Analysis

  • max time kernel
    1049s
  • max time network
    426s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20241007-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system
  • submitted
    13-11-2024 18:39

General

  • Target

    XWorm 5.6 Cracked.zip

  • Size

    24.2MB

  • MD5

    353c221103efd60bd38f1625a21c80d7

  • SHA1

    414e3eb44d636a628b455a4d8b2997cb06564f14

  • SHA256

    e0be40f12d3b6dfee674688d514287be2dbedbd114ec37356b610e25996ac9a4

  • SHA512

    2d94d46d43afaa43b7515f06455525008601c77cdf5663e3f28220917d2c8b7a9ca0423a521edac56fb51e45dd6264168db101018ed4e83ccc0d46a123cdd7f1

  • SSDEEP

    393216:wyazqFXFeuBc9Q+FpI3zDuG9YCMeg7kjuABAKbybbF6s5eNYJkY29QEH4k:wyVFXDBYQw23fkkjGKOj5eXPQEYk

Malware Config

Extracted

Family

xworm

Version

5.0

C2

127.0.0.1:7000

Mutex

I5KjeGkFrAlxFhNu

Attributes
  • install_file

    USB.exe

aes.plain

Signatures

  • Contains code to disable Windows Defender 1 IoCs

    A .NET executable tasked with disabling Windows Defender capabilities such as realtime monitoring, blocking at first seen, etc.

  • Detect Xworm Payload 3 IoCs
  • StormKitty

    StormKitty is an open source info stealer written in C#.

  • StormKitty payload 1 IoCs
  • Stormkitty family
  • Xworm

    Xworm is a remote access trojan written in C#.

  • Xworm family
  • Executes dropped EXE 2 IoCs
  • Uses the VBS compiler for execution 1 TTPs
  • Browser Information Discovery 1 TTPs

    Enumerate browser information.

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Enumerates system info in registry 2 TTPs 6 IoCs
  • Modifies registry class 36 IoCs
  • Suspicious behavior: EnumeratesProcesses 35 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs
  • Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 7 IoCs
  • Suspicious use of AdjustPrivilegeToken 4 IoCs
  • Suspicious use of FindShellTrayWindow 29 IoCs
  • Suspicious use of SendNotifyMessage 25 IoCs
  • Suspicious use of SetWindowsHookEx 1 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs
  • Uses Task Scheduler COM API 1 TTPs

    The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.

Processes

  • C:\Program Files\7-Zip\7zFM.exe
    "C:\Program Files\7-Zip\7zFM.exe" "C:\Users\Admin\AppData\Local\Temp\XWorm 5.6 Cracked.zip"
    1⤵
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of FindShellTrayWindow
    PID:2612
  • C:\Windows\System32\rundll32.exe
    C:\Windows\System32\rundll32.exe C:\Windows\System32\shell32.dll,SHCreateLocalServerRunDll {9aa46009-3ce0-458a-a354-715610a075e6} -Embedding
    1⤵
      PID:3324
    • C:\Users\Admin\Desktop\XWorm 5.6 Cracked\[email protected]
      "C:\Users\Admin\Desktop\XWorm 5.6 Cracked\[email protected]"
      1⤵
      • Executes dropped EXE
      • Enumerates system info in registry
      • Modifies registry class
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious behavior: GetForegroundWindowSpam
      • Suspicious use of FindShellTrayWindow
      • Suspicious use of SendNotifyMessage
      • Suspicious use of SetWindowsHookEx
      • Suspicious use of WriteProcessMemory
      PID:4772
      • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
        "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument https://t.me/Toxicvirusmain
        2⤵
        • Enumerates system info in registry
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
        • Suspicious use of FindShellTrayWindow
        • Suspicious use of SendNotifyMessage
        • Suspicious use of WriteProcessMemory
        PID:3200
        • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
          "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0x11c,0x120,0x124,0xf8,0x128,0x7fffa78346f8,0x7fffa7834708,0x7fffa7834718
          3⤵
            PID:2928
          • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
            "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=1984,3591029405226107025,6294582389389775968,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2112 /prefetch:2
            3⤵
              PID:3776
            • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
              "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=1984,3591029405226107025,6294582389389775968,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2184 /prefetch:3
              3⤵
              • Suspicious behavior: EnumeratesProcesses
              PID:2504
            • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
              "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=1984,3591029405226107025,6294582389389775968,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2844 /prefetch:8
              3⤵
                PID:4560
              • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1984,3591029405226107025,6294582389389775968,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3392 /prefetch:1
                3⤵
                  PID:1100
                • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                  "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1984,3591029405226107025,6294582389389775968,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3400 /prefetch:1
                  3⤵
                    PID:728
                  • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                    "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1984,3591029405226107025,6294582389389775968,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5180 /prefetch:1
                    3⤵
                      PID:3148
                    • C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe
                      "C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=1984,3591029405226107025,6294582389389775968,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5368 /prefetch:8
                      3⤵
                        PID:1088
                      • C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe
                        "C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=1984,3591029405226107025,6294582389389775968,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5368 /prefetch:8
                        3⤵
                        • Suspicious behavior: EnumeratesProcesses
                        PID:4912
                      • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                        "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1984,3591029405226107025,6294582389389775968,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5364 /prefetch:1
                        3⤵
                          PID:2496
                        • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                          "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1984,3591029405226107025,6294582389389775968,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5436 /prefetch:1
                          3⤵
                            PID:2340
                          • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                            "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1984,3591029405226107025,6294582389389775968,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5756 /prefetch:1
                            3⤵
                              PID:2752
                            • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                              "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1984,3591029405226107025,6294582389389775968,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5248 /prefetch:1
                              3⤵
                                PID:2516
                            • C:\Windows\Microsoft.NET\Framework64\v4.0.30319\vbc.exe
                              "C:\Windows\Microsoft.NET\Framework64\v4.0.30319\vbc.exe" /noconfig @"C:\Users\Admin\AppData\Local\Temp\irvbaxxi\irvbaxxi.cmdline"
                              2⤵
                                PID:1364
                                • C:\Windows\Microsoft.NET\Framework64\v4.0.30319\cvtres.exe
                                  C:\Windows\Microsoft.NET\Framework64\v4.0.30319\cvtres.exe /NOLOGO /READONLY /MACHINE:IX86 "/OUT:C:\Users\Admin\AppData\Local\Temp\RESF1B9.tmp" "C:\Users\Admin\AppData\Local\Temp\vbc79EDA1B03BF248D39C4A2CBEEFEBACA2.TMP"
                                  3⤵
                                    PID:2612
                              • C:\Windows\System32\CompPkgSrv.exe
                                C:\Windows\System32\CompPkgSrv.exe -Embedding
                                1⤵
                                  PID:1112
                                • C:\Windows\System32\CompPkgSrv.exe
                                  C:\Windows\System32\CompPkgSrv.exe -Embedding
                                  1⤵
                                    PID:4304
                                  • C:\Windows\system32\wbem\WmiApSrv.exe
                                    C:\Windows\system32\wbem\WmiApSrv.exe
                                    1⤵
                                      PID:6104
                                    • C:\Users\Admin\Desktop\XWorm 5.6 Cracked\XClient.exe
                                      "C:\Users\Admin\Desktop\XWorm 5.6 Cracked\XClient.exe"
                                      1⤵
                                      • Executes dropped EXE
                                      • Suspicious use of AdjustPrivilegeToken
                                      PID:5500

