Overview
overview
10Static
static
10uni/Uni - ...py.exe
windows7-x64
10uni/Uni - ...py.exe
windows10-2004-x64
10uni/Uni - ...py.exe
windows7-x64
10uni/Uni - ...py.exe
windows10-2004-x64
10uni/Uni - ...py.exe
windows7-x64
10uni/Uni - ...py.exe
windows10-2004-x64
10uni/Uni - ...py.exe
windows7-x64
10uni/Uni - ...py.exe
windows10-2004-x64
10uni/Uni - ...py.exe
windows7-x64
10uni/Uni - ...py.exe
windows10-2004-x64
10uni/Uni - ...py.exe
windows7-x64
10uni/Uni - ...py.exe
windows10-2004-x64
10uni/Uni - ...py.exe
windows7-x64
10uni/Uni - ...py.exe
windows10-2004-x64
10uni/Uni - ...py.exe
windows7-x64
10uni/Uni - ...py.exe
windows10-2004-x64
10uni/Uni - ...py.exe
windows7-x64
10uni/Uni - ...py.exe
windows10-2004-x64
10uni/Uni - ...py.exe
windows7-x64
10uni/Uni - ...py.exe
windows10-2004-x64
10uni/Uni - ...py.exe
windows7-x64
10uni/Uni - ...py.exe
windows10-2004-x64
10uni/Uni - ...py.exe
windows7-x64
10uni/Uni - ...py.exe
windows10-2004-x64
10uni/Uni - ...py.exe
windows7-x64
10uni/Uni - ...py.exe
windows10-2004-x64
10uni/Uni - ...py.exe
windows7-x64
10uni/Uni - ...py.exe
windows10-2004-x64
10uni/Uni - ...py.exe
windows7-x64
10uni/Uni - ...py.exe
windows10-2004-x64
10uni/Uni - ...py.exe
windows7-x64
10uni/Uni - ...py.exe
windows10-2004-x64
10Analysis
-
max time kernel
600s -
max time network
613s -
platform
windows10-2004_x64 -
resource
win10v2004-20240508-en -
resource tags
arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system -
submitted
15-06-2024 07:35
Behavioral task
behavioral1
Sample
uni/Uni - Copy (10) - Copy - Copy - Copy - Copy.exe
Resource
win7-20240508-en
Behavioral task
behavioral2
Sample
uni/Uni - Copy (10) - Copy - Copy - Copy - Copy.exe
Resource
win10v2004-20240611-en
Behavioral task
behavioral3
Sample
uni/Uni - Copy (10) - Copy - Copy - Copy.exe
Resource
win7-20240611-en
Behavioral task
behavioral4
Sample
uni/Uni - Copy (10) - Copy - Copy - Copy.exe
Resource
win10v2004-20240611-en
Behavioral task
behavioral5
Sample
uni/Uni - Copy (10) - Copy - Copy.exe
Resource
win7-20240508-en
Behavioral task
behavioral6
Sample
uni/Uni - Copy (10) - Copy - Copy.exe
Resource
win10v2004-20240611-en
Behavioral task
behavioral7
Sample
uni/Uni - Copy (10) - Copy.exe
Resource
win7-20240508-en
Behavioral task
behavioral8
Sample
uni/Uni - Copy (10) - Copy.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral9
Sample
uni/Uni - Copy (100) - Copy - Copy - Copy - Copy.exe
Resource
win7-20240611-en
Behavioral task
behavioral10
Sample
uni/Uni - Copy (100) - Copy - Copy - Copy - Copy.exe
Resource
win10v2004-20240611-en
Behavioral task
behavioral11
Sample
uni/Uni - Copy (100) - Copy - Copy - Copy.exe
Resource
win7-20240508-en
Behavioral task
behavioral12
Sample
uni/Uni - Copy (100) - Copy - Copy - Copy.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral13
Sample
uni/Uni - Copy (100) - Copy - Copy.exe
Resource
win7-20240508-en
Behavioral task
behavioral14
Sample
uni/Uni - Copy (100) - Copy - Copy.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral15
Sample
uni/Uni - Copy (101) - Copy - Copy - Copy - Copy.exe
Resource
win7-20240508-en
Behavioral task
behavioral16
Sample
uni/Uni - Copy (101) - Copy - Copy - Copy - Copy.exe
Resource
win10v2004-20240611-en
Behavioral task
behavioral17
Sample
uni/Uni - Copy (101) - Copy - Copy - Copy.exe
Resource
win7-20231129-en
Behavioral task
behavioral18
Sample
uni/Uni - Copy (101) - Copy - Copy - Copy.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral19
Sample
uni/Uni - Copy (101) - Copy - Copy.exe
Resource
win7-20240611-en
Behavioral task
behavioral20
Sample
uni/Uni - Copy (101) - Copy - Copy.exe
Resource
win10v2004-20240611-en
Behavioral task
behavioral21
Sample
uni/Uni - Copy (102) - Copy - Copy - Copy.exe
Resource
win7-20240220-en
Behavioral task
behavioral22
Sample
uni/Uni - Copy (102) - Copy - Copy - Copy.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral23
Sample
uni/Uni - Copy (102) - Copy - Copy.exe
Resource
win7-20240611-en
Behavioral task
behavioral24
Sample
uni/Uni - Copy (102) - Copy - Copy.exe
Resource
win10v2004-20240611-en
Behavioral task
behavioral25
Sample
uni/Uni - Copy (103) - Copy - Copy - Copy.exe
Resource
win7-20240508-en
Behavioral task
behavioral26
Sample
uni/Uni - Copy (103) - Copy - Copy - Copy.exe
Resource
win10v2004-20240611-en
Behavioral task
behavioral27
Sample
uni/Uni - Copy (103) - Copy - Copy.exe
Resource
win7-20240508-en
Behavioral task
behavioral28
Sample
uni/Uni - Copy (103) - Copy - Copy.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral29
Sample
uni/Uni - Copy (104) - Copy - Copy - Copy.exe
Resource
win7-20240508-en
Behavioral task
behavioral30
Sample
uni/Uni - Copy (104) - Copy - Copy - Copy.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral31
Sample
uni/Uni - Copy (104) - Copy - Copy.exe
Resource
win7-20240221-en
General
-
Target
uni/Uni - Copy (100) - Copy - Copy - Copy.exe
-
Size
409KB
-
MD5
b70fdac25a99501e3cae11f1b775249e
-
SHA1
3c59226479bfdcd1b2927bcfb1a7516d4cb8dd71
-
SHA256
51ff3eb450a786c1aaa75ff889f2fd256412a7b75d04277fdf9fcccc20e57246
-
SHA512
43f0d5d6e5f0d5febba537c109ffdbc250bbb6e9725e635a43ec975b0353048eaeee50b6e9274cd5e072ea6b0cea32439bd37408b2528832f467f2075f74ca44
-
SSDEEP
12288:gpbJjGut6AoE3hVVdFaC/eZPTMTDlpgfJCKuMsVs:oVaurMLcDlpRKai
Malware Config
Extracted
quasar
3.1.5
SeroXen
panel-slave.gl.at.ply.gg:57059
panel-slave.gl.at.ply.gg:27892
$Sxr-rpL8EItHN3pqIQQVy2
-
encryption_key
Lme7VBS3l58VwLM69PNM
-
install_name
Client.exe
-
log_directory
Logs
-
reconnect_delay
3000
-
startup_key
SeroXen
-
subdirectory
SubDir
Signatures
-
Quasar payload 2 IoCs
Processes:
resource yara_rule behavioral12/memory/1232-1-0x0000000000460000-0x00000000004CC000-memory.dmp family_quasar C:\Users\Admin\AppData\Roaming\SubDir\Client.exe family_quasar -
Checks computer location settings 2 TTPs 27 IoCs
Looks up country code configured in the registry, likely geofence.
