Overview
overview
10Static
static
10uni/Uni - ...py.exe
windows7-x64
10uni/Uni - ...py.exe
windows10-2004-x64
10uni/Uni - ...py.exe
windows7-x64
10uni/Uni - ...py.exe
windows10-2004-x64
10uni/Uni - ...py.exe
windows7-x64
10uni/Uni - ...py.exe
windows10-2004-x64
10uni/Uni - ...py.exe
windows7-x64
10uni/Uni - ...py.exe
windows10-2004-x64
10uni/Uni - ...py.exe
windows7-x64
10uni/Uni - ...py.exe
windows10-2004-x64
10uni/Uni - ...py.exe
windows7-x64
10uni/Uni - ...py.exe
windows10-2004-x64
10uni/Uni - ...py.exe
windows7-x64
10uni/Uni - ...py.exe
windows10-2004-x64
10uni/Uni - ...py.exe
windows7-x64
10uni/Uni - ...py.exe
windows10-2004-x64
10uni/Uni - ...py.exe
windows7-x64
10uni/Uni - ...py.exe
windows10-2004-x64
10uni/Uni - ...py.exe
windows7-x64
10uni/Uni - ...py.exe
windows10-2004-x64
10uni/Uni - ...py.exe
windows7-x64
10uni/Uni - ...py.exe
windows10-2004-x64
10uni/Uni - ...py.exe
windows7-x64
10uni/Uni - ...py.exe
windows10-2004-x64
10uni/Uni - ...py.exe
windows7-x64
10uni/Uni - ...py.exe
windows10-2004-x64
10uni/Uni - ...py.exe
windows7-x64
10uni/Uni - ...py.exe
windows10-2004-x64
10uni/Uni - ...py.exe
windows7-x64
10uni/Uni - ...py.exe
windows10-2004-x64
10uni/Uni - ...py.exe
windows7-x64
10uni/Uni - ...py.exe
windows10-2004-x64
10Analysis
-
max time kernel
598s -
max time network
606s -
platform
windows10-2004_x64 -
resource
win10v2004-20240508-en -
resource tags
arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system -
submitted
15-06-2024 07:35
Behavioral task
behavioral1
Sample
uni/Uni - Copy (10) - Copy - Copy - Copy - Copy.exe
Resource
win7-20240508-en
Behavioral task
behavioral2
Sample
uni/Uni - Copy (10) - Copy - Copy - Copy - Copy.exe
Resource
win10v2004-20240611-en
Behavioral task
behavioral3
Sample
uni/Uni - Copy (10) - Copy - Copy - Copy.exe
Resource
win7-20240611-en
Behavioral task
behavioral4
Sample
uni/Uni - Copy (10) - Copy - Copy - Copy.exe
Resource
win10v2004-20240611-en
Behavioral task
behavioral5
Sample
uni/Uni - Copy (10) - Copy - Copy.exe
Resource
win7-20240508-en
Behavioral task
behavioral6
Sample
uni/Uni - Copy (10) - Copy - Copy.exe
Resource
win10v2004-20240611-en
Behavioral task
behavioral7
Sample
uni/Uni - Copy (10) - Copy.exe
Resource
win7-20240508-en
Behavioral task
behavioral8
Sample
uni/Uni - Copy (10) - Copy.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral9
Sample
uni/Uni - Copy (100) - Copy - Copy - Copy - Copy.exe
Resource
win7-20240611-en
Behavioral task
behavioral10
Sample
uni/Uni - Copy (100) - Copy - Copy - Copy - Copy.exe
Resource
win10v2004-20240611-en
Behavioral task
behavioral11
Sample
uni/Uni - Copy (100) - Copy - Copy - Copy.exe
Resource
win7-20240508-en
Behavioral task
behavioral12
Sample
uni/Uni - Copy (100) - Copy - Copy - Copy.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral13
Sample
uni/Uni - Copy (100) - Copy - Copy.exe
Resource
win7-20240508-en
Behavioral task
behavioral14
Sample
uni/Uni - Copy (100) - Copy - Copy.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral15
Sample
uni/Uni - Copy (101) - Copy - Copy - Copy - Copy.exe
Resource
win7-20240508-en
Behavioral task
behavioral16
Sample
uni/Uni - Copy (101) - Copy - Copy - Copy - Copy.exe
Resource
win10v2004-20240611-en
Behavioral task
behavioral17
Sample
uni/Uni - Copy (101) - Copy - Copy - Copy.exe
Resource
win7-20231129-en
Behavioral task
behavioral18
Sample
uni/Uni - Copy (101) - Copy - Copy - Copy.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral19
Sample
uni/Uni - Copy (101) - Copy - Copy.exe
Resource
win7-20240611-en
Behavioral task
behavioral20
Sample
uni/Uni - Copy (101) - Copy - Copy.exe
Resource
win10v2004-20240611-en
Behavioral task
behavioral21
Sample
uni/Uni - Copy (102) - Copy - Copy - Copy.exe
Resource
win7-20240220-en
Behavioral task
behavioral22
Sample
uni/Uni - Copy (102) - Copy - Copy - Copy.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral23
Sample
uni/Uni - Copy (102) - Copy - Copy.exe
Resource
win7-20240611-en
Behavioral task
behavioral24
Sample
uni/Uni - Copy (102) - Copy - Copy.exe
Resource
win10v2004-20240611-en
Behavioral task
behavioral25
Sample
uni/Uni - Copy (103) - Copy - Copy - Copy.exe
Resource
win7-20240508-en
Behavioral task
behavioral26
Sample
uni/Uni - Copy (103) - Copy - Copy - Copy.exe
Resource
win10v2004-20240611-en
Behavioral task
behavioral27
Sample
uni/Uni - Copy (103) - Copy - Copy.exe
Resource
win7-20240508-en
Behavioral task
behavioral28
Sample
uni/Uni - Copy (103) - Copy - Copy.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral29
Sample
uni/Uni - Copy (104) - Copy - Copy - Copy.exe
Resource
win7-20240508-en
Behavioral task
behavioral30
Sample
uni/Uni - Copy (104) - Copy - Copy - Copy.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral31
Sample
uni/Uni - Copy (104) - Copy - Copy.exe
Resource
win7-20240221-en
General
-
Target
uni/Uni - Copy (102) - Copy - Copy - Copy.exe
-
Size
409KB
-
MD5
b70fdac25a99501e3cae11f1b775249e
-
SHA1
3c59226479bfdcd1b2927bcfb1a7516d4cb8dd71
-
SHA256
51ff3eb450a786c1aaa75ff889f2fd256412a7b75d04277fdf9fcccc20e57246
-
SHA512
43f0d5d6e5f0d5febba537c109ffdbc250bbb6e9725e635a43ec975b0353048eaeee50b6e9274cd5e072ea6b0cea32439bd37408b2528832f467f2075f74ca44
-
SSDEEP
12288:gpbJjGut6AoE3hVVdFaC/eZPTMTDlpgfJCKuMsVs:oVaurMLcDlpRKai
Malware Config
Extracted
quasar
3.1.5
SeroXen
panel-slave.gl.at.ply.gg:57059
panel-slave.gl.at.ply.gg:27892
$Sxr-rpL8EItHN3pqIQQVy2
-
encryption_key
Lme7VBS3l58VwLM69PNM
-
install_name
Client.exe
-
log_directory
Logs
-
reconnect_delay
3000
-
startup_key
SeroXen
-
subdirectory
SubDir
Signatures
-
Quasar payload 2 IoCs
Processes:
resource yara_rule behavioral22/memory/4372-1-0x0000000000B40000-0x0000000000BAC000-memory.dmp family_quasar C:\Users\Admin\AppData\Roaming\SubDir\Client.exe family_quasar -
Checks computer location settings 2 TTPs 27 IoCs
Looks up country code configured in the registry, likely geofence.
