Analysis
-
max time kernel
299s -
max time network
300s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
07-09-2024 20:54
Behavioral task
behavioral1
Sample
XWorm V5.2.exe
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
XWorm V5.2.exe
Resource
win10v2004-20240802-en
Behavioral task
behavioral3
Sample
XWorm.exe
Resource
win7-20240708-en
Behavioral task
behavioral4
Sample
XWorm.exe
Resource
win10v2004-20240802-en
General
-
Target
XWorm V5.2.exe
-
Size
9.1MB
-
MD5
1c264a483f2f667410157dac2f067d66
-
SHA1
4831f141b41802d06d6735b237c53f4d34e9d428
-
SHA256
1c906ee702dadbc5ce1668754a488cbbc9838c63aaa6fb77fe5e848491b6f474
-
SHA512
1b48506e8cd01b66e930b8bb70998a3e4f02a300ef1a97252e105013b7e455c021d014a4cf3b1ba77deadc94e1908c8314c2875900145760cc5c402f37d637a2
-
SSDEEP
196608:6OdkWMB1TCCAaa/f+cUhBLHK1gzaFsKnULGZ3d/VRyDhwymXeexoAxG:6K2B1CkcDUDLHK18as0mcvow+Ax
Malware Config
Extracted
xworm
uk1.localto.net:3725
-
Install_directory
%ProgramData%
-
install_file
svchost.exe
Signatures
-
Detect Xworm Payload 2 IoCs
resource yara_rule behavioral2/files/0x00070000000234c8-7.dat family_xworm behavioral2/memory/4736-17-0x00000000008C0000-0x00000000008D6000-memory.dmp family_xworm -
Command and Scripting Interpreter: PowerShell 1 TTPs 4 IoCs
Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.
pid Process 3168 powershell.exe 4788 powershell.exe 4688 powershell.exe 1720 powershell.exe -
Checks computer location settings 2 TTPs 64 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-4182098368-2521458979-3782681353-1000\Control Panel\International\Geo\Nation XWorm V5.2.exe Key value queried \REGISTRY\USER\S-1-5-21-4182098368-2521458979-3782681353-1000\Control Panel\International\Geo\Nation XWorm V5.2.exe Key value queried \REGISTRY\USER\S-1-5-21-4182098368-2521458979-3782681353-1000\Control Panel\International\Geo\Nation XWorm V5.2.exe Key value queried \REGISTRY\USER\S-1-5-21-4182098368-2521458979-3782681353-1000\Control Panel\International\Geo\Nation XWorm V5.2.exe Key value queried \REGISTRY\USER\S-1-5-21-4182098368-2521458979-3782681353-1000\Control Panel\International\Geo\Nation XWorm V5.2.exe Key value queried \REGISTRY\USER\S-1-5-21-4182098368-2521458979-3782681353-1000\Control Panel\International\Geo\Nation XWorm V5.2.exe Key value queried \REGISTRY\USER\S-1-5-21-4182098368-2521458979-3782681353-1000\Control Panel\International\Geo\Nation XWorm V5.2.exe Key value queried \REGISTRY\USER\S-1-5-21-4182098368-2521458979-3782681353-1000\Control Panel\International\Geo\Nation XWorm.exe Key value queried \REGISTRY\USER\S-1-5-21-4182098368-2521458979-3782681353-1000\Control Panel\International\Geo\Nation XWorm V5.2.exe Key value queried \REGISTRY\USER\S-1-5-21-4182098368-2521458979-3782681353-1000\Control Panel\International\Geo\Nation XWorm V5.2.exe Key value queried \REGISTRY\USER\S-1-5-21-4182098368-2521458979-3782681353-1000\Control Panel\International\Geo\Nation XWorm V5.2.exe Key value queried \REGISTRY\USER\S-1-5-21-4182098368-2521458979-3782681353-1000\Control Panel\International\Geo\Nation XWorm V5.2.exe Key value queried \REGISTRY\USER\S-1-5-21-4182098368-2521458979-3782681353-1000\Control Panel\International\Geo\Nation XWorm V5.2.exe Key value queried \REGISTRY\USER\S-1-5-21-4182098368-2521458979-3782681353-1000\Control Panel\International\Geo\Nation XWorm V5.2.exe Key value queried \REGISTRY\USER\S-1-5-21-4182098368-2521458979-3782681353-1000\Control Panel\International\Geo\Nation XWorm V5.2.exe Key value queried \REGISTRY\USER\S-1-5-21-4182098368-2521458979-3782681353-1000\Control Panel\International\Geo\Nation XWorm V5.2.exe Key value queried \REGISTRY\USER\S-1-5-21-4182098368-2521458979-3782681353-1000\Control Panel\International\Geo\Nation XWorm V5.2.exe Key value queried \REGISTRY\USER\S-1-5-21-4182098368-2521458979-3782681353-1000\Control Panel\International\Geo\Nation XWorm V5.2.exe Key value queried \REGISTRY\USER\S-1-5-21-4182098368-2521458979-3782681353-1000\Control Panel\International\Geo\Nation XWorm V5.2.exe Key value queried \REGISTRY\USER\S-1-5-21-4182098368-2521458979-3782681353-1000\Control Panel\International\Geo\Nation XWorm V5.2.exe Key value queried \REGISTRY\USER\S-1-5-21-4182098368-2521458979-3782681353-1000\Control Panel\International\Geo\Nation XWorm V5.2.exe Key value queried \REGISTRY\USER\S-1-5-21-4182098368-2521458979-3782681353-1000\Control