Overview
overview
10Static
static
10uni/Uni - ...py.exe
windows7-x64
10uni/Uni - ...py.exe
windows10-2004-x64
10uni/Uni - ...py.exe
windows7-x64
10uni/Uni - ...py.exe
windows10-2004-x64
10uni/Uni - ...py.exe
windows7-x64
10uni/Uni - ...py.exe
windows10-2004-x64
10uni/Uni - ...py.exe
windows7-x64
10uni/Uni - ...py.exe
windows10-2004-x64
10uni/Uni - ...py.exe
windows7-x64
10uni/Uni - ...py.exe
windows10-2004-x64
10uni/Uni - ...py.exe
windows7-x64
10uni/Uni - ...py.exe
windows10-2004-x64
10uni/Uni - ...py.exe
windows7-x64
10uni/Uni - ...py.exe
windows10-2004-x64
10uni/Uni - ...py.exe
windows7-x64
10uni/Uni - ...py.exe
windows10-2004-x64
10uni/Uni - ...py.exe
windows7-x64
10uni/Uni - ...py.exe
windows10-2004-x64
10uni/Uni - ...py.exe
windows7-x64
10uni/Uni - ...py.exe
windows10-2004-x64
10uni/Uni - ...py.exe
windows7-x64
10uni/Uni - ...py.exe
windows10-2004-x64
10uni/Uni - ...py.exe
windows7-x64
10uni/Uni - ...py.exe
windows10-2004-x64
10uni/Uni - ...py.exe
windows7-x64
10uni/Uni - ...py.exe
windows10-2004-x64
10uni/Uni - ...py.exe
windows7-x64
10uni/Uni - ...py.exe
windows10-2004-x64
10uni/Uni - ...py.exe
windows7-x64
10uni/Uni - ...py.exe
windows10-2004-x64
10uni/Uni - ...py.exe
windows7-x64
10uni/Uni - ...py.exe
windows10-2004-x64
10Analysis
-
max time kernel
296s -
max time network
305s -
platform
windows10-2004_x64 -
resource
win10v2004-20240508-en -
resource tags
arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system -
submitted
15-06-2024 07:29
Behavioral task
behavioral1
Sample
uni/Uni - Copy (10) - Copy - Copy - Copy.exe
Resource
win7-20240611-en
Behavioral task
behavioral2
Sample
uni/Uni - Copy (10) - Copy - Copy - Copy.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral3
Sample
uni/Uni - Copy (10) - Copy - Copy.exe
Resource
win7-20240221-en
Behavioral task
behavioral4
Sample
uni/Uni - Copy (10) - Copy - Copy.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral5
Sample
uni/Uni - Copy (10) - Copy.exe
Resource
win7-20240220-en
Behavioral task
behavioral6
Sample
uni/Uni - Copy (10) - Copy.exe
Resource
win10v2004-20240611-en
Behavioral task
behavioral7
Sample
uni/Uni - Copy (11) - Copy - Copy - Copy.exe
Resource
win7-20240611-en
Behavioral task
behavioral8
Sample
uni/Uni - Copy (11) - Copy - Copy - Copy.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral9
Sample
uni/Uni - Copy (11) - Copy - Copy.exe
Resource
win7-20240221-en
Behavioral task
behavioral10
Sample
uni/Uni - Copy (11) - Copy - Copy.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral11
Sample
uni/Uni - Copy (11) - Copy.exe
Resource
win7-20240611-en
Behavioral task
behavioral12
Sample
uni/Uni - Copy (11) - Copy.exe
Resource
win10v2004-20240611-en
Behavioral task
behavioral13
Sample
uni/Uni - Copy (12) - Copy - Copy - Copy.exe
Resource
win7-20240220-en
Behavioral task
behavioral14
Sample
uni/Uni - Copy (12) - Copy - Copy - Copy.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral15
Sample
uni/Uni - Copy (12) - Copy - Copy.exe
Resource
win7-20231129-en
Behavioral task
behavioral16
Sample
uni/Uni - Copy (12) - Copy - Copy.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral17
Sample
uni/Uni - Copy (12) - Copy.exe
Resource
win7-20240611-en
Behavioral task
behavioral18
Sample
uni/Uni - Copy (12) - Copy.exe
Resource
win10v2004-20240611-en
Behavioral task
behavioral19
Sample
uni/Uni - Copy (13) - Copy - Copy - Copy.exe
Resource
win7-20240508-en
Behavioral task
behavioral20
Sample
uni/Uni - Copy (13) - Copy - Copy - Copy.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral21
Sample
uni/Uni - Copy (13) - Copy - Copy.exe
Resource
win7-20240221-en
Behavioral task
behavioral22
Sample
uni/Uni - Copy (13) - Copy - Copy.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral23
Sample
uni/Uni - Copy (13) - Copy.exe
Resource
win7-20240221-en
Behavioral task
behavioral24
Sample
uni/Uni - Copy (13) - Copy.exe
Resource
win10v2004-20240226-en
Behavioral task
behavioral25
Sample
uni/Uni - Copy (14) - Copy - Copy - Copy.exe
Resource
win7-20240611-en
Behavioral task
behavioral26
Sample
uni/Uni - Copy (14) - Copy - Copy - Copy.exe
Resource
win10v2004-20240611-en
Behavioral task
behavioral27
Sample
uni/Uni - Copy (14) - Copy - Copy.exe
Resource
win7-20240508-en
Behavioral task
behavioral28
Sample
uni/Uni - Copy (14) - Copy - Copy.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral29
Sample
uni/Uni - Copy (14) - Copy.exe
Resource
win7-20240508-en
Behavioral task
behavioral30
Sample
uni/Uni - Copy (14) - Copy.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral31
Sample
uni/Uni - Copy (15) - Copy - Copy - Copy.exe
Resource
win7-20231129-en
General
-
Target
uni/Uni - Copy (14) - Copy - Copy.exe
-
Size
409KB
-
MD5
b70fdac25a99501e3cae11f1b775249e
-
SHA1
3c59226479bfdcd1b2927bcfb1a7516d4cb8dd71
-
SHA256
51ff3eb450a786c1aaa75ff889f2fd256412a7b75d04277fdf9fcccc20e57246
-
SHA512
43f0d5d6e5f0d5febba537c109ffdbc250bbb6e9725e635a43ec975b0353048eaeee50b6e9274cd5e072ea6b0cea32439bd37408b2528832f467f2075f74ca44
-
SSDEEP
12288:gpbJjGut6AoE3hVVdFaC/eZPTMTDlpgfJCKuMsVs:oVaurMLcDlpRKai
Malware Config
Extracted
quasar
3.1.5
SeroXen
panel-slave.gl.at.ply.gg:57059
panel-slave.gl.at.ply.gg:27892
$Sxr-rpL8EItHN3pqIQQVy2
-
encryption_key
Lme7VBS3l58VwLM69PNM
-
install_name
Client.exe
-
log_directory
Logs
-
reconnect_delay
3000
-
startup_key
SeroXen
-
subdirectory
SubDir
Signatures
-
Quasar payload 2 IoCs
Processes:
resource yara_rule behavioral28/memory/2824-1-0x0000000000A90000-0x0000000000AFC000-memory.dmp family_quasar C:\Users\Admin\AppData\Roaming\SubDir\Client.exe family_quasar -
Checks computer location settings 2 TTPs 15 IoCs
Looks up country code configured in the registry, likely geofence.
