Overview
overview
10Static
static
10uni/Uni - ...py.exe
windows7-x64
10uni/Uni - ...py.exe
windows10-2004-x64
10uni/Uni - ...py.exe
windows7-x64
10uni/Uni - ...py.exe
windows10-2004-x64
10uni/Uni - ...py.exe
windows7-x64
10uni/Uni - ...py.exe
windows10-2004-x64
10uni/Uni - ...py.exe
windows7-x64
10uni/Uni - ...py.exe
windows10-2004-x64
10uni/Uni - ...py.exe
windows7-x64
10uni/Uni - ...py.exe
windows10-2004-x64
10uni/Uni - ...py.exe
windows7-x64
10uni/Uni - ...py.exe
windows10-2004-x64
10uni/Uni - ...py.exe
windows7-x64
10uni/Uni - ...py.exe
windows10-2004-x64
10uni/Uni - ...py.exe
windows7-x64
10uni/Uni - ...py.exe
windows10-2004-x64
10uni/Uni - ...py.exe
windows7-x64
10uni/Uni - ...py.exe
windows10-2004-x64
10uni/Uni - ...py.exe
windows7-x64
10uni/Uni - ...py.exe
windows10-2004-x64
10uni/Uni - ...py.exe
windows7-x64
10uni/Uni - ...py.exe
windows10-2004-x64
10uni/Uni - ...py.exe
windows7-x64
10uni/Uni - ...py.exe
windows10-2004-x64
10uni/Uni - ...py.exe
windows7-x64
10uni/Uni - ...py.exe
windows10-2004-x64
10uni/Uni - ...py.exe
windows7-x64
10uni/Uni - ...py.exe
windows10-2004-x64
10uni/Uni - ...py.exe
windows7-x64
10uni/Uni - ...py.exe
windows10-2004-x64
10uni/Uni - ...py.exe
windows7-x64
10uni/Uni - ...py.exe
windows10-2004-x64
10Analysis
-
max time kernel
300s -
max time network
314s -
platform
windows10-2004_x64 -
resource
win10v2004-20240508-en -
resource tags
arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system -
submitted
15-06-2024 07:32
Behavioral task
behavioral1
Sample
uni/Uni - Copy (10) - Copy - Copy - Copy - Copy.exe
Resource
win7-20240508-en
Behavioral task
behavioral2
Sample
uni/Uni - Copy (10) - Copy - Copy - Copy - Copy.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral3
Sample
uni/Uni - Copy (10) - Copy - Copy - Copy.exe
Resource
win7-20240508-en
Behavioral task
behavioral4
Sample
uni/Uni - Copy (10) - Copy - Copy - Copy.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral5
Sample
uni/Uni - Copy (10) - Copy - Copy.exe
Resource
win7-20240611-en
Behavioral task
behavioral6
Sample
uni/Uni - Copy (10) - Copy - Copy.exe
Resource
win10v2004-20240226-en
Behavioral task
behavioral7
Sample
uni/Uni - Copy (10) - Copy.exe
Resource
win7-20240611-en
Behavioral task
behavioral8
Sample
uni/Uni - Copy (10) - Copy.exe
Resource
win10v2004-20240611-en
Behavioral task
behavioral9
Sample
uni/Uni - Copy (100) - Copy - Copy - Copy - Copy.exe
Resource
win7-20240508-en
Behavioral task
behavioral10
Sample
uni/Uni - Copy (100) - Copy - Copy - Copy - Copy.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral11
Sample
uni/Uni - Copy (100) - Copy - Copy - Copy.exe
Resource
win7-20231129-en
Behavioral task
behavioral12
Sample
uni/Uni - Copy (100) - Copy - Copy - Copy.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral13
Sample
uni/Uni - Copy (100) - Copy - Copy.exe
Resource
win7-20240220-en
Behavioral task
behavioral14
Sample
uni/Uni - Copy (100) - Copy - Copy.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral15
Sample
uni/Uni - Copy (101) - Copy - Copy - Copy - Copy.exe
Resource
win7-20240221-en
Behavioral task
behavioral16
Sample
uni/Uni - Copy (101) - Copy - Copy - Copy - Copy.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral17
Sample
uni/Uni - Copy (101) - Copy - Copy - Copy.exe
Resource
win7-20240611-en
Behavioral task
behavioral18
Sample
uni/Uni - Copy (101) - Copy - Copy - Copy.exe
Resource
win10v2004-20240226-en
Behavioral task
behavioral19
Sample
uni/Uni - Copy (101) - Copy - Copy.exe
Resource
win7-20240611-en
Behavioral task
behavioral20
Sample
uni/Uni - Copy (101) - Copy - Copy.exe
Resource
win10v2004-20240611-en
Behavioral task
behavioral21
Sample
uni/Uni - Copy (102) - Copy - Copy - Copy.exe
Resource
win7-20240508-en
Behavioral task
behavioral22
Sample
uni/Uni - Copy (102) - Copy - Copy - Copy.exe
Resource
win10v2004-20240611-en
Behavioral task
behavioral23
Sample
uni/Uni - Copy (102) - Copy - Copy.exe
Resource
win7-20240611-en
Behavioral task
behavioral24
Sample
uni/Uni - Copy (102) - Copy - Copy.exe
Resource
win10v2004-20240611-en
Behavioral task
behavioral25
Sample
uni/Uni - Copy (103) - Copy - Copy - Copy.exe
Resource
win7-20240508-en
Behavioral task
behavioral26
Sample
uni/Uni - Copy (103) - Copy - Copy - Copy.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral27
Sample
uni/Uni - Copy (103) - Copy - Copy.exe
Resource
win7-20240221-en
Behavioral task
