Overview
overview
10Static
static
10uni/Uni - ...py.exe
windows7-x64
10uni/Uni - ...py.exe
windows10-2004-x64
10uni/Uni - ...py.exe
windows7-x64
10uni/Uni - ...py.exe
windows10-2004-x64
10uni/Uni - ...py.exe
windows7-x64
10uni/Uni - ...py.exe
windows10-2004-x64
10uni/Uni - ...py.exe
windows7-x64
10uni/Uni - ...py.exe
windows10-2004-x64
10uni/Uni - ...py.exe
windows7-x64
10uni/Uni - ...py.exe
windows10-2004-x64
10uni/Uni - ...py.exe
windows7-x64
10uni/Uni - ...py.exe
windows10-2004-x64
10uni/Uni - ...py.exe
windows7-x64
10uni/Uni - ...py.exe
windows10-2004-x64
10uni/Uni - ...py.exe
windows7-x64
10uni/Uni - ...py.exe
windows10-2004-x64
10uni/Uni - ...py.exe
windows7-x64
10uni/Uni - ...py.exe
windows10-2004-x64
10uni/Uni - ...py.exe
windows7-x64
10uni/Uni - ...py.exe
windows10-2004-x64
10uni/Uni - ...py.exe
windows7-x64
10uni/Uni - ...py.exe
windows10-2004-x64
10uni/Uni - ...py.exe
windows7-x64
10uni/Uni - ...py.exe
windows10-2004-x64
10uni/Uni - ...py.exe
windows7-x64
10uni/Uni - ...py.exe
windows10-2004-x64
10uni/Uni - ...py.exe
windows7-x64
10uni/Uni - ...py.exe
windows10-2004-x64
10uni/Uni - ...py.exe
windows7-x64
10uni/Uni - ...py.exe
windows10-2004-x64
10uni/Uni - ...py.exe
windows7-x64
10uni/Uni - ...py.exe
windows10-2004-x64
10Analysis
-
max time kernel
590s -
max time network
604s -
platform
windows10-2004_x64 -
resource
win10v2004-20240508-en -
resource tags
arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system -
submitted
10-06-2024 15:28
Behavioral task
behavioral1
Sample
uni/Uni - Copy (10) - Copy - Copy - Copy.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
uni/Uni - Copy (10) - Copy - Copy - Copy.exe
Resource
win10v2004-20240426-en
Behavioral task
behavioral3
Sample
uni/Uni - Copy (10) - Copy - Copy.exe
Resource
win7-20240221-en
Behavioral task
behavioral4
Sample
uni/Uni - Copy (10) - Copy - Copy.exe
Resource
win10v2004-20240426-en
Behavioral task
behavioral5
Sample
uni/Uni - Copy (10) - Copy.exe
Resource
win7-20240220-en
Behavioral task
behavioral6
Sample
uni/Uni - Copy (10) - Copy.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral7
Sample
uni/Uni - Copy (11) - Copy - Copy - Copy.exe
Resource
win7-20231129-en
Behavioral task
behavioral8
Sample
uni/Uni - Copy (11) - Copy - Copy - Copy.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral9
Sample
uni/Uni - Copy (11) - Copy - Copy.exe
Resource
win7-20240508-en
Behavioral task
behavioral10
Sample
uni/Uni - Copy (11) - Copy - Copy.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral11
Sample
uni/Uni - Copy (11) - Copy.exe
Resource
win7-20240221-en
Behavioral task
behavioral12
Sample
uni/Uni - Copy (11) - Copy.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral13
Sample
uni/Uni - Copy (12) - Copy - Copy - Copy.exe
Resource
win7-20240508-en
Behavioral task
behavioral14
Sample
uni/Uni - Copy (12) - Copy - Copy - Copy.exe
Resource
win10v2004-20240426-en
Behavioral task
behavioral15
Sample
uni/Uni - Copy (12) - Copy - Copy.exe
Resource
win7-20240508-en
Behavioral task
behavioral16
Sample
uni/Uni - Copy (12) - Copy - Copy.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral17
Sample
uni/Uni - Copy (12) - Copy.exe
Resource
win7-20240221-en
Behavioral task
behavioral18
Sample
uni/Uni - Copy (12) - Copy.exe
Resource
win10v2004-20240426-en
Behavioral task
behavioral19
Sample
uni/Uni - Copy (13) - Copy - Copy - Copy.exe
Resource
win7-20240419-en
Behavioral task
behavioral20
Sample
uni/Uni - Copy (13) - Copy - Copy - Copy.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral21
Sample
uni/Uni - Copy (13) - Copy - Copy.exe
Resource
win7-20240508-en
Behavioral task
behavioral22
Sample
uni/Uni - Copy (13) - Copy - Copy.exe
Resource
win10v2004-20240426-en
Behavioral task
behavioral23
Sample
uni/Uni - Copy (13) - Copy.exe
Resource
win7-20240419-en
Behavioral task
behavioral24
Sample
uni/Uni - Copy (13) - Copy.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral25
Sample
uni/Uni - Copy (14) - Copy - Copy - Copy.exe
Resource
win7-20240221-en
Behavioral task
behavioral26
Sample
uni/Uni - Copy (14) - Copy - Copy - Copy.exe
Resource
win10v2004-20240426-en
Behavioral task
behavioral27
Sample
uni/Uni - Copy (14) - Copy - Copy.exe
Resource
win7-20240508-en
Behavioral task
behavioral28
Sample
uni/Uni - Copy (14) - Copy - Copy.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral29
Sample
uni/Uni - Copy (14) - Copy.exe
Resource
win7-20231129-en
Behavioral task
behavioral30
Sample
uni/Uni - Copy (14) - Copy.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral31
Sample
uni/Uni - Copy (15) - Copy - Copy - Copy.exe
Resource
win7-20240508-en
Behavioral task
behavioral32
Sample
uni/Uni - Copy (15) - Copy - Copy - Copy.exe
Resource
win10v2004-20240508-en
General
-
Target
uni/Uni - Copy (15) - Copy - Copy - Copy.exe
-
Size
409KB
-
MD5
b70fdac25a99501e3cae11f1b775249e
-
SHA1
3c59226479bfdcd1b2927bcfb1a7516d4cb8dd71
-
SHA256
51ff3eb450a786c1aaa75ff889f2fd256412a7b75d04277fdf9fcccc20e57246
-
SHA512
43f0d5d6e5f0d5febba537c109ffdbc250bbb6e9725e635a43ec975b0353048eaeee50b6e9274cd5e072ea6b0cea32439bd37408b2528832f467f2075f74ca44
-
SSDEEP
12288:gpbJjGut6AoE3hVVdFaC/eZPTMTDlpgfJCKuMsVs:oVaurMLcDlpRKai
Malware Config
Extracted
quasar
3.1.5
SeroXen
panel-slave.gl.at.ply.gg:57059
panel-slave.gl.at.ply.gg:27892
$Sxr-rpL8EItHN3pqIQQVy2
-
encryption_key
Lme7VBS3l58VwLM69PNM
-
install_name
Client.exe
-
log_directory
Logs
-
reconnect_delay
3000
-
startup_key
SeroXen
-
subdirectory
SubDir
Signatures
-
Quasar payload 2 IoCs
Processes:
resource yara_rule behavioral32/memory/3940-1-0x0000000000B50000-0x0000000000BBC000-memory.dmp family_quasar C:\Users\Admin\AppData\Roaming\SubDir\Client.exe family_quasar -
Checks computer location settings 2 TTPs 27 IoCs
Looks up country code configured in the registry, likely geofence.
