Overview
overview
10Static
static
10uni/Uni - ...py.exe
windows7-x64
10uni/Uni - ...py.exe
windows10-2004-x64
10uni/Uni - ...py.exe
windows7-x64
10uni/Uni - ...py.exe
windows10-2004-x64
10uni/Uni - ...py.exe
windows7-x64
10uni/Uni - ...py.exe
windows10-2004-x64
10uni/Uni - ...py.exe
windows7-x64
10uni/Uni - ...py.exe
windows10-2004-x64
10uni/Uni - ...py.exe
windows7-x64
10uni/Uni - ...py.exe
windows10-2004-x64
10uni/Uni - ...py.exe
windows7-x64
10uni/Uni - ...py.exe
windows10-2004-x64
10uni/Uni - ...py.exe
windows7-x64
10uni/Uni - ...py.exe
windows10-2004-x64
10uni/Uni - ...py.exe
windows7-x64
10uni/Uni - ...py.exe
windows10-2004-x64
10uni/Uni - ...py.exe
windows7-x64
10uni/Uni - ...py.exe
windows10-2004-x64
10uni/Uni - ...py.exe
windows7-x64
10uni/Uni - ...py.exe
windows10-2004-x64
10uni/Uni - ...py.exe
windows7-x64
10uni/Uni - ...py.exe
windows10-2004-x64
10uni/Uni - ...py.exe
windows7-x64
10uni/Uni - ...py.exe
windows10-2004-x64
10uni/Uni - ...py.exe
windows7-x64
10uni/Uni - ...py.exe
windows10-2004-x64
10uni/Uni - ...py.exe
windows7-x64
10uni/Uni - ...py.exe
windows10-2004-x64
10uni/Uni - ...py.exe
windows7-x64
10uni/Uni - ...py.exe
windows10-2004-x64
10uni/Uni - ...py.exe
windows7-x64
10uni/Uni - ...py.exe
windows10-2004-x64
10Analysis
-
max time kernel
297s -
max time network
305s -
platform
windows10-2004_x64 -
resource
win10v2004-20240508-en -
resource tags
arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system -
submitted
15-06-2024 07:29
Behavioral task
behavioral1
Sample
uni/Uni - Copy (10) - Copy - Copy - Copy.exe
Resource
win7-20240611-en
Behavioral task
behavioral2
Sample
uni/Uni - Copy (10) - Copy - Copy - Copy.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral3
Sample
uni/Uni - Copy (10) - Copy - Copy.exe
Resource
win7-20240221-en
Behavioral task
behavioral4
Sample
uni/Uni - Copy (10) - Copy - Copy.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral5
Sample
uni/Uni - Copy (10) - Copy.exe
Resource
win7-20240220-en
Behavioral task
behavioral6
Sample
uni/Uni - Copy (10) - Copy.exe
Resource
win10v2004-20240611-en
Behavioral task
behavioral7
Sample
uni/Uni - Copy (11) - Copy - Copy - Copy.exe
Resource
win7-20240611-en
Behavioral task
behavioral8
Sample
uni/Uni - Copy (11) - Copy - Copy - Copy.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral9
Sample
uni/Uni - Copy (11) - Copy - Copy.exe
Resource
win7-20240221-en
Behavioral task
behavioral10
Sample
uni/Uni - Copy (11) - Copy - Copy.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral11
Sample
uni/Uni - Copy (11) - Copy.exe
Resource
win7-20240611-en
Behavioral task
behavioral12
Sample
uni/Uni - Copy (11) - Copy.exe
Resource
win10v2004-20240611-en
Behavioral task
behavioral13
Sample
uni/Uni - Copy (12) - Copy - Copy - Copy.exe
Resource
win7-20240220-en
Behavioral task
behavioral14
Sample
uni/Uni - Copy (12) - Copy - Copy - Copy.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral15
Sample
uni/Uni - Copy (12) - Copy - Copy.exe
Resource
win7-20231129-en
Behavioral task
behavioral16
Sample
uni/Uni - Copy (12) - Copy - Copy.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral17
Sample
uni/Uni - Copy (12) - Copy.exe
Resource
win7-20240611-en
Behavioral task
behavioral18
Sample
uni/Uni - Copy (12) - Copy.exe
Resource
win10v2004-20240611-en
Behavioral task
behavioral19
Sample
uni/Uni - Copy (13) - Copy - Copy - Copy.exe
Resource
win7-20240508-en
Behavioral task
behavioral20
Sample
uni/Uni - Copy (13) - Copy - Copy - Copy.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral21
Sample
uni/Uni - Copy (13) - Copy - Copy.exe
Resource
win7-20240221-en
Behavioral task
behavioral22
Sample
uni/Uni - Copy (13) - Copy - Copy.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral23
Sample
uni/Uni - Copy (13) - Copy.exe
Resource
win7-20240221-en
Behavioral task
behavioral24
Sample
uni/Uni - Copy (13) - Copy.exe
Resource
win10v2004-20240226-en
Behavioral task
behavioral25
Sample
uni/Uni - Copy (14) - Copy - Copy - Copy.exe
Resource
win7-20240611-en
Behavioral task
behavioral26
Sample
uni/Uni - Copy (14) - Copy - Copy - Copy.exe
Resource
win10v2004-20240611-en
Behavioral task
behavioral27
Sample
uni/Uni - Copy (14) - Copy - Copy.exe
Resource
win7-20240508-en
Behavioral task
behavioral28
Sample
uni/Uni - Copy (14) - Copy - Copy.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral29
Sample
uni/Uni - Copy (14) - Copy.exe
Resource
win7-20240508-en
Behavioral task
behavioral30
Sample
uni/Uni - Copy (14) - Copy.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral31
Sample
uni/Uni - Copy (15) - Copy - Copy - Copy.exe
Resource
win7-20231129-en
General
-
Target
uni/Uni - Copy (10) - Copy - Copy - Copy.exe
-
Size
409KB
-
MD5
b70fdac25a99501e3cae11f1b775249e
-
SHA1
3c59226479bfdcd1b2927bcfb1a7516d4cb8dd71
-
SHA256
51ff3eb450a786c1aaa75ff889f2fd256412a7b75d04277fdf9fcccc20e57246
-
SHA512
43f0d5d6e5f0d5febba537c109ffdbc250bbb6e9725e635a43ec975b0353048eaeee50b6e9274cd5e072ea6b0cea32439bd37408b2528832f467f2075f74ca44
-
SSDEEP
12288:gpbJjGut6AoE3hVVdFaC/eZPTMTDlpgfJCKuMsVs:oVaurMLcDlpRKai
Malware Config
Extracted
quasar
3.1.5
SeroXen
panel-slave.gl.at.ply.gg:57059
panel-slave.gl.at.ply.gg:27892
$Sxr-rpL8EItHN3pqIQQVy2
-
encryption_key
Lme7VBS3l58VwLM69PNM
-
install_name
Client.exe
-
log_directory
Logs
-
reconnect_delay
3000
-
startup_key
SeroXen
-
subdirectory
SubDir
Signatures
-
Quasar payload 2 IoCs
Processes:
resource yara_rule behavioral2/memory/4024-1-0x0000000000BB0000-0x0000000000C1C000-memory.dmp family_quasar C:\Users\Admin\AppData\Roaming\SubDir\Client.exe family_quasar -
Checks computer location settings 2 TTPs 15 IoCs
Looks up country code configured in the registry, likely geofence.
