Overview
overview
10Static
static
10uni/Uni - ...py.exe
windows7-x64
10uni/Uni - ...py.exe
windows10-2004-x64
10uni/Uni - ...py.exe
windows7-x64
10uni/Uni - ...py.exe
windows10-2004-x64
10uni/Uni - ...py.exe
windows7-x64
10uni/Uni - ...py.exe
windows10-2004-x64
10uni/Uni - ...py.exe
windows7-x64
10uni/Uni - ...py.exe
windows10-2004-x64
10uni/Uni - ...py.exe
windows7-x64
10uni/Uni - ...py.exe
windows10-2004-x64
10uni/Uni - ...py.exe
windows7-x64
10uni/Uni - ...py.exe
windows10-2004-x64
10uni/Uni - ...py.exe
windows7-x64
10uni/Uni - ...py.exe
windows10-2004-x64
10uni/Uni - ...py.exe
windows7-x64
10uni/Uni - ...py.exe
windows10-2004-x64
10uni/Uni - ...py.exe
windows7-x64
10uni/Uni - ...py.exe
windows10-2004-x64
10uni/Uni - ...py.exe
windows7-x64
10uni/Uni - ...py.exe
windows10-2004-x64
10uni/Uni - ...py.exe
windows7-x64
10uni/Uni - ...py.exe
windows10-2004-x64
10uni/Uni - ...py.exe
windows7-x64
10uni/Uni - ...py.exe
windows10-2004-x64
10uni/Uni - ...py.exe
windows7-x64
10uni/Uni - ...py.exe
windows10-2004-x64
10uni/Uni - ...py.exe
windows7-x64
10uni/Uni - ...py.exe
windows10-2004-x64
10uni/Uni - ...py.exe
windows7-x64
10uni/Uni - ...py.exe
windows10-2004-x64
10uni/Uni - ...py.exe
windows7-x64
10uni/Uni - ...py.exe
windows10-2004-x64
10Analysis
-
max time kernel
296s -
max time network
302s -
platform
windows10-2004_x64 -
resource
win10v2004-20240508-en -
resource tags
arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system -
submitted
15-06-2024 07:30
Behavioral task
behavioral1
Sample
uni/Uni - Copy (10) - Copy - Copy - Copy.exe
Resource
win7-20240508-en
Behavioral task
behavioral2
Sample
uni/Uni - Copy (10) - Copy - Copy - Copy.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral3
Sample
uni/Uni - Copy (10) - Copy - Copy.exe
Resource
win7-20240611-en
Behavioral task
behavioral4
Sample
uni/Uni - Copy (10) - Copy - Copy.exe
Resource
win10v2004-20240611-en
Behavioral task
behavioral5
Sample
uni/Uni - Copy (10) - Copy.exe
Resource
win7-20240508-en
Behavioral task
behavioral6
Sample
uni/Uni - Copy (10) - Copy.exe
Resource
win10v2004-20240226-en
Behavioral task
behavioral7
Sample
uni/Uni - Copy (11) - Copy - Copy - Copy.exe
Resource
win7-20240221-en
Behavioral task
behavioral8
Sample
uni/Uni - Copy (11) - Copy - Copy - Copy.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral9
Sample
uni/Uni - Copy (11) - Copy - Copy.exe
Resource
win7-20240508-en
Behavioral task
behavioral10
Sample
uni/Uni - Copy (11) - Copy - Copy.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral11
Sample
uni/Uni - Copy (11) - Copy.exe
Resource
win7-20240221-en
Behavioral task
behavioral12
Sample
uni/Uni - Copy (11) - Copy.exe
Resource
win10v2004-20240611-en
Behavioral task
behavioral13
Sample
uni/Uni - Copy (12) - Copy - Copy - Copy.exe
Resource
win7-20240611-en
Behavioral task
behavioral14
Sample
uni/Uni - Copy (12) - Copy - Copy - Copy.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral15
Sample
uni/Uni - Copy (12) - Copy - Copy.exe
Resource
win7-20240508-en
Behavioral task
behavioral16
Sample
uni/Uni - Copy (12) - Copy - Copy.exe
Resource
win10v2004-20240611-en
Behavioral task
behavioral17
Sample
uni/Uni - Copy (12) - Copy.exe
Resource
win7-20231129-en
Behavioral task
behavioral18
Sample
uni/Uni - Copy (12) - Copy.exe
Resource
win10v2004-20240611-en
Behavioral task
behavioral19
Sample
uni/Uni - Copy (13) - Copy - Copy - Copy.exe
Resource
win7-20240611-en
Behavioral task
behavioral20
Sample
uni/Uni - Copy (13) - Copy - Copy - Copy.exe
Resource
win10v2004-20240611-en
Behavioral task
behavioral21
Sample
uni/Uni - Copy (13) - Copy - Copy.exe
Resource
win7-20240611-en
Behavioral task
behavioral22
Sample
uni/Uni - Copy (13) - Copy - Copy.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral23
Sample
uni/Uni - Copy (13) - Copy.exe
Resource
win7-20240508-en
Behavioral task
behavioral24
Sample
uni/Uni - Copy (13) - Copy.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral25
Sample
uni/Uni - Copy (14) - Copy - Copy - Copy.exe
Resource
win7-20240611-en
Behavioral task
behavioral26
Sample
uni/Uni - Copy (14) - Copy - Copy - Copy.exe
Resource
win10v2004-20240226-en
Behavioral task
behavioral27
Sample
uni/Uni - Copy (14) - Copy - Copy.exe
Resource
win7-20231129-en
Behavioral task
behavioral28
Sample
uni/Uni - Copy (14) - Copy - Copy.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral29
Sample
uni/Uni - Copy (14) - Copy.exe
Resource
win7-20240611-en
Behavioral task
behavioral30
Sample
uni/Uni - Copy (14) - Copy.exe
Resource
win10v2004-20240611-en
Behavioral task
behavioral31
Sample
uni/Uni - Copy (15) - Copy - Copy - Copy.exe
Resource
win7-20240508-en
Behavioral task
behavioral32
Sample
uni/Uni - Copy (15) - Copy - Copy - Copy.exe
Resource
win10v2004-20240508-en
General
-
Target
uni/Uni - Copy (11) - Copy - Copy - Copy.exe
-
Size
409KB
-
MD5
b70fdac25a99501e3cae11f1b775249e
-
SHA1
3c59226479bfdcd1b2927bcfb1a7516d4cb8dd71
-
SHA256
51ff3eb450a786c1aaa75ff889f2fd256412a7b75d04277fdf9fcccc20e57246
-
SHA512
43f0d5d6e5f0d5febba537c109ffdbc250bbb6e9725e635a43ec975b0353048eaeee50b6e9274cd5e072ea6b0cea32439bd37408b2528832f467f2075f74ca44
-
SSDEEP
12288:gpbJjGut6AoE3hVVdFaC/eZPTMTDlpgfJCKuMsVs:oVaurMLcDlpRKai
Malware Config
Extracted
quasar
3.1.5
SeroXen
panel-slave.gl.at.ply.gg:57059
panel-slave.gl.at.ply.gg:27892
$Sxr-rpL8EItHN3pqIQQVy2
-
encryption_key
Lme7VBS3l58VwLM69PNM
-
install_name
Client.exe
-
log_directory
Logs
-
reconnect_delay
3000
-
startup_key
SeroXen
-
subdirectory
SubDir
Signatures
-
Quasar payload 2 IoCs
Processes:
resource yara_rule behavioral8/memory/756-1-0x0000000000420000-0x000000000048C000-memory.dmp family_quasar C:\Users\Admin\AppData\Roaming\SubDir\Client.exe family_quasar -
Checks computer location settings 2 TTPs 15 IoCs
Looks up country code configured in the registry, likely geofence.
Processes:
Client.exeClient.exeClient.exeClient.exeClient.exeClient.exeClient.exeClient.exeClient.exeClient.exeClient.exeClient.exeClient.exeClient.exeClient.exedescription ioc process Key value queried \REGISTRY\USER\S-1-5-21-3558294865-3673844354-2255444939-1000\Control Panel\International\Geo\Nation Client.exe Key value queried \REGISTRY\USER\S-1-5-21-3558294865-3673844354-2255444939-1000\Control Panel\International\Geo\Nation Client.exe Key value queried \REGISTRY\USER\S-1-5-21-3558294865-3673844354-2255444939-1000\Control Panel\International\Geo\Nation Client.exe Key value queried \REGISTRY\USER\S-1-5-21-3558294865-3673844354-2255444939-1000\Control Panel\International\Geo\Nation Client.exe Key value queried \REGISTRY\USER\S-1-5-21-3558294865-3673844354-2255444939-1000\Control Panel\International\Geo\Nation Client.exe Key value queried \REGISTRY\USER\S-1-5-21-3558294865-3673844354-2255444939-1000\Control Panel\International\Geo\Nation Client.exe Key value queried \REGISTRY\USER\S-1-5-21-3558294865-3673844354-2255444939-1000\Control Panel\International\Geo\Nation Client.exe Key value queried \REGISTRY\USER\S-1-5-21-3558294865-3673844354-2255444939-1000\Control Panel\International\Geo\Nation Client.exe Key value queried \REGISTRY\USER\S-1-5-21-3558294865-3673844354-2255444939-1000\Control Panel\International\Geo\Nation Client.exe Key value queried \REGISTRY\USER\S-1-5-21-3558294865-3673844354-2255444939-1000\Control Panel\International\Geo\Nation Client.exe Key value queried \REGISTRY\USER\S-1-5-21-3558294865-3673844354-2255444939-1000\Control Panel\International\Geo\Nation Client.exe Key value queried \REGISTRY\USER\S-1-5-21-3558294865-3673844354-2255444939-1000\Control Panel\International\Geo\Nation Client.exe Key value queried \REGISTRY\USER\S-1-5-21-3558294865-3673844354-2255444939-1000\Control Panel\International\Geo\Nation Client.exe Key value queried \REGISTRY\USER\S-1-5-21-3558294865-3673844354-2255444939-1000\Control Panel\International\Geo\Nation Client.exe Key value queried \REGISTRY\USER\S-1-5-21-3558294865-3673844354-2255444939-1000\Control Panel\International\Geo\Nation Client.exe -
Executes dropped EXE 15 IoCs
Processes:
Client.exeClient.exeClient.exeClient.exeClient.exeClient.exeClient.exeClient.exeClient.exeClient.exeClient.exeClient.exeClient.exeClient.exeClient.exepid process 2880 Client.exe 552 Client.exe 3700 Client.exe 1672 Client.exe 5104 Client.exe 5032 Client.exe 3040 Client.exe 3628 Client.exe 1544 Client.exe 4412 Client.exe 3948 Client.exe 2224 Client.exe 1052 Client.exe 412 Client.exe 1324 Client.exe -
Looks up external IP address via web service 13 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
Processes:
flow ioc 15 ip-api.com 19 ip-api.com 21 ip-api.com 25 ip-api.com 29 ip-api.com 2 ip-api.com 23 ip-api.com 33 ip-api.com 31 ip-api.com 8 api.ipify.org 13 ip-api.com 17 ip-api.com 27 ip-api.com -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Program crash 15 IoCs
Processes:
WerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exepid pid_target process target process 4216 2880 WerFault.exe Client.exe 1824 552 WerFault.exe Client.exe 4408 3700 WerFault.exe Client.exe 3788 1672 WerFault.exe Client.exe 2956 5104 WerFault.exe Client.exe 1324 5032 WerFault.exe Client.exe 2984 3040 WerFault.exe Client.exe 876 3628 WerFault.exe Client.exe 3996 1544 WerFault.exe Client.exe 4396 4412 WerFault.exe Client.exe 716 3948 WerFault.exe Client.exe 5036 2224 WerFault.exe Client.exe 2200 1052 WerFault.exe Client.exe 3672 412 WerFault.exe Client.exe 3844 1324 WerFault.exe Client.exe -
Creates scheduled task(s) 1 TTPs 17 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
Processes:
schtasks.exeSCHTASKS.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exepid process 1504 schtasks.exe 4748 SCHTASKS.exe 3056 schtasks.exe 608 schtasks.exe 3960 schtasks.exe 244 schtasks.exe 5048 schtasks.exe 3728 schtasks.exe 3296 schtasks.exe 4092 schtasks.exe 2036 schtasks.exe 3980 schtasks.exe 3528 schtasks.exe 2816 schtasks.exe 3056 schtasks.exe 2984 schtasks.exe 3656 schtasks.exe -
Runs ping.exe 1 TTPs 15 IoCs
Processes:
PING.EXEPING.EXEPING.EXEPING.EXEPING.EXEPING.EXEPING.EXEPING.EXEPING.EXEPING.EXEPING.EXEPING.EXEPING.EXEPING.EXEPING.EXEpid process 3872 PING.EXE 2800 PING.EXE 552 PING.EXE 5080 PING.EXE 4848 PING.EXE 4868 PING.EXE 2816 PING.EXE 3596 PING.EXE 4388 PING.EXE 4128 PING.EXE 3008 PING.EXE 3888 PING.EXE 4632 PING.EXE 3684 PING.EXE 3124 PING.EXE -
Suspicious use of AdjustPrivilegeToken 16 IoCs
Processes:
Uni - Copy (11) - Copy - Copy - Copy.exeClient.exeClient.exeClient.exeClient.exeClient.exeClient.exeClient.exeClient.exeClient.exeClient.exeClient.exeClient.exeClient.exeClient.exeClient.exedescription pid process Token: SeDebugPrivilege 756 Uni - Copy (11) - Copy - Copy - Copy.exe Token: SeDebugPrivilege 2880 Client.exe Token: SeDebugPrivilege 552 Client.exe Token: SeDebugPrivilege 3700 Client.exe Token: SeDebugPrivilege 1672 Client.exe Token: SeDebugPrivilege 5104 Client.exe Token: SeDebugPrivilege 5032 Client.exe Token: SeDebugPrivilege 3040 Client.exe Token: SeDebugPrivilege 3628 Client.exe Token: SeDebugPrivilege 1544 Client.exe Token: SeDebugPrivilege 4412 Client.exe Token: SeDebugPrivilege 3948 Client.exe Token: SeDebugPrivilege 2224 Client.exe Token: SeDebugPrivilege 1052 Client.exe Token: SeDebugPrivilege 412 Client.exe Token: SeDebugPrivilege 1324 Client.exe -
Suspicious use of SetWindowsHookEx 15 IoCs
Processes:
Client.exeClient.exeClient.exeClient.exeClient.exeClient.exeClient.exeClient.exeClient.exeClient.exeClient.exeClient.exeClient.exeClient.exeClient.exepid process 2880 Client.exe 552 Client.exe 3700 Client.exe 1672 Client.exe 5104 Client.exe 5032 Client.exe 3040 Client.exe 3628 Client.exe 1544 Client.exe 4412 Client.exe 3948 Client.exe 2224 Client.exe 1052 Client.exe 412 Client.exe 1324 Client.exe -
Suspicious use of WriteProcessMemory 64 IoCs
Processes:
Uni - Copy (11) - Copy - Copy - Copy.exeClient.execmd.exeClient.execmd.exeClient.execmd.exeClient.execmd.exedescription pid process target process PID 756 wrote to memory of 1504 756 Uni - Copy (11) - Copy - Copy - Copy.exe schtasks.exe PID 756 wrote to memory of 1504 756 Uni - Copy (11) - Copy - Copy - Copy.exe schtasks.exe PID 756 wrote to memory of 1504 756 Uni - Copy (11) - Copy - Copy - Copy.exe schtasks.exe PID 756 wrote to memory of 2880 756 Uni - Copy (11) - Copy - Copy - Copy.exe Client.exe PID 756 wrote to memory of 2880 756 Uni - Copy (11) - Copy - Copy - Copy.exe Client.exe PID 756 wrote to memory of 2880 756 Uni - Copy (11) - Copy - Copy - Copy.exe Client.exe PID 756 wrote to memory of 4748 756 Uni - Copy (11) - Copy - Copy - Copy.exe SCHTASKS.exe PID 756 wrote to memory of 4748 756 Uni - Copy (11) - Copy - Copy - Copy.exe SCHTASKS.exe PID 756 wrote to memory of 4748 756 Uni - Copy (11) - Copy - Copy - Copy.exe SCHTASKS.exe PID 2880 wrote to memory of 2816 2880 Client.exe schtasks.exe PID 2880 wrote to memory of 2816 2880 Client.exe schtasks.exe PID 2880 wrote to memory of 2816 2880 Client.exe schtasks.exe PID 2880 wrote to memory of 3816 2880 Client.exe cmd.exe PID 2880 wrote to memory of 3816 2880 Client.exe cmd.exe PID 2880 wrote to memory of 3816 2880 Client.exe cmd.exe PID 3816 wrote to memory of 624 3816 cmd.exe chcp.com PID 3816 wrote to memory of 624 3816 cmd.exe chcp.com PID 3816 wrote to memory of 624 3816 cmd.exe chcp.com PID 3816 wrote to memory of 4848 3816 cmd.exe PING.EXE PID 3816 wrote to memory of 4848 3816 cmd.exe PING.EXE PID 3816 wrote to memory of 4848 3816 cmd.exe PING.EXE PID 3816 wrote to memory of 552 3816 cmd.exe Client.exe PID 3816 wrote to memory of 552 3816 cmd.exe Client.exe PID 3816 wrote to memory of 552 3816 cmd.exe Client.exe PID 552 wrote to memory of 3056 552 Client.exe schtasks.exe PID 552 wrote to memory of 3056 552 Client.exe schtasks.exe PID 552 wrote to memory of 3056 552 Client.exe schtasks.exe PID 552 wrote to memory of 1904 552 Client.exe cmd.exe PID 552 wrote to memory of 1904 552 Client.exe cmd.exe PID 552 wrote to memory of 1904 552 Client.exe cmd.exe PID 1904 wrote to memory of 1812 1904 cmd.exe chcp.com PID 1904 wrote to memory of 1812 1904 cmd.exe chcp.com PID 1904 wrote to memory of 1812 1904 cmd.exe chcp.com PID 1904 wrote to memory of 3872 1904 cmd.exe PING.EXE PID 1904 wrote to memory of 3872 1904 cmd.exe PING.EXE PID 1904 wrote to memory of 3872 1904 cmd.exe PING.EXE PID 1904 wrote to memory of 3700 1904 cmd.exe Client.exe PID 1904 wrote to memory of 3700 1904 cmd.exe Client.exe PID 1904 wrote to memory of 3700 1904 cmd.exe Client.exe PID 3700 wrote to memory of 2984 3700 Client.exe schtasks.exe PID 3700 wrote to memory of 2984 3700 Client.exe schtasks.exe PID 3700 wrote to memory of 2984 3700 Client.exe schtasks.exe PID 3700 wrote to memory of 1588 3700 Client.exe cmd.exe PID 3700 wrote to memory of 1588 3700 Client.exe cmd.exe PID 3700 wrote to memory of 1588 3700 Client.exe cmd.exe PID 1588 wrote to memory of 1752 1588 cmd.exe chcp.com PID 1588 wrote to memory of 1752 1588 cmd.exe chcp.com PID 1588 wrote to memory of 1752 1588 cmd.exe chcp.com PID 1588 wrote to memory of 4388 1588 cmd.exe PING.EXE PID 1588 wrote to memory of 4388 1588 cmd.exe PING.EXE PID 1588 wrote to memory of 4388 1588 cmd.exe PING.EXE PID 1588 wrote to memory of 1672 1588 cmd.exe Client.exe PID 1588 wrote to memory of 1672 1588 cmd.exe Client.exe PID 1588 wrote to memory of 1672 1588 cmd.exe Client.exe PID 1672 wrote to memory of 3656 1672 Client.exe schtasks.exe PID 1672 wrote to memory of 3656 1672 Client.exe schtasks.exe PID 1672 wrote to memory of 3656 1672 Client.exe schtasks.exe PID 1672 wrote to memory of 1444 1672 Client.exe cmd.exe PID 1672 wrote to memory of 1444 1672 Client.exe cmd.exe PID 1672 wrote to memory of 1444 1672 Client.exe cmd.exe PID 1444 wrote to memory of 1552 1444 cmd.exe chcp.com PID 1444 wrote to memory of 1552 1444 cmd.exe chcp.com PID 1444 wrote to memory of 1552 1444 cmd.exe chcp.com PID 1444 wrote to memory of 4868 1444 cmd.exe PING.EXE
Processes
-
C:\Users\Admin\AppData\Local\Temp\uni\Uni - Copy (11) - Copy - Copy - Copy.exe"C:\Users\Admin\AppData\Local\Temp\uni\Uni - Copy (11) - Copy - Copy - Copy.exe"1⤵
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\schtasks.exe"schtasks" /create /tn "SeroXen" /sc ONLOGON /tr "C:\Users\Admin\AppData\Local\Temp\uni\Uni - Copy (11) - Copy - Copy - Copy.exe" /rl HIGHEST /f2⤵
- Creates scheduled task(s)
-
C:\Users\Admin\AppData\Roaming\SubDir\Client.exe"C:\Users\Admin\AppData\Roaming\SubDir\Client.exe"2⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\schtasks.exe"schtasks" /create /tn "SeroXen" /sc ONLOGON /tr "C:\Users\Admin\AppData\Roaming\SubDir\Client.exe" /rl HIGHEST /f3⤵
- Creates scheduled task(s)
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\iHi3NjG3kkQu.bat" "3⤵
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\chcp.comchcp 650014⤵
-
C:\Windows\SysWOW64\PING.EXEping -n 10 localhost4⤵
- Runs ping.exe
-
C:\Users\Admin\AppData\Roaming\SubDir\Client.exe"C:\Users\Admin\AppData\Roaming\SubDir\Client.exe"4⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\schtasks.exe"schtasks" /create /tn "SeroXen" /sc ONLOGON /tr "C:\Users\Admin\AppData\Roaming\SubDir\Client.exe" /rl HIGHEST /f5⤵
- Creates scheduled task(s)
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\PDo2sHZqhyxw.bat" "5⤵
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\chcp.comchcp 650016⤵
-
C:\Windows\SysWOW64\PING.EXEping -n 10 localhost6⤵
- Runs ping.exe
-
C:\Users\Admin\AppData\Roaming\SubDir\Client.exe"C:\Users\Admin\AppData\Roaming\SubDir\Client.exe"6⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\schtasks.exe"schtasks" /create /tn "SeroXen" /sc ONLOGON /tr "C:\Users\Admin\AppData\Roaming\SubDir\Client.exe" /rl HIGHEST /f7⤵
- Creates scheduled task(s)
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\CrJNneW0bqOc.bat" "7⤵
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\chcp.comchcp 650018⤵
-
C:\Windows\SysWOW64\PING.EXEping -n 10 localhost8⤵
- Runs ping.exe
-
C:\Users\Admin\AppData\Roaming\SubDir\Client.exe"C:\Users\Admin\AppData\Roaming\SubDir\Client.exe"8⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\schtasks.exe"schtasks" /create /tn "SeroXen" /sc ONLOGON /tr "C:\Users\Admin\AppData\Roaming\SubDir\Client.exe" /rl HIGHEST /f9⤵
- Creates scheduled task(s)
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\CTn3jSpV1A1E.bat" "9⤵
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\chcp.comchcp 6500110⤵
-
C:\Windows\SysWOW64\PING.EXEping -n 10 localhost10⤵
- Runs ping.exe
-
C:\Users\Admin\AppData\Roaming\SubDir\Client.exe"C:\Users\Admin\AppData\Roaming\SubDir\Client.exe"10⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
-
C:\Windows\SysWOW64\schtasks.exe"schtasks" /create /tn "SeroXen" /sc ONLOGON /tr "C:\Users\Admin\AppData\Roaming\SubDir\Client.exe" /rl HIGHEST /f11⤵
- Creates scheduled task(s)
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\eCpmmCfkb5ZI.bat" "11⤵
-
C:\Windows\SysWOW64\chcp.comchcp 6500112⤵
-
C:\Windows\SysWOW64\PING.EXEping -n 10 localhost12⤵
- Runs ping.exe
-
C:\Users\Admin\AppData\Roaming\SubDir\Client.exe"C:\Users\Admin\AppData\Roaming\SubDir\Client.exe"12⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
-
C:\Windows\SysWOW64\schtasks.exe"schtasks" /create /tn "SeroXen" /sc ONLOGON /tr "C:\Users\Admin\AppData\Roaming\SubDir\Client.exe" /rl HIGHEST /f13⤵
- Creates scheduled task(s)
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\vRgZmfwwltum.bat" "13⤵
-
C:\Windows\SysWOW64\chcp.comchcp 6500114⤵
-
C:\Windows\SysWOW64\PING.EXEping -n 10 localhost14⤵
- Runs ping.exe
-
C:\Users\Admin\AppData\Roaming\SubDir\Client.exe"C:\Users\Admin\AppData\Roaming\SubDir\Client.exe"14⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
-
C:\Windows\SysWOW64\schtasks.exe"schtasks" /create /tn "SeroXen" /sc ONLOGON /tr "C:\Users\Admin\AppData\Roaming\SubDir\Client.exe" /rl HIGHEST /f15⤵
- Creates scheduled task(s)
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\assalJzEbYwg.bat" "15⤵
-
C:\Windows\SysWOW64\chcp.comchcp 6500116⤵
-
C:\Windows\SysWOW64\PING.EXEping -n 10 localhost16⤵
- Runs ping.exe
-
C:\Users\Admin\AppData\Roaming\SubDir\Client.exe"C:\Users\Admin\AppData\Roaming\SubDir\Client.exe"16⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
-
C:\Windows\SysWOW64\schtasks.exe"schtasks" /create /tn "SeroXen" /sc ONLOGON /tr "C:\Users\Admin\AppData\Roaming\SubDir\Client.exe" /rl HIGHEST /f17⤵
- Creates scheduled task(s)
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\9n73C1G8DSNk.bat" "17⤵
-
C:\Windows\SysWOW64\chcp.comchcp 6500118⤵
-
C:\Windows\SysWOW64\PING.EXEping -n 10 localhost18⤵
- Runs ping.exe
-
C:\Users\Admin\AppData\Roaming\SubDir\Client.exe"C:\Users\Admin\AppData\Roaming\SubDir\Client.exe"18⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
-
C:\Windows\SysWOW64\schtasks.exe"schtasks" /create /tn "SeroXen" /sc ONLOGON /tr "C:\Users\Admin\AppData\Roaming\SubDir\Client.exe" /rl HIGHEST /f19⤵
- Creates scheduled task(s)
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\km52VvtnHFTO.bat" "19⤵
-
C:\Windows\SysWOW64\chcp.comchcp 6500120⤵
-
C:\Windows\SysWOW64\PING.EXEping -n 10 localhost20⤵
- Runs ping.exe
-
C:\Users\Admin\AppData\Roaming\SubDir\Client.exe"C:\Users\Admin\AppData\Roaming\SubDir\Client.exe"20⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
-
C:\Windows\SysWOW64\schtasks.exe"schtasks" /create /tn "SeroXen" /sc ONLOGON /tr "C:\Users\Admin\AppData\Roaming\SubDir\Client.exe" /rl HIGHEST /f21⤵
- Creates scheduled task(s)
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\Vnz7wi3Fjakg.bat" "21⤵
-
C:\Windows\SysWOW64\chcp.comchcp 6500122⤵
-
C:\Windows\SysWOW64\PING.EXEping -n 10 localhost22⤵
- Runs ping.exe
-
C:\Users\Admin\AppData\Roaming\SubDir\Client.exe"C:\Users\Admin\AppData\Roaming\SubDir\Client.exe"22⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
-
C:\Windows\SysWOW64\schtasks.exe"schtasks" /create /tn "SeroXen" /sc ONLOGON /tr "C:\Users\Admin\AppData\Roaming\SubDir\Client.exe" /rl HIGHEST /f23⤵
- Creates scheduled task(s)
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\SuYoMa6F1Ls9.bat" "23⤵
-
C:\Windows\SysWOW64\chcp.comchcp 6500124⤵
-
C:\Windows\SysWOW64\PING.EXEping -n 10 localhost24⤵
- Runs ping.exe
-
C:\Users\Admin\AppData\Roaming\SubDir\Client.exe"C:\Users\Admin\AppData\Roaming\SubDir\Client.exe"24⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
-
C:\Windows\SysWOW64\schtasks.exe"schtasks" /create /tn "SeroXen" /sc ONLOGON /tr "C:\Users\Admin\AppData\Roaming\SubDir\Client.exe" /rl HIGHEST /f25⤵
- Creates scheduled task(s)
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\3tWnfUju58yn.bat" "25⤵
-
C:\Windows\SysWOW64\chcp.comchcp 6500126⤵
-
C:\Windows\SysWOW64\PING.EXEping -n 10 localhost26⤵
- Runs ping.exe
-
C:\Users\Admin\AppData\Roaming\SubDir\Client.exe"C:\Users\Admin\AppData\Roaming\SubDir\Client.exe"26⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
-
C:\Windows\SysWOW64\schtasks.exe"schtasks" /create /tn "SeroXen" /sc ONLOGON /tr "C:\Users\Admin\AppData\Roaming\SubDir\Client.exe" /rl HIGHEST /f27⤵
- Creates scheduled task(s)
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\ZnwWJRqUBEiy.bat" "27⤵
-
C:\Windows\SysWOW64\chcp.comchcp 6500128⤵
-
C:\Windows\SysWOW64\PING.EXEping -n 10 localhost28⤵
- Runs ping.exe
-
C:\Users\Admin\AppData\Roaming\SubDir\Client.exe"C:\Users\Admin\AppData\Roaming\SubDir\Client.exe"28⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
-
C:\Windows\SysWOW64\schtasks.exe"schtasks" /create /tn "SeroXen" /sc ONLOGON /tr "C:\Users\Admin\AppData\Roaming\SubDir\Client.exe" /rl HIGHEST /f29⤵
- Creates scheduled task(s)
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\UPMPx8HQn2wX.bat" "29⤵
-
C:\Windows\SysWOW64\chcp.comchcp 6500130⤵
-
C:\Windows\SysWOW64\PING.EXEping -n 10 localhost30⤵
- Runs ping.exe
-
C:\Users\Admin\AppData\Roaming\SubDir\Client.exe"C:\Users\Admin\AppData\Roaming\SubDir\Client.exe"30⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
-
C:\Windows\SysWOW64\schtasks.exe"schtasks" /create /tn "SeroXen" /sc ONLOGON /tr "C:\Users\Admin\AppData\Roaming\SubDir\Client.exe" /rl HIGHEST /f31⤵
- Creates scheduled task(s)
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\CPRkbBIYkYWu.bat" "31⤵
-
C:\Windows\SysWOW64\chcp.comchcp 6500132⤵
-
C:\Windows\SysWOW64\PING.EXEping -n 10 localhost32⤵
- Runs ping.exe
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1324 -s 167631⤵
- Program crash
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 412 -s 171229⤵
- Program crash
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1052 -s 166827⤵
- Program crash
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2224 -s 222425⤵
- Program crash
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3948 -s 109223⤵
- Program crash
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4412 -s 166821⤵
- Program crash
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1544 -s 172019⤵
- Program crash
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3628 -s 224817⤵
- Program crash
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3040 -s 109215⤵
- Program crash
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 5032 -s 171213⤵
- Program crash
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 5104 -s 219611⤵
- Program crash
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1672 -s 16409⤵
- Program crash
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3700 -s 10807⤵
- Program crash
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 552 -s 10885⤵
- Program crash
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2880 -s 19083⤵
- Program crash
-
C:\Windows\SysWOW64\SCHTASKS.exe"SCHTASKS.exe" /create /tn "$77Uni - Copy (11) - Copy - Copy - Copy.exe" /tr "'C:\Users\Admin\AppData\Local\Temp\uni\Uni - Copy (11) - Copy - Copy - Copy.exe'" /sc onlogon /rl HIGHEST2⤵
- Creates scheduled task(s)
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 408 -p 2880 -ip 28801⤵
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 484 -p 552 -ip 5521⤵
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 484 -p 3700 -ip 37001⤵
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 484 -p 1672 -ip 16721⤵
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 416 -p 5104 -ip 51041⤵
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 436 -p 5032 -ip 50321⤵
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 528 -p 3040 -ip 30401⤵
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 444 -p 3628 -ip 36281⤵
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 536 -p 1544 -ip 15441⤵
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 416 -p 4412 -ip 44121⤵
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 492 -p 3948 -ip 39481⤵
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 544 -p 2224 -ip 22241⤵
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 416 -p 1052 -ip 10521⤵
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 552 -p 412 -ip 4121⤵
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 552 -p 1324 -ip 13241⤵
Network
MITRE ATT&CK Matrix ATT&CK v13
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Local\Temp\3tWnfUju58yn.batFilesize
207B
MD5cc77247929bce6f8a72a279267d86466
SHA175c98de2f9665053f904a23a5e307d4e9ceb2aef
SHA2565067a1bf303b310facc626cef2732708f519e58715f8b4ff0208282ff4cf1a60
SHA5127e459144720e57bfa25971fc20cb2b2b33eaca640dc281f253978242e9036bf3967506a8a96601f3cbac5113e8127fa8ac5d1ff60437e3ccc996be93d36da1c4
-
C:\Users\Admin\AppData\Local\Temp\9n73C1G8DSNk.batFilesize
207B
MD51d5da11196593cd39a927d22b91e90f2
SHA16d13f4a371be346e4bbee367af50f5bf17d56aef
SHA256c574176f3d2efd02e202e7d982c2b24068e91465ccd21fea8ceb9c5195c70d08
SHA5120870f223f8ba7587038e1349bd1305197be037b7f65ef72c9d2cae9217f33c2f9a9d4895d24e06bcd9218d69ec89ee250fa76671bf4a05e413582f965a080249
-
C:\Users\Admin\AppData\Local\Temp\CPRkbBIYkYWu.batFilesize
207B
MD54fbecd9396cb2c9f8034896873f2baf8
SHA12fc93f5f764b3b7bbffaedf97d388eacd5cf12a8
SHA256d8dfdc5c22ce4f1071dc9ffb79f15874cf0f68ef54a9bb2650dcca6ecfd46c14
SHA512bd737ee501c5cfd2b629eff47d34ae4505ce89957b8448632520d0c9941297c1cc3fa8490bd7632d76d3611c0b3e8384c0d8853f5da5876730f2a79d2b2842d8
-
C:\Users\Admin\AppData\Local\Temp\CTn3jSpV1A1E.batFilesize
207B
MD58923da715014849cfd21749dd4f4f4ea
SHA12b6630e02ec2841e4750268a1af8162333915f1b
SHA256171cb8377ca6914ed04140a4b072171ed78e0a4b03274c37f150ab784e949a29
SHA51215e29138e0b0c249789a6e595ebd5a46ec067a30a90e6498ada2894ce651093b839d01c1c25466b3a9fddfcfa6112be97f03690d57fa19d3fe774d142b64f354
-
C:\Users\Admin\AppData\Local\Temp\CrJNneW0bqOc.batFilesize
207B
MD56f9946e350f6358a3867c4cf049d0091
SHA1f5604143fefd10ab07d4b55a50e465b1130e63af
SHA25637965aeff527a0ec09fb2f67653edcc5c89696b27a9557cf8dd9e5abfc79f497
SHA512b46a2bf2b4ef2daaa1dab32fe4443dab93112aefba961e8cb1d4918bc398236e79c89c03865a1610a1a68b6154e5ce3ac6c325224f763f7b8e8771008976a714
-
C:\Users\Admin\AppData\Local\Temp\PDo2sHZqhyxw.batFilesize
207B
MD511f3bce5fae64624bee64fdca87de098
SHA1d15682c4b8845c79c2f49de355fa04d9338a73b0
SHA256fa36c0f410ffb06fd4635fe725542e1f0fd24a935f1bf25983c7f7022d4c5f94
SHA5129d26372ba90c444aa88827ba2a9b95b7d9fda13533b6714601547023091b12c11c6b7efcc20dd8a20d729f4805443e2672ca1f8d1b135ad80049983244c96e58
-
C:\Users\Admin\AppData\Local\Temp\SuYoMa6F1Ls9.batFilesize
207B
MD5ffb480d0a14040790276ab29846d5200
SHA1cb928b38f21fbaac75d2d4e56be4ed3fdedfb76f
SHA2568348741fe4e880ef4b4d39e1787c0ad085fbc3d0c18559ec0bb787470c526fce
SHA512288b81e871e2b833ce4a482f9c3a80f93cbeca2d81ae65e4eacd9c208c8b41c59dcbc1234f1541500263f7ad46b01cd9ee54389ba24f1db1038300e86af86f7f
-
C:\Users\Admin\AppData\Local\Temp\UPMPx8HQn2wX.batFilesize
207B
MD5750d32fa2b2f6b886e8d3b7d1b1da2ec
SHA142312ad1843bda13839ca92d5801ce2e6594dd3d
SHA2564703c9fb0d2f51a127988d5e3ec542a49275e2d8598c5f8a2f0d51657274a20c
SHA512d07fb3d2334d77a9c81844473de101de09c441100bc10b6d6914e1cc49122e9767157dc57e5f2c5d10242d2d08a84428c339461a7fa2ab51037340aa7dd09193
-
C:\Users\Admin\AppData\Local\Temp\Vnz7wi3Fjakg.batFilesize
207B
MD5094b8e6665858a2811ed0c4d38fda8ff
SHA1b72a1e507c554839a63b5e7e6ecf2479963ffb8e
SHA2566e2b2e453a85ec7efa350a5f188b53325740336adfb18a4c14fba7a188788dfb
SHA512c3a823c02497fa266fc7fdc6a33eaa52108fea048760c43b538aa70ece65ea23ebb35d448a36833367dd66d870bf9ffc54614cd786af9b04e6d8cef5315864b5
-
C:\Users\Admin\AppData\Local\Temp\ZnwWJRqUBEiy.batFilesize
207B
MD55586cff564df9214934ea93a12d49878
SHA19e550138e9df05ce7a52d7162815fd2c26ad27ab
SHA256f4994d12c06d5e21606ae2455fe8c582813ff9ad6845c28ebdf9ca5b706a74e0
SHA512018cfe67fe373242c7b322c7267d35f1f0d6ac5efda72eda2662c72b010ed20671c5f1a20a26bbd39d3b9a57e9a5bf800810955f5615dbf1d7c7a32df683b828
-
C:\Users\Admin\AppData\Local\Temp\assalJzEbYwg.batFilesize
207B
MD559f6b811be73baf3d4547541ae1036c0
SHA134d111c077bc1f0abdc2ba0fe3e94ec0e63915bb
SHA25611d1949d25218a19803edac0a1cf5115fa233ef34695fe452143049f428c4011
SHA5125fde6e8a19c0a593c79c06c423f4bb8606b64b8f3165f0d73bf81fa704d0b8f0771d810ef4c6044b52929d83e58b4e2382c6214e5850a7bb2db21a76fb0fe0e9
-
C:\Users\Admin\AppData\Local\Temp\eCpmmCfkb5ZI.batFilesize
207B
MD5695aaf3902370db9fd4853f00cdccc79
SHA139c871555be8c034e9a90f2c0b8087170181fb16
SHA256a5384dae8106dfb63426e8b82d9927787398b960ad2679cd9c53333fc211c935
SHA5127c54b4230e4bf88a93e6d8028a0add6b97742824a925da0adea5a35d3a6e186c13683e095fb95db33ff15ecbb6054b67465122a5b2346b65495d750cf64c9572
-
C:\Users\Admin\AppData\Local\Temp\iHi3NjG3kkQu.batFilesize
207B
MD584970403fa7ab8e77aa1f14a66bad681
SHA136a6f7db1211ca06c2ecac0b19fc7dc3bf95c174
SHA256c82636d26fb74543e28a636d38bf2c60374dc9f78e3674d298bde2a45a82cda4
SHA5120188e432e5927983947007b6d9205d758428dab5698e7e1686704075a658fd47344e1984bc56f3e9e5cd5d1bf6378dbae17cd42429a0e0b6d943545680f91f94
-
C:\Users\Admin\AppData\Local\Temp\km52VvtnHFTO.batFilesize
207B
MD5dc660bfa334b132d63748b98ddff3be0
SHA1cf11c98fa6288b0986a1d8ab03b78515b9152889
SHA256bbcd7e53e445c153df5e70f8b6faef5c5b9428964a485ec2fa328e1adb45b127
SHA512521b6a53b7fa4cc7a6cc73060f2cab6317c80ee8d70ef3460e628158bc6583b3b5c681f6f45748874dee2360c0a53e33d271ac23c204f3b5d3aa666e2b4c1df9
-
C:\Users\Admin\AppData\Local\Temp\vRgZmfwwltum.batFilesize
207B
MD5971f4a22757808236dbccae5033d2554
SHA15c5778266aec7aff9894e274c1638a36e444ff18
SHA2560bdc7d794522475cfcddb1a37396435e15dfa6c2d5a6511e0cc1a9b9e4b48015
SHA5123a07ceb9bf5e941492a23acc305b78ca6caaede1c15b455e0b4f04615c16d42a340e4eb0b7f9cf035b939f999cab849169bd04758df73f02a754e8b571e3940d
-
C:\Users\Admin\AppData\Roaming\Logs\06-15-2024Filesize
224B
MD59a13571d3e74285d48248d7699b172ab
SHA1921bd313d985b0086c956fe92912953a66ce2ee0
SHA2569f56220c20dea7e01ce8916364a61e2e1c9efa1a120e1273c12a64410660c1b1
SHA512ba4f1efb388264e8910904dac3f522b4925ec022027d45c7f0d271e990271e9791f4eb8be3e5f27069e55bf650da23ef2bf07bdeb0936b4b0edf10f53bc68006
-
C:\Users\Admin\AppData\Roaming\Logs\06-15-2024Filesize
224B
MD5eff94a02c91b0520cc8d8e074776c652
SHA197dfc75eb57413109e92cb8b7275eefd2df5241b
SHA256ece0444f7e89eaebee5343bbcfd6cd1dae15517a9bd760d47b3c1c98148be7ea
SHA512cb9e0b4382b2f42b5d4a31ed991c597ba3945e76b2e2cad987ca42e1e971e948d11c124f5ab506d97d9499281be8212db96275f9b7aa61c37ebfbc399e3a05ad
-
C:\Users\Admin\AppData\Roaming\Logs\06-15-2024Filesize
224B
MD573821baa8f3cce64ffdacf2fc7d5c512
SHA1015e623e4c4e0acf6777441287e532e2c2df5281
SHA256371d2f4a33623938b6743bdabe27b8c14b2075aa4c6eedc23232240714223080
SHA512f5b24e18f4da775139bf5223ff9f61c83b20f06f5951cc4dd33c395216e1fcdf347f84f509b0b57ddc40a445865b6429ad8835b9d5ca3f80dec936193f254077
-
C:\Users\Admin\AppData\Roaming\Logs\06-15-2024Filesize
224B
MD597a8501e31d232b0a939b8f3592e9f43
SHA17589cbc2c6efe87086f9271db861ea6ce3e3b538
SHA2569ec98518d1757301b3ce3dedb1ed6cce9433277954db0fd98192617d10ef72d7
SHA512921c3db7fc2d9d8cfc66a6357f86b3e572294e460471973d671041b3d92fb32ab6792a63d397b52f3e5413c7e458830af145b68a53427538a52bfbd0966f3152
-
C:\Users\Admin\AppData\Roaming\Logs\06-15-2024Filesize
224B
MD535aef2fee10a41e8d2c7c9123faff4cf
SHA1625438a02e3b62cde5a3850226f46f3c35a94c5b
SHA25600dcee2ec4fe467d4574e9ac351737686796fb7dc29febd56e47a7c23f8d416e
SHA512b8050bea02c4f831de58c0975fdf7a2970d01088ed426039a481d974194f2f34d68bc0eb9bdbb05a361d09e9e33b0b876112662e213daba166dea90b5cb55b31
-
C:\Users\Admin\AppData\Roaming\Logs\06-15-2024Filesize
224B
MD59c8ab48b4d1bb586f14b2e06c90a13e1
SHA1442bb7e73c19d32390be97cf38ca0b988a2624ec
SHA256370df25280eb7739b4727479103f22ba49a604b130e6d31e7fe104f631bceae3
SHA51220eff8553937425e4b6b2774e7018f38d6dd5d2283e649ad942888544f94e83cb0537077a566da1fa3c4eb5d95fb9e1e22f3a86281f571cb355a928093d089a6
-
C:\Users\Admin\AppData\Roaming\Logs\06-15-2024Filesize
224B
MD53579edcd5968641238a2f8e3ed9783a8
SHA183eba73ebae1ef1aedb4a6c3f8cf64097671dd43
SHA256b77181c0555d15c9b13003299c98e3e459cba3a20fdb860884b237913c8e537a
SHA512e053bef892573053564f036c2bb7b96252bae9837a2397e956b761e4f24295cca03f7babbea5c9f5254b3a336e7377203860a55361b835d6bccacf231d6107ae
-
C:\Users\Admin\AppData\Roaming\Logs\06-15-2024MD5
d41d8cd98f00b204e9800998ecf8427e
SHA1da39a3ee5e6b4b0d3255bfef95601890afd80709
SHA256e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855
SHA512cf83e1357eefb8bdf1542850d66d8007d620e4050b5715dc83f4a921d36ce9ce47d0d13c5d85f2b0ff8318d2877eec2f63b931bd47417a81a538327af927da3e
-
C:\Users\Admin\AppData\Roaming\Logs\06-15-2024Filesize
224B
MD580b820727bf831600e2e44d375998401
SHA1aad441d2010fdfb0eb5d0813537e0b9389251c49
SHA256854f473cca45cd24b82a0e2deded10038b963c21227749398dcb05bfc21dda17
SHA5121cb4f69e7a7ba0fb55c24bb24df7151651e8b91ceca42feeec6211dd05927781e352933f042fea210892e092ef0d1b434aa347d4f5ef9b3ef2bd9303bf88f58e
-
C:\Users\Admin\AppData\Roaming\SubDir\Client.exeFilesize
409KB
MD5b70fdac25a99501e3cae11f1b775249e
SHA13c59226479bfdcd1b2927bcfb1a7516d4cb8dd71
SHA25651ff3eb450a786c1aaa75ff889f2fd256412a7b75d04277fdf9fcccc20e57246
SHA51243f0d5d6e5f0d5febba537c109ffdbc250bbb6e9725e635a43ec975b0353048eaeee50b6e9274cd5e072ea6b0cea32439bd37408b2528832f467f2075f74ca44
-
memory/756-16-0x00000000749C0000-0x0000000075170000-memory.dmpFilesize
7.7MB
-
memory/756-7-0x00000000749CE000-0x00000000749CF000-memory.dmpFilesize
4KB
-
memory/756-1-0x0000000000420000-0x000000000048C000-memory.dmpFilesize
432KB
-
memory/756-2-0x0000000005410000-0x00000000059B4000-memory.dmpFilesize
5.6MB
-
memory/756-0-0x00000000749CE000-0x00000000749CF000-memory.dmpFilesize
4KB
-
memory/756-3-0x0000000004F30000-0x0000000004FC2000-memory.dmpFilesize
584KB
-
memory/756-8-0x00000000749C0000-0x0000000075170000-memory.dmpFilesize
7.7MB
-
memory/756-4-0x00000000749C0000-0x0000000075170000-memory.dmpFilesize
7.7MB
-
memory/756-6-0x00000000053F0000-0x0000000005402000-memory.dmpFilesize
72KB
-
memory/756-5-0x0000000004FD0000-0x0000000005036000-memory.dmpFilesize
408KB
-
memory/2880-24-0x00000000749C0000-0x0000000075170000-memory.dmpFilesize
7.7MB
-
memory/2880-17-0x00000000749C0000-0x0000000075170000-memory.dmpFilesize
7.7MB
-
memory/2880-15-0x00000000749C0000-0x0000000075170000-memory.dmpFilesize
7.7MB
-
memory/2880-19-0x0000000006AB0000-0x0000000006ABA000-memory.dmpFilesize
40KB