Processes:
Client.exeClient.exeClient.exeClient.exeClient.exeClient.exeClient.exeClient.exeClient.exeClient.exeClient.exeClient.exeClient.exeClient.exeClient.exeClient.exeClient.exeClient.exeClient.exeClient.exeClient.exeClient.exeClient.exeClient.exeClient.exeClient.exeClient.exedescription ioc process Key value queried \REGISTRY\USER\S-1-5-21-3558294865-3673844354-2255444939-1000\Control Panel\International\Geo\Nation Client.exe Key value queried \REGISTRY\USER\S-1-5-21-3558294865-3673844354-2255444939-1000\Control Panel\International\Geo\Nation Client.exe Key value queried \REGISTRY\USER\S-1-5-21-3558294865-3673844354-2255444939-1000\Control Panel\International\Geo\Nation Client.exe Key value queried \REGISTRY\USER\S-1-5-21-3558294865-3673844354-2255444939-1000\Control Panel\International\Geo\Nation Client.exe Key value queried \REGISTRY\USER\S-1-5-21-3558294865-3673844354-2255444939-1000\Control Panel\International\Geo\Nation Client.exe Key value queried \REGISTRY\USER\S-1-5-21-3558294865-3673844354-2255444939-1000\Control Panel\International\Geo\Nation Client.exe Key value queried \REGISTRY\USER\S-1-5-21-3558294865-3673844354-2255444939-1000\Control Panel\International\Geo\Nation Client.exe Key value queried \REGISTRY\USER\S-1-5-21-3558294865-3673844354-2255444939-1000\Control Panel\International\Geo\Nation Client.exe Key value queried \REGISTRY\USER\S-1-5-21-3558294865-3673844354-2255444939-1000\Control Panel\International\Geo\Nation Client.exe Key value queried \REGISTRY\USER\S-1-5-21-3558294865-3673844354-2255444939-1000\Control Panel\International\Geo\Nation Client.exe Key value queried \REGISTRY\USER\S-1-5-21-3558294865-3673844354-2255444939-1000\Control Panel\International\Geo\Nation Client.exe Key value queried \REGISTRY\USER\S-1-5-21-3558294865-3673844354-2255444939-1000\Control Panel\International\Geo\Nation Client.exe Key value queried \REGISTRY\USER\S-1-5-21-3558294865-3673844354-2255444939-1000\Control Panel\International\Geo\Nation Client.exe Key value queried \REGISTRY\USER\S-1-5-21-3558294865-3673844354-2255444939-1000\Control Panel\International\Geo\Nation Client.exe Key value queried \REGISTRY\USER\S-1-5-21-3558294865-3673844354-2255444939-1000\Control Panel\International\Geo\Nation Client.exe Key value queried \REGISTRY\USER\S-1-5-21-3558294865-3673844354-2255444939-1000\Control Panel\International\Geo\Nation Client.exe Key value queried \REGISTRY\USER\S-1-5-21-3558294865-3673844354-2255444939-1000\Control Panel\International\Geo\Nation Client.exe Key value queried \REGISTRY\USER\S-1-5-21-3558294865-3673844354-2255444939-1000\Control Panel\International\Geo\Nation Client.exe Key value queried \REGISTRY\USER\S-1-5-21-3558294865-3673844354-2255444939-1000\Control Panel\International\Geo\Nation Client.exe Key value queried \REGISTRY\USER\S-1-5-21-3558294865-3673844354-2255444939-1000\Control Panel\International\Geo\Nation Client.exe Key value queried \REGISTRY\USER\S-1-5-21-3558294865-3673844354-2255444939-1000\Control Panel\International\Geo\Nation Client.exe Key value queried \REGISTRY\USER\S-1-5-21-3558294865-3673844354-2255444939-1000\Control Panel\International\Geo\Nation Client.exe Key value queried \REGISTRY\USER\S-1-5-21-3558294865-3673844354-2255444939-1000\Control Panel\International\Geo\Nation Client.exe Key value queried \REGISTRY\USER\S-1-5-21-3558294865-3673844354-2255444939-1000\Control Panel\International\Geo\Nation Client.exe Key value queried \REGISTRY\USER\S-1-5-21-3558294865-3673844354-2255444939-1000\Control Panel\International\Geo\Nation Client.exe Key value queried \REGISTRY\USER\S-1-5-21-3558294865-3673844354-2255444939-1000\Control Panel\International\Geo\Nation Client.exe Key value queried \REGISTRY\USER\S-1-5-21-3558294865-3673844354-2255444939-1000\Control Panel\International\Geo\Nation Client.exe -
Executes dropped EXE 28 IoCs
Processes:
Client.exeClient.exeClient.exeClient.exeClient.exeClient.exeClient.exeClient.exeClient.exeClient.exeClient.exeClient.exeClient.exeClient.exeClient.exeClient.exeClient.exeClient.exeClient.exeClient.exeClient.exeClient.exeClient.exeClient.exeClient.exeClient.exeClient.exeClient.exepid process 904 Client.exe 3056 Client.exe 644 Client.exe 4324 Client.exe 1456 Client.exe 4576 Client.exe 3032 Client.exe 4296 Client.exe 64 Client.exe 1812 Client.exe 4168 Client.exe 2224 Client.exe 4124 Client.exe 3960 Client.exe 1152 Client.exe 692 Client.exe 4056 Client.exe 1592 Client.exe 900 Client.exe 3172 Client.exe 1884 Client.exe 1032 Client.exe 3460 Client.exe 4816 Client.exe 2332 Client.exe 1804 Client.exe 5024 Client.exe 2584 Client.exe -
Adds Run key to start application 2 TTPs 1 IoCs
Processes:
Client.exedescription ioc process Set value (str) \REGISTRY\USER\S-1-5-21-3558294865-3673844354-2255444939-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\SeroXen = "\"C:\\Users\\Admin\\AppData\\Roaming\\SubDir\\Client.exe\"" Client.exe -
Looks up external IP address via web service 26 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
Processes:
flow ioc 17 ip-api.com 29 ip-api.com 32 ip-api.com 53 ip-api.com 64 ip-api.com 15 ip-api.com 45 ip-api.com 51 ip-api.com 62 ip-api.com 34 ip-api.com 43 ip-api.com 2 ip-api.com 40 ip-api.com 38 ip-api.com 58 ip-api.com 11 ip-api.com 22 ip-api.com 26 ip-api.com 8 api.ipify.org 36 ip-api.com 47 ip-api.com 24 ip-api.com 19 ip-api.com 55 ip-api.com 60 ip-api.com 13 ip-api.com -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Program crash 27 IoCs
Processes:
WerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exepid pid_target process target process 4896 904 WerFault.exe Client.exe 3136 3056 WerFault.exe Client.exe 4336 644 WerFault.exe Client.exe 1068 4324 WerFault.exe Client.exe 2444 1456 WerFault.exe Client.exe 3192 4576 WerFault.exe Client.exe 2128 3032 WerFault.exe Client.exe 2192 4296 WerFault.exe Client.exe 2908 64 WerFault.exe Client.exe 380 1812 WerFault.exe Client.exe 4708 4168 WerFault.exe Client.exe 5052 2224 WerFault.exe Client.exe 3400 4124 WerFault.exe Client.exe 2204 3960 WerFault.exe Client.exe 2608 1152 WerFault.exe Client.exe 3620 692 WerFault.exe Client.exe 4328 4056 WerFault.exe Client.exe 5056 1592 WerFault.exe Client.exe 904 900 WerFault.exe Client.exe 556 3172 WerFault.exe Client.exe 4040 1884 WerFault.exe Client.exe 1500 1032 WerFault.exe Client.exe 2892 3460 WerFault.exe Client.exe 2396 4816 WerFault.exe Client.exe 3916 2332 WerFault.exe Client.exe 2660 1804 WerFault.exe Client.exe 224 5024 WerFault.exe Client.exe -
Creates scheduled task(s) 1 TTPs 29 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