Processes:
Client.exeClient.exeClient.exeClient.exeClient.exeClient.exeClient.exeClient.exeClient.exeClient.exeClient.exeClient.exeClient.exeClient.exeClient.exedescription ioc process Key value queried \REGISTRY\USER\S-1-5-21-4124900551-4068476067-3491212533-1000\Control Panel\International\Geo\Nation Client.exe Key value queried \REGISTRY\USER\S-1-5-21-4124900551-4068476067-3491212533-1000\Control Panel\International\Geo\Nation Client.exe Key value queried \REGISTRY\USER\S-1-5-21-4124900551-4068476067-3491212533-1000\Control Panel\International\Geo\Nation Client.exe Key value queried \REGISTRY\USER\S-1-5-21-4124900551-4068476067-3491212533-1000\Control Panel\International\Geo\Nation Client.exe Key value queried \REGISTRY\USER\S-1-5-21-4124900551-4068476067-3491212533-1000\Control Panel\International\Geo\Nation Client.exe Key value queried \REGISTRY\USER\S-1-5-21-4124900551-4068476067-3491212533-1000\Control Panel\International\Geo\Nation Client.exe Key value queried \REGISTRY\USER\S-1-5-21-4124900551-4068476067-3491212533-1000\Control Panel\International\Geo\Nation Client.exe Key value queried \REGISTRY\USER\S-1-5-21-4124900551-4068476067-3491212533-1000\Control Panel\International\Geo\Nation Client.exe Key value queried \REGISTRY\USER\S-1-5-21-4124900551-4068476067-3491212533-1000\Control Panel\International\Geo\Nation Client.exe Key value queried \REGISTRY\USER\S-1-5-21-4124900551-4068476067-3491212533-1000\Control Panel\International\Geo\Nation Client.exe Key value queried \REGISTRY\USER\S-1-5-21-4124900551-4068476067-3491212533-1000\Control Panel\International\Geo\Nation Client.exe Key value queried \REGISTRY\USER\S-1-5-21-4124900551-4068476067-3491212533-1000\Control Panel\International\Geo\Nation Client.exe Key value queried \REGISTRY\USER\S-1-5-21-4124900551-4068476067-3491212533-1000\Control Panel\International\Geo\Nation Client.exe Key value queried \REGISTRY\USER\S-1-5-21-4124900551-4068476067-3491212533-1000\Control Panel\International\Geo\Nation Client.exe Key value queried \REGISTRY\USER\S-1-5-21-4124900551-4068476067-3491212533-1000\Control Panel\International\Geo\Nation Client.exe -
Executes dropped EXE 15 IoCs
Processes:
Client.exeClient.exeClient.exeClient.exeClient.exeClient.exeClient.exeClient.exeClient.exeClient.exeClient.exeClient.exeClient.exeClient.exeClient.exepid process 2300 Client.exe 5068 Client.exe 2236 Client.exe 1316 Client.exe 4272 Client.exe 1376 Client.exe 2752 Client.exe 1836 Client.exe 4760 Client.exe 3788 Client.exe 2432 Client.exe 3980 Client.exe 432 Client.exe 2912 Client.exe 32 Client.exe -
Looks up external IP address via web service 13 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
Processes:
flow ioc 25 ip-api.com 27 ip-api.com 29 ip-api.com 20 ip-api.com 37 ip-api.com 3 ip-api.com 16 ip-api.com 32 ip-api.com 35 ip-api.com 39 ip-api.com 12 api.ipify.org 18 ip-api.com 22 ip-api.com -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Program crash 15 IoCs
Processes:
WerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exepid pid_target process target process 3796 2300 WerFault.exe Client.exe 4932 5068 WerFault.exe Client.exe 2672 2236 WerFault.exe Client.exe 924 1316 WerFault.exe Client.exe 4752 4272 WerFault.exe Client.exe 1720 1376 WerFault.exe Client.exe 904 2752 WerFault.exe Client.exe 4420 1836 WerFault.exe Client.exe 2364 4760 WerFault.exe Client.exe 1248 3788 WerFault.exe Client.exe 3340 2432 WerFault.exe Client.exe 3388 3980 WerFault.exe Client.exe 3184 432 WerFault.exe Client.exe 4676 2912 WerFault.exe Client.exe 4492 32 WerFault.exe Client.exe -
Creates scheduled task(s) 1 TTPs 17 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
Processes:
schtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeSCHTASKS.exeschtasks.exepid process 2508 schtasks.exe 968 schtasks.exe 3748 schtasks.exe 4240 schtasks.exe 4912 schtasks.exe 1748 schtasks.exe 3112 schtasks.exe 1576 schtasks.exe 3468 schtasks.exe 1228 schtasks.exe 4656 schtasks.exe 3104 schtasks.exe 3644 schtasks.exe 3644 schtasks.exe 4648 schtasks.exe 2016 SCHTASKS.exe 1908 schtasks.exe -
Runs ping.exe 1 TTPs 15 IoCs
Processes:
PING.EXEPING.EXEPING.EXEPING.EXEPING.EXEPING.EXEPING.EXEPING.EXEPING.EXEPING.EXEPING.EXEPING.EXEPING.EXEPING.EXEPING.EXEpid process 3200 PING.EXE 564 PING.EXE 1316 PING.EXE 920 PING.EXE 4404 PING.EXE 3116 PING.EXE 3472 PING.EXE 2512 PING.EXE 3580 PING.EXE 2516 PING.EXE 3208 PING.EXE 3876 PING.EXE 4936 PING.EXE 2280 PING.EXE 4916 PING.EXE -
