Overview
overview
10Static
static
10uni/Uni - ...py.exe
windows7-x64
10uni/Uni - ...py.exe
windows10-2004-x64
10uni/Uni - ...py.exe
windows7-x64
10uni/Uni - ...py.exe
windows10-2004-x64
10uni/Uni - ...py.exe
windows7-x64
10uni/Uni - ...py.exe
windows10-2004-x64
10uni/Uni - ...py.exe
windows7-x64
10uni/Uni - ...py.exe
windows10-2004-x64
10uni/Uni - ...py.exe
windows7-x64
10uni/Uni - ...py.exe
windows10-2004-x64
10uni/Uni - ...py.exe
windows7-x64
10uni/Uni - ...py.exe
windows10-2004-x64
10uni/Uni - ...py.exe
windows7-x64
10uni/Uni - ...py.exe
windows10-2004-x64
10uni/Uni - ...py.exe
windows7-x64
10uni/Uni - ...py.exe
windows10-2004-x64
10uni/Uni - ...py.exe
windows7-x64
10uni/Uni - ...py.exe
windows10-2004-x64
10uni/Uni - ...py.exe
windows7-x64
10uni/Uni - ...py.exe
windows10-2004-x64
10uni/Uni - ...py.exe
windows7-x64
10uni/Uni - ...py.exe
windows10-2004-x64
10uni/Uni - ...py.exe
windows7-x64
10uni/Uni - ...py.exe
windows10-2004-x64
10uni/Uni - ...py.exe
windows7-x64
10uni/Uni - ...py.exe
windows10-2004-x64
10uni/Uni - ...py.exe
windows7-x64
10uni/Uni - ...py.exe
windows10-2004-x64
10uni/Uni - ...py.exe
windows7-x64
10uni/Uni - ...py.exe
windows10-2004-x64
10uni/Uni - ...py.exe
windows7-x64
10uni/Uni - ...py.exe
windows10-2004-x64
10Analysis
-
max time kernel
294s -
max time network
301s -
platform
windows10-2004_x64 -
resource
win10v2004-20240508-en -
resource tags
arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system -
submitted
15-06-2024 07:29
Behavioral task
behavioral1
Sample
uni/Uni - Copy (10) - Copy - Copy - Copy.exe
Resource
win7-20240611-en
Behavioral task
behavioral2
Sample
uni/Uni - Copy (10) - Copy - Copy - Copy.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral3
Sample
uni/Uni - Copy (10) - Copy - Copy.exe
Resource
win7-20240221-en
Behavioral task
behavioral4
Sample
uni/Uni - Copy (10) - Copy - Copy.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral5
Sample
uni/Uni - Copy (10) - Copy.exe
Resource
win7-20240220-en
Behavioral task
behavioral6
Sample
uni/Uni - Copy (10) - Copy.exe
Resource
win10v2004-20240611-en
Behavioral task
behavioral7
Sample
uni/Uni - Copy (11) - Copy - Copy - Copy.exe
Resource
win7-20240611-en
Behavioral task
behavioral8
Sample
uni/Uni - Copy (11) - Copy - Copy - Copy.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral9
Sample
uni/Uni - Copy (11) - Copy - Copy.exe
Resource
win7-20240221-en
Behavioral task
behavioral10
Sample
uni/Uni - Copy (11) - Copy - Copy.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral11
Sample
uni/Uni - Copy (11) - Copy.exe
Resource
win7-20240611-en
Behavioral task
behavioral12
Sample
uni/Uni - Copy (11) - Copy.exe
Resource
win10v2004-20240611-en
Behavioral task
behavioral13
Sample
uni/Uni - Copy (12) - Copy - Copy - Copy.exe
Resource
win7-20240220-en
Behavioral task
behavioral14
Sample
uni/Uni - Copy (12) - Copy - Copy - Copy.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral15
Sample
uni/Uni - Copy (12) - Copy - Copy.exe
Resource
win7-20231129-en
Behavioral task
behavioral16
Sample
uni/Uni - Copy (12) - Copy - Copy.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral17
Sample
uni/Uni - Copy (12) - Copy.exe
Resource
win7-20240611-en
Behavioral task
behavioral18
Sample
uni/Uni - Copy (12) - Copy.exe
Resource
win10v2004-20240611-en
Behavioral task
behavioral19
Sample
uni/Uni - Copy (13) - Copy - Copy - Copy.exe
Resource
win7-20240508-en
Behavioral task
behavioral20
Sample
uni/Uni - Copy (13) - Copy - Copy - Copy.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral21
Sample
uni/Uni - Copy (13) - Copy - Copy.exe
Resource
win7-20240221-en
Behavioral task
behavioral22
Sample
uni/Uni - Copy (13) - Copy - Copy.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral23
Sample
uni/Uni - Copy (13) - Copy.exe
Resource
win7-20240221-en
Behavioral task
behavioral24
Sample
uni/Uni - Copy (13) - Copy.exe
Resource
win10v2004-20240226-en
Behavioral task
behavioral25
Sample
uni/Uni - Copy (14) - Copy - Copy - Copy.exe
Resource
win7-20240611-en
Behavioral task
behavioral26
Sample
uni/Uni - Copy (14) - Copy - Copy - Copy.exe
Resource
win10v2004-20240611-en
Behavioral task
behavioral27
Sample
uni/Uni - Copy (14) - Copy - Copy.exe
Resource
win7-20240508-en
Behavioral task
behavioral28
Sample
uni/Uni - Copy (14) - Copy - Copy.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral29
Sample
uni/Uni - Copy (14) - Copy.exe
Resource
win7-20240508-en
Behavioral task
behavioral30
Sample
uni/Uni - Copy (14) - Copy.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral31
Sample
uni/Uni - Copy (15) - Copy - Copy - Copy.exe
Resource
win7-20231129-en
General
-
Target
uni/Uni - Copy (13) - Copy - Copy - Copy.exe
-
Size
409KB
-
MD5
b70fdac25a99501e3cae11f1b775249e
-
SHA1
3c59226479bfdcd1b2927bcfb1a7516d4cb8dd71
-
SHA256
51ff3eb450a786c1aaa75ff889f2fd256412a7b75d04277fdf9fcccc20e57246
-
SHA512
43f0d5d6e5f0d5febba537c109ffdbc250bbb6e9725e635a43ec975b0353048eaeee50b6e9274cd5e072ea6b0cea32439bd37408b2528832f467f2075f74ca44
-
SSDEEP
12288:gpbJjGut6AoE3hVVdFaC/eZPTMTDlpgfJCKuMsVs:oVaurMLcDlpRKai
Malware Config
Extracted
quasar
3.1.5
SeroXen
panel-slave.gl.at.ply.gg:57059
panel-slave.gl.at.ply.gg:27892
$Sxr-rpL8EItHN3pqIQQVy2
-
encryption_key
Lme7VBS3l58VwLM69PNM
-
install_name
Client.exe
-
log_directory
Logs
-
reconnect_delay
3000
-
startup_key
SeroXen
-
subdirectory
SubDir
Signatures
-
Quasar payload 2 IoCs
Processes:
resource yara_rule behavioral20/memory/1520-1-0x0000000000510000-0x000000000057C000-memory.dmp family_quasar C:\Users\Admin\AppData\Roaming\SubDir\Client.exe family_quasar -
Checks computer location settings 2 TTPs 15 IoCs
Looks up country code configured in the registry, likely geofence.
