Overview
overview
10Static
static
10uni/Uni - ...py.exe
windows7-x64
10uni/Uni - ...py.exe
windows10-2004-x64
10uni/Uni - ...py.exe
windows7-x64
10uni/Uni - ...py.exe
windows10-2004-x64
10uni/Uni - ...py.exe
windows7-x64
10uni/Uni - ...py.exe
windows10-2004-x64
10uni/Uni - ...py.exe
windows7-x64
10uni/Uni - ...py.exe
windows10-2004-x64
10uni/Uni - ...py.exe
windows7-x64
10uni/Uni - ...py.exe
windows10-2004-x64
10uni/Uni - ...py.exe
windows7-x64
10uni/Uni - ...py.exe
windows10-2004-x64
10uni/Uni - ...py.exe
windows7-x64
10uni/Uni - ...py.exe
windows10-2004-x64
10uni/Uni - ...py.exe
windows7-x64
10uni/Uni - ...py.exe
windows10-2004-x64
10uni/Uni - ...py.exe
windows7-x64
10uni/Uni - ...py.exe
windows10-2004-x64
10uni/Uni - ...py.exe
windows7-x64
10uni/Uni - ...py.exe
windows10-2004-x64
10uni/Uni - ...py.exe
windows7-x64
10uni/Uni - ...py.exe
windows10-2004-x64
10uni/Uni - ...py.exe
windows7-x64
10uni/Uni - ...py.exe
windows10-2004-x64
10uni/Uni - ...py.exe
windows7-x64
10uni/Uni - ...py.exe
windows10-2004-x64
10uni/Uni - ...py.exe
windows7-x64
10uni/Uni - ...py.exe
windows10-2004-x64
10uni/Uni - ...py.exe
windows7-x64
10uni/Uni - ...py.exe
windows10-2004-x64
10uni/Uni - ...py.exe
windows7-x64
10uni/Uni - ...py.exe
windows10-2004-x64
10Analysis
-
max time kernel
295s -
max time network
301s -
platform
windows10-2004_x64 -
resource
win10v2004-20240508-en -
resource tags
arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system -
submitted
15-06-2024 07:29
Behavioral task
behavioral1
Sample
uni/Uni - Copy (10) - Copy - Copy - Copy.exe
Resource
win7-20240611-en
Behavioral task
behavioral2
Sample
uni/Uni - Copy (10) - Copy - Copy - Copy.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral3
Sample
uni/Uni - Copy (10) - Copy - Copy.exe
Resource
win7-20240221-en
Behavioral task
behavioral4
Sample
uni/Uni - Copy (10) - Copy - Copy.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral5
Sample
uni/Uni - Copy (10) - Copy.exe
Resource
win7-20240220-en
Behavioral task
behavioral6
Sample
uni/Uni - Copy (10) - Copy.exe
Resource
win10v2004-20240611-en
Behavioral task
behavioral7
Sample
uni/Uni - Copy (11) - Copy - Copy - Copy.exe
Resource
win7-20240611-en
Behavioral task
behavioral8
Sample
uni/Uni - Copy (11) - Copy - Copy - Copy.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral9
Sample
uni/Uni - Copy (11) - Copy - Copy.exe
Resource
win7-20240221-en
Behavioral task
behavioral10
Sample
uni/Uni - Copy (11) - Copy - Copy.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral11
Sample
uni/Uni - Copy (11) - Copy.exe
Resource
win7-20240611-en
Behavioral task
behavioral12
Sample
uni/Uni - Copy (11) - Copy.exe
Resource
win10v2004-20240611-en
Behavioral task
behavioral13
Sample
uni/Uni - Copy (12) - Copy - Copy - Copy.exe
Resource
win7-20240220-en
Behavioral task
behavioral14
Sample
uni/Uni - Copy (12) - Copy - Copy - Copy.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral15
Sample
uni/Uni - Copy (12) - Copy - Copy.exe
Resource
win7-20231129-en
Behavioral task
behavioral16
Sample
uni/Uni - Copy (12) - Copy - Copy.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral17
Sample
uni/Uni - Copy (12) - Copy.exe
Resource
win7-20240611-en
Behavioral task
behavioral18
Sample
uni/Uni - Copy (12) - Copy.exe
Resource
win10v2004-20240611-en
Behavioral task
behavioral19
Sample
uni/Uni - Copy (13) - Copy - Copy - Copy.exe
Resource
win7-20240508-en
Behavioral task
behavioral20
Sample
uni/Uni - Copy (13) - Copy - Copy - Copy.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral21
Sample
uni/Uni - Copy (13) - Copy - Copy.exe
Resource
win7-20240221-en
Behavioral task
behavioral22
Sample
uni/Uni - Copy (13) - Copy - Copy.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral23
Sample
uni/Uni - Copy (13) - Copy.exe
Resource
win7-20240221-en
Behavioral task
behavioral24
Sample
uni/Uni - Copy (13) - Copy.exe
Resource
win10v2004-20240226-en
Behavioral task
behavioral25
Sample
uni/Uni - Copy (14) - Copy - Copy - Copy.exe
Resource
win7-20240611-en
Behavioral task
behavioral26
Sample
uni/Uni - Copy (14) - Copy - Copy - Copy.exe
Resource
win10v2004-20240611-en
Behavioral task
behavioral27
Sample
uni/Uni - Copy (14) - Copy - Copy.exe
Resource
win7-20240508-en
Behavioral task
behavioral28
Sample
uni/Uni - Copy (14) - Copy - Copy.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral29
Sample
uni/Uni - Copy (14) - Copy.exe
Resource
win7-20240508-en
Behavioral task
behavioral30
Sample
uni/Uni - Copy (14) - Copy.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral31
Sample
uni/Uni - Copy (15) - Copy - Copy - Copy.exe
Resource
win7-20231129-en
General
-
Target
uni/Uni - Copy (12) - Copy - Copy.exe
-
Size
409KB
-
MD5
b70fdac25a99501e3cae11f1b775249e
-
SHA1
3c59226479bfdcd1b2927bcfb1a7516d4cb8dd71
-
SHA256
51ff3eb450a786c1aaa75ff889f2fd256412a7b75d04277fdf9fcccc20e57246
-
SHA512
43f0d5d6e5f0d5febba537c109ffdbc250bbb6e9725e635a43ec975b0353048eaeee50b6e9274cd5e072ea6b0cea32439bd37408b2528832f467f2075f74ca44
-
SSDEEP
12288:gpbJjGut6AoE3hVVdFaC/eZPTMTDlpgfJCKuMsVs:oVaurMLcDlpRKai
Malware Config
Extracted
quasar
3.1.5
SeroXen
panel-slave.gl.at.ply.gg:57059
panel-slave.gl.at.ply.gg:27892
$Sxr-rpL8EItHN3pqIQQVy2
-
encryption_key
Lme7VBS3l58VwLM69PNM
-
install_name
Client.exe
-
log_directory
Logs
-
reconnect_delay
3000
-
startup_key
SeroXen
-
subdirectory
SubDir
Signatures
-
Quasar payload 2 IoCs
Processes:
resource yara_rule behavioral16/memory/1924-1-0x0000000000EB0000-0x0000000000F1C000-memory.dmp family_quasar C:\Users\Admin\AppData\Roaming\SubDir\Client.exe family_quasar -
Checks computer location settings 2 TTPs 15 IoCs
Looks up country code configured in the registry, likely geofence.
