Overview
overview
10Static
static
10uni/Uni - ...py.exe
windows7-x64
10uni/Uni - ...py.exe
windows10-2004-x64
10uni/Uni - ...py.exe
windows7-x64
10uni/Uni - ...py.exe
windows10-2004-x64
10uni/Uni - ...py.exe
windows7-x64
10uni/Uni - ...py.exe
windows10-2004-x64
10uni/Uni - ...py.exe
windows7-x64
10uni/Uni - ...py.exe
windows10-2004-x64
10uni/Uni - ...py.exe
windows7-x64
10uni/Uni - ...py.exe
windows10-2004-x64
10uni/Uni - ...py.exe
windows7-x64
10uni/Uni - ...py.exe
windows10-2004-x64
10uni/Uni - ...py.exe
windows7-x64
10uni/Uni - ...py.exe
windows10-2004-x64
10uni/Uni - ...py.exe
windows7-x64
10uni/Uni - ...py.exe
windows10-2004-x64
10uni/Uni - ...py.exe
windows7-x64
10uni/Uni - ...py.exe
windows10-2004-x64
10uni/Uni - ...py.exe
windows7-x64
10uni/Uni - ...py.exe
windows10-2004-x64
10uni/Uni - ...py.exe
windows7-x64
10uni/Uni - ...py.exe
windows10-2004-x64
10uni/Uni - ...py.exe
windows7-x64
10uni/Uni - ...py.exe
windows10-2004-x64
10uni/Uni - ...py.exe
windows7-x64
10uni/Uni - ...py.exe
windows10-2004-x64
10uni/Uni - ...py.exe
windows7-x64
10uni/Uni - ...py.exe
windows10-2004-x64
10uni/Uni - ...py.exe
windows7-x64
10uni/Uni - ...py.exe
windows10-2004-x64
10uni/Uni - ...py.exe
windows7-x64
10uni/Uni - ...py.exe
windows10-2004-x64
10Analysis
-
max time kernel
296s -
max time network
311s -
platform
windows10-2004_x64 -
resource
win10v2004-20240508-en -
resource tags
arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system -
submitted
15-06-2024 07:32
Behavioral task
behavioral1
Sample
uni/Uni - Copy (10) - Copy - Copy - Copy - Copy.exe
Resource
win7-20240508-en
Behavioral task
behavioral2
Sample
uni/Uni - Copy (10) - Copy - Copy - Copy - Copy.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral3
Sample
uni/Uni - Copy (10) - Copy - Copy - Copy.exe
Resource
win7-20240508-en
Behavioral task
behavioral4
Sample
uni/Uni - Copy (10) - Copy - Copy - Copy.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral5
Sample
uni/Uni - Copy (10) - Copy - Copy.exe
Resource
win7-20240611-en
Behavioral task
behavioral6
Sample
uni/Uni - Copy (10) - Copy - Copy.exe
Resource
win10v2004-20240226-en
Behavioral task
behavioral7
Sample
uni/Uni - Copy (10) - Copy.exe
Resource
win7-20240611-en
Behavioral task
behavioral8
Sample
uni/Uni - Copy (10) - Copy.exe
Resource
win10v2004-20240611-en
Behavioral task
behavioral9
Sample
uni/Uni - Copy (100) - Copy - Copy - Copy - Copy.exe
Resource
win7-20240508-en
Behavioral task
behavioral10
Sample
uni/Uni - Copy (100) - Copy - Copy - Copy - Copy.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral11
Sample
uni/Uni - Copy (100) - Copy - Copy - Copy.exe
Resource
win7-20231129-en
Behavioral task
behavioral12
Sample
uni/Uni - Copy (100) - Copy - Copy - Copy.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral13
Sample
uni/Uni - Copy (100) - Copy - Copy.exe
Resource
win7-20240220-en
Behavioral task
behavioral14
Sample
uni/Uni - Copy (100) - Copy - Copy.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral15
Sample
uni/Uni - Copy (101) - Copy - Copy - Copy - Copy.exe
Resource
win7-20240221-en
Behavioral task
behavioral16
Sample
uni/Uni - Copy (101) - Copy - Copy - Copy - Copy.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral17
Sample
uni/Uni - Copy (101) - Copy - Copy - Copy.exe
Resource
win7-20240611-en
Behavioral task
behavioral18
Sample
uni/Uni - Copy (101) - Copy - Copy - Copy.exe
Resource
win10v2004-20240226-en
Behavioral task
behavioral19
Sample
uni/Uni - Copy (101) - Copy - Copy.exe
Resource
win7-20240611-en
Behavioral task
behavioral20
Sample
uni/Uni - Copy (101) - Copy - Copy.exe
Resource
win10v2004-20240611-en
Behavioral task
behavioral21
Sample
uni/Uni - Copy (102) - Copy - Copy - Copy.exe
Resource
win7-20240508-en
Behavioral task
behavioral22
Sample
uni/Uni - Copy (102) - Copy - Copy - Copy.exe
Resource
win10v2004-20240611-en
Behavioral task
behavioral23
Sample
uni/Uni - Copy (102) - Copy - Copy.exe
Resource
win7-20240611-en
Behavioral task
behavioral24
Sample
uni/Uni - Copy (102) - Copy - Copy.exe
Resource
win10v2004-20240611-en
Behavioral task
behavioral25
