Overview
overview
10Static
static
10uni/Uni - ...py.exe
windows7-x64
10uni/Uni - ...py.exe
windows10-2004-x64
10uni/Uni - ...py.exe
windows7-x64
10uni/Uni - ...py.exe
windows10-2004-x64
10uni/Uni - ...py.exe
windows7-x64
10uni/Uni - ...py.exe
windows10-2004-x64
10uni/Uni - ...py.exe
windows7-x64
10uni/Uni - ...py.exe
windows10-2004-x64
10uni/Uni - ...py.exe
windows7-x64
10uni/Uni - ...py.exe
windows10-2004-x64
10uni/Uni - ...py.exe
windows7-x64
10uni/Uni - ...py.exe
windows10-2004-x64
10uni/Uni - ...py.exe
windows7-x64
10uni/Uni - ...py.exe
windows10-2004-x64
10uni/Uni - ...py.exe
windows7-x64
10uni/Uni - ...py.exe
windows10-2004-x64
10uni/Uni - ...py.exe
windows7-x64
10uni/Uni - ...py.exe
windows10-2004-x64
10uni/Uni - ...py.exe
windows7-x64
10uni/Uni - ...py.exe
windows10-2004-x64
10uni/Uni - ...py.exe
windows7-x64
10uni/Uni - ...py.exe
windows10-2004-x64
10uni/Uni - ...py.exe
windows7-x64
10uni/Uni - ...py.exe
windows10-2004-x64
10uni/Uni - ...py.exe
windows7-x64
10uni/Uni - ...py.exe
windows10-2004-x64
10uni/Uni - ...py.exe
windows7-x64
10uni/Uni - ...py.exe
windows10-2004-x64
10uni/Uni - ...py.exe
windows7-x64
10uni/Uni - ...py.exe
windows10-2004-x64
10uni/Uni - ...py.exe
windows7-x64
10uni/Uni - ...py.exe
windows10-2004-x64
10Analysis
-
max time kernel
600s -
max time network
602s -
platform
windows10-2004_x64 -
resource
win10v2004-20240508-en -
resource tags
arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system -
submitted
10-06-2024 15:28
Behavioral task
behavioral1
Sample
uni/Uni - Copy (10) - Copy - Copy - Copy.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
uni/Uni - Copy (10) - Copy - Copy - Copy.exe
Resource
win10v2004-20240426-en
Behavioral task
behavioral3
Sample
uni/Uni - Copy (10) - Copy - Copy.exe
Resource
win7-20240221-en
Behavioral task
behavioral4
Sample
uni/Uni - Copy (10) - Copy - Copy.exe
Resource
win10v2004-20240426-en
Behavioral task
behavioral5
Sample
uni/Uni - Copy (10) - Copy.exe
Resource
win7-20240220-en
Behavioral task
behavioral6
Sample
uni/Uni - Copy (10) - Copy.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral7
Sample
uni/Uni - Copy (11) - Copy - Copy - Copy.exe
Resource
win7-20231129-en
Behavioral task
behavioral8
Sample
uni/Uni - Copy (11) - Copy - Copy - Copy.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral9
Sample
uni/Uni - Copy (11) - Copy - Copy.exe
Resource
win7-20240508-en
Behavioral task
behavioral10
Sample
uni/Uni - Copy (11) - Copy - Copy.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral11
Sample
uni/Uni - Copy (11) - Copy.exe
Resource
win7-20240221-en
Behavioral task
behavioral12
Sample
uni/Uni - Copy (11) - Copy.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral13
Sample
uni/Uni - Copy (12) - Copy - Copy - Copy.exe
Resource
win7-20240508-en
Behavioral task
behavioral14
Sample
uni/Uni - Copy (12) - Copy - Copy - Copy.exe
Resource
win10v2004-20240426-en
Behavioral task
behavioral15
Sample
uni/Uni - Copy (12) - Copy - Copy.exe
Resource
win7-20240508-en
Behavioral task
behavioral16
Sample
uni/Uni - Copy (12) - Copy - Copy.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral17
Sample
uni/Uni - Copy (12) - Copy.exe
Resource
win7-20240221-en
Behavioral task
behavioral18
Sample
uni/Uni - Copy (12) - Copy.exe
Resource
win10v2004-20240426-en
Behavioral task
behavioral19
Sample
uni/Uni - Copy (13) - Copy - Copy - Copy.exe
Resource
win7-20240419-en
Behavioral task
behavioral20
Sample
uni/Uni - Copy (13) - Copy - Copy - Copy.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral21
Sample
uni/Uni - Copy (13) - Copy - Copy.exe
Resource
win7-20240508-en
Behavioral task
behavioral22
Sample
uni/Uni - Copy (13) - Copy - Copy.exe
Resource
win10v2004-20240426-en
Behavioral task
behavioral23
Sample
uni/Uni - Copy (13) - Copy.exe
Resource
win7-20240419-en
Behavioral task
behavioral24
Sample
uni/Uni - Copy (13) - Copy.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral25
Sample
uni/Uni - Copy (14) - Copy - Copy - Copy.exe
Resource
win7-20240221-en
Behavioral task
behavioral26
Sample
uni/Uni - Copy (14) - Copy - Copy - Copy.exe
Resource
win10v2004-20240426-en
Behavioral task
behavioral27
Sample
uni/Uni - Copy (14) - Copy - Copy.exe
Resource
win7-20240508-en
Behavioral task
behavioral28
Sample
uni/Uni - Copy (14) - Copy - Copy.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral29
Sample
uni/Uni - Copy (14) - Copy.exe
Resource
win7-20231129-en
Behavioral task
behavioral30
Sample
uni/Uni - Copy (14) - Copy.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral31
Sample
uni/Uni - Copy (15) - Copy - Copy - Copy.exe
Resource
win7-20240508-en
Behavioral task
behavioral32
Sample
uni/Uni - Copy (15) - Copy - Copy - Copy.exe
Resource
win10v2004-20240508-en
General
-
Target
uni/Uni - Copy (12) - Copy - Copy.exe
-
Size
409KB
-
MD5
b70fdac25a99501e3cae11f1b775249e
-
SHA1
3c59226479bfdcd1b2927bcfb1a7516d4cb8dd71
-
SHA256
51ff3eb450a786c1aaa75ff889f2fd256412a7b75d04277fdf9fcccc20e57246
-
SHA512
43f0d5d6e5f0d5febba537c109ffdbc250bbb6e9725e635a43ec975b0353048eaeee50b6e9274cd5e072ea6b0cea32439bd37408b2528832f467f2075f74ca44
-
SSDEEP
12288:gpbJjGut6AoE3hVVdFaC/eZPTMTDlpgfJCKuMsVs:oVaurMLcDlpRKai
Malware Config
Extracted
quasar
3.1.5
SeroXen
panel-slave.gl.at.ply.gg:57059
panel-slave.gl.at.ply.gg:27892
$Sxr-rpL8EItHN3pqIQQVy2
-
encryption_key
Lme7VBS3l58VwLM69PNM
-
install_name
Client.exe
-
log_directory
Logs
-
reconnect_delay
3000
-
startup_key
SeroXen
-
subdirectory
SubDir
Signatures
-
Quasar payload 2 IoCs
Processes:
resource yara_rule behavioral16/memory/4032-1-0x0000000000420000-0x000000000048C000-memory.dmp family_quasar C:\Users\Admin\AppData\Roaming\SubDir\Client.exe family_quasar -
Checks computer location settings 2 TTPs 28 IoCs
Looks up country code configured in the registry, likely geofence.
