Resubmissions
09/03/2025, 18:14
250309-wvp25axvd1 1009/03/2025, 15:53
250309-tb268svky7 808/03/2025, 20:22
250308-y5pv8asjy3 808/03/2025, 17:38
250308-v7ydlazrt9 907/03/2025, 15:40
250307-s4f9ssswaz 1007/03/2025, 13:18
250307-qj13cszzgz 306/03/2025, 15:59
250306-tfgfbssrs2 406/03/2025, 15:19
250306-sqa6mask16 805/03/2025, 14:43
250305-r3nf2s1tdt 805/03/2025, 14:28
250305-rtcm7a1ms4 8Analysis
-
max time kernel
734s -
max time network
735s -
platform
windows11-21h2_x64 -
resource
win11-20241007-en -
resource tags
arch:x64arch:x86image:win11-20241007-enlocale:en-usos:windows11-21h2-x64system -
submitted
02/02/2025, 09:07
Static task
static1
Behavioral task
behavioral1
Sample
test.txt
Resource
win11-20241007-en
General
-
Target
test.txt
-
Size
18B
-
MD5
5b3f97d48c8751bd031b7ea53545bdb6
-
SHA1
88be3374c62f23406ec83bb11279f8423bd3f88d
-
SHA256
d8fce9dd9c65ca143343f7711859a7cffc3c5e656a8b84108183fb769a12ed8b
-
SHA512
ed2de1eec50310ced4bde8ef6ae4b7902920b007df7b6aeb200cfe9fcc0d36ef05af7526c4675be2feac52831668798d5fe3523175efad6f6549b30f30a0b5d6
Malware Config
Extracted
xworm
127.0.0.1:7000
kl2gNShVinepnLCw
-
install_file
USB.exe
Extracted
gurcu
https://api.telegram.org/bot8077286634:AAG1XHb6leJVqlqfJbmVoJd2ysHqXSznNdQ/sendDocument?chat_id=-1002258988684&caption=%F0%9F%93%82%20-%20Browser%20data%0A%E2%94%9C%E2%94%80%E2%94%80%20%F0%9F%93%82%20-%20cookies(0.38%20kb)%0A%E2%94%9C%E2%94%80%E2%94%80%20%F0%9F%93%84%20-%20BrowserDownloads.txt%20(0.21%20kb
https://api.telegram.org/bot8077286634:AAG1XHb6leJVqlqfJbmVoJd2ysHqXSznNdQ/sendMessage?chat_id=-1002258988684
https://api.telegram.org/bot8077286634:AAG1XHb6leJVqlqfJbmVoJd2ysHqXSznNdQ/getUpdates?offset=-
https://api.telegram.org/bot8077286634:AAG1XHb6leJVqlqfJbmVoJd2ysHqXSznNdQ/sendDocument?chat_id=-1002258988684&caption=%F0%9F%93%B8Screenshot%20take
https://api.telegram.org/bot8077286634:AAG1XHb6leJVqlqfJbmVoJd2ysHqXSznNdQ/sendDocument?chat_id=-1002258988684&caption=%F0%9F%A5%A0Cookies%20from%20these%20websites%20%5Bgithub.com%5D%20were%20successfully%20grabbe
Signatures
-
Detect Xworm Payload 3 IoCs
resource yara_rule behavioral1/files/0x0003000000025b6c-805.dat family_xworm behavioral1/files/0x0003000000025cb3-815.dat family_xworm behavioral1/memory/4796-817-0x0000000000080000-0x0000000000090000-memory.dmp family_xworm -
Gurcu family
-
UAC bypass 3 TTPs 1 IoCs
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" XWorm.exe -
Xworm family
-
Disables RegEdit via registry modification 1 IoCs
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-2410826464-2353372766-2364966905-1000\Software\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" XWorm.exe -
Disables Task Manager via registry modification
-
Uses browser remote debugging 2 TTPs 3 IoCs
Can be used control the browser and steal sensitive information such as credentials and session cookies.
pid Process 1532 msedge.exe 648 msedge.exe 3116 msedge.exe -
Drops startup file 4 IoCs
description ioc Process File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\lol.exe lol.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\lol.exe lol.exe File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\XWorm.exe XWorm.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\XWorm.exe XWorm.exe -
Executes dropped EXE 15 IoCs
pid Process 560 Command Reciever.exe 1508 conhost.exe 4796 XWorm.exe 1444 XWorm.exe 4308 XWorm.exe 724 XWorm.exe 4956 XWorm.exe 3064 XWorm.exe 2600 XWorm.exe 2600 XWorm.exe 4064 XWorm.exe 2920 XWorm.exe 396 lol.exe 3988 lol.exe 3112 XWorm.exe -
Loads dropped DLL 2 IoCs
pid Process 560 Command Reciever.exe 1508 conhost.exe -
Reads user/profile data of web browsers 3 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Uses the VBS compiler for execution 1 TTPs
-
Adds Run key to start application 2 TTPs 3 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-2410826464-2353372766-2364966905-1000\Software\Microsoft\Windows\CurrentVersion\Run\ChromeUpdate = "C:\\Users\\Admin\\AppData\\Roaming\\AdobeUpdate\\conhost.exe" reg.exe Set value (str) \REGISTRY\USER\S-1-5-21-2410826464-2353372766-2364966905-1000\Software\Microsoft\Windows\CurrentVersion\Run\XWorm = "C:\\Users\\Admin\\AppData\\Roaming\\XWorm.exe" XWorm.exe Set value (str) \REGISTRY\USER\S-1-5-21-2410826464-2353372766-2364966905-1000\Software\Microsoft\Windows\CurrentVersion\Run\lol = "C:\\Users\\Admin\\AppData\\Roaming\\lol.exe" lol.exe -
Checks whether UAC is enabled 1 TTPs 1 IoCs
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" XWorm.exe -
Legitimate hosting services abused for malware hosting/C2 1 TTPs 3 IoCs
flow ioc 7 raw.githubusercontent.com 28 raw.githubusercontent.com 33 raw.githubusercontent.com -
Looks up external IP address via web service 1 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
flow ioc 3 ip-api.com -
Enumerates processes with tasklist 1 TTPs 1 IoCs
pid Process 1760 tasklist.exe -
Drops file in Windows directory 2 IoCs
description ioc Process File opened for modification C:\Windows\SystemTemp chrome.exe File opened for modification C:\Windows\SystemTemp chrome.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 4 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language XWorm RAT V2.1.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Command Reciever.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language vbc.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cvtres.exe -
Checks SCSI registry key(s) 3 TTPs 9 IoCs
SCSI information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_WDC&Prod_WDS100T2B0A\4&215468a5&0&000000 Taskmgr.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_WDC&Prod_WDS100T2B0A\4&215468a5&0&000000 Taskmgr.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_WDC&Prod_WDS100T2B0A\4&215468a5&0&000000\FriendlyName Taskmgr.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_WDC&Prod_WDS100T2B0A\4&215468a5&0&000000\Properties\{b725f130-47ef-101a-a5f1-02608c9eebac}\000A Taskmgr.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_WDC&Prod_WDS100T2B0A\4&215468a5&0&000000\FriendlyName Taskmgr.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_WDC&Prod_WDS100T2B0A\4&215468a5&0&000000\Properties\{b725f130-47ef-101a-a5f1-02608c9eebac}\000A Taskmgr.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_WDC&Prod_WDS100T2B0A\4&215468a5&0&000000\Properties\{b725f130-47ef-101a-a5f1-02608c9eebac}\000A Taskmgr.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_WDC&Prod_WDS100T2B0A\4&215468a5&0&000000\FriendlyName Taskmgr.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_WDC&Prod_WDS100T2B0A\4&215468a5&0&000000 Taskmgr.exe -
Checks processor information in registry 2 TTPs 4 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key opened \Registry\Machine\HARDWARE\DESCRIPTION\System\CentralProcessor\0 Command Reciever.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz Command Reciever.exe Key opened \REGISTRY\MACHINE\HARDWARE\Description\System\CentralProcessor\0 conhost.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Identifier conhost.exe -
Delays execution with timeout.exe 1 IoCs
pid Process 4032 timeout.exe -
Enumerates system info in registry 2 TTPs 12 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS chrome.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer chrome.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Kills process with taskkill 1 IoCs
pid Process 4304 taskkill.exe -
Modifies data under HKEY_USERS 3 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry chrome.exe Key created \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry chrome.exe Set value (int) \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry\TraceTimeLast = "133829609001025275" chrome.exe -
Modifies registry class 57 IoCs
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-2410826464-2353372766-2364966905-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\10\ComDlg\{5C4F28B5-F869-4E84-8E60-F11DB97C5CC7}\Mode = "4" Command Reciever.exe Key created \REGISTRY\USER\S-1-5-21-2410826464-2353372766-2364966905-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\1\1\1\0 Command Reciever.exe Key created \REGISTRY\USER\S-1-5-21-2410826464-2353372766-2364966905-1000_Classes\WOW6432Node\CLSID\{018D5C66-4533-4307-9B53-224DE2ED1FE6}\Instance\ Command Reciever.exe Key created \REGISTRY\USER\S-1-5-21-2410826464-2353372766-2364966905-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU Command Reciever.exe Set value (int) \REGISTRY\USER\S-1-5-21-2410826464-2353372766-2364966905-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\10\ComDlg\{5C4F28B5-F869-4E84-8E60-F11DB97C5CC7}\IconSize = "16" Command Reciever.exe Set value (int) \REGISTRY\USER\S-1-5-21-2410826464-2353372766-2364966905-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\9\ComDlg\{5C4F28B5-F869-4E84-8E60-F11DB97C5CC7}\IconSize = "16" Command Reciever.exe Key created \REGISTRY\USER\S-1-5-21-2410826464-2353372766-2364966905-1000_Classes\Local Settings Command Reciever.exe Set value (str) \REGISTRY\USER\S-1-5-21-2410826464-2353372766-2364966905-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\9\Shell\SniffedFolderType = "Generic" Command Reciever.exe Set value (data) \REGISTRY\USER\S-1-5-21-2410826464-2353372766-2364966905-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\9\ComDlg\{5C4F28B5-F869-4E84-8E60-F11DB97C5CC7}\ColInfo = 00000000000000000000000000000000fddfdffd100000000000000000000000040000001800000030f125b7ef471a10a5f102608c9eebac0a0000001001000030f125b7ef471a10a5f102608c9eebac0e0000009000000030f125b7ef471a10a5f102608c9eebac040000007800000030f125b7ef471a10a5f102608c9eebac0c00000050000000 Command Reciever.exe Set value (int) \REGISTRY\USER\S-1-5-21-2410826464-2353372766-2364966905-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\9\ComDlg\{5C4F28B5-F869-4E84-8E60-F11DB97C5CC7}\FFlags = "1" Command Reciever.exe Key created \REGISTRY\USER\S-1-5-21-2410826464-2353372766-2364966905-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\1\2 Command Reciever.exe Set value (data) \REGISTRY\USER\S-1-5-21-2410826464-2353372766-2364966905-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\1\MRUListEx = 020000000100000000000000ffffffff Command Reciever.exe Key created \REGISTRY\MACHINE\Software\Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppModel\Deployment\Package\*\S-1-5-21-2410826464-2353372766-2364966905-1000\{111FFEA4-70BB-4BF3-922D-AEC7F29BF3CA} msedge.