Overview
overview
10Static
static
10uni/Uni - ...py.exe
windows7-x64
10uni/Uni - ...py.exe
windows10-2004-x64
10uni/Uni - ...py.exe
windows7-x64
10uni/Uni - ...py.exe
windows10-2004-x64
10uni/Uni - ...py.exe
windows7-x64
10uni/Uni - ...py.exe
windows10-2004-x64
10uni/Uni - ...py.exe
windows7-x64
10uni/Uni - ...py.exe
windows10-2004-x64
10uni/Uni - ...py.exe
windows7-x64
10uni/Uni - ...py.exe
windows10-2004-x64
10uni/Uni - ...py.exe
windows7-x64
10uni/Uni - ...py.exe
windows10-2004-x64
10uni/Uni - ...py.exe
windows7-x64
10uni/Uni - ...py.exe
windows10-2004-x64
10uni/Uni - ...py.exe
windows7-x64
10uni/Uni - ...py.exe
windows10-2004-x64
10uni/Uni - ...py.exe
windows7-x64
10uni/Uni - ...py.exe
windows10-2004-x64
10uni/Uni - ...py.exe
windows7-x64
10uni/Uni - ...py.exe
windows10-2004-x64
10uni/Uni - ...py.exe
windows7-x64
10uni/Uni - ...py.exe
windows10-2004-x64
10uni/Uni - ...py.exe
windows7-x64
10uni/Uni - ...py.exe
windows10-2004-x64
10uni/Uni - ...py.exe
windows7-x64
10uni/Uni - ...py.exe
windows10-2004-x64
10uni/Uni - ...py.exe
windows7-x64
10uni/Uni - ...py.exe
windows10-2004-x64
10uni/Uni - ...py.exe
windows7-x64
10uni/Uni - ...py.exe
windows10-2004-x64
10uni/Uni - ...py.exe
windows7-x64
10uni/Uni - ...py.exe
windows10-2004-x64
10Analysis
-
max time kernel
298s -
max time network
309s -
platform
windows10-2004_x64 -
resource
win10v2004-20240508-en -
resource tags
arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system -
submitted
15-06-2024 07:32
Behavioral task
behavioral1
Sample
uni/Uni - Copy (10) - Copy - Copy - Copy - Copy.exe
Resource
win7-20240508-en
Behavioral task
behavioral2
Sample
uni/Uni - Copy (10) - Copy - Copy - Copy - Copy.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral3
Sample
uni/Uni - Copy (10) - Copy - Copy - Copy.exe
Resource
win7-20240508-en
Behavioral task
behavioral4
Sample
uni/Uni - Copy (10) - Copy - Copy - Copy.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral5
Sample
uni/Uni - Copy (10) - Copy - Copy.exe
Resource
win7-20240611-en
Behavioral task
behavioral6
Sample
uni/Uni - Copy (10) - Copy - Copy.exe
Resource
win10v2004-20240226-en
Behavioral task
behavioral7
Sample
uni/Uni - Copy (10) - Copy.exe
Resource
win7-20240611-en
Behavioral task
behavioral8
Sample
uni/Uni - Copy (10) - Copy.exe
Resource
win10v2004-20240611-en
Behavioral task
behavioral9
Sample
uni/Uni - Copy (100) - Copy - Copy - Copy - Copy.exe
Resource
win7-20240508-en
Behavioral task
behavioral10
Sample
uni/Uni - Copy (100) - Copy - Copy - Copy - Copy.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral11
Sample
uni/Uni - Copy (100) - Copy - Copy - Copy.exe
Resource
win7-20231129-en
Behavioral task
behavioral12
Sample
uni/Uni - Copy (100) - Copy - Copy - Copy.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral13
Sample
uni/Uni - Copy (100) - Copy - Copy.exe
Resource
win7-20240220-en
Behavioral task
behavioral14
Sample
uni/Uni - Copy (100) - Copy - Copy.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral15
Sample
uni/Uni - Copy (101) - Copy - Copy - Copy - Copy.exe
Resource
win7-20240221-en
Behavioral task
behavioral16
Sample
uni/Uni - Copy (101) - Copy - Copy - Copy - Copy.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral17
Sample
uni/Uni - Copy (101) - Copy - Copy - Copy.exe
Resource
win7-20240611-en
Behavioral task
behavioral18
Sample
uni/Uni - Copy (101) - Copy - Copy - Copy.exe
Resource
win10v2004-20240226-en
Behavioral task
behavioral19
Sample
uni/Uni - Copy (101) - Copy - Copy.exe
Resource
win7-20240611-en
Behavioral task
behavioral20
Sample
uni/Uni - Copy (101) - Copy - Copy.exe
Resource
win10v2004-20240611-en
Behavioral task
behavioral21
Sample
uni/Uni - Copy (102) - Copy - Copy - Copy.exe
Resource
win7-20240508-en
Behavioral task
behavioral22
Sample
uni/Uni - Copy (102) - Copy - Copy - Copy.exe
Resource
win10v2004-20240611-en
Behavioral task
behavioral23
Sample
uni/Uni - Copy (102) - Copy - Copy.exe
Resource
win7-20240611-en
Behavioral task
behavioral24
Sample
uni/Uni - Copy (102) - Copy - Copy.exe
Resource
win10v2004-20240611-en
Behavioral task
behavioral25
Sample
uni/Uni - Copy (103) - Copy - Copy - Copy.exe
Resource
win7-20240508-en
Behavioral task
behavioral26
Sample
uni/Uni - Copy (103) - Copy - Copy - Copy.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral27
Sample
uni/Uni - Copy (103) - Copy - Copy.exe
Resource
win7-20240221-en
Behavioral task
behavioral28
Sample
uni/Uni - Copy (103) - Copy - Copy.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral29
Sample
uni/Uni - Copy (104) - Copy - Copy - Copy.exe
Resource
win7-20231129-en
Behavioral task
behavioral30
Sample
uni/Uni - Copy (104) - Copy - Copy - Copy.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral31
Sample
uni/Uni - Copy (104) - Copy - Copy.exe
Resource
win7-20240221-en
General
-
Target
uni/Uni - Copy (10) - Copy - Copy - Copy - Copy.exe
-
Size
409KB
-
MD5
b70fdac25a99501e3cae11f1b775249e
-
SHA1
3c59226479bfdcd1b2927bcfb1a7516d4cb8dd71
-
SHA256
51ff3eb450a786c1aaa75ff889f2fd256412a7b75d04277fdf9fcccc20e57246
-
SHA512
43f0d5d6e5f0d5febba537c109ffdbc250bbb6e9725e635a43ec975b0353048eaeee50b6e9274cd5e072ea6b0cea32439bd37408b2528832f467f2075f74ca44
-
SSDEEP
12288:gpbJjGut6AoE3hVVdFaC/eZPTMTDlpgfJCKuMsVs:oVaurMLcDlpRKai
Malware Config
Extracted
quasar
3.1.5
SeroXen
panel-slave.gl.at.ply.gg:57059
panel-slave.gl.at.ply.gg:27892
$Sxr-rpL8EItHN3pqIQQVy2
-
encryption_key
Lme7VBS3l58VwLM69PNM
-
install_name
Client.exe
-
log_directory
Logs
-
reconnect_delay
3000
-
startup_key
SeroXen
-
subdirectory
SubDir
Signatures
-
Quasar payload 2 IoCs
Processes:
resource yara_rule behavioral2/memory/1068-1-0x00000000009D0000-0x0000000000A3C000-memory.dmp family_quasar C:\Users\Admin\AppData\Roaming\SubDir\Client.exe family_quasar -
Checks computer location settings 2 TTPs 14 IoCs
Looks up country code configured in the registry, likely geofence.
Processes:
Client.exeClient.exeClient.exeClient.exeClient.exeClient.exeClient.exeClient.exeClient.exeClient.exeClient.exeClient.exeClient.exeClient.exedescription ioc process Key value queried \REGISTRY\USER\S-1-5-21-4124900551-4068476067-3491212533-1000\Control Panel\International\Geo\Nation Client.exe Key value queried \REGISTRY\USER\S-1-5-21-4124900551-4068476067-3491212533-1000\Control Panel\International\Geo\Nation Client.exe Key value queried \REGISTRY\USER\S-1-5-21-4124900551-4068476067-3491212533-1000\Control Panel\International\Geo\Nation Client.exe Key value queried \REGISTRY\USER\S-1-5-21-4124900551-4068476067-3491212533-1000\Control Panel\International\Geo\Nation Client.exe Key value queried \REGISTRY\USER\S-1-5-21-4124900551-4068476067-3491212533-1000\Control Panel\International\Geo\Nation Client.exe Key value queried \REGISTRY\USER\S-1-5-21-4124900551-4068476067-3491212533-1000\Control Panel\International\Geo\Nation Client.exe Key value queried \REGISTRY\USER\S-1-5-21-4124900551-4068476067-3491212533-1000\Control Panel\International\Geo\Nation Client.exe Key value queried \REGISTRY\USER\S-1-5-21-4124900551-4068476067-3491212533-1000\Control Panel\International\Geo\Nation Client.exe Key value queried \REGISTRY\USER\S-1-5-21-4124900551-4068476067-3491212533-1000\Control Panel\International\Geo\Nation Client.exe Key value queried \REGISTRY\USER\S-1-5-21-4124900551-4068476067-3491212533-1000\Control Panel\International\Geo\Nation Client.exe Key value queried \REGISTRY\USER\S-1-5-21-4124900551-4068476067-3491212533-1000\Control Panel\International\Geo\Nation Client.exe Key value queried \REGISTRY\USER\S-1-5-21-4124900551-4068476067-3491212533-1000\Control Panel\International\Geo\Nation Client.exe Key value queried \REGISTRY\USER\S-1-5-21-4124900551-4068476067-3491212533-1000\Control Panel\International\Geo\Nation Client.exe Key value queried \REGISTRY\USER\S-1-5-21-4124900551-4068476067-3491212533-1000\Control Panel\International\Geo\Nation Client.exe -
Executes dropped EXE 14 IoCs
Processes:
Client.exeClient.exeClient.exeClient.exeClient.exeClient.exeClient.exeClient.exeClient.exeClient.exeClient.exeClient.exeClient.exeClient.exepid process 2384 Client.exe 1036 Client.exe 1668 Client.exe 456 Client.exe 4796 Client.exe 4972 Client.exe 4612 Client.exe 4456 Client.exe 1824 Client.exe 3264 Client.exe 4140 Client.exe 4636 Client.exe 4628 Client.exe 4864 Client.exe -
Looks up external IP address via web service 13 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
Processes:
flow ioc 8 api.ipify.org 15 ip-api.com 17 ip-api.com 19 ip-api.com 22 ip-api.com 31 ip-api.com 35 ip-api.com 2 ip-api.com 12 ip-api.com 24 ip-api.com 26 ip-api.com 33 ip-api.com 29 ip-api.com -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Program crash 14 IoCs
Processes:
WerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exepid pid_target process target process 2896 2384 WerFault.exe Client.exe 4728 1036 WerFault.exe Client.exe 848 1668 WerFault.exe Client.exe 2552 456 WerFault.exe Client.exe 4640 4796 WerFault.exe Client.exe 2596 4972 WerFault.exe Client.exe 4148 4612 WerFault.exe Client.exe 1464 4456 WerFault.exe Client.exe 3280 1824 WerFault.exe Client.exe 3656 3264 WerFault.exe Client.exe 4816 4140 WerFault.exe Client.exe 5084 4636 WerFault.exe Client.exe 2760 4628 WerFault.exe Client.exe 3256 4864 WerFault.exe Client.exe -
Creates scheduled task(s) 1 TTPs 16 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
Processes:
SCHTASKS.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exepid process 2252 SCHTASKS.exe 4812 schtasks.exe 8 schtasks.exe 4232 schtasks.exe 4644 schtasks.exe 2244 schtasks.exe 872 schtasks.exe 3236 schtasks.exe 2876 schtasks.exe 4036 schtasks.exe 1628 schtasks.exe 2348 schtasks.exe 1212 schtasks.exe 660 schtasks.exe 1272 schtasks.exe 4916 schtasks.exe -
Runs ping.exe 1 TTPs 14 IoCs
Processes:
PING.EXEPING.EXEPING.EXEPING.EXEPING.EXEPING.EXEPING.EXEPING.EXEPING.EXEPING.EXEPING.EXEPING.EXEPING.EXEPING.EXEpid process 3788 PING.EXE 1852 PING.EXE 4832 PING.EXE 4796 PING.EXE 3588 PING.EXE 2272 PING.EXE 2896 PING.EXE 1872 PING.EXE 3148 PING.EXE 3320 PING.EXE 2536 PING.EXE 1212 PING.EXE 4244 PING.EXE 4816 PING.EXE -
Suspicious use of AdjustPrivilegeToken 15 IoCs
Processes:
Uni - Copy (10) - Copy - Copy - Copy - Copy.exeClient.exeClient.exeClient.exeClient.exeClient.exeClient.exeClient.exeClient.exeClient.exeClient.exeClient.exeClient.exeClient.exeClient.exedescription pid process Token: SeDebugPrivilege 1068 Uni - Copy (10) - Copy - Copy - Copy - Copy.exe Token: SeDebugPrivilege 2384 Client.exe Token: SeDebugPrivilege 1036 Client.exe Token: SeDebugPrivilege 1668 Client.exe Token: SeDebugPrivilege 456 Client.exe Token: SeDebugPrivilege 4796 Client.exe Token: SeDebugPrivilege 4972 Client.exe Token: SeDebugPrivilege 4612 Client.exe Token: SeDebugPrivilege 4456 Client.exe Token: SeDebugPrivilege 1824 Client.exe Token: SeDebugPrivilege 3264 Client.exe Token: SeDebugPrivilege 4140 Client.exe Token: SeDebugPrivilege 4636 Client.exe Token: SeDebugPrivilege 4628 Client.exe Token: SeDebugPrivilege 4864 Client.exe -
Suspicious use of SetWindowsHookEx 14 IoCs
Processes:
Client.exeClient.exeClient.exeClient.exeClient.exeClient.exeClient.exeClient.exeClient.exeClient.exeClient.exeClient.exeClient.exeClient.exepid process 2384 Client.exe 1036 Client.exe 1668 Client.exe 456 Client.exe 4796 Client.exe 4972 Client.exe 4612 Client.exe 4456 Client.exe 1824 Client.exe 3264 Client.exe 4140 Client.exe 4636 Client.exe 4628 Client.exe 4864 Client.exe -
Suspicious use of WriteProcessMemory 64 IoCs
Processes:
Uni - Copy (10) - Copy - Copy - Copy - Copy.exeClient.execmd.exeClient.execmd.exeClient.execmd.exeClient.execmd.exedescription pid process target process PID 1068 wrote to memory of 2876 1068 Uni - Copy (10) - Copy - Copy - Copy - Copy.exe schtasks.exe PID 1068 wrote to memory of 2876 1068 Uni - Copy (10) - Copy - Copy - Copy - Copy.exe schtasks.exe PID 1068 wrote to memory of 2876 1068 Uni - Copy (10) - Copy - Copy - Copy - Copy.exe schtasks.exe PID 1068 wrote to memory of 2384 1068 Uni - Copy (10) - Copy - Copy - Copy - Copy.exe Client.exe PID 1068 wrote to memory of 2384 1068 Uni - Copy (10) - Copy - Copy - Copy - Copy.exe Client.exe PID 1068 wrote to memory of 2384 1068 Uni - Copy (10) - Copy - Copy - Copy - Copy.exe Client.exe PID 1068 wrote to memory of 2252 1068 Uni - Copy (10) - Copy - Copy - Copy - Copy.exe SCHTASKS.exe PID 1068 wrote to memory of 2252 1068 Uni - Copy (10) - Copy - Copy - Copy - Copy.exe SCHTASKS.exe PID 1068 wrote to memory of 2252 1068 Uni - Copy (10) - Copy - Copy - Copy - Copy.exe SCHTASKS.exe PID 2384 wrote to memory of 4812 2384 Client.exe schtasks.exe PID 2384 wrote to memory of 4812 2384 Client.exe schtasks.exe PID 2384 wrote to memory of 4812 2384 Client.exe schtasks.exe PID 2384 wrote to memory of 3908 2384 Client.exe cmd.exe PID 2384 wrote to memory of 3908 2384 Client.exe cmd.exe PID 2384 wrote to memory of 3908 2384 Client.exe cmd.exe PID 3908 wrote to memory of 2456 3908 cmd.exe chcp.com PID 3908 wrote to memory of 2456 3908 cmd.exe chcp.com PID 3908 wrote to memory of 2456 3908 cmd.exe chcp.com PID 3908 wrote to memory of 3588 3908 cmd.exe PING.EXE PID 3908 wrote to memory of 3588 3908 cmd.exe PING.EXE PID 3908 wrote to memory of 3588 3908 cmd.exe PING.EXE PID 3908 wrote to memory of 1036 3908 cmd.exe Client.exe PID 3908 wrote to memory of 1036 3908 cmd.exe Client.exe PID 3908 wrote to memory of 1036 3908 cmd.exe Client.exe PID 1036 wrote to memory of 2348 1036 Client.exe schtasks.exe PID 1036 wrote to memory of 2348 1036 Client.exe schtasks.exe PID 1036 wrote to memory of 2348 1036 Client.exe schtasks.exe PID 1036 wrote to memory of 3548 1036 Client.exe cmd.exe PID 1036 wrote to memory of 3548 1036 Client.exe cmd.exe PID 1036 wrote to memory of 3548 1036 Client.exe cmd.exe PID 3548 wrote to memory of 3576 3548 cmd.exe chcp.com PID 3548 wrote to memory of 3576 3548 cmd.exe chcp.com PID 3548 wrote to memory of 3576 3548 cmd.exe chcp.com PID 3548 wrote to memory of 1212 3548 cmd.exe PING.EXE PID 3548 wrote to memory of 1212 3548 cmd.exe PING.EXE PID 3548 wrote to memory of 1212 3548 cmd.exe PING.EXE PID 3548 wrote to memory of 1668 3548 cmd.exe Client.exe PID 3548 wrote to memory of 1668 3548 cmd.exe Client.exe PID 3548 wrote to memory of 1668 3548 cmd.exe Client.exe PID 1668 wrote to memory of 4036 1668 Client.exe schtasks.exe PID 1668 wrote to memory of 4036 1668 Client.exe schtasks.exe PID 1668 wrote to memory of 4036 1668 Client.exe schtasks.exe PID 1668 wrote to memory of 4276 1668 Client.exe cmd.exe PID 1668 wrote to memory of 4276 1668 Client.exe cmd.exe PID 1668 wrote to memory of 4276 1668 Client.exe cmd.exe PID 4276 wrote to memory of 4652 4276 cmd.exe chcp.com PID 4276 wrote to memory of 4652 4276 cmd.exe chcp.com PID 4276 wrote to memory of 4652 4276 cmd.exe chcp.com PID 4276 wrote to memory of 2272 4276 cmd.exe PING.EXE PID 4276 wrote to memory of 2272 4276 cmd.exe PING.EXE PID 4276 wrote to memory of 2272 4276 cmd.exe PING.EXE PID 4276 wrote to memory of 456 4276 cmd.exe Client.exe PID 4276 wrote to memory of 456 4276 cmd.exe Client.exe PID 4276 wrote to memory of 456 4276 cmd.exe Client.exe PID 456 wrote to memory of 1628 456 Client.exe schtasks.exe PID 456 wrote to memory of 1628 456 Client.exe schtasks.exe PID 456 wrote to memory of 1628 456 Client.exe schtasks.exe PID 456 wrote to memory of 2224 456 Client.exe cmd.exe PID 456 wrote to memory of 2224 456 Client.exe cmd.exe PID 456 wrote to memory of 2224 456 Client.exe cmd.exe PID 2224 wrote to memory of 3556 2224 cmd.exe chcp.com PID 2224 wrote to memory of 3556 2224 cmd.exe chcp.com PID 2224 wrote to memory of 3556 2224 cmd.exe chcp.com PID 2224 wrote to memory of 2896 2224 cmd.exe PING.EXE
Processes
-
C:\Users\Admin\AppData\Local\Temp\uni\Uni - Copy (10) - Copy - Copy - Copy - Copy.exe"C:\Users\Admin\AppData\Local\Temp\uni\Uni - Copy (10) - Copy - Copy - Copy - Copy.exe"1⤵
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\schtasks.exe"schtasks" /create /tn "SeroXen" /sc ONLOGON /tr "C:\Users\Admin\AppData\Local\Temp\uni\Uni - Copy (10) - Copy - Copy - Copy - Copy.exe" /rl HIGHEST /f2⤵
- Creates scheduled task(s)
-
C:\Users\Admin\AppData\Roaming\SubDir\Client.exe"C:\Users\Admin\AppData\Roaming\SubDir\Client.exe"2⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\schtasks.exe"schtasks" /create /tn "SeroXen" /sc ONLOGON /tr "C:\Users\Admin\AppData\Roaming\SubDir\Client.exe" /rl HIGHEST /f3⤵
- Creates scheduled task(s)
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\uRmkRxfaOR19.bat" "3⤵
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\chcp.comchcp 650014⤵
-
C:\Windows\SysWOW64\PING.EXEping -n 10 localhost4⤵
- Runs ping.exe
-
C:\Users\Admin\AppData\Roaming\SubDir\Client.exe"C:\Users\Admin\AppData\Roaming\SubDir\Client.exe"4⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\schtasks.exe"schtasks" /create /tn "SeroXen" /sc ONLOGON /tr "C:\Users\Admin\AppData\Roaming\SubDir\Client.exe" /rl HIGHEST /f5⤵
- Creates scheduled task(s)
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\fSgpskp2rmIR.bat" "5⤵
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\chcp.comchcp 650016⤵
-
C:\Windows\SysWOW64\PING.EXEping -n 10 localhost6⤵
- Runs ping.exe
-
C:\Users\Admin\AppData\Roaming\SubDir\Client.exe"C:\Users\Admin\AppData\Roaming\SubDir\Client.exe"6⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\schtasks.exe"schtasks" /create /tn "SeroXen" /sc ONLOGON /tr "C:\Users\Admin\AppData\Roaming\SubDir\Client.exe" /rl HIGHEST /f7⤵
- Creates scheduled task(s)
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\ukSOxfHfvfca.bat" "7⤵
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\chcp.comchcp 650018⤵
-
C:\Windows\SysWOW64\PING.EXEping -n 10 localhost8⤵
- Runs ping.exe
-
C:\Users\Admin\AppData\Roaming\SubDir\Client.exe"C:\Users\Admin\AppData\Roaming\SubDir\Client.exe"8⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\schtasks.exe"schtasks" /create /tn "SeroXen" /sc ONLOGON /tr "C:\Users\Admin\AppData\Roaming\SubDir\Client.exe" /rl HIGHEST /f9⤵
- Creates scheduled task(s)
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\WgVaB7jt4NkZ.bat" "9⤵
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\chcp.comchcp 6500110⤵
-
C:\Windows\SysWOW64\PING.EXEping -n 10 localhost10⤵
- Runs ping.exe
-
C:\Users\Admin\AppData\Roaming\SubDir\Client.exe"C:\Users\Admin\AppData\Roaming\SubDir\Client.exe"10⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
-
C:\Windows\SysWOW64\schtasks.exe"schtasks" /create /tn "SeroXen" /sc ONLOGON /tr "C:\Users\Admin\AppData\Roaming\SubDir\Client.exe" /rl HIGHEST /f11⤵
- Creates scheduled task(s)
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\2avJo4qTBTUk.bat" "11⤵
-
C:\Windows\SysWOW64\chcp.comchcp 6500112⤵
-
C:\Windows\SysWOW64\PING.EXEping -n 10 localhost12⤵
- Runs ping.exe
-
C:\Users\Admin\AppData\Roaming\SubDir\Client.exe"C:\Users\Admin\AppData\Roaming\SubDir\Client.exe"12⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
-
C:\Windows\SysWOW64\schtasks.exe"schtasks" /create /tn "SeroXen" /sc ONLOGON /tr "C:\Users\Admin\AppData\Roaming\SubDir\Client.exe" /rl HIGHEST /f13⤵
- Creates scheduled task(s)
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\VvRioczDAigQ.bat" "13⤵
-
C:\Windows\SysWOW64\chcp.comchcp 6500114⤵
-
C:\Windows\SysWOW64\PING.EXEping -n 10 localhost14⤵
- Runs ping.exe
-
C:\Users\Admin\AppData\Roaming\SubDir\Client.exe"C:\Users\Admin\AppData\Roaming\SubDir\Client.exe"14⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
-
C:\Windows\SysWOW64\schtasks.exe"schtasks" /create /tn "SeroXen" /sc ONLOGON /tr "C:\Users\Admin\AppData\Roaming\SubDir\Client.exe" /rl HIGHEST /f15⤵
- Creates scheduled task(s)
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\jDEHtXSqFbza.bat" "15⤵
-
C:\Windows\SysWOW64\chcp.comchcp 6500116⤵
-
C:\Windows\SysWOW64\PING.EXEping -n 10 localhost16⤵
- Runs ping.exe
-
C:\Users\Admin\AppData\Roaming\SubDir\Client.exe"C:\Users\Admin\AppData\Roaming\SubDir\Client.exe"16⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
-
C:\Windows\SysWOW64\schtasks.exe"schtasks" /create /tn "SeroXen" /sc ONLOGON /tr "C:\Users\Admin\AppData\Roaming\SubDir\Client.exe" /rl HIGHEST /f17⤵
- Creates scheduled task(s)
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\rUAW9gDGiUXA.bat" "17⤵
-
C:\Windows\SysWOW64\chcp.comchcp 6500118⤵
-
C:\Windows\SysWOW64\PING.EXEping -n 10 localhost18⤵
- Runs ping.exe
-
C:\Users\Admin\AppData\Roaming\SubDir\Client.exe"C:\Users\Admin\AppData\Roaming\SubDir\Client.exe"18⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
-
C:\Windows\SysWOW64\schtasks.exe"schtasks" /create /tn "SeroXen" /sc ONLOGON /tr "C:\Users\Admin\AppData\Roaming\SubDir\Client.exe" /rl HIGHEST /f19⤵
- Creates scheduled task(s)
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\boqQlUjSKbWF.bat" "19⤵
-
C:\Windows\SysWOW64\chcp.comchcp 6500120⤵
-
C:\Windows\SysWOW64\PING.EXEping -n 10 localhost20⤵
- Runs ping.exe
-
C:\Users\Admin\AppData\Roaming\SubDir\Client.exe"C:\Users\Admin\AppData\Roaming\SubDir\Client.exe"20⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
-
C:\Windows\SysWOW64\schtasks.exe"schtasks" /create /tn "SeroXen" /sc ONLOGON /tr "C:\Users\Admin\AppData\Roaming\SubDir\Client.exe" /rl HIGHEST /f21⤵
- Creates scheduled task(s)
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\m5oG4e1mtg8V.bat" "21⤵
-
C:\Windows\SysWOW64\chcp.comchcp 6500122⤵
-
C:\Windows\SysWOW64\PING.EXEping -n 10 localhost22⤵
- Runs ping.exe
-
C:\Users\Admin\AppData\Roaming\SubDir\Client.exe"C:\Users\Admin\AppData\Roaming\SubDir\Client.exe"22⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
-
C:\Windows\SysWOW64\schtasks.exe"schtasks" /create /tn "SeroXen" /sc ONLOGON /tr "C:\Users\Admin\AppData\Roaming\SubDir\Client.exe" /rl HIGHEST /f23⤵
- Creates scheduled task(s)
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\egQPvbJOygfA.bat" "23⤵
-
C:\Windows\SysWOW64\chcp.comchcp 6500124⤵
-
C:\Windows\SysWOW64\PING.EXEping -n 10 localhost24⤵
- Runs ping.exe
-
C:\Users\Admin\AppData\Roaming\SubDir\Client.exe"C:\Users\Admin\AppData\Roaming\SubDir\Client.exe"24⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
-
C:\Windows\SysWOW64\schtasks.exe"schtasks" /create /tn "SeroXen" /sc ONLOGON /tr "C:\Users\Admin\AppData\Roaming\SubDir\Client.exe" /rl HIGHEST /f25⤵
- Creates scheduled task(s)
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\QhJUMOTqR0wR.bat" "25⤵
-
C:\Windows\SysWOW64\chcp.comchcp 6500126⤵
-
C:\Windows\SysWOW64\PING.EXEping -n 10 localhost26⤵
- Runs ping.exe
-
C:\Users\Admin\AppData\Roaming\SubDir\Client.exe"C:\Users\Admin\AppData\Roaming\SubDir\Client.exe"26⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
-
C:\Windows\SysWOW64\schtasks.exe"schtasks" /create /tn "SeroXen" /sc ONLOGON /tr "C:\Users\Admin\AppData\Roaming\SubDir\Client.exe" /rl HIGHEST /f27⤵
- Creates scheduled task(s)
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\XPOz0AoJsE0D.bat" "27⤵
-
C:\Windows\SysWOW64\chcp.comchcp 6500128⤵
-
C:\Windows\SysWOW64\PING.EXEping -n 10 localhost28⤵
- Runs ping.exe
-
C:\Users\Admin\AppData\Roaming\SubDir\Client.exe"C:\Users\Admin\AppData\Roaming\SubDir\Client.exe"28⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
-
C:\Windows\SysWOW64\schtasks.exe"schtasks" /create /tn "SeroXen" /sc ONLOGON /tr "C:\Users\Admin\AppData\Roaming\SubDir\Client.exe" /rl HIGHEST /f29⤵
- Creates scheduled task(s)
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\vExpRlBffib5.bat" "29⤵
-
C:\Windows\SysWOW64\chcp.comchcp 6500130⤵
-
C:\Windows\SysWOW64\PING.EXEping -n 10 localhost30⤵
- Runs ping.exe
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4864 -s 172029⤵
- Program crash
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4628 -s 224827⤵
- Program crash
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4636 -s 224825⤵
- Program crash
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4140 -s 222423⤵
- Program crash
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3264 -s 223221⤵
- Program crash
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1824 -s 218019⤵
- Program crash
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4456 -s 218017⤵
- Program crash
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4612 -s 166015⤵
- Program crash
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4972 -s 222413⤵
- Program crash
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4796 -s 169611⤵
- Program crash
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 456 -s 22489⤵
- Program crash
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1668 -s 22487⤵
- Program crash
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1036 -s 21965⤵
- Program crash
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2384 -s 16563⤵
- Program crash
-
C:\Windows\SysWOW64\SCHTASKS.exe"SCHTASKS.exe" /create /tn "$77Uni - Copy (10) - Copy - Copy - Copy - Copy.exe" /tr "'C:\Users\Admin\AppData\Local\Temp\uni\Uni - Copy (10) - Copy - Copy - Copy - Copy.exe'" /sc onlogon /rl HIGHEST2⤵
- Creates scheduled task(s)
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 408 -p 2384 -ip 23841⤵
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 476 -p 1036 -ip 10361⤵
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 524 -p 1668 -ip 16681⤵
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 508 -p 456 -ip 4561⤵
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 532 -p 4796 -ip 47961⤵
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 404 -p 4972 -ip 49721⤵
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 532 -p 4612 -ip 46121⤵
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 480 -p 4456 -ip 44561⤵
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 548 -p 1824 -ip 18241⤵
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 508 -p 3264 -ip 32641⤵
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 580 -p 4140 -ip 41401⤵
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 508 -p 4636 -ip 46361⤵
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 488 -p 4628 -ip 46281⤵
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 596 -p 4864 -ip 48641⤵
Network
MITRE ATT&CK Matrix ATT&CK v13
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Local\Temp\2avJo4qTBTUk.batFilesize
207B
MD58e439698069e8825c2b68dd8ec878536
SHA16b0e107149dbec3c2ba028cdc1a9cf169e54fe85
SHA256501374ce65c90fd66668141252fa76fa1bbc9acf3f9cba9e4dcc292c587b1764
SHA512e99b224d5b603a0a901674bcb109adb41b34c8738b15f9e64bc8bac570ed8d29dc8895290621d3c48061f102efc2d7901b7312f12e1d9519309c19c20b724dd1
-
C:\Users\Admin\AppData\Local\Temp\QhJUMOTqR0wR.batFilesize
207B
MD5476460a2dfa43a696246d6c127733998
SHA1bbb218a9393f40e0f803c61029168589293b170a
SHA25616e466e87b1b39c0d8c6cef7ff8c43b5de7db4543d47e536b70cd73323190a6c
SHA5128fe4a3eb20fe10eebead8ef65850b15cc62eb9681042654e5f5c75f5e988df42c63f6b68f6c67edc6a9fdc1b7ea484808ae7bf0f7e9aaabeaf0e10a849b59fc2
-
C:\Users\Admin\AppData\Local\Temp\VvRioczDAigQ.batFilesize
207B
MD53b2bb1df38be4d476d56835eef1c7b2c
SHA17eb3070c3b27690b36de50d50934c832434fdea0
SHA2560c356ae5cd977ec47c4367c8d77ccfb38065ef789bd58c2a2549cb5a2262b59b
SHA51260c3ccd645c868121dd96cbaf134684971951f9386211b1c7b6da31e11e64cf4dbacf5288cb11f11580cad96b91516b9374b9e7b33320d4f23b5998deca69a78
-
C:\Users\Admin\AppData\Local\Temp\WgVaB7jt4NkZ.batFilesize
207B
MD586bf98090e656c6fe3623f76e7173df8
SHA1a1a5ec50b18cce68a8b4466b1e41ea7ab01373e2
SHA256d5b73fdecdbe4c04aba735f3960d87ea019b3de3e476ba1040a1632d5fd587bd
SHA5122f6a79f027e047aaf6388afd2a2cce3f43f9009f00ec9f563bc9ea1ade1aad7b3caaa2c88f1f1ef909f4e4b84c19da2a9da4c87255c25458357e8c91b5fd76dc
-
C:\Users\Admin\AppData\Local\Temp\XPOz0AoJsE0D.batFilesize
207B
MD5d173b887eee0651ba4ba6f4799c96cac
SHA1257cc3d2c403073ad14d03222d9da8b4433c358c
SHA256b58e6c59ff91d508e5a789813ba45da76b40ded507c9a224cf48cce0fb3b64c3
SHA5126affd9f15ab20219c00a5e1fd15f88d01e42a1c3657e5d86795517e33273cb957c997b6843d11e219c0656dec323776327a604267b6a61fd23530e02bde64c38
-
C:\Users\Admin\AppData\Local\Temp\boqQlUjSKbWF.batFilesize
207B
MD5860a873cb759685e826392bc6d3a0fdc
SHA11e83a56c3fceee423caddf01d5a848ddfdde00b8
SHA25676de3302da6d02fdcea44f80e2f7f8ec51fc4bb46c553d44190c3ee6fcca873c
SHA512224c3e73d006c56377728db43dda751af251485246fab29124ead3c6be6f3e65b46f915aafb94ced365cf3f580007a7fe6e04850b4d91ed0aef36c9f3c69d634
-
C:\Users\Admin\AppData\Local\Temp\egQPvbJOygfA.batFilesize
207B
MD52c0665e6c46afce2c0ff30318b40dd6a
SHA1460f2f4c49395507841ee5a18cd5f0ef2e5bdb77
SHA256b2a8b20985965fac73b0cc93fc0e9290897ba7a582f37cc5b66a7b7380e85e6b
SHA512b207ecab4ea375ffeece8c6a78d154bffd0101550076b294570534aeaadabf78299f9bd822cceb0859a56bfebd63ec6e9169c2c3a5c34e030ba22c1fe758d576
-
C:\Users\Admin\AppData\Local\Temp\fSgpskp2rmIR.batFilesize
207B
MD5967ecfad66639dfe8a680795a2c12d53
SHA178718c4decc47d8a390eaae26956c41d152080ce
SHA256fdaa4c2812ae92defb28c7d42057f433e42864fe3aed8af095e870fbe666bb9d
SHA5128420ea7396a274bee3e1d076588294805fc3c8379ec71dc4cad5ab908976adb3080e934ddabcd67b8c8ec074abfae75ef657b9cef93eeae03a09deb651d481b6
-
C:\Users\Admin\AppData\Local\Temp\jDEHtXSqFbza.batFilesize
207B
MD5b1fcc62d66e31937e4fe601d0b1f1013
SHA147aa5fbda021a5088707e1723d29ae36797ecd7f
SHA256dccbd8beae0c7f1557a8a45031720beb555db776353134c507783a5419e42bee
SHA512b69077a5f41748e85cddb18aca275181c7f010af69a05a56d5a8149a38d0a171776fdfe25f9b22b4aa1b408846fd35bc744c08e05652534a0b3ef76cd584f474
-
C:\Users\Admin\AppData\Local\Temp\m5oG4e1mtg8V.batFilesize
207B
MD57e08380bb484f241d7a9bd5e69481961
SHA17189a7ece24961ed6f3ed30fba46f8a29467df13
SHA256f94b38275326f3471304642a9b19cf36802c75a4d0edcf5870e9a420b45e8c9e
SHA51270cf181d2796934259533fbb3cda999c5a68be08ab11efab24de9e6e6b8ae3702291adf139bf47d64b4ba650b5eaabae82c8019856f3e736f2a9bc75c6f3c650
-
C:\Users\Admin\AppData\Local\Temp\rUAW9gDGiUXA.batFilesize
207B
MD570c7ea5046ed60658dd928519d5c1b9e
SHA19b8a04f81f08defc7a7bf7ebde1a04606a7334d0
SHA256754b3cd1e40f12f53cfe3e5422ae58100d26d77362dd0e07e2323bc9c37b3306
SHA512ca0bf7616109fbd560be0b6388d7304d2560c64dc1f299bd032d90e53723c3edba023773420fe41ace31ad51e7cca34ec1c07c1cc9191388159bdb09489ffc56
-
C:\Users\Admin\AppData\Local\Temp\uRmkRxfaOR19.batFilesize
207B
MD5f0975b3274fa09c74e9789804c185b1f
SHA168f2a3072489fc43abae82cdea92f46a865f6a85
SHA256829df18ceeb70b4962186de934abce77519d479f24f97c6df84d97c6c6ef978f
SHA512122a4588897cbf4d1b8a250c6a7f06ef30cd346f447003b05bee0d41b2d7e4b47ac7079fef6436e1bbe9271e427976f681a455597ba8c9c136fdc5ad31ed7509
-
C:\Users\Admin\AppData\Local\Temp\ukSOxfHfvfca.batFilesize
207B
MD50afe1b9c6cf09e4d0708fdf0c192ee41
SHA12527ca2d87546b24d5d959534a3d078556421b53
SHA256a5f21ea6deafaf87cc524116021533aec5b477a512efcaca11ad7926da4f5963
SHA5129bd8b3cb7a24fb242637b8abb1700aabab4f9e4147187142afc50c7c25f5d3ed9b91c932d5f01c2a1b5b0c7e0ecb51d8ed2ba5b3fef84c80565d2b5e0bd7a039
-
C:\Users\Admin\AppData\Local\Temp\vExpRlBffib5.batFilesize
207B
MD54b68a94235f2d085b7cb22ab2cff5d25
SHA1ce41cae3ab7342e6653b4727da4ecf345979cfbf
SHA256350dc800a28a854e9b33f5d88bbdb6dab48e8277cb72ba4b42375330285a6921
SHA512853ce344fc22975338009626dc841829cd2993ece52601064c053cccb3078a40c75e113db5addfde2a4d7d4ac75e442f89df24358c91a377413a064017a8353b
-
C:\Users\Admin\AppData\Roaming\Logs\06-15-2024Filesize
224B
MD563da7970aa3146eb91c6af6d79bb42c1
SHA11b2e1240ee5d6053f0578586064201f559a4c7f7
SHA256c139d4efe33aab6d1ce017569fc7e1cd0a6738346bc23344096f2fb51e6b0b6a
SHA512a50b128c984aea76f8ff5bc6dcf53c93b8661a26e67913fd350f9145b4c91152b138bb46febc28e5fe58f6f4b7fdbef8202d916f413a8c40aa8b61d7eab7813d
-
C:\Users\Admin\AppData\Roaming\Logs\06-15-2024Filesize
224B
MD56d4369724679450e30d1045f8a600a88
SHA12088d6f2877aab63cab8bf92b2609413fb16f151
SHA2560832b3a92e61bc2139a2a35a94c8eba62ee821d324af75e9756dbd438d809f9d
SHA512a5a1228927d56631a07959ed884b9088b846152fd2ea9217339166c9f22bff5897811994c1f1fb9b84fa38af02253ee33f0cdfd2f219b93512e879bc3e9cc57f
-
C:\Users\Admin\AppData\Roaming\Logs\06-15-2024Filesize
224B
MD55e47b7e92ab8a19cb82a4aba144b0273
SHA1852599d0d757e40ef4bb26a40352dc4f977a0b1f
SHA256ca6b9143aca14056cdcc9cd4da02716aa00250333ddc87d0df20406ab39e6277
SHA512e819c2a0d1763ed1c6ff3ea1304ae961b1110b20d943955a20354831b69eee69e1e2c486d151493e3d0b1a9726a4a3ff3aea2b1e4debcb2f3bd2237ef5e389b0
-
C:\Users\Admin\AppData\Roaming\Logs\06-15-2024MD5
d41d8cd98f00b204e9800998ecf8427e
SHA1da39a3ee5e6b4b0d3255bfef95601890afd80709
SHA256e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855
SHA512cf83e1357eefb8bdf1542850d66d8007d620e4050b5715dc83f4a921d36ce9ce47d0d13c5d85f2b0ff8318d2877eec2f63b931bd47417a81a538327af927da3e
-
C:\Users\Admin\AppData\Roaming\Logs\06-15-2024Filesize
224B
MD5bae8e79550ef336b500b3677fa32f31a
SHA100a992ce6e052ccf679be6162db8b29e0e63ed84
SHA2566d2b5e9154bc182b621e2a733e0a38146065012d4292121f693e2fe4745afbb9
SHA512418498dabcf683074a981f5010d1749d06773b364cff6ace925e704d38c2825134b00630ecc03f6de8325aeb50cb9620b49730e37cc4922ddd1c9beba696c351
-
C:\Users\Admin\AppData\Roaming\Logs\06-15-2024Filesize
224B
MD53415fcd350d9dda71f95b8eb7cc93e5a
SHA14aef985e04195e88e87c4f7c7c4cc45b4d57fe21
SHA2563920cec23feb35b59d26ffa673f2f8ff706b8c846b8f6fca54fdec68cf49b91b
SHA512168ee5e6779a22ebca0b30a2219a9e4e782e005ee9df03031c934f47b695d72bac4a4897d68e6395e485ed4be9aae538772febc69ac08d68838b32d1a98707f6
-
C:\Users\Admin\AppData\Roaming\Logs\06-15-2024Filesize
224B
MD5ba9e4a590b284ac6c884999f968b493c
SHA10a9568aa6b68f3f98babac09eafe3576c59b7766
SHA2564687ec58ac09d7b5f790fd65b5f917531402204cc72841a79c1851f6d081e0de
SHA512a2219a6ce92a55d02bb860b0172a404268c9424a6b4791afd95c6ec3118d7804aee2a61225e858ffe2d360ade7a3e06bf945b0ccb66b0097f5ac62f0f0001e8d
-
C:\Users\Admin\AppData\Roaming\Logs\06-15-2024Filesize
224B
MD5a2bcaa5f72969bc5799fdddd6be47efa
SHA10c8856d2429496b3fe27d658110bce8f4cde45b6
SHA256c0811b6a49be218bdaae63d96fb8a611c0f20839a3fe26385c1f05a9d1a5b5ae
SHA512538960c7bc650ec65e70a01798d75accfe6727a1968333746ed52449c4d7b6aeb75285622ea3c18340d1aa0e55ac4a4bb16a62c387a2d990ae61966d0c32568e
-
C:\Users\Admin\AppData\Roaming\SubDir\Client.exeFilesize
409KB
MD5b70fdac25a99501e3cae11f1b775249e
SHA13c59226479bfdcd1b2927bcfb1a7516d4cb8dd71
SHA25651ff3eb450a786c1aaa75ff889f2fd256412a7b75d04277fdf9fcccc20e57246
SHA51243f0d5d6e5f0d5febba537c109ffdbc250bbb6e9725e635a43ec975b0353048eaeee50b6e9274cd5e072ea6b0cea32439bd37408b2528832f467f2075f74ca44
-
memory/1068-5-0x00000000054B0000-0x0000000005516000-memory.dmpFilesize
408KB
-
memory/1068-6-0x0000000005960000-0x0000000005972000-memory.dmpFilesize
72KB
-
memory/1068-16-0x00000000745E0000-0x0000000074D90000-memory.dmpFilesize
7.7MB
-
memory/1068-8-0x00000000745E0000-0x0000000074D90000-memory.dmpFilesize
7.7MB
-
memory/1068-0-0x00000000745EE000-0x00000000745EF000-memory.dmpFilesize
4KB
-
memory/1068-7-0x00000000745EE000-0x00000000745EF000-memory.dmpFilesize
4KB
-
memory/1068-1-0x00000000009D0000-0x0000000000A3C000-memory.dmpFilesize
432KB
-
memory/1068-2-0x00000000059C0000-0x0000000005F64000-memory.dmpFilesize
5.6MB
-
memory/1068-3-0x0000000005410000-0x00000000054A2000-memory.dmpFilesize
584KB
-
memory/1068-4-0x00000000745E0000-0x0000000074D90000-memory.dmpFilesize
7.7MB
-
memory/2384-24-0x00000000745E0000-0x0000000074D90000-memory.dmpFilesize
7.7MB
-
memory/2384-19-0x0000000006210000-0x000000000621A000-memory.dmpFilesize
40KB
-
memory/2384-15-0x00000000745E0000-0x0000000074D90000-memory.dmpFilesize
7.7MB
-
memory/2384-17-0x00000000745E0000-0x0000000074D90000-memory.dmpFilesize
7.7MB