Analysis
-
max time kernel
299s -
max time network
299s -
platform
windows7_x64 -
resource
win7-20240708-en -
resource tags
arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system -
submitted
07-09-2024 20:54
Behavioral task
behavioral1
Sample
XWorm V5.2.exe
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
XWorm V5.2.exe
Resource
win10v2004-20240802-en
Behavioral task
behavioral3
Sample
XWorm.exe
Resource
win7-20240708-en
Behavioral task
behavioral4
Sample
XWorm.exe
Resource
win10v2004-20240802-en
General
-
Target
XWorm V5.2.exe
-
Size
9.1MB
-
MD5
1c264a483f2f667410157dac2f067d66
-
SHA1
4831f141b41802d06d6735b237c53f4d34e9d428
-
SHA256
1c906ee702dadbc5ce1668754a488cbbc9838c63aaa6fb77fe5e848491b6f474
-
SHA512
1b48506e8cd01b66e930b8bb70998a3e4f02a300ef1a97252e105013b7e455c021d014a4cf3b1ba77deadc94e1908c8314c2875900145760cc5c402f37d637a2
-
SSDEEP
196608:6OdkWMB1TCCAaa/f+cUhBLHK1gzaFsKnULGZ3d/VRyDhwymXeexoAxG:6K2B1CkcDUDLHK18as0mcvow+Ax
Malware Config
Extracted
xworm
uk1.localto.net:3725
-
Install_directory
%ProgramData%
-
install_file
svchost.exe
Signatures
-
Detect Xworm Payload 7 IoCs
resource yara_rule behavioral1/files/0x000500000001ad33-8.dat family_xworm behavioral1/memory/2952-9-0x0000000000A60000-0x0000000000A76000-memory.dmp family_xworm behavioral1/memory/1652-61-0x0000000001050000-0x0000000001066000-memory.dmp family_xworm behavioral1/memory/2756-92-0x0000000000380000-0x0000000000396000-memory.dmp family_xworm behavioral1/memory/1988-101-0x00000000000E0000-0x00000000000F6000-memory.dmp family_xworm behavioral1/memory/2276-102-0x0000000000AE0000-0x0000000000AF6000-memory.dmp family_xworm behavioral1/memory/2960-103-0x0000000000040000-0x0000000000056000-memory.dmp family_xworm -
Command and Scripting Interpreter: PowerShell 1 TTPs 4 IoCs
Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.
pid Process 2892 powershell.exe 1996 powershell.exe 2268 powershell.exe 2364 powershell.exe -
Drops startup file 2 IoCs
description ioc Process File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\svchost.lnk XWorm.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\svchost.lnk XWorm.exe -
Executes dropped EXE 64 IoCs
pid Process 2952 XWorm.exe 2828 XWorm.exe 2692 XWorm.exe 2960 XWorm.exe 2864 XWorm.exe 1344 XWorm.exe 1656 XWorm.exe 1636 XWorm.exe 2100 XWorm.exe 2008 XWorm.exe 3036 XWorm.exe 2228 XWorm.exe 1116 XWorm.exe 2804 XWorm.exe 1028 XWorm.exe 2504 XWorm.exe 2180 XWorm.exe 1056 XWorm.exe 2196 XWorm.exe 1652 svchost.exe 760 XWorm.exe 2140 XWorm.exe 1084 XWorm.exe 2452 XWorm.exe 2748 XWorm.exe 2836 XWorm.exe 2728 XWorm.exe 1668 XWorm.exe 536 XWorm.exe 872 XWorm.exe 1872 XWorm.exe 2272 XWorm.exe 2004 XWorm.exe 1784 XWorm.exe 288 XWorm.exe 1316 XWorm.exe 2440 XWorm.exe 1732 XWorm.exe 596 XWorm.exe 908 XWorm.exe 1748 XWorm.exe 2552 XWorm.exe 1156 XWorm.exe 2332 XWorm.exe 544 XWorm.exe 2096 XWorm.exe 2864 XWorm.exe 2564 XWorm.exe 2756 svchost.exe 1600 XWorm.exe 2644 XWorm.exe 1720 XWorm.exe 1936 XWorm.exe 2608 XWorm.exe 2860 XWorm.exe 1208 XWorm.exe 1928 XWorm.exe 1752 XWorm.exe 2248 XWorm.exe 1056 XWorm.exe 2040 XWorm.exe 2420 XWorm.exe 2484 XWorm.exe 1508 XWorm.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Windows\CurrentVersion\Run\svchost = "C:\\ProgramData\\svchost.exe" XWorm.exe -
