Overview
overview
10Static
static
10uni/Uni - ...py.exe
windows7-x64
10uni/Uni - ...py.exe
windows10-2004-x64
10uni/Uni - ...py.exe
windows7-x64
10uni/Uni - ...py.exe
windows10-2004-x64
10uni/Uni - ...py.exe
windows7-x64
10uni/Uni - ...py.exe
windows10-2004-x64
10uni/Uni - ...py.exe
windows7-x64
10uni/Uni - ...py.exe
windows10-2004-x64
10uni/Uni - ...py.exe
windows7-x64
10uni/Uni - ...py.exe
windows10-2004-x64
10uni/Uni - ...py.exe
windows7-x64
10uni/Uni - ...py.exe
windows10-2004-x64
10uni/Uni - ...py.exe
windows7-x64
10uni/Uni - ...py.exe
windows10-2004-x64
10uni/Uni - ...py.exe
windows7-x64
10uni/Uni - ...py.exe
windows10-2004-x64
10uni/Uni - ...py.exe
windows7-x64
10uni/Uni - ...py.exe
windows10-2004-x64
10uni/Uni - ...py.exe
windows7-x64
10uni/Uni - ...py.exe
windows10-2004-x64
10uni/Uni - ...py.exe
windows7-x64
10uni/Uni - ...py.exe
windows10-2004-x64
10uni/Uni - ...py.exe
windows7-x64
10uni/Uni - ...py.exe
windows10-2004-x64
10uni/Uni - ...py.exe
windows7-x64
10uni/Uni - ...py.exe
windows10-2004-x64
10uni/Uni - ...py.exe
windows7-x64
10uni/Uni - ...py.exe
windows10-2004-x64
10uni/Uni - ...py.exe
windows7-x64
10uni/Uni - ...py.exe
windows10-2004-x64
10uni/Uni - ...py.exe
windows7-x64
10uni/Uni - ...py.exe
windows10-2004-x64
10Analysis
-
max time kernel
298s -
max time network
302s -
platform
windows10-2004_x64 -
resource
win10v2004-20240508-en -
resource tags
arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system -
submitted
15-06-2024 07:30
Behavioral task
behavioral1
Sample
uni/Uni - Copy (10) - Copy - Copy - Copy.exe
Resource
win7-20240508-en
Behavioral task
behavioral2
Sample
uni/Uni - Copy (10) - Copy - Copy - Copy.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral3
Sample
uni/Uni - Copy (10) - Copy - Copy.exe
Resource
win7-20240611-en
Behavioral task
behavioral4
Sample
uni/Uni - Copy (10) - Copy - Copy.exe
Resource
win10v2004-20240611-en
Behavioral task
behavioral5
Sample
uni/Uni - Copy (10) - Copy.exe
Resource
win7-20240508-en
Behavioral task
behavioral6
Sample
uni/Uni - Copy (10) - Copy.exe
Resource
win10v2004-20240226-en
Behavioral task
behavioral7
Sample
uni/Uni - Copy (11) - Copy - Copy - Copy.exe
Resource
win7-20240221-en
Behavioral task
behavioral8
Sample
uni/Uni - Copy (11) - Copy - Copy - Copy.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral9
Sample
uni/Uni - Copy (11) - Copy - Copy.exe
Resource
win7-20240508-en
Behavioral task
behavioral10
Sample
uni/Uni - Copy (11) - Copy - Copy.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral11
Sample
uni/Uni - Copy (11) - Copy.exe
Resource
win7-20240221-en
Behavioral task
behavioral12
Sample
uni/Uni - Copy (11) - Copy.exe
Resource
win10v2004-20240611-en
Behavioral task
behavioral13
Sample
uni/Uni - Copy (12) - Copy - Copy - Copy.exe
Resource
win7-20240611-en
Behavioral task
behavioral14
Sample
uni/Uni - Copy (12) - Copy - Copy - Copy.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral15
Sample
uni/Uni - Copy (12) - Copy - Copy.exe
Resource
win7-20240508-en
Behavioral task
behavioral16
Sample
uni/Uni - Copy (12) - Copy - Copy.exe
Resource
win10v2004-20240611-en
Behavioral task
behavioral17
Sample
uni/Uni - Copy (12) - Copy.exe
Resource
win7-20231129-en
Behavioral task
behavioral18
Sample
uni/Uni - Copy (12) - Copy.exe
Resource
win10v2004-20240611-en
Behavioral task
behavioral19
Sample
uni/Uni - Copy (13) - Copy - Copy - Copy.exe
Resource
win7-20240611-en
Behavioral task
behavioral20
Sample
uni/Uni - Copy (13) - Copy - Copy - Copy.exe
Resource
win10v2004-20240611-en
Behavioral task
behavioral21
Sample
uni/Uni - Copy (13) - Copy - Copy.exe
Resource
win7-20240611-en
Behavioral task
behavioral22
Sample
uni/Uni - Copy (13) - Copy - Copy.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral23
Sample
uni/Uni - Copy (13) - Copy.exe
Resource
win7-20240508-en
Behavioral task
behavioral24
Sample
uni/Uni - Copy (13) - Copy.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral25
Sample
uni/Uni - Copy (14) - Copy - Copy - Copy.exe
Resource
win7-20240611-en
Behavioral task
behavioral26
Sample
uni/Uni - Copy (14) - Copy - Copy - Copy.exe
Resource
win10v2004-20240226-en
Behavioral task
behavioral27
Sample
uni/Uni - Copy (14) - Copy - Copy.exe
Resource
win7-20231129-en
Behavioral task
behavioral28
Sample
uni/Uni - Copy (14) - Copy - Copy.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral29
Sample
uni/Uni - Copy (14) - Copy.exe
Resource
win7-20240611-en
Behavioral task
behavioral30
Sample
uni/Uni - Copy (14) - Copy.exe
Resource
win10v2004-20240611-en
Behavioral task
behavioral31
Sample
uni/Uni - Copy (15) - Copy - Copy - Copy.exe
Resource
win7-20240508-en
Behavioral task
behavioral32
Sample
uni/Uni - Copy (15) - Copy - Copy - Copy.exe
Resource
win10v2004-20240508-en
General
-
Target
uni/Uni - Copy (13) - Copy.exe
-
Size
409KB
-
MD5
b70fdac25a99501e3cae11f1b775249e
-
SHA1
3c59226479bfdcd1b2927bcfb1a7516d4cb8dd71
-
SHA256
51ff3eb450a786c1aaa75ff889f2fd256412a7b75d04277fdf9fcccc20e57246
-
SHA512
43f0d5d6e5f0d5febba537c109ffdbc250bbb6e9725e635a43ec975b0353048eaeee50b6e9274cd5e072ea6b0cea32439bd37408b2528832f467f2075f74ca44
-
SSDEEP
12288:gpbJjGut6AoE3hVVdFaC/eZPTMTDlpgfJCKuMsVs:oVaurMLcDlpRKai
Malware Config
Extracted
quasar
3.1.5
SeroXen
panel-slave.gl.at.ply.gg:57059
panel-slave.gl.at.ply.gg:27892
$Sxr-rpL8EItHN3pqIQQVy2
-
encryption_key
Lme7VBS3l58VwLM69PNM
-
install_name
Client.exe
-
log_directory
Logs
-
reconnect_delay
3000
-
startup_key
SeroXen
-
subdirectory
SubDir
Signatures
-
Quasar payload 2 IoCs
Processes:
resource yara_rule behavioral24/memory/2408-1-0x0000000000600000-0x000000000066C000-memory.dmp family_quasar C:\Users\Admin\AppData\Roaming\SubDir\Client.exe family_quasar -
Checks computer location settings 2 TTPs 15 IoCs
Looks up country code configured in the registry, likely geofence.
Processes:
Client.exeClient.exeClient.exeClient.exeClient.exeClient.exeClient.exeClient.exeClient.exeClient.exeClient.exeClient.exeClient.exeClient.exeClient.exedescription ioc process Key value queried \REGISTRY\USER\S-1-5-21-1337824034-2731376981-3755436523-1000\Control Panel\International\Geo\Nation Client.exe Key value queried \REGISTRY\USER\S-1-5-21-1337824034-2731376981-3755436523-1000\Control Panel\International\Geo\Nation Client.exe Key value queried \REGISTRY\USER\S-1-5-21-1337824034-2731376981-3755436523-1000\Control Panel\International\Geo\Nation Client.exe Key value queried \REGISTRY\USER\S-1-5-21-1337824034-2731376981-3755436523-1000\Control Panel\International\Geo\Nation Client.exe Key value queried \REGISTRY\USER\S-1-5-21-1337824034-2731376981-3755436523-1000\Control Panel\International\Geo\Nation Client.exe Key value queried \REGISTRY\USER\S-1-5-21-1337824034-2731376981-3755436523-1000\Control Panel\International\Geo\Nation Client.exe Key value queried \REGISTRY\USER\S-1-5-21-1337824034-2731376981-3755436523-1000\Control Panel\International\Geo\Nation Client.exe Key value queried \REGISTRY\USER\S-1-5-21-1337824034-2731376981-3755436523-1000\Control Panel\International\Geo\Nation Client.exe Key value queried \REGISTRY\USER\S-1-5-21-1337824034-2731376981-3755436523-1000\Control Panel\International\Geo\Nation Client.exe Key value queried \REGISTRY\USER\S-1-5-21-1337824034-2731376981-3755436523-1000\Control Panel\International\Geo\Nation Client.exe Key value queried \REGISTRY\USER\S-1-5-21-1337824034-2731376981-3755436523-1000\Control Panel\International\Geo\Nation Client.exe Key value queried \REGISTRY\USER\S-1-5-21-1337824034-2731376981-3755436523-1000\Control Panel\International\Geo\Nation Client.exe Key value queried \REGISTRY\USER\S-1-5-21-1337824034-2731376981-3755436523-1000\Control Panel\International\Geo\Nation Client.exe Key value queried \REGISTRY\USER\S-1-5-21-1337824034-2731376981-3755436523-1000\Control Panel\International\Geo\Nation Client.exe Key value queried \REGISTRY\USER\S-1-5-21-1337824034-2731376981-3755436523-1000\Control Panel\International\Geo\Nation Client.exe -
Executes dropped EXE 15 IoCs
Processes:
Client.exeClient.exeClient.exeClient.exeClient.exeClient.exeClient.exeClient.exeClient.exeClient.exeClient.exeClient.exeClient.exeClient.exeClient.exepid process 1756 Client.exe 1276 Client.exe 412 Client.exe 1236 Client.exe 2472 Client.exe 5056 Client.exe 1340 Client.exe 1960 Client.exe 2020 Client.exe 936 Client.exe 3192 Client.exe 3404 Client.exe 3084 Client.exe 1688 Client.exe 4216 Client.exe -
Adds Run key to start application 2 TTPs 1 IoCs
Processes:
Client.exedescription ioc process Set value (str) \REGISTRY\USER\S-1-5-21-1337824034-2731376981-3755436523-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\SeroXen = "\"C:\\Users\\Admin\\AppData\\Roaming\\SubDir\\Client.exe\"" Client.exe -
Looks up external IP address via web service 13 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
Processes:
flow ioc 20 ip-api.com 32 ip-api.com 16 ip-api.com 39 ip-api.com 27 ip-api.com 35 ip-api.com 3 ip-api.com 11 api.ipify.org 22 ip-api.com 37 ip-api.com 18 ip-api.com 25 ip-api.com 30 ip-api.com -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Program crash 15 IoCs
Processes:
WerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exepid pid_target process target process 1932 1756 WerFault.exe Client.exe 2740 1276 WerFault.exe Client.exe 4872 412 WerFault.exe Client.exe 1116 1236 WerFault.exe Client.exe 2696 2472 WerFault.exe Client.exe 2256 5056 WerFault.exe Client.exe 2844 1340 WerFault.exe Client.exe 5064 1960 WerFault.exe Client.exe 3320 2020 WerFault.exe Client.exe 3952 936 WerFault.exe Client.exe 4720 3192 WerFault.exe Client.exe 2060 3404 WerFault.exe Client.exe 3100 3084 WerFault.exe Client.exe 4556 1688 WerFault.exe Client.exe 3016 4216 WerFault.exe Client.exe -
Creates scheduled task(s) 1 TTPs 17 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
Processes:
schtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeSCHTASKS.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exepid process 3020 schtasks.exe 2900 schtasks.exe 3208 schtasks.exe 4676 schtasks.exe 3920 schtasks.exe 2760 schtasks.exe 2968 schtasks.exe 3652 schtasks.exe 4460 SCHTASKS.exe 548 schtasks.exe 4848 schtasks.exe 5084 schtasks.exe 3696 schtasks.exe 1384 schtasks.exe 3380 schtasks.exe 1668 schtasks.exe 1668 schtasks.exe -
Runs ping.exe 1 TTPs 15 IoCs
Processes:
PING.EXEPING.EXEPING.EXEPING.EXEPING.EXEPING.EXEPING.EXEPING.EXEPING.EXEPING.EXEPING.EXEPING.EXEPING.EXEPING.EXEPING.EXEpid process 4024 PING.EXE 468 PING.EXE 2356 PING.EXE 3568 PING.EXE 512 PING.EXE 3368 PING.EXE 1076 PING.EXE 4156 PING.EXE 4248 PING.EXE 4496 PING.EXE 3192 PING.EXE 1580 PING.EXE 3176 PING.EXE 1516 PING.EXE 1508 PING.EXE -
Suspicious use of AdjustPrivilegeToken 16 IoCs
Processes:
Uni - Copy (13) - Copy.exeClient.exeClient.exeClient.exeClient.exeClient.exeClient.exeClient.exeClient.exeClient.exeClient.exeClient.exeClient.exeClient.exeClient.exeClient.exedescription pid process Token: SeDebugPrivilege 2408 Uni - Copy (13) - Copy.exe Token: SeDebugPrivilege 1756 Client.exe Token: SeDebugPrivilege 1276 Client.exe Token: SeDebugPrivilege 412 Client.exe Token: SeDebugPrivilege 1236 Client.exe Token: SeDebugPrivilege 2472 Client.exe Token: SeDebugPrivilege 5056 Client.exe Token: SeDebugPrivilege 1340 Client.exe Token: SeDebugPrivilege 1960 Client.exe Token: SeDebugPrivilege 2020 Client.exe Token: SeDebugPrivilege 936 Client.exe Token: SeDebugPrivilege 3192 Client.exe Token: SeDebugPrivilege 3404 Client.exe Token: SeDebugPrivilege 3084 Client.exe Token: SeDebugPrivilege 1688 Client.exe Token: SeDebugPrivilege 4216 Client.exe -
Suspicious use of SetWindowsHookEx 15 IoCs
Processes:
Client.exeClient.exeClient.exeClient.exeClient.exeClient.exeClient.exeClient.exeClient.exeClient.exeClient.exeClient.exeClient.exeClient.exeClient.exepid process 1756 Client.exe 1276 Client.exe 412 Client.exe 1236 Client.exe 2472 Client.exe 5056 Client.exe 1340 Client.exe 1960 Client.exe 2020 Client.exe 936 Client.exe 3192 Client.exe 3404 Client.exe 3084 Client.exe 1688 Client.exe 4216 Client.exe -
Suspicious use of WriteProcessMemory 64 IoCs
Processes:
Uni - Copy (13) - Copy.exeClient.execmd.exeClient.execmd.exeClient.execmd.exeClient.execmd.exedescription pid process target process PID 2408 wrote to memory of 1384 2408 Uni - Copy (13) - Copy.exe schtasks.exe PID 2408 wrote to memory of 1384 2408 Uni - Copy (13) - Copy.exe schtasks.exe PID 2408 wrote to memory of 1384 2408 Uni - Copy (13) - Copy.exe schtasks.exe PID 2408 wrote to memory of 1756 2408 Uni - Copy (13) - Copy.exe Client.exe PID 2408 wrote to memory of 1756 2408 Uni - Copy (13) - Copy.exe Client.exe PID 2408 wrote to memory of 1756 2408 Uni - Copy (13) - Copy.exe Client.exe PID 2408 wrote to memory of 4460 2408 Uni - Copy (13) - Copy.exe SCHTASKS.exe PID 2408 wrote to memory of 4460 2408 Uni - Copy (13) - Copy.exe SCHTASKS.exe PID 2408 wrote to memory of 4460 2408 Uni - Copy (13) - Copy.exe SCHTASKS.exe PID 1756 wrote to memory of 548 1756 Client.exe schtasks.exe PID 1756 wrote to memory of 548 1756 Client.exe schtasks.exe PID 1756 wrote to memory of 548 1756 Client.exe schtasks.exe PID 1756 wrote to memory of 1344 1756 Client.exe cmd.exe PID 1756 wrote to memory of 1344 1756 Client.exe cmd.exe PID 1756 wrote to memory of 1344 1756 Client.exe cmd.exe PID 1344 wrote to memory of 4004 1344 cmd.exe chcp.com PID 1344 wrote to memory of 4004 1344 cmd.exe chcp.com PID 1344 wrote to memory of 4004 1344 cmd.exe chcp.com PID 1344 wrote to memory of 1516 1344 cmd.exe PING.EXE PID 1344 wrote to memory of 1516 1344 cmd.exe PING.EXE PID 1344 wrote to memory of 1516 1344 cmd.exe PING.EXE PID 1344 wrote to memory of 1276 1344 cmd.exe Client.exe PID 1344 wrote to memory of 1276 1344 cmd.exe Client.exe PID 1344 wrote to memory of 1276 1344 cmd.exe Client.exe PID 1276 wrote to memory of 3920 1276 Client.exe schtasks.exe PID 1276 wrote to memory of 3920 1276 Client.exe schtasks.exe PID 1276 wrote to memory of 3920 1276 Client.exe schtasks.exe PID 1276 wrote to memory of 5016 1276 Client.exe cmd.exe PID 1276 wrote to memory of 5016 1276 Client.exe cmd.exe PID 1276 wrote to memory of 5016 1276 Client.exe cmd.exe PID 5016 wrote to memory of 5088 5016 cmd.exe chcp.com PID 5016 wrote to memory of 5088 5016 cmd.exe chcp.com PID 5016 wrote to memory of 5088 5016 cmd.exe chcp.com PID 5016 wrote to memory of 4024 5016 cmd.exe PING.EXE PID 5016 wrote to memory of 4024 5016 cmd.exe PING.EXE PID 5016 wrote to memory of 4024 5016 cmd.exe PING.EXE PID 5016 wrote to memory of 412 5016 cmd.exe Client.exe PID 5016 wrote to memory of 412 5016 cmd.exe Client.exe PID 5016 wrote to memory of 412 5016 cmd.exe Client.exe PID 412 wrote to memory of 3020 412 Client.exe schtasks.exe PID 412 wrote to memory of 3020 412 Client.exe schtasks.exe PID 412 wrote to memory of 3020 412 Client.exe schtasks.exe PID 412 wrote to memory of 4916 412 Client.exe cmd.exe PID 412 wrote to memory of 4916 412 Client.exe cmd.exe PID 412 wrote to memory of 4916 412 Client.exe cmd.exe PID 4916 wrote to memory of 716 4916 cmd.exe chcp.com PID 4916 wrote to memory of 716 4916 cmd.exe chcp.com PID 4916 wrote to memory of 716 4916 cmd.exe chcp.com PID 4916 wrote to memory of 4496 4916 cmd.exe PING.EXE PID 4916 wrote to memory of 4496 4916 cmd.exe PING.EXE PID 4916 wrote to memory of 4496 4916 cmd.exe PING.EXE PID 4916 wrote to memory of 1236 4916 cmd.exe Client.exe PID 4916 wrote to memory of 1236 4916 cmd.exe Client.exe PID 4916 wrote to memory of 1236 4916 cmd.exe Client.exe PID 1236 wrote to memory of 2900 1236 Client.exe schtasks.exe PID 1236 wrote to memory of 2900 1236 Client.exe schtasks.exe PID 1236 wrote to memory of 2900 1236 Client.exe schtasks.exe PID 1236 wrote to memory of 452 1236 Client.exe cmd.exe PID 1236 wrote to memory of 452 1236 Client.exe cmd.exe PID 1236 wrote to memory of 452 1236 Client.exe cmd.exe PID 452 wrote to memory of 4724 452 cmd.exe chcp.com PID 452 wrote to memory of 4724 452 cmd.exe chcp.com PID 452 wrote to memory of 4724 452 cmd.exe chcp.com PID 452 wrote to memory of 468 452 cmd.exe PING.EXE
Processes
-
C:\Users\Admin\AppData\Local\Temp\uni\Uni - Copy (13) - Copy.exe"C:\Users\Admin\AppData\Local\Temp\uni\Uni - Copy (13) - Copy.exe"1⤵
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\schtasks.exe"schtasks" /create /tn "SeroXen" /sc ONLOGON /tr "C:\Users\Admin\AppData\Local\Temp\uni\Uni - Copy (13) - Copy.exe" /rl HIGHEST /f2⤵
- Creates scheduled task(s)
-
C:\Users\Admin\AppData\Roaming\SubDir\Client.exe"C:\Users\Admin\AppData\Roaming\SubDir\Client.exe"2⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\schtasks.exe"schtasks" /create /tn "SeroXen" /sc ONLOGON /tr "C:\Users\Admin\AppData\Roaming\SubDir\Client.exe" /rl HIGHEST /f3⤵
- Creates scheduled task(s)
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\V03PYytV1Bgh.bat" "3⤵
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\chcp.comchcp 650014⤵
-
C:\Windows\SysWOW64\PING.EXEping -n 10 localhost4⤵
- Runs ping.exe
-
C:\Users\Admin\AppData\Roaming\SubDir\Client.exe"C:\Users\Admin\AppData\Roaming\SubDir\Client.exe"4⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\schtasks.exe"schtasks" /create /tn "SeroXen" /sc ONLOGON /tr "C:\Users\Admin\AppData\Roaming\SubDir\Client.exe" /rl HIGHEST /f5⤵
- Creates scheduled task(s)
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\olpA3MPBIYXK.bat" "5⤵
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\chcp.comchcp 650016⤵
-
C:\Windows\SysWOW64\PING.EXEping -n 10 localhost6⤵
- Runs ping.exe
-
C:\Users\Admin\AppData\Roaming\SubDir\Client.exe"C:\Users\Admin\AppData\Roaming\SubDir\Client.exe"6⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\schtasks.exe"schtasks" /create /tn "SeroXen" /sc ONLOGON /tr "C:\Users\Admin\AppData\Roaming\SubDir\Client.exe" /rl HIGHEST /f7⤵
- Creates scheduled task(s)
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\C8El6LET7fd1.bat" "7⤵
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\chcp.comchcp 650018⤵
-
C:\Windows\SysWOW64\PING.EXEping -n 10 localhost8⤵
- Runs ping.exe
-
C:\Users\Admin\AppData\Roaming\SubDir\Client.exe"C:\Users\Admin\AppData\Roaming\SubDir\Client.exe"8⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\schtasks.exe"schtasks" /create /tn "SeroXen" /sc ONLOGON /tr "C:\Users\Admin\AppData\Roaming\SubDir\Client.exe" /rl HIGHEST /f9⤵
- Creates scheduled task(s)
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\MMEEG1pSgSDv.bat" "9⤵
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\chcp.comchcp 6500110⤵
-
C:\Windows\SysWOW64\PING.EXEping -n 10 localhost10⤵
- Runs ping.exe
-
C:\Users\Admin\AppData\Roaming\SubDir\Client.exe"C:\Users\Admin\AppData\Roaming\SubDir\Client.exe"10⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
-
C:\Windows\SysWOW64\schtasks.exe"schtasks" /create /tn "SeroXen" /sc ONLOGON /tr "C:\Users\Admin\AppData\Roaming\SubDir\Client.exe" /rl HIGHEST /f11⤵
- Creates scheduled task(s)
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\rZQm5zHmxLeu.bat" "11⤵
-
C:\Windows\SysWOW64\chcp.comchcp 6500112⤵
-
C:\Windows\SysWOW64\PING.EXEping -n 10 localhost12⤵
- Runs ping.exe
-
C:\Users\Admin\AppData\Roaming\SubDir\Client.exe"C:\Users\Admin\AppData\Roaming\SubDir\Client.exe"12⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
-
C:\Windows\SysWOW64\schtasks.exe"schtasks" /create /tn "SeroXen" /sc ONLOGON /tr "C:\Users\Admin\AppData\Roaming\SubDir\Client.exe" /rl HIGHEST /f13⤵
- Creates scheduled task(s)
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\caKrWmREPfvB.bat" "13⤵
-
C:\Windows\SysWOW64\chcp.comchcp 6500114⤵
-
C:\Windows\SysWOW64\PING.EXEping -n 10 localhost14⤵
- Runs ping.exe
-
C:\Users\Admin\AppData\Roaming\SubDir\Client.exe"C:\Users\Admin\AppData\Roaming\SubDir\Client.exe"14⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
-
C:\Windows\SysWOW64\schtasks.exe"schtasks" /create /tn "SeroXen" /sc ONLOGON /tr "C:\Users\Admin\AppData\Roaming\SubDir\Client.exe" /rl HIGHEST /f15⤵
- Creates scheduled task(s)
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\PfxSplxRIts2.bat" "15⤵
-
C:\Windows\SysWOW64\chcp.comchcp 6500116⤵
-
C:\Windows\SysWOW64\PING.EXEping -n 10 localhost16⤵
- Runs ping.exe
-
C:\Users\Admin\AppData\Roaming\SubDir\Client.exe"C:\Users\Admin\AppData\Roaming\SubDir\Client.exe"16⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
-
C:\Windows\SysWOW64\schtasks.exe"schtasks" /create /tn "SeroXen" /sc ONLOGON /tr "C:\Users\Admin\AppData\Roaming\SubDir\Client.exe" /rl HIGHEST /f17⤵
- Creates scheduled task(s)
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\5AtyhcLUYSYV.bat" "17⤵
-
C:\Windows\SysWOW64\chcp.comchcp 6500118⤵
-
C:\Windows\SysWOW64\PING.EXEping -n 10 localhost18⤵
- Runs ping.exe
-
C:\Users\Admin\AppData\Roaming\SubDir\Client.exe"C:\Users\Admin\AppData\Roaming\SubDir\Client.exe"18⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
-
C:\Windows\SysWOW64\schtasks.exe"schtasks" /create /tn "SeroXen" /sc ONLOGON /tr "C:\Users\Admin\AppData\Roaming\SubDir\Client.exe" /rl HIGHEST /f19⤵
- Creates scheduled task(s)
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\5qM0ltMLx4ES.bat" "19⤵
-
C:\Windows\SysWOW64\chcp.comchcp 6500120⤵
-
C:\Windows\SysWOW64\PING.EXEping -n 10 localhost20⤵
- Runs ping.exe
-
C:\Users\Admin\AppData\Roaming\SubDir\Client.exe"C:\Users\Admin\AppData\Roaming\SubDir\Client.exe"20⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
-
C:\Windows\SysWOW64\schtasks.exe"schtasks" /create /tn "SeroXen" /sc ONLOGON /tr "C:\Users\Admin\AppData\Roaming\SubDir\Client.exe" /rl HIGHEST /f21⤵
- Creates scheduled task(s)
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\DYRVPfhpPJIE.bat" "21⤵
-
C:\Windows\SysWOW64\chcp.comchcp 6500122⤵
-
C:\Windows\SysWOW64\PING.EXEping -n 10 localhost22⤵
- Runs ping.exe
-
C:\Users\Admin\AppData\Roaming\SubDir\Client.exe"C:\Users\Admin\AppData\Roaming\SubDir\Client.exe"22⤵
- Checks computer location settings
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
-
C:\Windows\SysWOW64\schtasks.exe"schtasks" /create /tn "SeroXen" /sc ONLOGON /tr "C:\Users\Admin\AppData\Roaming\SubDir\Client.exe" /rl HIGHEST /f23⤵
- Creates scheduled task(s)
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\KTMTlP9ZNciP.bat" "23⤵
-
C:\Windows\SysWOW64\chcp.comchcp 6500124⤵
-
C:\Windows\SysWOW64\PING.EXEping -n 10 localhost24⤵
- Runs ping.exe
-
C:\Users\Admin\AppData\Roaming\SubDir\Client.exe"C:\Users\Admin\AppData\Roaming\SubDir\Client.exe"24⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
-
C:\Windows\SysWOW64\schtasks.exe"schtasks" /create /tn "SeroXen" /sc ONLOGON /tr "C:\Users\Admin\AppData\Roaming\SubDir\Client.exe" /rl HIGHEST /f25⤵
- Creates scheduled task(s)
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\dH7bPHNaeHcN.bat" "25⤵
-
C:\Windows\SysWOW64\chcp.comchcp 6500126⤵
-
C:\Windows\SysWOW64\PING.EXEping -n 10 localhost26⤵
- Runs ping.exe
-
C:\Users\Admin\AppData\Roaming\SubDir\Client.exe"C:\Users\Admin\AppData\Roaming\SubDir\Client.exe"26⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
-
C:\Windows\SysWOW64\schtasks.exe"schtasks" /create /tn "SeroXen" /sc ONLOGON /tr "C:\Users\Admin\AppData\Roaming\SubDir\Client.exe" /rl HIGHEST /f27⤵
- Creates scheduled task(s)
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\bOgIpAQbx3jr.bat" "27⤵
-
C:\Windows\SysWOW64\chcp.comchcp 6500128⤵
-
C:\Windows\SysWOW64\PING.EXEping -n 10 localhost28⤵
- Runs ping.exe
-
C:\Users\Admin\AppData\Roaming\SubDir\Client.exe"C:\Users\Admin\AppData\Roaming\SubDir\Client.exe"28⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
-
C:\Windows\SysWOW64\schtasks.exe"schtasks" /create /tn "SeroXen" /sc ONLOGON /tr "C:\Users\Admin\AppData\Roaming\SubDir\Client.exe" /rl HIGHEST /f29⤵
- Creates scheduled task(s)
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\U31xaI3ySwv5.bat" "29⤵
-
C:\Windows\SysWOW64\chcp.comchcp 6500130⤵
-
C:\Windows\SysWOW64\PING.EXEping -n 10 localhost30⤵
- Runs ping.exe
-
C:\Users\Admin\AppData\Roaming\SubDir\Client.exe"C:\Users\Admin\AppData\Roaming\SubDir\Client.exe"30⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
-
C:\Windows\SysWOW64\schtasks.exe"schtasks" /create /tn "SeroXen" /sc ONLOGON /tr "C:\Users\Admin\AppData\Roaming\SubDir\Client.exe" /rl HIGHEST /f31⤵
- Creates scheduled task(s)
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\xwdwRW0E3DyM.bat" "31⤵
-
C:\Windows\SysWOW64\chcp.comchcp 6500132⤵
-
C:\Windows\SysWOW64\PING.EXEping -n 10 localhost32⤵
- Runs ping.exe
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4216 -s 223231⤵
- Program crash
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1688 -s 152429⤵
- Program crash
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3084 -s 167227⤵
- Program crash
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3404 -s 171225⤵
- Program crash
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3192 -s 109223⤵
- Program crash
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 936 -s 172021⤵
- Program crash
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2020 -s 224819⤵
- Program crash
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1960 -s 151617⤵
- Program crash
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1340 -s 109215⤵
- Program crash
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 5056 -s 109213⤵
- Program crash
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2472 -s 164411⤵
- Program crash
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1236 -s 16569⤵
- Program crash
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 412 -s 21967⤵
- Program crash
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1276 -s 16445⤵
- Program crash
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1756 -s 21643⤵
- Program crash
-
C:\Windows\SysWOW64\SCHTASKS.exe"SCHTASKS.exe" /create /tn "$77Uni - Copy (13) - Copy.exe" /tr "'C:\Users\Admin\AppData\Local\Temp\uni\Uni - Copy (13) - Copy.exe'" /sc onlogon /rl HIGHEST2⤵
- Creates scheduled task(s)
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 408 -p 1756 -ip 17561⤵
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 500 -p 1276 -ip 12761⤵
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 520 -p 412 -ip 4121⤵
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 508 -p 1236 -ip 12361⤵
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 468 -p 2472 -ip 24721⤵
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 520 -p 5056 -ip 50561⤵
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 540 -p 1340 -ip 13401⤵
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 536 -p 1960 -ip 19601⤵
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 540 -p 2020 -ip 20201⤵
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 524 -p 936 -ip 9361⤵
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 512 -p 3192 -ip 31921⤵
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 540 -p 3404 -ip 34041⤵
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 468 -p 3084 -ip 30841⤵
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 444 -p 1688 -ip 16881⤵
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 500 -p 4216 -ip 42161⤵
Network
MITRE ATT&CK Matrix ATT&CK v13
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Local\Temp\5AtyhcLUYSYV.batFilesize
207B
MD5dc8847e6a864c4d67a68c47d4c093a72
SHA1de85882294445d1e829dda604c271b833b411b92
SHA2562abbf0f2491123498a07773c39826bcee91fabf04b7a37c876045c58ab220ecc
SHA512354a4367c3ec3ea95a28a749e96bfd0f56121ba345ca87276ab5fcfa6cdd92cbe3a8e669536816067795765c8d4a047aea98e339f4b98e0668efe9b029c7e4aa
-
C:\Users\Admin\AppData\Local\Temp\5qM0ltMLx4ES.batFilesize
207B
MD59e58f0f30994a2af762784fe3558c2e9
SHA16bd4d6211b1149c40a97b65e730751f3b84e55d6
SHA2560fe1973d0dbf0479821d9b3400aa445ecb730f2e47ad4933906598a3fc1725ff
SHA512f09df30a22c71b2345726e1dc487d7d202cce3d13418468ad4f6660e326883c7a287ef93c6aa0a2a9a075bf9bda2e852a102678de799e9ebb74df5c6670ab1cb
-
C:\Users\Admin\AppData\Local\Temp\C8El6LET7fd1.batFilesize
207B
MD5f4fa4265425039619f2987b9323e5e04
SHA14e1961a2092d5864a4e7ee11397a252a0200fd10
SHA256e85014b624f217edc74ce8f12a8de931cf7de7f6784596d875fc5d9c220558a7
SHA512b6bd97748849d48d550bcf1db0f2a5f4e67ebaf9f2ff1b801fe9278184b67838362c80ef70414d31fb3e8027c3d14dae618c6fc5a2ef954f61e215097bab36b0
-
C:\Users\Admin\AppData\Local\Temp\DYRVPfhpPJIE.batFilesize
207B
MD5fa3c37023f3725a647a8aaf44ca89314
SHA11ed0e4c6bf9d71ceb8f8e73a1a95effa77784356
SHA256f02a42ca43a9e509f1e023b5acfc3350b451d3c88160209d4a8972481cbf7a74
SHA5129a7cc2bb54a27f16371545c3f33e1be3ddbcf21574ca62ce3088af6d4861d1c1b63ad2e5b8d220f15f01955ff30d3295c882a56980827eec7b14e066d1d115e3
-
C:\Users\Admin\AppData\Local\Temp\KTMTlP9ZNciP.batFilesize
207B
MD57c61bcef213ba755c641f5c7eb59ea65
SHA13c1b3a98af68a24ab1d86f761540b942a98a494d
SHA256acdc8e0234272127d1b7ddb7c7e2a8722bc24442317690166334ea06536b9961
SHA5124274ead6bbbf76cd52412b1a322fe2bcbabd030041a15058c4eb192d7dbd4a071f74a38f32700e1456478e4c2021a088d7642f01a2c4c538594456c56461d667
-
C:\Users\Admin\AppData\Local\Temp\MMEEG1pSgSDv.batFilesize
207B
MD54c02ddba076d2401f34a6db7b4b6207a
SHA12b16c0f8f08ce6d675753d440104d2efff8269a2
SHA256b4e5f2c395ef678509cf0f06827e1ed0d9a2667db9a1bd0b65512f3a99803b64
SHA512f388d06086b5ac4450f29725d5825aebcbc0a4873bea9c23ac2ecface24e3ed8e9e000ff0cc80cb85880772484ebb558af85b458fb57616a607b7858cee575ef
-
C:\Users\Admin\AppData\Local\Temp\PfxSplxRIts2.batFilesize
207B
MD5018ce2b4a7a2846fe65cf73810e53114
SHA1a86afd2e4fc083ab9ce28414759597225d80d8ee
SHA256e11f22089452897b32e3e7f207d39b744de1db9054c1a97051a582fc2124e78f
SHA512c9de8f9de08fe26330ec792a5ca214c795cc47b8f618dabf44972ec0855f4678145c9d95b8c053da91cca85734c736cb6f75cbaa9c4b64a257c71089acf4da35
-
C:\Users\Admin\AppData\Local\Temp\U31xaI3ySwv5.batFilesize
207B
MD52a089019478fa6a198cefafbc8288977
SHA120121165c3f6367cd58170ea045b2f2a59714908
SHA2566cd96653a4e9e45d5a704638ad231ce77601b25032a1c8287b12d09019d5eb60
SHA512bcfff96929bad4ae585928060d90e80a29b4b8f207674e035fc30da7f99caf7787cf9cf00264d9fd2c729882bfb6769ccf691bf0f725d333b157182553bd18b7
-
C:\Users\Admin\AppData\Local\Temp\V03PYytV1Bgh.batFilesize
207B
MD58665d218226c5250e1a4d4ba4251e1b4
SHA182a7a4697e3d69f48320a8ce317a53c9c4e0047a
SHA256721bbd953356c5391b22c0fd75335201eeec0f43d5bc6ddbf4f048b66aff10bb
SHA51210854cda698849c41cf7579ac2af585229a135a19fd544b4bf4f814f30859e935b6b56127fe8d0b877f160f02ab4b2b436d3575eeb0fb8b2952c1a822b6924d1
-
C:\Users\Admin\AppData\Local\Temp\bOgIpAQbx3jr.batFilesize
207B
MD5feb02e337e00e6d1eb7acde8d5c4eefd
SHA1d5b78548325bbfc6661c29f8c207f770ba46cee2
SHA25682ac3c5a439a7cc08ef16a28845480975778ad4b59768990f546c707602d37a8
SHA512de531c5cba13aa8093d40135e9c5ac95a904036871d11c4a7f84308498b22153bfa51b114240dfba63a3c483800295761889512b6645b27359af9a9ef020afb4
-
C:\Users\Admin\AppData\Local\Temp\caKrWmREPfvB.batFilesize
207B
MD5b99ca64307f9664e9e53aa5dfa56f8a7
SHA1003d93c8d21a4c68e539b54514294518cec9b025
SHA2561c19a54d41127fba3738417e7d61ae93a564e8f8972258f5929fe3a77fb1fe6e
SHA5124bb021d304e0c7375a7abcec24b5aeb733ff300a892b0c8e76f8b2af9017e0b2bd4033d3707fb5b8ca7f913ca46eb4aa0fd0d7af379e9f632f88550c8e5488bb
-
C:\Users\Admin\AppData\Local\Temp\dH7bPHNaeHcN.batFilesize
207B
MD56300365b2fc09f5c81eaa7d00d967831
SHA106973bc23c1b07ddb09e90f9e9c5422fa4f28ab4
SHA25663cefc549fec60f0afb6acc2b294b3435e82b00a0de48ef4c7d2ef59734d84b7
SHA512ef2077f433acca0b0c4568c18eb16d35b8b6167c77b7be926f4648580afda7484913f7fa4fc881a0507268ef86971dd86d58cbd7b8b9e949ab07daa4ca970753
-
C:\Users\Admin\AppData\Local\Temp\olpA3MPBIYXK.batFilesize
207B
MD5217899969d00cbbd3e263eab786163cf
SHA101919fac7e22f7d6899b09793b1c1794b5f5b535
SHA256428cdc160a0b8e1d164a6ab5435d74e91f06abfb4a707a73e55450b8ce9ec479
SHA512b78b1e07e8080a7347e49ee18d8f993c22637b514765d393179442254708bdd9be15a41dfeee93cf863b12e98e01ac7840bc56ec889be50c57e30a4a2fc4d9c5
-
C:\Users\Admin\AppData\Local\Temp\rZQm5zHmxLeu.batFilesize
207B
MD5eabb42b9b3a1920be3520b5dc8072791
SHA106b7968419c5934e2d019881e3e9dd65b3d175e4
SHA256621458dac7301d3c30b6045441e98dddec2a49a6fbe063e76c750f00e0bb148c
SHA512164d947a3bc4d463c62748484b82b380d9c29a8971dbf1475171d3536320e7d805b6e9bbebb524554df3865b249aa73bc30fc5288f197c9ac894654739a6e13b
-
C:\Users\Admin\AppData\Local\Temp\xwdwRW0E3DyM.batFilesize
207B
MD56d89d7c7cf1aa65d8d4f7f349602782f
SHA1da7712e35cb42d6a02393f2fd749d16ffa733af9
SHA256685483c38d3a584223981539b31f3f3131887214e17ded8293e08f941bc37116
SHA512d7398672a7b6c6bd1fa8931f0ee9e02fc3d716cfc55a3b47d7665b49ce2cda7c33c6e0a370cf83789ec79579f2dad57c4157376080c29850da4bc0318beb7fbe
-
C:\Users\Admin\AppData\Roaming\Logs\06-15-2024Filesize
224B
MD50d42f062dcac90c2480bb300c6556000
SHA10843eac63afe066ee95d028630c63868df5a8edc
SHA2564e19a1c5dd16cc6aba072b902f15c5785941450e52d455d76ea2568252ce4737
SHA512eb9443f9e36bf91412ec8590d9dd8ffa93edab43d1b99f93ca316918495f4155574f77841fd9b951bfc7cd77410fd349568aaabe5d1a81332da074f25149167d
-
C:\Users\Admin\AppData\Roaming\Logs\06-15-2024Filesize
224B
MD5fb2a9a4160b8c71e08b4b910f978984c
SHA13b1c1100f7791822082d79e3535260ba4d94cb5e
SHA2566c0be66cd98a2d38b573457ec5afd03bee6f80789d04e16493c4679145b0b2e9
SHA512391396aaded445635b1cf8169e8b0053922c95c7e3599a9f61f5571d01beca3c1181d53254ac6a52902db29772b2a6be1b22203d11cb8db5d838890248d34a9f
-
C:\Users\Admin\AppData\Roaming\Logs\06-15-2024Filesize
224B
MD5ca6d495809fc66fef2f80801f99b988b
SHA1932a9f804b3bf2245e50dbf11cb5a972939c8d00
SHA25650dc0711fa714f161cd4ac2d4034d1396002af261ee84df6920467ab5abf619c
SHA5125c8d52330ecae09ee4fdc1196f02c96899bec59709119286388f642c2053b5a76e807aebb444cd9b7152500f36608c8f71847f47668daec0c190471e2cd4fa81
-
C:\Users\Admin\AppData\Roaming\Logs\06-15-2024Filesize
224B
MD5a8aad513901d3e48ad4b08475be13113
SHA1cfa74b58113d50ede2386465a7e9d612b35daf46
SHA256f92f2530ff2342c0972931484bc06ceba782ab0591dcf3962b6b1d863804900c
SHA51278b3b8b763e310f905c1d402ea98646add609b3d08cd0f3ebff4e5a018f5346068f169251ee24cfaf9f1650d6908eaee607edf9b8197ed96800bb032d8b35d14
-
C:\Users\Admin\AppData\Roaming\Logs\06-15-2024MD5
d41d8cd98f00b204e9800998ecf8427e
SHA1da39a3ee5e6b4b0d3255bfef95601890afd80709
SHA256e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855
SHA512cf83e1357eefb8bdf1542850d66d8007d620e4050b5715dc83f4a921d36ce9ce47d0d13c5d85f2b0ff8318d2877eec2f63b931bd47417a81a538327af927da3e
-
C:\Users\Admin\AppData\Roaming\Logs\06-15-2024Filesize
224B
MD5671fa015b2a7ec5df347033e39a30ef0
SHA128f43c1f78d61a4e0dfba66c79c544901426c801
SHA256b861174a78691a479192ce44b54b08de9f9f30d2c1770fe105d2088f9f12a994
SHA512d3c1d6dd7c922264d1faad4e39616fb860868b6dfc8b005460b313afec3cf8011dbff5aeb671b74e4065081c384ddfc2327cd8be66c53ac71071bba95c1d3c0b
-
C:\Users\Admin\AppData\Roaming\Logs\06-15-2024Filesize
224B
MD5bfc5cff2e60ff8d0ed1a3c91551b1caa
SHA1111df6f23c9b590bddbffcd6c6c361fb5b9b2353
SHA25620a89d4109c8fbff1d72a3ce5885ac6bc646cf9228832d7cbe305933d47514f0
SHA512e3743ddef6bffc9258bf42d7d4d1cc3d454e1be479a50ae322e66109a910d9cbbafe26fcbf5add3c89f78e23b40efd0403552d3f07ae620078f012eb512b3e5d
-
C:\Users\Admin\AppData\Roaming\Logs\06-15-2024Filesize
224B
MD5fe5300371a7d1851af5bcd6f5eae06aa
SHA18ccd6e85146c295e186398b803a83668e289073d
SHA256fd011a3d6b992aedc5ec7a83099e1d56f44e284bf4b95ec6735dfc92d5fde146
SHA512c2fa063cb8ef581aad4a3ad63653138caa67a6af8f8fc16387fccb416b88c4a7d5f44279b092f3200808226ecff0087b62be7443490bdc77cf9746751822b68b
-
C:\Users\Admin\AppData\Roaming\SubDir\Client.exeFilesize
409KB
MD5b70fdac25a99501e3cae11f1b775249e
SHA13c59226479bfdcd1b2927bcfb1a7516d4cb8dd71
SHA25651ff3eb450a786c1aaa75ff889f2fd256412a7b75d04277fdf9fcccc20e57246
SHA51243f0d5d6e5f0d5febba537c109ffdbc250bbb6e9725e635a43ec975b0353048eaeee50b6e9274cd5e072ea6b0cea32439bd37408b2528832f467f2075f74ca44
-
memory/1756-15-0x00000000746F0000-0x0000000074EA0000-memory.dmpFilesize
7.7MB
-
memory/1756-17-0x00000000746F0000-0x0000000074EA0000-memory.dmpFilesize
7.7MB
-
memory/1756-19-0x0000000006240000-0x000000000624A000-memory.dmpFilesize
40KB
-
memory/1756-24-0x00000000746F0000-0x0000000074EA0000-memory.dmpFilesize
7.7MB
-
memory/2408-6-0x0000000005D50000-0x0000000005D62000-memory.dmpFilesize
72KB
-
memory/2408-8-0x00000000746F0000-0x0000000074EA0000-memory.dmpFilesize
7.7MB
-
memory/2408-7-0x00000000746FE000-0x00000000746FF000-memory.dmpFilesize
4KB
-
memory/2408-0-0x00000000746FE000-0x00000000746FF000-memory.dmpFilesize
4KB
-
memory/2408-16-0x00000000746F0000-0x0000000074EA0000-memory.dmpFilesize
7.7MB
-
memory/2408-5-0x0000000005110000-0x0000000005176000-memory.dmpFilesize
408KB
-
memory/2408-4-0x00000000746F0000-0x0000000074EA0000-memory.dmpFilesize
7.7MB
-
memory/2408-3-0x0000000005070000-0x0000000005102000-memory.dmpFilesize
584KB
-
memory/2408-2-0x0000000005520000-0x0000000005AC4000-memory.dmpFilesize
5.6MB
-
memory/2408-1-0x0000000000600000-0x000000000066C000-memory.dmpFilesize
432KB