Analysis
-
max time kernel
147s -
max time network
151s -
platform
windows10-1703_x64 -
resource
win10-20240404-en -
resource tags
arch:x64arch:x86image:win10-20240404-enlocale:en-usos:windows10-1703-x64system -
submitted
09-06-2024 02:41
General
-
Target
Byfron.exe
-
Size
3.1MB
-
MD5
cb12954abfb20424cfc22e1c189ddfa9
-
SHA1
dc8cb9d361cebb1a4ca13ce904cdd7136c9255c2
-
SHA256
29bd747b03d4cc850e0c0733b4ff15a29ecd61de57701e4e6cc7aed90b83ef56
-
SHA512
54dafd06e682eef74fd9d1377917429b1b304bb0be185f32406dbdea56d6afd8047a213f3e40191a817931077ee448993d9adc6228a1ab042fee52b9ebac611f
-
SSDEEP
49152:kv8Y52fyaSZOrPWluWBuGG5g5hVtmfmzK0oGdT3THHB72eh2NT:kvF52fyaSZOrPWluWBDG5g5hVtmm
Malware Config
Extracted
quasar
1.4.1
ohio
idk:4782
5c7d6a36-dffc-4ec3-8525-ba9161772945
-
encryption_key
7930C3883BFB3E417BEC9036B64E581CD2465EFE
-
install_name
Byfron.exe
-
log_directory
Logs
-
reconnect_delay
3000
-
startup_key
Balls
-
subdirectory
SubDir
Signatures
-
Quasar payload 2 IoCs
Processes:
resource yara_rule behavioral1/memory/4816-1-0x0000000000D80000-0x00000000010A4000-memory.dmp family_quasar C:\Users\Admin\AppData\Roaming\SubDir\Byfron.exe family_quasar -
Executes dropped EXE 13 IoCs
Processes:
Byfron.exeByfron.exeByfron.exeByfron.exeByfron.exeByfron.exeByfron.exeByfron.exeByfron.exeByfron.exeByfron.exeByfron.exeByfron.exepid process 3648 Byfron.exe 4548 Byfron.exe 4288 Byfron.exe 3148 Byfron.exe 1792 Byfron.exe 4300 Byfron.exe 2056 Byfron.exe 720 Byfron.exe 2500 Byfron.exe 4324 Byfron.exe 1900 Byfron.exe 4756 Byfron.exe 820 Byfron.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Creates scheduled task(s) 1 TTPs 14 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
Processes:
schtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exepid process 4444 schtasks.exe 2008 schtasks.exe 3716 schtasks.exe 1476 schtasks.exe 3016 schtasks.exe 3592 schtasks.exe 216 schtasks.exe 2252 schtasks.exe 1352 schtasks.exe 2748 schtasks.exe 1956 schtasks.exe 2096 schtasks.exe 312 schtasks.exe 5092 schtasks.exe -
Runs ping.exe 1 TTPs 13 IoCs
Processes:
PING.EXEPING.EXEPING.EXEPING.EXEPING.EXEPING.EXEPING.EXEPING.EXEPING.EXEPING.EXEPING.EXEPING.EXEPING.EXEpid process 1272 PING.EXE 2632 PING.EXE 3364 PING.EXE 4848 PING.EXE 4856 PING.EXE 1528 PING.EXE 3928 PING.EXE 4760 PING.EXE 3636 PING.EXE 1312 PING.EXE 2204 PING.EXE 1540 PING.EXE 4340 PING.EXE -
Suspicious use of AdjustPrivilegeToken 14 IoCs
Processes:
Byfron.exeByfron.exeByfron.exeByfron.exeByfron.exeByfron.exeByfron.exeByfron.exeByfron.exeByfron.exeByfron.exeByfron.exeByfron.exeByfron.exedescription pid process Token: SeDebugPrivilege 4816 Byfron.exe Token: SeDebugPrivilege 3648 Byfron.exe Token: SeDebugPrivilege 4548 Byfron.exe Token: SeDebugPrivilege 4288 Byfron.exe Token: SeDebugPrivilege 3148 Byfron.exe Token: SeDebugPrivilege 1792 Byfron.exe Token: SeDebugPrivilege 4300 Byfron.exe Token: SeDebugPrivilege 2056 Byfron.exe Token: SeDebugPrivilege 720 Byfron.exe Token: SeDebugPrivilege 2500 Byfron.exe Token: SeDebugPrivilege 4324 Byfron.exe Token: SeDebugPrivilege 1900 Byfron.exe Token: SeDebugPrivilege 4756 Byfron.exe Token: SeDebugPrivilege 820 Byfron.exe -
