Analysis
-
max time kernel
502s -
max time network
497s -
platform
windows11-21h2_x64 -
resource
win11-20250217-en -
resource tags
arch:x64arch:x86image:win11-20250217-enlocale:en-usos:windows11-21h2-x64system -
submitted
04/03/2025, 16:45
Static task
static1
URLScan task
urlscan1
General
Malware Config
Extracted
xworm
5.0
127.0.0.1:7000
CYY9b9QoazGEuJIx
-
install_file
USB.exe
Signatures
-
Contains code to disable Windows Defender 1 IoCs
A .NET executable tasked with disabling Windows Defender capabilities such as realtime monitoring, blocking at first seen, etc.
resource yara_rule behavioral1/files/0x001900000002b1a9-492.dat disable_win_def -
Detect Xworm Payload 3 IoCs
resource yara_rule behavioral1/files/0x001900000002b1fb-452.dat family_xworm behavioral1/files/0x001900000002b202-462.dat family_xworm behavioral1/memory/4800-464-0x0000000000370000-0x0000000000380000-memory.dmp family_xworm -
StormKitty
StormKitty is an open source info stealer written in C#.
-
StormKitty payload 2 IoCs
resource yara_rule behavioral1/files/0x001900000002b1af-498.dat family_stormkitty behavioral1/memory/4800-725-0x000000001BAE0000-0x000000001BC00000-memory.dmp family_stormkitty -
Stormkitty family
-
Xworm family
-
Executes dropped EXE 2 IoCs
pid Process 4160 Xworm V5.6.exe 4800 XClient.exe -
Loads dropped DLL 1 IoCs
pid Process 4800 XClient.exe -
Reads user/profile data of web browsers 3 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Uses the VBS compiler for execution 1 TTPs
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Checks processor information in registry 2 TTPs 9 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\Hardware\Description\System\CentralProcessor\0 Winword.exe Key opened \REGISTRY\MACHINE\Hardware\Description\System\CentralProcessor\0 Winword.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz Winword.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString Winword.exe Key opened \REGISTRY\MACHINE\Hardware\Description\System\CentralProcessor\0 Winword.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz Winword.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz Winword.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString Winword.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString Winword.exe -
Enumerates system info in registry 2 TTPs 18 IoCs
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS Xworm V5.6.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer Xworm V5.6.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemSKU Winword.exe Key opened \REGISTRY\MACHINE\Hardware\Description\System\BIOS Winword.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemSKU Winword.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemVersion Xworm V5.6.exe Key opened \REGISTRY\MACHINE\Hardware\Description\System\BIOS Winword.exe Key opened \REGISTRY\MACHINE\Hardware\Description\System\BIOS Winword.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemFamily Winword.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemFamily Winword.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemFamily Winword.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemSKU Winword.exe -
Modifies registry class 64 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-501547156-4130638328-323075719-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\10\ComDlg Xworm V5.6.exe Set value (int) \REGISTRY\USER\S-1-5-21-501547156-4130638328-323075719-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\10\ComDlg\{5C4F28B5-F869-4E84-8E60-F11DB97C5CC7}\GroupByDirection = "1" Xworm V5.6.exe Key created \REGISTRY\USER\S-1-5-21-501547156-4130638328-323075719-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU OpenWith.exe Set value (data) \REGISTRY\USER\S-1-5-21-501547156-4130638328-323075719-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\NodeSlots = 0202020202020202020202020202 OpenWith.exe Set value (int) \REGISTRY\USER\S-1-5-21-501547156-4130638328-323075719-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\14\ComDlg\{5C4F28B5-F869-4E84-8E60-F11DB97C5CC7}\FFlags = "1092616257" OpenWith.exe Key created \REGISTRY\USER\S-1-5-21-501547156-4130638328-323075719-1000_Classes\json_auto_file OpenWith.exe Key created \REGISTRY\USER\S-1-5-21-501547156-4130638328-323075719-1000_Classes\.json OpenWith.exe Key created \REGISTRY\USER\S-1-5-21-501547156-4130638328-323075719-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\14 OpenWith.exe Set value (int) \REGISTRY\USER\S-1-5-21-501547156-4130638328-323075719-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\10\ComDlg\{5C4F28B5-F869-4E84-8E60-F11DB97C5CC7}\FFlags = "1092616257" Xworm V5.6.exe Set value (data) \REGISTRY\USER\S-1-5-21-501547156-4130638328-323075719-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\NodeSlots = 02020202020202020202 Xworm V5.6.exe Key created \REGISTRY\USER\S-1-5-21-501547156-4130638328-323075719-1000_Classes\Local Settings OpenWith.exe Key created \REGISTRY\USER\S-1-5-21-501547156-4130638328-323075719-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell OpenWith.exe Set value (data) \REGISTRY\USER\S-1-5-21-501547156-4130638328-323075719-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\NodeSlots = 02020202020202020202020202 OpenWith.exe Set value (data) \REGISTRY\USER\S-1-5-21-501547156-4130638328-323075719-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\0\MRUListEx = 0000000001000000ffffffff OpenWith.exe Set value (int) \REGISTRY\USER\S-1-5-21-501547156-4130638328-323075719-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\0\0\1\NodeSlot = "14" OpenWith.exe Key created \REGISTRY\USER\S-1-5-21-501547156-4130638328-323075719-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\0\1\0\0\0 Xworm V5.6.exe Key created \REGISTRY\USER\S-1-5-21-501547156-4130638328-323075719-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags Xworm V5.6.exe Set value (int) \REGISTRY\USER\S-1-5-21-501547156-4130638328-323075719-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\10\ComDlg\{5C4F28B5-F869-4E84-8E60-F11DB97C5CC7}\IconSize = "16" Xworm V5.6.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{4336a54d-038b-4685-ab02-99bb52d3fb8b}\Instance\ OpenWith.exe Key created \REGISTRY\USER\S-1-5-21-501547156-4130638328-323075719-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\14\ComDlg OpenWith.exe Set value (str) \REGISTRY\USER\S-1-5-21-501547156-4130638328-323075719-1000_Classes\.json\ = "json_auto_file" OpenWith.exe Set value (str) \REGISTRY\USER\S-1-5-21-501547156-4130638328-323075719-1000_Classes\json_auto_file\shell\edit\command\ = "\"C:\\Program Files\\Microsoft Office\\root\\Office16\\Winword.exe\" /n \"%1\"" OpenWith.exe Set value (data) \REGISTRY\USER\S-1-5-21-501547156-4130638328-323075719-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\14\ComDlg\{5C4F28B5-F869-4E84-8E60-F11DB97C5CC7}\Sort = 000000000000000000000000000000000100000030f125b7ef471a10a5f102608c9eebac0a00000001000000 OpenWith.exe Set value (str) \REGISTRY\USER\S-1-5-21-501547156-4130638328-323075719-1000_Classes\\ = "json_auto_file" OpenWith.exe Set value (str) \REGISTRY\USER\S-1-5-21-501547156-4130638328-323075719-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\10\Shell\SniffedFolderType = "Generic" Xworm V5.6.