Overview
overview
10Static
static
10uni/Uni - ...py.exe
windows7-x64
10uni/Uni - ...py.exe
windows10-2004-x64
10uni/Uni - ...py.exe
windows7-x64
10uni/Uni - ...py.exe
windows10-2004-x64
10uni/Uni - ...py.exe
windows7-x64
10uni/Uni - ...py.exe
windows10-2004-x64
10uni/Uni - ...py.exe
windows7-x64
10uni/Uni - ...py.exe
windows10-2004-x64
10uni/Uni - ...py.exe
windows7-x64
10uni/Uni - ...py.exe
windows10-2004-x64
10uni/Uni - ...py.exe
windows7-x64
10uni/Uni - ...py.exe
windows10-2004-x64
10uni/Uni - ...py.exe
windows7-x64
10uni/Uni - ...py.exe
windows10-2004-x64
10uni/Uni - ...py.exe
windows7-x64
10uni/Uni - ...py.exe
windows10-2004-x64
10uni/Uni - ...py.exe
windows7-x64
10uni/Uni - ...py.exe
windows10-2004-x64
10uni/Uni - ...py.exe
windows7-x64
10uni/Uni - ...py.exe
windows10-2004-x64
10uni/Uni - ...py.exe
windows7-x64
10uni/Uni - ...py.exe
windows10-2004-x64
10uni/Uni - ...py.exe
windows7-x64
10uni/Uni - ...py.exe
windows10-2004-x64
10uni/Uni - ...py.exe
windows7-x64
10uni/Uni - ...py.exe
windows10-2004-x64
10uni/Uni - ...py.exe
windows7-x64
10uni/Uni - ...py.exe
windows10-2004-x64
10uni/Uni - ...py.exe
windows7-x64
10uni/Uni - ...py.exe
windows10-2004-x64
10uni/Uni - ...py.exe
windows7-x64
10uni/Uni - ...py.exe
windows10-2004-x64
10Analysis
-
max time kernel
591s -
max time network
601s -
platform
windows10-2004_x64 -
resource
win10v2004-20240508-en -
resource tags
arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system -
submitted
10-06-2024 15:28
Behavioral task
behavioral1
Sample
uni/Uni - Copy (10) - Copy - Copy - Copy.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
uni/Uni - Copy (10) - Copy - Copy - Copy.exe
Resource
win10v2004-20240426-en
Behavioral task
behavioral3
Sample
uni/Uni - Copy (10) - Copy - Copy.exe
Resource
win7-20240221-en
Behavioral task
behavioral4
Sample
uni/Uni - Copy (10) - Copy - Copy.exe
Resource
win10v2004-20240426-en
Behavioral task
behavioral5
Sample
uni/Uni - Copy (10) - Copy.exe
Resource
win7-20240220-en
Behavioral task
behavioral6
Sample
uni/Uni - Copy (10) - Copy.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral7
Sample
uni/Uni - Copy (11) - Copy - Copy - Copy.exe
Resource
win7-20231129-en
Behavioral task
behavioral8
Sample
uni/Uni - Copy (11) - Copy - Copy - Copy.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral9
Sample
uni/Uni - Copy (11) - Copy - Copy.exe
Resource
win7-20240508-en
Behavioral task
behavioral10
Sample
uni/Uni - Copy (11) - Copy - Copy.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral11
Sample
uni/Uni - Copy (11) - Copy.exe
Resource
win7-20240221-en
Behavioral task
behavioral12
Sample
uni/Uni - Copy (11) - Copy.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral13
Sample
uni/Uni - Copy (12) - Copy - Copy - Copy.exe
Resource
win7-20240508-en
Behavioral task
behavioral14
Sample
uni/Uni - Copy (12) - Copy - Copy - Copy.exe
Resource
win10v2004-20240426-en
Behavioral task
behavioral15
Sample
uni/Uni - Copy (12) - Copy - Copy.exe
Resource
win7-20240508-en
Behavioral task
behavioral16
Sample
uni/Uni - Copy (12) - Copy - Copy.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral17
Sample
uni/Uni - Copy (12) - Copy.exe
Resource
win7-20240221-en
Behavioral task
behavioral18
Sample
uni/Uni - Copy (12) - Copy.exe
Resource
win10v2004-20240426-en
Behavioral task
behavioral19
Sample
uni/Uni - Copy (13) - Copy - Copy - Copy.exe
Resource
win7-20240419-en
Behavioral task
behavioral20
Sample
uni/Uni - Copy (13) - Copy - Copy - Copy.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral21
Sample
uni/Uni - Copy (13) - Copy - Copy.exe
Resource
win7-20240508-en
Behavioral task
behavioral22
Sample
uni/Uni - Copy (13) - Copy - Copy.exe
Resource
win10v2004-20240426-en
Behavioral task
behavioral23
Sample
uni/Uni - Copy (13) - Copy.exe
Resource
win7-20240419-en
Behavioral task
behavioral24
Sample
uni/Uni - Copy (13) - Copy.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral25
Sample
uni/Uni - Copy (14) - Copy - Copy - Copy.exe
Resource
win7-20240221-en
Behavioral task
behavioral26
Sample
uni/Uni - Copy (14) - Copy - Copy - Copy.exe
Resource
win10v2004-20240426-en
Behavioral task
behavioral27
Sample
uni/Uni - Copy (14) - Copy - Copy.exe
Resource
win7-20240508-en
Behavioral task
behavioral28
Sample
uni/Uni - Copy (14) - Copy - Copy.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral29
Sample
uni/Uni - Copy (14) - Copy.exe
Resource
win7-20231129-en
Behavioral task
behavioral30
Sample
uni/Uni - Copy (14) - Copy.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral31
Sample
uni/Uni - Copy (15) - Copy - Copy - Copy.exe
Resource
win7-20240508-en
Behavioral task
behavioral32
Sample
uni/Uni - Copy (15) - Copy - Copy - Copy.exe
Resource
win10v2004-20240508-en
General
-
Target
uni/Uni - Copy (11) - Copy - Copy.exe
-
Size
409KB
-
MD5
b70fdac25a99501e3cae11f1b775249e
-
SHA1
3c59226479bfdcd1b2927bcfb1a7516d4cb8dd71
-
SHA256
51ff3eb450a786c1aaa75ff889f2fd256412a7b75d04277fdf9fcccc20e57246
-
SHA512
43f0d5d6e5f0d5febba537c109ffdbc250bbb6e9725e635a43ec975b0353048eaeee50b6e9274cd5e072ea6b0cea32439bd37408b2528832f467f2075f74ca44
-
SSDEEP
12288:gpbJjGut6AoE3hVVdFaC/eZPTMTDlpgfJCKuMsVs:oVaurMLcDlpRKai
Malware Config
Extracted
quasar
3.1.5
SeroXen
panel-slave.gl.at.ply.gg:57059
panel-slave.gl.at.ply.gg:27892
$Sxr-rpL8EItHN3pqIQQVy2
-
encryption_key
Lme7VBS3l58VwLM69PNM
-
install_name
Client.exe
-
log_directory
Logs
-
reconnect_delay
3000
-
startup_key
SeroXen
-
subdirectory
SubDir
Signatures
-
Quasar payload 2 IoCs
Processes:
resource yara_rule behavioral10/memory/1820-1-0x0000000000FF0000-0x000000000105C000-memory.dmp family_quasar C:\Users\Admin\AppData\Roaming\SubDir\Client.exe family_quasar -
Checks computer location settings 2 TTPs 28 IoCs
Looks up country code configured in the registry, likely geofence.