Panel\International\Geo\Nation XWorm V5.2.exe Key value queried \REGISTRY\USER\S-1-5-21-4182098368-2521458979-3782681353-1000\Control Panel\International\Geo\Nation XWorm V5.2.exe Key value queried \REGISTRY\USER\S-1-5-21-4182098368-2521458979-3782681353-1000\Control Panel\International\Geo\Nation XWorm V5.2.exe Key value queried \REGISTRY\USER\S-1-5-21-4182098368-2521458979-3782681353-1000\Control Panel\International\Geo\Nation XWorm V5.2.exe Key value queried \REGISTRY\USER\S-1-5-21-4182098368-2521458979-3782681353-1000\Control Panel\International\Geo\Nation XWorm V5.2.exe Key value queried \REGISTRY\USER\S-1-5-21-4182098368-2521458979-3782681353-1000\Control Panel\International\Geo\Nation XWorm V5.2.exe Key value queried \REGISTRY\USER\S-1-5-21-4182098368-2521458979-3782681353-1000\Control Panel\International\Geo\Nation XWorm V5.2.exe Key value queried \REGISTRY\USER\S-1-5-21-4182098368-2521458979-3782681353-1000\Control Panel\International\Geo\Nation XWorm V5.2.exe Key value queried \REGISTRY\USER\S-1-5-21-4182098368-2521458979-3782681353-1000\Control Panel\International\Geo\Nation XWorm V5.2.exe Key value queried \REGISTRY\USER\S-1-5-21-4182098368-2521458979-3782681353-1000\Control Panel\International\Geo\Nation XWorm V5.2.exe Key value queried \REGISTRY\USER\S-1-5-21-4182098368-2521458979-3782681353-1000\Control Panel\International\Geo\Nation XWorm V5.2.exe Key value queried \REGISTRY\USER\S-1-5-21-4182098368-2521458979-3782681353-1000\Control Panel\International\Geo\Nation XWorm V5.2.exe Key value queried \REGISTRY\USER\S-1-5-21-4182098368-2521458979-3782681353-1000\Control Panel\International\Geo\Nation XWorm V5.2.exe Key value queried \REGISTRY\USER\S-1-5-21-4182098368-2521458979-3782681353-1000\Control Panel\International\Geo\Nation XWorm V5.2.exe Key value queried \REGISTRY\USER\S-1-5-21-4182098368-2521458979-3782681353-1000\Control Panel\International\Geo\Nation XWorm V5.2.exe Key value queried \REGISTRY\USER\S-1-5-21-4182098368-2521458979-3782681353-1000\Control Panel\International\Geo\Nation XWorm V5.2.exe Key value queried \REGISTRY\USER\S-1-5-21-4182098368-2521458979-3782681353-1000\Control Panel\International\Geo\Nation XWorm V5.2.exe Key value queried \REGISTRY\USER\S-1-5-21-4182098368-2521458979-3782681353-1000\Control Panel\International\Geo\Nation XWorm V5.2.exe Key value queried \REGISTRY\USER\S-1-5-21-4182098368-2521458979-3782681353-1000\Control Panel\International\Geo\Nation XWorm V5.2.exe Key value queried \REGISTRY\USER\S-1-5-21-4182098368-2521458979-3782681353-1000\Control Panel\International\Geo\Nation XWorm V5.2.exe Key value queried \REGISTRY\USER\S-1-5-21-4182098368-2521458979-3782681353-1000\Control Panel\International\Geo\Nation XWorm V5.2.exe Key value queried \REGISTRY\USER\S-1-5-21-4182098368-2521458979-3782681353-1000\Control Panel\International\Geo\Nation XWorm V5.2.exe Key value queried \REGISTRY\USER\S-1-5-21-4182098368-2521458979-3782681353-1000\Control Panel\International\Geo\Nation XWorm V5.2.exe Key value queried \REGISTRY\USER\S-1-5-21-4182098368-2521458979-3782681353-1000\Control Panel\International\Geo\Nation XWorm V5.2.exe Key value queried \REGISTRY\USER\S-1-5-21-4182098368-2521458979-3782681353-1000\Control Panel\International\Geo\Nation XWorm V5.2.exe Key value queried \REGISTRY\USER\S-1-5-21-4182098368-2521458979-3782681353-1000\Control Panel\International\Geo\Nation XWorm V5.2.exe Key value queried \REGISTRY\USER\S-1-5-21-4182098368-2521458979-3782681353-1000\Control Panel\International\Geo\Nation XWorm V5.2.exe Key value queried \REGISTRY\USER\S-1-5-21-4182098368-2521458979-3782681353-1000\Control Panel\International\Geo\Nation XWorm V5.2.exe Key value queried \REGISTRY\USER\S-1-5-21-4182098368-2521458979-3782681353-1000\Control Panel\International\Geo\Nation XWorm V5.2.exe Key value queried \REGISTRY\USER\S-1-5-21-4182098368-2521458979-3782681353-1000\Control Panel\International\Geo\Nation XWorm V5.2.exe Key value queried \REGISTRY\USER\S-1-5-21-4182098368-2521458979-3782681353-1000\Control Panel\International\Geo\Nation XWorm V5.2.exe Key value queried \REGISTRY\USER\S-1-5-21-4182098368-2521458979-3782681353-1000\Control Panel\International\Geo\Nation XWorm V5.2.exe Key value queried \REGISTRY\USER\S-1-5-21-4182098368-2521458979-3782681353-1000\Control Panel\International\Geo\Nation XWorm