                                    Network

                                    MITRE ATT&CK Enterprise v15

                                    Replay Monitor

                                    Loading Replay Monitor...

                                    Downloads

                                    • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad\settings.dat

                                      Filesize

                                      152B

                                      MD5

                                      c2d9eeb3fdd75834f0ac3f9767de8d6f

                                      SHA1

                                      4d16a7e82190f8490a00008bd53d85fb92e379b0

                                      SHA256

                                      1e5efb5f1d78a4cc269cb116307e9d767fc5ad8a18e6cf95c81c61d7b1da5c66

                                      SHA512

                                      d92f995f9e096ecc0a7b8b4aca336aeef0e7b919fe7fe008169f0b87da84d018971ba5728141557d42a0fc562a25191bd85e0d7354c401b09e8b62cdc44b6dcd

                                    • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad\settings.dat

                                      Filesize

                                      152B

                                      MD5

                                      e55832d7cd7e868a2c087c4c73678018

                                      SHA1

                                      ed7a2f6d6437e907218ffba9128802eaf414a0eb

                                      SHA256

                                      a4d7777b980ec53de3a70aca8fb25b77e9b53187e7d2f0fa1a729ee9a35da574

                                      SHA512

                                      897fdebf1a9269a1bf1e3a791f6ee9ab7c24c9d75eeff65ac9599764e1c8585784e1837ba5321d90af0b004af121b2206081a6fb1b1ad571a0051ee33d3f5c5f

                                    • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index

                                      Filesize

                                      72B

                                      MD5

                                      6454aad876e35bf22587326171864265

                                      SHA1

                                      4f90dd59a386dbb908a5eead45eecb14ce37cb77

                                      SHA256

                                      e61ccb2e830f39acc40319a239d3d18c7a5f32ba0c993b96122398dbba7079d7

                                      SHA512

                                      8c6efd1f021cdbd3994be83049e7ccbbdf2e0b94673bb822e85a6217d2d9ddabca3e349e50ecaa76a454f1d3d19b63aeb7a0725570cc64c73a3f4950f41ace43

                                    • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Network Persistent State

                                      Filesize

                                      442B

                                      MD5

                                      b0a03313f7412de8efaf3893371326d0

                                      SHA1

                                      30686315103008d52a51743c46a34c3de1807ee4

                                      SHA256

                                      c1d48d84701d5b99c0a080bbf790061b8b92622d913bddcc10e42492a6e3d2ef

                                      SHA512

                                      713fd2abcb5f95f0995e7afe6a975ddae1f09a84262a8ad924b8bf208a9072bf164a204a898b16eb240d003aed2bc4baaf8bf8ac2414701437cb082d1bb4a4cb

                                    • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Preferences

                                      Filesize

                                      6KB

                                      MD5

                                      bf7ebb609a96490b25f02e48eade2f4a

                                      SHA1

                                      3eabec1bcf6cfe717418d1df91d76f5959c1c43f

                                      SHA256

                                      4cf747e5b14b7a004a5d7e1af8b0063ddffaa74c7bb89c7ed71b80ba21269d28

                                      SHA512

                                      4d0cd36c22f850876c83ba7a9690c32eb76f0aa21fd04e0163efe301e1f760311479be61ebffbff87a8615366b0fea4eb61f77bc60091576fc58071743795245

                                    • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Preferences

                                      Filesize

                                      5KB

                                      MD5

                                      76f8e289f945f71b7c642c6db75518a1

                                      SHA1

                                      d64f3dd8d0a7a36a1e4e23ca7e0e181866074b15

                                      SHA256

                                      b1667ed48a8790c9be48f176f8c5a19a498e47ea41787c1f5a9f32ca3ac485d6

                                      SHA512

                                      c565007a1eb65970973eae44cdffae77eb1697c2672f78fcdaecef7850ce3d2d70b1ebfe3656e262af747ba8222a7481db0a5461dae2e4007075331ec9be0b65

                                    • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Preferences

                                      Filesize

                                      6KB

                                      MD5

                                      f8db921b67e6fad415b74c1fca5480d1

                                      SHA1

                                      511786a3314c69fba44050dd6a585f4f0560c2b2

                                      SHA256

                                      0e38089b34a939ac3e40d32690159b8f97e5c6a8b82f1ebd8dbfd444dbe2db1b

                                      SHA512

                                      caa2f799d2fafbd5017add35507f8e83a0d7470ea0c0c9bf77396e78fd38a405fc0add40f7d19d98fc49fca935716d9f5c7ba75c83b49d3a6a3f878ec3f6eab5

                                    • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\data_reduction_proxy_leveldb\CURRENT