Processes:
Client.exeClient.exeClient.exeClient.exeClient.exeClient.exeClient.exeClient.exeClient.exeClient.exeClient.exeClient.exeClient.exeClient.exeClient.exeClient.exeClient.exeClient.exeClient.exeClient.exeClient.exeClient.exeClient.exeClient.exeClient.exeClient.exeClient.exeClient.exedescription ioc process Key value queried \REGISTRY\USER\S-1-5-21-1337824034-2731376981-3755436523-1000\Control Panel\International\Geo\Nation Client.exe Key value queried \REGISTRY\USER\S-1-5-21-1337824034-2731376981-3755436523-1000\Control Panel\International\Geo\Nation Client.exe Key value queried \REGISTRY\USER\S-1-5-21-1337824034-2731376981-3755436523-1000\Control Panel\International\Geo\Nation Client.exe Key value queried \REGISTRY\USER\S-1-5-21-1337824034-2731376981-3755436523-1000\Control Panel\International\Geo\Nation Client.exe Key value queried \REGISTRY\USER\S-1-5-21-1337824034-2731376981-3755436523-1000\Control Panel\International\Geo\Nation Client.exe Key value queried \REGISTRY\USER\S-1-5-21-1337824034-2731376981-3755436523-1000\Control Panel\International\Geo\Nation Client.exe Key value queried \REGISTRY\USER\S-1-5-21-1337824034-2731376981-3755436523-1000\Control Panel\International\Geo\Nation Client.exe Key value queried \REGISTRY\USER\S-1-5-21-1337824034-2731376981-3755436523-1000\Control Panel\International\Geo\Nation Client.exe Key value queried \REGISTRY\USER\S-1-5-21-1337824034-2731376981-3755436523-1000\Control Panel\International\Geo\Nation Client.exe Key value queried \REGISTRY\USER\S-1-5-21-1337824034-2731376981-3755436523-1000\Control Panel\International\Geo\Nation Client.exe Key value queried \REGISTRY\USER\S-1-5-21-1337824034-2731376981-3755436523-1000\Control Panel\International\Geo\Nation Client.exe Key value queried \REGISTRY\USER\S-1-5-21-1337824034-2731376981-3755436523-1000\Control Panel\International\Geo\Nation Client.exe Key value queried \REGISTRY\USER\S-1-5-21-1337824034-2731376981-3755436523-1000\Control Panel\International\Geo\Nation Client.exe Key value queried \REGISTRY\USER\S-1-5-21-1337824034-2731376981-3755436523-1000\Control Panel\International\Geo\Nation Client.exe Key value queried \REGISTRY\USER\S-1-5-21-1337824034-2731376981-3755436523-1000\Control Panel\International\Geo\Nation Client.exe Key value queried \REGISTRY\USER\S-1-5-21-1337824034-2731376981-3755436523-1000\Control Panel\International\Geo\Nation Client.exe Key value queried \REGISTRY\USER\S-1-5-21-1337824034-2731376981-3755436523-1000\Control Panel\International\Geo\Nation Client.exe Key value queried \REGISTRY\USER\S-1-5-21-1337824034-2731376981-3755436523-1000\Control Panel\International\Geo\Nation Client.exe Key value queried \REGISTRY\USER\S-1-5-21-1337824034-2731376981-3755436523-1000\Control Panel\International\Geo\Nation Client.exe Key value queried \REGISTRY\USER\S-1-5-21-1337824034-2731376981-3755436523-1000\Control Panel\International\Geo\Nation Client.exe Key value queried \REGISTRY\USER\S-1-5-21-1337824034-2731376981-3755436523-1000\Control Panel\International\Geo\Nation Client.exe Key value queried \REGISTRY\USER\S-1-5-21-1337824034-2731376981-3755436523-1000\Control Panel\International\Geo\Nation Client.exe Key value queried \REGISTRY\USER\S-1-5-21-1337824034-2731376981-3755436523-1000\Control Panel\International\Geo\Nation Client.exe Key value queried \REGISTRY\USER\S-1-5-21-1337824034-2731376981-3755436523-1000\Control Panel\International\Geo\Nation Client.exe Key value queried \REGISTRY\USER\S-1-5-21-1337824034-2731376981-3755436523-1000\Control Panel\International\Geo\Nation Client.exe Key value queried \REGISTRY\USER\S-1-5-21-1337824034-2731376981-3755436523-1000\Control Panel\International\Geo\Nation Client.exe Key value queried \REGISTRY\USER\S-1-5-21-1337824034-2731376981-3755436523-1000\Control Panel\International\Geo\Nation Client.exe Key value queried \REGISTRY\USER\S-1-5-21-1337824034-2731376981-3755436523-1000\Control Panel\International\Geo\Nation Client.exe -
Executes dropped EXE 28 IoCs
Processes:
Client.exeClient.exeClient.exeClient.exeClient.exeClient.exeClient.exeClient.exeClient.exeClient.exeClient.exeClient.exeClient.exeClient.exeClient.exeClient.exeClient.exeClient.exeClient.exeClient.exeClient.exeClient.exeClient.exeClient.exeClient.exeClient.exeClient.exeClient.exepid process 3604 Client.exe 4316 Client.exe 4876 Client.exe 4060 Client.exe 1244 Client.exe 3960 Client.exe 4960 Client.exe 1304 Client.exe 4748 Client.exe 2472 Client.exe 1384 Client.exe 2204 Client.exe 1968 Client.exe 5000 Client.exe 3828 Client.exe 4640 Client.exe 1676 Client.exe 2584 Client.exe 3500 Client.exe 4292 Client.exe 3568 Client.exe 4628 Client.exe 2240 Client.exe 4064 Client.exe 3112 Client.exe 2648 Client.exe 4460 Client.exe 3604 Client.exe -
Looks up external IP address via web service 26 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
Processes:
flow ioc 40 ip-api.com 61 ip-api.com 55 ip-api.com 13 ip-api.com 17 ip-api.com 27 ip-api.com 29 ip-api.com 15 ip-api.com 38 ip-api.com 50 ip-api.com 35 ip-api.com 45 ip-api.com 48 ip-api.com 63 ip-api.com 33 ip-api.com 2 ip-api.com 8 api.ipify.org 21 ip-api.com 57 ip-api.com 59 ip-api.com 19 ip-api.com 23 ip-api.com 25 ip-api.com 53 ip-api.com 31 ip-api.com 43 ip-api.com -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Program crash 28 IoCs
Processes:
WerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exepid pid_target process target process 1120 3604 WerFault.exe Client.exe 1592 4316 WerFault.exe Client.exe 4604 4876 WerFault.exe Client.exe 4600 4060 WerFault.exe Client.exe 2188 1244 WerFault.exe Client.exe 912 3960 WerFault.exe Client.exe 524 4960 WerFault.exe Client.exe 3316 1304 WerFault.exe Client.exe 3944 4748 WerFault.exe Client.exe 872 2472 WerFault.exe Client.exe 4528 1384 WerFault.exe Client.exe 2760 2204 WerFault.exe Client.exe 3124 1968 WerFault.exe Client.exe 4592 5000 WerFault.exe Client.exe 3832 3828 WerFault.exe Client.exe 2276 4640 WerFault.exe Client.exe 1664 1676 WerFault.exe Client.exe 2344 2584 WerFault.exe Client.exe 5044 3500 WerFault.exe Client.exe 1160 4292 WerFault.exe Client.exe 2356 3568 WerFault.exe Client.exe 184 4628 WerFault.exe Client.exe 3576 2240 WerFault.exe Client.exe 4480 4064 WerFault.exe Client.exe 2408 3112 WerFault.exe Client.exe 3676 2648 WerFault.exe Client.exe 4916 4460 WerFault.exe Client.exe 864 3604 WerFault.exe Client.exe -
Creates scheduled task(s) 1 TTPs 30 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
Processes:
schtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeSCHTASKS.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exepid process 4864 schtasks.exe 1136 schtasks.exe 748 schtasks.exe 1692 schtasks.exe 3996 schtasks.exe 2812 schtasks.exe 4584 schtasks.exe 1936 schtasks.exe 2676 schtasks.exe 1716 schtasks.exe 1572 schtasks.exe 1128 schtasks.exe 1988 schtasks.exe 4092 schtasks.exe 2224 schtasks.exe 4136 schtasks.exe 1112 schtasks.exe 4576 schtasks.exe 1212 SCHTASKS.exe 4436 schtasks.exe 4036 schtasks.exe 2708 schtasks.exe 4780 schtasks.exe 4400 schtasks.exe 960 schtasks.exe 4600 schtasks.exe 3280 schtasks.exe 4104 schtasks.exe 4588 schtasks.exe 5016 schtasks.exe -
Runs ping.exe 1 TTPs 28 IoCs
Processes:
PING.EXEPING.EXEPING.EXEPING.EXEPING.EXEPING.EXEPING.EXEPING.EXEPING.EXEPING.EXEPING.EXEPING.EXEPING.EXEPING.EXEPING.EXEPING.EXEPING.EXEPING.EXEPING.EXEPING.EXEPING.EXEPING.EXEPING.EXEPING.EXEPING.EXEPING.EXEPING.EXEPING.EXEpid process 4472 PING.EXE 3984 PING.EXE 1632 PING.EXE 5000 PING.EXE 4044 PING.EXE 2036 PING.EXE 2036 PING.EXE 3040 PING.EXE 3036 PING.EXE 2324 PING.EXE 2708 PING.EXE 2584 PING.EXE 3616 PING.EXE 1700 PING.EXE 3036 PING.EXE 4148 PING.EXE 4156 PING.EXE 2504 PING.EXE 2408 PING.EXE 3600 PING.EXE 2268 PING.EXE 4944 PING.EXE 4396 PING.EXE 1120 PING.EXE 1948 PING.EXE 1164 PING.EXE 4836 PING.EXE 3324 PING.EXE -
Suspicious use of AdjustPrivilegeToken 29 IoCs
Processes:
Uni - Copy (11) - Copy - Copy.exeClient.exeClient.exeClient.exeClient.exeClient.exeClient.exeClient.exeClient.exeClient.exeClient.exeClient.exeClient.exeClient.exeClient.exeClient.exeClient.exeClient.exeClient.exeClient.exeClient.exeClient.exeClient.exeClient.exeClient.exeClient.exeClient.exeClient.exeClient.exedescription pid process Token: SeDebugPrivilege 1820 Uni - Copy (11) - Copy - Copy.exe Token: SeDebugPrivilege 3604 Client.exe Token: SeDebugPrivilege 4316 Client.exe Token: SeDebugPrivilege 4876 Client.exe Token: SeDebugPrivilege 4060 Client.exe Token: SeDebugPrivilege 1244 Client.exe Token: SeDebugPrivilege 3960 Client.exe Token: SeDebugPrivilege 4960 Client.exe Token: SeDebugPrivilege 1304 Client.exe Token: SeDebugPrivilege 4748 Client.exe Token: SeDebugPrivilege 2472 Client.exe Token: SeDebugPrivilege 1384 Client.exe Token: SeDebugPrivilege 2204 Client.exe Token: SeDebugPrivilege 1968 Client.exe Token: SeDebugPrivilege 5000 Client.exe Token: SeDebugPrivilege 3828 Client.exe Token: SeDebugPrivilege 4640 Client.exe Token: SeDebugPrivilege 1676 Client.exe Token: SeDebugPrivilege 2584 Client.exe Token: SeDebugPrivilege 3500 Client.exe Token: SeDebugPrivilege 4292 Client.exe Token: SeDebugPrivilege 3568 Client.exe Token: SeDebugPrivilege 4628 Client.exe Token: SeDebugPrivilege 2240 Client.exe Token: SeDebugPrivilege 4064 Client.exe Token: SeDebugPrivilege 3112 Client.exe Token: SeDebugPrivilege 2648 Client.exe Token: SeDebugPrivilege 4460 Client.exe Token: SeDebugPrivilege 3604 Client.exe -
Suspicious use of SetWindowsHookEx 28 IoCs
Processes:
Client.exeClient.exeClient.exeClient.exeClient.exeClient.exeClient.exeClient.exeClient.exeClient.exeClient.exeClient.exeClient.exeClient.exeClient.exeClient.exeClient.exeClient.exeClient.exeClient.exeClient.exeClient.exeClient.exeClient.exeClient.exeClient.exeClient.exeClient.exepid process 3604 Client.exe 4316 Client.exe 4876 Client.exe 4060 Client.exe 1244 Client.exe 3960 Client.exe 4960 Client.exe 1304 Client.exe 4748 Client.exe 2472 Client.exe 1384 Client.exe 2204 Client.exe 1968 Client.exe 5000 Client.exe 3828 Client.exe 4640 Client.exe 1676 Client.exe 2584 Client.exe 3500 Client.exe 4292 Client.exe 3568 Client.exe 4628 Client.exe 2240 Client.exe 4064 Client.exe 3112 Client.exe 2648 Client.exe 4460 Client.exe 3604 Client.exe -
Suspicious use of WriteProcessMemory 64 IoCs
Processes:
Uni - Copy (11) - Copy - Copy.exeClient.execmd.exeClient.execmd.exeClient.execmd.exeClient.execmd.exedescription pid process target process PID 1820 wrote to memory of 4584 1820 Uni - Copy (11) - Copy - Copy.exe schtasks.exe PID 1820 wrote to memory of 4584 1820 Uni - Copy (11) - Copy - Copy.exe schtasks.exe PID 1820 wrote to memory of 4584 1820 Uni - Copy (11) - Copy - Copy.exe schtasks.exe PID 1820 wrote to memory of 3604 1820 Uni - Copy (11) - Copy - Copy.exe Client.exe PID 1820 wrote to memory of 3604 1820 Uni - Copy (11) - Copy - Copy.exe Client.exe PID 1820 wrote to memory of 3604 1820 Uni - Copy (11) - Copy - Copy.exe Client.exe PID 1820 wrote to memory of 1212 1820 Uni - Copy (11) - Copy - Copy.exe SCHTASKS.exe PID 1820 wrote to memory of 1212 1820 Uni - Copy (11) - Copy - Copy.exe SCHTASKS.exe PID 1820 wrote to memory of 1212 1820 Uni - Copy (11) - Copy - Copy.exe SCHTASKS.exe PID 3604 wrote to memory of 4780 3604 Client.exe schtasks.exe PID 3604 wrote to memory of 4780 3604 Client.exe schtasks.exe PID 3604 wrote to memory of 4780 3604 Client.exe schtasks.exe PID 3604 wrote to memory of 4540 3604 Client.exe cmd.exe PID 3604 wrote to memory of 4540 3604 Client.exe cmd.exe PID 3604 wrote to memory of 4540 3604 Client.exe cmd.exe PID 4540 wrote to memory of 4600 4540 cmd.exe chcp.com PID 4540 wrote to memory of 4600 4540 cmd.exe chcp.com PID 4540 wrote to memory of 4600 4540 cmd.exe chcp.com PID 4540 wrote to memory of 2708 4540 cmd.exe PING.EXE PID 4540 wrote to memory of 2708 4540 cmd.exe PING.EXE PID 4540 wrote to memory of 2708 4540 cmd.exe PING.EXE PID 4540 wrote to memory of 4316 4540 cmd.exe Client.exe PID 4540 wrote to memory of 4316 4540 cmd.exe Client.exe PID 4540 wrote to memory of 4316 4540 cmd.exe Client.exe PID 4316 wrote to memory of 4436 4316 Client.exe schtasks.exe PID 4316 wrote to memory of 4436 4316 Client.exe schtasks.exe PID 4316 wrote to memory of 4436 4316 Client.exe schtasks.exe PID 4316 wrote to memory of 1596 4316 Client.exe cmd.exe PID 4316 wrote to memory of 1596 4316 Client.exe cmd.exe PID 4316 wrote to memory of 1596 4316 Client.exe cmd.exe PID 1596 wrote to memory of 4552 1596 cmd.exe chcp.com PID 1596 wrote to memory of 4552 1596 cmd.exe chcp.com PID 1596 wrote to memory of 4552 1596 cmd.exe chcp.com PID 1596 wrote to memory of 4396 1596 cmd.exe PING.EXE PID 1596 wrote to memory of 4396 1596 cmd.exe PING.EXE PID 1596 wrote to memory of 4396 1596 cmd.exe PING.EXE PID 1596 wrote to memory of 4876 1596 cmd.exe Client.exe PID 1596 wrote to memory of 4876 1596 cmd.exe Client.exe PID 1596 wrote to memory of 4876 1596 cmd.exe Client.exe PID 4876 wrote to memory of 4400 4876 Client.exe schtasks.exe PID 4876 wrote to