Analysis

  • max time kernel
    156s
  • max time network
    154s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20241007-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system
  • submitted
    29/12/2024, 12:55

General

  • Target

    https://gofile.io/d/0H3xvK

Malware Config

Extracted

Family

quasar

Version

1.4.1

Botnet

Office04

C2

himato667-58401.portmap.host:58401

Mutex

0e2bc079-3316-407c-a26f-115195d9fe5b

Attributes
  • encryption_key

    D14CC6B8490A41A48C1E115285B6932B9A857EA0

  • install_name

    Client.exe

  • log_directory

    Logs

  • reconnect_delay

    3000

  • startup_key

    Quasar Client Startup

  • subdirectory

    SubDir

Signatures

  • Quasar RAT

    Quasar is an open source Remote Access Tool.

  • Quasar family
  • Quasar payload 2 IoCs
  • Downloads MZ/PE file
  • Checks computer location settings 2 TTPs 12 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Executes dropped EXE 13 IoCs
  • Drops file in System32 directory 3 IoCs
  • Browser Information Discovery 1 TTPs

    Enumerate browser information.

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Network Configuration Discovery: Internet Connection Discovery 1 TTPs 12 IoCs

    Adversaries may check for Internet connectivity on compromised systems.

  • Checks SCSI registry key(s) 3 TTPs 3 IoCs

    SCSI information is often read in order to detect sandboxing environments.

  • Enumerates system info in registry 2 TTPs 3 IoCs
  • NTFS ADS 1 IoCs
  • Runs ping.exe 1 TTPs 12 IoCs
  • Scheduled Task/Job: Scheduled Task 1 TTPs 13 IoCs

    Schtasks is often used by malware for persistence or to perform post-infection execution.

  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs
  • Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 10 IoCs
  • Suspicious use of AdjustPrivilegeToken 16 IoCs
  • Suspicious use of FindShellTrayWindow 64 IoCs
  • Suspicious use of SendNotifyMessage 64 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs
  • Uses Task Scheduler COM API 1 TTPs

    The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.