behavioral28
Sample
uni/Uni - Copy (103) - Copy - Copy.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral29
Sample
uni/Uni - Copy (104) - Copy - Copy - Copy.exe
Resource
win7-20231129-en
Behavioral task
behavioral30
Sample
uni/Uni - Copy (104) - Copy - Copy - Copy.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral31
Sample
uni/Uni - Copy (104) - Copy - Copy.exe
Resource
win7-20240221-en
General
-
Target
uni/Uni - Copy (103) - Copy - Copy.exe
-
Size
409KB
-
MD5
b70fdac25a99501e3cae11f1b775249e
-
SHA1
3c59226479bfdcd1b2927bcfb1a7516d4cb8dd71
-
SHA256
51ff3eb450a786c1aaa75ff889f2fd256412a7b75d04277fdf9fcccc20e57246
-
SHA512
43f0d5d6e5f0d5febba537c109ffdbc250bbb6e9725e635a43ec975b0353048eaeee50b6e9274cd5e072ea6b0cea32439bd37408b2528832f467f2075f74ca44
-
SSDEEP
12288:gpbJjGut6AoE3hVVdFaC/eZPTMTDlpgfJCKuMsVs:oVaurMLcDlpRKai
Malware Config
Extracted
quasar
3.1.5
SeroXen
panel-slave.gl.at.ply.gg:57059
panel-slave.gl.at.ply.gg:27892
$Sxr-rpL8EItHN3pqIQQVy2
-
encryption_key
Lme7VBS3l58VwLM69PNM
-
install_name
Client.exe
-
log_directory
Logs
-
reconnect_delay
3000
-
startup_key
SeroXen
-
subdirectory
SubDir
Signatures
-
Quasar payload 2 IoCs
Processes:
resource yara_rule behavioral28/memory/1128-1-0x0000000000230000-0x000000000029C000-memory.dmp family_quasar C:\Users\Admin\AppData\Roaming\SubDir\Client.exe family_quasar -
Checks computer location settings 2 TTPs 14 IoCs
Looks up country code configured in the registry, likely geofence.
Processes:
Client.exeClient.exeClient.exeClient.exeClient.exeClient.exeClient.exeClient.exeClient.exeClient.exeClient.exeClient.exeClient.exeClient.exedescription ioc process Key value queried \REGISTRY\USER\S-1-5-21-1337824034-2731376981-3755436523-1000\Control Panel\International\Geo\Nation Client.exe Key value queried \REGISTRY\USER\S-1-5-21-1337824034-2731376981-3755436523-1000\Control Panel\International\Geo\Nation Client.exe Key value queried \REGISTRY\USER\S-1-5-21-1337824034-2731376981-3755436523-1000\Control Panel\International\Geo\Nation Client.exe Key value queried \REGISTRY\USER\S-1-5-21-1337824034-2731376981-3755436523-1000\Control Panel\International\Geo\Nation Client.exe Key value queried \REGISTRY\USER\S-1-5-21-1337824034-2731376981-3755436523-1000\Control Panel\International\Geo\Nation Client.exe Key value queried \REGISTRY\USER\S-1-5-21-1337824034-2731376981-3755436523-1000\Control Panel\International\Geo\Nation Client.exe Key value queried \REGISTRY\USER\S-1-5-21-1337824034-2731376981-3755436523-1000\Control Panel\International\Geo\Nation Client.exe Key value queried \REGISTRY\USER\S-1-5-21-1337824034-2731376981-3755436523-1000\Control Panel\International\Geo\Nation Client.exe Key value queried \REGISTRY\USER\S-1-5-21-1337824034-2731376981-3755436523-1000\Control Panel\International\Geo\Nation Client.exe Key value queried \REGISTRY\USER\S-1-5-21-1337824034-2731376981-3755436523-1000\Control Panel\International\Geo\Nation Client.exe Key value queried \REGISTRY\USER\S-1-5-21-1337824034-2731376981-3755436523-1000\Control Panel\International\Geo\Nation Client.exe Key value queried \REGISTRY\USER\S-1-5-21-1337824034-2731376981-3755436523-1000\Control Panel\International\Geo\Nation Client.exe Key value queried \REGISTRY\USER\S-1-5-21-1337824034-2731376981-3755436523-1000\Control Panel\International\Geo\Nation Client.exe Key value queried \REGISTRY\USER\S-1-5-21-1337824034-2731376981-3755436523-1000\Control Panel\International\Geo\Nation Client.exe -
Executes dropped EXE 14 IoCs
Processes:
Client.exeClient.exeClient.exeClient.exeClient.exeClient.exeClient.exeClient.exeClient.exeClient.exeClient.exeClient.exeClient.exeClient.exepid process 5028 Client.exe 1088 Client.exe 2416 Client.exe 2816 Client.exe 372 Client.exe 4256 Client.exe 3984 Client.exe 3124 Client.exe 332 Client.exe 3056 Client.exe 4496 Client.exe 1852 Client.exe 228 Client.exe 3280 Client.exe -
Looks up external IP address via web service 14 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
Processes:
flow ioc 3 ip-api.com 18 ip-api.com 34 ip-api.com 20 ip-api.com 26 ip-api.com 36 ip-api.com 28 ip-api.com 30 ip-api.com 12 api.ipify.org 16 ip-api.com 24 ip-api.com 14 ip-api.com 22 ip-api.com 32 ip-api.com -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Program crash 14 IoCs
Processes:
WerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exepid pid_target process target process 1656 5028 WerFault.exe Client.exe 1848 1088 WerFault.exe Client.exe 4356 2416 WerFault.exe Client.exe 4896 2816 WerFault.exe Client.exe 5064 372 WerFault.exe Client.exe 3916 4256 WerFault.exe Client.exe 3996 3984 WerFault.exe Client.exe 3944 3124 WerFault.exe Client.exe 2464 332 WerFault.exe Client.exe 2756 3056 WerFault.exe Client.exe 3344 4496 WerFault.exe Client.exe 3356 1852 WerFault.exe Client.exe 560 228 WerFault.exe Client.exe 1912 3280 WerFault.exe Client.exe -
Creates scheduled task(s) 1 TTPs 16 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
Processes:
schtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeSCHTASKS.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exepid process 1552 schtasks.exe 2832 schtasks.exe 3244 schtasks.exe 4656 schtasks.exe 4896 schtasks.exe 1800 schtasks.exe 2856 schtasks.exe 4772 schtasks.exe 4128 schtasks.exe 1716 schtasks.exe 3652 schtasks.exe 5076 SCHTASKS.exe 3496 schtasks.exe 4332 schtasks.exe 2284 schtasks.exe 1632 schtasks.exe -
Runs ping.exe 1 TTPs 14 IoCs
Processes:
PING.EXEPING.EXEPING.EXEPING.EXEPING.EXEPING.EXEPING.EXEPING.EXEPING.EXEPING.EXEPING.EXEPING.EXEPING.EXEPING.EXEpid process 3444 PING.EXE 4636 PING.EXE 2652 PING.EXE 1840 PING.EXE 3688 PING.EXE 4932 PING.EXE 3420 PING.EXE 3404 PING.EXE 4680 PING.EXE 4820 PING.EXE 4960 PING.EXE 2796 PING.EXE 5116 PING.EXE 4980 PING.EXE -
Suspicious use of AdjustPrivilegeToken 15 IoCs
Processes:
Uni - Copy (103) - Copy - Copy.exeClient.exeClient.exeClient.exeClient.exeClient.exeClient.exeClient.exeClient.exeClient.exeClient.exeClient.exeClient.exeClient.exeClient.exedescription pid process Token: SeDebugPrivilege 1128 Uni - Copy (103) - Copy - Copy.exe Token: SeDebugPrivilege 5028 Client.exe Token: SeDebugPrivilege 1088 Client.exe Token: SeDebugPrivilege 2416 Client.exe Token: SeDebugPrivilege 2816 Client.exe Token: SeDebugPrivilege 372 Client.exe Token: SeDebugPrivilege 4256 Client.exe Token: SeDebugPrivilege 3984 Client.exe Token: SeDebugPrivilege 3124 Client.exe Token: SeDebugPrivilege 332 Client.exe Token: SeDebugPrivilege 3056 Client.exe Token: SeDebugPrivilege 4496 Client.exe Token: SeDebugPrivilege 1852 Client.exe Token: SeDebugPrivilege 228 Client.exe Token: SeDebugPrivilege 3280 Client.exe -
Suspicious use of SetWindowsHookEx 14 IoCs
Processes:
Client.exeClient.exeClient.exeClient.exeClient.exeClient.exeClient.exeClient.exeClient.exeClient.exeClient.exeClient.exeClient.exeClient.exepid process 5028 Client.exe 1088 Client.exe 2416 Client.exe 2816 Client.exe 372 Client.exe 4256 Client.exe 3984 Client.exe 3124 Client.exe 332 Client.exe 3056 Client.exe 4496 Client.exe 1852 Client.exe 228 Client.exe 3280 Client.exe -
Suspicious use of WriteProcessMemory 64 IoCs
Processes:
Uni - Copy (103) - Copy - Copy.exeClient.execmd.exeClient.execmd.exeClient.execmd.exeClient.execmd.exedescription pid process target process PID 1128 wrote to memory of 4772 1128 Uni - Copy (103) - Copy - Copy.exe schtasks.exe PID 1128 wrote to memory of 4772 1128 Uni - Copy (103) - Copy - Copy.exe schtasks.exe PID 1128 wrote to memory of 4772 1128 Uni - Copy (103) - Copy - Copy.exe schtasks.exe PID 1128 wrote to memory of 5028 1128 Uni - Copy (103) - Copy - Copy.exe Client.exe PID 1128 wrote to memory of 5028 1128 Uni - Copy (103) - Copy - Copy.exe Client.exe PID 1128 wrote to memory of 5028 1128 Uni - Copy (103) - Copy - Copy.exe Client.exe PID 1128 wrote to memory of 5076 1128 Uni - Copy (103) - Copy - Copy.exe SCHTASKS.exe PID 1128 wrote to memory of 5076 1128 Uni - Copy (103) - Copy - Copy.exe SCHTASKS.exe PID 1128 wrote to memory of 5076 1128 Uni - Copy (103) - Copy - Copy.exe SCHTASKS.exe PID 5028 wrote to memory of 3496 5028 Client.exe schtasks.exe PID 5028 wrote to memory of 3496 5028 Client.exe schtasks.exe PID 5028 wrote to memory of 3496 5028 Client.exe schtasks.exe PID 5028 wrote to memory of 2160 5028 Client.exe cmd.exe PID 5028 wrote to memory of 2160 5028 Client.exe cmd.exe PID 5028 wrote to memory of 2160 5028 Client.exe cmd.exe PID 2160 wrote to memory of 3196 2160 cmd.exe chcp.com PID 2160 wrote to memory of 3196 2160 cmd.exe chcp.com PID 2160 wrote to memory of 3196 2160 cmd.exe chcp.com PID 2160 wrote to memory of 3444 2160 cmd.exe PING.EXE PID 2160 wrote to memory of 3444 2160 cmd.exe PING.EXE PID 2160 wrote to memory of 3444 2160 cmd.exe PING.EXE PID 2160 wrote to memory of 1088 2160 cmd.exe Client.exe PID 2160 wrote to