memory of 4400 4876 Client.exe schtasks.exe PID 4876 wrote to memory of 4400 4876 Client.exe schtasks.exe PID 4876 wrote to memory of 4380 4876 Client.exe cmd.exe PID 4876 wrote to memory of 4380 4876 Client.exe cmd.exe PID 4876 wrote to memory of 4380 4876 Client.exe cmd.exe PID 4380 wrote to memory of 1988 4380 cmd.exe chcp.com PID 4380 wrote to memory of 1988 4380 cmd.exe chcp.com PID 4380 wrote to memory of 1988 4380 cmd.exe chcp.com PID 4380 wrote to memory of 4472 4380 cmd.exe PING.EXE PID 4380 wrote to memory of 4472 4380 cmd.exe PING.EXE PID 4380 wrote to memory of 4472 4380 cmd.exe PING.EXE PID 4380 wrote to memory of 4060 4380 cmd.exe Client.exe PID 4380 wrote to memory of 4060 4380 cmd.exe Client.exe PID 4380 wrote to memory of 4060 4380 cmd.exe Client.exe PID 4060 wrote to memory of 1936 4060 Client.exe schtasks.exe PID 4060 wrote to memory of 1936 4060 Client.exe schtasks.exe PID 4060 wrote to memory of 1936 4060 Client.exe schtasks.exe PID 4060 wrote to memory of 2432 4060 Client.exe cmd.exe PID 4060 wrote to memory of 2432 4060 Client.exe cmd.exe PID 4060 wrote to memory of 2432 4060 Client.exe cmd.exe PID 2432 wrote to memory of 1652 2432 cmd.exe chcp.com PID 2432 wrote to memory of 1652 2432 cmd.exe chcp.com PID 2432 wrote to memory of 1652 2432 cmd.exe chcp.com PID 2432 wrote to memory of 2036 2432 cmd.exe PING.EXE
Processes
-
C:\Users\Admin\AppData\Local\Temp\uni\Uni - Copy (11) - Copy - Copy.exe"C:\Users\Admin\AppData\Local\Temp\uni\Uni - Copy (11) - Copy - Copy.exe"1⤵
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\schtasks.exe"schtasks" /create /tn "SeroXen" /sc ONLOGON /tr "C:\Users\Admin\AppData\Local\Temp\uni\Uni - Copy (11) - Copy - Copy.exe" /rl HIGHEST /f2⤵
- Creates scheduled task(s)
-
C:\Users\Admin\AppData\Roaming\SubDir\Client.exe"C:\Users\Admin\AppData\Roaming\SubDir\Client.exe"2⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\schtasks.exe"schtasks" /create /tn "SeroXen" /sc ONLOGON /tr "C:\Users\Admin\AppData\Roaming\SubDir\Client.exe" /rl HIGHEST /f3⤵
- Creates scheduled task(s)
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\t13DzzvAF4Ff.bat" "3⤵
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\chcp.comchcp 650014⤵
-
C:\Windows\SysWOW64\PING.EXEping -n 10 localhost4⤵
- Runs ping.exe
-
C:\Users\Admin\AppData\Roaming\SubDir\Client.exe"C:\Users\Admin\AppData\Roaming\SubDir\Client.exe"4⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\schtasks.exe"schtasks" /create /tn "SeroXen" /sc ONLOGON /tr "C:\Users\Admin\AppData\Roaming\SubDir\Client.exe" /rl HIGHEST /f5⤵
- Creates scheduled task(s)
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\jcbmotgsFrhf.bat" "5⤵
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\chcp.comchcp 650016⤵
-
C:\Windows\SysWOW64\PING.EXEping -n 10 localhost6⤵
- Runs ping.exe
-
C:\Users\Admin\AppData\Roaming\SubDir\Client.exe"C:\Users\Admin\AppData\Roaming\SubDir\Client.exe"6⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\schtasks.exe"schtasks" /create /tn "SeroXen" /sc ONLOGON /tr "C:\Users\Admin\AppData\Roaming\SubDir\Client.exe" /rl HIGHEST /f7⤵
- Creates scheduled task(s)
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\3yDe48LqYA5R.bat" "7⤵
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\chcp.comchcp 650018⤵
-
C:\Windows\SysWOW64\PING.EXEping -n 10 localhost8⤵
- Runs ping.exe
-
C:\Users\Admin\AppData\Roaming\SubDir\Client.exe"C:\Users\Admin\AppData\Roaming\SubDir\Client.exe"8⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\schtasks.exe"schtasks" /create /tn "SeroXen" /sc ONLOGON /tr "C:\Users\Admin\AppData\Roaming\SubDir\Client.exe" /rl HIGHEST /f9⤵
- Creates scheduled task(s)
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\oYxT7IwF29rX.bat" "9⤵
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\chcp.comchcp 6500110⤵
-
C:\Windows\SysWOW64\PING.EXEping -n 10 localhost10⤵
- Runs ping.exe
-
C:\Users\Admin\AppData\Roaming\SubDir\Client.exe"C:\Users\Admin\AppData\Roaming\SubDir\Client.exe"10⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
-
C:\Windows\SysWOW64\schtasks.exe"schtasks" /create /tn "SeroXen" /sc ONLOGON /tr "C:\Users\Admin\AppData\Roaming\SubDir\Client.exe" /rl HIGHEST /f11⤵
- Creates scheduled task(s)
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\GCFhHqSiCAk2.bat" "11⤵
-
C:\Windows\SysWOW64\chcp.comchcp 6500112⤵
-
C:\Windows\SysWOW64\PING.EXEping -n 10 localhost12⤵
- Runs ping.exe
-
C:\Users\Admin\AppData\Roaming\SubDir\Client.exe"C:\Users\Admin\AppData\Roaming\SubDir\Client.exe"12⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
-
C:\Windows\SysWOW64\schtasks.exe"schtasks" /create /tn "SeroXen" /sc ONLOGON /tr "C:\Users\Admin\AppData\Roaming\SubDir\Client.exe" /rl HIGHEST /f13⤵
- Creates scheduled task(s)
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\4m36M2Z1mMZn.bat" "13⤵
-
C:\Windows\SysWOW64\chcp.comchcp 6500114⤵
-
C:\Windows\SysWOW64\PING.EXEping -n 10 localhost14⤵
- Runs ping.exe
-
C:\Users\Admin\AppData\Roaming\SubDir\Client.exe"C:\Users\Admin\AppData\Roaming\SubDir\Client.exe"14⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
-
C:\Windows\SysWOW64\schtasks.exe"schtasks" /create /tn "SeroXen" /sc ONLOGON /tr "C:\Users\Admin\AppData\Roaming\SubDir\Client.exe" /rl HIGHEST /f15⤵
- Creates scheduled task(s)
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\M5ePEiByM3aq.bat" "15⤵
-
C:\Windows\SysWOW64\chcp.comchcp 6500116⤵
-
C:\Windows\SysWOW64\PING.EXEping -n 10 localhost16⤵
- Runs ping.exe
-
C:\Users\Admin\AppData\Roaming\SubDir\Client.exe"C:\Users\Admin\AppData\Roaming\SubDir\Client.exe"16⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
-
C:\Windows\SysWOW64\schtasks.exe"schtasks" /create /tn "SeroXen" /sc ONLOGON /tr "C:\Users\Admin\AppData\Roaming\SubDir\Client.exe" /rl HIGHEST /f17⤵
- Creates scheduled task(s)
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\Nl6QJzComgFo.bat" "17⤵
-
C:\Windows\SysWOW64\chcp.comchcp 6500118⤵
-
C:\Windows\SysWOW64\PING.EXEping -n 10 localhost18⤵
- Runs ping.exe
-
C:\Users\Admin\AppData\Roaming\SubDir\Client.exe"C:\Users\Admin\AppData\Roaming\SubDir\Client.exe"18⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
-
C:\Windows\SysWOW64\schtasks.exe"schtasks" /create /tn "SeroXen" /sc ONLOGON /tr "C:\Users\Admin\AppData\Roaming\SubDir\Client.exe" /rl HIGHEST /f19⤵
- Creates scheduled task(s)
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\zFEEO6QYVRFN.bat" "19⤵
-
C:\Windows\SysWOW64\chcp.comchcp 6500120⤵
-
