Files
File Path
|
Type
|
Category
|
Malicious
|
|
---|---|---|---|---|
DJ5PhUwOsM.exe
|
PE32 executable (GUI) Intel 80386, for MS Windows
|
initial sample
|
||
C:\Users\user\AppData\Local\Temp\FB_7BD8.tmp.exe
|
PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\FB_7D21.tmp.exe
|
PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
|
dropped
|
Processes
Path
|
Cmdline
|
Malicious
|
|
---|---|---|---|
C:\Users\user\Desktop\DJ5PhUwOsM.exe
|
"C:\Users\user\Desktop\DJ5PhUwOsM.exe"
|
||
C:\Users\user\AppData\Local\Temp\FB_7BD8.tmp.exe
|
"C:\Users\user\AppData\Local\Temp\FB_7BD8.tmp.exe"
|
||
C:\Users\user\AppData\Local\Temp\FB_7D21.tmp.exe
|
"C:\Users\user\AppData\Local\Temp\FB_7D21.tmp.exe"
|
URLs
Name
|
IP
|
Malicious
|
|
---|---|---|---|
89.40.31.232
|
|||
https://api.ipify.org/
|
104.26.13.205
|
||
https://api.ipify.org
|
unknown
|
||
https://account.dyn.com/
|
unknown
|
||
https://api.telegram.org/bot5630894183:AAFSNB69Q2a6dw-6XMnWlasTfT2befh82Rk/sendMessage?chat_id=793028759&text=%E2%98%A0%20%5BXWorm%20V5.6%5D%0D%0A%0D%0ANew%20Clinet%20:%20%0D%0AEB01AAE6F744B3247914%0D%0A%0D%0AUserName%20:%20user%0D%0AOSFullName%20:%20Microsoft%20Windows%2010%20Pro%0D%0AUSB%20:%20False%0D%0ACPU%20:%20Error%0D%0AGPU%20:%20LYRNOABZ9%20%0D%0ARAM%20:%207.99%20GB%0D%0AGroub%20:%2028Nov2024
|
149.154.167.220
|
||
https://api.ipify.org/t
|
unknown
|
||
https://api.telegram.org/bot
|
unknown
|
||
http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name
|
unknown
|
||
http://microsoft.co
|
unknown
|
Domains
Name
|
IP
|
Malicious
|
|
---|---|---|---|
api.ipify.org
|
104.26.13.205
|
||
api.telegram.org
|
149.154.167.220
|
IPs
IP
|
Domain
|
Country
|
Malicious
|
|
---|---|---|---|---|
89.40.31.232
|
unknown
|
Romania
|
||
162.254.34.31
|
unknown
|
United States
|
||
149.154.167.220
|
api.telegram.org
|
United Kingdom
|
||
104.26.13.205
|
api.ipify.org
|
United States
|
Registry
Path
|
Value
|
Malicious
|
|
---|---|---|---|
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Control\Session Manager
|
PendingFileRenameOperations
|
||
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Control\Session Manager
|
PendingFileRenameOperations
|
||
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Control\Session Manager
|
PendingFileRenameOperations
|
||
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Control\Session Manager
|
PendingFileRenameOperations
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing
|
EnableConsoleTracing
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\FB_7BD8_RASAPI32
|
EnableFileTracing
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\FB_7BD8_RASAPI32
|
EnableAutoFileTracing
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\FB_7BD8_RASAPI32
|
EnableConsoleTracing
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\FB_7BD8_RASAPI32
|
FileTracingMask
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\FB_7BD8_RASAPI32
|
ConsoleTracingMask
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\FB_7BD8_RASAPI32
|
MaxFileSize
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\FB_7BD8_RASAPI32
|
FileDirectory
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\FB_7BD8_RASMANCS
|
EnableFileTracing
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\FB_7BD8_RASMANCS
|
EnableAutoFileTracing
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\FB_7BD8_RASMANCS
|
EnableConsoleTracing
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\FB_7BD8_RASMANCS
|
FileTracingMask
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\FB_7BD8_RASMANCS
|
ConsoleTracingMask
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\FB_7BD8_RASMANCS
