<?xml version="1.0" encoding="UTF-8"?>
<!-- generator="wordpress.com" -->
<urlset xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance" xmlns="http://www.sitemaps.org/schemas/sitemap/0.9" xmlns:image="http://www.google.com/schemas/sitemap-image/1.1" xsi:schemaLocation="http://www.sitemaps.org/schemas/sitemap/0.9 http://www.sitemaps.org/schemas/sitemap/0.9/sitemap.xsd"><url><loc>https://malwr-analysis.com/2026/03/14/ongoing-phishing-campaign-abusing-google-cloud-storage-to-redirect-users-to-multiple-scam-pages/</loc><image:image><image:loc>https://malwr-analysis.com/wp-content/uploads/2026/03/1-2.jpg</image:loc><image:title>1</image:title></image:image><image:image><image:loc>https://malwr-analysis.com/wp-content/uploads/2026/03/1.png</image:loc><image:title>1</image:title></image:image><image:image><image:loc>https://malwr-analysis.com/wp-content/uploads/2026/03/13-1.jpg</image:loc><image:title>13</image:title></image:image><image:image><image:loc>https://malwr-analysis.com/wp-content/uploads/2026/03/1-1.jpg</image:loc><image:title>1</image:title></image:image><image:image><image:loc>https://malwr-analysis.com/wp-content/uploads/2026/03/23-1.jpg</image:loc><image:title>23</image:title></image:image><image:image><image:loc>https://malwr-analysis.com/wp-content/uploads/2026/03/48.jpg</image:loc><image:title>48</image:title></image:image><lastmod>2026-03-13T21:23:00+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://malwr-analysis.com/2026/03/03/analysis-of-an-integrated-phishing-campaign-utilizing-google-cloud-infrastructure/</loc><image:image><image:loc>https://malwr-analysis.com/wp-content/uploads/2026/03/26.jpg</image:loc><image:title>26</image:title></image:image><image:image><image:loc>https://malwr-analysis.com/wp-content/uploads/2026/03/10.jpg</image:loc><image:title>10</image:title></image:image><image:image><image:loc>https://malwr-analysis.com/wp-content/uploads/2026/03/21.jpg</image:loc><image:title>21</image:title></image:image><image:image><image:loc>https://malwr-analysis.com/wp-content/uploads/2026/03/22.jpg</image:loc><image:title>22</image:title></image:image><image:image><image:loc>https://malwr-analysis.com/wp-content/uploads/2026/03/9-1.jpg</image:loc><image:title>9</image:title></image:image><image:image><image:loc>https://malwr-analysis.com/wp-content/uploads/2026/03/25.jpg</image:loc><image:title>25</image:title></image:image><image:image><image:loc>https://malwr-analysis.com/wp-content/uploads/2026/03/24.jpg</image:loc><image:title>24</image:title></image:image><image:image><image:loc>https://malwr-analysis.com/wp-content/uploads/2026/03/18.jpg</image:loc><image:title>18</image:title></image:image><image:image><image:loc>https://malwr-analysis.com/wp-content/uploads/2026/03/17.jpg</image:loc><image:title>17</image:title></image:image><image:image><image:loc>https://malwr-analysis.com/wp-content/uploads/2026/03/20.png</image:loc><image:title>20</image:title></image:image><lastmod>2026-03-03T15:56:32+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://malwr-analysis.com/2026/03/02/yoroi-wallet-phishing-abuses-goto-resolve-and-screenconnect-for-device-takeover/</loc><image:image><image:loc>https://malwr-analysis.com/wp-content/uploads/2026/03/12.jpg</image:loc><image:title>12</image:title></image:image><image:image><image:loc>https://malwr-analysis.com/wp-content/uploads/2026/03/11.jpg</image:loc><image:title>11</image:title></image:image><image:image><image:loc>https://malwr-analysis.com/wp-content/uploads/2026/03/9.jpg</image:loc><image:title>9</image:title></image:image><image:image><image:loc>https://malwr-analysis.com/wp-content/uploads/2026/03/screenshot-2026-03-01-171501.png</image:loc><image:title>Screenshot 2026-03-01 171501</image:title></image:image><image:image><image:loc>https://malwr-analysis.com/wp-content/uploads/2026/03/4.jpg</image:loc><image:title>4</image:title></image:image><image:image><image:loc>https://malwr-analysis.com/wp-content/uploads/2026/03/1.jpg</image:loc><image:title>1</image:title></image:image><image:image><image:loc>https://malwr-analysis.com/wp-content/uploads/2026/03/8.jpg</image:loc><image:title>8</image:title></image:image><image:image><image:loc>https://malwr-analysis.com/wp-content/uploads/2026/03/7.jpg</image:loc><image:title>7</image:title></image:image><lastmod>2026-03-01T19:28:29+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://malwr-analysis.com/2026/02/22/crypto-compensation-scam-fake-btc-payout-lure-abusing-survey-payment-flows/</loc><image:image><image:loc>https://malwr-analysis.com/wp-content/uploads/2026/02/17-1.jpg</image:loc><image:title>17</image:title></image:image><image:image><image:loc>https://malwr-analysis.com/wp-content/uploads/2026/02/16-2.jpg</image:loc><image:title>16</image:title></image:image><image:image><image:loc>https://malwr-analysis.com/wp-content/uploads/2026/02/11-1.jpg</image:loc><image:title>11</image:title></image:image><image:image><image:loc>https://malwr-analysis.com/wp-content/uploads/2026/02/10-1.jpg</image:loc><image:title>10</image:title></image:image><image:image><image:loc>https://malwr-analysis.com/wp-content/uploads/2026/02/18-1.jpg</image:loc><image:title>18</image:title></image:image><image:image><image:loc>https://malwr-analysis.com/wp-content/uploads/2026/02/8.jpg</image:loc><image:title>8</image:title></image:image><image:image><image:loc>https://malwr-analysis.com/wp-content/uploads/2026/02/6.jpg</image:loc><image:title>6</image:title></image:image><image:image><image:loc>https://malwr-analysis.com/wp-content/uploads/2026/02/4.jpg</image:loc><image:title>4</image:title></image:image><image:image><image:loc>https://malwr-analysis.com/wp-content/uploads/2026/02/1-1.jpg</image:loc><image:title>1</image:title></image:image><image:image><image:loc>https://malwr-analysis.com/wp-content/uploads/2026/02/2-3.jpg</image:loc><image:title>2</image:title></image:image><lastmod>2026-02-21T19:44:04+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://malwr-analysis.com/2026/02/18/kraken-darknet-access-via-clearnet-gateways/</loc><image:image><image:loc>https://malwr-analysis.com/wp-content/uploads/2026/02/13-2.jpg</image:loc><image:title>13</image:title></image:image><image:image><image:loc>https://malwr-analysis.com/wp-content/uploads/2026/02/2-2.jpg</image:loc><image:title>2</image:title></image:image><image:image><image:loc>https://malwr-analysis.com/wp-content/uploads/2026/02/16-1.jpg</image:loc><image:title>16</image:title></image:image><image:image><image:loc>https://malwr-analysis.com/wp-content/uploads/2026/02/15.jpg</image:loc><image:title>15</image:title></image:image><image:image><image:loc>https://malwr-analysis.com/wp-content/uploads/2026/02/14-1.jpg</image:loc><image:title>14</image:title></image:image><image:image><image:loc>https://malwr-analysis.com/wp-content/uploads/2026/02/13-1.jpg</image:loc><image:title>13</image:title></image:image><image:image><image:loc>https://malwr-analysis.com/wp-content/uploads/2026/02/12.jpg</image:loc><image:title>12</image:title></image:image><image:image><image:loc>https://malwr-analysis.com/wp-content/uploads/2026/02/11.jpg</image:loc><image:title>11</image:title></image:image><image:image><image:loc>https://malwr-analysis.com/wp-content/uploads/2026/02/10.jpg</image:loc><image:title>10</image:title></image:image><image:image><image:loc>https://malwr-analysis.com/wp-content/uploads/2026/02/9.jpg</image:loc><image:title>9</image:title></image:image><lastmod>2026-02-17T19:23:48+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://malwr-analysis.com/2026/02/15/cloudflare-pages-continue-read-redirect-kit-abused-for-phishing-adware-and-malware-delivery/</loc><image:image><image:loc>https://malwr-analysis.com/wp-content/uploads/2026/02/16.jpg</image:loc><image:title>16</image:title></image:image><image:image><image:loc>https://malwr-analysis.com/wp-content/uploads/2026/02/7.jpg</image:loc><image:title>7</image:title></image:image><image:image><image:loc>https://malwr-analysis.com/wp-content/uploads/2026/02/5.jpg</image:loc><image:title>5</image:title></image:image><image:image><image:loc>https://malwr-analysis.com/wp-content/uploads/2026/02/3.jpg</image:loc><image:title>3</image:title></image:image><image:image><image:loc>https://malwr-analysis.com/wp-content/uploads/2026/02/2.jpg</image