Processes:
Client.exeClient.exeClient.exeClient.exeClient.exeClient.exeClient.exeClient.exeClient.exeClient.exeClient.exeClient.exeClient.exeClient.exeClient.exeClient.exeClient.exeClient.exeClient.exeClient.exeClient.exeClient.exeClient.exeClient.exeClient.exeClient.exeClient.exedescription ioc process Key value queried \REGISTRY\USER\S-1-5-21-3558294865-3673844354-2255444939-1000\Control Panel\International\Geo\Nation Client.exe Key value queried \REGISTRY\USER\S-1-5-21-3558294865-3673844354-2255444939-1000\Control Panel\International\Geo\Nation Client.exe Key value queried \REGISTRY\USER\S-1-5-21-3558294865-3673844354-2255444939-1000\Control Panel\International\Geo\Nation Client.exe Key value queried \REGISTRY\USER\S-1-5-21-3558294865-3673844354-2255444939-1000\Control Panel\International\Geo\Nation Client.exe Key value queried \REGISTRY\USER\S-1-5-21-3558294865-3673844354-2255444939-1000\Control Panel\International\Geo\Nation Client.exe Key value queried \REGISTRY\USER\S-1-5-21-3558294865-3673844354-2255444939-1000\Control Panel\International\Geo\Nation Client.exe Key value queried \REGISTRY\USER\S-1-5-21-3558294865-3673844354-2255444939-1000\Control Panel\International\Geo\Nation Client.exe Key value queried \REGISTRY\USER\S-1-5-21-3558294865-3673844354-2255444939-1000\Control Panel\International\Geo\Nation Client.exe Key value queried \REGISTRY\USER\S-1-5-21-3558294865-3673844354-2255444939-1000\Control Panel\International\Geo\Nation Client.exe Key value queried \REGISTRY\USER\S-1-5-21-3558294865-3673844354-2255444939-1000\Control Panel\International\Geo\Nation Client.exe Key value queried \REGISTRY\USER\S-1-5-21-3558294865-3673844354-2255444939-1000\Control Panel\International\Geo\Nation Client.exe Key value queried \REGISTRY\USER\S-1-5-21-3558294865-3673844354-2255444939-1000\Control Panel\International\Geo\Nation Client.exe Key value queried \REGISTRY\USER\S-1-5-21-3558294865-3673844354-2255444939-1000\Control Panel\International\Geo\Nation Client.exe Key value queried \REGISTRY\USER\S-1-5-21-3558294865-3673844354-2255444939-1000\Control Panel\International\Geo\Nation Client.exe Key value queried \REGISTRY\USER\S-1-5-21-3558294865-3673844354-2255444939-1000\Control Panel\International\Geo\Nation Client.exe Key value queried \REGISTRY\USER\S-1-5-21-3558294865-3673844354-2255444939-1000\Control Panel\International\Geo\Nation Client.exe Key value queried \REGISTRY\USER\S-1-5-21-3558294865-3673844354-2255444939-1000\Control Panel\International\Geo\Nation Client.exe Key value queried \REGISTRY\USER\S-1-5-21-3558294865-3673844354-2255444939-1000\Control Panel\International\Geo\Nation Client.exe Key value queried \REGISTRY\USER\S-1-5-21-3558294865-3673844354-2255444939-1000\Control Panel\International\Geo\Nation Client.exe Key value queried \REGISTRY\USER\S-1-5-21-3558294865-3673844354-2255444939-1000\Control Panel\International\Geo\Nation Client.exe Key value queried \REGISTRY\USER\S-1-5-21-3558294865-3673844354-2255444939-1000\Control Panel\International\Geo\Nation Client.exe Key value queried \REGISTRY\USER\S-1-5-21-3558294865-3673844354-2255444939-1000\Control Panel\International\Geo\Nation Client.exe Key value queried \REGISTRY\USER\S-1-5-21-3558294865-3673844354-2255444939-1000\Control Panel\International\Geo\Nation Client.exe Key value queried \REGISTRY\USER\S-1-5-21-3558294865-3673844354-2255444939-1000\Control Panel\International\Geo\Nation Client.exe Key value queried \REGISTRY\USER\S-1-5-21-3558294865-3673844354-2255444939-1000\Control Panel\International\Geo\Nation Client.exe Key value queried \REGISTRY\USER\S-1-5-21-3558294865-3673844354-2255444939-1000\Control Panel\International\Geo\Nation Client.exe Key value queried \REGISTRY\USER\S-1-5-21-3558294865-3673844354-2255444939-1000\Control Panel\International\Geo\Nation Client.exe -
Executes dropped EXE 28 IoCs
Processes:
Client.exeClient.exeClient.exeClient.exeClient.exeClient.exeClient.exeClient.exeClient.exeClient.exeClient.exeClient.exeClient.exeClient.exeClient.exeClient.exeClient.exeClient.exeClient.exeClient.exeClient.exeClient.exeClient.exeClient.exeClient.exeClient.exeClient.exeClient.exepid process 2544 Client.exe 2764 Client.exe 2860 Client.exe 3808 Client.exe 4104 Client.exe 4440 Client.exe 1788 Client.exe 2424 Client.exe 1200 Client.exe 3960 Client.exe 4788 Client.exe 3480 Client.exe 956 Client.exe 3916 Client.exe 1280 Client.exe 1148 Client.exe 1252 Client.exe 4108 Client.exe 1988 Client.exe 1164 Client.exe 4264 Client.exe 1948 Client.exe 932 Client.exe 1660 Client.exe 4016 Client.exe 3620 Client.exe 1568 Client.exe 4676 Client.exe -
Adds Run key to start application 2 TTPs 1 IoCs
Processes:
Client.exedescription ioc process Set value (str) \REGISTRY\USER\S-1-5-21-3558294865-3673844354-2255444939-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\SeroXen = "\"C:\\Users\\Admin\\AppData\\Roaming\\SubDir\\Client.exe\"" Client.exe -
Looks up external IP address via web service 26 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
Processes:
flow ioc 43 ip-api.com 45 ip-api.com 63 ip-api.com 22 ip-api.com 26 ip-api.com 36 ip-api.com 40 ip-api.com 61 ip-api.com 9 api.ipify.org 30 ip-api.com 55 ip-api.com 59 ip-api.com 16 ip-api.com 20 ip-api.com 13 ip-api.com 28 ip-api.com 32 ip-api.com 18 ip-api.com 11 ip-api.com 24 ip-api.com 53 ip-api.com 57 ip-api.com 2 ip-api.com 47 ip-api.com 34 ip-api.com 51 ip-api.com -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Program crash 27 IoCs
Processes:
WerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exepid pid_target process target process 5024 2544 WerFault.exe Client.exe 1148 2764 WerFault.exe Client.exe 1408 2860 WerFault.exe Client.exe 4656 3808 WerFault.exe Client.exe 3360 4104 WerFault.exe Client.exe 2244 4440 WerFault.exe Client.exe 792 1788 WerFault.exe Client.exe 1076 2424 WerFault.exe Client.exe 5028 1200 WerFault.exe Client.exe 208 3960 WerFault.exe Client.exe 4972 4788 WerFault.exe Client.exe 4540 3480 WerFault.exe Client.exe 1796 956 WerFault.exe Client.exe 2520 3916 WerFault.exe Client.exe 2328 1280 WerFault.exe Client.exe 4664 1148 WerFault.exe Client.exe 2032 1252 WerFault.exe Client.exe 4824 4108 WerFault.exe Client.exe 3828 1988 WerFault.exe Client.exe 1616 1164 WerFault.exe Client.exe 4984 4264 WerFault.exe Client.exe 4788 1948 WerFault.exe Client.exe 4920 932 WerFault.exe Client.exe 1724 1660 WerFault.exe Client.exe 4308 4016 WerFault.exe Client.exe 4784 3620 WerFault.exe Client.exe 2400 1568 WerFault.exe Client.exe -