|
MaxFileSize
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\FB_7BD8_RASMANCS
|
FileDirectory
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\FB_7D21_RASAPI32
|
EnableFileTracing
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\FB_7D21_RASAPI32
|
EnableAutoFileTracing
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\FB_7D21_RASAPI32
|
EnableConsoleTracing
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\FB_7D21_RASAPI32
|
FileTracingMask
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\FB_7D21_RASAPI32
|
ConsoleTracingMask
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\FB_7D21_RASAPI32
|
MaxFileSize
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\FB_7D21_RASAPI32
|
FileDirectory
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\FB_7D21_RASMANCS
|
EnableFileTracing
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\FB_7D21_RASMANCS
|
EnableAutoFileTracing
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\FB_7D21_RASMANCS
|
EnableConsoleTracing
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\FB_7D21_RASMANCS
|
FileTracingMask
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\FB_7D21_RASMANCS
|
ConsoleTracingMask
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\FB_7D21_RASMANCS
|
MaxFileSize
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\FB_7D21_RASMANCS
|
FileDirectory
|
There are 23 hidden registries, click here to show them.
Memdumps
Base Address
|
Regiontype
|
Protect
|
Malicious
|
|
---|---|---|---|---|
404000
|
unkown
|
page readonly
|
||
FA2000
|
unkown
|
page readonly
|
||
28D9000
|
trusted library allocation
|
page read and write
|
||
404000
|
unkown
|
page readonly
|
||
3341000
|
trusted library allocation
|
page read and write
|
||
4D2000
|
unkown
|
page readonly
|
||
28B1000
|
trusted library allocation
|
page read and write
|
||
1C1DB000
|
heap
|
page read and write
|
||
645E000
|
stack
|
page read and write
|
||
495D000
|
stack
|
page read and write
|
||
78E000
|
heap
|
page read and write
|
||
1755000
|
heap
|
page read and write
|
||
CFE000
|
stack
|
page read and write
|
||
4CB6000
|
trusted library allocation
|
page read and write
|
||
1C00E000
|
stack
|
page read and write
|
||
1C136000
|
heap
|
page read and write
|
||
14A9000
|
heap
|
page read and write
|
||
7FF848FC0000
|
trusted library allocation
|
page execute and read and write
|
||
1409000
|
heap
|
page read and write
|
||
BF0000
|
heap
|
page read and write
|
||
4CC2000
|
trusted library allocation
|
page read and write
|
||
640000
|
heap
|
page read and write
|
||
E87000
|
heap
|
page read and write
|
||
3160000
|
heap
|
page execute and read and write
|
||
1BF0E000
|
stack
|
page read and write
|
||
1413000
|
heap
|
page read and write
|
||
E6E000
|
stack
|
page read and write
|
||
7FF848E24000
|
trusted library allocation
|
page read and write
|
||
1370000
|
heap
|
page read and write
|
||
910000
|
heap
|
page read and write
|
||
9C4000
|
heap
|
page read and write
|
||
635E000
|
stack
|
page read and write
|
||
1C15A000
|
heap
|
page read and write
|
||
4E6C000
|
stack
|
page read and write
|
||
2BDF000
|
stack
|
page read and write
|
||
7FF848E0D000
|
trusted library allocation
|
page execute and read and write
|
||
599000
|
stack
|
page read and write
|
||
1CF5C000
|
stack
|
page read and write
|
||
951000
|
heap
|
page read and write
|
||
6497000
|
trusted library allocation
|
page read and write
|
||
1B6CB000
|
heap
|
page read and write
|
||
13341000
|
trusted library allocation
|
page read and write
|
||
31E0000
|
heap
|
page execute and read and write
|
||
4CCE000
|
