Analysis

  • max time kernel
    629s
  • max time network
    605s
  • platform
    windows11-21h2_x64
  • resource
    win11-20241007-en
  • resource tags

    arch:x64arch:x86image:win11-20241007-enlocale:en-usos:windows11-21h2-x64system
  • submitted
    20-12-2024 05:20

General

  • Target

    https://gofile.io/d/jJjUyu

Malware Config

Extracted

Family

xworm

Version

5.0

C2

127.0.0.1:7000

Mutex

mntIkpqZP9rGK4ka

Attributes
  • install_file

    USB.exe

aes.plain

Signatures

  • Contains code to disable Windows Defender 1 IoCs

    A .NET executable tasked with disabling Windows Defender capabilities such as realtime monitoring, blocking at first seen, etc.

  • Detect Xworm Payload 3 IoCs
  • StormKitty

    StormKitty is an open source info stealer written in C#.

  • StormKitty payload 1 IoCs
  • Stormkitty family
  • Xworm

    Xworm is a remote access trojan written in C#.

  • Xworm family
  • Executes dropped EXE 4 IoCs
  • Loads dropped DLL 5 IoCs
  • Uses the VBS compiler for execution 1 TTPs
  • Browser Information Discovery 1 TTPs

    Enumerate browser information.

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Checks processor information in registry 2 TTPs 2 IoCs

    Processor information is often read in order to detect sandboxing environments.

  • Enumerates system info in registry 2 TTPs 13 IoCs
  • Gathers network information 2 TTPs 1 IoCs

    Uses commandline utility to view network configuration.

  • Modifies registry class 39 IoCs
  • NTFS ADS 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs
  • Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 10 IoCs
  • Suspicious use of AdjustPrivilegeToken 10 IoCs
  • Suspicious use of FindShellTrayWindow 64 IoCs
  • Suspicious use of SendNotifyMessage 15 IoCs
  • Suspicious use of SetWindowsHookEx 2 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs

Processes

  • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
    "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --start-maximized --single-argument https://gofile.io/d/jJjUyu
    1⤵
    • Enumerates system info in registry
    • Modifies registry class
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SendNotifyMessage
    • Suspicious use of WriteProcessMemory
    PID:3232
    • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
      "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=90.0.4430.212 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=90.0.818.66 --initial-client-data=0x100,0x104,0x108,0xdc,0x10c,0x7ffa08613cb8,0x7ffa08613cc8,0x7ffa08613cd8
      2⤵
        PID:3472
      • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
        "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=1832,537907802230027055,12749318629869464488,131072 --gpu-preferences=SAAAAAAAAADgAAAwAAAAAAAAAAAAAAAAAABgAAAAAAAoAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAB4AAAAAAAAAHgAAAAAAAAAKAAAAAQAAAAgAAAAAAAAACgAAAAAAAAAMAAAAAAAAAA4AAAAAAAAABAAAAAAAAAAAAAAAAUAAAAQAAAAAAAAAAAAAAAGAAAAEAAAAAAAAAABAAAABQAAABAAAAAAAAAAAQAAAAYAAAAIAAAAAAAAAAgAAAAAAAAA --mojo-platform-channel-handle=1932 /prefetch:2
        2⤵
          PID:1876
        • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
          "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=1832,537907802230027055,12749318629869464488,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2384 /prefetch:3
          2⤵
          • Suspicious behavior: EnumeratesProcesses
          PID:4740
        • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
          "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=1832,537907802230027055,12749318629869464488,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2808 /prefetch:8
          2⤵
            PID:2396
          • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
            "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1832,537907802230027055,12749318629869464488,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3312 /prefetch:1
            2⤵
              PID:1832
            • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
              "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1832,537907802230027055,12749318629869464488,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3320 /prefetch:1
              2⤵
                PID:3376
              • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1832,537907802230027055,12749318629869464488,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3812 /prefetch:1
                2⤵
                  PID:4912
                • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                  "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1832,537907802230027055,12749318629869464488,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4968 /prefetch:1
                  2⤵
                    PID:1584
                  • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                    "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1832,537907802230027055,12749318629869464488,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4988 /prefetch:1
                    2⤵
                      PID:2420
                    • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                      "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1832,537907802230027055,12749318629869464488,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5324 /prefetch:1
                      2⤵
                        PID:4848
                      • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                        "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1832,537907802230027055,12749318629869464488,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3584 /prefetch:1
                        2⤵
                          PID:1820
                        • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                          "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1832,537907802230027055,12749318629869464488,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5008 /prefetch:1
                          2⤵
                            PID:1456
                          • C:\Program Files (x86)\Microsoft\Edge\Application\90.0.818.66\identity_helper.exe
                            "C:\Program Files (x86)\Microsoft\Edge\Application\90.0.818.66\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=1832,537907802230027055,12749318629869464488,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5752 /prefetch:8
                            2⤵
                            • Suspicious behavior: EnumeratesProcesses
                            PID:964
                          • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                            "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --field-trial-handle=1832,537907802230027055,12749318629869464488,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5840 /prefetch:8
                            2⤵
                            • Suspicious behavior: EnumeratesProcesses
                            PID:660
                          • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                            "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1832,537907802230027055,12749318629869464488,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=16 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5780 /prefetch:1
                            2⤵
                              PID:4624
                            • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                              "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1832,537907802230027055,12749318629869464488,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=18 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5696 /prefetch:1
                              2⤵
                                PID:4196
                              • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=quarantine.mojom.Quarantine --field-trial-handle=1832,537907802230027055,12749318629869464488,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5800 /prefetch:8
                                2⤵
                                • NTFS ADS
                                • Suspicious behavior: EnumeratesProcesses
                                PID:1496
                              • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=1832,537907802230027055,12749318629869464488,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.22000.1 --gpu-preferences=SAAAAAAAAADoAAAwAAAAAAAAAAAAAAAAAABgAAAQAAAoAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAB4AAAAAAAAAHgAAAAAAAAAKAAAAAQAAAAgAAAAAAAAACgAAAAAAAAAMAAAAAAAAAA4AAAAAAAAABAAAAAAAAAAAAAAAAUAAAAQAAAAAAAAAAAAAAAGAAAAEAAAAAAAAAABAAAABQAAABAAAAAAAAAAAQAAAAYAAAAIAAAAAAAAAAgAAAAAAAAA --mojo-platform-channel-handle=4104 /prefetch:2
                                2⤵
                                • Suspicious behavior: EnumeratesProcesses
                                PID:4884
                            • C:\Windows\System32\CompPkgSrv.exe
                              C:\Windows\System32\CompPkgSrv.exe -Embedding
                              1⤵
                                PID:1012
                              • C:\Windows\System32\CompPkgSrv.exe
                                C:\Windows\System32\CompPkgSrv.exe -Embedding
                                1⤵
                                  PID:3980
                                • C:\Windows\SystemApps\MicrosoftWindows.Client.CBS_cw5n1h2txyewy\MiniSearchHost.exe
                                  "C:\Windows\SystemApps\MicrosoftWindows.Client.CBS_cw5n1h2txyewy\MiniSearchHost.exe" -ServerName:MiniSearchUI.AppXj3y73at8fy1htwztzxs68sxx1v7cksp7.mca
                                  1⤵
                                  • Modifies registry class
                                  • Suspicious use of SetWindowsHookEx
                                  PID:4220
                                • C:\Windows\System32\rundll32.exe
                                  C:\Windows\System32\rundll32.exe C:\Windows\System32\shell32.dll,SHCreateLocalServerRunDll {9aa46009-3ce0-458a-a354-715610a075e6} -Embedding
                                  1⤵
                                    PID:5024
                                  • C:\Program Files\7-Zip\7zG.exe
                                    "C:\Program Files\7-Zip\7zG.exe" x -o"C:\Users\Admin\Downloads\nigger\" -spe -an -ai#7zMap13328:74:7zEvent29140
                                    1⤵
                                    • Suspicious use of AdjustPrivilegeToken
                                    PID:1676
                                  • C:\Users\Admin\Downloads\nigger\Xworm-V5.6\Xworm V5.6.exe
                                    "C:\Users\Admin\Downloads\nigger\Xworm-V5.6\Xworm V5.6.exe"
                                    1⤵
                                    • Executes dropped EXE
                                    • Loads dropped DLL
                                    • Enumerates system info in registry
                                    • Modifies registry class
                                    • Suspicious behavior: EnumeratesProcesses
                                    • Suspicious behavior: GetForegroundWindowSpam
                                    • Suspicious use of SendNotifyMessage
                                    • Suspicious use of SetWindowsHookEx
                                    PID:2544
                                    • C:\Windows\Microsoft.NET\Framework64\v4.0.30319\vbc.exe
                                      "C:\Windows\Microsoft.NET\Framework64\v4.0.30319\vbc.exe" /noconfig @"C:\Users\Admin\AppData\Local\Temp\sk0gxfu5\sk0gxfu5.cmdline"
                                      2⤵
                                        PID:2964
                                        • C:\Windows\Microsoft.NET\Framework64\v4.0.30319\cvtres.exe
                                          C:\Windows\Microsoft.NET\Framework64\v4.0.30319\cvtres.exe /NOLOGO /READONLY /MACHINE:IX86 "/OUT:C:\Users\Admin\AppData\Local\Temp\RESCB31.tmp" "C:\Users\Admin\AppData\Local\Temp\vbc2E3E7E6FFE74E03AED1AB9F9FA12183.TMP"
                                          3⤵
                                            PID:5024
                                      • C:\Windows\system32\wbem\WmiApSrv.exe
                                        C:\Windows\system32\wbem\WmiApSrv.exe
                                        1⤵
                                          PID:3240
                                        • C:\Windows\system32\AUDIODG.EXE
                                          C:\Windows\system32\AUDIODG.EXE 0x00000000000004E4 0x00000000000004EC
                                          1⤵
                                          • Suspicious use of AdjustPrivilegeToken
                                          PID:1040
                                        • C:\Users\Admin\Downloads\nigger\Xworm-V5.6\XClient.exe
                                          "C:\Users\Admin\Downloads\nigger\Xworm-V5.6\XClient.exe"
                                          1⤵
                                          • Executes dropped EXE
                                          • Loads dropped DLL
                                          • Checks processor information in registry
                                          • Enumerates system info in registry
                                          • Suspicious use of AdjustPrivilegeToken
                                          PID:992
                                          • C:\Windows\SYSTEM32\CMD.EXE
                                            "CMD.EXE"
                                            2⤵
                                              PID:4716
                                              • C:\Windows\system32\ipconfig.exe
                                                ipconfig
                                                3⤵
                                                • Gathers network information
                                                PID:3220
                                          • C:\Users\Admin\Downloads\nigger\Xworm-V5.6\XClient.exe
                                            "C:\Users\Admin\Downloads\nigger\Xworm-V5.6\XClient.exe"
                                            1⤵
                                            • Executes dropped EXE
                                            • Suspicious use of AdjustPrivilegeToken
                                            PID:3680
                                          • C:\Users\Admin\Downloads\nigger\Xworm-V5.6\Xworm V5.6.exe
                                            "C:\Users\Admin\Downloads\nigger\Xworm-V5.6\Xworm V5.6.exe"
                                            1⤵
                                            • Executes dropped EXE
                                            • Enumerates system info in registry
                                            • Suspicious behavior: EnumeratesProcesses
                                            • Suspicious use of SendNotifyMessage
                                            PID:2860
                                          • C:\Windows\system32\wbem\WmiApSrv.exe
                                            C:\Windows\system32\wbem\WmiApSrv.exe
                                            1⤵
                                              PID:968
                                            • C:\Windows\system32\AUDIODG.EXE
                                              C:\Windows\system32\AUDIODG.EXE 0x00000000000004E4 0x00000000000004EC
                                              1⤵
                                              • Suspicious use of AdjustPrivilegeToken
                                              PID:3040

                                            Network

                                            MITRE ATT&CK Enterprise v15

                                            Replay Monitor

                                            Loading Replay Monitor...

                                            Downloads

                                            • C:\Users\Admin\AppData\Local\GMap.NET\DllCache\SQLite_v98_NET4_x64\System.Data.SQLite.DLL

                                              Filesize

                                              1.6MB

                                              MD5

                                              1b1a6d076bbde5e2ac079ef6dbc9d5f8

                                              SHA1

                                              6aa070d07379847f58adcab6b5739fc97b487a28

                                              SHA256

                                              eaadfbcafd981ec51c9c039e3adb4963b5a9d85637e27fd4c8cfca5f07ff8471

                                              SHA512

                                              05b0cb3d343a5706434390fe863e41852019aa27797fe5d1b80d13b8e24e0de0c2cb6e23d15e89a0f427aaeaf04bf0239f90feb95bfc6913ca4dc59007e6659e

                                            • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad\settings.dat

                                              Filesize

                                              152B

                                              MD5

                                              fdee96b970080ef7f5bfa5964075575e

                                              SHA1

                                              2c821998dc2674d291bfa83a4df46814f0c29ab4

                                              SHA256

                                              a241023f360b300e56b2b0e1205b651e1244b222e1f55245ca2d06d3162a62f0

                                              SHA512

                                              20875c3002323f5a9b1b71917d6bd4e4c718c9ca325c90335bd475ddcb25eac94cb3f29795fa6476d6d6e757622b8b0577f008eec2c739c2eec71d2e8b372cff

