IOC Report
Xeno.exe

loading gif

Files

File Path
Type
Category
Malicious
Xeno.exe
PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
initial sample
malicious
C:\ProgramData\Microsoft\Windows\WER\ReportQueue\AppCrash_Xeno.exe_765950b87e97d5d342af7e889eddc96b622feb_0aaebb4a_1d0fc2cc-6029-426a-b8fa-93dceb3eb239\Report.wer
Unicode text, UTF-16, little-endian text, with CRLF line terminators
dropped
malicious
C:\ProgramData\Microsoft\Windows\WER\Temp\WERD33A.tmp.dmp
Mini DuMP crash report, 15 streams, Wed Jan 15 15:16:06 2025, 0x1205a4 type
dropped
C:\ProgramData\Microsoft\Windows\WER\Temp\WERD3E7.tmp.WERInternalMetadata.xml
XML 1.0 document, Unicode text, UTF-16, little-endian text, with CRLF line terminators
dropped
C:\ProgramData\Microsoft\Windows\WER\Temp\WERD417.tmp.xml
XML 1.0 document, ASCII text, with CRLF line terminators
dropped
C:\Windows\appcompat\Programs\Amcache.hve
MS Windows registry file, NT/2000 or above
dropped

Processes

Path
Cmdline
Malicious
C:\Users\user\Desktop\Xeno.exe
"C:\Users\user\Desktop\Xeno.exe"
malicious
C:\Users\user\Desktop\Xeno.exe
"C:\Users\user\Desktop\Xeno.exe"
malicious
C:\Windows\SysWOW64\WerFault.exe
C:\Windows\SysWOW64\WerFault.exe -u -p 5544 -s 924

URLs

Name
IP
Malicious
jarry-deatile.bond
malicious
immolatechallen.bond
malicious
stripedre-lot.bond
malicious
jarry-fixxer.bond
malicious
sobrattyeu.bond
malicious
pain-temper.bond
malicious
crookedfoshe.bond
malicious
growthselec.bond
malicious
https://sobrattyeu.bond/api
104.21.96.1
malicious
strivehelpeu.bond
malicious
https://sobrattyeu.bond/api7
unknown
https://sobrattyeu.bond/
unknown
http://upx.sf.net
unknown
https://sobrattyeu.bond/TEQN7c
unknown
https://sobrattyeu.bond/C
unknown
There are 5 hidden URLs, click here to show them.

Domains

Name
IP
Malicious
sobrattyeu.bond
104.21.96.1
malicious

IPs

IP
Domain
Country
Malicious
104.21.96.1
sobrattyeu.bond
United States
malicious

Registry

Path
Value
Malicious
\REGISTRY\A\{17299adb-d96f-9cc5-08d3-08c8a6f434ec}\Root\InventoryApplicationFile\xeno.exe|1597b79d86ac4730
ProgramId
\REGISTRY\A\{17299adb-d96f-9cc5-08d3-08c8a6f434ec}\Root\InventoryApplicationFile\xeno.exe|1597b79d86ac4730
FileId
\REGISTRY\A\{17299adb-d96f-9cc5-08d3-08c8a6f434ec}\Root\InventoryApplicationFile\xeno.exe|1597b79d86ac4730
LowerCaseLongPath
\REGISTRY\A\{17299adb-d96f-9cc5-08d3-08c8a6f434ec}\Root\InventoryApplicationFile\xeno.exe|1597b79d86ac4730
LongPathHash
\REGISTRY\A\{17299adb-d96f-9cc5-08d3-08c8a6f434ec}\Root\InventoryApplicationFile\xeno.exe|1597b79d86ac4730
Name
\REGISTRY\A\{17299adb-d96f-9cc5-08d3-08c8a6f434ec}\Root\InventoryApplicationFile\xeno.exe|1597b79d86ac4730
OriginalFileName
\REGISTRY\A\{17299adb-d96f-9cc5-08d3-08c8a6f434ec}\Root\InventoryApplicationFile\xeno.exe|1597b79d86ac4730
Publisher
\REGISTRY\A\{17299adb-d96f-9cc5-08d3-08c8a6f434ec}\Root\InventoryApplicationFile\xeno.exe|1597b79d86ac4730
Version
\REGISTRY\A\{17299adb-d96f-9cc5-08d3-08c8a6f434ec}\Root\InventoryApplicationFile\xeno.exe|1597b79d86ac4730
BinFileVersion
\REGISTRY\A\{17299adb-d96f-9cc5-08d3-08c8a6f434ec}\Root\InventoryApplicationFile\xeno.exe|1597b79d86ac4730
BinaryType
\REGISTRY\A\{17299adb-d96f-9cc5-08d3-08c8a6f434ec}\Root\InventoryApplicationFile\xeno.exe|1597b79d86ac4730
ProductName
\REGISTRY\A\{17299adb-d96f-9cc5-08d3-08c8a6f434ec}\Root\InventoryApplicationFile\xeno.exe|1597b79d86ac4730
ProductVersion
\REGISTRY\A\{17299adb-d96f-9cc5-08d3-08c8a6f434ec}\Root\InventoryApplicationFile\xeno.exe|1597b79d86ac4730
LinkDate
\REGISTRY\A\{17299adb-d96f-9cc5-08d3-08c8a6f434ec}\Root\InventoryApplicationFile\xeno.exe|1597b79d86ac4730
BinProductVersion
\REGISTRY\A\{17299adb-d96f-9cc5-08d3-08c8a6f434ec}\Root\InventoryApplicationFile\xeno.exe|1597b79d86ac4730
AppxPackageFullName
\REGISTRY\A\{17299adb-d96f-9cc5-08d3-08c8a6f434ec}\Root\InventoryApplicationFile\xeno.exe|1597b79d86ac4730
AppxPackageRelativeId
\REGISTRY\A\{17299adb-d96f-9cc5-08d3-08c8a6f434ec}\Root\InventoryApplicationFile\xeno.exe|1597b79d86ac4730
Size
\REGISTRY\A\{17299adb-d96f-9cc5-08d3-08c8a6f434ec}\Root\InventoryApplicationFile\xeno.exe|1597b79d86ac4730
Language
\REGISTRY\A\{17299adb-d96f-9cc5-08d3-08c8a6f434ec}\Root\InventoryApplicationFile\xeno.exe|1597b79d86ac4730
Usn
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\IdentityCRL\ClockData
ClockTimeSeconds
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\IdentityCRL\ClockData
TickCount
There are 11 hidden registries, click here to show them.