V5.2.exe Key value queried \REGISTRY\USER\S-1-5-21-4182098368-2521458979-3782681353-1000\Control Panel\International\Geo\Nation XWorm V5.2.exe Key value queried \REGISTRY\USER\S-1-5-21-4182098368-2521458979-3782681353-1000\Control Panel\International\Geo\Nation XWorm V5.2.exe Key value queried \REGISTRY\USER\S-1-5-21-4182098368-2521458979-3782681353-1000\Control Panel\International\Geo\Nation XWorm V5.2.exe Key value queried \REGISTRY\USER\S-1-5-21-4182098368-2521458979-3782681353-1000\Control Panel\International\Geo\Nation XWorm V5.2.exe Key value queried \REGISTRY\USER\S-1-5-21-4182098368-2521458979-3782681353-1000\Control Panel\International\Geo\Nation XWorm V5.2.exe Key value queried \REGISTRY\USER\S-1-5-21-4182098368-2521458979-3782681353-1000\Control Panel\International\Geo\Nation XWorm V5.2.exe Key value queried \REGISTRY\USER\S-1-5-21-4182098368-2521458979-3782681353-1000\Control Panel\International\Geo\Nation XWorm V5.2.exe Key value queried \REGISTRY\USER\S-1-5-21-4182098368-2521458979-3782681353-1000\Control Panel\International\Geo\Nation XWorm V5.2.exe Key value queried \REGISTRY\USER\S-1-5-21-4182098368-2521458979-3782681353-1000\Control Panel\International\Geo\Nation XWorm V5.2.exe Key value queried \REGISTRY\USER\S-1-5-21-4182098368-2521458979-3782681353-1000\Control Panel\International\Geo\Nation XWorm V5.2.exe -
Drops startup file 2 IoCs
description ioc Process File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\svchost.lnk XWorm.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\svchost.lnk XWorm.exe -
Executes dropped EXE 64 IoCs
pid Process 4736 XWorm.exe 4780 XWorm.exe 2084 XWorm.exe 1748 XWorm.exe 4280 XWorm.exe 5096 XWorm.exe 1608 XWorm.exe 5056 XWorm.exe 4844 XWorm.exe 4212 XWorm.exe 2624 XWorm.exe 2328 XWorm.exe 1904 XWorm.exe 4312 XWorm.exe 4788 XWorm.exe 4268 XWorm.exe 5048 XWorm.exe 2508 XWorm.exe 388 XWorm.exe 4548 XWorm.exe 3000 svchost.exe 2604 XWorm.exe 2628 XWorm.exe 3600 XWorm.exe 4892 XWorm.exe 1496 XWorm.exe 844 XWorm.exe 4460 XWorm.exe 4308 XWorm.exe 4976 XWorm.exe 2900 XWorm.exe 4320 XWorm.exe 2140 XWorm.exe 2280 XWorm.exe 3268 XWorm.exe 3040 XWorm.exe 3348 XWorm.exe 432 XWorm.exe 1924 XWorm.exe 4532 XWorm.exe 720 XWorm.exe 1480 XWorm.exe 3480 XWorm.exe 2124 XWorm.exe 4232 XWorm.exe 3032 XWorm.exe 4120 svchost.exe 2856 XWorm.exe 3204 XWorm.exe 2624 XWorm.exe 3040 XWorm.exe 1988 XWorm.exe 3544 XWorm.exe 4948 XWorm.exe 3924 XWorm.exe 2396 XWorm.exe 2196 XWorm.exe 732 XWorm.exe 3136 XWorm.exe 5056 XWorm.exe 2284 XWorm.exe 3292 XWorm.exe 4476 XWorm.exe 3204 XWorm.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-4182098368-2521458979-3782681353-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\svchost = "C:\\ProgramData\\svchost.exe" XWorm.exe -
Looks up external IP address via web service 1 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
flow ioc 4 ip-api.com -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Scheduled Task/Job: Scheduled Task 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 1664 schtasks.exe -
Suspicious behavior: EnumeratesProcesses 9 IoCs
pid Process 4788 powershell.exe 4788 powershell.exe 4688 powershell.exe 4688 powershell.exe 1720 powershell.exe 1720 powershell.exe 3168 powershell.exe 3168 powershell.exe 4736 XWorm.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeDebugPrivilege 4736 XWorm.exe Token: SeDebugPrivilege 4780 XWorm.exe Token: SeDebugPrivilege 4788 powershell.exe Token: SeDebugPrivilege 4688 powershell.exe Token: SeDebugPrivilege 2084 XWorm.exe Token: SeDebugPrivilege 1720 powershell.exe Token: SeDebugPrivilege 3168 powershell.exe Token: SeDebugPrivilege 4736 XWorm.exe Token: SeDebugPrivilege 1748 XWorm.exe Token: SeDebugPrivilege 4280 XWorm.exe Token: SeDebugPrivilege 5096 XWorm.exe Token: SeDebugPrivilege 1608 XWorm.exe Token: SeDebugPrivilege 5056 XWorm.exe Token: SeDebugPrivilege 4844 XWorm.exe Token: SeDebugPrivilege 4212 XWorm.exe Token: SeDebugPrivilege 2624 XWorm.exe Token: SeDebugPrivilege 2328 XWorm.exe Token: SeDebugPrivilege 1904 XWorm.exe Token: SeDebugPrivilege 4312 XWorm.exe Token: SeDebugPrivilege 4788 XWorm.exe Token: SeDebugPrivilege 4268 XWorm.exe Token: SeDebugPrivilege 5048 XWorm.exe Token: SeDebugPrivilege 2508 XWorm.exe Token: SeDebugPrivilege 388 XWorm.exe Token: SeDebugPrivilege 4548 XWorm.exe Token: SeDebugPrivilege 3000 svchost.exe