Suspicious use of AdjustPrivilegeToken 16 IoCs
Processes:
Uni - Copy (10) - Copy - Copy - Copy.exeClient.exeClient.exeClient.exeClient.exeClient.exeClient.exeClient.exeClient.exeClient.exeClient.exeClient.exeClient.exeClient.exeClient.exeClient.exedescription pid process Token: SeDebugPrivilege 4024 Uni - Copy (10) - Copy - Copy - Copy.exe Token: SeDebugPrivilege 2300 Client.exe Token: SeDebugPrivilege 5068 Client.exe Token: SeDebugPrivilege 2236 Client.exe Token: SeDebugPrivilege 1316 Client.exe Token: SeDebugPrivilege 4272 Client.exe Token: SeDebugPrivilege 1376 Client.exe Token: SeDebugPrivilege 2752 Client.exe Token: SeDebugPrivilege 1836 Client.exe Token: SeDebugPrivilege 4760 Client.exe Token: SeDebugPrivilege 3788 Client.exe Token: SeDebugPrivilege 2432 Client.exe Token: SeDebugPrivilege 3980 Client.exe Token: SeDebugPrivilege 432 Client.exe Token: SeDebugPrivilege 2912 Client.exe Token: SeDebugPrivilege 32 Client.exe -
Suspicious use of SetWindowsHookEx 15 IoCs
Processes:
Client.exeClient.exeClient.exeClient.exeClient.exeClient.exeClient.exeClient.exeClient.exeClient.exeClient.exeClient.exeClient.exeClient.exeClient.exepid process 2300 Client.exe 5068 Client.exe 2236 Client.exe 1316 Client.exe 4272 Client.exe 1376 Client.exe 2752 Client.exe 1836 Client.exe 4760 Client.exe 3788 Client.exe 2432 Client.exe 3980 Client.exe 432 Client.exe 2912 Client.exe 32 Client.exe -
Suspicious use of WriteProcessMemory 64 IoCs
Processes:
Uni - Copy (10) - Copy - Copy - Copy.exeClient.execmd.exeClient.execmd.exeClient.execmd.exeClient.execmd.exedescription pid process target process PID 4024 wrote to memory of 4912 4024 Uni - Copy (10) - Copy - Copy - Copy.exe schtasks.exe PID 4024 wrote to memory of 4912 4024 Uni - Copy (10) - Copy - Copy - Copy.exe schtasks.exe PID 4024 wrote to memory of 4912 4024 Uni - Copy (10) - Copy - Copy - Copy.exe schtasks.exe PID 4024 wrote to memory of 2300 4024 Uni - Copy (10) - Copy - Copy - Copy.exe Client.exe PID 4024 wrote to memory of 2300 4024 Uni - Copy (10) - Copy - Copy - Copy.exe Client.exe PID 4024 wrote to memory of 2300 4024 Uni - Copy (10) - Copy - Copy - Copy.exe Client.exe PID 4024 wrote to memory of 2016 4024 Uni - Copy (10) - Copy - Copy - Copy.exe SCHTASKS.exe PID 4024 wrote to memory of 2016 4024 Uni - Copy (10) - Copy - Copy - Copy.exe SCHTASKS.exe PID 4024 wrote to memory of 2016 4024 Uni - Copy (10) - Copy - Copy - Copy.exe SCHTASKS.exe PID 2300 wrote to memory of 1748 2300 Client.exe schtasks.exe PID 2300 wrote to memory of 1748 2300 Client.exe schtasks.exe PID 2300 wrote to memory of 1748 2300 Client.exe schtasks.exe PID 2300 wrote to memory of 2892 2300 Client.exe cmd.exe PID 2300 wrote to memory of 2892 2300 Client.exe cmd.exe PID 2300 wrote to memory of 2892 2300 Client.exe cmd.exe PID 2892 wrote to memory of 2088 2892 cmd.exe chcp.com PID 2892 wrote to memory of 2088 2892 cmd.exe chcp.com PID 2892 wrote to memory of 2088 2892 cmd.exe chcp.com PID 2892 wrote to memory of 3116 2892 cmd.exe PING.EXE PID 2892 wrote to memory of 3116 2892 cmd.exe PING.EXE PID 2892 wrote to memory of 3116 2892 cmd.exe PING.EXE PID 2892 wrote to memory of 5068 2892 cmd.exe Client.exe PID 2892 wrote to memory of 5068 2892 cmd.exe Client.exe PID 2892 wrote to memory of 5068 2892 cmd.exe Client.exe PID 5068 wrote to memory of 3748 5068 Client.exe schtasks.exe PID 5068 wrote to memory of 3748 5068 Client.exe schtasks.exe PID 5068 wrote to memory of 3748 5068 Client.exe schtasks.exe PID 5068 wrote to memory of 1984 5068 Client.exe cmd.exe PID 5068 wrote to memory of 1984 5068 Client.exe cmd.exe PID 5068 wrote to memory of 1984 5068 Client.exe cmd.exe PID 1984 wrote to memory of 4516 1984 cmd.exe chcp.com PID 1984 wrote to memory of 4516 1984 cmd.exe chcp.com PID 1984 wrote to memory of 4516 1984 cmd.exe chcp.com PID 1984 wrote to memory of 4916 1984 cmd.exe PING.EXE PID 1984 wrote to memory of 4916 1984 cmd.exe PING.EXE PID 1984 wrote to memory of 4916 1984 cmd.exe PING.EXE PID 1984 wrote to memory of 2236 1984 cmd.exe Client.exe PID 1984 wrote to memory of 2236 1984 cmd.exe Client.exe PID 1984 wrote to memory of 2236 1984 cmd.exe Client.exe PID 2236 wrote to memory of 4240 2236 Client.exe schtasks.exe PID 2236 wrote to memory of 4240 2236 Client.exe schtasks.exe PID 2236 wrote to memory of 4240 