IOC Report
Xworm V5.6.exe

loading gif

Files

File Path
Type
Category
Malicious
Xworm V5.6.exe
PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
initial sample
malicious
C:\ProgramData\Microsoft\Windows\WER\ReportQueue\AppCrash_Xworm V5.6.exe_cf9afbc01e41f39085d44e42fe55b10f1508dcd_6ddd3646_948acb39-e6ee-4a51-926f-fb4da73f81e0\Report.wer
Unicode text, UTF-16, little-endian text, with CRLF line terminators
dropped
malicious
C:\ProgramData\Microsoft\Windows\WER\Temp\WERB03A.tmp.dmp
Mini DuMP crash report, 16 streams, Mon Oct 14 00:43:01 2024, 0x1205a4 type
dropped
C:\ProgramData\Microsoft\Windows\WER\Temp\WERB220.tmp.WERInternalMetadata.xml
XML 1.0 document, Unicode text, UTF-16, little-endian text, with CRLF line terminators
dropped
C:\ProgramData\Microsoft\Windows\WER\Temp\WERB240.tmp.xml
XML 1.0 document, ASCII text, with CRLF line terminators
dropped
C:\Windows\appcompat\Programs\Amcache.hve
MS Windows registry file, NT/2000 or above
dropped

Processes

Path
Cmdline
Malicious
C:\Users\user\Desktop\Xworm V5.6.exe
"C:\Users\user\Desktop\Xworm V5.6.exe"
malicious
C:\Windows\System32\WerFault.exe
C:\Windows\system32\WerFault.exe -u -p 6780 -s 1360

URLs

Name
IP
Malicious
http://www.apache.org/licenses/LICENSE-2.0
unknown
http://www.fontbureau.com
unknown
http://www.fontbureau.com/designersG
unknown
http://exmple.com
unknown
http://www.fontbureau.com/designers/?
unknown
http://www.founder.com.cn/cn/bThe
unknown
https://api.telegram.org/bot
unknown
http://www.fontbureau.com/designers?
unknown
http://www.tiro.com
unknown
http://upx.sf.net
unknown
http://www.fontbureau.com/designers
unknown
http://www.goodfont.co.kr
unknown
https://www.google.com/maps/place/)icons8-letter-16.png
unknown
http://www.carterandcone.coml
unknown
http://www.sajatypeworks.com
unknown
http://www.typography.netD
unknown
https://pastebin.com/raw/H3wFXmEi
unknown
http://www.fontbureau.com/designers/cabarga.htmlN
unknown
http://www.founder.com.cn/cn/cThe
unknown
http://www.galapagosdesign.com/staff/dennis.htm
unknown
http://www.founder.com.cn/cn
unknown
http://www.fontbureau.com/designers/frere-user.html
unknown
https://bin.equinox.io/c/bNyj1mQVY4c/ngrok-v3-stable-windows-386.zip
unknown
https://evilcoder.mysellix.io
unknown
http://www.jiyu-kobo.co.jp/
unknown
http://www.galapagosdesign.com/DPlease
unknown
http://www.fontbureau.com/designers8
unknown
http://www.fonts.com
unknown
http://www.sandoll.co.kr
unknown
http://www.urwpp.deDPlease
unknown
http://www.zhongyicts.com.cn
unknown
https://t.me/XCoderGroup
unknown
http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name
unknown
http://www.sakkal.com
unknown
http://ip-api.com/csv/?fields=status
unknown
http://ip-api.com/line/?fields=hosting
unknown
There are 26 hidden URLs, click here to show them.

