Analysis

  • max time kernel
    143s
  • max time network
    121s
  • platform
    windows7_x64
  • resource
    win7-20240903-en
  • resource tags

    arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system
  • submitted
    16-12-2024 06:50

General

  • Target

    WenzCord.exe

  • Size

    3.1MB

  • MD5

    f21aa436096afece0b8c39c36bf4a9ab

  • SHA1

    976b74c6a4e59e59a812c06032aae71a0516236a

  • SHA256

    43e79ab56cd512db7348129670a3d2bbb652cae64ab7baca0320ab31390a3e10

  • SHA512

    44500988e32db41452e83fcacfba7862fd1cc28ec1992b9040a408f155a5e6b416feb13dcf5afff690c615d51895476239575601cc255ecfb3973597ca13d15b

  • SSDEEP

    49152:pvrI22SsaNYfdPBldt698dBcjHKO06CBxDPoGd9THHB72eh2NT:pvU22SsaNYfdPBldt6+dBcjH06O

Malware Config

Extracted

Family

quasar

Version

1.4.1

Botnet

WenzCordRat

C2

nickhill112-22345.portmap.host:22345

Mutex

7ee1db41-359a-46b2-bba3-791dc7cde5e1

Attributes
  • encryption_key

    985DB7D034DB1B5D52F524873569DDDE4080F31C

  • install_name

    WenzCord.exe

  • log_directory

    Logs

  • reconnect_delay

    3000

  • startup_key

    Update.exe

  • subdirectory

    SubDir

Signatures

  • Quasar RAT

    Quasar is an open source Remote Access Tool.

  • Quasar family
  • Quasar payload 16 IoCs
  • Executes dropped EXE 15 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Network Configuration Discovery: Internet Connection Discovery 1 TTPs 15 IoCs

    Adversaries may check for Internet connectivity on compromised systems.

  • Runs ping.exe 1 TTPs 15 IoCs
  • Scheduled Task/Job: Scheduled Task 1 TTPs 16 IoCs

    Schtasks is often used by malware for persistence or to perform post-infection execution.

  • Suspicious use of AdjustPrivilegeToken 16 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs
  • Uses Task Scheduler COM API 1 TTPs

    The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.