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{4336a54d-038b-4685-ab02-99bb52d3fb8b}\Instance\ Xworm V5.6.exe Key created \REGISTRY\USER\S-1-5-21-501547156-4130638328-323075719-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags OpenWith.exe Set value (str) \REGISTRY\USER\S-1-5-21-501547156-4130638328-323075719-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\14\ComDlg\{5C4F28B5-F869-4E84-8E60-F11DB97C5CC7}\GroupByKey:FMTID = "{00000000-0000-0000-0000-000000000000}" OpenWith.exe Set value (str) \REGISTRY\USER\S-1-5-21-501547156-4130638328-323075719-1000_Classes\ﺿ稙刀退դ\ = "json_auto_file" OpenWith.exe Key created \REGISTRY\USER\S-1-5-21-501547156-4130638328-323075719-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\0\1\0\0 Xworm V5.6.exe Key created \REGISTRY\USER\S-1-5-21-501547156-4130638328-323075719-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\0\1\0\0\0\0 Xworm V5.6.exe Key created \REGISTRY\USER\S-1-5-21-501547156-4130638328-323075719-1000_Classes\CLSID\{018D5C66-4533-4307-9B53-224DE2ED1FE6}\Instance\ Xworm V5.6.exe Set value (int) \REGISTRY\USER\S-1-5-21-501547156-4130638328-323075719-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\10\ComDlg\{5C4F28B5-F869-4E84-8E60-F11DB97C5CC7}\Mode = "4" Xworm V5.6.exe Key created \REGISTRY\USER\S-1-5-21-501547156-4130638328-323075719-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\0 OpenWith.exe Set value (str) \REGISTRY\USER\S-1-5-21-501547156-4130638328-323075719-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\14\Shell\SniffedFolderType = "Generic" OpenWith.exe Key created \REGISTRY\USER\S-1-5-21-501547156-4130638328-323075719-1000_Classes\Local Settings OpenWith.exe Key created \REGISTRY\USER\S-1-5-21-501547156-4130638328-323075719-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\10\ComDlg\{5C4F28B5-F869-4E84-8E60-F11DB97C5CC7} Xworm V5.6.exe Set value (int) \REGISTRY\USER\S-1-5-21-501547156-4130638328-323075719-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\14\ComDlg\{5C4F28B5-F869-4E84-8E60-F11DB97C5CC7}\GroupByKey:PID = "0" OpenWith.exe Set value (int) \REGISTRY\USER\S-1-5-21-501547156-4130638328-323075719-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\14\ComDlg\{5C4F28B5-F869-4E84-8E60-F11DB97C5CC7}\GroupByDirection = "1" OpenWith.exe Key created \REGISTRY\USER\S-1-5-21-501547156-4130638328-323075719-1000_Classes\Local Settings msedge.exe Set value (int) \REGISTRY\USER\S-1-5-21-501547156-4130638328-323075719-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\10\ComDlg\{5C4F28B5-F869-4E84-8E60-F11DB97C5CC7}\GroupByKey:PID = "0" Xworm V5.6.exe Key created \REGISTRY\USER\S-1-5-21-501547156-4130638328-323075719-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\0\0 OpenWith.exe Key created \REGISTRY\USER\S-1-5-21-501547156-4130638328-323075719-1000_Classes\CLSID\{018D5C66-4533-4307-9B53-224DE2ED1FE6}\Instance\ OpenWith.exe Key created \REGISTRY\USER\S-1-5-21-501547156-4130638328-323075719-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\14\ComDlg\{5C4F28B5-F869-4E84-8E60-F11DB97C5CC7} OpenWith.exe Set value (int) \REGISTRY\USER\S-1-5-21-501547156-4130638328-323075719-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\14\ComDlg\{5C4F28B5-F869-4E84-8E60-F11DB97C5CC7}\IconSize = "16" OpenWith.exe Set value (int) \REGISTRY\USER\S-1-5-21-501547156-4130638328-323075719-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\14\ComDlg\{5C4F28B5-F869-4E84-8E60-F11DB97C5CC7}\FFlags = "1" OpenWith.exe Key created \REGISTRY\USER\S-1-5-21-501547156-4130638328-323075719-1000_Classes\ﺿ稙刀退դ OpenWith.exe Key created \REGISTRY\USER\S-1-5-21-501547156-4130638328-323075719-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell Xworm V5.6.exe Key created \REGISTRY\USER\S-1-5-21-501547156-4130638328-323075719-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU Xworm V5.6.exe Key created \REGISTRY\USER\S-1-5-21-501547156-4130638328-323075719-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\0 Xworm V5.6.exe Key created \REGISTRY\USER\S-1-5-21-501547156-4130638328-323075719-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\0\1 Xworm V5.6.exe Set value (int) \REGISTRY\USER\S-1-5-21-501547156-4130638328-323075719-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\10\ComDlg\{5C4F28B5-F869-4E84-8E60-F11DB97C5CC7}\FFlags = "1" Xworm V5.6.exe Set value (data) \REGISTRY\USER\S-1-5-21-501547156-4130638328-323075719-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\0\0\MRUListEx = 0100000000000000ffffffff OpenWith.exe Set value (data) \REGISTRY\USER\S-1-5-21-501547156-4130638328-323075719-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\0\0\1\MRUListEx = ffffffff OpenWith.exe Key created \REGISTRY\USER\S-1-5-21-501547156-4130638328-323075719-1000_Classes\json_auto_file\shell\edit OpenWith.exe Key created \REGISTRY\USER\S-1-5-21-501547156-4130638328-323075719-1000_Classes\Local Settings Xworm V5.6.exe Key created \REGISTRY\USER\S-1-5-21-501547156-4130638328-323075719-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\10\Shell Xworm V5.6.exe Set value (int) \REGISTRY\USER\S-1-5-21-501547156-4130638328-323075719-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\10\ComDlg\{5C4F28B5-F869-4E84-8E60-F11DB97C5CC7}\GroupView = "0" Xworm V5.6.exe Set value (data) \REGISTRY\USER\S-1-5-21-501547156-4130638328-323075719-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\0\0\1 = 8c00310000000000515a6cad110050524f4752417e310000740009000400efbec5525961645aba852e0000003f0000000000010000000000000000004a0000000000274ba400500072006f006700720061006d002000460069006c0065007300000040007300680065006c006c00330032002e0064006c006c002c002d0032003100370038003100000018000000 OpenWith.exe Set value (int) \REGISTRY\USER\S-1-5-21-501547156-4130638328-323075719-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\14\ComDlg\{5C4F28B5-F869-4E84-8E60-F11DB97C5CC7}\LogicalViewMode = "1" OpenWith.exe Set value (int) \REGISTRY\USER\S-1-5-21-501547156-4130638328-323075719-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\14\ComDlg\{5C4F28B5-F869-4E84-8E60-F11DB97C5CC7}\GroupView = "0" OpenWith.exe Key created \REGISTRY\USER\S-1-5-21-501547156-4130638328-323075719-1000_Classes\json_auto_file\shell\edit\command OpenWith.exe Key created \REGISTRY\USER\S-1-5-21-501547156-4130638328-323075719-1000_Classes\json_auto_file\shell OpenWith.exe Set value (str) \REGISTRY\USER\S-1-5-21-501547156-4130638328-323075719-1000_Classes\json_auto_file\shell\edit\ = "@C:\\Program Files\\Microsoft Office\\root\\VFS\\ProgramFilesCommonX64\\Microsoft Shared\\Office16\\oregres.dll,-1" OpenWith.exe -
NTFS ADS 1 IoCs
description ioc Process File opened for modification C:\Users\Admin\Downloads\XWorm-5.6-main.rar:Zone.Identifier msedge.exe -
Suspicious behavior: AddClipboardFormatListener 6 IoCs
pid Process 1328 Winword.exe 1328 Winword.exe 4416 Winword.exe 4416 Winword.exe 876 Winword.exe 876 Winword.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 4632 msedge.exe 4632 msedge.exe 1172 msedge.exe 1172 msedge.exe 1172 msedge.exe 2724 msedge.exe 2724 msedge.exe 4744 identity_helper.exe 4744 identity_helper.exe 4312 msedge.exe 4312 msedge.exe 4160 Xworm V5.6.exe 4160 Xworm V5.6.exe 4160 Xworm V5.6.exe 4160 Xworm V5.6.exe 4160 Xworm V5.6.exe 4160 Xworm V5.6.exe 4160 Xworm V5.6.exe 4160 Xworm V5.6.exe 4160 Xworm V5.6.exe 4160 Xworm V5.6.exe 4160 Xworm V5.6.exe 4160 Xworm V5.6.exe 4160 Xworm V5.6.exe 4160 Xworm V5.6.exe 4160 Xworm V5.6.exe 4160 Xworm V5.6.exe 4160 Xworm V5.6.exe 4160 Xworm V5.6.exe 4160 Xworm V5.6.exe 4160 Xworm V5.6.exe 4160 Xworm V5.6.exe 4160 Xworm V5.6.exe 4160 Xworm V5.6.exe 4160 Xworm V5.6.exe 4160 Xworm V5.6.exe 4800 XClient.exe 2248 msedge.exe 2248 msedge.exe 2200 msedge.exe 2200 msedge.exe 416 identity_helper.exe 416 identity_helper.exe 1380 msedge.exe 1380 msedge.exe 4800 XClient.exe 4800 XClient.exe 4800 XClient.exe 4800 XClient.exe 4800 XClient.exe 4800 XClient.exe 4800 XClient.exe 4800 XClient.exe 4800 XClient.exe 4800 XClient.exe 4800 XClient.exe 4800 XClient.exe 4800 XClient.exe 4800 XClient.exe 4800 XClient.exe 4800 XClient.exe 4800 XClient.exe 4800 XClient.exe 4800 XClient.exe -
