Analysis

  • max time kernel
    149s
  • max time network
    150s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20241007-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system
  • submitted
    16-12-2024 06:43

General

  • Target

    example_win32_dx11.exe

  • Size

    3.1MB

  • MD5

    a7d75b048989da5d22a1f7cca58edb51

  • SHA1

    413d22b60ae540b3b11863e2107980b0403faf50

  • SHA256

    884d0c2cefa850e384edd30c22b96dd9ca03443c7c57bdae7d6234c2ebf0d0c7

  • SHA512

    4a453dc7f2a0e82d66fe5d73727ab2a23b5f00ea1b4a53032e4a538b72edf9caaf0894774d0fafb4af401f74a0b65bbf2d83a0cc643dc1a66ae23fb2136dd351

  • SSDEEP

    49152:TvCI22SsaNYfdPBldt698dBcjHe0RJ6qbR3LoGdHTHHB72eh2NT:TvP22SsaNYfdPBldt6+dBcjHe0RJ6E

Malware Config

Extracted

Family

quasar

Version

1.4.1

Botnet

Nigga

C2

yzs-42879.portmap.host:42879

Mutex

57d72303-b5e9-46aa-8cc4-9690809c1a9e

Attributes
  • encryption_key

    F1EBDB1862062F9265C0B5AC4D02C76D026534D0

  • install_name

    svchost.exe

  • log_directory

    Logs

  • reconnect_delay

    3000

  • startup_key

    Quasar Client Startup

  • subdirectory

    Steam

Signatures

  • Quasar RAT

    Quasar is an open source Remote Access Tool.

  • Quasar family
  • Quasar payload 2 IoCs
  • Checks computer location settings 2 TTPs 15 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Executes dropped EXE 15 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Network Configuration Discovery: Internet Connection Discovery 1 TTPs 15 IoCs

    Adversaries may check for Internet connectivity on compromised systems.