2236 Client.exe schtasks.exe PID 2236 wrote to memory of 4844 2236 Client.exe cmd.exe PID 2236 wrote to memory of 4844 2236 Client.exe cmd.exe PID 2236 wrote to memory of 4844 2236 Client.exe cmd.exe PID 4844 wrote to memory of 4332 4844 cmd.exe chcp.com PID 4844 wrote to memory of 4332 4844 cmd.exe chcp.com PID 4844 wrote to memory of 4332 4844 cmd.exe chcp.com PID 4844 wrote to memory of 4936 4844 cmd.exe PING.EXE PID 4844 wrote to memory of 4936 4844 cmd.exe PING.EXE PID 4844 wrote to memory of 4936 4844 cmd.exe PING.EXE PID 4844 wrote to memory of 1316 4844 cmd.exe Client.exe PID 4844 wrote to memory of 1316 4844 cmd.exe Client.exe PID 4844 wrote to memory of 1316 4844 cmd.exe Client.exe PID 1316 wrote to memory of 1908 1316 Client.exe schtasks.exe PID 1316 wrote to memory of 1908 1316 Client.exe schtasks.exe PID 1316 wrote to memory of 1908 1316 Client.exe schtasks.exe PID 1316 wrote to memory of 436 1316 Client.exe cmd.exe PID 1316 wrote to memory of 436 1316 Client.exe cmd.exe PID 1316 wrote to memory of 436 1316 Client.exe cmd.exe PID 436 wrote to memory of 3284 436 cmd.exe chcp.com PID 436 wrote to memory of 3284 436 cmd.exe chcp.com PID 436 wrote to memory of 3284 436 cmd.exe chcp.com PID 436 wrote to memory of 3200 436 cmd.exe PING.EXE
Processes
-
C:\Users\Admin\AppData\Local\Temp\uni\Uni - Copy (10) - Copy - Copy - Copy.exe"C:\Users\Admin\AppData\Local\Temp\uni\Uni - Copy (10) - Copy - Copy - Copy.exe"1⤵
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\schtasks.exe"schtasks" /create /tn "SeroXen" /sc ONLOGON /tr "C:\Users\Admin\AppData\Local\Temp\uni\Uni - Copy (10) - Copy - Copy - Copy.exe" /rl HIGHEST /f2⤵
- Creates scheduled task(s)
-
C:\Users\Admin\AppData\Roaming\SubDir\Client.exe"C:\Users\Admin\AppData\Roaming\SubDir\Client.exe"2⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\schtasks.exe"schtasks" /create /tn "SeroXen" /sc ONLOGON /tr "C:\Users\Admin\AppData\Roaming\SubDir\Client.exe" /rl HIGHEST /f3⤵
- Creates scheduled task(s)
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\bh0zwZ9t75AW.bat" "3⤵
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\chcp.comchcp 650014⤵
-
C:\Windows\SysWOW64\PING.EXEping -n 10 localhost4⤵
- Runs ping.exe
-
C:\Users\Admin\AppData\Roaming\SubDir\Client.exe"C:\Users\Admin\AppData\Roaming\SubDir\Client.exe"4⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\schtasks.exe"schtasks" /create /tn "SeroXen" /sc ONLOGON /tr "C:\Users\Admin\AppData\Roaming\SubDir\Client.exe" /rl HIGHEST /f5⤵
- Creates scheduled task(s)
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\oTtmkfhinjIv.bat" "5⤵
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\chcp.comchcp 650016⤵
-
C:\Windows\SysWOW64\PING.EXEping -n 10 localhost6⤵
- Runs ping.exe
-
C:\Users\Admin\AppData\Roaming\SubDir\Client.exe"C:\Users\Admin\AppData\Roaming\SubDir\Client.exe"6⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\schtasks.exe"schtasks" /create /tn "SeroXen" /sc ONLOGON /tr "C:\Users\Admin\AppData\Roaming\SubDir\Client.exe" /rl HIGHEST /f7⤵
- Creates scheduled task(s)
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\VXg4EtWi4wTC.bat" "7⤵
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\chcp.comchcp 650018⤵
-
C:\Windows\SysWOW64\PING.EXEping -n 10 localhost8⤵
- Runs ping.exe
-
C:\Users\Admin\AppData\Roaming\SubDir\Client.exe"C:\Users\Admin\AppData\Roaming\SubDir\Client.exe"8⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\schtasks.exe"schtasks" /create /tn "SeroXen" /sc ONLOGON /tr "C:\Users\Admin\AppData\Roaming\SubDir\Client.exe" /rl HIGHEST /f9⤵
- Creates scheduled task(s)
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\bjsncpwN7vMD.bat" "9⤵
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\chcp.comchcp 6500110⤵
-
C:\Windows\SysWOW64\PING.EXEping -n 10 localhost10⤵
- Runs ping.exe
-
C:\Users\Admin\AppData\Roaming\SubDir\Client.exe"C:\Users\Admin\AppData\Roaming\SubDir\Client.exe"10⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
-
C:\Windows\SysWOW64\schtasks.exe"schtasks" /create /tn "SeroXen" /sc ONLOGON /tr "C:\Users\Admin\AppData\Roaming\SubDir\Client.exe" /rl HIGHEST /f11⤵
- Creates scheduled task(s)
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\N8HD6poKAw0r.bat" "11⤵
-
C:\Windows\SysWOW64\chcp.comchcp 6500112⤵
-
C:\Windows\SysWOW64\PING.EXEping -n 10 localhost12⤵
- Runs ping.exe
-