Processes:
Client.exeClient.exeClient.exeClient.exeClient.exeClient.exeClient.exeClient.exeClient.exeClient.exeClient.exeClient.exeClient.exeClient.exeClient.exedescription ioc process Key value queried \REGISTRY\USER\S-1-5-21-1181767204-2009306918-3718769404-1000\Control Panel\International\Geo\Nation Client.exe Key value queried \REGISTRY\USER\S-1-5-21-1181767204-2009306918-3718769404-1000\Control Panel\International\Geo\Nation Client.exe Key value queried \REGISTRY\USER\S-1-5-21-1181767204-2009306918-3718769404-1000\Control Panel\International\Geo\Nation Client.exe Key value queried \REGISTRY\USER\S-1-5-21-1181767204-2009306918-3718769404-1000\Control Panel\International\Geo\Nation Client.exe Key value queried \REGISTRY\USER\S-1-5-21-1181767204-2009306918-3718769404-1000\Control Panel\International\Geo\Nation Client.exe Key value queried \REGISTRY\USER\S-1-5-21-1181767204-2009306918-3718769404-1000\Control Panel\International\Geo\Nation Client.exe Key value queried \REGISTRY\USER\S-1-5-21-1181767204-2009306918-3718769404-1000\Control Panel\International\Geo\Nation Client.exe Key value queried \REGISTRY\USER\S-1-5-21-1181767204-2009306918-3718769404-1000\Control Panel\International\Geo\Nation Client.exe Key value queried \REGISTRY\USER\S-1-5-21-1181767204-2009306918-3718769404-1000\Control Panel\International\Geo\Nation Client.exe Key value queried \REGISTRY\USER\S-1-5-21-1181767204-2009306918-3718769404-1000\Control Panel\International\Geo\Nation Client.exe Key value queried \REGISTRY\USER\S-1-5-21-1181767204-2009306918-3718769404-1000\Control Panel\International\Geo\Nation Client.exe Key value queried \REGISTRY\USER\S-1-5-21-1181767204-2009306918-3718769404-1000\Control Panel\International\Geo\Nation Client.exe Key value queried \REGISTRY\USER\S-1-5-21-1181767204-2009306918-3718769404-1000\Control Panel\International\Geo\Nation Client.exe Key value queried \REGISTRY\USER\S-1-5-21-1181767204-2009306918-3718769404-1000\Control Panel\International\Geo\Nation Client.exe Key value queried \REGISTRY\USER\S-1-5-21-1181767204-2009306918-3718769404-1000\Control Panel\International\Geo\Nation Client.exe -
Executes dropped EXE 16 IoCs
Processes:
Client.exeClient.exeClient.exeClient.exeClient.exeClient.exeClient.exeClient.exeClient.exeClient.exeClient.exeClient.exeClient.exeClient.exeClient.exeClient.exepid process 2256 Client.exe 588 Client.exe 4796 Client.exe 4604 Client.exe 4868 Client.exe 4692 Client.exe 1132 Client.exe 4468 Client.exe 2620 Client.exe 3952 Client.exe 2736 Client.exe 2136 Client.exe 1044 Client.exe 2092 Client.exe 4400 Client.exe 1728 Client.exe -
Looks up external IP address via web service 13 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
Processes:
flow ioc 2 ip-api.com 32 ip-api.com 34 ip-api.com 37 ip-api.com 39 ip-api.com 44 ip-api.com 8 api.ipify.org 47 ip-api.com 25 ip-api.com 14 ip-api.com 16 ip-api.com 18 ip-api.com 42 ip-api.com -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Program crash 15 IoCs
Processes:
WerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exepid pid_target process target process 3984 2256 WerFault.exe Client.exe 116 588 WerFault.exe Client.exe 688 4796 WerFault.exe Client.exe 892 4604 WerFault.exe Client.exe 4356 4868 WerFault.exe Client.exe 1660 4692 WerFault.exe Client.exe 3168 1132 WerFault.exe Client.exe 1068 4468 WerFault.exe Client.exe 2984 2620 WerFault.exe Client.exe 3280 3952 WerFault.exe Client.exe 968 2736 WerFault.exe Client.exe 4932 2136 WerFault.exe Client.exe 2032 1044 WerFault.exe Client.exe 2632 2092 WerFault.exe Client.exe 3712 4400 WerFault.exe Client.exe -
Creates scheduled task(s) 1 TTPs 17 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
Processes:
schtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeSCHTASKS.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exepid process 2856 schtasks.exe 3680 schtasks.exe 3408 schtasks.exe 3700 schtasks.exe 564 schtasks.exe 1448 schtasks.exe 2896 schtasks.exe 2168 schtasks.exe 1188 schtasks.exe 4392 SCHTASKS.exe 1576 schtasks.exe 3708 schtasks.exe 3036 schtasks.exe 4528 schtasks.exe 2320 schtasks.exe 5076 schtasks.exe 452 schtasks.exe -
Runs ping.exe 1 TTPs 15 IoCs
Processes:
PING.EXEPING.EXEPING.EXEPING.EXEPING.EXEPING.EXEPING.EXEPING.EXEPING.EXEPING.EXEPING.EXEPING.EXEPING.EXEPING.EXEPING.EXEpid process 4940 PING.EXE 3556 PING.EXE 748 PING.EXE 3880 PING.EXE 2780 PING.EXE 1112 PING.EXE 1480 PING.EXE 4940 PING.EXE 4344 PING.EXE 2764 PING.EXE 1440 PING.EXE 4188 PING.EXE 2108 PING.EXE 1904 PING.EXE 1068 PING.EXE -