Processes

  • C:\Users\Admin\AppData\Local\Temp\WenzCord.exe
    "C:\Users\Admin\AppData\Local\Temp\WenzCord.exe"
    1⤵
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:2060
    • C:\Windows\system32\schtasks.exe
      "schtasks" /create /tn "Update.exe" /sc ONLOGON /tr "C:\Users\Admin\AppData\Roaming\SubDir\WenzCord.exe" /rl HIGHEST /f
      2⤵
      • Scheduled Task/Job: Scheduled Task
      PID:588
    • C:\Users\Admin\AppData\Roaming\SubDir\WenzCord.exe
      "C:\Users\Admin\AppData\Roaming\SubDir\WenzCord.exe"
      2⤵
      • Executes dropped EXE
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of WriteProcessMemory
      PID:796
      • C:\Windows\system32\schtasks.exe
        "schtasks" /create /tn "Update.exe" /sc ONLOGON /tr "C:\Users\Admin\AppData\Roaming\SubDir\WenzCord.exe" /rl HIGHEST /f
        3⤵
        • Scheduled Task/Job: Scheduled Task
        PID:2660
      • C:\Windows\system32\cmd.exe
        cmd /c ""C:\Users\Admin\AppData\Local\Temp\KGKWvV9yJhPO.bat" "
        3⤵
        • Suspicious use of WriteProcessMemory
        PID:2680
        • C:\Windows\system32\chcp.com
          chcp 65001
          4⤵
            PID:2756
          • C:\Windows\system32\PING.EXE
            ping -n 10 localhost
            4⤵
            • System Network Configuration Discovery: Internet Connection Discovery
            • Runs ping.exe
            PID:2892
          • C:\Users\Admin\AppData\Roaming\SubDir\WenzCord.exe
            "C:\Users\Admin\AppData\Roaming\SubDir\WenzCord.exe"
            4⤵
            • Executes dropped EXE
            • Suspicious use of AdjustPrivilegeToken
            • Suspicious use of WriteProcessMemory
            PID:2748
            • C:\Windows\system32\schtasks.exe
              "schtasks" /create /tn "Update.exe" /sc ONLOGON /tr "C:\Users\Admin\AppData\Roaming\SubDir\WenzCord.exe" /rl HIGHEST /f
              5⤵
              • Scheduled Task/Job: Scheduled Task
              PID:2548
            • C:\Windows\system32\cmd.exe
              cmd /c ""C:\Users\Admin\AppData\Local\Temp\69AN5Mj9w52v.bat" "
              5⤵
              • Suspicious use of WriteProcessMemory
              PID:3036
              • C:\Windows\system32\chcp.com
                chcp 65001
                6⤵
                  PID:1708
                • C:\Windows\system32\PING.EXE
                  ping -n 10 localhost
                  6⤵
                  • System Network Configuration Discovery: Internet Connection Discovery
                  • Runs ping.exe
                  PID:1936
                • C:\Users\Admin\AppData\Roaming\SubDir\WenzCord.exe
                  "C:\Users\Admin\AppData\Roaming\SubDir\WenzCord.exe"
                  6⤵
                  • Executes dropped EXE
                  • Suspicious use of AdjustPrivilegeToken
                  • Suspicious use of WriteProcessMemory
                  PID:2040
                  • C:\Windows\system32\schtasks.exe
                    "schtasks" /create /tn "Update.exe" /sc ONLOGON /tr "C:\Users\Admin\AppData\Roaming\SubDir\WenzCord.exe" /rl HIGHEST /f
                    7⤵
                    • Scheduled Task/Job: Scheduled Task
                    PID:2268
                  • C:\Windows\system32\cmd.exe
                    cmd /c ""C:\Users\Admin\AppData\Local\Temp\cjseCTe8nkwU.bat" "
                    7⤵
                    • Suspicious use of WriteProcessMemory
                    PID:1220
                    • C:\Windows\system32\chcp.com
                      chcp 65001
                      8⤵
                        PID:3068
                      • C:\Windows\system32\PING.EXE
                        ping -n 10 localhost
                        8⤵
                        • System Network Configuration Discovery: Internet Connection Discovery
                        • Runs ping.exe
                        PID:1784
                      • C:\Users\Admin\AppData\Roaming\SubDir\WenzCord.exe
                        "C:\Users\Admin\AppData\Roaming\SubDir\WenzCord.exe"
                        8⤵
                        • Executes dropped EXE
                        • Suspicious use of AdjustPrivilegeToken
                        • Suspicious use of WriteProcessMemory
                        PID:2148
                        • C:\Windows\system32\schtasks.exe
                          "schtasks" /create /tn "Update.exe" /sc ONLOGON /tr "C:\Users\Admin\AppData\Roaming\SubDir\WenzCord.exe" /rl HIGHEST /f
                          9⤵
                          • Scheduled Task/Job: Scheduled Task
                          PID:1476
                        • C:\Windows\system32\cmd.exe
                          cmd /c ""C:\Users\Admin\AppData\Local\Temp\9yiw8kjumYqZ.bat" "
                          9⤵
                          • Suspicious use of WriteProcessMemory
                          PID:2952
                          • C:\Windows\system32\chcp.com
                            chcp 65001
                            10⤵
                              PID:3000
                            • C:\Windows\system32\PING.EXE
                              ping -n 10 localhost
                              10⤵
                              • System Network Configuration Discovery: Internet Connection Discovery
                              • Runs ping.exe
                              PID:2896
                            • C:\Users\Admin\AppData\Roaming\SubDir\WenzCord.exe
                              "C:\Users\Admin\AppData\Roaming\SubDir\WenzCord.exe"
                              10⤵
                              • Executes dropped EXE
                              • Suspicious use of AdjustPrivilegeToken
                              PID:1096
                              • C:\Windows\system32\schtasks.exe
                                "schtasks" /create /tn "Update.exe" /sc ONLOGON /tr "C:\Users\Admin\AppData\Roaming\SubDir\WenzCord.exe" /rl HIGHEST /f
                                11⤵
                                • Scheduled Task/Job: Scheduled Task
                                PID:2120
                              • C:\Windows\system32\cmd.exe
                                cmd /c ""C:\Users\Admin\AppData\Local\Temp\kqbD27fRBGMe.bat" "
                                11⤵
                                  PID:2396
                                  • C:\Windows\system32\chcp.com
                                    chcp 65001
                                    12⤵
                                      PID:1528
                                    • C:\Windows\system32\PING.EXE
                                      ping -n 10 localhost
                                      12⤵
                                      • System Network Configuration Discovery: Internet Connection Discovery
                                      • Runs ping.exe
                                      PID:2344
                                    • C:\Users\Admin\AppData\Roaming\SubDir\WenzCord.exe
                                      "C:\Users\Admin\AppData\Roaming\SubDir\WenzCord.exe"
                                      12⤵
                                      • Executes dropped EXE
                                      • Suspicious use of AdjustPrivilegeToken
                                      PID:2264
                                      • C:\Windows\system32\schtasks.exe
                                        "schtasks" /create /tn "Update.exe" /sc ONLOGON /tr "C:\Users\Admin\AppData\Roaming\SubDir\WenzCord.exe" /rl HIGHEST /f
                                        13⤵
                                        • Scheduled Task/Job: Scheduled Task
                                        PID:2280
                                      • C:\Windows\system32\cmd.exe
                                        cmd /c ""C:\Users\Admin\AppData\Local\Temp\zwqcg4N1Xnwr.bat" "
                                        13⤵
                                          PID:2368
                                          • C:\Windows\system32\chcp.com
                                            chcp 65001
                                            14⤵
                                              PID:1000
                                            • C:\Windows\system32\PING.EXE
