Overview
overview
10Static
static
10uni/Uni - ...py.exe
windows7-x64
10uni/Uni - ...py.exe
windows10-2004-x64
10uni/Uni - ...py.exe
windows7-x64
10uni/Uni - ...py.exe
windows10-2004-x64
10uni/Uni - ...py.exe
windows7-x64
10uni/Uni - ...py.exe
windows10-2004-x64
10uni/Uni - ...py.exe
windows7-x64
10uni/Uni - ...py.exe
windows10-2004-x64
10uni/Uni - ...py.exe
windows7-x64
10uni/Uni - ...py.exe
windows10-2004-x64
10uni/Uni - ...py.exe
windows7-x64
10uni/Uni - ...py.exe
windows10-2004-x64
10uni/Uni - ...py.exe
windows7-x64
10uni/Uni - ...py.exe
windows10-2004-x64
10uni/Uni - ...py.exe
windows7-x64
10uni/Uni - ...py.exe
windows10-2004-x64
10uni/Uni - ...py.exe
windows7-x64
10uni/Uni - ...py.exe
windows10-2004-x64
10uni/Uni - ...py.exe
windows7-x64
10uni/Uni - ...py.exe
windows10-2004-x64
10uni/Uni - ...py.exe
windows7-x64
10uni/Uni - ...py.exe
windows10-2004-x64
10uni/Uni - ...py.exe
windows7-x64
10uni/Uni - ...py.exe
windows10-2004-x64
10uni/Uni - ...py.exe
windows7-x64
10uni/Uni - ...py.exe
windows10-2004-x64
10uni/Uni - ...py.exe
windows7-x64
10uni/Uni - ...py.exe
windows10-2004-x64
10uni/Uni - ...py.exe
windows7-x64
10uni/Uni - ...py.exe
windows10-2004-x64
10uni/Uni - ...py.exe
windows7-x64
10uni/Uni - ...py.exe
windows10-2004-x64
10Analysis
-
max time kernel
598s -
max time network
604s -
platform
windows10-2004_x64 -
resource
win10v2004-20240508-en -
resource tags
arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system -
submitted
10-06-2024 15:28
Behavioral task
behavioral1
Sample
uni/Uni - Copy (10) - Copy - Copy - Copy.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
uni/Uni - Copy (10) - Copy - Copy - Copy.exe
Resource
win10v2004-20240426-en
Behavioral task
behavioral3
Sample
uni/Uni - Copy (10) - Copy - Copy.exe
Resource
win7-20240221-en
Behavioral task
behavioral4
Sample
uni/Uni - Copy (10) - Copy - Copy.exe
Resource
win10v2004-20240426-en
Behavioral task
behavioral5
Sample
uni/Uni - Copy (10) - Copy.exe
Resource
win7-20240220-en
Behavioral task
behavioral6
Sample
uni/Uni - Copy (10) - Copy.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral7
Sample
uni/Uni - Copy (11) - Copy - Copy - Copy.exe
Resource
win7-20231129-en
Behavioral task
behavioral8
Sample
uni/Uni - Copy (11) - Copy - Copy - Copy.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral9
Sample
uni/Uni - Copy (11) - Copy - Copy.exe
Resource
win7-20240508-en
Behavioral task
behavioral10
Sample
uni/Uni - Copy (11) - Copy - Copy.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral11
Sample
uni/Uni - Copy (11) - Copy.exe
Resource
win7-20240221-en
Behavioral task
behavioral12
Sample
uni/Uni - Copy (11) - Copy.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral13
Sample
uni/Uni - Copy (12) - Copy - Copy - Copy.exe
Resource
win7-20240508-en
Behavioral task
behavioral14
Sample
uni/Uni - Copy (12) - Copy - Copy - Copy.exe
Resource
win10v2004-20240426-en
Behavioral task
behavioral15
Sample
uni/Uni - Copy (12) - Copy - Copy.exe
Resource
win7-20240508-en
Behavioral task
behavioral16
Sample
uni/Uni - Copy (12) - Copy - Copy.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral17
Sample
uni/Uni - Copy (12) - Copy.exe
Resource
win7-20240221-en
Behavioral task
behavioral18
Sample
uni/Uni - Copy (12) - Copy.exe
Resource
win10v2004-20240426-en
Behavioral task
behavioral19
Sample
uni/Uni - Copy (13) - Copy - Copy - Copy.exe
Resource
win7-20240419-en
Behavioral task
behavioral20
Sample
uni/Uni - Copy (13) - Copy - Copy - Copy.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral21
Sample
uni/Uni - Copy (13) - Copy - Copy.exe
Resource
win7-20240508-en
Behavioral task
behavioral22
Sample
uni/Uni - Copy (13) - Copy - Copy.exe
Resource
win10v2004-20240426-en
Behavioral task
behavioral23
Sample
uni/Uni - Copy (13) - Copy.exe
Resource
win7-20240419-en
Behavioral task
behavioral24
Sample
uni/Uni - Copy (13) - Copy.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral25
Sample
uni/Uni - Copy (14) - Copy - Copy - Copy.exe
Resource
win7-20240221-en
Behavioral task
behavioral26
Sample
uni/Uni - Copy (14) - Copy - Copy - Copy.exe
Resource
win10v2004-20240426-en
Behavioral task
behavioral27
Sample
uni/Uni - Copy (14) - Copy - Copy.exe
Resource
win7-20240508-en
Behavioral task
behavioral28
Sample
uni/Uni - Copy (14) - Copy - Copy.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral29
Sample
uni/Uni - Copy (14) - Copy.exe
Resource
win7-20231129-en
Behavioral task
behavioral30
Sample
uni/Uni - Copy (14) - Copy.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral31
Sample
uni/Uni - Copy (15) - Copy - Copy - Copy.exe
Resource
win7-20240508-en
Behavioral task
behavioral32
Sample
uni/Uni - Copy (15) - Copy - Copy - Copy.exe
Resource
win10v2004-20240508-en
General
-
Target
uni/Uni - Copy (11) - Copy - Copy - Copy.exe
-
Size
409KB
-
MD5
b70fdac25a99501e3cae11f1b775249e
-
SHA1
3c59226479bfdcd1b2927bcfb1a7516d4cb8dd71
-
SHA256
51ff3eb450a786c1aaa75ff889f2fd256412a7b75d04277fdf9fcccc20e57246
-
SHA512
43f0d5d6e5f0d5febba537c109ffdbc250bbb6e9725e635a43ec975b0353048eaeee50b6e9274cd5e072ea6b0cea32439bd37408b2528832f467f2075f74ca44
-
SSDEEP
12288:gpbJjGut6AoE3hVVdFaC/eZPTMTDlpgfJCKuMsVs:oVaurMLcDlpRKai
Malware Config
Extracted
quasar
3.1.5
SeroXen
panel-slave.gl.at.ply.gg:57059
panel-slave.gl.at.ply.gg:27892
$Sxr-rpL8EItHN3pqIQQVy2
-
encryption_key
Lme7VBS3l58VwLM69PNM
-
install_name
Client.exe
-
log_directory
Logs
-
reconnect_delay
3000
-
startup_key
SeroXen
-
subdirectory
SubDir
Signatures
-
Quasar payload 2 IoCs
Processes:
resource yara_rule behavioral8/memory/336-1-0x0000000000960000-0x00000000009CC000-memory.dmp family_quasar C:\Users\Admin\AppData\Roaming\SubDir\Client.exe family_quasar -
Checks computer location settings 2 TTPs 29 IoCs
Looks up country code configured in the registry, likely geofence.