C:\Windows\SysWOW64\PING.EXEping -n 10 localhost20⤵
- Runs ping.exe
-
C:\Users\Admin\AppData\Roaming\SubDir\Client.exe"C:\Users\Admin\AppData\Roaming\SubDir\Client.exe"20⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
-
C:\Windows\SysWOW64\schtasks.exe"schtasks" /create /tn "SeroXen" /sc ONLOGON /tr "C:\Users\Admin\AppData\Roaming\SubDir\Client.exe" /rl HIGHEST /f21⤵
- Creates scheduled task(s)
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\vre62msT7ETw.bat" "21⤵
-
C:\Windows\SysWOW64\chcp.comchcp 6500122⤵
-
C:\Windows\SysWOW64\PING.EXEping -n 10 localhost22⤵
- Runs ping.exe
-
C:\Users\Admin\AppData\Roaming\SubDir\Client.exe"C:\Users\Admin\AppData\Roaming\SubDir\Client.exe"22⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
-
C:\Windows\SysWOW64\schtasks.exe"schtasks" /create /tn "SeroXen" /sc ONLOGON /tr "C:\Users\Admin\AppData\Roaming\SubDir\Client.exe" /rl HIGHEST /f23⤵
- Creates scheduled task(s)
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\PozcmBAV8PBm.bat" "23⤵
-
C:\Windows\SysWOW64\chcp.comchcp 6500124⤵
-
C:\Windows\SysWOW64\PING.EXEping -n 10 localhost24⤵
- Runs ping.exe
-
C:\Users\Admin\AppData\Roaming\SubDir\Client.exe"C:\Users\Admin\AppData\Roaming\SubDir\Client.exe"24⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
-
C:\Windows\SysWOW64\schtasks.exe"schtasks" /create /tn "SeroXen" /sc ONLOGON /tr "C:\Users\Admin\AppData\Roaming\SubDir\Client.exe" /rl HIGHEST /f25⤵
- Creates scheduled task(s)
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\OzIp5HZHr4xq.bat" "25⤵
-
C:\Windows\SysWOW64\chcp.comchcp 6500126⤵
-
C:\Windows\SysWOW64\PING.EXEping -n 10 localhost26⤵
- Runs ping.exe
-
C:\Users\Admin\AppData\Roaming\SubDir\Client.exe"C:\Users\Admin\AppData\Roaming\SubDir\Client.exe"26⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
-
C:\Windows\SysWOW64\schtasks.exe"schtasks" /create /tn "SeroXen" /sc ONLOGON /tr "C:\Users\Admin\AppData\Roaming\SubDir\Client.exe" /rl HIGHEST /f27⤵
- Creates scheduled task(s)
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\emFCwOdzcvAu.bat" "27⤵
-
C:\Windows\SysWOW64\chcp.comchcp 6500128⤵
-
C:\Windows\SysWOW64\PING.EXEping -n 10 localhost28⤵
- Runs ping.exe
-
C:\Users\Admin\AppData\Roaming\SubDir\Client.exe"C:\Users\Admin\AppData\Roaming\SubDir\Client.exe"28⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
-
C:\Windows\SysWOW64\schtasks.exe"schtasks" /create /tn "SeroXen" /sc ONLOGON /tr "C:\Users\Admin\AppData\Roaming\SubDir\Client.exe" /rl HIGHEST /f29⤵
- Creates scheduled task(s)
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\HiHP9q4DldIs.bat" "29⤵
-
C:\Windows\SysWOW64\chcp.comchcp 6500130⤵
-
C:\Windows\SysWOW64\PING.EXEping -n 10 localhost30⤵
- Runs ping.exe
-
C:\Users\Admin\AppData\Roaming\SubDir\Client.exe"C:\Users\Admin\AppData\Roaming\SubDir\Client.exe"30⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
-
C:\Windows\SysWOW64\schtasks.exe"schtasks" /create /tn "SeroXen" /sc ONLOGON /tr "C:\Users\Admin\AppData\Roaming\SubDir\Client.exe" /rl HIGHEST /f31⤵
- Creates scheduled task(s)
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\qdVsaXL6OXkx.bat" "31⤵
-
C:\Windows\SysWOW64\chcp.comchcp 6500132⤵
-
C:\Windows\SysWOW64\PING.EXEping -n 10 localhost32⤵
- Runs ping.exe
-
C:\Users\Admin\AppData\Roaming\SubDir\Client.exe"C:\Users\Admin\AppData\Roaming\SubDir\Client.exe"32⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
-
C:\Windows\SysWOW64\schtasks.exe"schtasks" /create /tn "SeroXen" /sc ONLOGON /tr "C:\Users\Admin\AppData\Roaming\SubDir\Client.exe" /rl HIGHEST /f33⤵
- Creates scheduled task(s)
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\V4htZBOODClq.bat" "33⤵
-
C:\Windows\SysWOW64\chcp.comchcp 6500134⤵
-
C:\Windows\SysWOW64\PING.EXEping -n 10 localhost34⤵
- Runs ping.exe
-
C:\Users\Admin\AppData\Roaming\SubDir\Client.exe"C:\Users\Admin\AppData\Roaming\SubDir\Client.exe"34⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
-
C:\Windows\SysWOW64\schtasks.exe"schtasks" /create /tn "SeroXen" /sc ONLOGON /tr "C:\Users\Admin\AppData\Roaming\SubDir\Client.exe" /rl HIGHEST /f35⤵
- Creates scheduled task(s)
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\zTynRwtudKc6.bat" "35⤵
-
C:\Windows\SysWOW64\chcp.comchcp 6500136⤵
-
C:\Windows\SysWOW64\PING.EXEping -n 10 localhost36⤵
- Runs ping.exe
-
C:\Users\Admin\AppData\Roaming\SubDir\Client.exe"C:\Users\Admin\AppData\Roaming\SubDir\Client.exe"36⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
-
C:\Windows\SysWOW64\schtasks.exe"schtasks" /create /tn "SeroXen" /sc ONLOGON /tr "C:\Users\Admin\AppData\Roaming\SubDir\Client.exe" /rl HIGHEST /f37⤵
- Creates scheduled task(s)
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\3AFZIy44Ylyy.bat" "37⤵
-
C:\Windows\SysWOW64\chcp.comchcp 6500138⤵
-
C:\Windows\SysWOW64\PING.EXEping -n 10 localhost38⤵
- Runs ping.exe
-
C:\Users\Admin\AppData\Roaming\SubDir\Client.exe"C:\Users\Admin\AppData\Roaming\SubDir\Client.exe"38⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
-
C:\Windows\SysWOW64\schtasks.exe"schtasks" /create /tn "SeroXen" /sc ONLOGON /tr "C:\Users\Admin\AppData\Roaming\SubDir\Client.exe" /rl HIGHEST /f39⤵
- Creates scheduled task(s)
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\vlqiAuMgekVd.bat" "39⤵
-
C:\Windows\SysWOW64\chcp.comchcp 6500140⤵
-
C:\Windows\SysWOW64\PING.EXEping -n 10 localhost40⤵
- Runs ping.exe
-
C:\Users\Admin\AppData\Roaming\SubDir\Client.exe"C:\Users\Admin\AppData\Roaming\SubDir\Client.exe"40⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
-
C:\Windows\SysWOW64\schtasks.exe"schtasks" /create /tn "SeroXen" /sc ONLOGON /tr "C:\Users\Admin\AppData\Roaming\SubDir\Client.exe" /rl HIGHEST /f41⤵
- Creates scheduled task(s)
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\FZbpomZhvPPb.bat" "41⤵
-
C:\Windows\SysWOW64\chcp.comchcp 6500142⤵
-
C:\Windows\SysWOW64\PING.EXEping -n 10 localhost42⤵
- Runs ping.exe
-
C:\Users\Admin\AppData\Roaming\SubDir\Client.exe"C:\Users\Admin\AppData\Roaming\SubDir\Client.exe"42⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
-
C:\Windows\SysWOW64\schtasks.exe"schtasks" /create /tn "SeroXen" /sc ONLOGON /tr "C:\Users\Admin\AppData\Roaming\SubDir\Client.exe" /rl HIGHEST /f43⤵
- Creates scheduled task(s)
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\Hlilub8nAstZ.bat" "43⤵
-
C:\Windows\SysWOW64\chcp.comchcp 6500144⤵
-
C:\Windows\SysWOW64\PING.EXEping -n 10 localhost44⤵
- Runs ping.exe
-