Processes:
Client.exeClient.exeClient.exeClient.exeClient.exeClient.exeClient.exeClient.exeClient.exeClient.exeClient.exeClient.exeClient.exeClient.exeClient.exeClient.exeClient.exeClient.exeClient.exeClient.exeClient.exeClient.exeClient.exeClient.exeClient.exeClient.exeClient.exeClient.exedescription ioc process Key value queried \REGISTRY\USER\S-1-5-21-3558294865-3673844354-2255444939-1000\Control Panel\International\Geo\Nation Client.exe Key value queried \REGISTRY\USER\S-1-5-21-3558294865-3673844354-2255444939-1000\Control Panel\International\Geo\Nation Client.exe Key value queried \REGISTRY\USER\S-1-5-21-3558294865-3673844354-2255444939-1000\Control Panel\International\Geo\Nation Client.exe Key value queried \REGISTRY\USER\S-1-5-21-3558294865-3673844354-2255444939-1000\Control Panel\International\Geo\Nation Client.exe Key value queried \REGISTRY\USER\S-1-5-21-3558294865-3673844354-2255444939-1000\Control Panel\International\Geo\Nation Client.exe Key value queried \REGISTRY\USER\S-1-5-21-3558294865-3673844354-2255444939-1000\Control Panel\International\Geo\Nation Client.exe Key value queried \REGISTRY\USER\S-1-5-21-3558294865-3673844354-2255444939-1000\Control Panel\International\Geo\Nation Client.exe Key value queried \REGISTRY\USER\S-1-5-21-3558294865-3673844354-2255444939-1000\Control Panel\International\Geo\Nation Client.exe Key value queried \REGISTRY\USER\S-1-5-21-3558294865-3673844354-2255444939-1000\Control Panel\International\Geo\Nation Client.exe Key value queried \REGISTRY\USER\S-1-5-21-3558294865-3673844354-2255444939-1000\Control Panel\International\Geo\Nation Client.exe Key value queried \REGISTRY\USER\S-1-5-21-3558294865-3673844354-2255444939-1000\Control Panel\International\Geo\Nation Client.exe Key value queried \REGISTRY\USER\S-1-5-21-3558294865-3673844354-2255444939-1000\Control Panel\International\Geo\Nation Client.exe Key value queried \REGISTRY\USER\S-1-5-21-3558294865-3673844354-2255444939-1000\Control Panel\International\Geo\Nation Client.exe Key value queried \REGISTRY\USER\S-1-5-21-3558294865-3673844354-2255444939-1000\Control Panel\International\Geo\Nation Client.exe Key value queried \REGISTRY\USER\S-1-5-21-3558294865-3673844354-2255444939-1000\Control Panel\International\Geo\Nation Client.exe Key value queried \REGISTRY\USER\S-1-5-21-3558294865-3673844354-2255444939-1000\Control Panel\International\Geo\Nation Client.exe Key value queried \REGISTRY\USER\S-1-5-21-3558294865-3673844354-2255444939-1000\Control Panel\International\Geo\Nation Client.exe Key value queried \REGISTRY\USER\S-1-5-21-3558294865-3673844354-2255444939-1000\Control Panel\International\Geo\Nation Client.exe Key value queried \REGISTRY\USER\S-1-5-21-3558294865-3673844354-2255444939-1000\Control Panel\International\Geo\Nation Client.exe Key value queried \REGISTRY\USER\S-1-5-21-3558294865-3673844354-2255444939-1000\Control Panel\International\Geo\Nation Client.exe Key value queried \REGISTRY\USER\S-1-5-21-3558294865-3673844354-2255444939-1000\Control Panel\International\Geo\Nation Client.exe Key value queried \REGISTRY\USER\S-1-5-21-3558294865-3673844354-2255444939-1000\Control Panel\International\Geo\Nation Client.exe Key value queried \REGISTRY\USER\S-1-5-21-3558294865-3673844354-2255444939-1000\Control Panel\International\Geo\Nation Client.exe Key value queried \REGISTRY\USER\S-1-5-21-3558294865-3673844354-2255444939-1000\Control Panel\International\Geo\Nation Client.exe Key value queried \REGISTRY\USER\S-1-5-21-3558294865-3673844354-2255444939-1000\Control Panel\International\Geo\Nation Client.exe Key value queried \REGISTRY\USER\S-1-5-21-3558294865-3673844354-2255444939-1000\Control Panel\International\Geo\Nation Client.exe Key value queried \REGISTRY\USER\S-1-5-21-3558294865-3673844354-2255444939-1000\Control Panel\International\Geo\Nation Client.exe Key value queried \REGISTRY\USER\S-1-5-21-3558294865-3673844354-2255444939-1000\Control Panel\International\Geo\Nation Client.exe -
Executes dropped EXE 29 IoCs
Processes:
Client.exeClient.exeClient.exeClient.exeClient.exeClient.exeClient.exeClient.exeClient.exeClient.exeClient.exeClient.exeClient.exeClient.exeClient.exeClient.exeClient.exeClient.exeClient.exeClient.exeClient.exeClient.exeClient.exeClient.exeClient.exeClient.exeClient.exeClient.exeClient.exepid process 3768 Client.exe 8 Client.exe 3656 Client.exe 2364 Client.exe 3584 Client.exe 908 Client.exe 656 Client.exe 3404 Client.exe 3516 Client.exe 5096 Client.exe 4488 Client.exe 1032 Client.exe 1096 Client.exe 3088 Client.exe 3552 Client.exe 4924 Client.exe 2816 Client.exe 1080 Client.exe 2976 Client.exe 5016 Client.exe 4236 Client.exe 2532 Client.exe 1396 Client.exe 1824 Client.exe 3684 Client.exe 4072 Client.exe 4136 Client.exe 2992 Client.exe 1900 Client.exe -
Looks up external IP address via web service 26 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
Processes:
flow ioc 13 ip-api.com 15 ip-api.com 29 ip-api.com 49 ip-api.com 23 ip-api.com 25 ip-api.com 47 ip-api.com 62 ip-api.com 27 ip-api.com 58 ip-api.com 41 ip-api.com 56 ip-api.com 9 api.ipify.org 38 ip-api.com 43 ip-api.com 52 ip-api.com 21 ip-api.com 33 ip-api.com 35 ip-api.com 2 ip-api.com 45 ip-api.com 54 ip-api.com 60 ip-api.com 17 ip-api.com 19 ip-api.com 31 ip-api.com -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Program crash 28 IoCs
Processes:
WerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exepid pid_target process target process 4660 3768 WerFault.exe Client.exe 3416 8 WerFault.exe Client.exe 4292 3656 WerFault.exe Client.exe 2164 2364 WerFault.exe Client.exe 2708 3584 WerFault.exe Client.exe 3416 908 WerFault.exe Client.exe 4340 656 WerFault.exe Client.exe 2084 3404 WerFault.exe Client.exe 1228 3516 WerFault.exe Client.exe 2016 5096 WerFault.exe Client.exe 4892 4488 WerFault.exe Client.exe 2364 1032 WerFault.exe Client.exe 4684 1096 WerFault.exe Client.exe 1652 3088 WerFault.exe Client.exe 1508 3552 WerFault.exe Client.exe 2688 4924 WerFault.exe Client.exe 3920 2816 WerFault.exe Client.exe 3548 1080 WerFault.exe Client.exe 2500 2976 WerFault.exe Client.exe 1508 5016 WerFault.exe Client.exe 2480 4236 WerFault.exe Client.exe 2088 2532 WerFault.exe Client.exe 952 1396 WerFault.exe Client.exe 5072 1824 WerFault.exe Client.exe 1432 3684 WerFault.exe Client.exe 1500 4072 WerFault.exe Client.exe 3856 4136 WerFault.exe Client.exe 4912 2992 WerFault.exe Client.exe -
Creates scheduled task(s) 1 TTPs 30 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
Processes:
schtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeSCHTASKS.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exepid process 2236 schtasks.exe 3988 schtasks.exe 1016 schtasks.exe 4284 schtasks.exe 4128 schtasks.exe 3320 schtasks.exe 2988 schtasks.exe 2616 schtasks.exe 4440 schtasks.exe 4232 schtasks.exe 2424 schtasks.exe 4860 schtasks.exe 3572 schtasks.exe 4500 schtasks.exe 4884 schtasks.exe 2704 SCHTASKS.exe 840 schtasks.exe 2572 schtasks.exe 4432 schtasks.exe 3896 schtasks.exe 388 schtasks.exe 3180 schtasks.exe 3592 schtasks.exe 5036 schtasks.exe 3336 schtasks.exe 1084 schtasks.exe 3584 schtasks.exe 1292 schtasks.exe 4676 schtasks.exe 5000 schtasks.exe -