Creates scheduled task(s) 1 TTPs 30 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
Processes:
schtasks.exeschtasks.exeschtasks.exeschtasks.exeSCHTASKS.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exepid process 4100 schtasks.exe 4688 schtasks.exe 2024 schtasks.exe 4432 schtasks.exe 4772 SCHTASKS.exe 3924 schtasks.exe 3216 schtasks.exe 4312 schtasks.exe 4336 schtasks.exe 932 schtasks.exe 4988 schtasks.exe 1212 schtasks.exe 5084 schtasks.exe 3428 schtasks.exe 3380 schtasks.exe 3208 schtasks.exe 2380 schtasks.exe 1948 schtasks.exe 5084 schtasks.exe 2132 schtasks.exe 5024 schtasks.exe 3852 schtasks.exe 4744 schtasks.exe 656 schtasks.exe 1004 schtasks.exe 2828 schtasks.exe 1984 schtasks.exe 4724 schtasks.exe 1692 schtasks.exe 4264 schtasks.exe -
Runs ping.exe 1 TTPs 27 IoCs
Processes:
PING.EXEPING.EXEPING.EXEPING.EXEPING.EXEPING.EXEPING.EXEPING.EXEPING.EXEPING.EXEPING.EXEPING.EXEPING.EXEPING.EXEPING.EXEPING.EXEPING.EXEPING.EXEPING.EXEPING.EXEPING.EXEPING.EXEPING.EXEPING.EXEPING.EXEPING.EXEPING.EXEpid process 404 PING.EXE 3448 PING.EXE 2900 PING.EXE 1184 PING.EXE 1944 PING.EXE 2072 PING.EXE 5036 PING.EXE 4188 PING.EXE 1996 PING.EXE 1260 PING.EXE 4932 PING.EXE 3772 PING.EXE 4144 PING.EXE 4784 PING.EXE 2688 PING.EXE 1764 PING.EXE 2492 PING.EXE 5028 PING.EXE 416 PING.EXE 2028 PING.EXE 2036 PING.EXE 2104 PING.EXE 4160 PING.EXE 3256 PING.EXE 2952 PING.EXE 1920 PING.EXE 4280 PING.EXE -
Suspicious use of AdjustPrivilegeToken 29 IoCs
Processes:
Uni - Copy (100) - Copy - Copy - Copy.exeClient.exeClient.exeClient.exeClient.exeClient.exeClient.exeClient.exeClient.exeClient.exeClient.exeClient.exeClient.exeClient.exeClient.exeClient.exeClient.exeClient.exeClient.exeClient.exeClient.exeClient.exeClient.exeClient.exeClient.exeClient.exeClient.exeClient.exeClient.exedescription pid process Token: SeDebugPrivilege 1232 Uni - Copy (100) - Copy - Copy - Copy.exe Token: SeDebugPrivilege 2544 Client.exe Token: SeDebugPrivilege 2764 Client.exe Token: SeDebugPrivilege 2860 Client.exe Token: SeDebugPrivilege 3808 Client.exe Token: SeDebugPrivilege 4104 Client.exe Token: SeDebugPrivilege 4440 Client.exe Token: SeDebugPrivilege 1788 Client.exe Token: SeDebugPrivilege 2424 Client.exe Token: SeDebugPrivilege 1200 Client.exe Token: SeDebugPrivilege 3960 Client.exe Token: SeDebugPrivilege 4788 Client.exe Token: SeDebugPrivilege 3480 Client.exe Token: SeDebugPrivilege 956 Client.exe Token: SeDebugPrivilege 3916 Client.exe Token: SeDebugPrivilege 1280 Client.exe Token: SeDebugPrivilege 1148 Client.exe Token: SeDebugPrivilege 1252 Client.exe Token: SeDebugPrivilege 4108 Client.exe Token: SeDebugPrivilege 1988 Client.exe Token: SeDebugPrivilege 1164 Client.exe Token: SeDebugPrivilege 4264 Client.exe Token: SeDebugPrivilege 1948 Client.exe Token: SeDebugPrivilege 932 Client.exe Token: SeDebugPrivilege 1660 Client.exe Token: SeDebugPrivilege 4016 Client.exe Token: SeDebugPrivilege 3620 Client.exe Token: SeDebugPrivilege 1568 Client.exe Token: SeDebugPrivilege 4676 Client.exe -
Suspicious use of SetWindowsHookEx 28 IoCs
Processes:
Client.exeClient.exeClient.exeClient.exeClient.exeClient.exeClient.exeClient.exeClient.exeClient.exeClient.exeClient.exeClient.exeClient.exeClient.exeClient.exeClient.exeClient.exeClient.exeClient.exeClient.exeClient.exeClient.exeClient.exeClient.exeClient.exeClient.exeClient.exepid process 2544 Client.exe 2764 Client.exe 2860 Client.exe 3808 Client.exe 4104 Client.exe 4440 Client.exe 1788 Client.exe 2424 Client.exe 1200 Client.exe 3960 Client.exe 4788 Client.exe 3480 Client.exe 956 Client.exe 3916 Client.exe 1280 Client.exe 1148 Client.exe 1252 Client.exe 4108 Client.exe 1988 Client.exe 1164 Client.exe 4264 Client.exe 1948 Client.exe 932 Client.exe 1660 Client.exe 4016 Client.exe 3620 Client.exe 1568 Client.exe 4676 Client.exe -
Suspicious use of WriteProcessMemory 64 IoCs
Processes:
Uni - Copy (100) - Copy - Copy - Copy.exeClient.execmd.exeClient.execmd.exeClient.execmd.exeClient.execmd.exedescription pid process target process PID 1232 wrote to memory of 656 1232 Uni - Copy (100) - Copy - Copy - Copy.exe schtasks.exe PID 1232 wrote to memory of 656 1232 Uni - Copy (100) - Copy - Copy - Copy.exe schtasks.exe PID 1232 wrote to memory of 656 1232 Uni - Copy (100) - Copy - Copy - Copy.exe schtasks.exe PID 1232 wrote to memory of 2544 1232 Uni - Copy (100) - Copy - Copy - Copy.exe Client.exe PID 1232 wrote to memory of 2544 1232 Uni - Copy (100) - Copy - Copy - Copy.exe Client.exe PID 1232 wrote to memory of 2544 1232 Uni - Copy (100) - Copy - Copy - Copy.exe Client.exe PID 1232 wrote to memory of 4772 1232 Uni - Copy (100) - Copy - Copy - Copy.exe SCHTASKS.exe PID 1232 wrote to memory of 4772 1232 Uni - Copy (100) - Copy - Copy - Copy.exe SCHTASKS.exe PID 1232 wrote to memory of 4772 1232 Uni - Copy (100) - Copy - Copy - Copy.exe SCHTASKS.exe PID 2544 wrote to memory of 3380 2544 Client.exe schtasks.exe PID 2544 wrote to memory of 3380 2544 Client.exe schtasks.exe PID 2544 wrote to memory of 3380 2544 Client.exe schtasks.exe PID 2544 wrote to memory of 4776 2544 Client.exe cmd.exe PID 2544 wrote to memory of 4776 2544 Client.exe cmd.exe PID 2544 wrote to memory of 4776 2544 Client.exe cmd.exe PID 4776 wrote to memory of 672 4776 cmd.exe chcp.com PID 4776 wrote to memory of 672 4776 cmd.exe chcp.com PID 4776 wrote to memory of 672 4776 cmd.exe chcp.com PID 4776 wrote to memory of 5028 4776 cmd.exe PING.EXE PID 4776 wrote to memory of 5028 4776 cmd.exe PING.EXE PID 4776 wrote to memory of 5028 4776 cmd.exe PING.EXE PID 4776 wrote to memory of 2764 4776 cmd.exe Client.exe PID 4776 wrote to memory of 2764 4776 cmd.exe Client.exe PID 4776 wrote to memory of 2764 4776 cmd.exe Client.exe PID 2764 wrote to memory of 4100 2764 Client.exe schtasks.exe PID 2764 wrote to memory of 4100 2764 Client.exe schtasks.exe PID 2764 wrote to memory of 4100 2764 Client.exe schtasks.exe PID 2764 wrote to memory of 684 2764 Client.exe cmd.exe PID 2764 wrote to memory of 684 2764 Client.exe cmd.exe PID 2764 wrote to memory of 684 2764 Client.exe cmd.exe PID 684 wrote to memory of 1848 684 cmd.exe chcp.com PID 684 wrote to memory of 1848 684 cmd.exe chcp.com PID 684 wrote to memory of 1848 684 cmd.exe chcp.com PID 684 wrote to memory of 4280 684 cmd.exe PING.EXE PID 684 wrote to memory of 4280 684 cmd.exe PING.EXE PID 684 wrote to memory of 4280 684 cmd.exe PING.EXE PID 684 wrote to memory of 2860 684 cmd.exe