Processes:
Client.exeClient.exeClient.exeClient.exeClient.exeClient.exeClient.exeClient.exeClient.exeClient.exeClient.exeClient.exeClient.exeClient.exeClient.exeClient.exeClient.exeClient.exeClient.exeClient.exeClient.exeClient.exeClient.exeClient.exeClient.exeClient.exeClient.exedescription ioc process Key value queried \REGISTRY\USER\S-1-5-21-4124900551-4068476067-3491212533-1000\Control Panel\International\Geo\Nation Client.exe Key value queried \REGISTRY\USER\S-1-5-21-4124900551-4068476067-3491212533-1000\Control Panel\International\Geo\Nation Client.exe Key value queried \REGISTRY\USER\S-1-5-21-4124900551-4068476067-3491212533-1000\Control Panel\International\Geo\Nation Client.exe Key value queried \REGISTRY\USER\S-1-5-21-4124900551-4068476067-3491212533-1000\Control Panel\International\Geo\Nation Client.exe Key value queried \REGISTRY\USER\S-1-5-21-4124900551-4068476067-3491212533-1000\Control Panel\International\Geo\Nation Client.exe Key value queried \REGISTRY\USER\S-1-5-21-4124900551-4068476067-3491212533-1000\Control Panel\International\Geo\Nation Client.exe Key value queried \REGISTRY\USER\S-1-5-21-4124900551-4068476067-3491212533-1000\Control Panel\International\Geo\Nation Client.exe Key value queried \REGISTRY\USER\S-1-5-21-4124900551-4068476067-3491212533-1000\Control Panel\International\Geo\Nation Client.exe Key value queried \REGISTRY\USER\S-1-5-21-4124900551-4068476067-3491212533-1000\Control Panel\International\Geo\Nation Client.exe Key value queried \REGISTRY\USER\S-1-5-21-4124900551-4068476067-3491212533-1000\Control Panel\International\Geo\Nation Client.exe Key value queried \REGISTRY\USER\S-1-5-21-4124900551-4068476067-3491212533-1000\Control Panel\International\Geo\Nation Client.exe Key value queried \REGISTRY\USER\S-1-5-21-4124900551-4068476067-3491212533-1000\Control Panel\International\Geo\Nation Client.exe Key value queried \REGISTRY\USER\S-1-5-21-4124900551-4068476067-3491212533-1000\Control Panel\International\Geo\Nation Client.exe Key value queried \REGISTRY\USER\S-1-5-21-4124900551-4068476067-3491212533-1000\Control Panel\International\Geo\Nation Client.exe Key value queried \REGISTRY\USER\S-1-5-21-4124900551-4068476067-3491212533-1000\Control Panel\International\Geo\Nation Client.exe Key value queried \REGISTRY\USER\S-1-5-21-4124900551-4068476067-3491212533-1000\Control Panel\International\Geo\Nation Client.exe Key value queried \REGISTRY\USER\S-1-5-21-4124900551-4068476067-3491212533-1000\Control Panel\International\Geo\Nation Client.exe Key value queried \REGISTRY\USER\S-1-5-21-4124900551-4068476067-3491212533-1000\Control Panel\International\Geo\Nation Client.exe Key value queried \REGISTRY\USER\S-1-5-21-4124900551-4068476067-3491212533-1000\Control Panel\International\Geo\Nation Client.exe Key value queried \REGISTRY\USER\S-1-5-21-4124900551-4068476067-3491212533-1000\Control Panel\International\Geo\Nation Client.exe Key value queried \REGISTRY\USER\S-1-5-21-4124900551-4068476067-3491212533-1000\Control Panel\International\Geo\Nation Client.exe Key value queried \REGISTRY\USER\S-1-5-21-4124900551-4068476067-3491212533-1000\Control Panel\International\Geo\Nation Client.exe Key value queried \REGISTRY\USER\S-1-5-21-4124900551-4068476067-3491212533-1000\Control Panel\International\Geo\Nation Client.exe Key value queried \REGISTRY\USER\S-1-5-21-4124900551-4068476067-3491212533-1000\Control Panel\International\Geo\Nation Client.exe Key value queried \REGISTRY\USER\S-1-5-21-4124900551-4068476067-3491212533-1000\Control Panel\International\Geo\Nation Client.exe Key value queried \REGISTRY\USER\S-1-5-21-4124900551-4068476067-3491212533-1000\Control Panel\International\Geo\Nation Client.exe Key value queried \REGISTRY\USER\S-1-5-21-4124900551-4068476067-3491212533-1000\Control Panel\International\Geo\Nation Client.exe -
Executes dropped EXE 28 IoCs
Processes:
Client.exeClient.exeClient.exeClient.exeClient.exeClient.exeClient.exeClient.exeClient.exeClient.exeClient.exeClient.exeClient.exeClient.exeClient.exeClient.exeClient.exeClient.exeClient.exeClient.exeClient.exeClient.exeClient.exeClient.exeClient.exeClient.exeClient.exeClient.exepid process 1932 Client.exe 2812 Client.exe 2320 Client.exe 3816 Client.exe 2164 Client.exe 3656 Client.exe 5080 Client.exe 5024 Client.exe 4888 Client.exe 1548 Client.exe 1092 Client.exe 1564 Client.exe 1420 Client.exe 1724 Client.exe 1736 Client.exe 2200 Client.exe 1556 Client.exe 2188 Client.exe 1684 Client.exe 668 Client.exe 3168 Client.exe 4412 Client.exe 1900 Client.exe 1172 Client.exe 4200 Client.exe 3052 Client.exe 3620 Client.exe 3212 Client.exe -
Looks up external IP address via web service 27 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
Processes:
flow ioc 16 ip-api.com 18 ip-api.com 24 ip-api.com 44 ip-api.com 54 ip-api.com 56 ip-api.com 63 ip-api.com 12 api.ipify.org 67 ip-api.com 26 ip-api.com 30 ip-api.com 22 ip-api.com 48 ip-api.com 51 ip-api.com 28 ip-api.com 34 ip-api.com 65 ip-api.com 3 ip-api.com 38 ip-api.com 14 ip-api.com 32 ip-api.com 20 ip-api.com 46 ip-api.com 58 ip-api.com 61 ip-api.com 36 ip-api.com 42 ip-api.com -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Program crash 27 IoCs
Processes:
WerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exepid pid_target process target process 916 1932 WerFault.exe Client.exe 2840 2812 WerFault.exe Client.exe 4100 2320 WerFault.exe Client.exe 2680 3816 WerFault.exe Client.exe 2140 2164 WerFault.exe Client.exe 4488 3656 WerFault.exe Client.exe 1236 5080 WerFault.exe Client.exe 632 5024 WerFault.exe Client.exe 4556 4888 WerFault.exe Client.exe 4488 1548 WerFault.exe Client.exe 2228 1092 WerFault.exe Client.exe 2696 1564 WerFault.exe Client.exe 916 1420 WerFault.exe Client.exe 2884 1724 WerFault.exe Client.exe 4944 1736 WerFault.exe Client.exe 736 2200 WerFault.exe Client.exe 4832 1556 WerFault.exe Client.exe 428 2188 WerFault.exe Client.exe 832 1684 WerFault.exe Client.exe 4548 668 WerFault.exe Client.exe 708 3168 WerFault.exe Client.exe 4448 4412 WerFault.exe Client.exe 2584 1900 WerFault.exe Client.exe 1000 1172 WerFault.exe Client.exe 4904 4200 WerFault.exe Client.exe 4080 3052 WerFault.exe Client.exe 4884 3620 WerFault.exe Client.exe -
Creates scheduled task(s) 1 TTPs 29 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
Processes:
schtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeSCHTASKS.exepid process 2240 schtasks.exe 3812 schtasks.exe 5024 schtasks.exe 4908 schtasks.exe 2000 schtasks.exe 2748 schtasks.exe 4724 schtasks.exe 2380 schtasks.exe 2284 schtasks.exe 4468 schtasks.exe 5048 schtasks.exe 2692 schtasks.exe 116 schtasks.exe 684 schtasks.exe 4312 schtasks.exe 2020 schtasks.exe 3852 schtasks.exe 1096 schtasks.exe 556 schtasks.exe 1456 schtasks.exe 392 schtasks.exe 452 schtasks.exe 2452 schtasks.exe 3388 schtasks.exe 3564 schtasks.exe 4380 schtasks.exe 1432 schtasks.exe 2720 schtasks.exe 2664 SCHTASKS.exe -
