Overview
overview
10Static
static
10uni/Uni - ...py.exe
windows7-x64
10uni/Uni - ...py.exe
windows10-2004-x64
10uni/Uni - ...py.exe
windows7-x64
10uni/Uni - ...py.exe
windows10-2004-x64
10uni/Uni - ...py.exe
windows7-x64
10uni/Uni - ...py.exe
windows10-2004-x64
10uni/Uni - ...py.exe
windows7-x64
10uni/Uni - ...py.exe
windows10-2004-x64
10uni/Uni - ...py.exe
windows7-x64
10uni/Uni - ...py.exe
windows10-2004-x64
10uni/Uni - ...py.exe
windows7-x64
10uni/Uni - ...py.exe
windows10-2004-x64
10uni/Uni - ...py.exe
windows7-x64
10uni/Uni - ...py.exe
windows10-2004-x64
10uni/Uni - ...py.exe
windows7-x64
10uni/Uni - ...py.exe
windows10-2004-x64
10uni/Uni - ...py.exe
windows7-x64
10uni/Uni - ...py.exe
windows10-2004-x64
10uni/Uni - ...py.exe
windows7-x64
10uni/Uni - ...py.exe
windows10-2004-x64
10uni/Uni - ...py.exe
windows7-x64
10uni/Uni - ...py.exe
windows10-2004-x64
10uni/Uni - ...py.exe
windows7-x64
10uni/Uni - ...py.exe
windows10-2004-x64
10uni/Uni - ...py.exe
windows7-x64
10uni/Uni - ...py.exe
windows10-2004-x64
10uni/Uni - ...py.exe
windows7-x64
10uni/Uni - ...py.exe
windows10-2004-x64
10uni/Uni - ...py.exe
windows7-x64
10uni/Uni - ...py.exe
windows10-2004-x64
10uni/Uni - ...py.exe
windows7-x64
10uni/Uni - ...py.exe
windows10-2004-x64
10Analysis
-
max time kernel
295s -
max time network
302s -
platform
windows10-2004_x64 -
resource
win10v2004-20240508-en -
resource tags
arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system -
submitted
15-06-2024 07:29
Behavioral task
behavioral1
Sample
uni/Uni - Copy (10) - Copy - Copy - Copy.exe
Resource
win7-20240611-en
Behavioral task
behavioral2
Sample
uni/Uni - Copy (10) - Copy - Copy - Copy.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral3
Sample
uni/Uni - Copy (10) - Copy - Copy.exe
Resource
win7-20240221-en
Behavioral task
behavioral4
Sample
uni/Uni - Copy (10) - Copy - Copy.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral5
Sample
uni/Uni - Copy (10) - Copy.exe
Resource
win7-20240220-en
Behavioral task
behavioral6
Sample
uni/Uni - Copy (10) - Copy.exe
Resource
win10v2004-20240611-en
Behavioral task
behavioral7
Sample
uni/Uni - Copy (11) - Copy - Copy - Copy.exe
Resource
win7-20240611-en
Behavioral task
behavioral8
Sample
uni/Uni - Copy (11) - Copy - Copy - Copy.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral9
Sample
uni/Uni - Copy (11) - Copy - Copy.exe
Resource
win7-20240221-en
Behavioral task
behavioral10
Sample
uni/Uni - Copy (11) - Copy - Copy.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral11
Sample
uni/Uni - Copy (11) - Copy.exe
Resource
win7-20240611-en
Behavioral task
behavioral12
Sample
uni/Uni - Copy (11) - Copy.exe
Resource
win10v2004-20240611-en
Behavioral task
behavioral13
Sample
uni/Uni - Copy (12) - Copy - Copy - Copy.exe
Resource
win7-20240220-en
Behavioral task
behavioral14
Sample
uni/Uni - Copy (12) - Copy - Copy - Copy.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral15
Sample
uni/Uni - Copy (12) - Copy - Copy.exe
Resource
win7-20231129-en
Behavioral task
behavioral16
Sample
uni/Uni - Copy (12) - Copy - Copy.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral17
Sample
uni/Uni - Copy (12) - Copy.exe
Resource
win7-20240611-en
Behavioral task
behavioral18
Sample
uni/Uni - Copy (12) - Copy.exe
Resource
win10v2004-20240611-en
Behavioral task
behavioral19
Sample
uni/Uni - Copy (13) - Copy - Copy - Copy.exe
Resource
win7-20240508-en
Behavioral task
behavioral20
Sample
uni/Uni - Copy (13) - Copy - Copy - Copy.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral21
Sample
uni/Uni - Copy (13) - Copy - Copy.exe
Resource
win7-20240221-en
Behavioral task
behavioral22
Sample
uni/Uni - Copy (13) - Copy - Copy.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral23
Sample
uni/Uni - Copy (13) - Copy.exe
Resource
win7-20240221-en
Behavioral task
behavioral24
Sample
uni/Uni - Copy (13) - Copy.exe
Resource
win10v2004-20240226-en
Behavioral task
behavioral25
Sample
uni/Uni - Copy (14) - Copy - Copy - Copy.exe
Resource
win7-20240611-en
Behavioral task
behavioral26
Sample
uni/Uni - Copy (14) - Copy - Copy - Copy.exe
Resource
win10v2004-20240611-en
Behavioral task
behavioral27
Sample
uni/Uni - Copy (14) - Copy - Copy.exe
Resource
win7-20240508-en
Behavioral task
behavioral28
Sample
uni/Uni - Copy (14) - Copy - Copy.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral29
Sample
uni/Uni - Copy (14) - Copy.exe
Resource
win7-20240508-en
Behavioral task
behavioral30
Sample
uni/Uni - Copy (14) - Copy.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral31
Sample
uni/Uni - Copy (15) - Copy - Copy - Copy.exe
Resource
win7-20231129-en
General
-
Target
uni/Uni - Copy (11) - Copy - Copy.exe
-
Size
409KB
-
MD5
b70fdac25a99501e3cae11f1b775249e
-
SHA1
3c59226479bfdcd1b2927bcfb1a7516d4cb8dd71
-
SHA256
51ff3eb450a786c1aaa75ff889f2fd256412a7b75d04277fdf9fcccc20e57246
-
SHA512
43f0d5d6e5f0d5febba537c109ffdbc250bbb6e9725e635a43ec975b0353048eaeee50b6e9274cd5e072ea6b0cea32439bd37408b2528832f467f2075f74ca44
-
SSDEEP
12288:gpbJjGut6AoE3hVVdFaC/eZPTMTDlpgfJCKuMsVs:oVaurMLcDlpRKai
Malware Config
Extracted
quasar
3.1.5
SeroXen
panel-slave.gl.at.ply.gg:57059
panel-slave.gl.at.ply.gg:27892
$Sxr-rpL8EItHN3pqIQQVy2
-
encryption_key
Lme7VBS3l58VwLM69PNM
-
install_name
Client.exe
-
log_directory
Logs
-
reconnect_delay
3000
-
startup_key
SeroXen
-
subdirectory
SubDir
Signatures
-
Quasar payload 2 IoCs
Processes:
resource yara_rule behavioral10/memory/640-1-0x0000000000EE0000-0x0000000000F4C000-memory.dmp family_quasar C:\Users\Admin\AppData\Roaming\SubDir\Client.exe family_quasar -
Checks computer location settings 2 TTPs 15 IoCs
Looks up country code configured in the registry, likely geofence.