Suspicious use of AdjustPrivilegeToken 17 IoCs
Processes:
Uni - Copy (13) - Copy - Copy - Copy.exeClient.exeClient.exeClient.exeClient.exeClient.exeClient.exeClient.exeClient.exeClient.exeClient.exeClient.exeClient.exeClient.exeClient.exeClient.exeClient.exedescription pid process Token: SeDebugPrivilege 1520 Uni - Copy (13) - Copy - Copy - Copy.exe Token: SeDebugPrivilege 2256 Client.exe Token: SeDebugPrivilege 588 Client.exe Token: SeDebugPrivilege 4796 Client.exe Token: SeDebugPrivilege 4604 Client.exe Token: SeDebugPrivilege 4868 Client.exe Token: SeDebugPrivilege 4692 Client.exe Token: SeDebugPrivilege 1132 Client.exe Token: SeDebugPrivilege 4468 Client.exe Token: SeDebugPrivilege 2620 Client.exe Token: SeDebugPrivilege 3952 Client.exe Token: SeDebugPrivilege 2736 Client.exe Token: SeDebugPrivilege 2136 Client.exe Token: SeDebugPrivilege 1044 Client.exe Token: SeDebugPrivilege 2092 Client.exe Token: SeDebugPrivilege 4400 Client.exe Token: SeDebugPrivilege 1728 Client.exe -
Suspicious use of SetWindowsHookEx 15 IoCs
Processes:
Client.exeClient.exeClient.exeClient.exeClient.exeClient.exeClient.exeClient.exeClient.exeClient.exeClient.exeClient.exeClient.exeClient.exeClient.exepid process 2256 Client.exe 588 Client.exe 4796 Client.exe 4604 Client.exe 4868 Client.exe 4692 Client.exe 1132 Client.exe 4468 Client.exe 2620 Client.exe 3952 Client.exe 2736 Client.exe 2136 Client.exe 1044 Client.exe 2092 Client.exe 4400 Client.exe -
Suspicious use of WriteProcessMemory 64 IoCs
Processes:
Uni - Copy (13) - Copy - Copy - Copy.exeClient.execmd.exeClient.execmd.exeClient.execmd.exeClient.execmd.exedescription pid process target process PID 1520 wrote to memory of 4528 1520 Uni - Copy (13) - Copy - Copy - Copy.exe schtasks.exe PID 1520 wrote to memory of 4528 1520 Uni - Copy (13) - Copy - Copy - Copy.exe schtasks.exe PID 1520 wrote to memory of 4528 1520 Uni - Copy (13) - Copy - Copy - Copy.exe schtasks.exe PID 1520 wrote to memory of 2256 1520 Uni - Copy (13) - Copy - Copy - Copy.exe Client.exe PID 1520 wrote to memory of 2256 1520 Uni - Copy (13) - Copy - Copy - Copy.exe Client.exe PID 1520 wrote to memory of 2256 1520 Uni - Copy (13) - Copy - Copy - Copy.exe Client.exe PID 1520 wrote to memory of 4392 1520 Uni - Copy (13) - Copy - Copy - Copy.exe SCHTASKS.exe PID 1520 wrote to memory of 4392 1520 Uni - Copy (13) - Copy - Copy - Copy.exe SCHTASKS.exe PID 1520 wrote to memory of 4392 1520 Uni - Copy (13) - Copy - Copy - Copy.exe SCHTASKS.exe PID 2256 wrote to memory of 2856 2256 Client.exe schtasks.exe PID 2256 wrote to memory of 2856 2256 Client.exe schtasks.exe PID 2256 wrote to memory of 2856 2256 Client.exe schtasks.exe PID 2256 wrote to memory of 1444 2256 Client.exe cmd.exe PID 2256 wrote to memory of 1444 2256 Client.exe cmd.exe PID 2256 wrote to memory of 1444 2256 Client.exe cmd.exe PID 1444 wrote to memory of 3664 1444 cmd.exe chcp.com PID 1444 wrote to memory of 3664 1444 cmd.exe chcp.com PID 1444 wrote to memory of 3664 1444 cmd.exe chcp.com PID 1444 wrote to memory of 3556 1444 cmd.exe PING.EXE PID 1444 wrote to memory of 3556 1444 cmd.exe PING.EXE PID 1444 wrote to memory of 3556 1444 cmd.exe PING.EXE PID 1444 wrote to memory of 588 1444 cmd.exe Client.exe PID 1444 wrote to memory of 588 1444 cmd.exe Client.exe PID 1444 wrote to memory of 588 1444 cmd.exe Client.exe PID 588 wrote to memory of 1448 588 Client.exe schtasks.exe PID 588 wrote to memory of 1448 588 Client.exe schtasks.exe PID 588 wrote to memory of 1448 588 Client.exe schtasks.exe PID 588 wrote to memory of 4404 588 Client.exe cmd.exe PID 588 wrote to memory of 4404 588 Client.exe cmd.exe PID 588 wrote to memory of 4404 588 Client.exe cmd.exe PID 4404 wrote to memory of 884 4404 cmd.exe chcp.com PID 4404 wrote to memory of 884 4404 cmd.exe chcp.com PID 4404 wrote to memory of 884 4404 cmd.exe chcp.com PID 4404 wrote to memory of 4344 4404 cmd.exe PING.EXE PID 4404 wrote to memory of 4344 4404 cmd.exe PING.EXE PID 4404 wrote to memory of 4344 4404 cmd.exe PING.EXE PID 4404 wrote to memory of 4796 4404 cmd.exe Client.exe PID 4404 wrote to memory of 4796 4404 cmd.exe Client.exe PID 4404 wrote to memory of 4796 4404 cmd.exe Client.exe PID 4796 wrote to memory of 2320 4796 Client.exe schtasks.exe PID 4796 wrote to memory of 2320 4796 Client.exe