Overview
overview
10Static
static
10uni/Uni - ...py.exe
windows7-x64
10uni/Uni - ...py.exe
windows10-2004-x64
10uni/Uni - ...py.exe
windows7-x64
10uni/Uni - ...py.exe
windows10-2004-x64
10uni/Uni - ...py.exe
windows7-x64
10uni/Uni - ...py.exe
windows10-2004-x64
10uni/Uni - ...py.exe
windows7-x64
10uni/Uni - ...py.exe
windows10-2004-x64
10uni/Uni - ...py.exe
windows7-x64
10uni/Uni - ...py.exe
windows10-2004-x64
10uni/Uni - ...py.exe
windows7-x64
10uni/Uni - ...py.exe
windows10-2004-x64
10uni/Uni - ...py.exe
windows7-x64
10uni/Uni - ...py.exe
windows10-2004-x64
10uni/Uni - ...py.exe
windows7-x64
10uni/Uni - ...py.exe
windows10-2004-x64
10uni/Uni - ...py.exe
windows7-x64
10uni/Uni - ...py.exe
windows10-2004-x64
10uni/Uni - ...py.exe
windows7-x64
10uni/Uni - ...py.exe
windows10-2004-x64
10uni/Uni - ...py.exe
windows7-x64
10uni/Uni - ...py.exe
windows10-2004-x64
10uni/Uni - ...py.exe
windows7-x64
10uni/Uni - ...py.exe
windows10-2004-x64
10uni/Uni - ...py.exe
windows7-x64
10uni/Uni - ...py.exe
windows10-2004-x64
10uni/Uni - ...py.exe
windows7-x64
10uni/Uni - ...py.exe
windows10-2004-x64
10uni/Uni - ...py.exe
windows7-x64
10uni/Uni - ...py.exe
windows10-2004-x64
10uni/Uni - ...py.exe
windows7-x64
10uni/Uni - ...py.exe
windows10-2004-x64
10Analysis
-
max time kernel
591s -
max time network
608s -
platform
windows10-2004_x64 -
resource
win10v2004-20240508-en -
resource tags
arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system -
submitted
15-06-2024 07:35
Behavioral task
behavioral1
Sample
uni/Uni - Copy (10) - Copy - Copy - Copy - Copy.exe
Resource
win7-20240508-en
Behavioral task
behavioral2
Sample
uni/Uni - Copy (10) - Copy - Copy - Copy - Copy.exe
Resource
win10v2004-20240611-en
Behavioral task
behavioral3
Sample
uni/Uni - Copy (10) - Copy - Copy - Copy.exe
Resource
win7-20240611-en
Behavioral task
behavioral4
Sample
uni/Uni - Copy (10) - Copy - Copy - Copy.exe
Resource
win10v2004-20240611-en
Behavioral task
behavioral5
Sample
uni/Uni - Copy (10) - Copy - Copy.exe
Resource
win7-20240508-en
Behavioral task
behavioral6
Sample
uni/Uni - Copy (10) - Copy - Copy.exe
Resource
win10v2004-20240611-en
Behavioral task
behavioral7
Sample
uni/Uni - Copy (10) - Copy.exe
Resource
win7-20240508-en
Behavioral task
behavioral8
Sample
uni/Uni - Copy (10) - Copy.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral9
Sample
uni/Uni - Copy (100) - Copy - Copy - Copy - Copy.exe
Resource
win7-20240611-en
Behavioral task
behavioral10
Sample
uni/Uni - Copy (100) - Copy - Copy - Copy - Copy.exe
Resource
win10v2004-20240611-en
Behavioral task
behavioral11
Sample
uni/Uni - Copy (100) - Copy - Copy - Copy.exe
Resource
win7-20240508-en
Behavioral task
behavioral12
Sample
uni/Uni - Copy (100) - Copy - Copy - Copy.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral13
Sample
uni/Uni - Copy (100) - Copy - Copy.exe
Resource
win7-20240508-en
Behavioral task
behavioral14
Sample
uni/Uni - Copy (100) - Copy - Copy.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral15
Sample
uni/Uni - Copy (101) - Copy - Copy - Copy - Copy.exe
Resource
win7-20240508-en
Behavioral task
behavioral16
Sample
uni/Uni - Copy (101) - Copy - Copy - Copy - Copy.exe
Resource
win10v2004-20240611-en
Behavioral task
behavioral17
Sample
uni/Uni - Copy (101) - Copy - Copy - Copy.exe
Resource
win7-20231129-en
Behavioral task
behavioral18
Sample
uni/Uni - Copy (101) - Copy - Copy - Copy.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral19
Sample
uni/Uni - Copy (101) - Copy - Copy.exe
Resource
win7-20240611-en
Behavioral task
behavioral20
Sample
uni/Uni - Copy (101) - Copy - Copy.exe
Resource
win10v2004-20240611-en
Behavioral task
behavioral21
Sample
uni/Uni - Copy (102) - Copy - Copy - Copy.exe
Resource
win7-20240220-en
Behavioral task
behavioral22
Sample
uni/Uni - Copy (102) - Copy - Copy - Copy.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral23
Sample
uni/Uni - Copy (102) - Copy - Copy.exe
Resource
win7-20240611-en
Behavioral task
behavioral24
Sample
uni/Uni - Copy (102) - Copy - Copy.exe
Resource
win10v2004-20240611-en
Behavioral task
behavioral25
Sample
uni/Uni - Copy (103) - Copy - Copy - Copy.exe
Resource
win7-20240508-en
Behavioral task
behavioral26
Sample
uni/Uni - Copy (103) - Copy - Copy - Copy.exe
Resource
win10v2004-20240611-en
Behavioral task
behavioral27
Sample
uni/Uni - Copy (103) - Copy - Copy.exe
Resource
win7-20240508-en
Behavioral task
behavioral28
Sample
uni/Uni - Copy (103) - Copy - Copy.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral29
Sample
uni/Uni - Copy (104) - Copy - Copy - Copy.exe
Resource
win7-20240508-en
Behavioral task
behavioral30
Sample
uni/Uni - Copy (104) - Copy - Copy - Copy.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral31
Sample
uni/Uni - Copy (104) - Copy - Copy.exe
Resource
win7-20240221-en
General
-
Target
uni/Uni - Copy (103) - Copy - Copy.exe
-
Size
409KB
-
MD5
b70fdac25a99501e3cae11f1b775249e
-
SHA1
3c59226479bfdcd1b2927bcfb1a7516d4cb8dd71
-
SHA256
51ff3eb450a786c1aaa75ff889f2fd256412a7b75d04277fdf9fcccc20e57246
-
SHA512
43f0d5d6e5f0d5febba537c109ffdbc250bbb6e9725e635a43ec975b0353048eaeee50b6e9274cd5e072ea6b0cea32439bd37408b2528832f467f2075f74ca44
-
SSDEEP
12288:gpbJjGut6AoE3hVVdFaC/eZPTMTDlpgfJCKuMsVs:oVaurMLcDlpRKai
Malware Config
Extracted
quasar
3.1.5
SeroXen
panel-slave.gl.at.ply.gg:57059
panel-slave.gl.at.ply.gg:27892
$Sxr-rpL8EItHN3pqIQQVy2
-
encryption_key
Lme7VBS3l58VwLM69PNM
-
install_name
Client.exe
-
log_directory
Logs
-
reconnect_delay
3000
-
startup_key
SeroXen
-
subdirectory
SubDir
Signatures
-
Quasar payload 2 IoCs
Processes:
resource yara_rule behavioral28/memory/1948-1-0x0000000000AE0000-0x0000000000B4C000-memory.dmp family_quasar C:\Users\Admin\AppData\Roaming\SubDir\Client.exe family_quasar -
Checks computer location settings 2 TTPs 27 IoCs
Looks up country code configured in the registry, likely geofence.
