Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    989s
  • max time network
    964s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240802-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system
  • submitted
    09/09/2024, 00:17

General

  • Target

    https://github.com/d00mt3l/XWorm-5.6

Malware Config

Extracted

Family

xworm

Version

5.0

C2

127.0.0.1:7000

Mutex

b80CM39qjZkNxfZ3

Attributes
  • install_file

    USB.exe

aes.plain

Signatures

  • AgentTesla

    Agent Tesla is a remote access tool (RAT) written in visual basic.

  • Contains code to disable Windows Defender 1 IoCs

    A .NET executable tasked with disabling Windows Defender capabilities such as realtime monitoring, blocking at first seen, etc.

  • Detect Xworm Payload 3 IoCs
  • Xworm

    Xworm is a remote access trojan written in C#.

  • AgentTesla payload 1 IoCs
  • Disables Task Manager via registry modification
  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 4 IoCs
  • Uses the VBS compiler for execution 1 TTPs
  • Legitimate hosting services abused for malware hosting/C2 1 TTPs 6 IoCs
  • Browser Information Discovery 1 TTPs

    Enumerate browser information.

  • Enumerates system info in registry 2 TTPs 6 IoCs
  • Modifies registry class 28 IoCs
  • Suspicious behavior: EnumeratesProcesses 40 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs
  • Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 10 IoCs
  • Suspicious use of AdjustPrivilegeToken 3 IoCs
  • Suspicious use of FindShellTrayWindow 64 IoCs
  • Suspicious use of SendNotifyMessage 25 IoCs
  • Suspicious use of SetWindowsHookEx 4 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs

Processes

  • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
    "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument https://github.com/d00mt3l/XWorm-5.6
    1⤵
    • Enumerates system info in registry
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SendNotifyMessage
    • Suspicious use of WriteProcessMemory
    PID:1140
    • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
      "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffa0b4346f8,0x7ffa0b434708,0x7ffa0b434718
      2⤵
        PID:4084
      • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
        "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=1976,1289141674893443295,2425173018094478976,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1916 /prefetch:2
        2⤵
          PID:3140
        • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
          "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=1976,1289141674893443295,2425173018094478976,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2464 /prefetch:3
          2⤵
          • Suspicious behavior: EnumeratesProcesses
          PID:1904
        • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
          "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=1976,1289141674893443295,2425173018094478976,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2888 /prefetch:8
          2⤵
            PID:1000
          • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
            "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1976,1289141674893443295,2425173018094478976,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3360 /prefetch:1
            2⤵
              PID:1020
            • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
              "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1976,1289141674893443295,2425173018094478976,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3368 /prefetch:1
              2⤵
                PID:2120
              • C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe
                "C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=1976,1289141674893443295,2425173018094478976,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5692 /prefetch:8
                2⤵
                  PID:2708
                • C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe
                  "C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=1976,1289141674893443295,2425173018094478976,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5692 /prefetch:8
                  2⤵
                  • Suspicious behavior: EnumeratesProcesses
                  PID:740
                • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                  "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1976,1289141674893443295,2425173018094478976,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5336 /prefetch:1
                  2⤵
                    PID:1892
                  • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                    "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1976,1289141674893443295,2425173018094478976,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4704 /prefetch:1
                    2⤵
                      PID:5060
                    • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                      "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1976,1289141674893443295,2425173018094478976,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5172 /prefetch:1
                      2⤵
                        PID:1896
                      • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                        "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1976,1289141674893443295,2425173018094478976,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5780 /prefetch:1
                        2⤵
                          PID:1600
                        • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                          "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1976,1289141674893443295,2425173018094478976,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5176 /prefetch:1
                          2⤵
                            PID:4940
                          • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                            "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1976,1289141674893443295,2425173018094478976,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=13 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5820 /prefetch:1
                            2⤵
                              PID:4956
                            • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                              "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1976,1289141674893443295,2425173018094478976,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=14 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5080 /prefetch:1
                              2⤵
                                PID:220
                              • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=edge_collections.mojom.CollectionsDataManager --field-trial-handle=1976,1289141674893443295,2425173018094478976,131072 --lang=en-US --service-sandbox-type=collections --mojo-platform-channel-handle=5764 /prefetch:8
                                2⤵
                                  PID:1892
                                • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                  "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1976,1289141674893443295,2425173018094478976,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=17 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5144 /prefetch:1
                                  2⤵
                                    PID:4320
                                  • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                    "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=quarantine.mojom.Quarantine --field-trial-handle=1976,1289141674893443295,2425173018094478976,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=1704 /prefetch:8
                                    2⤵
                                    • Suspicious behavior: EnumeratesProcesses
                                    PID:3832
                                  • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                    "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=1976,1289141674893443295,2425173018094478976,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=6280 /prefetch:2
                                    2⤵
                                    • Suspicious behavior: EnumeratesProcesses
                                    PID:1580
                                • C:\Windows\System32\CompPkgSrv.exe
                                  C:\Windows\System32\CompPkgSrv.exe -Embedding
                                  1⤵
                                    PID:1300
                                  • C:\Windows\System32\CompPkgSrv.exe
                                    C:\Windows\System32\CompPkgSrv.exe -Embedding
                                    1⤵
                                      PID:4940
                                    • C:\Windows\System32\rundll32.exe
                                      C:\Windows\System32\rundll32.exe C:\Windows\System32\shell32.dll,SHCreateLocalServerRunDll {9aa46009-3ce0-458a-a354-715610a075e6} -Embedding
                                      1⤵
                                        PID:4992
                                      • C:\Users\Admin\Downloads\XWorm-5.6-main\XWorm-5.6-main\Xworm V5.6.exe
                                        "C:\Users\Admin\Downloads\XWorm-5.6-main\XWorm-5.6-main\Xworm V5.6.exe"
                                        1⤵
                                        • Loads dropped DLL
                                        • Enumerates system info in registry
                                        • Modifies registry class
                                        • Suspicious behavior: EnumeratesProcesses
                                        • Suspicious behavior: GetForegroundWindowSpam
                                        • Suspicious use of SendNotifyMessage
                                        • Suspicious use of SetWindowsHookEx
                                        PID:4416
                                        • C:\Windows\Microsoft.NET\Framework64\v4.0.30319\vbc.exe
                                          "C:\Windows\Microsoft.NET\Framework64\v4.0.30319\vbc.exe" /noconfig @"C:\Users\Admin\AppData\Local\Temp\gw3q4oaz\gw3q4oaz.cmdline"
                                          2⤵
                                            PID:2884
                                            • C:\Windows\Microsoft.NET\Framework64\v4.0.30319\cvtres.exe
                                              C:\Windows\Microsoft.NET\Framework64\v4.0.30319\cvtres.exe /NOLOGO /READONLY /MACHINE:IX86 "/OUT:C:\Users\Admin\AppData\Local\Temp\RES86FF.tmp" "C:\Users\Admin\AppData\Local\Temp\vbc1FA26DDF7C4741BB85A0548AD7616A8A.TMP"
                                              3⤵
                                                PID:3904
                                          • C:\Windows\system32\wbem\WmiApSrv.exe
                                            C:\Windows\system32\wbem\WmiApSrv.exe
                                            1⤵
                                              PID:3800
                                            • C:\Windows\system32\AUDIODG.EXE
                                              C:\Windows\system32\AUDIODG.EXE 0x4b4 0x4c0
                                              1⤵
                                              • Suspicious use of AdjustPrivilegeToken
                                              PID:2472
                                            • C:\Users\Admin\Downloads\XWorm-5.6-main\XWorm-5.6-main\XClient.exe
                                              "C:\Users\Admin\Downloads\XWorm-5.6-main\XWorm-5.6-main\XClient.exe"
                                              1⤵
                                              • Executes dropped EXE
                                              • Loads dropped DLL
                                              • Suspicious use of AdjustPrivilegeToken
                                              PID:2628

                                            Network

                                            MITRE ATT&CK Enterprise v15

                                            Replay Monitor

                                            Loading Replay Monitor...

                                            Downloads

                                            • C:\Users\Admin\AppData\Local\GMap.NET\DllCache\SQLite_v98_NET4_x64\System.Data.SQLite.DLL

                                              Filesize

                                              1.6MB

                                              MD5

                                              1b1a6d076bbde5e2ac079ef6dbc9d5f8

                                              SHA1

                                              6aa070d07379847f58adcab6b5739fc97b487a28

                                              SHA256

                                              eaadfbcafd981ec51c9c039e3adb4963b5a9d85637e27fd4c8cfca5f07ff8471

                                              SHA512

                                              05b0cb3d343a5706434390fe863e41852019aa27797fe5d1b80d13b8e24e0de0c2cb6e23d15e89a0f427aaeaf04bf0239f90feb95bfc6913ca4dc59007e6659e