memory of 1088 2160 cmd.exe Client.exe PID 2160 wrote to memory of 1088 2160 cmd.exe Client.exe PID 1088 wrote to memory of 4128 1088 Client.exe schtasks.exe PID 1088 wrote to memory of 4128 1088 Client.exe schtasks.exe PID 1088 wrote to memory of 4128 1088 Client.exe schtasks.exe PID 1088 wrote to memory of 1992 1088 Client.exe cmd.exe PID 1088 wrote to memory of 1992 1088 Client.exe cmd.exe PID 1088 wrote to memory of 1992 1088 Client.exe cmd.exe PID 1992 wrote to memory of 3800 1992 cmd.exe chcp.com PID 1992 wrote to memory of 3800 1992 cmd.exe chcp.com PID 1992 wrote to memory of 3800 1992 cmd.exe chcp.com PID 1992 wrote to memory of 1840 1992 cmd.exe PING.EXE PID 1992 wrote to memory of 1840 1992 cmd.exe PING.EXE PID 1992 wrote to memory of 1840 1992 cmd.exe PING.EXE PID 1992 wrote to memory of 2416 1992 cmd.exe Client.exe PID 1992 wrote to memory of 2416 1992 cmd.exe Client.exe PID 1992 wrote to memory of 2416 1992 cmd.exe Client.exe PID 2416 wrote to memory of 1552 2416 Client.exe schtasks.exe PID 2416 wrote to memory of 1552 2416 Client.exe schtasks.exe PID 2416 wrote to memory of 1552 2416 Client.exe schtasks.exe PID 2416 wrote to memory of 2064 2416 Client.exe cmd.exe PID 2416 wrote to memory of 2064 2416 Client.exe cmd.exe PID 2416 wrote to memory of 2064 2416 Client.exe cmd.exe PID 2064 wrote to memory of 4364 2064 cmd.exe chcp.com PID 2064 wrote to memory of 4364 2064 cmd.exe chcp.com PID 2064 wrote to memory of 4364 2064 cmd.exe chcp.com PID 2064 wrote to memory of 3404 2064 cmd.exe PING.EXE PID 2064 wrote to memory of 3404 2064 cmd.exe PING.EXE PID 2064 wrote to memory of 3404 2064 cmd.exe PING.EXE PID 2064 wrote to memory of 2816 2064 cmd.exe Client.exe PID 2064 wrote to memory of 2816 2064 cmd.exe Client.exe PID 2064 wrote to memory of 2816 2064 cmd.exe Client.exe PID 2816 wrote to memory of 1716 2816 Client.exe schtasks.exe PID 2816 wrote to memory of 1716 2816 Client.exe schtasks.exe PID 2816 wrote to memory of 1716 2816 Client.exe schtasks.exe PID 2816 wrote to memory of 1672 2816 Client.exe cmd.exe PID 2816 wrote to memory of 1672 2816 Client.exe cmd.exe PID 2816 wrote to memory of 1672 2816 Client.exe cmd.exe PID 1672 wrote to memory of 3668 1672 cmd.exe chcp.com PID 1672 wrote to memory of 3668 1672 cmd.exe chcp.com PID 1672 wrote to memory of 3668 1672 cmd.exe chcp.com PID 1672 wrote to memory of 4680 1672 cmd.exe PING.EXE
Processes
-
C:\Users\Admin\AppData\Local\Temp\uni\Uni - Copy (103) - Copy - Copy.exe"C:\Users\Admin\AppData\Local\Temp\uni\Uni - Copy (103) - Copy - Copy.exe"1⤵
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\schtasks.exe"schtasks" /create /tn "SeroXen" /sc ONLOGON /tr "C:\Users\Admin\AppData\Local\Temp\uni\Uni - Copy (103) - Copy - Copy.exe" /rl HIGHEST /f2⤵
- Creates scheduled task(s)
-
C:\Users\Admin\AppData\Roaming\SubDir\Client.exe"C:\Users\Admin\AppData\Roaming\SubDir\Client.exe"2⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\schtasks.exe"schtasks" /create /tn "SeroXen" /sc ONLOGON /tr "C:\Users\Admin\AppData\Roaming\SubDir\Client.exe" /rl HIGHEST /f3⤵
- Creates scheduled task(s)
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\iGHKR4SQvlgD.bat" "3⤵
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\chcp.comchcp 650014⤵
-
C:\Windows\SysWOW64\PING.EXEping -n 10 localhost4⤵
- Runs ping.exe
-
C:\Users\Admin\AppData\Roaming\SubDir\Client.exe"C:\Users\Admin\AppData\Roaming\SubDir\Client.exe"4⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\schtasks.exe"schtasks" /create /tn "SeroXen" /sc ONLOGON /tr "C:\Users\Admin\AppData\Roaming\SubDir\Client.exe" /rl HIGHEST /f5⤵
- Creates scheduled task(s)
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\w2B8G9zFbPpc.bat" "5⤵
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\chcp.comchcp 650016⤵
-
C:\Windows\SysWOW64\PING.EXEping -n 10 localhost6⤵
- Runs ping.exe
-
C:\Users\Admin\AppData\Roaming\SubDir\Client.exe"C:\Users\Admin\AppData\Roaming\SubDir\Client.exe"6⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\schtasks.exe"schtasks" /create /tn "SeroXen" /sc ONLOGON /tr "C:\Users\Admin\AppData\Roaming\SubDir\Client.exe" /rl HIGHEST /f7⤵
- Creates scheduled task(s)
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\SK7BxJnKIBwA.bat" "7⤵
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\chcp.comchcp 650018⤵
-
C:\Windows\SysWOW64\PING.EXEping -n 10 localhost8⤵
- Runs ping.exe
-
