Resubmissions

11-11-2024 19:49

241111-yj68dayjak 10

11-11-2024 19:46

241111-yhassaxrel 7

Analysis

  • max time kernel
    112s
  • max time network
    105s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20241007-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system
  • submitted
    11-11-2024 19:49

General

  • Target

    https://gofile.io/d/zLixM6

Malware Config

Signatures

  • Detect Xworm Payload 1 IoCs
  • Xworm

    Xworm is a remote access trojan written in C#.

  • Xworm family
  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 19 IoCs
  • Obfuscated with Agile.Net obfuscator 2 IoCs

    Detects use of the Agile.Net commercial obfuscator, which is capable of entity renaming and control flow obfuscation.

  • Uses the VBS compiler for execution 1 TTPs
  • Browser Information Discovery 1 TTPs

    Enumerate browser information.

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Location Discovery: System Language Discovery 1 TTPs 3 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Checks processor information in registry 2 TTPs 2 IoCs

    Processor information is often read in order to detect sandboxing environments.

  • Enumerates system info in registry 2 TTPs 6 IoCs
  • Modifies registry class 63 IoCs
  • Suspicious behavior: EnumeratesProcesses 33 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs
  • Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 9 IoCs
  • Suspicious use of AdjustPrivilegeToken 7 IoCs
  • Suspicious use of FindShellTrayWindow 64 IoCs
  • Suspicious use of SendNotifyMessage 27 IoCs
  • Suspicious use of SetWindowsHookEx 1 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs

Processes

  • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
    "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --start-maximized --single-argument https://gofile.io/d/zLixM6
    1⤵
    • Enumerates system info in registry
    • Modifies registry class
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SendNotifyMessage
    • Suspicious use of WriteProcessMemory
    PID:2340
    • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
      "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7fff276546f8,0x7fff27654708,0x7fff27654718
      2⤵
        PID:5116
      • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
        "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2128,15371606620015749697,15103824818863093060,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2140 /prefetch:2
        2⤵
          PID:372
        • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
          "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2128,15371606620015749697,15103824818863093060,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2520 /prefetch:3
          2⤵
          • Suspicious behavior: EnumeratesProcesses
          PID:2996
        • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
          "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2128,15371606620015749697,15103824818863093060,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2640 /prefetch:8
          2⤵
            PID:1484
          • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
            "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2128,15371606620015749697,15103824818863093060,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3320 /prefetch:1
            2⤵
              PID:4848
            • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
              "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2128,15371606620015749697,15103824818863093060,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3332 /prefetch:1
              2⤵
                PID:1844
              • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2128,15371606620015749697,15103824818863093060,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4652 /prefetch:1
                2⤵
                  PID:2140
                • C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe
                  "C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2128,15371606620015749697,15103824818863093060,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5232 /prefetch:8
                  2⤵
                    PID:640
                  • C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe
                    "C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2128,15371606620015749697,15103824818863093060,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5232 /prefetch:8
                    2⤵
                    • Suspicious behavior: EnumeratesProcesses
                    PID:4056
                  • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                    "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2128,15371606620015749697,15103824818863093060,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5320 /prefetch:1
                    2⤵
                      PID:4008
                    • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                      "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2128,15371606620015749697,15103824818863093060,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4924 /prefetch:1
                      2⤵
                        PID:1304
                      • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                        "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2128,15371606620015749697,15103824818863093060,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5568 /prefetch:1
                        2⤵
                          PID:1664
                        • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                          "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2128,15371606620015749697,15103824818863093060,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5616 /prefetch:1
                          2⤵
                            PID:2380
                          • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                            "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2128,15371606620015749697,15103824818863093060,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=13 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5336 /prefetch:1
                            2⤵
                              PID:5084
                            • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                              "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2128,15371606620015749697,15103824818863093060,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=15 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4684 /prefetch:1
                              2⤵
                                PID:4912
                              • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=edge_collections.mojom.CollectionsDataManager --field-trial-handle=2128,15371606620015749697,15103824818863093060,131072 --lang=en-US --service-sandbox-type=collections --mojo-platform-channel-handle=4812 /prefetch:8
                                2⤵
                                  PID:4832
                                • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                  "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=quarantine.mojom.Quarantine --field-trial-handle=2128,15371606620015749697,15103824818863093060,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=3544 /prefetch:8
                                  2⤵
                                  • Suspicious behavior: EnumeratesProcesses
                                  PID:2344
                              • C:\Windows\System32\CompPkgSrv.exe
                                C:\Windows\System32\CompPkgSrv.exe -Embedding
                                1⤵
                                  PID:868
                                • C:\Windows\System32\CompPkgSrv.exe
                                  C:\Windows\System32\CompPkgSrv.exe -Embedding
                                  1⤵
                                    PID:1876
                                  • C:\Windows\System32\rundll32.exe
                                    C:\Windows\System32\rundll32.exe C:\Windows\System32\shell32.dll,SHCreateLocalServerRunDll {9aa46009-3ce0-458a-a354-715610a075e6} -Embedding
                                    1⤵
                                      PID:4716
                                    • C:\Program Files\7-Zip\7zG.exe
                                      "C:\Program Files\7-Zip\7zG.exe" x -o"C:\Users\Admin\Downloads\XWorm v5.1-5.2\" -spe -an -ai#7zMap4733:88:7zEvent4004
                                      1⤵
                                      • Suspicious use of AdjustPrivilegeToken
                                      • Suspicious use of FindShellTrayWindow
                                      PID:5556
                                    • C:\Users\Admin\Downloads\XWorm v5.1-5.2\XWorm\XWorm V5.2\XWormLoader 5.2 x32.exe
                                      "C:\Users\Admin\Downloads\XWorm v5.1-5.2\XWorm\XWorm V5.2\XWormLoader 5.2 x32.exe"
                                      1⤵
                                      • Executes dropped EXE
                                      • Loads dropped DLL
                                      • System Location Discovery: System Language Discovery
                                      • Checks processor information in registry
                                      • Enumerates system info in registry
                                      • Modifies registry class
                                      • Suspicious behavior: EnumeratesProcesses
                                      • Suspicious behavior: GetForegroundWindowSpam
                                      • Suspicious use of AdjustPrivilegeToken
                                      • Suspicious use of FindShellTrayWindow
                                      • Suspicious use of SendNotifyMessage
                                      • Suspicious use of SetWindowsHookEx
                                      PID:3680
                                      • C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exe
                                        "C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exe" /noconfig @"C:\Users\Admin\AppData\Local\Temp\2ytn2s5l\2ytn2s5l.cmdline"
                                        2⤵
                                        • System Location Discovery: System Language Discovery
                                        PID:2820
                                        • C:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exe
                                          C:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exe /NOLOGO /READONLY /MACHINE:IX86 "/OUT:C:\Users\Admin\AppData\Local\Temp\RES58B5.tmp" "C:\Users\Admin\AppData\Local\Temp\vbcAF48B9987CDF47A7B21949E921F0A5CF.TMP"
                                          3⤵
                                          • System Location Discovery: System Language Discovery
                                          PID:1596
                                    • C:\Windows\system32\wbem\WmiApSrv.exe
                                      C:\Windows\system32\wbem\WmiApSrv.exe
                                      1⤵
                                        PID:5800
                                      • C:\Windows\system32\AUDIODG.EXE
                                        C:\Windows\system32\AUDIODG.EXE 0x4e8 0x4fc
                                        1⤵
                                        • Suspicious use of AdjustPrivilegeToken
                                        PID:5928

                                      Network

                                      MITRE ATT&CK Enterprise v15

                                      Replay Monitor

                                      Loading Replay Monitor...

                                      Downloads

                                      • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad\settings.dat

                                        Filesize

                                        152B

                                        MD5

                                        99afa4934d1e3c56bbce114b356e8a99

                                        SHA1

                                        3f0e7a1a28d9d9c06b6663df5d83a65c84d52581

                                        SHA256

                                        08e098bb97fd91d815469cdfd5568607a3feca61f18b6b5b9c11b531fde206c8

                                        SHA512

                                        76686f30ed68144cf943b80ac10b52c74eee84f197cee3c24ef7845ef44bdb5586b6e530824543deeed59417205ac0e2559808bcb46450504106ac8f4c95b9da