Client.exe PID 684 wrote to memory of 2860 684 cmd.exe Client.exe PID 684 wrote to memory of 2860 684 cmd.exe Client.exe PID 2860 wrote to memory of 3924 2860 Client.exe schtasks.exe PID 2860 wrote to memory of 3924 2860 Client.exe schtasks.exe PID 2860 wrote to memory of 3924 2860 Client.exe schtasks.exe PID 2860 wrote to memory of 964 2860 Client.exe cmd.exe PID 2860 wrote to memory of 964 2860 Client.exe cmd.exe PID 2860 wrote to memory of 964 2860 Client.exe cmd.exe PID 964 wrote to memory of 3956 964 cmd.exe chcp.com PID 964 wrote to memory of 3956 964 cmd.exe chcp.com PID 964 wrote to memory of 3956 964 cmd.exe chcp.com PID 964 wrote to memory of 5036 964 cmd.exe PING.EXE PID 964 wrote to memory of 5036 964 cmd.exe PING.EXE PID 964 wrote to memory of 5036 964 cmd.exe PING.EXE PID 964 wrote to memory of 3808 964 cmd.exe Client.exe PID 964 wrote to memory of 3808 964 cmd.exe Client.exe PID 964 wrote to memory of 3808 964 cmd.exe Client.exe PID 3808 wrote to memory of 5084 3808 Client.exe schtasks.exe PID 3808 wrote to memory of 5084 3808 Client.exe schtasks.exe PID 3808 wrote to memory of 5084 3808 Client.exe schtasks.exe PID 3808 wrote to memory of 3564 3808 Client.exe cmd.exe PID 3808 wrote to memory of 3564 3808 Client.exe cmd.exe PID 3808 wrote to memory of 3564 3808 Client.exe cmd.exe PID 3564 wrote to memory of 4004 3564 cmd.exe chcp.com PID 3564 wrote to memory of 4004 3564 cmd.exe chcp.com PID 3564 wrote to memory of 4004 3564 cmd.exe chcp.com PID 3564 wrote to memory of 2900 3564 cmd.exe PING.EXE
Processes
-
C:\Users\Admin\AppData\Local\Temp\uni\Uni - Copy (100) - Copy - Copy - Copy.exe"C:\Users\Admin\AppData\Local\Temp\uni\Uni - Copy (100) - Copy - Copy - Copy.exe"1⤵
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\schtasks.exe"schtasks" /create /tn "SeroXen" /sc ONLOGON /tr "C:\Users\Admin\AppData\Local\Temp\uni\Uni - Copy (100) - Copy - Copy - Copy.exe" /rl HIGHEST /f2⤵
- Creates scheduled task(s)
-
C:\Users\Admin\AppData\Roaming\SubDir\Client.exe"C:\Users\Admin\AppData\Roaming\SubDir\Client.exe"2⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\schtasks.exe"schtasks" /create /tn "SeroXen" /sc ONLOGON /tr "C:\Users\Admin\AppData\Roaming\SubDir\Client.exe" /rl HIGHEST /f3⤵
- Creates scheduled task(s)
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\d0OfDxCtX5DJ.bat" "3⤵
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\chcp.comchcp 650014⤵
-
C:\Windows\SysWOW64\PING.EXEping -n 10 localhost4⤵
- Runs ping.exe
-
C:\Users\Admin\AppData\Roaming\SubDir\Client.exe"C:\Users\Admin\AppData\Roaming\SubDir\Client.exe"4⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\schtasks.exe"schtasks" /create /tn "SeroXen" /sc ONLOGON /tr "C:\Users\Admin\AppData\Roaming\SubDir\Client.exe" /rl HIGHEST /f5⤵
- Creates scheduled task(s)
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\Wblxpb7v3gMC.bat" "5⤵
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\chcp.comchcp 650016⤵
-
C:\Windows\SysWOW64\PING.EXEping -n 10 localhost6⤵
- Runs ping.exe
-
C:\Users\Admin\AppData\Roaming\SubDir\Client.exe"C:\Users\Admin\AppData\Roaming\SubDir\Client.exe"6⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\schtasks.exe"schtasks" /create /tn "SeroXen" /sc ONLOGON /tr "C:\Users\Admin\AppData\Roaming\SubDir\Client.exe" /rl HIGHEST /f7⤵
- Creates scheduled task(s)
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\N8dboL4mimEI.bat" "7⤵
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\chcp.comchcp 650018⤵
-
C:\Windows\SysWOW64\PING.EXEping -n 10 localhost8⤵
- Runs ping.exe
-
C:\Users\Admin\AppData\Roaming\SubDir\Client.exe"C:\Users\Admin\AppData\Roaming\SubDir\Client.exe"8⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\schtasks.exe"schtasks" /create /tn "SeroXen" /sc ONLOGON /tr "C:\Users\Admin\AppData\Roaming\SubDir\Client.exe" /rl HIGHEST /f9⤵
- Creates scheduled task(s)
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\Ik2TT1VhKaSr.bat" "9⤵
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\chcp.comchcp 6500110⤵
-
C:\Windows\SysWOW64\PING.EXEping -n 10 localhost10⤵
- Runs ping.exe
-
C:\Users\Admin\AppData\Roaming\SubDir\Client.exe"C:\Users\Admin\AppData\Roaming\SubDir\Client.exe"10⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
-
C:\Windows\SysWOW64\schtasks.exe"schtasks" /create /tn "SeroXen" /sc ONLOGON /tr "C:\Users\Admin\AppData\Roaming\SubDir\Client.exe" /rl HIGHEST /f11⤵
- Creates scheduled task(s)
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\piCizBy2rZrb.bat" "11⤵
-
C:\Windows\SysWOW64\chcp.comchcp 6500112⤵
-
C:\Windows\SysWOW64\PING.EXEping -n 10 localhost12⤵
- Runs ping.exe
-
C:\Users\Admin\AppData\Roaming\SubDir\Client.exe"C:\Users\Admin\AppData\Roaming\SubDir\Client.exe"12⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
-
C:\Windows\SysWOW64\schtasks.exe"schtasks" /create /tn "SeroXen" /sc ONLOGON /tr "C:\Users\Admin\AppData\Roaming\SubDir\Client.exe" /rl HIGHEST /f13⤵
- Creates scheduled task(s)
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\U9Okyp1LhEsU.bat" "13⤵
-
C:\Windows\SysWOW64\chcp.comchcp 6500114⤵
-
C:\Windows\SysWOW64\PING.EXEping -n 10 localhost14⤵
- Runs ping.exe
-
C:\Users\Admin\AppData\Roaming\SubDir\Client.exe"C:\Users\Admin\AppData\Roaming\SubDir\Client.exe"14⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
-
C:\Windows\SysWOW64\schtasks.exe"schtasks" /create /tn "SeroXen" /sc ONLOGON /tr "C:\Users\Admin\AppData\Roaming\SubDir\Client.exe" /rl HIGHEST /f15⤵
- Creates scheduled task(s)
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\VHmABSEeVohs.bat" "15⤵
-
C:\Windows\SysWOW64\chcp.comchcp 6500116⤵
-
C:\Windows\SysWOW64\PING.EXEping -n 10 localhost16⤵
- Runs ping.exe
-
C:\Users\Admin\AppData\Roaming\SubDir\Client.exe"C:\Users\Admin\AppData\Roaming\SubDir\Client.exe"16⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
-
C:\Windows\SysWOW64\schtasks.exe"schtasks" /create /tn "SeroXen" /sc ONLOGON /tr "C:\Users\Admin\AppData\Roaming\SubDir\Client.exe" /rl HIGHEST /f17⤵
- Creates scheduled task(s)
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\naNT47qc5Vhw.bat" "17⤵
-
C:\Windows\SysWOW64\chcp.comchcp 6500118⤵
-
C:\Windows\SysWOW64\PING.EXEping -n 10 localhost18⤵
- Runs ping.exe
-
C:\Users\Admin\AppData\Roaming\SubDir\Client.exe"C:\Users\Admin\AppData\Roaming\SubDir\Client.exe"18⤵
- Checks computer location settings
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
-
