Overview
overview
10Static
static
10uni/Uni - ...py.exe
windows7-x64
10uni/Uni - ...py.exe
windows10-2004-x64
10uni/Uni - ...py.exe
windows7-x64
10uni/Uni - ...py.exe
windows10-2004-x64
10uni/Uni - ...py.exe
windows7-x64
10uni/Uni - ...py.exe
windows10-2004-x64
10uni/Uni - ...py.exe
windows7-x64
10uni/Uni - ...py.exe
windows10-2004-x64
10uni/Uni - ...py.exe
windows7-x64
10uni/Uni - ...py.exe
windows10-2004-x64
10uni/Uni - ...py.exe
windows7-x64
10uni/Uni - ...py.exe
windows10-2004-x64
10uni/Uni - ...py.exe
windows7-x64
10uni/Uni - ...py.exe
windows10-2004-x64
10uni/Uni - ...py.exe
windows7-x64
10uni/Uni - ...py.exe
windows10-2004-x64
10uni/Uni - ...py.exe
windows7-x64
10uni/Uni - ...py.exe
windows10-2004-x64
10uni/Uni - ...py.exe
windows7-x64
10uni/Uni - ...py.exe
windows10-2004-x64
10uni/Uni - ...py.exe
windows7-x64
10uni/Uni - ...py.exe
windows10-2004-x64
10uni/Uni - ...py.exe
windows7-x64
10uni/Uni - ...py.exe
windows10-2004-x64
10uni/Uni - ...py.exe
windows7-x64
10uni/Uni - ...py.exe
windows10-2004-x64
10uni/Uni - ...py.exe
windows7-x64
10uni/Uni - ...py.exe
windows10-2004-x64
10uni/Uni - ...py.exe
windows7-x64
10uni/Uni - ...py.exe
windows10-2004-x64
10uni/Uni - ...py.exe
windows7-x64
10uni/Uni - ...py.exe
windows10-2004-x64
10Analysis
-
max time kernel
295s -
max time network
308s -
platform
windows10-2004_x64 -
resource
win10v2004-20240508-en -
resource tags
arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system -
submitted
01-07-2024 16:27
Behavioral task
behavioral1
Sample
uni/Uni - Copy (10) - Copy - Copy - Copy - Copy.exe
Resource
win7-20240611-en
Behavioral task
behavioral2
Sample
uni/Uni - Copy (10) - Copy - Copy - Copy - Copy.exe
Resource
win10v2004-20240611-en
Behavioral task
behavioral3
Sample
uni/Uni - Copy (10) - Copy - Copy - Copy.exe
Resource
win7-20240221-en
Behavioral task
behavioral4
Sample
uni/Uni - Copy (10) - Copy - Copy - Copy.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral5
Sample
uni/Uni - Copy (10) - Copy - Copy.exe
Resource
win7-20240508-en
Behavioral task
behavioral6
Sample
uni/Uni - Copy (10) - Copy - Copy.exe
Resource
win10v2004-20240226-en
Behavioral task
behavioral7
Sample
uni/Uni - Copy (10) - Copy.exe
Resource
win7-20240611-en
Behavioral task
behavioral8
Sample
uni/Uni - Copy (10) - Copy.exe
Resource
win10v2004-20240611-en
Behavioral task
behavioral9
Sample
uni/Uni - Copy (100) - Copy - Copy - Copy - Copy.exe
Resource
win7-20240611-en
Behavioral task
behavioral10
Sample
uni/Uni - Copy (100) - Copy - Copy - Copy - Copy.exe
Resource
win10v2004-20240611-en
Behavioral task
behavioral11
Sample
uni/Uni - Copy (100) - Copy - Copy - Copy.exe
Resource
win7-20240221-en
Behavioral task
behavioral12
Sample
uni/Uni - Copy (100) - Copy - Copy - Copy.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral13
Sample
uni/Uni - Copy (100) - Copy - Copy.exe
Resource
win7-20240419-en
Behavioral task
behavioral14
Sample
uni/Uni - Copy (100) - Copy - Copy.exe
Resource
win10v2004-20240611-en
Behavioral task
behavioral15
Sample
uni/Uni - Copy (101) - Copy - Copy - Copy - Copy.exe
Resource
win7-20240508-en
Behavioral task
behavioral16
Sample
uni/Uni - Copy (101) - Copy - Copy - Copy - Copy.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral17
Sample
uni/Uni - Copy (101) - Copy - Copy - Copy.exe
Resource
win7-20240611-en
Behavioral task
behavioral18
Sample
uni/Uni - Copy (101) - Copy - Copy - Copy.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral19
Sample
uni/Uni - Copy (101) - Copy - Copy.exe
Resource
win7-20240508-en
Behavioral task
behavioral20
Sample
uni/Uni - Copy (101) - Copy - Copy.exe
Resource
win10v2004-20240226-en
Behavioral task
behavioral21
Sample
uni/Uni - Copy (102) - Copy - Copy - Copy.exe
Resource
win7-20240611-en
Behavioral task
behavioral22
Sample
uni/Uni - Copy (102) - Copy - Copy - Copy.exe
Resource
win10v2004-20240611-en
Behavioral task
behavioral23
Sample
uni/Uni - Copy (102) - Copy - Copy.exe
Resource
win7-20240221-en
Behavioral task
behavioral24
Sample
uni/Uni - Copy (102) - Copy - Copy.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral25
Sample