Suspicious behavior: GetForegroundWindowSpam 4 IoCs
pid Process 4496 7zG.exe 4160 Xworm V5.6.exe 4800 XClient.exe 2632 OpenWith.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 12 IoCs
pid Process 1172 msedge.exe 1172 msedge.exe 1172 msedge.exe 1172 msedge.exe 1172 msedge.exe 2200 msedge.exe 2200 msedge.exe 2200 msedge.exe 2200 msedge.exe 2200 msedge.exe 2200 msedge.exe 2200 msedge.exe -
Suspicious use of AdjustPrivilegeToken 20 IoCs
description pid Process Token: SeRestorePrivilege 4496 7zG.exe Token: 35 4496 7zG.exe Token: SeSecurityPrivilege 4496 7zG.exe Token: SeSecurityPrivilege 4496 7zG.exe Token: SeRestorePrivilege 3928 7zG.exe Token: 35 3928 7zG.exe Token: SeSecurityPrivilege 3928 7zG.exe Token: SeSecurityPrivilege 3928 7zG.exe Token: SeRestorePrivilege 2132 7zG.exe Token: 35 2132 7zG.exe Token: SeSecurityPrivilege 2132 7zG.exe Token: SeSecurityPrivilege 2132 7zG.exe Token: SeRestorePrivilege 2500 7zG.exe Token: 35 2500 7zG.exe Token: SeSecurityPrivilege 2500 7zG.exe Token: SeSecurityPrivilege 2500 7zG.exe Token: 33 3312 AUDIODG.EXE Token: SeIncBasePriorityPrivilege 3312 AUDIODG.EXE Token: SeDebugPrivilege 4800 XClient.exe Token: SeDebugPrivilege 4800 XClient.exe -
Suspicious use of FindShellTrayWindow 64 IoCs
pid Process 1172 msedge.exe 1172 msedge.exe 1172 msedge.exe 1172 msedge.exe 1172 msedge.exe 1172 msedge.exe 1172 msedge.exe 1172 msedge.exe 1172 msedge.exe 1172 msedge.exe 1172 msedge.exe 1172 msedge.exe 1172 msedge.exe 1172 msedge.exe 1172 msedge.exe 1172 msedge.exe 1172 msedge.exe 1172 msedge.exe 1172 msedge.exe 1172 msedge.exe 1172 msedge.exe 1172 msedge.exe 1172 msedge.exe 1172 msedge.exe 1172 msedge.exe 1172 msedge.exe 1172 msedge.exe 1172 msedge.exe 1172 msedge.exe 1172 msedge.exe 1172 msedge.exe 1172 msedge.exe 1172 msedge.exe 1172 msedge.exe 1172 msedge.exe 1172 msedge.exe 1172 msedge.exe 1172 msedge.exe 1172 msedge.exe 1172 msedge.exe 1172 msedge.exe 1172 msedge.exe 1172 msedge.exe 1172 msedge.exe 1172 msedge.exe 1172 msedge.exe 1172 msedge.exe 1172 msedge.exe 1172 msedge.exe 1172 msedge.exe 1172 msedge.exe 1172 msedge.exe 4496 7zG.exe 3928 7zG.exe 2132 7zG.exe 2500 7zG.exe 4160 Xworm V5.6.exe 2200 msedge.exe 2200 msedge.exe 2200 msedge.exe 2200 msedge.exe 2200 msedge.exe 2200 msedge.exe 2200 msedge.exe -
Suspicious use of SendNotifyMessage 25 IoCs
pid Process 1172 msedge.exe 1172 msedge.exe 1172 msedge.exe 1172 msedge.exe 1172 msedge.exe 1172 msedge.exe 1172 msedge.exe 1172 msedge.exe 1172 msedge.exe 1172 msedge.exe 1172 msedge.exe 1172 msedge.exe 4160 Xworm V5.6.exe 2200 msedge.exe 2200 msedge.exe 2200 msedge.exe 2200 msedge.exe 2200 msedge.exe 2200 msedge.exe 2200 msedge.exe 2200 msedge.exe 2200 msedge.exe 2200 msedge.exe 2200 msedge.exe 2200 msedge.exe -
Suspicious use of SetWindowsHookEx 60 IoCs
pid Process 4160 Xworm V5.6.exe 4800 XClient.exe 2632 OpenWith.exe 2632 OpenWith.exe 2632 OpenWith.exe 2632 OpenWith.exe 2632 OpenWith.exe 2632 OpenWith.exe 2632 OpenWith.exe 2632 OpenWith.exe 2632 OpenWith.exe 2632 OpenWith.exe 2632 OpenWith.exe 2632 OpenWith.exe 2632 OpenWith.exe 2632 OpenWith.exe 2632 OpenWith.exe 2632 OpenWith.exe 2632 OpenWith.exe 2632 OpenWith.exe 2632 OpenWith.exe 2632 OpenWith.exe 2632 OpenWith.exe 2632 OpenWith.exe 1284 OpenWith.exe 1284 OpenWith.exe 1284 OpenWith.exe 1284 OpenWith.exe 1284 OpenWith.exe 1284 OpenWith.exe 1284 OpenWith.exe 1284 OpenWith.exe 1284 OpenWith.exe 1284 OpenWith.exe 1284 OpenWith.exe 1284 OpenWith.exe 1284 OpenWith.exe 1284 OpenWith.exe 1284 OpenWith.exe 1328 Winword.exe 1328 Winword.exe 1328 Winword.exe 1328 Winword.exe 1328 Winword.exe 1328 Winword.exe 1328 Winword.exe 4416 Winword.exe 4416 Winword.exe 4416 Winword.exe 4416 Winword.exe 4416 Winword.exe 4416 Winword.exe 4416 Winword.exe 876 Winword.exe 876 Winword.exe 876 Winword.exe 876 Winword.exe 876 Winword.exe 876 Winword.exe 876 Winword.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 1172 wrote to memory of 3740 1172 msedge.exe 78 PID 1172 wrote to memory of 3740 1172 msedge.exe 78 PID 1172 wrote to memory of 4980 1172 msedge.exe 79 PID 1172 wrote to memory of 4980 1172 msedge.exe 79 PID 1172 wrote to memory of 4980 1172 msedge.exe 79 PID 1172 wrote to memory of 4980 1172 msedge.exe 79 PID 1172 wrote to memory of 4980 1172 msedge.exe 79 PID 1172 wrote to memory of 4980 1172 msedge.exe 79 PID 1172 wrote to memory of 4980 1172 msedge.exe 79 PID 1172 wrote to memory of 4980 1172 msedge.exe 79 PID 1172 wrote to memory of 4980 1172 msedge.exe 79 PID 1172 wrote to memory of 4980 1172 msedge.exe 79 PID 1172 wrote to memory of 4980 1172 msedge.exe 79 PID 1172 wrote to memory of 4980 1172 msedge.exe 79 PID 1172 wrote to memory of 4980 1172 msedge.exe 79 PID 1172 wrote to memory of 4980 1172 msedge.exe 79 PID 1172 wrote to memory of 4980 1172 msedge.exe 79 PID 1172 wrote to memory of 4980 1172 msedge.exe 79 PID 1172 wrote to memory of 4980 1172 msedge.exe 79 PID 1172 wrote to memory of 4980 1172 msedge.exe 79 PID 1172 wrote to memory of 4980 1172 msedge.exe 79 PID 1172 wrote to memory of 4980 1172 msedge.exe 79 PID 1172 wrote to memory of 4980 1172 msedge.exe 79 PID 1172 wrote to memory of 4980 1172 msedge.exe 79 PID 1172 wrote to memory of 4980 1172 msedge.exe 79 PID 1172 wrote to memory of 4980 1172 msedge.exe 79 PID 1172 wrote to memory of 4980 1172 msedge.exe 79 PID 1172 wrote to memory of 4980 1172 msedge.exe 79 PID 1172 wrote to memory of 4980 1172 msedge.exe 79 PID 1172 wrote to memory of 4980 1172 msedge.exe 79 PID 1172 wrote to memory of 4980 1172 msedge.exe 79 PID 1172 wrote to memory of 4980 1172 msedge.exe 79 PID 1172 wrote to memory of 4980 1172 msedge.exe 79 PID 1172 wrote to memory of 4980 1172 msedge.exe 79 PID 1172 wrote to memory of 4980 1172 msedge.exe 79 PID 1172 wrote to memory of 4980 1172 msedge.exe 79 PID 1172 wrote to memory of 4980 1172 msedge.exe 79 PID 1172 wrote to memory of 4980 1172 msedge.exe 79 PID 1172 wrote to memory of 4980 1172 msedge.exe 79 PID 1172 wrote to memory of 4980 1172 msedge.exe 79 PID 1172 wrote to memory of 4980 1172 msedge.exe 79 PID 1172 wrote to memory of 4980 1172 msedge.exe 79 PID 1172 wrote to memory of 4632 1172 msedge.exe 80 PID 1172 wrote to memory of 4632 1172 msedge.exe 80 PID 1172 wrote to memory of 3996 1172 msedge.exe 81 PID 1172 wrote to memory of 3996 1172 msedge.exe 81 PID 1172 wrote to memory of 3996 1172 msedge.exe 81 PID 1172 wrote to memory of 3996 1172 msedge.exe 81 PID 1172 wrote to memory of 3996 1172 msedge.exe 81 PID 1172 wrote to memory of 3996 1172 msedge.exe 81 PID 1172 wrote to memory of 3996 1172 msedge.exe 81 PID 1172 wrote to memory of 3996 1172 msedge.exe 81 PID 1172 wrote to memory of 3996 1172 msedge.exe 81 PID 1172 wrote to memory of 3996 1172 msedge.exe 81 PID 1172 wrote to memory of 3996 1172 msedge.exe 81 PID 1172 wrote to memory of 3996 1172 msedge.exe 81 PID 1172 wrote to memory of 3996 1172 msedge.exe 81 PID 1172 wrote to memory of 3996 1172 msedge.exe 81 PID 1172 wrote to memory of 3996 1172 msedge.exe 81 PID 1172 wrote to memory of 3996 1172 msedge.exe 81 PID 1172 wrote to memory of 3996 1172 msedge.exe 81 PID 1172 wrote to memory of 3996 1172 msedge.exe 81 PID 1172 wrote to memory of 3996 1172 msedge.exe 81 PID 1172 wrote to memory of 3996 1172 msedge.exe 81
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --start-maximized --single-argument https://gofile.io/d/QCP9sI1⤵
- Enumerates system info in registry
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:1172 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=90.0.4430.212 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=90.0.818.66 --initial-client-data=0x100,0x104,0x108,0xdc,0x10c,0x7ffd255c3cb8,0x7ffd255c3cc8,0x7ffd255c3cd82⤵PID:3740