Processes:
Client.exeClient.exeClient.exeClient.exeClient.exeClient.exeClient.exeClient.exeClient.exeClient.exeClient.exeClient.exeClient.exeClient.exeClient.exedescription ioc process Key value queried \REGISTRY\USER\S-1-5-21-4124900551-4068476067-3491212533-1000\Control Panel\International\Geo\Nation Client.exe Key value queried \REGISTRY\USER\S-1-5-21-4124900551-4068476067-3491212533-1000\Control Panel\International\Geo\Nation Client.exe Key value queried \REGISTRY\USER\S-1-5-21-4124900551-4068476067-3491212533-1000\Control Panel\International\Geo\Nation Client.exe Key value queried \REGISTRY\USER\S-1-5-21-4124900551-4068476067-3491212533-1000\Control Panel\International\Geo\Nation Client.exe Key value queried \REGISTRY\USER\S-1-5-21-4124900551-4068476067-3491212533-1000\Control Panel\International\Geo\Nation Client.exe Key value queried \REGISTRY\USER\S-1-5-21-4124900551-4068476067-3491212533-1000\Control Panel\International\Geo\Nation Client.exe Key value queried \REGISTRY\USER\S-1-5-21-4124900551-4068476067-3491212533-1000\Control Panel\International\Geo\Nation Client.exe Key value queried \REGISTRY\USER\S-1-5-21-4124900551-4068476067-3491212533-1000\Control Panel\International\Geo\Nation Client.exe Key value queried \REGISTRY\USER\S-1-5-21-4124900551-4068476067-3491212533-1000\Control Panel\International\Geo\Nation Client.exe Key value queried \REGISTRY\USER\S-1-5-21-4124900551-4068476067-3491212533-1000\Control Panel\International\Geo\Nation Client.exe Key value queried \REGISTRY\USER\S-1-5-21-4124900551-4068476067-3491212533-1000\Control Panel\International\Geo\Nation Client.exe Key value queried \REGISTRY\USER\S-1-5-21-4124900551-4068476067-3491212533-1000\Control Panel\International\Geo\Nation Client.exe Key value queried \REGISTRY\USER\S-1-5-21-4124900551-4068476067-3491212533-1000\Control Panel\International\Geo\Nation Client.exe Key value queried \REGISTRY\USER\S-1-5-21-4124900551-4068476067-3491212533-1000\Control Panel\International\Geo\Nation Client.exe Key value queried \REGISTRY\USER\S-1-5-21-4124900551-4068476067-3491212533-1000\Control Panel\International\Geo\Nation Client.exe -
Executes dropped EXE 16 IoCs
Processes:
Client.exeClient.exeClient.exeClient.exeClient.exeClient.exeClient.exeClient.exeClient.exeClient.exeClient.exeClient.exeClient.exeClient.exeClient.exeClient.exepid process 2848 Client.exe 388 Client.exe 1788 Client.exe 408 Client.exe 4228 Client.exe 948 Client.exe 2724 Client.exe 2960 Client.exe 4880 Client.exe 548 Client.exe 1520 Client.exe 1064 Client.exe 4420 Client.exe 2844 Client.exe 528 Client.exe 4504 Client.exe -
Adds Run key to start application 2 TTPs 1 IoCs
Processes:
Client.exedescription ioc process Set value (str) \REGISTRY\USER\S-1-5-21-4124900551-4068476067-3491212533-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\SeroXen = "\"C:\\Users\\Admin\\AppData\\Roaming\\SubDir\\Client.exe\"" Client.exe -
Looks up external IP address via web service 13 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
Processes:
flow ioc 2 ip-api.com 33 ip-api.com 37 ip-api.com 13 ip-api.com 18 ip-api.com 28 ip-api.com 31 ip-api.com 16 ip-api.com 23 ip-api.com 26 ip-api.com 8 api.ipify.org 20 ip-api.com 35 ip-api.com -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Program crash 15 IoCs
Processes:
WerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exepid pid_target process target process 1396 2848 WerFault.exe Client.exe 3528 388 WerFault.exe Client.exe 3128 1788 WerFault.exe Client.exe 2620 408 WerFault.exe Client.exe 640 4228 WerFault.exe Client.exe 4996 948 WerFault.exe Client.exe 3684 2724 WerFault.exe Client.exe 4556 2960 WerFault.exe Client.exe 452 4880 WerFault.exe Client.exe 2588 548 WerFault.exe Client.exe 4160 1520 WerFault.exe Client.exe 3288 1064 WerFault.exe Client.exe 1132 4420 WerFault.exe Client.exe 4168 2844 WerFault.exe Client.exe 2732 528 WerFault.exe Client.exe -
Creates scheduled task(s) 1 TTPs 17 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
Processes:
schtasks.exeSCHTASKS.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exepid process 3228 schtasks.exe 2372 SCHTASKS.exe 3508 schtasks.exe 4836 schtasks.exe 1476 schtasks.exe 2924 schtasks.exe 4452 schtasks.exe 1816 schtasks.exe 2864 schtasks.exe 3600 schtasks.exe 1740 schtasks.exe 3288 schtasks.exe 4348 schtasks.exe 5104 schtasks.exe 972 schtasks.exe 4324 schtasks.exe 2416 schtasks.exe -
Runs ping.exe 1 TTPs 15 IoCs