C:\Users\Admin\AppData\Roaming\SubDir\Client.exe"C:\Users\Admin\AppData\Roaming\SubDir\Client.exe"12⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
-
C:\Windows\SysWOW64\schtasks.exe"schtasks" /create /tn "SeroXen" /sc ONLOGON /tr "C:\Users\Admin\AppData\Roaming\SubDir\Client.exe" /rl HIGHEST /f13⤵
- Creates scheduled task(s)
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\58NYjsoS6SaF.bat" "13⤵
-
C:\Windows\SysWOW64\chcp.comchcp 6500114⤵
-
C:\Windows\SysWOW64\PING.EXEping -n 10 localhost14⤵
- Runs ping.exe
-
C:\Users\Admin\AppData\Roaming\SubDir\Client.exe"C:\Users\Admin\AppData\Roaming\SubDir\Client.exe"14⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
-
C:\Windows\SysWOW64\schtasks.exe"schtasks" /create /tn "SeroXen" /sc ONLOGON /tr "C:\Users\Admin\AppData\Roaming\SubDir\Client.exe" /rl HIGHEST /f15⤵
- Creates scheduled task(s)
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\3Jgl2xDEp7MI.bat" "15⤵
-
C:\Windows\SysWOW64\chcp.comchcp 6500116⤵
-
C:\Windows\SysWOW64\PING.EXEping -n 10 localhost16⤵
- Runs ping.exe
-
C:\Users\Admin\AppData\Roaming\SubDir\Client.exe"C:\Users\Admin\AppData\Roaming\SubDir\Client.exe"16⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
-
C:\Windows\SysWOW64\schtasks.exe"schtasks" /create /tn "SeroXen" /sc ONLOGON /tr "C:\Users\Admin\AppData\Roaming\SubDir\Client.exe" /rl HIGHEST /f17⤵
- Creates scheduled task(s)
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\N7QsgpQG6mGG.bat" "17⤵
-
C:\Windows\SysWOW64\chcp.comchcp 6500118⤵
-
C:\Windows\SysWOW64\PING.EXEping -n 10 localhost18⤵
- Runs ping.exe
-
C:\Users\Admin\AppData\Roaming\SubDir\Client.exe"C:\Users\Admin\AppData\Roaming\SubDir\Client.exe"18⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
-
C:\Windows\SysWOW64\schtasks.exe"schtasks" /create /tn "SeroXen" /sc ONLOGON /tr "C:\Users\Admin\AppData\Roaming\SubDir\Client.exe" /rl HIGHEST /f19⤵
- Creates scheduled task(s)
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\Fi21YlisClnv.bat" "19⤵
-
C:\Windows\SysWOW64\chcp.comchcp 6500120⤵
-
C:\Windows\SysWOW64\PING.EXEping -n 10 localhost20⤵
- Runs ping.exe
-
C:\Users\Admin\AppData\Roaming\SubDir\Client.exe"C:\Users\Admin\AppData\Roaming\SubDir\Client.exe"20⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
-
C:\Windows\SysWOW64\schtasks.exe"schtasks" /create /tn "SeroXen" /sc ONLOGON /tr "C:\Users\Admin\AppData\Roaming\SubDir\Client.exe" /rl HIGHEST /f21⤵
- Creates scheduled task(s)
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\ZWm8CcwuTRht.bat" "21⤵
-
C:\Windows\SysWOW64\chcp.comchcp 6500122⤵
-
C:\Windows\SysWOW64\PING.EXEping -n 10 localhost22⤵
- Runs ping.exe
-
C:\Users\Admin\AppData\Roaming\SubDir\Client.exe"C:\Users\Admin\AppData\Roaming\SubDir\Client.exe"22⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
-
C:\Windows\SysWOW64\schtasks.exe"schtasks" /create /tn "SeroXen" /sc ONLOGON /tr "C:\Users\Admin\AppData\Roaming\SubDir\Client.exe" /rl HIGHEST /f23⤵
- Creates scheduled task(s)
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\noZhHXOXXK13.bat" "23⤵
-
C:\Windows\SysWOW64\chcp.comchcp 6500124⤵
-
C:\Windows\SysWOW64\PING.EXEping -n 10 localhost24⤵
- Runs ping.exe
-
C:\Users\Admin\AppData\Roaming\SubDir\Client.exe"C:\Users\Admin\AppData\Roaming\SubDir\Client.exe"24⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
-
C:\Windows\SysWOW64\schtasks.exe"schtasks" /create /tn "SeroXen" /sc ONLOGON /tr "C:\Users\Admin\AppData\Roaming\SubDir\Client.exe" /rl HIGHEST /f25⤵
- Creates scheduled task(s)
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\26MGNSqAbDKD.bat" "25⤵
-
C:\Windows\SysWOW64\chcp.comchcp 6500126⤵
-
C:\Windows\SysWOW64\PING.EXEping -n 10 localhost26⤵
- Runs ping.exe
-
C:\Users\Admin\AppData\Roaming\SubDir\Client.exe"C:\Users\Admin\AppData\Roaming\SubDir\Client.exe"26⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
-
C:\Windows\SysWOW64\schtasks.exe"schtasks" /create /tn "SeroXen" /sc ONLOGON /tr "C:\Users\Admin\AppData\Roaming\SubDir\Client.exe" /rl HIGHEST /f27⤵
- Creates scheduled task(s)
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\3mpIRkr11q0A.bat" "27⤵
-
C:\Windows\SysWOW64\chcp.comchcp 6500128⤵
-
C:\Windows\SysWOW64\PING.EXEping -n 10 localhost28⤵
- Runs ping.exe
-
C:\Users\Admin\AppData\Roaming\SubDir\Client.exe"C:\Users\Admin\AppData\Roaming\SubDir\Client.exe"28⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
-