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=1924,3394472944787579290,4793839411876040861,131072 --gpu-preferences=SAAAAAAAAADgAAAwAAAAAAAAAAAAAAAAAABgAAAAAAAoAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAB4AAAAAAAAAHgAAAAAAAAAKAAAAAQAAAAgAAAAAAAAACgAAAAAAAAAMAAAAAAAAAA4AAAAAAAAABAAAAAAAAAAAAAAAAUAAAAQAAAAAAAAAAAAAAAGAAAAEAAAAAAAAAABAAAABQAAABAAAAAAAAAAAQAAAAYAAAAIAAAAAAAAAAgAAAAAAAAA --mojo-platform-channel-handle=2052 /prefetch:22⤵PID:4980
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=1924,3394472944787579290,4793839411876040861,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2156 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:4632
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=1924,3394472944787579290,4793839411876040861,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2732 /prefetch:82⤵PID:3996
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1924,3394472944787579290,4793839411876040861,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3212 /prefetch:12⤵PID:2312
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1924,3394472944787579290,4793839411876040861,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3220 /prefetch:12⤵PID:1468
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1924,3394472944787579290,4793839411876040861,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4520 /prefetch:12⤵PID:4892
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --field-trial-handle=1924,3394472944787579290,4793839411876040861,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4944 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:2724
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\90.0.818.66\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\90.0.818.66\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=1924,3394472944787579290,4793839411876040861,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5436 /prefetch:82⤵PID:4308
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\90.0.818.66\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\90.0.818.66\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=1924,3394472944787579290,4793839411876040861,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5436 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:4744
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1924,3394472944787579290,4793839411876040861,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5576 /prefetch:12⤵PID:4896
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1924,3394472944787579290,4793839411876040861,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5768 /prefetch:12⤵PID:1016
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=quarantine.mojom.Quarantine --field-trial-handle=1924,3394472944787579290,4793839411876040861,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4736 /prefetch:82⤵
- NTFS ADS
- Suspicious behavior: EnumeratesProcesses
PID:4312
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:4836
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:3936
-
C:\Windows\System32\rundll32.exeC:\Windows\System32\rundll32.exe C:\Windows\System32\shell32.dll,SHCreateLocalServerRunDll {9aa46009-3ce0-458a-a354-715610a075e6} -Embedding1⤵PID:4552
-
C:\Program Files\7-Zip\7zG.exe"C:\Program Files\7-Zip\7zG.exe" x -o"C:\Users\Admin\Downloads\XWorm-5.6-main\" -ad -an -ai#7zMap12398:90:7zEvent219001⤵
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
PID:4496
-
C:\Program Files\7-Zip\7zG.exe"C:\Program Files\7-Zip\7zG.exe" x -o"C:\Users\Admin\Downloads\XWorm-5.6-main\" -ad -an -ai#7zMap24114:90:7zEvent125901⤵
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
PID:3928
-
C:\Program Files\7-Zip\7zG.exe"C:\Program Files\7-Zip\7zG.exe" x -o"C:\Users\Admin\Downloads\" -an -ai#7zMap5409:90:7zEvent309051⤵
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
PID:2132
-
C:\Program Files\7-Zip\7zG.exe"C:\Program Files\7-Zip\7zG.exe" x -o"C:\Users\Admin\Downloads\XWorm-5.6-main\" -ad -an -ai#7zMap6154:90:7zEvent219661⤵
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
PID:2500
-
C:\Users\Admin\Downloads\XWorm-5.6-main\XWorm-5.6-main\XWorm-5.6-main (1)\XWorm-5.6-main\Xworm V5.6.exe"C:\Users\Admin\Downloads\XWorm-5.6-main\XWorm-5.6-main\XWorm-5.6-main (1)\XWorm-5.6-main\Xworm V5.6.exe"1⤵
- Executes dropped EXE
- Enumerates system info in registry
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of SetWindowsHookEx
PID:4160 -
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\vbc.exe"C:\Windows\Microsoft.NET\Framework64\v4.0.30319\vbc.exe" /noconfig @"C:\Users\Admin\AppData\Local\Temp\ttdlzeg2\ttdlzeg2.cmdline"2⤵PID:872
-
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\cvtres.exeC:\Windows\Microsoft.NET\Framework64\v4.0.30319\cvtres.exe /NOLOGO /READONLY /MACHINE:IX86 "/OUT:C:\Users\Admin\AppData\Local\Temp\RES7646.tmp" "C:\Users\Admin\AppData\Local\Temp\vbcDFAEA9B594A74DECB1B5919248D117A5.TMP"3⤵PID:4596
-
-
-
C:\Windows\system32\wbem\WmiApSrv.exeC:\Windows\system32\wbem\WmiApSrv.exe1⤵PID:3368
-
C:\Windows\system32\AUDIODG.EXEC:\Windows\system32\AUDIODG.EXE 0x00000000000004CC 0x00000000000004BC1⤵
- Suspicious use of AdjustPrivilegeToken
PID:3312
-
C:\Users\Admin\Downloads\XWorm-5.6-main\XWorm-5.6-main\XWorm-5.6-main (1)\XWorm-5.6-main\XClient.exe"C:\Users\Admin\Downloads\XWorm-5.6-main\XWorm-5.6-main\XWorm-5.6-main (1)\XWorm-5.6-main\XClient.exe"1⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
PID:4800
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --profile-directory=Default1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
PID:2200 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=90.0.4430.212 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=90.0.818.66 --initial-client-data=0x100,0x104,0x108,0xdc,0x10c,0x7ffd255c3cb8,0x7ffd255c3cc8,0x7ffd255c3cd82⤵PID:780
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2076,4826407057887972964,11461178361641108409,131072 --gpu-preferences=SAAAAAAAAADgAAAwAAAAAAAAAAAAAAAAAABgAAAAAAAoAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAB4AAAAAAAAAHgAAAAAAAAAKAAAAAQAAAAgAAAAAAAAACgAAAAAAAAAMAAAAAAAAAA4AAAAAAAAABAAAAAAAAAAAAAAAAUAAAAQAAAAAAAAAAAAAAAGAAAAEAAAAAAAAAABAAAABQAAABAAAAAAAAAAAQAAAAYAAAAIAAAAAAAAAAgAAAAAAAAA --mojo-platform-channel-handle=2088 /prefetch:22⤵PID:4404
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2076,4826407057887972964,11461178361641108409,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2176 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:2248
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2076,4826407057887972964,11461178361641108409,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2516 /prefetch:82⤵PID:4120
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2076,4826407057887972964,11461178361641108409,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3328 /prefetch:12⤵PID:2360
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2076,4826407057887972964,11461178361641108409,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3336 /prefetch:12⤵PID:2168
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2076,4826407057887972964,11461178361641108409,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3892 /prefetch:12⤵PID:4260
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2076,4826407057887972964,11461178361641108409,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3580 /prefetch:12⤵PID:3584
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\90.0.818.66\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\90.0.818.66\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2076,4826407057887972964,11461178361641108409,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=3328 /prefetch:82⤵PID:3840