:loc><image:title>2</image:title></image:image><image:image><image:loc>https://malwr-analysis.com/wp-content/uploads/2026/02/13.jpg</image:loc><image:title>13</image:title></image:image><image:image><image:loc>https://malwr-analysis.com/wp-content/uploads/2026/02/18.jpg</image:loc><image:title>18</image:title></image:image><image:image><image:loc>https://malwr-analysis.com/wp-content/uploads/2026/02/17.jpg</image:loc><image:title>17</image:title></image:image><image:image><image:loc>https://malwr-analysis.com/wp-content/uploads/2026/02/14.jpg</image:loc><image:title>14</image:title></image:image><image:image><image:loc>https://malwr-analysis.com/wp-content/uploads/2026/02/1.jpg</image:loc><image:title>1</image:title></image:image><lastmod>2026-02-14T19:15:50+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://malwr-analysis.com/2026/01/29/tycoon-2fa-campaign-abusing-contractors-domains-for-gmail-and-microsoft-365-credential-harvesting/</loc><image:image><image:loc>https://malwr-analysis.com/wp-content/uploads/2026/01/19-1.jpg</image:loc><image:title>19</image:title></image:image><image:image><image:loc>https://malwr-analysis.com/wp-content/uploads/2026/01/18.jpg</image:loc><image:title>18</image:title></image:image><image:image><image:loc>https://malwr-analysis.com/wp-content/uploads/2026/01/17-1.jpg</image:loc><image:title>17</image:title></image:image><image:image><image:loc>https://malwr-analysis.com/wp-content/uploads/2026/01/7-3.jpg</image:loc><image:title>7</image:title></image:image><image:image><image:loc>https://malwr-analysis.com/wp-content/uploads/2026/01/2-1.jpg</image:loc><image:title>2</image:title></image:image><image:image><image:loc>https://malwr-analysis.com/wp-content/uploads/2026/01/4-3.jpg</image:loc><image:title>4</image:title></image:image><image:image><image:loc>https://malwr-analysis.com/wp-content/uploads/2026/01/23.jpg</image:loc><image:title>23</image:title></image:image><image:image><image:loc>https://malwr-analysis.com/wp-content/uploads/2026/01/22.jpg</image:loc><image:title>22</image:title></image:image><image:image><image:loc>https://malwr-analysis.com/wp-content/uploads/2026/01/21.jpg</image:loc><image:title>21</image:title></image:image><image:image><image:loc>https://malwr-analysis.com/wp-content/uploads/2026/01/3-3.jpg</image:loc><image:title>3</image:title></image:image><lastmod>2026-01-28T23:12:08+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://malwr-analysis.com/2026/01/21/fake-pnb-metlife-payment-gateway-page-stealing-customer-details-and-redirecting-victims-to-upi-payments/</loc><image:image><image:loc>https://malwr-analysis.com/wp-content/uploads/2026/01/34.jpg</image:loc><image:title>34</image:title></image:image><image:image><image:loc>https://malwr-analysis.com/wp-content/uploads/2026/01/14-2.jpg</image:loc><image:title>14</image:title></image:image><image:image><image:loc>https://malwr-analysis.com/wp-content/uploads/2026/01/27.jpg</image:loc><image:title>27</image:title></image:image><image:image><image:loc>https://malwr-analysis.com/wp-content/uploads/2026/01/32.jpg</image:loc><image:title>32</image:title></image:image><image:image><image:loc>https://malwr-analysis.com/wp-content/uploads/2026/01/31.jpg</image:loc><image:title>31</image:title></image:image><image:image><image:loc>https://malwr-analysis.com/wp-content/uploads/2026/01/30-1.jpg</image:loc><image:title>30</image:title></image:image><image:image><image:loc>https://malwr-analysis.com/wp-content/uploads/2026/01/30.jpg</image:loc><image:title>30</image:title></image:image><image:image><image:loc>https://malwr-analysis.com/wp-content/uploads/2026/01/5-2.jpg</image:loc><image:title>5</image:title></image:image><image:image><image:loc>https://malwr-analysis.com/wp-content/uploads/2026/01/29.jpg</image:loc><image:title>29</image:title></image:image><image:image><image:loc>https://malwr-analysis.com/wp-content/uploads/2026/01/6-3.jpg</image:loc><image:title>6</image:title></image:image><lastmod>2026-01-21T06:06:00+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://malwr-analysis.com/2026/01/11/fake-fast-ray-vpn-site-on-cloudflare-pages-leading-to-pua-downloads/</loc><image:image><image:loc>https://malwr-analysis.com/wp-content/uploads/2026/01/17.jpg</image:loc><image:title>17</image:title></image:image><image:image><image:loc>https://malwr-analysis.com/wp-content/uploads/2026/01/16.jpg</image:loc><image:title>16</image:title></image:image><image:image><image:loc>https://malwr-analysis.com/wp-content/uploads/2026/01/7-2.jpg</image:loc><image:title>7</image:title></image:image><image:image><image:loc>https://malwr-analysis.com/wp-content/uploads/2026/01/15-1.jpg</image:loc><image:title>15</image:title></image:image><image:image><image:loc>https://malwr-analysis.com/wp-content/uploads/2026/01/4-2.jpg</image:loc><image:title>4</image:title></image:image><image:image><image:loc>https://malwr-analysis.com/wp-content/uploads/2026/01/11-2.jpg</image:loc><image:title>11</image:title></image:image><image:image><image:loc>https://malwr-analysis.com/wp-content/uploads/2026/01/14-1.jpg</image:loc><image:title>14</image:title></image:image><image:image><image:loc>https://malwr-analysis.com/wp-content/uploads/2026/01/13-3.jpg</image:loc><image:title>13</image:title></image:image><lastmod>2026-01-11T09:40:37+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://malwr-analysis.com/2026/01/09/fake-windows-update-and-bsod-alerts-used-in-a-tech-support-scam/</loc><image:image><image:loc>https://malwr-analysis.com/wp-content/uploads/2026/01/13-2.jpg</image:loc><image:title>13</image:title></image:image><image:image><image:loc>https://malwr-analysis.com/wp-content/uploads/2026/01/12-1.jpg</image:loc><image:title>12</image:title></image:image><image:image><image:loc>https://malwr-analysis.com/wp-content/uploads/2026/01/11-1.jpg</image:loc><image:title>11</image:title></image:image><image:image><image:loc>https://malwr-analysis.com/wp-content/uploads/2026/01/10-1.jpg</image:loc><image:title>10</image:title></image:image><image:image><image:loc>https://malwr-analysis.com/wp-content/uploads/2026/01/3-2.jpg</image:loc><image:title>3</image:title></image:image><image:image><image:loc>https://malwr-analysis.com/wp-content/uploads/2026/01/9-1.jpg</image:loc><image:title>9</image:title></image:image><image:image><image:loc>https://malwr-analysis.com/wp-content/uploads/2026/01/4-1.jpg</image:loc><image:title>4</image:title></image:image><image:image><image:loc>https://malwr-analysis.com/wp-content/uploads/2026/01/1-3.jpg</image:loc><image:title>1</image:title></image:image><image:image><image:loc>https://malwr-analysis.com/wp-content/uploads/2026/01/8-2.jpg</image:loc><image:title>8</image:title></image:image><image:image><image:loc>https://malwr-analysis.com/wp-content/uploads/2026/01/6-2.jpg</image:loc><image:title>6</image:title></image:image><lastmod>2026-01-08T21:47:03+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://malwr-analysis.com/2026/01/08/how-scareware-emails-now-push-legitimate-subscriptions/</loc><image:image><image:loc>https://malwr-analysis.com/wp-content/uploads/2026/01/7-1.jpg</image:loc><image:title>7</image:title></image:image><image:image><image:loc>https://malwr-analysis.com/wp-content/uploads/2026/01/3-1.jpg</image:loc><image:title>3</image:title></image:image><image:image><image:loc>https://malwr-analysis.com/wp-content/uploads/2026/01/4.jpg</image:loc><image:title>4</image:title></image:image><image:image><image:loc>https://malwr-analysis.com/wp-content/uploads/2026/01/1-2.jpg</image:loc><image:title>1</image:title></image:image><image:image><image:loc>https://malwr-analysis.com/wp-content/uploads/2026/01/6-1.jpg</image:loc><image:title>6</image:title></image:image><image:image><image:loc>https://malwr-analysis.com/wp-content/uploads/2026/01/5-1.jpg</image:loc><image:title>5</image:title></image:image><image:image><image:loc>https://malwr-analysis.com/wp-content/uploads/2026/01/1-1.jpg</image:loc><image:title>1</image:title></image:image><lastmod>2026-01-07T19:49:24+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://malwr-analysis.com/2026/01/07/analysis-of-a-fake-cloudflare-turnstile-used-as-a-traffic-filtering-gate/</loc><image:image><image:loc>https://malwr-analysis.com/wp-content/uploads/2026/01/15.jpg</image:loc><image:title