                                              ping -n 10 localhost
                                              14⤵
                                              • System Network Configuration Discovery: Internet Connection Discovery
                                              • Runs ping.exe
                                              PID:1816
                                            • C:\Users\Admin\AppData\Roaming\SubDir\WenzCord.exe
                                              "C:\Users\Admin\AppData\Roaming\SubDir\WenzCord.exe"
                                              14⤵
                                              • Executes dropped EXE
                                              • Suspicious use of AdjustPrivilegeToken
                                              PID:2076
                                              • C:\Windows\system32\schtasks.exe
                                                "schtasks" /create /tn "Update.exe" /sc ONLOGON /tr "C:\Users\Admin\AppData\Roaming\SubDir\WenzCord.exe" /rl HIGHEST /f
                                                15⤵
                                                • Scheduled Task/Job: Scheduled Task
                                                PID:2296
                                              • C:\Windows\system32\cmd.exe
                                                cmd /c ""C:\Users\Admin\AppData\Local\Temp\f8jkGjrbW7EE.bat" "
                                                15⤵
                                                  PID:2308
                                                  • C:\Windows\system32\chcp.com
                                                    chcp 65001
                                                    16⤵
                                                      PID:2140
                                                    • C:\Windows\system32\PING.EXE
                                                      ping -n 10 localhost
                                                      16⤵
                                                      • System Network Configuration Discovery: Internet Connection Discovery
                                                      • Runs ping.exe
                                                      PID:2724
                                                    • C:\Users\Admin\AppData\Roaming\SubDir\WenzCord.exe
                                                      "C:\Users\Admin\AppData\Roaming\SubDir\WenzCord.exe"
                                                      16⤵
                                                      • Executes dropped EXE
                                                      • Suspicious use of AdjustPrivilegeToken
                                                      PID:2552
                                                      • C:\Windows\system32\schtasks.exe
                                                        "schtasks" /create /tn "Update.exe" /sc ONLOGON /tr "C:\Users\Admin\AppData\Roaming\SubDir\WenzCord.exe" /rl HIGHEST /f
                                                        17⤵
                                                        • Scheduled Task/Job: Scheduled Task
                                                        PID:2060
                                                      • C:\Windows\system32\cmd.exe
                                                        cmd /c ""C:\Users\Admin\AppData\Local\Temp\pdU8Hkcci5hb.bat" "
                                                        17⤵
                                                          PID:2692
                                                          • C:\Windows\system32\chcp.com
                                                            chcp 65001
                                                            18⤵
                                                              PID:2252
                                                            • C:\Windows\system32\PING.EXE
                                                              ping -n 10 localhost
                                                              18⤵
                                                              • System Network Configuration Discovery: Internet Connection Discovery
                                                              • Runs ping.exe
                                                              PID:2544
                                                            • C:\Users\Admin\AppData\Roaming\SubDir\WenzCord.exe
                                                              "C:\Users\Admin\AppData\Roaming\SubDir\WenzCord.exe"
                                                              18⤵
                                                              • Executes dropped EXE
                                                              • Suspicious use of AdjustPrivilegeToken
                                                              PID:1840
                                                              • C:\Windows\system32\schtasks.exe
                                                                "schtasks" /create /tn "Update.exe" /sc ONLOGON /tr "C:\Users\Admin\AppData\Roaming\SubDir\WenzCord.exe" /rl HIGHEST /f
                                                                19⤵
                                                                • Scheduled Task/Job: Scheduled Task
                                                                PID:1516
                                                              • C:\Windows\system32\cmd.exe
                                                                cmd /c ""C:\Users\Admin\AppData\Local\Temp\8XXJPBpdeU5b.bat" "
                                                                19⤵
                                                                  PID:772
                                                                  • C:\Windows\system32\chcp.com
                                                                    chcp 65001
                                                                    20⤵
                                                                      PID:2604
                                                                    • C:\Windows\system32\PING.EXE
                                                                      ping -n 10 localhost
                                                                      20⤵
                                                                      • System Network Configuration Discovery: Internet Connection Discovery
                                                                      • Runs ping.exe
                                                                      PID:2268
                                                                    • C:\Users\Admin\AppData\Roaming\SubDir\WenzCord.exe
                                                                      "C:\Users\Admin\AppData\Roaming\SubDir\WenzCord.exe"
                                                                      20⤵
                                                                      • Executes dropped EXE
                                                                      • Suspicious use of AdjustPrivilegeToken
                                                                      PID:2836
                                                                      • C:\Windows\system32\schtasks.exe
                                                                        "schtasks" /create /tn "Update.exe" /sc ONLOGON /tr "C:\Users\Admin\AppData\Roaming\SubDir\WenzCord.exe" /rl HIGHEST /f
                                                                        21⤵
                                                                        • Scheduled Task/Job: Scheduled Task
                                                                        PID:1372
                                                                      • C:\Windows\system32\cmd.exe
                                                                        cmd /c ""C:\Users\Admin\AppData\Local\Temp\uENNbAq5oFNN.bat" "
                                                                        21⤵
                                                                          PID:848
