IOC Report
XClient.exe

loading gif

Files

File Path
Type
Category
Malicious
XClient.exe
PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
initial sample
malicious
C:\ProgramData\Microsoft\Windows\WER\ReportQueue\AppCrash_XClient.exe_6effdd05a2974476353f94223a92dcbdb64af0_81528a0c_cef53090-dc85-43c7-a262-2065c3599dc2\Report.wer
Unicode text, UTF-16, little-endian text, with CRLF line terminators
dropped
malicious
C:\ProgramData\Microsoft\Windows\WER\Temp\WERA038.tmp.dmp
Mini DuMP crash report, 16 streams, Tue Sep 24 19:03:14 2024, 0x1205a4 type
dropped
C:\ProgramData\Microsoft\Windows\WER\Temp\WERA190.tmp.WERInternalMetadata.xml
XML 1.0 document, Unicode text, UTF-16, little-endian text, with CRLF line terminators
dropped
C:\ProgramData\Microsoft\Windows\WER\Temp\WERA1D0.tmp.xml
XML 1.0 document, ASCII text, with CRLF line terminators
dropped
C:\Windows\appcompat\Programs\Amcache.hve
MS Windows registry file, NT/2000 or above
dropped

Processes

Path
Cmdline
Malicious
C:\Users\user\Desktop\XClient.exe
"C:\Users\user\Desktop\XClient.exe"
malicious
C:\Windows\System32\WerFault.exe
C:\Windows\system32\WerFault.exe -u -p 4252 -s 1660

URLs

Name
IP
Malicious
vecotr.viewdns.net
malicious
http://upx.sf.net
unknown
http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name
unknown

Domains

Name
IP
Malicious
vecotr.viewdns.net
191.96.207.180
malicious

IPs

IP
Domain
Country
Malicious
191.96.207.180
vecotr.viewdns.net
Chile
malicious

Registry

Path
Value
Malicious
\REGISTRY\A\{dd66ccad-6846-4f90-3519-bb6095a21ebf}\Root\InventoryApplicationFile\xclient.exe|926aab8a72fcbd7f
ProgramId
\REGISTRY\A\{dd66ccad-6846-4f90-3519-bb6095a21ebf}\Root\InventoryApplicationFile\xclient.exe|926aab8a72fcbd7f
FileId
\REGISTRY\A\{dd66ccad-6846-4f90-3519-bb6095a21ebf}\Root\InventoryApplicationFile\xclient.exe|926aab8a72fcbd7f
LowerCaseLongPath
\REGISTRY\A\{dd66ccad-6846-4f90-3519-bb6095a21ebf}\Root\InventoryApplicationFile\xclient.exe|926aab8a72fcbd7f
LongPathHash
\REGISTRY\A\{dd66ccad-6846-4f90-3519-bb6095a21ebf}\Root\InventoryApplicationFile\xclient.exe|926aab8a72fcbd7f
Name
\REGISTRY\A\{dd66ccad-6846-4f90-3519-bb6095a21ebf}\Root\InventoryApplicationFile\xclient.exe|926aab8a72fcbd7f
OriginalFileName
\REGISTRY\A\{dd66ccad-6846-4f90-3519-bb6095a21ebf}\Root\InventoryApplicationFile\xclient.exe|926aab8a72fcbd7f
Publisher
\REGISTRY\A\{dd66ccad-6846-4f90-3519-bb6095a21ebf}\Root\InventoryApplicationFile\xclient.exe|926aab8a72fcbd7f
Version
\REGISTRY\A\{dd66ccad-6846-4f90-3519-bb6095a21ebf}\Root\InventoryApplicationFile\xclient.exe|926aab8a72fcbd7f
BinFileVersion
\REGISTRY\A\{dd66ccad-6846-4f90-3519-bb6095a21ebf}\Root\InventoryApplicationFile\xclient.exe|926aab8a72fcbd7f
BinaryType
\REGISTRY\A\{dd66ccad-6846-4f90-3519-bb6095a21ebf}\Root\InventoryApplicationFile\xclient.exe|926aab8a72fcbd7f
ProductName
\REGISTRY\A\{dd66ccad-6846-4f90-3519-bb6095a21ebf}\Root\InventoryApplicationFile\xclient.exe|926aab8a72fcbd7f
ProductVersion
\REGISTRY\A\{dd66ccad-6846-4f90-3519-bb6095a21ebf}\Root\InventoryApplicationFile\xclient.exe|926aab8a72fcbd7f
LinkDate
\REGISTRY\A\{dd66ccad-6846-4f90-3519-bb6095a21ebf}\Root\InventoryApplicationFile\xclient.exe|926aab8a72fcbd7f
BinProductVersion
\REGISTRY\A\{dd66ccad-6846-4f90-3519-bb6095a21ebf}\Root\InventoryApplicationFile\xclient.exe|926aab8a72fcbd7f
AppxPackageFullName
\REGISTRY\A\{dd66ccad-6846-4f90-3519-bb6095a21ebf}\Root\InventoryApplicationFile\xclient.exe|926aab8a72fcbd7f
AppxPackageRelativeId
\REGISTRY\A\{dd66ccad-6846-4f90-3519-bb6095a21ebf}\Root\InventoryApplicationFile\xclient.exe|926aab8a72fcbd7f
Size
\REGISTRY\A\{dd66ccad-6846-4f90-3519-bb6095a21ebf}\Root\InventoryApplicationFile\xclient.exe|926aab8a72fcbd7f
Language
\REGISTRY\A\{dd66ccad-6846-4f90-3519-bb6095a21ebf}\Root\InventoryApplicationFile\xclient.exe|926aab8a72fcbd7f
Usn
There are 9 hidden registries, click here to show them.