uni/Uni - Copy (103) - Copy - Copy - Copy.exe
Resource
win7-20240508-en
Behavioral task
behavioral26
Sample
uni/Uni - Copy (103) - Copy - Copy - Copy.exe
Resource
win10v2004-20240611-en
Behavioral task
behavioral27
Sample
uni/Uni - Copy (103) - Copy - Copy.exe
Resource
win7-20240508-en
Behavioral task
behavioral28
Sample
uni/Uni - Copy (103) - Copy - Copy.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral29
Sample
uni/Uni - Copy (104) - Copy - Copy - Copy.exe
Resource
win7-20240611-en
Behavioral task
behavioral30
Sample
uni/Uni - Copy (104) - Copy - Copy - Copy.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral31
Sample
uni/Uni - Copy (104) - Copy - Copy.exe
Resource
win7-20240221-en
General
-
Target
uni/Uni - Copy (101) - Copy - Copy - Copy.exe
-
Size
409KB
-
MD5
b70fdac25a99501e3cae11f1b775249e
-
SHA1
3c59226479bfdcd1b2927bcfb1a7516d4cb8dd71
-
SHA256
51ff3eb450a786c1aaa75ff889f2fd256412a7b75d04277fdf9fcccc20e57246
-
SHA512
43f0d5d6e5f0d5febba537c109ffdbc250bbb6e9725e635a43ec975b0353048eaeee50b6e9274cd5e072ea6b0cea32439bd37408b2528832f467f2075f74ca44
-
SSDEEP
12288:gpbJjGut6AoE3hVVdFaC/eZPTMTDlpgfJCKuMsVs:oVaurMLcDlpRKai
Malware Config
Extracted
quasar
3.1.5
SeroXen
panel-slave.gl.at.ply.gg:57059
panel-slave.gl.at.ply.gg:27892
$Sxr-rpL8EItHN3pqIQQVy2
-
encryption_key
Lme7VBS3l58VwLM69PNM
-
install_name
Client.exe
-
log_directory
Logs
-
reconnect_delay
3000
-
startup_key
SeroXen
-
subdirectory
SubDir
Signatures
-
Quasar payload 2 IoCs
Processes:
resource yara_rule behavioral18/memory/2064-1-0x0000000000A00000-0x0000000000A6C000-memory.dmp family_quasar C:\Users\Admin\AppData\Roaming\SubDir\Client.exe family_quasar -
Checks computer location settings 2 TTPs 13 IoCs
Looks up country code configured in the registry, likely geofence.
Processes:
Client.exeClient.exeClient.exeClient.exeClient.exeClient.exeClient.exeClient.exeClient.exeClient.exeClient.exeClient.exeClient.exedescription ioc process Key value queried \REGISTRY\USER\S-1-5-21-2539840389-1261165778-1087677076-1000\Control Panel\International\Geo\Nation Client.exe Key value queried \REGISTRY\USER\S-1-5-21-2539840389-1261165778-1087677076-1000\Control Panel\International\Geo\Nation Client.exe Key value queried \REGISTRY\USER\S-1-5-21-2539840389-1261165778-1087677076-1000\Control Panel\International\Geo\Nation Client.exe Key value queried \REGISTRY\USER\S-1-5-21-2539840389-1261165778-1087677076-1000\Control Panel\International\Geo\Nation Client.exe Key value queried \REGISTRY\USER\S-1-5-21-2539840389-1261165778-1087677076-1000\Control Panel\International\Geo\Nation Client.exe Key value queried \REGISTRY\USER\S-1-5-21-2539840389-1261165778-1087677076-1000\Control Panel\International\Geo\Nation Client.exe Key value queried \REGISTRY\USER\S-1-5-21-2539840389-1261165778-1087677076-1000\Control Panel\International\Geo\Nation Client.exe Key value queried \REGISTRY\USER\S-1-5-21-2539840389-1261165778-1087677076-1000\Control Panel\International\Geo\Nation Client.exe Key value queried \REGISTRY\USER\S-1-5-21-2539840389-1261165778-1087677076-1000\Control Panel\International\Geo\Nation Client.exe Key value queried \REGISTRY\USER\S-1-5-21-2539840389-1261165778-1087677076-1000\Control Panel\International\Geo\Nation Client.exe Key value queried \REGISTRY\USER\S-1-5-21-2539840389-1261165778-1087677076-1000\Control Panel\International\Geo\Nation Client.exe Key value queried \REGISTRY\USER\S-1-5-21-2539840389-1261165778-1087677076-1000\Control Panel\International\Geo\Nation Client.exe Key value queried \REGISTRY\USER\S-1-5-21-2539840389-1261165778-1087677076-1000\Control Panel\International\Geo\Nation Client.exe -
Executes dropped EXE 14 IoCs
Processes:
Client.exeClient.exeClient.exeClient.exeClient.exeClient.exeClient.exeClient.exeClient.exeClient.exeClient.exeClient.exeClient.exeClient.exepid process 1900 Client.exe 724 Client.exe 3668 Client.exe 4384 Client.exe 1128 Client.exe 5092 Client.exe 2468 Client.exe 3760 Client.exe 4116 Client.exe 2060 Client.exe 864 Client.exe 4164 Client.exe 392 Client.exe 1012 Client.exe -
Looks up external IP address via web service 14 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