                                      Filesize

                                      16B

                                      MD5

                                      6752a1d65b201c13b62ea44016eb221f

                                      SHA1

                                      58ecf154d01a62233ed7fb494ace3c3d4ffce08b

                                      SHA256

                                      0861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd

                                      SHA512

                                      9cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389

                                    • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Local State

                                      Filesize

                                      11KB

                                      MD5

                                      e2900892ee6277e6be2eca2a2117c6df

                                      SHA1

                                      10b2b263a28f80a2fb47674be0ea08bb8527dcca

                                      SHA256

                                      df3d75402b4a100cf6030d4b76d290fa8614e6ef553140115300fa364955e16c

                                      SHA512

                                      38387d5e7286ef0b9c2958891bd4d4158835dc7d2f0921d9477363608abca4844c72e4f24518032361e9c3fe5d7d2198ba02c74c53d41c19cca2b4c9843c3012

                                    • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Local State

                                      Filesize

                                      11KB

                                      MD5

                                      8793a175d89b43fb2316b6f3c32affb3

                                      SHA1

                                      9ab5e18a9949ab2cf196843cf2ac79c6e853dddf

                                      SHA256

                                      4af8bb027316dba04f891efd055758eb4f59afe7864ce4fefc21d41b9998a525

                                      SHA512

                                      be62d7d9a48f42c071c0ddf3e113215017f4ab7d66fcfa8ff3a4a0afdfc305cea0c569576b247a5caf7683e480da5122783650f4efbe1086d6a036fecf2287dd

                                    • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Local State

                                      Filesize

                                      10KB

                                      MD5

                                      3dc25718731376fc38931e3f025e9ea8

                                      SHA1

                                      ce5dc9065c0234b5478969b5670c507b94066837

                                      SHA256

                                      56d80f16068f03c28ba6d8bd532186f20a40c7f5601e2c772cb3db7cbe25851e

                                      SHA512

                                      478822707eec2e01528167f518ae327b679f9b81b7769a9458d7046b1666dddc9a5c21149c817a57a2e6aed8735e291c66c46320189ff3738a55829b8c969f54

                                    • C:\Users\Admin\AppData\Local\Temp\7zE43A05BB7\XWorm 5.6 Cracked\Icons\icon (15).ico

                                      Filesize

                                      361KB

                                      MD5

                                      e3143e8c70427a56dac73a808cba0c79

                                      SHA1

                                      63556c7ad9e778d5bd9092f834b5cc751e419d16

                                      SHA256

                                      b2f57a23ecc789c1bbf6037ac0825bf98babc7bf0c5d438af5e2767a27a79188

                                      SHA512

                                      74e0f4b55625df86a87b9315e4007be8e05bbecca4346a6ea06ef5b1528acb5a8bb636ef3e599a3820dbddcf69563a0a22e2c1062c965544fd75ec96fd9803fc

                                    • C:\Users\Admin\AppData\Local\Temp\RESF1B9.tmp

                                      Filesize

                                      1KB

                                      MD5

                                      be6d8f43b90516615863db281b5fe08d

                                      SHA1

                                      5b4e42a08c5d151b0081712c1f0c44f879865319

                                      SHA256

                                      5139cf422427fe927eaea7da26c144db64875747ed10186509ce673ed4adeec9

                                      SHA512

                                      1b41b224952d285c85cc527fa45357ecaf24b73affd406b27663e5d4fbaa1dedb363f191c0c95f4c0ee214328fc7ff247d722f5c86d284a875af883cccc3b332

                                    • C:\Users\Admin\AppData\Local\Temp\irvbaxxi\irvbaxxi.0.vb

                                      Filesize

                                      78KB

                                      MD5

                                      d0afbf361d9abc8842ead51595b55eaa

                                      SHA1

                                      f2194e4dce986de0104c452ba3560537cf1fc270

                                      SHA256

                                      5a40db2e4a85920adb4819772c6ba263f51865cac982dc25aec651ce12699f98

                                      SHA512

                                      0beabe2f09175cfe8f3fd7145903957c084ed68ff161c7c94ac97f22e8097e1f31f92f655c9dce8f4f6759961512cad07246d378cba7be0751ce19afd4e3dc62

                                    • C:\Users\Admin\AppData\Local\Temp\irvbaxxi\irvbaxxi.cmdline

                                      Filesize

                                      308B

                                      MD5

                                      4bb62a36b045cf18bc19bd30ce837c6e

                                      SHA1

                                      8a1b1c44e217946ad352a6fbd240284b128f96ca

                                      SHA256

                                      e9b92f112f326f41c0c8161a97c98d4213d3782202ed7e18d787b58ad52b86a2

                                      SHA512

                                      0e59813a47bc58e65bd78f34ba36ee87579d306e37d693c0a1617ee8993819999e96ddc62031a22167e576b8edbb1a3533fa10e147d0202b584e07df28fd48d4

                                    • C:\Users\Admin\AppData\Local\Temp\vbc79EDA1B03BF248D39C4A2CBEEFEBACA2.TMP

                                      Filesize

                                      1KB

                                      MD5

                                      d40c58bd46211e4ffcbfbdfac7c2bb69

                                      SHA1

                                      c5cf88224acc284a4e81bd612369f0e39f3ac604

                                      SHA256

                                      01902f1903d080c6632ae2209136e8e713e9fd408db4621ae21246b65bfea2ca

                                      SHA512

                                      48b14748e86b7d92a3ea18f29caf1d7b4b2e1de75377012378d146575048a2531d2e5aaeae1abf2d322d06146177cdbf0c2940ac023efae007b9f235f18e2c68

                                    • C:\Users\Admin\Desktop\XWorm 5.6 Cracked\GMap.NET.Core.dll

                                      Filesize

                                      2.9MB

                                      MD5

                                      819352ea9e832d24fc4cebb2757a462b

                                      SHA1

                                      aba7e1b29bdcd0c5a307087b55c2ec0c7ca81f11

                                      SHA256

                                      58c755fcfc65cddea561023d736e8991f0ad69da5e1378dea59e98c5db901b86

                                      SHA512

                                      6a5b0e1553616ea29ec72c12072ae05bdd709468a173e8adbdfe391b072c001ecacb3dd879845f8d599c6152eca2530cdaa2c069b1f94294f778158eaaebe45a