>15</image:title></image:image><image:image><image:loc>https://malwr-analysis.com/wp-content/uploads/2026/01/14.jpg</image:loc><image:title>14</image:title></image:image><image:image><image:loc>https://malwr-analysis.com/wp-content/uploads/2026/01/8-1.jpg</image:loc><image:title>8</image:title></image:image><image:image><image:loc>https://malwr-analysis.com/wp-content/uploads/2026/01/13-1.jpg</image:loc><image:title>13</image:title></image:image><image:image><image:loc>https://malwr-analysis.com/wp-content/uploads/2026/01/13.jpg</image:loc><image:title>13</image:title></image:image><image:image><image:loc>https://malwr-analysis.com/wp-content/uploads/2026/01/12.jpg</image:loc><image:title>12</image:title></image:image><image:image><image:loc>https://malwr-analysis.com/wp-content/uploads/2026/01/3.jpg</image:loc><image:title>3</image:title></image:image><image:image><image:loc>https://malwr-analysis.com/wp-content/uploads/2026/01/11.jpg</image:loc><image:title>11</image:title></image:image><lastmod>2026-01-06T22:33:49+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://malwr-analysis.com/2026/01/05/large-scale-parasite-seo-campaign-using-amazon-style-pages-on-cloudflare-pages/</loc><image:image><image:loc>https://malwr-analysis.com/wp-content/uploads/2026/01/10.jpg</image:loc><image:title>10</image:title></image:image><image:image><image:loc>https://malwr-analysis.com/wp-content/uploads/2026/01/9.jpg</image:loc><image:title>9</image:title></image:image><image:image><image:loc>https://malwr-analysis.com/wp-content/uploads/2026/01/8.jpg</image:loc><image:title>8</image:title></image:image><image:image><image:loc>https://malwr-analysis.com/wp-content/uploads/2026/01/7.jpg</image:loc><image:title>7</image:title></image:image><image:image><image:loc>https://malwr-analysis.com/wp-content/uploads/2026/01/6.jpg</image:loc><image:title>6</image:title></image:image><image:image><image:loc>https://malwr-analysis.com/wp-content/uploads/2026/01/5.jpg</image:loc><image:title>5</image:title></image:image><image:image><image:loc>https://malwr-analysis.com/wp-content/uploads/2026/01/1.jpg</image:loc><image:title>1</image:title></image:image><image:image><image:loc>https://malwr-analysis.com/wp-content/uploads/2026/01/2.jpg</image:loc><image:title>2</image:title></image:image><lastmod>2026-01-05T16:42:11+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://malwr-analysis.com/2025/12/31/fake-wordpress-domain-renewal-phishing-email-stealing-credit-card-and-3-d-secure-otp/</loc><image:image><image:loc>https://malwr-analysis.com/wp-content/uploads/2025/12/blgde8.jpg</image:loc><image:title>Blgde8</image:title></image:image><image:image><image:loc>https://malwr-analysis.com/wp-content/uploads/2025/12/blgde12.jpg</image:loc><image:title>Blgde12</image:title></image:image><image:image><image:loc>https://malwr-analysis.com/wp-content/uploads/2025/12/blgde11.jpg</image:loc><image:title>Blgde11</image:title></image:image><image:image><image:loc>https://malwr-analysis.com/wp-content/uploads/2025/12/blgde6.jpg</image:loc><image:title>Blgde6</image:title></image:image><image:image><image:loc>https://malwr-analysis.com/wp-content/uploads/2025/12/blgde7.jpg</image:loc><image:title>Blgde7</image:title></image:image><image:image><image:loc>https://malwr-analysis.com/wp-content/uploads/2025/12/blgde10.jpg</image:loc><image:title>Blgde10</image:title></image:image><image:image><image:loc>https://malwr-analysis.com/wp-content/uploads/2025/12/blgde3.jpg</image:loc><image:title>Blgde3</image:title></image:image><image:image><image:loc>https://malwr-analysis.com/wp-content/uploads/2025/12/blgde9.jpg</image:loc><image:title>Blgde9</image:title></image:image><image:image><image:loc>https://malwr-analysis.com/wp-content/uploads/2025/12/blgde2.jpg</image:loc><image:title>Blgde2</image:title></image:image><image:image><image:loc>https://malwr-analysis.com/wp-content/uploads/2025/12/blgde1.jpg</image:loc><image:title>Blgde1</image:title></image:image><lastmod>2025-12-31T13:04:53+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://malwr-analysis.com/2025/12/31/rmm-abuse-in-a-crypto-wallet-distribution-campaign/</loc><image:image><image:loc>https://malwr-analysis.com/wp-content/uploads/2025/12/blgetrnl25.jpg</image:loc><image:title>blgetrnl25</image:title></image:image><image:image><image:loc>https://malwr-analysis.com/wp-content/uploads/2025/12/blgetrnl24.jpg</image:loc><image:title>blgetrnl24</image:title></image:image><image:image><image:loc>https://malwr-analysis.com/wp-content/uploads/2025/12/blgetrnl21.jpg</image:loc><image:title>blgetrnl21</image:title></image:image><image:image><image:loc>https://malwr-analysis.com/wp-content/uploads/2025/12/blgetrnl18.jpg</image:loc><image:title>blgetrnl18</image:title></image:image><image:image><image:loc>https://malwr-analysis.com/wp-content/uploads/2025/12/blgetrnl22.jpg</image:loc><image:title>blgetrnl22</image:title></image:image><image:image><image:loc>https://malwr-analysis.com/wp-content/uploads/2025/12/blgetrnl6.jpg</image:loc><image:title>blgetrnl6</image:title></image:image><image:image><image:loc>https://malwr-analysis.com/wp-content/uploads/2025/12/blgetrnl12.jpg</image:loc><image:title>blgetrnl12</image:title></image:image><image:image><image:loc>https://malwr-analysis.com/wp-content/uploads/2025/12/blgetrnl11.jpg</image:loc><image:title>blgetrnl11</image:title></image:image><image:image><image:loc>https://malwr-analysis.com/wp-content/uploads/2025/12/1-1.jpg</image:loc><image:title>1</image:title></image:image><image:image><image:loc>https://malwr-analysis.com/wp-content/uploads/2025/12/2-1.jpg</image:loc><image:title>2</image:title></image:image><lastmod>2025-12-30T20:42:30+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://malwr-analysis.com/about/</loc><lastmod>2025-12-30T10:36:22+00:00</lastmod><changefreq>weekly</changefreq><priority>0.6</priority></url><url><loc>https://malwr-analysis.com/2025/12/23/fake-stable-genesis-airdrop-campaign-delivering-a-crypto-wallet-drainer-via-phishing/</loc><image:image><image:loc>https://malwr-analysis.com/wp-content/uploads/2025/12/11.jpg</image:loc><image:title>11</image:title></image:image><image:image><image:loc>https://malwr-analysis.com/wp-content/uploads/2025/12/7.jpg</image:loc><image:title>7</image:title></image:image><image:image><image:loc>https://malwr-analysis.com/wp-content/uploads/2025/12/6.jpg</image:loc><image:title>6</image:title></image:image><image:image><image:loc>https://malwr-analysis.com/wp-content/uploads/2025/12/5.jpg</image:loc><image:title>5</image:title></image:image><image:image><image:loc>https://malwr-analysis.com/wp-content/uploads/2025/12/10.jpg</image:loc><image:title>10</image:title></image:image><image:image><image:loc>https://malwr-analysis.com/wp-content/uploads/2025/12/1.jpg</image:loc><image:title>1</image:title></image:image><image:image><image:loc>https://malwr-analysis.com/wp-content/uploads/2025/12/2.jpg</image:loc><image:title>2</image:title></image:image><image:image><image:loc>https://malwr-analysis.com/wp-content/uploads/2025/12/9.jpg</image:loc><image:title>9</image:title></image:image><lastmod>2025-12-23T17:14:33+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://malwr-analysis.com/2025/12/23/crimson-rat-delivered-via-malicious-excel/</loc><image:image><image:loc>https://malwr-analysis.com/wp-content/uploads/2025/12/blg122522.jpg</image:loc><image:title>blg122522</image:title></image:image><image:image><image:loc>https://malwr-analysis.com/wp-content/uploads/2025/12/blg122526.jpg</image:loc><image:title>blg122526</image:title></image:image><image:image><image:loc>https://malwr-analysis.com/wp-content/uploads/2025/12/blg122520.jpg</image:loc><image:title>blg122520</image:title></image:image><image:image><image:loc>https://malwr-analysis.com/wp-content/uploads/2025/12/blg122519.jpg</image:loc><image:title>blg122519</image:title></image:image><image:image><image:loc>https://malwr-analysis.com/wp-content/uploads/2025/12/blg122518.jpg</image:loc><image:title>blg122518</image:title></image:image><image:image><image:loc>https://malwr-analysis.com/wp-content/uploads/2025/12/blg122517.jpg</image:loc><image:title>blg122517</image:title></image:image><image:image><image:loc>https://malwr-analysis.com/wp-content/uploads/2025/12/blg122516.jpg</image