Processes:
Client.exeClient.exeClient.exeClient.exeClient.exeClient.exeClient.exeClient.exeClient.exeClient.exeClient.exeClient.exeClient.exeClient.exeClient.exedescription ioc process Key value queried \REGISTRY\USER\S-1-5-21-1337824034-2731376981-3755436523-1000\Control Panel\International\Geo\Nation Client.exe Key value queried \REGISTRY\USER\S-1-5-21-1337824034-2731376981-3755436523-1000\Control Panel\International\Geo\Nation Client.exe Key value queried \REGISTRY\USER\S-1-5-21-1337824034-2731376981-3755436523-1000\Control Panel\International\Geo\Nation Client.exe Key value queried \REGISTRY\USER\S-1-5-21-1337824034-2731376981-3755436523-1000\Control Panel\International\Geo\Nation Client.exe Key value queried \REGISTRY\USER\S-1-5-21-1337824034-2731376981-3755436523-1000\Control Panel\International\Geo\Nation Client.exe Key value queried \REGISTRY\USER\S-1-5-21-1337824034-2731376981-3755436523-1000\Control Panel\International\Geo\Nation Client.exe Key value queried \REGISTRY\USER\S-1-5-21-1337824034-2731376981-3755436523-1000\Control Panel\International\Geo\Nation Client.exe Key value queried \REGISTRY\USER\S-1-5-21-1337824034-2731376981-3755436523-1000\Control Panel\International\Geo\Nation Client.exe Key value queried \REGISTRY\USER\S-1-5-21-1337824034-2731376981-3755436523-1000\Control Panel\International\Geo\Nation Client.exe Key value queried \REGISTRY\USER\S-1-5-21-1337824034-2731376981-3755436523-1000\Control Panel\International\Geo\Nation Client.exe Key value queried \REGISTRY\USER\S-1-5-21-1337824034-2731376981-3755436523-1000\Control Panel\International\Geo\Nation Client.exe Key value queried \REGISTRY\USER\S-1-5-21-1337824034-2731376981-3755436523-1000\Control Panel\International\Geo\Nation Client.exe Key value queried \REGISTRY\USER\S-1-5-21-1337824034-2731376981-3755436523-1000\Control Panel\International\Geo\Nation Client.exe Key value queried \REGISTRY\USER\S-1-5-21-1337824034-2731376981-3755436523-1000\Control Panel\International\Geo\Nation Client.exe Key value queried \REGISTRY\USER\S-1-5-21-1337824034-2731376981-3755436523-1000\Control Panel\International\Geo\Nation Client.exe -
Executes dropped EXE 16 IoCs
Processes:
Client.exeClient.exeClient.exeClient.exeClient.exeClient.exeClient.exeClient.exeClient.exeClient.exeClient.exeClient.exeClient.exeClient.exeClient.exeClient.exepid process 4944 Client.exe 4992 Client.exe 688 Client.exe 1644 Client.exe 2364 Client.exe 4088 Client.exe 1028 Client.exe 872 Client.exe 2432 Client.exe 1512 Client.exe 2408 Client.exe 3836 Client.exe 1640 Client.exe 972 Client.exe 4640 Client.exe 4496 Client.exe -
Looks up external IP address via web service 13 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
Processes:
flow ioc 25 ip-api.com 36 ip-api.com 15 ip-api.com 17 ip-api.com 22 ip-api.com 13 ip-api.com 9 api.ipify.org 29 ip-api.com 31 ip-api.com 34 ip-api.com 2 ip-api.com 19 ip-api.com 27 ip-api.com -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Program crash 15 IoCs
Processes:
WerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exepid pid_target process target process 632 4944 WerFault.exe Client.exe 1760 4992 WerFault.exe Client.exe 4372 688 WerFault.exe Client.exe 5012 1644 WerFault.exe Client.exe 512 2364 WerFault.exe Client.exe 5080 4088 WerFault.exe Client.exe 4940 1028 WerFault.exe Client.exe 4784 872 WerFault.exe Client.exe 3256 2432 WerFault.exe Client.exe 1232 1512 WerFault.exe Client.exe 4572 2408 WerFault.exe Client.exe 768 3836 WerFault.exe Client.exe 5104 1640 WerFault.exe Client.exe 1940 972 WerFault.exe Client.exe 1792 4640 WerFault.exe Client.exe -
Creates scheduled task(s) 1 TTPs 17 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
Processes:
SCHTASKS.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exepid process 3780 SCHTASKS.exe 1080 schtasks.exe 2892 schtasks.exe 2312 schtasks.exe 4764 schtasks.exe 3324 schtasks.exe 2244 schtasks.exe 2432 schtasks.exe 5072 schtasks.exe 964 schtasks.exe 3584 schtasks.exe 1384 schtasks.exe 2220 schtasks.exe 4940 schtasks.exe 4556 schtasks.exe 3616 schtasks.exe 2096 schtasks.exe -
Runs ping.exe 1 TTPs 15 IoCs
Processes:
PING.EXEPING.EXEPING.EXEPING.EXEPING.EXEPING.EXEPING.EXEPING.EXEPING.EXEPING.EXEPING.EXEPING.EXEPING.EXEPING.EXEPING.EXEpid process 4260 PING.EXE 1644 PING.EXE 584 PING.EXE 1236 PING.EXE 4492 PING.EXE 4276 PING.EXE 4948 PING.EXE 5068 PING.EXE 4920 PING.EXE 3880 PING.EXE 4560 PING.EXE 2244 PING.EXE 5092 PING.EXE 1120 PING.EXE 5068 PING.EXE -