C:\Windows\SysWOW64\schtasks.exe"schtasks" /create /tn "SeroXen" /sc ONLOGON /tr "C:\Users\Admin\AppData\Roaming\SubDir\Client.exe" /rl HIGHEST /f19⤵
- Creates scheduled task(s)
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\UFDhXTAUy4m8.bat" "19⤵
-
C:\Windows\SysWOW64\chcp.comchcp 6500120⤵
-
C:\Windows\SysWOW64\PING.EXEping -n 10 localhost20⤵
- Runs ping.exe
-
C:\Users\Admin\AppData\Roaming\SubDir\Client.exe"C:\Users\Admin\AppData\Roaming\SubDir\Client.exe"20⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
-
C:\Windows\SysWOW64\schtasks.exe"schtasks" /create /tn "SeroXen" /sc ONLOGON /tr "C:\Users\Admin\AppData\Roaming\SubDir\Client.exe" /rl HIGHEST /f21⤵
- Creates scheduled task(s)
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\9gPiW7Dmnjn1.bat" "21⤵
-
C:\Windows\SysWOW64\chcp.comchcp 6500122⤵
-
C:\Windows\SysWOW64\PING.EXEping -n 10 localhost22⤵
- Runs ping.exe
-
C:\Users\Admin\AppData\Roaming\SubDir\Client.exe"C:\Users\Admin\AppData\Roaming\SubDir\Client.exe"22⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
-
C:\Windows\SysWOW64\schtasks.exe"schtasks" /create /tn "SeroXen" /sc ONLOGON /tr "C:\Users\Admin\AppData\Roaming\SubDir\Client.exe" /rl HIGHEST /f23⤵
- Creates scheduled task(s)
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\lAXVbESWXUna.bat" "23⤵
-
C:\Windows\SysWOW64\chcp.comchcp 6500124⤵
-
C:\Windows\SysWOW64\PING.EXEping -n 10 localhost24⤵
- Runs ping.exe
-
C:\Users\Admin\AppData\Roaming\SubDir\Client.exe"C:\Users\Admin\AppData\Roaming\SubDir\Client.exe"24⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
-
C:\Windows\SysWOW64\schtasks.exe"schtasks" /create /tn "SeroXen" /sc ONLOGON /tr "C:\Users\Admin\AppData\Roaming\SubDir\Client.exe" /rl HIGHEST /f25⤵
- Creates scheduled task(s)
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\5yHdF5fYo9hY.bat" "25⤵
-
C:\Windows\SysWOW64\chcp.comchcp 6500126⤵
-
C:\Windows\SysWOW64\PING.EXEping -n 10 localhost26⤵
- Runs ping.exe
-
C:\Users\Admin\AppData\Roaming\SubDir\Client.exe"C:\Users\Admin\AppData\Roaming\SubDir\Client.exe"26⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
-
C:\Windows\SysWOW64\schtasks.exe"schtasks" /create /tn "SeroXen" /sc ONLOGON /tr "C:\Users\Admin\AppData\Roaming\SubDir\Client.exe" /rl HIGHEST /f27⤵
- Creates scheduled task(s)
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\NHsv8lHVOqic.bat" "27⤵
-
C:\Windows\SysWOW64\chcp.comchcp 6500128⤵
-
C:\Windows\SysWOW64\PING.EXEping -n 10 localhost28⤵
- Runs ping.exe
-
C:\Users\Admin\AppData\Roaming\SubDir\Client.exe"C:\Users\Admin\AppData\Roaming\SubDir\Client.exe"28⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
-
C:\Windows\SysWOW64\schtasks.exe"schtasks" /create /tn "SeroXen" /sc ONLOGON /tr "C:\Users\Admin\AppData\Roaming\SubDir\Client.exe" /rl HIGHEST /f29⤵
- Creates scheduled task(s)
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\aVvyLTON2qMC.bat" "29⤵
-
C:\Windows\SysWOW64\chcp.comchcp 6500130⤵
-
C:\Windows\SysWOW64\PING.EXEping -n 10 localhost30⤵
- Runs ping.exe
-
C:\Users\Admin\AppData\Roaming\SubDir\Client.exe"C:\Users\Admin\AppData\Roaming\SubDir\Client.exe"30⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
-
C:\Windows\SysWOW64\schtasks.exe"schtasks" /create /tn "SeroXen" /sc ONLOGON /tr "C:\Users\Admin\AppData\Roaming\SubDir\Client.exe" /rl HIGHEST /f31⤵
- Creates scheduled task(s)
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\njy1XCVFhq0m.bat" "31⤵
-
C:\Windows\SysWOW64\chcp.comchcp 6500132⤵
-
C:\Windows\SysWOW64\PING.EXEping -n 10 localhost32⤵
- Runs ping.exe
-
C:\Users\Admin\AppData\Roaming\SubDir\Client.exe"C:\Users\Admin\AppData\Roaming\SubDir\Client.exe"32⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
-
C:\Windows\SysWOW64\schtasks.exe"schtasks" /create /tn "SeroXen" /sc ONLOGON /tr "C:\Users\Admin\AppData\Roaming\SubDir\Client.exe" /rl HIGHEST /f33⤵
- Creates scheduled task(s)
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\GcLB876vijgH.bat" "33⤵
-
C:\Windows\SysWOW64\chcp.comchcp 6500134⤵
-
C:\Windows\SysWOW64\PING.EXEping -n 10 localhost34⤵
- Runs ping.exe
-
C:\Users\Admin\AppData\Roaming\SubDir\Client.exe"C:\Users\Admin\AppData\Roaming\SubDir\Client.exe"34⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
-
C:\Windows\SysWOW64\schtasks.exe"schtasks" /create /tn "SeroXen" /sc ONLOGON /tr "C:\Users\Admin\AppData\Roaming\SubDir\Client.exe" /rl HIGHEST /f35⤵
- Creates scheduled task(s)
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\pXZdZpNpLd7M.bat" "35⤵
-
C:\Windows\SysWOW64\chcp.comchcp 6500136⤵
-
C:\Windows\SysWOW64\PING.EXEping -n 10 localhost36⤵
- Runs ping.exe
-
C:\Users\Admin\AppData\Roaming\SubDir\Client.exe"C:\Users\Admin\AppData\Roaming\SubDir\Client.exe"36⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
-
C:\Windows\SysWOW64\schtasks.exe"schtasks" /create /tn "SeroXen" /sc ONLOGON /tr "C:\Users\Admin\AppData\Roaming\SubDir\Client.exe" /rl HIGHEST /f37⤵
- Creates scheduled task(s)
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\qfx4mRa99Cvj.bat" "37⤵
-
C:\Windows\SysWOW64\chcp.comchcp 6500138⤵
-
C:\Windows\SysWOW64\PING.EXEping -n 10 localhost38⤵
- Runs ping.exe
-
C:\Users\Admin\AppData\Roaming\SubDir\Client.exe"C:\Users\Admin\AppData\Roaming\SubDir\Client.exe"38⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
-
C:\Windows\SysWOW64\schtasks.exe"schtasks" /create /tn "SeroXen" /sc ONLOGON /tr "C:\Users\Admin\AppData\Roaming\SubDir\Client.exe" /rl HIGHEST /f39⤵
- Creates scheduled task(s)
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\N52jRxFy58Tt.bat" "39⤵
-
C:\Windows\SysWOW64\chcp.comchcp 6500140⤵
-
C:\Windows\SysWOW64\PING.EXEping -n 10 localhost40⤵
- Runs ping.exe
-
C:\Users\Admin\AppData\Roaming\SubDir\Client.exe"C:\Users\Admin\AppData\Roaming\SubDir\Client.exe"40⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
-
C:\Windows\SysWOW64\schtasks.exe"schtasks" /create /tn "SeroXen" /sc ONLOGON /tr "C:\Users\Admin\AppData\Roaming\SubDir\Client.exe" /rl HIGHEST /f41⤵
- Creates scheduled task(s)
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\SmIUIyQ81Zql.bat" "41⤵
-
C:\Windows\SysWOW64\chcp.comchcp 6500142⤵
-
C:\Windows\SysWOW64\PING.EXEping -n 10 localhost42⤵
- Runs ping.exe
-
C:\Users\Admin\AppData\Roaming\SubDir\Client.exe"C:\Users\Admin\AppData\Roaming\SubDir\Client.exe"42⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
-
C:\Windows\SysWOW64\schtasks.exe"schtasks" /create /tn "SeroXen" /sc ONLOGON /tr "C:\Users\Admin\AppData\Roaming\SubDir\Client.exe" /rl HIGHEST /f43⤵