                                            • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad\settings.dat

                                              Filesize

                                              152B

                                              MD5

                                              46e6ad711a84b5dc7b30b75297d64875

                                              SHA1

                                              8ca343bfab1e2c04e67b9b16b8e06ba463b4f485

                                              SHA256

                                              77b51492a40a511e57e7a7ecf76715a2fd46533c0f0d0d5a758f0224e201c77f

                                              SHA512

                                              8472710b638b0aeee4678f41ed2dff72b39b929b2802716c0c9f96db24c63096b94c9969575e4698f16e412f82668b5c9b5cb747e8a2219429dbb476a31d297e

                                            • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index

                                              Filesize

                                              144B

                                              MD5

                                              9e22719cd02f25f0b79c1d80ceb9dd9c

                                              SHA1

                                              0cc3228d21681d73e4139e210fe30933fe41087f

                                              SHA256

                                              5296d1c601c1aa138a288c6d316bf9cd4cb16b0b36dcdc9380359f21e4856609

                                              SHA512

                                              85596062272332b7400dd706b966c41c269a7969950152260847c3e1526a583f627797b72dd23e5bb3906670e572e9e4ff4e145b81b5ccfa7bfa7c23f120cf89

                                            • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Network Persistent State

                                              Filesize

                                              398B

                                              MD5

                                              a57247deaaaf2f9c70391c72c8fb5acd

                                              SHA1

                                              9494d5ebba4bfe6f1e4b2c367bcf8b8a1bc2fe8f

                                              SHA256

                                              4e770d4730d97c4ec46947ff68fe02e27f4211c113f998c41b3f51ae0b3c7d4a

                                              SHA512

                                              29a21e676854bb21f0bfc70ed104b387bc072f797e95f9196a482d0294f16b8a2205e42cde01624564a283886c0804d0c0ba4f573647f20a67330108954973ab

                                            • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Preferences

                                              Filesize

                                              5KB

                                              MD5

                                              ee2235fc88dfb060fd6fb9b7445dec35

                                              SHA1

                                              d7c37ac3e8fb7969443bdcc75bdf1c0142e45204

                                              SHA256

                                              e33fabc22500195a5a12d29d0327e66cc82df41d008b31891edf24bf0abfbff6

                                              SHA512

                                              ca6f6f40db878f67ebc5c6198539207873354b44584e114f6e152de4f3b64c6fc327fb927e9e43f77972e0bc458bb8f4ba3c27a2a9d2c83984ba31147bcec523

                                            • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Preferences

                                              Filesize

                                              6KB

                                              MD5

                                              fc4056166a226d8df67264e6e03a5250

                                              SHA1

                                              637dd5dff6a68603c4e0a419ef84f6bba9f56b4c

                                              SHA256

                                              37c52ed534f0c18d5da9d1362af9a95adf35e345e261322ced08e59b840ec277

                                              SHA512

                                              3188689f443c452da0e4d4d0953849d3773e82d12fd71976b297c5f8e950a49952d5e8f4a50824d01fb3ef51741fc075b8f46df72a68f65d88dd18b3e485857c

                                            • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\data_reduction_proxy_leveldb\CURRENT

                                              Filesize

                                              16B

                                              MD5

                                              46295cac801e5d4857d09837238a6394

                                              SHA1

                                              44e0fa1b517dbf802b18faf0785eeea6ac51594b

                                              SHA256

                                              0f1bad70c7bd1e0a69562853ec529355462fcd0423263a3d39d6d0d70b780443

                                              SHA512

                                              8969402593f927350e2ceb4b5bc2a277f3754697c1961e3d6237da322257fbab42909e1a742e22223447f3a4805f8d8ef525432a7c3515a549e984d3eff72b23

                                            • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\data_reduction_proxy_leveldb\CURRENT

                                              Filesize

                                              16B

                                              MD5

                                              206702161f94c5cd39fadd03f4014d98

                                              SHA1

                                              bd8bfc144fb5326d21bd1531523d9fb50e1b600a

                                              SHA256

                                              1005a525006f148c86efcbfb36c6eac091b311532448010f70f7de9a68007167

                                              SHA512

                                              0af09f26941b11991c750d1a2b525c39a8970900e98cba96fd1b55dbf93fee79e18b8aab258f48b4f7bda40d059629bc7770d84371235cdb1352a4f17f80e145

                                            • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Local State

                                              Filesize

                                              10KB

                                              MD5

                                              20aa602f05b440ee20cef2abf8820727

                                              SHA1

                                              cab70a65826bd05e27d1274876d598cba13cada3

                                              SHA256

                                              f229e3b2a31915df8ac3e5b43762699927161b6c16f9f7074e9874f8c19efc56

                                              SHA512

                                              5eb138c2ac68801d9248dfe51ff4966b629d957083dd57ce4c5f263b3bd7ab1e93d9c13d5d128b551fdc92580905739cb24f15f7f5188cfd1316da37e5f248d4

                                            • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Local State

                                              Filesize

                                              10KB

                                              MD5

                                              ddb95e99cf371c715ae5a9edc50d57c8

                                              SHA1

                                              9283ba90cfc9a02e369f522364edacfe738d7f52

                                              SHA256

                                              950397c03663086dfc8d5e9407ae1b150f2fa25aac71bff7a39be0d37af5611d

                                              SHA512

                                              3e7032fd7f4f97db3fe0b053a1cbb92d6c30da1d3c85b3f7810bbe7cea10b02f32ba131436b1e26ac3a977ce48892083c60ab3fc15e7e8d3f7d3ce2daf130db0

                                            • C:\Users\Admin\AppData\Local\Packages\MicrosoftWindows.Client.CBS_cw5n1h2txyewy\TempState\SearchHoverUnifiedTileModelCache.dat

                                              Filesize

                                              10KB

                                              MD5

                                              069c37bf9e39b121efb7a28ece933aee

                                              SHA1

                                              eaef2e55b66e543a14a6780c23bb83fe60f2f04d

                                              SHA256

                                              485db8db6b497d31d428aceea416da20d88f7bde88dbfd6d59e3e7eee0a75ae8

                                              SHA512

                                              f4562071143c2ebc259a20cbb45b133c863f127a5750672b7a2af47783c7cdc56dcf1064ae83f54e5fc0bb4e93826bf2ab4ef6e604f955bf594f2cbd641db796

                                            • C:\Users\Admin\AppData\Local\Temp\RESCB31.tmp

                                              Filesize

                                              1KB

                                              MD5

                                              c5d6222097f9300808f26c551bddf853

                                              SHA1

                                              02e796aa3bc06e21aba489d9b89c91b60d9183cb

                                              SHA256

                                              8590f9f724ab0be017153ce2c7d51d073194a6caa38c30145a7a8c6ab10d5619

                                              SHA512

                                              9ffb989249abf4fe860276b9004e6bdf65934f4a4caee4b3cc7b7b7db65d05a7436e05dbb61ac3ce92aa433fc1603e2bc7dd306157ee61d2d886afe05fb24ca7