Runs ping.exe 1 TTPs 28 IoCs
Processes:
PING.EXEPING.EXEPING.EXEPING.EXEPING.EXEPING.EXEPING.EXEPING.EXEPING.EXEPING.EXEPING.EXEPING.EXEPING.EXEPING.EXEPING.EXEPING.EXEPING.EXEPING.EXEPING.EXEPING.EXEPING.EXEPING.EXEPING.EXEPING.EXEPING.EXEPING.EXEPING.EXEPING.EXEpid process 5028 PING.EXE 4496 PING.EXE 4032 PING.EXE 4448 PING.EXE 2028 PING.EXE 1460 PING.EXE 5000 PING.EXE 1116 PING.EXE 1180 PING.EXE 4464 PING.EXE 2164 PING.EXE 3304 PING.EXE 2928 PING.EXE 908 PING.EXE 5024 PING.EXE 5112 PING.EXE 528 PING.EXE 2400 PING.EXE 2312 PING.EXE 4112 PING.EXE 2912 PING.EXE 2248 PING.EXE 1032 PING.EXE 2388 PING.EXE 1252 PING.EXE 2380 PING.EXE 3960 PING.EXE 4056 PING.EXE -
Suspicious use of AdjustPrivilegeToken 29 IoCs
Processes:
Uni - Copy (12) - Copy - Copy.exeClient.exeClient.exeClient.exeClient.exeClient.exeClient.exeClient.exeClient.exeClient.exeClient.exeClient.exeClient.exeClient.exeClient.exeClient.exeClient.exeClient.exeClient.exeClient.exeClient.exeClient.exeClient.exeClient.exeClient.exeClient.exeClient.exeClient.exeClient.exedescription pid process Token: SeDebugPrivilege 4032 Uni - Copy (12) - Copy - Copy.exe Token: SeDebugPrivilege 3768 Client.exe Token: SeDebugPrivilege 8 Client.exe Token: SeDebugPrivilege 3656 Client.exe Token: SeDebugPrivilege 2364 Client.exe Token: SeDebugPrivilege 3584 Client.exe Token: SeDebugPrivilege 908 Client.exe Token: SeDebugPrivilege 656 Client.exe Token: SeDebugPrivilege 3404 Client.exe Token: SeDebugPrivilege 3516 Client.exe Token: SeDebugPrivilege 5096 Client.exe Token: SeDebugPrivilege 4488 Client.exe Token: SeDebugPrivilege 1032 Client.exe Token: SeDebugPrivilege 1096 Client.exe Token: SeDebugPrivilege 3088 Client.exe Token: SeDebugPrivilege 3552 Client.exe Token: SeDebugPrivilege 4924 Client.exe Token: SeDebugPrivilege 2816 Client.exe Token: SeDebugPrivilege 1080 Client.exe Token: SeDebugPrivilege 2976 Client.exe Token: SeDebugPrivilege 5016 Client.exe Token: SeDebugPrivilege 4236 Client.exe Token: SeDebugPrivilege 2532 Client.exe Token: SeDebugPrivilege 1396 Client.exe Token: SeDebugPrivilege 1824 Client.exe Token: SeDebugPrivilege 3684 Client.exe Token: SeDebugPrivilege 4072 Client.exe Token: SeDebugPrivilege 4136 Client.exe Token: SeDebugPrivilege 2992 Client.exe -
Suspicious use of SetWindowsHookEx 28 IoCs
Processes:
Client.exeClient.exeClient.exeClient.exeClient.exeClient.exeClient.exeClient.exeClient.exeClient.exeClient.exeClient.exeClient.exeClient.exeClient.exeClient.exeClient.exeClient.exeClient.exeClient.exeClient.exeClient.exeClient.exeClient.exeClient.exeClient.exeClient.exeClient.exepid process 3768 Client.exe 8 Client.exe 3656 Client.exe 2364 Client.exe 3584 Client.exe 908 Client.exe 656 Client.exe 3404 Client.exe 3516 Client.exe 5096 Client.exe 4488 Client.exe 1032 Client.exe 1096 Client.exe 3088 Client.exe 3552 Client.exe 4924 Client.exe 2816 Client.exe 1080 Client.exe 2976 Client.exe 5016 Client.exe 4236 Client.exe 2532 Client.exe 1396 Client.exe 1824 Client.exe 3684 Client.exe 4072 Client.exe 4136 Client.exe 2992 Client.exe -
Suspicious use of WriteProcessMemory 64 IoCs
Processes:
Uni - Copy (12) - Copy - Copy.exeClient.execmd.exeClient.execmd.exeClient.execmd.exeClient.execmd.exedescription pid process target process PID 4032 wrote to memory of 2236 4032 Uni - Copy (12) - Copy - Copy.exe schtasks.exe PID 4032 wrote to memory of 2236 4032 Uni - Copy (12) - Copy - Copy.exe schtasks.exe PID 4032 wrote to memory of 2236 4032 Uni - Copy (12) - Copy - Copy.exe schtasks.exe PID 4032 wrote to memory of 3768 4032 Uni - Copy (12) - Copy - Copy.exe Client.exe PID 4032 wrote to memory of 3768 4032 Uni - Copy (12) - Copy - Copy.exe Client.exe PID 4032 wrote to memory of 3768 4032 Uni - Copy (12) - Copy - Copy.exe Client.exe PID 4032 wrote to memory of 2704 4032 Uni - Copy (12) - Copy - Copy.exe SCHTASKS.exe PID 4032 wrote to memory of 2704 4032 Uni - Copy (12) - Copy - Copy.exe SCHTASKS.exe PID 4032 wrote to memory of 2704 4032 Uni - Copy (12) - Copy - Copy.exe SCHTASKS.exe PID 3768 wrote to memory of 3320 3768 Client.exe schtasks.exe PID 3768 wrote to memory of 3320 3768 Client.exe schtasks.exe PID 3768 wrote to memory of 3320 3768 Client.exe schtasks.exe PID 3768 wrote to memory of 1020 3768 Client.exe cmd.exe PID 3768 wrote to memory of 1020 3768 Client.exe cmd.exe PID 3768 wrote to memory of 1020 3768 Client.exe cmd.exe PID 1020 wrote to memory of 1888 1020 cmd.exe chcp.com PID 1020 wrote to memory of 1888 1020 cmd.exe chcp.com PID 1020 wrote to memory of 1888 1020 cmd.exe chcp.com PID 1020 wrote to memory of 5112 1020 cmd.exe PING.EXE PID 1020 wrote to memory of 5112 1020 cmd.exe PING.EXE PID 1020 wrote to memory of 5112 1020 cmd.exe PING.EXE PID 1020 wrote to memory of 8 1020 cmd.exe Client.exe PID 1020 wrote to memory of 8 1020 cmd.exe Client.exe PID 1020 wrote to memory of 8 1020 cmd.exe Client.exe PID 8 wrote to memory of 4432 8 Client.exe schtasks.exe PID 8 wrote to memory of 4432 8 Client.exe schtasks.exe PID 8 wrote to memory of 4432 8 Client.exe schtasks.exe PID 8 wrote to memory of 3232 8 Client.exe cmd.exe PID 8 wrote to memory of 3232 8 Client.exe cmd.exe PID 8 wrote to memory of 3232 8 Client.exe cmd.exe PID 3232 wrote to memory of 1420 3232 cmd.exe chcp.com PID 3232 wrote to memory of 1420 3232 cmd.exe chcp.com PID 3232 wrote to memory of 1420 3232 cmd.exe chcp.com PID 3232 wrote to memory of 5000 3232 cmd.exe PING.EXE PID 3232 wrote to memory of 5000 3232 cmd.exe PING.EXE PID 3232 wrote to memory of 5000 3232 cmd.exe PING.EXE PID 3232 wrote to memory of 3656 3232 cmd.exe Client.exe PID 3232 wrote to memory of 3656 3232 cmd.exe Client.exe PID 3232 wrote to memory of 3656 3232 cmd.exe Client.exe PID 3656 wrote to memory of 2988 3656 Client.exe schtasks.exe PID 3656 wrote to memory of 2988 3656 Client.exe schtasks.exe PID 3656 wrote to memory of 2988 3656 Client.exe schtasks.exe PID 3656 wrote to memory of 3100 3656 Client.exe cmd.exe PID 3656 wrote to memory of 3100 3656 Client.exe cmd.exe PID 3656 wrote to memory of 3100 3656 Client.exe cmd.exe PID 3100 wrote to memory of 4876 3100 cmd.exe chcp.com PID 3100 wrote to memory of 4876 3100 cmd.exe chcp.com PID 3100 wrote to memory of 4876 3100 cmd.exe chcp.com PID 3100 wrote to memory of 3304 3100 cmd.exe PING.EXE PID 3100 wrote to memory of 3304 3100 cmd.exe PING.EXE PID 3100 wrote to memory of 3304 3100 cmd.exe PING.EXE PID 3100 wrote to memory of 2364 3100 cmd.exe Client.exe PID 3100 wrote to memory of 2364 3100 cmd.exe Client.exe PID 3100 wrote to memory of 2364 3100 cmd.exe Client.exe PID 2364 wrote to memory of 4232 2364 Client.exe schtasks.exe PID 2364 wrote to memory of 4232 2364 Client.exe schtasks.exe PID 2364 wrote to memory of 4232 2364 Client.exe schtasks.exe PID 2364 wrote to memory of 3776 2364 Client.exe cmd.exe PID 2364 wrote to memory of 3776 2364 Client.exe cmd.exe PID 2364 wrote to memory of 3776 2364 Client.exe cmd.exe PID 3776 wrote to memory of 2520 3776 cmd.exe chcp.com PID 3776 wrote to memory of 2520 3776 cmd.exe chcp.com PID 3776 wrote to memory of 2520 3776 cmd.exe chcp.com PID 3776 wrote to memory of 3960 3776 cmd.exe PING.EXE