Sample
uni/Uni - Copy (103) - Copy - Copy - Copy.exe
Resource
win7-20240508-en
Behavioral task
behavioral26
Sample
uni/Uni - Copy (103) - Copy - Copy - Copy.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral27
Sample
uni/Uni - Copy (103) - Copy - Copy.exe
Resource
win7-20240221-en
Behavioral task
behavioral28
Sample
uni/Uni - Copy (103) - Copy - Copy.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral29
Sample
uni/Uni - Copy (104) - Copy - Copy - Copy.exe
Resource
win7-20231129-en
Behavioral task
behavioral30
Sample
uni/Uni - Copy (104) - Copy - Copy - Copy.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral31
Sample
uni/Uni - Copy (104) - Copy - Copy.exe
Resource
win7-20240221-en
General
-
Target
uni/Uni - Copy (10) - Copy - Copy - Copy.exe
-
Size
409KB
-
MD5
b70fdac25a99501e3cae11f1b775249e
-
SHA1
3c59226479bfdcd1b2927bcfb1a7516d4cb8dd71
-
SHA256
51ff3eb450a786c1aaa75ff889f2fd256412a7b75d04277fdf9fcccc20e57246
-
SHA512
43f0d5d6e5f0d5febba537c109ffdbc250bbb6e9725e635a43ec975b0353048eaeee50b6e9274cd5e072ea6b0cea32439bd37408b2528832f467f2075f74ca44
-
SSDEEP
12288:gpbJjGut6AoE3hVVdFaC/eZPTMTDlpgfJCKuMsVs:oVaurMLcDlpRKai
Malware Config
Extracted
quasar
3.1.5
SeroXen
panel-slave.gl.at.ply.gg:57059
panel-slave.gl.at.ply.gg:27892
$Sxr-rpL8EItHN3pqIQQVy2
-
encryption_key
Lme7VBS3l58VwLM69PNM
-
install_name
Client.exe
-
log_directory
Logs
-
reconnect_delay
3000
-
startup_key
SeroXen
-
subdirectory
SubDir
Signatures
-
Quasar payload 2 IoCs
Processes:
resource yara_rule behavioral4/memory/4788-1-0x0000000000FC0000-0x000000000102C000-memory.dmp family_quasar C:\Users\Admin\AppData\Roaming\SubDir\Client.exe family_quasar -
Checks computer location settings 2 TTPs 13 IoCs
Looks up country code configured in the registry, likely geofence.
Processes:
Client.exeClient.exeClient.exeClient.exeClient.exeClient.exeClient.exeClient.exeClient.exeClient.exeClient.exeClient.exeClient.exedescription ioc process Key value queried \REGISTRY\USER\S-1-5-21-4124900551-4068476067-3491212533-1000\Control Panel\International\Geo\Nation Client.exe Key value queried \REGISTRY\USER\S-1-5-21-4124900551-4068476067-3491212533-1000\Control Panel\International\Geo\Nation Client.exe Key value queried \REGISTRY\USER\S-1-5-21-4124900551-4068476067-3491212533-1000\Control Panel\International\Geo\Nation Client.exe Key value queried \REGISTRY\USER\S-1-5-21-4124900551-4068476067-3491212533-1000\Control Panel\International\Geo\Nation Client.exe Key value queried \REGISTRY\USER\S-1-5-21-4124900551-4068476067-3491212533-1000\Control Panel\International\Geo\Nation Client.exe Key value queried \REGISTRY\USER\S-1-5-21-4124900551-4068476067-3491212533-1000\Control Panel\International\Geo\Nation Client.exe Key value queried \REGISTRY\USER\S-1-5-21-4124900551-4068476067-3491212533-1000\Control Panel\International\Geo\Nation Client.exe Key value queried \REGISTRY\USER\S-1-5-21-4124900551-4068476067-3491212533-1000\Control Panel\International\Geo\Nation Client.exe Key value queried \REGISTRY\USER\S-1-5-21-4124900551-4068476067-3491212533-1000\Control Panel\International\Geo\Nation Client.exe Key value queried \REGISTRY\USER\S-1-5-21-4124900551-4068476067-3491212533-1000\Control Panel\International\Geo\Nation Client.exe Key value queried \REGISTRY\USER\S-1-5-21-4124900551-4068476067-3491212533-1000\Control Panel\International\Geo\Nation Client.exe Key value queried \REGISTRY\USER\S-1-5-21-4124900551-4068476067-3491212533-1000\Control Panel\International\Geo\Nation Client.exe Key value queried \REGISTRY\USER\S-1-5-21-4124900551-4068476067-3491212533-1000\Control Panel\International\Geo\Nation Client.exe -
Executes dropped EXE 14 IoCs
Processes:
Client.exeClient.exeClient.exeClient.exeClient.exeClient.exeClient.exeClient.exeClient.exeClient.exeClient.exeClient.exeClient.exeClient.exepid process 2908 Client.exe 3720 Client.exe 2920 Client.exe 5104 Client.exe 2656 Client.exe 3240 Client.exe 376 Client.exe 656 Client.exe 1692 Client.exe 4072 Client.exe 1836 Client.exe 3680 Client.exe 1320 Client.exe 3148 Client.exe -