C:\Windows\SysWOW64\schtasks.exe"schtasks" /create /tn "SeroXen" /sc ONLOGON /tr "C:\Users\Admin\AppData\Roaming\SubDir\Client.exe" /rl HIGHEST /f29⤵
- Creates scheduled task(s)
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\Q8Tjk12tPMSd.bat" "29⤵
-
C:\Windows\SysWOW64\chcp.comchcp 6500130⤵
-
C:\Windows\SysWOW64\PING.EXEping -n 10 localhost30⤵
- Runs ping.exe
-
C:\Users\Admin\AppData\Roaming\SubDir\Client.exe"C:\Users\Admin\AppData\Roaming\SubDir\Client.exe"30⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
-
C:\Windows\SysWOW64\schtasks.exe"schtasks" /create /tn "SeroXen" /sc ONLOGON /tr "C:\Users\Admin\AppData\Roaming\SubDir\Client.exe" /rl HIGHEST /f31⤵
- Creates scheduled task(s)
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\l1xMG5bg6u1A.bat" "31⤵
-
C:\Windows\SysWOW64\chcp.comchcp 6500132⤵
-
C:\Windows\SysWOW64\PING.EXEping -n 10 localhost32⤵
- Runs ping.exe
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 32 -s 222431⤵
- Program crash
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2912 -s 166429⤵
- Program crash
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 432 -s 223227⤵
- Program crash
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3980 -s 223625⤵
- Program crash
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2432 -s 224823⤵
- Program crash
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3788 -s 109221⤵
- Program crash
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4760 -s 223619⤵
- Program crash
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1836 -s 109217⤵
- Program crash
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2752 -s 109215⤵
- Program crash
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1376 -s 121613⤵
- Program crash
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4272 -s 164811⤵
- Program crash
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1316 -s 16009⤵
- Program crash
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2236 -s 15807⤵
- Program crash
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 5068 -s 16445⤵
- Program crash
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2300 -s 16683⤵
- Program crash
-
C:\Windows\SysWOW64\SCHTASKS.exe"SCHTASKS.exe" /create /tn "$77Uni - Copy (10) - Copy - Copy - Copy.exe" /tr "'C:\Users\Admin\AppData\Local\Temp\uni\Uni - Copy (10) - Copy - Copy - Copy.exe'" /sc onlogon /rl HIGHEST2⤵
- Creates scheduled task(s)
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 408 -p 2300 -ip 23001⤵
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 456 -p 5068 -ip 50681⤵
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 468 -p 2236 -ip 22361⤵
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 188 -p 1316 -ip 13161⤵
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 420 -p 4272 -ip 42721⤵
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 500 -p 1376 -ip 13761⤵
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 536 -p 2752 -ip 27521⤵
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 560 -p 1836 -ip 18361⤵
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 460 -p 4760 -ip 47601⤵
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 568 -p 3788 -ip 37881⤵
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 576 -p 2432 -ip 24321⤵
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 604 -p 3980 -ip 39801⤵
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 536 -p 432 -ip 4321⤵
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 580 -p 2912 -ip 29121⤵
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 608 -p 32 -ip 321⤵
Network
MITRE ATT&CK Matrix ATT&CK v13
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Local\Temp\26MGNSqAbDKD.batFilesize
207B
MD568427c8809b0488d83142f8917077153
SHA1a1bb2f9e2d45b0487d9ff12999c22b225f7a02cc
SHA25672b1a329e772598872d664f921966e35feeaf9af14ac1d982535fde93ce6560c
SHA512743eed82c501d2b9a7f9a15797a557133dcf6c9ec71dcb7a1920d658b773fd2fe68e538ca5f730a81b30810536fc841e5b5ce4304e3983dc37482c356074e41a
-
C:\Users\Admin\AppData\Local\Temp\3mpIRkr11q0A.batFilesize
207B
MD594eef7973cc201455c86f8beaf17db61
SHA1c2b61ca5a0e53f980e5f9b35f42a9a4d4b3f869f
SHA2563f8e403b29d75e71f9276118d4fff0736559b45e6e356abda06b1361c46c51d6
SHA512b131b97269116e1194c85656b372720c962da9ab5221fb8f20a1e6940859c01e07e7cf89e7059a13e4ed626bff60742a0353abda3ff0bf35c32b7723de1439c4
-
C:\Users\Admin\AppData\Local\Temp\58NYjsoS6SaF.batFilesize