Memdumps

Base Address
Regiontype
Protect
Malicious
3F99000
trusted library allocation
page read and write
malicious
B92000
unkown
page readonly
malicious
5620000
heap
page execute and read and write
D60000
heap
page read and write
3F91000
trusted library allocation
page read and write
2F7E000
stack
page read and write
3560000
trusted library allocation
page read and write
B7B000
stack
page read and write
1240000
trusted library allocation
page read and write
D22000
heap
page read and write
2E6E000
stack
page read and write
1185000
heap
page read and write
3270000
trusted library allocation
page readonly
11E0000
trusted library allocation
page read and write
53F6000
trusted library allocation
page read and write
452000
remote allocation
page execute and read and write
C92000
heap
page read and write
B90000
unkown
page readonly
345E000
stack
page read and write
3562000
trusted library allocation
page read and write
1220000
trusted library allocation
page read and write
D20000
heap
page read and write
1230000
trusted library allocation
page execute and read and write
CCA000
heap
page read and write
10E0000
heap
page read and write
1200000
trusted library allocation
page read and write
3565000
trusted library allocation
page read and write
311E000
stack
page read and write
125E000
heap
page read and write
321F000
stack
page read and write
3271000
trusted library allocation
page execute read
D99000
stack
page read and write
287D000
stack
page read and write
C8B000
heap
page read and write
53E4000
trusted library allocation
page read and write
16C6000
trusted library allocation
page read and write
3272000
trusted library allocation
page readonly
333C000
stack
page read and write
2F97000
trusted library allocation
page execute and read and write
CA0000
heap
page read and write
C9C000
stack
page read and write
3350000
heap
page read and write
127C000
heap
page read and write
D69000
heap
page read and write
29BD000
stack
page read and write
400000
remote allocation
page execute and read and write
326E000
stack
page read and write
2F99000
trusted library allocation
page read and write
1170000
trusted library allocation
page read and write
2E2D000
stack
page read and write
2F6F000
stack
page read and write
CBC000
heap
page read and write
D34000
heap
page read and write
35C9000
trusted library allocation
page read and write
C68000
heap
page read and write
11FA000
trusted library allocation
page execute and read and write
2F80000
heap
page execute and read and write
D16000
heap
page read and write
11E4000
trusted library allocation
page read and write
11D3000
trusted library allocation
page execute and read and write
C60000
heap
page read and write
3F95000
trusted library allocation
page read and write
1690000
heap
page read and write
C9E000
heap
page read and write
168D000
stack
page read and write
1180000
heap
page read and write
C30000
heap
page read and write
11CD000
stack
page read and write
32CE000
stack
page read and write
1640000
heap
page read and write
120B000
trusted library allocation
page execute and read and write
30AF000
stack
page read and write
508E000
stack
page read and write
35A9000
trusted library allocation
page read and write
C95000
heap
page read and write
1630000
trusted library allocation
page read and write
D2F000
heap
page read and write
A7B000
stack
page read and write
11D4000
trusted library allocation
page read and write
D06000
heap
page read and write
BB6000
unkown
page readonly
16D0000
heap
page read and write
3568000
trusted library allocation
page read and write
2F91000
trusted library allocation
page read and write
11F0000
trusted library allocation
page read and write
2FAE000
stack
page read and write
39FE000
stack
page read and write
3660000
heap
page read and write
2820000
heap
page read and write
BE0000
heap
page read and write
16C0000
trusted library allocation
page read and write
1277000
heap
page read and write
356D000
trusted library allocation
page read and write
C7C000
heap
page read and write
D65000
heap
page read and write
1120000
heap
page read and write
1207000
trusted library allocation
page execute and read and write
5410000
trusted library allocation
page read and write
CAA000
heap
page read and write
1000000
heap
page read and write
53F9000
trusted library allocation
page read and write
35FD000
trusted library allocation
page read and write
53D4000
trusted library allocation
page read and write
297E000
stack
page read and write
144F000
stack
page read and write
5405000
trusted library allocation
page read and write
1298000
heap
page read and write
154E000
stack
page read and write
158E000
stack
page read and write
1258000
heap
page read and write
D11000
heap
page read and write
29E0000
heap
page read and write
116E000
stack
page read and write
357E000
trusted library allocation
page read and write
356A000
trusted library allocation
page read and write
357A000
trusted library allocation
page read and write
1284000
heap
page read and write
1250000
heap
page read and write
37F8000
trusted library allocation
page read and write
355F000
stack
page read and write
There are 110 hidden memdumps, click here to show them.