Processes
-
C:\Users\Admin\AppData\Local\Temp\uni\Uni - Copy (12) - Copy - Copy.exe"C:\Users\Admin\AppData\Local\Temp\uni\Uni - Copy (12) - Copy - Copy.exe"1⤵
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\schtasks.exe"schtasks" /create /tn "SeroXen" /sc ONLOGON /tr "C:\Users\Admin\AppData\Local\Temp\uni\Uni - Copy (12) - Copy - Copy.exe" /rl HIGHEST /f2⤵
- Creates scheduled task(s)
-
C:\Users\Admin\AppData\Roaming\SubDir\Client.exe"C:\Users\Admin\AppData\Roaming\SubDir\Client.exe"2⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\schtasks.exe"schtasks" /create /tn "SeroXen" /sc ONLOGON /tr "C:\Users\Admin\AppData\Roaming\SubDir\Client.exe" /rl HIGHEST /f3⤵
- Creates scheduled task(s)
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\WuSRnSuTxKYj.bat" "3⤵
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\chcp.comchcp 650014⤵
-
C:\Windows\SysWOW64\PING.EXEping -n 10 localhost4⤵
- Runs ping.exe
-
C:\Users\Admin\AppData\Roaming\SubDir\Client.exe"C:\Users\Admin\AppData\Roaming\SubDir\Client.exe"4⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\schtasks.exe"schtasks" /create /tn "SeroXen" /sc ONLOGON /tr "C:\Users\Admin\AppData\Roaming\SubDir\Client.exe" /rl HIGHEST /f5⤵
- Creates scheduled task(s)
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\Fz3S3QunkMQu.bat" "5⤵
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\chcp.comchcp 650016⤵
-
C:\Windows\SysWOW64\PING.EXEping -n 10 localhost6⤵
- Runs ping.exe
-
C:\Users\Admin\AppData\Roaming\SubDir\Client.exe"C:\Users\Admin\AppData\Roaming\SubDir\Client.exe"6⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\schtasks.exe"schtasks" /create /tn "SeroXen" /sc ONLOGON /tr "C:\Users\Admin\AppData\Roaming\SubDir\Client.exe" /rl HIGHEST /f7⤵
- Creates scheduled task(s)
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\bIiYDCOK9Zq1.bat" "7⤵
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\chcp.comchcp 650018⤵
-
C:\Windows\SysWOW64\PING.EXEping -n 10 localhost8⤵
- Runs ping.exe
-
C:\Users\Admin\AppData\Roaming\SubDir\Client.exe"C:\Users\Admin\AppData\Roaming\SubDir\Client.exe"8⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\schtasks.exe"schtasks" /create /tn "SeroXen" /sc ONLOGON /tr "C:\Users\Admin\AppData\Roaming\SubDir\Client.exe" /rl HIGHEST /f9⤵
- Creates scheduled task(s)
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\PoXbAuoGjTdR.bat" "9⤵
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\chcp.comchcp 6500110⤵
-
C:\Windows\SysWOW64\PING.EXEping -n 10 localhost10⤵
- Runs ping.exe
-
C:\Users\Admin\AppData\Roaming\SubDir\Client.exe"C:\Users\Admin\AppData\Roaming\SubDir\Client.exe"10⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
-
C:\Windows\SysWOW64\schtasks.exe"schtasks" /create /tn "SeroXen" /sc ONLOGON /tr "C:\Users\Admin\AppData\Roaming\SubDir\Client.exe" /rl HIGHEST /f11⤵
- Creates scheduled task(s)
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\iw3XzmN2AuFD.bat" "11⤵
-
C:\Windows\SysWOW64\chcp.comchcp 6500112⤵
-
C:\Windows\SysWOW64\PING.EXEping -n 10 localhost12⤵
- Runs ping.exe
-
C:\Users\Admin\AppData\Roaming\SubDir\Client.exe"C:\Users\Admin\AppData\Roaming\SubDir\Client.exe"12⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
-
C:\Windows\SysWOW64\schtasks.exe"schtasks" /create /tn "SeroXen" /sc ONLOGON /tr "C:\Users\Admin\AppData\Roaming\SubDir\Client.exe" /rl HIGHEST /f13⤵
- Creates scheduled task(s)
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\5lcNQOlNxNq6.bat" "13⤵
-
C:\Windows\SysWOW64\chcp.comchcp 6500114⤵
-
C:\Windows\SysWOW64\PING.EXEping -n 10 localhost14⤵
- Runs ping.exe
-
C:\Users\Admin\AppData\Roaming\SubDir\Client.exe"C:\Users\Admin\AppData\Roaming\SubDir\Client.exe"14⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
-
C:\Windows\SysWOW64\schtasks.exe"schtasks" /create /tn "SeroXen" /sc ONLOGON /tr "C:\Users\Admin\AppData\Roaming\SubDir\Client.exe" /rl HIGHEST /f15⤵
- Creates scheduled task(s)
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\1N2G44CJYB4f.bat" "15⤵
-
C:\Windows\SysWOW64\chcp.comchcp 6500116⤵
-
C:\Windows\SysWOW64\PING.EXEping -n 10 localhost16⤵
- Runs ping.exe
-
C:\Users\Admin\AppData\Roaming\SubDir\Client.exe"C:\Users\Admin\AppData\Roaming\SubDir\Client.exe"16⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
-
C:\Windows\SysWOW64\schtasks.exe"schtasks" /create /tn "SeroXen" /sc ONLOGON /tr "C:\Users\Admin\AppData\Roaming\SubDir\Client.exe" /rl HIGHEST /f17⤵
- Creates scheduled task(s)
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\KBmNiwQLpqyd.bat" "17⤵
-
C:\Windows\SysWOW64\chcp.comchcp 6500118⤵
-
C:\Windows\SysWOW64\PING.EXEping -n 10 localhost18⤵
- Runs ping.exe
-
C:\Users\Admin\AppData\Roaming\SubDir\Client.exe"C:\Users\Admin\AppData\Roaming\SubDir\Client.exe"18⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
-
C:\Windows\SysWOW64\schtasks.exe"schtasks" /create /tn "SeroXen" /sc ONLOGON /tr "C:\Users\Admin\AppData\Roaming\SubDir\Client.exe" /rl HIGHEST /f19⤵
- Creates scheduled task(s)
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\q5C6MtXvwwio.bat" "19⤵
-
C:\Windows\SysWOW64\chcp.comchcp 6500120⤵
-
C:\Windows\SysWOW64\PING.EXEping -n 10 localhost20⤵
- Runs ping.exe
-
C:\Users\Admin\AppData\Roaming\SubDir\Client.exe"C:\Users\Admin\AppData\Roaming\SubDir\Client.exe"20⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
-
C:\Windows\SysWOW64\schtasks.exe"schtasks" /create /tn "SeroXen" /sc ONLOGON /tr "C:\Users\Admin\AppData\Roaming\SubDir\Client.exe" /rl HIGHEST /f21⤵
- Creates scheduled task(s)
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\5NzfRozY1p1x.bat" "21⤵
-
C:\Windows\SysWOW64\chcp.comchcp 6500122⤵
-
C:\Windows\SysWOW64\PING.EXEping -n 10 localhost22⤵
- Runs ping.exe
-
C:\Users\Admin\AppData\Roaming\SubDir\Client.exe"C:\Users\Admin\AppData\Roaming\SubDir\Client.exe"22⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
-
C:\Windows\SysWOW64\schtasks.exe"schtasks" /create /tn "SeroXen" /sc ONLOGON /tr "C:\Users\Admin\AppData\Roaming\SubDir\Client.exe" /rl HIGHEST /f23⤵
- Creates scheduled task(s)
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\JfmEXjRC5jL7.bat" "23⤵
-
C:\Windows\SysWOW64\chcp.comchcp 6500124⤵
-
C:\Windows\SysWOW64\PING.EXEping -n 10 localhost24⤵
- Runs ping.exe
-