Processes:
Client.exeClient.exeClient.exeClient.exeClient.exeClient.exeClient.exeClient.exeClient.exeClient.exeClient.exeClient.exeClient.exeClient.exeClient.exeClient.exeClient.exeClient.exeClient.exeClient.exeClient.exeClient.exeClient.exeClient.exeClient.exeClient.exeClient.exeClient.exeClient.exedescription ioc process Key value queried \REGISTRY\USER\S-1-5-21-2539840389-1261165778-1087677076-1000\Control Panel\International\Geo\Nation Client.exe Key value queried \REGISTRY\USER\S-1-5-21-2539840389-1261165778-1087677076-1000\Control Panel\International\Geo\Nation Client.exe Key value queried \REGISTRY\USER\S-1-5-21-2539840389-1261165778-1087677076-1000\Control Panel\International\Geo\Nation Client.exe Key value queried \REGISTRY\USER\S-1-5-21-2539840389-1261165778-1087677076-1000\Control Panel\International\Geo\Nation Client.exe Key value queried \REGISTRY\USER\S-1-5-21-2539840389-1261165778-1087677076-1000\Control Panel\International\Geo\Nation Client.exe Key value queried \REGISTRY\USER\S-1-5-21-2539840389-1261165778-1087677076-1000\Control Panel\International\Geo\Nation Client.exe Key value queried \REGISTRY\USER\S-1-5-21-2539840389-1261165778-1087677076-1000\Control Panel\International\Geo\Nation Client.exe Key value queried \REGISTRY\USER\S-1-5-21-2539840389-1261165778-1087677076-1000\Control Panel\International\Geo\Nation Client.exe Key value queried \REGISTRY\USER\S-1-5-21-2539840389-1261165778-1087677076-1000\Control Panel\International\Geo\Nation Client.exe Key value queried \REGISTRY\USER\S-1-5-21-2539840389-1261165778-1087677076-1000\Control Panel\International\Geo\Nation Client.exe Key value queried \REGISTRY\USER\S-1-5-21-2539840389-1261165778-1087677076-1000\Control Panel\International\Geo\Nation Client.exe Key value queried \REGISTRY\USER\S-1-5-21-2539840389-1261165778-1087677076-1000\Control Panel\International\Geo\Nation Client.exe Key value queried \REGISTRY\USER\S-1-5-21-2539840389-1261165778-1087677076-1000\Control Panel\International\Geo\Nation Client.exe Key value queried \REGISTRY\USER\S-1-5-21-2539840389-1261165778-1087677076-1000\Control Panel\International\Geo\Nation Client.exe Key value queried \REGISTRY\USER\S-1-5-21-2539840389-1261165778-1087677076-1000\Control Panel\International\Geo\Nation Client.exe Key value queried \REGISTRY\USER\S-1-5-21-2539840389-1261165778-1087677076-1000\Control Panel\International\Geo\Nation Client.exe Key value queried \REGISTRY\USER\S-1-5-21-2539840389-1261165778-1087677076-1000\Control Panel\International\Geo\Nation Client.exe Key value queried \REGISTRY\USER\S-1-5-21-2539840389-1261165778-1087677076-1000\Control Panel\International\Geo\Nation Client.exe Key value queried \REGISTRY\USER\S-1-5-21-2539840389-1261165778-1087677076-1000\Control Panel\International\Geo\Nation Client.exe Key value queried \REGISTRY\USER\S-1-5-21-2539840389-1261165778-1087677076-1000\Control Panel\International\Geo\Nation Client.exe Key value queried \REGISTRY\USER\S-1-5-21-2539840389-1261165778-1087677076-1000\Control Panel\International\Geo\Nation Client.exe Key value queried \REGISTRY\USER\S-1-5-21-2539840389-1261165778-1087677076-1000\Control Panel\International\Geo\Nation Client.exe Key value queried \REGISTRY\USER\S-1-5-21-2539840389-1261165778-1087677076-1000\Control Panel\International\Geo\Nation Client.exe Key value queried \REGISTRY\USER\S-1-5-21-2539840389-1261165778-1087677076-1000\Control Panel\International\Geo\Nation Client.exe Key value queried \REGISTRY\USER\S-1-5-21-2539840389-1261165778-1087677076-1000\Control Panel\International\Geo\Nation Client.exe Key value queried \REGISTRY\USER\S-1-5-21-2539840389-1261165778-1087677076-1000\Control Panel\International\Geo\Nation Client.exe Key value queried \REGISTRY\USER\S-1-5-21-2539840389-1261165778-1087677076-1000\Control Panel\International\Geo\Nation Client.exe Key value queried \REGISTRY\USER\S-1-5-21-2539840389-1261165778-1087677076-1000\Control Panel\International\Geo\Nation Client.exe Key value queried \REGISTRY\USER\S-1-5-21-2539840389-1261165778-1087677076-1000\Control Panel\International\Geo\Nation Client.exe -
Executes dropped EXE 30 IoCs
Processes:
Client.exeClient.exeClient.exeClient.exeClient.exeClient.exeClient.exeClient.exeClient.exeClient.exeClient.exeClient.exeClient.exeClient.exeClient.exeClient.exeClient.exeClient.exeClient.exeClient.exeClient.exeClient.exeClient.exeClient.exeClient.exeClient.exeClient.exeClient.exeClient.exeClient.exepid process 4388 Client.exe 4348 Client.exe 4552 Client.exe 4800 Client.exe 4284 Client.exe 3468 Client.exe 4364 Client.exe 4544 Client.exe 760 Client.exe 4996 Client.exe 4536 Client.exe 3884 Client.exe 1484 Client.exe 5020 Client.exe 4024 Client.exe 4468 Client.exe 804 Client.exe 4356 Client.exe 4784 Client.exe 556 Client.exe 4576 Client.exe 4788 Client.exe 2044 Client.exe 1888 Client.exe 3104 Client.exe 4176 Client.exe 4252 Client.exe 2904 Client.exe 752 Client.exe 2324 Client.exe -
Looks up external IP address via web service 26 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
Processes:
flow ioc 57 ip-api.com 60 ip-api.com 62 ip-api.com 15 ip-api.com 24 ip-api.com 35 ip-api.com 48 ip-api.com 55 ip-api.com 64 ip-api.com 17 ip-api.com 27 ip-api.com 30 ip-api.com 53 ip-api.com 2 ip-api.com 42 ip-api.com 44 ip-api.com 37 ip-api.com 50 ip-api.com 8 api.ipify.org 13 ip-api.com 46 ip-api.com 22 ip-api.com 66 ip-api.com 19 ip-api.com 32 ip-api.com 40 ip-api.com -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Program crash 29 IoCs
Processes:
WerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exepid pid_target process target process 3028 4388 WerFault.exe Client.exe 1864 4348 WerFault.exe Client.exe 4544 4552 WerFault.exe Client.exe 2248 4800 WerFault.exe Client.exe 4444 4284 WerFault.exe Client.exe 5056 3468 WerFault.exe Client.exe 3096 4364 WerFault.exe Client.exe 4356 4544 WerFault.exe Client.exe 1264 760 WerFault.exe Client.exe 3360 4996 WerFault.exe Client.exe 4556 4536 WerFault.exe Client.exe 3368 3884 WerFault.exe Client.exe 1956 1484 WerFault.exe Client.exe 3120 5020 WerFault.exe Client.exe 4048 4024 WerFault.exe Client.exe 2328 4468 WerFault.exe Client.exe 1000 804 WerFault.exe Client.exe 4740 4356 WerFault.exe Client.exe 4908 4784 WerFault.exe Client.exe 1460 556 WerFault.exe Client.exe 5048 4576 WerFault.exe Client.exe 1428 4788 WerFault.exe Client.exe 4924 2044 WerFault.exe Client.exe 2924 1888 WerFault.exe Client.exe 4296 3104 WerFault.exe Client.exe 3112 4176 WerFault.exe Client.exe 3076 4252 WerFault.exe Client.exe 3956 2904 WerFault.exe Client.exe 2572 752 WerFault.exe Client.exe -
Creates scheduled task(s) 1 TTPs 31 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
Processes:
schtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeSCHTASKS.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exepid process 1660 schtasks.exe 4296 schtasks.exe 3360 schtasks.exe 5080 schtasks.exe 4928 schtasks.exe 1512 schtasks.exe 4316 schtasks.exe 1868 schtasks.exe 1428 schtasks.exe 3832 schtasks.exe 3324 schtasks.exe 624 schtasks.exe 4924 schtasks.exe 2896 schtasks.exe 3864 schtasks.exe 3712 schtasks.exe 2916 schtasks.exe 1372 schtasks.exe 3620 schtasks.exe 2640 schtasks.exe 2696 schtasks.exe 920 schtasks.exe 2812 schtasks.exe 3532 schtasks.exe 2728 schtasks.exe 1572 SCHTASKS.exe 2772 schtasks.exe 4328 schtasks.exe 2684 schtasks.exe 4964 schtasks.exe 5020 schtasks.exe -
Runs ping.exe 1 TTPs 29 IoCs
Processes:
PING.EXEPING.EXEPING.EXEPING.EXEPING.EXEPING.EXEPING.EXEPING.EXEPING.EXEPING.EXEPING.EXEPING.EXEPING.EXEPING.EXEPING.EXEPING.EXEPING.EXEPING.EXEPING.EXEPING.EXEPING.EXEPING.EXEPING.EXEPING.EXEPING.EXEPING.EXEPING.EXEPING.EXEPING.EXEpid process 4724 PING.EXE 2812 PING.EXE 5056 PING.EXE 2168 PING.EXE 4308 PING.EXE 2952 PING.EXE 2888 PING.EXE 4176 PING.EXE 1136 PING.EXE 5092 PING.EXE 2216 PING.EXE 2224 PING.EXE 4844 PING.EXE 1312 PING.EXE 2416 PING.EXE 4580 PING.EXE 3980 PING.EXE 208 PING.EXE 3928 PING.EXE 1872 PING.EXE 2476 PING.EXE 4244 PING.EXE 1260 PING.EXE 4860 PING.EXE 3804 PING.EXE 1524 PING.EXE 4008 PING.EXE 3076 PING.EXE 1700 PING.EXE -
Suspicious use of AdjustPrivilegeToken 31 IoCs
Processes:
Uni - Copy (11) - Copy - Copy - Copy.exeClient.exeClient.exeClient.exeClient.exeClient.exeClient.exeClient.exeClient.exeClient.exeClient.exeClient.exeClient.exeClient.exeClient.exeClient.exeClient.exeClient.exeClient.exeClient.exeClient.exeClient.exeClient.exeClient.exeClient.exeClient.exeClient.exeClient.exeClient.exeClient.exeClient.exedescription pid process Token: SeDebugPrivilege 336 Uni - Copy (11) - Copy - Copy - Copy.exe Token: SeDebugPrivilege 4388 Client.exe Token: SeDebugPrivilege 4348 Client.exe Token: SeDebugPrivilege 4552 Client.exe Token: SeDebugPrivilege 4800 Client.exe Token: SeDebugPrivilege 4284 Client.exe Token: SeDebugPrivilege 3468 Client.exe Token: SeDebugPrivilege 4364 Client.exe Token: SeDebugPrivilege 4544 Client.exe Token: SeDebugPrivilege 760 Client.exe Token: SeDebugPrivilege 4996 Client.exe Token: SeDebugPrivilege 4536 Client.exe Token: SeDebugPrivilege 3884 Client.exe Token: SeDebugPrivilege 1484 Client.exe Token: SeDebugPrivilege 5020 Client.exe Token: SeDebugPrivilege 4024 Client.exe Token: SeDebugPrivilege 4468 Client.exe Token: SeDebugPrivilege 804 Client.exe Token: SeDebugPrivilege 4356 Client.exe Token: SeDebugPrivilege 4784 Client.exe Token: SeDebugPrivilege 556 Client.exe Token: SeDebugPrivilege 4576 Client.exe Token: SeDebugPrivilege 4788 Client.exe Token: SeDebugPrivilege 2044 Client.exe Token: SeDebugPrivilege 1888 Client.exe Token: SeDebugPrivilege 3104 Client.exe Token: SeDebugPrivilege 4176 Client.exe Token: SeDebugPrivilege 4252 Client.exe Token: SeDebugPrivilege 2904 Client.exe Token: SeDebugPrivilege 752 Client.exe Token: SeDebugPrivilege 2324 Client.exe -
Suspicious use of SetWindowsHookEx 29 IoCs
Processes:
Client.exeClient.exeClient.exeClient.exeClient.exeClient.exeClient.exeClient.exeClient.exeClient.exeClient.exeClient.exeClient.exeClient.exeClient.exeClient.exeClient.exeClient.exeClient.exeClient.exeClient.exeClient.exeClient.exeClient.exeClient.exeClient.exeClient.exeClient.exeClient.exepid process 4388 Client.exe 4348 Client.exe 4552 Client.exe 4800 Client.exe 4284 Client.exe 3468 Client.exe 4364 Client.exe 4544 Client.exe 760 Client.exe 4996 Client.exe 4536 Client.exe 3884 Client.exe 1484 Client.exe 5020 Client.exe 4024 Client.exe 4468 Client.exe 804 Client.exe 4356 Client.exe 4784 Client.exe 556 Client.exe 4576 Client.exe 4788 Client.exe 2044 Client.exe 1888 Client.exe 3104 Client.exe 4176 Client.exe 4252 Client.exe 2904 Client.exe 752 Client.exe -
Suspicious use of WriteProcessMemory 64 IoCs
Processes:
Uni - Copy (11) - Copy - Copy - Copy.exeClient.execmd.exeClient.execmd.exeClient.execmd.exeClient.execmd.exedescription pid process target process PID 336 wrote to memory of 2896 336 Uni - Copy (11) - Copy - Copy - Copy.exe schtasks.exe PID 336 wrote to memory of 2896 336 Uni - Copy (11) - Copy - Copy - Copy.exe schtasks.exe PID 336 wrote to memory of 2896 336 Uni - Copy (11) - Copy - Copy - Copy.exe schtasks.exe PID 336 wrote to memory of 4388 336 Uni - Copy (11) - Copy - Copy - Copy.exe Client.exe PID 336 wrote to memory of 4388 336 Uni - Copy (11) - Copy - Copy - Copy.exe Client.exe PID 336 wrote to memory of 4388 336 Uni - Copy (11) - Copy - Copy - Copy.exe Client.exe PID 336 wrote to memory of 1572 336 Uni - Copy (11) - Copy - Copy - Copy.exe SCHTASKS.exe PID 336 wrote to memory of 1572 336 Uni - Copy (11) - Copy - Copy - Copy.exe SCHTASKS.exe PID 336 wrote to memory of 1572 336 Uni - Copy (11) - Copy - Copy - Copy.exe SCHTASKS.exe PID 4388 wrote to memory of 2696 4388 Client.exe schtasks.exe PID 4388 wrote to memory of 2696 4388 Client.exe schtasks.exe PID 4388 wrote to memory of 2696 4388 Client.exe schtasks.exe PID 4388 wrote to memory of 1404 4388 Client.exe cmd.exe PID 4388 wrote to memory of 1404 4388 Client.exe cmd.exe PID 4388 wrote to memory of 1404 4388 Client.exe cmd.exe PID 1404 wrote to memory of 2536 1404 cmd.exe chcp.com PID 1404 wrote to memory of 2536 1404 cmd.exe chcp.com PID 1404 wrote to memory of 2536 1404 cmd.exe chcp.com PID 1404 wrote to memory of 5056 1404 cmd.exe PING.EXE PID 1404 wrote to memory of 5056 1404 cmd.exe PING.EXE PID 1404 wrote to memory of 5056 1404 cmd.exe PING.EXE PID 1404 wrote to memory of 4348 1404 cmd.exe Client.exe PID 1404 wrote to memory of 4348 1404 cmd.exe Client.exe PID 1404 wrote to memory of 4348 1404 cmd.exe Client.exe PID 4348 wrote to memory of 1372 4348 Client.exe schtasks.exe PID 4348 wrote to memory of 1372 4348 Client.exe schtasks.exe PID 4348 wrote to memory of 1372 4348 Client.exe schtasks.exe PID 4348 wrote to memory of 2900 4348 Client.exe cmd.exe PID 4348 wrote to memory of 2900 4348 Client.exe cmd.exe PID 4348 wrote to memory of 2900 4348 Client.exe cmd.exe PID 2900 wrote to memory of 2152 2900 cmd.exe chcp.com PID 2900 wrote to memory of 2152 2900 cmd.exe chcp.com PID 2900 wrote to memory of 2152 2900 cmd.exe chcp.com PID 2900 wrote to memory of 208 2900 cmd.exe PING.EXE PID 2900 wrote to memory of 208 2900 cmd.exe PING.EXE PID 2900 wrote to memory of 208 2900 cmd.exe PING.EXE PID 2900 wrote to memory of 4552 2900 cmd.exe Client.exe PID 2900 wrote to memory of 4552 2900 cmd.exe Client.exe PID 2900 wrote to memory of 4552 2900 cmd.exe Client.exe PID 4552 wrote to memory of 3832 4552 Client.exe schtasks.exe PID 4552 wrote to memory of 3832 4552 Client.exe schtasks.exe PID 4552 wrote to memory of 3832 4552 Client.exe schtasks.exe PID 4552 wrote to memory of 2236 4552 Client.exe cmd.exe PID 4552 wrote to memory of 2236 4552 Client.exe cmd.exe PID 4552 wrote to memory of 2236 4552 Client.exe cmd.exe PID 2236 wrote to memory of 4624 2236 cmd.exe chcp.com PID 2236 wrote to memory of 4624 2236 cmd.exe chcp.com PID 2236 wrote to memory of 4624 2236 cmd.exe chcp.com PID 2236 wrote to memory of 4580 2236 cmd.exe PING.EXE PID 2236 wrote to memory of 4580 2236 cmd.exe PING.EXE PID 2236 wrote to memory of 4580 2236 cmd.exe PING.EXE PID 2236 wrote to memory of 4800 2236 cmd.exe Client.exe PID 2236 wrote to memory of 4800 2236 cmd.exe Client.exe PID 2236 wrote to memory of 4800 2236 cmd.exe Client.exe PID 4800 wrote to memory of 2772 4800 Client.exe schtasks.exe PID 4800 wrote to memory of 2772 4800 Client.exe schtasks.exe PID 4800 wrote to memory of 2772 4800 Client.exe schtasks.exe PID 4800 wrote to memory of 2460 4800 Client.exe cmd.exe PID 4800 wrote to memory of 2460 4800 Client.exe cmd.exe PID 4800 wrote to memory of 2460 4800 Client.exe cmd.exe PID 2460 wrote to memory of 2368 2460 cmd.exe chcp.com PID 2460 wrote to memory of 2368 2460 cmd.exe chcp.com PID 2460 wrote to memory of 2368 2460 cmd.exe chcp.com PID 2460 wrote to memory of 2224 2460 cmd.exe PING.EXE
