Analysis

  • max time kernel
    149s
  • max time network
    150s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20241007-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system
  • submitted
    17-12-2024 06:37

General

  • Target

    14495_Client-built.exe

  • Size

    3.1MB

  • MD5

    c2281b1740f2acd02e9e19f83441b033

  • SHA1

    bf321d96b83261e5487f06c9c0ddfc75786c7c8c

  • SHA256

    8fb680e847ab1c533fc3f092164064a5c298126ba16db0ab7df84cbaf6ffa997

  • SHA512

    0c8a95e5caa07047073077a252a891e321cf1a8c964e6e99b72a1c701e6368e63aa82c0425f58364887de3c277130c3c1acda2064332c377efaccf6ce568e027

  • SSDEEP

    49152:jyF/j2yMy5en93hlLLzJjVrvjkoGduTHHB72eh2NT:jydj2yMy5en93hlLLzJjVrvo

Malware Config

Extracted

Family

quasar

Version

1.4.0

Botnet

Office04

C2

connectdadad.ddns.net:4782

Mutex

e862a94f-5f45-4b8c-89de-f84dadb095d0

Attributes
  • encryption_key

    23E5F6D22FEE1750D36544A759A48349B064BC34

  • install_name

    PerfWatson1.exe

  • log_directory

    Logs

  • reconnect_delay

    3000

  • startup_key

    svhost

  • subdirectory

    KDOT

Signatures

  • Quasar RAT

    Quasar is an open source Remote Access Tool.

  • Quasar family
  • Quasar payload 2 IoCs
  • Checks computer location settings 2 TTPs 15 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Executes dropped EXE 15 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Network Configuration Discovery: Internet Connection Discovery 1 TTPs 15 IoCs

    Adversaries may check for Internet connectivity on compromised systems.

  • Runs ping.exe 1 TTPs 15 IoCs
  • Scheduled Task/Job: Scheduled Task 1 TTPs 16 IoCs

    Schtasks is often used by malware for persistence or to perform post-infection execution.

  • Suspicious use of AdjustPrivilegeToken 16 IoCs
  • Suspicious use of SetWindowsHookEx 1 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs
  • Uses Task Scheduler COM API 1 TTPs

    The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.