Processes:
flow ioc 26 ip-api.com 28 ip-api.com 14 ip-api.com 30 ip-api.com 3 ip-api.com 16 ip-api.com 18 ip-api.com 22 ip-api.com 34 ip-api.com 12 api.ipify.org 24 ip-api.com 32 ip-api.com 36 ip-api.com 20 ip-api.com -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Program crash 13 IoCs
Processes:
WerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exepid pid_target process target process 1764 1900 WerFault.exe Client.exe 764 724 WerFault.exe Client.exe 4668 3668 WerFault.exe Client.exe 2364 4384 WerFault.exe Client.exe 4224 1128 WerFault.exe Client.exe 876 5092 WerFault.exe Client.exe 4636 2468 WerFault.exe Client.exe 2264 3760 WerFault.exe Client.exe 4364 4116 WerFault.exe Client.exe 876 2060 WerFault.exe Client.exe 4260 864 WerFault.exe Client.exe 3344 4164 WerFault.exe Client.exe 3672 392 WerFault.exe Client.exe -
Runs ping.exe 1 TTPs 13 IoCs
Processes:
PING.EXEPING.EXEPING.EXEPING.EXEPING.EXEPING.EXEPING.EXEPING.EXEPING.EXEPING.EXEPING.EXEPING.EXEPING.EXEpid process 4636 PING.EXE 432 PING.EXE 3272 PING.EXE 4532 PING.EXE 2436 PING.EXE 4500 PING.EXE 1796 PING.EXE 2996 PING.EXE 2584 PING.EXE 4256 PING.EXE 448 PING.EXE 680 PING.EXE 1520 PING.EXE -
Scheduled Task/Job: Scheduled Task 1 TTPs 15 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
Processes:
schtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeSCHTASKS.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exepid process 3552 schtasks.exe 4584 schtasks.exe 2692 schtasks.exe 1116 schtasks.exe 4504 schtasks.exe 4072 schtasks.exe 4104 schtasks.exe 5052 SCHTASKS.exe 3952 schtasks.exe 4864 schtasks.exe 3576 schtasks.exe 2596 schtasks.exe 3576 schtasks.exe 1336 schtasks.exe 1580 schtasks.exe -
Suspicious use of AdjustPrivilegeToken 15 IoCs
Processes:
Uni - Copy (101) - Copy - Copy - Copy.exeClient.exeClient.exeClient.exeClient.exeClient.exeClient.exeClient.exeClient.exeClient.exeClient.exeClient.exeClient.exeClient.exeClient.exedescription pid process Token: SeDebugPrivilege 2064 Uni - Copy (101) - Copy - Copy - Copy.exe Token: SeDebugPrivilege 1900 Client.exe Token: SeDebugPrivilege 724 Client.exe Token: SeDebugPrivilege 3668 Client.exe Token: SeDebugPrivilege 4384 Client.exe Token: SeDebugPrivilege 1128 Client.exe Token: SeDebugPrivilege 5092 Client.exe Token: SeDebugPrivilege 2468 Client.exe Token: SeDebugPrivilege 3760 Client.exe Token: SeDebugPrivilege 4116 Client.exe Token: SeDebugPrivilege 2060 Client.exe Token: SeDebugPrivilege 864 Client.exe Token: SeDebugPrivilege 4164 Client.exe Token: SeDebugPrivilege 392 Client.exe Token: SeDebugPrivilege 1012 Client.exe -
Suspicious use of SetWindowsHookEx 13 IoCs
Processes:
Client.exeClient.exeClient.exeClient.exeClient.exeClient.exeClient.exeClient.exeClient.exeClient.exeClient.exeClient.exeClient.exepid process 1900 Client.exe 724 Client.exe 3668 Client.exe 4384 Client.exe 1128 Client.exe 5092 Client.exe 2468 Client.exe 3760 Client.exe 4116 Client.exe 2060 Client.exe 864 Client.exe 4164 Client.exe 392 Client.exe -
Suspicious use of WriteProcessMemory 64 IoCs
Processes:
Uni - Copy (101) - Copy - Copy - Copy.exeClient.execmd.exeClient.execmd.exeClient.execmd.exeClient.execmd.exedescription pid process target process PID 2064 wrote to memory of 3552 2064 Uni - Copy (101) - Copy - Copy - Copy.exe schtasks.exe PID 2064 wrote to memory of 3552 2064 Uni - Copy (101) - Copy - Copy - Copy.exe schtasks.exe PID 2064 wrote to memory of 3552 2064 Uni - Copy (101) - Copy - Copy - Copy.exe schtasks.exe PID 2064 wrote to memory of 1900 2064 Uni - Copy (101) - Copy - Copy - Copy.exe Client.exe PID 2064 wrote to memory of 1900 2064 Uni - Copy (101) - Copy - Copy - Copy.exe Client.exe PID 2064 wrote to memory of 1900 2064 Uni - Copy (101) - Copy - Copy - Copy.exe Client.exe PID 2064 wrote to memory of 5052 2064 Uni - Copy (101) - Copy - Copy - Copy.exe SCHTASKS.exe PID 2064 wrote to memory of 5052 2064 Uni - Copy (101) - Copy - Copy - Copy.exe SCHTASKS.exe PID 2064 wrote to memory of 5052 2064 Uni - Copy (101) - Copy - Copy - Copy.exe SCHTASKS.exe PID 1900 wrote to memory of 