C:\Users\Admin\AppData\Roaming\SubDir\Client.exe"C:\Users\Admin\AppData\Roaming\SubDir\Client.exe"24⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
-
C:\Windows\SysWOW64\schtasks.exe"schtasks" /create /tn "SeroXen" /sc ONLOGON /tr "C:\Users\Admin\AppData\Roaming\SubDir\Client.exe" /rl HIGHEST /f25⤵
- Creates scheduled task(s)
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\NM3zOlcM09iz.bat" "25⤵
-
C:\Windows\SysWOW64\chcp.comchcp 6500126⤵
-
C:\Windows\SysWOW64\PING.EXEping -n 10 localhost26⤵
- Runs ping.exe
-
C:\Users\Admin\AppData\Roaming\SubDir\Client.exe"C:\Users\Admin\AppData\Roaming\SubDir\Client.exe"26⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
-
C:\Windows\SysWOW64\schtasks.exe"schtasks" /create /tn "SeroXen" /sc ONLOGON /tr "C:\Users\Admin\AppData\Roaming\SubDir\Client.exe" /rl HIGHEST /f27⤵
- Creates scheduled task(s)
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\mglfbZcmUaCl.bat" "27⤵
-
C:\Windows\SysWOW64\chcp.comchcp 6500128⤵
-
C:\Windows\SysWOW64\PING.EXEping -n 10 localhost28⤵
- Runs ping.exe
-
C:\Users\Admin\AppData\Roaming\SubDir\Client.exe"C:\Users\Admin\AppData\Roaming\SubDir\Client.exe"28⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
-
C:\Windows\SysWOW64\schtasks.exe"schtasks" /create /tn "SeroXen" /sc ONLOGON /tr "C:\Users\Admin\AppData\Roaming\SubDir\Client.exe" /rl HIGHEST /f29⤵
- Creates scheduled task(s)
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\D4EqgaxyOuL7.bat" "29⤵
-
C:\Windows\SysWOW64\chcp.comchcp 6500130⤵
-
C:\Windows\SysWOW64\PING.EXEping -n 10 localhost30⤵
- Runs ping.exe
-
C:\Users\Admin\AppData\Roaming\SubDir\Client.exe"C:\Users\Admin\AppData\Roaming\SubDir\Client.exe"30⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
-
C:\Windows\SysWOW64\schtasks.exe"schtasks" /create /tn "SeroXen" /sc ONLOGON /tr "C:\Users\Admin\AppData\Roaming\SubDir\Client.exe" /rl HIGHEST /f31⤵
- Creates scheduled task(s)
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\hTUkYKSTo2CO.bat" "31⤵
-
C:\Windows\SysWOW64\chcp.comchcp 6500132⤵
-
C:\Windows\SysWOW64\PING.EXEping -n 10 localhost32⤵
- Runs ping.exe
-
C:\Users\Admin\AppData\Roaming\SubDir\Client.exe"C:\Users\Admin\AppData\Roaming\SubDir\Client.exe"32⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
-
C:\Windows\SysWOW64\schtasks.exe"schtasks" /create /tn "SeroXen" /sc ONLOGON /tr "C:\Users\Admin\AppData\Roaming\SubDir\Client.exe" /rl HIGHEST /f33⤵
- Creates scheduled task(s)
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\lAlWQMddkSZF.bat" "33⤵
-
C:\Windows\SysWOW64\chcp.comchcp 6500134⤵
-
C:\Windows\SysWOW64\PING.EXEping -n 10 localhost34⤵
- Runs ping.exe
-
C:\Users\Admin\AppData\Roaming\SubDir\Client.exe"C:\Users\Admin\AppData\Roaming\SubDir\Client.exe"34⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
-
C:\Windows\SysWOW64\schtasks.exe"schtasks" /create /tn "SeroXen" /sc ONLOGON /tr "C:\Users\Admin\AppData\Roaming\SubDir\Client.exe" /rl HIGHEST /f35⤵
- Creates scheduled task(s)
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\zSY5VH5HoMsP.bat" "35⤵
-
C:\Windows\SysWOW64\chcp.comchcp 6500136⤵
-
C:\Windows\SysWOW64\PING.EXEping -n 10 localhost36⤵
- Runs ping.exe
-
C:\Users\Admin\AppData\Roaming\SubDir\Client.exe"C:\Users\Admin\AppData\Roaming\SubDir\Client.exe"36⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
-
C:\Windows\SysWOW64\schtasks.exe"schtasks" /create /tn "SeroXen" /sc ONLOGON /tr "C:\Users\Admin\AppData\Roaming\SubDir\Client.exe" /rl HIGHEST /f37⤵
- Creates scheduled task(s)
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\Qq0GaIQSig2l.bat" "37⤵
-
C:\Windows\SysWOW64\chcp.comchcp 6500138⤵
-
C:\Windows\SysWOW64\PING.EXEping -n 10 localhost38⤵
- Runs ping.exe
-
C:\Users\Admin\AppData\Roaming\SubDir\Client.exe"C:\Users\Admin\AppData\Roaming\SubDir\Client.exe"38⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
-
C:\Windows\SysWOW64\schtasks.exe"schtasks" /create /tn "SeroXen" /sc ONLOGON /tr "C:\Users\Admin\AppData\Roaming\SubDir\Client.exe" /rl HIGHEST /f39⤵
- Creates scheduled task(s)
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\Z2FZ0GN1qszR.bat" "39⤵
-
C:\Windows\SysWOW64\chcp.comchcp 6500140⤵
-
C:\Windows\SysWOW64\PING.EXEping -n 10 localhost40⤵
- Runs ping.exe
-
C:\Users\Admin\AppData\Roaming\SubDir\Client.exe"C:\Users\Admin\AppData\Roaming\SubDir\Client.exe"40⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
-
C:\Windows\SysWOW64\schtasks.exe"schtasks" /create /tn "SeroXen" /sc ONLOGON /tr "C:\Users\Admin\AppData\Roaming\SubDir\Client.exe" /rl HIGHEST /f41⤵
- Creates scheduled task(s)
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\JZzqfrvOcFNo.bat" "41⤵
-
C:\Windows\SysWOW64\chcp.comchcp 6500142⤵
-
C:\Windows\SysWOW64\PING.EXEping -n 10 localhost42⤵
- Runs ping.exe
-
C:\Users\Admin\AppData\Roaming\SubDir\Client.exe"C:\Users\Admin\AppData\Roaming\SubDir\Client.exe"42⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
-
C:\Windows\SysWOW64\schtasks.exe"schtasks" /create /tn "SeroXen" /sc ONLOGON /tr "C:\Users\Admin\AppData\Roaming\SubDir\Client.exe" /rl HIGHEST /f43⤵
- Creates scheduled task(s)
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\rPTnDMrWpF9J.bat" "43⤵
-
C:\Windows\SysWOW64\chcp.comchcp 6500144⤵
-
C:\Windows\SysWOW64\PING.EXEping -n 10 localhost44⤵
- Runs ping.exe
-
C:\Users\Admin\AppData\Roaming\SubDir\Client.exe"C:\Users\Admin\AppData\Roaming\SubDir\Client.exe"44⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
-
C:\Windows\SysWOW64\schtasks.exe"schtasks" /create /tn "SeroXen" /sc ONLOGON /tr "C:\Users\Admin\AppData\Roaming\SubDir\Client.exe" /rl HIGHEST /f45⤵
- Creates scheduled task(s)
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\HnvyINCijZIf.bat" "45⤵
-
C:\Windows\SysWOW64\chcp.comchcp 6500146⤵
-
C:\Windows\SysWOW64\PING.EXEping -n 10 localhost46⤵
- Runs ping.exe
-
C:\Users\Admin\AppData\Roaming\SubDir\Client.exe"C:\Users\Admin\AppData\Roaming\SubDir\Client.exe"46⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
-
C:\Windows\SysWOW64\schtasks.exe"schtasks" /create /tn "SeroXen" /sc ONLOGON /tr "C:\Users\Admin\AppData\Roaming\SubDir\Client.exe" /rl HIGHEST /f47⤵
- Creates scheduled task(s)
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\uH3lNTQSTKIE.bat" "47⤵
-
C:\Windows\SysWOW64\chcp.comchcp 6500148⤵
-
C:\Windows\SysWOW64\PING.EXEping -n 10 localhost48⤵
- Runs ping.exe
-
C:\Users\Admin\AppData\Roaming\SubDir\Client.exe"C:\Users\Admin\AppData\Roaming\SubDir\Client.exe"48⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
-
C:\Windows\SysWOW64\schtasks.exe"schtasks" /create /tn "SeroXen" /sc ONLOGON /tr "C:\Users\Admin\AppData\Roaming\SubDir\Client.exe" /rl HIGHEST /f49⤵
- Creates scheduled task(s)
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\amzIFKpWitzh.bat" "49⤵
-
C:\Windows\SysWOW64\chcp.comchcp 6500150⤵
-
C:\Windows\SysWOW64\PING.EXEping -n 10 localhost50⤵