                                    • C:\Users\Admin\Desktop\XWorm 5.6 Cracked\GMap.NET.WindowsForms.dll

                                      Filesize

                                      147KB

                                      MD5

                                      32a8742009ffdfd68b46fe8fd4794386

                                      SHA1

                                      de18190d77ae094b03d357abfa4a465058cd54e3

                                      SHA256

                                      741e1a8f05863856a25d101bd35bf97cba0b637f0c04ecb432c1d85a78ef1365

                                      SHA512

                                      22418d5e887a6022abe8a7cbb0b6917a7478d468d211eecd03a95b8fb6452fc59db5178573e25d5d449968ead26bb0b2bfbfada7043c9a7a1796baca5235a82b

                                    • C:\Users\Admin\Desktop\XWorm 5.6 Cracked\GeoIP.dat

                                      Filesize

                                      1.2MB

                                      MD5

                                      8ef41798df108ce9bd41382c9721b1c9

                                      SHA1

                                      1e6227635a12039f4d380531b032bf773f0e6de0

                                      SHA256

                                      bc07ff22d4ee0b6fafcc12482ecf2981c172a672194c647cedf9b4d215ad9740

                                      SHA512

                                      4c62af04d4a141b94eb3e1b0dbf3669cb53fe9b942072ed7bea6a848d87d8994cff5a5f639ab70f424eb79a4b7adabdde4da6d2f02f995bd8d55db23ce99f01b

                                    • C:\Users\Admin\Desktop\XWorm 5.6 Cracked\Guna.UI2.dll

                                      Filesize

                                      1.9MB

                                      MD5

                                      bcc0fe2b28edd2da651388f84599059b

                                      SHA1

                                      44d7756708aafa08730ca9dbdc01091790940a4f

                                      SHA256

                                      c6264665a882e73eb2262a74fea2c29b1921a9af33180126325fb67a851310ef

                                      SHA512

                                      3bfc3d27c095dde988f779021d0479c8c1de80a404454813c6cae663e3fe63dc636bffa7de1094e18594c9d608fa7420a0651509544722f2a00288f0b7719cc8

                                    • C:\Users\Admin\Desktop\XWorm 5.6 Cracked\NAudio.dll

                                      Filesize

                                      502KB

                                      MD5

                                      3b87d1363a45ce9368e9baec32c69466

                                      SHA1

                                      70a9f4df01d17060ec17df9528fca7026cc42935

                                      SHA256

                                      81b3f1dc3f1eac9762b8a292751a44b64b87d0d4c3982debfdd2621012186451

                                      SHA512

                                      1f07d3b041763b4bc31f6bd7b181deb8d34ff66ec666193932ffc460371adbcd4451483a99009b9b0b71f3864ed5c15c6c3b3777fabeb76f9918c726c35eb7d7

                                    • C:\Users\Admin\Desktop\XWorm 5.6 Cracked\Newtonsoft.Json.dll

                                      Filesize

                                      695KB

                                      MD5

                                      195ffb7167db3219b217c4fd439eedd6

                                      SHA1

                                      1e76e6099570ede620b76ed47cf8d03a936d49f8

                                      SHA256

                                      e1e27af7b07eeedf5ce71a9255f0422816a6fc5849a483c6714e1b472044fa9d

                                      SHA512

                                      56eb7f070929b239642dab729537dde2c2287bdb852ad9e80b5358c74b14bc2b2dded910d0e3b6304ea27eb587e5f19db0a92e1cbae6a70fb20b4ef05057e4ac

                                    • C:\Users\Admin\Desktop\XWorm 5.6 Cracked\Plugins\ActiveWindows.dll

                                      Filesize

                                      14KB

                                      MD5

                                      5a766a4991515011983ceddf7714b70b

                                      SHA1

                                      4eb00ae7fe780fa4fe94cedbf6052983f5fd138b

                                      SHA256

                                      567b9861026a0dbc5947e7515dc7ab3f496153f6b3db57c27238129ec207fc52

                                      SHA512

                                      4bd6b24e236387ff58631207ea42cd09293c3664468e72cd887de3b3b912d3795a22a98dcf4548fb339444337722a81f8877abb22177606d765d78e48ec01fd8

                                    • C:\Users\Admin\Desktop\XWorm 5.6 Cracked\Plugins\Chat.dll

                                      Filesize

                                      18KB

                                      MD5

                                      59f75c7ffaccf9878a9d39e224a65adf

                                      SHA1

                                      46b0f61a07e85e3b54b728d9d7142ddc73c9d74b

                                      SHA256

                                      aab20f465955d77d6ec3b5c1c5f64402a925fb565dda5c8e38c296cb7406e492

                                      SHA512

                                      80056163b96ce7a8877874eaae559f75217c0a04b3e3d4c1283fe23badfc95fe4d587fd27127db4be459b8a3adf41900135ea12b0eeb4187adbcf796d9505cb8

                                    • C:\Users\Admin\Desktop\XWorm 5.6 Cracked\Plugins\Chromium.dll

                                      Filesize

                                      32KB

                                      MD5

                                      edb2f0d0eb08dcd78b3ddf87a847de01

                                      SHA1

                                      cc23d101f917cad3664f8c1fa0788a89e03a669c

                                      SHA256

                                      b6d8bccdf123ceac6b9642ad3500d4e0b3d30b9c9dd2d29499d38c02bd8f9982

                                      SHA512

                                      8f87da834649a21a908c95a9ea8e2d94726bd9f33d4b7786348f6371dfae983cc2b5b5d4f80a17a60ded17d4eb71771ec25a7c82e4f3a90273c46c8ee3b8f2c3

                                    • C:\Users\Admin\Desktop\XWorm 5.6 Cracked\Plugins\Clipboard.dll

                                      Filesize

                                      14KB

                                      MD5

                                      831eb0de839fc13de0abab64fe1e06e7

                                      SHA1

                                      53aad63a8b6fc9e35c814c55be9992abc92a1b54

                                      SHA256

                                      e31a1c2b1baa2aa2c36cabe3da17cd767c8fec4c206bd506e889341e5e0fa959

                                      SHA512

                                      2f61bcf972671d96e036b3c99546cd01e067bef15751a87c00ba6d656decb6b69a628415e5363e650b55610cf9f237585ada7ce51523e6efc0e27d7338966bee