Processes:
schtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeSCHTASKS.exeschtasks.exeschtasks.exeschtasks.exepid process 3136 schtasks.exe 3616 schtasks.exe 4388 schtasks.exe 3168 schtasks.exe 3208 schtasks.exe 3684 schtasks.exe 688 schtasks.exe 3384 schtasks.exe 2828 schtasks.exe 1796 schtasks.exe 5020 schtasks.exe 4416 schtasks.exe 456 schtasks.exe 5096 schtasks.exe 2772 schtasks.exe 468 schtasks.exe 116 schtasks.exe 3776 schtasks.exe 4516 schtasks.exe 1660 schtasks.exe 468 schtasks.exe 1084 schtasks.exe 728 schtasks.exe 2168 schtasks.exe 3172 schtasks.exe 3232 SCHTASKS.exe 1724 schtasks.exe 4672 schtasks.exe 2184 schtasks.exe -
Runs ping.exe 1 TTPs 27 IoCs
Processes:
PING.EXEPING.EXEPING.EXEPING.EXEPING.EXEPING.EXEPING.EXEPING.EXEPING.EXEPING.EXEPING.EXEPING.EXEPING.EXEPING.EXEPING.EXEPING.EXEPING.EXEPING.EXEPING.EXEPING.EXEPING.EXEPING.EXEPING.EXEPING.EXEPING.EXEPING.EXEPING.EXEpid process 2124 PING.EXE 2784 PING.EXE 1204 PING.EXE 4112 PING.EXE 4420 PING.EXE 1740 PING.EXE 3968 PING.EXE 2556 PING.EXE 3300 PING.EXE 632 PING.EXE 2964 PING.EXE 4828 PING.EXE 4296 PING.EXE 2400 PING.EXE 3976 PING.EXE 704 PING.EXE 1480 PING.EXE 5004 PING.EXE 1304 PING.EXE 4680 PING.EXE 3852 PING.EXE 1540 PING.EXE 1812 PING.EXE 4444 PING.EXE 1236 PING.EXE 3976 PING.EXE 1636 PING.EXE -
Suspicious use of AdjustPrivilegeToken 29 IoCs
Processes:
Uni - Copy (15) - Copy - Copy - Copy.exeClient.exeClient.exeClient.exeClient.exeClient.exeClient.exeClient.exeClient.exeClient.exeClient.exeClient.exeClient.exeClient.exeClient.exeClient.exeClient.exeClient.exeClient.exeClient.exeClient.exeClient.exeClient.exeClient.exeClient.exeClient.exeClient.exeClient.exeClient.exedescription pid process Token: SeDebugPrivilege 3940 Uni - Copy (15) - Copy - Copy - Copy.exe Token: SeDebugPrivilege 904 Client.exe Token: SeDebugPrivilege 3056 Client.exe Token: SeDebugPrivilege 644 Client.exe Token: SeDebugPrivilege 4324 Client.exe Token: SeDebugPrivilege 1456 Client.exe Token: SeDebugPrivilege 4576 Client.exe Token: SeDebugPrivilege 3032 Client.exe Token: SeDebugPrivilege 4296 Client.exe Token: SeDebugPrivilege 64 Client.exe Token: SeDebugPrivilege 1812 Client.exe Token: SeDebugPrivilege 4168 Client.exe Token: SeDebugPrivilege 2224 Client.exe Token: SeDebugPrivilege 4124 Client.exe Token: SeDebugPrivilege 3960 Client.exe Token: SeDebugPrivilege 1152 Client.exe Token: SeDebugPrivilege 692 Client.exe Token: SeDebugPrivilege 4056 Client.exe Token: SeDebugPrivilege 1592 Client.exe Token: SeDebugPrivilege 900 Client.exe Token: SeDebugPrivilege 3172 Client.exe Token: SeDebugPrivilege 1884 Client.exe Token: SeDebugPrivilege 1032 Client.exe Token: SeDebugPrivilege 3460 Client.exe Token: SeDebugPrivilege 4816 Client.exe Token: SeDebugPrivilege 2332 Client.exe Token: SeDebugPrivilege 1804 Client.exe Token: SeDebugPrivilege 5024 Client.exe Token: SeDebugPrivilege 2584 Client.exe -
Suspicious use of SetWindowsHookEx 27 IoCs
Processes:
Client.exeClient.exeClient.exeClient.exeClient.exeClient.exeClient.exeClient.exeClient.exeClient.exeClient.exeClient.exeClient.exeClient.exeClient.exeClient.exeClient.exeClient.exeClient.exeClient.exeClient.exeClient.exeClient.exeClient.exeClient.exeClient.exeClient.exepid process 904 Client.exe 3056 Client.exe 644 Client.exe 4324 Client.exe 1456 Client.exe 4576 Client.exe 3032 Client.exe 4296 Client.exe 64 Client.exe 1812 Client.exe 4168 Client.exe 2224 Client.exe 4124 Client.exe 3960 Client.exe 1152 Client.exe 692 Client.exe 4056 Client.exe 1592 Client.exe 900 Client.exe 3172 Client.exe 1884 Client.exe 1032 Client.exe 3460 Client.exe 4816 Client.exe 2332 Client.exe 1804 Client.exe 5024 Client.exe -
Suspicious use of WriteProcessMemory 64 IoCs
Processes:
Uni - Copy (15) - Copy - Copy - Copy.exeClient.execmd.exeClient.execmd.exeClient.execmd.exeClient.execmd.exedescription pid process target process PID 3940 wrote to memory of 2772 3940 Uni - Copy (15) - Copy - Copy - Copy.exe schtasks.exe PID 3940 wrote to memory of 2772 3940 Uni - Copy (15) - Copy - Copy - Copy.exe schtasks.exe PID 3940 wrote to memory of 2772 3940 Uni - Copy (15) - Copy - Copy - Copy.exe schtasks.exe PID 3940 wrote to memory of 904 3940 Uni - Copy (15) - Copy - Copy - Copy.exe Client.exe PID 3940 wrote to memory of 904 3940 Uni - Copy (15) - Copy - Copy - Copy.exe Client.exe PID 3940 wrote to memory of 904 3940 Uni - Copy (15) - Copy - Copy - Copy.exe Client.exe PID 3940 wrote to memory of 3232 3940 Uni - Copy (15) - Copy - Copy - Copy.exe SCHTASKS.exe PID 3940 wrote to memory of 3232 3940 Uni - Copy (15) - Copy - Copy - Copy.exe SCHTASKS.exe PID 3940 wrote to memory of 3232 3940 Uni - Copy (15) - Copy - Copy - Copy.exe SCHTASKS.exe PID 904 wrote to memory of 3384 904 Client.exe schtasks.exe PID 904 wrote to memory of 3384 904 Client.exe schtasks.exe PID 904 wrote to memory of 3384 904 Client.exe schtasks.exe PID 904 wrote to memory of 380 904 Client.exe cmd.exe PID 904 wrote to memory of 380 904 Client.exe cmd.exe PID 904 wrote to memory of 380 904 Client.exe cmd.exe PID 380 wrote to memory of 1588 380 cmd.exe chcp.com PID 380 wrote to memory of 1588 380 cmd.exe chcp.com PID 380 wrote to memory of 1588 380 cmd.exe chcp.com PID 380 wrote to memory of 1636 380 cmd.exe PING.EXE PID 380 wrote to memory of 1636 380 cmd.exe PING.EXE PID 380 wrote to memory of 1636 380 cmd.exe PING.EXE PID 380 wrote to memory of 3056 380 cmd.exe Client.exe PID 380 wrote to memory of 3056 380 cmd.exe Client.exe PID 380 wrote to memory of 3056 380 cmd.exe Client.exe PID 3056 wrote to memory of 1660 3056 Client.exe schtasks.exe PID 3056 wrote to memory of 1660 3056 Client.exe schtasks.exe PID 3056 wrote to memory of 1660 3056 Client.exe schtasks.exe PID 3056 wrote to memory of 4440 3056 Client.exe cmd.exe PID 3056 wrote to memory of 4440 3056 Client.exe cmd.exe PID 3056 wrote to memory of 4440 3056 Client.exe cmd.exe PID 4440 wrote to memory of 3872 4440 cmd.exe chcp.com PID 4440 wrote to memory of 3872 4440 cmd.exe chcp.com PID 4440 wrote to memory of 3872 4440 cmd.exe chcp.com PID 4440 wrote to memory of 3300 4440 cmd.exe PING.EXE PID 4440 wrote to memory of 3300 4440 cmd.exe PING.EXE PID 4440 wrote to memory of 3300 4440 cmd.exe PING.EXE PID 4440 wrote to memory of 644 4440 cmd.exe Client.exe PID 4440 wrote to memory of 644 4440 cmd.exe Client.exe PID 4440 wrote to memory of 644 4440 cmd.exe Client.exe PID 644 wrote to memory of 3776 644 Client.exe schtasks.exe PID 644 wrote to memory of 3776 644 Client.exe schtasks.exe PID 644 wrote to memory of 3776 644 Client.exe schtasks.exe