:loc><image:title>blg122516</image:title></image:image><image:image><image:loc>https://malwr-analysis.com/wp-content/uploads/2025/12/blg122515.jpg</image:loc><image:title>blg122515</image:title></image:image><image:image><image:loc>https://malwr-analysis.com/wp-content/uploads/2025/12/blg122514.jpg</image:loc><image:title>blg122514</image:title></image:image><image:image><image:loc>https://malwr-analysis.com/wp-content/uploads/2025/12/blg122513.jpg</image:loc><image:title>blg122513</image:title></image:image><lastmod>2025-12-22T21:33:39+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://malwr-analysis.com/2025/08/24/phishing-emails-are-now-aimed-at-users-and-ai-defenses/</loc><image:image><image:loc>https://malwr-analysis.com/wp-content/uploads/2025/08/gmailblg29.jpg</image:loc><image:title>GmailBlg29</image:title></image:image><image:image><image:loc>https://malwr-analysis.com/wp-content/uploads/2025/08/gmailblg28-1.jpg</image:loc><image:title>GmailBlg28</image:title></image:image><image:image><image:loc>https://malwr-analysis.com/wp-content/uploads/2025/08/gmailblg28.jpg</image:loc><image:title>GmailBlg28</image:title></image:image><image:image><image:loc>https://malwr-analysis.com/wp-content/uploads/2025/08/gmailblg27.jpg</image:loc><image:title>GmailBlg27</image:title></image:image><image:image><image:loc>https://malwr-analysis.com/wp-content/uploads/2025/08/gmailblg26.jpg</image:loc><image:title>GmailBlg26</image:title></image:image><image:image><image:loc>https://malwr-analysis.com/wp-content/uploads/2025/08/gmailblg25.jpg</image:loc><image:title>GmailBlg25</image:title></image:image><image:image><image:loc>https://malwr-analysis.com/wp-content/uploads/2025/08/gmailblg24.jpg</image:loc><image:title>GmailBlg24</image:title></image:image><image:image><image:loc>https://malwr-analysis.com/wp-content/uploads/2025/08/gmailblg21.jpg</image:loc><image:title>GmailBlg21</image:title></image:image><lastmod>2025-08-23T20:21:52+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://malwr-analysis.com/2025/08/16/watch-out-for-this-gmail-scam/</loc><image:image><image:loc>https://malwr-analysis.com/wp-content/uploads/2025/08/gmalblg13.jpg</image:loc><image:title>GmalBlg13</image:title></image:image><image:image><image:loc>https://malwr-analysis.com/wp-content/uploads/2025/08/gmalblg04.jpg</image:loc><image:title>GmalBlg04</image:title></image:image><image:image><image:loc>https://malwr-analysis.com/wp-content/uploads/2025/08/gmalblg14.jpg</image:loc><image:title>GmalBlg14</image:title></image:image><image:image><image:loc>https://malwr-analysis.com/wp-content/uploads/2025/08/gmalblg07.jpg</image:loc><image:title>GmalBlg07</image:title></image:image><image:image><image:loc>https://malwr-analysis.com/wp-content/uploads/2025/08/gmalblg10.jpg</image:loc><image:title>GmalBlg10</image:title></image:image><image:image><image:loc>https://malwr-analysis.com/wp-content/uploads/2025/08/gmalblg06.jpg</image:loc><image:title>GmalBlg06</image:title></image:image><image:image><image:loc>https://malwr-analysis.com/wp-content/uploads/2025/08/gmalblg05.jpg</image:loc><image:title>GmalBlg05</image:title></image:image><image:image><image:loc>https://malwr-analysis.com/wp-content/uploads/2025/08/gmalblg02.jpg</image:loc><image:title>GmalBlg02</image:title></image:image><image:image><image:loc>https://malwr-analysis.com/wp-content/uploads/2025/08/gmalblg01.jpg</image:loc><image:title>GmalBlg01</image:title></image:image><lastmod>2025-08-16T07:22:30+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://malwr-analysis.com/2025/02/18/arechclient2-malware-analysis-sectoprat/</loc><image:image><image:loc>https://malwr-analysis.com/wp-content/uploads/2025/02/blg101_3016022025.jpg</image:loc><image:title>Blg101_3016022025</image:title></image:image><image:image><image:loc>https://malwr-analysis.com/wp-content/uploads/2025/02/blg101_2016022025.jpg</image:loc><image:title>Blg101_2016022025</image:title></image:image><image:image><image:loc>https://malwr-analysis.com/wp-content/uploads/2025/02/blg101_1416022025.jpg</image:loc><image:title>Blg101_1416022025</image:title></image:image><image:image><image:loc>https://malwr-analysis.com/wp-content/uploads/2025/02/blg101_1816022025.jpg</image:loc><image:title>Blg101_1816022025</image:title></image:image><image:image><image:loc>https://malwr-analysis.com/wp-content/uploads/2025/02/blg101_1616022025.jpg</image:loc><image:title>Blg101_1616022025</image:title></image:image><image:image><image:loc>https://malwr-analysis.com/wp-content/uploads/2025/02/blg101_0516022025.jpg</image:loc><image:title>Blg101_0516022025</image:title></image:image><image:image><image:loc>https://malwr-analysis.com/wp-content/uploads/2025/02/blg101_0116022025.jpg</image:loc><image:title>Blg101_0116022025</image:title></image:image><image:image><image:loc>https://malwr-analysis.com/wp-content/uploads/2025/02/blg101_0616022025.jpg</image:loc><image:title>Blg101_0616022025</image:title></image:image><image:image><image:loc>https://malwr-analysis.com/wp-content/uploads/2025/02/blg101_0716022025.jpg</image:loc><image:title>Blg101_0716022025</image:title></image:image><lastmod>2025-02-18T08:16:36+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://malwr-analysis.com/2019/04/16/word-macro-backdoor-trojan/</loc><image:image><image:loc>https://malwr-analysis.com/wp-content/uploads/2019/04/blg2-04150-28.png</image:loc><image:title>blg2-04150-28</image:title></image:image><image:image><image:loc>https://malwr-analysis.com/wp-content/uploads/2019/04/blg2-04150-27.png</image:loc><image:title>blg2-04150-27</image:title></image:image><image:image><image:loc>https://malwr-analysis.com/wp-content/uploads/2019/04/blg2-04150-25.png</image:loc><image:title>blg2-04150-25</image:title></image:image><image:image><image:loc>https://malwr-analysis.com/wp-content/uploads/2019/04/blg2-04150-22.png</image:loc><image:title>blg2-04150-22</image:title></image:image><image:image><image:loc>https://malwr-analysis.com/wp-content/uploads/2019/04/blg2-04150-24.png</image:loc><image:title>blg2-04150-24</image:title></image:image><image:image><image:loc>https://malwr-analysis.com/wp-content/uploads/2019/04/blg2-04150-23.png</image:loc><image:title>blg2-04150-23</image:title></image:image><image:image><image:loc>https://malwr-analysis.com/wp-content/uploads/2019/04/blg2-04150-17.png</image:loc><image:title>blg2-04150-17</image:title></image:image><image:image><image:loc>https://malwr-analysis.com/wp-content/uploads/2019/04/blg2-04150-19.png</image:loc><image:title>blg2-04150-19</image:title></image:image><image:image><image:loc>https://malwr-analysis.com/wp-content/uploads/2019/04/blg2-04150-18.png</image:loc><image:title>blg2-04150-18</image:title></image:image><image:image><image:loc>https://malwr-analysis.com/wp-content/uploads/2019/04/blg2-04150-16.png</image:loc><image:title>blg2-04150-16</image:title></image:image><lastmod>2025-02-18T01:28:33+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://malwr-analysis.com/2025/02/10/nanocore-rat-malware-analysis/</loc><image:image><image:loc>https://malwr-analysis.com/wp-content/uploads/2025/02/blg13-2707022025.png</image:loc><image:title>Blg13-2707022025</image:title></image:image><image:image><image:loc>https://malwr-analysis.com/wp-content/uploads/2025/02/blg13-2607022025.png</image:loc><image:title>Blg13-2607022025</image:title></image:image><image:image><image:loc>https://malwr-analysis.com/wp-content/uploads/2025/02/blg12-2607022025.png</image:loc><image:title>Blg12-2607022025</image:title></image:image><image:image><image:loc>https://malwr-analysis.com/wp-content/uploads/2025/02/blg12-2307022025.png</image:loc><image:title>Blg12-2307022025</image:title></image:image><image:image><image:loc>https://malwr-analysis.com/wp-content/uploads/2025/02/blg12-2507022025.png</image:loc><image:title>Blg12-2507022025</image:title></image:image><image:image><image:loc>https://malwr-analysis.com/wp-content/uploads/2025/02/blg12-1407022025.png</image:loc><image:title>Blg12-1407022025</image:title></image:image><image:image><image:loc>https://malwr-analysis.com/wp-content/uploads/2025/02/blg12-2407022025.png</image:loc><image:title>Blg12-2407022025</image:title></image:image><image:image><image:loc>https://malwr-analysis.com/wp-content/uploads/2025/02/blg12-1907022