Processes

  • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
    "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --start-maximized --single-argument https://gofile.io/d/0H3xvK
    1⤵
    • Enumerates system info in registry
    • NTFS ADS
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SendNotifyMessage
    • Suspicious use of WriteProcessMemory
    PID:2608
    • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
      "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffc02b446f8,0x7ffc02b44708,0x7ffc02b44718
      2⤵
        PID:3420
      • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
        "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2088,2137661838968362705,6210748301682622215,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2112 /prefetch:2
        2⤵
          PID:2168
        • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
          "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2088,2137661838968362705,6210748301682622215,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2164 /prefetch:3
          2⤵
          • Suspicious behavior: EnumeratesProcesses
          PID:2844
        • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
          "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2088,2137661838968362705,6210748301682622215,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2908 /prefetch:8
          2⤵
            PID:1036
          • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
            "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2088,2137661838968362705,6210748301682622215,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3312 /prefetch:1
            2⤵
              PID:2876
            • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
              "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2088,2137661838968362705,6210748301682622215,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3324 /prefetch:1
              2⤵
                PID:2008
              • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2088,2137661838968362705,6210748301682622215,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4704 /prefetch:1
                2⤵
                  PID:1188
                • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                  "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2088,2137661838968362705,6210748301682622215,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3948 /prefetch:1
                  2⤵
                    PID:3748
                  • C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe
                    "C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2088,2137661838968362705,6210748301682622215,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=3188 /prefetch:8
                    2⤵
                      PID:2060
                    • C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe
                      "C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2088,2137661838968362705,6210748301682622215,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=3188 /prefetch:8
                      2⤵
                      • Suspicious behavior: EnumeratesProcesses
                      PID:1516
                    • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                      "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2088,2137661838968362705,6210748301682622215,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5456 /prefetch:1
                      2⤵
                        PID:3052
                      • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                        "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2088,2137661838968362705,6210748301682622215,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5484 /prefetch:1
                        2⤵
                          PID:2660
                        • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                          "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2088,2137661838968362705,6210748301682622215,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5848 /prefetch:1
                          2⤵
                            PID:2812
                          • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                            "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2088,2137661838968362705,6210748301682622215,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=13 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5928 /prefetch:1
                            2⤵
                              PID:2760
                            • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                              "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2088,2137661838968362705,6210748301682622215,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=14 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5808 /prefetch:1
                              2⤵
                                PID:4128
                              • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=edge_collections.mojom.CollectionsDataManager --field-trial-handle=2088,2137661838968362705,6210748301682622215,131072 --lang=en-US --service-sandbox-type=collections --mojo-platform-channel-handle=5688 /prefetch:8
                                2⤵
                                  PID:8
                                • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                  "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2088,2137661838968362705,6210748301682622215,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=17 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5856 /prefetch:1
                                  2⤵
                                    PID:4916
                                  • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                    "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=chrome.mojom.UtilReadIcon --field-trial-handle=2088,2137661838968362705,6210748301682622215,131072 --lang=en-US --service-sandbox-type=icon_reader --mojo-platform-channel-handle=6452 /prefetch:8
                                    2⤵
                                      PID:3708
                                    • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                      "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=quarantine.mojom.Quarantine --field-trial-handle=2088,2137661838968362705,6210748301682622215,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=6452 /prefetch:8
                                      2⤵
                                      • Suspicious behavior: EnumeratesProcesses
                                      PID:2708
                                    • C:\Users\Admin\Downloads\better.exe
                                      "C:\Users\Admin\Downloads\better.exe"
                                      2⤵
                                      • Executes dropped EXE
                                      • Drops file in System32 directory
                                      • Suspicious use of AdjustPrivilegeToken
                                      PID:3040
                                      • C:\Windows\SYSTEM32\schtasks.exe
                                        "schtasks" /create /tn "Quasar Client Startup" /sc ONLOGON /tr "C:\Windows\system32\SubDir\Client.exe" /rl HIGHEST /f
                                        3⤵
                                        • Scheduled Task/Job: Scheduled Task
                                        PID:2864
                                      • C:\Windows\system32\SubDir\Client.exe
                                        "C:\Windows\system32\SubDir\Client.exe"
                                        3⤵
                                        • Checks computer location settings
                                        • Executes dropped EXE
                                        • Suspicious use of AdjustPrivilegeToken
                                        • Suspicious use of FindShellTrayWindow
                                        • Suspicious use of SendNotifyMessage
                                        PID:4068
                                        • C:\Windows\SYSTEM32\schtasks.exe
                                          "schtasks" /create /tn "Quasar Client Startup" /sc ONLOGON /tr "C:\Windows\system32\SubDir\Client.exe" /rl HIGHEST /f
                                          4⤵
                                          • Scheduled Task/Job: Scheduled Task
                                          PID:1388
                                        • C:\Windows\system32\cmd.exe
                                          C:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\8gaDjnEV1qGc.bat" "
                                          4⤵
                                            PID:1220
                                            • C:\Windows\system32\chcp.com
                                              chcp 65001
                                              5⤵
                                                PID:1440
                                              • C:\Windows\system32\PING.EXE
                                                ping -n 10 localhost
                                                5⤵
                                                • System Network Configuration Discovery: Internet Connection Discovery
                                                • Runs ping.exe
                                                PID:4240
                                              • C:\Windows\system32\SubDir\Client.exe
                                                "C:\Windows\system32\SubDir\Client.exe"
                                                5⤵
                                                • Checks computer location settings
                                                • Executes dropped EXE
                                                • Suspicious use of AdjustPrivilegeToken
                                                • Suspicious use of FindShellTrayWindow
                                                • Suspicious use of SendNotifyMessage
                                                PID:868
                                                • C:\Windows\SYSTEM32\schtasks.exe
                                                  "schtasks" /create /tn "Quasar Client Startup" /sc ONLOGON /tr "C:\Windows\system32\SubDir\Client.exe" /rl HIGHEST /f
                                                  6⤵
                                                  • Scheduled Task/Job: Scheduled Task
                                                  PID:32
                                                • C:\Windows\system32\cmd.exe
                                                  C:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\fbCtDFCzUnfb.bat" "
                                                  6⤵
                                                    PID:3176
                                                    • C:\Windows\system32\chcp.com
                                                      chcp 65001
                                                      7⤵
                                                        PID:3200
                                                      • C:\Windows\system32\PING.EXE
                                                        ping -n 10 localhost
                                                        7⤵
                                                        • System Network Configuration Discovery: Internet Connection Discovery
                                                        • Runs ping.exe
                                                        PID:4756
                                                      • C:\Windows\system32\SubDir\Client.exe
                                                        "C:\Windows\system32\SubDir\Client.exe"
                                                        7⤵
                                                        • Checks computer location settings
                                                        • Executes dropped EXE
                                                        • Suspicious use of AdjustPrivilegeToken
                                                        • Suspicious use of FindShellTrayWindow
                                                        • Suspicious use of SendNotifyMessage
                                                        PID:2704
                                                        • C:\Windows\SYSTEM32\schtasks.exe
                                                          "schtasks" /create /tn "Quasar Client Startup" /sc ONLOGON /tr "C:\Windows\system32\SubDir\Client.exe" /rl HIGHEST /f
                                                          8⤵
                                                          • Scheduled Task/Job: Scheduled Task
                                                          PID:2400
                                                        • C:\Windows\system32\cmd.exe
                                                          C:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\3tUvYKKQVVOo.bat" "
                                                          8⤵
                                                            PID:2148
                                                            • C:\Windows\system32\chcp.com
                                                              chcp 65001
                                                              9⤵
                                                                PID:3040
                                                              • C:\Windows\system32\PING.EXE
                                                                ping -n 10 localhost
                                                                9⤵
                                                                • System Network Configuration Discovery: Internet Connection Discovery
                                                                • Runs ping.exe
                                                                PID:1292
                                                              • C:\Windows\system32\SubDir\Client.exe
                                                                "C:\Windows\system32\SubDir\Client.exe"
                                                                9⤵
                                                                • Checks computer location settings
                                                                • Executes dropped EXE
                                                                • Suspicious use of AdjustPrivilegeToken
                                                                • Suspicious use of FindShellTrayWindow
                                                                • Suspicious use of SendNotifyMessage
                                                                PID:2428
                                                                • C:\Windows\SYSTEM32\schtasks.exe
                                                                  "schtasks" /create /tn "Quasar Client Startup" /sc ONLOGON /tr "C:\Windows\system32\SubDir\Client.exe" /rl HIGHEST /f
                                                                  10⤵
                                                                  • Scheduled Task/Job: Scheduled Task
                                                                  PID:4888
                                                                • C:\Windows\system32\cmd.exe
                                                                  C:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\5Xh1R9CXmcRl.bat" "
                                                                  10⤵
                                                                    PID:4784
                                                                    • C:\Windows\system32\chcp.com