Looks up external IP address via web service 14 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
Processes:
flow ioc 18 ip-api.com 26 ip-api.com 30 ip-api.com 34 ip-api.com 36 ip-api.com 32 ip-api.com 11 api.ipify.org 14 ip-api.com 16 ip-api.com 20 ip-api.com 24 ip-api.com 3 ip-api.com 22 ip-api.com 28 ip-api.com -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Program crash 13 IoCs
Processes:
WerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exepid pid_target process target process 2988 2908 WerFault.exe Client.exe 4796 3720 WerFault.exe Client.exe 3936 2920 WerFault.exe Client.exe 2700 5104 WerFault.exe Client.exe 1084 2656 WerFault.exe Client.exe 5056 3240 WerFault.exe Client.exe 1800 376 WerFault.exe Client.exe 1580 656 WerFault.exe Client.exe 1448 1692 WerFault.exe Client.exe 224 4072 WerFault.exe Client.exe 3392 1836 WerFault.exe Client.exe 5088 3680 WerFault.exe Client.exe 604 1320 WerFault.exe Client.exe -
Creates scheduled task(s) 1 TTPs 15 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
Processes:
schtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeSCHTASKS.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exepid process 2264 schtasks.exe 4576 schtasks.exe 1864 schtasks.exe 5060 schtasks.exe 1860 schtasks.exe 4932 SCHTASKS.exe 4440 schtasks.exe 5044 schtasks.exe 2992 schtasks.exe 232 schtasks.exe 2136 schtasks.exe 3340 schtasks.exe 4368 schtasks.exe 2848 schtasks.exe 3396 schtasks.exe -
Runs ping.exe 1 TTPs 13 IoCs
Processes:
PING.EXEPING.EXEPING.EXEPING.EXEPING.EXEPING.EXEPING.EXEPING.EXEPING.EXEPING.EXEPING.EXEPING.EXEPING.EXEpid process 4608 PING.EXE 2980 PING.EXE 3196 PING.EXE 2700 PING.EXE 2208 PING.EXE 1592 PING.EXE 540 PING.EXE 4544 PING.EXE 4572 PING.EXE 4400 PING.EXE 1948 PING.EXE 1496 PING.EXE 4636 PING.EXE -
Suspicious use of AdjustPrivilegeToken 15 IoCs
Processes:
Uni - Copy (10) - Copy - Copy - Copy.exeClient.exeClient.exeClient.exeClient.exeClient.exeClient.exeClient.exeClient.exeClient.exeClient.exeClient.exeClient.exeClient.exeClient.exedescription pid process Token: SeDebugPrivilege 4788 Uni - Copy (10) - Copy - Copy - Copy.exe Token: SeDebugPrivilege 2908 Client.exe Token: SeDebugPrivilege 3720 Client.exe Token: SeDebugPrivilege 2920 Client.exe Token: SeDebugPrivilege 5104 Client.exe Token: SeDebugPrivilege 2656 Client.exe Token: SeDebugPrivilege 3240 Client.exe Token: SeDebugPrivilege 376 Client.exe Token: SeDebugPrivilege 656 Client.exe Token: SeDebugPrivilege 1692 Client.exe Token: SeDebugPrivilege 4072 Client.exe Token: SeDebugPrivilege 1836 Client.exe Token: SeDebugPrivilege 3680 Client.exe Token: SeDebugPrivilege 1320 Client.exe Token: SeDebugPrivilege 3148 Client.exe -
Suspicious use of SetWindowsHookEx 13 IoCs
Processes:
Client.exeClient.exeClient.exeClient.exeClient.exeClient.exeClient.exeClient.exeClient.exeClient.exeClient.exeClient.exeClient.exepid process 2908 Client.exe 3720 Client.exe 2920 Client.exe 5104 Client.exe 2656 Client.exe 3240 Client.exe 376 Client.exe 656 Client.exe 1692 Client.exe 4072 Client.exe 1836 Client.exe 3680 Client.exe 1320 Client.exe -
Suspicious use of WriteProcessMemory 64 IoCs
Processes:
Uni - Copy (10) - Copy - Copy - Copy.exeClient.execmd.exeClient.execmd.exeClient.execmd.exeClient.execmd.exedescription pid process target process PID 4788 wrote to memory of 1860 4788 Uni - Copy (10) - Copy - Copy - Copy.exe schtasks.exe PID 4788 wrote to memory of 1860 4788 Uni - Copy (10) - Copy - Copy - Copy.exe schtasks.exe PID 4788 wrote to memory of 1860 4788 Uni - Copy (10) - Copy - Copy - Copy.exe schtasks.exe PID 4788 wrote to memory of 2908 4788 Uni - Copy (10) - Copy - Copy - Copy.exe Client.exe PID 4788 wrote to memory of 2908 4788 Uni - Copy (10) - Copy - Copy - Copy.exe Client.exe PID 4788 wrote to memory of 2908 4788 Uni - Copy (10) - Copy - Copy - Copy.exe Client.exe PID 4788 wrote to memory of 4932 4788 Uni - Copy (10) - Copy - Copy - Copy.exe SCHTASKS.exe PID 4788 wrote to memory of 4932 4788 Uni - Copy (10) - Copy - Copy - Copy.exe SCHTASKS.exe PID 4788 wrote to memory of 4932 4788 Uni - Copy (10) - Copy - Copy - Copy.exe SCHTASKS.exe