Processes
-
C:\Users\Admin\AppData\Local\Temp\uni\Uni - Copy (11) - Copy - Copy - Copy.exe"C:\Users\Admin\AppData\Local\Temp\uni\Uni - Copy (11) - Copy - Copy - Copy.exe"1⤵
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\schtasks.exe"schtasks" /create /tn "SeroXen" /sc ONLOGON /tr "C:\Users\Admin\AppData\Local\Temp\uni\Uni - Copy (11) - Copy - Copy - Copy.exe" /rl HIGHEST /f2⤵
- Creates scheduled task(s)
-
C:\Users\Admin\AppData\Roaming\SubDir\Client.exe"C:\Users\Admin\AppData\Roaming\SubDir\Client.exe"2⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\schtasks.exe"schtasks" /create /tn "SeroXen" /sc ONLOGON /tr "C:\Users\Admin\AppData\Roaming\SubDir\Client.exe" /rl HIGHEST /f3⤵
- Creates scheduled task(s)
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\nG0j0f3YARsq.bat" "3⤵
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\chcp.comchcp 650014⤵
-
C:\Windows\SysWOW64\PING.EXEping -n 10 localhost4⤵
- Runs ping.exe
-
C:\Users\Admin\AppData\Roaming\SubDir\Client.exe"C:\Users\Admin\AppData\Roaming\SubDir\Client.exe"4⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\schtasks.exe"schtasks" /create /tn "SeroXen" /sc ONLOGON /tr "C:\Users\Admin\AppData\Roaming\SubDir\Client.exe" /rl HIGHEST /f5⤵
- Creates scheduled task(s)
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\tSCTNcUDDQlr.bat" "5⤵
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\chcp.comchcp 650016⤵
-
C:\Windows\SysWOW64\PING.EXEping -n 10 localhost6⤵
- Runs ping.exe
-
C:\Users\Admin\AppData\Roaming\SubDir\Client.exe"C:\Users\Admin\AppData\Roaming\SubDir\Client.exe"6⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\schtasks.exe"schtasks" /create /tn "SeroXen" /sc ONLOGON /tr "C:\Users\Admin\AppData\Roaming\SubDir\Client.exe" /rl HIGHEST /f7⤵
- Creates scheduled task(s)
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\3gCwYI4BmDLl.bat" "7⤵
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\chcp.comchcp 650018⤵
-
C:\Windows\SysWOW64\PING.EXEping -n 10 localhost8⤵
- Runs ping.exe
-
C:\Users\Admin\AppData\Roaming\SubDir\Client.exe"C:\Users\Admin\AppData\Roaming\SubDir\Client.exe"8⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\schtasks.exe"schtasks" /create /tn "SeroXen" /sc ONLOGON /tr "C:\Users\Admin\AppData\Roaming\SubDir\Client.exe" /rl HIGHEST /f9⤵
- Creates scheduled task(s)
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\KUuT98mKyfA4.bat" "9⤵
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\chcp.comchcp 6500110⤵
-
C:\Windows\SysWOW64\PING.EXEping -n 10 localhost10⤵
- Runs ping.exe
-
C:\Users\Admin\AppData\Roaming\SubDir\Client.exe"C:\Users\Admin\AppData\Roaming\SubDir\Client.exe"10⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
-
C:\Windows\SysWOW64\schtasks.exe"schtasks" /create /tn "SeroXen" /sc ONLOGON /tr "C:\Users\Admin\AppData\Roaming\SubDir\Client.exe" /rl HIGHEST /f11⤵
- Creates scheduled task(s)
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\gcF8lkVPvvTk.bat" "11⤵
-
C:\Windows\SysWOW64\chcp.comchcp 6500112⤵
-
C:\Windows\SysWOW64\PING.EXEping -n 10 localhost12⤵
- Runs ping.exe
-
C:\Users\Admin\AppData\Roaming\SubDir\Client.exe"C:\Users\Admin\AppData\Roaming\SubDir\Client.exe"12⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
-
C:\Windows\SysWOW64\schtasks.exe"schtasks" /create /tn "SeroXen" /sc ONLOGON /tr "C:\Users\Admin\AppData\Roaming\SubDir\Client.exe" /rl HIGHEST /f13⤵
- Creates scheduled task(s)
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\9xlXlIf9uAeR.bat" "13⤵
-
C:\Windows\SysWOW64\chcp.comchcp 6500114⤵
-
C:\Windows\SysWOW64\PING.EXEping -n 10 localhost14⤵
- Runs ping.exe
-
C:\Users\Admin\AppData\Roaming\SubDir\Client.exe"C:\Users\Admin\AppData\Roaming\SubDir\Client.exe"14⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
-
C:\Windows\SysWOW64\schtasks.exe"schtasks" /create /tn "SeroXen" /sc ONLOGON /tr "C:\Users\Admin\AppData\Roaming\SubDir\Client.exe" /rl HIGHEST /f15⤵
- Creates scheduled task(s)
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\KgflCpAwsCP6.bat" "15⤵
-
C:\Windows\SysWOW64\chcp.comchcp 6500116⤵
-
C:\Windows\SysWOW64\PING.EXEping -n 10 localhost16⤵
- Runs ping.exe
-
C:\Users\Admin\AppData\Roaming\SubDir\Client.exe"C:\Users\Admin\AppData\Roaming\SubDir\Client.exe"16⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
-
C:\Windows\SysWOW64\schtasks.exe"schtasks" /create /tn "SeroXen" /sc ONLOGON /tr "C:\Users\Admin\AppData\Roaming\SubDir\Client.exe" /rl HIGHEST /f17⤵
- Creates scheduled task(s)
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\Ttt5bn6U0OMm.bat" "17⤵
-
C:\Windows\SysWOW64\chcp.comchcp 6500118⤵
-
C:\Windows\SysWOW64\PING.EXEping -n 10 localhost18⤵
- Runs ping.exe
-
C:\Users\Admin\AppData\Roaming\SubDir\Client.exe"C:\Users\Admin\AppData\Roaming\SubDir\Client.exe"18⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
-
C:\Windows\SysWOW64\schtasks.exe"schtasks" /create /tn "SeroXen" /sc ONLOGON /tr "C:\Users\Admin\AppData\Roaming\SubDir\Client.exe" /rl HIGHEST /f19⤵
- Creates scheduled task(s)
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\k8ksbGNgACiG.bat" "19⤵
-
C:\Windows\SysWOW64\chcp.comchcp 6500120⤵
-
C:\Windows\SysWOW64\PING.EXEping -n 10 localhost20⤵
- Runs ping.exe
-
C:\Users\Admin\AppData\Roaming\SubDir\Client.exe"C:\Users\Admin\AppData\Roaming\SubDir\Client.exe"20⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
-
C:\Windows\SysWOW64\schtasks.exe"schtasks" /create /tn "SeroXen" /sc ONLOGON /tr "C:\Users\Admin\AppData\Roaming\SubDir\Client.exe" /rl HIGHEST /f21⤵
- Creates scheduled task(s)
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\jJ35uLmSsrUK.bat" "21⤵
-
C:\Windows\SysWOW64\chcp.comchcp 6500122⤵
-
C:\Windows\SysWOW64\PING.EXEping -n 10 localhost22⤵
- Runs ping.exe
-
C:\Users\Admin\AppData\Roaming\SubDir\Client.exe"C:\Users\Admin\AppData\Roaming\SubDir\Client.exe"22⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
-
C:\Windows\SysWOW64\schtasks.exe"schtasks" /create /tn "SeroXen" /sc ONLOGON /tr "C:\Users\Admin\AppData\Roaming\SubDir\Client.exe" /rl HIGHEST /f23⤵