Processes:
PING.EXEPING.EXEPING.EXEPING.EXEPING.EXEPING.EXEPING.EXEPING.EXEPING.EXEPING.EXEPING.EXEPING.EXEPING.EXEPING.EXEPING.EXEpid process 2392 PING.EXE 3448 PING.EXE 3944 PING.EXE 2972 PING.EXE 4568 PING.EXE 3508 PING.EXE 1352 PING.EXE 3684 PING.EXE 2796 PING.EXE 4576 PING.EXE 2572 PING.EXE 640 PING.EXE 956 PING.EXE 1484 PING.EXE 3916 PING.EXE -
Suspicious use of AdjustPrivilegeToken 17 IoCs
Processes:
Uni - Copy (11) - Copy - Copy.exeClient.exeClient.exeClient.exeClient.exeClient.exeClient.exeClient.exeClient.exeClient.exeClient.exeClient.exeClient.exeClient.exeClient.exeClient.exeClient.exedescription pid process Token: SeDebugPrivilege 640 Uni - Copy (11) - Copy - Copy.exe Token: SeDebugPrivilege 2848 Client.exe Token: SeDebugPrivilege 388 Client.exe Token: SeDebugPrivilege 1788 Client.exe Token: SeDebugPrivilege 408 Client.exe Token: SeDebugPrivilege 4228 Client.exe Token: SeDebugPrivilege 948 Client.exe Token: SeDebugPrivilege 2724 Client.exe Token: SeDebugPrivilege 2960 Client.exe Token: SeDebugPrivilege 4880 Client.exe Token: SeDebugPrivilege 548 Client.exe Token: SeDebugPrivilege 1520 Client.exe Token: SeDebugPrivilege 1064 Client.exe Token: SeDebugPrivilege 4420 Client.exe Token: SeDebugPrivilege 2844 Client.exe Token: SeDebugPrivilege 528 Client.exe Token: SeDebugPrivilege 4504 Client.exe -
Suspicious use of SetWindowsHookEx 15 IoCs
Processes:
Client.exeClient.exeClient.exeClient.exeClient.exeClient.exeClient.exeClient.exeClient.exeClient.exeClient.exeClient.exeClient.exeClient.exeClient.exepid process 2848 Client.exe 388 Client.exe 1788 Client.exe 408 Client.exe 4228 Client.exe 948 Client.exe 2724 Client.exe 2960 Client.exe 4880 Client.exe 548 Client.exe 1520 Client.exe 1064 Client.exe 4420 Client.exe 2844 Client.exe 528 Client.exe -
Suspicious use of WriteProcessMemory 64 IoCs
Processes:
Uni - Copy (11) - Copy - Copy.exeClient.execmd.exeClient.execmd.exeClient.execmd.exeClient.execmd.exedescription pid process target process PID 640 wrote to memory of 3228 640 Uni - Copy (11) - Copy - Copy.exe schtasks.exe PID 640 wrote to memory of 3228 640 Uni - Copy (11) - Copy - Copy.exe schtasks.exe PID 640 wrote to memory of 3228 640 Uni - Copy (11) - Copy - Copy.exe schtasks.exe PID 640 wrote to memory of 2848 640 Uni - Copy (11) - Copy - Copy.exe Client.exe PID 640 wrote to memory of 2848 640 Uni - Copy (11) - Copy - Copy.exe Client.exe PID 640 wrote to memory of 2848 640 Uni - Copy (11) - Copy - Copy.exe Client.exe PID 640 wrote to memory of 2372 640 Uni - Copy (11) - Copy - Copy.exe SCHTASKS.exe PID 640 wrote to memory of 2372 640 Uni - Copy (11) - Copy - Copy.exe SCHTASKS.exe PID 640 wrote to memory of 2372 640 Uni - Copy (11) - Copy - Copy.exe SCHTASKS.exe PID 2848 wrote to memory of 3508 2848 Client.exe schtasks.exe PID 2848 wrote to memory of 3508 2848 Client.exe schtasks.exe PID 2848 wrote to memory of 3508 2848 Client.exe schtasks.exe PID 2848 wrote to memory of 852 2848 Client.exe cmd.exe PID 2848 wrote to memory of 852 2848 Client.exe cmd.exe PID 2848 wrote to memory of 852 2848 Client.exe cmd.exe PID 852 wrote to memory of 1240 852 cmd.exe chcp.com PID 852 wrote to memory of 1240 852 cmd.exe chcp.com PID 852 wrote to memory of 1240 852 cmd.exe chcp.com PID 852 wrote to memory of 2796 852 cmd.exe PING.EXE PID 852 wrote to memory of 2796 852 cmd.exe PING.EXE PID 852 wrote to memory of 2796 852 cmd.exe PING.EXE PID 852 wrote to memory of 388 852 cmd.exe Client.exe PID 852 wrote to memory of 388 852 cmd.exe Client.exe PID 852 wrote to memory of 388 852 cmd.exe Client.exe PID 388 wrote to memory of 1816 388 Client.exe schtasks.exe PID 388 wrote to memory of 1816 388 Client.exe schtasks.exe PID 388 wrote to memory of 1816 388 Client.exe schtasks.exe PID 388 wrote to memory of 4924 388 Client.exe cmd.exe PID 388 wrote to memory of 4924 388 Client.exe cmd.exe PID 388 wrote to memory of 4924 388 Client.exe cmd.exe PID 4924 wrote to memory of 2524 4924 cmd.exe chcp.com PID 4924 wrote to memory of 2524 4924 cmd.exe chcp.com PID 4924 wrote to memory of 2524 4924 cmd.exe chcp.com PID 4924 wrote to memory of 4568 4924 cmd.exe PING.EXE PID 4924 wrote to memory of 4568 4924 cmd.exe PING.EXE PID 4924 wrote to memory of 4568 4924 cmd.exe PING.EXE PID 4924 wrote to memory of 1788 4924 cmd.exe Client.exe PID 4924 wrote to memory of 1788 4924 cmd.exe Client.exe PID 4924 wrote to memory of 1788 4924 cmd.exe Client.exe PID 1788 wrote to