Analysis

  • max time kernel
    149s
  • max time network
    150s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20241007-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system
  • submitted
    21-12-2024 12:25

General

  • Target

    ANYX-client-build/AnyLoaderV4.9.exe

  • Size

    3.1MB

  • MD5

    9a99be1ac8e21a3c4959702a02b25d6e

  • SHA1

    55d6230481e90c8a2f9d09956c07e3db1d03a96d

  • SHA256

    e26918aac1a313925a7aecdaeb1990788cd2e09e439cd3e5fe8d6babb89df0f1

  • SHA512

    46ae9d4d95c89afb3ed987445dcf72c71e770e99c35759a724e963952784d518530b2829b856b7818a8bc226e35fa8f243e18e35da4d7169c44edc5303159ea4

  • SSDEEP

    49152:rvelL26AaNeWgPhlmVqvMQ7XSKodL5mzSooGdw9THHB72eh2NT:rvOL26AaNeWgPhlmVqkQ7XSKodL0A

Malware Config

Extracted

Family

quasar

Version

1.4.1

Botnet

Office04

C2

rolok44419-55109.portmap.host:55109

Mutex

0bcbf378-c5c6-4d35-b7db-11442a750cf2

Attributes
  • encryption_key

    A1C7F8E92E515420A946C210E4F8C886810ADBFD

  • install_name

    AnyLoaderV4.9.exe

  • log_directory

    Logs

  • reconnect_delay

    3000

  • startup_key

    svchost

  • subdirectory

    SubDir

Signatures

  • Quasar RAT

    Quasar is an open source Remote Access Tool.

  • Quasar family
  • Quasar payload 2 IoCs
  • Checks computer location settings 2 TTPs 15 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Executes dropped EXE 15 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Network Configuration Discovery: Internet Connection Discovery 1 TTPs 15 IoCs

    Adversaries may check for Internet connectivity on compromised systems.

  • Runs ping.exe 1 TTPs 15 IoCs
  • Scheduled Task/Job: Scheduled Task 1 TTPs 16 IoCs

    Schtasks is often used by malware for persistence or to perform post-infection execution.

  • Suspicious use of AdjustPrivilegeToken 16 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs
  • Uses Task Scheduler COM API 1 TTPs

    The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.

