Overview
overview
10Static
static
10uni/Uni - ...py.exe
windows7-x64
10uni/Uni - ...py.exe
windows10-2004-x64
10uni/Uni - ...py.exe
windows7-x64
10uni/Uni - ...py.exe
windows10-2004-x64
10uni/Uni - ...py.exe
windows7-x64
10uni/Uni - ...py.exe
windows10-2004-x64
10uni/Uni - ...py.exe
windows7-x64
10uni/Uni - ...py.exe
windows10-2004-x64
10uni/Uni - ...py.exe
windows7-x64
10uni/Uni - ...py.exe
windows10-2004-x64
10uni/Uni - ...py.exe
windows7-x64
10uni/Uni - ...py.exe
windows10-2004-x64
10uni/Uni - ...py.exe
windows7-x64
10uni/Uni - ...py.exe
windows10-2004-x64
10uni/Uni - ...py.exe
windows7-x64
10uni/Uni - ...py.exe
windows10-2004-x64
10uni/Uni - ...py.exe
windows7-x64
10uni/Uni - ...py.exe
windows10-2004-x64
10uni/Uni - ...py.exe
windows7-x64
10uni/Uni - ...py.exe
windows10-2004-x64
10uni/Uni - ...py.exe
windows7-x64
10uni/Uni - ...py.exe
windows10-2004-x64
10uni/Uni - ...py.exe
windows7-x64
10uni/Uni - ...py.exe
windows10-2004-x64
10uni/Uni - ...py.exe
windows7-x64
10uni/Uni - ...py.exe
windows10-2004-x64
10uni/Uni - ...py.exe
windows7-x64
10uni/Uni - ...py.exe
windows10-2004-x64
10uni/Uni - ...py.exe
windows7-x64
10uni/Uni - ...py.exe
windows10-2004-x64
10uni/Uni - ...py.exe
windows7-x64
10uni/Uni - ...py.exe
windows10-2004-x64
10Analysis
-
max time kernel
598s -
max time network
602s -
platform
windows10-2004_x64 -
resource
win10v2004-20240508-en -
resource tags
arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system -
submitted
10-06-2024 15:28
Behavioral task
behavioral1
Sample
uni/Uni - Copy (10) - Copy - Copy - Copy.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
uni/Uni - Copy (10) - Copy - Copy - Copy.exe
Resource
win10v2004-20240426-en
Behavioral task
behavioral3
Sample
uni/Uni - Copy (10) - Copy - Copy.exe
Resource
win7-20240221-en
Behavioral task
behavioral4
Sample
uni/Uni - Copy (10) - Copy - Copy.exe
Resource
win10v2004-20240426-en
Behavioral task
behavioral5
Sample
uni/Uni - Copy (10) - Copy.exe
Resource
win7-20240220-en
Behavioral task
behavioral6
Sample
uni/Uni - Copy (10) - Copy.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral7
Sample
uni/Uni - Copy (11) - Copy - Copy - Copy.exe
Resource
win7-20231129-en
Behavioral task
behavioral8
Sample
uni/Uni - Copy (11) - Copy - Copy - Copy.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral9
Sample
uni/Uni - Copy (11) - Copy - Copy.exe
Resource
win7-20240508-en
Behavioral task
behavioral10
Sample
uni/Uni - Copy (11) - Copy - Copy.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral11
Sample
uni/Uni - Copy (11) - Copy.exe
Resource
win7-20240221-en
Behavioral task
behavioral12
Sample
uni/Uni - Copy (11) - Copy.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral13
Sample
uni/Uni - Copy (12) - Copy - Copy - Copy.exe
Resource
win7-20240508-en
Behavioral task
behavioral14
Sample
uni/Uni - Copy (12) - Copy - Copy - Copy.exe
Resource
win10v2004-20240426-en
Behavioral task
behavioral15
Sample
uni/Uni - Copy (12) - Copy - Copy.exe
Resource
win7-20240508-en
Behavioral task
behavioral16
Sample
uni/Uni - Copy (12) - Copy - Copy.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral17
Sample
uni/Uni - Copy (12) - Copy.exe
Resource
win7-20240221-en
Behavioral task
behavioral18
Sample
uni/Uni - Copy (12) - Copy.exe
Resource
win10v2004-20240426-en
Behavioral task
behavioral19
Sample
uni/Uni - Copy (13) - Copy - Copy - Copy.exe
Resource
win7-20240419-en
Behavioral task
behavioral20
Sample
uni/Uni - Copy (13) - Copy - Copy - Copy.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral21
Sample
uni/Uni - Copy (13) - Copy - Copy.exe
Resource
win7-20240508-en
Behavioral task
behavioral22
Sample
uni/Uni - Copy (13) - Copy - Copy.exe
Resource
win10v2004-20240426-en
Behavioral task
behavioral23
Sample
uni/Uni - Copy (13) - Copy.exe
Resource
win7-20240419-en
Behavioral task
behavioral24
Sample
uni/Uni - Copy (13) - Copy.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral25
Sample
uni/Uni - Copy (14) - Copy - Copy - Copy.exe
Resource
win7-20240221-en
Behavioral task
behavioral26
Sample
uni/Uni - Copy (14) - Copy - Copy - Copy.exe
Resource
win10v2004-20240426-en
Behavioral task
behavioral27
Sample
uni/Uni - Copy (14) - Copy - Copy.exe
Resource
win7-20240508-en
Behavioral task
behavioral28
Sample
uni/Uni - Copy (14) - Copy - Copy.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral29
Sample
uni/Uni - Copy (14) - Copy.exe
Resource
win7-20231129-en
Behavioral task
behavioral30
Sample
uni/Uni - Copy (14) - Copy.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral31
Sample
uni/Uni - Copy (15) - Copy - Copy - Copy.exe
Resource
win7-20240508-en
Behavioral task
behavioral32
Sample
uni/Uni - Copy (15) - Copy - Copy - Copy.exe
Resource
win10v2004-20240508-en
General
-
Target
uni/Uni - Copy (11) - Copy.exe
-
Size
409KB
-
MD5
b70fdac25a99501e3cae11f1b775249e
-
SHA1
3c59226479bfdcd1b2927bcfb1a7516d4cb8dd71
-
SHA256
51ff3eb450a786c1aaa75ff889f2fd256412a7b75d04277fdf9fcccc20e57246
-
SHA512
43f0d5d6e5f0d5febba537c109ffdbc250bbb6e9725e635a43ec975b0353048eaeee50b6e9274cd5e072ea6b0cea32439bd37408b2528832f467f2075f74ca44
-
SSDEEP
12288:gpbJjGut6AoE3hVVdFaC/eZPTMTDlpgfJCKuMsVs:oVaurMLcDlpRKai
Malware Config
Extracted
quasar
3.1.5
SeroXen
panel-slave.gl.at.ply.gg:57059
panel-slave.gl.at.ply.gg:27892
$Sxr-rpL8EItHN3pqIQQVy2
-
encryption_key
Lme7VBS3l58VwLM69PNM
-
install_name
Client.exe
-
log_directory
Logs
-
reconnect_delay
3000
-
startup_key
SeroXen
-
subdirectory
SubDir
Signatures
-
Quasar payload 2 IoCs
Processes:
resource yara_rule behavioral12/memory/1296-1-0x0000000000040000-0x00000000000AC000-memory.dmp family_quasar C:\Users\Admin\AppData\Roaming\SubDir\Client.exe family_quasar -
Checks computer location settings 2 TTPs 28 IoCs
Looks up country code configured in the registry, likely geofence.