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\90.0.818.66\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\90.0.818.66\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2076,4826407057887972964,11461178361641108409,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=3328 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:416
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --field-trial-handle=2076,4826407057887972964,11461178361641108409,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5596 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:1380
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2076,4826407057887972964,11461178361641108409,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5540 /prefetch:12⤵PID:1912
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2076,4826407057887972964,11461178361641108409,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5248 /prefetch:12⤵PID:1976
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2076,4826407057887972964,11461178361641108409,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=13 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4728 /prefetch:12⤵PID:3520
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:808
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:3600
-
C:\Windows\system32\NOTEPAD.EXE"C:\Windows\system32\NOTEPAD.EXE" C:\Users\Admin\Downloads\XWorm-5.6-main\XWorm-5.6-main\XWorm-5.6-main (1)\XWorm-5.6-main\ClientsFolder\E17FFF0529C65014EF21\Recovery\RecoveryData\cookies.txt1⤵PID:4576
-
C:\Windows\system32\OpenWith.exeC:\Windows\system32\OpenWith.exe -Embedding1⤵
- Modifies registry class
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of SetWindowsHookEx
PID:2632
-
C:\Windows\system32\OpenWith.exeC:\Windows\system32\OpenWith.exe -Embedding1⤵
- Modifies registry class
- Suspicious use of SetWindowsHookEx
PID:1284
-
C:\Program Files\Microsoft Office\root\Office16\Winword.exe"C:\Program Files\Microsoft Office\root\Office16\Winword.exe" /n "C:\Users\Admin\Downloads\XWorm-5.6-main\XWorm-5.6-main\XWorm-5.6-main (1)\XWorm-5.6-main\ClientsFolder\E17FFF0529C65014EF21\Recovery\RecoveryData\passwords.json"1⤵
- Checks processor information in registry
- Enumerates system info in registry
- Suspicious behavior: AddClipboardFormatListener
- Suspicious use of SetWindowsHookEx
PID:1328
-
C:\Program Files\Microsoft Office\root\Office16\Winword.exe"C:\Program Files\Microsoft Office\root\Office16\Winword.exe" /n "C:\Users\Admin\Downloads\XWorm-5.6-main\XWorm-5.6-main\XWorm-5.6-main (1)\XWorm-5.6-main\ClientsFolder\E17FFF0529C65014EF21\Recovery\RecoveryData\autofill.json"1⤵
- Checks processor information in registry
- Enumerates system info in registry
- Suspicious behavior: AddClipboardFormatListener
- Suspicious use of SetWindowsHookEx
PID:4416
-
C:\Program Files\Microsoft Office\root\Office16\Winword.exe"C:\Program Files\Microsoft Office\root\Office16\Winword.exe" /n "C:\Users\Admin\Downloads\XWorm-5.6-main\XWorm-5.6-main\XWorm-5.6-main (1)\XWorm-5.6-main\ClientsFolder\E17FFF0529C65014EF21\Recovery\RecoveryData\cookies.json"1⤵
- Checks processor information in registry
- Enumerates system info in registry
- Suspicious behavior: AddClipboardFormatListener
- Suspicious use of SetWindowsHookEx
PID:876
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD5e8baaf6c583536c9e6327e9d4fddb4cc
SHA10c1436d1a870038a6cb0195704658ef59ef78906
SHA2567cea1717ca57c727378be31a2046e1b4be05ceaff81e76d45b5b3fb1a0b09507
SHA5126cdb5d74ebf3c2f398c2032e6047f32b342db6f28f997c9c3df2351e307b316a6d66127a3ba6f0b1a721e5afd50a5578ec9835ea25708fcd49850ec4ba64dd67
-
Filesize
152B
MD55332d65d7c50eee952b71eda55782f27
SHA19039a05b96d6f5fc532a4ddb304ec01aa2fe5879
SHA256b677f0eeb2f0c049f48cc35d484ead2ba5434a74e4264e64d7f426fe45f2ff0e
SHA512eeff99092be3b0bcf81e9ba0f2a72d592938ef90952e533f903707d1e0af2138db62a4b491476f499a0909bf52fc7aada7aa832c73aa882d40f488afe5b29b27
-
Filesize
152B
MD5b4f3e29377c6d6124f02c27b7045784d
SHA1d111f8a040cfc765c0aa18219ce7d4da9207498d
SHA25617d54e3d405738aae9e91cac681f92ed6e25800ba5a6aef90cc08b4a8cc9c378
SHA5123ad4148481e284752dd3aa2cb854d04434d3b4ab94b37b878078190da6f4c4480cc2b5077cb08d40fe4c22a94d27a5fed2600f69b938257a42275e4dd75c2738
-
Filesize
152B
MD5ece71e4a76cce2a7e58a341deafe3757
SHA15f5f743217b7ec844dae4eb6199fc603bb0c1c1d
SHA25658b8a9792392a03fce47787e58cf5094b26c9c2220fd428c3db8e9ca6aed9ca4
SHA512fbe25777b2adf44ce88d0750ec48d6c490bfe32dd0c696f6c27a1362265ce17f77f0ca7989a25bb08b90133e4fa63b4abdc49d5430759e3b458b7cdcd9048673
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index
Filesize144B
MD5393f3e9b4c888a1358e689ac7ea46f48
SHA15f8f15b13f2b4e6e294410e97e5d290c55691dc0
SHA256b17c7c7c25a6c65af1db64c59df7c6190b12f3d4ccc861050993d8a4998684c3
SHA5125a54648b8205a9ba10668f97241da77c3eec6df91704fb4d19798d05d9970ee74d62ca338f8abb4bc407a54756417336a46d52025896f38185df25d822fa43c1
-
Filesize
264KB
MD5cfa5d6085b8926758540b65a4e7bca6d
SHA16d127933bab95a58ab91ac969633a409960f7069
SHA256f4236000aef75293f0f669621bdf5451eeed09bd301c99537cb7bff730ca16c5
SHA5125982233177d43b9251d07c3fe93f4ad082b9ebd37df56c841f902b6f1bdbef4679cba56afb801572c9a226b49c77319799108660c2d4a4a801da6cdc342ca211
-
Filesize
399B
MD5d30838c1fb27edd999f89880a1247ecc
SHA1aa6fa7e48abe4f2b24722c0e564ac7f65c5d00da
SHA256021e64627445e078484686401ac14192217350049ce02b65bf9273644749c33b
SHA5120ec57b4dea0705a10fde0bd8a463e18594de6d89d850988428b2f47ad4c9e8fa8470dcae3237dddfd7d39966ece5fb8c816db49912e539c8d7c05d8e43f1bc06
-
Filesize
469B
MD5c9829243261965d2c443d2f2bc97c382
SHA11341e53e3cdefd35f980418a0e0d82f5559d5ae4
SHA256313211aad4c59646ec605cf9d8d85b132f021edda9b37b57700d4086c8a325a2
SHA512f48db2347cb5b594ddbd75f2234136400e90d527f2c8b4c7f831e301e0675f9927e5dc08a93913daa52d22f2df2519b956b5b98cb060b34697951bc5a3b7e512
-
Filesize
6KB
MD5943882e6408ef933380d880b7e0d7266
SHA18370ceb66d51f27980b7d56217b29a7e1af4f418
SHA2568085dc5b44f975a13e376d1eddda30b72390b2a65acf803450f39538db4724b9
SHA512ec394c90fe6176e001a960c455981677bdf2824c6ef1c518981260151689077665c8d509ab5de25bc3a75cd061aa96ace0bd0a985ab5ac19b002c8c033dfc0cf
-
Filesize
6KB
MD51baa495c80f68e1a0ce690cae54146b6
SHA175c66b739a05037c8b403189da2c5dee49563757
SHA25699af56f030bbaf2b30f8f72f5853ad6867b1e87161b00c4f601a7ab8103fc7bf
SHA51273a7c7780f4ce25ac340180bf67a3e69279e268f718ec5cceb3a17aa32244c615ce8e7fabd46840de57900e26e1de70855da7daaa9e48e7a46680894bf334100
-
Filesize
6KB
MD530827fe398c7c46da59d4564bbf0dbf3
SHA1980ab19acfe5481aa95bb2bd1c567b6b89566af3
SHA2567b65a1c6e79986950e1b8be825cc7b9874beeefbd9c6ef389d0cb9d484a93778
SHA512680651dace5caef5c2e6142ea9299cf9f75da78d98caf514772b1bb236e3ba8da27c2aa7e490fce8f27e2405865533c6910cbba8cd9ab10e08539f87ea601889
-
Filesize
6KB
MD5ee77c206585a3d589a1b4c1233165f8b
SHA17b2f86c572034e50a45e45bf01bd581aeeb756b4
SHA25682036ef95ce65e7d3bb1dd7fdc44ce5a67da08388404d868156d3dfb997cada5
SHA512ae4991b8f37abc05d9a9288274155388656005253d46b988fcde270462bd1e41e3bdaaaf7a4b57586c409218dc1cbd024bf95683c17ffeaaeaeb21ab13ef62fc
-
Filesize
5KB
MD5d27211257231e06cea9b29ed12b277cb
SHA1974a14d860d885d039d965d6b56534d3622539a5
SHA256e49cb7779be0b945f9a4fbc64e957b6361f00c1295bc501720552926b00aeb27
SHA5129752f34d45018be32cba7520761bcf7359aa726d46e7c21f8bc183a3eabca2ad8224070700d7e5871c48674ac125f6c109f610bc4caac7496924bc2509f44823
-
Filesize
6KB
MD58008b7497aa10d7a4f49a5324c0d6b45
SHA1bd9a55cadb433420db3b798678adc1e9dc7a7ab0
SHA256e3dc5991ce5a804ae5a0b8e89865ce74c8ea6f9f5a7dd8e46fc4379390b10999