Suspicious use of SetWindowsHookEx 12 IoCs
Processes:
Byfron.exeByfron.exeByfron.exeByfron.exeByfron.exeByfron.exeByfron.exeByfron.exeByfron.exeByfron.exeByfron.exeByfron.exepid process 3648 Byfron.exe 4548 Byfron.exe 4288 Byfron.exe 3148 Byfron.exe 1792 Byfron.exe 4300 Byfron.exe 2056 Byfron.exe 720 Byfron.exe 2500 Byfron.exe 4324 Byfron.exe 1900 Byfron.exe 4756 Byfron.exe -
Suspicious use of WriteProcessMemory 64 IoCs
Processes:
Byfron.exeByfron.execmd.exeByfron.execmd.exeByfron.execmd.exeByfron.execmd.exeByfron.execmd.exeByfron.execmd.exedescription pid process target process PID 4816 wrote to memory of 2748 4816 Byfron.exe schtasks.exe PID 4816 wrote to memory of 2748 4816 Byfron.exe schtasks.exe PID 4816 wrote to memory of 3648 4816 Byfron.exe Byfron.exe PID 4816 wrote to memory of 3648 4816 Byfron.exe Byfron.exe PID 3648 wrote to memory of 216 3648 Byfron.exe schtasks.exe PID 3648 wrote to memory of 216 3648 Byfron.exe schtasks.exe PID 3648 wrote to memory of 4488 3648 Byfron.exe cmd.exe PID 3648 wrote to memory of 4488 3648 Byfron.exe cmd.exe PID 4488 wrote to memory of 4512 4488 cmd.exe chcp.com PID 4488 wrote to memory of 4512 4488 cmd.exe chcp.com PID 4488 wrote to memory of 3636 4488 cmd.exe PING.EXE PID 4488 wrote to memory of 3636 4488 cmd.exe PING.EXE PID 4488 wrote to memory of 4548 4488 cmd.exe Byfron.exe PID 4488 wrote to memory of 4548 4488 cmd.exe Byfron.exe PID 4548 wrote to memory of 1956 4548 Byfron.exe schtasks.exe PID 4548 wrote to memory of 1956 4548 Byfron.exe schtasks.exe PID 4548 wrote to memory of 4612 4548 Byfron.exe cmd.exe PID 4548 wrote to memory of 4612 4548 Byfron.exe cmd.exe PID 4612 wrote to memory of 2952 4612 cmd.exe chcp.com PID 4612 wrote to memory of 2952 4612 cmd.exe chcp.com PID 4612 wrote to memory of 1540 4612 cmd.exe PING.EXE PID 4612 wrote to memory of 1540 4612 cmd.exe PING.EXE PID 4612 wrote to memory of 4288 4612 cmd.exe Byfron.exe PID 4612 wrote to memory of 4288 4612 cmd.exe Byfron.exe PID 4288 wrote to memory of 2096 4288 Byfron.exe schtasks.exe PID 4288 wrote to memory of 2096 4288 Byfron.exe schtasks.exe PID 4288 wrote to memory of 4748 4288 Byfron.exe cmd.exe PID 4288 wrote to memory of 4748 4288 Byfron.exe cmd.exe PID 4748 wrote to memory of 1328 4748 cmd.exe chcp.com PID 4748 wrote to memory of 1328 4748 cmd.exe chcp.com PID 4748 wrote to memory of 1312 4748 cmd.exe PING.EXE PID 4748 wrote to memory of 1312 4748 cmd.exe PING.EXE PID 4748 wrote to memory of 3148 4748 cmd.exe Byfron.exe PID 4748 wrote to memory of 3148 4748 cmd.exe Byfron.exe PID 3148 wrote to memory of 4444 3148 Byfron.exe schtasks.exe PID 3148 wrote to memory of 4444 3148 Byfron.exe schtasks.exe PID 3148 wrote to memory of 2060 3148 Byfron.exe cmd.exe PID 3148 wrote to memory of 2060 3148 Byfron.exe cmd.exe PID 2060 wrote to memory of 4580 2060 cmd.exe chcp.com PID 