                                                                          • C:\Windows\system32\chcp.com
                                                                            chcp 65001
                                                                            22⤵
                                                                              PID:1048
                                                                            • C:\Windows\system32\PING.EXE
                                                                              ping -n 10 localhost
                                                                              22⤵
                                                                              • System Network Configuration Discovery: Internet Connection Discovery
                                                                              • Runs ping.exe
                                                                              PID:2072
                                                                            • C:\Users\Admin\AppData\Roaming\SubDir\WenzCord.exe
                                                                              "C:\Users\Admin\AppData\Roaming\SubDir\WenzCord.exe"
                                                                              22⤵
                                                                              • Executes dropped EXE
                                                                              • Suspicious use of AdjustPrivilegeToken
                                                                              PID:3048
                                                                              • C:\Windows\system32\schtasks.exe
                                                                                "schtasks" /create /tn "Update.exe" /sc ONLOGON /tr "C:\Users\Admin\AppData\Roaming\SubDir\WenzCord.exe" /rl HIGHEST /f
                                                                                23⤵
                                                                                • Scheduled Task/Job: Scheduled Task
                                                                                PID:2500
                                                                              • C:\Windows\system32\cmd.exe
                                                                                cmd /c ""C:\Users\Admin\AppData\Local\Temp\VsTdmNVknVgI.bat" "
                                                                                23⤵
                                                                                  PID:2884
                                                                                  • C:\Windows\system32\chcp.com
                                                                                    chcp 65001
                                                                                    24⤵
                                                                                      PID:900
                                                                                    • C:\Windows\system32\PING.EXE
                                                                                      ping -n 10 localhost
                                                                                      24⤵
                                                                                      • System Network Configuration Discovery: Internet Connection Discovery
                                                                                      • Runs ping.exe
                                                                                      PID:1056
                                                                                    • C:\Users\Admin\AppData\Roaming\SubDir\WenzCord.exe
                                                                                      "C:\Users\Admin\AppData\Roaming\SubDir\WenzCord.exe"
                                                                                      24⤵
                                                                                      • Executes dropped EXE
                                                                                      • Suspicious use of AdjustPrivilegeToken
                                                                                      PID:748
                                                                                      • C:\Windows\system32\schtasks.exe
                                                                                        "schtasks" /create /tn "Update.exe" /sc ONLOGON /tr "C:\Users\Admin\AppData\Roaming\SubDir\WenzCord.exe" /rl HIGHEST /f
                                                                                        25⤵
                                                                                        • Scheduled Task/Job: Scheduled Task
                                                                                        PID:840
                                                                                      • C:\Windows\system32\cmd.exe
                                                                                        cmd /c ""C:\Users\Admin\AppData\Local\Temp\peMMHbb5DUZJ.bat" "
                                                                                        25⤵
                                                                                          PID:2200
                                                                                          • C:\Windows\system32\chcp.com
                                                                                            chcp 65001
                                                                                            26⤵
                                                                                              PID:2972
                                                                                            • C:\Windows\system32\PING.EXE
                                                                                              ping -n 10 localhost
                                                                                              26⤵
                                                                                              • System Network Configuration Discovery: Internet Connection Discovery
                                                                                              • Runs ping.exe
                                                                                              PID:1332
                                                                                            • C:\Users\Admin\AppData\Roaming\SubDir\WenzCord.exe
                                                                                              "C:\Users\Admin\AppData\Roaming\SubDir\WenzCord.exe"
                                                                                              26⤵
                                                                                              • Executes dropped EXE
                                                                                              • Suspicious use of AdjustPrivilegeToken
                                                                                              PID:2988
                                                                                              • C:\Windows\system32\schtasks.exe
                                                                                                "schtasks" /create /tn "Update.exe" /sc ONLOGON /tr "C:\Users\Admin\AppData\Roaming\SubDir\WenzCord.exe" /rl HIGHEST /f
                                                                                                27⤵
                                                                                                • Scheduled Task/Job: Scheduled Task
                                                                                                PID:832
                                                                                              • C:\Windows\system32\cmd.exe
                                                                                                cmd /c ""C:\Users\Admin\AppData\Local\Temp\CLEtm8s9SiUP.bat" "