                                            • C:\Users\Admin\AppData\Local\Temp\sk0gxfu5\sk0gxfu5.0.vb

                                              Filesize

                                              78KB

                                              MD5

                                              3cee73c6637573824db571d1a1796694

                                              SHA1

                                              b8a08da07003451779fa1d5a24498afbc1694af2

                                              SHA256

                                              9bd8a939e2354597334ce25d257918e01939519ffe29c1b799202d55b7540fc0

                                              SHA512

                                              44df9618a7d62e2fbbd0cc5fd2d1c243565d961ca1ae3913ae475d16a1c8651dc53eb6f59d1358cc74ba7e3da889d772724dde9640a3e9bf0c0b1e890e55c6ce

                                            • C:\Users\Admin\AppData\Local\Temp\sk0gxfu5\sk0gxfu5.cmdline

                                              Filesize

                                              310B

                                              MD5

                                              be60f420dd03a34bb9e87570ee31c2f9

                                              SHA1

                                              5d5ecaf0e32d981c4512c5eb111981cc5bf78c63

                                              SHA256

                                              a6b249893e2550c3c0c498efdec6f4a41e9cfc4e54f9a677a3d8bcfbc05bca01

                                              SHA512

                                              6cb7b6fc26d2b693ceb94f8618eaa68679db93ac98943463ee9d242a81c216c5bf698d40ddd49fea0ef3c501e62c70d030acd61dd994955689dad9ec8e2842bd

                                            • C:\Users\Admin\AppData\Local\Temp\tmp364B.tmp

                                              Filesize

                                              100KB

                                              MD5

                                              1b942faa8e8b1008a8c3c1004ba57349

                                              SHA1

                                              cd99977f6c1819b12b33240b784ca816dfe2cb91

                                              SHA256

                                              555ccb7ecd9ae52a75135fdd81ab443a49d5785b0621ed6468d28c4234e46ccc

                                              SHA512

                                              5aee3d59478d41ddd5885c99b394c9c4983064e2b3528db1a3f7fc289662bced4f57d072517bbe7573c6d1789435e987ef1aa9cc91f372bcfd30bc016675fa43

                                            • C:\Users\Admin\AppData\Local\Temp\vbc2E3E7E6FFE74E03AED1AB9F9FA12183.TMP

                                              Filesize

                                              1KB

                                              MD5

                                              d40c58bd46211e4ffcbfbdfac7c2bb69

                                              SHA1

                                              c5cf88224acc284a4e81bd612369f0e39f3ac604

                                              SHA256

                                              01902f1903d080c6632ae2209136e8e713e9fd408db4621ae21246b65bfea2ca

                                              SHA512

                                              48b14748e86b7d92a3ea18f29caf1d7b4b2e1de75377012378d146575048a2531d2e5aaeae1abf2d322d06146177cdbf0c2940ac023efae007b9f235f18e2c68

                                            • C:\Users\Admin\Downloads\Unconfirmed 465402.crdownload

                                              Filesize

                                              21.4MB

                                              MD5

                                              257f0a5d5b8229af60f516396ed4c071

                                              SHA1

                                              65b34cd3d228f732efbe0fbe3505e225ecd86fa8

                                              SHA256

                                              a7998b47fd18882076122b260b000d2fbce144aa4173d46349fe964de7c452d0

                                              SHA512

                                              fc4f86cf68a2288ff9b42d45d335c369c9f79718dbd9dd8f289b884c5a7096ffb779e7b6885ba5aeb547a292d63ad2cdaabc27e532e16a56ab2fe5306ffc4620

                                            • C:\Users\Admin\Downloads\nigger.rar:Zone.Identifier

                                              Filesize

                                              26B

                                              MD5

                                              fbccf14d504b7b2dbcb5a5bda75bd93b

                                              SHA1

                                              d59fc84cdd5217c6cf74785703655f78da6b582b

                                              SHA256

                                              eacd09517ce90d34ba562171d15ac40d302f0e691b439f91be1b6406e25f5913

                                              SHA512

                                              aa1d2b1ea3c9de3ccadb319d4e3e3276a2f27dd1a5244fe72de2b6f94083dddc762480482c5c2e53f803cd9e3973ddefc68966f974e124307b5043e654443b98

                                            • C:\Users\Admin\Downloads\nigger\Xworm-V5.6\ClientsFolder\781CC881E2C63448926E\Recovery\RecoveryData\passwords.json

                                              Filesize

                                              2B

                                              MD5

                                              d751713988987e9331980363e24189ce

                                              SHA1

                                              97d170e1550eee4afc0af065b78cda302a97674c

                                              SHA256

                                              4f53cda18c2baa0c0354bb5f9a3ecbe5ed12ab4d8e11ba873c2f11161202b945

                                              SHA512

                                              b25b294cb4deb69ea00a4c3cf3113904801b6015e5956bd019a8570b1fe1d6040e944ef3cdee16d0a46503ca6e659a25f21cf9ceddc13f352a3c98138c15d6af

                                            • C:\Users\Admin\Downloads\nigger\Xworm-V5.6\GMap.NET.Core.dll

                                              Filesize

                                              2.9MB

                                              MD5

                                              819352ea9e832d24fc4cebb2757a462b

                                              SHA1

                                              aba7e1b29bdcd0c5a307087b55c2ec0c7ca81f11

                                              SHA256

                                              58c755fcfc65cddea561023d736e8991f0ad69da5e1378dea59e98c5db901b86

                                              SHA512

                                              6a5b0e1553616ea29ec72c12072ae05bdd709468a173e8adbdfe391b072c001ecacb3dd879845f8d599c6152eca2530cdaa2c069b1f94294f778158eaaebe45a

                                            • C:\Users\Admin\Downloads\nigger\Xworm-V5.6\GMap.NET.WindowsForms.dll

                                              Filesize

                                              147KB

                                              MD5

                                              32a8742009ffdfd68b46fe8fd4794386

                                              SHA1

                                              de18190d77ae094b03d357abfa4a465058cd54e3

                                              SHA256

                                              741e1a8f05863856a25d101bd35bf97cba0b637f0c04ecb432c1d85a78ef1365

                                              SHA512

                                              22418d5e887a6022abe8a7cbb0b6917a7478d468d211eecd03a95b8fb6452fc59db5178573e25d5d449968ead26bb0b2bfbfada7043c9a7a1796baca5235a82b

                                            • C:\Users\Admin\Downloads\nigger\Xworm-V5.6\GeoIP.dat

                                              Filesize

                                              1.2MB

                                              MD5

                                              8ef41798df108ce9bd41382c9721b1c9

                                              SHA1

                                              1e6227635a12039f4d380531b032bf773f0e6de0

                                              SHA256

                                              bc07ff22d4ee0b6fafcc12482ecf2981c172a672194c647cedf9b4d215ad9740

                                              SHA512

                                              4c62af04d4a141b94eb3e1b0dbf3669cb53fe9b942072ed7bea6a848d87d8994cff5a5f639ab70f424eb79a4b7adabdde4da6d2f02f995bd8d55db23ce99f01b