Runs ping.exe 1 TTPs 27 IoCs
Processes:
PING.EXEPING.EXEPING.EXEPING.EXEPING.EXEPING.EXEPING.EXEPING.EXEPING.EXEPING.EXEPING.EXEPING.EXEPING.EXEPING.EXEPING.EXEPING.EXEPING.EXEPING.EXEPING.EXEPING.EXEPING.EXEPING.EXEPING.EXEPING.EXEPING.EXEPING.EXEPING.EXEpid process 3112 PING.EXE 2748 PING.EXE 2276 PING.EXE 1844 PING.EXE 1112 PING.EXE 3968 PING.EXE 4744 PING.EXE 3716 PING.EXE 4236 PING.EXE 1044 PING.EXE 3916 PING.EXE 3460 PING.EXE 3780 PING.EXE 1016 PING.EXE 2880 PING.EXE 4204 PING.EXE 3008 PING.EXE 4020 PING.EXE 4312 PING.EXE 1800 PING.EXE 3060 PING.EXE 868 PING.EXE 4380 PING.EXE 2736 PING.EXE 4340 PING.EXE 4504 PING.EXE 1476 PING.EXE -
Suspicious use of AdjustPrivilegeToken 29 IoCs
Processes:
Uni - Copy (102) - Copy - Copy - Copy.exeClient.exeClient.exeClient.exeClient.exeClient.exeClient.exeClient.exeClient.exeClient.exeClient.exeClient.exeClient.exeClient.exeClient.exeClient.exeClient.exeClient.exeClient.exeClient.exeClient.exeClient.exeClient.exeClient.exeClient.exeClient.exeClient.exeClient.exeClient.exedescription pid process Token: SeDebugPrivilege 4372 Uni - Copy (102) - Copy - Copy - Copy.exe Token: SeDebugPrivilege 1932 Client.exe Token: SeDebugPrivilege 2812 Client.exe Token: SeDebugPrivilege 2320 Client.exe Token: SeDebugPrivilege 3816 Client.exe Token: SeDebugPrivilege 2164 Client.exe Token: SeDebugPrivilege 3656 Client.exe Token: SeDebugPrivilege 5080 Client.exe Token: SeDebugPrivilege 5024 Client.exe Token: SeDebugPrivilege 4888 Client.exe Token: SeDebugPrivilege 1548 Client.exe Token: SeDebugPrivilege 1092 Client.exe Token: SeDebugPrivilege 1564 Client.exe Token: SeDebugPrivilege 1420 Client.exe Token: SeDebugPrivilege 1724 Client.exe Token: SeDebugPrivilege 1736 Client.exe Token: SeDebugPrivilege 2200 Client.exe Token: SeDebugPrivilege 1556 Client.exe Token: SeDebugPrivilege 2188 Client.exe Token: SeDebugPrivilege 1684 Client.exe Token: SeDebugPrivilege 668 Client.exe Token: SeDebugPrivilege 3168 Client.exe Token: SeDebugPrivilege 4412 Client.exe Token: SeDebugPrivilege 1900 Client.exe Token: SeDebugPrivilege 1172 Client.exe Token: SeDebugPrivilege 4200 Client.exe Token: SeDebugPrivilege 3052 Client.exe Token: SeDebugPrivilege 3620 Client.exe Token: SeDebugPrivilege 3212 Client.exe -
Suspicious use of SetWindowsHookEx 27 IoCs
Processes:
Client.exeClient.exeClient.exeClient.exeClient.exeClient.exeClient.exeClient.exeClient.exeClient.exeClient.exeClient.exeClient.exeClient.exeClient.exeClient.exeClient.exeClient.exeClient.exeClient.exeClient.exeClient.exeClient.exeClient.exeClient.exeClient.exeClient.exepid process 1932 Client.exe 2812 Client.exe 2320 Client.exe 3816 Client.exe 2164 Client.exe 3656 Client.exe 5080 Client.exe 5024 Client.exe 4888 Client.exe 1548 Client.exe 1092 Client.exe 1564 Client.exe 1420 Client.exe 1724 Client.exe 1736 Client.exe 2200 Client.exe 1556 Client.exe 2188 Client.exe 1684 Client.exe 668 Client.exe 3168 Client.exe 4412 Client.exe 1900 Client.exe 1172 Client.exe 4200 Client.exe 3052 Client.exe 3620 Client.exe -
Suspicious use of WriteProcessMemory 64 IoCs
Processes:
Uni - Copy (102) - Copy - Copy - Copy.exeClient.execmd.exeClient.execmd.exeClient.execmd.exeClient.execmd.exedescription pid process target process PID 4372 wrote to memory of 2720 4372 Uni - Copy (102) - Copy - Copy - Copy.exe schtasks.exe PID 4372 wrote to memory of 2720 4372 Uni - Copy (102) - Copy - Copy - Copy.exe schtasks.exe PID 4372 wrote to memory of 2720 4372 Uni - Copy (102) - Copy - Copy - Copy.exe schtasks.exe PID 4372 wrote to memory of 1932 4372 Uni - Copy (102) - Copy - Copy - Copy.exe Client.exe PID 4372 wrote to memory of 1932 4372 Uni - Copy (102) - Copy - Copy - Copy.exe Client.exe PID 4372 wrote to memory of 1932 4372 Uni - Copy (102) - Copy - Copy - Copy.exe Client.exe PID 4372 wrote to memory of 2664 4372 Uni - Copy (102) - Copy - Copy - Copy.exe SCHTASKS.exe PID 4372 wrote to memory of 2664 4372 Uni - Copy (102) - Copy - Copy - Copy.exe SCHTASKS.exe PID 4372 wrote to memory of 2664 4372 Uni - Copy (102) - Copy - Copy - Copy.exe SCHTASKS.exe PID 1932 wrote to memory of 2020 1932 Client.exe schtasks.exe PID 1932 wrote to memory of 2020 1932 Client.exe schtasks.exe PID 1932 wrote to memory of 2020 1932 Client.exe schtasks.exe PID 1932 wrote to memory of 4524 1932 Client.exe cmd.exe PID 1932 wrote to memory of 4524 1932 Client.exe cmd.exe PID 1932 wrote to memory of 4524 1932 Client.exe cmd.exe PID 4524 wrote to memory of 3432 4524 cmd.exe chcp.com PID 4524 wrote to memory of 3432 4524 cmd.exe chcp.com PID 4524 wrote to memory of 3432 4524 cmd.exe chcp.com PID 4524 wrote to memory of 1016 4524 cmd.exe PING.EXE PID 4524 wrote to memory of 1016 4524 cmd.exe PING.EXE PID 4524 wrote to memory of 1016 4524 cmd.exe PING.EXE PID 4524 wrote to memory of 2812 4524 cmd.exe Client.exe PID 4524 wrote to memory of 2812 4524 cmd.exe Client.exe PID 4524 wrote to memory of 2812 4524 cmd.exe Client.exe PID 2812 wrote to memory of 3852 2812 Client.exe schtasks.exe PID 2812 wrote to memory of 3852 2812 Client.exe schtasks.exe PID 2812 wrote to memory of 3852 2812 Client.exe schtasks.exe PID 2812 wrote to memory of 1744 2812 Client.exe cmd.exe PID 2812 wrote to memory of 1744 2812 Client.exe cmd.exe PID 2812 wrote to memory of 1744 2812 Client.exe cmd.exe PID 1744 wrote to memory of 3092 1744 cmd.exe chcp.com PID 1744 wrote to memory of 3092 1744 cmd.exe chcp.com PID 1744 wrote to memory of 3092 1744 cmd.exe chcp.com PID 1744 wrote to memory of 2736 1744 cmd.exe PING.EXE PID 1744 wrote to memory of 2736 1744 cmd.exe PING.EXE PID 1744 wrote to memory of 2736 1744 cmd.exe PING.EXE PID 1744 wrote to memory of 2320 1744 cmd.exe Client.exe PID 1744 wrote to memory of 2320 1744 cmd.exe Client.exe PID 1744 wrote to memory of 2320 1744 cmd.exe Client.exe PID 2320 wrote to memory of 4724 2320 Client.exe schtasks.exe PID 2320 wrote to memory of 4724 2320 Client.exe schtasks.exe PID 2320 wrote to memory of 4724 2320 Client.exe schtasks.exe PID 2320 wrote to memory of 4288 2320 Client.exe cmd.exe PID 2320 wrote to memory of 4288 2320 Client.exe cmd.exe PID 2320 wrote to memory of 4288 2320 Client.exe cmd.exe PID 4288 wrote to memory of 4308 4288 cmd.exe chcp.com PID 4288 wrote to memory of 4308 4288 cmd.exe chcp.com PID 4288 wrote to memory of 4308 4288 cmd.exe chcp.com PID 4288 wrote to memory of 4340 4288 cmd.exe PING.EXE PID 4288 wrote to memory of 4340 4288 cmd.exe PING.EXE PID 4288 wrote to memory of 4340 4288 cmd.exe PING.EXE PID 4288 wrote to memory of 3816 4288 cmd.exe Client.exe PID 4288 wrote to memory of 3816 4288 cmd.exe Client.exe PID 4288 wrote to memory of 3816 4288 cmd.exe Client.exe PID 3816 wrote to memory of 2380 3816 Client.exe schtasks.exe PID 3816 wrote to memory of 2380 3816 Client.exe schtasks.exe PID 3816 wrote to memory of 2380 3816 Client.exe schtasks.exe PID 3816 wrote to memory of 2500 3816 Client.exe cmd.exe PID 3816 wrote to memory of 2500 3816 Client.exe cmd.exe PID 3816 wrote to memory of 2500 3816 Client.exe cmd.exe PID 2500 wrote to memory of 4588 2500 cmd.exe chcp.com PID 2500 wrote to memory of 4588 2500 cmd.exe chcp.com PID 2500 wrote to memory of 4588 2500 cmd.exe chcp.com PID 2500 wrote to memory of 3060 2500 cmd.exe PING.EXE