                                                                      chcp 65001
                                                                      11⤵
                                                                        PID:2976
                                                                      • C:\Windows\system32\PING.EXE
                                                                        ping -n 10 localhost
                                                                        11⤵
                                                                        • System Network Configuration Discovery: Internet Connection Discovery
                                                                        • Runs ping.exe
                                                                        PID:3312
                                                                      • C:\Windows\system32\SubDir\Client.exe
                                                                        "C:\Windows\system32\SubDir\Client.exe"
                                                                        11⤵
                                                                        • Checks computer location settings
                                                                        • Executes dropped EXE
                                                                        • Suspicious use of AdjustPrivilegeToken
                                                                        • Suspicious use of FindShellTrayWindow
                                                                        • Suspicious use of SendNotifyMessage
                                                                        PID:4020
                                                                        • C:\Windows\SYSTEM32\schtasks.exe
                                                                          "schtasks" /create /tn "Quasar Client Startup" /sc ONLOGON /tr "C:\Windows\system32\SubDir\Client.exe" /rl HIGHEST /f
                                                                          12⤵
                                                                          • Scheduled Task/Job: Scheduled Task
                                                                          PID:2556
                                                                        • C:\Windows\system32\cmd.exe
                                                                          C:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\eZTQRKQoMUAy.bat" "
                                                                          12⤵
                                                                            PID:3576
                                                                            • C:\Windows\system32\chcp.com
                                                                              chcp 65001
                                                                              13⤵
                                                                                PID:4068
                                                                              • C:\Windows\system32\PING.EXE
                                                                                ping -n 10 localhost
                                                                                13⤵
                                                                                • System Network Configuration Discovery: Internet Connection Discovery
                                                                                • Runs ping.exe
                                                                                PID:1360
                                                                              • C:\Windows\system32\SubDir\Client.exe
                                                                                "C:\Windows\system32\SubDir\Client.exe"
                                                                                13⤵
                                                                                • Checks computer location settings
                                                                                • Executes dropped EXE
                                                                                • Suspicious use of AdjustPrivilegeToken
                                                                                • Suspicious use of FindShellTrayWindow
                                                                                • Suspicious use of SendNotifyMessage
                                                                                PID:2308
                                                                                • C:\Windows\SYSTEM32\schtasks.exe
                                                                                  "schtasks" /create /tn "Quasar Client Startup" /sc ONLOGON /tr "C:\Windows\system32\SubDir\Client.exe" /rl HIGHEST /f
                                                                                  14⤵
                                                                                  • Scheduled Task/Job: Scheduled Task
                                                                                  PID:3748
                                                                                • C:\Windows\system32\cmd.exe
                                                                                  C:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\5509u1oMZs5R.bat" "
                                                                                  14⤵
                                                                                    PID:1508
                                                                                    • C:\Windows\system32\chcp.com
                                                                                      chcp 65001
                                                                                      15⤵
                                                                                        PID:1396
                                                                                      • C:\Windows\system32\PING.EXE
                                                                                        ping -n 10 localhost
                                                                                        15⤵
                                                                                        • System Network Configuration Discovery: Internet Connection Discovery
                                                                                        • Runs ping.exe
                                                                                        PID:3056
                                                                                      • C:\Windows\system32\SubDir\Client.exe
                                                                                        "C:\Windows\system32\SubDir\Client.exe"
                                                                                        15⤵
                                                                                        • Checks computer location settings
                                                                                        • Executes dropped EXE
                                                                                        • Suspicious use of AdjustPrivilegeToken
                                                                                        • Suspicious use of FindShellTrayWindow
                                                                                        • Suspicious use of SendNotifyMessage
                                                                                        PID:940
                                                                                        • C:\Windows\SYSTEM32\schtasks.exe
                                                                                          "schtasks" /create /tn "Quasar Client Startup" /sc ONLOGON /tr "C:\Windows\system32\SubDir\Client.exe" /rl HIGHEST /f
                                                                                          16⤵
                                                                                          • Scheduled Task/Job: Scheduled Task
                                                                                          PID:4304
                                                                                        • C:\Windows\system32\cmd.exe
                                                                                          C:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\B1gzOHdDTAUh.bat" "
                                                                                          16⤵
                                                                                            PID:2192
                                                                                            • C:\Windows\system32\chcp.com
                                                                                              chcp 65001
                                                                                              17⤵
                                                                                                PID:452
                                                                                              • C:\Windows\system32\PING.EXE
                                                                                                ping -n 10 localhost
                                                                                                17⤵
                                                                                                • System Network Configuration Discovery: Internet Connection Discovery
                                                                                                • Runs ping.exe
                                                                                                PID:3872
                                                                                              • C:\Windows\system32\SubDir\Client.exe
                                                                                                "C:\Windows\system32\SubDir\Client.exe"
                                                                                                17⤵
                                                                                                • Checks computer location settings
                                                                                                • Executes dropped EXE
                                                                                                • Suspicious use of AdjustPrivilegeToken
                                                                                                • Suspicious use of FindShellTrayWindow
                                                                                                • Suspicious use of SendNotifyMessage
                                                                                                PID:4120
                                                                                                • C:\Windows\SYSTEM32\schtasks.exe
                                                                                                  "schtasks" /create /tn "Quasar Client Startup" /sc ONLOGON /tr "C:\Windows\system32\SubDir\Client.exe" /rl HIGHEST /f
                                                                                                  18⤵
                                                                                                  • Scheduled Task/Job: Scheduled Task
                                                                                                  PID:4024
                                                                                                • C:\Windows\system32\cmd.exe
                                                                                                  C:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\oJKjd3d2Byhw.bat" "
                                                                                                  18⤵
                                                                                                    PID:4204
                                                                                                    • C:\Windows\system32\chcp.com
                                                                                                      chcp 65001
                                                                                                      19⤵
                                                                                                        PID:4668
                                                                                                      • C:\Windows\system32\PING.EXE
                                                                                                        ping -n 10 localhost
                                                                                                        19⤵
                                                                                                        • System Network Configuration Discovery: Internet Connection Discovery
                                                                                                        • Runs ping.exe
                                                                                                        PID:1288
                                                                                                      • C:\Windows\system32\SubDir\Client.exe
                                                                                                        "C:\Windows\system32\SubDir\Client.exe"
                                                                                                        19⤵
                                                                                                        • Checks computer location settings
                                                                                                        • Executes dropped EXE
                                                                                                        • Suspicious use of AdjustPrivilegeToken
                                                                                                        • Suspicious use of FindShellTrayWindow
                                                                                                        • Suspicious use of SendNotifyMessage
                                                                                                        PID:3084
                                                                                                        • C:\Windows\SYSTEM32\schtasks.exe
                                                                                                          "schtasks" /create /tn "Quasar Client Startup" /sc ONLOGON /tr "C:\Windows\system32\SubDir\Client.exe" /rl HIGHEST /f
                                                                                                          20⤵
                                                                                                          • Scheduled Task/Job: Scheduled Task
                                                                                                          PID:1488
                                                                                                        • C:\Windows\system32\cmd.exe
                                                                                                          C:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\IkVA86CQf0UO.bat" "
                                                                                                          20⤵