025.png</image:loc><image:title>Blg12-1907022025</image:title></image:image><image:image><image:loc>https://malwr-analysis.com/wp-content/uploads/2025/02/blg12-0107022025.png</image:loc><image:title>Blg12-0107022025</image:title></image:image><lastmod>2025-02-12T06:42:48+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://malwr-analysis.com/2020/04/05/trojan-agent-tesla-malware-analysis/</loc><image:image><image:loc>https://malwr-analysis.com/wp-content/uploads/2020/04/blg9_30032020_91.png</image:loc><image:title>Blg9_30032020_91</image:title></image:image><image:image><image:loc>https://malwr-analysis.com/wp-content/uploads/2020/04/blg9_30032020_90.png</image:loc><image:title>Blg9_30032020_90</image:title></image:image><image:image><image:loc>https://malwr-analysis.com/wp-content/uploads/2020/04/blg9_30032020_75.png</image:loc><image:title>Blg9_30032020_75</image:title></image:image><image:image><image:loc>https://malwr-analysis.com/wp-content/uploads/2020/04/blg9_30032020_89-1.png</image:loc><image:title>Blg9_30032020_89</image:title></image:image><image:image><image:loc>https://malwr-analysis.com/wp-content/uploads/2020/04/blg9_30032020_86.png</image:loc><image:title>Blg9_30032020_86</image:title></image:image><image:image><image:loc>https://malwr-analysis.com/wp-content/uploads/2020/04/blg9_30032020_85.png</image:loc><image:title>Blg9_30032020_85</image:title></image:image><image:image><image:loc>https://malwr-analysis.com/wp-content/uploads/2020/04/blg9_30032020_89.png</image:loc><image:title>Blg9_30032020_89</image:title></image:image><image:image><image:loc>https://malwr-analysis.com/wp-content/uploads/2020/04/blg9_30032020_76.png</image:loc><image:title>Blg9_30032020_76</image:title></image:image><image:image><image:loc>https://malwr-analysis.com/wp-content/uploads/2020/04/blg9_30032020_84.png</image:loc><image:title>Blg9_30032020_84</image:title></image:image><image:image><image:loc>https://malwr-analysis.com/wp-content/uploads/2020/04/blg9_30032020_12.png</image:loc><image:title>Blg9_30032020_12</image:title></image:image><lastmod>2025-02-07T20:56:07+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://malwr-analysis.com/2020/06/21/njrat-malware-analysis/</loc><lastmod>2025-02-07T20:55:15+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://malwr-analysis.com/2020/07/24/crimson-rat-malware-analysis/</loc><lastmod>2025-02-07T20:54:19+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://malwr-analysis.com/2025/01/20/fake-sbi-reward-apk-targets-victims-with-trojan-via-whatsapp/</loc><image:image><image:loc>https://malwr-analysis.com/wp-content/uploads/2025/01/blg101_3712012025.png</image:loc><image:title>BLG101_3712012025</image:title></image:image><image:image><image:loc>https://malwr-analysis.com/wp-content/uploads/2025/01/blg101_3612012025.png</image:loc><image:title>BLG101_3612012025</image:title></image:image><image:image><image:loc>https://malwr-analysis.com/wp-content/uploads/2025/01/blg101_3012012025.png</image:loc><image:title>BLG101_3012012025</image:title></image:image><image:image><image:loc>https://malwr-analysis.com/wp-content/uploads/2025/01/blg101_3512012025.png</image:loc><image:title>BLG101_3512012025</image:title></image:image><image:image><image:loc>https://malwr-analysis.com/wp-content/uploads/2025/01/blg101_3412012025.png</image:loc><image:title>BLG101_3412012025</image:title></image:image><image:image><image:loc>https://malwr-analysis.com/wp-content/uploads/2025/01/blg100_2012012025.png</image:loc><image:title>BLG100_2012012025</image:title></image:image><image:image><image:loc>https://malwr-analysis.com/wp-content/uploads/2025/01/blg100_1012012025.png</image:loc><image:title>BLG100_1012012025</image:title></image:image><image:image><image:loc>https://malwr-analysis.com/wp-content/uploads/2025/01/blg101_3312012025.png</image:loc><image:title>BLG101_3312012025</image:title></image:image><image:image><image:loc>https://malwr-analysis.com/wp-content/uploads/2025/01/blg101_3212012025-1.png</image:loc><image:title>BLG101_3212012025</image:title></image:image><image:image><image:loc>https://malwr-analysis.com/wp-content/uploads/2025/01/blg101_3212012025.png</image:loc><image:title>BLG101_3212012025</image:title></image:image><lastmod>2025-01-23T20:39:31+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://malwr-analysis.com/2024/12/05/beware-of-your-account-has-been-hacked-you-need-to-unlock-scam-emails-stay-safe-online/</loc><image:image><image:loc>https://malwr-analysis.com/wp-content/uploads/2024/12/blg010105122024.png</image:loc><image:title>Blg010105122024</image:title></image:image><image:image><image:loc>https://malwr-analysis.com/wp-content/uploads/2024/12/blg010305122024.png</image:loc><image:title>Blg010305122024</image:title></image:image><image:image><image:loc>https://malwr-analysis.com/wp-content/uploads/2024/12/blg010205122024.png</image:loc><image:title>Blg010205122024</image:title></image:image><lastmod>2024-12-05T11:12:18+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://malwr-analysis.com/2024/11/13/understanding-and-identifying-a-common-phishing-scam-your-device-is-hacked/</loc><image:image><image:loc>https://malwr-analysis.com/wp-content/uploads/2024/11/blg0913112403.png</image:loc><image:title>Blg0913112403</image:title></image:image><image:image><image:loc>https://malwr-analysis.com/wp-content/uploads/2024/11/blg0913112402.png</image:loc><image:title>Blg0913112402</image:title></image:image><image:image><image:loc>https://malwr-analysis.com/wp-content/uploads/2024/11/blg0913112401.png</image:loc><image:title>Blg0913112401</image:title></image:image><lastmod>2024-11-13T13:33:34+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://malwr-analysis.com/2024/11/11/beware-of-the-india-post-170th-anniversary-whatsapp-scam/</loc><image:image><image:loc>https://malwr-analysis.com/wp-content/uploads/2024/11/blg08_11112407.png</image:loc><image:title>Blg08_11112407</image:title></image:image><image:image><image:loc>https://malwr-analysis.com/wp-content/uploads/2024/11/blg08_11112406.png</image:loc><image:title>Blg08_11112406</image:title></image:image><image:image><image:loc>https://malwr-analysis.com/wp-content/uploads/2024/11/blg08_11112405.png</image:loc><image:title>Blg08_11112405</image:title></image:image><image:image><image:loc>https://malwr-analysis.com/wp-content/uploads/2024/11/blg08_11112404.png</image:loc><image:title>Blg08_11112404</image:title></image:image><image:image><image:loc>https://malwr-analysis.com/wp-content/uploads/2024/11/blg08_11112403.png</image:loc><image:title>Blg08_11112403</image:title></image:image><image:image><image:loc>https://malwr-analysis.com/wp-content/uploads/2024/11/blg08_11112402-1.png</image:loc><image:title>Blg08_11112402</image:title></image:image><image:image><image:loc>https://malwr-analysis.com/wp-content/uploads/2024/11/blg08_11112402.png</image:loc><image:title>Blg08_11112402</image:title></image:image><image:image><image:loc>https://malwr-analysis.com/wp-content/uploads/2024/11/blg08_11112401.png</image:loc><image:title>Blg08_11112401</image:title></image:image><lastmod>2024-11-10T20:03:58+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://malwr-analysis.com/2024/10/04/instagram-phishing-email-we-detected-a-new-login-into-your-instagram-account/</loc><image:image><image:loc>https://malwr-analysis.com/wp-content/uploads/2024/10/blg07_06-04102024.png</image:loc><image:title>Blg07_06-04102024</image:title></image:image><image:image><image:loc>https://malwr-analysis.com/wp-content/uploads/2024/10/blg07_05-04102024.png</image:loc><image:title>Blg07_05-04102024</image:title></image:image><image:image><image:loc>https://malwr-analysis.com/wp-content/uploads/2024/10/blg07_04-04102024.png</image:loc><image:title>Blg07_04-04102024</image:title></image:image><image:image><image:loc>https://malwr-analysis.com/wp-content/uploads/2024/10/blg07_03-04102024.png</image:loc><image:title>Blg07_03-04102024</image:title></image:image><image:image><image:loc>https://malwr-analysis.com/wp-content/uploads/2024/10/blg07_02-04102024.png</image:loc><image:title>Blg07_02-04102024</image:title></image:image><image:image><image:loc>https://malwr-analysis.com/wp-content/uploads/2024/10/blg07_01-04102024.png</image:loc><image:title>Blg07_01-04102024</image:title></image:image><lastmod>2024-10-03T22:20:40+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://malwr-analysis.com/2024/08/24/beware-of-phishing-emails-hey-you-have-a-problem-scam/</loc><image:image><image:loc>https://malwr-analysis.com/wp-content/uploads/2024/08/ss22082407.png</image:loc><image:title>SS22082407</image:title></image:image><image:image><image:loc>https://malwr-analysis.com/wp-content/uploads/2024/08/ss22082406.png</image:loc><image:title>SS22082406</image:title></image:image><image:image><image:loc>https://malwr-analysis.com/wp-content/uploads/2024/08/ss22082405.png</image:loc><image:title>SS22082405</image:title></image:image><image:image><image:loc>https://malwr-analysis.com/wp-content/uploads/2024/08/ss22082404.png</image:loc><image:title>SS22082404</image:title></image:image><image:image><image:loc>https://malwr-analysis.com/wp-content/uploads/2024/08/ss22082403.png</image:loc><image:title>SS22082403</image:title></image:image><lastmod>2024-08-24T08:53:49+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://malwr-analysis.com/2024/08/22/understanding-redline-stealer-the-trojan-targeting-your-data/</loc><image:image><image:loc>https://malwr-analysis.com/wp-content/uploads/2024/08/blg05059_11082024.png</image:loc><image:title>Blg05059_11082024</image:title></image:image><image:image><image:loc>https://malwr-analysis.com/wp-content/uploads/2024/08/blg05027_11082024.png</image:loc><image:title>Blg05027_11082024</image:title></image:image><image:image><image:loc>https://malwr-analysis.com/wp-content/uploads/2024/08/blg05058_11082024.png</image:loc><image:title>Blg05058_11082024</image:title></image:image><image:image><image:loc>https://malwr-analysis.com/wp-content/uploads/2024/08/blg05057_11082024.png</image:loc><image:title>Blg05057_11082024</image:title></image:image><image:image><image:loc>https://malwr-analysis.com/wp-content/uploads/2024/08/blg05033_11082024.png</image:loc><image:title>Blg05033_11082024</image:title></image:image><image:image><image:loc>https://malwr-analysis.com/wp-content/uploads/2024/08/blg05056_11082024.png</image:loc><image:title>Blg05056_11082024</image:title></image:image><image:image><image:loc>https://malwr-analysis.com/wp-content/uploads/2024/08/blg05055_11082024.png</image:loc><image:title>Blg05055_11082024</image:title></image:image><image:image><image:loc>https://malwr-analysis.com/wp-content/uploads/2024/08/blg05054_11082024.png</image:loc><image:title>Blg05054_11082024</image:title></image:image><image:image><image:loc>https://malwr-analysis.com/wp-content/uploads/2024/08/blg05053_11082024.png</image:loc><image:title>Blg05053_11082024</image:title></image:image><image:image><image:loc>https://malwr-analysis.com/wp-content/uploads/2024/08/blg05052_11082024.png</image:loc><image:title>Blg05052_11082024</image:title></image:image><lastmod>2024-08-22T01:55:27+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://malwr-analysis.com/2024/05/21/phishing-email-impersonating-as-ceo-of-indian-cyber-crime-coordination-centre-i4c/</loc><image:image><image:loc>https://malwr-analysis.com/wp-content/uploads/2024/05/blg0320052024_3.png</image:loc><image:title>blg0320052024_3</image:title></image:image><image:image><image:loc>https://malwr-analysis.com/wp-content/uploads/2024/05/blg0320052024_2.png</image:loc><image:title>blg0320052024_2</image:title></image:image><image:image><image:loc>https://malwr-analysis.com/wp-content/uploads/2024/05/blg0320052024_1.png</image:loc><image:title>blg0320052024_1</image:title></image:image><image:image><image:loc>https://malwr-analysis.com/wp-content/uploads/2024/05/blg0320052024.png</image:loc><image:title>blg0320052024</image:title></image:image><image:image><image:loc>https://malwr-analysis.com/wp-content/uploads/2024/05/blg0320052024.jpeg</image:loc><image:title>blg0320052024</image:title></image:image><lastmod>2024-05-20T17:28:23+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://malwr-analysis.com/2024/03/29/phishing-sextortion-email-for-your-own-safety-i-highly-recommend-reading-this-email/</loc><image:image><image:loc>https://malwr-analysis.com/wp-content/uploads/2024/03/blg02_329032024.png</image:loc><image:title>blg02_329032024</image:title></image:image><image:image><image:loc>https://malwr-analysis.com/wp-content/uploads/2024/03/blg02_229032024.png</image:loc><image:title>blg02_229032024</image:title></image:image><image:image><image:loc>https://malwr-analysis.com/wp-content/uploads/2024/03/blg02_129032024.png</image:loc><image:title>blg02_129032024</image:title></image:image><lastmod>2024-04-22T18:02:05+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://malwr-analysis.com/2024/03/25/malicious-email-ics-attachments/</loc><image:image><image:loc>https://malwr-analysis.com/wp-content/uploads/2024/03/blg4_23032024-1.png</image:loc><image:title>blg4_23032024-1</image:title></image:image><image:image><image:loc>https://malwr-analysis.com/wp-content/uploads/2024/03/blg5_24032024.png</image:loc><image:title>blg5_24032024</image:title></image:image><image:image><image:loc>https://malwr-analysis.com/wp-content/uploads/2024/03/blg2_24032024.png</image:loc><image:title>blg2_24032024</image:title></image:image><image:image><image:loc>https://malwr-analysis.com/wp-content/uploads/2024/03/blg4_23032024.png</image:loc><image:title>blg4_23032024</image:title></image:image><image:image><image:loc>https://malwr-analysis.com/wp-content/uploads/2024/03/blg4_24032024.png</image:loc><image:title>blg4_24032024</image:title></image:image><image:image><image:loc>https://malwr-analysis.com/wp-content/uploads/2024/03/blg3_24032024.png</image:loc><image:title>blg3_24032024</image:title></image:image><image:image><image:loc>https://malwr-analysis.com/wp-content/uploads/2024/03/blg1_24032024.png</image:loc><image:title>blg1_24032024</image:title></image:image><image:image><image:loc>https://malwr-analysis.com/wp-content/uploads/2024/03/blg3_23032024.png</image:loc><image:title>blg3_23032024</image:title></image:image><image:image><image:loc>https://malwr-analysis.com/wp-content/uploads/2024/03/blg1_23032024-1.png</image:loc><image:title>blg1_23032024-1</image:title></image:image><image:image><image:loc>https://malwr-analysis.com/wp-content/uploads/2024/03/blg1_23032024.png</image:loc><image:title>blg1_23032024</image:title></image:image><lastmod>2024-03-25T06:03:53+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://malwr-analysis.com/2021/08/13/ms-excel-malware-analysis/</loc><image:image><image:loc>https://malwr-analysis.com/wp-content/uploads/2021/08/blg24-08122021_1.jpg</image:loc><image:title>Blg24-08122021_1</image:title></image:image><lastmod>2021-08-13T13:13:18+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://malwr-analysis.com/2020/09/07/word-document-malware-analysis/</loc><lastmod>2020-09-06T17:21:01+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://malwr-analysis.com/2020/07/12/word-macro-drops-icedid-trojan-malware-analysis/</loc><lastmod>2020-07-12T10:02:30+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://malwr-analysis.com/2019/05/04/word-macro-drops-emotet-malware/</loc><image:image><image:loc>https://malwr-analysis.com/wp-content/uploads/2019/05/blg4-30042019-7.png</image:loc><image:title>Blg4-30042019-7</image:title></image:image><image:image><image:loc>https://malwr-analysis.com/wp-content/uploads/2019/05/blg4-30042019-6.png</image:loc><image:title>Blg4-30042019-6</image:title></image:image><image:image><image:loc>https://malwr-analysis.com/wp-content/uploads/2019/05/blg4-30042019-5.png</image:loc><image:title>Blg4-30042019-5</image:title></image:image><image:image><image:loc>https://malwr-analysis.com/wp-content/uploads/2019/05/blg4-30042019-2.png</image:loc><image:title>Blg4-30042019-2</image:title></image:image><image:image><image:loc>https://malwr-analysis.com/wp-content/uploads/2019/05/blg4-30042019-1.png</image:loc><image:title>Blg4-30042019-1</image:title></image:image><image:image><image:loc>https://malwr-analysis.com/wp-content/uploads/2019/05/blg4-30042019.png</image:loc><image:title>Blg4-30042019</image:title></image:image><image:image><image:loc>https://malwr-analysis.com/wp-content/uploads/2019/05/blg4-30042019-4.png</image:loc><image:title>Blg4-30042019-4</image:title></image:image><lastmod>2020-07-09T07:38:54+