Suspicious use of AdjustPrivilegeToken 17 IoCs
Processes:
Uni - Copy (12) - Copy - Copy.exeClient.exeClient.exeClient.exeClient.exeClient.exeClient.exeClient.exeClient.exeClient.exeClient.exeClient.exeClient.exeClient.exeClient.exeClient.exeClient.exedescription pid process Token: SeDebugPrivilege 1924 Uni - Copy (12) - Copy - Copy.exe Token: SeDebugPrivilege 4944 Client.exe Token: SeDebugPrivilege 4992 Client.exe Token: SeDebugPrivilege 688 Client.exe Token: SeDebugPrivilege 1644 Client.exe Token: SeDebugPrivilege 2364 Client.exe Token: SeDebugPrivilege 4088 Client.exe Token: SeDebugPrivilege 1028 Client.exe Token: SeDebugPrivilege 872 Client.exe Token: SeDebugPrivilege 2432 Client.exe Token: SeDebugPrivilege 1512 Client.exe Token: SeDebugPrivilege 2408 Client.exe Token: SeDebugPrivilege 3836 Client.exe Token: SeDebugPrivilege 1640 Client.exe Token: SeDebugPrivilege 972 Client.exe Token: SeDebugPrivilege 4640 Client.exe Token: SeDebugPrivilege 4496 Client.exe -
Suspicious use of SetWindowsHookEx 15 IoCs
Processes:
Client.exeClient.exeClient.exeClient.exeClient.exeClient.exeClient.exeClient.exeClient.exeClient.exeClient.exeClient.exeClient.exeClient.exeClient.exepid process 4944 Client.exe 4992 Client.exe 688 Client.exe 1644 Client.exe 2364 Client.exe 4088 Client.exe 1028 Client.exe 872 Client.exe 2432 Client.exe 1512 Client.exe 2408 Client.exe 3836 Client.exe 1640 Client.exe 972 Client.exe 4640 Client.exe -
Suspicious use of WriteProcessMemory 64 IoCs
Processes:
Uni - Copy (12) - Copy - Copy.exeClient.execmd.exeClient.execmd.exeClient.execmd.exeClient.execmd.exedescription pid process target process PID 1924 wrote to memory of 3616 1924 Uni - Copy (12) - Copy - Copy.exe schtasks.exe PID 1924 wrote to memory of 3616 1924 Uni - Copy (12) - Copy - Copy.exe schtasks.exe PID 1924 wrote to memory of 3616 1924 Uni - Copy (12) - Copy - Copy.exe schtasks.exe PID 1924 wrote to memory of 4944 1924 Uni - Copy (12) - Copy - Copy.exe Client.exe PID 1924 wrote to memory of 4944 1924 Uni - Copy (12) - Copy - Copy.exe Client.exe PID 1924 wrote to memory of 4944 1924 Uni - Copy (12) - Copy - Copy.exe Client.exe PID 1924 wrote to memory of 3780 1924 Uni - Copy (12) - Copy - Copy.exe SCHTASKS.exe PID 1924 wrote to memory of 3780 1924 Uni - Copy (12) - Copy - Copy.exe SCHTASKS.exe PID 1924 wrote to memory of 3780 1924 Uni - Copy (12) - Copy - Copy.exe SCHTASKS.exe PID 4944 wrote to memory of 1080 4944 Client.exe schtasks.exe PID 4944 wrote to memory of 1080 4944 Client.exe schtasks.exe PID 4944 wrote to memory of 1080 4944 Client.exe schtasks.exe PID 4944 wrote to memory of 3012 4944 Client.exe cmd.exe PID 4944 wrote to memory of 3012 4944 Client.exe cmd.exe PID 4944 wrote to memory of 3012 4944 Client.exe cmd.exe PID 3012 wrote to memory of 3052 3012 cmd.exe chcp.com PID 3012 wrote to memory of 3052 3012 cmd.exe chcp.com PID 3012 wrote to memory of 3052 3012 cmd.exe chcp.com PID 3012 wrote to memory of 4920 3012 cmd.exe PING.EXE PID 3012 wrote to memory of 4920 3012 cmd.exe PING.EXE PID 3012 wrote to memory of 4920 3012 cmd.exe PING.EXE PID 3012 wrote to memory of 4992 3012 cmd.exe Client.exe PID 3012 wrote to memory of 4992 3012 cmd.exe Client.exe PID 3012 wrote to memory of 4992 3012 cmd.exe Client.exe PID 4992 wrote to memory of 2244 4992 Client.exe schtasks.exe PID 4992 wrote to memory of 2244 4992 Client.exe schtasks.exe PID 4992 wrote to memory of 2244 4992 Client.exe schtasks.exe PID 4992 wrote to memory of 4724 4992 Client.exe cmd.exe PID 4992 wrote to memory of 4724 4992 Client.exe cmd.exe PID 4992 wrote to memory of 4724 4992 Client.exe cmd.exe PID 4724 wrote to memory of 2844 4724 cmd.exe chcp.com PID 4724 wrote to memory of 2844 4724 cmd.exe chcp.com PID 4724 wrote to memory of 2844 4724 cmd.exe chcp.com PID 4724 wrote to memory of 3880 4724 cmd.exe PING.EXE PID 4724 wrote to memory of 3880 4724 cmd.exe PING.EXE PID 4724 wrote to memory of 3880 4724 cmd.exe PING.EXE PID 4724 wrote to memory of 688 4724 cmd.exe Client.exe PID 4724 wrote to memory of 688 4724 cmd.exe Client.exe PID 4724 wrote to memory of 688 4724 cmd.exe Client.exe PID 688 wrote to memory of 4940 688 Client.exe schtasks.exe PID 688 wrote to memory of 4940 688 Client.exe schtasks.exe PID 688 wrote to memory of 4940 688 Client.exe schtasks.exe PID 688 wrote to memory of 344 688 Client.exe cmd.exe PID 688 wrote to memory of 344 688 Client.exe cmd.exe PID 