Looks up external IP address via web service 1 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
flow ioc 4 ip-api.com -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Scheduled Task/Job: Scheduled Task 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 700 schtasks.exe -
Suspicious behavior: EnumeratesProcesses 5 IoCs
pid Process 2892 powershell.exe 1996 powershell.exe 2268 powershell.exe 2364 powershell.exe 2952 XWorm.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeDebugPrivilege 2952 XWorm.exe Token: SeDebugPrivilege 2828 XWorm.exe Token: SeDebugPrivilege 2692 XWorm.exe Token: SeDebugPrivilege 2960 XWorm.exe Token: SeDebugPrivilege 2892 powershell.exe Token: SeDebugPrivilege 2864 XWorm.exe Token: SeDebugPrivilege 1996 powershell.exe Token: SeDebugPrivilege 2268 powershell.exe Token: SeDebugPrivilege 2364 powershell.exe Token: SeDebugPrivilege 1344 XWorm.exe Token: SeDebugPrivilege 2952 XWorm.exe Token: SeDebugPrivilege 1656 XWorm.exe Token: SeDebugPrivilege 1636 XWorm.exe Token: SeDebugPrivilege 2100 XWorm.exe Token: SeDebugPrivilege 2008 XWorm.exe Token: SeDebugPrivilege 3036 XWorm.exe Token: SeDebugPrivilege 2228 XWorm.exe Token: SeDebugPrivilege 1116 XWorm.exe Token: SeDebugPrivilege 2804 XWorm.exe Token: SeDebugPrivilege 1028 XWorm.exe Token: SeDebugPrivilege 2504 XWorm.exe Token: SeDebugPrivilege 2180 XWorm.exe Token: SeDebugPrivilege 1056 XWorm.exe Token: SeDebugPrivilege 2196 XWorm.exe Token: SeDebugPrivilege 1652 svchost.exe Token: SeDebugPrivilege 760 XWorm.exe Token: SeDebugPrivilege 2140 XWorm.exe Token: SeDebugPrivilege 1084 XWorm.exe Token: SeDebugPrivilege 2452 XWorm.exe Token: SeDebugPrivilege 2748 XWorm.exe Token: SeDebugPrivilege 2836 XWorm.exe Token: SeDebugPrivilege 2728 XWorm.exe Token: SeDebugPrivilege 1668 XWorm.exe Token: SeDebugPrivilege 536 XWorm.exe Token: SeDebugPrivilege 872 XWorm.exe Token: SeDebugPrivilege 1872 XWorm.exe Token: SeDebugPrivilege 2272 XWorm.exe Token: SeDebugPrivilege 2004 XWorm.exe Token: SeDebugPrivilege 1784 XWorm.exe Token: SeDebugPrivilege 288 XWorm.exe Token: SeDebugPrivilege 1316 XWorm.exe Token: SeDebugPrivilege 2440 XWorm.exe Token: SeDebugPrivilege 1732 XWorm.exe Token: SeDebugPrivilege 596 XWorm.exe Token: SeDebugPrivilege 908 XWorm.exe Token: SeDebugPrivilege 1748 XWorm.exe Token: SeDebugPrivilege 2552 XWorm.exe Token: SeDebugPrivilege 1156 XWorm.exe Token: SeDebugPrivilege 2332 XWorm.exe Token: SeDebugPrivilege 544 XWorm.exe Token: SeDebugPrivilege 2096 XWorm.exe Token: SeDebugPrivilege 2864 XWorm.exe Token: SeDebugPrivilege 2564 XWorm.exe Token: SeDebugPrivilege 2756 svchost.exe Token: SeDebugPrivilege 1600 XWorm.exe Token: SeDebugPrivilege 2644 XWorm.exe Token: SeDebugPrivilege 1720 XWorm.exe Token: SeDebugPrivilege 1936 XWorm.exe Token: SeDebugPrivilege 2608 XWorm.exe Token: SeDebugPrivilege 2860 XWorm.exe Token: SeDebugPrivilege 1208 XWorm.exe Token: SeDebugPrivilege 1928 XWorm.exe Token: SeDebugPrivilege 1752 XWorm.exe Token: SeDebugPrivilege 2248 XWorm.