  • Runs ping.exe 1 TTPs 15 IoCs
  • Suspicious use of AdjustPrivilegeToken 16 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\example_win32_dx11.exe
    "C:\Users\Admin\AppData\Local\Temp\example_win32_dx11.exe"
    1⤵
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:220
    • C:\Users\Admin\AppData\Roaming\Steam\svchost.exe
      "C:\Users\Admin\AppData\Roaming\Steam\svchost.exe"
      2⤵
      • Checks computer location settings
      • Executes dropped EXE
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of WriteProcessMemory
      PID:4820
      • C:\Windows\system32\cmd.exe
        C:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\YGBaGkbPUfKH.bat" "
        3⤵
        • Suspicious use of WriteProcessMemory
        PID:1916
        • C:\Windows\system32\chcp.com
          chcp 65001
          4⤵
            PID:2468
          • C:\Windows\system32\PING.EXE
            ping -n 10 localhost
            4⤵
            • System Network Configuration Discovery: Internet Connection Discovery
            • Runs ping.exe
            PID:2540
          • C:\Users\Admin\AppData\Roaming\Steam\svchost.exe
            "C:\Users\Admin\AppData\Roaming\Steam\svchost.exe"
            4⤵
            • Checks computer location settings
            • Executes dropped EXE
            • Suspicious use of AdjustPrivilegeToken
            • Suspicious use of WriteProcessMemory
            PID:4260
            • C:\Windows\system32\cmd.exe
              C:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\hKoGUzxVvjXW.bat" "
              5⤵
              • Suspicious use of WriteProcessMemory
              PID:3968
              • C:\Windows\system32\chcp.com
                chcp 65001
                6⤵
                  PID:3464
                • C:\Windows\system32\PING.EXE
                  ping -n 10 localhost
                  6⤵
                  • System Network Configuration Discovery: Internet Connection Discovery
                  • Runs ping.exe
                  PID:4884
                • C:\Users\Admin\AppData\Roaming\Steam\svchost.exe
                  "C:\Users\Admin\AppData\Roaming\Steam\svchost.exe"
                  6⤵
                  • Checks computer location settings
                  • Executes dropped EXE
                  • Suspicious use of AdjustPrivilegeToken
                  • Suspicious use of WriteProcessMemory
                  PID:3556
                  • C:\Windows\system32\cmd.exe
                    C:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\tUnRAIaRXzzJ.bat" "
                    7⤵
                    • Suspicious use of WriteProcessMemory
                    PID:2648
                    • C:\Windows\system32\chcp.com
                      chcp 65001
                      8⤵
                        PID:4356
                      • C:\Windows\system32\PING.EXE
                        ping -n 10 localhost
                        8⤵
                        • System Network Configuration Discovery: Internet Connection Discovery
                        • Runs ping.exe
                        PID:1296
                      • C:\Users\Admin\AppData\Roaming\Steam\svchost.exe
                        "C:\Users\Admin\AppData\Roaming\Steam\svchost.exe"
                        8⤵
                        • Checks computer location settings
                        • Executes dropped EXE
                        • Suspicious use of AdjustPrivilegeToken
                        • Suspicious use of WriteProcessMemory
                        PID:2620
                        • C:\Windows\system32\cmd.exe
                          C:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\YjXCr1lTee6s.bat" "
                          9⤵
                          • Suspicious use of WriteProcessMemory
                          PID:4380
                          • C:\Windows\system32\chcp.com
                            chcp 65001
                            10⤵
                              PID:2984
                            • C:\Windows\system32\PING.EXE
                              ping -n 10 localhost
                              10⤵
                              • System Network Configuration Discovery: Internet Connection Discovery
                              • Runs ping.exe
                              PID:4464
                            • C:\Users\Admin\AppData\Roaming\Steam\svchost.exe
                              "C:\Users\Admin\AppData\Roaming\Steam\svchost.exe"
                              10⤵
                              • Checks computer location settings
                              • Executes dropped EXE
                              • Suspicious use of AdjustPrivilegeToken
                              • Suspicious use of WriteProcessMemory
                              PID:3384
                              • C:\Windows\system32\cmd.exe
                                C:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\AHGJa3UBsVlg.bat" "
                                11⤵
                                • Suspicious use of WriteProcessMemory
                                PID:3916
                                • C:\Windows\system32\chcp.com
                                  chcp 65001
                                  12⤵
                                    PID:1908
                                  • C:\Windows\system32\PING.EXE
                                    ping -n 10 localhost
                                    12⤵
                                    • System Network Configuration Discovery: Internet Connection Discovery
                                    • Runs ping.exe
                                    PID:3376
                                  • C:\Users\Admin\AppData\Roaming\Steam\svchost.exe
                                    "C:\Users\Admin\AppData\Roaming\Steam\svchost.exe"
                                    12⤵
                                    • Checks computer location settings
                                    • Executes dropped EXE
                                    • Suspicious use of AdjustPrivilegeToken
                                    • Suspicious use of WriteProcessMemory
                                    PID:1104
                                    • C:\Windows\system32\cmd.exe
                                      C:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\AoXZI7U4vTp2.bat" "
                                      13⤵
                                      • Suspicious use of WriteProcessMemory
                                      PID:3464
                                      • C:\Windows\system32\chcp.com
                                        chcp 65001
                                        14⤵
                                          PID:5076
                                        • C:\Windows\system32\PING.EXE
                                          ping -n 10 localhost
                                          14⤵
                                          • System Network Configuration Discovery: Internet Connection Discovery
                                          • Runs ping.exe
                                          PID:1724
                                        • C:\Users\Admin\AppData\Roaming\Steam\svchost.exe
                                          "C:\Users\Admin\AppData\Roaming\Steam\svchost.exe"
                                          14⤵
                                          • Checks computer location settings
                                          • Executes dropped EXE
                                          • Suspicious use of AdjustPrivilegeToken
                                          • Suspicious use of WriteProcessMemory
                                          PID:4884
                                          • C:\Windows\system32\cmd.exe
                                            C:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\z0QPzQC6QjVS.bat" "
                                            15⤵
                                            • Suspicious use of WriteProcessMemory
                                            PID:4224
                                            • C:\Windows\system32\chcp.com
                                              chcp 65001
                                              16⤵
                                                PID:3024
                                              • C:\Windows\system32\PING.EXE
                                                ping -n 10 localhost
                                                16⤵
                                                • System Network Configuration Discovery: Internet Connection Discovery
                                                • Runs ping.exe
