Overview
overview
10Static
static
10uni/Uni - ...py.exe
windows7-x64
10uni/Uni - ...py.exe
windows10-2004-x64
10uni/Uni - ...py.exe
windows7-x64
10uni/Uni - ...py.exe
windows10-2004-x64
10uni/Uni - ...py.exe
windows7-x64
10uni/Uni - ...py.exe
windows10-2004-x64
10uni/Uni - ...py.exe
windows7-x64
10uni/Uni - ...py.exe
windows10-2004-x64
10uni/Uni - ...py.exe
windows7-x64
10uni/Uni - ...py.exe
windows10-2004-x64
10uni/Uni - ...py.exe
windows7-x64
10uni/Uni - ...py.exe
windows10-2004-x64
10uni/Uni - ...py.exe
windows7-x64
10uni/Uni - ...py.exe
windows10-2004-x64
10uni/Uni - ...py.exe
windows7-x64
10uni/Uni - ...py.exe
windows10-2004-x64
10uni/Uni - ...py.exe
windows7-x64
10uni/Uni - ...py.exe
windows10-2004-x64
10uni/Uni - ...py.exe
windows7-x64
10uni/Uni - ...py.exe
windows10-2004-x64
10uni/Uni - ...py.exe
windows7-x64
10uni/Uni - ...py.exe
windows10-2004-x64
10uni/Uni - ...py.exe
windows7-x64
10uni/Uni - ...py.exe
windows10-2004-x64
10uni/Uni - ...py.exe
windows7-x64
10uni/Uni - ...py.exe
windows10-2004-x64
10uni/Uni - ...py.exe
windows7-x64
10uni/Uni - ...py.exe
windows10-2004-x64
10uni/Uni - ...py.exe
windows7-x64
10uni/Uni - ...py.exe
windows10-2004-x64
10uni/Uni - ...py.exe
windows7-x64
10uni/Uni - ...py.exe
windows10-2004-x64
10Analysis
-
max time kernel
599s -
max time network
602s -
platform
windows10-2004_x64 -
resource
win10v2004-20240508-en -
resource tags
arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system -
submitted
10-06-2024 15:28
Behavioral task
behavioral1
Sample
uni/Uni - Copy (10) - Copy - Copy - Copy.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
uni/Uni - Copy (10) - Copy - Copy - Copy.exe
Resource
win10v2004-20240426-en
Behavioral task
behavioral3
Sample
uni/Uni - Copy (10) - Copy - Copy.exe
Resource
win7-20240221-en
Behavioral task
behavioral4
Sample
uni/Uni - Copy (10) - Copy - Copy.exe
Resource
win10v2004-20240426-en
Behavioral task
behavioral5
Sample
uni/Uni - Copy (10) - Copy.exe
Resource
win7-20240220-en
Behavioral task
behavioral6
Sample
uni/Uni - Copy (10) - Copy.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral7
Sample
uni/Uni - Copy (11) - Copy - Copy - Copy.exe
Resource
win7-20231129-en
Behavioral task
behavioral8
Sample
uni/Uni - Copy (11) - Copy - Copy - Copy.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral9
Sample
uni/Uni - Copy (11) - Copy - Copy.exe
Resource
win7-20240508-en
Behavioral task
behavioral10
Sample
uni/Uni - Copy (11) - Copy - Copy.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral11
Sample
uni/Uni - Copy (11) - Copy.exe
Resource
win7-20240221-en
Behavioral task
behavioral12
Sample
uni/Uni - Copy (11) - Copy.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral13
Sample
uni/Uni - Copy (12) - Copy - Copy - Copy.exe
Resource
win7-20240508-en
Behavioral task
behavioral14
Sample
uni/Uni - Copy (12) - Copy - Copy - Copy.exe
Resource
win10v2004-20240426-en
Behavioral task
behavioral15
Sample
uni/Uni - Copy (12) - Copy - Copy.exe
Resource
win7-20240508-en
Behavioral task
behavioral16
Sample
uni/Uni - Copy (12) - Copy - Copy.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral17
Sample
uni/Uni - Copy (12) - Copy.exe
Resource
win7-20240221-en
Behavioral task
behavioral18
Sample
uni/Uni - Copy (12) - Copy.exe
Resource
win10v2004-20240426-en
Behavioral task
behavioral19
Sample
uni/Uni - Copy (13) - Copy - Copy - Copy.exe
Resource
win7-20240419-en
Behavioral task
behavioral20
Sample
uni/Uni - Copy (13) - Copy - Copy - Copy.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral21
Sample
uni/Uni - Copy (13) - Copy - Copy.exe
Resource
win7-20240508-en
Behavioral task
behavioral22
Sample
uni/Uni - Copy (13) - Copy - Copy.exe
Resource
win10v2004-20240426-en
Behavioral task
behavioral23
Sample
uni/Uni - Copy (13) - Copy.exe
Resource
win7-20240419-en
Behavioral task
behavioral24
Sample
uni/Uni - Copy (13) - Copy.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral25
Sample
uni/Uni - Copy (14) - Copy - Copy - Copy.exe
Resource
win7-20240221-en
Behavioral task
behavioral26
Sample
uni/Uni - Copy (14) - Copy - Copy - Copy.exe
Resource
win10v2004-20240426-en
Behavioral task
behavioral27
Sample
uni/Uni - Copy (14) - Copy - Copy.exe
Resource
win7-20240508-en
Behavioral task
behavioral28
Sample
uni/Uni - Copy (14) - Copy - Copy.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral29
Sample
uni/Uni - Copy (14) - Copy.exe
Resource
win7-20231129-en
Behavioral task
behavioral30
Sample
uni/Uni - Copy (14) - Copy.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral31
Sample
uni/Uni - Copy (15) - Copy - Copy - Copy.exe
Resource
win7-20240508-en
Behavioral task
behavioral32
Sample
uni/Uni - Copy (15) - Copy - Copy - Copy.exe
Resource
win10v2004-20240508-en
General
-
Target
uni/Uni - Copy (14) - Copy.exe
-
Size
409KB
-
MD5
b70fdac25a99501e3cae11f1b775249e
-
SHA1
3c59226479bfdcd1b2927bcfb1a7516d4cb8dd71
-
SHA256
51ff3eb450a786c1aaa75ff889f2fd256412a7b75d04277fdf9fcccc20e57246
-
SHA512
43f0d5d6e5f0d5febba537c109ffdbc250bbb6e9725e635a43ec975b0353048eaeee50b6e9274cd5e072ea6b0cea32439bd37408b2528832f467f2075f74ca44
-
SSDEEP
12288:gpbJjGut6AoE3hVVdFaC/eZPTMTDlpgfJCKuMsVs:oVaurMLcDlpRKai
Malware Config
Extracted
quasar
3.1.5
SeroXen
panel-slave.gl.at.ply.gg:57059
panel-slave.gl.at.ply.gg:27892
$Sxr-rpL8EItHN3pqIQQVy2
-
encryption_key
Lme7VBS3l58VwLM69PNM
-
install_name
Client.exe
-
log_directory
Logs
-
reconnect_delay
3000
-
startup_key
SeroXen
-
subdirectory
SubDir
Signatures
-
Quasar payload 2 IoCs
Processes:
resource yara_rule behavioral30/memory/3956-1-0x0000000000510000-0x000000000057C000-memory.dmp family_quasar C:\Users\Admin\AppData\Roaming\SubDir\Client.exe family_quasar -
Checks computer location settings 2 TTPs 28 IoCs
Looks up country code configured in the registry, likely geofence.