Processes:
Client.exeClient.exeClient.exeClient.exeClient.exeClient.exeClient.exeClient.exeClient.exeClient.exeClient.exeClient.exeClient.exeClient.exeClient.exedescription ioc process Key value queried \REGISTRY\USER\S-1-5-21-1337824034-2731376981-3755436523-1000\Control Panel\International\Geo\Nation Client.exe Key value queried \REGISTRY\USER\S-1-5-21-1337824034-2731376981-3755436523-1000\Control Panel\International\Geo\Nation Client.exe Key value queried \REGISTRY\USER\S-1-5-21-1337824034-2731376981-3755436523-1000\Control Panel\International\Geo\Nation Client.exe Key value queried \REGISTRY\USER\S-1-5-21-1337824034-2731376981-3755436523-1000\Control Panel\International\Geo\Nation Client.exe Key value queried \REGISTRY\USER\S-1-5-21-1337824034-2731376981-3755436523-1000\Control Panel\International\Geo\Nation Client.exe Key value queried \REGISTRY\USER\S-1-5-21-1337824034-2731376981-3755436523-1000\Control Panel\International\Geo\Nation Client.exe Key value queried \REGISTRY\USER\S-1-5-21-1337824034-2731376981-3755436523-1000\Control Panel\International\Geo\Nation Client.exe Key value queried \REGISTRY\USER\S-1-5-21-1337824034-2731376981-3755436523-1000\Control Panel\International\Geo\Nation Client.exe Key value queried \REGISTRY\USER\S-1-5-21-1337824034-2731376981-3755436523-1000\Control Panel\International\Geo\Nation Client.exe Key value queried \REGISTRY\USER\S-1-5-21-1337824034-2731376981-3755436523-1000\Control Panel\International\Geo\Nation Client.exe Key value queried \REGISTRY\USER\S-1-5-21-1337824034-2731376981-3755436523-1000\Control Panel\International\Geo\Nation Client.exe Key value queried \REGISTRY\USER\S-1-5-21-1337824034-2731376981-3755436523-1000\Control Panel\International\Geo\Nation Client.exe Key value queried \REGISTRY\USER\S-1-5-21-1337824034-2731376981-3755436523-1000\Control Panel\International\Geo\Nation Client.exe Key value queried \REGISTRY\USER\S-1-5-21-1337824034-2731376981-3755436523-1000\Control Panel\International\Geo\Nation Client.exe Key value queried \REGISTRY\USER\S-1-5-21-1337824034-2731376981-3755436523-1000\Control Panel\International\Geo\Nation Client.exe -
Executes dropped EXE 15 IoCs
Processes:
Client.exeClient.exeClient.exeClient.exeClient.exeClient.exeClient.exeClient.exeClient.exeClient.exeClient.exeClient.exeClient.exeClient.exeClient.exepid process 4932 Client.exe 892 Client.exe 4656 Client.exe 2900 Client.exe 3512 Client.exe 3680 Client.exe 1016 Client.exe 3936 Client.exe 4648 Client.exe 3496 Client.exe 3680 Client.exe 2348 Client.exe 4824 Client.exe 2412 Client.exe 224 Client.exe -
Looks up external IP address via web service 13 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
Processes:
flow ioc 28 ip-api.com 24 ip-api.com 32 ip-api.com 34 ip-api.com 18 ip-api.com 20 ip-api.com 26 ip-api.com 30 ip-api.com 3 ip-api.com 11 api.ipify.org 16 ip-api.com 22 ip-api.com 36 ip-api.com -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Program crash 15 IoCs
Processes:
WerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exepid pid_target process target process 4336 4932 WerFault.exe Client.exe 2300 892 WerFault.exe Client.exe 2348 4656 WerFault.exe Client.exe 8 2900 WerFault.exe Client.exe 2260 3512 WerFault.exe Client.exe 1484 3680 WerFault.exe Client.exe 3276 1016 WerFault.exe Client.exe 760 3936 WerFault.exe Client.exe 3208 4648 WerFault.exe Client.exe 676 3496 WerFault.exe Client.exe 2336 3680 WerFault.exe Client.exe 2756 2348 WerFault.exe Client.exe 4336 4824 WerFault.exe Client.exe 1344 2412 WerFault.exe Client.exe 4596 224 WerFault.exe Client.exe -
Creates scheduled task(s) 1 TTPs 17 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
Processes:
schtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeSCHTASKS.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exepid process 760 schtasks.exe 2656 schtasks.exe 2396 schtasks.exe 4484 schtasks.exe 4968 schtasks.exe 1920 SCHTASKS.exe 436 schtasks.exe 1208 schtasks.exe 624 schtasks.exe 2052 schtasks.exe 2848 schtasks.exe 4632 schtasks.exe 1752 schtasks.exe 2824 schtasks.exe 1572 schtasks.exe 1760 schtasks.exe 3100 schtasks.exe -
Runs ping.exe 1 TTPs 15 IoCs
Processes:
PING.EXEPING.EXEPING.EXEPING.EXEPING.EXEPING.EXEPING.EXEPING.EXEPING.EXEPING.EXEPING.EXEPING.EXEPING.EXEPING.EXEPING.EXEpid process 2668 PING.EXE 2384 PING.EXE 3904 PING.EXE 4968 PING.EXE 756 PING.EXE 4420 PING.EXE 4356 PING.EXE 4256 PING.EXE 1376 PING.EXE 3704 PING.EXE 988 PING.EXE 2148 PING.EXE 5064 PING.EXE 892 PING.EXE 4080 PING.EXE -