2060 wrote to memory of 4580 2060 cmd.exe chcp.com PID 2060 wrote to memory of 1272 2060 cmd.exe PING.EXE PID 2060 wrote to memory of 1272 2060 cmd.exe PING.EXE PID 2060 wrote to memory of 1792 2060 cmd.exe Byfron.exe PID 2060 wrote to memory of 1792 2060 cmd.exe Byfron.exe PID 1792 wrote to memory of 2252 1792 Byfron.exe schtasks.exe PID 1792 wrote to memory of 2252 1792 Byfron.exe schtasks.exe PID 1792 wrote to memory of 4476 1792 Byfron.exe cmd.exe PID 1792 wrote to memory of 4476 1792 Byfron.exe cmd.exe PID 4476 wrote to memory of 64 4476 cmd.exe chcp.com PID 4476 wrote to memory of 64 4476 cmd.exe chcp.com PID 4476 wrote to memory of 2204 4476 cmd.exe PING.EXE PID 4476 wrote to memory of 2204 4476 cmd.exe PING.EXE PID 4476 wrote to memory of 4300 4476 cmd.exe Byfron.exe PID 4476 wrote to memory of 4300 4476 cmd.exe Byfron.exe PID 4300 wrote to memory of 1476 4300 Byfron.exe schtasks.exe PID 4300 wrote to memory of 1476 4300 Byfron.exe schtasks.exe PID 4300 wrote to memory of 3476 4300 Byfron.exe cmd.exe PID 4300 wrote to memory of 3476 4300 Byfron.exe cmd.exe PID 3476 wrote to memory of 404 3476 cmd.exe chcp.com PID 3476 wrote to memory of 404 3476 cmd.exe chcp.com PID 3476 wrote to memory of 4856 3476 cmd.exe PING.EXE PID 3476 wrote to memory of 4856 3476 cmd.exe PING.EXE PID 3476 wrote to memory of 2056 3476 cmd.exe Byfron.exe PID 3476 wrote to memory of 2056 3476 cmd.exe Byfron.exe -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
Processes
-
C:\Users\Admin\AppData\Local\Temp\Byfron.exe"C:\Users\Admin\AppData\Local\Temp\Byfron.exe"1⤵
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
-
C:\Windows\SYSTEM32\schtasks.exe"schtasks" /create /tn "Balls" /sc ONLOGON /tr "C:\Users\Admin\AppData\Roaming\SubDir\Byfron.exe" /rl HIGHEST /f2⤵
- Creates scheduled task(s)
-
C:\Users\Admin\AppData\Roaming\SubDir\Byfron.exe"C:\Users\Admin\AppData\Roaming\SubDir\Byfron.exe"2⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
-
C:\Windows\SYSTEM32\schtasks.exe"schtasks" /create /tn "Balls" /sc ONLOGON /tr "C:\Users\Admin\AppData\Roaming\SubDir\Byfron.exe" /rl HIGHEST /f3⤵
- Creates scheduled task(s)
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\QL60oPaY9TH0.bat" "3⤵
- Suspicious use of WriteProcessMemory
-
C:\Windows\system32\chcp.comchcp 650014⤵
-
C:\Windows\system32\PING.EXEping -n 10 localhost4⤵
- Runs ping.exe
-
C:\Users\Admin\AppData\Roaming\SubDir\Byfron.exe"C:\Users\Admin\AppData\Roaming\SubDir\Byfron.exe"4⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
-
C:\Windows\SYSTEM32\schtasks.exe"schtasks" /create /tn "Balls" /sc ONLOGON /tr "C:\Users\Admin\AppData\Roaming\SubDir\Byfron.exe" /rl HIGHEST /f5⤵
- Creates scheduled task(s)
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\XZnENHZOweSx.bat" "5⤵
- Suspicious use of WriteProcessMemory
-
C:\Windows\system32\chcp.comchcp 650016⤵
-
C:\Windows\system32\PING.EXEping -n 10 localhost6⤵
- Runs ping.exe
-