                                    • C:\Users\Admin\Desktop\XWorm 5.6 Cracked\Plugins\Cmstp-Bypass.dll

                                      Filesize

                                      11KB

                                      MD5

                                      cf15259e22b58a0dfd1156ab71cbd690

                                      SHA1

                                      3614f4e469d28d6e65471099e2d45c8e28a7a49e

                                      SHA256

                                      fa420fd3d1a5a2bb813ef8e6063480099f19091e8fa1b3389004c1ac559e806b

                                      SHA512

                                      7302a424ed62ec20be85282ff545a4ca9e1aecfe20c45630b294c1ae72732465d8298537ee923d9e288ae0c48328e52ad8a1a503e549f8f8737fabe2e6e9ad38

                                    • C:\Users\Admin\Desktop\XWorm 5.6 Cracked\Plugins\FileManager.dll

                                      Filesize

                                      679KB

                                      MD5

                                      641a8b61cb468359b1346a0891d65b59

                                      SHA1

                                      2cdc49bcd7428fe778a94cdcd19cabf5ece8c9c0

                                      SHA256

                                      b58ed3ebbcd27c7f4b173819528ff4db562b90475a5e304521ed5c564d39fffd

                                      SHA512

                                      042702d34664ea6288e891c9f7aa10a5b4b07317f25f82d6c9fa9ba9b98645c14073d0f66637060b416a30c58dec907d9383530320a318523c51f19ebd0a4fee

                                    • C:\Users\Admin\Desktop\XWorm 5.6 Cracked\Plugins\FilesSearcher.dll

                                      Filesize

                                      478KB

                                      MD5

                                      6f8f1621c16ac0976600146d2217e9d2

                                      SHA1

                                      b6aa233b93aae0a17ee8787576bf0fbc05cedde4

                                      SHA256

                                      e66e1273dc59ee9e05ce3e02f1b760b18dd296a47d92b3ce5b24efb48e5fb21b

                                      SHA512

                                      eb55acdea8648c8cdefee892758d9585ff81502fc7037d5814e1bd01fee0431f4dde0a4b04ccb2b0917e1b11588f2dc9f0bfe750117137a01bbd0c508f43ef6a

                                    • C:\Users\Admin\Desktop\XWorm 5.6 Cracked\Plugins\HBrowser.dll

                                      Filesize

                                      25KB

                                      MD5

                                      f0e921f2f850b7ec094036d20ff9be9b

                                      SHA1

                                      3b2d76d06470580858cc572257491e32d4b021c0

                                      SHA256

                                      75e8ff57fa6d95cf4d8405bffebb2b9b1c55a0abba0fe345f55b8f0e88be6f3c

                                      SHA512

                                      16028ae56cd1d78d5cb63c554155ae02804aac3f15c0d91a771b0dcd5c8df710f39481f6545ca6410b7cd9240ec77090f65e3379dcfe09f161a3dff6aec649f3

                                    • C:\Users\Admin\Desktop\XWorm 5.6 Cracked\Plugins\HRDP.dll

                                      Filesize

                                      1.7MB

                                      MD5

                                      f27b6e8cf5afa8771c679b7a79e11a08

                                      SHA1

                                      6c3fcf45e35aaf6b747f29a06108093c284100da

                                      SHA256

                                      4aa18745a5fddf7ec14adaff3ad1b4df1b910f4b6710bf55eb27fb3942bb67de

                                      SHA512

                                      0d84966bbc9290b04d2148082563675ec023906d58f5ba6861c20542271bf11be196d6ab24e48372f339438204bd5c198297da98a19fddb25a3df727b5aafa33

                                    • C:\Users\Admin\Desktop\XWorm 5.6 Cracked\Plugins\HVNC.dll

                                      Filesize

                                      58KB

                                      MD5

                                      30eb33588670191b4e74a0a05eecf191

                                      SHA1

                                      08760620ef080bb75c253ba80e97322c187a6b9f

                                      SHA256

                                      3a287acb1c89692f2c18596dd4405089ac998bb9cf44dd225e5211923d421e96

                                      SHA512

                                      820cca77096ff2eea8e459a848f7127dc46af2e5f42f43b2b7375be6f4778c1b0e34e4aa5a97f7fbabe0b53dcd351d09c231bb9afedf7bcec60d949918a06b97

                                    • C:\Users\Admin\Desktop\XWorm 5.6 Cracked\Plugins\HVNCMemory.dll

                                      Filesize

                                      39KB

                                      MD5

                                      065f0830d1e36f8f44702b0f567082e8

                                      SHA1

                                      724c33558fcc8ecd86ee56335e8f6eb5bfeac0db

                                      SHA256

                                      285b462e3cd4a5b207315ad33ee6965a8b98ca58abb8d16882e4bc2d758ff1a4

                                      SHA512

                                      bac0148e1b78a8fde242697bff1bbe10a18ffab85fdced062de3dc5017cd77f0d54d8096e273523b8a3910fe17fac111724acffa5bec30e4d81b7b3bd312d545

                                    • C:\Users\Admin\Desktop\XWorm 5.6 Cracked\Plugins\HiddenApps.dll

                                      Filesize

                                      45KB

                                      MD5

                                      ba2141a7aefa1a80e2091bf7c2ca72db

                                      SHA1

                                      9047b546ce9c0ea2c36d24a10eb31516a24a047d

                                      SHA256

                                      6a098f5a7f9328b35d73ee232846b13e2d587d47f473cbc9b3f1d74def7086ea

                                      SHA512

                                      91e43620e5717b699e34e658d6af49bba200dcf91ac0c9a0f237ec44666b57117a13bc8674895b7a9cac5a17b2f91cdc3daa5bcc52c43edbabd19bc1ed63038c