Processes:
Client.exeClient.exeClient.exeClient.exeClient.exeClient.exeClient.exeClient.exeClient.exeClient.exeClient.exeClient.exeClient.exeClient.exeClient.exeClient.exeClient.exeClient.exeClient.exeClient.exeClient.exeClient.exeClient.exeClient.exeClient.exeClient.exeClient.exeClient.exedescription ioc process Key value queried \REGISTRY\USER\S-1-5-21-2539840389-1261165778-1087677076-1000\Control Panel\International\Geo\Nation Client.exe Key value queried \REGISTRY\USER\S-1-5-21-2539840389-1261165778-1087677076-1000\Control Panel\International\Geo\Nation Client.exe Key value queried \REGISTRY\USER\S-1-5-21-2539840389-1261165778-1087677076-1000\Control Panel\International\Geo\Nation Client.exe Key value queried \REGISTRY\USER\S-1-5-21-2539840389-1261165778-1087677076-1000\Control Panel\International\Geo\Nation Client.exe Key value queried \REGISTRY\USER\S-1-5-21-2539840389-1261165778-1087677076-1000\Control Panel\International\Geo\Nation Client.exe Key value queried \REGISTRY\USER\S-1-5-21-2539840389-1261165778-1087677076-1000\Control Panel\International\Geo\Nation Client.exe Key value queried \REGISTRY\USER\S-1-5-21-2539840389-1261165778-1087677076-1000\Control Panel\International\Geo\Nation Client.exe Key value queried \REGISTRY\USER\S-1-5-21-2539840389-1261165778-1087677076-1000\Control Panel\International\Geo\Nation Client.exe Key value queried \REGISTRY\USER\S-1-5-21-2539840389-1261165778-1087677076-1000\Control Panel\International\Geo\Nation Client.exe Key value queried \REGISTRY\USER\S-1-5-21-2539840389-1261165778-1087677076-1000\Control Panel\International\Geo\Nation Client.exe Key value queried \REGISTRY\USER\S-1-5-21-2539840389-1261165778-1087677076-1000\Control Panel\International\Geo\Nation Client.exe Key value queried \REGISTRY\USER\S-1-5-21-2539840389-1261165778-1087677076-1000\Control Panel\International\Geo\Nation Client.exe Key value queried \REGISTRY\USER\S-1-5-21-2539840389-1261165778-1087677076-1000\Control Panel\International\Geo\Nation Client.exe Key value queried \REGISTRY\USER\S-1-5-21-2539840389-1261165778-1087677076-1000\Control Panel\International\Geo\Nation Client.exe Key value queried \REGISTRY\USER\S-1-5-21-2539840389-1261165778-1087677076-1000\Control Panel\International\Geo\Nation Client.exe Key value queried \REGISTRY\USER\S-1-5-21-2539840389-1261165778-1087677076-1000\Control Panel\International\Geo\Nation Client.exe Key value queried \REGISTRY\USER\S-1-5-21-2539840389-1261165778-1087677076-1000\Control Panel\International\Geo\Nation Client.exe Key value queried \REGISTRY\USER\S-1-5-21-2539840389-1261165778-1087677076-1000\Control Panel\International\Geo\Nation Client.exe Key value queried \REGISTRY\USER\S-1-5-21-2539840389-1261165778-1087677076-1000\Control Panel\International\Geo\Nation Client.exe Key value queried \REGISTRY\USER\S-1-5-21-2539840389-1261165778-1087677076-1000\Control Panel\International\Geo\Nation Client.exe Key value queried \REGISTRY\USER\S-1-5-21-2539840389-1261165778-1087677076-1000\Control Panel\International\Geo\Nation Client.exe Key value queried \REGISTRY\USER\S-1-5-21-2539840389-1261165778-1087677076-1000\Control Panel\International\Geo\Nation Client.exe Key value queried \REGISTRY\USER\S-1-5-21-2539840389-1261165778-1087677076-1000\Control Panel\International\Geo\Nation Client.exe Key value queried \REGISTRY\USER\S-1-5-21-2539840389-1261165778-1087677076-1000\Control Panel\International\Geo\Nation Client.exe Key value queried \REGISTRY\USER\S-1-5-21-2539840389-1261165778-1087677076-1000\Control Panel\International\Geo\Nation Client.exe Key value queried \REGISTRY\USER\S-1-5-21-2539840389-1261165778-1087677076-1000\Control Panel\International\Geo\Nation Client.exe Key value queried \REGISTRY\USER\S-1-5-21-2539840389-1261165778-1087677076-1000\Control Panel\International\Geo\Nation Client.exe Key value queried \REGISTRY\USER\S-1-5-21-2539840389-1261165778-1087677076-1000\Control Panel\International\Geo\Nation Client.exe -
Executes dropped EXE 29 IoCs
Processes:
Client.exeClient.exeClient.exeClient.exeClient.exeClient.exeClient.exeClient.exeClient.exeClient.exeClient.exeClient.exeClient.exeClient.exeClient.exeClient.exeClient.exeClient.exeClient.exeClient.exeClient.exeClient.exeClient.exeClient.exeClient.exeClient.exeClient.exeClient.exeClient.exepid process 2744 Client.exe 3788 Client.exe 3228 Client.exe 3252 Client.exe 264 Client.exe 1716 Client.exe 4536 Client.exe 4516 Client.exe 1488 Client.exe 5084 Client.exe 3248 Client.exe 2432 Client.exe 3232 Client.exe 3084 Client.exe 4564 Client.exe 4480 Client.exe 1120 Client.exe 2760 Client.exe 4580 Client.exe 3340 Client.exe 4224 Client.exe 384 Client.exe 4068 Client.exe 4376 Client.exe 3100 Client.exe 944 Client.exe 3992 Client.exe 3280 Client.exe 2476 Client.exe -
Looks up external IP address via web service 27 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
Processes:
flow ioc 35 ip-api.com 13 ip-api.com 19 ip-api.com 31 ip-api.com 25 ip-api.com 52 ip-api.com 54 ip-api.com 59 ip-api.com 65 ip-api.com 17 ip-api.com 23 ip-api.com 57 ip-api.com 61 ip-api.com 63 ip-api.com 8 api.ipify.org 33 ip-api.com 43 ip-api.com 49 ip-api.com 27 ip-api.com 38 ip-api.com 45 ip-api.com 47 ip-api.com 29 ip-api.com 40 ip-api.com 2 ip-api.com 15 ip-api.com 21 ip-api.com -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Program crash 28 IoCs
Processes:
WerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exepid pid_target process target process 2828 2744 WerFault.exe Client.exe 4780 3788 WerFault.exe Client.exe 1872 3228 WerFault.exe Client.exe 5092 3252 WerFault.exe Client.exe 3476 264 WerFault.exe Client.exe 1908 1716 WerFault.exe Client.exe 2532 4536 WerFault.exe Client.exe 424 4516 WerFault.exe Client.exe 1604 1488 WerFault.exe Client.exe 2944 5084 WerFault.exe Client.exe 4764 3248 WerFault.exe Client.exe 1288 2432 WerFault.exe Client.exe 4840 3232 WerFault.exe Client.exe 944 3084 WerFault.exe Client.exe 3104 4564 WerFault.exe Client.exe 2620 4480 WerFault.exe Client.exe 4992 1120 WerFault.exe Client.exe 2912 2760 WerFault.exe Client.exe 1940 4580 WerFault.exe Client.exe 3884 3340 WerFault.exe Client.exe 2068 4224 WerFault.exe Client.exe 3940 384 WerFault.exe Client.exe 2416 4068 WerFault.exe Client.exe 3204 4376 WerFault.exe Client.exe 3588 3100 WerFault.exe Client.exe 2332 944 WerFault.exe Client.exe 1876 3992 WerFault.exe Client.exe 4040 3280 WerFault.exe Client.exe -
Creates scheduled task(s) 1 TTPs 30 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
Processes:
schtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeSCHTASKS.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exepid process 1416 schtasks.exe 3964 schtasks.exe 3400 schtasks.exe 2980 schtasks.exe 5108 schtasks.exe 4636 schtasks.exe 4964 schtasks.exe 3880 schtasks.exe 2704 schtasks.exe 3856 schtasks.exe 1700 schtasks.exe 1292 schtasks.exe 3592 schtasks.exe 232 schtasks.exe 4776 schtasks.exe 4404 schtasks.exe 3344 schtasks.exe 2932 schtasks.exe 4968 schtasks.exe 3476 SCHTASKS.exe 2980 schtasks.exe 2444 schtasks.exe 2088 schtasks.exe 388 schtasks.exe 4072 schtasks.exe 2448 schtasks.exe 536 schtasks.exe 400 schtasks.exe 636 schtasks.exe 4980 schtasks.exe -
Runs ping.exe 1 TTPs 28 IoCs
Processes:
PING.EXEPING.EXEPING.EXEPING.EXEPING.EXEPING.EXEPING.EXEPING.EXEPING.EXEPING.EXEPING.EXEPING.EXEPING.EXEPING.EXEPING.EXEPING.EXEPING.EXEPING.EXEPING.EXEPING.EXEPING.EXEPING.EXEPING.EXEPING.EXEPING.EXEPING.EXEPING.EXEPING.EXEpid process 3348 PING.EXE 3260 PING.EXE 3888 PING.EXE 436 PING.EXE 1908 PING.EXE 2228 PING.EXE 2740 PING.EXE 4264 PING.EXE 1164 PING.EXE 2256 PING.EXE 1396 PING.EXE 1784 PING.EXE 3732 PING.EXE 2280 PING.EXE 4772 PING.EXE 1492 PING.EXE 2864 PING.EXE 5044 PING.EXE 4384 PING.EXE 3840 PING.EXE 2148 PING.EXE 2088 PING.EXE 4472 PING.EXE 3076 PING.EXE 2556 PING.EXE 864 PING.EXE 4440 PING.EXE 2708 PING.EXE -
Suspicious use of AdjustPrivilegeToken 30 IoCs
Processes:
Uni - Copy (14) - Copy.exeClient.exeClient.exeClient.exeClient.exeClient.exeClient.exeClient.exeClient.exeClient.exeClient.exeClient.exeClient.exeClient.exeClient.exeClient.exeClient.exeClient.exeClient.exeClient.exeClient.exeClient.exeClient.exeClient.exeClient.exeClient.exeClient.exeClient.exeClient.exeClient.exedescription pid process Token: SeDebugPrivilege 3956 Uni - Copy (14) - Copy.exe Token: SeDebugPrivilege 2744 Client.exe Token: SeDebugPrivilege 3788 Client.exe Token: SeDebugPrivilege 3228 Client.exe Token: SeDebugPrivilege 3252 Client.exe Token: SeDebugPrivilege 264 Client.exe Token: SeDebugPrivilege 1716 Client.exe Token: SeDebugPrivilege 4536 Client.exe Token: SeDebugPrivilege 4516 Client.exe Token: SeDebugPrivilege 1488 Client.exe Token: SeDebugPrivilege 5084 Client.exe Token: SeDebugPrivilege 3248 Client.exe Token: SeDebugPrivilege 2432 Client.exe Token: SeDebugPrivilege 3232 Client.exe Token: SeDebugPrivilege 3084 Client.exe Token: SeDebugPrivilege 4564 Client.exe Token: SeDebugPrivilege 4480 Client.exe Token: SeDebugPrivilege 1120 Client.exe Token: SeDebugPrivilege 2760 Client.exe Token: SeDebugPrivilege 4580 Client.exe Token: SeDebugPrivilege 3340 Client.exe Token: SeDebugPrivilege 4224 Client.exe Token: SeDebugPrivilege 384 Client.exe Token: SeDebugPrivilege 4068 Client.exe Token: SeDebugPrivilege 4376 Client.exe Token: SeDebugPrivilege 3100 Client.exe Token: SeDebugPrivilege 944 Client.exe Token: SeDebugPrivilege 3992 Client.exe Token: SeDebugPrivilege 3280 Client.exe Token: SeDebugPrivilege 2476 Client.exe -
Suspicious use of SetWindowsHookEx 28 IoCs
Processes:
Client.exeClient.exeClient.exeClient.exeClient.exeClient.exeClient.exeClient.exeClient.exeClient.exeClient.exeClient.exeClient.exeClient.exeClient.exeClient.exeClient.exeClient.exeClient.exeClient.exeClient.exeClient.exeClient.exeClient.exeClient.exeClient.exeClient.exeClient.exepid process 2744 Client.exe 3788 Client.exe 3228 Client.exe 3252 Client.exe 264 Client.exe 1716 Client.exe 4536 Client.exe 4516 Client.exe 1488 Client.exe 5084 Client.exe 3248 Client.exe 2432 Client.exe 3232 Client.exe 3084 Client.exe 4564 Client.exe 4480 Client.exe 1120 Client.exe 2760 Client.exe 4580 Client.exe 3340 Client.exe 4224 Client.exe 384 Client.exe 4068 Client.exe 4376 Client.exe 3100 Client.exe 944 Client.exe 3992 Client.exe 3280 Client.exe -
Suspicious use of WriteProcessMemory 64 IoCs
Processes:
Uni - Copy (14) - Copy.exeClient.execmd.exeClient.execmd.exeClient.execmd.exeClient.execmd.exedescription pid process target process PID 3956 wrote to memory of 4980 3956 Uni - Copy (14) - Copy.exe schtasks.exe PID 3956 wrote to memory of 4980 3956 Uni - Copy (14) - Copy.exe schtasks.exe PID 3956 wrote to memory of 4980 3956 Uni - Copy (14) - Copy.exe schtasks.exe PID 3956 wrote to memory of 2744 3956 Uni - Copy (14) - Copy.exe Client.exe PID 3956 wrote to memory of 2744 3956 Uni - Copy (14) - Copy.exe Client.exe PID 3956 wrote to memory of 2744 3956 Uni - Copy (14) - Copy.exe Client.exe PID 3956 wrote to memory of 3476 3956 Uni - Copy (14) - Copy.exe SCHTASKS.exe PID 3956 wrote to memory of 3476 3956 Uni - Copy (14) - Copy.exe SCHTASKS.exe PID 3956 wrote to memory of 3476 3956 Uni - Copy (14) - Copy.exe SCHTASKS.exe PID 2744 wrote to memory of 2980 2744 Client.exe schtasks.exe PID 2744 wrote to memory of 2980 2744 Client.exe schtasks.exe PID 2744 wrote to memory of 2980 2744 Client.exe schtasks.exe PID 2744 wrote to memory of 2176 2744 Client.exe cmd.exe PID 2744 wrote to memory of 2176 2744 Client.exe cmd.exe PID 2744 wrote to memory of 2176 2744 Client.exe cmd.exe PID 2176 wrote to memory of 1560 2176 cmd.exe chcp.com PID 2176 wrote to memory of 1560 2176 cmd.exe chcp.com PID 2176 wrote to memory of 1560 2176 cmd.exe chcp.com PID 2176 wrote to memory of 1908 2176 cmd.exe PING.EXE PID 2176 wrote to memory of 1908 2176 cmd.exe PING.EXE PID 2176 wrote to memory of 1908 2176 cmd.exe PING.EXE PID 2176 wrote to memory of 3788 2176 cmd.exe Client.exe PID 2176 wrote to memory of 3788 2176 cmd.exe Client.exe PID 2176 wrote to memory of 3788 2176 cmd.exe Client.exe PID 3788 wrote to memory of 2704 3788 Client.exe schtasks.exe PID 3788 wrote to memory of 2704 3788 Client.exe schtasks.exe PID 3788 wrote to memory of 2704 3788 Client.exe schtasks.exe PID 3788 wrote to memory of 2876 3788 Client.exe cmd.exe PID 3788 wrote to memory of 2876 3788 Client.exe cmd.exe PID 3788 wrote to memory of 2876 3788 Client.exe cmd.exe PID 2876 wrote to memory of 3024 2876 cmd.exe chcp.com PID 2876 wrote to memory of 3024 2876 cmd.exe chcp.com PID 2876 wrote to memory of 3024 2876 cmd.exe chcp.com PID 2876 wrote to memory of 4772 2876 cmd.exe PING.EXE PID 2876 wrote to memory of 4772 2876 cmd.exe PING.EXE PID 2876 wrote to memory of 4772 2876 cmd.exe PING.EXE PID 2876 wrote to memory of 3228 2876 cmd.exe Client.exe PID 2876 wrote to memory of 3228 2876 cmd.exe Client.exe PID 2876 wrote to memory of 3228 2876 cmd.exe Client.exe PID 3228 wrote to memory of 3400 3228 Client.exe schtasks.exe PID 3228 wrote to memory of 3400 3228 Client.exe schtasks.exe PID 3228 wrote to memory of 3400 3228 Client.exe schtasks.exe PID 3228 wrote to memory of 544 3228 Client.exe cmd.exe PID 3228 wrote to memory of 544 3228 Client.exe cmd.exe PID 3228 wrote to memory of 544 3228 Client.exe cmd.exe PID 544 wrote to memory of 620 544 cmd.exe chcp.com PID 544 wrote to memory of 620 544 cmd.exe chcp.com PID 544 wrote to memory of 620 544 cmd.exe chcp.com PID 544 wrote to memory of 2708 544 cmd.exe PING.EXE PID 544 wrote to memory of 2708 544 cmd.exe PING.EXE PID 544 wrote to memory of 2708 544 cmd.exe PING.EXE PID 544 wrote to memory of 3252 544 cmd.exe Client.exe PID 544 wrote to memory of 3252 544 cmd.exe Client.exe PID 544 wrote to memory of 3252 544 cmd.exe Client.exe PID 3252 wrote to memory of 536 3252 Client.exe schtasks.exe PID 3252 wrote to memory of 536 3252 Client.exe schtasks.exe PID 3252 wrote to memory of 536 3252 Client.exe schtasks.exe PID 3252 wrote to memory of 3644 3252 Client.exe cmd.exe PID 3252 wrote to memory of 3644 3252 Client.exe cmd.exe PID 3252 wrote to memory of 3644 3252 Client.exe cmd.exe PID 3644 wrote to memory of 3684 3644 cmd.exe chcp.com PID 3644 wrote to memory of 3684 3644 cmd.exe chcp.com PID 3644 wrote to memory of 3684 3644 cmd.exe chcp.com PID 3644 wrote to memory of 1396 3644 cmd.exe PING.EXE
