File name:

Xeno-v1.2.40_Xeno-Executor.com.zip

Full analysis: https://app.any.run/tasks/a047baea-12f1-4fb5-93f2-fffc825687d5
Verdict: Malicious activity
Analysis date: July 28, 2025, 18:37:15
OS: Windows 10 Professional (build: 19044, 64 bit)
Tags:
auto
generic
arch-exec
arch-scr
Indicators:
MIME: application/zip
File info: Zip archive data, at least v1.0 to extract, compression method=store
MD5:

2F1D6B389BF04B49C0F7FD4273A827AC

SHA1:

4B82622B3D805643DFFFFADCEE648EB6BEAB82CF

SHA256:

92840F89185B62BA4ED58877BBC2AEBA50601DFA011AF56B3F3D5BCA856D2EE0

SSDEEP:

98304:Ge3QYFliTnX4eK0lJBSJc0uULODXKetT283FMZwyivrzga4RqNQccmTgaJons1yW:8QYSRei58oql

ANY.RUN is an interactive service which provides full access to the guest system. Information in this report could be distorted by user actions and is provided for user acknowledgement as it is. ANY.RUN does not guarantee maliciousness or safety of the content.
  • MALICIOUS

    No malicious indicators.
  • SUSPICIOUS

    • Reads security settings of Internet Explorer

      • WinRAR.exe (PID: 6868)
    • Process drops legitimate windows executable

      • WinRAR.exe (PID: 6868)
  • INFO

    • The sample compiled with english language support

      • WinRAR.exe (PID: 6868)
    • Executable content was dropped or overwritten

      • WinRAR.exe (PID: 6868)
    • Reads the computer name

      • Xeno.exe (PID: 640)
    • Checks supported languages

      • Xeno.exe (PID: 640)
Find more information about signature artifacts and mapping to MITRE ATT&CK™ MATRIX at the full report
No Malware configuration.

TRiD

.zip | ZIP compressed archive (36.3)

EXIF

ZIP

ZipRequiredVersion: 10
ZipBitFlag: -
ZipCompression: None
ZipModifyDate: 2025:07:12 20:40:44
ZipCRC: 0x00000000
ZipCompressedSize: -
ZipUncompressedSize: -
ZipFileName: Xeno/
No data.
screenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshot
All screenshots are available in the full report
All screenshots are available in the full report
Total processes
135
Monitored processes
2
Malicious processes
1
Suspicious processes
0

Behavior graph

Click at the process to see the details
start winrar.exe xeno.exe

Process information

PID
CMD
Path
Indicators
Parent process
640"C:\Users\admin\AppData\Local\Temp\Rar$EXa6868.16610\Xeno\Xeno.exe" C:\Users\admin\AppData\Local\Temp\Rar$EXa6868.16610\Xeno\Xeno.exe
WinRAR.exe
User:
admin
Company:
XenoUI
Integrity Level:
MEDIUM
Description:
XenoUI
Exit code:
2147516547
Version:
1.2.40
Modules
Images
c:\users\admin\appdata\local\temp\rar$exa6868.16610\xeno\xeno.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\apphelp.dll
c:\windows\system32\user32.dll
c:\windows\system32\win32u.dll
c:\windows\system32\gdi32.dll
c:\windows\system32\gdi32full.dll
c:\windows\system32\msvcp_win.dll
6868"C:\Program Files\WinRAR\WinRAR.exe" C:\Users\admin\AppData\Local\Temp\Xeno-v1.2.40_Xeno-Executor.com.zipC:\Program Files\WinRAR\WinRAR.exe
explorer.exe
User:
admin
Company:
Alexander Roshal
Integrity Level:
MEDIUM
Description:
WinRAR archiver
Version:
5.91.0
Modules
Images
c:\program files\winrar\winrar.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\user32.dll
c:\windows\system32\win32u.dll
c:\windows\system32\gdi32.dll
c:\windows\system32\gdi32full.dll
c:\windows\system32\msvcp_win.dll
c:\windows\system32\ucrtbase.dll
Total events
2 107
Read events
2 099
Write events
8
Delete events
0