                                      • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad\settings.dat

                                        Filesize

                                        152B

                                        MD5

                                        443a627d539ca4eab732bad0cbe7332b

                                        SHA1

                                        86b18b906a1acd2a22f4b2c78ac3564c394a9569

                                        SHA256

                                        1e1ad9dce141f5f17ea07c7e9c2a65e707c9943f172b9134b0daf9eef25f0dc9

                                        SHA512

                                        923b86d75a565c91250110162ce13dd3ef3f6bdde1a83f7af235ed302d4a96b8c9ed722e2152781e699dfcb26bb98afc73f5adb298f8fd673f14c9f28b5f764d

                                      • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index

                                        Filesize

                                        288B

                                        MD5

                                        9bbab0dccd7e6f37e63ecaf5c47951c7

                                        SHA1

                                        665651263dd0e345ce066edb64b5a0e245aaa518

                                        SHA256

                                        188d650d96854dfee0bfb0d09e54e1ccc5ab68944a0de9f8f2b030f6a6cbe2bd

                                        SHA512

                                        0e01d35600cc0cc60d9cae0ec776219c7e41c5fccf251ae38118391a9b8ec9fdeb93b53bdfc207c2557b2500e9720999aed0f034eeeb8cde13397b8d34c0a90e

                                      • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Network Persistent State

                                        Filesize

                                        390B

                                        MD5

                                        a902aa7942d30554ea70c00366baa255

                                        SHA1

                                        9ad752178e695b1c90362700ccd4e4d61f9144b6

                                        SHA256

                                        096ee0320bbb1383bc312ab5973bce172a75083355dd85241447b1cd0b75dfad

                                        SHA512

                                        748f769d19b8d1a1c29ebdb1ea4def80c1ea8675086e5319d8f6e171d2a14d1638c13c3d9bff34514b633a436bf2308e0a6268e0f88500d90645d693ad633bc0

                                      • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Preferences

                                        Filesize

                                        5KB

                                        MD5

                                        592b0efa0546556d2bb7ed1de750d9c1

                                        SHA1

                                        185160d2e7c48e8fc4ee60cc8ddae29957d3a63b

                                        SHA256

                                        b2595ec86a47bd3417a5df65a5d248a0f8af14e6a1c78c964d7f1ee3de60a871

                                        SHA512

                                        48834717fc8144dcfdcb1fa8dd03f280c1908ea16c35536ce3ca92d95d30619623056b3cfc36d26add28f465585284867069fd1b98889c05997a1fd1f5743265

                                      • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Preferences

                                        Filesize

                                        6KB

                                        MD5

                                        fcb4b097864843f32a5d4b2d90625bf4

                                        SHA1

                                        d6957e005d1d625c0f506e69e46525ee467f08f7

                                        SHA256

                                        5cfe6c4e01b908d6cc162919ed1d48af8728880902926a379adb72010836614a

                                        SHA512

                                        d14703965a1eca4cdb4beead60b6f87f2e8fb5be70ee2ff6d1e8462d93bf0f7d08ec5293103b772744146159590d78a90b8005bdbc541540ec399e97f2f8091f

                                      • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Preferences

                                        Filesize

                                        6KB

                                        MD5

                                        c9310fd7e92a04514da35ccf0d6587c1

                                        SHA1

                                        05c97a673e1875006ce6a7856c40e7478cbe4a44

                                        SHA256

                                        ba2348ddf9e680eb7b63b56cb93e89c822140e6c63b4a6c75b6fb4f3f82d9217

                                        SHA512

                                        ea28a2da387e3b242691cf7b4d4cfe1ac70f6be0a4cdc170f61654f5c05ff494f380eeee36dd9e52f86a325cb2c491aa8d35531805bc34699dcce8618594abd1

                                      • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\a6c71999-2a55-4981-8612-da0b3a510cdd.tmp

                                        Filesize

                                        6KB

                                        MD5

                                        0667c60fdb9664a1508536308c7f4758

                                        SHA1

                                        e8dbfc6574cbe43df3666160aa2bcc8e3282a5d8

                                        SHA256

                                        0f6ef6ae69321ad01697277a6c97077edb341373c11e567d04abaf2427df26b2

                                        SHA512

                                        9c0925c03fd457ede175767670f1b2ca1145a24ac9cb4b45a85c7e81a45cc835425685c14455a865d9614717c8402973b2c0d5c0de347545cfffe009c389acbd

