IOC Report
Xworm V5.6.exe

loading gif

Files

File Path
Type
Category
Malicious
Xworm V5.6.exe
PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
initial sample
malicious
C:\ProgramData\Microsoft\Windows\WER\ReportQueue\AppCrash_Xworm V5.6.exe_cf9afbc01e41f39085d44e42fe55b10f1508dcd_6ddd3646_d5f1b510-4c45-4282-b213-0ab94f687708\Report.wer
Unicode text, UTF-16, little-endian text, with CRLF line terminators
dropped
malicious
C:\ProgramData\Microsoft\Windows\WER\Temp\WER5E5E.tmp.dmp
Mini DuMP crash report, 16 streams, Mon Jul 15 12:28:12 2024, 0x1205a4 type
dropped
C:\ProgramData\Microsoft\Windows\WER\Temp\WER5FD6.tmp.WERInternalMetadata.xml
XML 1.0 document, Unicode text, UTF-16, little-endian text, with CRLF line terminators
dropped
C:\ProgramData\Microsoft\Windows\WER\Temp\WER6025.tmp.xml
XML 1.0 document, ASCII text, with CRLF line terminators
dropped
C:\Windows\appcompat\Programs\Amcache.hve
MS Windows registry file, NT/2000 or above
dropped

Processes

Path
Cmdline
Malicious
C:\Users\user\Desktop\Xworm V5.6.exe
"C:\Users\user\Desktop\Xworm V5.6.exe"
malicious
C:\Windows\System32\WerFault.exe
C:\Windows\system32\WerFault.exe -u -p 7264 -s 1268

URLs

Name
IP
Malicious
http://www.apache.org/licenses/LICENSE-2.0
unknown
http://www.fontbureau.com
unknown
http://www.fontbureau.com/designersG
unknown
http://exmple.com
unknown
http://www.fontbureau.com/designers/?
unknown
http://www.founder.com.cn/cn/bThe
unknown
https://api.telegram.org/bot
unknown
http://www.fontbureau.com/designers?
unknown
http://www.tiro.com
unknown
http://upx.sf.net
unknown
http://www.fontbureau.com/designers
unknown
http://www.goodfont.co.kr
unknown
https://www.google.com/maps/place/)icons8-letter-16.png
unknown
http://www.carterandcone.coml
unknown
http://www.sajatypeworks.com
unknown
http://www.typography.netD
unknown
https://pastebin.com/raw/H3wFXmEi
unknown
http://www.fontbureau.com/designers/cabarga.htmlN
unknown
http://www.founder.com.cn/cn/cThe
unknown
http://www.galapagosdesign.com/staff/dennis.htm
unknown
http://www.founder.com.cn/cn
unknown
http://www.fontbureau.com/designers/frere-user.html
unknown
https://bin.equinox.io/c/bNyj1mQVY4c/ngrok-v3-stable-windows-386.zip
unknown
https://evilcoder.mysellix.io
unknown
http://www.jiyu-kobo.co.jp/
unknown
http://www.galapagosdesign.com/DPlease
unknown
http://www.fontbureau.com/designers8
unknown
http://www.fonts.com
unknown
http://www.sandoll.co.kr
unknown
http://www.urwpp.deDPlease
unknown
http://www.zhongyicts.com.cn
unknown
https://t.me/XCoderGroup
unknown
http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name
unknown
http://www.sakkal.com
unknown
http://ip-api.com/csv/?fields=status
unknown
http://ip-api.com/line/?fields=hosting
unknown
There are 26 hidden URLs, click here to show them.