Modification events

(PID) Process:(6868) WinRAR.exeKey:HKEY_CURRENT_USER\SOFTWARE\WinRAR\ArcHistory
Operation:writeName:3
Value:
C:\Users\admin\Desktop\preferences.zip
(PID) Process:(6868) WinRAR.exeKey:HKEY_CURRENT_USER\SOFTWARE\WinRAR\ArcHistory
Operation:writeName:2
Value:
C:\Users\admin\Desktop\chromium_ext.zip
(PID) Process:(6868) WinRAR.exeKey:HKEY_CURRENT_USER\SOFTWARE\WinRAR\ArcHistory
Operation:writeName:1
Value:
C:\Users\admin\Desktop\omni_23_10_2024_.zip
(PID) Process:(6868) WinRAR.exeKey:HKEY_CURRENT_USER\SOFTWARE\WinRAR\ArcHistory
Operation:writeName:0
Value:
C:\Users\admin\AppData\Local\Temp\Xeno-v1.2.40_Xeno-Executor.com.zip
(PID) Process:(6868) WinRAR.exeKey:HKEY_CURRENT_USER\SOFTWARE\WinRAR\FileList\FileColumnWidths
Operation:writeName:name
Value:
120
(PID) Process:(6868) WinRAR.exeKey:HKEY_CURRENT_USER\SOFTWARE\WinRAR\FileList\FileColumnWidths
Operation:writeName:size
Value:
80
(PID) Process:(6868) WinRAR.exeKey:HKEY_CURRENT_USER\SOFTWARE\WinRAR\FileList\FileColumnWidths
Operation:writeName:type
Value:
120
(PID) Process:(6868) WinRAR.exeKey:HKEY_CURRENT_USER\SOFTWARE\WinRAR\FileList\FileColumnWidths
Operation:writeName:mtime
Value:
100
Executable files
19
Suspicious files
2
Text files
12
Unknown types
4

Dropped files

PID
Process
Filename
Type
6868WinRAR.exeC:\Users\admin\AppData\Local\Temp\Rar$EXa6868.16610\Xeno\editor\vs\base\worker\workerMain.jss
MD5:D0AC5294C58E523CDDF25BC6D785FA48
SHA256:E90D1A8F116FA74431117A3AD78DDE16DDE060A4BF7528DFE3D5A3AD6156504B
6868WinRAR.exeC:\Users\admin\AppData\Local\Temp\Rar$EXa6868.16610\Xeno\editor\index.htmlhtml
MD5:29BCAC034B9184CD9591FCE907FDE756
SHA256:ABA8980039A05486FBD66FABCC4BA7858916CC89E6B50186BE777FD5E4B62A50
6868WinRAR.exeC:\Users\admin\AppData\Local\Temp\Rar$EXa6868.16610\Xeno\editor\vs\editor\editor.main.csstext
MD5:23C7DB6E12F6454EF6E7FB98D17924D8
SHA256:615824C59ED1E07F5924286E9F02F3120B9064D59E115D3F668A914E07839451
6868WinRAR.exeC:\Users\admin\AppData\Local\Temp\Rar$EXa6868.16610\Xeno\editor\vs\editor\editor.main.nls.ko.jstext
MD5:60FCD422AC97A1B645FF48CB6928F7AF
SHA256:98E649FA40D8E2CCFDC212341FEB8165A7D7BBEC31E8A77D9819AD9474E4B8BA
6868WinRAR.exeC:\Users\admin\AppData\Local\Temp\Rar$EXa6868.16610\Xeno\editor\vs\editor\editor.main.jss
MD5:2DC0068CDBC03CE43A75AB0B2DF664E2
SHA256:B604B6148F70FE9DB882CCE2A7D327B2422AD2F203A805491002A8C564E3C3FF
6868WinRAR.exeC:\Users\admin\AppData\Local\Temp\Rar$EXa6868.16610\Xeno\editor\vs\editor\editor.main.nls.de.jstext
MD5:D1FD2FB756C73970B9C5E0BA07BFF708
SHA256:CB1C3416FF242A738C45C3B2590D7D222B159A95A69CE3B7B8D7C8D18EA70828
6868WinRAR.exeC:\Users\admin\AppData\Local\Temp\Rar$EXa6868.16610\Xeno\editor\vs\editor\editor.main.nls.es.jstext
MD5:36F546B28CA17ECE9F8EB9BCF8344E13
SHA256:327437EE3793E9AE0686C78196B459592C282ED2E86F95CE28D32693B76D7654
6868WinRAR.exeC:\Users\admin\AppData\Local\Temp\Rar$EXa6868.16610\Xeno\editor\vs\editor\editor.main.nls.it.jstext
MD5:18E88F58301AD5AE926204507AB99C6B
SHA256:4FE2C4420294758883E134BDF7DA9E6C2ABF631D3A89C765F32F6C1D0F62653C
6868WinRAR.exeC:\Users\admin\AppData\Local\Temp\Rar$EXa6868.16610\Xeno\concrt140.dllexecutable
MD5:5FE9A647921DED8A2FAD92DEB9EC4AB2
SHA256:2405355F0A58067B258F8DF33C327E3A3D716EAAC5A3A5AEBB757842D85BD376
6868WinRAR.exeC:\Users\admin\AppData\Local\Temp\Rar$EXa6868.16610\Xeno\editor\vs\editor\editor.main.nls.ja.jstext
MD5:3BF851CC70F515CBBE1D39DA93E4F041
SHA256:1F3556EA7233843B9E08B3C97B6727C533D702563E195C2090A438070DC85F0F
Download PCAP, analyze network streams, HTTP content and a lot more at the full report
HTTP(S) requests
3
TCP/UDP connections
17
DNS requests
9
Threats
0