207B
MD5bab7806d32f48ae2c15d351d6fecb9b1
SHA1a5a4dbd598e20dcc19971ad047a413ed3f91cb2d
SHA25667f7678b1bfc454fa8a29b087d46a00116e88fd0fff6a3507cbe8f79b44787c4
SHA51294b4eabb6f22bed21f648435540c3ca3e557f61f7b1097171e39ce5ccfa1e8a34a84958d1c6877aee29d4fa283779cd2efb465ffab5b0e38e79a043c9796c852
-
C:\Users\Admin\AppData\Local\Temp\Fi21YlisClnv.batFilesize
207B
MD5a1f1d3627f205695f4ac7b7cf5e4c361
SHA1dd9056ae9fcad4d9c7ed36aa5d33f56ebf925d07
SHA256e456724ca22b9ecfc379e630bb20f44e6079d90ac91486758a6f9d7b6c75f42b
SHA51254a172d59cc3255283780271e0493955e0c40ed6cf782427586d4c3c8e6ab8771e8a909675183ddb135dfd0f72671a1eefed09b06d4f2c9ce686624e60a93ce3
-
C:\Users\Admin\AppData\Local\Temp\N7QsgpQG6mGG.batFilesize
207B
MD56213c8a0c60cbfa6ab4bf0345a0dfcc0
SHA138e8834e935bd2375b23b29fe52679367738cc00
SHA256626cc428cbfdb139a422f0bbc38d6e4963068e1e7b899b91beb4272b3504a239
SHA512e41cdefdbd9880df65f3826caf95438c251bc19c4702ff59cd82db0ddb84b9e40c27af61a2ff593b3d732af656ea7ddac31f02a01e45fa55ce331d66bfc2cfbe
-
C:\Users\Admin\AppData\Local\Temp\N8HD6poKAw0r.batFilesize
207B
MD567c1db9f16098fbadc082f95d30927b7
SHA13fb7765b6e876114ec4ade74c36836c0caf6f61c
SHA256b9d29d62aa7b3c582b1f82a2cec9ef1cc30a2242a0fcb939d954122045495590
SHA512e10e636a919a0abaca9df932884260032ee17f51421e022ac6c9ada2ab6bb9a6a8e7db6462a83f569bac340f69a31502a9f8893ee188877cfea539a067d1f939
-
C:\Users\Admin\AppData\Local\Temp\Q8Tjk12tPMSd.batFilesize
207B
MD58b49d1a9799f72fe543bd7a985d4cd5e
SHA19ff6b2e5aa2393eed2c64078b6d2efda70b84787
SHA256ee9f55cf0d2dd771eaecac4fc6385987941b6d56c23ee10276345e73271e86a5
SHA5124057476dee4015b400354cdf557cd91c53fc43830a3ea43968f281529c85866c678bcd129d69611cc9d50043c1d428b45908866870b95cc0a32fc18df659fa3d
-
C:\Users\Admin\AppData\Local\Temp\VXg4EtWi4wTC.batFilesize
207B
MD5de80d7b6284d2d49362212270efa7aaa
SHA1c00414237a8249bf56ba942ee0244ffcaeee905f
SHA2562ddeebe396ea8e76c85a669661c37d197f9d5a7d861780d3c73c5e1d339ebcff
SHA5129635dfab238c8c1c6ce4a81c83afe58d6656054c2899b7b18011569962f18bf46641b6cd6a9581d56f59814f252d8e6a1e37826d4ee99562f37cc4e72978ce23
-
C:\Users\Admin\AppData\Local\Temp\ZWm8CcwuTRht.batFilesize
207B
MD5fb9feb6cf2900b9cef8915a55106d139
SHA160164ab8618535a9630ea4a130ce657fdf78fbe7
SHA2560e0322445944ff58941657d46c87702ac8c02d9ee3986b88cc4963fc5aae189c
SHA51260c76e9b4c030d0a5b0ea6443c6f7bcd8d5212ba06ada568785b4abe4d194b706bcff0bf3a714ac3fb48eca10a22b1d70268e77f98dba3f13b0f751e02236c40
-
C:\Users\Admin\AppData\Local\Temp\bh0zwZ9t75AW.batFilesize
207B
MD53b003f0a897a1a5f768a3c3c0fc2d39f
SHA1463604971d70c9e942bb3f72ed238af44a82e544
SHA25645fd3603ce97ac5b613f57e7cd3a5f4f18551e092b71692b7aae64b70c5feeaf
SHA512119fb17e6ee0f94e5bf08ec9e07ac00ac9ca82b1635d324f0c357bd42796bc6f3107eb1199cfbb3b9a86eb9d32e367f6152ff1122dee72c7809ae0797d9327cb
-
C:\Users\Admin\AppData\Local\Temp\bjsncpwN7vMD.batFilesize
207B
MD57736e89cf14f1cf06091438558e80dd0
SHA10d7cd0ec332ade80a32a78ca890a128a192bd170
SHA256e5209e4d274962a094d9a869e5deb909b5babf57a1658f073f3e88740acb8b4d
SHA51299554aff2f7660e5722eeac74ece79881ffab244e5f6c7b22e1d689a2e6a8ef9e21cb6d22f412d62c03ff8e955842f5a78d6b0701645a60cca8d113bcdbe2ae6
-
C:\Users\Admin\AppData\Local\Temp\l1xMG5bg6u1A.batFilesize
207B
MD5a8a452e32cc03a49f195d837b2c8d864
SHA130fbb4eff406326e02f2665f2244e60796936867
SHA2563d7dd643d65c92d60bee0eb824a5908e6fd32ea21e9ecdcaaea26bcb79115b99
SHA512d45dc333d9f3e6cb281e09b7614a7201ae3e61600c7e49a2aadd7629662ec1524914fb565dbe37f2a47ea32cf40286cd88e61b554161f431089ef21c6b464224
-
C:\Users\Admin\AppData\Local\Temp\noZhHXOXXK13.batFilesize
207B
MD5c143f9206ba6624356b03a6586026d7a
SHA1b9e211fb7b073fe894cbdee907b5bc3b48b078ea
SHA2560c58ed8ed9726d8e1a3e54d73a14f82df5c7caaef3ed553cf8e0eaa3eb46d1c0
SHA512a7702d6039e8be6da7755b318028cb22e45ba0bdbcef081d445e47e84017cf0e00883c0a233f014cda4e5ad79bfa4bc474d7420292012b6d23b70f4b1a472374
-
C:\Users\Admin\AppData\Local\Temp\oTtmkfhinjIv.batFilesize
207B
MD5cbb15c44477f019777d7d6e1b7dc6936
SHA1645324864b6d605e947efd8f276d8095cdfd0a00
SHA256a5b7ec1e7210b9bba933fafeba2bd467971364240effcda7e65e01bfd8e69010
SHA512afd9dd693b8ac5848b2a24ab82345a7e487f7b66d3ebeae37595e358abb8b4a6edacca89c594b7ff44bed814da386698004fc333abda8929a3b963f80e29e2a1
-
C:\Users\Admin\AppData\Roaming\Logs\06-15-2024Filesize
224B
MD52bf82f64721d935d2595770adbb62f36
SHA1ed492d00aaad55764cd8adf3613e7745ccf587c8
SHA256d86b6de1b37d9531000319d0452db29a9dfe3ba1b5afe16f1b781f81bf2d968d