Processes
-
C:\Users\Admin\AppData\Local\Temp\uni\Uni - Copy (14) - Copy.exe"C:\Users\Admin\AppData\Local\Temp\uni\Uni - Copy (14) - Copy.exe"1⤵
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\schtasks.exe"schtasks" /create /tn "SeroXen" /sc ONLOGON /tr "C:\Users\Admin\AppData\Local\Temp\uni\Uni - Copy (14) - Copy.exe" /rl HIGHEST /f2⤵
- Creates scheduled task(s)
-
C:\Users\Admin\AppData\Roaming\SubDir\Client.exe"C:\Users\Admin\AppData\Roaming\SubDir\Client.exe"2⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\schtasks.exe"schtasks" /create /tn "SeroXen" /sc ONLOGON /tr "C:\Users\Admin\AppData\Roaming\SubDir\Client.exe" /rl HIGHEST /f3⤵
- Creates scheduled task(s)
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\y0Mtcvifgmhb.bat" "3⤵
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\chcp.comchcp 650014⤵
-
C:\Windows\SysWOW64\PING.EXEping -n 10 localhost4⤵
- Runs ping.exe
-
C:\Users\Admin\AppData\Roaming\SubDir\Client.exe"C:\Users\Admin\AppData\Roaming\SubDir\Client.exe"4⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\schtasks.exe"schtasks" /create /tn "SeroXen" /sc ONLOGON /tr "C:\Users\Admin\AppData\Roaming\SubDir\Client.exe" /rl HIGHEST /f5⤵
- Creates scheduled task(s)
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\Ruj2ErJLhfN6.bat" "5⤵
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\chcp.comchcp 650016⤵
-
C:\Windows\SysWOW64\PING.EXEping -n 10 localhost6⤵
- Runs ping.exe
-
C:\Users\Admin\AppData\Roaming\SubDir\Client.exe"C:\Users\Admin\AppData\Roaming\SubDir\Client.exe"6⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\schtasks.exe"schtasks" /create /tn "SeroXen" /sc ONLOGON /tr "C:\Users\Admin\AppData\Roaming\SubDir\Client.exe" /rl HIGHEST /f7⤵
- Creates scheduled task(s)
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\4Ocz3gBVs1zt.bat" "7⤵
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\chcp.comchcp 650018⤵
-
C:\Windows\SysWOW64\PING.EXEping -n 10 localhost8⤵
- Runs ping.exe
-
C:\Users\Admin\AppData\Roaming\SubDir\Client.exe"C:\Users\Admin\AppData\Roaming\SubDir\Client.exe"8⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\schtasks.exe"schtasks" /create /tn "SeroXen" /sc ONLOGON /tr "C:\Users\Admin\AppData\Roaming\SubDir\Client.exe" /rl HIGHEST /f9⤵
- Creates scheduled task(s)
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\EccSDMmUQoZo.bat" "9⤵
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\chcp.comchcp 6500110⤵
-
C:\Windows\SysWOW64\PING.EXEping -n 10 localhost10⤵
- Runs ping.exe
-
C:\Users\Admin\AppData\Roaming\SubDir\Client.exe"C:\Users\Admin\AppData\Roaming\SubDir\Client.exe"10⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
-
C:\Windows\SysWOW64\schtasks.exe"schtasks" /create /tn "SeroXen" /sc ONLOGON /tr "C:\Users\Admin\AppData\Roaming\SubDir\Client.exe" /rl HIGHEST /f11⤵
- Creates scheduled task(s)
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\LdTm38Sh2pLN.bat" "11⤵
-
C:\Windows\SysWOW64\chcp.comchcp 6500112⤵
-
C:\Windows\SysWOW64\PING.EXEping -n 10 localhost12⤵
- Runs ping.exe
-
C:\Users\Admin\AppData\Roaming\SubDir\Client.exe"C:\Users\Admin\AppData\Roaming\SubDir\Client.exe"12⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
-
C:\Windows\SysWOW64\schtasks.exe"schtasks" /create /tn "SeroXen" /sc ONLOGON /tr "C:\Users\Admin\AppData\Roaming\SubDir\Client.exe" /rl HIGHEST /f13⤵
- Creates scheduled task(s)
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\Ik2TT1VhKaSr.bat" "13⤵
-
C:\Windows\SysWOW64\chcp.comchcp 6500114⤵
-
C:\Windows\SysWOW64\PING.EXEping -n 10 localhost14⤵
- Runs ping.exe
-
C:\Users\Admin\AppData\Roaming\SubDir\Client.exe"C:\Users\Admin\AppData\Roaming\SubDir\Client.exe"14⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
-
C:\Windows\SysWOW64\schtasks.exe"schtasks" /create /tn "SeroXen" /sc ONLOGON /tr "C:\Users\Admin\AppData\Roaming\SubDir\Client.exe" /rl HIGHEST /f15⤵
- Creates scheduled task(s)
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\NRJFK3grF0oj.bat" "15⤵
-
C:\Windows\SysWOW64\chcp.comchcp 6500116⤵
-
C:\Windows\SysWOW64\PING.EXEping -n 10 localhost16⤵
- Runs ping.exe
-
C:\Users\Admin\AppData\Roaming\SubDir\Client.exe"C:\Users\Admin\AppData\Roaming\SubDir\Client.exe"16⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
-
C:\Windows\SysWOW64\schtasks.exe"schtasks" /create /tn "SeroXen" /sc ONLOGON /tr "C:\Users\Admin\AppData\Roaming\SubDir\Client.exe" /rl HIGHEST /f17⤵
- Creates scheduled task(s)
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\kGs5lf4C2TPb.bat" "17⤵
-
C:\Windows\SysWOW64\chcp.comchcp 6500118⤵
-
C:\Windows\SysWOW64\PING.EXEping -n 10 localhost18⤵
- Runs ping.exe
-
C:\Users\Admin\AppData\Roaming\SubDir\Client.exe"C:\Users\Admin\AppData\Roaming\SubDir\Client.exe"18⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
-
C:\Windows\SysWOW64\schtasks.exe"schtasks" /create /tn "SeroXen" /sc ONLOGON /tr "C:\Users\Admin\AppData\Roaming\SubDir\Client.exe" /rl HIGHEST /f19⤵
- Creates scheduled task(s)
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\Mk0tqlIwmEP9.bat" "19⤵
-
C:\Windows\SysWOW64\chcp.comchcp 6500120⤵
-
C:\Windows\SysWOW64\PING.EXEping -n 10 localhost20⤵
- Runs ping.exe
-
C:\Users\Admin\AppData\Roaming\SubDir\Client.exe"C:\Users\Admin\AppData\Roaming\SubDir\Client.exe"20⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
-
C:\Windows\SysWOW64\schtasks.exe"schtasks" /create /tn "SeroXen" /sc ONLOGON /tr "C:\Users\Admin\AppData\Roaming\SubDir\Client.exe" /rl HIGHEST /f21⤵
- Creates scheduled task(s)
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\8ltyGYSOFZgR.bat" "21⤵
-
C:\Windows\SysWOW64\chcp.comchcp 6500122⤵
-
C:\Windows\SysWOW64\PING.EXEping -n 10 localhost22⤵
- Runs ping.exe
-
C:\Users\Admin\AppData\Roaming\SubDir\Client.exe"C:\Users\Admin\AppData\Roaming\SubDir\Client.exe"22⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