Processes

  • C:\Users\Admin\AppData\Local\Temp\ANYX-client-build\AnyLoaderV4.9.exe
    "C:\Users\Admin\AppData\Local\Temp\ANYX-client-build\AnyLoaderV4.9.exe"
    1⤵
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:216
    • C:\Windows\SYSTEM32\schtasks.exe
      "schtasks" /create /tn "svchost" /sc ONLOGON /tr "C:\Users\Admin\AppData\Roaming\SubDir\AnyLoaderV4.9.exe" /rl HIGHEST /f
      2⤵
      • Scheduled Task/Job: Scheduled Task
      PID:4964
    • C:\Users\Admin\AppData\Roaming\SubDir\AnyLoaderV4.9.exe
      "C:\Users\Admin\AppData\Roaming\SubDir\AnyLoaderV4.9.exe"
      2⤵
      • Checks computer location settings
      • Executes dropped EXE
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of WriteProcessMemory
      PID:1088
      • C:\Windows\SYSTEM32\schtasks.exe
        "schtasks" /create /tn "svchost" /sc ONLOGON /tr "C:\Users\Admin\AppData\Roaming\SubDir\AnyLoaderV4.9.exe" /rl HIGHEST /f
        3⤵
        • Scheduled Task/Job: Scheduled Task
        PID:3276
      • C:\Windows\system32\cmd.exe
        C:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\VNDmP9kNASSP.bat" "
        3⤵
        • Suspicious use of WriteProcessMemory
        PID:2428
        • C:\Windows\system32\chcp.com
          chcp 65001
          4⤵
            PID:920
          • C:\Windows\system32\PING.EXE
            ping -n 10 localhost
            4⤵
            • System Network Configuration Discovery: Internet Connection Discovery
            • Runs ping.exe
            PID:2560
          • C:\Users\Admin\AppData\Roaming\SubDir\AnyLoaderV4.9.exe
            "C:\Users\Admin\AppData\Roaming\SubDir\AnyLoaderV4.9.exe"
            4⤵
            • Checks computer location settings
            • Executes dropped EXE
            • Suspicious use of AdjustPrivilegeToken
            • Suspicious use of WriteProcessMemory
            PID:1668
            • C:\Windows\SYSTEM32\schtasks.exe
              "schtasks" /create /tn "svchost" /sc ONLOGON /tr "C:\Users\Admin\AppData\Roaming\SubDir\AnyLoaderV4.9.exe" /rl HIGHEST /f
              5⤵
              • Scheduled Task/Job: Scheduled Task
              PID:4556
            • C:\Windows\system32\cmd.exe
              C:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\vsilv43r771R.bat" "
              5⤵
              • Suspicious use of WriteProcessMemory
              PID:4768
              • C:\Windows\system32\chcp.com
                chcp 65001
                6⤵
                  PID:3220
                • C:\Windows\system32\PING.EXE
                  ping -n 10 localhost
                  6⤵
                  • System Network Configuration Discovery: Internet Connection Discovery
                  • Runs ping.exe
                  PID:4616
                • C:\Users\Admin\AppData\Roaming\SubDir\AnyLoaderV4.9.exe
                  "C:\Users\Admin\AppData\Roaming\SubDir\AnyLoaderV4.9.exe"
                  6⤵
                  • Checks computer location settings
                  • Executes dropped EXE
                  • Suspicious use of AdjustPrivilegeToken
                  • Suspicious use of WriteProcessMemory
                  PID:3556
                  • C:\Windows\SYSTEM32\schtasks.exe
                    "schtasks" /create /tn "svchost" /sc ONLOGON /tr "C:\Users\Admin\AppData\Roaming\SubDir\AnyLoaderV4.9.exe" /rl HIGHEST /f
                    7⤵
                    • Scheduled Task/Job: Scheduled Task
                    PID:840
                  • C:\Windows\system32\cmd.exe
                    C:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\W27Z341pMdUy.bat" "
                    7⤵
                    • Suspicious use of WriteProcessMemory
                    PID:1160
                    • C:\Windows\system32\chcp.com
                      chcp 65001
                      8⤵
                        PID:632
                      • C:\Windows\system32\PING.EXE
                        ping -n 10 localhost
                        8⤵
                        • System Network Configuration Discovery: Internet Connection Discovery
                        • Runs ping.exe
                        PID:3008
                      • C:\Users\Admin\AppData\Roaming\SubDir\AnyLoaderV4.9.exe
                        "C:\Users\Admin\AppData\Roaming\SubDir\AnyLoaderV4.9.exe"
                        8⤵
                        • Checks computer location settings
                        • Executes dropped EXE
                        • Suspicious use of AdjustPrivilegeToken
                        • Suspicious use of WriteProcessMemory
                        PID:3372
                        • C:\Windows\SYSTEM32\schtasks.exe
                          "schtasks" /create /tn "svchost" /sc ONLOGON /tr "C:\Users\Admin\AppData\Roaming\SubDir\AnyLoaderV4.9.exe" /rl HIGHEST /f
                          9⤵
                          • Scheduled Task/Job: Scheduled Task
                          PID:2248
                        • C:\Windows\system32\cmd.exe
                          C:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\ORwf09YT94xO.bat" "
                          9⤵
                          • Suspicious use of WriteProcessMemory
                          PID:2352
                          • C:\Windows\system32\chcp.com
                            chcp 65001
                            10⤵
                              PID:1164
                            • C:\Windows\system32\PING.EXE
                              ping -n 10 localhost
                              10⤵
                              • System Network Configuration Discovery: Internet Connection Discovery
                              • Runs ping.exe
                              PID:64
                            • C:\Users\Admin\AppData\Roaming\SubDir\AnyLoaderV4.9.exe
                              "C:\Users\Admin\AppData\Roaming\SubDir\AnyLoaderV4.9.exe"
                              10⤵
                              • Checks computer location settings
                              • Executes dropped EXE
                              • Suspicious use of AdjustPrivilegeToken
                              • Suspicious use of WriteProcessMemory
                              PID:4984
                              • C:\Windows\SYSTEM32\schtasks.exe
                                "schtasks" /create /tn "svchost" /sc ONLOGON /tr "C:\Users\Admin\AppData\Roaming\SubDir\AnyLoaderV4.9.exe" /rl HIGHEST /f
                                11⤵
                                • Scheduled Task/Job: Scheduled Task
                                PID:1276
                              • C:\Windows\system32\cmd.exe
                                C:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\gooqIlJGDq66.bat" "
                                11⤵
                                • Suspicious use of WriteProcessMemory
                                PID:4164
                                • C:\Windows\system32\chcp.com
                                  chcp 65001
                                  12⤵
                                    PID:3652
                                  • C:\Windows\system32\PING.EXE
                                    ping -n 10 localhost
                                    12⤵
                                    • System Network Configuration Discovery: Internet Connection Discovery
                                    • Runs ping.exe
                                    PID:4112
                                  • C:\Users\Admin\AppData\Roaming\SubDir\AnyLoaderV4.9.exe
                                    "C:\Users\Admin\AppData\Roaming\SubDir\AnyLoaderV4.9.exe"
                                    12⤵
                                    • Checks computer location settings
                                    • Executes dropped EXE
                                    • Suspicious use of AdjustPrivilegeToken
                                    • Suspicious use of WriteProcessMemory
                                    PID:2524
                                    • C:\Windows\SYSTEM32\schtasks.exe
                                      "schtasks" /create /tn "svchost" /sc ONLOGON /tr "C:\Users\Admin\AppData\Roaming\SubDir\AnyLoaderV4.9.exe" /rl HIGHEST /f
                                      13⤵
                                      • Scheduled Task/Job: Scheduled Task
                                      PID:3428
                                    • C:\Windows\system32\cmd.exe
                                      C:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\fqaiRSTLpCqZ.bat" "