                                                                                                            PID:2576
                                                                                                            • C:\Windows\system32\chcp.com
                                                                                                              chcp 65001
                                                                                                              21⤵
                                                                                                                PID:1472
                                                                                                              • C:\Windows\system32\PING.EXE
                                                                                                                ping -n 10 localhost
                                                                                                                21⤵
                                                                                                                • System Network Configuration Discovery: Internet Connection Discovery
                                                                                                                • Runs ping.exe
                                                                                                                PID:884
                                                                                                              • C:\Windows\system32\SubDir\Client.exe
                                                                                                                "C:\Windows\system32\SubDir\Client.exe"
                                                                                                                21⤵
                                                                                                                • Checks computer location settings
                                                                                                                • Executes dropped EXE
                                                                                                                • Suspicious use of AdjustPrivilegeToken
                                                                                                                • Suspicious use of SendNotifyMessage
                                                                                                                PID:3052
                                                                                                                • C:\Windows\SYSTEM32\schtasks.exe
                                                                                                                  "schtasks" /create /tn "Quasar Client Startup" /sc ONLOGON /tr "C:\Windows\system32\SubDir\Client.exe" /rl HIGHEST /f
                                                                                                                  22⤵
                                                                                                                  • Scheduled Task/Job: Scheduled Task
                                                                                                                  PID:3708
                                                                                                                • C:\Windows\system32\cmd.exe
                                                                                                                  C:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\vtWvMKGpYewW.bat" "
                                                                                                                  22⤵
                                                                                                                    PID:1720
                                                                                                                    • C:\Windows\system32\chcp.com
                                                                                                                      chcp 65001
                                                                                                                      23⤵
                                                                                                                        PID:4812
                                                                                                                      • C:\Windows\system32\PING.EXE
                                                                                                                        ping -n 10 localhost
                                                                                                                        23⤵
                                                                                                                        • System Network Configuration Discovery: Internet Connection Discovery
                                                                                                                        • Runs ping.exe
                                                                                                                        PID:3748
                                                                                                                      • C:\Windows\system32\SubDir\Client.exe
                                                                                                                        "C:\Windows\system32\SubDir\Client.exe"
                                                                                                                        23⤵
                                                                                                                        • Checks computer location settings
                                                                                                                        • Executes dropped EXE
                                                                                                                        • Suspicious use of AdjustPrivilegeToken
                                                                                                                        PID:2516
                                                                                                                        • C:\Windows\SYSTEM32\schtasks.exe
                                                                                                                          "schtasks" /create /tn "Quasar Client Startup" /sc ONLOGON /tr "C:\Windows\system32\SubDir\Client.exe" /rl HIGHEST /f
                                                                                                                          24⤵
                                                                                                                          • Scheduled Task/Job: Scheduled Task
                                                                                                                          PID:5004
                                                                                                                        • C:\Windows\system32\cmd.exe
                                                                                                                          C:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\GC4xUfdmYvDq.bat" "
                                                                                                                          24⤵
                                                                                                                            PID:2852
                                                                                                                            • C:\Windows\system32\chcp.com
                                                                                                                              chcp 65001
                                                                                                                              25⤵
                                                                                                                                PID:3292
                                                                                                                              • C:\Windows\system32\PING.EXE
                                                                                                                                ping -n 10 localhost
                                                                                                                                25⤵
                                                                                                                                • System Network Configuration Discovery: Internet Connection Discovery
                                                                                                                                • Runs ping.exe
                                                                                                                                PID:1052
                                                                                                                              • C:\Windows\system32\SubDir\Client.exe
                                                                                                                                "C:\Windows\system32\SubDir\Client.exe"
                                                                                                                                25⤵
                                                                                                                                • Checks computer location settings
                                                                                                                                • Executes dropped EXE
                                                                                                                                • Suspicious use of AdjustPrivilegeToken
                                                                                                                                PID:1808
                                                                                                                                • C:\Windows\SYSTEM32\schtasks.exe
                                                                                                                                  "schtasks" /create /tn "Quasar Client Startup" /sc ONLOGON /tr "C:\Windows\system32\SubDir\Client.exe" /rl HIGHEST /f
                                                                                                                                  26⤵
                                                                                                                                  • Scheduled Task/Job: Scheduled Task
                                                                                                                                  PID:4812
                                                                                                                                • C:\Windows\system32\cmd.exe
                                                                                                                                  C:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\5b3MkrVD3x2i.bat" "
                                                                                                                                  26⤵
                                                                                                                                    PID:744
                                                                                                                                    • C:\Windows\system32\chcp.com
                                                                                                                                      chcp 65001
                                                                                                                                      27⤵
                                                                                                                                        PID:3692
                                                                                                                                      • C:\Windows\system32\PING.EXE
                                                                                                                                        ping -n 10 localhost
                                                                                                                                        27⤵
                                                                                                                                        • System Network Configuration Discovery: Internet Connection Discovery
                                                                                                                                        • Runs ping.exe
                                                                                                                                        PID:4484
                                                                                    • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                                                                      "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2088,2137661838968362705,6210748301682622215,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1216 /prefetch:2
                                                                                      2⤵
                                                                                      • Suspicious behavior: EnumeratesProcesses
                                                                                      PID:4364
                                                                                  • C:\Windows\System32\CompPkgSrv.exe
                                                                                    C:\Windows\System32\CompPkgSrv.exe -Embedding
                                                                                    1⤵
                                                                                      PID:400
                                                                                    • C:\Windows\System32\CompPkgSrv.exe
                                                                                      C:\Windows\System32\CompPkgSrv.exe -Embedding
                                                                                      1⤵
                                                                                        PID:548
                                                                                      • C:\Windows\system32\taskmgr.exe
                                                                                        "C:\Windows\system32\taskmgr.exe" /7
                                                                                        1⤵
                                                                                        • Checks SCSI registry key(s)
                                                                                        • Suspicious behavior: EnumeratesProcesses
                                                                                        • Suspicious behavior: GetForegroundWindowSpam
                                                                                        • Suspicious use of AdjustPrivilegeToken
                                                                                        • Suspicious use of FindShellTrayWindow
                                                                                        • Suspicious use of SendNotifyMessage
                                                                                        PID:1716