-
C:\Windows\SysWOW64\schtasks.exe"schtasks" /create /tn "SeroXen" /sc ONLOGON /tr "C:\Users\Admin\AppData\Roaming\SubDir\Client.exe" /rl HIGHEST /f23⤵
- Creates scheduled task(s)
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\fBycv38DBVEb.bat" "23⤵
-
C:\Windows\SysWOW64\chcp.comchcp 6500124⤵
-
C:\Windows\SysWOW64\PING.EXEping -n 10 localhost24⤵
- Runs ping.exe
-
C:\Users\Admin\AppData\Roaming\SubDir\Client.exe"C:\Users\Admin\AppData\Roaming\SubDir\Client.exe"24⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
-
C:\Windows\SysWOW64\schtasks.exe"schtasks" /create /tn "SeroXen" /sc ONLOGON /tr "C:\Users\Admin\AppData\Roaming\SubDir\Client.exe" /rl HIGHEST /f25⤵
- Creates scheduled task(s)
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\WipFun44qb5g.bat" "25⤵
-
C:\Windows\SysWOW64\chcp.comchcp 6500126⤵
-
C:\Windows\SysWOW64\PING.EXEping -n 10 localhost26⤵
- Runs ping.exe
-
C:\Users\Admin\AppData\Roaming\SubDir\Client.exe"C:\Users\Admin\AppData\Roaming\SubDir\Client.exe"26⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
-
C:\Windows\SysWOW64\schtasks.exe"schtasks" /create /tn "SeroXen" /sc ONLOGON /tr "C:\Users\Admin\AppData\Roaming\SubDir\Client.exe" /rl HIGHEST /f27⤵
- Creates scheduled task(s)
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\k0co0iWhuUPq.bat" "27⤵
-
C:\Windows\SysWOW64\chcp.comchcp 6500128⤵
-
C:\Windows\SysWOW64\PING.EXEping -n 10 localhost28⤵
- Runs ping.exe
-
C:\Users\Admin\AppData\Roaming\SubDir\Client.exe"C:\Users\Admin\AppData\Roaming\SubDir\Client.exe"28⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
-
C:\Windows\SysWOW64\schtasks.exe"schtasks" /create /tn "SeroXen" /sc ONLOGON /tr "C:\Users\Admin\AppData\Roaming\SubDir\Client.exe" /rl HIGHEST /f29⤵
- Creates scheduled task(s)
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\gc2heOxdWIdP.bat" "29⤵
-
C:\Windows\SysWOW64\chcp.comchcp 6500130⤵
-
C:\Windows\SysWOW64\PING.EXEping -n 10 localhost30⤵
- Runs ping.exe
-
C:\Users\Admin\AppData\Roaming\SubDir\Client.exe"C:\Users\Admin\AppData\Roaming\SubDir\Client.exe"30⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
-
C:\Windows\SysWOW64\schtasks.exe"schtasks" /create /tn "SeroXen" /sc ONLOGON /tr "C:\Users\Admin\AppData\Roaming\SubDir\Client.exe" /rl HIGHEST /f31⤵
- Creates scheduled task(s)
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\X9tKd8tTBOUV.bat" "31⤵
-
C:\Windows\SysWOW64\chcp.comchcp 6500132⤵
-
C:\Windows\SysWOW64\PING.EXEping -n 10 localhost32⤵
- Runs ping.exe
-
C:\Users\Admin\AppData\Roaming\SubDir\Client.exe"C:\Users\Admin\AppData\Roaming\SubDir\Client.exe"32⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
-
C:\Windows\SysWOW64\schtasks.exe"schtasks" /create /tn "SeroXen" /sc ONLOGON /tr "C:\Users\Admin\AppData\Roaming\SubDir\Client.exe" /rl HIGHEST /f33⤵
- Creates scheduled task(s)
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\GfebIiSqxlsr.bat" "33⤵
-
C:\Windows\SysWOW64\chcp.comchcp 6500134⤵
-
C:\Windows\SysWOW64\PING.EXEping -n 10 localhost34⤵
- Runs ping.exe
-
C:\Users\Admin\AppData\Roaming\SubDir\Client.exe"C:\Users\Admin\AppData\Roaming\SubDir\Client.exe"34⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
-
C:\Windows\SysWOW64\schtasks.exe"schtasks" /create /tn "SeroXen" /sc ONLOGON /tr "C:\Users\Admin\AppData\Roaming\SubDir\Client.exe" /rl HIGHEST /f35⤵
- Creates scheduled task(s)
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\h36mNjn2r52E.bat" "35⤵
-
C:\Windows\SysWOW64\chcp.comchcp 6500136⤵
-
C:\Windows\SysWOW64\PING.EXEping -n 10 localhost36⤵
- Runs ping.exe
-
C:\Users\Admin\AppData\Roaming\SubDir\Client.exe"C:\Users\Admin\AppData\Roaming\SubDir\Client.exe"36⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
-
C:\Windows\SysWOW64\schtasks.exe"schtasks" /create /tn "SeroXen" /sc ONLOGON /tr "C:\Users\Admin\AppData\Roaming\SubDir\Client.exe" /rl HIGHEST /f37⤵
- Creates scheduled task(s)
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\0rqt1b148kwC.bat" "37⤵
-
C:\Windows\SysWOW64\chcp.comchcp 6500138⤵
-
C:\Windows\SysWOW64\PING.EXEping -n 10 localhost38⤵
- Runs ping.exe
-
C:\Users\Admin\AppData\Roaming\SubDir\Client.exe"C:\Users\Admin\AppData\Roaming\SubDir\Client.exe"38⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
-
C:\Windows\SysWOW64\schtasks.exe"schtasks" /create /tn "SeroXen" /sc ONLOGON /tr "C:\Users\Admin\AppData\Roaming\SubDir\Client.exe" /rl HIGHEST /f39⤵
- Creates scheduled task(s)
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\yyQaRT44RV3g.bat" "39⤵
-
C:\Windows\SysWOW64\chcp.comchcp 6500140⤵
-
C:\Windows\SysWOW64\PING.EXEping -n 10 localhost40⤵
- Runs ping.exe
-
C:\Users\Admin\AppData\Roaming\SubDir\Client.exe"C:\Users\Admin\AppData\Roaming\SubDir\Client.exe"40⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
-
C:\Windows\SysWOW64\schtasks.exe"schtasks" /create /tn "SeroXen" /sc ONLOGON /tr "C:\Users\Admin\AppData\Roaming\SubDir\Client.exe" /rl HIGHEST /f41⤵
- Creates scheduled task(s)
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\OMslWUPGLpC2.bat" "41⤵
-
C:\Windows\SysWOW64\chcp.comchcp 6500142⤵
-
C:\Windows\SysWOW64\PING.EXEping -n 10 localhost42⤵
- Runs ping.exe
-
C:\Users\Admin\AppData\Roaming\SubDir\Client.exe"C:\Users\Admin\AppData\Roaming\SubDir\Client.exe"42⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
-
C:\Windows\SysWOW64\schtasks.exe"schtasks" /create /tn "SeroXen" /sc ONLOGON /tr "C:\Users\Admin\AppData\Roaming\SubDir\Client.exe" /rl HIGHEST /f43⤵
- Creates scheduled task(s)
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\pkKwcVlRFAMO.bat" "43⤵
-
C:\Windows\SysWOW64\chcp.comchcp 6500144⤵
-
C:\Windows\SysWOW64\PING.EXEping -n 10 localhost44⤵
- Runs ping.exe
-
C:\Users\Admin\AppData\Roaming\SubDir\Client.exe"C:\Users\Admin\AppData\Roaming\SubDir\Client.exe"44⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
-
C:\Windows\SysWOW64\schtasks.exe"schtasks" /create /tn "SeroXen" /sc ONLOGON /tr "C:\Users\Admin\AppData\Roaming\SubDir\Client.exe" /rl HIGHEST /f45⤵
- Creates scheduled task(s)
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\wSPRGH5vgOQA.bat" "45⤵
-
C:\Windows\SysWOW64\chcp.comchcp 6500146⤵
-
C:\Windows\SysWOW64\PING.EXEping -n 10 localhost46⤵
- Runs ping.exe
-
C:\Users\Admin\AppData\Roaming\SubDir\Client.exe"C:\Users\Admin\AppData\Roaming\SubDir\Client.exe"46⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
-
C:\Windows\SysWOW64\schtasks.exe"schtasks" /create /tn "SeroXen" /sc ONLOGON /tr "C:\Users\Admin\AppData\Roaming\SubDir\Client.exe" /rl HIGHEST /f47⤵
- Creates scheduled task(s)
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\WNdugyMpJIrE.bat" "47⤵
-