Processes
-
C:\Users\Admin\AppData\Local\Temp\uni\Uni - Copy (102) - Copy - Copy - Copy.exe"C:\Users\Admin\AppData\Local\Temp\uni\Uni - Copy (102) - Copy - Copy - Copy.exe"1⤵
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\schtasks.exe"schtasks" /create /tn "SeroXen" /sc ONLOGON /tr "C:\Users\Admin\AppData\Local\Temp\uni\Uni - Copy (102) - Copy - Copy - Copy.exe" /rl HIGHEST /f2⤵
- Creates scheduled task(s)
-
C:\Users\Admin\AppData\Roaming\SubDir\Client.exe"C:\Users\Admin\AppData\Roaming\SubDir\Client.exe"2⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\schtasks.exe"schtasks" /create /tn "SeroXen" /sc ONLOGON /tr "C:\Users\Admin\AppData\Roaming\SubDir\Client.exe" /rl HIGHEST /f3⤵
- Creates scheduled task(s)
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\rAon6FRDnPi5.bat" "3⤵
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\chcp.comchcp 650014⤵
-
C:\Windows\SysWOW64\PING.EXEping -n 10 localhost4⤵
- Runs ping.exe
-
C:\Users\Admin\AppData\Roaming\SubDir\Client.exe"C:\Users\Admin\AppData\Roaming\SubDir\Client.exe"4⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\schtasks.exe"schtasks" /create /tn "SeroXen" /sc ONLOGON /tr "C:\Users\Admin\AppData\Roaming\SubDir\Client.exe" /rl HIGHEST /f5⤵
- Creates scheduled task(s)
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\ZAfIU05lAXvg.bat" "5⤵
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\chcp.comchcp 650016⤵
-
C:\Windows\SysWOW64\PING.EXEping -n 10 localhost6⤵
- Runs ping.exe
-
C:\Users\Admin\AppData\Roaming\SubDir\Client.exe"C:\Users\Admin\AppData\Roaming\SubDir\Client.exe"6⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\schtasks.exe"schtasks" /create /tn "SeroXen" /sc ONLOGON /tr "C:\Users\Admin\AppData\Roaming\SubDir\Client.exe" /rl HIGHEST /f7⤵
- Creates scheduled task(s)
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\vJzx6coq7nDM.bat" "7⤵
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\chcp.comchcp 650018⤵
-
C:\Windows\SysWOW64\PING.EXEping -n 10 localhost8⤵
- Runs ping.exe
-
C:\Users\Admin\AppData\Roaming\SubDir\Client.exe"C:\Users\Admin\AppData\Roaming\SubDir\Client.exe"8⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\schtasks.exe"schtasks" /create /tn "SeroXen" /sc ONLOGON /tr "C:\Users\Admin\AppData\Roaming\SubDir\Client.exe" /rl HIGHEST /f9⤵
- Creates scheduled task(s)
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\prfKr6u0IhmM.bat" "9⤵
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\chcp.comchcp 6500110⤵
-
C:\Windows\SysWOW64\PING.EXEping -n 10 localhost10⤵
- Runs ping.exe
-
C:\Users\Admin\AppData\Roaming\SubDir\Client.exe"C:\Users\Admin\AppData\Roaming\SubDir\Client.exe"10⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
-
C:\Windows\SysWOW64\schtasks.exe"schtasks" /create /tn "SeroXen" /sc ONLOGON /tr "C:\Users\Admin\AppData\Roaming\SubDir\Client.exe" /rl HIGHEST /f11⤵
- Creates scheduled task(s)
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\JGwFkqPWipdc.bat" "11⤵
-
C:\Windows\SysWOW64\chcp.comchcp 6500112⤵
-
C:\Windows\SysWOW64\PING.EXEping -n 10 localhost12⤵
- Runs ping.exe
-
C:\Users\Admin\AppData\Roaming\SubDir\Client.exe"C:\Users\Admin\AppData\Roaming\SubDir\Client.exe"12⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
-
C:\Windows\SysWOW64\schtasks.exe"schtasks" /create /tn "SeroXen" /sc ONLOGON /tr "C:\Users\Admin\AppData\Roaming\SubDir\Client.exe" /rl HIGHEST /f13⤵
- Creates scheduled task(s)
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\KOJgxTdqXOR0.bat" "13⤵
-
C:\Windows\SysWOW64\chcp.comchcp 6500114⤵
-
C:\Windows\SysWOW64\PING.EXEping -n 10 localhost14⤵
- Runs ping.exe
-
C:\Users\Admin\AppData\Roaming\SubDir\Client.exe"C:\Users\Admin\AppData\Roaming\SubDir\Client.exe"14⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
-
C:\Windows\SysWOW64\schtasks.exe"schtasks" /create /tn "SeroXen" /sc ONLOGON /tr "C:\Users\Admin\AppData\Roaming\SubDir\Client.exe" /rl HIGHEST /f15⤵
- Creates scheduled task(s)
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\UaYzMSZOfaOg.bat" "15⤵
-
C:\Windows\SysWOW64\chcp.comchcp 6500116⤵
-
C:\Windows\SysWOW64\PING.EXEping -n 10 localhost16⤵
- Runs ping.exe
-
C:\Users\Admin\AppData\Roaming\SubDir\Client.exe"C:\Users\Admin\AppData\Roaming\SubDir\Client.exe"16⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
-
C:\Windows\SysWOW64\schtasks.exe"schtasks" /create /tn "SeroXen" /sc ONLOGON /tr "C:\Users\Admin\AppData\Roaming\SubDir\Client.exe" /rl HIGHEST /f17⤵
- Creates scheduled task(s)
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\rQ6qn4xkS3zY.bat" "17⤵
-
C:\Windows\SysWOW64\chcp.comchcp 6500118⤵
-
C:\Windows\SysWOW64\PING.EXEping -n 10 localhost18⤵
- Runs ping.exe
-
C:\Users\Admin\AppData\Roaming\SubDir\Client.exe"C:\Users\Admin\AppData\Roaming\SubDir\Client.exe"18⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
-
C:\Windows\SysWOW64\schtasks.exe"schtasks" /create /tn "SeroXen" /sc ONLOGON /tr "C:\Users\Admin\AppData\Roaming\SubDir\Client.exe" /rl HIGHEST /f19⤵
- Creates scheduled task(s)
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\v6Nbf58uNUMQ.bat" "19⤵
-
C:\Windows\SysWOW64\chcp.comchcp 6500120⤵
-
C:\Windows\SysWOW64\PING.EXEping -n 10 localhost20⤵
- Runs ping.exe
-
C:\Users\Admin\AppData\Roaming\SubDir\Client.exe"C:\Users\Admin\AppData\Roaming\SubDir\Client.exe"20⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
-
C:\Windows\SysWOW64\schtasks.exe"schtasks" /create /tn "SeroXen" /sc ONLOGON /tr "C:\Users\Admin\AppData\Roaming\SubDir\Client.exe" /rl HIGHEST /f21⤵
- Creates scheduled task(s)
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\3oS6JrTNpiQB.bat" "21⤵
-
C:\Windows\SysWOW64\chcp.comchcp 6500122⤵
-
C:\Windows\SysWOW64\PING.EXEping -n 10 localhost22⤵
- Runs ping.exe
-
C:\Users\Admin\AppData\Roaming\SubDir\Client.exe"C:\Users\Admin\AppData\Roaming\SubDir\Client.exe"22⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
-
C:\Windows\SysWOW64\schtasks.exe"schtasks" /create /tn "SeroXen" /sc ONLOGON /tr "C:\Users\Admin\AppData\Roaming\SubDir\Client.exe" /rl HIGHEST /f23⤵
- Creates scheduled task(s)
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\zQszxYuJQVek.bat" "23⤵
-
C:\Windows\SysWOW64\chcp.comchcp 6500124⤵
-
C:\Windows\SysWOW64\PING.EXEping -n 10 localhost24⤵
- Runs ping.exe
-
C:\Users\Admin\AppData\Roaming\SubDir\Client.exe"C:\Users\Admin\AppData\Roaming\SubDir\Client.exe"24⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