Processes:
Client.exeClient.exeClient.exeClient.exeClient.exeClient.exeClient.exeClient.exeClient.exeClient.exeClient.exeClient.exeClient.exeClient.exeClient.exeClient.exeClient.exeClient.exeClient.exeClient.exeClient.exeClient.exeClient.exeClient.exeClient.exeClient.exeClient.exedescription ioc process Key value queried \REGISTRY\USER\S-1-5-21-1181767204-2009306918-3718769404-1000\Control Panel\International\Geo\Nation Client.exe Key value queried \REGISTRY\USER\S-1-5-21-1181767204-2009306918-3718769404-1000\Control Panel\International\Geo\Nation Client.exe Key value queried \REGISTRY\USER\S-1-5-21-1181767204-2009306918-3718769404-1000\Control Panel\International\Geo\Nation Client.exe Key value queried \REGISTRY\USER\S-1-5-21-1181767204-2009306918-3718769404-1000\Control Panel\International\Geo\Nation Client.exe Key value queried \REGISTRY\USER\S-1-5-21-1181767204-2009306918-3718769404-1000\Control Panel\International\Geo\Nation Client.exe Key value queried \REGISTRY\USER\S-1-5-21-1181767204-2009306918-3718769404-1000\Control Panel\International\Geo\Nation Client.exe Key value queried \REGISTRY\USER\S-1-5-21-1181767204-2009306918-3718769404-1000\Control Panel\International\Geo\Nation Client.exe Key value queried \REGISTRY\USER\S-1-5-21-1181767204-2009306918-3718769404-1000\Control Panel\International\Geo\Nation Client.exe Key value queried \REGISTRY\USER\S-1-5-21-1181767204-2009306918-3718769404-1000\Control Panel\International\Geo\Nation Client.exe Key value queried \REGISTRY\USER\S-1-5-21-1181767204-2009306918-3718769404-1000\Control Panel\International\Geo\Nation Client.exe Key value queried \REGISTRY\USER\S-1-5-21-1181767204-2009306918-3718769404-1000\Control Panel\International\Geo\Nation Client.exe Key value queried \REGISTRY\USER\S-1-5-21-1181767204-2009306918-3718769404-1000\Control Panel\International\Geo\Nation Client.exe Key value queried \REGISTRY\USER\S-1-5-21-1181767204-2009306918-3718769404-1000\Control Panel\International\Geo\Nation Client.exe Key value queried \REGISTRY\USER\S-1-5-21-1181767204-2009306918-3718769404-1000\Control Panel\International\Geo\Nation Client.exe Key value queried \REGISTRY\USER\S-1-5-21-1181767204-2009306918-3718769404-1000\Control Panel\International\Geo\Nation Client.exe Key value queried \REGISTRY\USER\S-1-5-21-1181767204-2009306918-3718769404-1000\Control Panel\International\Geo\Nation Client.exe Key value queried \REGISTRY\USER\S-1-5-21-1181767204-2009306918-3718769404-1000\Control Panel\International\Geo\Nation Client.exe Key value queried \REGISTRY\USER\S-1-5-21-1181767204-2009306918-3718769404-1000\Control Panel\International\Geo\Nation Client.exe Key value queried \REGISTRY\USER\S-1-5-21-1181767204-2009306918-3718769404-1000\Control Panel\International\Geo\Nation Client.exe Key value queried \REGISTRY\USER\S-1-5-21-1181767204-2009306918-3718769404-1000\Control Panel\International\Geo\Nation Client.exe Key value queried \REGISTRY\USER\S-1-5-21-1181767204-2009306918-3718769404-1000\Control Panel\International\Geo\Nation Client.exe Key value queried \REGISTRY\USER\S-1-5-21-1181767204-2009306918-3718769404-1000\Control Panel\International\Geo\Nation Client.exe Key value queried \REGISTRY\USER\S-1-5-21-1181767204-2009306918-3718769404-1000\Control Panel\International\Geo\Nation Client.exe Key value queried \REGISTRY\USER\S-1-5-21-1181767204-2009306918-3718769404-1000\Control Panel\International\Geo\Nation Client.exe Key value queried \REGISTRY\USER\S-1-5-21-1181767204-2009306918-3718769404-1000\Control Panel\International\Geo\Nation Client.exe Key value queried \REGISTRY\USER\S-1-5-21-1181767204-2009306918-3718769404-1000\Control Panel\International\Geo\Nation Client.exe Key value queried \REGISTRY\USER\S-1-5-21-1181767204-2009306918-3718769404-1000\Control Panel\International\Geo\Nation Client.exe -
Executes dropped EXE 28 IoCs
Processes:
Client.exeClient.exeClient.exeClient.exeClient.exeClient.exeClient.exeClient.exeClient.exeClient.exeClient.exeClient.exeClient.exeClient.exeClient.exeClient.exeClient.exeClient.exeClient.exeClient.exeClient.exeClient.exeClient.exeClient.exeClient.exeClient.exeClient.exeClient.exepid process 4252 Client.exe 4332 Client.exe 4128 Client.exe 2408 Client.exe 4132 Client.exe 1948 Client.exe 832 Client.exe 808 Client.exe 4012 Client.exe 3124 Client.exe 1852 Client.exe 740 Client.exe 4416 Client.exe 116 Client.exe 1008 Client.exe 4864 Client.exe 4128 Client.exe 396 Client.exe 692 Client.exe 2024 Client.exe 2280 Client.exe 4416 Client.exe 1896 Client.exe 456 Client.exe 4740 Client.exe 3228 Client.exe 2784 Client.exe 2376 Client.exe -
Adds Run key to start application 2 TTPs 1 IoCs
Processes:
Client.exedescription ioc process Set value (str) \REGISTRY\USER\S-1-5-21-1181767204-2009306918-3718769404-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\SeroXen = "\"C:\\Users\\Admin\\AppData\\Roaming\\SubDir\\Client.exe\"" Client.exe -
Looks up external IP address via web service 27 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
Processes:
flow ioc 11 api.ipify.org 47 ip-api.com 43 ip-api.com 74 ip-api.com 79 ip-api.com 89 ip-api.com 3 ip-api.com 34 ip-api.com 82 ip-api.com 59 ip-api.com 77 ip-api.com 40 ip-api.com 64 ip-api.com 13 ip-api.com 36 ip-api.com 49 ip-api.com 38 ip-api.com 57 ip-api.com 61 ip-api.com 16 ip-api.com 20 ip-api.com 86 ip-api.com 28 ip-api.com 53 ip-api.com 84 ip-api.com 18 ip-api.com 45 ip-api.com -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Program crash 27 IoCs
Processes:
WerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exepid pid_target process target process 4536 4252 WerFault.exe Client.exe 3100 4332 WerFault.exe Client.exe 3680 4128 WerFault.exe Client.exe 5020 2408 WerFault.exe Client.exe 3164 4132 WerFault.exe Client.exe 4172 1948 WerFault.exe Client.exe 4080 832 WerFault.exe Client.exe 740 808 WerFault.exe Client.exe 1120 4012 WerFault.exe Client.exe 2852 3124 WerFault.exe Client.exe 5112 1852 WerFault.exe Client.exe 2496 740 WerFault.exe Client.exe 1796 4416 WerFault.exe Client.exe 2132 116 WerFault.exe Client.exe 2964 1008 WerFault.exe Client.exe 536 4864 WerFault.exe Client.exe 2944 4128 WerFault.exe Client.exe 4904 396 WerFault.exe Client.exe 1472 692 WerFault.exe Client.exe 3176 2024 WerFault.exe Client.exe 3928 2280 WerFault.exe Client.exe 1724 4416 WerFault.exe Client.exe 2612 1896 WerFault.exe Client.exe 3496 456 WerFault.exe Client.exe 3284 4740 WerFault.exe Client.exe 2852 3228 WerFault.exe Client.exe 3856 2784 WerFault.exe Client.exe -
Creates scheduled task(s) 1 TTPs 29 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
Processes:
schtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeSCHTASKS.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exepid process 4324 schtasks.exe 944 schtasks.exe 3656 schtasks.exe 3088 schtasks.exe 3144 schtasks.exe 4000 schtasks.exe 3584 schtasks.exe 5112 schtasks.exe 3932 schtasks.exe 2316 schtasks.exe 3960 schtasks.exe 3600 schtasks.exe 3876 schtasks.exe 4548 schtasks.exe 4784 SCHTASKS.exe 3452 schtasks.exe 4636 schtasks.exe 3404 schtasks.exe 2916 schtasks.exe 2516 schtasks.exe 3080 schtasks.exe 2672 schtasks.exe 3828 schtasks.exe 4664 schtasks.exe 4080 schtasks.exe 4856 schtasks.exe 2884 schtasks.exe 1804 schtasks.exe 3504 schtasks.exe -
Runs ping.exe 1 TTPs 27 IoCs
Processes:
PING.EXEPING.EXEPING.EXEPING.EXEPING.EXEPING.EXEPING.EXEPING.EXEPING.EXEPING.EXEPING.EXEPING.EXEPING.EXEPING.EXEPING.EXEPING.EXEPING.EXEPING.EXEPING.EXEPING.EXEPING.EXEPING.EXEPING.EXEPING.EXEPING.EXEPING.EXEPING.EXEpid process 3988 PING.EXE 4924 PING.EXE 916 PING.EXE 560 PING.EXE 3916 PING.EXE 4340 PING.EXE 4416 PING.EXE 4956 PING.EXE 944 PING.EXE 1640 PING.EXE 764 PING.EXE 1592 PING.EXE 4776 PING.EXE 2852 PING.EXE 4828 PING.EXE 2276 PING.EXE 2516 PING.EXE 5032 PING.EXE 1400 PING.EXE 2872 PING.EXE 868 PING.EXE 2004 PING.EXE 4176 PING.EXE 3164 PING.EXE 1608 PING.EXE 2728 PING.EXE 3148 PING.EXE -
Suspicious use of AdjustPrivilegeToken 29 IoCs
Processes:
Uni - Copy (103) - Copy - Copy.exeClient.exeClient.exeClient.exeClient.exeClient.exeClient.exeClient.exeClient.exeClient.exeClient.exeClient.exeClient.exeClient.exeClient.exeClient.exeClient.exeClient.exeClient.exeClient.exeClient.exeClient.exeClient.exeClient.exeClient.exeClient.exeClient.exeClient.exeClient.exedescription pid process Token: SeDebugPrivilege 1948 Uni - Copy (103) - Copy - Copy.exe Token: SeDebugPrivilege 4252 Client.exe Token: SeDebugPrivilege 4332 Client.exe Token: SeDebugPrivilege 4128 Client.exe Token: SeDebugPrivilege 2408 Client.exe Token: SeDebugPrivilege 4132 Client.exe Token: SeDebugPrivilege 1948 Client.exe Token: SeDebugPrivilege 832 Client.exe Token: SeDebugPrivilege 808 Client.exe Token: SeDebugPrivilege 4012 Client.exe Token: SeDebugPrivilege 3124 Client.exe Token: SeDebugPrivilege 1852 Client.exe Token: SeDebugPrivilege 740 Client.exe Token: SeDebugPrivilege 4416 Client.exe Token: SeDebugPrivilege 116 Client.exe Token: SeDebugPrivilege 1008 Client.exe Token: SeDebugPrivilege 4864 Client.exe Token: SeDebugPrivilege 4128 Client.exe Token: SeDebugPrivilege 396 Client.exe Token: SeDebugPrivilege 692 Client.exe Token: SeDebugPrivilege 2024 Client.exe Token: SeDebugPrivilege 2280 Client.exe Token: SeDebugPrivilege 4416 Client.exe Token: SeDebugPrivilege 1896 Client.exe Token: SeDebugPrivilege 456 Client.exe Token: SeDebugPrivilege 4740 Client.exe Token: SeDebugPrivilege 3228 Client.exe Token: SeDebugPrivilege 2784 Client.exe Token: SeDebugPrivilege 2376 Client.exe -
Suspicious use of SetWindowsHookEx 27 IoCs
Processes:
Client.exeClient.exeClient.exeClient.exeClient.exeClient.exeClient.exeClient.exeClient.exeClient.exeClient.exeClient.exeClient.exeClient.exeClient.exeClient.exeClient.exeClient.exeClient.exeClient.exeClient.exeClient.exeClient.exeClient.exeClient.exeClient.exeClient.exepid process 4252 Client.exe 4332 Client.exe 4128 Client.exe 2408 Client.exe 4132 Client.exe 1948 Client.exe 832 Client.exe 808 Client.exe 4012 Client.exe 3124 Client.exe 1852 Client.exe 740 Client.exe 4416 Client.exe 116 Client.exe 1008 Client.exe 4864 Client.exe 4128 Client.exe 396 Client.exe 692 Client.exe 2024 Client.exe 2280 Client.exe 4416 Client.exe 1896 Client.exe 456 Client.exe 4740 Client.exe 3228 Client.exe 2784 Client.exe -
Suspicious use of WriteProcessMemory 64 IoCs
Processes:
Uni - Copy (103) - Copy - Copy.exeClient.execmd.exeClient.execmd.exeClient.execmd.exeClient.execmd.exedescription pid process target process PID 1948 wrote to memory of 4324 1948 Uni - Copy (103) - Copy - Copy.exe schtasks.exe PID 1948 wrote to memory of 4324 1948 Uni - Copy (103) - Copy - Copy.exe schtasks.exe PID 1948 wrote to memory of 4324 1948 Uni - Copy (103) - Copy - Copy.exe schtasks.exe PID 1948 wrote to memory of 4252 1948 Uni - Copy (103) - Copy - Copy.exe Client.exe PID 1948 wrote to memory of 4252 1948 Uni - Copy (103) - Copy - Copy.exe Client.exe PID 1948 wrote to memory of 4252 1948 Uni - Copy (103) - Copy - Copy.exe Client.exe PID 1948 wrote to memory of 4784 1948 Uni - Copy (103) - Copy - Copy.exe SCHTASKS.exe PID 1948 wrote to memory of 4784 1948 Uni - Copy (103) - Copy - Copy.exe SCHTASKS.exe PID 1948 wrote to memory of 4784 1948 Uni - Copy (103) - Copy - Copy.exe SCHTASKS.exe PID 4252 wrote to memory of 3404 4252 Client.exe schtasks.exe PID 4252 wrote to memory of 3404 4252 Client.exe schtasks.exe PID 4252 wrote to memory of 3404 4252 Client.exe schtasks.exe PID 4252 wrote to memory of 2356 4252 Client.exe cmd.exe PID 4252 wrote to memory of 2356 4252 Client.exe cmd.exe PID 4252 wrote to memory of 2356 4252 Client.exe cmd.exe PID 2356 wrote to memory of 3588 2356 cmd.exe chcp.com PID 2356 wrote to memory of 3588 2356 cmd.exe chcp.com PID 2356 wrote to memory of 3588 2356 cmd.exe chcp.com PID 2356 wrote to memory of 944 2356 cmd.exe PING.EXE PID 2356 wrote to memory of 944 2356 cmd.exe PING.EXE PID 2356 wrote to memory of 944 2356 cmd.exe PING.EXE PID 2356 wrote to memory of 4332 2356 cmd.exe Client.exe PID 2356 wrote to memory of 4332 2356 cmd.exe Client.exe PID 2356 wrote to memory of 4332 2356 cmd.exe Client.exe PID 4332 wrote to memory of 2916 4332 Client.exe schtasks.exe PID 4332 wrote to memory of 2916 4332 Client.exe schtasks.exe PID 4332 wrote to memory of 2916 4332 Client.exe schtasks.exe PID 4332 wrote to memory of 4224 4332 Client.exe cmd.exe PID 4332 wrote to memory of 4224 4332 Client.exe cmd.exe PID 4332 wrote to memory of 4224 4332 Client.exe cmd.exe PID 4224 wrote to memory of 4324 4224 cmd.exe chcp.com PID 4224 wrote to memory of 4324 4224 cmd.exe chcp.com PID 4224 wrote to memory of 4324 4224 cmd.exe chcp.com PID 4224 wrote to memory of 3164 4224 cmd.exe PING.EXE PID 4224 wrote to memory of 3164 4224 cmd.exe PING.EXE PID 4224 wrote to memory of 3164 4224 cmd.exe PING.EXE PID 4224 wrote to memory of 4128 4224 cmd.exe Client.exe PID 4224 wrote to memory of 4128 4224 cmd.exe Client.exe PID 4224 wrote to memory of 4128 4224 cmd.exe Client.exe PID 4128 wrote to memory of 2672 4128 Client.exe schtasks.exe PID 4128 wrote to memory of 2672 4128 Client.exe schtasks.exe PID 4128 wrote to memory of 2672 4128 Client.exe schtasks.exe PID 4128 wrote to memory of 2368 4128 Client.exe cmd.exe PID 4128 wrote to memory of 2368 4128 Client.exe cmd.exe PID 4128 wrote to memory of 2368 4128 Client.exe cmd.exe PID 2368 wrote to memory of 4440 2368 cmd.exe chcp.com PID 2368 wrote to memory of 4440 2368 cmd.exe chcp.com PID 2368 wrote to memory of 4440 2368 cmd.exe chcp.com PID 2368 wrote to memory of 1640 2368 cmd.exe PING.EXE PID 2368 wrote to memory of 1640 2368 cmd.exe PING.EXE PID 2368 wrote to memory of 1640 2368 cmd.exe PING.EXE PID 2368 wrote to memory of 2408 2368 cmd.exe Client.exe PID 2368 wrote to memory of 2408 2368 cmd.exe Client.exe PID 2368 wrote to memory of 2408 2368 cmd.exe Client.exe PID 2408 wrote to memory of 944 2408 Client.exe schtasks.exe PID 2408 wrote to memory of 944 2408 Client.exe schtasks.exe PID 2408 wrote to memory of 944 2408 Client.exe schtasks.exe PID 2408 wrote to memory of 2192 2408 Client.exe cmd.exe PID 2408 wrote to memory of 2192 2408 Client.exe cmd.exe PID 2408 wrote to memory of 2192 2408 Client.exe cmd.exe PID 2192 wrote to memory of 1880 2192 cmd.exe chcp.com PID 2192 wrote to memory of 1880 2192 cmd.exe chcp.com PID 2192 wrote to memory of 1880 2192 cmd.exe chcp.com PID 2192 wrote to memory of 2852 2192 cmd.exe PING.EXE