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 2952 XWorm.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 1972 wrote to memory of 2440 1972 XWorm V5.2.exe 30 PID 1972 wrote to memory of 2440 1972 XWorm V5.2.exe 30 PID 1972 wrote to memory of 2440 1972 XWorm V5.2.exe 30 PID 1972 wrote to memory of 2952 1972 XWorm V5.2.exe 31 PID 1972 wrote to memory of 2952 1972 XWorm V5.2.exe 31 PID 1972 wrote to memory of 2952 1972 XWorm V5.2.exe 31 PID 2440 wrote to memory of 2840 2440 XWorm V5.2.exe 32 PID 2440 wrote to memory of 2840 2440 XWorm V5.2.exe 32 PID 2440 wrote to memory of 2840 2440 XWorm V5.2.exe 32 PID 2440 wrote to memory of 2828 2440 XWorm V5.2.exe 33 PID 2440 wrote to memory of 2828 2440 XWorm V5.2.exe 33 PID 2440 wrote to memory of 2828 2440 XWorm V5.2.exe 33 PID 2840 wrote to memory of 2656 2840 XWorm V5.2.exe 36 PID 2840 wrote to memory of 2656 2840 XWorm V5.2.exe 36 PID 2840 wrote to memory of 2656 2840 XWorm V5.2.exe 36 PID 2840 wrote to memory of 2692 2840 XWorm V5.2.exe 37 PID 2840 wrote to memory of 2692 2840 XWorm V5.2.exe 37 PID 2840 wrote to memory of 2692 2840 XWorm V5.2.exe 37 PID 2656 wrote to memory of 2924 2656 XWorm V5.2.exe 38 PID 2656 wrote to memory of 2924 2656 XWorm V5.2.exe 38 PID 2656 wrote to memory of 2924 2656 XWorm V5.2.exe 38 PID 2656 wrote to memory of 2960 2656 XWorm V5.2.exe 39 PID 2656 wrote to memory of 2960 2656 XWorm V5.2.exe 39 PID 2656 wrote to memory of 2960 2656 XWorm V5.2.exe 39 PID 2952 wrote to memory of 2892 2952 XWorm.exe 40 PID 2952 wrote to memory of 2892 2952 XWorm.exe 40 PID 2952 wrote to memory of 2892 2952 XWorm.exe 40 PID 2924 wrote to memory of 1056 2924 XWorm V5.2.exe 42 PID 2924 wrote to memory of 1056 2924 XWorm V5.2.exe 42 PID 2924 wrote to memory of 1056 2924 XWorm V5.2.exe 42 PID 2924 wrote to memory of 2864 2924 XWorm V5.2.exe 43 PID 2924 wrote to memory of 2864 2924 XWorm V5.2.exe 43 PID 2924 wrote to memory of 2864 2924 XWorm V5.2.exe 43 PID 2952 wrote to memory of 1996 2952 XWorm.exe 44 PID 2952 wrote to memory of 1996 2952 XWorm.exe 44 PID 2952 wrote to memory of 1996 2952 XWorm.exe 44 PID 2952 wrote to memory of 2268 2952 XWorm.exe 46 PID 2952 wrote to memory of 2268 2952 XWorm.exe 46 PID 2952 wrote to memory of 2268 2952 XWorm.exe 46 PID 2952 wrote to memory of 2364 2952 XWorm.exe 48 PID 2952 wrote to memory of 2364 2952 XWorm.exe 48 PID 2952 wrote to memory of 2364 2952 XWorm.exe 48 PID 1056 wrote to memory of 1328 1056 XWorm V5.2.exe 50 PID 1056 wrote to memory of 1328 1056 XWorm V5.2.exe 50 PID 1056 wrote to memory of 1328 1056 XWorm V5.2.exe 50 PID 1056 wrote to memory of 1344 1056 XWorm V5.2.exe 51 PID 1056 wrote to memory of 1344 1056 XWorm V5.2.exe 51 PID 1056 wrote to memory of 1344 1056 XWorm V5.2.exe 51 PID 2952 