PID 2908 wrote to memory of 2264 2908 Client.exe schtasks.exe PID 2908 wrote to memory of 2264 2908 Client.exe schtasks.exe PID 2908 wrote to memory of 2264 2908 Client.exe schtasks.exe PID 2908 wrote to memory of 4324 2908 Client.exe cmd.exe PID 2908 wrote to memory of 4324 2908 Client.exe cmd.exe PID 2908 wrote to memory of 4324 2908 Client.exe cmd.exe PID 4324 wrote to memory of 4264 4324 cmd.exe chcp.com PID 4324 wrote to memory of 4264 4324 cmd.exe chcp.com PID 4324 wrote to memory of 4264 4324 cmd.exe chcp.com PID 4324 wrote to memory of 1948 4324 cmd.exe PING.EXE PID 4324 wrote to memory of 1948 4324 cmd.exe PING.EXE PID 4324 wrote to memory of 1948 4324 cmd.exe PING.EXE PID 4324 wrote to memory of 3720 4324 cmd.exe Client.exe PID 4324 wrote to memory of 3720 4324 cmd.exe Client.exe PID 4324 wrote to memory of 3720 4324 cmd.exe Client.exe PID 3720 wrote to memory of 3340 3720 Client.exe schtasks.exe PID 3720 wrote to memory of 3340 3720 Client.exe schtasks.exe PID 3720 wrote to memory of 3340 3720 Client.exe schtasks.exe PID 3720 wrote to memory of 3900 3720 Client.exe cmd.exe PID 3720 wrote to memory of 3900 3720 Client.exe cmd.exe PID 3720 wrote to memory of 3900 3720 Client.exe cmd.exe PID 3900 wrote to memory of 1564 3900 cmd.exe chcp.com PID 3900 wrote to memory of 1564 3900 cmd.exe chcp.com PID 3900 wrote to memory of 1564 3900 cmd.exe chcp.com PID 3900 wrote to memory of 4544 3900 cmd.exe PING.EXE PID 3900 wrote to memory of 4544 3900 cmd.exe PING.EXE PID 3900 wrote to memory of 4544 3900 cmd.exe PING.EXE PID 3900 wrote to memory of 2920 3900 cmd.exe Client.exe PID 3900 wrote to memory of 2920 3900 cmd.exe Client.exe PID 3900 wrote to memory of 2920 3900 cmd.exe Client.exe PID 2920 wrote to memory of 4368 2920 Client.exe schtasks.exe PID 2920 wrote to memory of 4368 2920 Client.exe schtasks.exe PID 2920 wrote to memory of 4368 2920 Client.exe schtasks.exe PID 2920 wrote to memory of 4812 2920 Client.exe cmd.exe PID 2920 wrote to memory of 4812 2920 Client.exe cmd.exe PID 2920 wrote to memory of 4812 2920 Client.exe cmd.exe PID 4812 wrote to memory of 1660 4812 cmd.exe chcp.com PID 4812 wrote to memory of 1660 4812 cmd.exe chcp.com PID 4812 wrote to memory of 1660 4812 cmd.exe chcp.com PID 4812 wrote to memory of 2208 4812 cmd.exe PING.EXE PID 4812 wrote to memory of 2208 4812 cmd.exe PING.EXE PID 4812 wrote to memory of 2208 4812 cmd.exe PING.EXE PID 4812 wrote to memory of 5104 4812 cmd.exe Client.exe PID 4812 wrote to memory of 5104 4812 cmd.exe Client.exe PID 4812 wrote to memory of 5104 4812 cmd.exe Client.exe PID 5104 wrote to memory of 4576 5104 Client.exe schtasks.exe PID 5104 wrote to memory of 4576 5104 Client.exe schtasks.exe PID 5104 wrote to memory of 4576 5104 Client.exe schtasks.exe PID 5104 wrote to memory of 2600 5104 Client.exe cmd.exe PID 5104 wrote to memory of 2600 5104 Client.exe cmd.exe PID 5104 wrote to memory of 2600 5104 Client.exe cmd.exe PID 2600 wrote to memory of 2892 2600 cmd.exe chcp.com PID 2600 wrote to memory of 2892 2600 cmd.exe chcp.com PID 2600 wrote to memory of 2892 2600 cmd.exe chcp.com PID 2600 wrote to memory of 4608 2600 cmd.exe PING.EXE
Processes
-
C:\Users\Admin\AppData\Local\Temp\uni\Uni - Copy (10) - Copy - Copy - Copy.exe"C:\Users\Admin\AppData\Local\Temp\uni\Uni - Copy (10) - Copy - Copy - Copy.exe"1⤵
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\schtasks.exe"schtasks" /create /tn "SeroXen" /sc ONLOGON /tr "C:\Users\Admin\AppData\Local\Temp\uni\Uni - Copy (10) - Copy - Copy - Copy.exe" /rl HIGHEST /f2⤵
- Creates scheduled task(s)
-
C:\Users\Admin\AppData\Roaming\SubDir\Client.exe"C:\Users\Admin\AppData\Roaming\SubDir\Client.exe"2⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\schtasks.exe"schtasks" /create /tn "SeroXen" /sc ONLOGON /tr "C:\Users\Admin\AppData\Roaming\SubDir\Client.exe" /rl HIGHEST /f3⤵
- Creates scheduled task(s)
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\9YG6EniSkgZG.bat" "3⤵
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\chcp.comchcp 650014⤵
-
C:\Windows\SysWOW64\PING.EXEping -n 10 localhost4⤵