- Runs ping.exe
-
C:\Users\Admin\AppData\Roaming\SubDir\Client.exe"C:\Users\Admin\AppData\Roaming\SubDir\Client.exe"50⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
-
C:\Windows\SysWOW64\schtasks.exe"schtasks" /create /tn "SeroXen" /sc ONLOGON /tr "C:\Users\Admin\AppData\Roaming\SubDir\Client.exe" /rl HIGHEST /f51⤵
- Creates scheduled task(s)
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\0ARTKKAhdD83.bat" "51⤵
-
C:\Windows\SysWOW64\chcp.comchcp 6500152⤵
-
C:\Windows\SysWOW64\PING.EXEping -n 10 localhost52⤵
- Runs ping.exe
-
C:\Users\Admin\AppData\Roaming\SubDir\Client.exe"C:\Users\Admin\AppData\Roaming\SubDir\Client.exe"52⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
-
C:\Windows\SysWOW64\schtasks.exe"schtasks" /create /tn "SeroXen" /sc ONLOGON /tr "C:\Users\Admin\AppData\Roaming\SubDir\Client.exe" /rl HIGHEST /f53⤵
- Creates scheduled task(s)
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\W4rCyHHHjJsE.bat" "53⤵
-
C:\Windows\SysWOW64\chcp.comchcp 6500154⤵
-
C:\Windows\SysWOW64\PING.EXEping -n 10 localhost54⤵
- Runs ping.exe
-
C:\Users\Admin\AppData\Roaming\SubDir\Client.exe"C:\Users\Admin\AppData\Roaming\SubDir\Client.exe"54⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
-
C:\Windows\SysWOW64\schtasks.exe"schtasks" /create /tn "SeroXen" /sc ONLOGON /tr "C:\Users\Admin\AppData\Roaming\SubDir\Client.exe" /rl HIGHEST /f55⤵
- Creates scheduled task(s)
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\xSJN3IcTed2a.bat" "55⤵
-
C:\Windows\SysWOW64\chcp.comchcp 6500156⤵
-
C:\Windows\SysWOW64\PING.EXEping -n 10 localhost56⤵
- Runs ping.exe
-
C:\Users\Admin\AppData\Roaming\SubDir\Client.exe"C:\Users\Admin\AppData\Roaming\SubDir\Client.exe"56⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
-
C:\Windows\SysWOW64\schtasks.exe"schtasks" /create /tn "SeroXen" /sc ONLOGON /tr "C:\Users\Admin\AppData\Roaming\SubDir\Client.exe" /rl HIGHEST /f57⤵
- Creates scheduled task(s)
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\gW9FZYyN03HX.bat" "57⤵
-
C:\Windows\SysWOW64\chcp.comchcp 6500158⤵
-
C:\Windows\SysWOW64\PING.EXEping -n 10 localhost58⤵
- Runs ping.exe
-
C:\Users\Admin\AppData\Roaming\SubDir\Client.exe"C:\Users\Admin\AppData\Roaming\SubDir\Client.exe"58⤵
- Executes dropped EXE
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2992 -s 166057⤵
- Program crash
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4136 -s 223255⤵
- Program crash
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4072 -s 223653⤵
- Program crash
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3684 -s 170451⤵
- Program crash
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1824 -s 109249⤵
- Program crash
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1396 -s 168847⤵
- Program crash
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2532 -s 170845⤵
- Program crash
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4236 -s 223243⤵
- Program crash
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 5016 -s 168041⤵
- Program crash
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2976 -s 109639⤵
- Program crash
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1080 -s 225237⤵
- Program crash
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2816 -s 169635⤵
- Program crash
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4924 -s 109633⤵
- Program crash
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3552 -s 223231⤵
- Program crash
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3088 -s 108829⤵
- Program crash
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1096 -s 223627⤵
- Program crash
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1032 -s 222825⤵
- Program crash
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4488 -s 173223⤵
- Program crash
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 5096 -s 167221⤵
- Program crash
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3516 -s 109219⤵
- Program crash
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3404 -s 109217⤵
- Program crash
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 656 -s 170815⤵
- Program crash
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 908 -s 108813⤵
- Program crash
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3584 -s 108811⤵
- Program crash
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2364 -s 22009⤵
- Program crash
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3656 -s 21967⤵
- Program crash
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 8 -s 21965⤵
- Program crash
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3768 -s 19163⤵
- Program crash
-
C:\Windows\SysWOW64\SCHTASKS.exe"SCHTASKS.exe" /create /tn "$77Uni - Copy (12) - Copy - Copy.exe" /tr "'C:\Users\Admin\AppData\Local\Temp\uni\Uni - Copy (12) - Copy - Copy.exe'" /sc onlogon /rl HIGHEST2⤵
- Creates scheduled task(s)
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 432 -p 3768 -ip 37681⤵
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 508 -p 8 -ip 81⤵
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 480 -p 3656 -ip 36561⤵
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 480 -p 2364 -ip 23641⤵
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 384 -p 3584 -ip 35841⤵
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 528 -p 908 -ip 9081⤵
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 516 -p 656 -ip 6561⤵
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 544 -p 3404 -ip 34041⤵
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 548 -p 3516 -ip 35161⤵
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 432 -p 5096 -ip 50961⤵
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 544 -p 4488 -ip 44881⤵
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 412 -p 1032 -ip 10321⤵
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 520 -p 1096 -ip 10961⤵
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 428 -p 3088 -ip 30881⤵
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 560 -p 3552 -ip 35521⤵
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 432 -p 4924 -ip 49241⤵
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 576 -p 2816 -ip 28161⤵
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 556 -p 1080 -ip 10801⤵
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 620 -p 2976 -ip 29761⤵
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 604 -p 5016 -ip 50161⤵
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 616 -p 4236 -ip 42361⤵
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 608 -p 2532 -ip 25321⤵
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 576 -p 1396 -ip 13961⤵
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 632 -p 1824 -ip 18241⤵
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 580 -p 3684 -ip 36841⤵