C:\Users\Admin\AppData\Roaming\SubDir\Client.exe"C:\Users\Admin\AppData\Roaming\SubDir\Client.exe"8⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\schtasks.exe"schtasks" /create /tn "SeroXen" /sc ONLOGON /tr "C:\Users\Admin\AppData\Roaming\SubDir\Client.exe" /rl HIGHEST /f9⤵
- Creates scheduled task(s)
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\reprA7nklcQx.bat" "9⤵
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\chcp.comchcp 6500110⤵
-
C:\Windows\SysWOW64\PING.EXEping -n 10 localhost10⤵
- Runs ping.exe
-
C:\Users\Admin\AppData\Roaming\SubDir\Client.exe"C:\Users\Admin\AppData\Roaming\SubDir\Client.exe"10⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
-
C:\Windows\SysWOW64\schtasks.exe"schtasks" /create /tn "SeroXen" /sc ONLOGON /tr "C:\Users\Admin\AppData\Roaming\SubDir\Client.exe" /rl HIGHEST /f11⤵
- Creates scheduled task(s)
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\aieigN9e82ft.bat" "11⤵
-
C:\Windows\SysWOW64\chcp.comchcp 6500112⤵
-
C:\Windows\SysWOW64\PING.EXEping -n 10 localhost12⤵
- Runs ping.exe
-
C:\Users\Admin\AppData\Roaming\SubDir\Client.exe"C:\Users\Admin\AppData\Roaming\SubDir\Client.exe"12⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
-
C:\Windows\SysWOW64\schtasks.exe"schtasks" /create /tn "SeroXen" /sc ONLOGON /tr "C:\Users\Admin\AppData\Roaming\SubDir\Client.exe" /rl HIGHEST /f13⤵
- Creates scheduled task(s)
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\xXDY7zXzvVGl.bat" "13⤵
-
C:\Windows\SysWOW64\chcp.comchcp 6500114⤵
-
C:\Windows\SysWOW64\PING.EXEping -n 10 localhost14⤵
- Runs ping.exe
-
C:\Users\Admin\AppData\Roaming\SubDir\Client.exe"C:\Users\Admin\AppData\Roaming\SubDir\Client.exe"14⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
-
C:\Windows\SysWOW64\schtasks.exe"schtasks" /create /tn "SeroXen" /sc ONLOGON /tr "C:\Users\Admin\AppData\Roaming\SubDir\Client.exe" /rl HIGHEST /f15⤵
- Creates scheduled task(s)
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\d295zpv3B4xE.bat" "15⤵
-
C:\Windows\SysWOW64\chcp.comchcp 6500116⤵
-
C:\Windows\SysWOW64\PING.EXEping -n 10 localhost16⤵
- Runs ping.exe
-
C:\Users\Admin\AppData\Roaming\SubDir\Client.exe"C:\Users\Admin\AppData\Roaming\SubDir\Client.exe"16⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
-
C:\Windows\SysWOW64\schtasks.exe"schtasks" /create /tn "SeroXen" /sc ONLOGON /tr "C:\Users\Admin\AppData\Roaming\SubDir\Client.exe" /rl HIGHEST /f17⤵
- Creates scheduled task(s)
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\hjQrqr6D7UK6.bat" "17⤵
-
C:\Windows\SysWOW64\chcp.comchcp 6500118⤵
-
C:\Windows\SysWOW64\PING.EXEping -n 10 localhost18⤵
- Runs ping.exe
-
C:\Users\Admin\AppData\Roaming\SubDir\Client.exe"C:\Users\Admin\AppData\Roaming\SubDir\Client.exe"18⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
-
C:\Windows\SysWOW64\schtasks.exe"schtasks" /create /tn "SeroXen" /sc ONLOGON /tr "C:\Users\Admin\AppData\Roaming\SubDir\Client.exe" /rl HIGHEST /f19⤵
- Creates scheduled task(s)
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\TkKwGeGfZobN.bat" "19⤵
-
C:\Windows\SysWOW64\chcp.comchcp 6500120⤵
-
C:\Windows\SysWOW64\PING.EXEping -n 10 localhost20⤵
- Runs ping.exe
-
C:\Users\Admin\AppData\Roaming\SubDir\Client.exe"C:\Users\Admin\AppData\Roaming\SubDir\Client.exe"20⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
-
C:\Windows\SysWOW64\schtasks.exe"schtasks" /create /tn "SeroXen" /sc ONLOGON /tr "C:\Users\Admin\AppData\Roaming\SubDir\Client.exe" /rl HIGHEST /f21⤵
- Creates scheduled task(s)
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\EkD1hRQ729se.bat" "21⤵
-
C:\Windows\SysWOW64\chcp.comchcp 6500122⤵
-
C:\Windows\SysWOW64\PING.EXEping -n 10 localhost22⤵
- Runs ping.exe
-
C:\Users\Admin\AppData\Roaming\SubDir\Client.exe"C:\Users\Admin\AppData\Roaming\SubDir\Client.exe"22⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
-
C:\Windows\SysWOW64\schtasks.exe"schtasks" /create /tn "SeroXen" /sc ONLOGON /tr "C:\Users\Admin\AppData\Roaming\SubDir\Client.exe" /rl HIGHEST /f23⤵
- Creates scheduled task(s)
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\uF9YZIpAIiZ7.bat" "23⤵
-
C:\Windows\SysWOW64\chcp.comchcp 6500124⤵
-
C:\Windows\SysWOW64\PING.EXEping -n 10 localhost24⤵
- Runs ping.exe
-
C:\Users\Admin\AppData\Roaming\SubDir\Client.exe"C:\Users\Admin\AppData\Roaming\SubDir\Client.exe"24⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
-