C:\Windows\SysWOW64\chcp.comchcp 6500148⤵
-
C:\Windows\SysWOW64\PING.EXEping -n 10 localhost48⤵
- Runs ping.exe
-
C:\Users\Admin\AppData\Roaming\SubDir\Client.exe"C:\Users\Admin\AppData\Roaming\SubDir\Client.exe"48⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
-
C:\Windows\SysWOW64\schtasks.exe"schtasks" /create /tn "SeroXen" /sc ONLOGON /tr "C:\Users\Admin\AppData\Roaming\SubDir\Client.exe" /rl HIGHEST /f49⤵
- Creates scheduled task(s)
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\d5iPLkhIkWv0.bat" "49⤵
-
C:\Windows\SysWOW64\chcp.comchcp 6500150⤵
-
C:\Windows\SysWOW64\PING.EXEping -n 10 localhost50⤵
- Runs ping.exe
-
C:\Users\Admin\AppData\Roaming\SubDir\Client.exe"C:\Users\Admin\AppData\Roaming\SubDir\Client.exe"50⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
-
C:\Windows\SysWOW64\schtasks.exe"schtasks" /create /tn "SeroXen" /sc ONLOGON /tr "C:\Users\Admin\AppData\Roaming\SubDir\Client.exe" /rl HIGHEST /f51⤵
- Creates scheduled task(s)
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\Uca2JUd9Qcm6.bat" "51⤵
-
C:\Windows\SysWOW64\chcp.comchcp 6500152⤵
-
C:\Windows\SysWOW64\PING.EXEping -n 10 localhost52⤵
- Runs ping.exe
-
C:\Users\Admin\AppData\Roaming\SubDir\Client.exe"C:\Users\Admin\AppData\Roaming\SubDir\Client.exe"52⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
-
C:\Windows\SysWOW64\schtasks.exe"schtasks" /create /tn "SeroXen" /sc ONLOGON /tr "C:\Users\Admin\AppData\Roaming\SubDir\Client.exe" /rl HIGHEST /f53⤵
- Creates scheduled task(s)
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\5bY1dOGoTPtk.bat" "53⤵
-
C:\Windows\SysWOW64\chcp.comchcp 6500154⤵
-
C:\Windows\SysWOW64\PING.EXEping -n 10 localhost54⤵
- Runs ping.exe
-
C:\Users\Admin\AppData\Roaming\SubDir\Client.exe"C:\Users\Admin\AppData\Roaming\SubDir\Client.exe"54⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
-
C:\Windows\SysWOW64\schtasks.exe"schtasks" /create /tn "SeroXen" /sc ONLOGON /tr "C:\Users\Admin\AppData\Roaming\SubDir\Client.exe" /rl HIGHEST /f55⤵
- Creates scheduled task(s)
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\LNUOUVKWEG6o.bat" "55⤵
-
C:\Windows\SysWOW64\chcp.comchcp 6500156⤵
-
C:\Windows\SysWOW64\PING.EXEping -n 10 localhost56⤵
- Runs ping.exe
-
C:\Users\Admin\AppData\Roaming\SubDir\Client.exe"C:\Users\Admin\AppData\Roaming\SubDir\Client.exe"56⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
-
C:\Windows\SysWOW64\schtasks.exe"schtasks" /create /tn "SeroXen" /sc ONLOGON /tr "C:\Users\Admin\AppData\Roaming\SubDir\Client.exe" /rl HIGHEST /f57⤵
- Creates scheduled task(s)
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\ZgHxZQmAIAPy.bat" "57⤵
-
C:\Windows\SysWOW64\chcp.comchcp 6500158⤵
-
C:\Windows\SysWOW64\PING.EXEping -n 10 localhost58⤵
- Runs ping.exe
-
C:\Users\Admin\AppData\Roaming\SubDir\Client.exe"C:\Users\Admin\AppData\Roaming\SubDir\Client.exe"58⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3280 -s 168057⤵
- Program crash
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3992 -s 172055⤵
- Program crash
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 944 -s 172853⤵
- Program crash
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3100 -s 109251⤵
- Program crash
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4376 -s 223649⤵
- Program crash
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4068 -s 169647⤵
- Program crash
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 384 -s 167645⤵
- Program crash
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4224 -s 109643⤵
- Program crash
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3340 -s 109241⤵
- Program crash
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4580 -s 109239⤵
- Program crash
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2760 -s 224837⤵
- Program crash
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1120 -s 166035⤵
- Program crash
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4480 -s 168033⤵
- Program crash
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4564 -s 170831⤵
- Program crash
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3084 -s 109229⤵
- Program crash
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3232 -s 109627⤵
- Program crash
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2432 -s 109625⤵
- Program crash
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3248 -s 109223⤵
- Program crash
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 5084 -s 109221⤵
- Program crash
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1488 -s 109219⤵
- Program crash
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4516 -s 171617⤵
- Program crash
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4536 -s 151615⤵
- Program crash
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1716 -s 172813⤵
- Program crash
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 264 -s 219211⤵
- Program crash
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3252 -s 16449⤵
- Program crash
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3228 -s 10927⤵
- Program crash
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3788 -s 21885⤵
- Program crash
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2744 -s 16563⤵
- Program crash
-
C:\Windows\SysWOW64\SCHTASKS.exe"SCHTASKS.exe" /create /tn "$77Uni - Copy (14) - Copy.exe" /tr "'C:\Users\Admin\AppData\Local\Temp\uni\Uni - Copy (14) - Copy.exe'" /sc onlogon /rl HIGHEST2⤵
- Creates scheduled task(s)
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 408 -p 2744 -ip 27441⤵
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 444 -p 3788 -ip 37881⤵
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 520 -p 3228 -ip 32281⤵
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 528 -p 3252 -ip 32521⤵
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 416 -p 264 -ip 2641⤵
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 452 -p 1716 -ip 17161⤵
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 464 -p 4536 -ip 45361⤵
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 464 -p 4516 -ip 45161⤵
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 428 -p 1488 -ip 14881⤵
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 444 -p 5084 -ip 50841⤵
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 428 -p 3248 -ip 32481⤵
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 464 -p 2432 -ip 24321⤵
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 508 -p 3232 -ip 32321⤵
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 520 -p 3084 -ip 30841⤵
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 516 -p 4564 -ip 45641⤵
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 420 -p 4480 -ip 44801⤵