                                      • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\data_reduction_proxy_leveldb\CURRENT

                                        Filesize

                                        16B

                                        MD5

                                        206702161f94c5cd39fadd03f4014d98

                                        SHA1

                                        bd8bfc144fb5326d21bd1531523d9fb50e1b600a

                                        SHA256

                                        1005a525006f148c86efcbfb36c6eac091b311532448010f70f7de9a68007167

                                        SHA512

                                        0af09f26941b11991c750d1a2b525c39a8970900e98cba96fd1b55dbf93fee79e18b8aab258f48b4f7bda40d059629bc7770d84371235cdb1352a4f17f80e145

                                      • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\data_reduction_proxy_leveldb\CURRENT

                                        Filesize

                                        16B

                                        MD5

                                        46295cac801e5d4857d09837238a6394

                                        SHA1

                                        44e0fa1b517dbf802b18faf0785eeea6ac51594b

                                        SHA256

                                        0f1bad70c7bd1e0a69562853ec529355462fcd0423263a3d39d6d0d70b780443

                                        SHA512

                                        8969402593f927350e2ceb4b5bc2a277f3754697c1961e3d6237da322257fbab42909e1a742e22223447f3a4805f8d8ef525432a7c3515a549e984d3eff72b23

                                      • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Local State

                                        Filesize

                                        10KB

                                        MD5

                                        5b3da05e7d80269b637b954ed004312f

                                        SHA1

                                        acd0d919a33a7f3ee149e29c82da6f9378b81f4c

                                        SHA256

                                        11db0e4b7bd4e39976a27fd6da6e1eafbf0201e2452fbc84256e14e1237132f5

                                        SHA512

                                        679b5cd1ec18adaea8947ff8114a4d25d046a5ecda370dddc0a76dac770fd787f3967022d65ac64d56bf5dd36397227b43baaee156cc817bfa74f920c9432d1f

                                      • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Local State

                                        Filesize

                                        10KB

                                        MD5

                                        e96b99b36197f78d6f3d0ff337480c85

                                        SHA1

                                        530d7bbf5d40843561803da3c6878c93e9b3e8dc

                                        SHA256

                                        995c6ce73f259aa7fc45dad0b748ef4b32ceda58e1cb1244a03a1de710794a8f

                                        SHA512

                                        5c822694e9422a60692af890797cf8ab1691184a88b17170a1c74d0e1fcede860e9e749e9c2c8093f0b27075302d0ea73ae6b1fd2d6117d235cefb7ba980566a

                                      • C:\Users\Admin\AppData\Local\Temp\2ytn2s5l\2ytn2s5l.0.vb

                                        Filesize

                                        77KB

                                        MD5

                                        ccf09c1d9c00f5fed11240790589c216

                                        SHA1

                                        86ca312b2d416f595be7adeba177ff86135338f4

                                        SHA256

                                        f9debf59cea779d9f98550f50d7af221e41bb708561e26aa6745066126796b93

                                        SHA512

                                        6db0a7ec6b812deefca28206d6b68bb8bed72aff8fd7c08f9c1dc118dc3dd5a038d3522abceb8fb4e19c9fb6061f6899944582c77ea21c8055c0221f26bc7251

                                      • C:\Users\Admin\AppData\Local\Temp\2ytn2s5l\2ytn2s5l.cmdline

                                        Filesize

                                        290B

                                        MD5

                                        ad4af2038328647a0a5a28118cecbf46

                                        SHA1

                                        2c743173d8f0a98f4f54bc2870f611b28ee5b8fd

                                        SHA256

                                        b150a0cb0bad96b0b572beb0e1f4d606a0465094db4fd49dcff2cc07dc89ee03

                                        SHA512

                                        2c4bce328f7ee8676648ba654b9dd410d39a7e5633e1f3c16ae70b90d1806b16307258d5ee182bd976503e9fd26e5d90134986f3b7daf2d954f6ace9385c975c