Processes

  • C:\Users\Admin\AppData\Local\Temp\14495_Client-built.exe
    "C:\Users\Admin\AppData\Local\Temp\14495_Client-built.exe"
    1⤵
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:4528
    • C:\Windows\SYSTEM32\schtasks.exe
      "schtasks" /create /tn "svhost" /sc ONLOGON /tr "C:\Users\Admin\AppData\Local\Temp\14495_Client-built.exe" /rl HIGHEST /f
      2⤵
      • Scheduled Task/Job: Scheduled Task
      PID:4432
    • C:\Users\Admin\AppData\Roaming\KDOT\PerfWatson1.exe
      "C:\Users\Admin\AppData\Roaming\KDOT\PerfWatson1.exe"
      2⤵
      • Checks computer location settings
      • Executes dropped EXE
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of WriteProcessMemory
      PID:4840
      • C:\Windows\SYSTEM32\schtasks.exe
        "schtasks" /create /tn "svhost" /sc ONLOGON /tr "C:\Users\Admin\AppData\Roaming\KDOT\PerfWatson1.exe" /rl HIGHEST /f
        3⤵
        • Scheduled Task/Job: Scheduled Task
        PID:2436
      • C:\Windows\system32\cmd.exe
        C:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\xMvo6BHCslVL.bat" "
        3⤵
        • Suspicious use of WriteProcessMemory
        PID:2052
        • C:\Windows\system32\chcp.com
          chcp 65001
          4⤵
            PID:4748
          • C:\Windows\system32\PING.EXE
            ping -n 10 localhost
            4⤵
            • System Network Configuration Discovery: Internet Connection Discovery
            • Runs ping.exe
            PID:1164
          • C:\Users\Admin\AppData\Roaming\KDOT\PerfWatson1.exe
            "C:\Users\Admin\AppData\Roaming\KDOT\PerfWatson1.exe"
            4⤵
            • Checks computer location settings
            • Executes dropped EXE
            • Suspicious use of AdjustPrivilegeToken
            • Suspicious use of WriteProcessMemory
            PID:1708
            • C:\Windows\SYSTEM32\schtasks.exe
              "schtasks" /create /tn "svhost" /sc ONLOGON /tr "C:\Users\Admin\AppData\Roaming\KDOT\PerfWatson1.exe" /rl HIGHEST /f
              5⤵
              • Scheduled Task/Job: Scheduled Task
              PID:4952
            • C:\Windows\system32\cmd.exe
              C:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\sji2Z18gAb6S.bat" "
              5⤵
              • Suspicious use of WriteProcessMemory
              PID:920
              • C:\Windows\system32\chcp.com
                chcp 65001
                6⤵
                  PID:2596
                • C:\Windows\system32\PING.EXE
                  ping -n 10 localhost
                  6⤵
                  • System Network Configuration Discovery: Internet Connection Discovery
                  • Runs ping.exe
                  PID:2460
                • C:\Users\Admin\AppData\Roaming\KDOT\PerfWatson1.exe
                  "C:\Users\Admin\AppData\Roaming\KDOT\PerfWatson1.exe"
                  6⤵
                  • Checks computer location settings
                  • Executes dropped EXE
                  • Suspicious use of AdjustPrivilegeToken
                  • Suspicious use of WriteProcessMemory
                  PID:4708
                  • C:\Windows\SYSTEM32\schtasks.exe
                    "schtasks" /create /tn "svhost" /sc ONLOGON /tr "C:\Users\Admin\AppData\Roaming\KDOT\PerfWatson1.exe" /rl HIGHEST /f
                    7⤵
                    • Scheduled Task/Job: Scheduled Task
                    PID:3040
                  • C:\Windows\system32\cmd.exe
                    C:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\CHy4J0BpgYtX.bat" "
                    7⤵
                    • Suspicious use of WriteProcessMemory
                    PID:4328
                    • C:\Windows\system32\chcp.com
                      chcp 65001
                      8⤵
                        PID:3808
                      • C:\Windows\system32\PING.EXE
                        ping -n 10 localhost
                        8⤵
                        • System Network Configuration Discovery: Internet Connection Discovery
                        • Runs ping.exe
                        PID:4064
                      • C:\Users\Admin\AppData\Roaming\KDOT\PerfWatson1.exe
                        "C:\Users\Admin\AppData\Roaming\KDOT\PerfWatson1.exe"
                        8⤵
                        • Checks computer location settings
                        • Executes dropped EXE
                        • Suspicious use of AdjustPrivilegeToken
                        • Suspicious use of WriteProcessMemory
                        PID:4540
                        • C:\Windows\SYSTEM32\schtasks.exe
                          "schtasks" /create /tn "svhost" /sc ONLOGON /tr "C:\Users\Admin\AppData\Roaming\KDOT\PerfWatson1.exe" /rl HIGHEST /f
                          9⤵
                          • Scheduled Task/Job: Scheduled Task
                          PID:4624
                        • C:\Windows\system32\cmd.exe
                          C:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\jVkDcy694Xpr.bat" "
                          9⤵
                          • Suspicious use of WriteProcessMemory
                          PID:3012
                          • C:\Windows\system32\chcp.com
                            chcp 65001
                            10⤵
                              PID:3284
                            • C:\Windows\system32\PING.EXE
                              ping -n 10 localhost
                              10⤵
                              • System Network Configuration Discovery: Internet Connection Discovery
                              • Runs ping.exe
                              PID:4512
                            • C:\Users\Admin\AppData\Roaming\KDOT\PerfWatson1.exe
                              "C:\Users\Admin\AppData\Roaming\KDOT\PerfWatson1.exe"
                              10⤵
                              • Checks computer location settings
                              • Executes dropped EXE
                              • Suspicious use of AdjustPrivilegeToken
                              • Suspicious use of WriteProcessMemory
                              PID:3964
                              • C:\Windows\SYSTEM32\schtasks.exe
                                "schtasks" /create /tn "svhost" /sc ONLOGON /tr "C:\Users\Admin\AppData\Roaming\KDOT\PerfWatson1.exe" /rl HIGHEST /f
                                11⤵
                                • Scheduled Task/Job: Scheduled Task
                                PID:3032
                              • C:\Windows\system32\cmd.exe
                                C:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\4HdPInRjA4q8.bat" "
                                11⤵
                                • Suspicious use of WriteProcessMemory
                                PID:1952
                                • C:\Windows\system32\chcp.com
                                  chcp 65001
                                  12⤵
                                    PID:712
                                  • C:\Windows\system32\PING.EXE
                                    ping -n 10 localhost
                                    12⤵
                                    • System Network Configuration Discovery: Internet Connection Discovery
                                    • Runs ping.exe
                                    PID:4860
                                  • C:\Users\Admin\AppData\Roaming\KDOT\PerfWatson1.exe
                                    "C:\Users\Admin\AppData\Roaming\KDOT\PerfWatson1.exe"
                                    12⤵
                                    • Checks computer location settings
                                    • Executes dropped EXE
                                    • Suspicious use of AdjustPrivilegeToken
                                    • Suspicious use of WriteProcessMemory
                                    PID:2380
                                    • C:\Windows\SYSTEM32\schtasks.exe
                                      "schtasks" /create /tn "svhost" /sc ONLOGON /tr "C:\Users\Admin\AppData\Roaming\KDOT\PerfWatson1.exe" /rl HIGHEST /f
                                      13⤵
                                      • Scheduled Task/Job: Scheduled Task
                                      PID:4168
                                    • C:\Windows\system32\cmd.exe
                                      C:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\YRnG075vYbce.bat" "
                                      13⤵