- Creates scheduled task(s)
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\uggduu1p2SVG.bat" "43⤵
-
C:\Windows\SysWOW64\chcp.comchcp 6500144⤵
-
C:\Windows\SysWOW64\PING.EXEping -n 10 localhost44⤵
- Runs ping.exe
-
C:\Users\Admin\AppData\Roaming\SubDir\Client.exe"C:\Users\Admin\AppData\Roaming\SubDir\Client.exe"44⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
-
C:\Windows\SysWOW64\schtasks.exe"schtasks" /create /tn "SeroXen" /sc ONLOGON /tr "C:\Users\Admin\AppData\Roaming\SubDir\Client.exe" /rl HIGHEST /f45⤵
- Creates scheduled task(s)
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\zNwOlwCzyss8.bat" "45⤵
-
C:\Windows\SysWOW64\chcp.comchcp 6500146⤵
-
C:\Windows\SysWOW64\PING.EXEping -n 10 localhost46⤵
- Runs ping.exe
-
C:\Users\Admin\AppData\Roaming\SubDir\Client.exe"C:\Users\Admin\AppData\Roaming\SubDir\Client.exe"46⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
-
C:\Windows\SysWOW64\schtasks.exe"schtasks" /create /tn "SeroXen" /sc ONLOGON /tr "C:\Users\Admin\AppData\Roaming\SubDir\Client.exe" /rl HIGHEST /f47⤵
- Creates scheduled task(s)
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\34DAcxM9tIF0.bat" "47⤵
-
C:\Windows\SysWOW64\chcp.comchcp 6500148⤵
-
C:\Windows\SysWOW64\PING.EXEping -n 10 localhost48⤵
- Runs ping.exe
-
C:\Users\Admin\AppData\Roaming\SubDir\Client.exe"C:\Users\Admin\AppData\Roaming\SubDir\Client.exe"48⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
-
C:\Windows\SysWOW64\schtasks.exe"schtasks" /create /tn "SeroXen" /sc ONLOGON /tr "C:\Users\Admin\AppData\Roaming\SubDir\Client.exe" /rl HIGHEST /f49⤵
- Creates scheduled task(s)
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\LNoSVdy6T0G3.bat" "49⤵
-
C:\Windows\SysWOW64\chcp.comchcp 6500150⤵
-
C:\Windows\SysWOW64\PING.EXEping -n 10 localhost50⤵
- Runs ping.exe
-
C:\Users\Admin\AppData\Roaming\SubDir\Client.exe"C:\Users\Admin\AppData\Roaming\SubDir\Client.exe"50⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
-
C:\Windows\SysWOW64\schtasks.exe"schtasks" /create /tn "SeroXen" /sc ONLOGON /tr "C:\Users\Admin\AppData\Roaming\SubDir\Client.exe" /rl HIGHEST /f51⤵
- Creates scheduled task(s)
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\eBZZ9UC8kf91.bat" "51⤵
-
C:\Windows\SysWOW64\chcp.comchcp 6500152⤵
-
C:\Windows\SysWOW64\PING.EXEping -n 10 localhost52⤵
- Runs ping.exe
-
C:\Users\Admin\AppData\Roaming\SubDir\Client.exe"C:\Users\Admin\AppData\Roaming\SubDir\Client.exe"52⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
-
C:\Windows\SysWOW64\schtasks.exe"schtasks" /create /tn "SeroXen" /sc ONLOGON /tr "C:\Users\Admin\AppData\Roaming\SubDir\Client.exe" /rl HIGHEST /f53⤵
- Creates scheduled task(s)
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\yzJgnMQ91K30.bat" "53⤵
-
C:\Windows\SysWOW64\chcp.comchcp 6500154⤵
-
C:\Windows\SysWOW64\PING.EXEping -n 10 localhost54⤵
- Runs ping.exe
-
C:\Users\Admin\AppData\Roaming\SubDir\Client.exe"C:\Users\Admin\AppData\Roaming\SubDir\Client.exe"54⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
-
C:\Windows\SysWOW64\schtasks.exe"schtasks" /create /tn "SeroXen" /sc ONLOGON /tr "C:\Users\Admin\AppData\Roaming\SubDir\Client.exe" /rl HIGHEST /f55⤵
- Creates scheduled task(s)
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\BDMjz4X2fKia.bat" "55⤵
-
C:\Windows\SysWOW64\chcp.comchcp 6500156⤵
-
C:\Windows\SysWOW64\PING.EXEping -n 10 localhost56⤵
- Runs ping.exe
-
C:\Users\Admin\AppData\Roaming\SubDir\Client.exe"C:\Users\Admin\AppData\Roaming\SubDir\Client.exe"56⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
-
C:\Windows\SysWOW64\schtasks.exe"schtasks" /create /tn "SeroXen" /sc ONLOGON /tr "C:\Users\Admin\AppData\Roaming\SubDir\Client.exe" /rl HIGHEST /f57⤵
- Creates scheduled task(s)
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1568 -s 170855⤵
- Program crash
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3620 -s 109253⤵
- Program crash
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4016 -s 224851⤵
- Program crash
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1660 -s 121249⤵
- Program crash
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 932 -s 167647⤵
- Program crash
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1948 -s 170845⤵
- Program crash
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4264 -s 218443⤵
- Program crash
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1164 -s 172441⤵
- Program crash
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1988 -s 219639⤵
- Program crash
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4108 -s 224837⤵
- Program crash
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1252 -s 109635⤵
- Program crash
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1148 -s 164033⤵
- Program crash
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1280 -s 223231⤵
- Program crash
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3916 -s 222429⤵
- Program crash
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 956 -s 224827⤵
- Program crash
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3480 -s 166425⤵
- Program crash
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4788 -s 109623⤵
- Program crash
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3960 -s 109221⤵
- Program crash
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1200 -s 169619⤵
- Program crash
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2424 -s 166817⤵
- Program crash
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1788 -s 216415⤵
- Program crash
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4440 -s 171213⤵
- Program crash
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4104 -s 170811⤵
- Program crash
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3808 -s 10889⤵
- Program crash
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2860 -s 17207⤵
- Program crash
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2764 -s 21765⤵
- Program crash
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2544 -s 21923⤵
- Program crash
-
C:\Windows\SysWOW64\SCHTASKS.exe"SCHTASKS.exe" /create /tn "$77Uni - Copy (100) - Copy - Copy - Copy.exe" /tr "'C:\Users\Admin\AppData\Local\Temp\uni\Uni - Copy (100) - Copy - Copy - Copy.exe'" /sc onlogon /rl HIGHEST2⤵
- Creates scheduled task(s)
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 408 -p 2544 -ip 25441⤵
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 512 -p 2764 -ip 27641⤵
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 364 -p 2860 -ip 28601⤵