                                      • C:\Users\Admin\AppData\Local\Temp\RES58B5.tmp

                                        Filesize

                                        1KB

                                        MD5

                                        d3868fee42188de659d3e348b3685541

                                        SHA1

                                        f5029bf7133c55074e993d6bdf819ca10f38d8b8

                                        SHA256

                                        86b059bbcde9f69e4a6d713f39e7587ef085ba1de76024e3859821e3779fa462

                                        SHA512

                                        c44339ce42942d66ec4080a5f72504286b662ca777a3ee3f4e6e557d52d740c838023d95dda79f1277bc036b2dde7f169f3b1be73a0e1f00de7822423aaf8fd2

                                      • C:\Users\Admin\AppData\Local\Temp\aPjMR\aPjMR.dll

                                        Filesize

                                        84KB

                                        MD5

                                        0b0e63957367e620b8697c5341af35b9

                                        SHA1

                                        69361c2762b2d1cada80667cd55bc5082e60af86

                                        SHA256

                                        bd9cdcfaa0edecdb89a204965d20f4a896c6650d4840e28736d9bd832390e1c5

                                        SHA512

                                        07d0e52c863f52ecb3d12fab9e71c7a18d54cbedb47250bee7e4297ff72ed793c23a2735c48090c261fe4633d53d03e305c1338dfc881bb86874d1633ff6ecee

                                      • C:\Users\Admin\AppData\Local\Temp\vbcAF48B9987CDF47A7B21949E921F0A5CF.TMP

                                        Filesize

                                        1KB

                                        MD5

                                        d40c58bd46211e4ffcbfbdfac7c2bb69

                                        SHA1

                                        c5cf88224acc284a4e81bd612369f0e39f3ac604

                                        SHA256

                                        01902f1903d080c6632ae2209136e8e713e9fd408db4621ae21246b65bfea2ca

                                        SHA512

                                        48b14748e86b7d92a3ea18f29caf1d7b4b2e1de75377012378d146575048a2531d2e5aaeae1abf2d322d06146177cdbf0c2940ac023efae007b9f235f18e2c68

                                      • C:\Users\Admin\Downloads\XWorm v5.1-5.2\XWorm\XWorm V5.1\Icons\icon (15).ico

                                        Filesize

                                        361KB

                                        MD5

                                        e3143e8c70427a56dac73a808cba0c79

                                        SHA1

                                        63556c7ad9e778d5bd9092f834b5cc751e419d16

                                        SHA256

                                        b2f57a23ecc789c1bbf6037ac0825bf98babc7bf0c5d438af5e2767a27a79188

                                        SHA512

                                        74e0f4b55625df86a87b9315e4007be8e05bbecca4346a6ea06ef5b1528acb5a8bb636ef3e599a3820dbddcf69563a0a22e2c1062c965544fd75ec96fd9803fc

                                      • C:\Users\Admin\Downloads\XWorm v5.1-5.2\XWorm\XWorm V5.2\GeoIP.dat

                                        Filesize

                                        1.2MB

                                        MD5

                                        8ef41798df108ce9bd41382c9721b1c9

                                        SHA1

                                        1e6227635a12039f4d380531b032bf773f0e6de0

                                        SHA256

                                        bc07ff22d4ee0b6fafcc12482ecf2981c172a672194c647cedf9b4d215ad9740

                                        SHA512

                                        4c62af04d4a141b94eb3e1b0dbf3669cb53fe9b942072ed7bea6a848d87d8994cff5a5f639ab70f424eb79a4b7adabdde4da6d2f02f995bd8d55db23ce99f01b

                                      • C:\Users\Admin\Downloads\XWorm v5.1-5.2\XWorm\XWorm V5.2\Guna.UI2.dll

                                        Filesize

                                        1.9MB

                                        MD5

                                        bcc0fe2b28edd2da651388f84599059b

                                        SHA1

                                        44d7756708aafa08730ca9dbdc01091790940a4f

                                        SHA256

                                        c6264665a882e73eb2262a74fea2c29b1921a9af33180126325fb67a851310ef

                                        SHA512

                                        3bfc3d27c095dde988f779021d0479c8c1de80a404454813c6cae663e3fe63dc636bffa7de1094e18594c9d608fa7420a0651509544722f2a00288f0b7719cc8