                                            • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad\settings.dat

                                              Filesize

                                              152B

                                              MD5

                                              f9664c896e19205022c094d725f820b6

                                              SHA1

                                              f8f1baf648df755ba64b412d512446baf88c0184

                                              SHA256

                                              7121d84202a850791c2320385eb59eda4d697310dc51b1fcd4d51264aba2434e

                                              SHA512

                                              3fa5d2c68a9e70e4a25eaac2095171d87c741eec2624c314c6a56f4fa390d6319633bf4c48b1a4af7e9a0451f346beced9693da88cfc7bcba8dfe209cbd1b3ae

                                            • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad\settings.dat

                                              Filesize

                                              152B

                                              MD5

                                              847d47008dbea51cb1732d54861ba9c9

                                              SHA1

                                              f2099242027dccb88d6f05760b57f7c89d926c0d

                                              SHA256

                                              10292fa05d896a2952c1d602a72d761d34bc776b44d6a7df87e49b5b613a8ac1

                                              SHA512

                                              bd1526aa1cc1c016d95dfcc53a78b45b09dde4ce67357fc275ab835dbe1bb5b053ca386239f50cde95ad243a9c1bbb12f7505818577589beecc6084f7b94e83f

                                            • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index

                                              Filesize

                                              2KB

                                              MD5

                                              ceace37490300a09b219d07f9db098fa

                                              SHA1

                                              b3bc8758f07de2860c84496c2f80ddcfc2aa4320

                                              SHA256

                                              e3b815d4f73ce14f5607fc80edb9caebb784bcc93b53c6476a1ffcc31a0d2439

                                              SHA512

                                              70c1dba61e7401b43edfe9da8b6db25a5f16d37d5a339c037121c426e47344ad353f71f297ba64e9c1d79f12466774c96076109c5e39ac3a65b068d0cdccb2ec

                                            • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Network Persistent State

                                              Filesize

                                              989B

                                              MD5

                                              f97e66fdd34e7d1ed305986bd15dbbff

                                              SHA1

                                              e22fa362449cb6cb386aa49bb10c66678969d1fc

                                              SHA256

                                              d63f1aaa283784dee6c6e3a4dd1ea60d4e151c3b18cd63b00c5fcc222fa999e0

                                              SHA512

                                              36cf49dd058a6dd90f484b8eab7f52452b7a571932215dff8bbb68df6be0844dc7b73d17162051b905ab2eb91a018e50dc437397314f260c21661f52673cf437

                                            • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Network Persistent State

                                              Filesize

                                              111B

                                              MD5

                                              285252a2f6327d41eab203dc2f402c67

                                              SHA1

                                              acedb7ba5fbc3ce914a8bf386a6f72ca7baa33c6

                                              SHA256

                                              5dfc321417fc31359f23320ea68014ebfd793c5bbed55f77dab4180bbd4a2026

                                              SHA512

                                              11ce7cb484fee66894e63c31db0d6b7ef66ad0327d4e7e2eb85f3bcc2e836a3a522c68d681e84542e471e54f765e091efe1ee4065641b0299b15613eb32dcc0d

                                            • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Network Persistent State

                                              Filesize

                                              111B

                                              MD5

                                              807419ca9a4734feaf8d8563a003b048

                                              SHA1

                                              a723c7d60a65886ffa068711f1e900ccc85922a6

                                              SHA256

                                              aa10bf07b0d265bed28f2a475f3564d8ddb5e4d4ffee0ab6f3a0cc564907b631

                                              SHA512

                                              f10d496ae75db5ba412bd9f17bf0c7da7632db92a3fabf7f24071e40f5759c6a875ad8f3a72bad149da58b3da3b816077df125d0d9f3544adba68c66353d206c

                                            • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Preferences

                                              Filesize

                                              5KB

                                              MD5

                                              b7bf41402f4fc9f712b57f93ddaf1ed3

                                              SHA1

                                              07eb8050be4cc6cf1cf57945c625d7bac7d135e8

                                              SHA256

                                              a9b98e261b3b959fdbbc34c2c7cb66fee02a253f4ce681477bc19388a45ad65a

                                              SHA512

                                              1c604517d4300e755f20bf34530864cdaa87ea68e725ca5954dd02949a18c40dac7866a173f43e5520f812426690061c13cffb17b44ac04d0af00881a2d6058c