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 388 -p 3808 -ip 38081⤵
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 520 -p 4104 -ip 41041⤵
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 532 -p 4440 -ip 44401⤵
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 364 -p 1788 -ip 17881⤵
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 472 -p 2424 -ip 24241⤵
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 496 -p 1200 -ip 12001⤵
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 508 -p 3960 -ip 39601⤵
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 364 -p 4788 -ip 47881⤵
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 468 -p 3480 -ip 34801⤵
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 520 -p 956 -ip 9561⤵
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 364 -p 3916 -ip 39161⤵
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 524 -p 1280 -ip 12801⤵
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 516 -p 1148 -ip 11481⤵
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 444 -p 1252 -ip 12521⤵
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 508 -p 4108 -ip 41081⤵
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 444 -p 1988 -ip 19881⤵
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 520 -p 1164 -ip 11641⤵
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 416 -p 4264 -ip 42641⤵
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 416 -p 1948 -ip 19481⤵
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 364 -p 932 -ip 9321⤵
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 472 -p 1660 -ip 16601⤵
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 416 -p 4016 -ip 40161⤵
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 508 -p 3620 -ip 36201⤵
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 364 -p 1568 -ip 15681⤵
Network
MITRE ATT&CK Matrix ATT&CK v13
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Local\Temp\5yHdF5fYo9hY.batFilesize
207B
MD5f5b805645db9c00af35081ca53afd07d
SHA1ba03ef9d4d8db80834ad9b121efe5ff9f6a4c408
SHA256fd4c202e87d5482d37b4220aa7221422a6b62aaa6a7650da5f6e372c5a6979d1
SHA5124abffc87f0bf7f44d92f0e07b6054aad2da2ea29877598e5b9b9e9dd1b1649d1a342004bce64b24e8842f78e9f5b43e7485db59020bdf4d3027268465c8b7d10
-
C:\Users\Admin\AppData\Local\Temp\9gPiW7Dmnjn1.batFilesize
207B
MD5606add5b3a500aa9b738c8255bb22924
SHA199ead88a4e5bfaecc610c4817aa5ac628203cc97
SHA2565470e7883109cde6db07824d3e478d467fd96bfbde2bfcb40186be75ba19fa48
SHA5122e40ed3c2a4f6585059d19f3063d7ed439f8498be6de65f6e79a316a1957a255fc9a7ca3d8cc55a444300b43a3bbe482c81e7aaeeafa92271813a52a016c81cc
-
C:\Users\Admin\AppData\Local\Temp\GcLB876vijgH.batFilesize
207B
MD585bf724415fa21b938d8b66981415675
SHA1675547f3eb24e736d861de2411b96ad3339c114e
SHA25634041a060db904d085d9fa039ca3e1588342bb51a3dedc387ea49752fa1bafb7
SHA51227719b90eef93422af684575f54830a6760a93e23a458df1afb3e259427732762f90152baebadfd7a4466dc003e5c9408615391f14cb42820cc4da9bd068b1c5
-
C:\Users\Admin\AppData\Local\Temp\Ik2TT1VhKaSr.batFilesize
207B
MD5b3dbb6b1cae1e7dbce2e87b3a8a51e18
SHA1f8dd91894c6cfc9fa555829f74f7ca5562ae6893
SHA256c580bfbae6ce455262537607aa879887939225d8d3212a7ffed67e7846fe3cbb
SHA512a70eceb99ddbc6d060fcefa3d42396cba54254ac18300b30b08f1c6b9752b171902df6d19080c6480655e554509c7cb355a58cdb75e98592b97e6b6c820fdc75
-
C:\Users\Admin\AppData\Local\Temp\N52jRxFy58Tt.batFilesize
207B
MD506e1e1638f411888ebea131d9931460a
SHA1f9ecd7a66c068a45e43769228cf7c24e4c16167a
SHA2562722d368b0cd54cf85a9fe5cbaa41c3029bad3574bf69ea11893a4503d067570
SHA512bc0b93a1da5ada78542e0d98f69501f61a922f2e23e2723b894f9b71031ddcd75904f862b9a62f3e2f88155fa2bef8e6c340c6572548d4c52a04a65467589921
-
C:\Users\Admin\AppData\Local\Temp\N8dboL4mimEI.batFilesize
207B
MD54317297fe3dbebaa55943a12fd8e4912
SHA1669ff38af185c8c3607d31c5f07c9d292ff2c47e
SHA2563efa2ed7ee7ce505a47d2098ad27d7fc3e151fd1f70d6fc5593391c325d08269
SHA51279f4d4aa83488f154473d73d6d35db9255e96ef2eed09f6371cbfb230c7160621a4cdcca51b2e872147dde0f009fabf3e0b5a826d127c5db5a5d92837cd2bb72
-
C:\Users\Admin\AppData\Local\Temp\NHsv8lHVOqic.batFilesize
207B
MD5446cf58a7eed6c9744c373299b6d2ef5
SHA13ab9e0010b1c4edbff3ae1368364712975367f5e
SHA256bdc38b8523196fd610033e4c9b82fb607d693ede378151988e1e7be62e638934
SHA512bd526009d8f0feccfb3a0d57f9e6dea354e727f70436f1e73ea746e32594bc40a1770ed7716c4b2233eec530cabada8f978646f48220f72602bfcb1e689913d6
-
C:\Users\Admin\AppData\Local\Temp\SmIUIyQ81Zql.batFilesize
207B
MD592840da3dfb39be6744e0d61b403260d
SHA1d9f8f4504a3c776c47528b3f7cde7b8f399711dd
SHA256c756d620d9095a8aec8625e345525dc04ce2357045f07262e08381aaba82c09c
SHA512675d44d150a898d381f74623819dcc06fb01760f62db220b70878caf35235f2abae4c620b3b436d30393a5e90982a8788f642d82b9e023942d2dc8d9949b42d0
-
C:\Users\Admin\AppData\Local\Temp\U9Okyp1LhEsU.batFilesize
207B
MD590521c83563d4469787aab3a207106a5
SHA176de4eab3204100e700077cdfb330004e8679c4a
SHA25635b364484a8bb203ae2d6be2e56ba8e532a18a344f387eae3425154e25d339fb
SHA512456babc3b30d3840175e1de35314a989023f1bebb1b0156c5bce2c1c91f766bdadd7e2fb4429e465c7d1353d83f8e5600cae6d61ec49fcb0fd1f230dcdc38518
-
C:\Users\Admin\AppData\Local\Temp\UFDhXTAUy4m8.batFilesize
207B
MD5cb77f0b1fa30dcc3e147640913d2b673
SHA1611c86883698f436218d7190e8cc1620e2636435
SHA25685c0771a4a48d74de7e748430e585d2ad3a7cd3d0ba29d2b285602b42073d1e9
SHA5127b1da70ff18472613e4cd916d429a844c57489a17882175dbcfbb9fd391fe3a5b1eaf8aca1ebaba2662cd530538fc441e757e8723a2085417cd5a9d614b76d8a
-
C:\Users\Admin\AppData\Local\Temp\VHmABSEeVohs.batFilesize
207B
MD52c24240a379f8a3d3dd369be19628a4c
SHA12a7be66fe2156df7cd8a89b2176fe9fc4ea6472d
SHA256e41114a6da7d8506b6698a4a96e761b0e39fd901295908f14ebce9fc37f1063c
SHA51240b1c7dea0f3cb06d1e8555da783d1ebe652ec942c3652132a14f42b506aac305c0b03da4e8dba2197cd3e09b60566e4629eb81cfc0fb3e920c1f48a59874569
-
C:\Users\Admin\AppData\Local\Temp\Wblxpb7v3gMC.batFilesize
207B
MD5efb246bafad3c49bc3e485b39b115101
SHA192cec8251689589c688336e0bda3203bf1451a5f
SHA25634ac06f791b14f1e547a951031dc2792fc3cda35c8ffe57b51dfee5e1ab11d05
SHA5124e4fa0225c90d2bcca554062b3146b340b9c4f03dc98bfbe566d9d5e09d5ed22d051011823a56a128275728799769504159fb2faad268d09facacab3f31b55f8
-
C:\Users\Admin\AppData\Local\Temp\aVvyLTON2qMC.batFilesize
207B
MD5a83a6358ed4c29be6cfad396556412f0
SHA124654baf48dba10aa13e821334be3f18d485f678
SHA2560f4517d5e72108face1b593f6617ded192da619b36933cbc5fab3c525cb02443