trusted library allocation
|
page read and write
|
||
5E0000
|
heap
|
page read and write
|
||
64F0000
|
trusted library allocation
|
page execute and read and write
|
||
7FF848E03000
|
trusted library allocation
|
page execute and read and write
|
||
2690000
|
trusted library allocation
|
page read and write
|
||
658E000
|
stack
|
page read and write
|
||
1CD5A000
|
stack
|
page read and write
|
||
1F0000
|
heap
|
page read and write
|
||
1BE04000
|
stack
|
page read and write
|
||
E07000
|
trusted library allocation
|
page execute and read and write
|
||
BE0000
|
trusted library allocation
|
page read and write
|
||
BDD000
|
trusted library allocation
|
page execute and read and write
|
||
7FF848E04000
|
trusted library allocation
|
page read and write
|
||
26B8000
|
trusted library allocation
|
page read and write
|
||
BC4000
|
trusted library allocation
|
page read and write
|
||
7FF848EBC000
|
trusted library allocation
|
page execute and read and write
|
||
E0B000
|
trusted library allocation
|
page execute and read and write
|
||
2D1C000
|
stack
|
page read and write
|
||
28AD000
|
trusted library allocation
|
page read and write
|
||
5F2F000
|
stack
|
page read and write
|
||
400000
|
unkown
|
page readonly
|
||
7FF848EB0000
|
trusted library allocation
|
page read and write
|
||
2750000
|
heap
|
page read and write
|
||
14A7000
|
heap
|
page read and write
|
||
4CBB000
|
trusted library allocation
|
page read and write
|
||
289F000
|
trusted library allocation
|
page read and write
|
||
FA0000
|
unkown
|
page readonly
|
||
1733000
|
heap
|
page read and write
|
||
21EE000
|
stack
|
page read and write
|
||
5BE000
|
stack
|
page read and write
|
||
1B8CD000
|
stack
|
page read and write
|
||
E20000
|
trusted library allocation
|
page read and write
|
||
BEA000
|
trusted library allocation
|
page execute and read and write
|
||
2670000
|
heap
|
page read and write
|
||
6960000
|
trusted library allocation
|
page read and write
|
||
E70000
|
trusted library allocation
|
page execute and read and write
|
||
4CE2000
|
trusted library allocation
|
page read and write
|
||
38C7000
|
trusted library allocation
|
page read and write
|
||
AF0000
|
heap
|
page read and write
|
||
3861000
|
trusted library allocation
|
page read and write
|
||
3230000
|
heap
|
page read and write
|
||
5430000
|
heap
|
page read and write
|
||
65D0000
|
trusted library allocation
|
page execute and read and write
|
||
E05000
|
trusted library allocation
|
page execute and read and write
|
||
953000
|
heap
|
page read and write
|
||
4CD1000
|
trusted library allocation
|
page read and write
|
||
4D30000
|
heap
|
page read and write
|
||
7FF848FB0000
|
trusted library allocation
|
page read and write
|
||
402000
|
unkown
|
page readonly
|
||
144C000
|
heap
|
page read and write
|
||
285E000
|
stack
|
page read and write
|
||
333E000
|
stack
|
page read and write
|
||
1452000
|
heap
|
page read and write
|
||
4D10000
|
heap
|
page execute and read and write
|
||
780000
|
heap
|
page read and write
|
||
7B0000
|
heap
|
page read and write
|
||
2A9F000
|
stack
|
page read and write
|
||
13B0000
|
heap
|
page read and write
|
||
5E0000
|
heap
|
page read and write
|
||
7FF848EE6000
|
trusted library allocation
|
page execute and read and write
|
||
938000
|
heap
|
page read and write
|
||
1C51B000
|
stack
|
page read and write
|
||
647D000
|
trusted library allocation
|
page read and write
|
||
61EE000
|
stack
|
page read and write
|
||
299E000
|
stack
|
page read and write
|
||
33C6000
|
trusted library allocation
|
page read and write
|
||
19A000
|
stack
|
page read and write
|
||