                                                                                      Network

                                                                                            MITRE ATT&CK Enterprise v15

                                                                                            Replay Monitor

                                                                                            Loading Replay Monitor...

                                                                                            Downloads

                                                                                            • C:\Users\Admin\AppData\Local\Microsoft\CLR_v4.0\UsageLogs\Client.exe.log

                                                                                              Filesize

                                                                                              2KB

                                                                                              MD5

                                                                                              8f0271a63446aef01cf2bfc7b7c7976b

                                                                                              SHA1

                                                                                              b70dad968e1dda14b55ad361b7fd4ef9ab6c06d7

                                                                                              SHA256

                                                                                              da740d78ae00b72cb3710d1a1256dc6431550965d20afaa65e5d5860a4748e8c

                                                                                              SHA512

                                                                                              78a403c69f1284b7dd41527019f3eede3512a5e4d439d846eca83557b741ca37bcf56c412f3e577b9dd4cfa5a6d6210961215f14cb271b143f6eb94f69389cf5

                                                                                            • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad\settings.dat

                                                                                              Filesize

                                                                                              152B

                                                                                              MD5

                                                                                              dc058ebc0f8181946a312f0be99ed79c

                                                                                              SHA1

                                                                                              0c6f376ed8f2d4c275336048c7c9ef9edf18bff0

                                                                                              SHA256

                                                                                              378701e87dcff90aa092702bc299859d6ae8f7e313f773bf594f81df6f40bf6a

                                                                                              SHA512

                                                                                              36e0de64a554762b28045baebf9f71930c59d608f8d05c5faf8906d62eaf83f6d856ef1d1b38110e512fbb1a85d3e2310be11a7f679c6b5b3c62313cc7af52aa

                                                                                            • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad\settings.dat

                                                                                              Filesize

                                                                                              152B

                                                                                              MD5

                                                                                              a0486d6f8406d852dd805b66ff467692

                                                                                              SHA1

                                                                                              77ba1f63142e86b21c951b808f4bc5d8ed89b571

                                                                                              SHA256

                                                                                              c0745fd195f3a51b27e4d35a626378a62935dccebefb94db404166befd68b2be

                                                                                              SHA512

                                                                                              065a62032eb799fade5fe75f390e7ab3c9442d74cb8b520d846662d144433f39b9186b3ef3db3480cd1d1d655d8f0630855ed5d6e85cf157a40c38a19375ed8a

                                                                                            • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index

                                                                                              Filesize

                                                                                              144B

                                                                                              MD5

                                                                                              1988512bed6acc701541db84fc1dc478

                                                                                              SHA1

                                                                                              f1dc6a8ab72208b4524ecbaff72c8eca4b97df59

                                                                                              SHA256

                                                                                              58b6feb99fb247dbe1d62ada7d977765999e521787317aa5c623132939a7ff25

                                                                                              SHA512

                                                                                              3325b8728f0348b01ff3cafa275f69ad91825f234ef5558b319ef7f985300b97b4ea042093674418b93f431aa3829a5b544e76cf7cf4d71b345f635bafbf3da3

                                                                                            • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Network Persistent State

                                                                                              Filesize

                                                                                              930B

                                                                                              MD5

                                                                                              c7f17ac74b936a2d77294c3ff68efea3

                                                                                              SHA1

                                                                                              d75c567d423094ec1079b242a32736d135e50181

                                                                                              SHA256

                                                                                              571f387ffa57f634f91ab79677644f5dea83200e3dde1cae46ac214c2cc4c64c

                                                                                              SHA512

                                                                                              e90b9e52d3002a1e4dee722dd34a7e7fa6c4fe28e35a87df90ad694eae7f2955ef32b225b194faf4a721c5c067f6020cf6bffc92e407c2b0dbeda2875fcfef1a