SHA51202bbf58c5bdf0429a91ddba4973e4f62cd5e61dddd9b880e4e6a41fb4e911274e87ff700cf7503ecebd8b1aad2e349bfdb526969f0fbf09c7fb2076ae3fff87e
-
Filesize
6KB
MD58bb376030ea5663811e4372ffe78acc7
SHA1bdbd8db81035da71bd078058b9bf6cdbf48f4678
SHA256c72b7bb90595635306af1a041fc23576f7cf3cc1182c2b505c0c0b58af18e44c
SHA51225c54ca97dd33c0fa6a7ddda17d489e9c02efc4f89be8f1be4e1b149ad9100a05a20f17750ccdd6c5e08608a4e8cd074e4a543c775aaeb22b4506d687517cd0b
-
Filesize
6KB
MD52002af5b75f486cb69706caaf95662d8
SHA1670fb2632b5dad08fd526ae2817cbe82892ad9ad
SHA25656a578c7a7076fb4d9276dafefe2d435badb4cf1939140e784e315725f33262d
SHA51263ed8983d7c2725f1beddf64caa925edbdf1a4d2193a4a15f2b419c8d848f71e4f8eae46f51df3d0950e58c7c59d8d35c03241bc340fb8c1fb2591ce3b91e180
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
16B
MD5aefd77f47fb84fae5ea194496b44c67a
SHA1dcfbb6a5b8d05662c4858664f81693bb7f803b82
SHA2564166bf17b2da789b0d0cc5c74203041d98005f5d4ef88c27e8281e00148cd611
SHA512b733d502138821948267a8b27401d7c0751e590e1298fda1428e663ccd02f55d0d2446ff4bc265bdcdc61f952d13c01524a5341bc86afc3c2cde1d8589b2e1c3
-
Filesize
11KB
MD5265c128b893b257a937f18e867f89993
SHA162e253572dfa56dddf58ac858671b69a850ea6ce
SHA256b1b02be2565ad224450244752f5668f3fad9e1d9041641775e076fc31d2389a3
SHA512213c137feaaa04d9b4fdf1a8a2dd58e32b54445bf52115533c75dcfd315a69f365e5465c2c5c3d6a99d1dbe4edeedda6ff91af94878ca8d1f96302eec83b694c
-
Filesize
11KB
MD565f50c17b2fa4a80106111a8e6269573
SHA18f8e6d655517d43736436efeaac9dee253961a8b
SHA256904c20ece68ee650cea3144475efea07ca7db919f267e4c9705aa358fcb2cd9b
SHA5127f10535592c12848bf580409de2221c0e61d9c5f90484aae43f355d39bdebb8866c1ca44c5156bcf7a990367a54f36466252fd75a71a6b80b5a652a4bec7aeb4
-
Filesize
11KB
MD5243efa674c259f2a3dd83ad5806ff667
SHA1d6fff05ebb7367c9bde5d4d74cdac009d9465f32
SHA2563e330a2aba768389171f2541a98c9df487b8348a46bc5ccac63996022424bc7a
SHA512229956c9ba4b0f0c1dc924acdd6c182de18b38610b094d3958372552c61bf17bcf6941ce934c04dbbe21b656bda6599f91596aa66087a7cfbf3b6928cc248c47
-
Filesize
11KB
MD52aa82dd340dd9fbcdce98dc8b7c0ddb1
SHA115a28eab930851e1cbe7eefa0df2b8dda8359b2b
SHA256a832e42ec2d944b25ee69926a3ddc11d4d87ca97676c5bc8fa2ced33f42f05a0
SHA512beeff7534838d565f67360d723b4aba66bed3d889eab3dea3004090a89ee8124eeb3d29407309af2f7375cc36b29a39f3d9be5f71db5956b9674facb4943463e
-
Filesize
21B
MD5f1b59332b953b3c99b3c95a44249c0d2
SHA11b16a2ca32bf8481e18ff8b7365229b598908991
SHA256138e49660d259061d8152137abd8829acdfb78b69179890beb489fe3ffe23e0c
SHA5123c1f99ecc394df3741be875fbe8d95e249d1d9ac220805794a22caf81620d5fdd3cce19260d94c0829b3160b28a2b4042e46b56398e60f72134e49254e9679a4
-
Filesize
14B
MD56ca4960355e4951c72aa5f6364e459d5
SHA12fd90b4ec32804dff7a41b6e63c8b0a40b592113
SHA25688301f0b7e96132a2699a8bce47d120855c7f0a37054540019e3204d6bcbaba3
SHA5128544cd778717788b7484faf2001f463320a357db63cb72715c1395ef19d32eec4278bab07f15de3f4fed6af7e4f96c41908a0c45be94d5cdd8121877eccf310d
-
Filesize
137B
MD5665a36e064a1db4ca8c899d15906cdc0
SHA111e745211018a47381ac00308b69ffde1e786d15
SHA25662646b966fe0fc6befa85e47be2ce935adce872537e8957b750149f4daf7ac4a
SHA51254ce9dfcd86f7e7a00e677892bed0303eba2f803d8689f0c3332d722994834c24d3eeb1450818e9afbd6f500e40bc0d7514b185c766ee4ff8084a3bc7902b95c
-
Filesize
1KB
MD5758532855c9998e7de5b9ee749367648
SHA18c29d460281d12827627dc511ce81e7791cada97
SHA256525b63f3047cf37b9f9c5be1379c7b7fe5fb66cc3dd5b9c9059c83d2742b7a6d
SHA5127bfa017f5c6d5090d02d472a02d074a8d320c03f28be01c5e8d6a3a9a2b91c0cfc2322ae891b06836f1ed3debaa5289185d5f1c8adc8405c66460e308d6483c9
-
Filesize
78KB
MD54f7c9318a403eac3b51b778db89b688b
SHA1e014e16ae00535fcc559ba234414fc1d22e1a38c
SHA256e3fa35df83ec24dbcc7235dfd5208bca5ca6fc13cb572a73c7a043f5f0cfebc2
SHA512fdeaa0c90e507e7fdaba60e129d5c41903153f8d6b7f649459a17b53c30839b2e2abe08f48929bc56d3dde7720c0bd4d7c83b704886e4181d860bfcdd5889c40
-
Filesize
356B
MD5e6b8373057c791b90b34f1cc108c2d53
SHA193c2b5820aa8ce35c546141e6a1a47b1edf4e83b
SHA256d90e3eb48893c30a9cca18f87c525eaf3f2f2b7c794a367d4038489c3e350a4b
SHA51225992edd6609392ada23cf04271d7fcd83e3f3eeab26534c60ac0f2d3ec5c2f9c1adf5b9a6db6d1010003caee4da4c9150bd9a922a8ac85e60bd958af6fbc130
-
Filesize
1KB
MD5d40c58bd46211e4ffcbfbdfac7c2bb69
SHA1c5cf88224acc284a4e81bd612369f0e39f3ac604
SHA25601902f1903d080c6632ae2209136e8e713e9fd408db4621ae21246b65bfea2ca
SHA51248b14748e86b7d92a3ea18f29caf1d7b4b2e1de75377012378d146575048a2531d2e5aaeae1abf2d322d06146177cdbf0c2940ac023efae007b9f235f18e2c68
-
Filesize
360B
MD538c11bdd2106ff9cb3ef230ac6bc2b22
SHA1a806c9c2cb2d287567ef349f358c3143234bcb6a
SHA256cb4337c28b784589c284d9dac92d1846faf8e8d46a050ee3c22398167dc80ffe
SHA512d0bc3c581e0b85c9078471c5c3adc725883e2a3364717c2373d6e142a091585233f73531592dd00f2bb0f6835dab43066c00c23f8c88e34f02dda6c3d9e07fb7
-
Filesize
380B
MD51f121c19e7b32f6dfe045ec9b19acdda
SHA1064831b702867be86eb8104a1ba76eb3402f7f61
SHA2568e1f6059d6ad1e1fa8a722bac8acfb2e8b91d436f7d3fa66be68ce1060eaf0a0
SHA512c072c9142fcb9d1f8e3766a1ef8be9e0f92f62de0e0b279bfc9c77757920b519b8f9dd413fbdf3b12fc02b77ce05ec1d95f93d93427a2fd0b2ce3c4ce573e594
-
Filesize
393B
MD538b1e4d54bfa606359d702c143df3db6
SHA1dea8720f7539a53d129f6d69d67aca3ca9157a0d
SHA256829d0b359b85e4646ca38e0993c095506d2d773c3a20e7dc020ea8ca2e17a431
SHA512e60c8a25792c9b8b2f6f218a994d682f99c3e8d1bbed34cc6d4c61239c384c6256027a4999c25115e74c623e2c947fa75943018a423fada8073fcbb1f632dcf9
-
Filesize
21.0MB
MD5c76d0b2c5d8f7e6f6290ba80b807f7d6
SHA19750324f412b4b67ff0b8bdf86ccbb56319d1ac8
SHA2569eaec7ec71dac1b9bcb5e27050e432e485923f0d48a27670d42050de80baf0e1
SHA51276dc742fb91bf8265124adf7b10b4eeb5215669e6379501033a12a341a96cb178c393125e79e3925e0bbcf57f8224c79783da81ae2f35f8a5a5a20304f9b71e7
-
Filesize
26B
MD5fbccf14d504b7b2dbcb5a5bda75bd93b
SHA1d59fc84cdd5217c6cf74785703655f78da6b582b
SHA256eacd09517ce90d34ba562171d15ac40d302f0e691b439f91be1b6406e25f5913
SHA512aa1d2b1ea3c9de3ccadb319d4e3e3276a2f27dd1a5244fe72de2b6f94083dddc762480482c5c2e53f803cd9e3973ddefc68966f974e124307b5043e654443b98
-
C:\Users\Admin\Downloads\XWorm-5.6-main\XWorm-5.6-main\XWorm-5.6-main (1)\XWorm-5.6-main\GMap.NET.Core.dll
Filesize2.9MB
MD5819352ea9e832d24fc4cebb2757a462b
SHA1aba7e1b29bdcd0c5a307087b55c2ec0c7ca81f11
SHA25658c755fcfc65cddea561023d736e8991f0ad69da5e1378dea59e98c5db901b86
SHA5126a5b0e1553616ea29ec72c12072ae05bdd709468a173e8adbdfe391b072c001ecacb3dd879845f8d599c6152eca2530cdaa2c069b1f94294f778158eaaebe45a
-
C:\Users\Admin\Downloads\XWorm-5.6-main\XWorm-5.6-main\XWorm-5.6-main (1)\XWorm-5.6-main\GMap.NET.WindowsForms.dll
Filesize147KB
MD532a8742009ffdfd68b46fe8fd4794386
SHA1de18190d77ae094b03d357abfa4a465058cd54e3
SHA256741e1a8f05863856a25d101bd35bf97cba0b637f0c04ecb432c1d85a78ef1365
SHA51222418d5e887a6022abe8a7cbb0b6917a7478d468d211eecd03a95b8fb6452fc59db5178573e25d5d449968ead26bb0b2bfbfada7043c9a7a1796baca5235a82b
-
Filesize
1.2MB
MD58ef41798df108ce9bd41382c9721b1c9
SHA11e6227635a12039f4d380531b032bf773f0e6de0
SHA256bc07ff22d4ee0b6fafcc12482ecf2981c172a672194c647cedf9b4d215ad9740
SHA5124c62af04d4a141b94eb3e1b0dbf3669cb53fe9b942072ed7bea6a848d87d8994cff5a5f639ab70f424eb79a4b7adabdde4da6d2f02f995bd8d55db23ce99f01b
-
C:\Users\Admin\Downloads\XWorm-5.6-main\XWorm-5.6-main\XWorm-5.6-main (1)\XWorm-5.6-main\Guna.UI2.dll
Filesize1.9MB
MD5bcc0fe2b28edd2da651388f84599059b
SHA144d7756708aafa08730ca9dbdc01091790940a4f
SHA256c6264665a882e73eb2262a74fea2c29b1921a9af33180126325fb67a851310ef
SHA5123bfc3d27c095dde988f779021d0479c8c1de80a404454813c6cae663e3fe63dc636bffa7de1094e18594c9d608fa7420a0651509544722f2a00288f0b7719cc8
-
C:\Users\Admin\Downloads\XWorm-5.6-main\XWorm-5.6-main\XWorm-5.6-main (1)\XWorm-5.6-main\Icons\icon (15).ico
Filesize361KB
MD5e3143e8c70427a56dac73a808cba0c79
SHA163556c7ad9e778d5bd9092f834b5cc751e419d16
SHA256b2f57a23ecc789c1bbf6037ac0825bf98babc7bf0c5d438af5e2767a27a79188