C:\Users\Admin\AppData\Roaming\SubDir\Byfron.exe"C:\Users\Admin\AppData\Roaming\SubDir\Byfron.exe"6⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
-
C:\Windows\SYSTEM32\schtasks.exe"schtasks" /create /tn "Balls" /sc ONLOGON /tr "C:\Users\Admin\AppData\Roaming\SubDir\Byfron.exe" /rl HIGHEST /f7⤵
- Creates scheduled task(s)
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\OUwVP5LC1p4x.bat" "7⤵
- Suspicious use of WriteProcessMemory
-
C:\Windows\system32\chcp.comchcp 650018⤵
-
C:\Windows\system32\PING.EXEping -n 10 localhost8⤵
- Runs ping.exe
-
C:\Users\Admin\AppData\Roaming\SubDir\Byfron.exe"C:\Users\Admin\AppData\Roaming\SubDir\Byfron.exe"8⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
-
C:\Windows\SYSTEM32\schtasks.exe"schtasks" /create /tn "Balls" /sc ONLOGON /tr "C:\Users\Admin\AppData\Roaming\SubDir\Byfron.exe" /rl HIGHEST /f9⤵
- Creates scheduled task(s)
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\Mr2r4gC2PV56.bat" "9⤵
- Suspicious use of WriteProcessMemory
-
C:\Windows\system32\chcp.comchcp 6500110⤵
-
C:\Windows\system32\PING.EXEping -n 10 localhost10⤵
- Runs ping.exe
-
C:\Users\Admin\AppData\Roaming\SubDir\Byfron.exe"C:\Users\Admin\AppData\Roaming\SubDir\Byfron.exe"10⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
-
C:\Windows\SYSTEM32\schtasks.exe"schtasks" /create /tn "Balls" /sc ONLOGON /tr "C:\Users\Admin\AppData\Roaming\SubDir\Byfron.exe" /rl HIGHEST /f11⤵
- Creates scheduled task(s)
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\ZEVaEL12xU9e.bat" "11⤵
- Suspicious use of WriteProcessMemory
-
C:\Windows\system32\chcp.comchcp 6500112⤵
-
C:\Windows\system32\PING.EXEping -n 10 localhost12⤵
- Runs ping.exe
-
C:\Users\Admin\AppData\Roaming\SubDir\Byfron.exe"C:\Users\Admin\AppData\Roaming\SubDir\Byfron.exe"12⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
-
C:\Windows\SYSTEM32\schtasks.exe"schtasks" /create /tn "Balls" /sc ONLOGON /tr "C:\Users\Admin\AppData\Roaming\SubDir\Byfron.exe" /rl HIGHEST /f13⤵
- Creates scheduled task(s)
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\otcjA491IT6Q.bat" "13⤵
- Suspicious use of WriteProcessMemory
-
C:\Windows\system32\chcp.comchcp 6500114⤵
-
C:\Windows\system32\PING.EXEping -n 10 localhost14⤵
- Runs ping.exe
-
C:\Users\Admin\AppData\Roaming\SubDir\Byfron.exe"C:\Users\Admin\AppData\Roaming\SubDir\Byfron.exe"14⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
-
C:\Windows\SYSTEM32\schtasks.exe"schtasks" /create /tn "Balls" /sc ONLOGON /tr "C:\Users\Admin\AppData\Roaming\SubDir\Byfron.exe" /rl HIGHEST /f15⤵
- Creates scheduled task(s)
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\iyMbeM5scY35.bat" "15⤵
-
C:\Windows\system32\chcp.comchcp 6500116⤵
-
C:\Windows\system32\PING.EXEping -n 10 localhost16⤵
- Runs ping.exe
-
C:\Users\Admin\AppData\Roaming\SubDir\Byfron.exe"C:\Users\Admin\AppData\Roaming\SubDir\Byfron.exe"16⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
-
C:\Windows\SYSTEM32\schtasks.exe"schtasks" /create /tn "Balls" /sc ONLOGON /tr "C:\Users\Admin\AppData\Roaming\SubDir\Byfron.exe" /rl HIGHEST /f17⤵