                                                PID:5064
                                              • C:\Users\Admin\AppData\Roaming\Steam\svchost.exe
                                                "C:\Users\Admin\AppData\Roaming\Steam\svchost.exe"
                                                16⤵
                                                • Checks computer location settings
                                                • Executes dropped EXE
                                                • Suspicious use of AdjustPrivilegeToken
                                                • Suspicious use of WriteProcessMemory
                                                PID:1864
                                                • C:\Windows\system32\cmd.exe
                                                  C:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\Gje4tiqgFK19.bat" "
                                                  17⤵
                                                  • Suspicious use of WriteProcessMemory
                                                  PID:2104
                                                  • C:\Windows\system32\chcp.com
                                                    chcp 65001
                                                    18⤵
                                                      PID:5108
                                                    • C:\Windows\system32\PING.EXE
                                                      ping -n 10 localhost
                                                      18⤵
                                                      • System Network Configuration Discovery: Internet Connection Discovery
                                                      • Runs ping.exe
                                                      PID:904
                                                    • C:\Users\Admin\AppData\Roaming\Steam\svchost.exe
                                                      "C:\Users\Admin\AppData\Roaming\Steam\svchost.exe"
                                                      18⤵
                                                      • Checks computer location settings
                                                      • Executes dropped EXE
                                                      • Suspicious use of AdjustPrivilegeToken
                                                      PID:1204
                                                      • C:\Windows\system32\cmd.exe
                                                        C:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\6Cv55zoUJ4x2.bat" "
                                                        19⤵
                                                          PID:1428
                                                          • C:\Windows\system32\chcp.com
                                                            chcp 65001
                                                            20⤵
                                                              PID:3372
                                                            • C:\Windows\system32\PING.EXE
                                                              ping -n 10 localhost
                                                              20⤵
                                                              • System Network Configuration Discovery: Internet Connection Discovery
                                                              • Runs ping.exe
                                                              PID:1544
                                                            • C:\Users\Admin\AppData\Roaming\Steam\svchost.exe
                                                              "C:\Users\Admin\AppData\Roaming\Steam\svchost.exe"
                                                              20⤵
                                                              • Checks computer location settings
                                                              • Executes dropped EXE
                                                              • Suspicious use of AdjustPrivilegeToken
                                                              PID:4836
                                                              • C:\Windows\system32\cmd.exe
                                                                C:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\SrOwbJZBRaJ8.bat" "
                                                                21⤵
                                                                  PID:3840
                                                                  • C:\Windows\system32\chcp.com
                                                                    chcp 65001
                                                                    22⤵
                                                                      PID:3720
                                                                    • C:\Windows\system32\PING.EXE
                                                                      ping -n 10 localhost
                                                                      22⤵
                                                                      • System Network Configuration Discovery: Internet Connection Discovery
                                                                      • Runs ping.exe
                                                                      PID:1216
                                                                    • C:\Users\Admin\AppData\Roaming\Steam\svchost.exe
                                                                      "C:\Users\Admin\AppData\Roaming\Steam\svchost.exe"
                                                                      22⤵
                                                                      • Checks computer location settings
                                                                      • Executes dropped EXE
                                                                      • Suspicious use of AdjustPrivilegeToken
                                                                      PID:3856
                                                                      • C:\Windows\system32\cmd.exe
                                                                        C:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\iyOh8MKEh8ZO.bat" "
                                                                        23⤵
                                                                          PID:3104
                                                                          • C:\Windows\system32\chcp.com
                                                                            chcp 65001
                                                                            24⤵
                                                                              PID:2432
                                                                            • C:\Windows\system32\PING.EXE
                                                                              ping -n 10 localhost
                                                                              24⤵
                                                                              • System Network Configuration Discovery: Internet Connection Discovery
                                                                              • Runs ping.exe
                                                                              PID:4832
                                                                            • C:\Users\Admin\AppData\Roaming\Steam\svchost.exe
                                                                              "C:\Users\Admin\AppData\Roaming\Steam\svchost.exe"
                                                                              24⤵
                                                                              • Checks computer location settings
                                                                              • Executes dropped EXE
                                                                              • Suspicious use of AdjustPrivilegeToken
                                                                              PID:3140
                                                                              • C:\Windows\system32\cmd.exe
                                                                                C:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\4c3mY5HUyo76.bat" "
                                                                                25⤵
                                                                                  PID:1412