memory of 2864 1788 Client.exe schtasks.exe PID 1788 wrote to memory of 2864 1788 Client.exe schtasks.exe PID 1788 wrote to memory of 2864 1788 Client.exe schtasks.exe PID 1788 wrote to memory of 2288 1788 Client.exe cmd.exe PID 1788 wrote to memory of 2288 1788 Client.exe cmd.exe PID 1788 wrote to memory of 2288 1788 Client.exe cmd.exe PID 2288 wrote to memory of 4500 2288 cmd.exe chcp.com PID 2288 wrote to memory of 4500 2288 cmd.exe chcp.com PID 2288 wrote to memory of 4500 2288 cmd.exe chcp.com PID 2288 wrote to memory of 956 2288 cmd.exe PING.EXE PID 2288 wrote to memory of 956 2288 cmd.exe PING.EXE PID 2288 wrote to memory of 956 2288 cmd.exe PING.EXE PID 2288 wrote to memory of 408 2288 cmd.exe Client.exe PID 2288 wrote to memory of 408 2288 cmd.exe Client.exe PID 2288 wrote to memory of 408 2288 cmd.exe Client.exe PID 408 wrote to memory of 3600 408 Client.exe schtasks.exe PID 408 wrote to memory of 3600 408 Client.exe schtasks.exe PID 408 wrote to memory of 3600 408 Client.exe schtasks.exe PID 408 wrote to memory of 1688 408 Client.exe cmd.exe PID 408 wrote to memory of 1688 408 Client.exe cmd.exe PID 408 wrote to memory of 1688 408 Client.exe cmd.exe PID 1688 wrote to memory of 4044 1688 cmd.exe chcp.com PID 1688 wrote to memory of 4044 1688 cmd.exe chcp.com PID 1688 wrote to memory of 4044 1688 cmd.exe chcp.com PID 1688 wrote to memory of 1484 1688 cmd.exe PING.EXE
Processes
-
C:\Users\Admin\AppData\Local\Temp\uni\Uni - Copy (11) - Copy - Copy.exe"C:\Users\Admin\AppData\Local\Temp\uni\Uni - Copy (11) - Copy - Copy.exe"1⤵
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\schtasks.exe"schtasks" /create /tn "SeroXen" /sc ONLOGON /tr "C:\Users\Admin\AppData\Local\Temp\uni\Uni - Copy (11) - Copy - Copy.exe" /rl HIGHEST /f2⤵
- Creates scheduled task(s)
-
C:\Users\Admin\AppData\Roaming\SubDir\Client.exe"C:\Users\Admin\AppData\Roaming\SubDir\Client.exe"2⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\schtasks.exe"schtasks" /create /tn "SeroXen" /sc ONLOGON /tr "C:\Users\Admin\AppData\Roaming\SubDir\Client.exe" /rl HIGHEST /f3⤵
- Creates scheduled task(s)
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\eMUGLU4lInqz.bat" "3⤵
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\chcp.comchcp 650014⤵
-
C:\Windows\SysWOW64\PING.EXEping -n 10 localhost4⤵
- Runs ping.exe
-
C:\Users\Admin\AppData\Roaming\SubDir\Client.exe"C:\Users\Admin\AppData\Roaming\SubDir\Client.exe"4⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\schtasks.exe"schtasks" /create /tn "SeroXen" /sc ONLOGON /tr "C:\Users\Admin\AppData\Roaming\SubDir\Client.exe" /rl HIGHEST /f5⤵
- Creates scheduled task(s)
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\PsUaVSKOMswV.bat" "5⤵
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\chcp.comchcp 650016⤵
-
C:\Windows\SysWOW64\PING.EXEping -n 10 localhost6⤵
- Runs ping.exe
-
C:\Users\Admin\AppData\Roaming\SubDir\Client.exe"C:\Users\Admin\AppData\Roaming\SubDir\Client.exe"6⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\schtasks.exe"schtasks" /create /tn "SeroXen" /sc ONLOGON /tr "C:\Users\Admin\AppData\Roaming\SubDir\Client.exe" /rl HIGHEST /f7⤵
- Creates scheduled task(s)
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\rlrk6Nv5Olc0.bat" "7⤵
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\chcp.comchcp 650018⤵
-
C:\Windows\SysWOW64\PING.EXEping -n 10 localhost8⤵
- Runs ping.exe
-
C:\Users\Admin\AppData\Roaming\SubDir\Client.exe"C:\Users\Admin\AppData\Roaming\SubDir\Client.exe"8⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\schtasks.exe"schtasks" /create /tn "SeroXen" /sc ONLOGON /tr "C:\Users\Admin\AppData\Roaming\SubDir\Client.exe" /rl HIGHEST /f9⤵
- Creates scheduled task(s)
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\z2nzMXhVrdAa.bat" "9⤵
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\chcp.comchcp 6500110⤵
-
C:\Windows\SysWOW64\PING.EXEping -n 10 localhost10⤵
- Runs ping.exe
-
C:\Users\Admin\AppData\Roaming\SubDir\Client.exe"C:\Users\Admin\AppData\Roaming\SubDir\Client.exe"10⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
-
C:\Windows\SysWOW64\schtasks.exe"schtasks" /create /tn "SeroXen" /sc ONLOGON /tr "C:\Users\Admin\AppData\Roaming\SubDir\Client.exe" /rl HIGHEST /f11⤵
- Creates scheduled task(s)
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\eqVKPNRIHzYr.bat" "11⤵
-
C:\Windows\SysWOW64\chcp.comchcp 6500112⤵
-
C:\Windows\SysWOW64\PING.EXEping -n 10 localhost12⤵