                                                                                                27⤵
                                                                                                  PID:1672
                                                                                                  • C:\Windows\system32\chcp.com
                                                                                                    chcp 65001
                                                                                                    28⤵
                                                                                                      PID:928
                                                                                                    • C:\Windows\system32\PING.EXE
                                                                                                      ping -n 10 localhost
                                                                                                      28⤵
                                                                                                      • System Network Configuration Discovery: Internet Connection Discovery
                                                                                                      • Runs ping.exe
                                                                                                      PID:920
                                                                                                    • C:\Users\Admin\AppData\Roaming\SubDir\WenzCord.exe
                                                                                                      "C:\Users\Admin\AppData\Roaming\SubDir\WenzCord.exe"
                                                                                                      28⤵
                                                                                                      • Executes dropped EXE
                                                                                                      • Suspicious use of AdjustPrivilegeToken
                                                                                                      PID:1588
                                                                                                      • C:\Windows\system32\schtasks.exe
                                                                                                        "schtasks" /create /tn "Update.exe" /sc ONLOGON /tr "C:\Users\Admin\AppData\Roaming\SubDir\WenzCord.exe" /rl HIGHEST /f
                                                                                                        29⤵
                                                                                                        • Scheduled Task/Job: Scheduled Task
                                                                                                        PID:2212
                                                                                                      • C:\Windows\system32\cmd.exe
                                                                                                        cmd /c ""C:\Users\Admin\AppData\Local\Temp\HzllDMr837Wf.bat" "
                                                                                                        29⤵
                                                                                                          PID:2440
                                                                                                          • C:\Windows\system32\chcp.com
                                                                                                            chcp 65001
                                                                                                            30⤵
                                                                                                              PID:1304
                                                                                                            • C:\Windows\system32\PING.EXE
                                                                                                              ping -n 10 localhost
                                                                                                              30⤵
                                                                                                              • System Network Configuration Discovery: Internet Connection Discovery
                                                                                                              • Runs ping.exe
                                                                                                              PID:2232
                                                                                                            • C:\Users\Admin\AppData\Roaming\SubDir\WenzCord.exe
                                                                                                              "C:\Users\Admin\AppData\Roaming\SubDir\WenzCord.exe"
                                                                                                              30⤵
                                                                                                              • Executes dropped EXE
                                                                                                              • Suspicious use of AdjustPrivilegeToken
                                                                                                              PID:2648
                                                                                                              • C:\Windows\system32\schtasks.exe
                                                                                                                "schtasks" /create /tn "Update.exe" /sc ONLOGON /tr "C:\Users\Admin\AppData\Roaming\SubDir\WenzCord.exe" /rl HIGHEST /f
                                                                                                                31⤵
                                                                                                                • Scheduled Task/Job: Scheduled Task
                                                                                                                PID:2328
                                                                                                              • C:\Windows\system32\cmd.exe
                                                                                                                cmd /c ""C:\Users\Admin\AppData\Local\Temp\Sz3OENQ1LTOF.bat" "
                                                                                                                31⤵
                                                                                                                  PID:2044
                                                                                                                  • C:\Windows\system32\chcp.com
                                                                                                                    chcp 65001
                                                                                                                    32⤵
                                                                                                                      PID:2176
                                                                                                                    • C:\Windows\system32\PING.EXE
                                                                                                                      ping -n 10 localhost
                                                                                                                      32⤵
                                                                                                                      • System Network Configuration Discovery: Internet Connection Discovery
                                                                                                                      • Runs ping.exe
                                                                                                                      PID:2784