                                    • C:\Users\Admin\Desktop\XWorm 5.6 Cracked\Plugins\Informations.dll

                                      Filesize

                                      22KB

                                      MD5

                                      67a884eeb9bd025a1ef69c8964b6d86f

                                      SHA1

                                      97e00d3687703b1d7cc0939e45f8232016d009d9

                                      SHA256

                                      cba453460be46cfa705817abbe181f9bf65dca6b6cea1ad31629aa08dbeaf72b

                                      SHA512

                                      52e852021a1639868e61d2bd1e8f14b9c410c16bfca584bf70ae9e71da78829c1cada87d481e55386eec25646f84bb9f3baee3b5009d56bcbb3be4e06ffa0ae7

                                    • C:\Users\Admin\Desktop\XWorm 5.6 Cracked\Plugins\Keylogger.dll

                                      Filesize

                                      17KB

                                      MD5

                                      246f7916c4f21e98f22cb86587acb334

                                      SHA1

                                      b898523ed4db6612c79aad49fbd74f71ecdbd461

                                      SHA256

                                      acfe5c3aa2a3bae3437ead42e90044d7eee972ead25c1f7486bea4a23c201d3a

                                      SHA512

                                      1c256ca9b9857e6d393461b55e53175b7b0d88d8f3566fd457f2b3a4f241cb91c9207d54d8b0867ea0abd3577d127835beb13157c3e5df5c2b2b34b3339bd15d

                                    • C:\Users\Admin\Desktop\XWorm 5.6 Cracked\Plugins\Maps.dll

                                      Filesize

                                      15KB

                                      MD5

                                      806c3802bfd7a97db07c99a5c2918198

                                      SHA1

                                      088393a9d96f0491e3e1cf6589f612aa5e1df5f8

                                      SHA256

                                      34b532a4d0560e26b0d5b81407befdc2424aacc9ef56e8b13de8ad0f4b3f1ab6

                                      SHA512

                                      ed164822297accd3717b4d8e3927f0c736c060bb7ec5d99d842498b63f74d0400c396575e9fa664ad36ae8d4285cfd91e225423a0c77a612912d66ea9f63356c

                                    • C:\Users\Admin\Desktop\XWorm 5.6 Cracked\Plugins\MessageBox.dll

                                      Filesize

                                      14KB

                                      MD5

                                      7db8b7e15194fa60ffed768b6cf948c2

                                      SHA1

                                      3de1b56cc550411c58cd1ad7ba845f3269559b5c

                                      SHA256

                                      bc09b671894c9a36f4eca45dd6fbf958a967acea9e85b66c38a319387b90dd29

                                      SHA512

                                      e7f5430b0d46f133dc9616f9eeae8fb42f07a8a4a18b927dd7497de29451086629dfc5e63c0b2a60a4603d8421c6570967c5dbde498bb480aef353b3ed8e18a1

                                    • C:\Users\Admin\Desktop\XWorm 5.6 Cracked\Plugins\Microphone.dll

                                      Filesize

                                      540KB

                                      MD5

                                      9c3d90ccf5d47f6eef83542bd08d5aeb

                                      SHA1

                                      0c0aa80c3411f98e8db7a165e39484e8dae424c7

                                      SHA256

                                      612898afdf9120cfef5843f9b136c66ecc3e0bb6f3d1527d0599a11988b7783c

                                      SHA512

                                      0786f802fbd24d4ab79651298a5ba042c275d7d01c6ac2c9b3ca1e4ee952de7676ec8abf68d226b72696e9480bd4d4615077163efbcda7cff6a5f717736cbdfe

                                    • C:\Users\Admin\Desktop\XWorm 5.6 Cracked\Plugins\Ngrok-Installer.dll

                                      Filesize

                                      400KB

                                      MD5

                                      3e19341a940638536b4a7891d5b2b777

                                      SHA1

                                      ca6f5b28e2e54f3f86fd9f45a792a868c82e35b5

                                      SHA256

                                      b574aabf02a65aa3b6f7bfff0a574873ce96429d3f708a10f87bc1f6518f14aa

                                      SHA512

                                      06639892ea4a27c8840872b0de450ae1a0dac61e1dcb64523973c629580323b723c0e9074ff2ddf9a67a8a6d45473432ffc4a1736c0ddc74e054ae13b774f3e2

                                    • C:\Users\Admin\Desktop\XWorm 5.6 Cracked\Plugins\Options.dll

                                      Filesize

                                      30KB

                                      MD5

                                      97193fc4c016c228ae0535772a01051d

                                      SHA1

                                      f2f6d56d468329b1e9a91a3503376e4a6a4d5541

                                      SHA256

                                      5c34aee5196e0f8615b8d1d9017dd710ea28d2b7ac99295d46046d12eea58d78

                                      SHA512

                                      9f6d7da779e8c9d7307f716d4a4453982bb7f090c35947850f13ec3c9472f058fc11e1120a9641326970b9846d3c691e0c2afd430c12e5e8f30abadb5dcf5ed2

                                    • C:\Users\Admin\Desktop\XWorm 5.6 Cracked\Plugins\Pastime.dll

                                      Filesize

                                      17KB

                                      MD5

                                      6430ab4458a703fb97be77d6bea74f5b

                                      SHA1

                                      59786b619243d4e00d82b0a3b7e9deb6c71b283c

                                      SHA256

                                      a46787527ac34cd71d96226ddfc0a06370b61e4ad0267105be2aec8d82e984c1

                                      SHA512

                                      7b6cf7a613671826330e7f8daddc4c7c37b4d191cf4938c1f5b0fb7b467b28a23fb56e412dc82192595cfa9d5b552668ef0aaa938c8ae166029a610b246d3ecc

                                    • C:\Users\Admin\Desktop\XWorm 5.6 Cracked\Plugins\Performance.dll

                                      Filesize

                                      16KB

                                      MD5

                                      1841c479da7efd24521579053efcf440

                                      SHA1

                                      0aacfd06c7223b988584a381cb10d6c3f462fc6a

                                      SHA256

                                      043b6a0284468934582819996dbaa70b863ab4caa4f968c81c39a33b2ac81735

                                      SHA512

                                      3005e45728162cc04914e40a3b87a1c6fc7ffde5988d9ff382d388e9de4862899b3390567c6b7d54f0ec02283bf64bcd5529319ca32295c109a7420848fa3487

