Xeno.rar

Allows an attacker to control a secondary, hidden desktop session without the user’s knowledge, though users have reported this feature can be slow or unstable on weaker hardware. Indicators of Compromise (IoC) & Identification

Uses methods like fodhelper.exe to escalate privileges.

If you are analyzing a specific file, look for the following: