Analysis
-
max time kernel
218s -
max time network
213s -
platform
windows11-21h2_x64 -
resource
win11-20240802-en -
resource tags
arch:x64arch:x86image:win11-20240802-enlocale:en-usos:windows11-21h2-x64system -
submitted
29/08/2024, 22:45
Static task
static1
General
-
Target
XWorm v5.1-5.2.7z
-
Size
54.5MB
-
MD5
76219b3556e25086fc52f8e2b93fbd0c
-
SHA1
066a0f875820e51a60c3552a06b7b97f8bab6bbc
-
SHA256
fe6371034d55bb7583081b03f4aec7274f8340cfea4740325cb52e1c6ac77f6d
-
SHA512
ccc974b8e446409c7940ef8314b2a912a2f8c0272721148d4dca5b739702106e69c9c7d106137a576b7a7a846d4f9ac770685a07d7a588ba34d0167acb07f104
-
SSDEEP
786432:8IagoCEXKlCpMqIEJkseGG+5ELbzcFdcyt5/ks3FkAPYxpL+q7RRHEm+0NyvZZGl:8JgXCzIsGrPzcFrt1F3Yxxrr+4yvZE
Malware Config
Signatures
-
AgentTesla
Agent Tesla is a remote access tool (RAT) written in visual basic.
-
AgentTesla payload 2 IoCs
resource yara_rule behavioral1/files/0x000100000002abb0-1328.dat family_agenttesla behavioral1/memory/1032-1329-0x000001CD791A0000-0x000001CD79394000-memory.dmp family_agenttesla -
Executes dropped EXE 2 IoCs
pid Process 1032 XWorm V5.2.exe 6496 XWormLoader 5.2 x64.exe -
Loads dropped DLL 2 IoCs
pid Process 1032 XWorm V5.2.exe 6496 XWormLoader 5.2 x64.exe -
Obfuscated with Agile.Net obfuscator 3 IoCs
Detects use of the Agile.Net commercial obfuscator, which is capable of entity renaming and control flow obfuscation.
resource yara_rule behavioral1/files/0x000100000002abe5-764.dat agile_net behavioral1/memory/1032-1319-0x000001CD73FF0000-0x000001CD74C28000-memory.dmp agile_net behavioral1/memory/6496-1479-0x00000231A0CB0000-0x00000231A18E8000-memory.dmp agile_net -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Checks processor information in registry 2 TTPs 8 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~Mhz firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~Mhz firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString firefox.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Update Signature firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Update Revision firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\VendorIdentifier firefox.exe -
Enumerates system info in registry 2 TTPs 9 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS XWorm V5.2.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer XWorm V5.2.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemVersion XWorm V5.2.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS XWormLoader 5.2 x64.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer XWormLoader 5.2 x64.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemVersion XWormLoader 5.2 x64.exe -
Modifies registry class 64 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-6179872-1886041298-1573312864-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags OpenWith.exe Set value (data) \REGISTRY\USER\S-1-5-21-6179872-1886041298-1573312864-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\1\ComDlg\{5C4F28B5-F869-4E84-8E60-F11DB97C5CC7}\Sort = 000000000000000000000000000000000100000030f125b7ef471a10a5f102608c9eebac0a00000001000000 OpenWith.exe Set value (data) \REGISTRY\USER\S-1-5-21-6179872-1886041298-1573312864-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\2\ComDlg\{5C4F28B5-F869-4E84-8E60-F11DB97C5CC7}\Sort = 000000000000000000000000000000000100000030f125b7ef471a10a5f102608c9eebac0a00000001000000 OpenWith.exe Key created \REGISTRY\USER\S-1-5-21-6179872-1886041298-1573312864-1000_Classes\Applications\7zFM.exe\shell\open OpenWith.exe Set value (data) \REGISTRY\USER\S-1-5-21-6179872-1886041298-1573312864-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\2\ComDlg\{5C4F28B5-F869-4E84-8E60-F11DB97C5CC7}\ColInfo = 00000000000000000000000000000000fddfdffd100000000000000000000000040000001800000030f125b7ef471a10a5f102608c9eebac0a0000001001000030f125b7ef471a10a5f102608c9eebac0e0000009000000030f125b7ef471a10a5f102608c9eebac040000007800000030f125b7ef471a10a5f102608c9eebac0c00000050000000 OpenWith.exe Key created \REGISTRY\USER\S-1-5-21-6179872-1886041298-1573312864-1000_Classes\Local Settings cmd.exe Key created \REGISTRY\USER\S-1-5-21-6179872-1886041298-1573312864-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU OpenWith.exe Set value (data) \REGISTRY\USER\S-1-5-21-6179872-1886041298-1573312864-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\0 = 14001f50e04fd020ea3a6910a2d808002b30309d0000 OpenWith.exe Key created \REGISTRY\USER\S-1-5-21-6179872-1886041298-1573312864-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\1\ComDlg OpenWith.exe Set value (data) \REGISTRY\USER\S-1-5-21-6179872-1886041298-1573312864-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\0\0\0\MRUListEx = 00000000ffffffff OpenWith.exe Key created \REGISTRY\USER\S-1-5-21-6179872-1886041298-1573312864-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\0 OpenWith.exe Set value (str) \REGISTRY\USER\S-1-5-21-6179872-1886041298-1573312864-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\2\Shell\SniffedFolderType = "Generic" OpenWith.exe Set value (int) \REGISTRY\USER\S-1-5-21-6179872-1886041298-1573312864-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\2\ComDlg\{5C4F28B5-F869-4E84-8E60-F11DB97C5CC7}\LogicalViewMode = "1" OpenWith.exe Key created \REGISTRY\USER\S-1-5-21-6179872-1886041298-1573312864-1000_Classes\Local Settings firefox.exe Set value (int) \REGISTRY\USER\S-1-5-21-6179872-1886041298-1573312864-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\1\ComDlg\{5C4F28B5-F869-4E84-8E60-F11DB97C5CC7}\IconSize = "16" OpenWith.exe Set value (int) \REGISTRY\USER\S-1-5-21-6179872-1886041298-1573312864-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\0\0\0\0\NodeSlot = "2" OpenWith.exe Set value (data) \REGISTRY\USER\S-1-5-21-6179872-1886041298-1573312864-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\0\0\0\0\MRUListEx = ffffffff OpenWith.exe Key created \REGISTRY\USER\S-1-5-21-6179872-1886041298-1573312864-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\2\Shell OpenWith.exe Set value (int) \REGISTRY\USER\S-1-5-21-6179872-1886041298-1573312864-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\2\ComDlg\{5C4F28B5-F869-4E84-8E60-F11DB97C5CC7}\GroupView = "0" OpenWith.exe Set value (data) \REGISTRY\USER\S-1-5-21-6179872-1886041298-1573312864-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\NodeSlots = 02 OpenWith.exe Set value (int) \REGISTRY\USER\S-1-5-21-6179872-1886041298-1573312864-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\0\0\0\NodeSlot = "1" OpenWith.exe Set value (int) \REGISTRY\USER\S-1-5-21-6179872-1886041298-1573312864-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\1\ComDlg\{5C4F28B5-F869-4E84-8E60-F11DB97C5CC7}\LogicalViewMode = "1" OpenWith.exe Set value (int) \REGISTRY\USER\S-1-5-21-6179872-1886041298-1573312864-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\1\ComDlg\{5C4F28B5-F869-4E84-8E60-F11DB97C5CC7}\GroupView = "0" OpenWith.exe Key created \REGISTRY\USER\S-1-5-21-6179872-1886041298-1573312864-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\2\ComDlg OpenWith.exe Key created \REGISTRY\USER\S-1-5-21-6179872-1886041298-1573312864-1000_Classes\Applications\7zFM.exe OpenWith.exe Key created \REGISTRY\USER\S-1-5-21-6179872-1886041298-1573312864-1000_Classes\Applications\7zFM.exe\shell OpenWith.exe Set value (data) \REGISTRY\USER\S-1-5-21-6179872-1886041298-1573312864-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\0\MRUListEx = 00000000ffffffff OpenWith.exe Set value (data) \REGISTRY\USER\S-1-5-21-6179872-1886041298-1573312864-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\0\0\0\MRUListEx = ffffffff OpenWith.exe Set value (int) \REGISTRY\USER\S-1-5-21-6179872-1886041298-1573312864-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\1\ComDlg\{5C4F28B5-F869-4E84-8E60-F11DB97C5CC7}\FFlags = "1092616257" OpenWith.exe Set value (data) \REGISTRY\USER\S-1-5-21-6179872-1886041298-1573312864-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\0\0\0\0 = 50003100000000000259e17b1000372d5a6970003c0009000400efbe0259e17b0259e17b2e000000b79d020000000a000000000000000000000000000000bc4c490037002d005a0069007000000014000000 OpenWith.exe Key created \REGISTRY\USER\S-1-5-21-6179872-1886041298-1573312864-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\2 OpenWith.exe Set value (str) \REGISTRY\USER\S-1-5-21-6179872-1886041298-1573312864-1000_Classes\Applications\7zFM.exe\shell\open\command\ = "\"C:\\Program Files\\7-Zip\\7zFM.exe\" \"%1\"" OpenWith.exe Set value (data) \REGISTRY\USER\S-1-5-21-6179872-1886041298-1573312864-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\0\0 = 19002f433a5c000000000000000000000000000000000000000000 OpenWith.exe Key created \REGISTRY\USER\S-1-5-21-6179872-1886041298-1573312864-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\0\0 OpenWith.exe Key created \REGISTRY\USER\S-1-5-21-6179872-1886041298-1573312864-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\1 OpenWith.exe Set value (int) \REGISTRY\USER\S-1-5-21-6179872-1886041298-1573312864-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\1\ComDlg\{5C4F28B5-F869-4E84-8E60-F11DB97C5CC7}\GroupByDirection = "1" OpenWith.exe Set value (data) \REGISTRY\USER\S-1-5-21-6179872-1886041298-1573312864-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\NodeSlots = 0202 OpenWith.exe Set value (str) \REGISTRY\USER\S-1-5-21-6179872-1886041298-1573312864-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\1\Shell\SniffedFolderType = "Generic" OpenWith.exe Set value (data) \REGISTRY\USER\S-1-5-21-6179872-1886041298-1573312864-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\1\ComDlg\{5C4F28B5-F869-4E84-8E60-F11DB97C5CC7}\ColInfo = 00000000000000000000000000000000fddfdffd100000000000000000000000040000001800000030f125b7ef471a10a5f102608c9eebac0a0000001001000030f125b7ef471a10a5f102608c9eebac0e0000009000000030f125b7ef471a10a5f102608c9eebac040000007800000030f125b7ef471a10a5f102608c9eebac0c00000050000000 OpenWith.exe Set value (int) \REGISTRY\USER\S-1-5-21-6179872-1886041298-1573312864-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\2\ComDlg\{5C4F28B5-F869-4E84-8E60-F11DB97C5CC7}\Mode = "4" OpenWith.exe Set value (data) \REGISTRY\USER\S-1-5-21-6179872-1886041298-1573312864-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\0\0\MRUListEx = 00000000ffffffff OpenWith.exe Set value (int) \REGISTRY\USER\S-1-5-21-6179872-1886041298-1573312864-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\1\ComDlg\{5C4F28B5-F869-4E84-8E60-F11DB97C5CC7}\Mode = "4" OpenWith.exe Set value (str) \REGISTRY\USER\S-1-5-21-6179872-1886041298-1573312864-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\2\ComDlg\{5C4F28B5-F869-4E84-8E60-F11DB97C5CC7}\GroupByKey:FMTID = "{00000000-0000-0000-0000-000000000000}" OpenWith.exe Set value (int) \REGISTRY\USER\S-1-5-21-6179872-1886041298-1573312864-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\2\ComDlg\{5C4F28B5-F869-4E84-8E60-F11DB97C5CC7}\GroupByDirection = "1" OpenWith.exe Key created \REGISTRY\USER\S-1-5-21-6179872-1886041298-1573312864-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\2\ComDlg\{5C4F28B5-F869-4E84-8E60-F11DB97C5CC7} OpenWith.exe Set value (int) \REGISTRY\USER\S-1-5-21-6179872-1886041298-1573312864-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\2\ComDlg\{5C4F28B5-F869-4E84-8E60-F11DB97C5CC7}\IconSize = "16" OpenWith.exe Set value (int) \REGISTRY\USER\S-1-5-21-6179872-1886041298-1573312864-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\2\ComDlg\{5C4F28B5-F869-4E84-8E60-F11DB97C5CC7}\GroupByKey:PID = "0" OpenWith.exe Key created \REGISTRY\USER\S-1-5-21-6179872-1886041298-1573312864-1000_Classes\Local Settings OpenWith.exe Set value (data) \REGISTRY\USER\S-1-5-21-6179872-1886041298-1573312864-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\NodeSlots OpenWith.exe Key created \REGISTRY\USER\S-1-5-21-6179872-1886041298-1573312864-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\0\0\0 OpenWith.exe Key created \REGISTRY\USER\S-1-5-21-6179872-1886041298-1573312864-1000_Classes\CLSID\{018D5C66-4533-4307-9B53-224DE2ED1FE6}\Instance\ OpenWith.exe Key created \REGISTRY\USER\S-1-5-21-6179872-1886041298-1573312864-1000_Classes\Applications\7zFM.exe\shell\open\command OpenWith.exe Key created \REGISTRY\USER\S-1-5-21-6179872-1886041298-1573312864-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\1\ComDlg\{5C4F28B5-F869-4E84-8E60-F11DB97C5CC7} OpenWith.exe Set value (int) \REGISTRY\USER\S-1-5-21-6179872-1886041298-1573312864-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\2\ComDlg\{5C4F28B5-F869-4E84-8E60-F11DB97C5CC7}\FFlags = "1" OpenWith.exe Key created \REGISTRY\USER\S-1-5-21-6179872-1886041298-1573312864-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell OpenWith.exe Set value (int) \REGISTRY\USER\S-1-5-21-6179872-1886041298-1573312864-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\1\ComDlg\{5C4F28B5-F869-4E84-8E60-F11DB97C5CC7}\FFlags = "1" OpenWith.exe Key created \REGISTRY\USER\S-1-5-21-6179872-1886041298-1573312864-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\0\0\0\0 OpenWith.exe Set value (data) \REGISTRY\USER\S-1-5-21-6179872-1886041298-1573312864-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\MRUListEx = 00000000ffffffff OpenWith.exe Set value (data) \REGISTRY\USER\S-1-5-21-6179872-1886041298-1573312864-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\0\0\0 = 8c003100000000000259177d110050524f4752417e310000740009000400efbec55259610259177d2e0000003f0000000000010000000000000000004a00000000009468c500500072006f006700720061006d002000460069006c0065007300000040007300680065006c006c00330032002e0064006c006c002c002d0032003100370038003100000018000000 OpenWith.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{4336a54d-038b-4685-ab02-99bb52d3fb8b}\Instance\ OpenWith.exe Set value (int) \REGISTRY\USER\S-1-5-21-6179872-1886041298-1573312864-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\2\ComDlg\{5C4F28B5-F869-4E84-8E60-F11DB97C5CC7}\FFlags = "1092616257" OpenWith.exe Set value (data) \REGISTRY\USER\S-1-5-21-6179872-1886041298-1573312864-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\MRUListEx = ffffffff OpenWith.exe Key created \REGISTRY\USER\S-1-5-21-6179872-1886041298-1573312864-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\1\Shell OpenWith.exe Key created \REGISTRY\USER\S-1-5-21-6179872-1886041298-1573312864-1000_Classes\Applications OpenWith.exe -
Suspicious behavior: EnumeratesProcesses 38 IoCs
pid Process 1504 msedge.exe 1504 msedge.exe 6036 msedge.exe 6036 msedge.exe 5972 msedge.exe 5972 msedge.exe 1436 identity_helper.exe 1436 identity_helper.exe 6496 XWormLoader 5.2 x64.exe 6496 XWormLoader 5.2 x64.exe 6496 XWormLoader 5.2 x64.exe 6496 XWormLoader 5.2 x64.exe 6496 XWormLoader 5.2 x64.exe 6496 XWormLoader 5.2 x64.exe 6496 XWormLoader 5.2 x64.exe 6496 XWormLoader 5.2 x64.exe 6496 XWormLoader 5.2 x64.exe 6496 XWormLoader 5.2 x64.exe 6496 XWormLoader 5.2 x64.exe 6496 XWormLoader 5.2 x64.exe 6496 XWormLoader 5.2 x64.exe 6496 XWormLoader 5.2 x64.exe 6496 XWormLoader 5.2 x64.exe 6496 XWormLoader 5.2 x64.exe 6496 XWormLoader 5.2 x64.exe 6496 XWormLoader 5.2 x64.exe 6496 XWormLoader 5.2 x64.exe 6496 XWormLoader 5.2 x64.exe 6496 XWormLoader 5.2 x64.exe 6496 XWormLoader 5.2 x64.exe 6496 XWormLoader 5.2 x64.exe 6496 XWormLoader 5.2 x64.exe 6496 XWormLoader 5.2 x64.exe 6496 XWormLoader 5.2 x64.exe 6496 XWormLoader 5.2 x64.exe 6496 XWormLoader 5.2 x64.exe 6496 XWormLoader 5.2 x64.exe 6496 XWormLoader 5.2 x64.exe -
Suspicious behavior: GetForegroundWindowSpam 3 IoCs
pid Process 2000 OpenWith.exe 580 7zFM.exe 6496 XWormLoader 5.2 x64.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 9 IoCs
pid Process 6036 msedge.exe 6036 msedge.exe 6036 msedge.exe 6036 msedge.exe 6036 msedge.exe 6036 msedge.exe 6036 msedge.exe 6036 msedge.exe 6036 msedge.exe -
Suspicious use of AdjustPrivilegeToken 12 IoCs
description pid Process Token: SeRestorePrivilege 580 7zFM.exe Token: 35 580 7zFM.exe Token: SeSecurityPrivilege 580 7zFM.exe Token: SeDebugPrivilege 1096 firefox.exe Token: SeDebugPrivilege 1096 firefox.exe Token: SeDebugPrivilege 1032 XWorm V5.2.exe Token: SeDebugPrivilege 1096 firefox.exe Token: SeDebugPrivilege 1096 firefox.exe Token: SeDebugPrivilege 1096 firefox.exe Token: SeDebugPrivilege 6496 XWormLoader 5.2 x64.exe Token: 33 7044 AUDIODG.EXE Token: SeIncBasePriorityPrivilege 7044 AUDIODG.EXE -
Suspicious use of FindShellTrayWindow 64 IoCs
pid Process 580 7zFM.exe 580 7zFM.exe 1096 firefox.exe 1096 firefox.exe 1096 firefox.exe 1096 firefox.exe 1096 firefox.exe 1096 firefox.exe 1096 firefox.exe 1096 firefox.exe 1096 firefox.exe 1096 firefox.exe 1096 firefox.exe 1096 firefox.exe 1096 firefox.exe 1096 firefox.exe 1096 firefox.exe 1096 firefox.exe 1096 firefox.exe 1096 firefox.exe 1096 firefox.exe 1096 firefox.exe 1096 firefox.exe 1096 firefox.exe 1096 firefox.exe 1096 firefox.exe 1096 firefox.exe 1096 firefox.exe 1096 firefox.exe 1096 firefox.exe 1096 firefox.exe 1096 firefox.exe 1096 firefox.exe 1096 firefox.exe 1096 firefox.exe 1096 firefox.exe 1096 firefox.exe 1096 firefox.exe 1096 firefox.exe 6036 msedge.exe 6036 msedge.exe 6036 msedge.exe 6036 msedge.exe 6036 msedge.exe 6036 msedge.exe 6036 msedge.exe 6036 msedge.exe 6036 msedge.exe 6036 msedge.exe 6036 msedge.exe 6036 msedge.exe 6036 msedge.exe 6036 msedge.exe 6036 msedge.exe 6036 msedge.exe 6036 msedge.exe 6036 msedge.exe 6036 msedge.exe 6036 msedge.exe 6036 msedge.exe 6036 msedge.exe 6036 msedge.exe 6036 msedge.exe 6036 msedge.exe -
Suspicious use of SendNotifyMessage 17 IoCs
pid Process 1096 firefox.exe 1096 firefox.exe 1096 firefox.exe 1096 firefox.exe 6036 msedge.exe 6036 msedge.exe 6036 msedge.exe 6036 msedge.exe 6036 msedge.exe 6036 msedge.exe 6036 msedge.exe 6036 msedge.exe 6036 msedge.exe 6036 msedge.exe 6036 msedge.exe 6036 msedge.exe 6496 XWormLoader 5.2 x64.exe -
Suspicious use of SetWindowsHookEx 16 IoCs
pid Process 2000 OpenWith.exe 2000 OpenWith.exe 2000 OpenWith.exe 2000 OpenWith.exe 2000 OpenWith.exe 2000 OpenWith.exe 2000 OpenWith.exe 2000 OpenWith.exe 2000 OpenWith.exe 2000 OpenWith.exe 2000 OpenWith.exe 2000 OpenWith.exe 1096 firefox.exe 1096 firefox.exe 1096 firefox.exe 1096 firefox.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2000 wrote to memory of 580 2000 OpenWith.exe 89 PID 2000 wrote to memory of 580 2000 OpenWith.exe 89 PID 2284 wrote to memory of 1096 2284 firefox.exe 96 PID 2284 wrote to memory of 1096 2284 firefox.exe 96 PID 2284 wrote to memory of 1096 2284 firefox.exe 96 PID 2284 wrote to memory of 1096 2284 firefox.exe 96 PID 2284 wrote to memory of 1096 2284 firefox.exe 96 PID 2284 wrote to memory of 1096 2284 firefox.exe 96 PID 2284 wrote to memory of 1096 2284 firefox.exe 96 PID 2284 wrote to memory of 1096 2284 firefox.exe 96 PID 2284 wrote to memory of 1096 2284 firefox.exe 96 PID 2284 wrote to memory of 1096 2284 firefox.exe 96 PID 2284 wrote to memory of 1096 2284 firefox.exe 96 PID 1096 wrote to memory of 444 1096 firefox.exe 97 PID 1096 wrote to memory of 444 1096 firefox.exe 97 PID 1096 wrote to memory of 444 1096 firefox.exe 97 PID 1096 wrote to memory of 444 1096 firefox.exe 97 PID 1096 wrote to memory of 444 1096 firefox.exe 97 PID 1096 wrote to memory of 444 1096 firefox.exe 97 PID 1096 wrote to memory of 444 1096 firefox.exe 97 PID 1096 wrote to memory of 444 1096 firefox.exe 97 PID 1096 wrote to memory of 444 1096 firefox.exe 97 PID 1096 wrote to memory of 444 1096 firefox.exe 97 PID 1096 wrote to memory of 444 1096 firefox.exe 97 PID 1096 wrote to memory of 444 1096 firefox.exe 97 PID 1096 wrote to memory of 444 1096 firefox.exe 97 PID 1096 wrote to memory of 444 1096 firefox.exe 97 PID 1096 wrote to memory of 444 1096 firefox.exe 97 PID 1096 wrote to memory of 444 1096 firefox.exe 97 PID 1096 wrote to memory of 444 1096 firefox.exe 97 PID 1096 wrote to memory of 444 1096 firefox.exe 97 PID 1096 wrote to memory of 444 1096 firefox.exe 97 PID 1096 wrote to memory of 444 1096 firefox.exe 97 PID 1096 wrote to memory of 444 1096 firefox.exe 97 PID 1096 wrote to memory of 444 1096 firefox.exe 97 PID 1096 wrote to memory of 444 1096 firefox.exe 97 PID 1096 wrote to memory of 444 1096 firefox.exe 97 PID 1096 wrote to memory of 444 1096 firefox.exe 97 PID 1096 wrote to memory of 444 1096 firefox.exe 97 PID 1096 wrote to memory of 444 1096 firefox.exe 97 PID 1096 wrote to memory of 444 1096 firefox.exe 97 PID 1096 wrote to memory of 444 1096 firefox.exe 97 PID 1096 wrote to memory of 444 1096 firefox.exe 97 PID 1096 wrote to memory of 444 1096 firefox.exe 97 PID 1096 wrote to memory of 444 1096 firefox.exe 97 PID 1096 wrote to memory of 444 1096 firefox.exe 97 PID 1096 wrote to memory of 444 1096 firefox.exe 97 PID 1096 wrote to memory of 444 1096 firefox.exe 97 PID 1096 wrote to memory of 444 1096 firefox.exe 97 PID 1096 wrote to memory of 444 1096 firefox.exe 97 PID 1096 wrote to memory of 444 1096 firefox.exe 97 PID 1096 wrote to memory of 444 1096 firefox.exe 97 PID 1096 wrote to memory of 444 1096 firefox.exe 97 PID 1096 wrote to memory of 444 1096 firefox.exe 97 PID 1096 wrote to memory of 444 1096 firefox.exe 97 PID 1096 wrote to memory of 444 1096 firefox.exe 97 PID 1096 wrote to memory of 444 1096 firefox.exe 97 PID 1096 wrote to memory of 444 1096 firefox.exe 97 PID 1096 wrote to memory of 4728 1096 firefox.exe 98 PID 1096 wrote to memory of 4728 1096 firefox.exe 98 PID 1096 wrote to memory of 4728 1096 firefox.exe 98 PID 1096 wrote to memory of 4728 1096 firefox.exe 98 PID 1096 wrote to memory of 4728 1096 firefox.exe 98 PID 1096 wrote to memory of 4728 1096 firefox.exe 98 -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
Processes
-
C:\Windows\system32\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\XWorm v5.1-5.2.7z"1⤵
- Modifies registry class
PID:1028
-
C:\Windows\system32\OpenWith.exeC:\Windows\system32\OpenWith.exe -Embedding1⤵
- Modifies registry class
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2000 -
C:\Program Files\7-Zip\7zFM.exe"C:\Program Files\7-Zip\7zFM.exe" "C:\Users\Admin\AppData\Local\Temp\XWorm v5.1-5.2.7z"2⤵
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
PID:580
-
-
C:\Windows\System32\rundll32.exeC:\Windows\System32\rundll32.exe C:\Windows\System32\shell32.dll,SHCreateLocalServerRunDll {9aa46009-3ce0-458a-a354-715610a075e6} -Embedding1⤵PID:836
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:2284 -
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe"2⤵
- Checks processor information in registry
- Modifies registry class
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1096 -
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=1956 -parentBuildID 20240401114208 -prefsHandle 1880 -prefMapHandle 1896 -prefsLen 23678 -prefMapSize 244658 -appDir "C:\Program Files\Mozilla Firefox\browser" - {0eeb7e4a-199e-4f83-ab02-3f37b6e125bf} 1096 "\\.\pipe\gecko-crash-server-pipe.1096" gpu3⤵PID:444
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=2380 -parentBuildID 20240401114208 -prefsHandle 2372 -prefMapHandle 2368 -prefsLen 23714 -prefMapSize 244658 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {c79be947-bc8f-435a-b0aa-f90cf0beb52c} 1096 "\\.\pipe\gecko-crash-server-pipe.1096" socket3⤵PID:4728
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=3288 -childID 1 -isForBrowser -prefsHandle 3280 -prefMapHandle 3276 -prefsLen 23855 -prefMapSize 244658 -jsInitHandle 1284 -jsInitLen 234952 -parentBuildID 20240401114208 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {674d6671-be0d-400c-8a73-8c406767ab41} 1096 "\\.\pipe\gecko-crash-server-pipe.1096" tab3⤵PID:3812
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=3672 -childID 2 -isForBrowser -prefsHandle 3648 -prefMapHandle 3644 -prefsLen 29088 -prefMapSize 244658 -jsInitHandle 1284 -jsInitLen 234952 -parentBuildID 20240401114208 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {d2b95e6e-a2f1-46dc-abab-4b054ae8fa3f} 1096 "\\.\pipe\gecko-crash-server-pipe.1096" tab3⤵PID:2388
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=4728 -parentBuildID 20240401114208 -sandboxingKind 0 -prefsHandle 4712 -prefMapHandle 4620 -prefsLen 29088 -prefMapSize 244658 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {c65bbc8c-8111-493c-99d2-dacd6d7b7f60} 1096 "\\.\pipe\gecko-crash-server-pipe.1096" utility3⤵
- Checks processor information in registry
PID:836
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=5332 -childID 3 -isForBrowser -prefsHandle 5320 -prefMapHandle 5276 -prefsLen 27051 -prefMapSize 244658 -jsInitHandle 1284 -jsInitLen 234952 -parentBuildID 20240401114208 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {1b096011-bafc-493a-aef2-6a5fec8569c9} 1096 "\\.\pipe\gecko-crash-server-pipe.1096" tab3⤵PID:5596
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=5264 -childID 4 -isForBrowser -prefsHandle 5448 -prefMapHandle 5452 -prefsLen 27051 -prefMapSize 244658 -jsInitHandle 1284 -jsInitLen 234952 -parentBuildID 20240401114208 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {61d8ffe7-44f0-4c68-affd-a394c02d3af2} 1096 "\\.\pipe\gecko-crash-server-pipe.1096" tab3⤵PID:5616
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=5688 -childID 5 -isForBrowser -prefsHandle 5608 -prefMapHandle 5612 -prefsLen 27051 -prefMapSize 244658 -jsInitHandle 1284 -jsInitLen 234952 -parentBuildID 20240401114208 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {584ce853-f123-4e63-8d1a-784ddd39f5e9} 1096 "\\.\pipe\gecko-crash-server-pipe.1096" tab3⤵PID:5628
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=6104 -childID 6 -isForBrowser -prefsHandle 5836 -prefMapHandle 6096 -prefsLen 27132 -prefMapSize 244658 -jsInitHandle 1284 -jsInitLen 234952 -parentBuildID 20240401114208 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {0aa7cfd3-f0ff-4acb-853f-22794e638386} 1096 "\\.\pipe\gecko-crash-server-pipe.1096" tab3⤵PID:624
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=6432 -childID 7 -isForBrowser -prefsHandle 6424 -prefMapHandle 6420 -prefsLen 27132 -prefMapSize 244658 -jsInitHandle 1284 -jsInitLen 234952 -parentBuildID 20240401114208 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {319f5e3c-0be9-47f8-9858-8fca02729bb0} 1096 "\\.\pipe\gecko-crash-server-pipe.1096" tab3⤵PID:5164
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=6384 -childID 8 -isForBrowser -prefsHandle 6560 -prefMapHandle 6564 -prefsLen 27132 -prefMapSize 244658 -jsInitHandle 1284 -jsInitLen 234952 -parentBuildID 20240401114208 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {8de26877-609d-4b38-85e4-244bad981fb1} 1096 "\\.\pipe\gecko-crash-server-pipe.1096" tab3⤵PID:5864
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=4556 -childID 9 -isForBrowser -prefsHandle 2740 -prefMapHandle 4584 -prefsLen 27919 -prefMapSize 244658 -jsInitHandle 1284 -jsInitLen 234952 -parentBuildID 20240401114208 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {0abfa6c0-b8a5-494e-8758-f02b5cceceeb} 1096 "\\.\pipe\gecko-crash-server-pipe.1096" tab3⤵PID:1472
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=3628 -childID 10 -isForBrowser -prefsHandle 5984 -prefMapHandle 6784 -prefsLen 27919 -prefMapSize 244658 -jsInitHandle 1284 -jsInitLen 234952 -parentBuildID 20240401114208 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {69763753-04d8-4d91-a5d6-d20be6258079} 1096 "\\.\pipe\gecko-crash-server-pipe.1096" tab3⤵PID:3180
-
-
-
C:\Users\Admin\Desktop\XWorm\XWorm V5.2\XWorm V5.2.exe"C:\Users\Admin\Desktop\XWorm\XWorm V5.2\XWorm V5.2.exe"1⤵
- Executes dropped EXE
- Loads dropped DLL
- Enumerates system info in registry
- Suspicious use of AdjustPrivilegeToken
PID:1032 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument https://t.me/XCoderTools2⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
PID:6036 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=90.0.4430.212 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=90.0.818.66 --initial-client-data=0x120,0x124,0x128,0xfc,0x12c,0x7ffb2ef63cb8,0x7ffb2ef63cc8,0x7ffb2ef63cd83⤵PID:3144
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=1876,8979471644337250836,3269200950150816690,131072 --gpu-preferences=SAAAAAAAAADgAAAwAAAAAAAAAAAAAAAAAABgAAAAAAAoAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAB4AAAAAAAAAHgAAAAAAAAAKAAAAAQAAAAgAAAAAAAAACgAAAAAAAAAMAAAAAAAAAA4AAAAAAAAABAAAAAAAAAAAAAAAAUAAAAQAAAAAAAAAAAAAAAGAAAAEAAAAAAAAAABAAAABQAAABAAAAAAAAAAAQAAAAYAAAAIAAAAAAAAAAgAAAAAAAAA --mojo-platform-channel-handle=1896 /prefetch:23⤵PID:3832
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=1876,8979471644337250836,3269200950150816690,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2192 /prefetch:33⤵
- Suspicious behavior: EnumeratesProcesses
PID:1504
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=1876,8979471644337250836,3269200950150816690,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2540 /prefetch:83⤵PID:952
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1876,8979471644337250836,3269200950150816690,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3352 /prefetch:13⤵PID:4436
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1876,8979471644337250836,3269200950150816690,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3392 /prefetch:13⤵PID:3368
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1876,8979471644337250836,3269200950150816690,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4992 /prefetch:13⤵PID:1852
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1876,8979471644337250836,3269200950150816690,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4012 /prefetch:13⤵PID:4552
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1876,8979471644337250836,3269200950150816690,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3352 /prefetch:13⤵PID:5932
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --field-trial-handle=1876,8979471644337250836,3269200950150816690,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=3996 /prefetch:83⤵
- Suspicious behavior: EnumeratesProcesses
PID:5972
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1876,8979471644337250836,3269200950150816690,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4900 /prefetch:13⤵PID:800
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1876,8979471644337250836,3269200950150816690,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5192 /prefetch:13⤵PID:788
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\90.0.818.66\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\90.0.818.66\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=1876,8979471644337250836,3269200950150816690,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5976 /prefetch:83⤵
- Suspicious behavior: EnumeratesProcesses
PID:1436
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1876,8979471644337250836,3269200950150816690,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=14 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4908 /prefetch:13⤵PID:3188
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1876,8979471644337250836,3269200950150816690,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=15 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5972 /prefetch:13⤵PID:2860
-
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument https://t.me/XCoderTools2⤵PID:4648
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=90.0.4430.212 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=90.0.818.66 --initial-client-data=0x120,0x124,0x128,0xfc,0x12c,0x7ffb2ef63cb8,0x7ffb2ef63cc8,0x7ffb2ef63cd83⤵PID:1456
-
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:3188
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:2080
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\Desktop\XWorm\XWorm V5.2\Fixer.bat" "1⤵PID:6376
-
C:\Users\Admin\Desktop\XWorm\XWorm V5.2\XWormLoader 5.2 x64.exe"C:\Users\Admin\Desktop\XWorm\XWorm V5.2\XWormLoader 5.2 x64.exe"1⤵
- Executes dropped EXE
- Loads dropped DLL
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SendNotifyMessage
PID:6496
-
C:\Windows\system32\wbem\WmiApSrv.exeC:\Windows\system32\wbem\WmiApSrv.exe1⤵PID:6944
-
C:\Windows\system32\AUDIODG.EXEC:\Windows\system32\AUDIODG.EXE 0x00000000000004DC 0x00000000000004D01⤵
- Suspicious use of AdjustPrivilegeToken
PID:7044
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD5c9efc5ba989271670c86d3d3dd581b39
SHA13ad714bcf6bac85e368b8ba379540698d038084f
SHA256c2e16990b0f6f23efdcecd99044993a4c2b8ba87bd542dd8f6256d69e24b93b3
SHA512c1bc0dc70ab827b54feb64ad069d21e1c3c28d57d126b08314a9670437881d77dba02b5cca57ef0f2aa7f8e7d4d163fbd2c6f246ea2d51ce201d61a89015e8b7
-
Filesize
152B
MD5302c3de891ef3a75b81a269db4e1cf22
SHA15401eb5166da78256771e8e0281ca2d1f471c76f
SHA2561d1640e5755779c90676290853d2e3ca948f57cf5fb1df4b786e277a97757f58
SHA512da18e7d40376fd13255f3f67a004c3a7f408466bd7ce92e36a4d0c20441279fe4b1b6e0874ab74c494663fb97bd7992b5e7c264b3fc434c1e981326595263d33
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index
Filesize72B
MD5238f2055a7bca6fb6ffac07e8783f962
SHA1dac7345ca5257e63fb6665e1b2ca72ce501d4d55
SHA2563460d1cacbb08abd314510ee3b52d4fc59542c09cb06e4010e6a9fe859934204
SHA51296d1c1ff0290ec93fdb6ba1cea491a17b0514e328abc067a3dcf94d7b3b698cb31fe9852f6bc51330b41eddb4bf45a9a44f150fd07e806e9ff38f45bed77a123
-
Filesize
5KB
MD56fd04013217036dd1b1c961321095a9d
SHA1105c50e72026fa5ad218f140ddffd83a82c3b727
SHA25618f1e54caeee2a109475f55e1e32b70b33e52073e582e092d63596f5b96e82d5
SHA512aa5f1c25c434c31ee53122001c348952ffdfd70205bbb3a9c5c4113e255a7b7b33a6540754bddf85fe212224938f3f24c9e77090405bbff3702ed4270b29406b
-
Filesize
6KB
MD5e0d99143dd23bb43a1b94c9f372549ce
SHA19ddd251aa839549b2ef77663d9d01ef1c2d8b236
SHA256744ef6b36f1344035abede10234670ceae392a8380477a4d58da5d13b8975e8c
SHA512c7e04c9bdaf126ead0e95938a495089d0d9d6979d05f782fceb4198a48d13d403ed5606d51e798393513e8757a0eeee3f251ccd143cb4cb228f822c1f4852b9a
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
11KB
MD5f4389ffcd46f34ebc7e7c6a29b94b04b
SHA1f0cb7cf5a9f706f142d39b5fb17248c33f236268
SHA25659c36b983ecd91512a728b0e69ea09392faa9ec8a74f68f1f42b8e66e24a62ba
SHA51222c60ee2c01665538e356f9b4f4497a23b0cd5112bb8bf2d889ee5c5f2a7518257bf0db39c19db1adbbd84286368755e1a55d25af9015b20746e0ded6d1fe76d
-
C:\Users\Admin\AppData\Local\Mozilla\Firefox\Profiles\x698r3gu.default-release\activity-stream.discovery_stream.json
Filesize22KB
MD5951f748fde13d0116463d364369ae0d1
SHA1ede75d1b85b29f864123f9fbcf6fc5b7c9b51836
SHA256b1e737597032fbb1d9e80e436b280f251efa08750882c4e6665beddc1e52e76f
SHA512e05dd999cdaa14fcc5019b812cbe895d5a2a22416d627c63d7d9da3b0a7f3f4590a48f6ad4745751ba1523fa54037ddde654587bd426cb5eb7ca3687d85d250c
-
Filesize
22KB
MD53d65383450f1fb96c6e26254fff8c497
SHA159e51054cb696044cb98cea1ea9a1833a28ba629
SHA256309593dfb02cfef2a16022ade87591ed027b1dd7a5e8e169011065e3203fa95c
SHA512dccf72e2289a13a6262c01a2e97e9ab7f7be6665d1971a6c38e30a1df6a2d64d5cced01061fbeb7d4dace149474c6142d4aeb75b7408dc7ad8c1c24130e3d870
-
Filesize
44KB
MD5c6c583e4163913f0bab590be979edbd2
SHA1d5a35c9a96b2b4984615efb32c248600d6db4053
SHA25601ff8c2877bef5811738652e26d03716a0eb838801062ab0feaed6d45f10e04a
SHA5125318db730be6f97f4c1f6ec4e9543d8d844ebbab5346664718d6dc22de8a34522a7e17b255bae52eb0bc2f5e982abbc5b663253323b05946d40606066fd6ca9e
-
Filesize
18KB
MD59003e3273b914fa0686f01caa971ab70
SHA1a6ab9cc8fb6484e0f9a366c5af32b090c93e4740
SHA256c14ace1e2a11994117c83e013a896ba43f79b035f3c0d4c09c7d283918082e07
SHA512048944114a555d1a67e863c3789c947c94121b6229d904a4bb9619517f4079d4a26163f3a5a72c5a646aeee6a8bd98df3a900b359e2d8728128b121d2bc8e16b
-
C:\Users\Admin\AppData\Local\Mozilla\Firefox\Profiles\x698r3gu.default-release\cache2\entries\2390F3CFCD591D36286B9F713F721FDA0957359B
Filesize220KB
MD514ff34f97167e0a1ebdb3a485cde0da3
SHA1165f64e9e418d26bcec341f19d4120a4d14a79fa
SHA2562b1c642915f5c3106b60f66c7dd546ecd075f224cb92f69a517d4be143eb5508
SHA512919ae1b4ccca7c22899ce6dcb180c87b5288b6fafd3c719680286578d0b6794de3f9c01dfdf84ecb1e9613827118851adbe97a5038d8335d14ce845a2ad23db1
-
C:\Users\Admin\AppData\Local\Mozilla\Firefox\Profiles\x698r3gu.default-release\cache2\entries\3C5592DD470D592CA7557486DB5F93B4E0AB115A
Filesize99KB
MD5de2b93eb57dbf06b7bfd759f2bde569c
SHA18527af422ed1b1958644e6b5ed91210b4542e4a8
SHA256db5d2889e73be77ccc8ad2656bc88c0ef86b37788dd28ff302d86f6f3b672164
SHA512f9d71a672a9aa3cde26e357130a74beed97520db3ba2c0015039cf44bbd54508e6d4841f1173ffb5b35b8ec522ccfda8907a848e1438ce3d6a3a6ac314e6ab3c
-
C:\Users\Admin\AppData\Local\Mozilla\Firefox\Profiles\x698r3gu.default-release\jumpListCache\druEbM4UmGa0OT8cZaZmDsvK+51xaCA0eBc08uU_RHE=.ico
Filesize15KB
MD5a3c1306e53848dce3a3c2fec6e1cdff2
SHA187f8463535c624202f9b6efe26e993b0b1f3157c
SHA256d2d32f8573ccc7ad555d258c8362cfb0b699eb4b004f93dbeb171f3510df055f
SHA512871e877c73990e372a7a41d9851e9dcf301efdc543696aa4dbc35b8a121e24b7fcdf76d426b5f90fa3a14253440697de01ffa0d82d417e5490560ce7d9740aa1
-
Filesize
361KB
MD5e3143e8c70427a56dac73a808cba0c79
SHA163556c7ad9e778d5bd9092f834b5cc751e419d16
SHA256b2f57a23ecc789c1bbf6037ac0825bf98babc7bf0c5d438af5e2767a27a79188
SHA51274e0f4b55625df86a87b9315e4007be8e05bbecca4346a6ea06ef5b1528acb5a8bb636ef3e599a3820dbddcf69563a0a22e2c1062c965544fd75ec96fd9803fc
-
Filesize
187B
MD515c8c4ba1aa574c0c00fd45bb9cce1ab
SHA10dad65a3d4e9080fa29c42aa485c6102d2fa8bc8
SHA256f82338e8e9c746b5d95cd2ccc7bf94dd5de2b9b8982fffddf2118e475de50e15
SHA51252baac63399340427b94bfdeb7a42186d5359ce439c3d775497f347089edfbf72a6637b23bb008ab55b8d4dd3b79a7b2eb7c7ef922ea23d0716d5c3536b359d4
-
Filesize
112KB
MD52f1a50031dcf5c87d92e8b2491fdcea6
SHA171e2aaa2d1bb7dbe32a00e1d01d744830ecce08f
SHA25647578a37901c82f66e4dba47acd5c3cab6d09c9911d16f5ad0413275342147ed
SHA5121c66dbe1320c1a84023bdf77686a2a7ab79a3e86ba5a4ea2cda9a37f8a916137d5cfec30b28ceae181355f6f279270465ef63ae90b7e8dcd4c1a8198a7fd36a8
-
Filesize
479KB
MD509372174e83dbbf696ee732fd2e875bb
SHA1ba360186ba650a769f9303f48b7200fb5eaccee1
SHA256c32efac42faf4b9878fb8917c5e71d89ff40de580c4f52f62e11c6cfab55167f
SHA512b667086ed49579592d435df2b486fe30ba1b62ddd169f19e700cd079239747dd3e20058c285fa9c10a533e34f22b5198ed9b1f92ae560a3067f3e3feacc724f1
-
Filesize
13.8MB
MD50a8747a2ac9ac08ae9508f36c6d75692
SHA1b287a96fd6cc12433adb42193dfe06111c38eaf0
SHA25632d544baf2facc893057a1d97db33207e642f0dacf235d8500a0b5eff934ce03
SHA51259521f8c61236641b3299ab460c58c8f5f26fa67e828de853c2cf372f9614d58b9f541aae325b1600ec4f3a47953caacb8122b0dfce7481acfec81045735947d
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\x698r3gu.default-release\AlternateServices.bin
Filesize8KB
MD50db6cb5838457a62036f697127601122
SHA119be57cdb36ab8f0cb3214759b3e0b16d247aa44
SHA25672b19e23643b9f3547153dd9c1f9e7b4afa19e4b03618e5a13d66487bb574b6f
SHA512dac6a22bf8c9396cf7937e0a05edfc46dbf39012557f5e4aa1605fd206c999563fb783f0df2b73aa69d5e3ce843137b79e90334899ffed2e16c14d59578a032d
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\x698r3gu.default-release\AlternateServices.bin
Filesize20KB
MD59192baaf7791318db97b7f842d9aa48a
SHA197054cf9b6ec778eb88927f74475605a01c2f92b
SHA256acd9c0a59c8179900812717e2eba8ea49b411bfa814e31d261d6b4d7fcbc22b3
SHA512cbed9c6a9ef581e22566cb9e990e86f35bcd5cf28f16f93e859a4fe05224dfbd982100e8e8d8740bba31a5ca23736660234e97d85192a81201aae94826c46264
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\x698r3gu.default-release\datareporting\glean\db\data.safe.tmp
Filesize5KB
MD5abda8bbcae8a8b9c15b036f5ebad83bb
SHA16cdfc980a2b3f6cc364991f132da351c96c180b2
SHA256112fbeec0e4917871878428651995792b54aa2c8824e1a11fdf1086ff1a9cb79
SHA5124e9145f8cca8c3a6a2ed04948fc825093fbea4c2b9ef0461214a9e707965a8a086e273d067148d11f5b9428d3806b01f6e19fb7ed2ee11ecc4db83067df68178
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\x698r3gu.default-release\datareporting\glean\db\data.safe.tmp
Filesize6KB
MD52b6cf602cd491d0622f766b885fb5e64
SHA1e968f2054b1e42897f3419cab1a646a18cf4c320
SHA2562ca24708e739dea91362342a1cd4f8c4813587fafad466169c15136f14bcd1a8
SHA512d7049cdb81c1afd2a690fb065cfd1494e88b83b2660bbce0ff68e7fbe4e720c5de0f717a2787b4b3cbf9ae2bedd0f5e8382af8d761a00db25a0ee03d6460903f
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\x698r3gu.default-release\datareporting\glean\db\data.safe.tmp
Filesize6KB
MD5dbfc3397f667fc919a9254521433ba05
SHA103c757dcc394532c351205640ab99ba3d021d007
SHA256ed85931f64a3338ae949e43e7bf86bd5d05795c7dc72ffdb62def6081fbfec5c
SHA5129bf06498e5297ab0bc412308651b31bcbb56bf27d54391c635df87d5ffa5edec053bd51769c418c4f1147151be7e0b21bf063fabdc9d7b800e7d62c0a814f33c
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\x698r3gu.default-release\datareporting\glean\pending_pings\5ee429f6-8690-4a1a-9c6e-ef8171b36585
Filesize982B
MD5632097a04d6d74dd6d2aa8a7ef1425ee
SHA1fc845794f8e9b7a155977eb53bcd1e947defec7c
SHA2560a569ad21410d949261570cba6a05e00b3e3ed75d8dd37bd138c1f9fec4ca11d
SHA51207fba66bcfbea8e18cf405bd710ebf0782621c8a24df74b558b34fbdacde8cc1483c21edb68e58719f44119d5e143799eecc25f0557ea534a3af043a2a3cec5c
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\x698r3gu.default-release\datareporting\glean\pending_pings\66bfc163-ea4d-4a92-b59b-057eb1d87092
Filesize671B
MD5848cc306382de325ef26e059e1c22fdb
SHA1ac1b71c278bf8dc85f948bb429d773849b7d3e1a
SHA256a3c04826fd38e357bd88b4e5f3b122b91de4fe90d8f1aa09e4b7cc65bd4cb018
SHA51255e8dcda8aa8694e5f3fe40f52a069b83e8baceb6847b700cdd3dbbfc4611aae99f5341f0396bac3741c1429fed90214c06ee09f7c54f8e6e86556f260785b4a
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\x698r3gu.default-release\datareporting\glean\pending_pings\caffc980-f265-4ec5-9b50-d05d3c68d65e
Filesize26KB
MD528ae3fbb0148f2f25878cde355e7310c
SHA120b6de469458e4541019ad265218536efc76194a
SHA256a66d2e140520e914f2d3202b5f159bbfb9b44472723f773d5cf24fa7d671d184
SHA512067d8cef8d01a1886903a0151ce06b85077f0562c3eb3fd09fe58e6e57eba7af5d068b176e09b2009e1298e297825442028ee1fc911cb7c565b1a93754ee015e
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\x698r3gu.default-release\gmp-gmpopenh264\2.3.2\gmpopenh264.dll
Filesize1.1MB
MD5842039753bf41fa5e11b3a1383061a87
SHA13e8fe1d7b3ad866b06dca6c7ef1e3c50c406e153
SHA256d88dd3bfc4a558bb943f3caa2e376da3942e48a7948763bf9a38f707c2cd0c1c
SHA512d3320f7ac46327b7b974e74320c4d853e569061cb89ca849cd5d1706330aca629abeb4a16435c541900d839f46ff72dfde04128c450f3e1ee63c025470c19157
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\x698r3gu.default-release\gmp-gmpopenh264\2.3.2\gmpopenh264.info
Filesize116B
MD52a461e9eb87fd1955cea740a3444ee7a
SHA1b10755914c713f5a4677494dbe8a686ed458c3c5
SHA2564107f76ba1d9424555f4e8ea0acef69357dfff89dfa5f0ec72aa4f2d489b17bc
SHA51234f73f7bf69d7674907f190f257516e3956f825e35a2f03d58201a5a630310b45df393f2b39669f9369d1ac990505a4b6849a0d34e8c136e1402143b6cedf2d3
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\x698r3gu.default-release\gmp-widevinecdm\4.10.2710.0\manifest.json
Filesize372B
MD5bf957ad58b55f64219ab3f793e374316
SHA1a11adc9d7f2c28e04d9b35e23b7616d0527118a1
SHA256bbab6ca07edbed72a966835c7907b3e60c7aa3d48ddea847e5076bd05f4b1eda
SHA51279c179b56e4893fb729b225818ab4b95a50b69666ac41d17aad0b37ab0ca8cd9f0848cbc3c5d9e69e4640a8b261d7ced592eae9bcb0e0b63c05a56e7c477f44e
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\x698r3gu.default-release\gmp-widevinecdm\4.10.2710.0\widevinecdm.dll
Filesize17.8MB
MD5daf7ef3acccab478aaa7d6dc1c60f865
SHA1f8246162b97ce4a945feced27b6ea114366ff2ad
SHA256bc40c7821dcd3fea9923c6912ab1183a942c11b7690cfd79ed148ded0228777e
SHA5125840a45cfdb12c005e117608b1e5d946e1b2e76443ed39ba940d7f56de4babeab09bee7e64b903eb82bb37624c0a0ef19e9b59fbe2ce2f0e0b1c7a6015a63f75
-
Filesize
11KB
MD5b3d6bb8573ae513ca0bd0d98c928f675
SHA194a3d0180e369d0ae494b922462b01dfc4cea421
SHA256ff4e31415af8c0b61ffd6aaf4393e4670b57efa936609f1fd2d0ff0426a8e1d9
SHA512ee3676508099e9fcca62ba3ff881991742c91a0e5d874a3a60fec0a492b4b376fef823358916c56ffcad6ebd880a22b33087554177554af0d895a36309247cb2
-
Filesize
10KB
MD5021f6fdc4b950cfbb057602045e1dab2
SHA14b8637ad811ad84522ab786c4f16e2f28c3c53cd
SHA2567f7729daafba1c1c171beb4a7622ae788f25c0f63a259a0e97cb406f66224eb0
SHA512ea22c470c2e170bfc840b3cf1c536e8d50eaf347718affa26eb2099513b9cd339ed2e4480829b6111095c5fb14424d23f0697f358d97ab233891d2901aa94056
-
Filesize
10KB
MD55afe18310bb3b6e8cd98ec6faedc4bed
SHA14c9d8965593ee1eb126d2e372ab338a51de7e996
SHA256af662525a7b522703e6be41073aaea6c39dfa33a995ea61e5d74af9184390d64
SHA512b059d0c02eaed4402d63cb5f532228052ca474c2fc58913619f68c7913dac4f5bea636d57dcceea20c5b17c3995ce0963765066812af7796a7d0c72eaf0e9427
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\x698r3gu.default-release\sessionstore-backups\recovery.baklz4
Filesize2KB
MD593f50bb975fb9f431ec7ba50a2dbd157
SHA1f3f6f9b2108de67291d8bb47956c8be06dbc55a0
SHA2563885cbb176c6d185a8e446d5c14bee95f9c3985ba3067285aa5bf2ea9bdb5175
SHA512f5effbf64d5be29de440ff216259a03b4dffd1ceabc65f7166ae711c1d1b78149f8340a2cfd410d9b63de6ff744f5930984491e497b734307798844d6b8fdacd
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\x698r3gu.default-release\sessionstore-backups\recovery.baklz4
Filesize1KB
MD59e52fa645867f82b7401f756b92c5dc4
SHA13fe79da6d7bdb7c837459e737d9ac0892c290429
SHA256e87338968ef8788a3ecfe6604472fbabb94317db42770fa8ad357fcb7e0d7826
SHA51243f54665797e3cfe940dd21da5a0982e0fb6fb8630d68ff07e272c9e9a23d70a5fedf6da1318a74febaf253de187a62e75a5d4d1ec9348ed7efa8de3e57ac4d7
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\x698r3gu.default-release\sessionstore-backups\recovery.baklz4
Filesize2KB
MD57d813e9c06cc1e07193398637e183082
SHA1a7489dbad5569fb181069663f10e0eba854fb579
SHA2562664f77e565f3a8671a63fee178c64dbaeca6f4c2b30affefa9f61d31d08bfae
SHA512621bfdae47ae575f1ac91e42a2e49f072474a8096842e3df6c292d42db7a270990370eed8158953732407fe448c140c336223b1590b1ba54912c74096e24ee5f
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\x698r3gu.default-release\sessionstore-backups\recovery.baklz4
Filesize3KB
MD5783568f44248d7c1f0caeae260c69f9e
SHA10862c3562b2533bb4a73697206f59a301fe3454c
SHA256b61b7492551245929d4457031f96c0be7dd127326e78f67226f181a506d9a103
SHA5122b99ee94214acddf85f9310b8a155bef00d415f46a5eed786b5e05fe309b5379e2859fd97580f5e117a4a8135fbbddfc37e5b3d48d9ee7d4f8abb95fc68f9704
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\x698r3gu.default-release\sessionstore-backups\recovery.baklz4
Filesize2KB
MD52d44b7d41e4a3a629a278cb2e837d557
SHA10acf0482cacc1ad0b9ce98f21cedd0a394dec778
SHA25652b1278c6f28bf4471bdd6d864b91f775373a70c6961564c642368647ad97326
SHA5128e2410b8378223a1e5c67705ba45352bd2300a3c884b07e9edc4c08142bc3c305137b9f95644aa46aa1721ede62e0dc1da28a60ad550650883e099a95b1de00c
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\x698r3gu.default-release\sessionstore-backups\recovery.baklz4
Filesize2KB
MD5a9bb91f2b63f462e0ac6b10bfe9c8a4b
SHA110736fd4e0ad95f168d122c5c1c9c8f4cd1cc3bd
SHA25696dbaebc3d3a61ea5371709309807adb24abe11bd531d6d2c6a8c90504af66b8
SHA512acad02e3e43d855a007c7c9560aecdd60ae0f58448b7313db165cf020e2866e31cdb6d46a4b19ed5b8644ebd5035de62ef8e3e1fc959a8dae336d763be516c77
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\x698r3gu.default-release\sessionstore-backups\recovery.baklz4
Filesize3KB
MD5ba156e86aec8d83e7684dea4c2f7e4ee
SHA18048980cdc91d150286c7987bf8cd431b9c4b085
SHA25610ff2402bf007f16d1032b16a3e48eebac1a7da9fb3fcd08d089501549006b73