                                            • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Preferences

                                              Filesize

                                              6KB

                                              MD5

                                              91c56189f40427ece243bb0fe6f8af59

                                              SHA1

                                              e927c878a15099aa3af179e0471d77287479a58d

                                              SHA256

                                              5ddb472d8ea3122a3ea31972770d40975b932c7b0410b40fadc2f3fa32148de7

                                              SHA512

                                              da18098b7882510943f457c38a50e87d3292a639a494f5dd9972bab89e5caebc88a7dd70340580c670ad9b94f63417c6d39ce9b26b19592eb2e5c7efbccd71a1

                                            • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Preferences

                                              Filesize

                                              6KB

                                              MD5

                                              539af6c08cfe7025f9ec4ad8ae514846

                                              SHA1

                                              08fcec31771a7e080b2233b8d9f465ec6226e4d8

                                              SHA256

                                              b2fe1a6afaa73be0995dc583aa5067bf7ced8936021aef9f1896d2ca56d6306f

                                              SHA512

                                              f0f865e24e6f6e282b23295a8822867c603b0e070a8946240100e68df6bd5e16e57b82af3665b0597d1588f5ab8b41a97466f094b488f6684cbbe96b107b2602

                                            • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Preferences

                                              Filesize

                                              7KB

                                              MD5

                                              edc3811cdbf694b3f6196540b146289a

                                              SHA1

                                              e0c4c7faf68f0ba1d0bba8158eaacc5df5850124

                                              SHA256

                                              97356feb56acf4948afefddcde9b390f11e7b0e88f97daf5d3ab72b262ae32a1

                                              SHA512

                                              87c426030716657144b3a6ec0ac29a875811eb0dcf9a2815231195f3fc2c0ac904293cd1201065bb403a1ed699e75b7fb75e87593afa54c5ca740796ddbac821

                                            • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\TransportSecurity

                                              Filesize

                                              1KB

                                              MD5

                                              3726110f680396d52c05f3d130b4f323

                                              SHA1

                                              4c849916b2758f3081d49271b58a387e599614e0

                                              SHA256

                                              f2640a6fe472f8ff10fc9ea26f2c4e8816cc564a1c60a0c16f177c6f9b2a6edc

                                              SHA512

                                              37968762802c164b5f0df947672546fec901e074016a366e7703afd6e74c89f39a2a5ac6dacea1e9b0c1956e87373aa0578f6deacf41fe18991024e017a98b83

                                            • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\TransportSecurity

                                              Filesize

                                              1KB

                                              MD5

                                              a5b7d0365883fddaacfdccc724fd115c

                                              SHA1

                                              7820c374673de01a7252ea608d26e4e524967a6e

                                              SHA256

                                              582ea223338c77402962d8011d727cce3dd2df4e1cefd602aaf996c3da8bc766

                                              SHA512

                                              b6a17ad26aaa9e88e02e331cce64e56f989ddde6dee0337f54175ca66bba88ae5467d4ee8a8029fdde4c63be55f74710b8beb021fa0d955d8899f5764bd42c0d

                                            • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\TransportSecurity

                                              Filesize

                                              1KB

                                              MD5

                                              6eb1575d4d72bae3d81a1ff037dd071d

                                              SHA1

                                              21ad7751aaed4db016e6e217318c1c7104e699fc

                                              SHA256

                                              bbaf10c3835efe6577af7c78cf45a4336250bd2881aee2aa7b801e40fa7a7535

                                              SHA512

                                              dd8a27c299e02e9aeef156b3d8ad10a75af1cee0cc3e17a7ba00e531af725257a8a9d9110d882db7ce5c3b1ccb5cf99f8bc5cc3f4998a298e5b72b0dad393a75

                                            • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\TransportSecurity~RFe580b36.TMP

                                              Filesize

                                              1KB

                                              MD5

                                              43a8992fee67a5298c81ef58a327b019

                                              SHA1

                                              498c6c2cefdff8aa42bd640f751c5365c3c4656d

                                              SHA256

                                              e7d570ce548fe2a741831441a4842a918669b344c1b861055e392e9cdff0262a

                                              SHA512

                                              037510a7519a9b29864346eb33de198afbbb2c58af766c34e292f4ea512c7560679e8e8a7ad53491b511078198bb14e5213144049e89c4d87ebc46bc2c264ed2