PID 644 wrote to memory of 4708 644 Client.exe cmd.exe PID 644 wrote to memory of 4708 644 Client.exe cmd.exe PID 644 wrote to memory of 4708 644 Client.exe cmd.exe PID 4708 wrote to memory of 1392 4708 cmd.exe chcp.com PID 4708 wrote to memory of 1392 4708 cmd.exe chcp.com PID 4708 wrote to memory of 1392 4708 cmd.exe chcp.com PID 4708 wrote to memory of 4444 4708 cmd.exe PING.EXE PID 4708 wrote to memory of 4444 4708 cmd.exe PING.EXE PID 4708 wrote to memory of 4444 4708 cmd.exe PING.EXE PID 4708 wrote to memory of 4324 4708 cmd.exe Client.exe PID 4708 wrote to memory of 4324 4708 cmd.exe Client.exe PID 4708 wrote to memory of 4324 4708 cmd.exe Client.exe PID 4324 wrote to memory of 2828 4324 Client.exe schtasks.exe PID 4324 wrote to memory of 2828 4324 Client.exe schtasks.exe PID 4324 wrote to memory of 2828 4324 Client.exe schtasks.exe PID 4324 wrote to memory of 4852 4324 Client.exe cmd.exe PID 4324 wrote to memory of 4852 4324 Client.exe cmd.exe PID 4324 wrote to memory of 4852 4324 Client.exe cmd.exe PID 4852 wrote to memory of 4144 4852 cmd.exe chcp.com PID 4852 wrote to memory of 4144 4852 cmd.exe chcp.com PID 4852 wrote to memory of 4144 4852 cmd.exe chcp.com PID 4852 wrote to memory of 1236 4852 cmd.exe PING.EXE
Processes
-
C:\Users\Admin\AppData\Local\Temp\uni\Uni - Copy (15) - Copy - Copy - Copy.exe"C:\Users\Admin\AppData\Local\Temp\uni\Uni - Copy (15) - Copy - Copy - Copy.exe"1⤵
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\schtasks.exe"schtasks" /create /tn "SeroXen" /sc ONLOGON /tr "C:\Users\Admin\AppData\Local\Temp\uni\Uni - Copy (15) - Copy - Copy - Copy.exe" /rl HIGHEST /f2⤵
- Creates scheduled task(s)
-
C:\Users\Admin\AppData\Roaming\SubDir\Client.exe"C:\Users\Admin\AppData\Roaming\SubDir\Client.exe"2⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\schtasks.exe"schtasks" /create /tn "SeroXen" /sc ONLOGON /tr "C:\Users\Admin\AppData\Roaming\SubDir\Client.exe" /rl HIGHEST /f3⤵
- Creates scheduled task(s)
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\Ktx4cEBJMm7n.bat" "3⤵
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\chcp.comchcp 650014⤵
-
C:\Windows\SysWOW64\PING.EXEping -n 10 localhost4⤵
- Runs ping.exe
-
C:\Users\Admin\AppData\Roaming\SubDir\Client.exe"C:\Users\Admin\AppData\Roaming\SubDir\Client.exe"4⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\schtasks.exe"schtasks" /create /tn "SeroXen" /sc ONLOGON /tr "C:\Users\Admin\AppData\Roaming\SubDir\Client.exe" /rl HIGHEST /f5⤵
- Creates scheduled task(s)
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\N5K4CQRftxIu.bat" "5⤵
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\chcp.comchcp 650016⤵
-
C:\Windows\SysWOW64\PING.EXEping -n 10 localhost6⤵
- Runs ping.exe
-
C:\Users\Admin\AppData\Roaming\SubDir\Client.exe"C:\Users\Admin\AppData\Roaming\SubDir\Client.exe"6⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\schtasks.exe"schtasks" /create /tn "SeroXen" /sc ONLOGON /tr "C:\Users\Admin\AppData\Roaming\SubDir\Client.exe" /rl HIGHEST /f7⤵
- Creates scheduled task(s)
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\JFbhTUKXWP0I.bat" "7⤵
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\chcp.comchcp 650018⤵
-
C:\Windows\SysWOW64\PING.EXEping -n 10 localhost8⤵
- Runs ping.exe
-
C:\Users\Admin\AppData\Roaming\SubDir\Client.exe"C:\Users\Admin\AppData\Roaming\SubDir\Client.exe"8⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\schtasks.exe"schtasks" /create /tn "SeroXen" /sc ONLOGON /tr "C:\Users\Admin\AppData\Roaming\SubDir\Client.exe" /rl HIGHEST /f9⤵
- Creates scheduled task(s)
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\ma76S2UHWeCy.bat" "9⤵
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\chcp.comchcp 6500110⤵
-
C:\Windows\SysWOW64\PING.EXEping -n 10 localhost10⤵
- Runs ping.exe
-
C:\Users\Admin\AppData\Roaming\SubDir\Client.exe"C:\Users\Admin\AppData\Roaming\SubDir\Client.exe"10⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
-
C:\Windows\SysWOW64\schtasks.exe"schtasks" /create /tn "SeroXen" /sc ONLOGON /tr "C:\Users\Admin\AppData\Roaming\SubDir\Client.exe" /rl HIGHEST /f11⤵
- Creates scheduled task(s)
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\0sueYxwubXV8.bat" "11⤵
-
C:\Windows\SysWOW64\chcp.comchcp 6500112⤵
-
C:\Windows\SysWOW64\PING.EXEping -n 10 localhost12⤵
- Runs ping.exe
-
C:\Users\Admin\AppData\Roaming\SubDir\Client.exe"C:\Users\Admin\AppData\Roaming\SubDir\Client.exe"12⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
-
C:\Windows\SysWOW64\schtasks.exe"schtasks" /create /tn "SeroXen" /sc ONLOGON /tr "C:\Users\Admin\AppData\Roaming\SubDir\Client.exe" /rl HIGHEST /f13⤵
- Creates scheduled task(s)
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\yzTMyqzutIdc.bat" "13⤵
-
C:\Windows\SysWOW64\chcp.comchcp 6500114⤵
-
C:\Windows\SysWOW64\PING.EXEping -n 10 localhost14⤵
- Runs ping.exe
-
C:\Users\Admin\AppData\Roaming\SubDir\Client.exe"C:\Users\Admin\AppData\Roaming\SubDir\Client.exe"14⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
-
C:\Windows\SysWOW64\schtasks.exe"schtasks" /create /tn "SeroXen" /sc ONLOGON /tr "C:\Users\Admin\AppData\Roaming\SubDir\Client.exe" /rl HIGHEST /f15⤵
- Creates scheduled task(s)
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\HnETchDwAxWa.bat" "15⤵
-
C:\Windows\SysWOW64\chcp.comchcp 6500116⤵
-
C:\Windows\SysWOW64\PING.EXEping -n 10 localhost16⤵
- Runs ping.exe
-
C:\Users\Admin\AppData\Roaming\SubDir\Client.exe"C:\Users\Admin\AppData\Roaming\SubDir\Client.exe"16⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
-
C:\Windows\SysWOW64\schtasks.exe"schtasks" /create /tn "SeroXen" /sc ONLOGON /tr "C:\Users\Admin\AppData\Roaming\SubDir\Client.exe" /rl HIGHEST /f17⤵
- Creates scheduled task(s)
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\4sr4vhjA3BTR.bat" "17⤵
-
C:\Windows\SysWOW64\chcp.comchcp 6500118⤵
-
C:\Windows\SysWOW64\PING.EXEping -n 10 localhost18⤵
- Runs ping.exe
-
C:\Users\Admin\AppData\Roaming\SubDir\Client.exe"C:\Users\Admin\AppData\Roaming\SubDir\Client.exe"18⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
-
C:\Windows\SysWOW64\schtasks.exe"schtasks" /create /tn "SeroXen" /sc ONLOGON /tr "C:\Users\Admin\AppData\Roaming\SubDir\Client.exe" /rl HIGHEST /f19⤵
- Creates scheduled task(s)
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\KfoRmonso2gV.bat" "19⤵
-
C:\Windows\SysWOW64\chcp.comchcp 6500120⤵
-
C:\Windows\SysWOW64\PING.EXEping -n 10 localhost20⤵
- Runs ping.exe
-
C:\Users\Admin\AppData\Roaming\SubDir\Client.exe"C:\Users\Admin\AppData\Roaming\SubDir\Client.exe"20⤵