C:\Users\Admin\AppData\Roaming\SubDir\Client.exe"C:\Users\Admin\AppData\Roaming\SubDir\Client.exe"44⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
-
C:\Windows\SysWOW64\schtasks.exe"schtasks" /create /tn "SeroXen" /sc ONLOGON /tr "C:\Users\Admin\AppData\Roaming\SubDir\Client.exe" /rl HIGHEST /f45⤵
- Creates scheduled task(s)
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\9MKulXQPFsPE.bat" "45⤵
-
C:\Windows\SysWOW64\chcp.comchcp 6500146⤵
-
C:\Windows\SysWOW64\PING.EXEping -n 10 localhost46⤵
- Runs ping.exe
-
C:\Users\Admin\AppData\Roaming\SubDir\Client.exe"C:\Users\Admin\AppData\Roaming\SubDir\Client.exe"46⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
-
C:\Windows\SysWOW64\schtasks.exe"schtasks" /create /tn "SeroXen" /sc ONLOGON /tr "C:\Users\Admin\AppData\Roaming\SubDir\Client.exe" /rl HIGHEST /f47⤵
- Creates scheduled task(s)
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\FzfuX7P7GDoQ.bat" "47⤵
-
C:\Windows\SysWOW64\chcp.comchcp 6500148⤵
-
C:\Windows\SysWOW64\PING.EXEping -n 10 localhost48⤵
- Runs ping.exe
-
C:\Users\Admin\AppData\Roaming\SubDir\Client.exe"C:\Users\Admin\AppData\Roaming\SubDir\Client.exe"48⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
-
C:\Windows\SysWOW64\schtasks.exe"schtasks" /create /tn "SeroXen" /sc ONLOGON /tr "C:\Users\Admin\AppData\Roaming\SubDir\Client.exe" /rl HIGHEST /f49⤵
- Creates scheduled task(s)
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\gN75c7kIAXym.bat" "49⤵
-
C:\Windows\SysWOW64\chcp.comchcp 6500150⤵
-
C:\Windows\SysWOW64\PING.EXEping -n 10 localhost50⤵
- Runs ping.exe
-
C:\Users\Admin\AppData\Roaming\SubDir\Client.exe"C:\Users\Admin\AppData\Roaming\SubDir\Client.exe"50⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
-
C:\Windows\SysWOW64\schtasks.exe"schtasks" /create /tn "SeroXen" /sc ONLOGON /tr "C:\Users\Admin\AppData\Roaming\SubDir\Client.exe" /rl HIGHEST /f51⤵
- Creates scheduled task(s)
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\RO1A3uvkdrF3.bat" "51⤵
-
C:\Windows\SysWOW64\chcp.comchcp 6500152⤵
-
C:\Windows\SysWOW64\PING.EXEping -n 10 localhost52⤵
- Runs ping.exe
-
C:\Users\Admin\AppData\Roaming\SubDir\Client.exe"C:\Users\Admin\AppData\Roaming\SubDir\Client.exe"52⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
-
C:\Windows\SysWOW64\schtasks.exe"schtasks" /create /tn "SeroXen" /sc ONLOGON /tr "C:\Users\Admin\AppData\Roaming\SubDir\Client.exe" /rl HIGHEST /f53⤵
- Creates scheduled task(s)
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\smTL8vGwXBOP.bat" "53⤵
-
C:\Windows\SysWOW64\chcp.comchcp 6500154⤵
-
C:\Windows\SysWOW64\PING.EXEping -n 10 localhost54⤵
- Runs ping.exe
-
C:\Users\Admin\AppData\Roaming\SubDir\Client.exe"C:\Users\Admin\AppData\Roaming\SubDir\Client.exe"54⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
-
C:\Windows\SysWOW64\schtasks.exe"schtasks" /create /tn "SeroXen" /sc ONLOGON /tr "C:\Users\Admin\AppData\Roaming\SubDir\Client.exe" /rl HIGHEST /f55⤵
- Creates scheduled task(s)
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\DexyfzpjFkyx.bat" "55⤵
-
C:\Windows\SysWOW64\chcp.comchcp 6500156⤵
-
C:\Windows\SysWOW64\PING.EXEping -n 10 localhost56⤵
- Runs ping.exe
-
C:\Users\Admin\AppData\Roaming\SubDir\Client.exe"C:\Users\Admin\AppData\Roaming\SubDir\Client.exe"56⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
-
C:\Windows\SysWOW64\schtasks.exe"schtasks" /create /tn "SeroXen" /sc ONLOGON /tr "C:\Users\Admin\AppData\Roaming\SubDir\Client.exe" /rl HIGHEST /f57⤵
- Creates scheduled task(s)
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\r59zeds24Pzq.bat" "57⤵
-
C:\Windows\SysWOW64\chcp.comchcp 6500158⤵
-
C:\Windows\SysWOW64\PING.EXEping -n 10 localhost58⤵
- Runs ping.exe
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3604 -s 224857⤵
- Program crash
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4460 -s 171255⤵
- Program crash
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2648 -s 170453⤵
- Program crash
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3112 -s 222451⤵
- Program crash
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4064 -s 222049⤵
- Program crash
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2240 -s 107647⤵
- Program crash
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4628 -s 224845⤵
- Program crash
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3568 -s 170843⤵
- Program crash
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4292 -s 170841⤵
- Program crash
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3500 -s 222439⤵
- Program crash
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2584 -s 224037⤵
- Program crash
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1676 -s 224035⤵
- Program crash
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4640 -s 168833⤵
- Program crash
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3828 -s 173631⤵
- Program crash
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 5000 -s 109229⤵
- Program crash
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1968 -s 109227⤵
- Program crash
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2204 -s 169225⤵
- Program crash
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1384 -s 109623⤵
- Program crash
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2472 -s 222821⤵
- Program crash
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4748 -s 171219⤵
- Program crash
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1304 -s 222817⤵
- Program crash
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4960 -s 225215⤵
- Program crash
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3960 -s 223613⤵
- Program crash
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1244 -s 164811⤵
- Program crash
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4060 -s 22009⤵
- Program crash
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4876 -s 10927⤵
- Program crash
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4316 -s 10205⤵
- Program crash
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3604 -s 22003⤵
- Program crash
-
C:\Windows\SysWOW64\SCHTASKS.exe"SCHTASKS.exe" /create /tn "$77Uni - Copy (11) - Copy - Copy.exe" /tr "'C:\Users\Admin\AppData\Local\Temp\uni\Uni - Copy (11) - Copy - Copy.exe'" /sc onlogon /rl HIGHEST2⤵
- Creates scheduled task(s)
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 408 -p 3604 -ip 36041⤵
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 480 -p 4316 -ip 43161⤵
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 456 -p 4876 -ip 48761⤵