3952 1900 Client.exe schtasks.exe PID 1900 wrote to memory of 3952 1900 Client.exe schtasks.exe PID 1900 wrote to memory of 3952 1900 Client.exe schtasks.exe PID 1900 wrote to memory of 3132 1900 Client.exe cmd.exe PID 1900 wrote to memory of 3132 1900 Client.exe cmd.exe PID 1900 wrote to memory of 3132 1900 Client.exe cmd.exe PID 3132 wrote to memory of 460 3132 cmd.exe chcp.com PID 3132 wrote to memory of 460 3132 cmd.exe chcp.com PID 3132 wrote to memory of 460 3132 cmd.exe chcp.com PID 3132 wrote to memory of 1520 3132 cmd.exe PING.EXE PID 3132 wrote to memory of 1520 3132 cmd.exe PING.EXE PID 3132 wrote to memory of 1520 3132 cmd.exe PING.EXE PID 3132 wrote to memory of 724 3132 cmd.exe Client.exe PID 3132 wrote to memory of 724 3132 cmd.exe Client.exe PID 3132 wrote to memory of 724 3132 cmd.exe Client.exe PID 724 wrote to memory of 4864 724 Client.exe schtasks.exe PID 724 wrote to memory of 4864 724 Client.exe schtasks.exe PID 724 wrote to memory of 4864 724 Client.exe schtasks.exe PID 724 wrote to memory of 4588 724 Client.exe cmd.exe PID 724 wrote to memory of 4588 724 Client.exe cmd.exe PID 724 wrote to memory of 4588 724 Client.exe cmd.exe PID 4588 wrote to memory of 1080 4588 cmd.exe chcp.com PID 4588 wrote to memory of 1080 4588 cmd.exe chcp.com PID 4588 wrote to memory of 1080 4588 cmd.exe chcp.com PID 4588 wrote to memory of 2436 4588 cmd.exe PING.EXE PID 4588 wrote to memory of 2436 4588 cmd.exe PING.EXE PID 4588 wrote to memory of 2436 4588 cmd.exe PING.EXE PID 4588 wrote to memory of 3668 4588 cmd.exe Client.exe PID 4588 wrote to memory of 3668 4588 cmd.exe Client.exe PID 4588 wrote to memory of 3668 4588 cmd.exe Client.exe PID 3668 wrote to memory of 4504 3668 Client.exe schtasks.exe PID 3668 wrote to memory of 4504 3668 Client.exe schtasks.exe PID 3668 wrote to memory of 4504 3668 Client.exe schtasks.exe PID 3668 wrote to memory of 4488 3668 Client.exe cmd.exe PID 3668 wrote to memory of 4488 3668 Client.exe cmd.exe PID 3668 wrote to memory of 4488 3668 Client.exe cmd.exe PID 4488 wrote to memory of 3312 4488 cmd.exe chcp.com PID 4488 wrote to memory of 3312 4488 cmd.exe chcp.com PID 4488 wrote to memory of 3312 4488 cmd.exe chcp.com PID 4488 wrote to memory of 4636 4488 cmd.exe PING.EXE PID 4488 wrote to memory of 4636 4488 cmd.exe PING.EXE PID 4488 wrote to memory of 4636 4488 cmd.exe PING.EXE PID 4488 wrote to memory of 4384 4488 cmd.exe Client.exe PID 4488 wrote to memory of 4384 4488 cmd.exe Client.exe PID 4488 wrote to memory of 4384 4488 cmd.exe Client.exe PID 4384 wrote to memory of 3576 4384 Client.exe schtasks.exe PID 4384 wrote to memory of 3576 4384 Client.exe schtasks.exe PID 4384 wrote to memory of 3576 4384 Client.exe schtasks.exe PID 4384 wrote to memory of 1492 4384 Client.exe cmd.exe PID 4384 wrote to memory of 1492 4384 Client.exe cmd.exe PID 4384 wrote to memory of 1492 4384 Client.exe cmd.exe PID 1492 wrote to memory of 1320 1492 cmd.exe chcp.com PID 1492 wrote to memory of 1320 1492 cmd.exe chcp.com PID 1492 wrote to memory of 1320 1492 cmd.exe chcp.com PID 1492 wrote to memory of 4256 1492 cmd.exe PING.EXE
Processes
-
C:\Users\Admin\AppData\Local\Temp\uni\Uni - Copy (101) - Copy - Copy - Copy.exe"C:\Users\Admin\AppData\Local\Temp\uni\Uni - Copy (101) - Copy - Copy - Copy.exe"1⤵
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\schtasks.exe"schtasks" /create /tn "SeroXen" /sc ONLOGON /tr "C:\Users\Admin\AppData\Local\Temp\uni\Uni - Copy (101) - Copy - Copy - Copy.exe" /rl HIGHEST /f2⤵
- Scheduled Task/Job: Scheduled Task
-
C:\Users\Admin\AppData\Roaming\SubDir\Client.exe"C:\Users\Admin\AppData\Roaming\SubDir\Client.exe"2⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\schtasks.exe"schtasks" /create /tn "SeroXen" /sc ONLOGON /tr "C:\Users\Admin\AppData\Roaming\SubDir\Client.exe" /rl HIGHEST /f3⤵
- Scheduled Task/Job: Scheduled Task
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\MHBXuOZvQ2eJ.bat" "3⤵
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\chcp.comchcp 650014⤵
-
C:\Windows\SysWOW64\PING.EXEping -n 10 localhost4⤵
- Runs ping.exe
-