- Creates scheduled task(s)
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\iUMIDQBDbVHN.bat" "23⤵
-
C:\Windows\SysWOW64\chcp.comchcp 6500124⤵
-
C:\Windows\SysWOW64\PING.EXEping -n 10 localhost24⤵
- Runs ping.exe
-
C:\Users\Admin\AppData\Roaming\SubDir\Client.exe"C:\Users\Admin\AppData\Roaming\SubDir\Client.exe"24⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
-
C:\Windows\SysWOW64\schtasks.exe"schtasks" /create /tn "SeroXen" /sc ONLOGON /tr "C:\Users\Admin\AppData\Roaming\SubDir\Client.exe" /rl HIGHEST /f25⤵
- Creates scheduled task(s)
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\DOn1rNInib1Y.bat" "25⤵
-
C:\Windows\SysWOW64\chcp.comchcp 6500126⤵
-
C:\Windows\SysWOW64\PING.EXEping -n 10 localhost26⤵
- Runs ping.exe
-
C:\Users\Admin\AppData\Roaming\SubDir\Client.exe"C:\Users\Admin\AppData\Roaming\SubDir\Client.exe"26⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
-
C:\Windows\SysWOW64\schtasks.exe"schtasks" /create /tn "SeroXen" /sc ONLOGON /tr "C:\Users\Admin\AppData\Roaming\SubDir\Client.exe" /rl HIGHEST /f27⤵
- Creates scheduled task(s)
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\hn3wj8nJ8jro.bat" "27⤵
-
C:\Windows\SysWOW64\chcp.comchcp 6500128⤵
-
C:\Windows\SysWOW64\PING.EXEping -n 10 localhost28⤵
- Runs ping.exe
-
C:\Users\Admin\AppData\Roaming\SubDir\Client.exe"C:\Users\Admin\AppData\Roaming\SubDir\Client.exe"28⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
-
C:\Windows\SysWOW64\schtasks.exe"schtasks" /create /tn "SeroXen" /sc ONLOGON /tr "C:\Users\Admin\AppData\Roaming\SubDir\Client.exe" /rl HIGHEST /f29⤵
- Creates scheduled task(s)
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\scsVdgWZiTys.bat" "29⤵
-
C:\Windows\SysWOW64\chcp.comchcp 6500130⤵
-
C:\Windows\SysWOW64\PING.EXEping -n 10 localhost30⤵
- Runs ping.exe
-
C:\Users\Admin\AppData\Roaming\SubDir\Client.exe"C:\Users\Admin\AppData\Roaming\SubDir\Client.exe"30⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
-
C:\Windows\SysWOW64\schtasks.exe"schtasks" /create /tn "SeroXen" /sc ONLOGON /tr "C:\Users\Admin\AppData\Roaming\SubDir\Client.exe" /rl HIGHEST /f31⤵
- Creates scheduled task(s)
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\IwbBqUW0CuSf.bat" "31⤵
-
C:\Windows\SysWOW64\chcp.comchcp 6500132⤵
-
C:\Windows\SysWOW64\PING.EXEping -n 10 localhost32⤵
- Runs ping.exe
-
C:\Users\Admin\AppData\Roaming\SubDir\Client.exe"C:\Users\Admin\AppData\Roaming\SubDir\Client.exe"32⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
-
C:\Windows\SysWOW64\schtasks.exe"schtasks" /create /tn "SeroXen" /sc ONLOGON /tr "C:\Users\Admin\AppData\Roaming\SubDir\Client.exe" /rl HIGHEST /f33⤵
- Creates scheduled task(s)
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\pukQMeyLjtrP.bat" "33⤵
-
C:\Windows\SysWOW64\chcp.comchcp 6500134⤵
-
C:\Windows\SysWOW64\PING.EXEping -n 10 localhost34⤵
- Runs ping.exe
-
C:\Users\Admin\AppData\Roaming\SubDir\Client.exe"C:\Users\Admin\AppData\Roaming\SubDir\Client.exe"34⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
-
C:\Windows\SysWOW64\schtasks.exe"schtasks" /create /tn "SeroXen" /sc ONLOGON /tr "C:\Users\Admin\AppData\Roaming\SubDir\Client.exe" /rl HIGHEST /f35⤵
- Creates scheduled task(s)
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\ROsDRkD5Tery.bat" "35⤵
-
C:\Windows\SysWOW64\chcp.comchcp 6500136⤵
-
C:\Windows\SysWOW64\PING.EXEping -n 10 localhost36⤵
- Runs ping.exe
-
C:\Users\Admin\AppData\Roaming\SubDir\Client.exe"C:\Users\Admin\AppData\Roaming\SubDir\Client.exe"36⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
-
C:\Windows\SysWOW64\schtasks.exe"schtasks" /create /tn "SeroXen" /sc ONLOGON /tr "C:\Users\Admin\AppData\Roaming\SubDir\Client.exe" /rl HIGHEST /f37⤵
- Creates scheduled task(s)
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\GyfdWwKN3phj.bat" "37⤵
-
C:\Windows\SysWOW64\chcp.comchcp 6500138⤵
-
C:\Windows\SysWOW64\PING.EXEping -n 10 localhost38⤵
- Runs ping.exe
-
C:\Users\Admin\AppData\Roaming\SubDir\Client.exe"C:\Users\Admin\AppData\Roaming\SubDir\Client.exe"38⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
-
C:\Windows\SysWOW64\schtasks.exe"schtasks" /create /tn "SeroXen" /sc ONLOGON /tr "C:\Users\Admin\AppData\Roaming\SubDir\Client.exe" /rl HIGHEST /f39⤵
- Creates scheduled task(s)
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\33JDpwqbw3dZ.bat" "39⤵
-
C:\Windows\SysWOW64\chcp.comchcp 6500140⤵
-
C:\Windows\SysWOW64\PING.EXEping -n 10 localhost40⤵
- Runs ping.exe
-
C:\Users\Admin\AppData\Roaming\SubDir\Client.exe"C:\Users\Admin\AppData\Roaming\SubDir\Client.exe"40⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
-
C:\Windows\SysWOW64\schtasks.exe"schtasks" /create /tn "SeroXen" /sc ONLOGON /tr "C:\Users\Admin\AppData\Roaming\SubDir\Client.exe" /rl HIGHEST /f41⤵
- Creates scheduled task(s)
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\JqFbg3uJhuqe.bat" "41⤵
-
C:\Windows\SysWOW64\chcp.comchcp 6500142⤵
-
C:\Windows\SysWOW64\PING.EXEping -n 10 localhost42⤵
- Runs ping.exe
-
C:\Users\Admin\AppData\Roaming\SubDir\Client.exe"C:\Users\Admin\AppData\Roaming\SubDir\Client.exe"42⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
-
C:\Windows\SysWOW64\schtasks.exe"schtasks" /create /tn "SeroXen" /sc ONLOGON /tr "C:\Users\Admin\AppData\Roaming\SubDir\Client.exe" /rl HIGHEST /f43⤵
- Creates scheduled task(s)
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\8sxQtbE4f3op.bat" "43⤵
-
C:\Windows\SysWOW64\chcp.comchcp 6500144⤵
-
C:\Windows\SysWOW64\PING.EXEping -n 10 localhost44⤵
- Runs ping.exe
-
C:\Users\Admin\AppData\Roaming\SubDir\Client.exe"C:\Users\Admin\AppData\Roaming\SubDir\Client.exe"44⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
-
C:\Windows\SysWOW64\schtasks.exe"schtasks" /create /tn "SeroXen" /sc ONLOGON /tr "C:\Users\Admin\AppData\Roaming\SubDir\Client.exe" /rl HIGHEST /f45⤵
- Creates scheduled task(s)
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\cHEKmMja5Bf5.bat" "45⤵
-
C:\Windows\SysWOW64\chcp.comchcp 6500146⤵
-
C:\Windows\SysWOW64\PING.EXEping -n 10 localhost46⤵
- Runs ping.exe
-
C:\Users\Admin\AppData\Roaming\SubDir\Client.exe"C:\Users\Admin\AppData\Roaming\SubDir\Client.exe"46⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
-
C:\Windows\SysWOW64\schtasks.exe"schtasks" /create /tn "SeroXen" /sc ONLOGON /tr "C:\Users\Admin\AppData\Roaming\SubDir\Client.exe" /rl HIGHEST /f47⤵
- Creates scheduled task(s)
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\jzJpQ843XPjr.bat" "47⤵
-
C:\Windows\SysWOW64\chcp.comchcp 6500148⤵
-
C:\Windows\SysWOW64\PING.EXEping -n 10 localhost48⤵
- Runs ping.exe
-
C:\Users\Admin\AppData\Roaming\SubDir\Client.exe"C:\Users\Admin\AppData\Roaming\SubDir\Client.exe"48⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
-
C:\Windows\SysWOW64\schtasks.exe"schtasks" /create /tn "SeroXen" /sc ONLOGON /tr "C:\Users\Admin\AppData\Roaming\SubDir\Client.exe" /rl HIGHEST /f49⤵