                                      • Suspicious use of WriteProcessMemory
                                      PID:3548
                                      • C:\Windows\system32\chcp.com
                                        chcp 65001
                                        14⤵
                                          PID:3144
                                        • C:\Windows\system32\PING.EXE
                                          ping -n 10 localhost
                                          14⤵
                                          • System Network Configuration Discovery: Internet Connection Discovery
                                          • Runs ping.exe
                                          PID:2872
                                        • C:\Users\Admin\AppData\Roaming\KDOT\PerfWatson1.exe
                                          "C:\Users\Admin\AppData\Roaming\KDOT\PerfWatson1.exe"
                                          14⤵
                                          • Checks computer location settings
                                          • Executes dropped EXE
                                          • Suspicious use of AdjustPrivilegeToken
                                          PID:2780
                                          • C:\Windows\SYSTEM32\schtasks.exe
                                            "schtasks" /create /tn "svhost" /sc ONLOGON /tr "C:\Users\Admin\AppData\Roaming\KDOT\PerfWatson1.exe" /rl HIGHEST /f
                                            15⤵
                                            • Scheduled Task/Job: Scheduled Task
                                            PID:3628
                                          • C:\Windows\system32\cmd.exe
                                            C:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\zhMFpbweeddI.bat" "
                                            15⤵
                                              PID:2700
                                              • C:\Windows\system32\chcp.com
                                                chcp 65001
                                                16⤵
                                                  PID:4316
                                                • C:\Windows\system32\PING.EXE
                                                  ping -n 10 localhost
                                                  16⤵
                                                  • System Network Configuration Discovery: Internet Connection Discovery
                                                  • Runs ping.exe
                                                  PID:4912
                                                • C:\Users\Admin\AppData\Roaming\KDOT\PerfWatson1.exe
                                                  "C:\Users\Admin\AppData\Roaming\KDOT\PerfWatson1.exe"
                                                  16⤵
                                                  • Checks computer location settings
                                                  • Executes dropped EXE
                                                  • Suspicious use of AdjustPrivilegeToken
                                                  • Suspicious use of SetWindowsHookEx
                                                  PID:4432
                                                  • C:\Windows\SYSTEM32\schtasks.exe
                                                    "schtasks" /create /tn "svhost" /sc ONLOGON /tr "C:\Users\Admin\AppData\Roaming\KDOT\PerfWatson1.exe" /rl HIGHEST /f
                                                    17⤵
                                                    • Scheduled Task/Job: Scheduled Task
                                                    PID:3324
                                                  • C:\Windows\system32\cmd.exe
                                                    C:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\N4IbymHXy2Jy.bat" "
                                                    17⤵
                                                      PID:1948
                                                      • C:\Windows\system32\chcp.com
                                                        chcp 65001
                                                        18⤵
                                                          PID:4328
                                                        • C:\Windows\system32\PING.EXE
                                                          ping -n 10 localhost
                                                          18⤵
                                                          • System Network Configuration Discovery: Internet Connection Discovery
                                                          • Runs ping.exe
                                                          PID:1992
                                                        • C:\Users\Admin\AppData\Roaming\KDOT\PerfWatson1.exe
                                                          "C:\Users\Admin\AppData\Roaming\KDOT\PerfWatson1.exe"
                                                          18⤵
                                                          • Checks computer location settings
                                                          • Executes dropped EXE
                                                          • Suspicious use of AdjustPrivilegeToken
                                                          PID:2436
                                                          • C:\Windows\SYSTEM32\schtasks.exe
                                                            "schtasks" /create /tn "svhost" /sc ONLOGON /tr "C:\Users\Admin\AppData\Roaming\KDOT\PerfWatson1.exe" /rl HIGHEST /f
                                                            19⤵
                                                            • Scheduled Task/Job: Scheduled Task
                                                            PID:1868
                                                          • C:\Windows\system32\cmd.exe
                                                            C:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\YjJ5AUt21gTN.bat" "
                                                            19⤵
                                                              PID:4772
                                                              • C:\Windows\system32\chcp.com
                                                                chcp 65001
                                                                20⤵
                                                                  PID:2300
                                                                • C:\Windows\system32\PING.EXE
                                                                  ping -n 10 localhost
                                                                  20⤵
                                                                  • System Network Configuration Discovery: Internet Connection Discovery
                                                                  • Runs ping.exe
                                                                  PID:4164
                                                                • C:\Users\Admin\AppData\Roaming\KDOT\PerfWatson1.exe
                                                                  "C:\Users\Admin\AppData\Roaming\KDOT\PerfWatson1.exe"
                                                                  20⤵
                                                                  • Checks computer location settings
                                                                  • Executes dropped EXE
                                                                  • Suspicious use of AdjustPrivilegeToken
                                                                  PID:4220
                                                                  • C:\Windows\SYSTEM32\schtasks.exe
                                                                    "schtasks" /create /tn "svhost" /sc ONLOGON /tr "C:\Users\Admin\AppData\Roaming\KDOT\PerfWatson1.exe" /rl HIGHEST /f
                                                                    21⤵
                                                                    • Scheduled Task/Job: Scheduled Task
                                                                    PID:5100
                                                                  • C:\Windows\system32\cmd.exe