688 wrote to memory of 344 688 Client.exe cmd.exe PID 344 wrote to memory of 1816 344 cmd.exe chcp.com PID 344 wrote to memory of 1816 344 cmd.exe chcp.com PID 344 wrote to memory of 1816 344 cmd.exe chcp.com PID 344 wrote to memory of 4560 344 cmd.exe PING.EXE PID 344 wrote to memory of 4560 344 cmd.exe PING.EXE PID 344 wrote to memory of 4560 344 cmd.exe PING.EXE PID 344 wrote to memory of 1644 344 cmd.exe Client.exe PID 344 wrote to memory of 1644 344 cmd.exe Client.exe PID 344 wrote to memory of 1644 344 cmd.exe Client.exe PID 1644 wrote to memory of 2892 1644 Client.exe schtasks.exe PID 1644 wrote to memory of 2892 1644 Client.exe schtasks.exe PID 1644 wrote to memory of 2892 1644 Client.exe schtasks.exe PID 1644 wrote to memory of 1288 1644 Client.exe cmd.exe PID 1644 wrote to memory of 1288 1644 Client.exe cmd.exe PID 1644 wrote to memory of 1288 1644 Client.exe cmd.exe PID 1288 wrote to memory of 3616 1288 cmd.exe chcp.com PID 1288 wrote to memory of 3616 1288 cmd.exe chcp.com PID 1288 wrote to memory of 3616 1288 cmd.exe chcp.com PID 1288 wrote to memory of 4492 1288 cmd.exe PING.EXE
Processes
-
C:\Users\Admin\AppData\Local\Temp\uni\Uni - Copy (12) - Copy - Copy.exe"C:\Users\Admin\AppData\Local\Temp\uni\Uni - Copy (12) - Copy - Copy.exe"1⤵
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\schtasks.exe"schtasks" /create /tn "SeroXen" /sc ONLOGON /tr "C:\Users\Admin\AppData\Local\Temp\uni\Uni - Copy (12) - Copy - Copy.exe" /rl HIGHEST /f2⤵
- Creates scheduled task(s)
-
C:\Users\Admin\AppData\Roaming\SubDir\Client.exe"C:\Users\Admin\AppData\Roaming\SubDir\Client.exe"2⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\schtasks.exe"schtasks" /create /tn "SeroXen" /sc ONLOGON /tr "C:\Users\Admin\AppData\Roaming\SubDir\Client.exe" /rl HIGHEST /f3⤵
- Creates scheduled task(s)
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\7GCofwvtsWku.bat" "3⤵
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\chcp.comchcp 650014⤵
-
C:\Windows\SysWOW64\PING.EXEping -n 10 localhost4⤵
- Runs ping.exe
-
C:\Users\Admin\AppData\Roaming\SubDir\Client.exe"C:\Users\Admin\AppData\Roaming\SubDir\Client.exe"4⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\schtasks.exe"schtasks" /create /tn "SeroXen" /sc ONLOGON /tr "C:\Users\Admin\AppData\Roaming\SubDir\Client.exe" /rl HIGHEST /f5⤵
- Creates scheduled task(s)
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\qG3J3hZSGewW.bat" "5⤵
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\chcp.comchcp 650016⤵
-
C:\Windows\SysWOW64\PING.EXEping -n 10 localhost6⤵
- Runs ping.exe
-
C:\Users\Admin\AppData\Roaming\SubDir\Client.exe"C:\Users\Admin\AppData\Roaming\SubDir\Client.exe"6⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\schtasks.exe"schtasks" /create /tn "SeroXen" /sc ONLOGON /tr "C:\Users\Admin\AppData\Roaming\SubDir\Client.exe" /rl HIGHEST /f7⤵
- Creates scheduled task(s)
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\kNaQQY7YTCzK.bat" "7⤵
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\chcp.comchcp 650018⤵
-
C:\Windows\SysWOW64\PING.EXEping -n 10 localhost8⤵
- Runs ping.exe
-
C:\Users\Admin\AppData\Roaming\SubDir\Client.exe"C:\Users\Admin\AppData\Roaming\SubDir\Client.exe"8⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\schtasks.exe"schtasks" /create /tn "SeroXen" /sc ONLOGON /tr "C:\Users\Admin\AppData\Roaming\SubDir\Client.exe" /rl HIGHEST /f9⤵
- Creates scheduled task(s)
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\TNQvoJl7qKCv.bat" "9⤵
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\chcp.comchcp 6500110⤵
-
C:\Windows\SysWOW64\PING.EXEping -n 10 localhost10⤵
- Runs ping.exe
-
C:\Users\Admin\AppData\Roaming\SubDir\Client.exe"C:\Users\Admin\AppData\Roaming\SubDir\Client.exe"10⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
-
C:\Windows\SysWOW64\schtasks.exe"schtasks" /create /tn "SeroXen" /sc ONLOGON /tr "C:\Users\Admin\AppData\Roaming\SubDir\Client.exe" /rl HIGHEST /f11⤵
- Creates scheduled task(s)
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\z7HOeolfw2Rt.bat" "11⤵
-
C:\Windows\SysWOW64\chcp.comchcp 6500112⤵
-
C:\Windows\SysWOW64\PING.EXEping -n 10 localhost12⤵
- Runs ping.exe
-
C:\Users\Admin\AppData\Roaming\SubDir\Client.exe"C:\Users\Admin\AppData\Roaming\SubDir\Client.exe"12⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
-
C:\Windows\SysWOW64\schtasks.exe"schtasks" /create /tn "SeroXen" /sc ONLOGON /tr "C:\Users\Admin\AppData\Roaming\SubDir\Client.exe" /rl HIGHEST /f13⤵