SHA51200a25dd40c4a0fb7b8490941e9100f07259f5525daee5e7343c0e15f34ff7d32d5e4d1b242e959c7c768c178a3a997e35b8300a977bf3018e2ebbb38ff2f2913
-
C:\Users\Admin\AppData\Roaming\Logs\06-15-2024Filesize
224B
MD58513b0f90151e2a5189a0f72996e7a6b
SHA1d16f7d84ac4259db74b1cc4699bf105d98d42900
SHA2560f715fa6799ddbe3f7639ede5eda73632e72573d4902656a2913288fb204f49f
SHA5120bec69992d326d743df277a47538fc30575ccfb7ce25c10b6b75e4a00553e7b2ffe9b64f8bb79bb35de9b1bfd78ea429a11971207e642c89cf6ea8f394876f5f
-
C:\Users\Admin\AppData\Roaming\Logs\06-15-2024Filesize
224B
MD5c12512a30e432cccaaf3ebcf69c4e95f
SHA12b5d8546ca8265c44c55bcd0955a3b0a6d62b97f
SHA2561fccb3c480a8196c34dbfdaa00b5058dc54128971ca8afc60834ad3a8199bef9
SHA5126c042e7c3cea5890db63414591c6f61ead3a7353771cb1bbf9aafd8d05f3933a0d9dbc05c5c08abad5a418033bc05facd7ed4d7c1a99c79f42bd875a21d49b2e
-
C:\Users\Admin\AppData\Roaming\Logs\06-15-2024Filesize
224B
MD519636f7ff8c0923a009eac6bc3d869bf
SHA162cd162b5364ad5e3e4074d99226bf60325d63ff
SHA25667fee24e0ebf2117284efcea34e9b0a0a01a0ef57240fedc99f8147e0dc1c5db
SHA512ae5d9aa928c4ba4ef0ebef097d77690012cd900d9a634e842e1095f6e30a981ad95dfd3e9cd1287990d9825152e316c4945bca91f23ca070368c088b321b5683
-
C:\Users\Admin\AppData\Roaming\Logs\06-15-2024MD5
d41d8cd98f00b204e9800998ecf8427e
SHA1da39a3ee5e6b4b0d3255bfef95601890afd80709
SHA256e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855
SHA512cf83e1357eefb8bdf1542850d66d8007d620e4050b5715dc83f4a921d36ce9ce47d0d13c5d85f2b0ff8318d2877eec2f63b931bd47417a81a538327af927da3e
-
C:\Users\Admin\AppData\Roaming\Logs\06-15-2024Filesize
224B
MD56d14c1973294fcdfce418bf5c7143243
SHA1c96ccf8ab803e7bf02d98273c15f06fccce4525e
SHA256b8188bc02d89ff92715f2b69b267f02af0e115c7a01ce5babec37a77e1d38686
SHA512bc9c127195a6751c989d8035dfe4e4087813edc1369c590c9261e56a9be8578098d9b98343487ba046dbce143e99bf7db8f731fc46b2ff14c7e37d9272fbb8e0
-
C:\Users\Admin\AppData\Roaming\Logs\06-15-2024Filesize
224B
MD5728cfa75972556a3bbf14b586206c4ce
SHA15b1677e0d4bf9ee3e2a524c5d0f4686ecd132799
SHA25681b5ac2665deb7d51ba1ee97469c9a07940d8c822c2d2781fbc28d91cecb6f80
SHA5122938dcf597363efc645a000d21ea59509befe2baecdfcc82538b67a0e6b6194bb63c42edae0dbc089b20368a895df6d3927927bb1f40afeddf0de0b8a9bc26dc
-
C:\Users\Admin\AppData\Roaming\Logs\06-15-2024Filesize
224B
MD52cfe57f21bd640fd10cc5300596b54cb
SHA10d884c1e82d77ae4a06e21779cf6abc623e16b7e
SHA2560d9a6905faf82a98f08820989200a45841766f43a08932256bdd32501f78d836
SHA51215fd10bd01ca29d40d31c374f16377bae652eabef44e0fb81852dce7cf07aed5909f4090193ddfc68c4eb03156d38143d0c3abf01060b02312050499b59a4575
-
C:\Users\Admin\AppData\Roaming\Logs\06-15-2024Filesize
224B
MD52dd48adad31aa89f5e5005473839b9a2
SHA1e2d8b0aa560f721e51b72ab2697d5e11bdaa0c6b
SHA256aa5bc269e2ec4131386559a26ee6bd9066dc3a5c2195b175a829858a2d9467df
SHA512557a23e77b88ea2b4bd29ce4e8934162f525f02b2ba76312c003e15ecdb9285e8bf54a58bfab82ca638392b6cdc9989365d54a56d46470f6ccd74ea95f35455c
-
C:\Users\Admin\AppData\Roaming\SubDir\Client.exeFilesize
409KB
MD5b70fdac25a99501e3cae11f1b775249e
SHA13c59226479bfdcd1b2927bcfb1a7516d4cb8dd71
SHA25651ff3eb450a786c1aaa75ff889f2fd256412a7b75d04277fdf9fcccc20e57246
SHA51243f0d5d6e5f0d5febba537c109ffdbc250bbb6e9725e635a43ec975b0353048eaeee50b6e9274cd5e072ea6b0cea32439bd37408b2528832f467f2075f74ca44
-
memory/2300-15-0x0000000074740000-0x0000000074EF0000-memory.dmpFilesize
7.7MB
-
memory/2300-24-0x0000000074740000-0x0000000074EF0000-memory.dmpFilesize
7.7MB
-
memory/2300-19-0x0000000006260000-0x000000000626A000-memory.dmpFilesize
40KB
-
memory/2300-16-0x0000000074740000-0x0000000074EF0000-memory.dmpFilesize
7.7MB
-
memory/4024-8-0x0000000074740000-0x0000000074EF0000-memory.dmpFilesize
7.7MB
-
memory/4024-0-0x000000007474E000-0x000000007474F000-memory.dmpFilesize
4KB
-
memory/4024-7-0x000000007474E000-0x000000007474F000-memory.dmpFilesize
4KB
-
memory/4024-17-0x0000000074740000-0x0000000074EF0000-memory.dmpFilesize
7.7MB
-
memory/4024-6-0x0000000005B50000-0x0000000005B62000-memory.dmpFilesize
72KB
-
memory/4024-5-0x0000000005540000-0x00000000055A6000-memory.dmpFilesize
408KB
-
memory/4024-4-0x0000000074740000-0x0000000074EF0000-memory.dmpFilesize
7.7MB
-
memory/4024-3-0x00000000055D0000-0x0000000005662000-memory.dmpFilesize
584KB
-
memory/4024-2-0x0000000005B80000-0x0000000006124000-memory.dmpFilesize
5.6MB
-
memory/4024-1-0x0000000000BB0000-0x0000000000C1C000-memory.dmpFilesize
432KB