-
C:\Windows\SysWOW64\schtasks.exe"schtasks" /create /tn "SeroXen" /sc ONLOGON /tr "C:\Users\Admin\AppData\Roaming\SubDir\Client.exe" /rl HIGHEST /f25⤵
- Creates scheduled task(s)
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\nSanB5F4Pecw.bat" "25⤵
-
C:\Windows\SysWOW64\chcp.comchcp 6500126⤵
-
C:\Windows\SysWOW64\PING.EXEping -n 10 localhost26⤵
- Runs ping.exe
-
C:\Users\Admin\AppData\Roaming\SubDir\Client.exe"C:\Users\Admin\AppData\Roaming\SubDir\Client.exe"26⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
-
C:\Windows\SysWOW64\schtasks.exe"schtasks" /create /tn "SeroXen" /sc ONLOGON /tr "C:\Users\Admin\AppData\Roaming\SubDir\Client.exe" /rl HIGHEST /f27⤵
- Creates scheduled task(s)
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\StmoAjIMEJdp.bat" "27⤵
-
C:\Windows\SysWOW64\chcp.comchcp 6500128⤵
-
C:\Windows\SysWOW64\PING.EXEping -n 10 localhost28⤵
- Runs ping.exe
-
C:\Users\Admin\AppData\Roaming\SubDir\Client.exe"C:\Users\Admin\AppData\Roaming\SubDir\Client.exe"28⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
-
C:\Windows\SysWOW64\schtasks.exe"schtasks" /create /tn "SeroXen" /sc ONLOGON /tr "C:\Users\Admin\AppData\Roaming\SubDir\Client.exe" /rl HIGHEST /f29⤵
- Creates scheduled task(s)
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\abrJoVcqfYha.bat" "29⤵
-
C:\Windows\SysWOW64\chcp.comchcp 6500130⤵
-
C:\Windows\SysWOW64\PING.EXEping -n 10 localhost30⤵
- Runs ping.exe
-
C:\Users\Admin\AppData\Roaming\SubDir\Client.exe"C:\Users\Admin\AppData\Roaming\SubDir\Client.exe"30⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
-
C:\Windows\SysWOW64\schtasks.exe"schtasks" /create /tn "SeroXen" /sc ONLOGON /tr "C:\Users\Admin\AppData\Roaming\SubDir\Client.exe" /rl HIGHEST /f31⤵
- Creates scheduled task(s)
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\ek3Uos0T0vDs.bat" "31⤵
-
C:\Windows\SysWOW64\chcp.comchcp 6500132⤵
-
C:\Windows\SysWOW64\PING.EXEping -n 10 localhost32⤵
- Runs ping.exe
-
C:\Users\Admin\AppData\Roaming\SubDir\Client.exe"C:\Users\Admin\AppData\Roaming\SubDir\Client.exe"32⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
-
C:\Windows\SysWOW64\schtasks.exe"schtasks" /create /tn "SeroXen" /sc ONLOGON /tr "C:\Users\Admin\AppData\Roaming\SubDir\Client.exe" /rl HIGHEST /f33⤵
- Creates scheduled task(s)
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\sXwHcyYIgZLH.bat" "33⤵
-
C:\Windows\SysWOW64\chcp.comchcp 6500134⤵
-
C:\Windows\SysWOW64\PING.EXEping -n 10 localhost34⤵
- Runs ping.exe
-
C:\Users\Admin\AppData\Roaming\SubDir\Client.exe"C:\Users\Admin\AppData\Roaming\SubDir\Client.exe"34⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
-
C:\Windows\SysWOW64\schtasks.exe"schtasks" /create /tn "SeroXen" /sc ONLOGON /tr "C:\Users\Admin\AppData\Roaming\SubDir\Client.exe" /rl HIGHEST /f35⤵
- Creates scheduled task(s)
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\FuajvEjA45oj.bat" "35⤵
-
C:\Windows\SysWOW64\chcp.comchcp 6500136⤵
-
C:\Windows\SysWOW64\PING.EXEping -n 10 localhost36⤵
- Runs ping.exe
-
C:\Users\Admin\AppData\Roaming\SubDir\Client.exe"C:\Users\Admin\AppData\Roaming\SubDir\Client.exe"36⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
-
C:\Windows\SysWOW64\schtasks.exe"schtasks" /create /tn "SeroXen" /sc ONLOGON /tr "C:\Users\Admin\AppData\Roaming\SubDir\Client.exe" /rl HIGHEST /f37⤵
- Creates scheduled task(s)
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\vPWGn57EKeUC.bat" "37⤵
-
C:\Windows\SysWOW64\chcp.comchcp 6500138⤵
-
C:\Windows\SysWOW64\PING.EXEping -n 10 localhost38⤵
- Runs ping.exe
-
C:\Users\Admin\AppData\Roaming\SubDir\Client.exe"C:\Users\Admin\AppData\Roaming\SubDir\Client.exe"38⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
-
C:\Windows\SysWOW64\schtasks.exe"schtasks" /create /tn "SeroXen" /sc ONLOGON /tr "C:\Users\Admin\AppData\Roaming\SubDir\Client.exe" /rl HIGHEST /f39⤵
- Creates scheduled task(s)
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\zYiQmSVre10T.bat" "39⤵
-
C:\Windows\SysWOW64\chcp.comchcp 6500140⤵
-
C:\Windows\SysWOW64\PING.EXEping -n 10 localhost40⤵
- Runs ping.exe
-
C:\Users\Admin\AppData\Roaming\SubDir\Client.exe"C:\Users\Admin\AppData\Roaming\SubDir\Client.exe"40⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
-
C:\Windows\SysWOW64\schtasks.exe"schtasks" /create /tn "SeroXen" /sc ONLOGON /tr "C:\Users\Admin\AppData\Roaming\SubDir\Client.exe" /rl HIGHEST /f41⤵
- Creates scheduled task(s)
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\7GnvREpL5G4F.bat" "41⤵
-
C:\Windows\SysWOW64\chcp.comchcp 6500142⤵
-
C:\Windows\SysWOW64\PING.EXEping -n 10 localhost42⤵
- Runs ping.exe
-
C:\Users\Admin\AppData\Roaming\SubDir\Client.exe"C:\Users\Admin\AppData\Roaming\SubDir\Client.exe"42⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
-
C:\Windows\SysWOW64\schtasks.exe"schtasks" /create /tn "SeroXen" /sc ONLOGON /tr "C:\Users\Admin\AppData\Roaming\SubDir\Client.exe" /rl HIGHEST /f43⤵
- Creates scheduled task(s)
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\N3jJILt3q7GJ.bat" "43⤵
-
C:\Windows\SysWOW64\chcp.comchcp 6500144⤵
-
C:\Windows\SysWOW64\PING.EXEping -n 10 localhost44⤵
- Runs ping.exe
-
C:\Users\Admin\AppData\Roaming\SubDir\Client.exe"C:\Users\Admin\AppData\Roaming\SubDir\Client.exe"44⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
-
C:\Windows\SysWOW64\schtasks.exe"schtasks" /create /tn "SeroXen" /sc ONLOGON /tr "C:\Users\Admin\AppData\Roaming\SubDir\Client.exe" /rl HIGHEST /f45⤵
- Creates scheduled task(s)
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\6ZTZxwSQcUeg.bat" "45⤵
-
C:\Windows\SysWOW64\chcp.comchcp 6500146⤵
-
C:\Windows\SysWOW64\PING.EXEping -n 10 localhost46⤵
- Runs ping.exe
-
C:\Users\Admin\AppData\Roaming\SubDir\Client.exe"C:\Users\Admin\AppData\Roaming\SubDir\Client.exe"46⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
-
C:\Windows\SysWOW64\schtasks.exe"schtasks" /create /tn "SeroXen" /sc ONLOGON /tr "C:\Users\Admin\AppData\Roaming\SubDir\Client.exe" /rl HIGHEST /f47⤵
- Creates scheduled task(s)
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\Zu0ywUbAciqM.bat" "47⤵
-
C:\Windows\SysWOW64\chcp.comchcp 6500148⤵
-
C:\Windows\SysWOW64\PING.EXEping -n 10 localhost48⤵
- Runs ping.exe
-
C:\Users\Admin\AppData\Roaming\SubDir\Client.exe"C:\Users\Admin\AppData\Roaming\SubDir\Client.exe"48⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
-
C:\Windows\SysWOW64\schtasks.exe"schtasks" /create /tn "SeroXen" /sc ONLOGON /tr "C:\Users\Admin\AppData\Roaming\SubDir\Client.exe" /rl HIGHEST /f49⤵
- Creates scheduled task(s)
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\TSgLiyiKndOM.bat" "49⤵
-
C:\Windows\SysWOW64\chcp.comchcp 6500150⤵
-
C:\Windows\SysWOW64\PING.EXEping -n 10 localhost50⤵
- Runs ping.exe
-