                                            • C:\Users\Admin\Downloads\nigger\Xworm-V5.6\Guna.UI2.dll

                                              Filesize

                                              1.9MB

                                              MD5

                                              bcc0fe2b28edd2da651388f84599059b

                                              SHA1

                                              44d7756708aafa08730ca9dbdc01091790940a4f

                                              SHA256

                                              c6264665a882e73eb2262a74fea2c29b1921a9af33180126325fb67a851310ef

                                              SHA512

                                              3bfc3d27c095dde988f779021d0479c8c1de80a404454813c6cae663e3fe63dc636bffa7de1094e18594c9d608fa7420a0651509544722f2a00288f0b7719cc8

                                            • C:\Users\Admin\Downloads\nigger\Xworm-V5.6\Icons\icon (15).ico

                                              Filesize

                                              361KB

                                              MD5

                                              e3143e8c70427a56dac73a808cba0c79

                                              SHA1

                                              63556c7ad9e778d5bd9092f834b5cc751e419d16

                                              SHA256

                                              b2f57a23ecc789c1bbf6037ac0825bf98babc7bf0c5d438af5e2767a27a79188

                                              SHA512

                                              74e0f4b55625df86a87b9315e4007be8e05bbecca4346a6ea06ef5b1528acb5a8bb636ef3e599a3820dbddcf69563a0a22e2c1062c965544fd75ec96fd9803fc

                                            • C:\Users\Admin\Downloads\nigger\Xworm-V5.6\NAudio.dll

                                              Filesize

                                              502KB

                                              MD5

                                              3b87d1363a45ce9368e9baec32c69466

                                              SHA1

                                              70a9f4df01d17060ec17df9528fca7026cc42935

                                              SHA256

                                              81b3f1dc3f1eac9762b8a292751a44b64b87d0d4c3982debfdd2621012186451

                                              SHA512

                                              1f07d3b041763b4bc31f6bd7b181deb8d34ff66ec666193932ffc460371adbcd4451483a99009b9b0b71f3864ed5c15c6c3b3777fabeb76f9918c726c35eb7d7

                                            • C:\Users\Admin\Downloads\nigger\Xworm-V5.6\Newtonsoft.Json.dll

                                              Filesize

                                              695KB

                                              MD5

                                              195ffb7167db3219b217c4fd439eedd6

                                              SHA1

                                              1e76e6099570ede620b76ed47cf8d03a936d49f8

                                              SHA256

                                              e1e27af7b07eeedf5ce71a9255f0422816a6fc5849a483c6714e1b472044fa9d

                                              SHA512

                                              56eb7f070929b239642dab729537dde2c2287bdb852ad9e80b5358c74b14bc2b2dded910d0e3b6304ea27eb587e5f19db0a92e1cbae6a70fb20b4ef05057e4ac

                                            • C:\Users\Admin\Downloads\nigger\Xworm-V5.6\Plugins\ActiveWindows.dll

                                              Filesize

                                              14KB

                                              MD5

                                              5a766a4991515011983ceddf7714b70b

                                              SHA1

                                              4eb00ae7fe780fa4fe94cedbf6052983f5fd138b

                                              SHA256

                                              567b9861026a0dbc5947e7515dc7ab3f496153f6b3db57c27238129ec207fc52

                                              SHA512

                                              4bd6b24e236387ff58631207ea42cd09293c3664468e72cd887de3b3b912d3795a22a98dcf4548fb339444337722a81f8877abb22177606d765d78e48ec01fd8

                                            • C:\Users\Admin\Downloads\nigger\Xworm-V5.6\Plugins\Chat.dll

                                              Filesize

                                              18KB

                                              MD5

                                              59f75c7ffaccf9878a9d39e224a65adf

                                              SHA1

                                              46b0f61a07e85e3b54b728d9d7142ddc73c9d74b

                                              SHA256

                                              aab20f465955d77d6ec3b5c1c5f64402a925fb565dda5c8e38c296cb7406e492

                                              SHA512

                                              80056163b96ce7a8877874eaae559f75217c0a04b3e3d4c1283fe23badfc95fe4d587fd27127db4be459b8a3adf41900135ea12b0eeb4187adbcf796d9505cb8

                                            • C:\Users\Admin\Downloads\nigger\Xworm-V5.6\Plugins\Chromium.dll

                                              Filesize

                                              32KB

                                              MD5

                                              edb2f0d0eb08dcd78b3ddf87a847de01

                                              SHA1

                                              cc23d101f917cad3664f8c1fa0788a89e03a669c

                                              SHA256

                                              b6d8bccdf123ceac6b9642ad3500d4e0b3d30b9c9dd2d29499d38c02bd8f9982

                                              SHA512

                                              8f87da834649a21a908c95a9ea8e2d94726bd9f33d4b7786348f6371dfae983cc2b5b5d4f80a17a60ded17d4eb71771ec25a7c82e4f3a90273c46c8ee3b8f2c3

                                            • C:\Users\Admin\Downloads\nigger\Xworm-V5.6\Plugins\Clipboard.dll

                                              Filesize

                                              14KB

                                              MD5

                                              831eb0de839fc13de0abab64fe1e06e7

                                              SHA1

                                              53aad63a8b6fc9e35c814c55be9992abc92a1b54

                                              SHA256

                                              e31a1c2b1baa2aa2c36cabe3da17cd767c8fec4c206bd506e889341e5e0fa959

                                              SHA512

                                              2f61bcf972671d96e036b3c99546cd01e067bef15751a87c00ba6d656decb6b69a628415e5363e650b55610cf9f237585ada7ce51523e6efc0e27d7338966bee

                                            • C:\Users\Admin\Downloads\nigger\Xworm-V5.6\Plugins\Cmstp-Bypass.dll

                                              Filesize

                                              11KB

                                              MD5

                                              cf15259e22b58a0dfd1156ab71cbd690

                                              SHA1

                                              3614f4e469d28d6e65471099e2d45c8e28a7a49e

                                              SHA256

                                              fa420fd3d1a5a2bb813ef8e6063480099f19091e8fa1b3389004c1ac559e806b

                                              SHA512

                                              7302a424ed62ec20be85282ff545a4ca9e1aecfe20c45630b294c1ae72732465d8298537ee923d9e288ae0c48328e52ad8a1a503e549f8f8737fabe2e6e9ad38

                                            • C:\Users\Admin\Downloads\nigger\Xworm-V5.6\Plugins\FileManager.dll

                                              Filesize

                                              679KB

                                              MD5

                                              641a8b61cb468359b1346a0891d65b59

                                              SHA1

                                              2cdc49bcd7428fe778a94cdcd19cabf5ece8c9c0

                                              SHA256

                                              b58ed3ebbcd27c7f4b173819528ff4db562b90475a5e304521ed5c564d39fffd

                                              SHA512

                                              042702d34664ea6288e891c9f7aa10a5b4b07317f25f82d6c9fa9ba9b98645c14073d0f66637060b416a30c58dec907d9383530320a318523c51f19ebd0a4fee