                                      13⤵
                                      • Suspicious use of WriteProcessMemory
                                      PID:848
                                      • C:\Windows\system32\chcp.com
                                        chcp 65001
                                        14⤵
                                          PID:1632
                                        • C:\Windows\system32\PING.EXE
                                          ping -n 10 localhost
                                          14⤵
                                          • System Network Configuration Discovery: Internet Connection Discovery
                                          • Runs ping.exe
                                          PID:3856
                                        • C:\Users\Admin\AppData\Roaming\SubDir\AnyLoaderV4.9.exe
                                          "C:\Users\Admin\AppData\Roaming\SubDir\AnyLoaderV4.9.exe"
                                          14⤵
                                          • Checks computer location settings
                                          • Executes dropped EXE
                                          • Suspicious use of AdjustPrivilegeToken
                                          PID:2196
                                          • C:\Windows\SYSTEM32\schtasks.exe
                                            "schtasks" /create /tn "svchost" /sc ONLOGON /tr "C:\Users\Admin\AppData\Roaming\SubDir\AnyLoaderV4.9.exe" /rl HIGHEST /f
                                            15⤵
                                            • Scheduled Task/Job: Scheduled Task
                                            PID:3220
                                          • C:\Windows\system32\cmd.exe
                                            C:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\wOBobWDsYcDv.bat" "
                                            15⤵
                                              PID:3732
                                              • C:\Windows\system32\chcp.com
                                                chcp 65001
                                                16⤵
                                                  PID:2296
                                                • C:\Windows\system32\PING.EXE
                                                  ping -n 10 localhost
                                                  16⤵
                                                  • System Network Configuration Discovery: Internet Connection Discovery
                                                  • Runs ping.exe
                                                  PID:1880
                                                • C:\Users\Admin\AppData\Roaming\SubDir\AnyLoaderV4.9.exe
                                                  "C:\Users\Admin\AppData\Roaming\SubDir\AnyLoaderV4.9.exe"
                                                  16⤵
                                                  • Checks computer location settings
                                                  • Executes dropped EXE
                                                  • Suspicious use of AdjustPrivilegeToken
                                                  PID:2192
                                                  • C:\Windows\SYSTEM32\schtasks.exe
                                                    "schtasks" /create /tn "svchost" /sc ONLOGON /tr "C:\Users\Admin\AppData\Roaming\SubDir\AnyLoaderV4.9.exe" /rl HIGHEST /f
                                                    17⤵
                                                    • Scheduled Task/Job: Scheduled Task
                                                    PID:3912
                                                  • C:\Windows\system32\cmd.exe
                                                    C:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\g93tMisrtOqx.bat" "
                                                    17⤵
                                                      PID:4800
                                                      • C:\Windows\system32\chcp.com
                                                        chcp 65001
                                                        18⤵
                                                          PID:1156
                                                        • C:\Windows\system32\PING.EXE
                                                          ping -n 10 localhost
                                                          18⤵
                                                          • System Network Configuration Discovery: Internet Connection Discovery
                                                          • Runs ping.exe
                                                          PID:2268
                                                        • C:\Users\Admin\AppData\Roaming\SubDir\AnyLoaderV4.9.exe
                                                          "C:\Users\Admin\AppData\Roaming\SubDir\AnyLoaderV4.9.exe"
                                                          18⤵
                                                          • Checks computer location settings
                                                          • Executes dropped EXE
                                                          • Suspicious use of AdjustPrivilegeToken
                                                          PID:2800
                                                          • C:\Windows\SYSTEM32\schtasks.exe
                                                            "schtasks" /create /tn "svchost" /sc ONLOGON /tr "C:\Users\Admin\AppData\Roaming\SubDir\AnyLoaderV4.9.exe" /rl HIGHEST /f
                                                            19⤵
                                                            • Scheduled Task/Job: Scheduled Task
                                                            PID:1220
                                                          • C:\Windows\system32\cmd.exe
                                                            C:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\aYcMHG11vdlj.bat" "
                                                            19⤵
                                                              PID:1188
                                                              • C:\Windows\system32\chcp.com
                                                                chcp 65001
                                                                20⤵
                                                                  PID:4960
                                                                • C:\Windows\system32\PING.EXE
                                                                  ping -n 10 localhost
                                                                  20⤵
                                                                  • System Network Configuration Discovery: Internet Connection Discovery
                                                                  • Runs ping.exe
                                                                  PID:3128
                                                                • C:\Users\Admin\AppData\Roaming\SubDir\AnyLoaderV4.9.exe
                                                                  "C:\Users\Admin\AppData\Roaming\SubDir\AnyLoaderV4.9.exe"
                                                                  20⤵
                                                                  • Checks computer location settings
                                                                  • Executes dropped EXE
                                                                  • Suspicious use of AdjustPrivilegeToken
                                                                  PID:4540
                                                                  • C:\Windows\SYSTEM32\schtasks.exe
                                                                    "schtasks" /create /tn "svchost" /sc ONLOGON /tr "C:\Users\Admin\AppData\Roaming\SubDir\AnyLoaderV4.9.exe" /rl HIGHEST /f
                                                                    21⤵
                                                                    • Scheduled Task/Job: Scheduled Task
                                                                    PID:1280
                                                                  • C:\Windows\system32\cmd.exe