- Creates scheduled task(s)
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\J9Tu0eGCazMb.bat" "17⤵
-
C:\Windows\system32\chcp.comchcp 6500118⤵
-
C:\Windows\system32\PING.EXEping -n 10 localhost18⤵
- Runs ping.exe
-
C:\Users\Admin\AppData\Roaming\SubDir\Byfron.exe"C:\Users\Admin\AppData\Roaming\SubDir\Byfron.exe"18⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
-
C:\Windows\SYSTEM32\schtasks.exe"schtasks" /create /tn "Balls" /sc ONLOGON /tr "C:\Users\Admin\AppData\Roaming\SubDir\Byfron.exe" /rl HIGHEST /f19⤵
- Creates scheduled task(s)
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\GKDsBrS147pv.bat" "19⤵
-
C:\Windows\system32\chcp.comchcp 6500120⤵
-
C:\Windows\system32\PING.EXEping -n 10 localhost20⤵
- Runs ping.exe
-
C:\Users\Admin\AppData\Roaming\SubDir\Byfron.exe"C:\Users\Admin\AppData\Roaming\SubDir\Byfron.exe"20⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
-
C:\Windows\SYSTEM32\schtasks.exe"schtasks" /create /tn "Balls" /sc ONLOGON /tr "C:\Users\Admin\AppData\Roaming\SubDir\Byfron.exe" /rl HIGHEST /f21⤵
- Creates scheduled task(s)
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\bJ5B3o0Sl4WE.bat" "21⤵
-
C:\Windows\system32\chcp.comchcp 6500122⤵
-
C:\Windows\system32\PING.EXEping -n 10 localhost22⤵
- Runs ping.exe
-
C:\Users\Admin\AppData\Roaming\SubDir\Byfron.exe"C:\Users\Admin\AppData\Roaming\SubDir\Byfron.exe"22⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
-
C:\Windows\SYSTEM32\schtasks.exe"schtasks" /create /tn "Balls" /sc ONLOGON /tr "C:\Users\Admin\AppData\Roaming\SubDir\Byfron.exe" /rl HIGHEST /f23⤵
- Creates scheduled task(s)
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\5UyYUvTcmfnR.bat" "23⤵
-
C:\Windows\system32\chcp.comchcp 6500124⤵
-
C:\Windows\system32\PING.EXEping -n 10 localhost24⤵
- Runs ping.exe
-
C:\Users\Admin\AppData\Roaming\SubDir\Byfron.exe"C:\Users\Admin\AppData\Roaming\SubDir\Byfron.exe"24⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
-
C:\Windows\SYSTEM32\schtasks.exe"schtasks" /create /tn "Balls" /sc ONLOGON /tr "C:\Users\Admin\AppData\Roaming\SubDir\Byfron.exe" /rl HIGHEST /f25⤵
- Creates scheduled task(s)
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\sZEEx7dcoxLc.bat" "25⤵
-
C:\Windows\system32\chcp.comchcp 6500126⤵
-
C:\Windows\system32\PING.EXEping -n 10 localhost26⤵
- Runs ping.exe
-
C:\Users\Admin\AppData\Roaming\SubDir\Byfron.exe"C:\Users\Admin\AppData\Roaming\SubDir\Byfron.exe"26⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\SYSTEM32\schtasks.exe"schtasks" /create /tn "Balls" /sc ONLOGON /tr "C:\Users\Admin\AppData\Roaming\SubDir\Byfron.exe" /rl HIGHEST /f27⤵
- Creates scheduled task(s)
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\2sf0w0l7WzLG.bat" "27⤵
-
C:\Windows\system32\chcp.comchcp 6500128⤵
-
C:\Windows\system32\PING.EXEping -n 10 localhost28⤵
- Runs ping.exe
Network
MITRE ATT&CK Matrix ATT&CK v13
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Local\Microsoft\CLR_v4.0\UsageLogs\Byfron.exe.logFilesize
