Overview
overview
10Static
static
10uni/Uni - ...py.exe
windows7-x64
10uni/Uni - ...py.exe
windows10-2004-x64
10uni/Uni - ...py.exe
windows7-x64
10uni/Uni - ...py.exe
windows10-2004-x64
10uni/Uni - ...py.exe
windows7-x64
10uni/Uni - ...py.exe
windows10-2004-x64
10uni/Uni - ...py.exe
windows7-x64
10uni/Uni - ...py.exe
windows10-2004-x64
10uni/Uni - ...py.exe
windows7-x64
10uni/Uni - ...py.exe
windows10-2004-x64
10uni/Uni - ...py.exe
windows7-x64
10uni/Uni - ...py.exe
windows10-2004-x64
10uni/Uni - ...py.exe
windows7-x64
10uni/Uni - ...py.exe
windows10-2004-x64
10uni/Uni - ...py.exe
windows7-x64
10uni/Uni - ...py.exe
windows10-2004-x64
10uni/Uni - ...py.exe
windows7-x64
10uni/Uni - ...py.exe
windows10-2004-x64
10uni/Uni - ...py.exe
windows7-x64
10uni/Uni - ...py.exe
windows10-2004-x64
10uni/Uni - ...py.exe
windows7-x64
10uni/Uni - ...py.exe
windows10-2004-x64
10uni/Uni - ...py.exe
windows7-x64
10uni/Uni - ...py.exe
windows10-2004-x64
10uni/Uni - ...py.exe
windows7-x64
10uni/Uni - ...py.exe
windows10-2004-x64
10uni/Uni - ...py.exe
windows7-x64
10uni/Uni - ...py.exe
windows10-2004-x64
10uni/Uni - ...py.exe
windows7-x64
10uni/Uni - ...py.exe
windows10-2004-x64
10uni/Uni - ...py.exe
windows7-x64
10uni/Uni - ...py.exe
windows10-2004-x64
10Analysis
-
max time kernel
591s -
max time network
608s -
platform
windows10-2004_x64 -
resource
win10v2004-20240508-en -
resource tags
arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system -
submitted
15-06-2024 07:35
Behavioral task
behavioral1
Sample
uni/Uni - Copy (10) - Copy - Copy - Copy - Copy.exe
Resource
win7-20240508-en
Behavioral task
behavioral2
Sample
uni/Uni - Copy (10) - Copy - Copy - Copy - Copy.exe
Resource
win10v2004-20240611-en
Behavioral task
behavioral3
Sample
uni/Uni - Copy (10) - Copy - Copy - Copy.exe
Resource
win7-20240611-en
Behavioral task
behavioral4
Sample
uni/Uni - Copy (10) - Copy - Copy - Copy.exe
Resource
win10v2004-20240611-en
Behavioral task
behavioral5
Sample
uni/Uni - Copy (10) - Copy - Copy.exe
Resource
win7-20240508-en
Behavioral task
behavioral6
Sample
uni/Uni - Copy (10) - Copy - Copy.exe
Resource
win10v2004-20240611-en
Behavioral task
behavioral7
Sample
uni/Uni - Copy (10) - Copy.exe
Resource
win7-20240508-en
Behavioral task
behavioral8
Sample
uni/Uni - Copy (10) - Copy.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral9
Sample
uni/Uni - Copy (100) - Copy - Copy - Copy - Copy.exe
Resource
win7-20240611-en
Behavioral task
behavioral10
Sample
uni/Uni - Copy (100) - Copy - Copy - Copy - Copy.exe
Resource
win10v2004-20240611-en
Behavioral task
behavioral11
Sample
uni/Uni - Copy (100) - Copy - Copy - Copy.exe
Resource
win7-20240508-en
Behavioral task
behavioral12
Sample
uni/Uni - Copy (100) - Copy - Copy - Copy.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral13
Sample
uni/Uni - Copy (100) - Copy - Copy.exe
Resource
win7-20240508-en
Behavioral task
behavioral14
Sample
uni/Uni - Copy (100) - Copy - Copy.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral15
Sample
uni/Uni - Copy (101) - Copy - Copy - Copy - Copy.exe
Resource
win7-20240508-en
Behavioral task
behavioral16
Sample
uni/Uni - Copy (101) - Copy - Copy - Copy - Copy.exe
Resource
win10v2004-20240611-en
Behavioral task
behavioral17
Sample
uni/Uni - Copy (101) - Copy - Copy - Copy.exe
Resource
win7-20231129-en
Behavioral task
behavioral18
Sample
uni/Uni - Copy (101) - Copy - Copy - Copy.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral19
Sample
uni/Uni - Copy (101) - Copy - Copy.exe
Resource
win7-20240611-en
Behavioral task
behavioral20
Sample
uni/Uni - Copy (101) - Copy - Copy.exe
Resource
win10v2004-20240611-en
Behavioral task
behavioral21
Sample
uni/Uni - Copy (102) - Copy - Copy - Copy.exe
Resource
win7-20240220-en
Behavioral task
behavioral22
Sample
uni/Uni - Copy (102) - Copy - Copy - Copy.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral23
Sample
uni/Uni - Copy (102) - Copy - Copy.exe
Resource
win7-20240611-en
Behavioral task
behavioral24
Sample
uni/Uni - Copy (102) - Copy - Copy.exe
Resource
win10v2004-20240611-en
Behavioral task
behavioral25
Sample
uni/Uni - Copy (103) - Copy - Copy - Copy.exe
Resource
win7-20240508-en
Behavioral task
behavioral26
Sample
uni/Uni - Copy (103) - Copy - Copy - Copy.exe
Resource
win10v2004-20240611-en
Behavioral task
behavioral27
Sample
uni/Uni - Copy (103) - Copy - Copy.exe
Resource
win7-20240508-en
Behavioral task
behavioral28
Sample
uni/Uni - Copy (103) - Copy - Copy.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral29
Sample
uni/Uni - Copy (104) - Copy - Copy - Copy.exe
Resource
win7-20240508-en
Behavioral task
behavioral30
Sample
uni/Uni - Copy (104) - Copy - Copy - Copy.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral31
Sample
uni/Uni - Copy (104) - Copy - Copy.exe
Resource
win7-20240221-en
General
-
Target
uni/Uni - Copy (101) - Copy - Copy - Copy.exe
-
Size
409KB
-
MD5
b70fdac25a99501e3cae11f1b775249e
-
SHA1
3c59226479bfdcd1b2927bcfb1a7516d4cb8dd71
-
SHA256
51ff3eb450a786c1aaa75ff889f2fd256412a7b75d04277fdf9fcccc20e57246
-
SHA512
43f0d5d6e5f0d5febba537c109ffdbc250bbb6e9725e635a43ec975b0353048eaeee50b6e9274cd5e072ea6b0cea32439bd37408b2528832f467f2075f74ca44
-
SSDEEP
12288:gpbJjGut6AoE3hVVdFaC/eZPTMTDlpgfJCKuMsVs:oVaurMLcDlpRKai
Malware Config
Extracted
quasar
3.1.5
SeroXen
panel-slave.gl.at.ply.gg:57059
panel-slave.gl.at.ply.gg:27892
$Sxr-rpL8EItHN3pqIQQVy2
-
encryption_key
Lme7VBS3l58VwLM69PNM
-
install_name
Client.exe
-
log_directory
Logs
-
reconnect_delay
3000
-
startup_key
SeroXen
-
subdirectory
SubDir
Signatures
-
Quasar payload 2 IoCs
Processes:
resource yara_rule behavioral18/memory/3532-1-0x00000000001B0000-0x000000000021C000-memory.dmp family_quasar C:\Users\Admin\AppData\Roaming\SubDir\Client.exe family_quasar -
Checks computer location settings 2 TTPs 27 IoCs
Looks up country code configured in the registry, likely geofence.
