Analysis
-
max time kernel
680s -
max time network
675s -
platform
windows11-21h2_x64 -
resource
win11-20240426-en -
resource tags
arch:x64arch:x86image:win11-20240426-enlocale:en-usos:windows11-21h2-x64system -
submitted
08-06-2024 23:50
Static task
static1
Behavioral task
behavioral1
Sample
sexy.rar
Resource
win10v2004-20240508-en
General
-
Target
sexy.rar
-
Size
34.5MB
-
MD5
f4354a27cbafe881d0c2a30406cab030
-
SHA1
281c0858f86e86acbd61e5bb64959bd222495e13
-
SHA256
264c33358030655653d02cf653ca7f2e56a897b28689cdb35e015259afb71731
-
SHA512
7918468c337fb7ed2874ec7c12470cb33b8b750a74179c41bfe4abe5ed93f4e605e60324702cb4c5c80ad7473f805713886c447beb7555350cb0c6bc8f74ee62
-
SSDEEP
786432:lLMurnAMcuqEsgOvELxk7LGi7PPczRy3kJFTAa3NtQH/eC:lo6nAPUJ4Si7cVy3kAg2/B
Malware Config
Signatures
-
AgentTesla
Agent Tesla is a remote access tool (RAT) written in visual basic.
-
Detect Xworm Payload 1 IoCs
Processes:
resource yara_rule C:\Users\Admin\AppData\Local\Temp\1qzqluca\1qzqluca.0.vb family_xworm -
AgentTesla payload 2 IoCs
Processes:
resource yara_rule C:\Users\Admin\AppData\Local\Temp\sexy\Guna.UI2.dll family_agenttesla behavioral2/memory/4776-321-0x0000023530A50000-0x0000023530C44000-memory.dmp family_agenttesla -
Executes dropped EXE 3 IoCs
Processes:
Xworm V5.6.exeXworm V5.6.exeXworm V5.6.exepid process 4776 Xworm V5.6.exe 2000 Xworm V5.6.exe 2144 Xworm V5.6.exe -
Uses the VBS compiler for execution 1 TTPs
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Enumerates system info in registry 2 TTPs 9 IoCs
Processes:
Xworm V5.6.exeXworm V5.6.exeXworm V5.6.exedescription ioc process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer Xworm V5.6.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemVersion Xworm V5.6.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS Xworm V5.6.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer Xworm V5.6.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemVersion Xworm V5.6.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemVersion Xworm V5.6.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS Xworm V5.6.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS Xworm V5.6.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer Xworm V5.6.exe -
Modifies registry class 33 IoCs
Processes:
OpenWith.exeXworm V5.6.execmd.exedescription ioc process Key created \REGISTRY\USER\S-1-5-21-3938118698-2964058152-2337880935-1000_Classes\Local Settings OpenWith.exe Key created \REGISTRY\USER\S-1-5-21-3938118698-2964058152-2337880935-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\4 Xworm V5.6.exe Key created \REGISTRY\USER\S-1-5-21-3938118698-2964058152-2337880935-1000_Classes\CLSID\{018D5C66-4533-4307-9B53-224DE2ED1FE6}\Instance\ Xworm V5.6.exe Set value (int) \REGISTRY\USER\S-1-5-21-3938118698-2964058152-2337880935-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\4\ComDlg\{7D49D726-3C21-4F05-99AA-FDC2C9474656}\GroupView = "0" Xworm V5.6.exe Set value (data) \REGISTRY\USER\S-1-5-21-3938118698-2964058152-2337880935-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\NodeSlots = 020202 Xworm V5.6.exe Key created \REGISTRY\USER\S-1-5-21-3938118698-2964058152-2337880935-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\1\1 Xworm V5.6.exe Set value (int) \REGISTRY\USER\S-1-5-21-3938118698-2964058152-2337880935-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\1\1\NodeSlot = "4" Xworm V5.6.exe Set value (data) \REGISTRY\USER\S-1-5-21-3938118698-2964058152-2337880935-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\1\1\MRUListEx = ffffffff Xworm V5.6.exe Key created \REGISTRY\USER\S-1-5-21-3938118698-2964058152-2337880935-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\4\ComDlg Xworm V5.6.exe Key created \REGISTRY\USER\S-1-5-21-3938118698-2964058152-2337880935-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell Xworm V5.6.exe Set value (data) \REGISTRY\USER\S-1-5-21-3938118698-2964058152-2337880935-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\1\1 = 14002e80922b16d365937a46956b92703aca08af0000 Xworm V5.6.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{4336a54d-038b-4685-ab02-99bb52d3fb8b}\Instance\ Xworm V5.6.exe Set value (int) \REGISTRY\USER\S-1-5-21-3938118698-2964058152-2337880935-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\4\ComDlg\{7D49D726-3C21-4F05-99AA-FDC2C9474656}\FFlags = "1092616257" Xworm V5.6.exe Set value (data) \REGISTRY\USER\S-1-5-21-3938118698-2964058152-2337880935-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\NodeSlots = 02020202 Xworm V5.6.exe Set value (data) \REGISTRY\USER\S-1-5-21-3938118698-2964058152-2337880935-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\4\ComDlg\{7D49D726-3C21-4F05-99AA-FDC2C9474656}\Sort = 000000000000000000000000000000000100000030f125b7ef471a10a5f102608c9eebac0a00000001000000 Xworm V5.6.exe Set value (str) \REGISTRY\USER\S-1-5-21-3938118698-2964058152-2337880935-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\4\ComDlg\{7D49D726-3C21-4F05-99AA-FDC2C9474656}\GroupByKey:FMTID = "{00000000-0000-0000-0000-000000000000}" Xworm V5.6.exe Set value (int) \REGISTRY\USER\S-1-5-21-3938118698-2964058152-2337880935-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\4\ComDlg\{7D49D726-3C21-4F05-99AA-FDC2C9474656}\GroupByKey:PID = "0" Xworm V5.6.exe Key created \REGISTRY\USER\S-1-5-21-3938118698-2964058152-2337880935-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\4\Shell Xworm V5.6.exe Set value (int) \REGISTRY\USER\S-1-5-21-3938118698-2964058152-2337880935-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\4\ComDlg\{7D49D726-3C21-4F05-99AA-FDC2C9474656}\FFlags = "1" Xworm V5.6.exe Key created \REGISTRY\USER\S-1-5-21-3938118698-2964058152-2337880935-1000_Classes\Local Settings Xworm V5.6.exe Set value (str) \REGISTRY\USER\S-1-5-21-3938118698-2964058152-2337880935-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\4\Shell\SniffedFolderType = "Documents" Xworm V5.6.exe Key created \REGISTRY\USER\S-1-5-21-3938118698-2964058152-2337880935-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\4\ComDlg\{7D49D726-3C21-4F05-99AA-FDC2C9474656} Xworm V5.6.exe Set value (int) \REGISTRY\USER\S-1-5-21-3938118698-2964058152-2337880935-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\4\ComDlg\{7D49D726-3C21-4F05-99AA-FDC2C9474656}\LogicalViewMode = "1" Xworm V5.6.exe Set value (int) \REGISTRY\USER\S-1-5-21-3938118698-2964058152-2337880935-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\4\ComDlg\{7D49D726-3C21-4F05-99AA-FDC2C9474656}\GroupByDirection = "1" Xworm V5.6.exe Key created \REGISTRY\USER\S-1-5-21-3938118698-2964058152-2337880935-1000_Classes\Local Settings cmd.exe Key created \REGISTRY\USER\S-1-5-21-3938118698-2964058152-2337880935-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU Xworm V5.6.exe Set value (data) \REGISTRY\USER\S-1-5-21-3938118698-2964058152-2337880935-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\MRUListEx = 0100000000000000ffffffff Xworm V5.6.exe Set value (int) \REGISTRY\USER\S-1-5-21-3938118698-2964058152-2337880935-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\4\ComDlg\{7D49D726-3C21-4F05-99AA-FDC2C9474656}\Mode = "4" Xworm V5.6.exe Set value (data) \REGISTRY\USER\S-1-5-21-3938118698-2964058152-2337880935-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\4\ComDlg\{7D49D726-3C21-4F05-99AA-FDC2C9474656}\ColInfo = 00000000000000000000000000000000fddfdffd100000000000000000000000040000001800000030f125b7ef471a10a5f102608c9eebac0a0000001001000030f125b7ef471a10a5f102608c9eebac0e0000009000000030f125b7ef471a10a5f102608c9eebac040000007800000030f125b7ef471a10a5f102608c9eebac0c00000050000000 Xworm V5.6.exe Key created \REGISTRY\USER\S-1-5-21-3938118698-2964058152-2337880935-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\1 Xworm V5.6.exe Set value (data) \REGISTRY\USER\S-1-5-21-3938118698-2964058152-2337880935-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\1\MRUListEx = 0100000000000000ffffffff Xworm V5.6.exe Key created \REGISTRY\USER\S-1-5-21-3938118698-2964058152-2337880935-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags Xworm V5.6.exe Set value (int) \REGISTRY\USER\S-1-5-21-3938118698-2964058152-2337880935-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\4\ComDlg\{7D49D726-3C21-4F05-99AA-FDC2C9474656}\IconSize = "16" Xworm V5.6.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
Processes:
Xworm V5.6.exeXworm V5.6.exeXworm V5.6.exepid process 4776 Xworm V5.6.exe 4776 Xworm V5.6.exe 4776 Xworm V5.6.exe 4776 Xworm V5.6.exe 4776 Xworm V5.6.exe 4776 Xworm V5.6.exe 4776 Xworm V5.6.exe 4776 Xworm V5.6.exe 4776 Xworm V5.6.exe 4776 Xworm V5.6.exe 4776 Xworm V5.6.exe 4776 Xworm V5.6.exe 4776 Xworm V5.6.exe 4776 Xworm V5.6.exe 4776 Xworm V5.6.exe 4776 Xworm V5.6.exe 4776 Xworm V5.6.exe 4776 Xworm V5.6.exe 4776 Xworm V5.6.exe 4776 Xworm V5.6.exe 4776 Xworm V5.6.exe 4776 Xworm V5.6.exe 4776 Xworm V5.6.exe 4776 Xworm V5.6.exe 2000 Xworm V5.6.exe 2000 Xworm V5.6.exe 2000 Xworm V5.6.exe 2000 Xworm V5.6.exe 2000 Xworm V5.6.exe 2000 Xworm V5.6.exe 2000 Xworm V5.6.exe 2000 Xworm V5.6.exe 2000 Xworm V5.6.exe 2000 Xworm V5.6.exe 2000 Xworm V5.6.exe 2000 Xworm V5.6.exe 2000 Xworm V5.6.exe 2000 Xworm V5.6.exe 2000 Xworm V5.6.exe 2000 Xworm V5.6.exe 2000 Xworm V5.6.exe 2000 Xworm V5.6.exe 2000 Xworm V5.6.exe 2000 Xworm V5.6.exe 2000 Xworm V5.6.exe 2000 Xworm V5.6.exe 2000 Xworm V5.6.exe 2000 Xworm V5.6.exe 2000 Xworm V5.6.exe 2144 Xworm V5.6.exe 2144 Xworm V5.6.exe 2144 Xworm V5.6.exe 2144 Xworm V5.6.exe 2144 Xworm V5.6.exe 2144 Xworm V5.6.exe 2144 Xworm V5.6.exe 2144 Xworm V5.6.exe 2144 Xworm V5.6.exe 2144 Xworm V5.6.exe 2144 Xworm V5.6.exe 2144 Xworm V5.6.exe 2144 Xworm V5.6.exe 2144 Xworm V5.6.exe 2144 Xworm V5.6.exe -
Suspicious behavior: GetForegroundWindowSpam 3 IoCs
Processes:
Xworm V5.6.exeXworm V5.6.exeXworm V5.6.exepid process 4776 Xworm V5.6.exe 2000 Xworm V5.6.exe 2144 Xworm V5.6.exe -
Suspicious use of AdjustPrivilegeToken 6 IoCs
Processes:
7zG.exeAUDIODG.EXEdescription pid process Token: SeRestorePrivilege 1608 7zG.exe Token: 35 1608 7zG.exe Token: SeSecurityPrivilege 1608 7zG.exe Token: SeSecurityPrivilege 1608 7zG.exe Token: 33 5088 AUDIODG.EXE Token: SeIncBasePriorityPrivilege 5088 AUDIODG.EXE -
Suspicious use of FindShellTrayWindow 6 IoCs
Processes:
7zG.exeXworm V5.6.exeXworm V5.6.exeXworm V5.6.exepid process 1608 7zG.exe 4776 Xworm V5.6.exe 4776 Xworm V5.6.exe 2000 Xworm V5.6.exe 2000 Xworm V5.6.exe 2144 Xworm V5.6.exe -
Suspicious use of SendNotifyMessage 5 IoCs
Processes:
Xworm V5.6.exeXworm V5.6.exeXworm V5.6.exepid process 4776 Xworm V5.6.exe 4776 Xworm V5.6.exe 2000 Xworm V5.6.exe 2000 Xworm V5.6.exe 2144 Xworm V5.6.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
Processes:
OpenWith.exeXworm V5.6.exepid process 4924 OpenWith.exe 2144 Xworm V5.6.exe -
Suspicious use of WriteProcessMemory 4 IoCs
Processes:
Xworm V5.6.exevbc.exedescription pid process target process PID 2144 wrote to memory of 1992 2144 Xworm V5.6.exe vbc.exe PID 2144 wrote to memory of 1992 2144 Xworm V5.6.exe vbc.exe PID 1992 wrote to memory of 3228 1992 vbc.exe cvtres.exe PID 1992 wrote to memory of 3228 1992 vbc.exe cvtres.exe
Processes
-
C:\Windows\system32\cmd.execmd /c C:\Users\Admin\AppData\Local\Temp\sexy.rar1⤵
- Modifies registry class
-
C:\Windows\system32\OpenWith.exeC:\Windows\system32\OpenWith.exe -Embedding1⤵
- Modifies registry class
- Suspicious use of SetWindowsHookEx
-
C:\Windows\System32\rundll32.exeC:\Windows\System32\rundll32.exe C:\Windows\System32\shell32.dll,SHCreateLocalServerRunDll {9aa46009-3ce0-458a-a354-715610a075e6} -Embedding1⤵
-
C:\Program Files\7-Zip\7zG.exe"C:\Program Files\7-Zip\7zG.exe" x -o"C:\Users\Admin\AppData\Local\Temp\sexy\" -spe -an -ai#7zMap13575:88:7zEvent176011⤵
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
-
C:\Users\Admin\AppData\Local\Temp\sexy\Xworm V5.6.exe"C:\Users\Admin\AppData\Local\Temp\sexy\Xworm V5.6.exe"1⤵
- Executes dropped EXE
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
-
C:\Windows\system32\wbem\WmiApSrv.exeC:\Windows\system32\wbem\WmiApSrv.exe1⤵
-
C:\Windows\system32\AUDIODG.EXEC:\Windows\system32\AUDIODG.EXE 0x00000000000004E4 0x00000000000004EC1⤵
- Suspicious use of AdjustPrivilegeToken
-
C:\Users\Admin\AppData\Local\Temp\sexy\Xworm V5.6.exe"C:\Users\Admin\AppData\Local\Temp\sexy\Xworm V5.6.exe"1⤵
- Executes dropped EXE
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
-
C:\Windows\system32\wbem\WmiApSrv.exeC:\Windows\system32\wbem\WmiApSrv.exe1⤵
-
C:\Users\Admin\AppData\Local\Temp\sexy\Xworm V5.6.exe"C:\Users\Admin\AppData\Local\Temp\sexy\Xworm V5.6.exe"1⤵
- Executes dropped EXE
- Enumerates system info in registry
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
-
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\vbc.exe"C:\Windows\Microsoft.NET\Framework64\v4.0.30319\vbc.exe" /noconfig @"C:\Users\Admin\AppData\Local\Temp\1qzqluca\1qzqluca.cmdline"2⤵
- Suspicious use of WriteProcessMemory
-
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\cvtres.exeC:\Windows\Microsoft.NET\Framework64\v4.0.30319\cvtres.exe /NOLOGO /READONLY /MACHINE:IX86 "/OUT:C:\Users\Admin\AppData\Local\Temp\RES8AAB.tmp" "C:\Users\Admin\AppData\Local\Temp\vbcA005F5F473C14F3696A86A47FD3AC62.TMP"3⤵
-
C:\Windows\system32\wbem\WmiApSrv.exeC:\Windows\system32\wbem\WmiApSrv.exe1⤵
Network
MITRE ATT&CK Matrix ATT&CK v13
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Local\Microsoft\CLR_v4.0\UsageLogs\Xworm V5.6.exe.logFilesize
1KB
MD58e0f23092b7a620dc2f45b4a9a596029
SHA158cc7c47602c73529e91ff9db3c74ff05459e4ea
SHA25658b9918225aee046894cb3c6263687bfe4b5a5b8dff7196d72687d0f3f735034
SHA512be458f811ad6a1f6b320e8d3e68e71062a8de686bae77c400d65091947b805c95024f3f1837e088cf5ecac5388d36f354285a6b57f91ea55567f19706128a043
-
C:\Users\Admin\AppData\Local\Temp\1qzqluca\1qzqluca.0.vbFilesize
78KB
MD566836c766dcc211f911a4e39e3e69981
SHA17d098efe4c98e1d91cf4a18bb1c2152fb6c43f5a
SHA2567d4c1a4255eaa7f18f3d627bbc5d4c3cbd8fcf17d35d0f4807478de375fe9ea1
SHA5128c7bed1205bec1f401905eb52c4870c346de7ba7794bc53d82cb32417587573cac66d400af625d41f907156ad40d6d08de94e79adee591b2bc6ffff0c997eab9
-
C:\Users\Admin\AppData\Local\Temp\1qzqluca\1qzqluca.cmdlineFilesize
292B
MD5f7e3232f7b144ff28ca9eb34328580c8
SHA138abebf59986c82518de76de56137773d4921020
SHA256117dafe3a4705d449528e5e09d4b07c0f2542ac121872b73bb1b5bf1607a23a1
SHA512be2721fa375ca0cfaa56affa28839f4d1f7d6ae16df1a1d99b683b54a0b669fba6d6ec78d8c6546f1794b3f9fbc339588aa0fe31672581ef50e231066f6f858c
-
C:\Users\Admin\AppData\Local\Temp\RES8AAB.tmpFilesize
1KB
MD581e47cd11acfd797fcfbcc19ca6014aa
SHA1247c066f0f2a05250fecc920b7c41ceec7dec5cb
SHA256d3269b1b8a24998f26b3e7e40603600e54595eaf4882e5d13ce583384d235727
SHA512fbf8ff7bb6212530185e22cc5adcecce5711a8999d303faf314fbd61ed96e214d7482946a949a78c90fefb67bd527935d4f655e415e5576369209f153dc5418c
-
C:\Users\Admin\AppData\Local\Temp\sexy\ClientsFolder\F26943D0D149AD3F4279\Recovery\RecoveryData\cookies.jsonFilesize
2B
MD5d751713988987e9331980363e24189ce
SHA197d170e1550eee4afc0af065b78cda302a97674c
SHA2564f53cda18c2baa0c0354bb5f9a3ecbe5ed12ab4d8e11ba873c2f11161202b945
SHA512b25b294cb4deb69ea00a4c3cf3113904801b6015e5956bd019a8570b1fe1d6040e944ef3cdee16d0a46503ca6e659a25f21cf9ceddc13f352a3c98138c15d6af
-
C:\Users\Admin\AppData\Local\Temp\sexy\GeoIP.datFilesize
1.2MB
MD58ef41798df108ce9bd41382c9721b1c9
SHA11e6227635a12039f4d380531b032bf773f0e6de0
SHA256bc07ff22d4ee0b6fafcc12482ecf2981c172a672194c647cedf9b4d215ad9740
SHA5124c62af04d4a141b94eb3e1b0dbf3669cb53fe9b942072ed7bea6a848d87d8994cff5a5f639ab70f424eb79a4b7adabdde4da6d2f02f995bd8d55db23ce99f01b
-
C:\Users\Admin\AppData\Local\Temp\sexy\Guna.UI2.dllFilesize
1.9MB
MD5bcc0fe2b28edd2da651388f84599059b
SHA144d7756708aafa08730ca9dbdc01091790940a4f
SHA256c6264665a882e73eb2262a74fea2c29b1921a9af33180126325fb67a851310ef
SHA5123bfc3d27c095dde988f779021d0479c8c1de80a404454813c6cae663e3fe63dc636bffa7de1094e18594c9d608fa7420a0651509544722f2a00288f0b7719cc8
-
C:\Users\Admin\AppData\Local\Temp\sexy\Icons\icon (15).icoFilesize
361KB
MD5e3143e8c70427a56dac73a808cba0c79
SHA163556c7ad9e778d5bd9092f834b5cc751e419d16
SHA256b2f57a23ecc789c1bbf6037ac0825bf98babc7bf0c5d438af5e2767a27a79188
SHA51274e0f4b55625df86a87b9315e4007be8e05bbecca4346a6ea06ef5b1528acb5a8bb636ef3e599a3820dbddcf69563a0a22e2c1062c965544fd75ec96fd9803fc
-
C:\Users\Admin\AppData\Local\Temp\sexy\SimpleObfuscator.dllFilesize
1.4MB
MD59043d712208178c33ba8e942834ce457
SHA1e0fa5c730bf127a33348f5d2a5673260ae3719d1
SHA256b7a6eea19188b987dad97b32d774107e9a1beb4f461a654a00197d73f7fad54c
SHA512dd6fa02ab70c58cde75fd4d4714e0ed0df5d3b18f737c68c93dba40c30376cc93957f8eef69fea86041489546ce4239b35a3b5d639472fd54b80f2f7260c8f65
-
C:\Users\Admin\AppData\Local\Temp\sexy\Sounds\Intro.wavFilesize
238KB
MD5ad3b4fae17bcabc254df49f5e76b87a6
SHA11683ff029eebaffdc7a4827827da7bb361c8747e
SHA256e3e5029bf5f29fa32d2f6cdda35697cd8e6035d5c78615f64d0b305d1bd926cf
SHA5123d6ecc9040b5079402229c214cb5f9354315131a630c43d1da95248edc1b97627fb9ba032d006380a67409619763fb91976295f8d22ca91894c88f38bb610cd3
-
C:\Users\Admin\AppData\Local\Temp\sexy\Xworm V5.6.exeFilesize