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{4336a54d-038b-4685-ab02-99bb52d3fb8b}\Instance\ Command Reciever.exe Set value (data) \REGISTRY\USER\S-1-5-21-2410826464-2353372766-2364966905-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\MRUListEx = 0100000000000000ffffffff Command Reciever.exe Set value (str) \REGISTRY\USER\S-1-5-21-2410826464-2353372766-2364966905-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\10\Shell\SniffedFolderType = "Generic" Command Reciever.exe Set value (data) \REGISTRY\USER\S-1-5-21-2410826464-2353372766-2364966905-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\10\ComDlg\{5C4F28B5-F869-4E84-8E60-F11DB97C5CC7}\ColInfo = 00000000000000000000000000000000fddfdffd100000000000000000000000040000001800000030f125b7ef471a10a5f102608c9eebac0a0000001001000030f125b7ef471a10a5f102608c9eebac0e0000009000000030f125b7ef471a10a5f102608c9eebac040000007800000030f125b7ef471a10a5f102608c9eebac0c00000050000000 Command Reciever.exe Set value (int) \REGISTRY\USER\S-1-5-21-2410826464-2353372766-2364966905-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\10\ComDlg\{5C4F28B5-F869-4E84-8E60-F11DB97C5CC7}\GroupByDirection = "1" Command Reciever.exe Key created \REGISTRY\USER\S-1-5-21-2410826464-2353372766-2364966905-1000_Classes\Local Settings OpenWith.exe Set value (int) \REGISTRY\USER\S-1-5-21-2410826464-2353372766-2364966905-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\9\ComDlg\{5C4F28B5-F869-4E84-8E60-F11DB97C5CC7}\FFlags = "1092616257" Command Reciever.exe Set value (data) \REGISTRY\USER\S-1-5-21-2410826464-2353372766-2364966905-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\9\ComDlg\{5C4F28B5-F869-4E84-8E60-F11DB97C5CC7}\Sort = 000000000000000000000000000000000100000030f125b7ef471a10a5f102608c9eebac0a00000001000000 Command Reciever.exe Key created \REGISTRY\USER\S-1-5-21-2410826464-2353372766-2364966905-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\10 Command Reciever.exe Set value (int) \REGISTRY\USER\S-1-5-21-2410826464-2353372766-2364966905-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\10\ComDlg\{5C4F28B5-F869-4E84-8E60-F11DB97C5CC7}\FFlags = "1092616257" Command Reciever.exe Set value (int) \REGISTRY\USER\S-1-5-21-2410826464-2353372766-2364966905-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\10\ComDlg\{5C4F28B5-F869-4E84-8E60-F11DB97C5CC7}\FFlags = "1" Command Reciever.exe Key created \REGISTRY\USER\S-1-5-21-2410826464-2353372766-2364966905-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\9 Command Reciever.exe Set value (int) \REGISTRY\USER\S-1-5-21-2410826464-2353372766-2364966905-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\9\ComDlg\{5C4F28B5-F869-4E84-8E60-F11DB97C5CC7}\GroupView = "0" Command Reciever.exe Key created \REGISTRY\USER\S-1-5-21-2410826464-2353372766-2364966905-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\9\ComDlg Command Reciever.exe Set value (int) \REGISTRY\USER\S-1-5-21-2410826464-2353372766-2364966905-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\9\ComDlg\{5C4F28B5-F869-4E84-8E60-F11DB97C5CC7}\GroupByDirection = "1" Command Reciever.exe Set value (int) \REGISTRY\USER\S-1-5-21-2410826464-2353372766-2364966905-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\10\ComDlg\{5C4F28B5-F869-4E84-8E60-F11DB97C5CC7}\GroupByKey:PID = "0" Command Reciever.exe Key created \REGISTRY\USER\S-1-5-21-2410826464-2353372766-2364966905-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell Command Reciever.exe Key created \REGISTRY\USER\S-1-5-21-2410826464-2353372766-2364966905-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\1\1\1\0\0 Command Reciever.exe Set value (data) \REGISTRY\USER\S-1-5-21-2410826464-2353372766-2364966905-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\10\ComDlg\{5C4F28B5-F869-4E84-8E60-F11DB97C5CC7}\Sort = 000000000000000000000000000000000100000030f125b7ef471a10a5f102608c9eebac0a00000001000000 Command Reciever.exe Key created \REGISTRY\MACHINE\Software\Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppModel\Deployment\Package\*\S-1-5-21-2410826464-2353372766-2364966905-1000\{BB1CB5CE-A169-4D54-95DB-81F18FE160F4} chrome.exe Set value (int) \REGISTRY\USER\S-1-5-21-2410826464-2353372766-2364966905-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\9\ComDlg\{5C4F28B5-F869-4E84-8E60-F11DB97C5CC7}\Mode = "4" Command Reciever.exe Set value (str) \REGISTRY\USER\S-1-5-21-2410826464-2353372766-2364966905-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\9\ComDlg\{5C4F28B5-F869-4E84-8E60-F11DB97C5CC7}\GroupByKey:FMTID = "{00000000-0000-0000-0000-000000000000}" Command Reciever.exe Key created \REGISTRY\USER\S-1-5-21-2410826464-2353372766-2364966905-1000_Classes\Local Settings cmd.exe Key created \REGISTRY\USER\S-1-5-21-2410826464-2353372766-2364966905-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\10\ComDlg\{5C4F28B5-F869-4E84-8E60-F11DB97C5CC7} Command Reciever.exe Set value (int) \REGISTRY\USER\S-1-5-21-2410826464-2353372766-2364966905-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\9\ComDlg\{5C4F28B5-F869-4E84-8E60-F11DB97C5CC7}\LogicalViewMode = "1" Command Reciever.exe Set value (int) \REGISTRY\USER\S-1-5-21-2410826464-2353372766-2364966905-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\1\2\NodeSlot = "10" Command Reciever.exe Set value (data) \REGISTRY\USER\S-1-5-21-2410826464-2353372766-2364966905-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\1\2 = 3a002e803accbfb42cdb4c42b0297fe99a87c641260001002600efbe110000001c31590bae18db01eede71aeb518db01eede71aeb518db0114000000 Command Reciever.exe Key created \REGISTRY\USER\S-1-5-21-2410826464-2353372766-2364966905-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\1 Command Reciever.exe Set value (int) \REGISTRY\USER\S-1-5-21-2410826464-2353372766-2364966905-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\9\ComDlg\{5C4F28B5-F869-4E84-8E60-F11DB97C5CC7}\GroupByKey:PID = "0" Command Reciever.exe Set value (data) \REGISTRY\USER\S-1-5-21-2410826464-2353372766-2364966905-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\NodeSlots = 02020202020202020202 Command Reciever.exe Set value (data) \REGISTRY\USER\S-1-5-21-2410826464-2353372766-2364966905-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\1\2\MRUListEx = ffffffff Command Reciever.exe Key created \REGISTRY\USER\S-1-5-21-2410826464-2353372766-2364966905-1000_Classes\Local Settings calc.exe Set value (data) \REGISTRY\USER\S-1-5-21-2410826464-2353372766-2364966905-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\NodeSlots = 020202020202020202 Command Reciever.exe Key created \REGISTRY\USER\S-1-5-21-2410826464-2353372766-2364966905-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\1\1\1 Command Reciever.exe Key created \REGISTRY\USER\S-1-5-21-2410826464-2353372766-2364966905-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags Command Reciever.exe Key created \REGISTRY\USER\S-1-5-21-2410826464-2353372766-2364966905-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\10\ComDlg Command Reciever.exe Set value (int) \REGISTRY\USER\S-1-5-21-2410826464-2353372766-2364966905-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\10\ComDlg\{5C4F28B5-F869-4E84-8E60-F11DB97C5CC7}\LogicalViewMode = "1" Command Reciever.exe Key created \REGISTRY\USER\S-1-5-21-2410826464-2353372766-2364966905-1000_Classes\Local Settings XWorm.exe Key created \REGISTRY\USER\S-1-5-21-2410826464-2353372766-2364966905-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\9\Shell Command Reciever.exe Key created \REGISTRY\USER\S-1-5-21-2410826464-2353372766-2364966905-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\9\ComDlg\{5C4F28B5-F869-4E84-8E60-F11DB97C5CC7} Command Reciever.exe Set value (int) \REGISTRY\USER\S-1-5-21-2410826464-2353372766-2364966905-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\10\ComDlg\{5C4F28B5-F869-4E84-8E60-F11DB97C5CC7}\GroupView = "0" Command Reciever.exe Set value (str) \REGISTRY\USER\S-1-5-21-2410826464-2353372766-2364966905-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\10\ComDlg\{5C4F28B5-F869-4E84-8E60-F11DB97C5CC7}\GroupByKey:FMTID = "{00000000-0000-0000-0000-000000000000}" Command Reciever.exe Key created \REGISTRY\USER\S-1-5-21-2410826464-2353372766-2364966905-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\1\1 Command Reciever.exe Key created \REGISTRY\USER\S-1-5-21-2410826464-2353372766-2364966905-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\10\Shell Command Reciever.exe -