Token: SeDebugPrivilege 2604 XWorm.exe Token: SeDebugPrivilege 2628 XWorm.exe Token: SeDebugPrivilege 3600 XWorm.exe Token: SeDebugPrivilege 4892 XWorm.exe Token: SeDebugPrivilege 1496 XWorm.exe Token: SeDebugPrivilege 844 XWorm.exe Token: SeDebugPrivilege 4460 XWorm.exe Token: SeDebugPrivilege 4308 XWorm.exe Token: SeDebugPrivilege 4976 XWorm.exe Token: SeDebugPrivilege 2900 XWorm.exe Token: SeDebugPrivilege 4320 XWorm.exe Token: SeDebugPrivilege 2140 XWorm.exe Token: SeDebugPrivilege 2280 XWorm.exe Token: SeDebugPrivilege 3268 XWorm.exe Token: SeDebugPrivilege 3040 XWorm.exe Token: SeDebugPrivilege 3348 XWorm.exe Token: SeDebugPrivilege 432 XWorm.exe Token: SeDebugPrivilege 1924 XWorm.exe Token: SeDebugPrivilege 4532 XWorm.exe Token: SeDebugPrivilege 720 XWorm.exe Token: SeDebugPrivilege 1480 XWorm.exe Token: SeDebugPrivilege 3480 XWorm.exe Token: SeDebugPrivilege 2124 XWorm.exe Token: SeDebugPrivilege 4232 XWorm.exe Token: SeDebugPrivilege 3032 XWorm.exe Token: SeDebugPrivilege 4120 svchost.exe Token: SeDebugPrivilege 2856 XWorm.exe Token: SeDebugPrivilege 3204 XWorm.exe Token: SeDebugPrivilege 2624 XWorm.exe Token: SeDebugPrivilege 3040 XWorm.exe Token: SeDebugPrivilege 1988 XWorm.exe Token: SeDebugPrivilege 3544 XWorm.exe Token: SeDebugPrivilege 4948 XWorm.exe Token: SeDebugPrivilege 3924 XWorm.exe Token: SeDebugPrivilege 2396 XWorm.exe Token: SeDebugPrivilege 2196 XWorm.exe Token: SeDebugPrivilege 732 XWorm.exe Token: SeDebugPrivilege 3136 XWorm.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 4736 XWorm.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 1824 wrote to memory of 2456 1824 XWorm V5.2.exe 85 PID 1824 wrote to memory of 2456 1824 XWorm V5.2.exe 85 PID 1824 wrote to memory of 4736 1824 XWorm V5.2.exe 86 PID 1824 wrote to memory of 4736 1824 XWorm V5.2.exe 86 PID 2456 wrote to memory of 1728 2456 XWorm V5.2.exe 87 PID 2456 wrote to memory of 1728 2456 XWorm V5.2.exe 87 PID 2456 wrote to memory of 4780 2456 XWorm V5.2.exe 88 PID 2456 wrote to memory of 4780 2456 XWorm V5.2.exe 88 PID 4736 wrote to memory of 4788 4736 XWorm.exe 90 PID 4736 wrote to memory of 4788 4736 XWorm.exe 90 PID 4736 wrote to memory of 4688 4736 XWorm.exe 92 PID 4736 wrote to memory of 4688 4736 XWorm.exe 92 PID 1728 wrote to memory of 4988 1728 XWorm V5.2.exe 94 PID 1728 wrote to memory of 4988 1728 XWorm V5.2.exe 94 PID 1728 wrote to memory of 2084 1728 XWorm V5.2.exe 95 PID 1728 wrote to memory of 2084 1728 XWorm V5.2.exe 95 PID 4736 wrote to memory of 1720 4736 XWorm.exe 96 PID 4736 wrote to memory of 1720 4736 XWorm.exe 96 PID 4736 wrote to memory of 3168 4736 XWorm.exe 98 PID 4736 wrote to memory of 3168 4736 XWorm.exe 98 PID 4736 wrote to memory of 1664 4736 XWorm.exe 100 PID 4736 wrote to memory of 1664 4736 XWorm.exe 100 PID 4988 wrote to memory of 412 4988 XWorm V5.2.exe 102 PID 4988 wrote to memory of 412 4988 XWorm V5.2.exe 102 PID 4988 wrote to memory of 1748 4988 XWorm V5.2.exe 103 PID 4988 wrote to memory of 1748 4988 XWorm V5.2.exe 103 PID 412 wrote to memory of 884 412 XWorm V5.2.exe 104 PID 412 wrote to memory of 884 412 XWorm V5.2.exe 104 PID 412 wrote to memory of 4280 412 XWorm V5.2.exe 105 PID 412 wrote to memory of 4280 412 XWorm V5.2.exe 105 PID 884 wrote to memory of 3568 884 XWorm V5.2.exe 106 PID 884 wrote to memory of 3568 884 XWorm V5.2.exe 106 PID 884 wrote to memory of 5096 884 XWorm V5.2.exe 107 PID 884 wrote to memory of 5096 884 XWorm V5.2.exe 107 PID 3568 wrote to memory of 640 3568 XWorm V5.2.exe 108 PID 3568 wrote to memory of 640 3568 XWorm V5.2.exe 108 PID 3568 wrote to memory of 1608 3568 XWorm V5.2.exe 109 PID 3568 wrote to memory of 1608 3568 XWorm V5.2.exe 109 PID 640 wrote to memory of 840 640 XWorm V5.2.exe 110 PID 640 wrote to memory of 840 640 XWorm V5.2.exe 110 PID 640 wrote to memory of 5056 640 XWorm V5.2.exe 111 PID 640 wrote to memory of 5056 640 XWorm V5.2.exe 111 PID 840 wrote to memory of 2228 840 XWorm V5.2.exe 112 PID 840 wrote to memory of 2228 840 XWorm V5.2.exe 112 PID 840 wrote to memory of 4844 840 XWorm V5.2.exe 113 PID 840 wrote to memory of 4844 840 XWorm V5.2.exe 113 PID 2228 wrote to memory of 3656 2228 XWorm V5.2.exe 114 PID 2228 wrote to memory of 3656 2228 XWorm V5.2.exe 114 PID 2228 wrote to memory of 4212 2228 XWorm V5.2.exe 115 PID 2228 wrote to memory of 4212 2228 XWorm V5.2.exe 115 PID 