C:\Users\Admin\AppData\Roaming\SubDir\Client.exe"C:\Users\Admin\AppData\Roaming\SubDir\Client.exe"4⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\schtasks.exe"schtasks" /create /tn "SeroXen" /sc ONLOGON /tr "C:\Users\Admin\AppData\Roaming\SubDir\Client.exe" /rl HIGHEST /f5⤵
- Scheduled Task/Job: Scheduled Task
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\g6goIyQN8IBW.bat" "5⤵
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\chcp.comchcp 650016⤵
-
C:\Windows\SysWOW64\PING.EXEping -n 10 localhost6⤵
- Runs ping.exe
-
C:\Users\Admin\AppData\Roaming\SubDir\Client.exe"C:\Users\Admin\AppData\Roaming\SubDir\Client.exe"6⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\schtasks.exe"schtasks" /create /tn "SeroXen" /sc ONLOGON /tr "C:\Users\Admin\AppData\Roaming\SubDir\Client.exe" /rl HIGHEST /f7⤵
- Scheduled Task/Job: Scheduled Task
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\efAurChrp0RP.bat" "7⤵
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\chcp.comchcp 650018⤵
-
C:\Windows\SysWOW64\PING.EXEping -n 10 localhost8⤵
- Runs ping.exe
-
C:\Users\Admin\AppData\Roaming\SubDir\Client.exe"C:\Users\Admin\AppData\Roaming\SubDir\Client.exe"8⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\schtasks.exe"schtasks" /create /tn "SeroXen" /sc ONLOGON /tr "C:\Users\Admin\AppData\Roaming\SubDir\Client.exe" /rl HIGHEST /f9⤵
- Scheduled Task/Job: Scheduled Task
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\iMRgiEr1kRoH.bat" "9⤵
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\chcp.comchcp 6500110⤵
-
C:\Windows\SysWOW64\PING.EXEping -n 10 localhost10⤵
- Runs ping.exe
-
C:\Users\Admin\AppData\Roaming\SubDir\Client.exe"C:\Users\Admin\AppData\Roaming\SubDir\Client.exe"10⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
-
C:\Windows\SysWOW64\schtasks.exe"schtasks" /create /tn "SeroXen" /sc ONLOGON /tr "C:\Users\Admin\AppData\Roaming\SubDir\Client.exe" /rl HIGHEST /f11⤵
- Scheduled Task/Job: Scheduled Task
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\y9O3aMvjVI0L.bat" "11⤵
-
C:\Windows\SysWOW64\chcp.comchcp 6500112⤵
-
C:\Windows\SysWOW64\PING.EXEping -n 10 localhost12⤵
- Runs ping.exe
-
C:\Users\Admin\AppData\Roaming\SubDir\Client.exe"C:\Users\Admin\AppData\Roaming\SubDir\Client.exe"12⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
-
C:\Windows\SysWOW64\schtasks.exe"schtasks" /create /tn "SeroXen" /sc ONLOGON /tr "C:\Users\Admin\AppData\Roaming\SubDir\Client.exe" /rl HIGHEST /f13⤵
- Scheduled Task/Job: Scheduled Task
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\PzldniTOoZJ7.bat" "13⤵
-
C:\Windows\SysWOW64\chcp.comchcp 6500114⤵
-
C:\Windows\SysWOW64\PING.EXEping -n 10 localhost14⤵
- Runs ping.exe
-
C:\Users\Admin\AppData\Roaming\SubDir\Client.exe"C:\Users\Admin\AppData\Roaming\SubDir\Client.exe"14⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
-
C:\Windows\SysWOW64\schtasks.exe"schtasks" /create /tn "SeroXen" /sc ONLOGON /tr "C:\Users\Admin\AppData\Roaming\SubDir\Client.exe" /rl HIGHEST /f15⤵
- Scheduled Task/Job: Scheduled Task
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\Tg1PfjeYkzgz.bat" "15⤵
-
C:\Windows\SysWOW64\chcp.comchcp 6500116⤵
-
C:\Windows\SysWOW64\PING.EXEping -n 10 localhost16⤵
- Runs ping.exe
-
C:\Users\Admin\AppData\Roaming\SubDir\Client.exe"C:\Users\Admin\AppData\Roaming\SubDir\Client.exe"16⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
-
C:\Windows\SysWOW64\schtasks.exe"schtasks" /create /tn "SeroXen" /sc ONLOGON /tr "C:\Users\Admin\AppData\Roaming\SubDir\Client.exe" /rl HIGHEST /f17⤵
- Scheduled Task/Job: Scheduled Task
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\6A9CkqsIUkfY.bat" "17⤵
-
C:\Windows\SysWOW64\chcp.comchcp 6500118⤵
-
C:\Windows\SysWOW64\PING.EXEping -n 10 localhost18⤵
- Runs ping.exe
-
C:\Users\Admin\AppData\Roaming\SubDir\Client.exe"C:\Users\Admin\AppData\Roaming\SubDir\Client.exe"18⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
-
C:\Windows\SysWOW64\schtasks.exe"schtasks" /create /tn "SeroXen" /sc ONLOGON /tr "C:\Users\Admin\AppData\Roaming\SubDir\Client.exe" /rl HIGHEST /f19⤵
- Scheduled Task/Job: Scheduled Task