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 464 -p 1120 -ip 11201⤵
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 536 -p 2760 -ip 27601⤵
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 540 -p 4580 -ip 45801⤵
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 428 -p 3340 -ip 33401⤵
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 532 -p 4224 -ip 42241⤵
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 428 -p 384 -ip 3841⤵
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 540 -p 4068 -ip 40681⤵
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 500 -p 4376 -ip 43761⤵
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 504 -p 3100 -ip 31001⤵
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 464 -p 944 -ip 9441⤵
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 464 -p 3992 -ip 39921⤵
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 532 -p 3280 -ip 32801⤵
Network
MITRE ATT&CK Matrix ATT&CK v13
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Local\Temp\0rqt1b148kwC.batFilesize
207B
MD5e08d2e08d4e173db26c076f3a5d9c2cb
SHA10732a693e283737707a7997aa1dee7fd35a5c0bc
SHA256962de02d2ea7c814675cf1bf4e504a17bedf6e9bd1cf2af934b4cb7dbe916758
SHA512a42f657e6ad5a5bf43cb4fb594e0aba60f5a716e5b8d3368004aad1fcb5a713e741b8252f7ca051cb272502197a7f4e33f71dedfe100fec0bbfe6177648b9629
-
C:\Users\Admin\AppData\Local\Temp\4Ocz3gBVs1zt.batFilesize
207B
MD5029681251647984e95d18c706783b4cf
SHA18b9fd56840b5766ac7b8badebe86adb3ff12c2ee
SHA256fb06af12a46449e52ed034350a25c4a23958264c64965e5a7999a42fbf82ed53
SHA512fc41fc1d1c898fec4f866f31bcc42a447a34d8f85fd8a547244545fb4ebf952a8856db13980d993a43ba702cda28fcd68a87db7611a5aad0fe9bc95f792fd2ec
-
C:\Users\Admin\AppData\Local\Temp\8ltyGYSOFZgR.batFilesize
207B
MD593e865c2d17021f8e6f5b5609c6fb652
SHA145b8f17bd9a75dae12258b6b98ff0543c1ec08a3
SHA256822a289448d0479f1aae20b1a90d2860b59244f78c137135103ca0aff97e372f
SHA5127c77fdeae10bdd35826f6ea7cba37624237fd73ca0b897dfdc813c14d8804db291ee1016fc589305a9bdf343b8eab24f87fb6a713dd893f7e920ea89e5c13d18
-
C:\Users\Admin\AppData\Local\Temp\EccSDMmUQoZo.batFilesize
207B
MD5bb2fe00fdb7306a30f465e1b6c73e8ad
SHA10a2f318ff3d34a13668717a9db2d338c58b686f0
SHA256a4daf957253a17ec3b5f25dff9c7e253e95af17808d8b98689267f51f3e2ae53
SHA512c71c473a00131064ce02fdb612c8d672c8b0a3ad254e817b20b1b8c7c378308ce014a0159e119a658d31e15515742b4bb827dd03474cb14b9b4caeec73178433
-
C:\Users\Admin\AppData\Local\Temp\GfebIiSqxlsr.batFilesize
207B
MD550a95395a64afd9592503bbd43262426
SHA15b6233c37f5bd955db35b3546e7547d7477160b3
SHA256e8b0df869d09954daeb7f5e51175e3acc3a9a3a5cf3cf8354ba7c53b6db7e803
SHA512be64d0acce2f4ba52b66deba2b1c600606e4a2d643b76841ee6f33255a5cec65e8c674a2b1038bb2dd95ff7d509a71b907d02c51108de8be3ffbab19c9a9150b
-
C:\Users\Admin\AppData\Local\Temp\Ik2TT1VhKaSr.batFilesize
207B
MD5b3dbb6b1cae1e7dbce2e87b3a8a51e18
SHA1f8dd91894c6cfc9fa555829f74f7ca5562ae6893
SHA256c580bfbae6ce455262537607aa879887939225d8d3212a7ffed67e7846fe3cbb
SHA512a70eceb99ddbc6d060fcefa3d42396cba54254ac18300b30b08f1c6b9752b171902df6d19080c6480655e554509c7cb355a58cdb75e98592b97e6b6c820fdc75
-
C:\Users\Admin\AppData\Local\Temp\LdTm38Sh2pLN.batFilesize
207B
MD50035c354b5d2177372022049ec65051b
SHA1071315096f135fdb4ac31323554d3c7fe21a926e
SHA256a9be2662be8496eafcbfd8e5c0e7c3e4ec65d20b31bc72d3a1ee6e742f11dca5
SHA5121222326ce4905af431e459f414ef5c49df62833ac4aef329b2873ec65f76ea88f731ea4b368bba69ba4b33e26b383f01d32a085f71275361f97e83a3b5ebf53b
-
C:\Users\Admin\AppData\Local\Temp\Mk0tqlIwmEP9.batFilesize
207B
MD5c4180a137067560fd8014948cc05fda3
SHA1e7441c3029813fed4535d2b68045ee771b1a3984
SHA256f3f9ce0e7bb74f8aca9e548aa266060951852c810c25786544d66d45f14f2480
SHA512610269cfbc3175a99ef12b0ef5490b4a11394aa729bfd442565db88d8836147cb8b7ccb1e2e13fbf2e164330d5d846cd6c9e663b4315dc4c7678134338519eb6
-
C:\Users\Admin\AppData\Local\Temp\NRJFK3grF0oj.batFilesize
207B
MD56a4a3e78a147c0db808dc04551d574ce
SHA1c191d7326e5e2d149e883760029cdeafea379c10
SHA256004d838b359e7f54e8675e36c531d084309f7ee0dea1586ff35561b5b66b4bee
SHA512caf04c7425b0ed28ae471644732d9166682362a6b47da02d846cabc6f817158492c5149873e812919067b5e3bc380948303596c5809a98643f66a2a86d6d10cf
-
C:\Users\Admin\AppData\Local\Temp\OMslWUPGLpC2.batFilesize
207B
MD5990508e5a915ea82314aec4f1fc6e302
SHA15035d131b97cf3e8f9d944d76467875f259bee45
SHA256a8e50a4df78f52eb9a0878dc32b40b415dc3c50b3c6964d6e57d132d283f849e
SHA5128dacd4f20f6e280efe84f809be9ea4ebb50626b421401fb39dbadab4e50036534cc3e10dbe7efacde9ff93834db91e80ad0fe0a0e9f6da51a471d176187e1ec8
-
C:\Users\Admin\AppData\Local\Temp\Ruj2ErJLhfN6.batFilesize
207B
MD558c829af8110b67d15f1df6d77820d4f
SHA10e7136e29146feb3b51eefbdafa5a0c69d86689b
SHA2564ce18cf12963b7d489f48d1f0c11a9fe7564009537e7c088ec497db36398b3da
SHA51252f8390bd38d92f379fcf33ec0198d580fb02649c9617f29a55ea1da26f3268b9ac182ce6b34c6e641e0bf60da8f436c98b46016d74151affb55c701ddcc7213
-
C:\Users\Admin\AppData\Local\Temp\WipFun44qb5g.batFilesize
207B
MD5176041f7052ff9c63f42e28189464068
SHA1bfaac04ace0b528d113e6b05b27896ba49b65c1e
SHA2560a1d4aeed0dec392703522a08bc78b8b2a4bf480f09d0d1ed1f89b516f444ad2
SHA512322e9f64e088460398ad5a59ef83eeeefd2436cfd9cb7459c18f3820d0df90c083f41837775a9cf3a847dda870a48cb31eb93a479c7f79532866c6ff60c47cff
-
C:\Users\Admin\AppData\Local\Temp\X9tKd8tTBOUV.batFilesize
207B
MD5d352161f9c65d27cf6e3d136ce802e28
SHA148717892bbaf72e3ad2352c164362c99cdd47af7
SHA256485848e6c1107de52e418191bad12b8c449037048cb6cf69f4f917a4d6e588a1
SHA5120a2f246ff43663dca8dc2986c62b0dd98d8732a794b256706f05fa4f3a1a0e4353e296f60843d8f8bb3a9b28a02860aed498378147cd17d934fe03a1fd23dffa
-
C:\Users\Admin\AppData\Local\Temp\fBycv38DBVEb.batFilesize
207B
MD548be710bef8d26a31ef5c5beb9429b68
SHA1dd20f3508ca7d8c116328d71645c4a3d3167850c
SHA2568851d7bfb6bb76094cd1bd35888ce8ab22fc1f435c6b46057fe47dc1722bcb50
SHA512c97294c8ad78833bbff073a855c41e092ce5e0510b847bbc2c764323bc3936c4f92fcea15e9a8c2c34e4976dac369816396dc8d70a965308c90173ce07bb032f
-
C:\Users\Admin\AppData\Local\Temp\gc2heOxdWIdP.batFilesize
207B
MD580d8dd56690f7e03f9e5c040bcbe0f44
SHA1dd42b9fbd4cf3f10aa926e307e6a5e525a6d5a6c
SHA25660e056ab82ee35faaae491f448664433f0a55d57a2d6cbd229942282aab15c3c
SHA5124a3c8dd8c55a8af3c8178a5c344428983b2e797cd4daa9bc5e8a573e44ee8f8036ddf5ca8e6536636941574f5fd734af3ea0da9f0bed8d3fbff0d94ca517439e
-
C:\Users\Admin\AppData\Local\Temp\h36mNjn2r52E.batFilesize
207B
MD5061290fd256cafa51a4b69956c0e9809
SHA1d54260ba173f1f485ffe817f76f68ff99aeb3319
SHA2567de4caef5924146ad0874884aec37f98960a58a4ca0895856b71bf8a8467a4db
SHA512392dd390ca96b3ed7abfc81a21941d7fb2bc9b397b48969f071129adbc0881773c75b4e51bd1c6f72616ebea59d6969ad91a142720411023edc08cff7c05cab1
-