                                                                                  • C:\Windows\system32\chcp.com
                                                                                    chcp 65001
                                                                                    26⤵
                                                                                      PID:3380
                                                                                    • C:\Windows\system32\PING.EXE
                                                                                      ping -n 10 localhost
                                                                                      26⤵
                                                                                      • System Network Configuration Discovery: Internet Connection Discovery
                                                                                      • Runs ping.exe
                                                                                      PID:3968
                                                                                    • C:\Users\Admin\AppData\Roaming\Steam\svchost.exe
                                                                                      "C:\Users\Admin\AppData\Roaming\Steam\svchost.exe"
                                                                                      26⤵
                                                                                      • Checks computer location settings
                                                                                      • Executes dropped EXE
                                                                                      • Suspicious use of AdjustPrivilegeToken
                                                                                      PID:448
                                                                                      • C:\Windows\system32\cmd.exe
                                                                                        C:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\aA1HXpchhFns.bat" "
                                                                                        27⤵
                                                                                          PID:4948
                                                                                          • C:\Windows\system32\chcp.com
                                                                                            chcp 65001
                                                                                            28⤵
                                                                                              PID:3060
                                                                                            • C:\Windows\system32\PING.EXE
                                                                                              ping -n 10 localhost
                                                                                              28⤵
                                                                                              • System Network Configuration Discovery: Internet Connection Discovery
                                                                                              • Runs ping.exe
                                                                                              PID:2800
                                                                                            • C:\Users\Admin\AppData\Roaming\Steam\svchost.exe
                                                                                              "C:\Users\Admin\AppData\Roaming\Steam\svchost.exe"
                                                                                              28⤵
                                                                                              • Checks computer location settings
                                                                                              • Executes dropped EXE
                                                                                              • Suspicious use of AdjustPrivilegeToken
                                                                                              PID:4460
                                                                                              • C:\Windows\system32\cmd.exe
                                                                                                C:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\CCA6D1BZn1nK.bat" "
                                                                                                29⤵
                                                                                                  PID:1512
                                                                                                  • C:\Windows\system32\chcp.com
                                                                                                    chcp 65001
                                                                                                    30⤵
                                                                                                      PID:2144
                                                                                                    • C:\Windows\system32\PING.EXE
                                                                                                      ping -n 10 localhost
                                                                                                      30⤵
                                                                                                      • System Network Configuration Discovery: Internet Connection Discovery
                                                                                                      • Runs ping.exe
                                                                                                      PID:4088
                                                                                                    • C:\Users\Admin\AppData\Roaming\Steam\svchost.exe
                                                                                                      "C:\Users\Admin\AppData\Roaming\Steam\svchost.exe"
                                                                                                      30⤵
                                                                                                      • Checks computer location settings
                                                                                                      • Executes dropped EXE
                                                                                                      • Suspicious use of AdjustPrivilegeToken
                                                                                                      PID:4728
                                                                                                      • C:\Windows\system32\cmd.exe
                                                                                                        C:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\OHFxlBghWa8a.bat" "
                                                                                                        31⤵
                                                                                                          PID:3020
                                                                                                          • C:\Windows\system32\chcp.com
                                                                                                            chcp 65001
                                                                                                            32⤵
                                                                                                              PID:4924
                                                                                                            • C:\Windows\system32\PING.EXE
                                                                                                              ping -n 10 localhost
                                                                                                              32⤵
                                                                                                              • System Network Configuration Discovery: Internet Connection Discovery
                                                                                                              • Runs ping.exe
                                                                                                              PID:3208