3656 wrote to memory of 4664 3656 XWorm V5.2.exe 116 PID 3656 wrote to memory of 4664 3656 XWorm V5.2.exe 116 PID 3656 wrote to memory of 2624 3656 XWorm V5.2.exe 117 PID 3656 wrote to memory of 2624 3656 XWorm V5.2.exe 117 PID 4664 wrote to memory of 2628 4664 XWorm V5.2.exe 118 PID 4664 wrote to memory of 2628 4664 XWorm V5.2.exe 118 PID 4664 wrote to memory of 2328 4664 XWorm V5.2.exe 119 PID 4664 wrote to memory of 2328 4664 XWorm V5.2.exe 119 PID 2628 wrote to memory of 3280 2628 XWorm V5.2.exe 124 PID 2628 wrote to memory of 3280 2628 XWorm V5.2.exe 124 PID 2628 wrote to memory of 1904 2628 XWorm V5.2.exe 125 PID 2628 wrote to memory of 1904 2628 XWorm V5.2.exe 125 PID 3280 wrote to memory of 4444 3280 XWorm V5.2.exe 127 PID 3280 wrote to memory of 4444 3280 XWorm V5.2.exe 127 -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
Processes
-
C:\Users\Admin\AppData\Local\Temp\XWorm V5.2.exe"C:\Users\Admin\AppData\Local\Temp\XWorm V5.2.exe"1⤵
- Checks computer location settings
- Suspicious use of WriteProcessMemory
PID:1824 -
C:\Users\Admin\AppData\Local\Temp\XWorm V5.2.exe"C:\Users\Admin\AppData\Local\Temp\XWorm V5.2.exe"2⤵
- Suspicious use of WriteProcessMemory
PID:2456 -
C:\Users\Admin\AppData\Local\Temp\XWorm V5.2.exe"C:\Users\Admin\AppData\Local\Temp\XWorm V5.2.exe"3⤵
- Checks computer location settings
- Suspicious use of WriteProcessMemory
PID:1728 -
C:\Users\Admin\AppData\Local\Temp\XWorm V5.2.exe"C:\Users\Admin\AppData\Local\Temp\XWorm V5.2.exe"4⤵
- Checks computer location settings
- Suspicious use of WriteProcessMemory
PID:4988 -
C:\Users\Admin\AppData\Local\Temp\XWorm V5.2.exe"C:\Users\Admin\AppData\Local\Temp\XWorm V5.2.exe"5⤵
- Suspicious use of WriteProcessMemory
PID:412 -
C:\Users\Admin\AppData\Local\Temp\XWorm V5.2.exe"C:\Users\Admin\AppData\Local\Temp\XWorm V5.2.exe"6⤵
- Suspicious use of WriteProcessMemory
PID:884 -
C:\Users\Admin\AppData\Local\Temp\XWorm V5.2.exe"C:\Users\Admin\AppData\Local\Temp\XWorm V5.2.exe"7⤵
- Checks computer location settings
- Suspicious use of WriteProcessMemory
PID:3568 -
C:\Users\Admin\AppData\Local\Temp\XWorm V5.2.exe"C:\Users\Admin\AppData\Local\Temp\XWorm V5.2.exe"8⤵
- Checks computer location settings
- Suspicious use of WriteProcessMemory
PID:640 -
C:\Users\Admin\AppData\Local\Temp\XWorm V5.2.exe"C:\Users\Admin\AppData\Local\Temp\XWorm V5.2.exe"9⤵
- Suspicious use of WriteProcessMemory
PID:840 -
C:\Users\Admin\AppData\Local\Temp\XWorm V5.2.exe"C:\Users\Admin\AppData\Local\Temp\XWorm V5.2.exe"10⤵
- Suspicious use of WriteProcessMemory
PID:2228 -
C:\Users\Admin\AppData\Local\Temp\XWorm V5.2.exe"C:\Users\Admin\AppData\Local\Temp\XWorm V5.2.exe"11⤵
- Suspicious use of WriteProcessMemory
PID:3656 -
C:\Users\Admin\AppData\Local\Temp\XWorm V5.2.exe"C:\Users\Admin\AppData\Local\Temp\XWorm V5.2.exe"12⤵
- Suspicious use of WriteProcessMemory
PID:4664 -
C:\Users\Admin\AppData\Local\Temp\XWorm V5.2.exe"C:\Users\Admin\AppData\Local\Temp\XWorm V5.2.exe"13⤵
- Suspicious use of WriteProcessMemory
PID:2628 -
C:\Users\Admin\AppData\Local\Temp\XWorm V5.2.exe"C:\Users\Admin\AppData\Local\Temp\XWorm V5.2.exe"14⤵
- Suspicious use of WriteProcessMemory
PID:3280 -
C:\Users\Admin\AppData\Local\Temp\XWorm V5.2.exe"C:\Users\Admin\AppData\Local\Temp\XWorm V5.2.exe"15⤵PID:4444
-
C:\Users\Admin\AppData\Local\Temp\XWorm V5.2.exe"C:\Users\Admin\AppData\Local\Temp\XWorm V5.2.exe"16⤵
- Checks computer location settings
PID:4032 -
C:\Users\Admin\AppData\Local\Temp\XWorm V5.2.exe"C:\Users\Admin\AppData\Local\Temp\XWorm V5.2.exe"17⤵
- Checks computer location settings
PID:1488 -
C:\Users\Admin\AppData\Local\Temp\XWorm V5.2.exe"C:\Users\Admin\AppData\Local\Temp\XWorm V5.2.exe"18⤵PID:4180
-
C:\Users\Admin\AppData\Local\Temp\XWorm V5.2.exe"C:\Users\Admin\AppData\Local\Temp\XWorm V5.2.exe"19⤵PID:3588
-
C:\Users\Admin\AppData\Local\Temp\XWorm V5.2.exe"C:\Users\Admin\AppData\Local\Temp\XWorm V5.2.exe"20⤵
- Checks computer location settings
PID:1844 -
C:\Users\Admin\AppData\Local\Temp\XWorm V5.2.exe"C:\Users\Admin\AppData\Local\Temp\XWorm V5.2.exe"21⤵PID:536
-
C:\Users\Admin\AppData\Local\Temp\XWorm V5.2.exe"C:\Users\Admin\AppData\Local\Temp\XWorm V5.2.exe"22⤵PID:1108
-
C:\Users\Admin\AppData\Local\Temp\XWorm V5.2.exe"C:\Users\Admin\AppData\Local\Temp\XWorm V5.2.exe"23⤵
- Checks computer location settings
PID:1468 -