                                                                                            • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Preferences

                                                                                              Filesize

                                                                                              5KB

                                                                                              MD5

                                                                                              561fa294fea45f3230f0b15deb61746e

                                                                                              SHA1

                                                                                              530d152a58dc7bbd48d02fe9da79882e02614891

                                                                                              SHA256

                                                                                              dfcf363ef72bcb276c55785037e065589fe7040b7dd3d0782ede7f26364386ec

                                                                                              SHA512

                                                                                              c68638ad051af62b1ed2b96a5478e3bcaa202731618c4cdc3f666ded18459ee91857fc8805b4601e9f65525f8f2e545d92cbd29eecbd2d4f04f6c4d1dca6776a

                                                                                            • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Preferences

                                                                                              Filesize

                                                                                              6KB

                                                                                              MD5

                                                                                              44ef1f45c32cacb9abec30fcf06baa75

                                                                                              SHA1

                                                                                              dee83bb99c92836e47627a8acc2ae06fb4ec786e

                                                                                              SHA256

                                                                                              c87043548ad503856867d83774c180d64328a80a5a75d315fad782b6060e36a2

                                                                                              SHA512

                                                                                              bfdcda1d4c002c5a4be870a4693a3e3182f8e6859e27fe830bf3ce003567f75ff610f5a171ef7bf789dc36649493699c84e88cb948ce8c93eaa7dd94cbad4ad6

                                                                                            • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Preferences

                                                                                              Filesize

                                                                                              6KB

                                                                                              MD5

                                                                                              591d7bf1a581a4400195e3d3f4568371

                                                                                              SHA1

                                                                                              b9e4cf9a47304ad347f6ee3b93b4ff46a2939db8

                                                                                              SHA256

                                                                                              bc147a1f55cf15b587aa759d4232e1ea968cdc5146bb5a900e35aea703f7f722

                                                                                              SHA512

                                                                                              9bb39fd51409396d39cb6718f97c5cbabc9a6407d76b7eb8477c406ba94db856661933359a78b84921f3e73e7da7c160eb1c586fa7f5e9928076cb0d273c19c3

                                                                                            • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Preferences

                                                                                              Filesize

                                                                                              6KB

                                                                                              MD5

                                                                                              14aa5d545696c2560428409521f7cc11

                                                                                              SHA1

                                                                                              5a5fcc3a89f3be36bd7e8a2acb7dbc0858681f9b

                                                                                              SHA256

                                                                                              8c2cf3db3759c069645fd38d4e912cf4e91b5e2ea2f8fbe9a1de1cfcd2d71ca0

                                                                                              SHA512

                                                                                              a8b581d321cfaf39c5826ab978141dced8182bb31afc130813dced0f0707c38dd7401daee1bf5c07941b038ee10c8ce7407d0b0d25c791cc44e52ecdcb057879

                                                                                            • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\data_reduction_proxy_leveldb\CURRENT

                                                                                              Filesize

                                                                                              16B

                                                                                              MD5

                                                                                              6752a1d65b201c13b62ea44016eb221f

                                                                                              SHA1

                                                                                              58ecf154d01a62233ed7fb494ace3c3d4ffce08b

                                                                                              SHA256

                                                                                              0861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd

                                                                                              SHA512

                                                                                              9cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389

                                                                                            • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Local State

                                                                                              Filesize

                                                                                              10KB

                                                                                              MD5

                                                                                              2bb8bc75740087f75af7dfffcecd40f8

                                                                                              SHA1

                                                                                              ebd29ce81aba4c6312bb605e99288833e91ce821

                                                                                              SHA256

                                                                                              5e4ae6ba4fe6841482f19544e09be73ff0229325ae407f363e2b51bdd94cccb8

                                                                                              SHA512

                                                                                              586db15e83137d3289862aef9f17d29ff8210fc89b922dbd0d4b5b706dac8ac1e421fe867293700ca2e4e2e473a09ca3d2da8747defa929de9785779309bd5d7

                                                                                            • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Local State

                                                                                              Filesize

                                                                                              10KB

                                                                                              MD5

                                                                                              45f333c3d930f8d85fbe2a57dd79a78e

                                                                                              SHA1

                                                                                              4adc7469462cf2237616a15f7a3de858106ec2ab

                                                                                              SHA256

                                                                                              4b5d0f1f1f14e09192866f8f0a03cd071999121402c49398a4b62e2a87fee578

                                                                                              SHA512

                                                                                              93f726ee99ef4351de74b9cbe3a0611fc65bc95b2064ab8782483a0031c54d927987919c4bd935484e26401683c10e435dfec055aa2181df6ab9832f57f9bd99

                                                                                            • C:\Users\Admin\AppData\Local\Temp\3tUvYKKQVVOo.bat

                                                                                              Filesize

                                                                                              196B

                                                                                              MD5

                                                                                              ca28b664422348d941a39939220c7420

                                                                                              SHA1

                                                                                              af61d73233ea1d0f3d3e00714da567f6c9952a1f

                                                                                              SHA256

                                                                                              25d67a8df7bebcddaa5287383d84e78bd900e975072cf3db16097fe43e0b7748

                                                                                              SHA512

                                                                                              052305bb15b8dd382afb8dd0a03283831f9c8fb0cdacc42b2c4f6e2e06c0a48d4aa6cf4f1b508ea161483ea9f4fd7c123f2da22e6afb4cec785d892c32335708