- Checks computer location settings
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
-
C:\Windows\SysWOW64\schtasks.exe"schtasks" /create /tn "SeroXen" /sc ONLOGON /tr "C:\Users\Admin\AppData\Roaming\SubDir\Client.exe" /rl HIGHEST /f21⤵
- Creates scheduled task(s)
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\zNaRMdICbgiN.bat" "21⤵
-
C:\Windows\SysWOW64\chcp.comchcp 6500122⤵
-
C:\Windows\SysWOW64\PING.EXEping -n 10 localhost22⤵
- Runs ping.exe
-
C:\Users\Admin\AppData\Roaming\SubDir\Client.exe"C:\Users\Admin\AppData\Roaming\SubDir\Client.exe"22⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
-
C:\Windows\SysWOW64\schtasks.exe"schtasks" /create /tn "SeroXen" /sc ONLOGON /tr "C:\Users\Admin\AppData\Roaming\SubDir\Client.exe" /rl HIGHEST /f23⤵
- Creates scheduled task(s)
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\Pl2cRedNV0sj.bat" "23⤵
-
C:\Windows\SysWOW64\chcp.comchcp 6500124⤵
-
C:\Windows\SysWOW64\PING.EXEping -n 10 localhost24⤵
- Runs ping.exe
-
C:\Users\Admin\AppData\Roaming\SubDir\Client.exe"C:\Users\Admin\AppData\Roaming\SubDir\Client.exe"24⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
-
C:\Windows\SysWOW64\schtasks.exe"schtasks" /create /tn "SeroXen" /sc ONLOGON /tr "C:\Users\Admin\AppData\Roaming\SubDir\Client.exe" /rl HIGHEST /f25⤵
- Creates scheduled task(s)
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\ZyHwrcawdCpP.bat" "25⤵
-
C:\Windows\SysWOW64\chcp.comchcp 6500126⤵
-
C:\Windows\SysWOW64\PING.EXEping -n 10 localhost26⤵
- Runs ping.exe
-
C:\Users\Admin\AppData\Roaming\SubDir\Client.exe"C:\Users\Admin\AppData\Roaming\SubDir\Client.exe"26⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
-
C:\Windows\SysWOW64\schtasks.exe"schtasks" /create /tn "SeroXen" /sc ONLOGON /tr "C:\Users\Admin\AppData\Roaming\SubDir\Client.exe" /rl HIGHEST /f27⤵
- Creates scheduled task(s)
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\P4jGxMGT2ETA.bat" "27⤵
-
C:\Windows\SysWOW64\chcp.comchcp 6500128⤵
-
C:\Windows\SysWOW64\PING.EXEping -n 10 localhost28⤵
- Runs ping.exe
-
C:\Users\Admin\AppData\Roaming\SubDir\Client.exe"C:\Users\Admin\AppData\Roaming\SubDir\Client.exe"28⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
-
C:\Windows\SysWOW64\schtasks.exe"schtasks" /create /tn "SeroXen" /sc ONLOGON /tr "C:\Users\Admin\AppData\Roaming\SubDir\Client.exe" /rl HIGHEST /f29⤵
- Creates scheduled task(s)
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\ZHxaNKC1AQQq.bat" "29⤵
-
C:\Windows\SysWOW64\chcp.comchcp 6500130⤵
-
C:\Windows\SysWOW64\PING.EXEping -n 10 localhost30⤵
- Runs ping.exe
-
C:\Users\Admin\AppData\Roaming\SubDir\Client.exe"C:\Users\Admin\AppData\Roaming\SubDir\Client.exe"30⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
-
C:\Windows\SysWOW64\schtasks.exe"schtasks" /create /tn "SeroXen" /sc ONLOGON /tr "C:\Users\Admin\AppData\Roaming\SubDir\Client.exe" /rl HIGHEST /f31⤵
- Creates scheduled task(s)
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\RsZjEGUdGQxV.bat" "31⤵
-
C:\Windows\SysWOW64\chcp.comchcp 6500132⤵
-
C:\Windows\SysWOW64\PING.EXEping -n 10 localhost32⤵
- Runs ping.exe
-
C:\Users\Admin\AppData\Roaming\SubDir\Client.exe"C:\Users\Admin\AppData\Roaming\SubDir\Client.exe"32⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
-
C:\Windows\SysWOW64\schtasks.exe"schtasks" /create /tn "SeroXen" /sc ONLOGON /tr "C:\Users\Admin\AppData\Roaming\SubDir\Client.exe" /rl HIGHEST /f33⤵
- Creates scheduled task(s)
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\oh7afssz3tYN.bat" "33⤵
-
C:\Windows\SysWOW64\chcp.comchcp 6500134⤵
-
C:\Windows\SysWOW64\PING.EXEping -n 10 localhost34⤵
- Runs ping.exe
-
C:\Users\Admin\AppData\Roaming\SubDir\Client.exe"C:\Users\Admin\AppData\Roaming\SubDir\Client.exe"34⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
-
C:\Windows\SysWOW64\schtasks.exe"schtasks" /create /tn "SeroXen" /sc ONLOGON /tr "C:\Users\Admin\AppData\Roaming\SubDir\Client.exe" /rl HIGHEST /f35⤵
- Creates scheduled task(s)
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\pNLlUsWFt6qZ.bat" "35⤵
-
C:\Windows\SysWOW64\chcp.comchcp 6500136⤵
-
C:\Windows\SysWOW64\PING.EXEping -n 10 localhost36⤵
- Runs ping.exe
-
C:\Users\Admin\AppData\Roaming\SubDir\Client.exe"C:\Users\Admin\AppData\Roaming\SubDir\Client.exe"36⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
-
C:\Windows\SysWOW64\schtasks.exe"schtasks" /create /tn "SeroXen" /sc ONLOGON /tr "C:\Users\Admin\AppData\Roaming\SubDir\Client.exe" /rl HIGHEST /f37⤵
- Creates scheduled task(s)
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\ex9BZ4eXSIgL.bat" "37⤵
-
C:\Windows\SysWOW64\chcp.comchcp 6500138⤵
-
C:\Windows\SysWOW64\PING.EXEping -n 10 localhost38⤵
- Runs ping.exe
-
C:\Users\Admin\AppData\Roaming\SubDir\Client.exe"C:\Users\Admin\AppData\Roaming\SubDir\Client.exe"38⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
-
C:\Windows\SysWOW64\schtasks.exe"schtasks" /create /tn "SeroXen" /sc ONLOGON /tr "C:\Users\Admin\AppData\Roaming\SubDir\Client.exe" /rl HIGHEST /f39⤵
- Creates scheduled task(s)
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\KS4hRv2birMn.bat" "39⤵
-
C:\Windows\SysWOW64\chcp.comchcp 6500140⤵
-
C:\Windows\SysWOW64\PING.EXEping -n 10 localhost40⤵
- Runs ping.exe
-
C:\Users\Admin\AppData\Roaming\SubDir\Client.exe"C:\Users\Admin\AppData\Roaming\SubDir\Client.exe"40⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
-
C:\Windows\SysWOW64\schtasks.exe"schtasks" /create /tn "SeroXen" /sc ONLOGON /tr "C:\Users\Admin\AppData\Roaming\SubDir\Client.exe" /rl HIGHEST /f41⤵
- Creates scheduled task(s)
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\JdOuj0RMRW9r.bat" "41⤵
-
C:\Windows\SysWOW64\chcp.comchcp 6500142⤵
-
C:\Windows\SysWOW64\PING.EXEping -n 10 localhost42⤵
- Runs ping.exe
-
C:\Users\Admin\AppData\Roaming\SubDir\Client.exe"C:\Users\Admin\AppData\Roaming\SubDir\Client.exe"42⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
-
C:\Windows\SysWOW64\schtasks.exe"schtasks" /create /tn "SeroXen" /sc ONLOGON /tr "C:\Users\Admin\AppData\Roaming\SubDir\Client.exe" /rl HIGHEST /f43⤵
- Creates scheduled task(s)
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\NKegb2cWMwWi.bat" "43⤵
-
C:\Windows\SysWOW64\chcp.comchcp 6500144⤵
-
C:\Windows\SysWOW64\PING.EXEping -n 10 localhost44⤵
- Runs ping.exe
-
C:\Users\Admin\AppData\Roaming\SubDir\Client.exe"C:\Users\Admin\AppData\Roaming\SubDir\Client.exe"44⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
-
C:\Windows\SysWOW64\schtasks.exe"schtasks" /create /tn "SeroXen" /sc ONLOGON /tr "C:\Users\Admin\AppData\Roaming\SubDir\Client.exe" /rl HIGHEST /f45⤵