C:\Users\Admin\AppData\Local\Temp\XWorm V5.2.exe"C:\Users\Admin\AppData\Local\Temp\XWorm V5.2.exe"24⤵PID:4692
-
C:\Users\Admin\AppData\Local\Temp\XWorm V5.2.exe"C:\Users\Admin\AppData\Local\Temp\XWorm V5.2.exe"25⤵
- Checks computer location settings
PID:2880 -
C:\Users\Admin\AppData\Local\Temp\XWorm V5.2.exe"C:\Users\Admin\AppData\Local\Temp\XWorm V5.2.exe"26⤵
- Checks computer location settings
PID:3544 -
C:\Users\Admin\AppData\Local\Temp\XWorm V5.2.exe"C:\Users\Admin\AppData\Local\Temp\XWorm V5.2.exe"27⤵
- Checks computer location settings
PID:5096 -
C:\Users\Admin\AppData\Local\Temp\XWorm V5.2.exe"C:\Users\Admin\AppData\Local\Temp\XWorm V5.2.exe"28⤵PID:1864
-
C:\Users\Admin\AppData\Local\Temp\XWorm V5.2.exe"C:\Users\Admin\AppData\Local\Temp\XWorm V5.2.exe"29⤵
- Checks computer location settings
PID:1896 -
C:\Users\Admin\AppData\Local\Temp\XWorm V5.2.exe"C:\Users\Admin\AppData\Local\Temp\XWorm V5.2.exe"30⤵
- Checks computer location settings
PID:4292 -
C:\Users\Admin\AppData\Local\Temp\XWorm V5.2.exe"C:\Users\Admin\AppData\Local\Temp\XWorm V5.2.exe"31⤵PID:4728
-
C:\Users\Admin\AppData\Local\Temp\XWorm V5.2.exe"C:\Users\Admin\AppData\Local\Temp\XWorm V5.2.exe"32⤵
- Checks computer location settings
PID:1940 -
C:\Users\Admin\AppData\Local\Temp\XWorm V5.2.exe"C:\Users\Admin\AppData\Local\Temp\XWorm V5.2.exe"33⤵
- Checks computer location settings
PID:3232 -
C:\Users\Admin\AppData\Local\Temp\XWorm V5.2.exe"C:\Users\Admin\AppData\Local\Temp\XWorm V5.2.exe"34⤵PID:4476
-
C:\Users\Admin\AppData\Local\Temp\XWorm V5.2.exe"C:\Users\Admin\AppData\Local\Temp\XWorm V5.2.exe"35⤵
- Checks computer location settings
PID:2624 -
C:\Users\Admin\AppData\Local\Temp\XWorm V5.2.exe"C:\Users\Admin\AppData\Local\Temp\XWorm V5.2.exe"36⤵
- Checks computer location settings
PID:1444 -
C:\Users\Admin\AppData\Local\Temp\XWorm V5.2.exe"C:\Users\Admin\AppData\Local\Temp\XWorm V5.2.exe"37⤵
- Checks computer location settings
PID:4912 -
C:\Users\Admin\AppData\Local\Temp\XWorm V5.2.exe"C:\Users\Admin\AppData\Local\Temp\XWorm V5.2.exe"38⤵PID:2880
-
C:\Users\Admin\AppData\Local\Temp\XWorm V5.2.exe"C:\Users\Admin\AppData\Local\Temp\XWorm V5.2.exe"39⤵
- Checks computer location settings
PID:736 -
C:\Users\Admin\AppData\Local\Temp\XWorm V5.2.exe"C:\Users\Admin\AppData\Local\Temp\XWorm V5.2.exe"40⤵PID:4852
-
C:\Users\Admin\AppData\Local\Temp\XWorm V5.2.exe"C:\Users\Admin\AppData\Local\Temp\XWorm V5.2.exe"41⤵PID:1228
-
C:\Users\Admin\AppData\Local\Temp\XWorm V5.2.exe"C:\Users\Admin\AppData\Local\Temp\XWorm V5.2.exe"42⤵
- Checks computer location settings
PID:1756 -
C:\Users\Admin\AppData\Local\Temp\XWorm V5.2.exe"C:\Users\Admin\AppData\Local\Temp\XWorm V5.2.exe"43⤵PID:540
-
C:\Users\Admin\AppData\Local\Temp\XWorm V5.2.exe"C:\Users\Admin\AppData\Local\Temp\XWorm V5.2.exe"44⤵
- Checks computer location settings
PID:3228 -
C:\Users\Admin\AppData\Local\Temp\XWorm V5.2.exe"C:\Users\Admin\AppData\Local\Temp\XWorm V5.2.exe"45⤵PID:4388
-
C:\Users\Admin\AppData\Local\Temp\XWorm V5.2.exe"C:\Users\Admin\AppData\Local\Temp\XWorm V5.2.exe"46⤵PID:1128
-
C:\Users\Admin\AppData\Local\Temp\XWorm V5.2.exe"C:\Users\Admin\AppData\Local\Temp\XWorm V5.2.exe"47⤵
- Checks computer location settings
PID:3232 -
C:\Users\Admin\AppData\Local\Temp\XWorm V5.2.exe"C:\Users\Admin\AppData\Local\Temp\XWorm V5.2.exe"48⤵PID:4780
-
C:\Users\Admin\AppData\Local\Temp\XWorm V5.2.exe"C:\Users\Admin\AppData\Local\Temp\XWorm V5.2.exe"49⤵PID:4236
-
C:\Users\Admin\AppData\Local\Temp\XWorm V5.2.exe"C:\Users\Admin\AppData\Local\Temp\XWorm V5.2.exe"50⤵PID:3716
-
C:\Users\Admin\AppData\Local\Temp\XWorm V5.2.exe"C:\Users\Admin\AppData\Local\Temp\XWorm V5.2.exe"51⤵PID:4812
-
C:\Users\Admin\AppData\Local\Temp\XWorm V5.2.exe"C:\Users\Admin\AppData\Local\Temp\XWorm V5.2.exe"52⤵
- Checks computer location settings
PID:3160 -
C:\Users\Admin\AppData\Local\Temp\XWorm V5.2.exe"C:\Users\Admin\AppData\Local\Temp\XWorm V5.2.exe"53⤵
- Checks computer location settings
PID:1888 -
C:\Users\Admin\AppData\Local\Temp\XWorm V5.2.exe"C:\Users\Admin\AppData\Local\Temp\XWorm V5.2.exe"54⤵PID:392
-
C:\Users\Admin\AppData\Local\Temp\XWorm V5.2.exe"C:\Users\Admin\AppData\Local\Temp\XWorm V5.2.exe"55⤵PID:3108
-
C:\Users\Admin\AppData\Local\Temp\XWorm V5.2.exe"C:\Users\Admin\AppData\Local\Temp\XWorm V5.2.exe"56⤵
- Checks computer location settings
PID:2556 -