Modifies registry key 1 TTPs 1 IoCs
pid Process 3428 reg.exe -
NTFS ADS 3 IoCs
description ioc Process File opened for modification C:\Users\Admin\Downloads\XWorm-RAT-main.zip:Zone.Identifier chrome.exe File created C:\Users\Admin\AppData\Local\Temp\Command Reciever.exe\:Zone.Identifier:$DATA XWorm RAT V2.1.exe File created C:\Users\Admin\AppData\Roaming\AdobeUpdate\conhost.exe\:Zone.Identifier:$DATA Command Reciever.exe -
Opens file in notepad (likely ransom note) 4 IoCs
pid Process 2852 NOTEPAD.EXE 1144 NOTEPAD.EXE 1176 NOTEPAD.EXE 3280 NOTEPAD.EXE -
Scheduled Task/Job: Scheduled Task 1 TTPs 3 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 2024 schtasks.exe 4908 schtasks.exe 956 schtasks.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 3884 chrome.exe 3884 chrome.exe 560 Command Reciever.exe 560 Command Reciever.exe 560 Command Reciever.exe 560 Command Reciever.exe 560 Command Reciever.exe 560 Command Reciever.exe 560 Command Reciever.exe 560 Command Reciever.exe 560 Command Reciever.exe 560 Command Reciever.exe 560 Command Reciever.exe 560 Command Reciever.exe 560 Command Reciever.exe 560 Command Reciever.exe 560 Command Reciever.exe 560 Command Reciever.exe 560 Command Reciever.exe 4240 Command Reciever.exe 4240 Command Reciever.exe 4240 Command Reciever.exe 4240 Command Reciever.exe 4240 Command Reciever.exe 4240 Command Reciever.exe 4240 Command Reciever.exe 4240 Command Reciever.exe 4240 Command Reciever.exe 4240 Command Reciever.exe 4240 Command Reciever.exe 4240 Command Reciever.exe 4240 Command Reciever.exe 4240 Command Reciever.exe 4240 Command Reciever.exe 4240 Command Reciever.exe 4240 Command Reciever.exe 4240 Command Reciever.exe 4240 Command Reciever.exe 4240 Command Reciever.exe 4240 Command Reciever.exe 4240 Command Reciever.exe 4240 Command Reciever.exe 1508 conhost.exe 1508 conhost.exe 1508 conhost.exe 1508 conhost.exe 1508 conhost.exe 1508 conhost.exe 1508 conhost.exe 1508 conhost.exe 1508 conhost.exe 1508 conhost.exe 1508 conhost.exe 1508 conhost.exe 1508 conhost.exe 1508 conhost.exe 1508 conhost.exe 1508 conhost.exe 1508 conhost.exe 1508 conhost.exe 1508 conhost.exe 1508 conhost.exe 1508 conhost.exe 1508 conhost.exe -
Suspicious behavior: GetForegroundWindowSpam 2 IoCs
pid Process 4240 Command Reciever.exe 1508 conhost.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 12 IoCs
pid Process 3884 chrome.exe 3884 chrome.exe 3884 chrome.exe 3884 chrome.exe 1892 msedge.exe 1892 msedge.exe 2428 chrome.exe 2428 chrome.exe 2428 chrome.exe 2428 chrome.exe 2952 msedge.exe 2952 msedge.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeShutdownPrivilege 3884 chrome.exe Token: SeCreatePagefilePrivilege 3884 chrome.exe Token: SeShutdownPrivilege 3884 chrome.exe Token: SeCreatePagefilePrivilege 3884 chrome.exe Token: SeShutdownPrivilege 3884 chrome.exe Token: SeCreatePagefilePrivilege 3884 chrome.exe Token: SeShutdownPrivilege 3884 chrome.exe Token: SeCreatePagefilePrivilege 3884 chrome.exe Token: SeShutdownPrivilege 3884 chrome.exe Token: SeCreatePagefilePrivilege 3884 chrome.exe Token: SeShutdownPrivilege 3884 chrome.exe Token: SeCreatePagefilePrivilege 3884 chrome.exe Token: SeShutdownPrivilege 3884 chrome.exe Token: SeCreatePagefilePrivilege 3884 chrome.exe Token: SeShutdownPrivilege 3884 chrome.exe Token: SeCreatePagefilePrivilege 3884 chrome.exe Token: SeShutdownPrivilege 3884 chrome.exe Token: SeCreatePagefilePrivilege 3884 chrome.exe Token: SeShutdownPrivilege 3884 chrome.exe Token: SeCreatePagefilePrivilege 3884 chrome.exe Token: SeShutdownPrivilege 3884 chrome.exe Token: SeCreatePagefilePrivilege 3884 chrome.exe Token: SeShutdownPrivilege 3884 chrome.exe Token: SeCreatePagefilePrivilege 3884 chrome.exe Token: SeShutdownPrivilege 3884 chrome.exe Token: SeCreatePagefilePrivilege 3884 chrome.exe Token: SeShutdownPrivilege 3884 chrome.exe Token: SeCreatePagefilePrivilege 3884 chrome.exe Token: SeShutdownPrivilege 3884 chrome.exe Token: SeCreatePagefilePrivilege 3884 chrome.exe Token: SeShutdownPrivilege 3884 chrome.exe Token: SeCreatePagefilePrivilege 3884 chrome.exe Token: SeShutdownPrivilege 3884 chrome.exe Token: SeCreatePagefilePrivilege 3884 chrome.exe Token: SeShutdownPrivilege 3884 chrome.exe Token: SeCreatePagefilePrivilege 3884 chrome.exe Token: SeShutdownPrivilege 3884 chrome.exe Token: SeCreatePagefilePrivilege 3884 chrome.exe Token: SeShutdownPrivilege 3884 chrome.exe Token: SeCreatePagefilePrivilege 3884 chrome.exe Token: SeShutdownPrivilege 3884 chrome.exe Token: SeCreatePagefilePrivilege 3884 chrome.exe Token: SeShutdownPrivilege 3884 chrome.exe Token: SeCreatePagefilePrivilege 3884 chrome.exe Token: SeShutdownPrivilege 3884 chrome.exe Token: SeCreatePagefilePrivilege 3884 chrome.exe Token: SeShutdownPrivilege 3884 chrome.exe Token: SeCreatePagefilePrivilege 3884 chrome.exe Token: SeShutdownPrivilege 3884 chrome.exe Token: SeCreatePagefilePrivilege 3884 chrome.exe Token: SeShutdownPrivilege 3884 chrome.exe Token: SeCreatePagefilePrivilege 3884 chrome.exe Token: SeShutdownPrivilege 3884 chrome.exe Token: SeCreatePagefilePrivilege 3884 chrome.exe Token: SeShutdownPrivilege 3884 chrome.exe Token: SeCreatePagefilePrivilege 3884 chrome.exe Token: SeShutdownPrivilege 3884 chrome.exe Token: SeCreatePagefilePrivilege 3884 chrome.exe Token: SeShutdownPrivilege 3884 chrome.exe Token: SeCreatePagefilePrivilege 3884 chrome.exe Token: SeShutdownPrivilege 3884 chrome.exe Token: SeCreatePagefilePrivilege 3884 chrome.exe Token: SeShutdownPrivilege 3884 chrome.exe Token: SeCreatePagefilePrivilege 3884 chrome.exe -
Suspicious use of FindShellTrayWindow 64 IoCs
pid Process 3884 chrome.exe 3884 chrome.exe 3884 chrome.exe 3884 chrome.exe 3884 chrome.exe 3884 chrome.exe 3884 chrome.exe 3884 chrome.exe 3884 chrome.exe 3884 chrome.exe 3884 chrome.exe 3884 chrome.exe 3884 chrome.exe 3884 chrome.exe 3884 chrome.exe 3884 chrome.exe 3884 chrome.exe 3884 chrome.exe 3884 chrome.exe 3884 chrome.exe 3884 chrome.exe 3884 chrome.exe 3884 chrome.exe 3884 chrome.exe 3884 chrome.exe 3884 chrome.exe 3884 chrome.exe 3884 chrome.exe 3884 chrome.exe 3884 chrome.exe 3884 chrome.exe 3884 chrome.exe 3884 chrome.exe 3884 chrome.exe 3884 chrome.exe 3884 chrome.exe 3884 chrome.exe 3884 chrome.exe 3884 chrome.exe 3884 chrome.exe 3884 chrome.exe 3884 chrome.exe 3884 chrome.exe 3884 chrome.exe 3884 chrome.exe 3884 chrome.exe 3884 chrome.exe 3884 chrome.exe 3884 chrome.exe 3884 chrome.exe 3884 chrome.exe 3884 chrome.exe 3884 chrome.exe 3884 chrome.exe 3884 chrome.exe 3884 chrome.exe 3884 chrome.exe 3884 chrome.exe 3884 chrome.exe 3884 chrome.exe 3884 chrome.exe 4240 Command Reciever.exe 1892 msedge.exe 1892 msedge.exe -
Suspicious use of SendNotifyMessage 64 IoCs
pid Process 3884 chrome.exe 3884 chrome.exe 3884 chrome.exe 3884 chrome.exe 3884 chrome.exe 3884 chrome.exe 3884 chrome.exe 3884 chrome.exe 3884 chrome.exe 3884 chrome.exe 3884 chrome.exe 3884 chrome.exe 3884 chrome.exe 3884 chrome.exe 3884 chrome.exe 3884 chrome.exe 4240 Command Reciever.exe 1892 msedge.exe 1892 msedge.exe 1892 msedge.exe 1892 msedge.exe 1892 msedge.exe 1892 msedge.exe 1892 msedge.exe 1892 msedge.exe 1892 msedge.exe 1892 msedge.exe 1892 msedge.exe 1892 msedge.exe 3744 Taskmgr.exe 3744 Taskmgr.exe 3744 Taskmgr.exe 3744 Taskmgr.exe 3744 Taskmgr.exe 3744 Taskmgr.exe 3744 Taskmgr.exe 3744 Taskmgr.exe 3744 Taskmgr.exe 3744 Taskmgr.exe 3744 Taskmgr.exe 3744 Taskmgr.exe 3744 Taskmgr.exe 3744 Taskmgr.exe 3744 Taskmgr.exe 3744 Taskmgr.exe 3744 Taskmgr.exe 3744 Taskmgr.exe 3744 Taskmgr.exe 3744 Taskmgr.exe 3744 Taskmgr.exe 3744 Taskmgr.exe 3744 Taskmgr.exe 3744 Taskmgr.exe 3744 Taskmgr.exe 3744 Taskmgr.exe 3744 Taskmgr.exe 3744 Taskmgr.exe 3744 Taskmgr.exe 3744 Taskmgr.exe 3744 Taskmgr.exe 3744 Taskmgr.exe 3744 Taskmgr.exe 3744 Taskmgr.exe 3744 Taskmgr.exe -
Suspicious use of SetWindowsHookEx 4 IoCs