- Creates scheduled task(s)
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\FvGpSyt8Sw2N.bat" "45⤵
-
C:\Windows\SysWOW64\chcp.comchcp 6500146⤵
-
C:\Windows\SysWOW64\PING.EXEping -n 10 localhost46⤵
- Runs ping.exe
-
C:\Users\Admin\AppData\Roaming\SubDir\Client.exe"C:\Users\Admin\AppData\Roaming\SubDir\Client.exe"46⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
-
C:\Windows\SysWOW64\schtasks.exe"schtasks" /create /tn "SeroXen" /sc ONLOGON /tr "C:\Users\Admin\AppData\Roaming\SubDir\Client.exe" /rl HIGHEST /f47⤵
- Creates scheduled task(s)
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\gJi0YyEKMGCk.bat" "47⤵
-
C:\Windows\SysWOW64\chcp.comchcp 6500148⤵
-
C:\Windows\SysWOW64\PING.EXEping -n 10 localhost48⤵
- Runs ping.exe
-
C:\Users\Admin\AppData\Roaming\SubDir\Client.exe"C:\Users\Admin\AppData\Roaming\SubDir\Client.exe"48⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
-
C:\Windows\SysWOW64\schtasks.exe"schtasks" /create /tn "SeroXen" /sc ONLOGON /tr "C:\Users\Admin\AppData\Roaming\SubDir\Client.exe" /rl HIGHEST /f49⤵
- Creates scheduled task(s)
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\FEwTygWEzAdo.bat" "49⤵
-
C:\Windows\SysWOW64\chcp.comchcp 6500150⤵
-
C:\Windows\SysWOW64\PING.EXEping -n 10 localhost50⤵
- Runs ping.exe
-
C:\Users\Admin\AppData\Roaming\SubDir\Client.exe"C:\Users\Admin\AppData\Roaming\SubDir\Client.exe"50⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
-
C:\Windows\SysWOW64\schtasks.exe"schtasks" /create /tn "SeroXen" /sc ONLOGON /tr "C:\Users\Admin\AppData\Roaming\SubDir\Client.exe" /rl HIGHEST /f51⤵
- Creates scheduled task(s)
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\mC6iVqyZW92Y.bat" "51⤵
-
C:\Windows\SysWOW64\chcp.comchcp 6500152⤵
-
C:\Windows\SysWOW64\PING.EXEping -n 10 localhost52⤵
- Runs ping.exe
-
C:\Users\Admin\AppData\Roaming\SubDir\Client.exe"C:\Users\Admin\AppData\Roaming\SubDir\Client.exe"52⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
-
C:\Windows\SysWOW64\schtasks.exe"schtasks" /create /tn "SeroXen" /sc ONLOGON /tr "C:\Users\Admin\AppData\Roaming\SubDir\Client.exe" /rl HIGHEST /f53⤵
- Creates scheduled task(s)
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\zQ9lhY5RA9g9.bat" "53⤵
-
C:\Windows\SysWOW64\chcp.comchcp 6500154⤵
-
C:\Windows\SysWOW64\PING.EXEping -n 10 localhost54⤵
- Runs ping.exe
-
C:\Users\Admin\AppData\Roaming\SubDir\Client.exe"C:\Users\Admin\AppData\Roaming\SubDir\Client.exe"54⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
-
C:\Windows\SysWOW64\schtasks.exe"schtasks" /create /tn "SeroXen" /sc ONLOGON /tr "C:\Users\Admin\AppData\Roaming\SubDir\Client.exe" /rl HIGHEST /f55⤵
- Creates scheduled task(s)
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\37QWZaFb5Z30.bat" "55⤵
-
C:\Windows\SysWOW64\chcp.comchcp 6500156⤵
-
C:\Windows\SysWOW64\PING.EXEping -n 10 localhost56⤵
- Runs ping.exe
-
C:\Users\Admin\AppData\Roaming\SubDir\Client.exe"C:\Users\Admin\AppData\Roaming\SubDir\Client.exe"56⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 5024 -s 109255⤵
- Program crash
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1804 -s 172453⤵
- Program crash
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2332 -s 109251⤵
- Program crash
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4816 -s 109249⤵
- Program crash
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3460 -s 223247⤵
- Program crash
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1032 -s 169245⤵
- Program crash
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1884 -s 222043⤵
- Program crash
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3172 -s 172441⤵
- Program crash
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 900 -s 168839⤵
- Program crash
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1592 -s 223237⤵
- Program crash
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4056 -s 219635⤵
- Program crash
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 692 -s 167233⤵
- Program crash
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1152 -s 109231⤵
- Program crash
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3960 -s 223629⤵
- Program crash
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4124 -s 223227⤵
- Program crash
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2224 -s 157225⤵
- Program crash
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4168 -s 109223⤵
- Program crash
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1812 -s 223221⤵
- Program crash
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 64 -s 109219⤵
- Program crash
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4296 -s 109217⤵
- Program crash
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3032 -s 171215⤵
- Program crash
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4576 -s 109213⤵
- Program crash
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1456 -s 107611⤵
- Program crash
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4324 -s 17089⤵
- Program crash
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 644 -s 21967⤵
- Program crash
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3056 -s 21805⤵
- Program crash
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 904 -s 18883⤵
- Program crash
-
C:\Windows\SysWOW64\SCHTASKS.exe"SCHTASKS.exe" /create /tn "$77Uni - Copy (15) - Copy - Copy - Copy.exe" /tr "'C:\Users\Admin\AppData\Local\Temp\uni\Uni - Copy (15) - Copy - Copy - Copy.exe'" /sc onlogon /rl HIGHEST2⤵
- Creates scheduled task(s)
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 408 -p 904 -ip 9041⤵
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 464 -p 3056 -ip 30561⤵
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 496 -p 644 -ip 6441⤵
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 520 -p 4324 -ip 43241⤵
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 520 -p 1456 -ip 14561⤵
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 472 -p 4576 -ip 45761⤵
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 480 -p 3032 -ip 30321⤵
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 388 -p 4296 -ip 42961⤵
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 360 -p 64 -ip 641⤵
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 512 -p 1812 -ip 18121⤵
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 520 -p 4168 -ip 41681⤵
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 536 -p 2224 -ip 22241⤵
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 484 -p 4124 -ip 41241⤵