                                            • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\data_reduction_proxy_leveldb\CURRENT

                                              Filesize

                                              16B

                                              MD5

                                              6752a1d65b201c13b62ea44016eb221f

                                              SHA1

                                              58ecf154d01a62233ed7fb494ace3c3d4ffce08b

                                              SHA256

                                              0861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd

                                              SHA512

                                              9cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389

                                            • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Local State

                                              Filesize

                                              10KB

                                              MD5

                                              f4ac1e07ea55aec01c4bf8254776cfd3

                                              SHA1

                                              3708a967712248551c057caee4bf8cd2fa7e769c

                                              SHA256

                                              36ec48709b9d52c1c772bc36ba0eb5a54972b87eb46acb159649a15a04492404

                                              SHA512

                                              d10a14e92f0e09d5b424a44e019eb8bfe885147f531446d4f36bfc4c543b1337531f568b779c46a454289900b25b280773a5f72f44a5ab2f43d8fc0a89cff996

                                            • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Local State

                                              Filesize

                                              10KB

                                              MD5

                                              dcc0db8d1b25b9a4e311d8c1fe4ff87b

                                              SHA1

                                              3853b3eef1fd6855661c6d02489676f5f1e29c12

                                              SHA256

                                              f14f3acb827a41928b18cbc6dcd6762e8d5a66efebd57839268ec4b1fafb8109

                                              SHA512

                                              8d8903935c47bc050b019a0173ca0f85e0dd5883bfa7abc39cd1d87d484b1b0bbea9f0b3003d52025b7caa7ea6c3df22906441ba5bce85abdfd3c3779cdc2d0a

                                            • C:\Users\Admin\AppData\Local\Temp\RES86FF.tmp

                                              Filesize

                                              1KB

                                              MD5

                                              8d1bc7f422c8140fff9e5fe0862913b3

                                              SHA1

                                              1eebd275f368d3231bd80bbb3712d8644ef8d4f4

                                              SHA256

                                              ec1efc74ff7d68c69a1337ed099acaf585359434ec4661b1f530555cdade3a85

                                              SHA512

                                              e266459c002d5a3ac263c345c1098c7eade6886c584a7b073d47b5e7112cdb38b24f84087325f0fdd395ef49cb223a94bd7b8a075ef6849ced256bbe8595e0d9

                                            • C:\Users\Admin\AppData\Local\Temp\gw3q4oaz\gw3q4oaz.0.vb

                                              Filesize

                                              78KB

                                              MD5

                                              1b85c74206faa940d94ca83d07f9abca

                                              SHA1

                                              dde178f562a3a58b3e8d3ad0bed63f83115262ab

                                              SHA256

                                              65580ef492f6098ecaca5b3bd9064528585e65a17700014b8ae8922e3e1a5e95

                                              SHA512

                                              509c4989fd9106f9324fffb35381ab6fe11301bbd4b68dad488671ab01c82784d1e89e2f86e553d911d4411cc1e206577bad9e8ee698926cfd1b8ae0ef642a27

                                            • C:\Users\Admin\AppData\Local\Temp\gw3q4oaz\gw3q4oaz.cmdline

                                              Filesize

                                              322B

                                              MD5

                                              aef4137532af462f972d12020d20892d

                                              SHA1

                                              8b83344e605a9bddd7e18e31478a8c30a53e8715

                                              SHA256

                                              cf383e85de61f4cb51d6c0909d155b16bd3c8dbaa96d6a36dbda423c4d207cb3

                                              SHA512

                                              3ba79c8f98942c891bd5f55bba817a78a7121565880f6bdb8e486d1945b746feda625818808a70d2eb5266aaacd5f232c705dcfd0540030fc4fb94644072b03b

                                            • C:\Users\Admin\AppData\Local\Temp\tmpFFAA.tmp

                                              Filesize

                                              100KB

                                              MD5

                                              1b942faa8e8b1008a8c3c1004ba57349

                                              SHA1

                                              cd99977f6c1819b12b33240b784ca816dfe2cb91

                                              SHA256

                                              555ccb7ecd9ae52a75135fdd81ab443a49d5785b0621ed6468d28c4234e46ccc

                                              SHA512

                                              5aee3d59478d41ddd5885c99b394c9c4983064e2b3528db1a3f7fc289662bced4f57d072517bbe7573c6d1789435e987ef1aa9cc91f372bcfd30bc016675fa43