schtasks.exe PID 4796 wrote to memory of 2320 4796 Client.exe schtasks.exe PID 4796 wrote to memory of 4460 4796 Client.exe cmd.exe PID 4796 wrote to memory of 4460 4796 Client.exe cmd.exe PID 4796 wrote to memory of 4460 4796 Client.exe cmd.exe PID 4460 wrote to memory of 4588 4460 cmd.exe chcp.com PID 4460 wrote to memory of 4588 4460 cmd.exe chcp.com PID 4460 wrote to memory of 4588 4460 cmd.exe chcp.com PID 4460 wrote to memory of 748 4460 cmd.exe PING.EXE PID 4460 wrote to memory of 748 4460 cmd.exe PING.EXE PID 4460 wrote to memory of 748 4460 cmd.exe PING.EXE PID 4460 wrote to memory of 4604 4460 cmd.exe Client.exe PID 4460 wrote to memory of 4604 4460 cmd.exe Client.exe PID 4460 wrote to memory of 4604 4460 cmd.exe Client.exe PID 4604 wrote to memory of 3680 4604 Client.exe schtasks.exe PID 4604 wrote to memory of 3680 4604 Client.exe schtasks.exe PID 4604 wrote to memory of 3680 4604 Client.exe schtasks.exe PID 4604 wrote to memory of 4556 4604 Client.exe cmd.exe PID 4604 wrote to memory of 4556 4604 Client.exe cmd.exe PID 4604 wrote to memory of 4556 4604 Client.exe cmd.exe PID 4556 wrote to memory of 816 4556 cmd.exe chcp.com PID 4556 wrote to memory of 816 4556 cmd.exe chcp.com PID 4556 wrote to memory of 816 4556 cmd.exe chcp.com PID 4556 wrote to memory of 2764 4556 cmd.exe PING.EXE
Processes
-
C:\Users\Admin\AppData\Local\Temp\uni\Uni - Copy (13) - Copy - Copy - Copy.exe"C:\Users\Admin\AppData\Local\Temp\uni\Uni - Copy (13) - Copy - Copy - Copy.exe"1⤵
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\schtasks.exe"schtasks" /create /tn "SeroXen" /sc ONLOGON /tr "C:\Users\Admin\AppData\Local\Temp\uni\Uni - Copy (13) - Copy - Copy - Copy.exe" /rl HIGHEST /f2⤵
- Creates scheduled task(s)
-
C:\Users\Admin\AppData\Roaming\SubDir\Client.exe"C:\Users\Admin\AppData\Roaming\SubDir\Client.exe"2⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\schtasks.exe"schtasks" /create /tn "SeroXen" /sc ONLOGON /tr "C:\Users\Admin\AppData\Roaming\SubDir\Client.exe" /rl HIGHEST /f3⤵
- Creates scheduled task(s)
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\EbrJTe830DwZ.bat" "3⤵
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\chcp.comchcp 650014⤵
-
C:\Windows\SysWOW64\PING.EXEping -n 10 localhost4⤵
- Runs ping.exe
-
C:\Users\Admin\AppData\Roaming\SubDir\Client.exe"C:\Users\Admin\AppData\Roaming\SubDir\Client.exe"4⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\schtasks.exe"schtasks" /create /tn "SeroXen" /sc ONLOGON /tr "C:\Users\Admin\AppData\Roaming\SubDir\Client.exe" /rl HIGHEST /f5⤵
- Creates scheduled task(s)
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\YQNarEzVhTTm.bat" "5⤵
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\chcp.comchcp 650016⤵
-
C:\Windows\SysWOW64\PING.EXEping -n 10 localhost6⤵
- Runs ping.exe
-
C:\Users\Admin\AppData\Roaming\SubDir\Client.exe"C:\Users\Admin\AppData\Roaming\SubDir\Client.exe"6⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\schtasks.exe"schtasks" /create /tn "SeroXen" /sc ONLOGON /tr "C:\Users\Admin\AppData\Roaming\SubDir\Client.exe" /rl HIGHEST /f7⤵
- Creates scheduled task(s)
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\VTxv9dLA0wXu.bat" "7⤵
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\chcp.comchcp 650018⤵
-
C:\Windows\SysWOW64\PING.EXEping -n 10 localhost8⤵
- Runs ping.exe
-
C:\Users\Admin\AppData\Roaming\SubDir\Client.exe"C:\Users\Admin\AppData\Roaming\SubDir\Client.exe"8⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\schtasks.exe"schtasks" /create /tn "SeroXen" /sc ONLOGON /tr "C:\Users\Admin\AppData\Roaming\SubDir\Client.exe" /rl HIGHEST /f9⤵
- Creates scheduled task(s)
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\PaU2WUtHDUai.bat" "9⤵
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\chcp.comchcp 6500110⤵
-
C:\Windows\SysWOW64\PING.EXEping -n 10 localhost10⤵
- Runs ping.exe
-
C:\Users\Admin\AppData\Roaming\SubDir\Client.exe"C:\Users\Admin\AppData\Roaming\SubDir\Client.exe"10⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
-
C:\Windows\SysWOW64\schtasks.exe"schtasks" /create /tn "SeroXen" /sc ONLOGON /tr "C:\Users\Admin\AppData\Roaming\SubDir\Client.exe" /rl HIGHEST /f11⤵
- Creates scheduled task(s)
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\xoUK8BVu0Ajb.bat" "11⤵
-
C:\Windows\SysWOW64\chcp.comchcp 6500112⤵
-
C:\Windows\SysWOW64\PING.EXEping -n 10 localhost12⤵
- Runs ping.exe
-