wrote to memory of 700 2952 XWorm.exe 52 PID 2952 wrote to memory of 700 2952 XWorm.exe 52 PID 2952 wrote to memory of 700 2952 XWorm.exe 52 PID 1328 wrote to memory of 1800 1328 XWorm V5.2.exe 54 PID 1328 wrote to memory of 1800 1328 XWorm V5.2.exe 54 PID 1328 wrote to memory of 1800 1328 XWorm V5.2.exe 54 PID 1328 wrote to memory of 1656 1328 XWorm V5.2.exe 55 PID 1328 wrote to memory of 1656 1328 XWorm V5.2.exe 55 PID 1328 wrote to memory of 1656 1328 XWorm V5.2.exe 55 PID 1800 wrote to memory of 1004 1800 XWorm V5.2.exe 56 PID 1800 wrote to memory of 1004 1800 XWorm V5.2.exe 56 PID 1800 wrote to memory of 1004 1800 XWorm V5.2.exe 56 PID 1800 wrote to memory of 1636 1800 XWorm V5.2.exe 57 PID 1800 wrote to memory of 1636 1800 XWorm V5.2.exe 57 PID 1800 wrote to memory of 1636 1800 XWorm V5.2.exe 57 PID 1004 wrote to memory of 1060 1004 XWorm V5.2.exe 58 -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
Processes
-
C:\Users\Admin\AppData\Local\Temp\XWorm V5.2.exe"C:\Users\Admin\AppData\Local\Temp\XWorm V5.2.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:1972 -
C:\Users\Admin\AppData\Local\Temp\XWorm V5.2.exe"C:\Users\Admin\AppData\Local\Temp\XWorm V5.2.exe"2⤵
- Suspicious use of WriteProcessMemory
PID:2440 -
C:\Users\Admin\AppData\Local\Temp\XWorm V5.2.exe"C:\Users\Admin\AppData\Local\Temp\XWorm V5.2.exe"3⤵
- Suspicious use of WriteProcessMemory
PID:2840 -
C:\Users\Admin\AppData\Local\Temp\XWorm V5.2.exe"C:\Users\Admin\AppData\Local\Temp\XWorm V5.2.exe"4⤵
- Suspicious use of WriteProcessMemory
PID:2656 -
C:\Users\Admin\AppData\Local\Temp\XWorm V5.2.exe"C:\Users\Admin\AppData\Local\Temp\XWorm V5.2.exe"5⤵
- Suspicious use of WriteProcessMemory
PID:2924 -
C:\Users\Admin\AppData\Local\Temp\XWorm V5.2.exe"C:\Users\Admin\AppData\Local\Temp\XWorm V5.2.exe"6⤵
- Suspicious use of WriteProcessMemory
PID:1056 -
C:\Users\Admin\AppData\Local\Temp\XWorm V5.2.exe"C:\Users\Admin\AppData\Local\Temp\XWorm V5.2.exe"7⤵
- Suspicious use of WriteProcessMemory
PID:1328 -
C:\Users\Admin\AppData\Local\Temp\XWorm V5.2.exe"C:\Users\Admin\AppData\Local\Temp\XWorm V5.2.exe"8⤵
- Suspicious use of WriteProcessMemory
PID:1800 -
C:\Users\Admin\AppData\Local\Temp\XWorm V5.2.exe"C:\Users\Admin\AppData\Local\Temp\XWorm V5.2.exe"9⤵
- Suspicious use of WriteProcessMemory
PID:1004 -
C:\Users\Admin\AppData\Local\Temp\XWorm V5.2.exe"C:\Users\Admin\AppData\Local\Temp\XWorm V5.2.exe"10⤵PID:1060
-
C:\Users\Admin\AppData\Local\Temp\XWorm V5.2.exe"C:\Users\Admin\AppData\Local\Temp\XWorm V5.2.exe"11⤵PID:2068
-
C:\Users\Admin\AppData\Local\Temp\XWorm V5.2.exe"C:\Users\Admin\AppData\Local\Temp\XWorm V5.2.exe"12⤵PID:2956
-
C:\Users\Admin\AppData\Local\Temp\XWorm V5.2.exe"C:\Users\Admin\AppData\Local\Temp\XWorm V5.2.exe"13⤵PID:2780
-
C:\Users\Admin\AppData\Local\Temp\XWorm V5.2.exe"C:\Users\Admin\AppData\Local\Temp\XWorm V5.2.exe"14⤵PID:556
-
C:\Users\Admin\AppData\Local\Temp\XWorm V5.2.exe"C:\Users\Admin\AppData\Local\Temp\XWorm V5.2.exe"15⤵PID:2860
-