                                              Network

                                              MITRE ATT&CK Enterprise v15

                                              Replay Monitor

                                              Loading Replay Monitor...

                                              Downloads

                                              • C:\Users\Admin\AppData\Local\Microsoft\CLR_v4.0\UsageLogs\svchost.exe.log

                                                Filesize

                                                2KB

                                                MD5

                                                8f0271a63446aef01cf2bfc7b7c7976b

                                                SHA1

                                                b70dad968e1dda14b55ad361b7fd4ef9ab6c06d7

                                                SHA256

                                                da740d78ae00b72cb3710d1a1256dc6431550965d20afaa65e5d5860a4748e8c

                                                SHA512

                                                78a403c69f1284b7dd41527019f3eede3512a5e4d439d846eca83557b741ca37bcf56c412f3e577b9dd4cfa5a6d6210961215f14cb271b143f6eb94f69389cf5

                                              • C:\Users\Admin\AppData\Local\Temp\4c3mY5HUyo76.bat

                                                Filesize

                                                207B

                                                MD5

                                                dc0c5ca00024e7ae61eccd9acfe8a9a6

                                                SHA1

                                                d1365f257c3fe689f5539bd5945936781d3bdef5

                                                SHA256

                                                1b65ea2cb977cfe7f577680c9554bcdd4a91af298047a96aff15474bc5931024

                                                SHA512

                                                f2ace6eaf1ce3fdee041d0efa3fad560a8fa616b266627f9e75821f52adedde648d1adeff9fea9ca21e19259988dbe9af3b51e04bcf6ac0254a093165ca9ca91

                                              • C:\Users\Admin\AppData\Local\Temp\6Cv55zoUJ4x2.bat

                                                Filesize

                                                207B

                                                MD5

                                                a9be59572917271010775a95436a7bd6

                                                SHA1

                                                cc317ff0ec77a425279606a3d95401b3497ad916

                                                SHA256

                                                5e69cd8d146d293c7802d38f78ec2399568c9d011a9892a66a9b52e147f931e7

                                                SHA512

                                                6a04fb376a51033dfd5a6a2b97f63d5f1d8a00c438f9f89987f6aa48ba5d5c354286393bcb39c6f1ce6e180a52fe4c16001399fca7745361e436bf55ea95e3e8

                                              • C:\Users\Admin\AppData\Local\Temp\AHGJa3UBsVlg.bat

                                                Filesize

                                                207B

                                                MD5

                                                960f3341b73019866913fe40b4fa003f

                                                SHA1

                                                e2df048e5f0a00d2a3283e75cdcb52166e44cd23

                                                SHA256

                                                d505a87b3cc784448e6b763a185d051aaf0159f6f4fef622367cdb6cd98dee57

                                                SHA512

                                                b41029a688374dca7e94fcc26b590b9c46906ad2da5b293a2ee24c6d5fef920d3f3d489f56f19c1c5fcf2add2175c4ae00c7191dc8bd1aa12da03e646a6601b0

                                              • C:\Users\Admin\AppData\Local\Temp\AoXZI7U4vTp2.bat

                                                Filesize

                                                207B

                                                MD5

                                                ac6871dcf066823d9439b1f7e6947478

                                                SHA1

                                                6ef85aa4d8aa664fbf8b137ee61898a356ac4ebf

                                                SHA256

                                                db4304d19abea9bb7095b539c235bc1e0ed91ad4e189c1401f598eea6948ec86

                                                SHA512

                                                e180b33b4399efaa79807012dbb155e779a43c4dfabd64fc36effb2e0c32ac0bec3e3beef61935f00d685c0f3348a45623e9d7b15a316e75bc55ae61123a4838

                                              • C:\Users\Admin\AppData\Local\Temp\CCA6D1BZn1nK.bat

                                                Filesize

                                                207B

                                                MD5

                                                4956499ab73580476bc6f4e96633d2c4

                                                SHA1

                                                58808549fb13962c133e946edad0f7d69cc0eb33

                                                SHA256

                                                ff0be309b362799a796a1ad9015b646aeeb1436eec480e1f1e57f453448be876

                                                SHA512

                                                317e6278e836e4c576a6d0b7fa65d7e081a1abca14e3e5870d129083db1b7fd5303f6e038aecf4b7bab99196ee3055771c81d4226cd0d89f2818ac0e26a1400a

                                              • C:\Users\Admin\AppData\Local\Temp\Gje4tiqgFK19.bat

                                                Filesize

                                                207B

                                                MD5

                                                5e6b5dded7c5e6ff313793f396f813e1

                                                SHA1

                                                15d864d8dc3f4266e31035228d0c0be1614b4e35

                                                SHA256

                                                d4bd35df7fa25b44bb5613ca685cb6c579fb47abe3c32f6c6bf8e589540ad20d

                                                SHA512

                                                aaa2b125a01574b14942ed97a2136a2875543fe01498ae70c195acea4faab25d9cbc6e431de1381447a4178a50712d07cf4da0726ca15b56de2d16cec319b8d2