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 464 -p 3960 -ip 39601⤵
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 464 -p 1152 -ip 11521⤵
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 468 -p 692 -ip 6921⤵
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 524 -p 4056 -ip 40561⤵
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 468 -p 1592 -ip 15921⤵
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 528 -p 900 -ip 9001⤵
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 464 -p 3172 -ip 31721⤵
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 472 -p 1884 -ip 18841⤵
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 468 -p 1032 -ip 10321⤵
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 484 -p 3460 -ip 34601⤵
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 480 -p 4816 -ip 48161⤵
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 388 -p 2332 -ip 23321⤵
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 540 -p 1804 -ip 18041⤵
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 536 -p 5024 -ip 50241⤵
Network
MITRE ATT&CK Matrix ATT&CK v13
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Local\Temp\0sueYxwubXV8.batFilesize
207B
MD502c1c940ba18f100989a500e4a179936
SHA14eb39ab54c3b930fe35eaf682677895370451122
SHA25611022913e470e383d0fbe78b88538fcffada60a1833c7cf68af6df9e255f1c58
SHA512fae27a4f276dbce8c545524376de8320785e8ca799af6ca96ee76f71d68e810b8a017e20e4c58d0af57ee1dae3b3e9d45d7f2d2666202a176193851b8199f850
-
C:\Users\Admin\AppData\Local\Temp\4sr4vhjA3BTR.batFilesize
207B
MD597d5e66fe38d080753210c4f372330b7
SHA1bf3c60fd27e4830a1b6b1da8d5e533bf3f1aeb2f
SHA2565630c48d7615bb9538c728af4331674e4248d794c08617b3363f9c734ac6b3b2
SHA512ac5d1d3280cb16040002ecd1c9876e6000527e82acc453d77c3397998ca82bf1246e3fbd6a66d9a41e66eda8f2a6baafe34f17204787555cbffc243580718041
-
C:\Users\Admin\AppData\Local\Temp\HnETchDwAxWa.batFilesize
207B
MD5f083d44381fdaacee7e85e591031415a
SHA1bfaa3e67ffe50d5259564431b53587f8a54c6fb4
SHA256e205473ec6c78eca51b327b612c1c2edcb6cacdd2c8cfaaca99c18e58d5fbefc
SHA512e5f1758c7d8f795830b5769c647d872b12d6b21002f16c8dec4118de307b8fd0092f3b5e747335f202af600730f779fc3042e8f3a704f88a544186b8d66df34d
-
C:\Users\Admin\AppData\Local\Temp\JFbhTUKXWP0I.batFilesize
207B
MD5b04885a7251ad4d6742f1c6c77595704
SHA178dff1d0ea067054375a5d6f539e940d90e5ccfd
SHA256a6229d1ed085036e9a68b00e70a42173d89fc0b831a2a280713f15a3c61a1061
SHA51217d634835515f55baf03b8895f882418f1176d1704696284e77a46f0258ccda7896063050909dc45ed625f1da2bd218a8b3c83d0b2dcba4b654b0274397a1a33
-
C:\Users\Admin\AppData\Local\Temp\JdOuj0RMRW9r.batFilesize
207B
MD51852f0278be8ffb0b355398dc65bb079
SHA16137f02b43ab1c2779ec0d688959acddbccd5372
SHA25653a92d1bdcfefdd139e4bf4bbf29129e199467c8f531b081238abc7f4786cbee
SHA512f98a4f11803f29314de97fed36df519f8a42396f1c740ba0e3e594c4b4e2f8c238d117285a97789f2994549f14d67953159a58653c94e2da97355196aca0f63c
-
C:\Users\Admin\AppData\Local\Temp\KS4hRv2birMn.batFilesize
207B
MD529b8e93c01aaec7697d9b38363e3efb1
SHA180e18dfc82444c6e529226b7faf2dd4f4bec73f7
SHA2560cc937142a866e02ee357e5aa8fb9d014633f12d3ee27642c85e92a4cab92a03
SHA5126feac4a23aa450ac54f3fde56baa0281e7924896123726cccc418d3f5685cffb5ad6029e14b1582e1064675da20dfe6a1d3a18df1b3e43ce78e933ea720d5fa0
-
C:\Users\Admin\AppData\Local\Temp\KfoRmonso2gV.batFilesize
207B
MD53592d10a699d469f0195e60bf70b5fc5
SHA13bc38f5b9c01742050ac9e4caebc764a63455116
SHA256010cf4fcec0080be609262c36e6588740f58454147bc0290717cf04ac8cc3c05
SHA51233b345034f2c10935269d9e688d40026f3260c9385cd5a02b257b6e1b2f003a4e0fd8827c00ce48ac314ddc67513d146186b5d8cce08a0d9ddc0d82e665a1741
-
C:\Users\Admin\AppData\Local\Temp\Ktx4cEBJMm7n.batFilesize
207B
MD50ee75920959cff50993a88f2c96fcb42
SHA1a26f4b2e29a6312855d272a710052d5095487b80
SHA256f2b8767642d9b591f27f4ea6d79e806bdba638178cbd443ceeac1e7bee1f5cd2
SHA512862ec32b5a9a04825e8fc52da5c8348cecde513b06af2f2bb1e1d4a54cd2ea898046e41ec1d6f1beef6be8eb6a1e3e7377daf8d5dd336639de897af76c665915
-
C:\Users\Admin\AppData\Local\Temp\N5K4CQRftxIu.batFilesize
207B
MD5d1c2fb24fceab6b4416b3f06867b5e24
SHA1b1b6dd292720a3759a46fded395fd9e841428bc6
SHA256f0712dffa8ea962db1832a0d6503fcb5e992d7b7b888ba664c74796bc8567a5f
SHA51211c1ad2765df8bd26b3237f155fb759e32e1bc03d71feac86a8e07baf58e836dedc13a2492881360d7562265314dec054c242998a8b59f01e6a01adba041ccfe
-
C:\Users\Admin\AppData\Local\Temp\NKegb2cWMwWi.batFilesize
207B
MD5939a0d5c945d5214e7ea95ce7a18556e
SHA1a276d7e87f5cf770772441db1098282a4abd2b64
SHA256c15dce6fb6f73f6585de8aca544af7d5d082f42de10aef39558dada5a044333e
SHA512bf23019a36619ffe49ac760aad28bcefaac770679df3a798abe2eb7b412d2d2f2236b5d5bfd9ce7ed67caaed8af28df2fc3e9e9aa97e87071e718188c87e84ff
-
C:\Users\Admin\AppData\Local\Temp\P4jGxMGT2ETA.batFilesize
207B
MD50af224160da4ee329aa06099c4bea287
SHA14e23173ade2cdc25fed716cf1c62d38493a4b47f
SHA256c56f3fef1cd37f6ab3909e8ef0293f55c3a9a365ea7e68d82b52cbdfe3881015
SHA512888df56fae448c6d021c32f6796d6859b7efb18b1b38c918ea36e9370a97e83444353a16f6facd2f1e8b621f94712aba0932a4d29143215b03fedb6777a87786
-
C:\Users\Admin\AppData\Local\Temp\Pl2cRedNV0sj.batFilesize
207B
MD5be385a7bd129b9113d74fc5747a0ef2c
SHA13dc4fe0a501f51e539afe67acba38d3f630ae483
SHA2561f7e9a4fb3d33247aadfdedfc5db48a3c215ac3138c04f130958a10249ced044
SHA512412ffe57d0dfc0a41b5307c7f8a6e4c7cebfc6ccb5ab731d9aba8edf5b06af898159c95fc1bf2607fb795555f7fe460c6e60c8e2b6e8fde60ffcf2f7b1e76a61
-
C:\Users\Admin\AppData\Local\Temp\RsZjEGUdGQxV.batFilesize
207B
MD54bc9f6e20e3d01b81f45f99cdb84a36b
SHA10c48c05892647500f3cd84558040892a1b95cdb0
SHA2564b8a3d1447cbec75cba4394008d570f7faf2c5a9b882345a0d13f373f609ac8a
SHA51220a79d7d66fe4a0dd314e061988a2cf323724be537d2bd0d13d4d285386152fc7f8f57ec4ee6c7cfde8db42280bf4cccdeb683d66d51dd40deb13b6f94dd25a6
-
C:\Users\Admin\AppData\Local\Temp\ZHxaNKC1AQQq.batFilesize
207B
MD54c54e4a1305c4f2d8dd897f43f360012
SHA18b514863e091456726cccad2b3c5dba89e254d2c
SHA25660c50f1e583d0ab8575dffda5df5c7258e91bacb69756c78b981bb8283b9583d
SHA512ab2fb7e0fda0aacc14950cb9cb893067c3296df345de3a7213e3bfb84419ddb0b93d6f72c647777b59476b21209865499f09ff6bd10ea926c223dc901db77c6d
-
C:\Users\Admin\AppData\Local\Temp\ZyHwrcawdCpP.batFilesize
207B
MD57a9a46c6d95431adfbaa1c1792149722
SHA1527518592334b78046f4503fe5ca2b3897650126
SHA256e09ea91d76d7dff8672eb9144579840a9c4e37c489716bc1f923abe3745ae7f7
SHA512beb4a1a458bb4b8e6dbcc46109a8e00c920a6f4082b54377e8647ce878476e58eb2091b6d0675fba96c4ad70d4cb1de975767f49e0d23eeb80fe282b2797dda6
-
C:\Users\Admin\AppData\Local\Temp\ex9BZ4eXSIgL.batFilesize
207B
MD54c34a44dd75f853b50a88bfa2c127be9
SHA1c6f85513b7e8ee1b723b683d331b50b2c7ec25d0