pid Process 1508 conhost.exe 4240 Command Reciever.exe 832 OpenWith.exe 3180 OpenWith.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 4956 wrote to memory of 2852 4956 cmd.exe 78 PID 4956 wrote to memory of 2852 4956 cmd.exe 78 PID 3884 wrote to memory of 276 3884 chrome.exe 82 PID 3884 wrote to memory of 276 3884 chrome.exe 82 PID 3884 wrote to memory of 2584 3884 chrome.exe 83 PID 3884 wrote to memory of 2584 3884 chrome.exe 83 PID 3884 wrote to memory of 2584 3884 chrome.exe 83 PID 3884 wrote to memory of 2584 3884 chrome.exe 83 PID 3884 wrote to memory of 2584 3884 chrome.exe 83 PID 3884 wrote to memory of 2584 3884 chrome.exe 83 PID 3884 wrote to memory of 2584 3884 chrome.exe 83 PID 3884 wrote to memory of 2584 3884 chrome.exe 83 PID 3884 wrote to memory of 2584 3884 chrome.exe 83 PID 3884 wrote to memory of 2584 3884 chrome.exe 83 PID 3884 wrote to memory of 2584 3884 chrome.exe 83 PID 3884 wrote to memory of 2584 3884 chrome.exe 83 PID 3884 wrote to memory of 2584 3884 chrome.exe 83 PID 3884 wrote to memory of 2584 3884 chrome.exe 83 PID 3884 wrote to memory of 2584 3884 chrome.exe 83 PID 3884 wrote to memory of 2584 3884 chrome.exe 83 PID 3884 wrote to memory of 2584 3884 chrome.exe 83 PID 3884 wrote to memory of 2584 3884 chrome.exe 83 PID 3884 wrote to memory of 2584 3884 chrome.exe 83 PID 3884 wrote to memory of 2584 3884 chrome.exe 83 PID 3884 wrote to memory of 2584 3884 chrome.exe 83 PID 3884 wrote to memory of 2584 3884 chrome.exe 83 PID 3884 wrote to memory of 2584 3884 chrome.exe 83 PID 3884 wrote to memory of 2584 3884 chrome.exe 83 PID 3884 wrote to memory of 2584 3884 chrome.exe 83 PID 3884 wrote to memory of 2584 3884 chrome.exe 83 PID 3884 wrote to memory of 2584 3884 chrome.exe 83 PID 3884 wrote to memory of 2584 3884 chrome.exe 83 PID 3884 wrote to memory of 2584 3884 chrome.exe 83 PID 3884 wrote to memory of 2584 3884 chrome.exe 83 PID 3884 wrote to memory of 3396 3884 chrome.exe 84 PID 3884 wrote to memory of 3396 3884 chrome.exe 84 PID 3884 wrote to memory of 4304 3884 chrome.exe 85 PID 3884 wrote to memory of 4304 3884 chrome.exe 85 PID 3884 wrote to memory of 4304 3884 chrome.exe 85 PID 3884 wrote to memory of 4304 3884 chrome.exe 85 PID 3884 wrote to memory of 4304 3884 chrome.exe 85 PID 3884 wrote to memory of 4304 3884 chrome.exe 85 PID 3884 wrote to memory of 4304 3884 chrome.exe 85 PID 3884 wrote to memory of 4304 3884 chrome.exe 85 PID 3884 wrote to memory of 4304 3884 chrome.exe 85 PID 3884 wrote to memory of 4304 3884 chrome.exe 85 PID 3884 wrote to memory of 4304 3884 chrome.exe 85 PID 3884 wrote to memory of 4304 3884 chrome.exe 85 PID 3884 wrote to memory of 4304 3884 chrome.exe 85 PID 3884 wrote to memory of 4304 3884 chrome.exe 85 PID 3884 wrote to memory of 4304 3884 chrome.exe 85 PID 3884 wrote to memory of 4304 3884 chrome.exe 85 PID 3884 wrote to memory of 4304 3884 chrome.exe 85 PID 3884 wrote to memory of 4304 3884 chrome.exe 85 PID 3884 wrote to memory of 4304 3884 chrome.exe 85 PID 3884 wrote to memory of 4304 3884 chrome.exe 85 PID 3884 wrote to memory of 4304 3884 chrome.exe 85 PID 3884 wrote to memory of 4304 3884 chrome.exe 85 PID 3884 wrote to memory of 4304 3884 chrome.exe 85 PID 3884 wrote to memory of 4304 3884 chrome.exe 85 PID 3884 wrote to memory of 4304 3884 chrome.exe 85 PID 3884 wrote to memory of 4304 3884 chrome.exe 85 PID 3884 wrote to memory of 4304 3884 chrome.exe 85 PID 3884 wrote to memory of 4304 3884 chrome.exe 85 -
System policy modification 1 TTPs 2 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System XWorm.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" XWorm.exe -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
Processes
-
C:\Windows\system32\cmd.execmd /c C:\Users\Admin\AppData\Local\Temp\test.txt1⤵
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:4956 -
C:\Windows\system32\NOTEPAD.EXE"C:\Windows\system32\NOTEPAD.EXE" C:\Users\Admin\AppData\Local\Temp\test.txt2⤵
- Opens file in notepad (likely ransom note)
PID:2852
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe"1⤵
- Drops file in Windows directory
- Enumerates system info in registry
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:3884 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:4 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=123.0.6312.123 --initial-client-data=0xfc,0x100,0x104,0xe4,0x108,0x7ff9e3b6cc40,0x7ff9e3b6cc4c,0x7ff9e3b6cc582⤵PID:276
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --no-appcompat-clear --gpu-preferences=WAAAAAAAAADgAAAMAAAAAAAAAAAAAAAAAABgAAEAAAA4AAAAAAAAAAAAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAGAAAAAAAAAAYAAAAAAAAAAgAAAAAAAAACAAAAAAAAAAIAAAAAAAAAA== --field-trial-handle=1808,i,3512516102527043933,9917919961926476333,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=1804 /prefetch:22⤵PID:2584
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --no-appcompat-clear --field-trial-handle=2096,i,3512516102527043933,9917919961926476333,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=2100 /prefetch:32⤵PID:3396
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=service --no-appcompat-clear --field-trial-handle=2172,i,3512516102527043933,9917919961926476333,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=2208 /prefetch:82⤵PID:4304
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --field-trial-handle=3204,i,3512516102527043933,9917919961926476333,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=3192 /prefetch:12⤵PID:4948
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --field-trial-handle=3220,i,3512516102527043933,9917919961926476333,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=3364 /prefetch:12⤵PID:4072
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --field-trial-handle=3552,i,3512516102527043933,9917919961926476333,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=4308 /prefetch:12⤵PID:4244
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --field-trial-handle=4948,i,3512516102527043933,9917919961926476333,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=4864 /prefetch:12⤵PID:4672
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --no-appcompat-clear --field-trial-handle=3336,i,3512516102527043933,9917919961926476333,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=5076 /prefetch:82⤵PID:4768
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.ProcessorMetrics --lang=en-US --service-sandbox-type=none --no-appcompat-clear --field-trial-handle=5100,i,3512516102527043933,9917919961926476333,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=4936 /prefetch:82⤵PID:704
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --no-appcompat-clear --field-trial-handle=3380,i,3512516102527043933,9917919961926476333,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=4684 /prefetch:82⤵PID:5088
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=quarantine.mojom.Quarantine --lang=en-US --service-sandbox-type=none --no-appcompat-clear --field-trial-handle=5172,i,3512516102527043933,9917919961926476333,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=4332 /prefetch:82⤵
- NTFS ADS
PID:4308
-
-
C:\Program Files\Google\Chrome\Application\123.0.6312.123\elevation_service.exe"C:\Program Files\Google\Chrome\Application\123.0.6312.123\elevation_service.exe"1⤵PID:2056
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k LocalSystemNetworkRestricted -p -s NgcSvc1⤵PID:2500
-
C:\Windows\System32\rundll32.exeC:\Windows\System32\rundll32.exe C:\Windows\System32\shell32.dll,SHCreateLocalServerRunDll {9aa46009-3ce0-458a-a354-715610a075e6} -Embedding1⤵PID:3064
-
C:\Users\Admin\Downloads\XWorm-RAT-main\XWorm-RAT-main\XWorm RAT V2.1\XWorm RAT V2.1.exe"C:\Users\Admin\Downloads\XWorm-RAT-main\XWorm-RAT-main\XWorm RAT V2.1\XWorm RAT V2.1.exe"1⤵
- System Location Discovery: System Language Discovery
- NTFS ADS
PID:1116 -
C:\Users\Admin\Downloads\XWorm-RAT-main\XWorm-RAT-main\XWorm RAT V2.1\Command Reciever.exe"C:\Users\Admin\Downloads\XWorm-RAT-main\XWorm-RAT-main\XWorm RAT V2.1\Command Reciever.exe"2⤵
- System Location Discovery: System Language Discovery
- Checks processor information in registry
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of SetWindowsHookEx
PID:4240 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exe" /noconfig @"C:\Users\Admin\AppData\Local\Temp\0oxobg2n\0oxobg2n.cmdline"3⤵
- System Location Discovery: System Language Discovery
PID:3136 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exeC:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exe /NOLOGO /READONLY /MACHINE:IX86 "/OUT:C:\Users\Admin\AppData\Local\Temp\RESB82B.tmp" "C:\Users\Admin\AppData\Local\Temp\vbcA8D3B265ADDE41558B7BD1AEBDBAFFB7.TMP"4⤵
- System Location Discovery: System Language Discovery
PID:4468
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\Command Reciever.exe"C:\Users\Admin\AppData\Local\Temp\Command Reciever.exe"2⤵
- Executes dropped EXE
- Loads dropped DLL
- NTFS ADS
- Suspicious behavior: EnumeratesProcesses
PID:560 -
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /C C:\Users\Admin\AppData\Local\Temp\tmpAC48.tmp.bat & Del C:\Users\Admin\AppData\Local\Temp\tmpAC48.tmp.bat3⤵PID:3152
-
C:\Windows\system32\chcp.comchcp 650014⤵PID:3560
-
-
C:\Windows\system32\tasklist.exeTasklist /fi "PID eq 560"4⤵
- Enumerates processes with tasklist
PID:1760
-
-
C:\Windows\system32\find.exefind ":"4⤵PID:2504
-
-
C:\Windows\system32\timeout.exeTimeout /T 1 /Nobreak4⤵
- Delays execution with timeout.exe
PID:4032
-
-
C:\Users\Admin\AppData\Roaming\AdobeUpdate\conhost.exe"C:\Users\Admin\AppData\Roaming\AdobeUpdate\conhost.exe"4⤵
- Executes dropped EXE
- Loads dropped DLL
- Checks processor information in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of SetWindowsHookEx
PID:1508 -
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c reg add HKCU\Software\Microsoft\Windows\CurrentVersion\Run /v ChromeUpdate /t REG_SZ /d C:\Users\Admin\AppData\Roaming\AdobeUpdate\conhost.exe /f5⤵PID:1892
-
C:\Windows\system32\reg.exereg add HKCU\Software\Microsoft\Windows\CurrentVersion\Run /v ChromeUpdate /t REG_SZ /d C:\Users\Admin\AppData\Roaming\AdobeUpdate\conhost.exe /f6⤵
- Adds Run key to start application
- Modifies registry key
PID:3428
-
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --remote-debugging-port=9222 --user-data-dir="C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --profile-directory="Default" --headless --no-sandbox --disable-gpu5⤵
- Uses browser remote debugging