Processes
-
C:\Users\Admin\AppData\Local\Temp\uni\Uni - Copy (103) - Copy - Copy.exe"C:\Users\Admin\AppData\Local\Temp\uni\Uni - Copy (103) - Copy - Copy.exe"1⤵
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\schtasks.exe"schtasks" /create /tn "SeroXen" /sc ONLOGON /tr "C:\Users\Admin\AppData\Local\Temp\uni\Uni - Copy (103) - Copy - Copy.exe" /rl HIGHEST /f2⤵
- Creates scheduled task(s)
-
C:\Users\Admin\AppData\Roaming\SubDir\Client.exe"C:\Users\Admin\AppData\Roaming\SubDir\Client.exe"2⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\schtasks.exe"schtasks" /create /tn "SeroXen" /sc ONLOGON /tr "C:\Users\Admin\AppData\Roaming\SubDir\Client.exe" /rl HIGHEST /f3⤵
- Creates scheduled task(s)
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\cRWhMUPHm7O6.bat" "3⤵
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\chcp.comchcp 650014⤵
-
C:\Windows\SysWOW64\PING.EXEping -n 10 localhost4⤵
- Runs ping.exe
-
C:\Users\Admin\AppData\Roaming\SubDir\Client.exe"C:\Users\Admin\AppData\Roaming\SubDir\Client.exe"4⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\schtasks.exe"schtasks" /create /tn "SeroXen" /sc ONLOGON /tr "C:\Users\Admin\AppData\Roaming\SubDir\Client.exe" /rl HIGHEST /f5⤵
- Creates scheduled task(s)
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\zpvIPTEZbFTn.bat" "5⤵
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\chcp.comchcp 650016⤵
-
C:\Windows\SysWOW64\PING.EXEping -n 10 localhost6⤵
- Runs ping.exe
-
C:\Users\Admin\AppData\Roaming\SubDir\Client.exe"C:\Users\Admin\AppData\Roaming\SubDir\Client.exe"6⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\schtasks.exe"schtasks" /create /tn "SeroXen" /sc ONLOGON /tr "C:\Users\Admin\AppData\Roaming\SubDir\Client.exe" /rl HIGHEST /f7⤵
- Creates scheduled task(s)
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\pfZkZDW9Q72g.bat" "7⤵
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\chcp.comchcp 650018⤵
-
C:\Windows\SysWOW64\PING.EXEping -n 10 localhost8⤵
- Runs ping.exe
-
C:\Users\Admin\AppData\Roaming\SubDir\Client.exe"C:\Users\Admin\AppData\Roaming\SubDir\Client.exe"8⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\schtasks.exe"schtasks" /create /tn "SeroXen" /sc ONLOGON /tr "C:\Users\Admin\AppData\Roaming\SubDir\Client.exe" /rl HIGHEST /f9⤵
- Creates scheduled task(s)
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\J4pfRx1eqFtx.bat" "9⤵
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\chcp.comchcp 6500110⤵
-
C:\Windows\SysWOW64\PING.EXEping -n 10 localhost10⤵
- Runs ping.exe
-
C:\Users\Admin\AppData\Roaming\SubDir\Client.exe"C:\Users\Admin\AppData\Roaming\SubDir\Client.exe"10⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
-
C:\Windows\SysWOW64\schtasks.exe"schtasks" /create /tn "SeroXen" /sc ONLOGON /tr "C:\Users\Admin\AppData\Roaming\SubDir\Client.exe" /rl HIGHEST /f11⤵
- Creates scheduled task(s)
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\Nl6QJzComgFo.bat" "11⤵
-
C:\Windows\SysWOW64\chcp.comchcp 6500112⤵
-
C:\Windows\SysWOW64\PING.EXEping -n 10 localhost12⤵
- Runs ping.exe
-
C:\Users\Admin\AppData\Roaming\SubDir\Client.exe"C:\Users\Admin\AppData\Roaming\SubDir\Client.exe"12⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
-
C:\Windows\SysWOW64\schtasks.exe"schtasks" /create /tn "SeroXen" /sc ONLOGON /tr "C:\Users\Admin\AppData\Roaming\SubDir\Client.exe" /rl HIGHEST /f13⤵
- Creates scheduled task(s)
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\idb3p3lbTEpM.bat" "13⤵
-
C:\Windows\SysWOW64\chcp.comchcp 6500114⤵
-
C:\Windows\SysWOW64\PING.EXEping -n 10 localhost14⤵
- Runs ping.exe
-
C:\Users\Admin\AppData\Roaming\SubDir\Client.exe"C:\Users\Admin\AppData\Roaming\SubDir\Client.exe"14⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
-
C:\Windows\SysWOW64\schtasks.exe"schtasks" /create /tn "SeroXen" /sc ONLOGON /tr "C:\Users\Admin\AppData\Roaming\SubDir\Client.exe" /rl HIGHEST /f15⤵
- Creates scheduled task(s)
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\sqpNF2iAbQm2.bat" "15⤵
-
C:\Windows\SysWOW64\chcp.comchcp 6500116⤵
-
C:\Windows\SysWOW64\PING.EXEping -n 10 localhost16⤵
- Runs ping.exe
-
C:\Users\Admin\AppData\Roaming\SubDir\Client.exe"C:\Users\Admin\AppData\Roaming\SubDir\Client.exe"16⤵
- Checks computer location settings
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
-
C:\Windows\SysWOW64\schtasks.exe"schtasks" /create /tn "SeroXen" /sc ONLOGON /tr "C:\Users\Admin\AppData\Roaming\SubDir\Client.exe" /rl HIGHEST /f17⤵
- Creates scheduled task(s)
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\c4ZvNnzsbqPj.bat" "17⤵
-
C:\Windows\SysWOW64\chcp.comchcp 6500118⤵
-
C:\Windows\SysWOW64\PING.EXEping -n 10 localhost18⤵
- Runs ping.exe
-
C:\Users\Admin\AppData\Roaming\SubDir\Client.exe"C:\Users\Admin\AppData\Roaming\SubDir\Client.exe"18⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
-
C:\Windows\SysWOW64\schtasks.exe"schtasks" /create /tn "SeroXen" /sc ONLOGON /tr "C:\Users\Admin\AppData\Roaming\SubDir\Client.exe" /rl HIGHEST /f19⤵
- Creates scheduled task(s)
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\2S16ToK4VAZ5.bat" "19⤵
-
C:\Windows\SysWOW64\chcp.comchcp 6500120⤵
-
C:\Windows\SysWOW64\PING.EXEping -n 10 localhost20⤵
- Runs ping.exe
-
C:\Users\Admin\AppData\Roaming\SubDir\Client.exe"C:\Users\Admin\AppData\Roaming\SubDir\Client.exe"20⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
-
C:\Windows\SysWOW64\schtasks.exe"schtasks" /create /tn "SeroXen" /sc ONLOGON /tr "C:\Users\Admin\AppData\Roaming\SubDir\Client.exe" /rl HIGHEST /f21⤵
- Creates scheduled task(s)
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\pXfhmnqHOOVv.bat" "21⤵
-
C:\Windows\SysWOW64\chcp.comchcp 6500122⤵
-
C:\Windows\SysWOW64\PING.EXEping -n 10 localhost22⤵