                                    • C:\Users\Admin\Desktop\XWorm 5.6 Cracked\Plugins\ProcessManager.dll

                                      Filesize

                                      19KB

                                      MD5

                                      3d4ec14005a25a4cb05b1aa679cf22bf

                                      SHA1

                                      6f4a827d94ad020bc23fbd04b7d8ca2995267094

                                      SHA256

                                      7cf1921a5f8429b2b9e8197de195cfae2353fe0d8cb98e563bdf1e782fe2ee4e

                                      SHA512

                                      0ee72d345d5431c7a6ffc71cf5e37938b93fd346e5a4746f5967f1aa2b69c34ca4ba0d0abd867778d8ca60b56f01e2d7fc5e7cf7c5a39a92015d4df2d68e382e

                                    • C:\Users\Admin\Desktop\XWorm 5.6 Cracked\Plugins\Programs.dll

                                      Filesize

                                      13KB

                                      MD5

                                      a6734a047b0b57055807a4f33a80d4dd

                                      SHA1

                                      0b3a78b2362b0fd3817770fdc6dd070e3305615c

                                      SHA256

                                      953a8276faa4a18685d09cd9187ed3e409e3cccd7daf34b6097f1eb8d96125a4

                                      SHA512

                                      7292eab25f0e340e78063f32961eff16bb51895ad46cfd09933c0c30e3315129945d111a877a191fc261ad690ad6b02e1f2cabc4ff2fdac962ee272b41dd6dfa

                                    • C:\Users\Admin\Desktop\XWorm 5.6 Cracked\Plugins\Ransomware.dll

                                      Filesize

                                      20KB

                                      MD5

                                      ccc9ea43ead4aa754b91e2039fe0ac1c

                                      SHA1

                                      f382635559045ac1aeb1368d74e6b5c6e98e6a48

                                      SHA256

                                      14c2bbccdabb8408395d636b44b99de4b16db2e6bf35181cb71e7be516d83ad9

                                      SHA512

                                      5d05254ba5cd7b1967a84d5b0e6fd23c54766474fb8660a001bf3d21a3f5c8c20fcdb830fb8659a90da96655e6ee818ceefb6afa610cc853b7fba84bb9db4413

                                    • C:\Users\Admin\Desktop\XWorm 5.6 Cracked\Plugins\Recovery.dll

                                      Filesize

                                      1.1MB

                                      MD5

                                      776193701a2ed869b5f1b6e71970a0ac

                                      SHA1

                                      2f973458531aaa283cdc835af4e24f5f709cbad1

                                      SHA256

                                      66dbe3b90371fe58caa957e83c1c1f0acce941a36cf140a0f07e64403dd13303

                                      SHA512

                                      a41f981c861e8d40487a9cd0863f9055165427e10580548e972a47ef47cf3e777aab2df70dc6f464cc3077860e86eda7462e9754f9047a1ecc0ed9721663aeb9

                                    • C:\Users\Admin\Desktop\XWorm 5.6 Cracked\Plugins\Regedit.dll

                                      Filesize

                                      15KB

                                      MD5

                                      53a2cfe273c311b64cf5eaca62f8c2fd

                                      SHA1

                                      4ec95ec4777a0c5b4acde57a3490e1c139a8f648

                                      SHA256

                                      2f73dc0f3074848575c0408e02079fd32b7497f8816222ae3ce8c63725a62fe6

                                      SHA512

                                      992b37d92157ae70a106a9835de46a4ac156341208cfe7fb0477dc5fc3bc9ddae71b35e2336fc5c181630bac165267b7229f97be436912dfd9526a020d012948

                                    • C:\Users\Admin\Desktop\XWorm 5.6 Cracked\Plugins\RemoteDesktop.dll

                                      Filesize

                                      18KB

                                      MD5

                                      e6367d31cf5d16b1439b86ae6b7b31c3

                                      SHA1

                                      f52f1e73614f2cec66dab6af862bdcb5d4d9cf35

                                      SHA256

                                      cc52384910cee944ddbcc575a8e0177bfa6b16e3032438b207797164d5c94b34

                                      SHA512

                                      8bc78a9b62f4226be146144684dc7fcd085bcf4d3d0558cb662aacc143d1438b7454e8ac70ca83ebeedc2a0fcea38ad8e77a5d926a85254b5a7d420a5605538a

                                    • C:\Users\Admin\Desktop\XWorm 5.6 Cracked\Plugins\ReverseProxy.dll

                                      Filesize

                                      16KB

                                      MD5

                                      a22d11379e413cf832b3943ce46f2463

                                      SHA1

                                      99b9552e8a25bff29678aff828901edbc23eaba5

                                      SHA256

                                      8c4efe2c8702141ffa8ff8f55d248dc4220231ae8d12ecea1f22906a9285b32b

                                      SHA512

                                      cc1eccb29135acd35804b44f73447bd8dedc8ea085dee3670cf49120baa905aa7ca512c14a3f4df6aeb5a70347bd214865f9dc8b709a00abbb0c745164d87074

                                    • C:\Users\Admin\Desktop\XWorm 5.6 Cracked\Plugins\RunPE.dll

                                      Filesize

                                      11KB

                                      MD5

                                      224be01635cff2dca827fbdeaddb983c

                                      SHA1

                                      11fa00c5e172c9cd1c81acaef52934f785f91374

                                      SHA256

                                      7adfe849345edd76aa975b0647fed2ccaa5f4a6aaf7d55f488af939c0dbef153

                                      SHA512

                                      1a4915b7b21e8166a6ddb6460c77e02c306a460c08fc7ee574832b0576c827db343eda9533959298819ee443790769328ad580fc67fe4817110b63d49248c736

                                    • C:\Users\Admin\Desktop\XWorm 5.6 Cracked\Plugins\ServiceManager.dll

                                      Filesize

                                      14KB

                                      MD5

                                      2e5f127cb0a69cdd46aa4fd9e603f982

                                      SHA1

                                      994a6ab276c417301ed9208aaaf6719bf9594bc6

                                      SHA256

                                      c552d11db168a4f64db584283a617a6ec51ab6095c20ba4b706c3138beb68a22

                                      SHA512

                                      4455cb3b9d4a9c69abec7180e9a60e16e6be0ae2290f48aa09c5d926370de5512ced4d37b6e6e49515d5f51999211eff6f751c4594db936882fb7f40ee5bf97e