                                                                    C:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\wT5VYiISZPC1.bat" "
                                                                    21⤵
                                                                      PID:3992
                                                                      • C:\Windows\system32\chcp.com
                                                                        chcp 65001
                                                                        22⤵
                                                                          PID:3676
                                                                        • C:\Windows\system32\PING.EXE
                                                                          ping -n 10 localhost
                                                                          22⤵
                                                                          • System Network Configuration Discovery: Internet Connection Discovery
                                                                          • Runs ping.exe
                                                                          PID:4664
                                                                        • C:\Users\Admin\AppData\Roaming\KDOT\PerfWatson1.exe
                                                                          "C:\Users\Admin\AppData\Roaming\KDOT\PerfWatson1.exe"
                                                                          22⤵
                                                                          • Checks computer location settings
                                                                          • Executes dropped EXE
                                                                          • Suspicious use of AdjustPrivilegeToken
                                                                          PID:2944
                                                                          • C:\Windows\SYSTEM32\schtasks.exe
                                                                            "schtasks" /create /tn "svhost" /sc ONLOGON /tr "C:\Users\Admin\AppData\Roaming\KDOT\PerfWatson1.exe" /rl HIGHEST /f
                                                                            23⤵
                                                                            • Scheduled Task/Job: Scheduled Task
                                                                            PID:428
                                                                          • C:\Windows\system32\cmd.exe
                                                                            C:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\doaYVZQOFp4N.bat" "
                                                                            23⤵
                                                                              PID:1340
                                                                              • C:\Windows\system32\chcp.com
                                                                                chcp 65001
                                                                                24⤵
                                                                                  PID:1716
                                                                                • C:\Windows\system32\PING.EXE
                                                                                  ping -n 10 localhost
                                                                                  24⤵
                                                                                  • System Network Configuration Discovery: Internet Connection Discovery
                                                                                  • Runs ping.exe
                                                                                  PID:1968
                                                                                • C:\Users\Admin\AppData\Roaming\KDOT\PerfWatson1.exe
                                                                                  "C:\Users\Admin\AppData\Roaming\KDOT\PerfWatson1.exe"
                                                                                  24⤵
                                                                                  • Checks computer location settings
                                                                                  • Executes dropped EXE
                                                                                  • Suspicious use of AdjustPrivilegeToken
                                                                                  PID:4400
                                                                                  • C:\Windows\SYSTEM32\schtasks.exe
                                                                                    "schtasks" /create /tn "svhost" /sc ONLOGON /tr "C:\Users\Admin\AppData\Roaming\KDOT\PerfWatson1.exe" /rl HIGHEST /f
                                                                                    25⤵
                                                                                    • Scheduled Task/Job: Scheduled Task
                                                                                    PID:2780
                                                                                  • C:\Windows\system32\cmd.exe
                                                                                    C:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\6MWKIVJAmgH2.bat" "
                                                                                    25⤵
                                                                                      PID:5064
                                                                                      • C:\Windows\system32\chcp.com
                                                                                        chcp 65001
                                                                                        26⤵
                                                                                          PID:3912
                                                                                        • C:\Windows\system32\PING.EXE
                                                                                          ping -n 10 localhost
                                                                                          26⤵
                                                                                          • System Network Configuration Discovery: Internet Connection Discovery
                                                                                          • Runs ping.exe
                                                                                          PID:544
                                                                                        • C:\Users\Admin\AppData\Roaming\KDOT\PerfWatson1.exe
                                                                                          "C:\Users\Admin\AppData\Roaming\KDOT\PerfWatson1.exe"
                                                                                          26⤵
                                                                                          • Checks computer location settings
                                                                                          • Executes dropped EXE
                                                                                          • Suspicious use of AdjustPrivilegeToken
                                                                                          PID:4124
                                                                                          • C:\Windows\SYSTEM32\schtasks.exe
                                                                                            "schtasks" /create /tn "svhost" /sc ONLOGON /tr "C:\Users\Admin\AppData\Roaming\KDOT\PerfWatson1.exe" /rl HIGHEST /f
                                                                                            27⤵
                                                                                            • Scheduled Task/Job: Scheduled Task
                                                                                            PID:3176
                                                                                          • C:\Windows\system32\cmd.exe