C:\Users\Admin\AppData\Roaming\SubDir\Client.exe"C:\Users\Admin\AppData\Roaming\SubDir\Client.exe"12⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
-
C:\Windows\SysWOW64\schtasks.exe"schtasks" /create /tn "SeroXen" /sc ONLOGON /tr "C:\Users\Admin\AppData\Roaming\SubDir\Client.exe" /rl HIGHEST /f13⤵
- Creates scheduled task(s)
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\hsJBeQroNayY.bat" "13⤵
-
C:\Windows\SysWOW64\chcp.comchcp 6500114⤵
-
C:\Windows\SysWOW64\PING.EXEping -n 10 localhost14⤵
- Runs ping.exe
-
C:\Users\Admin\AppData\Roaming\SubDir\Client.exe"C:\Users\Admin\AppData\Roaming\SubDir\Client.exe"14⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
-
C:\Windows\SysWOW64\schtasks.exe"schtasks" /create /tn "SeroXen" /sc ONLOGON /tr "C:\Users\Admin\AppData\Roaming\SubDir\Client.exe" /rl HIGHEST /f15⤵
- Creates scheduled task(s)
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\oaOgJCBIop2J.bat" "15⤵
-
C:\Windows\SysWOW64\chcp.comchcp 6500116⤵
-
C:\Windows\SysWOW64\PING.EXEping -n 10 localhost16⤵
- Runs ping.exe
-
C:\Users\Admin\AppData\Roaming\SubDir\Client.exe"C:\Users\Admin\AppData\Roaming\SubDir\Client.exe"16⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
-
C:\Windows\SysWOW64\schtasks.exe"schtasks" /create /tn "SeroXen" /sc ONLOGON /tr "C:\Users\Admin\AppData\Roaming\SubDir\Client.exe" /rl HIGHEST /f17⤵
- Creates scheduled task(s)
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\OVc9juTBRjTO.bat" "17⤵
-
C:\Windows\SysWOW64\chcp.comchcp 6500118⤵
-
C:\Windows\SysWOW64\PING.EXEping -n 10 localhost18⤵
- Runs ping.exe
-
C:\Users\Admin\AppData\Roaming\SubDir\Client.exe"C:\Users\Admin\AppData\Roaming\SubDir\Client.exe"18⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
-
C:\Windows\SysWOW64\schtasks.exe"schtasks" /create /tn "SeroXen" /sc ONLOGON /tr "C:\Users\Admin\AppData\Roaming\SubDir\Client.exe" /rl HIGHEST /f19⤵
- Creates scheduled task(s)
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\AaGk2tyPKwQF.bat" "19⤵
-
C:\Windows\SysWOW64\chcp.comchcp 6500120⤵
-
C:\Windows\SysWOW64\PING.EXEping -n 10 localhost20⤵
- Runs ping.exe
-
C:\Users\Admin\AppData\Roaming\SubDir\Client.exe"C:\Users\Admin\AppData\Roaming\SubDir\Client.exe"20⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
-
C:\Windows\SysWOW64\schtasks.exe"schtasks" /create /tn "SeroXen" /sc ONLOGON /tr "C:\Users\Admin\AppData\Roaming\SubDir\Client.exe" /rl HIGHEST /f21⤵
- Creates scheduled task(s)
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\KnV3SsvxS8Nv.bat" "21⤵
-
C:\Windows\SysWOW64\chcp.comchcp 6500122⤵
-
C:\Windows\SysWOW64\PING.EXEping -n 10 localhost22⤵
- Runs ping.exe
-
C:\Users\Admin\AppData\Roaming\SubDir\Client.exe"C:\Users\Admin\AppData\Roaming\SubDir\Client.exe"22⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
-
C:\Windows\SysWOW64\schtasks.exe"schtasks" /create /tn "SeroXen" /sc ONLOGON /tr "C:\Users\Admin\AppData\Roaming\SubDir\Client.exe" /rl HIGHEST /f23⤵
- Creates scheduled task(s)
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\CO6CKoCZY8ta.bat" "23⤵
-
C:\Windows\SysWOW64\chcp.comchcp 6500124⤵
-
C:\Windows\SysWOW64\PING.EXEping -n 10 localhost24⤵
- Runs ping.exe
-
C:\Users\Admin\AppData\Roaming\SubDir\Client.exe"C:\Users\Admin\AppData\Roaming\SubDir\Client.exe"24⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
-
C:\Windows\SysWOW64\schtasks.exe"schtasks" /create /tn "SeroXen" /sc ONLOGON /tr "C:\Users\Admin\AppData\Roaming\SubDir\Client.exe" /rl HIGHEST /f25⤵
- Creates scheduled task(s)
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\2UYXQYs6wAXL.bat" "25⤵
-
C:\Windows\SysWOW64\chcp.comchcp 6500126⤵
-
C:\Windows\SysWOW64\PING.EXEping -n 10 localhost26⤵
- Runs ping.exe
-
C:\Users\Admin\AppData\Roaming\SubDir\Client.exe"C:\Users\Admin\AppData\Roaming\SubDir\Client.exe"26⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
-
C:\Windows\SysWOW64\schtasks.exe"schtasks" /create /tn "SeroXen" /sc ONLOGON /tr "C:\Users\Admin\AppData\Roaming\SubDir\Client.exe" /rl HIGHEST /f27⤵
- Creates scheduled task(s)
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\kUes3bsEth7i.bat" "27⤵
-
C:\Windows\SysWOW64\chcp.comchcp 6500128⤵
-
C:\Windows\SysWOW64\PING.EXEping -n 10 localhost28⤵
- Runs ping.exe
-
C:\Users\Admin\AppData\Roaming\SubDir\Client.exe"C:\Users\Admin\AppData\Roaming\SubDir\Client.exe"28⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
-