- Runs ping.exe
-
C:\Users\Admin\AppData\Roaming\SubDir\Client.exe"C:\Users\Admin\AppData\Roaming\SubDir\Client.exe"22⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
-
C:\Windows\SysWOW64\schtasks.exe"schtasks" /create /tn "SeroXen" /sc ONLOGON /tr "C:\Users\Admin\AppData\Roaming\SubDir\Client.exe" /rl HIGHEST /f23⤵
- Creates scheduled task(s)
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\OStACV7B0Iw0.bat" "23⤵
-
C:\Windows\SysWOW64\chcp.comchcp 6500124⤵
-
C:\Windows\SysWOW64\PING.EXEping -n 10 localhost24⤵
- Runs ping.exe
-
C:\Users\Admin\AppData\Roaming\SubDir\Client.exe"C:\Users\Admin\AppData\Roaming\SubDir\Client.exe"24⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
-
C:\Windows\SysWOW64\schtasks.exe"schtasks" /create /tn "SeroXen" /sc ONLOGON /tr "C:\Users\Admin\AppData\Roaming\SubDir\Client.exe" /rl HIGHEST /f25⤵
- Creates scheduled task(s)
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\iGeHqMLDHxqy.bat" "25⤵
-
C:\Windows\SysWOW64\chcp.comchcp 6500126⤵
-
C:\Windows\SysWOW64\PING.EXEping -n 10 localhost26⤵
- Runs ping.exe
-
C:\Users\Admin\AppData\Roaming\SubDir\Client.exe"C:\Users\Admin\AppData\Roaming\SubDir\Client.exe"26⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
-
C:\Windows\SysWOW64\schtasks.exe"schtasks" /create /tn "SeroXen" /sc ONLOGON /tr "C:\Users\Admin\AppData\Roaming\SubDir\Client.exe" /rl HIGHEST /f27⤵
- Creates scheduled task(s)
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\hRxU9Sky0cc2.bat" "27⤵
-
C:\Windows\SysWOW64\chcp.comchcp 6500128⤵
-
C:\Windows\SysWOW64\PING.EXEping -n 10 localhost28⤵
- Runs ping.exe
-
C:\Users\Admin\AppData\Roaming\SubDir\Client.exe"C:\Users\Admin\AppData\Roaming\SubDir\Client.exe"28⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
-
C:\Windows\SysWOW64\schtasks.exe"schtasks" /create /tn "SeroXen" /sc ONLOGON /tr "C:\Users\Admin\AppData\Roaming\SubDir\Client.exe" /rl HIGHEST /f29⤵
- Creates scheduled task(s)
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\Yyo78BgpfiU7.bat" "29⤵
-
C:\Windows\SysWOW64\chcp.comchcp 6500130⤵
-
C:\Windows\SysWOW64\PING.EXEping -n 10 localhost30⤵
- Runs ping.exe
-
C:\Users\Admin\AppData\Roaming\SubDir\Client.exe"C:\Users\Admin\AppData\Roaming\SubDir\Client.exe"30⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
-
C:\Windows\SysWOW64\schtasks.exe"schtasks" /create /tn "SeroXen" /sc ONLOGON /tr "C:\Users\Admin\AppData\Roaming\SubDir\Client.exe" /rl HIGHEST /f31⤵
- Creates scheduled task(s)
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\7t3aZtxjIbvC.bat" "31⤵
-
C:\Windows\SysWOW64\chcp.comchcp 6500132⤵
-
C:\Windows\SysWOW64\PING.EXEping -n 10 localhost32⤵
- Runs ping.exe
-
C:\Users\Admin\AppData\Roaming\SubDir\Client.exe"C:\Users\Admin\AppData\Roaming\SubDir\Client.exe"32⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
-
C:\Windows\SysWOW64\schtasks.exe"schtasks" /create /tn "SeroXen" /sc ONLOGON /tr "C:\Users\Admin\AppData\Roaming\SubDir\Client.exe" /rl HIGHEST /f33⤵
- Creates scheduled task(s)
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\eJ7EEOcXEYTM.bat" "33⤵
-
C:\Windows\SysWOW64\chcp.comchcp 6500134⤵
-
C:\Windows\SysWOW64\PING.EXEping -n 10 localhost34⤵
- Runs ping.exe
-
C:\Users\Admin\AppData\Roaming\SubDir\Client.exe"C:\Users\Admin\AppData\Roaming\SubDir\Client.exe"34⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
-
C:\Windows\SysWOW64\schtasks.exe"schtasks" /create /tn "SeroXen" /sc ONLOGON /tr "C:\Users\Admin\AppData\Roaming\SubDir\Client.exe" /rl HIGHEST /f35⤵
- Creates scheduled task(s)
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\TtveIakqojI7.bat" "35⤵
-
C:\Windows\SysWOW64\chcp.comchcp 6500136⤵
-
C:\Windows\SysWOW64\PING.EXEping -n 10 localhost36⤵
- Runs ping.exe
-
C:\Users\Admin\AppData\Roaming\SubDir\Client.exe"C:\Users\Admin\AppData\Roaming\SubDir\Client.exe"36⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
-
C:\Windows\SysWOW64\schtasks.exe"schtasks" /create /tn "SeroXen" /sc ONLOGON /tr "C:\Users\Admin\AppData\Roaming\SubDir\Client.exe" /rl HIGHEST /f37⤵
- Creates scheduled task(s)
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\9OrBAQ8t4Iza.bat" "37⤵
-
C:\Windows\SysWOW64\chcp.comchcp 6500138⤵
-
C:\Windows\SysWOW64\PING.EXEping -n 10 localhost38⤵
- Runs ping.exe
-
C:\Users\Admin\AppData\Roaming\SubDir\Client.exe"C:\Users\Admin\AppData\Roaming\SubDir\Client.exe"38⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
-
C:\Windows\SysWOW64\schtasks.exe"schtasks" /create /tn "SeroXen" /sc ONLOGON /tr "C:\Users\Admin\AppData\Roaming\SubDir\Client.exe" /rl HIGHEST /f39⤵
- Creates scheduled task(s)
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\6UQsaJCtM364.bat" "39⤵
-
C:\Windows\SysWOW64\chcp.comchcp 6500140⤵
-
C:\Windows\SysWOW64\PING.EXEping -n 10 localhost40⤵
- Runs ping.exe
-
C:\Users\Admin\AppData\Roaming\SubDir\Client.exe"C:\Users\Admin\AppData\Roaming\SubDir\Client.exe"40⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
-
C:\Windows\SysWOW64\schtasks.exe"schtasks" /create /tn "SeroXen" /sc ONLOGON /tr "C:\Users\Admin\AppData\Roaming\SubDir\Client.exe" /rl HIGHEST /f41⤵
- Creates scheduled task(s)
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\pwQdMhPVhXpr.bat" "41⤵
-
C:\Windows\SysWOW64\chcp.comchcp 6500142⤵
-
C:\Windows\SysWOW64\PING.EXEping -n 10 localhost42⤵
- Runs ping.exe
-
C:\Users\Admin\AppData\Roaming\SubDir\Client.exe"C:\Users\Admin\AppData\Roaming\SubDir\Client.exe"42⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
-
C:\Windows\SysWOW64\schtasks.exe"schtasks" /create /tn "SeroXen" /sc ONLOGON /tr "C:\Users\Admin\AppData\Roaming\SubDir\Client.exe" /rl HIGHEST /f43⤵
- Creates scheduled task(s)
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\PvObgb1AlKvV.bat" "43⤵
-
C:\Windows\SysWOW64\chcp.comchcp 6500144⤵
-
C:\Windows\SysWOW64\PING.EXEping -n 10 localhost44⤵
- Runs ping.exe
-
C:\Users\Admin\AppData\Roaming\SubDir\Client.exe"C:\Users\Admin\AppData\Roaming\SubDir\Client.exe"44⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
-
C:\Windows\SysWOW64\schtasks.exe"schtasks" /create /tn "SeroXen" /sc ONLOGON /tr "C:\Users\Admin\AppData\Roaming\SubDir\Client.exe" /rl HIGHEST /f45⤵
- Creates scheduled task(s)
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\gAFOf4IMv8Hz.bat" "45⤵
-
C:\Windows\SysWOW64\chcp.comchcp 6500146⤵
-
C:\Windows\SysWOW64\PING.EXEping -n 10 localhost46⤵
- Runs ping.exe
-
C:\Users\Admin\AppData\Roaming\SubDir\Client.exe"C:\Users\Admin\AppData\Roaming\SubDir\Client.exe"46⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
-
C:\Windows\SysWOW64\schtasks.exe"schtasks" /create /tn "SeroXen" /sc ONLOGON /tr "C:\Users\Admin\AppData\Roaming\SubDir\Client.exe" /rl HIGHEST /f47⤵