SHA51274e0f4b55625df86a87b9315e4007be8e05bbecca4346a6ea06ef5b1528acb5a8bb636ef3e599a3820dbddcf69563a0a22e2c1062c965544fd75ec96fd9803fc
-
Filesize
502KB
MD53b87d1363a45ce9368e9baec32c69466
SHA170a9f4df01d17060ec17df9528fca7026cc42935
SHA25681b3f1dc3f1eac9762b8a292751a44b64b87d0d4c3982debfdd2621012186451
SHA5121f07d3b041763b4bc31f6bd7b181deb8d34ff66ec666193932ffc460371adbcd4451483a99009b9b0b71f3864ed5c15c6c3b3777fabeb76f9918c726c35eb7d7
-
C:\Users\Admin\Downloads\XWorm-5.6-main\XWorm-5.6-main\XWorm-5.6-main (1)\XWorm-5.6-main\Newtonsoft.Json.dll
Filesize695KB
MD5195ffb7167db3219b217c4fd439eedd6
SHA11e76e6099570ede620b76ed47cf8d03a936d49f8
SHA256e1e27af7b07eeedf5ce71a9255f0422816a6fc5849a483c6714e1b472044fa9d
SHA51256eb7f070929b239642dab729537dde2c2287bdb852ad9e80b5358c74b14bc2b2dded910d0e3b6304ea27eb587e5f19db0a92e1cbae6a70fb20b4ef05057e4ac
-
C:\Users\Admin\Downloads\XWorm-5.6-main\XWorm-5.6-main\XWorm-5.6-main (1)\XWorm-5.6-main\Plugins\ActiveWindows.dll
Filesize14KB
MD55a766a4991515011983ceddf7714b70b
SHA14eb00ae7fe780fa4fe94cedbf6052983f5fd138b
SHA256567b9861026a0dbc5947e7515dc7ab3f496153f6b3db57c27238129ec207fc52
SHA5124bd6b24e236387ff58631207ea42cd09293c3664468e72cd887de3b3b912d3795a22a98dcf4548fb339444337722a81f8877abb22177606d765d78e48ec01fd8
-
C:\Users\Admin\Downloads\XWorm-5.6-main\XWorm-5.6-main\XWorm-5.6-main (1)\XWorm-5.6-main\Plugins\Chat.dll
Filesize18KB
MD559f75c7ffaccf9878a9d39e224a65adf
SHA146b0f61a07e85e3b54b728d9d7142ddc73c9d74b
SHA256aab20f465955d77d6ec3b5c1c5f64402a925fb565dda5c8e38c296cb7406e492
SHA51280056163b96ce7a8877874eaae559f75217c0a04b3e3d4c1283fe23badfc95fe4d587fd27127db4be459b8a3adf41900135ea12b0eeb4187adbcf796d9505cb8
-
C:\Users\Admin\Downloads\XWorm-5.6-main\XWorm-5.6-main\XWorm-5.6-main (1)\XWorm-5.6-main\Plugins\Chromium.dll
Filesize32KB
MD5edb2f0d0eb08dcd78b3ddf87a847de01
SHA1cc23d101f917cad3664f8c1fa0788a89e03a669c
SHA256b6d8bccdf123ceac6b9642ad3500d4e0b3d30b9c9dd2d29499d38c02bd8f9982
SHA5128f87da834649a21a908c95a9ea8e2d94726bd9f33d4b7786348f6371dfae983cc2b5b5d4f80a17a60ded17d4eb71771ec25a7c82e4f3a90273c46c8ee3b8f2c3
-
C:\Users\Admin\Downloads\XWorm-5.6-main\XWorm-5.6-main\XWorm-5.6-main (1)\XWorm-5.6-main\Plugins\Clipboard.dll
Filesize14KB
MD5831eb0de839fc13de0abab64fe1e06e7
SHA153aad63a8b6fc9e35c814c55be9992abc92a1b54
SHA256e31a1c2b1baa2aa2c36cabe3da17cd767c8fec4c206bd506e889341e5e0fa959
SHA5122f61bcf972671d96e036b3c99546cd01e067bef15751a87c00ba6d656decb6b69a628415e5363e650b55610cf9f237585ada7ce51523e6efc0e27d7338966bee
-
C:\Users\Admin\Downloads\XWorm-5.6-main\XWorm-5.6-main\XWorm-5.6-main (1)\XWorm-5.6-main\Plugins\Cmstp-Bypass.dll
Filesize11KB
MD5cf15259e22b58a0dfd1156ab71cbd690
SHA13614f4e469d28d6e65471099e2d45c8e28a7a49e
SHA256fa420fd3d1a5a2bb813ef8e6063480099f19091e8fa1b3389004c1ac559e806b
SHA5127302a424ed62ec20be85282ff545a4ca9e1aecfe20c45630b294c1ae72732465d8298537ee923d9e288ae0c48328e52ad8a1a503e549f8f8737fabe2e6e9ad38
-
C:\Users\Admin\Downloads\XWorm-5.6-main\XWorm-5.6-main\XWorm-5.6-main (1)\XWorm-5.6-main\Plugins\FileManager.dll
Filesize679KB
MD5641a8b61cb468359b1346a0891d65b59
SHA12cdc49bcd7428fe778a94cdcd19cabf5ece8c9c0
SHA256b58ed3ebbcd27c7f4b173819528ff4db562b90475a5e304521ed5c564d39fffd
SHA512042702d34664ea6288e891c9f7aa10a5b4b07317f25f82d6c9fa9ba9b98645c14073d0f66637060b416a30c58dec907d9383530320a318523c51f19ebd0a4fee
-
C:\Users\Admin\Downloads\XWorm-5.6-main\XWorm-5.6-main\XWorm-5.6-main (1)\XWorm-5.6-main\Plugins\FilesSearcher.dll
Filesize478KB
MD56f8f1621c16ac0976600146d2217e9d2
SHA1b6aa233b93aae0a17ee8787576bf0fbc05cedde4
SHA256e66e1273dc59ee9e05ce3e02f1b760b18dd296a47d92b3ce5b24efb48e5fb21b
SHA512eb55acdea8648c8cdefee892758d9585ff81502fc7037d5814e1bd01fee0431f4dde0a4b04ccb2b0917e1b11588f2dc9f0bfe750117137a01bbd0c508f43ef6a
-
C:\Users\Admin\Downloads\XWorm-5.6-main\XWorm-5.6-main\XWorm-5.6-main (1)\XWorm-5.6-main\Plugins\HBrowser.dll
Filesize25KB
MD5f0e921f2f850b7ec094036d20ff9be9b
SHA13b2d76d06470580858cc572257491e32d4b021c0
SHA25675e8ff57fa6d95cf4d8405bffebb2b9b1c55a0abba0fe345f55b8f0e88be6f3c
SHA51216028ae56cd1d78d5cb63c554155ae02804aac3f15c0d91a771b0dcd5c8df710f39481f6545ca6410b7cd9240ec77090f65e3379dcfe09f161a3dff6aec649f3
-
C:\Users\Admin\Downloads\XWorm-5.6-main\XWorm-5.6-main\XWorm-5.6-main (1)\XWorm-5.6-main\Plugins\HRDP.dll
Filesize1.7MB
MD5f27b6e8cf5afa8771c679b7a79e11a08
SHA16c3fcf45e35aaf6b747f29a06108093c284100da
SHA2564aa18745a5fddf7ec14adaff3ad1b4df1b910f4b6710bf55eb27fb3942bb67de
SHA5120d84966bbc9290b04d2148082563675ec023906d58f5ba6861c20542271bf11be196d6ab24e48372f339438204bd5c198297da98a19fddb25a3df727b5aafa33
-
C:\Users\Admin\Downloads\XWorm-5.6-main\XWorm-5.6-main\XWorm-5.6-main (1)\XWorm-5.6-main\Plugins\HVNC.dll
Filesize58KB
MD530eb33588670191b4e74a0a05eecf191
SHA108760620ef080bb75c253ba80e97322c187a6b9f
SHA2563a287acb1c89692f2c18596dd4405089ac998bb9cf44dd225e5211923d421e96
SHA512820cca77096ff2eea8e459a848f7127dc46af2e5f42f43b2b7375be6f4778c1b0e34e4aa5a97f7fbabe0b53dcd351d09c231bb9afedf7bcec60d949918a06b97
-
C:\Users\Admin\Downloads\XWorm-5.6-main\XWorm-5.6-main\XWorm-5.6-main (1)\XWorm-5.6-main\Plugins\HVNCMemory.dll
Filesize39KB
MD5065f0830d1e36f8f44702b0f567082e8
SHA1724c33558fcc8ecd86ee56335e8f6eb5bfeac0db
SHA256285b462e3cd4a5b207315ad33ee6965a8b98ca58abb8d16882e4bc2d758ff1a4
SHA512bac0148e1b78a8fde242697bff1bbe10a18ffab85fdced062de3dc5017cd77f0d54d8096e273523b8a3910fe17fac111724acffa5bec30e4d81b7b3bd312d545
-
C:\Users\Admin\Downloads\XWorm-5.6-main\XWorm-5.6-main\XWorm-5.6-main (1)\XWorm-5.6-main\Plugins\HiddenApps.dll
Filesize45KB
MD5ba2141a7aefa1a80e2091bf7c2ca72db
SHA19047b546ce9c0ea2c36d24a10eb31516a24a047d
SHA2566a098f5a7f9328b35d73ee232846b13e2d587d47f473cbc9b3f1d74def7086ea
SHA51291e43620e5717b699e34e658d6af49bba200dcf91ac0c9a0f237ec44666b57117a13bc8674895b7a9cac5a17b2f91cdc3daa5bcc52c43edbabd19bc1ed63038c
-
C:\Users\Admin\Downloads\XWorm-5.6-main\XWorm-5.6-main\XWorm-5.6-main (1)\XWorm-5.6-main\Plugins\Informations.dll
Filesize22KB
MD567a884eeb9bd025a1ef69c8964b6d86f
SHA197e00d3687703b1d7cc0939e45f8232016d009d9
SHA256cba453460be46cfa705817abbe181f9bf65dca6b6cea1ad31629aa08dbeaf72b
SHA51252e852021a1639868e61d2bd1e8f14b9c410c16bfca584bf70ae9e71da78829c1cada87d481e55386eec25646f84bb9f3baee3b5009d56bcbb3be4e06ffa0ae7
-
C:\Users\Admin\Downloads\XWorm-5.6-main\XWorm-5.6-main\XWorm-5.6-main (1)\XWorm-5.6-main\Plugins\Keylogger.dll
Filesize17KB
MD5246f7916c4f21e98f22cb86587acb334
SHA1b898523ed4db6612c79aad49fbd74f71ecdbd461
SHA256acfe5c3aa2a3bae3437ead42e90044d7eee972ead25c1f7486bea4a23c201d3a
SHA5121c256ca9b9857e6d393461b55e53175b7b0d88d8f3566fd457f2b3a4f241cb91c9207d54d8b0867ea0abd3577d127835beb13157c3e5df5c2b2b34b3339bd15d
-
C:\Users\Admin\Downloads\XWorm-5.6-main\XWorm-5.6-main\XWorm-5.6-main (1)\XWorm-5.6-main\Plugins\Maps.dll
Filesize15KB
MD5806c3802bfd7a97db07c99a5c2918198
SHA1088393a9d96f0491e3e1cf6589f612aa5e1df5f8
SHA25634b532a4d0560e26b0d5b81407befdc2424aacc9ef56e8b13de8ad0f4b3f1ab6
SHA512ed164822297accd3717b4d8e3927f0c736c060bb7ec5d99d842498b63f74d0400c396575e9fa664ad36ae8d4285cfd91e225423a0c77a612912d66ea9f63356c
-
C:\Users\Admin\Downloads\XWorm-5.6-main\XWorm-5.6-main\XWorm-5.6-main (1)\XWorm-5.6-main\Plugins\MessageBox.dll
Filesize14KB
MD57db8b7e15194fa60ffed768b6cf948c2
SHA13de1b56cc550411c58cd1ad7ba845f3269559b5c
SHA256bc09b671894c9a36f4eca45dd6fbf958a967acea9e85b66c38a319387b90dd29
SHA512e7f5430b0d46f133dc9616f9eeae8fb42f07a8a4a18b927dd7497de29451086629dfc5e63c0b2a60a4603d8421c6570967c5dbde498bb480aef353b3ed8e18a1
-
C:\Users\Admin\Downloads\XWorm-5.6-main\XWorm-5.6-main\XWorm-5.6-main (1)\XWorm-5.6-main\Plugins\Microphone.dll
Filesize540KB
MD59c3d90ccf5d47f6eef83542bd08d5aeb