C:\Windows\SysWOW64\schtasks.exe"schtasks" /create /tn "SeroXen" /sc ONLOGON /tr "C:\Users\Admin\AppData\Roaming\SubDir\Client.exe" /rl HIGHEST /f29⤵
- Creates scheduled task(s)
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\c5F1vXAqzgeN.bat" "29⤵
-
C:\Windows\SysWOW64\chcp.comchcp 6500130⤵
-
C:\Windows\SysWOW64\PING.EXEping -n 10 localhost30⤵
- Runs ping.exe
-
C:\Users\Admin\AppData\Roaming\SubDir\Client.exe"C:\Users\Admin\AppData\Roaming\SubDir\Client.exe"30⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
-
C:\Windows\SysWOW64\schtasks.exe"schtasks" /create /tn "SeroXen" /sc ONLOGON /tr "C:\Users\Admin\AppData\Roaming\SubDir\Client.exe" /rl HIGHEST /f31⤵
- Creates scheduled task(s)
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\OezrxhlFTfPT.bat" "31⤵
-
C:\Windows\SysWOW64\chcp.comchcp 6500132⤵
-
C:\Windows\SysWOW64\PING.EXEping -n 10 localhost32⤵
- Runs ping.exe
-
C:\Users\Admin\AppData\Roaming\SubDir\Client.exe"C:\Users\Admin\AppData\Roaming\SubDir\Client.exe"32⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4400 -s 219631⤵
- Program crash
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2092 -s 109229⤵
- Program crash
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1044 -s 222827⤵
- Program crash
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2136 -s 223625⤵
- Program crash
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2736 -s 223223⤵
- Program crash
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3952 -s 171221⤵
- Program crash
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2620 -s 109219⤵
- Program crash
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4468 -s 108817⤵
- Program crash
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1132 -s 161615⤵
- Program crash
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4692 -s 109213⤵
- Program crash
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4868 -s 109611⤵
- Program crash
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4604 -s 21969⤵
- Program crash
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4796 -s 16047⤵
- Program crash
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 588 -s 21965⤵
- Program crash
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2256 -s 16483⤵
- Program crash
-
C:\Windows\SysWOW64\SCHTASKS.exe"SCHTASKS.exe" /create /tn "$77Uni - Copy (13) - Copy - Copy - Copy.exe" /tr "'C:\Users\Admin\AppData\Local\Temp\uni\Uni - Copy (13) - Copy - Copy - Copy.exe'" /sc onlogon /rl HIGHEST2⤵
- Creates scheduled task(s)
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=asset_store.mojom.AssetStoreService --lang=en-US --service-sandbox-type=asset_store_service --no-appcompat-clear --field-trial-handle=4316,i,4686244434963378549,11462511444150484980,262144 --variations-seed-version --mojo-platform-channel-handle=1040 /prefetch:81⤵
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 408 -p 2256 -ip 22561⤵
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 528 -p 588 -ip 5881⤵
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 184 -p 4796 -ip 47961⤵
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 184 -p 4604 -ip 46041⤵
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 384 -p 4868 -ip 48681⤵
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 496 -p 4692 -ip 46921⤵
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 496 -p 1132 -ip 11321⤵
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 436 -p 4468 -ip 44681⤵
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 184 -p 2620 -ip 26201⤵
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 524 -p 3952 -ip 39521⤵
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 436 -p 2736 -ip 27361⤵
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 520 -p 2136 -ip 21361⤵
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 536 -p 1044 -ip 10441⤵
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 472 -p 2092 -ip 20921⤵
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 544 -p 4400 -ip 44001⤵
Network
MITRE ATT&CK Matrix ATT&CK v13
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Local\Temp\2UYXQYs6wAXL.batFilesize
207B
MD59f58b0bc70bc634086ad722ca36593cb
SHA1350cda2f13a3de07eb9026108328b3182b335146
SHA2564b79996af7277327716067beddc366bbeb914cd34b1b0293e63f58613854e76a
SHA5128e8f7e3abe8dccbf83e4ff44e498ea875cfb09926c0bd390e00da50ee8bbf4088e85e36c8f0d7bddfed0062a4a32a18d0d3d7d19570511db80fcb776d7af43e9
-