C:\Users\Admin\AppData\Local\Temp\XWorm V5.2.exe"C:\Users\Admin\AppData\Local\Temp\XWorm V5.2.exe"16⤵PID:2328
-
C:\Users\Admin\AppData\Local\Temp\XWorm V5.2.exe"C:\Users\Admin\AppData\Local\Temp\XWorm V5.2.exe"17⤵PID:1792
-
C:\Users\Admin\AppData\Local\Temp\XWorm V5.2.exe"C:\Users\Admin\AppData\Local\Temp\XWorm V5.2.exe"18⤵PID:2588
-
C:\Users\Admin\AppData\Local\Temp\XWorm V5.2.exe"C:\Users\Admin\AppData\Local\Temp\XWorm V5.2.exe"19⤵PID:3012
-
C:\Users\Admin\AppData\Local\Temp\XWorm V5.2.exe"C:\Users\Admin\AppData\Local\Temp\XWorm V5.2.exe"20⤵PID:584
-
C:\Users\Admin\AppData\Local\Temp\XWorm V5.2.exe"C:\Users\Admin\AppData\Local\Temp\XWorm V5.2.exe"21⤵PID:2152
-
C:\Users\Admin\AppData\Local\Temp\XWorm V5.2.exe"C:\Users\Admin\AppData\Local\Temp\XWorm V5.2.exe"22⤵PID:1764
-
C:\Users\Admin\AppData\Local\Temp\XWorm V5.2.exe"C:\Users\Admin\AppData\Local\Temp\XWorm V5.2.exe"23⤵PID:2104
-
C:\Users\Admin\AppData\Local\Temp\XWorm V5.2.exe"C:\Users\Admin\AppData\Local\Temp\XWorm V5.2.exe"24⤵PID:2704
-
C:\Users\Admin\AppData\Local\Temp\XWorm V5.2.exe"C:\Users\Admin\AppData\Local\Temp\XWorm V5.2.exe"25⤵PID:1864
-
C:\Users\Admin\AppData\Local\Temp\XWorm V5.2.exe"C:\Users\Admin\AppData\Local\Temp\XWorm V5.2.exe"26⤵PID:2232
-
C:\Users\Admin\AppData\Local\Temp\XWorm V5.2.exe"C:\Users\Admin\AppData\Local\Temp\XWorm V5.2.exe"27⤵PID:3000
-
C:\Users\Admin\AppData\Local\Temp\XWorm V5.2.exe"C:\Users\Admin\AppData\Local\Temp\XWorm V5.2.exe"28⤵PID:264
-
C:\Users\Admin\AppData\Local\Temp\XWorm V5.2.exe"C:\Users\Admin\AppData\Local\Temp\XWorm V5.2.exe"29⤵PID:2804
-
C:\Users\Admin\AppData\Local\Temp\XWorm V5.2.exe"C:\Users\Admin\AppData\Local\Temp\XWorm V5.2.exe"30⤵PID:2120
-
C:\Users\Admin\AppData\Local\Temp\XWorm V5.2.exe"C:\Users\Admin\AppData\Local\Temp\XWorm V5.2.exe"31⤵PID:2504
-
C:\Users\Admin\AppData\Local\Temp\XWorm V5.2.exe"C:\Users\Admin\AppData\Local\Temp\XWorm V5.2.exe"32⤵PID:2092
-
C:\Users\Admin\AppData\Local\Temp\XWorm V5.2.exe"C:\Users\Admin\AppData\Local\Temp\XWorm V5.2.exe"33⤵PID:1112
-
C:\Users\Admin\AppData\Local\Temp\XWorm V5.2.exe"C:\Users\Admin\AppData\Local\Temp\XWorm V5.2.exe"34⤵PID:1264
-
C:\Users\Admin\AppData\Local\Temp\XWorm V5.2.exe"C:\Users\Admin\AppData\Local\Temp\XWorm V5.2.exe"35⤵PID:760
-
C:\Users\Admin\AppData\Local\Temp\XWorm V5.2.exe"C:\Users\Admin\AppData\Local\Temp\XWorm V5.2.exe"36⤵PID:2752
-
C:\Users\Admin\AppData\Local\Temp\XWorm V5.2.exe"C:\Users\Admin\AppData\Local\Temp\XWorm V5.2.exe"37⤵PID:2656
-
C:\Users\Admin\AppData\Local\Temp\XWorm V5.2.exe"C:\Users\Admin\AppData\Local\Temp\XWorm V5.2.exe"38⤵PID:1552
-
C:\Users\Admin\AppData\Local\Temp\XWorm V5.2.exe"C:\Users\Admin\AppData\Local\Temp\XWorm V5.2.exe"39⤵PID:608
-
C:\Users\Admin\AppData\Local\Temp\XWorm V5.2.exe"C:\Users\Admin\AppData\Local\Temp\XWorm V5.2.exe"40⤵PID:2776
-
C:\Users\Admin\AppData\Local\Temp\XWorm V5.2.exe"C:\Users\Admin\AppData\Local\Temp\XWorm V5.2.exe"41⤵PID:2264
-
C:\Users\Admin\AppData\Local\Temp\XWorm V5.2.exe"C:\Users\Admin\AppData\Local\Temp\XWorm V5.2.exe"42⤵PID:780
-