Processes:
Client.exeClient.exeClient.exeClient.exeClient.exeClient.exeClient.exeClient.exeClient.exeClient.exeClient.exeClient.exeClient.exeClient.exeClient.exeClient.exeClient.exeClient.exeClient.exeClient.exeClient.exeClient.exeClient.exeClient.exeClient.exeClient.exeClient.exedescription ioc process Key value queried \REGISTRY\USER\S-1-5-21-2539840389-1261165778-1087677076-1000\Control Panel\International\Geo\Nation Client.exe Key value queried \REGISTRY\USER\S-1-5-21-2539840389-1261165778-1087677076-1000\Control Panel\International\Geo\Nation Client.exe Key value queried \REGISTRY\USER\S-1-5-21-2539840389-1261165778-1087677076-1000\Control Panel\International\Geo\Nation Client.exe Key value queried \REGISTRY\USER\S-1-5-21-2539840389-1261165778-1087677076-1000\Control Panel\International\Geo\Nation Client.exe Key value queried \REGISTRY\USER\S-1-5-21-2539840389-1261165778-1087677076-1000\Control Panel\International\Geo\Nation Client.exe Key value queried \REGISTRY\USER\S-1-5-21-2539840389-1261165778-1087677076-1000\Control Panel\International\Geo\Nation Client.exe Key value queried \REGISTRY\USER\S-1-5-21-2539840389-1261165778-1087677076-1000\Control Panel\International\Geo\Nation Client.exe Key value queried \REGISTRY\USER\S-1-5-21-2539840389-1261165778-1087677076-1000\Control Panel\International\Geo\Nation Client.exe Key value queried \REGISTRY\USER\S-1-5-21-2539840389-1261165778-1087677076-1000\Control Panel\International\Geo\Nation Client.exe Key value queried \REGISTRY\USER\S-1-5-21-2539840389-1261165778-1087677076-1000\Control Panel\International\Geo\Nation Client.exe Key value queried \REGISTRY\USER\S-1-5-21-2539840389-1261165778-1087677076-1000\Control Panel\International\Geo\Nation Client.exe Key value queried \REGISTRY\USER\S-1-5-21-2539840389-1261165778-1087677076-1000\Control Panel\International\Geo\Nation Client.exe Key value queried \REGISTRY\USER\S-1-5-21-2539840389-1261165778-1087677076-1000\Control Panel\International\Geo\Nation Client.exe Key value queried \REGISTRY\USER\S-1-5-21-2539840389-1261165778-1087677076-1000\Control Panel\International\Geo\Nation Client.exe Key value queried \REGISTRY\USER\S-1-5-21-2539840389-1261165778-1087677076-1000\Control Panel\International\Geo\Nation Client.exe Key value queried \REGISTRY\USER\S-1-5-21-2539840389-1261165778-1087677076-1000\Control Panel\International\Geo\Nation Client.exe Key value queried \REGISTRY\USER\S-1-5-21-2539840389-1261165778-1087677076-1000\Control Panel\International\Geo\Nation Client.exe Key value queried \REGISTRY\USER\S-1-5-21-2539840389-1261165778-1087677076-1000\Control Panel\International\Geo\Nation Client.exe Key value queried \REGISTRY\USER\S-1-5-21-2539840389-1261165778-1087677076-1000\Control Panel\International\Geo\Nation Client.exe Key value queried \REGISTRY\USER\S-1-5-21-2539840389-1261165778-1087677076-1000\Control Panel\International\Geo\Nation Client.exe Key value queried \REGISTRY\USER\S-1-5-21-2539840389-1261165778-1087677076-1000\Control Panel\International\Geo\Nation Client.exe Key value queried \REGISTRY\USER\S-1-5-21-2539840389-1261165778-1087677076-1000\Control Panel\International\Geo\Nation Client.exe Key value queried \REGISTRY\USER\S-1-5-21-2539840389-1261165778-1087677076-1000\Control Panel\International\Geo\Nation Client.exe Key value queried \REGISTRY\USER\S-1-5-21-2539840389-1261165778-1087677076-1000\Control Panel\International\Geo\Nation Client.exe Key value queried \REGISTRY\USER\S-1-5-21-2539840389-1261165778-1087677076-1000\Control Panel\International\Geo\Nation Client.exe Key value queried \REGISTRY\USER\S-1-5-21-2539840389-1261165778-1087677076-1000\Control Panel\International\Geo\Nation Client.exe Key value queried \REGISTRY\USER\S-1-5-21-2539840389-1261165778-1087677076-1000\Control Panel\International\Geo\Nation Client.exe -
Executes dropped EXE 28 IoCs
Processes:
Client.exeClient.exeClient.exeClient.exeClient.exeClient.exeClient.exeClient.exeClient.exeClient.exeClient.exeClient.exeClient.exeClient.exeClient.exeClient.exeClient.exeClient.exeClient.exeClient.exeClient.exeClient.exeClient.exeClient.exeClient.exeClient.exeClient.exeClient.exepid process 1348 Client.exe 2108 Client.exe 1712 Client.exe 3136 Client.exe 3356 Client.exe 4684 Client.exe 3036 Client.exe 4044 Client.exe 724 Client.exe 3804 Client.exe 1880 Client.exe 3384 Client.exe 2520 Client.exe 3888 Client.exe 624 Client.exe 4332 Client.exe 640 Client.exe 3640 Client.exe 1036 Client.exe 544 Client.exe 4980 Client.exe 3224 Client.exe 4572 Client.exe 4628 Client.exe 3576 Client.exe 696 Client.exe 4716 Client.exe 2636 Client.exe -
Looks up external IP address via web service 27 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
Processes:
flow ioc 28 ip-api.com 57 ip-api.com 26 ip-api.com 32 ip-api.com 36 ip-api.com 59 ip-api.com 62 ip-api.com 16 ip-api.com 18 ip-api.com 20 ip-api.com 13 ip-api.com 38 ip-api.com 41 ip-api.com 22 ip-api.com 30 ip-api.com 44 ip-api.com 49 ip-api.com 34 ip-api.com 68 ip-api.com 55 ip-api.com 3 ip-api.com 11 api.ipify.org 46 ip-api.com 66 ip-api.com 24 ip-api.com 52 ip-api.com 64 ip-api.com -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Program crash 27 IoCs
Processes:
WerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exepid pid_target process target process 4012 1348 WerFault.exe Client.exe 1820 2108 WerFault.exe Client.exe 4376 1712 WerFault.exe Client.exe 1164 3136 WerFault.exe Client.exe 4432 3356 WerFault.exe Client.exe 3120 4684 WerFault.exe Client.exe 968 3036 WerFault.exe Client.exe 3540 4044 WerFault.exe Client.exe 3356 724 WerFault.exe Client.exe 2372 3804 WerFault.exe Client.exe 2232 1880 WerFault.exe Client.exe 2960 3384 WerFault.exe Client.exe 3676 2520 WerFault.exe Client.exe 364 3888 WerFault.exe Client.exe 3208 624 WerFault.exe Client.exe 1092 4332 WerFault.exe Client.exe 4492 640 WerFault.exe Client.exe 512 3640 WerFault.exe Client.exe 3144 1036 WerFault.exe Client.exe 2668 544 WerFault.exe Client.exe 2152 4980 WerFault.exe Client.exe 216 3224 WerFault.exe Client.exe 3880 4572 WerFault.exe Client.exe 1644 4628 WerFault.exe Client.exe 548 3576 WerFault.exe Client.exe 3732 696 WerFault.exe Client.exe 4396 4716 WerFault.exe Client.exe -
Creates scheduled task(s) 1 TTPs 29 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
Processes:
schtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeSCHTASKS.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exepid process 4572 schtasks.exe 1712 schtasks.exe 2756 schtasks.exe 1528 schtasks.exe 2720 schtasks.exe 228 SCHTASKS.exe 4656 schtasks.exe 4372 schtasks.exe 224 schtasks.exe 1160 schtasks.exe 2584 schtasks.exe 4364 schtasks.exe 4376 schtasks.exe 1476 schtasks.exe 1776 schtasks.exe 3928 schtasks.exe 4364 schtasks.exe 1412 schtasks.exe 4432 schtasks.exe 4436 schtasks.exe 2420 schtasks.exe 3712 schtasks.exe 4796 schtasks.exe 4332 schtasks.exe 1936 schtasks.exe 228 schtasks.exe 1828 schtasks.exe 4472 schtasks.exe 3828 schtasks.exe -
Runs ping.exe 1 TTPs 27 IoCs
Processes:
PING.EXEPING.EXEPING.EXEPING.EXEPING.EXEPING.EXEPING.EXEPING.EXEPING.EXEPING.EXEPING.EXEPING.EXEPING.EXEPING.EXEPING.EXEPING.EXEPING.EXEPING.EXEPING.EXEPING.EXEPING.EXEPING.EXEPING.EXEPING.EXEPING.EXEPING.EXEPING.EXEpid process 3576 PING.EXE 3708 PING.EXE 1436 PING.EXE 4672 PING.EXE 3216 PING.EXE 920 PING.EXE 2760 PING.EXE 1740 PING.EXE 2912 PING.EXE 4352 PING.EXE 3576 PING.EXE 3132 PING.EXE 3304 PING.EXE 2588 PING.EXE 1348 PING.EXE 4472 PING.EXE 1616 PING.EXE 5072 PING.EXE 1564 PING.EXE 1932 PING.EXE 1476 PING.EXE 2008 PING.EXE 3636 PING.EXE 2388 PING.EXE 4984 PING.EXE 676 PING.EXE 4904 PING.EXE -
Suspicious use of AdjustPrivilegeToken 29 IoCs
Processes:
Uni - Copy (101) - Copy - Copy - Copy.exeClient.exeClient.exeClient.exeClient.exeClient.exeClient.exeClient.exeClient.exeClient.exeClient.exeClient.exeClient.exeClient.exeClient.exeClient.exeClient.exeClient.exeClient.exeClient.exeClient.exeClient.exeClient.exeClient.exeClient.exeClient.exeClient.exeClient.exeClient.exedescription pid process Token: SeDebugPrivilege 3532 Uni - Copy (101) - Copy - Copy - Copy.exe Token: SeDebugPrivilege 1348 Client.exe Token: SeDebugPrivilege 2108 Client.exe Token: SeDebugPrivilege 1712 Client.exe Token: SeDebugPrivilege 3136 Client.exe Token: SeDebugPrivilege 3356 Client.exe Token: SeDebugPrivilege 4684 Client.exe Token: SeDebugPrivilege 3036 Client.exe Token: SeDebugPrivilege 4044 Client.exe Token: SeDebugPrivilege 724 Client.exe Token: SeDebugPrivilege 3804 Client.exe Token: SeDebugPrivilege 1880 Client.exe Token: SeDebugPrivilege 3384 Client.exe Token: SeDebugPrivilege 2520 Client.exe Token: SeDebugPrivilege 3888 Client.exe Token: SeDebugPrivilege 624 Client.exe Token: SeDebugPrivilege 4332 Client.exe Token: SeDebugPrivilege 640 Client.exe Token: SeDebugPrivilege 3640 Client.exe Token: SeDebugPrivilege 1036 Client.exe Token: SeDebugPrivilege 544 Client.exe Token: SeDebugPrivilege 4980 Client.exe Token: SeDebugPrivilege 3224 Client.exe Token: SeDebugPrivilege 4572 Client.exe Token: SeDebugPrivilege 4628 Client.exe Token: SeDebugPrivilege 3576 Client.exe Token: SeDebugPrivilege 696 Client.exe Token: SeDebugPrivilege 4716 Client.exe Token: SeDebugPrivilege 2636 Client.exe -
Suspicious use of SetWindowsHookEx 27 IoCs
Processes:
Client.exeClient.exeClient.exeClient.exeClient.exeClient.exeClient.exeClient.exeClient.exeClient.exeClient.exeClient.exeClient.exeClient.exeClient.exeClient.exeClient.exeClient.exeClient.exeClient.exeClient.exeClient.exeClient.exeClient.exeClient.exeClient.exeClient.exepid process 1348 Client.exe 2108 Client.exe 1712 Client.exe 3136 Client.exe 3356 Client.exe 4684 Client.exe 3036 Client.exe 4044 Client.exe 724 Client.exe 3804 Client.exe 1880 Client.exe 3384 Client.exe 2520 Client.exe 3888 Client.exe 624 Client.exe 4332 Client.exe 640 Client.exe 3640 Client.exe 1036 Client.exe 544 Client.exe 4980 Client.exe 3224 Client.exe 4572 Client.exe 4628 Client.exe 3576 Client.exe 696 Client.exe 4716 Client.exe -
Suspicious use of WriteProcessMemory 64 IoCs
Processes:
Uni - Copy (101) - Copy - Copy - Copy.exeClient.execmd.exeClient.execmd.exeClient.execmd.exeClient.execmd.exedescription pid process target process PID 3532 wrote to memory of 1412 3532 Uni - Copy (101) - Copy - Copy - Copy.exe schtasks.exe PID 3532 wrote to memory of 1412 3532 Uni - Copy (101) - Copy - Copy - Copy.exe schtasks.exe PID 3532 wrote to memory of 1412 3532 Uni - Copy (101) - Copy - Copy - Copy.exe schtasks.exe PID 3532 wrote to memory of 1348 3532 Uni - Copy (101) - Copy - Copy - Copy.exe Client.exe PID 3532 wrote to memory of 1348 3532 Uni - Copy (101) - Copy - Copy - Copy.exe Client.exe PID 3532 wrote to memory of 1348 3532 Uni - Copy (101) - Copy - Copy - Copy.exe Client.exe PID 3532 wrote to memory of 228 3532 Uni - Copy (101) - Copy - Copy - Copy.exe SCHTASKS.exe PID 3532 wrote to memory of 228 3532 Uni - Copy (101) - Copy - Copy - Copy.exe SCHTASKS.exe PID 3532 wrote to memory of 228 3532 Uni - Copy (101) - Copy - Copy - Copy.exe SCHTASKS.exe PID 1348 wrote to memory of 4432 1348 Client.exe schtasks.exe PID 1348 wrote to memory of 4432 1348 Client.exe schtasks.exe PID 1348 wrote to memory of 4432 1348 Client.exe schtasks.exe PID 1348 wrote to memory of 748 1348 Client.exe cmd.exe PID 1348 wrote to memory of 748 1348 Client.exe cmd.exe PID 1348 wrote to memory of 748 1348 Client.exe cmd.exe PID 748 wrote to memory of 4316 748 cmd.exe chcp.com PID 748 wrote to memory of 4316 748 cmd.exe chcp.com PID 748 wrote to memory of 4316 748 cmd.exe chcp.com PID 748 wrote to memory of 3216 748 cmd.exe PING.EXE PID 748 wrote to memory of 3216 748 cmd.exe PING.EXE PID 748 wrote to memory of 3216 748 cmd.exe PING.EXE PID 748 wrote to memory of 2108 748 cmd.exe Client.exe PID 748 wrote to memory of 2108 748 cmd.exe Client.exe PID 748 wrote to memory of 2108 748 cmd.exe Client.exe PID 2108 wrote to memory of 2584 2108 Client.exe schtasks.exe PID 2108 wrote to memory of 2584 2108 Client.exe schtasks.exe PID 2108 wrote to memory of 2584 2108 Client.exe schtasks.exe PID 2108 wrote to memory of 4164 2108 Client.exe cmd.exe PID 2108 wrote to memory of 4164 2108 Client.exe cmd.exe PID 2108 wrote to memory of 4164 2108 Client.exe cmd.exe PID 4164 wrote to memory of 4324 4164 cmd.exe chcp.com PID 4164 wrote to memory of 4324 4164 cmd.exe chcp.com PID 4164 wrote to memory of 4324 4164 cmd.exe chcp.com PID 4164 wrote to memory of 2588 4164 cmd.exe PING.EXE PID 4164 wrote to memory of 2588 4164 cmd.exe PING.EXE PID 4164 wrote to memory of 2588 4164 cmd.exe PING.EXE PID 4164 wrote to memory of 1712 4164 cmd.exe Client.exe PID 4164 wrote to memory of 1712 4164 cmd.exe Client.exe PID 4164 wrote to memory of 1712 4164 cmd.exe Client.exe PID 1712 wrote to memory of 4572 1712 Client.exe schtasks.exe PID 1712 wrote to memory of 4572 1712 Client.exe schtasks.exe PID 1712 wrote to memory of 4572 1712 Client.exe schtasks.exe PID 1712 wrote to memory of 3980 1712 Client.exe cmd.exe PID 1712 wrote to memory of 3980 1712 Client.exe cmd.exe PID 1712 wrote to memory of 3980 1712 Client.exe cmd.exe PID 3980 wrote to memory of 4944 3980 cmd.exe chcp.com PID 3980 wrote to memory of 4944 