C:\Users\Admin\AppData\Local\Temp\k0co0iWhuUPq.batFilesize
207B
MD55f820e301ac15330dfeb318a647faef4
SHA123e4858ea54e2fe6152f67fefa537b6421334278
SHA2568e6b037259a46eecb519edf8e5cd345dc85f179362f2c5577e238fba5b2c32df
SHA512199eee4f07fcf5b7461afecf470c85bb056f795a2608b80e5f6bab8a9d0a9862361b0ebe7c0556f428ec61a787583ec42ac7e8df8703cfab619817b4c2779e16
-
C:\Users\Admin\AppData\Local\Temp\kGs5lf4C2TPb.batFilesize
207B
MD5278e9e2a0d5169ceaf53873866bdedfb
SHA10d33eab95e52c555b6514b9887c9705427080cef
SHA256d3875e66445c2a58ae6d2965c526620b220149cd29d7417d444e3c29fa56bb87
SHA5124f140d2e2d0bef715688a840759c04604e43cbb2b61e737ef1989f8d6a7bb5924b6fa7c9f5689269d64900fdfe962c50d30dfaef6c27f12ced9f430d6374bafe
-
C:\Users\Admin\AppData\Local\Temp\pkKwcVlRFAMO.batFilesize
207B
MD590a301703a953bead3f22468ee0a8e89
SHA1728705e00473114ff5d40a43d199863f2cfe9194
SHA256e3aef3b7a1033523cea113229ed7f8e4b5a08c6ad7afd3cceb7951d5e46e2b43
SHA5126022c21e6a75d50c3b93ef53043fd6f20416dc0eb6c8020c0c7ed121a09c42add2f146524cdb00bdf867e298f040803bd51c3183764befc4b610b9cebdb4aeb3
-
C:\Users\Admin\AppData\Local\Temp\y0Mtcvifgmhb.batFilesize
207B
MD55b0b26c139a36ec8f732e171d0b3cd3f
SHA10a58e7826fb645436343070ebe0a6c1da851ea72
SHA2560f467bd64ea7a0daa7de66ed4223f6c8d46284acce64d76518f80252db6857e3
SHA51207bc42c00d4e372bd6251f8c247a486cb39458ba1a9435baacfacabec5bbb6125e698cbfaa0905f28111971e8b3f3dc7fa10cc39d05ce6d4b5a165c5f04ae2ef
-
C:\Users\Admin\AppData\Local\Temp\yyQaRT44RV3g.batFilesize
207B
MD57ab3f8d0ad69d3d26cbfcbcf4d106c30
SHA1114162f3e3519691af0c2c581fc8dff74ae23f5b
SHA256ab04b76e7595b875f23d92d5603e158eaad730ddd2e9c0a2be59fc214edf7535
SHA512dc61f8790ed6c10f6f525eb6e1ff47ee6df103467ad49a3916d06cc513b21a5e7b439aab2d0db115dcd6ea156150c24ad05df3b11c444e4c525d8f45799fbd4d
-
C:\Users\Admin\AppData\Roaming\Logs\06-10-2024Filesize
224B
MD5ba630c5251eecbf5302e6456f01393af
SHA15b0ccb3d2a33339cf9f7fac555352bb4c3c0a57b
SHA256da571cf6b2d9f6f258f0a717126d9b65596993595ee7199e7deacbc4cbd36367
SHA512e2aad17e5f22a63e62c724ff6dad295eda9e6e0463b4526ad31ef893ab72f74e02aef57c45c4c90e36fb2e3b4cdb16c7ccd97754c143e1e70be3c3b7b2b7572e
-
C:\Users\Admin\AppData\Roaming\Logs\06-10-2024Filesize
224B
MD5e6a678a7d5c6555caeb2c9eb60ab7af2
SHA11950f6439bfc99efc71ae70307fc2b06f121480b
SHA256cf9be85aa9ddebacfb3e7a10f40ac7c1ab59dd1734b1b02fae25cfa80180ba11
SHA51240e16b825eabf5085a8a249b57ee0ac13915975f7396d7e14fd09911f2a2c39cd0a37b523dd20316122267efff42016e4418ea3ceddd6944be3718f6ced34c34
-
C:\Users\Admin\AppData\Roaming\Logs\06-10-2024Filesize
224B
MD548700a740547b61216af313ea8ad7c8c
SHA1f00fbaf02442321907f7db46b4bc2bfe4d62cbcc
SHA256b3dc81c137d1a76027dac18ff816fac27c3281f9d19877efec1761b6ae411ab1
SHA512c7b5fbc72839e6e03a91a6fb94c8a4bb66107a2f7b30773d3bb9f12425ab868cd3cc89f811f42314d6885d36f455220dc5c603d2b09ab212c0371124759cc111
-
C:\Users\Admin\AppData\Roaming\Logs\06-10-2024Filesize
224B
MD5ca71f167a9a1fa8dd4da4bf90028c907
SHA16c5350f1b60d466e6056d7e60fde38b4d5a5826d
SHA2560bdbcced25e4015a42eb003e3b96e4a1ac2774713919037c8e768f200aa26d14
SHA51258d8f52e112bdfa3342587ed331968abafe4616d4cecaacad2f7d074d3dc7b861c8847f1a4738f06d78af8296a8c401ed49fa04f24733cd0e51954e58606875d
-
C:\Users\Admin\AppData\Roaming\Logs\06-10-2024Filesize
224B
MD5b844dcb36c9360d599d9d137e26e51c3
SHA1fa4b47287e909325d0d1b9b64695b14429fbaefb
SHA256adf2a0f99a874fd0dcfd8b8220d91232fab37190d9f07c407f128fde0fee7eb3
SHA5122982ab49d8519ed58d90d6a84c446234eba8ea5f1777559947b0743d5fa6518677142003f90994c563609273a6ed2503874cb0d31fe9180b8056660101c17c85
-
C:\Users\Admin\AppData\Roaming\Logs\06-10-2024Filesize
224B
MD54af2600a79826ac9350830df50385242
SHA117fa5045f546c999a67700cb849a4869295e6e9b
SHA2567d23c26b0bab665a6e68b5d5a258ecb1a6e2c648614f706fcb17b6a64975213e
SHA512450a47fb22e0025261fe04d47d0fc53044530e59a61d3986560d97faad082f38cbf2958c5d7680441dfd0f342cca8e4f946a6ce6b6b6d6b9847f32a963bb78b9
-
C:\Users\Admin\AppData\Roaming\Logs\06-10-2024Filesize
224B
MD5ce69cb1382d61c4b6ab0d2b4997f13af
SHA1f4cc0d8874eb273766c37948ebee671859232487
SHA2562744abf7c8d632ef6029d54e9a771b727531fc95eada79da1bc366578157d6b8
SHA512d2b8d8d6c9abfaab096f14f0a723732a89002605a25f46a809e338996e05e16c336e2f98bd3973b85f848c7caceb6effc697b0180d6eae52632f209cbb4e9cf1
-
C:\Users\Admin\AppData\Roaming\Logs\06-10-2024MD5
d41d8cd98f00b204e9800998ecf8427e
SHA1da39a3ee5e6b4b0d3255bfef95601890afd80709
SHA256e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855
SHA512cf83e1357eefb8bdf1542850d66d8007d620e4050b5715dc83f4a921d36ce9ce47d0d13c5d85f2b0ff8318d2877eec2f63b931bd47417a81a538327af927da3e
-
C:\Users\Admin\AppData\Roaming\Logs\06-10-2024Filesize
224B
MD522cbbe535fec35e5af210486fd2b749b
SHA17775e507b7f2339b343549895fa0dc88265c02a0
SHA2568f1fcb0c6295bbbb528ed07882518e5a1dfff7905e6d657f5bf991e04622ad1e
SHA5126bf853b92962de3c8bd6489bedaf96d4a27128d8896ad3fc658c5099a570f489236a4c3ba5e5ac0516899b654dfc5b9eada6bbe6ab5944eea3fa6feaadda1643
-
C:\Users\Admin\AppData\Roaming\Logs\06-10-2024Filesize
224B
MD55f3a3f74254b2ff33f25c42e7b33b7e1
SHA15da155905405c5d2dfd0642b59a4d610229bcae3
SHA256542344d72166445c583ff41190efa85d9f70042ca13acaca885c791bdfb0e1ab
SHA5124d2770fb283305ee3621fddea8cd8416e39e1c5c26c9683a725146ec990e7fe08f43c9f8c06f5cea767bd60e9bb8446d8eb3c9d81d1fda836b5a5bf0639e7fb3
-
C:\Users\Admin\AppData\Roaming\SubDir\Client.exeFilesize
409KB
MD5b70fdac25a99501e3cae11f1b775249e
SHA13c59226479bfdcd1b2927bcfb1a7516d4cb8dd71
SHA25651ff3eb450a786c1aaa75ff889f2fd256412a7b75d04277fdf9fcccc20e57246
SHA51243f0d5d6e5f0d5febba537c109ffdbc250bbb6e9725e635a43ec975b0353048eaeee50b6e9274cd5e072ea6b0cea32439bd37408b2528832f467f2075f74ca44
-
memory/2744-15-0x00000000747D0000-0x0000000074F80000-memory.dmpFilesize
7.7MB
-
memory/2744-24-0x00000000747D0000-0x0000000074F80000-memory.dmpFilesize
7.7MB
-
memory/2744-17-0x00000000747D0000-0x0000000074F80000-memory.dmpFilesize
7.7MB
-
memory/2744-19-0x0000000006E40000-0x0000000006E4A000-memory.dmpFilesize
40KB
-
memory/3956-7-0x00000000747DE000-0x00000000747DF000-memory.dmpFilesize
4KB
-
memory/3956-0-0x00000000747DE000-0x00000000747DF000-memory.dmpFilesize
4KB
-
memory/3956-8-0x00000000747D0000-0x0000000074F80000-memory.dmpFilesize
7.7MB
-
memory/3956-16-0x00000000747D0000-0x0000000074F80000-memory.dmpFilesize
7.7MB
-
memory/3956-6-0x0000000005D90000-0x0000000005DA2000-memory.dmpFilesize
72KB
-
memory/3956-5-0x0000000004F30000-0x0000000004F96000-memory.dmpFilesize
408KB
-
memory/3956-4-0x00000000747D0000-0x0000000074F80000-memory.dmpFilesize
7.7MB
-
memory/3956-3-0x0000000004FD0000-0x0000000005062000-memory.dmpFilesize
584KB
-
memory/3956-2-0x0000000005580000-0x0000000005B24000-memory.dmpFilesize
5.6MB
-
memory/3956-1-0x0000000000510000-0x000000000057C000-memory.dmpFilesize
432KB