C:\Users\Admin\AppData\Local\Temp\XWorm V5.2.exe"C:\Users\Admin\AppData\Local\Temp\XWorm V5.2.exe"57⤵PID:2492
-
C:\Users\Admin\AppData\Local\Temp\XWorm V5.2.exe"C:\Users\Admin\AppData\Local\Temp\XWorm V5.2.exe"58⤵PID:3484
-
C:\Users\Admin\AppData\Local\Temp\XWorm V5.2.exe"C:\Users\Admin\AppData\Local\Temp\XWorm V5.2.exe"59⤵PID:388
-
C:\Users\Admin\AppData\Local\Temp\XWorm V5.2.exe"C:\Users\Admin\AppData\Local\Temp\XWorm V5.2.exe"60⤵
- Checks computer location settings
PID:4352 -
C:\Users\Admin\AppData\Local\Temp\XWorm V5.2.exe"C:\Users\Admin\AppData\Local\Temp\XWorm V5.2.exe"61⤵
- Checks computer location settings
PID:3652 -
C:\Users\Admin\AppData\Local\Temp\XWorm V5.2.exe"C:\Users\Admin\AppData\Local\Temp\XWorm V5.2.exe"62⤵
- Checks computer location settings
PID:1040 -
C:\Users\Admin\AppData\Local\Temp\XWorm V5.2.exe"C:\Users\Admin\AppData\Local\Temp\XWorm V5.2.exe"63⤵PID:3636
-
C:\Users\Admin\AppData\Local\Temp\XWorm V5.2.exe"C:\Users\Admin\AppData\Local\Temp\XWorm V5.2.exe"64⤵PID:1660
-
C:\Users\Admin\AppData\Local\Temp\XWorm V5.2.exe"C:\Users\Admin\AppData\Local\Temp\XWorm V5.2.exe"65⤵PID:4000
-
C:\Users\Admin\AppData\Local\Temp\XWorm V5.2.exe"C:\Users\Admin\AppData\Local\Temp\XWorm V5.2.exe"66⤵PID:624
-
C:\Users\Admin\AppData\Local\Temp\XWorm V5.2.exe"C:\Users\Admin\AppData\Local\Temp\XWorm V5.2.exe"67⤵
- Checks computer location settings
PID:5044 -
C:\Users\Admin\AppData\Local\Temp\XWorm V5.2.exe"C:\Users\Admin\AppData\Local\Temp\XWorm V5.2.exe"68⤵
- Checks computer location settings
PID:3804 -
C:\Users\Admin\AppData\Local\Temp\XWorm V5.2.exe"C:\Users\Admin\AppData\Local\Temp\XWorm V5.2.exe"69⤵PID:3132
-
C:\Users\Admin\AppData\Local\Temp\XWorm V5.2.exe"C:\Users\Admin\AppData\Local\Temp\XWorm V5.2.exe"70⤵
- Checks computer location settings
PID:1756 -
C:\Users\Admin\AppData\Local\Temp\XWorm V5.2.exe"C:\Users\Admin\AppData\Local\Temp\XWorm V5.2.exe"71⤵PID:2780
-
C:\Users\Admin\AppData\Local\Temp\XWorm V5.2.exe"C:\Users\Admin\AppData\Local\Temp\XWorm V5.2.exe"72⤵PID:4652
-
C:\Users\Admin\AppData\Local\Temp\XWorm V5.2.exe"C:\Users\Admin\AppData\Local\Temp\XWorm V5.2.exe"73⤵PID:3484
-
C:\Users\Admin\AppData\Local\Temp\XWorm V5.2.exe"C:\Users\Admin\AppData\Local\Temp\XWorm V5.2.exe"74⤵PID:4548
-
C:\Users\Admin\AppData\Local\Temp\XWorm V5.2.exe"C:\Users\Admin\AppData\Local\Temp\XWorm V5.2.exe"75⤵
- Checks computer location settings
PID:5056 -
C:\Users\Admin\AppData\Local\Temp\XWorm V5.2.exe"C:\Users\Admin\AppData\Local\Temp\XWorm V5.2.exe"76⤵PID:4624
-
C:\Users\Admin\AppData\Local\Temp\XWorm V5.2.exe"C:\Users\Admin\AppData\Local\Temp\XWorm V5.2.exe"77⤵PID:4056
-
C:\Users\Admin\AppData\Local\Temp\XWorm V5.2.exe"C:\Users\Admin\AppData\Local\Temp\XWorm V5.2.exe"78⤵
- Checks computer location settings
PID:2336 -
C:\Users\Admin\AppData\Local\Temp\XWorm V5.2.exe"C:\Users\Admin\AppData\Local\Temp\XWorm V5.2.exe"79⤵PID:2280
-
C:\Users\Admin\AppData\Local\Temp\XWorm V5.2.exe"C:\Users\Admin\AppData\Local\Temp\XWorm V5.2.exe"80⤵PID:4116
-
C:\Users\Admin\AppData\Local\Temp\XWorm V5.2.exe"C:\Users\Admin\AppData\Local\Temp\XWorm V5.2.exe"81⤵
- Checks computer location settings
PID:1076 -
C:\Users\Admin\AppData\Local\Temp\XWorm V5.2.exe"C:\Users\Admin\AppData\Local\Temp\XWorm V5.2.exe"82⤵
- Checks computer location settings
PID:4644 -
C:\Users\Admin\AppData\Local\Temp\XWorm V5.2.exe"C:\Users\Admin\AppData\Local\Temp\XWorm V5.2.exe"83⤵
- Checks computer location settings
PID:1988 -
C:\Users\Admin\AppData\Local\Temp\XWorm V5.2.exe"C:\Users\Admin\AppData\Local\Temp\XWorm V5.2.exe"84⤵PID:2768
-
C:\Users\Admin\AppData\Local\Temp\XWorm V5.2.exe"C:\Users\Admin\AppData\Local\Temp\XWorm V5.2.exe"85⤵PID:4276
-
C:\Users\Admin\AppData\Local\Temp\XWorm V5.2.exe"C:\Users\Admin\AppData\Local\Temp\XWorm V5.2.exe"86⤵
- Checks computer location settings
PID:3972 -
C:\Users\Admin\AppData\Local\Temp\XWorm V5.2.exe"C:\Users\Admin\AppData\Local\Temp\XWorm V5.2.exe"87⤵
- Checks computer location settings
PID:4980 -
C:\Users\Admin\AppData\Local\Temp\XWorm V5.2.exe"C:\Users\Admin\AppData\Local\Temp\XWorm V5.2.exe"88⤵
- Checks computer location settings
PID:1552 -
C:\Users\Admin\AppData\Local\Temp\XWorm V5.2.exe"C:\Users\Admin\AppData\Local\Temp\XWorm V5.2.exe"89⤵
- Checks computer location settings
PID:3144 -
C:\Users\Admin\AppData\Local\Temp\XWorm V5.2.exe"C:\Users\Admin\AppData\Local\Temp\XWorm V5.2.exe"90⤵
- Checks computer location settings