                                                                    C:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\9xyieCY3mKRe.bat" "
                                                                    21⤵
                                                                      PID:2868
                                                                      • C:\Windows\system32\chcp.com
                                                                        chcp 65001
                                                                        22⤵
                                                                          PID:1276
                                                                        • C:\Windows\system32\PING.EXE
                                                                          ping -n 10 localhost
                                                                          22⤵
                                                                          • System Network Configuration Discovery: Internet Connection Discovery
                                                                          • Runs ping.exe
                                                                          PID:332
                                                                        • C:\Users\Admin\AppData\Roaming\SubDir\AnyLoaderV4.9.exe
                                                                          "C:\Users\Admin\AppData\Roaming\SubDir\AnyLoaderV4.9.exe"
                                                                          22⤵
                                                                          • Checks computer location settings
                                                                          • Executes dropped EXE
                                                                          • Suspicious use of AdjustPrivilegeToken
                                                                          PID:1576
                                                                          • C:\Windows\SYSTEM32\schtasks.exe
                                                                            "schtasks" /create /tn "svchost" /sc ONLOGON /tr "C:\Users\Admin\AppData\Roaming\SubDir\AnyLoaderV4.9.exe" /rl HIGHEST /f
                                                                            23⤵
                                                                            • Scheduled Task/Job: Scheduled Task
                                                                            PID:2100
                                                                          • C:\Windows\system32\cmd.exe
                                                                            C:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\zoDRhpIYtXJ9.bat" "
                                                                            23⤵
                                                                              PID:2200
                                                                              • C:\Windows\system32\chcp.com
                                                                                chcp 65001
                                                                                24⤵
                                                                                  PID:624
                                                                                • C:\Windows\system32\PING.EXE
                                                                                  ping -n 10 localhost
                                                                                  24⤵
                                                                                  • System Network Configuration Discovery: Internet Connection Discovery
                                                                                  • Runs ping.exe
                                                                                  PID:1564
                                                                                • C:\Users\Admin\AppData\Roaming\SubDir\AnyLoaderV4.9.exe
                                                                                  "C:\Users\Admin\AppData\Roaming\SubDir\AnyLoaderV4.9.exe"
                                                                                  24⤵
                                                                                  • Checks computer location settings
                                                                                  • Executes dropped EXE
                                                                                  • Suspicious use of AdjustPrivilegeToken
                                                                                  PID:3024
                                                                                  • C:\Windows\SYSTEM32\schtasks.exe
                                                                                    "schtasks" /create /tn "svchost" /sc ONLOGON /tr "C:\Users\Admin\AppData\Roaming\SubDir\AnyLoaderV4.9.exe" /rl HIGHEST /f
                                                                                    25⤵
                                                                                    • Scheduled Task/Job: Scheduled Task
                                                                                    PID:3944
                                                                                  • C:\Windows\system32\cmd.exe
                                                                                    C:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\rIiaGByzBsnB.bat" "
                                                                                    25⤵
                                                                                      PID:3184
                                                                                      • C:\Windows\system32\chcp.com
                                                                                        chcp 65001
                                                                                        26⤵
                                                                                          PID:848
                                                                                        • C:\Windows\system32\PING.EXE
                                                                                          ping -n 10 localhost
                                                                                          26⤵
                                                                                          • System Network Configuration Discovery: Internet Connection Discovery
                                                                                          • Runs ping.exe
                                                                                          PID:4048
                                                                                        • C:\Users\Admin\AppData\Roaming\SubDir\AnyLoaderV4.9.exe
                                                                                          "C:\Users\Admin\AppData\Roaming\SubDir\AnyLoaderV4.9.exe"
                                                                                          26⤵
                                                                                          • Checks computer location settings
                                                                                          • Executes dropped EXE
                                                                                          • Suspicious use of AdjustPrivilegeToken
                                                                                          PID:1268
                                                                                          • C:\Windows\SYSTEM32\schtasks.exe
                                                                                            "schtasks" /create /tn "svchost" /sc ONLOGON /tr "C:\Users\Admin\AppData\Roaming\SubDir\AnyLoaderV4.9.exe" /rl HIGHEST /f
                                                                                            27⤵
                                                                                            • Scheduled Task/Job: Scheduled Task
                                                                                            PID:2196
                                                                                          • C:\Windows\system32\cmd.exe