- Creates scheduled task(s)
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\dHo65wLMDtOT.bat" "47⤵
-
C:\Windows\SysWOW64\chcp.comchcp 6500148⤵
-
C:\Windows\SysWOW64\PING.EXEping -n 10 localhost48⤵
- Runs ping.exe
-
C:\Users\Admin\AppData\Roaming\SubDir\Client.exe"C:\Users\Admin\AppData\Roaming\SubDir\Client.exe"48⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
-
C:\Windows\SysWOW64\schtasks.exe"schtasks" /create /tn "SeroXen" /sc ONLOGON /tr "C:\Users\Admin\AppData\Roaming\SubDir\Client.exe" /rl HIGHEST /f49⤵
- Creates scheduled task(s)
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\IHrrgypb4DtA.bat" "49⤵
-
C:\Windows\SysWOW64\chcp.comchcp 6500150⤵
-
C:\Windows\SysWOW64\PING.EXEping -n 10 localhost50⤵
- Runs ping.exe
-
C:\Users\Admin\AppData\Roaming\SubDir\Client.exe"C:\Users\Admin\AppData\Roaming\SubDir\Client.exe"50⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
-
C:\Windows\SysWOW64\schtasks.exe"schtasks" /create /tn "SeroXen" /sc ONLOGON /tr "C:\Users\Admin\AppData\Roaming\SubDir\Client.exe" /rl HIGHEST /f51⤵
- Creates scheduled task(s)
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\ymnOYoEfKmad.bat" "51⤵
-
C:\Windows\SysWOW64\chcp.comchcp 6500152⤵
-
C:\Windows\SysWOW64\PING.EXEping -n 10 localhost52⤵
- Runs ping.exe
-
C:\Users\Admin\AppData\Roaming\SubDir\Client.exe"C:\Users\Admin\AppData\Roaming\SubDir\Client.exe"52⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
-
C:\Windows\SysWOW64\schtasks.exe"schtasks" /create /tn "SeroXen" /sc ONLOGON /tr "C:\Users\Admin\AppData\Roaming\SubDir\Client.exe" /rl HIGHEST /f53⤵
- Creates scheduled task(s)
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\zuAplRRy8LO1.bat" "53⤵
-
C:\Windows\SysWOW64\chcp.comchcp 6500154⤵
-
C:\Windows\SysWOW64\PING.EXEping -n 10 localhost54⤵
- Runs ping.exe
-
C:\Users\Admin\AppData\Roaming\SubDir\Client.exe"C:\Users\Admin\AppData\Roaming\SubDir\Client.exe"54⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
-
C:\Windows\SysWOW64\schtasks.exe"schtasks" /create /tn "SeroXen" /sc ONLOGON /tr "C:\Users\Admin\AppData\Roaming\SubDir\Client.exe" /rl HIGHEST /f55⤵
- Creates scheduled task(s)
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\rVmydNjaELvg.bat" "55⤵
-
C:\Windows\SysWOW64\chcp.comchcp 6500156⤵
-
C:\Windows\SysWOW64\PING.EXEping -n 10 localhost56⤵
- Runs ping.exe
-
C:\Users\Admin\AppData\Roaming\SubDir\Client.exe"C:\Users\Admin\AppData\Roaming\SubDir\Client.exe"56⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2784 -s 224855⤵
- Program crash
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3228 -s 223253⤵
- Program crash
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4740 -s 173251⤵
- Program crash
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 456 -s 164049⤵
- Program crash
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1896 -s 166047⤵
- Program crash
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4416 -s 222445⤵
- Program crash
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2280 -s 224843⤵
- Program crash
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2024 -s 165641⤵
- Program crash
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 692 -s 173239⤵
- Program crash
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 396 -s 221237⤵
- Program crash
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4128 -s 171235⤵
- Program crash
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4864 -s 109633⤵
- Program crash
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1008 -s 170831⤵
- Program crash
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 116 -s 223629⤵
- Program crash
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4416 -s 224827⤵
- Program crash
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 740 -s 167225⤵
- Program crash
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1852 -s 168823⤵
- Program crash
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3124 -s 224821⤵
- Program crash
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4012 -s 109219⤵
- Program crash
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 808 -s 222017⤵
- Program crash
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 832 -s 222415⤵
- Program crash
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1948 -s 222413⤵
- Program crash
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4132 -s 224811⤵
- Program crash
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2408 -s 22449⤵
- Program crash
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4128 -s 16247⤵
- Program crash
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4332 -s 10845⤵
- Program crash
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4252 -s 16523⤵
- Program crash
-
C:\Windows\SysWOW64\SCHTASKS.exe"SCHTASKS.exe" /create /tn "$77Uni - Copy (103) - Copy - Copy.exe" /tr "'C:\Users\Admin\AppData\Local\Temp\uni\Uni - Copy (103) - Copy - Copy.exe'" /sc onlogon /rl HIGHEST2⤵
- Creates scheduled task(s)
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=asset_store.mojom.AssetStoreService --lang=en-US --service-sandbox-type=asset_store_service --no-appcompat-clear --field-trial-handle=4276,i,2607710392823067546,4648797561512801463,262144 --variations-seed-version --mojo-platform-channel-handle=4056 /prefetch:81⤵
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 408 -p 4252 -ip 42521⤵
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 468 -p 4332 -ip 43321⤵
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 480 -p 4128 -ip 41281⤵
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 540 -p 2408 -ip 24081⤵
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 480 -p 4132 -ip 41321⤵
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 540 -p 1948 -ip 19481⤵
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 532 -p 832 -ip 8321⤵
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 480 -p 808 -ip 8081⤵
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 520 -p 4012 -ip 40121⤵
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 548 -p 3124 -ip 31241⤵
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 532 -p 1852 -ip 18521⤵
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 548 -p 740 -ip 7401⤵
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 520 -p 4416 -ip 44161⤵
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 448 -p 116 -ip 1161⤵
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 404 -p 1008 -ip 10081⤵
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 496 -p 4864 -ip 48641⤵
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 544 -p 4128 -ip 41281⤵
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 540 -p 396 -ip 3961⤵
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 384 -p 692 -ip 6921⤵