C:\Users\Admin\AppData\Local\Temp\AaGk2tyPKwQF.batFilesize
207B
MD5651f5e0a5c57c367409df2736f562675
SHA19f2f2521a4d2bf00b0c11c1ac1ea7de5343b56e1
SHA256235371639da3382bec4c07f3480864ea8f17051808ddadd7da88cef71e3b3d31
SHA512863af8dafb8d2f2354f90636ba66a21649f02d7d663bcf38af58c6f4d6f53a53ae54d07d270d7e04680ff5ff544c02a981a1f689393861ea7f80102e9f46040b
-
C:\Users\Admin\AppData\Local\Temp\CO6CKoCZY8ta.batFilesize
207B
MD5daf12d3b42e71a0b38f01e1b3686a118
SHA1568fe3fa18bfc86b761235d77c3a081551fa9dd9
SHA256532d25a8495687e0775669380a106df31afd8cabcaacdfd12fb082667e08f23c
SHA512f27cfef085e3da2c901c9290ceae45e175fc97a26a44745cfcf9463869312b26284e03719e1dd03ce6765085fcf672541fe6023d95d83ca9cc714ffb419f6357
-
C:\Users\Admin\AppData\Local\Temp\EbrJTe830DwZ.batFilesize
207B
MD501306112cd555bd26fd8fd474af7ca45
SHA137d4eebf5e8835f3c07ba3eb59fd33fd63e54564
SHA25624226dd1ea6e2b40c3822faa9d876d13a40263850295e7aaa4abcdc7d84e3e50
SHA512ea36dc3a715e8ebd72fb8c7ca901f1a8734535845019e890dda8509e23c5db750daac4b50378bdc30db58349713522275543db5ab362f9889d22b56467bad8da
-
C:\Users\Admin\AppData\Local\Temp\KnV3SsvxS8Nv.batFilesize
207B
MD529b4f81e3fd151a63307f6bf349bfec4
SHA1ed1f3e3ebf46c48ee14f98174823340ce485fcf5
SHA2561cc82c576f9d7b88848999e2f2ab037d65970c8832e73b986a499a463f5b1882
SHA512f9f02f1259671910d8681c0836760eb6f8815c76b222bc5efcb1a111ec6024f1554de0aa53d177481552d368773808bb66185adce77208f9dc13431c517ecb25
-
C:\Users\Admin\AppData\Local\Temp\OVc9juTBRjTO.batFilesize
207B
MD59bfe8b114f279df0ab21b8b041b697fd
SHA1da04acf4fba410e9c9dddd4322e69c16cae20543
SHA256017bd8362a581a129dc4dafd44b024da24b85162509ebb11c39d0c381d3f8a37
SHA51246e600270454dd6d8bd5c041bbb11909b53f3ddcd55af9d1aca6f3c950dbafd12ac10432a45b1b27ca5c45cafa5ce75e71fc0a7e8033c3ec29cb4396d714bd66
-
C:\Users\Admin\AppData\Local\Temp\OezrxhlFTfPT.batFilesize
207B
MD5d9d163a38503c9b3434da1919cd21b84
SHA1db72c85085e66f31072d4cc12c82033ab2c6a8f7
SHA2565f328c5cb31b40cd343f8ec9431f5052157051952dbb1746f4c14301cae9179a
SHA512d76275d6a3f9bbce69f0326cbb407d19ca5d858c6c5b7fee4ac95101ecac28dbbb2f07d6b5b3a4e093870dd38c8c8d34f2b23b66adfecbc2ee3db4c166a53ea6
-
C:\Users\Admin\AppData\Local\Temp\PaU2WUtHDUai.batFilesize
207B
MD5728e13826682bbfcced19a3332569b74
SHA1f01974604fd946bc7379e6f31a6878a3747b7ab6
SHA2566a215b44090e83cca83925fa050988360b7e129359c2b06b266fb33ec1fcc7fd
SHA51203cc0e866e70f0db1426447f79fc802b79695ce2502b90fe1d201b8d72225eecd043342291dbfe4813863237a26f37f26d16078e381e5b8e25cc57b601c445ce
-
C:\Users\Admin\AppData\Local\Temp\VTxv9dLA0wXu.batFilesize
207B
MD55f3fcecacf2905fac58a2e9337a018cc
SHA179e3534d57d789fdb20a401575b1b75ce9ea2033
SHA2560bd65fc501af58219a67b9d1fcbb08db9cdae7e0eed04b57b51702f1d386df6a
SHA51245b504bb392e4bb79c67b19c06ec8558b5f6dd28b104d7a0c5dbeae8761784393269d7fd5e999a0e531cb6fc7cabc43f3d4601102a6307b5b759fe784fb9c004
-
C:\Users\Admin\AppData\Local\Temp\YQNarEzVhTTm.batFilesize
207B
MD578eeb63074443dcedda2ee5e893e37a6
SHA1899b99d0f9358ab4922ec239c6bf8bbb8433cc7c
SHA256ea3bf747b80ef68e1b6b7a8e8c3cd60852e42d77a9e1927427a70fd52f18038a
SHA512e4fe02a4bd4d433f7c9236835373b174eae7e942cc08ff37070e9406a69de2b24c3f0afca72fb336e3771ade0da50ba73af9286806bfea7c6c68df389de49489
-
C:\Users\Admin\AppData\Local\Temp\c5F1vXAqzgeN.batFilesize
207B
MD57bdfd547df71109d9e3b4ca151ac9e25
SHA1700c54c548270f6c8b2b9aa91426982cf3804c03
SHA256cc848740f99520fd67f545397ed81d84330d51044377f93b6adaf954a78b5e12
SHA5120e200382156df18d7d255d5e7b7479a7302da66acb79a3bb3218d6fc559152f0611c0a28b1145c9f95be9ced4daf6e61abb930538756f9d0606c27e34202069e
-
C:\Users\Admin\AppData\Local\Temp\hsJBeQroNayY.batFilesize
207B
MD5ca13d17dd3cddfca21f325c30a223033
SHA19c9e960c6631bf85deee2dce4327f34df0362bbf
SHA256093f5c714e703ee1c7b80294e6fb90d0ca6eb78893d80b7598e2e69c4a41700c
SHA512a44fc4fa2aeff9d8d6cf6a9ab6c93af9693c06255bc469ce48fbaeb631b6474126adb1993e25b1f41537d1ef83e03d8928ae831895b487f1c950768bbcea383d
-
C:\Users\Admin\AppData\Local\Temp\kUes3bsEth7i.batFilesize
207B
MD5a6dcc80494668d9d9a8af51c3d1666f2
SHA1c49b85720113f9c53ee8bcc1d40a90fe53a16313
SHA2565a97e8b4537d6e35e925906b67ed8e1a275d76909ddd3c80299917e09be902af
SHA512179e4c8d0c3414ba17f8e1f4b3954d89dc06ac1b8fa2a7e7654678bff63d606fb6d52a6c837d9ef0430316935870547942e6bc2dc97e93b792584c1620684659
-
C:\Users\Admin\AppData\Local\Temp\oaOgJCBIop2J.batFilesize
207B
MD5de8dda894f8250eecb45979ca077ebd4
SHA12d92a741e0443a2e5c40c0f02026585d014eb528
SHA25672586efb4bdec323f5cf7d4bb597d2c928dd4c68826844b01fb41cc9c055076e
SHA512afbb7a0d8dde3e23b22c5c3c576fb8cd87bc6b35c79d47e986103b78fec23714df067fd5c7ee2d09b17be9298c7c4f9db1e42dd7a4e981df402bc72b4ed89bd9
-
C:\Users\Admin\AppData\Local\Temp\xoUK8BVu0Ajb.batFilesize
207B
MD5619730df4a229b38d88a6137b1d431b7
SHA19688945e96eee27e8a36d97bb805716c6e0f5207
SHA25694c1a3d8bdee0ca8bae566201d1140cfa82731a85abe8cab1b65fdc74644d9eb
SHA512835095d86e9d0d252cbcd09a7dff65f3ddf1a61f0c18e7e0856b79c2cacab1b3057413f0b779fe13e5663e6c7a9cd537be6ec7ebfb668ff7e8517760c448056b
-
C:\Users\Admin\AppData\Roaming\Logs\06-15-2024Filesize
224B
MD54c11015866481eab7a6c96ee1f6b94e1
SHA1907e789b07704eb2101d4d6b9b9c93c1a075f411
SHA2560c1da1ce8247f79240812f35b5453011f739500e142ff59010391a1297b293e1
SHA512b3b046c34f33876365d16d0c37af34f93e301a5d1521fed1f225bee2230b75d40b93c2cdaff44a59e8e6236dcbf8ec47f5fa080447443029ae327f9a51a659a3
-
C:\Users\Admin\AppData\Roaming\Logs\06-15-2024Filesize
224B
MD5422fca6b556e0b71e8c6dbd72674c664
SHA1a455e9c01db1b181e49a9b474a7bf31e911718aa
SHA256e04dfb7055b51b31ad95b15f29b44c7bbdb8b5025037cf955049306dba9940d4
SHA512212189a30018e70735b69e301f4e38c618d23f36324507be9a7dd1a9116608c249fd762d87388d51de9e11c31e8569f4c9ee31ad26df5f1103afaf25531f5f54
-
C:\Users\Admin\AppData\Roaming\Logs\06-15-2024Filesize
224B
MD581f9adff0a19fbf136a990fb6ae8a6ce
SHA1575ce415c97139fc52c3d3eea723cf3481bfb6cc
SHA25681e3b98c7ce99c0d732a01226a86d66d53cab09d33df395a41cbbde3ff334fd1
SHA512f62124ef82e69aa541dcf5c258273a1c0b3e1b8f00dcd6ee4464ae439c5c5083312285fe753878deef938e5a0a450314a05d61ab91c43aa24db1a69944852bb1
-
C:\Users\Admin\AppData\Roaming\Logs\06-15-2024Filesize
224B
MD5c896d9104295f1b4c519230703c7e7de
SHA1025072d64072200029123bb072abeec8b8bbfa0a
SHA256b69a91ba34fd3b7c08181c6f97cada0b24390202e835e9d676da0fd027b3dedd
SHA512d02c4d3ed5debad9db117cc1b7669978b07d61505953cea54572e0aa9c386651a873e8720d5d43232ebd099a26b932ed6ba89eae2a89ad565d79e0e07d0401f8
-
C:\Users\Admin\AppData\Roaming\Logs\06-15-2024Filesize
224B
MD5d2998788c6b3d1cd52c6fdfcbe4917b3
SHA1f3eed960f23889a0768ff069b4309d91b1ea8e4a
SHA256fa93f84e655becfef5b2ef3f0014f78f374c0c28b61f0899989ad3dbfc40a40a
SHA512f869a884bb6debd8875b4d55d96d4b5ee8bb5ac70efc1fc8bc0c541ae09cf280197ef9b2654d6f0835dcdf2c386e271423b8d85159bbe61951d08b8e05c16d5e
-
C:\Users\Admin\AppData\Roaming\Logs\06-15-2024Filesize
224B
MD5ba0bbf3f2d5fd725ed2eb28cb42fd7f2
SHA125aa4258cdc1748f604b738d078dfb61c49a10f0
SHA256913274aa3d7544f1a07ace7c20ad1b2fd63738bbd42272622571022656876afd
SHA512ff121e2cfa579008009905b99e16323c0f9ae8164bd682e41a76a0269688f2601af6a030147df688aeb564be0f0f826b8de6daefc9676746ccb541a11aaa18ca
-
C:\Users\Admin\AppData\Roaming\Logs\06-15-2024MD5
d41d8cd98f00b204e9800998ecf8427e
SHA1da39a3ee5e6b4b0d3255bfef95601890afd80709
SHA256e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855
SHA512cf83e1357eefb8bdf1542850d66d8007d620e4050b5715dc83f4a921d36ce9ce47d0d13c5d85f2b0ff8318d2877eec2f63b931bd47417a81a538327af927da3e
-
C:\Users\Admin\AppData\Roaming\SubDir\Client.exeFilesize
409KB
MD5b70fdac25a99501e3cae11f1b775249e
SHA13c59226479bfdcd1b2927bcfb1a7516d4cb8dd71
SHA25651ff3eb450a786c1aaa75ff889f2fd256412a7b75d04277fdf9fcccc20e57246
SHA51243f0d5d6e5f0d5febba537c109ffdbc250bbb6e9725e635a43ec975b0353048eaeee50b6e9274cd5e072ea6b0cea32439bd37408b2528832f467f2075f74ca44
-
memory/1520-6-0x0000000005560000-0x0000000005572000-memory.dmpFilesize
72KB
-
memory/1520-7-0x000000007503E000-0x000000007503F000-memory.dmpFilesize
4KB
-
memory/1520-1-0x0000000000510000-0x000000000057C000-memory.dmpFilesize
432KB
-
memory/1520-2-0x0000000005590000-0x0000000005B34000-memory.dmpFilesize
5.6MB
-
memory/1520-15-0x0000000075030000-0x00000000757E0000-memory.dmpFilesize
7.7MB
-
memory/1520-3-0x0000000004FE0000-0x0000000005072000-memory.dmpFilesize
584KB
-
memory/1520-8-0x0000000075030000-0x00000000757E0000-memory.dmpFilesize
7.7MB
-
memory/1520-4-0x0000000075030000-0x00000000757E0000-memory.dmpFilesize
7.7MB
-
memory/1520-0-0x000000007503E000-0x000000007503F000-memory.dmpFilesize
4KB
-
memory/1520-5-0x0000000005080000-0x00000000050E6000-memory.dmpFilesize
408KB
-
memory/2256-19-0x00000000066F0000-0x00000000066FA000-memory.dmpFilesize
40KB
-
memory/2256-24-0x0000000075030000-0x00000000757E0000-memory.dmpFilesize
7.7MB
-
memory/2256-16-0x0000000075030000-0x00000000757E0000-memory.dmpFilesize
7.7MB
-
memory/2256-17-0x0000000075030000-0x00000000757E0000-memory.dmpFilesize
7.7MB