                                      • C:\Users\Admin\Downloads\XWorm v5.1-5.2\XWorm\XWorm V5.2\Mono.Cecil.dll

                                        Filesize

                                        350KB

                                        MD5

                                        de69bb29d6a9dfb615a90df3580d63b1

                                        SHA1

                                        74446b4dcc146ce61e5216bf7efac186adf7849b

                                        SHA256

                                        f66f97866433e688acc3e4cd1e6ef14505f81df6b26dd6215e376767f6f954bc

                                        SHA512

                                        6e96a510966a4acbca900773d4409720b0771fede37f24431bf0d8b9c611eaa152ba05ee588bb17f796d7b8caaccc10534e7cc1c907c28ddfa54ac4ce3952015

                                      • C:\Users\Admin\Downloads\XWorm v5.1-5.2\XWorm\XWorm V5.2\MonoMod.Backports.dll

                                        Filesize

                                        138KB

                                        MD5

                                        dd43356f07fc0ce082db4e2f102747a2

                                        SHA1

                                        aa0782732e2d60fa668b0aadbf3447ef70b6a619

                                        SHA256

                                        e375b83a3e242212a2ed9478e1f0b8383c1bf1fdfab5a1cf766df740b631afd6

                                        SHA512

                                        284d64b99931ed1f2e839a7b19ee8389eefaf6c72bac556468a01f3eb17000252613c01dbae88923e9a02f3c84bcab02296659648fad727123f63d0ac38d258e

                                      • C:\Users\Admin\Downloads\XWorm v5.1-5.2\XWorm\XWorm V5.2\MonoMod.Core.dll

                                        Filesize

                                        216KB

                                        MD5

                                        b808181453b17f3fc1ab153bf11be197

                                        SHA1

                                        bce86080b7eb76783940d1ff277e2b46f231efe9

                                        SHA256

                                        da00cdfab411f8f535f17258981ec51d1af9b0bfcee3a360cbd0cb6f692dbcdd

                                        SHA512

                                        a2d941c6e69972f99707ade5c5325eb50b0ec4c5abf6a189eb11a46606fed8076be44c839d83cf310b67e66471e0ea3f6597857a8e2c7e2a7ad6de60c314f7d3

                                      • C:\Users\Admin\Downloads\XWorm v5.1-5.2\XWorm\XWorm V5.2\MonoMod.ILHelpers.dll

                                        Filesize

                                        6KB

                                        MD5

                                        6512e89e0cb92514ef24be43f0bf4500

                                        SHA1

                                        a039c51f89656d9d5c584f063b2b675a9ff44b8e

                                        SHA256

                                        1411e4858412ded195f0e65544a4ec8e8249118b76375050a35c076940826cd0

                                        SHA512

                                        9ffb2ff050cce82dbfbbb0e85ab5f976fcd81086b3d8695502c5221c23d14080f0e494a33e0092b4feb2eda12e2130a2f02df3125733c2f5ec31356e92dea00b

                                      • C:\Users\Admin\Downloads\XWorm v5.1-5.2\XWorm\XWorm V5.2\MonoMod.Utils.dll

                                        Filesize

                                        319KB

                                        MD5

                                        79f1c4c312fdbb9258c2cdde3772271f

                                        SHA1

                                        a143434883e4ef2c0190407602b030f5c4fdf96f

                                        SHA256

                                        f22a4fa1e8b1b70286ecf07effb15d2184454fa88325ce4c0f31ffadb4bef50a

                                        SHA512

                                        b28ed3c063ae3a15cd52e625a860bbb65f6cd38ccad458657a163cd927c74ebf498fb12f1e578e869bcea00c6cd3f47ede10866e34a48c133c5ac26b902ae5d9

                                      • C:\Users\Admin\Downloads\XWorm v5.1-5.2\XWorm\XWorm V5.2\RVGLib.dll

                                        Filesize

                                        241KB

                                        MD5

                                        d34c13128c6c7c93af2000a45196df81

                                        SHA1

                                        664c821c9d2ed234aea31d8b4f17d987e4b386f1

                                        SHA256

                                        aaf9fb0158bd40ab562a4212c2a795cb40ef6864042dc12f3a2415f2446ba1c7

                                        SHA512

                                        91f4e0e795f359b03595b01cbf29188a2a0b52ab9d64eadd8fb8b3508e417b8c7a70be439940975bf5bdf26493ea161aa45025beb83bc95076ed269e82d39689