3980 cmd.exe chcp.com PID 3980 wrote to memory of 4944 3980 cmd.exe chcp.com PID 3980 wrote to memory of 1564 3980 cmd.exe PING.EXE PID 3980 wrote to memory of 1564 3980 cmd.exe PING.EXE PID 3980 wrote to memory of 1564 3980 cmd.exe PING.EXE PID 3980 wrote to memory of 3136 3980 cmd.exe Client.exe PID 3980 wrote to memory of 3136 3980 cmd.exe Client.exe PID 3980 wrote to memory of 3136 3980 cmd.exe Client.exe PID 3136 wrote to memory of 1776 3136 Client.exe schtasks.exe PID 3136 wrote to memory of 1776 3136 Client.exe schtasks.exe PID 3136 wrote to memory of 1776 3136 Client.exe schtasks.exe PID 3136 wrote to memory of 3808 3136 Client.exe cmd.exe PID 3136 wrote to memory of 3808 3136 Client.exe cmd.exe PID 3136 wrote to memory of 3808 3136 Client.exe cmd.exe PID 3808 wrote to memory of 3996 3808 cmd.exe chcp.com PID 3808 wrote to memory of 3996 3808 cmd.exe chcp.com PID 3808 wrote to memory of 3996 3808 cmd.exe chcp.com PID 3808 wrote to memory of 3576 3808 cmd.exe PING.EXE
Processes
-
C:\Users\Admin\AppData\Local\Temp\uni\Uni - Copy (101) - Copy - Copy - Copy.exe"C:\Users\Admin\AppData\Local\Temp\uni\Uni - Copy (101) - Copy - Copy - Copy.exe"1⤵
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\schtasks.exe"schtasks" /create /tn "SeroXen" /sc ONLOGON /tr "C:\Users\Admin\AppData\Local\Temp\uni\Uni - Copy (101) - Copy - Copy - Copy.exe" /rl HIGHEST /f2⤵
- Creates scheduled task(s)
-
C:\Users\Admin\AppData\Roaming\SubDir\Client.exe"C:\Users\Admin\AppData\Roaming\SubDir\Client.exe"2⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\schtasks.exe"schtasks" /create /tn "SeroXen" /sc ONLOGON /tr "C:\Users\Admin\AppData\Roaming\SubDir\Client.exe" /rl HIGHEST /f3⤵
- Creates scheduled task(s)
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\8xVKh48LzsYN.bat" "3⤵
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\chcp.comchcp 650014⤵
-
C:\Windows\SysWOW64\PING.EXEping -n 10 localhost4⤵
- Runs ping.exe
-
C:\Users\Admin\AppData\Roaming\SubDir\Client.exe"C:\Users\Admin\AppData\Roaming\SubDir\Client.exe"4⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\schtasks.exe"schtasks" /create /tn "SeroXen" /sc ONLOGON /tr "C:\Users\Admin\AppData\Roaming\SubDir\Client.exe" /rl HIGHEST /f5⤵
- Creates scheduled task(s)
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\Xq4jWGZiUxWy.bat" "5⤵
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\chcp.comchcp 650016⤵
-
C:\Windows\SysWOW64\PING.EXEping -n 10 localhost6⤵
- Runs ping.exe
-
C:\Users\Admin\AppData\Roaming\SubDir\Client.exe"C:\Users\Admin\AppData\Roaming\SubDir\Client.exe"6⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\schtasks.exe"schtasks" /create /tn "SeroXen" /sc ONLOGON /tr "C:\Users\Admin\AppData\Roaming\SubDir\Client.exe" /rl HIGHEST /f7⤵
- Creates scheduled task(s)
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\0Y7TZ1Qx4r42.bat" "7⤵
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\chcp.comchcp 650018⤵
-
C:\Windows\SysWOW64\PING.EXEping -n 10 localhost8⤵
- Runs ping.exe
-
C:\Users\Admin\AppData\Roaming\SubDir\Client.exe"C:\Users\Admin\AppData\Roaming\SubDir\Client.exe"8⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\schtasks.exe"schtasks" /create /tn "SeroXen" /sc ONLOGON /tr "C:\Users\Admin\AppData\Roaming\SubDir\Client.exe" /rl HIGHEST /f9⤵
- Creates scheduled task(s)
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\JMraDsezLWy1.bat" "9⤵
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\chcp.comchcp 6500110⤵
-
C:\Windows\SysWOW64\PING.EXEping -n 10 localhost10⤵
- Runs ping.exe
-
C:\Users\Admin\AppData\Roaming\SubDir\Client.exe"C:\Users\Admin\AppData\Roaming\SubDir\Client.exe"10⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
-
C:\Windows\SysWOW64\schtasks.exe"schtasks" /create /tn "SeroXen" /sc ONLOGON /tr "C:\Users\Admin\AppData\Roaming\SubDir\Client.exe" /rl HIGHEST /f11⤵
- Creates scheduled task(s)
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\dAchrks1cBsz.bat" "11⤵
-
C:\Windows\SysWOW64\chcp.comchcp 6500112⤵
-
C:\Windows\SysWOW64\PING.EXEping -n 10 localhost12⤵
- Runs ping.exe
-
C:\Users\Admin\AppData\Roaming\SubDir\Client.exe"C:\Users\Admin\AppData\Roaming\SubDir\Client.exe"12⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
-
C:\Windows\SysWOW64\schtasks.exe"schtasks" /create /tn "SeroXen" /sc ONLOGON /tr "C:\Users\Admin\AppData\Roaming\SubDir\Client.exe" /rl HIGHEST /f13⤵
- Creates scheduled task(s)
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\PBWmHX2T5W9G.bat" "13⤵
-
C:\Windows\SysWOW64\chcp.comchcp 6500114⤵
-
C:\Windows\SysWOW64\PING.EXEping -n 10 localhost14⤵
- Runs ping.exe
-
C:\Users\Admin\AppData\Roaming\SubDir\Client.exe"C:\Users\Admin\AppData\Roaming\SubDir\Client.exe"14⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
-
C:\Windows\SysWOW64\schtasks.exe"schtasks" /create /tn "SeroXen" /sc ONLOGON /tr "C:\Users\Admin\AppData\Roaming\SubDir\Client.exe" /rl HIGHEST /f15⤵
- Creates scheduled task(s)
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\Hm7v9TJ5BWgv.bat" "15⤵
-
C:\Windows\SysWOW64\chcp.comchcp 6500116⤵
-
C:\Windows\SysWOW64\PING.EXEping -n 10 localhost16⤵
- Runs ping.exe
-
C:\Users\Admin\AppData\Roaming\SubDir\Client.exe"C:\Users\Admin\AppData\Roaming\SubDir\Client.exe"16⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
-
C:\Windows\SysWOW64\schtasks.exe"schtasks" /create /tn "SeroXen" /sc ONLOGON /tr "C:\Users\Admin\AppData\Roaming\SubDir\Client.exe" /rl HIGHEST /f17⤵
- Creates scheduled task(s)
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\3rlWSTpI4jcm.bat" "17⤵
-
C:\Windows\SysWOW64\chcp.comchcp 6500118⤵
-
C:\Windows\SysWOW64\PING.EXEping -n 10 localhost18⤵
- Runs ping.exe
-
C:\Users\Admin\AppData\Roaming\SubDir\Client.exe"C:\Users\Admin\AppData\Roaming\SubDir\Client.exe"18⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
-
C:\Windows\SysWOW64\schtasks.exe"schtasks" /create /tn "SeroXen" /sc ONLOGON /tr "C:\Users\Admin\AppData\Roaming\SubDir\Client.exe" /rl HIGHEST /f19⤵
- Creates scheduled task(s)
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\hVn195zqQU04.bat" "19⤵
-
C:\Windows\SysWOW64\chcp.comchcp 6500120⤵
-
C:\Windows\SysWOW64\PING.EXEping -n 10 localhost20⤵
- Runs ping.exe
-
C:\Users\Admin\AppData\Roaming\SubDir\Client.exe"C:\Users\Admin\AppData\Roaming\SubDir\Client.exe"20⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
-
C:\Windows\SysWOW64\schtasks.exe"schtasks" /create /tn "SeroXen" /sc ONLOGON /tr "C:\Users\Admin\AppData\Roaming\SubDir\Client.exe" /rl HIGHEST /f21⤵
- Creates scheduled task(s)
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\sEgFabUeNWlk.bat" "21⤵