SHA10c0aa80c3411f98e8db7a165e39484e8dae424c7
SHA256612898afdf9120cfef5843f9b136c66ecc3e0bb6f3d1527d0599a11988b7783c
SHA5120786f802fbd24d4ab79651298a5ba042c275d7d01c6ac2c9b3ca1e4ee952de7676ec8abf68d226b72696e9480bd4d4615077163efbcda7cff6a5f717736cbdfe
-
C:\Users\Admin\Downloads\XWorm-5.6-main\XWorm-5.6-main\XWorm-5.6-main (1)\XWorm-5.6-main\Plugins\Ngrok-Installer.dll
Filesize400KB
MD53e19341a940638536b4a7891d5b2b777
SHA1ca6f5b28e2e54f3f86fd9f45a792a868c82e35b5
SHA256b574aabf02a65aa3b6f7bfff0a574873ce96429d3f708a10f87bc1f6518f14aa
SHA51206639892ea4a27c8840872b0de450ae1a0dac61e1dcb64523973c629580323b723c0e9074ff2ddf9a67a8a6d45473432ffc4a1736c0ddc74e054ae13b774f3e2
-
C:\Users\Admin\Downloads\XWorm-5.6-main\XWorm-5.6-main\XWorm-5.6-main (1)\XWorm-5.6-main\Plugins\Options.dll
Filesize30KB
MD597193fc4c016c228ae0535772a01051d
SHA1f2f6d56d468329b1e9a91a3503376e4a6a4d5541
SHA2565c34aee5196e0f8615b8d1d9017dd710ea28d2b7ac99295d46046d12eea58d78
SHA5129f6d7da779e8c9d7307f716d4a4453982bb7f090c35947850f13ec3c9472f058fc11e1120a9641326970b9846d3c691e0c2afd430c12e5e8f30abadb5dcf5ed2
-
C:\Users\Admin\Downloads\XWorm-5.6-main\XWorm-5.6-main\XWorm-5.6-main (1)\XWorm-5.6-main\Plugins\Pastime.dll
Filesize17KB
MD56430ab4458a703fb97be77d6bea74f5b
SHA159786b619243d4e00d82b0a3b7e9deb6c71b283c
SHA256a46787527ac34cd71d96226ddfc0a06370b61e4ad0267105be2aec8d82e984c1
SHA5127b6cf7a613671826330e7f8daddc4c7c37b4d191cf4938c1f5b0fb7b467b28a23fb56e412dc82192595cfa9d5b552668ef0aaa938c8ae166029a610b246d3ecc
-
C:\Users\Admin\Downloads\XWorm-5.6-main\XWorm-5.6-main\XWorm-5.6-main (1)\XWorm-5.6-main\Plugins\Performance.dll
Filesize16KB
MD51841c479da7efd24521579053efcf440
SHA10aacfd06c7223b988584a381cb10d6c3f462fc6a
SHA256043b6a0284468934582819996dbaa70b863ab4caa4f968c81c39a33b2ac81735
SHA5123005e45728162cc04914e40a3b87a1c6fc7ffde5988d9ff382d388e9de4862899b3390567c6b7d54f0ec02283bf64bcd5529319ca32295c109a7420848fa3487
-
C:\Users\Admin\Downloads\XWorm-5.6-main\XWorm-5.6-main\XWorm-5.6-main (1)\XWorm-5.6-main\Plugins\ProcessManager.dll
Filesize19KB
MD53d4ec14005a25a4cb05b1aa679cf22bf
SHA16f4a827d94ad020bc23fbd04b7d8ca2995267094
SHA2567cf1921a5f8429b2b9e8197de195cfae2353fe0d8cb98e563bdf1e782fe2ee4e
SHA5120ee72d345d5431c7a6ffc71cf5e37938b93fd346e5a4746f5967f1aa2b69c34ca4ba0d0abd867778d8ca60b56f01e2d7fc5e7cf7c5a39a92015d4df2d68e382e
-
C:\Users\Admin\Downloads\XWorm-5.6-main\XWorm-5.6-main\XWorm-5.6-main (1)\XWorm-5.6-main\Plugins\Programs.dll
Filesize13KB
MD5a6734a047b0b57055807a4f33a80d4dd
SHA10b3a78b2362b0fd3817770fdc6dd070e3305615c
SHA256953a8276faa4a18685d09cd9187ed3e409e3cccd7daf34b6097f1eb8d96125a4
SHA5127292eab25f0e340e78063f32961eff16bb51895ad46cfd09933c0c30e3315129945d111a877a191fc261ad690ad6b02e1f2cabc4ff2fdac962ee272b41dd6dfa
-
C:\Users\Admin\Downloads\XWorm-5.6-main\XWorm-5.6-main\XWorm-5.6-main (1)\XWorm-5.6-main\Plugins\Ransomware.dll
Filesize20KB
MD5ccc9ea43ead4aa754b91e2039fe0ac1c
SHA1f382635559045ac1aeb1368d74e6b5c6e98e6a48
SHA25614c2bbccdabb8408395d636b44b99de4b16db2e6bf35181cb71e7be516d83ad9
SHA5125d05254ba5cd7b1967a84d5b0e6fd23c54766474fb8660a001bf3d21a3f5c8c20fcdb830fb8659a90da96655e6ee818ceefb6afa610cc853b7fba84bb9db4413
-
C:\Users\Admin\Downloads\XWorm-5.6-main\XWorm-5.6-main\XWorm-5.6-main (1)\XWorm-5.6-main\Plugins\Recovery.dll
Filesize1.1MB
MD5776193701a2ed869b5f1b6e71970a0ac
SHA12f973458531aaa283cdc835af4e24f5f709cbad1
SHA25666dbe3b90371fe58caa957e83c1c1f0acce941a36cf140a0f07e64403dd13303
SHA512a41f981c861e8d40487a9cd0863f9055165427e10580548e972a47ef47cf3e777aab2df70dc6f464cc3077860e86eda7462e9754f9047a1ecc0ed9721663aeb9
-
C:\Users\Admin\Downloads\XWorm-5.6-main\XWorm-5.6-main\XWorm-5.6-main (1)\XWorm-5.6-main\Plugins\Regedit.dll
Filesize15KB
MD553a2cfe273c311b64cf5eaca62f8c2fd
SHA14ec95ec4777a0c5b4acde57a3490e1c139a8f648
SHA2562f73dc0f3074848575c0408e02079fd32b7497f8816222ae3ce8c63725a62fe6
SHA512992b37d92157ae70a106a9835de46a4ac156341208cfe7fb0477dc5fc3bc9ddae71b35e2336fc5c181630bac165267b7229f97be436912dfd9526a020d012948
-
C:\Users\Admin\Downloads\XWorm-5.6-main\XWorm-5.6-main\XWorm-5.6-main (1)\XWorm-5.6-main\Plugins\RemoteDesktop.dll
Filesize18KB
MD5e6367d31cf5d16b1439b86ae6b7b31c3
SHA1f52f1e73614f2cec66dab6af862bdcb5d4d9cf35
SHA256cc52384910cee944ddbcc575a8e0177bfa6b16e3032438b207797164d5c94b34
SHA5128bc78a9b62f4226be146144684dc7fcd085bcf4d3d0558cb662aacc143d1438b7454e8ac70ca83ebeedc2a0fcea38ad8e77a5d926a85254b5a7d420a5605538a
-
C:\Users\Admin\Downloads\XWorm-5.6-main\XWorm-5.6-main\XWorm-5.6-main (1)\XWorm-5.6-main\Plugins\ReverseProxy.dll
Filesize16KB
MD5a22d11379e413cf832b3943ce46f2463
SHA199b9552e8a25bff29678aff828901edbc23eaba5
SHA2568c4efe2c8702141ffa8ff8f55d248dc4220231ae8d12ecea1f22906a9285b32b
SHA512cc1eccb29135acd35804b44f73447bd8dedc8ea085dee3670cf49120baa905aa7ca512c14a3f4df6aeb5a70347bd214865f9dc8b709a00abbb0c745164d87074
-
C:\Users\Admin\Downloads\XWorm-5.6-main\XWorm-5.6-main\XWorm-5.6-main (1)\XWorm-5.6-main\Plugins\RunPE.dll
Filesize11KB
MD5224be01635cff2dca827fbdeaddb983c
SHA111fa00c5e172c9cd1c81acaef52934f785f91374
SHA2567adfe849345edd76aa975b0647fed2ccaa5f4a6aaf7d55f488af939c0dbef153
SHA5121a4915b7b21e8166a6ddb6460c77e02c306a460c08fc7ee574832b0576c827db343eda9533959298819ee443790769328ad580fc67fe4817110b63d49248c736
-
C:\Users\Admin\Downloads\XWorm-5.6-main\XWorm-5.6-main\XWorm-5.6-main (1)\XWorm-5.6-main\Plugins\WebCam.dll
Filesize209KB
MD571a9109ccafa90550c1c879a304d27f5
SHA1c77ce45aaf8b2d8aaaa2a41833275f3eda78046d
SHA2568d413b40aef41e53557d91f3b3ac64cfc13adb0f8c3edc364e7b8501170e2657
SHA512fc92190d8a889fb088b2e8c2e4ea4751fcda59eff076b205da7c420b2f26564c1835d6ff1af470b583ec2ec92c0fcfb472e443e29d33f538572e6edd36c8c47e
-
C:\Users\Admin\Downloads\XWorm-5.6-main\XWorm-5.6-main\XWorm-5.6-main (1)\XWorm-5.6-main\SimpleObfuscator.dll
Filesize1.4MB
MD59043d712208178c33ba8e942834ce457
SHA1e0fa5c730bf127a33348f5d2a5673260ae3719d1
SHA256b7a6eea19188b987dad97b32d774107e9a1beb4f461a654a00197d73f7fad54c
SHA512dd6fa02ab70c58cde75fd4d4714e0ed0df5d3b18f737c68c93dba40c30376cc93957f8eef69fea86041489546ce4239b35a3b5d639472fd54b80f2f7260c8f65
-
C:\Users\Admin\Downloads\XWorm-5.6-main\XWorm-5.6-main\XWorm-5.6-main (1)\XWorm-5.6-main\Sounds\Intro.wav
Filesize238KB
MD5ad3b4fae17bcabc254df49f5e76b87a6
SHA11683ff029eebaffdc7a4827827da7bb361c8747e
SHA256e3e5029bf5f29fa32d2f6cdda35697cd8e6035d5c78615f64d0b305d1bd926cf
SHA5123d6ecc9040b5079402229c214cb5f9354315131a630c43d1da95248edc1b97627fb9ba032d006380a67409619763fb91976295f8d22ca91894c88f38bb610cd3
-
C:\Users\Admin\Downloads\XWorm-5.6-main\XWorm-5.6-main\XWorm-5.6-main (1)\XWorm-5.6-main\XClient.exe
Filesize36KB
MD5acccd5e6e7e122b44b16117590ae371d
SHA1182930c02b75eca326274174d0b1ed11dc2d48e4
SHA256e330edb85c771ff08250c46f78500e656e9b684635b4bec8975b31d0e607eb42
SHA5125bcb236f1f047fb1223ba14d6e4ebebe9ffb1b676298f8264425dadee493f732b5bdf9ead3bdedef5e9687b55c5cf9ca8524b5412385354c927ce4ec1eb00ef4
-
C:\Users\Admin\Downloads\XWorm-5.6-main\XWorm-5.6-main\XWorm-5.6-main (1)\XWorm-5.6-main\Xworm V5.6.exe
Filesize14.9MB
MD556ccb739926a725e78a7acf9af52c4bb
SHA15b01b90137871c3c8f0d04f510c4d56b23932cbc
SHA25690f58865f265722ab007abb25074b3fc4916e927402552c6be17ef9afac96405
SHA5122fee662bc4a1a36ce7328b23f991fa4a383b628839e403d6eb6a9533084b17699a6c939509867a86e803aafef2f9def98fa9305b576dad754aa7f599920c19a1
-
C:\Users\Admin\Downloads\XWorm-5.6-main\XWorm-5.6-main\XWorm-5.6-main (1)\XWorm-5.6-main\Xworm V5.6.exe.config
Filesize183B
MD566f09a3993dcae94acfe39d45b553f58
SHA19d09f8e22d464f7021d7f713269b8169aed98682
SHA2567ea08548c23bd7fd7c75ca720ac5a0e8ca94cb51d06cd45ebf5f412e4bbdd7d7
SHA512c8ea53ab187a720080bd8d879704e035f7e632afe1ee93e7637fad6bb7e40d33a5fe7e5c3d69134209487d225e72d8d944a43a28dc32922e946023e89abc93ed