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 516 -p 4060 -ip 40601⤵
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 544 -p 1244 -ip 12441⤵
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 444 -p 3960 -ip 39601⤵
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 540 -p 4960 -ip 49601⤵
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 528 -p 1304 -ip 13041⤵
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 184 -p 4748 -ip 47481⤵
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 456 -p 2472 -ip 24721⤵
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 528 -p 1384 -ip 13841⤵
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 504 -p 2204 -ip 22041⤵
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 456 -p 1968 -ip 19681⤵
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 552 -p 5000 -ip 50001⤵
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 552 -p 3828 -ip 38281⤵
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 536 -p 4640 -ip 46401⤵
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 532 -p 1676 -ip 16761⤵
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 524 -p 2584 -ip 25841⤵
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 508 -p 3500 -ip 35001⤵
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 568 -p 4292 -ip 42921⤵
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 568 -p 3568 -ip 35681⤵
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 548 -p 4628 -ip 46281⤵
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 540 -p 2240 -ip 22401⤵
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 384 -p 4064 -ip 40641⤵
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 548 -p 3112 -ip 31121⤵
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 444 -p 2648 -ip 26481⤵
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 184 -p 4460 -ip 44601⤵
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 488 -p 3604 -ip 36041⤵
Network
MITRE ATT&CK Matrix ATT&CK v13
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Local\Temp\3AFZIy44Ylyy.batFilesize
207B
MD5abb79388ad39f0f5a34df41e53d29583
SHA1e76c195e2f9eafe2ca28183611537e008710ca48
SHA25659063634bfaed2d93de52655a83077eb197f98783097ef15b3f9d2d6353f5595
SHA512615b925855c3c2e912f38b97e484f96a266cae6f60d47737ea8f82694cda34b859e31170ac45188cec89cb0a0c3cdf37f0de17b1df5ed781dbb0e8855eaac555
-
C:\Users\Admin\AppData\Local\Temp\3yDe48LqYA5R.batFilesize
207B
MD5e834e4a0a112bd4616c039317fc29813
SHA13e2d3cd4ece4eb132b2268c486cd219023e08178
SHA256d9448c070fc333fa3dd8126574f1d721a6e44dbef262fc81443f7202b1a702d6
SHA51215eb6e7679200ace1147216337d8d4443d00ef338834bd967fc460d58ffd0053e0be563d68fee9489f1ad9fa969788f208cceb73d7491676a4abbd2f518491fa
-
C:\Users\Admin\AppData\Local\Temp\4m36M2Z1mMZn.batFilesize
207B
MD5efeedd77525e6dc0f8e238fd66b07a24
SHA1e0ec5533c6386e7a220703b16c196127892c2401
SHA256d40eff7bd0b737a1abfaeb1923fdb2693cea990d0cc7f756076fb4e152c86c7d
SHA512cdeb40cf74393ceea073a199bedc288d94deae0ac4ef7c7a580bdf056a1904678065862c3e7420451e38a949877253af2259eef55e988d27a4b07ee825c847ed
-
C:\Users\Admin\AppData\Local\Temp\FZbpomZhvPPb.batFilesize
207B
MD5ab375664a60ed4220c5a1ee08fa23853
SHA13936fe2c2d4b81099f2fed0c910f55685f11f0c0
SHA2562ade7163e267d4e920081cc7568dfdb9dd95e27be069021adb23d73ff1269b9a
SHA512f4fd3a42456687994772df29c7c6ec8f3e94545d99ade17862d2971bd4d6669c2104c4a8ebb29b5e90f7a9a0d229978eb844e8212c7988868f93e2263b7ca4b4
-
C:\Users\Admin\AppData\Local\Temp\GCFhHqSiCAk2.batFilesize
207B
MD56d09e018e667eefc7bd5a64b37a30580
SHA1c21d1d3c883617c80301e2de71e83f0eaa8612a0
SHA256e53cf16ae5aae848ff111df60ee4bd8a311825fc85a9b4f307257af5d247c4c7
SHA512fc4fa3bc4b126bffbc336f9448f25ba7dee298023ef9bafd1d3253e92fd0f4bdcce274ce400073f171e381b5ff0d2be5182275c815f70738fde1a806da68da71
-
C:\Users\Admin\AppData\Local\Temp\HiHP9q4DldIs.batFilesize
207B
MD5b9143203b7a94e70059c4650d7b961ff
SHA12b1828515498e4c1aa0712cc9c338f694d5ed287
SHA256cc14604273eccba273ada750ffa27efe4e446173f11a5bb30eb1cadb54b0f9c0
SHA51267f4d6197e9d85b604c9886e52c6e9689ee5b4918617ba349bdc055156a6555862c33c76a293cb347919de3dc6f92f2dd41b75505111be7e63e82d2ea4d6aa86
-
C:\Users\Admin\AppData\Local\Temp\Hlilub8nAstZ.batFilesize
207B
MD549a929be6d01a71c95420526e383a239
SHA157b15788fb714ca950d675e22de0691419c99346
SHA25644883eb735cb305f055a9a55aed3a3dc45d6b649f4283eefff23d7837c8ca9ea
SHA5121b6e75a75865bc8502204c35b0860a585d1c7fa8305942cf65fe841571035f2e1fe03ab5b6520fb2ce607c254e4e97483b4e8276612db7456517579e23b7782e
-
C:\Users\Admin\AppData\Local\Temp\M5ePEiByM3aq.batFilesize
207B
MD54e4c6309618f709e031d456241fd89d2
SHA1eee1bf97af82ad8d85d8aa1af4db7eb87bf8e510
SHA25691402e6e4354ebd916c155001c6513cc6cba41378686114c8be36abe7026a982
SHA51275870d14ebf603f17de287bda2a8addfae2ec963b18ad7ca7205eb65dc0b0a6c317d10c3399e1bfde66fe5a7e28264294d2be246070f837f7e88635626eea444
-
C:\Users\Admin\AppData\Local\Temp\Nl6QJzComgFo.batFilesize
207B
MD5fca918401b9f049ba5b5d4539bbb417f
SHA12cdeb9d54acc29a51a98f4bc859673c5ec786879
SHA256684e02e766fa1f723388f802c7f5a15df9258467c5abcab7a483457f681220ad
SHA51229acf29a6cccda64ce38f2d6dab7697d765cc14306c46e54e2f79f1a12f7def33d7fc192c12a684e1619872334adab6e93840c5b05e6a66279e65138a1b829e7
-
C:\Users\Admin\AppData\Local\Temp\OzIp5HZHr4xq.batFilesize
207B
MD55af9c3c41e8ff492d6967f90a3429727
SHA17ebf7cb9d8e57f1475fad7793eee917cbc90a7e3
SHA256817c34dee11e6406da886c6658cf33c5eac072027584f28407cdbcabc5b27455
SHA5128575c3ac705e409c6a3fc0a2156b3cdae9d55c04f09354991ff1829b9f52b85c85806ebf47de20cfe4dfe74bee261c652fef0a8915bf93f7b400c90e0169e06f
-
C:\Users\Admin\AppData\Local\Temp\PozcmBAV8PBm.batFilesize
207B
MD5e64dc0d308f49c9746a53536f216d484
SHA1a979f38bae858aac53fced9d2668f9ca49b2f226
SHA256877209995443d0994fd92680a97ada36901446db9da8ce7635ea4733be9fa5a5
SHA512c53f6d0cd860a59cec32b5128973b7ac6b78c231c8897101574b9409e460097a5fefbe412d91f3ef4693805fa13b5f516aab5caf8154c2acb4db29b56f5f8907
-
C:\Users\Admin\AppData\Local\Temp\V4htZBOODClq.batFilesize
207B
MD56306f88530c2bcc5355f19de5bfc8a0e
SHA1e9ceb1b3159ec84b4d47128ed6409d1e6e16f9b9
SHA256e4182c7d1cc063320e2e610a3bc03abbb5c901fe50ee45a846eb764972e71512
SHA512ec2ab80a3902e32b2e50b3c8013439f1b9bd10a9e7ad38eb5aa9d324d974fd2bf57c1d6ba0df43043de1d5e952c030421d3f3a2d42a2671d947cd64db37a1b20
-
C:\Users\Admin\AppData\Local\Temp\emFCwOdzcvAu.batFilesize
207B
MD5dc657d0e12fa97a9bd389305984727ff
SHA1d9c29791a8a95e870480565f3f84b1dc5e166ea2
SHA256629b973c02c0137e70e63c98216ceab6a40a4fdb8337e3aa14dee8e67f7f06dc