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\Tzi3BSGdHDGQ.bat" "19⤵
-
C:\Windows\SysWOW64\chcp.comchcp 6500120⤵
-
C:\Windows\SysWOW64\PING.EXEping -n 10 localhost20⤵
- Runs ping.exe
-
C:\Users\Admin\AppData\Roaming\SubDir\Client.exe"C:\Users\Admin\AppData\Roaming\SubDir\Client.exe"20⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
-
C:\Windows\SysWOW64\schtasks.exe"schtasks" /create /tn "SeroXen" /sc ONLOGON /tr "C:\Users\Admin\AppData\Roaming\SubDir\Client.exe" /rl HIGHEST /f21⤵
- Scheduled Task/Job: Scheduled Task
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\BznOoUGmDkqn.bat" "21⤵
-
C:\Windows\SysWOW64\chcp.comchcp 6500122⤵
-
C:\Windows\SysWOW64\PING.EXEping -n 10 localhost22⤵
- Runs ping.exe
-
C:\Users\Admin\AppData\Roaming\SubDir\Client.exe"C:\Users\Admin\AppData\Roaming\SubDir\Client.exe"22⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
-
C:\Windows\SysWOW64\schtasks.exe"schtasks" /create /tn "SeroXen" /sc ONLOGON /tr "C:\Users\Admin\AppData\Roaming\SubDir\Client.exe" /rl HIGHEST /f23⤵
- Scheduled Task/Job: Scheduled Task
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\rUjvgLfpTJXG.bat" "23⤵
-
C:\Windows\SysWOW64\chcp.comchcp 6500124⤵
-
C:\Windows\SysWOW64\PING.EXEping -n 10 localhost24⤵
- Runs ping.exe
-
C:\Users\Admin\AppData\Roaming\SubDir\Client.exe"C:\Users\Admin\AppData\Roaming\SubDir\Client.exe"24⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
-
C:\Windows\SysWOW64\schtasks.exe"schtasks" /create /tn "SeroXen" /sc ONLOGON /tr "C:\Users\Admin\AppData\Roaming\SubDir\Client.exe" /rl HIGHEST /f25⤵
- Scheduled Task/Job: Scheduled Task
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\Lt0qY6ALtROW.bat" "25⤵
-
C:\Windows\SysWOW64\chcp.comchcp 6500126⤵
-
C:\Windows\SysWOW64\PING.EXEping -n 10 localhost26⤵
- Runs ping.exe
-
C:\Users\Admin\AppData\Roaming\SubDir\Client.exe"C:\Users\Admin\AppData\Roaming\SubDir\Client.exe"26⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
-
C:\Windows\SysWOW64\schtasks.exe"schtasks" /create /tn "SeroXen" /sc ONLOGON /tr "C:\Users\Admin\AppData\Roaming\SubDir\Client.exe" /rl HIGHEST /f27⤵
- Scheduled Task/Job: Scheduled Task
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\3t5BC9ATqxxt.bat" "27⤵
-
C:\Windows\SysWOW64\chcp.comchcp 6500128⤵
-
C:\Windows\SysWOW64\PING.EXEping -n 10 localhost28⤵
- Runs ping.exe
-
C:\Users\Admin\AppData\Roaming\SubDir\Client.exe"C:\Users\Admin\AppData\Roaming\SubDir\Client.exe"28⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 392 -s 223627⤵
- Program crash
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4164 -s 109225⤵
- Program crash
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 864 -s 168823⤵
- Program crash
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2060 -s 170821⤵
- Program crash
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4116 -s 170819⤵
- Program crash
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3760 -s 109217⤵
- Program crash
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2468 -s 171215⤵
- Program crash
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 5092 -s 166013⤵
- Program crash
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1128 -s 225211⤵
- Program crash
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4384 -s 17249⤵
- Program crash
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3668 -s 17087⤵
- Program crash
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 724 -s 21805⤵
- Program crash
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1900 -s 21843⤵
- Program crash
-
C:\Windows\SysWOW64\SCHTASKS.exe"SCHTASKS.exe" /create /tn "$77Uni - Copy (101) - Copy - Copy - Copy.exe" /tr "'C:\Users\Admin\AppData\Local\Temp\uni\Uni - Copy (101) - Copy - Copy - Copy.exe'" /sc onlogon /rl HIGHEST2⤵
- Scheduled Task/Job: Scheduled Task
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 408 -p 1900 -ip 19001⤵
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 456 -p 724 -ip 7241⤵
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 492 -p 3668 -ip 36681⤵
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 536 -p 4384 -ip 43841⤵