PID:3116 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=90.0.4430.212 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=90.0.818.66 --initial-client-data=0x130,0x134,0x138,0x10c,0x13c,0x7ff9cb253cb8,0x7ff9cb253cc8,0x7ff9cb253cd86⤵PID:3264
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=1460,12915631562615567458,10027608410207997144,131072 --no-sandbox --headless --headless --gpu-preferences=SAAAAAAAAADgAAAwAAAAAAAAAAAAAAAAAABgAAAAAAAoAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAB4AAAAAAAAAHgAAAAAAAAAKAAAAAQAAAAgAAAAAAAAACgAAAAAAAAAMAAAAAAAAAA4AAAAAAAAABAAAAAAAAAAAAAAAAUAAAAQAAAAAAAAAAAAAAAGAAAAEAAAAAAAAAABAAAABQAAABAAAAAAAAAAAQAAAAYAAAAIAAAAAAAAAAgAAAAAAAAA --use-gl=swiftshader-webgl --override-use-software-gl-for-tests --mojo-platform-channel-handle=1480 /prefetch:26⤵
- Modifies registry class
PID:4092
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=1460,12915631562615567458,10027608410207997144,131072 --lang=en-US --service-sandbox-type=none --no-sandbox --use-gl=swiftshader-webgl --headless --mojo-platform-channel-handle=1624 /prefetch:36⤵PID:3592
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --no-sandbox --remote-debugging-port=9222 --allow-pre-commit-input --field-trial-handle=1460,12915631562615567458,10027608410207997144,131072 --disable-gpu-compositing --lang=en-US --headless --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=4 --mojo-platform-channel-handle=1864 /prefetch:16⤵
- Uses browser remote debugging
PID:1532
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --no-sandbox --remote-debugging-port=9222 --allow-pre-commit-input --field-trial-handle=1460,12915631562615567458,10027608410207997144,131072 --disable-gpu-compositing --lang=en-US --headless --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --mojo-platform-channel-handle=2144 /prefetch:16⤵
- Uses browser remote debugging
PID:648
-
-
-
-
-
-
C:\Windows\system32\wbem\WmiApSrv.exeC:\Windows\system32\wbem\WmiApSrv.exe1⤵PID:3136
-
C:\Users\Admin\Desktop\XWorm.exe"C:\Users\Admin\Desktop\XWorm.exe"1⤵
- UAC bypass
- Disables RegEdit via registry modification
- Drops startup file
- Executes dropped EXE
- Adds Run key to start application
- Checks whether UAC is enabled
- Modifies registry class
- System policy modification
PID:4796 -
C:\Windows\System32\schtasks.exe"C:\Windows\System32\schtasks.exe" /create /sc minute /mo 1 /tn "XWorm" /tr "C:\Users\Admin\AppData\Roaming\XWorm.exe"2⤵
- Scheduled Task/Job: Scheduled Task
PID:4908
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument http://www.google.com/2⤵
- Enumerates system info in registry
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
PID:1892 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=90.0.4430.212 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=90.0.818.66 --initial-client-data=0x120,0x124,0x128,0xfc,0x12c,0x7ff9cb253cb8,0x7ff9cb253cc8,0x7ff9cb253cd83⤵PID:488
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=1928,9862978980118725901,10287226036666592885,131072 --gpu-preferences=SAAAAAAAAADgAAAwAAAAAAAAAAAAAAAAAABgAAAAAAAoAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAB4AAAAAAAAAHgAAAAAAAAAKAAAAAQAAAAgAAAAAAAAACgAAAAAAAAAMAAAAAAAAAA4AAAAAAAAABAAAAAAAAAAAAAAAAUAAAAQAAAAAAAAAAAAAAAGAAAAEAAAAAAAAAABAAAABQAAABAAAAAAAAAAAQAAAAYAAAAIAAAAAAAAAAgAAAAAAAAA --mojo-platform-channel-handle=1940 /prefetch:23⤵PID:4720
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=1928,9862978980118725901,10287226036666592885,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2344 /prefetch:33⤵PID:4304
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=1928,9862978980118725901,10287226036666592885,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2768 /prefetch:83⤵PID:2068
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1928,9862978980118725901,10287226036666592885,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3232 /prefetch:13⤵PID:4064
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1928,9862978980118725901,10287226036666592885,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3264 /prefetch:13⤵PID:3960
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --field-trial-handle=1928,9862978980118725901,10287226036666592885,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=3620 /prefetch:83⤵PID:2916
-
-
-
C:\Windows\SYSTEM32\cmd.execmd.exe /c calc2⤵PID:1452
-
C:\Windows\system32\calc.execalc3⤵
- Modifies registry class
PID:4396
-
-
-
C:\Windows\SYSTEM32\taskkill.exe"taskkill.exe" /pid 0 /f2⤵
- Kills process with taskkill
PID:4304
-
-
C:\Windows\SYSTEM32\CMD.EXE"CMD.EXE"2⤵PID:696
-
C:\Windows\system32\whoami.exewhoami3⤵PID:3068
-
-
-
C:\Windows\System32\schtasks.exe"C:\Windows\System32\schtasks.exe" /create /sc minute /mo 1 /tn "XWorm" /tr "C:\Users\Admin\AppData\Roaming\XWorm.exe"2⤵
- Scheduled Task/Job: Scheduled Task
PID:956
-
-
C:\Users\Admin\AppData\Roaming\XWorm.exeC:\Users\Admin\AppData\Roaming\XWorm.exe1⤵
- Executes dropped EXE
PID:1444
-
C:\Windows\system32\AUDIODG.EXEC:\Windows\system32\AUDIODG.EXE 0x000000000000047C 0x000000000000048C1⤵PID:3756
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:3136
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:868
-
C:\Windows\system32\OpenWith.exeC:\Windows\system32\OpenWith.exe -Embedding1⤵
- Suspicious use of SetWindowsHookEx
PID:832
-
C:\Windows\System32\Taskmgr.exe"C:\Windows\System32\Taskmgr.exe"1⤵
- Checks SCSI registry key(s)
- Suspicious use of SendNotifyMessage
PID:3744
-
C:\Users\Admin\AppData\Roaming\XWorm.exeC:\Users\Admin\AppData\Roaming\XWorm.exe1⤵
- Executes dropped EXE
PID:4308
-
C:\Windows\System32\Taskmgr.exe"C:\Windows\System32\Taskmgr.exe"1⤵
- Checks SCSI registry key(s)
PID:3400
-
C:\Windows\System32\Taskmgr.exe"C:\Windows\System32\Taskmgr.exe"1⤵PID:3196
-
C:\Users\Admin\AppData\Roaming\XWorm.exeC:\Users\Admin\AppData\Roaming\XWorm.exe1⤵
- Executes dropped EXE
PID:724
-
C:\Users\Admin\AppData\Roaming\XWorm.exeC:\Users\Admin\AppData\Roaming\XWorm.exe1⤵
- Executes dropped EXE
PID:4956
-
C:\Users\Admin\AppData\Roaming\XWorm.exeC:\Users\Admin\AppData\Roaming\XWorm.exe1⤵
- Executes dropped EXE
PID:3064
-
C:\Windows\system32\NOTEPAD.EXE"C:\Windows\system32\NOTEPAD.EXE" C:\Users\Admin\Desktop\doc.txt1⤵
- Opens file in notepad (likely ransom note)
PID:1144
-
C:\Windows\system32\OpenWith.exeC:\Windows\system32\OpenWith.exe -Embedding1⤵
- Modifies registry class
- Suspicious use of SetWindowsHookEx
PID:3180
-
C:\Users\Admin\AppData\Roaming\XWorm.exeC:\Users\Admin\AppData\Roaming\XWorm.exe1⤵
- Executes dropped EXE
PID:2600
-
C:\Windows\system32\NOTEPAD.EXE"C:\Windows\system32\NOTEPAD.EXE" C:\Users\Admin\Desktop\test.txt1⤵
- Opens file in notepad (likely ransom note)
PID:1176
-
C:\Windows\system32\NOTEPAD.EXE"C:\Windows\system32\NOTEPAD.EXE" C:\Users\Admin\Desktop\test.txt1⤵
- Opens file in notepad (likely ransom note)
PID:3280
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe"1⤵
- Drops file in Windows directory
- Enumerates system info in registry
- Modifies data under HKEY_USERS
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
PID:2428 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:4 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=123.0.6312.123 --initial-client-data=0x100,0x104,0x108,0xd8,0x10c,0x7ff9e3b6cc40,0x7ff9e3b6cc4c,0x7ff9e3b6cc582⤵PID:3632
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --no-appcompat-clear --gpu-preferences=WAAAAAAAAADgAAAMAAAAAAAAAAAAAAAAAABgAAEAAAA4AAAAAAAAAAAAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAGAAAAAAAAAAYAAAAAAAAAAgAAAAAAAAACAAAAAAAAAAIAAAAAAAAAA== --field-trial-handle=1852,i,2573966777827005395,10062099850276096719,262144 --variations-seed-version=20250131-130103.379000 --mojo-platform-channel-handle=1848 /prefetch:22⤵PID:4644
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --no-appcompat-clear --field-trial-handle=2116,i,2573966777827005395,10062099850276096719,262144 --variations-seed-version=20250131-130103.379000 --mojo-platform-channel-handle=2136 /prefetch:32⤵PID:2244
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=service --no-appcompat-clear --field-trial-handle=2208,i,2573966777827005395,10062099850276096719,262144 --variations-seed-version=20250131-130103.379000 --mojo-platform-channel-handle=2224 /prefetch:82⤵PID:5028
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --field-trial-handle=3128,i,2573966777827005395,10062099850276096719,262144 --variations-seed-version=20250131-130103.379000 --mojo-platform-channel-handle=3212 /prefetch:12⤵PID:2536
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --field-trial-handle=3216,i,2573966777827005395,10062099850276096719,262144 --variations-seed-version=20250131-130103.379000 --mojo-platform-channel-handle=3252 /prefetch:12⤵PID:4960
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --field-trial-handle=4492,i,2573966777827005395,10062099850276096719,262144 --variations-seed-version=20250131-130103.379000 --mojo-platform-channel-handle=4484 /prefetch:12⤵PID:3848
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.ProcessorMetrics --lang=en-US --service-sandbox-type=none --no-appcompat-clear --field-trial-handle=4764,i,2573966777827005395,10062099850276096719,262144 --variations-seed-version=20250131-130103.379000 --mojo-platform-channel-handle=4776 /prefetch:82⤵PID:1068