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 572 -p 4072 -ip 40721⤵
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 632 -p 4136 -ip 41361⤵
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 576 -p 2992 -ip 29921⤵
Network
MITRE ATT&CK Matrix ATT&CK v13
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Local\Temp\1N2G44CJYB4f.batFilesize
207B
MD5976cea1769c22a9167363f08e5e26018
SHA15c75ef7411ea85df83f107410a830d03fb3b6acb
SHA256dbd52e2cd9ff0d0e41173cfe08abb2e1ca12d44f72670d370e04ba29c3f6db76
SHA5123a78f63e2c8f73d34bf718cab41e040b53944ee051ce5e6c768d26aea2502e51e9ac66fbd7fa5969e78122587d9aa04a0a5904ca62c55a83da8da660018b2b99
-
C:\Users\Admin\AppData\Local\Temp\5NzfRozY1p1x.batFilesize
207B
MD5c92ac013eac2f9e5866d75664a93f985
SHA15caafed24097046676690dac3e28090da82b6f03
SHA256c861dbde1370094975163b75789e84c595bdf15c00730997525c4192c4412fa0
SHA512be7c76b900e6b5808f497e80297ff905662b19b323e4f6ac2285306b058d3577bbf305fa8d99bfad97bf6c9e0d7190bc4b5766a0546f291b5f50eae922356f96
-
C:\Users\Admin\AppData\Local\Temp\5lcNQOlNxNq6.batFilesize
207B
MD5deccdbebed176188afbe8a4cc97455e1
SHA13c5ebedd0c214023f6386f46b15d130d0fcf76d0
SHA256adc395d0d2ca45eb4186c0e934a13bda7184eec70d62b0264d8bf849790ed5ed
SHA512abdf45f2d2a4a31a954728e42df4bc8b648c8565028d7e641649d467b7dc288d896090089ec223c4065c2ab8399c9d719e082aa37926209dec0bcad4512cc31c
-
C:\Users\Admin\AppData\Local\Temp\D4EqgaxyOuL7.batFilesize
207B
MD5f7ad7e35518cf3b838fb7e3ab6419119
SHA11e4587744863210c556a4b6516815c9b81e11f78
SHA256bedbdbc23bdc18c9ce480809b3ab9aa2cf88119f9bb0083327098a46e9bfcf23
SHA512865d1afade0102b0fe34a6e47efe3ba4bd5cd2d81e4a1848b9faaf9cf43cfb3fa1c3296d1e42d7bd130b6d8f1e0d4bfd1af5da0b11916dcd04bb1a6aace103a7
-
C:\Users\Admin\AppData\Local\Temp\Fz3S3QunkMQu.batFilesize
207B
MD5385f5b1049597314e39a0f826fc94f0e
SHA11d9effc1b9861d65cf3013442c23eb76eb8751d9
SHA2560aef9e32bbeb5f4b49934338b930fd2996cde3306c249422771f42a584839c52
SHA512a9c4215ac6be503854c850d5286dc33b8dd92ae09fe99f5465918266512927ed1a0181546bd90a6f93eedc306237de95cef4e1cd997743b8ae2aef4ecd3236fa
-
C:\Users\Admin\AppData\Local\Temp\JZzqfrvOcFNo.batFilesize
207B
MD5531be0303164b8b3dd8bc34190ae395d
SHA19d957799c85559cfd9a023a8e7a55b422fcba06b
SHA2562effbd5fcc75bf6466b46a23bbc27f9e8d81c06f78195a5b6bc2b7d952acca3a
SHA5125cc9418e98d486184fce9390130a061f5bb90b36283534c4839dd5e685fd18fa40fa4b09dd5bd64532453fdb8920f3649e1c195f17c2f4e594e51c91c562be57
-
C:\Users\Admin\AppData\Local\Temp\JfmEXjRC5jL7.batFilesize
207B
MD557583d8311c2141a930bd92d7ef6723c
SHA11820c8b4ed20a79ec35d558d1db30a8f7aa5ae02
SHA2562c158b9d1c0c1c43ebf090c540ffdb5382b36bd87c564061e38d5074b1114a13
SHA5128ff6c0bdff65568b5087bda531450bc7b798afcd5f9be08b9f47a4555f98c0723a1424b4fcbb9f68c3b2f1cfe9c1996151a06de2f43dfe6f47f32e5cfe6aa224
-
C:\Users\Admin\AppData\Local\Temp\KBmNiwQLpqyd.batFilesize
207B
MD5b915e6912fca767229577885cedb224c
SHA16853470450174ca2754b18015f72dc426a10db37
SHA2567d4a4ff56f732b4630a04866e12431984e8a2e0c922112b72479ce7c77f63b2a
SHA512dcf6837f5b4ee221b365df553df890ccfb62564f35cae9ace1366ffc3d25d464920db2393cb8991575ae44006354659d2016ee3d268ea7490ceb33fefc0fdddc
-
C:\Users\Admin\AppData\Local\Temp\NM3zOlcM09iz.batFilesize
207B
MD56e8650a199ba9e53e568193d6e2ada84
SHA1d17b61287144bdcd594b88084189e502723ee84a
SHA2560c2440c286823403e9586206a8e3427eabb5480bb42eeb2bf909c97e049c09bf
SHA512382ec11f74b44cdbe5cfc41ede267a10a2ad16c98ce1bdeb604e9c07710ba233451500079f1800acba14ac5b80a0138a35a63b81648bb1b4b81a70340b0a57d6
-
C:\Users\Admin\AppData\Local\Temp\PoXbAuoGjTdR.batFilesize
207B
MD586952a486e47eb8d33d5d82f37ac5a17
SHA16037f8d7dac81204d4ab2c97964e4b9161740132
SHA2569d6974750a04c8a3e4f89d0baa9f11c16b3dde53bcae09015d797b8564771d77
SHA51205b572f3f1a317edee0d7c85a20deec048408c8764b5e813d90ccaa78a55f6973ec8d87eb62ad4c77c005ddefe1ce44a9d0fb79268fa58f0d8d2d6dfa34267be
-
C:\Users\Admin\AppData\Local\Temp\Qq0GaIQSig2l.batFilesize
207B
MD56c09815feccf1d421857272775205ac8
SHA15c3a255b3910e434c2af5530915279fa3c3be65e
SHA256138a621649e189562601eef41fa6560fc7231241a3baf428f270dc7195ea32ed
SHA51239f01fccec75a27640b2ba20d83c39afbfa13e43957e2e446019be562dd64c0b9b7b9afe1dd00bf9555f6f25273d9a8468c526a6aeb93d264cdb1ef4f90f98c5
-
C:\Users\Admin\AppData\Local\Temp\WuSRnSuTxKYj.batFilesize
207B
MD5b951a4ba3f9c1e30d70733f482ae5b1c
SHA19e35dc8180b301e1fabd6f38e7e1106ef5b1c7ac
SHA2563a502fddcaf07d247bb95aa7bdef9949ffa693485ca9e670e04f4b88564d9fa5
SHA5123154a37225542e45cff38965c90d402975e1f2d8bcc48c101c5f964ce62eb82a750c3cc682157f59d02497fde549966408e4dfa79b883bd7644704a8b017c799
-
C:\Users\Admin\AppData\Local\Temp\Z2FZ0GN1qszR.batFilesize
207B
MD56d3be12e3219fae6aac4c501a0564326
SHA12147cfa9326f45e819375beee28ea878911dd7d0
SHA25691f803c31df2e0d272b4622572ed4567ebcaf8c7a9e46de83c007b951099cc40
SHA512aeaec096a93595b897b4426afab7af1e403890c221675f606a1afd66e8af1dda33ffed1f4856a8eb91959e486bf573931040254092dcb64980e6476a0687f19c
-
C:\Users\Admin\AppData\Local\Temp\bIiYDCOK9Zq1.batFilesize
207B
MD5989019984fea1e78233d9f0ae0f12e3f
SHA17043f8b9fbb891ba5f0f744ebf55dc72416be0f4
SHA256c5d1734166a90a8b8d3ac160480f8a7b0db8d665da0bf0304d9ddd2e862af85d
SHA5124706e123990915569632b97f5f046033a8289aff4fd4b6e0527e2e918befead36f5c814cdd15ae78f622a059ab6dc0abafa2a4e80fd5e171ef6b1c21e2621d39
-
C:\Users\Admin\AppData\Local\Temp\hTUkYKSTo2CO.batFilesize
207B
MD577253dbc21f19349afa4ca3f58414b66
SHA1605ae42e97478e696a8b4749525a8905ed723565
SHA256280c03925ea416145189334ff71b2f9478792c7cab5b659addc7f5b94fcb5b2f
SHA512883b98c34b217134ce5489458284faa0cea8d5385ad2aab026d7327964d70c78d064482a3e31d4b698d4ee6f32dc245ed64a14b0543adf8e4768c820956dd632
-
C:\Users\Admin\AppData\Local\Temp\iw3XzmN2AuFD.batFilesize
207B
MD54db9df7915b6fa8f7b8c37e11ff62a37
SHA1c12b6b4e88e0dc8731237ad6b4c213b1c66919be
SHA256289b85c745d5355c0af5d515366f299b5f307efdd52b852d92b0629c5d21e216
SHA512ea23d0ecd62e81d01b77095f8d38556fd327dffdf4ff26f26e5dde1f1c307ec08ebdd5e73f9a963c4478f203e7bcaa892581a751ffc8becac3c77902435be161
-
C:\Users\Admin\AppData\Local\Temp\lAlWQMddkSZF.batFilesize
207B
MD5bce30bfda236ab3833d5cba05df2b6fb
SHA1cbeb3c1db2389fc65b47a8cca09ae277935fb0ce
SHA256a8ec9655c62f62b47b7184aa7e8f9133c1a2220762ffdac7bd14422ffa635ff5
SHA51220093f23f1132f8bc0a102e4314847da9feca2b19b2ca53934ea6323f50ea3123e0b1ec6559fb708aecf1cb3af0897a83f5f2ec2fbc85f83568ea51a3ca50558
-
C:\Users\Admin\AppData\Local\Temp\mglfbZcmUaCl.batFilesize
207B
MD5c905300e860872f4a7136ad338932226
SHA10e8ed47c006bee345148327ded7cc0736a472622
SHA256c3bde2aea093f004156ea4c4fbc685fec860b0182dce701ab75540329615b99e
SHA512c7f680690f0df651f460cde3cccac602845f3231bc98c5a31ea09ad82728e5c1fbc0b206dc339ab47a5fee38eefdfbef07710fc2709b89ff1ad95c923b688257
-
C:\Users\Admin\AppData\Local\Temp\q5C6MtXvwwio.batFilesize
207B
MD56025cef59408fb0f5c722f894939f861
SHA19c904ee45897cb989ced2ca766422264c9ace8dc
SHA2560a697bb3fadd1ee37da2e35e0f4a2a286c0860764c421542e0fa886ee39d9456