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 420 -p 1128 -ip 11281⤵
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 360 -p 5092 -ip 50921⤵
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 540 -p 2468 -ip 24681⤵
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 436 -p 3760 -ip 37601⤵
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 188 -p 4116 -ip 41161⤵
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 388 -p 2060 -ip 20601⤵
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 416 -p 864 -ip 8641⤵
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 436 -p 4164 -ip 41641⤵
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 536 -p 392 -ip 3921⤵
Network
MITRE ATT&CK Matrix ATT&CK v13
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Local\Temp\3t5BC9ATqxxt.batFilesize
207B
MD5c838820183a3639133b7f5baa5582aca
SHA14bd082a6054aef0b11ebe48111e925c2f65dbedf
SHA25619ad603a509156f2b79403736fc853eae0f488bd63f00013c362aa20777d8063
SHA51232e1c61b04cd2cc34659422bce587b760d901395d567483747d43144d2e97aa41b9e0227e3fd83981c22c67e8803383eb0836618f7fbb5dd658ef0a88ce9ef27
-
C:\Users\Admin\AppData\Local\Temp\6A9CkqsIUkfY.batFilesize
207B
MD5b4b534378e59ed8dbf583fff31d18522
SHA1654590af8afa94d27d9bba79b5ea1dc931eae4a5
SHA25655a58400264f8ac5806e01deac1357dd4dddf65497952f8651555ddb28ce25b0
SHA512d607837ed31d57d925d926a1f5617123e22c2735ef437848a4447f6dfd0a388e70cf0bde0878b49d0722e460311ab1ccb39c55c5ccdb9d7131f4afe02cff1f61
-
C:\Users\Admin\AppData\Local\Temp\BznOoUGmDkqn.batFilesize
207B
MD5770b93ef16b1195e5db2ac4e31ec2f62
SHA1ecd5546381f683bd4e4ae1e0875509202dc7a03b
SHA256362b9252890300b933a4baf7b8425b81d3c774c72290dcf034d8df9337823fc4
SHA5128a0622d5180cd3b5ffba95b5d5dd7acef025c7d6c3afc831ab97a9d12399b3612b61dead146dd5c843a950dd4208c358d0daf0cd6f85da12b3906af3199de798
-
C:\Users\Admin\AppData\Local\Temp\Lt0qY6ALtROW.batFilesize
207B
MD5ecd150cc61087abfef658b7878786c32
SHA178fd5f5ecda88cc9a0bd7aacc9502861e0000393
SHA256db27238bc43f1312af5cf3327ab45b2ca99fed82638617b248e7820ba60cfd70
SHA512115eede44cf47f7fb533133eb2091ec4e6c94b4f6cefc55f9e623810d7dc72ca911d2683d152e2698e7749de6ce12d9dad004cd0bde1df195b0f338c0ea95349
-
C:\Users\Admin\AppData\Local\Temp\MHBXuOZvQ2eJ.batFilesize
207B
MD52868a1f99561a4cbded5d8850eaa40cb
SHA188616dfb2baf9d926b7e6c34f09401ce8899500d
SHA256f310b2e536f52aa0af2dc05bf81d76ce93ecd3342066e8207b59c24918804d09
SHA512aef4f815096ac7eb8d6e2ad89cd135150500c822d175dede64837f24170e28eaa0e5caba410c6e11eec046fa528aa4e727201625cb4bc59a8e1d6d56198cf42b
-
C:\Users\Admin\AppData\Local\Temp\PzldniTOoZJ7.batFilesize
207B
MD549f3a1ab1dd71bc48f7dee18e9d1a110
SHA16ae571f42e3530cfa07b4e71cf2e1fdd4ebfffd1
SHA256e92cb44efec0e54e292f44c4df23bc957db933ca516d375ab4f21556c82cf2fc
SHA51238716d7e82e60fe345e1ae7c00d3262e6607ee2848cf0f6a0d3f2f0a6c2d6ebe1d0e271c5fce1d4dd538dfd38c9ee1b4d8b4afeda70f874718676f4cd786f6e4
-
C:\Users\Admin\AppData\Local\Temp\Tg1PfjeYkzgz.batFilesize
207B
MD54c50901a331204576bbcdc61bd4906a2
SHA10adb0d32330958aedf5620e311cb33e344beda0a
SHA2561023b0ae26e10b8e2447e32e3bb7ab2e9c5760d4331bd770e156861b27c2d988
SHA512de46aac79003ac2a0fd69357768dd4cc58f407a143b8d48a020c31d2d49cdb1a44f3a73f0adcdca92d7f6a3408c2f6a1bf9949c7f5ff30d1604dc5a81ee28f3b
-
C:\Users\Admin\AppData\Local\Temp\Tzi3BSGdHDGQ.batFilesize
207B
MD52a8f8039143e2e9f61efb5535c6d090d
SHA187435c6238d348a9a88b2611def991f7db5c51c9
SHA2563e23a5955d1164cb915f376fa8d4daa9271229b6acd070716f226e4997bba226
SHA512d5cac5a7341bc5d35b042fefb1177df84b9380fed8526f948f6fd0e991ac50818c22056150fbb67a32596d5a8cb9c70a9bbcb404580e78a1d8f73f90c3d45e1c
-
C:\Users\Admin\AppData\Local\Temp\efAurChrp0RP.batFilesize
207B
MD5990bc5fc9ce11a76cb9859d9216687fc
SHA1a4277123f48731455dc02412191b43854560efb8
SHA2568682a47e3641284dce80eeff2814824c595ee9cbe9b68088e423f610f0f32b0c
SHA5121e29af123863b61d4fe1a8d1181960fc0dc4a1a5bdae57cfa0039027f01ee1c6b96d4ee25ee8804bf98e03c8499e3105fed1fcf01e4968273efdd0c2795fb0a0
-
C:\Users\Admin\AppData\Local\Temp\g6goIyQN8IBW.batFilesize
207B
MD5ba5d87bb139bcf8e8dec635482179d52
SHA1416d4e1c3a5bda3d5a958457523de083818b1a4e
