IOC Report
tE3ZXBTP0B.exe

loading gif

Processes

Path
Cmdline
Malicious
C:\Users\user\Desktop\tE3ZXBTP0B.exe
"C:\Users\user\Desktop\tE3ZXBTP0B.exe"
malicious

URLs

Name
IP
Malicious
89.40.31.232
malicious
https://api.telegram.org/bot5630894183:AAFSNB69Q2a6dw-6XMnWlasTfT2befh82Rk/sendMessage?chat_id=793028759&text=%E2%98%A0%20%5BXWorm%20V5.6%5D%0D%0A%0D%0ANew%20Clinet%20:%20%0D%0A79B301C4E3529A1CAD54%0D%0A%0D%0AUserName%20:%20user%0D%0AOSFullName%20:%20Microsoft%20Windows%2010%20Pro%0D%0AUSB%20:%20False%0D%0ACPU%20:%20Error%0D%0AGPU%20:%20GP23O5%20%0D%0ARAM%20:%207.99%20GB%0D%0AGroub%20:%2028Nov2024
149.154.167.220
https://api.telegram.org/bot
unknown
http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name
unknown

Domains

Name
IP
Malicious
api.telegram.org
149.154.167.220

IPs

IP
Domain
Country
Malicious
89.40.31.232
unknown
Romania
malicious
149.154.167.220
api.telegram.org
United Kingdom

Registry

Path
Value
Malicious
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\tE3ZXBTP0B_RASAPI32
EnableFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\tE3ZXBTP0B_RASAPI32
EnableAutoFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\tE3ZXBTP0B_RASAPI32
EnableConsoleTracing
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\tE3ZXBTP0B_RASAPI32
FileTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\tE3ZXBTP0B_RASAPI32
ConsoleTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\tE3ZXBTP0B_RASAPI32
MaxFileSize
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\tE3ZXBTP0B_RASAPI32
FileDirectory
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\tE3ZXBTP0B_RASMANCS
EnableFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\tE3ZXBTP0B_RASMANCS
EnableAutoFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\tE3ZXBTP0B_RASMANCS
EnableConsoleTracing
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\tE3ZXBTP0B_RASMANCS
FileTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\tE3ZXBTP0B_RASMANCS
ConsoleTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\tE3ZXBTP0B_RASMANCS
MaxFileSize
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\tE3ZXBTP0B_RASMANCS
FileDirectory
There are 4 hidden registries, click here to show them.

Memdumps

Base Address
Regiontype
Protect
Malicious
D62000
unkown
page readonly
malicious
3041000
trusted library allocation
page read and write
malicious
7FFD9B84C000
trusted library allocation
page execute and read and write
1BFBE000
stack
page read and write
1BA05000
stack
page read and write
7FFD9B8B0000
trusted library allocation
page execute and read and write
7FFD9B876000
trusted library allocation
page execute and read and write
1BBC0000
heap
page read and write
7FFD9B7B4000
trusted library allocation
page read and write
1B5CC000
stack
page read and write
1B3CE000
heap
page read and write
1BC94000
heap
page read and write
1C040000
heap
page read and write
7FF4402F0000
trusted library allocation
page execute and read and write
7FFD9B7AD000
trusted library allocation
page execute and read and write
7FFD9B793000
trusted library allocation
page execute and read and write
1BDBE000
stack
page read and write
30B2000
trusted library allocation
page read and write
1D47C000
stack
page read and write
1C67E000
stack
page read and write
1D17B000
stack
page read and write
2FFE000
stack
page read and write
1290000
heap
page read and write
7FFD9B794000
trusted library allocation
page read and write
1CA7E000
stack
page read and write
7FFD9B7B0000
trusted library allocation
page read and write
7FFD9B950000
trusted library allocation
page execute and read and write
1440000
heap
page read and write
1CC80000
heap
page read and write
1C33B000
stack
page read and write
7FFD9B930000
trusted library allocation
page read and write
165D000
stack
page read and write
1BC96000
heap
page read and write
13A0000
trusted library allocation
page read and write
7FFD9B932000
trusted library allocation
page read and write
1CC78000
stack
page read and write
7FFD9B840000
trusted library allocation
page read and write
D60000
unkown
page readonly
1BC58000
heap
page read and write
7FFD9B7BD000
trusted library allocation
page execute and read and write
1B070000
trusted library allocation
page read and write
7FFD9B846000
trusted library allocation
page read and write
1CC91000
heap
page read and write
12BD000
heap
page read and write
1D27A000
stack
page read and write
1BEBF000
stack
page read and write
1296000
heap
page read and write
D60000
unkown
page readonly
1C03E000
stack
page read and write
7FFD9B79D000
trusted library allocation
page execute and read and write
1BC03000
heap
page read and write
7FFD9B7A0000
trusted library allocation
page read and write
7FFD9B790000
trusted library allocation
page read and write
12C3000
heap
page read and write
1220000
heap
page read and write
1270000
trusted library allocation
page read and write
1BAB3000
heap
page read and write
11E0000
heap
page read and write
1BFFF000
stack
page read and write
1755000
heap
page read and write
3030000
heap
page read and write
1CB7A000
stack
page read and write
7FFD9B850000
trusted library allocation
page execute and read and write
30A5000
trusted library allocation
page read and write
7FFD9B960000
trusted library allocation
page execute and read and write
129C000
heap
page read and write
7FFD9B7EC000
trusted library allocation
page execute and read and write
1CCA8000
heap
page read and write
7FFD9B940000
trusted library allocation
page read and write
1BC21000
heap
page read and write
13E0000
heap
page read and write
12D4000
heap
page read and write
1BBB4000
stack
page read and write
137B000
heap
page read and write
1300000
heap
page read and write
1355000
heap
page read and write
10F1000
stack
page read and write
1BA30000
heap
page execute and read and write
1100000
heap
page read and write
1D37C000
stack
page read and write
13A3000
trusted library allocation
page read and write
1445000
heap
page read and write
154D000
stack
page read and write
1750000
heap
page read and write
3010000
heap
page execute and read and write
1390000
trusted library allocation
page read and write
D76000
unkown
page readonly
13041000
trusted library allocation
page read and write
1BAB0000
heap
page read and write
3533000
trusted library allocation
page read and write
7FFD9B7BB000
trusted library allocation
page execute and read and write
1200000
heap
page read and write
1351000
heap
page read and write
7FFD9B7A3000
trusted library allocation
page read and write
12D2000
heap
page read and write
There are 85 hidden memdumps, click here to show them.