- Runs ping.exe
-
C:\Users\Admin\AppData\Roaming\SubDir\Client.exe"C:\Users\Admin\AppData\Roaming\SubDir\Client.exe"12⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
-
C:\Windows\SysWOW64\schtasks.exe"schtasks" /create /tn "SeroXen" /sc ONLOGON /tr "C:\Users\Admin\AppData\Roaming\SubDir\Client.exe" /rl HIGHEST /f13⤵
- Creates scheduled task(s)
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\7B2jOvb2GDkX.bat" "13⤵
-
C:\Windows\SysWOW64\chcp.comchcp 6500114⤵
-
C:\Windows\SysWOW64\PING.EXEping -n 10 localhost14⤵
- Runs ping.exe
-
C:\Users\Admin\AppData\Roaming\SubDir\Client.exe"C:\Users\Admin\AppData\Roaming\SubDir\Client.exe"14⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
-
C:\Windows\SysWOW64\schtasks.exe"schtasks" /create /tn "SeroXen" /sc ONLOGON /tr "C:\Users\Admin\AppData\Roaming\SubDir\Client.exe" /rl HIGHEST /f15⤵
- Creates scheduled task(s)
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\Qzmq2np4XteV.bat" "15⤵
-
C:\Windows\SysWOW64\chcp.comchcp 6500116⤵
-
C:\Windows\SysWOW64\PING.EXEping -n 10 localhost16⤵
- Runs ping.exe
-
C:\Users\Admin\AppData\Roaming\SubDir\Client.exe"C:\Users\Admin\AppData\Roaming\SubDir\Client.exe"16⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
-
C:\Windows\SysWOW64\schtasks.exe"schtasks" /create /tn "SeroXen" /sc ONLOGON /tr "C:\Users\Admin\AppData\Roaming\SubDir\Client.exe" /rl HIGHEST /f17⤵
- Creates scheduled task(s)
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\JaOzuj6gdsAB.bat" "17⤵
-
C:\Windows\SysWOW64\chcp.comchcp 6500118⤵
-
C:\Windows\SysWOW64\PING.EXEping -n 10 localhost18⤵
- Runs ping.exe
-
C:\Users\Admin\AppData\Roaming\SubDir\Client.exe"C:\Users\Admin\AppData\Roaming\SubDir\Client.exe"18⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
-
C:\Windows\SysWOW64\schtasks.exe"schtasks" /create /tn "SeroXen" /sc ONLOGON /tr "C:\Users\Admin\AppData\Roaming\SubDir\Client.exe" /rl HIGHEST /f19⤵
- Creates scheduled task(s)
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\tZMyDdjLgfHp.bat" "19⤵
-
C:\Windows\SysWOW64\chcp.comchcp 6500120⤵
-
C:\Windows\SysWOW64\PING.EXEping -n 10 localhost20⤵
- Runs ping.exe
-
C:\Users\Admin\AppData\Roaming\SubDir\Client.exe"C:\Users\Admin\AppData\Roaming\SubDir\Client.exe"20⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
-
C:\Windows\SysWOW64\schtasks.exe"schtasks" /create /tn "SeroXen" /sc ONLOGON /tr "C:\Users\Admin\AppData\Roaming\SubDir\Client.exe" /rl HIGHEST /f21⤵
- Creates scheduled task(s)
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\3maIdbftorEV.bat" "21⤵
-
C:\Windows\SysWOW64\chcp.comchcp 6500122⤵
-
C:\Windows\SysWOW64\PING.EXEping -n 10 localhost22⤵
- Runs ping.exe
-
C:\Users\Admin\AppData\Roaming\SubDir\Client.exe"C:\Users\Admin\AppData\Roaming\SubDir\Client.exe"22⤵
- Checks computer location settings
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
-
C:\Windows\SysWOW64\schtasks.exe"schtasks" /create /tn "SeroXen" /sc ONLOGON /tr "C:\Users\Admin\AppData\Roaming\SubDir\Client.exe" /rl HIGHEST /f23⤵
- Creates scheduled task(s)
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\LnBszR0CccUs.bat" "23⤵
-
C:\Windows\SysWOW64\chcp.comchcp 6500124⤵
-
C:\Windows\SysWOW64\PING.EXEping -n 10 localhost24⤵
- Runs ping.exe
-
C:\Users\Admin\AppData\Roaming\SubDir\Client.exe"C:\Users\Admin\AppData\Roaming\SubDir\Client.exe"24⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
-
C:\Windows\SysWOW64\schtasks.exe"schtasks" /create /tn "SeroXen" /sc ONLOGON /tr "C:\Users\Admin\AppData\Roaming\SubDir\Client.exe" /rl HIGHEST /f25⤵
- Creates scheduled task(s)
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\vGG51Wi2HAPm.bat" "25⤵
-
C:\Windows\SysWOW64\chcp.comchcp 6500126⤵
-
C:\Windows\SysWOW64\PING.EXEping -n 10 localhost26⤵
- Runs ping.exe
-
C:\Users\Admin\AppData\Roaming\SubDir\Client.exe"C:\Users\Admin\AppData\Roaming\SubDir\Client.exe"26⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
-
C:\Windows\SysWOW64\schtasks.exe"schtasks" /create /tn "SeroXen" /sc ONLOGON /tr "C:\Users\Admin\AppData\Roaming\SubDir\Client.exe" /rl HIGHEST /f27⤵
- Creates scheduled task(s)
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\blCctM76Xi6E.bat" "27⤵
-
C:\Windows\SysWOW64\chcp.comchcp 6500128⤵
-
C:\Windows\SysWOW64\PING.EXEping -n 10 localhost28⤵
- Runs ping.exe
-
C:\Users\Admin\AppData\Roaming\SubDir\Client.exe"C:\Users\Admin\AppData\Roaming\SubDir\Client.exe"28⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