                                                      Network

                                                      MITRE ATT&CK Enterprise v15

                                                      Replay Monitor

                                                      Loading Replay Monitor...

                                                      Downloads

                                                      • C:\Users\Admin\AppData\Local\Temp\69AN5Mj9w52v.bat

                                                        Filesize

                                                        209B

                                                        MD5

                                                        7fbbf573851ef81b22512ed415713efb

                                                        SHA1

                                                        e3a4e7374bd0a1adf4cf6553b0ce8ddf2bbf1739

                                                        SHA256

                                                        768888886db0fb50fddbab47daba600b74e5550faa9883350159698e43a3ee9f

                                                        SHA512

                                                        7ac55c6cf0e76956e648417f68d9577de5c88530329ddf1a827ea2afa4edf9aa7f05b1fc072347fcc2c3ce073ef61f918e5684848a0200b4d3e5fd483587ee84

                                                      • C:\Users\Admin\AppData\Local\Temp\8XXJPBpdeU5b.bat

                                                        Filesize

                                                        209B

                                                        MD5

                                                        e9bd505ad0ed2e8a9d7489beabf9ff83

                                                        SHA1

                                                        c409dff713dc330eca3580b868caeedbd9d8d8d9

                                                        SHA256

                                                        2d9fbf9bdb1bf57ef451fa39d8c6f2123ec926a045d750d0af35da92cbdc7e37

                                                        SHA512

                                                        56efdf380af329735cfbb6d4660fce25978492aa20308b5629a202c2d18a27d6c09306a51cb412b6e269200a94f08e8e8b835d878bb3c21d65a33ce9e16fbade

                                                      • C:\Users\Admin\AppData\Local\Temp\9yiw8kjumYqZ.bat

                                                        Filesize

                                                        209B

                                                        MD5

                                                        6060a4bb67e64d6e9f758c93c3f2a519

                                                        SHA1

                                                        1cb8709f3f1401c192c149b3b8320973bae3fd1d

                                                        SHA256

                                                        1d359fb83409a421eb751585421ee9c09d49c121e481b4d5594c1ae2635c22cc

                                                        SHA512

                                                        3e9b8396cf99b6306732d21c38f0c3cb5f4e8d6371d4552ad54b0c369d6d8fb9f09fe7db7c187e383187c2eb88e8420bd2600621fae403508a239927a322e7c4

                                                      • C:\Users\Admin\AppData\Local\Temp\CLEtm8s9SiUP.bat

                                                        Filesize

                                                        209B

                                                        MD5

                                                        1f3cc09cfdc3ecc2bd35feb54146f3ca

                                                        SHA1

                                                        a3d04752dbda09d1fbbdae197a9e726a19cc5cf0

                                                        SHA256

                                                        c3a505e08a007efd677a3b6ac47eae816b4ee6f0c93dd77b8ff0be96dda3016e

                                                        SHA512

                                                        c300520ca9ead814a30f3c6027212b1915474e47fbcba46efa07d02836efa2a5533a15b41dc634c7a1bd53d82d8c4c80847df969acc538b009c2e5c052e68651

                                                      • C:\Users\Admin\AppData\Local\Temp\HzllDMr837Wf.bat

                                                        Filesize

                                                        209B

                                                        MD5

                                                        b79b0b816c7646f8d019942eda2dc09e

                                                        SHA1

                                                        aed498c2507b90736a29fff2db57db77268ec049

                                                        SHA256

                                                        a65bdd529e218166ea0fc03b13df7cde5d62fb470fdd3dd52742873e3cc138a0

                                                        SHA512

                                                        52c882dcb6de402accfcf49da06ae76e3ee8137ee898dacfb2c50a51a58d03c2f5ba095d8ac5b9b94d107802994fe115146f50d823041bc26940208e2bcdae7a

                                                      • C:\Users\Admin\AppData\Local\Temp\KGKWvV9yJhPO.bat

                                                        Filesize

                                                        209B

                                                        MD5

                                                        bef8b82d73b938f20648713cf9b2d7f1

                                                        SHA1

                                                        6f42cdfdfa197f6faf1d33a0c1bc3fc9a55bef9f

                                                        SHA256

                                                        20cb6c11b977cf22a35697521726da33307ba221282b0dc11b47687e310560b2

                                                        SHA512

                                                        208df893572d0ea741fd7347b42308bf41d84b33530dbc965366d1547a6e949fe4707730906c5cd821549d5174396fba809232bde171e5f0cd24729d502f207d

                                                      • C:\Users\Admin\AppData\Local\Temp\Sz3OENQ1LTOF.bat

                                                        Filesize

                                                        209B

                                                        MD5

                                                        26da780f64c2b7db396cb6f1d06c85a4

                                                        SHA1

                                                        e72b56860f4b15759c0cff2ba8c423941abbe222

                                                        SHA256

                                                        3a904251ebcae4914cf1ae57020d1bc04d53a2b3982fe43a1fcf851dd439d591

                                                        SHA512

                                                        0c6d0ca81ed637c113bebf7c3d51811289b293d0178c8714261c059a71e2dabb75672393353c16ec296acbd976f41e7f602612afd98633f35dd3a5c048e33483