Processes:
Client.exeClient.exeClient.exeClient.exeClient.exeClient.exeClient.exeClient.exeClient.exeClient.exeClient.exeClient.exeClient.exeClient.exeClient.exeClient.exeClient.exeClient.exeClient.exeClient.exeClient.exeClient.exeClient.exeClient.exeClient.exeClient.exeClient.exeClient.exedescription ioc process Key value queried \REGISTRY\USER\S-1-5-21-1181767204-2009306918-3718769404-1000\Control Panel\International\Geo\Nation Client.exe Key value queried \REGISTRY\USER\S-1-5-21-1181767204-2009306918-3718769404-1000\Control Panel\International\Geo\Nation Client.exe Key value queried \REGISTRY\USER\S-1-5-21-1181767204-2009306918-3718769404-1000\Control Panel\International\Geo\Nation Client.exe Key value queried \REGISTRY\USER\S-1-5-21-1181767204-2009306918-3718769404-1000\Control Panel\International\Geo\Nation Client.exe Key value queried \REGISTRY\USER\S-1-5-21-1181767204-2009306918-3718769404-1000\Control Panel\International\Geo\Nation Client.exe Key value queried \REGISTRY\USER\S-1-5-21-1181767204-2009306918-3718769404-1000\Control Panel\International\Geo\Nation Client.exe Key value queried \REGISTRY\USER\S-1-5-21-1181767204-2009306918-3718769404-1000\Control Panel\International\Geo\Nation Client.exe Key value queried \REGISTRY\USER\S-1-5-21-1181767204-2009306918-3718769404-1000\Control Panel\International\Geo\Nation Client.exe Key value queried \REGISTRY\USER\S-1-5-21-1181767204-2009306918-3718769404-1000\Control Panel\International\Geo\Nation Client.exe Key value queried \REGISTRY\USER\S-1-5-21-1181767204-2009306918-3718769404-1000\Control Panel\International\Geo\Nation Client.exe Key value queried \REGISTRY\USER\S-1-5-21-1181767204-2009306918-3718769404-1000\Control Panel\International\Geo\Nation Client.exe Key value queried \REGISTRY\USER\S-1-5-21-1181767204-2009306918-3718769404-1000\Control Panel\International\Geo\Nation Client.exe Key value queried \REGISTRY\USER\S-1-5-21-1181767204-2009306918-3718769404-1000\Control Panel\International\Geo\Nation Client.exe Key value queried \REGISTRY\USER\S-1-5-21-1181767204-2009306918-3718769404-1000\Control Panel\International\Geo\Nation Client.exe Key value queried \REGISTRY\USER\S-1-5-21-1181767204-2009306918-3718769404-1000\Control Panel\International\Geo\Nation Client.exe Key value queried \REGISTRY\USER\S-1-5-21-1181767204-2009306918-3718769404-1000\Control Panel\International\Geo\Nation Client.exe Key value queried \REGISTRY\USER\S-1-5-21-1181767204-2009306918-3718769404-1000\Control Panel\International\Geo\Nation Client.exe Key value queried \REGISTRY\USER\S-1-5-21-1181767204-2009306918-3718769404-1000\Control Panel\International\Geo\Nation Client.exe Key value queried \REGISTRY\USER\S-1-5-21-1181767204-2009306918-3718769404-1000\Control Panel\International\Geo\Nation Client.exe Key value queried \REGISTRY\USER\S-1-5-21-1181767204-2009306918-3718769404-1000\Control Panel\International\Geo\Nation Client.exe Key value queried \REGISTRY\USER\S-1-5-21-1181767204-2009306918-3718769404-1000\Control Panel\International\Geo\Nation Client.exe Key value queried \REGISTRY\USER\S-1-5-21-1181767204-2009306918-3718769404-1000\Control Panel\International\Geo\Nation Client.exe Key value queried \REGISTRY\USER\S-1-5-21-1181767204-2009306918-3718769404-1000\Control Panel\International\Geo\Nation Client.exe Key value queried \REGISTRY\USER\S-1-5-21-1181767204-2009306918-3718769404-1000\Control Panel\International\Geo\Nation Client.exe Key value queried \REGISTRY\USER\S-1-5-21-1181767204-2009306918-3718769404-1000\Control Panel\International\Geo\Nation Client.exe Key value queried \REGISTRY\USER\S-1-5-21-1181767204-2009306918-3718769404-1000\Control Panel\International\Geo\Nation Client.exe Key value queried \REGISTRY\USER\S-1-5-21-1181767204-2009306918-3718769404-1000\Control Panel\International\Geo\Nation Client.exe Key value queried \REGISTRY\USER\S-1-5-21-1181767204-2009306918-3718769404-1000\Control Panel\International\Geo\Nation Client.exe -
Executes dropped EXE 29 IoCs
Processes:
Client.exeClient.exeClient.exeClient.exeClient.exeClient.exeClient.exeClient.exeClient.exeClient.exeClient.exeClient.exeClient.exeClient.exeClient.exeClient.exeClient.exeClient.exeClient.exeClient.exeClient.exeClient.exeClient.exeClient.exeClient.exeClient.exeClient.exeClient.exeClient.exepid process 5008 Client.exe 4916 Client.exe 1692 Client.exe 848 Client.exe 2876 Client.exe 3408 Client.exe 5092 Client.exe 1120 Client.exe 4964 Client.exe 392 Client.exe 4124 Client.exe 4088 Client.exe 1372 Client.exe 3620 Client.exe 3444 Client.exe 3752 Client.exe 4636 Client.exe 828 Client.exe 3484 Client.exe 1700 Client.exe 4432 Client.exe 4964 Client.exe 916 Client.exe 4700 Client.exe 1648 Client.exe 3020 Client.exe 3408 Client.exe 4784 Client.exe 4960 Client.exe -
Looks up external IP address via web service 26 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
Processes:
flow ioc 45 ip-api.com 55 ip-api.com 61 ip-api.com 79 ip-api.com 88 ip-api.com 11 api.ipify.org 36 ip-api.com 40 ip-api.com 90 ip-api.com 52 ip-api.com 64 ip-api.com 43 ip-api.com 82 ip-api.com 20 ip-api.com 34 ip-api.com 58 ip-api.com 76 ip-api.com 16 ip-api.com 38 ip-api.com 49 ip-api.com 27 ip-api.com 47 ip-api.com 84 ip-api.com 86 ip-api.com 3 ip-api.com 18 ip-api.com -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Program crash 28 IoCs
Processes:
WerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exepid pid_target process target process 1648 5008 WerFault.exe Client.exe 1984 4916 WerFault.exe Client.exe 2176 1692 WerFault.exe Client.exe 4324 848 WerFault.exe Client.exe 2868 2876 WerFault.exe Client.exe 4140 3408 WerFault.exe Client.exe 3956 5092 WerFault.exe Client.exe 3972 1120 WerFault.exe Client.exe 1316 4964 WerFault.exe Client.exe 884 392 WerFault.exe Client.exe 1324 4124 WerFault.exe Client.exe 4724 4088 WerFault.exe Client.exe 2684 1372 WerFault.exe Client.exe 3964 3620 WerFault.exe Client.exe 3808 3444 WerFault.exe Client.exe 4516 3752 WerFault.exe Client.exe 3940 4636 WerFault.exe Client.exe 2864 828 WerFault.exe Client.exe 3132 3484 WerFault.exe Client.exe 2388 1700 WerFault.exe Client.exe 3020 4432 WerFault.exe Client.exe 3936 4964 WerFault.exe Client.exe 4556 916 WerFault.exe Client.exe 2996 4700 WerFault.exe Client.exe 852 1648 WerFault.exe Client.exe 436 3020 WerFault.exe Client.exe 3616 3408 WerFault.exe Client.exe 4944 4784 WerFault.exe Client.exe -
Creates scheduled task(s) 1 TTPs 30 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
Processes:
schtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeSCHTASKS.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exepid process 4524 schtasks.exe 1068 schtasks.exe 4260 schtasks.exe 4696 schtasks.exe 404 schtasks.exe 3096 schtasks.exe 984 schtasks.exe 1148 schtasks.exe 2196 schtasks.exe 984 schtasks.exe 4860 schtasks.exe 4128 schtasks.exe 4208 schtasks.exe 4968 schtasks.exe 2124 schtasks.exe 3864 schtasks.exe 2172 schtasks.exe 3608 schtasks.exe 2076 schtasks.exe 5052 schtasks.exe 1832 schtasks.exe 1996 SCHTASKS.exe 3976 schtasks.exe 428 schtasks.exe 1596 schtasks.exe 3440 schtasks.exe 3672 schtasks.exe 1996 schtasks.exe 4960 schtasks.exe 4740 schtasks.exe -
Runs ping.exe 1 TTPs 28 IoCs
Processes:
PING.EXEPING.EXEPING.EXEPING.EXEPING.EXEPING.EXEPING.EXEPING.EXEPING.EXEPING.EXEPING.EXEPING.EXEPING.EXEPING.EXEPING.EXEPING.EXEPING.EXEPING.EXEPING.EXEPING.EXEPING.EXEPING.EXEPING.EXEPING.EXEPING.EXEPING.EXEPING.EXEPING.EXEpid process 3780 PING.EXE 3196 PING.EXE 1596 PING.EXE 4860 PING.EXE 988 PING.EXE 1388 PING.EXE 4264 PING.EXE 3872 PING.EXE 4208 PING.EXE 4600 PING.EXE 4348 PING.EXE 3244 PING.EXE 3148 PING.EXE 3376 PING.EXE 1860 PING.EXE 2548 PING.EXE 4088 PING.EXE 220 PING.EXE 4848 PING.EXE 3620 PING.EXE 404 PING.EXE 3244 PING.EXE 2076 PING.EXE 916 PING.EXE 4144 PING.EXE 4476 PING.EXE 3544 PING.EXE 3968 PING.EXE -
Suspicious use of AdjustPrivilegeToken 30 IoCs
Processes:
Uni - Copy (11) - Copy.exeClient.exeClient.exeClient.exeClient.exeClient.exeClient.exeClient.exeClient.exeClient.exeClient.exeClient.exeClient.exeClient.exeClient.exeClient.exeClient.exeClient.exeClient.exeClient.exeClient.exeClient.exeClient.exeClient.exeClient.exeClient.exeClient.exeClient.exeClient.exeClient.exedescription pid process Token: SeDebugPrivilege 1296 Uni - Copy (11) - Copy.exe Token: SeDebugPrivilege 5008 Client.exe Token: SeDebugPrivilege 4916 Client.exe Token: SeDebugPrivilege 1692 Client.exe Token: SeDebugPrivilege 848 Client.exe Token: SeDebugPrivilege 2876 Client.exe Token: SeDebugPrivilege 3408 Client.exe Token: SeDebugPrivilege 5092 Client.exe Token: SeDebugPrivilege 1120 Client.exe Token: SeDebugPrivilege 4964 Client.exe Token: SeDebugPrivilege 392 Client.exe Token: SeDebugPrivilege 4124 Client.exe Token: SeDebugPrivilege 4088 Client.exe Token: SeDebugPrivilege 1372 Client.exe Token: SeDebugPrivilege 3620 Client.exe Token: SeDebugPrivilege 3444 Client.exe Token: SeDebugPrivilege 3752 Client.exe Token: SeDebugPrivilege 4636 Client.exe Token: SeDebugPrivilege 828 Client.exe Token: SeDebugPrivilege 3484 Client.exe Token: SeDebugPrivilege 1700 Client.exe Token: SeDebugPrivilege 4432 Client.exe Token: SeDebugPrivilege 4964 Client.exe Token: SeDebugPrivilege 916 Client.exe Token: SeDebugPrivilege 4700 Client.exe Token: SeDebugPrivilege 1648 Client.exe Token: SeDebugPrivilege 3020 Client.exe Token: SeDebugPrivilege 3408 Client.exe Token: SeDebugPrivilege 4784 Client.exe Token: SeDebugPrivilege 4960 Client.exe -
Suspicious use of SetWindowsHookEx 28 IoCs
Processes:
Client.exeClient.exeClient.exeClient.exeClient.exeClient.exeClient.exeClient.exeClient.exeClient.exeClient.exeClient.exeClient.exeClient.exeClient.exeClient.exeClient.exeClient.exeClient.exeClient.exeClient.exeClient.exeClient.exeClient.exeClient.exeClient.exeClient.exeClient.exepid process 5008 Client.exe 4916 Client.exe 1692 Client.exe 848 Client.exe 2876 Client.exe 3408 Client.exe 5092 Client.exe 1120 Client.exe 4964 Client.exe 392 Client.exe 4124 Client.exe 4088 Client.exe 1372 Client.exe 3620 Client.exe 3444 Client.exe 3752 Client.exe 4636 Client.exe 828 Client.exe 3484 Client.exe 1700 Client.exe 4432 Client.exe 4964 Client.exe 916 Client.exe 4700 Client.exe 1648 Client.exe 3020 Client.exe 3408 Client.exe 4784 Client.exe -
Suspicious use of WriteProcessMemory 64 IoCs
Processes:
Uni - Copy (11) - Copy.exeClient.execmd.exeClient.execmd.exeClient.execmd.exeClient.execmd.exedescription pid process target process PID 1296 wrote to memory of 4128 1296 Uni - Copy (11) - Copy.exe schtasks.exe PID 1296 wrote to memory of 4128 1296 Uni - Copy (11) - Copy.exe schtasks.exe PID 1296 wrote to memory of 4128 1296 Uni - Copy (11) - Copy.exe schtasks.exe PID 1296 wrote to memory of 5008 1296 Uni - Copy (11) - Copy.exe Client.exe PID 1296 wrote to memory of 5008 1296 Uni - Copy (11) - Copy.exe Client.exe PID 1296 wrote to memory of 5008 1296 Uni - Copy (11) - Copy.exe Client.exe PID 1296 wrote to memory of 1996 1296 Uni - Copy (11) - Copy.exe SCHTASKS.exe PID 1296 wrote to memory of 1996 1296 Uni - Copy (11) - Copy.exe SCHTASKS.exe PID 1296 wrote to memory of 1996 1296 Uni - Copy (11) - Copy.exe SCHTASKS.exe PID 5008 wrote to memory of 984 5008 Client.exe schtasks.exe PID 5008 wrote to memory of 984 5008 Client.exe schtasks.exe PID 5008 wrote to memory of 984 5008 Client.exe schtasks.exe PID 5008 wrote to memory of 4972 5008 Client.exe cmd.exe PID 5008 wrote to memory of 4972 5008 Client.exe cmd.exe PID 5008 wrote to memory of 4972 5008 Client.exe cmd.exe PID 4972 wrote to memory of 4596 4972 cmd.exe chcp.com PID 4972 wrote to memory of 4596 4972 cmd.exe chcp.com PID 4972 wrote to memory of 4596 4972 cmd.exe chcp.com PID 4972 wrote to memory of 3544 4972 cmd.exe PING.EXE PID 4972 wrote to memory of 3544 4972 cmd.exe PING.EXE PID 4972 wrote to memory of 3544 4972 cmd.exe PING.EXE PID 4972 wrote to memory of 4916 4972 cmd.exe Client.exe PID 4972 wrote to memory of 4916 4972 cmd.exe Client.exe PID 4972 wrote to memory of 4916 4972 cmd.exe Client.exe PID 4916 wrote to memory of 3976 4916 Client.exe schtasks.exe PID 4916 wrote to memory of 3976 4916 Client.exe schtasks.exe PID 4916 wrote to memory of 3976 4916 Client.exe schtasks.exe PID 4916 wrote to memory of 4964 4916 Client.exe cmd.exe PID 4916 wrote to memory of 4964 4916 Client.exe cmd.exe PID 4916 wrote to memory of 4964 4916 Client.exe cmd.exe PID 4964 wrote to memory of 4336 4964 cmd.exe chcp.com PID 4964 wrote to memory of 4336 4964 cmd.exe chcp.com PID 4964 wrote to memory of 4336 4964 cmd.exe chcp.com PID 4964 wrote to memory of 4600 4964 cmd.exe PING.EXE PID 4964 wrote to memory of 4600 4964 cmd.exe PING.EXE PID 4964 wrote to memory of 4600 4964 cmd.exe PING.EXE PID 4964 wrote to memory of 1692 4964 cmd.exe Client.exe PID 4964 wrote to memory of 1692 4964 cmd.exe Client.exe PID 4964 wrote to memory of 1692 4964 cmd.exe Client.exe PID 1692 wrote to memory of 2076 1692 Client.exe schtasks.exe PID 1692 wrote to memory of 2076 1692 Client.exe schtasks.exe PID 1692 wrote to memory of 2076 1692 Client.exe schtasks.exe PID 1692 wrote to memory of 3504 1692 Client.exe cmd.exe PID 1692 wrote to memory of 3504 1692 Client.exe cmd.exe PID 1692 wrote to memory of 3504 1692 Client.exe cmd.exe PID 3504 wrote to memory of 2560 3504 cmd.exe chcp.com PID 3504 wrote to memory of 2560 3504 cmd.exe chcp.com PID 3504 wrote to memory of 2560 3504 cmd.exe chcp.com PID 3504 wrote to memory of 4848 3504 cmd.exe PING.EXE PID 3504 wrote to memory of 4848 3504 cmd.exe PING.EXE PID 3504 wrote to memory of 4848 3504 cmd.exe PING.EXE PID 3504 wrote to memory of 848 3504 cmd.exe Client.exe PID 3504 wrote to memory of 848 3504 cmd.exe Client.exe PID 3504 wrote to memory of 848 3504 cmd.exe Client.exe PID 848 wrote to memory of 3672 848 Client.exe schtasks.exe PID 848 wrote to memory of 3672 848 Client.exe schtasks.exe PID 848 wrote to memory of 3672 848 Client.exe schtasks.exe PID 848 wrote to memory of 2880 848 Client.exe cmd.exe PID 848 wrote to memory of 2880 848 Client.exe cmd.exe PID 848 wrote to memory of 2880 848 Client.exe cmd.exe PID 2880 wrote to memory of 4972 2880 cmd.exe chcp.com PID 2880 wrote to memory of 4972 2880 cmd.exe chcp.com PID 2880 wrote to memory of 4972 2880 cmd.exe chcp.com PID 2880 wrote to memory of 404 2880 cmd.exe PING.EXE