                                            • C:\Users\Admin\Downloads\nigger\Xworm-V5.6\Plugins\FilesSearcher.dll

                                              Filesize

                                              478KB

                                              MD5

                                              6f8f1621c16ac0976600146d2217e9d2

                                              SHA1

                                              b6aa233b93aae0a17ee8787576bf0fbc05cedde4

                                              SHA256

                                              e66e1273dc59ee9e05ce3e02f1b760b18dd296a47d92b3ce5b24efb48e5fb21b

                                              SHA512

                                              eb55acdea8648c8cdefee892758d9585ff81502fc7037d5814e1bd01fee0431f4dde0a4b04ccb2b0917e1b11588f2dc9f0bfe750117137a01bbd0c508f43ef6a

                                            • C:\Users\Admin\Downloads\nigger\Xworm-V5.6\Plugins\HBrowser.dll

                                              Filesize

                                              25KB

                                              MD5

                                              f0e921f2f850b7ec094036d20ff9be9b

                                              SHA1

                                              3b2d76d06470580858cc572257491e32d4b021c0

                                              SHA256

                                              75e8ff57fa6d95cf4d8405bffebb2b9b1c55a0abba0fe345f55b8f0e88be6f3c

                                              SHA512

                                              16028ae56cd1d78d5cb63c554155ae02804aac3f15c0d91a771b0dcd5c8df710f39481f6545ca6410b7cd9240ec77090f65e3379dcfe09f161a3dff6aec649f3

                                            • C:\Users\Admin\Downloads\nigger\Xworm-V5.6\Plugins\HRDP.dll

                                              Filesize

                                              1.7MB

                                              MD5

                                              f27b6e8cf5afa8771c679b7a79e11a08

                                              SHA1

                                              6c3fcf45e35aaf6b747f29a06108093c284100da

                                              SHA256

                                              4aa18745a5fddf7ec14adaff3ad1b4df1b910f4b6710bf55eb27fb3942bb67de

                                              SHA512

                                              0d84966bbc9290b04d2148082563675ec023906d58f5ba6861c20542271bf11be196d6ab24e48372f339438204bd5c198297da98a19fddb25a3df727b5aafa33

                                            • C:\Users\Admin\Downloads\nigger\Xworm-V5.6\Plugins\HVNC.dll

                                              Filesize

                                              58KB

                                              MD5

                                              30eb33588670191b4e74a0a05eecf191

                                              SHA1

                                              08760620ef080bb75c253ba80e97322c187a6b9f

                                              SHA256

                                              3a287acb1c89692f2c18596dd4405089ac998bb9cf44dd225e5211923d421e96

                                              SHA512

                                              820cca77096ff2eea8e459a848f7127dc46af2e5f42f43b2b7375be6f4778c1b0e34e4aa5a97f7fbabe0b53dcd351d09c231bb9afedf7bcec60d949918a06b97

                                            • C:\Users\Admin\Downloads\nigger\Xworm-V5.6\Plugins\HVNCMemory.dll

                                              Filesize

                                              39KB

                                              MD5

                                              065f0830d1e36f8f44702b0f567082e8

                                              SHA1

                                              724c33558fcc8ecd86ee56335e8f6eb5bfeac0db

                                              SHA256

                                              285b462e3cd4a5b207315ad33ee6965a8b98ca58abb8d16882e4bc2d758ff1a4

                                              SHA512

                                              bac0148e1b78a8fde242697bff1bbe10a18ffab85fdced062de3dc5017cd77f0d54d8096e273523b8a3910fe17fac111724acffa5bec30e4d81b7b3bd312d545

                                            • C:\Users\Admin\Downloads\nigger\Xworm-V5.6\Plugins\HiddenApps.dll

                                              Filesize

                                              45KB

                                              MD5

                                              ba2141a7aefa1a80e2091bf7c2ca72db

                                              SHA1

                                              9047b546ce9c0ea2c36d24a10eb31516a24a047d

                                              SHA256

                                              6a098f5a7f9328b35d73ee232846b13e2d587d47f473cbc9b3f1d74def7086ea

                                              SHA512

                                              91e43620e5717b699e34e658d6af49bba200dcf91ac0c9a0f237ec44666b57117a13bc8674895b7a9cac5a17b2f91cdc3daa5bcc52c43edbabd19bc1ed63038c

                                            • C:\Users\Admin\Downloads\nigger\Xworm-V5.6\Plugins\Informations.dll

                                              Filesize

                                              22KB

                                              MD5

                                              67a884eeb9bd025a1ef69c8964b6d86f

                                              SHA1

                                              97e00d3687703b1d7cc0939e45f8232016d009d9

                                              SHA256

                                              cba453460be46cfa705817abbe181f9bf65dca6b6cea1ad31629aa08dbeaf72b

                                              SHA512

                                              52e852021a1639868e61d2bd1e8f14b9c410c16bfca584bf70ae9e71da78829c1cada87d481e55386eec25646f84bb9f3baee3b5009d56bcbb3be4e06ffa0ae7

                                            • C:\Users\Admin\Downloads\nigger\Xworm-V5.6\Plugins\Keylogger.dll

                                              Filesize

                                              17KB

                                              MD5

                                              246f7916c4f21e98f22cb86587acb334

                                              SHA1

                                              b898523ed4db6612c79aad49fbd74f71ecdbd461

                                              SHA256

                                              acfe5c3aa2a3bae3437ead42e90044d7eee972ead25c1f7486bea4a23c201d3a

                                              SHA512

                                              1c256ca9b9857e6d393461b55e53175b7b0d88d8f3566fd457f2b3a4f241cb91c9207d54d8b0867ea0abd3577d127835beb13157c3e5df5c2b2b34b3339bd15d

                                            • C:\Users\Admin\Downloads\nigger\Xworm-V5.6\Plugins\Maps.dll

                                              Filesize

                                              15KB

                                              MD5

                                              806c3802bfd7a97db07c99a5c2918198

                                              SHA1

                                              088393a9d96f0491e3e1cf6589f612aa5e1df5f8

                                              SHA256

                                              34b532a4d0560e26b0d5b81407befdc2424aacc9ef56e8b13de8ad0f4b3f1ab6

                                              SHA512

                                              ed164822297accd3717b4d8e3927f0c736c060bb7ec5d99d842498b63f74d0400c396575e9fa664ad36ae8d4285cfd91e225423a0c77a612912d66ea9f63356c

                                            • C:\Users\Admin\Downloads\nigger\Xworm-V5.6\Plugins\MessageBox.dll

                                              Filesize

                                              14KB

                                              MD5

                                              7db8b7e15194fa60ffed768b6cf948c2

                                              SHA1

                                              3de1b56cc550411c58cd1ad7ba845f3269559b5c

                                              SHA256

                                              bc09b671894c9a36f4eca45dd6fbf958a967acea9e85b66c38a319387b90dd29

                                              SHA512

                                              e7f5430b0d46f133dc9616f9eeae8fb42f07a8a4a18b927dd7497de29451086629dfc5e63c0b2a60a4603d8421c6570967c5dbde498bb480aef353b3ed8e18a1