Registry

Path
Value
Malicious
\REGISTRY\A\{2cc16c90-d949-fd4b-7a0d-7d2a49ae3697}\Root\InventoryApplicationFile\xworm v5.6.exe|2233456200d0bc66
ProgramId
\REGISTRY\A\{2cc16c90-d949-fd4b-7a0d-7d2a49ae3697}\Root\InventoryApplicationFile\xworm v5.6.exe|2233456200d0bc66
FileId
\REGISTRY\A\{2cc16c90-d949-fd4b-7a0d-7d2a49ae3697}\Root\InventoryApplicationFile\xworm v5.6.exe|2233456200d0bc66
LowerCaseLongPath
\REGISTRY\A\{2cc16c90-d949-fd4b-7a0d-7d2a49ae3697}\Root\InventoryApplicationFile\xworm v5.6.exe|2233456200d0bc66
LongPathHash
\REGISTRY\A\{2cc16c90-d949-fd4b-7a0d-7d2a49ae3697}\Root\InventoryApplicationFile\xworm v5.6.exe|2233456200d0bc66
Name
\REGISTRY\A\{2cc16c90-d949-fd4b-7a0d-7d2a49ae3697}\Root\InventoryApplicationFile\xworm v5.6.exe|2233456200d0bc66
OriginalFileName
\REGISTRY\A\{2cc16c90-d949-fd4b-7a0d-7d2a49ae3697}\Root\InventoryApplicationFile\xworm v5.6.exe|2233456200d0bc66
Publisher
\REGISTRY\A\{2cc16c90-d949-fd4b-7a0d-7d2a49ae3697}\Root\InventoryApplicationFile\xworm v5.6.exe|2233456200d0bc66
Version
\REGISTRY\A\{2cc16c90-d949-fd4b-7a0d-7d2a49ae3697}\Root\InventoryApplicationFile\xworm v5.6.exe|2233456200d0bc66
BinFileVersion
\REGISTRY\A\{2cc16c90-d949-fd4b-7a0d-7d2a49ae3697}\Root\InventoryApplicationFile\xworm v5.6.exe|2233456200d0bc66
BinaryType
\REGISTRY\A\{2cc16c90-d949-fd4b-7a0d-7d2a49ae3697}\Root\InventoryApplicationFile\xworm v5.6.exe|2233456200d0bc66
ProductName
\REGISTRY\A\{2cc16c90-d949-fd4b-7a0d-7d2a49ae3697}\Root\InventoryApplicationFile\xworm v5.6.exe|2233456200d0bc66
ProductVersion
\REGISTRY\A\{2cc16c90-d949-fd4b-7a0d-7d2a49ae3697}\Root\InventoryApplicationFile\xworm v5.6.exe|2233456200d0bc66
LinkDate
\REGISTRY\A\{2cc16c90-d949-fd4b-7a0d-7d2a49ae3697}\Root\InventoryApplicationFile\xworm v5.6.exe|2233456200d0bc66
BinProductVersion
\REGISTRY\A\{2cc16c90-d949-fd4b-7a0d-7d2a49ae3697}\Root\InventoryApplicationFile\xworm v5.6.exe|2233456200d0bc66
AppxPackageFullName
\REGISTRY\A\{2cc16c90-d949-fd4b-7a0d-7d2a49ae3697}\Root\InventoryApplicationFile\xworm v5.6.exe|2233456200d0bc66
AppxPackageRelativeId
\REGISTRY\A\{2cc16c90-d949-fd4b-7a0d-7d2a49ae3697}\Root\InventoryApplicationFile\xworm v5.6.exe|2233456200d0bc66
Size
\REGISTRY\A\{2cc16c90-d949-fd4b-7a0d-7d2a49ae3697}\Root\InventoryApplicationFile\xworm v5.6.exe|2233456200d0bc66
Language
\REGISTRY\A\{2cc16c90-d949-fd4b-7a0d-7d2a49ae3697}\Root\InventoryApplicationFile\xworm v5.6.exe|2233456200d0bc66
Usn
There are 9 hidden registries, click here to show them.