                                                                                            C:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\57oQtdTf8lbC.bat" "
                                                                                            27⤵
                                                                                              PID:2956
                                                                                              • C:\Windows\system32\chcp.com
                                                                                                chcp 65001
                                                                                                28⤵
                                                                                                  PID:4496
                                                                                                • C:\Windows\system32\PING.EXE
                                                                                                  ping -n 10 localhost
                                                                                                  28⤵
                                                                                                  • System Network Configuration Discovery: Internet Connection Discovery
                                                                                                  • Runs ping.exe
                                                                                                  PID:744
                                                                                                • C:\Users\Admin\AppData\Roaming\KDOT\PerfWatson1.exe
                                                                                                  "C:\Users\Admin\AppData\Roaming\KDOT\PerfWatson1.exe"
                                                                                                  28⤵
                                                                                                  • Checks computer location settings
                                                                                                  • Executes dropped EXE
                                                                                                  • Suspicious use of AdjustPrivilegeToken
                                                                                                  PID:3756
                                                                                                  • C:\Windows\SYSTEM32\schtasks.exe
                                                                                                    "schtasks" /create /tn "svhost" /sc ONLOGON /tr "C:\Users\Admin\AppData\Roaming\KDOT\PerfWatson1.exe" /rl HIGHEST /f
                                                                                                    29⤵
                                                                                                    • Scheduled Task/Job: Scheduled Task
                                                                                                    PID:3200
                                                                                                  • C:\Windows\system32\cmd.exe
                                                                                                    C:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\nr1RkZM4J0SI.bat" "
                                                                                                    29⤵
                                                                                                      PID:3576
                                                                                                      • C:\Windows\system32\chcp.com
                                                                                                        chcp 65001
                                                                                                        30⤵
                                                                                                          PID:4816
                                                                                                        • C:\Windows\system32\PING.EXE
                                                                                                          ping -n 10 localhost
                                                                                                          30⤵
                                                                                                          • System Network Configuration Discovery: Internet Connection Discovery
                                                                                                          • Runs ping.exe
                                                                                                          PID:3128
                                                                                                        • C:\Users\Admin\AppData\Roaming\KDOT\PerfWatson1.exe
                                                                                                          "C:\Users\Admin\AppData\Roaming\KDOT\PerfWatson1.exe"
                                                                                                          30⤵
                                                                                                          • Checks computer location settings
                                                                                                          • Executes dropped EXE
                                                                                                          • Suspicious use of AdjustPrivilegeToken
                                                                                                          PID:4028
                                                                                                          • C:\Windows\SYSTEM32\schtasks.exe
                                                                                                            "schtasks" /create /tn "svhost" /sc ONLOGON /tr "C:\Users\Admin\AppData\Roaming\KDOT\PerfWatson1.exe" /rl HIGHEST /f
                                                                                                            31⤵
                                                                                                            • Scheduled Task/Job: Scheduled Task
                                                                                                            PID:404
                                                                                                          • C:\Windows\system32\cmd.exe
                                                                                                            C:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\7AcMItwR6lbr.bat" "
                                                                                                            31⤵
                                                                                                              PID:4176
                                                                                                              • C:\Windows\system32\chcp.com
                                                                                                                chcp 65001
                                                                                                                32⤵
                                                                                                                  PID:1660
                                                                                                                • C:\Windows\system32\PING.EXE
                                                                                                                  ping -n 10 localhost
                                                                                                                  32⤵
                                                                                                                  • System Network Configuration Discovery: Internet Connection Discovery
                                                                                                                  • Runs ping.exe
                                                                                                                  PID:4740