141F000
|
heap
|
page read and write
|
||
1340000
|
heap
|
page read and write
|
||
982000
|
heap
|
page read and write
|
||
1C1FF000
|
heap
|
page read and write
|
||
295F000
|
stack
|
page read and write
|
||
BD0000
|
trusted library allocation
|
page read and write
|
||
6310000
|
trusted library allocation
|
page read and write
|
||
4CB0000
|
trusted library allocation
|
page read and write
|
||
401000
|
unkown
|
page execute read
|
||
BE6000
|
trusted library allocation
|
page execute and read and write
|
||
7FF848FA2000
|
trusted library allocation
|
page read and write
|
||
4CA0000
|
trusted library allocation
|
page read and write
|
||
6480000
|
heap
|
page read and write
|
||
7FF848E2B000
|
trusted library allocation
|
page execute and read and write
|
||
13E0000
|
heap
|
page read and write
|
||
1C10E000
|
stack
|
page read and write
|
||
1D0DF000
|
stack
|
page read and write
|
||
285E000
|
stack
|
page read and write
|
||
7FF848E2D000
|
trusted library allocation
|
page execute and read and write
|
||
BB0000
|
trusted library allocation
|
page read and write
|
||
1421000
|
heap
|
page read and write
|
||
FB6000
|
unkown
|
page readonly
|
||
BE2000
|
trusted library allocation
|
page read and write
|
||
271E000
|
stack
|
page read and write
|
||
6950000
|
trusted library allocation
|
page read and write
|
||
3100000
|
heap
|
page read and write
|
||
530000
|
heap
|
page read and write
|
||
6319000
|
trusted library allocation
|
page read and write
|
||
4CCA000
|
trusted library allocation
|
page read and write
|
||
26A0000
|
heap
|
page execute and read and write
|
||
7FA00000
|
trusted library allocation
|
page execute and read and write
|
||
645000
|
heap
|
page read and write
|
||
A10000
|
heap
|
page read and write
|
||
65E0000
|
trusted library allocation
|
page read and write
|
||
5C4A000
|
heap
|
page read and write
|
||
1390000
|
heap
|
page read and write
|
||
6C30000
|
heap
|
page read and write
|
||
4CDD000
|
trusted library allocation
|
page read and write
|
||
7FF848E00000
|
trusted library allocation
|
page read and write
|
||
4E80000
|
heap
|
page read and write
|
||
97F000
|
stack
|
page read and write
|
||
7FF848FD0000
|
trusted library allocation
|
page execute and read and write
|
||
2230000
|
heap
|
page read and write
|
||
1C1D9000
|
heap
|
page read and write
|
||
1C1D7000
|
heap
|
page read and write
|
||
3889000
|
trusted library allocation
|
page read and write
|
||
542D000
|
stack
|
page read and write
|
||
13B5000
|
heap
|
page read and write
|
||
1750000
|
heap
|
page read and write
|
||
4CD6000
|
trusted library allocation
|
page read and write
|
||
4F8C000
|
stack
|
page read and write
|
||
1CE58000
|
stack
|
page read and write
|
||
7FF848E20000
|
trusted library allocation
|
page read and write
|
||
1C85E000
|
stack
|
page read and write
|
||
4CF0000
|
trusted library allocation
|
page read and write
|
||
21A0000
|
heap
|
page read and write
|
||
65E7000
|
trusted library allocation
|
page read and write
|
||
222E000
|
stack
|
page read and write
|
||
33A1000
|
trusted library allocation
|
page read and write
|
||
16AE000
|
stack
|
page read and write
|
||
9F8000
|
heap
|
page read and write
|
||
7FF848F20000
|
trusted library allocation
|
page execute and read and write
|
||
7FF848E13000
|
trusted library allocation
|
page read and write
|
||
1350000
|
heap
|
page read and write
|
||
62EE000
|
stack
|
page read and write
|
||
946000
|
heap
|
page read and write
|
||
281F000
|
stack
|
page read and write
|
||
1C310000
|
heap
|
page read and write
|
||
1730000
|
heap
|
page read and write
|
||
1BD05000
|