Suspicious use of AdjustPrivilegeToken 16 IoCs
Processes:
Uni - Copy (14) - Copy - Copy.exeClient.exeClient.exeClient.exeClient.exeClient.exeClient.exeClient.exeClient.exeClient.exeClient.exeClient.exeClient.exeClient.exeClient.exeClient.exedescription pid process Token: SeDebugPrivilege 2824 Uni - Copy (14) - Copy - Copy.exe Token: SeDebugPrivilege 4932 Client.exe Token: SeDebugPrivilege 892 Client.exe Token: SeDebugPrivilege 4656 Client.exe Token: SeDebugPrivilege 2900 Client.exe Token: SeDebugPrivilege 3512 Client.exe Token: SeDebugPrivilege 3680 Client.exe Token: SeDebugPrivilege 1016 Client.exe Token: SeDebugPrivilege 3936 Client.exe Token: SeDebugPrivilege 4648 Client.exe Token: SeDebugPrivilege 3496 Client.exe Token: SeDebugPrivilege 3680 Client.exe Token: SeDebugPrivilege 2348 Client.exe Token: SeDebugPrivilege 4824 Client.exe Token: SeDebugPrivilege 2412 Client.exe Token: SeDebugPrivilege 224 Client.exe -
Suspicious use of SetWindowsHookEx 15 IoCs
Processes:
Client.exeClient.exeClient.exeClient.exeClient.exeClient.exeClient.exeClient.exeClient.exeClient.exeClient.exeClient.exeClient.exeClient.exeClient.exepid process 4932 Client.exe 892 Client.exe 4656 Client.exe 2900 Client.exe 3512 Client.exe 3680 Client.exe 1016 Client.exe 3936 Client.exe 4648 Client.exe 3496 Client.exe 3680 Client.exe 2348 Client.exe 4824 Client.exe 2412 Client.exe 224 Client.exe -
Suspicious use of WriteProcessMemory 64 IoCs
Processes:
Uni - Copy (14) - Copy - Copy.exeClient.execmd.exeClient.execmd.exeClient.execmd.exeClient.execmd.exedescription pid process target process PID 2824 wrote to memory of 760 2824 Uni - Copy (14) - Copy - Copy.exe schtasks.exe PID 2824 wrote to memory of 760 2824 Uni - Copy (14) - Copy - Copy.exe schtasks.exe PID 2824 wrote to memory of 760 2824 Uni - Copy (14) - Copy - Copy.exe schtasks.exe PID 2824 wrote to memory of 4932 2824 Uni - Copy (14) - Copy - Copy.exe Client.exe PID 2824 wrote to memory of 4932 2824 Uni - Copy (14) - Copy - Copy.exe Client.exe PID 2824 wrote to memory of 4932 2824 Uni - Copy (14) - Copy - Copy.exe Client.exe PID 2824 wrote to memory of 1920 2824 Uni - Copy (14) - Copy - Copy.exe SCHTASKS.exe PID 2824 wrote to memory of 1920 2824 Uni - Copy (14) - Copy - Copy.exe SCHTASKS.exe PID 2824 wrote to memory of 1920 2824 Uni - Copy (14) - Copy - Copy.exe SCHTASKS.exe PID 4932 wrote to memory of 436 4932 Client.exe schtasks.exe PID 4932 wrote to memory of 436 4932 Client.exe schtasks.exe PID 4932 wrote to memory of 436 4932 Client.exe schtasks.exe PID 4932 wrote to memory of 1512 4932 Client.exe cmd.exe PID 4932 wrote to memory of 1512 4932 Client.exe cmd.exe PID 4932 wrote to memory of 1512 4932 Client.exe cmd.exe PID 1512 wrote to memory of 4776 1512 cmd.exe chcp.com PID 1512 wrote to memory of 4776 1512 cmd.exe chcp.com PID 1512 wrote to memory of 4776 1512 cmd.exe chcp.com PID 1512 wrote to memory of 1376 1512 cmd.exe PING.EXE PID 1512 wrote to memory of 1376 1512 cmd.exe PING.EXE PID 1512 wrote to memory of 1376 1512 cmd.exe PING.EXE PID 1512 wrote to memory of 892 1512 cmd.exe Client.exe PID 1512 wrote to memory of 892 1512 cmd.exe Client.exe PID 1512 wrote to memory of 892 1512 cmd.exe Client.exe PID 892 wrote to memory of 1760 892 Client.exe schtasks.exe PID 892 wrote to memory of 1760 892 Client.exe schtasks.exe PID 892 wrote to memory of 1760 892 Client.exe schtasks.exe PID 892 wrote to memory of 1680 892 Client.exe cmd.exe PID 892 wrote to memory of 1680 892 Client.exe cmd.exe PID 892 wrote to memory of 1680 892 Client.exe cmd.exe PID 1680 wrote to memory of 2244 1680 cmd.exe chcp.com PID 1680 wrote to memory of 2244 1680 cmd.exe chcp.com PID 1680 wrote to memory of 2244 1680 cmd.exe chcp.com PID 1680 wrote to memory of 2148 1680 cmd.exe PING.EXE PID 1680 wrote to memory of 2148 1680 cmd.exe PING.EXE PID 1680 wrote to memory of 2148 1680 cmd.exe PING.EXE PID 1680 wrote to memory of 4656 1680 cmd.exe Client.exe PID 1680 wrote to memory of 4656 1680 cmd.exe Client.exe PID 1680 wrote to memory of 4656 1680 cmd.exe Client.exe PID 4656 wrote to memory of 2656 4656 Client.exe schtasks.exe PID 4656 wrote to memory of 2656 4656 Client.exe schtasks.exe PID 4656 wrote to memory of 2656 4656 Client.exe schtasks.exe PID 4656 wrote to memory of 752 4656 Client.exe cmd.exe PID 4656 wrote to memory of 752 4656 Client.exe cmd.exe PID 4656 wrote to memory of 752 4656 Client.exe cmd.exe PID 752 wrote to memory of 2704 752 cmd.exe chcp.com PID 752 wrote to memory of 2704 752 cmd.exe chcp.com PID 752 wrote to memory of 2704 752 cmd.exe chcp.com PID 752 wrote to memory of 4420 752 cmd.exe PING.EXE PID 752 wrote to memory of 4420 752 cmd.exe PING.EXE PID 752 wrote to memory of 4420 752 cmd.exe PING.EXE PID 752 wrote to memory of 2900 752 cmd.exe Client.exe PID 752 wrote to memory of 2900 752 cmd.exe Client.exe PID 752 wrote to memory of 2900 752 cmd.exe Client.exe PID 2900 wrote to memory of 1208 2900 Client.exe schtasks.exe PID 2900 wrote to memory of 1208 2900 Client.exe schtasks.exe PID 2900 wrote to memory of 1208 2900 Client.exe schtasks.exe PID 2900 wrote to memory of 828 2900 Client.exe cmd.exe PID 2900 wrote to memory of 828 2900 Client.exe cmd.exe PID 2900 wrote to memory of 828 2900 Client.exe cmd.exe PID 828 wrote to memory of 4668 828 cmd.exe chcp.com PID 828 wrote to memory of 4668 828 cmd.exe chcp.com PID 828 wrote to memory of 4668 828 cmd.exe chcp.com PID 828 wrote to memory of 2668 828 cmd.exe PING.EXE
Processes
-
C:\Users\Admin\AppData\Local\Temp\uni\Uni - Copy (14) - Copy - Copy.exe"C:\Users\Admin\AppData\Local\Temp\uni\Uni - Copy (14) - Copy - Copy.exe"1⤵
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\schtasks.exe"schtasks" /create /tn "SeroXen" /sc ONLOGON /tr "C:\Users\Admin\AppData\Local\Temp\uni\Uni - Copy (14) - Copy - Copy.exe" /rl HIGHEST /f2⤵
- Creates scheduled task(s)
-
C:\Users\Admin\AppData\Roaming\SubDir\Client.exe"C:\Users\Admin\AppData\Roaming\SubDir\Client.exe"2⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\schtasks.exe"schtasks" /create /tn "SeroXen" /sc ONLOGON /tr "C:\Users\Admin\AppData\Roaming\SubDir\Client.exe" /rl HIGHEST /f3⤵
- Creates scheduled task(s)
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\bsLPUktLY3Hx.bat" "3⤵
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\chcp.comchcp 650014⤵
-
C:\Windows\SysWOW64\PING.EXEping -n 10 localhost4⤵
- Runs ping.exe
-
C:\Users\Admin\AppData\Roaming\SubDir\Client.exe"C:\Users\Admin\AppData\Roaming\SubDir\Client.exe"4⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\schtasks.exe"schtasks" /create /tn "SeroXen" /sc ONLOGON /tr "C:\Users\Admin\AppData\Roaming\SubDir\Client.exe" /rl HIGHEST /f5⤵
- Creates scheduled task(s)
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\cYZaJkYbOGaA.bat" "5⤵
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\chcp.comchcp 650016⤵
-
C:\Windows\SysWOW64\PING.EXEping -n 10 localhost6⤵
- Runs ping.exe
-
C:\Users\Admin\AppData\Roaming\SubDir\Client.exe"C:\Users\Admin\AppData\Roaming\SubDir\Client.exe"6⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\schtasks.exe"schtasks" /create /tn "SeroXen" /sc ONLOGON /tr "C:\Users\Admin\AppData\Roaming\SubDir\Client.exe" /rl HIGHEST /f7⤵
- Creates scheduled task(s)
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\VAvtvPTdvrj3.bat" "7⤵
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\chcp.comchcp 650018⤵
-
C:\Windows\SysWOW64\PING.EXEping -n 10 localhost8⤵
- Runs ping.exe
-
C:\Users\Admin\AppData\Roaming\SubDir\Client.exe"C:\Users\Admin\AppData\Roaming\SubDir\Client.exe"8⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\schtasks.exe"schtasks" /create /tn "SeroXen" /sc ONLOGON /tr "C:\Users\Admin\AppData\Roaming\SubDir\Client.exe" /rl HIGHEST /f9⤵
- Creates scheduled task(s)
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\YLJtVbjzS2vA.bat" "9⤵
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\chcp.comchcp 6500110⤵
-
C:\Windows\SysWOW64\PING.EXEping -n 10 localhost10⤵
- Runs ping.exe
-
C:\Users\Admin\AppData\Roaming\SubDir\Client.exe"C:\Users\Admin\AppData\Roaming\SubDir\Client.exe"10⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
-
C:\Windows\SysWOW64\schtasks.exe"schtasks" /create /tn "SeroXen" /sc ONLOGON /tr "C:\Users\Admin\AppData\Roaming\SubDir\Client.exe" /rl HIGHEST /f11⤵
- Creates scheduled task(s)
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\lxsGmWXMgiw7.bat" "11⤵
-
C:\Windows\SysWOW64\chcp.comchcp 6500112⤵
-
C:\Windows\SysWOW64\PING.EXEping -n 10 localhost12⤵
- Runs ping.exe
-
C:\Users\Admin\AppData\Roaming\SubDir\Client.exe"C:\Users\Admin\AppData\Roaming\SubDir\Client.exe"12⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
-
C:\Windows\SysWOW64\schtasks.exe"schtasks" /create /tn "SeroXen" /sc ONLOGON /tr "C:\Users\Admin\AppData\Roaming\SubDir\Client.exe" /rl HIGHEST /f13⤵
- Creates scheduled task(s)
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\TPs1Yukx1Cfu.bat" "13⤵
-
C:\Windows\SysWOW64\chcp.comchcp 6500114⤵
-
C:\Windows\SysWOW64\PING.EXEping -n 10 localhost14⤵
- Runs ping.exe
-
C:\Users\Admin\AppData\Roaming\SubDir\Client.exe"C:\Users\Admin\AppData\Roaming\SubDir\Client.exe"14⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
-
C:\Windows\SysWOW64\schtasks.exe"schtasks" /create /tn "SeroXen" /sc ONLOGON /tr "C:\Users\Admin\AppData\Roaming\SubDir\Client.exe" /rl HIGHEST /f15⤵
- Creates scheduled task(s)
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\P1IuCbBtdzsU.bat" "15⤵
-
C:\Windows\SysWOW64\chcp.comchcp 6500116⤵
-
C:\Windows\SysWOW64\PING.EXEping -n 10 localhost16⤵
- Runs ping.exe
-
C:\Users\Admin\AppData\Roaming\SubDir\Client.exe"C:\Users\Admin\AppData\Roaming\SubDir\Client.exe"16⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
-
C:\Windows\SysWOW64\schtasks.exe"schtasks" /create /tn "SeroXen" /sc ONLOGON /tr "C:\Users\Admin\AppData\Roaming\SubDir\Client.exe" /rl HIGHEST /f17⤵
- Creates scheduled task(s)
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\vvidqYJTk5ce.bat" "17⤵
-
C:\Windows\SysWOW64\chcp.comchcp 6500118⤵
-
C:\Windows\SysWOW64\PING.EXEping -n 10 localhost18⤵
- Runs ping.exe
-
C:\Users\Admin\AppData\Roaming\SubDir\Client.exe"C:\Users\Admin\AppData\Roaming\SubDir\Client.exe"18⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
-
C:\Windows\SysWOW64\schtasks.exe"schtasks" /create /tn "SeroXen" /sc ONLOGON /tr "C:\Users\Admin\AppData\Roaming\SubDir\Client.exe" /rl HIGHEST /f19⤵
- Creates scheduled task(s)
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\bQeAiOhWzeJ7.bat" "19⤵
-
C:\Windows\SysWOW64\chcp.comchcp 6500120⤵
-
C:\Windows\SysWOW64\PING.EXEping -n 10 localhost20⤵
- Runs ping.exe
-
C:\Users\Admin\AppData\Roaming\SubDir\Client.exe"C:\Users\Admin\AppData\Roaming\SubDir\Client.exe"20⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
-
C:\Windows\SysWOW64\schtasks.exe"schtasks" /create /tn "SeroXen" /sc ONLOGON /tr "C:\Users\Admin\AppData\Roaming\SubDir\Client.exe" /rl HIGHEST /f21⤵
- Creates scheduled task(s)
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\HvahaF5aFD0a.bat" "21⤵
-
C:\Windows\SysWOW64\chcp.comchcp 6500122⤵
-
C:\Windows\SysWOW64\PING.EXEping -n 10 localhost22⤵
- Runs ping.exe
-
C:\Users\Admin\AppData\Roaming\SubDir\Client.exe"C:\Users\Admin\AppData\Roaming\SubDir\Client.exe"22⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
-
C:\Windows\SysWOW64\schtasks.exe"schtasks" /create /tn "SeroXen" /sc ONLOGON /tr "C:\Users\Admin\AppData\Roaming\SubDir\Client.exe" /rl HIGHEST /f23⤵
- Creates scheduled task(s)
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\6VN6eRDspOpL.bat" "23⤵
-
C:\Windows\SysWOW64\chcp.comchcp 6500124⤵
-
C:\Windows\SysWOW64\PING.EXEping -n 10 localhost24⤵
- Runs ping.exe
-
C:\Users\Admin\AppData\Roaming\SubDir\Client.exe"C:\Users\Admin\AppData\Roaming\SubDir\Client.exe"24⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
-
C:\Windows\SysWOW64\schtasks.exe"schtasks" /create /tn "SeroXen" /sc ONLOGON /tr "C:\Users\Admin\AppData\Roaming\SubDir\Client.exe" /rl HIGHEST /f25⤵
- Creates scheduled task(s)
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\PJ7DIIRu64jJ.bat" "25⤵
-
C:\Windows\SysWOW64\chcp.comchcp 6500126⤵
-
C:\Windows\SysWOW64\PING.EXEping -n 10 localhost26⤵
- Runs ping.exe
-
C:\Users\Admin\AppData\Roaming\SubDir\Client.exe"C:\Users\Admin\AppData\Roaming\SubDir\Client.exe"26⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
-
C:\Windows\SysWOW64\schtasks.exe"schtasks" /create /tn "SeroXen" /sc ONLOGON /tr "C:\Users\Admin\AppData\Roaming\SubDir\Client.exe" /rl HIGHEST /f27⤵
- Creates scheduled task(s)
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\ebumODtYAx3T.bat" "27⤵
-
C:\Windows\SysWOW64\chcp.comchcp 6500128⤵
-
C:\Windows\SysWOW64\PING.EXEping -n 10 localhost28⤵
- Runs ping.exe
-
C:\Users\Admin\AppData\Roaming\SubDir\Client.exe"C:\Users\Admin\AppData\Roaming\SubDir\Client.exe"28⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
-
C:\Windows\SysWOW64\schtasks.exe"schtasks" /create /tn "SeroXen" /sc ONLOGON /tr "C:\Users\Admin\AppData\Roaming\SubDir\Client.exe" /rl HIGHEST /f29⤵
- Creates scheduled task(s)
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\K6qJG4HbQWkv.bat" "29⤵
-
C:\Windows\SysWOW64\chcp.comchcp 6500130⤵
-
C:\Windows\SysWOW64\PING.EXEping -n 10 localhost30⤵
- Runs ping.exe
-
C:\Users\Admin\AppData\Roaming\SubDir\Client.exe"C:\Users\Admin\AppData\Roaming\SubDir\Client.exe"30⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
-
C:\Windows\SysWOW64\schtasks.exe"schtasks" /create /tn "SeroXen" /sc ONLOGON /tr "C:\Users\Admin\AppData\Roaming\SubDir\Client.exe" /rl HIGHEST /f31⤵
- Creates scheduled task(s)
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\VNp8YFZvzbMB.bat" "31⤵
-
C:\Windows\SysWOW64\chcp.comchcp 6500132⤵
-
C:\Windows\SysWOW64\PING.EXEping -n 10 localhost32⤵
- Runs ping.exe
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 224 -s 224831⤵
- Program crash
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2412 -s 222429⤵
- Program crash
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4824 -s 223227⤵
- Program crash
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2348 -s 170825⤵
- Program crash
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3680 -s 222423⤵
- Program crash
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3496 -s 223621⤵
- Program crash
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4648 -s 219619⤵
- Program crash
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3936 -s 170817⤵
- Program crash
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1016 -s 225215⤵
- Program crash
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3680 -s 109213⤵
- Program crash
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3512 -s 219611⤵
- Program crash
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2900 -s 16089⤵
- Program crash
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4656 -s 16127⤵
- Program crash
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 892 -s 16085⤵
- Program crash
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4932 -s 16403⤵
- Program crash
-
C:\Windows\SysWOW64\SCHTASKS.exe"SCHTASKS.exe" /create /tn "$77Uni - Copy (14) - Copy - Copy.exe" /tr "'C:\Users\Admin\AppData\Local\Temp\uni\Uni - Copy (14) - Copy - Copy.exe'" /sc onlogon /rl HIGHEST2⤵
- Creates scheduled task(s)
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 420 -p 4932 -ip 49321⤵
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 416 -p 892 -ip 8921⤵
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 532 -p 4656 -ip 46561⤵
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 556 -p 2900 -ip 29001⤵
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 520 -p 3512 -ip 35121⤵
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 544 -p 3680 -ip 36801⤵
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 532 -p 1016 -ip 10161⤵
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 532 -p 3936 -ip 39361⤵
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 532 -p 4648 -ip 46481⤵
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 556 -p 3496 -ip 34961⤵
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 484 -p 3680 -ip 36801⤵
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 544 -p 2348 -ip 23481⤵
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 516 -p 4824 -ip 48241⤵
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 484 -p 2412 -ip 24121⤵
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 520 -p 224 -ip 2241⤵
Network
MITRE ATT&CK Matrix ATT&CK v13
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Local\Temp\6VN6eRDspOpL.batFilesize
207B
MD5fa29c15bc88c1fee2a6e9c8777282e49
SHA15a43c79c0b2cec68eb50a89e671e3a4c874a8e01
SHA2565462c39edaa04478ac04eb7f7a589a21a631fec4179372fc17fde5610396cf75
SHA512aa09388d492c36384005f75ff93bee76904a2b539254ca238abeaa3ed4a1852614886e24dfbd40cfc0b45e46d6630e54dab44b9802f1707c9dc3cf0c91e348c2
-
C:\Users\Admin\AppData\Local\Temp\HvahaF5aFD0a.batFilesize
207B
MD5e8ae4a8486145d1d5cde320406d0e6f8
SHA1ec428e2e37c7ff612f15d92cff812bb0b719aa0f
SHA2566c9f64ad29933d10250a447987122c4876731bc7801544db5ace8c3ad91f09dd
SHA512baf86956d2011404a9c4b4405c739a53e9c28d59dec35f2c983040bec4d53ea115666a85bf846bd316a0a009a57cf5174704c211853258940b7bdaa65ef0734e
-
C:\Users\Admin\AppData\Local\Temp\K6qJG4HbQWkv.batFilesize
207B
MD5f1cb578283fecdf46338492fe3dbd295
SHA166ddc80062e1ec9a225d2bfbee0e603d57498f6d
SHA25613c5346ae1caea145df5d2a9f1ba26c49c9d637ecefe68229d25418d8e9b2b5e
SHA512e49696e41704936a71e04e0012c50c671a3820d2f329e90dbcfa5b7cc24965f9242eb2a644ac47aa851fe212d056bc374b380565af06a5ceeb83bc436a9b153e
-
C:\Users\Admin\AppData\Local\Temp\P1IuCbBtdzsU.batFilesize
207B
MD5a1121975abac3b96a80d35be667621c7
SHA1379dc8e11f25400f67fa704109ae171c985e03aa
SHA256b838c261fed1418d5b2dada6a8a9e827ec927eb8cf216b8559d9416dbd09c5df
SHA51200b0527bf67ab1d277a2d9786f3f41afec096d7eeebf8bae338892f5cd4d82d6deb7075a7b7b1b320d1717b78aa3a0b8e943d801da144a6867fb77d12ac41434
-
C:\Users\Admin\AppData\Local\Temp\PJ7DIIRu64jJ.batFilesize
207B
MD56a68cf7d80c3f15c9435d592c9e189ae
SHA11d17f971f94eed79b8854875f9d40464c7530422
SHA25601e52e5d484266474c7b3b5c7a8f29e810c0501e5891eef2084ec4b747a7c312
SHA5122240b625d3af0b4b71008b1660ac8b90de275844e4ed5632b2adce1a2e634bd8d8ef29e2729481f8c3ef07336971211093575e264f4c972724142ab8cc48e773
-
C:\Users\Admin\AppData\Local\Temp\TPs1Yukx1Cfu.batFilesize
207B
MD56879fee7a7c79d6053445210a8de8f44
SHA1de5b063f0f686e8af718a0a9171b1fe4a2c4d4a8
SHA25642fb3f8b671379c78b1df8777fdc3a4ded592b7b1385ac7a434e8b1826d558aa
SHA512e349cc6d98ba5cf3449db952064e60f06114a4b53b15a3719d590e720d669592a4e01c8f938744be329c49a3f64ebdfed2543870b44985c4346bc4b02c67171c
-
C:\Users\Admin\AppData\Local\Temp\VAvtvPTdvrj3.batFilesize
207B
MD588abcc22d36754c6dde0252c263229e4
SHA1205534d408772f8b946b540fa77317e4b04073ba
SHA256871aa9c605aad7369cc7aff1d1b0d14768d4f486856d9c4eeae74539ca164249
SHA512ded405ac018e47f3f15e06029166f69f2fe38393197c65978b16d1842aae82cd136a338e609c6a2c065abf06f7f87f3c6e23853e01b2b4d61b9cfe8bce993065
-
C:\Users\Admin\AppData\Local\Temp\VNp8YFZvzbMB.batFilesize
207B
MD54be25e9916f82917706eff4fc5451e64
SHA133d5c50374ffc7ba798f416faf06f0f46576fb45
SHA25625a64a1c9f0e9b440af463e6a4a209823a4d883580d7ecff194d826b90c752d0
SHA51269df3be123659a04fc7d6ac5046966604e1f8160c6d7450ad24d737b4ba7a5239b92d99bba6f5935262f557c678f83d10c64e68109a081a507c1d371348c1ffa
-
C:\Users\Admin\AppData\Local\Temp\YLJtVbjzS2vA.batFilesize
207B
MD56d9b9aec0b39867c868ae1ce69a7863f
SHA13c170cb7b090e86b07b197d7501df78e19ea73b3
SHA25628be0d7364a3693c3d5888446b8da03bdeaff324210be82ca7d8c28c6febfd0c
SHA512211d81e06a1310614146818b82cb4c552a46555770d96924bffb100152a31cbd9bf3c3f42c32a4d289a53f53b6ede4e49771a130be6616f2dbd3f09bf73c27f0
-
C:\Users\Admin\AppData\Local\Temp\bQeAiOhWzeJ7.batFilesize
207B
MD533d43761861510dea04da9b3f4459e01
SHA17d7b1ad6e6bfabe315477d1a62f73c5224f1b837
SHA2566f010bc58449f84f8456ca22b134076bc0ab82bd162cd2b4d2ae05f5af260a06
SHA5123db0b5db2a4351ab46d6ae034f78f32499a33ce7b4fd39f72fc4938d795ba4089c2ad4f6462e691990314e2e451e94b6db2b7db395e520a9940ad29e14ba1107
-
C:\Users\Admin\AppData\Local\Temp\bsLPUktLY3Hx.batFilesize
207B
MD5e5f1cc853503a610ada273793e7de878
SHA15ade44e0b989d92346743326954db6af9b37232d
SHA25655b8b9c53f0f5f2230cda4f1d80150de191b3ff65c34a2550b19288e67571d09
SHA512aa17907f319c7b8128395abab492aa3a1fd26125de0735a19c6b3de12f294dcad57fd6faca4d1e42262417694619d358e6edf23a3ecc32d5be15dbfd80bca413
-
C:\Users\Admin\AppData\Local\Temp\cYZaJkYbOGaA.batFilesize
207B
MD5f1325231cd5bae084ed42032656d62e5
SHA1f231c4bdc516dedc7a955e31c4795fbf05362d83
SHA25605aabc5147d50cc17ca14eb8d7c12ee40d726849468c1b8b6a3fa9d16f41fc52
SHA51258475241739df0b9b2634e282e5c64667626a5dfb00f74fcbe5e69aa397db21cc1b2527a6d66bf845ed3c4db02299bbb435d22aae9652d88291d3951bf7b77df
-
C:\Users\Admin\AppData\Local\Temp\ebumODtYAx3T.batFilesize
207B
MD54e38e13fda93eac168dd9aec3f32c507
SHA1ce6c92d2a8e581ed14f2214048e9474d7a94adf3
SHA256f10ea0ced4c4769874fcdcbece9b0597219c94d98445bdbc406c74a775412dd1
SHA512b705519debfee96019377635e6c93786eac6742aaf6ebc6d527656b29de7d5160df57afc7a415baa45f47393f642e842ef518b4a5713b275fd3d7101399146e1
-
C:\Users\Admin\AppData\Local\Temp\lxsGmWXMgiw7.batFilesize
207B
MD5144025ab35a57877a34d467892238d80
SHA1273ca1acd2279ad0bf6853ce630bbb815777b885
SHA256e4edbfb8acafcfb6708830b3807bc245598fb41f9e0c3622edf9e146dc673683
SHA512a5a491f052e19c35b8dec495fc955da4d1126c4a4b1c8cb60fdf304001783981c837d2ba435e1297191dd30488dc635e6101776dea53a2d355933d77fd37ce4b
-
C:\Users\Admin\AppData\Local\Temp\vvidqYJTk5ce.batFilesize
207B
MD5ab61d086591627c1dd11194e6fd9f775
SHA1432091c0da6389c247238d3edfcababa0d931495
SHA25639082e4a556ef6b14935dac38936b0658a7e7bded64162577742328d819ec6c6
SHA512ae48b7af0696f440a43cff63ff11ad1754a8299881a69b3a0980b3598f3f1a8f68d372dd49a64632b203e891fd8b425747a625a66988002e8dc5c6e581380691
-
C:\Users\Admin\AppData\Roaming\Logs\06-15-2024Filesize
224B
MD539857ca3a21b43b533c1a4ade2204c4f
SHA1da61bf9fa038c96a45f995af7d43c3dc77ce9e91
SHA2561bdee5adbb44f98054d0d50b7caf5fc47251e889122024796de02fc5c11621b9
SHA512d26aebcd08b4de512660079d3cbd093e548fb16842c0d2b4295f86b2167137c74deb924c7e0dac85763242307e233e1636f103528cc83d05824047f48b36fd9a
-
C:\Users\Admin\AppData\Roaming\Logs\06-15-2024Filesize
224B
MD562d2938290718846efba0b142d752b92
SHA1356ac168007a9187de834bbcbe811baf1f179087
SHA256f3b6332708f026a34300bd06babe5f02fe0167a085b24e2096b4eb262e9feb31
SHA51287fbc20c10a4d382de6e9fcf49c970f672381285d4a9bf5e011386debd0585f2826934d8651d5e850b667b0d521c0e141988b17fef28cd09ab7069186a57558a
-
C:\Users\Admin\AppData\Roaming\Logs\06-15-2024Filesize
224B
MD5c3678b61735d5b60f496a7a35bea5b47
SHA18b8f37c23499f7e39ff146d3d50fcfe6796da9ac
SHA256feb801b7e59eae7552a95858278935ba95c5be14dfcec2481eb2b627159d8b3a
SHA512a3aaca65dbae08ce66186564f36010bfbf77c77ff74cf6ba27cef63aea8f85ce7ff8bb0b97a20be6293fc2e1c4e782f209f8066a230e8d24aa54d25b6ef95770
-
C:\Users\Admin\AppData\Roaming\Logs\06-15-2024Filesize
224B
MD5b85913bb3dd1b3bf6479c161f9aec592
SHA1b7bb438732ecb1e681dbf6d0242af6d58dab2ca8
SHA2560687a867b4a89b54a4d886a9cbddb60e6aede461a41f018b945c6fb11628ff5b
SHA512d5b8abc53a3bdc89ad18c3ebe9b0ab66ac3f28d8c2071e9567717c6e4e9e5b087150cdd611f8e2f002b41b6aec4a97aac5cb4baf0bc4021e9006f7b8fc790282
-
C:\Users\Admin\AppData\Roaming\Logs\06-15-2024Filesize
224B
MD53bd40f41f0ec6727600c62b35dd03258
SHA12d7315a7437cdd5e00a8007ca6240a1809b6a10f
SHA2560a4d18a791a17c72305543bb59eda7c431b24cec3ef0785938bf6de0bb5f384d
SHA512380a30b80b9948b5fe22c477c75594b9012cb31970b547f8b324b78d23d0fe564c0307130a531bf501059b0f8284603289ee488539b3d729bfaf82d1245c2959
-
C:\Users\Admin\AppData\Roaming\Logs\06-15-2024Filesize
224B
MD5f81ef3aeff862169bf754a3541a0518f
SHA1bf3109862ac669c7c7a5de51fa14984f88dc0191
SHA25681d8806e9bfd53bddc074ac97e4232dd3d22b02e15bfd6a3904caa46e97f6faa
SHA5126382e4d0b592cf9f248f6cb7ee369bb8319533e69e94a763ff1d70e51d94317cc8adf3b8b8b60166830281f5c517e5bbe8c776bdb3a78106ad93f9177530e740
-
C:\Users\Admin\AppData\Roaming\Logs\06-15-2024MD5
d41d8cd98f00b204e9800998ecf8427e
SHA1da39a3ee5e6b4b0d3255bfef95601890afd80709
SHA256e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855
SHA512cf83e1357eefb8bdf1542850d66d8007d620e4050b5715dc83f4a921d36ce9ce47d0d13c5d85f2b0ff8318d2877eec2f63b931bd47417a81a538327af927da3e
-
C:\Users\Admin\AppData\Roaming\Logs\06-15-2024Filesize
224B
MD5e460c04f5451d4cbfdef6a7a530423f5
SHA12584cd8e8f397e5e7337fcaadaf613c9177aaf59
SHA25621a0510318102e04b677d2b0d040792532bbc809de28844f87e3d498413b3c54
SHA512a5b09717535e2e6547f6486a4b91fbb2d795369b94d9ca6547dfef83777564045932cb4fe2cb92b156245877dfa358ade26d6b1dea038b50fdc5d602b29893d0
-
C:\Users\Admin\AppData\Roaming\Logs\06-15-2024Filesize
224B
MD543a856880652307be0ffe2e49ad3d37e
SHA15a601ccd6f0609c4cda951d8f6023af0a117b131
SHA256954cf5dc92d514d08918448561577e260f8f894ced6b3a3b2ffd234b78f1a069
SHA5127f629a6a8796d9bf9823ce851cef39deff9255957bbbcdb34072f35c2ffb627ee5be2f81107aba39ad59db32ef9bf743b3d843a8f51c01e6110275458abfd14c
-
C:\Users\Admin\AppData\Roaming\Logs\06-15-2024Filesize
224B
MD549c16a9494913ebcf8dfc9978fc4a09e
SHA1f660e0d47ea1597ff07c942857805227b37aa748
SHA25605b738b79aa07754f300a4bf718d253b2d7436fdfb4c829ad9ae23e27c63c58b
SHA5123a926a2d7c9737dfc5158157710723c813584860b5d33e033545e0a40387883597bcdb2f7bb55983807f30a4f3bfb6c44ef502a662891defe54d2c7c996a60e2
-
C:\Users\Admin\AppData\Roaming\SubDir\Client.exeFilesize
409KB
MD5b70fdac25a99501e3cae11f1b775249e
SHA13c59226479bfdcd1b2927bcfb1a7516d4cb8dd71
SHA25651ff3eb450a786c1aaa75ff889f2fd256412a7b75d04277fdf9fcccc20e57246
SHA51243f0d5d6e5f0d5febba537c109ffdbc250bbb6e9725e635a43ec975b0353048eaeee50b6e9274cd5e072ea6b0cea32439bd37408b2528832f467f2075f74ca44
-
memory/2824-5-0x0000000005610000-0x0000000005676000-memory.dmpFilesize
408KB
-
memory/2824-4-0x00000000748C0000-0x0000000075070000-memory.dmpFilesize
7.7MB
-
memory/2824-1-0x0000000000A90000-0x0000000000AFC000-memory.dmpFilesize
432KB
-
memory/2824-2-0x0000000005A60000-0x0000000006004000-memory.dmpFilesize
5.6MB
-
memory/2824-3-0x0000000005570000-0x0000000005602000-memory.dmpFilesize
584KB
-
memory/2824-8-0x00000000748C0000-0x0000000075070000-memory.dmpFilesize
7.7MB
-
memory/2824-16-0x00000000748C0000-0x0000000075070000-memory.dmpFilesize
7.7MB
-
memory/2824-7-0x00000000748CE000-0x00000000748CF000-memory.dmpFilesize
4KB
-
memory/2824-6-0x0000000006210000-0x0000000006222000-memory.dmpFilesize
72KB
-
memory/2824-0-0x00000000748CE000-0x00000000748CF000-memory.dmpFilesize
4KB
-
memory/4932-24-0x00000000748C0000-0x0000000075070000-memory.dmpFilesize
7.7MB
-
memory/4932-19-0x0000000006570000-0x000000000657A000-memory.dmpFilesize
40KB
-
memory/4932-17-0x00000000748C0000-0x0000000075070000-memory.dmpFilesize
7.7MB
-
memory/4932-15-0x00000000748C0000-0x0000000075070000-memory.dmpFilesize
7.7MB