Processes
-
C:\Users\Admin\AppData\Local\Temp\uni\Uni - Copy (11) - Copy.exe"C:\Users\Admin\AppData\Local\Temp\uni\Uni - Copy (11) - Copy.exe"1⤵
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\schtasks.exe"schtasks" /create /tn "SeroXen" /sc ONLOGON /tr "C:\Users\Admin\AppData\Local\Temp\uni\Uni - Copy (11) - Copy.exe" /rl HIGHEST /f2⤵
- Creates scheduled task(s)
-
C:\Users\Admin\AppData\Roaming\SubDir\Client.exe"C:\Users\Admin\AppData\Roaming\SubDir\Client.exe"2⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\schtasks.exe"schtasks" /create /tn "SeroXen" /sc ONLOGON /tr "C:\Users\Admin\AppData\Roaming\SubDir\Client.exe" /rl HIGHEST /f3⤵
- Creates scheduled task(s)
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\wXJjmGGdY3N8.bat" "3⤵
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\chcp.comchcp 650014⤵
-
C:\Windows\SysWOW64\PING.EXEping -n 10 localhost4⤵
- Runs ping.exe
-
C:\Users\Admin\AppData\Roaming\SubDir\Client.exe"C:\Users\Admin\AppData\Roaming\SubDir\Client.exe"4⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\schtasks.exe"schtasks" /create /tn "SeroXen" /sc ONLOGON /tr "C:\Users\Admin\AppData\Roaming\SubDir\Client.exe" /rl HIGHEST /f5⤵
- Creates scheduled task(s)
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\bXLVNIksQNtq.bat" "5⤵
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\chcp.comchcp 650016⤵
-
C:\Windows\SysWOW64\PING.EXEping -n 10 localhost6⤵
- Runs ping.exe
-
C:\Users\Admin\AppData\Roaming\SubDir\Client.exe"C:\Users\Admin\AppData\Roaming\SubDir\Client.exe"6⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\schtasks.exe"schtasks" /create /tn "SeroXen" /sc ONLOGON /tr "C:\Users\Admin\AppData\Roaming\SubDir\Client.exe" /rl HIGHEST /f7⤵
- Creates scheduled task(s)
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\N66KPSLHuMew.bat" "7⤵
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\chcp.comchcp 650018⤵
-
C:\Windows\SysWOW64\PING.EXEping -n 10 localhost8⤵
- Runs ping.exe
-
C:\Users\Admin\AppData\Roaming\SubDir\Client.exe"C:\Users\Admin\AppData\Roaming\SubDir\Client.exe"8⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\schtasks.exe"schtasks" /create /tn "SeroXen" /sc ONLOGON /tr "C:\Users\Admin\AppData\Roaming\SubDir\Client.exe" /rl HIGHEST /f9⤵
- Creates scheduled task(s)
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\t1HDn76HS31L.bat" "9⤵
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\chcp.comchcp 6500110⤵
-
C:\Windows\SysWOW64\PING.EXEping -n 10 localhost10⤵
- Runs ping.exe
-
C:\Users\Admin\AppData\Roaming\SubDir\Client.exe"C:\Users\Admin\AppData\Roaming\SubDir\Client.exe"10⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
-
C:\Windows\SysWOW64\schtasks.exe"schtasks" /create /tn "SeroXen" /sc ONLOGON /tr "C:\Users\Admin\AppData\Roaming\SubDir\Client.exe" /rl HIGHEST /f11⤵
- Creates scheduled task(s)
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\3b2rHIkKAvLO.bat" "11⤵
-
C:\Windows\SysWOW64\chcp.comchcp 6500112⤵
-
C:\Windows\SysWOW64\PING.EXEping -n 10 localhost12⤵
- Runs ping.exe
-
C:\Users\Admin\AppData\Roaming\SubDir\Client.exe"C:\Users\Admin\AppData\Roaming\SubDir\Client.exe"12⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
-
C:\Windows\SysWOW64\schtasks.exe"schtasks" /create /tn "SeroXen" /sc ONLOGON /tr "C:\Users\Admin\AppData\Roaming\SubDir\Client.exe" /rl HIGHEST /f13⤵
- Creates scheduled task(s)
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\sdjgUq4683JZ.bat" "13⤵
-
C:\Windows\SysWOW64\chcp.comchcp 6500114⤵
-
C:\Windows\SysWOW64\PING.EXEping -n 10 localhost14⤵
- Runs ping.exe
-
C:\Users\Admin\AppData\Roaming\SubDir\Client.exe"C:\Users\Admin\AppData\Roaming\SubDir\Client.exe"14⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
-
C:\Windows\SysWOW64\schtasks.exe"schtasks" /create /tn "SeroXen" /sc ONLOGON /tr "C:\Users\Admin\AppData\Roaming\SubDir\Client.exe" /rl HIGHEST /f15⤵
- Creates scheduled task(s)
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\bhZX15P0VTYW.bat" "15⤵
-
C:\Windows\SysWOW64\chcp.comchcp 6500116⤵
-
C:\Windows\SysWOW64\PING.EXEping -n 10 localhost16⤵
- Runs ping.exe
-
C:\Users\Admin\AppData\Roaming\SubDir\Client.exe"C:\Users\Admin\AppData\Roaming\SubDir\Client.exe"16⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
-
C:\Windows\SysWOW64\schtasks.exe"schtasks" /create /tn "SeroXen" /sc ONLOGON /tr "C:\Users\Admin\AppData\Roaming\SubDir\Client.exe" /rl HIGHEST /f17⤵
- Creates scheduled task(s)
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\Zo8ERyT0oEf0.bat" "17⤵
-
C:\Windows\SysWOW64\chcp.comchcp 6500118⤵
-
C:\Windows\SysWOW64\PING.EXEping -n 10 localhost18⤵
- Runs ping.exe
-
C:\Users\Admin\AppData\Roaming\SubDir\Client.exe"C:\Users\Admin\AppData\Roaming\SubDir\Client.exe"18⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
-
C:\Windows\SysWOW64\schtasks.exe"schtasks" /create /tn "SeroXen" /sc ONLOGON /tr "C:\Users\Admin\AppData\Roaming\SubDir\Client.exe" /rl HIGHEST /f19⤵
- Creates scheduled task(s)
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\n6vnWtvds8zA.bat" "19⤵
-
C:\Windows\SysWOW64\chcp.comchcp 6500120⤵
-
C:\Windows\SysWOW64\PING.EXEping -n 10 localhost20⤵
- Runs ping.exe
-
C:\Users\Admin\AppData\Roaming\SubDir\Client.exe"C:\Users\Admin\AppData\Roaming\SubDir\Client.exe"20⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
-
C:\Windows\SysWOW64\schtasks.exe"schtasks" /create /tn "SeroXen" /sc ONLOGON /tr "C:\Users\Admin\AppData\Roaming\SubDir\Client.exe" /rl HIGHEST /f21⤵
- Creates scheduled task(s)
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\1OiMcoNHw1IJ.bat" "21⤵
-
C:\Windows\SysWOW64\chcp.comchcp 6500122⤵
-
C:\Windows\SysWOW64\PING.EXEping -n 10 localhost22⤵
- Runs ping.exe
-
C:\Users\Admin\AppData\Roaming\SubDir\Client.exe"C:\Users\Admin\AppData\Roaming\SubDir\Client.exe"22⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
-
C:\Windows\SysWOW64\schtasks.exe"schtasks" /create /tn "SeroXen" /sc ONLOGON /tr "C:\Users\Admin\AppData\Roaming\SubDir\Client.exe" /rl HIGHEST /f23⤵
- Creates scheduled task(s)
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\QiQ1ocNhQSn6.bat" "23⤵
-
C:\Windows\SysWOW64\chcp.comchcp 6500124⤵
-
C:\Windows\SysWOW64\PING.EXEping -n 10 localhost24⤵