C:\Windows\SysWOW64\schtasks.exe"schtasks" /create /tn "SeroXen" /sc ONLOGON /tr "C:\Users\Admin\AppData\Roaming\SubDir\Client.exe" /rl HIGHEST /f25⤵
- Creates scheduled task(s)
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\9Yw6eDHoMbsG.bat" "25⤵
-
C:\Windows\SysWOW64\chcp.comchcp 6500126⤵
-
C:\Windows\SysWOW64\PING.EXEping -n 10 localhost26⤵
- Runs ping.exe
-
C:\Users\Admin\AppData\Roaming\SubDir\Client.exe"C:\Users\Admin\AppData\Roaming\SubDir\Client.exe"26⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
-
C:\Windows\SysWOW64\schtasks.exe"schtasks" /create /tn "SeroXen" /sc ONLOGON /tr "C:\Users\Admin\AppData\Roaming\SubDir\Client.exe" /rl HIGHEST /f27⤵
- Creates scheduled task(s)
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\Yremr1GEq2M3.bat" "27⤵
-
C:\Windows\SysWOW64\chcp.comchcp 6500128⤵
-
C:\Windows\SysWOW64\PING.EXEping -n 10 localhost28⤵
- Runs ping.exe
-
C:\Users\Admin\AppData\Roaming\SubDir\Client.exe"C:\Users\Admin\AppData\Roaming\SubDir\Client.exe"28⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
-
C:\Windows\SysWOW64\schtasks.exe"schtasks" /create /tn "SeroXen" /sc ONLOGON /tr "C:\Users\Admin\AppData\Roaming\SubDir\Client.exe" /rl HIGHEST /f29⤵
- Creates scheduled task(s)
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\dcf3bFmABMPU.bat" "29⤵
-
C:\Windows\SysWOW64\chcp.comchcp 6500130⤵
-
C:\Windows\SysWOW64\PING.EXEping -n 10 localhost30⤵
- Runs ping.exe
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3280 -s 152829⤵
- Program crash
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 228 -s 168827⤵
- Program crash
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1852 -s 224825⤵
- Program crash
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4496 -s 109623⤵
- Program crash
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3056 -s 166821⤵
- Program crash
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 332 -s 109219⤵
- Program crash
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3124 -s 109217⤵
- Program crash
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3984 -s 109215⤵
- Program crash
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4256 -s 108413⤵
- Program crash
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 372 -s 173211⤵
- Program crash
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2816 -s 10929⤵
- Program crash
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2416 -s 21967⤵
- Program crash
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1088 -s 21685⤵
- Program crash
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 5028 -s 16283⤵
- Program crash
-
C:\Windows\SysWOW64\SCHTASKS.exe"SCHTASKS.exe" /create /tn "$77Uni - Copy (103) - Copy - Copy.exe" /tr "'C:\Users\Admin\AppData\Local\Temp\uni\Uni - Copy (103) - Copy - Copy.exe'" /sc onlogon /rl HIGHEST2⤵
- Creates scheduled task(s)
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 404 -p 5028 -ip 50281⤵
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 412 -p 1088 -ip 10881⤵
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 424 -p 2416 -ip 24161⤵
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 512 -p 2816 -ip 28161⤵
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 528 -p 372 -ip 3721⤵
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 524 -p 4256 -ip 42561⤵
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 564 -p 3984 -ip 39841⤵
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 604 -p 3124 -ip 31241⤵
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 612 -p 332 -ip 3321⤵
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 500 -p 3056 -ip 30561⤵
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 628 -p 4496 -ip 44961⤵
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 664 -p 1852 -ip 18521⤵
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 652 -p 228 -ip 2281⤵
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 672 -p 3280 -ip 32801⤵
Network
MITRE ATT&CK Matrix ATT&CK v13
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Local\Temp\9Yw6eDHoMbsG.batFilesize
207B
MD58492071f2aa473c9aaaff92a088a7583
SHA1c5fe1eb6fba623ad5b75e60b8e636b1e280e29e6
SHA256e6d94dec8eb483ba2bd5653edf2497768edf03056380b73c20667d7f0a4940e4
SHA5121eec18ea28da8a257f4a60f4f1986b2b73764efc3ad3b776c674ea162532129cd119fb906c857f99826c3e56a00a453ded01ddf909dc81b51be1eaf18debf453
-
C:\Users\Admin\AppData\Local\Temp\EkD1hRQ729se.batFilesize