-
C:\Windows\SysWOW64\chcp.comchcp 6500122⤵
-
C:\Windows\SysWOW64\PING.EXEping -n 10 localhost22⤵
- Runs ping.exe
-
C:\Users\Admin\AppData\Roaming\SubDir\Client.exe"C:\Users\Admin\AppData\Roaming\SubDir\Client.exe"22⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
-
C:\Windows\SysWOW64\schtasks.exe"schtasks" /create /tn "SeroXen" /sc ONLOGON /tr "C:\Users\Admin\AppData\Roaming\SubDir\Client.exe" /rl HIGHEST /f23⤵
- Creates scheduled task(s)
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\pLFw0UXegIsE.bat" "23⤵
-
C:\Windows\SysWOW64\chcp.comchcp 6500124⤵
-
C:\Windows\SysWOW64\PING.EXEping -n 10 localhost24⤵
- Runs ping.exe
-
C:\Users\Admin\AppData\Roaming\SubDir\Client.exe"C:\Users\Admin\AppData\Roaming\SubDir\Client.exe"24⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
-
C:\Windows\SysWOW64\schtasks.exe"schtasks" /create /tn "SeroXen" /sc ONLOGON /tr "C:\Users\Admin\AppData\Roaming\SubDir\Client.exe" /rl HIGHEST /f25⤵
- Creates scheduled task(s)
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\4d2V6PzHkBCN.bat" "25⤵
-
C:\Windows\SysWOW64\chcp.comchcp 6500126⤵
-
C:\Windows\SysWOW64\PING.EXEping -n 10 localhost26⤵
- Runs ping.exe
-
C:\Users\Admin\AppData\Roaming\SubDir\Client.exe"C:\Users\Admin\AppData\Roaming\SubDir\Client.exe"26⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
-
C:\Windows\SysWOW64\schtasks.exe"schtasks" /create /tn "SeroXen" /sc ONLOGON /tr "C:\Users\Admin\AppData\Roaming\SubDir\Client.exe" /rl HIGHEST /f27⤵
- Creates scheduled task(s)
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\aXSEjM6srHwY.bat" "27⤵
-
C:\Windows\SysWOW64\chcp.comchcp 6500128⤵
-
C:\Windows\SysWOW64\PING.EXEping -n 10 localhost28⤵
- Runs ping.exe
-
C:\Users\Admin\AppData\Roaming\SubDir\Client.exe"C:\Users\Admin\AppData\Roaming\SubDir\Client.exe"28⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
-
C:\Windows\SysWOW64\schtasks.exe"schtasks" /create /tn "SeroXen" /sc ONLOGON /tr "C:\Users\Admin\AppData\Roaming\SubDir\Client.exe" /rl HIGHEST /f29⤵
- Creates scheduled task(s)
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\4wj9c7cNHPmo.bat" "29⤵
-
C:\Windows\SysWOW64\chcp.comchcp 6500130⤵
-
C:\Windows\SysWOW64\PING.EXEping -n 10 localhost30⤵
- Runs ping.exe
-
C:\Users\Admin\AppData\Roaming\SubDir\Client.exe"C:\Users\Admin\AppData\Roaming\SubDir\Client.exe"30⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
-
C:\Windows\SysWOW64\schtasks.exe"schtasks" /create /tn "SeroXen" /sc ONLOGON /tr "C:\Users\Admin\AppData\Roaming\SubDir\Client.exe" /rl HIGHEST /f31⤵
- Creates scheduled task(s)
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\pxcE2umpjj35.bat" "31⤵
-
C:\Windows\SysWOW64\chcp.comchcp 6500132⤵
-
C:\Windows\SysWOW64\PING.EXEping -n 10 localhost32⤵
- Runs ping.exe
-
C:\Users\Admin\AppData\Roaming\SubDir\Client.exe"C:\Users\Admin\AppData\Roaming\SubDir\Client.exe"32⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
-
C:\Windows\SysWOW64\schtasks.exe"schtasks" /create /tn "SeroXen" /sc ONLOGON /tr "C:\Users\Admin\AppData\Roaming\SubDir\Client.exe" /rl HIGHEST /f33⤵
- Creates scheduled task(s)
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\xfhjgg7IBy7r.bat" "33⤵
-
C:\Windows\SysWOW64\chcp.comchcp 6500134⤵
-
C:\Windows\SysWOW64\PING.EXEping -n 10 localhost34⤵
- Runs ping.exe
-
C:\Users\Admin\AppData\Roaming\SubDir\Client.exe"C:\Users\Admin\AppData\Roaming\SubDir\Client.exe"34⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
-
C:\Windows\SysWOW64\schtasks.exe"schtasks" /create /tn "SeroXen" /sc ONLOGON /tr "C:\Users\Admin\AppData\Roaming\SubDir\Client.exe" /rl HIGHEST /f35⤵
- Creates scheduled task(s)
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\1MyUXiHT6OUj.bat" "35⤵
-
C:\Windows\SysWOW64\chcp.comchcp 6500136⤵
-
C:\Windows\SysWOW64\PING.EXEping -n 10 localhost36⤵
- Runs ping.exe
-
C:\Users\Admin\AppData\Roaming\SubDir\Client.exe"C:\Users\Admin\AppData\Roaming\SubDir\Client.exe"36⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
-
C:\Windows\SysWOW64\schtasks.exe"schtasks" /create /tn "SeroXen" /sc ONLOGON /tr "C:\Users\Admin\AppData\Roaming\SubDir\Client.exe" /rl HIGHEST /f37⤵
- Creates scheduled task(s)
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\mNsZyVSvZjl0.bat" "37⤵
-
C:\Windows\SysWOW64\chcp.comchcp 6500138⤵
-
C:\Windows\SysWOW64\PING.EXEping -n 10 localhost38⤵
- Runs ping.exe
-
C:\Users\Admin\AppData\Roaming\SubDir\Client.exe"C:\Users\Admin\AppData\Roaming\SubDir\Client.exe"38⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
-
C:\Windows\SysWOW64\schtasks.exe"schtasks" /create /tn "SeroXen" /sc ONLOGON /tr "C:\Users\Admin\AppData\Roaming\SubDir\Client.exe" /rl HIGHEST /f39⤵
- Creates scheduled task(s)
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\FGFjZQ2bacRV.bat" "39⤵
-
C:\Windows\SysWOW64\chcp.comchcp 6500140⤵
-
C:\Windows\SysWOW64\PING.EXEping -n 10 localhost40⤵
- Runs ping.exe
-
C:\Users\Admin\AppData\Roaming\SubDir\Client.exe"C:\Users\Admin\AppData\Roaming\SubDir\Client.exe"40⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
-
C:\Windows\SysWOW64\schtasks.exe"schtasks" /create /tn "SeroXen" /sc ONLOGON /tr "C:\Users\Admin\AppData\Roaming\SubDir\Client.exe" /rl HIGHEST /f41⤵
- Creates scheduled task(s)
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\HSNffGbgp4uS.bat" "41⤵
-
C:\Windows\SysWOW64\chcp.comchcp 6500142⤵
-
C:\Windows\SysWOW64\PING.EXEping -n 10 localhost42⤵
- Runs ping.exe
-
C:\Users\Admin\AppData\Roaming\SubDir\Client.exe"C:\Users\Admin\AppData\Roaming\SubDir\Client.exe"42⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
-
C:\Windows\SysWOW64\schtasks.exe"schtasks" /create /tn "SeroXen" /sc ONLOGON /tr "C:\Users\Admin\AppData\Roaming\SubDir\Client.exe" /rl HIGHEST /f43⤵
- Creates scheduled task(s)
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\Iak6stp0ddjq.bat" "43⤵
-
C:\Windows\SysWOW64\chcp.comchcp 6500144⤵
-
C:\Windows\SysWOW64\PING.EXEping -n 10 localhost44⤵
- Runs ping.exe
-
C:\Users\Admin\AppData\Roaming\SubDir\Client.exe"C:\Users\Admin\AppData\Roaming\SubDir\Client.exe"44⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
-
C:\Windows\SysWOW64\schtasks.exe"schtasks" /create /tn "SeroXen" /sc ONLOGON /tr "C:\Users\Admin\AppData\Roaming\SubDir\Client.exe" /rl HIGHEST /f45⤵
- Creates scheduled task(s)
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\BBLFjp6cjdFV.bat" "45⤵
-
C:\Windows\SysWOW64\chcp.comchcp 6500146⤵
-
C:\Windows\SysWOW64\PING.EXEping -n 10 localhost46⤵
- Runs ping.exe
-