C:\Users\Admin\AppData\Local\Temp\XWorm V5.2.exe"C:\Users\Admin\AppData\Local\Temp\XWorm V5.2.exe"43⤵PID:2428
-
C:\Users\Admin\AppData\Local\Temp\XWorm V5.2.exe"C:\Users\Admin\AppData\Local\Temp\XWorm V5.2.exe"44⤵PID:2296
-
C:\Users\Admin\AppData\Local\Temp\XWorm V5.2.exe"C:\Users\Admin\AppData\Local\Temp\XWorm V5.2.exe"45⤵PID:1328
-
C:\Users\Admin\AppData\Local\Temp\XWorm V5.2.exe"C:\Users\Admin\AppData\Local\Temp\XWorm V5.2.exe"46⤵PID:2476
-
C:\Users\Admin\AppData\Local\Temp\XWorm V5.2.exe"C:\Users\Admin\AppData\Local\Temp\XWorm V5.2.exe"47⤵PID:1568
-
C:\Users\Admin\AppData\Local\Temp\XWorm V5.2.exe"C:\Users\Admin\AppData\Local\Temp\XWorm V5.2.exe"48⤵PID:900
-
C:\Users\Admin\AppData\Local\Temp\XWorm V5.2.exe"C:\Users\Admin\AppData\Local\Temp\XWorm V5.2.exe"49⤵PID:2516
-
C:\Users\Admin\AppData\Local\Temp\XWorm V5.2.exe"C:\Users\Admin\AppData\Local\Temp\XWorm V5.2.exe"50⤵PID:2496
-
C:\Users\Admin\AppData\Local\Temp\XWorm V5.2.exe"C:\Users\Admin\AppData\Local\Temp\XWorm V5.2.exe"51⤵PID:1956
-
C:\Users\Admin\AppData\Local\Temp\XWorm V5.2.exe"C:\Users\Admin\AppData\Local\Temp\XWorm V5.2.exe"52⤵PID:2240
-
C:\Users\Admin\AppData\Local\Temp\XWorm V5.2.exe"C:\Users\Admin\AppData\Local\Temp\XWorm V5.2.exe"53⤵PID:608
-
C:\Users\Admin\AppData\Local\Temp\XWorm V5.2.exe"C:\Users\Admin\AppData\Local\Temp\XWorm V5.2.exe"54⤵PID:1144
-
C:\Users\Admin\AppData\Local\Temp\XWorm V5.2.exe"C:\Users\Admin\AppData\Local\Temp\XWorm V5.2.exe"55⤵PID:2724
-
C:\Users\Admin\AppData\Local\Temp\XWorm V5.2.exe"C:\Users\Admin\AppData\Local\Temp\XWorm V5.2.exe"56⤵PID:780
-
C:\Users\Admin\AppData\Local\Temp\XWorm V5.2.exe"C:\Users\Admin\AppData\Local\Temp\XWorm V5.2.exe"57⤵PID:1868
-
C:\Users\Admin\AppData\Local\Temp\XWorm V5.2.exe"C:\Users\Admin\AppData\Local\Temp\XWorm V5.2.exe"58⤵PID:584
-
C:\Users\Admin\AppData\Local\Temp\XWorm V5.2.exe"C:\Users\Admin\AppData\Local\Temp\XWorm V5.2.exe"59⤵PID:2760
-
C:\Users\Admin\AppData\Local\Temp\XWorm V5.2.exe"C:\Users\Admin\AppData\Local\Temp\XWorm V5.2.exe"60⤵PID:1212
-
C:\Users\Admin\AppData\Local\Temp\XWorm V5.2.exe"C:\Users\Admin\AppData\Local\Temp\XWorm V5.2.exe"61⤵PID:1264
-
C:\Users\Admin\AppData\Local\Temp\XWorm V5.2.exe"C:\Users\Admin\AppData\Local\Temp\XWorm V5.2.exe"62⤵PID:2152
-
C:\Users\Admin\AppData\Local\Temp\XWorm V5.2.exe"C:\Users\Admin\AppData\Local\Temp\XWorm V5.2.exe"63⤵PID:2816
-
C:\Users\Admin\AppData\Local\Temp\XWorm V5.2.exe"C:\Users\Admin\AppData\Local\Temp\XWorm V5.2.exe"64⤵PID:2668
-
C:\Users\Admin\AppData\Local\Temp\XWorm V5.2.exe"C:\Users\Admin\AppData\Local\Temp\XWorm V5.2.exe"65⤵PID:1932
-
C:\Users\Admin\AppData\Local\Temp\XWorm V5.2.exe"C:\Users\Admin\AppData\Local\Temp\XWorm V5.2.exe"66⤵PID:2228
-
C:\Users\Admin\AppData\Local\Temp\XWorm V5.2.exe"C:\Users\Admin\AppData\Local\Temp\XWorm V5.2.exe"67⤵PID:2988
-
C:\Users\Admin\AppData\Local\Temp\XWorm V5.2.exe"C:\Users\Admin\AppData\Local\Temp\XWorm V5.2.exe"68⤵PID:2928
-
C:\Users\Admin\AppData\Local\Temp\XWorm V5.2.exe"C:\Users\Admin\AppData\Local\Temp\XWorm V5.2.exe"69⤵PID:2608
-