                                                                                            • C:\Users\Admin\AppData\Local\Temp\5509u1oMZs5R.bat

                                                                                              Filesize

                                                                                              196B

                                                                                              MD5

                                                                                              d6dae4670d2b89dadcc0f1e7d556faed

                                                                                              SHA1

                                                                                              d35e9d97722d02561dff97ffa527928087de17ed

                                                                                              SHA256

                                                                                              c2c19d5674da990d0cf466a5bd0bd90c8d47960439afbc292ff35cbc8c56c130

                                                                                              SHA512

                                                                                              fc9e5f8cb75128fcc7f96a35d8b1ca7bf441d1953815d7af6e9fea42fbf5f64d7fe9a562aba1b3d1a4fd1064cfa558dca160cd01432859e5067335171c468af9

                                                                                            • C:\Users\Admin\AppData\Local\Temp\5Xh1R9CXmcRl.bat

                                                                                              Filesize

                                                                                              196B

                                                                                              MD5

                                                                                              92a412cd8c06f090e632e06a8c8346e6

                                                                                              SHA1

                                                                                              9973bfcb7da77a5c5e51dd2882ca8e57d6b1f598

                                                                                              SHA256

                                                                                              4d7da2f291157815b728afe46f39fe36acc0f0aef4dceb7068569569e013c0aa

                                                                                              SHA512

                                                                                              d6f95f5c3545dc9b54315f52263bdaa4004a025cf7c12c9b1aca348ba1e855720a23de35ec06b630dfc79f67b2395c211cf8dd6ad49175bf0d637f21f53c1f2b

                                                                                            • C:\Users\Admin\AppData\Local\Temp\5b3MkrVD3x2i.bat

                                                                                              Filesize

                                                                                              196B

                                                                                              MD5

                                                                                              6f2033b382f046fd1a23345fa9d9c339

                                                                                              SHA1

                                                                                              b309b30b4633677680eb018dd21cf87670dd74f2

                                                                                              SHA256

                                                                                              7c69a6dc98e7021b043df0ac6e2756ce4c3db9887d93f96c5aeba800f9539fec

                                                                                              SHA512

                                                                                              82d168023edb6c7b52660ad9c417b86f00d8b2eb9ae3e9dedb84b4f89d16a418e33779d682784115d5df05c70062d1bab87934bc7eb35420fefbc26057737e6f

                                                                                            • C:\Users\Admin\AppData\Local\Temp\8gaDjnEV1qGc.bat

                                                                                              Filesize

                                                                                              196B

                                                                                              MD5

                                                                                              6db8e9c181f6a91e9c90c59685e25d5b

                                                                                              SHA1

                                                                                              dbd799d65bccdc70617c1eeb110f651da1c984c0

                                                                                              SHA256

                                                                                              deaf7bd05b89dccd1170d61bb60e588de89fa5546af4abeb0f21024334d57c6b

                                                                                              SHA512

                                                                                              1e198415b66753b67e7f07c49ca40b32deb652255de279373ced6131cf3d25b7086977c3dd918c78c700d92fc04554cf5b5da08945ebff975ad34d6aeeb6dde4

                                                                                            • C:\Users\Admin\AppData\Local\Temp\B1gzOHdDTAUh.bat

                                                                                              Filesize

                                                                                              196B

                                                                                              MD5

                                                                                              ec8df93d0ce85d1353e01a53c2c2b9c2

                                                                                              SHA1

                                                                                              9eb631b2187c0f0ab5e70ebdfe0810649382d46b

                                                                                              SHA256

                                                                                              bc813590d09df6ba9fb6b0476fb2789237b6261e7a76bdf72a23020a38f3e737

                                                                                              SHA512

                                                                                              a217e4bb7eab23bc3ffbaf6b5239156164584d63c0d786cee11f4ecad085c10a229de5e2828cccba8b3b929c1bbb9978ceb8faf0daa8973f08eedfaa4db6ea7a

                                                                                            • C:\Users\Admin\AppData\Local\Temp\GC4xUfdmYvDq.bat

                                                                                              Filesize

                                                                                              196B

                                                                                              MD5

                                                                                              6688f8a6249a2643f0055dd7fe1e565c

                                                                                              SHA1

                                                                                              0d82cec91be937449b87ad5e034a8f65b4f0ada0

                                                                                              SHA256

                                                                                              cee8b9824e585c7ec56bb4d34cdd3fafc874596c843f3db41818903fa6e3ebc9

                                                                                              SHA512

                                                                                              8cafcfee85ada4cff03baa181d7858399cb779c4db9dbafec566486acf3e873bfd80203b9018b7fa2cbfb56ac864b4cb0505600d7c9ee937a3a0cd3187c4b632

                                                                                            • C:\Users\Admin\AppData\Local\Temp\IkVA86CQf0UO.bat

                                                                                              Filesize

                                                                                              196B

                                                                                              MD5

                                                                                              7c25fd2568a9beb9cff5acef5c6bad2f

                                                                                              SHA1

                                                                                              ebcbb8f7ce5c05ed71d0e484b4efb6037dc5aae6

                                                                                              SHA256

                                                                                              a9c47bb8125f0e7b99922f779ee786b57f5e945466a21e88122db0e108e2b4e6

                                                                                              SHA512

                                                                                              a8a076bd4a00e9e288f14960b1c0df57d5e079ed9e4b66b22cf614ceee68d5da18d104bc019f609680cac34eff62cb706630bc79320f6a81ec845bab4b31e1a1