C:\Users\Admin\AppData\Roaming\SubDir\Client.exe"C:\Users\Admin\AppData\Roaming\SubDir\Client.exe"46⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
-
C:\Windows\SysWOW64\schtasks.exe"schtasks" /create /tn "SeroXen" /sc ONLOGON /tr "C:\Users\Admin\AppData\Roaming\SubDir\Client.exe" /rl HIGHEST /f47⤵
- Creates scheduled task(s)
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\wCFLAcH4ByWm.bat" "47⤵
-
C:\Windows\SysWOW64\chcp.comchcp 6500148⤵
-
C:\Windows\SysWOW64\PING.EXEping -n 10 localhost48⤵
- Runs ping.exe
-
C:\Users\Admin\AppData\Roaming\SubDir\Client.exe"C:\Users\Admin\AppData\Roaming\SubDir\Client.exe"48⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
-
C:\Windows\SysWOW64\schtasks.exe"schtasks" /create /tn "SeroXen" /sc ONLOGON /tr "C:\Users\Admin\AppData\Roaming\SubDir\Client.exe" /rl HIGHEST /f49⤵
- Creates scheduled task(s)
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\G00SoTU6SdQk.bat" "49⤵
-
C:\Windows\SysWOW64\chcp.comchcp 6500150⤵
-
C:\Windows\SysWOW64\PING.EXEping -n 10 localhost50⤵
- Runs ping.exe
-
C:\Users\Admin\AppData\Roaming\SubDir\Client.exe"C:\Users\Admin\AppData\Roaming\SubDir\Client.exe"50⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
-
C:\Windows\SysWOW64\schtasks.exe"schtasks" /create /tn "SeroXen" /sc ONLOGON /tr "C:\Users\Admin\AppData\Roaming\SubDir\Client.exe" /rl HIGHEST /f51⤵
- Creates scheduled task(s)
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\KhGDfVfGO3nc.bat" "51⤵
-
C:\Windows\SysWOW64\chcp.comchcp 6500152⤵
-
C:\Windows\SysWOW64\PING.EXEping -n 10 localhost52⤵
- Runs ping.exe
-
C:\Users\Admin\AppData\Roaming\SubDir\Client.exe"C:\Users\Admin\AppData\Roaming\SubDir\Client.exe"52⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
-
C:\Windows\SysWOW64\schtasks.exe"schtasks" /create /tn "SeroXen" /sc ONLOGON /tr "C:\Users\Admin\AppData\Roaming\SubDir\Client.exe" /rl HIGHEST /f53⤵
- Creates scheduled task(s)
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\DMcsQeIduwzr.bat" "53⤵
-
C:\Windows\SysWOW64\chcp.comchcp 6500154⤵
-
C:\Windows\SysWOW64\PING.EXEping -n 10 localhost54⤵
- Runs ping.exe
-
C:\Users\Admin\AppData\Roaming\SubDir\Client.exe"C:\Users\Admin\AppData\Roaming\SubDir\Client.exe"54⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
-
C:\Windows\SysWOW64\schtasks.exe"schtasks" /create /tn "SeroXen" /sc ONLOGON /tr "C:\Users\Admin\AppData\Roaming\SubDir\Client.exe" /rl HIGHEST /f55⤵
- Creates scheduled task(s)
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\pm09cYBcDnJq.bat" "55⤵
-
C:\Windows\SysWOW64\chcp.comchcp 6500156⤵
-
C:\Windows\SysWOW64\PING.EXEping -n 10 localhost56⤵
- Runs ping.exe
-
C:\Users\Admin\AppData\Roaming\SubDir\Client.exe"C:\Users\Admin\AppData\Roaming\SubDir\Client.exe"56⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4716 -s 168855⤵
- Program crash
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 696 -s 167253⤵
- Program crash
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3576 -s 109651⤵
- Program crash
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4628 -s 108449⤵
- Program crash
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4572 -s 109247⤵
- Program crash
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3224 -s 109645⤵
- Program crash
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4980 -s 171643⤵
- Program crash
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 544 -s 108841⤵
- Program crash
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1036 -s 160839⤵
- Program crash
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3640 -s 168837⤵
- Program crash
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 640 -s 109635⤵
- Program crash
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4332 -s 223633⤵
- Program crash
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 624 -s 109231⤵
- Program crash
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3888 -s 109229⤵
- Program crash
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2520 -s 167227⤵
- Program crash
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3384 -s 223225⤵
- Program crash
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1880 -s 109223⤵
- Program crash
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3804 -s 109621⤵
- Program crash
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 724 -s 223219⤵
- Program crash
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4044 -s 109617⤵
- Program crash
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3036 -s 170815⤵
- Program crash
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4684 -s 109213⤵
- Program crash
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3356 -s 109211⤵
- Program crash
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3136 -s 17089⤵
- Program crash
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1712 -s 10887⤵
- Program crash
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2108 -s 16445⤵
- Program crash
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1348 -s 16563⤵
- Program crash
-
C:\Windows\SysWOW64\SCHTASKS.exe"SCHTASKS.exe" /create /tn "$77Uni - Copy (101) - Copy - Copy - Copy.exe" /tr "'C:\Users\Admin\AppData\Local\Temp\uni\Uni - Copy (101) - Copy - Copy - Copy.exe'" /sc onlogon /rl HIGHEST2⤵
- Creates scheduled task(s)
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 408 -p 1348 -ip 13481⤵
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 500 -p 2108 -ip 21081⤵
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 512 -p 1712 -ip 17121⤵
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 508 -p 3136 -ip 31361⤵
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 404 -p 3356 -ip 33561⤵
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 520 -p 4684 -ip 46841⤵
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 404 -p 3036 -ip 30361⤵
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 464 -p 4044 -ip 40441⤵
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 480 -p 724 -ip 7241⤵
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 532 -p 3804 -ip 38041⤵
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 480 -p 1880 -ip 18801⤵
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 384 -p 3384 -ip 33841⤵
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 384 -p 2520 -ip 25201⤵
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 428 -p 3888 -ip 38881⤵
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 404 -p 624 -ip 6241⤵
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 404 -p 4332 -ip 43321⤵
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 404 -p 640 -ip 6401⤵
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 532 -p 3640 -ip 36401⤵