SHA51297685902a1db90311ae3f002fa0e80de254a7d3592ca37b5e61cd9a363fa047df6b57ccaa0a3bf11ba76dea577d422f9a92babd8746165042dc7f2f76768ee94
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\x698r3gu.default-release\sessionstore-backups\recovery.baklz4
Filesize2KB
MD54d73c27e70daf25d5ea94fde218d6303
SHA1b9fff90dc47d8b6831f28a9f37c9c24bbb39f891
SHA256c001a9b798ad101cfbfc8774a588365fce8578c08f82eb6583b60279688facf8
SHA512f858eb451cec1047a8f0e9982bb283c98d0f20fc533967493a549a664146c237df6b9c61e2512bf5cd4124d9540a5051c4290960e106808fc4e9370d8c5e69c5
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\x698r3gu.default-release\sessionstore-backups\recovery.baklz4
Filesize3KB
MD5fcd1b3f7581ded3c695346f894cd5345
SHA1ddc424f0b9c9b5d5db3f6ecde6ff1210cb875711
SHA256f01abf63856468900795da48e2e315a548d605eb35bec88a60dd21c5b67af805
SHA512c42bb2e8815c579fffcc54e5d3263819858d8eb07701d741832691da951afbf1c700b0fba15e2d952d81290ff3b0e7a82b13107588c04a0fa0e4660530ae960a
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\x698r3gu.default-release\sessionstore-backups\recovery.baklz4
Filesize3KB
MD5163c02dcfc460a06c3a90eacaa8ce919
SHA11e5bdaea0388a6c24f10e8c494372d1e0e7dc9df
SHA25627bc333efec6876f7be4d7058f8d123a5865a4bbed02abf51ce9dc09c36f7ff6
SHA512658c3aeee7ccf719c4ef282e994f4a768b2a59af0c89c777124998ee2e55abf867174e4ebc66fc19c0497da7ba871d4df7578200933f582c421257886520947d
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\x698r3gu.default-release\storage\default\https+++www.virustotal.com\cache\morgue\218\{f0fe0478-c3ad-43d2-9bb4-d0c616c136da}.final
Filesize11KB
MD5019da16fe489b4d7d6992fafcbd2169a
SHA181d4a95203b4af8fa9b20f2c0fc5f8e8a28e289c
SHA25601d61cfe4c41a2ec37c142393107a699e50716b0dce467d32c7a38e0f9ce40f6
SHA5125137b6e8dc515772449ba670bb527173cb4529220dbdf5317424e16e2d6e5111302d6b6038396855ad74c1ca1c262e3df50a4bd9d3b0728b93ecaeb320cfc71b
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\x698r3gu.default-release\storage\default\https+++www.virustotal.com\cache\morgue\28\{3b601047-4381-48af-873b-9a2f07206f1c}.final
Filesize49KB
MD5624596959cf551c60dddeab00ad2816d
SHA1beab11a94f1452f25cbe4bc1d94b3e1f7896f3dd
SHA256db6de7ca840a002b3d7c1f0f6957ecfd8e02df4bf3c62d2e38908214b7db9c29
SHA512837268eab73b75a4a21d27978d3c39419f5ce93d78d653c46ef9552dfda7164503e70e8aed8c7af649138e7aafda241a6cebb7988f326b5084dcf7a06cd62768
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\x698r3gu.default-release\storage\permanent\chrome\idb\3870112724rsegmnoittet-es.sqlite
Filesize384KB
MD53061015ccd7cbf856d5d39d2e4fbe928
SHA1ebea48009f1ed533f45b598bdd995f6da73987db
SHA2562e249462a9a31b58b2291e22a03479840bf7ddf6d5f04f9aee49f6c1c4ee26cc
SHA512c9a5fe521cf213d1cc8d5a952807936958bd944cd770ffa50845e54fbadbd9fe69ab125290089d15cc0cea5f467a28705594c196eb4fb41baeb8f7a0bf8da8e8
-
Filesize
122B
MD52dabc46ce85aaff29f22cd74ec074f86
SHA1208ae3e48d67b94cc8be7bbfd9341d373fa8a730
SHA256a11703fd47d16020fa099a95bb4e46247d32cf8821dc1826e77a971cdd3c4c55
SHA5126a50b525bc5d8eb008b1b0d704f9942f72f1413e65751e3de83d2e16ef3cf02ef171b9da3fff0d2d92a81daac7f61b379fcf7a393f46e914435f6261965a53b3
-
Filesize
1.2MB
MD58ef41798df108ce9bd41382c9721b1c9
SHA11e6227635a12039f4d380531b032bf773f0e6de0
SHA256bc07ff22d4ee0b6fafcc12482ecf2981c172a672194c647cedf9b4d215ad9740
SHA5124c62af04d4a141b94eb3e1b0dbf3669cb53fe9b942072ed7bea6a848d87d8994cff5a5f639ab70f424eb79a4b7adabdde4da6d2f02f995bd8d55db23ce99f01b
-
Filesize
1.9MB
MD5bcc0fe2b28edd2da651388f84599059b
SHA144d7756708aafa08730ca9dbdc01091790940a4f
SHA256c6264665a882e73eb2262a74fea2c29b1921a9af33180126325fb67a851310ef
SHA5123bfc3d27c095dde988f779021d0479c8c1de80a404454813c6cae663e3fe63dc636bffa7de1094e18594c9d608fa7420a0651509544722f2a00288f0b7719cc8
-
Filesize
350KB
MD5de69bb29d6a9dfb615a90df3580d63b1
SHA174446b4dcc146ce61e5216bf7efac186adf7849b
SHA256f66f97866433e688acc3e4cd1e6ef14505f81df6b26dd6215e376767f6f954bc
SHA5126e96a510966a4acbca900773d4409720b0771fede37f24431bf0d8b9c611eaa152ba05ee588bb17f796d7b8caaccc10534e7cc1c907c28ddfa54ac4ce3952015
-
Filesize
138KB
MD5dd43356f07fc0ce082db4e2f102747a2
SHA1aa0782732e2d60fa668b0aadbf3447ef70b6a619
SHA256e375b83a3e242212a2ed9478e1f0b8383c1bf1fdfab5a1cf766df740b631afd6
SHA512284d64b99931ed1f2e839a7b19ee8389eefaf6c72bac556468a01f3eb17000252613c01dbae88923e9a02f3c84bcab02296659648fad727123f63d0ac38d258e
-
Filesize
216KB
MD5b808181453b17f3fc1ab153bf11be197
SHA1bce86080b7eb76783940d1ff277e2b46f231efe9
SHA256da00cdfab411f8f535f17258981ec51d1af9b0bfcee3a360cbd0cb6f692dbcdd
SHA512a2d941c6e69972f99707ade5c5325eb50b0ec4c5abf6a189eb11a46606fed8076be44c839d83cf310b67e66471e0ea3f6597857a8e2c7e2a7ad6de60c314f7d3
-
Filesize
6KB
MD56512e89e0cb92514ef24be43f0bf4500
SHA1a039c51f89656d9d5c584f063b2b675a9ff44b8e
SHA2561411e4858412ded195f0e65544a4ec8e8249118b76375050a35c076940826cd0
SHA5129ffb2ff050cce82dbfbbb0e85ab5f976fcd81086b3d8695502c5221c23d14080f0e494a33e0092b4feb2eda12e2130a2f02df3125733c2f5ec31356e92dea00b
-
Filesize
319KB
MD579f1c4c312fdbb9258c2cdde3772271f
SHA1a143434883e4ef2c0190407602b030f5c4fdf96f
SHA256f22a4fa1e8b1b70286ecf07effb15d2184454fa88325ce4c0f31ffadb4bef50a
SHA512b28ed3c063ae3a15cd52e625a860bbb65f6cd38ccad458657a163cd927c74ebf498fb12f1e578e869bcea00c6cd3f47ede10866e34a48c133c5ac26b902ae5d9
-
Filesize
241KB
MD5d34c13128c6c7c93af2000a45196df81
SHA1664c821c9d2ed234aea31d8b4f17d987e4b386f1
SHA256aaf9fb0158bd40ab562a4212c2a795cb40ef6864042dc12f3a2415f2446ba1c7
SHA51291f4e0e795f359b03595b01cbf29188a2a0b52ab9d64eadd8fb8b3508e417b8c7a70be439940975bf5bdf26493ea161aa45025beb83bc95076ed269e82d39689
-
Filesize
238KB
MD5ad3b4fae17bcabc254df49f5e76b87a6
SHA11683ff029eebaffdc7a4827827da7bb361c8747e
SHA256e3e5029bf5f29fa32d2f6cdda35697cd8e6035d5c78615f64d0b305d1bd926cf
SHA5123d6ecc9040b5079402229c214cb5f9354315131a630c43d1da95248edc1b97627fb9ba032d006380a67409619763fb91976295f8d22ca91894c88f38bb610cd3
-
Filesize
12.2MB
MD58b7b015c1ea809f5c6ade7269bdc5610
SHA1c67d5d83ca18731d17f79529cfdb3d3dcad36b96
SHA2567fc9c7002b65bc1b33f72e019ed1e82008cc7b8e5b8eaf73fc41a3e6a246980e
SHA512e652913f73326f9d8461ac2a631e1e413719df28c7938b38949c005fda501d9e159554c3e17a0d5826d279bb81efdef394f7fb6ff7289cf296c19e92fd924180
-
Filesize
183B
MD566f09a3993dcae94acfe39d45b553f58
SHA19d09f8e22d464f7021d7f713269b8169aed98682
SHA2567ea08548c23bd7fd7c75ca720ac5a0e8ca94cb51d06cd45ebf5f412e4bbdd7d7
SHA512c8ea53ab187a720080bd8d879704e035f7e632afe1ee93e7637fad6bb7e40d33a5fe7e5c3d69134209487d225e72d8d944a43a28dc32922e946023e89abc93ed
-
Filesize
109KB
MD5e6a20535b636d6402164a8e2d871ef6d
SHA1981cb1fd9361ca58f8985104e00132d1836a8736
SHA256b461c985b53de4f6921d83925b3c2a62de3bbc5b8f9c02eecd27926f0197fae2
SHA51235856a0268ed9d17b1570d5392833ed168c8515d73fac9f150cf63cc1aea61c096aa2e6b3c8e091a1058ba062f9333f6767e323a37dfb6f4fa7e508a2a138a30