- Runs ping.exe
-
C:\Users\Admin\AppData\Roaming\SubDir\Client.exe"C:\Users\Admin\AppData\Roaming\SubDir\Client.exe"4⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\schtasks.exe"schtasks" /create /tn "SeroXen" /sc ONLOGON /tr "C:\Users\Admin\AppData\Roaming\SubDir\Client.exe" /rl HIGHEST /f5⤵
- Creates scheduled task(s)
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\cSdFpiJ8lZEl.bat" "5⤵
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\chcp.comchcp 650016⤵
-
C:\Windows\SysWOW64\PING.EXEping -n 10 localhost6⤵
- Runs ping.exe
-
C:\Users\Admin\AppData\Roaming\SubDir\Client.exe"C:\Users\Admin\AppData\Roaming\SubDir\Client.exe"6⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\schtasks.exe"schtasks" /create /tn "SeroXen" /sc ONLOGON /tr "C:\Users\Admin\AppData\Roaming\SubDir\Client.exe" /rl HIGHEST /f7⤵
- Creates scheduled task(s)
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\kAikTUecDnIX.bat" "7⤵
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\chcp.comchcp 650018⤵
-
C:\Windows\SysWOW64\PING.EXEping -n 10 localhost8⤵
- Runs ping.exe
-
C:\Users\Admin\AppData\Roaming\SubDir\Client.exe"C:\Users\Admin\AppData\Roaming\SubDir\Client.exe"8⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\schtasks.exe"schtasks" /create /tn "SeroXen" /sc ONLOGON /tr "C:\Users\Admin\AppData\Roaming\SubDir\Client.exe" /rl HIGHEST /f9⤵
- Creates scheduled task(s)
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\G48T7SlCKt2h.bat" "9⤵
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\chcp.comchcp 6500110⤵
-
C:\Windows\SysWOW64\PING.EXEping -n 10 localhost10⤵
- Runs ping.exe
-
C:\Users\Admin\AppData\Roaming\SubDir\Client.exe"C:\Users\Admin\AppData\Roaming\SubDir\Client.exe"10⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
-
C:\Windows\SysWOW64\schtasks.exe"schtasks" /create /tn "SeroXen" /sc ONLOGON /tr "C:\Users\Admin\AppData\Roaming\SubDir\Client.exe" /rl HIGHEST /f11⤵
- Creates scheduled task(s)
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\dthKY39Y7MdZ.bat" "11⤵
-
C:\Windows\SysWOW64\chcp.comchcp 6500112⤵
-
C:\Windows\SysWOW64\PING.EXEping -n 10 localhost12⤵
- Runs ping.exe
-
C:\Users\Admin\AppData\Roaming\SubDir\Client.exe"C:\Users\Admin\AppData\Roaming\SubDir\Client.exe"12⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
-
C:\Windows\SysWOW64\schtasks.exe"schtasks" /create /tn "SeroXen" /sc ONLOGON /tr "C:\Users\Admin\AppData\Roaming\SubDir\Client.exe" /rl HIGHEST /f13⤵
- Creates scheduled task(s)
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\7IxEQoe3XUUq.bat" "13⤵
-
C:\Windows\SysWOW64\chcp.comchcp 6500114⤵
-
C:\Windows\SysWOW64\PING.EXEping -n 10 localhost14⤵
- Runs ping.exe
-
C:\Users\Admin\AppData\Roaming\SubDir\Client.exe"C:\Users\Admin\AppData\Roaming\SubDir\Client.exe"14⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
-
C:\Windows\SysWOW64\schtasks.exe"schtasks" /create /tn "SeroXen" /sc ONLOGON /tr "C:\Users\Admin\AppData\Roaming\SubDir\Client.exe" /rl HIGHEST /f15⤵
- Creates scheduled task(s)
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\ztZNIkwfcU1V.bat" "15⤵
-
C:\Windows\SysWOW64\chcp.comchcp 6500116⤵
-
C:\Windows\SysWOW64\PING.EXEping -n 10 localhost16⤵
- Runs ping.exe
-
C:\Users\Admin\AppData\Roaming\SubDir\Client.exe"C:\Users\Admin\AppData\Roaming\SubDir\Client.exe"16⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
-
C:\Windows\SysWOW64\schtasks.exe"schtasks" /create /tn "SeroXen" /sc ONLOGON /tr "C:\Users\Admin\AppData\Roaming\SubDir\Client.exe" /rl HIGHEST /f17⤵
- Creates scheduled task(s)
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\qQQ1HUsVIasb.bat" "17⤵
-
C:\Windows\SysWOW64\chcp.comchcp 6500118⤵
-
C:\Windows\SysWOW64\PING.EXEping -n 10 localhost18⤵
- Runs ping.exe
-
C:\Users\Admin\AppData\Roaming\SubDir\Client.exe"C:\Users\Admin\AppData\Roaming\SubDir\Client.exe"18⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
-
C:\Windows\SysWOW64\schtasks.exe"schtasks" /create /tn "SeroXen" /sc ONLOGON /tr "C:\Users\Admin\AppData\Roaming\SubDir\Client.exe" /rl HIGHEST /f19⤵
- Creates scheduled task(s)