- Runs ping.exe
-
C:\Users\Admin\AppData\Roaming\SubDir\Client.exe"C:\Users\Admin\AppData\Roaming\SubDir\Client.exe"24⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
-
C:\Windows\SysWOW64\schtasks.exe"schtasks" /create /tn "SeroXen" /sc ONLOGON /tr "C:\Users\Admin\AppData\Roaming\SubDir\Client.exe" /rl HIGHEST /f25⤵
- Creates scheduled task(s)
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\PtjE7hlT97Z9.bat" "25⤵
-
C:\Windows\SysWOW64\chcp.comchcp 6500126⤵
-
C:\Windows\SysWOW64\PING.EXEping -n 10 localhost26⤵
- Runs ping.exe
-
C:\Users\Admin\AppData\Roaming\SubDir\Client.exe"C:\Users\Admin\AppData\Roaming\SubDir\Client.exe"26⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
-
C:\Windows\SysWOW64\schtasks.exe"schtasks" /create /tn "SeroXen" /sc ONLOGON /tr "C:\Users\Admin\AppData\Roaming\SubDir\Client.exe" /rl HIGHEST /f27⤵
- Creates scheduled task(s)
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\XbojlT6waLdv.bat" "27⤵
-
C:\Windows\SysWOW64\chcp.comchcp 6500128⤵
-
C:\Windows\SysWOW64\PING.EXEping -n 10 localhost28⤵
- Runs ping.exe
-
C:\Users\Admin\AppData\Roaming\SubDir\Client.exe"C:\Users\Admin\AppData\Roaming\SubDir\Client.exe"28⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
-
C:\Windows\SysWOW64\schtasks.exe"schtasks" /create /tn "SeroXen" /sc ONLOGON /tr "C:\Users\Admin\AppData\Roaming\SubDir\Client.exe" /rl HIGHEST /f29⤵
- Creates scheduled task(s)
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\UiNRCMAxt6kO.bat" "29⤵
-
C:\Windows\SysWOW64\chcp.comchcp 6500130⤵
-
C:\Windows\SysWOW64\PING.EXEping -n 10 localhost30⤵
- Runs ping.exe
-
C:\Users\Admin\AppData\Roaming\SubDir\Client.exe"C:\Users\Admin\AppData\Roaming\SubDir\Client.exe"30⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
-
C:\Windows\SysWOW64\schtasks.exe"schtasks" /create /tn "SeroXen" /sc ONLOGON /tr "C:\Users\Admin\AppData\Roaming\SubDir\Client.exe" /rl HIGHEST /f31⤵
- Creates scheduled task(s)
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\oW8YqDOzAleN.bat" "31⤵
-
C:\Windows\SysWOW64\chcp.comchcp 6500132⤵
-
C:\Windows\SysWOW64\PING.EXEping -n 10 localhost32⤵
- Runs ping.exe
-
C:\Users\Admin\AppData\Roaming\SubDir\Client.exe"C:\Users\Admin\AppData\Roaming\SubDir\Client.exe"32⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
-
C:\Windows\SysWOW64\schtasks.exe"schtasks" /create /tn "SeroXen" /sc ONLOGON /tr "C:\Users\Admin\AppData\Roaming\SubDir\Client.exe" /rl HIGHEST /f33⤵
- Creates scheduled task(s)
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\2ov7v8qcEfyW.bat" "33⤵
-
C:\Windows\SysWOW64\chcp.comchcp 6500134⤵
-
C:\Windows\SysWOW64\PING.EXEping -n 10 localhost34⤵
- Runs ping.exe
-
C:\Users\Admin\AppData\Roaming\SubDir\Client.exe"C:\Users\Admin\AppData\Roaming\SubDir\Client.exe"34⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
-
C:\Windows\SysWOW64\schtasks.exe"schtasks" /create /tn "SeroXen" /sc ONLOGON /tr "C:\Users\Admin\AppData\Roaming\SubDir\Client.exe" /rl HIGHEST /f35⤵
- Creates scheduled task(s)
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\vPWGn57EKeUC.bat" "35⤵
-
C:\Windows\SysWOW64\chcp.comchcp 6500136⤵
-
C:\Windows\SysWOW64\PING.EXEping -n 10 localhost36⤵
- Runs ping.exe
-
C:\Users\Admin\AppData\Roaming\SubDir\Client.exe"C:\Users\Admin\AppData\Roaming\SubDir\Client.exe"36⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
-
C:\Windows\SysWOW64\schtasks.exe"schtasks" /create /tn "SeroXen" /sc ONLOGON /tr "C:\Users\Admin\AppData\Roaming\SubDir\Client.exe" /rl HIGHEST /f37⤵
- Creates scheduled task(s)
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\buSmfvVHZDBe.bat" "37⤵
-
C:\Windows\SysWOW64\chcp.comchcp 6500138⤵
-
C:\Windows\SysWOW64\PING.EXEping -n 10 localhost38⤵
- Runs ping.exe
-
C:\Users\Admin\AppData\Roaming\SubDir\Client.exe"C:\Users\Admin\AppData\Roaming\SubDir\Client.exe"38⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
-
C:\Windows\SysWOW64\schtasks.exe"schtasks" /create /tn "SeroXen" /sc ONLOGON /tr "C:\Users\Admin\AppData\Roaming\SubDir\Client.exe" /rl HIGHEST /f39⤵
- Creates scheduled task(s)
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\o8Vqrec9DDpE.bat" "39⤵
-
C:\Windows\SysWOW64\chcp.comchcp 6500140⤵
-
C:\Windows\SysWOW64\PING.EXEping -n 10 localhost40⤵
- Runs ping.exe
-
C:\Users\Admin\AppData\Roaming\SubDir\Client.exe"C:\Users\Admin\AppData\Roaming\SubDir\Client.exe"40⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
-
C:\Windows\SysWOW64\schtasks.exe"schtasks" /create /tn "SeroXen" /sc ONLOGON /tr "C:\Users\Admin\AppData\Roaming\SubDir\Client.exe" /rl HIGHEST /f41⤵
- Creates scheduled task(s)
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\mJo3Aj1vwscI.bat" "41⤵
-
C:\Windows\SysWOW64\chcp.comchcp 6500142⤵
-
C:\Windows\SysWOW64\PING.EXEping -n 10 localhost42⤵
- Runs ping.exe
-
C:\Users\Admin\AppData\Roaming\SubDir\Client.exe"C:\Users\Admin\AppData\Roaming\SubDir\Client.exe"42⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
-
C:\Windows\SysWOW64\schtasks.exe"schtasks" /create /tn "SeroXen" /sc ONLOGON /tr "C:\Users\Admin\AppData\Roaming\SubDir\Client.exe" /rl HIGHEST /f43⤵
- Creates scheduled task(s)
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\67ZAoaFxDXWG.bat" "43⤵
-
C:\Windows\SysWOW64\chcp.comchcp 6500144⤵
-
C:\Windows\SysWOW64\PING.EXEping -n 10 localhost44⤵
- Runs ping.exe
-
C:\Users\Admin\AppData\Roaming\SubDir\Client.exe"C:\Users\Admin\AppData\Roaming\SubDir\Client.exe"44⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
-
C:\Windows\SysWOW64\schtasks.exe"schtasks" /create /tn "SeroXen" /sc ONLOGON /tr "C:\Users\Admin\AppData\Roaming\SubDir\Client.exe" /rl HIGHEST /f45⤵
- Creates scheduled task(s)
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\4mycqqjuXw7Y.bat" "45⤵
-
C:\Windows\SysWOW64\chcp.comchcp 6500146⤵
-
C:\Windows\SysWOW64\PING.EXEping -n 10 localhost46⤵
- Runs ping.exe
-
C:\Users\Admin\AppData\Roaming\SubDir\Client.exe"C:\Users\Admin\AppData\Roaming\SubDir\Client.exe"46⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
-
C:\Windows\SysWOW64\schtasks.exe"schtasks" /create /tn "SeroXen" /sc ONLOGON /tr "C:\Users\Admin\AppData\Roaming\SubDir\Client.exe" /rl HIGHEST /f47⤵
- Creates scheduled task(s)
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\OajjUixwob1W.bat" "47⤵
-
C:\Windows\SysWOW64\chcp.comchcp 6500148⤵
-
C:\Windows\SysWOW64\PING.EXEping -n 10 localhost48⤵
- Runs ping.exe
-
C:\Users\Admin\AppData\Roaming\SubDir\Client.exe"C:\Users\Admin\AppData\Roaming\SubDir\Client.exe"48⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
-
C:\Windows\SysWOW64\schtasks.exe"schtasks" /create /tn "SeroXen" /sc ONLOGON /tr "C:\Users\Admin\AppData\Roaming\SubDir\Client.exe" /rl HIGHEST /f49⤵
- Creates scheduled task(s)
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\VIoD8UIPGq5I.bat" "49⤵
-
C:\Windows\SysWOW64\chcp.comchcp 6500150⤵