                                      • C:\Users\Admin\Downloads\XWorm v5.1-5.2\XWorm\XWorm V5.2\SimpleObfuscator.dll

                                        Filesize

                                        1.4MB

                                        MD5

                                        9043d712208178c33ba8e942834ce457

                                        SHA1

                                        e0fa5c730bf127a33348f5d2a5673260ae3719d1

                                        SHA256

                                        b7a6eea19188b987dad97b32d774107e9a1beb4f461a654a00197d73f7fad54c

                                        SHA512

                                        dd6fa02ab70c58cde75fd4d4714e0ed0df5d3b18f737c68c93dba40c30376cc93957f8eef69fea86041489546ce4239b35a3b5d639472fd54b80f2f7260c8f65

                                      • C:\Users\Admin\Downloads\XWorm v5.1-5.2\XWorm\XWorm V5.2\Sounds\Intro.wav

                                        Filesize

                                        238KB

                                        MD5

                                        ad3b4fae17bcabc254df49f5e76b87a6

                                        SHA1

                                        1683ff029eebaffdc7a4827827da7bb361c8747e

                                        SHA256

                                        e3e5029bf5f29fa32d2f6cdda35697cd8e6035d5c78615f64d0b305d1bd926cf

                                        SHA512

                                        3d6ecc9040b5079402229c214cb5f9354315131a630c43d1da95248edc1b97627fb9ba032d006380a67409619763fb91976295f8d22ca91894c88f38bb610cd3

                                      • C:\Users\Admin\Downloads\XWorm v5.1-5.2\XWorm\XWorm V5.2\XWorm V5.2.exe

                                        Filesize

                                        12.2MB

                                        MD5

                                        8b7b015c1ea809f5c6ade7269bdc5610

                                        SHA1

                                        c67d5d83ca18731d17f79529cfdb3d3dcad36b96

                                        SHA256

                                        7fc9c7002b65bc1b33f72e019ed1e82008cc7b8e5b8eaf73fc41a3e6a246980e

                                        SHA512

                                        e652913f73326f9d8461ac2a631e1e413719df28c7938b38949c005fda501d9e159554c3e17a0d5826d279bb81efdef394f7fb6ff7289cf296c19e92fd924180

                                      • C:\Users\Admin\Downloads\XWorm v5.1-5.2\XWorm\XWorm V5.2\XWorm V5.2.exe.Config

                                        Filesize

                                        183B

                                        MD5

                                        66f09a3993dcae94acfe39d45b553f58

                                        SHA1

                                        9d09f8e22d464f7021d7f713269b8169aed98682

                                        SHA256

                                        7ea08548c23bd7fd7c75ca720ac5a0e8ca94cb51d06cd45ebf5f412e4bbdd7d7

                                        SHA512

                                        c8ea53ab187a720080bd8d879704e035f7e632afe1ee93e7637fad6bb7e40d33a5fe7e5c3d69134209487d225e72d8d944a43a28dc32922e946023e89abc93ed

                                      • C:\Users\Admin\Downloads\XWorm v5.1-5.2\XWorm\XWorm V5.2\XWormLoader 5.2 x32.exe

                                        Filesize

                                        109KB

                                        MD5

                                        f3b2ec58b71ba6793adcc2729e2140b1

                                        SHA1

                                        d9e93a33ac617afe326421df4f05882a61e0a4f2

                                        SHA256

                                        2d74eb709aea89a181cf8dfcc7e551978889f0d875401a2f1140487407bf18ae

                                        SHA512

                                        473edcaba9cb8044e28e30fc502a08a648359b3ed0deba85e559fe76b484fc8db0fc2375f746851623e30be33da035cec1d6038e1fcf4842a2afb6f9cd397495

                                      • C:\Users\Admin\Downloads\XWorm v5.1-5.2\XWorm\XWorm V5.2\XWormLoader 5.2 x32.exe.config