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\pbjEaZHH0Fee.bat" "19⤵
-
C:\Windows\SysWOW64\chcp.comchcp 6500120⤵
-
C:\Windows\SysWOW64\PING.EXEping -n 10 localhost20⤵
- Runs ping.exe
-
C:\Users\Admin\AppData\Roaming\SubDir\Client.exe"C:\Users\Admin\AppData\Roaming\SubDir\Client.exe"20⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
-
C:\Windows\SysWOW64\schtasks.exe"schtasks" /create /tn "SeroXen" /sc ONLOGON /tr "C:\Users\Admin\AppData\Roaming\SubDir\Client.exe" /rl HIGHEST /f21⤵
- Creates scheduled task(s)
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\dBWdelOZaQUP.bat" "21⤵
-
C:\Windows\SysWOW64\chcp.comchcp 6500122⤵
-
C:\Windows\SysWOW64\PING.EXEping -n 10 localhost22⤵
- Runs ping.exe
-
C:\Users\Admin\AppData\Roaming\SubDir\Client.exe"C:\Users\Admin\AppData\Roaming\SubDir\Client.exe"22⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
-
C:\Windows\SysWOW64\schtasks.exe"schtasks" /create /tn "SeroXen" /sc ONLOGON /tr "C:\Users\Admin\AppData\Roaming\SubDir\Client.exe" /rl HIGHEST /f23⤵
- Creates scheduled task(s)
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\JgSAWcncqzBs.bat" "23⤵
-
C:\Windows\SysWOW64\chcp.comchcp 6500124⤵
-
C:\Windows\SysWOW64\PING.EXEping -n 10 localhost24⤵
- Runs ping.exe
-
C:\Users\Admin\AppData\Roaming\SubDir\Client.exe"C:\Users\Admin\AppData\Roaming\SubDir\Client.exe"24⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
-
C:\Windows\SysWOW64\schtasks.exe"schtasks" /create /tn "SeroXen" /sc ONLOGON /tr "C:\Users\Admin\AppData\Roaming\SubDir\Client.exe" /rl HIGHEST /f25⤵
- Creates scheduled task(s)
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\k4uLbc8okJKE.bat" "25⤵
-
C:\Windows\SysWOW64\chcp.comchcp 6500126⤵
-
C:\Windows\SysWOW64\PING.EXEping -n 10 localhost26⤵
- Runs ping.exe
-
C:\Users\Admin\AppData\Roaming\SubDir\Client.exe"C:\Users\Admin\AppData\Roaming\SubDir\Client.exe"26⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
-
C:\Windows\SysWOW64\schtasks.exe"schtasks" /create /tn "SeroXen" /sc ONLOGON /tr "C:\Users\Admin\AppData\Roaming\SubDir\Client.exe" /rl HIGHEST /f27⤵
- Creates scheduled task(s)
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\MY29gjMYU4Kn.bat" "27⤵
-
C:\Windows\SysWOW64\chcp.comchcp 6500128⤵
-
C:\Windows\SysWOW64\PING.EXEping -n 10 localhost28⤵
- Runs ping.exe
-
C:\Users\Admin\AppData\Roaming\SubDir\Client.exe"C:\Users\Admin\AppData\Roaming\SubDir\Client.exe"28⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1320 -s 224027⤵
- Program crash
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3680 -s 109625⤵
- Program crash
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1836 -s 109223⤵
- Program crash
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4072 -s 222021⤵
- Program crash
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1692 -s 109219⤵
- Program crash
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 656 -s 109617⤵
- Program crash
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 376 -s 222415⤵
- Program crash
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3240 -s 167213⤵
- Program crash
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2656 -s 109211⤵
- Program crash
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 5104 -s 22249⤵
- Program crash
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2920 -s 10887⤵
- Program crash
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3720 -s 16485⤵
- Program crash
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2908 -s 14523⤵
- Program crash
-
C:\Windows\SysWOW64\SCHTASKS.exe"SCHTASKS.exe" /create /tn "$77Uni - Copy (10) - Copy - Copy - Copy.exe" /tr "'C:\Users\Admin\AppData\Local\Temp\uni\Uni - Copy (10) - Copy - Copy - Copy.exe'" /sc onlogon /rl HIGHEST2⤵
- Creates scheduled task(s)
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 412 -p 2908 -ip 29081⤵
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 512 -p 3720 -ip 37201⤵
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 528 -p 2920 -ip 29201⤵
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 416 -p 5104 -ip 51041⤵