C:\Users\Admin\AppData\Roaming\SubDir\Client.exe"C:\Users\Admin\AppData\Roaming\SubDir\Client.exe"50⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
-
C:\Windows\SysWOW64\schtasks.exe"schtasks" /create /tn "SeroXen" /sc ONLOGON /tr "C:\Users\Admin\AppData\Roaming\SubDir\Client.exe" /rl HIGHEST /f51⤵
- Creates scheduled task(s)
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\rHEB8a5ga6zE.bat" "51⤵
-
C:\Windows\SysWOW64\chcp.comchcp 6500152⤵
-
C:\Windows\SysWOW64\PING.EXEping -n 10 localhost52⤵
- Runs ping.exe
-
C:\Users\Admin\AppData\Roaming\SubDir\Client.exe"C:\Users\Admin\AppData\Roaming\SubDir\Client.exe"52⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
-
C:\Windows\SysWOW64\schtasks.exe"schtasks" /create /tn "SeroXen" /sc ONLOGON /tr "C:\Users\Admin\AppData\Roaming\SubDir\Client.exe" /rl HIGHEST /f53⤵
- Creates scheduled task(s)
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\mte4nGXbCtDn.bat" "53⤵
-
C:\Windows\SysWOW64\chcp.comchcp 6500154⤵
-
C:\Windows\SysWOW64\PING.EXEping -n 10 localhost54⤵
- Runs ping.exe
-
C:\Users\Admin\AppData\Roaming\SubDir\Client.exe"C:\Users\Admin\AppData\Roaming\SubDir\Client.exe"54⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
-
C:\Windows\SysWOW64\schtasks.exe"schtasks" /create /tn "SeroXen" /sc ONLOGON /tr "C:\Users\Admin\AppData\Roaming\SubDir\Client.exe" /rl HIGHEST /f55⤵
- Creates scheduled task(s)
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\2gaSeObJxkQr.bat" "55⤵
-
C:\Windows\SysWOW64\chcp.comchcp 6500156⤵
-
C:\Windows\SysWOW64\PING.EXEping -n 10 localhost56⤵
- Runs ping.exe
-
C:\Users\Admin\AppData\Roaming\SubDir\Client.exe"C:\Users\Admin\AppData\Roaming\SubDir\Client.exe"56⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3620 -s 170855⤵
- Program crash
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3052 -s 168853⤵
- Program crash
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4200 -s 109651⤵
- Program crash
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1172 -s 224849⤵
- Program crash
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1900 -s 166847⤵
- Program crash
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4412 -s 224845⤵
- Program crash
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3168 -s 224843⤵
- Program crash
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 668 -s 224041⤵
- Program crash
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1684 -s 109239⤵
- Program crash
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2188 -s 109637⤵
- Program crash
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1556 -s 108835⤵
- Program crash
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2200 -s 164433⤵
- Program crash
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1736 -s 222831⤵
- Program crash
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1724 -s 170829⤵
- Program crash
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1420 -s 222427⤵
- Program crash
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1564 -s 166425⤵
- Program crash
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1092 -s 79623⤵
- Program crash
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1548 -s 222421⤵
- Program crash
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4888 -s 171619⤵
- Program crash
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 5024 -s 109217⤵
- Program crash
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 5080 -s 109215⤵
- Program crash
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3656 -s 171213⤵
- Program crash
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2164 -s 108811⤵
- Program crash
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3816 -s 16849⤵
- Program crash
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2320 -s 22007⤵
- Program crash
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2812 -s 16365⤵
- Program crash
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1932 -s 21443⤵
- Program crash
-
C:\Windows\SysWOW64\SCHTASKS.exe"SCHTASKS.exe" /create /tn "$77Uni - Copy (102) - Copy - Copy - Copy.exe" /tr "'C:\Users\Admin\AppData\Local\Temp\uni\Uni - Copy (102) - Copy - Copy - Copy.exe'" /sc onlogon /rl HIGHEST2⤵
- Creates scheduled task(s)
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 408 -p 1932 -ip 19321⤵
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 516 -p 2812 -ip 28121⤵
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 440 -p 2320 -ip 23201⤵
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 508 -p 3816 -ip 38161⤵
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 536 -p 2164 -ip 21641⤵
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 544 -p 3656 -ip 36561⤵
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 520 -p 5080 -ip 50801⤵
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 444 -p 5024 -ip 50241⤵
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 524 -p 4888 -ip 48881⤵
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 524 -p 1548 -ip 15481⤵
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 440 -p 1092 -ip 10921⤵
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 540 -p 1564 -ip 15641⤵
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 532 -p 1420 -ip 14201⤵
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 544 -p 1724 -ip 17241⤵
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 572 -p 1736 -ip 17361⤵
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 580 -p 2200 -ip 22001⤵
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 584 -p 1556 -ip 15561⤵
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 552 -p 2188 -ip 21881⤵
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 556 -p 1684 -ip 16841⤵
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 572 -p 668 -ip 6681⤵
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 544 -p 3168 -ip 31681⤵
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 564 -p 4412 -ip 44121⤵
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 556 -p 1900 -ip 19001⤵
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 584 -p 1172 -ip 11721⤵
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 512 -p 4200 -ip 42001⤵
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 580 -p 3052 -ip 30521⤵
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 564 -p 3620 -ip 36201⤵
Network
MITRE ATT&CK Matrix ATT&CK v13
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Local\Temp\3oS6JrTNpiQB.batFilesize
207B
MD5c5faf23198dc7c905a8ef0f89220937f
SHA10794f93081cb3971f22523a61b9464db1388785c
SHA25614379593c3cfd92084b92ccc5d64c7c343af8316ac8272db7ee58c7a3dc0196c
SHA512d5e14cd63316106f17406df100883624ede71ab623fd8758e88e4ddb3d48c21488430c2ad774fc3f7618af934f6a44db59de31e947d63453effb1ddaed2c9645
-
C:\Users\Admin\AppData\Local\Temp\7GnvREpL5G4F.batFilesize
207B
MD5c8a3fb2dd8720fc39807f8f6123542a8