C:\Users\Admin\AppData\Local\Temp\XWorm V5.2.exe"C:\Users\Admin\AppData\Local\Temp\XWorm V5.2.exe"70⤵PID:2860
-
C:\Users\Admin\AppData\Local\Temp\XWorm V5.2.exe"C:\Users\Admin\AppData\Local\Temp\XWorm V5.2.exe"71⤵PID:2052
-
C:\Users\Admin\AppData\Local\Temp\XWorm V5.2.exe"C:\Users\Admin\AppData\Local\Temp\XWorm V5.2.exe"72⤵PID:1856
-
C:\Users\Admin\AppData\Local\Temp\XWorm V5.2.exe"C:\Users\Admin\AppData\Local\Temp\XWorm V5.2.exe"73⤵PID:1172
-
C:\Users\Admin\AppData\Local\Temp\XWorm V5.2.exe"C:\Users\Admin\AppData\Local\Temp\XWorm V5.2.exe"74⤵PID:2476
-
C:\Users\Admin\AppData\Local\Temp\XWorm V5.2.exe"C:\Users\Admin\AppData\Local\Temp\XWorm V5.2.exe"75⤵PID:2504
-
C:\Users\Admin\AppData\Local\Temp\XWorm V5.2.exe"C:\Users\Admin\AppData\Local\Temp\XWorm V5.2.exe"76⤵PID:2104
-
C:\Users\Admin\AppData\Local\Temp\XWorm V5.2.exe"C:\Users\Admin\AppData\Local\Temp\XWorm V5.2.exe"77⤵PID:2832
-
C:\Users\Admin\AppData\Local\Temp\XWorm V5.2.exe"C:\Users\Admin\AppData\Local\Temp\XWorm V5.2.exe"78⤵PID:1960
-
C:\Users\Admin\AppData\Local\Temp\XWorm V5.2.exe"C:\Users\Admin\AppData\Local\Temp\XWorm V5.2.exe"79⤵PID:2236
-
C:\Users\Admin\AppData\Local\Temp\XWorm V5.2.exe"C:\Users\Admin\AppData\Local\Temp\XWorm V5.2.exe"80⤵PID:2976
-
C:\Users\Admin\AppData\Local\Temp\XWorm V5.2.exe"C:\Users\Admin\AppData\Local\Temp\XWorm V5.2.exe"81⤵PID:2228
-
C:\Users\Admin\AppData\Local\Temp\XWorm V5.2.exe"C:\Users\Admin\AppData\Local\Temp\XWorm V5.2.exe"82⤵PID:2988
-
C:\Users\Admin\AppData\Local\Temp\XWorm V5.2.exe"C:\Users\Admin\AppData\Local\Temp\XWorm V5.2.exe"83⤵PID:2928
-
C:\Users\Admin\AppData\Local\Temp\XWorm V5.2.exe"C:\Users\Admin\AppData\Local\Temp\XWorm V5.2.exe"84⤵PID:1748
-
C:\Users\Admin\AppData\Local\Temp\XWorm V5.2.exe"C:\Users\Admin\AppData\Local\Temp\XWorm V5.2.exe"85⤵PID:1984
-
C:\Users\Admin\AppData\Local\Temp\XWorm V5.2.exe"C:\Users\Admin\AppData\Local\Temp\XWorm V5.2.exe"86⤵PID:2028
-
C:\Users\Admin\AppData\Local\Temp\XWorm V5.2.exe"C:\Users\Admin\AppData\Local\Temp\XWorm V5.2.exe"87⤵PID:1328
-
C:\Users\Admin\AppData\Local\Temp\XWorm V5.2.exe"C:\Users\Admin\AppData\Local\Temp\XWorm V5.2.exe"88⤵PID:1692
-
C:\Users\Admin\AppData\Local\Temp\XWorm V5.2.exe"C:\Users\Admin\AppData\Local\Temp\XWorm V5.2.exe"89⤵PID:1784
-
C:\Users\Admin\AppData\Local\Temp\XWorm V5.2.exe"C:\Users\Admin\AppData\Local\Temp\XWorm V5.2.exe"90⤵PID:2260
-
C:\Users\Admin\AppData\Local\Temp\XWorm V5.2.exe"C:\Users\Admin\AppData\Local\Temp\XWorm V5.2.exe"91⤵PID:2800
-
C:\Users\Admin\AppData\Local\Temp\XWorm V5.2.exe"C:\Users\Admin\AppData\Local\Temp\XWorm V5.2.exe"92⤵PID:304
-
C:\Users\Admin\AppData\Local\Temp\XWorm V5.2.exe"C:\Users\Admin\AppData\Local\Temp\XWorm V5.2.exe"93⤵PID:2008
-
C:\Users\Admin\AppData\Local\Temp\XWorm V5.2.exe"C:\Users\Admin\AppData\Local\Temp\XWorm V5.2.exe"94⤵PID:3040
-
C:\Users\Admin\AppData\Local\Temp\XWorm V5.2.exe"C:\Users\Admin\AppData\Local\Temp\XWorm V5.2.exe"95⤵PID:888
-
C:\Users\Admin\AppData\Local\Temp\XWorm V5.2.exe"C:\Users\Admin\AppData\Local\Temp\XWorm V5.2.exe"96⤵PID:1588