SHA51214d25ea8b5c5b0cef6125eb8647035d133f59c9dde73520103623f305219256e7bd3a176ebbafdf6f3ccd3d71ad3b9aa30e9e5828531ff47e6d7bca1a42a6ebc
-
C:\Users\Admin\AppData\Local\Temp\jcbmotgsFrhf.batFilesize
207B
MD50ef6e6deff68a032928ba6748adb85e9
SHA1be822e4060644b3d9cf39d01603798b4d937dc6b
SHA256d37efaf5e3c9165b94b5e50de5e18c2f7fb3e277a08a951037c7e180412a4b71
SHA5122b4f6270c4643b9db1321dd72bbc4a66466b66f982f6850e0d4e2648b6af4200113370d0efcbff0388da93c399ba069af723c0d31978c6e9d538733d4730ce0c
-
C:\Users\Admin\AppData\Local\Temp\oYxT7IwF29rX.batFilesize
207B
MD5c5fc4891488e0462a6233c335b537efb
SHA1b54f22b65639211187c25df76e6ac999fc57e8aa
SHA2563f69f79ebb97bb35b80648357675d44a6982ef7ca8056193134cfefe2058e71c
SHA512aa85efba16c0615209cd0215c02ffcbd1172019f506a602aedd6962521565a1f5b995f452acb9854620dd1d9544bb55eee6788513747c9cc7f9e726d0bc4af4f
-
C:\Users\Admin\AppData\Local\Temp\qdVsaXL6OXkx.batFilesize
207B
MD50d1ab47590f02eda93302a5d49102fe1
SHA1f022bea6f3e8ca06a62b9cef16ef3eef1e6807f8
SHA256ae94f8017f6a2616f668baf1c46b0cc6f1f8ea13c648e78d9bfab66b480d1144
SHA512e417afb7f802122e175f8d841f6f786bcf5f4250ece6d89a6246558ccd1b3eae1898d3cca17b1fe9f9b37f75f2b64afefe9924d2ebc10e07ad9052f636c85a69
-
C:\Users\Admin\AppData\Local\Temp\t13DzzvAF4Ff.batFilesize
207B
MD529c5603a7d30cf7dd4322e5fdd5c21af
SHA12bb92c03243452d614118a05f9292fb7e5f02865
SHA256bb2c135044430d9aa28d02f977b7e4ccfdbdee990c739bc793d6fe16b6dcd979
SHA512cbfc1157d013f120d6eb6459a593b87c0bef6963f60ce209d929083bcb4cac49e340a7b9b6bb6c4a3d086e5f84aa102abe49b1ab44e029703718919ec2e110fd
-
C:\Users\Admin\AppData\Local\Temp\vlqiAuMgekVd.batFilesize
207B
MD535bd1f23e9d160e6e6bc7d46065b2738
SHA1048aa85a77ed0b11b2b827d9b72b6dbe0ed605ea
SHA2563b6952074332f0ce29d11d031172493542bc14e4fa29829447456e33af235e01
SHA5128fe3613990257f5ed2158042240704abdc8756635a03b3ccb02c7cea657193604c39ea4b32a7a8ff3d26f70fe938923beaab3de5d1e0362f244ac8b1fc710123
-
C:\Users\Admin\AppData\Local\Temp\vre62msT7ETw.batFilesize
207B
MD52c4e01469abcda3d2f8be3c975b2c1b1
SHA1dbac3b3509e562b4482cce37a88e58696827fc1f
SHA256e45116ddad3bb62cd63281107448497f08ddbe244758d17786023a73a1eea6bb
SHA512f729237e0192c32d03e57810540e9735db2dc1cd77ec34581f7f82b57950db5e9ec26af228a49bb902e05caf7746811c28e1edd3a9976b6ecf5f0df4814fe872
-
C:\Users\Admin\AppData\Local\Temp\zFEEO6QYVRFN.batFilesize
207B
MD58a1864eb27efc2adc9cb8385c1a5aa59
SHA1086d5c385874d69d61efd52f12e982014b4e554f
SHA256b85d2a8714c8e0692720a3fb888e2b9b7bae647167977489808d821c403fcc08
SHA512ee545f5cfd56ea8efd79973631e48f933eab7d26281d25dbef6164d78c98486ef089ab355353d6a211b35f81b0c74ef9bce200f0d7ff8114b0b09811ea26cf2b
-
C:\Users\Admin\AppData\Local\Temp\zTynRwtudKc6.batFilesize
207B
MD54a63a7b087ed3ea15718b44f8f8475e2
SHA12ebda307786dce19fb19bbf9c6214a0e2ef5c753
SHA2569f0eca872ae9980301fd4c1d3269859085fac871fc392b3887559d3e4226f784
SHA5120f75e46bdc7845c9ee85a056cb9729421e7ae1099f472dc33c12ff56940a0660213f8ff7bcedf6f38c7918b2607388b34e64d28eb105b2138e0c3b1ebcba7538
-
C:\Users\Admin\AppData\Roaming\Logs\06-10-2024Filesize
224B
MD53a7047bd951b00ab9ba6b39a254caebf
SHA1eeadbb7f4396e5fa78b9225099598e218343a50c
SHA256d4cb9bb0b85f4356a2d90183c442417b32c00d7c7353ed535aec3afbfd2be9ff
SHA5127f1ee761724c41398777b878bd8334433079a35c69b00278ff48fb934e45ae009ab6b951b4d1631b1c8a9c9ce7ab739434720e59d44d1178d8c9ac86be0c5ea4
-
C:\Users\Admin\AppData\Roaming\Logs\06-10-2024Filesize
224B
MD5c4566ab89d31392e169628fb8a987849
SHA1b007fec9df9021233be72d64444c9b25afe34496
SHA256b65407b4595fb697e5a38c7e79c542fa420bc720845333634f1aa08ba419e409
SHA51254ef09441e472cdfb7a520d52d57dfbee113786783e432eb349286181becf04fe4d30808b343a7286d7735e9910cbde98320fc03d27720d6296a5f227492a034
-
C:\Users\Admin\AppData\Roaming\Logs\06-10-2024Filesize
224B
MD5321870357b60a07522d740f19e27eccd
SHA176d98f5287370996167811da5fcc7c66b65718f4
SHA25677ea09e17fd694e7a9ca34bdf6846345279061e1f542818097a9b9bcf504de6a
SHA512f46b869b7211c99cd9680bf9051766ac4142a1c45bf3f884b48a57ae770ff8cd1fce11c8b4411a1f93209dc23a0e0baf7d6cea24a6ccb110022857c2c5562a22
-
C:\Users\Admin\AppData\Roaming\Logs\06-10-2024Filesize
224B
MD5c596a1eab6332042a1d9da06b1b06628
SHA1f98b118ec4fef947f1c7b9f84a8890191a11afe1
SHA256461a716b8327911d9c9059c4befe4dcd544e933092e5139e7955afb140b91ebc
SHA512137d3631bbc5ec1cdf164d4d5827f36182a8ecd026928723b344ff473cd1f49c228109cdb6581fbb884bd2e7ed2f7a240ef5e2cde20ee5d4cec841e62a78ef8c
-
C:\Users\Admin\AppData\Roaming\Logs\06-10-2024Filesize
224B
MD55d9e080fb1138db67ed322023e1269c8
SHA1a7bcc37301c71b2de902f17cb52d8f6e8df4d4a7
SHA256a2741e53b851ed3744981cbf74cff1a01e499b96f2057e2f83e84cbf21bbac38
SHA512681fe5829bcf07771a2f415d6dd07b02043395c5a19cff112eba812e5d790797bd114f94bbdf933d397cd16067b7b9461ef4a6a5194da5b357d808b037d9b454
-
C:\Users\Admin\AppData\Roaming\Logs\06-10-2024MD5
d41d8cd98f00b204e9800998ecf8427e
SHA1da39a3ee5e6b4b0d3255bfef95601890afd80709
SHA256e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855
SHA512cf83e1357eefb8bdf1542850d66d8007d620e4050b5715dc83f4a921d36ce9ce47d0d13c5d85f2b0ff8318d2877eec2f63b931bd47417a81a538327af927da3e
-
C:\Users\Admin\AppData\Roaming\SubDir\Client.exeFilesize
409KB
MD5b70fdac25a99501e3cae11f1b775249e
SHA13c59226479bfdcd1b2927bcfb1a7516d4cb8dd71
SHA25651ff3eb450a786c1aaa75ff889f2fd256412a7b75d04277fdf9fcccc20e57246
SHA51243f0d5d6e5f0d5febba537c109ffdbc250bbb6e9725e635a43ec975b0353048eaeee50b6e9274cd5e072ea6b0cea32439bd37408b2528832f467f2075f74ca44
-
memory/1820-4-0x0000000074770000-0x0000000074F20000-memory.dmpFilesize
7.7MB
-
memory/1820-0-0x000000007477E000-0x000000007477F000-memory.dmpFilesize
4KB
-
memory/1820-7-0x000000007477E000-0x000000007477F000-memory.dmpFilesize
4KB
-
memory/1820-6-0x0000000006790000-0x00000000067A2000-memory.dmpFilesize
72KB
-
memory/1820-5-0x0000000005910000-0x0000000005976000-memory.dmpFilesize
408KB
-
memory/1820-1-0x0000000000FF0000-0x000000000105C000-memory.dmpFilesize
432KB
-
memory/1820-2-0x0000000005F60000-0x0000000006504000-memory.dmpFilesize
5.6MB
-
memory/1820-8-0x0000000074770000-0x0000000074F20000-memory.dmpFilesize
7.7MB
-
memory/1820-3-0x00000000059B0000-0x0000000005A42000-memory.dmpFilesize
584KB
-
memory/1820-16-0x0000000074770000-0x0000000074F20000-memory.dmpFilesize
7.7MB
-
memory/3604-14-0x0000000074770000-0x0000000074F20000-memory.dmpFilesize
7.7MB
-
memory/3604-17-0x0000000074770000-0x0000000074F20000-memory.dmpFilesize
7.7MB
-
memory/3604-24-0x0000000074770000-0x0000000074F20000-memory.dmpFilesize
7.7MB
-
memory/3604-19-0x0000000006550000-0x000000000655A000-memory.dmpFilesize
40KB