- Creates scheduled task(s)
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\ritXWk3H12yZ.bat" "13⤵
-
C:\Windows\SysWOW64\chcp.comchcp 6500114⤵
-
C:\Windows\SysWOW64\PING.EXEping -n 10 localhost14⤵
- Runs ping.exe
-
C:\Users\Admin\AppData\Roaming\SubDir\Client.exe"C:\Users\Admin\AppData\Roaming\SubDir\Client.exe"14⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
-
C:\Windows\SysWOW64\schtasks.exe"schtasks" /create /tn "SeroXen" /sc ONLOGON /tr "C:\Users\Admin\AppData\Roaming\SubDir\Client.exe" /rl HIGHEST /f15⤵
- Creates scheduled task(s)
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\BWdeAcHJIhsX.bat" "15⤵
-
C:\Windows\SysWOW64\chcp.comchcp 6500116⤵
-
C:\Windows\SysWOW64\PING.EXEping -n 10 localhost16⤵
- Runs ping.exe
-
C:\Users\Admin\AppData\Roaming\SubDir\Client.exe"C:\Users\Admin\AppData\Roaming\SubDir\Client.exe"16⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
-
C:\Windows\SysWOW64\schtasks.exe"schtasks" /create /tn "SeroXen" /sc ONLOGON /tr "C:\Users\Admin\AppData\Roaming\SubDir\Client.exe" /rl HIGHEST /f17⤵
- Creates scheduled task(s)
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\dPFe1pEZtzvo.bat" "17⤵
-
C:\Windows\SysWOW64\chcp.comchcp 6500118⤵
-
C:\Windows\SysWOW64\PING.EXEping -n 10 localhost18⤵
- Runs ping.exe
-
C:\Users\Admin\AppData\Roaming\SubDir\Client.exe"C:\Users\Admin\AppData\Roaming\SubDir\Client.exe"18⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
-
C:\Windows\SysWOW64\schtasks.exe"schtasks" /create /tn "SeroXen" /sc ONLOGON /tr "C:\Users\Admin\AppData\Roaming\SubDir\Client.exe" /rl HIGHEST /f19⤵
- Creates scheduled task(s)
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\3nhp6qZloJ4A.bat" "19⤵
-
C:\Windows\SysWOW64\chcp.comchcp 6500120⤵
-
C:\Windows\SysWOW64\PING.EXEping -n 10 localhost20⤵
- Runs ping.exe
-
C:\Users\Admin\AppData\Roaming\SubDir\Client.exe"C:\Users\Admin\AppData\Roaming\SubDir\Client.exe"20⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
-
C:\Windows\SysWOW64\schtasks.exe"schtasks" /create /tn "SeroXen" /sc ONLOGON /tr "C:\Users\Admin\AppData\Roaming\SubDir\Client.exe" /rl HIGHEST /f21⤵
- Creates scheduled task(s)
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\XCykyb4GERvQ.bat" "21⤵
-
C:\Windows\SysWOW64\chcp.comchcp 6500122⤵
-
C:\Windows\SysWOW64\PING.EXEping -n 10 localhost22⤵
- Runs ping.exe
-
C:\Users\Admin\AppData\Roaming\SubDir\Client.exe"C:\Users\Admin\AppData\Roaming\SubDir\Client.exe"22⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
-
C:\Windows\SysWOW64\schtasks.exe"schtasks" /create /tn "SeroXen" /sc ONLOGON /tr "C:\Users\Admin\AppData\Roaming\SubDir\Client.exe" /rl HIGHEST /f23⤵
- Creates scheduled task(s)
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\r0ircSIIV6pO.bat" "23⤵
-
C:\Windows\SysWOW64\chcp.comchcp 6500124⤵
-
C:\Windows\SysWOW64\PING.EXEping -n 10 localhost24⤵
- Runs ping.exe
-
C:\Users\Admin\AppData\Roaming\SubDir\Client.exe"C:\Users\Admin\AppData\Roaming\SubDir\Client.exe"24⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
-
C:\Windows\SysWOW64\schtasks.exe"schtasks" /create /tn "SeroXen" /sc ONLOGON /tr "C:\Users\Admin\AppData\Roaming\SubDir\Client.exe" /rl HIGHEST /f25⤵
- Creates scheduled task(s)
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\2Hhgvdac3CRe.bat" "25⤵
-
C:\Windows\SysWOW64\chcp.comchcp 6500126⤵
-
C:\Windows\SysWOW64\PING.EXEping -n 10 localhost26⤵
- Runs ping.exe
-
C:\Users\Admin\AppData\Roaming\SubDir\Client.exe"C:\Users\Admin\AppData\Roaming\SubDir\Client.exe"26⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
-
C:\Windows\SysWOW64\schtasks.exe"schtasks" /create /tn "SeroXen" /sc ONLOGON /tr "C:\Users\Admin\AppData\Roaming\SubDir\Client.exe" /rl HIGHEST /f27⤵
- Creates scheduled task(s)
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\floT0joMnxRC.bat" "27⤵
-
C:\Windows\SysWOW64\chcp.comchcp 6500128⤵
-
C:\Windows\SysWOW64\PING.EXEping -n 10 localhost28⤵
- Runs ping.exe
-
C:\Users\Admin\AppData\Roaming\SubDir\Client.exe"C:\Users\Admin\AppData\Roaming\SubDir\Client.exe"28⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
-
C:\Windows\SysWOW64\schtasks.exe"schtasks" /create /tn "SeroXen" /sc ONLOGON /tr "C:\Users\Admin\AppData\Roaming\SubDir\Client.exe" /rl HIGHEST /f29⤵
- Creates scheduled task(s)
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\cQEv2zJJ7M2V.bat" "29⤵
-
C:\Windows\SysWOW64\chcp.comchcp 6500130⤵
-