                                                                                            • C:\Users\Admin\AppData\Local\Temp\eZTQRKQoMUAy.bat

                                                                                              Filesize

                                                                                              196B

                                                                                              MD5

                                                                                              1c9630c8f357b3c04d1222a9ef81ef5f

                                                                                              SHA1

                                                                                              d891c1077be20c80cab6a54d4b6e4890571a5a80

                                                                                              SHA256

                                                                                              7dd9c4ada50f95f6ba81ccd2443726bb90e5e60e72ee6eac6d9c6721dbacea8a

                                                                                              SHA512

                                                                                              9d589125be2d14b55c4df51e2ac028174ab322a72fedc7fe750b2b69ee956bbc437f5be55306a9434b529c07f230ce9b5063e44b308f2ce21173238ea7e11e33

                                                                                            • C:\Users\Admin\AppData\Local\Temp\fbCtDFCzUnfb.bat

                                                                                              Filesize

                                                                                              196B

                                                                                              MD5

                                                                                              bdd4c791be98f97fbefe18b97c8a58d0

                                                                                              SHA1

                                                                                              19c7228ed217448c018411716a64760a380aca0e

                                                                                              SHA256

                                                                                              e801fa2fe7a30d735564858dc3a69d656c005fed5f3ac8d6bb5e427fe0ae3b2d

                                                                                              SHA512

                                                                                              c1c8ebccfa705e52c5c0fd59e9abdd9a8d5b5e2ca4b8451059bd5e2ad85551c4a6153d2c233e51395ff190fb8191b93e3741b647ca662296f382de12fd3da198

                                                                                            • C:\Users\Admin\AppData\Local\Temp\oJKjd3d2Byhw.bat

                                                                                              Filesize

                                                                                              196B

                                                                                              MD5

                                                                                              e0985dd1d0b0a4b78c8215aba5b2d73c

                                                                                              SHA1

                                                                                              f178d702c47d3b686cd0aca39d5676c78463c281

                                                                                              SHA256

                                                                                              c4e8e2aec85042a3f6559b01366aa7f377f63e1e0697803902f2941972463909

                                                                                              SHA512

                                                                                              13f5a597bf2ce42b8b5e434f8d84f48e7508b8a08d2a55b101686dc9fa367ba4b808e50ccec5ebb7e303ed176ead7f4cf24c2860fc1eb15c3b4cdbe4d99c8327

                                                                                            • C:\Users\Admin\AppData\Local\Temp\vtWvMKGpYewW.bat

                                                                                              Filesize

                                                                                              196B

                                                                                              MD5

                                                                                              2452cf550fd80b0b1579a76da353658d

                                                                                              SHA1

                                                                                              d7fe4c7bab9aeec692267b7b7e062d7b05d21670

                                                                                              SHA256

                                                                                              b29e225371c6acc1bf501f97d3b97e07ba5854c772d50ab3202f66ab24e05c33

                                                                                              SHA512

                                                                                              43261e7081e1ea7c101914cb07725d9b2bb7e63e051eaf844ead98a6133f1fa7048db4e58383c144a0092d00d9e7a754375e5193250822619740d9a099da9d80

                                                                                            • C:\Users\Admin\Downloads\Unconfirmed 96709.crdownload

                                                                                              Filesize

                                                                                              3.1MB

                                                                                              MD5

                                                                                              47ec64e3d129b23c44f417cbc2a07aa7

                                                                                              SHA1

                                                                                              e65fbcf69e6e808ebe7bc9b13e483c5fc80d5fa2

                                                                                              SHA256

                                                                                              ccb17adb4b57a95a61acb010c01da98dc150be67a85df2ab40ba9d1f078f8373

                                                                                              SHA512

                                                                                              52247a235b708e98efcf977fd109344e16df9c5a9f13ad5afd395df3f009d9ee6edf81fef9d74a31a9fdec1f851e61642912eb9bc8384b39042b70f9d8b7d510

                                                                                            • memory/1716-256-0x0000025985E50000-0x0000025985E51000-memory.dmp

                                                                                              Filesize

                                                                                              4KB

                                                                                            • memory/1716-257-0x0000025985E50000-0x0000025985E51000-memory.dmp

                                                                                              Filesize

                                                                                              4KB

                                                                                            • memory/1716-255-0x0000025985E50000-0x0000025985E51000-memory.dmp

                                                                                              Filesize

                                                                                              4KB

                                                                                            • memory/1716-263-0x0000025985E50000-0x0000025985E51000-memory.dmp

                                                                                              Filesize

                                                                                              4KB

                                                                                            • memory/1716-262-0x0000025985E50000-0x0000025985E51000-memory.dmp

                                                                                              Filesize

                                                                                              4KB

                                                                                            • memory/1716-261-0x0000025985E50000-0x0000025985E51000-memory.dmp

                                                                                              Filesize

                                                                                              4KB

                                                                                            • memory/1716-265-0x0000025985E50000-0x0000025985E51000-memory.dmp

                                                                                              Filesize

                                                                                              4KB

                                                                                            • memory/1716-264-0x0000025985E50000-0x0000025985E51000-memory.dmp

                                                                                              Filesize

                                                                                              4KB

                                                                                            • memory/1716-267-0x0000025985E50000-0x0000025985E51000-memory.dmp

                                                                                              Filesize

                                                                                              4KB

                                                                                            • memory/1716-266-0x0000025985E50000-0x0000025985E51000-memory.dmp

                                                                                              Filesize

                                                                                              4KB

                                                                                            • memory/3040-131-0x0000000000110000-0x0000000000434000-memory.dmp

                                                                                              Filesize

                                                                                              3.1MB

                                                                                            • memory/4068-138-0x000000001BDA0000-0x000000001BDF0000-memory.dmp

                                                                                              Filesize

                                                                                              320KB

                                                                                            • memory/4068-139-0x000000001BEB0000-0x000000001BF62000-memory.dmp

                                                                                              Filesize

                                                                                              712KB