- Creates scheduled task(s)
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\tCX9q60cfbgX.bat" "49⤵
-
C:\Windows\SysWOW64\chcp.comchcp 6500150⤵
-
C:\Windows\SysWOW64\PING.EXEping -n 10 localhost50⤵
- Runs ping.exe
-
C:\Users\Admin\AppData\Roaming\SubDir\Client.exe"C:\Users\Admin\AppData\Roaming\SubDir\Client.exe"50⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
-
C:\Windows\SysWOW64\schtasks.exe"schtasks" /create /tn "SeroXen" /sc ONLOGON /tr "C:\Users\Admin\AppData\Roaming\SubDir\Client.exe" /rl HIGHEST /f51⤵
- Creates scheduled task(s)
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\pox1UmSXGPu6.bat" "51⤵
-
C:\Windows\SysWOW64\chcp.comchcp 6500152⤵
-
C:\Windows\SysWOW64\PING.EXEping -n 10 localhost52⤵
- Runs ping.exe
-
C:\Users\Admin\AppData\Roaming\SubDir\Client.exe"C:\Users\Admin\AppData\Roaming\SubDir\Client.exe"52⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
-
C:\Windows\SysWOW64\schtasks.exe"schtasks" /create /tn "SeroXen" /sc ONLOGON /tr "C:\Users\Admin\AppData\Roaming\SubDir\Client.exe" /rl HIGHEST /f53⤵
- Creates scheduled task(s)
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\zZ25W8q2QFLb.bat" "53⤵
-
C:\Windows\SysWOW64\chcp.comchcp 6500154⤵
-
C:\Windows\SysWOW64\PING.EXEping -n 10 localhost54⤵
- Runs ping.exe
-
C:\Users\Admin\AppData\Roaming\SubDir\Client.exe"C:\Users\Admin\AppData\Roaming\SubDir\Client.exe"54⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
-
C:\Windows\SysWOW64\schtasks.exe"schtasks" /create /tn "SeroXen" /sc ONLOGON /tr "C:\Users\Admin\AppData\Roaming\SubDir\Client.exe" /rl HIGHEST /f55⤵
- Creates scheduled task(s)
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\GsdOOnSz0xMe.bat" "55⤵
-
C:\Windows\SysWOW64\chcp.comchcp 6500156⤵
-
C:\Windows\SysWOW64\PING.EXEping -n 10 localhost56⤵
- Runs ping.exe
-
C:\Users\Admin\AppData\Roaming\SubDir\Client.exe"C:\Users\Admin\AppData\Roaming\SubDir\Client.exe"56⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
-
C:\Windows\SysWOW64\schtasks.exe"schtasks" /create /tn "SeroXen" /sc ONLOGON /tr "C:\Users\Admin\AppData\Roaming\SubDir\Client.exe" /rl HIGHEST /f57⤵
- Creates scheduled task(s)
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\2tXTpacRTHdv.bat" "57⤵
-
C:\Windows\SysWOW64\chcp.comchcp 6500158⤵
-
C:\Windows\SysWOW64\PING.EXEping -n 10 localhost58⤵
- Runs ping.exe
-
C:\Users\Admin\AppData\Roaming\SubDir\Client.exe"C:\Users\Admin\AppData\Roaming\SubDir\Client.exe"58⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
-
C:\Windows\SysWOW64\schtasks.exe"schtasks" /create /tn "SeroXen" /sc ONLOGON /tr "C:\Users\Admin\AppData\Roaming\SubDir\Client.exe" /rl HIGHEST /f59⤵
- Creates scheduled task(s)
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\gKjUoEfkJxep.bat" "59⤵
-
C:\Windows\SysWOW64\chcp.comchcp 6500160⤵
-
C:\Windows\SysWOW64\PING.EXEping -n 10 localhost60⤵
- Runs ping.exe
-
C:\Users\Admin\AppData\Roaming\SubDir\Client.exe"C:\Users\Admin\AppData\Roaming\SubDir\Client.exe"60⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 752 -s 172459⤵
- Program crash
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2904 -s 224857⤵
- Program crash
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4252 -s 109255⤵
- Program crash
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4176 -s 219653⤵
- Program crash
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3104 -s 170451⤵
- Program crash
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1888 -s 224849⤵
- Program crash
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2044 -s 223647⤵
- Program crash
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4788 -s 107645⤵
- Program crash
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4576 -s 173243⤵
- Program crash
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 556 -s 170841⤵
- Program crash
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4784 -s 109639⤵
- Program crash
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4356 -s 109637⤵
- Program crash
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 804 -s 170835⤵
- Program crash
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4468 -s 171633⤵
- Program crash
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4024 -s 109231⤵
- Program crash
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 5020 -s 217229⤵
- Program crash
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1484 -s 223227⤵
- Program crash
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3884 -s 172025⤵
- Program crash
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4536 -s 109223⤵
- Program crash
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4996 -s 108421⤵
- Program crash
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 760 -s 171219⤵
- Program crash
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4544 -s 224817⤵
- Program crash
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4364 -s 170815⤵
- Program crash
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3468 -s 224813⤵
- Program crash
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4284 -s 164411⤵
- Program crash
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4800 -s 16409⤵
- Program crash
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4552 -s 21847⤵
- Program crash
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4348 -s 16565⤵
- Program crash
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4388 -s 22003⤵
- Program crash
-
C:\Windows\SysWOW64\SCHTASKS.exe"SCHTASKS.exe" /create /tn "$77Uni - Copy (11) - Copy - Copy - Copy.exe" /tr "'C:\Users\Admin\AppData\Local\Temp\uni\Uni - Copy (11) - Copy - Copy - Copy.exe'" /sc onlogon /rl HIGHEST2⤵
- Creates scheduled task(s)
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 428 -p 4388 -ip 43881⤵
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 496 -p 4348 -ip 43481⤵
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 436 -p 4552 -ip 45521⤵
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 452 -p 4800 -ip 48001⤵
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 384 -p 4284 -ip 42841⤵
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 384 -p 3468 -ip 34681⤵
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 496 -p 4364 -ip 43641⤵
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 548 -p 4544 -ip 45441⤵
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 360 -p 760 -ip 7601⤵
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 404 -p 4996 -ip 49961⤵
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 456 -p 4536 -ip 45361⤵
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 548 -p 3884 -ip 38841⤵
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 496 -p 1484 -ip 14841⤵
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 552 -p 5020 -ip 50201⤵
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 428 -p 4024 -ip 40241⤵