                                    • C:\Users\Admin\Desktop\XWorm 5.6 Cracked\Plugins\Shell.dll

                                      Filesize

                                      14KB

                                      MD5

                                      04609b39e656e297db73be0d02c7e35e

                                      SHA1

                                      f8abd484e7703a4d9629b033e8ec39c82eaf4654

                                      SHA256

                                      6c69b4d45638097e31169d94914e4acb6a8cc7f46788ffa4f241e4c1efb213bb

                                      SHA512

                                      11a88d55497fedeeb05b146ebd3135755aeb08c4596e9379eec83501e734aa6ba926d9bbda1c5f50e361836d65ea88d2c018f0b4b4b668c82ff2163730eaaf27

                                    • C:\Users\Admin\Desktop\XWorm 5.6 Cracked\Plugins\StartupManager.dll

                                      Filesize

                                      188KB

                                      MD5

                                      3d76ef15ab712b93eabd4b68ea0111d5

                                      SHA1

                                      0f309663fae17c4ccae983e1fabb16a1e5f77d9b

                                      SHA256

                                      1802e16379d96021fee05f583633c8091bb669350b7d32064179a8944d45a5a6

                                      SHA512

                                      6c0d0291abb696bee33b6e42392b07028c82bcffc8fb7934ba234f178f011ab14fde38cdccb322c8dba058ae66fc023349de5db1c587d3417709bf263cfd28f3

                                    • C:\Users\Admin\Desktop\XWorm 5.6 Cracked\SimpleObfuscator.dll

                                      Filesize

                                      1.4MB

                                      MD5

                                      9043d712208178c33ba8e942834ce457

                                      SHA1

                                      e0fa5c730bf127a33348f5d2a5673260ae3719d1

                                      SHA256

                                      b7a6eea19188b987dad97b32d774107e9a1beb4f461a654a00197d73f7fad54c

                                      SHA512

                                      dd6fa02ab70c58cde75fd4d4714e0ed0df5d3b18f737c68c93dba40c30376cc93957f8eef69fea86041489546ce4239b35a3b5d639472fd54b80f2f7260c8f65

                                    • C:\Users\Admin\Desktop\XWorm 5.6 Cracked\XClient.exe

                                      Filesize

                                      32KB

                                      MD5

                                      d75c4059048b412ca8b12258c468e893

                                      SHA1

                                      23b33f87906ccd66c31e27fe1ad09f5cb57d6bcd

                                      SHA256

                                      c7cdc1a9f8b633337da287d4ec8dc2f477c7cfcda120b6d81cded867aceba81a

                                      SHA512

                                      c64592514b46c714c2e493e5fa1e5a3ffb83e5c1d124311ec5cb4fdfae677b91c59efef4f618fbc9b1567a196819a6293013cd413d7ff01c4bdfe4b1f15a76b7

                                    • C:\Users\Admin\Desktop\XWorm 5.6 Cracked\[email protected]

                                      Filesize

                                      14.6MB

                                      MD5

                                      fc56e4f2fb861658d0834fd2c0d07961

                                      SHA1

                                      5a59412e91fd9f57b34995918c5f4e67d4255173

                                      SHA256

                                      cec4cfcbc261a013a5883f73c16a5f53ed552487de58642b96b129ef6a1da421

                                      SHA512

                                      6be5f93b1e288c5c2b7ab4f12592031e82567ea79609d9017c53573019bca1b66c53b5729ab36a29024db2daa97e8420bc3de43b0a68717ea0e7ba7e7856cb6b

                                    • memory/4772-241-0x0000025F47D70000-0x0000025F48C0E000-memory.dmp

                                      Filesize

                                      14.6MB

                                    • memory/4772-240-0x00007FFFABCE3000-0x00007FFFABCE5000-memory.dmp

                                      Filesize

                                      8KB

                                    • memory/4772-507-0x0000025F6DC20000-0x0000025F6DF02000-memory.dmp

                                      Filesize

                                      2.9MB

                                    • memory/4772-484-0x0000025F6D560000-0x0000025F6D6C8000-memory.dmp

                                      Filesize

                                      1.4MB

                                    • memory/4772-503-0x0000025F66D40000-0x0000025F66DC2000-memory.dmp

                                      Filesize

                                      520KB

                                    • memory/4772-243-0x0000025F63B20000-0x0000025F63D14000-memory.dmp

                                      Filesize

                                      2.0MB

                                    • memory/4772-303-0x00007FFFABCE0000-0x00007FFFAC7A1000-memory.dmp

                                      Filesize

                                      10.8MB

                                    • memory/4772-505-0x0000025F66CB0000-0x0000025F66CDC000-memory.dmp

                                      Filesize

                                      176KB

                                    • memory/4772-244-0x00007FFFABCE0000-0x00007FFFAC7A1000-memory.dmp

                                      Filesize

                                      10.8MB

                                    • memory/4772-509-0x0000025F6D790000-0x0000025F6D842000-memory.dmp

                                      Filesize

                                      712KB

                                    • memory/4772-302-0x00007FFFABCE3000-0x00007FFFABCE5000-memory.dmp

                                      Filesize

                                      8KB

                                    • memory/5500-501-0x0000000000D40000-0x0000000000D4E000-memory.dmp

                                      Filesize

                                      56KB

                                    • memory/5500-542-0x0000000002EB0000-0x0000000002EE6000-memory.dmp

                                      Filesize

                                      216KB

                                    • memory/5500-545-0x0000000002EF0000-0x0000000002EFA000-memory.dmp

                                      Filesize

                                      40KB

                                    • memory/5500-546-0x000000001C8D0000-0x000000001C980000-memory.dmp

                                      Filesize

                                      704KB

                                    • memory/5500-547-0x000000001CEB0000-0x000000001D3D8000-memory.dmp

                                      Filesize

                                      5.2MB