SHA12e54f86b44c5e860d49cae1611ce868ab908de14
SHA2566703efeed2bf38ecd143d0db0a4278ab55a964daf8a36717c15091878071d0c0
SHA5124a68716ca1bba7181cdc7de9bdf687404e43fc16ac710cbb5a12d579ce837cc2d97fc163c2860db407a7f101da44298162f4176ae28354b77ea43b21c85d9361
-
C:\Users\Admin\AppData\Local\Temp\FuajvEjA45oj.batFilesize
207B
MD5e8b71fdc56517d0a4a0572d08266e0b9
SHA162db5a861809a2f21dbc14f61ecac7626cd87617
SHA256cb617f6882274c94d033365d91b7271da30124ab3de5e6271165a47b378f1e5a
SHA512776eec5d27c097ca910533e24e40ff35c7f1630b813e595cf73275c8bad501b85d1e7f36e0424611410bfc28b2aa31245f78f36989b67929cdd3dbe46ff14db1
-
C:\Users\Admin\AppData\Local\Temp\JGwFkqPWipdc.batFilesize
207B
MD5704ddd7d49f06002e660ed31846889f2
SHA1c7ed6f2f00feb110ca00e62fd2c1276d42077f4c
SHA25601e8c5e8ff396d5fb940a98528fa04e172de27427d55613ef75d1658a8f997f7
SHA512baa8479ad181003685f4db06f364c3ed1a424447a2605107e3235b68dc4eb225d0b9a77746af1a2cd2d34885f8e68c364670dbdf7bba028141d2bc96ad484805
-
C:\Users\Admin\AppData\Local\Temp\KOJgxTdqXOR0.batFilesize
207B
MD57fc0db3700638518f67f1e37072e64d4
SHA1e3dfc35b0b28f92c6c02ea73ee296c2c70850c03
SHA256384bb756eeb5ae6aa5c78bdc94e425d2d478388d3d6e19c97500b9b00306d40e
SHA51226f9f41cc94a67fa60961e6d15f59b4cbdec83d41d276404dc7502e9dd1e90aaf2a87bc4471f0d82d5d6fee3d6d84eb4a69e721eee392ff52afdcf5db2f069ad
-
C:\Users\Admin\AppData\Local\Temp\N3jJILt3q7GJ.batFilesize
207B
MD58ced6991987130bcc5e005988df9c36d
SHA177a8fd96436d0db258b6a253e3daace0cee1400c
SHA2564b2e11f017536f00bfa4c3e37fc4a512795ab67ce41cfbad16f916bcc110616a
SHA512c21e63e63ad95848d9070e6ae1312fdd412c6f68866557167dd888230f3e849208c0805eacdf45ee6c3892263da7094bd8a271919acdc5c24bd896828aadc904
-
C:\Users\Admin\AppData\Local\Temp\StmoAjIMEJdp.batFilesize
207B
MD58386fba5d1863b09a3d28f0b5de007bb
SHA14d9a6370c756028b7b1366e1f946cf36e71b79a1
SHA256c23a04549540ee7035aa532fce49a0c78251833094a04f070d3fac9d30d05939
SHA512a26622139cfb595e3624a0985de9bc952d2a6a36780b236cfdb4149f892b8693478decbd961d2e07878fc0de71c1247a5d790bfbddf7dfef7718fed41aed2cde
-
C:\Users\Admin\AppData\Local\Temp\UaYzMSZOfaOg.batFilesize
207B
MD524020b2bd5d80efe96fb1a85b9b82ea6
SHA108935ed22ff53c77e810484e72caab987a83ae99
SHA25619922d6fb9d05cbbe5c52766c30984317ecef0fa75482ed5f4fbe780f51a00a0
SHA5129249632f24177f895b58fd74f510e57e5ee4f90b84d9f24300c72c8fedec4d295978888f97b40f909c3fa941d50822e4e145bf9b76bc24b555867b11021bb7d8
-
C:\Users\Admin\AppData\Local\Temp\ZAfIU05lAXvg.batFilesize
207B
MD5548e527414f3c3a9517299c52c34624b
SHA1cf5cfd2ef918cc4749ce7486d8c6989ef3fc1549
SHA2568439643419ee5ad61782ecd7bfa06b9ba64a4723222e56da4e7004e2e10ce527
SHA512267c6a1bc1adf57646cf15984e163db3b8b29800ef88d6730748edc389eaf3c4cac96673db4117104f01a24832ad9880b35333e3ca7b4d90defb1fd27acd64dc
-
C:\Users\Admin\AppData\Local\Temp\abrJoVcqfYha.batFilesize
207B
MD53ed9516d9f9c51e793ed655c706d046a
SHA1ba08ba94e23f853f136730e85a3203a170042540
SHA2561eceb32f2dc0ba97ba6485bb5cf0f0b6599602d2daf49123313b535efd9e8fd8
SHA5124b52edf9553924602e0b42c33b10ccb68516a2d0052d18d9680797031e5e628f1e19ed9a1760b182f5b3b8ca740a42dca3dae6624e6d4958a5b2f44cc4688499
-
C:\Users\Admin\AppData\Local\Temp\ek3Uos0T0vDs.batFilesize
207B
MD5df6d0f9a4e9cee3dbd127964498eb152
SHA138697fb82486007a00288171b56e9a1b1d3d0bc9
SHA2563972bd4471d5e32a7bfb59a41e22037e95bb7331a762abb1500faa227fbf9142
SHA512f86122b4bae772db19cc73f46fb63c3297db0b5351a96ca5555df4fe8621b7d596f9c0ad286e6f0ae8f05a05390ee23709106bb470f0c8a786c29b92b04f37eb
-
C:\Users\Admin\AppData\Local\Temp\nSanB5F4Pecw.batFilesize
207B
MD585dafa673e8b39e4450189d276b69afa
SHA1711d8561142cdebf45da88e79418efd2ae70df94
SHA2561d0d6563bca0825b0d2d9037a47b3fae63d360a9a851e5a33fb2730de44b65a0
SHA512fecfaf79b5a1b2fb411ae043cd818a7307f9da401c11c117c2c10615b81e7a6850064c31eaa3d6b193e8b043d1f7aaa02ba45c11f750140e79a50a80a0417f3c
-
C:\Users\Admin\AppData\Local\Temp\prfKr6u0IhmM.batFilesize
207B
MD5bcc100444b976443baaaa2c341da212b
SHA199ef1b3829a049f102c0ff0a94accf32a73c96b0
SHA25602a5b43d89ec56d283e90eaa635c8556ec537d5a0f010d6ebf641390ee9313c1
SHA51249851a92d08308e614790a1659db5803a4ee45df56445678359da381f7f6e71b0bc61d55dbc087c8c2eef0b187214510ed8ed2bcc44d6519d2c7866b41f59ce0
-
C:\Users\Admin\AppData\Local\Temp\rAon6FRDnPi5.batFilesize
207B
MD507562201490da5ae243142b8150fed69
SHA108d27c1b0b56555e9c3f07220297a5210aae810e
SHA25626b79cffd4362b0121eac044c2fd82ffd848e4924f79c5b4212c3d5930ff4906
SHA51206653be30cbea173a0eaf65df5141c8d6aa97fc3b6b499b2133cb5e0fb9990009d79de4c4c4cdc087eb3b44f80269cb9e3e487326821dc06af92ab49fda10788
-
C:\Users\Admin\AppData\Local\Temp\rQ6qn4xkS3zY.batFilesize
207B
MD577e231201980244c1f36a353c02e0403
SHA1a2e8107c5a855839255c292a9ddec43380e1b195
SHA256ec42dee687c614ae726cb2defdb9191330c300a41ead4bdd8b60e904d1975d34
SHA512ae586b1d8520bbbe479972bd201eba1ec28dbea71fa85a7a1df1e74f68e886ddd47f245da0d88f60906ab11be2f657b42d80c785802d0fccd2bc8dc752164efd
-
C:\Users\Admin\AppData\Local\Temp\sXwHcyYIgZLH.batFilesize
207B
MD555a1f2a845f553e7879c833c7c71502e
SHA19088cf92ed70544ff9b2b2953f59fddefa2daa37
SHA256ab5e01e018d994c90f6d876d71f18df562518bf4a974f471180dd734e4b7ae3f
SHA512a1acf5f1b1d54124442eb55def6d5e969d6b6c631a6fdf5c2258f2238a56f4487b3207a0edbf4b8a4b0b5a1ebbd02ee868722b0d45cf395c67c714ace4aff754
-
C:\Users\Admin\AppData\Local\Temp\v6Nbf58uNUMQ.batFilesize
207B
MD5160da2fb701650f8e575e396a0e9ee00
SHA1aa27a00c5d39774d1175f7a05230784e756bf0d9
SHA256ab05a2fbe1dde958f887ea85911f20c5431538d72aec4e322dd6a8b14a94fb2d
SHA512a3231a30532068d4218303643e1a6f09dcbc593a4ef446b1cabfce4f9f030a6fa8e5bc69fc420157f9b45c2f8e772b2293c053a86d415f8a7ae24ccfb7a3529a
-
C:\Users\Admin\AppData\Local\Temp\vJzx6coq7nDM.batFilesize
207B
MD5f57f7951e46ccaab18b669aa30269c97
SHA18f899088764bb08d0545eb7c9fe442b4dd7b66ac
SHA256b101c70dec31b328aa031a1f999441c32cb6eb82851502ad70406a21ca492cd2
SHA512a266fdb6d50e2047c4cf7cfa81cdeb399cda2c342c63ffd0dabbd332472f06f6b8b6dad3463cadfc766d1d421e4ef0cc4e1c2ad8cccef3905dd5a081210e271a
-
C:\Users\Admin\AppData\Local\Temp\vPWGn57EKeUC.batFilesize
207B
MD549d52241d744c132167d1324fa08a3e6
SHA186b63572710a1372ff3d36eeff2418b3024c2160
SHA2568492020ff9bdc195955a56015e14cd05ccfa726b54044d8a62c088229f9009e2
SHA512ec72ff4d5bb70440bcf7f9401815437176c82c4dbbae7fb8ab61c8925b3f605708c67236c0718fcb5dc94985c6e6232ab177b016afaffb863f6d10117d755686
-
C:\Users\Admin\AppData\Local\Temp\zQszxYuJQVek.batFilesize
207B
MD50518794500442532e5f992cdc52686ed
SHA1715704ee1e0c7120713fc5185b8da025a255357e
SHA25658f2c2e42aac5bbc3eabc8bcef32283b3354f3b50567eb668231d9c7a29f5105
SHA512051360913face8a508b5e5d330576b1c13c5b7a64ace6767fee649b7994b3cf98fbf0423588f2eb7c7439003c0b74ee3d16560aa3c82928a4db5e3e8916af1f5
-
C:\Users\Admin\AppData\Local\Temp\zYiQmSVre10T.batFilesize
207B
MD576aad9368e8e030ececf5bf1b2a12434
SHA17ecb64a9efff5efd572a436cad9a757937fa7ecf
SHA25649198b70b13800109422dc5daec25133bb38073a977ba843051d711b4968261d
