e10e077bb06209aedd0d0d378c758f73 | PE32+ executable (DLL) (console) x86-64, for MS Windows, 2 sections |
api-ms-win-crt-runtime-l1-1-0.dll | f91e1ff896b5616919ac97c7095c513e | PE32+ executable (DLL) (console) x86-64, for MS Windows, 2 sections |
api-ms-win-crt-stdio-l1-1-0.dll | 429c26ed27a026442f89c95ff16ce8c2 | PE32+ executable (DLL) (console) x86-64, for MS Windows, 2 sections |
api-ms-win-crt-string-l1-1-0.dll | 0f593e50be4715aa8e1f6eb39434edd5 | PE32+ executable (DLL) (console) x86-64, for MS Windows, 2 sections |
index.html | 001dcbb8f41cdcbf9b4d1e3a0ed4b2d2 | HTML document, Unicode text, UTF-8 text, with very long lines (61271), with CRLF line terminators |
workerMain.js | d0ac5294c58e523cddf25bc6d785fa48 | JavaScript source, ASCII text, with very long lines (1119), with CRLF line terminators |
lua.js | eebda1fdd970433750c115eae2f03865 | JavaScript source, ASCII text, with CRLF line terminators |
editor.main.css | 23c7db6e12f6454ef6e7fb98d17924d8 | ASCII text, with very long lines (65249), with CRLF line terminators |
editor.main.js | 2dc0068cdbc03ce43a75ab0b2df664e2 | JavaScript source, Unicode text, UTF-8 text, with very long lines (65245), with CRLF line terminators |
editor.main.nls.de.js | d1fd2fb756c73970b9c5e0ba07bff708 | Unicode text, UTF-8 text, with very long lines (16089), with CRLF line terminators |
editor.main.nls.es.js | 36f546b28ca17ece9f8eb9bcf8344e13 | Unicode text, UTF-8 text, with very long lines (16082), with CRLF line terminators |
editor.main.nls.fr.js | 1a29080733878dd44e0c118e84cd0c39 | Unicode text, UTF-8 text, with very long lines (16773), with CRLF line terminators |
editor.main.nls.it.js | 18e88f58301ad5ae926204507ab99c6b | Unicode text, UTF-8 text, with very long lines (17192), with CRLF line terminators |
editor.main.nls.ja.js | 3bf851cc70f515cbbe1d39da93e4f041 | Unicode text, UTF-8 text, with very long lines (7783), with CRLF line terminators |
editor.main.nls.js | e871d4d9539c26d7d2bf32801ebdecf0 | Unicode text, UTF-8 text, with very long lines (13654), with CRLF line terminators |
editor.main.nls.ko.js | 60fcd422ac97a1b645ff48cb6928f7af | Unicode text, UTF-8 text, with very long lines (8116), with CRLF line terminators |
editor.main.nls.ru.js | 6e7d5b984917b00f131c47473ce2b866 | Unicode text, UTF-8 text, with very long lines (16153), with CRLF line terminators |
editor.main.nls.zh-cn.js | 05e49314cf801f5d3992b55243690ea7 | Unicode text, UTF-8 text, with very long lines (5836), with CRLF line terminators |
editor.main.nls.zh-tw.js | becbf441d95b0bc1565faf47ce9de373 | Unicode text, UTF-8 text, with very long lines (5745), with CRLF line terminators |
loader.js | bc15bb48d4d5c60ce7f16819f4d988c4 | JavaScript source, ASCII text, with very long lines (1023), with CRLF line terminators |
libcrypto-3-x64.dll | 688dfc4c76490bc82858d623e5e136bf | PE32+ executable (DLL) (GUI) x86-64, for MS Windows, 8 sections |
libssl-3-x64.dll | 6839df3d3d6276093f69ffdcd474e54b | PE32+ executable (DLL) (GUI) x86-64, for MS Windows, 8 sections |
Microsoft.Web.WebView2.Core.dll | b037ca44fd19b8eedb6d5b9de3e48469 | PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows, 3 sections |
Microsoft.Web.WebView2.WinForms.dll | 8153423918c8cbf54b44acec01f1d6c2 | PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows, 3 sections |
Microsoft.Web.WebView2.Wpf.dll | 4a292c5c2abf1aab91dee8eecafe0ab6 | PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows, 3 sections |
msvcp140.dll | 7acbc57d268a691247b4a94fecfa42b4 | PE32+ executable (DLL) (console) x86-64, for MS Windows, 6 sections |
Newtonsoft.Json.dll | adf3e3eecde20b7c9661e9c47106a14a | PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows, 3 sections |