                                              • C:\Users\Admin\AppData\Local\Temp\OHFxlBghWa8a.bat

                                                Filesize

                                                207B

                                                MD5

                                                000f7298ed266f82778347063559ea25

                                                SHA1

                                                afabfe2cce3471af062288cc0851f30b60895f75

                                                SHA256

                                                8827e9e20d4a5356c55b0a9e204644f26d5a6a9f33fd7684814c2eaf64ad684f

                                                SHA512

                                                8d012cc1ab8dfd35bc07ea3b0709f26aa1b308a8ae75220bdf6df193b2c5485ec8c550ad2502e3e6985b52d161b568ca41f08e006930e634a7f58c3155c8c9b3

                                              • C:\Users\Admin\AppData\Local\Temp\SrOwbJZBRaJ8.bat

                                                Filesize

                                                207B

                                                MD5

                                                31d21c87f0d644dd95143622fe37a800

                                                SHA1

                                                a15d0645551502cdc6b0e653e40f1210fa372efd

                                                SHA256

                                                c1411f3a098a111254092759197a0fff4da30285cb75be08ca8111bd1cd1d0c3

                                                SHA512

                                                72fa1640e0d43c893dd3015d0a97c95fe4f4b4f9f0e5ca6ba47b3886bac9415933fda9f903c38ae1dc39106f07709fc9ca533dad9a0c92301d212f1c9e27f9e9

                                              • C:\Users\Admin\AppData\Local\Temp\YGBaGkbPUfKH.bat

                                                Filesize

                                                207B

                                                MD5

                                                23edf399bdccf3aa0489c2f4726ca8db

                                                SHA1

                                                a83c3a5e05e94edd77341eaec1f03a6ba9fc2abf

                                                SHA256

                                                40d0f3698be723564f087bee49557a0c8e4fb85c0e56b1d28be9e98cae5e35ac

                                                SHA512

                                                3684fb060a406aeb3254330c2fecf26577ee15687f4a0ab36c1a429a37193d698b29bccf978e8e113a0e410f4754fbcd343a783a9cbaa0c13e064d490690e988

                                              • C:\Users\Admin\AppData\Local\Temp\YjXCr1lTee6s.bat

                                                Filesize

                                                207B

                                                MD5

                                                8c5893fc9a40b60a5d87c1d60dc9821f

                                                SHA1

                                                c680270464ba99726e8a7444995c135fe90f64fb

                                                SHA256

                                                9f3df781793cd66f979b4c966ec617bfd4dd2138c17f35221da737ed26995c3c

                                                SHA512

                                                b4b68b6241fb6e0262dbbb9e05748e77a1fda324c0b9bceb1905b29b7850c0d772511895d3eb87a02d7380f12293f0d151aa16a59d98f8908c907c3d368e48f3

                                              • C:\Users\Admin\AppData\Local\Temp\aA1HXpchhFns.bat

                                                Filesize

                                                207B

                                                MD5

                                                65e680cd4c59677bbfbffc8fe25e436d

                                                SHA1

                                                2243bc2da5c0e5c0d51f223717214fa512d62220

                                                SHA256

                                                4cd4ed96dbff75e7196b2ae94ccf7f77187ba9e93bd341aced8f2619d1f96412

                                                SHA512

                                                4e8e80abd9a874f23f2fdd36b7b304ebd61f5250a19e820f2feefb21e5c8de64b36619293ec2b2c6b1175a1f36a96e044ea35c39f2636c5223a7aa9f5397b572

                                              • C:\Users\Admin\AppData\Local\Temp\hKoGUzxVvjXW.bat

                                                Filesize

                                                207B

                                                MD5

                                                5e0b87d4cf72d30a1c373e3133b1e2f4

                                                SHA1

                                                510399db0e25ab0b91f83a17b692b26785d19787

                                                SHA256

                                                5e2bb31bc89f7364d6deb56c6ef87fd58fda37a2d976fe6417579b7f4efad55d

                                                SHA512

                                                48e738872d20b12a234f2c8cb8cab64a36ca92c9696dd120dbcf57aca0897ba622b4cb97a7aa902046adb930bfd4b1ff65864439f8a095779cbf7ace8920e9f4