C:\Windows\SysWOW64\PING.EXEping -n 10 localhost30⤵
- Runs ping.exe
-
C:\Users\Admin\AppData\Roaming\SubDir\Client.exe"C:\Users\Admin\AppData\Roaming\SubDir\Client.exe"30⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
-
C:\Windows\SysWOW64\schtasks.exe"schtasks" /create /tn "SeroXen" /sc ONLOGON /tr "C:\Users\Admin\AppData\Roaming\SubDir\Client.exe" /rl HIGHEST /f31⤵
- Creates scheduled task(s)
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\fcMs7psOMpWS.bat" "31⤵
-
C:\Windows\SysWOW64\chcp.comchcp 6500132⤵
-
C:\Windows\SysWOW64\PING.EXEping -n 10 localhost32⤵
- Runs ping.exe
-
C:\Users\Admin\AppData\Roaming\SubDir\Client.exe"C:\Users\Admin\AppData\Roaming\SubDir\Client.exe"32⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4640 -s 109631⤵
- Program crash
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 972 -s 219629⤵
- Program crash
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1640 -s 109227⤵
- Program crash
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3836 -s 166825⤵
- Program crash
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2408 -s 224823⤵
- Program crash
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1512 -s 168821⤵
- Program crash
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2432 -s 167219⤵
- Program crash
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 872 -s 109217⤵
- Program crash
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1028 -s 109215⤵
- Program crash
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4088 -s 109213⤵
- Program crash
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2364 -s 220011⤵
- Program crash
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1644 -s 16369⤵
- Program crash
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 688 -s 16087⤵
- Program crash
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4992 -s 21965⤵
- Program crash
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4944 -s 12003⤵
- Program crash
-
C:\Windows\SysWOW64\SCHTASKS.exe"SCHTASKS.exe" /create /tn "$77Uni - Copy (12) - Copy - Copy.exe" /tr "'C:\Users\Admin\AppData\Local\Temp\uni\Uni - Copy (12) - Copy - Copy.exe'" /sc onlogon /rl HIGHEST2⤵
- Creates scheduled task(s)
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 404 -p 4944 -ip 49441⤵
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 456 -p 4992 -ip 49921⤵
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 464 -p 688 -ip 6881⤵
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 464 -p 1644 -ip 16441⤵
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 508 -p 2364 -ip 23641⤵
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 524 -p 4088 -ip 40881⤵
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 528 -p 1028 -ip 10281⤵
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 384 -p 872 -ip 8721⤵
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 384 -p 2432 -ip 24321⤵
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 540 -p 1512 -ip 15121⤵
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 464 -p 2408 -ip 24081⤵
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 528 -p 3836 -ip 38361⤵
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 528 -p 1640 -ip 16401⤵
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 384 -p 972 -ip 9721⤵
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 524 -p 4640 -ip 46401⤵
Network
MITRE ATT&CK Matrix ATT&CK v13
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Local\Temp\2Hhgvdac3CRe.batFilesize
207B
MD5d944ecec0dc7738c0edb89f528cff59e
SHA1c0c462b53a67d7b6fe276e63644d7604d85c8cf7
SHA2563a1194492ac545bee511930108e8e73c242873443d5448f7e210515b81758bcf
SHA512161a1b77e3749f0d7c24e14ef48f654f18c444548c8c29595334392da165736d38355790766bb5b4f50e1c1b4296cc0c91d7182ef64c202c60ce6646577897ee
-
C:\Users\Admin\AppData\Local\Temp\3nhp6qZloJ4A.batFilesize
207B
MD5187f18774235d8c0c20cd3ba44934797
SHA10986f85c6f1fdc05e439b4125f0d4238c53e2e63
SHA2563e764043b9a09fb5b1b26d5bd2972744a31c10a8ffb237194968edbcc48a97a2
SHA51274f7a440f9d5f13c26d906af995ef90bd210344c31c13b89106057b48d1317df777f5cc31189fe4ab62413f7b9be0b0124974fd5b514149b7ef4ca164d1b1cbf
-
C:\Users\Admin\AppData\Local\Temp\7GCofwvtsWku.batFilesize
207B
MD5dfec0ac1ece1808dcb5fdc7d05bc9bdf
SHA1e051a19cf179c5ef8a8c638f0dc30a5e2ebdf3fb
SHA2564d7209e49fa66dcfe16491dd6ed0572d3313945ca9f16dd8f9d1fdb84459e91c
SHA5127ab9499b056cf13dca8f7ee391379f3ef736f28f9b0cbb8dceebb6ece6565084d96d122bb120c5297ef534e07b40040260e0dfa2882346f42a4a97db0b4e9490