207B
MD5878900805b5f75f8e6d67a7d9dd0b012
SHA149453b0f6b49d8d1bc31f6cc1fba5401ce26e1ae
SHA256d190d480b69769701d6bf459cd27e121d0c02f886d4aab2e206421fd9ab364f1
SHA512f13baf98761f2e88ca8584a32df944873d6380451f119f4dc958ec898514250bc4456a546b7a61c76732fcb2e67611da23e6f6cce8b10602ae15f53bcc854dd1
-
C:\Users\Admin\AppData\Local\Temp\SK7BxJnKIBwA.batFilesize
207B
MD5ad63b405eff6e8b250938ed45074d8f8
SHA198471d535143a67cb920301fa9ac6f32bea08518
SHA256ac66587c84e47644880236e8661c06cc55278d07f13214e07a2bd62b83a4e507
SHA512a8ad659c438591c21135fbf68b05a124ae5e4bf5a8cb47de280e037c019a8a33c9b069adfc3d0228036383df8c6315efba8f1389d0de1052038b1c12bc1a8b79
-
C:\Users\Admin\AppData\Local\Temp\TkKwGeGfZobN.batFilesize
207B
MD554d682b8263b22050e41c68b9bba95db
SHA151a72de50262a73c5f90f4f74cb1a49e2eb9ee29
SHA256d8956ee92cc61e7851142b11a2d1141fdd49f82f342f584ca14368b4d3179171
SHA512221b60cb7469eef7e9552d31a1a29affd223530cd82d3fbd0a12fb84a3f9c76135aa4cc3333f7f7a01606ad6c6dbbee5de60590d7a92663a3e699ebf4776104a
-
C:\Users\Admin\AppData\Local\Temp\Yremr1GEq2M3.batFilesize
207B
MD52432e29df4d75101a94f490efb9f273f
SHA15e703bce83fec0f3acfd6d9e0a3849092b7eea1e
SHA256659da8fd314f990fb72009759a2a84b36517a01471c182571192b7ea83ee6e46
SHA51204ff808b73f73107a9cf7dc7caf4f7012d08cca865c284bbab8bc375b31eb87bd12f5d16833d95c2015dd9db07458bb59f1b00b2ddf1628299f00a92d3e42469
-
C:\Users\Admin\AppData\Local\Temp\aieigN9e82ft.batFilesize
207B
MD519aa63db2e02a14c3711b93d0d9e57ef
SHA140ba7d7f0a77814e8eefaca5b0f2082b28f2a4f6
SHA25670f680f4336a1ff6f3cbe41ce4bfc2a08d44bbc1ddece8d9f684da82f407943f
SHA5122e606402ab33e9c45882af22975fac1f5a6c61738ea4ee115d29a63867f262f94a0a0238bbbfe3ac8697ccdec5455204246ab0365034697dd8be7c34f70af01b
-
C:\Users\Admin\AppData\Local\Temp\d295zpv3B4xE.batFilesize
207B
MD5bba948fc2d7f939b7ce9e563c9ca9a44
SHA1013fdaabc586ffc10f39f73c4ced374f1446d23c
SHA2566da351031f27b33edb60fa1ff1d76f4400d0d9c3d53fe652a66a02178b440c88
SHA51276c13047b1e2f604113c0b036b5cc4b20ee302c7f449dcb4cf506211ad4a6fedda0854fb2c7ea02ac1789c9b5363f7654ba86875cecef0c6cfbb5761abe89071
-
C:\Users\Admin\AppData\Local\Temp\dcf3bFmABMPU.batFilesize
207B
MD52123707212e96c82f8e35273ab50d4ac
SHA15bb5f0f3d83767d26dc64581b509697ec9702b02
SHA256fe8fba3fdf97385a58cba7c6f228e4853566d8313f81861417c33ceb0b1fecfe
SHA5121c93dc468ceb2e5eb8d5009b7630d05c85f1ee0cbac5094ea9a33b27604661a204972ee5a135c6da941c3d0ab00013e5018737e3f4bc6d52b42c7620dadd0459
-
C:\Users\Admin\AppData\Local\Temp\hjQrqr6D7UK6.batFilesize
207B
MD54e51d49b7a26d7dcf1b2e38ac85a730f
SHA1acd150f86c862b1d5413627619458baabfd89de7
SHA25675686d1f2657092d4500ab19f16d4e84f6a81ff085ec2554ec9e23752a995c2f
SHA5126a5450f6f0f13f163460de69d7486be6f52fcc1a36653ad844c3c891a6bc453f9f722de33b46d11ddcba2c6d8178780ae3ddbfff990641f4ff94f14c9655c4de
-
C:\Users\Admin\AppData\Local\Temp\iGHKR4SQvlgD.batFilesize
207B
MD5720e3780dfb673ed03dd8d68cf108be1
SHA1017a1a16ace203ef7b500aa5b932d70c8426ac0e
SHA256915ecf91ee41c02d6a636432c0b78c832b8d4a954d215b4237dcea1101ef2435
SHA5128b83f387cac7ab13e5688a21d0da58f2b56ce3c34c4e4cff363f640a3fdf737077dcb57ff3990144aa44ec76c5573078750845cb2c584a2f0257789ff96c04a4
-
C:\Users\Admin\AppData\Local\Temp\reprA7nklcQx.batFilesize
207B
MD5729fbfd877f58d15e31dfdcfd9535255
SHA1b87250d46157e775d9455173aa49245036929927
SHA256f6cbc91ebff29d95ddc1363c23ececcf3d2687d12b0ce6619b4092556835ac9c
SHA51205d469086653615ea1ea158f915b55cf43aba702d10c9f7669e807eb7c4f58cb13ae9ab93c3f3ed2d1e152bb10bc764dd125d87e1b8f760fe5f9cf98e22d50f2
-
C:\Users\Admin\AppData\Local\Temp\uF9YZIpAIiZ7.batFilesize
207B
MD568661048988b29355e7aee7fdaf475d4
SHA1fe6f1405c566616b357097c80318ad3597bb6f0b
SHA256d8f4a68e83895a10847d3415eafe5d1391054f1143271a2278fa8d5765f507f9
SHA5129c24efaa35cbb86bb5a5c18ca6d5b966e6f53d81a05c182a9855cf6e02401efc860d0ac0185bfb4eb6eeae7204e60ddc71d86378649f56eac31a4021de5f9d7d
-
C:\Users\Admin\AppData\Local\Temp\w2B8G9zFbPpc.batFilesize
207B
MD5ab05b51e592fdaa7c5240299707b4fc6
SHA1e569070c3f296d66da4469a41aabd3757f0efaac
SHA25650128514f7e691f466b5fa48b1df9fbd5657128f133b2e20527723ccdad2d0c1
SHA512a2cc1f5181d76c24e42189ce486bc6570385692fcfeb420af0faa12e881fe1255f76794b38d533f22abb4773720991d23ed0a2e9affdccb08edde321e0554c5b
-
C:\Users\Admin\AppData\Local\Temp\xXDY7zXzvVGl.batFilesize
207B
MD5c4b825dc7fd1262b69c12fe7dd185275
SHA1590094e80a15ab455c149135d0627eb866167c08
SHA2564446b4b12a458a2f1d6c3b8f197849b9de707008965c31ce3c251746bb9e4f58