1KB
MD5d63ff49d7c92016feb39812e4db10419
SHA12307d5e35ca9864ffefc93acf8573ea995ba189b
SHA256375076241775962f3edc08a8c72832a00920b427a4f3332528d91d21e909fa12
SHA51200f8c8d0336d6575b956876183199624d6f4d2056f2c0aa633a6f17c516f22ee648062d9bc419254d84c459323e9424f0da8aed9dd4e16c2926e5ba30e797d8a
-
C:\Users\Admin\AppData\Local\Temp\2sf0w0l7WzLG.batFilesize
207B
MD592709e37181ae5752172194d73d4100c
SHA120d5b14cd2d92890f71aa25035f6dd1367d52d51
SHA2567956e74180106aa1d86a58d5bbde26b01dd7101d4bb35208eb46a8b5350723ac
SHA512de033e69602511690442eb6f32a64ea61d6af59d285345b749d9d894ceead9239c07df6c2c26ecfff4b6dd01c87868a71a983f984c07c1c615e66eb07f55bc81
-
C:\Users\Admin\AppData\Local\Temp\5UyYUvTcmfnR.batFilesize
207B
MD5e79a2a4eb425d4501020241f40e73105
SHA193a026c571bb8dce55b3981953a0f86c89a41ec9
SHA256b21b5ad5adfadd345a3c90be8a4dc4680d948ab378438280f863eebacda8b6a9
SHA512adf8579ae5b65f2be0f75e299deb6cba203024cd20afd8860d33e8333097e66138c681fc43b279919413a26d27f70cc96c802deeba027e2861b857c3da1d9f6b
-
C:\Users\Admin\AppData\Local\Temp\GKDsBrS147pv.batFilesize
207B
MD537a9dff8f58d407957c44ce7adb40fcf
SHA187d0b60ef9fda397a87c7efb3e120602b7e4bcc9
SHA2563959de9e5e992b18c2e4736df7d3ce6e15200d3af86003c3122d93101ee769bf
SHA51238f4ffcb5d80c221ec72ff4a2787155b53548b338df0b110f438d8da37f072ea1b1a76fe7dd2b55b9e8c486f65b6a32c0185d0db9de85dbb476f7c8e5375659a
-
C:\Users\Admin\AppData\Local\Temp\J9Tu0eGCazMb.batFilesize
207B
MD5ed6ceaa216764a373ac62848d736efe0
SHA1999733b1db6f1d31cc44d1d47e2afb521427f0c3
SHA2560927d3ed02f35dcaa2b58b060b8ca2be9562f75d469188be1df6d1ce584ccc6d
SHA512aa95a36bb773e48a59f67cfc9bf0d548b994f7fef4df02c1ce1305d523d70849cbe381f9c0537efff444710ccf1ef84a77db23099d59ed4951c1225ad6430c04
-
C:\Users\Admin\AppData\Local\Temp\Mr2r4gC2PV56.batFilesize
207B
MD5daeaa556994968f6f18a711d073a84c2
SHA1383ad1d67e8c3c929ffd99b2a30aedf3c31e5e83
SHA2561b9f50dfb9c6d1746d4dd0f1976eee6969e01ff864d9f7a301f419ae9a6cba69
SHA512a53004469e70eb200dd2758df467093ea28f3c622d11f5e6519bfdaf229ca6cd272bb2616a5e3550333e57c28e21d9799e49d65e622a265e0ecd941c6ea84fde
-
C:\Users\Admin\AppData\Local\Temp\OUwVP5LC1p4x.batFilesize
207B
MD5ad0f93d8b7661d83de6005e6725010cb
SHA14828b00f4f5485cf78836f9de9dd62e0e698094d
SHA25651d4ff2d8df24795360715a989fd1cfc320f863312b3138755a6cb4df6fc3db1
SHA51208caa26d634dc2c85b45942af38545d044afdd013ffd312eb6161ed98571b98b96248e154b3048188106be68a0ad25a9d9e7a3ebd929773f725606760b011b8d
-
C:\Users\Admin\AppData\Local\Temp\QL60oPaY9TH0.batFilesize
207B
MD5694b0edf8a6f18cc334778791f1c9a87
SHA150ebe2159e558b25c7478d06be960cc796f4a547
SHA256a771d16b5940bbea11d008e188482ce3285a8fdef4a6ec3f2b55e142d5d3e63f
SHA51286b78e61a70b0ac1de47171e245b7f0431805b90450affa0e4a8b32959b6b75a42e4474fb88740be44b487696a4e17a52efd56404b3582c28df14ea463e37808
-
C:\Users\Admin\AppData\Local\Temp\XZnENHZOweSx.batFilesize
207B
MD53489eb1cb254d735204b46294776ea34
SHA162302fa9b1f1ab04495fd9d6d1d7668d1ca368a0
SHA256ab8ad1d67ca3e0e8bb96d602c92e6949f86ad445032b5aff78e0fb71c7a3e500