-
C:\Windows\SysWOW64\PING.EXEping -n 10 localhost50⤵
- Runs ping.exe
-
C:\Users\Admin\AppData\Roaming\SubDir\Client.exe"C:\Users\Admin\AppData\Roaming\SubDir\Client.exe"50⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
-
C:\Windows\SysWOW64\schtasks.exe"schtasks" /create /tn "SeroXen" /sc ONLOGON /tr "C:\Users\Admin\AppData\Roaming\SubDir\Client.exe" /rl HIGHEST /f51⤵
- Creates scheduled task(s)
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\Uv2qauueNR0l.bat" "51⤵
-
C:\Windows\SysWOW64\chcp.comchcp 6500152⤵
-
C:\Windows\SysWOW64\PING.EXEping -n 10 localhost52⤵
- Runs ping.exe
-
C:\Users\Admin\AppData\Roaming\SubDir\Client.exe"C:\Users\Admin\AppData\Roaming\SubDir\Client.exe"52⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
-
C:\Windows\SysWOW64\schtasks.exe"schtasks" /create /tn "SeroXen" /sc ONLOGON /tr "C:\Users\Admin\AppData\Roaming\SubDir\Client.exe" /rl HIGHEST /f53⤵
- Creates scheduled task(s)
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\JVpFe61xxdpW.bat" "53⤵
-
C:\Windows\SysWOW64\chcp.comchcp 6500154⤵
-
C:\Windows\SysWOW64\PING.EXEping -n 10 localhost54⤵
- Runs ping.exe
-
C:\Users\Admin\AppData\Roaming\SubDir\Client.exe"C:\Users\Admin\AppData\Roaming\SubDir\Client.exe"54⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
-
C:\Windows\SysWOW64\schtasks.exe"schtasks" /create /tn "SeroXen" /sc ONLOGON /tr "C:\Users\Admin\AppData\Roaming\SubDir\Client.exe" /rl HIGHEST /f55⤵
- Creates scheduled task(s)
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\WjsIrp8pbdU6.bat" "55⤵
-
C:\Windows\SysWOW64\chcp.comchcp 6500156⤵
-
C:\Windows\SysWOW64\PING.EXEping -n 10 localhost56⤵
- Runs ping.exe
-
C:\Users\Admin\AppData\Roaming\SubDir\Client.exe"C:\Users\Admin\AppData\Roaming\SubDir\Client.exe"56⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
-
C:\Windows\SysWOW64\schtasks.exe"schtasks" /create /tn "SeroXen" /sc ONLOGON /tr "C:\Users\Admin\AppData\Roaming\SubDir\Client.exe" /rl HIGHEST /f57⤵
- Creates scheduled task(s)
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\h0q8A0Q89i6M.bat" "57⤵
-
C:\Windows\SysWOW64\chcp.comchcp 6500158⤵
-
C:\Windows\SysWOW64\PING.EXEping -n 10 localhost58⤵
- Runs ping.exe
-
C:\Users\Admin\AppData\Roaming\SubDir\Client.exe"C:\Users\Admin\AppData\Roaming\SubDir\Client.exe"58⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4784 -s 223257⤵
- Program crash
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3408 -s 224855⤵
- Program crash
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3020 -s 224853⤵
- Program crash
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1648 -s 109651⤵
- Program crash
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4700 -s 222849⤵
- Program crash
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 916 -s 109647⤵
- Program crash
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4964 -s 109645⤵
- Program crash
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4432 -s 170843⤵
- Program crash
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1700 -s 223241⤵
- Program crash
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3484 -s 166039⤵
- Program crash
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 828 -s 167237⤵
- Program crash
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4636 -s 224835⤵
- Program crash
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3752 -s 170433⤵
- Program crash
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3444 -s 167231⤵
- Program crash
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3620 -s 109229⤵
- Program crash
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1372 -s 167227⤵
- Program crash
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4088 -s 222025⤵
- Program crash
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4124 -s 167223⤵
- Program crash
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 392 -s 223221⤵
- Program crash
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4964 -s 166819⤵
- Program crash
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1120 -s 109617⤵
- Program crash
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 5092 -s 109215⤵
- Program crash
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3408 -s 109213⤵
- Program crash
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2876 -s 220011⤵
- Program crash
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 848 -s 16329⤵
- Program crash
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1692 -s 10767⤵
- Program crash
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4916 -s 16565⤵
- Program crash
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 5008 -s 21123⤵
- Program crash
-
C:\Windows\SysWOW64\SCHTASKS.exe"SCHTASKS.exe" /create /tn "$77Uni - Copy (11) - Copy.exe" /tr "'C:\Users\Admin\AppData\Local\Temp\uni\Uni - Copy (11) - Copy.exe'" /sc onlogon /rl HIGHEST2⤵
- Creates scheduled task(s)
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=asset_store.mojom.AssetStoreService --lang=en-US --service-sandbox-type=asset_store_service --no-appcompat-clear --field-trial-handle=4340,i,17096020621006928097,15544233752327415349,262144 --variations-seed-version --mojo-platform-channel-handle=4584 /prefetch:81⤵
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 440 -p 5008 -ip 50081⤵
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 512 -p 4916 -ip 49161⤵
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 368 -p 1692 -ip 16921⤵
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 464 -p 848 -ip 8481⤵
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 528 -p 2876 -ip 28761⤵
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 488 -p 3408 -ip 34081⤵
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 424 -p 5092 -ip 50921⤵
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 536 -p 1120 -ip 11201⤵
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 388 -p 4964 -ip 49641⤵
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 556 -p 392 -ip 3921⤵
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 388 -p 4124 -ip 41241⤵
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 568 -p 4088 -ip 40881⤵
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 568 -p 1372 -ip 13721⤵
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 572 -p 3620 -ip 36201⤵
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 584 -p 3444 -ip 34441⤵
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 512 -p 3752 -ip 37521⤵
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 368 -p 4636 -ip 46361⤵
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 572 -p 828 -ip 8281⤵
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 568 -p 3484 -ip 34841⤵
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 584 -p 1700 -ip 17001⤵