                                                  Network

                                                  MITRE ATT&CK Enterprise v15

                                                  Replay Monitor

                                                  Loading Replay Monitor...

                                                  Downloads

                                                  • C:\Users\Admin\AppData\Local\Microsoft\CLR_v4.0\UsageLogs\PerfWatson1.exe.log

                                                    Filesize

                                                    2KB

                                                    MD5

                                                    8f0271a63446aef01cf2bfc7b7c7976b

                                                    SHA1

                                                    b70dad968e1dda14b55ad361b7fd4ef9ab6c06d7

                                                    SHA256

                                                    da740d78ae00b72cb3710d1a1256dc6431550965d20afaa65e5d5860a4748e8c

                                                    SHA512

                                                    78a403c69f1284b7dd41527019f3eede3512a5e4d439d846eca83557b741ca37bcf56c412f3e577b9dd4cfa5a6d6210961215f14cb271b143f6eb94f69389cf5

                                                  • C:\Users\Admin\AppData\Local\Temp\4HdPInRjA4q8.bat

                                                    Filesize

                                                    210B

                                                    MD5

                                                    d8065f4aa5d99d934d99586ff071f510

                                                    SHA1

                                                    90ff5e4729b22280ff64c668a54077dbaad802ea

                                                    SHA256

                                                    a9002ff52c3143b5939fa9ec57491dfc0eb21a5be3b359fff607957fcf50267d

                                                    SHA512

                                                    26bdb9493891bbcecaaf874fcca15ebed3012dd87cea2b7ffd9c5a0f3fd52b803ce04dc15c2bbde0b8636220bde09b042a0e8b966738bc375eb65cb8d59a18fb

                                                  • C:\Users\Admin\AppData\Local\Temp\57oQtdTf8lbC.bat

                                                    Filesize

                                                    210B

                                                    MD5

                                                    98d40a926b399b2a436dceceaed9fb05

                                                    SHA1

                                                    560cd1fbe98f120a22c5df7121f103059dcc9633

                                                    SHA256

                                                    8450f31fc79040bc1b1193112fbc4fe74198aea7ed941f9c452bfa3fe4462665

                                                    SHA512

                                                    1d51e080471a0e71a7b034b0f3d489a59675aef93160ac7178640b2afd1ba5679198282d27505f202419ecb74647601315db22771cddd3a66e9248508fea9583

                                                  • C:\Users\Admin\AppData\Local\Temp\6MWKIVJAmgH2.bat

                                                    Filesize

                                                    210B

                                                    MD5

                                                    e958ca722a1a379450dcbef5321967dd

                                                    SHA1

                                                    4de6cb388e3bc2f7040c9234a112ccec008fbbbb

                                                    SHA256

                                                    43efc6c737fb99928c40204f530eee55dacc8625126015c52f6f9f39a8fb6534

                                                    SHA512

                                                    20a4c09d06c5bdfa9c4a064983ffc2953afc599df3eb61217e1949ddd798217073245e7a29e267c81b0e0141329272599067d652058edb1288e71274b010f82a

                                                  • C:\Users\Admin\AppData\Local\Temp\7AcMItwR6lbr.bat

                                                    Filesize

                                                    210B

                                                    MD5

                                                    aa23ebf68438bfb0b4ed5ca0a7b61326

                                                    SHA1

                                                    c551a2b5604c060950e7e2cc1f71e52f2abdbc8c

                                                    SHA256

                                                    f4f8a390538c91a8bc06d979d7e70667ba5a1d0a39d2cbaf89263f530d17db5a

                                                    SHA512

                                                    443a55cd50e50e43f13d703bbe1881a734b4a2da2673ece030788aaa0e278d953afb5f39163db7804902d0db2cb982e9626d23ae364ef159d47911f35d48208d

                                                  • C:\Users\Admin\AppData\Local\Temp\CHy4J0BpgYtX.bat

                                                    Filesize

                                                    210B

                                                    MD5

                                                    39063e0017ade18d77e77b9d6942cdda

                                                    SHA1

                                                    8f22f203ff03363c2660f00ad6fd6daf974e51d2

                                                    SHA256

                                                    1d1ce46da1f0e86d763acfff16ca35116e8853701cdb389c86ce8cab196d751f

                                                    SHA512

                                                    c5576e41e58176069b97008ddd7bef03ee8b42c2ba824896f3e7528e5e4db95026e84ecce3fae40b812f999f7c1a7178fe3a0273332fe68aba99eaac9a570036