SHA5120e48e9f2f21625172d6f315753587d7468df3df7be8a248315024192f5be2022571027184196dcb5071d8ad73c31601998104ee2024fd9550cb289875a074fd8
-
C:\Users\Admin\AppData\Local\Temp\ZEVaEL12xU9e.batFilesize
207B
MD587683d04af6cff5c96836bd4a0257218
SHA110ac12074b26b281f96ec736568c0816f1960657
SHA2569cf35c6c0ee5f0dae975eeef76ee2b52d037528636c608983c51b0456de3faae
SHA512cf7592dcd3f4ff9298830bc2babaa33da6eb5e79d5b59303adea5d1898d2d0bbb51671a6ba315016074340302640580458aee413048f897710bee068e1c0f0ad
-
C:\Users\Admin\AppData\Local\Temp\bJ5B3o0Sl4WE.batFilesize
207B
MD5612fdec1cdd4b95472680830db8be4f5
SHA16fa24972ca064c01d83d95f19b208981af94a46c
SHA256df4600c9e7f749c46b0313268eab925bd91435696ce0ae78fa89fa167b2b8d46
SHA512264293c78ca61759c022cb30bdc718f7c68aec0a431bfb6dfa0047b671bf13a058e15adce227a55c945ad19bf1d9a70dd886f16f2ac6da29060df13c8033c1dd
-
C:\Users\Admin\AppData\Local\Temp\iyMbeM5scY35.batFilesize
207B
MD5d15a30b5311747917648511a22ca57ed
SHA17cebe7d85d60932bf8c5fbf9c6b62bdd61447ed0
SHA256419b7bf1d5ca8c0ea75831a0d233c91e6b9677b68fcb6213b257e213d38bebb1
SHA512c88783f65dfe604d1b73fe4adc6a20c2d6ab333a348cb1c594fd22bb88310d19527e98b4c695b1e85791f161731efbf1808db3de0d0a4ddba9056dfa879b5963
-
C:\Users\Admin\AppData\Local\Temp\otcjA491IT6Q.batFilesize
207B
MD572eafa5dca73de58363e45ebcb7d6149
SHA1137d7ec1e08bfbaeb1fc535a5c3aa597e9cfca15
SHA256f52f67720070241dbb2e7fcca85ca8ffcdec3edacd5615fcc7caa87ecc5dcbb6
SHA512e8778aade22667e95aab7a803f318ed5bf2ebc2c9821caf5a9d55e4e18f716ff0c41e0017e0f519fe96bf6adf329bb4f1fbb18946f9f88c4dce4f5bf55e40034
-
C:\Users\Admin\AppData\Local\Temp\sZEEx7dcoxLc.batFilesize
207B
MD50e57ed661b8a55e24607e3c900884a4b
SHA1c0dbc7560c6049829e47ca27d5525399eafc9d98
SHA256fc94f6b3df351b8b072e191c39d837d7a3fcf6f47aa4ad9c20a7a828d0139781
SHA5129b4746bfd3288e19b87dad6201a1ca6609dd0abc56021c860b0f09e09aa3332a82568ef4a8cc85f43a8f5fd7034285079559b5843e3b8cb3ca7f221f43270d22
-
C:\Users\Admin\AppData\Roaming\SubDir\Byfron.exeFilesize
3.1MB
MD5cb12954abfb20424cfc22e1c189ddfa9
SHA1dc8cb9d361cebb1a4ca13ce904cdd7136c9255c2
SHA25629bd747b03d4cc850e0c0733b4ff15a29ecd61de57701e4e6cc7aed90b83ef56
SHA51254dafd06e682eef74fd9d1377917429b1b304bb0be185f32406dbdea56d6afd8047a213f3e40191a817931077ee448993d9adc6228a1ab042fee52b9ebac611f
-
memory/3648-18-0x00007FFCC9C10000-0x00007FFCCA5FC000-memory.dmpFilesize
9.9MB
-
memory/3648-12-0x000000001C210000-0x000000001C260000-memory.dmpFilesize
320KB
-
memory/3648-13-0x000000001C320000-0x000000001C3D2000-memory.dmpFilesize
712KB
-
memory/3648-11-0x00007FFCC9C10000-0x00007FFCCA5FC000-memory.dmpFilesize
9.9MB
-
memory/3648-10-0x00007FFCC9C10000-0x00007FFCCA5FC000-memory.dmpFilesize
9.9MB
-
memory/4816-24-0x00007FFCC9C10000-0x00007FFCCA5FC000-memory.dmpFilesize
9.9MB
-
memory/4816-0-0x00007FFCC9C13000-0x00007FFCC9C14000-memory.dmpFilesize
4KB
-
memory/4816-2-0x00007FFCC9C10000-0x00007FFCCA5FC000-memory.dmpFilesize
9.9MB
-
memory/4816-1-0x0000000000D80000-0x00000000010A4000-memory.dmpFilesize
3.1MB