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 516 -p 2656 -ip 26561⤵
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 416 -p 3240 -ip 32401⤵
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 456 -p 376 -ip 3761⤵
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 548 -p 656 -ip 6561⤵
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 548 -p 1692 -ip 16921⤵
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 548 -p 4072 -ip 40721⤵
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 424 -p 1836 -ip 18361⤵
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 532 -p 3680 -ip 36801⤵
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 520 -p 1320 -ip 13201⤵
Network
MITRE ATT&CK Matrix ATT&CK v13
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Local\Temp\7IxEQoe3XUUq.batFilesize
207B
MD54090355629511d111213c605eaf5057a
SHA1eb44431192743689d3de8a92d3b03fe1d6d57236
SHA256b36a4f22fe6457a47701ee679b08ceabf44a840231067e19c0bef72664703b0b
SHA512a3c58d20e83eb33ac8814025fbcde8cb144e6286622a5675aa4de2d7c23a014e9a8fddb4fb62d73654905cece900cdb466a7f5a5c0bf3c03cbd1ee4a5d67b8b3
-
C:\Users\Admin\AppData\Local\Temp\9YG6EniSkgZG.batFilesize
207B
MD54143ce56e9f7cce71596c335b7b117f9
SHA1015931310ee44823bbba6a20969cfed6b084e5da
SHA2563de92ca8cca4172f773ae8c07869f149000682c6e03a2458403be1534764f98e
SHA512074607339cca6f43e29511e0fd75780840147d7b4b6b23c0d0de25a0c54eb09d3e9521144c167dab12f8f52e0669a4d5d5c6604fc927dd15706eb0ae168106fb
-
C:\Users\Admin\AppData\Local\Temp\G48T7SlCKt2h.batFilesize
207B
MD58135509423c1e13ee6fa0fac2781dca9
SHA1c0e2f7e11de727570b5bc2d042ce8f041c900007
SHA25660b48be2af95f98b4c24863e98b1d1e666fae2a1e85821d8c73d74309ee81f5e
SHA512150b107142c6f8972a0bea71d25ae2afbc376c6f1f6a905a44d084ad1ddcb3e0715c25276c451866962dab336acb3da2729ab843d73760c7001a62c9312d51f6
-
C:\Users\Admin\AppData\Local\Temp\JgSAWcncqzBs.batFilesize
207B
MD53e006c765c1c75a975298b28c9e52936
SHA1ed7db0713374b3629e12d95395c48b85d31fceda
SHA256991eefb1be4bd32fa9d2beec6015fc70fc6099cd567c751f9ab0f6c6e41bf603
SHA512ea2cc9fc445853d3d7d1f0d0de39ea72b1d7a6b54d27b38958556715e9a26c5aeef0d626aba6acaef3c3f60c634f45d3e41532f944b0d1e1eeb3e074df355498
-
C:\Users\Admin\AppData\Local\Temp\MY29gjMYU4Kn.batFilesize
207B
MD54369ca9bdbf2188c7297f1c66cebc8ee
SHA10da259d0b8caaff402e9901cd61193ade79c47fb
SHA2568bc3e1f8fbe3d25462fd963fbccf1cbe7f1ef057f70a053d224afbadee77a654
SHA51207e90dadaf206f746a9202c3612dc5ddab0f2a8b45bf27ddd43cf46c6130b1e1ef831859c1c64dd810d2ef0d23e6769d92e166652d25a2d633e3765bc658db6d
-
C:\Users\Admin\AppData\Local\Temp\cSdFpiJ8lZEl.batFilesize
207B
MD576cdc415210cd74890f9105f7c36a418
SHA1b21578be8d1abfb0b1e42deff7768af3fc4677d4
SHA256700ea86cf4d7f974f7b987acdb3c0360df7738d2a11186f46475064312778eac
SHA51286d9ff15bc13d750fc14c9d1141b3cbbd21ef446d0da2ac1e67cf59ae963a524fa79add69d3452701f15143e938a563c946f54512efbd834f8b86efd774c6ccc
-
C:\Users\Admin\AppData\Local\Temp\dBWdelOZaQUP.batFilesize
207B
MD51cc927975ba8838921e0af30f3a3ed8e
SHA177c94500c8f60dda900d84641f8aa28271eec473
SHA256f0502a29970fa9b91a310c257799779b5acce7d136d56bd66c63868cbb4a4441
SHA5123ca5dc50ee509429860f426a7d0eecd4b6255a17b464d4ecc7f819f0f9c21480634dd6a0b8e72586ce9276abb52999edc0065171c7f28f0a9cb8f8445a927cf3
-
C:\Users\Admin\AppData\Local\Temp\dthKY39Y7MdZ.batFilesize
207B
MD56aec1fe43659b0a242cb46cb4b07096f
SHA160aa63358933e3d2d26970917c7ad66b750ea86e
SHA2566610c0e6b6f73285741d5b1b9221f24ccfde7efcddf103a8025968299f1a5836
SHA5121ebe6fe635ee75ddad664aa5bd15ebcfef75a1f954c861df73409eaeda043b8cc408f6e302e5d75fd72022ac86f8e32e7ec3e422420d13a4c7f9168ba79a43c1
-
C:\Users\Admin\AppData\Local\Temp\k4uLbc8okJKE.batFilesize
207B
MD50f1f9875bc329f4c17a6634f93f38de7
SHA17dfae9e9a6ddff4b185fb746be20e5a79fab379a
SHA256cc28bbb08c54852cd1e6de6d061720c97e576fcd2e3d866869576bde57f35676
SHA512a105b6991b8b2950ef4c9176ecef697a28dd62b1a4044f46b4aefbfa70684e82f1efc47ac1429d60cb39a01484284b4e2de8d6b901ceb7e4886fea44b6fa16b2
-
C:\Users\Admin\AppData\Local\Temp\kAikTUecDnIX.batFilesize
207B
MD55af7dace40a5a8d93ceab1bca292cd22
SHA1ebc6c34dc49d833dba81a58b85f0a1c1b1d0aeb9