-
C:\Windows\SysWOW64\schtasks.exe"schtasks" /create /tn "SeroXen" /sc ONLOGON /tr "C:\Users\Admin\AppData\Roaming\SubDir\Client.exe" /rl HIGHEST /f29⤵
- Creates scheduled task(s)
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\YslKJFA6pUDi.bat" "29⤵
-
C:\Windows\SysWOW64\chcp.comchcp 6500130⤵
-
C:\Windows\SysWOW64\PING.EXEping -n 10 localhost30⤵
- Runs ping.exe
-
C:\Users\Admin\AppData\Roaming\SubDir\Client.exe"C:\Users\Admin\AppData\Roaming\SubDir\Client.exe"30⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
-
C:\Windows\SysWOW64\schtasks.exe"schtasks" /create /tn "SeroXen" /sc ONLOGON /tr "C:\Users\Admin\AppData\Roaming\SubDir\Client.exe" /rl HIGHEST /f31⤵
- Creates scheduled task(s)
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\sgWRx7O8697g.bat" "31⤵
-
C:\Windows\SysWOW64\chcp.comchcp 6500132⤵
-
C:\Windows\SysWOW64\PING.EXEping -n 10 localhost32⤵
- Runs ping.exe
-
C:\Users\Admin\AppData\Roaming\SubDir\Client.exe"C:\Users\Admin\AppData\Roaming\SubDir\Client.exe"32⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 528 -s 109231⤵
- Program crash
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2844 -s 166829⤵
- Program crash
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4420 -s 173227⤵
- Program crash
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1064 -s 160425⤵
- Program crash
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1520 -s 223223⤵
- Program crash
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 548 -s 223221⤵
- Program crash
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4880 -s 109219⤵
- Program crash
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2960 -s 224817⤵
- Program crash
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2724 -s 108815⤵
- Program crash
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 948 -s 222813⤵
- Program crash
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4228 -s 220011⤵
- Program crash
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 408 -s 10849⤵
- Program crash
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1788 -s 16407⤵
- Program crash
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 388 -s 21965⤵
- Program crash
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2848 -s 22043⤵
- Program crash
-
C:\Windows\SysWOW64\SCHTASKS.exe"SCHTASKS.exe" /create /tn "$77Uni - Copy (11) - Copy - Copy.exe" /tr "'C:\Users\Admin\AppData\Local\Temp\uni\Uni - Copy (11) - Copy - Copy.exe'" /sc onlogon /rl HIGHEST2⤵
- Creates scheduled task(s)
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 408 -p 2848 -ip 28481⤵
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 464 -p 388 -ip 3881⤵
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 500 -p 1788 -ip 17881⤵
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 512 -p 408 -ip 4081⤵
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 516 -p 4228 -ip 42281⤵
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 516 -p 948 -ip 9481⤵
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 472 -p 2724 -ip 27241⤵
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 556 -p 2960 -ip 29601⤵
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 516 -p 4880 -ip 48801⤵
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 548 -p 548 -ip 5481⤵
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 484 -p 1520 -ip 15201⤵
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 580 -p 1064 -ip 10641⤵
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 572 -p 4420 -ip 44201⤵
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 540 -p 2844 -ip 28441⤵
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 568 -p 528 -ip 5281⤵
Network
MITRE ATT&CK Matrix ATT&CK v13
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Local\Temp\3maIdbftorEV.batFilesize
207B
MD5669664d89406c134ebe508f1ff97bd0b
SHA1023ec874bc6b16777977cf72181d1fb4a969f8fc
SHA256c1b705e2d4ca0a5e5d72195100eae87c5c9f7498953fc710ccdfcee5f42ab29b
SHA51267d630f3323463ab9dbd452d06628e013b180c94c53991385ab4d9ad61a290a4ba4bb97a4da86838503a8af37bc6abdd2b4699580b19bbd6172e1f52b49f5d02
-
C:\Users\Admin\AppData\Local\Temp\7B2jOvb2GDkX.batFilesize
207B
MD5c119f451baef25e6ba172faf397c12ee
SHA1a51cbf0bcf61d744b7c7320b2ab2bd8414f56ae5
SHA256bc3e31878c950cfc010ddf38ea10caa13982ec7f5abec491ab5090c506d2118f
SHA512c9fd0f398d4441a776dd2b39294e1218de68a54147d95e3ab68376d6641fca554f78a1819324e3115daea53b94a1d6287907e0f2a0871743b752a1dceff9ee7e