PID:4824 -
C:\Users\Admin\AppData\Local\Temp\XWorm V5.2.exe"C:\Users\Admin\AppData\Local\Temp\XWorm V5.2.exe"91⤵
- Checks computer location settings
PID:4548 -
C:\Users\Admin\AppData\Local\Temp\XWorm V5.2.exe"C:\Users\Admin\AppData\Local\Temp\XWorm V5.2.exe"92⤵
- Checks computer location settings
PID:1316 -
C:\Users\Admin\AppData\Local\Temp\XWorm V5.2.exe"C:\Users\Admin\AppData\Local\Temp\XWorm V5.2.exe"93⤵PID:4632
-
C:\Users\Admin\AppData\Local\Temp\XWorm V5.2.exe"C:\Users\Admin\AppData\Local\Temp\XWorm V5.2.exe"94⤵PID:4056
-
C:\Users\Admin\AppData\Local\Temp\XWorm V5.2.exe"C:\Users\Admin\AppData\Local\Temp\XWorm V5.2.exe"95⤵
- Checks computer location settings
PID:4084 -
C:\Users\Admin\AppData\Local\Temp\XWorm V5.2.exe"C:\Users\Admin\AppData\Local\Temp\XWorm V5.2.exe"96⤵PID:4344
-
C:\Users\Admin\AppData\Local\Temp\XWorm V5.2.exe"C:\Users\Admin\AppData\Local\Temp\XWorm V5.2.exe"97⤵PID:4196
-
C:\Users\Admin\AppData\Local\Temp\XWorm V5.2.exe"C:\Users\Admin\AppData\Local\Temp\XWorm V5.2.exe"98⤵PID:1096
-
C:\Users\Admin\AppData\Local\Temp\XWorm V5.2.exe"C:\Users\Admin\AppData\Local\Temp\XWorm V5.2.exe"99⤵
- Checks computer location settings
PID:5064 -
C:\Users\Admin\AppData\Local\Temp\XWorm V5.2.exe"C:\Users\Admin\AppData\Local\Temp\XWorm V5.2.exe"100⤵
- Checks computer location settings
PID:4368 -
C:\Users\Admin\AppData\Local\Temp\XWorm V5.2.exe"C:\Users\Admin\AppData\Local\Temp\XWorm V5.2.exe"101⤵
- Checks computer location settings
PID:1616 -
C:\Users\Admin\AppData\Local\Temp\XWorm V5.2.exe"C:\Users\Admin\AppData\Local\Temp\XWorm V5.2.exe"102⤵PID:720
-
C:\Users\Admin\AppData\Local\Temp\XWorm V5.2.exe"C:\Users\Admin\AppData\Local\Temp\XWorm V5.2.exe"103⤵PID:4976
-
C:\Users\Admin\AppData\Local\Temp\XWorm V5.2.exe"C:\Users\Admin\AppData\Local\Temp\XWorm V5.2.exe"104⤵PID:4060
-
C:\Users\Admin\AppData\Local\Temp\XWorm V5.2.exe"C:\Users\Admin\AppData\Local\Temp\XWorm V5.2.exe"105⤵
- Checks computer location settings
PID:3172 -
C:\Users\Admin\AppData\Local\Temp\XWorm V5.2.exe"C:\Users\Admin\AppData\Local\Temp\XWorm V5.2.exe"106⤵
- Checks computer location settings
PID:516 -
C:\Users\Admin\AppData\Local\Temp\XWorm V5.2.exe"C:\Users\Admin\AppData\Local\Temp\XWorm V5.2.exe"107⤵PID:1372
-
C:\Users\Admin\AppData\Local\Temp\XWorm V5.2.exe"C:\Users\Admin\AppData\Local\Temp\XWorm V5.2.exe"108⤵PID:1968
-
C:\Users\Admin\AppData\Local\Temp\XWorm V5.2.exe"C:\Users\Admin\AppData\Local\Temp\XWorm V5.2.exe"109⤵
- Checks computer location settings
PID:5056 -
C:\Users\Admin\AppData\Local\Temp\XWorm V5.2.exe"C:\Users\Admin\AppData\Local\Temp\XWorm V5.2.exe"110⤵PID:3656
-
C:\Users\Admin\AppData\Local\Temp\XWorm V5.2.exe"C:\Users\Admin\AppData\Local\Temp\XWorm V5.2.exe"111⤵PID:2736
-
C:\Users\Admin\AppData\Local\Temp\XWorm V5.2.exe"C:\Users\Admin\AppData\Local\Temp\XWorm V5.2.exe"112⤵PID:3792
-
C:\Users\Admin\AppData\Local\Temp\XWorm V5.2.exe"C:\Users\Admin\AppData\Local\Temp\XWorm V5.2.exe"113⤵
- Checks computer location settings
PID:3056 -
C:\Users\Admin\AppData\Local\Temp\XWorm V5.2.exe"C:\Users\Admin\AppData\Local\Temp\XWorm V5.2.exe"114⤵
- Checks computer location settings
PID:4984 -
C:\Users\Admin\AppData\Local\Temp\XWorm V5.2.exe"C:\Users\Admin\AppData\Local\Temp\XWorm V5.2.exe"115⤵
- Checks computer location settings
PID:2468 -
C:\Users\Admin\AppData\Local\Temp\XWorm V5.2.exe"C:\Users\Admin\AppData\Local\Temp\XWorm V5.2.exe"116⤵
- Checks computer location settings
PID:5092 -
C:\Users\Admin\AppData\Local\Temp\XWorm V5.2.exe"C:\Users\Admin\AppData\Local\Temp\XWorm V5.2.exe"117⤵
- Checks computer location settings
PID:2880 -
C:\Users\Admin\AppData\Local\Temp\XWorm V5.2.exe"C:\Users\Admin\AppData\Local\Temp\XWorm V5.2.exe"118⤵
- Checks computer location settings
PID:2436 -
C:\Users\Admin\AppData\Local\Temp\XWorm V5.2.exe"C:\Users\Admin\AppData\Local\Temp\XWorm V5.2.exe"119⤵
- Checks computer location settings
PID:2568 -
C:\Users\Admin\AppData\Local\Temp\XWorm V5.2.exe"C:\Users\Admin\AppData\Local\Temp\XWorm V5.2.exe"120⤵
- Checks computer location settings
PID:1672 -
C:\Users\Admin\AppData\Local\Temp\XWorm V5.2.exe"C:\Users\Admin\AppData\Local\Temp\XWorm V5.2.exe"121⤵
- Checks computer location settings
PID:2896 -
C:\Users\Admin\AppData\Local\Temp\XWorm V5.2.exe"C:\Users\Admin\AppData\Local\Temp\XWorm V5.2.exe"122⤵PID:1492
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-