SHA25621c2cd081e91246106b98a0ac0efe16db02f1851642e7890b739b629341281eb
SHA512235d8b9e2dd988d9929b07ffdc569f54d9dc10881659a0d5bf662ff1eb33fe0210438852e5bb0953b287c45ec2d86cf00a6dd81990943bb7d6b4950d32bdd87d
-
C:\Users\Admin\AppData\Local\Temp\iMRgiEr1kRoH.batFilesize
207B
MD5aa0df73f0b9fb70bbadff204352470a5
SHA1a0d0c29479fc97f1b17eba43f609d4d6fa4b2992
SHA25665fbb10e9a947f7860eef57eec1411f72840ed78f4b6e2d3128b706bf2f03162
SHA5129863278dbc7c9a143198d8339cc33c0843a22e649cbf1166ed0879ac631fad9560f570dcdc5b45ff7875bc5ac16cb97b8d96f4ad9bbb7e7bf8d059883d78dd9e
-
C:\Users\Admin\AppData\Local\Temp\rUjvgLfpTJXG.batFilesize
207B
MD5f2df2a4f6b5cce23c820f5243a7f7f4a
SHA14f9697ee4230f13f88d78ff6fa2ba9412bdcead5
SHA25640f01deff79b74b7d157e3c1caf1a067963bfdc2d1b8211a88cd98c398a0ca26
SHA51200f597942528cbf8b152ff19505992db9ba21a254729c5242e7fea5e09b9c6b182d0457dcd9b3b241ba9cddebec3574785954b96d1eecbb71fb0d75fb425ec1c
-
C:\Users\Admin\AppData\Local\Temp\y9O3aMvjVI0L.batFilesize
207B
MD53948262d9046de1ea9d126a8533ee249
SHA13824abb47a794e5066d93eca2e9a1cdff7dbaa26
SHA2563d235862de6c6e14011d0b70600eead31fdefcb1cdbf6be3e6caec4c02f2853a
SHA5121b78c0edeac3c72e0fc704a7dfb18f51634613b092172acc848d81c5ebf0f9b4c86f57bdff29111e9dd63b5d1656f36ffc6a12ca68607e2197a2e1ef659e8036
-
C:\Users\Admin\AppData\Roaming\Logs\07-01-2024Filesize
224B
MD53afae255b4babadc4b96a348bc0d3496
SHA15086b3db4912a1a1fdf6e2373b2754dacd6e3cd3
SHA256b1780321beb01041656599de071262d8a75ec51a56e3ee3ebd4729d045516917
SHA5127f8f886d318a79955fa2466809b860533d1492a705ef45e12cc61dc622388e81f188837720a851dd70cab576a667a4d6d240f35d7670f8075803487c2942bd01
-
C:\Users\Admin\AppData\Roaming\Logs\07-01-2024Filesize
224B
MD5cc0b974189f84999efb448db58d7ee27
SHA1798325c93536a5bee36d91a29facec623d8e7292
SHA256058683efa6eeb5b1279c128b2e66a372aa266296bfd88f19861e521ff535c4c0
SHA51206ed6a7cb3163e8c8fb58fb24d1b48a0dcb9c46bf6d0c844dcb54ac3c3e9d80c145efb2a1467ea151e6c6ddda48cff9b327eb6932a963efc8c9203edf6d47d7d
-
C:\Users\Admin\AppData\Roaming\Logs\07-01-2024MD5
d41d8cd98f00b204e9800998ecf8427e
SHA1da39a3ee5e6b4b0d3255bfef95601890afd80709
SHA256e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855
SHA512cf83e1357eefb8bdf1542850d66d8007d620e4050b5715dc83f4a921d36ce9ce47d0d13c5d85f2b0ff8318d2877eec2f63b931bd47417a81a538327af927da3e
-
C:\Users\Admin\AppData\Roaming\Logs\07-01-2024Filesize
224B
MD5b1f786fb38623e800495b8d5891ee630
SHA1fc044f1248d63a11e5071c0a4ee3ed8087f2d50e
SHA2560c061c02750c181ce344ad56dd2d170ccc640547c39a8eb1726bb5af0832888e
SHA512cfd8cbadff06a909e67fba71e272647d58531f1b426f946dcfe945ca0156887d07c448692bc036eb0f9a74c77c67b61f0938c7e8f9bdc713e0bf10e9f743cea1
-
C:\Users\Admin\AppData\Roaming\SubDir\Client.exeFilesize
409KB
MD5b70fdac25a99501e3cae11f1b775249e
SHA13c59226479bfdcd1b2927bcfb1a7516d4cb8dd71
SHA25651ff3eb450a786c1aaa75ff889f2fd256412a7b75d04277fdf9fcccc20e57246
SHA51243f0d5d6e5f0d5febba537c109ffdbc250bbb6e9725e635a43ec975b0353048eaeee50b6e9274cd5e072ea6b0cea32439bd37408b2528832f467f2075f74ca44
-
memory/1900-19-0x0000000006940000-0x000000000694A000-memory.dmpFilesize
40KB
-
memory/1900-17-0x0000000074790000-0x0000000074F40000-memory.dmpFilesize
7.7MB
-
memory/1900-15-0x0000000074790000-0x0000000074F40000-memory.dmpFilesize
7.7MB
-
memory/1900-24-0x0000000074790000-0x0000000074F40000-memory.dmpFilesize
7.7MB
-
memory/2064-8-0x0000000074790000-0x0000000074F40000-memory.dmpFilesize
7.7MB
-
memory/2064-16-0x0000000074790000-0x0000000074F40000-memory.dmpFilesize
7.7MB
-
memory/2064-0-0x000000007479E000-0x000000007479F000-memory.dmpFilesize
4KB
-
memory/2064-7-0x000000007479E000-0x000000007479F000-memory.dmpFilesize
4KB
-
memory/2064-6-0x0000000006290000-0x00000000062A2000-memory.dmpFilesize
72KB
-
memory/2064-5-0x0000000005670000-0x00000000056D6000-memory.dmpFilesize
408KB
-
memory/2064-4-0x0000000074790000-0x0000000074F40000-memory.dmpFilesize
7.7MB
-
memory/2064-3-0x00000000054D0000-0x0000000005562000-memory.dmpFilesize
584KB
-
memory/2064-2-0x0000000005A80000-0x0000000006024000-memory.dmpFilesize
5.6MB
-
memory/2064-1-0x0000000000A00000-0x0000000000A6C000-memory.dmpFilesize
432KB