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=asset_store.mojom.AssetStoreService --lang=en-US --service-sandbox-type=asset_store_service --no-appcompat-clear --field-trial-handle=3996,i,2607710392823067546,4648797561512801463,262144 --variations-seed-version --mojo-platform-channel-handle=4444 /prefetch:81⤵
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 448 -p 2024 -ip 20241⤵
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 520 -p 2280 -ip 22801⤵
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 532 -p 4416 -ip 44161⤵
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 524 -p 1896 -ip 18961⤵
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 464 -p 456 -ip 4561⤵
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 384 -p 4740 -ip 47401⤵
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 532 -p 3228 -ip 32281⤵
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 548 -p 2784 -ip 27841⤵
Network
MITRE ATT&CK Matrix ATT&CK v13
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Local\Temp\2S16ToK4VAZ5.batFilesize
207B
MD51d8d6f35569fdd49d1621fa2cd6725d6
SHA188de4bf3ae37d597859053d35b7a771e5c04efe2
SHA25623a857956d412040e098c192909b6d990d8923928a173edb2fca9450ea4ffcaa
SHA512ef443a643e511146f8e3070c5ffb1c1269244f358be7dc9e019f602c8c827958784662abd4c11fc67263566f17bc72d4b123237d3ee6ed6d15bcc03111ddc3a4
-
C:\Users\Admin\AppData\Local\Temp\6UQsaJCtM364.batFilesize
207B
MD53f4f6b07fab9a12744e50d5225183195
SHA1ed3be2f788c37fd49d52a49a99772b7d2f568af9
SHA256ffd9ed359ba749193ebc0fda7ac8eda839da7f3ba9e00ad67d357e58099c00cc
SHA5122774864e29484cedb6ce588b270026691741af016a4350f6fa6f591f72f3a2ff22a2a089ec03c4c0f7b2dca5a2fe09c3061c8f4a6889b8955dfed177b982feff
-
C:\Users\Admin\AppData\Local\Temp\7t3aZtxjIbvC.batFilesize
207B
MD5962dc1a962f9f02fd54a6c7f26ff11ce
SHA13e082806f592ee7c2b9815726b30d74491493d6b
SHA2568f73dd8158c2b771821305ca651524c73c3d8bb161ef606a54ab1b1e45d2b4e2
SHA5128a7b780e007e661de81da0235b3b742e0479ac56d9faa9ed4d485a4ea60f798ca5f6da1bf70ab8452a82b4f813f52dfff85dbe8cb2b3a92990095bbabe4c2829
-
C:\Users\Admin\AppData\Local\Temp\9OrBAQ8t4Iza.batFilesize
207B
MD5eb9e83a6fa063c1f8d12107b7d29c003
SHA1e7d26de54c746de3e1f7e011cb2dbdbb2ed9fa9b
SHA256f9a2589871b858464df160b55e17ac0e7712df3c7a8cf91c213e09fc29b309a9
SHA5124d0ce24bcf20e0361548d5c5f0e4b38ddc1a3769ece76c032f74382aa4227ce35c0a6a98464aa6c249dc26b7c1f2ca39fd36501a8bbd4bb92462b1e718c4393b
-
C:\Users\Admin\AppData\Local\Temp\J4pfRx1eqFtx.batFilesize
207B
MD5b3fa5dd56e287274e8204d6307842139
SHA1be4642473cfa58234f8053d271b72261440c1b09
SHA2564547e59ec93e272dfe199b8bfea4b9f40daff85af195fd203883f65892b6ecad
SHA5125685dc227233902229836946a3d1b4528cae5ed2f8ded788a0639767cb97640e8a2f9844366ffe740b3140c9c79468cbc0e27c65d6d6c7c5419535ca86eb00b4
-
C:\Users\Admin\AppData\Local\Temp\Nl6QJzComgFo.batFilesize
207B
MD5fca918401b9f049ba5b5d4539bbb417f
SHA12cdeb9d54acc29a51a98f4bc859673c5ec786879
SHA256684e02e766fa1f723388f802c7f5a15df9258467c5abcab7a483457f681220ad
SHA51229acf29a6cccda64ce38f2d6dab7697d765cc14306c46e54e2f79f1a12f7def33d7fc192c12a684e1619872334adab6e93840c5b05e6a66279e65138a1b829e7
-
C:\Users\Admin\AppData\Local\Temp\OStACV7B0Iw0.batFilesize
207B
MD5a968198b10748a203e7969c38e05ea6c
SHA187a90b371f6a9be3924fcef3b257c2f155a9e476
SHA256494f4bf03380da93d22ea861431da410338866e44af30a502b7879b272b48e1a
SHA512c79e392128476f990b11a9f524391e14f6123800689d2383c971af10ccc48e806aca092d8632f411b3e92affc0fe03ef7706440b323ac4912ca781ecc90ca5be
-
C:\Users\Admin\AppData\Local\Temp\PvObgb1AlKvV.batFilesize
207B
MD506c35436c03e176de76407836b571ad3
SHA19c1a9cb18a7dfb5c833eb8a283112cec1b7e717d
SHA2567f91b9ce8acba3a9f20204cb0806d915b3b9aadcd2ff7855f55ce8dee4fb5c4a
SHA51282e557c852e8b1a635f37fc33bde541068734eee498ab4c61cf5368b0318dcb0d6f8d4a62fcc5d2caa8fa05b9628357ca1d49e58ed69f6c8f65ce9d94270253a
-
C:\Users\Admin\AppData\Local\Temp\Yyo78BgpfiU7.batFilesize
207B
MD58b4e08f9f9fc82bb2373353a0b0d59aa
SHA13922b573c613ad3f3b0021f779527bc6f840406d
SHA2562dc9efbc8850bd908af368f218f2a2694fce76bee92a0a0bf391bb3b62211a14
SHA512d39a753e2d1aeb42d0b1bc6d0805f6894ac9549743754cf97c666ea4cd0ece32f7733d8347d869276268edb01bc28ed911e5ca580f311a98b1efd3fca2696f61
-
C:\Users\Admin\AppData\Local\Temp\c4ZvNnzsbqPj.batFilesize
207B
MD548d12fd1ae07d7269a73393b682ea758
SHA1ed939e758f5e0d0e9ad70bfc386c0dcbcfa5f5d6
SHA256639c94070837f04c49349465920265234f44d652d5eb45cfed076c3845c0e28d
SHA512cf24fba9f49a2aee9d37ba3b5cb55e621d20ed689b3b448c7f2bc759ba3a65fe57491def969911ccb23622135a153b7e46c8442aebe73e89165f169109d775c0
-
C:\Users\Admin\AppData\Local\Temp\cRWhMUPHm7O6.batFilesize
207B
MD5d95118b857bd1e1a69c0dbe09ea42302
SHA140c864f693a0fe10b26dd2fe2197cfcdba0fcaad
SHA256f97c3865887f989548253898f25e2010fb7df600625b951965d7c94eda0a2d1a
SHA51220f1b3615038caea8ece8e3400c2fa314c4667ff4677d69945e8a007688e9b9d27ba076155b304e8d0143efd6dcce8f98421508cb13c3042eebd7e7197a2665f
-
C:\Users\Admin\AppData\Local\Temp\eJ7EEOcXEYTM.batFilesize
207B
MD524cdc1ea54c3a068b90f906c0696e10f
SHA1320a7fe0dab4bf1cacad74cd7a7a5f6df02d6282
SHA25647c6b64b3ca84388ad932962569b1b3224e46e9bb944b617be7f7eba632f5264
SHA512b111bc218695f7e7d7f2768ae74e713c3fc52343f01e643b61c0920daf295e74c59de38a6ad0bbbc68c2259f3f3a1bb6e114aa1cec7e64fe95bb171ecdddd9ea
-
C:\Users\Admin\AppData\Local\Temp\hRxU9Sky0cc2.batFilesize
207B
MD56bbd6e156cb6cc3a00d028f47cbf5c34
SHA16302ff77e88c28136a3cf14c6c113b6e19b02f90
SHA25632ba7d463beac44baa7a5291a07c64089ba5c5df08d1bad02c89834b3e66ab78
SHA51276f624c8c7a08b2864364ec7ac713d7c3b2123c6c802e1c826fbfa5a32102bf66bfd203ccf83e5644d5b39e66a5e4bd26b8bb37c81ecbcf35b01e87e97a41528
-
C:\Users\Admin\AppData\Local\Temp\iGeHqMLDHxqy.batFilesize
207B
MD599d5af4285175f83b77b722d544d9b5d
SHA18769c4de09e3f453fcf5f30da51e0ca75079fa1b
SHA256827f930de140e62111559acac68d85664094def94f7e8c4477c985c183e8f8f9
SHA51266654605890be86ce351e31c219e185bc79aaf34df6c9bc0b9f6b61f0a39c16e65a0e1f36a2a523236ac3efd0c4a972de88d811299f4e3879b3f1cd1e6361523
-
C:\Users\Admin\AppData\Local\Temp\idb3p3lbTEpM.batFilesize
207B
MD5c01cea741fba5ec596b5ff417d97190a
SHA12a10b9e8e6467127f6cd7d3e553ca6243b9d9676
SHA256155179710b067b1d7dfda6ff6f2e91a573df0d2a2821530b2f95df8f90a0da72
SHA512d1b4d4638ed7dad8373efee8194d97ecd562ff8afa7ca4f789b6cb613335fe7abdaa88f70a03d56b5d6aef2f31ed3ea8361e930fcf3c23877acf20bdabb54820
-
C:\Users\Admin\AppData\Local\Temp\pXfhmnqHOOVv.batFilesize
207B
MD5a4e5c723180ea3f28a13f4d17723181f
SHA152c4c8e624ea8099bcad3c3ba174206e3cbe9ded
SHA25666faca97f1bfc10298985acc1163acd50f789152a2d3dbed0ee4af4d3c53873a
SHA5128ec33f237ea592ef81234e1e10bfca56aac414d6a8b72ccf893ce8aa78036ccecf6cb08ba3a96a5480c2669345f31933ae466a4eadc8aaf0b6ecccbe9cf1e813
-