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 480 -p 1036 -ip 10361⤵
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 540 -p 544 -ip 5441⤵
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 520 -p 4980 -ip 49801⤵
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 512 -p 3224 -ip 32241⤵
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 492 -p 4572 -ip 45721⤵
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 540 -p 4628 -ip 46281⤵
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 512 -p 3576 -ip 35761⤵
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 516 -p 696 -ip 6961⤵
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 480 -p 4716 -ip 47161⤵
Network
MITRE ATT&CK Matrix ATT&CK v13
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Local\Temp\0Y7TZ1Qx4r42.batFilesize
207B
MD5c5cdb812db7c5f95a4df7f882d54e92f
SHA19357bd13d520e91b8f8a2815eec808d9ee2fa62e
SHA2560dd1c2c6df9d0d2615914692cb825a9c8032101902d4a161d60e32766132c3e1
SHA5127c7be5905a858b7d83603469848decd5cf9e5f830bbf4be678c483524ccc01faeeebdf348820e7d6200cf1d5800d4b2af0a29057f43144da8ce30eba35946f93
-
C:\Users\Admin\AppData\Local\Temp\1MyUXiHT6OUj.batFilesize
207B
MD5c16ac140d242fe2fe8c42fafcb49611d
SHA15a4bf4b2bf54bb7c5028b5dba609f83dffe4fc0f
SHA2562ab0b3327c98bd31a73cce0eb92caee2562fc760de0d5690ea4c5d1417b3b294
SHA512172ba70e2b3bf7ee4a1b147990c9bbda93452bf6d0da9101450fb0bef00ac13ce8b4b48368a9112bac4baf93f7e588903d2a79a672d29b9a5bf7d5d04eb57075
-
C:\Users\Admin\AppData\Local\Temp\3rlWSTpI4jcm.batFilesize
207B
MD56649eba1f09647d86aa0c876ee69893c
SHA13c648f2cb004905bb7107b4ec1a910ea2bd570e4
SHA256aa2245334d08a15d4c504a0a599e1d6ce97e03d47d458dfd91dbb95dbf54b7ad
SHA51251c8e6a0a5d8da9483065c14d39c49b2e5c3369ad6ced4fbe6f188dc313d3b7fd4a64dc9baaef6fb409ca71691623a0418576007b179b9df4ebe0507634e39d0
-
C:\Users\Admin\AppData\Local\Temp\4d2V6PzHkBCN.batFilesize
207B
MD5f7dd8f696ad07af4f6978b1aa8790d1e
SHA1487a1a49a603fc0e077b5457cb3f3bf6c9cb6e26
SHA2562960d711b1e179e1254487c2e8350bee9be850f70006635154f0b7e099852b2a
SHA5125bae2e1b350bf99023762e2d8eb13e562406ee3754edb0ec01a31af1c1670de29634273c41ef046b82740c18a1fbd658bc435b9370bf294cdaabbe929242d39a
-
C:\Users\Admin\AppData\Local\Temp\4wj9c7cNHPmo.batFilesize
207B
MD5bb4818bf5607c8149aa7035744c4e653
SHA126d5cbc9fc8db0a9d5fc87ae7d95b3fab74d5c1e
SHA256b717413d605f3cffd8b6aea9341bce0e9e37c36e8f3a47c98d493b3d2e5e829e
SHA512c755ed84cb1629a7b26b9a4b93b25ecfbbc6d375d45abba365dc025a96e5130f3c1c3dd5aa602224ed759d5227ce215d429190721958947b1ad95a5457a64ec3
-
C:\Users\Admin\AppData\Local\Temp\8xVKh48LzsYN.batFilesize
207B
MD52fb77a7eb41730ecb635bdfe3be20046
SHA154adb844ace55d034939a3379ee530e83f331508
SHA256ce58350087d5852d1fa8b7f7b133ab97cb83c866aaa3f74092b87d036a112fb0
SHA51294aac8c90f1af86226d5ae34552da35a27eb70abc39169ec4b6554df2e422b3b99cad32cd2b7bfd4ea414ead12855e9ebb1d2eee7b272c1fb2d1267f7f8f31a7
-
C:\Users\Admin\AppData\Local\Temp\FGFjZQ2bacRV.batFilesize
207B
MD591989aab96c9d146e36cc386e5d796e0
SHA14a726d488a7bb2f40f936bfebe7acc8808488d5b
SHA256ec338047be3267d4e11c301a2e1d10ffe5d25e491ddb918845ff02367c50a388
SHA512c190a7974bda4293b966ea96a0413866b27767f72e50fb20ae07a1a9572ab69cc00b60901482eec583d1d401cc7d1435581e5f8065d48644b8bcbb66958e3a72
-
C:\Users\Admin\AppData\Local\Temp\HSNffGbgp4uS.batFilesize
207B
MD5f606f6c99541ee547dfe192091bb7800
SHA11d660a6dd5ebb05d5efd1ddc10e3fdc10b34f255
SHA25617020724dc2feed0dc0de2027e3846735416cde4b663265ef163a79ef95cfdc0
SHA51253fcbfceb236b242054eec60db9eb9e94b086f114cb49ee0a7a7752119952e548537562c0293cc025f85899ab05eba8b858568820a6b27eee154f8a796b9347f
-
C:\Users\Admin\AppData\Local\Temp\Hm7v9TJ5BWgv.batFilesize
207B
MD5597f27b309833032c88b4dc42db8a08b
SHA1ef26db2702d7c9eb6cdb7085e2226807979dc83c
SHA256f8d881a10f0ba3df9c8f6cea962950a000b5cb5e6f4ce40c668fc0acf3004eec
SHA512b89c50d588d29087ae2797201fd306ae174c0db16e07390e14a0f3234241bbfcf5df37ae104d492f873181d85e0475d0c7393ebe1df260f86a6e4c4b3f7c08d9
-
C:\Users\Admin\AppData\Local\Temp\Iak6stp0ddjq.batFilesize
207B
MD564c378f3bd607eca0170320ec28b00d5
SHA1aa2f32f16d952e98a916719ac1356497c7a21a08
SHA256b9859cdd8dae1fe180fee3fe9762b242782285308401593741063290fe8c5675
SHA512ec63f4b452812b17a132b8561b5f81ed65b746c63b6bdddb7e84169f7d12ece42dd025ffe8611c2103ec3c29042ea07445bd46ba2df8f9b39a0d8c038c67fca6
-
C:\Users\Admin\AppData\Local\Temp\JMraDsezLWy1.batFilesize
207B
MD51549b9d6732d09bdb5dfc12edc086f71
SHA195cb59810c885d8612e76f583cacd8c054738486
SHA2562008f5beac9a3d4e63b798679b23a7f4d66bb1c4ba08bbf3378b483d2c534f52
SHA5121258bd61de98c22877cacd445b6e3fa6790858941190590735a0fdf6b14aa41cfd6ebdac6145571ee8f56f25ed9c2518381859409f8399e8b2cefe376e2ff5b3
-
C:\Users\Admin\AppData\Local\Temp\PBWmHX2T5W9G.batFilesize
207B
MD5319c30a4359aa5f880ff6d290336af37
SHA19b577b03903b2fbb97e4eff4d6342270bcae0831
SHA25667de5b0729d70b09d40b28db38aeb2c2e1bc3e8802899763841a8ffccf39a68e
SHA512fcd2c7172739bbfd0a4cf11c89ad644bc10e74c58a75f49e4f4c59383660699c41b4dff2bf8bcf96bbf9b315ce7bb6fadce3a66dd41440aae32a0cbc24bd602f
-
C:\Users\Admin\AppData\Local\Temp\Xq4jWGZiUxWy.batFilesize
207B
MD5034432c4aab8b76f236581376e9dc35a
SHA19ab1b728419e2bd7f43ecd91a7fecba85cdbc349
SHA25623c245d3d0ef4aaa162c358c4fc2df87fc5985e62fb640281bde4fc8c7546faa
SHA512e3138db589f17ae7d50eae4a7d2116ea29e965231d14f3b7924bfa0f6a18aa1444b2b883172d79abacd82e62133d62d0fbe6a70e9ae1fbc1a02a1df4ca98eff8
-
C:\Users\Admin\AppData\Local\Temp\aXSEjM6srHwY.batFilesize
207B
MD5a0a8d9fed42c27c36af850465bde9279
SHA1ee50ed9d6a55c0a6143bb17ff87d74f4bbdb84d7
SHA256567bc429e2e07482c899b76468ae31e096263075fd671f87489b585c40ddb6c7
SHA51280ad9a9e89a9ecfb75210555d92f02030c61c3d1b9690a6be3e20bfaf13a7afcfb812cd2dd410bcc93aa19c0cab664a0aabf9282d8e19eb88676b3f424d6edd3
-
C:\Users\Admin\AppData\Local\Temp\dAchrks1cBsz.batFilesize
207B
MD549a05ab9d9ee7e37d36d2f147ae63d51
SHA149a7544639b06d30d0c7347f0cf55c84016ae2f0
SHA256abe58eb8e11f0dc8505b97de56fc14e30c5a96ba3298a2c0025c3cb7e9cc8eed
SHA5129c12e7308d0ce686927b71519b6c21cc498e28e59f0bdb9af0692b0ab3a549d505876187f3e411d561d769a401245acee9269e05fd63478f579e8679339a88c1
-
C:\Users\Admin\AppData\Local\Temp\hVn195zqQU04.batFilesize
207B
MD5a1ecc3acbe7d7efecc4340e727148b02
SHA1e4c957549d1003aaed4a443d1e9b3a67bcf48767
SHA2565026597f2de6e4587fd544b595acba6abec1cefcfd6a1f56a52d373c3376ba92
SHA512fdee1a331e0dbe1010d4f16eb67826a67ebf43ff8ba5e16cd7c059042d0cd531314a2247d01cd23f55de977e9254b5b1b3a4a430a4a4a5fd12fcb92c4675efbe
-
C:\Users\Admin\AppData\Local\Temp\mNsZyVSvZjl0.batFilesize
207B
MD5073d8ec8b35206dbb53578611bc7bc5c
SHA122b70a44c5294682ca12a9327cccf691e1436c69