-
C:\Users\Admin\AppData\Local\Temp\BWdeAcHJIhsX.batFilesize
207B
MD5c76220ae32a41fa53f9e0d72d199cde6
SHA1784a27069b13973d511226d66bff53ed34709d84
SHA256db4fc1948a28b6c22cb4b560527ea84b34be0f0a97a3137d591dec47601b3e2d
SHA512b71a126dee581c5d6f0e127cef3812dab6adabadbd3a75e1c484c9a2105eef4a0ab83634f0c7d15ea4e1588d443972faf5acdc7a12d930021fcf2ee28513bc93
-
C:\Users\Admin\AppData\Local\Temp\TNQvoJl7qKCv.batFilesize
207B
MD5d1b685e6acb66e653919dc221f7f4b16
SHA1a6e11300c9069c99456c1de10123a5871673004b
SHA256d705f29b06f067628f6051d8b32fb2f6a183540097140e60b1e38fc961a5ef72
SHA5125bf4e7fb630cf85b0c23e42893ea3b9268819ba6444458915a00e4d5e0632706eeb27dd79dd93c1a2138961c51b7668c4331d993d1a1dc514c9ccf5504ccbb77
-
C:\Users\Admin\AppData\Local\Temp\XCykyb4GERvQ.batFilesize
207B
MD57ca0d3a0614503ec7ab87cadba703d69
SHA1243129516a609f81f703f6b3e3fde06732458b1f
SHA256e5fc0817c2df41f2c6485d453ebd50da08eb6da4db5930837cf2e4d33516e7b4
SHA5123ee959071d063c3918aea00e1cf7403208ea3eadf58d229150f5cb1adef84753575528da88c646e77910a15ec89d414b4e8c04795e603771dc3ff404ee0847bd
-
C:\Users\Admin\AppData\Local\Temp\cQEv2zJJ7M2V.batFilesize
207B
MD5f57f078ed759a9af4738ef9d307dd968
SHA1f756904b4edc698e3ce473bee6a07e5a3a094f0a
SHA256ba23c6a96c3a2274bf2c7eb632704569400d82fed97da2e8a25b7f58099ef2a4
SHA512a8b6d412613d8634ef0fe210db14bb6be60f7d87efc633bb755a24fcbaf3cfcb20004faee1585461fc723d5c320976f3846dd37ed86bf6621a993413639119b4
-
C:\Users\Admin\AppData\Local\Temp\dPFe1pEZtzvo.batFilesize
207B
MD58c2500d32d227758855b203290c214db
SHA18bffc60ac70ca90e5005967a5f4d9a5e6dacd051
SHA256d013b576cc29da716c412a3020eb69ba7eca9676f0115d9a229f2e43e2033c51
SHA512c179d1597b3eb67fc006ba2959ed76d987fd23236c6792f43642427e14d44e414316034c49711d1a7f06d78d4ecdee1a2b47e440dbd5080d976eff20c74a2e74
-
C:\Users\Admin\AppData\Local\Temp\fcMs7psOMpWS.batFilesize
207B
MD53d723b602d36dbc5cabf30148d3b3927
SHA116244daef57b2fad0063f08eec809f60385ebdec
SHA2568dfd2a4f9e7be0e3d076c65342c55034ca7c5acdc7e98acbebfb148154f2cba4
SHA5121a3459aa2a949ac34e513fcf74d601af5b7fda2cf1c142f87888b2b16751d722a5690883c6eb1b6accaf8617165f376aef62418c57540a5e996d52062f1c60ad
-
C:\Users\Admin\AppData\Local\Temp\floT0joMnxRC.batFilesize
207B
MD53b359322ade70be95ee93d5233cc4da4
SHA19a7d19000797f1863828157f88d9e56057805c1c
SHA2562b8111138c0a1d3d23378437697427efaa39087cdb020ce1544acffb1cf7046f
SHA512dec084cd7b91cf468ca136a2017f867b9b64f390da3daa7790bbba9b3b368293af139d60a36d71ae9a6dbda133e3e3bd2af97d093f15bad7f193a85d7fdca556
-
C:\Users\Admin\AppData\Local\Temp\kNaQQY7YTCzK.batFilesize
207B
MD53d03d86bdc99384ab0743ae36141c5c1
SHA137abd84fcff0e5083aeb91c149012a3ce428aba1
SHA2562417652bd6af07225575659512342f4c99b1d12e7f9bb0b4e3793fc939431209
SHA51285fa951f529ba5fa58f8f78d6a45dead7c2c98ab39c5c13eee348bafdc07358ce86b031e69385c7769b395946caef7bf9e0e64d84a365038d369fd3f0206f575
-
C:\Users\Admin\AppData\Local\Temp\qG3J3hZSGewW.batFilesize
207B
MD5dc2d10dcfa11bc064ffb4ce5aa75015f
SHA17c17f89742b0cde18ac0e0cf2ae450e35668cb97
SHA25655ff4bb4504ddaf619a2efddae75234e87942ccaccb090bf0577a747d3634984
SHA512f17cec990e144f92065295b42e446eb69f4672124654f93f7ca53260450712ea4be21c9f86d47acc07f4f06cfcf470835b6c5547024a337c7cd7273000ba9227
-
C:\Users\Admin\AppData\Local\Temp\r0ircSIIV6pO.batFilesize
207B
MD54ace390cb03be6bbc18fc535b779461e
SHA1287c84679c1e7613e305d9fd29cc150587361cd5
SHA25618fd75333773f6c0c9c24e6aadc132ba3aa965a8c774e8d5e4e412e63f564dce
SHA512edd4355fe00375d5e3045024bbf9c4a12a40126321d0be456dc042dfca1459a8485893670d92f0b602f031b99873f597d53dd2d0b22e077e37ec00b46f4c5401
-
C:\Users\Admin\AppData\Local\Temp\ritXWk3H12yZ.batFilesize
207B
MD5013f843bb8b08562f34940cce5b769f3
SHA1dfc8a6dcc562787cf59618749d9cba39e3e77bc4
SHA256191755105482b5931a9b954019e5cfd472a9c67af436d4d38ad363e3908c9ec7
SHA51276949a5de49e974eb7136808b6c449f6435636821e590e1e4978618f7757674b8c79d772e0bf2d927ea25a537a6af768fb5d776f90a050f142f3555a8237a018
-
C:\Users\Admin\AppData\Local\Temp\z7HOeolfw2Rt.batFilesize
207B
MD50567590aea33a728301f29014aa9a633
SHA10638d43fba7743d2269c9e2cf4e3d573f090d977
SHA2568e433cf1f7fb70dee8cd8cb0b062e596bb0b770bec325deb26ae9c528f8f5d9c
SHA51249e14fbfb6faf701764ecfea8aca41ec2ec49559e7a668e8f6a8b6a0bf027d355628c450160a167d30f9b75081a79a42b025584f0ffd688b900f65ab19372101
-
C:\Users\Admin\AppData\Roaming\Logs\06-15-2024Filesize
224B
MD5f441f876b641f662979ee61e06353aec
SHA16f58e92806b7e1b7587d75f8bac41bb8dd29756b