                                            • C:\Users\Admin\Downloads\nigger\Xworm-V5.6\Plugins\Microphone.dll

                                              Filesize

                                              540KB

                                              MD5

                                              9c3d90ccf5d47f6eef83542bd08d5aeb

                                              SHA1

                                              0c0aa80c3411f98e8db7a165e39484e8dae424c7

                                              SHA256

                                              612898afdf9120cfef5843f9b136c66ecc3e0bb6f3d1527d0599a11988b7783c

                                              SHA512

                                              0786f802fbd24d4ab79651298a5ba042c275d7d01c6ac2c9b3ca1e4ee952de7676ec8abf68d226b72696e9480bd4d4615077163efbcda7cff6a5f717736cbdfe

                                            • C:\Users\Admin\Downloads\nigger\Xworm-V5.6\Plugins\Ngrok-Installer.dll

                                              Filesize

                                              400KB

                                              MD5

                                              3e19341a940638536b4a7891d5b2b777

                                              SHA1

                                              ca6f5b28e2e54f3f86fd9f45a792a868c82e35b5

                                              SHA256

                                              b574aabf02a65aa3b6f7bfff0a574873ce96429d3f708a10f87bc1f6518f14aa

                                              SHA512

                                              06639892ea4a27c8840872b0de450ae1a0dac61e1dcb64523973c629580323b723c0e9074ff2ddf9a67a8a6d45473432ffc4a1736c0ddc74e054ae13b774f3e2

                                            • C:\Users\Admin\Downloads\nigger\Xworm-V5.6\Plugins\Options.dll

                                              Filesize

                                              30KB

                                              MD5

                                              97193fc4c016c228ae0535772a01051d

                                              SHA1

                                              f2f6d56d468329b1e9a91a3503376e4a6a4d5541

                                              SHA256

                                              5c34aee5196e0f8615b8d1d9017dd710ea28d2b7ac99295d46046d12eea58d78

                                              SHA512

                                              9f6d7da779e8c9d7307f716d4a4453982bb7f090c35947850f13ec3c9472f058fc11e1120a9641326970b9846d3c691e0c2afd430c12e5e8f30abadb5dcf5ed2

                                            • C:\Users\Admin\Downloads\nigger\Xworm-V5.6\Plugins\Pastime.dll

                                              Filesize

                                              17KB

                                              MD5

                                              6430ab4458a703fb97be77d6bea74f5b

                                              SHA1

                                              59786b619243d4e00d82b0a3b7e9deb6c71b283c

                                              SHA256

                                              a46787527ac34cd71d96226ddfc0a06370b61e4ad0267105be2aec8d82e984c1

                                              SHA512

                                              7b6cf7a613671826330e7f8daddc4c7c37b4d191cf4938c1f5b0fb7b467b28a23fb56e412dc82192595cfa9d5b552668ef0aaa938c8ae166029a610b246d3ecc

                                            • C:\Users\Admin\Downloads\nigger\Xworm-V5.6\Plugins\Performance.dll

                                              Filesize

                                              16KB

                                              MD5

                                              1841c479da7efd24521579053efcf440

                                              SHA1

                                              0aacfd06c7223b988584a381cb10d6c3f462fc6a

                                              SHA256

                                              043b6a0284468934582819996dbaa70b863ab4caa4f968c81c39a33b2ac81735

                                              SHA512

                                              3005e45728162cc04914e40a3b87a1c6fc7ffde5988d9ff382d388e9de4862899b3390567c6b7d54f0ec02283bf64bcd5529319ca32295c109a7420848fa3487

                                            • C:\Users\Admin\Downloads\nigger\Xworm-V5.6\Plugins\ProcessManager.dll

                                              Filesize

                                              19KB

                                              MD5

                                              3d4ec14005a25a4cb05b1aa679cf22bf

                                              SHA1

                                              6f4a827d94ad020bc23fbd04b7d8ca2995267094

                                              SHA256

                                              7cf1921a5f8429b2b9e8197de195cfae2353fe0d8cb98e563bdf1e782fe2ee4e

                                              SHA512

                                              0ee72d345d5431c7a6ffc71cf5e37938b93fd346e5a4746f5967f1aa2b69c34ca4ba0d0abd867778d8ca60b56f01e2d7fc5e7cf7c5a39a92015d4df2d68e382e

                                            • C:\Users\Admin\Downloads\nigger\Xworm-V5.6\Plugins\Programs.dll

                                              Filesize

                                              13KB

                                              MD5

                                              a6734a047b0b57055807a4f33a80d4dd

                                              SHA1

                                              0b3a78b2362b0fd3817770fdc6dd070e3305615c

                                              SHA256

                                              953a8276faa4a18685d09cd9187ed3e409e3cccd7daf34b6097f1eb8d96125a4

                                              SHA512

                                              7292eab25f0e340e78063f32961eff16bb51895ad46cfd09933c0c30e3315129945d111a877a191fc261ad690ad6b02e1f2cabc4ff2fdac962ee272b41dd6dfa

                                            • C:\Users\Admin\Downloads\nigger\Xworm-V5.6\Plugins\Ransomware.dll

                                              Filesize

                                              20KB

                                              MD5

                                              ccc9ea43ead4aa754b91e2039fe0ac1c

                                              SHA1

                                              f382635559045ac1aeb1368d74e6b5c6e98e6a48

                                              SHA256

                                              14c2bbccdabb8408395d636b44b99de4b16db2e6bf35181cb71e7be516d83ad9

                                              SHA512

                                              5d05254ba5cd7b1967a84d5b0e6fd23c54766474fb8660a001bf3d21a3f5c8c20fcdb830fb8659a90da96655e6ee818ceefb6afa610cc853b7fba84bb9db4413

                                            • C:\Users\Admin\Downloads\nigger\Xworm-V5.6\Plugins\Recovery.dll

                                              Filesize

                                              1.1MB

                                              MD5

                                              776193701a2ed869b5f1b6e71970a0ac

                                              SHA1

                                              2f973458531aaa283cdc835af4e24f5f709cbad1

                                              SHA256

                                              66dbe3b90371fe58caa957e83c1c1f0acce941a36cf140a0f07e64403dd13303

                                              SHA512

                                              a41f981c861e8d40487a9cd0863f9055165427e10580548e972a47ef47cf3e777aab2df70dc6f464cc3077860e86eda7462e9754f9047a1ecc0ed9721663aeb9