Memdumps

Base Address
Regiontype
Protect
Malicious
1B31AEF9000
unkown
page readonly
malicious
1B31AB66000
unkown
page readonly
malicious
36177FE000
stack
page read and write
1B31B122000
unkown
page readonly
3617FFE000
stack
page read and write
1B335703000
heap
page read and write
1B31A68C000
unkown
page readonly
3617EFB000
stack
page read and write
1B31A754000
unkown
page readonly
1B31AD4B000
unkown
page readonly
1B31A90F000
unkown
page readonly
36176FE000
stack
page read and write
1B31AE91000
unkown
page readonly
1B31B380000
trusted library allocation
page read and write
1B3358C0000
heap
page read and write
1B32D048000
trusted library allocation
page read and write
1B336020000
heap
page read and write
1B31B5D5000
heap
page read and write
1B31AE15000
unkown
page readonly
1B31B404000
heap
page read and write
1B31AAA1000
unkown
page readonly
1B31ADAE000
unkown
page readonly
1B31A826000
unkown
page readonly
1B31AB09000
unkown
page readonly
1B31B340000
trusted library allocation
page read and write
1B31B370000
heap
page read and write
1B31A6E6000
unkown
page readonly
1B31A7E4000
unkown
page readonly
1B31D0B2000
trusted library allocation
page read and write
1B31CE40000
heap
page read and write
1B31B5D0000
heap
page read and write
7FFD9B760000
trusted library allocation
page execute and read and write
1B31A7D3000
unkown
page readonly
3617300000
stack
page read and write
1B32D041000
trusted library allocation
page read and write
1B3358DF000
heap
page read and write
1B31B396000
heap
page read and write
1B31D030000
heap
page execute and read and write
1B31CDE0000
trusted library section
page read and write
1B31CFD0000
heap
page read and write
7FFD9B6B3000
trusted library allocation
page read and write
1B31B3C1000
heap
page read and write
1B31AB58000
unkown
page readonly
1B31A67D000
unkown
page readonly
1B31ADBC000
unkown
page readonly
1B31B39C000
heap
page read and write
1B31A719000
unkown
page readonly
1B336051000
heap
page read and write
1B31B383000
trusted library allocation
page read and write
1B31A2EF000
unkown
page readonly
1B31A76F000
unkown
page readonly
1B31A655000
unkown
page readonly
7FFD9B84B000
trusted library allocation
page read and write
1B31B390000
heap
page read and write
1B31CD80000
heap
page read and write
1B31A80D000
unkown
page readonly
1B31A799000
unkown
page readonly
1B31B2B0000
heap
page read and write
1B31B3BA000
heap
page read and write
1B31B360000
trusted library allocation
page read and write
1B31ADEC000
unkown
page readonly
1B31A844000
unkown
page readonly
1B31ADE7000
unkown
page readonly
7FFD9B756000
trusted library allocation
page read and write
1B31A91C000
unkown
page readonly
1B31A746000
unkown
page readonly
7FFD9B840000
trusted library allocation
page read and write
7FFD9B7C0000
trusted library allocation
page execute and read and write
1B31B47A000
heap
page read and write
1B31ADA3000
unkown
page readonly
1B3386E0000
trusted library allocation
page read and write
1B31CE43000
heap
page read and write
1B31AE95000
unkown
page readonly
36179FD000
stack
page read and write
1B31B3D3000
heap
page read and write
1B33604B000
heap
page read and write
1B31A761000
unkown
page readonly
1B31A260000
unkown
page readonly
7FFD9B860000
trusted library allocation
page execute and read and write
3617CFE000
stack
page read and write
1B31A260000
unkown
page readonly
1B31A851000
unkown
page readonly
1B31A6CD000
unkown
page readonly
1B31A63A000
unkown
page readonly
7FFD9B75C000
trusted library allocation
page execute and read and write
1B31B3FD000
heap
page read and write
1B31A6D8000
unkown
page readonly
1B31CFF0000
heap
page execute and read and write
1B33572D000
heap
page read and write
1B31CE20000
heap
page read and write
3617DFE000
stack
page read and write
1B31A6A7000
unkown
page readonly
1B31AB24000
unkown
page readonly
7FFD9B6C0000
trusted library allocation
page read and write
1B31B1D0000
heap
page read and write
1B31B375000
heap
page read and write
7FFD9B870000
trusted library allocation
page read and write
1B31A701000
unkown
page readonly
1B31D041000
trusted library allocation
page read and write
7FFD9B6A3000
trusted library allocation
page execute and read and write
7FFD9B6AD000
trusted library allocation
page execute and read and write
1B31B3FF000
heap
page read and write
1B31AA5B000
unkown
page readonly
1B335A30000
trusted library allocation
page read and write
1B337B00000
heap
page read and write
7FFD9B848000
trusted library allocation
page read and write
7FFD9B6BD000
trusted library allocation
page execute and read and write
1B31A728000
unkown
page readonly
3617AFD000
stack
page read and write
361734E000
stack
page read and write
1B31A69A000
unkown
page readonly
7FFD9B6A4000
trusted library allocation
page read and write
1B31B2F0000
heap
page read and write
1B31CDC0000
trusted library section
page readonly
1B31D0B0000
trusted library allocation
page read and write
1B31B3BF000
heap
page read and write
1B31CDD0000
heap
page execute and read and write
1B335700000
heap
page read and write
1B31A6B4000
unkown
page readonly
1B32D051000
trusted library allocation
page read and write
1B31A7A8000
unkown
page readonly
7FFD9B6C4000
trusted library allocation
page read and write
7FFD9B84F000
trusted library allocation
page read and write
7FFD9B786000
trusted library allocation
page execute and read and write
1B336030000
heap
page read and write
1B31A6DB000
unkown
page readonly
1B31A663000
unkown
page readonly
1B31AD95000
unkown
page readonly
7FFD9B6CD000
trusted library allocation
page execute and read and write
7FFD9B6A2000
trusted library allocation
page read and write
1B31A2E2000
unkown
page readonly
1B31A65C000
unkown
page readonly
1B336082000
heap
page read and write
1B31AE07000
unkown
page readonly
1B31AECD000
unkown
page readonly
1B31CDB0000
trusted library allocation
page read and write
1B31AB31000
unkown
page readonly
7FFD9B6FC000
trusted library allocation
page execute and read and write
7FFD9B750000
trusted library allocation
page read and write
1B337142000
trusted library allocation
page read and write
1B31AB5B000
unkown
page readonly
1B31B3D0000
heap
page read and write
1B31B488000
heap
page read and write
7FF4888D0000
trusted library allocation
page execute and read and write
1B31A660000
unkown
page readonly
7FFD9B850000
trusted library allocation
page read and write
36178FF000
stack
page read and write
1B31B2D0000
heap
page read and write
1B31A262000
unkown
page readonly
1B337120000
trusted library allocation
page read and write
1B31AA68000
unkown
page readonly
1B31CED0000
heap
page read and write
3617BFF000
stack
page read and write
1B31A7A3000
unkown
page readonly
There are 144 hidden memdumps, click here to show them.