                                            • C:\Users\Admin\AppData\Local\Temp\vbc1FA26DDF7C4741BB85A0548AD7616A8A.TMP

                                              Filesize

                                              1KB

                                              MD5

                                              d40c58bd46211e4ffcbfbdfac7c2bb69

                                              SHA1

                                              c5cf88224acc284a4e81bd612369f0e39f3ac604

                                              SHA256

                                              01902f1903d080c6632ae2209136e8e713e9fd408db4621ae21246b65bfea2ca

                                              SHA512

                                              48b14748e86b7d92a3ea18f29caf1d7b4b2e1de75377012378d146575048a2531d2e5aaeae1abf2d322d06146177cdbf0c2940ac023efae007b9f235f18e2c68

                                            • C:\Users\Admin\Downloads\Unconfirmed 995199.crdownload

                                              Filesize

                                              25.1MB

                                              MD5

                                              95c1c4a3673071e05814af8b2a138be4

                                              SHA1

                                              4c08b79195e0ff13b63cfb0e815a09dc426ac340

                                              SHA256

                                              7c270da2506ba3354531e0934096315422ee719ad9ea16cb1ee86a7004a9ce27

                                              SHA512

                                              339a47ecfc6d403beb55d51128164a520c4bea63733be3cfd47aec47953fbf2792aa4e150f4122994a7620122b0e0fc20c1eeb2f9697cf5578df08426820fecd

                                            • C:\Users\Admin\Downloads\XWorm-5.6-main\XWorm-5.6-main\XClient.exe

                                              Filesize

                                              32KB

                                              MD5

                                              31ae1ffe143ba598edc2f22eb8687dcc

                                              SHA1

                                              5b777dff864e03e7e629d2b7b7fa8ef0f488c32a

                                              SHA256

                                              f38f8ef727c0a1eb82bb506a175e781d269a9021760870b33f2ac6689c074c72

                                              SHA512

                                              ac5959336a9109b3d0b1dee9c99c946c1a8744d7d996e9002757778938de9c34aa1a60e5ecd41472b6e7360d73317eaa65eed0663d8fbb4bab76f746f3a9b435

                                            • memory/2628-590-0x0000000000C10000-0x0000000000C1E000-memory.dmp

                                              Filesize

                                              56KB

                                            • memory/2628-603-0x00000000013F0000-0x00000000013FE000-memory.dmp

                                              Filesize

                                              56KB

                                            • memory/2628-607-0x000000001B960000-0x000000001B96A000-memory.dmp

                                              Filesize

                                              40KB

                                            • memory/2628-606-0x0000000002F10000-0x0000000002F1C000-memory.dmp

                                              Filesize

                                              48KB

                                            • memory/2628-605-0x000000001DC10000-0x000000001E138000-memory.dmp

                                              Filesize

                                              5.2MB

                                            • memory/2628-604-0x000000001C720000-0x000000001C7D0000-memory.dmp

                                              Filesize

                                              704KB

                                            • memory/2628-596-0x000000001B910000-0x000000001B94A000-memory.dmp

                                              Filesize

                                              232KB

                                            • memory/2628-624-0x000000001C640000-0x000000001C652000-memory.dmp

                                              Filesize

                                              72KB

                                            • memory/4416-572-0x0000018B6AF30000-0x0000018B6B124000-memory.dmp

                                              Filesize

                                              2.0MB

                                            • memory/4416-595-0x0000018B73F70000-0x0000018B74022000-memory.dmp

                                              Filesize

                                              712KB

                                            • memory/4416-594-0x0000018B74260000-0x0000018B74542000-memory.dmp

                                              Filesize

                                              2.9MB

                                            • memory/4416-593-0x0000018B6BD30000-0x0000018B6BD5C000-memory.dmp

                                              Filesize

                                              176KB

                                            • memory/4416-592-0x0000018B6BD90000-0x0000018B6BE12000-memory.dmp

                                              Filesize

                                              520KB

                                            • memory/4416-573-0x0000018B73E00000-0x0000018B73F68000-memory.dmp

                                              Filesize

                                              1.4MB

                                            • memory/4416-612-0x0000018B74030000-0x0000018B741CB000-memory.dmp

                                              Filesize

                                              1.6MB

                                            • memory/4416-571-0x0000018B4F600000-0x0000018B504E8000-memory.dmp

                                              Filesize

                                              14.9MB