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 572 -p 4468 -ip 44681⤵
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 384 -p 804 -ip 8041⤵
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 404 -p 4356 -ip 43561⤵
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 544 -p 4784 -ip 47841⤵
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 580 -p 556 -ip 5561⤵
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 572 -p 4576 -ip 45761⤵
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 608 -p 4788 -ip 47881⤵
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 616 -p 2044 -ip 20441⤵
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 592 -p 1888 -ip 18881⤵
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 612 -p 3104 -ip 31041⤵
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 628 -p 4176 -ip 41761⤵
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 656 -p 4252 -ip 42521⤵
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 668 -p 2904 -ip 29041⤵
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 612 -p 752 -ip 7521⤵
Network
MITRE ATT&CK Matrix ATT&CK v13
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Local\Temp\33JDpwqbw3dZ.batFilesize
207B
MD50efe7d35f83f70876be8681826183eb6
SHA1178eefad4ec39a3e88b2bffcc5846c7f80291232
SHA256d25f4bd36e98afb20d5aa51ba9d471becead496042e85bf85acbbfe7da4ca390
SHA51206bfd5b29e3219d9ba2cf3d5c44e87da500353b7001c4452faf0b64dbd9cf9a059c21bc2503da1447462b99d20575de74891f26e9e202490cf35734bd61dd39b
-
C:\Users\Admin\AppData\Local\Temp\3gCwYI4BmDLl.batFilesize
207B
MD5e8092b6c194c7c3c4cb212bc84611787
SHA1c2fba16cf6c1ef08524c1a3c4355b7ed31706a0d
SHA256eb3394e91ce073e3eb41127fdc86bfd1612fc868114e09aebc03b27919ccc408
SHA5122d8f5b787d1f63caa1c9150215312d5cc9fc24383f9f2f607447d59126dfc3343215ce9f800e58c7b6f5f3b13af56bdad2d88debb45bdb67a03c0b6efefd8a33
-
C:\Users\Admin\AppData\Local\Temp\8sxQtbE4f3op.batFilesize
207B
MD5329065c92f871064da89efc378fee2b6
SHA19ead04314d0b82d5ba1db6a6f29d2e5695839ef1
SHA2561af200a305183b9b023180d524589204fa6bd8a61a8d0f025d5b29e6f020c35d
SHA512a97701f6126a39f8335b5048bbf398dbe147dca9cd4c5591d168e3787a112f88b534b67a25669504e2d5febf8f07be63ec60fdc51f7737119c37121ab03fbffd
-
C:\Users\Admin\AppData\Local\Temp\9xlXlIf9uAeR.batFilesize
207B
MD5718b5369bf5601fe70ce1ac6ab9a2405
SHA1d7ad5b8874f0737a7849248e1377a8eb27bf5ab3
SHA256cde74835d66388f8334b7d5a7765fd931a4747c38f790bea3918238b11388946
SHA512b93f73c1989d1cd180d4849cf14f8391a9bad0e1e1960e8da4e2151ff7b129a9a541e6d8b9ddc0916c09fe5dc3ab77a99d6bc7d62bd58213a17b8f1b80fe1cd4
-
C:\Users\Admin\AppData\Local\Temp\DOn1rNInib1Y.batFilesize
207B
MD5f825fe31d745a063c51303065e2804f6
SHA1bab9ac29cb6089f59def57ca944d4595956e6298
SHA2560206f06ce2344c916ab6921effe9d365b9dc67e7c1b7528dec844101b8b3a6c2
SHA512e0ba5fd93a61530b3d4e9995d449e9c298570bf9ffd36a251b71bea5d58f1029d006b700515ded96f70c097ea90f44ad26782135a0eb52476ecf545dd225cbea
-
C:\Users\Admin\AppData\Local\Temp\GyfdWwKN3phj.batFilesize
207B
MD517237905064d3c745c10881c247ceb9e
SHA19424593a2fb81dea421d5a96d552949d2a4283a7
SHA256c10e9942d7c94a82609a8d3ac7bedc82bceb4acc6cf86d9c8dc80c9c00b41086
SHA512b0ea803fb3922316f054ee64285689061ec922f79e71c44efbef48bb6c60be9204cf6484d29f30d2be366549ebcbe5907806a335aaf49629e26c5a9de217e6fc
-
C:\Users\Admin\AppData\Local\Temp\IwbBqUW0CuSf.batFilesize
207B
MD59b4add305190b62866ec55caa1e7d603
SHA145cd1c67d81394449dd5d00c817eb0a75ce94202
SHA256ab1851ce9f71cbca272880eb621e62a50c7ea34fb5e4c8c1f0e530584ece3c98
SHA512724b04d4131c0fb474463a50b0bd8c4228ed8bdd07a8ba6c8fa706589533fd7a99accfff7c0d3289511c3113431010cc00f8f96d314303286d013eb6b9fea5c4
-
C:\Users\Admin\AppData\Local\Temp\JqFbg3uJhuqe.batFilesize
207B
MD57858e730cc66ae5fb089a7acc7fbbbf1
SHA10b7c915b224db9b30a3fa3f6243186b620fa43c8
SHA256b7750ed678d2bd7db26c94721568f548a4f39aa81d7e1a61c8c971fe98e483bc
SHA512aafb57725bdb9265428bba9ba4c4288a1c39d1313647e6dfd333a37ccd1d718ed870ee6ad4e0862af14149493779d16b0947e32a36bb4158fffdb0336b8b4392
-
C:\Users\Admin\AppData\Local\Temp\KUuT98mKyfA4.batFilesize
207B
MD58c114427e5b16c9afaaf2be3d97b7f3f
SHA1d4491765c8949385477afccb0cf92e7a35e182a7
SHA25625f6a53412cc3089729df5b6758594fc64e309d0091fcdebda58ab4446a6efdb
SHA512682d8f69ad2705dacf8d8d1fd02137a89672046b6b58523fc6a8a07140e3fee73af23c7bbaafcc45f9c1e24014f19cb9cf16a35dbf71e8fb9bcb2cd01ecb5ea0
-
C:\Users\Admin\AppData\Local\Temp\KgflCpAwsCP6.batFilesize
207B
MD544f4bc64094ecf5114f6fcd9d870af5f
SHA1b2e5be8ed75dddbd38c09ff42c1af6dff256f119
SHA2560f58f20f2bb865b92dcf1119f7a8ad108231d01d210fdfc921b81ec427debdb0
SHA51237c301ad48f809602c6ebcdd921a1a9f4763427e2c32081230be7c0fee7b6cbe3c53dd4ad4e198f5416e5ba1bd81c3e0e255a0feb95bcc613927a90876d70db9
-
C:\Users\Admin\AppData\Local\Temp\ROsDRkD5Tery.batFilesize
207B
MD51732db9cba1a2a760f55bdd198948017
SHA139ed80b883b5ee8207f971087678d238b5c8dfbd
SHA2567ba74de328bc887b7d702f6063d256333b2b964ffd8c82204b01b0c855d6677f
SHA512e3670cf041baf7a6cac5e859cae453d8b1113bedb6071aeef514b6da26ce06af87b7c5589e29570eb6151b33dffe80b11a252b060fd37d25fd89e19003be90d7
-
C:\Users\Admin\AppData\Local\Temp\Ttt5bn6U0OMm.batFilesize
207B
MD5c073569e501956926edc2986b63e12a7
SHA1b9d3b05c0583d868d26bf130a7d0b971b55cf608
SHA25679502ed020d1028bce8db03da429054922221edec524e15ff0b0ae5e616f69d5
SHA512a52078f42843c225fdb6f757385737780f45029f2393d0e12ceda9e60ab68ed6f6923e537709dc12642783a3cb366704f299c53e65be98a941f0eb2eb2a4fb06
-
C:\Users\Admin\AppData\Local\Temp\gcF8lkVPvvTk.batFilesize
207B
MD5d6b3557261c1ce3d3e7b4425f3e8ec12
SHA13f3a6164ce58309fe2e88b22132df9954943bcf0
SHA25611b9d9ea96b7645d2c775e8527c72ab14ba300becf0ea748a585396682214030
SHA5123fc6d88a4709fc0f310b9805acb575723048a98b660ecde75734b2767745aec662fca07d356a772470ceeacd552cd9d796abb60e3a5c3ec231d6782f49441df2
-
C:\Users\Admin\AppData\Local\Temp\hn3wj8nJ8jro.batFilesize
207B
MD5d0b959b95b0787ec6711b30fe5b88376
SHA1cd8c1be60731b34c88ed24144953d073ef79fea2
SHA256a5d401d4e9666822b41b37ce2aa222d24b955aa1ca184f800c4b69734c40e3bb
SHA512cb68cb765e95cb3eb8bd669aa287782a782ae3f41bd5c31ee687bedea5d2b5b626cc8bd06aff8588e037df3123fe9826db3ea372f72c672b1f0166be41ad1af0
-
C:\Users\Admin\AppData\Local\Temp\iUMIDQBDbVHN.batFilesize
207B
MD5e38bd10fef1b5243d2825b1f919ce44b
SHA1f63427c0edff83296658cf6eddf1f41fce782152
SHA25634f3ba8cf7c813931035bfc3ef170a1793f5301069944a72656aa8f5b2f3cfa4
SHA512774af49164b2e7134bc1d347deeb38fbb9a0d119144ca4f434713a8e6a6ce3e4cfea8db6c5496610f5fc41901994964488c95c09615d449668d2113325d181aa
-
C:\Users\Admin\AppData\Local\Temp\jJ35uLmSsrUK.batFilesize
207B
MD598832cc185801d3ba7fbeaf98a89b972
SHA1fb1ce59d3d2db15d474831306f7387ad4b42639b
SHA256eaf5eb73ea1990b790e86f8e6fb5fa653d8e4c5188aac25ab3431ea6a9f244f2
SHA5124ccb37b55f5fadb6c227a02d493293c155309659e8b2f296d52167fa05c5f8d654b02f2816645a19924c43801c820732de5d4802782e6a1df6cb1cb8d2249813
-
C:\Users\Admin\AppData\Local\Temp\k8ksbGNgACiG.batFilesize
207B
MD59331c73d1298fd8491447544a7ba3241
SHA197c50e28f76f6de8908804e30cbb839e568f9389