                                                                                            C:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\Gu2klXBnrbKb.bat" "
                                                                                            27⤵
                                                                                              PID:2996
                                                                                              • C:\Windows\system32\chcp.com
                                                                                                chcp 65001
                                                                                                28⤵
                                                                                                  PID:3228
                                                                                                • C:\Windows\system32\PING.EXE
                                                                                                  ping -n 10 localhost
                                                                                                  28⤵
                                                                                                  • System Network Configuration Discovery: Internet Connection Discovery
                                                                                                  • Runs ping.exe
                                                                                                  PID:4020
                                                                                                • C:\Users\Admin\AppData\Roaming\SubDir\AnyLoaderV4.9.exe
                                                                                                  "C:\Users\Admin\AppData\Roaming\SubDir\AnyLoaderV4.9.exe"
                                                                                                  28⤵
                                                                                                  • Checks computer location settings
                                                                                                  • Executes dropped EXE
                                                                                                  • Suspicious use of AdjustPrivilegeToken
                                                                                                  PID:2244
                                                                                                  • C:\Windows\SYSTEM32\schtasks.exe
                                                                                                    "schtasks" /create /tn "svchost" /sc ONLOGON /tr "C:\Users\Admin\AppData\Roaming\SubDir\AnyLoaderV4.9.exe" /rl HIGHEST /f
                                                                                                    29⤵
                                                                                                    • Scheduled Task/Job: Scheduled Task
                                                                                                    PID:4552
                                                                                                  • C:\Windows\system32\cmd.exe
                                                                                                    C:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\CYUpcwSKOtnA.bat" "
                                                                                                    29⤵
                                                                                                      PID:4356
                                                                                                      • C:\Windows\system32\chcp.com
                                                                                                        chcp 65001
                                                                                                        30⤵
                                                                                                          PID:3164
                                                                                                        • C:\Windows\system32\PING.EXE
                                                                                                          ping -n 10 localhost
                                                                                                          30⤵
                                                                                                          • System Network Configuration Discovery: Internet Connection Discovery
                                                                                                          • Runs ping.exe
                                                                                                          PID:4480
                                                                                                        • C:\Users\Admin\AppData\Roaming\SubDir\AnyLoaderV4.9.exe
                                                                                                          "C:\Users\Admin\AppData\Roaming\SubDir\AnyLoaderV4.9.exe"
                                                                                                          30⤵
                                                                                                          • Checks computer location settings
                                                                                                          • Executes dropped EXE
                                                                                                          • Suspicious use of AdjustPrivilegeToken
                                                                                                          PID:3528
                                                                                                          • C:\Windows\SYSTEM32\schtasks.exe
                                                                                                            "schtasks" /create /tn "svchost" /sc ONLOGON /tr "C:\Users\Admin\AppData\Roaming\SubDir\AnyLoaderV4.9.exe" /rl HIGHEST /f
                                                                                                            31⤵
                                                                                                            • Scheduled Task/Job: Scheduled Task
                                                                                                            PID:632
                                                                                                          • C:\Windows\system32\cmd.exe
                                                                                                            C:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\M1MlqHQlqyQH.bat" "
                                                                                                            31⤵
                                                                                                              PID:736
                                                                                                              • C:\Windows\system32\chcp.com
                                                                                                                chcp 65001
                                                                                                                32⤵
                                                                                                                  PID:5080
                                                                                                                • C:\Windows\system32\PING.EXE
                                                                                                                  ping -n 10 localhost
                                                                                                                  32⤵
                                                                                                                  • System Network Configuration Discovery: Internet Connection Discovery
                                                                                                                  • Runs ping.exe
                                                                                                                  PID:3260