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --no-appcompat-clear --field-trial-handle=4796,i,2573966777827005395,10062099850276096719,262144 --variations-seed-version=20250131-130103.379000 --mojo-platform-channel-handle=4924 /prefetch:82⤵PID:968
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --field-trial-handle=5032,i,2573966777827005395,10062099850276096719,262144 --variations-seed-version=20250131-130103.379000 --mojo-platform-channel-handle=5044 /prefetch:12⤵PID:3188
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=audio.mojom.AudioService --lang=en-US --service-sandbox-type=audio --no-appcompat-clear --field-trial-handle=3484,i,2573966777827005395,10062099850276096719,262144 --variations-seed-version=20250131-130103.379000 --mojo-platform-channel-handle=5016 /prefetch:82⤵PID:1636
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=video_capture.mojom.VideoCaptureService --lang=en-US --service-sandbox-type=none --no-appcompat-clear --field-trial-handle=3388,i,2573966777827005395,10062099850276096719,262144 --variations-seed-version=20250131-130103.379000 --mojo-platform-channel-handle=3380 /prefetch:82⤵
- Modifies registry class
PID:4820
-
-
C:\Program Files\Google\Chrome\Application\123.0.6312.123\elevation_service.exe"C:\Program Files\Google\Chrome\Application\123.0.6312.123\elevation_service.exe"1⤵PID:3140
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k LocalSystemNetworkRestricted -p -s NgcSvc1⤵PID:1036
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k LocalServiceNetworkRestricted -p -s NgcCtnrSvc1⤵PID:4516
-
C:\Users\Admin\AppData\Roaming\XWorm.exeC:\Users\Admin\AppData\Roaming\XWorm.exe1⤵
- Executes dropped EXE
PID:2600
-
C:\Users\Admin\AppData\Roaming\XWorm.exeC:\Users\Admin\AppData\Roaming\XWorm.exe1⤵
- Executes dropped EXE
PID:4064
-
C:\Users\Admin\AppData\Roaming\XWorm.exeC:\Users\Admin\AppData\Roaming\XWorm.exe1⤵
- Executes dropped EXE
PID:2920
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument http://taskmgfr/1⤵
- Enumerates system info in registry
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
PID:2952 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=90.0.4430.212 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=90.0.818.66 --initial-client-data=0x100,0x104,0x108,0xdc,0x10c,0x7ff9cb253cb8,0x7ff9cb253cc8,0x7ff9cb253cd82⤵PID:3164
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=1900,4582452192931158082,1579416846971337557,131072 --gpu-preferences=SAAAAAAAAADgAAAwAAAAAAAAAAAAAAAAAABgAAAAAAAoAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAB4AAAAAAAAAHgAAAAAAAAAKAAAAAQAAAAgAAAAAAAAACgAAAAAAAAAMAAAAAAAAAA4AAAAAAAAABAAAAAAAAAAAAAAAAUAAAAQAAAAAAAAAAAAAAAGAAAAEAAAAAAAAAABAAAABQAAABAAAAAAAAAAAQAAAAYAAAAIAAAAAAAAAAgAAAAAAAAA --mojo-platform-channel-handle=1916 /prefetch:22⤵PID:5104
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=1900,4582452192931158082,1579416846971337557,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2400 /prefetch:32⤵PID:1532
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=1900,4582452192931158082,1579416846971337557,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2732 /prefetch:82⤵PID:4276
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1900,4582452192931158082,1579416846971337557,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3156 /prefetch:12⤵PID:3320
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1900,4582452192931158082,1579416846971337557,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3176 /prefetch:12⤵PID:4524
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:1544
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:3288
-
C:\Windows\System32\Taskmgr.exe"C:\Windows\System32\Taskmgr.exe"1⤵PID:3372
-
C:\Windows\System32\Taskmgr.exe"C:\Windows\System32\Taskmgr.exe"1⤵
- Checks SCSI registry key(s)
PID:1588
-
C:\Users\Admin\Desktop\lol.exe"C:\Users\Admin\Desktop\lol.exe"1⤵
- Drops startup file
- Executes dropped EXE
- Adds Run key to start application
PID:396 -
C:\Windows\System32\schtasks.exe"C:\Windows\System32\schtasks.exe" /create /sc minute /mo 1 /tn "lol" /tr "C:\Users\Admin\AppData\Roaming\lol.exe"2⤵
- Scheduled Task/Job: Scheduled Task
PID:2024
-
-
C:\Users\Admin\AppData\Roaming\lol.exeC:\Users\Admin\AppData\Roaming\lol.exe1⤵
- Executes dropped EXE
PID:3988
-
C:\Users\Admin\AppData\Roaming\XWorm.exeC:\Users\Admin\AppData\Roaming\XWorm.exe1⤵
- Executes dropped EXE
PID:3112
Network
MITRE ATT&CK Enterprise v15
Execution
Command and Scripting Interpreter
1Scheduled Task/Job
1Scheduled Task
1Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Modify Authentication Process
1Scheduled Task/Job
1Scheduled Task
1Privilege Escalation
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Scheduled Task/Job
1Scheduled Task
1Defense Evasion
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Impair Defenses
1Disable or Modify Tools
1Modify Authentication Process
1Modify Registry
4Credential Access
Credentials from Password Stores
1Credentials from Web Browsers
1Modify Authentication Process
1Steal Web Session Cookie
1Unsecured Credentials
1Credentials In Files
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
64KB
MD5c27c1374edd5b819ac9f67c91d286373
SHA16768048f19f4dd2a3ab401e9f0b57570601f24a8
SHA256a2d78e1e44733d24842f4e3a4fb86abd35219df6f6e90393c59abe99e1bb9ec0
SHA51282bda0747e2e965f9e7a24ae494342af3f96043609eee38db74d18a3da0ddb0c2dabbb23c3f9223e5d0e89256b0b7a4ae0a0537966dd57a181a4505ad8a462c3
-
Filesize
4B
MD5f49655f856acb8884cc0ace29216f511
SHA1cb0f1f87ec0455ec349aaa950c600475ac7b7b6b
SHA2567852fce59c67ddf1d6b8b997eaa1adfac004a9f3a91c37295de9223674011fba
SHA512599e93d25b174524495ed29653052b3590133096404873318f05fd68f4c9a5c9a3b30574551141fbb73d7329d6be342699a17f3ae84554bab784776dfda2d5f8
-
Filesize
960B
MD54f55be8451c1090c2a54a50d79243cfb
SHA1f1a94bc446b6ae32300ada858fb251667a17b71d
SHA2561b8257869915ac04445cb4bfdc0e0fc03db80efb96da98c49e7cbc4097bc28a2
SHA512b87403fc4ab05cd4dd092d0707cd0dd22f927c65dcf73bce6f6bf2731f0572e089697908eeb377617c9f2531fdb3a495087feafb31871ea9a6f472a45d9d20f6
-
Filesize
236KB
MD5c1b1c665b093f41d3b897d9c20d3bcb5
SHA1856094fdd2d19312af7485a9746e84c987da68ea
SHA2568d3ca4821c456161c667c61aab8fe927b8c9ad318b107e1599c9ce6f9590bc3e
SHA512bfccb98839e2e2f9010919de4aef654b8c836e100238ff5c032bb83f2448fc7f2b08293a127fc4c65f1a6b2bd4d96bb591ddf4bdc33504b0b310a045c7a2c518
-
Filesize
40B
MD5405dd156f0b697f2d0702afedb827b80
SHA141e7bd95b48a39edd67e751abf94c92b6617271a
SHA256a764eb30b54d11ded5b23807bca8dee0a2a36b921de032d8923b11b5eb835e77
SHA512981f35b0c8c9261a4ad7c6c4cf01c5e062f510c7e58affeea3d541510a8bff28f124a0a0142ced89502b4540b50161d201e61a5a0ba08b7504cb6560f5627d4b
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\5c59bbdc-3aa5-497c-a0d6-ebfa7b1e3a0b.tmp
Filesize1B
MD55058f1af8388633f609cadb75a75dc9d
SHA13a52ce780950d4d969792a2559cd519d7ee8c727
SHA256cdb4ee2aea69cc6a83331bbe96dc2caa9a299d21329efb0336fc02a82e1839a8
SHA5120b61241d7c17bcbb1baee7094d14b7c451efecc7ffcbd92598a0f13d313cc9ebc2a07e61f007baf58fbf94ff9a8695bdd5cae7ce03bbf1e94e93613a00f25f21
-
Filesize
649B
MD5703d2a6f2d0b63107766a428068de3f8
SHA1b7b2d9daa49a6992b8d0275b16bd39ceee328fdf
SHA256f481c8facf355f9c2cbb2af7337448048574fe710ddc552cad14b9bc6f038c6f
SHA512ecfe78e9b7c25ae89254364f323db76e41554779017a2cb0783c59af935881a269959c9e1ee96c393f971972deda5457deed4d0b48d9f413d8d6bbb63caf6cdc
-
Filesize
6KB
MD50733efe7f85e515e936ac05e7f1450f6
SHA1db45ce64c6047a426e8f050f5e55868ba31afb33
SHA256502bae12a90d9655daf37af5dc3b53a93cc3e63c2a6f25374c7f7acc7181e1c1
SHA5126da604eef1b760d653a506259838b25b769a147ccab10a6116ced660ae5850bfe333e0a728cccd96b5b6cb3a319216ac1d450b20364ffdffb40618a03c4ee7ec
-
Filesize
3KB
MD561eb528e1d832848193f31d6c579112b
SHA105fdd0f84fa9833da8bef197bb6e1325686aaa73
SHA256185ccd60c9e95ebe3b3eb403e23c3bdd33da290b0808c8101af4d6f186bfbb0b
SHA512d51c2eada6eca2e0c4c5b566779f18ad62dfd2f267e8127c88b125c0557f4e83957364db3663fd59b4fd62603097443ff102e15e8c55dd48b75e49a966753e25
-
Filesize
4KB
MD5457c396ce24f517e2fd7bff6d4b3a2de
SHA1db8a25c688a58985922bfdaa16830ac33536f89d
SHA256e34f1ef186dc55ba094f65a664f7f5b98854b0cdc40b67ffd710d9d48cacab30
SHA5122216f18bea69f1bf82b9bd0c5800e9bb0d489421e9ac4900560252d4f08ef7be72b045f1027c2573f73e879948054c0ea40a24ec4ceaa82e93a55f89a5ee752b
-
Filesize
264KB
MD5ff34a41321d2fd52f7f05cc17bcd5f93
SHA1d2250ef8ecb3e0148d8144e7238a3599afd0c9ec
SHA25624635992cecd57d4c256ae7ce6e7b031cc22134c4d2a774079d0f3eb4ecb51e1
SHA512081ef3aecc3878ffb5041be28631d5bbdd917d413fda36028ee1fb14ab1daf2ac5cc69c047ae1ff1c55b654398bcfe846e643f972e015283981efb3c84e41d6a
-
Filesize
160KB
MD5e9642deb3f0f295bbfa5a5348c4c0a71
SHA103e4ddd17339995d08ea41edd55170042a857c1f
SHA256cd81073d3408cff8eb4f7c425e1ea8703a9621c26b4fa98d9feac79fa6a72c45
SHA51231fa5b2c0739d2da44c1b6d8c9969c41c00ae3850d85493275df08878e1e6f882ac6628beab661694ffcdb029ff00b662a54f21e49c934471ecd6221267a6d68
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\IndexedDB\https_www.roblox.com_0.indexeddb.leveldb\MANIFEST-000001
Filesize23B
MD53fd11ff447c1ee23538dc4d9724427a3
SHA11335e6f71cc4e3cf7025233523b4760f8893e9c9
SHA256720a78803b84cbcc8eb204d5cf8ea6ee2f693be0ab2124ddf2b81455de02a3ed
SHA51210a3bd3813014eb6f8c2993182e1fa382d745372f8921519e1d25f70d76f08640e84cb8d0b554ccd329a6b4e6de6872328650fefa91f98c3c0cfc204899ee824