                                              • C:\Users\Admin\AppData\Local\Temp\iyOh8MKEh8ZO.bat

                                                Filesize

                                                207B

                                                MD5

                                                00d07f0ea2e0caafbec295b13f34eb48

                                                SHA1

                                                05140c97f209e9c869d9a9a3d0db718339752e7d

                                                SHA256

                                                bacbb3fdcd988efc04ff362c7c12f0c76982496d3dbb82e9bb2ba3ef56eb6f5c

                                                SHA512

                                                12c8a03cb95e7ff16d2fb46fde3f4fbcfc58ea9b90ce4c785ebbf92c00605559fad06f0eea94a6159d2baf05fb574645ab2d112f602809faee021879bd900960

                                              • C:\Users\Admin\AppData\Local\Temp\tUnRAIaRXzzJ.bat

                                                Filesize

                                                207B

                                                MD5

                                                cf4bd58ac12916d3ad41e85db1c9c397

                                                SHA1

                                                d8c411ecf5241eae2f62d2a2e34e2d82c5ca792f

                                                SHA256

                                                daa458601123764ec284698f4bec5ccd5f0ace8e7fc4dde06d11ff1a514fb5fb

                                                SHA512

                                                3fad7495526d7fc7d088e24b6e57204fd2de4d923293f9fdad9740bb85e3e7b20048113e02fc76973fe6dcc6788b7d61ac97d12548daf58e0204c9ab9432d44f

                                              • C:\Users\Admin\AppData\Local\Temp\z0QPzQC6QjVS.bat

                                                Filesize

                                                207B

                                                MD5

                                                d6d6acefff3b048d90b14c257bdc3794

                                                SHA1

                                                1614cf46364206b6fc613df0fb427a9c2d72b8a4

                                                SHA256

                                                6666f9aee6d90e1765e1be1591dc6cb5bbc0b5e28e6db2924e9e2e8ae97a4202

                                                SHA512

                                                f76ecc2c4a2700f9ae30db9b1b12654548ffe936c0f544505baafbf560e80f386b3c2cf72c2cd1cdc27e0bcefeaeb3170cb5ff6c1a7bd271f20a22257c265a68

                                              • C:\Users\Admin\AppData\Roaming\Steam\svchost.exe

                                                Filesize

                                                3.1MB

                                                MD5

                                                a7d75b048989da5d22a1f7cca58edb51

                                                SHA1

                                                413d22b60ae540b3b11863e2107980b0403faf50

                                                SHA256

                                                884d0c2cefa850e384edd30c22b96dd9ca03443c7c57bdae7d6234c2ebf0d0c7

                                                SHA512

                                                4a453dc7f2a0e82d66fe5d73727ab2a23b5f00ea1b4a53032e4a538b72edf9caaf0894774d0fafb4af401f74a0b65bbf2d83a0cc643dc1a66ae23fb2136dd351

                                              • memory/220-0-0x00007FFDC4013000-0x00007FFDC4015000-memory.dmp

                                                Filesize

                                                8KB

                                              • memory/220-9-0x00007FFDC4010000-0x00007FFDC4AD1000-memory.dmp

                                                Filesize

                                                10.8MB

                                              • memory/220-2-0x00007FFDC4010000-0x00007FFDC4AD1000-memory.dmp

                                                Filesize

                                                10.8MB

                                              • memory/220-1-0x0000000000B70000-0x0000000000E94000-memory.dmp

                                                Filesize

                                                3.1MB

                                              • memory/4820-17-0x00007FFDC4010000-0x00007FFDC4AD1000-memory.dmp

                                                Filesize

                                                10.8MB

                                              • memory/4820-11-0x000000001C6C0000-0x000000001C772000-memory.dmp

                                                Filesize

                                                712KB

                                              • memory/4820-10-0x000000001C390000-0x000000001C3E0000-memory.dmp

                                                Filesize

                                                320KB

                                              • memory/4820-8-0x00007FFDC4010000-0x00007FFDC4AD1000-memory.dmp

                                                Filesize

                                                10.8MB