                                                  Network

                                                  MITRE ATT&CK Enterprise v15

                                                  Replay Monitor

                                                  Loading Replay Monitor...

                                                  Downloads

                                                  • C:\Users\Admin\AppData\Local\Microsoft\CLR_v4.0\UsageLogs\AnyLoaderV4.9.exe.log

                                                    Filesize

                                                    1KB

                                                    MD5

                                                    baf55b95da4a601229647f25dad12878

                                                    SHA1

                                                    abc16954ebfd213733c4493fc1910164d825cac8

                                                    SHA256

                                                    ee954c5d8156fd8890e582c716e5758ed9b33721258f10e758bdc31ccbcb1924

                                                    SHA512

                                                    24f502fedb1a305d0d7b08857ffc1db9b2359ff34e06d5748ecc84e35c985f29a20d9f0a533bea32d234ab37097ec0481620c63b14ac89b280e75e14d19fd545

                                                  • C:\Users\Admin\AppData\Local\Temp\9xyieCY3mKRe.bat

                                                    Filesize

                                                    214B

                                                    MD5

                                                    f35d0fae956241bf7300f636449b83f4

                                                    SHA1

                                                    73c2bbc4d994f98a4b45699cfb358f3c4439a641

                                                    SHA256

                                                    6262634079d4d814f596b7665389f0b5a069a027ef174b95984ac5f2038888e8

                                                    SHA512

                                                    5599b170e09b43f2487444edc2a4df4e0260a0bb7ab6d2cca186e11f2e1d6e8d47f4901eaadb70310b6d0bc0f99e8e71d1130b6e02a26fe744f1102ad3f9d6f9

                                                  • C:\Users\Admin\AppData\Local\Temp\CYUpcwSKOtnA.bat

                                                    Filesize

                                                    214B

                                                    MD5

                                                    14f17f1fce4e717de8984e663654d5d3

                                                    SHA1

                                                    7ca20d3ddc749e41e8cbd8265592005d20d85ebb

                                                    SHA256

                                                    10e221821ca2560dca1c7715bc59356a431de2160758983b51be0f773bb0817d

                                                    SHA512

                                                    068ef85dcec0774cfb56ca69f5b6104ebb534fde47bc7737856c6b22ef029b1aa19037ad8a57735aed0a366e32d3eb8033f229cf1d58a7f18558de944cbeeb34

                                                  • C:\Users\Admin\AppData\Local\Temp\Gu2klXBnrbKb.bat

                                                    Filesize

                                                    214B

                                                    MD5

                                                    375ff0dce9212eb535825676e36cf8b2

                                                    SHA1

                                                    076ef341822b2c0003e3d829e628c306afdc2bd5

                                                    SHA256

                                                    06e1eae1ae5d184ae091435ebe8b36d4f2d1c9407db754083fb1eab96408596b

                                                    SHA512

                                                    aa1c476ac47588d10cb7a7b209b7f423fe721a3ddbf402710b86155b0fc9e7c6db0f5482e763422e7d925a3af8f0a426e04351f8d0611e546c5db120c31b9749

                                                  • C:\Users\Admin\AppData\Local\Temp\M1MlqHQlqyQH.bat

                                                    Filesize

                                                    214B

                                                    MD5

                                                    89841d6ffc4fe70822229a52927d316c

                                                    SHA1

                                                    ddd7566fbaf3bb4a0f2afa6364d73e5dccd93343

                                                    SHA256

                                                    f94f7cb82ffab3ae8a06be1598f7e409280cddb405b21dcec079b6d43c5cf1b5

                                                    SHA512

                                                    b1f5c994d0537ea1cb5c4e5b4bb9947b9ac5f8d1ff220ac39faab8cd3b31a00076db412a08e7f3c0545bf4c32496535e831641302a58a71c7c5885ade808cd12

                                                  • C:\Users\Admin\AppData\Local\Temp\ORwf09YT94xO.bat

                                                    Filesize

                                                    214B

                                                    MD5

                                                    58d47b2b09ff095590e25bedb7f86cb7

                                                    SHA1

                                                    76f6dd36a625e73b0593c5ee56f868d72f74d790

                                                    SHA256

                                                    41036c2206e6917bbbe2b2dc52902674e72e221cc8486e7c19ebe6998b0c9b47

                                                    SHA512

                                                    87d3e2ce89929674a429a1d361ef8207d6ea8a1dbe7492317ed7d656f9f4450d83af1e96ebbcd897cd8c1cc89540ceafa77e847841129bfd40b1aac710e34b72