HTTP requests

PID
Process
Method
HTTP Code
IP
URL
CN
Type
Size
Reputation
6756
svchost.exe
GET
200
184.30.131.245:80
http://ocsp.digicert.com/MFEwTzBNMEswSTAJBgUrDgMCGgUABBSAUQYBMq2awn1Rh6Doh%2FsBYgFV7gQUA95QNVbRTLtm8KPiGxvDl7I90VUCEAJ0LqoXyo4hxxe7H%2Fz9DKA%3D
unknown
whitelisted
1268
svchost.exe
GET
200
23.216.77.28:80
http://crl.microsoft.com/pki/crl/products/MicRooCerAut2011_2011_03_22.crl
unknown
whitelisted
1268
svchost.exe
GET
200
95.101.149.131:80
http://www.microsoft.com/pkiops/crl/MicSecSerCA2011_2011-10-18.crl
unknown
whitelisted
Download PCAP, analyze network streams, HTTP content and a lot more at the full report

Connections

PID
Process
IP
Domain
ASN
CN
Reputation
4
System
192.168.100.255:137
whitelisted
1268
svchost.exe
4.231.128.59:443
settings-win.data.microsoft.com
MICROSOFT-CORP-MSN-AS-BLOCK
IE
whitelisted
5944
MoUsoCoreWorker.exe
4.231.128.59:443
settings-win.data.microsoft.com
MICROSOFT-CORP-MSN-AS-BLOCK
IE
whitelisted
2992
RUXIMICS.exe
4.231.128.59:443
settings-win.data.microsoft.com
MICROSOFT-CORP-MSN-AS-BLOCK
IE
whitelisted
4
System
192.168.100.255:138
whitelisted
6756
svchost.exe
40.126.31.131:443
login.live.com
MICROSOFT-CORP-MSN-AS-BLOCK
IE
whitelisted
6756
svchost.exe
184.30.131.245:80
ocsp.digicert.com
AKAMAI-AS
US
whitelisted
1268
svchost.exe
51.104.136.2:443
settings-win.data.microsoft.com
MICROSOFT-CORP-MSN-AS-BLOCK
IE
whitelisted
1268
svchost.exe
23.216.77.28:80
crl.microsoft.com
Akamai International B.V.
DE
whitelisted
1268
svchost.exe
95.101.149.131:80
www.microsoft.com
Akamai International B.V.
NL
whitelisted

DNS requests

Domain
IP
Reputation
settings-win.data.microsoft.com
  • 4.231.128.59
  • 51.104.136.2
  • 20.73.194.208
whitelisted
google.com
  • 142.250.185.238
whitelisted
login.live.com
  • 40.126.31.131
  • 40.126.31.129
  • 20.190.159.128
  • 20.190.159.0
  • 20.190.159.131
  • 40.126.31.128
  • 40.126.31.2
  • 20.190.159.75
whitelisted
ocsp.digicert.com
  • 184.30.131.245
whitelisted
crl.microsoft.com
  • 23.216.77.28
  • 23.216.77.21
  • 23.216.77.34
  • 23.216.77.15
  • 23.216.77.31
  • 23.216.77.23
  • 23.216.77.16
  • 23.216.77.32
  • 23.216.77.22
whitelisted
www.microsoft.com
  • 95.101.149.131
whitelisted
client.wns.windows.com
  • 172.211.123.249
whitelisted

Threats

No threats detected
Process
Message
Xeno.exe
You must install .NET to run this application. App: C:\Users\admin\AppData\Local\Temp\Rar$EXa6868.16610\Xeno\Xeno.exe Architecture: x64 App host version: 8.0.18 .NET location: Not found Learn more: https://aka.ms/dotnet/app-launch-failed Download the .NET runtime: https://aka.ms/dotnet-core-applaunch?missing_runtime=true&arch=x64&rid=win-x64&os=win10&apphost_version=8.0.18