SHA512db941833423131b7412c4a7f4b4adf5e93d0afe252dc1a8e34470d77c215874f6c886aa5f3805d13fb47b8c7749a25c4ffc49b33ba9cdc4ef3bf4bbf5949dd54
-
C:\Users\Admin\AppData\Local\Temp\d0OfDxCtX5DJ.batFilesize
207B
MD5a84675a9877aac37cf32a26a8787809a
SHA1dd85dd1144ce8e2e1139f32692d735e508e148d2
SHA256edab949cfa8e818350636a04e7164fbb3c713bf666ab2c61025538a87c00ac69
SHA512bbd07ad5ba4a9f7703e630dc13b0d93ee9a7a052e587fe4f1cdf4635db479185733862f3798de85934601fd98c63dbb309bba211683f8ce2dd28bff83b2560a9
-
C:\Users\Admin\AppData\Local\Temp\lAXVbESWXUna.batFilesize
207B
MD5a3a9594738fb7ce024c36391862a225a
SHA1c410d71cbaeae202b98305c164c8402972270356
SHA256a7a8ef235fa821601083ff5c3b910e9fccf71f02513b8f893453818c5cf45b6a
SHA512bf2903b13074de0ab9133c256051e0ebe5712543e1a956aa680aedb566b17520ef5d6c9f5d75fc949615505d791cb4f0b85c1a6973954cba78b1f6dc37cad58c
-
C:\Users\Admin\AppData\Local\Temp\naNT47qc5Vhw.batFilesize
207B
MD5397ef4eee5a4fc92ea464b6d12427a8b
SHA1654a3a7ce30afee75952383c06bd970ead656712
SHA2567a0a78e9505968616854124e1d3c5144afd74ad604469bebcd3f8b79cac47340
SHA512b8c405b0a45a1f3c04949b1769b9e909e176fb50d87f4a62d6dc8a08744e8ae1f0cb5689006b69ddaf08cf7c823e91aef8fde034e8d8a7c5c6fb249da8ede221
-
C:\Users\Admin\AppData\Local\Temp\njy1XCVFhq0m.batFilesize
207B
MD549faba1dbddf82b18fc351e4c89aa0a4
SHA1d45891929a219cac34ec3675d341bc62c92f5bef
SHA2560c463eab4194dc84e5a441fd19c3667a90db33732426afd022cf26f37b85d9c8
SHA5122504b322fba8f8aade75bbfd1db19544007e08167ef435c10f275bf0ae8bd64aa370b088ec53900c8a9471aa4ed2424bc05f961fe62ebbb652849c57a68bc99e
-
C:\Users\Admin\AppData\Local\Temp\pXZdZpNpLd7M.batFilesize
207B
MD544b10ef9fbda7df88eb5170a47125f3a
SHA103a7cfcbab5a605c773dd549edfc422e3c024377
SHA2568ac5b3124b7b6ca0d318b63460b47326ea7226595d82864b11d7070a3d391850
SHA5120381def451f3aaabdf9f1481215d24fe50e53d1a23b4c1a7d7fc0d2a72b9c75b877888a4404e0675ff88a13d8d9648798035ca31ca5b5ea17deaf525fe96f2e9
-
C:\Users\Admin\AppData\Local\Temp\piCizBy2rZrb.batFilesize
207B
MD5e91072e5dc7814aa7a6a486df022c3e9
SHA1de4928a3fd71e7aa44d34feea3b4dfd51fe2e4a7
SHA256ba04469b33e569a9c49bfe8c10245fa1f01d47e263da8ca277174d96b4381d4d
SHA5121dfefbc9f00f6b2bf514270c05193fc2807d625ee0ae24d14886436f91a46f61294d0159eb961b124258f830e3e144a0a269bb6a88a76a09f3642c7061ed1107
-
C:\Users\Admin\AppData\Local\Temp\qfx4mRa99Cvj.batFilesize
207B
MD552b94be366a4b6e83fcc47a27a99fd6a
SHA154591967c128803b585d67f3be852b592dfde72a
SHA2569c7ac6ef4751406f182d57fb4e545c5c8c03d9b70335a4c7cc319bf065c76950
SHA512e03912fcba511a80a6136bd9a5f7825b05b5fa76585df1f8cea65616bab477cc14dfc7c731634e68648dbcf76d7c9d1ad050bec1e7fc9c222434fb54ac99f2ca
-
C:\Users\Admin\AppData\Local\Temp\uggduu1p2SVG.batFilesize
207B
MD5af481af63baa7743d55acea2ddd49723
SHA10b7d851f8383b705c1932ff94ec362daa0799099
SHA256f94765618287b327a202d1211eefbfbe6b8af16d98acc71fa97b1587fcfeba0d
SHA5128a41b0339ec7cb3e6d1a6f73780dd40ce1725b9aaa5d900c44601d0157804275c9ede55ecb56b6b79e1ef4a21218a75251bc9f70fcb2ce5c3139a49b5ffbc201
-
C:\Users\Admin\AppData\Roaming\Logs\06-15-2024Filesize
224B
MD5bffb95fde3b7f42718926bf99f2d3674
SHA195cf1b8bccb2ac67a519e6ed438972ee9dfca682
SHA256085d6280f55dd24087c8694d65d4316127792678b427f25cd2adb2906da26d2e
SHA512e054c6b64531f7ec9e3d67a3fb478dcd675a5316f753ac351fdb3111468e9a152a8b5f82cd17568184be378b49d88ae74036c0c1d103ac27f15e9c2908c32921
-
C:\Users\Admin\AppData\Roaming\Logs\06-15-2024Filesize
224B
MD571691191d57c29711fb5e398a9d721db
SHA1dd43a3449df86c6fd77bf2e541e6257e2eb29ef4
SHA256f23a9f273ebd4e54c0ce3faa847014deff17d47c6b8c10f3e8d9abb0f2bc43e5
SHA512eb8b115be54c9114da1869e60def180b9991aa302087abbd9174b1ee9c366b740a5656df94975e09a2fe05208ff4db71869a1d89f52593f7b2a2aa8a02ef1776
-
C:\Users\Admin\AppData\Roaming\Logs\06-15-2024Filesize
224B
MD51eda66d9cdedf0f115eb0d94687a557b
SHA13fee5a222df7e23fee51ec79f9bd370678ec3e73
SHA2569301351159f6130e09bfd49e40b02e50b3ad8d3165b3f23f6622624feafcb451
SHA512a6634baa0a8c1f378feea3b0009c96597e91ad418fc493f602605fb7e3a189fe90c8e3f89ab70bc10b9eea3e5bc36c76da23a500616eb82a6dce55ee2ce70533
-
C:\Users\Admin\AppData\Roaming\Logs\06-15-2024MD5
d41d8cd98f00b204e9800998ecf8427e
SHA1da39a3ee5e6b4b0d3255bfef95601890afd80709
SHA256e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855
SHA512cf83e1357eefb8bdf1542850d66d8007d620e4050b5715dc83f4a921d36ce9ce47d0d13c5d85f2b0ff8318d2877eec2f63b931bd47417a81a538327af927da3e
-
C:\Users\Admin\AppData\Roaming\Logs\06-15-2024Filesize
224B
MD553f9d61a9d9aa16a3b1627585315bfe7
SHA1e2e715a275a97443c5bb07dad3346e93846b7dd2
SHA25675a8a96f05a58eb0dd203a5af4cb933093f638b40cd17284e37bfbf07a7e464f
SHA5128193bf34637e03c111e2aadea3e7271084714f2b4e03741dac60c12cff57883151af32e4147785a58e1435d1152e732c2ba35be5f74557f1d20565abed38ba7a
-
C:\Users\Admin\AppData\Roaming\Logs\06-15-2024Filesize
224B
MD5784d15b80552313ee23a00d65e595d14
SHA1079389a4ce828b0e5eb5982693dca649a920844f
SHA256251971ef1590ec056c70ce59b0b8abb7763c38c8d9971a37d6bf0811e41b5e75
SHA512dfd97d39a468404cc382155bc70d2f63ac75b1be7bfa6da9175310c89779dcc3730c305cd7d2e5eeb559d73950118c05d8c20f8ae864ef7477a5b4e2d9e57e9d
-
C:\Users\Admin\AppData\Roaming\SubDir\Client.exeFilesize
409KB
MD5b70fdac25a99501e3cae11f1b775249e
SHA13c59226479bfdcd1b2927bcfb1a7516d4cb8dd71
SHA25651ff3eb450a786c1aaa75ff889f2fd256412a7b75d04277fdf9fcccc20e57246
SHA51243f0d5d6e5f0d5febba537c109ffdbc250bbb6e9725e635a43ec975b0353048eaeee50b6e9274cd5e072ea6b0cea32439bd37408b2528832f467f2075f74ca44
-
memory/1232-2-0x00000000054C0000-0x0000000005A64000-memory.dmpFilesize
5.6MB
-
memory/1232-1-0x0000000000460000-0x00000000004CC000-memory.dmpFilesize
432KB
-
memory/1232-3-0x0000000004FF0000-0x0000000005082000-memory.dmpFilesize
584KB
-
memory/1232-17-0x0000000074840000-0x0000000074FF0000-memory.dmpFilesize
7.7MB
-
memory/1232-8-0x0000000074840000-0x0000000074FF0000-memory.dmpFilesize
7.7MB
-
memory/1232-7-0x000000007484E000-0x000000007484F000-memory.dmpFilesize
4KB
-
memory/1232-0-0x000000007484E000-0x000000007484F000-memory.dmpFilesize
4KB
-
memory/1232-5-0x0000000005090000-0x00000000050F6000-memory.dmpFilesize
408KB
-
memory/1232-6-0x0000000005CE0000-0x0000000005CF2000-memory.dmpFilesize
72KB
-
memory/1232-4-0x0000000074840000-0x0000000074FF0000-memory.dmpFilesize
7.7MB
-
memory/2544-19-0x00000000061D0000-0x00000000061DA000-memory.dmpFilesize
40KB
-
memory/2544-14-0x0000000074840000-0x0000000074FF0000-memory.dmpFilesize
7.7MB
-
memory/2544-16-0x0000000074840000-0x0000000074FF0000-memory.dmpFilesize
7.7MB
-
memory/2544-24-0x0000000074840000-0x0000000074FF0000-memory.dmpFilesize
7.7MB