                                                  • C:\Users\Admin\AppData\Local\Temp\VNDmP9kNASSP.bat

                                                    Filesize

                                                    214B

                                                    MD5

                                                    04b2dca3737720b29c46804e72822c2d

                                                    SHA1

                                                    1956ef6b796083b904169cde37538a6ba5e75dd7

                                                    SHA256

                                                    c24bbfb8ff75cced893320f095f37f23a2fef27c9eda6fea551d90dfaf0fc170

                                                    SHA512

                                                    85344722e474add2970d3be895780d86cfcd2a51f4db6a1d821be25f0e330975d75614af714090b9714a039e77fc0af9e6898823fb086b9fa7e901f2fa43ea45

                                                  • C:\Users\Admin\AppData\Local\Temp\W27Z341pMdUy.bat

                                                    Filesize

                                                    214B

                                                    MD5

                                                    9dbdaa62fe0eada8e1149871bbba6583

                                                    SHA1

                                                    f32f32a76e25e1808c3409fe26e4e69133161fc2

                                                    SHA256

                                                    08270e61e2083ac4fe1fdc3faee28380a85abc467c84c02942590b21b39855c7

                                                    SHA512

                                                    b253d85f797d380629d618c8e8614bfc4314b4276165067b5300a7aa773e04d2a35571e0e8ad1d1680b00fa69bbee1254fd1b31100ed5995b0a390e2cc49a83d

                                                  • C:\Users\Admin\AppData\Local\Temp\aYcMHG11vdlj.bat

                                                    Filesize

                                                    214B

                                                    MD5

                                                    60e7650bd41400f2e751b4786925767b

                                                    SHA1

                                                    f742a2ba34e96d22d2bea8418a1569a75d9ea3eb

                                                    SHA256

                                                    e37898f3e366ba016e56fb24f185aa1e36aaa41e8b6fd8d1318ae5103eabc95d

                                                    SHA512

                                                    d10ba0373a42ccedb85c1f9a9fd423a15e12482149d2f9d1010e406b41022d792175885f13d80e0ed2e83d0cf88edd58146873dbdca2477d6f7b27244a783351

                                                  • C:\Users\Admin\AppData\Local\Temp\fqaiRSTLpCqZ.bat

                                                    Filesize

                                                    214B

                                                    MD5

                                                    538fd30fd7d0f47cc7bc6526352bd133

                                                    SHA1

                                                    865504040b57c3ae9dacc3c5d28fae1436f23e66

                                                    SHA256

                                                    6b555df4ca5b79db8f0868e7d7859c67d4a29ee6d6d22ef1c400cf86acd87ddc

                                                    SHA512

                                                    1491ea4e6c767e85c7786beb8485317322772b37ef6a8c012c0971ff6e0d1928d468659aa3d23863763483f35daab2d112e211383e22e438e572f36f1b81c438

                                                  • C:\Users\Admin\AppData\Local\Temp\g93tMisrtOqx.bat

                                                    Filesize

                                                    214B

                                                    MD5

                                                    c0275eae74a5024f9b706e1a96f35ca7

                                                    SHA1

                                                    27deeec92f968b97357b179e4cdbbb3ef074ead5

                                                    SHA256

                                                    4e2542e5665f412d970db17c774e53ef88b557c8223b312d12229297805431a8

                                                    SHA512

                                                    ef204d978dcc05c37ca9f23b72a3cf285ded71399a06b1b7a661fd3d0286db9b9014851e507c007ab4380cd455514447b4c6f83b959c8fa178ebaa7b9616708e

                                                  • C:\Users\Admin\AppData\Local\Temp\gooqIlJGDq66.bat

                                                    Filesize

                                                    214B

                                                    MD5

                                                    07a29029b716a26c66dd1b818a7689ea

                                                    SHA1

                                                    1d9dab0f95a25d495d1c956255dbe47cf7aad14f

                                                    SHA256

                                                    e22eecec474b3d7e0cd22dc398fa4b90a10c3ec766e26928327fd377068f423e

                                                    SHA512

                                                    5baebf862016a9f0698825942742746a2612c14d21fad69ff7271b7793195cefadb9058910fedcb3a47741df743acf4e485ae2dbe473a49abb39d02bc76f4ffd

                                                  • C:\Users\Admin\AppData\Local\Temp\rIiaGByzBsnB.bat

                                                    Filesize

                                                    214B

                                                    MD5

                                                    fc1c1d271c13f9b31635862f7f15ce19

                                                    SHA1

                                                    618fdde5123ec883c327ddda82466454d84d554c

                                                    SHA256

                                                    9797aaed06dd30080970c320526961be5b82f6db2ca18bbb31fdd6d165538e64

                                                    SHA512

                                                    d7d9eca44928df3cb6da507022320a5046068a8f3b2bf79a99e8b1bb8a2b63d7a374074be0da4ef199c7b6af632078c7797e345a9ba399fe93c776f9b0126024