                                            • C:\Users\Admin\Downloads\nigger\Xworm-V5.6\Plugins\Regedit.dll

                                              Filesize

                                              15KB

                                              MD5

                                              53a2cfe273c311b64cf5eaca62f8c2fd

                                              SHA1

                                              4ec95ec4777a0c5b4acde57a3490e1c139a8f648

                                              SHA256

                                              2f73dc0f3074848575c0408e02079fd32b7497f8816222ae3ce8c63725a62fe6

                                              SHA512

                                              992b37d92157ae70a106a9835de46a4ac156341208cfe7fb0477dc5fc3bc9ddae71b35e2336fc5c181630bac165267b7229f97be436912dfd9526a020d012948

                                            • C:\Users\Admin\Downloads\nigger\Xworm-V5.6\Plugins\RemoteDesktop.dll

                                              Filesize

                                              18KB

                                              MD5

                                              e6367d31cf5d16b1439b86ae6b7b31c3

                                              SHA1

                                              f52f1e73614f2cec66dab6af862bdcb5d4d9cf35

                                              SHA256

                                              cc52384910cee944ddbcc575a8e0177bfa6b16e3032438b207797164d5c94b34

                                              SHA512

                                              8bc78a9b62f4226be146144684dc7fcd085bcf4d3d0558cb662aacc143d1438b7454e8ac70ca83ebeedc2a0fcea38ad8e77a5d926a85254b5a7d420a5605538a

                                            • C:\Users\Admin\Downloads\nigger\Xworm-V5.6\SimpleObfuscator.dll

                                              Filesize

                                              1.4MB

                                              MD5

                                              9043d712208178c33ba8e942834ce457

                                              SHA1

                                              e0fa5c730bf127a33348f5d2a5673260ae3719d1

                                              SHA256

                                              b7a6eea19188b987dad97b32d774107e9a1beb4f461a654a00197d73f7fad54c

                                              SHA512

                                              dd6fa02ab70c58cde75fd4d4714e0ed0df5d3b18f737c68c93dba40c30376cc93957f8eef69fea86041489546ce4239b35a3b5d639472fd54b80f2f7260c8f65

                                            • C:\Users\Admin\Downloads\nigger\Xworm-V5.6\Sounds\Intro.wav

                                              Filesize

                                              238KB

                                              MD5

                                              ad3b4fae17bcabc254df49f5e76b87a6

                                              SHA1

                                              1683ff029eebaffdc7a4827827da7bb361c8747e

                                              SHA256

                                              e3e5029bf5f29fa32d2f6cdda35697cd8e6035d5c78615f64d0b305d1bd926cf

                                              SHA512

                                              3d6ecc9040b5079402229c214cb5f9354315131a630c43d1da95248edc1b97627fb9ba032d006380a67409619763fb91976295f8d22ca91894c88f38bb610cd3

                                            • C:\Users\Admin\Downloads\nigger\Xworm-V5.6\XClient.exe

                                              Filesize

                                              32KB

                                              MD5

                                              2d9a736304cda18ecdff6a1aced0ac81

                                              SHA1

                                              443c06cab3af2a0e32ec1cb39b1271013ec4c855

                                              SHA256

                                              a935a95ecd6eef5d9eceebc083efef774904bba45216b8e8f16103ad79930ae6

                                              SHA512

                                              86a3971356c5f9e458d5f3a7c2942969375a27cf6e4d9e8182151a181bb30c0133cbe0c70b722e3004b34c0bb9ed05cf2c2dcc8808eb2e2f03bc2576918216d8

                                            • C:\Users\Admin\Downloads\nigger\Xworm-V5.6\Xworm V5.6.exe

                                              Filesize

                                              14.9MB

                                              MD5

                                              56ccb739926a725e78a7acf9af52c4bb

                                              SHA1

                                              5b01b90137871c3c8f0d04f510c4d56b23932cbc

                                              SHA256

                                              90f58865f265722ab007abb25074b3fc4916e927402552c6be17ef9afac96405

                                              SHA512

                                              2fee662bc4a1a36ce7328b23f991fa4a383b628839e403d6eb6a9533084b17699a6c939509867a86e803aafef2f9def98fa9305b576dad754aa7f599920c19a1

                                            • C:\Users\Admin\Downloads\nigger\Xworm-V5.6\Xworm V5.6.exe.config

                                              Filesize

                                              183B

                                              MD5

                                              66f09a3993dcae94acfe39d45b553f58

                                              SHA1

                                              9d09f8e22d464f7021d7f713269b8169aed98682

                                              SHA256

                                              7ea08548c23bd7fd7c75ca720ac5a0e8ca94cb51d06cd45ebf5f412e4bbdd7d7

                                              SHA512

                                              c8ea53ab187a720080bd8d879704e035f7e632afe1ee93e7637fad6bb7e40d33a5fe7e5c3d69134209487d225e72d8d944a43a28dc32922e946023e89abc93ed

                                            • memory/992-629-0x000000001B750000-0x000000001B75A000-memory.dmp

                                              Filesize

                                              40KB

                                            • memory/992-628-0x000000001B5D0000-0x000000001B5DA000-memory.dmp

                                              Filesize

                                              40KB

                                            • memory/992-564-0x0000000000950000-0x000000000095E000-memory.dmp

                                              Filesize

                                              56KB

                                            • memory/992-618-0x000000001B5B0000-0x000000001B5C2000-memory.dmp

                                              Filesize

                                              72KB

                                            • memory/992-632-0x000000001B530000-0x000000001B53C000-memory.dmp

                                              Filesize

                                              48KB

                                            • memory/992-633-0x000000001E900000-0x000000001EE28000-memory.dmp

                                              Filesize

                                              5.2MB

                                            • memory/992-600-0x0000000002A50000-0x0000000002A5C000-memory.dmp

                                              Filesize

                                              48KB

                                            • memory/992-619-0x000000001B710000-0x000000001B74A000-memory.dmp

                                              Filesize

                                              232KB

                                            • memory/992-602-0x000000001B570000-0x000000001B57A000-memory.dmp

                                              Filesize

                                              40KB

                                            • memory/2544-542-0x000002534A120000-0x000002534A314000-memory.dmp

                                              Filesize

                                              2.0MB

                                            • memory/2544-607-0x0000025349D30000-0x0000025349ECB000-memory.dmp

                                              Filesize

                                              1.6MB

                                            • memory/2544-540-0x000002532D2E0000-0x000002532E1C8000-memory.dmp

                                              Filesize

                                              14.9MB

                                            • memory/2544-547-0x0000025351850000-0x00000253519B8000-memory.dmp

                                              Filesize

                                              1.4MB

                                            • memory/2544-568-0x0000025349C40000-0x0000025349C6C000-memory.dmp

                                              Filesize

                                              176KB

                                            • memory/2544-566-0x0000025349CA0000-0x0000025349D22000-memory.dmp

                                              Filesize

                                              520KB

                                            • memory/2544-572-0x00000253516D0000-0x0000025351782000-memory.dmp

                                              Filesize

                                              712KB

                                            • memory/2544-570-0x0000025351F10000-0x00000253521F2000-memory.dmp

                                              Filesize

                                              2.9MB