SHA5123a2f2af0393e8527a8fb9d9b9c582721ba62474723caa39f17a376cd95b509bbb7fbf1de5d1e94300319777c18ed2c03991802498300c48824d9113dfd8899b0
-
C:\Users\Admin\AppData\Roaming\Logs\06-15-2024Filesize
224B
MD5fe0b11d8ca857d2d5cd86e6b83806882
SHA18d2315942619d562dca81a5df1247f8d78b343bf
SHA2569be5ace470637e441f3619264b739707ed9a407863c8ebdc28ad0ed129a1efd6
SHA512b4328ff2e884f72ba0f763917c8fa48667d6802b017d4e8ef173f8bac7d99af02fcdd6cf0ef60ee7552b1946d8df4be9942da30671a2946d5077ebdf6b8c1465
-
C:\Users\Admin\AppData\Roaming\Logs\06-15-2024Filesize
224B
MD5caee8548865a5425542896bc04b927ad
SHA1e85cedae7a891294a832d2bb25489369a74dfe0b
SHA256c24cf148fecdac8ea9a4bb7b19431d6ea99ec919c7e1ad2e4b3077646a8b031f
SHA51260f146fff145f04c91b36230eb6b804c0a0d88115a8277bf4d75f96b2d57add1cf2e1ff01f06804057bf58166c3a131b6136cfbabf934f3def78a81bf4274d3d
-
C:\Users\Admin\AppData\Roaming\Logs\06-15-2024Filesize
224B
MD53ce08434d995b85e607e3c740158c231
SHA1cc1ed8f45b47b090c63b3d621dc6d9e85dd864bc
SHA2569272e39465fe3e451685abdd023af5ffc082695fd7b27d854c2a9e47549b0c55
SHA512c5fb2607db79d933444a46f36aa9d5740e21669803c448d0b03fa027510bdbb4366a86516b7f7c478dc1a809e499e6ac2712eb45474b9dc6b98d163c1aceca80
-
C:\Users\Admin\AppData\Roaming\Logs\06-15-2024Filesize
224B
MD5e43709ee5efb4505827605b5bfbbd919
SHA1dcc4407bc0bf7453511cc647c2ee330f4a4278b2
SHA256122c3e037e6b77ca47c3c4e48b4c736f2c0b12f87fb946a2ef9f0631d426ac6b
SHA512fda7e1b6c364f7e32ab218bbfb5609a5a0331c4d5aa7d21049f9831c25d9b929b7d0597cc3e580e6483587c4a6fc3b56735477b53cc8c9474be35c14fe844739
-
C:\Users\Admin\AppData\Roaming\Logs\06-15-2024MD5
d41d8cd98f00b204e9800998ecf8427e
SHA1da39a3ee5e6b4b0d3255bfef95601890afd80709
SHA256e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855
SHA512cf83e1357eefb8bdf1542850d66d8007d620e4050b5715dc83f4a921d36ce9ce47d0d13c5d85f2b0ff8318d2877eec2f63b931bd47417a81a538327af927da3e
-
C:\Users\Admin\AppData\Roaming\Logs\06-15-2024Filesize
224B
MD50eaf184c6803cde8c3b7f191a2ea4a79
SHA1a8058c330f9a88b060f2ca12d5c0f203352af096
SHA2567205d46f9a5a77cc7293d676d1a688683edfa065bddc44fde727df7981825048
SHA512e39c0f21e8ca0317171ace8095e2c493f1c0a6129bb565973efc290a797f0f9abe613ca8a510c0f3c7e3e023fe340cdd4b6e8de256cd71ddf9810a75fd88caa7
-
C:\Users\Admin\AppData\Roaming\Logs\06-15-2024Filesize
224B
MD5890bd6bdcef936ccd28aea7cbfa99e29
SHA1a150f21958ea61cc429b3c3bb88c8a4ef46f9347
SHA2566531a1f589543a5a032b8b0d307771609fa480b1f510dd6f6de7ceb43a5a1922
SHA512eeeacf7c1f8da70ac8afecb8d9b162f24bc002bc5a422a9aae0b7f7f7f0fd426ae3da59ac249f0104215818dd9ebbdff46fcb46e16109b015cf27435c4f41752
-
C:\Users\Admin\AppData\Roaming\Logs\06-15-2024Filesize
224B
MD577f44a0088eabd4bfd127299f6325980
SHA166258bc025a3ee7bd3d3235398b5410d48c20e6a
SHA256c705e92c97715e1ff5d6ccb7b4af950ae2a46fec2a1e8755bbc4557aa6504003
SHA512e0d40f955180605b0c52d7cb1b5657e50122056748911c18fe374bae76844aed557c39db8b15e3e9b113abe4f466643c1aebdcb64089207c3918f872cd3e6d23
-
C:\Users\Admin\AppData\Roaming\SubDir\Client.exeFilesize
409KB
MD5b70fdac25a99501e3cae11f1b775249e
SHA13c59226479bfdcd1b2927bcfb1a7516d4cb8dd71
SHA25651ff3eb450a786c1aaa75ff889f2fd256412a7b75d04277fdf9fcccc20e57246
SHA51243f0d5d6e5f0d5febba537c109ffdbc250bbb6e9725e635a43ec975b0353048eaeee50b6e9274cd5e072ea6b0cea32439bd37408b2528832f467f2075f74ca44
-
memory/1128-8-0x0000000074D20000-0x00000000754D0000-memory.dmpFilesize
7.7MB
-
memory/1128-0-0x0000000074D2E000-0x0000000074D2F000-memory.dmpFilesize
4KB
-
memory/1128-16-0x0000000074D20000-0x00000000754D0000-memory.dmpFilesize
7.7MB
-
memory/1128-1-0x0000000000230000-0x000000000029C000-memory.dmpFilesize
432KB
-
memory/1128-7-0x0000000074D2E000-0x0000000074D2F000-memory.dmpFilesize
4KB
-
memory/1128-2-0x00000000051E0000-0x0000000005784000-memory.dmpFilesize
5.6MB
-
memory/1128-6-0x00000000059D0000-0x00000000059E2000-memory.dmpFilesize
72KB
-
memory/1128-3-0x0000000004CD0000-0x0000000004D62000-memory.dmpFilesize
584KB
-
memory/1128-5-0x0000000004DD0000-0x0000000004E36000-memory.dmpFilesize
408KB
-
memory/1128-4-0x0000000074D20000-0x00000000754D0000-memory.dmpFilesize
7.7MB
-
memory/5028-19-0x0000000006EA0000-0x0000000006EAA000-memory.dmpFilesize
40KB
-
memory/5028-15-0x0000000074D20000-0x00000000754D0000-memory.dmpFilesize
7.7MB
-
memory/5028-17-0x0000000074D20000-0x00000000754D0000-memory.dmpFilesize
7.7MB
-
memory/5028-24-0x0000000074D20000-0x00000000754D0000-memory.dmpFilesize
7.7MB