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=asset_store.mojom.AssetStoreService --lang=en-US --service-sandbox-type=asset_store_service --no-appcompat-clear --field-trial-handle=4644,i,17096020621006928097,15544233752327415349,262144 --variations-seed-version --mojo-platform-channel-handle=4352 /prefetch:81⤵
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 388 -p 4432 -ip 44321⤵
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 608 -p 4964 -ip 49641⤵
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 616 -p 916 -ip 9161⤵
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 604 -p 4700 -ip 47001⤵
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 612 -p 1648 -ip 16481⤵
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 620 -p 3020 -ip 30201⤵
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 640 -p 3408 -ip 34081⤵
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 612 -p 4784 -ip 47841⤵
Network
MITRE ATT&CK Matrix ATT&CK v13
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Local\Temp\1OiMcoNHw1IJ.batFilesize
207B
MD513dc764af096a8ceb47f81b4c502b9d7
SHA1e61db6cf40dcbd75fc8eb882a268b37be0c58cdd
SHA2564ae6be149a27a8cb8210f7ceb0b502c806bebeff20763711b960835ac4face24
SHA51284a844dc69baef62159ccc32ade73f99daf012b9f09c1edc4962c04f3a3b8a46fa29447a7469d5a43cc1d754fc58757acb059379305189cb9cc945a9f8e36015
-
C:\Users\Admin\AppData\Local\Temp\2ov7v8qcEfyW.batFilesize
207B
MD54bb5f46fc748da654f01c91b8575ce81
SHA19caf4a8c6916614d114aca3d4c902d8cec7aadfe
SHA256995b75b8a7d9344cd6d58fe41b5e6a89c743cecdc55b261f6ea2925498c8a69f
SHA512e502a55dba8b4d6067f7fba6b02b0a1dabab9969508f55c624a9b3cd7cdd9be14c6d89e66b1df7617ab22c46da1595a5fabb81bac7c777fa148d432e40502fc1
-
C:\Users\Admin\AppData\Local\Temp\3b2rHIkKAvLO.batFilesize
207B
MD58f1049a700dc0a2b02000c75defb4d9d
SHA1362b75b63b9fc4e475122847cf344aea8f51cdff
SHA25605c164312f7a0a962c13d846b3c48255630a8faef2a1e12e53c88980b1204a8c
SHA512baa41455b320d871d421c77ef4c7e5630c81a8e0ee8230a86332be017c53eb43f2a7577c2856080ce490811222f735384d2570004b728a5f7d47af71ad883035
-
C:\Users\Admin\AppData\Local\Temp\67ZAoaFxDXWG.batFilesize
207B
MD5cb88fcf6929e524c645ed95e660fd5f9
SHA1d4e158c7d359611643f0acbc9636f86452cb2e9c
SHA256d0efd755a089c85dd1799a03d569a4561486cca2a70dd3e3bb97d3ca8a736f42
SHA512b9b407f52606e24a128f340e8b455ea26cc7d4021efddad0f716326e2d5b9e4b460cc376a75a85f830c45ad86638d634cae65b419b65831075656719e988c047
-
C:\Users\Admin\AppData\Local\Temp\N66KPSLHuMew.batFilesize
207B
MD5a6e1ab0455014b558ab8a6e733f91d7d
SHA1a14b458824656f8dfebd779c486c979c960ee9ea
SHA2568ec6332d0f881667d64d3b0c869a0019d5958698f5083120027492f7e04613bd
SHA51200b09e502dffd4ce3a7cafd9dde1fc89bce8d879d1bd6b9a3d031a4c8685d7f3f0e70cfbffd97b2fe9b9ee3e6c2d30a262dcfcffded9df65f31a44a9634e64c9
-
C:\Users\Admin\AppData\Local\Temp\PtjE7hlT97Z9.batFilesize
207B
MD515c12e665ee7e5054edaa9247c847889
SHA1c3cac93007e1f32e073933fcef47b87eb9db3f31
SHA25661e46350a0ea47990ef0f5d4b8084302636c67081345cade0ca999ee05905370
SHA512e68a232df7d9c514160894fdd78a57b17874631243333aa9e9bbbde6e832faa840573f21037ece6d2ae6add332d2298b5318c61cc23f4a4090bd16d823cc8033
-
C:\Users\Admin\AppData\Local\Temp\QiQ1ocNhQSn6.batFilesize
207B
MD5582c9ee87e9632250d20fc9a50d41bc4
SHA18d57d49b678bf4d85000ee715387fe0766bc11cc
SHA256b68cd70853da5acadb6cc9a6a43ff723fe8c3f8bab60b167e986c21efa368b56
SHA512d4d24ddfad965b550c306fe4a33bda3f0d37f6db0355392dceb52dc89925901f309d3718b3b4c707820dcc2c5964815287e4c62fe0aee4ff74a688ec65b5f89a
-
C:\Users\Admin\AppData\Local\Temp\UiNRCMAxt6kO.batFilesize
207B
MD58d17a5065c7013bebe33e4455eaaed0f
SHA18e0cc82c51c778dc20deba3cc6f4f1e8649e5504
SHA256d822c4aa3399f33b7aa40e45745decc1faf01f84aff2e4e964d71eed32680467
SHA512a38f01269db1b79066c710643ea2b29dc77ba7a007f760cf9539aab85a190cb43e83925e13dde532515378e2725bf887b6f48be3f2fd9e7739c104529e931cb8
-
C:\Users\Admin\AppData\Local\Temp\XbojlT6waLdv.batFilesize
207B
MD50990711ff6fa0602d1a811a9a9dab0da
SHA121206befeb5f415632de02904a7e8eab0e4c2709
SHA25644e4116491d36eee37e0f52029287830325cfab04b2a8dfcf8eb22725f07869d
SHA512dfa473d504043a8b964c2129648d16e3a9e6c165fad6b3565257de198f7d13d0f17f43c327bd67081c71d22462a2a4bf667324feb9afbb0925e93337aa448400
-
C:\Users\Admin\AppData\Local\Temp\Zo8ERyT0oEf0.batFilesize
207B
MD5dfb1c63d3e3c8daba6f9cf16575f7389
SHA153fd3796e1f46c44d57f2af1db41cc3daf2098ea
SHA2567bada2d493abefe67e682028a692ad7d917bdda5d645d4d0f44b90073bc0a974
SHA5125bc3df53cefec6b5172d0d53c48835bf94a01badb6b798c65af9fca50d29e673549c45d4f29df176f57ed3ae4ee80645990fbbfbd1dc37b469721a80f3816423
-
C:\Users\Admin\AppData\Local\Temp\bXLVNIksQNtq.batFilesize
207B
MD539df20382fa7ddf3f59925a42e65270c
SHA16b264e76426e7a313b7801ad9f9f1b42183240fd
SHA2566df23e97f3e6589c7d474aff7e9f06773f1df2a1e78c1d6d905da2404baba6ad
SHA512bbcb2c9f0711debc841b51ff2a3aac71d95db44ad1ec370eef1d8eff87e7936991a68d580895134bbe3a489c9405a6eae080941ec861829e5b9865b1c88b511d
-
C:\Users\Admin\AppData\Local\Temp\bhZX15P0VTYW.batFilesize
207B
MD54f69ef72a2bfb177e3f8cb90655d7d01
SHA14bc76849b8e5ccb80b65c6f719f4680208032cc6
SHA25662b7aaf2d2eafc6e026b5c125c75d8ec446270aedefbcd7d5d51d1d78043f69d
SHA5122298f8745a8d2dbf8bc81559646ce622d9e2048a1ec2dd6b058a18cf387cf59162edaa986285bb006a357ced7801a824d2488b0ccc3101a8afa207ac918ac821
-
C:\Users\Admin\AppData\Local\Temp\buSmfvVHZDBe.batFilesize
207B
MD5f301443353893d193b6da8ab47748d94
SHA1ef17c7771b5f49b054ac4ee40c447e29717ad4ff
SHA256bcd261491e661b206de9a17e6b0876eca29e553738a947d8f26157a3f7cdecde
SHA512e4eb12592d14586af58a31fd77effa60a77c0cbc482695d1f84ed4daaa305d1cca950fdade38485b2c359fe6bc7e0bbb7428aee01bca6338d55bb4032bea9d68
-
C:\Users\Admin\AppData\Local\Temp\mJo3Aj1vwscI.batFilesize
207B
MD5b927f1f76ab1f1c363cbae1dca7dede9
SHA157eef137d31b7c9e25f14479cac6c8adbe06f955
SHA256439aabdd40251ef203cdef2dd342f990add9cd43202900d01bfdad5f6236e007
SHA512c909565b9c8eaae22897c2f5c1a51cc2f259aacecedcc3ac0a72c5ceef2511495da7c73ce30d6445eeda7f8510fb622c9903d1ab76dd926c62f3508e75a6fd27
-
C:\Users\Admin\AppData\Local\Temp\n6vnWtvds8zA.batFilesize
207B
MD53d44e79363db3f17c32aea5983941804
SHA172cbc4dc8687570cb6c45da96706b550452c40ec
SHA256e2623e8e37445c26f94db71309274e7e992ec873f4355f1a4ed10b80884c409c
SHA512baaf611ce646ca8d8509fc32071b6ecd5fd82cc20ffd677bea531dd7268739f0bdfd3025eb17c8ca43fe82b3560a5b05bc36e9cfdcee4cacf3ae90f39f6a5196
-
C:\Users\Admin\AppData\Local\Temp\o8Vqrec9DDpE.batFilesize
207B
MD5ecb2902ba265b8300029113b19403229
SHA1a8a47e525d03742361f2007d3824d6719bec8a17
SHA256eeece4839709118acb06b5e638eec9c8d1da26e7838cb8b9589abb1c8f5ce549
SHA51260220916a986176d516f7f8eaacdfe1b3610c04464bf4bbab50aed98fcefb3d92f2a11366f5006d46872cf1a3ab6aebd92eae70dfafbb2f844cd6181a81f0449
-
C:\Users\Admin\AppData\Local\Temp\oW8YqDOzAleN.batFilesize
207B
MD57b66bd365ee43d8c8919e9aa8b808cd8
SHA1ab72fd105201a342399d384f50cad700012ef57c
SHA2567e4a7461c79365db2e77d14dc173fd4eb4a1ce8219a84555174e048e551a479c