Registry

Path
Value
Malicious
\REGISTRY\A\{f2d36046-6a91-cd80-536c-83f52c51a5db}\Root\InventoryApplicationFile\xworm v5.6.exe|2233456200d0bc66
ProgramId
\REGISTRY\A\{f2d36046-6a91-cd80-536c-83f52c51a5db}\Root\InventoryApplicationFile\xworm v5.6.exe|2233456200d0bc66
FileId
\REGISTRY\A\{f2d36046-6a91-cd80-536c-83f52c51a5db}\Root\InventoryApplicationFile\xworm v5.6.exe|2233456200d0bc66
LowerCaseLongPath
\REGISTRY\A\{f2d36046-6a91-cd80-536c-83f52c51a5db}\Root\InventoryApplicationFile\xworm v5.6.exe|2233456200d0bc66
LongPathHash
\REGISTRY\A\{f2d36046-6a91-cd80-536c-83f52c51a5db}\Root\InventoryApplicationFile\xworm v5.6.exe|2233456200d0bc66
Name
\REGISTRY\A\{f2d36046-6a91-cd80-536c-83f52c51a5db}\Root\InventoryApplicationFile\xworm v5.6.exe|2233456200d0bc66
OriginalFileName
\REGISTRY\A\{f2d36046-6a91-cd80-536c-83f52c51a5db}\Root\InventoryApplicationFile\xworm v5.6.exe|2233456200d0bc66
Publisher
\REGISTRY\A\{f2d36046-6a91-cd80-536c-83f52c51a5db}\Root\InventoryApplicationFile\xworm v5.6.exe|2233456200d0bc66
Version
\REGISTRY\A\{f2d36046-6a91-cd80-536c-83f52c51a5db}\Root\InventoryApplicationFile\xworm v5.6.exe|2233456200d0bc66
BinFileVersion
\REGISTRY\A\{f2d36046-6a91-cd80-536c-83f52c51a5db}\Root\InventoryApplicationFile\xworm v5.6.exe|2233456200d0bc66
BinaryType
\REGISTRY\A\{f2d36046-6a91-cd80-536c-83f52c51a5db}\Root\InventoryApplicationFile\xworm v5.6.exe|2233456200d0bc66
ProductName
\REGISTRY\A\{f2d36046-6a91-cd80-536c-83f52c51a5db}\Root\InventoryApplicationFile\xworm v5.6.exe|2233456200d0bc66
ProductVersion
\REGISTRY\A\{f2d36046-6a91-cd80-536c-83f52c51a5db}\Root\InventoryApplicationFile\xworm v5.6.exe|2233456200d0bc66
LinkDate
\REGISTRY\A\{f2d36046-6a91-cd80-536c-83f52c51a5db}\Root\InventoryApplicationFile\xworm v5.6.exe|2233456200d0bc66
BinProductVersion
\REGISTRY\A\{f2d36046-6a91-cd80-536c-83f52c51a5db}\Root\InventoryApplicationFile\xworm v5.6.exe|2233456200d0bc66
AppxPackageFullName
\REGISTRY\A\{f2d36046-6a91-cd80-536c-83f52c51a5db}\Root\InventoryApplicationFile\xworm v5.6.exe|2233456200d0bc66
AppxPackageRelativeId
\REGISTRY\A\{f2d36046-6a91-cd80-536c-83f52c51a5db}\Root\InventoryApplicationFile\xworm v5.6.exe|2233456200d0bc66
Size
\REGISTRY\A\{f2d36046-6a91-cd80-536c-83f52c51a5db}\Root\InventoryApplicationFile\xworm v5.6.exe|2233456200d0bc66
Language
\REGISTRY\A\{f2d36046-6a91-cd80-536c-83f52c51a5db}\Root\InventoryApplicationFile\xworm v5.6.exe|2233456200d0bc66
Usn
There are 9 hidden registries, click here to show them.