                                                  • C:\Users\Admin\AppData\Local\Temp\N4IbymHXy2Jy.bat

                                                    Filesize

                                                    210B

                                                    MD5

                                                    3f2bd24735a1ea1dc53fdbe9809b1a5e

                                                    SHA1

                                                    55f31c3310b5341369d6971b5f226b050dd95a68

                                                    SHA256

                                                    10990f50841c342f15ab95983a40aac7a4ae477dda6e6b1cc88bd8a5b4f1508a

                                                    SHA512

                                                    834c5c2969c3fd7e5556022bf36a5aa4b28a2ab4c32f1114371390c9348cfe72d3fc5188922f6f3b343e10b7be69b013e53223059fe94ca2331cb0185b03d076

                                                  • C:\Users\Admin\AppData\Local\Temp\YRnG075vYbce.bat

                                                    Filesize

                                                    210B

                                                    MD5

                                                    37aa913dff93b9565628c0a8d1be25ef

                                                    SHA1

                                                    f2cf9e1e029f6d5bce5be1643717aec33082fb8e

                                                    SHA256

                                                    ddf6b52d895a7a1ac678aaf2b39ab4a169f46f9f4eaf57c8b1983d49584ec319

                                                    SHA512

                                                    0c9d0f8b9b02341e21afdc5c229981dbb94af6555a9c7283af4e17a75c6ca35515f7096126045dda4e77d1e70f8d7dc4b4174e683bdca502b3ff431cb0e5c2a8

                                                  • C:\Users\Admin\AppData\Local\Temp\YjJ5AUt21gTN.bat

                                                    Filesize

                                                    210B

                                                    MD5

                                                    1a2e748aefaed5521cc0a439adb5f70f

                                                    SHA1

                                                    05c7027dc36369e56d98ea8d1c676a4be89e59bd

                                                    SHA256

                                                    7fca7cde3e05a317ee205b402bbe672022b646a2a97e22b7337a94a7713cc896

                                                    SHA512

                                                    84b46e6701956f4ad32d1ecaca8e4747c32ea89f3d60379644ebe912efb3e6f67bdc44acee510aca5a5510d2590da3aa3112c9bc0541c94b4ffbae6a01937989

                                                  • C:\Users\Admin\AppData\Local\Temp\doaYVZQOFp4N.bat

                                                    Filesize

                                                    210B

                                                    MD5

                                                    082e390c012f44fcef97913ace90884d

                                                    SHA1

                                                    4b5aa8965688b730f5add5aaee69b17f8ac79dba

                                                    SHA256

                                                    34dca82bf200b34ccb933f04a5f78efcf22b0e9698aa30792dae59a6cb830855

                                                    SHA512

                                                    ed1c967add2e4a7962952c9c081e1b82ed6292e07b83a3c2af3d41b2d3532d0cb6b0401f4ce7376bdd11ba4d1b5196f98ad542b676d71399307ce9e9aad3bbdd

                                                  • C:\Users\Admin\AppData\Local\Temp\jVkDcy694Xpr.bat

                                                    Filesize

                                                    210B

                                                    MD5

                                                    5834bc2482b778e34b83c29dac81fd7f

                                                    SHA1

                                                    68f31de4fe943db5bad0482e731264403839cccb

                                                    SHA256

                                                    3f1e41c3c1b7fd4d0de5c37abc822fe7a66dbee9ab0fb22a231cf4c973eeda0f

                                                    SHA512

                                                    eb5089de00ab4bef274acef232985089693e5760c42744a8c2e5e3d80f38402e9436822fa9477c8d55b4503512845670820c4de6787d79ded8c73a2d45955373

                                                  • C:\Users\Admin\AppData\Local\Temp\nr1RkZM4J0SI.bat

                                                    Filesize

                                                    210B

                                                    MD5

                                                    8fff4940d5f4be4a1fd3455252e8e47c

                                                    SHA1

                                                    51372abd4f77b38ad57f1746ad6375a52b7dd6dc

                                                    SHA256

                                                    9109653b6f2fe5e404d63befb8c14c001192e9c4a880267f91edbe3f4a64dcdb

                                                    SHA512

                                                    355657ae518e75c99d316a1d26b7d5d9f8e48e8fcb20ac1b37222ffdbc0046204d6ea388178225053f104cb0c974c544f0a93060164f92a25cb88a7c1cf70d46

                                                  • C:\Users\Admin\AppData\Local\Temp\sji2Z18gAb6S.bat

                                                    Filesize

                                                    210B

                                                    MD5

                                                    4d3a6412a00371c682b3731fdbe06d3c

                                                    SHA1

                                                    5b0d1e62b61d6a9c3be3907ff840e0fb091c0785

                                                    SHA256

                                                    88511e4c119d9cd0157078b0c86607cf92105b0ca92048433dd6bc24708702b7

                                                    SHA512

                                                    ddaa7e2033eeda4cdb93aa2836ad21cc2340eafc1f3df6794b9278850b07076a81490d08fc1effb3f0a598b8b23a2175624b2dcc99ea228b0f99ef73c6f5843d