SHA5122f21480ea4c93e0c9f3e39646216ce44406370695fc1374db8f2c27e5e154fa82a4c4f181326bb8cff9fc56bfdb17d787fc654c3f3705d4be0087bdf6371f65c
-
C:\Users\Admin\AppData\Local\Temp\sdjgUq4683JZ.batFilesize
207B
MD50b05ab08695ec578bb55132d29dd7741
SHA1e33e32e8ccff0d7e5a1f5c6ebb58bd0dc4f11630
SHA25619737821ce681990c69719854d727bf542a5166ef20a22b9d7accd8e30f85fee
SHA512aa2f46b988e0c87466d8661d9658abe7abde9be2898e471262bca8c67cc4a34f148e19167cc6b810b8efaa68d5ce109b0fc9635270163a52251ba6ff7e1a865a
-
C:\Users\Admin\AppData\Local\Temp\t1HDn76HS31L.batFilesize
207B
MD5f0ee850342a008627f295ed6c80edfd5
SHA1dad474b0d78500ac53bb4f716c5b911e9ef3ecb6
SHA2566f4fba788a437e07d2dd69dcc749c25614e2b1aba4a502a1ba319944d7b05406
SHA51294e96cac4e77edb2af2808abf400466cf154335a33e37cb748648ba1c7224f78b988b4ec99802beabefe03cd8265ffacb3b3d149524a41d9addaee25dc7a67e1
-
C:\Users\Admin\AppData\Local\Temp\vPWGn57EKeUC.batFilesize
207B
MD549d52241d744c132167d1324fa08a3e6
SHA186b63572710a1372ff3d36eeff2418b3024c2160
SHA2568492020ff9bdc195955a56015e14cd05ccfa726b54044d8a62c088229f9009e2
SHA512ec72ff4d5bb70440bcf7f9401815437176c82c4dbbae7fb8ab61c8925b3f605708c67236c0718fcb5dc94985c6e6232ab177b016afaffb863f6d10117d755686
-
C:\Users\Admin\AppData\Local\Temp\wXJjmGGdY3N8.batFilesize
207B
MD5c7f9e8567737d45fb578ad3a45c2b51e
SHA15dd683c13bd551171a288efd2b1323c4094857af
SHA2560108b6f51350aba320b2928bea91b0bc0f3581f2786913877fc2ba238b415ce4
SHA5124ce3c13d4f9c791860c88b148bfe388f871f1a20966150fba5aba966377d51666a1131e6f5ea2737e90505c136067147befcaec62c5d37fcb5a93a72907c5ff3
-
C:\Users\Admin\AppData\Roaming\Logs\06-10-2024Filesize
224B
MD5dc5e5face1bf03bf031d33067ee8e755
SHA1978ba1cdee2b738073f77d11c7bd2d106998e166
SHA2565300992fdfe6dd9d376e68a761e4ce78ef08e6fe8ca59da6e8f5e4c0d9eeaf30
SHA512179101c9f6542d8a97a6921ddd076bee85c976c263b35caa4c53ac5d01003e2c16c46c3d5ab73c0ed073d235b167d03a3375726a4ca3c46efb072f551a10869e
-
C:\Users\Admin\AppData\Roaming\Logs\06-10-2024Filesize
224B
MD5a8bbd324661fac394fc9cf6e44e3560a
SHA1ece4b1c6dc4f1faa4b3d8d40c5006e5479d9b38c
SHA2568208380170dce20065772a98efea511967bbe8d2955533984f54ce6174f68340
SHA5126bea51baf6d02fe49138300de9db220253216b03650895d3c48a137b2ea20882dc0c6694784e0b173f914b55fec3bb2013805670c5a63c0ad8aa29e2143f7538
-
C:\Users\Admin\AppData\Roaming\Logs\06-10-2024Filesize
224B
MD569d4a406a5778a70975b4d9888a3799d
SHA112e92a99c7f970b9731c7a312d237248dcb0ff79
SHA256629bfdda09a023a4ff9b34017fc8846f9341ccf63982136fb9d6ab72f8da4be3
SHA512d9021f85bc5f64720fff38ca2e31498e8e6c406caa2e8abd63ceeca7fe3bff9b04f18c903013c2cf9cc9179102161a703d55bde6a4119bb3bb094d10c4f5a6ed
-
C:\Users\Admin\AppData\Roaming\Logs\06-10-2024Filesize
224B
MD568ca7ed6c4fc7efa5177fc91da431a05
SHA19ef319032db2771b2e8c859115160e16fd0c46ce
SHA256e436504fb436237061d6f6c7b1f1d47d6085f9e1c712ebbd461d204814b6a26b
SHA512f7862d477f7880f1e078c43ed96801a8b24c58d1ba87b43ad0e4fd747a47d257399be0fb2f710b03c990d1d1779ce5af294b10c7c28758140ed9467c3bc519f9
-
C:\Users\Admin\AppData\Roaming\Logs\06-10-2024Filesize
224B
MD59adf3c102259ab6b26b31de845589f90
SHA1a9d2072d36b72ee3a93e59738760d20024560c7c
SHA25657ae9ff936d956a4302b301bd2e1b581df14d498f871a59b32a687e2fcd515a5
SHA512396de918c83f72d5917c464425d374607e77c12a0a206d4833b1a60c3c2562c2d81b32fc66f1e5947a3bc673a678f3bbd5ef4c777373a1a1409de70a92b4ad00
-
C:\Users\Admin\AppData\Roaming\Logs\06-10-2024Filesize
224B
MD5eb9e97bb2537d22391bced17bb036876
SHA14fd315c8d0088483af55d9a936b7f286edc8bb7a
SHA2564b155148166659069f7b6e6a148337cb9a014857d6c3666b32d2752f8e64037d
SHA5120885491270c6c1a5e0898c45a25996f93d0059d2722b27c64bae56b2e0391bab78dfde4c1768096c6cabda595685ae81a20e892daf83505004098ca1e50f1a23
-
C:\Users\Admin\AppData\Roaming\Logs\06-10-2024Filesize
224B
MD5b36c3484596ba522014362164ecb56ae
SHA1c5dc90b7cc655497daa7d3eeee7b2362cb16c9e5
SHA25601ad6cb23689af9678fa742b8da660787e901fb2119b8a029553b3bc782b5773
SHA512f8457c62ac20068d585cc26a03bcccceb2fe21baa7bd634db5fafbff507475edbb0a9ac0b148146a0e9fd5ea6c2766f48bfd3bc0eae2b2f35d24cf0ee846fa8a
-
C:\Users\Admin\AppData\Roaming\Logs\06-10-2024MD5
d41d8cd98f00b204e9800998ecf8427e
SHA1da39a3ee5e6b4b0d3255bfef95601890afd80709
SHA256e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855
SHA512cf83e1357eefb8bdf1542850d66d8007d620e4050b5715dc83f4a921d36ce9ce47d0d13c5d85f2b0ff8318d2877eec2f63b931bd47417a81a538327af927da3e
-
C:\Users\Admin\AppData\Roaming\Logs\06-10-2024Filesize
224B
MD559623252d23455ed41b0d9dde6ff4b66
SHA11867df5ebc06799129b73808dc4e1bcbb5c098b8
SHA25654aeca978ca20484d7bc0dd0b4b44130ad9fe7f2e15a391900be747ccdf90382
SHA512c1e7f154f7126398e9068120e23ef102688ec9d11eae52a5b86e7fbb31b279506b330883c67150fd229f4cae8e9b4f13865ec41723b4e58bd0a5885d9127dfb5
-
C:\Users\Admin\AppData\Roaming\Logs\06-10-2024Filesize
224B
MD5774c523127f45c4ed3e5791e81408be9
SHA1d319ea097e82e78290dfd615b6303aa9581e72bd
SHA25648edae334bebd2c6ccab03599f9c30b324f813be086b8a83069b27da1a421664
SHA51295a8d97a671b09f1f232de3c6ab201e8774a07f7a0288c34411b1a8f62b16b872afe591528cb711d80d512910c9332a20bdefdeb27921354ac5f24e3517e9be3
-
C:\Users\Admin\AppData\Roaming\Logs\06-10-2024Filesize
224B
MD568a0c69fc23df5d08088301559d8561b
SHA1417c80189146b868be3e5ccddf60023bfeae8565
SHA256642cf3b7f10ea8d26b80b4b4d2878f230483e9799bb69543c997c451ca623d0f
SHA512b72a1617fff85c081b44462ef675df7c782a83440897e61bf78be581a9244116d3f8898a47a56be166afffb0fdd089bd3bceb4b041f2f9d0fe7bcd5543ee1f0f
-
C:\Users\Admin\AppData\Roaming\SubDir\Client.exeFilesize
409KB
MD5b70fdac25a99501e3cae11f1b775249e
SHA13c59226479bfdcd1b2927bcfb1a7516d4cb8dd71
SHA25651ff3eb450a786c1aaa75ff889f2fd256412a7b75d04277fdf9fcccc20e57246
SHA51243f0d5d6e5f0d5febba537c109ffdbc250bbb6e9725e635a43ec975b0353048eaeee50b6e9274cd5e072ea6b0cea32439bd37408b2528832f467f2075f74ca44
-
memory/1296-6-0x00000000058D0000-0x00000000058E2000-memory.dmpFilesize
72KB
-
memory/1296-7-0x00000000749DE000-0x00000000749DF000-memory.dmpFilesize
4KB
-
memory/1296-1-0x0000000000040000-0x00000000000AC000-memory.dmpFilesize
432KB
-
memory/1296-2-0x0000000004F40000-0x00000000054E4000-memory.dmpFilesize
5.6MB
-
memory/1296-15-0x00000000749D0000-0x0000000075180000-memory.dmpFilesize
7.7MB
-
memory/1296-0-0x00000000749DE000-0x00000000749DF000-memory.dmpFilesize
4KB
-
memory/1296-8-0x00000000749D0000-0x0000000075180000-memory.dmpFilesize
7.7MB
-
memory/1296-3-0x0000000004A80000-0x0000000004B12000-memory.dmpFilesize
584KB
-
memory/1296-4-0x00000000749D0000-0x0000000075180000-memory.dmpFilesize
7.7MB
-
memory/1296-5-0x0000000004B20000-0x0000000004B86000-memory.dmpFilesize
408KB
-
memory/5008-24-0x00000000749D0000-0x0000000075180000-memory.dmpFilesize
7.7MB
-
memory/5008-19-0x0000000006030000-0x000000000603A000-memory.dmpFilesize
40KB
-
memory/5008-16-0x00000000749D0000-0x0000000075180000-memory.dmpFilesize
7.7MB
-
memory/5008-17-0x00000000749D0000-0x0000000075180000-memory.dmpFilesize
7.7MB