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://malwr-analysis.com/2019/05/14/trojan-downloader-word-macro/</loc><image:image><image:loc>https://malwr-analysis.com/wp-content/uploads/2019/05/blg5-05132019-11.png</image:loc><image:title>blg5-05132019-11</image:title></image:image><image:image><image:loc>https://malwr-analysis.com/wp-content/uploads/2019/05/blg5-05132019-5.png</image:loc><image:title>blg5-05132019-5</image:title></image:image><image:image><image:loc>https://malwr-analysis.com/wp-content/uploads/2019/05/blg5-05132019-10.png</image:loc><image:title>blg5-05132019-10</image:title></image:image><image:image><image:loc>https://malwr-analysis.com/wp-content/uploads/2019/05/blg5-05132019-9.png</image:loc><image:title>blg5-05132019-9</image:title></image:image><image:image><image:loc>https://malwr-analysis.com/wp-content/uploads/2019/05/blg5-05132019-8.png</image:loc><image:title>blg5-05132019-8</image:title></image:image><image:image><image:loc>https://malwr-analysis.com/wp-content/uploads/2019/05/blg5-05132019-7.png</image:loc><image:title>blg5-05132019-7</image:title></image:image><image:image><image:loc>https://malwr-analysis.com/wp-content/uploads/2019/05/blg5-05132019-6.png</image:loc><image:title>blg5-05132019-6</image:title></image:image><image:image><image:loc>https://malwr-analysis.com/wp-content/uploads/2019/05/blg5-05132019-4.png</image:loc><image:title>blg5-05132019-4</image:title></image:image><image:image><image:loc>https://malwr-analysis.com/wp-content/uploads/2019/05/blg5-05132019-3.png</image:loc><image:title>blg5-05132019-3</image:title></image:image><image:image><image:loc>https://malwr-analysis.com/wp-content/uploads/2019/05/blg5-05132019.png</image:loc><image:title>blg5-05132019</image:title></image:image><lastmod>2020-07-09T07:37:33+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://malwr-analysis.com/2019/08/23/trojan-dropper-bdf243b7a296f7aecc366c799e3fb865ee3aff7c72d8d942e2b2632a347fe5c3/</loc><image:image><image:loc>https://malwr-analysis.com/wp-content/uploads/2019/08/blg7-wp-34-1.png</image:loc><image:title>blg7-wp-34</image:title></image:image><image:image><image:loc>https://malwr-analysis.com/wp-content/uploads/2019/08/blg7-wp-35.png</image:loc><image:title>blg7-wp-35</image:title></image:image><image:image><image:loc>https://malwr-analysis.com/wp-content/uploads/2019/08/blg7-wp-34.png</image:loc><image:title>blg7-wp-34</image:title></image:image><image:image><image:loc>https://malwr-analysis.com/wp-content/uploads/2019/08/blg7-wp-33.png</image:loc><image:title>blg7-wp-33</image:title></image:image><image:image><image:loc>https://malwr-analysis.com/wp-content/uploads/2019/08/blg7-wp-32.png</image:loc><image:title>blg7-wp-32</image:title></image:image><image:image><image:loc>https://malwr-analysis.com/wp-content/uploads/2019/08/blg7-wp-31.png</image:loc><image:title>blg7-wp-31</image:title></image:image><image:image><image:loc>https://malwr-analysis.com/wp-content/uploads/2019/08/blg7-wp-28.png</image:loc><image:title>blg7-wp-28</image:title></image:image><image:image><image:loc>https://malwr-analysis.com/wp-content/uploads/2019/08/blg7-wp-27.png</image:loc><image:title>blg7-wp-27</image:title></image:image><image:image><image:loc>https://malwr-analysis.com/wp-content/uploads/2019/08/blg7-wp-22.png</image:loc><image:title>blg7-wp-22</image:title></image:image><image:image><image:loc>https://malwr-analysis.com/wp-content/uploads/2019/08/blg7-wp-25.png</image:loc><image:title>blg7-wp-25</image:title></image:image><lastmod>2020-07-09T07:34:53+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://malwr-analysis.com/2020/03/28/password-stealer-trojan-malware-analysis/</loc><image:image><image:loc>https://malwr-analysis.com/wp-content/uploads/2020/03/blg_03222020_19.png</image:loc><image:title>blg_03222020_19</image:title></image:image><image:image><image:loc>https://malwr-analysis.com/wp-content/uploads/2020/03/blg_03222020_7-1.png</image:loc><image:title>blg_03222020_7</image:title></image:image><image:image><image:loc>https://malwr-analysis.com/wp-content/uploads/2020/03/blg_03222020_13.png</image:loc><image:title>blg_03222020_13</image:title></image:image><image:image><image:loc>https://malwr-analysis.com/wp-content/uploads/2020/03/blg_03222020_7.png</image:loc><image:title>blg_03222020_7</image:title></image:image><image:image><image:loc>https://malwr-analysis.com/wp-content/uploads/2020/03/blg_03222020_18.png</image:loc><image:title>blg_03222020_18</image:title></image:image><image:image><image:loc>https://malwr-analysis.com/wp-content/uploads/2020/03/blg_03222020_17.png</image:loc><image:title>blg_03222020_17</image:title></image:image><image:image><image:loc>https://malwr-analysis.com/wp-content/uploads/2020/03/blg_03222020_4.png</image:loc><image:title>blg_03222020_4</image:title></image:image><image:image><image:loc>https://malwr-analysis.com/wp-content/uploads/2020/03/blg_03222020_8.png</image:loc><image:title>blg_03222020_8</image:title></image:image><image:image><image:loc>https://malwr-analysis.com/wp-content/uploads/2020/03/blg_03222020_15.png</image:loc><image:title>blg_03222020_15</image:title></image:image><image:image><image:loc>https://malwr-analysis.com/wp-content/uploads/2020/03/blg_03222020_5.png</image:loc><image:title>blg_03222020_5</image:title></image:image><lastmod>2020-07-09T07:33:15+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://malwr-analysis.com/2020/05/01/pdf-malware-analysis/</loc><image:image><image:loc>https://malwr-analysis.com/wp-content/uploads/2020/05/blg14_300420202_18-1.png</image:loc><image:title>Blg14_300420202_18</image:title></image:image><image:image><image:loc>https://malwr-analysis.com/wp-content/uploads/2020/05/blg14_300420202_18.png</image:loc><image:title>Blg14_300420202_18</image:title></image:image><image:image><image:loc>https://malwr-analysis.com/wp-content/uploads/2020/05/blg14_300420202_17.png</image:loc><image:title>Blg14_300420202_17</image:title></image:image><image:image><image:loc>https://malwr-analysis.com/wp-content/uploads/2020/05/blg14_300420202_16.png</image:loc><image:title>Blg14_300420202_16</image:title></image:image><image:image><image:loc>https://malwr-analysis.com/wp-content/uploads/2020/05/blg14_300420202_15.png</image:loc><image:title>Blg14_300420202_15</image:title></image:image><image:image><image:loc>https://malwr-analysis.com/wp-content/uploads/2020/05/blg14_300420202_14.png</image:loc><image:title>Blg14_300420202_14</image:title></image:image><image:image><image:loc>https://malwr-analysis.com/wp-content/uploads/2020/05/blg14_300420202_13.png</image:loc><image:title>Blg14_300420202_13</image:title></image:image><image:image><image:loc>https://malwr-analysis.com/wp-content/uploads/2020/05/blg14_300420202_12.png</image:loc><image:title>Blg14_300420202_12</image:title></image:image><image:image><image:loc>https://malwr-analysis.com/wp-content/uploads/2020/05/blg14_300420202_11.png</image:loc><image:title>Blg14_300420202_11</image:title></image:image><image:image><image:loc>https://malwr-analysis.com/wp-content/uploads/2020/05/blg14_300420202_1.png</image:loc><image:title>Blg14_300420202_1</image:title></image:image><lastmod>2022-11-29T06:01:22+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://malwr-analysis.com/2020/05/04/excel-4-0-macro-trojan-downloader-malware-analysis/</loc><image:image><image:loc>https://malwr-analysis.com/wp-content/uploads/2020/05/blg15_02052020_35.png</image:loc><image:title>Blg15_02052020_35</image:title></image:image><image:image><image:loc>https://malwr-analysis.com/wp-content/uploads/2020/05/blg15_02052020_34.png</image:loc><image:title>Blg15_02052020_34</image:title></image:image><image:image><image:loc>https://malwr-analysis.com/wp-content/uploads/2020/05/blg15_02052020_32.png</image:loc><image:title>Blg15_02052020_32</image:title></image:image><image:image><image:loc>https://malwr-analysis.com/wp-content/uploads/2020/05/blg15_02052020_33.png</image:loc><image:title>Blg15_02052020_33</image:title></image:image><image:image><image:loc>https://malwr-analysis.com/wp-content/uploads/2020/05/blg15_02052020_31.png</image:loc><image:title>Blg15_02052020_31</image:title></image:image><image:image><image:loc>https://malwr-analysis.com/wp-content/uploads/2020/05/blg15_02052020_28.png</image:loc><image:title>Blg15_02052020_28