SHA256abecebc8de93689be5d98aabf4dda79c9e53a0ac37c394bcea3ca4d2358cbb0a
SHA51279207077c8f2c4609c00f12b1efa14fa37e321cc3f261fa8aadceaa97a191a493a68028b48cac8a49c334e76d68091377efcbd228c3f6a7c3eb0b7b1c3372d09
-
C:\Users\Admin\AppData\Local\Temp\pbjEaZHH0Fee.batFilesize
207B
MD57904005b55d0103b10c6dcb9344aa4cb
SHA11a4e81da28c9ae6373a5591678e69b5d64ba94fb
SHA256b7fac4474933133814a7578518728d4558404427d3ed872aada72cb4ae812f5d
SHA512cc1493748464ff63131b0acdefee205371b6012241f300b0155507441fc8dc192b9cc00b7c4f9e178939e572372bbd53ca1f4b84da6b5a88780080882c7639db
-
C:\Users\Admin\AppData\Local\Temp\qQQ1HUsVIasb.batFilesize
207B
MD5f4543a84cc1d1456e3b218d6b60d71a2
SHA1e359efc5fb5f7289d0ef39faf00f3141e4eef3bf
SHA256a88caf92fce47bd660af949fb696415a1ef18a88ecacb7a8439938cfd2fa16f9
SHA512bddb19df1eb92813a4fc02faeae0624cde60cbdd5b94067767f88ac31caddb9b6a98b7fd396568e27c4126cd054809a9c64a62e4f0253f46831fd70af78a3ce0
-
C:\Users\Admin\AppData\Local\Temp\ztZNIkwfcU1V.batFilesize
207B
MD56930812ec4c23ad1f180c4f983e059b4
SHA1fe4b27790c8262889707db8416c09ad827a0907e
SHA2561f2cb70f0739abe61037eb65a0caa7d562676032b2fdc15415a62c4f514a01eb
SHA5127f6fb967933ce5bcf9a3db957f5b37f785a92e3d1206ea81edd480eccb4f4adbe34c8ed06bf6935ec0cd2d5346c404068f0af0dd2872c6e60697f5b7573fd13f
-
C:\Users\Admin\AppData\Roaming\Logs\06-15-2024Filesize
224B
MD5171671f3f3d762be0c11b7ec7b8e26a0
SHA18f7a3d3a55af21ac63f8d608b39645a29c75f0b9
SHA2563742a07083b16e52d7135fe9a7eca3fd1de89f799cd6c1f609f603f29ab94979
SHA5126c16e8bc865b02b9604a7364158a01a27ae393fcfef29b395479b893aac9073baa6c0c6c59fc9cdf7116587e6907b5dd40213230352c8605a2ec4d1ba1733889
-
C:\Users\Admin\AppData\Roaming\Logs\06-15-2024MD5
d41d8cd98f00b204e9800998ecf8427e
SHA1da39a3ee5e6b4b0d3255bfef95601890afd80709
SHA256e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855
SHA512cf83e1357eefb8bdf1542850d66d8007d620e4050b5715dc83f4a921d36ce9ce47d0d13c5d85f2b0ff8318d2877eec2f63b931bd47417a81a538327af927da3e
-
C:\Users\Admin\AppData\Roaming\Logs\06-15-2024Filesize
224B
MD51897267d9cca018881fe158125f18e07
SHA197b46b754217c51ffd024040b58add260251acac
SHA2563f30b51ba8adab932c5fdd0b5dc40c96ea3e2ec5a6b1ab7dc82d4d48a5349746
SHA5122cda87bb5de7205d4d22ec1902c7cda79233fd2e04e1ce8c7ea497d0edcbd2ccb3bc83cbb5d7b1d322a439f43dfc3eced0c4d069cd4ab518c7f1da1839499fa2
-
C:\Users\Admin\AppData\Roaming\Logs\06-15-2024Filesize
224B
MD5bcd14e6f4f1fd586c4bc0fc18fe74406
SHA195fa0a334cfed3b37fe690b5344859647cb2b98b
SHA2567a427e3b175024231c59f7d94dca1f2efc707fa5fd8ccd1bf1153a1609050bef
SHA512b8d24735f30d88f8f893537b76266cf7bcf56623ede3570dd4970c59dc297b52b421d48824a647bce091689d65df81dfa11e559c83edbbe7f80d15293204ecf7
-
C:\Users\Admin\AppData\Roaming\SubDir\Client.exeFilesize
409KB
MD5b70fdac25a99501e3cae11f1b775249e
SHA13c59226479bfdcd1b2927bcfb1a7516d4cb8dd71
SHA25651ff3eb450a786c1aaa75ff889f2fd256412a7b75d04277fdf9fcccc20e57246
SHA51243f0d5d6e5f0d5febba537c109ffdbc250bbb6e9725e635a43ec975b0353048eaeee50b6e9274cd5e072ea6b0cea32439bd37408b2528832f467f2075f74ca44
-
memory/2908-19-0x0000000005F10000-0x0000000005F1A000-memory.dmpFilesize
40KB
-
memory/2908-16-0x0000000074D20000-0x00000000754D0000-memory.dmpFilesize
7.7MB
-
memory/2908-24-0x0000000074D20000-0x00000000754D0000-memory.dmpFilesize
7.7MB
-
memory/2908-15-0x0000000074D20000-0x00000000754D0000-memory.dmpFilesize
7.7MB
-
memory/4788-7-0x0000000074D2E000-0x0000000074D2F000-memory.dmpFilesize
4KB
-
memory/4788-8-0x0000000074D20000-0x00000000754D0000-memory.dmpFilesize
7.7MB
-
memory/4788-17-0x0000000074D20000-0x00000000754D0000-memory.dmpFilesize
7.7MB
-
memory/4788-6-0x0000000006750000-0x0000000006762000-memory.dmpFilesize
72KB
-
memory/4788-5-0x0000000005B00000-0x0000000005B66000-memory.dmpFilesize
408KB
-
memory/4788-4-0x0000000074D20000-0x00000000754D0000-memory.dmpFilesize
7.7MB
-
memory/4788-3-0x0000000005A60000-0x0000000005AF2000-memory.dmpFilesize
584KB
-
memory/4788-0-0x0000000074D2E000-0x0000000074D2F000-memory.dmpFilesize
4KB
-
memory/4788-2-0x0000000005F00000-0x00000000064A4000-memory.dmpFilesize
5.6MB
-
memory/4788-1-0x0000000000FC0000-0x000000000102C000-memory.dmpFilesize
432KB