SHA5126015e66ce6c95c182c1151fb273200e3613fc063030caf39d0fc6ff7acbf14be7cfbbfb2ab59118864bfa75f300a29a0b8b777fc8a4983c63475dbbd01182619
-
C:\Users\Admin\AppData\Local\Temp\rPTnDMrWpF9J.batFilesize
207B
MD531eb5f2940d8331d7699492cc04b82c3
SHA1af675870336584b87bf6fccb8164799bc1e90a34
SHA256179fc2651a0d59a8489f8ab1c0bef0e6bfc1a46c7931f347f800655fd80332d8
SHA512a96c0e6895284a38fbbd05681a30bb58e5852105224ad1e2cfa5c50dfe138d99f665fbaac7b443b7c48298970bb4bf6240e30bc5a46933fd6c04f6dbe16c4996
-
C:\Users\Admin\AppData\Local\Temp\zSY5VH5HoMsP.batFilesize
207B
MD5617f7d858be1d597b25e21dce07642ab
SHA1065ca6b353312fd84c7c007f2d48c7ff06ef56d8
SHA2565a9935676e7a085502efba21ece755f39025d70cb3dcd37c06b1875b4507f5dd
SHA5128a265650556f5e25c823f0a7f06e774634fb606d2673ccd2a78dff4044a59d358d58ac0d8642eb9809e8ab620931818069845f6047c751b09f63a32e16029144
-
C:\Users\Admin\AppData\Roaming\Logs\06-10-2024Filesize
224B
MD5938de5a697e11c67fdd655ef311548b0
SHA1d4bf26042927f07533ce67f4fa39353f2b83714e
SHA256b3250da1ef0eda4a3b5f7d3b27db3b2da645fe93941e6b227132946178a5c4ea
SHA512f95174defc7d355416b4ac004af73e6d2706a71bf5de7c38cc4f61f4fce359ea75d4beb47750a5aa72f78a1322f50880d5b3aa7d652138a0e4382e1eeacab7c3
-
C:\Users\Admin\AppData\Roaming\Logs\06-10-2024Filesize
224B
MD5ed80ab401320492668ec1be3a3906324
SHA19f5e35086adcdd71deb04b85f90b4083a4ccb5ab
SHA2561e110855b30818912d26ea82e9eb8346a02bbe2e23e077c373cafb1e0f90d4e4
SHA51298b1d143dd7b681d473384eb59e2e9d4bb63fb7c92a0a72ee95b90c44cb50e1129de4afffcb05ae092f75b8550166df3448039eddc3d034779ce874c74fb95d0
-
C:\Users\Admin\AppData\Roaming\Logs\06-10-2024Filesize
224B
MD53770533c9e32286cbfa5fd5f00fc84f9
SHA19e65cb9aeadfdba226a7447b8d52393ae7e8b405
SHA256e886ed865bcc5820f2a25652422db0e08ea6270c0cc444c813ccd67675e0baf8
SHA5121c6bbf32b7fca4fd6f4bb3993bf6b193aafd1ee06610d1d2b3945a7995eda9d8014735f107def848cd290552a0e59fe3e513a96defa4d18a2ad2271a8480b8ce
-
C:\Users\Admin\AppData\Roaming\Logs\06-10-2024Filesize
224B
MD5915e0abebfa00a8285a6ed124e37282a
SHA117a676e5da78c51302e3b35db2226dbe32225c40
SHA25693145b406e6ee28fea5b86aed36f251c057fba39482cd4a2e54cf2e148cadadd
SHA5128bb7f0ca86337c712e9ecf82eae1db386208962952e8453173c15835d53d25e82ff00148e9e7c48ea0e672c091acf02ee3d583118a161030a0c913fe46098eed
-
C:\Users\Admin\AppData\Roaming\Logs\06-10-2024Filesize
224B
MD5d4006d2826da7fb831487f03208424c9
SHA15519d6fd9bd02c036327ccd4dcc7b4cca9814cb2
SHA256efe446434efd2f634afc5576ecfb362781037e1e3caf6bd1c17dc7495e4d6710
SHA51246786e494be31c704b551754340b087a966d4a22495ba5c241b4112542a3332244aa0fb9ad67f381e22374f26d454b8346ca07c1d15a5b7ecf6c254d6b53ac15
-
C:\Users\Admin\AppData\Roaming\Logs\06-10-2024Filesize
224B
MD59b106fccf50fca872e1a931a8983e29c
SHA162be1f2f5751b8ac6c563f720299a1713ebd20a2
SHA2561c6ab68b58c3cc7c41d7ea4cedfb9a784daf319167188f556804a61f00aad346
SHA5123719ea1740d8a78396f396c863db72e79fce7ff4674fc8649189d8228327bd156d16c85d609da529f69591c9d13c8ed066e479f0f25acfaf3d101c8a210604d4
-
C:\Users\Admin\AppData\Roaming\Logs\06-10-2024Filesize
224B
MD50decbcd8eea1401b39a85a9e59bb9618
SHA1d813851106070c7b9f425729e4c40c527723c0af
SHA25663fc2bd95f89fa7b6f8e52c561a6cc3461ec78ed78e1207e755040a9df18be9a
SHA512cf155fd9a34c3d8d281f2dc9b09968fc220496775933164df380e259f90420e75f131b50f48eb5b03810dcd0135a781e62f202fa9be968bef9b00c5a75146430
-
C:\Users\Admin\AppData\Roaming\Logs\06-10-2024Filesize
224B
MD515adfd1ae4f53764de5a40e1ac660ba0
SHA187aa7815906d0d45cdb746e52b88f3e54c2141c2
SHA2562495dafb9b8360b5498f9f75dac5f01affcf63c277f509252df7230b60c2f90e
SHA5120778231b881abe1302e3e403d0aea7affaea32b893bc955c8aaa72771a80fcc30d946880c09fba55b5fe8bcc1334250e90320f72416228d62fa8b4720e187112
-
C:\Users\Admin\AppData\Roaming\Logs\06-10-2024MD5
d41d8cd98f00b204e9800998ecf8427e
SHA1da39a3ee5e6b4b0d3255bfef95601890afd80709
SHA256e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855
SHA512cf83e1357eefb8bdf1542850d66d8007d620e4050b5715dc83f4a921d36ce9ce47d0d13c5d85f2b0ff8318d2877eec2f63b931bd47417a81a538327af927da3e
-
C:\Users\Admin\AppData\Roaming\Logs\06-10-2024Filesize
224B
MD5e5b03f5826dd38bf941e2dd745440713
SHA1745bbe489724e8d81c66c8f5b3bd90ab79a9d0ca
SHA256952b1450142c0b3abf6a287bb81bf08859d013eea4f70bebcb727eaffaf46bef
SHA5120d679033a08d7e16997e3f7ab2093a383b8f33e2fa0c98f129b8c004967d0135ff26488b9eefc66eea51fb7008e71e98b56d2087615b6825489a46b7177e5231
-
C:\Users\Admin\AppData\Roaming\Logs\06-10-2024Filesize
224B
MD5dcd1d14d8f9db9d993aaadf319067e10
SHA1285687cf658bde4cf318eb0672dbdd23e5e8f1dd
SHA256f327fc44c959354a75952c931f897ded7e25c6b82094bb2c922a01423587539e
SHA5122c317635456f7f22fbd1af8cda50a5ee523a91d7692548b366ffb28f3c51ec71294acd4bd12b5c9142b5f55c018d6d13f3ab1c9a090a78758689951ded67c71c
-
C:\Users\Admin\AppData\Roaming\Logs\06-10-2024Filesize
224B
MD567637df074828b6d7a4e3698a5bd9768
SHA161bd39ffa993d1ed6f3d4c42031fef7e839374eb
SHA256dce44de9e01be74eea92b3eac2dde5f23fc8ee8456f362fde549c37e686cdb10
SHA51270e4cf4ce7b3696d4d84d234864158147a68f447b1919816830204ac7474006b932ccf1215e90d5265ea72a6d9e24ed2e7e63255d42fef97cb6d8f710cc1668f
-
C:\Users\Admin\AppData\Roaming\Logs\06-10-2024Filesize
224B
MD5c8d885b29bbcf27f1cbae1fda763eda7
SHA1eb3b80f3d76a356771ba3aed04ec41023b12ae75
SHA25619c2abf746ee177a1bae382ca555b24edf9ea9faabbf23037937df0002ba165a
SHA512103455bc6e89766e1f481212b9c4c3f103e7ad43cac54968abf8930aa225602a400f7287732763a59b268a1e47801300cf6df6577283b4f2f708007d884d5da8
-
C:\Users\Admin\AppData\Roaming\SubDir\Client.exeFilesize
409KB
MD5b70fdac25a99501e3cae11f1b775249e
SHA13c59226479bfdcd1b2927bcfb1a7516d4cb8dd71
SHA25651ff3eb450a786c1aaa75ff889f2fd256412a7b75d04277fdf9fcccc20e57246
SHA51243f0d5d6e5f0d5febba537c109ffdbc250bbb6e9725e635a43ec975b0353048eaeee50b6e9274cd5e072ea6b0cea32439bd37408b2528832f467f2075f74ca44
-
memory/3768-14-0x0000000075230000-0x00000000759E0000-memory.dmpFilesize
7.7MB
-
memory/3768-24-0x0000000075230000-0x00000000759E0000-memory.dmpFilesize
7.7MB
-
memory/3768-19-0x0000000005FE0000-0x0000000005FEA000-memory.dmpFilesize
40KB
-
memory/3768-17-0x0000000075230000-0x00000000759E0000-memory.dmpFilesize
7.7MB
-
memory/4032-16-0x0000000075230000-0x00000000759E0000-memory.dmpFilesize
7.7MB
-
memory/4032-0-0x000000007523E000-0x000000007523F000-memory.dmpFilesize
4KB
-
memory/4032-8-0x0000000075230000-0x00000000759E0000-memory.dmpFilesize
7.7MB
-
memory/4032-7-0x000000007523E000-0x000000007523F000-memory.dmpFilesize
4KB
-
memory/4032-6-0x0000000005BC0000-0x0000000005BD2000-memory.dmpFilesize
72KB
-
memory/4032-5-0x0000000004F60000-0x0000000004FC6000-memory.dmpFilesize
408KB
-
memory/4032-4-0x0000000075230000-0x00000000759E0000-memory.dmpFilesize
7.7MB
-
memory/4032-3-0x0000000004EC0000-0x0000000004F52000-memory.dmpFilesize
584KB
-
memory/4032-2-0x00000000053D0000-0x0000000005974000-memory.dmpFilesize
5.6MB
-
memory/4032-1-0x0000000000420000-0x000000000048C000-memory.dmpFilesize
432KB