                                                      • C:\Users\Admin\AppData\Local\Temp\VsTdmNVknVgI.bat

                                                        Filesize

                                                        209B

                                                        MD5

                                                        1a74d5a20478abb1bd70d78ca79c4bf8

                                                        SHA1

                                                        590f3d86529426c2c56a4ac2c3f5293836e70296

                                                        SHA256

                                                        a8d13ceba64bd7ebd9942ae8c23df4b4a2f770a4ee2cea5da046e4fcfcef98ff

                                                        SHA512

                                                        e752d0463e0272789730da464c81173fb1d4fa00f176de84bfc9afe31a46a560017a7684d060d1b594593f8836ac86b71fa1d26928f81cd08d6d0a8780504ccc

                                                      • C:\Users\Admin\AppData\Local\Temp\cjseCTe8nkwU.bat

                                                        Filesize

                                                        209B

                                                        MD5

                                                        069cd22e4a48a704674252fc66d74805

                                                        SHA1

                                                        258c501d2f5a7bbdccca3f403a10376026350abc

                                                        SHA256

                                                        238d06ee9f6c3cafb4fa0f0ab56e0cf37f5a140d5df1c45b02dd237d8ce89a50

                                                        SHA512

                                                        8730831a1446b4c63b29ed14315f4f39361db4ff001ca780ae4753b12b81a3c27fd2fd1a66ea5ee2ddacdfe97f8a9f3cc45a7e22aa22b9c81ff556c22c3a1779

                                                      • C:\Users\Admin\AppData\Local\Temp\f8jkGjrbW7EE.bat

                                                        Filesize

                                                        209B

                                                        MD5

                                                        ebc1ba83ff7c283e81f097279f77ddc3

                                                        SHA1

                                                        e947805afb62dc0512f2461c8bebe5f799e0d5ea

                                                        SHA256

                                                        b86aee0fe22d2d03aa2db29942e0b90b12f341ace163d3fad65681696d8170a0

                                                        SHA512

                                                        610d518fcebde9863a9c42456102105a74208db8fbaa540d0fc3e9b58fff1a8d7e7320d75bd6e08065ccd2800ff21474539adf009c7bf7594dc17d1cbaecd819

                                                      • C:\Users\Admin\AppData\Local\Temp\kqbD27fRBGMe.bat

                                                        Filesize

                                                        209B

                                                        MD5

                                                        4a047b54fd038b723183d9108891b6f2

                                                        SHA1

                                                        4beec5f1558499834fb362ac1610910059747705

                                                        SHA256

                                                        f356603174b52569516f42753aedbd98b1876ad16dcd28f57d80d2a26f4156fd

                                                        SHA512

                                                        15a5a877cdb6cbc80932ee646bcc302d213e838720b0b1d5e51af953d0e3c6f446eee9b81bf443385a39a7c751bbe79c3436e0a443b60e103e05c702f05dcd02

                                                      • C:\Users\Admin\AppData\Local\Temp\pdU8Hkcci5hb.bat

                                                        Filesize

                                                        209B

                                                        MD5

                                                        aa220a49af29c604d04639d9dba6a7e8

                                                        SHA1

                                                        8449cef8b5108d7e0b1a29f2f9843669fdbc87b5

                                                        SHA256

                                                        988ddd5da9183e3a9e2955ba3a019ef8755145e354214270e4b4d8131f2849cd

                                                        SHA512

                                                        41c8feb6ccafcecafd219cffdfe4c7c79ff38aa160a662e9cf4af7141de150b2eb3dd07e5bcb5251f5fe4d1e2c36547686fad102d745361ca3b94baa46736826

                                                      • C:\Users\Admin\AppData\Local\Temp\peMMHbb5DUZJ.bat

                                                        Filesize

                                                        209B

                                                        MD5

                                                        45597608aa475f9ff3a41db3e6eacb14

                                                        SHA1

                                                        14bf02713a153af33d0bc0a75a523802a6f6739a

                                                        SHA256

                                                        f0e19e7907ecf72626c1fd81222ff11f46d437631ab484497bc15694c8107d59

                                                        SHA512

                                                        8051ae247924821030a9a35d920422d1c6a52fa7041e5b2697309e8b37d216cfbc4f900fd911035f978796160ea98387c422ea22b9948711147285d67cf2c6a6

                                                      • C:\Users\Admin\AppData\Local\Temp\uENNbAq5oFNN.bat

                                                        Filesize

                                                        209B

                                                        MD5

                                                        55c9d7b91f337a5ab491926a9693a260

                                                        SHA1

                                                        945d4fac9c9aa34c64bdb1fc50865dc30584d6e8

                                                        SHA256

                                                        932a7706b81720e13f4fed4e6b27256231177cd478e17367b810fb2d3efd316d

                                                        SHA512

                                                        8d99b57476a353790e1206058f48b93a61349289f25c397e35a4f3aafd2323db89d7039207da8311fd6c0cf186bdae4c9596ccdedb4ec6894e951a2138932cb1