Memdumps

Base Address
Regiontype
Protect
Malicious
812000
unkown
page readonly
malicious
2B91000
trusted library allocation
page read and write
malicious
10C5000
heap
page read and write
9D0000
heap
page read and write
C73000
trusted library allocation
page read and write
1B6B4000
stack
page read and write
7FFAACBAD000
trusted library allocation
page execute and read and write
7FFAACCC0000
trusted library allocation
page execute and read and write
1B11D000
stack
page read and write
2BD9000
trusted library allocation
page read and write
7FFB16791000
unkown
page execute read
1BA94000
heap
page read and write
301A000
trusted library allocation
page read and write
1B93E000
stack
page read and write
105F000
stack
page read and write
3133000
trusted library allocation
page read and write
FF0000
heap
page read and write
12B9E000
trusted library allocation
page read and write
CCC000
heap
page read and write
CFE000
heap
page read and write
7FFB167B2000
unkown
page readonly
7FFAACC5C000
trusted library allocation
page execute and read and write
7FFAACD60000
trusted library allocation
page execute and read and write
7FFAACBC0000
trusted library allocation
page read and write
D00000
heap
page read and write
1BA4A000
heap
page read and write
109E000
stack
page read and write
1B730000
heap
page execute and read and write
12B98000
trusted library allocation
page read and write
7FFAACBBD000
trusted library allocation
page execute and read and write
C00000
heap
page read and write
7FFB16790000
unkown
page readonly
CC0000
heap
page read and write
1B5B3000
heap
page read and write
C60000
trusted library allocation
page read and write
7FFAACD51000
trusted library allocation
page read and write
1B558000
stack
page read and write
2A60000
heap
page execute and read and write
10C0000
heap
page read and write
FF5000
heap
page read and write
1BA40000
heap
page read and write
7FFAACBA0000
trusted library allocation
page read and write
D33000
heap
page read and write
12B91000
trusted library allocation
page read and write
D7F000
heap
page read and write
1B83E000
stack
page read and write
7FFAACBA3000
trusted library allocation
page execute and read and write
7FFAACC86000
trusted library allocation
page execute and read and write
7FFB167B5000
unkown
page readonly
D82000
heap
page read and write
F8C000
stack
page read and write
9B0000
heap
page read and write
1BA3E000
stack
page read and write
7FFAACC50000
trusted library allocation
page read and write
FC0000
heap
page read and write
1C03A000
stack
page read and write
7FFAACBFC000
trusted library allocation
page execute and read and write
C70000
trusted library allocation
page read and write
9A0000
heap
page read and write
1BA89000
heap
page read and write
7FFAACC56000
trusted library allocation
page read and write
1B5B0000
heap
page read and write
7FFAACBCD000
trusted library allocation
page execute and read and write
7FFAACD40000
trusted library allocation
page read and write
7FFAACC60000
trusted library allocation
page execute and read and write
1C33C000
stack
page read and write
954000
stack
page read and write
1BAAF000
heap
page read and write
1BF3B000
stack
page read and write
7FFAACBA4000
trusted library allocation
page read and write
7FFAACBC4000
trusted library allocation
page read and write
3137000
trusted library allocation
page read and write
10A0000
heap
page read and write
7FFAACBB0000
trusted library allocation
page read and write
1AF19000
heap
page read and write
CEF000
heap
page read and write
D03000
heap
page read and write
7FFB167B0000
unkown
page read and write
7FFAACBB2000
trusted library allocation
page read and write
7FF4BE950000
trusted library allocation
page execute and read and write
7FFB167A6000
unkown
page readonly
2B8F000
stack
page read and write
1BA50000
heap
page read and write
C40000
trusted library allocation
page read and write
D2C000
heap
page read and write
1ABC0000
trusted library allocation
page read and write
2A80000
heap
page read and write
1BE3D000
stack
page read and write
810000
unkown
page readonly
1BA9B000
heap
page read and write
1BA90000
heap
page read and write
11CC000
stack
page read and write
810000
unkown
page readonly
1BA7C000
heap
page read and write
There are 84 hidden memdumps, click here to show them.