14.9MB
MD556ccb739926a725e78a7acf9af52c4bb
SHA15b01b90137871c3c8f0d04f510c4d56b23932cbc
SHA25690f58865f265722ab007abb25074b3fc4916e927402552c6be17ef9afac96405
SHA5122fee662bc4a1a36ce7328b23f991fa4a383b628839e403d6eb6a9533084b17699a6c939509867a86e803aafef2f9def98fa9305b576dad754aa7f599920c19a1
-
C:\Users\Admin\AppData\Local\Temp\sexy\Xworm V5.6.exeFilesize
7.1MB
MD5c464e152cccc8b6b8c31a2f2f2c47f56
SHA16f33badc5bf718775f7e8e403b5804b7dc936735
SHA2564636f65685d60199313f678502dc00d03f6007a96568187f47e5c3f09f5b9a59
SHA512097bb2e5a7ff944ce59470b64cb18cec1a660c9f009b3244aac81bd128469521fa97ec7af86309469df1acaa40cfe8c9b72835bc56f9397d9739a99f27befa48
-
C:\Users\Admin\AppData\Local\Temp\sexy\Xworm V5.6.exe.configFilesize
183B
MD566f09a3993dcae94acfe39d45b553f58
SHA19d09f8e22d464f7021d7f713269b8169aed98682
SHA2567ea08548c23bd7fd7c75ca720ac5a0e8ca94cb51d06cd45ebf5f412e4bbdd7d7
SHA512c8ea53ab187a720080bd8d879704e035f7e632afe1ee93e7637fad6bb7e40d33a5fe7e5c3d69134209487d225e72d8d944a43a28dc32922e946023e89abc93ed
-
C:\Users\Admin\AppData\Local\Temp\vbcA005F5F473C14F3696A86A47FD3AC62.TMPFilesize
1KB
MD5d40c58bd46211e4ffcbfbdfac7c2bb69
SHA1c5cf88224acc284a4e81bd612369f0e39f3ac604
SHA25601902f1903d080c6632ae2209136e8e713e9fd408db4621ae21246b65bfea2ca
SHA51248b14748e86b7d92a3ea18f29caf1d7b4b2e1de75377012378d146575048a2531d2e5aaeae1abf2d322d06146177cdbf0c2940ac023efae007b9f235f18e2c68
-
memory/2000-347-0x000001EF41F20000-0x000001EF41F66000-memory.dmpFilesize
280KB
-
memory/2000-351-0x000001EF41FC0000-0x000001EF41FCB000-memory.dmpFilesize
44KB
-
memory/2000-348-0x000001EF41F00000-0x000001EF41F09000-memory.dmpFilesize
36KB
-
memory/2000-349-0x000001EF41F90000-0x000001EF41F9D000-memory.dmpFilesize
52KB
-
memory/2000-350-0x000001EF41FA0000-0x000001EF41FBE000-memory.dmpFilesize
120KB
-
memory/2144-445-0x0000026BFC350000-0x0000026BFC4B8000-memory.dmpFilesize
1.4MB
-
memory/4776-325-0x000002352F980000-0x000002352F989000-memory.dmpFilesize
36KB
-
memory/4776-341-0x000002352F980000-0x000002352F989000-memory.dmpFilesize
36KB
-
memory/4776-340-0x000002352F930000-0x000002352F976000-memory.dmpFilesize
280KB
-
memory/4776-342-0x000002352F9B0000-0x000002352F9BD000-memory.dmpFilesize
52KB
-
memory/4776-326-0x000002352F9B0000-0x000002352F9BD000-memory.dmpFilesize
52KB
-
memory/4776-343-0x000002352F9C0000-0x000002352F9DE000-memory.dmpFilesize
120KB
-
memory/4776-324-0x000002352F930000-0x000002352F976000-memory.dmpFilesize
280KB
-
memory/4776-344-0x000002352F9E0000-0x000002352F9EB000-memory.dmpFilesize
44KB
-
memory/4776-327-0x000002352F9C0000-0x000002352F9DE000-memory.dmpFilesize
120KB
-
memory/4776-328-0x000002352F9E0000-0x000002352F9EB000-memory.dmpFilesize
44KB
-
memory/4776-321-0x0000023530A50000-0x0000023530C44000-memory.dmpFilesize
2.0MB
-
memory/4776-319-0x00000235140A0000-0x0000023514F88000-memory.dmpFilesize
14.9MB