                                                      • C:\Users\Admin\AppData\Local\Temp\zwqcg4N1Xnwr.bat

                                                        Filesize

                                                        209B

                                                        MD5

                                                        95b8cdd861776824342307608b9f9a31

                                                        SHA1

                                                        7a43a77820e2acbff077aea73abac0b44a597edb

                                                        SHA256

                                                        99d7d10c0c57d711107978762d71361a19258f42042be49a0fdcd2e8a451f85e

                                                        SHA512

                                                        45ad45f1ddcd739dc10c0b30bf35b4f9e5dbce94f3459347f73eefaea0da45a65bc35c2af64ef20844958cc1e9245a6ecb33aafd25491892982802851b17e696

                                                      • C:\Users\Admin\AppData\Roaming\SubDir\WenzCord.exe

                                                        Filesize

                                                        3.1MB

                                                        MD5

                                                        f21aa436096afece0b8c39c36bf4a9ab

                                                        SHA1

                                                        976b74c6a4e59e59a812c06032aae71a0516236a

                                                        SHA256

                                                        43e79ab56cd512db7348129670a3d2bbb652cae64ab7baca0320ab31390a3e10

                                                        SHA512

                                                        44500988e32db41452e83fcacfba7862fd1cc28ec1992b9040a408f155a5e6b416feb13dcf5afff690c615d51895476239575601cc255ecfb3973597ca13d15b

                                                      • memory/748-133-0x0000000000180000-0x00000000004AA000-memory.dmp

                                                        Filesize

                                                        3.2MB

                                                      • memory/796-8-0x000007FEF5D30000-0x000007FEF671C000-memory.dmp

                                                        Filesize

                                                        9.9MB

                                                      • memory/796-20-0x000007FEF5D30000-0x000007FEF671C000-memory.dmp

                                                        Filesize

                                                        9.9MB

                                                      • memory/796-11-0x000007FEF5D30000-0x000007FEF671C000-memory.dmp

                                                        Filesize

                                                        9.9MB

                                                      • memory/796-10-0x0000000000BC0000-0x0000000000EEA000-memory.dmp

                                                        Filesize

                                                        3.2MB

                                                      • memory/1096-56-0x0000000000DC0000-0x00000000010EA000-memory.dmp

                                                        Filesize

                                                        3.2MB

                                                      • memory/1588-155-0x00000000002A0000-0x00000000005CA000-memory.dmp

                                                        Filesize

                                                        3.2MB

                                                      • memory/1840-101-0x0000000000D90000-0x00000000010BA000-memory.dmp

                                                        Filesize

                                                        3.2MB

                                                      • memory/2040-34-0x00000000000C0000-0x00000000003EA000-memory.dmp

                                                        Filesize

                                                        3.2MB

                                                      • memory/2060-2-0x000007FEF5D30000-0x000007FEF671C000-memory.dmp

                                                        Filesize

                                                        9.9MB

                                                      • memory/2060-0-0x000007FEF5D33000-0x000007FEF5D34000-memory.dmp

                                                        Filesize

                                                        4KB

                                                      • memory/2060-1-0x00000000009F0000-0x0000000000D1A000-memory.dmp

                                                        Filesize

                                                        3.2MB

                                                      • memory/2060-9-0x000007FEF5D30000-0x000007FEF671C000-memory.dmp

                                                        Filesize

                                                        9.9MB

                                                      • memory/2076-79-0x0000000000990000-0x0000000000CBA000-memory.dmp

                                                        Filesize

                                                        3.2MB

                                                      • memory/2148-45-0x0000000000270000-0x000000000059A000-memory.dmp

                                                        Filesize

                                                        3.2MB

                                                      • memory/2264-67-0x0000000000080000-0x00000000003AA000-memory.dmp

                                                        Filesize

                                                        3.2MB

                                                      • memory/2552-90-0x0000000000BD0000-0x0000000000EFA000-memory.dmp

                                                        Filesize

                                                        3.2MB

                                                      • memory/2648-166-0x0000000001320000-0x000000000164A000-memory.dmp

                                                        Filesize

                                                        3.2MB

                                                      • memory/2748-23-0x0000000000CB0000-0x0000000000FDA000-memory.dmp

                                                        Filesize

                                                        3.2MB

                                                      • memory/2836-112-0x0000000001350000-0x000000000167A000-memory.dmp

                                                        Filesize

                                                        3.2MB

                                                      • memory/2988-144-0x00000000011D0000-0x00000000014FA000-memory.dmp

                                                        Filesize

                                                        3.2MB