stack
|
page read and write
|
||
7E6000
|
heap
|
page read and write
|
||
1C110000
|
heap
|
page read and write
|
||
7FF474C90000
|
trusted library allocation
|
page execute and read and write
|
||
BC3000
|
trusted library allocation
|
page execute and read and write
|
||
4CBE000
|
trusted library allocation
|
page read and write
|
||
E02000
|
trusted library allocation
|
page read and write
|
||
B3E000
|
stack
|
page read and write
|
||
185C000
|
stack
|
page read and write
|
||
8F9000
|
stack
|
page read and write
|
||
FA0000
|
unkown
|
page readonly
|
||
5E5000
|
heap
|
page read and write
|
||
99C000
|
heap
|
page read and write
|
||
E80000
|
heap
|
page read and write
|
||
402000
|
unkown
|
page readonly
|
||
12F1000
|
stack
|
page read and write
|
||
6490000
|
trusted library allocation
|
page read and write
|
||
16F0000
|
trusted library allocation
|
page read and write
|
||
16C0000
|
trusted library allocation
|
page read and write
|
||
5C21000
|
heap
|
page read and write
|
||
14D5000
|
heap
|
page read and write
|
||
16E0000
|
trusted library allocation
|
page read and write
|
||
1C41E000
|
stack
|
page read and write
|
||
28EA000
|
trusted library allocation
|
page read and write
|
||
9B000
|
stack
|
page read and write
|
||
401000
|
unkown
|
page execute read
|
||
189E000
|
unkown
|
page read and write
|
||
5BF0000
|
heap
|
page read and write
|
||
BCD000
|
trusted library allocation
|
page execute and read and write
|
||
64DD000
|
stack
|
page read and write
|
||
78A000
|
heap
|
page read and write
|
||
1D4DC000
|
stack
|
page read and write
|
||
1D3DA000
|
stack
|
page read and write
|
||
7FF848EB6000
|
trusted library allocation
|
page read and write
|
||
2861000
|
trusted library allocation
|
page read and write
|
||
918000
|
heap
|
page read and write
|
||
BC0000
|
trusted library allocation
|
page read and write
|
||
13EC000
|
heap
|
page read and write
|
||
64E0000
|
trusted library allocation
|
page read and write
|
||
13FE000
|
heap
|
page read and write
|
||
6990000
|
heap
|
page read and write
|
||
4D00000
|
trusted library allocation
|
page read and write
|
||
1C162000
|
heap
|
page read and write
|
||
141D000
|
heap
|
page read and write
|
||
1C13C000
|
heap
|
page read and write
|
||
16F3000
|
trusted library allocation
|
page read and write
|
||
33A5000
|
trusted library allocation
|
page read and write
|
||
400000
|
unkown
|
page readonly
|
||
1D0E0000
|
heap
|
page read and write
|
||
7FF848FA0000
|
trusted library allocation
|
page read and write
|
||
6470000
|
trusted library allocation
|
page read and write
|
||
266C000
|
stack
|
page read and write
|
||
9F2000
|
heap
|
page read and write
|
||
7FF848EC0000
|
trusted library allocation
|
page execute and read and write
|
||
57E000
|
stack
|
page read and write
|
||
BF7000
|
heap
|
page read and write
|
||
2C1C000
|
stack
|
page read and write
|
||
7FF848E5C000
|
trusted library allocation
|
page execute and read and write
|
||
69A0000
|
trusted library allocation
|
page execute and read and write
|
||
4E83000
|
heap
|
page read and write
|
||
2896000
|
trusted library allocation
|
page read and write
|
||
1CC5F000
|
stack
|
page read and write
|
||
4D0000
|
unkown
|
page readonly
|
||
7FF848E1D000
|
trusted library allocation
|
page execute and read and write
|
||
2ADE000
|
stack
|
page read and write
|
||
74E000
|
stack
|
page read and write
|
||
7FF848E10000
|
trusted library allocation
|
page read and write
|
||
1B370000
|
trusted library allocation
|
page read and write
|
||
91E000
|
heap
|
page read and write
|
There are 238 hidden memdumps, click here to show them.