                                        Filesize

                                        187B

                                        MD5

                                        15c8c4ba1aa574c0c00fd45bb9cce1ab

                                        SHA1

                                        0dad65a3d4e9080fa29c42aa485c6102d2fa8bc8

                                        SHA256

                                        f82338e8e9c746b5d95cd2ccc7bf94dd5de2b9b8982fffddf2118e475de50e15

                                        SHA512

                                        52baac63399340427b94bfdeb7a42186d5359ce439c3d775497f347089edfbf72a6637b23bb008ab55b8d4dd3b79a7b2eb7c7ef922ea23d0716d5c3536b359d4

                                      • C:\Users\Admin\Downloads\XWorm v5.1-5.2\XWorm\XWorm V5.2\XWormLoader 5.2 x64.exe

                                        Filesize

                                        109KB

                                        MD5

                                        e6a20535b636d6402164a8e2d871ef6d

                                        SHA1

                                        981cb1fd9361ca58f8985104e00132d1836a8736

                                        SHA256

                                        b461c985b53de4f6921d83925b3c2a62de3bbc5b8f9c02eecd27926f0197fae2

                                        SHA512

                                        35856a0268ed9d17b1570d5392833ed168c8515d73fac9f150cf63cc1aea61c096aa2e6b3c8e091a1058ba062f9333f6767e323a37dfb6f4fa7e508a2a138a30

                                      • memory/3680-590-0x0000000005830000-0x000000000588E000-memory.dmp

                                        Filesize

                                        376KB

                                      • memory/3680-608-0x0000000006650000-0x0000000007288000-memory.dmp

                                        Filesize

                                        12.2MB

                                      • memory/3680-609-0x0000000007290000-0x0000000007834000-memory.dmp

                                        Filesize

                                        5.6MB

                                      • memory/3680-610-0x0000000005D70000-0x0000000005E02000-memory.dmp

                                        Filesize

                                        584KB

                                      • memory/3680-602-0x0000000005940000-0x0000000005950000-memory.dmp

                                        Filesize

                                        64KB

                                      • memory/3680-617-0x000000000B3C0000-0x000000000BFAC000-memory.dmp

                                        Filesize

                                        11.9MB

                                      • memory/3680-618-0x0000000002B10000-0x0000000002B1A000-memory.dmp

                                        Filesize

                                        40KB

                                      • memory/3680-619-0x0000000006580000-0x00000000065D6000-memory.dmp

                                        Filesize

                                        344KB

                                      • memory/3680-601-0x00000000059C0000-0x00000000059DA000-memory.dmp

                                        Filesize

                                        104KB

                                      • memory/3680-623-0x000000000C1B0000-0x000000000C3A4000-memory.dmp

                                        Filesize

                                        2.0MB

                                      • memory/3680-624-0x000000000E9C0000-0x000000000EA26000-memory.dmp

                                        Filesize

                                        408KB

                                      • memory/3680-600-0x0000000005950000-0x000000000598C000-memory.dmp

                                        Filesize

                                        240KB

                                      • memory/3680-596-0x0000000005810000-0x0000000005816000-memory.dmp

                                        Filesize

                                        24KB

                                      • memory/3680-595-0x00000000057D0000-0x00000000057D6000-memory.dmp

                                        Filesize

                                        24KB

                                      • memory/3680-594-0x0000000005890000-0x00000000058E6000-memory.dmp

                                        Filesize

                                        344KB

                                      • memory/3680-633-0x0000000019F90000-0x000000001A0F8000-memory.dmp

                                        Filesize

                                        1.4MB

                                      • memory/3680-586-0x0000000005310000-0x0000000005316000-memory.dmp

                                        Filesize

                                        24KB

                                      • memory/3680-582-0x0000000005550000-0x0000000005578000-memory.dmp

                                        Filesize

                                        160KB

                                      • memory/3680-578-0x00000000055F0000-0x000000000568C000-memory.dmp

                                        Filesize

                                        624KB

                                      • memory/3680-577-0x0000000002C90000-0x0000000002CD2000-memory.dmp

                                        Filesize

                                        264KB

                                      • memory/3680-573-0x0000000000FB0000-0x0000000000FD0000-memory.dmp

                                        Filesize

                                        128KB