                                                  • C:\Users\Admin\AppData\Local\Temp\wT5VYiISZPC1.bat

                                                    Filesize

                                                    210B

                                                    MD5

                                                    45c91ece7fc155dce7eb76a9910ceb81

                                                    SHA1

                                                    4fd34cf4f8e8e898e0005c135c8c2910b12397fa

                                                    SHA256

                                                    1876304d0a7230eb38605abd878503b29c79341a62ba77e948e7dce174e2ed1b

                                                    SHA512

                                                    76c0c4b3d9aa8e7ce680a5d94087313e1d787ee676ff8b0e8540162ce4c494cf453e9436fc237d8a3dd2a4bcfa555a703d3573eef6f528f2ccc532b29242cc3b

                                                  • C:\Users\Admin\AppData\Local\Temp\xMvo6BHCslVL.bat

                                                    Filesize

                                                    210B

                                                    MD5

                                                    1b327ba183885821d42c854c9fc02612

                                                    SHA1

                                                    507aa610ccd1489f01c61f1850db7aa58fc8ba3c

                                                    SHA256

                                                    75745c2d5921b201a6f9901fb184e2fcc08f5d1b438b9970c7469f5d8b596ccb

                                                    SHA512

                                                    305d0043f4b42be93a803c2fe1b767cbf470104d5bfc713fe2edbd850015135e2dadcc30fc28d90af1aaec83566741e8d6d091215915c22ae7a9c6d7743493fd

                                                  • C:\Users\Admin\AppData\Local\Temp\zhMFpbweeddI.bat

                                                    Filesize

                                                    210B

                                                    MD5

                                                    6867af5980233021b6ac08b3406c694f

                                                    SHA1

                                                    ee658b7a50d66e296b9646915a68fc4b19915778

                                                    SHA256

                                                    aaf2888b3cb7e37ffa4051e4061615d165c1bc67f37ceaaea3b17ea86d4dedc4

                                                    SHA512

                                                    de63cefcbf842a30ecd8f9cb874d917af108bf596cc055cdcc8f7c38d32ddebf338205264866f89b3142c579f8133548fd6de064432661cde36c3d63f795c575

                                                  • C:\Users\Admin\AppData\Roaming\KDOT\PerfWatson1.exe

                                                    Filesize

                                                    3.1MB

                                                    MD5

                                                    c2281b1740f2acd02e9e19f83441b033

                                                    SHA1

                                                    bf321d96b83261e5487f06c9c0ddfc75786c7c8c

                                                    SHA256

                                                    8fb680e847ab1c533fc3f092164064a5c298126ba16db0ab7df84cbaf6ffa997

                                                    SHA512

                                                    0c8a95e5caa07047073077a252a891e321cf1a8c964e6e99b72a1c701e6368e63aa82c0425f58364887de3c277130c3c1acda2064332c377efaccf6ce568e027

                                                  • memory/4528-8-0x00007FFE1F5D0000-0x00007FFE1F7C5000-memory.dmp

                                                    Filesize

                                                    2.0MB

                                                  • memory/4528-1-0x00000000002C0000-0x00000000005E4000-memory.dmp

                                                    Filesize

                                                    3.1MB

                                                  • memory/4528-0-0x00007FFE1F5D0000-0x00007FFE1F7C5000-memory.dmp

                                                    Filesize

                                                    2.0MB

                                                  • memory/4528-2-0x00007FFE1F5D0000-0x00007FFE1F7C5000-memory.dmp

                                                    Filesize

                                                    2.0MB

                                                  • memory/4840-12-0x000000001C540000-0x000000001C5F2000-memory.dmp

                                                    Filesize

                                                    712KB

                                                  • memory/4840-9-0x00007FFE1F5D0000-0x00007FFE1F7C5000-memory.dmp

                                                    Filesize

                                                    2.0MB

                                                  • memory/4840-10-0x00007FFE1F5D0000-0x00007FFE1F7C5000-memory.dmp

                                                    Filesize

                                                    2.0MB

                                                  • memory/4840-11-0x000000001BBB0000-0x000000001BC00000-memory.dmp

                                                    Filesize

                                                    320KB

                                                  • memory/4840-17-0x00007FFE1F5D0000-0x00007FFE1F7C5000-memory.dmp

                                                    Filesize

                                                    2.0MB