SHA256e9e1812399c3b67063fd0c900f3075562f5e83dafd322d4b2f40a160415d9e20
SHA51285acd71c5c360268b8e3d479db7652bccbd4e4737dd2f077b6787348ed2d3bc0965da00616779116d69e5d97683d98fa8567ff33393a98d65c6faa8454e71b27
-
C:\Users\Admin\AppData\Roaming\Logs\06-15-2024Filesize
224B
MD5b4fa6bc75f439fa020cbaa149f3a086c
SHA139c5e35bbbf8a42372ac203d8f136b7972f2655f
SHA2562e8b1dcd2fcce77508d8232489bbc0afde310177c37d8a4e416ba343c7a8fb8b
SHA5120b8a68f9dbd5de769c6ae0a7932bd23661e1f8641f0528d8f71466d5ee98ada2ab36263bf373d6c64bc1bb275fc48391456dc7761e2b01aebca08a6eb717f9ae
-
C:\Users\Admin\AppData\Roaming\Logs\06-15-2024Filesize
224B
MD55a55355d24091ad683ced0c1825eebaa
SHA15e159d46537ce1818ef3b323f5e8a6d26caaf088
SHA256484e2a9c890fc5e9c9c1f817fd777e5526c6ebded498cc992b7d4a47398479e1
SHA512b586d8adf48525cf41c81c917dac21ddd360f5cb6a9ee54e50aae87ef09cd21dc549a9859e755ec8f8014e16f9fc25113059bedb8be3426ed63b34bf4830673b
-
C:\Users\Admin\AppData\Roaming\Logs\06-15-2024Filesize
224B
MD57e9027e933e4326539614b8e76acd364
SHA18dceab2516270f0d393526fd3dcb52fed22a82a0
SHA256f71e2a3207068ae1d7017025efb834c0462fd0e2fa3b9e982234428c65a72dc8
SHA512fc3ea417284e635b4d7ea2b05cd1acd0e11e3bb6b047fc440a524c184a2f8cce1b1582db67fd66dadde487ee9da1c161ade5351ea5977fa59f30e9ef9f417053
-
C:\Users\Admin\AppData\Roaming\Logs\06-15-2024Filesize
224B
MD55fb0ea6c43acf982f9fc694fb873addd
SHA1caff8af2cc30ff4c702047d09679b2d907a7d56c
SHA25634de238b4102e7fba852f10092ad02bf0aebf83a1445416fed7846637bea6ff3
SHA512acaee88dc8f34b70152448ed09f0c2f7936a2da58344fa85d7270971b18dfa1c11cd2c1d39e9550f501ac57e631968dc6a802bd4c9a604fa40827c219155820d
-
C:\Users\Admin\AppData\Roaming\Logs\06-15-2024MD5
d41d8cd98f00b204e9800998ecf8427e
SHA1da39a3ee5e6b4b0d3255bfef95601890afd80709
SHA256e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855
SHA512cf83e1357eefb8bdf1542850d66d8007d620e4050b5715dc83f4a921d36ce9ce47d0d13c5d85f2b0ff8318d2877eec2f63b931bd47417a81a538327af927da3e
-
C:\Users\Admin\AppData\Roaming\Logs\06-15-2024Filesize
224B
MD51f2df5636bfa24776c47e681b09d9c6b
SHA1c5cfd8ed4aff00f6a980c96b7bc700f77c868baa
SHA2560ce708f309930092b2097376c0f482bcf3b972b18f7f54c60022f819d57ea96a
SHA512f1866836f98cf9f29c0e2f29062612da2b5c8fbf7efee06b80aee083593e3365b8e5424c00fa6d5b369b734990e8bc60ba5c39aa1fd194d5c439896d05e4aef9
-
C:\Users\Admin\AppData\Roaming\Logs\06-15-2024Filesize
224B
MD541eabc78f57712064f3f3fd258e9281c
SHA1bb22cbae4b054c6c26bd775b066f99362b8e7653
SHA25695d7d8445951eec3c5e2ad80f905ea0da430a92569dd79b49a35e5391b11f293
SHA5124c4dd067868606d7017ff1ecbc0be75392416a56ac88a44523f48c8230dfb2b0d9060c0d2090a94eea1711c8eb5467a29b8a76e58a16d3d3ffdcaccaa3cef47e
-
C:\Users\Admin\AppData\Roaming\Logs\06-15-2024Filesize
224B
MD5084768f2bc752c4a575221043b0d02b4
SHA13f6f34ca1f5e3b77f191c4d45f0d7d8ca9fd299b
SHA256220273e49a2d850d08269df66d5c6f3a809b46051368af68d353ae384000c8e3
SHA51220fa6588fbdd43fe9a147a1f27dd3536c94f1ebbc5b45bc12e31cf5a4d6f9b498cb0e0056581ce2f42856fa869dc80f5e832b076125c6e15bd41559c6aa40a68
-
C:\Users\Admin\AppData\Roaming\SubDir\Client.exeFilesize
409KB
MD5b70fdac25a99501e3cae11f1b775249e
SHA13c59226479bfdcd1b2927bcfb1a7516d4cb8dd71
SHA25651ff3eb450a786c1aaa75ff889f2fd256412a7b75d04277fdf9fcccc20e57246
SHA51243f0d5d6e5f0d5febba537c109ffdbc250bbb6e9725e635a43ec975b0353048eaeee50b6e9274cd5e072ea6b0cea32439bd37408b2528832f467f2075f74ca44
-
memory/1924-5-0x00000000059D0000-0x0000000005A36000-memory.dmpFilesize
408KB
-
memory/1924-4-0x0000000074AF0000-0x00000000752A0000-memory.dmpFilesize
7.7MB
-
memory/1924-16-0x0000000074AF0000-0x00000000752A0000-memory.dmpFilesize
7.7MB
-
memory/1924-1-0x0000000000EB0000-0x0000000000F1C000-memory.dmpFilesize
432KB
-
memory/1924-2-0x0000000005F80000-0x0000000006524000-memory.dmpFilesize
5.6MB
-
memory/1924-3-0x0000000005920000-0x00000000059B2000-memory.dmpFilesize
584KB
-
memory/1924-8-0x0000000074AF0000-0x00000000752A0000-memory.dmpFilesize
7.7MB
-
memory/1924-7-0x0000000074AFE000-0x0000000074AFF000-memory.dmpFilesize
4KB
-
memory/1924-6-0x0000000006650000-0x0000000006662000-memory.dmpFilesize
72KB
-
memory/1924-0-0x0000000074AFE000-0x0000000074AFF000-memory.dmpFilesize
4KB
-
memory/4944-15-0x0000000074AF0000-0x00000000752A0000-memory.dmpFilesize
7.7MB
-
memory/4944-24-0x0000000074AF0000-0x00000000752A0000-memory.dmpFilesize
7.7MB
-
memory/4944-19-0x00000000067B0000-0x00000000067BA000-memory.dmpFilesize
40KB
-
memory/4944-17-0x0000000074AF0000-0x00000000752A0000-memory.dmpFilesize
7.7MB