Memdumps

Base Address
Regiontype
Protect
Malicious
20B262C6000
unkown
page readonly
malicious
20B26659000
unkown
page readonly
malicious
20B2662D000
unkown
page readonly
20B26AFA000
heap
page read and write
20B25DEC000
unkown
page readonly
20B26BD3000
trusted library allocation
page read and write
20B41852000
heap
page read and write
7FFD9B784000
trusted library allocation
page read and write
20B26A30000
heap
page read and write
20B25DBC000
unkown
page readonly
20B26B1C000
heap
page read and write
20B25F03000
unkown
page readonly
20B25F86000
unkown
page readonly
20B25E07000
unkown
page readonly
20B43321000
heap
page read and write
20B26D15000
heap
page read and write
7FFD9B76D000
trusted library allocation
page execute and read and write
20B26C10000
heap
page execute and read and write
31A41FE000
stack
page read and write
20B25E61000
unkown
page readonly
20B26B1A000
heap
page read and write
20B40E70000
heap
page read and write
7FFD9B910000
trusted library allocation
page read and write
20B28540000
trusted library allocation
page read and write
20B40E00000
heap
page execute and read and write
20B26CE0000
heap
page execute and read and write
20B26882000
unkown
page readonly
20B25DC3000
unkown
page readonly
20B26C50000
trusted library allocation
page read and write
20B25DDD000
unkown
page readonly
20B264F5000
unkown
page readonly
20B40E80000
heap
page read and write
20B261C8000
unkown
page readonly
20B259C0000
unkown
page readonly
20B26A90000
heap
page read and write
20B26201000
unkown
page readonly
20B2651C000
unkown
page readonly
20B25E14000
unkown
page readonly
20B26D10000
heap
page read and write
20B384D8000
trusted library allocation
page read and write
20B26C70000
heap
page read and write
20B40EAD000
heap
page read and write
7FFD9B763000
trusted library allocation
page execute and read and write
7FFD9B773000
trusted library allocation
page read and write
7FFD9B900000
trusted library allocation
page read and write
20B26547000
unkown
page readonly
7FFD9B78D000
trusted library allocation
page execute and read and write
7FFD9B920000
trusted library allocation
page execute and read and write
20B2654C000
unkown
page readonly
20B262BB000
unkown
page readonly
20B26B77000
heap
page read and write
20B265F1000
unkown
page readonly
20B26C60000
trusted library section
page readonly
7FFD9B810000
trusted library allocation
page read and write
20B26AD3000
heap
page read and write
20B25F6D000
unkown
page readonly
20B417F0000
heap
page read and write
7FFD9B762000
trusted library allocation
page read and write
7FFD9B90F000
trusted library allocation
page read and write
20B428F0000
trusted library allocation
page read and write
7FFD9B764000
trusted library allocation
page read and write
20B25F33000
unkown
page readonly
7FF43E150000
trusted library allocation
page execute and read and write
7FFD9B820000
trusted library allocation
page execute and read and write
20B26BA0000
trusted library allocation
page read and write
20B26A50000
heap
page read and write
20B2650E000
unkown
page readonly
20B25E88000
unkown
page readonly
20B432D0000
heap
page read and write
31A3EFC000
stack
page read and write
7FFD9B90B000
trusted library allocation
page read and write
31A3AFE000
stack
page read and write
7FFD9B908000
trusted library allocation
page read and write
20B41036000
heap
page read and write
31A3CFE000
stack
page read and write
20B26BC0000
trusted library allocation
page read and write
20B26B08000
heap
page read and write
20B26AC1000
heap
page read and write
20B26EB0000
heap
page read and write
20B40E73000
heap
page read and write
20B259C0000
unkown
page readonly
31A3BFE000
stack
page read and write
20B26575000
unkown
page readonly
20B26AD0000
heap
page read and write
31A3760000
stack
page read and write
20B25F44000
unkown
page readonly
31A3FFD000
stack
page read and write
20B25D9A000
unkown
page readonly
20B28544000
trusted library allocation
page read and write
20B25EB4000
unkown
page readonly
20B25EF9000
unkown
page readonly
20B26C80000
trusted library section
page read and write
20B25E38000
unkown
page readonly
20B25DB5000
unkown
page readonly
20B41821000
heap
page read and write
20B26269000
unkown
page readonly
20B264AB000
unkown
page readonly
20B26A9C000
heap
page read and write
20B26291000
unkown
page readonly
7FFD9B780000
trusted library allocation
page read and write
20B284D1000
trusted library allocation
page read and write
20B432E5000
heap
page read and write
7FFD9B816000
trusted library allocation
page read and write
20B2606F000
unkown
page readonly
7FFD9B7BC000
trusted library allocation
page execute and read and write
20B384D1000
trusted library allocation
page read and write
20B41020000
heap
page read and write
31A43FB000
stack
page read and write
20B26CB0000
heap
page read and write
31A40FF000
stack
page read and write
20B26503000
unkown
page readonly
7FFD9B77D000
trusted library allocation
page execute and read and write
20B25E79000
unkown
page readonly
20B26BD0000
trusted library allocation
page read and write
7FFD9B880000
trusted library allocation
page execute and read and write
31A44FE000
stack
page read and write
20B432DC000
heap
page read and write
20B26930000
heap
page read and write
31A3DFE000
stack
page read and write
20B25FB1000
unkown
page readonly
20B41200000
trusted library allocation
page read and write
20B26AC3000
heap
page read and write
20B41800000
heap
page read and write
20B262B8000
unkown
page readonly
20B26A10000
heap
page read and write
20B265F5000
unkown
page readonly
31A42FE000
stack
page read and write
20B25ECF000
unkown
page readonly
20B25E2D000
unkown
page readonly
20B26567000
unkown
page readonly
20B384E1000
trusted library allocation
page read and write
20B411F0000
heap
page read and write
20B26284000
unkown
page readonly
20B25FA4000
unkown
page readonly
20B25A4F000
unkown
page readonly
7FFD9B846000
trusted library allocation
page execute and read and write
31A37AE000
stack
page read and write
7FFD9B81C000
trusted library allocation
page execute and read and write
20B26C20000
heap
page read and write
20B26ABA000
heap
page read and write
20B261BB000
unkown
page readonly
20B40E83000
heap
page read and write
20B25DFA000
unkown
page readonly
20B26A96000
heap
page read and write
20B25E46000
unkown
page readonly
20B25EC1000
unkown
page readonly
20B25DC0000
unkown
page readonly
20B259C2000
unkown
page readonly
20B42912000
trusted library allocation
page read and write
20B2607C000
unkown
page readonly
20B25F08000
unkown
page readonly
20B25E3B000
unkown
page readonly
20B25EA6000
unkown
page readonly
7FFD9B930000
trusted library allocation
page read and write
20B26EB5000
heap
page read and write
20B25A42000
unkown
page readonly
There are 146 hidden memdumps, click here to show them.