-
C:\Users\Admin\AppData\Local\Temp\JaOzuj6gdsAB.batFilesize
207B
MD559f903945f6bf6738ddd0ce7f78c4f9a
SHA145179e313485d4ba4ce8a180c53d17b4be7250c3
SHA25666f9c5bbca54dd7d0871a0e41e1d2d6166edb6652a57ab7330edd4036d7ada3b
SHA51255c3a2a21195e42260047e78167e2ec1f03bb51d4dc4735c09527eca5095e08e7f013e9a03742b546b544c0ffe45051c290c5b3a90e0e9977a6f1043f5480e0a
-
C:\Users\Admin\AppData\Local\Temp\LnBszR0CccUs.batFilesize
207B
MD5bf8672a5b1402c1e604fcda4fa4f78df
SHA183c977daa8b364db55b63d4605d7d34aa13def6b
SHA256217d0b2cdf30b9b1162cdc235a2635f7966a12833490642d4d0782e1b28ea9bc
SHA512f1f226cdfd5648670eddcda3bdda8c305b6fe813792fe28ba3e9a22a7c820b31de2d8ccaf854a036bb1b1b2eefbb49c81ab5b9e4c7876da4e30bc5ff0b9ce121
-
C:\Users\Admin\AppData\Local\Temp\PsUaVSKOMswV.batFilesize
207B
MD5601d15851805267dfe3e316fd45e886f
SHA1d8be1e5e29b50bfe7a3d0a7b3899c184e999cdd3
SHA2567f5983efb062bbc9892b79c82b53b299d90b79165ce43757721b8d0212ab144c
SHA51247e357bd6a0a36f51ce2ffa31e6ba7ba147368b8f356387751c9bdb005af1672dd4db91fbe1af3f67c4bf3b36bdf4c562eb025b3edb85db5f9f8e9adb1869c74
-
C:\Users\Admin\AppData\Local\Temp\Qzmq2np4XteV.batFilesize
207B
MD5b0fd3d86cdf5d7587f61e6f849d72c45
SHA1995188fc113141a0a4b3f829554fa5b5205c851a
SHA256df1e64f527dfbea81c1d84bffc2b46852bd1d16d2bed019d5d47552cc2d2503f
SHA512294f3cdea29b0960ca49b727a30937dea8662df82fc596af2497b580d5712e7131a60c7a7a7b0e4fa27f0b8a1e530e9c0d003978282d8e9370f6c56451380e07
-
C:\Users\Admin\AppData\Local\Temp\YslKJFA6pUDi.batFilesize
207B
MD54ca70d06fc56e8958ac0adce98be5a25
SHA18f170b60ba3ece0e6b4c515aab883162d3bc7b3e
SHA25687bd194f66d3827efbff4989bbe40a7693b6630547df3aec781d14850c1549e5
SHA512876115d8d70bd4068279fdecaf1b0d92826e70e442045bc2b03be0685638105f0feb8736465671dda73b5b16fee35e94dad7a4400f7005036ba689833ad2a23f
-
C:\Users\Admin\AppData\Local\Temp\blCctM76Xi6E.batFilesize
207B
MD5b6aadfacacdde6f99cf4041e01d62e50
SHA1dc753acdcb7b09ca79562ea05b4784d3ab5ebad5
SHA25620563a21bf5d26d4865b10f386539aadc0349fe45501abc8f06dd7fef365cb98
SHA512e9c7b70d4a48e3852f30f7c508b70a66eb00bfee694beb0ba45230880d10c09212b10b9f4f093987155e15f0f566899885d639085835617cfa4a26d7e3f78f30
-
C:\Users\Admin\AppData\Local\Temp\eMUGLU4lInqz.batFilesize
207B
MD580d13a5c33019e2adf122a4b19ee3bc1
SHA1ce5c1d4c638549ba9bb86e9b6dceba0d11bc90fc
SHA256cc6e3240d9588ae521817e710591b916dd58bc2c8a9d375c1351f87f4165eaaf
SHA51231923b32f14d1996d93005fd0bb4eea20964b9eb0933c451bf8f1a61285cc57a44195250eacbbb93fc7716e3c4d43669e30096dd1b461bc76a19f26518dc2d86
-
C:\Users\Admin\AppData\Local\Temp\eqVKPNRIHzYr.batFilesize
207B
MD51fbd4fa3a3f1107bb296a114062c6874
SHA1c43e01f00b7659e369333aa579c9d22c46da3934
SHA256aa0c4a6ad02c29644ce9dda263a5fdba5a177ded16dc46ab8111272168ef0953
SHA5124886dae776b37f09348f91d2f197a72e5849dcb9ddd24753c63420f02eece6b634f006ffcef5f0fc2cc8a239e13b3ee7a4ff933fd4d49700da26d4f0d4afd0a0
-
C:\Users\Admin\AppData\Local\Temp\rlrk6Nv5Olc0.batFilesize
207B
MD59aa030a594e9471473a7d827a689adb3
SHA1378d63e34175630ec4864724bc7fd62f19c0cfcb
SHA256cf7db04791fdecad64a1789a896ee91f72b1cdf053d6c9030ede07805aa5555e
SHA5123135276391b0421314c29968ed12ff6f0c10a0e2f5fa2e18b0457f31a62840680e5393169b0c919ff0e65e1ec7ab7deefaec0e627aa746393042a090f4f1123b
-
C:\Users\Admin\AppData\Local\Temp\sgWRx7O8697g.batFilesize
207B
MD5328b76688f2ab18a93b126ac8627947a
SHA1f407cd1710104d37538f5c6d5c745d5559a99b5e
SHA256fed0a5834a93fbd7e857a9114e68f6ec51234eab238affe29018928be2931801
SHA512af1819b57c4a48f7b01fab85e9b83fde0324f88c1b77e56fca5be1494b838297500f5c297c6df68d028fcb8434ec8c90876083575a022edd3344b574708b99fe
-
C:\Users\Admin\AppData\Local\Temp\tZMyDdjLgfHp.batFilesize
207B
MD598f7cec0ae736cdf36586fa8c1cbd91b
SHA19381fd5011769b2f7c726de000c67dbcaca749a0
SHA25657efc5f19ab9c6e032a9629896784de0f80a006785e4d8ba4581b4a87f9ef8eb
SHA5122a87c4e6956d916a113bcdd7552be2eda9b128011aa40f44cab1d9fc305289e7289d2d9399478edc1b357be8fa14aa05ae09f6067fb7017952d760077a7a0fd7
-
C:\Users\Admin\AppData\Local\Temp\vGG51Wi2HAPm.batFilesize
207B
MD5c315a63d1e5a2377b1d9428eba107279
SHA10b494ec211ce7803ab79c3c5af59ab4c2273e086
SHA2561f7377c91fcbfaaf67560715f4fbb5853e4f45f2369ad756c181f81d70ca4c6e
SHA512665931e044996d92b0ffff3e2b3ce55d5823789c7a7bf2a1e3736ae0bafe3860ea3a4f113f9411d0c65042ad1e9b75256b1ed6e25d1acc2af2ac9795cf5cf8f2
-
C:\Users\Admin\AppData\Local\Temp\z2nzMXhVrdAa.batFilesize
207B
MD5ac9997304df78fe2a3504aec6be28cd1
SHA12cdc68b0a1a9acb9244d9e9b45987a62087b72de