SHA25695efaac2f215bfdff7442e031aad2a6d03a49d1787fd1f8e37b39c66cd161637
SHA512f69d9c548bdb18f6721c2010309b98f26aa1d9a5ce412afd166a67314bbf892f88b97e8c1e50a6a5a7ede81f7ae8d259c8156d2ded60d8a6d367b19173f35c79
-
C:\Users\Admin\AppData\Local\Temp\pLFw0UXegIsE.batFilesize
207B
MD54ff43a18e6545bf4d053eda478584ebc
SHA1840acc065ef9bde16f9b85475c6bd5b2ad4f121c
SHA256350689e461ad84b1841491d2246ea32fbb330e9696ee94353ee4e8e6c9252672
SHA51269e7a88e6c4885fd485521dd9a0578a118857a81a60150b91addc7a56acb940fbfa53c5f246d549df9af5f7f649e51cd466921bc5d86db3e60189f17fff8c14e
-
C:\Users\Admin\AppData\Local\Temp\pxcE2umpjj35.batFilesize
207B
MD51a53885a671bcf101f750552154d3ef4
SHA10a326b01b3de9883b64e321f2ae2a9c7d628a061
SHA2568f883694ea499e213da8e6ed720a7bd83011345ebc248f5365324deb932a3e7e
SHA5120da7a58f9951f2b4597845a40f2d219242aead6f95a05cdc2697069f6bb59f2f6dc4b6d3d6b42829c547509c8206cad7fbad544d0489c32f3343b162b941d93a
-
C:\Users\Admin\AppData\Local\Temp\sEgFabUeNWlk.batFilesize
207B
MD5df91acd44e98c114c832cd63061646d8
SHA17c889c3c51bd79cac904759869a8210eea320049
SHA256d5685a6c19d3fc8fd4f82ac2bf94e73ce28ae0f5f563c7d0fecf4bba8483672d
SHA51289400a1570bed6f05ea531c8fafead52997b7aaa92b48ce93017a8a6f7eb28252c21011741d876aa770bdd318eb2e55b65f506c28ceaded2e71afeb6260ba949
-
C:\Users\Admin\AppData\Local\Temp\xfhjgg7IBy7r.batFilesize
207B
MD5f1be9c4222ab54dd94966556ac68b5e8
SHA1b6b5be3bb05f5febf96c06e0437c53116123420a
SHA25613452919c5e10dd5c961b79f81a4d9b6a9e2f75655e483d0425890297293379e
SHA5124bb6d02b3a89f5b2a0b7a70bf48b4bdd9a980dc51c854b6c280538d176462876c629abac748a09270d6f250b132852acaa867efc85edfd5ae2a5e20b7d524292
-
C:\Users\Admin\AppData\Roaming\Logs\06-15-2024Filesize
224B
MD55257121c0fcad93affd93a083cd7c543
SHA196c1487c34c7eea41be4205c4d9c37b7de727152
SHA2566ca2b7f90daedc4ca1b57c4865192c3b5f156fd286078df0e1a9a8657961ff7e
SHA512d9b795667738b48fe8d477860683418b64f268dd1284f8397bf092552a378339261078f8ed3bbd2c35bbcba2dfdda47a5ba53e8a97ddf4c3bd1b9d0160f68ba9
-
C:\Users\Admin\AppData\Roaming\Logs\06-15-2024Filesize
224B
MD5a8f782bf8cf6732d162c3e212d341f1b
SHA1ff8e342b0341c663c04f7aa8e4cebbc9f878b1a9
SHA256bc7ac75f6c88fdc41f6a3aec455241925ede7e714aa4dc3bb4444894803dab99
SHA512b0aad21040fc2695a707dea51f864007594d2b5a0bb56514f39fdbdebc129c998358079b32d146654a51afa3a7226e20f8fc8f57b8382b4927dedb5c2d0df195
-
C:\Users\Admin\AppData\Roaming\Logs\06-15-2024Filesize
224B
MD5d1c6747e8edef6a2d34e19d4e4646886
SHA154a1f2df5720472af05adfeb20b908b959a50697
SHA256b008ad933c010486f5fdab9c2c2976db2206a5cd6d70798b14350dfc967ca27e
SHA5126b2b3ef3182855b3e1ce558959d573921062ae40d3398eb6b7434db06bb87941bd1a7394d90dac4e23f90b9d2f7966c683de62e2dfb52205c0882e1f9a948760
-
C:\Users\Admin\AppData\Roaming\Logs\06-15-2024Filesize
224B
MD5e38e0b0856f2f6655f0075afe892f17e
SHA153e5377bd397f6d1bf096e92a0fde5c75f371042
SHA25652a1d86e0e5645d81f00d63aa7d6419bc42d8f1bf58438bbe1fae2ca97d50aed
SHA512a793a7a64d4643563e08ed9a62c64f40c07f66e06c506726161c7badd6474bb833df6f6edddea94d2738e8f1faf2d5880a7c8b99ae84020ee19b4837117e39f1
-
C:\Users\Admin\AppData\Roaming\Logs\06-15-2024Filesize
224B
MD561375e3b5150c9d0974fee19cd7fdf34
SHA1cc14c07103e471e1eca4c5f944a1981e7b7fc752
SHA256b342a9a01a69f83a6811da6fbc6e2e003b798f2d979631456ff9a21388703741
SHA5121f9a64e32b17a3fb761adcc042015b4fbddf6e7fcae7a4e7562d97bade5b4f0bc5bfd5e2ad24b03bb58b1faf2a6df66810fa4c82f9dfd3461fbae9985833cdea
-
C:\Users\Admin\AppData\Roaming\Logs\06-15-2024Filesize
224B
MD5789ab233d652a44799a2d47be8aae68f
SHA106488a4ea820724d459a59d6dac855b3743090e6
SHA25665291c42e90b1fae1a56d83bccccb4fa652ef8624852162fe522af8d7ef6d2e0
SHA5123cc2f37d09164379a4b2220ef0dae1d8a717fe242e1ec7ad5c85d868330baf150aed73ae07c237ca504673f151bbb2e0efd67688e554ac21392569a36fdf5ebf
-
C:\Users\Admin\AppData\Roaming\Logs\06-15-2024MD5
d41d8cd98f00b204e9800998ecf8427e
SHA1da39a3ee5e6b4b0d3255bfef95601890afd80709
SHA256e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855
SHA512cf83e1357eefb8bdf1542850d66d8007d620e4050b5715dc83f4a921d36ce9ce47d0d13c5d85f2b0ff8318d2877eec2f63b931bd47417a81a538327af927da3e
-
C:\Users\Admin\AppData\Roaming\Logs\06-15-2024Filesize
224B
MD5550defdc406882950ff92a966a0c0349
SHA188cc02a23efc904b0398372606170fb85bc82137
SHA256f282a9a6f41c61f5f392fce0c2bd1dcd1cc769f9f9e2df65874cf9fed92bd4e1
SHA512c64c92e14700a8b8346cb4bcab39fc12a7c765bb1280ba8f0bd137f35716ff08c144f9cc8ab3f16f40327af88233dc01e858ca1a950fc1829cd013b0e6833716
-
C:\Users\Admin\AppData\Roaming\Logs\06-15-2024Filesize
224B
MD5a645fe501d50bfe3a79b7d9cd3c15905
SHA1cd10be40c4edda3ffa09c5ea4ed9d0c7523f3052
SHA25600b94e0a66535f13ed3855d21c3ac321c61c8fe9bd61c0d5ff1533c39977c0db
SHA512ccf9b2bedf207d9377902fd9808c104d39aa09bd06072ab232832ceee1cebe70bf9d4a104032926dbc4f1772be46b2f927e829930ca2a158dbbd55a637ae86f5
-
C:\Users\Admin\AppData\Roaming\Logs\06-15-2024Filesize
224B
MD55ed09496a054e37734f32547cb56522d
SHA1cc86e2095755cfe03476a658e64f8408c774b864
SHA256f65ec7edb28fc084584dd5322d55f33c21e492af5f39d3fe91346e7cc36c36de
SHA512808af52fd413c1ce8af46c4dcfa8b8260e016b7d90f560afd9f1a0dd6d759583acd20befd981b8c5bbfef0da98c645dd16b42bebab812f7e8e309ff28302e70d
-
C:\Users\Admin\AppData\Roaming\SubDir\Client.exeFilesize
409KB
MD5b70fdac25a99501e3cae11f1b775249e
SHA13c59226479bfdcd1b2927bcfb1a7516d4cb8dd71
SHA25651ff3eb450a786c1aaa75ff889f2fd256412a7b75d04277fdf9fcccc20e57246
SHA51243f0d5d6e5f0d5febba537c109ffdbc250bbb6e9725e635a43ec975b0353048eaeee50b6e9274cd5e072ea6b0cea32439bd37408b2528832f467f2075f74ca44
-
memory/1348-19-0x0000000006B20000-0x0000000006B2A000-memory.dmpFilesize
40KB
-
memory/1348-24-0x0000000074E60000-0x0000000075610000-memory.dmpFilesize
7.7MB
-
memory/1348-15-0x0000000074E60000-0x0000000075610000-memory.dmpFilesize
7.7MB
-
memory/1348-16-0x0000000074E60000-0x0000000075610000-memory.dmpFilesize
7.7MB
-
memory/3532-8-0x0000000074E60000-0x0000000075610000-memory.dmpFilesize
7.7MB
-
memory/3532-5-0x0000000004DD0000-0x0000000004E36000-memory.dmpFilesize
408KB
-
memory/3532-6-0x0000000005A30000-0x0000000005A42000-memory.dmpFilesize
72KB
-
memory/3532-4-0x0000000074E60000-0x0000000075610000-memory.dmpFilesize
7.7MB
-
memory/3532-7-0x0000000074E6E000-0x0000000074E6F000-memory.dmpFilesize
4KB
-
memory/3532-17-0x0000000074E60000-0x0000000075610000-memory.dmpFilesize
7.7MB
-
memory/3532-0-0x0000000074E6E000-0x0000000074E6F000-memory.dmpFilesize
4KB
-
memory/3532-3-0x0000000004D30000-0x0000000004DC2000-memory.dmpFilesize
584KB
-
memory/3532-2-0x0000000005240000-0x00000000057E4000-memory.dmpFilesize
5.6MB
-
memory/3532-1-0x00000000001B0000-0x000000000021C000-memory.dmpFilesize
432KB