C:\Users\Admin\AppData\Local\Temp\pfZkZDW9Q72g.batFilesize
207B
MD5d0e4eeefee9aa53a9ab6c37a1dd21154
SHA15379a90f14442c1f73bb8f3362259c5d608b6ad2
SHA256b4a03d45b4f4712534cc9265a788297a88ec9d94bf2c50f45f5698a533256284
SHA5125c7d7e29eade02dada7645b1ad852d3acf31187e957068e50038b82d1bded8a7d7e2a00768015c18257c8b4c4faac1b6e2f0c02361fbd39bf7888fb2202840c0
-
C:\Users\Admin\AppData\Local\Temp\pwQdMhPVhXpr.batFilesize
207B
MD5a379c1c1602cd339a5f09e4d935b5406
SHA1273c9d5abbfab5c883a2ea9faeaa64e5b5e26b90
SHA256c400260513b7a239b43d698af99eafb8034e2b122188570b89706bc2c68d2ae2
SHA5125004db845f4a453f60305f7b3e33f3304df94986e42b079f1f55c02c28e118167bdfaf5f2873b11922bf2a50244298429323bdbb0ab8bcf707792c9040198b47
-
C:\Users\Admin\AppData\Local\Temp\sqpNF2iAbQm2.batFilesize
207B
MD5b869a3d0b6981f1d1514658a5ad4cd9b
SHA193bcc26f4fe819b4f6f479f5a903065eeb5d60f8
SHA25612c53092c7fb58eb51335f4eef32c9521ce75213c56573096eae19944168cb85
SHA512b06bef2804f94542094564327decc5afcaed1c3b1f354eb5e5f7ba107f25dcdbee8d7af0e3e5d296494cd495b8bcec9acb6484acd63314ebd4e6f4222edd4c3a
-
C:\Users\Admin\AppData\Local\Temp\zpvIPTEZbFTn.batFilesize
207B
MD56b5408acaf3e731b9ad49e9d243414da
SHA145422f048f4bd34f5ce6ff29cfe24d0bb9d5cfcb
SHA25658973ae9e9c5c2af818e3aaa6b04ccaa0cb1297871e2f4d8b15c1da1ebc00043
SHA512a67b36247088ea34119048f79c33abf843956c082142112794f7c3b77d3c58f36d8f3f1736322368cbc7af9ab9a45bc5665aac0b679c1c4f972dd6d91bbd2562
-
C:\Users\Admin\AppData\Roaming\Logs\06-15-2024Filesize
224B
MD50ab82601d182bd111d39a4fbfb051fd2
SHA1c07ab6c602cf4d81633626be0fcb83c6ad6859c0
SHA256d9965c381124c307679b34a8e17595576ebb2709401b40174546b9f49795bfc2
SHA51223eae67cece3fc20843a02d8abceb190b5e4acbb35812d3d2b87d6c71d236fb68f2691e282f79346548a1d33d535866849b3f7599135c4c0cec01308b3fe76b9
-
C:\Users\Admin\AppData\Roaming\Logs\06-15-2024Filesize
224B
MD5d6fd0e3146f4a0de2af7f9005be2f2e5
SHA1b491edd0efdffbdfdab56fa4c980b431f4563b04
SHA25696fec9a8fe919dc0b472b1e38d4922e84edabf9ec8b41bb4c3828f128fdc177c
SHA51269968bdb37d42e274a1e06e2a487e927c8da057880861103d37592f64248dad2888b62e4d9f0c5f8ebc16477a58cef6b04bcae0ff91de68d51a57fe79d9f0694
-
C:\Users\Admin\AppData\Roaming\Logs\06-15-2024Filesize
224B
MD5430f6a6e9f4bae46a75b8f7f28ee8e29
SHA15f75b1a95eba84d26351ebba563ac96b54eea967
SHA25691428ece2e914cda2c52d1f77f529921e9371b975f85edca044317060b80d6f6
SHA512451622e010176590f1e716427d0f837d4e6aa7e135f1fff036a4d90f257c338c923e2e11705e53206275399ed6c3350ca8213e6894565394e27551ea1426d517
-
C:\Users\Admin\AppData\Roaming\Logs\06-15-2024Filesize
224B
MD5819f1026afe56ecb196b4a806f4339e7
SHA195f5f570a4881e7e4a356b24d521e2a03b28dc8d
SHA256b2dd3910515099b3a84cc1ee0354accdfea89399a7e05eda2cc8ad5f17f5ade3
SHA5120846d30fac0ebc3f5c587ca94da80223367fa595562319dfc36bd28aae6db5e13689b7c13089801fc250ad16ad5ab7c5c96e39d06d5aa14a4348384059f3187e
-
C:\Users\Admin\AppData\Roaming\Logs\06-15-2024Filesize
224B
MD52493a7bfde6526a68b9366e476a10149
SHA15cd0bd5981099ab6a6778ce468bf25b9e4687164
SHA2564594426989bd35efafbf237d4203f8fdd187a035e329d5619a71986a488ac52d
SHA512f083eba036b3c4eb83bd9ba7cfa712e3264880653400ef5c2d3ba82af456c4dc51557ec51b8d91e91d0a731ced9e2c15a20f895449d6374c62a542cdca0345ee
-
C:\Users\Admin\AppData\Roaming\Logs\06-15-2024MD5
d41d8cd98f00b204e9800998ecf8427e
SHA1da39a3ee5e6b4b0d3255bfef95601890afd80709
SHA256e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855
SHA512cf83e1357eefb8bdf1542850d66d8007d620e4050b5715dc83f4a921d36ce9ce47d0d13c5d85f2b0ff8318d2877eec2f63b931bd47417a81a538327af927da3e
-
C:\Users\Admin\AppData\Roaming\Logs\06-15-2024Filesize
224B
MD58984a14320fb5ce25909461c71420f9a
SHA1d0913d6d8d48c109c6977796e99f50f96aebb830
SHA256bdcc74a2ee8d0dd9b01f9d27a4fbb0467a07d75684ddfb8dec077ba2a7d29a51
SHA512a6f6506f3e417d5fd1161280d249a7b98eb88184db0dc5be26be3f618880b05af3e2d2a832fd5f8f4e19c0501d0e293d0f9d9506550adb1ef716dfc3ea1fd08c
-
C:\Users\Admin\AppData\Roaming\Logs\06-15-2024Filesize
224B
MD5c88d6ba5563d5a68651978f332af39f1
SHA1e484e2567b4029028f18623e0ea9143db70ad4e9
SHA25618d17d375ab8ec8b0e7edc709b94f8fe99630e8561edd5dc6ef6d33bf670ba05
SHA5125c34c0391c41e2a7712578358273f84fc10b4456bbe3c7e16efe05d6b184fec6a541aa6ba49c4eaace633a05a68a1b326473c911fd9c3cd0c079eb35505d3994
-
C:\Users\Admin\AppData\Roaming\Logs\06-15-2024Filesize
224B
MD57e26abc758469dc21cbc5bbb29636a5f
SHA167a0840e698404f21d9b18d7abfbb6825789adfa
SHA256449b59bb7258954d89ae85b856c26ae6911f3aae6edd389078dd44035b09f532
SHA512df5ed2fbceb618b0bbfca1400214c44d6cac0f788af91c130d8706d2cbd45ebbdb9baee9800971b9971b2b7940d83c072b9ce7d2aa6c7224bc05233fe7eb7fd5
-
C:\Users\Admin\AppData\Roaming\Logs\06-15-2024Filesize
224B
MD59322cdec542295ed36d7f619aab30d69
SHA158108cdc24af65d5f1827fda88d12057fe490b15
SHA25617f4b929d13688934d96f80d0e59e62c177c17d574aabb6f2a541dfdac443c14
SHA5122f2e7510b21b23894b636ec7828c5f7b5af48ff67f507ced68d0b3660e9964a36db088adb557eeb2658b8a9b6bb2efd667da57cb434b234684b38c6ca12903ee
-
C:\Users\Admin\AppData\Roaming\Logs\06-15-2024Filesize
224B
MD5add94d62a61c16efcb697a34557befcd
SHA1d80bbe2c548504dd5c42b4f875c361aff5af7e28
SHA256c4707e1c06f2a759bf5faaac78aca9949acaef0c21908c6a02210e48994a7cb4
SHA51272326cfd1a0c9c2234c74d992ece35ae0e4e54d56cc312cd811b0b301caf984fa6dee4faed1671cfcf1ecbc26f8c8a4fa77ef4cca1a0d1221fc49d9db857b00f
-
C:\Users\Admin\AppData\Roaming\SubDir\Client.exeFilesize
409KB
MD5b70fdac25a99501e3cae11f1b775249e
SHA13c59226479bfdcd1b2927bcfb1a7516d4cb8dd71
SHA25651ff3eb450a786c1aaa75ff889f2fd256412a7b75d04277fdf9fcccc20e57246
SHA51243f0d5d6e5f0d5febba537c109ffdbc250bbb6e9725e635a43ec975b0353048eaeee50b6e9274cd5e072ea6b0cea32439bd37408b2528832f467f2075f74ca44
-
memory/1948-2-0x0000000005B40000-0x00000000060E4000-memory.dmpFilesize
5.6MB
-
memory/1948-4-0x0000000074AF0000-0x00000000752A0000-memory.dmpFilesize
7.7MB
-
memory/1948-5-0x0000000005590000-0x00000000055F6000-memory.dmpFilesize
408KB
-
memory/1948-6-0x0000000006360000-0x0000000006372000-memory.dmpFilesize
72KB
-
memory/1948-8-0x0000000074AF0000-0x00000000752A0000-memory.dmpFilesize
7.7MB
-
memory/1948-7-0x0000000074AFE000-0x0000000074AFF000-memory.dmpFilesize
4KB
-
memory/1948-1-0x0000000000AE0000-0x0000000000B4C000-memory.dmpFilesize
432KB
-
memory/1948-3-0x00000000056A0000-0x0000000005732000-memory.dmpFilesize
584KB
-
memory/1948-16-0x0000000074AF0000-0x00000000752A0000-memory.dmpFilesize
7.7MB
-
memory/1948-0-0x0000000074AFE000-0x0000000074AFF000-memory.dmpFilesize
4KB
-
memory/4252-24-0x0000000074AF0000-0x00000000752A0000-memory.dmpFilesize
7.7MB
-
memory/4252-15-0x0000000074AF0000-0x00000000752A0000-memory.dmpFilesize
7.7MB
-
memory/4252-17-0x0000000074AF0000-0x00000000752A0000-memory.dmpFilesize
7.7MB
-
memory/4252-19-0x0000000006400000-0x000000000640A000-memory.dmpFilesize
40KB