SHA2562a1308b9a8dcceef48b1493dbc346475b54b3e53d8494b770bb7288452576679
SHA512d8fa7460368c1dfd7c1c5b65c1ca205b25a6f9f2c1b3126dcc8e1fba2b52e7069a91a7d0a3f24c425e964f7a3d3a5aedf01a02db140ec8afa343aa13fe3fc9b7
-
C:\Users\Admin\AppData\Local\Temp\ma76S2UHWeCy.batFilesize
207B
MD560793885a0998facb858db9822ce13fd
SHA139ea5251f07e8fbc5aabc36aa58186fb6593e7c0
SHA25639652dbdf7e3ed8e9c58b78f836ed2c4459290cbe73e5413b35a66e5fc3f7c4e
SHA512a5d95c33ed48fe33c7681cee6067e21fc8573f74f8a742539770ad90b3ecef1fcc7ed5d5160cc639a3555be123da43f57d8f410b7c5fd0fc4efda4210b490de2
-
C:\Users\Admin\AppData\Local\Temp\oh7afssz3tYN.batFilesize
207B
MD5bb7501100b813b74707497215d44e64f
SHA13ee34019342ca509b2b132def93874342b0b470a
SHA256b1b71aa10c552c82a4960333645c4154c2f03d6dbc49218022f18e1a850e6301
SHA5129602bf098741457dfcc083c052ddabdb775d7bfaaca089e70c8dfa6e30b02b29c139d8392bbc9fe274337e81117e519d31d685e91d75ce262e0d7e728271b8ed
-
C:\Users\Admin\AppData\Local\Temp\pNLlUsWFt6qZ.batFilesize
207B
MD5a195e280db4709083c7b9d2723e33d9f
SHA18e75d7209108658546dcd55793450c190ae638ab
SHA256b2038af0ca35dcd5a44692f6866e7156e61fa2503044df51793672091ac46d8d
SHA512bf8d76eec6141ffaf1e102f7da59da77835df0ae0c901fdce651255eb6257a5535a2f42c7bb2408dc1f1d8b12f39f69ef3c519aa6379bdef3428d50adbee5436
-
C:\Users\Admin\AppData\Local\Temp\yzTMyqzutIdc.batFilesize
207B
MD5c845d611c4ba82b8ece0cb6f0f5898e6
SHA1e3f684ea24ff456a82336f96de00f87b46d60298
SHA25654c2057b04c1d0dd683d0b182ca24e1ce2cf9433c49b6fd5e1956688ff6a6f1d
SHA512b21f9588480c1ca9e4e10a16a1b35924edd0a3a1bd320847ef7274a51db777f37243f53d3e396bc90ac44fd814835b23a8a58700e80d96f5bcd21c9c414c870a
-
C:\Users\Admin\AppData\Local\Temp\zNaRMdICbgiN.batFilesize
207B
MD5363e776f5b1e64927698b152b65fffbc
SHA1f1e64b580b48b1702f751645102dfa7127c618fb
SHA256bbc63bd5de95f255ea51e62070695562675fb7e1f3af176004f15cb1fc4d2c32
SHA5128396ccd7262af39d9e6d2430ca9f01f4ab41d05c0923c6a92156199f9eab522e57cc00ce114da0b891f95cf6f9fa8e9ef18da7b530775dd1e756cd7faf13d16e
-
C:\Users\Admin\AppData\Roaming\Logs\06-10-2024Filesize
224B
MD513ae35fc441cc1a48baf82d5a6c54bd7
SHA12b6e57a7442221cb1f4c6c2d1347bbd54d6577ad
SHA256ad78117547e9804f11c8cacc7756525118cdeb285a01ee7c108ee6a679824d79
SHA512a7a6b58c2e08b7d4862188c83ae8ab03731116eeea2fc80aea24821ca125a113fdbd64f48345d32e3fc238f265119249e97a6967d157214364697c2983415952
-
C:\Users\Admin\AppData\Roaming\Logs\06-10-2024Filesize
224B
MD51be1808af12f2e0eccf0a423e04aa1c5
SHA1f058f58d949c5f3c4994b5c68ea46fe1e7151ab0
SHA25685f896d30386c40a524a04a1754edf8f9e179d00313850843891cd6a9cdb4c12
SHA5126a65b365ceb78691efe8d37ea6d873853a403dc02ffd4e37593774c4b3d3cc7d179e4f6ce5b77497feb009deaffb0b6e0947e4fd09d2a53a4d7479048f30b762
-
C:\Users\Admin\AppData\Roaming\Logs\06-10-2024Filesize
224B
MD50266f8a6bc97960b087d43e1540ab1fc
SHA18fa56cc85d78f53576457ba9bca0946f27cb55e8
SHA256c9d43ddcb4edd737adb5129b21edfac8ebefc1b24fe275f121eaea8a2b5f2a47
SHA5120eaad11a5e88ca122d5944b834f7522711f2523b6a3059955b17d6a559e720ad5bc3c00324376076a0e92f64fb21898be3842dea6196fed452dc52b0ca1c5d79
-
C:\Users\Admin\AppData\Roaming\Logs\06-10-2024Filesize
224B
MD5cd077d45632e8fda1855459d2be5cbb3
SHA11ae037b956f0960e7bb201720fbf9005a4179f88
SHA256c62f317adf7f9a10be0795179d7d018c1c7659cdaf5ff3e8fe80ae3fa1ca2734
SHA512960c347bf1c25e1b833382c08e58707addae0d4f061a59062023a20c701e48e9e70889a906538688bb8dc86d2b74dc4c7dcfba5f1aa3bc1ddbe1e1c9689ead6e
-
C:\Users\Admin\AppData\Roaming\Logs\06-10-2024Filesize
224B
MD5ec6fdbf78e5171cc9fe5f0cf66841996
SHA181c866c901f4ebc3d4530325e855fc8612e305c0
SHA256f5c9c70d577a8b01a21568feb1fd013c1c98cb9bd49e7fd4b8ae27ed4dd8af88
SHA512d616f44d7a1920aaa9745de66f4083d31560f4e0d5a06443bdd757b5f02b78b057683b477eb4d0db866e56f6fa35e699ba3fe5a31c9a474bc93ffd5c1350a211
-
C:\Users\Admin\AppData\Roaming\Logs\06-10-2024MD5
d41d8cd98f00b204e9800998ecf8427e
SHA1da39a3ee5e6b4b0d3255bfef95601890afd80709
SHA256e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855
SHA512cf83e1357eefb8bdf1542850d66d8007d620e4050b5715dc83f4a921d36ce9ce47d0d13c5d85f2b0ff8318d2877eec2f63b931bd47417a81a538327af927da3e
-
C:\Users\Admin\AppData\Roaming\Logs\06-10-2024Filesize
224B
MD5ff80959a314f97bdbf95266e711cbafa
SHA1f1f7db37d4881cb216250f1c687960bae7ebf6c3
SHA25603c8cf607ffd7becd7e3efa1bb4f4fc352c70f48d42e56b923ff5589aa220e34
SHA512381215486b79cead3c558e0e9c12f6cf5744267e28cc1b09cf21b99602cda7236d8291b61db6ad43e9b7a5df913286bbf1df140d70f0c19254b00bc63aadc8f1
-
C:\Users\Admin\AppData\Roaming\Logs\06-10-2024Filesize
224B
MD56ffce06571e69230afb630559567693d
SHA1d7a925ffd7dbfcb237e8efb11440b5f41237237a
SHA256100ed0f0688a4a2a6f5a78cba98a1ac1397d1efee8f0a1193ff3f488c2a1450c
SHA512898841a3805374611231542f121caec139d152447004e4538de6d1537b6e09243728bb8bbd3bd0de2b091697b633fa4157e064c9c2bed045955977f54fe20930
-
C:\Users\Admin\AppData\Roaming\Logs\06-10-2024Filesize
224B
MD58be4c830662bebb0c82a083e6113c524
SHA19d392f000076fe0d68b38857dd331b6405a3de19
SHA256b36c781f06c3885c1240f83047a3b5b6d39ccd63f12ef72215fa2c8819eb1d63
SHA512967f580e9e3ebeeb1bdc3660491963c0ccd47b9e225f08072d9b3b5eaafa3869116160c4d52b9c1076a551dc5e20e5591d3584be5049f35a39a13503d38cc90b
-
C:\Users\Admin\AppData\Roaming\SubDir\Client.exeFilesize
409KB
MD5b70fdac25a99501e3cae11f1b775249e
SHA13c59226479bfdcd1b2927bcfb1a7516d4cb8dd71
SHA25651ff3eb450a786c1aaa75ff889f2fd256412a7b75d04277fdf9fcccc20e57246
SHA51243f0d5d6e5f0d5febba537c109ffdbc250bbb6e9725e635a43ec975b0353048eaeee50b6e9274cd5e072ea6b0cea32439bd37408b2528832f467f2075f74ca44
-
memory/904-14-0x00000000744E0000-0x0000000074C90000-memory.dmpFilesize
7.7MB
-
memory/904-24-0x00000000744E0000-0x0000000074C90000-memory.dmpFilesize
7.7MB
-
memory/904-19-0x0000000006660000-0x000000000666A000-memory.dmpFilesize
40KB
-
memory/904-16-0x00000000744E0000-0x0000000074C90000-memory.dmpFilesize
7.7MB
-
memory/3940-7-0x00000000744EE000-0x00000000744EF000-memory.dmpFilesize
4KB
-
memory/3940-0-0x00000000744EE000-0x00000000744EF000-memory.dmpFilesize
4KB
-
memory/3940-8-0x00000000744E0000-0x0000000074C90000-memory.dmpFilesize
7.7MB
-
memory/3940-17-0x00000000744E0000-0x0000000074C90000-memory.dmpFilesize
7.7MB
-
memory/3940-6-0x00000000062E0000-0x00000000062F2000-memory.dmpFilesize
72KB
-
memory/3940-5-0x00000000056D0000-0x0000000005736000-memory.dmpFilesize
408KB
-
memory/3940-4-0x00000000744E0000-0x0000000074C90000-memory.dmpFilesize
7.7MB
-
memory/3940-3-0x0000000005620000-0x00000000056B2000-memory.dmpFilesize
584KB
-
memory/3940-2-0x0000000005B30000-0x00000000060D4000-memory.dmpFilesize
5.6MB
-
memory/3940-1-0x0000000000B50000-0x0000000000BBC000-memory.dmpFilesize
432KB