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Network\2e90c171-c665-4e81-a667-f781dddefd87.tmp
Filesize2KB
MD579545c090ba41dc98872e77e3a6e184c
SHA1f5691d6b7050198a7dcee98cb3595c018577764b
SHA256400276695d801f8de3f71272c1a5ee214dacd926c90dc47f98334f55e4284d5e
SHA51279f6178dbdfbdb328c2c2761539e88c856792d6a0f4c26ec1bb69771bd446e0bdd32da664f2a90e8ea29e4c5d342433ed35982a54788837b80a10a44dd8bdf2c
-
Filesize
20KB
MD57a0b2f1635c49da2daf6bcde79be992d
SHA19bc53c501d594c9cac1a52074dea277c1fbdeeff
SHA256410cc651beb15af99dafdb03797c0150ed1c3be84573c0ba17a63ea73fde514a
SHA512021edf791ade74a2de03897390f44049a769ce508fd78894a2a4bda7d29fd4fb8c4ec0403948a57012b215162f1e39005733a491116f1c4a105303d61a6cfde6
-
Filesize
5KB
MD58d652574bc598dab026d688b38261142
SHA17ba91b52ab04e5149518be6234b108b1c8b82864
SHA256ea3e96d9f5cf6897e9c1fcafcb4fe6bb038845ad4acac792ec1371a1132e8d91
SHA51256b71c964d6d0e4c0e7e513a75a3a2aeb7dd627a407d87a79e2f840e7dd5251637070186a6efffd2b9e97807c6ad75f6d417aadac44c6b5af5425d8200bd3ad8
-
Filesize
2B
MD5d751713988987e9331980363e24189ce
SHA197d170e1550eee4afc0af065b78cda302a97674c
SHA2564f53cda18c2baa0c0354bb5f9a3ecbe5ed12ab4d8e11ba873c2f11161202b945
SHA512b25b294cb4deb69ea00a4c3cf3113904801b6015e5956bd019a8570b1fe1d6040e944ef3cdee16d0a46503ca6e659a25f21cf9ceddc13f352a3c98138c15d6af
-
Filesize
2KB
MD5bd6f972c5ee0f388f19d8ce2c2c27b10
SHA13b0b2c9c669d07017e6ae4f303e57fb7c3a44719
SHA25661e8c3ace4f90d92834bc672d691eccd0722ab63a3ddf4cf9e9b4adb8883d62e
SHA512c0d37f12b615c3b0b866b99c992bcc49ab855e2e1ff165cccb9f9098a565179855b006ebd24cb396351cbf1dd305fbad0692691afee0984741df3e023f70a4ce
-
Filesize
1KB
MD58ec08fbd67e07b6d1b3f614870761e33
SHA1b0d4e0748981ec2479882ce926a7324d51535ef3
SHA25667b67a94fb4f8517c3ba13ed4cf16fb4c3f52dfa92585ac6508e0ab3c39e7d16
SHA51224010d4cfdbef57ef8ebe1e7a60e8d256577d96befd38680f84ef90fc5875f580080ee88b0444303ad4110992ec3190345e058c5d6edd76472d5010276c598a1
-
Filesize
1KB
MD527b12e8f62d8fa9755ea9774f7e4e7d5
SHA1516ddccd2549777e39c8eca1b60edc826371cec3
SHA256851c7c4907eb42d904a31f449615f760a3a907dcfc8ee9919c4e16287e0ce6e1
SHA512e2c55afde4ec1b309e29099af86bf142bc7f3676d65eb4ad3933f4d66ad58d794ff734c7cd6875dd882654072c023ca1212d97b077ad9a1b97cdc013c6a72a4a
-
Filesize
352B
MD5ec7e8c496d6104f32bbbdaa7da681dd9
SHA1991b4fc2de7e400ccd90d6ddb7e5a319c4c71ad3
SHA2560825249e653a7988eedc3e03630afc1fe6dfef727be50da114b210788369b9a8
SHA512b1cd870cc0b9087a31bbc030299d6b202584f83b1539ced365c8efc0e7d0c2fae9cc313108e265f269fc6e537c0d214e96c44c48a34cac04f1db5fc96470aad9
-
Filesize
4KB
MD53e7b883c56d0151500ef68a3f0a517d9
SHA14caca4b26e1e0377fac633254b0088c2159de5dc
SHA256439d0be1eaff83d8ea1a3beffa9cba1f458fa70e5930265e005bc565d9317d4f
SHA512ba754e46e2c3329d92d0d89a3a880ea1f61fd3b9a765c47918cac1e98a7d75498e6308b9bf63582134fe8ba0de0a5e8034f249eb751a3079ff95799d675a2879
-
Filesize
1KB
MD55a32b5749c927ea58c6d495a7ef59f18
SHA1bb396283b5df8bdf239fe71a1b84596ef8775720
SHA2568ab47b8355bc1be8bff266209d1b9b9f25be6544704dccfd3c112cbcf05cd837
SHA5129cd80d1359706a659fbfb828d39946ab4d198b3c95bb96e865573772dbbeda072a81b9ce2c07fcc291f63f7d6b6537b88d956f64377693399f2a827219edf5a9
-
Filesize
2KB
MD55a99f7dee9a1deed937c4bd817e6d6df
SHA15c9b0601c43b743e32641dfc72665e210b227e49
SHA2568f98cc6fed4b0563aca26785dcb5b19bb2cba44581c4aa1890d7173196ebdf89
SHA5125e30d5e3947f432342e6d455cfdfde937ce4725faf166484ffe44c0993799c73f322c4d88cdf764ca87b484f732f3f6e344ed51f5a5bb4b78d0c9a7fd9a0c6d7
-
Filesize
10KB
MD5b51e76416163446a34b8a85c2e21944f
SHA18e21d0a0160dec3eeeba9e532cb5bbfedfd9887c
SHA256040f248bb2e618345b84c01c32356e7e0765ec3bef964be4f5b4824cd04f7372
SHA5123bc56f8f5d130735a171300fc8fdaa265df1b9986dc49cde742ea3de00fd9b661525ba413f427cdda28ecdae1a6c6135ec31e122823159a6b4c524f7012841e5
-
Filesize
10KB
MD58de5b779d4e43b6ef2746ff3bbebf600
SHA10bac0e53b5a4783ef6af521d63835d05f28c1bee
SHA25662ddffdcbe2d7ca1e0c53c7ff5529c4ae867cab362c05f062b6d3b34cf218f12
SHA5127c9eb4c672f08dbedddc069aeeca017c6c509a69d91e6511d4202c2c1e3291c8ecbee339dcd6c95a1c0c3fca0620d565424153ab4d34ca1b4c9dc51c3ca7762a
-
Filesize
10KB
MD5252bb12b1c9cf7645f3f29e887af3867
SHA1cc8e670124c30e8c7cafa4b5e71d2e044c803121
SHA2560759911aabb4bc267da2f4bd230fab9954090738063d27471eb2bf96214874c4
SHA512199cbd3d2789a19e7a79f84f8828d93203cc2eb2682cbc43fc4c8884ab4eab41428c6715852fa9e4608d649088e54de0efadc19d88ed9fa56626f9957472f89f
-
Filesize
9KB
MD50d19c820b3c8f319213c104f1ecea04c
SHA13a755c2c03d3d41bd022359cbc0369ff0b69b4e1
SHA256ed0cfc214fe8ef1a87410b3d1aa3b2bb90aa9a75cbb1909b887952ade64e050c
SHA5121acc4ccda93ad207183459b2dbd815009b81822a8bf833ef6f40ee7f0bb229fc7a4aeaca873146307709a6c5ad02bfe566e8d3a7a7f8dbdf8eeee0eb07a84c2e
-
Filesize
9KB
MD5f9f4b76b95a8e99e4d24505621bd156d
SHA1e6eaa45673b1851f2bcd9837e1ed422bb5074acd
SHA256ca7a864902405493f17013df99c75171e1759a32b53d45fe2cc5327740d0adef
SHA5120ba871003ce4e265f97b0e00a27a4062b5bc5f55a133c93398ffaa7df174ce5730293b2eda7241078840c56e3bc9ba8211f4a34eba05c56fb36030e56cbd985b
-
Filesize
10KB
MD548ff81a4e6cb1d2403c6794ffa8257aa
SHA1c11cc737edf3b9fbf18757885d989cddc01dd18e
SHA256be71a04f2fab3e096e68f33df5753ac60c102ab1dd1370b5212892cb59b50cba
SHA5121b32bca364fedfd3ada0bb5468ac31714dfea12cabc11141b6d1d790ed6c92baf20627d9eac3163fe29f2eb50555c2ab8670ec13157d40256c5d097b1836afdf
-
Filesize
11KB
MD52c9763d7ca4610f46a5b20d0de63b284
SHA154fe26b83c779157efbf5c6da7b038027019e86a
SHA256233b42f9d65f3e1d812498cd2adf377c08eff2407855317531b0fe12acd67f0c
SHA51224a32c2e70bf3cec0232ee65ec775215cd4d1df7797a6ea4c45f46fd1243550616387b522bec8c4e016ed83e5394deb207ccffd9f700cdce675625f02f7bed05
-
Filesize
10KB
MD506ef8d284f3c748edfbc3986f83a2999
SHA1bcdfb8c858a256c5a8e48455a24864152a79bc21
SHA256d784eb274389073f9d4424063b2309473e5b143b560b26cc81677618068674aa
SHA5125ccd446b1c20071dafd37ebedf9accaaa8cf6eebf865c6e258ec2bf093d8a8154d0410f6fd861491bffe14bbfac82f334917de2adf31d5fd0ad8dde511b24a86
-
Filesize
15KB
MD53d764449bbfc8c710364de110d6b50ab
SHA113bf1c6308829ccce3143371dc36bd1e851663f0
SHA2563585bafd72d38c1a0a181820673e0858356a51dd2b2e85e308da49a055126b06
SHA512f356228306d40b57a91e48c0e86f1779f2780b1a19524641e25e9e88e40d4d44b73c11230998ff7724ba515510e19e864c940b1df42eb7294450eceed352b188
-
Filesize
114KB
MD5de05464de3e636cc40b507f76b739067
SHA106cf48f7ddac52da240bbe2b6bf0499649ed8229
SHA2568ee6c35e9304dad768132bbafdd17885863dc8650859f155e63c59d9eecf8852
SHA512d786c5b26a8c4642a7392d293be4887c93a4ed083a6542cb9e24798c982ad51637f4d87919c77820f89fc2a1e26135c5973ed871253631fbde4074ea2869973f
-
Filesize
124KB
MD5f4724e2a9f66a5aaa3334100f3c260a2
SHA142944b7c536412168aa0a7dd3d2c7c8b80b9bf6a
SHA256854605bc6d4c8134ac03eb70ee3be718d83b003c20313aa8108a405a3a285872
SHA512bd7d09f513362d66082fa32dc560cd117e0c97f4a83e7583cd23ecc0d9e41145c17107fff05720ef218f2cfd255f52ab5b1acb3fae2b8142845cf8213d5d8f05
-
Filesize
228KB
MD5f4bc964e7c8014e73707f20645f2a856
SHA1e131e14b05993c76be7536ca6b05c21ae32b1d0c
SHA2569924ad8af9c6457c4558a7062dceb8563ce7e545235b63a8c4dc316a4c5b3563
SHA512e38b1b0578b58f84e9ef59aae16742b5f3c5dbc9fcd0563c88e816c0db85aac2d4613714a0921ffb831fcfc075e214e39abcaf37027d594bbbef143e4d1c741f
-
Filesize
236KB
MD55195438783e8cd2105f4b9737f139206
SHA15d416b17b44482f647c51945c3229110c565ba8f
SHA25638c5537158427527171936823749482e542c555ecd117d9dd5b49ce0dc2529dc
SHA5129ab65128b3accbf44440ad2c140180497d65d23969c50e9eced1efbcb83d78bfbe45ab3788fd4169b3f88c62ca76bcaae6de628f5de043d00fadfa9fbd2db297
-
Filesize
124KB
MD563197fe5f5f1a12c0a92cc4ec4d7e53f
SHA18152804351863a067066b4d5d1125cf0c819ef19
SHA2562328a825e550173ea61434b93386a44b8dd164511676cc8d1f397b0f71580af0
SHA512878d13d9375968befaabc3a2d68fd88c29053e68b0dd4ef426b2717d3d2246a222e1fa6256ddf5bbc744af5e25bf56c99a1b0aa3f9fd6fb8d7fc37bf69d11c5c
-
Filesize
1KB
MD5e7edf56d23e3eddab9453776bd1cc9ed
SHA136c5a79710d6810871de84443bc4f42c404504bc
SHA256b115c8bd4e8c80eedb64322046695b1bb6783ddfebf7bf93a0562a12bb4de95a
SHA512ab2c905ff55d9a202469218f65d6df63eac131c06886316ae4e8cd05dffaa42541d11df774d89629d0cc6df067ed9d0c2b44811952e4f3668c3e9d4fb84f57a1
-
Filesize
152B
MD5b3b1b4c870d92c3e8747b495d6f3e8d7
SHA180d5d3cc4e1439b4607134229ef45be2c3dc0373
SHA2566e33e82daa298874fa9f7c7fb155eba177c8e4e98445c1161a7004311b973322
SHA51249ba5345e63d66a546c545fdb75f7388ec7679f396fa8b6ac8f2f20d89963464008bb3e9e63f6cb5eed370a8887bd7e27e9222390920ebe5e1e1c1ed5decf0d8
-
Filesize
152B
MD5aa24a016facba3f07ea13871a7db1ad5
SHA1cb6c06a7e07cdc84e7358cfb42e51a4bf8a5099c
SHA256aa75e181dab887f0275fc24f957c9302c9afdb5553cd65585fc6b8482fc2bc58
SHA5120804c0aaa0b8e374433a8a7d2db173e674883ab884fb102a01a29adce644dce9ac97528f86a7d89facba320bfc0176f789da5d51ccb257a227561559a54340f7
-
Filesize
152B
MD51fc959921446fa3ab5813f75ca4d0235
SHA10aeef3ba7ba2aa1f725fca09432d384b06995e2a
SHA2561b1e89d3b2f3da84cc8494d07cf0babc472c426ccb1c4ae13398243360c9d02c
SHA512899d1e1b0feece25ac97527daddcaaeb069cb428532477849eba43a627502c590261f2c26fef31e4e20efd3d7eb0815336a784c4d2888e05afcf5477af872b06
-
Filesize
152B
MD5e9a2c784e6d797d91d4b8612e14d51bd
SHA125e2b07c396ee82e4404af09424f747fc05f04c2
SHA25618ddbb93c981d8006071f9d26924ce3357cad212cbb65f48812d4a474c197ce6
SHA512fc35688ae3cd448ed6b2069d39ce1219612c54f5bb0dd7b707c9e6f39450fe9fb1338cf5bd0b82a45207fac2fbab1e0eae77e5c9e6488371390eab45f76a5df1
-
Filesize
44KB
MD585a5030c346a796dc1dcc12b0e4c2acb
SHA152e3af9ea4d19dce18043f1695fc2aa1358ba7ff