-
C:\Users\Admin\AppData\Local\Temp\XWorm V5.2.exe"C:\Users\Admin\AppData\Local\Temp\XWorm V5.2.exe"97⤵PID:1744
-
C:\Users\Admin\AppData\Local\Temp\XWorm V5.2.exe"C:\Users\Admin\AppData\Local\Temp\XWorm V5.2.exe"98⤵PID:600
-
C:\Users\Admin\AppData\Local\Temp\XWorm V5.2.exe"C:\Users\Admin\AppData\Local\Temp\XWorm V5.2.exe"99⤵PID:1444
-
C:\Users\Admin\AppData\Local\Temp\XWorm V5.2.exe"C:\Users\Admin\AppData\Local\Temp\XWorm V5.2.exe"100⤵PID:3012
-
C:\Users\Admin\AppData\Local\Temp\XWorm V5.2.exe"C:\Users\Admin\AppData\Local\Temp\XWorm V5.2.exe"101⤵PID:1028
-
C:\Users\Admin\AppData\Local\Temp\XWorm V5.2.exe"C:\Users\Admin\AppData\Local\Temp\XWorm V5.2.exe"102⤵PID:1872
-
C:\Users\Admin\AppData\Local\Temp\XWorm V5.2.exe"C:\Users\Admin\AppData\Local\Temp\XWorm V5.2.exe"103⤵PID:2088
-
C:\Users\Admin\AppData\Local\Temp\XWorm V5.2.exe"C:\Users\Admin\AppData\Local\Temp\XWorm V5.2.exe"104⤵PID:1636
-
C:\Users\Admin\AppData\Local\Temp\XWorm V5.2.exe"C:\Users\Admin\AppData\Local\Temp\XWorm V5.2.exe"105⤵PID:2820
-
C:\Users\Admin\AppData\Local\Temp\XWorm V5.2.exe"C:\Users\Admin\AppData\Local\Temp\XWorm V5.2.exe"106⤵PID:880
-
C:\Users\Admin\AppData\Local\Temp\XWorm V5.2.exe"C:\Users\Admin\AppData\Local\Temp\XWorm V5.2.exe"107⤵PID:1008
-
C:\Users\Admin\AppData\Local\Temp\XWorm V5.2.exe"C:\Users\Admin\AppData\Local\Temp\XWorm V5.2.exe"108⤵PID:2072
-
C:\Users\Admin\AppData\Local\Temp\XWorm V5.2.exe"C:\Users\Admin\AppData\Local\Temp\XWorm V5.2.exe"109⤵PID:2996
-
C:\Users\Admin\AppData\Local\Temp\XWorm V5.2.exe"C:\Users\Admin\AppData\Local\Temp\XWorm V5.2.exe"110⤵PID:2404
-
C:\Users\Admin\AppData\Local\Temp\XWorm V5.2.exe"C:\Users\Admin\AppData\Local\Temp\XWorm V5.2.exe"111⤵PID:3000
-
C:\Users\Admin\AppData\Local\Temp\XWorm V5.2.exe"C:\Users\Admin\AppData\Local\Temp\XWorm V5.2.exe"112⤵PID:2372
-
C:\Users\Admin\AppData\Local\Temp\XWorm V5.2.exe"C:\Users\Admin\AppData\Local\Temp\XWorm V5.2.exe"113⤵PID:784
-
C:\Users\Admin\AppData\Local\Temp\XWorm V5.2.exe"C:\Users\Admin\AppData\Local\Temp\XWorm V5.2.exe"114⤵PID:2360
-
C:\Users\Admin\AppData\Local\Temp\XWorm V5.2.exe"C:\Users\Admin\AppData\Local\Temp\XWorm V5.2.exe"115⤵PID:2960
-
C:\Users\Admin\AppData\Local\Temp\XWorm V5.2.exe"C:\Users\Admin\AppData\Local\Temp\XWorm V5.2.exe"116⤵PID:1096
-
C:\Users\Admin\AppData\Local\Temp\XWorm V5.2.exe"C:\Users\Admin\AppData\Local\Temp\XWorm V5.2.exe"117⤵PID:936
-
C:\Users\Admin\AppData\Local\Temp\XWorm V5.2.exe"C:\Users\Admin\AppData\Local\Temp\XWorm V5.2.exe"118⤵PID:2040
-
C:\Users\Admin\AppData\Local\Temp\XWorm V5.2.exe"C:\Users\Admin\AppData\Local\Temp\XWorm V5.2.exe"119⤵PID:1612
-
C:\Users\Admin\AppData\Local\Temp\XWorm V5.2.exe"C:\Users\Admin\AppData\Local\Temp\XWorm V5.2.exe"120⤵PID:2064
-
C:\Users\Admin\AppData\Local\Temp\XWorm V5.2.exe"C:\Users\Admin\AppData\Local\Temp\XWorm V5.2.exe"121⤵PID:2756
-
C:\Users\Admin\AppData\Local\Temp\XWorm V5.2.exe"C:\Users\Admin\AppData\Local\Temp\XWorm V5.2.exe"122⤵PID:2008
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-