SHA512162a120bb3993ebc20d30ad6b992e23f28ccb2aa7000678cf02fe43f9fd080fdb2f7cd42e2f034515c3392946b164a7317beb8a45a136ed171e4b8e60ce7511b
-
C:\Users\Admin\AppData\Roaming\Logs\06-15-2024Filesize
224B
MD5c04bcbafbbbbfb2678ac38aa55b0e33b
SHA14f6223697dd2caeba343126b627db879ca401f94
SHA2566074e248b3effa3deb9a9cc42c342838cc1301980a4b5934b20f2d3fb8b492ec
SHA51249d7c32cd83fa06edf1c1464c62445ff359ddba1754cc77c9d08a9db6a94303ca728e1c69d31e73c58130d1156ce77dd42059b9c9a184c212b25ba249bbb58d0
-
C:\Users\Admin\AppData\Roaming\Logs\06-15-2024Filesize
224B
MD553e13016480bb2e7c22b79e720534bde
SHA1ab8008bfc7ac6962ded46ad91f644c00b323effb
SHA256fc667bb2fb0f37d0c65e20daebfc476eee82ad965734a4cfd5cb6049651111bf
SHA5126e3d92433104f77ddb6173c440a08bcef88e85ec0d389404198332f135f88b9b0117d14ccfc8b74df02ec95813f80911f1f9a44679b62eeef10ab5415cdc8bb9
-
C:\Users\Admin\AppData\Roaming\Logs\06-15-2024Filesize
224B
MD544ae4c78fb1f5b57a479be2fb1b35c64
SHA11be63bb612281d7e6dc14d67fc6417013a405be7
SHA256da86a448c604f018c1f53aedeef089dc60beeb665befeeaa87517702b2a635bd
SHA51248ef7c4153178bf788736a041bcb99c234e3683c4f6670b829d9825e6acac9c62d9b24041fd6c8efc2157acf9918e4231472abda39e65c5aeb7675397c4694b1
-
C:\Users\Admin\AppData\Roaming\Logs\06-15-2024Filesize
224B
MD5e416f3ce2c8591040d9a31fa70b2cf27
SHA16da6a362aa339d7f6e9ce5040e8c50cef563cf28
SHA256dc475662f8c7cc42380aa7f5bef5621a31ec8f37da13b8db2bc73b0e875a8fe3
SHA51254c40274db9cbaf9b195934da543db1ddc4c1dc6bd61565ea7eb7ba38d418030e836f65de80736561da7d1ce1f1136a4d1e85652f3ff666304a44ab8e9ebbf20
-
C:\Users\Admin\AppData\Roaming\Logs\06-15-2024Filesize
224B
MD5f91b340a5bb0d71bd8bbe38de9e414b9
SHA1215487b1902d15f22fe55f5732220c976ca82162
SHA256af3534d23538f586c7c0d6fde68d4bfe033a266f17845596683acd4ef1886214
SHA5120afb0d5135ee5cdbc313ab3e4da083ae178ae8885c37922465933e1f531c4b3471acdd062bc474a6632c0c0e6c2bcab91ab6b9f838cb1bd7fcc99234de279b54
-
C:\Users\Admin\AppData\Roaming\Logs\06-15-2024Filesize
224B
MD57190907c9c384fdfb23fae045bad6cb8
SHA1946010cb8777ca23509f1c590232a4e7a22fb60c
SHA2566ca5ba33fd19d9e6a409ea03f8c03433c1554acdebd37c24c42fead37e4a4f57
SHA51296fd12d183a87c20a8f4b8ae3a2efcf040d9f1e09c3e75067a036bc2a7238ca75be26065598fa9ec899d9c7e8f412f063febc98228932dcddc901c88bb7ed510
-
C:\Users\Admin\AppData\Roaming\Logs\06-15-2024Filesize
224B
MD5b79b1fd2f8b9d529f9c16ac8faf930c1
SHA16698ffa25982e8746207c11f254f34fafc7dfadb
SHA25655861a5d8d9b88f310f57cc347da1c15945669a8876a87870361a29e7eddd802
SHA5120854e4a30d9d09038f334aecc0733a6d73684bf7908a72b825077880c1af40e32ee43108b9d02e6d2ece35ab2142fda95f33e1630aa77c48d22f8b2b80414304
-
C:\Users\Admin\AppData\Roaming\Logs\06-15-2024Filesize
224B
MD5acedbd8bc88752033d6fd39b476432df
SHA1f2c66595c14d341ac39d850fbf60a766876415f7
SHA256b49d455d78e3ec822c6af481cb28720fa238e0a92ae2141a21fe6e126a69caed
SHA5123cc2f573924db79064451c72581641e8959dcf8206f5efe5355574bb0d7d06d031070a6a9d102bcfcf50e7dc6c8464cf337a714c89aa88046de72195a1fadf1b
-
C:\Users\Admin\AppData\Roaming\Logs\06-15-2024Filesize
224B
MD5c62a9285436af7f9fd23a4007e083b45
SHA11d9193039de996d4cbb2b6c620ac9d7d98b53f44
SHA25617ce649c493fda493adbf29217b34d4d1a7e08811014710c2c56257922ab71ee
SHA512a103588ab2ada34579d43609c25209e3e84a0d0b8c0cd7bfac2748c8584a55720ce31b23e2d4db8f78530158a51c81bc5d2d72983c0d5ab3ea687a33ae8779ef
-
C:\Users\Admin\AppData\Roaming\Logs\06-15-2024MD5
d41d8cd98f00b204e9800998ecf8427e
SHA1da39a3ee5e6b4b0d3255bfef95601890afd80709
SHA256e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855
SHA512cf83e1357eefb8bdf1542850d66d8007d620e4050b5715dc83f4a921d36ce9ce47d0d13c5d85f2b0ff8318d2877eec2f63b931bd47417a81a538327af927da3e
-
C:\Users\Admin\AppData\Roaming\Logs\06-15-2024Filesize
224B
MD510df072dbd08159d7c49f7b479133da7
SHA18681b96aae99ccfa966a2fa6196a5dd9477869fd
SHA2565dbc90a2fa40464a5915bc43c0c93633e7bbfd1f9ffb07813c8880b663327c4d
SHA5123c7975176542b080e91e12e68ea14f87dd78da08365672095be1cf84ef0425998651ce06e82846ae31d84c18e0b6e2f9087ac4bbf0a8a63f0bee0cafa3ac5e86
-
C:\Users\Admin\AppData\Roaming\Logs\06-15-2024Filesize
224B
MD58d6daabec45a06ee1562ab4c287e7fcc
SHA1e4c12424d57846b54afbcbfea4ab3fbb6eb0eda8
SHA256f18905b7ce624189ddc461413a395304870b41f45ff087542da2935f4e88d67d
SHA512606fbb94d9462b15f3eb41ee9dc509e27fc28687a0a86bc4de20ecdf4240a71bca43fb3d6e0e3eec81d5b878323453c2880ee4ee5426876328c283b07e8d599a
-
C:\Users\Admin\AppData\Roaming\Logs\06-15-2024Filesize
224B
MD5161f12ce685b12d39017ffa457bd1ff2
SHA1f30aa1cbf3c97e1274346aa4694bb347a7e54424
SHA256555913c0010dd99cc2c05370b50537f8dd04dc803e351701fd4739698f364b3a
SHA512253b98618a9c1b559976ed98fae7b8f6700908d40493e1f07e755ea88eead47cf195133d9e691742da038ff3ddbfb5f39fa83a97f4f626a0fab477db92a9c6d5
-
C:\Users\Admin\AppData\Roaming\Logs\06-15-2024Filesize
224B
MD5a18ea136f518d642b91243c55d7a8866
SHA189a95c17012678d70bfb72b5dd085ef617ba3714
SHA2569aa7c9dc24958a8dff5df83963ec95adb0624a7f88748d634584e5e0d5da6894
SHA51255094bc75309818475d7c70063c917ce8f8af1887635b6614deed31c9457c21f159878aeb6a712fecc8820681d1efe3b941b5a7fc8644a4c7ba83156fbd0a99d
-
C:\Users\Admin\AppData\Roaming\Logs\06-15-2024Filesize
224B
MD559ed232c23f9a253a917ccf8b1b6b4a6
SHA11119702e7bac9c17319ce6b604c8b3a0a89e3814
SHA256b8126af8ade2f2fb0d5dcc7d8089930db319e22de38845428984cfb23da0f177
SHA512cda2a8c40a8dcbbe4262d266ce5edfc787fe2ccabba8bf33fa829e331581bf0f6cd759c037040f4fdb7fb13fb88617ceeae8fe5c525a6d6e57f1b381100163a2
-
C:\Users\Admin\AppData\Roaming\SubDir\Client.exeFilesize
409KB
MD5b70fdac25a99501e3cae11f1b775249e
SHA13c59226479bfdcd1b2927bcfb1a7516d4cb8dd71
SHA25651ff3eb450a786c1aaa75ff889f2fd256412a7b75d04277fdf9fcccc20e57246
SHA51243f0d5d6e5f0d5febba537c109ffdbc250bbb6e9725e635a43ec975b0353048eaeee50b6e9274cd5e072ea6b0cea32439bd37408b2528832f467f2075f74ca44
-
memory/1932-24-0x00000000753C0000-0x0000000075B70000-memory.dmpFilesize
7.7MB
-
memory/1932-15-0x00000000753C0000-0x0000000075B70000-memory.dmpFilesize
7.7MB
-
memory/1932-17-0x00000000753C0000-0x0000000075B70000-memory.dmpFilesize
7.7MB
-
memory/1932-19-0x0000000006EB0000-0x0000000006EBA000-memory.dmpFilesize
40KB
-
memory/4372-6-0x00000000063C0000-0x00000000063D2000-memory.dmpFilesize
72KB
-
memory/4372-4-0x00000000753C0000-0x0000000075B70000-memory.dmpFilesize
7.7MB
-
memory/4372-5-0x0000000005770000-0x00000000057D6000-memory.dmpFilesize
408KB
-
memory/4372-3-0x00000000055C0000-0x0000000005652000-memory.dmpFilesize
584KB
-
memory/4372-16-0x00000000753C0000-0x0000000075B70000-memory.dmpFilesize
7.7MB
-
memory/4372-0-0x00000000753CE000-0x00000000753CF000-memory.dmpFilesize
4KB
-
memory/4372-7-0x00000000753CE000-0x00000000753CF000-memory.dmpFilesize
4KB
-
memory/4372-8-0x00000000753C0000-0x0000000075B70000-memory.dmpFilesize
7.7MB
-
memory/4372-2-0x0000000005B70000-0x0000000006114000-memory.dmpFilesize
5.6MB
-
memory/4372-1-0x0000000000B40000-0x0000000000BAC000-memory.dmpFilesize
432KB