SHA256cacfff4b212f4d52608a43e3f645293ce4cbc051b5110cfbc55977453e4b6e6b
SHA5126e37959b51b7b10be3d38402e9562405435e1c88e929b1f53d6779dd5ed68d231562798ec98e03c412751c14cdacea0ab6a11fda17b32ced5668a232f71053de
-
Filesize
264KB
MD5153b71954304b226b867ef74f9475341
SHA1e47078d1c467cfe20a3a5ddb6917dc98f78f1454
SHA256cc924ef0e23e3423bc4c98a537a9250fa0c03ed587c8402b244eed758b832420
SHA51267506f2a89d1230c46dbd2ab5b5e5ecfe3c11bf9a223bb23c699012068ecbcc9b919fd483195753ebb4dae4ce0fc62d3ee0160fac83d5a2d679de83faaea784c
-
Filesize
1.0MB
MD549867674346fb16ef8e32f52e00060c7
SHA17921784751ffa4a025aff07d95f364c30cad8cd2
SHA2566456c179e6d2273654780fc871e0b15c47a70f225252b3b552b6dcacc19d8bdc
SHA51223718740c51b4ca23ac1a66f626a1d37fc795a2a491878b6833e225c0eaf8742633ce0c10d3921a97f176f92e55d06adaa646a38940cb878773b99ee1f77cd8d
-
Filesize
4.0MB
MD5373f82c8d0238bfc58e2a377a1f50ab0
SHA1050b45eb9d8d4113009ef64d4becff99f736f9bf
SHA256478aca3b869848881078f352b3026df41eb15be8198da144b80cd4a72ca58665
SHA512c96c8b92746d746619a6fd27f93c967a29c7df90f869ecf2e16254a687e9e398f1f42b44b2e97552ff7f57f406f44214fa6776180cb08cbfe57c9e88ea07da0a
-
Filesize
38KB
MD5adf2df4a8072227a229a3f8cf81dc9df
SHA148b588df27e0a83fa3c56d97d68700170a58bd36
SHA2562fd56ac4d62fec83843c83054e5548834a19001c077cdb224901237f2e2c0e4c
SHA512d18ffc9a41157ea96014a503640b3a2a3931f578293e88cc05aa61c8223221d948c05637875d8e3ee5847b6a99341ea22b6a1aee67c170e27bde5e154cf1b9ca
-
Filesize
20KB
MD599c59b603e12ae38a2bbc5d4d70c673e
SHA150ed7bb3e9644989681562a48b68797c247c3c14
SHA2560b68cf3fd9c7c7f0f42405091daa1dda71da4a1e92ba17dad29feb00b63ef45f
SHA51270973ea531ed385b64a3d4cb5b42a9b1145ec884400da1d27f31f79b4597f611dc5d1e32281003132dd22bf74882a937fc504441e5280d055520bfca737cf157
-
Filesize
37KB
MD55873d4dc68262e39277991d929fa0226
SHA1182eb3a0a6ee99ed84d7228e353705fd2605659a
SHA256722960c9394405f7d8d0f48b91b49370e4880321c9d5445883aec7a2ca842ab4
SHA5121ec06c216bfe254afbae0b16905d36adc31e666564f337eb260335ef2985b8c36f02999f93ab379293048226624a59832bfb1f2fa69d94a36c3ca2fdeebcdc3f
-
Filesize
16KB
MD5686cd4e029335cb803ea8b47ea727bd5
SHA1acb03acb24c943d81a8e4822466201cc4114692c
SHA256785ffc242cb18f8e9ccb9ab96c37df3cdf1612a38a325a2a9bcf8164eac6488d
SHA512a54e055ca8e021757102aa6c7f9045959fa32a7db215595cda8419ac96f75f44e1f5846037e14b6a20d0db51c4b1e974aff1718e16ff5d7650e0b667ca09721c
-
Filesize
331B
MD5826ee27313b6a5a36610509bc0c36eb0
SHA167834d8ea6e4d5248bc0a98166cfb7d2829c307c
SHA256f573ca76a72f9a01fd54d7e633f25f39fc545a5a35b5a103d53dd7512706c17a
SHA51233349e34c6ce2b8207051fb5a5c4a3eed8f1ad0e223b1cdc340e0d4f881f33e2d95097ab24f6448419818b1e51bb66f395c7237accc3c77791a5a7dfe7cdc60e
-
Filesize
497B
MD5e818cd8f738c4a514eb129db93416d88
SHA1a0d9afd7ce98e0ca267bd0c43ca2e66350505354
SHA256b243439e59e37618a5b5849a99a37e4fe7bf64d314f405d31d697f9a9aa459b7
SHA51207d6825a365d8e4af2bbd20a2399547aaa43c837aecd778bc4af0627b5d8b90fdc923a7e6f1cd2d00aa250c1b55a83e9e2bd3077b8f2591a2b765fd27ae10ce7
-
Filesize
497B
MD5dc0236cfedfbb36fd6af0fc3e22ea0e3
SHA12d28c1a0102fe77112acd5c0561fed10401f1318
SHA256cdc2b8be759baadfac973ac79b72264ee1635f8afb0a961fca950fd806341bda
SHA512976dd21c4fa4aeb188582a5da148213483ba871b6b44f7db1b7a489ad26e0bee441680aea7c40ba80738495d5a4a8745a00f321a7e9990107963f303b692bb9f
-
Filesize
5KB
MD5dd21a2de789d28fd2904e2ec066053cb
SHA13a5241e7fdc7e5744a591a574561fe5ab6d73529
SHA2564b705faf8d1b38b78d351e0affe29ccc1748ddf1603c245609442e3b33f49f97
SHA5127bd98996c1851f778a592567844ac59b1728f1c1b25552f4c95985ae63d932db8c69487f883be3c4f20082b6b3ead1dcb64f8e33ff9770cd27f3ced7225cdb12
-
Filesize
6KB
MD515aa0f12165ea8ae80836738cd942076
SHA1909b7140d3a140eb7879756bbc7a9d1d9c0c0fdd
SHA256e6ec8f5d01e21bbe30fa03435f78cbcd986c54e825caf07181b4885f849a645d
SHA512932aa24bc706763b47ba07583ae7ba405784c070f6ae3d6057c7475d7a7a438a16c91b0d3e2d93ddc3bea5f991ede7f2b7a491e308ccf3d3fde49594e7929a19
-
Filesize
6KB
MD5a2e23ebea37523824aad05557827582a
SHA1d5c5b8316d3a9afb8aac8ada3382595d44a8bda5
SHA256b3365772d37ec4de4b8a1f643bdc55a724abdc636ed2670742e4329c1a6478bd
SHA512f8d22124a9976c7eb6139ee4ce19d2a867a0f91fcf0fd701220ec81a4bf8255f485ea18d249b6c58177437c90313bd9ecd4211291fcaf358f343bfba3fa57c65
-
Filesize
5KB
MD51dae2943281bae325c25afc9b3389d2c
SHA1078c84e5d5b822ed4b07fe7e77b9c9c63dd0fa52
SHA2565131281b2915eef857d3f1b7dfa20ecc65bdbfd3a742b6d48926d0c606f39381
SHA5127d4e18eca3137c43c0067a283819922db37a70aea8106f11fac6658050d12e1fcdfa7b1403c98fb88c67698887c10a98fb1d5dd4732adfc5f534f7ba11198ef4
-
Filesize
6KB
MD53c5bb60262be7a77251bd7092f4ff6c4
SHA1ef6b16b934318d684b533f083fe82823c2d3b657
SHA256c447558858429f6cbac3cb0745bb985f717a36671d8bfbbcc14a198d65eeb469
SHA512628fc66f1debec4f688812a5a301e847b1d3f87deff802de3804d7a2bcf2f4c8b8757e79dcc56a434855b0a50c065980448f39663760651764578d898f2bfb4c
-
Filesize
339B
MD57d0f930b7ebd27051691f7a945c3ea15
SHA1b52a762ca44806ee6497d48a07522921de13adf8
SHA256cfe057ea3a40ecf7bdafbb4ae3c003232448d16d7f25d8e08df391c21d6b06c1
SHA512078053504e3158bc6813c5de2837ee4ad52c10c5eab95cd093b2dbb01668b7a224575050f7f198f5fa816f038089e5839a096d0e3efd78a81ba694a32ccd0726
-
Filesize
322B
MD57475bc3af7e0dbc1a046f8ba9dc2b84d
SHA1eb7685ac918d8b76ccd35a5effdf2664e84c98fa
SHA256074c0fde4a49247e501fd7e21aa868368f6c4dfbe372599f8864ea2c345ae905
SHA5122fcafe707b0d3245836f2e7f10f3748aac78649d0828f0c46a7413c05ecb23d2d0d2f2a9852d9fb09623a121f5db13e8c960bf5800feed68621dda67fa4acb99
-
Filesize
10KB
MD53e318454d97e9b33f43f6121758845c2
SHA18c92daa512df42caeb6ce231c0a23eb33e194c6d
SHA256e5dca9312aad92c102d6a96e09042290224ffc2ca6a3137647b3b71b2b3f5a0d
SHA512d813eacaef89853cdc0d082906fea3242c9ca817ddc1c38e480a3c614f9ee64b0cb1e0c15d2b296e84f36894f12fec6eb06f5bc19ba4e47fa7537ca5385f348d
-
Filesize
10KB
MD52412032cc5e6a1e4960d5bdab7975e1f
SHA1b554a2295a5775fbf7dc2e1c34c1cf47311d3d6f
SHA2567f133301667ac5e872e4daf701d3b57612caaf1d2aa1dacd9503fd5cbbe176cb
SHA51228ae0fd20554eef07352e074188b3297c3ff266489bc077641a0621cdfbfcd38660211bd8a1401ddb07e4d578a5835561dd2df84f37afabca447205880ad386e
-
Filesize
60KB
MD593f72d18b076875d762e812123770c09
SHA129bd3a7e9b63dbeed4043b9ea41440f20f5b8554
SHA256ebe538606d28d0788b790b0ff53b7ee9abd2abedaa00842e87a1173cff65ec89
SHA5129f281ef00246817e470bef50e37bd7f3d58ef35a9b2309d1ac621a1a0e460220caf62ac9ff1381dd6bb512fe967aa02a68a40b4dd9fd2526a006f6a0707560c2
-
Filesize
267B
MD5c991365af9ef96ec03a88768bbcc2c94
SHA182548092c4fa2aab7c24b86d84a21b47af97441e
SHA256dae74671b3d56f188635cfe60aea5ddeb2cd5a53f97df22c63b17b07317f1d14
SHA5125f0a7359234b9a846c9a280e340f00817ff4bb7e0d925823637c98d605c8ddc8904d28fe0ce38ee219e9be9d5edfd59b4f5cf09571db693c4f305716d25551ee
-
Filesize
5.7MB
MD5fb25fdd6ff14150c12aadd9ee2d1a132
SHA13cfb3536cd95f0b45e3540241b29aaac8195969b
SHA25630aa5d63d57d96e48788efcf488f3fb7ba05354313a383f15d5c5caca632c87c
SHA512ffa52a7225aab5c5518d2ec872b20bb81a964b41205308cb72356e8f443b333a89239920989ffe032f5b5009d34ea04c4ffa8944e648633321c9a6685a3d9494
-
Filesize
83B
MD595bab9dd14853aee78129288e8c45f28
SHA1563777d569a67ad38ce522dd82fa8bd854126b04
SHA25673133a3a8bc13080ed4b6c22e7bc9126a9fd343436e09ac2a83f3f8bc578fc37
SHA512201473a26a2099b10a58b2a46e70ec4c5388b497f76b53e0b7cf742576cb46676aca76a5452c4f6a109f92490192bd8eaa0b47d7cd563db45880b36d3156c6b6
-
Filesize
1.7MB
MD565ccd6ecb99899083d43f7c24eb8f869
SHA127037a9470cc5ed177c0b6688495f3a51996a023
SHA256aba67c7e6c01856838b8bc6b0ba95e864e1fdcb3750aa7cdc1bc73511cea6fe4
SHA512533900861fe36cf78b614d6a7ce741ff1172b41cbd5644b4a9542e6ca42702e6fbfb12f0fbaae8f5992320870a15e90b4f7bf180705fc9839db433413860be6d
-
Filesize
1KB
MD5cd77fd91cd7752c5c8b404f0eec1c7d1
SHA12489d68133f6d9d800e61c16079342d2448a3977
SHA256f2be7312e0e7bcc7f8f8064f31de96d56787c600fb8b9340a012a0e7497cb8d7
SHA51261ca21f4427f29b483df51fb2580d476282e40b47bdc6ea8ffe567967696fa26726b352f98916124d6155bd73fc9ab92122cb91dd3e4d720283674e9b0035986
-
Filesize
294B
MD55959e9104ceb76e256eb4785847eeb3d
SHA136c105fb5e54aa6de3771fa0972a7744fc129e50
SHA2567145c44e7d38514e109fd232a900eabfbf767e6c2a296469da47b8d8e26b7c13
SHA51275e4e42bc87866b9a306ad2065fbecbf6a7301770df4f1fc4a55f61b76e8e1ee6164d069c03d581c3f42ba380d72f24d454f305d0c7ea98b889fef71806bcf4c
-
Filesize
1KB
MD5b70192bdfa82953d23893557b94122f2
SHA14fd73efd6a6b28f57df1dde6a4241526c5b0fb60
SHA2566443d3bc34cc48e858c4fdb3ab0ad9a433705f266cb70f92886e90cbf589eab4
SHA5126dcb0273ffe6675af850d0a5e1976d9e8f8e9d6306a21856b1df4d8c0fef38fb8ff28f113e8c8b923c6451e32e734c514a15f79efe6316f180874f78608928da
-
Filesize
41KB
MD5e83b39b996bbf956188ad2990a9a54da
SHA1a0dad306c6c1df854a8073eafd08215e041161d0
SHA256111d94fb61443e2e6e34b97b8819a6e52bf153a1363c8d2c232c28c75e4c78eb
SHA51223a70e8c379cab47ad48b7f153f827c24092e8014f08841e33aeab441c155d59888fd32d8095ce7093926b2ac80983285c2cc20414087d10849b4a32cf87221e
-
Filesize
4B
MD5098f6bcd4621d373cade4e832627b4f6
SHA1a94a8fe5ccb19ba61c4c0873d391e987982fbbd3
SHA2569f86d081884c7d659a2feaa0c55ad015a3bf4f1b2b0b822cd15d6c15b0f00a08
SHA512ee26b0dd4af7e749aa1a8ee3c10ae9923f618980772e473f8819a5d4940e0db27ac185f8a0e1d5f84f88bc887fd67b143732c304cc5fa9ad8e6f57f50028a8ff
-
Filesize
26B
MD5fbccf14d504b7b2dbcb5a5bda75bd93b
SHA1d59fc84cdd5217c6cf74785703655f78da6b582b
SHA256eacd09517ce90d34ba562171d15ac40d302f0e691b439f91be1b6406e25f5913
SHA512aa1d2b1ea3c9de3ccadb319d4e3e3276a2f27dd1a5244fe72de2b6f94083dddc762480482c5c2e53f803cd9e3973ddefc68966f974e124307b5043e654443b98