WebView2Loader.dll | 8f2648cd543236ef1b4856715731e069 | PE32+ executable (DLL) (console) Aarch64, for MS Windows, 7 sections |
WebView2Loader.dll | c5f0c46e91f354c58ecec864614157d7 | PE32+ executable (DLL) (console) x86-64, for MS Windows, 10 sections |
WebView2Loader.dll | 9d7744e15bb8e3d005079b18979c8544 | PE32 executable (DLL) (console) Intel 80386, for MS Windows, 6 sections |
Dex.lua | c4ffc39f489bbe800f3b38616573c2e9 | ASCII text, with no line terminators |
Infinite Yield.lua | e0246b17ddf86c45719e881d09987d64 | ASCII text, with no line terminators |
Sine Wave.lua | 0bbb2aebfadc119226992045dcaa30b4 | JavaScript source, ASCII text, with CRLF line terminators |
Spinning Donut.lua | 967403f0ecb43917e841a085851b732d | JavaScript source, ASCII text, with CRLF line terminators |
UNCCheckEnv.lua | b76726d10354343d9af5c268e40b47c4 | JavaScript source, Unicode text, UTF-8 text, with CRLF line terminators |
ucrtbase.dll | 849959a003fa63c5a42ae87929fcd18b | PE32+ executable (DLL) (console) x86-64, for MS Windows, 6 sections |
vcruntime140.dll | 943fc74c2e39fe803d828ccfa7e62409 | PE32+ executable (DLL) (console) x86-64, for MS Windows, 8 sections |
vcruntime140_1.dll | 05052be2c36166ff9646d7d00bb7413f | PE32+ executable (DLL) (console) x86-64, for MS Windows, 6 sections |
Xeno.dll | 6586a0fe712e1b8701c0a00ddb46adc6 | PE32+ executable (DLL) (console) x86-64, for MS Windows, 6 sections |
Xeno.exe | 70797e0760472325728ba786ca208976 | PE32+ executable (GUI) x86-64, for MS Windows, 6 sections |
XenoUI.deps.json | f264dff8b12b6341b6bb97f9cea46324 | JSON text data |
XenoUI.dll | 19d1939d71e36880415e7a2978c6ea31 | PE32+ executable (GUI) x86-64 Mono/.Net assembly, for MS Windows, 2 sections |
XenoUI.runtimeconfig.json | e0f6f18f9b152bc2d8c710b0214805d6 | JSON text data |
Detections
Analyzer | Verdict | Alert |
---|---|---|
YARAhub by abuse.ch | malware | Detect pe file that no import table |
YARAhub by abuse.ch | malware | Detect pe file that no import table |
YARAhub by abuse.ch | malware | Detect pe file that no import table |
YARAhub by abuse.ch | malware | Detect pe file that no import table |
YARAhub by abuse.ch | malware | Detect pe file that no import table |
YARAhub by abuse.ch | malware | Detect pe file that no import table |
YARAhub by abuse.ch | malware | Detect pe file that no import table |
YARAhub by abuse.ch | malware | Detect pe file that no import table |
YARAhub by abuse.ch | malware | files - file ~tmp01925d3f.exe |
YARAhub by abuse.ch | malware | files - file ~tmp01925d3f.exe |
YARAhub by abuse.ch | malware | files - file ~tmp01925d3f.exe |
YARAhub by abuse.ch | malware | Detect pe file that no import table |
VirusTotal | suspicious |
JavaScript (0)
No Javascripts found
No JavaScripts
HTTP Transactions (1)
URL | IP | Response | Size | |||||||
---|---|---|---|---|---|---|---|---|---|---|
GET cdnwrd2.com/r/2/1743728892442/Xeno-v1.1.7.zip | ![]() | 200 OK | 5.4 MB | |||||||
URL User Request GET HTTPS cdnwrd2.com/r/2/1743728892442/Xeno-v1.1.7.zip IP / ASN ![]() 172.67.166.253 Requested byN/A Resource Information File typeZip archive data, at least v1.0 to extract, compression method=store First Seen2025-04-03 Last Seen2025-05-04 Times Seen42 Size5.4 MB (5393577 bytes) MD5cfb2735bb2a8cdfeeb1fdf022e2a1951 SHA13db0b33255067dc12379a9e06a01290b85de6b87 SHA256ca118853988990003564b6519c3761c279ea842c9c1891045aa78748f366d6a4 Certificate Information IssuerGoogle Trust Services Subjectcdnwrd2.com FingerprintAA:40:51:A0:7D:96:D5:DA:D9:3B:3A:C9:58:A8:29:50:62:04:95:BA ValiditySat, 05 Apr 2025 03:05:21 GMT - Fri, 04 Jul 2025 04:02:28 GMT Detections
HTTP Headers
| ||||||||||