SHA25621966280745c029c828f0df0484e25d9e204d9fb44605b8b3533069632c5c494
SHA5123e031e9408b97bea5f2d03a389a3bd336e8e2d387760525c4e25905c525208b516999b592c4282b68a9c92b4c682616eaadf9629c5894c9d4599da06e4c28cc5
-
C:\Users\Admin\AppData\Roaming\Logs\06-15-2024Filesize
224B
MD57d267891675ba33661067453595c76c7
SHA1a9cfdcf8f3409622c880f913b799b420e510573e
SHA256638b5c16d407b3be26e534791d9707ea3314433a4b1a4753f7626c45ef9d82f7
SHA51272b9177777605e86bc9afdf54cb57ccf3867960e8efdbe350fdce6049871a11b06e0585d39e9a1375e094542b595f0db60708c6bd510f26bee1f17fd7aba4575
-
C:\Users\Admin\AppData\Roaming\Logs\06-15-2024Filesize
224B
MD5a83f4da8419c1082b338d2182a92bf2b
SHA1958f439aea190ec539eaa5b51c4d0f4d4c747259
SHA256c0355425f0da6554251890161501133348dd167e55b8f7d49fc9c4d3e5cbd4a5
SHA51204578f56a5e3410ddd9726c20ea8a081a9a35624748cf9e6f06613c43258589d064517c1f1cfa1cb1cc7139ed40a0072a08865ad44ded070ba965050ba21a93d
-
C:\Users\Admin\AppData\Roaming\Logs\06-15-2024Filesize
224B
MD589362c79caa169e2b1dc16936efcdea3
SHA1225d871be3a42c60b3ca8cf8cb0104524db4b0ba
SHA256e3e43d900b46baf187bbd94517a34246f23dc8a5432b92dfd68e407d4e0d5595
SHA51202b8b74c4900530eda326e556f1a6a8f35eeb6f232e5ba12a593e3b30bf360764d5d78e5d70164e5956b2a72cf01d6d8729052b4b587d4f0b5970c7167d6fc7c
-
C:\Users\Admin\AppData\Roaming\Logs\06-15-2024Filesize
224B
MD50e9729c0f2597b7c5550a4990cba31d9
SHA104594143ddcd73055a926e8c8812209f585a2c7f
SHA256a830880a494e581dde2af758deb49a405b21d50394607267ecd9394de985edc7
SHA5129f4dbba123d266bfbfa9656edb8723faa3bb832e6e6191dfe69423308a1cd34dcdc600f68f0e90b8c4b09498402e46b50718531eb96e6a72cceb399a212448e3
-
C:\Users\Admin\AppData\Roaming\Logs\06-15-2024MD5
d41d8cd98f00b204e9800998ecf8427e
SHA1da39a3ee5e6b4b0d3255bfef95601890afd80709
SHA256e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855
SHA512cf83e1357eefb8bdf1542850d66d8007d620e4050b5715dc83f4a921d36ce9ce47d0d13c5d85f2b0ff8318d2877eec2f63b931bd47417a81a538327af927da3e
-
C:\Users\Admin\AppData\Roaming\Logs\06-15-2024Filesize
224B
MD5470b3230ae533b755ea1fb9ac37fa047
SHA13c645065dc9cfcc35fdefd20f7b152a128eeab38
SHA256e0fe021d3620b71dd8791a4fff3cccdce6a29e9661451b68b35ebceccbec52c7
SHA512d81ded538069f9701a9dbc9cd497c6c6a3f4d41921a1c2408c728a1ee34e7951bcac3d4a7a875bc4056a7b3725fb3b54ad1bfed00c482a23defc3112c01fbdbf
-
C:\Users\Admin\AppData\Roaming\Logs\06-15-2024Filesize
224B
MD56738b0c960c7ad8c6b2f5756caabce9e
SHA1c6364f3d944db132209d08eaae8c7cdc198a703b
SHA256cc32c992ce4d7b7864eabfb1e72d99703ac1790938726783cdef562e3ba7068b
SHA512606ff03690b954dc456c1d450f70eb722f50cb49b10c4c66e640a395effad2d98b2e630e75b2a7534a2d404b79b825a279f8133ea2391ca3bdedd8a45e28b1f1
-
C:\Users\Admin\AppData\Roaming\Logs\06-15-2024Filesize
224B
MD5ea3d4b298a36befba19504dea4d44211
SHA1030c312d7afa348be7e3be5af705724301748be6
SHA256a5d120cf205a84a1cdb4bf38e534a9376ce8a3e2b61732a4ecea05a57240107e
SHA512e6e0d8e6c751ada704affa5a8fcc9c1f1f963ee3f4399dd2e2af21f9b8f5a2f32930a90cc07b0a5ef26b199a2289c8c0e7812a8a77e36b82bd51f72ba3239ede
-
C:\Users\Admin\AppData\Roaming\SubDir\Client.exeFilesize
409KB
MD5b70fdac25a99501e3cae11f1b775249e
SHA13c59226479bfdcd1b2927bcfb1a7516d4cb8dd71
SHA25651ff3eb450a786c1aaa75ff889f2fd256412a7b75d04277fdf9fcccc20e57246
SHA51243f0d5d6e5f0d5febba537c109ffdbc250bbb6e9725e635a43ec975b0353048eaeee50b6e9274cd5e072ea6b0cea32439bd37408b2528832f467f2075f74ca44
-
memory/640-0-0x00000000750BE000-0x00000000750BF000-memory.dmpFilesize
4KB
-
memory/640-7-0x00000000750BE000-0x00000000750BF000-memory.dmpFilesize
4KB
-
memory/640-1-0x0000000000EE0000-0x0000000000F4C000-memory.dmpFilesize
432KB
-
memory/640-2-0x0000000005FC0000-0x0000000006564000-memory.dmpFilesize
5.6MB
-
memory/640-8-0x00000000750B0000-0x0000000075860000-memory.dmpFilesize
7.7MB
-
memory/640-3-0x0000000005950000-0x00000000059E2000-memory.dmpFilesize
584KB
-
memory/640-15-0x00000000750B0000-0x0000000075860000-memory.dmpFilesize
7.7MB
-
memory/640-6-0x0000000006670000-0x0000000006682000-memory.dmpFilesize
72KB
-
memory/640-4-0x00000000750B0000-0x0000000075860000-memory.dmpFilesize
7.7MB
-
memory/640-5-0x0000000005A10000-0x0000000005A76000-memory.dmpFilesize
408KB
-
memory/2848-16-0x00000000750B0000-0x0000000075860000-memory.dmpFilesize
7.7MB
-
memory/2848-19-0x00000000068E0000-0x00000000068EA000-memory.dmpFilesize
40KB
-
memory/2848-24-0x00000000750B0000-0x0000000075860000-memory.dmpFilesize
7.7MB
-
memory/2848-17-0x00000000750B0000-0x0000000075860000-memory.dmpFilesize
7.7MB