SHA2563dcd0538ef56d55fe8963773006a13f3f9f499cdb037118c2a3bef2533736766
SHA51223c393c950a56e4f622ddc6cf8b0d0a5ee5d0267fd29227212b72d49e26af82553c6359a613dc09de40b0bde9b2a40789679501057034d90c799c5f3afa3710c
-
C:\Users\Admin\AppData\Local\Temp\nG0j0f3YARsq.batFilesize
207B
MD51735e9d69feec044017cea3982187e2d
SHA1f1dc6cd98b5525a44b79df1f5c0208280fdd6593
SHA2560b75affed3433f7806b8b3c7a4e394fd1bbca5d832d91fd1dadee4d1a20dbe71
SHA512e14847c56f7af002a7383039cad013acc1ead8801dc9e82e10806e80d721397abac06d2f57a0ce2612793dabe74ac25c1f3e2cf133f9faf90413507ccce2a940
-
C:\Users\Admin\AppData\Local\Temp\pukQMeyLjtrP.batFilesize
207B
MD52a5e666e498fb26c08980d1bdbc30adb
SHA198160bd99e5de98d98d12dc010ffbb11723d8df5
SHA256f7f231284737f5c74a5657ccbac33c6ff904b6146516698a7af6077d90de1e29
SHA512a1f786ede89ae5849921384c3f43f6e77b622a8244075bddd9d05168476bdc2d69a289b4e46891655de520e39d70ed989a49e3aae50eb6ed605ebac1762bd95d
-
C:\Users\Admin\AppData\Local\Temp\scsVdgWZiTys.batFilesize
207B
MD5ed063f38502abfe72281d5034a461cfe
SHA1ef8faf86f186cd5de769b71f4d107bc7b90ddba9
SHA256e1a86896a7e1e3c5e1ad46170e28dd540ae3365dd5084f5f00243831496620cd
SHA512bd2fd41f1d7fa9c06a8260506a5d7e30c429f110e20f40d12db96c887189f1169840d2ee3d7508bba0ce6f537df3515780e66da291ae019549769b64d76c03ae
-
C:\Users\Admin\AppData\Local\Temp\tSCTNcUDDQlr.batFilesize
207B
MD56ca4dfbaf26c5cfec8f05eecf7e2224b
SHA1cc03ab55c4fd0b9f4ccf98f6895372bd6161dca9
SHA2561018b1911f264a3a51930c9501b7ef062e38d2ef57a050418ff73c8f529bd26a
SHA51260982d741ca116505a911b3d61c7f3c9e8778ddb3def15171a9ec536439d6cf088fffab766b8b8e5f18d5da9b208942f498ad07153df26ec95cd67efa465b3f5
-
C:\Users\Admin\AppData\Roaming\Logs\06-10-2024Filesize
224B
MD5f6478a7a9a0944a45479b623970e5d87
SHA1d53f154afe4ec5ce1810892bedb7efee6e20226b
SHA256401f6205c12e4ec92ee58f2c10fa320e60fcd84fc2ddaec1fb8a7e8e3f2c528f
SHA512b1e49249dfebebde07f2359caf96a2c2d041f486b5c27f46c3af2f9057f004da32ea3e57e709a116e31346a97bdd868877b0d1240520ee0ff5af147ad1aedd64
-
C:\Users\Admin\AppData\Roaming\Logs\06-10-2024Filesize
224B
MD524445c1e0868943d7a0ed39d6c531b7d
SHA163e012bb341bb71a4133fb74133a4faff23115a1
SHA25644f3d8ffb683f327a92fe595c16ead64346e7b0c3c3f3ebb5e8eb4b6d0ec8a29
SHA512d87f3626edbf2c4310e32f982d520659c3c8f175c4008a6e093e3e4ae3bf9eab9234be2028f945be3c5b25611f75448b18bf93189c098d725c029a72dbbb3cf8
-
C:\Users\Admin\AppData\Roaming\Logs\06-10-2024Filesize
224B
MD54862545659bc2fa711ffb90978296cb4
SHA1de358db7eb2bb77566f92721fed3838d573c0d2e
SHA256ea51272057e34f68a8bb01a0944ba30d819510312fca5cedc58cb77cf88509b0
SHA512d0d5a2fc9ad2e95c4a30ec10f1ee178ccbc70c6304709fe29d1923f125f92486819c3f2cf25d1f100384330288dd4dcea3baa0323f491b5217561b1332ba64b6
-
C:\Users\Admin\AppData\Roaming\Logs\06-10-2024Filesize
224B
MD505ebaab7e7c1b41ee19dcb4b5fc3e8c9
SHA14a24d9238a256c76f427561fb4424fca1956b6ed
SHA256b0e7c2940dcb74b9bb001ab39104f12a1d4461d7b3b766cc9980e16e1889dfcc
SHA5124a1ec9bd93ec7562bcfb3561003e3ab4a8d5494e3613277f0159779ab579065e090d7508c9c261f85e8ec423b9091ca3727165b544ea3b1b99e22b62224f63da
-
C:\Users\Admin\AppData\Roaming\Logs\06-10-2024Filesize
224B
MD589c72292b3e5370014c999b4a827157d
SHA1bdcea97e811d3d2ee6556ba5d589f825d8aff06c
SHA256a0d94e6e67cfbad5465fb41be978bc7b740c976073cda809d51702a51ab71d31
SHA512fbeb713d82902fc2ace18017d1f6e045defc2647ef8aa048e82ef887f012043b2d37e9c9f9ebfd620cba283d1642170c914563bfa15497d49be4ed57992a4d52
-
C:\Users\Admin\AppData\Roaming\Logs\06-10-2024Filesize
224B
MD579fdbd797117b5d8c8be198385814136
SHA1cbcf9cf0ee16200e9580a91b3865ea3f2b4f8bd1
SHA25685c632b1659c90e03f0e0b2354d26f29e409349703e5d12d0081a8b28ac8c613
SHA5124aadf01e0fb38c8e4fcfb71ecc9b73304a7b42eb73c6e285aec3c244e09c3f99cd83de50b059b77158ee7a862f28155a1cfb7681e48f8366ae11e7eba0ac0c89
-
C:\Users\Admin\AppData\Roaming\Logs\06-10-2024Filesize
224B
MD5a15447b4c29e3ecc8551e6f58e4a19bc
SHA175dfe6fc8dd3b39a42669c57759788cb8d9c30a3
SHA256538d4a8b3f5689a1cf936739b3ef47c7a3216d30e5d3120bb05a71199c7f16c2
SHA51282436f90065093f24c457d827f29fc51a1d2e17623b95a4662e364bfa7a49c88e0ddf0075de3bb8144e1c76ab448b4c849665b95cb4902cfbd9119831eeb2628
-
C:\Users\Admin\AppData\Roaming\Logs\06-10-2024MD5
d41d8cd98f00b204e9800998ecf8427e
SHA1da39a3ee5e6b4b0d3255bfef95601890afd80709
SHA256e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855
SHA512cf83e1357eefb8bdf1542850d66d8007d620e4050b5715dc83f4a921d36ce9ce47d0d13c5d85f2b0ff8318d2877eec2f63b931bd47417a81a538327af927da3e
-
C:\Users\Admin\AppData\Roaming\Logs\06-10-2024Filesize
224B
MD5f6ae2693b187c2bc9702a985f1029239
SHA152b1860cd25e3b07922398bb490d01a4af8feae5
SHA2566f0d0a3e78e412d40ae6e96c9e63441baf08a457ec3024ddf09e573f285fdd83
SHA512e7c4a811c0e82d5c15535950d12bc92c6d11953dbef2360f3530907215b62f3cec18d42a3a4e404d7dec6719a55592313447f42ebf741c028253596f346b4e75
-
C:\Users\Admin\AppData\Roaming\Logs\06-10-2024Filesize
224B
MD5e480dceda255912073911d446f93c4e3
SHA1bc5b640fe9998ce2163f770106590fbd7ed3de86
SHA256b0b80d6de43192b9095a5f22beac384be9959e02d1f748dc06366d00c39227d3
SHA5124ec7f38bb92fa7ddade34975b8b1daf2806bdb87eeb7cac9b8838b16d95b9b6ec04edcbc9c91d47c46a2c5f6a4dad734199082baddcd308d2939f4ce7ccdab2f
-
C:\Users\Admin\AppData\Roaming\Logs\06-10-2024Filesize
224B
MD5283f52d4ac5428415e438beb1108e497
SHA122301d2213250d12a663a75dcbd9387d214550d8
SHA256af075725c2df4b13abbc531f51617e158e7c5f83bb391e67a23229c0375c8b9e
SHA512f43f3b4a3799ba032d7d67a2df52bf573ae80e914ce7adfd5b97b85f18679f3d1d9aa556c195d4caf499fd458e11bd2156adcfa41a212ecca08ddf8c17b82119
-
C:\Users\Admin\AppData\Roaming\SubDir\Client.exeFilesize
409KB
MD5b70fdac25a99501e3cae11f1b775249e
SHA13c59226479bfdcd1b2927bcfb1a7516d4cb8dd71
SHA25651ff3eb450a786c1aaa75ff889f2fd256412a7b75d04277fdf9fcccc20e57246
SHA51243f0d5d6e5f0d5febba537c109ffdbc250bbb6e9725e635a43ec975b0353048eaeee50b6e9274cd5e072ea6b0cea32439bd37408b2528832f467f2075f74ca44
-
memory/336-16-0x0000000074870000-0x0000000075020000-memory.dmpFilesize
7.7MB
-
memory/336-4-0x0000000074870000-0x0000000075020000-memory.dmpFilesize
7.7MB
-
memory/336-1-0x0000000000960000-0x00000000009CC000-memory.dmpFilesize
432KB
-
memory/336-2-0x00000000058F0000-0x0000000005E94000-memory.dmpFilesize
5.6MB
-
memory/336-3-0x0000000005430000-0x00000000054C2000-memory.dmpFilesize
584KB
-
memory/336-0-0x000000007487E000-0x000000007487F000-memory.dmpFilesize
4KB
-
memory/336-8-0x0000000074870000-0x0000000075020000-memory.dmpFilesize
7.7MB
-
memory/336-7-0x000000007487E000-0x000000007487F000-memory.dmpFilesize
4KB
-
memory/336-6-0x00000000060E0000-0x00000000060F2000-memory.dmpFilesize
72KB
-
memory/336-5-0x00000000054D0000-0x0000000005536000-memory.dmpFilesize
408KB
-
memory/4388-19-0x00000000062E0000-0x00000000062EA000-memory.dmpFilesize
40KB
-
memory/4388-15-0x0000000074870000-0x0000000075020000-memory.dmpFilesize
7.7MB
-
memory/4388-24-0x0000000074870000-0x0000000075020000-memory.dmpFilesize
7.7MB
-
memory/4388-17-0x0000000074870000-0x0000000075020000-memory.dmpFilesize
7.7MB