                                                  • C:\Users\Admin\AppData\Local\Temp\vsilv43r771R.bat

                                                    Filesize

                                                    214B

                                                    MD5

                                                    c0adabe2cfebea556271ac05336ae219

                                                    SHA1

                                                    6eee19f22ae758f89feaa583da778886644ef540

                                                    SHA256

                                                    b1292471bfa50837f1fd96e76d20c854461c24f921788ba0c4bb0289857062d7

                                                    SHA512

                                                    bbc4ddcf61daeb3e6678e36ae42a8b0a3529218a42023b107e74f161a229d980b224b4b0972b239c7d5dc28193ba1b9825b480e359eb3ea84e7985dc962ee00e

                                                  • C:\Users\Admin\AppData\Local\Temp\wOBobWDsYcDv.bat

                                                    Filesize

                                                    214B

                                                    MD5

                                                    bbfd00127a3decadd2c7b7e7890e1cce

                                                    SHA1

                                                    e9045dc3e2ef4eb1808b27ab4e132897cf4eda80

                                                    SHA256

                                                    64658bfcc9a59728806db11c2ba74977c323ab216aea113948698d2c0a788881

                                                    SHA512

                                                    d5e7040d1dfdb4ab26259e2343ce4fd9f4f1415aad8731de2f2852fb5af85cdc8ecbecc6367c05c1207da3d98f99cc5f455c5abc4e407b927e87aa73d5cfca9d

                                                  • C:\Users\Admin\AppData\Local\Temp\zoDRhpIYtXJ9.bat

                                                    Filesize

                                                    214B

                                                    MD5

                                                    8f07c3b2e49201ec61cbad0bae8e92c1

                                                    SHA1

                                                    39857186e1b82528171d7a9ea1ec741c3d99db7f

                                                    SHA256

                                                    971aa8aa08f3ae380d3b490f0de38113f93dc7f4b8d7ba3f9fc4d8f69470ca92

                                                    SHA512

                                                    d71b6fd501f3bef2bf1bd6c5535fa904ca887612a73dc17de44e1e5e2dc40745e7e809599ab28d6ceaf6b74e4abb8d2d25c353436c7b2a294fee93983ecc873d

                                                  • C:\Users\Admin\AppData\Roaming\SubDir\AnyLoaderV4.9.exe

                                                    Filesize

                                                    3.1MB

                                                    MD5

                                                    9a99be1ac8e21a3c4959702a02b25d6e

                                                    SHA1

                                                    55d6230481e90c8a2f9d09956c07e3db1d03a96d

                                                    SHA256

                                                    e26918aac1a313925a7aecdaeb1990788cd2e09e439cd3e5fe8d6babb89df0f1

                                                    SHA512

                                                    46ae9d4d95c89afb3ed987445dcf72c71e770e99c35759a724e963952784d518530b2829b856b7818a8bc226e35fa8f243e18e35da4d7169c44edc5303159ea4

                                                  • memory/216-0-0x00007FFBB9E73000-0x00007FFBB9E75000-memory.dmp

                                                    Filesize

                                                    8KB

                                                  • memory/216-10-0x00007FFBB9E70000-0x00007FFBBA931000-memory.dmp

                                                    Filesize

                                                    10.8MB

                                                  • memory/216-2-0x00007FFBB9E70000-0x00007FFBBA931000-memory.dmp

                                                    Filesize

                                                    10.8MB

                                                  • memory/216-1-0x0000000000E40000-0x0000000001164000-memory.dmp

                                                    Filesize

                                                    3.1MB

                                                  • memory/1088-18-0x00007FFBB9E70000-0x00007FFBBA931000-memory.dmp

                                                    Filesize

                                                    10.8MB

                                                  • memory/1088-14-0x000000001DDC0000-0x000000001DE72000-memory.dmp

                                                    Filesize

                                                    712KB

                                                  • memory/1088-13-0x000000001DCB0000-0x000000001DD00000-memory.dmp

                                                    Filesize

                                                    320KB

                                                  • memory/1088-12-0x00007FFBB9E70000-0x00007FFBBA931000-memory.dmp

                                                    Filesize

                                                    10.8MB

                                                  • memory/1088-11-0x00007FFBB9E70000-0x00007FFBBA931000-memory.dmp

                                                    Filesize

                                                    10.8MB