</image:title></image:image><image:image><image:loc>https://malwr-analysis.com/wp-content/uploads/2020/05/blg15_02052020_29.png</image:loc><image:title>Blg15_02052020_29</image:title></image:image><image:image><image:loc>https://malwr-analysis.com/wp-content/uploads/2020/05/blg15_02052020_30.png</image:loc><image:title>Blg15_02052020_30</image:title></image:image><image:image><image:loc>https://malwr-analysis.com/wp-content/uploads/2020/05/blg15_02052020_27.png</image:loc><image:title>Blg15_02052020_27</image:title></image:image><image:image><image:loc>https://malwr-analysis.com/wp-content/uploads/2020/05/blg15_02052020_26.png</image:loc><image:title>Blg15_02052020_26</image:title></image:image><lastmod>2020-07-12T13:38:03+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://malwr-analysis.com/2020/06/12/word-macro-malware-analysis-2/</loc><lastmod>2020-07-09T07:24:49+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://malwr-analysis.com/2019/02/16/microsoft-word-document-malware-analysis/</loc><image:image><image:loc>https://malwr-analysis.com/wp-content/uploads/2019/02/email6.png</image:loc><image:title>Email6</image:title></image:image><image:image><image:loc>https://malwr-analysis.com/wp-content/uploads/2019/02/email5.png</image:loc><image:title>Email5</image:title></image:image><image:image><image:loc>https://malwr-analysis.com/wp-content/uploads/2019/02/email4.png</image:loc><image:title>Email4</image:title></image:image><image:image><image:loc>https://malwr-analysis.com/wp-content/uploads/2019/02/email3.png</image:loc><image:title>Email3</image:title></image:image><image:image><image:loc>https://malwr-analysis.com/wp-content/uploads/2019/02/email2.png</image:loc><image:title>Email2</image:title></image:image><image:image><image:loc>https://malwr-analysis.com/wp-content/uploads/2019/02/email.png</image:loc><image:title>Email</image:title></image:image><lastmod>2020-07-09T07:18:09+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://malwr-analysis.com/2019/03/16/emotet-malware-analysis/</loc><image:image><image:loc>https://malwr-analysis.com/wp-content/uploads/2019/03/wm14.png</image:loc><image:title>wm14</image:title></image:image><image:image><image:loc>https://malwr-analysis.com/wp-content/uploads/2019/03/wm12.png</image:loc><image:title>wm12</image:title></image:image><image:image><image:loc>https://malwr-analysis.com/wp-content/uploads/2019/03/wm11.png</image:loc><image:title>wm11</image:title></image:image><image:image><image:loc>https://malwr-analysis.com/wp-content/uploads/2019/03/wm13.png</image:loc><image:title>wm13</image:title></image:image><image:image><image:loc>https://malwr-analysis.com/wp-content/uploads/2019/03/wm10.png</image:loc><image:title>wm10</image:title></image:image><image:image><image:loc>https://malwr-analysis.com/wp-content/uploads/2019/03/wm9.png</image:loc><image:title>wm9</image:title></image:image><image:image><image:loc>https://malwr-analysis.com/wp-content/uploads/2019/03/wm8.png</image:loc><image:title>wm8</image:title></image:image><image:image><image:loc>https://malwr-analysis.com/wp-content/uploads/2019/03/wm7.png</image:loc><image:title>wm7</image:title></image:image><image:image><image:loc>https://malwr-analysis.com/wp-content/uploads/2019/03/wm6.png</image:loc><image:title>wm6</image:title></image:image><image:image><image:loc>https://malwr-analysis.com/wp-content/uploads/2019/03/wm5.png</image:loc><image:title>wm5</image:title></image:image><lastmod>2020-07-09T07:13:09+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://malwr-analysis.com/2019/04/14/trojan-malware-microsoft-shortcut-lnk/</loc><image:image><image:loc>https://malwr-analysis.com/wp-content/uploads/2019/04/blg-3.png</image:loc><image:title>blg-3</image:title></image:image><image:image><image:loc>https://malwr-analysis.com/wp-content/uploads/2019/04/blg-2.png</image:loc><image:title>blg-2</image:title></image:image><lastmod>2020-07-09T07:11:29+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://malwr-analysis.com/2019/04/22/trojan-js-downloader/</loc><image:image><image:loc>https://malwr-analysis.com/wp-content/uploads/2019/04/blg3_20042019_12.png</image:loc><image:title>Blg3_20042019_12</image:title></image:image><image:image><image:loc>https://malwr-analysis.com/wp-content/uploads/2019/04/blg3_20042019_9.png</image:loc><image:title>Blg3_20042019_9</image:title></image:image><image:image><image:loc>https://malwr-analysis.com/wp-content/uploads/2019/04/blg3_20042019_8.png</image:loc><image:title>Blg3_20042019_8</image:title></image:image><image:image><image:loc>https://malwr-analysis.com/wp-content/uploads/2019/04/blg3_20042019_2.png</image:loc><image:title>Blg3_20042019_2</image:title></image:image><image:image><image:loc>https://malwr-analysis.com/wp-content/uploads/2019/04/blg3_20042019_6.png</image:loc><image:title>Blg3_20042019_6</image:title></image:image><image:image><image:loc>https://malwr-analysis.com/wp-content/uploads/2019/04/blg3_20042019_3.png</image:loc><image:title>Blg3_20042019_3</image:title></image:image><image:image><image:loc>https://malwr-analysis.com/wp-content/uploads/2019/04/blg3_20042019_7.png</image:loc><image:title>Blg3_20042019_7</image:title></image:image><image:image><image:loc>https://malwr-analysis.com/wp-content/uploads/2019/04/blg3_20042019_4.png</image:loc><image:title>Blg3_20042019_4</image:title></image:image><lastmod>2020-07-09T07:04:46+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://malwr-analysis.com/2020/05/15/word-macro-malware-analysis/</loc><image:image><image:loc>https://malwr-analysis.com/wp-content/uploads/2020/05/blg16_08052020_20.png</image:loc><image:title>Blg16_08052020_20</image:title></image:image><image:image><image:loc>https://malwr-analysis.com/wp-content/uploads/2020/05/blg16_08052020_19.png</image:loc><image:title>Blg16_08052020_19</image:title></image:image><image:image><image:loc>https://malwr-analysis.com/wp-content/uploads/2020/05/blg16_08052020_18.png</image:loc><image:title>Blg16_08052020_18</image:title></image:image><image:image><image:loc>https://malwr-analysis.com/wp-content/uploads/2020/05/blg16_08052020_16.png</image:loc><image:title>Blg16_08052020_16</image:title></image:image><image:image><image:loc>https://malwr-analysis.com/wp-content/uploads/2020/05/blg16_08052020_15.png</image:loc><image:title>Blg16_08052020_15</image:title></image:image><image:image><image:loc>https://malwr-analysis.com/wp-content/uploads/2020/05/blg16_08052020_14.png</image:loc><image:title>Blg16_08052020_14</image:title></image:image><image:image><image:loc>https://malwr-analysis.com/wp-content/uploads/2020/05/blg16_08052020_13.png</image:loc><image:title>Blg16_08052020_13</image:title></image:image><image:image><image:loc>https://malwr-analysis.com/wp-content/uploads/2020/05/blg16_08052020_12.png</image:loc><image:title>Blg16_08052020_12</image:title></image:image><image:image><image:loc>https://malwr-analysis.com/wp-content/uploads/2020/05/blg16_08052020_11.png</image:loc><image:title>Blg16_08052020_11</image:title></image:image><image:image><image:loc>https://malwr-analysis.com/wp-content/uploads/2020/05/blg16_08052020_10.png</image:loc><image:title>Blg16_08052020_10</image:title></image:image><lastmod>2020-07-09T06:51:02+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://malwr-analysis.com/2019/03/27/microsoft-shortcut-lnk-trojan-malware/</loc><image:image><image:loc>https://malwr-analysis.com/wp-content/uploads/2019/03/b4_4.png</image:loc><image:title>b4_4</image:title></image:image><image:image><image:loc>https://malwr-analysis.com/wp-content/uploads/2019/03/b4_5.png</image:loc><image:title>b4_5</image:title></image:image><image:image><image:loc>https://malwr-analysis.com/wp-content/uploads/2019/03/b4_3.png</image:loc><image:title>b4_3</image:title></image:image><image:image><image:loc>https://malwr-analysis.com/wp-content/uploads/2019/03/b4_2.png</image:loc><image:title>b4_2</image:title></image:image><image:image><image:loc>https://malwr-analysis.com/wp-content/uploads/2019/03/b4_1.png</image:loc><image:title>b4_1</image:title></image:image><lastmod>2019-03-26T17:15:19+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://malwr-analysis.com</loc><changefreq>daily</changefreq><priority>1.0</priority><lastmod>2026-03-13T21:23:00+00:00</lastmod></url></urlset>
